| OLD | NEW |
| 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE entry. | 3 // found in the LICENSE entry. |
| 4 | 4 |
| 5 #include "base/scoped_ptr.h" | 5 #include "base/scoped_ptr.h" |
| 6 #include "base/scoped_temp_dir.h" | 6 #include "base/scoped_temp_dir.h" |
| 7 #include "base/test/test_file_util.h" | 7 #include "base/test/test_file_util.h" |
| 8 #include "base/waitable_event.h" | 8 #include "base/waitable_event.h" |
| 9 #include "chrome/browser/sync/engine/all_status.h" | 9 #include "chrome/browser/sync/engine/all_status.h" |
| 10 #include "chrome/browser/sync/engine/auth_watcher.h" | 10 #include "chrome/browser/sync/engine/auth_watcher.h" |
| (...skipping 68 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 79 virtual void SetUp() { | 79 virtual void SetUp() { |
| 80 metadb_.SetUp(); | 80 metadb_.SetUp(); |
| 81 connection_.reset(new MockConnectionManager(metadb_.manager(), | 81 connection_.reset(new MockConnectionManager(metadb_.manager(), |
| 82 metadb_.name())); | 82 metadb_.name())); |
| 83 // Mock out data that would normally be sent back from a server. | 83 // Mock out data that would normally be sent back from a server. |
| 84 connection()->SetAuthenticationResponseInfo(kValidAuthToken, | 84 connection()->SetAuthenticationResponseInfo(kValidAuthToken, |
| 85 kUserDisplayName, kUserDisplayEmail, "ID"); | 85 kUserDisplayName, kUserDisplayEmail, "ID"); |
| 86 allstatus_.reset(new AllStatus()); | 86 allstatus_.reset(new AllStatus()); |
| 87 user_settings_.reset(new UserSettings()); | 87 user_settings_.reset(new UserSettings()); |
| 88 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); | 88 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); |
| 89 PathString user_settings_path = temp_dir_.path().value() + kUserSettingsDB; | 89 FilePath user_settings_path = temp_dir_.path().Append(kUserSettingsDB); |
| 90 user_settings_->Init(user_settings_path); | 90 user_settings_->Init(user_settings_path); |
| 91 gaia_auth_ = new GaiaAuthMockForAuthWatcher(); | 91 gaia_auth_ = new GaiaAuthMockForAuthWatcher(); |
| 92 talk_mediator_.reset(new TalkMediatorImpl()); | 92 talk_mediator_.reset(new TalkMediatorImpl()); |
| 93 auth_watcher_ = new AuthWatcher(metadb_.manager(), connection_.get(), | 93 auth_watcher_ = new AuthWatcher(metadb_.manager(), connection_.get(), |
| 94 allstatus_.get(), kTestUserAgent, kTestServiceId, kTestGaiaURL, | 94 allstatus_.get(), kTestUserAgent, kTestServiceId, kTestGaiaURL, |
| 95 user_settings_.get(), gaia_auth_, talk_mediator_.get()); | 95 user_settings_.get(), gaia_auth_, talk_mediator_.get()); |
| 96 authwatcher_hookup_.reset(NewEventListenerHookup(auth_watcher_->channel(), | 96 authwatcher_hookup_.reset(NewEventListenerHookup(auth_watcher_->channel(), |
| 97 this, &AuthWatcherTest::HandleAuthWatcherEvent)); | 97 this, &AuthWatcherTest::HandleAuthWatcherEvent)); |
| 98 } | 98 } |
| 99 | 99 |
| (...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 202 EXPECT_EQ(AuthWatcherEvent::SERVICE_AUTH_FAILED, ConsumeNextEvent()); | 202 EXPECT_EQ(AuthWatcherEvent::SERVICE_AUTH_FAILED, ConsumeNextEvent()); |
| 203 } | 203 } |
| 204 | 204 |
| 205 TEST_F(AuthWatcherTest, AuthenticateWithTokenSuccess) { | 205 TEST_F(AuthWatcherTest, AuthenticateWithTokenSuccess) { |
| 206 auth_watcher()->AuthenticateWithToken(kTestEmail, kValidAuthToken); | 206 auth_watcher()->AuthenticateWithToken(kTestEmail, kValidAuthToken); |
| 207 EXPECT_EQ(AuthWatcherEvent::AUTH_SUCCEEDED, ConsumeNextEvent()); | 207 EXPECT_EQ(AuthWatcherEvent::AUTH_SUCCEEDED, ConsumeNextEvent()); |
| 208 EXPECT_EQ(kUserDisplayEmail, user_email()); | 208 EXPECT_EQ(kUserDisplayEmail, user_email()); |
| 209 } | 209 } |
| 210 | 210 |
| 211 } // namespace browser_sync | 211 } // namespace browser_sync |
| OLD | NEW |