Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(388)

Side by Side Diff: google_apis/gaia/oauth2_access_token_fetcher_unittest.cc

Issue 182573003: Extract OAuth2AccessTokenFetcher interface. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Add missing file. Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 //
5 // A complete set of unit tests for OAuth2AccessTokenFetcher.
6
7 #include <string>
8
9 #include "base/memory/scoped_ptr.h"
10 #include "base/run_loop.h"
11 #include "google_apis/gaia/gaia_urls.h"
12 #include "google_apis/gaia/google_service_auth_error.h"
13 #include "google_apis/gaia/oauth2_access_token_consumer.h"
14 #include "google_apis/gaia/oauth2_access_token_fetcher.h"
15 #include "net/http/http_status_code.h"
16 #include "net/url_request/test_url_fetcher_factory.h"
17 #include "net/url_request/url_fetcher.h"
18 #include "net/url_request/url_fetcher_delegate.h"
19 #include "net/url_request/url_fetcher_factory.h"
20 #include "net/url_request/url_request.h"
21 #include "net/url_request/url_request_status.h"
22 #include "net/url_request/url_request_test_util.h"
23 #include "testing/gmock/include/gmock/gmock.h"
24 #include "testing/gtest/include/gtest/gtest.h"
25 #include "url/gurl.h"
26
27 using net::ResponseCookies;
28 using net::ScopedURLFetcherFactory;
29 using net::TestURLFetcher;
30 using net::URLFetcher;
31 using net::URLFetcherDelegate;
32 using net::URLFetcherFactory;
33 using net::URLRequestStatus;
34 using testing::_;
35 using testing::Return;
36
37 namespace {
38
39 typedef std::vector<std::string> ScopeList;
40
41 static const char kValidTokenResponse[] =
42 "{"
43 " \"access_token\": \"at1\","
44 " \"expires_in\": 3600,"
45 " \"token_type\": \"Bearer\""
46 "}";
47 static const char kTokenResponseNoAccessToken[] =
48 "{"
49 " \"expires_in\": 3600,"
50 " \"token_type\": \"Bearer\""
51 "}";
52
53 static const char kValidFailureTokenResponse[] =
54 "{"
55 " \"error\": \"invalid_grant\""
56 "}";
57
58 class MockUrlFetcherFactory : public ScopedURLFetcherFactory,
59 public URLFetcherFactory {
60 public:
61 MockUrlFetcherFactory()
62 : ScopedURLFetcherFactory(this) {
63 }
64 virtual ~MockUrlFetcherFactory() {}
65
66 MOCK_METHOD4(
67 CreateURLFetcher,
68 URLFetcher* (int id,
69 const GURL& url,
70 URLFetcher::RequestType request_type,
71 URLFetcherDelegate* d));
72 };
73
74 class MockOAuth2AccessTokenConsumer : public OAuth2AccessTokenConsumer {
75 public:
76 MockOAuth2AccessTokenConsumer() {}
77 ~MockOAuth2AccessTokenConsumer() {}
78
79 MOCK_METHOD2(OnGetTokenSuccess, void(const std::string& access_token,
80 const base::Time& expiration_time));
81 MOCK_METHOD1(OnGetTokenFailure,
82 void(const GoogleServiceAuthError& error));
83 };
84
85 } // namespace
86
87 class OAuth2AccessTokenFetcherTest : public testing::Test {
88 public:
89 OAuth2AccessTokenFetcherTest()
90 : request_context_getter_(new net::TestURLRequestContextGetter(
91 base::MessageLoopProxy::current())),
92 fetcher_(&consumer_, request_context_getter_) {
93 base::RunLoop().RunUntilIdle();
94 }
95
96 virtual ~OAuth2AccessTokenFetcherTest() {}
97
98 virtual TestURLFetcher* SetupGetAccessToken(bool fetch_succeeds,
99 int response_code,
100 const std::string& body) {
101 GURL url(GaiaUrls::GetInstance()->oauth2_token_url());
102 TestURLFetcher* url_fetcher = new TestURLFetcher(0, url, &fetcher_);
103 URLRequestStatus::Status status =
104 fetch_succeeds ? URLRequestStatus::SUCCESS : URLRequestStatus::FAILED;
105 url_fetcher->set_status(URLRequestStatus(status, 0));
106
107 if (response_code != 0)
108 url_fetcher->set_response_code(response_code);
109
110 if (!body.empty())
111 url_fetcher->SetResponseString(body);
112
113 EXPECT_CALL(factory_, CreateURLFetcher(_, url, _, _))
114 .WillOnce(Return(url_fetcher));
115 return url_fetcher;
116 }
117
118 protected:
119 base::MessageLoop message_loop_;
120 MockUrlFetcherFactory factory_;
121 MockOAuth2AccessTokenConsumer consumer_;
122 scoped_refptr<net::TestURLRequestContextGetter> request_context_getter_;
123 OAuth2AccessTokenFetcher fetcher_;
124 };
125
126 // These four tests time out, see http://crbug.com/113446.
127 TEST_F(OAuth2AccessTokenFetcherTest, DISABLED_GetAccessTokenRequestFailure) {
128 TestURLFetcher* url_fetcher = SetupGetAccessToken(false, 0, std::string());
129 EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
130 fetcher_.Start("client_id", "client_secret", "refresh_token", ScopeList());
131 fetcher_.OnURLFetchComplete(url_fetcher);
132 }
133
134 TEST_F(OAuth2AccessTokenFetcherTest,
135 DISABLED_GetAccessTokenResponseCodeFailure) {
136 TestURLFetcher* url_fetcher =
137 SetupGetAccessToken(true, net::HTTP_FORBIDDEN, std::string());
138 EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
139 fetcher_.Start("client_id", "client_secret", "refresh_token", ScopeList());
140 fetcher_.OnURLFetchComplete(url_fetcher);
141 }
142
143 TEST_F(OAuth2AccessTokenFetcherTest, DISABLED_Success) {
144 TestURLFetcher* url_fetcher = SetupGetAccessToken(
145 true, net::HTTP_OK, kValidTokenResponse);
146 EXPECT_CALL(consumer_, OnGetTokenSuccess("at1", _)).Times(1);
147 fetcher_.Start("client_id", "client_secret", "refresh_token", ScopeList());
148 fetcher_.OnURLFetchComplete(url_fetcher);
149 }
150
151 TEST_F(OAuth2AccessTokenFetcherTest, DISABLED_MakeGetAccessTokenBody) {
152 { // No scope.
153 std::string body =
154 "client_id=cid1&"
155 "client_secret=cs1&"
156 "grant_type=refresh_token&"
157 "refresh_token=rt1";
158 EXPECT_EQ(body, OAuth2AccessTokenFetcher::MakeGetAccessTokenBody(
159 "cid1", "cs1", "rt1", ScopeList()));
160 }
161
162 { // One scope.
163 std::string body =
164 "client_id=cid1&"
165 "client_secret=cs1&"
166 "grant_type=refresh_token&"
167 "refresh_token=rt1&"
168 "scope=https://www.googleapis.com/foo";
169 ScopeList scopes;
170 scopes.push_back("https://www.googleapis.com/foo");
171 EXPECT_EQ(body, OAuth2AccessTokenFetcher::MakeGetAccessTokenBody(
172 "cid1", "cs1", "rt1", scopes));
173 }
174
175 { // Multiple scopes.
176 std::string body =
177 "client_id=cid1&"
178 "client_secret=cs1&"
179 "grant_type=refresh_token&"
180 "refresh_token=rt1&"
181 "scope=https://www.googleapis.com/foo+"
182 "https://www.googleapis.com/bar+"
183 "https://www.googleapis.com/baz";
184 ScopeList scopes;
185 scopes.push_back("https://www.googleapis.com/foo");
186 scopes.push_back("https://www.googleapis.com/bar");
187 scopes.push_back("https://www.googleapis.com/baz");
188 EXPECT_EQ(body, OAuth2AccessTokenFetcher::MakeGetAccessTokenBody(
189 "cid1", "cs1", "rt1", scopes));
190 }
191 }
192
193 // http://crbug.com/114215
194 #if defined(OS_WIN)
195 #define MAYBE_ParseGetAccessTokenResponse DISABLED_ParseGetAccessTokenResponse
196 #else
197 #define MAYBE_ParseGetAccessTokenResponse ParseGetAccessTokenResponse
198 #endif // defined(OS_WIN)
199 TEST_F(OAuth2AccessTokenFetcherTest, MAYBE_ParseGetAccessTokenResponse) {
200 { // No body.
201 TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
202
203 std::string at;
204 int expires_in;
205 EXPECT_FALSE(OAuth2AccessTokenFetcher::ParseGetAccessTokenSuccessResponse(
206 &url_fetcher, &at, &expires_in));
207 EXPECT_TRUE(at.empty());
208 }
209 { // Bad json.
210 TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
211 url_fetcher.SetResponseString("foo");
212
213 std::string at;
214 int expires_in;
215 EXPECT_FALSE(OAuth2AccessTokenFetcher::ParseGetAccessTokenSuccessResponse(
216 &url_fetcher, &at, &expires_in));
217 EXPECT_TRUE(at.empty());
218 }
219 { // Valid json: access token missing.
220 TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
221 url_fetcher.SetResponseString(kTokenResponseNoAccessToken);
222
223 std::string at;
224 int expires_in;
225 EXPECT_FALSE(OAuth2AccessTokenFetcher::ParseGetAccessTokenSuccessResponse(
226 &url_fetcher, &at, &expires_in));
227 EXPECT_TRUE(at.empty());
228 }
229 { // Valid json: all good.
230 TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
231 url_fetcher.SetResponseString(kValidTokenResponse);
232
233 std::string at;
234 int expires_in;
235 EXPECT_TRUE(OAuth2AccessTokenFetcher::ParseGetAccessTokenSuccessResponse(
236 &url_fetcher, &at, &expires_in));
237 EXPECT_EQ("at1", at);
238 EXPECT_EQ(3600, expires_in);
239 }
240 { // Valid json: invalid error response.
241 TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
242 url_fetcher.SetResponseString(kTokenResponseNoAccessToken);
243
244 std::string error;
245 EXPECT_FALSE(OAuth2AccessTokenFetcher::ParseGetAccessTokenFailureResponse(
246 &url_fetcher, &error));
247 EXPECT_TRUE(error.empty());
248 }
249 { // Valid json: error response.
250 TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
251 url_fetcher.SetResponseString(kValidFailureTokenResponse);
252
253 std::string error;
254 EXPECT_TRUE(OAuth2AccessTokenFetcher::ParseGetAccessTokenFailureResponse(
255 &url_fetcher, &error));
256 EXPECT_EQ("invalid_grant", error);
257 }
258 }
OLDNEW
« no previous file with comments | « google_apis/gaia/oauth2_access_token_fetcher_impl_unittest.cc ('k') | google_apis/gaia/oauth2_api_call_flow.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698