1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221
|
// Copyright 2018 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <stdint.h>
#include "base/memory/raw_ptr.h"
#include "build/build_config.h"
#include "chrome/browser/consent_auditor/consent_auditor_factory.h"
#include "chrome/browser/sync/test/integration/single_client_status_change_checker.h"
#include "chrome/browser/sync/test/integration/status_change_checker.h"
#include "chrome/browser/sync/test/integration/sync_integration_test_util.h"
#include "chrome/browser/sync/test/integration/sync_service_impl_harness.h"
#include "chrome/browser/sync/test/integration/sync_test.h"
#include "components/consent_auditor/consent_auditor.h"
#include "components/signin/public/identity_manager/identity_test_utils.h"
#include "components/sync/protocol/user_consent_specifics.pb.h"
#include "content/public/test/browser_test.h"
using fake_server::FakeServer;
using sync_pb::SyncEntity;
using sync_pb::UserConsentSpecifics;
using sync_pb::UserConsentTypes;
using SyncConsent = sync_pb::UserConsentTypes::SyncConsent;
namespace {
class UserConsentEqualityChecker : public SingleClientStatusChangeChecker {
public:
UserConsentEqualityChecker(
syncer::SyncServiceImpl* service,
FakeServer* fake_server,
std::vector<UserConsentSpecifics> expected_specifics)
: SingleClientStatusChangeChecker(service), fake_server_(fake_server) {
for (const UserConsentSpecifics& specifics : expected_specifics) {
expected_specifics_.insert(std::pair<int64_t, UserConsentSpecifics>(
specifics.consent_case(), specifics));
}
}
UserConsentEqualityChecker(const UserConsentEqualityChecker&) = delete;
UserConsentEqualityChecker& operator=(const UserConsentEqualityChecker&) =
delete;
bool IsExitConditionSatisfied(std::ostream* os) override {
*os << "Waiting server side USER_CONSENTS to match expected.";
std::vector<SyncEntity> entities =
fake_server_->GetSyncEntitiesByDataType(syncer::USER_CONSENTS);
// |entities.size()| is only going to grow, if |entities.size()| ever
// becomes bigger then all hope is lost of passing, stop now.
EXPECT_GE(expected_specifics_.size(), entities.size());
if (expected_specifics_.size() > entities.size()) {
return false;
}
// Number of events on server matches expected, exit condition can be
// satisfied. Let's verify that content matches as well. It is safe to
// modify |expected_specifics_|.
for (const SyncEntity& entity : entities) {
UserConsentSpecifics server_specifics = entity.specifics().user_consent();
auto iter = expected_specifics_.find(server_specifics.consent_case());
EXPECT_NE(expected_specifics_.end(), iter);
if (expected_specifics_.end() == iter) {
return false;
}
EXPECT_EQ(iter->second.obfuscated_gaia_id(),
server_specifics.obfuscated_gaia_id());
expected_specifics_.erase(iter);
}
return true;
}
private:
const raw_ptr<FakeServer> fake_server_;
// TODO(markusheintz): User a string with the serialized proto instead of an
// int. The requires creating better expectations with a proper creation
// time.
std::multimap<int64_t, UserConsentSpecifics> expected_specifics_;
};
class SingleClientUserConsentsSyncTest : public SyncTest {
public:
SingleClientUserConsentsSyncTest() : SyncTest(SINGLE_CLIENT) {}
~SingleClientUserConsentsSyncTest() override = default;
bool ExpectUserConsents(
std::vector<UserConsentSpecifics> expected_specifics) {
return UserConsentEqualityChecker(GetSyncService(0), GetFakeServer(),
expected_specifics)
.Wait();
}
GaiaId GetGaiaId() const {
return GetClient(0)->GetGaiaIdForAccount(SyncTestAccount::kDefaultAccount);
}
};
IN_PROC_BROWSER_TEST_F(SingleClientUserConsentsSyncTest, ShouldSubmit) {
ASSERT_TRUE(SetupSync());
ASSERT_EQ(
0u,
GetFakeServer()->GetSyncEntitiesByDataType(syncer::USER_CONSENTS).size());
consent_auditor::ConsentAuditor* consent_service =
ConsentAuditorFactory::GetForProfile(GetProfile(0));
UserConsentSpecifics specifics;
specifics.mutable_sync_consent()->set_confirmation_grd_id(1);
specifics.set_obfuscated_gaia_id(GetGaiaId().ToString());
SyncConsent sync_consent;
sync_consent.set_confirmation_grd_id(1);
sync_consent.set_status(UserConsentTypes::GIVEN);
consent_service->RecordSyncConsent(GetGaiaId(), sync_consent);
EXPECT_TRUE(ExpectUserConsents({specifics}));
}
// ChromeOS does not support signing out of a primary account.
#if !BUILDFLAG(IS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(
SingleClientUserConsentsSyncTest,
ShouldPreserveConsentsOnSignoutAndResubmitWhenReenabled) {
// Set up the clients (profiles), but do *not* set up Sync yet.
ASSERT_TRUE(SetupClients());
UserConsentSpecifics specifics;
specifics.mutable_sync_consent()->set_confirmation_grd_id(1);
// Account id may be compared to the synced account, thus, we need them to
// match.
specifics.set_obfuscated_gaia_id(GetGaiaId().ToString());
ASSERT_TRUE(SetupSync());
consent_auditor::ConsentAuditor* consent_service =
ConsentAuditorFactory::GetForProfile(GetProfile(0));
SyncConsent sync_consent;
sync_consent.set_confirmation_grd_id(1);
sync_consent.set_status(UserConsentTypes::GIVEN);
consent_service->RecordSyncConsent(GetGaiaId(), sync_consent);
GetClient(0)->SignOutPrimaryAccount();
ASSERT_TRUE(GetClient(0)->SetupSync());
EXPECT_TRUE(ExpectUserConsents({specifics}));
}
#endif // !BUILDFLAG(IS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(SingleClientUserConsentsSyncTest,
ShouldPreserveConsentsLoggedBeforeSyncSetup) {
// Set up the clients (profiles), but do *not* set up Sync yet.
ASSERT_TRUE(SetupClients());
SyncConsent consent1;
consent1.set_confirmation_grd_id(1);
consent1.set_status(UserConsentTypes::GIVEN);
SyncConsent consent2;
consent2.set_confirmation_grd_id(2);
consent2.set_status(UserConsentTypes::GIVEN);
UserConsentSpecifics specifics1;
*specifics1.mutable_sync_consent() = consent1;
specifics1.set_obfuscated_gaia_id(GetGaiaId().ToString());
UserConsentSpecifics specifics2;
*specifics2.mutable_sync_consent() = consent2;
specifics2.set_obfuscated_gaia_id(GetGaiaId().ToString());
// Now we can already record a consent, but of course it won't make it to the
// server yet.
consent_auditor::ConsentAuditor* consent_service =
ConsentAuditorFactory::GetForProfile(GetProfile(0));
consent_service->RecordSyncConsent(GetGaiaId(), consent1);
EXPECT_TRUE(ExpectUserConsents({}));
// Once we turn on Sync, the consent gets uploaded.
ASSERT_TRUE(SetupSync());
EXPECT_TRUE(ExpectUserConsents({specifics1}));
// Another consent can also be added now.
consent_service->RecordSyncConsent(GetGaiaId(), consent2);
EXPECT_TRUE(ExpectUserConsents({specifics1, specifics2}));
}
// ChromeOS does not support late signin after profile creation, so the test
// below does not apply, at least in the current form.
#if !BUILDFLAG(IS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(SingleClientUserConsentsSyncTest,
ShouldSubmitIfSignedInAlthoughFullSyncNotEnabled) {
// We avoid calling SetupSync(), because we don't want to turn on full sync,
// only sign in such that the standalone transport starts.
ASSERT_TRUE(SetupClients());
ASSERT_TRUE(GetClient(0)->SignInPrimaryAccount());
ASSERT_TRUE(GetClient(0)->AwaitEngineInitialization());
ASSERT_TRUE(AwaitQuiescence());
ASSERT_FALSE(GetSyncService(0)->IsSyncFeatureActive())
<< "Full sync should be disabled";
ASSERT_EQ(syncer::SyncService::TransportState::ACTIVE,
GetSyncService(0)->GetTransportState());
ASSERT_TRUE(
GetSyncService(0)->GetActiveDataTypes().Has(syncer::USER_CONSENTS));
SyncConsent sync_consent;
sync_consent.set_confirmation_grd_id(1);
sync_consent.set_status(UserConsentTypes::GIVEN);
ConsentAuditorFactory::GetForProfile(GetProfile(0))
->RecordSyncConsent(GetGaiaId(), sync_consent);
UserConsentSpecifics specifics;
SyncConsent* expected_sync_consent = specifics.mutable_sync_consent();
expected_sync_consent->set_confirmation_grd_id(1);
expected_sync_consent->set_status(UserConsentTypes::GIVEN);
// Account id may be compared to the synced account, thus, we need them to
// match.
specifics.set_obfuscated_gaia_id(GetGaiaId().ToString());
EXPECT_TRUE(ExpectUserConsents({specifics}));
}
#endif // !BUILDFLAG(IS_CHROMEOS)
} // namespace
|