15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2011 The Chromium Authors. All rights reserved. 25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be 35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file. 45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/stringprintf.h" 6868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/utf_string_conversions.h" 75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/sync/test/integration/passwords_helper.h" 8010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)#include "chrome/browser/sync/test/integration/profile_sync_service_harness.h" 9010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)#include "chrome/browser/sync/test/integration/sync_integration_test_util.h" 10868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "chrome/browser/sync/test/integration/sync_test.h" 115d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)#include "components/password_manager/core/browser/password_form_data.h" 125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::AddLogin; 14010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::AllProfilesContainSamePasswordFormsAsVerifier; 15a02191e04bc25c4935f804f2c080ae28663d096dBen Murdochusing passwords_helper::AwaitAllProfilesContainSamePasswordForms; 16010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::AwaitProfileContainsSamePasswordFormsAsVerifier; 175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::CreateTestPasswordForm; 185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::GetPasswordCount; 195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)using passwords_helper::GetPasswordStore; 20010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::GetVerifierPasswordCount; 21010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::GetVerifierPasswordStore; 22010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::ProfileContainsSamePasswordFormsAsVerifier; 23010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::SetDecryptionPassphrase; 24010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using passwords_helper::SetEncryptionPassphrase; 25010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using sync_integration_test_util::AwaitPassphraseAccepted; 26010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)using sync_integration_test_util::AwaitPassphraseRequired; 275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2858537e28ecd584eab876aee8be7156509866d23aTorne (Richard Coles)using autofill::PasswordForm; 295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 30010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)static const char* kValidPassphrase = "passphrase!"; 31010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)static const char* kAnotherValidPassphrase = "Mot de passe!"; 32010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class MultipleClientPasswordsSyncTest : public SyncTest { 345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) MultipleClientPasswordsSyncTest() : SyncTest(MULTIPLE_CLIENT) {} 365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual ~MultipleClientPasswordsSyncTest() {} 375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 385c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu virtual bool TestUsesSelfNotifications() OVERRIDE { 395c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu return false; 405c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu } 415c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu 425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(MultipleClientPasswordsSyncTest); 445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 465c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo LiuIN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest, Sanity) { 475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; 485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (int i = 0; i < num_clients(); ++i) { 505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) PasswordForm form = CreateTestPasswordForm(i); 515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) AddLogin(GetPasswordStore(i), form); 525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 54a02191e04bc25c4935f804f2c080ae28663d096dBen Murdoch ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); 555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ASSERT_EQ(num_clients(), GetPasswordCount(0)); 565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 57010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 58010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)IN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest, 59010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) SetPassphraseAndThenSetupSync) { 60010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(SetupClients()); 61010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 62010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(GetClient(0)->SetupSync()); 63010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) SetEncryptionPassphrase(0, kValidPassphrase, ProfileSyncService::EXPLICIT); 64010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(0))); 65010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 66010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // When client 1 hits a passphrase required state, we can infer that 67010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // client 0's passphrase has been committed. to the server. 68010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetClient(1)->SetupSync(); 69010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1))); 70010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 71010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // Setup client 2 *after* the passphrase has been committed. 72010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_FALSE(GetClient(2)->SetupSync()); 73010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(2))); 74010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 75010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // Get clients 1 and 2 out of the passphrase required state. 76010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(SetDecryptionPassphrase(1, kValidPassphrase)); 77010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(1))); 78010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(SetDecryptionPassphrase(2, kValidPassphrase)); 79010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(2))); 80010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 81010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // For some reason, the tests won't pass unless these flags are set. 82010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(1)->SetSyncSetupCompleted(); 83010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(1)->SetSetupInProgress(false); 84010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(2)->SetSyncSetupCompleted(); 85010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(2)->SetSetupInProgress(false); 86010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 87010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // Move around some passwords to make sure it's all working. 88010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) PasswordForm form0 = CreateTestPasswordForm(0); 89010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) AddLogin(GetPasswordStore(0), form0); 90010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 91010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); 92010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)} 93010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 94010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)IN_PROC_BROWSER_TEST_F(MultipleClientPasswordsSyncTest, 95010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) SetDifferentPassphraseAndThenSetupSync) { 96010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(SetupClients()) << "SetupClients() failed."; 97010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 98010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(GetClient(0)->SetupSync()); 99010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) SetEncryptionPassphrase(0, kValidPassphrase, ProfileSyncService::EXPLICIT); 100010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService((0)))); 101010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 102010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // When client 1 hits a passphrase required state, we can infer that 103010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // client 0's passphrase has been committed. to the server. 104010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetClient(1)->SetupSync(); 105010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1))); 106010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 107010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // Give client 1 the correct passphrase. 108010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) SetDecryptionPassphrase(1, kValidPassphrase); 109010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService((1)))); 110010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 111010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // For some reason, the tests won't pass unless these flags are set. 112010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(1)->SetSetupInProgress(false); 113010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(1)->SetSyncSetupCompleted(); 114010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 115010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // Give client 2 a different passphrase so it fails to sync. 116010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_FALSE(GetClient(2)->SetupSync()); 117010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService((2)))); 118010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) SetDecryptionPassphrase(2, kAnotherValidPassphrase); 119010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService((2)))); 120010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 121010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // Add a password on 0 while client 2 has different passphrases. 122010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) PasswordForm form0 = CreateTestPasswordForm(0); 123010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) AddLogin(GetVerifierPasswordStore(), form0); 124010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) AddLogin(GetPasswordStore(0), form0); 125010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 126010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // It should sync to client 1. 127010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(1)); 128010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 129010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // But it won't get synced to 2. 130010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_FALSE(ProfileContainsSamePasswordFormsAsVerifier(2)); 131010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 132010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // Update 2 with the correct passphrase, the password should now sync over. 133010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(2))); 134010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(SetDecryptionPassphrase(2, kValidPassphrase)); 135010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(2))); 136010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 137010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) // For some reason, the tests won't pass unless these flags are set. 138010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(2)->SetSetupInProgress(false); 139010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) GetSyncService(2)->SetSyncSetupCompleted(); 140010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) 141010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(2)); 142010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles) ASSERT_TRUE(AllProfilesContainSamePasswordFormsAsVerifier()); 143010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)} 144