Index: chrome/browser/supervised_user/supervised_user_refresh_token_fetcher_unittest.cc |
diff --git a/chrome/browser/managed_mode/managed_user_refresh_token_fetcher_unittest.cc b/chrome/browser/supervised_user/supervised_user_refresh_token_fetcher_unittest.cc |
similarity index 78% |
rename from chrome/browser/managed_mode/managed_user_refresh_token_fetcher_unittest.cc |
rename to chrome/browser/supervised_user/supervised_user_refresh_token_fetcher_unittest.cc |
index 9211a50d32abc7efbcc07a135210ea3335041f27..90ae916303f7b4433f6f3708f6b32515d3a5480c 100644 |
--- a/chrome/browser/managed_mode/managed_user_refresh_token_fetcher_unittest.cc |
+++ b/chrome/browser/supervised_user/supervised_user_refresh_token_fetcher_unittest.cc |
@@ -5,8 +5,8 @@ |
#include "base/bind.h" |
#include "base/memory/scoped_ptr.h" |
#include "base/strings/stringprintf.h" |
-#include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h" |
#include "chrome/browser/signin/fake_profile_oauth2_token_service.h" |
+#include "chrome/browser/supervised_user/supervised_user_refresh_token_fetcher.h" |
#include "chrome/test/base/testing_profile.h" |
#include "content/public/test/test_browser_thread_bundle.h" |
#include "google_apis/gaia/gaia_constants.h" |
@@ -26,11 +26,11 @@ namespace { |
const char kAccountId[] = "account_id"; |
const char kDeviceName[] = "Compy"; |
-const char kManagedUserId[] = "abcdef"; |
+const char kSupervisedUserId[] = "abcdef"; |
const char kAccessToken[] = "accesstoken"; |
const char kAuthorizationCode[] = "authorizationcode"; |
-const char kManagedUserToken[] = "managedusertoken"; |
+const char kSupervisedUserToken[] = "supervisedusertoken"; |
const char kOAuth2RefreshToken[] = "refreshtoken"; |
const char kIssueTokenResponseFormat[] = |
@@ -85,10 +85,10 @@ void VerifyTokenRequest( |
} // namespace |
-class ManagedUserRefreshTokenFetcherTest : public testing::Test { |
+class SupervisedUserRefreshTokenFetcherTest : public testing::Test { |
public: |
- ManagedUserRefreshTokenFetcherTest(); |
- virtual ~ManagedUserRefreshTokenFetcherTest() {} |
+ SupervisedUserRefreshTokenFetcherTest(); |
+ virtual ~SupervisedUserRefreshTokenFetcherTest() {} |
protected: |
void StartFetching(); |
@@ -114,31 +114,33 @@ class ManagedUserRefreshTokenFetcherTest : public testing::Test { |
TestingProfile profile_; |
FakeProfileOAuth2TokenService oauth2_token_service_; |
net::TestURLFetcherFactory url_fetcher_factory_; |
- scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_; |
+ scoped_ptr<SupervisedUserRefreshTokenFetcher> token_fetcher_; |
GoogleServiceAuthError error_; |
std::string token_; |
- base::WeakPtrFactory<ManagedUserRefreshTokenFetcherTest> weak_ptr_factory_; |
+ base::WeakPtrFactory<SupervisedUserRefreshTokenFetcherTest> weak_ptr_factory_; |
}; |
-ManagedUserRefreshTokenFetcherTest::ManagedUserRefreshTokenFetcherTest() |
- : token_fetcher_( |
- ManagedUserRefreshTokenFetcher::Create(&oauth2_token_service_, |
- kAccountId, |
- profile_.GetRequestContext())), |
+SupervisedUserRefreshTokenFetcherTest::SupervisedUserRefreshTokenFetcherTest() |
+ : token_fetcher_(SupervisedUserRefreshTokenFetcher::Create( |
+ &oauth2_token_service_, |
+ kAccountId, |
+ profile_.GetRequestContext())), |
error_(GoogleServiceAuthError::NONE), |
weak_ptr_factory_(this) {} |
-void ManagedUserRefreshTokenFetcherTest::StartFetching() { |
+void SupervisedUserRefreshTokenFetcherTest::StartFetching() { |
oauth2_token_service_.IssueRefreshToken(kOAuth2RefreshToken); |
- token_fetcher_->Start(kManagedUserId, kDeviceName, |
- base::Bind( |
- &ManagedUserRefreshTokenFetcherTest::OnTokenFetched, |
- weak_ptr_factory_.GetWeakPtr())); |
+ token_fetcher_->Start( |
+ kSupervisedUserId, |
+ kDeviceName, |
+ base::Bind( |
+ &SupervisedUserRefreshTokenFetcherTest::OnTokenFetched, |
+ weak_ptr_factory_.GetWeakPtr())); |
} |
net::TestURLFetcher* |
-ManagedUserRefreshTokenFetcherTest::GetIssueTokenRequest() { |
+SupervisedUserRefreshTokenFetcherTest::GetIssueTokenRequest() { |
net::TestURLFetcher* url_fetcher = url_fetcher_factory_.GetFetcherByID(1); |
if (!url_fetcher) |
return NULL; |
@@ -151,9 +153,9 @@ ManagedUserRefreshTokenFetcherTest::GetIssueTokenRequest() { |
EXPECT_TRUE(headers.GetHeader("Authorization", &access_token)); |
EXPECT_EQ(std::string("Bearer ") + kAccessToken, access_token); |
const std::string upload_data = url_fetcher->upload_data(); |
- std::string managed_user_id; |
- EXPECT_TRUE(GetValueForKey(upload_data, "profile_id", &managed_user_id)); |
- EXPECT_EQ(kManagedUserId, managed_user_id); |
+ std::string supervised_user_id; |
+ EXPECT_TRUE(GetValueForKey(upload_data, "profile_id", &supervised_user_id)); |
+ EXPECT_EQ(kSupervisedUserId, supervised_user_id); |
std::string device_name; |
EXPECT_TRUE(GetValueForKey(upload_data, "device_name", &device_name)); |
EXPECT_EQ(kDeviceName, device_name); |
@@ -161,7 +163,7 @@ ManagedUserRefreshTokenFetcherTest::GetIssueTokenRequest() { |
} |
net::TestURLFetcher* |
-ManagedUserRefreshTokenFetcherTest::GetRefreshTokenRequest() { |
+SupervisedUserRefreshTokenFetcherTest::GetRefreshTokenRequest() { |
net::TestURLFetcher* url_fetcher = url_fetcher_factory_.GetFetcherByID( |
gaia::GaiaOAuthClient::kUrlFetcherId); |
if (!url_fetcher) |
@@ -176,7 +178,7 @@ ManagedUserRefreshTokenFetcherTest::GetRefreshTokenRequest() { |
} |
void |
-ManagedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestSucceed() { |
+SupervisedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestSucceed() { |
std::vector<FakeProfileOAuth2TokenService::PendingRequest> requests = |
oauth2_token_service_.GetPendingRequests(); |
VerifyTokenRequest(requests); |
@@ -188,7 +190,7 @@ ManagedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestSucceed() { |
} |
void |
-ManagedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestFail( |
+SupervisedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestFail( |
GoogleServiceAuthError::State error) { |
std::vector<FakeProfileOAuth2TokenService::PendingRequest> requests = |
oauth2_token_service_.GetPendingRequests(); |
@@ -197,23 +199,23 @@ ManagedUserRefreshTokenFetcherTest::MakeOAuth2TokenServiceRequestFail( |
GoogleServiceAuthError(error)); |
} |
-void ManagedUserRefreshTokenFetcherTest::MakeIssueTokenRequestSucceed() { |
+void SupervisedUserRefreshTokenFetcherTest::MakeIssueTokenRequestSucceed() { |
SendResponse(GetIssueTokenRequest(), |
base::StringPrintf(kIssueTokenResponseFormat, |
kAuthorizationCode)); |
} |
-void ManagedUserRefreshTokenFetcherTest::MakeRefreshTokenFetchSucceed() { |
+void SupervisedUserRefreshTokenFetcherTest::MakeRefreshTokenFetchSucceed() { |
SendResponse(GetRefreshTokenRequest(), |
base::StringPrintf(kGetRefreshTokenResponseFormat, |
- kManagedUserToken)); |
+ kSupervisedUserToken)); |
} |
-void ManagedUserRefreshTokenFetcherTest::Reset() { |
+void SupervisedUserRefreshTokenFetcherTest::Reset() { |
token_fetcher_.reset(); |
} |
-void ManagedUserRefreshTokenFetcherTest::OnTokenFetched( |
+void SupervisedUserRefreshTokenFetcherTest::OnTokenFetched( |
const GoogleServiceAuthError& error, |
const std::string& token) { |
error_ = error; |
@@ -222,17 +224,17 @@ void ManagedUserRefreshTokenFetcherTest::OnTokenFetched( |
// Tests -------------------------------------------------------- |
-TEST_F(ManagedUserRefreshTokenFetcherTest, Success) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, Success) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
MakeIssueTokenRequestSucceed(); |
MakeRefreshTokenFetchSucceed(); |
EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
- EXPECT_EQ(kManagedUserToken, token()); |
+ EXPECT_EQ(kSupervisedUserToken, token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessToken) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, ExpiredAccessToken) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
SetHttpError(GetIssueTokenRequest(), net::HTTP_UNAUTHORIZED); |
@@ -241,10 +243,10 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessToken) { |
MakeRefreshTokenFetchSucceed(); |
EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
- EXPECT_EQ(kManagedUserToken, token()); |
+ EXPECT_EQ(kSupervisedUserToken, token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessTokenRetry) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, ExpiredAccessTokenRetry) { |
// If we get a 401 error for the second time, we should give up instead of |
// retrying again. |
StartFetching(); |
@@ -258,7 +260,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, ExpiredAccessTokenRetry) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, MalformedIssueTokenResponse) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, MalformedIssueTokenResponse) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
SendResponse(GetIssueTokenRequest(), "choke"); |
@@ -268,7 +270,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, MalformedIssueTokenResponse) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, FetchAccessTokenFailure) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, FetchAccessTokenFailure) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestFail( |
GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS); |
@@ -277,7 +279,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, FetchAccessTokenFailure) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, IssueTokenNetworkError) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, IssueTokenNetworkError) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
SetNetworkError(GetIssueTokenRequest(), net::ERR_SSL_PROTOCOL_ERROR); |
@@ -287,7 +289,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, IssueTokenNetworkError) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenNetworkError) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, FetchRefreshTokenNetworkError) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
MakeIssueTokenRequestSucceed(); |
@@ -300,7 +302,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenNetworkError) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, |
FetchRefreshTokenTransientNetworkError) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
@@ -311,10 +313,10 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, |
MakeRefreshTokenFetchSucceed(); |
EXPECT_EQ(GoogleServiceAuthError::NONE, error().state()); |
- EXPECT_EQ(kManagedUserToken, token()); |
+ EXPECT_EQ(kSupervisedUserToken, token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenBadRequest) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, FetchRefreshTokenBadRequest) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
MakeIssueTokenRequestSucceed(); |
@@ -325,7 +327,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, FetchRefreshTokenBadRequest) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingAccessToken) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, CancelWhileFetchingAccessToken) { |
StartFetching(); |
Reset(); |
@@ -333,7 +335,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingAccessToken) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileCallingIssueToken) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, CancelWhileCallingIssueToken) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
Reset(); |
@@ -342,7 +344,7 @@ TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileCallingIssueToken) { |
EXPECT_EQ(std::string(), token()); |
} |
-TEST_F(ManagedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) { |
+TEST_F(SupervisedUserRefreshTokenFetcherTest, CancelWhileFetchingRefreshToken) { |
StartFetching(); |
MakeOAuth2TokenServiceRequestSucceed(); |
MakeIssueTokenRequestSucceed(); |