| Index: sync/internal_api/attachments/attachment_downloader_impl_unittest.cc
|
| diff --git a/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc b/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc
|
| index 0cae099337e11942ea598066ca02b2dd5676ceea..1d026eb56a5f6de7e01c241b1e18dd332c30057a 100644
|
| --- a/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc
|
| +++ b/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc
|
| @@ -152,12 +152,7 @@
|
| HASH_HEADER_INVALID
|
| };
|
|
|
| - AttachmentDownloaderImplTest()
|
| - : num_completed_downloads_(0),
|
| - attachment_id_(
|
| - Attachment::Create(new base::RefCountedStaticMemory(
|
| - kAttachmentContent,
|
| - strlen(kAttachmentContent))).GetId()) {}
|
| + AttachmentDownloaderImplTest() : num_completed_downloads_(0) {}
|
|
|
| void SetUp() override;
|
| void TearDown() override;
|
| @@ -167,8 +162,6 @@
|
| MockOAuth2TokenService* token_service() { return token_service_.get(); }
|
|
|
| int num_completed_downloads() { return num_completed_downloads_; }
|
| -
|
| - const AttachmentId attachment_id() const { return attachment_id_; }
|
|
|
| AttachmentDownloader::DownloadCallback download_callback(
|
| const AttachmentId& id) {
|
| @@ -200,7 +193,6 @@
|
| scoped_ptr<AttachmentDownloader> attachment_downloader_;
|
| ResultsMap download_results_;
|
| int num_completed_downloads_;
|
| - const AttachmentId attachment_id_;
|
| };
|
|
|
| void AttachmentDownloaderImplTest::SetUp() {
|
| @@ -302,7 +294,7 @@
|
| }
|
|
|
| TEST_F(AttachmentDownloaderImplTest, HappyCase) {
|
| - AttachmentId id1 = attachment_id();
|
| + AttachmentId id1 = AttachmentId::Create();
|
| // DownloadAttachment should trigger RequestAccessToken.
|
| downloader()->DownloadAttachment(id1, download_callback(id1));
|
| RunMessageLoop();
|
| @@ -322,7 +314,7 @@
|
| }
|
|
|
| TEST_F(AttachmentDownloaderImplTest, SameIdMultipleDownloads) {
|
| - AttachmentId id1 = attachment_id();
|
| + AttachmentId id1 = AttachmentId::Create();
|
| base::HistogramTester histogram_tester;
|
| // Call DownloadAttachment two times for the same id.
|
| downloader()->DownloadAttachment(id1, download_callback(id1));
|
| @@ -359,8 +351,8 @@
|
| }
|
|
|
| TEST_F(AttachmentDownloaderImplTest, RequestAccessTokenFails) {
|
| - AttachmentId id1 = attachment_id();
|
| - AttachmentId id2 = AttachmentId::Create(id1.GetSize(), id1.GetCrc32c());
|
| + AttachmentId id1 = AttachmentId::Create();
|
| + AttachmentId id2 = AttachmentId::Create();
|
| // Trigger first RequestAccessToken.
|
| downloader()->DownloadAttachment(id1, download_callback(id1));
|
| RunMessageLoop();
|
| @@ -383,7 +375,7 @@
|
| }
|
|
|
| TEST_F(AttachmentDownloaderImplTest, URLFetcher_BadToken) {
|
| - AttachmentId id1 = attachment_id();
|
| + AttachmentId id1 = AttachmentId::Create();
|
| downloader()->DownloadAttachment(id1, download_callback(id1));
|
| RunMessageLoop();
|
| // Return valid access token.
|
| @@ -401,7 +393,7 @@
|
| }
|
|
|
| TEST_F(AttachmentDownloaderImplTest, URLFetcher_ServiceUnavailable) {
|
| - AttachmentId id1 = attachment_id();
|
| + AttachmentId id1 = AttachmentId::Create();
|
| downloader()->DownloadAttachment(id1, download_callback(id1));
|
| RunMessageLoop();
|
| // Return valid access token.
|
| @@ -421,7 +413,7 @@
|
| // Verify that if no hash is present on the response the downloader accepts the
|
| // received attachment.
|
| TEST_F(AttachmentDownloaderImplTest, NoHash) {
|
| - AttachmentId id1 = attachment_id();
|
| + AttachmentId id1 = AttachmentId::Create();
|
| downloader()->DownloadAttachment(id1, download_callback(id1));
|
| RunMessageLoop();
|
| token_service()->RespondToAccessTokenRequest(
|
| @@ -434,7 +426,7 @@
|
| // Verify that if an invalid hash is present on the response the downloader
|
| // treats it as a transient error.
|
| TEST_F(AttachmentDownloaderImplTest, InvalidHash) {
|
| - AttachmentId id1 = attachment_id();
|
| + AttachmentId id1 = AttachmentId::Create();
|
| downloader()->DownloadAttachment(id1, download_callback(id1));
|
| RunMessageLoop();
|
| token_service()->RespondToAccessTokenRequest(
|
| @@ -443,21 +435,6 @@
|
| CompleteDownload(net::HTTP_OK, HASH_HEADER_INVALID);
|
| VerifyDownloadResult(id1, AttachmentDownloader::DOWNLOAD_TRANSIENT_ERROR);
|
| }
|
| -
|
| -// Verify that when the hash from the attachment id does not match the one on
|
| -// the response the result is an unspecified error.
|
| -TEST_F(AttachmentDownloaderImplTest, IdHashDoesNotMatch) {
|
| - // id1 has the wrong crc32c.
|
| - AttachmentId id1 = AttachmentId::Create(attachment_id().GetSize(), 12345);
|
| - downloader()->DownloadAttachment(id1, download_callback(id1));
|
| - RunMessageLoop();
|
| - token_service()->RespondToAccessTokenRequest(
|
| - GoogleServiceAuthError::AuthErrorNone());
|
| - RunMessageLoop();
|
| - CompleteDownload(net::HTTP_OK, HASH_HEADER_VALID);
|
| - VerifyDownloadResult(id1, AttachmentDownloader::DOWNLOAD_UNSPECIFIED_ERROR);
|
| -}
|
| -
|
|
|
| // Verify that extract fails when there is no headers object.
|
| TEST_F(AttachmentDownloaderImplTest, ExtractCrc32c_NoHeaders) {
|
|
|