Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(141)

Side by Side Diff: chrome/browser/policy/cloud/user_policy_signin_service_unittest.cc

Issue 23767004: Revert "Handling of multiple concurrent requests from different clients in OAuth2TokenService" (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | chrome/browser/signin/profile_oauth2_token_service.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/memory/ref_counted.h" 5 #include "base/memory/ref_counted.h"
6 #include "base/memory/scoped_ptr.h" 6 #include "base/memory/scoped_ptr.h"
7 #include "base/message_loop/message_loop.h" 7 #include "base/message_loop/message_loop.h"
8 #include "base/prefs/pref_service.h" 8 #include "base/prefs/pref_service.h"
9 #include "base/run_loop.h" 9 #include "base/run_loop.h"
10 #include "base/time/time.h" 10 #include "base/time/time.h"
(...skipping 14 matching lines...) Expand all
25 #include "chrome/test/base/testing_browser_process.h" 25 #include "chrome/test/base/testing_browser_process.h"
26 #include "chrome/test/base/testing_pref_service_syncable.h" 26 #include "chrome/test/base/testing_pref_service_syncable.h"
27 #include "chrome/test/base/testing_profile.h" 27 #include "chrome/test/base/testing_profile.h"
28 #include "content/public/browser/browser_context.h" 28 #include "content/public/browser/browser_context.h"
29 #include "content/public/browser/notification_details.h" 29 #include "content/public/browser/notification_details.h"
30 #include "content/public/browser/notification_service.h" 30 #include "content/public/browser/notification_service.h"
31 #include "content/public/browser/notification_source.h" 31 #include "content/public/browser/notification_source.h"
32 #include "content/public/test/test_browser_thread_bundle.h" 32 #include "content/public/test/test_browser_thread_bundle.h"
33 #include "google_apis/gaia/gaia_constants.h" 33 #include "google_apis/gaia/gaia_constants.h"
34 #include "google_apis/gaia/google_service_auth_error.h" 34 #include "google_apis/gaia/google_service_auth_error.h"
35 #include "google_apis/gaia/oauth2_access_token_fetcher.h"
36 #include "net/http/http_status_code.h" 35 #include "net/http/http_status_code.h"
37 #include "net/url_request/test_url_fetcher_factory.h" 36 #include "net/url_request/test_url_fetcher_factory.h"
38 #include "net/url_request/url_request_context_getter.h" 37 #include "net/url_request/url_request_context_getter.h"
39 #include "net/url_request/url_request_status.h" 38 #include "net/url_request/url_request_status.h"
40 #include "testing/gmock/include/gmock/gmock.h" 39 #include "testing/gmock/include/gmock/gmock.h"
41 #include "testing/gtest/include/gtest/gtest.h" 40 #include "testing/gtest/include/gtest/gtest.h"
42 41
43 #if defined(OS_ANDROID) 42 #if defined(OS_ANDROID)
44 #include "chrome/browser/policy/cloud/user_policy_signin_service_android.h" 43 #include "chrome/browser/policy/cloud/user_policy_signin_service_android.h"
45 #include "chrome/browser/signin/android_profile_oauth2_token_service.h" 44 #include "chrome/browser/signin/android_profile_oauth2_token_service.h"
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after
136 bool HasPendingRequest() const { 135 bool HasPendingRequest() const {
137 return pending_request_; 136 return pending_request_;
138 } 137 }
139 138
140 private: 139 private:
141 base::WeakPtr<RequestImpl> pending_request_; 140 base::WeakPtr<RequestImpl> pending_request_;
142 }; 141 };
143 142
144 #endif 143 #endif
145 144
146 } // namespace
147
148 class UserPolicySigninServiceTest : public testing::Test { 145 class UserPolicySigninServiceTest : public testing::Test {
149 public: 146 public:
150 UserPolicySigninServiceTest() 147 UserPolicySigninServiceTest()
151 : thread_bundle_(content::TestBrowserThreadBundle::IO_MAINLOOP), 148 : thread_bundle_(content::TestBrowserThreadBundle::IO_MAINLOOP),
152 register_completed_(false) {} 149 register_completed_(false) {}
153 150
154 MOCK_METHOD1(OnPolicyRefresh, void(bool)); 151 MOCK_METHOD1(OnPolicyRefresh, void(bool));
155 152
156 void OnRegisterCompleted(scoped_ptr<CloudPolicyClient> client) { 153 void OnRegisterCompleted(scoped_ptr<CloudPolicyClient> client) {
157 register_completed_ = true; 154 register_completed_ = true;
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after
215 UserPolicySigninServiceFactory::SetDeviceManagementServiceForTesting(NULL); 212 UserPolicySigninServiceFactory::SetDeviceManagementServiceForTesting(NULL);
216 // Free the profile before we clear out the browser prefs. 213 // Free the profile before we clear out the browser prefs.
217 profile_.reset(); 214 profile_.reset();
218 TestingBrowserProcess* testing_browser_process = 215 TestingBrowserProcess* testing_browser_process =
219 TestingBrowserProcess::GetGlobal(); 216 TestingBrowserProcess::GetGlobal();
220 testing_browser_process->SetLocalState(NULL); 217 testing_browser_process->SetLocalState(NULL);
221 local_state_.reset(); 218 local_state_.reset();
222 testing_browser_process->SetBrowserPolicyConnector(NULL); 219 testing_browser_process->SetBrowserPolicyConnector(NULL);
223 base::RunLoop run_loop; 220 base::RunLoop run_loop;
224 run_loop.RunUntilIdle(); 221 run_loop.RunUntilIdle();
225 ResetLastFetcherId();
226 } 222 }
227 223
228 #if defined(OS_ANDROID) 224 #if defined(OS_ANDROID)
229 FakeAndroidProfileOAuth2TokenService* GetTokenService() { 225 FakeAndroidProfileOAuth2TokenService* GetTokenService() {
230 ProfileOAuth2TokenService* service = 226 ProfileOAuth2TokenService* service =
231 ProfileOAuth2TokenServiceFactory::GetForProfile(profile_.get()); 227 ProfileOAuth2TokenServiceFactory::GetForProfile(profile_.get());
232 return static_cast<FakeAndroidProfileOAuth2TokenService*>(service); 228 return static_cast<FakeAndroidProfileOAuth2TokenService*>(service);
233 } 229 }
234 #else 230 #else
235 FakeProfileOAuth2TokenService* GetTokenService() { 231 FakeProfileOAuth2TokenService* GetTokenService() {
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after
345 ASSERT_TRUE(policy_data.SerializeToString( 341 ASSERT_TRUE(policy_data.SerializeToString(
346 policy_response->mutable_policy_data())); 342 policy_response->mutable_policy_data()));
347 fetch_request->SendResponse(DM_STATUS_SUCCESS, policy_blob); 343 fetch_request->SendResponse(DM_STATUS_SUCCESS, policy_blob);
348 344
349 // Complete the store which should cause the policy fetch callback to be 345 // Complete the store which should cause the policy fetch callback to be
350 // invoked. 346 // invoked.
351 mock_store_->NotifyStoreLoaded(); 347 mock_store_->NotifyStoreLoaded();
352 Mock::VerifyAndClearExpectations(this); 348 Mock::VerifyAndClearExpectations(this);
353 } 349 }
354 350
355 void ResetLastFetcherId() {
356 OAuth2AccessTokenFetcher::ResetLastFetcherIdForTest();
357 }
358
359 scoped_ptr<TestingProfile> profile_; 351 scoped_ptr<TestingProfile> profile_;
360 // Weak pointer to a MockUserCloudPolicyStore - lifetime is managed by the 352 // Weak pointer to a MockUserCloudPolicyStore - lifetime is managed by the
361 // UserCloudPolicyManager. 353 // UserCloudPolicyManager.
362 MockUserCloudPolicyStore* mock_store_; 354 MockUserCloudPolicyStore* mock_store_;
363 scoped_ptr<UserCloudPolicyManager> manager_; 355 scoped_ptr<UserCloudPolicyManager> manager_;
364 356
365 // BrowserPolicyConnector and UrlFetcherFactory want to initialize and free 357 // BrowserPolicyConnector and UrlFetcherFactory want to initialize and free
366 // various components asynchronously via tasks, so create fake threads here. 358 // various components asynchronously via tasks, so create fake threads here.
367 content::TestBrowserThreadBundle thread_bundle_; 359 content::TestBrowserThreadBundle thread_bundle_;
368 360
(...skipping 418 matching lines...) Expand 10 before | Expand all | Expand 10 after
787 } 779 }
788 780
789 TEST_F(UserPolicySigninServiceTest, SignOutThenSignInAgain) { 781 TEST_F(UserPolicySigninServiceTest, SignOutThenSignInAgain) {
790 ASSERT_NO_FATAL_FAILURE(TestSuccessfulSignin()); 782 ASSERT_NO_FATAL_FAILURE(TestSuccessfulSignin());
791 783
792 EXPECT_CALL(*mock_store_, Clear()); 784 EXPECT_CALL(*mock_store_, Clear());
793 signin_manager_->ForceSignOut(); 785 signin_manager_->ForceSignOut();
794 ASSERT_FALSE(manager_->core()->service()); 786 ASSERT_FALSE(manager_->core()->service());
795 787
796 // Now sign in again. 788 // Now sign in again.
797 ResetLastFetcherId();
798 ASSERT_NO_FATAL_FAILURE(TestSuccessfulSignin()); 789 ASSERT_NO_FATAL_FAILURE(TestSuccessfulSignin());
799 } 790 }
800 791
801 TEST_F(UserPolicySigninServiceTest, PolicyFetchFailureTemporary) { 792 TEST_F(UserPolicySigninServiceTest, PolicyFetchFailureTemporary) {
802 ASSERT_NO_FATAL_FAILURE(TestSuccessfulSignin()); 793 ASSERT_NO_FATAL_FAILURE(TestSuccessfulSignin());
803 794
804 ASSERT_TRUE(manager_->IsClientRegistered()); 795 ASSERT_TRUE(manager_->IsClientRegistered());
805 796
806 // Kick off another policy fetch. 797 // Kick off another policy fetch.
807 MockDeviceManagementJob* fetch_request = NULL; 798 MockDeviceManagementJob* fetch_request = NULL;
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after
845 EXPECT_CALL(*mock_store_, Clear()); 836 EXPECT_CALL(*mock_store_, Clear());
846 fetch_request->SendResponse(DM_STATUS_SERVICE_MANAGEMENT_NOT_SUPPORTED, 837 fetch_request->SendResponse(DM_STATUS_SERVICE_MANAGEMENT_NOT_SUPPORTED,
847 em::DeviceManagementResponse()); 838 em::DeviceManagementResponse());
848 base::RunLoop().RunUntilIdle(); 839 base::RunLoop().RunUntilIdle();
849 EXPECT_FALSE(manager_->IsClientRegistered()); 840 EXPECT_FALSE(manager_->IsClientRegistered());
850 #if !defined(OS_ANDROID) 841 #if !defined(OS_ANDROID)
851 EXPECT_FALSE(signin_manager_->IsSignoutProhibited()); 842 EXPECT_FALSE(signin_manager_->IsSignoutProhibited());
852 #endif 843 #endif
853 } 844 }
854 845
846 } // namespace
847
855 } // namespace policy 848 } // namespace policy
OLDNEW
« no previous file with comments | « no previous file | chrome/browser/signin/profile_oauth2_token_service.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698