Index: chrome/browser/signin/signin_manager_unittest.cc |
diff --git a/chrome/browser/signin/signin_manager_unittest.cc b/chrome/browser/signin/signin_manager_unittest.cc |
index eae9d7ae11a016cb0b9840242cc4467a58ec85f7..df7a166ac8fbf96f0634876df40f3a530cb26b71 100644 |
--- a/chrome/browser/signin/signin_manager_unittest.cc |
+++ b/chrome/browser/signin/signin_manager_unittest.cc |
@@ -211,7 +211,7 @@ class SigninManagerTest : public TokenServiceTestHarness { |
manager_.reset(new SigninManager( |
scoped_ptr<SigninManagerDelegate>( |
new ChromeSigninManagerDelegate(profile_.get())))); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
@@ -257,7 +257,7 @@ class SigninManagerTest : public TokenServiceTestHarness { |
// NOTE: ClientLogin's "StartSignin" is called after collecting credentials |
// from the user. |
TEST_F(SigninManagerTest, SignInClientLogin) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignIn( |
@@ -283,12 +283,12 @@ TEST_F(SigninManagerTest, SignInClientLogin) { |
manager_.reset(new SigninManager( |
scoped_ptr<SigninManagerDelegate>( |
new ChromeSigninManagerDelegate(profile_.get())))); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
TEST_F(SigninManagerTest, SignInWithCredentials) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignInWithCredentials( |
@@ -301,7 +301,7 @@ TEST_F(SigninManagerTest, SignInWithCredentials) { |
} |
TEST_F(SigninManagerTest, SignInWithCredentialsNonCanonicalEmail) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignInWithCredentials( |
@@ -314,7 +314,7 @@ TEST_F(SigninManagerTest, SignInWithCredentialsNonCanonicalEmail) { |
} |
TEST_F(SigninManagerTest, SignInWithCredentialsWrongEmail) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// If the email address used to start the sign in does not match the |
@@ -329,7 +329,7 @@ TEST_F(SigninManagerTest, SignInWithCredentialsWrongEmail) { |
} |
TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordValidCookie) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Set a valid LSID cookie in the test cookie store. |
@@ -356,7 +356,7 @@ TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordValidCookie) { |
} |
TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordNoValidCookie) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Since the password is empty, will verify the gaia cookies first. |
@@ -374,7 +374,7 @@ TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordNoValidCookie) { |
} |
TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordInValidCookie) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Set an invalid LSID cookie in the test cookie store. |
@@ -402,7 +402,7 @@ TEST_F(SigninManagerTest, SignInWithCredentialsEmptyPasswordInValidCookie) { |
} |
TEST_F(SigninManagerTest, SignInWithCredentialsCallbackComplete) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Since the password is empty, must verify the gaia cookies first. |
@@ -421,7 +421,7 @@ TEST_F(SigninManagerTest, SignInWithCredentialsCallbackComplete) { |
} |
TEST_F(SigninManagerTest, SignInWithCredentialsCallbackCancel) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Since the password is empty, must verify the gaia cookies first. |
@@ -441,7 +441,7 @@ TEST_F(SigninManagerTest, SignInWithCredentialsCallbackCancel) { |
} |
TEST_F(SigninManagerTest, SignInClientLoginNoGPlus) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignIn("username", "password", std::string(), std::string()); |
@@ -452,7 +452,7 @@ TEST_F(SigninManagerTest, SignInClientLoginNoGPlus) { |
} |
TEST_F(SigninManagerTest, ClearTransientSigninData) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignIn("username", "password", std::string(), std::string()); |
@@ -480,14 +480,14 @@ TEST_F(SigninManagerTest, ClearTransientSigninData) { |
manager_.reset(new SigninManager( |
scoped_ptr<SigninManagerDelegate>( |
new ChromeSigninManagerDelegate(profile_.get())))); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
// Now make sure we have the right user name. |
EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
TEST_F(SigninManagerTest, SignOutClientLogin) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
manager_->StartSignIn("username", "password", std::string(), std::string()); |
SimulateValidResponseClientLogin(false); |
manager_->OnClientLoginSuccess(credentials_); |
@@ -500,12 +500,12 @@ TEST_F(SigninManagerTest, SignOutClientLogin) { |
manager_.reset(new SigninManager( |
scoped_ptr<SigninManagerDelegate>( |
new ChromeSigninManagerDelegate(profile_.get())))); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
manager_->StartSignIn("username", "password", std::string(), std::string()); |
GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); |
manager_->OnClientLoginFailure(error); |
@@ -520,12 +520,12 @@ TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
manager_.reset(new SigninManager( |
scoped_ptr<SigninManagerDelegate>( |
new ChromeSigninManagerDelegate(profile_.get())))); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
manager_->StartSignIn("username", "password", std::string(), std::string()); |
GoogleServiceAuthError error(GoogleServiceAuthError::TWO_FACTOR); |
manager_->OnClientLoginFailure(error); |
@@ -544,7 +544,7 @@ TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
} |
TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
manager_->StartSignIn("username", "password", std::string(), std::string()); |
GoogleServiceAuthError error1(GoogleServiceAuthError::TWO_FACTOR); |
manager_->OnClientLoginFailure(error1); |
@@ -574,7 +574,7 @@ TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
} |
TEST_F(SigninManagerTest, SignOutMidConnect) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
manager_->StartSignIn("username", "password", std::string(), std::string()); |
EXPECT_EQ("username", manager_->GetUsernameForAuthInProgress()); |
manager_->SignOut(); |
@@ -586,7 +586,7 @@ TEST_F(SigninManagerTest, SignOutMidConnect) { |
} |
TEST_F(SigninManagerTest, SignOutWhileProhibited) { |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), NULL); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->SetAuthenticatedUsername("user@gmail.com"); |
@@ -618,7 +618,7 @@ TEST_F(SigninManagerTest, TestIsWebBasedSigninFlowURL) { |
TEST_F(SigninManagerTest, Prohibited) { |
g_browser_process->local_state()->SetString( |
prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), g_browser_process->local_state()); |
EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); |
EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); |
EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); |
@@ -631,7 +631,7 @@ TEST_F(SigninManagerTest, TestAlternateWildcard) { |
// the admin entered ".*@google.com"). |
g_browser_process->local_state()->SetString( |
prefs::kGoogleServicesUsernamePattern, "*@google.com"); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), g_browser_process->local_state()); |
EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); |
EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); |
EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); |
@@ -644,7 +644,7 @@ TEST_F(SigninManagerTest, ProhibitedAtStartup) { |
"monkey@invalid.com"); |
g_browser_process->local_state()->SetString( |
prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), g_browser_process->local_state()); |
// Currently signed in user is prohibited by policy, so should be signed out. |
EXPECT_EQ("", manager_->GetAuthenticatedUsername()); |
} |
@@ -652,7 +652,7 @@ TEST_F(SigninManagerTest, ProhibitedAtStartup) { |
TEST_F(SigninManagerTest, ProhibitedAfterStartup) { |
std::string user("monkey@invalid.com"); |
profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, user); |
- manager_->Initialize(profile_.get()); |
+ manager_->Initialize(profile_.get(), g_browser_process->local_state()); |
EXPECT_EQ(user, manager_->GetAuthenticatedUsername()); |
// Update the profile - user should be signed out. |
g_browser_process->local_state()->SetString( |