Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6703)

Unified Diff: chrome/browser/password_manager/password_store_mac_unittest.cc

Issue 2323893002: Stop using the Keychain for passwords finally and clean up the Chrome entries there. (Closed)
Patch Set: add a comment Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/password_manager/password_store_mac_unittest.cc
diff --git a/chrome/browser/password_manager/password_store_mac_unittest.cc b/chrome/browser/password_manager/password_store_mac_unittest.cc
index ee95d538b7d3c0377984c0e85d83a7a33156f6c1..01ff2c3e919e55f06d99348f76b4c7698a5a834b 100644
--- a/chrome/browser/password_manager/password_store_mac_unittest.cc
+++ b/chrome/browser/password_manager/password_store_mac_unittest.cc
@@ -24,6 +24,7 @@
#include "components/os_crypt/os_crypt_mocker.h"
#include "components/password_manager/core/browser/login_database.h"
#include "components/password_manager/core/browser/password_manager_test_utils.h"
+#include "components/password_manager/core/browser/password_manager_util.h"
#include "components/password_manager/core/browser/password_store_consumer.h"
#include "components/password_manager/core/browser/password_store_origin_unittest.h"
#include "content/public/test/test_browser_thread.h"
@@ -2002,7 +2003,7 @@ TEST_F(PasswordStoreMacTest, ImportFromKeychain) {
ASSERT_TRUE(base::PostTaskAndReplyWithResult(
thread_->task_runner().get(), FROM_HERE,
- base::Bind(&PasswordStoreMac::ImportFromKeychain, store()),
+ base::Bind(&PasswordStoreMac::ImportFromKeychain, login_db(), keychain()),
base::Bind(&CheckMigrationResult, PasswordStoreMac::MIGRATION_OK)));
FinishAsyncProcessing();
@@ -2043,7 +2044,7 @@ TEST_F(PasswordStoreMacTest, ImportFederatedFromLockedKeychain) {
FinishAsyncProcessing();
ASSERT_TRUE(base::PostTaskAndReplyWithResult(
thread_->task_runner().get(), FROM_HERE,
- base::Bind(&PasswordStoreMac::ImportFromKeychain, store()),
+ base::Bind(&PasswordStoreMac::ImportFromKeychain, login_db(), keychain()),
base::Bind(&CheckMigrationResult, PasswordStoreMac::MIGRATION_OK)));
FinishAsyncProcessing();
@@ -2075,23 +2076,45 @@ TEST_F(PasswordStoreMacTest, ImportFromLockedKeychainError) {
keychain()->set_locked(true);
ASSERT_TRUE(base::PostTaskAndReplyWithResult(
thread_->task_runner().get(), FROM_HERE,
- base::Bind(&PasswordStoreMac::ImportFromKeychain, store()),
- base::Bind(&CheckMigrationResult, PasswordStoreMac::KEYCHAIN_BLOCKED)));
+ base::Bind(&PasswordStoreMac::ImportFromKeychain, login_db(), keychain()),
+ base::Bind(&CheckMigrationResult, PasswordStoreMac::MIGRATION_PARTIAL)));
FinishAsyncProcessing();
std::vector<std::unique_ptr<PasswordForm>> matching_items;
EXPECT_TRUE(
login_db()->GetLogins(PasswordStore::FormDigest(form1), &matching_items));
- ASSERT_EQ(1u, matching_items.size());
- EXPECT_EQ(base::string16(), matching_items[0]->password_value);
+ EXPECT_EQ(0u, matching_items.size());
histogram_tester_->ExpectUniqueSample(
"PasswordManager.KeychainMigration.NumPasswordsOnFailure", 1, 1);
histogram_tester_->ExpectUniqueSample(
"PasswordManager.KeychainMigration.NumFailedPasswords", 1, 1);
- histogram_tester_->ExpectUniqueSample(
- "PasswordManager.KeychainMigration.NumChromeOwnedInaccessiblePasswords",
- 2, 1);
// Don't test the encryption key access.
histogram_tester_.reset();
}
+
+// Delete the Chrome-owned password from the Keychain.
+TEST_F(PasswordStoreMacTest, CleanUpKeychain) {
+ MockAppleKeychain::KeychainTestData data1 = { kSecAuthenticationTypeHTMLForm,
+ "some.domain.com", kSecProtocolTypeHTTP, NULL, 0, NULL, "20020601171500Z",
+ "joe_user", "sekrit", false};
+ keychain()->AddTestItem(data1);
+
+ MacKeychainPasswordFormAdapter keychain_adapter(keychain());
+ PasswordFormData data2 = { PasswordForm::SCHEME_HTML, "http://web.site.com/",
+ "http://web.site.com/path/to/page.html", NULL, NULL, NULL, NULL,
+ L"anonymous", L"knock-knock", false, 0 };
+ keychain_adapter.AddPassword(*CreatePasswordFormFromDataForTesting(data2));
+ std::vector<std::unique_ptr<autofill::PasswordForm>> passwords =
+ password_manager_util::ConvertScopedVector(
+ keychain_adapter.GetAllPasswordFormPasswords());
+ EXPECT_EQ(2u, passwords.size());
+
+ // Delete everyhting but only the Chrome-owned item should be affected.
+ PasswordStoreMac::CleanUpKeychain(keychain(), passwords);
+ passwords = password_manager_util::ConvertScopedVector(
+ keychain_adapter.GetAllPasswordFormPasswords());
+ ASSERT_EQ(1u, passwords.size());
+ EXPECT_EQ("http://some.domain.com/", passwords[0]->signon_realm);
+ EXPECT_EQ(ASCIIToUTF16("sekrit"), passwords[0]->password_value);
+}
« no previous file with comments | « chrome/browser/password_manager/password_store_mac.cc ('k') | chrome/browser/password_manager/password_store_proxy_mac.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698