diff options
author | mnissler@chromium.org <mnissler@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-08-31 16:59:57 +0000 |
---|---|---|
committer | mnissler@chromium.org <mnissler@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-08-31 16:59:57 +0000 |
commit | cea9e0d58c245f1c13836fe24a3ea11c508ca37f (patch) | |
tree | 45039fcbf8ba5a0e94afc2fc6d4e1780927fc3b8 /chrome/browser/policy/cloud_policy_controller_unittest.cc | |
parent | bd1a1a4bf5f4ef96fcf58504c931ad783ad73712 (diff) | |
download | chromium_src-cea9e0d58c245f1c13836fe24a3ea11c508ca37f.zip chromium_src-cea9e0d58c245f1c13836fe24a3ea11c508ca37f.tar.gz chromium_src-cea9e0d58c245f1c13836fe24a3ea11c508ca37f.tar.bz2 |
Revert 98987 - Pass user_affiliation request parameter on user cloud policy requests.
BUG=chromium-os:17809
TEST=Enroll device, login as an enterprise user, check user_affiliation parameter in policy requests.
Review URL: http://codereview.chromium.org/7810025
TBR=mnissler@chromium.org
Review URL: http://codereview.chromium.org/7785032
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@98989 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/policy/cloud_policy_controller_unittest.cc')
-rw-r--r-- | chrome/browser/policy/cloud_policy_controller_unittest.cc | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/chrome/browser/policy/cloud_policy_controller_unittest.cc b/chrome/browser/policy/cloud_policy_controller_unittest.cc index 9e9af55..f1be2a9 100644 --- a/chrome/browser/policy/cloud_policy_controller_unittest.cc +++ b/chrome/browser/policy/cloud_policy_controller_unittest.cc @@ -20,12 +20,12 @@ namespace policy { +using ::testing::_; using ::testing::AnyNumber; using ::testing::AtLeast; using ::testing::InSequence; using ::testing::Mock; using ::testing::Return; -using ::testing::_; class MockDeviceTokenFetcher : public DeviceTokenFetcher { public: @@ -104,7 +104,7 @@ class CloudPolicyControllerTest : public testing::Test { TEST_F(CloudPolicyControllerTest, StartupWithDeviceToken) { data_store_->SetupForTesting("fake_device_token", "device_id", "", "", true); - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll( InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), MockDeviceManagementBackendSucceedSpdyCloudPolicy())); CreateNewController(); @@ -140,9 +140,9 @@ TEST_F(CloudPolicyControllerTest, RefreshAfterSuccessfulPolicy) { "auth_token", true); { InSequence s; - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( MockDeviceManagementBackendSucceedSpdyCloudPolicy()); - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll( InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), MockDeviceManagementBackendFailPolicy( DeviceManagementBackend::kErrorRequestFailed))); @@ -159,10 +159,10 @@ TEST_F(CloudPolicyControllerTest, RefreshAfterError) { "auth_token", true); { InSequence s; - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( MockDeviceManagementBackendFailPolicy( DeviceManagementBackend::kErrorRequestFailed)); - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll( InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), MockDeviceManagementBackendSucceedSpdyCloudPolicy())); @@ -177,7 +177,7 @@ TEST_F(CloudPolicyControllerTest, RefreshAfterError) { TEST_F(CloudPolicyControllerTest, InvalidToken) { data_store_->SetupForTesting("device_token", "device_id", "standup@ten.am", "auth", true); - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( MockDeviceManagementBackendFailPolicy( DeviceManagementBackend::kErrorServiceManagementTokenInvalid)); EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1); @@ -190,7 +190,7 @@ TEST_F(CloudPolicyControllerTest, InvalidToken) { TEST_F(CloudPolicyControllerTest, DeviceNotFound) { data_store_->SetupForTesting("device_token", "device_id", "me@you.com", "auth", true); - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( MockDeviceManagementBackendFailPolicy( DeviceManagementBackend::kErrorServiceDeviceNotFound)); EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1); @@ -204,7 +204,7 @@ TEST_F(CloudPolicyControllerTest, DeviceNotFound) { TEST_F(CloudPolicyControllerTest, NoLongerManaged) { data_store_->SetupForTesting("device_token", "device_id", "who@what.com", "auth", true); - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( MockDeviceManagementBackendFailPolicy( DeviceManagementBackend::kErrorServiceManagementNotSupported)); EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1); |