Index: chrome/browser/chromeos/login/auth/cryptohome_authenticator_unittest.cc |
diff --git a/chrome/browser/chromeos/login/auth/cryptohome_authenticator_unittest.cc b/chrome/browser/chromeos/login/auth/cryptohome_authenticator_unittest.cc |
index c96e922adc1e9bbe568c771d455df5158bd22dd5..9a5385f43352ff53a0b7f3ea7cc2122fb0afa4b9 100644 |
--- a/chrome/browser/chromeos/login/auth/cryptohome_authenticator_unittest.cc |
+++ b/chrome/browser/chromeos/login/auth/cryptohome_authenticator_unittest.cc |
@@ -131,7 +131,7 @@ bool CreateOwnerKeyInSlot(PK11SlotInfo* slot) { |
class CryptohomeAuthenticatorTest : public testing::Test { |
public: |
CryptohomeAuthenticatorTest() |
- : user_context_("me@nowhere.org"), |
+ : user_context_(AccountId::FromUserEmail("me@nowhere.org")), |
user_manager_(new user_manager::FakeUserManager()), |
user_manager_enabler_(user_manager_), |
mock_caller_(NULL), |
@@ -142,8 +142,8 @@ class CryptohomeAuthenticatorTest : public testing::Test { |
user_context_.SetKey(Key("fakepass")); |
user_context_.SetUserIDHash("me_nowhere_com_hash"); |
const user_manager::User* user = |
- user_manager_->AddUser(user_context_.GetUserID()); |
- profile_.set_profile_name(user_context_.GetUserID()); |
+ user_manager_->AddUser(user_context_.GetAccountId()); |
+ profile_.set_profile_name(user_context_.GetAccountId().GetUserEmail()); |
ProfileHelper::Get()->SetUserToProfileMappingForTesting(user, &profile_); |
@@ -264,13 +264,12 @@ class CryptohomeAuthenticatorTest : public testing::Test { |
cryptohome::KeyDefinition::ProviderData("salt")); |
key_definition.provider_data.back().bytes = salt.Pass(); |
} |
- EXPECT_CALL(*mock_homedir_methods_, GetKeyDataEx( |
- cryptohome::Identification(user_context_.GetUserID()), |
- kCryptohomeGAIAKeyLabel, |
- _)) |
+ EXPECT_CALL(*mock_homedir_methods_, |
+ GetKeyDataEx(cryptohome::Identification( |
+ user_context_.GetAccountId().GetUserEmail()), |
+ kCryptohomeGAIAKeyLabel, _)) |
.WillOnce(WithArg<2>(Invoke( |
- this, |
- &CryptohomeAuthenticatorTest::InvokeGetDataExCallback))); |
+ this, &CryptohomeAuthenticatorTest::InvokeGetDataExCallback))); |
} |
void ExpectMountExCall(bool expect_create_attempt) { |
@@ -285,10 +284,9 @@ class CryptohomeAuthenticatorTest : public testing::Test { |
cryptohome::PRIV_DEFAULT)); |
} |
EXPECT_CALL(*mock_homedir_methods_, |
- MountEx(cryptohome::Identification(user_context_.GetUserID()), |
- cryptohome::Authorization(auth_key), |
- mount, |
- _)) |
+ MountEx(cryptohome::Identification( |
+ user_context_.GetAccountId().GetUserEmail()), |
+ cryptohome::Authorization(auth_key), mount, _)) |
.Times(1) |
.RetiresOnSaturation(); |
} |
@@ -562,7 +560,8 @@ TEST_F(CryptohomeAuthenticatorTest, DriveDataResync) { |
// Set up mock async method caller to respond successfully to a cryptohome |
// remove attempt. |
mock_caller_->SetUp(true, cryptohome::MOUNT_ERROR_NONE); |
- EXPECT_CALL(*mock_caller_, AsyncRemove(user_context_.GetUserID(), _)) |
+ EXPECT_CALL(*mock_caller_, |
+ AsyncRemove(user_context_.GetAccountId().GetUserEmail(), _)) |
.Times(1) |
.RetiresOnSaturation(); |
@@ -584,7 +583,8 @@ TEST_F(CryptohomeAuthenticatorTest, DriveResyncFail) { |
// Set up mock async method caller to fail a cryptohome remove attempt. |
mock_caller_->SetUp(false, cryptohome::MOUNT_ERROR_NONE); |
- EXPECT_CALL(*mock_caller_, AsyncRemove(user_context_.GetUserID(), _)) |
+ EXPECT_CALL(*mock_caller_, |
+ AsyncRemove(user_context_.GetAccountId().GetUserEmail(), _)) |
.Times(1) |
.RetiresOnSaturation(); |
@@ -614,10 +614,9 @@ TEST_F(CryptohomeAuthenticatorTest, DriveDataRecover) { |
// Set up mock async method caller to respond successfully to a key migration. |
mock_caller_->SetUp(true, cryptohome::MOUNT_ERROR_NONE); |
- EXPECT_CALL( |
- *mock_caller_, |
- AsyncMigrateKey( |
- user_context_.GetUserID(), _, transformed_key_.GetSecret(), _)) |
+ EXPECT_CALL(*mock_caller_, |
+ AsyncMigrateKey(user_context_.GetAccountId().GetUserEmail(), _, |
+ transformed_key_.GetSecret(), _)) |
.Times(1) |
.RetiresOnSaturation(); |
@@ -640,10 +639,9 @@ TEST_F(CryptohomeAuthenticatorTest, DriveDataRecoverButFail) { |
// Set up mock async method caller to fail a key migration attempt, |
// asserting that the wrong password was used. |
mock_caller_->SetUp(false, cryptohome::MOUNT_ERROR_KEY_FAILURE); |
- EXPECT_CALL( |
- *mock_caller_, |
- AsyncMigrateKey( |
- user_context_.GetUserID(), _, transformed_key_.GetSecret(), _)) |
+ EXPECT_CALL(*mock_caller_, |
+ AsyncMigrateKey(user_context_.GetAccountId().GetUserEmail(), _, |
+ transformed_key_.GetSecret(), _)) |
.Times(1) |
.RetiresOnSaturation(); |
@@ -732,7 +730,8 @@ TEST_F(CryptohomeAuthenticatorTest, DriveUnlock) { |
// Set up mock async method caller to respond successfully to a cryptohome |
// key-check attempt. |
mock_caller_->SetUp(true, cryptohome::MOUNT_ERROR_NONE); |
- EXPECT_CALL(*mock_caller_, AsyncCheckKey(user_context_.GetUserID(), _, _)) |
+ EXPECT_CALL(*mock_caller_, |
+ AsyncCheckKey(user_context_.GetAccountId().GetUserEmail(), _, _)) |
.Times(1) |
.RetiresOnSaturation(); |