/* * Copyright 2023 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #import #if TARGET_OS_IOS #import #import "FirebaseAuth/Sources/Public/FirebaseAuth/FIRAuthErrors.h" #import "FirebaseAuth/Sources/Backend/FIRAuthBackend+MultiFactor.h" #import "FirebaseAuth/Sources/Backend/RPC/MultiFactor/SignIn/FIRFinalizeMFASignInRequest.h" #import "FirebaseAuth/Sources/Backend/RPC/MultiFactor/SignIn/FIRFinalizeMFASignInResponse.h" #import "FirebaseAuth/Sources/Backend/RPC/Proto/TOTP/FIRAuthProtoFinalizeMFATOTPSignInRequestInfo.h" #import "FirebaseAuth/Tests/Unit/FIRFakeBackendRPCIssuer.h" /** @var kTestAPIKey @brief Fake API key used for testing. */ static NSString *const kTestAPIKey = @"APIKey"; /** @var kTestFirebaseAppID @brief Fake Firebase app ID used for testing. */ static NSString *const kTestFirebaseAppID = @"appID"; /** @var kExpectedAPIURL @brief The expected URL for the test calls. */ static NSString *const kExpectedAPIURL = @"https://identitytoolkit.googleapis.com/v2/accounts/mfaSignIn:finalize?key=APIKey"; /** @var kMfaPendingCredential @brief Fake MFA Pending Credential for tesing. */ static NSString *const kMfaPendingCredential = @"mfaPendingCredential"; /** @var kVerificationCode @brief Fake totp verification code for tesing. */ static NSString *const kVerificationCode = @"verificationCode"; /** @var kMfaEnrollmentID @brief Fake MFA Enrollment ID for tesing. */ static NSString *const kMfaEnrollmentID = @"mfaEnrollmentId"; /** @var kTotpVerificationInfo @brief Fake TOTP verification info for tesing. */ static NSString *const kTotpVerificationInfo = @"totpVerificationInfo"; /** @class FIRFinalizeMFASignInRequestTests @brief Tests for @c FIRFinalizeMFASignInRequest. */ @interface FIRFinalizeMFASignInRequestTests : XCTestCase @end @implementation FIRFinalizeMFASignInRequestTests { /** @brief This backend RPC issuer is used to fake network responses for each test in the suite. In the @c setUp method we initialize this and set @c FIRAuthBackend's RPC issuer to it. */ FIRFakeBackendRPCIssuer *_RPCIssuer; /** @brief This is the request configuration used for testing. */ FIRAuthRequestConfiguration *_requestConfiguration; } - (void)setUp { [super setUp]; FIRFakeBackendRPCIssuer *RPCIssuer = [[FIRFakeBackendRPCIssuer alloc] init]; [FIRAuthBackend setDefaultBackendImplementationWithRPCIssuer:RPCIssuer]; _RPCIssuer = RPCIssuer; _requestConfiguration = [[FIRAuthRequestConfiguration alloc] initWithAPIKey:kTestAPIKey appID:kTestFirebaseAppID]; } - (void)tearDown { _RPCIssuer = nil; _requestConfiguration = nil; [FIRAuthBackend setDefaultBackendImplementationWithRPCIssuer:nil]; [super tearDown]; } /** @fn testTOTPFinalizeMFASignInRequest @brief Tests the Finalize MFA Sign in using TOTP request. */ - (void)testTOTPFinalizeMFASignInRequest { FIRAuthProtoFinalizeMFATOTPSignInRequestInfo *requestInfo = [[FIRAuthProtoFinalizeMFATOTPSignInRequestInfo alloc] initWithMfaEnrollmentID:kMfaEnrollmentID verificationCode:kVerificationCode]; FIRFinalizeMFASignInRequest *request = [[FIRFinalizeMFASignInRequest alloc] initWithMFAPendingCredential:kMfaPendingCredential verificationInfo:requestInfo requestConfiguration:_requestConfiguration]; [FIRAuthBackend finalizeMultiFactorSignIn:request callback:^(FIRFinalizeMFASignInResponse *_Nullable response, NSError *_Nullable error){ }]; XCTAssertEqualObjects(_RPCIssuer.requestURL.absoluteString, kExpectedAPIURL); XCTAssertNotNil(_RPCIssuer.decodedRequest); XCTAssertEqualObjects(_RPCIssuer.decodedRequest[kMfaPendingCredential], kMfaPendingCredential); XCTAssertEqualObjects(_RPCIssuer.decodedRequest[kMfaEnrollmentID], kMfaEnrollmentID); XCTAssertEqualObjects(_RPCIssuer.decodedRequest[kTotpVerificationInfo][kVerificationCode], kVerificationCode); } @end #endif