| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 #include <utility> | 6 #include <utility> |
| 7 | 7 |
| 8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
| 9 #include "base/macros.h" | 9 #include "base/macros.h" |
| 10 #include "base/memory/ptr_util.h" | 10 #include "base/memory/ptr_util.h" |
| (...skipping 2031 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2042 content::RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); | 2042 content::RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| 2043 | 2043 |
| 2044 IPC::IpcSecurityTestUtil::PwnMessageReceived( | 2044 IPC::IpcSecurityTestUtil::PwnMessageReceived( |
| 2045 iframe->GetProcess()->GetChannel(), illegal_forms_parsed); | 2045 iframe->GetProcess()->GetChannel(), illegal_forms_parsed); |
| 2046 | 2046 |
| 2047 iframe_killed.Wait(); | 2047 iframe_killed.Wait(); |
| 2048 } | 2048 } |
| 2049 | 2049 |
| 2050 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2050 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2051 ChangePwdNoAccountStored) { | 2051 ChangePwdNoAccountStored) { |
| 2052 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2053 NavigateToFile("/password/password_form.html"); | 2052 NavigateToFile("/password/password_form.html"); |
| 2054 | 2053 |
| 2055 // Fill a form and submit through a <input type="submit"> button. | 2054 // Fill a form and submit through a <input type="submit"> button. |
| 2056 NavigationObserver observer(WebContents()); | 2055 NavigationObserver observer(WebContents()); |
| 2057 std::unique_ptr<PromptObserver> prompt_observer( | 2056 std::unique_ptr<PromptObserver> prompt_observer( |
| 2058 PromptObserver::Create(WebContents())); | 2057 PromptObserver::Create(WebContents())); |
| 2059 | 2058 |
| 2060 std::string fill_and_submit = | 2059 std::string fill_and_submit = |
| 2061 "document.getElementById('chg_password_wo_username_field').value = " | 2060 "document.getElementById('chg_password_wo_username_field').value = " |
| 2062 "'old_pw';" | 2061 "'old_pw';" |
| (...skipping 17 matching lines...) Expand all Loading... |
| 2080 // the password. | 2079 // the password. |
| 2081 base::RunLoop run_loop; | 2080 base::RunLoop run_loop; |
| 2082 run_loop.RunUntilIdle(); | 2081 run_loop.RunUntilIdle(); |
| 2083 EXPECT_FALSE(password_store->IsEmpty()); | 2082 EXPECT_FALSE(password_store->IsEmpty()); |
| 2084 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16(""), | 2083 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16(""), |
| 2085 base::ASCIIToUTF16("new_pw")); | 2084 base::ASCIIToUTF16("new_pw")); |
| 2086 } | 2085 } |
| 2087 | 2086 |
| 2088 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2087 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2089 ChangePwd1AccountStored) { | 2088 ChangePwd1AccountStored) { |
| 2090 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2091 // At first let us save credentials to the PasswordManager. | 2089 // At first let us save credentials to the PasswordManager. |
| 2092 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2090 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2093 static_cast<password_manager::TestPasswordStore*>( | 2091 static_cast<password_manager::TestPasswordStore*>( |
| 2094 PasswordStoreFactory::GetForProfile( | 2092 PasswordStoreFactory::GetForProfile( |
| 2095 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2093 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2096 .get()); | 2094 .get()); |
| 2097 autofill::PasswordForm signin_form; | 2095 autofill::PasswordForm signin_form; |
| 2098 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2096 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2099 signin_form.password_value = base::ASCIIToUTF16("pw"); | 2097 signin_form.password_value = base::ASCIIToUTF16("pw"); |
| 2100 signin_form.username_value = base::ASCIIToUTF16("temp"); | 2098 signin_form.username_value = base::ASCIIToUTF16("temp"); |
| (...skipping 26 matching lines...) Expand all Loading... |
| 2127 // Spin the message loop to make sure the password store had a chance to | 2125 // Spin the message loop to make sure the password store had a chance to |
| 2128 // update the password. | 2126 // update the password. |
| 2129 base::RunLoop run_loop; | 2127 base::RunLoop run_loop; |
| 2130 run_loop.RunUntilIdle(); | 2128 run_loop.RunUntilIdle(); |
| 2131 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), | 2129 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), |
| 2132 base::ASCIIToUTF16("new_pw")); | 2130 base::ASCIIToUTF16("new_pw")); |
| 2133 } | 2131 } |
| 2134 | 2132 |
| 2135 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2133 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2136 PasswordOverridenUpdateBubbleShown) { | 2134 PasswordOverridenUpdateBubbleShown) { |
| 2137 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2138 // At first let us save credentials to the PasswordManager. | 2135 // At first let us save credentials to the PasswordManager. |
| 2139 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2136 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2140 static_cast<password_manager::TestPasswordStore*>( | 2137 static_cast<password_manager::TestPasswordStore*>( |
| 2141 PasswordStoreFactory::GetForProfile( | 2138 PasswordStoreFactory::GetForProfile( |
| 2142 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2139 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2143 .get()); | 2140 .get()); |
| 2144 autofill::PasswordForm signin_form; | 2141 autofill::PasswordForm signin_form; |
| 2145 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2142 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2146 signin_form.username_value = base::ASCIIToUTF16("temp"); | 2143 signin_form.username_value = base::ASCIIToUTF16("temp"); |
| 2147 signin_form.password_value = base::ASCIIToUTF16("pw"); | 2144 signin_form.password_value = base::ASCIIToUTF16("pw"); |
| (...skipping 20 matching lines...) Expand all Loading... |
| 2168 // Spin the message loop to make sure the password store had a chance to | 2165 // Spin the message loop to make sure the password store had a chance to |
| 2169 // update the password. | 2166 // update the password. |
| 2170 base::RunLoop run_loop; | 2167 base::RunLoop run_loop; |
| 2171 run_loop.RunUntilIdle(); | 2168 run_loop.RunUntilIdle(); |
| 2172 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), | 2169 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), |
| 2173 base::ASCIIToUTF16("new_pw")); | 2170 base::ASCIIToUTF16("new_pw")); |
| 2174 } | 2171 } |
| 2175 | 2172 |
| 2176 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2173 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2177 PasswordNotOverridenUpdateBubbleNotShown) { | 2174 PasswordNotOverridenUpdateBubbleNotShown) { |
| 2178 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2179 // At first let us save credentials to the PasswordManager. | 2175 // At first let us save credentials to the PasswordManager. |
| 2180 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2176 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2181 static_cast<password_manager::TestPasswordStore*>( | 2177 static_cast<password_manager::TestPasswordStore*>( |
| 2182 PasswordStoreFactory::GetForProfile( | 2178 PasswordStoreFactory::GetForProfile( |
| 2183 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2179 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2184 .get()); | 2180 .get()); |
| 2185 autofill::PasswordForm signin_form; | 2181 autofill::PasswordForm signin_form; |
| 2186 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2182 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2187 signin_form.username_value = base::ASCIIToUTF16("temp"); | 2183 signin_form.username_value = base::ASCIIToUTF16("temp"); |
| 2188 signin_form.password_value = base::ASCIIToUTF16("pw"); | 2184 signin_form.password_value = base::ASCIIToUTF16("pw"); |
| (...skipping 12 matching lines...) Expand all Loading... |
| 2201 observer.Wait(); | 2197 observer.Wait(); |
| 2202 // The stored password "pw" was not overriden, so update prompt is not | 2198 // The stored password "pw" was not overriden, so update prompt is not |
| 2203 // expected. | 2199 // expected. |
| 2204 EXPECT_FALSE(prompt_observer->IsShowingUpdatePrompt()); | 2200 EXPECT_FALSE(prompt_observer->IsShowingUpdatePrompt()); |
| 2205 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), | 2201 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), |
| 2206 base::ASCIIToUTF16("pw")); | 2202 base::ASCIIToUTF16("pw")); |
| 2207 } | 2203 } |
| 2208 | 2204 |
| 2209 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2205 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2210 ChangePwdWhenTheFormContainNotUsernameTextfield) { | 2206 ChangePwdWhenTheFormContainNotUsernameTextfield) { |
| 2211 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2212 // At first let us save credentials to the PasswordManager. | 2207 // At first let us save credentials to the PasswordManager. |
| 2213 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2208 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2214 static_cast<password_manager::TestPasswordStore*>( | 2209 static_cast<password_manager::TestPasswordStore*>( |
| 2215 PasswordStoreFactory::GetForProfile( | 2210 PasswordStoreFactory::GetForProfile( |
| 2216 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2211 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2217 .get()); | 2212 .get()); |
| 2218 autofill::PasswordForm signin_form; | 2213 autofill::PasswordForm signin_form; |
| 2219 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2214 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2220 signin_form.password_value = base::ASCIIToUTF16("pw"); | 2215 signin_form.password_value = base::ASCIIToUTF16("pw"); |
| 2221 signin_form.username_value = base::ASCIIToUTF16("temp"); | 2216 signin_form.username_value = base::ASCIIToUTF16("temp"); |
| (...skipping 560 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2782 base::RunLoop run_loop; | 2777 base::RunLoop run_loop; |
| 2783 run_loop.RunUntilIdle(); | 2778 run_loop.RunUntilIdle(); |
| 2784 CheckThatCredentialsStored(password_store.get(), base::string16(), | 2779 CheckThatCredentialsStored(password_store.get(), base::string16(), |
| 2785 base::ASCIIToUTF16("pw")); | 2780 base::ASCIIToUTF16("pw")); |
| 2786 } | 2781 } |
| 2787 | 2782 |
| 2788 // Tests that no bubble shown when a password form without username submitted | 2783 // Tests that no bubble shown when a password form without username submitted |
| 2789 // and there is stored credentials with the same password. | 2784 // and there is stored credentials with the same password. |
| 2790 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2785 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2791 PasswordRetryFormNoBubbleWhenPasswordTheSame) { | 2786 PasswordRetryFormNoBubbleWhenPasswordTheSame) { |
| 2792 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2793 // At first let us save credentials to the PasswordManager. | 2787 // At first let us save credentials to the PasswordManager. |
| 2794 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2788 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2795 static_cast<password_manager::TestPasswordStore*>( | 2789 static_cast<password_manager::TestPasswordStore*>( |
| 2796 PasswordStoreFactory::GetForProfile( | 2790 PasswordStoreFactory::GetForProfile( |
| 2797 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2791 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2798 .get()); | 2792 .get()); |
| 2799 autofill::PasswordForm signin_form; | 2793 autofill::PasswordForm signin_form; |
| 2800 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2794 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2801 signin_form.username_value = base::ASCIIToUTF16("temp"); | 2795 signin_form.username_value = base::ASCIIToUTF16("temp"); |
| 2802 signin_form.password_value = base::ASCIIToUTF16("pw"); | 2796 signin_form.password_value = base::ASCIIToUTF16("pw"); |
| (...skipping 14 matching lines...) Expand all Loading... |
| 2817 ASSERT_TRUE(content::ExecuteScript(RenderViewHost(), fill_and_submit)); | 2811 ASSERT_TRUE(content::ExecuteScript(RenderViewHost(), fill_and_submit)); |
| 2818 observer.Wait(); | 2812 observer.Wait(); |
| 2819 EXPECT_FALSE(prompt_observer->IsShowingPrompt()); | 2813 EXPECT_FALSE(prompt_observer->IsShowingPrompt()); |
| 2820 EXPECT_FALSE(prompt_observer->IsShowingUpdatePrompt()); | 2814 EXPECT_FALSE(prompt_observer->IsShowingUpdatePrompt()); |
| 2821 } | 2815 } |
| 2822 | 2816 |
| 2823 // Tests that the update bubble shown when a password form without username is | 2817 // Tests that the update bubble shown when a password form without username is |
| 2824 // submitted and there are stored credentials but with different password. | 2818 // submitted and there are stored credentials but with different password. |
| 2825 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2819 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2826 PasswordRetryFormUpdateBubbleShown) { | 2820 PasswordRetryFormUpdateBubbleShown) { |
| 2827 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2828 // At first let us save credentials to the PasswordManager. | 2821 // At first let us save credentials to the PasswordManager. |
| 2829 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2822 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2830 static_cast<password_manager::TestPasswordStore*>( | 2823 static_cast<password_manager::TestPasswordStore*>( |
| 2831 PasswordStoreFactory::GetForProfile( | 2824 PasswordStoreFactory::GetForProfile( |
| 2832 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2825 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2833 .get()); | 2826 .get()); |
| 2834 autofill::PasswordForm signin_form; | 2827 autofill::PasswordForm signin_form; |
| 2835 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2828 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2836 signin_form.username_value = base::ASCIIToUTF16("temp"); | 2829 signin_form.username_value = base::ASCIIToUTF16("temp"); |
| 2837 signin_form.password_value = base::ASCIIToUTF16("pw"); | 2830 signin_form.password_value = base::ASCIIToUTF16("pw"); |
| (...skipping 18 matching lines...) Expand all Loading... |
| 2856 // Spin the message loop to make sure the password store had a chance to | 2849 // Spin the message loop to make sure the password store had a chance to |
| 2857 // update the password. | 2850 // update the password. |
| 2858 base::RunLoop run_loop; | 2851 base::RunLoop run_loop; |
| 2859 run_loop.RunUntilIdle(); | 2852 run_loop.RunUntilIdle(); |
| 2860 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), | 2853 CheckThatCredentialsStored(password_store.get(), base::ASCIIToUTF16("temp"), |
| 2861 base::ASCIIToUTF16("new_pw")); | 2854 base::ASCIIToUTF16("new_pw")); |
| 2862 } | 2855 } |
| 2863 | 2856 |
| 2864 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2857 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2865 NoCrashWhenNavigatingWithOpenAccountPicker) { | 2858 NoCrashWhenNavigatingWithOpenAccountPicker) { |
| 2866 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2867 // Save credentials with 'skip_zero_click'. | 2859 // Save credentials with 'skip_zero_click'. |
| 2868 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2860 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2869 static_cast<password_manager::TestPasswordStore*>( | 2861 static_cast<password_manager::TestPasswordStore*>( |
| 2870 PasswordStoreFactory::GetForProfile( | 2862 PasswordStoreFactory::GetForProfile( |
| 2871 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2863 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2872 .get()); | 2864 .get()); |
| 2873 autofill::PasswordForm signin_form; | 2865 autofill::PasswordForm signin_form; |
| 2874 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2866 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2875 signin_form.password_value = base::ASCIIToUTF16("password"); | 2867 signin_form.password_value = base::ASCIIToUTF16("password"); |
| 2876 signin_form.username_value = base::ASCIIToUTF16("user"); | 2868 signin_form.username_value = base::ASCIIToUTF16("user"); |
| (...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2919 "document.getElementById('password').value = 'mypassword';" | 2911 "document.getElementById('password').value = 'mypassword';" |
| 2920 "document.getElementById('submit').click();"; | 2912 "document.getElementById('submit').click();"; |
| 2921 VerifyPasswordIsSavedAndFilled( | 2913 VerifyPasswordIsSavedAndFilled( |
| 2922 "/password/password_autocomplete_off_test.html", submit, "password", | 2914 "/password/password_autocomplete_off_test.html", submit, "password", |
| 2923 "mypassword"); | 2915 "mypassword"); |
| 2924 } | 2916 } |
| 2925 | 2917 |
| 2926 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2918 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2927 SkipZeroClickNotToggledAfterSuccessfulSubmissionWithAPI) | 2919 SkipZeroClickNotToggledAfterSuccessfulSubmissionWithAPI) |
| 2928 { | 2920 { |
| 2929 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2930 // Save credentials with 'skip_zero_click' | 2921 // Save credentials with 'skip_zero_click' |
| 2931 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2922 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2932 static_cast<password_manager::TestPasswordStore*>( | 2923 static_cast<password_manager::TestPasswordStore*>( |
| 2933 PasswordStoreFactory::GetForProfile( | 2924 PasswordStoreFactory::GetForProfile( |
| 2934 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2925 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2935 .get()); | 2926 .get()); |
| 2936 autofill::PasswordForm signin_form; | 2927 autofill::PasswordForm signin_form; |
| 2937 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2928 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2938 signin_form.password_value = base::ASCIIToUTF16("password"); | 2929 signin_form.password_value = base::ASCIIToUTF16("password"); |
| 2939 signin_form.username_value = base::ASCIIToUTF16("user"); | 2930 signin_form.username_value = base::ASCIIToUTF16("user"); |
| (...skipping 26 matching lines...) Expand all Loading... |
| 2966 auto& passwords_vector = passwords_map.begin()->second; | 2957 auto& passwords_vector = passwords_map.begin()->second; |
| 2967 ASSERT_EQ(1u, passwords_vector.size()); | 2958 ASSERT_EQ(1u, passwords_vector.size()); |
| 2968 const autofill::PasswordForm& form = passwords_vector[0]; | 2959 const autofill::PasswordForm& form = passwords_vector[0]; |
| 2969 EXPECT_EQ(base::ASCIIToUTF16("user"), form.username_value); | 2960 EXPECT_EQ(base::ASCIIToUTF16("user"), form.username_value); |
| 2970 EXPECT_EQ(base::ASCIIToUTF16("password"), form.password_value); | 2961 EXPECT_EQ(base::ASCIIToUTF16("password"), form.password_value); |
| 2971 EXPECT_TRUE(form.skip_zero_click); | 2962 EXPECT_TRUE(form.skip_zero_click); |
| 2972 } | 2963 } |
| 2973 | 2964 |
| 2974 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, | 2965 IN_PROC_BROWSER_TEST_F(PasswordManagerBrowserTestBase, |
| 2975 SkipZeroClickNotToggledAfterSuccessfulAutofill) { | 2966 SkipZeroClickNotToggledAfterSuccessfulAutofill) { |
| 2976 ASSERT_TRUE(ChromePasswordManagerClient::IsTheHotNewBubbleUIEnabled()); | |
| 2977 // Save credentials with 'skip_zero_click' | 2967 // Save credentials with 'skip_zero_click' |
| 2978 scoped_refptr<password_manager::TestPasswordStore> password_store = | 2968 scoped_refptr<password_manager::TestPasswordStore> password_store = |
| 2979 static_cast<password_manager::TestPasswordStore*>( | 2969 static_cast<password_manager::TestPasswordStore*>( |
| 2980 PasswordStoreFactory::GetForProfile( | 2970 PasswordStoreFactory::GetForProfile( |
| 2981 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) | 2971 browser()->profile(), ServiceAccessType::IMPLICIT_ACCESS) |
| 2982 .get()); | 2972 .get()); |
| 2983 autofill::PasswordForm signin_form; | 2973 autofill::PasswordForm signin_form; |
| 2984 signin_form.signon_realm = embedded_test_server()->base_url().spec(); | 2974 signin_form.signon_realm = embedded_test_server()->base_url().spec(); |
| 2985 signin_form.password_value = base::ASCIIToUTF16("password"); | 2975 signin_form.password_value = base::ASCIIToUTF16("password"); |
| 2986 signin_form.username_value = base::ASCIIToUTF16("user"); | 2976 signin_form.username_value = base::ASCIIToUTF16("user"); |
| (...skipping 22 matching lines...) Expand all Loading... |
| 3009 ASSERT_EQ(1u, passwords_map.size()); | 2999 ASSERT_EQ(1u, passwords_map.size()); |
| 3010 auto& passwords_vector = passwords_map.begin()->second; | 3000 auto& passwords_vector = passwords_map.begin()->second; |
| 3011 ASSERT_EQ(1u, passwords_vector.size()); | 3001 ASSERT_EQ(1u, passwords_vector.size()); |
| 3012 const autofill::PasswordForm& form = passwords_vector[0]; | 3002 const autofill::PasswordForm& form = passwords_vector[0]; |
| 3013 EXPECT_EQ(base::ASCIIToUTF16("user"), form.username_value); | 3003 EXPECT_EQ(base::ASCIIToUTF16("user"), form.username_value); |
| 3014 EXPECT_EQ(base::ASCIIToUTF16("password"), form.password_value); | 3004 EXPECT_EQ(base::ASCIIToUTF16("password"), form.password_value); |
| 3015 EXPECT_TRUE(form.skip_zero_click); | 3005 EXPECT_TRUE(form.skip_zero_click); |
| 3016 } | 3006 } |
| 3017 | 3007 |
| 3018 } // namespace password_manager | 3008 } // namespace password_manager |
| OLD | NEW |