Index: chrome/browser/signin/token_service_unittest.cc |
diff --git a/chrome/browser/signin/token_service_unittest.cc b/chrome/browser/signin/token_service_unittest.cc |
index 2c8b26438386029e941ec629baccc41a04f5ff3f..6bf25efef02e5cf9e426addc3956c1c6a7fdd5b6 100644 |
--- a/chrome/browser/signin/token_service_unittest.cc |
+++ b/chrome/browser/signin/token_service_unittest.cc |
@@ -73,13 +73,14 @@ void TokenServiceTestHarness::SetUp() { |
profile_.reset(new TestingProfile()); |
profile_->CreateWebDataService(false); |
WaitForDBLoadCompletion(); |
+ service_ = profile_->GetTokenService(); |
success_tracker_.ListenFor(chrome::NOTIFICATION_TOKEN_AVAILABLE, |
- content::Source<TokenService>(&service_)); |
+ content::Source<TokenService>(service_)); |
failure_tracker_.ListenFor(chrome::NOTIFICATION_TOKEN_REQUEST_FAILED, |
- content::Source<TokenService>(&service_)); |
+ content::Source<TokenService>(service_)); |
- service_.Initialize("test", profile_.get()); |
+ service_->Initialize("test", profile_.get()); |
} |
void TokenServiceTestHarness::TearDown() { |
@@ -112,8 +113,8 @@ class TokenServiceTest : public TokenServiceTestHarness { |
public: |
virtual void SetUp() { |
TokenServiceTestHarness::SetUp(); |
- service_.UpdateCredentials(credentials_); |
- service_.UpdateOAuthCredentials(oauth_token_, oauth_secret_); |
+ service_->UpdateCredentials(credentials_); |
+ service_->UpdateOAuthCredentials(oauth_token_, oauth_secret_); |
} |
protected: |
void TestLoadSingleToken( |
@@ -123,7 +124,7 @@ class TokenServiceTest : public TokenServiceTestHarness { |
std::string token = service + "_token"; |
(*db_tokens)[service] = token; |
size_t prev_success_size = success_tracker_.size(); |
- service_.LoadTokensIntoMemory(*db_tokens, memory_tokens); |
+ service_->LoadTokensIntoMemory(*db_tokens, memory_tokens); |
// Check notification. |
EXPECT_EQ(prev_success_size + 1, success_tracker_.size()); |
@@ -137,23 +138,23 @@ class TokenServiceTest : public TokenServiceTestHarness { |
}; |
TEST_F(TokenServiceTest, SanityCheck) { |
- EXPECT_TRUE(service_.HasLsid()); |
- EXPECT_EQ(service_.GetLsid(), "lsid"); |
- EXPECT_FALSE(service_.HasTokenForService("nonexistent service")); |
- EXPECT_TRUE(service_.HasOAuthCredentials()); |
- EXPECT_EQ(service_.GetOAuthToken(), "oauth"); |
- EXPECT_EQ(service_.GetOAuthSecret(), "secret"); |
+ EXPECT_TRUE(service_->HasLsid()); |
+ EXPECT_EQ(service_->GetLsid(), "lsid"); |
+ EXPECT_FALSE(service_->HasTokenForService("nonexistent service")); |
+ EXPECT_TRUE(service_->HasOAuthCredentials()); |
+ EXPECT_EQ(service_->GetOAuthToken(), "oauth"); |
+ EXPECT_EQ(service_->GetOAuthSecret(), "secret"); |
} |
TEST_F(TokenServiceTest, NoToken) { |
- EXPECT_FALSE(service_.HasTokenForService("nonexistent service")); |
- EXPECT_EQ(service_.GetTokenForService("nonexistent service"), std::string()); |
+ EXPECT_FALSE(service_->HasTokenForService("nonexistent service")); |
+ EXPECT_EQ(service_->GetTokenForService("nonexistent service"), std::string()); |
} |
TEST_F(TokenServiceTest, NotificationSuccess) { |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
EXPECT_EQ(1U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
@@ -166,7 +167,7 @@ TEST_F(TokenServiceTest, NotificationSuccess) { |
TEST_F(TokenServiceTest, NotificationOAuthLoginTokenSuccess) { |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
- service_.OnOAuthLoginTokenSuccess("rt1", "at1", 3600); |
+ service_->OnOAuthLoginTokenSuccess("rt1", "at1", 3600); |
EXPECT_EQ(1U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
@@ -180,7 +181,7 @@ TEST_F(TokenServiceTest, NotificationOAuthLoginTokenSuccess) { |
TEST_F(TokenServiceTest, NotificationSuccessOAuth) { |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
- service_.OnOAuthWrapBridgeSuccess( |
+ service_->OnOAuthWrapBridgeSuccess( |
GaiaConstants::kSyncServiceOAuth, "token", "3600"); |
EXPECT_EQ(1U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
@@ -195,7 +196,7 @@ TEST_F(TokenServiceTest, NotificationFailed) { |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); |
- service_.OnIssueAuthTokenFailure(GaiaConstants::kSyncService, error); |
+ service_->OnIssueAuthTokenFailure(GaiaConstants::kSyncService, error); |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(1U, failure_tracker_.size()); |
@@ -210,7 +211,7 @@ TEST_F(TokenServiceTest, NotificationOAuthLoginTokenFailed) { |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); |
- service_.OnOAuthLoginTokenFailure(error); |
+ service_->OnOAuthLoginTokenFailure(error); |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(1U, failure_tracker_.size()); |
@@ -226,7 +227,7 @@ TEST_F(TokenServiceTest, NotificationFailedOAuth) { |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(0U, failure_tracker_.size()); |
GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); |
- service_.OnOAuthWrapBridgeFailure(GaiaConstants::kSyncServiceOAuth, error); |
+ service_->OnOAuthWrapBridgeFailure(GaiaConstants::kSyncServiceOAuth, error); |
EXPECT_EQ(0U, success_tracker_.size()); |
EXPECT_EQ(1U, failure_tracker_.size()); |
@@ -238,120 +239,122 @@ TEST_F(TokenServiceTest, NotificationFailedOAuth) { |
} |
TEST_F(TokenServiceTest, OnTokenSuccessUpdate) { |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), "token"); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), "token"); |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token2"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), "token2"); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token2"); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), |
+ "token2"); |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, ""); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), ""); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, ""); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), ""); |
} |
TEST_F(TokenServiceTest, OnOAuth2LoginTokenSuccessUpdate) { |
std::string service = GaiaConstants::kGaiaOAuth2LoginRefreshToken; |
- service_.OnOAuthLoginTokenSuccess("rt1", "at1", 3600); |
- EXPECT_TRUE(service_.HasOAuthLoginToken()); |
- EXPECT_EQ(service_.GetOAuth2LoginRefreshToken(), "rt1"); |
+ service_->OnOAuthLoginTokenSuccess("rt1", "at1", 3600); |
+ EXPECT_TRUE(service_->HasOAuthLoginToken()); |
+ EXPECT_EQ(service_->GetOAuth2LoginRefreshToken(), "rt1"); |
- service_.OnOAuthLoginTokenSuccess("rt2", "at2", 3600); |
- EXPECT_TRUE(service_.HasOAuthLoginToken()); |
- EXPECT_EQ(service_.GetOAuth2LoginRefreshToken(), "rt2"); |
+ service_->OnOAuthLoginTokenSuccess("rt2", "at2", 3600); |
+ EXPECT_TRUE(service_->HasOAuthLoginToken()); |
+ EXPECT_EQ(service_->GetOAuth2LoginRefreshToken(), "rt2"); |
- service_.OnOAuthLoginTokenSuccess("rt3", "at3", 3600); |
- EXPECT_TRUE(service_.HasOAuthLoginToken()); |
- EXPECT_EQ(service_.GetOAuth2LoginRefreshToken(), "rt3"); |
+ service_->OnOAuthLoginTokenSuccess("rt3", "at3", 3600); |
+ EXPECT_TRUE(service_->HasOAuthLoginToken()); |
+ EXPECT_EQ(service_->GetOAuth2LoginRefreshToken(), "rt3"); |
} |
TEST_F(TokenServiceTest, OnTokenSuccess) { |
// Don't "start fetching", just go ahead and issue the callback. |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
// Gaia returns the entire result as the token so while this is a shared |
// result with ClientLogin, it doesn't matter, we should still get it back. |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), "token"); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), "token"); |
// Try the OAuth service. |
- service_.OnOAuthWrapBridgeSuccess( |
+ service_->OnOAuthWrapBridgeSuccess( |
GaiaConstants::kSyncServiceOAuth, "token2", "3600"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncServiceOAuth), |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncServiceOAuth), |
"token2"); |
// First didn't change. |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), "token"); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), "token"); |
} |
TEST_F(TokenServiceTest, ResetSimple) { |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_TRUE(service_.HasLsid()); |
- service_.OnOAuthGetAccessTokenSuccess("token2", "secret"); |
- service_.OnOAuthWrapBridgeSuccess( |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_TRUE(service_->HasLsid()); |
+ service_->OnOAuthGetAccessTokenSuccess("token2", "secret"); |
+ service_->OnOAuthWrapBridgeSuccess( |
GaiaConstants::kSyncServiceOAuth, "token3", "4321"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_TRUE(service_.HasOAuthCredentials()); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_TRUE(service_->HasOAuthCredentials()); |
- service_.ResetCredentialsInMemory(); |
+ service_->ResetCredentialsInMemory(); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_FALSE(service_.HasLsid()); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasOAuthCredentials()); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_FALSE(service_->HasLsid()); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasOAuthCredentials()); |
} |
TEST_F(TokenServiceTest, ResetComplex) { |
TestURLFetcherFactory factory; |
- service_.StartFetchingTokens(); |
+ service_->StartFetchingTokens(); |
// You have to call delegates by hand with the test fetcher, |
// Let's pretend only one returned. |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "eraseme"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "eraseme"); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), |
"eraseme"); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
- service_.OnOAuthWrapBridgeSuccess( |
+ service_->OnOAuthWrapBridgeSuccess( |
GaiaConstants::kSyncServiceOAuth, "erasemetoo", "1234"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), |
"eraseme"); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncServiceOAuth), |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncServiceOAuth), |
"erasemetoo"); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
- service_.ResetCredentialsInMemory(); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
- EXPECT_FALSE(service_.HasLsid()); |
- EXPECT_FALSE(service_.HasOAuthCredentials()); |
+ service_->ResetCredentialsInMemory(); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
+ EXPECT_FALSE(service_->HasLsid()); |
+ EXPECT_FALSE(service_->HasOAuthCredentials()); |
// Now start using it again. |
- service_.UpdateCredentials(credentials_); |
- EXPECT_TRUE(service_.HasLsid()); |
- service_.StartFetchingTokens(); |
- service_.UpdateOAuthCredentials(oauth_token_, oauth_secret_); |
- EXPECT_TRUE(service_.HasOAuthCredentials()); |
- service_.StartFetchingOAuthTokens(); |
- |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
- service_.OnOAuthWrapBridgeSuccess( |
+ service_->UpdateCredentials(credentials_); |
+ EXPECT_TRUE(service_->HasLsid()); |
+ service_->StartFetchingTokens(); |
+ service_->UpdateOAuthCredentials(oauth_token_, oauth_secret_); |
+ EXPECT_TRUE(service_->HasOAuthCredentials()); |
+ service_->StartFetchingOAuthTokens(); |
+ |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
+ service_->OnOAuthWrapBridgeSuccess( |
GaiaConstants::kSyncServiceOAuth, "token2", "3600"); |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kTalkService, "token3"); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kTalkService, "token3"); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), "token"); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncServiceOAuth), |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), "token"); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncServiceOAuth), |
"token2"); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kTalkService), "token3"); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kTalkService), |
+ "token3"); |
} |
TEST_F(TokenServiceTest, FullIntegration) { |
@@ -360,22 +363,23 @@ TEST_F(TokenServiceTest, FullIntegration) { |
{ |
MockFactory<MockFetcher> factory; |
factory.set_results(result); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
- service_.StartFetchingTokens(); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_FALSE(service_->HasTokenForService( |
+ GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
+ service_->StartFetchingTokens(); |
} |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
// Gaia returns the entire result as the token so while this is a shared |
// result with ClientLogin, it doesn't matter, we should still get it back. |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kSyncService), result); |
- EXPECT_EQ(service_.GetTokenForService(GaiaConstants::kTalkService), result); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kSyncService), result); |
+ EXPECT_EQ(service_->GetTokenForService(GaiaConstants::kTalkService), result); |
- service_.ResetCredentialsInMemory(); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
+ service_->ResetCredentialsInMemory(); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
} |
TEST_F(TokenServiceTest, LoadTokensIntoMemoryBasic) { |
@@ -383,7 +387,7 @@ TEST_F(TokenServiceTest, LoadTokensIntoMemoryBasic) { |
std::map<std::string, std::string> db_tokens; |
std::map<std::string, std::string> memory_tokens; |
- service_.LoadTokensIntoMemory(db_tokens, &memory_tokens); |
+ service_->LoadTokensIntoMemory(db_tokens, &memory_tokens); |
EXPECT_TRUE(db_tokens.empty()); |
EXPECT_TRUE(memory_tokens.empty()); |
EXPECT_EQ(0U, success_tracker_.size()); |
@@ -412,11 +416,11 @@ TEST_F(TokenServiceTest, LoadTokensIntoMemoryAdvanced) { |
db_tokens["ignore"] = "token"; |
- service_.LoadTokensIntoMemory(db_tokens, &memory_tokens); |
+ service_->LoadTokensIntoMemory(db_tokens, &memory_tokens); |
EXPECT_TRUE(memory_tokens.empty()); |
db_tokens[GaiaConstants::kSyncService] = "pepper"; |
- service_.LoadTokensIntoMemory(db_tokens, &memory_tokens); |
+ service_->LoadTokensIntoMemory(db_tokens, &memory_tokens); |
EXPECT_EQ(1U, memory_tokens.count(GaiaConstants::kSyncService)); |
EXPECT_EQ(memory_tokens[GaiaConstants::kSyncService], "pepper"); |
EXPECT_EQ(1U, success_tracker_.size()); |
@@ -426,7 +430,7 @@ TEST_F(TokenServiceTest, LoadTokensIntoMemoryAdvanced) { |
// the disk as well, but an older token. |
db_tokens[GaiaConstants::kSyncService] = "ignoreme"; |
db_tokens[GaiaConstants::kSyncServiceOAuth] = "tomato"; |
- service_.LoadTokensIntoMemory(db_tokens, &memory_tokens); |
+ service_->LoadTokensIntoMemory(db_tokens, &memory_tokens); |
EXPECT_EQ(2U, memory_tokens.size()); |
EXPECT_EQ(1U, memory_tokens.count(GaiaConstants::kSyncServiceOAuth)); |
@@ -437,78 +441,78 @@ TEST_F(TokenServiceTest, LoadTokensIntoMemoryAdvanced) { |
} |
TEST_F(TokenServiceTest, WebDBLoadIntegration) { |
- service_.LoadTokensFromDB(); |
+ service_->LoadTokensFromDB(); |
WaitForDBLoadCompletion(); |
EXPECT_EQ(0U, success_tracker_.size()); |
// Should result in DB write. |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
EXPECT_EQ(1U, success_tracker_.size()); |
- service_.OnOAuthGetAccessTokenSuccess("token1", "secret"); |
- service_.OnOAuthWrapBridgeSuccess( |
+ service_->OnOAuthGetAccessTokenSuccess("token1", "secret"); |
+ service_->OnOAuthWrapBridgeSuccess( |
GaiaConstants::kSyncServiceOAuth, "token2", "3600"); |
EXPECT_EQ(2U, success_tracker_.size()); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
// Clean slate. |
- service_.ResetCredentialsInMemory(); |
+ service_->ResetCredentialsInMemory(); |
success_tracker_.Reset(); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- service_.LoadTokensFromDB(); |
+ service_->LoadTokensFromDB(); |
WaitForDBLoadCompletion(); |
EXPECT_EQ(2U, success_tracker_.size()); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
- EXPECT_TRUE(service_.HasLsid()); |
- EXPECT_TRUE(service_.HasOAuthCredentials()); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
+ EXPECT_TRUE(service_->HasLsid()); |
+ EXPECT_TRUE(service_->HasOAuthCredentials()); |
} |
TEST_F(TokenServiceTest, MultipleLoadResetIntegration) { |
// Should result in DB write. |
- service_.OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
- service_.ResetCredentialsInMemory(); |
+ service_->OnIssueAuthTokenSuccess(GaiaConstants::kSyncService, "token"); |
+ service_->ResetCredentialsInMemory(); |
success_tracker_.Reset(); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_FALSE(service_.HasLsid()); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_FALSE(service_->HasLsid()); |
- service_.OnOAuthGetAccessTokenSuccess("token2", "secret"); |
- service_.OnOAuthWrapBridgeSuccess( |
+ service_->OnOAuthGetAccessTokenSuccess("token2", "secret"); |
+ service_->OnOAuthWrapBridgeSuccess( |
GaiaConstants::kSyncServiceOAuth, "token3", "3600"); |
- service_.ResetCredentialsInMemory(); |
+ service_->ResetCredentialsInMemory(); |
success_tracker_.Reset(); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasOAuthCredentials()); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasOAuthCredentials()); |
- service_.LoadTokensFromDB(); |
+ service_->LoadTokensFromDB(); |
WaitForDBLoadCompletion(); |
- service_.LoadTokensFromDB(); // Should do nothing. |
+ service_->LoadTokensFromDB(); // Should do nothing. |
WaitForDBLoadCompletion(); |
EXPECT_EQ(2U, success_tracker_.size()); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_FALSE(service_.HasTokenForService(GaiaConstants::kTalkService)); |
- EXPECT_TRUE(service_.HasLsid()); |
- EXPECT_TRUE(service_.HasOAuthCredentials()); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_FALSE(service_->HasTokenForService(GaiaConstants::kTalkService)); |
+ EXPECT_TRUE(service_->HasLsid()); |
+ EXPECT_TRUE(service_->HasOAuthCredentials()); |
// Reset it one more time so there's no surprises. |
- service_.ResetCredentialsInMemory(); |
+ service_->ResetCredentialsInMemory(); |
success_tracker_.Reset(); |
- service_.LoadTokensFromDB(); |
+ service_->LoadTokensFromDB(); |
WaitForDBLoadCompletion(); |
EXPECT_EQ(2U, success_tracker_.size()); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncService)); |
- EXPECT_TRUE(service_.HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
- EXPECT_TRUE(service_.HasLsid()); |
- EXPECT_TRUE(service_.HasOAuthCredentials()); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncService)); |
+ EXPECT_TRUE(service_->HasTokenForService(GaiaConstants::kSyncServiceOAuth)); |
+ EXPECT_TRUE(service_->HasLsid()); |
+ EXPECT_TRUE(service_->HasOAuthCredentials()); |
} |
#ifndef NDEBUG |
@@ -519,15 +523,15 @@ class TokenServiceCommandLineTest : public TokenServiceTestHarness { |
CommandLine::ForCurrentProcess()->AppendSwitchASCII( |
switches::kSetToken, "my_service:my_value"); |
TokenServiceTestHarness::SetUp(); |
- service_.UpdateCredentials(credentials_); |
- service_.UpdateOAuthCredentials(oauth_token_, oauth_secret_); |
+ service_->UpdateCredentials(credentials_); |
+ service_->UpdateOAuthCredentials(oauth_token_, oauth_secret_); |
*CommandLine::ForCurrentProcess() = original_cl; |
} |
}; |
TEST_F(TokenServiceCommandLineTest, TestValueOverride) { |
- EXPECT_TRUE(service_.HasTokenForService("my_service")); |
- EXPECT_EQ("my_value", service_.GetTokenForService("my_service")); |
+ EXPECT_TRUE(service_->HasTokenForService("my_service")); |
+ EXPECT_EQ("my_value", service_->GetTokenForService("my_service")); |
} |
#endif // ifndef NDEBUG |