Commit 4ad0209b authored by Ioana Pandele's avatar Ioana Pandele Committed by Commit Bot

[PwdCheckAndroid] Enable password check by default

Bug: 1092444
Change-Id: I6e22b168718cb6271171d4a219301e9fa2f55101
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2516541
Commit-Queue: Ioana Pandele <ioanap@chromium.org>
Reviewed-by: default avatarJan Wilken Dörrie <jdoerrie@chromium.org>
Cr-Commit-Position: refs/heads/master@{#823935}
parent 1a47caa9
...@@ -69,6 +69,8 @@ constexpr char kUsername2[] = "bob"; ...@@ -69,6 +69,8 @@ constexpr char kUsername2[] = "bob";
constexpr char kPassword1[] = "s3cre3t"; constexpr char kPassword1[] = "s3cre3t";
constexpr char kTestEmail[] = "user@gmail.com";
class MockPasswordCheckManagerObserver : public PasswordCheckManager::Observer { class MockPasswordCheckManagerObserver : public PasswordCheckManager::Observer {
public: public:
MOCK_METHOD(void, OnSavedPasswordsFetched, (int), (override)); MOCK_METHOD(void, OnSavedPasswordsFetched, (int), (override));
...@@ -217,6 +219,9 @@ class PasswordCheckManagerTest : public testing::Test { ...@@ -217,6 +219,9 @@ class PasswordCheckManagerTest : public testing::Test {
void RunUntilIdle() { task_env_.RunUntilIdle(); } void RunUntilIdle() { task_env_.RunUntilIdle(); }
signin::IdentityTestEnvironment& identity_test_env() {
return identity_test_env_;
}
BulkLeakCheckService* service() { return service_; } BulkLeakCheckService* service() { return service_; }
TestPasswordStore& store() { return *store_; } TestPasswordStore& store() { return *store_; }
MockPasswordCheckManagerObserver& mock_observer() { return mock_observer_; } MockPasswordCheckManagerObserver& mock_observer() { return mock_observer_; }
...@@ -277,6 +282,7 @@ TEST_F(PasswordCheckManagerTest, OnCompromisedCredentialsChanged) { ...@@ -277,6 +282,7 @@ TEST_F(PasswordCheckManagerTest, OnCompromisedCredentialsChanged) {
} }
TEST_F(PasswordCheckManagerTest, RunCheckAfterLastInitialization) { TEST_F(PasswordCheckManagerTest, RunCheckAfterLastInitialization) {
identity_test_env().MakeAccountAvailable(kTestEmail);
EXPECT_CALL(mock_observer(), OnPasswordCheckStatusChanged(_)) EXPECT_CALL(mock_observer(), OnPasswordCheckStatusChanged(_))
.Times(AtLeast(1)); .Times(AtLeast(1));
EXPECT_CALL(mock_observer(), OnSavedPasswordsFetched(1)); EXPECT_CALL(mock_observer(), OnSavedPasswordsFetched(1));
...@@ -300,6 +306,7 @@ TEST_F(PasswordCheckManagerTest, RunCheckAfterLastInitialization) { ...@@ -300,6 +306,7 @@ TEST_F(PasswordCheckManagerTest, RunCheckAfterLastInitialization) {
TEST_F(PasswordCheckManagerTest, TEST_F(PasswordCheckManagerTest,
RunCheckAfterLastInitializationAutomaticChangeOn) { RunCheckAfterLastInitializationAutomaticChangeOn) {
identity_test_env().MakeAccountAvailable(kTestEmail);
// Enable password sync // Enable password sync
sync_service().SetActiveDataTypes(syncer::ModelTypeSet(syncer::PASSWORDS)); sync_service().SetActiveDataTypes(syncer::ModelTypeSet(syncer::PASSWORDS));
feature_list().InitWithFeatures( feature_list().InitWithFeatures(
...@@ -382,6 +389,7 @@ TEST_F(PasswordCheckManagerTest, CorrectlyCreatesUIStructForAppCredentials) { ...@@ -382,6 +389,7 @@ TEST_F(PasswordCheckManagerTest, CorrectlyCreatesUIStructForAppCredentials) {
} }
TEST_F(PasswordCheckManagerTest, SetsTimestampOnSuccessfulCheck) { TEST_F(PasswordCheckManagerTest, SetsTimestampOnSuccessfulCheck) {
identity_test_env().MakeAccountAvailable(kTestEmail);
InitializeManager(); InitializeManager();
store().AddLogin(MakeSavedPassword(kExampleCom, kUsername1)); store().AddLogin(MakeSavedPassword(kExampleCom, kUsername1));
RunUntilIdle(); RunUntilIdle();
...@@ -395,6 +403,7 @@ TEST_F(PasswordCheckManagerTest, SetsTimestampOnSuccessfulCheck) { ...@@ -395,6 +403,7 @@ TEST_F(PasswordCheckManagerTest, SetsTimestampOnSuccessfulCheck) {
} }
TEST_F(PasswordCheckManagerTest, DoesntRecordTimestampOfUnsuccessfulCheck) { TEST_F(PasswordCheckManagerTest, DoesntRecordTimestampOfUnsuccessfulCheck) {
identity_test_env().MakeAccountAvailable(kTestEmail);
InitializeManager(); InitializeManager();
store().AddLogin(MakeSavedPassword(kExampleCom, kUsername1)); store().AddLogin(MakeSavedPassword(kExampleCom, kUsername1));
RunUntilIdle(); RunUntilIdle();
...@@ -569,6 +578,7 @@ TEST_F(PasswordCheckManagerTest, ...@@ -569,6 +578,7 @@ TEST_F(PasswordCheckManagerTest,
} }
TEST_F(PasswordCheckManagerTest, UpdatesProgressCorrectly) { TEST_F(PasswordCheckManagerTest, UpdatesProgressCorrectly) {
identity_test_env().MakeAccountAvailable(kTestEmail);
InitializeManager(); InitializeManager();
store().AddLogin(MakeSavedPassword(kExampleCom, kUsername1, kPassword1)); store().AddLogin(MakeSavedPassword(kExampleCom, kUsername1, kPassword1));
store().AddLogin(MakeSavedPassword(kExampleOrg, kUsername1, kPassword1)); store().AddLogin(MakeSavedPassword(kExampleOrg, kUsername1, kPassword1));
......
...@@ -284,16 +284,16 @@ struct PasswordChangeParams { ...@@ -284,16 +284,16 @@ struct PasswordChangeParams {
false, false}, false, false},
{CreateLeakType(IsSaved(false), IsReused(false), IsSyncing(true)), IDS_OK, {CreateLeakType(IsSaved(false), IsReused(false), IsSyncing(true)), IDS_OK,
false, false}, false, false},
{CreateLeakType(IsSaved(false), IsReused(true), IsSyncing(false)), IDS_OK, {CreateLeakType(IsSaved(false), IsReused(true), IsSyncing(false)),
false, false}, IDS_LEAK_CHECK_CREDENTIALS, true, false},
{CreateLeakType(IsSaved(false), IsReused(true), IsSyncing(true)), {CreateLeakType(IsSaved(false), IsReused(true), IsSyncing(true)),
IDS_LEAK_CHECK_CREDENTIALS, true, false}, IDS_LEAK_CHECK_CREDENTIALS, true, false},
{CreateLeakType(IsSaved(true), IsReused(false), IsSyncing(false)), IDS_OK, {CreateLeakType(IsSaved(true), IsReused(false), IsSyncing(false)), IDS_OK,
false, false}, false, false},
{CreateLeakType(IsSaved(true), IsReused(false), IsSyncing(true)), {CreateLeakType(IsSaved(true), IsReused(false), IsSyncing(true)),
IDS_PASSWORD_CHANGE, true, true}, IDS_PASSWORD_CHANGE, true, true},
{CreateLeakType(IsSaved(true), IsReused(true), IsSyncing(false)), IDS_OK, {CreateLeakType(IsSaved(true), IsReused(true), IsSyncing(false)),
false, false}, IDS_LEAK_CHECK_CREDENTIALS, true, false},
{CreateLeakType(IsSaved(true), IsReused(true), IsSyncing(true)), {CreateLeakType(IsSaved(true), IsReused(true), IsSyncing(true)),
IDS_LEAK_CHECK_CREDENTIALS, true, false}}; IDS_LEAK_CHECK_CREDENTIALS, true, false}};
......
...@@ -65,12 +65,7 @@ const base::Feature kPasswordChangeInSettings = { ...@@ -65,12 +65,7 @@ const base::Feature kPasswordChangeInSettings = {
// Enables the bulk Password Check feature for signed in users. // Enables the bulk Password Check feature for signed in users.
const base::Feature kPasswordCheck = {"PasswordCheck", const base::Feature kPasswordCheck = {"PasswordCheck",
#if defined(OS_ANDROID) base::FEATURE_ENABLED_BY_DEFAULT};
base::FEATURE_DISABLED_BY_DEFAULT
#else
base::FEATURE_ENABLED_BY_DEFAULT
#endif
};
// Controls the ability to import passwords from Chrome's settings page. // Controls the ability to import passwords from Chrome's settings page.
const base::Feature kPasswordImport = {"PasswordImport", const base::Feature kPasswordImport = {"PasswordImport",
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment