Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/basictypes.h" | 5 #include "base/basictypes.h" |
| 6 #include "base/compiler_specific.h" | 6 #include "base/compiler_specific.h" |
| 7 #include "base/prefs/pref_service.h" | 7 #include "base/prefs/pref_service.h" |
| 8 #include "base/strings/stringprintf.h" | |
| 8 #include "chrome/browser/chromeos/login/login_manager_test.h" | 9 #include "chrome/browser/chromeos/login/login_manager_test.h" |
| 9 #include "chrome/browser/chromeos/login/startup_utils.h" | 10 #include "chrome/browser/chromeos/login/startup_utils.h" |
| 10 #include "chrome/browser/chromeos/login/ui/user_adding_screen.h" | 11 #include "chrome/browser/chromeos/login/ui/user_adding_screen.h" |
| 11 #include "chrome/browser/chromeos/login/users/user_manager.h" | 12 #include "chrome/browser/chromeos/login/users/user_manager.h" |
| 12 #include "chrome/browser/chromeos/settings/cros_settings.h" | 13 #include "chrome/browser/chromeos/settings/cros_settings.h" |
| 13 #include "chrome/browser/chromeos/settings/stub_cros_settings_provider.h" | 14 #include "chrome/browser/chromeos/settings/stub_cros_settings_provider.h" |
| 14 #include "chrome/browser/ui/browser.h" | 15 #include "chrome/browser/ui/browser.h" |
| 16 #include "chrome/browser/ui/browser_commands.h" | |
| 15 #include "chrome/browser/ui/tabs/tab_strip_model.h" | 17 #include "chrome/browser/ui/tabs/tab_strip_model.h" |
| 16 #include "chrome/common/pref_names.h" | 18 #include "chrome/common/pref_names.h" |
| 17 #include "chrome/test/base/ui_test_utils.h" | 19 #include "chrome/test/base/ui_test_utils.h" |
| 18 #include "chromeos/settings/cros_settings_names.h" | 20 #include "chromeos/settings/cros_settings_names.h" |
| 19 #include "content/public/browser/web_contents.h" | 21 #include "content/public/browser/web_contents.h" |
| 20 #include "content/public/test/browser_test_utils.h" | 22 #include "content/public/test/browser_test_utils.h" |
| 21 #include "content/public/test/test_utils.h" | 23 #include "content/public/test/test_utils.h" |
| 22 | 24 |
| 23 namespace chromeos { | 25 namespace chromeos { |
| 24 | 26 |
| 25 namespace { | 27 namespace { |
| 26 | 28 |
| 27 const char* kTestUsers[] = { "test-user1@gmail.com", "test-user2@gmail.com" }; | 29 const char* kTestOwner = "test-owner@example.com"; |
| 30 const char* kTestNonOwner = "test-user1@example.com"; | |
| 31 | |
| 32 const char* kKnownSettings[] = { | |
| 33 kDeviceOwner, | |
| 34 kAccountsPrefAllowGuest, | |
| 35 kAccountsPrefAllowNewUser, | |
| 36 kAccountsPrefDeviceLocalAccounts, | |
| 37 kAccountsPrefShowUserNamesOnSignIn, | |
| 38 kAccountsPrefSupervisedUsersEnabled, | |
| 39 }; | |
| 40 | |
| 41 // Stub settings provider that only handles the settings we need to control. | |
| 42 // StubCrosSettingsProvider handles more settings but leaves many of them unset | |
| 43 // which the Settings page doesn't expect. | |
| 44 class StubAccountSettingsProvider : public StubCrosSettingsProvider { | |
| 45 public: | |
| 46 StubAccountSettingsProvider() { | |
| 47 } | |
| 48 | |
| 49 virtual ~StubAccountSettingsProvider() { | |
| 50 } | |
| 51 | |
| 52 // StubCrosSettingsProvider implementation. | |
| 53 virtual bool HandlesSetting(const std::string& path) const OVERRIDE { | |
| 54 const char** end = kKnownSettings + arraysize(kKnownSettings); | |
| 55 return std::find(kKnownSettings, end, path) != end; | |
| 56 } | |
| 57 }; | |
| 58 | |
| 59 struct PrefTest { | |
| 60 const char* pref_name; | |
| 61 bool owner_only; | |
| 62 bool indicator; | |
| 63 }; | |
| 64 | |
| 65 const PrefTest kPrefTests[] = { | |
| 66 { kSystemTimezone, false, false }, | |
| 67 { prefs::kUse24HourClock, false, false }, | |
| 68 { kAttestationForContentProtectionEnabled, true, true }, | |
| 69 { kAccountsPrefAllowGuest, true, false }, | |
| 70 { kAccountsPrefAllowNewUser, true, false }, | |
| 71 { kAccountsPrefShowUserNamesOnSignIn, true, false }, | |
| 72 { kAccountsPrefSupervisedUsersEnabled, true, false }, | |
| 73 #if defined(GOOGLE_CHROME_BUILD) | |
| 74 { kStatsReportingPref, true, true }, | |
| 75 { prefs::kSpellCheckUseSpellingService, false, false }, | |
| 76 #endif | |
| 77 }; | |
| 28 | 78 |
| 29 } // namespace | 79 } // namespace |
| 30 | 80 |
| 31 class SharedOptionsTest : public LoginManagerTest { | 81 class SharedOptionsTest : public LoginManagerTest { |
| 32 public: | 82 public: |
| 33 SharedOptionsTest() | 83 SharedOptionsTest() |
| 34 : LoginManagerTest(false), | 84 : LoginManagerTest(false), |
| 35 device_settings_provider_(NULL) { | 85 device_settings_provider_(NULL) { |
| 36 stub_settings_provider_.Set(kDeviceOwner, base::StringValue(kTestUsers[0])); | 86 stub_settings_provider_.Set(kDeviceOwner, base::StringValue(kTestOwner)); |
| 37 } | 87 } |
| 38 | 88 |
| 39 virtual ~SharedOptionsTest() { | 89 virtual ~SharedOptionsTest() { |
| 40 } | 90 } |
| 41 | 91 |
| 42 virtual void SetUpOnMainThread() OVERRIDE { | 92 virtual void SetUpOnMainThread() OVERRIDE { |
| 43 LoginManagerTest::SetUpOnMainThread(); | 93 LoginManagerTest::SetUpOnMainThread(); |
| 94 | |
| 44 CrosSettings* settings = CrosSettings::Get(); | 95 CrosSettings* settings = CrosSettings::Get(); |
| 96 | |
| 97 // Add the stub settings provider, moving the device settings provider | |
| 98 // behind it so our stub takes precedence. | |
| 45 device_settings_provider_ = settings->GetProvider(kDeviceOwner); | 99 device_settings_provider_ = settings->GetProvider(kDeviceOwner); |
| 46 settings->RemoveSettingsProvider(device_settings_provider_); | 100 settings->RemoveSettingsProvider(device_settings_provider_); |
| 47 settings->AddSettingsProvider(&stub_settings_provider_); | 101 settings->AddSettingsProvider(&stub_settings_provider_); |
| 102 settings->AddSettingsProvider(device_settings_provider_); | |
| 48 } | 103 } |
| 49 | 104 |
| 50 virtual void CleanUpOnMainThread() OVERRIDE { | 105 virtual void CleanUpOnMainThread() OVERRIDE { |
| 51 CrosSettings* settings = CrosSettings::Get(); | 106 CrosSettings* settings = CrosSettings::Get(); |
| 52 settings->RemoveSettingsProvider(&stub_settings_provider_); | 107 settings->RemoveSettingsProvider(&stub_settings_provider_); |
| 53 settings->AddSettingsProvider(device_settings_provider_); | |
| 54 LoginManagerTest::CleanUpOnMainThread(); | 108 LoginManagerTest::CleanUpOnMainThread(); |
| 55 } | 109 } |
| 56 | 110 |
| 57 protected: | 111 protected: |
| 58 void CheckOptionsUI(const User* user, bool is_primary) { | 112 void CheckOptionsUI(const User* user, bool is_owner, bool is_primary) { |
| 113 Browser* browser = CreateBrowserForUser(user); | |
| 114 content::WebContents* contents = | |
| 115 browser->tab_strip_model()->GetActiveWebContents(); | |
| 116 | |
| 117 for (size_t i = 0; i < sizeof(kPrefTests) / sizeof(kPrefTests[0]); i++) { | |
| 118 CheckPreference(contents, | |
| 119 kPrefTests[i].pref_name, | |
| 120 !is_owner && kPrefTests[i].owner_only, | |
| 121 !is_owner && kPrefTests[i].indicator ? "owner" : | |
| 122 std::string()); | |
| 123 } | |
| 124 CheckBanner(contents, is_primary); | |
| 125 CheckSharedSections(contents, is_primary); | |
| 126 CheckAccountsOverlay(contents, is_owner); | |
| 127 } | |
| 128 | |
| 129 // Creates a browser and navigates to the Settings page. | |
| 130 Browser* CreateBrowserForUser(const User* user) { | |
| 59 Profile* profile = UserManager::Get()->GetProfileByUser(user); | 131 Profile* profile = UserManager::Get()->GetProfileByUser(user); |
| 60 profile->GetPrefs()->SetString(prefs::kGoogleServicesUsername, | 132 profile->GetPrefs()->SetString(prefs::kGoogleServicesUsername, |
| 61 user->email()); | 133 user->email()); |
| 62 | 134 |
| 63 ui_test_utils::BrowserAddedObserver observer; | 135 ui_test_utils::BrowserAddedObserver observer; |
| 64 Browser* browser = CreateBrowser(profile); | 136 Browser* browser = CreateBrowser(profile); |
| 65 observer.WaitForSingleNewBrowser(); | 137 observer.WaitForSingleNewBrowser(); |
| 66 | 138 |
| 67 ui_test_utils::NavigateToURL(browser, | 139 ui_test_utils::NavigateToURL(browser, |
| 68 GURL("chrome://settings-frame")); | 140 GURL("chrome://settings-frame")); |
| 69 content::WebContents* contents = | 141 return browser; |
| 70 browser->tab_strip_model()->GetActiveWebContents(); | 142 } |
| 71 | 143 |
| 144 // Verifies a preference's disabled state and controlled-by indicator. | |
| 145 void CheckPreference(content::WebContents* contents, | |
| 146 std::string pref_name, | |
| 147 bool disabled, | |
| 148 std::string controlled_by) { | |
| 149 bool success; | |
| 150 std::string js_expression = base::StringPrintf( | |
| 151 "var prefSelector = '[pref=\"%s\"]';" | |
| 152 "var controlledBy = '%s';" | |
| 153 "var input = document.querySelector(" | |
| 154 " 'input' + prefSelector + ', select' + prefSelector);" | |
| 155 "var success = false;" | |
| 156 "if (input) {" | |
| 157 " success = input.disabled == %d;" | |
| 158 " var indicator = document.querySelector(input.tagName +" | |
| 159 " prefSelector + ' + span span.controlled-setting-indicator');" | |
| 160 " if (controlledBy) {" | |
| 161 " success = success && indicator &&" | |
| 162 " indicator.getAttribute('controlled-by') == controlledBy;" | |
| 163 " } else {" | |
| 164 " success = success && (!indicator ||" | |
| 165 " !indicator.hasAttribute('controlled-by') ||" | |
| 166 " indicator.getAttribute('controlled-by') == '')" | |
| 167 " }" | |
| 168 "}" | |
| 169 "window.domAutomationController.send(!!success);", | |
| 170 pref_name.c_str(), controlled_by.c_str(), disabled); | |
| 171 ASSERT_TRUE(content::ExecuteScriptAndExtractBool( | |
| 172 contents, js_expression, &success)); | |
| 173 EXPECT_TRUE(success); | |
| 174 } | |
| 175 | |
| 176 // Verifies a checkbox's disabled state, controlled-by indicator and value. | |
| 177 void CheckBooleanPreference(content::WebContents* contents, | |
| 178 std::string pref_name, | |
| 179 bool disabled, | |
| 180 std::string controlled_by, | |
| 181 bool expected_value) { | |
| 182 CheckPreference(contents, pref_name, disabled, controlled_by); | |
| 183 bool actual_value; | |
| 184 std::string js_expression = base::StringPrintf( | |
| 185 "window.domAutomationController.send(document.querySelector('" | |
| 186 " input[type=\"checkbox\"][pref=\"%s\"]').checked);", | |
| 187 pref_name.c_str()); | |
| 188 ASSERT_TRUE(content::ExecuteScriptAndExtractBool( | |
| 189 contents, js_expression, &actual_value)); | |
| 190 EXPECT_EQ(expected_value, actual_value); | |
| 191 } | |
| 192 | |
| 193 // Verifies that the shared settings banner is visible only for | |
| 194 // secondary users. | |
| 195 void CheckBanner(content::WebContents* contents, | |
| 196 bool is_primary) { | |
| 72 bool banner_visible; | 197 bool banner_visible; |
| 73 ASSERT_TRUE(content::ExecuteScriptAndExtractBool( | 198 ASSERT_TRUE(content::ExecuteScriptAndExtractBool( |
| 74 contents, | 199 contents, |
| 75 "var e = document.getElementById('secondary-user-banner');" | 200 "var e = $('secondary-user-banner');" |
| 76 "var visible = e.offsetWidth > 0 && e.offsetHeight > 0;" | 201 "window.domAutomationController.send(e && !e.hidden);", |
| 77 "window.domAutomationController.send(visible);", | |
| 78 &banner_visible)); | 202 &banner_visible)); |
| 79 EXPECT_EQ(is_primary, !banner_visible); | 203 EXPECT_EQ(!is_primary, banner_visible); |
| 80 } | 204 } |
| 81 | 205 |
| 82 StubCrosSettingsProvider stub_settings_provider_; | 206 // Verifies that sections of shared settings have the appropriate indicator. |
| 207 void CheckSharedSections(content::WebContents* contents, | |
| 208 bool is_primary) { | |
| 209 // This only applies to the Internet options section. | |
| 210 std::string controlled_by; | |
| 211 ASSERT_TRUE(content::ExecuteScriptAndExtractString( | |
| 212 contents, | |
| 213 "var e = document.querySelector(" | |
| 214 " '#network-section-header span.controlled-setting-indicator');" | |
| 215 "if (!e || !e.getAttribute('controlled-by')) {" | |
| 216 " window.domAutomationController.send('');" | |
| 217 "} else {" | |
| 218 " window.domAutomationController.send(" | |
| 219 " e.getAttribute('controlled-by'));" | |
| 220 "}", | |
| 221 &controlled_by)); | |
| 222 EXPECT_EQ(!is_primary ? "shared" : std::string(), controlled_by); | |
| 223 } | |
| 224 | |
| 225 // Checks the Accounts header and non-checkbox inputs. | |
| 226 void CheckAccountsOverlay(content::WebContents* contents, bool is_owner) { | |
| 227 // Set cros.accounts.allowGuest to false so we can test the accounts list. | |
| 228 // This has to be done after the PRE_* test or we can't add the owner. | |
| 229 stub_settings_provider_.Set( | |
| 230 kAccountsPrefAllowNewUser, base::FundamentalValue(false)); | |
| 231 | |
| 232 bool success; | |
| 233 std::string js_expression = base::StringPrintf( | |
| 234 "var controlled = %d;" | |
| 235 "var warning = $('ownerOnlyWarning');" | |
| 236 "var userList = $('userList');" | |
| 237 "var input = $('userNameEdit');" | |
| 238 "var success;" | |
| 239 "if (controlled)" | |
| 240 " success = warning && !warning.hidden && userList.disabled &&" | |
| 241 " input.disabled;" | |
| 242 "else" | |
| 243 " success = (!warning || warning.hidden) && !userList.disabled &&" | |
| 244 " !input.disabled;" | |
| 245 "window.domAutomationController.send(!!success);", | |
| 246 !is_owner); | |
| 247 ASSERT_TRUE(content::ExecuteScriptAndExtractBool( | |
| 248 contents, js_expression, &success)); | |
| 249 EXPECT_TRUE(success) << "Accounts overlay incorrect for " << | |
| 250 (is_owner ? "owner." : "non-owner."); | |
| 251 } | |
| 252 | |
| 253 StubAccountSettingsProvider stub_settings_provider_; | |
| 83 CrosSettingsProvider* device_settings_provider_; | 254 CrosSettingsProvider* device_settings_provider_; |
| 84 | 255 |
| 85 private: | 256 private: |
| 86 DISALLOW_COPY_AND_ASSIGN(SharedOptionsTest); | 257 DISALLOW_COPY_AND_ASSIGN(SharedOptionsTest); |
| 87 }; | 258 }; |
| 88 | 259 |
| 89 IN_PROC_BROWSER_TEST_F(SharedOptionsTest, PRE_SharedOptions) { | 260 IN_PROC_BROWSER_TEST_F(SharedOptionsTest, PRE_SharedOptions) { |
| 90 RegisterUser(kTestUsers[0]); | 261 RegisterUser(kTestOwner); |
| 91 RegisterUser(kTestUsers[1]); | 262 RegisterUser(kTestNonOwner); |
| 92 StartupUtils::MarkOobeCompleted(); | 263 StartupUtils::MarkOobeCompleted(); |
| 93 } | 264 } |
| 94 | 265 |
| 95 IN_PROC_BROWSER_TEST_F(SharedOptionsTest, SharedOptions) { | 266 IN_PROC_BROWSER_TEST_F(SharedOptionsTest, SharedOptions) { |
| 96 LoginUser(kTestUsers[0]); | 267 // Log in the owner first, then add a secondary user. |
| 268 LoginUser(kTestOwner); | |
| 97 UserAddingScreen::Get()->Start(); | 269 UserAddingScreen::Get()->Start(); |
| 98 content::RunAllPendingInMessageLoop(); | 270 content::RunAllPendingInMessageLoop(); |
| 99 AddUser(kTestUsers[1]); | 271 AddUser(kTestNonOwner); |
| 100 | 272 |
| 101 UserManager* manager = UserManager::Get(); | 273 UserManager* manager = UserManager::Get(); |
| 102 ASSERT_EQ(2u, manager->GetLoggedInUsers().size()); | 274 ASSERT_EQ(2u, manager->GetLoggedInUsers().size()); |
| 275 { | |
| 276 SCOPED_TRACE("Checking settings for owner, primary user."); | |
| 277 CheckOptionsUI(manager->FindUser(manager->GetOwnerEmail()), true, true); | |
| 278 } | |
| 279 { | |
| 280 SCOPED_TRACE("Checking settings for non-owner, secondary user."); | |
| 281 CheckOptionsUI(manager->FindUser(kTestNonOwner), false, false); | |
| 282 } | |
| 283 // TODO(michaelpg): Add tests for non-primary owner and primary non-owner | |
| 284 // when the owner-only multiprofile restriction is removed, probably M38. | |
| 285 } | |
| 103 | 286 |
| 104 CheckOptionsUI(manager->FindUser(kTestUsers[0]), true /* is_primary */); | 287 IN_PROC_BROWSER_TEST_F(SharedOptionsTest, PRE_ScreenLockPreference) { |
| 105 CheckOptionsUI(manager->FindUser(kTestUsers[1]), false /* is_primary */); | 288 RegisterUser(kTestOwner); |
| 289 RegisterUser(kTestNonOwner); | |
| 290 StartupUtils::MarkOobeCompleted(); | |
| 291 } | |
| 292 | |
| 293 // Tests that a shared setting indicator appears for the auto-lock setting | |
| 294 // when the user has the checkbox unselected but another user has enabled | |
| 295 // auto-lock. (The checkbox is unset if the user's preference is false, | |
| 296 // but if any other signed-in user has enabled this preference, the shared | |
| 297 // setting indicator explains this.) | |
| 298 IN_PROC_BROWSER_TEST_F(SharedOptionsTest, ScreenLockPreference) { | |
| 299 LoginUser(kTestOwner); | |
| 300 UserAddingScreen::Get()->Start(); | |
| 301 content::RunAllPendingInMessageLoop(); | |
| 302 AddUser(kTestNonOwner); | |
| 303 | |
| 304 UserManager* manager = UserManager::Get(); | |
| 305 const User* user1 = manager->FindUser(kTestOwner); | |
| 306 const User* user2 = manager->FindUser(kTestNonOwner); | |
| 307 | |
| 308 PrefService* prefs1 = manager->GetProfileByUser(user1)->GetPrefs(); | |
| 309 PrefService* prefs2 = manager->GetProfileByUser(user2)->GetPrefs(); | |
| 310 prefs1->SetBoolean(prefs::kEnableAutoScreenLock, false); | |
| 311 prefs2->SetBoolean(prefs::kEnableAutoScreenLock, false); | |
| 312 | |
| 313 Browser* browser1 = CreateBrowserForUser(user1); | |
| 314 Browser* browser2 = CreateBrowserForUser(user2); | |
| 315 content::WebContents* contents1 = | |
| 316 browser1->tab_strip_model()->GetActiveWebContents(); | |
| 317 content::WebContents* contents2 = | |
| 318 browser2->tab_strip_model()->GetActiveWebContents(); | |
| 319 | |
| 320 bool disabled = false; | |
| 321 bool expected_value = false; | |
|
Nikita (slow)
2014/06/17 09:29:59
nit: How about always setting expected_value insid
michaelpg
2014/06/17 17:15:23
Done.
| |
| 322 std::string empty_controlled; | |
| 323 std::string shared_controlled("shared"); | |
| 324 | |
| 325 // First test case: secondary user dependent on primary user. | |
| 326 { | |
| 327 SCOPED_TRACE("Screen lock false for both users"); | |
| 328 CheckBooleanPreference(contents1, prefs::kEnableAutoScreenLock, disabled, | |
| 329 empty_controlled, expected_value); | |
| 330 CheckBooleanPreference(contents2, prefs::kEnableAutoScreenLock, disabled, | |
| 331 empty_controlled, expected_value); | |
| 332 } | |
| 333 // Set the preference to true for the primary user and check that the value | |
| 334 // changes appropriately. | |
| 335 prefs1->SetBoolean(prefs::kEnableAutoScreenLock, true); | |
| 336 expected_value = true; | |
| 337 { | |
| 338 SCOPED_TRACE("Screen lock true for primary user"); | |
| 339 CheckBooleanPreference(contents1, prefs::kEnableAutoScreenLock, disabled, | |
| 340 empty_controlled, expected_value); | |
| 341 } | |
| 342 // Reload the secondary user's browser to see the updated controlled-by | |
| 343 // indicator. Also reload the primary user's to make sure the setting still | |
| 344 // starts out correctly. | |
| 345 chrome::Reload(browser1, CURRENT_TAB); | |
| 346 chrome::Reload(browser2, CURRENT_TAB); | |
| 347 content::WaitForLoadStop(contents1); | |
| 348 content::WaitForLoadStop(contents2); | |
| 349 { | |
| 350 SCOPED_TRACE("Screen lock true for primary user, false for secondary user"); | |
| 351 CheckBooleanPreference(contents1, prefs::kEnableAutoScreenLock, disabled, | |
| 352 empty_controlled, expected_value); | |
| 353 expected_value = false; | |
| 354 CheckBooleanPreference(contents2, prefs::kEnableAutoScreenLock, disabled, | |
| 355 shared_controlled, expected_value); | |
| 356 } | |
| 357 // Set the preference to true for the secondary user and check that the | |
| 358 // indicator disappears. | |
| 359 prefs2->SetBoolean(prefs::kEnableAutoScreenLock, true); | |
| 360 expected_value = true; | |
| 361 { | |
| 362 SCOPED_TRACE("Screen lock true for secondary user"); | |
| 363 CheckBooleanPreference(contents2, prefs::kEnableAutoScreenLock, disabled, | |
| 364 empty_controlled, expected_value); | |
| 365 } | |
| 366 | |
| 367 // Second test case: primary user dependent on secondary user. | |
| 368 chrome::Reload(browser1, CURRENT_TAB); | |
| 369 chrome::Reload(browser2, CURRENT_TAB); | |
| 370 content::WaitForLoadStop(contents1); | |
| 371 content::WaitForLoadStop(contents2); | |
| 372 { | |
| 373 SCOPED_TRACE("Screen lock true for both users"); | |
| 374 CheckBooleanPreference(contents1, prefs::kEnableAutoScreenLock, disabled, | |
| 375 empty_controlled, expected_value); | |
| 376 CheckBooleanPreference(contents2, prefs::kEnableAutoScreenLock, disabled, | |
| 377 empty_controlled, expected_value); | |
| 378 } | |
| 379 // Set the preference to false for the primary user and check that the | |
| 380 // value changes correctly. | |
| 381 prefs1->SetBoolean(prefs::kEnableAutoScreenLock, false); | |
| 382 expected_value = false; | |
| 383 { | |
| 384 SCOPED_TRACE("Screen lock false for primary user"); | |
| 385 CheckBooleanPreference(contents1, prefs::kEnableAutoScreenLock, disabled, | |
| 386 shared_controlled, expected_value); | |
| 387 } | |
| 388 // The primary user should now see a shared setting indicator. | |
| 389 chrome::Reload(browser1, CURRENT_TAB); | |
| 390 chrome::Reload(browser2, CURRENT_TAB); | |
| 391 content::WaitForLoadStop(contents1); | |
| 392 content::WaitForLoadStop(contents2); | |
| 393 { | |
| 394 SCOPED_TRACE("Screen lock false for primary user, true for secondary user"); | |
| 395 CheckBooleanPreference(contents1, prefs::kEnableAutoScreenLock, disabled, | |
| 396 shared_controlled, expected_value); | |
| 397 expected_value = true; | |
| 398 CheckBooleanPreference(contents2, prefs::kEnableAutoScreenLock, disabled, | |
| 399 empty_controlled, expected_value); | |
| 400 } | |
| 106 } | 401 } |
| 107 | 402 |
| 108 } // namespace chromeos | 403 } // namespace chromeos |
| OLD | NEW |