1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176
|
// Copyright 2019 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "remoting/test/test_oauth_token_getter.h"
#include <utility>
#include "base/command_line.h"
#include "base/containers/contains.h"
#include "base/functional/bind.h"
#include "base/functional/callback_helpers.h"
#include "base/strings/escape.h"
#include "base/strings/stringprintf.h"
#include "base/task/single_thread_task_runner.h"
#include "google_apis/google_api_keys.h"
#include "remoting/base/fake_oauth_token_getter.h"
#include "remoting/base/oauth_token_getter_impl.h"
#include "remoting/base/url_request_context_getter.h"
#include "remoting/test/cli_util.h"
#include "remoting/test/test_token_storage.h"
#include "services/network/public/cpp/shared_url_loader_factory.h"
#include "services/network/transitional_url_loader_factory_owner.h"
namespace remoting {
namespace test {
namespace {
constexpr char kChromotingAuthScopeValues[] =
"https://www.googleapis.com/auth/chromoting.me2me.host "
"https://www.googleapis.com/auth/chromoting.remote.support "
"https://www.googleapis.com/auth/userinfo.email "
"https://www.googleapis.com/auth/tachyon";
std::string GetAuthorizationCodeUri(bool show_consent_page) {
// Replace space characters with a '+' sign when formatting.
bool use_plus = true;
std::string uri = base::StringPrintf(
"https://accounts.google.com/o/oauth2/auth"
"?scope=%s"
"&redirect_uri=https://remotedesktop.google.com/_/oauthredirect"
"&response_type=code"
"&client_id=%s"
"&access_type=offline",
base::EscapeUrlEncodedData(kChromotingAuthScopeValues, use_plus).c_str(),
base::EscapeUrlEncodedData(
google_apis::GetOAuth2ClientID(google_apis::CLIENT_REMOTING),
use_plus)
.c_str());
if (show_consent_page) {
uri += "&approval_prompt=force";
}
return uri;
}
} // namespace
constexpr char TestOAuthTokenGetter::kSwitchNameAuthCode[];
// static
bool TestOAuthTokenGetter::IsServiceAccount(const std::string& email) {
return base::Contains(email, "@chromoting.gserviceaccount.com");
}
TestOAuthTokenGetter::TestOAuthTokenGetter(TestTokenStorage* token_storage) {
DCHECK(token_storage);
token_storage_ = token_storage;
auto url_request_context_getter =
base::MakeRefCounted<URLRequestContextGetter>(
base::SingleThreadTaskRunner::GetCurrentDefault());
url_loader_factory_owner_ =
std::make_unique<network::TransitionalURLLoaderFactoryOwner>(
url_request_context_getter);
}
TestOAuthTokenGetter::~TestOAuthTokenGetter() = default;
void TestOAuthTokenGetter::Initialize(base::OnceClosure on_done) {
std::string user_email = token_storage_->FetchUserEmail();
std::string access_token = token_storage_->FetchAccessToken();
std::string refresh_token = token_storage_->FetchRefreshToken();
if (user_email.empty() || (access_token.empty() && refresh_token.empty())) {
ResetWithAuthenticationFlow(std::move(on_done));
return;
}
VLOG(0) << "Reusing user_email: " << user_email;
if (!refresh_token.empty()) {
VLOG(0) << "Reusing refresh_token: " << refresh_token;
token_getter_ = CreateWithRefreshToken(refresh_token, user_email);
} else {
VLOG(0) << "Reusing access token: " << access_token;
token_getter_ = std::make_unique<FakeOAuthTokenGetter>(
OAuthTokenGetter::Status::SUCCESS,
OAuthTokenInfo(access_token, user_email));
}
std::move(on_done).Run();
}
void TestOAuthTokenGetter::ResetWithAuthenticationFlow(
base::OnceClosure on_done) {
on_authentication_done_.push(std::move(on_done));
InvalidateCache();
}
void TestOAuthTokenGetter::CallWithToken(TokenCallback on_access_token) {
token_getter_->CallWithToken(std::move(on_access_token));
}
void TestOAuthTokenGetter::InvalidateCache() {
if (is_authenticating_) {
return;
}
is_authenticating_ = true;
printf(
"Is your account allowlisted to use 1P scope in consent page? [Y/n]: ");
bool show_consent_page = test::ReadYNBool(true);
static const std::string read_auth_code_prompt = base::StringPrintf(
"Please authenticate at:\n\n"
" %s\n\n"
"Enter the auth code: ",
GetAuthorizationCodeUri(show_consent_page).c_str());
std::string auth_code = test::ReadStringFromCommandLineOrStdin(
kSwitchNameAuthCode, read_auth_code_prompt);
// Make sure we don't try to reuse an auth code.
base::CommandLine::ForCurrentProcess()->RemoveSwitch(kSwitchNameAuthCode);
}
base::WeakPtr<OAuthTokenGetter> TestOAuthTokenGetter::GetWeakPtr() {
return weak_factory_.GetWeakPtr();
}
std::unique_ptr<OAuthTokenGetter> TestOAuthTokenGetter::CreateWithRefreshToken(
const std::string& refresh_token,
const std::string& email) {
bool is_service_account = IsServiceAccount(email);
auto oauth_credentials =
std::make_unique<OAuthTokenGetter::OAuthAuthorizationCredentials>(
email, refresh_token, is_service_account);
return std::make_unique<OAuthTokenGetterImpl>(
std::move(oauth_credentials),
url_loader_factory_owner_->GetURLLoaderFactory(),
/*auto_refresh=*/true);
}
void TestOAuthTokenGetter::OnAccessToken(OAuthTokenGetter::Status status,
const std::string& user_email,
const std::string& access_token,
const std::string& scopes) {
is_authenticating_ = false;
if (status != OAuthTokenGetter::Status::SUCCESS) {
fprintf(stderr,
"Failed to authenticate. Please check if your access token is "
"correct.\n");
InvalidateCache();
return;
}
VLOG(0) << "Received access_token: " << access_token;
token_storage_->StoreAccessToken(access_token);
RunAuthenticationDoneCallbacks();
}
void TestOAuthTokenGetter::RunAuthenticationDoneCallbacks() {
while (!on_authentication_done_.empty()) {
std::move(on_authentication_done_.front()).Run();
on_authentication_done_.pop();
}
}
} // namespace test
} // namespace remoting
|