Index: chromeos/network/network_connection_handler_unittest.cc |
diff --git a/chromeos/network/network_connection_handler_unittest.cc b/chromeos/network/network_connection_handler_unittest.cc |
index b2c61acf8bf94a8c89a277fc3aabe6574fe22daa..31b04c2c7ecb6e9b31c0b6c004119f5f68b02898 100644 |
--- a/chromeos/network/network_connection_handler_unittest.cc |
+++ b/chromeos/network/network_connection_handler_unittest.cc |
@@ -426,114 +426,6 @@ TEST_F(NetworkConnectionHandlerTest, |
EXPECT_EQ(NetworkConnectionHandler::kErrorNotConnected, GetResultAndReset()); |
} |
-namespace { |
- |
-const char* kConfigUnmanagedSharedConnected = |
- "{ \"GUID\": \"wifi0\", \"Type\": \"wifi\", \"State\": \"online\", " |
- " \"Security\": \"wpa\" }"; |
-const char* kConfigManagedSharedConnectable = |
- "{ \"GUID\": \"wifi1\", \"Type\": \"wifi\", \"State\": \"idle\", " |
- " \"Connectable\": true, \"Security\": \"wpa\" }"; |
- |
-const char* kPolicy = |
- "[ { \"GUID\": \"wifi1\"," |
- " \"Name\": \"wifi1\"," |
- " \"Type\": \"WiFi\"," |
- " \"WiFi\": {" |
- " \"Security\": \"WPA-PSK\"," |
- " \"SSID\": \"wifi1\"," |
- " \"Passphrase\": \"passphrase\"" |
- " }" |
- "} ]"; |
- |
-} // namespace |
- |
-TEST_F(NetworkConnectionHandlerTest, ReconnectOnCertLoading) { |
- EXPECT_TRUE(Configure(kConfigUnmanagedSharedConnected)); |
- EXPECT_TRUE(Configure(kConfigManagedSharedConnectable)); |
- test_manager_client_->SetBestServiceToConnect("wifi1"); |
- |
- // User login shouldn't trigger any change until the certificates and policy |
- // are loaded. |
- LoginToRegularUser(); |
- EXPECT_EQ(shill::kStateOnline, |
- GetServiceStringProperty("wifi0", shill::kStateProperty)); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi1", shill::kStateProperty)); |
- |
- // Applying the policy which restricts autoconnect should disconnect from the |
- // shared, unmanaged network. |
- base::DictionaryValue global_config; |
- global_config.SetBooleanWithoutPathExpansion( |
- ::onc::global_network_config::kAllowOnlyPolicyNetworksToAutoconnect, |
- true); |
- |
- SetupPolicy(kPolicy, global_config, false /* load as device policy */); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi0", shill::kStateProperty)); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi1", shill::kStateProperty)); |
- |
- // Certificate loading should trigger connecting to the 'best' network. |
- StartCertLoader(); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi0", shill::kStateProperty)); |
- EXPECT_EQ(shill::kStateOnline, |
- GetServiceStringProperty("wifi1", shill::kStateProperty)); |
-} |
- |
-TEST_F(NetworkConnectionHandlerTest, DisconnectOnPolicyLoading) { |
- EXPECT_TRUE(Configure(kConfigUnmanagedSharedConnected)); |
- EXPECT_TRUE(Configure(kConfigManagedSharedConnectable)); |
- |
- // User login and certificate loading shouldn't trigger any change until the |
- // policy is loaded. |
- LoginToRegularUser(); |
- StartCertLoader(); |
- EXPECT_EQ(shill::kStateOnline, |
- GetServiceStringProperty("wifi0", shill::kStateProperty)); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi1", shill::kStateProperty)); |
- |
- base::DictionaryValue global_config; |
- global_config.SetBooleanWithoutPathExpansion( |
- ::onc::global_network_config::kAllowOnlyPolicyNetworksToAutoconnect, |
- true); |
- |
- // Applying the policy which restricts autoconnect should disconnect from the |
- // shared, unmanaged network. |
- // Because no best service is set, the fake implementation of |
- // ConnectToBestServices will be a no-op. |
- SetupPolicy(kPolicy, global_config, false /* load as device policy */); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi0", shill::kStateProperty)); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi1", shill::kStateProperty)); |
-} |
- |
-TEST_F(NetworkConnectionHandlerTest, ReconnectOnEmptyPolicyLoading) { |
- EXPECT_TRUE(Configure(kConfigUnmanagedSharedConnected)); |
- EXPECT_TRUE(Configure(kConfigManagedSharedConnectable)); |
- test_manager_client_->SetBestServiceToConnect("wifi1"); |
- |
- // User login and certificate loading shouldn't trigger any change until the |
- // policy is loaded. |
- LoginToRegularUser(); |
- StartCertLoader(); |
- EXPECT_EQ(shill::kStateOnline, |
- GetServiceStringProperty("wifi0", shill::kStateProperty)); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi1", shill::kStateProperty)); |
- |
- // Apply an empty policy should trigger connecting to the 'best' network. |
- base::DictionaryValue global_config; |
- SetupPolicy(kPolicy, global_config, false /* load as device policy */); |
- EXPECT_EQ(shill::kStateIdle, |
- GetServiceStringProperty("wifi0", shill::kStateProperty)); |
- EXPECT_EQ(shill::kStateOnline, |
- GetServiceStringProperty("wifi1", shill::kStateProperty)); |
-} |
- |
} // namespace chromeos |
#endif |