Index: trunk/src/sync/internal_api/attachments/attachment_uploader_impl_unittest.cc |
=================================================================== |
--- trunk/src/sync/internal_api/attachments/attachment_uploader_impl_unittest.cc (revision 275356) |
+++ trunk/src/sync/internal_api/attachments/attachment_uploader_impl_unittest.cc (working copy) |
@@ -11,28 +11,19 @@ |
#include "base/message_loop/message_loop.h" |
#include "base/run_loop.h" |
#include "base/strings/stringprintf.h" |
-#include "base/synchronization/lock.h" |
-#include "base/thread_task_runner_handle.h" |
#include "base/threading/non_thread_safe.h" |
#include "base/threading/thread.h" |
-#include "google_apis/gaia/fake_oauth2_token_service.h" |
-#include "google_apis/gaia/gaia_constants.h" |
-#include "google_apis/gaia/oauth2_token_service_request.h" |
#include "net/test/embedded_test_server/embedded_test_server.h" |
#include "net/test/embedded_test_server/http_request.h" |
#include "net/test/embedded_test_server/http_response.h" |
#include "net/url_request/url_request_test_util.h" |
#include "sync/api/attachments/attachment.h" |
#include "sync/protocol/sync.pb.h" |
-#include "testing/gmock/include/gmock/gmock-matchers.h" |
#include "testing/gtest/include/gtest/gtest.h" |
namespace { |
const char kAttachmentData[] = "some data"; |
-const char kAccountId[] = "some-account-id"; |
-const char kAccessToken[] = "some-access-token"; |
-const char kAuthorization[] = "Authorization"; |
} // namespace |
@@ -44,131 +35,10 @@ |
class RequestHandler; |
-// A mock implementation of an OAuth2TokenService. |
-// |
-// Use |SetResponse| to vary the response to token requests. |
-// |
-// Use |num_invalidate_token| and |last_token_invalidated| to check the number |
-// of invalidate token operations performed and the last token invalidated. |
-class MockOAuth2TokenService : public FakeOAuth2TokenService { |
- public: |
- MockOAuth2TokenService(); |
- virtual ~MockOAuth2TokenService(); |
- |
- void SetResponse(const GoogleServiceAuthError& error, |
- const std::string& access_token, |
- const base::Time& expiration); |
- |
- int num_invalidate_token() const { return num_invalidate_token_; } |
- |
- const std::string& last_token_invalidated() const { |
- return last_token_invalidated_; |
- } |
- |
- protected: |
- virtual void FetchOAuth2Token(RequestImpl* request, |
- const std::string& account_id, |
- net::URLRequestContextGetter* getter, |
- const std::string& client_id, |
- const std::string& client_secret, |
- const ScopeSet& scopes) OVERRIDE; |
- |
- virtual void InvalidateOAuth2Token(const std::string& account_id, |
- const std::string& client_id, |
- const ScopeSet& scopes, |
- const std::string& access_token) OVERRIDE; |
- |
- private: |
- GoogleServiceAuthError response_error_; |
- std::string response_access_token_; |
- base::Time response_expiration_; |
- int num_invalidate_token_; |
- std::string last_token_invalidated_; |
-}; |
- |
-MockOAuth2TokenService::MockOAuth2TokenService() |
- : response_error_(GoogleServiceAuthError::AuthErrorNone()), |
- response_access_token_(kAccessToken), |
- response_expiration_(base::Time::Max()), |
- num_invalidate_token_(0) { |
-} |
- |
-MockOAuth2TokenService::~MockOAuth2TokenService() { |
-} |
- |
-void MockOAuth2TokenService::SetResponse(const GoogleServiceAuthError& error, |
- const std::string& access_token, |
- const base::Time& expiration) { |
- response_error_ = error; |
- response_access_token_ = access_token; |
- response_expiration_ = expiration; |
-} |
- |
-void MockOAuth2TokenService::FetchOAuth2Token( |
- RequestImpl* request, |
- const std::string& account_id, |
- net::URLRequestContextGetter* getter, |
- const std::string& client_id, |
- const std::string& client_secret, |
- const ScopeSet& scopes) { |
- base::MessageLoop::current()->PostTask( |
- FROM_HERE, |
- base::Bind(&OAuth2TokenService::RequestImpl::InformConsumer, |
- request->AsWeakPtr(), |
- response_error_, |
- response_access_token_, |
- response_expiration_)); |
-} |
- |
-void MockOAuth2TokenService::InvalidateOAuth2Token( |
- const std::string& account_id, |
- const std::string& client_id, |
- const ScopeSet& scopes, |
- const std::string& access_token) { |
- ++num_invalidate_token_; |
- last_token_invalidated_ = access_token; |
-} |
- |
-class TokenServiceProvider |
- : public OAuth2TokenServiceRequest::TokenServiceProvider, |
- base::NonThreadSafe { |
- public: |
- TokenServiceProvider(OAuth2TokenService* token_service); |
- virtual ~TokenServiceProvider(); |
- |
- // OAuth2TokenService::TokenServiceProvider implementation. |
- virtual scoped_refptr<base::SingleThreadTaskRunner> |
- GetTokenServiceTaskRunner() OVERRIDE; |
- virtual OAuth2TokenService* GetTokenService() OVERRIDE; |
- |
- private: |
- scoped_refptr<base::SingleThreadTaskRunner> task_runner_; |
- OAuth2TokenService* token_service_; |
-}; |
- |
-TokenServiceProvider::TokenServiceProvider(OAuth2TokenService* token_service) |
- : task_runner_(base::ThreadTaskRunnerHandle::Get()), |
- token_service_(token_service) { |
- DCHECK(token_service_); |
-} |
- |
-TokenServiceProvider::~TokenServiceProvider() { |
-} |
- |
-scoped_refptr<base::SingleThreadTaskRunner> |
-TokenServiceProvider::GetTokenServiceTaskRunner() { |
- return task_runner_; |
-} |
- |
-OAuth2TokenService* TokenServiceProvider::GetTokenService() { |
- DCHECK(task_runner_->BelongsToCurrentThread()); |
- return token_service_; |
-} |
- |
// Text fixture for AttachmentUploaderImpl test. |
// |
-// This fixture provides an embedded HTTP server and a mock OAuth2 token service |
-// for interacting with AttachmentUploaderImpl |
+// This fixture provides an embedded HTTP server for interacting with |
+// AttachmentUploaderImpl. |
class AttachmentUploaderImplTest : public testing::Test, |
public base::NonThreadSafe { |
public: |
@@ -177,7 +47,6 @@ |
protected: |
AttachmentUploaderImplTest(); |
virtual void SetUp(); |
- virtual void TearDown(); |
// Run the message loop until UploadDone has been invoked |num_uploads| times. |
void RunAndWaitFor(int num_uploads); |
@@ -187,9 +56,6 @@ |
std::vector<HttpRequest>& http_requests_received(); |
std::vector<AttachmentUploader::UploadResult>& upload_results(); |
std::vector<AttachmentId>& updated_attachment_ids(); |
- MockOAuth2TokenService& token_service(); |
- base::MessageLoopForIO& message_loop(); |
- RequestHandler& request_handler(); |
private: |
// An UploadCallback invoked by AttachmentUploaderImpl. |
@@ -202,20 +68,18 @@ |
scoped_ptr<AttachmentUploader> uploader_; |
AttachmentUploader::UploadCallback upload_callback_; |
net::test_server::EmbeddedTestServer server_; |
+ |
// A closure that signals an upload has finished. |
base::Closure signal_upload_done_; |
std::vector<HttpRequest> http_requests_received_; |
std::vector<AttachmentUploader::UploadResult> upload_results_; |
std::vector<AttachmentId> updated_attachment_ids_; |
- scoped_ptr<MockOAuth2TokenService> token_service_; |
// Must be last data member. |
base::WeakPtrFactory<AttachmentUploaderImplTest> weak_ptr_factory_; |
}; |
// Handles HTTP requests received by the EmbeddedTestServer. |
-// |
-// Responds with HTTP_OK by default. See |SetStatusCode|. |
class RequestHandler : public base::NonThreadSafe { |
public: |
// Construct a RequestHandler that will PostTask to |test| using |
@@ -228,17 +92,7 @@ |
scoped_ptr<HttpResponse> HandleRequest(const HttpRequest& request); |
- // Set the HTTP status code to respond with. |
- void SetStatusCode(const net::HttpStatusCode& status_code); |
- |
- // Returns the HTTP status code that will be used in responses. |
- net::HttpStatusCode GetStatusCode() const; |
- |
private: |
- // Protects status_code_. |
- mutable base::Lock mutex_; |
- net::HttpStatusCode status_code_; |
- |
scoped_refptr<base::SingleThreadTaskRunner> test_task_runner_; |
base::WeakPtr<AttachmentUploaderImplTest> test_; |
}; |
@@ -267,26 +121,12 @@ |
std::string url_prefix( |
base::StringPrintf("http://localhost:%d/uploads/", server_.port())); |
- token_service_.reset(new MockOAuth2TokenService); |
- scoped_ptr<OAuth2TokenServiceRequest::TokenServiceProvider> |
- token_service_provider(new TokenServiceProvider(token_service_.get())); |
- |
- OAuth2TokenService::ScopeSet scopes; |
- scopes.insert(GaiaConstants::kChromeSyncOAuth2Scope); |
- uploader().reset(new AttachmentUploaderImpl(url_prefix, |
- url_request_context_getter_, |
- kAccountId, |
- scopes, |
- token_service_provider.Pass())); |
- |
+ uploader().reset( |
+ new AttachmentUploaderImpl(url_prefix, url_request_context_getter_)); |
upload_callback_ = base::Bind(&AttachmentUploaderImplTest::UploadDone, |
base::Unretained(this)); |
} |
-void AttachmentUploaderImplTest::TearDown() { |
- base::RunLoop().RunUntilIdle(); |
-} |
- |
void AttachmentUploaderImplTest::RunAndWaitFor(int num_uploads) { |
for (int i = 0; i < num_uploads; ++i) { |
// Run the loop until one upload completes. |
@@ -319,18 +159,6 @@ |
return updated_attachment_ids_; |
} |
-MockOAuth2TokenService& AttachmentUploaderImplTest::token_service() { |
- return *token_service_; |
-} |
- |
-base::MessageLoopForIO& AttachmentUploaderImplTest::message_loop() { |
- return message_loop_; |
-} |
- |
-RequestHandler& AttachmentUploaderImplTest::request_handler() { |
- return *request_handler_; |
-} |
- |
void AttachmentUploaderImplTest::UploadDone( |
const AttachmentUploader::UploadResult& result, |
const AttachmentId& updated_attachment_id) { |
@@ -343,9 +171,7 @@ |
RequestHandler::RequestHandler( |
const scoped_refptr<base::SingleThreadTaskRunner>& test_task_runner, |
const base::WeakPtr<AttachmentUploaderImplTest>& test) |
- : status_code_(net::HTTP_OK), |
- test_task_runner_(test_task_runner), |
- test_(test) { |
+ : test_task_runner_(test_task_runner), test_(test) { |
DetachFromThread(); |
} |
@@ -360,46 +186,23 @@ |
FROM_HERE, |
base::Bind( |
&AttachmentUploaderImplTest::OnRequestReceived, test_, request)); |
- scoped_ptr<BasicHttpResponse> response(new BasicHttpResponse); |
- response->set_code(GetStatusCode()); |
- response->set_content_type("text/plain"); |
- return response.PassAs<HttpResponse>(); |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_code(net::HTTP_OK); |
+ http_response->set_content("hello"); |
+ http_response->set_content_type("text/plain"); |
+ return http_response.PassAs<HttpResponse>(); |
} |
-void RequestHandler::SetStatusCode(const net::HttpStatusCode& status_code) { |
- base::AutoLock lock(mutex_); |
- status_code_ = status_code; |
-} |
- |
-net::HttpStatusCode RequestHandler::GetStatusCode() const { |
- base::AutoLock lock(mutex_); |
- return status_code_; |
-} |
- |
// Verify the "happy case" of uploading an attachment. |
-// |
-// Token is requested, token is returned, HTTP request is made, attachment is |
-// received by server. |
TEST_F(AttachmentUploaderImplTest, UploadAttachment_HappyCase) { |
- token_service().AddAccount(kAccountId); |
- request_handler().SetStatusCode(net::HTTP_OK); |
- |
scoped_refptr<base::RefCountedString> some_data(new base::RefCountedString); |
some_data->data() = kAttachmentData; |
Attachment attachment = Attachment::Create(some_data); |
uploader()->UploadAttachment(attachment, upload_callback()); |
- |
- // Run until the done callback is invoked. |
RunAndWaitFor(1); |
- // See that the done callback was invoked with the right arguments. |
- ASSERT_EQ(1U, upload_results().size()); |
- EXPECT_EQ(AttachmentUploader::UPLOAD_SUCCESS, upload_results()[0]); |
- ASSERT_EQ(1U, updated_attachment_ids().size()); |
- EXPECT_EQ(attachment.GetId(), updated_attachment_ids()[0]); |
- |
// See that the HTTP server received one request. |
- ASSERT_EQ(1U, http_requests_received().size()); |
+ EXPECT_EQ(1U, http_requests_received().size()); |
const HttpRequest& http_request = http_requests_received().front(); |
EXPECT_EQ(net::test_server::METHOD_POST, http_request.method); |
std::string expected_relative_url("/uploads/" + |
@@ -407,11 +210,12 @@ |
EXPECT_EQ(expected_relative_url, http_request.relative_url); |
EXPECT_TRUE(http_request.has_content); |
EXPECT_EQ(kAttachmentData, http_request.content); |
- const std::string header_name(kAuthorization); |
- const std::string header_value(std::string("Bearer ") + kAccessToken); |
- EXPECT_THAT(http_request.headers, |
- testing::Contains(testing::Pair(header_name, header_value))); |
+ // See that the UploadCallback received a result and updated AttachmentId. |
+ EXPECT_EQ(1U, upload_results().size()); |
+ EXPECT_EQ(1U, updated_attachment_ids().size()); |
+ EXPECT_EQ(AttachmentUploader::UPLOAD_SUCCESS, upload_results().front()); |
+ EXPECT_EQ(attachment.GetId(), updated_attachment_ids().front()); |
// TODO(maniscalco): Once AttachmentUploaderImpl is capable of updating the |
// AttachmentId with server address information about the attachment, add some |
// checks here to verify it works properly (bug 371522). |
@@ -420,17 +224,12 @@ |
// Verify two overlapping calls to upload the same attachment result in only one |
// HTTP request. |
TEST_F(AttachmentUploaderImplTest, UploadAttachment_Collapse) { |
- token_service().AddAccount(kAccountId); |
- request_handler().SetStatusCode(net::HTTP_OK); |
- |
scoped_refptr<base::RefCountedString> some_data(new base::RefCountedString); |
some_data->data() = kAttachmentData; |
Attachment attachment1 = Attachment::Create(some_data); |
Attachment attachment2 = attachment1; |
uploader()->UploadAttachment(attachment1, upload_callback()); |
uploader()->UploadAttachment(attachment2, upload_callback()); |
- base::RunLoop().RunUntilIdle(); |
- |
// Wait for upload_callback() to be invoked twice. |
RunAndWaitFor(2); |
// See there was only one request. |
@@ -441,127 +240,18 @@ |
// uplaod finishes. We do this by issuing two non-overlapping uploads for the |
// same attachment and see that it results in two HTTP requests. |
TEST_F(AttachmentUploaderImplTest, UploadAttachment_CleanUpAfterUpload) { |
- token_service().AddAccount(kAccountId); |
- request_handler().SetStatusCode(net::HTTP_OK); |
- |
scoped_refptr<base::RefCountedString> some_data(new base::RefCountedString); |
some_data->data() = kAttachmentData; |
Attachment attachment1 = Attachment::Create(some_data); |
Attachment attachment2 = attachment1; |
uploader()->UploadAttachment(attachment1, upload_callback()); |
- base::RunLoop().RunUntilIdle(); |
- |
// Wait for upload_callback() to be invoked before starting the second upload. |
RunAndWaitFor(1); |
uploader()->UploadAttachment(attachment2, upload_callback()); |
- base::RunLoop().RunUntilIdle(); |
- |
// Wait for upload_callback() to be invoked a second time. |
RunAndWaitFor(1); |
// See there were two requests. |
- ASSERT_EQ(2U, http_requests_received().size()); |
+ EXPECT_EQ(2U, http_requests_received().size()); |
} |
-// Verify that we do not issue an HTTP request when we fail to receive an access |
-// token. |
-// |
-// Token is requested, no token is returned, no HTTP request is made |
-TEST_F(AttachmentUploaderImplTest, UploadAttachment_FailToGetToken) { |
- // Note, we won't receive a token because we did not add kAccountId to the |
- // token service. |
- scoped_refptr<base::RefCountedString> some_data(new base::RefCountedString); |
- some_data->data() = kAttachmentData; |
- Attachment attachment = Attachment::Create(some_data); |
- uploader()->UploadAttachment(attachment, upload_callback()); |
- |
- RunAndWaitFor(1); |
- |
- // See that the done callback was invoked. |
- ASSERT_EQ(1U, upload_results().size()); |
- EXPECT_EQ(AttachmentUploader::UPLOAD_UNSPECIFIED_ERROR, upload_results()[0]); |
- ASSERT_EQ(1U, updated_attachment_ids().size()); |
- EXPECT_EQ(attachment.GetId(), updated_attachment_ids()[0]); |
- |
- // See that no HTTP request was received. |
- ASSERT_EQ(0U, http_requests_received().size()); |
-} |
- |
-// Verify behavior when the server returns "503 Service Unavailable". |
-TEST_F(AttachmentUploaderImplTest, UploadAttachment_ServiceUnavilable) { |
- token_service().AddAccount(kAccountId); |
- request_handler().SetStatusCode(net::HTTP_SERVICE_UNAVAILABLE); |
- |
- scoped_refptr<base::RefCountedString> some_data(new base::RefCountedString); |
- some_data->data() = kAttachmentData; |
- Attachment attachment = Attachment::Create(some_data); |
- uploader()->UploadAttachment(attachment, upload_callback()); |
- |
- RunAndWaitFor(1); |
- |
- // See that the done callback was invoked. |
- ASSERT_EQ(1U, upload_results().size()); |
- EXPECT_EQ(AttachmentUploader::UPLOAD_UNSPECIFIED_ERROR, upload_results()[0]); |
- ASSERT_EQ(1U, updated_attachment_ids().size()); |
- EXPECT_EQ(attachment.GetId(), updated_attachment_ids()[0]); |
- |
- // See that the HTTP server received one request. |
- ASSERT_EQ(1U, http_requests_received().size()); |
- const HttpRequest& http_request = http_requests_received().front(); |
- EXPECT_EQ(net::test_server::METHOD_POST, http_request.method); |
- std::string expected_relative_url("/uploads/" + |
- attachment.GetId().GetProto().unique_id()); |
- EXPECT_EQ(expected_relative_url, http_request.relative_url); |
- EXPECT_TRUE(http_request.has_content); |
- EXPECT_EQ(kAttachmentData, http_request.content); |
- std::string expected_header(kAuthorization); |
- const std::string header_name(kAuthorization); |
- const std::string header_value(std::string("Bearer ") + kAccessToken); |
- EXPECT_THAT(http_request.headers, |
- testing::Contains(testing::Pair(header_name, header_value))); |
- |
- // See that we did not invalidate the token. |
- ASSERT_EQ(0, token_service().num_invalidate_token()); |
-} |
- |
-// Verify that when we receive an "401 Unauthorized" we invalidate the access |
-// token. |
-TEST_F(AttachmentUploaderImplTest, UploadAttachment_BadToken) { |
- token_service().AddAccount(kAccountId); |
- request_handler().SetStatusCode(net::HTTP_UNAUTHORIZED); |
- |
- scoped_refptr<base::RefCountedString> some_data(new base::RefCountedString); |
- some_data->data() = kAttachmentData; |
- Attachment attachment = Attachment::Create(some_data); |
- uploader()->UploadAttachment(attachment, upload_callback()); |
- |
- RunAndWaitFor(1); |
- |
- // See that the done callback was invoked. |
- ASSERT_EQ(1U, upload_results().size()); |
- EXPECT_EQ(AttachmentUploader::UPLOAD_UNSPECIFIED_ERROR, upload_results()[0]); |
- ASSERT_EQ(1U, updated_attachment_ids().size()); |
- EXPECT_EQ(attachment.GetId(), updated_attachment_ids()[0]); |
- |
- // See that the HTTP server received one request. |
- ASSERT_EQ(1U, http_requests_received().size()); |
- const HttpRequest& http_request = http_requests_received().front(); |
- EXPECT_EQ(net::test_server::METHOD_POST, http_request.method); |
- std::string expected_relative_url("/uploads/" + |
- attachment.GetId().GetProto().unique_id()); |
- EXPECT_EQ(expected_relative_url, http_request.relative_url); |
- EXPECT_TRUE(http_request.has_content); |
- EXPECT_EQ(kAttachmentData, http_request.content); |
- std::string expected_header(kAuthorization); |
- const std::string header_name(kAuthorization); |
- const std::string header_value(std::string("Bearer ") + kAccessToken); |
- EXPECT_THAT(http_request.headers, |
- testing::Contains(testing::Pair(header_name, header_value))); |
- |
- // See that we invalidated the token. |
- ASSERT_EQ(1, token_service().num_invalidate_token()); |
-} |
- |
-// TODO(maniscalco): Add test case for when we are uploading an attachment that |
-// already exists. 409 Conflict? (bug 379825) |
- |
} // namespace syncer |