blob: ae13c6d4de38263202dd42ae610b7bf217a78064 [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/sync/profile_sync_service_harness.h"
#include <stddef.h>
#include <algorithm>
#include <iterator>
#include <ostream>
#include <set>
#include <vector>
#include "base/logging.h"
#include "base/memory/ref_counted.h"
#include "base/message_loop.h"
#include "base/task.h"
#include "base/tracked.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/sync/sessions/session_state.h"
#include "chrome/browser/sync/signin_manager.h"
using browser_sync::sessions::SyncSessionSnapshot;
// The amount of time for which we wait for a live sync operation to complete.
static const int kLiveSyncOperationTimeoutMs = 45000;
// Simple class to implement a timeout using PostDelayedTask. If it is not
// aborted before picked up by a message queue, then it asserts with the message
// provided. This class is not thread safe.
class StateChangeTimeoutEvent
: public base::RefCountedThreadSafe<StateChangeTimeoutEvent> {
public:
StateChangeTimeoutEvent(ProfileSyncServiceHarness* caller,
const std::string& message);
// The entry point to the class from PostDelayedTask.
void Callback();
// Cancels the actions of the callback. Returns true if success, false
// if the callback has already timed out.
bool Abort();
private:
friend class base::RefCountedThreadSafe<StateChangeTimeoutEvent>;
~StateChangeTimeoutEvent();
bool aborted_;
bool did_timeout_;
// Due to synchronization of the IO loop, the caller will always be alive
// if the class is not aborted.
ProfileSyncServiceHarness* caller_;
// Informative message to assert in the case of a timeout.
std::string message_;
DISALLOW_COPY_AND_ASSIGN(StateChangeTimeoutEvent);
};
StateChangeTimeoutEvent::StateChangeTimeoutEvent(
ProfileSyncServiceHarness* caller,
const std::string& message)
: aborted_(false), did_timeout_(false), caller_(caller), message_(message) {
}
StateChangeTimeoutEvent::~StateChangeTimeoutEvent() {
}
void StateChangeTimeoutEvent::Callback() {
if (!aborted_) {
if (!caller_->RunStateChangeMachine()) {
// Report the message.
did_timeout_ = true;
DCHECK(!aborted_) << message_;
caller_->SignalStateComplete();
}
}
}
bool StateChangeTimeoutEvent::Abort() {
aborted_ = true;
caller_ = NULL;
return !did_timeout_;
}
ProfileSyncServiceHarness::ProfileSyncServiceHarness(
Profile* profile,
const std::string& username,
const std::string& password,
int id)
: waiting_for_encryption_type_(syncable::UNSPECIFIED),
wait_state_(INITIAL_WAIT_STATE),
profile_(profile),
service_(NULL),
timestamp_match_partner_(NULL),
username_(username),
password_(password),
id_(id) {
if (IsSyncAlreadySetup()) {
service_ = profile_->GetProfileSyncService();
service_->AddObserver(this);
wait_state_ = FULLY_SYNCED;
}
}
// static
ProfileSyncServiceHarness* ProfileSyncServiceHarness::CreateAndAttach(
Profile* profile) {
if (!profile->HasProfileSyncService()) {
NOTREACHED() << "Profile has never signed into sync.";
return NULL;
}
return new ProfileSyncServiceHarness(profile, "", "", 0);
}
void ProfileSyncServiceHarness::SetCredentials(const std::string& username,
const std::string& password) {
username_ = username;
password_ = password;
}
bool ProfileSyncServiceHarness::IsSyncAlreadySetup() {
return profile_->HasProfileSyncService();
}
bool ProfileSyncServiceHarness::SetupSync() {
syncable::ModelTypeSet synced_datatypes;
for (int i = syncable::FIRST_REAL_MODEL_TYPE;
i < syncable::MODEL_TYPE_COUNT; ++i) {
synced_datatypes.insert(syncable::ModelTypeFromInt(i));
}
return SetupSync(synced_datatypes);
}
bool ProfileSyncServiceHarness::SetupSync(
const syncable::ModelTypeSet& synced_datatypes) {
// Initialize the sync client's profile sync service object.
service_ = profile_->GetProfileSyncService("");
if (service_ == NULL) {
LOG(ERROR) << "SetupSync(): service_ is null.";
return false;
}
// Subscribe sync client to notifications from the profile sync service.
if (!service_->HasObserver(this))
service_->AddObserver(this);
// Authenticate sync client using GAIA credentials.
service_->signin()->StartSignIn(username_, password_, "", "");
// Wait for the OnBackendInitialized() callback.
wait_state_ = WAITING_FOR_ON_BACKEND_INITIALIZED;
if (!AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs,
"Waiting for OnBackendInitialized().")) {
LOG(ERROR) << "OnBackendInitialized() not seen after "
<< kLiveSyncOperationTimeoutMs / 1000
<< " seconds.";
return false;
}
// Choose the datatypes to be synced. If all datatypes are to be synced,
// set sync_everything to true; otherwise, set it to false.
bool sync_everything = (synced_datatypes.size() ==
(syncable::MODEL_TYPE_COUNT - syncable::FIRST_REAL_MODEL_TYPE));
service()->OnUserChoseDatatypes(sync_everything, synced_datatypes);
// Wait for initial sync cycle to be completed.
DCHECK_EQ(wait_state_, WAITING_FOR_INITIAL_SYNC);
if (!AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs,
"Waiting for initial sync cycle to complete.")) {
LOG(ERROR) << "Initial sync cycle did not complete after "
<< kLiveSyncOperationTimeoutMs / 1000
<< " seconds.";
return false;
}
// Indicate to the browser that sync setup is complete.
service()->SetSyncSetupCompleted();
return true;
}
void ProfileSyncServiceHarness::SignalStateCompleteWithNextState(
WaitState next_state) {
wait_state_ = next_state;
SignalStateComplete();
}
void ProfileSyncServiceHarness::SignalStateComplete() {
MessageLoop::current()->Quit();
}
bool ProfileSyncServiceHarness::RunStateChangeMachine() {
WaitState original_wait_state = wait_state_;
switch (wait_state_) {
case WAITING_FOR_ON_BACKEND_INITIALIZED: {
LogClientInfo("WAITING_FOR_ON_BACKEND_INITIALIZED");
if (service()->sync_initialized()) {
// The sync backend is initialized.
SignalStateCompleteWithNextState(WAITING_FOR_INITIAL_SYNC);
}
break;
}
case WAITING_FOR_INITIAL_SYNC: {
LogClientInfo("WAITING_FOR_INITIAL_SYNC");
if (IsSynced()) {
// The first sync cycle is now complete. We can start running tests.
SignalStateCompleteWithNextState(FULLY_SYNCED);
}
break;
}
case WAITING_FOR_SYNC_TO_FINISH: {
LogClientInfo("WAITING_FOR_SYNC_TO_FINISH");
if (!IsSynced()) {
// The client is not yet fully synced. Continue waiting.
if (!GetStatus().server_reachable) {
// The client cannot reach the sync server because the network is
// disabled. There is no need to wait anymore.
SignalStateCompleteWithNextState(SERVER_UNREACHABLE);
}
break;
}
SignalStateCompleteWithNextState(FULLY_SYNCED);
break;
}
case WAITING_FOR_UPDATES: {
LogClientInfo("WAITING_FOR_UPDATES");
DCHECK(timestamp_match_partner_);
if (!MatchesOtherClient(timestamp_match_partner_)) {
// The client is not yet fully synced; keep waiting until we converge.
break;
}
timestamp_match_partner_->service()->RemoveObserver(this);
timestamp_match_partner_ = NULL;
SignalStateCompleteWithNextState(FULLY_SYNCED);
break;
}
case WAITING_FOR_PASSPHRASE_ACCEPTED: {
LogClientInfo("WAITING_FOR_PASSPHRASE_ACCEPTED");
// TODO(atwilson): After ProfileSyncService::OnPassphraseAccepted() is
// fixed, add an extra check to make sure that the value of
// service()->observed_passphrase_required() is false.
if (service()->ShouldPushChanges()) {
// The passphrase has been accepted, and sync has been restarted.
SignalStateCompleteWithNextState(FULLY_SYNCED);
}
break;
}
case WAITING_FOR_ENCRYPTION: {
LogClientInfo("WAITING_FOR_ENCRYPTION");
if (IsTypeEncrypted(waiting_for_encryption_type_)) {
// Encryption is complete for the type we are waiting on.
SignalStateCompleteWithNextState(FULLY_SYNCED);
}
break;
}
case SERVER_UNREACHABLE: {
LogClientInfo("SERVER_UNREACHABLE");
if (GetStatus().server_reachable) {
// The client was offline due to the network being disabled, but is now
// back online. Wait for the pending sync cycle to complete.
SignalStateCompleteWithNextState(WAITING_FOR_SYNC_TO_FINISH);
}
break;
}
case FULLY_SYNCED: {
// The client is online and fully synced. There is nothing to do.
LogClientInfo("FULLY_SYNCED");
break;
}
case SYNC_DISABLED: {
// Syncing is disabled for the client. There is nothing to do.
LogClientInfo("SYNC_DISABLED");
break;
}
default:
// Invalid state during observer callback which may be triggered by other
// classes using the the UI message loop. Defer to their handling.
break;
}
return original_wait_state != wait_state_;
}
void ProfileSyncServiceHarness::OnStateChanged() {
RunStateChangeMachine();
}
bool ProfileSyncServiceHarness::AwaitPassphraseAccepted() {
LogClientInfo("AwaitPassphraseAccepted");
if (wait_state_ == SYNC_DISABLED) {
LOG(ERROR) << "Sync disabled for Client " << id_ << ".";
return false;
}
// TODO(atwilson): After ProfileSyncService::OnPassphraseAccepted() is
// fixed, add an extra check to make sure that the value of
// service()->observed_passphrase_required() is false.
if (service()->ShouldPushChanges()) {
// Passphrase is already accepted; don't wait.
return true;
}
wait_state_ = WAITING_FOR_PASSPHRASE_ACCEPTED;
return AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs,
"Waiting for passphrase accepted.");
}
bool ProfileSyncServiceHarness::AwaitSyncCycleCompletion(
const std::string& reason) {
LogClientInfo("AwaitSyncCycleCompletion");
if (wait_state_ == SYNC_DISABLED) {
LOG(ERROR) << "Sync disabled for Client " << id_ << ".";
return false;
}
if (IsSynced()) {
// Client is already synced; don't wait.
return true;
}
if (wait_state_ == SERVER_UNREACHABLE) {
// Client was offline; wait for it to go online, and then wait for sync.
AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
DCHECK_EQ(wait_state_, WAITING_FOR_SYNC_TO_FINISH);
return AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
} else {
DCHECK(service()->sync_initialized());
wait_state_ = WAITING_FOR_SYNC_TO_FINISH;
AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
if (wait_state_ == FULLY_SYNCED) {
// Client is online; sync was successful.
return true;
} else if (wait_state_ == SERVER_UNREACHABLE) {
// Client is offline; sync was unsuccessful.
return false;
} else {
LOG(ERROR) << "Invalid wait state:" << wait_state_;
return false;
}
}
}
bool ProfileSyncServiceHarness::AwaitMutualSyncCycleCompletion(
ProfileSyncServiceHarness* partner) {
LogClientInfo("AwaitMutualSyncCycleCompletion");
if (!AwaitSyncCycleCompletion("Sync cycle completion on active client."))
return false;
return partner->WaitUntilTimestampMatches(this,
"Sync cycle completion on passive client.");
}
bool ProfileSyncServiceHarness::AwaitGroupSyncCycleCompletion(
std::vector<ProfileSyncServiceHarness*>& partners) {
LogClientInfo("AwaitGroupSyncCycleCompletion");
if (!AwaitSyncCycleCompletion("Sync cycle completion on active client."))
return false;
bool return_value = true;
for (std::vector<ProfileSyncServiceHarness*>::iterator it =
partners.begin(); it != partners.end(); ++it) {
if ((this != *it) && ((*it)->wait_state_ != SYNC_DISABLED)) {
return_value = return_value &&
(*it)->WaitUntilTimestampMatches(this,
"Sync cycle completion on partner client.");
}
}
return return_value;
}
// static
bool ProfileSyncServiceHarness::AwaitQuiescence(
std::vector<ProfileSyncServiceHarness*>& clients) {
VLOG(1) << "AwaitQuiescence.";
bool return_value = true;
for (std::vector<ProfileSyncServiceHarness*>::iterator it =
clients.begin(); it != clients.end(); ++it) {
if ((*it)->wait_state_ != SYNC_DISABLED)
return_value = return_value &&
(*it)->AwaitGroupSyncCycleCompletion(clients);
}
return return_value;
}
bool ProfileSyncServiceHarness::WaitUntilTimestampMatches(
ProfileSyncServiceHarness* partner, const std::string& reason) {
LogClientInfo("WaitUntilTimestampMatches");
if (wait_state_ == SYNC_DISABLED) {
LOG(ERROR) << "Sync disabled for Client " << id_ << ".";
return false;
}
if (MatchesOtherClient(partner)) {
// Timestamps already match; don't wait.
return true;
}
DCHECK(!timestamp_match_partner_);
timestamp_match_partner_ = partner;
partner->service()->AddObserver(this);
wait_state_ = WAITING_FOR_UPDATES;
return AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
}
bool ProfileSyncServiceHarness::AwaitStatusChangeWithTimeout(
int timeout_milliseconds,
const std::string& reason) {
LogClientInfo("AwaitStatusChangeWithTimeout");
if (wait_state_ == SYNC_DISABLED) {
LOG(ERROR) << "Sync disabled for Client " << id_ << ".";
return false;
}
scoped_refptr<StateChangeTimeoutEvent> timeout_signal(
new StateChangeTimeoutEvent(this, reason));
MessageLoop* loop = MessageLoop::current();
bool did_allow_nestable_tasks = loop->NestableTasksAllowed();
loop->SetNestableTasksAllowed(true);
loop->PostDelayedTask(
FROM_HERE,
NewRunnableMethod(timeout_signal.get(),
&StateChangeTimeoutEvent::Callback),
timeout_milliseconds);
loop->Run();
loop->SetNestableTasksAllowed(did_allow_nestable_tasks);
if (timeout_signal->Abort()) {
LogClientInfo("AwaitStatusChangeWithTimeout succeeded");
return true;
} else {
LogClientInfo("AwaitStatusChangeWithTimeout timed out");
return false;
}
}
ProfileSyncService::Status ProfileSyncServiceHarness::GetStatus() {
DCHECK(service() != NULL) << "GetStatus(): service() is NULL.";
return service()->QueryDetailedSyncStatus();
}
bool ProfileSyncServiceHarness::IsSynced() {
LogClientInfo("IsSynced");
if (service() == NULL)
return false;
const SyncSessionSnapshot* snap = GetLastSessionSnapshot();
// TODO(rsimha): Remove additional checks of snap->has_more_to_sync and
// snap->unsynced_count once http://crbug.com/48989 is fixed.
return (snap &&
snap->num_conflicting_updates == 0 && // We can decrypt everything.
ServiceIsPushingChanges() &&
GetStatus().notifications_enabled &&
!service()->HasUnsyncedItems() &&
!snap->has_more_to_sync &&
snap->unsynced_count == 0);
}
bool ProfileSyncServiceHarness::MatchesOtherClient(
ProfileSyncServiceHarness* partner) {
if (!IsSynced())
return false;
// Only look for a match if we have at least one enabled datatype in
// common with the partner client.
syncable::ModelTypeSet types, other_types, intersection_types;
service()->GetPreferredDataTypes(&types);
partner->service()->GetPreferredDataTypes(&other_types);
std::set_intersection(types.begin(), types.end(), other_types.begin(),
other_types.end(),
inserter(intersection_types,
intersection_types.begin()));
for (syncable::ModelTypeSet::iterator i = intersection_types.begin();
i != intersection_types.end();
++i) {
if (!partner->IsSynced() ||
partner->GetUpdatedTimestamp(*i) != GetUpdatedTimestamp(*i)) {
return false;
}
}
return true;
}
const SyncSessionSnapshot*
ProfileSyncServiceHarness::GetLastSessionSnapshot() const {
DCHECK(service_ != NULL) << "Sync service has not yet been set up.";
if (service_->sync_initialized()) {
return service_->GetLastSessionSnapshot();
}
return NULL;
}
void ProfileSyncServiceHarness::EnableSyncForDatatype(
syncable::ModelType datatype) {
LogClientInfo("EnableSyncForDatatype");
syncable::ModelTypeSet synced_datatypes;
if (wait_state_ == SYNC_DISABLED) {
wait_state_ = WAITING_FOR_ON_BACKEND_INITIALIZED;
synced_datatypes.insert(datatype);
DCHECK(SetupSync(synced_datatypes)) << "Reinitialization of Client " << id_
<< " failed.";
} else {
DCHECK(service() != NULL) << "EnableSyncForDatatype(): service() is null.";
service()->GetPreferredDataTypes(&synced_datatypes);
syncable::ModelTypeSet::iterator it = synced_datatypes.find(
syncable::ModelTypeFromInt(datatype));
if (it == synced_datatypes.end()) {
synced_datatypes.insert(syncable::ModelTypeFromInt(datatype));
service()->OnUserChoseDatatypes(false, synced_datatypes);
wait_state_ = WAITING_FOR_SYNC_TO_FINISH;
AwaitSyncCycleCompletion("Waiting for datatype configuration.");
VLOG(1) << "EnableSyncForDatatype(): Enabled sync for datatype "
<< syncable::ModelTypeToString(datatype) << " on Client " << id_;
} else {
VLOG(1) << "EnableSyncForDatatype(): Sync already enabled for datatype "
<< syncable::ModelTypeToString(datatype) << " on Client " << id_;
}
}
}
void ProfileSyncServiceHarness::DisableSyncForDatatype(
syncable::ModelType datatype) {
LogClientInfo("DisableSyncForDatatype");
syncable::ModelTypeSet synced_datatypes;
DCHECK(service() != NULL) << "DisableSyncForDatatype(): service() is null.";
service()->GetPreferredDataTypes(&synced_datatypes);
syncable::ModelTypeSet::iterator it = synced_datatypes.find(datatype);
if (it != synced_datatypes.end()) {
synced_datatypes.erase(it);
service()->OnUserChoseDatatypes(false, synced_datatypes);
AwaitSyncCycleCompletion("Waiting for datatype configuration.");
VLOG(1) << "DisableSyncForDatatype(): Disabled sync for datatype "
<< syncable::ModelTypeToString(datatype) << " on Client " << id_;
} else {
VLOG(1) << "DisableSyncForDatatype(): Sync already disabled for datatype "
<< syncable::ModelTypeToString(datatype) << " on Client " << id_;
}
}
void ProfileSyncServiceHarness::EnableSyncForAllDatatypes() {
LogClientInfo("EnableSyncForAllDatatypes");
if (wait_state_ == SYNC_DISABLED) {
wait_state_ = WAITING_FOR_ON_BACKEND_INITIALIZED;
DCHECK(SetupSync()) << "Reinitialization of Client " << id_ << " failed.";
} else {
syncable::ModelTypeSet synced_datatypes;
for (int i = syncable::FIRST_REAL_MODEL_TYPE;
i < syncable::MODEL_TYPE_COUNT; ++i) {
synced_datatypes.insert(syncable::ModelTypeFromInt(i));
}
DCHECK(service() != NULL) << "EnableSyncForAllDatatypes(): service() is "
" null.";
service()->OnUserChoseDatatypes(true, synced_datatypes);
wait_state_ = WAITING_FOR_SYNC_TO_FINISH;
AwaitSyncCycleCompletion("Waiting for datatype configuration.");
VLOG(1) << "EnableSyncForAllDatatypes(): Enabled sync for all datatypes on "
"Client " << id_;
}
}
void ProfileSyncServiceHarness::DisableSyncForAllDatatypes() {
LogClientInfo("DisableSyncForAllDatatypes");
DCHECK(service() != NULL) << "EnableSyncForAllDatatypes(): service() is "
"null.";
service()->DisableForUser();
wait_state_ = SYNC_DISABLED;
VLOG(1) << "DisableSyncForAllDatatypes(): Disabled sync for all datatypes on "
"Client " << id_;
}
std::string ProfileSyncServiceHarness::GetUpdatedTimestamp(
syncable::ModelType model_type) {
const SyncSessionSnapshot* snap = GetLastSessionSnapshot();
DCHECK(snap != NULL) << "GetUpdatedTimestamp(): Sync snapshot is NULL.";
return snap->download_progress_markers[model_type];
}
void ProfileSyncServiceHarness::LogClientInfo(const std::string& message) {
if (service()) {
const SyncSessionSnapshot* snap = GetLastSessionSnapshot();
if (snap) {
VLOG(1) << "Client " << id_ << ": " << message
<< ": num_updates_downloaded : "
<< snap->syncer_status.num_updates_downloaded_total
<< ", has_more_to_sync: " << snap->has_more_to_sync
<< ", unsynced_count: " << snap->unsynced_count
<< ", num_conflicting_updates: " << snap->num_conflicting_updates
<< ", has_unsynced_items: "
<< service()->HasUnsyncedItems()
<< ", observed_passphrase_required: "
<< service()->observed_passphrase_required()
<< ", notifications_enabled: "
<< GetStatus().notifications_enabled
<< ", service_is_pushing_changes: " << ServiceIsPushingChanges();
} else {
VLOG(1) << "Client " << id_ << ": " << message
<< ": Sync session snapshot not available.";
}
} else {
VLOG(1) << "Client " << id_ << ": " << message
<< ": Sync service not available.";
}
}
bool ProfileSyncServiceHarness::EnableEncryptionForType(
syncable::ModelType type) {
syncable::ModelTypeSet encrypted_types;
service_->GetEncryptedDataTypes(&encrypted_types);
if (encrypted_types.count(type) > 0)
return true;
encrypted_types.insert(type);
service_->EncryptDataTypes(encrypted_types);
// Wait some time to let the enryption finish.
std::string reason = "Waiting for encryption.";
DCHECK_EQ(FULLY_SYNCED, wait_state_);
wait_state_ = WAITING_FOR_ENCRYPTION;
waiting_for_encryption_type_ = type;
if (!AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason)) {
LOG(ERROR) << "Did not receive EncryptionComplete notification after"
<< kLiveSyncOperationTimeoutMs / 1000
<< " seconds.";
return false;
}
return IsTypeEncrypted(type);
}
bool ProfileSyncServiceHarness::IsTypeEncrypted(syncable::ModelType type) {
syncable::ModelTypeSet encrypted_types;
service_->GetEncryptedDataTypes(&encrypted_types);
if (encrypted_types.count(type) == 0) {
return false;
}
return true;
}