OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <string> | 5 #include <string> |
6 | 6 |
7 #include "base/file_util.h" | 7 #include "base/file_util.h" |
8 #include "base/message_loop.h" | 8 #include "base/message_loop.h" |
9 #include "base/scoped_temp_dir.h" | 9 #include "base/scoped_temp_dir.h" |
10 #include "chrome/browser/browser_thread.h" | 10 #include "chrome/browser/browser_thread.h" |
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
78 }; | 78 }; |
79 | 79 |
80 TEST_F(DeviceTokenFetcherTest, IsPending) { | 80 TEST_F(DeviceTokenFetcherTest, IsPending) { |
81 ASSERT_TRUE(fetcher_->IsTokenPending()); | 81 ASSERT_TRUE(fetcher_->IsTokenPending()); |
82 backend_->AllShouldSucceed(); | 82 backend_->AllShouldSucceed(); |
83 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); | 83 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); |
84 SimulateSuccessfulLoginAndRunPending(); | 84 SimulateSuccessfulLoginAndRunPending(); |
85 ASSERT_FALSE(fetcher_->IsTokenPending()); | 85 ASSERT_FALSE(fetcher_->IsTokenPending()); |
86 } | 86 } |
87 | 87 |
| 88 TEST_F(DeviceTokenFetcherTest, StoreAndLoad) { |
| 89 backend_->AllShouldSucceed(); |
| 90 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); |
| 91 SimulateSuccessfulLoginAndRunPending(); |
| 92 ASSERT_FALSE(fetcher_->IsTokenPending()); |
| 93 std::string device_token = fetcher_->GetDeviceToken(); |
| 94 std::string device_id = fetcher_->GetDeviceID(); |
| 95 ASSERT_NE("", device_id); |
| 96 |
| 97 FilePath token_path; |
| 98 GetDeviceTokenPath(fetcher_, &token_path); |
| 99 scoped_refptr<DeviceTokenFetcher> fetcher2( |
| 100 new DeviceTokenFetcher(backend_.get(), token_path)); |
| 101 fetcher2->StartFetching(); |
| 102 loop_.RunAllPending(); |
| 103 ASSERT_EQ(device_id, fetcher2->GetDeviceID()); |
| 104 ASSERT_EQ(device_token, fetcher2->GetDeviceToken()); |
| 105 } |
| 106 |
88 TEST_F(DeviceTokenFetcherTest, SimpleFetchSingleLogin) { | 107 TEST_F(DeviceTokenFetcherTest, SimpleFetchSingleLogin) { |
89 backend_->AllShouldSucceed(); | 108 backend_->AllShouldSucceed(); |
90 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); | 109 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); |
91 SimulateSuccessfulLoginAndRunPending(); | 110 SimulateSuccessfulLoginAndRunPending(); |
92 ASSERT_FALSE(fetcher_->IsTokenPending()); | 111 ASSERT_FALSE(fetcher_->IsTokenPending()); |
93 ASSERT_TRUE(fetcher_->IsTokenValid()); | 112 ASSERT_TRUE(fetcher_->IsTokenValid()); |
94 const std::string token(fetcher_->GetDeviceToken()); | 113 const std::string token(fetcher_->GetDeviceToken()); |
95 EXPECT_NE("", token); | 114 EXPECT_NE("", token); |
96 } | 115 } |
97 | 116 |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
141 TEST_F(DeviceTokenFetcherTest, FailedServerRequest) { | 160 TEST_F(DeviceTokenFetcherTest, FailedServerRequest) { |
142 backend_->AllShouldFail(); | 161 backend_->AllShouldFail(); |
143 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); | 162 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); |
144 SimulateSuccessfulLoginAndRunPending(); | 163 SimulateSuccessfulLoginAndRunPending(); |
145 ASSERT_FALSE(fetcher_->IsTokenPending()); | 164 ASSERT_FALSE(fetcher_->IsTokenPending()); |
146 const std::string token(fetcher_->GetDeviceToken()); | 165 const std::string token(fetcher_->GetDeviceToken()); |
147 EXPECT_EQ("", token); | 166 EXPECT_EQ("", token); |
148 } | 167 } |
149 | 168 |
150 } // namespace policy | 169 } // namespace policy |
OLD | NEW |