| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/run_loop.h" | 5 #include "base/run_loop.h" |
| 6 #include "base/strings/string_util.h" | 6 #include "base/strings/string_util.h" |
| 7 #include "google_apis/gaia/google_service_auth_error.h" | 7 #include "google_apis/gaia/google_service_auth_error.h" |
| 8 #include "net/url_request/test_url_fetcher_factory.h" | 8 #include "net/url_request/test_url_fetcher_factory.h" |
| 9 #include "net/url_request/url_request_test_util.h" | 9 #include "net/url_request/url_request_test_util.h" |
| 10 #include "sync/notifier/gcm_network_channel.h" | 10 #include "sync/notifier/gcm_network_channel.h" |
| (...skipping 231 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 242 EXPECT_EQ(TRANSIENT_INVALIDATION_ERROR, get_last_invalidator_state()); | 242 EXPECT_EQ(TRANSIENT_INVALIDATION_ERROR, get_last_invalidator_state()); |
| 243 EXPECT_FALSE(delegate()->message_callback.is_null()); | 243 EXPECT_FALSE(delegate()->message_callback.is_null()); |
| 244 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), | 244 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), |
| 245 std::string(), | 245 std::string(), |
| 246 net::HTTP_NO_CONTENT, | 246 net::HTTP_NO_CONTENT, |
| 247 net::URLRequestStatus::SUCCESS); | 247 net::URLRequestStatus::SUCCESS); |
| 248 | 248 |
| 249 // After construction GCMNetworkChannel should have called Register. | 249 // After construction GCMNetworkChannel should have called Register. |
| 250 EXPECT_FALSE(delegate()->register_callback.is_null()); | 250 EXPECT_FALSE(delegate()->register_callback.is_null()); |
| 251 // Return valid registration id. | 251 // Return valid registration id. |
| 252 delegate()->register_callback.Run("registration.id", gcm::GCMClient::SUCCESS); | 252 delegate()->register_callback.Run("registration.id", gcm::RESULT_SUCCESS); |
| 253 | 253 |
| 254 network_channel()->SendMessage("abra.cadabra"); | 254 network_channel()->SendMessage("abra.cadabra"); |
| 255 // SendMessage should have triggered RequestToken. No HTTP request should be | 255 // SendMessage should have triggered RequestToken. No HTTP request should be |
| 256 // started yet. | 256 // started yet. |
| 257 EXPECT_FALSE(delegate()->request_token_callback.is_null()); | 257 EXPECT_FALSE(delegate()->request_token_callback.is_null()); |
| 258 EXPECT_EQ(url_fetchers_created_count(), 0); | 258 EXPECT_EQ(url_fetchers_created_count(), 0); |
| 259 // Return valid access token. This should trigger HTTP request. | 259 // Return valid access token. This should trigger HTTP request. |
| 260 delegate()->request_token_callback.Run( | 260 delegate()->request_token_callback.Run( |
| 261 GoogleServiceAuthError::AuthErrorNone(), "access.token"); | 261 GoogleServiceAuthError::AuthErrorNone(), "access.token"); |
| 262 RunLoopUntilIdle(); | 262 RunLoopUntilIdle(); |
| 263 EXPECT_EQ(url_fetchers_created_count(), 1); | 263 EXPECT_EQ(url_fetchers_created_count(), 1); |
| 264 | 264 |
| 265 // Return another access token. Message should be cleared by now and shouldn't | 265 // Return another access token. Message should be cleared by now and shouldn't |
| 266 // be sent. | 266 // be sent. |
| 267 delegate()->request_token_callback.Run( | 267 delegate()->request_token_callback.Run( |
| 268 GoogleServiceAuthError::AuthErrorNone(), "access.token2"); | 268 GoogleServiceAuthError::AuthErrorNone(), "access.token2"); |
| 269 RunLoopUntilIdle(); | 269 RunLoopUntilIdle(); |
| 270 EXPECT_EQ(url_fetchers_created_count(), 1); | 270 EXPECT_EQ(url_fetchers_created_count(), 1); |
| 271 EXPECT_EQ(INVALIDATIONS_ENABLED, get_last_invalidator_state()); | 271 EXPECT_EQ(INVALIDATIONS_ENABLED, get_last_invalidator_state()); |
| 272 } | 272 } |
| 273 | 273 |
| 274 TEST_F(GCMNetworkChannelTest, FailedRegister) { | 274 TEST_F(GCMNetworkChannelTest, FailedRegister) { |
| 275 // After construction GCMNetworkChannel should have called Register. | 275 // After construction GCMNetworkChannel should have called Register. |
| 276 EXPECT_FALSE(delegate()->register_callback.is_null()); | 276 EXPECT_FALSE(delegate()->register_callback.is_null()); |
| 277 EXPECT_EQ(1, delegate()->register_call_count_); | 277 EXPECT_EQ(1, delegate()->register_call_count_); |
| 278 // Return transient error from Register call. | 278 // Return transient error from Register call. |
| 279 delegate()->register_callback.Run("", gcm::GCMClient::NETWORK_ERROR); | 279 delegate()->register_callback.Run("", gcm::RESULT_NETWORK_ERROR); |
| 280 RunLoopUntilIdle(); | 280 RunLoopUntilIdle(); |
| 281 // GcmNetworkChannel should have scheduled Register retry. | 281 // GcmNetworkChannel should have scheduled Register retry. |
| 282 EXPECT_EQ(2, delegate()->register_call_count_); | 282 EXPECT_EQ(2, delegate()->register_call_count_); |
| 283 // Return persistent error from Register call. | 283 // Return persistent error from Register call. |
| 284 delegate()->register_callback.Run("", gcm::GCMClient::NOT_SIGNED_IN); | 284 delegate()->register_callback.Run("", gcm::RESULT_NOT_SIGNED_IN); |
| 285 RunLoopUntilIdle(); | 285 RunLoopUntilIdle(); |
| 286 // GcmNetworkChannel should give up trying. | 286 // GcmNetworkChannel should give up trying. |
| 287 EXPECT_EQ(2, delegate()->register_call_count_); | 287 EXPECT_EQ(2, delegate()->register_call_count_); |
| 288 | 288 |
| 289 network_channel()->SendMessage("abra.cadabra"); | 289 network_channel()->SendMessage("abra.cadabra"); |
| 290 // SendMessage shouldn't trigger RequestToken. | 290 // SendMessage shouldn't trigger RequestToken. |
| 291 EXPECT_TRUE(delegate()->request_token_callback.is_null()); | 291 EXPECT_TRUE(delegate()->request_token_callback.is_null()); |
| 292 EXPECT_EQ(0, url_fetchers_created_count()); | 292 EXPECT_EQ(0, url_fetchers_created_count()); |
| 293 } | 293 } |
| 294 | 294 |
| 295 TEST_F(GCMNetworkChannelTest, RegisterFinishesAfterSendMessage) { | 295 TEST_F(GCMNetworkChannelTest, RegisterFinishesAfterSendMessage) { |
| 296 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), | 296 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), |
| 297 "", | 297 "", |
| 298 net::HTTP_NO_CONTENT, | 298 net::HTTP_NO_CONTENT, |
| 299 net::URLRequestStatus::SUCCESS); | 299 net::URLRequestStatus::SUCCESS); |
| 300 | 300 |
| 301 // After construction GCMNetworkChannel should have called Register. | 301 // After construction GCMNetworkChannel should have called Register. |
| 302 EXPECT_FALSE(delegate()->register_callback.is_null()); | 302 EXPECT_FALSE(delegate()->register_callback.is_null()); |
| 303 | 303 |
| 304 network_channel()->SendMessage("abra.cadabra"); | 304 network_channel()->SendMessage("abra.cadabra"); |
| 305 // SendMessage shouldn't trigger RequestToken. | 305 // SendMessage shouldn't trigger RequestToken. |
| 306 EXPECT_TRUE(delegate()->request_token_callback.is_null()); | 306 EXPECT_TRUE(delegate()->request_token_callback.is_null()); |
| 307 EXPECT_EQ(url_fetchers_created_count(), 0); | 307 EXPECT_EQ(url_fetchers_created_count(), 0); |
| 308 | 308 |
| 309 // Return valid registration id. | 309 // Return valid registration id. |
| 310 delegate()->register_callback.Run("registration.id", gcm::GCMClient::SUCCESS); | 310 delegate()->register_callback.Run("registration.id", gcm::RESULT_SUCCESS); |
| 311 | 311 |
| 312 EXPECT_FALSE(delegate()->request_token_callback.is_null()); | 312 EXPECT_FALSE(delegate()->request_token_callback.is_null()); |
| 313 EXPECT_EQ(url_fetchers_created_count(), 0); | 313 EXPECT_EQ(url_fetchers_created_count(), 0); |
| 314 // Return valid access token. This should trigger HTTP request. | 314 // Return valid access token. This should trigger HTTP request. |
| 315 delegate()->request_token_callback.Run( | 315 delegate()->request_token_callback.Run( |
| 316 GoogleServiceAuthError::AuthErrorNone(), "access.token"); | 316 GoogleServiceAuthError::AuthErrorNone(), "access.token"); |
| 317 RunLoopUntilIdle(); | 317 RunLoopUntilIdle(); |
| 318 EXPECT_EQ(url_fetchers_created_count(), 1); | 318 EXPECT_EQ(url_fetchers_created_count(), 1); |
| 319 } | 319 } |
| 320 | 320 |
| 321 TEST_F(GCMNetworkChannelTest, RequestTokenFailure) { | 321 TEST_F(GCMNetworkChannelTest, RequestTokenFailure) { |
| 322 // After construction GCMNetworkChannel should have called Register. | 322 // After construction GCMNetworkChannel should have called Register. |
| 323 EXPECT_FALSE(delegate()->register_callback.is_null()); | 323 EXPECT_FALSE(delegate()->register_callback.is_null()); |
| 324 // Return valid registration id. | 324 // Return valid registration id. |
| 325 delegate()->register_callback.Run("registration.id", gcm::GCMClient::SUCCESS); | 325 delegate()->register_callback.Run("registration.id", gcm::RESULT_SUCCESS); |
| 326 | 326 |
| 327 network_channel()->SendMessage("abra.cadabra"); | 327 network_channel()->SendMessage("abra.cadabra"); |
| 328 // SendMessage should have triggered RequestToken. No HTTP request should be | 328 // SendMessage should have triggered RequestToken. No HTTP request should be |
| 329 // started yet. | 329 // started yet. |
| 330 EXPECT_FALSE(delegate()->request_token_callback.is_null()); | 330 EXPECT_FALSE(delegate()->request_token_callback.is_null()); |
| 331 EXPECT_EQ(url_fetchers_created_count(), 0); | 331 EXPECT_EQ(url_fetchers_created_count(), 0); |
| 332 // RequestToken returns failure. | 332 // RequestToken returns failure. |
| 333 delegate()->request_token_callback.Run( | 333 delegate()->request_token_callback.Run( |
| 334 GoogleServiceAuthError::FromConnectionError(1), ""); | 334 GoogleServiceAuthError::FromConnectionError(1), ""); |
| 335 | 335 |
| 336 // Should be no HTTP requests. | 336 // Should be no HTTP requests. |
| 337 EXPECT_EQ(url_fetchers_created_count(), 0); | 337 EXPECT_EQ(url_fetchers_created_count(), 0); |
| 338 } | 338 } |
| 339 | 339 |
| 340 TEST_F(GCMNetworkChannelTest, AuthErrorFromServer) { | 340 TEST_F(GCMNetworkChannelTest, AuthErrorFromServer) { |
| 341 // Setup fake response to return AUTH_ERROR. | 341 // Setup fake response to return AUTH_ERROR. |
| 342 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), | 342 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), |
| 343 "", | 343 "", |
| 344 net::HTTP_UNAUTHORIZED, | 344 net::HTTP_UNAUTHORIZED, |
| 345 net::URLRequestStatus::SUCCESS); | 345 net::URLRequestStatus::SUCCESS); |
| 346 | 346 |
| 347 // After construction GCMNetworkChannel should have called Register. | 347 // After construction GCMNetworkChannel should have called Register. |
| 348 EXPECT_FALSE(delegate()->register_callback.is_null()); | 348 EXPECT_FALSE(delegate()->register_callback.is_null()); |
| 349 // Return valid registration id. | 349 // Return valid registration id. |
| 350 delegate()->register_callback.Run("registration.id", gcm::GCMClient::SUCCESS); | 350 delegate()->register_callback.Run("registration.id", gcm::RESULT_SUCCESS); |
| 351 | 351 |
| 352 network_channel()->SendMessage("abra.cadabra"); | 352 network_channel()->SendMessage("abra.cadabra"); |
| 353 // SendMessage should have triggered RequestToken. No HTTP request should be | 353 // SendMessage should have triggered RequestToken. No HTTP request should be |
| 354 // started yet. | 354 // started yet. |
| 355 EXPECT_FALSE(delegate()->request_token_callback.is_null()); | 355 EXPECT_FALSE(delegate()->request_token_callback.is_null()); |
| 356 EXPECT_EQ(url_fetchers_created_count(), 0); | 356 EXPECT_EQ(url_fetchers_created_count(), 0); |
| 357 // Return valid access token. This should trigger HTTP request. | 357 // Return valid access token. This should trigger HTTP request. |
| 358 delegate()->request_token_callback.Run( | 358 delegate()->request_token_callback.Run( |
| 359 GoogleServiceAuthError::AuthErrorNone(), "access.token"); | 359 GoogleServiceAuthError::AuthErrorNone(), "access.token"); |
| 360 RunLoopUntilIdle(); | 360 RunLoopUntilIdle(); |
| 361 EXPECT_EQ(url_fetchers_created_count(), 1); | 361 EXPECT_EQ(url_fetchers_created_count(), 1); |
| 362 EXPECT_EQ(delegate()->invalidated_token, "access.token"); | 362 EXPECT_EQ(delegate()->invalidated_token, "access.token"); |
| 363 } | 363 } |
| 364 | 364 |
| 365 // Following two tests are to check for memory leaks/crashes when Register and | 365 // Following two tests are to check for memory leaks/crashes when Register and |
| 366 // RequestToken don't complete by the teardown. | 366 // RequestToken don't complete by the teardown. |
| 367 TEST_F(GCMNetworkChannelTest, RegisterNeverCompletes) { | 367 TEST_F(GCMNetworkChannelTest, RegisterNeverCompletes) { |
| 368 network_channel()->SendMessage("abra.cadabra"); | 368 network_channel()->SendMessage("abra.cadabra"); |
| 369 // Register should be called by now. Let's not complete and see what happens. | 369 // Register should be called by now. Let's not complete and see what happens. |
| 370 EXPECT_FALSE(delegate()->register_callback.is_null()); | 370 EXPECT_FALSE(delegate()->register_callback.is_null()); |
| 371 } | 371 } |
| 372 | 372 |
| 373 TEST_F(GCMNetworkChannelTest, RequestTokenNeverCompletes) { | 373 TEST_F(GCMNetworkChannelTest, RequestTokenNeverCompletes) { |
| 374 network_channel()->SendMessage("abra.cadabra"); | 374 network_channel()->SendMessage("abra.cadabra"); |
| 375 // Return valid registration id. | 375 // Return valid registration id. |
| 376 delegate()->register_callback.Run("registration.id", gcm::GCMClient::SUCCESS); | 376 delegate()->register_callback.Run("registration.id", gcm::RESULT_SUCCESS); |
| 377 // RequestToken should be called by now. Let's not complete and see what | 377 // RequestToken should be called by now. Let's not complete and see what |
| 378 // happens. | 378 // happens. |
| 379 EXPECT_FALSE(delegate()->request_token_callback.is_null()); | 379 EXPECT_FALSE(delegate()->request_token_callback.is_null()); |
| 380 } | 380 } |
| 381 | 381 |
| 382 TEST_F(GCMNetworkChannelTest, Base64EncodeDecode) { | 382 TEST_F(GCMNetworkChannelTest, Base64EncodeDecode) { |
| 383 std::string input; | 383 std::string input; |
| 384 std::string plain; | 384 std::string plain; |
| 385 std::string base64; | 385 std::string base64; |
| 386 // Empty string. | 386 // Empty string. |
| (...skipping 20 matching lines...) Expand all Loading... |
| 407 } | 407 } |
| 408 | 408 |
| 409 TEST_F(GCMNetworkChannelTest, TransientError) { | 409 TEST_F(GCMNetworkChannelTest, TransientError) { |
| 410 EXPECT_FALSE(delegate()->message_callback.is_null()); | 410 EXPECT_FALSE(delegate()->message_callback.is_null()); |
| 411 // POST will fail. | 411 // POST will fail. |
| 412 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), | 412 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), |
| 413 std::string(), | 413 std::string(), |
| 414 net::HTTP_SERVICE_UNAVAILABLE, | 414 net::HTTP_SERVICE_UNAVAILABLE, |
| 415 net::URLRequestStatus::SUCCESS); | 415 net::URLRequestStatus::SUCCESS); |
| 416 | 416 |
| 417 delegate()->register_callback.Run("registration.id", gcm::GCMClient::SUCCESS); | 417 delegate()->register_callback.Run("registration.id", gcm::RESULT_SUCCESS); |
| 418 | 418 |
| 419 network_channel()->SendMessage("abra.cadabra"); | 419 network_channel()->SendMessage("abra.cadabra"); |
| 420 EXPECT_FALSE(delegate()->request_token_callback.is_null()); | 420 EXPECT_FALSE(delegate()->request_token_callback.is_null()); |
| 421 delegate()->request_token_callback.Run( | 421 delegate()->request_token_callback.Run( |
| 422 GoogleServiceAuthError::AuthErrorNone(), "access.token"); | 422 GoogleServiceAuthError::AuthErrorNone(), "access.token"); |
| 423 RunLoopUntilIdle(); | 423 RunLoopUntilIdle(); |
| 424 EXPECT_EQ(url_fetchers_created_count(), 1); | 424 EXPECT_EQ(url_fetchers_created_count(), 1); |
| 425 // Failing HTTP POST should cause TRANSIENT_INVALIDATION_ERROR. | 425 // Failing HTTP POST should cause TRANSIENT_INVALIDATION_ERROR. |
| 426 EXPECT_EQ(TRANSIENT_INVALIDATION_ERROR, get_last_invalidator_state()); | 426 EXPECT_EQ(TRANSIENT_INVALIDATION_ERROR, get_last_invalidator_state()); |
| 427 // Network change to CONNECTION_NONE shouldn't affect invalidator state. | 427 // Network change to CONNECTION_NONE shouldn't affect invalidator state. |
| (...skipping 21 matching lines...) Expand all Loading... |
| 449 EXPECT_TRUE(Base64DecodeURLSafe(parts[parts.size() - 1], &buffer)); | 449 EXPECT_TRUE(Base64DecodeURLSafe(parts[parts.size() - 1], &buffer)); |
| 450 } | 450 } |
| 451 | 451 |
| 452 TEST_F(GCMNetworkChannelTest, EchoToken) { | 452 TEST_F(GCMNetworkChannelTest, EchoToken) { |
| 453 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), | 453 url_fetcher_factory()->SetFakeResponse(GURL("http://test.url.com"), |
| 454 std::string(), | 454 std::string(), |
| 455 net::HTTP_OK, | 455 net::HTTP_OK, |
| 456 net::URLRequestStatus::SUCCESS); | 456 net::URLRequestStatus::SUCCESS); |
| 457 // After construction GCMNetworkChannel should have called Register. | 457 // After construction GCMNetworkChannel should have called Register. |
| 458 // Return valid registration id. | 458 // Return valid registration id. |
| 459 delegate()->register_callback.Run("registration.id", gcm::GCMClient::SUCCESS); | 459 delegate()->register_callback.Run("registration.id", gcm::RESULT_SUCCESS); |
| 460 | 460 |
| 461 network_channel()->SendMessage("abra.cadabra"); | 461 network_channel()->SendMessage("abra.cadabra"); |
| 462 // Return valid access token. This should trigger HTTP request. | 462 // Return valid access token. This should trigger HTTP request. |
| 463 delegate()->request_token_callback.Run( | 463 delegate()->request_token_callback.Run( |
| 464 GoogleServiceAuthError::AuthErrorNone(), "access.token"); | 464 GoogleServiceAuthError::AuthErrorNone(), "access.token"); |
| 465 RunLoopUntilIdle(); | 465 RunLoopUntilIdle(); |
| 466 EXPECT_EQ(url_fetchers_created_count(), 1); | 466 EXPECT_EQ(url_fetchers_created_count(), 1); |
| 467 EXPECT_TRUE(get_last_echo_token().empty()); | 467 EXPECT_TRUE(get_last_echo_token().empty()); |
| 468 | 468 |
| 469 // Trigger response. | 469 // Trigger response. |
| (...skipping 15 matching lines...) Expand all Loading... |
| 485 delegate()->request_token_callback.Run( | 485 delegate()->request_token_callback.Run( |
| 486 GoogleServiceAuthError::AuthErrorNone(), "access.token"); | 486 GoogleServiceAuthError::AuthErrorNone(), "access.token"); |
| 487 RunLoopUntilIdle(); | 487 RunLoopUntilIdle(); |
| 488 EXPECT_EQ(url_fetchers_created_count(), 3); | 488 EXPECT_EQ(url_fetchers_created_count(), 3); |
| 489 // Echo_token should be from second message. | 489 // Echo_token should be from second message. |
| 490 EXPECT_EQ("echo.token", get_last_echo_token()); | 490 EXPECT_EQ("echo.token", get_last_echo_token()); |
| 491 } | 491 } |
| 492 #endif | 492 #endif |
| 493 | 493 |
| 494 } // namespace syncer | 494 } // namespace syncer |
| OLD | NEW |