Index: chrome/common/net/gaia/gaia_auth_fetcher_unittest.cc |
=================================================================== |
--- chrome/common/net/gaia/gaia_auth_fetcher_unittest.cc (revision 111276) |
+++ chrome/common/net/gaia/gaia_auth_fetcher_unittest.cc (working copy) |
@@ -28,42 +28,6 @@ |
using ::testing::_; |
-namespace { |
-static const char kGetAuthCodeValidCookie[] = |
- "oauth_code=test-code; Path=/test; Secure; HttpOnly"; |
-static const char kGetAuthCodeCookieNoSecure[] = |
- "oauth_code=test-code; Path=/test; HttpOnly"; |
-static const char kGetAuthCodeCookieNoHttpOnly[] = |
- "oauth_code=test-code; Path=/test; Secure"; |
-static const char kGetAuthCodeCookieNoOAuthCode[] = |
- "Path=/test; Secure; HttpOnly"; |
-static const char kGetTokenPairValidResponse[] = |
- "{" |
- " \"refresh_token\": \"rt1\"," |
- " \"access_token\": \"at1\"," |
- " \"expires_in\": 3600," |
- " \"token_type\": \"Bearer\"" |
- "}"; |
-static const char kGetTokenPairResponseNoRefreshToken[] = |
- "{" |
- " \"access_token\": \"at1\"," |
- " \"expires_in\": 3600," |
- " \"token_type\": \"Bearer\"" |
- "}"; |
-static const char kGetTokenPairResponseNoAccessToken[] = |
- "{" |
- " \"refresh_token\": \"rt1\"," |
- " \"expires_in\": 3600," |
- " \"token_type\": \"Bearer\"" |
- "}"; |
-static const char kGetTokenPairResponseNoExpiresIn[] = |
- "{" |
- " \"refresh_token\": \"rt1\"," |
- " \"access_token\": \"at1\"," |
- " \"token_type\": \"Bearer\"" |
- "}"; |
-} // namespace |
- |
MockFetcher::MockFetcher(bool success, |
const GURL& url, |
const std::string& results, |
@@ -112,9 +76,6 @@ |
: client_login_source_(GaiaUrls::GetInstance()->client_login_url()), |
issue_auth_token_source_( |
GaiaUrls::GetInstance()->issue_auth_token_url()), |
- client_login_to_oauth2_source_( |
- GaiaUrls::GetInstance()->client_login_to_oauth2_url()), |
- oauth2_token_source_(GaiaUrls::GetInstance()->oauth2_token_url()), |
token_auth_source_(GaiaUrls::GetInstance()->token_auth_url()), |
merge_session_source_(GaiaUrls::GetInstance()->merge_session_url()) {} |
@@ -159,8 +120,6 @@ |
net::ResponseCookies cookies_; |
GURL client_login_source_; |
GURL issue_auth_token_source_; |
- GURL client_login_to_oauth2_source_; |
- GURL oauth2_token_source_; |
GURL token_auth_source_; |
GURL merge_session_source_; |
TestingProfile profile_; |
@@ -176,18 +135,12 @@ |
MOCK_METHOD1(OnClientLoginSuccess, void(const ClientLoginResult& result)); |
MOCK_METHOD2(OnIssueAuthTokenSuccess, void(const std::string& service, |
const std::string& token)); |
- MOCK_METHOD3(OnOAuthLoginTokenSuccess, |
- void(const std::string& refresh_token, |
- const std::string& access_token, |
- int expires_in_secs)); |
MOCK_METHOD1(OnTokenAuthSuccess, void(const std::string& data)); |
MOCK_METHOD1(OnMergeSessionSuccess, void(const std::string& data)); |
MOCK_METHOD1(OnClientLoginFailure, |
void(const GoogleServiceAuthError& error)); |
MOCK_METHOD2(OnIssueAuthTokenFailure, void(const std::string& service, |
const GoogleServiceAuthError& error)); |
- MOCK_METHOD1(OnOAuthLoginTokenFailure, |
- void(const GoogleServiceAuthError& error)); |
MOCK_METHOD1(OnTokenAuthFailure, void(const GoogleServiceAuthError& error)); |
MOCK_METHOD1(OnMergeSessionFailure, void( |
const GoogleServiceAuthError& error)); |
@@ -570,92 +523,6 @@ |
EXPECT_FALSE(auth.HasPendingFetch()); |
} |
-TEST_F(GaiaAuthFetcherTest, OAuthLoginTokenSuccess) { |
- MockGaiaConsumer consumer; |
- EXPECT_CALL(consumer, OnOAuthLoginTokenSuccess("rt1", "at1", 3600)) |
- .Times(1); |
- |
- TestingProfile profile; |
- |
- TestURLFetcherFactory factory; |
- GaiaAuthFetcher auth(&consumer, std::string(), |
- profile_.GetRequestContext()); |
- auth.StartOAuthLoginTokenFetch("lso_token"); |
- |
- net::ResponseCookies cookies; |
- cookies.push_back(kGetAuthCodeValidCookie); |
- EXPECT_TRUE(auth.HasPendingFetch()); |
- MockFetcher mock_fetcher1( |
- client_login_to_oauth2_source_, |
- net::URLRequestStatus(net::URLRequestStatus::SUCCESS, 0), |
- RC_REQUEST_OK, cookies, "", |
- content::URLFetcher::POST, &auth); |
- auth.OnURLFetchComplete(&mock_fetcher1); |
- EXPECT_TRUE(auth.HasPendingFetch()); |
- MockFetcher mock_fetcher2( |
- oauth2_token_source_, |
- net::URLRequestStatus(net::URLRequestStatus::SUCCESS, 0), |
- RC_REQUEST_OK, cookies_, kGetTokenPairValidResponse, |
- content::URLFetcher::POST, &auth); |
- auth.OnURLFetchComplete(&mock_fetcher2); |
- EXPECT_FALSE(auth.HasPendingFetch()); |
-} |
- |
-TEST_F(GaiaAuthFetcherTest, OAuthLoginTokenClientLoginToOAuth2Failure) { |
- MockGaiaConsumer consumer; |
- EXPECT_CALL(consumer, OnOAuthLoginTokenFailure(_)) |
- .Times(1); |
- |
- TestingProfile profile; |
- |
- TestURLFetcherFactory factory; |
- GaiaAuthFetcher auth(&consumer, std::string(), |
- profile_.GetRequestContext()); |
- auth.StartOAuthLoginTokenFetch("lso_token"); |
- |
- net::ResponseCookies cookies; |
- cookies.push_back(kGetAuthCodeCookieNoSecure); |
- EXPECT_TRUE(auth.HasPendingFetch()); |
- MockFetcher mock_fetcher( |
- client_login_to_oauth2_source_, |
- net::URLRequestStatus(net::URLRequestStatus::SUCCESS, 0), |
- RC_REQUEST_OK, cookies, "", |
- content::URLFetcher::POST, &auth); |
- auth.OnURLFetchComplete(&mock_fetcher); |
- EXPECT_FALSE(auth.HasPendingFetch()); |
-} |
- |
-TEST_F(GaiaAuthFetcherTest, OAuthLoginTokenOAuth2TokenPairFailure) { |
- MockGaiaConsumer consumer; |
- EXPECT_CALL(consumer, OnOAuthLoginTokenFailure(_)) |
- .Times(1); |
- |
- TestingProfile profile; |
- |
- TestURLFetcherFactory factory; |
- GaiaAuthFetcher auth(&consumer, std::string(), |
- profile_.GetRequestContext()); |
- auth.StartOAuthLoginTokenFetch("lso_token"); |
- |
- net::ResponseCookies cookies; |
- cookies.push_back(kGetAuthCodeValidCookie); |
- EXPECT_TRUE(auth.HasPendingFetch()); |
- MockFetcher mock_fetcher1( |
- client_login_to_oauth2_source_, |
- net::URLRequestStatus(net::URLRequestStatus::SUCCESS, 0), |
- RC_REQUEST_OK, cookies, "", |
- content::URLFetcher::POST, &auth); |
- auth.OnURLFetchComplete(&mock_fetcher1); |
- EXPECT_TRUE(auth.HasPendingFetch()); |
- MockFetcher mock_fetcher2( |
- oauth2_token_source_, |
- net::URLRequestStatus(net::URLRequestStatus::SUCCESS, 0), |
- RC_REQUEST_OK, cookies_, kGetTokenPairResponseNoRefreshToken, |
- content::URLFetcher::POST, &auth); |
- auth.OnURLFetchComplete(&mock_fetcher2); |
- EXPECT_FALSE(auth.HasPendingFetch()); |
-} |
- |
TEST_F(GaiaAuthFetcherTest, TokenAuthSuccess) { |
MockGaiaConsumer consumer; |
EXPECT_CALL(consumer, OnTokenAuthSuccess("<html></html>")) |
@@ -772,95 +639,3 @@ |
auth.OnURLFetchComplete(test_fetcher); |
EXPECT_FALSE(auth.HasPendingFetch()); |
} |
- |
-TEST_F(GaiaAuthFetcherTest, ParseClientLoginToOAuth2Response) { |
- { // No cookies. |
- std::string auth_code; |
- net::ResponseCookies cookies; |
- EXPECT_FALSE(GaiaAuthFetcher::ParseClientLoginToOAuth2Response( |
- cookies, &auth_code)); |
- EXPECT_EQ("", auth_code); |
- } |
- { // Few cookies, nothing appropriate. |
- std::string auth_code; |
- net::ResponseCookies cookies; |
- cookies.push_back(kGetAuthCodeCookieNoSecure); |
- cookies.push_back(kGetAuthCodeCookieNoHttpOnly); |
- cookies.push_back(kGetAuthCodeCookieNoOAuthCode); |
- EXPECT_FALSE(GaiaAuthFetcher::ParseClientLoginToOAuth2Response( |
- cookies, &auth_code)); |
- EXPECT_EQ("", auth_code); |
- } |
- { // Few cookies, one of them is valid. |
- std::string auth_code; |
- net::ResponseCookies cookies; |
- cookies.push_back(kGetAuthCodeCookieNoSecure); |
- cookies.push_back(kGetAuthCodeCookieNoHttpOnly); |
- cookies.push_back(kGetAuthCodeCookieNoOAuthCode); |
- cookies.push_back(kGetAuthCodeValidCookie); |
- EXPECT_TRUE(GaiaAuthFetcher::ParseClientLoginToOAuth2Response( |
- cookies, &auth_code)); |
- EXPECT_EQ("test-code", auth_code); |
- } |
- { // Single valid cookie (like in real responses). |
- std::string auth_code; |
- net::ResponseCookies cookies; |
- cookies.push_back(kGetAuthCodeValidCookie); |
- EXPECT_TRUE(GaiaAuthFetcher::ParseClientLoginToOAuth2Response( |
- cookies, &auth_code)); |
- EXPECT_EQ("test-code", auth_code); |
- } |
-} |
- |
-TEST_F(GaiaAuthFetcherTest, ParseOAuth2TokenPairResponse) { |
- { // No data. |
- std::string rt; |
- std::string at; |
- int exp = -1; |
- EXPECT_FALSE(GaiaAuthFetcher::ParseOAuth2TokenPairResponse( |
- "", &rt, &at, &exp)); |
- EXPECT_EQ("", rt); |
- EXPECT_EQ("", at); |
- EXPECT_EQ(-1, exp); |
- } |
- { // No refresh token. |
- std::string rt; |
- std::string at; |
- int exp = -1; |
- EXPECT_FALSE(GaiaAuthFetcher::ParseOAuth2TokenPairResponse( |
- kGetTokenPairResponseNoRefreshToken, &rt, &at, &exp)); |
- EXPECT_EQ("", rt); |
- EXPECT_EQ("", at); |
- EXPECT_EQ(-1, exp); |
- } |
- { // No access token. |
- std::string rt; |
- std::string at; |
- int exp = -1; |
- EXPECT_FALSE(GaiaAuthFetcher::ParseOAuth2TokenPairResponse( |
- kGetTokenPairResponseNoAccessToken, &rt, &at, &exp)); |
- EXPECT_EQ("", rt); |
- EXPECT_EQ("", at); |
- EXPECT_EQ(-1, exp); |
- } |
- { // No expiration. |
- std::string rt; |
- std::string at; |
- int exp = -1; |
- EXPECT_FALSE(GaiaAuthFetcher::ParseOAuth2TokenPairResponse( |
- kGetTokenPairResponseNoExpiresIn, &rt, &at, &exp)); |
- EXPECT_EQ("", rt); |
- EXPECT_EQ("", at); |
- EXPECT_EQ(-1, exp); |
- } |
- { // Valid response. |
- std::string rt; |
- std::string at; |
- int exp = -1; |
- EXPECT_TRUE(GaiaAuthFetcher::ParseOAuth2TokenPairResponse( |
- kGetTokenPairValidResponse, &rt, &at, &exp)); |
- EXPECT_EQ("rt1", rt); |
- EXPECT_EQ("at1", at); |
- EXPECT_EQ(3600, exp); |
- } |
-} |