OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <cstring> | 5 #include <cstring> |
6 #include <string> | 6 #include <string> |
7 | 7 |
8 #include "base/bind.h" | 8 #include "base/bind.h" |
9 #include "base/bind_helpers.h" | 9 #include "base/bind_helpers.h" |
10 #include "base/callback.h" | 10 #include "base/callback.h" |
(...skipping 950 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
961 EXPECT_CALL(provider_, IsInitializationComplete(_)) | 961 EXPECT_CALL(provider_, IsInitializationComplete(_)) |
962 .WillRepeatedly(Return(true)); | 962 .WillRepeatedly(Return(true)); |
963 policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_); | 963 policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_); |
964 } | 964 } |
965 | 965 |
966 void SAMLPolicyTest::SetUpOnMainThread() { | 966 void SAMLPolicyTest::SetUpOnMainThread() { |
967 SamlTest::SetUpOnMainThread(); | 967 SamlTest::SetUpOnMainThread(); |
968 | 968 |
969 // Pretend that the test users' OAuth tokens are valid. | 969 // Pretend that the test users' OAuth tokens are valid. |
970 user_manager::UserManager::Get()->SaveUserOAuthStatus( | 970 user_manager::UserManager::Get()->SaveUserOAuthStatus( |
971 kFirstSAMLUserEmail, user_manager::User::OAUTH2_TOKEN_STATUS_VALID); | 971 AccountId::FromUserEmail(kFirstSAMLUserEmail), |
| 972 user_manager::User::OAUTH2_TOKEN_STATUS_VALID); |
972 user_manager::UserManager::Get()->SaveUserOAuthStatus( | 973 user_manager::UserManager::Get()->SaveUserOAuthStatus( |
973 kNonSAMLUserEmail, user_manager::User::OAUTH2_TOKEN_STATUS_VALID); | 974 AccountId::FromUserEmail(kNonSAMLUserEmail), |
| 975 user_manager::User::OAUTH2_TOKEN_STATUS_VALID); |
974 user_manager::UserManager::Get()->SaveUserOAuthStatus( | 976 user_manager::UserManager::Get()->SaveUserOAuthStatus( |
975 kDifferentDomainSAMLUserEmail, | 977 AccountId::FromUserEmail(kDifferentDomainSAMLUserEmail), |
976 user_manager::User::OAUTH2_TOKEN_STATUS_VALID); | 978 user_manager::User::OAUTH2_TOKEN_STATUS_VALID); |
977 | 979 |
978 // Set up fake networks. | 980 // Set up fake networks. |
979 DBusThreadManager::Get() | 981 DBusThreadManager::Get() |
980 ->GetShillManagerClient() | 982 ->GetShillManagerClient() |
981 ->GetTestInterface() | 983 ->GetTestInterface() |
982 ->SetupDefaultEnvironment(); | 984 ->SetupDefaultEnvironment(); |
983 } | 985 } |
984 | 986 |
985 void SAMLPolicyTest::SetSAMLOfflineSigninTimeLimitPolicy(int limit) { | 987 void SAMLPolicyTest::SetSAMLOfflineSigninTimeLimitPolicy(int limit) { |
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1219 kTestAuthLSIDCookie1); | 1221 kTestAuthLSIDCookie1); |
1220 | 1222 |
1221 GetCookies(); | 1223 GetCookies(); |
1222 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName)); | 1224 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName)); |
1223 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName)); | 1225 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName)); |
1224 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName)); | 1226 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName)); |
1225 } | 1227 } |
1226 | 1228 |
1227 | 1229 |
1228 } // namespace chromeos | 1230 } // namespace chromeos |
OLD | NEW |