Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "base/stringprintf.h" | |
|
Mattias Nissler (ping if slow)
2013/03/26 12:04:32
nit: not needed
David Roche
2013/03/27 05:09:51
Done.
| |
| 6 #include "chrome/browser/signin/oauth2_token_service.h" | |
| 7 #include "chrome/browser/signin/oauth2_token_service_test_util.h" | |
| 8 #include "chrome/browser/signin/profile_oauth2_token_service.h" | |
| 9 #include "chrome/browser/signin/profile_oauth2_token_service_factory.h" | |
| 10 #include "chrome/browser/signin/token_service_factory.h" | |
|
Mattias Nissler (ping if slow)
2013/03/26 12:04:32
needed?
David Roche
2013/03/27 05:09:51
Done.
| |
| 11 #include "chrome/browser/signin/token_service_unittest.h" | |
| 12 #include "chrome/common/chrome_notification_types.h" | |
|
Mattias Nissler (ping if slow)
2013/03/26 12:04:32
not needed?
Please clean up includes in this file
David Roche
2013/03/27 05:09:51
Done.
| |
| 13 #include "content/public/browser/browser_thread.h" | |
| 14 #include "google_apis/gaia/gaia_constants.h" | |
| 15 #include "google_apis/gaia/google_service_auth_error.h" | |
| 16 #include "google_apis/gaia/oauth2_access_token_consumer.h" | |
| 17 #include "net/http/http_status_code.h" | |
| 18 #include "net/url_request/test_url_fetcher_factory.h" | |
| 19 #include "net/url_request/url_request_status.h" | |
| 20 #include "testing/gtest/include/gtest/gtest.h" | |
| 21 | |
| 22 using content::BrowserThread; | |
| 23 | |
| 24 class ProfileOAuth2TokenServiceTest : public TokenServiceTestHarness { | |
| 25 public: | |
| 26 ProfileOAuth2TokenServiceTest() {} | |
| 27 | |
| 28 virtual void SetUp() OVERRIDE { | |
| 29 TokenServiceTestHarness::SetUp(); | |
| 30 io_thread_.reset(new content::TestBrowserThread(content::BrowserThread::IO, | |
| 31 &message_loop_)); | |
| 32 service_->UpdateCredentials(credentials_); | |
| 33 profile_->CreateRequestContext(); | |
| 34 oauth2_service_ = ProfileOAuth2TokenServiceFactory::GetForProfile( | |
| 35 profile_.get()); | |
| 36 } | |
| 37 | |
| 38 virtual void TearDown() OVERRIDE { | |
| 39 TokenServiceTestHarness::TearDown(); | |
| 40 } | |
| 41 | |
| 42 protected: | |
| 43 scoped_ptr<content::TestBrowserThread> io_thread_; | |
| 44 net::TestURLFetcherFactory factory_; | |
| 45 ProfileOAuth2TokenService* oauth2_service_; | |
| 46 TestingOAuth2TokenServiceConsumer consumer_; | |
| 47 }; | |
| 48 | |
| 49 TEST_F(ProfileOAuth2TokenServiceTest, TokenServiceUpdateClearsCache) { | |
| 50 EXPECT_EQ(0, oauth2_service_->cache_size_for_testing()); | |
| 51 service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, | |
| 52 "refreshToken"); | |
| 53 scoped_ptr<OAuth2TokenService::Request> request(oauth2_service_->StartRequest( | |
| 54 std::set<std::string>(), &consumer_)); | |
| 55 message_loop_.RunUntilIdle(); | |
| 56 net::TestURLFetcher* fetcher = factory_.GetFetcherByID(0); | |
| 57 fetcher->set_response_code(net::HTTP_OK); | |
| 58 fetcher->SetResponseString(GetValidTokenResponse("token", 3600)); | |
| 59 fetcher->delegate()->OnURLFetchComplete(fetcher); | |
| 60 EXPECT_EQ(1, consumer_.number_of_correct_tokens_); | |
| 61 EXPECT_EQ(0, consumer_.number_of_errors_); | |
| 62 EXPECT_EQ("token", consumer_.last_token_); | |
| 63 EXPECT_EQ(1, oauth2_service_->cache_size_for_testing()); | |
| 64 | |
| 65 // Signs out and signs in | |
| 66 service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, | |
| 67 ""); | |
| 68 service_->EraseTokensFromDB(); | |
| 69 EXPECT_EQ(0, oauth2_service_->cache_size_for_testing()); | |
| 70 service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, | |
| 71 "refreshToken"); | |
| 72 | |
| 73 request = oauth2_service_->StartRequest(std::set<std::string>(), &consumer_); | |
| 74 message_loop_.RunUntilIdle(); | |
| 75 fetcher = factory_.GetFetcherByID(0); | |
| 76 fetcher->set_response_code(net::HTTP_OK); | |
| 77 fetcher->SetResponseString(GetValidTokenResponse("another token", 3600)); | |
| 78 fetcher->delegate()->OnURLFetchComplete(fetcher); | |
| 79 EXPECT_EQ(2, consumer_.number_of_correct_tokens_); | |
| 80 EXPECT_EQ(0, consumer_.number_of_errors_); | |
| 81 EXPECT_EQ("another token", consumer_.last_token_); | |
| 82 EXPECT_EQ(1, oauth2_service_->cache_size_for_testing()); | |
| 83 } | |
| 84 | |
| 85 TEST_F(ProfileOAuth2TokenServiceTest, StaleRefreshTokensNotCached) { | |
| 86 EXPECT_FALSE(service_->HasOAuthLoginToken()); | |
| 87 EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T1")); | |
| 88 | |
| 89 service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, | |
| 90 "T1"); | |
| 91 EXPECT_TRUE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T1")); | |
| 92 EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T2")); | |
| 93 | |
| 94 service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, | |
| 95 "T2"); | |
| 96 EXPECT_TRUE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T2")); | |
| 97 EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(NULL, "T2")); | |
| 98 } | |
| OLD | NEW |