Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(238)

Side by Side Diff: chrome/browser/managed_mode/managed_user_refresh_token_fetcher_unittest.cc

Issue 23382008: Making OAuth2TokenService multi-login aware, updating callers, minor fixes (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 7 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/bind.h" 5 #include "base/bind.h"
6 #include "base/memory/scoped_ptr.h" 6 #include "base/memory/scoped_ptr.h"
7 #include "base/strings/stringprintf.h" 7 #include "base/strings/stringprintf.h"
8 #include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h" 8 #include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h"
9 #include "chrome/browser/signin/oauth2_token_service.h" 9 #include "chrome/browser/signin/oauth2_token_service.h"
10 #include "chrome/test/base/testing_profile.h" 10 #include "chrome/test/base/testing_profile.h"
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after
68 MockOAuth2TokenService(); 68 MockOAuth2TokenService();
69 virtual ~MockOAuth2TokenService(); 69 virtual ~MockOAuth2TokenService();
70 70
71 Request* request() const { return request_; } 71 Request* request() const { return request_; }
72 72
73 void ClearRequest(Request* request); 73 void ClearRequest(Request* request);
74 74
75 private: 75 private:
76 // OAuth2TokenService overrides: 76 // OAuth2TokenService overrides:
77 virtual scoped_ptr<OAuth2TokenService::Request> StartRequest( 77 virtual scoped_ptr<OAuth2TokenService::Request> StartRequest(
78 const OAuth2TokenService::ScopeSet& scopes, 78 const std::string& account_id,
79 const OAuth2TokenService::ScopeSet& scopes,
79 OAuth2TokenService::Consumer* consumer) OVERRIDE; 80 OAuth2TokenService::Consumer* consumer) OVERRIDE;
80 virtual std::string GetRefreshToken() OVERRIDE; 81 virtual std::string GetRefreshToken(const std::string& account_id) OVERRIDE;
81 virtual net::URLRequestContextGetter* GetRequestContext() OVERRIDE { 82 virtual net::URLRequestContextGetter* GetRequestContext() OVERRIDE {
82 return NULL; 83 return NULL;
83 } 84 }
84 85
85 Request* request_; 86 Request* request_;
86 87
87 DISALLOW_COPY_AND_ASSIGN(MockOAuth2TokenService); 88 DISALLOW_COPY_AND_ASSIGN(MockOAuth2TokenService);
88 }; 89 };
89 90
90 MockOAuth2TokenService::Request::Request( 91 MockOAuth2TokenService::Request::Request(
(...skipping 25 matching lines...) Expand all
116 EXPECT_FALSE(request_); 117 EXPECT_FALSE(request_);
117 } 118 }
118 119
119 void MockOAuth2TokenService::ClearRequest( 120 void MockOAuth2TokenService::ClearRequest(
120 MockOAuth2TokenService::Request* request) { 121 MockOAuth2TokenService::Request* request) {
121 if (request_ == request) 122 if (request_ == request)
122 request_ = NULL; 123 request_ = NULL;
123 } 124 }
124 125
125 scoped_ptr<OAuth2TokenService::Request> MockOAuth2TokenService::StartRequest( 126 scoped_ptr<OAuth2TokenService::Request> MockOAuth2TokenService::StartRequest(
127 const std::string& account_id,
126 const OAuth2TokenService::ScopeSet& scopes, 128 const OAuth2TokenService::ScopeSet& scopes,
127 OAuth2TokenService::Consumer* consumer) { 129 OAuth2TokenService::Consumer* consumer) {
128 scoped_ptr<Request> request(new Request(scopes, consumer, this)); 130 scoped_ptr<Request> request(new Request(scopes, consumer, this));
129 request_ = request.get(); 131 request_ = request.get();
130 return request.PassAs<OAuth2TokenService::Request>(); 132 return request.PassAs<OAuth2TokenService::Request>();
131 } 133 }
132 134
133 std::string MockOAuth2TokenService::GetRefreshToken() { 135 std::string MockOAuth2TokenService::GetRefreshToken(
136 const std::string& account_id) {
134 NOTREACHED(); 137 NOTREACHED();
135 return std::string(); 138 return std::string();
136 } 139 }
137 140
138 // Utility methods -------------------------------------------------- 141 // Utility methods --------------------------------------------------
139 142
140 // Slightly hacky way to extract a value from a URL-encoded POST request body. 143 // Slightly hacky way to extract a value from a URL-encoded POST request body.
141 bool GetValueForKey(const std::string& encoded_string, 144 bool GetValueForKey(const std::string& encoded_string,
142 const std::string& key, 145 const std::string& key,
143 std::string* value) { 146 std::string* value) {
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after
199 scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_; 202 scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_;
200 203
201 GoogleServiceAuthError error_; 204 GoogleServiceAuthError error_;
202 std::string token_; 205 std::string token_;
203 base::WeakPtrFactory<ManagedUserRefreshTokenFetcherTest> weak_ptr_factory_; 206 base::WeakPtrFactory<ManagedUserRefreshTokenFetcherTest> weak_ptr_factory_;
204 }; 207 };
205 208
206 ManagedUserRefreshTokenFetcherTest::ManagedUserRefreshTokenFetcherTest() 209 ManagedUserRefreshTokenFetcherTest::ManagedUserRefreshTokenFetcherTest()
207 : token_fetcher_( 210 : token_fetcher_(
208 ManagedUserRefreshTokenFetcher::Create(&oauth2_token_service_, 211 ManagedUserRefreshTokenFetcher::Create(&oauth2_token_service_,
209 profile_.GetRequestContext())), 212 std::string(),
213 profile_.GetRequestContext())),
210 error_(GoogleServiceAuthError::NONE), 214 error_(GoogleServiceAuthError::NONE),
211 weak_ptr_factory_(this) {} 215 weak_ptr_factory_(this) {}
212 216
213 void ManagedUserRefreshTokenFetcherTest::StartFetching() { 217 void ManagedUserRefreshTokenFetcherTest::StartFetching() {
214 token_fetcher_->Start(kManagedUserId, kDeviceName, 218 token_fetcher_->Start(kManagedUserId, kDeviceName,
215 base::Bind( 219 base::Bind(
216 &ManagedUserRefreshTokenFetcherTest::OnTokenFetched, 220 &ManagedUserRefreshTokenFetcherTest::OnTokenFetched,
217 weak_ptr_factory_.GetWeakPtr())); 221 weak_ptr_factory_.GetWeakPtr()));
218 } 222 }
219 223
(...skipping 192 matching lines...) Expand 10 before | Expand all | Expand 10 after
412 416
413 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) { 417 TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) {
414 StartFetching(); 418 StartFetching();
415 GetOAuth2TokenServiceRequest()->Succeed(); 419 GetOAuth2TokenServiceRequest()->Succeed();
416 MakeIssueTokenRequestSucceed(); 420 MakeIssueTokenRequestSucceed();
417 Reset(); 421 Reset();
418 422
419 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); 423 EXPECT_EQ(GoogleServiceAuthError::NONE, error().state());
420 EXPECT_EQ(std::string(), token()); 424 EXPECT_EQ(std::string(), token());
421 } 425 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698