OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/login_utils.h" | 5 #include "chrome/browser/chromeos/login/login_utils.h" |
6 | 6 |
7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
8 #include "base/bind.h" | 8 #include "base/bind.h" |
9 #include "base/command_line.h" | 9 #include "base/command_line.h" |
10 #include "base/files/scoped_temp_dir.h" | 10 #include "base/files/scoped_temp_dir.h" |
(...skipping 208 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
219 mock_input_method_manager_ = new input_method::MockInputMethodManager(); | 219 mock_input_method_manager_ = new input_method::MockInputMethodManager(); |
220 input_method::InitializeForTesting(mock_input_method_manager_); | 220 input_method::InitializeForTesting(mock_input_method_manager_); |
221 disks::DiskMountManager::InitializeForTesting(&mock_disk_mount_manager_); | 221 disks::DiskMountManager::InitializeForTesting(&mock_disk_mount_manager_); |
222 mock_disk_mount_manager_.SetupDefaultReplies(); | 222 mock_disk_mount_manager_.SetupDefaultReplies(); |
223 | 223 |
224 mock_async_method_caller_ = new cryptohome::MockAsyncMethodCaller; | 224 mock_async_method_caller_ = new cryptohome::MockAsyncMethodCaller; |
225 cryptohome::AsyncMethodCaller::InitializeForTesting( | 225 cryptohome::AsyncMethodCaller::InitializeForTesting( |
226 mock_async_method_caller_); | 226 mock_async_method_caller_); |
227 | 227 |
228 cryptohome_.reset(new MockCryptohomeLibrary()); | 228 cryptohome_.reset(new MockCryptohomeLibrary()); |
229 EXPECT_CALL(*cryptohome_, InstallAttributesIsInvalid()) | |
230 .WillRepeatedly(Return(false)); | |
231 EXPECT_CALL(*cryptohome_, InstallAttributesIsFirstInstall()) | |
232 .WillRepeatedly(Return(true)); | |
233 EXPECT_CALL(*cryptohome_, TpmIsEnabled()) | |
234 .WillRepeatedly(Return(false)); | |
235 EXPECT_CALL(*cryptohome_, InstallAttributesSet(kAttributeOwned, kTrue)) | |
236 .WillRepeatedly(Return(true)); | |
237 EXPECT_CALL(*cryptohome_, InstallAttributesSet(kAttributeOwner, | |
238 kUsername)) | |
239 .WillRepeatedly(Return(true)); | |
240 EXPECT_CALL(*cryptohome_, InstallAttributesSet(kAttrEnterpriseDomain, | |
241 kDomain)) | |
242 .WillRepeatedly(Return(true)); | |
243 EXPECT_CALL(*cryptohome_, InstallAttributesSet(kAttrEnterpriseMode, | |
244 kMode)) | |
245 .WillRepeatedly(Return(true)); | |
246 EXPECT_CALL(*cryptohome_, InstallAttributesSet(kAttrEnterpriseDeviceId, | |
247 kDeviceId)) | |
248 .WillRepeatedly(Return(true)); | |
249 EXPECT_CALL(*cryptohome_, InstallAttributesFinalize()) | |
250 .WillRepeatedly(Return(true)); | |
251 EXPECT_CALL(*cryptohome_, InstallAttributesGet(kAttributeOwned, _)) | |
252 .WillRepeatedly(DoAll(SetArgPointee<1>(kTrue), | |
253 Return(true))); | |
254 EXPECT_CALL(*cryptohome_, InstallAttributesGet(kAttributeConsumerKiosk, _)) | |
255 .WillRepeatedly(DoAll(SetArgPointee<1>(kFalse), | |
256 Return(true))); | |
257 EXPECT_CALL(*cryptohome_, InstallAttributesGet(kAttributeOwner, _)) | |
258 .WillRepeatedly(DoAll(SetArgPointee<1>(kUsername), | |
259 Return(true))); | |
260 EXPECT_CALL(*cryptohome_, InstallAttributesGet(kAttrEnterpriseDomain, _)) | |
261 .WillRepeatedly(DoAll(SetArgPointee<1>(kDomain), | |
262 Return(true))); | |
263 EXPECT_CALL(*cryptohome_, InstallAttributesGet(kAttrEnterpriseMode, _)) | |
264 .WillRepeatedly(DoAll(SetArgPointee<1>(kMode), | |
265 Return(true))); | |
266 EXPECT_CALL(*cryptohome_, InstallAttributesGet(kAttrEnterpriseDeviceId, _)) | |
267 .WillRepeatedly(DoAll(SetArgPointee<1>(kDeviceId), | |
268 Return(true))); | |
269 CryptohomeLibrary::SetForTest(cryptohome_.get()); | 229 CryptohomeLibrary::SetForTest(cryptohome_.get()); |
270 | 230 |
271 test_device_settings_service_.reset(new ScopedTestDeviceSettingsService); | 231 test_device_settings_service_.reset(new ScopedTestDeviceSettingsService); |
272 test_cros_settings_.reset(new ScopedTestCrosSettings); | 232 test_cros_settings_.reset(new ScopedTestCrosSettings); |
273 test_user_manager_.reset(new ScopedTestUserManager); | 233 test_user_manager_.reset(new ScopedTestUserManager); |
274 | 234 |
275 // IOThread creates ProxyConfigServiceImpl and | 235 // IOThread creates ProxyConfigServiceImpl and |
276 // BrowserPolicyConnector::Init() creates a NetworkConfigurationUpdater, | 236 // BrowserPolicyConnector::Init() creates a NetworkConfigurationUpdater, |
277 // which both access NetworkHandler. Thus initialize it here before creating | 237 // which both access NetworkHandler. Thus initialize it here before creating |
278 // IOThread and before calling BrowserPolicyConnector::Init(). | 238 // IOThread and before calling BrowserPolicyConnector::Init(). |
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
394 FAIL() << "OnLoginFailure not expected"; | 354 FAIL() << "OnLoginFailure not expected"; |
395 } | 355 } |
396 | 356 |
397 virtual void OnLoginSuccess(const UserContext& user_context, | 357 virtual void OnLoginSuccess(const UserContext& user_context, |
398 bool pending_requests, | 358 bool pending_requests, |
399 bool using_oauth) OVERRIDE { | 359 bool using_oauth) OVERRIDE { |
400 FAIL() << "OnLoginSuccess not expected"; | 360 FAIL() << "OnLoginSuccess not expected"; |
401 } | 361 } |
402 | 362 |
403 void EnrollDevice(const std::string& username) { | 363 void EnrollDevice(const std::string& username) { |
404 EXPECT_CALL(*cryptohome_, InstallAttributesIsFirstInstall()) | |
405 .WillOnce(Return(true)) | |
406 .WillRepeatedly(Return(false)); | |
407 | |
408 base::RunLoop loop; | 364 base::RunLoop loop; |
409 policy::EnterpriseInstallAttributes::LockResult result; | 365 policy::EnterpriseInstallAttributes::LockResult result; |
410 connector_->GetInstallAttributes()->LockDevice( | 366 connector_->GetInstallAttributes()->LockDevice( |
411 username, policy::DEVICE_MODE_ENTERPRISE, kDeviceId, | 367 username, policy::DEVICE_MODE_ENTERPRISE, kDeviceId, |
412 base::Bind(&CopyLockResult, &loop, &result)); | 368 base::Bind(&CopyLockResult, &loop, &result)); |
413 loop.Run(); | 369 loop.Run(); |
414 EXPECT_EQ(policy::EnterpriseInstallAttributes::LOCK_SUCCESS, result); | 370 EXPECT_EQ(policy::EnterpriseInstallAttributes::LOCK_SUCCESS, result); |
415 RunUntilIdle(); | 371 RunUntilIdle(); |
416 } | 372 } |
417 | 373 |
(...skipping 308 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
726 } | 682 } |
727 | 683 |
728 INSTANTIATE_TEST_CASE_P( | 684 INSTANTIATE_TEST_CASE_P( |
729 LoginUtilsBlockingLoginTestInstance, | 685 LoginUtilsBlockingLoginTestInstance, |
730 LoginUtilsBlockingLoginTest, | 686 LoginUtilsBlockingLoginTest, |
731 testing::Values(0, 1, 2, 3, 4, 5)); | 687 testing::Values(0, 1, 2, 3, 4, 5)); |
732 | 688 |
733 } // namespace | 689 } // namespace |
734 | 690 |
735 } // namespace chromeos | 691 } // namespace chromeos |
OLD | NEW |