15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2011 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/stringprintf.h"
6868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/utf_string_conversions.h"
75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/sync/test/integration/passwords_helper.h"
8010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)#include "chrome/browser/sync/test/integration/profile_sync_service_harness.h"
9010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)#include "chrome/browser/sync/test/integration/sync_integration_test_util.h"
10868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "chrome/browser/sync/test/integration/sync_test.h"
115d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#include "components/password_manager/core/browser/password_form_data.h"
125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::AddLogin;
14010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::AllProfilesContainSamePasswordFormsAsVerifier;
15a02191e04bc25c4935f804f2c080ae28663d096dBen Murdochusing passwords_helper::AwaitAllProfilesContainSamePasswordForms;
16010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::AwaitProfileContainsSamePasswordFormsAsVerifier;
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::CreateTestPasswordForm;
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::GetPasswordCount;
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::GetPasswordStore;
20010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::GetVerifierPasswordCount;
21010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::GetVerifierPasswordStore;
22010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::ProfileContainsSamePasswordFormsAsVerifier;
23010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::SetDecryptionPassphrase;
24010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::SetEncryptionPassphrase;
25010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using sync_integration_test_util::AwaitPassphraseAccepted;
26010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using sync_integration_test_util::AwaitPassphraseRequired;
275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2858537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)using autofill::PasswordForm;
295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
30010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)static const char* kValidPassphrase = "passphrase!";
31010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)static const char* kAnotherValidPassphrase = "Mot de passe!";
32010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class MultipleClientPasswordsSyncTest : public SyncTest {
345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  MultipleClientPasswordsSyncTest() : SyncTest(MULTIPLE_CLIENT) {}
365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual ~MultipleClientPasswordsSyncTest() {}
375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
385c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu  virtual bool TestUsesSelfNotifications() OVERRIDE {
395c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu    return false;
405c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu  }
415c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu
425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(MultipleClientPasswordsSyncTest);
445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
465c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo LiuIN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest, Sanity) {
475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_TRUE(SetupSync()) << "SetupSync() failed.";
485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (int i = 0; i < num_clients(); ++i) {
505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PasswordForm form = CreateTestPasswordForm(i);
515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    AddLogin(GetPasswordStore(i), form);
525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
54a02191e04bc25c4935f804f2c080ae28663d096dBen Murdoch  ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms());
555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ASSERT_EQ(num_clients(), GetPasswordCount(0));
565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
57010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
58010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)IN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest,
59010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)                       SetPassphraseAndThenSetupSync) {
60010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(SetupClients());
61010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
62010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(GetClient(0)->SetupSync());
63010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  SetEncryptionPassphrase(0, kValidPassphrase, ProfileSyncService::EXPLICIT);
64010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(0)));
65010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
66010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // When client 1 hits a passphrase required state, we can infer that
67010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // client 0's passphrase has been committed. to the server.
68010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetClient(1)->SetupSync();
69010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1)));
70010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
71010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // Setup client 2 *after* the passphrase has been committed.
72010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_FALSE(GetClient(2)->SetupSync());
73010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(2)));
74010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
75010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // Get clients 1 and 2 out of the passphrase required state.
76010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(SetDecryptionPassphrase(1, kValidPassphrase));
77010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(1)));
78010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(SetDecryptionPassphrase(2, kValidPassphrase));
79010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(2)));
80010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
81010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // For some reason, the tests won't pass unless these flags are set.
82010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(1)->SetSyncSetupCompleted();
83010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(1)->SetSetupInProgress(false);
84010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(2)->SetSyncSetupCompleted();
85010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(2)->SetSetupInProgress(false);
86010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
87010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // Move around some passwords to make sure it's all working.
88010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  PasswordForm form0 = CreateTestPasswordForm(0);
89010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  AddLogin(GetPasswordStore(0), form0);
90010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
91010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms());
92010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)}
93010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
94010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)IN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest,
95010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)                       SetDifferentPassphraseAndThenSetupSync) {
96010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(SetupClients()) << "SetupClients() failed.";
97010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
98010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(GetClient(0)->SetupSync());
99010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  SetEncryptionPassphrase(0, kValidPassphrase, ProfileSyncService::EXPLICIT);
100010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService((0))));
101010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
102010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // When client 1 hits a passphrase required state, we can infer that
103010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // client 0's passphrase has been committed. to the server.
104010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetClient(1)->SetupSync();
105010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1)));
106010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
107010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // Give client 1 the correct passphrase.
108010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  SetDecryptionPassphrase(1, kValidPassphrase);
109010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService((1))));
110010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
111010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // For some reason, the tests won't pass unless these flags are set.
112010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(1)->SetSetupInProgress(false);
113010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(1)->SetSyncSetupCompleted();
114010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
115010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // Give client 2 a different passphrase so it fails to sync.
116010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_FALSE(GetClient(2)->SetupSync());
117010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService((2))));
118010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  SetDecryptionPassphrase(2, kAnotherValidPassphrase);
119010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService((2))));
120010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
121010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // Add a password on 0 while client 2 has different passphrases.
122010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  PasswordForm form0 = CreateTestPasswordForm(0);
123010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  AddLogin(GetVerifierPasswordStore(), form0);
124010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  AddLogin(GetPasswordStore(0), form0);
125010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
126010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // It should sync to client 1.
127010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(1));
128010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
129010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // But it won't get synced to 2.
130010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_FALSE(ProfileContainsSamePasswordFormsAsVerifier(2));
131010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
132010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // Update 2 with the correct passphrase, the password should now sync over.
133010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(2)));
134010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(SetDecryptionPassphrase(2, kValidPassphrase));
135010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(2)));
136010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
137010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  // For some reason, the tests won't pass unless these flags are set.
138010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(2)->SetSetupInProgress(false);
139010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  GetSyncService(2)->SetSyncSetupCompleted();
140010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)
141010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(2));
142010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  ASSERT_TRUE(AllProfilesContainSamePasswordFormsAsVerifier());
143010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)}
144