| Index: chrome/browser/chromeos/cros/network_library_unittest.cc
|
| diff --git a/chrome/browser/chromeos/cros/network_library_unittest.cc b/chrome/browser/chromeos/cros/network_library_unittest.cc
|
| index d601637f5440a5123c836cbb4870c4f3d436129c..c13d9e2bfe48d81ec64a11277b90eae59af02c0e 100644
|
| --- a/chrome/browser/chromeos/cros/network_library_unittest.cc
|
| +++ b/chrome/browser/chromeos/cros/network_library_unittest.cc
|
| @@ -154,13 +154,15 @@ class NetworkLibraryStubTest : public ::testing::Test {
|
| std::string shill_json,
|
| onc::ONCSource source,
|
| bool expect_successful_import) {
|
| - MockUserManager* mock_user_manager = new MockUserManager;
|
| + MockUserManager* mock_user_manager =
|
| + new ::testing::StrictMock<MockUserManager>;
|
| // Takes ownership of |mock_user_manager|.
|
| ScopedUserManagerEnabler user_manager_enabler(mock_user_manager);
|
| mock_user_manager->SetActiveUser("madmax@my.domain.com");
|
| EXPECT_CALL(*mock_user_manager, IsUserLoggedIn())
|
| .Times(AnyNumber())
|
| .WillRepeatedly(Return(true));
|
| + EXPECT_CALL(*mock_user_manager, Shutdown());
|
|
|
| scoped_ptr<base::DictionaryValue> onc_blob =
|
| onc::test_utils::ReadTestDictionary(onc_file);
|
| @@ -175,7 +177,8 @@ class NetworkLibraryStubTest : public ::testing::Test {
|
| base::DictionaryValue* expected_configs;
|
| expected_value->GetAsDictionary(&expected_configs);
|
|
|
| - cros_->LoadOncNetworks(*onc_network_configs, source);
|
| + cros_->LoadOncNetworks(*onc_network_configs, source,
|
| + base::Bind(&onc::test_utils::FakeFingerprintToPEM));
|
|
|
| const std::map<std::string, base::DictionaryValue*>& configs =
|
| cros_->GetConfigurations();
|
| @@ -289,14 +292,14 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectWifi) {
|
|
|
| TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) {
|
| scoped_ptr<base::DictionaryValue> onc_root =
|
| - onc::test_utils::ReadTestDictionary("toplevel_wifi_eap_clientcert.onc");
|
| + onc::test_utils::ReadTestDictionary("certificate-client.onc");
|
| base::ListValue* certificates;
|
| onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates,
|
| &certificates);
|
|
|
| onc::CertificateImporter importer(true /* allow trust imports */);
|
| ASSERT_EQ(onc::CertificateImporter::IMPORT_OK,
|
| - importer.ParseAndStoreCertificates(*certificates, NULL));
|
| + importer.ParseAndStoreCertificates(*certificates, NULL, NULL));
|
|
|
| WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern");
|
|
|
| @@ -318,14 +321,14 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) {
|
|
|
| TEST_F(NetworkLibraryStubTest, NetworkConnectVPNWithCertPattern) {
|
| scoped_ptr<base::DictionaryValue> onc_root =
|
| - onc::test_utils::ReadTestDictionary("toplevel_openvpn_clientcert.onc");
|
| + onc::test_utils::ReadTestDictionary("certificate-client.onc");
|
| base::ListValue* certificates;
|
| onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates,
|
| &certificates);
|
|
|
| onc::CertificateImporter importer(true /* allow trust imports */);
|
| ASSERT_EQ(onc::CertificateImporter::IMPORT_OK,
|
| - importer.ParseAndStoreCertificates(*certificates, NULL));
|
| + importer.ParseAndStoreCertificates(*certificates, NULL, NULL));
|
|
|
| VirtualNetwork* vpn = cros_->FindVirtualNetworkByPath("vpn_cert_pattern");
|
|
|
| @@ -407,7 +410,7 @@ INSTANTIATE_TEST_CASE_P(
|
| ImportParams("managed_toplevel1.onc",
|
| "chromeos/net/shill_for_managed_toplevel1.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| - ImportParams("managed_toplevel2.onc",
|
| + ImportParams("managed_toplevel2_with_cert_fingerprints.onc",
|
| "chromeos/net/shill_for_managed_toplevel2.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| ImportParams("managed_toplevel_l2tpipsec.onc",
|
| @@ -429,10 +432,10 @@ INSTANTIATE_TEST_CASE_P(
|
| "chromeos/net/shill_for_toplevel_wifi_leap.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| ImportParams(
|
| - "toplevel_wifi_eap_clientcert.onc",
|
| + "toplevel_wifi_eap_clientcert_with_cert_fingerprints.onc",
|
| "chromeos/net/shill_for_toplevel_wifi_eap_clientcert.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| - ImportParams("toplevel_openvpn_clientcert.onc",
|
| + ImportParams("toplevel_openvpn_clientcert_with_cert_fingerprints.onc",
|
| "chromeos/net/shill_for_toplevel_openvpn_clientcert.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| ImportParams("toplevel_wifi_remove.onc",
|
|
|