| OLD | NEW |
| 1 // Copyright 2017 The Chromium Authors. All rights reserved. | 1 // Copyright 2017 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chromeos/components/tether/message_wrapper.h" | 5 #include "chromeos/components/tether/message_wrapper.h" |
| 6 | 6 |
| 7 #include <sstream> | 7 #include <sstream> |
| 8 | 8 |
| 9 #include "base/base64url.h" | 9 #include "base/base64url.h" |
| 10 #include "base/logging.h" | 10 #include "base/logging.h" |
| 11 #include "base/macros.h" | 11 #include "base/macros.h" |
| 12 #include "chromeos/components/tether/proto/tether.pb.h" | 12 #include "chromeos/components/tether/proto/tether.pb.h" |
| 13 #include "chromeos/components/tether/proto_test_util.h" |
| 13 #include "testing/gmock/include/gmock/gmock.h" | 14 #include "testing/gmock/include/gmock/gmock.h" |
| 14 #include "testing/gtest/include/gtest/gtest.h" | 15 #include "testing/gtest/include/gtest/gtest.h" |
| 15 | 16 |
| 16 namespace chromeos { | 17 namespace chromeos { |
| 17 | 18 |
| 18 namespace tether { | 19 namespace tether { |
| 19 | 20 |
| 20 namespace { | 21 namespace { |
| 21 | 22 |
| 22 DeviceStatus CreateFakeDeviceStatus() { | |
| 23 WifiStatus wifi_status; | |
| 24 wifi_status.set_status_code( | |
| 25 WifiStatus_StatusCode::WifiStatus_StatusCode_CONNECTED); | |
| 26 wifi_status.set_ssid("Google A"); | |
| 27 | |
| 28 DeviceStatus device_status; | |
| 29 device_status.set_battery_percentage(75); | |
| 30 device_status.set_cell_provider("Google Fi"); | |
| 31 device_status.set_connection_strength(4); | |
| 32 device_status.mutable_wifi_status()->CopyFrom(wifi_status); | |
| 33 | |
| 34 return device_status; | |
| 35 } | |
| 36 | |
| 37 TetherAvailabilityResponse CreateTetherAvailabilityResponse() { | 23 TetherAvailabilityResponse CreateTetherAvailabilityResponse() { |
| 38 TetherAvailabilityResponse response; | 24 TetherAvailabilityResponse response; |
| 39 response.set_response_code( | 25 response.set_response_code( |
| 40 TetherAvailabilityResponse_ResponseCode:: | 26 TetherAvailabilityResponse_ResponseCode:: |
| 41 TetherAvailabilityResponse_ResponseCode_TETHER_AVAILABLE); | 27 TetherAvailabilityResponse_ResponseCode_TETHER_AVAILABLE); |
| 42 response.mutable_device_status()->CopyFrom(CreateFakeDeviceStatus()); | 28 response.mutable_device_status()->CopyFrom( |
| 29 CreateDeviceStatusWithFakeFields()); |
| 43 return response; | 30 return response; |
| 44 } | 31 } |
| 45 | 32 |
| 46 void VerifyProtoConversion(const google::protobuf::MessageLite* proto, | 33 void VerifyProtoConversion(const google::protobuf::MessageLite* proto, |
| 47 const MessageWrapper& wrapper, | 34 const MessageWrapper& wrapper, |
| 48 const MessageType& expected_message_type) { | 35 const MessageType& expected_message_type) { |
| 49 std::string raw_message = wrapper.ToRawMessage(); | 36 std::string raw_message = wrapper.ToRawMessage(); |
| 50 EXPECT_TRUE(raw_message.length() > 0); | 37 EXPECT_TRUE(raw_message.length() > 0); |
| 51 | 38 |
| 52 std::unique_ptr<MessageWrapper> wrapper_from_raw_message = | 39 std::unique_ptr<MessageWrapper> wrapper_from_raw_message = |
| (...skipping 21 matching lines...) Expand all Loading... |
| 74 VerifyProtoConversion(&request, wrapper, | 61 VerifyProtoConversion(&request, wrapper, |
| 75 MessageType::CONNECT_TETHERING_REQUEST); | 62 MessageType::CONNECT_TETHERING_REQUEST); |
| 76 } | 63 } |
| 77 | 64 |
| 78 TEST_F(MessageWrapperTest, TestToAndFromRawMessage_ConnectTetheringResponse) { | 65 TEST_F(MessageWrapperTest, TestToAndFromRawMessage_ConnectTetheringResponse) { |
| 79 ConnectTetheringResponse response; | 66 ConnectTetheringResponse response; |
| 80 response.set_ssid("Instant Tethering 123456"); | 67 response.set_ssid("Instant Tethering 123456"); |
| 81 response.set_password("password"); | 68 response.set_password("password"); |
| 82 response.set_response_code(ConnectTetheringResponse_ResponseCode:: | 69 response.set_response_code(ConnectTetheringResponse_ResponseCode:: |
| 83 ConnectTetheringResponse_ResponseCode_SUCCESS); | 70 ConnectTetheringResponse_ResponseCode_SUCCESS); |
| 84 response.mutable_device_status()->CopyFrom(CreateFakeDeviceStatus()); | 71 response.mutable_device_status()->CopyFrom( |
| 72 CreateDeviceStatusWithFakeFields()); |
| 85 | 73 |
| 86 MessageWrapper wrapper(response); | 74 MessageWrapper wrapper(response); |
| 87 VerifyProtoConversion(&response, wrapper, | 75 VerifyProtoConversion(&response, wrapper, |
| 88 MessageType::CONNECT_TETHERING_RESPONSE); | 76 MessageType::CONNECT_TETHERING_RESPONSE); |
| 89 } | 77 } |
| 90 | 78 |
| 91 TEST_F(MessageWrapperTest, TestToAndFromRawMessage_DisconnectTetheringRequest) { | 79 TEST_F(MessageWrapperTest, TestToAndFromRawMessage_DisconnectTetheringRequest) { |
| 92 DisconnectTetheringRequest request; | 80 DisconnectTetheringRequest request; |
| 93 | 81 |
| 94 MessageWrapper wrapper(request); | 82 MessageWrapper wrapper(request); |
| (...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 161 << response.SerializeAsString() // Do not convert to base-64. | 149 << response.SerializeAsString() // Do not convert to base-64. |
| 162 << "\"}"; | 150 << "\"}"; |
| 163 | 151 |
| 164 EXPECT_FALSE(MessageWrapper::FromRawMessage(ss.str())); | 152 EXPECT_FALSE(MessageWrapper::FromRawMessage(ss.str())); |
| 165 } | 153 } |
| 166 | 154 |
| 167 TEST_F(MessageWrapperTest, TestFromRawMessage_StringLiteral) { | 155 TEST_F(MessageWrapperTest, TestFromRawMessage_StringLiteral) { |
| 168 // Type 2 is TETHER_AVAILABILITY_RESPONSE, and the data supplied is | 156 // Type 2 is TETHER_AVAILABILITY_RESPONSE, and the data supplied is |
| 169 // CreateTetherAvailabilityResponse() encoded in base-64. | 157 // CreateTetherAvailabilityResponse() encoded in base-64. |
| 170 std::string raw_message = | 158 std::string raw_message = |
| 171 "{\"type\":2,\"data\":\"CAESHQhLEglHb29nbGUgRmkYBCIMCAESCEdvb2dsZSBB\"}"; | 159 "{\"type\":2,\"data\":\"CAESHQhLEglHb29nbGUgRmkYBCIMCAESCFdpZmlTc2lk\"}"; |
| 172 | 160 |
| 173 std::unique_ptr<MessageWrapper> wrapper = | 161 std::unique_ptr<MessageWrapper> wrapper = |
| 174 MessageWrapper::FromRawMessage(raw_message); | 162 MessageWrapper::FromRawMessage(raw_message); |
| 175 EXPECT_TRUE(wrapper); | 163 EXPECT_TRUE(wrapper); |
| 176 EXPECT_EQ(MessageType::TETHER_AVAILABILITY_RESPONSE, | 164 EXPECT_EQ(MessageType::TETHER_AVAILABILITY_RESPONSE, |
| 177 wrapper->GetMessageType()); | 165 wrapper->GetMessageType()); |
| 178 EXPECT_EQ(CreateTetherAvailabilityResponse().SerializeAsString(), | 166 EXPECT_EQ(CreateTetherAvailabilityResponse().SerializeAsString(), |
| 179 wrapper->GetProto()->SerializeAsString()); | 167 wrapper->GetProto()->SerializeAsString()); |
| 180 } | 168 } |
| 181 | 169 |
| (...skipping 15 matching lines...) Expand all Loading... |
| 197 EXPECT_TRUE(wrapper); | 185 EXPECT_TRUE(wrapper); |
| 198 EXPECT_EQ(MessageType::TETHER_AVAILABILITY_RESPONSE, | 186 EXPECT_EQ(MessageType::TETHER_AVAILABILITY_RESPONSE, |
| 199 wrapper->GetMessageType()); | 187 wrapper->GetMessageType()); |
| 200 EXPECT_EQ(response.SerializeAsString(), | 188 EXPECT_EQ(response.SerializeAsString(), |
| 201 wrapper->GetProto()->SerializeAsString()); | 189 wrapper->GetProto()->SerializeAsString()); |
| 202 } | 190 } |
| 203 | 191 |
| 204 } // namespace tether | 192 } // namespace tether |
| 205 | 193 |
| 206 } // namespace cryptauth | 194 } // namespace cryptauth |
| OLD | NEW |