| Index: chrome/browser/signin/profile_oauth2_token_service_unittest.cc
|
| diff --git a/chrome/browser/signin/profile_oauth2_token_service_unittest.cc b/chrome/browser/signin/profile_oauth2_token_service_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..5221884d25ff6845510c1a3f5e6696c1c660295e
|
| --- /dev/null
|
| +++ b/chrome/browser/signin/profile_oauth2_token_service_unittest.cc
|
| @@ -0,0 +1,98 @@
|
| +// Copyright 2013 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "base/stringprintf.h"
|
| +#include "chrome/browser/signin/oauth2_token_service.h"
|
| +#include "chrome/browser/signin/oauth2_token_service_test_util.h"
|
| +#include "chrome/browser/signin/profile_oauth2_token_service.h"
|
| +#include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
|
| +#include "chrome/browser/signin/token_service_factory.h"
|
| +#include "chrome/browser/signin/token_service_unittest.h"
|
| +#include "chrome/common/chrome_notification_types.h"
|
| +#include "content/public/browser/browser_thread.h"
|
| +#include "google_apis/gaia/gaia_constants.h"
|
| +#include "google_apis/gaia/google_service_auth_error.h"
|
| +#include "google_apis/gaia/oauth2_access_token_consumer.h"
|
| +#include "net/http/http_status_code.h"
|
| +#include "net/url_request/test_url_fetcher_factory.h"
|
| +#include "net/url_request/url_request_status.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +using content::BrowserThread;
|
| +
|
| +class ProfileOAuth2TokenServiceTest : public TokenServiceTestHarness {
|
| + public:
|
| + ProfileOAuth2TokenServiceTest() {}
|
| +
|
| + virtual void SetUp() OVERRIDE {
|
| + TokenServiceTestHarness::SetUp();
|
| + io_thread_.reset(new content::TestBrowserThread(content::BrowserThread::IO,
|
| + &message_loop_));
|
| + service_->UpdateCredentials(credentials_);
|
| + profile_->CreateRequestContext();
|
| + oauth2_service_ = ProfileOAuth2TokenServiceFactory::GetForProfile(
|
| + profile_.get());
|
| + }
|
| +
|
| + virtual void TearDown() OVERRIDE {
|
| + TokenServiceTestHarness::TearDown();
|
| + }
|
| +
|
| + protected:
|
| + scoped_ptr<content::TestBrowserThread> io_thread_;
|
| + net::TestURLFetcherFactory factory_;
|
| + ProfileOAuth2TokenService* oauth2_service_;
|
| + TestingOAuth2TokenServiceConsumer consumer_;
|
| +};
|
| +
|
| +TEST_F(ProfileOAuth2TokenServiceTest, TokenServiceUpdateClearsCache) {
|
| + EXPECT_EQ(0, oauth2_service_->cache_size());
|
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken,
|
| + "refreshToken");
|
| + scoped_ptr<OAuth2TokenService::Request> request(oauth2_service_->StartRequest(
|
| + std::set<std::string>(), &consumer_));
|
| + message_loop_.RunUntilIdle();
|
| + net::TestURLFetcher* fetcher = factory_.GetFetcherByID(0);
|
| + fetcher->set_response_code(net::HTTP_OK);
|
| + fetcher->SetResponseString(GetValidTokenResponse("token", 3600));
|
| + fetcher->delegate()->OnURLFetchComplete(fetcher);
|
| + EXPECT_EQ(1, consumer_.number_of_correct_tokens_);
|
| + EXPECT_EQ(0, consumer_.number_of_errors_);
|
| + EXPECT_EQ("token", consumer_.last_token_);
|
| + EXPECT_EQ(1, oauth2_service_->cache_size());
|
| +
|
| + // Signs out and signs in
|
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken,
|
| + "");
|
| + service_->EraseTokensFromDB();
|
| + EXPECT_EQ(0, oauth2_service_->cache_size());
|
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken,
|
| + "refreshToken");
|
| +
|
| + request = oauth2_service_->StartRequest(std::set<std::string>(), &consumer_);
|
| + message_loop_.RunUntilIdle();
|
| + fetcher = factory_.GetFetcherByID(0);
|
| + fetcher->set_response_code(net::HTTP_OK);
|
| + fetcher->SetResponseString(GetValidTokenResponse("another token", 3600));
|
| + fetcher->delegate()->OnURLFetchComplete(fetcher);
|
| + EXPECT_EQ(2, consumer_.number_of_correct_tokens_);
|
| + EXPECT_EQ(0, consumer_.number_of_errors_);
|
| + EXPECT_EQ("another token", consumer_.last_token_);
|
| + EXPECT_EQ(1, oauth2_service_->cache_size());
|
| +}
|
| +
|
| +TEST_F(ProfileOAuth2TokenServiceTest, StaleRefreshTokensNotCached) {
|
| + EXPECT_FALSE(service_->HasOAuthLoginToken());
|
| + EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T1"));
|
| +
|
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken,
|
| + "T1");
|
| + EXPECT_TRUE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T1"));
|
| + EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T2"));
|
| +
|
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken,
|
| + "T2");
|
| + EXPECT_TRUE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T2"));
|
| + EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(NULL, "T2"));
|
| +}
|
|
|