| Index: components/proximity_auth/cryptauth/cryptauth_client_impl_unittest.cc
|
| diff --git a/components/proximity_auth/cryptauth/cryptauth_client_impl_unittest.cc b/components/proximity_auth/cryptauth/cryptauth_client_impl_unittest.cc
|
| deleted file mode 100644
|
| index 4fca644fc6a4b9cefab44e3f88f016d9d80f6fd1..0000000000000000000000000000000000000000
|
| --- a/components/proximity_auth/cryptauth/cryptauth_client_impl_unittest.cc
|
| +++ /dev/null
|
| @@ -1,562 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "components/proximity_auth/cryptauth/cryptauth_client_impl.h"
|
| -
|
| -#include "base/command_line.h"
|
| -#include "base/macros.h"
|
| -#include "base/memory/ptr_util.h"
|
| -#include "base/test/null_task_runner.h"
|
| -#include "components/proximity_auth/cryptauth/cryptauth_access_token_fetcher.h"
|
| -#include "components/proximity_auth/cryptauth/cryptauth_api_call_flow.h"
|
| -#include "components/proximity_auth/cryptauth/proto/cryptauth_api.pb.h"
|
| -#include "components/proximity_auth/cryptauth/switches.h"
|
| -#include "google_apis/gaia/fake_oauth2_token_service.h"
|
| -#include "net/url_request/test_url_fetcher_factory.h"
|
| -#include "net/url_request/url_request_test_util.h"
|
| -#include "testing/gmock/include/gmock/gmock.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -#include "url/gurl.h"
|
| -
|
| -using testing::_;
|
| -using testing::DoAll;
|
| -using testing::Return;
|
| -using testing::SaveArg;
|
| -using testing::StrictMock;
|
| -
|
| -namespace proximity_auth {
|
| -
|
| -namespace {
|
| -
|
| -const char kTestGoogleApisUrl[] = "https://www.testgoogleapis.com";
|
| -const char kAccessToken[] = "access_token";
|
| -const char kPublicKey1[] = "public_key1";
|
| -const char kPublicKey2[] = "public_key2";
|
| -const char kBluetoothAddress1[] = "AA:AA:AA:AA:AA:AA";
|
| -const char kBluetoothAddress2[] = "BB:BB:BB:BB:BB:BB";
|
| -
|
| -// Values for the DeviceClassifier field.
|
| -const int kDeviceOsVersionCode = 100;
|
| -const int kDeviceSoftwareVersionCode = 200;
|
| -const char kDeviceSoftwarePackage[] = "cryptauth_client_unittest";
|
| -const cryptauth::DeviceType kDeviceType = cryptauth::CHROME;
|
| -
|
| -// CryptAuthAccessTokenFetcher implementation simply returning a predetermined
|
| -// access token.
|
| -class FakeCryptAuthAccessTokenFetcher : public CryptAuthAccessTokenFetcher {
|
| - public:
|
| - FakeCryptAuthAccessTokenFetcher() : access_token_(kAccessToken) {}
|
| -
|
| - void FetchAccessToken(const AccessTokenCallback& callback) override {
|
| - callback.Run(access_token_);
|
| - }
|
| -
|
| - void set_access_token(const std::string& access_token) {
|
| - access_token_ = access_token;
|
| - };
|
| -
|
| - private:
|
| - std::string access_token_;
|
| -};
|
| -
|
| -// Mock CryptAuthApiCallFlow, which handles the HTTP requests to CryptAuth.
|
| -class MockCryptAuthApiCallFlow : public CryptAuthApiCallFlow {
|
| - public:
|
| - MockCryptAuthApiCallFlow() : CryptAuthApiCallFlow() {}
|
| - virtual ~MockCryptAuthApiCallFlow() {}
|
| -
|
| - MOCK_METHOD6(Start,
|
| - void(const GURL&,
|
| - net::URLRequestContextGetter* context,
|
| - const std::string& access_token,
|
| - const std::string& serialized_request,
|
| - const ResultCallback& result_callback,
|
| - const ErrorCallback& error_callback));
|
| -
|
| - private:
|
| - DISALLOW_COPY_AND_ASSIGN(MockCryptAuthApiCallFlow);
|
| -};
|
| -
|
| -// Callback that should never be invoked.
|
| -template <class T>
|
| -void NotCalled(const T& type) {
|
| - EXPECT_TRUE(false);
|
| -}
|
| -
|
| -// Callback that saves the result returned by CryptAuthClient.
|
| -template <class T>
|
| -void SaveResult(T* out, const T& result) {
|
| - *out = result;
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -class ProximityAuthCryptAuthClientTest : public testing::Test {
|
| - protected:
|
| - ProximityAuthCryptAuthClientTest()
|
| - : access_token_fetcher_(new FakeCryptAuthAccessTokenFetcher()),
|
| - api_call_flow_(new StrictMock<MockCryptAuthApiCallFlow>()),
|
| - url_request_context_(
|
| - new net::TestURLRequestContextGetter(new base::NullTaskRunner())),
|
| - serialized_request_(std::string()) {}
|
| -
|
| - void SetUp() override {
|
| - base::CommandLine::ForCurrentProcess()->AppendSwitchASCII(
|
| - switches::kCryptAuthHTTPHost, kTestGoogleApisUrl);
|
| -
|
| - cryptauth::DeviceClassifier device_classifier;
|
| - device_classifier.set_device_os_version_code(kDeviceOsVersionCode);
|
| - device_classifier.set_device_software_version_code(
|
| - kDeviceSoftwareVersionCode);
|
| - device_classifier.set_device_software_package(kDeviceSoftwarePackage);
|
| - device_classifier.set_device_type(kDeviceType);
|
| -
|
| - client_.reset(
|
| - new CryptAuthClientImpl(base::WrapUnique(api_call_flow_),
|
| - base::WrapUnique(access_token_fetcher_),
|
| - url_request_context_, device_classifier));
|
| - }
|
| -
|
| - // Sets up an expectation and captures a CryptAuth API request to
|
| - // |request_url|.
|
| - void ExpectRequest(const std::string& request_url) {
|
| - GURL url(request_url);
|
| - EXPECT_CALL(*api_call_flow_,
|
| - Start(url, url_request_context_.get(), kAccessToken, _, _, _))
|
| - .WillOnce(DoAll(SaveArg<3>(&serialized_request_),
|
| - SaveArg<4>(&flow_result_callback_),
|
| - SaveArg<5>(&flow_error_callback_)));
|
| - }
|
| -
|
| - // Returns |response_proto| as the result to the current API request.
|
| - // ExpectResult() must have been called first.
|
| - void FinishApiCallFlow(const google::protobuf::MessageLite* response_proto) {
|
| - flow_result_callback_.Run(response_proto->SerializeAsString());
|
| - }
|
| -
|
| - // Ends the current API request with |error_message|. ExpectResult() must have
|
| - // been called first.
|
| - void FailApiCallFlow(const std::string& error_message) {
|
| - flow_error_callback_.Run(error_message);
|
| - }
|
| -
|
| - protected:
|
| - // Owned by |client_|.
|
| - FakeCryptAuthAccessTokenFetcher* access_token_fetcher_;
|
| - // Owned by |client_|.
|
| - StrictMock<MockCryptAuthApiCallFlow>* api_call_flow_;
|
| -
|
| - scoped_refptr<net::URLRequestContextGetter> url_request_context_;
|
| - std::unique_ptr<CryptAuthClient> client_;
|
| -
|
| - std::string serialized_request_;
|
| - CryptAuthApiCallFlow::ResultCallback flow_result_callback_;
|
| - CryptAuthApiCallFlow::ErrorCallback flow_error_callback_;
|
| -};
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, GetMyDevicesSuccess) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| -
|
| - cryptauth::GetMyDevicesResponse result_proto;
|
| - cryptauth::GetMyDevicesRequest request_proto;
|
| - request_proto.set_allow_stale_read(true);
|
| - client_->GetMyDevices(
|
| - request_proto,
|
| - base::Bind(&SaveResult<cryptauth::GetMyDevicesResponse>, &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| -
|
| - cryptauth::GetMyDevicesRequest expected_request;
|
| - EXPECT_TRUE(expected_request.ParseFromString(serialized_request_));
|
| - EXPECT_TRUE(expected_request.allow_stale_read());
|
| -
|
| - // Return two devices, one unlock key and one unlockable device.
|
| - {
|
| - cryptauth::GetMyDevicesResponse response_proto;
|
| - response_proto.add_devices();
|
| - response_proto.mutable_devices(0)->set_public_key(kPublicKey1);
|
| - response_proto.mutable_devices(0)->set_unlock_key(true);
|
| - response_proto.mutable_devices(0)
|
| - ->set_bluetooth_address(kBluetoothAddress1);
|
| - response_proto.add_devices();
|
| - response_proto.mutable_devices(1)->set_public_key(kPublicKey2);
|
| - response_proto.mutable_devices(1)->set_unlockable(true);
|
| - FinishApiCallFlow(&response_proto);
|
| - }
|
| -
|
| - // Check that the result received in callback is the same as the response.
|
| - ASSERT_EQ(2, result_proto.devices_size());
|
| - EXPECT_EQ(kPublicKey1, result_proto.devices(0).public_key());
|
| - EXPECT_TRUE(result_proto.devices(0).unlock_key());
|
| - EXPECT_EQ(kBluetoothAddress1, result_proto.devices(0).bluetooth_address());
|
| - EXPECT_EQ(kPublicKey2, result_proto.devices(1).public_key());
|
| - EXPECT_TRUE(result_proto.devices(1).unlockable());
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, GetMyDevicesFailure) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| -
|
| - std::string error_message;
|
| - client_->GetMyDevices(cryptauth::GetMyDevicesRequest(),
|
| - base::Bind(&NotCalled<cryptauth::GetMyDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| -
|
| - std::string kStatus500Error("HTTP status: 500");
|
| - FailApiCallFlow(kStatus500Error);
|
| - EXPECT_EQ(kStatus500Error, error_message);
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, FindEligibleUnlockDevicesSuccess) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "findeligibleunlockdevices?alt=proto");
|
| -
|
| - cryptauth::FindEligibleUnlockDevicesResponse result_proto;
|
| - cryptauth::FindEligibleUnlockDevicesRequest request_proto;
|
| - request_proto.set_callback_bluetooth_address(kBluetoothAddress2);
|
| - client_->FindEligibleUnlockDevices(
|
| - request_proto,
|
| - base::Bind(&SaveResult<cryptauth::FindEligibleUnlockDevicesResponse>,
|
| - &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| -
|
| - cryptauth::FindEligibleUnlockDevicesRequest expected_request;
|
| - EXPECT_TRUE(expected_request.ParseFromString(serialized_request_));
|
| - EXPECT_EQ(kBluetoothAddress2, expected_request.callback_bluetooth_address());
|
| -
|
| - // Return a response proto with one eligible and one ineligible device.
|
| - cryptauth::FindEligibleUnlockDevicesResponse response_proto;
|
| - response_proto.add_eligible_devices();
|
| - response_proto.mutable_eligible_devices(0)->set_public_key(kPublicKey1);
|
| -
|
| - const std::string kIneligibilityReason = "You require more vespine gas.";
|
| - response_proto.add_ineligible_devices();
|
| - response_proto.mutable_ineligible_devices(0)
|
| - ->mutable_device()
|
| - ->set_public_key(kPublicKey2);
|
| - response_proto.mutable_ineligible_devices(0)
|
| - ->add_reasons(kIneligibilityReason);
|
| - FinishApiCallFlow(&response_proto);
|
| -
|
| - // Check that the result received in callback is the same as the response.
|
| - ASSERT_EQ(1, result_proto.eligible_devices_size());
|
| - EXPECT_EQ(kPublicKey1, result_proto.eligible_devices(0).public_key());
|
| - ASSERT_EQ(1, result_proto.ineligible_devices_size());
|
| - EXPECT_EQ(kPublicKey2,
|
| - result_proto.ineligible_devices(0).device().public_key());
|
| - ASSERT_EQ(1, result_proto.ineligible_devices(0).reasons_size());
|
| - EXPECT_EQ(kIneligibilityReason,
|
| - result_proto.ineligible_devices(0).reasons(0));
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, FindEligibleUnlockDevicesFailure) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "findeligibleunlockdevices?alt=proto");
|
| -
|
| - std::string error_message;
|
| - cryptauth::FindEligibleUnlockDevicesRequest request_proto;
|
| - request_proto.set_callback_bluetooth_address(kBluetoothAddress1);
|
| - client_->FindEligibleUnlockDevices(
|
| - request_proto,
|
| - base::Bind(&NotCalled<cryptauth::FindEligibleUnlockDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| -
|
| - std::string kStatus403Error("HTTP status: 403");
|
| - FailApiCallFlow(kStatus403Error);
|
| - EXPECT_EQ(kStatus403Error, error_message);
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, SendDeviceSyncTickleSuccess) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "senddevicesynctickle?alt=proto");
|
| -
|
| - cryptauth::SendDeviceSyncTickleResponse result_proto;
|
| - client_->SendDeviceSyncTickle(
|
| - cryptauth::SendDeviceSyncTickleRequest(),
|
| - base::Bind(&SaveResult<cryptauth::SendDeviceSyncTickleResponse>,
|
| - &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| -
|
| - cryptauth::SendDeviceSyncTickleRequest expected_request;
|
| - EXPECT_TRUE(expected_request.ParseFromString(serialized_request_));
|
| -
|
| - cryptauth::SendDeviceSyncTickleResponse response_proto;
|
| - FinishApiCallFlow(&response_proto);
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, ToggleEasyUnlockSuccess) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "toggleeasyunlock?alt=proto");
|
| -
|
| - cryptauth::ToggleEasyUnlockResponse result_proto;
|
| - cryptauth::ToggleEasyUnlockRequest request_proto;
|
| - request_proto.set_enable(true);
|
| - request_proto.set_apply_to_all(false);
|
| - request_proto.set_public_key(kPublicKey1);
|
| - client_->ToggleEasyUnlock(
|
| - request_proto,
|
| - base::Bind(&SaveResult<cryptauth::ToggleEasyUnlockResponse>,
|
| - &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| -
|
| - cryptauth::ToggleEasyUnlockRequest expected_request;
|
| - EXPECT_TRUE(expected_request.ParseFromString(serialized_request_));
|
| - EXPECT_TRUE(expected_request.enable());
|
| - EXPECT_EQ(kPublicKey1, expected_request.public_key());
|
| - EXPECT_FALSE(expected_request.apply_to_all());
|
| -
|
| - cryptauth::ToggleEasyUnlockResponse response_proto;
|
| - FinishApiCallFlow(&response_proto);
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, SetupEnrollmentSuccess) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/enrollment/"
|
| - "setup?alt=proto");
|
| -
|
| - std::string kApplicationId = "mkaes";
|
| - std::vector<std::string> supported_protocols;
|
| - supported_protocols.push_back("gcmV1");
|
| - supported_protocols.push_back("testProtocol");
|
| -
|
| - cryptauth::SetupEnrollmentResponse result_proto;
|
| - cryptauth::SetupEnrollmentRequest request_proto;
|
| - request_proto.set_application_id(kApplicationId);
|
| - request_proto.add_types("gcmV1");
|
| - request_proto.add_types("testProtocol");
|
| - client_->SetupEnrollment(
|
| - request_proto, base::Bind(&SaveResult<cryptauth::SetupEnrollmentResponse>,
|
| - &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| -
|
| - cryptauth::SetupEnrollmentRequest expected_request;
|
| - EXPECT_TRUE(expected_request.ParseFromString(serialized_request_));
|
| - EXPECT_EQ(kApplicationId, expected_request.application_id());
|
| - ASSERT_EQ(2, expected_request.types_size());
|
| - EXPECT_EQ("gcmV1", expected_request.types(0));
|
| - EXPECT_EQ("testProtocol", expected_request.types(1));
|
| -
|
| - // Return a fake enrollment session.
|
| - {
|
| - cryptauth::SetupEnrollmentResponse response_proto;
|
| - response_proto.set_status("OK");
|
| - response_proto.add_infos();
|
| - response_proto.mutable_infos(0)->set_type("gcmV1");
|
| - response_proto.mutable_infos(0)->set_enrollment_session_id("session_id");
|
| - response_proto.mutable_infos(0)->set_server_ephemeral_key("ephemeral_key");
|
| - FinishApiCallFlow(&response_proto);
|
| - }
|
| -
|
| - // Check that the returned proto is the same as the one just created.
|
| - EXPECT_EQ("OK", result_proto.status());
|
| - ASSERT_EQ(1, result_proto.infos_size());
|
| - EXPECT_EQ("gcmV1", result_proto.infos(0).type());
|
| - EXPECT_EQ("session_id", result_proto.infos(0).enrollment_session_id());
|
| - EXPECT_EQ("ephemeral_key", result_proto.infos(0).server_ephemeral_key());
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, FinishEnrollmentSuccess) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/enrollment/"
|
| - "finish?alt=proto");
|
| -
|
| - const char kEnrollmentSessionId[] = "enrollment_session_id";
|
| - const char kEnrollmentMessage[] = "enrollment_message";
|
| - const char kDeviceEphemeralKey[] = "device_ephermal_key";
|
| - cryptauth::FinishEnrollmentResponse result_proto;
|
| - cryptauth::FinishEnrollmentRequest request_proto;
|
| - request_proto.set_enrollment_session_id(kEnrollmentSessionId);
|
| - request_proto.set_enrollment_message(kEnrollmentMessage);
|
| - request_proto.set_device_ephemeral_key(kDeviceEphemeralKey);
|
| - client_->FinishEnrollment(
|
| - request_proto,
|
| - base::Bind(&SaveResult<cryptauth::FinishEnrollmentResponse>,
|
| - &result_proto),
|
| - base::Bind(&NotCalled<const std::string&>));
|
| -
|
| - cryptauth::FinishEnrollmentRequest expected_request;
|
| - EXPECT_TRUE(expected_request.ParseFromString(serialized_request_));
|
| - EXPECT_EQ(kEnrollmentSessionId, expected_request.enrollment_session_id());
|
| - EXPECT_EQ(kEnrollmentMessage, expected_request.enrollment_message());
|
| - EXPECT_EQ(kDeviceEphemeralKey, expected_request.device_ephemeral_key());
|
| -
|
| - {
|
| - cryptauth::FinishEnrollmentResponse response_proto;
|
| - response_proto.set_status("OK");
|
| - FinishApiCallFlow(&response_proto);
|
| - }
|
| - EXPECT_EQ("OK", result_proto.status());
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, FetchAccessTokenFailure) {
|
| - access_token_fetcher_->set_access_token("");
|
| -
|
| - std::string error_message;
|
| - client_->GetMyDevices(cryptauth::GetMyDevicesRequest(),
|
| - base::Bind(&NotCalled<cryptauth::GetMyDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| -
|
| - EXPECT_EQ("Failed to get a valid access token.", error_message);
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, ParseResponseProtoFailure) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| -
|
| - std::string error_message;
|
| - client_->GetMyDevices(cryptauth::GetMyDevicesRequest(),
|
| - base::Bind(&NotCalled<cryptauth::GetMyDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| -
|
| - flow_result_callback_.Run("Not a valid serialized response message.");
|
| - EXPECT_EQ("Failed to parse response proto.", error_message);
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest,
|
| - MakeSecondRequestBeforeFirstRequestSucceeds) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| -
|
| - // Make first request.
|
| - cryptauth::GetMyDevicesResponse result_proto;
|
| - client_->GetMyDevices(
|
| - cryptauth::GetMyDevicesRequest(),
|
| - base::Bind(&SaveResult<cryptauth::GetMyDevicesResponse>, &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| -
|
| - // With request pending, make second request.
|
| - {
|
| - std::string error_message;
|
| - client_->FindEligibleUnlockDevices(
|
| - cryptauth::FindEligibleUnlockDevicesRequest(),
|
| - base::Bind(&NotCalled<cryptauth::FindEligibleUnlockDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| - EXPECT_EQ("Client has been used for another request. Do not reuse.",
|
| - error_message);
|
| - }
|
| -
|
| - // Complete first request.
|
| - {
|
| - cryptauth::GetMyDevicesResponse response_proto;
|
| - response_proto.add_devices();
|
| - response_proto.mutable_devices(0)->set_public_key(kPublicKey1);
|
| - FinishApiCallFlow(&response_proto);
|
| - }
|
| -
|
| - ASSERT_EQ(1, result_proto.devices_size());
|
| - EXPECT_EQ(kPublicKey1, result_proto.devices(0).public_key());
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest,
|
| - MakeSecondRequestBeforeFirstRequestFails) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| -
|
| - // Make first request.
|
| - std::string error_message;
|
| - client_->GetMyDevices(cryptauth::GetMyDevicesRequest(),
|
| - base::Bind(&NotCalled<cryptauth::GetMyDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| -
|
| - // With request pending, make second request.
|
| - {
|
| - std::string error_message;
|
| - client_->FindEligibleUnlockDevices(
|
| - cryptauth::FindEligibleUnlockDevicesRequest(),
|
| - base::Bind(&NotCalled<cryptauth::FindEligibleUnlockDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| - EXPECT_EQ("Client has been used for another request. Do not reuse.",
|
| - error_message);
|
| - }
|
| -
|
| - // Fail first request.
|
| - std::string kStatus429Error = "HTTP status: 429";
|
| - FailApiCallFlow(kStatus429Error);
|
| - EXPECT_EQ(kStatus429Error, error_message);
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest,
|
| - MakeSecondRequestAfterFirstRequestSucceeds) {
|
| - // Make first request successfully.
|
| - {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| - cryptauth::GetMyDevicesResponse result_proto;
|
| - client_->GetMyDevices(
|
| - cryptauth::GetMyDevicesRequest(),
|
| - base::Bind(&SaveResult<cryptauth::GetMyDevicesResponse>, &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| -
|
| - cryptauth::GetMyDevicesResponse response_proto;
|
| - response_proto.add_devices();
|
| - response_proto.mutable_devices(0)->set_public_key(kPublicKey1);
|
| - FinishApiCallFlow(&response_proto);
|
| - ASSERT_EQ(1, result_proto.devices_size());
|
| - EXPECT_EQ(kPublicKey1, result_proto.devices(0).public_key());
|
| - }
|
| -
|
| - // Second request fails.
|
| - {
|
| - std::string error_message;
|
| - client_->FindEligibleUnlockDevices(
|
| - cryptauth::FindEligibleUnlockDevicesRequest(),
|
| - base::Bind(&NotCalled<cryptauth::FindEligibleUnlockDevicesResponse>),
|
| - base::Bind(&SaveResult<std::string>, &error_message));
|
| - EXPECT_EQ("Client has been used for another request. Do not reuse.",
|
| - error_message);
|
| - }
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, DeviceClassifierIsSet) {
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| -
|
| - cryptauth::GetMyDevicesResponse result_proto;
|
| - cryptauth::GetMyDevicesRequest request_proto;
|
| - request_proto.set_allow_stale_read(true);
|
| - client_->GetMyDevices(
|
| - request_proto,
|
| - base::Bind(&SaveResult<cryptauth::GetMyDevicesResponse>, &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| - cryptauth::GetMyDevicesRequest expected_request;
|
| - EXPECT_TRUE(expected_request.ParseFromString(serialized_request_));
|
| -
|
| - const cryptauth::DeviceClassifier& device_classifier =
|
| - expected_request.device_classifier();
|
| - EXPECT_EQ(kDeviceOsVersionCode, device_classifier.device_os_version_code());
|
| - EXPECT_EQ(kDeviceSoftwareVersionCode,
|
| - device_classifier.device_software_version_code());
|
| - EXPECT_EQ(kDeviceSoftwarePackage,
|
| - device_classifier.device_software_package());
|
| - EXPECT_EQ(kDeviceType, device_classifier.device_type());
|
| -}
|
| -
|
| -TEST_F(ProximityAuthCryptAuthClientTest, GetAccessTokenUsed) {
|
| - EXPECT_TRUE(client_->GetAccessTokenUsed().empty());
|
| - ExpectRequest(
|
| - "https://www.testgoogleapis.com/cryptauth/v1/deviceSync/"
|
| - "getmydevices?alt=proto");
|
| -
|
| - cryptauth::GetMyDevicesResponse result_proto;
|
| - cryptauth::GetMyDevicesRequest request_proto;
|
| - request_proto.set_allow_stale_read(true);
|
| - client_->GetMyDevices(
|
| - request_proto,
|
| - base::Bind(&SaveResult<cryptauth::GetMyDevicesResponse>, &result_proto),
|
| - base::Bind(&NotCalled<std::string>));
|
| - EXPECT_EQ(kAccessToken, client_->GetAccessTokenUsed());
|
| -}
|
| -
|
| -} // namespace proximity_auth
|
|
|