| Index: chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc
|
| diff --git a/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc b/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc
|
| index 1bd6eb9bf899a466f8e57296d63f99295755fb0c..b32dee12bc7c3d061ac952f877e258adce8a3f1a 100644
|
| --- a/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc
|
| +++ b/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc
|
| @@ -15,7 +15,7 @@
|
| #include "chrome/browser/policy/mock_configuration_policy_provider.h"
|
| #include "chrome/browser/policy/policy_map.h"
|
| #include "chrome/browser/policy/policy_service_impl.h"
|
| -#include "chromeos/network/mock_certificate_handler.h"
|
| +#include "chromeos/network/onc/mock_certificate_importer.h"
|
| #include "chromeos/network/onc/onc_constants.h"
|
| #include "chromeos/network/onc/onc_test_utils.h"
|
| #include "chromeos/network/onc/onc_utils.h"
|
| @@ -180,16 +180,17 @@ TEST_F(NetworkConfigurationUpdaterTest, PolicyIsValidatedAndRepaired) {
|
|
|
| // Ignore the device policy update.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(_, _));
|
| - StrictMock<chromeos::MockCertificateHandler>* certificate_handler =
|
| - new StrictMock<chromeos::MockCertificateHandler>();
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _));
|
| + StrictMock<chromeos::onc::MockCertificateImporter>* certificate_importer =
|
| + new StrictMock<chromeos::onc::MockCertificateImporter>();
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(_, _, _));
|
|
|
| NetworkConfigurationUpdaterImplCros updater(
|
| policy_service_.get(),
|
| &network_library_,
|
| - make_scoped_ptr<chromeos::CertificateHandler>(certificate_handler));
|
| + make_scoped_ptr<chromeos::onc::CertificateImporter>(
|
| + certificate_importer));
|
| Mock::VerifyAndClearExpectations(&network_library_);
|
| - Mock::VerifyAndClearExpectations(&certificate_handler);
|
| + Mock::VerifyAndClearExpectations(&certificate_importer);
|
|
|
| // After the user policy is initialized, we always push both policies to the
|
| // NetworkLibrary. Ignore the device policy.
|
| @@ -198,10 +199,10 @@ TEST_F(NetworkConfigurationUpdaterTest, PolicyIsValidatedAndRepaired) {
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(network_configs_repaired),
|
| onc::ONC_SOURCE_USER_POLICY));
|
| - EXPECT_CALL(*certificate_handler,
|
| + EXPECT_CALL(*certificate_importer,
|
| ImportCertificates(_, chromeos::onc::ONC_SOURCE_DEVICE_POLICY,
|
| _));
|
| - EXPECT_CALL(*certificate_handler,
|
| + EXPECT_CALL(*certificate_importer,
|
| ImportCertificates(_, chromeos::onc::ONC_SOURCE_USER_POLICY,
|
| _));
|
|
|
| @@ -244,28 +245,29 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, InitialUpdates) {
|
|
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(device_networks), onc::ONC_SOURCE_DEVICE_POLICY));
|
| - StrictMock<chromeos::MockCertificateHandler>* certificate_handler =
|
| - new StrictMock<chromeos::MockCertificateHandler>();
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(
|
| + StrictMock<chromeos::onc::MockCertificateImporter>* certificate_importer =
|
| + new StrictMock<chromeos::onc::MockCertificateImporter>();
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(
|
| IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _));
|
|
|
| NetworkConfigurationUpdaterImplCros updater(
|
| policy_service_.get(),
|
| &network_library_,
|
| - make_scoped_ptr<chromeos::CertificateHandler>(certificate_handler));
|
| + make_scoped_ptr<chromeos::onc::CertificateImporter>(
|
| + certificate_importer));
|
| Mock::VerifyAndClearExpectations(&network_library_);
|
| - Mock::VerifyAndClearExpectations(&certificate_handler);
|
| + Mock::VerifyAndClearExpectations(&certificate_importer);
|
|
|
| // After the user policy is initialized, we always push both policies to the
|
| // NetworkLibrary.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(device_networks), onc::ONC_SOURCE_DEVICE_POLICY));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(
|
| IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _));
|
|
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(user_networks), onc::ONC_SOURCE_USER_POLICY));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(
|
| IsEqualTo(user_certs), onc::ONC_SOURCE_USER_POLICY, _));
|
|
|
| EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_));
|
| @@ -289,14 +291,15 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam,
|
| ASSERT_EQ(1u, cert_list.size());
|
|
|
| EXPECT_CALL(network_library_, LoadOncNetworks(_, _)).Times(AnyNumber());
|
| - StrictMock<chromeos::MockCertificateHandler>* certificate_handler =
|
| - new StrictMock<chromeos::MockCertificateHandler>();
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _))
|
| + StrictMock<chromeos::onc::MockCertificateImporter>* certificate_importer =
|
| + new StrictMock<chromeos::onc::MockCertificateImporter>();
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(_, _, _))
|
| .WillRepeatedly(SetCertificateList(empty_cert_list));
|
| NetworkConfigurationUpdaterImplCros updater(
|
| policy_service_.get(),
|
| &network_library_,
|
| - make_scoped_ptr<chromeos::CertificateHandler>(certificate_handler));
|
| + make_scoped_ptr<chromeos::onc::CertificateImporter>(
|
| + certificate_importer));
|
| net::CertTrustAnchorProvider* trust_provider =
|
| updater.GetCertTrustAnchorProvider();
|
| ASSERT_TRUE(trust_provider);
|
| @@ -308,17 +311,17 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam,
|
| updater.SetUserPolicyService(false, "hash", policy_service_.get());
|
| content::RunAllPendingInMessageLoop(content::BrowserThread::IO);
|
| Mock::VerifyAndClearExpectations(&network_library_);
|
| - Mock::VerifyAndClearExpectations(&certificate_handler);
|
| + Mock::VerifyAndClearExpectations(&certificate_importer);
|
| EXPECT_TRUE(trust_provider->GetAdditionalTrustAnchors().empty());
|
|
|
| // Certificates with the "Web" trust flag set should be forwarded to the
|
| // trust provider.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(_, _));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _))
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(_, _, _))
|
| .WillRepeatedly(SetCertificateList(empty_cert_list));
|
| onc::ONCSource current_source = NameToONCSource(GetParam());
|
| EXPECT_CALL(network_library_, LoadOncNetworks(_, current_source));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(_, current_source, _))
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(_, current_source, _))
|
| .WillRepeatedly(SetCertificateList(cert_list));
|
| // Trigger a new policy load, and spin the IO message loop to pass the
|
| // certificates to the |trust_provider| on the IO thread.
|
| @@ -326,7 +329,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam,
|
| base::RunLoop loop;
|
| loop.RunUntilIdle();
|
| Mock::VerifyAndClearExpectations(&network_library_);
|
| - Mock::VerifyAndClearExpectations(&certificate_handler);
|
| + Mock::VerifyAndClearExpectations(&certificate_importer);
|
|
|
| // Certificates are only provided as trust anchors if they come from user
|
| // policy.
|
| @@ -346,29 +349,30 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) {
|
| // Ignore the initial updates.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(_, _))
|
| .Times(AnyNumber());
|
| - StrictMock<chromeos::MockCertificateHandler>* certificate_handler =
|
| - new StrictMock<chromeos::MockCertificateHandler>();
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _))
|
| + StrictMock<chromeos::onc::MockCertificateImporter>* certificate_importer =
|
| + new StrictMock<chromeos::onc::MockCertificateImporter>();
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(_, _, _))
|
| .Times(AnyNumber());
|
| NetworkConfigurationUpdaterImplCros updater(
|
| policy_service_.get(),
|
| &network_library_,
|
| - make_scoped_ptr<chromeos::CertificateHandler>(certificate_handler));
|
| + make_scoped_ptr<chromeos::onc::CertificateImporter>(
|
| + certificate_importer));
|
| updater.SetUserPolicyService(false, "hash", policy_service_.get());
|
| Mock::VerifyAndClearExpectations(&network_library_);
|
| - Mock::VerifyAndClearExpectations(&certificate_handler);
|
| + Mock::VerifyAndClearExpectations(&certificate_importer);
|
|
|
| // We should update if policy changes.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(fake_network_configs_.get()), NameToONCSource(GetParam())));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(
|
| IsEqualTo(fake_certificates_.get()), NameToONCSource(GetParam()), _));
|
|
|
| // In the current implementation, we always apply both policies.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(empty_network_configs_.get()),
|
| Ne(NameToONCSource(GetParam()))));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(
|
| IsEqualTo(empty_certificates_.get()),
|
| Ne(NameToONCSource(GetParam())),
|
| _));
|
| @@ -378,14 +382,14 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) {
|
| Value::CreateStringValue(kFakeONC), NULL);
|
| UpdateProviderPolicy(policy);
|
| Mock::VerifyAndClearExpectations(&network_library_);
|
| - Mock::VerifyAndClearExpectations(&certificate_handler);
|
| + Mock::VerifyAndClearExpectations(&certificate_importer);
|
|
|
| // Another update is expected if the policy goes away. In the current
|
| // implementation, we always apply both policies.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(empty_network_configs_.get()),
|
| onc::ONC_SOURCE_DEVICE_POLICY));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(
|
| IsEqualTo(empty_certificates_.get()),
|
| onc::ONC_SOURCE_DEVICE_POLICY,
|
| _));
|
| @@ -393,7 +397,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) {
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| IsEqualTo(empty_network_configs_.get()),
|
| onc::ONC_SOURCE_USER_POLICY));
|
| - EXPECT_CALL(*certificate_handler, ImportCertificates(
|
| + EXPECT_CALL(*certificate_importer, ImportCertificates(
|
| IsEqualTo(empty_certificates_.get()),
|
| onc::ONC_SOURCE_USER_POLICY,
|
| _));
|
|
|