OLD | NEW |
| (Empty) |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/signin/signin_global_error.h" | |
6 | |
7 #include "base/memory/scoped_ptr.h" | |
8 #include "chrome/browser/signin/signin_manager.h" | |
9 #include "chrome/browser/signin/signin_manager_factory.h" | |
10 #include "chrome/browser/signin/signin_manager_fake.h" | |
11 #include "chrome/browser/signin/token_service_factory.h" | |
12 #include "chrome/browser/ui/global_error/global_error_service.h" | |
13 #include "chrome/browser/ui/global_error/global_error_service_factory.h" | |
14 #include "chrome/test/base/testing_profile.h" | |
15 #include "testing/gtest/include/gtest/gtest.h" | |
16 | |
17 class FakeAuthStatusProvider : public SigninGlobalError::AuthStatusProvider { | |
18 public: | |
19 FakeAuthStatusProvider() : auth_error_(GoogleServiceAuthError::None()) {} | |
20 | |
21 // AuthStatusProvider implementation. | |
22 GoogleServiceAuthError GetAuthStatus() const OVERRIDE { return auth_error_; } | |
23 | |
24 void set_auth_error(const GoogleServiceAuthError& error) { | |
25 auth_error_ = error; | |
26 } | |
27 | |
28 private: | |
29 GoogleServiceAuthError auth_error_; | |
30 }; | |
31 | |
32 class SigninGlobalErrorTest : public testing::Test { | |
33 public: | |
34 void SetUp() OVERRIDE { | |
35 // Create a signed-in profile. | |
36 profile_.reset(new TestingProfile()); | |
37 | |
38 SigninManagerFactory::GetInstance()->SetTestingFactoryAndUse( | |
39 profile_.get(), FakeSigninManager::Build); | |
40 SigninManager* manager = | |
41 SigninManagerFactory::GetForProfile(profile_.get()); | |
42 manager->SetAuthenticatedUsername("testuser@test.com"); | |
43 global_error_ = manager->signin_global_error(); | |
44 } | |
45 | |
46 scoped_ptr<TestingProfile> profile_; | |
47 SigninGlobalError* global_error_; | |
48 }; | |
49 | |
50 TEST_F(SigninGlobalErrorTest, NoAuthStatusProviders) { | |
51 ASSERT_FALSE(global_error_->HasBadge()); | |
52 } | |
53 | |
54 TEST_F(SigninGlobalErrorTest, NoErrorAuthStatusProviders) { | |
55 FakeAuthStatusProvider provider; | |
56 global_error_->AddProvider(&provider); | |
57 ASSERT_FALSE(global_error_->HasBadge()); | |
58 global_error_->RemoveProvider(&provider); | |
59 ASSERT_FALSE(global_error_->HasBadge()); | |
60 } | |
61 | |
62 TEST_F(SigninGlobalErrorTest, ErrorAuthStatusProvider) { | |
63 FakeAuthStatusProvider provider; | |
64 FakeAuthStatusProvider error_provider; | |
65 error_provider.set_auth_error(GoogleServiceAuthError( | |
66 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); | |
67 global_error_->AddProvider(&provider); | |
68 ASSERT_FALSE(global_error_->HasBadge()); | |
69 global_error_->AddProvider(&error_provider); | |
70 ASSERT_TRUE(global_error_->HasBadge()); | |
71 global_error_->RemoveProvider(&error_provider); | |
72 ASSERT_FALSE(global_error_->HasBadge()); | |
73 global_error_->RemoveProvider(&provider); | |
74 ASSERT_FALSE(global_error_->HasBadge()); | |
75 } | |
76 | |
77 TEST_F(SigninGlobalErrorTest, AuthStatusProviderErrorTransition) { | |
78 FakeAuthStatusProvider provider0; | |
79 FakeAuthStatusProvider provider1; | |
80 global_error_->AddProvider(&provider0); | |
81 global_error_->AddProvider(&provider1); | |
82 ASSERT_FALSE(global_error_->HasBadge()); | |
83 provider0.set_auth_error( | |
84 GoogleServiceAuthError(GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); | |
85 ASSERT_FALSE(global_error_->HasBadge()); | |
86 global_error_->AuthStatusChanged(); | |
87 ASSERT_TRUE(global_error_->HasBadge()); | |
88 provider1.set_auth_error( | |
89 GoogleServiceAuthError(GoogleServiceAuthError::ACCOUNT_DISABLED)); | |
90 global_error_->AuthStatusChanged(); | |
91 ASSERT_TRUE(global_error_->HasBadge()); | |
92 | |
93 // Now resolve the auth errors - badge should go away. | |
94 provider0.set_auth_error(GoogleServiceAuthError::None()); | |
95 global_error_->AuthStatusChanged(); | |
96 ASSERT_TRUE(global_error_->HasBadge()); | |
97 provider1.set_auth_error(GoogleServiceAuthError::None()); | |
98 global_error_->AuthStatusChanged(); | |
99 ASSERT_FALSE(global_error_->HasBadge()); | |
100 | |
101 global_error_->RemoveProvider(&provider0); | |
102 ASSERT_FALSE(global_error_->HasBadge()); | |
103 global_error_->RemoveProvider(&provider1); | |
104 ASSERT_FALSE(global_error_->HasBadge()); | |
105 } | |
106 | |
107 // Verify that SigninGlobalError ignores certain errors. | |
108 TEST_F(SigninGlobalErrorTest, AuthStatusEnumerateAllErrors) { | |
109 typedef struct { | |
110 GoogleServiceAuthError::State error_state; | |
111 bool is_error; | |
112 } ErrorTableEntry; | |
113 | |
114 ErrorTableEntry table[] = { | |
115 { GoogleServiceAuthError::NONE, false }, | |
116 { GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS, true }, | |
117 { GoogleServiceAuthError::USER_NOT_SIGNED_UP, true }, | |
118 { GoogleServiceAuthError::CONNECTION_FAILED, false }, | |
119 { GoogleServiceAuthError::CAPTCHA_REQUIRED, true }, | |
120 { GoogleServiceAuthError::ACCOUNT_DELETED, true }, | |
121 { GoogleServiceAuthError::ACCOUNT_DISABLED, true }, | |
122 { GoogleServiceAuthError::SERVICE_UNAVAILABLE, true }, | |
123 { GoogleServiceAuthError::TWO_FACTOR, true }, | |
124 { GoogleServiceAuthError::REQUEST_CANCELED, true }, | |
125 { GoogleServiceAuthError::HOSTED_NOT_ALLOWED, true }, | |
126 }; | |
127 COMPILE_ASSERT(ARRAYSIZE_UNSAFE(table) == GoogleServiceAuthError::NUM_STATES, | |
128 kTable_size_does_not_match_number_of_auth_error_types); | |
129 | |
130 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(table); ++i) { | |
131 FakeAuthStatusProvider provider; | |
132 provider.set_auth_error(GoogleServiceAuthError(table[i].error_state)); | |
133 GlobalErrorService* service = | |
134 GlobalErrorServiceFactory::GetForProfile(profile_.get()); | |
135 global_error_->AddProvider(&provider); | |
136 EXPECT_EQ(global_error_->HasBadge(), table[i].is_error); | |
137 // Should badge the wrench menu if there's an error. | |
138 EXPECT_EQ(service->GetFirstBadgeResourceID() != 0, table[i].is_error); | |
139 #if defined(OS_CHROMEOS) | |
140 // Only on chromeos do we have a separate menu item - on other platforms | |
141 // there's code in WrenchMenuModel to re-use the "sign in to chrome" | |
142 // menu item to display auth status/errors. | |
143 EXPECT_EQ(global_error_->HasMenuItem(), table[i].is_error); | |
144 #else | |
145 EXPECT_FALSE(global_error_->HasMenuItem()); | |
146 #endif | |
147 EXPECT_EQ(global_error_->MenuItemLabel().empty(), !table[i].is_error); | |
148 EXPECT_EQ(global_error_->GetBubbleViewMessage().empty(), | |
149 !table[i].is_error); | |
150 EXPECT_FALSE(global_error_->GetBubbleViewTitle().empty()); | |
151 EXPECT_FALSE(global_error_->GetBubbleViewAcceptButtonLabel().empty()); | |
152 EXPECT_TRUE(global_error_->GetBubbleViewCancelButtonLabel().empty()); | |
153 global_error_->RemoveProvider(&provider); | |
154 } | |
155 } | |
OLD | NEW |