Index: chrome/browser/signin/easy_unlock_auth_attempt_unittest.cc |
diff --git a/chrome/browser/signin/easy_unlock_auth_attempt_unittest.cc b/chrome/browser/signin/easy_unlock_auth_attempt_unittest.cc |
index a8b49fd23bb87d1a25b851068c16b0b0a170da3e..0f4b6ffe87a6e6c2b346bfa73a3280df141191e4 100644 |
--- a/chrome/browser/signin/easy_unlock_auth_attempt_unittest.cc |
+++ b/chrome/browser/signin/easy_unlock_auth_attempt_unittest.cc |
@@ -113,18 +113,14 @@ class TestLockHandler : public proximity_auth::ScreenlockBridge::LockHandler { |
STATE_SIGNIN_DONE |
}; |
- explicit TestLockHandler(const std::string& user_id) |
- : state_(STATE_NONE), auth_type_(USER_CLICK), user_id_(user_id) {} |
+ explicit TestLockHandler(const AccountId& account_id) |
+ : state_(STATE_NONE), auth_type_(USER_CLICK), account_id_(account_id) {} |
~TestLockHandler() override {} |
void set_state(AuthState value) { state_ = value; } |
AuthState state() const { return state_; } |
- // Changes the user associated with the lock handler. |
- // Caller should make sure that |state_| is also appropriately updated. |
- void set_user_id(const std::string& value) { user_id_ = value; } |
- |
// Sets the secret that is expected to be sent to |AttemptEasySignin| |
void set_expected_secret(const std::string& value) { |
expected_secret_ = value; |
@@ -139,13 +135,13 @@ class TestLockHandler : public proximity_auth::ScreenlockBridge::LockHandler { |
} |
void ShowUserPodCustomIcon( |
- const std::string& user_email, |
+ const AccountId& account_id, |
const proximity_auth::ScreenlockBridge::UserPodCustomIconOptions& icon) |
override { |
ADD_FAILURE() << "Should not be reached."; |
} |
- void HideUserPodCustomIcon(const std::string& user_email) override { |
+ void HideUserPodCustomIcon(const AccountId& account_id) override { |
ADD_FAILURE() << "Should not be reached."; |
} |
@@ -154,13 +150,13 @@ class TestLockHandler : public proximity_auth::ScreenlockBridge::LockHandler { |
state_ = STATE_UNLOCK_CANCELED; |
} |
- void SetAuthType(const std::string& user_email, |
+ void SetAuthType(const AccountId& account_id, |
AuthType auth_type, |
const base::string16& auth_value) override { |
ADD_FAILURE() << "Should not be reached."; |
} |
- AuthType GetAuthType(const std::string& user_email) const override { |
+ AuthType GetAuthType(const AccountId& account_id) const override { |
return auth_type_; |
} |
@@ -169,17 +165,21 @@ class TestLockHandler : public proximity_auth::ScreenlockBridge::LockHandler { |
return LOCK_SCREEN; |
} |
- void Unlock(const std::string& user_email) override { |
- ASSERT_EQ(user_id_, user_email); |
+ void Unlock(const AccountId& account_id) override { |
+ ASSERT_TRUE(account_id_ == account_id) |
+ << "account_id_=" << account_id_.Serialize() |
+ << " != " << account_id.Serialize(); |
ASSERT_EQ(STATE_ATTEMPTING_UNLOCK, state_); |
state_ = STATE_UNLOCK_DONE; |
} |
- void AttemptEasySignin(const std::string& user_email, |
+ void AttemptEasySignin(const AccountId& account_id, |
const std::string& secret, |
const std::string& key_label) override { |
#if defined(OS_CHROMEOS) |
- ASSERT_EQ(user_id_, user_email); |
+ ASSERT_TRUE(account_id_ == account_id) |
+ << "account_id_=" << account_id_.Serialize() |
+ << " != " << account_id.Serialize(); |
ASSERT_EQ(STATE_ATTEMPTING_SIGNIN, state_); |
if (secret.empty()) { |
@@ -197,7 +197,7 @@ class TestLockHandler : public proximity_auth::ScreenlockBridge::LockHandler { |
private: |
AuthState state_; |
AuthType auth_type_; |
- std::string user_id_; |
+ const AccountId account_id_; |
std::string expected_secret_; |
DISALLOW_COPY_AND_ASSIGN(TestLockHandler); |
@@ -210,9 +210,10 @@ class EasyUnlockAuthAttemptUnlockTest : public testing::Test { |
void SetUp() override { |
app_manager_.reset(new FakeAppManager()); |
- auth_attempt_.reset(new EasyUnlockAuthAttempt( |
- app_manager_.get(), kTestUser1, EasyUnlockAuthAttempt::TYPE_UNLOCK, |
- EasyUnlockAuthAttempt::FinalizedCallback())); |
+ auth_attempt_.reset( |
+ new EasyUnlockAuthAttempt(app_manager_.get(), test_account_id1_, |
+ EasyUnlockAuthAttempt::TYPE_UNLOCK, |
+ EasyUnlockAuthAttempt::FinalizedCallback())); |
} |
void TearDown() override { |
@@ -222,7 +223,7 @@ class EasyUnlockAuthAttemptUnlockTest : public testing::Test { |
protected: |
void InitScreenLock() { |
- lock_handler_.reset(new TestLockHandler(kTestUser1)); |
+ lock_handler_.reset(new TestLockHandler(test_account_id1_)); |
lock_handler_->set_state(TestLockHandler::STATE_ATTEMPTING_UNLOCK); |
proximity_auth::ScreenlockBridge::Get()->SetLockHandler( |
lock_handler_.get()); |
@@ -232,6 +233,9 @@ class EasyUnlockAuthAttemptUnlockTest : public testing::Test { |
scoped_ptr<FakeAppManager> app_manager_; |
scoped_ptr<TestLockHandler> lock_handler_; |
+ const AccountId test_account_id1_ = AccountId::FromUserEmail(kTestUser1); |
+ const AccountId test_account_id2_ = AccountId::FromUserEmail(kTestUser2); |
+ |
private: |
DISALLOW_COPY_AND_ASSIGN(EasyUnlockAuthAttemptUnlockTest); |
}; |
@@ -296,7 +300,7 @@ TEST_F(EasyUnlockAuthAttemptUnlockTest, FinalizeUnlockFailure) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_UNLOCK, lock_handler_->state()); |
- auth_attempt_->FinalizeUnlock(kTestUser1, false); |
+ auth_attempt_->FinalizeUnlock(test_account_id1_, false); |
EXPECT_EQ(TestLockHandler::STATE_UNLOCK_CANCELED, lock_handler_->state()); |
} |
@@ -312,7 +316,7 @@ TEST_F(EasyUnlockAuthAttemptUnlockTest, FinalizeSigninCalled) { |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_UNLOCK, lock_handler_->state()); |
// Wrapped secret and key should be irrelevant in this case. |
- auth_attempt_->FinalizeSignin(kTestUser1, GetWrappedSecret(), |
+ auth_attempt_->FinalizeSignin(test_account_id1_, GetWrappedSecret(), |
GetSessionKey()); |
EXPECT_EQ(TestLockHandler::STATE_UNLOCK_CANCELED, lock_handler_->state()); |
@@ -328,7 +332,7 @@ TEST_F(EasyUnlockAuthAttemptUnlockTest, UnlockSucceeds) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_UNLOCK, lock_handler_->state()); |
- auth_attempt_->FinalizeUnlock(kTestUser1, true); |
+ auth_attempt_->FinalizeUnlock(test_account_id1_, true); |
ASSERT_EQ(TestLockHandler::STATE_UNLOCK_DONE, lock_handler_->state()); |
} |
@@ -343,7 +347,7 @@ TEST_F(EasyUnlockAuthAttemptUnlockTest, FinalizeUnlockCalledForWrongUser) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_UNLOCK, lock_handler_->state()); |
- auth_attempt_->FinalizeUnlock(kTestUser2, true); |
+ auth_attempt_->FinalizeUnlock(test_account_id2_, true); |
// If FinalizeUnlock is called for an incorrect user, it should be ignored |
// rather than cancelling the authentication. |
@@ -351,7 +355,7 @@ TEST_F(EasyUnlockAuthAttemptUnlockTest, FinalizeUnlockCalledForWrongUser) { |
// When FinalizeUnlock is called for the correct user, it should work as |
// expected. |
- auth_attempt_->FinalizeUnlock(kTestUser1, true); |
+ auth_attempt_->FinalizeUnlock(test_account_id1_, true); |
ASSERT_EQ(TestLockHandler::STATE_UNLOCK_DONE, lock_handler_->state()); |
} |
@@ -364,9 +368,10 @@ class EasyUnlockAuthAttemptSigninTest : public testing::Test { |
void SetUp() override { |
app_manager_.reset(new FakeAppManager()); |
- auth_attempt_.reset(new EasyUnlockAuthAttempt( |
- app_manager_.get(), kTestUser1, EasyUnlockAuthAttempt::TYPE_SIGNIN, |
- EasyUnlockAuthAttempt::FinalizedCallback())); |
+ auth_attempt_.reset( |
+ new EasyUnlockAuthAttempt(app_manager_.get(), test_account_id1_, |
+ EasyUnlockAuthAttempt::TYPE_SIGNIN, |
+ EasyUnlockAuthAttempt::FinalizedCallback())); |
} |
void TearDown() override { |
@@ -376,7 +381,7 @@ class EasyUnlockAuthAttemptSigninTest : public testing::Test { |
protected: |
void InitScreenLock() { |
- lock_handler_.reset(new TestLockHandler(kTestUser1)); |
+ lock_handler_.reset(new TestLockHandler(test_account_id1_)); |
lock_handler_->set_state(TestLockHandler::STATE_ATTEMPTING_SIGNIN); |
proximity_auth::ScreenlockBridge::Get()->SetLockHandler( |
lock_handler_.get()); |
@@ -386,6 +391,9 @@ class EasyUnlockAuthAttemptSigninTest : public testing::Test { |
scoped_ptr<FakeAppManager> app_manager_; |
scoped_ptr<TestLockHandler> lock_handler_; |
+ const AccountId test_account_id1_ = AccountId::FromUserEmail(kTestUser1); |
+ const AccountId test_account_id2_ = AccountId::FromUserEmail(kTestUser2); |
+ |
private: |
DISALLOW_COPY_AND_ASSIGN(EasyUnlockAuthAttemptSigninTest); |
}; |
@@ -450,7 +458,7 @@ TEST_F(EasyUnlockAuthAttemptSigninTest, FinalizeSigninWithEmtpySecret) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_SIGNIN, lock_handler_->state()); |
- auth_attempt_->FinalizeSignin(kTestUser1, "", GetSessionKey()); |
+ auth_attempt_->FinalizeSignin(test_account_id1_, "", GetSessionKey()); |
EXPECT_EQ(TestLockHandler::STATE_SIGNIN_CANCELED, lock_handler_->state()); |
} |
@@ -465,7 +473,7 @@ TEST_F(EasyUnlockAuthAttemptSigninTest, FinalizeSigninWithEmtpyKey) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_SIGNIN, lock_handler_->state()); |
- auth_attempt_->FinalizeSignin(kTestUser1, GetWrappedSecret(), ""); |
+ auth_attempt_->FinalizeSignin(test_account_id1_, GetWrappedSecret(), ""); |
EXPECT_EQ(TestLockHandler::STATE_SIGNIN_CANCELED, lock_handler_->state()); |
} |
@@ -481,7 +489,7 @@ TEST_F(EasyUnlockAuthAttemptSigninTest, SigninSuccess) { |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_SIGNIN, lock_handler_->state()); |
lock_handler_->set_expected_secret(GetSecret()); |
- auth_attempt_->FinalizeSignin(kTestUser1, GetWrappedSecret(), |
+ auth_attempt_->FinalizeSignin(test_account_id1_, GetWrappedSecret(), |
GetSessionKey()); |
EXPECT_EQ(TestLockHandler::STATE_SIGNIN_DONE, lock_handler_->state()); |
@@ -497,7 +505,8 @@ TEST_F(EasyUnlockAuthAttemptSigninTest, WrongWrappedSecret) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_SIGNIN, lock_handler_->state()); |
- auth_attempt_->FinalizeSignin(kTestUser1, "wrong_secret", GetSessionKey()); |
+ auth_attempt_->FinalizeSignin(test_account_id1_, "wrong_secret", |
+ GetSessionKey()); |
EXPECT_EQ(TestLockHandler::STATE_SIGNIN_CANCELED, lock_handler_->state()); |
} |
@@ -512,7 +521,8 @@ TEST_F(EasyUnlockAuthAttemptSigninTest, InvalidSessionKey) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_SIGNIN, lock_handler_->state()); |
- auth_attempt_->FinalizeSignin(kTestUser1, GetWrappedSecret(), "invalid_key"); |
+ auth_attempt_->FinalizeSignin(test_account_id1_, GetWrappedSecret(), |
+ "invalid_key"); |
EXPECT_EQ(TestLockHandler::STATE_SIGNIN_CANCELED, lock_handler_->state()); |
} |
@@ -527,7 +537,7 @@ TEST_F(EasyUnlockAuthAttemptSigninTest, FinalizeUnlockCalled) { |
ASSERT_EQ(1u, app_manager_->auth_attempt_count()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_SIGNIN, lock_handler_->state()); |
- auth_attempt_->FinalizeUnlock(kTestUser1, true); |
+ auth_attempt_->FinalizeUnlock(test_account_id1_, true); |
EXPECT_EQ(TestLockHandler::STATE_SIGNIN_CANCELED, lock_handler_->state()); |
} |
@@ -544,12 +554,12 @@ TEST_F(EasyUnlockAuthAttemptSigninTest, FinalizeSigninCalledForWrongUser) { |
lock_handler_->set_expected_secret(GetSecret()); |
- auth_attempt_->FinalizeSignin(kTestUser2, GetWrappedSecret(), |
+ auth_attempt_->FinalizeSignin(test_account_id2_, GetWrappedSecret(), |
GetSessionKey()); |
EXPECT_EQ(TestLockHandler::STATE_ATTEMPTING_SIGNIN, lock_handler_->state()); |
- auth_attempt_->FinalizeSignin(kTestUser1, GetWrappedSecret(), |
+ auth_attempt_->FinalizeSignin(test_account_id1_, GetWrappedSecret(), |
GetSessionKey()); |
EXPECT_EQ(TestLockHandler::STATE_SIGNIN_DONE, lock_handler_->state()); |