| Index: components/proximity_auth/cryptauth/cryptauth_account_token_fetcher_unittest.cc
|
| diff --git a/components/proximity_auth/cryptauth/cryptauth_account_token_fetcher_unittest.cc b/components/proximity_auth/cryptauth/cryptauth_account_token_fetcher_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..23efd990689d253a09dd23e981dce009142089f2
|
| --- /dev/null
|
| +++ b/components/proximity_auth/cryptauth/cryptauth_account_token_fetcher_unittest.cc
|
| @@ -0,0 +1,76 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "components/proximity_auth/cryptauth/cryptauth_account_token_fetcher.h"
|
| +
|
| +#include <string>
|
| +
|
| +#include "base/bind.h"
|
| +#include "google_apis/gaia/fake_oauth2_token_service.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +namespace proximity_auth {
|
| +
|
| +namespace {
|
| +
|
| +const char kAccountId[] = "account_id";
|
| +const char kAccessToken[] = "access_token";
|
| +const char kInvalidResult[] = "invalid_result";
|
| +
|
| +// Callback that saves the fetched access token to the first argument.
|
| +void SaveAccessToken(std::string* out_token, const std::string& in_token) {
|
| + *out_token = in_token;
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +class ProximityAuthCryptAuthAccountTokenFetcherTest : public testing::Test {
|
| + protected:
|
| + ProximityAuthCryptAuthAccountTokenFetcherTest()
|
| + : fetcher_(&token_service_, kAccountId) {
|
| + token_service_.AddAccount(kAccountId);
|
| + }
|
| + virtual ~ProximityAuthCryptAuthAccountTokenFetcherTest() {}
|
| +
|
| + FakeOAuth2TokenService token_service_;
|
| + CryptAuthAccountTokenFetcher fetcher_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(ProximityAuthCryptAuthAccountTokenFetcherTest);
|
| +};
|
| +
|
| +TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetchSuccess) {
|
| + std::string result;
|
| + fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result));
|
| + token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken,
|
| + base::Time::Max());
|
| +
|
| + EXPECT_EQ(kAccessToken, result);
|
| +}
|
| +
|
| +TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetchFailure) {
|
| + std::string result(kInvalidResult);
|
| + fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result));
|
| + token_service_.IssueErrorForAllPendingRequestsForAccount(
|
| + kAccountId,
|
| + GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_ERROR));
|
| +
|
| + EXPECT_EQ(std::string(), result);
|
| +}
|
| +
|
| +TEST_F(ProximityAuthCryptAuthAccountTokenFetcherTest, FetcherReuse) {
|
| + std::string result1;
|
| + fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result1));
|
| +
|
| + {
|
| + std::string result2(kInvalidResult);
|
| + fetcher_.FetchAccessToken(base::Bind(SaveAccessToken, &result2));
|
| + EXPECT_EQ(std::string(), result2);
|
| + }
|
| +
|
| + token_service_.IssueAllTokensForAccount(kAccountId, kAccessToken,
|
| + base::Time::Max());
|
| + EXPECT_EQ(kAccessToken, result1);
|
| +}
|
| +
|
| +} // namespace proximity_auth
|
|
|