Index: chrome/browser/signin/signin_global_error_unittest.cc |
diff --git a/chrome/browser/signin/signin_global_error_unittest.cc b/chrome/browser/signin/signin_global_error_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..7fb36b2c4ba8ce53d833e1843bb6f3e026f00dda |
--- /dev/null |
+++ b/chrome/browser/signin/signin_global_error_unittest.cc |
@@ -0,0 +1,155 @@ |
+// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/signin/signin_global_error.h" |
+ |
+#include "base/memory/scoped_ptr.h" |
+#include "chrome/browser/signin/signin_manager.h" |
+#include "chrome/browser/signin/signin_manager_factory.h" |
+#include "chrome/browser/signin/signin_manager_fake.h" |
+#include "chrome/browser/signin/token_service_factory.h" |
+#include "chrome/browser/ui/global_error/global_error_service.h" |
+#include "chrome/browser/ui/global_error/global_error_service_factory.h" |
+#include "chrome/test/base/testing_profile.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+class FakeAuthStatusProvider : public SigninGlobalError::AuthStatusProvider { |
+ public: |
+ FakeAuthStatusProvider() : auth_error_(GoogleServiceAuthError::None()) {} |
+ |
+ // AuthStatusProvider implementation. |
+ GoogleServiceAuthError GetAuthStatus() const OVERRIDE { return auth_error_; } |
+ |
+ void set_auth_error(const GoogleServiceAuthError& error) { |
+ auth_error_ = error; |
+ } |
+ |
+ private: |
+ GoogleServiceAuthError auth_error_; |
+}; |
+ |
+class SigninGlobalErrorTest : public testing::Test { |
+ public: |
+ void SetUp() OVERRIDE { |
+ // Create a signed-in profile. |
+ profile_.reset(new TestingProfile()); |
+ |
+ SigninManagerFactory::GetInstance()->SetTestingFactoryAndUse( |
+ profile_.get(), FakeSigninManager::Build); |
+ SigninManager* manager = |
+ SigninManagerFactory::GetForProfile(profile_.get()); |
+ manager->SetAuthenticatedUsername("testuser@test.com"); |
+ global_error_ = manager->signin_global_error(); |
+ } |
+ |
+ scoped_ptr<TestingProfile> profile_; |
+ SigninGlobalError* global_error_; |
+}; |
+ |
+TEST_F(SigninGlobalErrorTest, NoAuthStatusProviders) { |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+} |
+ |
+TEST_F(SigninGlobalErrorTest, NoErrorAuthStatusProviders) { |
+ FakeAuthStatusProvider provider; |
+ global_error_->AddProvider(&provider); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+ global_error_->RemoveProvider(&provider); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+} |
+ |
+TEST_F(SigninGlobalErrorTest, ErrorAuthStatusProvider) { |
+ FakeAuthStatusProvider provider; |
+ FakeAuthStatusProvider error_provider; |
+ error_provider.set_auth_error(GoogleServiceAuthError( |
+ GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); |
+ global_error_->AddProvider(&provider); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+ global_error_->AddProvider(&error_provider); |
+ ASSERT_TRUE(global_error_->HasBadge()); |
+ global_error_->RemoveProvider(&error_provider); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+ global_error_->RemoveProvider(&provider); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+} |
+ |
+TEST_F(SigninGlobalErrorTest, AuthStatusProviderErrorTransition) { |
+ FakeAuthStatusProvider provider0; |
+ FakeAuthStatusProvider provider1; |
+ global_error_->AddProvider(&provider0); |
+ global_error_->AddProvider(&provider1); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+ provider0.set_auth_error( |
+ GoogleServiceAuthError(GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+ global_error_->AuthStatusChanged(); |
+ ASSERT_TRUE(global_error_->HasBadge()); |
+ provider1.set_auth_error( |
+ GoogleServiceAuthError(GoogleServiceAuthError::ACCOUNT_DISABLED)); |
+ global_error_->AuthStatusChanged(); |
+ ASSERT_TRUE(global_error_->HasBadge()); |
+ |
+ // Now resolve the auth errors - badge should go away. |
+ provider0.set_auth_error(GoogleServiceAuthError::None()); |
+ global_error_->AuthStatusChanged(); |
+ ASSERT_TRUE(global_error_->HasBadge()); |
+ provider1.set_auth_error(GoogleServiceAuthError::None()); |
+ global_error_->AuthStatusChanged(); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+ |
+ global_error_->RemoveProvider(&provider0); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+ global_error_->RemoveProvider(&provider1); |
+ ASSERT_FALSE(global_error_->HasBadge()); |
+} |
+ |
+// Verify that SigninGlobalError ignores certain errors. |
+TEST_F(SigninGlobalErrorTest, AuthStatusEnumerateAllErrors) { |
+ typedef struct { |
+ GoogleServiceAuthError::State error_state; |
+ bool is_error; |
+ } ErrorTableEntry; |
+ |
+ ErrorTableEntry table[] = { |
+ { GoogleServiceAuthError::NONE, false }, |
+ { GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS, true }, |
+ { GoogleServiceAuthError::USER_NOT_SIGNED_UP, true }, |
+ { GoogleServiceAuthError::CONNECTION_FAILED, false }, |
+ { GoogleServiceAuthError::CAPTCHA_REQUIRED, true }, |
+ { GoogleServiceAuthError::ACCOUNT_DELETED, true }, |
+ { GoogleServiceAuthError::ACCOUNT_DISABLED, true }, |
+ { GoogleServiceAuthError::SERVICE_UNAVAILABLE, true }, |
+ { GoogleServiceAuthError::TWO_FACTOR, true }, |
+ { GoogleServiceAuthError::REQUEST_CANCELED, true }, |
+ { GoogleServiceAuthError::HOSTED_NOT_ALLOWED, true }, |
+ }; |
+ COMPILE_ASSERT(ARRAYSIZE_UNSAFE(table) == GoogleServiceAuthError::NUM_STATES, |
+ kTable_size_does_not_match_number_of_auth_error_types); |
+ |
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(table); ++i) { |
+ FakeAuthStatusProvider provider; |
+ provider.set_auth_error(GoogleServiceAuthError(table[i].error_state)); |
+ GlobalErrorService* service = |
+ GlobalErrorServiceFactory::GetForProfile(profile_.get()); |
+ global_error_->AddProvider(&provider); |
+ EXPECT_EQ(global_error_->HasBadge(), table[i].is_error); |
+ // Should badge the wrench menu if there's an error. |
+ EXPECT_EQ(service->GetFirstBadgeResourceID() != 0, table[i].is_error); |
+#if defined(OS_CHROMEOS) |
+ // Only on chromeos do we have a separate menu item - on other platforms |
+ // there's code in WrenchMenuModel to re-use the "sign in to chrome" |
+ // menu item to display auth status/errors. |
+ EXPECT_EQ(global_error_->HasMenuItem(), table[i].is_error); |
+#else |
+ EXPECT_FALSE(global_error_->HasMenuItem()); |
+#endif |
+ EXPECT_EQ(global_error_->MenuItemLabel().empty(), !table[i].is_error); |
+ EXPECT_EQ(global_error_->GetBubbleViewMessage().empty(), |
+ !table[i].is_error); |
+ EXPECT_FALSE(global_error_->GetBubbleViewTitle().empty()); |
+ EXPECT_FALSE(global_error_->GetBubbleViewAcceptButtonLabel().empty()); |
+ EXPECT_TRUE(global_error_->GetBubbleViewCancelButtonLabel().empty()); |
+ global_error_->RemoveProvider(&provider); |
+ } |
+} |