| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/ui/passwords/manage_passwords_ui_controller_mock.h" | 5 #include "chrome/browser/ui/passwords/manage_passwords_ui_controller_mock.h" |
| 6 | 6 |
| 7 #include "components/password_manager/core/browser/dummy_log_manager.h" |
| 7 #include "components/password_manager/core/browser/password_form_manager.h" | 8 #include "components/password_manager/core/browser/password_form_manager.h" |
| 8 #include "components/password_manager/core/browser/password_manager.h" | 9 #include "components/password_manager/core/browser/password_manager.h" |
| 9 #include "components/password_manager/core/browser/stub_password_manager_client.
h" | 10 #include "components/password_manager/core/browser/stub_password_manager_client.
h" |
| 10 #include "components/password_manager/core/browser/stub_password_manager_driver.
h" | |
| 11 #include "components/password_manager/core/common/credential_manager_types.h" | 11 #include "components/password_manager/core/common/credential_manager_types.h" |
| 12 #include "content/public/browser/web_contents.h" | 12 #include "content/public/browser/web_contents.h" |
| 13 #include "testing/gmock/include/gmock/gmock.h" | 13 #include "testing/gmock/include/gmock/gmock.h" |
| 14 #include "testing/gtest/include/gtest/gtest.h" | 14 #include "testing/gtest/include/gtest/gtest.h" |
| 15 | 15 |
| 16 namespace { | 16 namespace { |
| 17 | 17 |
| 18 class MockPasswordManagerDriver | 18 class MockPasswordManagerDriver |
| 19 : public password_manager::StubPasswordManagerDriver { | 19 : public password_manager::StubPasswordManagerDriver { |
| 20 public: | 20 public: |
| 21 MOCK_METHOD0(GetPasswordManager, password_manager::PasswordManager*()); | 21 MOCK_METHOD0(GetPasswordManager, password_manager::PasswordManager*()); |
| 22 }; | 22 }; |
| 23 | 23 |
| 24 class MockPasswordManagerClient | 24 class MockPasswordManagerClient |
| 25 : public password_manager::StubPasswordManagerClient { | 25 : public password_manager::StubPasswordManagerClient { |
| 26 public: | 26 public: |
| 27 MOCK_CONST_METHOD0(GetPasswordManager, | 27 MockPasswordManagerClient() = default; |
| 28 const password_manager::PasswordManager*()); | 28 ~MockPasswordManagerClient() override = default; |
| 29 |
| 30 MOCK_CONST_METHOD0(GetLogManager, const password_manager::LogManager*()); |
| 31 |
| 32 private: |
| 33 DISALLOW_COPY_AND_ASSIGN(MockPasswordManagerClient); |
| 29 }; | 34 }; |
| 30 | 35 |
| 31 } // namespace | 36 } // namespace |
| 32 | 37 |
| 33 ManagePasswordsUIControllerMock::ManagePasswordsUIControllerMock( | 38 ManagePasswordsUIControllerMock::ManagePasswordsUIControllerMock( |
| 34 content::WebContents* contents) | 39 content::WebContents* contents) |
| 35 : ManagePasswordsUIController(contents), | 40 : ManagePasswordsUIController(contents), |
| 36 navigated_to_settings_page_(false), | 41 navigated_to_settings_page_(false), |
| 37 saved_password_(false), | 42 saved_password_(false), |
| 38 updated_password_(false), | 43 updated_password_(false), |
| 39 never_saved_password_(false), | 44 never_saved_password_(false), |
| 40 choose_credential_(false), | 45 choose_credential_(false), |
| 41 state_overridden_(false), | 46 state_overridden_(false), |
| 42 state_(password_manager::ui::INACTIVE_STATE) { | 47 state_(password_manager::ui::INACTIVE_STATE) { |
| 43 // Do not silently replace an existing ManagePasswordsUIController because it | 48 // Do not silently replace an existing ManagePasswordsUIController because it |
| 44 // unregisters itself in WebContentsDestroyed(). | 49 // unregisters itself in WebContentsDestroyed(). |
| 45 EXPECT_FALSE(contents->GetUserData(UserDataKey())); | 50 EXPECT_FALSE(contents->GetUserData(UserDataKey())); |
| 46 contents->SetUserData(UserDataKey(), this); | 51 contents->SetUserData(UserDataKey(), this); |
| 47 scoped_ptr<MockPasswordManagerClient> mock_client( | 52 scoped_ptr<MockPasswordManagerClient> mock_client( |
| 48 new MockPasswordManagerClient()); | 53 new MockPasswordManagerClient()); |
| 49 scoped_ptr<MockPasswordManagerDriver> mock_driver( | |
| 50 new MockPasswordManagerDriver()); | |
| 51 password_manager_.reset( | 54 password_manager_.reset( |
| 52 new password_manager::PasswordManager(mock_client.get())); | 55 new password_manager::PasswordManager(mock_client.get())); |
| 53 ON_CALL(*mock_driver, GetPasswordManager()) | 56 ON_CALL(*mock_client, GetLogManager()) |
| 54 .WillByDefault(testing::Return(password_manager_.get())); | 57 .WillByDefault(testing::Return(&log_manager_)); |
| 55 ON_CALL(*mock_client, GetPasswordManager()) | |
| 56 .WillByDefault(testing::Return(password_manager_.get())); | |
| 57 client_ = mock_client.Pass(); | 58 client_ = mock_client.Pass(); |
| 58 driver_ = mock_driver.Pass(); | |
| 59 set_client(client_.get()); | 59 set_client(client_.get()); |
| 60 } | 60 } |
| 61 | 61 |
| 62 ManagePasswordsUIControllerMock:: | 62 ManagePasswordsUIControllerMock:: |
| 63 ~ManagePasswordsUIControllerMock() {} | 63 ~ManagePasswordsUIControllerMock() {} |
| 64 | 64 |
| 65 void ManagePasswordsUIControllerMock:: | 65 void ManagePasswordsUIControllerMock:: |
| 66 NavigateToPasswordManagerSettingsPage() { | 66 NavigateToPasswordManagerSettingsPage() { |
| 67 navigated_to_settings_page_ = true; | 67 navigated_to_settings_page_ = true; |
| 68 } | 68 } |
| (...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 119 choose_credential_ = true; | 119 choose_credential_ = true; |
| 120 chosen_credential_ = form; | 120 chosen_credential_ = form; |
| 121 } | 121 } |
| 122 | 122 |
| 123 void ManagePasswordsUIControllerMock::PretendSubmittedPassword( | 123 void ManagePasswordsUIControllerMock::PretendSubmittedPassword( |
| 124 ScopedVector<autofill::PasswordForm> best_matches) { | 124 ScopedVector<autofill::PasswordForm> best_matches) { |
| 125 ASSERT_FALSE(best_matches.empty()); | 125 ASSERT_FALSE(best_matches.empty()); |
| 126 autofill::PasswordForm observed_form = *best_matches[0]; | 126 autofill::PasswordForm observed_form = *best_matches[0]; |
| 127 scoped_ptr<password_manager::PasswordFormManager> form_manager( | 127 scoped_ptr<password_manager::PasswordFormManager> form_manager( |
| 128 new password_manager::PasswordFormManager( | 128 new password_manager::PasswordFormManager( |
| 129 password_manager_.get(), client_.get(), driver_->AsWeakPtr(), | 129 password_manager_.get(), client_.get(), driver_.AsWeakPtr(), |
| 130 observed_form, true)); | 130 observed_form, true)); |
| 131 form_manager->SimulateFetchMatchingLoginsFromPasswordStore(); | 131 form_manager->SimulateFetchMatchingLoginsFromPasswordStore(); |
| 132 form_manager->OnGetPasswordStoreResults(best_matches.Pass()); | 132 form_manager->OnGetPasswordStoreResults(best_matches.Pass()); |
| 133 OnPasswordSubmitted(form_manager.Pass()); | 133 OnPasswordSubmitted(form_manager.Pass()); |
| 134 } | 134 } |
| OLD | NEW |