mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
a8fec952c2
The upcoming build system patches don't support hypthens in path names. Changing this for that reason is kind of silly, but it's the easiest way. Besides, nothing else uses hyphens in directory names. --HG-- extra : rebase_source : 42dda2b1f16a3c0bfe17397a70092362e400530f
261 lines
8.5 KiB
JavaScript
261 lines
8.5 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
"use strict";
|
|
|
|
this.EXPORTED_SYMBOLS = [
|
|
"btoa", // It comes from a module import.
|
|
"encryptPayload",
|
|
"ensureLegacyIdentityManager",
|
|
"setBasicCredentials",
|
|
"makeIdentityConfig",
|
|
"configureFxAccountIdentity",
|
|
"configureIdentity",
|
|
"SyncTestingInfrastructure",
|
|
"waitForZeroTimer",
|
|
"Promise", // from a module import
|
|
"add_identity_test",
|
|
];
|
|
|
|
const {utils: Cu} = Components;
|
|
|
|
Cu.import("resource://services-sync/status.js");
|
|
Cu.import("resource://services-sync/identity.js");
|
|
Cu.import("resource://services-common/utils.js");
|
|
Cu.import("resource://services-crypto/utils.js");
|
|
Cu.import("resource://services-sync/util.js");
|
|
Cu.import("resource://services-sync/browserid_identity.js");
|
|
Cu.import("resource://testing-common/services/common/logging.js");
|
|
Cu.import("resource://testing-common/services/sync/fakeservices.js");
|
|
Cu.import("resource://gre/modules/FxAccounts.jsm");
|
|
Cu.import("resource://gre/modules/FxAccountsCommon.js");
|
|
Cu.import("resource://gre/modules/Promise.jsm");
|
|
|
|
/**
|
|
* First wait >100ms (nsITimers can take up to that much time to fire, so
|
|
* we can account for the timer in delayedAutoconnect) and then two event
|
|
* loop ticks (to account for the Utils.nextTick() in autoConnect).
|
|
*/
|
|
this.waitForZeroTimer = function waitForZeroTimer(callback) {
|
|
let ticks = 2;
|
|
function wait() {
|
|
if (ticks) {
|
|
ticks -= 1;
|
|
CommonUtils.nextTick(wait);
|
|
return;
|
|
}
|
|
callback();
|
|
}
|
|
CommonUtils.namedTimer(wait, 150, {}, "timer");
|
|
}
|
|
|
|
/**
|
|
* Ensure Sync is configured with the "legacy" identity provider.
|
|
*/
|
|
this.ensureLegacyIdentityManager = function() {
|
|
let ns = {};
|
|
Cu.import("resource://services-sync/service.js", ns);
|
|
|
|
Status.__authManager = ns.Service.identity = new IdentityManager();
|
|
ns.Service._clusterManager = ns.Service.identity.createClusterManager(ns.Service);
|
|
}
|
|
|
|
this.setBasicCredentials =
|
|
function setBasicCredentials(username, password, syncKey) {
|
|
let ns = {};
|
|
Cu.import("resource://services-sync/service.js", ns);
|
|
|
|
let auth = ns.Service.identity;
|
|
auth.username = username;
|
|
auth.basicPassword = password;
|
|
auth.syncKey = syncKey;
|
|
}
|
|
|
|
// Return an identity configuration suitable for testing with our identity
|
|
// providers. |overrides| can specify overrides for any default values.
|
|
this.makeIdentityConfig = function(overrides) {
|
|
// first setup the defaults.
|
|
let result = {
|
|
// Username used in both fxaccount and sync identity configs.
|
|
username: "foo",
|
|
// fxaccount specific credentials.
|
|
fxaccount: {
|
|
user: {
|
|
assertion: 'assertion',
|
|
email: 'email',
|
|
kA: 'kA',
|
|
kB: 'kB',
|
|
sessionToken: 'sessionToken',
|
|
uid: 'user_uid',
|
|
verified: true,
|
|
},
|
|
token: {
|
|
endpoint: Svc.Prefs.get("tokenServerURI"),
|
|
duration: 300,
|
|
id: "id",
|
|
key: "key",
|
|
// uid will be set to the username.
|
|
}
|
|
},
|
|
sync: {
|
|
// username will come from the top-level username
|
|
password: "whatever",
|
|
syncKey: "abcdeabcdeabcdeabcdeabcdea",
|
|
}
|
|
};
|
|
|
|
// Now handle any specified overrides.
|
|
if (overrides) {
|
|
if (overrides.username) {
|
|
result.username = overrides.username;
|
|
}
|
|
if (overrides.sync) {
|
|
// TODO: allow just some attributes to be specified
|
|
result.sync = overrides.sync;
|
|
}
|
|
if (overrides.fxaccount) {
|
|
// TODO: allow just some attributes to be specified
|
|
result.fxaccount = overrides.fxaccount;
|
|
}
|
|
}
|
|
return result;
|
|
}
|
|
|
|
// Configure an instance of an FxAccount identity provider with the specified
|
|
// config (or the default config if not specified).
|
|
this.configureFxAccountIdentity = function(authService,
|
|
config = makeIdentityConfig()) {
|
|
let MockInternal = {};
|
|
let fxa = new FxAccounts(MockInternal);
|
|
|
|
// until we get better test infrastructure for bid_identity, we set the
|
|
// signedin user's "email" to the username, simply as many tests rely on this.
|
|
config.fxaccount.user.email = config.username;
|
|
fxa.internal.currentAccountState.signedInUser = {
|
|
version: DATA_FORMAT_VERSION,
|
|
accountData: config.fxaccount.user
|
|
};
|
|
fxa.internal.currentAccountState.getCertificate = function(data, keyPair, mustBeValidUntil) {
|
|
this.cert = {
|
|
validUntil: fxa.internal.now() + CERT_LIFETIME,
|
|
cert: "certificate",
|
|
};
|
|
return Promise.resolve(this.cert.cert);
|
|
};
|
|
|
|
let mockTSC = { // TokenServerClient
|
|
getTokenFromBrowserIDAssertion: function(uri, assertion, cb) {
|
|
config.fxaccount.token.uid = config.username;
|
|
cb(null, config.fxaccount.token);
|
|
},
|
|
};
|
|
authService._fxaService = fxa;
|
|
authService._tokenServerClient = mockTSC;
|
|
// Set the "account" of the browserId manager to be the "email" of the
|
|
// logged in user of the mockFXA service.
|
|
authService._signedInUser = fxa.internal.currentAccountState.signedInUser.accountData;
|
|
authService._account = config.fxaccount.user.email;
|
|
}
|
|
|
|
this.configureIdentity = function(identityOverrides) {
|
|
let config = makeIdentityConfig(identityOverrides);
|
|
let ns = {};
|
|
Cu.import("resource://services-sync/service.js", ns);
|
|
|
|
if (ns.Service.identity instanceof BrowserIDManager) {
|
|
// do the FxAccounts thang...
|
|
configureFxAccountIdentity(ns.Service.identity, config);
|
|
return ns.Service.identity.initializeWithCurrentIdentity().then(() => {
|
|
// need to wait until this identity manager is readyToAuthenticate.
|
|
return ns.Service.identity.whenReadyToAuthenticate.promise;
|
|
});
|
|
}
|
|
// old style identity provider.
|
|
setBasicCredentials(config.username, config.sync.password, config.sync.syncKey);
|
|
let deferred = Promise.defer();
|
|
deferred.resolve();
|
|
return deferred.promise;
|
|
}
|
|
|
|
this.SyncTestingInfrastructure = function (server, username, password, syncKey) {
|
|
let ns = {};
|
|
Cu.import("resource://services-sync/service.js", ns);
|
|
|
|
ensureLegacyIdentityManager();
|
|
let config = makeIdentityConfig();
|
|
// XXX - hacks for the sync identity provider.
|
|
if (username)
|
|
config.username = username;
|
|
if (password)
|
|
config.sync.password = password;
|
|
if (syncKey)
|
|
config.sync.syncKey = syncKey;
|
|
let cb = Async.makeSpinningCallback();
|
|
configureIdentity(config).then(cb, cb);
|
|
cb.wait();
|
|
|
|
let i = server.identity;
|
|
let uri = i.primaryScheme + "://" + i.primaryHost + ":" +
|
|
i.primaryPort + "/";
|
|
|
|
ns.Service.serverURL = uri;
|
|
ns.Service.clusterURL = uri;
|
|
|
|
this.logStats = initTestLogging();
|
|
this.fakeFilesystem = new FakeFilesystemService({});
|
|
this.fakeGUIDService = new FakeGUIDService();
|
|
this.fakeCryptoService = new FakeCryptoService();
|
|
}
|
|
|
|
/**
|
|
* Turn WBO cleartext into fake "encrypted" payload as it goes over the wire.
|
|
*/
|
|
this.encryptPayload = function encryptPayload(cleartext) {
|
|
if (typeof cleartext == "object") {
|
|
cleartext = JSON.stringify(cleartext);
|
|
}
|
|
|
|
return {
|
|
ciphertext: cleartext, // ciphertext == cleartext with fake crypto
|
|
IV: "irrelevant",
|
|
hmac: fakeSHA256HMAC(cleartext, CryptoUtils.makeHMACKey("")),
|
|
};
|
|
}
|
|
|
|
// This helper can be used instead of 'add_test' or 'add_task' to run the
|
|
// specified test function twice - once with the old-style sync identity
|
|
// manager and once with the new-style BrowserID identity manager, to ensure
|
|
// it works in both cases.
|
|
//
|
|
// * The test itself should be passed as 'test' - ie, test code will generally
|
|
// pass |this|.
|
|
// * The test function is a regular test function - although note that it must
|
|
// be a generator - async operations should yield them, and run_next_test
|
|
// mustn't be called.
|
|
this.add_identity_test = function(test, testFunction) {
|
|
function note(what) {
|
|
let msg = "running test " + testFunction.name + " with " + what + " identity manager";
|
|
test._log("test_info",
|
|
{_message: "TEST-INFO | | " + msg + "\n"});
|
|
}
|
|
let ns = {};
|
|
Cu.import("resource://services-sync/service.js", ns);
|
|
// one task for the "old" identity manager.
|
|
test.add_task(function() {
|
|
note("sync");
|
|
let oldIdentity = Status._authManager;
|
|
ensureLegacyIdentityManager();
|
|
yield testFunction();
|
|
Status.__authManager = ns.Service.identity = oldIdentity;
|
|
});
|
|
// another task for the FxAccounts identity manager.
|
|
test.add_task(function() {
|
|
note("FxAccounts");
|
|
let oldIdentity = Status._authManager;
|
|
Status.__authManager = ns.Service.identity = new BrowserIDManager();
|
|
yield testFunction();
|
|
Status.__authManager = ns.Service.identity = oldIdentity;
|
|
});
|
|
}
|