| Index: chrome/browser/ui/sync/one_click_signin_helper_unittest.cc
|
| diff --git a/chrome/browser/ui/sync/one_click_signin_helper_unittest.cc b/chrome/browser/ui/sync/one_click_signin_helper_unittest.cc
|
| deleted file mode 100644
|
| index ebae62fa0a68c8ab6718e420d3523d7acc1ecdeb..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/ui/sync/one_click_signin_helper_unittest.cc
|
| +++ /dev/null
|
| @@ -1,986 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "base/prefs/pref_service.h"
|
| -#include "base/prefs/scoped_user_pref_update.h"
|
| -#include "base/run_loop.h"
|
| -#include "base/strings/utf_string_conversions.h"
|
| -#include "base/values.h"
|
| -#include "chrome/browser/chrome_notification_types.h"
|
| -#include "chrome/browser/content_settings/cookie_settings.h"
|
| -#include "chrome/browser/custom_handlers/protocol_handler_registry.h"
|
| -#include "chrome/browser/profiles/profile.h"
|
| -#include "chrome/browser/profiles/profile_info_cache.h"
|
| -#include "chrome/browser/profiles/profile_io_data.h"
|
| -#include "chrome/browser/profiles/profile_manager.h"
|
| -#include "chrome/browser/signin/chrome_signin_client.h"
|
| -#include "chrome/browser/signin/chrome_signin_client_factory.h"
|
| -#include "chrome/browser/signin/fake_profile_oauth2_token_service.h"
|
| -#include "chrome/browser/signin/fake_profile_oauth2_token_service_builder.h"
|
| -#include "chrome/browser/signin/fake_signin_manager.h"
|
| -#include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
|
| -#include "chrome/browser/signin/signin_manager_factory.h"
|
| -#include "chrome/browser/signin/signin_names_io_thread.h"
|
| -#include "chrome/browser/signin/signin_promo.h"
|
| -#include "chrome/browser/sync/profile_sync_components_factory_mock.h"
|
| -#include "chrome/browser/sync/profile_sync_service_factory.h"
|
| -#include "chrome/browser/sync/test_profile_sync_service.h"
|
| -#include "chrome/browser/ui/sync/one_click_signin_helper.h"
|
| -#include "chrome/browser/ui/webui/signin/login_ui_service.h"
|
| -#include "chrome/browser/ui/webui/signin/login_ui_service_factory.h"
|
| -#include "chrome/common/pref_names.h"
|
| -#include "chrome/grit/chromium_strings.h"
|
| -#include "chrome/grit/generated_resources.h"
|
| -#include "chrome/test/base/chrome_render_view_host_test_harness.h"
|
| -#include "chrome/test/base/testing_browser_process.h"
|
| -#include "chrome/test/base/testing_pref_service_syncable.h"
|
| -#include "chrome/test/base/testing_profile.h"
|
| -#include "chrome/test/base/testing_profile_manager.h"
|
| -#include "components/autofill/core/common/password_form.h"
|
| -#include "components/signin/core/browser/profile_oauth2_token_service.h"
|
| -#include "components/signin/core/browser/signin_manager.h"
|
| -#include "components/sync_driver/pref_names.h"
|
| -#include "content/public/browser/browser_context.h"
|
| -#include "content/public/browser/navigation_details.h"
|
| -#include "content/public/browser/navigation_entry.h"
|
| -#include "content/public/browser/web_contents.h"
|
| -#include "content/public/browser/web_contents_delegate.h"
|
| -#include "content/public/common/frame_navigate_params.h"
|
| -#include "content/public/common/url_constants.h"
|
| -#include "content/public/test/mock_render_process_host.h"
|
| -#include "testing/gmock/include/gmock/gmock.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -#include "ui/base/l10n/l10n_util.h"
|
| -
|
| -using ::testing::_;
|
| -using ::testing::AtLeast;
|
| -using ::testing::Return;
|
| -
|
| -namespace {
|
| -
|
| -// Used to confirm OneClickSigninHelper does not trigger redirect when there is
|
| -// a pending navigation.
|
| -class MockWebContentsDelegate : public content::WebContentsDelegate {
|
| - public:
|
| - MOCK_METHOD2(OpenURLFromTab,
|
| - content::WebContents*(content::WebContents* source,
|
| - const content::OpenURLParams& params));
|
| -};
|
| -
|
| -class SigninManagerMock : public FakeSigninManager {
|
| - public:
|
| - explicit SigninManagerMock(Profile* profile) : FakeSigninManager(profile) {
|
| - Initialize(NULL);
|
| - }
|
| - MOCK_CONST_METHOD1(IsAllowedUsername, bool(const std::string& username));
|
| -};
|
| -
|
| -static KeyedService* BuildSigninManagerMock(content::BrowserContext* profile) {
|
| - return new SigninManagerMock(static_cast<Profile*>(profile));
|
| -}
|
| -
|
| -class TestProfileIOData : public ProfileIOData {
|
| - public:
|
| - TestProfileIOData(Profile::ProfileType profile_type,
|
| - PrefService* pref_service, PrefService* local_state,
|
| - CookieSettings* cookie_settings)
|
| - : ProfileIOData(profile_type) {
|
| - // Initialize the IO members required for these tests, but keep them on
|
| - // this thread since we don't use a background thread here.
|
| - google_services_username()->Init(prefs::kGoogleServicesUsername,
|
| - pref_service);
|
| - reverse_autologin_enabled()->Init(prefs::kReverseAutologinEnabled,
|
| - pref_service);
|
| - one_click_signin_rejected_email_list()->Init(
|
| - prefs::kReverseAutologinRejectedEmailList, pref_service);
|
| -
|
| - google_services_username_pattern()->Init(
|
| - prefs::kGoogleServicesUsernamePattern, local_state);
|
| -
|
| - sync_disabled()->Init(sync_driver::prefs::kSyncManaged, pref_service);
|
| -
|
| - signin_allowed()->Init(prefs::kSigninAllowed, pref_service);
|
| -
|
| - set_signin_names_for_testing(new SigninNamesOnIOThread());
|
| - SetCookieSettingsForTesting(cookie_settings);
|
| - }
|
| -
|
| - ~TestProfileIOData() override {
|
| - signin_names()->ReleaseResourcesOnUIThread();
|
| - }
|
| -
|
| - // ProfileIOData overrides:
|
| - void InitializeInternal(
|
| - scoped_ptr<ChromeNetworkDelegate> chrome_network_delegate,
|
| - ProfileParams* profile_params,
|
| - content::ProtocolHandlerMap* protocol_handlers,
|
| - content::URLRequestInterceptorScopedVector
|
| - request_interceptors) const override {
|
| - NOTREACHED();
|
| - }
|
| - void InitializeExtensionsRequestContext(
|
| - ProfileParams* profile_params) const override {
|
| - NOTREACHED();
|
| - }
|
| - net::URLRequestContext* InitializeAppRequestContext(
|
| - net::URLRequestContext* main_context,
|
| - const StoragePartitionDescriptor& details,
|
| - scoped_ptr<ProtocolHandlerRegistry::JobInterceptorFactory>
|
| - protocol_handler_interceptor,
|
| - content::ProtocolHandlerMap* protocol_handlers,
|
| - content::URLRequestInterceptorScopedVector request_interceptors)
|
| - const override {
|
| - NOTREACHED();
|
| - return NULL;
|
| - }
|
| - net::URLRequestContext* InitializeMediaRequestContext(
|
| - net::URLRequestContext* original_context,
|
| - const StoragePartitionDescriptor& details) const override {
|
| - NOTREACHED();
|
| - return NULL;
|
| - }
|
| - net::URLRequestContext* AcquireMediaRequestContext() const override {
|
| - NOTREACHED();
|
| - return NULL;
|
| - }
|
| - net::URLRequestContext* AcquireIsolatedAppRequestContext(
|
| - net::URLRequestContext* main_context,
|
| - const StoragePartitionDescriptor& partition_descriptor,
|
| - scoped_ptr<ProtocolHandlerRegistry::JobInterceptorFactory>
|
| - protocol_handler_interceptor,
|
| - content::ProtocolHandlerMap* protocol_handlers,
|
| - content::URLRequestInterceptorScopedVector request_interceptors)
|
| - const override {
|
| - NOTREACHED();
|
| - return NULL;
|
| - }
|
| - net::URLRequestContext* AcquireIsolatedMediaRequestContext(
|
| - net::URLRequestContext* app_context,
|
| - const StoragePartitionDescriptor& partition_descriptor) const override {
|
| - NOTREACHED();
|
| - return NULL;
|
| - }
|
| -};
|
| -
|
| -class TestURLRequest : public base::SupportsUserData {
|
| - public:
|
| - TestURLRequest() {}
|
| - ~TestURLRequest() override {}
|
| -};
|
| -
|
| -class OneClickTestProfileSyncService : public TestProfileSyncService {
|
| - public:
|
| - ~OneClickTestProfileSyncService() override {}
|
| -
|
| - // Helper routine to be used in conjunction with
|
| - // BrowserContextKeyedServiceFactory::SetTestingFactory().
|
| - static KeyedService* Build(content::BrowserContext* profile) {
|
| - return new OneClickTestProfileSyncService(static_cast<Profile*>(profile));
|
| - }
|
| -
|
| - // Need to control this for certain tests.
|
| - bool FirstSetupInProgress() const override {
|
| - return first_setup_in_progress_;
|
| - }
|
| -
|
| - bool SyncActive() const override { return sync_active_; }
|
| -
|
| - // Controls return value of FirstSetupInProgress. Because some bits
|
| - // of UI depend on that value, it's useful to control it separately
|
| - // from the internal work and components that are triggered (such as
|
| - // ReconfigureDataTypeManager) to facilitate unit tests.
|
| - void set_first_setup_in_progress(bool in_progress) {
|
| - first_setup_in_progress_ = in_progress;
|
| - }
|
| -
|
| - void set_sync_active(bool active) {
|
| - sync_active_ = active;
|
| - }
|
| -
|
| - private:
|
| - explicit OneClickTestProfileSyncService(Profile* profile)
|
| - : TestProfileSyncService(
|
| - scoped_ptr<ProfileSyncComponentsFactory>(
|
| - new ProfileSyncComponentsFactoryMock()),
|
| - profile,
|
| - SigninManagerFactory::GetForProfile(profile),
|
| - ProfileOAuth2TokenServiceFactory::GetForProfile(profile),
|
| - browser_sync::MANUAL_START),
|
| - first_setup_in_progress_(false),
|
| - sync_active_(false) {}
|
| -
|
| - bool first_setup_in_progress_;
|
| - bool sync_active_;
|
| -};
|
| -
|
| -} // namespace
|
| -
|
| -class OneClickSigninHelperTest : public ChromeRenderViewHostTestHarness {
|
| - public:
|
| - OneClickSigninHelperTest();
|
| -
|
| - void SetUp() override;
|
| - void TearDown() override;
|
| -
|
| - // Sets up the sign-in manager for tests. If |username| is
|
| - // is not empty, the profile of the mock WebContents will be connected to
|
| - // the given account.
|
| - void SetUpSigninManager(const std::string& username);
|
| -
|
| - // Set the ID of the signin process that the test will assume to be the
|
| - // only process allowed to sign the user in to Chrome.
|
| - void SetTrustedSigninProcessID(int id);
|
| -
|
| - void AddEmailToOneClickRejectedList(const std::string& email);
|
| - void EnableOneClick(bool enable);
|
| - void AllowSigninCookies(bool enable);
|
| - void SetAllowedUsernamePattern(const std::string& pattern);
|
| - void SubmitGAIAPassword(OneClickSigninHelper* helper);
|
| -
|
| - SigninManagerMock* signin_manager_;
|
| - FakeProfileOAuth2TokenService* fake_oauth2_token_service_;
|
| -
|
| - protected:
|
| - GoogleServiceAuthError no_error_;
|
| -
|
| - private:
|
| - // ChromeRenderViewHostTestHarness overrides:
|
| - content::BrowserContext* CreateBrowserContext() override;
|
| -
|
| - // The ID of the signin process the test will assume to be trusted.
|
| - // By default, set to the test RenderProcessHost's process ID, but
|
| - // overridden by SetTrustedSigninProcessID.
|
| - int trusted_signin_process_id_;
|
| -
|
| - DISALLOW_COPY_AND_ASSIGN(OneClickSigninHelperTest);
|
| -};
|
| -
|
| -OneClickSigninHelperTest::OneClickSigninHelperTest()
|
| - : signin_manager_(NULL),
|
| - fake_oauth2_token_service_(NULL),
|
| - no_error_(GoogleServiceAuthError::NONE),
|
| - trusted_signin_process_id_(-1) {
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::SetUp() {
|
| - signin::ForceWebBasedSigninFlowForTesting(true);
|
| - content::RenderViewHostTestHarness::SetUp();
|
| - SetTrustedSigninProcessID(process()->GetID());
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::TearDown() {
|
| - signin::ForceWebBasedSigninFlowForTesting(false);
|
| - content::RenderViewHostTestHarness::TearDown();
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::SetTrustedSigninProcessID(int id) {
|
| - trusted_signin_process_id_ = id;
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::SetUpSigninManager(const std::string& username) {
|
| - SigninClient* signin_client =
|
| - ChromeSigninClientFactory::GetForProfile(profile());
|
| - if (signin_client)
|
| - signin_client->SetSigninProcess(trusted_signin_process_id_);
|
| -
|
| - signin_manager_ = static_cast<SigninManagerMock*>(
|
| - SigninManagerFactory::GetForProfile(profile()));
|
| - if (!username.empty()) {
|
| - ASSERT_TRUE(signin_manager_);
|
| - signin_manager_->SetAuthenticatedUsername(username);
|
| - }
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::EnableOneClick(bool enable) {
|
| - PrefService* pref_service = profile()->GetPrefs();
|
| - pref_service->SetBoolean(prefs::kReverseAutologinEnabled, enable);
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::AddEmailToOneClickRejectedList(
|
| - const std::string& email) {
|
| - PrefService* pref_service = profile()->GetPrefs();
|
| - ListPrefUpdate updater(pref_service,
|
| - prefs::kReverseAutologinRejectedEmailList);
|
| - updater->AppendIfNotPresent(new base::StringValue(email));
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::AllowSigninCookies(bool enable) {
|
| - CookieSettings* cookie_settings =
|
| - CookieSettings::Factory::GetForProfile(profile()).get();
|
| - cookie_settings->SetDefaultCookieSetting(enable ? CONTENT_SETTING_ALLOW
|
| - : CONTENT_SETTING_BLOCK);
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::SetAllowedUsernamePattern(
|
| - const std::string& pattern) {
|
| - PrefService* local_state = g_browser_process->local_state();
|
| - local_state->SetString(prefs::kGoogleServicesUsernamePattern, pattern);
|
| -}
|
| -
|
| -void OneClickSigninHelperTest::SubmitGAIAPassword(
|
| - OneClickSigninHelper* helper) {
|
| - autofill::PasswordForm password_form;
|
| - password_form.origin = GURL("https://accounts.google.com");
|
| - password_form.signon_realm = "https://accounts.google.com";
|
| - password_form.password_value = base::UTF8ToUTF16("password");
|
| - helper->PasswordSubmitted(password_form);
|
| -}
|
| -
|
| -content::BrowserContext* OneClickSigninHelperTest::CreateBrowserContext() {
|
| - TestingProfile::Builder builder;
|
| - builder.AddTestingFactory(ProfileOAuth2TokenServiceFactory::GetInstance(),
|
| - BuildFakeProfileOAuth2TokenService);
|
| - builder.AddTestingFactory(SigninManagerFactory::GetInstance(),
|
| - BuildSigninManagerMock);
|
| - scoped_ptr<TestingProfile> profile = builder.Build();
|
| -
|
| - fake_oauth2_token_service_ =
|
| - static_cast<FakeProfileOAuth2TokenService*>(
|
| - ProfileOAuth2TokenServiceFactory::GetForProfile(profile.get()));
|
| -
|
| - return profile.release();
|
| -}
|
| -
|
| -class OneClickSigninHelperIOTest : public OneClickSigninHelperTest {
|
| - public:
|
| - OneClickSigninHelperIOTest();
|
| -
|
| - void SetUp() override;
|
| -
|
| - TestProfileIOData* CreateTestProfileIOData(Profile::ProfileType profile_type);
|
| -
|
| - protected:
|
| - TestingProfileManager testing_profile_manager_;
|
| - TestURLRequest request_;
|
| - const GURL valid_gaia_url_;
|
| -
|
| - private:
|
| - DISALLOW_COPY_AND_ASSIGN(OneClickSigninHelperIOTest);
|
| -};
|
| -
|
| -OneClickSigninHelperIOTest::OneClickSigninHelperIOTest()
|
| - : testing_profile_manager_(
|
| - TestingBrowserProcess::GetGlobal()),
|
| - valid_gaia_url_("https://accounts.google.com/") {
|
| -}
|
| -
|
| -void OneClickSigninHelperIOTest::SetUp() {
|
| - OneClickSigninHelperTest::SetUp();
|
| - ASSERT_TRUE(testing_profile_manager_.SetUp());
|
| -}
|
| -
|
| -TestProfileIOData* OneClickSigninHelperIOTest::CreateTestProfileIOData(
|
| - Profile::ProfileType profile_type) {
|
| - PrefService* pref_service = profile()->GetPrefs();
|
| - PrefService* local_state = g_browser_process->local_state();
|
| - CookieSettings* cookie_settings =
|
| - CookieSettings::Factory::GetForProfile(profile()).get();
|
| - TestProfileIOData* io_data = new TestProfileIOData(
|
| - profile_type, pref_service, local_state, cookie_settings);
|
| - io_data->set_reverse_autologin_pending_email("user@gmail.com");
|
| - return io_data;
|
| -}
|
| -
|
| -class OneClickSigninHelperIncognitoTest : public OneClickSigninHelperTest {
|
| - protected:
|
| - // content::RenderViewHostTestHarness.
|
| - content::BrowserContext* CreateBrowserContext() override;
|
| -};
|
| -
|
| -content::BrowserContext*
|
| -OneClickSigninHelperIncognitoTest::CreateBrowserContext() {
|
| - // Simulate an incognito profile to run this test. RenderViewHostTestHarness
|
| - // takes ownership of the return value, so it can't be a "proper" incognito
|
| - // profile, since they are owned by their parent, non-incognito profile.
|
| - scoped_ptr<TestingProfile> profile = TestingProfile::Builder().Build();
|
| - profile->ForceIncognito(true);
|
| - return profile.release();
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOfferNoContents) {
|
| - std::string error_message;
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - NULL, OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - NULL, OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - NULL,
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - &error_message));
|
| - EXPECT_EQ("", error_message);
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOffer) {
|
| - SetUpSigninManager(std::string());
|
| -
|
| - EXPECT_CALL(*signin_manager_, IsAllowedUsername(_)).
|
| - WillRepeatedly(Return(true));
|
| -
|
| - EnableOneClick(true);
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "user@gmail.com", NULL));
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", NULL));
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - NULL));
|
| -
|
| - EnableOneClick(false);
|
| -
|
| - std::string error_message;
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| -
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - &error_message));
|
| - EXPECT_EQ("", error_message);
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOfferFirstSetup) {
|
| - SetUpSigninManager(std::string());
|
| -
|
| - EXPECT_CALL(*signin_manager_, IsAllowedUsername(_)).
|
| - WillRepeatedly(Return(true));
|
| -
|
| - // Invoke OneClickTestProfileSyncService factory function and grab result.
|
| - OneClickTestProfileSyncService* sync =
|
| - static_cast<OneClickTestProfileSyncService*>(
|
| - ProfileSyncServiceFactory::GetInstance()->SetTestingFactoryAndUse(
|
| - profile(), OneClickTestProfileSyncService::Build));
|
| - sync->set_sync_active(false);
|
| - sync->Initialize();
|
| - sync->set_sync_active(true);
|
| - sync->set_first_setup_in_progress(true);
|
| -
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "foo@gmail.com", NULL));
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "foo@gmail.com", NULL));
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - NULL));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOfferProfileConnected) {
|
| - SetUpSigninManager("foo@gmail.com");
|
| -
|
| - EXPECT_CALL(*signin_manager_, IsAllowedUsername(_)).
|
| - WillRepeatedly(Return(true));
|
| -
|
| - std::string error_message;
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "foo@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "foo", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ(l10n_util::GetStringFUTF8(IDS_SYNC_WRONG_EMAIL,
|
| - base::UTF8ToUTF16("foo@gmail.com")),
|
| - error_message);
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "foo@gmail.com", &error_message));
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "foo", &error_message));
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ(l10n_util::GetStringFUTF8(IDS_SYNC_WRONG_EMAIL,
|
| - base::UTF8ToUTF16("foo@gmail.com")),
|
| - error_message);
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - &error_message));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOfferUsernameNotAllowed) {
|
| - SetUpSigninManager(std::string());
|
| -
|
| - EXPECT_CALL(*signin_manager_, IsAllowedUsername(_)).
|
| - WillRepeatedly(Return(false));
|
| -
|
| - std::string error_message;
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "foo@gmail.com", &error_message));
|
| - EXPECT_EQ(l10n_util::GetStringUTF8(IDS_SYNC_LOGIN_NAME_PROHIBITED),
|
| - error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "foo@gmail.com", &error_message));
|
| - EXPECT_EQ(l10n_util::GetStringUTF8(IDS_SYNC_LOGIN_NAME_PROHIBITED),
|
| - error_message);
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - &error_message));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOfferWithRejectedEmail) {
|
| - SetUpSigninManager(std::string());
|
| -
|
| - EXPECT_CALL(*signin_manager_, IsAllowedUsername(_)).
|
| - WillRepeatedly(Return(true));
|
| -
|
| - AddEmailToOneClickRejectedList("foo@gmail.com");
|
| - AddEmailToOneClickRejectedList("user@gmail.com");
|
| -
|
| - std::string error_message;
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "foo@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "foo@gmail.com", &error_message));
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "john@gmail.com", &error_message));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIncognitoTest, CanOfferIncognito) {
|
| - SetUpSigninManager(std::string());
|
| -
|
| - std::string error_message;
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - &error_message));
|
| - EXPECT_EQ("", error_message);
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOfferNoSigninCookies) {
|
| - SetUpSigninManager(std::string());
|
| - AllowSigninCookies(false);
|
| -
|
| - EXPECT_CALL(*signin_manager_, IsAllowedUsername(_)).
|
| - WillRepeatedly(Return(true));
|
| -
|
| - std::string error_message;
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", &error_message));
|
| - EXPECT_EQ("", error_message);
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(),
|
| - OneClickSigninHelper::CAN_OFFER_FOR_INTERSTITAL_ONLY,
|
| - std::string(),
|
| - &error_message));
|
| - EXPECT_EQ("", error_message);
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, CanOfferDisabledByPolicy) {
|
| - SetUpSigninManager(std::string());
|
| -
|
| - EXPECT_CALL(*signin_manager_, IsAllowedUsername(_)).
|
| - WillRepeatedly(Return(true));
|
| -
|
| - EnableOneClick(true);
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", NULL));
|
| -
|
| - // Simulate a policy disabling signin by writing kSigninAllowed directly.
|
| - profile()->GetTestingPrefService()->SetManagedPref(
|
| - prefs::kSigninAllowed, new base::FundamentalValue(false));
|
| -
|
| - EXPECT_FALSE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", NULL));
|
| -
|
| - // Reset the preference value to true.
|
| - profile()->GetTestingPrefService()->SetManagedPref(
|
| - prefs::kSigninAllowed, new base::FundamentalValue(true));
|
| -
|
| - // Simulate a policy disabling sync by writing kSyncManaged directly.
|
| - profile()->GetTestingPrefService()->SetManagedPref(
|
| - sync_driver::prefs::kSyncManaged, new base::FundamentalValue(true));
|
| -
|
| - // Should still offer even if sync is disabled by policy.
|
| - EXPECT_TRUE(OneClickSigninHelper::CanOffer(
|
| - web_contents(), OneClickSigninHelper::CAN_OFFER_FOR_ALL,
|
| - "user@gmail.com", NULL));
|
| -}
|
| -
|
| -// Should not crash if a helper instance is not associated with an incognito
|
| -// web contents.
|
| -TEST_F(OneClickSigninHelperIncognitoTest, ShowInfoBarUIThreadIncognito) {
|
| - SetUpSigninManager(std::string());
|
| - OneClickSigninHelper* helper =
|
| - OneClickSigninHelper::FromWebContents(web_contents());
|
| - EXPECT_EQ(NULL, helper);
|
| -
|
| - OneClickSigninHelper::ShowInfoBarUIThread(
|
| - "session_index", "email", OneClickSigninHelper::AUTO_ACCEPT_ACCEPTED,
|
| - signin_metrics::SOURCE_UNKNOWN, GURL(), process()->GetID(),
|
| - rvh()->GetRoutingID());
|
| -}
|
| -
|
| -// Checks that the state of OneClickSigninHelper is cleaned when there is a
|
| -// navigation away from the sign in flow that is not triggered by the
|
| -// web contents.
|
| -TEST_F(OneClickSigninHelperTest, CleanTransientStateOnNavigate) {
|
| - content::WebContents* contents = web_contents();
|
| -
|
| - OneClickSigninHelper::CreateForWebContents(contents);
|
| - OneClickSigninHelper* helper =
|
| - OneClickSigninHelper::FromWebContents(contents);
|
| - helper->SetDoNotClearPendingEmailForTesting();
|
| - helper->auto_accept_ = OneClickSigninHelper::AUTO_ACCEPT_EXPLICIT;
|
| -
|
| - content::LoadCommittedDetails details;
|
| - content::FrameNavigateParams params;
|
| - params.url = GURL("http://crbug.com");
|
| - params.transition = ui::PAGE_TRANSITION_TYPED;
|
| - helper->DidNavigateMainFrame(details, params);
|
| -
|
| - EXPECT_EQ(OneClickSigninHelper::AUTO_ACCEPT_NONE, helper->auto_accept_);
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperTest, NoRedirectToNTPWithPendingEntry) {
|
| - content::NavigationController& controller = web_contents()->GetController();
|
| - EXPECT_FALSE(controller.GetPendingEntry());
|
| -
|
| - const GURL fooWebUIURL("chrome://foo");
|
| - controller.LoadURL(fooWebUIURL, content::Referrer(),
|
| - ui::PAGE_TRANSITION_TYPED, std::string());
|
| - EXPECT_EQ(fooWebUIURL, controller.GetPendingEntry()->GetURL());
|
| -
|
| - MockWebContentsDelegate delegate;
|
| - EXPECT_CALL(delegate, OpenURLFromTab(_, _)).Times(0);
|
| - web_contents()->SetDelegate(&delegate);
|
| - OneClickSigninHelper::RedirectToNtpOrAppsPage(
|
| - web_contents(), signin_metrics::SOURCE_UNKNOWN);
|
| -
|
| - EXPECT_EQ(fooWebUIURL, controller.GetPendingEntry()->GetURL());
|
| -}
|
| -
|
| -// I/O thread tests
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThread) {
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::CAN_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadIncognito) {
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::INCOGNITO_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadNoIOData) {
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, NULL));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadBadURL) {
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(
|
| - OneClickSigninHelper::IGNORE_REQUEST,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - GURL("https://foo.com/"), &request_, io_data.get()));
|
| - EXPECT_EQ(OneClickSigninHelper::IGNORE_REQUEST,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - GURL("http://accounts.google.com/"),
|
| - &request_,
|
| - io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadDisabled) {
|
| - EnableOneClick(false);
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadSignedIn) {
|
| - PrefService* pref_service = profile()->GetPrefs();
|
| - pref_service->SetString(prefs::kGoogleServicesUsername, "user@gmail.com");
|
| -
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadEmailNotAllowed) {
|
| - SetAllowedUsernamePattern("*@example.com");
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadEmailAlreadyUsed) {
|
| - ProfileInfoCache* cache = testing_profile_manager_.profile_info_cache();
|
| - const base::FilePath& user_data_dir = cache->GetUserDataDir();
|
| - cache->AddProfileToCache(user_data_dir.Append(FILE_PATH_LITERAL("user")),
|
| - base::UTF8ToUTF16("user"),
|
| - base::UTF8ToUTF16("user@gmail.com"), 0,
|
| - std::string());
|
| -
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadWithRejectedEmail) {
|
| - AddEmailToOneClickRejectedList("user@gmail.com");
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadNoSigninCookies) {
|
| - AllowSigninCookies(false);
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -TEST_F(OneClickSigninHelperIOTest, CanOfferOnIOThreadDisabledByPolicy) {
|
| - scoped_ptr<TestProfileIOData> io_data(
|
| - CreateTestProfileIOData(Profile::REGULAR_PROFILE));
|
| - EXPECT_EQ(OneClickSigninHelper::CAN_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -
|
| - // Simulate a policy disabling signin by writing kSigninAllowed directly.
|
| - // We should not offer to sign in the browser.
|
| - profile()->GetTestingPrefService()->SetManagedPref(
|
| - prefs::kSigninAllowed, new base::FundamentalValue(false));
|
| - EXPECT_EQ(OneClickSigninHelper::DONT_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -
|
| - // Reset the preference.
|
| - profile()->GetTestingPrefService()->SetManagedPref(
|
| - prefs::kSigninAllowed, new base::FundamentalValue(true));
|
| -
|
| - // Simulate a policy disabling sync by writing kSyncManaged directly.
|
| - // We should still offer to sign in the browser.
|
| - profile()->GetTestingPrefService()->SetManagedPref(
|
| - sync_driver::prefs::kSyncManaged, new base::FundamentalValue(true));
|
| - EXPECT_EQ(OneClickSigninHelper::CAN_OFFER,
|
| - OneClickSigninHelper::CanOfferOnIOThreadImpl(
|
| - valid_gaia_url_, &request_, io_data.get()));
|
| -}
|
| -
|
| -
|
| -class MockStarterWrapper
|
| - : public testing::StrictMock<OneClickSigninHelper::SyncStarterWrapper> {
|
| - public:
|
| - MockStarterWrapper(
|
| - const OneClickSigninHelper::StartSyncArgs& args,
|
| - OneClickSigninSyncStarter::StartSyncMode start_mode);
|
| -
|
| - MOCK_METHOD1(DisplayErrorBubble, void(const std::string& error_message));
|
| - MOCK_METHOD0(StartSigninOAuthHelper, void());
|
| - MOCK_METHOD2(StartOneClickSigninSyncStarter,
|
| - void(const std::string& email,
|
| - const std::string& refresh_token));
|
| -};
|
| -
|
| -MockStarterWrapper::MockStarterWrapper(
|
| - const OneClickSigninHelper::StartSyncArgs& args,
|
| - OneClickSigninSyncStarter::StartSyncMode start_mode)
|
| - : testing::StrictMock<OneClickSigninHelper::SyncStarterWrapper>(
|
| - args, start_mode) {
|
| -}
|
| -
|
| -class OneClickSyncStarterWrapperTest : public testing::Test {
|
| - public:
|
| - void SetUp() override {
|
| - TestingProfile::Builder builder;
|
| - profile_ = builder.Build();
|
| - }
|
| -
|
| - void TearDown() override {
|
| - // Let the SyncStarterWrapper delete itself.
|
| - base::RunLoop().RunUntilIdle();
|
| - }
|
| -
|
| - void SetCookie(const std::string& value) {
|
| - // Set a valid LSID cookie in the test cookie store.
|
| - scoped_refptr<net::CookieMonster> cookie_monster =
|
| - profile()->GetCookieMonster();
|
| - net::CookieOptions options;
|
| - options.set_include_httponly();
|
| - cookie_monster->SetCookieWithOptionsAsync(
|
| - GURL("https://accounts.google.com"),
|
| - value, options,
|
| - net::CookieMonster::SetCookiesCallback());
|
| - }
|
| -
|
| - void SimulateRefreshTokenFetched(
|
| - SigninOAuthHelper::Consumer* consumer,
|
| - const std::string& email,
|
| - const std::string& display_email,
|
| - const std::string& refresh_token) {
|
| - consumer->OnSigninOAuthInformationAvailable(
|
| - email, display_email, refresh_token);
|
| - }
|
| -
|
| - TestingProfile* profile() { return profile_.get(); }
|
| -
|
| - private:
|
| - content::TestBrowserThreadBundle thread_bundle_;
|
| - scoped_ptr<TestingProfile> profile_;
|
| -};
|
| -
|
| -TEST_F(OneClickSyncStarterWrapperTest, SignInWithRefreshToken) {
|
| - OneClickSigninHelper::StartSyncArgs args;
|
| - args.email = "foo@gmail.com";
|
| - args.password = "password";
|
| - args.refresh_token = "refresh_token";
|
| - MockStarterWrapper* wrapper = new MockStarterWrapper(
|
| - args, OneClickSigninSyncStarter::SYNC_WITH_DEFAULT_SETTINGS);
|
| -
|
| - EXPECT_CALL(*wrapper,
|
| - StartOneClickSigninSyncStarter("foo@gmail.com",
|
| - "refresh_token"));
|
| - wrapper->Start();
|
| -}
|
| -
|
| -TEST_F(OneClickSyncStarterWrapperTest, SignInWithPasswordNoRefreshToken) {
|
| - OneClickSigninHelper::StartSyncArgs args;
|
| - args.email = "foo@gmail.com";
|
| - args.password = "password";
|
| - MockStarterWrapper* wrapper = new MockStarterWrapper(
|
| - args, OneClickSigninSyncStarter::SYNC_WITH_DEFAULT_SETTINGS);
|
| -
|
| - EXPECT_CALL(*wrapper, StartSigninOAuthHelper());
|
| - EXPECT_CALL(*wrapper,
|
| - StartOneClickSigninSyncStarter("foo@gmail.com",
|
| - "refresh_token"));
|
| - wrapper->Start();
|
| - SimulateRefreshTokenFetched(wrapper, "foo@gmail.com", "foo@gmail.com",
|
| - "refresh_token");
|
| -}
|
| -
|
| -TEST_F(OneClickSyncStarterWrapperTest, SignInWithWrongEmail) {
|
| - OneClickSigninHelper::StartSyncArgs args;
|
| - args.email = "foo@gmail.com";
|
| - args.password = "password";
|
| - MockStarterWrapper* wrapper = new MockStarterWrapper(
|
| - args, OneClickSigninSyncStarter::SYNC_WITH_DEFAULT_SETTINGS);
|
| -
|
| - EXPECT_CALL(*wrapper, StartSigninOAuthHelper());
|
| - EXPECT_CALL(*wrapper, DisplayErrorBubble(_));
|
| - wrapper->Start();
|
| - SimulateRefreshTokenFetched(wrapper, "bar@gmail.com", "bar@gmail.com",
|
| - "refresh_token");
|
| -}
|
| -
|
| -TEST_F(OneClickSyncStarterWrapperTest, SignInWithEmptyPasswordValidCookie) {
|
| - OneClickSigninHelper::StartSyncArgs args;
|
| - args.email = "foo@gmail.com";
|
| - args.profile = profile();
|
| - MockStarterWrapper* wrapper = new MockStarterWrapper(
|
| - args, OneClickSigninSyncStarter::SYNC_WITH_DEFAULT_SETTINGS);
|
| - SetCookie("LSID=1234; secure; httponly");
|
| -
|
| - EXPECT_CALL(*wrapper, StartSigninOAuthHelper());
|
| - EXPECT_CALL(*wrapper,
|
| - StartOneClickSigninSyncStarter("foo@gmail.com",
|
| - "refresh_token"));
|
| - wrapper->Start();
|
| - base::RunLoop().RunUntilIdle();
|
| - SimulateRefreshTokenFetched(wrapper, "foo@gmail.com", "foo@gmail.com",
|
| - "refresh_token");
|
| -}
|
| -
|
| -TEST_F(OneClickSyncStarterWrapperTest, SignInWithEmptyPasswordNoCookie) {
|
| - OneClickSigninHelper::StartSyncArgs args;
|
| - args.email = "foo@gmail.com";
|
| - args.profile = profile();
|
| - MockStarterWrapper* wrapper = new MockStarterWrapper(
|
| - args, OneClickSigninSyncStarter::SYNC_WITH_DEFAULT_SETTINGS);
|
| -
|
| - EXPECT_CALL(*wrapper, DisplayErrorBubble(_));
|
| - wrapper->Start();
|
| - base::RunLoop().RunUntilIdle();
|
| -}
|
| -
|
| -TEST_F(OneClickSyncStarterWrapperTest, SignInWithEmptyPasswordInvalidCookie) {
|
| - OneClickSigninHelper::StartSyncArgs args;
|
| - args.email = "foo@gmail.com";
|
| - args.profile = profile();
|
| - MockStarterWrapper* wrapper = new MockStarterWrapper(
|
| - args, OneClickSigninSyncStarter::SYNC_WITH_DEFAULT_SETTINGS);
|
| - SetCookie("LSID=1234; domain=google.com; secure; httponly");
|
| -
|
| - EXPECT_CALL(*wrapper, DisplayErrorBubble(_));
|
| - wrapper->Start();
|
| - base::RunLoop().RunUntilIdle();
|
| -}
|
|
|