Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(315)

Side by Side Diff: chrome/browser/policy/device_token_fetcher_unittest.cc

Issue 5174006: Move DeviceManagementPolicyProvider into the profile. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 10 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <string> 5 #include <string>
6 6
7 #include "base/file_util.h" 7 #include "base/file_util.h"
8 #include "base/message_loop.h" 8 #include "base/message_loop.h"
9 #include "base/scoped_temp_dir.h" 9 #include "base/scoped_temp_dir.h"
10 #include "chrome/browser/browser_thread.h" 10 #include "chrome/browser/browser_thread.h"
11 #include "chrome/browser/net/gaia/token_service.h" 11 #include "chrome/browser/net/gaia/token_service.h"
12 #include "chrome/browser/policy/device_token_fetcher.h" 12 #include "chrome/browser/policy/device_token_fetcher.h"
13 #include "chrome/browser/policy/mock_device_management_backend.h" 13 #include "chrome/browser/policy/mock_device_management_backend.h"
14 #include "chrome/common/net/gaia/gaia_constants.h"
14 #include "chrome/common/notification_service.h" 15 #include "chrome/common/notification_service.h"
15 #include "chrome/test/device_management_test_util.h"
16 #include "testing/gmock/include/gmock/gmock.h" 16 #include "testing/gmock/include/gmock/gmock.h"
17 #include "testing/gtest/include/gtest/gtest.h" 17 #include "testing/gtest/include/gtest/gtest.h"
18 18
19 namespace policy { 19 namespace policy {
20 20
21 namespace {
22 const char kTestToken[] = "device_token_fetcher_test_auth_token";
23 }
24
21 using testing::_; 25 using testing::_;
22 using testing::Mock; 26 using testing::Mock;
23 27
24 class MockTokenAvailableObserver : public NotificationObserver { 28 class MockTokenAvailableObserver : public NotificationObserver {
25 public: 29 public:
26 MockTokenAvailableObserver() {} 30 MockTokenAvailableObserver() {}
27 virtual ~MockTokenAvailableObserver() {} 31 virtual ~MockTokenAvailableObserver() {}
28 32
29 MOCK_METHOD3(Observe, void( 33 MOCK_METHOD3(Observe, void(
30 NotificationType type, 34 NotificationType type,
31 const NotificationSource& source, 35 const NotificationSource& source,
32 const NotificationDetails& details)); 36 const NotificationDetails& details));
33 37
34 private: 38 private:
35 DISALLOW_COPY_AND_ASSIGN(MockTokenAvailableObserver); 39 DISALLOW_COPY_AND_ASSIGN(MockTokenAvailableObserver);
36 }; 40 };
37 41
38 class DeviceTokenFetcherTest : public testing::Test { 42 class DeviceTokenFetcherTest : public testing::Test {
39 protected: 43 protected:
40 DeviceTokenFetcherTest() 44 DeviceTokenFetcherTest()
41 : ui_thread_(BrowserThread::UI, &loop_), 45 : ui_thread_(BrowserThread::UI, &loop_),
42 file_thread_(BrowserThread::FILE, &loop_) { 46 file_thread_(BrowserThread::FILE, &loop_) {
43 EXPECT_TRUE(temp_user_data_dir_.CreateUniqueTempDir()); 47 EXPECT_TRUE(temp_user_data_dir_.CreateUniqueTempDir());
44 fetcher_ = NewTestFetcher(temp_user_data_dir_.path()); 48 fetcher_ = NewTestFetcher(temp_user_data_dir_.path());
45 fetcher_->StartFetching(); 49 fetcher_->StartFetching();
46 } 50 }
47 51
48 virtual void TearDown() { 52 virtual void TearDown() {
53 backend_.reset();
54 token_service_.reset();
49 loop_.RunAllPending(); 55 loop_.RunAllPending();
50 } 56 }
51 57
52 void SimulateSuccessfulLoginAndRunPending() { 58 void SimulateSuccessfulLoginAndRunPending() {
53 loop_.RunAllPending(); 59 loop_.RunAllPending();
54 SimulateSuccessfulLogin(); 60 token_service_->IssueAuthTokenForTest(
61 GaiaConstants::kDeviceManagementService, kTestToken);
55 loop_.RunAllPending(); 62 loop_.RunAllPending();
56 } 63 }
57 64
58 DeviceTokenFetcher* NewTestFetcher(const FilePath& token_dir) { 65 DeviceTokenFetcher* NewTestFetcher(const FilePath& token_dir) {
66 token_service_.reset(new TokenService);
59 backend_.reset(new MockDeviceManagementBackend()); 67 backend_.reset(new MockDeviceManagementBackend());
60 return new DeviceTokenFetcher( 68 return new DeviceTokenFetcher(
61 backend_.get(), 69 backend_.get(),
70 token_service_.get(),
62 token_dir.Append(FILE_PATH_LITERAL("test-token-file.txt"))); 71 token_dir.Append(FILE_PATH_LITERAL("test-token-file.txt")));
63 } 72 }
64 73
65 static void GetDeviceTokenPath(const DeviceTokenFetcher* fetcher, 74 static void GetDeviceTokenPath(const DeviceTokenFetcher* fetcher,
66 FilePath* path) { 75 FilePath* path) {
67 fetcher->GetDeviceTokenPath(path); 76 fetcher->GetDeviceTokenPath(path);
68 } 77 }
69 78
70 const std::string& device_id(const DeviceTokenFetcher* fetcher) { 79 const std::string& device_id(const DeviceTokenFetcher* fetcher) {
71 return fetcher->device_id_; 80 return fetcher->device_id_;
72 } 81 }
73 82
74 MessageLoop loop_; 83 MessageLoop loop_;
84 scoped_ptr<TokenService> token_service_;
75 scoped_ptr<MockDeviceManagementBackend> backend_; 85 scoped_ptr<MockDeviceManagementBackend> backend_;
76 ScopedTempDir temp_user_data_dir_; 86 ScopedTempDir temp_user_data_dir_;
77 scoped_refptr<DeviceTokenFetcher> fetcher_; 87 scoped_refptr<DeviceTokenFetcher> fetcher_;
78 88
79 private: 89 private:
80 BrowserThread ui_thread_; 90 BrowserThread ui_thread_;
81 BrowserThread file_thread_; 91 BrowserThread file_thread_;
82 }; 92 };
83 93
84 TEST_F(DeviceTokenFetcherTest, IsPending) { 94 TEST_F(DeviceTokenFetcherTest, IsPending) {
85 ASSERT_TRUE(fetcher_->IsTokenPending()); 95 ASSERT_TRUE(fetcher_->IsTokenPending());
86 backend_->AllShouldSucceed(); 96 backend_->AllShouldSucceed();
87 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); 97 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1);
88 SimulateSuccessfulLoginAndRunPending(); 98 SimulateSuccessfulLoginAndRunPending();
89 ASSERT_FALSE(fetcher_->IsTokenPending()); 99 ASSERT_FALSE(fetcher_->IsTokenPending());
90 } 100 }
91 101
92 TEST_F(DeviceTokenFetcherTest, StoreAndLoad) { 102 TEST_F(DeviceTokenFetcherTest, StoreAndLoad) {
93 backend_->AllShouldSucceed(); 103 backend_->AllShouldSucceed();
94 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); 104 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1);
95 SimulateSuccessfulLoginAndRunPending(); 105 SimulateSuccessfulLoginAndRunPending();
96 ASSERT_FALSE(fetcher_->IsTokenPending()); 106 ASSERT_FALSE(fetcher_->IsTokenPending());
97 std::string device_token = fetcher_->GetDeviceToken(); 107 std::string device_token = fetcher_->GetDeviceToken();
98 std::string device_id = fetcher_->GetDeviceID(); 108 std::string device_id = fetcher_->GetDeviceID();
99 ASSERT_NE("", device_id); 109 ASSERT_NE("", device_id);
100 110
101 FilePath token_path; 111 FilePath token_path;
102 GetDeviceTokenPath(fetcher_, &token_path); 112 GetDeviceTokenPath(fetcher_, &token_path);
103 scoped_refptr<DeviceTokenFetcher> fetcher2( 113 scoped_refptr<DeviceTokenFetcher> fetcher2(
104 new DeviceTokenFetcher(backend_.get(), token_path)); 114 new DeviceTokenFetcher(backend_.get(), token_service_.get(), token_path));
105 fetcher2->StartFetching(); 115 fetcher2->StartFetching();
106 loop_.RunAllPending(); 116 loop_.RunAllPending();
107 ASSERT_EQ(device_id, fetcher2->GetDeviceID()); 117 ASSERT_EQ(device_id, fetcher2->GetDeviceID());
108 ASSERT_EQ(device_token, fetcher2->GetDeviceToken()); 118 ASSERT_EQ(device_token, fetcher2->GetDeviceToken());
109 } 119 }
110 120
111 TEST_F(DeviceTokenFetcherTest, SimpleFetchSingleLogin) { 121 TEST_F(DeviceTokenFetcherTest, SimpleFetchSingleLogin) {
112 backend_->AllShouldSucceed(); 122 backend_->AllShouldSucceed();
113 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); 123 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1);
114 SimulateSuccessfulLoginAndRunPending(); 124 SimulateSuccessfulLoginAndRunPending();
(...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after
176 SimulateSuccessfulLoginAndRunPending(); 186 SimulateSuccessfulLoginAndRunPending();
177 ASSERT_FALSE(fetcher_->IsTokenPending()); 187 ASSERT_FALSE(fetcher_->IsTokenPending());
178 ASSERT_EQ("", fetcher_->GetDeviceToken()); 188 ASSERT_EQ("", fetcher_->GetDeviceToken());
179 ASSERT_EQ("", device_id(fetcher_)); 189 ASSERT_EQ("", device_id(fetcher_));
180 FilePath token_path; 190 FilePath token_path;
181 GetDeviceTokenPath(fetcher_, &token_path); 191 GetDeviceTokenPath(fetcher_, &token_path);
182 ASSERT_FALSE(file_util::PathExists(token_path)); 192 ASSERT_FALSE(file_util::PathExists(token_path));
183 } 193 }
184 194
185 } // namespace policy 195 } // namespace policy
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698