| Index: chrome/browser/net/gaia/oauth2_login_token_fetcher_unittest.cc
|
| ===================================================================
|
| --- chrome/browser/net/gaia/oauth2_login_token_fetcher_unittest.cc (revision 0)
|
| +++ chrome/browser/net/gaia/oauth2_login_token_fetcher_unittest.cc (revision 0)
|
| @@ -0,0 +1,342 @@
|
| +// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +//
|
| +// A complete set of unit tests for OAuth2LoginTokenFetcher.
|
| +
|
| +#include <string>
|
| +
|
| +#include "base/memory/scoped_ptr.h"
|
| +#include "base/message_loop.h"
|
| +#include "chrome/browser/net/gaia/oauth2_login_token_consumer.h"
|
| +#include "chrome/browser/net/gaia/oauth2_login_token_fetcher.h"
|
| +#include "chrome/common/net/gaia/gaia_urls.h"
|
| +#include "chrome/common/net/gaia/google_service_auth_error.h"
|
| +#include "chrome/common/net/http_return.h"
|
| +#include "chrome/test/base/testing_profile.h"
|
| +#include "content/public/common/url_fetcher.h"
|
| +#include "content/public/common/url_fetcher_delegate.h"
|
| +#include "content/public/common/url_fetcher_factory.h"
|
| +#include "content/test/test_browser_thread.h"
|
| +#include "content/test/test_url_fetcher_factory.h"
|
| +#include "googleurl/src/gurl.h"
|
| +#include "net/url_request/url_request.h"
|
| +#include "net/url_request/url_request_status.h"
|
| +#include "testing/gmock/include/gmock/gmock.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +using content::BrowserThread;
|
| +using content::URLFetcher;
|
| +using content::URLFetcherDelegate;
|
| +using content::URLFetcherFactory;
|
| +using net::ResponseCookies;
|
| +using net::URLRequestStatus;
|
| +using testing::_;
|
| +using testing::Return;
|
| +
|
| +namespace {
|
| +static const char kValidSetCookieHeader[] =
|
| + "oauth_code=test-code; Path=/test; Secure; HttpOnly";
|
| +static const char kSetCookieHeaderMissingSecure[] =
|
| + "oauth_code=test-code; Path=/test; HttpOnly";
|
| +static const char kSetCookieHeaderMissingHttpOnly[] =
|
| + "oauth_code=test-code; Path=/test; Secure";
|
| +static const char kSetCookieHeaderMissingOAuthCode[] =
|
| + "Path=/test; Secure; HttpOnly";
|
| +static const char kValidTokenResponse[] =
|
| + "{"
|
| + " \"refresh_token\": \"rt1\","
|
| + " \"access_token\": \"at1\""
|
| + "}";
|
| +static const char kTokenResponseNoRefreshToken[] =
|
| + "{"
|
| + " \"access_token\": \"at1\""
|
| + "}";
|
| +static const char kTokenResponseNoAccessToken[] =
|
| + "{"
|
| + " \"refresh_token\": \"rt1\""
|
| + "}";
|
| +}
|
| +
|
| +class MockUrlFetcherFactory : public ScopedURLFetcherFactory,
|
| + public URLFetcherFactory {
|
| +public:
|
| + MockUrlFetcherFactory()
|
| + : ScopedURLFetcherFactory(ALLOW_THIS_IN_INITIALIZER_LIST(this)) {
|
| + }
|
| + virtual ~MockUrlFetcherFactory() {}
|
| +
|
| + MOCK_METHOD4(
|
| + CreateURLFetcher,
|
| + URLFetcher* (int id,
|
| + const GURL& url,
|
| + URLFetcher::RequestType request_type,
|
| + URLFetcherDelegate* d));
|
| +};
|
| +
|
| +class MockOAuth2LoginTokenConsumer : public OAuth2LoginTokenConsumer {
|
| + public:
|
| + MockOAuth2LoginTokenConsumer() {}
|
| + ~MockOAuth2LoginTokenConsumer() {}
|
| +
|
| + MOCK_METHOD2(OnGetTokenSuccess, void(const std::string& refresh_token,
|
| + const std::string& access_token));
|
| + MOCK_METHOD1(OnGetTokenFailure,
|
| + void(const GoogleServiceAuthError& error));
|
| +};
|
| +
|
| +class OAuth2LoginTokenFetcherTest : public testing::Test {
|
| + public:
|
| + OAuth2LoginTokenFetcherTest()
|
| + : ui_thread_(BrowserThread::UI, &message_loop_),
|
| + fetcher_(&consumer_, profile_.GetRequestContext(), "test") {
|
| + }
|
| +
|
| + virtual ~OAuth2LoginTokenFetcherTest() { }
|
| +
|
| + virtual TestURLFetcher* SetupGetAuthCode(
|
| + bool fetch_succeeds, int response_code, const std::string& cookie) {
|
| + GURL url(GaiaUrls::GetInstance()->client_login_to_oauth2_url());
|
| + TestURLFetcher* url_fetcher = new TestURLFetcher(0, url, &fetcher_);
|
| + URLRequestStatus::Status status =
|
| + fetch_succeeds ? URLRequestStatus::SUCCESS : URLRequestStatus::FAILED;
|
| + url_fetcher->set_status(URLRequestStatus(status, 0));
|
| +
|
| + if (response_code != 0)
|
| + url_fetcher->set_response_code(response_code);
|
| +
|
| + if (!cookie.empty()) {
|
| + ResponseCookies cookies;
|
| + cookies.push_back(cookie);
|
| + url_fetcher->set_cookies(cookies);
|
| + }
|
| +
|
| + EXPECT_CALL(factory_, CreateURLFetcher(_, url, _, _))
|
| + .WillOnce(Return(url_fetcher));
|
| + return url_fetcher;
|
| + }
|
| +
|
| + virtual TestURLFetcher* SetupGetTokenPair(
|
| + bool fetch_succeeds, int response_code, const std::string& body) {
|
| + GURL url(GaiaUrls::GetInstance()->oauth2_token_url());
|
| + TestURLFetcher* url_fetcher = new TestURLFetcher(0, url, &fetcher_);
|
| + URLRequestStatus::Status status =
|
| + fetch_succeeds ? URLRequestStatus::SUCCESS : URLRequestStatus::FAILED;
|
| + url_fetcher->set_status(URLRequestStatus(status, 0));
|
| +
|
| + if (response_code != 0)
|
| + url_fetcher->set_response_code(response_code);
|
| +
|
| + if (!body.empty())
|
| + url_fetcher->SetResponseString(body);
|
| +
|
| + EXPECT_CALL(factory_, CreateURLFetcher(_, url, _, _))
|
| + .WillOnce(Return(url_fetcher));
|
| + return url_fetcher;
|
| + }
|
| +
|
| + protected:
|
| + MessageLoop message_loop_;
|
| + content::TestBrowserThread ui_thread_;
|
| + MockUrlFetcherFactory factory_;
|
| + MockOAuth2LoginTokenConsumer consumer_;
|
| + TestingProfile profile_;
|
| + OAuth2LoginTokenFetcher fetcher_;
|
| +};
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetAuthCodeRequestFailure) {
|
| + TestURLFetcher* url_fetcher = SetupGetAuthCode(false, 0, "");
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetAuthCodeResponseCodeFailure) {
|
| + TestURLFetcher* url_fetcher = SetupGetAuthCode(true, RC_FORBIDDEN, "");
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetAuthCodeResponseMissingSecure) {
|
| + TestURLFetcher* url_fetcher = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kSetCookieHeaderMissingSecure);
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetAuthCodeResponseMissingHttpOnly) {
|
| + TestURLFetcher* url_fetcher = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kSetCookieHeaderMissingHttpOnly);
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetAuthCodeResponseMissingOAuthCode) {
|
| + TestURLFetcher* url_fetcher = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kSetCookieHeaderMissingOAuthCode);
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetTokenPairRequestFailure) {
|
| + TestURLFetcher* url_fetcher1 = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kValidSetCookieHeader);
|
| + TestURLFetcher* url_fetcher2 = SetupGetTokenPair(false, 0, "");
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher1);
|
| + fetcher_.OnURLFetchComplete(url_fetcher2);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetTokenPairResponseCodeFailure) {
|
| + TestURLFetcher* url_fetcher1 = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kValidSetCookieHeader);
|
| + TestURLFetcher* url_fetcher2 = SetupGetTokenPair(true, RC_FORBIDDEN, "");
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher1);
|
| + fetcher_.OnURLFetchComplete(url_fetcher2);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetTokenPairResponseMissingRefreshToken) {
|
| + TestURLFetcher* url_fetcher1 = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kValidSetCookieHeader);
|
| + TestURLFetcher* url_fetcher2 = SetupGetTokenPair(
|
| + true, RC_REQUEST_OK, kTokenResponseNoRefreshToken);
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher1);
|
| + fetcher_.OnURLFetchComplete(url_fetcher2);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, GetTokenPairResponseMissingAccessToken) {
|
| + TestURLFetcher* url_fetcher1 = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kValidSetCookieHeader);
|
| + TestURLFetcher* url_fetcher2 = SetupGetTokenPair(
|
| + true, RC_REQUEST_OK, kTokenResponseNoAccessToken);
|
| + EXPECT_CALL(consumer_, OnGetTokenFailure(_)).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher1);
|
| + fetcher_.OnURLFetchComplete(url_fetcher2);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, Success) {
|
| + TestURLFetcher* url_fetcher1 = SetupGetAuthCode(
|
| + true, RC_REQUEST_OK, kValidSetCookieHeader);
|
| + TestURLFetcher* url_fetcher2 = SetupGetTokenPair(
|
| + true, RC_REQUEST_OK, kValidTokenResponse);
|
| + EXPECT_CALL(consumer_, OnGetTokenSuccess("rt1", "at1")).Times(1);
|
| + fetcher_.Start("auth_token");
|
| + fetcher_.OnURLFetchComplete(url_fetcher1);
|
| + fetcher_.OnURLFetchComplete(url_fetcher2);
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, ParseGetAuthCodeResponse) {
|
| + { // No cookies.
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| +
|
| + std::string auth_code;
|
| + EXPECT_FALSE(OAuth2LoginTokenFetcher::ParseGetAuthCodeResponse(
|
| + &url_fetcher, &auth_code));
|
| + EXPECT_TRUE(auth_code.empty());
|
| + }
|
| + { // Some cookies, nothing appropriate.
|
| + ResponseCookies cookies;
|
| + cookies.push_back("foo");
|
| + cookies.push_back("oauth_code=foo");
|
| + cookies.push_back(kSetCookieHeaderMissingOAuthCode);
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| + url_fetcher.set_cookies(cookies);
|
| +
|
| + std::string auth_code;
|
| + EXPECT_FALSE(OAuth2LoginTokenFetcher::ParseGetAuthCodeResponse(
|
| + &url_fetcher, &auth_code));
|
| + EXPECT_TRUE(auth_code.empty());
|
| + }
|
| + { // Single cookie: a valid one.
|
| + ResponseCookies cookies;
|
| + cookies.push_back(kValidSetCookieHeader);
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| + url_fetcher.set_cookies(cookies);
|
| +
|
| + std::string auth_code;
|
| + EXPECT_TRUE(OAuth2LoginTokenFetcher::ParseGetAuthCodeResponse(
|
| + &url_fetcher, &auth_code));
|
| + EXPECT_EQ("test-code", auth_code);
|
| + }
|
| + { // Some cookies: with a valid one.
|
| + ResponseCookies cookies;
|
| + cookies.push_back(kSetCookieHeaderMissingSecure);
|
| + cookies.push_back(kSetCookieHeaderMissingHttpOnly);
|
| + cookies.push_back(kSetCookieHeaderMissingOAuthCode);
|
| + cookies.push_back(kValidSetCookieHeader);
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| + url_fetcher.set_cookies(cookies);
|
| +
|
| + std::string auth_code;
|
| + EXPECT_TRUE(OAuth2LoginTokenFetcher::ParseGetAuthCodeResponse(
|
| + &url_fetcher, &auth_code));
|
| + EXPECT_EQ("test-code", auth_code);
|
| + }
|
| +}
|
| +
|
| +TEST_F(OAuth2LoginTokenFetcherTest, ParseGetTokenPairResponse) {
|
| + { // No body.
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| +
|
| + std::string rt;
|
| + std::string at;
|
| + EXPECT_FALSE(OAuth2LoginTokenFetcher::ParseGetTokenPairResponse(
|
| + &url_fetcher, &rt, &at));
|
| + EXPECT_TRUE(rt.empty());
|
| + EXPECT_TRUE(at.empty());
|
| + }
|
| + { // Bad json.
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| + url_fetcher.SetResponseString("foo");
|
| +
|
| + std::string rt;
|
| + std::string at;
|
| + EXPECT_FALSE(OAuth2LoginTokenFetcher::ParseGetTokenPairResponse(
|
| + &url_fetcher, &rt, &at));
|
| + EXPECT_TRUE(rt.empty());
|
| + EXPECT_TRUE(at.empty());
|
| + }
|
| + { // Valid json: refresh token missing.
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| + url_fetcher.SetResponseString(kTokenResponseNoRefreshToken);
|
| +
|
| + std::string rt;
|
| + std::string at;
|
| + EXPECT_FALSE(OAuth2LoginTokenFetcher::ParseGetTokenPairResponse(
|
| + &url_fetcher, &rt, &at));
|
| + EXPECT_TRUE(rt.empty());
|
| + EXPECT_TRUE(at.empty());
|
| + }
|
| + { // Valid json: access token missing.
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| + url_fetcher.SetResponseString(kTokenResponseNoAccessToken);
|
| +
|
| + std::string rt;
|
| + std::string at;
|
| + EXPECT_FALSE(OAuth2LoginTokenFetcher::ParseGetTokenPairResponse(
|
| + &url_fetcher, &rt, &at));
|
| + EXPECT_TRUE(rt.empty());
|
| + EXPECT_TRUE(at.empty());
|
| + }
|
| + { // Valid json: all good.
|
| + TestURLFetcher url_fetcher(0, GURL("www.google.com"), NULL);
|
| + url_fetcher.SetResponseString(kValidTokenResponse);
|
| +
|
| + std::string rt;
|
| + std::string at;
|
| + EXPECT_TRUE(OAuth2LoginTokenFetcher::ParseGetTokenPairResponse(
|
| + &url_fetcher, &rt, &at));
|
| + EXPECT_EQ("rt1", rt);
|
| + EXPECT_EQ("at1", at);
|
| + }
|
| +}
|
|
|