1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336
|
// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <algorithm>
#include <vector>
#include "base/memory/raw_ptr.h"
#include "base/test/mock_callback.h"
#include "base/time/time.h"
#include "build/build_config.h"
#include "chrome/browser/sharing/sharing_message_bridge_factory.h"
#include "chrome/browser/sync/test/integration/single_client_status_change_checker.h"
#include "chrome/browser/sync/test/integration/sync_service_impl_harness.h"
#include "chrome/browser/sync/test/integration/sync_test.h"
#include "components/sharing_message/features.h"
#include "components/sharing_message/sharing_message_bridge.h"
#include "components/sync/service/sync_token_status.h"
#include "components/sync/test/fake_server_http_post_provider.h"
#include "content/public/test/browser_test.h"
namespace {
using sync_pb::SharingMessageSpecifics;
constexpr char kEmptyOAuth2Token[] = "";
constexpr char kInvalidGrantOAuth2Token[] = R"(
{
"error": "invalid_grant"
})";
constexpr char kValidOAuth2Token[] = R"(
{
"refresh_token": "new_refresh_token",
"access_token": "new_access_token",
"expires_in": 3600, // 1 hour.
"token_type": "Bearer"
})";
MATCHER_P(HasErrorCode, expected_error_code, "") {
return arg.error_code() == expected_error_code;
}
class NextCycleIterationChecker : public SingleClientStatusChangeChecker {
public:
explicit NextCycleIterationChecker(syncer::SyncServiceImpl* service)
: SingleClientStatusChangeChecker(service) {
last_synced_time_ = SingleClientStatusChangeChecker::service()
->GetLastSyncedTimeForDebugging();
}
bool IsExitConditionSatisfied(std::ostream* os) override {
*os << "Waiting server side for next sync cycle.";
if (last_synced_time_ == service()->GetLastSyncedTimeForDebugging()) {
return false;
}
return true;
}
private:
base::Time last_synced_time_;
};
class DisabledSharingMessageChecker : public SingleClientStatusChangeChecker {
public:
explicit DisabledSharingMessageChecker(syncer::SyncServiceImpl* service)
: SingleClientStatusChangeChecker(service) {}
bool IsExitConditionSatisfied(std::ostream* os) override {
*os << "Waiting for disabled SHARING_MESSAGE data type";
return !service()->GetActiveDataTypes().Has(syncer::SHARING_MESSAGE);
}
};
class RetryingAccessTokenFetchChecker : public SingleClientStatusChangeChecker {
public:
explicit RetryingAccessTokenFetchChecker(syncer::SyncServiceImpl* service)
: SingleClientStatusChangeChecker(service) {}
// StatusChangeChecker implementation.
bool IsExitConditionSatisfied(std::ostream* os) override {
*os << "Waiting for auth error";
return service()->IsRetryingAccessTokenFetchForTest();
}
};
// Waits until all expected sharing messages are successfully committed. Sharing
// messages are equal if they have the same payload.
class SharingMessageEqualityChecker : public SingleClientStatusChangeChecker {
public:
SharingMessageEqualityChecker(
syncer::SyncServiceImpl* service,
fake_server::FakeServer* fake_server,
std::vector<SharingMessageSpecifics> expected_specifics)
: SingleClientStatusChangeChecker(service),
fake_server_(fake_server),
expected_specifics_(std::move(expected_specifics)) {}
bool IsExitConditionSatisfied(std::ostream* os) override {
*os << "Waiting server side SHARING_MESSAGE to match expected.";
std::vector<sync_pb::SyncEntity> entities =
fake_server_->GetSyncEntitiesByDataType(syncer::SHARING_MESSAGE);
// |entities.size()| is only going to grow, if |entities.size()| ever
// becomes bigger then all hope is lost of passing, stop now.
EXPECT_GE(expected_specifics_.size(), entities.size());
if (expected_specifics_.size() != entities.size()) {
return false;
}
for (const SharingMessageSpecifics& specifics : expected_specifics_) {
auto iter = std::ranges::find(
entities, specifics.payload(), [](const sync_pb::SyncEntity& entity) {
return entity.specifics().sharing_message().payload();
});
if (iter == entities.end()) {
*os << "Server doesn't have expected sharing message with payload: "
<< specifics.payload();
return false;
}
// Remove found entity to check for duplicate payloads.
entities.erase(iter);
}
DCHECK(entities.empty());
return true;
}
private:
const raw_ptr<fake_server::FakeServer> fake_server_ = nullptr;
const std::vector<SharingMessageSpecifics> expected_specifics_;
};
// Waits for the sharing message callback with expected error code to be called.
// The provided callback must be called only once.
class SharingMessageCallbackChecker : public SingleClientStatusChangeChecker {
public:
SharingMessageCallbackChecker(
syncer::SyncServiceImpl* service,
sync_pb::SharingMessageCommitError::ErrorCode expected_error_code)
: SingleClientStatusChangeChecker(service),
expected_error_code_(expected_error_code) {}
bool IsExitConditionSatisfied(std::ostream* os) override {
*os << "Waiting for callback";
return last_error_code_ &&
last_error_code_->error_code() == expected_error_code_;
}
SharingMessageBridge::CommitFinishedCallback GetCommitFinishedCallback() {
return base::BindOnce(&SharingMessageCallbackChecker::OnCommitFinished,
weak_ptr_factory_.GetWeakPtr());
}
private:
void OnCommitFinished(const sync_pb::SharingMessageCommitError& error_code) {
EXPECT_FALSE(last_error_code_.has_value());
last_error_code_ = error_code;
}
const sync_pb::SharingMessageCommitError::ErrorCode expected_error_code_;
std::optional<sync_pb::SharingMessageCommitError> last_error_code_;
base::WeakPtrFactory<SharingMessageCallbackChecker> weak_ptr_factory_{this};
};
class SingleClientSharingMessageSyncTest : public SyncTest {
public:
SingleClientSharingMessageSyncTest() : SyncTest(SINGLE_CLIENT) {}
bool WaitForSharingMessage(
std::vector<SharingMessageSpecifics> expected_specifics) {
return SharingMessageEqualityChecker(GetSyncService(0), GetFakeServer(),
std::move(expected_specifics))
.Wait();
}
};
IN_PROC_BROWSER_TEST_F(SingleClientSharingMessageSyncTest, ShouldSubmit) {
ASSERT_TRUE(SetupSync());
SharingMessageCallbackChecker callback_checker(
GetSyncService(0), sync_pb::SharingMessageCommitError::NONE);
ASSERT_EQ(0u, GetFakeServer()
->GetSyncEntitiesByDataType(syncer::SHARING_MESSAGE)
.size());
SharingMessageBridge* sharing_message_bridge =
SharingMessageBridgeFactory::GetForBrowserContext(GetProfile(0));
SharingMessageSpecifics specifics;
specifics.set_payload("payload");
sharing_message_bridge->SendSharingMessage(
std::make_unique<SharingMessageSpecifics>(specifics),
callback_checker.GetCommitFinishedCallback());
EXPECT_TRUE(WaitForSharingMessage({specifics}));
EXPECT_TRUE(callback_checker.Wait());
}
// ChromeOS does not support late signin after profile creation, so the test
// below does not apply, at least in the current form.
#if !BUILDFLAG(IS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(SingleClientSharingMessageSyncTest,
ShouldSubmitInTransportMode) {
// We avoid calling SetupSync(), because we don't want to turn on full sync,
// only sign in such that the standalone transport starts.
ASSERT_TRUE(SetupClients());
ASSERT_TRUE(GetClient(0)->SignInPrimaryAccount());
ASSERT_TRUE(GetClient(0)->AwaitEngineInitialization());
ASSERT_TRUE(AwaitQuiescence());
ASSERT_FALSE(GetSyncService(0)->IsSyncFeatureActive())
<< "Full sync should be disabled";
ASSERT_EQ(syncer::SyncService::TransportState::ACTIVE,
GetSyncService(0)->GetTransportState());
ASSERT_TRUE(
GetSyncService(0)->GetActiveDataTypes().Has(syncer::SHARING_MESSAGE));
SharingMessageCallbackChecker callback_checker(
GetSyncService(0), sync_pb::SharingMessageCommitError::NONE);
SharingMessageBridge* sharing_message_bridge =
SharingMessageBridgeFactory::GetForBrowserContext(GetProfile(0));
SharingMessageSpecifics specifics;
specifics.set_payload("payload");
sharing_message_bridge->SendSharingMessage(
std::make_unique<SharingMessageSpecifics>(specifics),
callback_checker.GetCommitFinishedCallback());
EXPECT_TRUE(WaitForSharingMessage({specifics}));
EXPECT_TRUE(callback_checker.Wait());
}
#endif // !BUILDFLAG(IS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(SingleClientSharingMessageSyncTest,
ShouldPropagateCommitFailure) {
ASSERT_TRUE(SetupSync());
SharingMessageCallbackChecker callback_checker(
GetSyncService(0), sync_pb::SharingMessageCommitError::SYNC_SERVER_ERROR);
GetFakeServer()->TriggerCommitError(sync_pb::SyncEnums::TRANSIENT_ERROR);
SharingMessageBridge* sharing_message_bridge =
SharingMessageBridgeFactory::GetForBrowserContext(GetProfile(0));
SharingMessageSpecifics specifics;
specifics.set_payload("payload");
sharing_message_bridge->SendSharingMessage(
std::make_unique<SharingMessageSpecifics>(specifics),
callback_checker.GetCommitFinishedCallback());
EXPECT_TRUE(callback_checker.Wait());
}
// ChromeOS does not support signing out of a primary account.
#if !BUILDFLAG(IS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(SingleClientSharingMessageSyncTest,
ShouldCleanPendingMessagesUponSignout) {
ASSERT_TRUE(SetupSync());
SharingMessageCallbackChecker callback_checker(
GetSyncService(0), sync_pb::SharingMessageCommitError::SYNC_TURNED_OFF);
SharingMessageBridge* sharing_message_bridge =
SharingMessageBridgeFactory::GetForBrowserContext(GetProfile(0));
SharingMessageSpecifics specifics;
specifics.set_payload("payload");
sharing_message_bridge->SendSharingMessage(
std::make_unique<SharingMessageSpecifics>(specifics),
callback_checker.GetCommitFinishedCallback());
GetClient(0)->SignOutPrimaryAccount();
ASSERT_TRUE(GetClient(0)->SetupSync());
EXPECT_TRUE(callback_checker.Wait());
EXPECT_TRUE(GetFakeServer()
->GetSyncEntitiesByDataType(syncer::SHARING_MESSAGE)
.empty());
}
#endif // !BUILDFLAG(IS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(
SingleClientSharingMessageSyncTest,
ShouldTurnOffSharingMessageDataTypeOnPersistentAuthError) {
ASSERT_TRUE(SetupSync());
GetFakeServer()->SetHttpError(net::HTTP_UNAUTHORIZED);
SetOAuth2TokenResponse(kInvalidGrantOAuth2Token, net::HTTP_BAD_REQUEST,
net::OK);
SharingMessageCallbackChecker callback_checker(
GetSyncService(0), sync_pb::SharingMessageCommitError::SYNC_TURNED_OFF);
SharingMessageBridge* sharing_message_bridge =
SharingMessageBridgeFactory::GetForBrowserContext(GetProfile(0));
SharingMessageSpecifics specifics;
specifics.set_payload("payload");
sharing_message_bridge->SendSharingMessage(
std::make_unique<SharingMessageSpecifics>(specifics),
callback_checker.GetCommitFinishedCallback());
EXPECT_TRUE(DisabledSharingMessageChecker(GetSyncService(0)).Wait());
EXPECT_TRUE(callback_checker.Wait());
}
IN_PROC_BROWSER_TEST_F(
SingleClientSharingMessageSyncTest,
ShouldRetrySendingSharingMessageDataTypeOnTransientAuthError) {
const std::string payload = "payload";
ASSERT_TRUE(SetupSync());
GetFakeServer()->SetHttpError(net::HTTP_UNAUTHORIZED);
SetOAuth2TokenResponse(kEmptyOAuth2Token, net::HTTP_INTERNAL_SERVER_ERROR,
net::OK);
SharingMessageCallbackChecker callback_checker(
GetSyncService(0), sync_pb::SharingMessageCommitError::NONE);
SharingMessageBridge* sharing_message_bridge =
SharingMessageBridgeFactory::GetForBrowserContext(GetProfile(0));
SharingMessageSpecifics specifics;
specifics.set_payload(payload);
sharing_message_bridge->SendSharingMessage(
std::make_unique<SharingMessageSpecifics>(specifics),
callback_checker.GetCommitFinishedCallback());
ASSERT_TRUE(RetryingAccessTokenFetchChecker(GetSyncService(0)).Wait());
SetOAuth2TokenResponse(kValidOAuth2Token, net::HTTP_OK, net::OK);
GetFakeServer()->ClearHttpError();
EXPECT_TRUE(WaitForSharingMessage({specifics}));
EXPECT_TRUE(callback_checker.Wait());
}
} // namespace
|