Index: content/common/origin_trials/trial_token_unittest.cc |
diff --git a/content/common/origin_trials/trial_token_unittest.cc b/content/common/origin_trials/trial_token_unittest.cc |
index ebb5b05a4cf55084d2fccfb2bfe71c1773c3d5be..ad3849fbfa5090d76711a92576555e9bb26cb57e 100644 |
--- a/content/common/origin_trials/trial_token_unittest.cc |
+++ b/content/common/origin_trials/trial_token_unittest.cc |
@@ -153,10 +153,18 @@ class TrialTokenTest : public testing::TestWithParam<const char*> { |
arraysize(kTestPublicKey2))) {} |
protected: |
- std::unique_ptr<std::string> Extract(const std::string& token_text, |
- base::StringPiece public_key) { |
- return TrialToken::Extract(token_text, public_key); |
+ TrialTokenStatus Extract(const std::string& token_text, |
+ base::StringPiece public_key, |
+ std::unique_ptr<std::string>& token_payload) { |
+ return TrialToken::Extract(token_text, public_key, token_payload); |
} |
+ |
+ TrialTokenStatus ExtractIgnorePayload(const std::string& token_text, |
+ base::StringPiece public_key) { |
+ std::unique_ptr<std::string> token_payload; |
+ return Extract(token_text, public_key, token_payload); |
+ } |
+ |
std::unique_ptr<TrialToken> Parse(const std::string& token_payload) { |
return TrialToken::Parse(token_payload); |
} |
@@ -196,46 +204,48 @@ class TrialTokenTest : public testing::TestWithParam<const char*> { |
// Test verification of signature and extraction of token JSON from signed |
// token. |
TEST_F(TrialTokenTest, ValidateValidSignature) { |
- std::unique_ptr<std::string> token_payload = |
- Extract(kSampleToken, correct_public_key()); |
- ASSERT_TRUE(token_payload); |
+ std::unique_ptr<std::string> token_payload; |
+ TrialTokenStatus status = |
+ Extract(kSampleToken, correct_public_key(), token_payload); |
+ ASSERT_EQ(TRIAL_TOKEN_STATUS_SUCCESS, status); |
EXPECT_STREQ(kSampleTokenJSON, token_payload.get()->c_str()); |
} |
TEST_F(TrialTokenTest, ValidateInvalidSignature) { |
- std::unique_ptr<std::string> token_payload = |
- Extract(kInvalidSignatureToken, correct_public_key()); |
- ASSERT_FALSE(token_payload); |
+ TrialTokenStatus status = |
+ ExtractIgnorePayload(kInvalidSignatureToken, correct_public_key()); |
+ // TODO(chasej): Recreate the invalid token, and change to |
+ // TRIAL_TOKEN_STATUS_INVALID_SIGNATURE |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_MALFORMED, status); |
} |
TEST_F(TrialTokenTest, ValidateSignatureWithIncorrectKey) { |
- std::unique_ptr<std::string> token_payload = |
- Extract(kSampleToken, incorrect_public_key()); |
- ASSERT_FALSE(token_payload); |
+ TrialTokenStatus status = |
+ ExtractIgnorePayload(kSampleToken, incorrect_public_key()); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_INVALID_SIGNATURE, status); |
} |
TEST_F(TrialTokenTest, ValidateEmptyToken) { |
- std::unique_ptr<std::string> token_payload = |
- Extract("", correct_public_key()); |
- ASSERT_FALSE(token_payload); |
+ TrialTokenStatus status = ExtractIgnorePayload("", correct_public_key()); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_MALFORMED, status); |
} |
TEST_F(TrialTokenTest, ValidateShortToken) { |
- std::unique_ptr<std::string> token_payload = |
- Extract(kTruncatedToken, correct_public_key()); |
- ASSERT_FALSE(token_payload); |
+ TrialTokenStatus status = |
+ ExtractIgnorePayload(kTruncatedToken, correct_public_key()); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_MALFORMED, status); |
} |
TEST_F(TrialTokenTest, ValidateUnsupportedVersion) { |
- std::unique_ptr<std::string> token_payload = |
- Extract(kIncorrectVersionToken, correct_public_key()); |
- ASSERT_FALSE(token_payload); |
+ TrialTokenStatus status = |
+ ExtractIgnorePayload(kIncorrectVersionToken, correct_public_key()); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_MALFORMED, status); |
} |
TEST_F(TrialTokenTest, ValidateSignatureWithIncorrectLength) { |
- std::unique_ptr<std::string> token_payload = |
- Extract(kIncorrectLengthToken, correct_public_key()); |
- ASSERT_FALSE(token_payload); |
+ TrialTokenStatus status = |
+ ExtractIgnorePayload(kIncorrectLengthToken, correct_public_key()); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_MALFORMED, status); |
} |
// Test parsing of fields from JSON token. |
@@ -279,22 +289,29 @@ TEST_F(TrialTokenTest, ValidateValidToken) { |
TEST_F(TrialTokenTest, TokenIsValidForFeature) { |
std::unique_ptr<TrialToken> token = Parse(kSampleTokenJSON); |
ASSERT_TRUE(token); |
- EXPECT_TRUE(token->IsValidForFeature(expected_origin_, kExpectedFeatureName, |
- valid_timestamp_)); |
- EXPECT_FALSE(token->IsValidForFeature( |
- expected_origin_, base::ToUpperASCII(kExpectedFeatureName), |
- valid_timestamp_)); |
- EXPECT_FALSE(token->IsValidForFeature( |
- expected_origin_, base::ToLowerASCII(kExpectedFeatureName), |
- valid_timestamp_)); |
- EXPECT_FALSE(token->IsValidForFeature(invalid_origin_, kExpectedFeatureName, |
- valid_timestamp_)); |
- EXPECT_FALSE(token->IsValidForFeature(insecure_origin_, kExpectedFeatureName, |
- valid_timestamp_)); |
- EXPECT_FALSE(token->IsValidForFeature(expected_origin_, kInvalidFeatureName, |
- valid_timestamp_)); |
- EXPECT_FALSE(token->IsValidForFeature(expected_origin_, kExpectedFeatureName, |
- invalid_timestamp_)); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_SUCCESS, |
+ token->IsValidForFeature(expected_origin_, kExpectedFeatureName, |
+ valid_timestamp_)); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_FEATURE, |
+ token->IsValidForFeature(expected_origin_, |
+ base::ToUpperASCII(kExpectedFeatureName), |
+ valid_timestamp_)); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_FEATURE, |
+ token->IsValidForFeature(expected_origin_, |
+ base::ToLowerASCII(kExpectedFeatureName), |
+ valid_timestamp_)); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_ORIGIN, |
+ token->IsValidForFeature(invalid_origin_, kExpectedFeatureName, |
+ valid_timestamp_)); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_ORIGIN, |
+ token->IsValidForFeature(insecure_origin_, kExpectedFeatureName, |
+ valid_timestamp_)); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_WRONG_FEATURE, |
+ token->IsValidForFeature(expected_origin_, kInvalidFeatureName, |
+ valid_timestamp_)); |
+ EXPECT_EQ(TRIAL_TOKEN_STATUS_EXPIRED, |
+ token->IsValidForFeature(expected_origin_, kExpectedFeatureName, |
+ invalid_timestamp_)); |
} |
} // namespace content |