Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(212)

Side by Side Diff: chrome/browser/supervised_user/permission_request_creator_apiary_unittest.cc

Issue 614053002: Supervised Users: Add tests for PermissionRequestCreatorApiary. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "base/json/json_writer.h"
6 #include "base/memory/scoped_ptr.h"
7 #include "base/message_loop/message_loop.h"
8 #include "base/values.h"
9 #include "chrome/browser/signin/fake_profile_oauth2_token_service.h"
10 #include "chrome/browser/supervised_user/permission_request_creator_apiary.h"
11 #include "chrome/browser/sync/supervised_user_signin_manager_wrapper.h"
12 #include "net/url_request/test_url_fetcher_factory.h"
13 #include "net/url_request/url_request_test_util.h"
14 #include "testing/gmock/include/gmock/gmock.h"
15 #include "testing/gtest/include/gtest/gtest.h"
16
17 namespace {
18
19 const char kAccountId[] = "account@gmail.com";
20 const char kApiScope[] = "api_scope";
21 const char kPermissionRequestApiUrl[] = "https://myapis.com/permissions";
22
23 std::string BuildResponse() {
24 base::DictionaryValue dict;
25 dict.SetStringWithoutPathExpansion("id", "requestid");
26 std::string result;
27 base::JSONWriter::Write(&dict, &result);
28 return result;
29 }
30
31 class FakeSupervisedUserSigninManagerWrapper
32 : public SupervisedUserSigninManagerWrapper {
33 public:
34 FakeSupervisedUserSigninManagerWrapper()
35 : SupervisedUserSigninManagerWrapper(NULL, NULL) {}
36
37 virtual std::string GetEffectiveUsername() const OVERRIDE {
38 return kAccountId;
39 }
40 virtual std::string GetAccountIdToUse() const OVERRIDE {
41 return kAccountId;
42 }
43 virtual std::string GetSyncScopeToUse() const OVERRIDE {
44 return kApiScope;
45 }
46 };
47
48 } // namespace
49
50 class PermissionRequestCreatorApiaryTest : public testing::Test {
51 public:
52 PermissionRequestCreatorApiaryTest()
53 : request_context_(new net::TestURLRequestContextGetter(
54 base::MessageLoopProxy::current())),
55 permission_creator_(
56 GURL(kPermissionRequestApiUrl),
57 &token_service_,
58 make_scoped_ptr(new FakeSupervisedUserSigninManagerWrapper),
59 request_context_.get()) {
60 token_service_.IssueRefreshTokenForUser(kAccountId, "refresh_token");
61 }
62
63 protected:
64 void IssueAccessTokens() {
65 token_service_.IssueAllTokensForAccount(
66 kAccountId,
67 "access_token",
68 base::Time::Now() + base::TimeDelta::FromHours(1));
69 }
70
71 void IssueAccessTokenErrors() {
72 token_service_.IssueErrorForAllPendingRequestsForAccount(
73 kAccountId,
74 GoogleServiceAuthError::FromServiceError("Error!"));
75 }
76
77 void CreateRequest(int url_fetcher_id, const GURL& url) {
78 permission_creator_.set_url_fetcher_id_for_testing(url_fetcher_id);
79 permission_creator_.CreatePermissionRequest(
80 url,
81 base::Bind(&PermissionRequestCreatorApiaryTest::OnRequestCreated,
82 base::Unretained(this)));
83 }
84
85 net::TestURLFetcher* GetURLFetcher(int id) {
86 net::TestURLFetcher* url_fetcher = url_fetcher_factory_.GetFetcherByID(id);
87 EXPECT_TRUE(url_fetcher);
88 return url_fetcher;
89 }
90
91 void SendResponse(int url_fetcher_id,
92 net::URLRequestStatus::Status status,
93 const std::string& response) {
94 net::TestURLFetcher* url_fetcher = GetURLFetcher(url_fetcher_id);
95 url_fetcher->set_status(net::URLRequestStatus(status, 0));
96 url_fetcher->set_response_code(net::HTTP_OK);
97 url_fetcher->SetResponseString(response);
98 url_fetcher->delegate()->OnURLFetchComplete(url_fetcher);
99 }
100
101 void SendValidResponse(int url_fetcher_id) {
102 SendResponse(url_fetcher_id,
103 net::URLRequestStatus::SUCCESS,
104 BuildResponse());
105 }
106
107 void SendFailedResponse(int url_fetcher_id) {
108 SendResponse(url_fetcher_id,
109 net::URLRequestStatus::CANCELED,
110 std::string());
111 }
112
113 MOCK_METHOD0(OnRequestCreated, void());
114
115 base::MessageLoop message_loop_;
116 FakeProfileOAuth2TokenService token_service_;
117 scoped_refptr<net::TestURLRequestContextGetter> request_context_;
118 net::TestURLFetcherFactory url_fetcher_factory_;
119 PermissionRequestCreatorApiary permission_creator_;
120 };
121
122 TEST_F(PermissionRequestCreatorApiaryTest, Success) {
123 CreateRequest(0, GURL("http://randomurl.com"));
124 CreateRequest(1, GURL("http://anotherurl.com"));
125
126 // We should have gotten a request for an access token.
127 EXPECT_LT(0U, token_service_.GetPendingRequests().size());
Bernhard Bauer 2014/09/30 15:01:07 Non-equality operators use the "natural" parameter
Marc Treib 2014/09/30 15:28:45 Done.
128
129 IssueAccessTokens();
130
131 EXPECT_CALL(*this, OnRequestCreated());
132 SendValidResponse(0);
133 EXPECT_CALL(*this, OnRequestCreated());
134 SendValidResponse(1);
135 }
136
137 TEST_F(PermissionRequestCreatorApiaryTest, AccessTokenError) {
138 CreateRequest(0, GURL("http://randomurl.com"));
139
140 // We should have gotten a request for an access token.
141 EXPECT_EQ(1U, token_service_.GetPendingRequests().size());
142
143 // Our callback should get called immediately on an error.
144 EXPECT_CALL(*this, OnRequestCreated());
145 IssueAccessTokenErrors();
146 }
147
148 TEST_F(PermissionRequestCreatorApiaryTest, NetworkError) {
149 CreateRequest(0, GURL("http://randomurl.com"));
150
151 // We should have gotten a request for an access token.
152 EXPECT_EQ(1U, token_service_.GetPendingRequests().size());
153
154 IssueAccessTokens();
155
156 // Our callback should get called on an error.
157 EXPECT_CALL(*this, OnRequestCreated());
158 SendFailedResponse(0);
159 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698