OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "components/signin/ios/browser/profile_oauth2_token_service_ios.h" | |
6 | |
7 #include "base/prefs/pref_registry_simple.h" | |
8 #include "base/prefs/testing_pref_service.h" | |
9 #include "base/run_loop.h" | |
10 #include "components/signin/core/browser/profile_oauth2_token_service.h" | |
11 #include "components/signin/core/browser/test_signin_client.h" | |
12 #include "components/signin/core/common/signin_pref_names.h" | |
13 #include "google_apis/gaia/gaia_urls.h" | |
14 #include "google_apis/gaia/oauth2_access_token_consumer.h" | |
15 #include "google_apis/gaia/oauth2_token_service_test_util.h" | |
16 #include "ios/public/test/fake_profile_oauth2_token_service_ios_provider.h" | |
17 #include "net/url_request/test_url_fetcher_factory.h" | |
18 #include "testing/gtest/include/gtest/gtest.h" | |
19 | |
20 class ProfileOAuth2TokenServiceIOSTest : public testing::Test, | |
21 public OAuth2TokenService::Consumer, | |
22 public OAuth2TokenService::Observer { | |
23 public: | |
24 ProfileOAuth2TokenServiceIOSTest() | |
25 : OAuth2TokenService::Consumer("test_consumer_id"), | |
26 factory_(NULL), | |
27 client_(&prefs_), | |
28 token_available_count_(0), | |
29 token_revoked_count_(0), | |
30 tokens_loaded_count_(0), | |
31 access_token_success_(0), | |
32 access_token_failure_(0), | |
33 last_access_token_error_(GoogleServiceAuthError::NONE) {} | |
34 | |
35 void SetUp() override { | |
36 prefs_.registry()->RegisterBooleanPref( | |
37 prefs::kTokenServiceExcludeAllSecondaryAccounts, false); | |
38 prefs_.registry()->RegisterListPref( | |
39 prefs::kTokenServiceExcludedSecondaryAccounts); | |
40 | |
41 factory_.SetFakeResponse(GaiaUrls::GetInstance()->oauth2_revoke_url(), | |
42 "", | |
43 net::HTTP_OK, | |
44 net::URLRequestStatus::SUCCESS); | |
45 fake_provider_ = client_.GetIOSProviderAsFake(); | |
46 oauth2_service_.Initialize(&client_, &signin_error_controller_); | |
47 oauth2_service_.AddObserver(this); | |
48 } | |
49 | |
50 void TearDown() override { | |
51 oauth2_service_.RemoveObserver(this); | |
52 oauth2_service_.Shutdown(); | |
53 } | |
54 | |
55 // OAuth2TokenService::Consumer implementation. | |
56 void OnGetTokenSuccess(const OAuth2TokenService::Request* request, | |
57 const std::string& access_token, | |
58 const base::Time& expiration_time) override { | |
59 ++access_token_success_; | |
60 } | |
61 | |
62 void OnGetTokenFailure(const OAuth2TokenService::Request* request, | |
63 const GoogleServiceAuthError& error) override { | |
64 ++access_token_failure_; | |
65 last_access_token_error_ = error; | |
66 }; | |
67 | |
68 // OAuth2TokenService::Observer implementation. | |
69 void OnRefreshTokenAvailable(const std::string& account_id) override { | |
70 ++token_available_count_; | |
71 } | |
72 void OnRefreshTokenRevoked(const std::string& account_id) override { | |
73 ++token_revoked_count_; | |
74 } | |
75 void OnRefreshTokensLoaded() override { ++tokens_loaded_count_; } | |
76 | |
77 void ResetObserverCounts() { | |
78 token_available_count_ = 0; | |
79 token_revoked_count_ = 0; | |
80 tokens_loaded_count_ = 0; | |
81 token_available_count_ = 0; | |
82 access_token_failure_ = 0; | |
83 } | |
84 | |
85 protected: | |
86 base::MessageLoop message_loop_; | |
87 net::FakeURLFetcherFactory factory_; | |
88 TestingPrefServiceSimple prefs_; | |
89 TestSigninClient client_; | |
90 SigninErrorController signin_error_controller_; | |
91 ios::FakeProfileOAuth2TokenServiceIOSProvider* fake_provider_; | |
92 ProfileOAuth2TokenServiceIOS oauth2_service_; | |
93 TestingOAuth2TokenServiceConsumer consumer_; | |
94 int token_available_count_; | |
95 int token_revoked_count_; | |
96 int tokens_loaded_count_; | |
97 int access_token_success_; | |
98 int access_token_failure_; | |
99 GoogleServiceAuthError last_access_token_error_; | |
100 }; | |
101 | |
102 TEST_F(ProfileOAuth2TokenServiceIOSTest, LoadRevokeCredentialsOneAccount) { | |
103 fake_provider_->AddAccount("account_id"); | |
104 oauth2_service_.LoadCredentials("account_id"); | |
105 base::RunLoop().RunUntilIdle(); | |
106 EXPECT_EQ(1, token_available_count_); | |
107 EXPECT_EQ(1, tokens_loaded_count_); | |
108 EXPECT_EQ(0, token_revoked_count_); | |
109 EXPECT_EQ(1U, oauth2_service_.GetAccounts().size()); | |
110 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id")); | |
111 | |
112 ResetObserverCounts(); | |
113 oauth2_service_.RevokeAllCredentials(); | |
114 EXPECT_EQ(0, token_available_count_); | |
115 EXPECT_EQ(0, tokens_loaded_count_); | |
116 EXPECT_EQ(1, token_revoked_count_); | |
117 EXPECT_EQ(0U, oauth2_service_.GetAccounts().size()); | |
118 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
119 } | |
120 | |
121 TEST_F(ProfileOAuth2TokenServiceIOSTest, | |
122 LoadRevokeCredentialsMultipleAccounts) { | |
123 fake_provider_->AddAccount("account_id_1"); | |
124 fake_provider_->AddAccount("account_id_2"); | |
125 fake_provider_->AddAccount("account_id_3"); | |
126 oauth2_service_.LoadCredentials("account_id_1"); | |
127 base::RunLoop().RunUntilIdle(); | |
128 EXPECT_EQ(3, token_available_count_); | |
129 EXPECT_EQ(1, tokens_loaded_count_); | |
130 EXPECT_EQ(0, token_revoked_count_); | |
131 EXPECT_EQ(3U, oauth2_service_.GetAccounts().size()); | |
132 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
133 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
134 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_3")); | |
135 | |
136 ResetObserverCounts(); | |
137 oauth2_service_.RevokeAllCredentials(); | |
138 EXPECT_EQ(0, token_available_count_); | |
139 EXPECT_EQ(0, tokens_loaded_count_); | |
140 EXPECT_EQ(3, token_revoked_count_); | |
141 EXPECT_EQ(0U, oauth2_service_.GetAccounts().size()); | |
142 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
143 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
144 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_3")); | |
145 } | |
146 | |
147 TEST_F(ProfileOAuth2TokenServiceIOSTest, ReloadCredentials) { | |
148 fake_provider_->AddAccount("account_id_1"); | |
149 fake_provider_->AddAccount("account_id_2"); | |
150 fake_provider_->AddAccount("account_id_3"); | |
151 oauth2_service_.LoadCredentials("account_id_1"); | |
152 base::RunLoop().RunUntilIdle(); | |
153 | |
154 // Change the accounts. | |
155 ResetObserverCounts(); | |
156 fake_provider_->ClearAccounts(); | |
157 fake_provider_->AddAccount("account_id_1"); | |
158 fake_provider_->AddAccount("account_id_4"); | |
159 oauth2_service_.ReloadCredentials(); | |
160 | |
161 EXPECT_EQ(1, token_available_count_); | |
162 EXPECT_EQ(0, tokens_loaded_count_); | |
163 EXPECT_EQ(2, token_revoked_count_); | |
164 EXPECT_EQ(2U, oauth2_service_.GetAccounts().size()); | |
165 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
166 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
167 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_3")); | |
168 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_4")); | |
169 } | |
170 | |
171 TEST_F(ProfileOAuth2TokenServiceIOSTest, | |
172 ReloadCredentialsIgnoredIfNoPrimaryAccountId) { | |
173 // Change the accounts. | |
174 ResetObserverCounts(); | |
175 fake_provider_->AddAccount("account_id_1"); | |
176 fake_provider_->AddAccount("account_id_2"); | |
177 base::RunLoop().RunUntilIdle(); | |
178 | |
179 oauth2_service_.ReloadCredentials(); | |
180 | |
181 EXPECT_EQ(0, token_available_count_); | |
182 EXPECT_EQ(0, tokens_loaded_count_); | |
183 EXPECT_EQ(0, token_revoked_count_); | |
184 EXPECT_EQ(0U, oauth2_service_.GetAccounts().size()); | |
185 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
186 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
187 } | |
188 | |
189 TEST_F(ProfileOAuth2TokenServiceIOSTest, | |
190 ReloadCredentialsWithPrimaryAccountId) { | |
191 // Change the accounts. | |
192 ResetObserverCounts(); | |
193 fake_provider_->AddAccount("account_id_1"); | |
194 fake_provider_->AddAccount("account_id_2"); | |
195 base::RunLoop().RunUntilIdle(); | |
196 | |
197 oauth2_service_.ReloadCredentials("account_id_1"); | |
198 EXPECT_EQ(2, token_available_count_); | |
199 EXPECT_EQ(0, tokens_loaded_count_); | |
200 EXPECT_EQ(0, token_revoked_count_); | |
201 EXPECT_EQ(2U, oauth2_service_.GetAccounts().size()); | |
202 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
203 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
204 } | |
205 | |
206 TEST_F(ProfileOAuth2TokenServiceIOSTest, ExcludeAllSecondaryAccounts) { | |
207 // Change the accounts. | |
208 ResetObserverCounts(); | |
209 fake_provider_->AddAccount("account_id_1"); | |
210 fake_provider_->AddAccount("account_id_2"); | |
211 base::RunLoop().RunUntilIdle(); | |
212 | |
213 oauth2_service_.ExcludeAllSecondaryAccounts(); | |
214 oauth2_service_.ReloadCredentials("account_id_1"); | |
215 EXPECT_EQ(1, token_available_count_); | |
216 EXPECT_EQ(0, tokens_loaded_count_); | |
217 EXPECT_EQ(0, token_revoked_count_); | |
218 EXPECT_EQ(1U, oauth2_service_.GetAccounts().size()); | |
219 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
220 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
221 } | |
222 | |
223 TEST_F(ProfileOAuth2TokenServiceIOSTest, StartRequestSuccess) { | |
224 fake_provider_->AddAccount("account_id_1"); | |
225 oauth2_service_.LoadCredentials("account_id_1"); | |
226 base::RunLoop().RunUntilIdle(); | |
227 | |
228 // Fetch access tokens. | |
229 ResetObserverCounts(); | |
230 OAuth2TokenService::ScopeSet scopes; | |
231 scopes.insert("scope"); | |
232 scoped_ptr<OAuth2TokenService::Request> request( | |
233 oauth2_service_.StartRequest("account_id_1", scopes, this)); | |
234 EXPECT_EQ(0, access_token_success_); | |
235 EXPECT_EQ(0, access_token_failure_); | |
236 | |
237 ResetObserverCounts(); | |
238 fake_provider_->IssueAccessTokenForAllRequests(); | |
239 base::RunLoop().RunUntilIdle(); | |
240 EXPECT_EQ(1, access_token_success_); | |
241 EXPECT_EQ(0, access_token_failure_); | |
242 } | |
243 | |
244 TEST_F(ProfileOAuth2TokenServiceIOSTest, StartRequestFailure) { | |
245 fake_provider_->AddAccount("account_id_1"); | |
246 oauth2_service_.LoadCredentials("account_id_1"); | |
247 base::RunLoop().RunUntilIdle(); | |
248 | |
249 // Fetch access tokens. | |
250 ResetObserverCounts(); | |
251 OAuth2TokenService::ScopeSet scopes; | |
252 scopes.insert("scope"); | |
253 scoped_ptr<OAuth2TokenService::Request> request( | |
254 oauth2_service_.StartRequest("account_id_1", scopes, this)); | |
255 EXPECT_EQ(0, access_token_success_); | |
256 EXPECT_EQ(0, access_token_failure_); | |
257 | |
258 ResetObserverCounts(); | |
259 fake_provider_->IssueAccessTokenErrorForAllRequests(); | |
260 base::RunLoop().RunUntilIdle(); | |
261 EXPECT_EQ(0, access_token_success_); | |
262 EXPECT_EQ(1, access_token_failure_); | |
263 } | |
264 | |
265 TEST_F(ProfileOAuth2TokenServiceIOSTest, ExcludeSecondaryAccounts) { | |
266 fake_provider_->AddAccount("account_id_1"); | |
267 fake_provider_->AddAccount("account_id_2"); | |
268 fake_provider_->AddAccount("account_id_3"); | |
269 oauth2_service_.LoadCredentials("account_id_1"); | |
270 base::RunLoop().RunUntilIdle(); | |
271 | |
272 // Ignore one account should remove it from the list of accounts. | |
273 ResetObserverCounts(); | |
274 oauth2_service_.ExcludeSecondaryAccount("account_id_2"); | |
275 oauth2_service_.ReloadCredentials(); | |
276 | |
277 EXPECT_EQ(0, token_available_count_); | |
278 EXPECT_EQ(0, tokens_loaded_count_); | |
279 EXPECT_EQ(1, token_revoked_count_); | |
280 EXPECT_EQ(2U, oauth2_service_.GetAccounts().size()); | |
281 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
282 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
283 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_3")); | |
284 | |
285 // Clear ignored account and the refresh token should be available again. | |
286 ResetObserverCounts(); | |
287 oauth2_service_.IncludeSecondaryAccount("account_id_2"); | |
288 oauth2_service_.ReloadCredentials(); | |
289 | |
290 EXPECT_EQ(1, token_available_count_); | |
291 EXPECT_EQ(0, tokens_loaded_count_); | |
292 EXPECT_EQ(0, token_revoked_count_); | |
293 EXPECT_EQ(3U, oauth2_service_.GetAccounts().size()); | |
294 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
295 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
296 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_3")); | |
297 } | |
298 | |
299 // Unit test for for http://crbug.com/453470 . | |
300 TEST_F(ProfileOAuth2TokenServiceIOSTest, ExcludeSecondaryAccountTwice) { | |
301 fake_provider_->AddAccount("account_id_1"); | |
302 fake_provider_->AddAccount("account_id_2"); | |
303 oauth2_service_.LoadCredentials("account_id_1"); | |
304 base::RunLoop().RunUntilIdle(); | |
305 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
306 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
307 | |
308 // Ignore |account_id_2| twice. | |
309 oauth2_service_.ExcludeSecondaryAccount("account_id_2"); | |
310 oauth2_service_.ExcludeSecondaryAccount("account_id_2"); | |
311 oauth2_service_.ReloadCredentials(); | |
312 | |
313 // Include |account_id_2| once should add the account back. | |
314 ResetObserverCounts(); | |
315 oauth2_service_.IncludeSecondaryAccount("account_id_2"); | |
316 oauth2_service_.ReloadCredentials(); | |
317 | |
318 EXPECT_EQ(1, token_available_count_); | |
319 EXPECT_EQ(0, tokens_loaded_count_); | |
320 EXPECT_EQ(0, token_revoked_count_); | |
321 EXPECT_EQ(2U, oauth2_service_.GetAccounts().size()); | |
322 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
323 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
324 } | |
325 | |
326 TEST_F(ProfileOAuth2TokenServiceIOSTest, | |
327 LoadRevokeCredentialsClearsExcludedAccounts) { | |
328 fake_provider_->AddAccount("account_id_1"); | |
329 fake_provider_->AddAccount("account_id_2"); | |
330 fake_provider_->AddAccount("account_id_3"); | |
331 | |
332 std::vector<std::string> excluded_accounts; | |
333 excluded_accounts.push_back("account_id_2"); | |
334 oauth2_service_.ExcludeSecondaryAccounts(excluded_accounts); | |
335 oauth2_service_.ReloadCredentials("account_id_1"); | |
336 base::RunLoop().RunUntilIdle(); | |
337 EXPECT_EQ(2, token_available_count_); | |
338 EXPECT_EQ(0, tokens_loaded_count_); | |
339 EXPECT_EQ(0, token_revoked_count_); | |
340 EXPECT_EQ(2U, oauth2_service_.GetAccounts().size()); | |
341 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_1")); | |
342 EXPECT_FALSE(oauth2_service_.RefreshTokenIsAvailable("account_id_2")); | |
343 EXPECT_TRUE(oauth2_service_.RefreshTokenIsAvailable("account_id_3")); | |
344 | |
345 ResetObserverCounts(); | |
346 oauth2_service_.RevokeAllCredentials(); | |
347 EXPECT_TRUE(oauth2_service_.GetExcludedSecondaryAccounts().empty()); | |
348 } | |
349 | |
350 // Used for test StartRequestInRemoveAccount. | |
351 class MarkedForRemovalTester : public OAuth2TokenService::Consumer { | |
352 public: | |
353 MarkedForRemovalTester(const std::string& account_id, | |
354 OAuth2TokenService* oauth2_service) | |
355 : Consumer(account_id), | |
356 oauth2_service_(oauth2_service), | |
357 request_(), | |
358 token_failures_() {} | |
359 | |
360 void OnGetTokenSuccess(const OAuth2TokenService::Request* request, | |
361 const std::string& access_token, | |
362 const base::Time& expiration_time) override {} | |
363 void OnGetTokenFailure(const OAuth2TokenService::Request* request, | |
364 const GoogleServiceAuthError& error) override { | |
365 token_failures_.push_back(error); | |
366 if (error.state() == GoogleServiceAuthError::REQUEST_CANCELED) { | |
367 // Restart a request on |account_id| here, which should fail as we are in | |
368 // a RemoveAccount and |account_id| should be marked for removal. | |
369 OAuth2TokenService::ScopeSet scopes; | |
370 request_ = oauth2_service_->StartRequest(id(), scopes, this); | |
371 } | |
372 } | |
373 const std::vector<GoogleServiceAuthError>& token_failures() const { | |
374 return token_failures_; | |
375 } | |
376 | |
377 private: | |
378 OAuth2TokenService* oauth2_service_; | |
379 scoped_ptr<OAuth2TokenService::Request> request_; | |
380 std::vector<GoogleServiceAuthError> token_failures_; | |
381 }; | |
382 | |
383 TEST_F(ProfileOAuth2TokenServiceIOSTest, StartRequestInRemoveAccount) { | |
384 fake_provider_->AddAccount("account_id"); | |
385 oauth2_service_.ReloadCredentials("account_id"); | |
386 base::RunLoop().RunUntilIdle(); | |
387 | |
388 MarkedForRemovalTester tester("account_id", &oauth2_service_); | |
389 OAuth2TokenService::ScopeSet scopes; | |
390 scoped_ptr<OAuth2TokenService::Request> request( | |
391 oauth2_service_.StartRequest("account_id", scopes, &tester)); | |
392 | |
393 // Trigger a RemoveAccount on "account_id". | |
394 oauth2_service_.RevokeAllCredentials(); | |
395 base::RunLoop().RunUntilIdle(); | |
396 | |
397 EXPECT_EQ(tester.token_failures().size(), 2u); | |
398 // Request cancelled by |CancelRequestsForAccount| in |RemoveAccount|. | |
399 EXPECT_EQ(tester.token_failures()[0].state(), | |
400 GoogleServiceAuthError::REQUEST_CANCELED); | |
401 // Request failing as the account is marked for removal. | |
402 EXPECT_EQ(tester.token_failures()[1].state(), | |
403 GoogleServiceAuthError::USER_NOT_SIGNED_UP); | |
404 } | |
OLD | NEW |