| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/bind.h" | 5 #include "base/bind.h" |
| 6 #include "base/memory/scoped_ptr.h" | 6 #include "base/memory/scoped_ptr.h" |
| 7 #include "base/strings/stringprintf.h" | 7 #include "base/strings/stringprintf.h" |
| 8 #include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h" | 8 #include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h" |
| 9 #include "chrome/browser/signin/fake_profile_oauth2_token_service.h" |
| 9 #include "chrome/browser/signin/oauth2_token_service.h" | 10 #include "chrome/browser/signin/oauth2_token_service.h" |
| 10 #include "chrome/test/base/testing_profile.h" | 11 #include "chrome/test/base/testing_profile.h" |
| 11 #include "content/public/test/test_browser_thread_bundle.h" | 12 #include "content/public/test/test_browser_thread_bundle.h" |
| 12 #include "google_apis/gaia/gaia_oauth_client.h" | 13 #include "google_apis/gaia/gaia_oauth_client.h" |
| 13 #include "google_apis/gaia/gaia_urls.h" | 14 #include "google_apis/gaia/gaia_urls.h" |
| 14 #include "google_apis/gaia/google_service_auth_error.h" | 15 #include "google_apis/gaia/google_service_auth_error.h" |
| 15 #include "net/base/net_errors.h" | 16 #include "net/base/net_errors.h" |
| 16 #include "net/base/url_util.h" | 17 #include "net/base/url_util.h" |
| 17 #include "net/http/http_request_headers.h" | 18 #include "net/http/http_request_headers.h" |
| 18 #include "net/http/http_status_code.h" | 19 #include "net/http/http_status_code.h" |
| 19 #include "net/url_request/test_url_fetcher_factory.h" | 20 #include "net/url_request/test_url_fetcher_factory.h" |
| 20 #include "net/url_request/url_fetcher_delegate.h" | 21 #include "net/url_request/url_fetcher_delegate.h" |
| 21 #include "testing/gtest/include/gtest/gtest.h" | 22 #include "testing/gtest/include/gtest/gtest.h" |
| 22 | 23 |
| 23 namespace { | 24 namespace { |
| 24 | 25 |
| 25 const char kManagedUserId[] = "abcdef"; | 26 const char kManagedUserId[] = "abcdef"; |
| 26 const char kDeviceName[] = "Compy"; | 27 const char kDeviceName[] = "Compy"; |
| 27 | 28 |
| 28 const char kAccessToken[] = "accesstoken"; | 29 const char kAccessToken[] = "accesstoken"; |
| 29 const char kAuthorizationCode[] = "authorizationcode"; | 30 const char kAuthorizationCode[] = "authorizationcode"; |
| 30 const char kManagedUserToken[] = "managedusertoken"; | 31 const char kManagedUserToken[] = "managedusertoken"; |
| 32 const char kOAuth2RefreshToken[] = "refreshtoken"; |
| 31 | 33 |
| 32 const char kIssueTokenResponseFormat[] = | 34 const char kIssueTokenResponseFormat[] = |
| 33 "{" | 35 "{" |
| 34 " \"code\": \"%s\"" | 36 " \"code\": \"%s\"" |
| 35 "}"; | 37 "}"; |
| 36 | 38 |
| 37 const char kGetRefreshTokenResponseFormat[] = | 39 const char kGetRefreshTokenResponseFormat[] = |
| 38 "{" | 40 "{" |
| 39 " \"access_token\": \"<ignored>\"," | 41 " \"access_token\": \"<ignored>\"," |
| 40 " \"expires_in\": 12345," | 42 " \"expires_in\": 12345," |
| 41 " \"refresh_token\": \"%s\"" | 43 " \"refresh_token\": \"%s\"" |
| 42 "}"; | 44 "}"; |
| 43 | 45 |
| 44 // MockOAuth2TokenService --------------------------------------------- | |
| 45 | |
| 46 class MockOAuth2TokenService : public OAuth2TokenService { | |
| 47 public: | |
| 48 class Request : public OAuth2TokenService::Request { | |
| 49 public: | |
| 50 Request(const OAuth2TokenService::ScopeSet& scopes, | |
| 51 OAuth2TokenService::Consumer* consumer, | |
| 52 MockOAuth2TokenService* owner); | |
| 53 virtual ~Request(); | |
| 54 | |
| 55 void Succeed(); | |
| 56 void Fail(GoogleServiceAuthError::State error); | |
| 57 | |
| 58 const OAuth2TokenService::ScopeSet& scopes() const { return scopes_; } | |
| 59 | |
| 60 private: | |
| 61 OAuth2TokenService::ScopeSet scopes_; | |
| 62 | |
| 63 OAuth2TokenService::Consumer* consumer_; | |
| 64 | |
| 65 MockOAuth2TokenService* owner_; | |
| 66 }; | |
| 67 | |
| 68 MockOAuth2TokenService(); | |
| 69 virtual ~MockOAuth2TokenService(); | |
| 70 | |
| 71 Request* request() const { return request_; } | |
| 72 | |
| 73 void ClearRequest(Request* request); | |
| 74 | |
| 75 private: | |
| 76 // OAuth2TokenService overrides: | |
| 77 virtual scoped_ptr<OAuth2TokenService::Request> StartRequest( | |
| 78 const OAuth2TokenService::ScopeSet& scopes, | |
| 79 OAuth2TokenService::Consumer* consumer) OVERRIDE; | |
| 80 virtual std::string GetRefreshToken() OVERRIDE; | |
| 81 virtual net::URLRequestContextGetter* GetRequestContext() OVERRIDE { | |
| 82 return NULL; | |
| 83 } | |
| 84 | |
| 85 Request* request_; | |
| 86 | |
| 87 DISALLOW_COPY_AND_ASSIGN(MockOAuth2TokenService); | |
| 88 }; | |
| 89 | |
| 90 MockOAuth2TokenService::Request::Request( | |
| 91 const OAuth2TokenService::ScopeSet& scopes, | |
| 92 OAuth2TokenService::Consumer* consumer, | |
| 93 MockOAuth2TokenService* owner) | |
| 94 : scopes_(scopes), | |
| 95 consumer_(consumer), | |
| 96 owner_(owner) {} | |
| 97 | |
| 98 MockOAuth2TokenService::Request::~Request() { | |
| 99 owner_->ClearRequest(this); | |
| 100 } | |
| 101 | |
| 102 void MockOAuth2TokenService::Request::Succeed() { | |
| 103 base::Time expiration_date = base::Time::Now() + | |
| 104 base::TimeDelta::FromHours(1); | |
| 105 consumer_->OnGetTokenSuccess(this, kAccessToken, expiration_date); | |
| 106 } | |
| 107 | |
| 108 void MockOAuth2TokenService::Request::Fail( | |
| 109 GoogleServiceAuthError::State error) { | |
| 110 consumer_->OnGetTokenFailure(this, GoogleServiceAuthError(error)); | |
| 111 } | |
| 112 | |
| 113 MockOAuth2TokenService::MockOAuth2TokenService() : request_(NULL) {} | |
| 114 | |
| 115 MockOAuth2TokenService::~MockOAuth2TokenService() { | |
| 116 EXPECT_FALSE(request_); | |
| 117 } | |
| 118 | |
| 119 void MockOAuth2TokenService::ClearRequest( | |
| 120 MockOAuth2TokenService::Request* request) { | |
| 121 if (request_ == request) | |
| 122 request_ = NULL; | |
| 123 } | |
| 124 | |
| 125 scoped_ptr<OAuth2TokenService::Request> MockOAuth2TokenService::StartRequest( | |
| 126 const OAuth2TokenService::ScopeSet& scopes, | |
| 127 OAuth2TokenService::Consumer* consumer) { | |
| 128 scoped_ptr<Request> request(new Request(scopes, consumer, this)); | |
| 129 request_ = request.get(); | |
| 130 return request.PassAs<OAuth2TokenService::Request>(); | |
| 131 } | |
| 132 | |
| 133 std::string MockOAuth2TokenService::GetRefreshToken() { | |
| 134 NOTREACHED(); | |
| 135 return std::string(); | |
| 136 } | |
| 137 | |
| 138 // Utility methods -------------------------------------------------- | 46 // Utility methods -------------------------------------------------- |
| 139 | 47 |
| 140 // Slightly hacky way to extract a value from a URL-encoded POST request body. | 48 // Slightly hacky way to extract a value from a URL-encoded POST request body. |
| 141 bool GetValueForKey(const std::string& encoded_string, | 49 bool GetValueForKey(const std::string& encoded_string, |
| 142 const std::string& key, | 50 const std::string& key, |
| 143 std::string* value) { | 51 std::string* value) { |
| 144 GURL url("http://example.com/?" + encoded_string); | 52 GURL url("http://example.com/?" + encoded_string); |
| 145 return net::GetValueForKeyInQuery(url, key, value); | 53 return net::GetValueForKeyInQuery(url, key, value); |
| 146 } | 54 } |
| 147 | 55 |
| (...skipping 11 matching lines...) Expand all Loading... |
| 159 net::URLRequestStatus(net::URLRequestStatus::FAILED, error)); | 67 net::URLRequestStatus(net::URLRequestStatus::FAILED, error)); |
| 160 url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); | 68 url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| 161 } | 69 } |
| 162 | 70 |
| 163 void SetHttpError(net::TestURLFetcher* url_fetcher, int error) { | 71 void SetHttpError(net::TestURLFetcher* url_fetcher, int error) { |
| 164 url_fetcher->set_status(net::URLRequestStatus()); | 72 url_fetcher->set_status(net::URLRequestStatus()); |
| 165 url_fetcher->set_response_code(error); | 73 url_fetcher->set_response_code(error); |
| 166 url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); | 74 url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| 167 } | 75 } |
| 168 | 76 |
| 77 void VerifyTokenRequest( |
| 78 std::vector<FakeProfileOAuth2TokenService::PendingRequest> requests) { |
| 79 ASSERT_EQ(1u, requests.size()); |
| 80 EXPECT_EQ(1u, requests[0].scopes.size()); |
| 81 EXPECT_EQ(1u, requests[0].scopes.count( |
| 82 GaiaUrls::GetInstance()->oauth1_login_scope())); |
| 83 } |
| 84 |
| 169 } // namespace | 85 } // namespace |
| 170 | 86 |
| 171 class ManagedUserRefreshTokenFetcherTest : public testing::Test { | 87 class ManagedUserRefreshTokenFetcherTest : public testing::Test { |
| 172 public: | 88 public: |
| 173 ManagedUserRefreshTokenFetcherTest(); | 89 ManagedUserRefreshTokenFetcherTest(); |
| 174 virtual ~ManagedUserRefreshTokenFetcherTest() {} | 90 virtual ~ManagedUserRefreshTokenFetcherTest() {} |
| 175 | 91 |
| 176 protected: | 92 protected: |
| 177 void StartFetching(); | 93 void StartFetching(); |
| 178 | 94 |
| 179 MockOAuth2TokenService::Request* GetOAuth2TokenServiceRequest(); | |
| 180 net::TestURLFetcher* GetIssueTokenRequest(); | 95 net::TestURLFetcher* GetIssueTokenRequest(); |
| 181 net::TestURLFetcher* GetRefreshTokenRequest(); | 96 net::TestURLFetcher* GetRefreshTokenRequest(); |
| 182 | 97 |
| 98 void MakeOAuth2TokenServiceRequestSucceed(); |
| 99 void MakeOAuth2TokenServiceRequestFail(GoogleServiceAuthError::State error); |
| 183 void MakeIssueTokenRequestSucceed(); | 100 void MakeIssueTokenRequestSucceed(); |
| 184 void MakeRefreshTokenFetchSucceed(); | 101 void MakeRefreshTokenFetchSucceed(); |
| 185 | 102 |
| 186 void Reset(); | 103 void Reset(); |
| 187 | 104 |
| 188 const GoogleServiceAuthError& error() const { return error_; } | 105 const GoogleServiceAuthError& error() const { return error_; } |
| 189 const std::string& token() const { return token_; } | 106 const std::string& token() const { return token_; } |
| 190 | 107 |
| 191 private: | 108 private: |
| 192 void OnTokenFetched(const GoogleServiceAuthError& error, | 109 void OnTokenFetched(const GoogleServiceAuthError& error, |
| 193 const std::string& token); | 110 const std::string& token); |
| 194 | 111 |
| 195 content::TestBrowserThreadBundle thread_bundle_; | 112 content::TestBrowserThreadBundle thread_bundle_; |
| 196 TestingProfile profile_; | 113 TestingProfile profile_; |
| 197 MockOAuth2TokenService oauth2_token_service_; | 114 FakeProfileOAuth2TokenService oauth2_token_service_; |
| 198 net::TestURLFetcherFactory url_fetcher_factory_; | 115 net::TestURLFetcherFactory url_fetcher_factory_; |
| 199 scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_; | 116 scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_; |
| 200 | 117 |
| 201 GoogleServiceAuthError error_; | 118 GoogleServiceAuthError error_; |
| 202 std::string token_; | 119 std::string token_; |
| 203 base::WeakPtrFactory<ManagedUserRefreshTokenFetcherTest> weak_ptr_factory_; | 120 base::WeakPtrFactory<ManagedUserRefreshTokenFetcherTest> weak_ptr_factory_; |
| 204 }; | 121 }; |
| 205 | 122 |
| 206 ManagedUserRefreshTokenFetcherTest::ManagedUserRefreshTokenFetcherTest() | 123 ManagedUserRefreshTokenFetcherTest::ManagedUserRefreshTokenFetcherTest() |
| 207 : token_fetcher_( | 124 : token_fetcher_( |
| 208 ManagedUserRefreshTokenFetcher::Create(&oauth2_token_service_, | 125 ManagedUserRefreshTokenFetcher::Create(&oauth2_token_service_, |
| 209 profile_.GetRequestContext())), | 126 profile_.GetRequestContext())), |
| 210 error_(GoogleServiceAuthError::NONE), | 127 error_(GoogleServiceAuthError::NONE), |
| 211 weak_ptr_factory_(this) {} | 128 weak_ptr_factory_(this) {} |
| 212 | 129 |
| 213 void ManagedUserRefreshTokenFetcherTest::StartFetching() { | 130 void ManagedUserRefreshTokenFetcherTest::StartFetching() { |
| 131 oauth2_token_service_.IssueRefreshToken(kOAuth2RefreshToken); |
| 214 token_fetcher_->Start(kManagedUserId, kDeviceName, | 132 token_fetcher_->Start(kManagedUserId, kDeviceName, |
| 215 base::Bind( | 133 base::Bind( |
| 216 &ManagedUserRefreshTokenFetcherTest::OnTokenFetched, | 134 &ManagedUserRefreshTokenFetcherTest::OnTokenFetched, |
| 217 weak_ptr_factory_.GetWeakPtr())); | 135 weak_ptr_factory_.GetWeakPtr())); |
| 218 } | 136 } |
| 219 | 137 |
| 220 MockOAuth2TokenService::Request* | |
| 221 ManagedUserRefreshTokenFetcherTest::GetOAuth2TokenServiceRequest() { | |
| 222 MockOAuth2TokenService::Request* request = oauth2_token_service_.request(); | |
| 223 | |
| 224 OAuth2TokenService::ScopeSet scopes = request->scopes(); | |
| 225 EXPECT_EQ(1u, scopes.size()); | |
| 226 EXPECT_EQ(1u, scopes.count(GaiaUrls::GetInstance()->oauth1_login_scope())); | |
| 227 return request; | |
| 228 } | |
| 229 | |
| 230 net::TestURLFetcher* | 138 net::TestURLFetcher* |
| 231 ManagedUserRefreshTokenFetcherTest::GetIssueTokenRequest() { | 139 ManagedUserRefreshTokenFetcherTest::GetIssueTokenRequest() { |
| 232 net::TestURLFetcher* url_fetcher = url_fetcher_factory_.GetFetcherByID(1); | 140 net::TestURLFetcher* url_fetcher = url_fetcher_factory_.GetFetcherByID(1); |
| 233 if (!url_fetcher) | 141 if (!url_fetcher) |
| 234 return NULL; | 142 return NULL; |
| 235 | 143 |
| 236 EXPECT_EQ(GaiaUrls::GetInstance()->oauth2_issue_token_url(), | 144 EXPECT_EQ(GaiaUrls::GetInstance()->oauth2_issue_token_url(), |
| 237 url_fetcher->GetOriginalURL().spec()); | 145 url_fetcher->GetOriginalURL().spec()); |
| 238 std::string access_token; | 146 std::string access_token; |
| 239 net::HttpRequestHeaders headers; | 147 net::HttpRequestHeaders headers; |
| (...skipping 18 matching lines...) Expand all Loading... |
| 258 return NULL; | 166 return NULL; |
| 259 | 167 |
| 260 EXPECT_EQ(GaiaUrls::GetInstance()->oauth2_token_url(), | 168 EXPECT_EQ(GaiaUrls::GetInstance()->oauth2_token_url(), |
| 261 url_fetcher->GetOriginalURL().spec()); | 169 url_fetcher->GetOriginalURL().spec()); |
| 262 std::string auth_code; | 170 std::string auth_code; |
| 263 EXPECT_TRUE(GetValueForKey(url_fetcher->upload_data(), "code", &auth_code)); | 171 EXPECT_TRUE(GetValueForKey(url_fetcher->upload_data(), "code", &auth_code)); |
| 264 EXPECT_EQ(kAuthorizationCode, auth_code); | 172 EXPECT_EQ(kAuthorizationCode, auth_code); |
| 265 return url_fetcher; | 173 return url_fetcher; |
| 266 } | 174 } |
| 267 | 175 |
| 176 void |
| 177 ManagedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestSucceed() { |
| 178 std::vector<FakeProfileOAuth2TokenService::PendingRequest> requests = |
| 179 oauth2_token_service_.GetPendingRequests(); |
| 180 VerifyTokenRequest(requests); |
| 181 base::Time expiration_date = base::Time::Now() + |
| 182 base::TimeDelta::FromHours(1); |
| 183 oauth2_token_service_.IssueTokenForScope(requests[0].scopes, |
| 184 kAccessToken, |
| 185 expiration_date); |
| 186 } |
| 187 |
| 188 void |
| 189 ManagedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestFail( |
| 190 GoogleServiceAuthError::State error) { |
| 191 std::vector<FakeProfileOAuth2TokenService::PendingRequest> requests = |
| 192 oauth2_token_service_.GetPendingRequests(); |
| 193 VerifyTokenRequest(requests); |
| 194 oauth2_token_service_.IssueErrorForScope(requests[0].scopes, |
| 195 GoogleServiceAuthError(error)); |
| 196 } |
| 197 |
| 268 void ManagedUserRefreshTokenFetcherTest::MakeIssueTokenRequestSucceed() { | 198 void ManagedUserRefreshTokenFetcherTest::MakeIssueTokenRequestSucceed() { |
| 269 SendResponse(GetIssueTokenRequest(), | 199 SendResponse(GetIssueTokenRequest(), |
| 270 base::StringPrintf(kIssueTokenResponseFormat, | 200 base::StringPrintf(kIssueTokenResponseFormat, |
| 271 kAuthorizationCode)); | 201 kAuthorizationCode)); |
| 272 } | 202 } |
| 273 | 203 |
| 274 void ManagedUserRefreshTokenFetcherTest::MakeRefreshTokenFetchSucceed() { | 204 void ManagedUserRefreshTokenFetcherTest::MakeRefreshTokenFetchSucceed() { |
| 275 SendResponse(GetRefreshTokenRequest(), | 205 SendResponse(GetRefreshTokenRequest(), |
| 276 base::StringPrintf(kGetRefreshTokenResponseFormat, | 206 base::StringPrintf(kGetRefreshTokenResponseFormat, |
| 277 kManagedUserToken)); | 207 kManagedUserToken)); |
| 278 } | 208 } |
| 279 | 209 |
| 280 void ManagedUserRefreshTokenFetcherTest::Reset() { | 210 void ManagedUserRefreshTokenFetcherTest::Reset() { |
| 281 token_fetcher_.reset(); | 211 token_fetcher_.reset(); |
| 282 } | 212 } |
| 283 | 213 |
| 284 void ManagedUserRefreshTokenFetcherTest::OnTokenFetched( | 214 void ManagedUserRefreshTokenFetcherTest::OnTokenFetched( |
| 285 const GoogleServiceAuthError& error, | 215 const GoogleServiceAuthError& error, |
| 286 const std::string& token) { | 216 const std::string& token) { |
| 287 error_ = error; | 217 error_ = error; |
| 288 token_ = token; | 218 token_ = token; |
| 289 } | 219 } |
| 290 | 220 |
| 291 // Tests -------------------------------------------------------- | 221 // Tests -------------------------------------------------------- |
| 292 | 222 |
| 293 TEST_F(ManagedUserRefreshTokenFetcherTest, Success) { | 223 TEST_F(ManagedUserRefreshTokenFetcherTest, Success) { |
| 294 StartFetching(); | 224 StartFetching(); |
| 295 GetOAuth2TokenServiceRequest()->Succeed(); | 225 MakeOAuth2TokenServiceRequestSucceed(); |
| 296 MakeIssueTokenRequestSucceed(); | 226 MakeIssueTokenRequestSucceed(); |
| 297 MakeRefreshTokenFetchSucceed(); | 227 MakeRefreshTokenFetchSucceed(); |
| 298 | 228 |
| 299 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 229 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 300 EXPECT_EQ(kManagedUserToken, token()); | 230 EXPECT_EQ(kManagedUserToken, token()); |
| 301 } | 231 } |
| 302 | 232 |
| 303 TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessToken) { | 233 TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessToken) { |
| 304 StartFetching(); | 234 StartFetching(); |
| 305 GetOAuth2TokenServiceRequest()->Succeed(); | 235 MakeOAuth2TokenServiceRequestSucceed(); |
| 306 SetHttpError(GetIssueTokenRequest(), net::HTTP_UNAUTHORIZED); | 236 SetHttpError(GetIssueTokenRequest(), net::HTTP_UNAUTHORIZED); |
| 307 GetOAuth2TokenServiceRequest()->Succeed(); | 237 MakeOAuth2TokenServiceRequestSucceed(); |
| 308 MakeIssueTokenRequestSucceed(); | 238 MakeIssueTokenRequestSucceed(); |
| 309 MakeRefreshTokenFetchSucceed(); | 239 MakeRefreshTokenFetchSucceed(); |
| 310 | 240 |
| 311 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 241 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 312 EXPECT_EQ(kManagedUserToken, token()); | 242 EXPECT_EQ(kManagedUserToken, token()); |
| 313 } | 243 } |
| 314 | 244 |
| 315 TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessTokenRetry) { | 245 TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessTokenRetry) { |
| 316 // If we get a 401 error for the second time, we should give up instead of | 246 // If we get a 401 error for the second time, we should give up instead of |
| 317 // retrying again. | 247 // retrying again. |
| 318 StartFetching(); | 248 StartFetching(); |
| 319 GetOAuth2TokenServiceRequest()->Succeed(); | 249 MakeOAuth2TokenServiceRequestSucceed(); |
| 320 SetHttpError(GetIssueTokenRequest(), net::HTTP_UNAUTHORIZED); | 250 SetHttpError(GetIssueTokenRequest(), net::HTTP_UNAUTHORIZED); |
| 321 GetOAuth2TokenServiceRequest()->Succeed(); | 251 MakeOAuth2TokenServiceRequestSucceed(); |
| 322 SetHttpError(GetIssueTokenRequest(), net::HTTP_UNAUTHORIZED); | 252 SetHttpError(GetIssueTokenRequest(), net::HTTP_UNAUTHORIZED); |
| 323 | 253 |
| 324 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); | 254 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); |
| 325 EXPECT_EQ(net::ERR_FAILED, error().network_error()); | 255 EXPECT_EQ(net::ERR_FAILED, error().network_error()); |
| 326 EXPECT_EQ(std::string(), token()); | 256 EXPECT_EQ(std::string(), token()); |
| 327 } | 257 } |
| 328 | 258 |
| 329 TEST_F(ManagedUserRefreshTokenFetcherTest, MalformedIssueTokenResponse) { | 259 TEST_F(ManagedUserRefreshTokenFetcherTest, MalformedIssueTokenResponse) { |
| 330 StartFetching(); | 260 StartFetching(); |
| 331 GetOAuth2TokenServiceRequest()->Succeed(); | 261 MakeOAuth2TokenServiceRequestSucceed(); |
| 332 SendResponse(GetIssueTokenRequest(), "choke"); | 262 SendResponse(GetIssueTokenRequest(), "choke"); |
| 333 | 263 |
| 334 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); | 264 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); |
| 335 EXPECT_EQ(net::ERR_INVALID_RESPONSE, error().network_error()); | 265 EXPECT_EQ(net::ERR_INVALID_RESPONSE, error().network_error()); |
| 336 EXPECT_EQ(std::string(), token()); | 266 EXPECT_EQ(std::string(), token()); |
| 337 } | 267 } |
| 338 | 268 |
| 339 TEST_F(ManagedUserRefreshTokenFetcherTest, FetchAccessTokenFailure) { | 269 TEST_F(ManagedUserRefreshTokenFetcherTest, FetchAccessTokenFailure) { |
| 340 StartFetching(); | 270 StartFetching(); |
| 341 GetOAuth2TokenServiceRequest()->Fail( | 271 MakeOAuth2TokenServiceRequestFail( |
| 342 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS); | 272 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS); |
| 343 | 273 |
| 344 EXPECT_EQ(GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS, error().state()); | 274 EXPECT_EQ(GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS, error().state()); |
| 345 EXPECT_EQ(std::string(), token()); | 275 EXPECT_EQ(std::string(), token()); |
| 346 } | 276 } |
| 347 | 277 |
| 348 TEST_F(ManagedUserRefreshTokenFetcherTest, IssueTokenNetworkError) { | 278 TEST_F(ManagedUserRefreshTokenFetcherTest, IssueTokenNetworkError) { |
| 349 StartFetching(); | 279 StartFetching(); |
| 350 GetOAuth2TokenServiceRequest()->Succeed(); | 280 MakeOAuth2TokenServiceRequestSucceed(); |
| 351 SetNetworkError(GetIssueTokenRequest(), net::ERR_SSL_PROTOCOL_ERROR); | 281 SetNetworkError(GetIssueTokenRequest(), net::ERR_SSL_PROTOCOL_ERROR); |
| 352 | 282 |
| 353 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); | 283 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); |
| 354 EXPECT_EQ(net::ERR_SSL_PROTOCOL_ERROR, error().network_error()); | 284 EXPECT_EQ(net::ERR_SSL_PROTOCOL_ERROR, error().network_error()); |
| 355 EXPECT_EQ(std::string(), token()); | 285 EXPECT_EQ(std::string(), token()); |
| 356 } | 286 } |
| 357 | 287 |
| 358 TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenNetworkError) { | 288 TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenNetworkError) { |
| 359 StartFetching(); | 289 StartFetching(); |
| 360 GetOAuth2TokenServiceRequest()->Succeed(); | 290 MakeOAuth2TokenServiceRequestSucceed(); |
| 361 MakeIssueTokenRequestSucceed(); | 291 MakeIssueTokenRequestSucceed(); |
| 362 SetNetworkError(GetRefreshTokenRequest(), net::ERR_CONNECTION_REFUSED); | 292 SetNetworkError(GetRefreshTokenRequest(), net::ERR_CONNECTION_REFUSED); |
| 363 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 293 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 364 SetNetworkError(GetRefreshTokenRequest(), net::ERR_CONNECTION_REFUSED); | 294 SetNetworkError(GetRefreshTokenRequest(), net::ERR_CONNECTION_REFUSED); |
| 365 | 295 |
| 366 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); | 296 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); |
| 367 EXPECT_EQ(net::ERR_FAILED, error().network_error()); | 297 EXPECT_EQ(net::ERR_FAILED, error().network_error()); |
| 368 EXPECT_EQ(std::string(), token()); | 298 EXPECT_EQ(std::string(), token()); |
| 369 } | 299 } |
| 370 | 300 |
| 371 TEST_F(ManagedUserRefreshTokenFetcherTest, | 301 TEST_F(ManagedUserRefreshTokenFetcherTest, |
| 372 FetchRefreshTokenTransientNetworkError) { | 302 FetchRefreshTokenTransientNetworkError) { |
| 373 StartFetching(); | 303 StartFetching(); |
| 374 GetOAuth2TokenServiceRequest()->Succeed(); | 304 MakeOAuth2TokenServiceRequestSucceed(); |
| 375 MakeIssueTokenRequestSucceed(); | 305 MakeIssueTokenRequestSucceed(); |
| 376 SetNetworkError(GetRefreshTokenRequest(), net::ERR_CONNECTION_REFUSED); | 306 SetNetworkError(GetRefreshTokenRequest(), net::ERR_CONNECTION_REFUSED); |
| 377 | 307 |
| 378 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 308 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 379 MakeRefreshTokenFetchSucceed(); | 309 MakeRefreshTokenFetchSucceed(); |
| 380 | 310 |
| 381 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 311 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 382 EXPECT_EQ(kManagedUserToken, token()); | 312 EXPECT_EQ(kManagedUserToken, token()); |
| 383 } | 313 } |
| 384 | 314 |
| 385 TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenBadRequest) { | 315 TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenBadRequest) { |
| 386 StartFetching(); | 316 StartFetching(); |
| 387 GetOAuth2TokenServiceRequest()->Succeed(); | 317 MakeOAuth2TokenServiceRequestSucceed(); |
| 388 MakeIssueTokenRequestSucceed(); | 318 MakeIssueTokenRequestSucceed(); |
| 389 SetHttpError(GetRefreshTokenRequest(), net::HTTP_BAD_REQUEST); | 319 SetHttpError(GetRefreshTokenRequest(), net::HTTP_BAD_REQUEST); |
| 390 | 320 |
| 391 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); | 321 EXPECT_EQ(GoogleServiceAuthError::CONNECTION_FAILED, error().state()); |
| 392 EXPECT_EQ(net::ERR_FAILED, error().network_error()); | 322 EXPECT_EQ(net::ERR_FAILED, error().network_error()); |
| 393 EXPECT_EQ(std::string(), token()); | 323 EXPECT_EQ(std::string(), token()); |
| 394 } | 324 } |
| 395 | 325 |
| 396 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingAccessToken) { | 326 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingAccessToken) { |
| 397 StartFetching(); | 327 StartFetching(); |
| 398 Reset(); | 328 Reset(); |
| 399 | 329 |
| 400 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 330 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 401 EXPECT_EQ(std::string(), token()); | 331 EXPECT_EQ(std::string(), token()); |
| 402 } | 332 } |
| 403 | 333 |
| 404 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileCallingIssueToken) { | 334 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileCallingIssueToken) { |
| 405 StartFetching(); | 335 StartFetching(); |
| 406 GetOAuth2TokenServiceRequest()->Succeed(); | 336 MakeOAuth2TokenServiceRequestSucceed(); |
| 407 Reset(); | 337 Reset(); |
| 408 | 338 |
| 409 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 339 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 410 EXPECT_EQ(std::string(), token()); | 340 EXPECT_EQ(std::string(), token()); |
| 411 } | 341 } |
| 412 | 342 |
| 413 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) { | 343 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) { |
| 414 StartFetching(); | 344 StartFetching(); |
| 415 GetOAuth2TokenServiceRequest()->Succeed(); | 345 MakeOAuth2TokenServiceRequestSucceed(); |
| 416 MakeIssueTokenRequestSucceed(); | 346 MakeIssueTokenRequestSucceed(); |
| 417 Reset(); | 347 Reset(); |
| 418 | 348 |
| 419 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 349 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
| 420 EXPECT_EQ(std::string(), token()); | 350 EXPECT_EQ(std::string(), token()); |
| 421 } | 351 } |
| OLD | NEW |