| Index: chrome/browser/password_manager/password_manager_internals_service_unittest.cc
|
| diff --git a/chrome/browser/password_manager/password_manager_internals_service_unittest.cc b/chrome/browser/password_manager/password_manager_internals_service_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..0903255b9929772e1cbdd9a592740125dbe6a61f
|
| --- /dev/null
|
| +++ b/chrome/browser/password_manager/password_manager_internals_service_unittest.cc
|
| @@ -0,0 +1,79 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "components/password_manager/core/browser/password_manager_internals_service.h"
|
| +
|
| +#include "chrome/test/base/testing_profile.h"
|
| +#include "components/keyed_service/content/browser_context_dependency_manager.h"
|
| +#include "components/password_manager/content/browser/password_manager_internals_service_factory.h"
|
| +#include "components/password_manager/core/browser/password_manager_logger.h"
|
| +#include "testing/gmock/include/gmock/gmock.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +using password_manager::PasswordManagerInternalsService;
|
| +using password_manager::PasswordManagerInternalsServiceFactory;
|
| +
|
| +namespace {
|
| +
|
| +const char kTestText[] = "abcd1234";
|
| +
|
| +class MockLogReceiver : public password_manager::PasswordManagerLogger {
|
| + public:
|
| + MockLogReceiver() {}
|
| +
|
| + MOCK_METHOD1(LogSavePasswordProgress, void(const std::string&));
|
| +};
|
| +
|
| +enum ProfileType { NORMAL_PROFILE, INCOGNITO_PROFILE };
|
| +
|
| +scoped_ptr<TestingProfile> CreateProfile(ProfileType type) {
|
| + TestingProfile::Builder builder;
|
| + if (type == INCOGNITO_PROFILE)
|
| + builder.SetIncognito();
|
| + scoped_ptr<TestingProfile> profile(builder.Build());
|
| +#if !defined(NDEBUG)
|
| + // During the test cases, the profiles may get created on the same address. To
|
| + // avoid over-zealous asserts we need to mark the newly created one as "live".
|
| + // See declaration of MarkBrowserContextLiveForTesting for more details.
|
| + BrowserContextDependencyManager::GetInstance()
|
| + ->MarkBrowserContextLiveForTesting(profile.get());
|
| +#endif
|
| + return profile.Pass();
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +// When the profile is not incognito, it should be possible to activate the
|
| +// service.
|
| +TEST(PasswordManagerInternalsServiceTest, ServiceActiveNonIncognito) {
|
| + scoped_ptr<TestingProfile> profile(CreateProfile(NORMAL_PROFILE));
|
| + PasswordManagerInternalsService* service =
|
| + PasswordManagerInternalsServiceFactory::GetForBrowserContext(
|
| + profile.get());
|
| + testing::StrictMock<MockLogReceiver> receiver;
|
| +
|
| + ASSERT_TRUE(profile);
|
| + ASSERT_TRUE(service);
|
| + EXPECT_EQ(std::string(), service->RegisterReceiver(&receiver));
|
| +
|
| + // TODO(vabr): Use a MockPasswordManagerClient to detect activity changes.
|
| + EXPECT_CALL(receiver, LogSavePasswordProgress(kTestText)).Times(1);
|
| + service->ProcessLog(kTestText);
|
| +
|
| + service->UnregisterReceiver(&receiver);
|
| +}
|
| +
|
| +// When the browser profile is incognito, it should not be possible to activate
|
| +// the service.
|
| +TEST(PasswordManagerInternalsServiceTest, ServiceNotActiveIncognito) {
|
| + scoped_ptr<TestingProfile> profile(CreateProfile(INCOGNITO_PROFILE));
|
| + ASSERT_TRUE(profile);
|
| + PasswordManagerInternalsService* service =
|
| + PasswordManagerInternalsServiceFactory::GetForBrowserContext(
|
| + profile.get());
|
| + // BrowserContextKeyedBaseFactory::GetBrowserContextToUse should return NULL
|
| + // for |profile|, because |profile| is incognito. Therefore the returned
|
| + // |service| should also be NULL.
|
| + EXPECT_FALSE(service);
|
| +}
|
|
|