blob: bfbed9f38b08dcd8915193dac82d56f820753496 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
//
// A set of unit tests for TokenValidatorFactoryImpl
#include <string>
#include "base/json/json_writer.h"
#include "base/values.h"
#include "net/http/http_status_code.h"
#include "net/url_request/url_request_job_factory.h"
#include "net/url_request/url_request_job_factory_impl.h"
#include "net/url_request/url_request_status.h"
#include "net/url_request/url_request_test_job.h"
#include "net/url_request/url_request_test_util.h"
#include "remoting/base/rsa_key_pair.h"
#include "remoting/base/test_rsa_key_pair.h"
#include "remoting/host/token_validator_factory_impl.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "url/gurl.h"
namespace {
const char kTokenUrl[] = "https://example.com/token";
const char kTokenValidationUrl[] = "https://example.com/validate";
const char kTokenValidationCertIssuer[] = "";
const char kLocalJid[] = "user@example.com/local";
const char kRemoteJid[] = "user@example.com/remote";
const char kToken[] = "xyz123456";
const char kSharedSecret[] = "abcdefgh";
// Bad scope: no nonce element.
const char kBadScope[] =
"client:user@example.com/local host:user@example.com/remote";
class FakeProtocolHandler : public net::URLRequestJobFactory::ProtocolHandler {
public:
FakeProtocolHandler(const std::string& headers, const std::string& response)
: headers_(headers),
response_(response) {
}
net::URLRequestJob* MaybeCreateJob(
net::URLRequest* request,
net::NetworkDelegate* network_delegate) const override {
return new net::URLRequestTestJob(
request, network_delegate, headers_, response_, true);
}
private:
std::string headers_;
std::string response_;
};
class SetResponseURLRequestContext: public net::TestURLRequestContext {
public:
void SetResponse(const std::string& headers, const std::string& response) {
net::URLRequestJobFactoryImpl* factory =
new net::URLRequestJobFactoryImpl();
factory->SetProtocolHandler(
"https", new FakeProtocolHandler(headers, response));
context_storage_.set_job_factory(factory);
}
};
} // namespace
namespace remoting {
class TokenValidatorFactoryImplTest : public testing::Test {
public:
TokenValidatorFactoryImplTest() : message_loop_(base::MessageLoop::TYPE_IO) {}
void SuccessCallback(const std::string& shared_secret) {
EXPECT_FALSE(shared_secret.empty());
message_loop_.Quit();
}
void FailureCallback(const std::string& shared_secret) {
EXPECT_TRUE(shared_secret.empty());
message_loop_.Quit();
}
void DeleteOnFailureCallback(const std::string& shared_secret) {
EXPECT_TRUE(shared_secret.empty());
token_validator_.reset();
message_loop_.Quit();
}
protected:
void SetUp() override {
key_pair_ = RsaKeyPair::FromString(kTestRsaKeyPair);
scoped_ptr<net::TestURLRequestContext> context(
new SetResponseURLRequestContext());
request_context_getter_ = new net::TestURLRequestContextGetter(
message_loop_.message_loop_proxy(), context.Pass());
ThirdPartyAuthConfig config;
config.token_url = GURL(kTokenUrl);
config.token_validation_url = GURL(kTokenValidationUrl);
config.token_validation_cert_issuer = kTokenValidationCertIssuer;
token_validator_factory_.reset(new TokenValidatorFactoryImpl(
config, key_pair_, request_context_getter_));
}
static std::string CreateResponse(const std::string& scope) {
base::DictionaryValue response_dict;
response_dict.SetString("access_token", kSharedSecret);
response_dict.SetString("token_type", "shared_secret");
response_dict.SetString("scope", scope);
std::string response;
base::JSONWriter::Write(&response_dict, &response);
return response;
}
static std::string CreateErrorResponse(const std::string& error) {
base::DictionaryValue response_dict;
response_dict.SetString("error", error);
std::string response;
base::JSONWriter::Write(&response_dict, &response);
return response;
}
void SetResponse(const std::string& headers, const std::string& response) {
SetResponseURLRequestContext* context =
static_cast<SetResponseURLRequestContext*>(
request_context_getter_->GetURLRequestContext());
context->SetResponse(headers, response);
}
base::MessageLoop message_loop_;
scoped_refptr<RsaKeyPair> key_pair_;
scoped_refptr<net::URLRequestContextGetter> request_context_getter_;
scoped_ptr<TokenValidatorFactoryImpl> token_validator_factory_;
scoped_ptr<protocol::TokenValidator> token_validator_;
};
TEST_F(TokenValidatorFactoryImplTest, Success) {
token_validator_ = token_validator_factory_->CreateTokenValidator(
kLocalJid, kRemoteJid);
SetResponse(net::URLRequestTestJob::test_headers(),
CreateResponse(token_validator_->token_scope()));
token_validator_->ValidateThirdPartyToken(
kToken, base::Bind(&TokenValidatorFactoryImplTest::SuccessCallback,
base::Unretained(this)));
message_loop_.Run();
}
TEST_F(TokenValidatorFactoryImplTest, BadToken) {
token_validator_ = token_validator_factory_->CreateTokenValidator(
kLocalJid, kRemoteJid);
SetResponse(net::URLRequestTestJob::test_error_headers(), std::string());
token_validator_->ValidateThirdPartyToken(
kToken, base::Bind(&TokenValidatorFactoryImplTest::FailureCallback,
base::Unretained(this)));
message_loop_.Run();
}
TEST_F(TokenValidatorFactoryImplTest, BadScope) {
token_validator_ = token_validator_factory_->CreateTokenValidator(
kLocalJid, kRemoteJid);
SetResponse(net::URLRequestTestJob::test_headers(),
CreateResponse(kBadScope));
token_validator_->ValidateThirdPartyToken(
kToken, base::Bind(&TokenValidatorFactoryImplTest::FailureCallback,
base::Unretained(this)));
message_loop_.Run();
}
TEST_F(TokenValidatorFactoryImplTest, DeleteOnFailure) {
token_validator_ = token_validator_factory_->CreateTokenValidator(
kLocalJid, kRemoteJid);
SetResponse(net::URLRequestTestJob::test_error_headers(), std::string());
token_validator_->ValidateThirdPartyToken(
kToken, base::Bind(
&TokenValidatorFactoryImplTest::DeleteOnFailureCallback,
base::Unretained(this)));
message_loop_.Run();
}
} // namespace remoting