Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(891)

Unified Diff: remoting/test/app_remoting_test_driver_environment.cc

Issue 880273006: Adding the AccessTokenFetcher and Environment class to the app remoting test (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Updating AccessTokenFetcher Unittests to use the FakeURLFetcherFactory Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: remoting/test/app_remoting_test_driver_environment.cc
diff --git a/remoting/test/app_remoting_test_driver_environment.cc b/remoting/test/app_remoting_test_driver_environment.cc
new file mode 100644
index 0000000000000000000000000000000000000000..09532b661e9e1a704e8d3f920dfd23f844f82061
--- /dev/null
+++ b/remoting/test/app_remoting_test_driver_environment.cc
@@ -0,0 +1,172 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "remoting/test/app_remoting_test_driver_environment.h"
+
+#include "base/bind.h"
+#include "base/callback_forward.h"
+#include "base/logging.h"
+#include "base/message_loop/message_loop.h"
+#include "base/run_loop.h"
+
+namespace remoting {
+namespace test {
+
+AppRemotingTestDriverEnvironment* AppRemotingSharedData;
+
+AppRemotingTestDriverEnvironment::AppRemotingTestDriverEnvironment(
+ const std::string& user_name,
+ const std::string& service_environment)
+ : user_name_(user_name),
+ service_environment_(service_environment) {
+ DCHECK(!user_name_.empty());
+ DCHECK(!service_environment.empty());
+}
+
+AppRemotingTestDriverEnvironment::~AppRemotingTestDriverEnvironment() {
+}
+
+bool AppRemotingTestDriverEnvironment::Initialize(
+ const std::string& auth_code) {
+ if (!access_token_.empty()) {
+ return true;
+ }
+
+ if (!refresh_token_store_) {
+ refresh_token_store_ = GetRefreshTokenStoreForDisk();
+ }
+
+ // Check to see if we have a refresh token stored for this user.
+ refresh_token_ = refresh_token_store_->ReadRefreshTokenFromDisk(user_name_);
+ if (refresh_token_.empty()) {
+ // This isn't necessarily an error as this might be a first run scenario.
+ DVLOG(1) << "No refresh token stored for " << user_name_;
+
+ if (auth_code.empty()) {
+ // No token and no Auth code means no service connectivity, bail!
+ LOG(ERROR) << "Cannot retrieve an access token without a stored refresh"
+ << " token on disk or an auth_code passed into the tool";
+ return false;
+ }
+ }
+
+ if (!RetrieveAccessToken(auth_code)) {
+ // If we cannot retrieve an access token, then nothing is going to work and
+ // we should let the caller know that our object is not ready to be used.
+ return false;
+ }
+
+ return true;
+}
+
+bool AppRemotingTestDriverEnvironment::RefreshAccessToken() {
+ DCHECK(!refresh_token_.empty());
+
+ // Empty auth code is used when refreshing.
+ return RetrieveAccessToken(std::string());
+}
+
+void AppRemotingTestDriverEnvironment::SetAccessTokenFetcherForTest(
+ scoped_ptr<remoting::test::AccessTokenFetcher> mock_fetcher) {
+ mock_access_token_fetcher_ = mock_fetcher.Pass();
+}
+
+void AppRemotingTestDriverEnvironment::SetRefreshTokenStoreForTest(
+ scoped_ptr<remoting::test::RefreshTokenStoreInterface> mock_token_store) {
+ refresh_token_store_ = mock_token_store.Pass();
+}
+
+void AppRemotingTestDriverEnvironment::SetUp() {
Wez 2015/02/19 22:00:23 Do you need these at all, now that they are empty?
joedow 2015/02/20 02:58:36 Done.
+}
+
+void AppRemotingTestDriverEnvironment::TearDown() {
+}
+
+bool AppRemotingTestDriverEnvironment::RetrieveAccessToken(
+ const std::string& auth_code) {
+ scoped_ptr<base::MessageLoopForIO> message_loop;
+
+ if (!base::MessageLoop::current()) {
+ // Create a temporary message loop if the current thread does not already
+ // have one so we can use its task runner for our network request.
+ message_loop.reset(new base::MessageLoopForIO);
+ }
+
+ base::RunLoop network_request_run_loop;
Wez 2015/02/19 22:00:23 nit: Just run_loop?
joedow 2015/02/20 02:58:36 Done.
+
+ access_token_.clear();
+
+ AccessTokenCallback access_token_callback =
+ base::Bind(&AppRemotingTestDriverEnvironment::OnAccessTokenRetrieved,
+ base::Unretained(this),
+ network_request_run_loop.QuitClosure());
+
+ scoped_ptr<remoting::test::AccessTokenFetcher> access_token_fetcher;
+ if (!mock_access_token_fetcher_) {
+ access_token_fetcher.reset(new remoting::test::AccessTokenFetcher());
+ } else {
+ access_token_fetcher.reset(mock_access_token_fetcher_.get());
Wez 2015/02/19 22:00:23 This is a risky construct; instead of taking owner
joedow 2015/02/20 02:58:36 Done.
+ }
+
+ if (!auth_code.empty()) {
+ // If the user passed in an authcode, then use it to retrieve an
+ // updated access/refresh token.
+ access_token_fetcher->GetAccessTokenFromAuthCode(
+ auth_code,
+ access_token_callback);
+ } else {
+ DCHECK(!refresh_token_.empty());
+
+ access_token_fetcher->GetAccessTokenFromRefreshToken(
+ refresh_token_,
+ access_token_callback);
+ }
+
+ network_request_run_loop.Run();
+
+ // If we are using the mock access token fetcher, then release it here so it
+ // is not destroyed at the end of the function.
+ if (mock_access_token_fetcher_) {
+ ignore_result(access_token_fetcher.release());
+ }
+
+ // If we were using an auth_code and received a valid refresh token,
+ // then we want to store it locally. If we had an auth code and did not
+ // receive a refresh token, then we should let the user know and exit.
+ if (!auth_code.empty()) {
+ if (!refresh_token_.empty()) {
+ if (!refresh_token_store_->WriteRefreshTokenToDisk(
+ user_name_,
+ refresh_token_)) {
+ // If we failed to persist the refresh token, then we should let the
+ // user sort out the issue before continuing.
+ return false;
+ }
+ } else {
+ LOG(ERROR) << "Failed to use AUTH CODE to retrieve a refresh token.\n"
+ << "Was the one-time use AUTH CODE used more than once?";
+ return false;
+ }
+ }
+
+ if (access_token_.empty()) {
+ LOG(ERROR) << "Failed to retrieve access token.";
+ return false;
+ }
+
+ return true;
+}
+
+void AppRemotingTestDriverEnvironment::OnAccessTokenRetrieved(
+ base::Closure run_loop_quit_closure,
+ const std::string& access_token,
+ const std::string& refresh_token) {
+ access_token_ = access_token;
+ refresh_token_ = refresh_token;
+
+ run_loop_quit_closure.Run();
+}
+
+} // namespace test
+} // namespace remoting

Powered by Google App Engine
This is Rietveld 408576698