OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/bind.h" | 5 #include "base/bind.h" |
6 #include "base/callback.h" | 6 #include "base/callback.h" |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/macros.h" | 8 #include "base/macros.h" |
9 #include "chrome/browser/browser_process.h" | 9 #include "chrome/browser/browser_process.h" |
10 #include "chrome/browser/chromeos/login/users/user.h" | 10 #include "chrome/browser/chromeos/login/users/user.h" |
11 #include "chrome/browser/chromeos/login/users/user_manager.h" | 11 #include "chrome/browser/chromeos/login/users/user_manager.h" |
12 #include "chrome/browser/extensions/extension_apitest.h" | 12 #include "chrome/browser/extensions/extension_apitest.h" |
13 #include "chrome/common/chrome_switches.h" | |
14 #include "chrome/test/base/ui_test_utils.h" | 13 #include "chrome/test/base/ui_test_utils.h" |
15 #include "extensions/common/switches.h" | 14 #include "extensions/common/switches.h" |
16 #include "testing/gmock/include/gmock/gmock.h" | 15 #include "testing/gmock/include/gmock/gmock.h" |
17 | 16 |
18 #if defined(OS_CHROMEOS) | 17 #if defined(OS_CHROMEOS) |
19 #include "chrome/browser/chrome_notification_types.h" | 18 #include "chrome/browser/chrome_notification_types.h" |
20 #include "chrome/browser/chromeos/login/helper.h" | 19 #include "chrome/browser/chromeos/login/helper.h" |
21 #include "chrome/browser/chromeos/net/network_portal_detector.h" | 20 #include "chrome/browser/chromeos/net/network_portal_detector.h" |
22 #include "chrome/browser/chromeos/net/network_portal_detector_test_impl.h" | 21 #include "chrome/browser/chromeos/net/network_portal_detector_test_impl.h" |
23 #include "chromeos/chromeos_switches.h" | 22 #include "chromeos/chromeos_switches.h" |
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
126 | 125 |
127 virtual void VerifyAndEncryptData(scoped_ptr<base::ListValue> args, | 126 virtual void VerifyAndEncryptData(scoped_ptr<base::ListValue> args, |
128 std::string* encoded_data, | 127 std::string* encoded_data, |
129 std::string* error) OVERRIDE { | 128 std::string* error) OVERRIDE { |
130 *encoded_data = "encrypted_data"; | 129 *encoded_data = "encrypted_data"; |
131 } | 130 } |
132 }; | 131 }; |
133 #endif // defined(OS_CHROMEOS) | 132 #endif // defined(OS_CHROMEOS) |
134 | 133 |
135 class ExtensionNetworkingPrivateApiTest | 134 class ExtensionNetworkingPrivateApiTest |
136 : public ExtensionApiTest, | 135 : public ExtensionApiTest { |
137 public testing::WithParamInterface<bool> { | |
138 public: | 136 public: |
139 ExtensionNetworkingPrivateApiTest() | 137 ExtensionNetworkingPrivateApiTest() |
140 #if defined(OS_CHROMEOS) | 138 #if defined(OS_CHROMEOS) |
141 : detector_(NULL), | 139 : detector_(NULL), |
142 service_test_(NULL) | 140 service_test_(NULL) |
143 #endif | 141 #endif |
144 { | 142 { |
145 } | 143 } |
146 | 144 |
147 bool RunNetworkingSubtest(const std::string& subtest) { | 145 bool RunNetworkingSubtest(const std::string& subtest) { |
(...skipping 28 matching lines...) Expand all Loading... |
176 "epcifkihnkjgphfkloaaleeakhpmgdmn"); | 174 "epcifkihnkjgphfkloaaleeakhpmgdmn"); |
177 | 175 |
178 // TODO(pneubeck): Remove the following hack, once the NetworkingPrivateAPI | 176 // TODO(pneubeck): Remove the following hack, once the NetworkingPrivateAPI |
179 // uses the ProfileHelper to obtain the userhash crbug/238623. | 177 // uses the ProfileHelper to obtain the userhash crbug/238623. |
180 const std::string login_user = chromeos::login::CanonicalizeUserID( | 178 const std::string login_user = chromeos::login::CanonicalizeUserID( |
181 command_line->GetSwitchValueNative(chromeos::switches::kLoginUser)); | 179 command_line->GetSwitchValueNative(chromeos::switches::kLoginUser)); |
182 const std::string sanitized_user = | 180 const std::string sanitized_user = |
183 CryptohomeClient::GetStubSanitizedUsername(login_user); | 181 CryptohomeClient::GetStubSanitizedUsername(login_user); |
184 command_line->AppendSwitchASCII(chromeos::switches::kLoginProfile, | 182 command_line->AppendSwitchASCII(chromeos::switches::kLoginProfile, |
185 sanitized_user); | 183 sanitized_user); |
186 if (GetParam()) | |
187 command_line->AppendSwitch(::switches::kMultiProfiles); | |
188 } | 184 } |
189 | 185 |
190 void InitializeSanitizedUsername() { | 186 void InitializeSanitizedUsername() { |
191 chromeos::UserManager* user_manager = chromeos::UserManager::Get(); | 187 chromeos::UserManager* user_manager = chromeos::UserManager::Get(); |
192 chromeos::User* user = user_manager->GetActiveUser(); | 188 chromeos::User* user = user_manager->GetActiveUser(); |
193 CHECK(user); | 189 CHECK(user); |
194 std::string userhash; | 190 std::string userhash; |
195 DBusThreadManager::Get()->GetCryptohomeClient()->GetSanitizedUsername( | 191 DBusThreadManager::Get()->GetCryptohomeClient()->GetSanitizedUsername( |
196 user->email(), | 192 user->email(), |
197 base::Bind(&AssignString, &userhash_)); | 193 base::Bind(&AssignString, &userhash_)); |
(...skipping 163 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
361 ShillServiceClient::TestInterface* service_test_; | 357 ShillServiceClient::TestInterface* service_test_; |
362 policy::MockConfigurationPolicyProvider provider_; | 358 policy::MockConfigurationPolicyProvider provider_; |
363 std::string userhash_; | 359 std::string userhash_; |
364 #endif | 360 #endif |
365 }; | 361 }; |
366 | 362 |
367 // Place each subtest into a separate browser test so that the stub networking | 363 // Place each subtest into a separate browser test so that the stub networking |
368 // library state is reset for each subtest run. This way they won't affect each | 364 // library state is reset for each subtest run. This way they won't affect each |
369 // other. | 365 // other. |
370 | 366 |
371 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, StartConnect) { | 367 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, StartConnect) { |
372 EXPECT_TRUE(RunNetworkingSubtest("startConnect")) << message_; | 368 EXPECT_TRUE(RunNetworkingSubtest("startConnect")) << message_; |
373 } | 369 } |
374 | 370 |
375 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, StartDisconnect) { | 371 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, StartDisconnect) { |
376 EXPECT_TRUE(RunNetworkingSubtest("startDisconnect")) << message_; | 372 EXPECT_TRUE(RunNetworkingSubtest("startDisconnect")) << message_; |
377 } | 373 } |
378 | 374 |
379 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 375 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
380 StartConnectNonexistent) { | 376 StartConnectNonexistent) { |
381 EXPECT_TRUE(RunNetworkingSubtest("startConnectNonexistent")) << message_; | 377 EXPECT_TRUE(RunNetworkingSubtest("startConnectNonexistent")) << message_; |
382 } | 378 } |
383 | 379 |
384 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 380 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
385 StartDisconnectNonexistent) { | 381 StartDisconnectNonexistent) { |
386 EXPECT_TRUE(RunNetworkingSubtest("startDisconnectNonexistent")) << message_; | 382 EXPECT_TRUE(RunNetworkingSubtest("startDisconnectNonexistent")) << message_; |
387 } | 383 } |
388 | 384 |
389 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 385 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
390 StartGetPropertiesNonexistent) { | 386 StartGetPropertiesNonexistent) { |
391 EXPECT_TRUE(RunNetworkingSubtest("startGetPropertiesNonexistent")) | 387 EXPECT_TRUE(RunNetworkingSubtest("startGetPropertiesNonexistent")) |
392 << message_; | 388 << message_; |
393 } | 389 } |
394 | 390 |
395 #if defined(OS_CHROMEOS) | 391 #if defined(OS_CHROMEOS) |
396 // Non-Chrome OS only supports wifi currently. | 392 // Non-Chrome OS only supports wifi currently. |
397 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, GetVisibleNetworks) { | 393 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, GetVisibleNetworks) { |
398 EXPECT_TRUE(RunNetworkingSubtest("getVisibleNetworks")) << message_; | 394 EXPECT_TRUE(RunNetworkingSubtest("getVisibleNetworks")) << message_; |
399 } | 395 } |
400 #endif | 396 #endif |
401 | 397 |
402 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 398 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
403 GetVisibleNetworksWifi) { | 399 GetVisibleNetworksWifi) { |
404 EXPECT_TRUE(RunNetworkingSubtest("getVisibleNetworksWifi")) << message_; | 400 EXPECT_TRUE(RunNetworkingSubtest("getVisibleNetworksWifi")) << message_; |
405 } | 401 } |
406 | 402 |
407 #if defined(OS_CHROMEOS) | 403 #if defined(OS_CHROMEOS) |
408 // TODO(stevenjb/mef): Fix this on non-Chrome OS, crbug.com/371442. | 404 // TODO(stevenjb/mef): Fix this on non-Chrome OS, crbug.com/371442. |
409 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, RequestNetworkScan) { | 405 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, RequestNetworkScan) { |
410 EXPECT_TRUE(RunNetworkingSubtest("requestNetworkScan")) << message_; | 406 EXPECT_TRUE(RunNetworkingSubtest("requestNetworkScan")) << message_; |
411 } | 407 } |
412 #endif | 408 #endif |
413 | 409 |
414 // Properties are filtered and translated through | 410 // Properties are filtered and translated through |
415 // ShillToONCTranslator::TranslateWiFiWithState | 411 // ShillToONCTranslator::TranslateWiFiWithState |
416 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, GetProperties) { | 412 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, GetProperties) { |
417 EXPECT_TRUE(RunNetworkingSubtest("getProperties")) << message_; | 413 EXPECT_TRUE(RunNetworkingSubtest("getProperties")) << message_; |
418 } | 414 } |
419 | 415 |
420 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, GetState) { | 416 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, GetState) { |
421 EXPECT_TRUE(RunNetworkingSubtest("getState")) << message_; | 417 EXPECT_TRUE(RunNetworkingSubtest("getState")) << message_; |
422 } | 418 } |
423 | 419 |
424 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, GetStateNonExistent) { | 420 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, GetStateNonExistent) { |
425 EXPECT_TRUE(RunNetworkingSubtest("getStateNonExistent")) << message_; | 421 EXPECT_TRUE(RunNetworkingSubtest("getStateNonExistent")) << message_; |
426 } | 422 } |
427 | 423 |
428 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, SetProperties) { | 424 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, SetProperties) { |
429 EXPECT_TRUE(RunNetworkingSubtest("setProperties")) << message_; | 425 EXPECT_TRUE(RunNetworkingSubtest("setProperties")) << message_; |
430 } | 426 } |
431 | 427 |
432 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, CreateNetwork) { | 428 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, CreateNetwork) { |
433 EXPECT_TRUE(RunNetworkingSubtest("createNetwork")) << message_; | 429 EXPECT_TRUE(RunNetworkingSubtest("createNetwork")) << message_; |
434 } | 430 } |
435 | 431 |
436 #if defined(OS_CHROMEOS) | 432 #if defined(OS_CHROMEOS) |
437 // TODO(stevenjb/mef): Find a maintainable way to support this on win/mac and | 433 // TODO(stevenjb/mef): Find a maintainable way to support this on win/mac and |
438 // a better way to set this up on Chrome OS. | 434 // a better way to set this up on Chrome OS. |
439 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 435 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
440 GetManagedProperties) { | 436 GetManagedProperties) { |
441 const std::string uidata_blob = | 437 const std::string uidata_blob = |
442 "{ \"user_settings\": {" | 438 "{ \"user_settings\": {" |
443 " \"WiFi\": {" | 439 " \"WiFi\": {" |
444 " \"Passphrase\": \"FAKE_CREDENTIAL_VPaJDV9x\" }" | 440 " \"Passphrase\": \"FAKE_CREDENTIAL_VPaJDV9x\" }" |
445 " }" | 441 " }" |
446 "}"; | 442 "}"; |
447 service_test_->SetServiceProperty("stub_wifi2", | 443 service_test_->SetServiceProperty("stub_wifi2", |
448 shill::kUIDataProperty, | 444 shill::kUIDataProperty, |
449 base::StringValue(uidata_blob)); | 445 base::StringValue(uidata_blob)); |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
481 new base::StringValue(user_policy_blob), | 477 new base::StringValue(user_policy_blob), |
482 NULL); | 478 NULL); |
483 provider_.UpdateChromePolicy(policy); | 479 provider_.UpdateChromePolicy(policy); |
484 | 480 |
485 content::RunAllPendingInMessageLoop(); | 481 content::RunAllPendingInMessageLoop(); |
486 | 482 |
487 EXPECT_TRUE(RunNetworkingSubtest("getManagedProperties")) << message_; | 483 EXPECT_TRUE(RunNetworkingSubtest("getManagedProperties")) << message_; |
488 } | 484 } |
489 #endif // OS_CHROMEOS | 485 #endif // OS_CHROMEOS |
490 | 486 |
491 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 487 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
492 OnNetworksChangedEventConnect) { | 488 OnNetworksChangedEventConnect) { |
493 EXPECT_TRUE(RunNetworkingSubtest("onNetworksChangedEventConnect")) | 489 EXPECT_TRUE(RunNetworkingSubtest("onNetworksChangedEventConnect")) |
494 << message_; | 490 << message_; |
495 } | 491 } |
496 | 492 |
497 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 493 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
498 OnNetworksChangedEventDisconnect) { | 494 OnNetworksChangedEventDisconnect) { |
499 EXPECT_TRUE(RunNetworkingSubtest("onNetworksChangedEventDisconnect")) | 495 EXPECT_TRUE(RunNetworkingSubtest("onNetworksChangedEventDisconnect")) |
500 << message_; | 496 << message_; |
501 } | 497 } |
502 | 498 |
503 #if defined(OS_CHROMEOS) | 499 #if defined(OS_CHROMEOS) |
504 // TODO(stevenjb/mef): Fix this on non-Chrome OS, crbug.com/371442. | 500 // TODO(stevenjb/mef): Fix this on non-Chrome OS, crbug.com/371442. |
505 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 501 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
506 OnNetworkListChangedEvent) { | 502 OnNetworkListChangedEvent) { |
507 EXPECT_TRUE(RunNetworkingSubtest("onNetworkListChangedEvent")) << message_; | 503 EXPECT_TRUE(RunNetworkingSubtest("onNetworkListChangedEvent")) << message_; |
508 } | 504 } |
509 #endif // OS_CHROMEOS | 505 #endif // OS_CHROMEOS |
510 | 506 |
511 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 507 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
512 VerifyDestination) { | 508 VerifyDestination) { |
513 EXPECT_TRUE(RunNetworkingSubtest("verifyDestination")) << message_; | 509 EXPECT_TRUE(RunNetworkingSubtest("verifyDestination")) << message_; |
514 } | 510 } |
515 | 511 |
516 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 512 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
517 VerifyAndEncryptCredentials) { | 513 VerifyAndEncryptCredentials) { |
518 EXPECT_TRUE(RunNetworkingSubtest("verifyAndEncryptCredentials")) << message_; | 514 EXPECT_TRUE(RunNetworkingSubtest("verifyAndEncryptCredentials")) << message_; |
519 } | 515 } |
520 | 516 |
521 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 517 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
522 VerifyAndEncryptData) { | 518 VerifyAndEncryptData) { |
523 EXPECT_TRUE(RunNetworkingSubtest("verifyAndEncryptData")) << message_; | 519 EXPECT_TRUE(RunNetworkingSubtest("verifyAndEncryptData")) << message_; |
524 } | 520 } |
525 | 521 |
526 #if defined(OS_CHROMEOS) | 522 #if defined(OS_CHROMEOS) |
527 // Currently TDLS support is only enabled for Chrome OS. | 523 // Currently TDLS support is only enabled for Chrome OS. |
528 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 524 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
529 SetWifiTDLSEnabledState) { | 525 SetWifiTDLSEnabledState) { |
530 EXPECT_TRUE(RunNetworkingSubtest("setWifiTDLSEnabledState")) << message_; | 526 EXPECT_TRUE(RunNetworkingSubtest("setWifiTDLSEnabledState")) << message_; |
531 } | 527 } |
532 | 528 |
533 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 529 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
534 GetWifiTDLSStatus) { | 530 GetWifiTDLSStatus) { |
535 EXPECT_TRUE(RunNetworkingSubtest("getWifiTDLSStatus")) << message_; | 531 EXPECT_TRUE(RunNetworkingSubtest("getWifiTDLSStatus")) << message_; |
536 } | 532 } |
537 #endif | 533 #endif |
538 | 534 |
539 // NetworkPortalDetector is only enabled for Chrome OS. | 535 // NetworkPortalDetector is only enabled for Chrome OS. |
540 #if defined(OS_CHROMEOS) | 536 #if defined(OS_CHROMEOS) |
541 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 537 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
542 GetCaptivePortalStatus) { | 538 GetCaptivePortalStatus) { |
543 AddService("stub_cellular1", "cellular1", | 539 AddService("stub_cellular1", "cellular1", |
544 shill::kTypeCellular, shill::kStateIdle); | 540 shill::kTypeCellular, shill::kStateIdle); |
545 service_test_->SetServiceProperty( | 541 service_test_->SetServiceProperty( |
546 "stub_cellular1", | 542 "stub_cellular1", |
547 shill::kNetworkTechnologyProperty, | 543 shill::kNetworkTechnologyProperty, |
548 base::StringValue(shill::kNetworkTechnologyGsm)); | 544 base::StringValue(shill::kNetworkTechnologyGsm)); |
549 service_test_->SetServiceProperty( | 545 service_test_->SetServiceProperty( |
550 "stub_cellular1", | 546 "stub_cellular1", |
551 shill::kActivationStateProperty, | 547 shill::kActivationStateProperty, |
(...skipping 16 matching lines...) Expand all Loading... |
568 state.status = NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_PORTAL; | 564 state.status = NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_PORTAL; |
569 detector()->SetDetectionResultsForTesting("stub_wifi2", state); | 565 detector()->SetDetectionResultsForTesting("stub_wifi2", state); |
570 | 566 |
571 state.status = | 567 state.status = |
572 NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_PROXY_AUTH_REQUIRED; | 568 NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_PROXY_AUTH_REQUIRED; |
573 detector()->SetDetectionResultsForTesting("stub_cellular1", state); | 569 detector()->SetDetectionResultsForTesting("stub_cellular1", state); |
574 | 570 |
575 EXPECT_TRUE(RunNetworkingSubtest("getCaptivePortalStatus")) << message_; | 571 EXPECT_TRUE(RunNetworkingSubtest("getCaptivePortalStatus")) << message_; |
576 } | 572 } |
577 | 573 |
578 IN_PROC_BROWSER_TEST_P(ExtensionNetworkingPrivateApiTest, | 574 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest, |
579 CaptivePortalNotification) { | 575 CaptivePortalNotification) { |
580 detector()->SetDefaultNetworkPathForTesting("wifi"); | 576 detector()->SetDefaultNetworkPathForTesting("wifi"); |
581 NetworkPortalDetector::CaptivePortalState state; | 577 NetworkPortalDetector::CaptivePortalState state; |
582 state.status = NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_ONLINE; | 578 state.status = NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_ONLINE; |
583 detector()->SetDetectionResultsForTesting("wifi", state); | 579 detector()->SetDetectionResultsForTesting("wifi", state); |
584 | 580 |
585 TestListener listener( | 581 TestListener listener( |
586 "notifyPortalDetectorObservers", | 582 "notifyPortalDetectorObservers", |
587 base::Bind(&NetworkPortalDetectorTestImpl::NotifyObserversForTesting, | 583 base::Bind(&NetworkPortalDetectorTestImpl::NotifyObserversForTesting, |
588 base::Unretained(detector()))); | 584 base::Unretained(detector()))); |
589 EXPECT_TRUE(RunNetworkingSubtest("captivePortalNotification")) << message_; | 585 EXPECT_TRUE(RunNetworkingSubtest("captivePortalNotification")) << message_; |
590 } | 586 } |
591 #endif // defined(OS_CHROMEOS) | 587 #endif // defined(OS_CHROMEOS) |
592 | 588 |
593 INSTANTIATE_TEST_CASE_P(ExtensionNetworkingPrivateApiTestInstantiation, | |
594 ExtensionNetworkingPrivateApiTest, | |
595 testing::Bool()); | |
596 | |
597 } // namespace | 589 } // namespace |
OLD | NEW |