Index: chrome/common/net/gaia/oauth2_access_token_fetcher_unittest.cc |
diff --git a/chrome/common/net/gaia/oauth2_access_token_fetcher_unittest.cc b/chrome/common/net/gaia/oauth2_access_token_fetcher_unittest.cc |
deleted file mode 100644 |
index 22b12a40c4d29894645d0cf0d3d434bd12ef88fb..0000000000000000000000000000000000000000 |
--- a/chrome/common/net/gaia/oauth2_access_token_fetcher_unittest.cc |
+++ /dev/null |
@@ -1,235 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
-// |
-// A complete set of unit tests for OAuth2AccessTokenFetcher. |
- |
-#include <string> |
- |
-#include "base/memory/scoped_ptr.h" |
-#include "base/message_loop.h" |
-#include "chrome/common/net/gaia/gaia_urls.h" |
-#include "chrome/common/net/gaia/google_service_auth_error.h" |
-#include "chrome/common/net/gaia/oauth2_access_token_consumer.h" |
-#include "chrome/common/net/gaia/oauth2_access_token_fetcher.h" |
-#include "chrome/test/base/testing_profile.h" |
-#include "content/public/test/test_browser_thread.h" |
-#include "googleurl/src/gurl.h" |
-#include "net/http/http_status_code.h" |
-#include "net/url_request/test_url_fetcher_factory.h" |
-#include "net/url_request/url_fetcher.h" |
-#include "net/url_request/url_fetcher_delegate.h" |
-#include "net/url_request/url_fetcher_factory.h" |
-#include "net/url_request/url_request.h" |
-#include "net/url_request/url_request_status.h" |
-#include "testing/gmock/include/gmock/gmock.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-using content::BrowserThread; |
-using net::ResponseCookies; |
-using net::ScopedURLFetcherFactory; |
-using net::TestURLFetcher; |
-using net::URLFetcher; |
-using net::URLFetcherDelegate; |
-using net::URLFetcherFactory; |
-using net::URLRequestStatus; |
-using testing::_; |
-using testing::Return; |
- |
-namespace { |
- |
-typedef std::vector<std::string> ScopeList; |
- |
-static const char kValidTokenResponse[] = |
- "{" |
- " \"access_token\": \"at1\"," |
- " \"expires_in\": 3600," |
- " \"token_type\": \"Bearer\"" |
- "}"; |
-static const char kTokenResponseNoAccessToken[] = |
- "{" |
- " \"expires_in\": 3600," |
- " \"token_type\": \"Bearer\"" |
- "}"; |
- |
-class MockUrlFetcherFactory : public ScopedURLFetcherFactory, |
- public URLFetcherFactory { |
-public: |
- MockUrlFetcherFactory() |
- : ScopedURLFetcherFactory(ALLOW_THIS_IN_INITIALIZER_LIST(this)) { |
- } |
- virtual ~MockUrlFetcherFactory() {} |
- |
- MOCK_METHOD4( |
- CreateURLFetcher, |
- URLFetcher* (int id, |
- const GURL& url, |
- URLFetcher::RequestType request_type, |
- URLFetcherDelegate* d)); |
-}; |
- |
-class MockOAuth2AccessTokenConsumer : public OAuth2AccessTokenConsumer { |
- public: |
- MockOAuth2AccessTokenConsumer() {} |
- ~MockOAuth2AccessTokenConsumer() {} |
- |
- MOCK_METHOD2(OnGetTokenSuccess, void(const std::string& access_token, |
- const base::Time& expiration_time)); |
- MOCK_METHOD1(OnGetTokenFailure, |
- void(const GoogleServiceAuthError& error)); |
-}; |
- |
-} // namespace |
- |
-class OAuth2AccessTokenFetcherTest : public testing::Test { |
- public: |
- OAuth2AccessTokenFetcherTest() |
- : ui_thread_(BrowserThread::UI, &message_loop_), |
- fetcher_(&consumer_, profile_.GetRequestContext()) { |
- } |
- |
- virtual ~OAuth2AccessTokenFetcherTest() { } |
- |
- virtual TestURLFetcher* SetupGetAccessToken( |
- bool fetch_succeeds, int response_code, const std::string& body) { |
- GURL url(GaiaUrls::GetInstance()->oauth2_token_url()); |
- TestURLFetcher* url_fetcher = new TestURLFetcher(0, url, &fetcher_); |
- URLRequestStatus::Status status = |
- fetch_succeeds ? URLRequestStatus::SUCCESS : URLRequestStatus::FAILED; |
- url_fetcher->set_status(URLRequestStatus(status, 0)); |
- |
- if (response_code != 0) |
- url_fetcher->set_response_code(response_code); |
- |
- if (!body.empty()) |
- url_fetcher->SetResponseString(body); |
- |
- EXPECT_CALL(factory_, CreateURLFetcher(_, url, _, _)) |
- .WillOnce(Return(url_fetcher)); |
- return url_fetcher; |
- } |
- |
- protected: |
- MessageLoop message_loop_; |
- content::TestBrowserThread ui_thread_; |
- MockUrlFetcherFactory factory_; |
- MockOAuth2AccessTokenConsumer consumer_; |
- TestingProfile profile_; |
- OAuth2AccessTokenFetcher fetcher_; |
-}; |
- |
-// These four tests time out, see http://crbug.com/113446. |
-TEST_F(OAuth2AccessTokenFetcherTest, DISABLED_GetAccessTokenRequestFailure) { |
- TestURLFetcher* url_fetcher = SetupGetAccessToken(false, 0, ""); |
- EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1); |
- fetcher_.Start("client_id", "client_secret", "refresh_token", ScopeList()); |
- fetcher_.OnURLFetchComplete(url_fetcher); |
-} |
- |
-TEST_F(OAuth2AccessTokenFetcherTest, |
- DISABLED_GetAccessTokenResponseCodeFailure) { |
- TestURLFetcher* url_fetcher = |
- SetupGetAccessToken(true, net::HTTP_FORBIDDEN, ""); |
- EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1); |
- fetcher_.Start("client_id", "client_secret", "refresh_token", ScopeList()); |
- fetcher_.OnURLFetchComplete(url_fetcher); |
-} |
- |
-TEST_F(OAuth2AccessTokenFetcherTest, DISABLED_Success) { |
- TestURLFetcher* url_fetcher = SetupGetAccessToken( |
- true, net::HTTP_OK, kValidTokenResponse); |
- EXPECT_CALL(consumer_, OnGetTokenSuccess("at1", _)).Times(1); |
- fetcher_.Start("client_id", "client_secret", "refresh_token", ScopeList()); |
- fetcher_.OnURLFetchComplete(url_fetcher); |
-} |
- |
-TEST_F(OAuth2AccessTokenFetcherTest, DISABLED_MakeGetAccessTokenBody) { |
- { // No scope. |
- std::string body = |
- "client_id=cid1&" |
- "client_secret=cs1&" |
- "grant_type=refresh_token&" |
- "refresh_token=rt1"; |
- EXPECT_EQ(body, OAuth2AccessTokenFetcher::MakeGetAccessTokenBody( |
- "cid1", "cs1", "rt1", ScopeList())); |
- } |
- |
- { // One scope. |
- std::string body = |
- "client_id=cid1&" |
- "client_secret=cs1&" |
- "grant_type=refresh_token&" |
- "refresh_token=rt1&" |
- "scope=https://www.googleapis.com/foo"; |
- ScopeList scopes; |
- scopes.push_back("https://www.googleapis.com/foo"); |
- EXPECT_EQ(body, OAuth2AccessTokenFetcher::MakeGetAccessTokenBody( |
- "cid1", "cs1", "rt1", scopes)); |
- } |
- |
- { // Multiple scopes. |
- std::string body = |
- "client_id=cid1&" |
- "client_secret=cs1&" |
- "grant_type=refresh_token&" |
- "refresh_token=rt1&" |
- "scope=https://www.googleapis.com/foo+" |
- "https://www.googleapis.com/bar+" |
- "https://www.googleapis.com/baz"; |
- ScopeList scopes; |
- scopes.push_back("https://www.googleapis.com/foo"); |
- scopes.push_back("https://www.googleapis.com/bar"); |
- scopes.push_back("https://www.googleapis.com/baz"); |
- EXPECT_EQ(body, OAuth2AccessTokenFetcher::MakeGetAccessTokenBody( |
- "cid1", "cs1", "rt1", scopes)); |
- } |
-} |
- |
-// http://crbug.com/114215 |
-#if defined(OS_WIN) |
-#define MAYBE_ParseGetAccessTokenResponse DISABLED_ParseGetAccessTokenResponse |
-#else |
-#define MAYBE_ParseGetAccessTokenResponse ParseGetAccessTokenResponse |
-#endif // defined(OS_WIN) |
-TEST_F(OAuth2AccessTokenFetcherTest, MAYBE_ParseGetAccessTokenResponse) { |
- { // No body. |
- TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL); |
- |
- std::string at; |
- int expires_in; |
- EXPECT_FALSE(OAuth2AccessTokenFetcher::ParseGetAccessTokenResponse( |
- &url_fetcher, &at, &expires_in)); |
- EXPECT_TRUE(at.empty()); |
- } |
- { // Bad json. |
- TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL); |
- url_fetcher.SetResponseString("foo"); |
- |
- std::string at; |
- int expires_in; |
- EXPECT_FALSE(OAuth2AccessTokenFetcher::ParseGetAccessTokenResponse( |
- &url_fetcher, &at, &expires_in)); |
- EXPECT_TRUE(at.empty()); |
- } |
- { // Valid json: access token missing. |
- TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL); |
- url_fetcher.SetResponseString(kTokenResponseNoAccessToken); |
- |
- std::string at; |
- int expires_in; |
- EXPECT_FALSE(OAuth2AccessTokenFetcher::ParseGetAccessTokenResponse( |
- &url_fetcher, &at, &expires_in)); |
- EXPECT_TRUE(at.empty()); |
- } |
- { // Valid json: all good. |
- TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL); |
- url_fetcher.SetResponseString(kValidTokenResponse); |
- |
- std::string at; |
- int expires_in; |
- EXPECT_TRUE(OAuth2AccessTokenFetcher::ParseGetAccessTokenResponse( |
- &url_fetcher, &at, &expires_in)); |
- EXPECT_EQ("at1", at); |
- EXPECT_EQ(3600, expires_in); |
- } |
-} |