OLD | NEW |
---|---|
1 // Copyright 2012 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 #include "chrome/browser/signin/profile_oauth2_token_service_request.h" | 4 |
5 #include "google_apis/gaia/oauth2_token_service_request.h" | |
5 | 6 |
6 #include <set> | 7 #include <set> |
7 #include <string> | 8 #include <string> |
8 #include <vector> | 9 #include <vector> |
9 #include "base/threading/thread.h" | 10 #include "base/threading/thread.h" |
10 #include "chrome/browser/signin/fake_profile_oauth2_token_service.h" | 11 #include "google_apis/gaia/fake_oauth2_token_service.h" |
11 #include "chrome/browser/signin/fake_profile_oauth2_token_service_builder.h" | |
12 #include "chrome/browser/signin/profile_oauth2_token_service_factory.h" | |
13 #include "chrome/test/base/testing_profile.h" | |
14 #include "content/public/test/test_browser_thread.h" | |
15 #include "google_apis/gaia/google_service_auth_error.h" | 12 #include "google_apis/gaia/google_service_auth_error.h" |
16 #include "google_apis/gaia/oauth2_token_service.h" | 13 #include "google_apis/gaia/oauth2_token_service.h" |
17 #include "testing/gtest/include/gtest/gtest.h" | 14 #include "testing/gtest/include/gtest/gtest.h" |
18 | 15 |
19 namespace { | 16 namespace { |
20 | 17 |
21 const char kAccessToken[] = "access_token"; | 18 const char kAccessToken[] = "access_token"; |
22 const char kAccountId[] = "test_user@gmail.com"; | 19 const char kAccountId[] = "test_user@gmail.com"; |
23 const char kRefreshToken[] = "refresh_token"; | |
24 | 20 |
25 class TestingOAuth2TokenServiceConsumer : public OAuth2TokenService::Consumer { | 21 class TestingOAuth2TokenServiceConsumer : public OAuth2TokenService::Consumer { |
26 public: | 22 public: |
27 TestingOAuth2TokenServiceConsumer(); | 23 TestingOAuth2TokenServiceConsumer(); |
28 virtual ~TestingOAuth2TokenServiceConsumer(); | 24 virtual ~TestingOAuth2TokenServiceConsumer(); |
29 | 25 |
30 virtual void OnGetTokenSuccess(const OAuth2TokenService::Request* request, | 26 virtual void OnGetTokenSuccess(const OAuth2TokenService::Request* request, |
31 const std::string& access_token, | 27 const std::string& access_token, |
32 const base::Time& expiration_time) OVERRIDE; | 28 const base::Time& expiration_time) OVERRIDE; |
33 virtual void OnGetTokenFailure(const OAuth2TokenService::Request* request, | 29 virtual void OnGetTokenFailure(const OAuth2TokenService::Request* request, |
34 const GoogleServiceAuthError& error) OVERRIDE; | 30 const GoogleServiceAuthError& error) OVERRIDE; |
35 | 31 |
32 int num_get_token_success_; | |
33 int num_get_token_failure_; | |
36 std::string last_token_; | 34 std::string last_token_; |
37 int number_of_successful_tokens_; | |
38 GoogleServiceAuthError last_error_; | 35 GoogleServiceAuthError last_error_; |
39 int number_of_errors_; | |
40 }; | 36 }; |
41 | 37 |
42 TestingOAuth2TokenServiceConsumer::TestingOAuth2TokenServiceConsumer() | 38 TestingOAuth2TokenServiceConsumer::TestingOAuth2TokenServiceConsumer() |
43 : OAuth2TokenService::Consumer("test"), | 39 : OAuth2TokenService::Consumer("test"), |
44 number_of_successful_tokens_(0), | 40 num_get_token_success_(0), |
45 last_error_(GoogleServiceAuthError::AuthErrorNone()), | 41 num_get_token_failure_(0), |
46 number_of_errors_(0) { | 42 last_error_(GoogleServiceAuthError::AuthErrorNone()) { |
47 } | 43 } |
48 | 44 |
49 TestingOAuth2TokenServiceConsumer::~TestingOAuth2TokenServiceConsumer() { | 45 TestingOAuth2TokenServiceConsumer::~TestingOAuth2TokenServiceConsumer() { |
50 } | 46 } |
51 | 47 |
52 void TestingOAuth2TokenServiceConsumer::OnGetTokenSuccess( | 48 void TestingOAuth2TokenServiceConsumer::OnGetTokenSuccess( |
53 const OAuth2TokenService::Request* request, | 49 const OAuth2TokenService::Request* request, |
54 const std::string& token, | 50 const std::string& token, |
55 const base::Time& expiration_date) { | 51 const base::Time& expiration_date) { |
56 last_token_ = token; | 52 last_token_ = token; |
57 ++number_of_successful_tokens_; | 53 ++num_get_token_success_; |
58 } | 54 } |
59 | 55 |
60 void TestingOAuth2TokenServiceConsumer::OnGetTokenFailure( | 56 void TestingOAuth2TokenServiceConsumer::OnGetTokenFailure( |
61 const OAuth2TokenService::Request* request, | 57 const OAuth2TokenService::Request* request, |
62 const GoogleServiceAuthError& error) { | 58 const GoogleServiceAuthError& error) { |
63 last_error_ = error; | 59 last_error_ = error; |
64 ++number_of_errors_; | 60 ++num_get_token_failure_; |
65 } | 61 } |
66 | 62 |
67 class ProfileOAuth2TokenServiceRequestTest : public testing::Test { | 63 // A mock implementation of an OAuth2TokenService. |
64 // | |
65 // Use SetResponse to vary the response to token requests. | |
66 class MockOAuth2TokenService : public FakeOAuth2TokenService { | |
67 public: | |
68 MockOAuth2TokenService(); | |
69 virtual ~MockOAuth2TokenService(); | |
70 | |
71 void SetResponse(const GoogleServiceAuthError& error, | |
72 const std::string& access_token, | |
73 const base::Time& expiration); | |
74 int num_invalidate_token() const; | |
msarda
2014/05/30 14:37:31
Simple accessor methods should be inlined.
maniscalco
2014/05/30 17:48:08
Done.
| |
75 const std::string& last_token_invalidated() const; | |
76 | |
77 protected: | |
78 virtual void FetchOAuth2Token(RequestImpl* request, | |
79 const std::string& account_id, | |
80 net::URLRequestContextGetter* getter, | |
81 const std::string& client_id, | |
82 const std::string& client_secret, | |
83 const ScopeSet& scopes) OVERRIDE; | |
84 | |
85 virtual void InvalidateOAuth2Token(const std::string& account_id, | |
86 const std::string& client_id, | |
87 const ScopeSet& scopes, | |
88 const std::string& access_token) OVERRIDE; | |
89 | |
90 private: | |
91 GoogleServiceAuthError response_error_; | |
92 std::string response_access_token_; | |
93 base::Time response_expiration_; | |
94 int num_invalidate_token_; | |
95 std::string last_token_invalidated_; | |
96 }; | |
97 | |
98 MockOAuth2TokenService::MockOAuth2TokenService() | |
99 : response_error_(GoogleServiceAuthError::AuthErrorNone()), | |
100 response_access_token_(kAccessToken), | |
101 response_expiration_(base::Time::Max()), | |
102 num_invalidate_token_(0) { | |
103 } | |
104 | |
105 MockOAuth2TokenService::~MockOAuth2TokenService() { | |
106 } | |
107 | |
108 void MockOAuth2TokenService::SetResponse(const GoogleServiceAuthError& error, | |
109 const std::string& access_token, | |
110 const base::Time& expiration) { | |
111 response_error_ = error; | |
112 response_access_token_ = access_token; | |
113 response_expiration_ = expiration; | |
114 } | |
115 | |
116 int MockOAuth2TokenService::num_invalidate_token() const { | |
117 return num_invalidate_token_; | |
118 } | |
119 | |
120 const std::string& MockOAuth2TokenService::last_token_invalidated() const { | |
121 return last_token_invalidated_; | |
122 } | |
123 | |
124 void MockOAuth2TokenService::FetchOAuth2Token( | |
125 RequestImpl* request, | |
126 const std::string& account_id, | |
127 net::URLRequestContextGetter* getter, | |
128 const std::string& client_id, | |
129 const std::string& client_secret, | |
130 const ScopeSet& scopes) { | |
131 base::MessageLoop::current()->PostTask( | |
132 FROM_HERE, | |
133 base::Bind(&OAuth2TokenService::RequestImpl::InformConsumer, | |
134 request->AsWeakPtr(), | |
135 response_error_, | |
136 response_access_token_, | |
137 response_expiration_)); | |
138 } | |
139 | |
140 void MockOAuth2TokenService::InvalidateOAuth2Token( | |
141 const std::string& account_id, | |
142 const std::string& client_id, | |
143 const ScopeSet& scopes, | |
144 const std::string& access_token) { | |
145 ++num_invalidate_token_; | |
146 last_token_invalidated_ = access_token; | |
147 } | |
148 | |
149 class OAuth2TokenServiceRequestTest : public testing::Test { | |
68 public: | 150 public: |
69 virtual void SetUp() OVERRIDE; | 151 virtual void SetUp() OVERRIDE; |
70 | 152 |
71 protected: | 153 protected: |
154 class Provider : public OAuth2TokenServiceRequest::TokenServiceProvider { | |
155 public: | |
156 Provider(const scoped_refptr<base::SingleThreadTaskRunner>& task_runner, | |
157 OAuth2TokenService* token_service); | |
158 | |
159 virtual scoped_refptr<base::SingleThreadTaskRunner> | |
160 GetTokenServiceTaskRunner() OVERRIDE; | |
161 virtual OAuth2TokenService* GetTokenService() OVERRIDE; | |
162 | |
163 private: | |
164 scoped_refptr<base::SingleThreadTaskRunner> task_runner_; | |
165 OAuth2TokenService* token_service_; | |
166 }; | |
167 | |
72 base::MessageLoop ui_loop_; | 168 base::MessageLoop ui_loop_; |
73 scoped_ptr<content::TestBrowserThread> ui_thread_; | 169 scoped_ptr<MockOAuth2TokenService> oauth2_service_; |
74 | 170 scoped_ptr<OAuth2TokenServiceRequest::TokenServiceProvider> provider_; |
75 scoped_ptr<Profile> profile_; | |
76 TestingOAuth2TokenServiceConsumer consumer_; | 171 TestingOAuth2TokenServiceConsumer consumer_; |
77 FakeProfileOAuth2TokenService* oauth2_service_; | |
78 | |
79 scoped_ptr<ProfileOAuth2TokenServiceRequest> request_; | |
80 }; | 172 }; |
81 | 173 |
82 void ProfileOAuth2TokenServiceRequestTest::SetUp() { | 174 void OAuth2TokenServiceRequestTest::SetUp() { |
83 ui_thread_.reset(new content::TestBrowserThread(content::BrowserThread::UI, | 175 oauth2_service_.reset(new MockOAuth2TokenService); |
84 &ui_loop_)); | 176 oauth2_service_->AddAccount(kAccountId); |
85 TestingProfile::Builder builder; | 177 provider_.reset( |
86 builder.AddTestingFactory(ProfileOAuth2TokenServiceFactory::GetInstance(), | 178 new Provider(base::MessageLoopProxy::current(), oauth2_service_.get())); |
87 &BuildFakeProfileOAuth2TokenService); | 179 } |
88 profile_ = builder.Build(); | 180 |
89 | 181 OAuth2TokenServiceRequestTest::Provider::Provider( |
90 oauth2_service_ = (FakeProfileOAuth2TokenService*) | 182 const scoped_refptr<base::SingleThreadTaskRunner>& task_runner, |
91 ProfileOAuth2TokenServiceFactory::GetForProfile(profile_.get()); | 183 OAuth2TokenService* token_service) |
92 } | 184 : task_runner_(task_runner), token_service_(token_service) { |
93 | 185 } |
94 TEST_F(ProfileOAuth2TokenServiceRequestTest, | 186 |
95 Failure) { | 187 scoped_refptr<base::SingleThreadTaskRunner> |
96 scoped_ptr<ProfileOAuth2TokenServiceRequest> request( | 188 OAuth2TokenServiceRequestTest::Provider::GetTokenServiceTaskRunner() { |
97 ProfileOAuth2TokenServiceRequest::CreateAndStart( | 189 return task_runner_; |
98 profile_.get(), | 190 } |
99 std::string(), | 191 |
100 OAuth2TokenService::ScopeSet(), | 192 OAuth2TokenService* OAuth2TokenServiceRequestTest::Provider::GetTokenService() { |
101 &consumer_)); | 193 return token_service_; |
102 oauth2_service_->IssueErrorForAllPendingRequests( | 194 } |
103 GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_UNAVAILABLE)); | 195 |
104 ui_loop_.RunUntilIdle(); | 196 TEST_F(OAuth2TokenServiceRequestTest, CreateAndStart_Failure) { |
105 EXPECT_EQ(0, consumer_.number_of_successful_tokens_); | 197 oauth2_service_->SetResponse( |
106 EXPECT_EQ(1, consumer_.number_of_errors_); | 198 GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_UNAVAILABLE), |
107 } | 199 std::string(), |
108 | 200 base::Time()); |
109 TEST_F(ProfileOAuth2TokenServiceRequestTest, Success) { | 201 scoped_ptr<OAuth2TokenServiceRequest> request( |
110 oauth2_service_->UpdateCredentials(kAccountId, kRefreshToken); | 202 OAuth2TokenServiceRequest::CreateAndStart(provider_.get(), |
111 scoped_ptr<ProfileOAuth2TokenServiceRequest> request( | 203 kAccountId, |
112 ProfileOAuth2TokenServiceRequest::CreateAndStart( | 204 OAuth2TokenService::ScopeSet(), |
113 profile_.get(), | 205 &consumer_)); |
206 ui_loop_.RunUntilIdle(); | |
207 EXPECT_EQ(0, consumer_.num_get_token_success_); | |
208 EXPECT_EQ(1, consumer_.num_get_token_failure_); | |
209 EXPECT_EQ(GoogleServiceAuthError::SERVICE_UNAVAILABLE, | |
210 consumer_.last_error_.state()); | |
211 EXPECT_EQ(0, oauth2_service_->num_invalidate_token()); | |
212 } | |
213 | |
214 TEST_F(OAuth2TokenServiceRequestTest, CreateAndStart_Success) { | |
215 scoped_ptr<OAuth2TokenServiceRequest> request( | |
216 OAuth2TokenServiceRequest::CreateAndStart(provider_.get(), | |
217 kAccountId, | |
218 OAuth2TokenService::ScopeSet(), | |
219 &consumer_)); | |
220 ui_loop_.RunUntilIdle(); | |
221 EXPECT_EQ(1, consumer_.num_get_token_success_); | |
222 EXPECT_EQ(0, consumer_.num_get_token_failure_); | |
223 EXPECT_EQ(kAccessToken, consumer_.last_token_); | |
224 EXPECT_EQ(0, oauth2_service_->num_invalidate_token()); | |
225 } | |
226 | |
227 TEST_F(OAuth2TokenServiceRequestTest, | |
228 CreateAndStart_DestroyRequestBeforeCompletes) { | |
229 scoped_ptr<OAuth2TokenServiceRequest> request( | |
230 OAuth2TokenServiceRequest::CreateAndStart(provider_.get(), | |
231 kAccountId, | |
232 OAuth2TokenService::ScopeSet(), | |
233 &consumer_)); | |
234 request.reset(); | |
235 ui_loop_.RunUntilIdle(); | |
236 EXPECT_EQ(0, consumer_.num_get_token_success_); | |
237 EXPECT_EQ(0, consumer_.num_get_token_failure_); | |
238 EXPECT_EQ(0, oauth2_service_->num_invalidate_token()); | |
239 } | |
240 | |
241 TEST_F(OAuth2TokenServiceRequestTest, | |
242 CreateAndStart_DestroyRequestAfterCompletes) { | |
243 scoped_ptr<OAuth2TokenServiceRequest> request( | |
244 OAuth2TokenServiceRequest::CreateAndStart(provider_.get(), | |
245 kAccountId, | |
246 OAuth2TokenService::ScopeSet(), | |
247 &consumer_)); | |
248 ui_loop_.RunUntilIdle(); | |
249 request.reset(); | |
250 EXPECT_EQ(1, consumer_.num_get_token_success_); | |
251 EXPECT_EQ(0, consumer_.num_get_token_failure_); | |
252 EXPECT_EQ(kAccessToken, consumer_.last_token_); | |
253 EXPECT_EQ(0, oauth2_service_->num_invalidate_token()); | |
254 } | |
255 | |
256 TEST_F(OAuth2TokenServiceRequestTest, CreateAndStartInvalidate) { | |
257 scoped_ptr<OAuth2TokenServiceRequest> request( | |
258 OAuth2TokenServiceRequest::CreateAndStartInvalidate( | |
259 provider_.get(), | |
114 kAccountId, | 260 kAccountId, |
115 OAuth2TokenService::ScopeSet(), | 261 OAuth2TokenService::ScopeSet(), |
116 &consumer_)); | 262 kAccessToken)); |
117 oauth2_service_->IssueTokenForAllPendingRequests(kAccessToken, | 263 ui_loop_.RunUntilIdle(); |
118 base::Time::Max()); | 264 EXPECT_EQ(0, consumer_.num_get_token_success_); |
119 ui_loop_.RunUntilIdle(); | 265 EXPECT_EQ(0, consumer_.num_get_token_failure_); |
120 EXPECT_EQ(1, consumer_.number_of_successful_tokens_); | 266 EXPECT_EQ(kAccessToken, oauth2_service_->last_token_invalidated()); |
121 EXPECT_EQ(kAccessToken, consumer_.last_token_); | 267 EXPECT_EQ(1, oauth2_service_->num_invalidate_token()); |
122 EXPECT_EQ(0, consumer_.number_of_errors_); | 268 } |
123 } | 269 |
124 | 270 TEST_F(OAuth2TokenServiceRequestTest, |
125 TEST_F(ProfileOAuth2TokenServiceRequestTest, | 271 CreateAndStartInvalidate_DestroyBeforeCompletes) { |
126 RequestDeletionBeforeServiceComplete) { | 272 scoped_ptr<OAuth2TokenServiceRequest> request( |
127 oauth2_service_->UpdateCredentials(kAccountId, kRefreshToken); | 273 OAuth2TokenServiceRequest::CreateAndStartInvalidate( |
128 scoped_ptr<ProfileOAuth2TokenServiceRequest> request( | 274 provider_.get(), |
129 ProfileOAuth2TokenServiceRequest::CreateAndStart( | |
130 profile_.get(), | |
131 kAccountId, | 275 kAccountId, |
132 OAuth2TokenService::ScopeSet(), | 276 OAuth2TokenService::ScopeSet(), |
133 &consumer_)); | 277 kAccessToken)); |
134 request.reset(); | 278 request.reset(); |
135 oauth2_service_->IssueTokenForAllPendingRequests(kAccessToken, | 279 ui_loop_.RunUntilIdle(); |
136 base::Time::Max()); | 280 EXPECT_EQ(0, consumer_.num_get_token_success_); |
137 ui_loop_.RunUntilIdle(); | 281 EXPECT_EQ(0, consumer_.num_get_token_failure_); |
138 EXPECT_EQ(0, consumer_.number_of_successful_tokens_); | 282 EXPECT_EQ(kAccessToken, oauth2_service_->last_token_invalidated()); |
139 EXPECT_EQ(0, consumer_.number_of_errors_); | 283 EXPECT_EQ(1, oauth2_service_->num_invalidate_token()); |
140 } | |
141 | |
142 TEST_F(ProfileOAuth2TokenServiceRequestTest, | |
143 RequestDeletionAfterServiceComplete) { | |
144 oauth2_service_->UpdateCredentials(kAccountId, kRefreshToken); | |
145 scoped_ptr<ProfileOAuth2TokenServiceRequest> request( | |
146 ProfileOAuth2TokenServiceRequest::CreateAndStart( | |
147 profile_.get(), | |
148 kAccountId, | |
149 OAuth2TokenService::ScopeSet(), | |
150 &consumer_)); | |
151 oauth2_service_->IssueTokenForAllPendingRequests(kAccessToken, | |
152 base::Time::Max()); | |
153 ui_loop_.RunUntilIdle(); | |
154 request.reset(); | |
155 EXPECT_EQ(1, consumer_.number_of_successful_tokens_); | |
156 EXPECT_EQ(0, consumer_.number_of_errors_); | |
157 } | 284 } |
158 | 285 |
159 } // namespace | 286 } // namespace |
OLD | NEW |