OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/proximity_auth/cryptauth/cryptauth_account_token_fetcher.h" | 5 #include "components/proximity_auth/cryptauth/cryptauth_access_token_fetcher.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "google_apis/gaia/fake_oauth2_token_service.h" | 10 #include "google_apis/gaia/fake_oauth2_token_service.h" |
11 #include "testing/gtest/include/gtest/gtest.h" | 11 #include "testing/gtest/include/gtest/gtest.h" |
12 | 12 |
13 namespace proximity_auth { | 13 namespace proximity_auth { |
14 | 14 |
15 namespace { | 15 namespace { |
16 | 16 |
17 const char kAccountId[] = "account_id"; | 17 const char kAccountId[] = "account_id"; |
18 const char kAccessToken[] = "access_token"; | 18 const char kAccessToken[] = "access_token"; |
19 const char kInvalidResult[] = "invalid_result"; | 19 const char kInvalidResult[] = "invalid_result"; |
20 | 20 |
21 // Callback that saves the fetched access token to the first argument. | 21 // Callback that saves the fetched access token to the first argument. |
22 void SaveAccessToken(std::string* out_token, const std::string& in_token) { | 22 void SaveAccessToken(std::string* out_token, const std::string& in_token) { |
23 *out_token = in_token; | 23 *out_token = in_token; |
24 } | 24 } |
25 | 25 |
26 } // namespace | 26 } // namespace |
27 | 27 |
28 class ProximityAuthCryptAuthAccountTokenFetcherTest : public testing::Test { | 28 class ProximityAuthCryptAuthAccessTokenFetcherTest : public testing::Test { |
29 protected: | 29 protected: |
30 ProximityAuthCryptAuthAccountTokenFetcherTest() | 30 ProximityAuthCryptAuthAccessTokenFetcherTest() |
31 : fetcher_(&token_service_, kAccountId) { | 31 : fetcher_(CryptAuthAccessTokenFetcher::CreateDefault(&token_service_, |
| 32 kAccountId)) { |
32 token_service_.AddAccount(kAccountId); | 33 token_service_.AddAccount(kAccountId); |
33 } | 34 } |
34 | 35 |
35 FakeOAuth2TokenService token_service_; | 36 FakeOAuth2TokenService token_service_; |
36 CryptAuthAccountTokenFetcher fetcher_; | 37 scoped_ptr<CryptAuthAccessTokenFetcher> fetcher_; |
37 | 38 |
38 DISALLOW_COPY_AND_ASSIGN(ProximityAuthCryptAuthAccountTokenFetcherTest); | 39 DISALLOW_COPY_AND_ASSIGN(ProximityAuthCryptAuthAccessTokenFetcherTest); |
39 }; | 40 }; |
40 | 41 |
41 TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetchSuccess) { | 42 TEST_F(ProximityAuthCryptAuthAccessTokenFetcherTest, FetchSuccess) { |
42 std::string result; | 43 std::string result; |
43 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result)); | 44 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result)); |
44 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, | 45 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, |
45 base::Time::Max()); | 46 base::Time::Max()); |
46 | 47 |
47 EXPECT_EQ(kAccessToken, result); | 48 EXPECT_EQ(kAccessToken, result); |
48 } | 49 } |
49 | 50 |
50 TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetchFailure) { | 51 TEST_F(ProximityAuthCryptAuthAccessTokenFetcherTest, FetchFailure) { |
51 std::string result(kInvalidResult); | 52 std::string result(kInvalidResult); |
52 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result)); | 53 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result)); |
53 token_service_.IssueErrorForAllPendingRequestsForAccount( | 54 token_service_.IssueErrorForAllPendingRequestsForAccount( |
54 kAccountId, | 55 kAccountId, |
55 GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_ERROR)); | 56 GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_ERROR)); |
56 | 57 |
57 EXPECT_EQ(std::string(), result); | 58 EXPECT_EQ(std::string(), result); |
58 } | 59 } |
59 | 60 |
60 TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetcherReuse) { | 61 TEST_F(ProximityAuthCryptAuthAccessTokenFetcherTest, FetcherReuse) { |
61 std::string result1; | 62 std::string result1; |
62 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result1)); | 63 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result1)); |
63 | 64 |
64 { | 65 { |
65 std::string result2(kInvalidResult); | 66 std::string result2(kInvalidResult); |
66 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result2)); | 67 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result2)); |
67 EXPECT_EQ(std::string(), result2); | 68 EXPECT_EQ(std::string(), result2); |
68 } | 69 } |
69 | 70 |
70 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, | 71 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, |
71 base::Time::Max()); | 72 base::Time::Max()); |
72 EXPECT_EQ(kAccessToken, result1); | 73 EXPECT_EQ(kAccessToken, result1); |
73 } | 74 } |
74 | 75 |
75 } // namespace proximity_auth | 76 } // namespace proximity_auth |
OLD | NEW |