OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/signin/signin_manager.h" | 5 #include "chrome/browser/signin/signin_manager.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
9 #include "base/compiler_specific.h" | 9 #include "base/compiler_specific.h" |
10 #include "base/prefs/pref_service.h" | 10 #include "base/prefs/pref_service.h" |
11 #include "base/prefs/testing_pref_service.h" | 11 #include "base/prefs/testing_pref_service.h" |
| 12 #include "base/run_loop.h" |
12 #include "base/strings/stringprintf.h" | 13 #include "base/strings/stringprintf.h" |
13 #include "chrome/browser/browser_process.h" | 14 #include "chrome/browser/browser_process.h" |
14 #include "chrome/browser/chrome_notification_types.h" | 15 #include "chrome/browser/chrome_notification_types.h" |
15 #include "chrome/browser/prefs/browser_prefs.h" | 16 #include "chrome/browser/prefs/browser_prefs.h" |
16 #include "chrome/browser/signin/chrome_signin_manager_delegate.h" | 17 #include "chrome/browser/signin/chrome_signin_manager_delegate.h" |
17 #include "chrome/browser/signin/token_service.h" | 18 #include "chrome/browser/signin/token_service.h" |
18 #include "chrome/browser/signin/token_service_unittest.h" | 19 #include "chrome/browser/signin/token_service_unittest.h" |
19 #include "chrome/common/pref_names.h" | 20 #include "chrome/common/pref_names.h" |
20 #include "chrome/common/url_constants.h" | 21 #include "chrome/common/url_constants.h" |
21 #include "chrome/test/base/testing_browser_process.h" | 22 #include "chrome/test/base/testing_browser_process.h" |
22 #include "chrome/test/base/testing_profile.h" | 23 #include "chrome/test/base/testing_profile.h" |
23 #include "components/webdata/encryptor/encryptor.h" | 24 #include "components/webdata/encryptor/encryptor.h" |
24 #include "content/public/browser/child_process_security_policy.h" | 25 #include "content/public/browser/child_process_security_policy.h" |
25 #include "content/public/test/test_browser_thread.h" | 26 #include "content/public/test/test_browser_thread_bundle.h" |
26 #include "google_apis/gaia/gaia_constants.h" | 27 #include "google_apis/gaia/gaia_constants.h" |
27 #include "google_apis/gaia/gaia_urls.h" | 28 #include "google_apis/gaia/gaia_urls.h" |
28 #include "net/cookies/cookie_monster.h" | 29 #include "net/cookies/cookie_monster.h" |
29 #include "net/url_request/test_url_fetcher_factory.h" | 30 #include "net/url_request/test_url_fetcher_factory.h" |
30 #include "net/url_request/url_request.h" | 31 #include "net/url_request/url_request.h" |
31 #include "net/url_request/url_request_context_getter.h" | 32 #include "net/url_request/url_request_context_getter.h" |
32 #include "net/url_request/url_request_status.h" | 33 #include "net/url_request/url_request_status.h" |
33 | 34 |
34 #include "testing/gmock/include/gmock/gmock.h" | 35 #include "testing/gmock/include/gmock/gmock.h" |
35 #include "testing/gtest/include/gtest/gtest.h" | 36 #include "testing/gtest/include/gtest/gtest.h" |
36 | 37 |
37 using content::BrowserThread; | |
38 | |
39 namespace { | 38 namespace { |
40 | 39 |
41 const char kGetTokenPairValidResponse[] = | 40 const char kGetTokenPairValidResponse[] = |
42 "{" | 41 "{" |
43 " \"refresh_token\": \"rt1\"," | 42 " \"refresh_token\": \"rt1\"," |
44 " \"access_token\": \"at1\"," | 43 " \"access_token\": \"at1\"," |
45 " \"expires_in\": 3600," | 44 " \"expires_in\": 3600," |
46 " \"token_type\": \"Bearer\"" | 45 " \"token_type\": \"Bearer\"" |
47 "}"; | 46 "}"; |
48 | 47 |
49 const char kUberAuthTokenURLFormat[] = "%s?source=%s&issueuberauth=1"; | 48 const char kUberAuthTokenURLFormat[] = "%s?source=%s&issueuberauth=1"; |
50 | 49 |
51 } // namespace | 50 } // namespace |
52 | 51 |
53 | 52 |
54 class SigninManagerTest : public TokenServiceTestHarness { | 53 class SigninManagerTest : public TokenServiceTestHarness { |
55 public: | 54 public: |
56 void SetUpOnIOThread(base::WaitableEvent* io_setup_complete) { | |
57 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
58 // This is a workaround for a bug in the TestingProfile. | |
59 // The URLRequestContext will be created by GetCookieMonster on the UI | |
60 // thread, if it does not already exist. But it must be created on the IO | |
61 // thread or else it will DCHECK upon destruction. | |
62 // Force it to be created here. | |
63 profile_->CreateRequestContext(); | |
64 profile_->GetRequestContext()->GetURLRequestContext(); | |
65 io_setup_complete->Signal(); | |
66 } | |
67 | |
68 virtual void SetUp() OVERRIDE { | 55 virtual void SetUp() OVERRIDE { |
69 prefs_.reset(new TestingPrefServiceSimple); | 56 prefs_.reset(new TestingPrefServiceSimple); |
70 chrome::RegisterLocalState(prefs_->registry()); | 57 chrome::RegisterLocalState(prefs_->registry()); |
71 TestingBrowserProcess::GetGlobal()->SetLocalState( | 58 TestingBrowserProcess::GetGlobal()->SetLocalState( |
72 prefs_.get()); | 59 prefs_.get()); |
73 TokenServiceTestHarness::SetUp(); | 60 TokenServiceTestHarness::SetUp(); |
74 manager_.reset(new SigninManager( | 61 manager_.reset(new SigninManager( |
75 scoped_ptr<SigninManagerDelegate>( | 62 scoped_ptr<SigninManagerDelegate>( |
76 new ChromeSigninManagerDelegate(profile_.get())))); | 63 new ChromeSigninManagerDelegate(profile())))); |
77 google_login_success_.ListenFor( | 64 google_login_success_.ListenFor( |
78 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, | 65 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, |
79 content::Source<Profile>(profile_.get())); | 66 content::Source<Profile>(profile())); |
80 google_login_failure_.ListenFor(chrome::NOTIFICATION_GOOGLE_SIGNIN_FAILED, | 67 google_login_failure_.ListenFor(chrome::NOTIFICATION_GOOGLE_SIGNIN_FAILED, |
81 content::Source<Profile>(profile_.get())); | 68 content::Source<Profile>(profile())); |
82 | |
83 io_thread_.reset(new content::TestBrowserThread(BrowserThread::IO)); | |
84 ASSERT_TRUE(io_thread_->Start()); | |
85 base::WaitableEvent io_setup_complete(true, false); | |
86 BrowserThread::PostTask( | |
87 BrowserThread::IO, FROM_HERE, | |
88 base::Bind(&SigninManagerTest::SetUpOnIOThread, | |
89 base::Unretained(this), &io_setup_complete)); | |
90 io_setup_complete.Wait(); | |
91 } | 69 } |
92 | 70 |
93 virtual void TearDown() OVERRIDE { | 71 virtual void TearDown() OVERRIDE { |
94 // Destroy the SigninManager here, because it relies on profile_ which is | 72 // Destroy the SigninManager here, because it relies on profile() which is |
95 // freed in the base class. | 73 // freed in the base class. |
96 manager_->Shutdown(); | 74 manager_->Shutdown(); |
97 manager_.reset(NULL); | 75 manager_.reset(NULL); |
98 TestingBrowserProcess::GetGlobal()->SetLocalState(NULL); | 76 TestingBrowserProcess::GetGlobal()->SetLocalState(NULL); |
99 prefs_.reset(NULL); | 77 prefs_.reset(NULL); |
100 TokenServiceTestHarness::TearDown(); | 78 TokenServiceTestHarness::TearDown(); |
101 io_thread_->Stop(); | |
102 } | 79 } |
103 | 80 |
104 void SetupFetcherAndComplete(const std::string& url, | 81 void SetupFetcherAndComplete(const std::string& url, |
105 int response_code, | 82 int response_code, |
106 const net::ResponseCookies& cookies, | 83 const net::ResponseCookies& cookies, |
107 const std::string& response_string) { | 84 const std::string& response_string) { |
108 net::TestURLFetcher* fetcher = factory_.GetFetcherByID(0); | 85 net::TestURLFetcher* fetcher = factory_.GetFetcherByID(0); |
109 DCHECK(fetcher); | 86 DCHECK(fetcher); |
110 DCHECK(fetcher->delegate()); | 87 DCHECK(fetcher->delegate()); |
111 | 88 |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
163 "source"); | 140 "source"); |
164 SetupFetcherAndComplete(uberauth_token_gurl, 200, | 141 SetupFetcherAndComplete(uberauth_token_gurl, 200, |
165 net::ResponseCookies(), "ut1"); | 142 net::ResponseCookies(), "ut1"); |
166 | 143 |
167 net::ResponseCookies cookies; | 144 net::ResponseCookies cookies; |
168 cookies.push_back("checkCookie = true"); | 145 cookies.push_back("checkCookie = true"); |
169 SetupFetcherAndComplete(GaiaUrls::GetInstance()->merge_session_url(), 200, | 146 SetupFetcherAndComplete(GaiaUrls::GetInstance()->merge_session_url(), 200, |
170 cookies, "<html></html>"); | 147 cookies, "<html></html>"); |
171 } | 148 } |
172 | 149 |
173 void WaitUntilUIDone() { | |
174 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
175 BrowserThread::PostTask( | |
176 BrowserThread::IO, FROM_HERE, | |
177 base::Bind(&SigninManagerTest::NotifyUIOnComplete, | |
178 base::Unretained(this))); | |
179 base::MessageLoop::current()->Run(); | |
180 } | |
181 | |
182 void NotifyUIOnComplete () { | |
183 if (!BrowserThread::CurrentlyOn(BrowserThread::UI)) { | |
184 // Redo on UI thread. | |
185 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, | |
186 base::Bind(&SigninManagerTest::NotifyUIOnComplete, | |
187 base::Unretained(this))); | |
188 return; | |
189 } | |
190 base::MessageLoop::current()->Quit(); | |
191 } | |
192 | |
193 void ExpectSignInWithCredentialsSuccess() { | 150 void ExpectSignInWithCredentialsSuccess() { |
194 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 151 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
195 | 152 |
196 SimulateValidResponseSignInWithCredentials(); | 153 SimulateValidResponseSignInWithCredentials(); |
197 | 154 |
198 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); | 155 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
199 | 156 |
200 // This is flow, the oauth2 credentials should already be available in | 157 // This is flow, the oauth2 credentials should already be available in |
201 // the token service. | 158 // the token service. |
202 EXPECT_TRUE(service_->HasOAuthLoginToken()); | 159 EXPECT_TRUE(service()->HasOAuthLoginToken()); |
203 | 160 |
204 // Should go into token service and stop. | 161 // Should go into token service and stop. |
205 EXPECT_EQ(1U, google_login_success_.size()); | 162 EXPECT_EQ(1U, google_login_success_.size()); |
206 EXPECT_EQ(0U, google_login_failure_.size()); | 163 EXPECT_EQ(0U, google_login_failure_.size()); |
207 | 164 |
208 // Should persist across resets. | 165 // Should persist across resets. |
209 manager_->Shutdown(); | 166 manager_->Shutdown(); |
210 manager_.reset(new SigninManager( | 167 manager_.reset(new SigninManager( |
211 scoped_ptr<SigninManagerDelegate>( | 168 scoped_ptr<SigninManagerDelegate>( |
212 new ChromeSigninManagerDelegate(profile_.get())))); | 169 new ChromeSigninManagerDelegate(profile())))); |
213 manager_->Initialize(profile_.get(), NULL); | 170 manager_->Initialize(profile(), NULL); |
214 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 171 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
215 } | 172 } |
216 | 173 |
217 // Helper method that wraps the logic when signin with credentials | 174 // Helper method that wraps the logic when signin with credentials |
218 // should fail. If |requestSent| is true, then simulate valid resopnse. | 175 // should fail. If |requestSent| is true, then simulate valid resopnse. |
219 // Otherwise the sign-in is aborted before any request is sent, thus no need | 176 // Otherwise the sign-in is aborted before any request is sent, thus no need |
220 // to simulatate response. | 177 // to simulatate response. |
221 void ExpectSignInWithCredentialsFail(bool requestSent) { | 178 void ExpectSignInWithCredentialsFail(bool requestSent) { |
222 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 179 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
223 | 180 |
224 if (requestSent) | 181 if (requestSent) |
225 SimulateValidResponseSignInWithCredentials(); | 182 SimulateValidResponseSignInWithCredentials(); |
226 | 183 |
227 // The oauth2 credentials should not be available in the token service | 184 // The oauth2 credentials should not be available in the token service |
228 // because the email was incorrect. | 185 // because the email was incorrect. |
229 EXPECT_FALSE(service_->HasOAuthLoginToken()); | 186 EXPECT_FALSE(service()->HasOAuthLoginToken()); |
230 | 187 |
231 // Should go into token service and stop. | 188 // Should go into token service and stop. |
232 EXPECT_EQ(0U, google_login_success_.size()); | 189 EXPECT_EQ(0U, google_login_success_.size()); |
233 EXPECT_EQ(1U, google_login_failure_.size()); | 190 EXPECT_EQ(1U, google_login_failure_.size()); |
234 } | 191 } |
235 | 192 |
236 void CompleteSigninCallback(const std::string& oauth_token) { | 193 void CompleteSigninCallback(const std::string& oauth_token) { |
237 oauth_tokens_fetched_.push_back(oauth_token); | 194 oauth_tokens_fetched_.push_back(oauth_token); |
238 manager_->CompletePendingSignin(); | 195 manager_->CompletePendingSignin(); |
239 } | 196 } |
240 | 197 |
241 void CancelSigninCallback(const std::string& oauth_token) { | 198 void CancelSigninCallback(const std::string& oauth_token) { |
242 oauth_tokens_fetched_.push_back(oauth_token); | 199 oauth_tokens_fetched_.push_back(oauth_token); |
243 manager_->SignOut(); | 200 manager_->SignOut(); |
244 } | 201 } |
245 | 202 |
246 net::TestURLFetcherFactory factory_; | 203 net::TestURLFetcherFactory factory_; |
247 scoped_ptr<SigninManager> manager_; | 204 scoped_ptr<SigninManager> manager_; |
248 content::TestNotificationTracker google_login_success_; | 205 content::TestNotificationTracker google_login_success_; |
249 content::TestNotificationTracker google_login_failure_; | 206 content::TestNotificationTracker google_login_failure_; |
250 std::vector<std::string> oauth_tokens_fetched_; | 207 std::vector<std::string> oauth_tokens_fetched_; |
251 scoped_ptr<TestingPrefServiceSimple> prefs_; | 208 scoped_ptr<TestingPrefServiceSimple> prefs_; |
252 scoped_ptr<content::TestBrowserThread> io_thread_; | |
253 std::vector<std::string> cookies_; | 209 std::vector<std::string> cookies_; |
254 }; | 210 }; |
255 | 211 |
256 // NOTE: ClientLogin's "StartSignin" is called after collecting credentials | 212 // NOTE: ClientLogin's "StartSignin" is called after collecting credentials |
257 // from the user. | 213 // from the user. |
258 TEST_F(SigninManagerTest, SignInClientLogin) { | 214 TEST_F(SigninManagerTest, SignInClientLogin) { |
259 manager_->Initialize(profile_.get(), NULL); | 215 manager_->Initialize(profile(), NULL); |
260 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 216 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
261 | 217 |
262 manager_->StartSignIn( | 218 manager_->StartSignIn( |
263 "user@gmail.com", "password", std::string(), std::string()); | 219 "user@gmail.com", "password", std::string(), std::string()); |
264 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 220 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
265 | 221 |
266 SimulateValidResponseClientLogin(true); | 222 SimulateValidResponseClientLogin(true); |
267 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); | 223 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
268 | 224 |
269 // Should go into token service and stop. | 225 // Should go into token service and stop. |
270 EXPECT_EQ(1U, google_login_success_.size()); | 226 EXPECT_EQ(1U, google_login_success_.size()); |
271 EXPECT_EQ(0U, google_login_failure_.size()); | 227 EXPECT_EQ(0U, google_login_failure_.size()); |
272 | 228 |
273 service_->OnIssueAuthTokenSuccess(GaiaConstants::kGaiaOAuth2LoginRefreshToken, | 229 service()->OnIssueAuthTokenSuccess( |
274 "oauth2Token"); | 230 GaiaConstants::kGaiaOAuth2LoginRefreshToken, |
| 231 "oauth2Token"); |
275 SimulateValidUberToken(); | 232 SimulateValidUberToken(); |
276 // Check that the login cookie has been sent. | 233 // Check that the login cookie has been sent. |
277 ASSERT_NE(std::find(cookies_.begin(), cookies_.end(), "checkCookie = true"), | 234 ASSERT_NE(std::find(cookies_.begin(), cookies_.end(), "checkCookie = true"), |
278 cookies_.end()); | 235 cookies_.end()); |
279 | 236 |
280 // Should persist across resets. | 237 // Should persist across resets. |
281 manager_->Shutdown(); | 238 manager_->Shutdown(); |
282 manager_.reset(new SigninManager( | 239 manager_.reset(new SigninManager( |
283 scoped_ptr<SigninManagerDelegate>( | 240 scoped_ptr<SigninManagerDelegate>( |
284 new ChromeSigninManagerDelegate(profile_.get())))); | 241 new ChromeSigninManagerDelegate(profile())))); |
285 manager_->Initialize(profile_.get(), NULL); | 242 manager_->Initialize(profile(), NULL); |
286 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 243 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
287 } | 244 } |
288 | 245 |
289 TEST_F(SigninManagerTest, SignInWithCredentials) { | 246 TEST_F(SigninManagerTest, SignInWithCredentials) { |
290 manager_->Initialize(profile_.get(), NULL); | 247 manager_->Initialize(profile(), NULL); |
291 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 248 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
292 | 249 |
293 manager_->StartSignInWithCredentials( | 250 manager_->StartSignInWithCredentials( |
294 "0", | 251 "0", |
295 "user@gmail.com", | 252 "user@gmail.com", |
296 "password", | 253 "password", |
297 SigninManager::OAuthTokenFetchedCallback()); | 254 SigninManager::OAuthTokenFetchedCallback()); |
298 | 255 |
299 ExpectSignInWithCredentialsSuccess(); | 256 ExpectSignInWithCredentialsSuccess(); |
300 } | 257 } |
301 | 258 |
302 TEST_F(SigninManagerTest, SignInWithCredentialsNonCanonicalEmail) { | 259 TEST_F(SigninManagerTest, SignInWithCredentialsNonCanonicalEmail) { |
303 manager_->Initialize(profile_.get(), NULL); | 260 manager_->Initialize(profile(), NULL); |
304 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 261 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
305 | 262 |
306 manager_->StartSignInWithCredentials( | 263 manager_->StartSignInWithCredentials( |
307 "0", | 264 "0", |
308 "user", | 265 "user", |
309 "password", | 266 "password", |
310 SigninManager::OAuthTokenFetchedCallback()); | 267 SigninManager::OAuthTokenFetchedCallback()); |
311 | 268 |
312 ExpectSignInWithCredentialsSuccess(); | 269 ExpectSignInWithCredentialsSuccess(); |
313 } | 270 } |
314 | 271 |
315 TEST_F(SigninManagerTest, SignInWithCredentialsWrongEmail) { | 272 TEST_F(SigninManagerTest, SignInWithCredentialsWrongEmail) { |
316 manager_->Initialize(profile_.get(), NULL); | 273 manager_->Initialize(profile(), NULL); |
317 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 274 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
318 | 275 |
319 // If the email address used to start the sign in does not match the | 276 // If the email address used to start the sign in does not match the |
320 // email address returned by /GetUserInfo, the sign in should fail. | 277 // email address returned by /GetUserInfo, the sign in should fail. |
321 manager_->StartSignInWithCredentials( | 278 manager_->StartSignInWithCredentials( |
322 "0", | 279 "0", |
323 "user2@gmail.com", | 280 "user2@gmail.com", |
324 "password", | 281 "password", |
325 SigninManager::OAuthTokenFetchedCallback()); | 282 SigninManager::OAuthTokenFetchedCallback()); |
326 | 283 |
327 ExpectSignInWithCredentialsFail(true /* requestSent */); | 284 ExpectSignInWithCredentialsFail(true /* requestSent */); |
328 } | 285 } |
329 | 286 |
330 TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordValidCookie) { | 287 TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordValidCookie) { |
331 manager_->Initialize(profile_.get(), NULL); | 288 manager_->Initialize(profile(), NULL); |
332 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 289 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
333 | 290 |
334 // Set a valid LSID cookie in the test cookie store. | 291 // Set a valid LSID cookie in the test cookie store. |
335 scoped_refptr<net::CookieMonster> cookie_monster = | 292 scoped_refptr<net::CookieMonster> cookie_monster = |
336 profile_->GetCookieMonster(); | 293 profile()->GetCookieMonster(); |
337 net::CookieOptions options; | 294 net::CookieOptions options; |
338 options.set_include_httponly(); | 295 options.set_include_httponly(); |
339 cookie_monster->SetCookieWithOptionsAsync( | 296 cookie_monster->SetCookieWithOptionsAsync( |
340 GURL("https://accounts.google.com"), | 297 GURL("https://accounts.google.com"), |
341 "LSID=1234; secure; httponly", options, | 298 "LSID=1234; secure; httponly", options, |
342 net::CookieMonster::SetCookiesCallback()); | 299 net::CookieMonster::SetCookiesCallback()); |
343 | 300 |
344 // Since the password is empty, will verify the gaia cookies first. | 301 // Since the password is empty, will verify the gaia cookies first. |
345 manager_->StartSignInWithCredentials( | 302 manager_->StartSignInWithCredentials( |
346 "0", | 303 "0", |
347 "user@gmail.com", | 304 "user@gmail.com", |
348 std::string(), | 305 std::string(), |
349 SigninManager::OAuthTokenFetchedCallback()); | 306 SigninManager::OAuthTokenFetchedCallback()); |
350 | 307 |
351 WaitUntilUIDone(); | 308 base::RunLoop().RunUntilIdle(); |
352 | 309 |
353 // Verification should succeed and continue with auto signin. | 310 // Verification should succeed and continue with auto signin. |
354 ExpectSignInWithCredentialsSuccess(); | 311 ExpectSignInWithCredentialsSuccess(); |
355 } | 312 } |
356 | 313 |
357 TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordNoValidCookie) { | 314 TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordNoValidCookie) { |
358 manager_->Initialize(profile_.get(), NULL); | 315 manager_->Initialize(profile(), NULL); |
359 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 316 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
360 | 317 |
361 // Since the password is empty, will verify the gaia cookies first. | 318 // Since the password is empty, will verify the gaia cookies first. |
362 manager_->StartSignInWithCredentials( | 319 manager_->StartSignInWithCredentials( |
363 "0", | 320 "0", |
364 "user@gmail.com", | 321 "user@gmail.com", |
365 std::string(), | 322 std::string(), |
366 SigninManager::OAuthTokenFetchedCallback()); | 323 SigninManager::OAuthTokenFetchedCallback()); |
367 | 324 |
368 WaitUntilUIDone(); | 325 base::RunLoop().RunUntilIdle(); |
369 | 326 |
370 // Since the test cookie store is empty, verification should fail and throws | 327 // Since the test cookie store is empty, verification should fail and throws |
371 // a login error. | 328 // a login error. |
372 ExpectSignInWithCredentialsFail(false /* requestSent */); | 329 ExpectSignInWithCredentialsFail(false /* requestSent */); |
373 } | 330 } |
374 | 331 |
375 TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordInValidCookie) { | 332 TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordInValidCookie) { |
376 manager_->Initialize(profile_.get(), NULL); | 333 manager_->Initialize(profile(), NULL); |
377 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 334 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
378 | 335 |
379 // Set an invalid LSID cookie in the test cookie store. | 336 // Set an invalid LSID cookie in the test cookie store. |
380 scoped_refptr<net::CookieMonster> cookie_monster = | 337 scoped_refptr<net::CookieMonster> cookie_monster = |
381 profile_->GetCookieMonster(); | 338 profile()->GetCookieMonster(); |
382 net::CookieOptions options; | 339 net::CookieOptions options; |
383 options.set_include_httponly(); | 340 options.set_include_httponly(); |
384 cookie_monster->SetCookieWithOptionsAsync( | 341 cookie_monster->SetCookieWithOptionsAsync( |
385 GURL("https://accounts.google.com"), | 342 GURL("https://accounts.google.com"), |
386 "LSID=1234; domain=google.com; secure; httponly", options, | 343 "LSID=1234; domain=google.com; secure; httponly", options, |
387 net::CookieMonster::SetCookiesCallback()); | 344 net::CookieMonster::SetCookiesCallback()); |
388 | 345 |
389 // Since the password is empty, must verify the gaia cookies first. | 346 // Since the password is empty, must verify the gaia cookies first. |
390 manager_->StartSignInWithCredentials( | 347 manager_->StartSignInWithCredentials( |
391 "0", | 348 "0", |
392 "user@gmail.com", | 349 "user@gmail.com", |
393 std::string(), | 350 std::string(), |
394 SigninManager::OAuthTokenFetchedCallback()); | 351 SigninManager::OAuthTokenFetchedCallback()); |
395 | 352 |
396 WaitUntilUIDone(); | 353 base::RunLoop().RunUntilIdle(); |
397 | 354 |
398 // Since the LSID cookie is invalid, verification should fail and throws | 355 // Since the LSID cookie is invalid, verification should fail and throws |
399 // a login error. | 356 // a login error. |
400 ExpectSignInWithCredentialsFail(false /* requestSent */); | 357 ExpectSignInWithCredentialsFail(false /* requestSent */); |
401 } | 358 } |
402 | 359 |
403 TEST_F(SigninManagerTest, SignInWithCredentialsCallbackComplete) { | 360 TEST_F(SigninManagerTest, SignInWithCredentialsCallbackComplete) { |
404 manager_->Initialize(profile_.get(), NULL); | 361 manager_->Initialize(profile(), NULL); |
405 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 362 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
406 | 363 |
407 // Since the password is empty, must verify the gaia cookies first. | 364 // Since the password is empty, must verify the gaia cookies first. |
408 SigninManager::OAuthTokenFetchedCallback callback = | 365 SigninManager::OAuthTokenFetchedCallback callback = |
409 base::Bind(&SigninManagerTest::CompleteSigninCallback, | 366 base::Bind(&SigninManagerTest::CompleteSigninCallback, |
410 base::Unretained(this)); | 367 base::Unretained(this)); |
411 manager_->StartSignInWithCredentials( | 368 manager_->StartSignInWithCredentials( |
412 "0", | 369 "0", |
413 "user@gmail.com", | 370 "user@gmail.com", |
414 "password", | 371 "password", |
415 callback); | 372 callback); |
416 | 373 |
417 ExpectSignInWithCredentialsSuccess(); | 374 ExpectSignInWithCredentialsSuccess(); |
418 ASSERT_EQ(1U, oauth_tokens_fetched_.size()); | 375 ASSERT_EQ(1U, oauth_tokens_fetched_.size()); |
419 EXPECT_EQ(oauth_tokens_fetched_[0], "rt1"); | 376 EXPECT_EQ(oauth_tokens_fetched_[0], "rt1"); |
420 } | 377 } |
421 | 378 |
422 TEST_F(SigninManagerTest, SignInWithCredentialsCallbackCancel) { | 379 TEST_F(SigninManagerTest, SignInWithCredentialsCallbackCancel) { |
423 manager_->Initialize(profile_.get(), NULL); | 380 manager_->Initialize(profile(), NULL); |
424 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 381 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
425 | 382 |
426 // Since the password is empty, must verify the gaia cookies first. | 383 // Since the password is empty, must verify the gaia cookies first. |
427 SigninManager::OAuthTokenFetchedCallback callback = | 384 SigninManager::OAuthTokenFetchedCallback callback = |
428 base::Bind(&SigninManagerTest::CancelSigninCallback, | 385 base::Bind(&SigninManagerTest::CancelSigninCallback, |
429 base::Unretained(this)); | 386 base::Unretained(this)); |
430 manager_->StartSignInWithCredentials( | 387 manager_->StartSignInWithCredentials( |
431 "0", | 388 "0", |
432 "user@gmail.com", | 389 "user@gmail.com", |
433 "password", | 390 "password", |
434 callback); | 391 callback); |
435 | 392 |
436 // Signin should fail since it would be cancelled by the callback. | 393 // Signin should fail since it would be cancelled by the callback. |
437 ExpectSignInWithCredentialsFail(true); | 394 ExpectSignInWithCredentialsFail(true); |
438 ASSERT_EQ(1U, oauth_tokens_fetched_.size()); | 395 ASSERT_EQ(1U, oauth_tokens_fetched_.size()); |
439 EXPECT_EQ(oauth_tokens_fetched_[0], "rt1"); | 396 EXPECT_EQ(oauth_tokens_fetched_[0], "rt1"); |
440 } | 397 } |
441 | 398 |
442 TEST_F(SigninManagerTest, SignInClientLoginNoGPlus) { | 399 TEST_F(SigninManagerTest, SignInClientLoginNoGPlus) { |
443 manager_->Initialize(profile_.get(), NULL); | 400 manager_->Initialize(profile(), NULL); |
444 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 401 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
445 | 402 |
446 manager_->StartSignIn("username", "password", std::string(), std::string()); | 403 manager_->StartSignIn("username", "password", std::string(), std::string()); |
447 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 404 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
448 | 405 |
449 SimulateValidResponseClientLogin(false); | 406 SimulateValidResponseClientLogin(false); |
450 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); | 407 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
451 } | 408 } |
452 | 409 |
453 TEST_F(SigninManagerTest, ClearTransientSigninData) { | 410 TEST_F(SigninManagerTest, ClearTransientSigninData) { |
454 manager_->Initialize(profile_.get(), NULL); | 411 manager_->Initialize(profile(), NULL); |
455 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 412 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
456 | 413 |
457 manager_->StartSignIn("username", "password", std::string(), std::string()); | 414 manager_->StartSignIn("username", "password", std::string(), std::string()); |
458 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 415 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
459 | 416 |
460 SimulateValidResponseClientLogin(false); | 417 SimulateValidResponseClientLogin(false); |
461 | 418 |
462 // Should go into token service and stop. | 419 // Should go into token service and stop. |
463 EXPECT_EQ(1U, google_login_success_.size()); | 420 EXPECT_EQ(1U, google_login_success_.size()); |
464 EXPECT_EQ(0U, google_login_failure_.size()); | 421 EXPECT_EQ(0U, google_login_failure_.size()); |
465 | 422 |
466 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 423 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
467 | 424 |
468 // Now clear the in memory data. | 425 // Now clear the in memory data. |
469 manager_->ClearTransientSigninData(); | 426 manager_->ClearTransientSigninData(); |
470 EXPECT_TRUE(manager_->last_result_.data.empty()); | 427 EXPECT_TRUE(manager_->last_result_.data.empty()); |
471 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); | 428 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
472 | 429 |
473 // Ensure preferences are not modified. | 430 // Ensure preferences are not modified. |
474 EXPECT_FALSE( | 431 EXPECT_FALSE( |
475 profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername).empty()); | 432 profile()->GetPrefs()->GetString(prefs::kGoogleServicesUsername).empty()); |
476 | 433 |
477 // On reset it should be regenerated. | 434 // On reset it should be regenerated. |
478 manager_->Shutdown(); | 435 manager_->Shutdown(); |
479 manager_.reset(new SigninManager( | 436 manager_.reset(new SigninManager( |
480 scoped_ptr<SigninManagerDelegate>( | 437 scoped_ptr<SigninManagerDelegate>( |
481 new ChromeSigninManagerDelegate(profile_.get())))); | 438 new ChromeSigninManagerDelegate(profile())))); |
482 manager_->Initialize(profile_.get(), NULL); | 439 manager_->Initialize(profile(), NULL); |
483 | 440 |
484 // Now make sure we have the right user name. | 441 // Now make sure we have the right user name. |
485 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 442 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
486 } | 443 } |
487 | 444 |
488 TEST_F(SigninManagerTest, SignOutClientLogin) { | 445 TEST_F(SigninManagerTest, SignOutClientLogin) { |
489 manager_->Initialize(profile_.get(), NULL); | 446 manager_->Initialize(profile(), NULL); |
490 manager_->StartSignIn("username", "password", std::string(), std::string()); | 447 manager_->StartSignIn("username", "password", std::string(), std::string()); |
491 SimulateValidResponseClientLogin(false); | 448 SimulateValidResponseClientLogin(false); |
492 manager_->OnClientLoginSuccess(credentials_); | 449 manager_->OnClientLoginSuccess(credentials()); |
493 | 450 |
494 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 451 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
495 manager_->SignOut(); | 452 manager_->SignOut(); |
496 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 453 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
497 // Should not be persisted anymore | 454 // Should not be persisted anymore |
498 manager_->Shutdown(); | 455 manager_->Shutdown(); |
499 manager_.reset(new SigninManager( | 456 manager_.reset(new SigninManager( |
500 scoped_ptr<SigninManagerDelegate>( | 457 scoped_ptr<SigninManagerDelegate>( |
501 new ChromeSigninManagerDelegate(profile_.get())))); | 458 new ChromeSigninManagerDelegate(profile())))); |
502 manager_->Initialize(profile_.get(), NULL); | 459 manager_->Initialize(profile(), NULL); |
503 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 460 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
504 } | 461 } |
505 | 462 |
506 TEST_F(SigninManagerTest, SignInFailureClientLogin) { | 463 TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
507 manager_->Initialize(profile_.get(), NULL); | 464 manager_->Initialize(profile(), NULL); |
508 manager_->StartSignIn("username", "password", std::string(), std::string()); | 465 manager_->StartSignIn("username", "password", std::string(), std::string()); |
509 GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); | 466 GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); |
510 manager_->OnClientLoginFailure(error); | 467 manager_->OnClientLoginFailure(error); |
511 | 468 |
512 EXPECT_EQ(0U, google_login_success_.size()); | 469 EXPECT_EQ(0U, google_login_success_.size()); |
513 EXPECT_EQ(1U, google_login_failure_.size()); | 470 EXPECT_EQ(1U, google_login_failure_.size()); |
514 | 471 |
515 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 472 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
516 | 473 |
517 // Should not be persisted | 474 // Should not be persisted |
518 manager_->Shutdown(); | 475 manager_->Shutdown(); |
519 manager_.reset(new SigninManager( | 476 manager_.reset(new SigninManager( |
520 scoped_ptr<SigninManagerDelegate>( | 477 scoped_ptr<SigninManagerDelegate>( |
521 new ChromeSigninManagerDelegate(profile_.get())))); | 478 new ChromeSigninManagerDelegate(profile())))); |
522 manager_->Initialize(profile_.get(), NULL); | 479 manager_->Initialize(profile(), NULL); |
523 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 480 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
524 } | 481 } |
525 | 482 |
526 TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { | 483 TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
527 manager_->Initialize(profile_.get(), NULL); | 484 manager_->Initialize(profile(), NULL); |
528 manager_->StartSignIn("username", "password", std::string(), std::string()); | 485 manager_->StartSignIn("username", "password", std::string(), std::string()); |
529 GoogleServiceAuthError error(GoogleServiceAuthError::TWO_FACTOR); | 486 GoogleServiceAuthError error(GoogleServiceAuthError::TWO_FACTOR); |
530 manager_->OnClientLoginFailure(error); | 487 manager_->OnClientLoginFailure(error); |
531 | 488 |
532 EXPECT_EQ(0U, google_login_success_.size()); | 489 EXPECT_EQ(0U, google_login_success_.size()); |
533 EXPECT_EQ(1U, google_login_failure_.size()); | 490 EXPECT_EQ(1U, google_login_failure_.size()); |
534 | 491 |
535 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 492 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
536 EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); | 493 EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); |
537 | 494 |
538 manager_->ProvideSecondFactorAccessCode("access"); | 495 manager_->ProvideSecondFactorAccessCode("access"); |
539 SimulateValidResponseClientLogin(false); | 496 SimulateValidResponseClientLogin(false); |
540 | 497 |
541 EXPECT_EQ(1U, google_login_success_.size()); | 498 EXPECT_EQ(1U, google_login_success_.size()); |
542 EXPECT_EQ(1U, google_login_failure_.size()); | 499 EXPECT_EQ(1U, google_login_failure_.size()); |
543 } | 500 } |
544 | 501 |
545 TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { | 502 TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
546 manager_->Initialize(profile_.get(), NULL); | 503 manager_->Initialize(profile(), NULL); |
547 manager_->StartSignIn("username", "password", std::string(), std::string()); | 504 manager_->StartSignIn("username", "password", std::string(), std::string()); |
548 GoogleServiceAuthError error1(GoogleServiceAuthError::TWO_FACTOR); | 505 GoogleServiceAuthError error1(GoogleServiceAuthError::TWO_FACTOR); |
549 manager_->OnClientLoginFailure(error1); | 506 manager_->OnClientLoginFailure(error1); |
550 | 507 |
551 EXPECT_EQ(0U, google_login_success_.size()); | 508 EXPECT_EQ(0U, google_login_success_.size()); |
552 EXPECT_EQ(1U, google_login_failure_.size()); | 509 EXPECT_EQ(1U, google_login_failure_.size()); |
553 | 510 |
554 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 511 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
555 EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); | 512 EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); |
556 | 513 |
557 manager_->ProvideSecondFactorAccessCode("badaccess"); | 514 manager_->ProvideSecondFactorAccessCode("badaccess"); |
558 GoogleServiceAuthError error2( | 515 GoogleServiceAuthError error2( |
559 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS); | 516 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS); |
560 manager_->OnClientLoginFailure(error2); | 517 manager_->OnClientLoginFailure(error2); |
561 | 518 |
562 EXPECT_EQ(0U, google_login_success_.size()); | 519 EXPECT_EQ(0U, google_login_success_.size()); |
563 EXPECT_EQ(2U, google_login_failure_.size()); | 520 EXPECT_EQ(2U, google_login_failure_.size()); |
564 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 521 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
565 | 522 |
566 manager_->ProvideSecondFactorAccessCode("badaccess"); | 523 manager_->ProvideSecondFactorAccessCode("badaccess"); |
567 GoogleServiceAuthError error3(GoogleServiceAuthError::CONNECTION_FAILED); | 524 GoogleServiceAuthError error3(GoogleServiceAuthError::CONNECTION_FAILED); |
568 manager_->OnClientLoginFailure(error3); | 525 manager_->OnClientLoginFailure(error3); |
569 | 526 |
570 EXPECT_EQ(0U, google_login_success_.size()); | 527 EXPECT_EQ(0U, google_login_success_.size()); |
571 EXPECT_EQ(3U, google_login_failure_.size()); | 528 EXPECT_EQ(3U, google_login_failure_.size()); |
572 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 529 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
573 } | 530 } |
574 | 531 |
575 TEST_F(SigninManagerTest, SignOutMidConnect) { | 532 TEST_F(SigninManagerTest, SignOutMidConnect) { |
576 manager_->Initialize(profile_.get(), NULL); | 533 manager_->Initialize(profile(), NULL); |
577 manager_->StartSignIn("username", "password", std::string(), std::string()); | 534 manager_->StartSignIn("username", "password", std::string(), std::string()); |
578 EXPECT_EQ("username", manager_->GetUsernameForAuthInProgress()); | 535 EXPECT_EQ("username", manager_->GetUsernameForAuthInProgress()); |
579 manager_->SignOut(); | 536 manager_->SignOut(); |
580 EXPECT_EQ(0U, google_login_success_.size()); | 537 EXPECT_EQ(0U, google_login_success_.size()); |
581 EXPECT_EQ(1U, google_login_failure_.size()); | 538 EXPECT_EQ(1U, google_login_failure_.size()); |
582 | 539 |
583 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 540 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
584 EXPECT_TRUE(manager_->GetUsernameForAuthInProgress().empty()); | 541 EXPECT_TRUE(manager_->GetUsernameForAuthInProgress().empty()); |
585 } | 542 } |
586 | 543 |
587 TEST_F(SigninManagerTest, SignOutWhileProhibited) { | 544 TEST_F(SigninManagerTest, SignOutWhileProhibited) { |
588 manager_->Initialize(profile_.get(), NULL); | 545 manager_->Initialize(profile(), NULL); |
589 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 546 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
590 | 547 |
591 manager_->SetAuthenticatedUsername("user@gmail.com"); | 548 manager_->SetAuthenticatedUsername("user@gmail.com"); |
592 manager_->ProhibitSignout(true); | 549 manager_->ProhibitSignout(true); |
593 manager_->SignOut(); | 550 manager_->SignOut(); |
594 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); | 551 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
595 manager_->ProhibitSignout(false); | 552 manager_->ProhibitSignout(false); |
596 manager_->SignOut(); | 553 manager_->SignOut(); |
597 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 554 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
598 } | 555 } |
(...skipping 11 matching lines...) Expand all Loading... |
610 // chromiumsync is double-embedded in a continue query param. | 567 // chromiumsync is double-embedded in a continue query param. |
611 EXPECT_TRUE(SigninManager::IsWebBasedSigninFlowURL( | 568 EXPECT_TRUE(SigninManager::IsWebBasedSigninFlowURL( |
612 GURL("https://accounts.google.com/CheckCookie?" | 569 GURL("https://accounts.google.com/CheckCookie?" |
613 "continue=https%3A%2F%2Fwww.google.com%2Fintl%2Fen-US%2Fchrome" | 570 "continue=https%3A%2F%2Fwww.google.com%2Fintl%2Fen-US%2Fchrome" |
614 "%2Fblank.html%3Fsource%3D3%26nonadv%3D1&service=chromiumsync"))); | 571 "%2Fblank.html%3Fsource%3D3%26nonadv%3D1&service=chromiumsync"))); |
615 } | 572 } |
616 | 573 |
617 TEST_F(SigninManagerTest, Prohibited) { | 574 TEST_F(SigninManagerTest, Prohibited) { |
618 g_browser_process->local_state()->SetString( | 575 g_browser_process->local_state()->SetString( |
619 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); | 576 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
620 manager_->Initialize(profile_.get(), g_browser_process->local_state()); | 577 manager_->Initialize(profile(), g_browser_process->local_state()); |
621 EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); | 578 EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); |
622 EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); | 579 EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); |
623 EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); | 580 EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); |
624 EXPECT_FALSE(manager_->IsAllowedUsername("test@notgoogle.com")); | 581 EXPECT_FALSE(manager_->IsAllowedUsername("test@notgoogle.com")); |
625 EXPECT_FALSE(manager_->IsAllowedUsername(std::string())); | 582 EXPECT_FALSE(manager_->IsAllowedUsername(std::string())); |
626 } | 583 } |
627 | 584 |
628 TEST_F(SigninManagerTest, TestAlternateWildcard) { | 585 TEST_F(SigninManagerTest, TestAlternateWildcard) { |
629 // Test to make sure we accept "*@google.com" as a pattern (treat it as if | 586 // Test to make sure we accept "*@google.com" as a pattern (treat it as if |
630 // the admin entered ".*@google.com"). | 587 // the admin entered ".*@google.com"). |
631 g_browser_process->local_state()->SetString( | 588 g_browser_process->local_state()->SetString( |
632 prefs::kGoogleServicesUsernamePattern, "*@google.com"); | 589 prefs::kGoogleServicesUsernamePattern, "*@google.com"); |
633 manager_->Initialize(profile_.get(), g_browser_process->local_state()); | 590 manager_->Initialize(profile(), g_browser_process->local_state()); |
634 EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); | 591 EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); |
635 EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); | 592 EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); |
636 EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); | 593 EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); |
637 EXPECT_FALSE(manager_->IsAllowedUsername("test@notgoogle.com")); | 594 EXPECT_FALSE(manager_->IsAllowedUsername("test@notgoogle.com")); |
638 EXPECT_FALSE(manager_->IsAllowedUsername(std::string())); | 595 EXPECT_FALSE(manager_->IsAllowedUsername(std::string())); |
639 } | 596 } |
640 | 597 |
641 TEST_F(SigninManagerTest, ProhibitedAtStartup) { | 598 TEST_F(SigninManagerTest, ProhibitedAtStartup) { |
642 profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, | 599 profile()->GetPrefs()->SetString(prefs::kGoogleServicesUsername, |
643 "monkey@invalid.com"); | 600 "monkey@invalid.com"); |
644 g_browser_process->local_state()->SetString( | 601 g_browser_process->local_state()->SetString( |
645 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); | 602 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
646 manager_->Initialize(profile_.get(), g_browser_process->local_state()); | 603 manager_->Initialize(profile(), g_browser_process->local_state()); |
647 // Currently signed in user is prohibited by policy, so should be signed out. | 604 // Currently signed in user is prohibited by policy, so should be signed out. |
648 EXPECT_EQ("", manager_->GetAuthenticatedUsername()); | 605 EXPECT_EQ("", manager_->GetAuthenticatedUsername()); |
649 } | 606 } |
650 | 607 |
651 TEST_F(SigninManagerTest, ProhibitedAfterStartup) { | 608 TEST_F(SigninManagerTest, ProhibitedAfterStartup) { |
652 std::string user("monkey@invalid.com"); | 609 std::string user("monkey@invalid.com"); |
653 profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, user); | 610 profile()->GetPrefs()->SetString(prefs::kGoogleServicesUsername, user); |
654 manager_->Initialize(profile_.get(), g_browser_process->local_state()); | 611 manager_->Initialize(profile(), g_browser_process->local_state()); |
655 EXPECT_EQ(user, manager_->GetAuthenticatedUsername()); | 612 EXPECT_EQ(user, manager_->GetAuthenticatedUsername()); |
656 // Update the profile - user should be signed out. | 613 // Update the profile - user should be signed out. |
657 g_browser_process->local_state()->SetString( | 614 g_browser_process->local_state()->SetString( |
658 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); | 615 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
659 EXPECT_EQ("", manager_->GetAuthenticatedUsername()); | 616 EXPECT_EQ("", manager_->GetAuthenticatedUsername()); |
660 } | 617 } |
661 | 618 |
662 TEST_F(SigninManagerTest, ExternalSignIn) { | 619 TEST_F(SigninManagerTest, ExternalSignIn) { |
663 manager_->Initialize(profile_.get(), g_browser_process->local_state()); | 620 manager_->Initialize(profile(), g_browser_process->local_state()); |
664 EXPECT_EQ("", | 621 EXPECT_EQ("", |
665 profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername)); | 622 profile()->GetPrefs()->GetString(prefs::kGoogleServicesUsername)); |
666 EXPECT_EQ("", manager_->GetAuthenticatedUsername()); | 623 EXPECT_EQ("", manager_->GetAuthenticatedUsername()); |
667 EXPECT_EQ(0u, google_login_success_.size()); | 624 EXPECT_EQ(0u, google_login_success_.size()); |
668 | 625 |
669 manager_->OnExternalSigninCompleted("external@example.com"); | 626 manager_->OnExternalSigninCompleted("external@example.com"); |
670 EXPECT_EQ(1u, google_login_success_.size()); | 627 EXPECT_EQ(1u, google_login_success_.size()); |
671 EXPECT_EQ(0u, google_login_failure_.size()); | 628 EXPECT_EQ(0u, google_login_failure_.size()); |
672 EXPECT_EQ("external@example.com", | 629 EXPECT_EQ("external@example.com", |
673 profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername)); | 630 profile()->GetPrefs()->GetString(prefs::kGoogleServicesUsername)); |
674 EXPECT_EQ("external@example.com", manager_->GetAuthenticatedUsername()); | 631 EXPECT_EQ("external@example.com", manager_->GetAuthenticatedUsername()); |
675 } | 632 } |
OLD | NEW |