/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ "use strict"; this.EXPORTED_SYMBOLS = [ "btoa", // It comes from a module import. "encryptPayload", "ensureLegacyIdentityManager", "setBasicCredentials", "makeIdentityConfig", "configureFxAccountIdentity", "configureIdentity", "SyncTestingInfrastructure", "waitForZeroTimer", "Promise", // from a module import "add_identity_test", ]; var {utils: Cu} = Components; Cu.import("resource://services-sync/status.js"); Cu.import("resource://services-sync/identity.js"); Cu.import("resource://services-common/utils.js"); Cu.import("resource://services-crypto/utils.js"); Cu.import("resource://services-sync/util.js"); Cu.import("resource://services-sync/browserid_identity.js"); Cu.import("resource://testing-common/services/common/logging.js"); Cu.import("resource://testing-common/services/sync/fakeservices.js"); Cu.import("resource://gre/modules/FxAccounts.jsm"); Cu.import("resource://gre/modules/FxAccountsCommon.js"); Cu.import("resource://gre/modules/Promise.jsm"); /** * First wait >100ms (nsITimers can take up to that much time to fire, so * we can account for the timer in delayedAutoconnect) and then two event * loop ticks (to account for the Utils.nextTick() in autoConnect). */ this.waitForZeroTimer = function waitForZeroTimer(callback) { let ticks = 2; function wait() { if (ticks) { ticks -= 1; CommonUtils.nextTick(wait); return; } callback(); } CommonUtils.namedTimer(wait, 150, {}, "timer"); } /** * Ensure Sync is configured with the "legacy" identity provider. */ this.ensureLegacyIdentityManager = function() { let ns = {}; Cu.import("resource://services-sync/service.js", ns); Status.__authManager = ns.Service.identity = new IdentityManager(); ns.Service._clusterManager = ns.Service.identity.createClusterManager(ns.Service); } this.setBasicCredentials = function setBasicCredentials(username, password, syncKey) { let ns = {}; Cu.import("resource://services-sync/service.js", ns); let auth = ns.Service.identity; auth.username = username; auth.basicPassword = password; auth.syncKey = syncKey; } // Return an identity configuration suitable for testing with our identity // providers. |overrides| can specify overrides for any default values. this.makeIdentityConfig = function(overrides) { // first setup the defaults. let result = { // Username used in both fxaccount and sync identity configs. username: "foo", // fxaccount specific credentials. fxaccount: { user: { assertion: 'assertion', email: 'email', kA: 'kA', kB: 'kB', sessionToken: 'sessionToken', uid: 'user_uid', verified: true, }, token: { endpoint: Svc.Prefs.get("tokenServerURI"), duration: 300, id: "id", key: "key", // uid will be set to the username. } }, sync: { // username will come from the top-level username password: "whatever", syncKey: "abcdeabcdeabcdeabcdeabcdea", } }; // Now handle any specified overrides. if (overrides) { if (overrides.username) { result.username = overrides.username; } if (overrides.sync) { // TODO: allow just some attributes to be specified result.sync = overrides.sync; } if (overrides.fxaccount) { // TODO: allow just some attributes to be specified result.fxaccount = overrides.fxaccount; } } return result; } // Configure an instance of an FxAccount identity provider with the specified // config (or the default config if not specified). this.configureFxAccountIdentity = function(authService, config = makeIdentityConfig()) { let MockInternal = {}; let fxa = new FxAccounts(MockInternal); // until we get better test infrastructure for bid_identity, we set the // signedin user's "email" to the username, simply as many tests rely on this. config.fxaccount.user.email = config.username; fxa.internal.currentAccountState.signedInUser = { version: DATA_FORMAT_VERSION, accountData: config.fxaccount.user }; fxa.internal.currentAccountState.getCertificate = function(data, keyPair, mustBeValidUntil) { this.cert = { validUntil: fxa.internal.now() + CERT_LIFETIME, cert: "certificate", }; return Promise.resolve(this.cert.cert); }; let mockTSC = { // TokenServerClient getTokenFromBrowserIDAssertion: function(uri, assertion, cb) { config.fxaccount.token.uid = config.username; cb(null, config.fxaccount.token); }, }; authService._fxaService = fxa; authService._tokenServerClient = mockTSC; // Set the "account" of the browserId manager to be the "email" of the // logged in user of the mockFXA service. authService._signedInUser = fxa.internal.currentAccountState.signedInUser.accountData; authService._account = config.fxaccount.user.email; } this.configureIdentity = function(identityOverrides) { let config = makeIdentityConfig(identityOverrides); let ns = {}; Cu.import("resource://services-sync/service.js", ns); if (ns.Service.identity instanceof BrowserIDManager) { // do the FxAccounts thang... configureFxAccountIdentity(ns.Service.identity, config); return ns.Service.identity.initializeWithCurrentIdentity().then(() => { // need to wait until this identity manager is readyToAuthenticate. return ns.Service.identity.whenReadyToAuthenticate.promise; }); } // old style identity provider. setBasicCredentials(config.username, config.sync.password, config.sync.syncKey); let deferred = Promise.defer(); deferred.resolve(); return deferred.promise; } this.SyncTestingInfrastructure = function (server, username, password, syncKey) { let ns = {}; Cu.import("resource://services-sync/service.js", ns); ensureLegacyIdentityManager(); let config = makeIdentityConfig(); // XXX - hacks for the sync identity provider. if (username) config.username = username; if (password) config.sync.password = password; if (syncKey) config.sync.syncKey = syncKey; let cb = Async.makeSpinningCallback(); configureIdentity(config).then(cb, cb); cb.wait(); let i = server.identity; let uri = i.primaryScheme + "://" + i.primaryHost + ":" + i.primaryPort + "/"; ns.Service.serverURL = uri; ns.Service.clusterURL = uri; this.logStats = initTestLogging(); this.fakeFilesystem = new FakeFilesystemService({}); this.fakeGUIDService = new FakeGUIDService(); this.fakeCryptoService = new FakeCryptoService(); } /** * Turn WBO cleartext into fake "encrypted" payload as it goes over the wire. */ this.encryptPayload = function encryptPayload(cleartext) { if (typeof cleartext == "object") { cleartext = JSON.stringify(cleartext); } return { ciphertext: cleartext, // ciphertext == cleartext with fake crypto IV: "irrelevant", hmac: fakeSHA256HMAC(cleartext, CryptoUtils.makeHMACKey("")), }; } // This helper can be used instead of 'add_test' or 'add_task' to run the // specified test function twice - once with the old-style sync identity // manager and once with the new-style BrowserID identity manager, to ensure // it works in both cases. // // * The test itself should be passed as 'test' - ie, test code will generally // pass |this|. // * The test function is a regular test function - although note that it must // be a generator - async operations should yield them, and run_next_test // mustn't be called. this.add_identity_test = function(test, testFunction) { function note(what) { let msg = "running test " + testFunction.name + " with " + what + " identity manager"; test.do_print(msg); } let ns = {}; Cu.import("resource://services-sync/service.js", ns); // one task for the "old" identity manager. test.add_task(function() { note("sync"); let oldIdentity = Status._authManager; ensureLegacyIdentityManager(); yield testFunction(); Status.__authManager = ns.Service.identity = oldIdentity; }); // another task for the FxAccounts identity manager. test.add_task(function() { note("FxAccounts"); let oldIdentity = Status._authManager; Status.__authManager = ns.Service.identity = new BrowserIDManager(); yield testFunction(); Status.__authManager = ns.Service.identity = oldIdentity; }); }