Index: chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
diff --git a/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc b/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
index b62bca779356d12add3af6a55841c0638ddb4bf4..afbdb9f97847494cacd839975ed5abd8c0764400 100644 |
--- a/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
+++ b/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
@@ -23,6 +23,7 @@ |
#include "net/cert/cert_trust_anchor_provider.h" |
#include "net/cert/x509_certificate.h" |
#include "net/test/cert_test_util.h" |
+#include "net/test/test_certificate_data.h" |
#include "policy/policy_constants.h" |
#include "testing/gmock/include/gmock/gmock.h" |
#include "testing/gtest/include/gtest/gtest.h" |
@@ -77,6 +78,11 @@ ACTION_P(SetCertificateList, list) { |
return true; |
} |
+ACTION_P(SetImportedCerts, map) { |
+ *arg3 = map; |
+ return true; |
+} |
+ |
} // namespace |
// Tests of NetworkConfigurationUpdaterImplCros |
@@ -175,7 +181,7 @@ TEST_F(NetworkConfigurationUpdaterTest, PolicyIsValidatedAndRepaired) { |
EXPECT_CALL(network_library_, LoadOncNetworks(_, _)); |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)); |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -191,7 +197,18 @@ TEST_F(NetworkConfigurationUpdaterTest, PolicyIsValidatedAndRepaired) { |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(network_configs_repaired), |
onc::ONC_SOURCE_USER_POLICY)); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)).Times(2); |
+ EXPECT_CALL(*certificate_handler, |
+ ImportCertificates(_, chromeos::onc::ONC_SOURCE_DEVICE_POLICY, |
+ _, _)); |
+ scoped_refptr<net::X509Certificate> google_cert( |
+ net::X509Certificate::CreateFromBytes( |
+ reinterpret_cast<const char*>(google_der), sizeof(google_der))); |
+ chromeos::CertificateHandler::CertsByGUID imported_certs; |
+ imported_certs["test-ca"] = google_cert; |
+ EXPECT_CALL(*certificate_handler, |
+ ImportCertificates(_, chromeos::onc::ONC_SOURCE_USER_POLICY, |
+ _, _)) |
+ .WillOnce(SetImportedCerts(imported_certs)); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |
@@ -235,7 +252,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, InitialUpdates) { |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _)); |
+ IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _, _)); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -249,12 +266,12 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, InitialUpdates) { |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(device_networks), onc::ONC_SOURCE_DEVICE_POLICY)); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _)); |
+ IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _, _)); |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(user_networks), onc::ONC_SOURCE_USER_POLICY)); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(user_certs), onc::ONC_SOURCE_USER_POLICY, _)); |
+ IsEqualTo(user_certs), onc::ONC_SOURCE_USER_POLICY, _, _)); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |
@@ -279,7 +296,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, |
EXPECT_CALL(network_library_, LoadOncNetworks(_, _)).Times(AnyNumber()); |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)) |
.WillRepeatedly(SetCertificateList(empty_cert_list)); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -302,11 +319,11 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, |
// Certificates with the "Web" trust flag set should be forwarded to the |
// trust provider. |
EXPECT_CALL(network_library_, LoadOncNetworks(_, _)); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)) |
.WillRepeatedly(SetCertificateList(empty_cert_list)); |
onc::ONCSource current_source = NameToONCSource(GetParam()); |
EXPECT_CALL(network_library_, LoadOncNetworks(_, current_source)); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, current_source, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, current_source, _, _)) |
.WillRepeatedly(SetCertificateList(cert_list)); |
// Trigger a new policy load, and spin the IO message loop to pass the |
// certificates to the |trust_provider| on the IO thread. |
@@ -336,7 +353,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
.Times(AnyNumber()); |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)) |
.Times(AnyNumber()); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -350,7 +367,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(fake_network_configs_.get()), NameToONCSource(GetParam()))); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(fake_certificates_.get()), NameToONCSource(GetParam()), _)); |
+ IsEqualTo(fake_certificates_.get()), NameToONCSource(GetParam()), _, _)); |
// In the current implementation, we always apply both policies. |
EXPECT_CALL(network_library_, LoadOncNetworks( |
@@ -359,7 +376,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
IsEqualTo(empty_certificates_.get()), |
Ne(NameToONCSource(GetParam())), |
- _)); |
+ _, _)); |
PolicyMap policy; |
policy.Set(GetParam(), POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
@@ -376,7 +393,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
IsEqualTo(empty_certificates_.get()), |
onc::ONC_SOURCE_DEVICE_POLICY, |
- _)); |
+ _, _)); |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(empty_network_configs_.get()), |
@@ -384,7 +401,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
IsEqualTo(empty_certificates_.get()), |
onc::ONC_SOURCE_USER_POLICY, |
- _)); |
+ _, _)); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |