OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/bind.h" | 5 #include "base/bind.h" |
6 #include "base/memory/scoped_ptr.h" | 6 #include "base/memory/scoped_ptr.h" |
7 #include "base/strings/stringprintf.h" | 7 #include "base/strings/stringprintf.h" |
8 #include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h" | 8 #include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h" |
9 #include "chrome/browser/signin/oauth2_token_service.h" | 9 #include "chrome/browser/signin/oauth2_token_service.h" |
10 #include "chrome/test/base/testing_profile.h" | 10 #include "chrome/test/base/testing_profile.h" |
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
68 MockOAuth2TokenService(); | 68 MockOAuth2TokenService(); |
69 virtual ~MockOAuth2TokenService(); | 69 virtual ~MockOAuth2TokenService(); |
70 | 70 |
71 Request* request() const { return request_; } | 71 Request* request() const { return request_; } |
72 | 72 |
73 void ClearRequest(Request* request); | 73 void ClearRequest(Request* request); |
74 | 74 |
75 private: | 75 private: |
76 // OAuth2TokenService overrides: | 76 // OAuth2TokenService overrides: |
77 virtual scoped_ptr<OAuth2TokenService::Request> StartRequest( | 77 virtual scoped_ptr<OAuth2TokenService::Request> StartRequest( |
78 const OAuth2TokenService::ScopeSet& scopes, | 78 const std::string& account_id, |
| 79 const OAuth2TokenService::ScopeSet& scopes, |
79 OAuth2TokenService::Consumer* consumer) OVERRIDE; | 80 OAuth2TokenService::Consumer* consumer) OVERRIDE; |
80 virtual std::string GetRefreshToken() OVERRIDE; | 81 virtual std::string GetRefreshToken(const std::string& account_id) OVERRIDE; |
81 virtual net::URLRequestContextGetter* GetRequestContext() OVERRIDE { | 82 virtual net::URLRequestContextGetter* GetRequestContext() OVERRIDE { |
82 return NULL; | 83 return NULL; |
83 } | 84 } |
84 | 85 |
85 Request* request_; | 86 Request* request_; |
86 | 87 |
87 DISALLOW_COPY_AND_ASSIGN(MockOAuth2TokenService); | 88 DISALLOW_COPY_AND_ASSIGN(MockOAuth2TokenService); |
88 }; | 89 }; |
89 | 90 |
90 MockOAuth2TokenService::Request::Request( | 91 MockOAuth2TokenService::Request::Request( |
(...skipping 25 matching lines...) Expand all Loading... |
116 EXPECT_FALSE(request_); | 117 EXPECT_FALSE(request_); |
117 } | 118 } |
118 | 119 |
119 void MockOAuth2TokenService::ClearRequest( | 120 void MockOAuth2TokenService::ClearRequest( |
120 MockOAuth2TokenService::Request* request) { | 121 MockOAuth2TokenService::Request* request) { |
121 if (request_ == request) | 122 if (request_ == request) |
122 request_ = NULL; | 123 request_ = NULL; |
123 } | 124 } |
124 | 125 |
125 scoped_ptr<OAuth2TokenService::Request> MockOAuth2TokenService::StartRequest( | 126 scoped_ptr<OAuth2TokenService::Request> MockOAuth2TokenService::StartRequest( |
| 127 const std::string& account_id, |
126 const OAuth2TokenService::ScopeSet& scopes, | 128 const OAuth2TokenService::ScopeSet& scopes, |
127 OAuth2TokenService::Consumer* consumer) { | 129 OAuth2TokenService::Consumer* consumer) { |
128 scoped_ptr<Request> request(new Request(scopes, consumer, this)); | 130 scoped_ptr<Request> request(new Request(scopes, consumer, this)); |
129 request_ = request.get(); | 131 request_ = request.get(); |
130 return request.PassAs<OAuth2TokenService::Request>(); | 132 return request.PassAs<OAuth2TokenService::Request>(); |
131 } | 133 } |
132 | 134 |
133 std::string MockOAuth2TokenService::GetRefreshToken() { | 135 std::string MockOAuth2TokenService::GetRefreshToken( |
| 136 const std::string& account_id) { |
134 NOTREACHED(); | 137 NOTREACHED(); |
135 return std::string(); | 138 return std::string(); |
136 } | 139 } |
137 | 140 |
138 // Utility methods -------------------------------------------------- | 141 // Utility methods -------------------------------------------------- |
139 | 142 |
140 // Slightly hacky way to extract a value from a URL-encoded POST request body. | 143 // Slightly hacky way to extract a value from a URL-encoded POST request body. |
141 bool GetValueForKey(const std::string& encoded_string, | 144 bool GetValueForKey(const std::string& encoded_string, |
142 const std::string& key, | 145 const std::string& key, |
143 std::string* value) { | 146 std::string* value) { |
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
199 scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_; | 202 scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_; |
200 | 203 |
201 GoogleServiceAuthError error_; | 204 GoogleServiceAuthError error_; |
202 std::string token_; | 205 std::string token_; |
203 base::WeakPtrFactory<ManagedUserRefreshTokenFetcherTest> weak_ptr_factory_; | 206 base::WeakPtrFactory<ManagedUserRefreshTokenFetcherTest> weak_ptr_factory_; |
204 }; | 207 }; |
205 | 208 |
206 ManagedUserRefreshTokenFetcherTest::ManagedUserRefreshTokenFetcherTest() | 209 ManagedUserRefreshTokenFetcherTest::ManagedUserRefreshTokenFetcherTest() |
207 : token_fetcher_( | 210 : token_fetcher_( |
208 ManagedUserRefreshTokenFetcher::Create(&oauth2_token_service_, | 211 ManagedUserRefreshTokenFetcher::Create(&oauth2_token_service_, |
209 profile_.GetRequestContext())), | 212 std::string(), |
| 213 profile_.GetRequestContext())), |
210 error_(GoogleServiceAuthError::NONE), | 214 error_(GoogleServiceAuthError::NONE), |
211 weak_ptr_factory_(this) {} | 215 weak_ptr_factory_(this) {} |
212 | 216 |
213 void ManagedUserRefreshTokenFetcherTest::StartFetching() { | 217 void ManagedUserRefreshTokenFetcherTest::StartFetching() { |
214 token_fetcher_->Start(kManagedUserId, kDeviceName, | 218 token_fetcher_->Start(kManagedUserId, kDeviceName, |
215 base::Bind( | 219 base::Bind( |
216 &ManagedUserRefreshTokenFetcherTest::OnTokenFetched, | 220 &ManagedUserRefreshTokenFetcherTest::OnTokenFetched, |
217 weak_ptr_factory_.GetWeakPtr())); | 221 weak_ptr_factory_.GetWeakPtr())); |
218 } | 222 } |
219 | 223 |
(...skipping 192 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
412 | 416 |
413 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) { | 417 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) { |
414 StartFetching(); | 418 StartFetching(); |
415 GetOAuth2TokenServiceRequest()->Succeed(); | 419 GetOAuth2TokenServiceRequest()->Succeed(); |
416 MakeIssueTokenRequestSucceed(); | 420 MakeIssueTokenRequestSucceed(); |
417 Reset(); | 421 Reset(); |
418 | 422 |
419 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); | 423 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
420 EXPECT_EQ(std::string(), token()); | 424 EXPECT_EQ(std::string(), token()); |
421 } | 425 } |
OLD | NEW |