Chromium Code Reviews| Index: chrome/browser/signin/profile_oauth2_token_service_unittest.cc |
| diff --git a/chrome/browser/signin/profile_oauth2_token_service_unittest.cc b/chrome/browser/signin/profile_oauth2_token_service_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..65a99bcfcda2c451226f0e602cba015343d5f4d3 |
| --- /dev/null |
| +++ b/chrome/browser/signin/profile_oauth2_token_service_unittest.cc |
| @@ -0,0 +1,98 @@ |
| +// Copyright 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "base/stringprintf.h" |
|
Mattias Nissler (ping if slow)
2013/03/26 12:04:32
nit: not needed
David Roche
2013/03/27 05:09:51
Done.
|
| +#include "chrome/browser/signin/oauth2_token_service.h" |
| +#include "chrome/browser/signin/oauth2_token_service_test_util.h" |
| +#include "chrome/browser/signin/profile_oauth2_token_service.h" |
| +#include "chrome/browser/signin/profile_oauth2_token_service_factory.h" |
| +#include "chrome/browser/signin/token_service_factory.h" |
|
Mattias Nissler (ping if slow)
2013/03/26 12:04:32
needed?
David Roche
2013/03/27 05:09:51
Done.
|
| +#include "chrome/browser/signin/token_service_unittest.h" |
| +#include "chrome/common/chrome_notification_types.h" |
|
Mattias Nissler (ping if slow)
2013/03/26 12:04:32
not needed?
Please clean up includes in this file
David Roche
2013/03/27 05:09:51
Done.
|
| +#include "content/public/browser/browser_thread.h" |
| +#include "google_apis/gaia/gaia_constants.h" |
| +#include "google_apis/gaia/google_service_auth_error.h" |
| +#include "google_apis/gaia/oauth2_access_token_consumer.h" |
| +#include "net/http/http_status_code.h" |
| +#include "net/url_request/test_url_fetcher_factory.h" |
| +#include "net/url_request/url_request_status.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +using content::BrowserThread; |
| + |
| +class ProfileOAuth2TokenServiceTest : public TokenServiceTestHarness { |
| + public: |
| + ProfileOAuth2TokenServiceTest() {} |
| + |
| + virtual void SetUp() OVERRIDE { |
| + TokenServiceTestHarness::SetUp(); |
| + io_thread_.reset(new content::TestBrowserThread(content::BrowserThread::IO, |
| + &message_loop_)); |
| + service_->UpdateCredentials(credentials_); |
| + profile_->CreateRequestContext(); |
| + oauth2_service_ = ProfileOAuth2TokenServiceFactory::GetForProfile( |
| + profile_.get()); |
| + } |
| + |
| + virtual void TearDown() OVERRIDE { |
| + TokenServiceTestHarness::TearDown(); |
| + } |
| + |
| + protected: |
| + scoped_ptr<content::TestBrowserThread> io_thread_; |
| + net::TestURLFetcherFactory factory_; |
| + ProfileOAuth2TokenService* oauth2_service_; |
| + TestingOAuth2TokenServiceConsumer consumer_; |
| +}; |
| + |
| +TEST_F(ProfileOAuth2TokenServiceTest, TokenServiceUpdateClearsCache) { |
| + EXPECT_EQ(0, oauth2_service_->cache_size_for_testing()); |
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, |
| + "refreshToken"); |
| + scoped_ptr<OAuth2TokenService::Request> request(oauth2_service_->StartRequest( |
| + std::set<std::string>(), &consumer_)); |
| + message_loop_.RunUntilIdle(); |
| + net::TestURLFetcher* fetcher = factory_.GetFetcherByID(0); |
| + fetcher->set_response_code(net::HTTP_OK); |
| + fetcher->SetResponseString(GetValidTokenResponse("token", 3600)); |
| + fetcher->delegate()->OnURLFetchComplete(fetcher); |
| + EXPECT_EQ(1, consumer_.number_of_correct_tokens_); |
| + EXPECT_EQ(0, consumer_.number_of_errors_); |
| + EXPECT_EQ("token", consumer_.last_token_); |
| + EXPECT_EQ(1, oauth2_service_->cache_size_for_testing()); |
| + |
| + // Signs out and signs in |
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, |
| + ""); |
| + service_->EraseTokensFromDB(); |
| + EXPECT_EQ(0, oauth2_service_->cache_size_for_testing()); |
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, |
| + "refreshToken"); |
| + |
| + request = oauth2_service_->StartRequest(std::set<std::string>(), &consumer_); |
| + message_loop_.RunUntilIdle(); |
| + fetcher = factory_.GetFetcherByID(0); |
| + fetcher->set_response_code(net::HTTP_OK); |
| + fetcher->SetResponseString(GetValidTokenResponse("another token", 3600)); |
| + fetcher->delegate()->OnURLFetchComplete(fetcher); |
| + EXPECT_EQ(2, consumer_.number_of_correct_tokens_); |
| + EXPECT_EQ(0, consumer_.number_of_errors_); |
| + EXPECT_EQ("another token", consumer_.last_token_); |
| + EXPECT_EQ(1, oauth2_service_->cache_size_for_testing()); |
| +} |
| + |
| +TEST_F(ProfileOAuth2TokenServiceTest, StaleRefreshTokensNotCached) { |
| + EXPECT_FALSE(service_->HasOAuthLoginToken()); |
| + EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T1")); |
| + |
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, |
| + "T1"); |
| + EXPECT_TRUE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T1")); |
| + EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T2")); |
| + |
| + service_->IssueAuthTokenForTest(GaiaConstants::kGaiaOAuth2LoginRefreshToken, |
| + "T2"); |
| + EXPECT_TRUE(oauth2_service_->ShouldCacheForRefreshToken(service_, "T2")); |
| + EXPECT_FALSE(oauth2_service_->ShouldCacheForRefreshToken(NULL, "T2")); |
| +} |