Remove unused SecurityDelegate::IsValidPairingCode
BUG=25768507
Change-Id: I5bec24332a53b95272e0e1370d5bbfe2e0df418c
Reviewed-on: https://weave-review.googlesource.com/2061
Reviewed-by: Alex Vakulenko <avakulenko@google.com>
diff --git a/src/privet/mock_delegates.h b/src/privet/mock_delegates.h
index 1586846..04ac338 100644
--- a/src/privet/mock_delegates.h
+++ b/src/privet/mock_delegates.h
@@ -76,7 +76,6 @@
MOCK_CONST_METHOD0(GetCryptoTypes, std::set<CryptoType>());
MOCK_METHOD1(ClaimRootClientAuthToken, std::string(ErrorPtr*));
MOCK_METHOD2(ConfirmClientAuthToken, bool(const std::string&, ErrorPtr*));
- MOCK_CONST_METHOD1(IsValidPairingCode, bool(const std::string&));
MOCK_METHOD5(
StartPairing,
bool(PairingType, CryptoType, std::string*, std::string*, ErrorPtr*));
diff --git a/src/privet/privet_handler_unittest.cc b/src/privet/privet_handler_unittest.cc
index 5c3c0d0..336be3b 100644
--- a/src/privet/privet_handler_unittest.cc
+++ b/src/privet/privet_handler_unittest.cc
@@ -404,8 +404,6 @@
}
TEST_F(PrivetHandlerTest, AuthPairing) {
- EXPECT_CALL(security_, IsValidPairingCode("testToken"))
- .WillRepeatedly(Return(true));
EXPECT_CALL(security_, CreateAccessToken(_, _, _, _, _, _, _))
.WillRepeatedly(DoAll(SetArgPointee<3>("OwnerAccessToken"),
SetArgPointee<4>(AuthScope::kOwner),
@@ -426,8 +424,6 @@
}
TEST_F(PrivetHandlerTest, AuthLocalAuto) {
- EXPECT_CALL(security_, IsValidPairingCode("testToken"))
- .WillRepeatedly(Return(true));
EXPECT_CALL(security_, CreateAccessToken(_, _, _, _, _, _, _))
.WillRepeatedly(DoAll(SetArgPointee<3>("UserAccessToken"),
SetArgPointee<4>(AuthScope::kUser),
@@ -448,8 +444,6 @@
}
TEST_F(PrivetHandlerTest, AuthLocal) {
- EXPECT_CALL(security_, IsValidPairingCode("testToken"))
- .WillRepeatedly(Return(true));
EXPECT_CALL(security_, CreateAccessToken(_, _, _, _, _, _, _))
.WillRepeatedly(DoAll(SetArgPointee<3>("ManagerAccessToken"),
SetArgPointee<4>(AuthScope::kManager),
@@ -470,8 +464,6 @@
}
TEST_F(PrivetHandlerTest, AuthLocalHighScope) {
- EXPECT_CALL(security_, IsValidPairingCode("testToken"))
- .WillRepeatedly(Return(true));
EXPECT_CALL(security_, CreateAccessToken(_, _, _, _, _, _, _))
.WillRepeatedly(DoAll(SetArgPointee<3>("UserAccessToken"),
SetArgPointee<4>(AuthScope::kUser),
diff --git a/src/privet/security_delegate.h b/src/privet/security_delegate.h
index c07b782..42021fd 100644
--- a/src/privet/security_delegate.h
+++ b/src/privet/security_delegate.h
@@ -49,10 +49,6 @@
virtual bool ConfirmClientAuthToken(const std::string& token,
ErrorPtr* error) = 0;
- // Returns true if |auth_code| provided by client is valid. Client should
- // obtain |auth_code| during pairing process.
- virtual bool IsValidPairingCode(const std::string& auth_code) const = 0;
-
virtual bool StartPairing(PairingType mode,
CryptoType crypto,
std::string* session_id,
diff --git a/src/privet/security_manager.h b/src/privet/security_manager.h
index beb7955..b80f6e7 100644
--- a/src/privet/security_manager.h
+++ b/src/privet/security_manager.h
@@ -75,7 +75,6 @@
std::string ClaimRootClientAuthToken(ErrorPtr* error) override;
bool ConfirmClientAuthToken(const std::string& token,
ErrorPtr* error) override;
- bool IsValidPairingCode(const std::string& auth_code) const override;
bool StartPairing(PairingType mode,
CryptoType crypto,
std::string* session_id,
@@ -94,6 +93,7 @@
const PairingEndListener& on_end);
private:
+ bool IsValidPairingCode(const std::string& auth_code) const;
FRIEND_TEST_ALL_PREFIXES(SecurityManagerTest, ThrottlePairing);
// Allows limited number of new sessions without successful authorization.
bool CheckIfPairingAllowed(ErrorPtr* error);
diff --git a/src/privet/security_manager_unittest.cc b/src/privet/security_manager_unittest.cc
index 6fc6b4c..f4a7b17 100644
--- a/src/privet/security_manager_unittest.cc
+++ b/src/privet/security_manager_unittest.cc
@@ -96,8 +96,6 @@
std::string auth_code_base64{Base64Encode(auth_code)};
- EXPECT_TRUE(security_.IsValidPairingCode(auth_code_base64));
-
std::string token;
AuthScope scope;
base::TimeDelta ttl;