summaryrefslogtreecommitdiff
path: root/chromium/components/gcm_driver/gcm_client_impl_unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/components/gcm_driver/gcm_client_impl_unittest.cc')
-rw-r--r--chromium/components/gcm_driver/gcm_client_impl_unittest.cc1966
1 files changed, 1966 insertions, 0 deletions
diff --git a/chromium/components/gcm_driver/gcm_client_impl_unittest.cc b/chromium/components/gcm_driver/gcm_client_impl_unittest.cc
new file mode 100644
index 00000000000..9492e9105e6
--- /dev/null
+++ b/chromium/components/gcm_driver/gcm_client_impl_unittest.cc
@@ -0,0 +1,1966 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "components/gcm_driver/gcm_client_impl.h"
+
+#include <stdint.h>
+
+#include <initializer_list>
+#include <memory>
+
+#include "base/callback_helpers.h"
+#include "base/command_line.h"
+#include "base/files/file_path.h"
+#include "base/files/file_util.h"
+#include "base/files/scoped_temp_dir.h"
+#include "base/memory/ptr_util.h"
+#include "base/strings/string_number_conversions.h"
+#include "base/test/metrics/histogram_tester.h"
+#include "base/test/scoped_feature_list.h"
+#include "base/test/task_environment.h"
+#include "base/time/clock.h"
+#include "base/timer/timer.h"
+#include "components/gcm_driver/features.h"
+#include "google_apis/gcm/base/fake_encryptor.h"
+#include "google_apis/gcm/base/mcs_message.h"
+#include "google_apis/gcm/base/mcs_util.h"
+#include "google_apis/gcm/engine/fake_connection_factory.h"
+#include "google_apis/gcm/engine/fake_connection_handler.h"
+#include "google_apis/gcm/engine/gservices_settings.h"
+#include "google_apis/gcm/monitoring/gcm_stats_recorder.h"
+#include "google_apis/gcm/protocol/android_checkin.pb.h"
+#include "google_apis/gcm/protocol/checkin.pb.h"
+#include "google_apis/gcm/protocol/mcs.pb.h"
+#include "net/test/gtest_util.h"
+#include "net/test/scoped_disable_exit_on_dfatal.h"
+#include "services/network/public/cpp/weak_wrapper_shared_url_loader_factory.h"
+#include "services/network/public/mojom/url_response_head.mojom.h"
+#include "services/network/test/test_network_connection_tracker.h"
+#include "services/network/test/test_url_loader_factory.h"
+#include "services/network/test/test_utils.h"
+#include "testing/gtest/include/gtest/gtest-spi.h"
+#include "testing/gtest/include/gtest/gtest.h"
+#include "third_party/leveldatabase/leveldb_chrome.h"
+
+namespace gcm {
+namespace {
+
+enum LastEvent {
+ NONE,
+ LOADING_COMPLETED,
+ REGISTRATION_COMPLETED,
+ UNREGISTRATION_COMPLETED,
+ MESSAGE_SEND_ERROR,
+ MESSAGE_SEND_ACK,
+ MESSAGE_RECEIVED,
+ MESSAGES_DELETED,
+};
+
+const char kChromeVersion[] = "45.0.0.1";
+const uint64_t kDeviceAndroidId = 54321;
+const uint64_t kDeviceSecurityToken = 12345;
+const uint64_t kDeviceAndroidId2 = 11111;
+const uint64_t kDeviceSecurityToken2 = 2222;
+const int64_t kSettingsCheckinInterval = 16 * 60 * 60;
+const char kProductCategoryForSubtypes[] = "com.chrome.macosx";
+const char kExtensionAppId[] = "abcdefghijklmnopabcdefghijklmnop";
+const char kRegistrationId[] = "reg_id";
+const char kSubtypeAppId[] = "app_id";
+const char kSender[] = "project_id";
+const char kSender2[] = "project_id2";
+const char kRegistrationResponsePrefix[] = "token=";
+const char kUnregistrationResponsePrefix[] = "deleted=";
+const char kRawData[] = "example raw data";
+
+const char kInstanceID[] = "iid_1";
+const char kScope[] = "GCM";
+const char kDeleteTokenResponse[] = "token=foo";
+const int kTestTokenInvalidationPeriod = 5;
+const char kMessageId[] = "0:12345%5678";
+
+const char kRegisterUrl[] = "https://android.clients.google.com/c2dm/register3";
+
+// Helper for building arbitrary data messages.
+MCSMessage BuildDownstreamMessage(
+ const std::string& project_id,
+ const std::string& category,
+ const std::string& subtype,
+ const std::map<std::string, std::string>& data,
+ const std::string& raw_data) {
+ mcs_proto::DataMessageStanza data_message;
+ data_message.set_from(project_id);
+ data_message.set_category(category);
+ for (auto iter = data.begin(); iter != data.end(); ++iter) {
+ mcs_proto::AppData* app_data = data_message.add_app_data();
+ app_data->set_key(iter->first);
+ app_data->set_value(iter->second);
+ }
+ if (!subtype.empty()) {
+ mcs_proto::AppData* app_data = data_message.add_app_data();
+ app_data->set_key("subtype");
+ app_data->set_value(subtype);
+ }
+ data_message.set_raw_data(raw_data);
+ data_message.set_persistent_id(kMessageId);
+ return MCSMessage(kDataMessageStanzaTag, data_message);
+}
+
+GCMClient::AccountTokenInfo MakeAccountToken(const std::string& email,
+ const std::string& token) {
+ GCMClient::AccountTokenInfo account_token;
+ account_token.email = email;
+ account_token.access_token = token;
+ return account_token;
+}
+
+std::map<std::string, std::string> MakeEmailToTokenMap(
+ const std::vector<GCMClient::AccountTokenInfo>& account_tokens) {
+ std::map<std::string, std::string> email_token_map;
+ for (auto iter = account_tokens.begin(); iter != account_tokens.end();
+ ++iter) {
+ email_token_map[iter->email] = iter->access_token;
+ }
+ return email_token_map;
+}
+
+class FakeMCSClient : public MCSClient {
+ public:
+ FakeMCSClient(base::Clock* clock,
+ ConnectionFactory* connection_factory,
+ GCMStore* gcm_store,
+ scoped_refptr<base::SequencedTaskRunner> io_task_runner,
+ GCMStatsRecorder* recorder);
+ ~FakeMCSClient() override;
+ void Login(uint64_t android_id, uint64_t security_token) override;
+ void SendMessage(const MCSMessage& message) override;
+
+ uint64_t last_android_id() const { return last_android_id_; }
+ uint64_t last_security_token() const { return last_security_token_; }
+ uint8_t last_message_tag() const { return last_message_tag_; }
+ const mcs_proto::DataMessageStanza& last_data_message_stanza() const {
+ return last_data_message_stanza_;
+ }
+
+ private:
+ uint64_t last_android_id_;
+ uint64_t last_security_token_;
+ uint8_t last_message_tag_;
+ mcs_proto::DataMessageStanza last_data_message_stanza_;
+};
+
+FakeMCSClient::FakeMCSClient(
+ base::Clock* clock,
+ ConnectionFactory* connection_factory,
+ GCMStore* gcm_store,
+ scoped_refptr<base::SequencedTaskRunner> io_task_runner,
+ GCMStatsRecorder* recorder)
+ : MCSClient("",
+ clock,
+ connection_factory,
+ gcm_store,
+ io_task_runner,
+ recorder),
+ last_android_id_(0u),
+ last_security_token_(0u),
+ last_message_tag_(kNumProtoTypes) {}
+
+FakeMCSClient::~FakeMCSClient() {
+}
+
+void FakeMCSClient::Login(uint64_t android_id, uint64_t security_token) {
+ last_android_id_ = android_id;
+ last_security_token_ = security_token;
+}
+
+void FakeMCSClient::SendMessage(const MCSMessage& message) {
+ last_message_tag_ = message.tag();
+ if (last_message_tag_ == kDataMessageStanzaTag) {
+ last_data_message_stanza_.CopyFrom(
+ reinterpret_cast<const mcs_proto::DataMessageStanza&>(
+ message.GetProtobuf()));
+ }
+}
+
+class AutoAdvancingTestClock : public base::Clock {
+ public:
+ explicit AutoAdvancingTestClock(base::TimeDelta auto_increment_time_delta);
+
+ AutoAdvancingTestClock(const AutoAdvancingTestClock&) = delete;
+ AutoAdvancingTestClock& operator=(const AutoAdvancingTestClock&) = delete;
+
+ ~AutoAdvancingTestClock() override;
+
+ base::Time Now() const override;
+ void Advance(base::TimeDelta delta);
+ int call_count() const { return call_count_; }
+
+ private:
+ mutable int call_count_;
+ base::TimeDelta auto_increment_time_delta_;
+ mutable base::Time now_;
+};
+
+AutoAdvancingTestClock::AutoAdvancingTestClock(
+ base::TimeDelta auto_increment_time_delta)
+ : call_count_(0), auto_increment_time_delta_(auto_increment_time_delta) {
+}
+
+AutoAdvancingTestClock::~AutoAdvancingTestClock() {
+}
+
+base::Time AutoAdvancingTestClock::Now() const {
+ call_count_++;
+ now_ += auto_increment_time_delta_;
+ return now_;
+}
+
+void AutoAdvancingTestClock::Advance(base::TimeDelta delta) {
+ now_ += delta;
+}
+
+class FakeGCMInternalsBuilder : public GCMInternalsBuilder {
+ public:
+ explicit FakeGCMInternalsBuilder(base::TimeDelta clock_step);
+ ~FakeGCMInternalsBuilder() override;
+
+ base::Clock* GetClock() override;
+ std::unique_ptr<MCSClient> BuildMCSClient(
+ const std::string& version,
+ base::Clock* clock,
+ ConnectionFactory* connection_factory,
+ GCMStore* gcm_store,
+ scoped_refptr<base::SequencedTaskRunner> io_task_runner,
+ GCMStatsRecorder* recorder) override;
+ std::unique_ptr<ConnectionFactory> BuildConnectionFactory(
+ const std::vector<GURL>& endpoints,
+ const net::BackoffEntry::Policy& backoff_policy,
+ base::RepeatingCallback<void(
+ mojo::PendingReceiver<network::mojom::ProxyResolvingSocketFactory>)>
+ get_socket_factory_callback,
+ scoped_refptr<base::SequencedTaskRunner> io_task_runner,
+ GCMStatsRecorder* recorder,
+ network::NetworkConnectionTracker* network_connection_tracker) override;
+
+ private:
+ AutoAdvancingTestClock clock_;
+};
+
+FakeGCMInternalsBuilder::FakeGCMInternalsBuilder(base::TimeDelta clock_step)
+ : clock_(clock_step) {}
+
+FakeGCMInternalsBuilder::~FakeGCMInternalsBuilder() {}
+
+base::Clock* FakeGCMInternalsBuilder::GetClock() {
+ return &clock_;
+}
+
+std::unique_ptr<MCSClient> FakeGCMInternalsBuilder::BuildMCSClient(
+ const std::string& version,
+ base::Clock* clock,
+ ConnectionFactory* connection_factory,
+ GCMStore* gcm_store,
+ scoped_refptr<base::SequencedTaskRunner> io_task_runner,
+ GCMStatsRecorder* recorder) {
+ return base::WrapUnique<MCSClient>(new FakeMCSClient(
+ clock, connection_factory, gcm_store, io_task_runner, recorder));
+}
+
+std::unique_ptr<ConnectionFactory>
+FakeGCMInternalsBuilder::BuildConnectionFactory(
+ const std::vector<GURL>& endpoints,
+ const net::BackoffEntry::Policy& backoff_policy,
+ base::RepeatingCallback<void(
+ mojo::PendingReceiver<network::mojom::ProxyResolvingSocketFactory>)>
+ get_socket_factory_callback,
+ scoped_refptr<base::SequencedTaskRunner> io_task_runner,
+ GCMStatsRecorder* recorder,
+ network::NetworkConnectionTracker* network_connection_tracker) {
+ return base::WrapUnique<ConnectionFactory>(new FakeConnectionFactory());
+}
+
+} // namespace
+
+class GCMClientImplTest : public testing::Test,
+ public GCMClient::Delegate {
+ public:
+ GCMClientImplTest();
+ ~GCMClientImplTest() override;
+
+ void SetUp() override;
+ void TearDown() override;
+
+ void SetFeatureParams(const base::Feature& feature,
+ const base::FieldTrialParams& params);
+
+ void InitializeInvalidationFieldTrial();
+
+ void BuildGCMClient(base::TimeDelta clock_step);
+ void InitializeGCMClient();
+ void StartGCMClient();
+ void Register(const std::string& app_id,
+ const std::vector<std::string>& senders);
+ void Unregister(const std::string& app_id);
+ void ReceiveMessageFromMCS(const MCSMessage& message);
+ void ReceiveOnMessageSentToMCS(
+ const std::string& app_id,
+ const std::string& message_id,
+ const MCSClient::MessageSendStatus status);
+ void FailCheckin(net::HttpStatusCode response_code);
+ void CompleteCheckin(uint64_t android_id,
+ uint64_t security_token,
+ const std::string& digest,
+ const std::map<std::string, std::string>& settings);
+ void CompleteCheckinImpl(uint64_t android_id,
+ uint64_t security_token,
+ const std::string& digest,
+ const std::map<std::string, std::string>& settings,
+ net::HttpStatusCode response_code);
+ void CompleteRegistration(const std::string& registration_id);
+ void CompleteUnregistration(const std::string& app_id);
+
+ bool ExistsRegistration(const std::string& app_id) const;
+ void AddRegistration(const std::string& app_id,
+ const std::vector<std::string>& sender_ids,
+ const std::string& registration_id);
+
+ // GCMClient::Delegate overrides (for verification).
+ void OnRegisterFinished(scoped_refptr<RegistrationInfo> registration_info,
+ const std::string& registration_id,
+ GCMClient::Result result) override;
+ void OnUnregisterFinished(scoped_refptr<RegistrationInfo> registration_info,
+ GCMClient::Result result) override;
+ void OnSendFinished(const std::string& app_id,
+ const std::string& message_id,
+ GCMClient::Result result) override {}
+ void OnMessageReceived(const std::string& registration_id,
+ const IncomingMessage& message) override;
+ void OnMessagesDeleted(const std::string& app_id) override;
+ void OnMessageSendError(
+ const std::string& app_id,
+ const gcm::GCMClient::SendErrorDetails& send_error_details) override;
+ void OnSendAcknowledged(const std::string& app_id,
+ const std::string& message_id) override;
+ void OnGCMReady(const std::vector<AccountMapping>& account_mappings,
+ const base::Time& last_token_fetch_time) override;
+ void OnActivityRecorded() override {}
+ void OnConnected(const net::IPEndPoint& ip_endpoint) override {}
+ void OnDisconnected() override {}
+ void OnStoreReset() override {}
+
+ GCMClientImpl* gcm_client() const { return gcm_client_.get(); }
+ GCMClientImpl::State gcm_client_state() const {
+ return gcm_client_->state_;
+ }
+ FakeMCSClient* mcs_client() const {
+ return static_cast<FakeMCSClient*>(gcm_client_->mcs_client_.get());
+ }
+ ConnectionFactory* connection_factory() const {
+ return gcm_client_->connection_factory_.get();
+ }
+
+ const GCMClientImpl::CheckinInfo& device_checkin_info() const {
+ return gcm_client_->device_checkin_info_;
+ }
+
+ void reset_last_event() {
+ last_event_ = NONE;
+ last_app_id_.clear();
+ last_registration_id_.clear();
+ last_message_id_.clear();
+ last_result_ = GCMClient::UNKNOWN_ERROR;
+ last_account_mappings_.clear();
+ last_token_fetch_time_ = base::Time();
+ }
+
+ LastEvent last_event() const { return last_event_; }
+ const std::string& last_app_id() const { return last_app_id_; }
+ const std::string& last_registration_id() const {
+ return last_registration_id_;
+ }
+ const std::string& last_message_id() const { return last_message_id_; }
+ GCMClient::Result last_result() const { return last_result_; }
+ const IncomingMessage& last_message() const { return last_message_; }
+ const GCMClient::SendErrorDetails& last_error_details() const {
+ return last_error_details_;
+ }
+ const base::Time& last_token_fetch_time() const {
+ return last_token_fetch_time_;
+ }
+ const std::vector<AccountMapping>& last_account_mappings() {
+ return last_account_mappings_;
+ }
+
+ const GServicesSettings& gservices_settings() const {
+ return gcm_client_->gservices_settings_;
+ }
+
+ const base::FilePath& temp_directory_path() const {
+ return temp_directory_.GetPath();
+ }
+
+ base::FilePath gcm_store_path() const {
+ // Pass an non-existent directory as store path to match the exact
+ // behavior in the production code. Currently GCMStoreImpl checks if
+ // the directory exist or not to determine the store existence.
+ return temp_directory_.GetPath().Append(FILE_PATH_LITERAL("GCM Store"));
+ }
+
+ int64_t CurrentTime();
+
+ // Tooling.
+ void PumpLoopUntilIdle();
+ bool CreateUniqueTempDir();
+ AutoAdvancingTestClock* clock() const {
+ return static_cast<AutoAdvancingTestClock*>(gcm_client_->clock_);
+ }
+ network::TestURLLoaderFactory* url_loader_factory() {
+ return &test_url_loader_factory_;
+ }
+
+ void FastForwardBy(const base::TimeDelta& duration) {
+ task_environment_.FastForwardBy(duration);
+ }
+
+ private:
+ base::test::TaskEnvironment task_environment_{
+ base::test::TaskEnvironment::TimeSource::MOCK_TIME};
+
+ // Must be declared first so that it is destroyed last. Injected to
+ // GCM client.
+ base::ScopedTempDir temp_directory_;
+
+ // Variables used for verification.
+ LastEvent last_event_;
+ std::string last_app_id_;
+ std::string last_registration_id_;
+ std::string last_message_id_;
+ GCMClient::Result last_result_;
+ IncomingMessage last_message_;
+ GCMClient::SendErrorDetails last_error_details_;
+ base::Time last_token_fetch_time_;
+ std::vector<AccountMapping> last_account_mappings_;
+
+ std::unique_ptr<GCMClientImpl> gcm_client_;
+
+ // Injected to GCM client.
+ network::TestURLLoaderFactory test_url_loader_factory_;
+ base::test::ScopedFeatureList scoped_feature_list_;
+};
+
+GCMClientImplTest::GCMClientImplTest()
+ : last_event_(NONE), last_result_(GCMClient::UNKNOWN_ERROR) {}
+
+GCMClientImplTest::~GCMClientImplTest() {}
+
+void GCMClientImplTest::SetUp() {
+ testing::Test::SetUp();
+ ASSERT_TRUE(CreateUniqueTempDir());
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ StartGCMClient();
+ InitializeInvalidationFieldTrial();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken, std::string(),
+ std::map<std::string, std::string>()));
+}
+
+void GCMClientImplTest::TearDown() {
+ gcm_client_.reset();
+ PumpLoopUntilIdle();
+ testing::Test::TearDown();
+}
+
+void GCMClientImplTest::SetFeatureParams(const base::Feature& feature,
+ const base::FieldTrialParams& params) {
+ scoped_feature_list_.InitAndEnableFeatureWithParameters(feature, params);
+
+ base::FieldTrialParams actual_params;
+ EXPECT_TRUE(base::GetFieldTrialParamsByFeature(
+ features::kInvalidateTokenFeature, &actual_params));
+ EXPECT_EQ(params, actual_params);
+}
+
+void GCMClientImplTest::InitializeInvalidationFieldTrial() {
+ std::map<std::string, std::string> params;
+ params[features::kParamNameTokenInvalidationPeriodDays] =
+ std::to_string(kTestTokenInvalidationPeriod);
+ ASSERT_NO_FATAL_FAILURE(
+ SetFeatureParams(features::kInvalidateTokenFeature, std::move(params)));
+}
+
+void GCMClientImplTest::PumpLoopUntilIdle() {
+ task_environment_.RunUntilIdle();
+}
+
+bool GCMClientImplTest::CreateUniqueTempDir() {
+ return temp_directory_.CreateUniqueTempDir();
+}
+
+void GCMClientImplTest::BuildGCMClient(base::TimeDelta clock_step) {
+ gcm_client_ =
+ std::make_unique<GCMClientImpl>(base::WrapUnique<GCMInternalsBuilder>(
+ new FakeGCMInternalsBuilder(clock_step)));
+}
+
+void GCMClientImplTest::FailCheckin(net::HttpStatusCode response_code) {
+ std::map<std::string, std::string> settings;
+ CompleteCheckinImpl(0, 0, GServicesSettings::CalculateDigest(settings),
+ settings, response_code);
+}
+
+void GCMClientImplTest::CompleteCheckin(
+ uint64_t android_id,
+ uint64_t security_token,
+ const std::string& digest,
+ const std::map<std::string, std::string>& settings) {
+ CompleteCheckinImpl(android_id, security_token, digest, settings,
+ net::HTTP_OK);
+}
+
+void GCMClientImplTest::CompleteCheckinImpl(
+ uint64_t android_id,
+ uint64_t security_token,
+ const std::string& digest,
+ const std::map<std::string, std::string>& settings,
+ net::HttpStatusCode response_code) {
+ checkin_proto::AndroidCheckinResponse response;
+ response.set_stats_ok(true);
+ response.set_android_id(android_id);
+ response.set_security_token(security_token);
+
+ // For testing G-services settings.
+ if (!digest.empty()) {
+ response.set_digest(digest);
+ for (auto it = settings.begin(); it != settings.end(); ++it) {
+ checkin_proto::GservicesSetting* setting = response.add_setting();
+ setting->set_name(it->first);
+ setting->set_value(it->second);
+ }
+ response.set_settings_diff(false);
+ }
+
+ std::string response_string;
+ response.SerializeToString(&response_string);
+
+ EXPECT_TRUE(url_loader_factory()->SimulateResponseForPendingRequest(
+ gservices_settings().GetCheckinURL(),
+ network::URLLoaderCompletionStatus(net::OK),
+ network::CreateURLResponseHead(response_code), response_string));
+ // Give a chance for GCMStoreImpl::Backend to finish persisting data.
+ PumpLoopUntilIdle();
+}
+
+void GCMClientImplTest::CompleteRegistration(
+ const std::string& registration_id) {
+ std::string response(kRegistrationResponsePrefix);
+ response.append(registration_id);
+
+ EXPECT_TRUE(url_loader_factory()->SimulateResponseForPendingRequest(
+ GURL(kRegisterUrl), network::URLLoaderCompletionStatus(net::OK),
+ network::CreateURLResponseHead(net::HTTP_OK), response));
+
+ // Give a chance for GCMStoreImpl::Backend to finish persisting data.
+ PumpLoopUntilIdle();
+}
+
+void GCMClientImplTest::CompleteUnregistration(
+ const std::string& app_id) {
+ std::string response(kUnregistrationResponsePrefix);
+ response.append(app_id);
+
+ EXPECT_TRUE(url_loader_factory()->SimulateResponseForPendingRequest(
+ GURL(kRegisterUrl), network::URLLoaderCompletionStatus(net::OK),
+ network::CreateURLResponseHead(net::HTTP_OK), response));
+
+ // Give a chance for GCMStoreImpl::Backend to finish persisting data.
+ PumpLoopUntilIdle();
+}
+
+bool GCMClientImplTest::ExistsRegistration(const std::string& app_id) const {
+ return ExistsGCMRegistrationInMap(gcm_client_->registrations_, app_id);
+}
+
+void GCMClientImplTest::AddRegistration(
+ const std::string& app_id,
+ const std::vector<std::string>& sender_ids,
+ const std::string& registration_id) {
+ auto registration = base::MakeRefCounted<GCMRegistrationInfo>();
+ registration->app_id = app_id;
+ registration->sender_ids = sender_ids;
+ gcm_client_->registrations_.emplace(std::move(registration), registration_id);
+}
+
+void GCMClientImplTest::InitializeGCMClient() {
+ clock()->Advance(base::Milliseconds(1));
+
+ // Actual initialization.
+ GCMClient::ChromeBuildInfo chrome_build_info;
+ chrome_build_info.version = kChromeVersion;
+ chrome_build_info.product_category_for_subtypes = kProductCategoryForSubtypes;
+ gcm_client_->Initialize(
+ chrome_build_info, gcm_store_path(),
+ /*remove_account_mappings_with_email_key=*/true,
+ task_environment_.GetMainThreadTaskRunner(),
+ base::ThreadTaskRunnerHandle::Get(), base::DoNothing(),
+ base::MakeRefCounted<network::WeakWrapperSharedURLLoaderFactory>(
+ &test_url_loader_factory_),
+ network::TestNetworkConnectionTracker::GetInstance(),
+ base::WrapUnique<Encryptor>(new FakeEncryptor), this);
+}
+
+void GCMClientImplTest::StartGCMClient() {
+ // Start loading and check-in.
+ gcm_client_->Start(GCMClient::IMMEDIATE_START);
+
+ PumpLoopUntilIdle();
+}
+
+void GCMClientImplTest::Register(const std::string& app_id,
+ const std::vector<std::string>& senders) {
+ auto gcm_info = base::MakeRefCounted<GCMRegistrationInfo>();
+ gcm_info->app_id = app_id;
+ gcm_info->sender_ids = senders;
+ gcm_client()->Register(std::move(gcm_info));
+}
+
+void GCMClientImplTest::Unregister(const std::string& app_id) {
+ auto gcm_info = base::MakeRefCounted<GCMRegistrationInfo>();
+ gcm_info->app_id = app_id;
+ gcm_client()->Unregister(std::move(gcm_info));
+}
+
+void GCMClientImplTest::ReceiveMessageFromMCS(const MCSMessage& message) {
+ gcm_client_->recorder_.RecordConnectionInitiated(std::string());
+ gcm_client_->recorder_.RecordConnectionSuccess();
+ gcm_client_->OnMessageReceivedFromMCS(message);
+}
+
+void GCMClientImplTest::ReceiveOnMessageSentToMCS(
+ const std::string& app_id,
+ const std::string& message_id,
+ const MCSClient::MessageSendStatus status) {
+ gcm_client_->OnMessageSentToMCS(0LL, app_id, message_id, status);
+}
+
+void GCMClientImplTest::OnGCMReady(
+ const std::vector<AccountMapping>& account_mappings,
+ const base::Time& last_token_fetch_time) {
+ last_event_ = LOADING_COMPLETED;
+ last_account_mappings_ = account_mappings;
+ last_token_fetch_time_ = last_token_fetch_time;
+}
+
+void GCMClientImplTest::OnMessageReceived(const std::string& registration_id,
+ const IncomingMessage& message) {
+ last_event_ = MESSAGE_RECEIVED;
+ last_app_id_ = registration_id;
+ last_message_ = message;
+}
+
+void GCMClientImplTest::OnRegisterFinished(
+ scoped_refptr<RegistrationInfo> registration_info,
+ const std::string& registration_id,
+ GCMClient::Result result) {
+ last_event_ = REGISTRATION_COMPLETED;
+ last_app_id_ = registration_info->app_id;
+ last_registration_id_ = registration_id;
+ last_result_ = result;
+}
+
+void GCMClientImplTest::OnUnregisterFinished(
+ scoped_refptr<RegistrationInfo> registration_info,
+ GCMClient::Result result) {
+ last_event_ = UNREGISTRATION_COMPLETED;
+ last_app_id_ = registration_info->app_id;
+ last_result_ = result;
+}
+
+void GCMClientImplTest::OnMessagesDeleted(const std::string& app_id) {
+ last_event_ = MESSAGES_DELETED;
+ last_app_id_ = app_id;
+}
+
+void GCMClientImplTest::OnMessageSendError(
+ const std::string& app_id,
+ const gcm::GCMClient::SendErrorDetails& send_error_details) {
+ last_event_ = MESSAGE_SEND_ERROR;
+ last_app_id_ = app_id;
+ last_error_details_ = send_error_details;
+}
+
+void GCMClientImplTest::OnSendAcknowledged(const std::string& app_id,
+ const std::string& message_id) {
+ last_event_ = MESSAGE_SEND_ACK;
+ last_app_id_ = app_id;
+ last_message_id_ = message_id;
+}
+
+int64_t GCMClientImplTest::CurrentTime() {
+ return clock()->Now().ToInternalValue() / base::Time::kMicrosecondsPerSecond;
+}
+
+TEST_F(GCMClientImplTest, LoadingCompleted) {
+ EXPECT_EQ(LOADING_COMPLETED, last_event());
+ EXPECT_EQ(kDeviceAndroidId, mcs_client()->last_android_id());
+ EXPECT_EQ(kDeviceSecurityToken, mcs_client()->last_security_token());
+
+ // Checking freshly loaded CheckinInfo.
+ EXPECT_EQ(kDeviceAndroidId, device_checkin_info().android_id);
+ EXPECT_EQ(kDeviceSecurityToken, device_checkin_info().secret);
+ EXPECT_TRUE(device_checkin_info().last_checkin_accounts.empty());
+ EXPECT_TRUE(device_checkin_info().accounts_set);
+ EXPECT_TRUE(device_checkin_info().account_tokens.empty());
+}
+
+TEST_F(GCMClientImplTest, LoadingBusted) {
+ // Close the GCM store.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+
+ // Mess up the store.
+ EXPECT_TRUE(leveldb_chrome::CorruptClosedDBForTesting(gcm_store_path()));
+
+ // Restart GCM client. The store should be reset and the loading should
+ // complete successfully.
+ reset_last_event();
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ StartGCMClient();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId2, kDeviceSecurityToken2, std::string(),
+ std::map<std::string, std::string>()));
+
+ EXPECT_EQ(LOADING_COMPLETED, last_event());
+ EXPECT_EQ(kDeviceAndroidId2, mcs_client()->last_android_id());
+ EXPECT_EQ(kDeviceSecurityToken2, mcs_client()->last_security_token());
+}
+
+TEST_F(GCMClientImplTest, LoadingWithEmptyDirectory) {
+ // Close the GCM store.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+
+ // Make the store directory empty, to simulate a previous destroy store
+ // operation failing to delete the store directory.
+ ASSERT_TRUE(base::DeletePathRecursively(gcm_store_path()));
+ ASSERT_TRUE(base::CreateDirectory(gcm_store_path()));
+
+ base::HistogramTester histogram_tester;
+
+ // Restart GCM client. The store should be considered to not exist.
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ PumpLoopUntilIdle();
+ histogram_tester.ExpectUniqueSample("GCM.LoadStatus",
+ 13 /* STORE_DOES_NOT_EXIST */, 1);
+ // Since the store does not exist, the database should not have been opened.
+ histogram_tester.ExpectTotalCount("GCM.Database.Open", 0);
+ // Without a store, DELAYED_START loading should only reach INITIALIZED state.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // The store directory should still exist (and be empty). If not, then the
+ // DELAYED_START load has probably reset the store, rather than leaving that
+ // to the next IMMEDIATE_START load as expected.
+ ASSERT_TRUE(base::DirectoryExists(gcm_store_path()));
+ ASSERT_FALSE(
+ base::PathExists(gcm_store_path().Append(FILE_PATH_LITERAL("CURRENT"))));
+
+ // IMMEDIATE_START loading should successfully create a new store despite the
+ // empty directory.
+ reset_last_event();
+ StartGCMClient();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId2, kDeviceSecurityToken2, std::string(),
+ std::map<std::string, std::string>()));
+ EXPECT_EQ(LOADING_COMPLETED, last_event());
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+ EXPECT_EQ(kDeviceAndroidId2, mcs_client()->last_android_id());
+ EXPECT_EQ(kDeviceSecurityToken2, mcs_client()->last_security_token());
+}
+
+TEST_F(GCMClientImplTest, DestroyStoreWhenNotNeeded) {
+ // Close the GCM store.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+
+ // Restart GCM client. The store is loaded successfully.
+ reset_last_event();
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(GCMClientImpl::LOADED, gcm_client_state());
+ EXPECT_TRUE(device_checkin_info().android_id);
+ EXPECT_TRUE(device_checkin_info().secret);
+
+ // Fast forward the clock to trigger the store destroying logic.
+ FastForwardBy(base::Milliseconds(300000));
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+ EXPECT_FALSE(device_checkin_info().android_id);
+ EXPECT_FALSE(device_checkin_info().secret);
+}
+
+TEST_F(GCMClientImplTest, SerializeAndDeserialize) {
+ std::vector<std::string> senders{"sender"};
+ auto gcm_info = base::MakeRefCounted<GCMRegistrationInfo>();
+ gcm_info->app_id = kExtensionAppId;
+ gcm_info->sender_ids = senders;
+ gcm_info->last_validated = clock()->Now();
+
+ auto gcm_info_deserialized = base::MakeRefCounted<GCMRegistrationInfo>();
+ std::string gcm_registration_id_deserialized;
+ {
+ std::string serialized_key = gcm_info->GetSerializedKey();
+ std::string serialized_value =
+ gcm_info->GetSerializedValue(kRegistrationId);
+
+ ASSERT_TRUE(gcm_info_deserialized->Deserialize(
+ serialized_key, serialized_value, &gcm_registration_id_deserialized));
+ }
+
+ EXPECT_EQ(gcm_info->app_id, gcm_info_deserialized->app_id);
+ EXPECT_EQ(gcm_info->sender_ids, gcm_info_deserialized->sender_ids);
+ EXPECT_EQ(gcm_info->last_validated, gcm_info_deserialized->last_validated);
+ EXPECT_EQ(kRegistrationId, gcm_registration_id_deserialized);
+
+ auto instance_id_info = base::MakeRefCounted<InstanceIDTokenInfo>();
+ instance_id_info->app_id = kExtensionAppId;
+ instance_id_info->last_validated = clock()->Now();
+ instance_id_info->authorized_entity = "different_sender";
+ instance_id_info->scope = "scope";
+
+ auto instance_id_info_deserialized =
+ base::MakeRefCounted<InstanceIDTokenInfo>();
+ std::string instance_id_registration_id_deserialized;
+ {
+ std::string serialized_key = instance_id_info->GetSerializedKey();
+ std::string serialized_value =
+ instance_id_info->GetSerializedValue(kRegistrationId);
+
+ ASSERT_TRUE(instance_id_info_deserialized->Deserialize(
+ serialized_key, serialized_value,
+ &instance_id_registration_id_deserialized));
+ }
+
+ EXPECT_EQ(instance_id_info->app_id, instance_id_info_deserialized->app_id);
+ EXPECT_EQ(instance_id_info->last_validated,
+ instance_id_info_deserialized->last_validated);
+ EXPECT_EQ(instance_id_info->authorized_entity,
+ instance_id_info_deserialized->authorized_entity);
+ EXPECT_EQ(instance_id_info->scope, instance_id_info_deserialized->scope);
+ EXPECT_EQ(kRegistrationId, instance_id_registration_id_deserialized);
+}
+
+TEST_F(GCMClientImplTest, RegisterApp) {
+ EXPECT_FALSE(ExistsRegistration(kExtensionAppId));
+
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+}
+
+TEST_F(GCMClientImplTest, RegisterAppFromCache) {
+ EXPECT_FALSE(ExistsRegistration(kExtensionAppId));
+
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+
+ // Recreate GCMClient in order to load from the persistent store.
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ StartGCMClient();
+
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+}
+
+TEST_F(GCMClientImplTest, RegisterPreviousSenderAgain) {
+ EXPECT_FALSE(ExistsRegistration(kExtensionAppId));
+
+ // Register a sender.
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+
+ reset_last_event();
+
+ // Register a different sender. Different registration ID from previous one
+ // should be returned.
+ std::vector<std::string> senders2;
+ senders2.push_back("sender2");
+ Register(kExtensionAppId, senders2);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id2"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id2", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+
+ reset_last_event();
+
+ // Register the 1st sender again. Different registration ID from previous one
+ // should be returned.
+ std::vector<std::string> senders3;
+ senders3.push_back("sender");
+ Register(kExtensionAppId, senders3);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+}
+
+TEST_F(GCMClientImplTest, DISABLED_RegisterAgainWhenTokenIsFresh) {
+ // Register a sender.
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+
+ reset_last_event();
+
+ // Advance time by (kTestTokenInvalidationPeriod)/2
+ clock()->Advance(base::Days(kTestTokenInvalidationPeriod / 2));
+
+ // Register the same sender again. The same registration ID as the
+ // previous one should be returned, and we should *not* send a
+ // registration request to the GCM server.
+ Register(kExtensionAppId, senders);
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+}
+
+TEST_F(GCMClientImplTest, RegisterAgainWhenTokenIsStale) {
+ // Register a sender.
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+
+ reset_last_event();
+
+ // Advance time by kTestTokenInvalidationPeriod
+ clock()->Advance(base::Days(kTestTokenInvalidationPeriod));
+
+ // Register the same sender again. Different registration ID from the
+ // previous one should be returned.
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id2"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("reg_id2", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+}
+
+TEST_F(GCMClientImplTest, UnregisterApp) {
+ EXPECT_FALSE(ExistsRegistration(kExtensionAppId));
+
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+ EXPECT_TRUE(ExistsRegistration(kExtensionAppId));
+
+ Unregister(kExtensionAppId);
+ ASSERT_NO_FATAL_FAILURE(CompleteUnregistration(kExtensionAppId));
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_FALSE(ExistsRegistration(kExtensionAppId));
+}
+
+// Tests that stopping the GCMClient also deletes pending registration requests.
+// This is tested by checking that url fetcher contained in the request was
+// deleted.
+TEST_F(GCMClientImplTest, DeletePendingRequestsWhenStopping) {
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+ EXPECT_EQ(0, url_loader_factory()->NumPending());
+}
+
+TEST_F(GCMClientImplTest, DispatchDownstreamMessage) {
+ // Register to receive messages from kSender and kSender2 only.
+ std::vector<std::string> senders;
+ senders.push_back(kSender);
+ senders.push_back(kSender2);
+ AddRegistration(kExtensionAppId, senders, "reg_id");
+
+ std::map<std::string, std::string> expected_data;
+ expected_data["message_type"] = "gcm";
+ expected_data["key"] = "value";
+ expected_data["key2"] = "value2";
+
+ // Message for kSender will be received.
+ MCSMessage message(BuildDownstreamMessage(
+ kSender, kExtensionAppId, std::string() /* subtype */, expected_data,
+ std::string() /* raw_data */));
+ EXPECT_TRUE(message.IsValid());
+ ReceiveMessageFromMCS(message);
+
+ expected_data.erase(expected_data.find("message_type"));
+ EXPECT_EQ(MESSAGE_RECEIVED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(expected_data.size(), last_message().data.size());
+ EXPECT_EQ(expected_data, last_message().data);
+ EXPECT_EQ(kSender, last_message().sender_id);
+
+ reset_last_event();
+
+ // Message for kSender2 will be received.
+ MCSMessage message2(BuildDownstreamMessage(
+ kSender2, kExtensionAppId, std::string() /* subtype */, expected_data,
+ std::string() /* raw_data */));
+ EXPECT_TRUE(message2.IsValid());
+ ReceiveMessageFromMCS(message2);
+
+ EXPECT_EQ(MESSAGE_RECEIVED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(expected_data.size(), last_message().data.size());
+ EXPECT_EQ(expected_data, last_message().data);
+ EXPECT_EQ(kSender2, last_message().sender_id);
+}
+
+TEST_F(GCMClientImplTest, DispatchDownstreamMessageRawData) {
+ std::vector<std::string> senders(1, kSender);
+ AddRegistration(kExtensionAppId, senders, "reg_id");
+
+ std::map<std::string, std::string> expected_data;
+
+ MCSMessage message(BuildDownstreamMessage(kSender, kExtensionAppId,
+ std::string() /* subtype */,
+ expected_data, kRawData));
+ EXPECT_TRUE(message.IsValid());
+ ReceiveMessageFromMCS(message);
+
+ EXPECT_EQ(MESSAGE_RECEIVED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(expected_data.size(), last_message().data.size());
+ EXPECT_EQ(kSender, last_message().sender_id);
+ EXPECT_EQ(kRawData, last_message().raw_data);
+}
+
+TEST_F(GCMClientImplTest, DISABLED_DispatchDownstreamMessageSendError) {
+ std::map<std::string, std::string> expected_data = {
+ {"message_type", "send_error"}, {"error_details", "some details"}};
+
+ MCSMessage message(BuildDownstreamMessage(
+ kSender, kExtensionAppId, std::string() /* subtype */, expected_data,
+ std::string() /* raw_data */));
+ EXPECT_TRUE(message.IsValid());
+ ReceiveMessageFromMCS(message);
+
+ EXPECT_EQ(MESSAGE_SEND_ERROR, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(kMessageId, last_error_details().message_id);
+ EXPECT_EQ(1UL, last_error_details().additional_data.size());
+ auto iter = last_error_details().additional_data.find("error_details");
+ EXPECT_TRUE(iter != last_error_details().additional_data.end());
+ EXPECT_EQ("some details", iter->second);
+}
+
+TEST_F(GCMClientImplTest, DispatchDownstreamMessgaesDeleted) {
+ std::map<std::string, std::string> expected_data;
+ expected_data["message_type"] = "deleted_messages";
+ MCSMessage message(BuildDownstreamMessage(
+ kSender, kExtensionAppId, std::string() /* subtype */, expected_data,
+ std::string() /* raw_data */));
+ EXPECT_TRUE(message.IsValid());
+ ReceiveMessageFromMCS(message);
+
+ EXPECT_EQ(MESSAGES_DELETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+}
+
+TEST_F(GCMClientImplTest, SendMessage) {
+ OutgoingMessage message;
+ message.id = "007";
+ message.time_to_live = 500;
+ message.data["key"] = "value";
+ gcm_client()->Send(kExtensionAppId, kSender, message);
+
+ EXPECT_EQ(kDataMessageStanzaTag, mcs_client()->last_message_tag());
+ EXPECT_EQ(kExtensionAppId,
+ mcs_client()->last_data_message_stanza().category());
+ EXPECT_EQ(kSender, mcs_client()->last_data_message_stanza().to());
+ EXPECT_EQ(500, mcs_client()->last_data_message_stanza().ttl());
+ EXPECT_EQ(CurrentTime(), mcs_client()->last_data_message_stanza().sent());
+ EXPECT_EQ("007", mcs_client()->last_data_message_stanza().id());
+ EXPECT_EQ("gcm@chrome.com", mcs_client()->last_data_message_stanza().from());
+ EXPECT_EQ(kSender, mcs_client()->last_data_message_stanza().to());
+ EXPECT_EQ("key", mcs_client()->last_data_message_stanza().app_data(0).key());
+ EXPECT_EQ("value",
+ mcs_client()->last_data_message_stanza().app_data(0).value());
+}
+
+TEST_F(GCMClientImplTest, SendMessageAcknowledged) {
+ ReceiveOnMessageSentToMCS(kExtensionAppId, "007", MCSClient::SENT);
+ EXPECT_EQ(MESSAGE_SEND_ACK, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("007", last_message_id());
+}
+
+class GCMClientImplCheckinTest : public GCMClientImplTest {
+ public:
+ GCMClientImplCheckinTest();
+ ~GCMClientImplCheckinTest() override;
+
+ void SetUp() override;
+};
+
+GCMClientImplCheckinTest::GCMClientImplCheckinTest() {
+}
+
+GCMClientImplCheckinTest::~GCMClientImplCheckinTest() {
+}
+
+void GCMClientImplCheckinTest::SetUp() {
+ testing::Test::SetUp();
+ // Creating unique temp directory that will be used by GCMStore shared between
+ // GCM Client and G-services settings.
+ ASSERT_TRUE(CreateUniqueTempDir());
+ // Time will be advancing one hour every time it is checked.
+ BuildGCMClient(base::Seconds(kSettingsCheckinInterval));
+ InitializeGCMClient();
+ StartGCMClient();
+}
+
+TEST_F(GCMClientImplCheckinTest, GServicesSettingsAfterInitialCheckin) {
+ std::map<std::string, std::string> settings;
+ settings["checkin_interval"] = base::NumberToString(kSettingsCheckinInterval);
+ settings["checkin_url"] = "http://alternative.url/checkin";
+ settings["gcm_hostname"] = "alternative.gcm.host";
+ settings["gcm_secure_port"] = "7777";
+ settings["gcm_registration_url"] = "http://alternative.url/registration";
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+ EXPECT_EQ(base::Seconds(kSettingsCheckinInterval),
+ gservices_settings().GetCheckinInterval());
+ EXPECT_EQ(GURL("http://alternative.url/checkin"),
+ gservices_settings().GetCheckinURL());
+ EXPECT_EQ(GURL("http://alternative.url/registration"),
+ gservices_settings().GetRegistrationURL());
+ EXPECT_EQ(GURL("https://alternative.gcm.host:7777"),
+ gservices_settings().GetMCSMainEndpoint());
+ EXPECT_EQ(GURL("https://alternative.gcm.host:443"),
+ gservices_settings().GetMCSFallbackEndpoint());
+}
+
+// This test only checks that periodic checkin happens.
+TEST_F(GCMClientImplCheckinTest, PeriodicCheckin) {
+ std::map<std::string, std::string> settings;
+ settings["checkin_interval"] = base::NumberToString(kSettingsCheckinInterval);
+ settings["checkin_url"] = "http://alternative.url/checkin";
+ settings["gcm_hostname"] = "alternative.gcm.host";
+ settings["gcm_secure_port"] = "7777";
+ settings["gcm_registration_url"] = "http://alternative.url/registration";
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ EXPECT_EQ(2, clock()->call_count());
+
+ PumpLoopUntilIdle();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+}
+
+TEST_F(GCMClientImplCheckinTest, LoadGSettingsFromStore) {
+ std::map<std::string, std::string> settings;
+ settings["checkin_interval"] = base::NumberToString(kSettingsCheckinInterval);
+ settings["checkin_url"] = "http://alternative.url/checkin";
+ settings["gcm_hostname"] = "alternative.gcm.host";
+ settings["gcm_secure_port"] = "7777";
+ settings["gcm_registration_url"] = "http://alternative.url/registration";
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ StartGCMClient();
+
+ EXPECT_EQ(base::Seconds(kSettingsCheckinInterval),
+ gservices_settings().GetCheckinInterval());
+ EXPECT_EQ(GURL("http://alternative.url/checkin"),
+ gservices_settings().GetCheckinURL());
+ EXPECT_EQ(GURL("http://alternative.url/registration"),
+ gservices_settings().GetRegistrationURL());
+ EXPECT_EQ(GURL("https://alternative.gcm.host:7777"),
+ gservices_settings().GetMCSMainEndpoint());
+ EXPECT_EQ(GURL("https://alternative.gcm.host:443"),
+ gservices_settings().GetMCSFallbackEndpoint());
+}
+
+// This test only checks that periodic checkin happens.
+TEST_F(GCMClientImplCheckinTest, CheckinWithAccounts) {
+ std::map<std::string, std::string> settings;
+ settings["checkin_interval"] = base::NumberToString(kSettingsCheckinInterval);
+ settings["checkin_url"] = "http://alternative.url/checkin";
+ settings["gcm_hostname"] = "alternative.gcm.host";
+ settings["gcm_secure_port"] = "7777";
+ settings["gcm_registration_url"] = "http://alternative.url/registration";
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ std::vector<GCMClient::AccountTokenInfo> account_tokens;
+ account_tokens.push_back(MakeAccountToken("test_user1@gmail.com", "token1"));
+ account_tokens.push_back(MakeAccountToken("test_user2@gmail.com", "token2"));
+ gcm_client()->SetAccountTokens(account_tokens);
+
+ EXPECT_TRUE(device_checkin_info().last_checkin_accounts.empty());
+ EXPECT_TRUE(device_checkin_info().accounts_set);
+ EXPECT_EQ(MakeEmailToTokenMap(account_tokens),
+ device_checkin_info().account_tokens);
+
+ PumpLoopUntilIdle();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ std::set<std::string> accounts;
+ accounts.insert("test_user1@gmail.com");
+ accounts.insert("test_user2@gmail.com");
+ EXPECT_EQ(accounts, device_checkin_info().last_checkin_accounts);
+ EXPECT_TRUE(device_checkin_info().accounts_set);
+ EXPECT_EQ(MakeEmailToTokenMap(account_tokens),
+ device_checkin_info().account_tokens);
+}
+
+// This test only checks that periodic checkin happens.
+TEST_F(GCMClientImplCheckinTest, CheckinWhenAccountRemoved) {
+ std::map<std::string, std::string> settings;
+ settings["checkin_interval"] = base::NumberToString(kSettingsCheckinInterval);
+ settings["checkin_url"] = "http://alternative.url/checkin";
+ settings["gcm_hostname"] = "alternative.gcm.host";
+ settings["gcm_secure_port"] = "7777";
+ settings["gcm_registration_url"] = "http://alternative.url/registration";
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ std::vector<GCMClient::AccountTokenInfo> account_tokens;
+ account_tokens.push_back(MakeAccountToken("test_user1@gmail.com", "token1"));
+ account_tokens.push_back(MakeAccountToken("test_user2@gmail.com", "token2"));
+ gcm_client()->SetAccountTokens(account_tokens);
+ PumpLoopUntilIdle();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ EXPECT_EQ(2UL, device_checkin_info().last_checkin_accounts.size());
+ EXPECT_TRUE(device_checkin_info().accounts_set);
+ EXPECT_EQ(MakeEmailToTokenMap(account_tokens),
+ device_checkin_info().account_tokens);
+
+ account_tokens.erase(account_tokens.begin() + 1);
+ gcm_client()->SetAccountTokens(account_tokens);
+
+ PumpLoopUntilIdle();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ std::set<std::string> accounts;
+ accounts.insert("test_user1@gmail.com");
+ EXPECT_EQ(accounts, device_checkin_info().last_checkin_accounts);
+ EXPECT_TRUE(device_checkin_info().accounts_set);
+ EXPECT_EQ(MakeEmailToTokenMap(account_tokens),
+ device_checkin_info().account_tokens);
+}
+
+// This test only checks that periodic checkin happens.
+TEST_F(GCMClientImplCheckinTest, CheckinWhenAccountReplaced) {
+ std::map<std::string, std::string> settings;
+ settings["checkin_interval"] = base::NumberToString(kSettingsCheckinInterval);
+ settings["checkin_url"] = "http://alternative.url/checkin";
+ settings["gcm_hostname"] = "alternative.gcm.host";
+ settings["gcm_secure_port"] = "7777";
+ settings["gcm_registration_url"] = "http://alternative.url/registration";
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ std::vector<GCMClient::AccountTokenInfo> account_tokens;
+ account_tokens.push_back(MakeAccountToken("test_user1@gmail.com", "token1"));
+ gcm_client()->SetAccountTokens(account_tokens);
+
+ PumpLoopUntilIdle();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ std::set<std::string> accounts;
+ accounts.insert("test_user1@gmail.com");
+ EXPECT_EQ(accounts, device_checkin_info().last_checkin_accounts);
+
+ // This should trigger another checkin, because the list of accounts is
+ // different.
+ account_tokens.clear();
+ account_tokens.push_back(MakeAccountToken("test_user2@gmail.com", "token2"));
+ gcm_client()->SetAccountTokens(account_tokens);
+
+ PumpLoopUntilIdle();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ accounts.clear();
+ accounts.insert("test_user2@gmail.com");
+ EXPECT_EQ(accounts, device_checkin_info().last_checkin_accounts);
+ EXPECT_TRUE(device_checkin_info().accounts_set);
+ EXPECT_EQ(MakeEmailToTokenMap(account_tokens),
+ device_checkin_info().account_tokens);
+}
+
+TEST_F(GCMClientImplCheckinTest, ResetStoreWhenCheckinRejected) {
+ base::HistogramTester histogram_tester;
+ std::map<std::string, std::string> settings;
+ ASSERT_NO_FATAL_FAILURE(FailCheckin(net::HTTP_UNAUTHORIZED));
+ PumpLoopUntilIdle();
+
+ // Store should have been destroyed. Restart client and verify the initial
+ // checkin response is persisted.
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ StartGCMClient();
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId2, kDeviceSecurityToken2,
+ GServicesSettings::CalculateDigest(settings), settings));
+
+ EXPECT_EQ(LOADING_COMPLETED, last_event());
+ EXPECT_EQ(kDeviceAndroidId2, mcs_client()->last_android_id());
+ EXPECT_EQ(kDeviceSecurityToken2, mcs_client()->last_security_token());
+}
+
+class GCMClientImplStartAndStopTest : public GCMClientImplTest {
+ public:
+ GCMClientImplStartAndStopTest();
+ ~GCMClientImplStartAndStopTest() override;
+
+ void SetUp() override;
+
+ void DefaultCompleteCheckin();
+};
+
+GCMClientImplStartAndStopTest::GCMClientImplStartAndStopTest() {
+}
+
+GCMClientImplStartAndStopTest::~GCMClientImplStartAndStopTest() {
+}
+
+void GCMClientImplStartAndStopTest::SetUp() {
+ testing::Test::SetUp();
+ ASSERT_TRUE(CreateUniqueTempDir());
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+}
+
+void GCMClientImplStartAndStopTest::DefaultCompleteCheckin() {
+ ASSERT_NO_FATAL_FAILURE(
+ CompleteCheckin(kDeviceAndroidId, kDeviceSecurityToken, std::string(),
+ std::map<std::string, std::string>()));
+ PumpLoopUntilIdle();
+}
+
+TEST_F(GCMClientImplStartAndStopTest, DISABLED_StartStopAndRestart) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Delay start the GCM.
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Stop the GCM.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Restart the GCM without delay.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIAL_DEVICE_CHECKIN, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, DelayedStartAndStopImmediately) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Delay start the GCM and then stop it immediately.
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, ImmediateStartAndStopImmediately) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Start the GCM and then stop it immediately.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, DelayedStartStopAndRestart) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Delay start the GCM and then stop and restart it immediately.
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ gcm_client()->Stop();
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, ImmediateStartStopAndRestart) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Start the GCM and then stop and restart it immediately.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ gcm_client()->Stop();
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIAL_DEVICE_CHECKIN, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, ImmediateStartAndThenImmediateStart) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Start the GCM immediately and complete the checkin.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIAL_DEVICE_CHECKIN, gcm_client_state());
+ ASSERT_NO_FATAL_FAILURE(DefaultCompleteCheckin());
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+
+ // Stop the GCM.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Start the GCM immediately. GCMClientImpl should be in READY state.
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, ImmediateStartAndThenDelayStart) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Start the GCM immediately and complete the checkin.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIAL_DEVICE_CHECKIN, gcm_client_state());
+ ASSERT_NO_FATAL_FAILURE(DefaultCompleteCheckin());
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+
+ // Stop the GCM.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Delay start the GCM. GCMClientImpl should be in LOADED state.
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::LOADED, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, DISABLED_DelayedStartRace) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Delay start the GCM, then start it immediately while it's still loading.
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIAL_DEVICE_CHECKIN, gcm_client_state());
+ ASSERT_NO_FATAL_FAILURE(DefaultCompleteCheckin());
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+}
+
+TEST_F(GCMClientImplStartAndStopTest, DelayedStart) {
+ // GCMClientImpl should be in INITIALIZED state at first.
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Delay start the GCM. The store will not be loaded and GCMClientImpl should
+ // still be in INITIALIZED state.
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Start the GCM immediately and complete the checkin.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIAL_DEVICE_CHECKIN, gcm_client_state());
+ ASSERT_NO_FATAL_FAILURE(DefaultCompleteCheckin());
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+
+ // Registration.
+ std::vector<std::string> senders;
+ senders.push_back("sender");
+ Register(kExtensionAppId, senders);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("reg_id"));
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+
+ // Stop the GCM.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::INITIALIZED, gcm_client_state());
+
+ // Delay start the GCM. GCM is indeed started without delay because the
+ // registration record has been found.
+ BuildGCMClient(base::TimeDelta());
+ InitializeGCMClient();
+ gcm_client()->Start(GCMClient::DELAYED_START);
+ PumpLoopUntilIdle();
+ EXPECT_EQ(GCMClientImpl::READY, gcm_client_state());
+}
+
+// Test for known account mappings and last token fetching time being passed
+// to OnGCMReady.
+TEST_F(GCMClientImplStartAndStopTest, OnGCMReadyAccountsAndTokenFetchingTime) {
+ // Start the GCM and wait until it is ready.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+ ASSERT_NO_FATAL_FAILURE(DefaultCompleteCheckin());
+
+ base::Time expected_time = base::Time::Now();
+ gcm_client()->SetLastTokenFetchTime(expected_time);
+ AccountMapping expected_mapping;
+ expected_mapping.account_id = CoreAccountId("accId");
+ expected_mapping.email = "email@gmail.com";
+ expected_mapping.status = AccountMapping::MAPPED;
+ expected_mapping.status_change_timestamp = expected_time;
+ gcm_client()->UpdateAccountMapping(expected_mapping);
+ PumpLoopUntilIdle();
+
+ // Stop the GCM.
+ gcm_client()->Stop();
+ PumpLoopUntilIdle();
+
+ // Restart the GCM.
+ gcm_client()->Start(GCMClient::IMMEDIATE_START);
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(LOADING_COMPLETED, last_event());
+ EXPECT_EQ(expected_time, last_token_fetch_time());
+ ASSERT_EQ(1UL, last_account_mappings().size());
+ const AccountMapping& actual_mapping = last_account_mappings()[0];
+ EXPECT_EQ(expected_mapping.account_id, actual_mapping.account_id);
+ EXPECT_EQ(expected_mapping.email, actual_mapping.email);
+ EXPECT_EQ(expected_mapping.status, actual_mapping.status);
+ EXPECT_EQ(expected_mapping.status_change_timestamp,
+ actual_mapping.status_change_timestamp);
+}
+
+
+class GCMClientInstanceIDTest : public GCMClientImplTest {
+ public:
+ GCMClientInstanceIDTest();
+ ~GCMClientInstanceIDTest() override;
+
+ void AddInstanceID(const std::string& app_id,
+ const std::string& instance_id);
+ void RemoveInstanceID(const std::string& app_id);
+ void GetToken(const std::string& app_id,
+ const std::string& authorized_entity,
+ const std::string& scope);
+ void DeleteToken(const std::string& app_id,
+ const std::string& authorized_entity,
+ const std::string& scope);
+ void CompleteDeleteToken();
+ bool ExistsToken(const std::string& app_id,
+ const std::string& authorized_entity,
+ const std::string& scope) const;
+};
+
+GCMClientInstanceIDTest::GCMClientInstanceIDTest() {
+}
+
+GCMClientInstanceIDTest::~GCMClientInstanceIDTest() {
+}
+
+void GCMClientInstanceIDTest::AddInstanceID(const std::string& app_id,
+ const std::string& instance_id) {
+ gcm_client()->AddInstanceIDData(app_id, instance_id, "123");
+}
+
+void GCMClientInstanceIDTest::RemoveInstanceID(const std::string& app_id) {
+ gcm_client()->RemoveInstanceIDData(app_id);
+}
+
+void GCMClientInstanceIDTest::GetToken(const std::string& app_id,
+ const std::string& authorized_entity,
+ const std::string& scope) {
+ auto instance_id_info = base::MakeRefCounted<InstanceIDTokenInfo>();
+ instance_id_info->app_id = app_id;
+ instance_id_info->authorized_entity = authorized_entity;
+ instance_id_info->scope = scope;
+ gcm_client()->Register(std::move(instance_id_info));
+}
+
+void GCMClientInstanceIDTest::DeleteToken(const std::string& app_id,
+ const std::string& authorized_entity,
+ const std::string& scope) {
+ auto instance_id_info = base::MakeRefCounted<InstanceIDTokenInfo>();
+ instance_id_info->app_id = app_id;
+ instance_id_info->authorized_entity = authorized_entity;
+ instance_id_info->scope = scope;
+ gcm_client()->Unregister(std::move(instance_id_info));
+}
+
+void GCMClientInstanceIDTest::CompleteDeleteToken() {
+ std::string response(kDeleteTokenResponse);
+
+ EXPECT_TRUE(url_loader_factory()->SimulateResponseForPendingRequest(
+ GURL(kRegisterUrl), network::URLLoaderCompletionStatus(net::OK),
+ network::CreateURLResponseHead(net::HTTP_OK), response));
+
+ // Give a chance for GCMStoreImpl::Backend to finish persisting data.
+ PumpLoopUntilIdle();
+}
+
+bool GCMClientInstanceIDTest::ExistsToken(const std::string& app_id,
+ const std::string& authorized_entity,
+ const std::string& scope) const {
+ auto instance_id_info = base::MakeRefCounted<InstanceIDTokenInfo>();
+ instance_id_info->app_id = app_id;
+ instance_id_info->authorized_entity = authorized_entity;
+ instance_id_info->scope = scope;
+ return gcm_client()->registrations_.count(std::move(instance_id_info)) > 0;
+}
+
+TEST_F(GCMClientInstanceIDTest, GetToken) {
+ AddInstanceID(kExtensionAppId, kInstanceID);
+
+ // Get a token.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender, kScope));
+ GetToken(kExtensionAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token1"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("token1", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender, kScope));
+
+ // Get another token.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender2, kScope));
+ GetToken(kExtensionAppId, kSender2, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token2"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("token2", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender2, kScope));
+ // The 1st token still exists.
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender, kScope));
+}
+
+// Most tests in this file use kExtensionAppId which is special-cased by
+// InstanceIDUsesSubtypeForAppId in gcm_client_impl.cc. This test uses
+// kSubtypeAppId to cover the alternate case.
+TEST_F(GCMClientInstanceIDTest, GetTokenWithSubtype) {
+ ASSERT_EQ(GCMClientImpl::READY, gcm_client_state());
+
+ AddInstanceID(kSubtypeAppId, kInstanceID);
+
+ EXPECT_FALSE(ExistsToken(kSubtypeAppId, kSender, kScope));
+
+ // Get a token.
+ GetToken(kSubtypeAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token1"));
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kSubtypeAppId, last_app_id());
+ EXPECT_EQ("token1", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsToken(kSubtypeAppId, kSender, kScope));
+
+ // Delete the token.
+ DeleteToken(kSubtypeAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteDeleteToken());
+ EXPECT_FALSE(ExistsToken(kSubtypeAppId, kSender, kScope));
+}
+
+TEST_F(GCMClientInstanceIDTest, DeleteInvalidToken) {
+ AddInstanceID(kExtensionAppId, kInstanceID);
+
+ // Delete an invalid token.
+ DeleteToken(kExtensionAppId, "Foo@#$", kScope);
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::INVALID_PARAMETER, last_result());
+
+ reset_last_event();
+
+ // Delete a non-existing token.
+ DeleteToken(kExtensionAppId, kSender, kScope);
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::INVALID_PARAMETER, last_result());
+}
+
+TEST_F(GCMClientInstanceIDTest, DeleteSingleToken) {
+ AddInstanceID(kExtensionAppId, kInstanceID);
+
+ // Get a token.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender, kScope));
+ GetToken(kExtensionAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token1"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("token1", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender, kScope));
+
+ reset_last_event();
+
+ // Get another token.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender2, kScope));
+ GetToken(kExtensionAppId, kSender2, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token2"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("token2", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender2, kScope));
+ // The 1st token still exists.
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender, kScope));
+
+ reset_last_event();
+
+ // Delete the 2nd token.
+ DeleteToken(kExtensionAppId, kSender2, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteDeleteToken());
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ // The 2nd token is gone while the 1st token still exists.
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender, kScope));
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender2, kScope));
+
+ reset_last_event();
+
+ // Delete the 1st token.
+ DeleteToken(kExtensionAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteDeleteToken());
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ // Both tokens are gone now.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender, kScope));
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender, kScope));
+
+ reset_last_event();
+
+ // Trying to delete the token again will get an error.
+ DeleteToken(kExtensionAppId, kSender, kScope);
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::INVALID_PARAMETER, last_result());
+}
+
+TEST_F(GCMClientInstanceIDTest, DISABLED_DeleteAllTokens) {
+ AddInstanceID(kExtensionAppId, kInstanceID);
+
+ // Get a token.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender, kScope));
+ GetToken(kExtensionAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token1"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("token1", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender, kScope));
+
+ reset_last_event();
+
+ // Get another token.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender2, kScope));
+ GetToken(kExtensionAppId, kSender2, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token2"));
+
+ EXPECT_EQ(REGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ("token2", last_registration_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender2, kScope));
+ // The 1st token still exists.
+ EXPECT_TRUE(ExistsToken(kExtensionAppId, kSender, kScope));
+
+ reset_last_event();
+
+ // Delete all tokens.
+ DeleteToken(kExtensionAppId, "*", "*");
+ ASSERT_NO_FATAL_FAILURE(CompleteDeleteToken());
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+ // All tokens are gone now.
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender, kScope));
+ EXPECT_FALSE(ExistsToken(kExtensionAppId, kSender, kScope));
+}
+
+TEST_F(GCMClientInstanceIDTest, DeleteAllTokensBeforeGetAnyToken) {
+ AddInstanceID(kExtensionAppId, kInstanceID);
+
+ // Delete all tokens without getting a token first.
+ DeleteToken(kExtensionAppId, "*", "*");
+ // No need to call CompleteDeleteToken since unregistration request should
+ // not be triggered.
+ PumpLoopUntilIdle();
+
+ EXPECT_EQ(UNREGISTRATION_COMPLETED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(GCMClient::SUCCESS, last_result());
+}
+
+TEST_F(GCMClientInstanceIDTest, DispatchDownstreamMessageWithoutSubtype) {
+ AddInstanceID(kExtensionAppId, kInstanceID);
+ GetToken(kExtensionAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token1"));
+
+ std::map<std::string, std::string> expected_data;
+
+ MCSMessage message(BuildDownstreamMessage(
+ kSender, kExtensionAppId, std::string() /* subtype */, expected_data,
+ std::string() /* raw_data */));
+ EXPECT_TRUE(message.IsValid());
+ ReceiveMessageFromMCS(message);
+
+ EXPECT_EQ(MESSAGE_RECEIVED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(expected_data.size(), last_message().data.size());
+ EXPECT_EQ(expected_data, last_message().data);
+ EXPECT_EQ(kSender, last_message().sender_id);
+}
+
+TEST_F(GCMClientInstanceIDTest, DispatchDownstreamMessageWithSubtype) {
+ AddInstanceID(kSubtypeAppId, kInstanceID);
+ GetToken(kSubtypeAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token1"));
+
+ std::map<std::string, std::string> expected_data;
+
+ MCSMessage message(BuildDownstreamMessage(
+ kSender, kProductCategoryForSubtypes, kSubtypeAppId /* subtype */,
+ expected_data, std::string() /* raw_data */));
+ EXPECT_TRUE(message.IsValid());
+ ReceiveMessageFromMCS(message);
+
+ EXPECT_EQ(MESSAGE_RECEIVED, last_event());
+ EXPECT_EQ(kSubtypeAppId, last_app_id());
+ EXPECT_EQ(expected_data.size(), last_message().data.size());
+ EXPECT_EQ(expected_data, last_message().data);
+ EXPECT_EQ(kSender, last_message().sender_id);
+}
+
+TEST_F(GCMClientInstanceIDTest, DispatchDownstreamMessageWithFakeSubtype) {
+ // Victim non-extension registration.
+ AddInstanceID(kSubtypeAppId, "iid_1");
+ GetToken(kSubtypeAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token1"));
+
+ // Malicious extension registration.
+ AddInstanceID(kExtensionAppId, "iid_2");
+ GetToken(kExtensionAppId, kSender, kScope);
+ ASSERT_NO_FATAL_FAILURE(CompleteRegistration("token2"));
+
+ std::map<std::string, std::string> expected_data;
+
+ // Message for kExtensionAppId should be delivered to the extension rather
+ // than the victim app, despite the malicious subtype property attempting to
+ // impersonate victim app.
+ MCSMessage message(BuildDownstreamMessage(
+ kSender, kExtensionAppId /* category */, kSubtypeAppId /* subtype */,
+ expected_data, std::string() /* raw_data */));
+ EXPECT_TRUE(message.IsValid());
+ ReceiveMessageFromMCS(message);
+
+ EXPECT_EQ(MESSAGE_RECEIVED, last_event());
+ EXPECT_EQ(kExtensionAppId, last_app_id());
+ EXPECT_EQ(expected_data.size(), last_message().data.size());
+ EXPECT_EQ(expected_data, last_message().data);
+ EXPECT_EQ(kSender, last_message().sender_id);
+}
+
+} // namespace gcm