| Index: content/common/origin_trials/trial_token_unittest.cc
|
| diff --git a/content/common/origin_trials/trial_token_unittest.cc b/content/common/origin_trials/trial_token_unittest.cc
|
| index ebb5b05a4cf55084d2fccfb2bfe71c1773c3d5be..ef3f3ad040d7f1592c7e1e846d6c33fe2162b571 100644
|
| --- a/content/common/origin_trials/trial_token_unittest.cc
|
| +++ b/content/common/origin_trials/trial_token_unittest.cc
|
| @@ -12,6 +12,7 @@
|
| #include "base/test/simple_test_clock.h"
|
| #include "base/time/time.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| +#include "third_party/WebKit/public/platform/WebOriginTrialTokenStatus.h"
|
| #include "url/gurl.h"
|
|
|
| namespace content {
|
| @@ -153,10 +154,19 @@ class TrialTokenTest : public testing::TestWithParam<const char*> {
|
| arraysize(kTestPublicKey2))) {}
|
|
|
| protected:
|
| - std::unique_ptr<std::string> Extract(const std::string& token_text,
|
| - base::StringPiece public_key) {
|
| - return TrialToken::Extract(token_text, public_key);
|
| + blink::WebOriginTrialTokenStatus Extract(const std::string& token_text,
|
| + base::StringPiece public_key,
|
| + std::string* token_payload) {
|
| + return TrialToken::Extract(token_text, public_key, token_payload);
|
| }
|
| +
|
| + blink::WebOriginTrialTokenStatus ExtractIgnorePayload(
|
| + const std::string& token_text,
|
| + base::StringPiece public_key) {
|
| + std::string token_payload;
|
| + return Extract(token_text, public_key, &token_payload);
|
| + }
|
| +
|
| std::unique_ptr<TrialToken> Parse(const std::string& token_payload) {
|
| return TrialToken::Parse(token_payload);
|
| }
|
| @@ -196,46 +206,49 @@ class TrialTokenTest : public testing::TestWithParam<const char*> {
|
| // Test verification of signature and extraction of token JSON from signed
|
| // token.
|
| TEST_F(TrialTokenTest, ValidateValidSignature) {
|
| - std::unique_ptr<std::string> token_payload =
|
| - Extract(kSampleToken, correct_public_key());
|
| - ASSERT_TRUE(token_payload);
|
| - EXPECT_STREQ(kSampleTokenJSON, token_payload.get()->c_str());
|
| + std::string token_payload;
|
| + blink::WebOriginTrialTokenStatus status =
|
| + Extract(kSampleToken, correct_public_key(), &token_payload);
|
| + ASSERT_EQ(blink::WebOriginTrialTokenStatus::Success, status);
|
| + EXPECT_STREQ(kSampleTokenJSON, token_payload.c_str());
|
| }
|
|
|
| TEST_F(TrialTokenTest, ValidateInvalidSignature) {
|
| - std::unique_ptr<std::string> token_payload =
|
| - Extract(kInvalidSignatureToken, correct_public_key());
|
| - ASSERT_FALSE(token_payload);
|
| + blink::WebOriginTrialTokenStatus status =
|
| + ExtractIgnorePayload(kInvalidSignatureToken, correct_public_key());
|
| + // TODO(chasej): Recreate the invalid token, and change to
|
| + // blink::WebOriginTrialTokenStatus::InvalidSignature
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Malformed, status);
|
| }
|
|
|
| TEST_F(TrialTokenTest, ValidateSignatureWithIncorrectKey) {
|
| - std::unique_ptr<std::string> token_payload =
|
| - Extract(kSampleToken, incorrect_public_key());
|
| - ASSERT_FALSE(token_payload);
|
| + blink::WebOriginTrialTokenStatus status =
|
| + ExtractIgnorePayload(kSampleToken, incorrect_public_key());
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::InvalidSignature, status);
|
| }
|
|
|
| TEST_F(TrialTokenTest, ValidateEmptyToken) {
|
| - std::unique_ptr<std::string> token_payload =
|
| - Extract("", correct_public_key());
|
| - ASSERT_FALSE(token_payload);
|
| + blink::WebOriginTrialTokenStatus status =
|
| + ExtractIgnorePayload("", correct_public_key());
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Malformed, status);
|
| }
|
|
|
| TEST_F(TrialTokenTest, ValidateShortToken) {
|
| - std::unique_ptr<std::string> token_payload =
|
| - Extract(kTruncatedToken, correct_public_key());
|
| - ASSERT_FALSE(token_payload);
|
| + blink::WebOriginTrialTokenStatus status =
|
| + ExtractIgnorePayload(kTruncatedToken, correct_public_key());
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Malformed, status);
|
| }
|
|
|
| TEST_F(TrialTokenTest, ValidateUnsupportedVersion) {
|
| - std::unique_ptr<std::string> token_payload =
|
| - Extract(kIncorrectVersionToken, correct_public_key());
|
| - ASSERT_FALSE(token_payload);
|
| + blink::WebOriginTrialTokenStatus status =
|
| + ExtractIgnorePayload(kIncorrectVersionToken, correct_public_key());
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Malformed, status);
|
| }
|
|
|
| TEST_F(TrialTokenTest, ValidateSignatureWithIncorrectLength) {
|
| - std::unique_ptr<std::string> token_payload =
|
| - Extract(kIncorrectLengthToken, correct_public_key());
|
| - ASSERT_FALSE(token_payload);
|
| + blink::WebOriginTrialTokenStatus status =
|
| + ExtractIgnorePayload(kIncorrectLengthToken, correct_public_key());
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Malformed, status);
|
| }
|
|
|
| // Test parsing of fields from JSON token.
|
| @@ -279,22 +292,54 @@ TEST_F(TrialTokenTest, ValidateValidToken) {
|
| TEST_F(TrialTokenTest, TokenIsValidForFeature) {
|
| std::unique_ptr<TrialToken> token = Parse(kSampleTokenJSON);
|
| ASSERT_TRUE(token);
|
| - EXPECT_TRUE(token->IsValidForFeature(expected_origin_, kExpectedFeatureName,
|
| - valid_timestamp_));
|
| - EXPECT_FALSE(token->IsValidForFeature(
|
| - expected_origin_, base::ToUpperASCII(kExpectedFeatureName),
|
| - valid_timestamp_));
|
| - EXPECT_FALSE(token->IsValidForFeature(
|
| - expected_origin_, base::ToLowerASCII(kExpectedFeatureName),
|
| - valid_timestamp_));
|
| - EXPECT_FALSE(token->IsValidForFeature(invalid_origin_, kExpectedFeatureName,
|
| - valid_timestamp_));
|
| - EXPECT_FALSE(token->IsValidForFeature(insecure_origin_, kExpectedFeatureName,
|
| - valid_timestamp_));
|
| - EXPECT_FALSE(token->IsValidForFeature(expected_origin_, kInvalidFeatureName,
|
| - valid_timestamp_));
|
| - EXPECT_FALSE(token->IsValidForFeature(expected_origin_, kExpectedFeatureName,
|
| - invalid_timestamp_));
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Success,
|
| + token->IsValidForFeature(expected_origin_, kExpectedFeatureName,
|
| + valid_timestamp_));
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::WrongFeature,
|
| + token->IsValidForFeature(expected_origin_,
|
| + base::ToUpperASCII(kExpectedFeatureName),
|
| + valid_timestamp_));
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::WrongFeature,
|
| + token->IsValidForFeature(expected_origin_,
|
| + base::ToLowerASCII(kExpectedFeatureName),
|
| + valid_timestamp_));
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::WrongOrigin,
|
| + token->IsValidForFeature(invalid_origin_, kExpectedFeatureName,
|
| + valid_timestamp_));
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::WrongOrigin,
|
| + token->IsValidForFeature(insecure_origin_, kExpectedFeatureName,
|
| + valid_timestamp_));
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::WrongFeature,
|
| + token->IsValidForFeature(expected_origin_, kInvalidFeatureName,
|
| + valid_timestamp_));
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Expired,
|
| + token->IsValidForFeature(expected_origin_, kExpectedFeatureName,
|
| + invalid_timestamp_));
|
| +}
|
| +
|
| +// Test overall extraction, to ensure output status matches returned token
|
| +TEST_F(TrialTokenTest, ExtractValidToken) {
|
| + blink::WebOriginTrialTokenStatus status;
|
| + std::unique_ptr<TrialToken> token =
|
| + TrialToken::From(kSampleToken, correct_public_key(), &status);
|
| + EXPECT_TRUE(token);
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Success, status);
|
| +}
|
| +
|
| +TEST_F(TrialTokenTest, ExtractInvalidSignature) {
|
| + blink::WebOriginTrialTokenStatus status;
|
| + std::unique_ptr<TrialToken> token =
|
| + TrialToken::From(kSampleToken, incorrect_public_key(), &status);
|
| + EXPECT_FALSE(token);
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::InvalidSignature, status);
|
| +}
|
| +
|
| +TEST_F(TrialTokenTest, ExtractMalformedToken) {
|
| + blink::WebOriginTrialTokenStatus status;
|
| + std::unique_ptr<TrialToken> token =
|
| + TrialToken::From(kIncorrectLengthToken, correct_public_key(), &status);
|
| + EXPECT_FALSE(token);
|
| + EXPECT_EQ(blink::WebOriginTrialTokenStatus::Malformed, status);
|
| }
|
|
|
| } // namespace content
|
|
|