From b693346d9bfa35778a66aed051800cb5ea5dedef Mon Sep 17 00:00:00 2001 From: "jkummerow@chromium.org" Date: Wed, 17 Nov 2010 15:16:43 +0000 Subject: No persisted device id/token for unmanaged devices BUG=62476 TEST=unit_tests: DeviceTokenFetcherTest.UnmanagedDevice Review URL: http://codereview.chromium.org/4967005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@66440 0039d316-1c4b-4281-b951-d872f2087c98 --- chrome/browser/policy/device_token_fetcher_unittest.cc | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) (limited to 'chrome/browser/policy/device_token_fetcher_unittest.cc') diff --git a/chrome/browser/policy/device_token_fetcher_unittest.cc b/chrome/browser/policy/device_token_fetcher_unittest.cc index b6f50e5..ea1e41d 100644 --- a/chrome/browser/policy/device_token_fetcher_unittest.cc +++ b/chrome/browser/policy/device_token_fetcher_unittest.cc @@ -67,6 +67,10 @@ class DeviceTokenFetcherTest : public testing::Test { fetcher->GetDeviceTokenPath(path); } + const std::string& device_id(const DeviceTokenFetcher* fetcher) { + return fetcher->device_id_; + } + MessageLoop loop_; scoped_ptr backend_; ScopedTempDir temp_user_data_dir_; @@ -166,4 +170,16 @@ TEST_F(DeviceTokenFetcherTest, FailedServerRequest) { EXPECT_EQ("", token); } +TEST_F(DeviceTokenFetcherTest, UnmanagedDevice) { + backend_->UnmanagedDevice(); + EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).Times(1); + SimulateSuccessfulLoginAndRunPending(); + ASSERT_FALSE(fetcher_->IsTokenPending()); + ASSERT_EQ("", fetcher_->GetDeviceToken()); + ASSERT_EQ("", device_id(fetcher_)); + FilePath token_path; + GetDeviceTokenPath(fetcher_, &token_path); + ASSERT_FALSE(file_util::PathExists(token_path)); +} + } // namespace policy -- cgit v1.1