Index: remoting/test/app_remoting_test_driver_environment.cc |
diff --git a/remoting/test/app_remoting_test_driver_environment.cc b/remoting/test/app_remoting_test_driver_environment.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..09532b661e9e1a704e8d3f920dfd23f844f82061 |
--- /dev/null |
+++ b/remoting/test/app_remoting_test_driver_environment.cc |
@@ -0,0 +1,172 @@ |
+// Copyright 2015 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "remoting/test/app_remoting_test_driver_environment.h" |
+ |
+#include "base/bind.h" |
+#include "base/callback_forward.h" |
+#include "base/logging.h" |
+#include "base/message_loop/message_loop.h" |
+#include "base/run_loop.h" |
+ |
+namespace remoting { |
+namespace test { |
+ |
+AppRemotingTestDriverEnvironment* AppRemotingSharedData; |
+ |
+AppRemotingTestDriverEnvironment::AppRemotingTestDriverEnvironment( |
+ const std::string& user_name, |
+ const std::string& service_environment) |
+ : user_name_(user_name), |
+ service_environment_(service_environment) { |
+ DCHECK(!user_name_.empty()); |
+ DCHECK(!service_environment.empty()); |
+} |
+ |
+AppRemotingTestDriverEnvironment::~AppRemotingTestDriverEnvironment() { |
+} |
+ |
+bool AppRemotingTestDriverEnvironment::Initialize( |
+ const std::string& auth_code) { |
+ if (!access_token_.empty()) { |
+ return true; |
+ } |
+ |
+ if (!refresh_token_store_) { |
+ refresh_token_store_ = GetRefreshTokenStoreForDisk(); |
+ } |
+ |
+ // Check to see if we have a refresh token stored for this user. |
+ refresh_token_ = refresh_token_store_->ReadRefreshTokenFromDisk(user_name_); |
+ if (refresh_token_.empty()) { |
+ // This isn't necessarily an error as this might be a first run scenario. |
+ DVLOG(1) << "No refresh token stored for " << user_name_; |
+ |
+ if (auth_code.empty()) { |
+ // No token and no Auth code means no service connectivity, bail! |
+ LOG(ERROR) << "Cannot retrieve an access token without a stored refresh" |
+ << " token on disk or an auth_code passed into the tool"; |
+ return false; |
+ } |
+ } |
+ |
+ if (!RetrieveAccessToken(auth_code)) { |
+ // If we cannot retrieve an access token, then nothing is going to work and |
+ // we should let the caller know that our object is not ready to be used. |
+ return false; |
+ } |
+ |
+ return true; |
+} |
+ |
+bool AppRemotingTestDriverEnvironment::RefreshAccessToken() { |
+ DCHECK(!refresh_token_.empty()); |
+ |
+ // Empty auth code is used when refreshing. |
+ return RetrieveAccessToken(std::string()); |
+} |
+ |
+void AppRemotingTestDriverEnvironment::SetAccessTokenFetcherForTest( |
+ scoped_ptr<remoting::test::AccessTokenFetcher> mock_fetcher) { |
+ mock_access_token_fetcher_ = mock_fetcher.Pass(); |
+} |
+ |
+void AppRemotingTestDriverEnvironment::SetRefreshTokenStoreForTest( |
+ scoped_ptr<remoting::test::RefreshTokenStoreInterface> mock_token_store) { |
+ refresh_token_store_ = mock_token_store.Pass(); |
+} |
+ |
+void AppRemotingTestDriverEnvironment::SetUp() { |
Wez
2015/02/19 22:00:23
Do you need these at all, now that they are empty?
joedow
2015/02/20 02:58:36
Done.
|
+} |
+ |
+void AppRemotingTestDriverEnvironment::TearDown() { |
+} |
+ |
+bool AppRemotingTestDriverEnvironment::RetrieveAccessToken( |
+ const std::string& auth_code) { |
+ scoped_ptr<base::MessageLoopForIO> message_loop; |
+ |
+ if (!base::MessageLoop::current()) { |
+ // Create a temporary message loop if the current thread does not already |
+ // have one so we can use its task runner for our network request. |
+ message_loop.reset(new base::MessageLoopForIO); |
+ } |
+ |
+ base::RunLoop network_request_run_loop; |
Wez
2015/02/19 22:00:23
nit: Just run_loop?
joedow
2015/02/20 02:58:36
Done.
|
+ |
+ access_token_.clear(); |
+ |
+ AccessTokenCallback access_token_callback = |
+ base::Bind(&AppRemotingTestDriverEnvironment::OnAccessTokenRetrieved, |
+ base::Unretained(this), |
+ network_request_run_loop.QuitClosure()); |
+ |
+ scoped_ptr<remoting::test::AccessTokenFetcher> access_token_fetcher; |
+ if (!mock_access_token_fetcher_) { |
+ access_token_fetcher.reset(new remoting::test::AccessTokenFetcher()); |
+ } else { |
+ access_token_fetcher.reset(mock_access_token_fetcher_.get()); |
Wez
2015/02/19 22:00:23
This is a risky construct; instead of taking owner
joedow
2015/02/20 02:58:36
Done.
|
+ } |
+ |
+ if (!auth_code.empty()) { |
+ // If the user passed in an authcode, then use it to retrieve an |
+ // updated access/refresh token. |
+ access_token_fetcher->GetAccessTokenFromAuthCode( |
+ auth_code, |
+ access_token_callback); |
+ } else { |
+ DCHECK(!refresh_token_.empty()); |
+ |
+ access_token_fetcher->GetAccessTokenFromRefreshToken( |
+ refresh_token_, |
+ access_token_callback); |
+ } |
+ |
+ network_request_run_loop.Run(); |
+ |
+ // If we are using the mock access token fetcher, then release it here so it |
+ // is not destroyed at the end of the function. |
+ if (mock_access_token_fetcher_) { |
+ ignore_result(access_token_fetcher.release()); |
+ } |
+ |
+ // If we were using an auth_code and received a valid refresh token, |
+ // then we want to store it locally. If we had an auth code and did not |
+ // receive a refresh token, then we should let the user know and exit. |
+ if (!auth_code.empty()) { |
+ if (!refresh_token_.empty()) { |
+ if (!refresh_token_store_->WriteRefreshTokenToDisk( |
+ user_name_, |
+ refresh_token_)) { |
+ // If we failed to persist the refresh token, then we should let the |
+ // user sort out the issue before continuing. |
+ return false; |
+ } |
+ } else { |
+ LOG(ERROR) << "Failed to use AUTH CODE to retrieve a refresh token.\n" |
+ << "Was the one-time use AUTH CODE used more than once?"; |
+ return false; |
+ } |
+ } |
+ |
+ if (access_token_.empty()) { |
+ LOG(ERROR) << "Failed to retrieve access token."; |
+ return false; |
+ } |
+ |
+ return true; |
+} |
+ |
+void AppRemotingTestDriverEnvironment::OnAccessTokenRetrieved( |
+ base::Closure run_loop_quit_closure, |
+ const std::string& access_token, |
+ const std::string& refresh_token) { |
+ access_token_ = access_token; |
+ refresh_token_ = refresh_token; |
+ |
+ run_loop_quit_closure.Run(); |
+} |
+ |
+} // namespace test |
+} // namespace remoting |