GIDGoogleUserTest.m 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477
  1. // Copyright 2021 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. #import "GoogleSignIn/Sources/Public/GoogleSignIn/GIDGoogleUser.h"
  15. #import <XCTest/XCTest.h>
  16. #import "GoogleSignIn/Sources/Public/GoogleSignIn/GIDConfiguration.h"
  17. #import "GoogleSignIn/Sources/Public/GoogleSignIn/GIDProfileData.h"
  18. #import "GoogleSignIn/Sources/Public/GoogleSignIn/GIDToken.h"
  19. #import "GoogleSignIn/Sources/GIDGoogleUser_Private.h"
  20. #import "GoogleSignIn/Tests/Unit/GIDGoogleUser+Testing.h"
  21. #import "GoogleSignIn/Tests/Unit/GIDProfileData+Testing.h"
  22. #import "GoogleSignIn/Tests/Unit/OIDAuthState+Testing.h"
  23. #import "GoogleSignIn/Tests/Unit/OIDAuthorizationRequest+Testing.h"
  24. #import "GoogleSignIn/Tests/Unit/OIDTokenRequest+Testing.h"
  25. #import "GoogleSignIn/Tests/Unit/OIDTokenResponse+Testing.h"
  26. #ifdef SWIFT_PACKAGE
  27. @import AppAuth;
  28. @import GoogleUtilities_MethodSwizzler;
  29. @import GoogleUtilities_SwizzlerTestHelpers;
  30. @import GTMAppAuth;
  31. #else
  32. #import <AppAuth/OIDAuthState.h>
  33. #import <AppAuth/OIDAuthorizationRequest.h>
  34. #import <AppAuth/OIDAuthorizationResponse.h>
  35. #import <AppAuth/OIDAuthorizationService.h>
  36. #import <AppAuth/OIDError.h>
  37. #import <AppAuth/OIDIDToken.h>
  38. #import <AppAuth/OIDTokenRequest.h>
  39. #import <AppAuth/OIDTokenResponse.h>
  40. #import <GoogleUtilities/GULSwizzler.h>
  41. #import <GoogleUtilities/GULSwizzler+Unswizzle.h>
  42. #import <GTMAppAuth/GTMAppAuthFetcherAuthorization.h>
  43. #endif
  44. static NSString *const kNewAccessToken = @"new_access_token";
  45. static NSString *const kNewRefreshToken = @"new_refresh_token";
  46. static NSTimeInterval const kTimeAccuracy = 10;
  47. static NSTimeInterval const kIDTokenExpiresIn = 100;
  48. static NSTimeInterval const kNewIDTokenExpiresIn = 200;
  49. @interface GIDGoogleUserTest : XCTestCase
  50. @end
  51. @implementation GIDGoogleUserTest {
  52. // The saved token fetch handler.
  53. OIDTokenCallback _tokenFetchHandler;
  54. }
  55. - (void)setUp {
  56. _tokenFetchHandler = nil;
  57. // We need to use swizzle here because OCMock can not stub class method with arguments.
  58. [GULSwizzler swizzleClass:[OIDAuthorizationService class]
  59. selector:@selector(performTokenRequest:originalAuthorizationResponse:callback:)
  60. isClassSelector:YES
  61. withBlock:^(id sender,
  62. OIDTokenRequest *request,
  63. OIDAuthorizationResponse *authorizationResponse,
  64. OIDTokenCallback callback) {
  65. // Save the OIDTokenCallback.
  66. self->_tokenFetchHandler = [callback copy];
  67. }];
  68. }
  69. - (void)tearDown {
  70. [GULSwizzler unswizzleClass:[OIDAuthorizationService class]
  71. selector:@selector(performTokenRequest:originalAuthorizationResponse:callback:)
  72. isClassSelector:YES];
  73. }
  74. #pragma mark - Tests
  75. - (void)testInitWithAuthState {
  76. OIDAuthState *authState = [OIDAuthState testInstance];
  77. GIDGoogleUser *user = [[GIDGoogleUser alloc] initWithAuthState:authState
  78. profileData:[GIDProfileData testInstance]];
  79. XCTAssertEqualObjects(user.grantedScopes, @[ OIDAuthorizationRequestTestingScope2 ]);
  80. XCTAssertEqualObjects(user.userID, kUserID);
  81. XCTAssertEqualObjects(user.configuration.hostedDomain, kHostedDomain);
  82. XCTAssertEqualObjects(user.configuration.clientID, OIDAuthorizationRequestTestingClientID);
  83. XCTAssertEqualObjects(user.profile, [GIDProfileData testInstance]);
  84. XCTAssertEqualObjects(user.accessToken.tokenString, kAccessToken);
  85. XCTAssertEqualObjects(user.refreshToken.tokenString, kRefreshToken);
  86. OIDIDToken *idToken = [[OIDIDToken alloc]
  87. initWithIDTokenString:authState.lastTokenResponse.idToken];
  88. XCTAssertEqualObjects(user.idToken.expirationDate, [idToken expiresAt]);
  89. }
  90. - (void)testCoding {
  91. if (@available(iOS 11, macOS 10.13, *)) {
  92. GIDGoogleUser *user = [[GIDGoogleUser alloc] initWithAuthState:[OIDAuthState testInstance]
  93. profileData:[GIDProfileData testInstance]];
  94. NSData *data = [NSKeyedArchiver archivedDataWithRootObject:user
  95. requiringSecureCoding:YES
  96. error:nil];
  97. GIDGoogleUser *newUser = [NSKeyedUnarchiver unarchivedObjectOfClass:[GIDGoogleUser class]
  98. fromData:data
  99. error:nil];
  100. XCTAssertEqualObjects(user, newUser);
  101. XCTAssertTrue(GIDGoogleUser.supportsSecureCoding);
  102. } else {
  103. XCTSkip(@"Required API is not available for this test.");
  104. }
  105. }
  106. #if TARGET_OS_IOS || TARGET_OS_MACCATALYST
  107. // Deprecated in iOS 13 and macOS 10.14
  108. - (void)testLegacyCoding {
  109. GIDGoogleUser *user = [[GIDGoogleUser alloc] initWithAuthState:[OIDAuthState testInstance]
  110. profileData:[GIDProfileData testInstance]];
  111. NSData *data = [NSKeyedArchiver archivedDataWithRootObject:user];
  112. GIDGoogleUser *newUser = [NSKeyedUnarchiver unarchiveObjectWithData:data];
  113. XCTAssertEqualObjects(user, newUser);
  114. XCTAssertTrue(GIDGoogleUser.supportsSecureCoding);
  115. }
  116. #endif // TARGET_OS_IOS || TARGET_OS_MACCATALYST
  117. // Test the old encoding format for backword compatability.
  118. - (void)testOldFormatCoding {
  119. if (@available(iOS 11, macOS 10.13, *)) {
  120. OIDAuthState *authState = [OIDAuthState testInstance];
  121. GIDProfileData *profileDate = [GIDProfileData testInstance];
  122. GIDGoogleUserOldFormat *user = [[GIDGoogleUserOldFormat alloc] initWithAuthState:authState
  123. profileData:profileDate];
  124. NSData *data = [NSKeyedArchiver archivedDataWithRootObject:user
  125. requiringSecureCoding:YES
  126. error:nil];
  127. GIDGoogleUser *newUser = [NSKeyedUnarchiver unarchivedObjectOfClass:[GIDGoogleUser class]
  128. fromData:data
  129. error:nil];
  130. XCTAssertEqualObjects(user, newUser);
  131. }
  132. }
  133. - (void)testUpdateAuthState {
  134. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:kAccessTokenExpiresIn
  135. idTokenExpiresIn:kIDTokenExpiresIn];
  136. NSString *updatedIDToken = [self idTokenWithExpiresIn:kNewIDTokenExpiresIn];
  137. OIDAuthState *updatedAuthState = [OIDAuthState testInstanceWithIDToken:updatedIDToken
  138. accessToken:kNewAccessToken
  139. accessTokenExpiresIn:kAccessTokenExpiresIn
  140. refreshToken:kNewRefreshToken];
  141. GIDProfileData *updatedProfileData = [GIDProfileData testInstance];
  142. [user updateWithTokenResponse:updatedAuthState.lastTokenResponse
  143. authorizationResponse:updatedAuthState.lastAuthorizationResponse
  144. profileData:updatedProfileData];
  145. XCTAssertEqualObjects(user.accessToken.tokenString, kNewAccessToken);
  146. [self verifyUser:user accessTokenExpiresIn:kAccessTokenExpiresIn];
  147. XCTAssertEqualObjects(user.idToken.tokenString, updatedIDToken);
  148. [self verifyUser:user idTokenExpiresIn:kNewIDTokenExpiresIn];
  149. XCTAssertEqualObjects(user.refreshToken.tokenString, kNewRefreshToken);
  150. XCTAssertEqual(user.profile, updatedProfileData);
  151. }
  152. // When updating with a new OIDAuthState in which token information is not changed, the token objects
  153. // should remain the same.
  154. - (void)testUpdateAuthState_tokensAreNotChanged {
  155. NSString *idToken = [self idTokenWithExpiresIn:kIDTokenExpiresIn];
  156. OIDAuthState *authState = [OIDAuthState testInstanceWithIDToken:idToken
  157. accessToken:kAccessToken
  158. accessTokenExpiresIn:kAccessTokenExpiresIn
  159. refreshToken:kRefreshToken];
  160. GIDGoogleUser *user = [[GIDGoogleUser alloc] initWithAuthState:authState profileData:nil];
  161. GIDToken *accessTokenBeforeUpdate = user.accessToken;
  162. GIDToken *refreshTokenBeforeUpdate = user.refreshToken;
  163. GIDToken *idTokenBeforeUpdate = user.idToken;
  164. [user updateWithTokenResponse:authState.lastTokenResponse
  165. authorizationResponse:authState.lastAuthorizationResponse
  166. profileData:nil];
  167. XCTAssertIdentical(user.accessToken, accessTokenBeforeUpdate);
  168. XCTAssertIdentical(user.idToken, idTokenBeforeUpdate);
  169. XCTAssertIdentical(user.refreshToken, refreshTokenBeforeUpdate);
  170. }
  171. - (void)testFetcherAuthorizer {
  172. // This is really hard to test without assuming how GTMAppAuthFetcherAuthorization works
  173. // internally, so let's just take the shortcut here by asserting we get a
  174. // GTMAppAuthFetcherAuthorization object.
  175. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:kAccessTokenExpiresIn
  176. idTokenExpiresIn:kIDTokenExpiresIn];
  177. #pragma clang diagnostic push
  178. #pragma clang diagnostic ignored "-Wdeprecated-declarations"
  179. id<GTMFetcherAuthorizationProtocol> fetcherAuthorizer = user.fetcherAuthorizer;
  180. #pragma clang diagnostic pop
  181. XCTAssertTrue([fetcherAuthorizer isKindOfClass:[GTMAppAuthFetcherAuthorization class]]);
  182. XCTAssertTrue([fetcherAuthorizer canAuthorize]);
  183. }
  184. - (void)testFetcherAuthorizer_returnTheSameInstance {
  185. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:kAccessTokenExpiresIn
  186. idTokenExpiresIn:kIDTokenExpiresIn];
  187. #pragma clang diagnostic push
  188. #pragma clang diagnostic ignored "-Wdeprecated-declarations"
  189. id<GTMFetcherAuthorizationProtocol> fetcherAuthorizer = user.fetcherAuthorizer;
  190. id<GTMFetcherAuthorizationProtocol> fetcherAuthorizer2 = user.fetcherAuthorizer;
  191. #pragma clang diagnostic pop
  192. XCTAssertIdentical(fetcherAuthorizer, fetcherAuthorizer2);
  193. }
  194. #pragma mark - Test `doWithFreshTokens:`
  195. - (void)testDoWithFreshTokens_refresh_givenBothTokensExpired {
  196. // Both tokens expired 10 seconds ago.
  197. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:-10 idTokenExpiresIn:-10];
  198. NSString *newIdToken = [self idTokenWithExpiresIn:kNewIDTokenExpiresIn];
  199. XCTestExpectation *expectation = [self expectationWithDescription:@"Callback is called"];
  200. // Save the intermediate states.
  201. [user doWithFreshTokens:^(GIDGoogleUser * _Nullable user, NSError * _Nullable error) {
  202. [expectation fulfill];
  203. XCTAssertNil(error);
  204. XCTAssertEqualObjects(user.accessToken.tokenString, kNewAccessToken);
  205. [self verifyUser:user accessTokenExpiresIn:kAccessTokenExpiresIn];
  206. XCTAssertEqualObjects(user.idToken.tokenString, newIdToken);
  207. [self verifyUser:user idTokenExpiresIn:kNewIDTokenExpiresIn];
  208. }];
  209. // Creates a fake response.
  210. OIDTokenResponse *fakeResponse = [OIDTokenResponse testInstanceWithIDToken:newIdToken
  211. accessToken:kNewAccessToken
  212. expiresIn:@(kAccessTokenExpiresIn)
  213. refreshToken:kRefreshToken
  214. tokenRequest:nil];
  215. _tokenFetchHandler(fakeResponse, nil);
  216. [self waitForExpectationsWithTimeout:1 handler:nil];
  217. }
  218. - (void)testDoWithRefreshTokens_refresh_givenBothTokensExpired_NoNewIDToken {
  219. // Both tokens expired 10 seconds ago.
  220. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:-10 idTokenExpiresIn:-10];
  221. // Creates a fake response without ID token.
  222. OIDTokenResponse *fakeResponse = [OIDTokenResponse testInstanceWithIDToken:nil
  223. accessToken:kNewAccessToken
  224. expiresIn:@(kAccessTokenExpiresIn)
  225. refreshToken:kRefreshToken
  226. tokenRequest:nil];
  227. XCTestExpectation *expectation = [self expectationWithDescription:@"Callback is called"];
  228. // Save the intermediate states.
  229. [user doWithFreshTokens:^(GIDGoogleUser * _Nullable user, NSError * _Nullable error) {
  230. [expectation fulfill];
  231. XCTAssertNil(error);
  232. XCTAssertEqualObjects(user.accessToken.tokenString, kNewAccessToken);
  233. [self verifyUser:user accessTokenExpiresIn:kAccessTokenExpiresIn];
  234. XCTAssertNil(user.idToken);
  235. }];
  236. _tokenFetchHandler(fakeResponse, nil);
  237. [self waitForExpectationsWithTimeout:1 handler:nil];
  238. }
  239. - (void)testDoWithFreshTokens_refresh_givenAccessTokenExpired {
  240. // Access token expired 10 seconds ago. ID token will expire in 10 minutes.
  241. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:-10 idTokenExpiresIn:10 * 60];
  242. // Creates a fake response.
  243. NSString *newIdToken = [self idTokenWithExpiresIn:kNewIDTokenExpiresIn];
  244. OIDTokenResponse *fakeResponse = [OIDTokenResponse testInstanceWithIDToken:newIdToken
  245. accessToken:kNewAccessToken
  246. expiresIn:@(kAccessTokenExpiresIn)
  247. refreshToken:kRefreshToken
  248. tokenRequest:nil];
  249. XCTestExpectation *expectation = [self expectationWithDescription:@"Callback is called"];
  250. // Save the intermediate states.
  251. [user doWithFreshTokens:^(GIDGoogleUser * _Nullable user, NSError * _Nullable error) {
  252. [expectation fulfill];
  253. XCTAssertNil(error);
  254. XCTAssertEqualObjects(user.accessToken.tokenString, kNewAccessToken);
  255. [self verifyUser:user accessTokenExpiresIn:kAccessTokenExpiresIn];
  256. XCTAssertEqualObjects(user.idToken.tokenString, newIdToken);
  257. [self verifyUser:user idTokenExpiresIn:kNewIDTokenExpiresIn];
  258. }];
  259. _tokenFetchHandler(fakeResponse, nil);
  260. [self waitForExpectationsWithTimeout:1 handler:nil];
  261. }
  262. - (void)testDoWithFreshTokens_refresh_givenIDTokenExpired {
  263. // ID token expired 10 seconds ago. Access token will expire in 10 minutes.
  264. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:10 * 60 idTokenExpiresIn:-10];
  265. // Creates a fake response.
  266. NSString *newIdToken = [self idTokenWithExpiresIn:kNewIDTokenExpiresIn];
  267. OIDTokenResponse *fakeResponse = [OIDTokenResponse testInstanceWithIDToken:newIdToken
  268. accessToken:kNewAccessToken
  269. expiresIn:@(kAccessTokenExpiresIn)
  270. refreshToken:kRefreshToken
  271. tokenRequest:nil];
  272. XCTestExpectation *expectation = [self expectationWithDescription:@"Callback is called"];
  273. // Save the intermediate states.
  274. [user doWithFreshTokens:^(GIDGoogleUser * _Nullable user, NSError * _Nullable error) {
  275. [expectation fulfill];
  276. XCTAssertNil(error);
  277. XCTAssertEqualObjects(user.accessToken.tokenString, kNewAccessToken);
  278. [self verifyUser:user accessTokenExpiresIn:kAccessTokenExpiresIn];
  279. XCTAssertEqualObjects(user.idToken.tokenString, newIdToken);
  280. [self verifyUser:user idTokenExpiresIn:kNewIDTokenExpiresIn];
  281. }];
  282. _tokenFetchHandler(fakeResponse, nil);
  283. [self waitForExpectationsWithTimeout:1 handler:nil];
  284. }
  285. - (void)testDoWithFreshTokens_noRefresh_givenBothTokensNotExpired {
  286. // Both tokens will expire in 10 min.
  287. NSTimeInterval expiresIn = 10 * 60;
  288. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:expiresIn
  289. idTokenExpiresIn:expiresIn];
  290. NSString *accessTokenStringBeforeRefresh = user.accessToken.tokenString;
  291. NSString *idTokenStringBeforeRefresh = user.idToken.tokenString;
  292. XCTestExpectation *expectation = [self expectationWithDescription:@"Callback is called"];
  293. // Save the intermediate states.
  294. [user doWithFreshTokens:^(GIDGoogleUser * _Nullable user, NSError * _Nullable error) {
  295. [expectation fulfill];
  296. XCTAssertNil(error);
  297. }];
  298. [self waitForExpectationsWithTimeout:1 handler:nil];
  299. XCTAssertEqualObjects(user.accessToken.tokenString, accessTokenStringBeforeRefresh);
  300. [self verifyUser:user accessTokenExpiresIn:expiresIn];
  301. XCTAssertEqualObjects(user.idToken.tokenString, idTokenStringBeforeRefresh);
  302. [self verifyUser:user idTokenExpiresIn:expiresIn];
  303. }
  304. - (void)testDoWithFreshTokens_noRefresh_givenRefreshErrors {
  305. // Both tokens expired 10 second ago.
  306. NSTimeInterval expiresIn = -10;
  307. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:expiresIn
  308. idTokenExpiresIn:expiresIn];
  309. NSString *accessTokenStringBeforeRefresh = user.accessToken.tokenString;
  310. NSString *idTokenStringBeforeRefresh = user.idToken.tokenString;
  311. XCTestExpectation *expectation = [self expectationWithDescription:@"Callback is called"];
  312. // Save the intermediate states.
  313. [user doWithFreshTokens:^(GIDGoogleUser * _Nullable user, NSError * _Nullable error) {
  314. [expectation fulfill];
  315. XCTAssertNotNil(error);
  316. XCTAssertNil(user);
  317. }];
  318. _tokenFetchHandler(nil, [self fakeError]);
  319. [self waitForExpectationsWithTimeout:1 handler:nil];
  320. XCTAssertEqualObjects(user.accessToken.tokenString, accessTokenStringBeforeRefresh);
  321. [self verifyUser:user accessTokenExpiresIn:expiresIn];
  322. XCTAssertEqualObjects(user.idToken.tokenString, idTokenStringBeforeRefresh);
  323. [self verifyUser:user idTokenExpiresIn:expiresIn];
  324. }
  325. - (void)testDoWithFreshTokens_handleConcurrentRefresh {
  326. // Both tokens expired 10 second ago.
  327. NSTimeInterval expiresIn = -10;
  328. GIDGoogleUser *user = [self googleUserWithAccessTokenExpiresIn:expiresIn
  329. idTokenExpiresIn:expiresIn];
  330. // Creates a fake response.
  331. NSString *newIdToken = [self idTokenWithExpiresIn:kNewIDTokenExpiresIn];
  332. OIDTokenResponse *fakeResponse = [OIDTokenResponse testInstanceWithIDToken:newIdToken
  333. accessToken:kNewAccessToken
  334. expiresIn:@(kAccessTokenExpiresIn)
  335. refreshToken:kRefreshToken
  336. tokenRequest:nil];
  337. XCTestExpectation *firstExpectation =
  338. [self expectationWithDescription:@"First callback is called"];
  339. [user doWithFreshTokens:^(GIDGoogleUser *user, NSError *error) {
  340. [firstExpectation fulfill];
  341. XCTAssertNil(error);
  342. XCTAssertEqualObjects(user.accessToken.tokenString, kNewAccessToken);
  343. [self verifyUser:user accessTokenExpiresIn:kAccessTokenExpiresIn];
  344. XCTAssertEqualObjects(user.idToken.tokenString, newIdToken);
  345. [self verifyUser:user idTokenExpiresIn:kNewIDTokenExpiresIn];
  346. }];
  347. XCTestExpectation *secondExpectation =
  348. [self expectationWithDescription:@"Second callback is called"];
  349. [user doWithFreshTokens:^(GIDGoogleUser *user, NSError *error) {
  350. [secondExpectation fulfill];
  351. XCTAssertNil(error);
  352. XCTAssertEqualObjects(user.accessToken.tokenString, kNewAccessToken);
  353. [self verifyUser:user accessTokenExpiresIn:kAccessTokenExpiresIn];
  354. XCTAssertEqualObjects(user.idToken.tokenString, newIdToken);
  355. [self verifyUser:user idTokenExpiresIn:kNewIDTokenExpiresIn];
  356. }];
  357. _tokenFetchHandler(fakeResponse, nil);
  358. [self waitForExpectationsWithTimeout:1 handler:nil];
  359. }
  360. #pragma mark - Helpers
  361. // Returns a GIDGoogleUser with different tokens expiresIn time. The token strings are constants.
  362. - (GIDGoogleUser *)googleUserWithAccessTokenExpiresIn:(NSTimeInterval)accessTokenExpiresIn
  363. idTokenExpiresIn:(NSTimeInterval)idTokenExpiresIn {
  364. NSString *idToken = [self idTokenWithExpiresIn:idTokenExpiresIn];
  365. OIDAuthState *authState = [OIDAuthState testInstanceWithIDToken:idToken
  366. accessToken:kAccessToken
  367. accessTokenExpiresIn:accessTokenExpiresIn
  368. refreshToken:kRefreshToken];
  369. return [[GIDGoogleUser alloc] initWithAuthState:authState profileData:nil];
  370. }
  371. - (NSString *)idTokenWithExpiresIn:(NSTimeInterval)expiresIn {
  372. // The expireTime should be based on 1970.
  373. NSTimeInterval expireTime = [[NSDate date] timeIntervalSince1970] + expiresIn;
  374. return [OIDTokenResponse idTokenWithSub:kUserID exp:@(expireTime)];
  375. }
  376. - (void)verifyUser:(GIDGoogleUser *)user accessTokenExpiresIn:(NSTimeInterval)expiresIn {
  377. NSDate *expectedAccessTokenExpirationDate = [[NSDate date] dateByAddingTimeInterval:expiresIn];
  378. XCTAssertEqualWithAccuracy([user.accessToken.expirationDate timeIntervalSince1970],
  379. [expectedAccessTokenExpirationDate timeIntervalSince1970],
  380. kTimeAccuracy);
  381. }
  382. - (void)verifyUser:(GIDGoogleUser *)user idTokenExpiresIn:(NSTimeInterval)expiresIn {
  383. NSDate *expectedIDTokenExpirationDate = [[NSDate date] dateByAddingTimeInterval:expiresIn];
  384. XCTAssertEqualWithAccuracy([user.idToken.expirationDate timeIntervalSince1970],
  385. [expectedIDTokenExpirationDate timeIntervalSince1970], kTimeAccuracy);
  386. }
  387. - (NSError *)fakeError {
  388. return [NSError errorWithDomain:@"fake.domain" code:-1 userInfo:nil];
  389. }
  390. @end