Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(36)

Side by Side Diff: chrome/browser/chromeos/login/saml/saml_browsertest.cc

Issue 369893005: Implement new design for expanded public session pod design (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fixed ScreenLockerTest. Rebased. Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/command_line.h" 5 #include "base/command_line.h"
6 #include "base/file_util.h" 6 #include "base/file_util.h"
7 #include "base/files/file_path.h" 7 #include "base/files/file_path.h"
8 #include "base/memory/scoped_ptr.h" 8 #include "base/memory/scoped_ptr.h"
9 #include "base/path_service.h" 9 #include "base/path_service.h"
10 #include "base/run_loop.h" 10 #include "base/run_loop.h"
(...skipping 662 matching lines...) Expand 10 before | Expand all | Expand 10 after
673 content::WindowedNotificationObserver( 673 content::WindowedNotificationObserver(
674 chrome::NOTIFICATION_SESSION_STARTED, 674 chrome::NOTIFICATION_SESSION_STARTED,
675 content::NotificationService::AllSources()).Wait(); 675 content::NotificationService::AllSources()).Wait();
676 } 676 }
677 677
678 // Verifies that the offline login time limit does not affect a user who 678 // Verifies that the offline login time limit does not affect a user who
679 // authenticated without SAML. 679 // authenticated without SAML.
680 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, NoSAML) { 680 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, NoSAML) {
681 login_screen_load_observer_->Wait(); 681 login_screen_load_observer_->Wait();
682 // Verify that offline login is allowed. 682 // Verify that offline login is allowed.
683 JsExpect("document.querySelector('#pod-row .signin-button').hidden"); 683 JsExpect("window.getComputedStyle(document.querySelector("
684 " '#pod-row .signin-button-container')).display == 'none'");
684 } 685 }
685 686
686 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_SAMLNoLimit) { 687 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_SAMLNoLimit) {
687 // Remove the offline login time limit for SAML users. 688 // Remove the offline login time limit for SAML users.
688 SetSAMLOfflineSigninTimeLimitPolicy(-1); 689 SetSAMLOfflineSigninTimeLimitPolicy(-1);
689 690
690 // Log in with SAML. 691 // Log in with SAML.
691 fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html"); 692 fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html");
692 StartSamlAndWaitForIdpPageLoad(kFirstSAMLUserEmail); 693 StartSamlAndWaitForIdpPageLoad(kFirstSAMLUserEmail);
693 694
694 SetSignFormField("Email", "fake_user"); 695 SetSignFormField("Email", "fake_user");
695 SetSignFormField("Password", "fake_password"); 696 SetSignFormField("Password", "fake_password");
696 ExecuteJsInSigninFrame("document.getElementById('Submit').click();"); 697 ExecuteJsInSigninFrame("document.getElementById('Submit').click();");
697 698
698 OobeScreenWaiter(OobeDisplay::SCREEN_CONFIRM_PASSWORD).Wait(); 699 OobeScreenWaiter(OobeDisplay::SCREEN_CONFIRM_PASSWORD).Wait();
699 700
700 SendConfirmPassword("fake_password"); 701 SendConfirmPassword("fake_password");
701 content::WindowedNotificationObserver( 702 content::WindowedNotificationObserver(
702 chrome::NOTIFICATION_SESSION_STARTED, 703 chrome::NOTIFICATION_SESSION_STARTED,
703 content::NotificationService::AllSources()).Wait(); 704 content::NotificationService::AllSources()).Wait();
704 } 705 }
705 706
706 // Verifies that when no offline login time limit is set, a user who 707 // Verifies that when no offline login time limit is set, a user who
707 // authenticated with SAML is allowed to log in offline. 708 // authenticated with SAML is allowed to log in offline.
708 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, SAMLNoLimit) { 709 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, SAMLNoLimit) {
709 login_screen_load_observer_->Wait(); 710 login_screen_load_observer_->Wait();
710 // Verify that offline login is allowed. 711 // Verify that offline login is allowed.
711 JsExpect("document.querySelector('#pod-row .signin-button').hidden"); 712 JsExpect("window.getComputedStyle(document.querySelector("
713 " '#pod-row .signin-button-container')).display == 'none'");
712 } 714 }
713 715
714 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_SAMLZeroLimit) { 716 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_SAMLZeroLimit) {
715 // Set the offline login time limit for SAML users to zero. 717 // Set the offline login time limit for SAML users to zero.
716 SetSAMLOfflineSigninTimeLimitPolicy(0); 718 SetSAMLOfflineSigninTimeLimitPolicy(0);
717 719
718 // Log in with SAML. 720 // Log in with SAML.
719 fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html"); 721 fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html");
720 StartSamlAndWaitForIdpPageLoad(kFirstSAMLUserEmail); 722 StartSamlAndWaitForIdpPageLoad(kFirstSAMLUserEmail);
721 723
722 SetSignFormField("Email", "fake_user"); 724 SetSignFormField("Email", "fake_user");
723 SetSignFormField("Password", "fake_password"); 725 SetSignFormField("Password", "fake_password");
724 ExecuteJsInSigninFrame("document.getElementById('Submit').click();"); 726 ExecuteJsInSigninFrame("document.getElementById('Submit').click();");
725 727
726 OobeScreenWaiter(OobeDisplay::SCREEN_CONFIRM_PASSWORD).Wait(); 728 OobeScreenWaiter(OobeDisplay::SCREEN_CONFIRM_PASSWORD).Wait();
727 729
728 SendConfirmPassword("fake_password"); 730 SendConfirmPassword("fake_password");
729 content::WindowedNotificationObserver( 731 content::WindowedNotificationObserver(
730 chrome::NOTIFICATION_SESSION_STARTED, 732 chrome::NOTIFICATION_SESSION_STARTED,
731 content::NotificationService::AllSources()).Wait(); 733 content::NotificationService::AllSources()).Wait();
732 } 734 }
733 735
734 // Verifies that when the offline login time limit is exceeded for a user who 736 // Verifies that when the offline login time limit is exceeded for a user who
735 // authenticated via SAML, that user is forced to log in online the next time. 737 // authenticated via SAML, that user is forced to log in online the next time.
736 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, SAMLZeroLimit) { 738 IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, SAMLZeroLimit) {
737 login_screen_load_observer_->Wait(); 739 login_screen_load_observer_->Wait();
738 // Verify that offline login is not allowed. 740 // Verify that offline login is not allowed.
739 JsExpect("!document.querySelector('#pod-row .signin-button').hidden"); 741 JsExpect("window.getComputedStyle(document.querySelector("
742 " '#pod-row .signin-button-container')).display != 'none'");
740 } 743 }
741 744
742 } // namespace chromeos 745 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698