| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // A complete set of unit tests for OAuth2MintTokenFlow. | 5 // A complete set of unit tests for OAuth2MintTokenFlow. |
| 6 | 6 |
| 7 #include "google_apis/gaia/oauth2_mint_token_flow.h" |
| 8 |
| 9 #include <memory> |
| 7 #include <string> | 10 #include <string> |
| 8 #include <vector> | 11 #include <vector> |
| 9 | 12 |
| 10 #include "base/json/json_reader.h" | 13 #include "base/json/json_reader.h" |
| 11 #include "base/memory/scoped_ptr.h" | |
| 12 #include "base/strings/utf_string_conversions.h" | 14 #include "base/strings/utf_string_conversions.h" |
| 13 #include "base/values.h" | 15 #include "base/values.h" |
| 14 #include "google_apis/gaia/google_service_auth_error.h" | 16 #include "google_apis/gaia/google_service_auth_error.h" |
| 15 #include "google_apis/gaia/oauth2_access_token_fetcher.h" | 17 #include "google_apis/gaia/oauth2_access_token_fetcher.h" |
| 16 #include "google_apis/gaia/oauth2_mint_token_flow.h" | |
| 17 #include "net/base/net_errors.h" | 18 #include "net/base/net_errors.h" |
| 18 #include "net/url_request/test_url_fetcher_factory.h" | 19 #include "net/url_request/test_url_fetcher_factory.h" |
| 19 #include "net/url_request/url_request_status.h" | 20 #include "net/url_request/url_request_status.h" |
| 20 #include "testing/gmock/include/gmock/gmock.h" | 21 #include "testing/gmock/include/gmock/gmock.h" |
| 21 #include "testing/gtest/include/gtest/gtest.h" | 22 #include "testing/gtest/include/gtest/gtest.h" |
| 22 | 23 |
| 23 using net::TestURLFetcher; | 24 using net::TestURLFetcher; |
| 24 using net::URLFetcher; | 25 using net::URLFetcher; |
| 25 using net::URLRequestStatus; | 26 using net::URLRequestStatus; |
| 26 using testing::_; | 27 using testing::_; |
| (...skipping 143 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 170 std::string ext_id = "ext1"; | 171 std::string ext_id = "ext1"; |
| 171 std::string client_id = "client1"; | 172 std::string client_id = "client1"; |
| 172 std::vector<std::string> scopes(CreateTestScopes()); | 173 std::vector<std::string> scopes(CreateTestScopes()); |
| 173 flow_.reset(new MockMintTokenFlow( | 174 flow_.reset(new MockMintTokenFlow( |
| 174 delegate, OAuth2MintTokenFlow::Parameters(ext_id, client_id, scopes, | 175 delegate, OAuth2MintTokenFlow::Parameters(ext_id, client_id, scopes, |
| 175 device_id, mode))); | 176 device_id, mode))); |
| 176 } | 177 } |
| 177 | 178 |
| 178 // Helper to parse the given string to DictionaryValue. | 179 // Helper to parse the given string to DictionaryValue. |
| 179 static base::DictionaryValue* ParseJson(const std::string& str) { | 180 static base::DictionaryValue* ParseJson(const std::string& str) { |
| 180 scoped_ptr<base::Value> value = base::JSONReader::Read(str); | 181 std::unique_ptr<base::Value> value = base::JSONReader::Read(str); |
| 181 EXPECT_TRUE(value.get()); | 182 EXPECT_TRUE(value.get()); |
| 182 EXPECT_EQ(base::Value::TYPE_DICTIONARY, value->GetType()); | 183 EXPECT_EQ(base::Value::TYPE_DICTIONARY, value->GetType()); |
| 183 return static_cast<base::DictionaryValue*>(value.release()); | 184 return static_cast<base::DictionaryValue*>(value.release()); |
| 184 } | 185 } |
| 185 | 186 |
| 186 scoped_ptr<MockMintTokenFlow> flow_; | 187 std::unique_ptr<MockMintTokenFlow> flow_; |
| 187 StrictMock<MockDelegate> delegate_; | 188 StrictMock<MockDelegate> delegate_; |
| 188 }; | 189 }; |
| 189 | 190 |
| 190 TEST_F(OAuth2MintTokenFlowTest, CreateApiCallBody) { | 191 TEST_F(OAuth2MintTokenFlowTest, CreateApiCallBody) { |
| 191 { // Issue advice mode. | 192 { // Issue advice mode. |
| 192 CreateFlow(OAuth2MintTokenFlow::MODE_ISSUE_ADVICE); | 193 CreateFlow(OAuth2MintTokenFlow::MODE_ISSUE_ADVICE); |
| 193 std::string body = flow_->CreateApiCallBody(); | 194 std::string body = flow_->CreateApiCallBody(); |
| 194 std::string expected_body( | 195 std::string expected_body( |
| 195 "force=false" | 196 "force=false" |
| 196 "&response_type=none" | 197 "&response_type=none" |
| (...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 243 "&origin=ext1" | 244 "&origin=ext1" |
| 244 "&device_id=device_id1" | 245 "&device_id=device_id1" |
| 245 "&device_type=chrome" | 246 "&device_type=chrome" |
| 246 "&lib_ver=extension"); | 247 "&lib_ver=extension"); |
| 247 EXPECT_EQ(expected_body, body); | 248 EXPECT_EQ(expected_body, body); |
| 248 } | 249 } |
| 249 } | 250 } |
| 250 | 251 |
| 251 TEST_F(OAuth2MintTokenFlowTest, ParseMintTokenResponse) { | 252 TEST_F(OAuth2MintTokenFlowTest, ParseMintTokenResponse) { |
| 252 { // Access token missing. | 253 { // Access token missing. |
| 253 scoped_ptr<base::DictionaryValue> json( | 254 std::unique_ptr<base::DictionaryValue> json( |
| 254 ParseJson(kTokenResponseNoAccessToken)); | 255 ParseJson(kTokenResponseNoAccessToken)); |
| 255 std::string at; | 256 std::string at; |
| 256 int ttl; | 257 int ttl; |
| 257 EXPECT_FALSE(OAuth2MintTokenFlow::ParseMintTokenResponse(json.get(), &at, | 258 EXPECT_FALSE(OAuth2MintTokenFlow::ParseMintTokenResponse(json.get(), &at, |
| 258 &ttl)); | 259 &ttl)); |
| 259 EXPECT_TRUE(at.empty()); | 260 EXPECT_TRUE(at.empty()); |
| 260 } | 261 } |
| 261 { // All good. | 262 { // All good. |
| 262 scoped_ptr<base::DictionaryValue> json(ParseJson(kValidTokenResponse)); | 263 std::unique_ptr<base::DictionaryValue> json(ParseJson(kValidTokenResponse)); |
| 263 std::string at; | 264 std::string at; |
| 264 int ttl; | 265 int ttl; |
| 265 EXPECT_TRUE(OAuth2MintTokenFlow::ParseMintTokenResponse(json.get(), &at, | 266 EXPECT_TRUE(OAuth2MintTokenFlow::ParseMintTokenResponse(json.get(), &at, |
| 266 &ttl)); | 267 &ttl)); |
| 267 EXPECT_EQ("at1", at); | 268 EXPECT_EQ("at1", at); |
| 268 EXPECT_EQ(3600, ttl); | 269 EXPECT_EQ(3600, ttl); |
| 269 } | 270 } |
| 270 } | 271 } |
| 271 | 272 |
| 272 TEST_F(OAuth2MintTokenFlowTest, ParseIssueAdviceResponse) { | 273 TEST_F(OAuth2MintTokenFlowTest, ParseIssueAdviceResponse) { |
| 273 { // Description missing. | 274 { // Description missing. |
| 274 scoped_ptr<base::DictionaryValue> json( | 275 std::unique_ptr<base::DictionaryValue> json( |
| 275 ParseJson(kIssueAdviceResponseNoDescription)); | 276 ParseJson(kIssueAdviceResponseNoDescription)); |
| 276 IssueAdviceInfo ia; | 277 IssueAdviceInfo ia; |
| 277 EXPECT_FALSE(OAuth2MintTokenFlow::ParseIssueAdviceResponse( | 278 EXPECT_FALSE(OAuth2MintTokenFlow::ParseIssueAdviceResponse( |
| 278 json.get(), &ia)); | 279 json.get(), &ia)); |
| 279 EXPECT_TRUE(ia.empty()); | 280 EXPECT_TRUE(ia.empty()); |
| 280 } | 281 } |
| 281 { // Detail missing. | 282 { // Detail missing. |
| 282 scoped_ptr<base::DictionaryValue> json( | 283 std::unique_ptr<base::DictionaryValue> json( |
| 283 ParseJson(kIssueAdviceResponseNoDetail)); | 284 ParseJson(kIssueAdviceResponseNoDetail)); |
| 284 IssueAdviceInfo ia; | 285 IssueAdviceInfo ia; |
| 285 EXPECT_FALSE(OAuth2MintTokenFlow::ParseIssueAdviceResponse( | 286 EXPECT_FALSE(OAuth2MintTokenFlow::ParseIssueAdviceResponse( |
| 286 json.get(), &ia)); | 287 json.get(), &ia)); |
| 287 EXPECT_TRUE(ia.empty()); | 288 EXPECT_TRUE(ia.empty()); |
| 288 } | 289 } |
| 289 { // All good. | 290 { // All good. |
| 290 scoped_ptr<base::DictionaryValue> json( | 291 std::unique_ptr<base::DictionaryValue> json( |
| 291 ParseJson(kValidIssueAdviceResponse)); | 292 ParseJson(kValidIssueAdviceResponse)); |
| 292 IssueAdviceInfo ia; | 293 IssueAdviceInfo ia; |
| 293 EXPECT_TRUE(OAuth2MintTokenFlow::ParseIssueAdviceResponse( | 294 EXPECT_TRUE(OAuth2MintTokenFlow::ParseIssueAdviceResponse( |
| 294 json.get(), &ia)); | 295 json.get(), &ia)); |
| 295 IssueAdviceInfo ia_expected(CreateIssueAdvice()); | 296 IssueAdviceInfo ia_expected(CreateIssueAdvice()); |
| 296 EXPECT_EQ(ia_expected, ia); | 297 EXPECT_EQ(ia_expected, ia); |
| 297 } | 298 } |
| 298 } | 299 } |
| 299 | 300 |
| 300 TEST_F(OAuth2MintTokenFlowTest, ProcessApiCallSuccess) { | 301 TEST_F(OAuth2MintTokenFlowTest, ProcessApiCallSuccess) { |
| (...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 359 } | 360 } |
| 360 | 361 |
| 361 { // Non-null delegate. | 362 { // Non-null delegate. |
| 362 TestURLFetcher url_fetcher(1, GURL("http://www.google.com"), NULL); | 363 TestURLFetcher url_fetcher(1, GURL("http://www.google.com"), NULL); |
| 363 url_fetcher.set_status(URLRequestStatus::FromError(net::ERR_FAILED)); | 364 url_fetcher.set_status(URLRequestStatus::FromError(net::ERR_FAILED)); |
| 364 CreateFlow(OAuth2MintTokenFlow::MODE_MINT_TOKEN_NO_FORCE); | 365 CreateFlow(OAuth2MintTokenFlow::MODE_MINT_TOKEN_NO_FORCE); |
| 365 EXPECT_CALL(delegate_, OnMintTokenFailure(_)); | 366 EXPECT_CALL(delegate_, OnMintTokenFailure(_)); |
| 366 flow_->ProcessApiCallFailure(&url_fetcher); | 367 flow_->ProcessApiCallFailure(&url_fetcher); |
| 367 } | 368 } |
| 368 } | 369 } |
| OLD | NEW |