OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/policy/cloud_external_data_store.h" | 5 #include "chrome/browser/chromeos/policy/cloud_external_data_store.h" |
6 | 6 |
7 #include <stddef.h> | 7 #include <stddef.h> |
8 | 8 |
9 #include <memory> | 9 #include <memory> |
10 | 10 |
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
50 }; | 50 }; |
51 | 51 |
52 CouldExternalDataStoreTest::CouldExternalDataStoreTest() | 52 CouldExternalDataStoreTest::CouldExternalDataStoreTest() |
53 : kData1Hash(crypto::SHA256HashString(kData1)), | 53 : kData1Hash(crypto::SHA256HashString(kData1)), |
54 kData2Hash(crypto::SHA256HashString(kData2)), | 54 kData2Hash(crypto::SHA256HashString(kData2)), |
55 task_runner_(new base::TestSimpleTaskRunner) { | 55 task_runner_(new base::TestSimpleTaskRunner) { |
56 } | 56 } |
57 | 57 |
58 void CouldExternalDataStoreTest::SetUp() { | 58 void CouldExternalDataStoreTest::SetUp() { |
59 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); | 59 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); |
60 resource_cache_.reset(new ResourceCache(temp_dir_.path(), task_runner_)); | 60 resource_cache_.reset(new ResourceCache(temp_dir_.GetPath(), task_runner_)); |
61 } | 61 } |
62 | 62 |
63 TEST_F(CouldExternalDataStoreTest, StoreAndLoad) { | 63 TEST_F(CouldExternalDataStoreTest, StoreAndLoad) { |
64 // Write an entry to a store. | 64 // Write an entry to a store. |
65 CloudExternalDataStore store(kKey1, task_runner_, resource_cache_.get()); | 65 CloudExternalDataStore store(kKey1, task_runner_, resource_cache_.get()); |
66 EXPECT_TRUE(store.Store(kPolicy1, kData1Hash, kData1)); | 66 EXPECT_TRUE(store.Store(kPolicy1, kData1Hash, kData1)); |
67 | 67 |
68 // Check that loading and verifying the entry against an invalid hash fails. | 68 // Check that loading and verifying the entry against an invalid hash fails. |
69 std::string data; | 69 std::string data; |
70 EXPECT_FALSE(store.Load(kPolicy1, kData2Hash, kMaxSize, &data)); | 70 EXPECT_FALSE(store.Load(kPolicy1, kData2Hash, kMaxSize, &data)); |
(...skipping 123 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
194 EXPECT_TRUE(contents.empty()); | 194 EXPECT_TRUE(contents.empty()); |
195 | 195 |
196 // Check that the part of the resource cache backing the second store is | 196 // Check that the part of the resource cache backing the second store is |
197 // unaffected. | 197 // unaffected. |
198 resource_cache_->LoadAllSubkeys(kKey2, &contents); | 198 resource_cache_->LoadAllSubkeys(kKey2, &contents); |
199 ASSERT_EQ(1u, contents.size()); | 199 ASSERT_EQ(1u, contents.size()); |
200 EXPECT_EQ(kData2, contents.begin()->second); | 200 EXPECT_EQ(kData2, contents.begin()->second); |
201 } | 201 } |
202 | 202 |
203 } // namespace policy | 203 } // namespace policy |
OLD | NEW |