Index: chrome/utility/importer/firefox_importer_unittest.cc |
diff --git a/chrome/utility/importer/firefox_importer_unittest.cc b/chrome/utility/importer/firefox_importer_unittest.cc |
index 9a415d678b311d8b8db104186a8fef2c5d7fbc3f..0ad20e10a358abfc9abf5e90c0bce3636d15b3a2 100644 |
--- a/chrome/utility/importer/firefox_importer_unittest.cc |
+++ b/chrome/utility/importer/firefox_importer_unittest.cc |
@@ -3,11 +3,13 @@ |
// found in the LICENSE file. |
#include "base/files/file_path.h" |
+#include "base/files/scoped_temp_dir.h" |
#include "base/path_service.h" |
#include "base/strings/utf_string_conversions.h" |
#include "chrome/common/chrome_paths.h" |
#include "chrome/utility/importer/firefox_importer_unittest_utils.h" |
#include "chrome/utility/importer/nss_decryptor.h" |
+#include "sql/connection.h" |
#include "testing/gtest/include/gtest/gtest.h" |
// TODO(jschuh): Disabled on Win64 build. http://crbug.com/179688 |
@@ -44,3 +46,64 @@ TEST(FirefoxImporterTest, MAYBE_NSS(Firefox3NSS3Decryptor)) { |
decryptor_proxy.Decrypt("MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECLW" |
"qqiccfQHWBAie74hxnULxlw==")); |
} |
+ |
+// The following test verifies proper detection of authentication scheme in |
+// firefox's signons db. We insert two entries into moz_logins table. The first |
+// has httpRealm column filled with non-empty string, therefore resulting |
+// PasswordForm should have SCHEME_BASIC in scheme. The second entry has NULL |
+// httpRealm, so it should produce a SCHEME_HTML PasswordForm. |
+TEST(FirefoxImporterTest, MAYBE_NSS(FirefoxNSSDecryptorDeduceAuthScheme)) { |
+ base::ScopedTempDir temp_dir; |
+ ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
+ base::FilePath signons_path = temp_dir.path().AppendASCII("signons.sqlite"); |
+ sql::Connection db_conn; |
+ |
+ ASSERT_TRUE(db_conn.Open(signons_path)); |
+ |
+ ASSERT_TRUE(db_conn.Execute( |
+ "CREATE TABLE moz_logins (id INTEGER PRIMARY KEY, hostname TEXT NOT " |
+ "NULL, httpRealm TEXT, formSubmitURL TEXT, usernameField TEXT NOT NULL," |
+ "passwordField TEXT NOT NULL, encryptedUsername TEXT NOT NULL," |
+ "encryptedPassword TEXT NOT NULL, guid TEXT, encType INTEGER," |
+ "timeCreated INTEGER, timeLastUsed INTEGER, timePasswordChanged " |
+ "INTEGER, timesUsed INTEGER)")); |
+ |
+ ASSERT_TRUE(db_conn.Execute( |
+ "CREATE TABLE moz_disabledHosts (id INTEGER PRIMARY KEY, hostname TEXT " |
+ "UNIQUE ON CONFLICT REPLACE)")); |
+ |
+ ASSERT_TRUE(db_conn.Execute( |
+ "INSERT INTO 'moz_logins' VALUES(1,'http://server.com:1234'," |
+ "'http_realm',NULL,'','','','','{bfa37106-a4dc-0a47-abb4-dafd507bf2db}'," |
+ "1,1401883410959,1401883410959,1401883410959,1)")); |
+ |
+ ASSERT_TRUE(db_conn.Execute( |
+ "INSERT INTO 'moz_logins' VALUES(2,'http://server.com:1234',NULL," |
+ "'http://test2.server.com:1234/action','username','password','',''," |
+ "'{71ad64fa-b5d4-cf4d-b390-2e4d56fe2aff}',1,1401883939239," |
+ "1401883939239, 1401883939239,1)")); |
+ |
+ db_conn.Close(); |
+ |
+ base::FilePath nss_path; |
+ ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &nss_path)); |
+#if defined(OS_MACOSX) |
+ nss_path = nss_path.AppendASCII("firefox3_nss_mac"); |
+#else |
+ nss_path = nss_path.AppendASCII("firefox3_nss"); |
+#endif // !OS_MACOSX |
+ base::FilePath db_path; |
+ ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &db_path)); |
+ db_path = db_path.AppendASCII("firefox3_profile"); |
+ |
+ FFUnitTestDecryptorProxy decryptor_proxy; |
+ ASSERT_TRUE(decryptor_proxy.Setup(nss_path)); |
+ |
+ ASSERT_TRUE(decryptor_proxy.DecryptorInit(nss_path, db_path)); |
+ std::vector<autofill::PasswordForm> forms = |
+ decryptor_proxy.ParseSignons(signons_path); |
+ |
+ ASSERT_EQ(2u, forms.size()); |
+ EXPECT_EQ(autofill::PasswordForm::SCHEME_BASIC, forms[0].scheme); |
+ EXPECT_EQ(autofill::PasswordForm::SCHEME_HTML, forms[1].scheme); |
+} |