Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(4879)

Unified Diff: chrome/browser/chromeos/login/saml/saml_browsertest.cc

Issue 473153002: Inline sign in extracts gaia id from HTTP header and seeds account tracker (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fix one unit test, progress on second Created 6 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/chromeos/login/saml/saml_browsertest.cc
diff --git a/chrome/browser/chromeos/login/saml/saml_browsertest.cc b/chrome/browser/chromeos/login/saml/saml_browsertest.cc
index 96bc8996fd4b07b0de45154702706b259e70c8ff..80b761b49f6374e17745994f060ff974fc23b660 100644
--- a/chrome/browser/chromeos/login/saml/saml_browsertest.cc
+++ b/chrome/browser/chromeos/login/saml/saml_browsertest.cc
@@ -91,6 +91,8 @@ const char kTestAuthSIDCookie2[] = "fake-auth-SID-cookie-2";
const char kTestAuthLSIDCookie1[] = "fake-auth-LSID-cookie-1";
const char kTestAuthLSIDCookie2[] = "fake-auth-LSID-cookie-2";
+const char kTestGaiaId[] = "12345";
+
const char kFirstSAMLUserEmail[] = "bob@example.com";
const char kSecondSAMLUserEmail[] = "alice@example.com";
const char kHTTPSAMLUserEmail[] = "carol@example.com";
@@ -296,7 +298,8 @@ class SamlTest : public InProcessBrowserTest {
}
virtual void SetUpOnMainThread() override {
- fake_gaia_.SetFakeMergeSessionParams(kFirstSAMLUserEmail,
+ fake_gaia_.SetFakeMergeSessionParams(kTestGaiaId,
+ kFirstSAMLUserEmail,
kTestAuthSIDCookie1,
kTestAuthLSIDCookie1);
@@ -542,7 +545,7 @@ IN_PROC_BROWSER_TEST_F(SamlTest, ScrapedNone) {
IN_PROC_BROWSER_TEST_F(SamlTest, UseAutenticatedUserEmailAddress) {
fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html");
// Type |bob@example.com| into the GAIA login form.
- StartSamlAndWaitForIdpPageLoad(kSecondSAMLUserEmail);
+ StartSamlAndWaitForIdpPageLoad(kFirstSAMLUserEmail);
// Authenticate as alice@example.com via SAML (the |Email| provided here is
// irrelevant - the authenticated user's e-mail address that FakeGAIA
@@ -567,10 +570,11 @@ IN_PROC_BROWSER_TEST_F(SamlTest, UseAutenticatedUserEmailAddress) {
// an error message is shown.
IN_PROC_BROWSER_TEST_F(SamlTest, FailToRetrieveAutenticatedUserEmailAddress) {
fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html");
+ fake_gaia_.SetFakeMergeSessionParams(
bartfab (slow) 2014/10/17 09:54:55 Once FakeGaia has been fixed to return the e-mail
Roger Tawa OOO till Jul 10th 2014/10/20 16:04:00 Done.
+ "", "", kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
+
StartSamlAndWaitForIdpPageLoad(kFirstSAMLUserEmail);
- fake_gaia_.SetFakeMergeSessionParams(
- "", kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
SetSignFormField("Email", "fake_user");
SetSignFormField("Password", "fake_password");
ExecuteJsInSigninFrame("document.getElementById('Submit').click();");
@@ -652,7 +656,8 @@ class SAMLPolicyTest : public SamlTest {
void EnableTransferSAMLCookiesPolicy();
void ShowGAIALoginForm();
- void LogInWithSAML(const std::string& user_id,
+ void LogInWithSAML(const std::string& gaia_id,
+ const std::string& user_id,
const std::string& auth_sid_cookie,
const std::string& auth_lsid_cookie);
@@ -764,14 +769,15 @@ void SAMLPolicyTest::ShowGAIALoginForm() {
EXPECT_EQ("\"ready\"", message);
}
-void SAMLPolicyTest::LogInWithSAML(const std::string& user_id,
+void SAMLPolicyTest::LogInWithSAML(const std::string& gaia_id,
+ const std::string& user_id,
const std::string& auth_sid_cookie,
const std::string& auth_lsid_cookie) {
fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html");
StartSamlAndWaitForIdpPageLoad(user_id);
fake_gaia_.SetFakeMergeSessionParams(
- user_id, auth_sid_cookie, auth_lsid_cookie);
+ gaia_id, user_id, auth_sid_cookie, auth_lsid_cookie);
SetSignFormField("Email", "fake_user");
SetSignFormField("Password", "fake_password");
ExecuteJsInSigninFrame("document.getElementById('Submit').click();");
@@ -855,7 +861,8 @@ IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_SAMLNoLimit) {
// Remove the offline login time limit for SAML users.
SetSAMLOfflineSigninTimeLimitPolicy(-1);
- LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
+ LogInWithSAML(kTestGaiaId, kFirstSAMLUserEmail, kTestAuthSIDCookie1,
+ kTestAuthLSIDCookie1);
}
// Verifies that when no offline login time limit is set, a user who
@@ -871,7 +878,8 @@ IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_SAMLZeroLimit) {
// Set the offline login time limit for SAML users to zero.
SetSAMLOfflineSigninTimeLimitPolicy(0);
- LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
+ LogInWithSAML(kTestGaiaId, kFirstSAMLUserEmail, kTestAuthSIDCookie1,
+ kTestAuthLSIDCookie1);
}
// Verifies that when the offline login time limit is exceeded for a user who
@@ -885,7 +893,8 @@ IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, SAMLZeroLimit) {
IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_PRE_TransferCookiesAffiliated) {
fake_saml_idp()->SetCookieValue(kSAMLIdPCookieValue1);
- LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
+ LogInWithSAML(kTestGaiaId, kFirstSAMLUserEmail, kTestAuthSIDCookie1,
+ kTestAuthLSIDCookie1);
GetCookies();
EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName));
@@ -901,7 +910,8 @@ IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_TransferCookiesAffiliated) {
fake_saml_idp()->SetCookieValue(kSAMLIdPCookieValue2);
fake_saml_idp()->SetLoginHTMLTemplate("saml_login.html");
ShowGAIALoginForm();
- LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie2, kTestAuthLSIDCookie2);
+ LogInWithSAML(kTestGaiaId, kFirstSAMLUserEmail, kTestAuthSIDCookie2,
+ kTestAuthLSIDCookie2);
GetCookies();
EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName));
@@ -919,7 +929,8 @@ IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, TransferCookiesAffiliated) {
ShowGAIALoginForm();
EnableTransferSAMLCookiesPolicy();
- LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie2, kTestAuthLSIDCookie2);
+ LogInWithSAML(kTestGaiaId, kFirstSAMLUserEmail, kTestAuthSIDCookie2,
+ kTestAuthLSIDCookie2);
GetCookies();
EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName));
@@ -929,7 +940,8 @@ IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, TransferCookiesAffiliated) {
IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, PRE_TransferCookiesUnaffiliated) {
fake_saml_idp()->SetCookieValue(kSAMLIdPCookieValue1);
- LogInWithSAML(kDifferentDomainSAMLUserEmail,
+ LogInWithSAML(kTestGaiaId,
+ kDifferentDomainSAMLUserEmail,
kTestAuthSIDCookie1,
kTestAuthLSIDCookie1);
@@ -949,7 +961,8 @@ IN_PROC_BROWSER_TEST_F(SAMLPolicyTest, TransferCookiesUnaffiliated) {
ShowGAIALoginForm();
EnableTransferSAMLCookiesPolicy();
- LogInWithSAML(kDifferentDomainSAMLUserEmail,
+ LogInWithSAML(kTestGaiaId,
+ kDifferentDomainSAMLUserEmail,
kTestAuthSIDCookie1,
kTestAuthLSIDCookie1);

Powered by Google App Engine
This is Rietveld 408576698