| Index: components/password_manager/core/browser/password_form_manager_unittest.cc
|
| diff --git a/chrome/browser/password_manager/password_form_manager_unittest.cc b/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| similarity index 82%
|
| rename from chrome/browser/password_manager/password_form_manager_unittest.cc
|
| rename to components/password_manager/core/browser/password_form_manager_unittest.cc
|
| index 37ee238d1d3e296508476f8659f596cfc4b1c32c..59e12c9734dd68fc1500d133a169efdb067a8501 100644
|
| --- a/chrome/browser/password_manager/password_form_manager_unittest.cc
|
| +++ b/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| @@ -2,14 +2,14 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| #include "base/memory/scoped_ptr.h"
|
| #include "base/message_loop/message_loop.h"
|
| +#include "base/prefs/pref_registry_simple.h"
|
| +#include "base/prefs/pref_service.h"
|
| +#include "base/prefs/testing_pref_service.h"
|
| +#include "base/run_loop.h"
|
| #include "base/strings/string_util.h"
|
| #include "base/strings/utf_string_conversions.h"
|
| -#include "chrome/browser/profiles/profile_manager.h"
|
| -#include "chrome/test/base/testing_profile.h"
|
| #include "components/autofill/core/common/password_form.h"
|
| #include "components/password_manager/core/browser/mock_password_store.h"
|
| #include "components/password_manager/core/browser/password_form_manager.h"
|
| @@ -18,8 +18,9 @@
|
| #include "components/password_manager/core/browser/password_manager_driver.h"
|
| #include "components/password_manager/core/browser/password_store.h"
|
| #include "components/password_manager/core/browser/test_password_store.h"
|
| -#include "content/public/test/test_utils.h"
|
| +#include "components/password_manager/core/common/password_manager_pref_names.h"
|
| #include "testing/gmock/include/gmock/gmock.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
|
|
| using autofill::PasswordForm;
|
| using base::ASCIIToUTF16;
|
| @@ -34,6 +35,13 @@ class AutofillManager;
|
|
|
| namespace {
|
|
|
| +void RunAllPendingTasks() {
|
| + base::RunLoop run_loop;
|
| + base::MessageLoop::current()->PostTask(
|
| + FROM_HERE, base::MessageLoop::QuitWhenIdleClosure());
|
| + run_loop.Run();
|
| +}
|
| +
|
| class MockPasswordManagerDriver : public PasswordManagerDriver {
|
| public:
|
| MockPasswordManagerDriver() {}
|
| @@ -52,15 +60,16 @@ class MockPasswordManagerDriver : public PasswordManagerDriver {
|
|
|
| class TestPasswordManagerClient : public PasswordManagerClient {
|
| public:
|
| - explicit TestPasswordManagerClient(Profile* profile,
|
| - PasswordStore* password_store)
|
| - : profile_(profile),
|
| - password_store_(password_store) {}
|
| + explicit TestPasswordManagerClient(PasswordStore* password_store)
|
| + : password_store_(password_store) {
|
| + prefs_.registry()->RegisterBooleanPref(prefs::kPasswordManagerEnabled,
|
| + true);
|
| + }
|
|
|
| virtual void PromptUserToSavePassword(PasswordFormManager* form_to_save)
|
| OVERRIDE {}
|
| - virtual PrefService* GetPrefs() OVERRIDE { return profile_->GetPrefs(); }
|
| - virtual PasswordStore* GetPasswordStore() OVERRIDE { return password_store_;}
|
| + virtual PrefService* GetPrefs() OVERRIDE { return &prefs_; }
|
| + virtual PasswordStore* GetPasswordStore() OVERRIDE { return password_store_; }
|
| virtual PasswordManagerDriver* GetDriver() OVERRIDE { return &driver_; }
|
| virtual void AuthenticateAutofillAndFillForm(
|
| scoped_ptr<autofill::PasswordFormFillData> fill_data) OVERRIDE {
|
| @@ -70,7 +79,7 @@ class TestPasswordManagerClient : public PasswordManagerClient {
|
| MockPasswordManagerDriver* GetMockDriver() { return &driver_; }
|
|
|
| private:
|
| - Profile* profile_;
|
| + TestingPrefServiceSimple prefs_;
|
| PasswordStore* password_store_;
|
| MockPasswordManagerDriver driver_;
|
| };
|
| @@ -80,11 +89,10 @@ class TestPasswordManager : public PasswordManager {
|
| explicit TestPasswordManager(PasswordManagerClient* client)
|
| : PasswordManager(client) {}
|
|
|
| - virtual void Autofill(
|
| - const autofill::PasswordForm& form_for_autofill,
|
| - const autofill::PasswordFormMap& best_matches,
|
| - const autofill::PasswordForm& preferred_match,
|
| - bool wait_for_username) const OVERRIDE {
|
| + virtual void Autofill(const autofill::PasswordForm& form_for_autofill,
|
| + const autofill::PasswordFormMap& best_matches,
|
| + const autofill::PasswordForm& preferred_match,
|
| + bool wait_for_username) const OVERRIDE {
|
| best_matches_ = best_matches;
|
| }
|
|
|
| @@ -101,8 +109,7 @@ class TestPasswordManager : public PasswordManager {
|
|
|
| class PasswordFormManagerTest : public testing::Test {
|
| public:
|
| - PasswordFormManagerTest() {
|
| - }
|
| + PasswordFormManagerTest() {}
|
|
|
| virtual void SetUp() {
|
| observed_form_.origin = GURL("http://accounts.google.com/a/LoginAuth");
|
| @@ -120,11 +127,9 @@ class PasswordFormManagerTest : public testing::Test {
|
| saved_match_.password_value = ASCIIToUTF16("test1");
|
| saved_match_.other_possible_usernames.push_back(
|
| ASCIIToUTF16("test2@gmail.com"));
|
| - profile_ = new TestingProfile();
|
| }
|
|
|
| virtual void TearDown() {
|
| - delete profile_;
|
| if (mock_store_)
|
| mock_store_->Shutdown();
|
| }
|
| @@ -136,9 +141,7 @@ class PasswordFormManagerTest : public testing::Test {
|
| }
|
| }
|
|
|
| - MockPasswordStore* mock_store() const {
|
| - return mock_store_.get();
|
| - }
|
| + MockPasswordStore* mock_store() const { return mock_store_.get(); }
|
|
|
| PasswordForm* GetPendingCredentials(PasswordFormManager* p) {
|
| return &p->pending_credentials_;
|
| @@ -178,8 +181,6 @@ class PasswordFormManagerTest : public testing::Test {
|
| return p->IgnoreResult(*form);
|
| }
|
|
|
| - Profile* profile() { return profile_; }
|
| -
|
| PasswordForm* observed_form() { return &observed_form_; }
|
| PasswordForm* saved_match() { return &saved_match_; }
|
| PasswordForm* CreateSavedMatch(bool blacklisted) {
|
| @@ -192,13 +193,12 @@ class PasswordFormManagerTest : public testing::Test {
|
| private:
|
| PasswordForm observed_form_;
|
| PasswordForm saved_match_;
|
| - Profile* profile_;
|
| scoped_refptr<MockPasswordStore> mock_store_;
|
| };
|
|
|
| TEST_F(PasswordFormManagerTest, TestNewLogin) {
|
| scoped_ptr<TestPasswordManagerClient> client(
|
| - new TestPasswordManagerClient(profile(), NULL));
|
| + new TestPasswordManagerClient(NULL));
|
| scoped_ptr<MockPasswordManagerDriver> driver;
|
| PasswordFormManager* manager = new PasswordFormManager(
|
| NULL, client.get(), driver.get(), *observed_form(), false);
|
| @@ -210,8 +210,7 @@ TEST_F(PasswordFormManagerTest, TestNewLogin) {
|
| credentials.password_value = saved_match()->password_value;
|
| credentials.preferred = true;
|
| manager->ProvisionallySave(
|
| - credentials,
|
| - PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| + credentials, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
|
|
| // Successful login. The PasswordManager would instruct PasswordFormManager
|
| // to save, which should know this is a new login.
|
| @@ -222,8 +221,7 @@ TEST_F(PasswordFormManagerTest, TestNewLogin) {
|
| GetPendingCredentials(manager)->origin.spec());
|
| EXPECT_EQ(observed_form()->signon_realm,
|
| GetPendingCredentials(manager)->signon_realm);
|
| - EXPECT_EQ(observed_form()->action,
|
| - GetPendingCredentials(manager)->action);
|
| + EXPECT_EQ(observed_form()->action, GetPendingCredentials(manager)->action);
|
| EXPECT_TRUE(GetPendingCredentials(manager)->preferred);
|
| EXPECT_EQ(saved_match()->password_value,
|
| GetPendingCredentials(manager)->password_value);
|
| @@ -240,8 +238,7 @@ TEST_F(PasswordFormManagerTest, TestNewLogin) {
|
| credentials.username_value = new_user;
|
| credentials.password_value = new_pass;
|
| manager->ProvisionallySave(
|
| - credentials,
|
| - PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| + credentials, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
|
|
| // Again, the PasswordFormManager should know this is still a new login.
|
| EXPECT_TRUE(manager->IsNewLogin());
|
| @@ -251,10 +248,8 @@ TEST_F(PasswordFormManagerTest, TestNewLogin) {
|
| EXPECT_EQ(observed_form()->signon_realm,
|
| GetPendingCredentials(manager)->signon_realm);
|
| EXPECT_TRUE(GetPendingCredentials(manager)->preferred);
|
| - EXPECT_EQ(new_pass,
|
| - GetPendingCredentials(manager)->password_value);
|
| - EXPECT_EQ(new_user,
|
| - GetPendingCredentials(manager)->username_value);
|
| + EXPECT_EQ(new_pass, GetPendingCredentials(manager)->password_value);
|
| + EXPECT_EQ(new_user, GetPendingCredentials(manager)->username_value);
|
| delete manager;
|
| }
|
|
|
| @@ -262,7 +257,7 @@ TEST_F(PasswordFormManagerTest, TestUpdatePassword) {
|
| // Create a PasswordFormManager with observed_form, as if we just
|
| // saw this form and need to find matching logins.
|
| scoped_ptr<TestPasswordManagerClient> client(
|
| - new TestPasswordManagerClient(profile(), NULL));
|
| + new TestPasswordManagerClient(NULL));
|
| scoped_ptr<MockPasswordManagerDriver> driver;
|
| PasswordFormManager* manager = new PasswordFormManager(
|
| NULL, client.get(), driver.get(), *observed_form(), false);
|
| @@ -280,8 +275,7 @@ TEST_F(PasswordFormManagerTest, TestUpdatePassword) {
|
| credentials.password_value = new_pass;
|
| credentials.preferred = true;
|
| manager->ProvisionallySave(
|
| - credentials,
|
| - PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| + credentials, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
|
|
| // Successful login. The PasswordManager would instruct PasswordFormManager
|
| // to save, and since this is an update, it should know not to save as a new
|
| @@ -296,15 +290,14 @@ TEST_F(PasswordFormManagerTest, TestUpdatePassword) {
|
| EXPECT_EQ(GetPendingCredentials(manager)->signon_realm,
|
| saved_match()->signon_realm);
|
| EXPECT_TRUE(GetPendingCredentials(manager)->preferred);
|
| - EXPECT_EQ(new_pass,
|
| - GetPendingCredentials(manager)->password_value);
|
| + EXPECT_EQ(new_pass, GetPendingCredentials(manager)->password_value);
|
| // Done.
|
| delete manager;
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, TestIgnoreResult) {
|
| scoped_ptr<TestPasswordManagerClient> client(
|
| - new TestPasswordManagerClient(profile(), NULL));
|
| + new TestPasswordManagerClient(NULL));
|
| scoped_ptr<MockPasswordManagerDriver> driver;
|
| PasswordFormManager* manager = new PasswordFormManager(
|
| NULL, client.get(), driver.get(), *observed_form(), false);
|
| @@ -326,7 +319,7 @@ TEST_F(PasswordFormManagerTest, TestIgnoreResult) {
|
|
|
| TEST_F(PasswordFormManagerTest, TestEmptyAction) {
|
| scoped_ptr<TestPasswordManagerClient> client(
|
| - new TestPasswordManagerClient(profile(), NULL));
|
| + new TestPasswordManagerClient(NULL));
|
| scoped_ptr<MockPasswordManagerDriver> driver;
|
| scoped_ptr<PasswordFormManager> manager(new PasswordFormManager(
|
| NULL, client.get(), driver.get(), *observed_form(), false));
|
| @@ -338,8 +331,7 @@ TEST_F(PasswordFormManagerTest, TestEmptyAction) {
|
| login.username_value = saved_match()->username_value;
|
| login.password_value = saved_match()->password_value;
|
| manager->ProvisionallySave(
|
| - login,
|
| - PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| + login, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| EXPECT_FALSE(manager->IsNewLogin());
|
| // We bless our saved PasswordForm entry with the action URL of the
|
| // observed form.
|
| @@ -349,7 +341,7 @@ TEST_F(PasswordFormManagerTest, TestEmptyAction) {
|
|
|
| TEST_F(PasswordFormManagerTest, TestUpdateAction) {
|
| scoped_ptr<TestPasswordManagerClient> client(
|
| - new TestPasswordManagerClient(profile(), NULL));
|
| + new TestPasswordManagerClient(NULL));
|
| scoped_ptr<MockPasswordManagerDriver> driver;
|
| scoped_ptr<PasswordFormManager> manager(new PasswordFormManager(
|
| NULL, client.get(), driver.get(), *observed_form(), false));
|
| @@ -361,8 +353,7 @@ TEST_F(PasswordFormManagerTest, TestUpdateAction) {
|
| login.password_value = saved_match()->password_value;
|
|
|
| manager->ProvisionallySave(
|
| - login,
|
| - PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| + login, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| EXPECT_FALSE(manager->IsNewLogin());
|
| // The observed action URL is different from the previously saved one, and
|
| // is the same as the one that would be submitted on successful login.
|
| @@ -373,7 +364,7 @@ TEST_F(PasswordFormManagerTest, TestUpdateAction) {
|
|
|
| TEST_F(PasswordFormManagerTest, TestDynamicAction) {
|
| scoped_ptr<TestPasswordManagerClient> client(
|
| - new TestPasswordManagerClient(profile(), NULL));
|
| + new TestPasswordManagerClient(NULL));
|
| scoped_ptr<MockPasswordManagerDriver> driver;
|
| scoped_ptr<PasswordFormManager> manager(new PasswordFormManager(
|
| NULL, client.get(), driver.get(), *observed_form(), false));
|
| @@ -385,13 +376,11 @@ TEST_F(PasswordFormManagerTest, TestDynamicAction) {
|
| login.action = new_action;
|
|
|
| manager->ProvisionallySave(
|
| - login,
|
| - PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| + login, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| EXPECT_TRUE(manager->IsNewLogin());
|
| // Check that the provisionally saved action URL is the same as the submitted
|
| // action URL, not the one observed on page load.
|
| - EXPECT_EQ(new_action,
|
| - GetPendingCredentials(manager.get())->action);
|
| + EXPECT_EQ(new_action, GetPendingCredentials(manager.get())->action);
|
| }
|
|
|
| TEST_F(PasswordFormManagerTest, TestAlternateUsername) {
|
| @@ -400,18 +389,14 @@ TEST_F(PasswordFormManagerTest, TestAlternateUsername) {
|
| scoped_refptr<TestPasswordStore> password_store = new TestPasswordStore;
|
| CHECK(password_store->Init());
|
|
|
| - TestPasswordManagerClient client(profile(), password_store.get());
|
| + TestPasswordManagerClient client(password_store.get());
|
| TestPasswordManager password_manager(&client);
|
| - scoped_ptr<PasswordFormManager> manager(
|
| - new PasswordFormManager(&password_manager,
|
| - &client,
|
| - client.GetDriver(),
|
| - *observed_form(),
|
| - false));
|
| + scoped_ptr<PasswordFormManager> manager(new PasswordFormManager(
|
| + &password_manager, &client, client.GetDriver(), *observed_form(), false));
|
|
|
| password_store->AddLogin(*saved_match());
|
| manager->FetchMatchingLoginsFromPasswordStore(PasswordStore::ALLOW_PROMPT);
|
| - content::RunAllPendingInMessageLoop();
|
| + RunAllPendingTasks();
|
|
|
| // The saved match has the right username already.
|
| PasswordForm login(*observed_form());
|
| @@ -419,12 +404,11 @@ TEST_F(PasswordFormManagerTest, TestAlternateUsername) {
|
| login.password_value = saved_match()->password_value;
|
| login.preferred = true;
|
| manager->ProvisionallySave(
|
| - login,
|
| - PasswordFormManager::ALLOW_OTHER_POSSIBLE_USERNAMES);
|
| + login, PasswordFormManager::ALLOW_OTHER_POSSIBLE_USERNAMES);
|
|
|
| EXPECT_FALSE(manager->IsNewLogin());
|
| manager->Save();
|
| - content::RunAllPendingInMessageLoop();
|
| + RunAllPendingTasks();
|
|
|
| // Should be only one password stored, and should not have
|
| // |other_possible_usernames| set anymore.
|
| @@ -433,31 +417,26 @@ TEST_F(PasswordFormManagerTest, TestAlternateUsername) {
|
| ASSERT_EQ(1U, passwords[saved_match()->signon_realm].size());
|
| EXPECT_EQ(saved_match()->username_value,
|
| passwords[saved_match()->signon_realm][0].username_value);
|
| - EXPECT_EQ(
|
| - 0U,
|
| - passwords[saved_match()->signon_realm][0].
|
| - other_possible_usernames.size());
|
| + EXPECT_EQ(0U,
|
| + passwords[saved_match()->signon_realm][0]
|
| + .other_possible_usernames.size());
|
|
|
| // This time use an alternate username
|
| - manager.reset(new PasswordFormManager(&password_manager,
|
| - &client,
|
| - client.GetDriver(),
|
| - *observed_form(),
|
| - false));
|
| + manager.reset(new PasswordFormManager(
|
| + &password_manager, &client, client.GetDriver(), *observed_form(), false));
|
| password_store->Clear();
|
| password_store->AddLogin(*saved_match());
|
| manager->FetchMatchingLoginsFromPasswordStore(PasswordStore::ALLOW_PROMPT);
|
| - content::RunAllPendingInMessageLoop();
|
| + RunAllPendingTasks();
|
|
|
| base::string16 new_username = saved_match()->other_possible_usernames[0];
|
| login.username_value = new_username;
|
| manager->ProvisionallySave(
|
| - login,
|
| - PasswordFormManager::ALLOW_OTHER_POSSIBLE_USERNAMES);
|
| + login, PasswordFormManager::ALLOW_OTHER_POSSIBLE_USERNAMES);
|
|
|
| EXPECT_FALSE(manager->IsNewLogin());
|
| manager->Save();
|
| - content::RunAllPendingInMessageLoop();
|
| + RunAllPendingTasks();
|
|
|
| // |other_possible_usernames| should also be empty, but username_value should
|
| // be changed to match |new_username|
|
| @@ -466,10 +445,9 @@ TEST_F(PasswordFormManagerTest, TestAlternateUsername) {
|
| ASSERT_EQ(1U, passwords[saved_match()->signon_realm].size());
|
| EXPECT_EQ(new_username,
|
| passwords[saved_match()->signon_realm][0].username_value);
|
| - EXPECT_EQ(
|
| - 0U,
|
| - passwords[saved_match()->signon_realm][0].
|
| - other_possible_usernames.size());
|
| + EXPECT_EQ(0U,
|
| + passwords[saved_match()->signon_realm][0]
|
| + .other_possible_usernames.size());
|
| password_store->Shutdown();
|
| }
|
|
|
| @@ -543,14 +521,10 @@ TEST_F(PasswordFormManagerTest, TestSendNotBlacklistedMessage) {
|
| base::MessageLoop message_loop;
|
|
|
| // A dumb password manager.
|
| - TestPasswordManagerClient client(profile(), NULL);
|
| + TestPasswordManagerClient client(NULL);
|
| TestPasswordManager password_manager(&client);
|
| - scoped_ptr<PasswordFormManager> manager(
|
| - new PasswordFormManager(&password_manager,
|
| - &client,
|
| - client.GetDriver(),
|
| - *observed_form(),
|
| - false));
|
| + scoped_ptr<PasswordFormManager> manager(new PasswordFormManager(
|
| + &password_manager, &client, client.GetDriver(), *observed_form(), false));
|
|
|
| // First time sign up attempt; No login result is found from password store;
|
| // We should send the not blacklisted message.
|
| @@ -564,11 +538,8 @@ TEST_F(PasswordFormManagerTest, TestSendNotBlacklistedMessage) {
|
| // Sign up attempt to previously visited sites; Login result is found from
|
| // password store, and is not blacklisted; We should send the not blacklisted
|
| // message.
|
| - manager.reset(new PasswordFormManager(&password_manager,
|
| - &client,
|
| - client.GetDriver(),
|
| - *observed_form(),
|
| - false));
|
| + manager.reset(new PasswordFormManager(
|
| + &password_manager, &client, client.GetDriver(), *observed_form(), false));
|
| EXPECT_CALL(*client.GetMockDriver(), AllowPasswordGenerationForForm(_))
|
| .Times(1);
|
| SimulateFetchMatchingLoginsFromPasswordStore(manager.get());
|
| @@ -580,11 +551,8 @@ TEST_F(PasswordFormManagerTest, TestSendNotBlacklistedMessage) {
|
| // Sign up attempt to previously visited sites; Login result is found from
|
| // password store, but is blacklisted; We should not send the not blacklisted
|
| // message.
|
| - manager.reset(new PasswordFormManager(&password_manager,
|
| - &client,
|
| - client.GetDriver(),
|
| - *observed_form(),
|
| - false));
|
| + manager.reset(new PasswordFormManager(
|
| + &password_manager, &client, client.GetDriver(), *observed_form(), false));
|
| EXPECT_CALL(*client.GetMockDriver(), AllowPasswordGenerationForForm(_))
|
| .Times(0);
|
| SimulateFetchMatchingLoginsFromPasswordStore(manager.get());
|
| @@ -597,14 +565,10 @@ TEST_F(PasswordFormManagerTest, TestSendNotBlacklistedMessage) {
|
| TEST_F(PasswordFormManagerTest, TestForceInclusionOfGeneratedPasswords) {
|
| base::MessageLoop message_loop;
|
|
|
| - TestPasswordManagerClient client(profile(), NULL);
|
| + TestPasswordManagerClient client(NULL);
|
| TestPasswordManager password_manager(&client);
|
| - scoped_ptr<PasswordFormManager> manager(
|
| - new PasswordFormManager(&password_manager,
|
| - &client,
|
| - client.GetDriver(),
|
| - *observed_form(),
|
| - false));
|
| + scoped_ptr<PasswordFormManager> manager(new PasswordFormManager(
|
| + &password_manager, &client, client.GetDriver(), *observed_form(), false));
|
|
|
| // Simulate having two matches for this origin, one of which was from a form
|
| // with different HTML tags for elements. Because of scoring differences,
|
| @@ -622,11 +586,8 @@ TEST_F(PasswordFormManagerTest, TestForceInclusionOfGeneratedPasswords) {
|
|
|
| // Same thing, except this time the credentials that don't match quite as
|
| // well are generated. They should now be sent to Autofill().
|
| - manager.reset(new PasswordFormManager(&password_manager,
|
| - &client,
|
| - client.GetDriver(),
|
| - *observed_form(),
|
| - false));
|
| + manager.reset(new PasswordFormManager(
|
| + &password_manager, &client, client.GetDriver(), *observed_form(), false));
|
| results.push_back(CreateSavedMatch(false));
|
| results.push_back(CreateSavedMatch(false));
|
| results[1]->username_value = ASCIIToUTF16("other@gmail.com");
|
| @@ -640,7 +601,7 @@ TEST_F(PasswordFormManagerTest, TestForceInclusionOfGeneratedPasswords) {
|
|
|
| TEST_F(PasswordFormManagerTest, TestSanitizePossibleUsernames) {
|
| scoped_ptr<TestPasswordManagerClient> client(
|
| - new TestPasswordManagerClient(profile(), NULL));
|
| + new TestPasswordManagerClient(NULL));
|
| scoped_ptr<MockPasswordManagerDriver> driver;
|
| scoped_ptr<PasswordFormManager> manager(new PasswordFormManager(
|
| NULL, client.get(), driver.get(), *observed_form(), false));
|
| @@ -689,23 +650,19 @@ TEST_F(PasswordFormManagerTest, TestUpdateIncompleteCredentials) {
|
| encountered_form.password_element = ASCIIToUTF16("Passwd");
|
| encountered_form.submit_element = ASCIIToUTF16("signIn");
|
|
|
| - TestPasswordManagerClient client(profile(), mock_store());
|
| + TestPasswordManagerClient client(mock_store());
|
| MockPasswordManagerDriver driver;
|
| EXPECT_CALL(driver, IsOffTheRecord()).WillRepeatedly(Return(false));
|
| EXPECT_CALL(driver, AllowPasswordGenerationForForm(_));
|
|
|
| TestPasswordManager manager(&client);
|
| - PasswordFormManager form_manager(&manager,
|
| - &client,
|
| - &driver,
|
| - encountered_form,
|
| - false);
|
| + PasswordFormManager form_manager(
|
| + &manager, &client, &driver, encountered_form, false);
|
|
|
| const PasswordStore::AuthorizationPromptPolicy auth_policy =
|
| PasswordStore::DISALLOW_PROMPT;
|
| - EXPECT_CALL(*mock_store(), GetLogins(encountered_form,
|
| - auth_policy,
|
| - &form_manager));
|
| + EXPECT_CALL(*mock_store(),
|
| + GetLogins(encountered_form, auth_policy, &form_manager));
|
| form_manager.FetchMatchingLoginsFromPasswordStore(auth_policy);
|
|
|
| // Password store only has these incomplete credentials.
|
| @@ -734,7 +691,7 @@ TEST_F(PasswordFormManagerTest, TestUpdateIncompleteCredentials) {
|
| form_manager.OnRequestDone(results);
|
|
|
| form_manager.ProvisionallySave(
|
| - complete_form, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| + complete_form, PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
|
| // By now that form has been used once.
|
| complete_form.times_used = 1;
|
|
|
|
|