1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef CHROME_BROWSER_SIGNIN_FAKE_PROFILE_OAUTH2_TOKEN_SERVICE_H_
6 #define CHROME_BROWSER_SIGNIN_FAKE_PROFILE_OAUTH2_TOKEN_SERVICE_H_
11 #include "base/compiler_specific.h"
12 #include "base/memory/weak_ptr.h"
14 #if defined(OS_ANDROID)
15 #include "chrome/browser/signin/android_profile_oauth2_token_service.h"
17 #include "components/signin/core/browser/profile_oauth2_token_service.h"
20 // Helper class to simplify writing unittests that depend on an instance of
21 // ProfileOAuth2TokenService.
23 // Tests would typically do something like the following:
25 // FakeProfileOAuth2TokenService service;
27 // service.IssueRefreshToken("token"); // Issue refresh token/notify observers
29 // // Confirm that there is at least one active request.
30 // EXPECT_GT(0U, service.GetPendingRequests().size());
32 // // Make any pending token fetches for a given scope succeed.
34 // scopes.insert(GaiaConstants::kYourServiceScope);
35 // IssueTokenForScope(scopes, "access_token", base::Time()::Max());
37 // // ...or make them fail...
38 // IssueErrorForScope(scopes, GoogleServiceAuthError(INVALID_GAIA_CREDENTIALS));
40 class FakeProfileOAuth2TokenService
41 #if defined(OS_ANDROID)
42 : public AndroidProfileOAuth2TokenService
{
44 : public ProfileOAuth2TokenService
{
47 struct PendingRequest
{
51 std::string account_id
;
52 std::string client_id
;
53 std::string client_secret
;
55 base::WeakPtr
<RequestImpl
> request
;
58 FakeProfileOAuth2TokenService();
59 ~FakeProfileOAuth2TokenService() override
;
61 // Overriden to make sure it works on Android.
62 bool RefreshTokenIsAvailable(const std::string
& account_id
) const override
;
64 // Overriden to make sure it works on iOS.
65 void LoadCredentials(const std::string
& primary_account_id
) override
;
67 std::vector
<std::string
> GetAccounts() override
;
69 // Overriden to make sure it works on Android. Simply calls
70 // IssueRefreshToken().
71 void UpdateCredentials(const std::string
& account_id
,
72 const std::string
& refresh_token
) override
;
74 // Sets the current refresh token. If |token| is non-empty, this will invoke
75 // OnRefreshTokenAvailable() on all Observers, otherwise this will invoke
76 // OnRefreshTokenRevoked().
77 void IssueRefreshToken(const std::string
& token
);
79 // TODO(fgorski,rogerta): Merge with UpdateCredentials when this class fully
80 // supports multiple accounts.
81 void IssueRefreshTokenForUser(const std::string
& account_id
,
82 const std::string
& token
);
84 // Fire OnRefreshTokensLoaded on all observers.
85 void IssueAllRefreshTokensLoaded();
87 // Gets a list of active requests (can be used by tests to validate that the
88 // correct request has been issued).
89 std::vector
<PendingRequest
> GetPendingRequests();
91 // Helper routines to issue tokens for pending requests.
92 void IssueAllTokensForAccount(const std::string
& account_id
,
93 const std::string
& access_token
,
94 const base::Time
& expiration
);
96 void IssueErrorForAllPendingRequestsForAccount(
97 const std::string
& account_id
,
98 const GoogleServiceAuthError
& error
);
100 void IssueTokenForScope(const ScopeSet
& scopes
,
101 const std::string
& access_token
,
102 const base::Time
& expiration
);
104 void IssueErrorForScope(const ScopeSet
& scopes
,
105 const GoogleServiceAuthError
& error
);
107 void IssueTokenForAllPendingRequests(const std::string
& access_token
,
108 const base::Time
& expiration
);
110 void IssueErrorForAllPendingRequests(const GoogleServiceAuthError
& error
);
112 void set_auto_post_fetch_response_on_message_loop(bool auto_post_response
) {
113 auto_post_fetch_response_on_message_loop_
= auto_post_response
;
117 // OAuth2TokenService overrides.
118 void FetchOAuth2Token(RequestImpl
* request
,
119 const std::string
& account_id
,
120 net::URLRequestContextGetter
* getter
,
121 const std::string
& client_id
,
122 const std::string
& client_secret
,
123 const ScopeSet
& scopes
) override
;
125 OAuth2AccessTokenFetcher
* CreateAccessTokenFetcher(
126 const std::string
& account_id
,
127 net::URLRequestContextGetter
* getter
,
128 OAuth2AccessTokenConsumer
* consumer
) override
;
130 void InvalidateOAuth2Token(const std::string
& account_id
,
131 const std::string
& client_id
,
132 const ScopeSet
& scopes
,
133 const std::string
& access_token
) override
;
135 net::URLRequestContextGetter
* GetRequestContext() override
;
138 // Helper function to complete pending requests - if |all_scopes| is true,
139 // then all pending requests are completed, otherwise, only those requests
140 // matching |scopes| are completed. If |account_id| is empty, then pending
141 // requests for all accounts are completed, otherwise only requests for the
143 void CompleteRequests(const std::string
& account_id
,
145 const ScopeSet
& scopes
,
146 const GoogleServiceAuthError
& error
,
147 const std::string
& access_token
,
148 const base::Time
& expiration
);
150 std::string
GetRefreshToken(const std::string
& account_id
) const;
152 std::vector
<PendingRequest
> pending_requests_
;
154 // Maps account ids to their refresh token strings.
155 std::map
<std::string
, std::string
> refresh_tokens_
;
157 // If true, then this fake service will post responses to
158 // |FetchOAuth2Token| on the current run loop. There is no need to call
159 // |IssueTokenForScope| in this case.
160 bool auto_post_fetch_response_on_message_loop_
;
162 base::WeakPtrFactory
<FakeProfileOAuth2TokenService
> weak_ptr_factory_
;
164 DISALLOW_COPY_AND_ASSIGN(FakeProfileOAuth2TokenService
);
167 #endif // CHROME_BROWSER_SIGNIN_FAKE_PROFILE_OAUTH2_TOKEN_SERVICE_H_