| Index: components/password_manager/core/browser/password_form_manager_unittest.cc
|
| diff --git a/components/password_manager/core/browser/password_form_manager_unittest.cc b/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| index e6c0b93403163dcdd98c534578146eb3cb0182ea..56e79a16a067f0cfe07a36f47de63b16f23d45d1 100644
|
| --- a/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| +++ b/components/password_manager/core/browser/password_form_manager_unittest.cc
|
| @@ -416,7 +416,7 @@ class PasswordFormManagerTest : public testing::Test {
|
| password_manager_.reset(new PasswordManager(client_.get()));
|
| form_manager_.reset(new PasswordFormManager(
|
| password_manager_.get(), client_.get(), client_.get()->driver(),
|
| - observed_form_, false, base::WrapUnique(new MockFormSaver())));
|
| + observed_form_, base::WrapUnique(new MockFormSaver())));
|
| }
|
|
|
| void TearDown() override {
|
| @@ -458,7 +458,7 @@ class PasswordFormManagerTest : public testing::Test {
|
| form.form_data = observed_form_data;
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), form, false,
|
| + client()->driver(), form,
|
| base::WrapUnique(new MockFormSaver()));
|
| ScopedVector<PasswordForm> result;
|
| result.push_back(CreateSavedMatch(false));
|
| @@ -535,9 +535,9 @@ class PasswordFormManagerTest : public testing::Test {
|
| observed_form()->form_data.fields.push_back(field);
|
|
|
| client()->set_is_update_password_ui_enabled(true);
|
| - PasswordFormManager form_manager(
|
| - password_manager(), client(), client()->driver(), *observed_form(),
|
| - false, base::WrapUnique(new MockFormSaver()));
|
| + PasswordFormManager form_manager(password_manager(), client(),
|
| + client()->driver(), *observed_form(),
|
| + base::WrapUnique(new MockFormSaver()));
|
|
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH);
|
|
|
| @@ -665,7 +665,7 @@ class PasswordFormManagerTest : public testing::Test {
|
| }
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), form, false,
|
| + client()->driver(), form,
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| ScopedVector<PasswordForm> result;
|
| @@ -852,7 +852,7 @@ TEST_F(PasswordFormManagerTest, TestBlacklistMatching) {
|
| observed_form()->action = GURL("http://accounts.google.com/a/Login");
|
| observed_form()->signon_realm = "http://accounts.google.com";
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| form_manager.SimulateFetchMatchingLoginsFromPasswordStore();
|
|
|
| @@ -991,7 +991,7 @@ TEST_F(PasswordFormManagerTest, TestNewLoginFromNewPasswordElement) {
|
| observed_form()->username_marked_by_site = true;
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&form_manager, RESULT_NO_MATCH);
|
|
|
| @@ -1072,7 +1072,7 @@ TEST_F(PasswordFormManagerTest, TestUpdatePasswordFromNewPasswordElement) {
|
| saved_match()->submit_element.clear();
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH);
|
|
|
| @@ -1113,31 +1113,6 @@ TEST_F(PasswordFormManagerTest, TestUpdatePasswordFromNewPasswordElement) {
|
| EXPECT_EQ(saved_match()->submit_element, new_credentials.submit_element);
|
| }
|
|
|
| -TEST_F(PasswordFormManagerTest, TestIgnoreResult_SSL) {
|
| - const bool kObservedFormSSLValid = false;
|
| - PasswordFormManager form_manager(
|
| - password_manager(), client(), client()->driver(), *observed_form(),
|
| - kObservedFormSSLValid, base::WrapUnique(new MockFormSaver()));
|
| -
|
| - PasswordForm saved_form = *observed_form();
|
| - saved_form.ssl_valid = !kObservedFormSSLValid;
|
| - saved_form.username_value = ASCIIToUTF16("test1@gmail.com");
|
| - ScopedVector<PasswordForm> result;
|
| - result.push_back(new PasswordForm(saved_form));
|
| - saved_form.username_value = ASCIIToUTF16("test2@gmail.com");
|
| - result.push_back(new PasswordForm(saved_form));
|
| - saved_form.username_value = ASCIIToUTF16("test3@gmail.com");
|
| - saved_form.ssl_valid = kObservedFormSSLValid;
|
| - result.push_back(new PasswordForm(saved_form));
|
| - form_manager.SimulateFetchMatchingLoginsFromPasswordStore();
|
| - form_manager.OnGetPasswordStoreResults(std::move(result));
|
| -
|
| - // Make sure we don't match a PasswordForm if it was originally saved on
|
| - // an SSL-valid page and we are now on a page with invalid certificate.
|
| - EXPECT_EQ(1u, form_manager.best_matches().count(saved_form.username_value));
|
| - EXPECT_EQ(1u, form_manager.best_matches().size());
|
| -}
|
| -
|
| TEST_F(PasswordFormManagerTest, TestIgnoreResult_Paths) {
|
| PasswordForm observed(*observed_form());
|
| observed.origin = GURL("https://accounts.google.com/a/LoginAuth");
|
| @@ -1145,7 +1120,7 @@ TEST_F(PasswordFormManagerTest, TestIgnoreResult_Paths) {
|
| observed.signon_realm = "https://accounts.google.com";
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), observed, false,
|
| + client()->driver(), observed,
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| PasswordForm saved_form = observed;
|
| @@ -1167,7 +1142,7 @@ TEST_F(PasswordFormManagerTest, TestIgnoreResult_IgnoredCredentials) {
|
| observed.signon_realm = "https://accounts.google.com";
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), observed, false,
|
| + client()->driver(), observed,
|
| base::WrapUnique(new MockFormSaver()));
|
| client()->FilterAllResults();
|
|
|
| @@ -1334,7 +1309,7 @@ TEST_F(PasswordFormManagerTest,
|
| signup_form.new_password_element = base::ASCIIToUTF16("new_password_field");
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), signup_form, false,
|
| + client()->driver(), signup_form,
|
| base::WrapUnique(new MockFormSaver()));
|
| EXPECT_CALL(*(client()->mock_driver()), AllowPasswordGenerationForForm(_))
|
| .Times(1);
|
| @@ -1502,7 +1477,7 @@ TEST_F(PasswordFormManagerTest, TestUpdateIncompleteCredentials) {
|
| EXPECT_CALL(*(client()->mock_driver()), AllowPasswordGenerationForForm(_));
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), encountered_form, false,
|
| + client()->driver(), encountered_form,
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| EXPECT_CALL(*mock_store(), GetLogins(encountered_form, &form_manager));
|
| @@ -1515,7 +1490,6 @@ TEST_F(PasswordFormManagerTest, TestUpdateIncompleteCredentials) {
|
| incomplete_form->password_value = ASCIIToUTF16("my_password");
|
| incomplete_form->username_value = ASCIIToUTF16("my_username");
|
| incomplete_form->preferred = true;
|
| - incomplete_form->ssl_valid = false;
|
| incomplete_form->scheme = PasswordForm::SCHEME_HTML;
|
|
|
| // We expect to see this form eventually sent to the Password store. It
|
| @@ -1690,9 +1664,9 @@ TEST_F(PasswordFormManagerTest, InvalidActionURLsDoNotMatch) {
|
| PasswordFormManager::RESULT_ACTION_MATCH);
|
| // Then when the observed form has an invalid URL:
|
| PasswordForm valid_action_form(*observed_form());
|
| - PasswordFormManager invalid_manager(
|
| - password_manager(), client(), client()->driver(), invalid_action_form,
|
| - false, base::WrapUnique(new MockFormSaver()));
|
| + PasswordFormManager invalid_manager(password_manager(), client(),
|
| + client()->driver(), invalid_action_form,
|
| + base::WrapUnique(new MockFormSaver()));
|
| EXPECT_EQ(0,
|
| invalid_manager.DoesManage(valid_action_form) &
|
| PasswordFormManager::RESULT_ACTION_MATCH);
|
| @@ -1710,7 +1684,7 @@ TEST_F(PasswordFormManagerTest, EmptyActionURLsDoNotMatchNonEmpty) {
|
| PasswordForm valid_action_form(*observed_form());
|
| PasswordFormManager empty_action_manager(
|
| password_manager(), client(), client()->driver(), empty_action_form,
|
| - false, base::WrapUnique(new MockFormSaver()));
|
| + base::WrapUnique(new MockFormSaver()));
|
| EXPECT_EQ(0,
|
| empty_action_manager.DoesManage(valid_action_form) &
|
| PasswordFormManager::RESULT_ACTION_MATCH);
|
| @@ -1726,7 +1700,7 @@ TEST_F(PasswordFormManagerTest, NonHTMLFormsDoNotMatchHTMLForms) {
|
| // The other way round: observing a non-HTML form, don't match a HTML form.
|
| PasswordForm html_form(*observed_form());
|
| PasswordFormManager non_html_manager(password_manager(), client(), kNoDriver,
|
| - non_html_form, false,
|
| + non_html_form,
|
| base::WrapUnique(new MockFormSaver()));
|
| EXPECT_EQ(0, non_html_manager.DoesManage(html_form) &
|
| PasswordFormManager::RESULT_HTML_ATTRIBUTES_MATCH);
|
| @@ -1762,9 +1736,9 @@ TEST_F(PasswordFormManagerTest,
|
|
|
| PasswordForm secure_observed_form(*observed_form());
|
| secure_observed_form.origin = GURL("https://accounts.google.com/a/LoginAuth");
|
| - PasswordFormManager secure_manager(
|
| - password_manager(), client(), client()->driver(), secure_observed_form,
|
| - true, base::WrapUnique(new MockFormSaver()));
|
| + PasswordFormManager secure_manager(password_manager(), client(),
|
| + client()->driver(), secure_observed_form,
|
| + base::WrapUnique(new MockFormSaver()));
|
| // Also for HTTPS in the observed form, and HTTP in the compared form, an
|
| // exact path match is expected.
|
| EXPECT_EQ(0, secure_manager.DoesManage(form_longer_path) &
|
| @@ -1840,7 +1814,7 @@ TEST_F(PasswordFormManagerTest, UploadFormData_NewPassword) {
|
| // For newly saved passwords, upload a password vote for autofill::PASSWORD.
|
| // Don't vote for the username field yet.
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *saved_match(), false,
|
| + client()->driver(), *saved_match(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&form_manager, RESULT_NO_MATCH);
|
|
|
| @@ -1862,7 +1836,7 @@ TEST_F(PasswordFormManagerTest, UploadFormData_NewPassword) {
|
|
|
| // Do not upload a vote if the user is blacklisting the form.
|
| PasswordFormManager blacklist_form_manager(
|
| - password_manager(), client(), client()->driver(), *saved_match(), false,
|
| + password_manager(), client(), client()->driver(), *saved_match(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&blacklist_form_manager, RESULT_NO_MATCH);
|
|
|
| @@ -1958,7 +1932,7 @@ TEST_F(PasswordFormManagerTest, DriverDeletedBeforeStoreDone) {
|
| form->submit_element = ASCIIToUTF16("s");
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *form, false,
|
| + client()->driver(), *form,
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| EXPECT_CALL(*mock_store(), GetLogins(*form, &form_manager));
|
| @@ -2006,7 +1980,7 @@ TEST_F(PasswordFormManagerTest,
|
| base::ASCIIToUTF16("new_password_field");
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH);
|
|
|
| @@ -2103,10 +2077,9 @@ TEST_F(PasswordFormManagerTest, TestSuggestingPasswordChangeForms) {
|
| PasswordForm observed_change_password_form = *observed_form();
|
| observed_change_password_form.new_password_element =
|
| base::ASCIIToUTF16("new_pwd");
|
| - PasswordFormManager manager_creds(password_manager(), client(),
|
| - client()->driver(),
|
| - observed_change_password_form, false,
|
| - base::WrapUnique(new MockFormSaver()));
|
| + PasswordFormManager manager_creds(
|
| + password_manager(), client(), client()->driver(),
|
| + observed_change_password_form, base::WrapUnique(new MockFormSaver()));
|
| manager_creds.SimulateFetchMatchingLoginsFromPasswordStore();
|
| ScopedVector<PasswordForm> simulated_results;
|
| simulated_results.push_back(CreateSavedMatch(false));
|
| @@ -2142,7 +2115,7 @@ TEST_F(PasswordFormManagerTest, TestUpdateMethod) {
|
|
|
| client()->set_is_update_password_ui_enabled(true);
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH);
|
| @@ -2205,7 +2178,7 @@ TEST_F(PasswordFormManagerTest, TestUpdateNoUsernameTextfieldPresent) {
|
|
|
| client()->set_is_update_password_ui_enabled(true);
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH);
|
| @@ -2255,7 +2228,7 @@ TEST_F(PasswordFormManagerTest, WipeStoreCopyIfOutdated_BeforeStoreCallback) {
|
| ASSERT_FALSE(form.password_value.empty());
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), form, false,
|
| + client()->driver(), form,
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| // Do not notify the store observer after this GetLogins call.
|
| @@ -2449,7 +2422,7 @@ TEST_F(PasswordFormManagerTest, UploadChangePasswordForm_NOT_NEW_PASSWORD) {
|
|
|
| TEST_F(PasswordFormManagerTest, TestUpdatePSLMatchedCredentials) {
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH | RESULT_PSL_MATCH);
|
|
|
| @@ -2500,7 +2473,7 @@ TEST_F(PasswordFormManagerTest, TestUpdatePSLMatchedCredentials) {
|
| TEST_F(PasswordFormManagerTest,
|
| TestNotUpdatePSLMatchedCredentialsWithAnotherUsername) {
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| psl_saved_match()->username_value += ASCIIToUTF16("1");
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH | RESULT_PSL_MATCH);
|
| @@ -2540,7 +2513,7 @@ TEST_F(PasswordFormManagerTest,
|
| TEST_F(PasswordFormManagerTest,
|
| TestNotUpdatePSLMatchedCredentialsWithAnotherPassword) {
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| psl_saved_match()->password_value += ASCIIToUTF16("1");
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH | RESULT_PSL_MATCH);
|
| @@ -2579,7 +2552,7 @@ TEST_F(PasswordFormManagerTest,
|
|
|
| TEST_F(PasswordFormManagerTest, TestNotUpdateWhenOnlyPSLMatched) {
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&form_manager, RESULT_PSL_MATCH);
|
|
|
| @@ -2764,7 +2737,7 @@ TEST_F(PasswordFormManagerTest,
|
|
|
| client()->set_is_update_password_ui_enabled(true);
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH);
|
| @@ -2841,7 +2814,7 @@ TEST_F(PasswordFormManagerTest, FormClassifierVoteUpload) {
|
| submitted_form.password_value = saved_match()->password_value;
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), form, false,
|
| + client()->driver(), form,
|
| base::WrapUnique(new MockFormSaver()));
|
| base::string16 generation_element = form.password_element;
|
| if (found_generation_element)
|
| @@ -2875,7 +2848,7 @@ TEST_F(PasswordFormManagerTest, TestSavingAPIFormsWithSamePassword) {
|
| saved_match()->type = autofill::PasswordForm::TYPE_API;
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), *observed_form(), false,
|
| + client()->driver(), *observed_form(),
|
| base::WrapUnique(new MockFormSaver()));
|
| SimulateMatchingPhase(&form_manager, RESULT_SAVED_MATCH);
|
|
|
| @@ -2932,7 +2905,7 @@ TEST_F(PasswordFormManagerTest, ProbablyAccountCreationUpload) {
|
| form.form_data = saved_match()->form_data;
|
|
|
| PasswordFormManager form_manager(password_manager(), client(),
|
| - client()->driver(), form, false,
|
| + client()->driver(), form,
|
| base::WrapUnique(new MockFormSaver()));
|
|
|
| PasswordForm form_to_save(form);
|
|
|