Home | History | Annotate | Download | only in integration
      1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "base/strings/stringprintf.h"
      6 #include "base/strings/utf_string_conversions.h"
      7 #include "chrome/browser/sync/test/integration/passwords_helper.h"
      8 #include "chrome/browser/sync/test/integration/profile_sync_service_harness.h"
      9 #include "chrome/browser/sync/test/integration/sync_integration_test_util.h"
     10 #include "chrome/browser/sync/test/integration/sync_test.h"
     11 #include "components/password_manager/core/browser/password_form_data.h"
     12 
     13 using passwords_helper::AddLogin;
     14 using passwords_helper::AllProfilesContainSamePasswordFormsAsVerifier;
     15 using passwords_helper::AwaitAllProfilesContainSamePasswordForms;
     16 using passwords_helper::AwaitProfileContainsSamePasswordFormsAsVerifier;
     17 using passwords_helper::CreateTestPasswordForm;
     18 using passwords_helper::GetPasswordCount;
     19 using passwords_helper::GetPasswordStore;
     20 using passwords_helper::GetVerifierPasswordCount;
     21 using passwords_helper::GetVerifierPasswordStore;
     22 using passwords_helper::ProfileContainsSamePasswordFormsAsVerifier;
     23 using passwords_helper::SetDecryptionPassphrase;
     24 using passwords_helper::SetEncryptionPassphrase;
     25 using sync_integration_test_util::AwaitPassphraseAccepted;
     26 using sync_integration_test_util::AwaitPassphraseRequired;
     27 
     28 using autofill::PasswordForm;
     29 
     30 static const char* kValidPassphrase = "passphrase!";
     31 static const char* kAnotherValidPassphrase = "Mot de passe!";
     32 
     33 class MultipleClientPasswordsSyncTest : public SyncTest {
     34  public:
     35   MultipleClientPasswordsSyncTest() : SyncTest(MULTIPLE_CLIENT) {}
     36   virtual ~MultipleClientPasswordsSyncTest() {}
     37 
     38   virtual bool TestUsesSelfNotifications() OVERRIDE {
     39     return false;
     40   }
     41 
     42  private:
     43   DISALLOW_COPY_AND_ASSIGN(MultipleClientPasswordsSyncTest);
     44 };
     45 
     46 IN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest, Sanity) {
     47   ASSERT_TRUE(SetupSync()) << "SetupSync() failed.";
     48 
     49   for (int i = 0; i < num_clients(); ++i) {
     50     PasswordForm form = CreateTestPasswordForm(i);
     51     AddLogin(GetPasswordStore(i), form);
     52   }
     53 
     54   ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms());
     55   ASSERT_EQ(num_clients(), GetPasswordCount(0));
     56 }
     57 
     58 IN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest,
     59                        SetPassphraseAndThenSetupSync) {
     60   ASSERT_TRUE(SetupClients());
     61 
     62   ASSERT_TRUE(GetClient(0)->SetupSync());
     63   SetEncryptionPassphrase(0, kValidPassphrase, ProfileSyncService::EXPLICIT);
     64   ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(0)));
     65 
     66   // When client 1 hits a passphrase required state, we can infer that
     67   // client 0's passphrase has been committed. to the server.
     68   GetClient(1)->SetupSync();
     69   ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1)));
     70 
     71   // Setup client 2 *after* the passphrase has been committed.
     72   ASSERT_FALSE(GetClient(2)->SetupSync());
     73   ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(2)));
     74 
     75   // Get clients 1 and 2 out of the passphrase required state.
     76   ASSERT_TRUE(SetDecryptionPassphrase(1, kValidPassphrase));
     77   ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(1)));
     78   ASSERT_TRUE(SetDecryptionPassphrase(2, kValidPassphrase));
     79   ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(2)));
     80 
     81   // For some reason, the tests won't pass unless these flags are set.
     82   GetSyncService(1)->SetSyncSetupCompleted();
     83   GetSyncService(1)->SetSetupInProgress(false);
     84   GetSyncService(2)->SetSyncSetupCompleted();
     85   GetSyncService(2)->SetSetupInProgress(false);
     86 
     87   // Move around some passwords to make sure it's all working.
     88   PasswordForm form0 = CreateTestPasswordForm(0);
     89   AddLogin(GetPasswordStore(0), form0);
     90 
     91   ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms());
     92 }
     93 
     94 IN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest,
     95                        SetDifferentPassphraseAndThenSetupSync) {
     96   ASSERT_TRUE(SetupClients()) << "SetupClients() failed.";
     97 
     98   ASSERT_TRUE(GetClient(0)->SetupSync());
     99   SetEncryptionPassphrase(0, kValidPassphrase, ProfileSyncService::EXPLICIT);
    100   ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService((0))));
    101 
    102   // When client 1 hits a passphrase required state, we can infer that
    103   // client 0's passphrase has been committed. to the server.
    104   GetClient(1)->SetupSync();
    105   ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1)));
    106 
    107   // Give client 1 the correct passphrase.
    108   SetDecryptionPassphrase(1, kValidPassphrase);
    109   ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService((1))));
    110 
    111   // For some reason, the tests won't pass unless these flags are set.
    112   GetSyncService(1)->SetSetupInProgress(false);
    113   GetSyncService(1)->SetSyncSetupCompleted();
    114 
    115   // Give client 2 a different passphrase so it fails to sync.
    116   ASSERT_FALSE(GetClient(2)->SetupSync());
    117   ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService((2))));
    118   SetDecryptionPassphrase(2, kAnotherValidPassphrase);
    119   ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService((2))));
    120 
    121   // Add a password on 0 while client 2 has different passphrases.
    122   PasswordForm form0 = CreateTestPasswordForm(0);
    123   AddLogin(GetVerifierPasswordStore(), form0);
    124   AddLogin(GetPasswordStore(0), form0);
    125 
    126   // It should sync to client 1.
    127   ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(1));
    128 
    129   // But it won't get synced to 2.
    130   ASSERT_FALSE(ProfileContainsSamePasswordFormsAsVerifier(2));
    131 
    132   // Update 2 with the correct passphrase, the password should now sync over.
    133   ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(2)));
    134   ASSERT_TRUE(SetDecryptionPassphrase(2, kValidPassphrase));
    135   ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(2)));
    136 
    137   // For some reason, the tests won't pass unless these flags are set.
    138   GetSyncService(2)->SetSetupInProgress(false);
    139   GetSyncService(2)->SetSyncSetupCompleted();
    140 
    141   ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(2));
    142   ASSERT_TRUE(AllProfilesContainSamePasswordFormsAsVerifier());
    143 }
    144