OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/common/origin_trials/trial_token_validator.h" | 5 #include "content/common/origin_trials/trial_token_validator.h" |
6 | 6 |
7 #include <memory> | 7 #include <memory> |
8 | 8 |
9 #include "base/macros.h" | 9 #include "base/macros.h" |
10 #include "base/strings/string_util.h" | 10 #include "base/strings/string_util.h" |
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
113 | 113 |
114 const url::Origin appropriate_origin_; | 114 const url::Origin appropriate_origin_; |
115 const url::Origin inappropriate_origin_; | 115 const url::Origin inappropriate_origin_; |
116 const url::Origin insecure_origin_; | 116 const url::Origin insecure_origin_; |
117 | 117 |
118 private: | 118 private: |
119 TestContentClient test_content_client_; | 119 TestContentClient test_content_client_; |
120 }; | 120 }; |
121 | 121 |
122 TEST_F(TrialTokenValidatorTest, ValidateValidToken) { | 122 TEST_F(TrialTokenValidatorTest, ValidateValidToken) { |
123 EXPECT_TRUE(TrialTokenValidator::ValidateToken( | 123 EXPECT_EQ(TRIAL_TOKEN_STATUS_SUCCESS, |
124 kSampleToken, appropriate_origin_, kAppropriateFeatureName)); | 124 TrialTokenValidator::ValidateToken( |
| 125 kSampleToken, appropriate_origin_, kAppropriateFeatureName)); |
125 } | 126 } |
126 | 127 |
127 TEST_F(TrialTokenValidatorTest, ValidateInappropriateOrigin) { | 128 TEST_F(TrialTokenValidatorTest, ValidateInappropriateOrigin) { |
128 EXPECT_FALSE(TrialTokenValidator::ValidateToken( | 129 EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_ORIGIN, |
129 kSampleToken, inappropriate_origin_, kAppropriateFeatureName)); | 130 TrialTokenValidator::ValidateToken( |
130 EXPECT_FALSE(TrialTokenValidator::ValidateToken( | 131 kSampleToken, inappropriate_origin_, kAppropriateFeatureName)); |
131 kSampleToken, insecure_origin_, kAppropriateFeatureName)); | 132 EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_ORIGIN, |
| 133 TrialTokenValidator::ValidateToken(kSampleToken, insecure_origin_, |
| 134 kAppropriateFeatureName)); |
132 } | 135 } |
133 | 136 |
134 TEST_F(TrialTokenValidatorTest, ValidateInappropriateFeature) { | 137 TEST_F(TrialTokenValidatorTest, ValidateInappropriateFeature) { |
135 EXPECT_FALSE(TrialTokenValidator::ValidateToken( | 138 EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_FEATURE, |
136 kSampleToken, appropriate_origin_, kInappropriateFeatureName)); | 139 TrialTokenValidator::ValidateToken( |
| 140 kSampleToken, appropriate_origin_, kInappropriateFeatureName)); |
137 } | 141 } |
138 | 142 |
139 TEST_F(TrialTokenValidatorTest, ValidateInvalidSignature) { | 143 TEST_F(TrialTokenValidatorTest, ValidateInvalidSignature) { |
140 EXPECT_FALSE(TrialTokenValidator::ValidateToken( | 144 EXPECT_EQ(TRIAL_TOKEN_STATUS_INVALID_SIGNATURE, |
141 kInvalidSignatureToken, appropriate_origin_, kAppropriateFeatureName)); | 145 TrialTokenValidator::ValidateToken(kInvalidSignatureToken, |
| 146 appropriate_origin_, |
| 147 kAppropriateFeatureName)); |
142 } | 148 } |
143 | 149 |
144 TEST_F(TrialTokenValidatorTest, ValidateUnparsableToken) { | 150 TEST_F(TrialTokenValidatorTest, ValidateUnparsableToken) { |
145 EXPECT_FALSE(TrialTokenValidator::ValidateToken( | 151 EXPECT_EQ(TRIAL_TOKEN_STATUS_MALFORMED, |
146 kUnparsableToken, appropriate_origin_, kAppropriateFeatureName)); | 152 TrialTokenValidator::ValidateToken(kUnparsableToken, |
| 153 appropriate_origin_, |
| 154 kAppropriateFeatureName)); |
147 } | 155 } |
148 | 156 |
149 TEST_F(TrialTokenValidatorTest, ValidateExpiredToken) { | 157 TEST_F(TrialTokenValidatorTest, ValidateExpiredToken) { |
150 EXPECT_FALSE(TrialTokenValidator::ValidateToken( | 158 EXPECT_EQ(TRIAL_TOKEN_STATUS_EXPIRED, |
151 kExpiredToken, appropriate_origin_, kAppropriateFeatureName)); | 159 TrialTokenValidator::ValidateToken( |
| 160 kExpiredToken, appropriate_origin_, kAppropriateFeatureName)); |
152 } | 161 } |
153 | 162 |
154 TEST_F(TrialTokenValidatorTest, ValidateValidTokenWithIncorrectKey) { | 163 TEST_F(TrialTokenValidatorTest, ValidateValidTokenWithIncorrectKey) { |
155 SetPublicKey(kTestPublicKey2); | 164 SetPublicKey(kTestPublicKey2); |
156 EXPECT_FALSE(TrialTokenValidator::ValidateToken( | 165 EXPECT_EQ(TRIAL_TOKEN_STATUS_INVALID_SIGNATURE, |
157 kSampleToken, appropriate_origin_, kAppropriateFeatureName)); | 166 TrialTokenValidator::ValidateToken( |
| 167 kSampleToken, appropriate_origin_, kAppropriateFeatureName)); |
158 } | 168 } |
159 | 169 |
160 } // namespace content | 170 } // namespace content |
OLD | NEW |