Chromium Code Reviews| Index: chromeos/components/tether/active_host_unittest.cc |
| diff --git a/chromeos/components/tether/active_host_unittest.cc b/chromeos/components/tether/active_host_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..0dfd224bdd31d30f9555999a5a778d7905f8d106 |
| --- /dev/null |
| +++ b/chromeos/components/tether/active_host_unittest.cc |
| @@ -0,0 +1,177 @@ |
| +// Copyright 2017 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "chromeos/components/tether/active_host.h" |
| + |
| +#include <memory> |
| + |
| +#include "base/bind.h" |
| +#include "base/macros.h" |
| +#include "base/memory/ptr_util.h" |
| +#include "chromeos/components/tether/fake_tether_host_fetcher.h" |
| +#include "components/cryptauth/remote_device.h" |
| +#include "components/cryptauth/remote_device_test_util.h" |
| +#include "components/prefs/testing_pref_service.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +namespace chromeos { |
| + |
| +namespace tether { |
| + |
| +namespace { |
| + |
| +struct GetActiveHostResult { |
| + ActiveHost::ActiveHostStatus active_host_status; |
| + std::shared_ptr<cryptauth::RemoteDevice> remote_device; |
| + std::string tether_network_id; |
| + |
| + bool operator==(const GetActiveHostResult& other) const { |
| + bool devices_equal; |
| + if (remote_device) { |
| + devices_equal = |
| + other.remote_device && *remote_device == *other.remote_device; |
| + } else { |
| + devices_equal = !other.remote_device; |
| + } |
| + |
| + return active_host_status == other.active_host_status && devices_equal && |
| + tether_network_id == other.tether_network_id; |
| + } |
| +}; |
| + |
| +} // namespace |
| + |
| +class ActiveHostTest : public testing::Test { |
| + public: |
| + ActiveHostTest() : test_devices_(cryptauth::GenerateTestRemoteDevices(4)) {} |
| + |
| + void SetUp() override { |
| + get_active_host_results_.clear(); |
| + |
| + test_pref_service_ = base::MakeUnique<TestingPrefServiceSimple>(); |
| + fake_tether_host_fetcher_ = base::MakeUnique<FakeTetherHostFetcher>( |
| + test_devices_, false /* synchronously_reply_with_results */); |
| + |
| + ActiveHost::RegisterPrefs(test_pref_service_->registry()); |
| + active_host_ = base::MakeUnique<ActiveHost>(fake_tether_host_fetcher_.get(), |
| + test_pref_service_.get()); |
| + } |
| + |
| + void OnActiveHostFetched(ActiveHost::ActiveHostStatus active_host_status, |
| + std::unique_ptr<cryptauth::RemoteDevice> active_host, |
| + const std::string& tether_network_id) { |
| + get_active_host_results_.push_back(GetActiveHostResult{ |
| + active_host_status, std::move(active_host), tether_network_id}); |
| + } |
| + |
| + void VerifyActiveHostDisconnected() { |
| + EXPECT_EQ(ActiveHost::ActiveHostStatus::DISCONNECTED, |
| + active_host_->GetActiveHostStatus()); |
| + EXPECT_TRUE(active_host_->GetActiveHostDeviceId().empty()); |
| + EXPECT_TRUE(active_host_->GetTetherNetworkId().empty()); |
| + |
| + active_host_->GetActiveHost(base::Bind(&ActiveHostTest::OnActiveHostFetched, |
| + base::Unretained(this))); |
| + fake_tether_host_fetcher_->InvokePendingCallbacks(); |
| + ASSERT_EQ(1u, get_active_host_results_.size()); |
| + EXPECT_EQ((GetActiveHostResult{ActiveHost::ActiveHostStatus::DISCONNECTED, |
| + nullptr, std::string()}), |
| + get_active_host_results_[0]); |
| + } |
| + |
| + const std::vector<cryptauth::RemoteDevice> test_devices_; |
| + |
| + std::unique_ptr<TestingPrefServiceSimple> test_pref_service_; |
| + std::unique_ptr<FakeTetherHostFetcher> fake_tether_host_fetcher_; |
| + |
| + std::vector<GetActiveHostResult> get_active_host_results_; |
| + |
| + std::unique_ptr<ActiveHost> active_host_; |
| + |
| + private: |
| + DISALLOW_COPY_AND_ASSIGN(ActiveHostTest); |
| +}; |
| + |
| +TEST_F(ActiveHostTest, TestDefaultValues) { |
| + VerifyActiveHostDisconnected(); |
| +} |
| + |
| +TEST_F(ActiveHostTest, TestDisconnected) { |
| + active_host_->SetActiveHostDisconnected(); |
| + VerifyActiveHostDisconnected(); |
| +} |
| + |
| +TEST_F(ActiveHostTest, TestConnecting) { |
| + active_host_->SetActiveHostConnecting(test_devices_[0].GetDeviceId()); |
| + |
| + EXPECT_EQ(ActiveHost::ActiveHostStatus::CONNECTING, |
| + active_host_->GetActiveHostStatus()); |
| + EXPECT_EQ(test_devices_[0].GetDeviceId(), |
| + active_host_->GetActiveHostDeviceId()); |
| + EXPECT_TRUE(active_host_->GetTetherNetworkId().empty()); |
| + |
| + active_host_->GetActiveHost( |
| + base::Bind(&ActiveHostTest::OnActiveHostFetched, base::Unretained(this))); |
| + fake_tether_host_fetcher_->InvokePendingCallbacks(); |
| + ASSERT_EQ(1u, get_active_host_results_.size()); |
| + EXPECT_EQ( |
| + (GetActiveHostResult{ActiveHost::ActiveHostStatus::CONNECTING, |
| + std::shared_ptr<cryptauth::RemoteDevice>( |
| + new cryptauth::RemoteDevice(test_devices_[0])), |
| + std::string()}), |
| + get_active_host_results_[0]); |
| +} |
| + |
| +TEST_F(ActiveHostTest, TestConnected) { |
| + active_host_->SetActiveHostConnected(test_devices_[0].GetDeviceId(), |
| + "tetherNetworkId"); |
| + |
| + EXPECT_EQ(ActiveHost::ActiveHostStatus::CONNECTED, |
| + active_host_->GetActiveHostStatus()); |
| + EXPECT_EQ(test_devices_[0].GetDeviceId(), |
| + active_host_->GetActiveHostDeviceId()); |
| + EXPECT_EQ("tetherNetworkId", active_host_->GetTetherNetworkId()); |
| + |
| + active_host_->GetActiveHost( |
| + base::Bind(&ActiveHostTest::OnActiveHostFetched, base::Unretained(this))); |
| + fake_tether_host_fetcher_->InvokePendingCallbacks(); |
| + ASSERT_EQ(1u, get_active_host_results_.size()); |
| + EXPECT_EQ( |
| + (GetActiveHostResult{ActiveHost::ActiveHostStatus::CONNECTED, |
| + std::shared_ptr<cryptauth::RemoteDevice>( |
| + new cryptauth::RemoteDevice(test_devices_[0])), |
| + "tetherNetworkId"}), |
| + get_active_host_results_[0]); |
| +} |
| + |
| +TEST_F(ActiveHostTest, TestActiveHostChangesDuringFetch) { |
| + active_host_->SetActiveHostConnected(test_devices_[0].GetDeviceId(), |
| + "tetherNetworkId"); |
| + |
| + EXPECT_EQ(ActiveHost::ActiveHostStatus::CONNECTED, |
| + active_host_->GetActiveHostStatus()); |
| + EXPECT_EQ(test_devices_[0].GetDeviceId(), |
| + active_host_->GetActiveHostDeviceId()); |
| + EXPECT_EQ("tetherNetworkId", active_host_->GetTetherNetworkId()); |
| + |
| + // Start a fetch for the active host. |
| + active_host_->GetActiveHost( |
| + base::Bind(&ActiveHostTest::OnActiveHostFetched, base::Unretained(this))); |
| + |
| + // While the fetch is in progress, simulate a disconnection occurring. |
| + active_host_->SetActiveHostDisconnected(); |
|
Ryan Hansberry
2017/03/09 19:18:20
I don't doubt that this could happen, but when do
Kyle Horimoto
2017/03/09 19:29:28
0) Connected to a device.
1) Someone calls GetActi
|
| + |
| + // Now, finish the fech. |
| + fake_tether_host_fetcher_->InvokePendingCallbacks(); |
| + |
| + // The resulting callback should indicate that there is no active host. |
| + ASSERT_EQ(1u, get_active_host_results_.size()); |
| + EXPECT_EQ((GetActiveHostResult{ActiveHost::ActiveHostStatus::DISCONNECTED, |
| + nullptr, ""}), |
| + get_active_host_results_[0]); |
| +} |
| + |
| +} // namespace tether |
| + |
| +} // namespace cryptauth |