| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/proximity_auth/cryptauth/cryptauth_account_token_fetcher.h" | 5 #include "components/proximity_auth/cryptauth/cryptauth_access_token_fetcher.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "google_apis/gaia/fake_oauth2_token_service.h" | 10 #include "google_apis/gaia/fake_oauth2_token_service.h" |
| 11 #include "testing/gtest/include/gtest/gtest.h" | 11 #include "testing/gtest/include/gtest/gtest.h" |
| 12 | 12 |
| 13 namespace proximity_auth { | 13 namespace proximity_auth { |
| 14 | 14 |
| 15 namespace { | 15 namespace { |
| 16 | 16 |
| 17 const char kAccountId[] = "account_id"; | 17 const char kAccountId[] = "account_id"; |
| 18 const char kAccessToken[] = "access_token"; | 18 const char kAccessToken[] = "access_token"; |
| 19 const char kInvalidResult[] = "invalid_result"; | 19 const char kInvalidResult[] = "invalid_result"; |
| 20 | 20 |
| 21 // Callback that saves the fetched access token to the first argument. | 21 // Callback that saves the fetched access token to the first argument. |
| 22 void SaveAccessToken(std::string* out_token, const std::string& in_token) { | 22 void SaveAccessToken(std::string* out_token, const std::string& in_token) { |
| 23 *out_token = in_token; | 23 *out_token = in_token; |
| 24 } | 24 } |
| 25 | 25 |
| 26 } // namespace | 26 } // namespace |
| 27 | 27 |
| 28 class ProximityAuthCryptAuthAccountTokenFetcherTest : public testing::Test { | 28 class ProximityAuthCryptAuthAccessTokenFetcherTest : public testing::Test { |
| 29 protected: | 29 protected: |
| 30 ProximityAuthCryptAuthAccountTokenFetcherTest() | 30 ProximityAuthCryptAuthAccessTokenFetcherTest() |
| 31 : fetcher_(&token_service_, kAccountId) { | 31 : fetcher_(CryptAuthAccessTokenFetcher::CreateDefault(&token_service_, |
| 32 kAccountId)) { |
| 32 token_service_.AddAccount(kAccountId); | 33 token_service_.AddAccount(kAccountId); |
| 33 } | 34 } |
| 34 | 35 |
| 35 FakeOAuth2TokenService token_service_; | 36 FakeOAuth2TokenService token_service_; |
| 36 CryptAuthAccountTokenFetcher fetcher_; | 37 scoped_ptr<CryptAuthAccessTokenFetcher> fetcher_; |
| 37 | 38 |
| 38 DISALLOW_COPY_AND_ASSIGN(ProximityAuthCryptAuthAccountTokenFetcherTest); | 39 DISALLOW_COPY_AND_ASSIGN(ProximityAuthCryptAuthAccessTokenFetcherTest); |
| 39 }; | 40 }; |
| 40 | 41 |
| 41 TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetchSuccess) { | 42 TEST_F(ProximityAuthCryptAuthAccessTokenFetcherTest, FetchSuccess) { |
| 42 std::string result; | 43 std::string result; |
| 43 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result)); | 44 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result)); |
| 44 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, | 45 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, |
| 45 base::Time::Max()); | 46 base::Time::Max()); |
| 46 | 47 |
| 47 EXPECT_EQ(kAccessToken, result); | 48 EXPECT_EQ(kAccessToken, result); |
| 48 } | 49 } |
| 49 | 50 |
| 50 TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetchFailure) { | 51 TEST_F(ProximityAuthCryptAuthAccessTokenFetcherTest, FetchFailure) { |
| 51 std::string result(kInvalidResult); | 52 std::string result(kInvalidResult); |
| 52 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result)); | 53 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result)); |
| 53 token_service_.IssueErrorForAllPendingRequestsForAccount( | 54 token_service_.IssueErrorForAllPendingRequestsForAccount( |
| 54 kAccountId, | 55 kAccountId, |
| 55 GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_ERROR)); | 56 GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_ERROR)); |
| 56 | 57 |
| 57 EXPECT_EQ(std::string(), result); | 58 EXPECT_EQ(std::string(), result); |
| 58 } | 59 } |
| 59 | 60 |
| 60 TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetcherReuse) { | 61 TEST_F(ProximityAuthCryptAuthAccessTokenFetcherTest, FetcherReuse) { |
| 61 std::string result1; | 62 std::string result1; |
| 62 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result1)); | 63 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result1)); |
| 63 | 64 |
| 64 { | 65 { |
| 65 std::string result2(kInvalidResult); | 66 std::string result2(kInvalidResult); |
| 66 fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result2)); | 67 fetcher_->FetchAccessToken(base::Bind(SaveAccessToken, &result2)); |
| 67 EXPECT_EQ(std::string(), result2); | 68 EXPECT_EQ(std::string(), result2); |
| 68 } | 69 } |
| 69 | 70 |
| 70 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, | 71 token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken, |
| 71 base::Time::Max()); | 72 base::Time::Max()); |
| 72 EXPECT_EQ(kAccessToken, result1); | 73 EXPECT_EQ(kAccessToken, result1); |
| 73 } | 74 } |
| 74 | 75 |
| 75 } // namespace proximity_auth | 76 } // namespace proximity_auth |
| OLD | NEW |