Index: chrome/browser/chromeos/login/saml/saml_browsertest.cc |
diff --git a/chrome/browser/chromeos/login/saml/saml_browsertest.cc b/chrome/browser/chromeos/login/saml/saml_browsertest.cc |
index 25f1e7dfe3019534bc390783092dd3f0ab8b4028..fb3ca9ce47c1fc13bb8ea4e9068871b4394fab17 100644 |
--- a/chrome/browser/chromeos/login/saml/saml_browsertest.cc |
+++ b/chrome/browser/chromeos/login/saml/saml_browsertest.cc |
@@ -31,7 +31,9 @@ |
#include "chrome/browser/chromeos/login/test/oobe_screen_waiter.h" |
#include "chrome/browser/chromeos/login/ui/login_display_host_impl.h" |
#include "chrome/browser/chromeos/login/ui/webui_login_display.h" |
+#include "chrome/browser/chromeos/login/users/chrome_user_manager.h" |
#include "chrome/browser/chromeos/login/wizard_controller.h" |
+#include "chrome/browser/chromeos/policy/affiliation_test_helper.h" |
#include "chrome/browser/chromeos/policy/device_policy_builder.h" |
#include "chrome/browser/chromeos/policy/device_policy_cros_browser_test.h" |
#include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" |
@@ -133,6 +135,8 @@ const char kTestUserinfoToken[] = "fake-userinfo-token"; |
const char kTestRefreshToken[] = "fake-refresh-token"; |
const char kPolicy[] = "{\"managed_users\": [\"*\"]}"; |
+const char kAffiliationID[] = "some-affiliation-id"; |
+ |
// FakeSamlIdp serves IdP auth form and the form submission. The form is |
// served with the template's RelayState placeholder expanded to the real |
// RelayState parameter from request. The form submission redirects back to |
@@ -951,12 +955,10 @@ void SAMLPolicyTest::SetUpInProcessBrowserTestFixture() { |
SamlTest::SetUpInProcessBrowserTestFixture(); |
// Initialize device policy. |
- test_helper_.InstallOwnerKey(); |
- test_helper_.MarkAsEnterpriseOwned(); |
- device_policy_->SetDefaultSigningKey(); |
- device_policy_->Build(); |
- fake_session_manager_client_->set_device_policy(device_policy_->GetBlob()); |
- fake_session_manager_client_->OnPropertyChangeComplete(true); |
+ std::set<std::string> device_affiliation_ids; |
+ device_affiliation_ids.insert(kAffiliationID); |
+ policy::affiliation_test_helper::SetDeviceAffiliationID( |
+ &test_helper_, fake_session_manager_client_, device_affiliation_ids); |
// Initialize user policy. |
EXPECT_CALL(provider_, IsInitializationComplete(_)) |
@@ -978,6 +980,18 @@ void SAMLPolicyTest::SetUpOnMainThread() { |
AccountId::FromUserEmail(kDifferentDomainSAMLUserEmail), |
user_manager::User::OAUTH2_TOKEN_STATUS_VALID); |
+ // Give affiliated users appropriate affiliation IDs. |
+ std::set<std::string> user_affiliation_ids; |
+ user_affiliation_ids.insert(kAffiliationID); |
+ chromeos::ChromeUserManager::Get()->SetUserAffiliation(kFirstSAMLUserEmail, |
+ user_affiliation_ids); |
+ chromeos::ChromeUserManager::Get()->SetUserAffiliation(kSecondSAMLUserEmail, |
+ user_affiliation_ids); |
+ chromeos::ChromeUserManager::Get()->SetUserAffiliation(kHTTPSAMLUserEmail, |
+ user_affiliation_ids); |
+ chromeos::ChromeUserManager::Get()->SetUserAffiliation(kNonSAMLUserEmail, |
+ user_affiliation_ids); |
+ |
// Set up fake networks. |
DBusThreadManager::Get() |
->GetShillManagerClient() |