Index: chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
diff --git a/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc b/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
index 04c945ece1fcdfa42c1e06d5d86a7ffea73415b1..68cceed0a5a581a31e41c3373e77f6413ec86d5d 100644 |
--- a/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
+++ b/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
@@ -116,7 +116,12 @@ class MultiProfileUserControllerTest |
MultiProfileUserControllerTest() |
: fake_user_manager_(new FakeChromeUserManager), |
user_manager_enabler_(fake_user_manager_), |
- user_not_allowed_count_(0) {} |
+ user_not_allowed_count_(0) { |
+ for (size_t i = 0; i < arraysize(kUsers); ++i) { |
+ test_users_.push_back(AccountId::FromUserEmail(kUsers[i])); |
+ } |
+ } |
+ |
~MultiProfileUserControllerTest() override {} |
void SetUp() override { |
@@ -126,14 +131,15 @@ class MultiProfileUserControllerTest |
controller_.reset(new MultiProfileUserController( |
this, TestingBrowserProcess::GetGlobal()->local_state())); |
- for (size_t i = 0; i < arraysize(kUsers); ++i) { |
- const std::string user_email(kUsers[i]); |
- const user_manager::User* user = fake_user_manager_->AddUser(user_email); |
+ for (size_t i = 0; i < test_users_.size(); ++i) { |
+ const AccountId account_id(test_users_[i]); |
+ const user_manager::User* user = |
+ fake_user_manager_->AddUser(test_users_[i]); |
// Note that user profiles are created after user login in reality. |
TestingProfile* user_profile = |
- profile_manager_->CreateTestingProfile(user_email); |
- user_profile->set_profile_name(user_email); |
+ profile_manager_->CreateTestingProfile(account_id.GetUserEmail()); |
+ user_profile->set_profile_name(account_id.GetUserEmail()); |
user_profiles_.push_back(user_profile); |
ProfileHelper::Get()->SetUserToProfileMappingForTesting(user, |
@@ -157,13 +163,13 @@ class MultiProfileUserControllerTest |
} |
void LoginUser(size_t user_index) { |
- ASSERT_LT(user_index, arraysize(kUsers)); |
- fake_user_manager_->LoginUser(kUsers[user_index]); |
+ ASSERT_LT(user_index, test_users_.size()); |
+ fake_user_manager_->LoginUser(test_users_[user_index]); |
controller_->StartObserving(user_profiles_[user_index]); |
} |
void SetOwner(size_t user_index) { |
- fake_user_manager_->set_owner_email(kUsers[user_index]); |
+ fake_user_manager_->set_owner_id(test_users_[user_index]); |
} |
PrefService* GetUserPrefs(size_t user_index) { |
@@ -176,12 +182,13 @@ class MultiProfileUserControllerTest |
} |
std::string GetCachedBehavior(size_t user_index) { |
- return controller_->GetCachedValue(kUsers[user_index]); |
+ return controller_->GetCachedValue(test_users_[user_index].GetUserEmail()); |
} |
void SetCachedBehavior(size_t user_index, |
const std::string& behavior) { |
- controller_->SetCachedValue(kUsers[user_index], behavior); |
+ controller_->SetCachedValue(test_users_[user_index].GetUserEmail(), |
+ behavior); |
} |
void ResetCounts() { |
@@ -212,6 +219,8 @@ class MultiProfileUserControllerTest |
int user_not_allowed_count_; |
+ std::vector<AccountId> test_users_; |
+ |
private: |
DISALLOW_COPY_AND_ASSIGN(MultiProfileUserControllerTest); |
}; |
@@ -226,7 +235,8 @@ TEST_F(MultiProfileUserControllerTest, AllAllowedBeforeLogin) { |
for (size_t i = 0; i < arraysize(kTestCases); ++i) { |
SetCachedBehavior(0, kTestCases[i]); |
MultiProfileUserController::UserAllowedInSessionReason reason; |
- EXPECT_TRUE(controller()->IsUserAllowedInSession(kUsers[0], &reason)) |
+ EXPECT_TRUE(controller()->IsUserAllowedInSession( |
+ test_users_[0].GetUserEmail(), &reason)) |
<< "Case " << i; |
EXPECT_EQ(MultiProfileUserController::ALLOWED, reason) << "Case " << i; |
EXPECT_EQ(MultiProfileUserController::ALLOWED, |
@@ -292,7 +302,8 @@ TEST_F(MultiProfileUserControllerTest, IsSecondaryAllowed) { |
MultiProfileUserController::GetPrimaryUserPolicy()) |
<< "Case " << i; |
MultiProfileUserController::UserAllowedInSessionReason reason; |
- controller()->IsUserAllowedInSession(kUsers[1], &reason); |
+ controller()->IsUserAllowedInSession(test_users_[1].GetUserEmail(), |
+ &reason); |
EXPECT_EQ(kBehaviorTestCases[i].expected_secondary_allowed, reason) |
<< "Case " << i; |
} |
@@ -326,11 +337,14 @@ TEST_F(MultiProfileUserControllerTest, |
UsedPolicyCertificatesAllowedForPrimary) { |
// Verifies that any user can sign-in as the primary user, regardless of the |
// tainted state. |
- policy::PolicyCertServiceFactory::SetUsedPolicyCertificates(kUsers[0]); |
+ policy::PolicyCertServiceFactory::SetUsedPolicyCertificates( |
+ test_users_[0].GetUserEmail()); |
MultiProfileUserController::UserAllowedInSessionReason reason; |
- EXPECT_TRUE(controller()->IsUserAllowedInSession(kUsers[0], &reason)); |
+ EXPECT_TRUE(controller()->IsUserAllowedInSession( |
+ test_users_[0].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::ALLOWED, reason); |
- EXPECT_TRUE(controller()->IsUserAllowedInSession(kUsers[1], &reason)); |
+ EXPECT_TRUE(controller()->IsUserAllowedInSession( |
+ test_users_[1].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::ALLOWED, reason); |
EXPECT_EQ(MultiProfileUserController::ALLOWED, |
MultiProfileUserController::GetPrimaryUserPolicy()); |
@@ -347,11 +361,14 @@ TEST_F(MultiProfileUserControllerTest, |
SetPrefBehavior(1, MultiProfileUserController::kBehaviorUnrestricted); |
MultiProfileUserController::UserAllowedInSessionReason reason; |
- EXPECT_TRUE(controller()->IsUserAllowedInSession(kUsers[0], &reason)); |
+ EXPECT_TRUE(controller()->IsUserAllowedInSession( |
+ test_users_[0].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::ALLOWED, reason); |
- policy::PolicyCertServiceFactory::SetUsedPolicyCertificates(kUsers[0]); |
- EXPECT_FALSE(controller()->IsUserAllowedInSession(kUsers[0], &reason)); |
+ policy::PolicyCertServiceFactory::SetUsedPolicyCertificates( |
+ test_users_[0].GetUserEmail()); |
+ EXPECT_FALSE(controller()->IsUserAllowedInSession( |
+ test_users_[0].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_POLICY_CERT_TAINTED, |
reason); |
} |
@@ -360,7 +377,8 @@ TEST_F(MultiProfileUserControllerTest, |
UsedPolicyCertificatesDisallowsSecondaries) { |
// Verifies that if a tainted user is signed-in then no other users can |
// be added. |
- policy::PolicyCertServiceFactory::SetUsedPolicyCertificates(kUsers[0]); |
+ policy::PolicyCertServiceFactory::SetUsedPolicyCertificates( |
+ test_users_[0].GetUserEmail()); |
LoginUser(0); |
cert_verifier_.reset(new policy::PolicyCertVerifier(base::Closure())); |
@@ -370,13 +388,16 @@ TEST_F(MultiProfileUserControllerTest, |
profile(0), TestPolicyCertServiceFactory)); |
MultiProfileUserController::UserAllowedInSessionReason reason; |
- EXPECT_FALSE(controller()->IsUserAllowedInSession(kUsers[1], &reason)); |
+ EXPECT_FALSE(controller()->IsUserAllowedInSession( |
+ test_users_[1].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_PRIMARY_POLICY_CERT_TAINTED, |
reason); |
EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_PRIMARY_POLICY_CERT_TAINTED, |
MultiProfileUserController::GetPrimaryUserPolicy()); |
- policy::PolicyCertServiceFactory::SetUsedPolicyCertificates(kUsers[1]); |
- EXPECT_FALSE(controller()->IsUserAllowedInSession(kUsers[1], &reason)); |
+ policy::PolicyCertServiceFactory::SetUsedPolicyCertificates( |
+ test_users_[1].GetUserEmail()); |
+ EXPECT_FALSE(controller()->IsUserAllowedInSession( |
+ test_users_[1].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_POLICY_CERT_TAINTED, |
reason); |
EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_PRIMARY_POLICY_CERT_TAINTED, |
@@ -407,7 +428,8 @@ TEST_F(MultiProfileUserControllerTest, |
EXPECT_FALSE(service->has_policy_certificates()); |
MultiProfileUserController::UserAllowedInSessionReason reason; |
- EXPECT_TRUE(controller()->IsUserAllowedInSession(kUsers[1], &reason)); |
+ EXPECT_TRUE(controller()->IsUserAllowedInSession( |
+ test_users_[1].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::ALLOWED, reason); |
EXPECT_EQ(MultiProfileUserController::ALLOWED, |
MultiProfileUserController::GetPrimaryUserPolicy()); |
@@ -417,7 +439,8 @@ TEST_F(MultiProfileUserControllerTest, |
"subject", "issuer", base::Time(), base::Time())); |
service->OnTrustAnchorsChanged(certificates); |
EXPECT_TRUE(service->has_policy_certificates()); |
- EXPECT_FALSE(controller()->IsUserAllowedInSession(kUsers[1], &reason)); |
+ EXPECT_FALSE(controller()->IsUserAllowedInSession( |
+ test_users_[1].GetUserEmail(), &reason)); |
EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_PRIMARY_POLICY_CERT_TAINTED, |
reason); |
EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_PRIMARY_POLICY_CERT_TAINTED, |