Index: sync/internal_api/attachments/attachment_downloader_impl_unittest.cc |
diff --git a/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc b/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc |
index 0cae099337e11942ea598066ca02b2dd5676ceea..1d026eb56a5f6de7e01c241b1e18dd332c30057a 100644 |
--- a/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc |
+++ b/sync/internal_api/attachments/attachment_downloader_impl_unittest.cc |
@@ -152,12 +152,7 @@ |
HASH_HEADER_INVALID |
}; |
- AttachmentDownloaderImplTest() |
- : num_completed_downloads_(0), |
- attachment_id_( |
- Attachment::Create(new base::RefCountedStaticMemory( |
- kAttachmentContent, |
- strlen(kAttachmentContent))).GetId()) {} |
+ AttachmentDownloaderImplTest() : num_completed_downloads_(0) {} |
void SetUp() override; |
void TearDown() override; |
@@ -167,8 +162,6 @@ |
MockOAuth2TokenService* token_service() { return token_service_.get(); } |
int num_completed_downloads() { return num_completed_downloads_; } |
- |
- const AttachmentId attachment_id() const { return attachment_id_; } |
AttachmentDownloader::DownloadCallback download_callback( |
const AttachmentId& id) { |
@@ -200,7 +193,6 @@ |
scoped_ptr<AttachmentDownloader> attachment_downloader_; |
ResultsMap download_results_; |
int num_completed_downloads_; |
- const AttachmentId attachment_id_; |
}; |
void AttachmentDownloaderImplTest::SetUp() { |
@@ -302,7 +294,7 @@ |
} |
TEST_F(AttachmentDownloaderImplTest, HappyCase) { |
- AttachmentId id1 = attachment_id(); |
+ AttachmentId id1 = AttachmentId::Create(); |
// DownloadAttachment should trigger RequestAccessToken. |
downloader()->DownloadAttachment(id1, download_callback(id1)); |
RunMessageLoop(); |
@@ -322,7 +314,7 @@ |
} |
TEST_F(AttachmentDownloaderImplTest, SameIdMultipleDownloads) { |
- AttachmentId id1 = attachment_id(); |
+ AttachmentId id1 = AttachmentId::Create(); |
base::HistogramTester histogram_tester; |
// Call DownloadAttachment two times for the same id. |
downloader()->DownloadAttachment(id1, download_callback(id1)); |
@@ -359,8 +351,8 @@ |
} |
TEST_F(AttachmentDownloaderImplTest, RequestAccessTokenFails) { |
- AttachmentId id1 = attachment_id(); |
- AttachmentId id2 = AttachmentId::Create(id1.GetSize(), id1.GetCrc32c()); |
+ AttachmentId id1 = AttachmentId::Create(); |
+ AttachmentId id2 = AttachmentId::Create(); |
// Trigger first RequestAccessToken. |
downloader()->DownloadAttachment(id1, download_callback(id1)); |
RunMessageLoop(); |
@@ -383,7 +375,7 @@ |
} |
TEST_F(AttachmentDownloaderImplTest, URLFetcher_BadToken) { |
- AttachmentId id1 = attachment_id(); |
+ AttachmentId id1 = AttachmentId::Create(); |
downloader()->DownloadAttachment(id1, download_callback(id1)); |
RunMessageLoop(); |
// Return valid access token. |
@@ -401,7 +393,7 @@ |
} |
TEST_F(AttachmentDownloaderImplTest, URLFetcher_ServiceUnavailable) { |
- AttachmentId id1 = attachment_id(); |
+ AttachmentId id1 = AttachmentId::Create(); |
downloader()->DownloadAttachment(id1, download_callback(id1)); |
RunMessageLoop(); |
// Return valid access token. |
@@ -421,7 +413,7 @@ |
// Verify that if no hash is present on the response the downloader accepts the |
// received attachment. |
TEST_F(AttachmentDownloaderImplTest, NoHash) { |
- AttachmentId id1 = attachment_id(); |
+ AttachmentId id1 = AttachmentId::Create(); |
downloader()->DownloadAttachment(id1, download_callback(id1)); |
RunMessageLoop(); |
token_service()->RespondToAccessTokenRequest( |
@@ -434,7 +426,7 @@ |
// Verify that if an invalid hash is present on the response the downloader |
// treats it as a transient error. |
TEST_F(AttachmentDownloaderImplTest, InvalidHash) { |
- AttachmentId id1 = attachment_id(); |
+ AttachmentId id1 = AttachmentId::Create(); |
downloader()->DownloadAttachment(id1, download_callback(id1)); |
RunMessageLoop(); |
token_service()->RespondToAccessTokenRequest( |
@@ -443,21 +435,6 @@ |
CompleteDownload(net::HTTP_OK, HASH_HEADER_INVALID); |
VerifyDownloadResult(id1, AttachmentDownloader::DOWNLOAD_TRANSIENT_ERROR); |
} |
- |
-// Verify that when the hash from the attachment id does not match the one on |
-// the response the result is an unspecified error. |
-TEST_F(AttachmentDownloaderImplTest, IdHashDoesNotMatch) { |
- // id1 has the wrong crc32c. |
- AttachmentId id1 = AttachmentId::Create(attachment_id().GetSize(), 12345); |
- downloader()->DownloadAttachment(id1, download_callback(id1)); |
- RunMessageLoop(); |
- token_service()->RespondToAccessTokenRequest( |
- GoogleServiceAuthError::AuthErrorNone()); |
- RunMessageLoop(); |
- CompleteDownload(net::HTTP_OK, HASH_HEADER_VALID); |
- VerifyDownloadResult(id1, AttachmentDownloader::DOWNLOAD_UNSPECIFIED_ERROR); |
-} |
- |
// Verify that extract fails when there is no headers object. |
TEST_F(AttachmentDownloaderImplTest, ExtractCrc32c_NoHeaders) { |