AuthenticationInterceptorTests.swift 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712
  1. //
  2. // AuthenticationInterceptorTests.swift
  3. //
  4. // Copyright (c) 2020 Alamofire Software Foundation (http://alamofire.org/)
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a copy
  7. // of this software and associated documentation files (the "Software"), to deal
  8. // in the Software without restriction, including without limitation the rights
  9. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  10. // copies of the Software, and to permit persons to whom the Software is
  11. // furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  21. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  22. // THE SOFTWARE.
  23. //
  24. @testable import Alamofire
  25. import Foundation
  26. import XCTest
  27. final class AuthenticationInterceptorTestCase: BaseTestCase {
  28. // MARK: - Helper Types
  29. struct TestCredential: AuthenticationCredential {
  30. let accessToken: String
  31. let refreshToken: String
  32. let userID: String
  33. let expiration: Date
  34. let requiresRefresh: Bool
  35. init(accessToken: String = "a0",
  36. refreshToken: String = "r0",
  37. userID: String = "u0",
  38. expiration: Date = Date(),
  39. requiresRefresh: Bool = false) {
  40. self.accessToken = accessToken
  41. self.refreshToken = refreshToken
  42. self.userID = userID
  43. self.expiration = expiration
  44. self.requiresRefresh = requiresRefresh
  45. }
  46. }
  47. enum TestAuthError: Error {
  48. case refreshNetworkFailure
  49. }
  50. final class TestAuthenticator: Authenticator {
  51. private(set) var applyCount = 0
  52. private(set) var refreshCount = 0
  53. private(set) var didRequestFailDueToAuthErrorCount = 0
  54. private(set) var isRequestAuthenticatedWithCredentialCount = 0
  55. let shouldRefreshAsynchronously: Bool
  56. let refreshResult: Result<TestCredential, Error>?
  57. let lock = NSLock()
  58. init(shouldRefreshAsynchronously: Bool = true, refreshResult: Result<TestCredential, Error>? = nil) {
  59. self.shouldRefreshAsynchronously = shouldRefreshAsynchronously
  60. self.refreshResult = refreshResult
  61. }
  62. func apply(_ credential: TestCredential, to urlRequest: inout URLRequest) {
  63. lock.lock(); defer { lock.unlock() }
  64. applyCount += 1
  65. urlRequest.headers.add(.authorization(bearerToken: credential.accessToken))
  66. }
  67. func refresh(_ credential: TestCredential,
  68. for session: Session,
  69. completion: @escaping (Result<TestCredential, Error>) -> Void) {
  70. lock.lock()
  71. refreshCount += 1
  72. let result = refreshResult ?? .success(
  73. TestCredential(accessToken: "a\(refreshCount)",
  74. refreshToken: "a\(refreshCount)",
  75. userID: "u1",
  76. expiration: Date())
  77. )
  78. if shouldRefreshAsynchronously {
  79. // The 10 ms delay here is important to allow multiple requests to queue up while refreshing.
  80. DispatchQueue.global(qos: .utility).asyncAfter(deadline: .now() + 0.01) { completion(result) }
  81. lock.unlock()
  82. } else {
  83. lock.unlock()
  84. completion(result)
  85. }
  86. }
  87. func didRequest(_ urlRequest: URLRequest,
  88. with response: HTTPURLResponse,
  89. failDueToAuthenticationError error: Error)
  90. -> Bool {
  91. lock.lock(); defer { lock.unlock() }
  92. didRequestFailDueToAuthErrorCount += 1
  93. return response.statusCode == 401
  94. }
  95. func isRequest(_ urlRequest: URLRequest, authenticatedWith credential: TestCredential) -> Bool {
  96. lock.lock(); defer { lock.unlock() }
  97. isRequestAuthenticatedWithCredentialCount += 1
  98. let bearerToken = HTTPHeader.authorization(bearerToken: credential.accessToken).value
  99. return urlRequest.headers["Authorization"] == bearerToken
  100. }
  101. }
  102. final class PathAdapter: RequestAdapter {
  103. var paths: [String]
  104. init(paths: [String]) {
  105. self.paths = paths
  106. }
  107. func adapt(_ urlRequest: URLRequest, for session: Session, completion: @escaping (Result<URLRequest, Error>) -> Void) {
  108. var request = urlRequest
  109. var urlComponents = URLComponents(url: request.url!, resolvingAgainstBaseURL: false)!
  110. urlComponents.path = paths.removeFirst()
  111. request.url = urlComponents.url
  112. completion(.success(request))
  113. }
  114. }
  115. // MARK: - Tests - Adapt
  116. func testThatInterceptorCanAdaptURLRequest() {
  117. // Given
  118. let credential = TestCredential()
  119. let authenticator = TestAuthenticator()
  120. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  121. let urlRequest = URLRequest.makeHTTPBinRequest()
  122. let session = Session()
  123. let expect = expectation(description: "request should complete")
  124. var response: AFDataResponse<Data?>?
  125. // When
  126. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  127. response = $0
  128. expect.fulfill()
  129. }
  130. waitForExpectations(timeout: timeout)
  131. // Then
  132. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a0")
  133. XCTAssertEqual(response?.result.isSuccess, true)
  134. XCTAssertEqual(authenticator.applyCount, 1)
  135. XCTAssertEqual(authenticator.refreshCount, 0)
  136. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 0)
  137. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  138. XCTAssertEqual(request.retryCount, 0)
  139. }
  140. func testThatInterceptorQueuesAdaptOperationWhenRefreshing() {
  141. // Given
  142. let credential = TestCredential(requiresRefresh: true)
  143. let authenticator = TestAuthenticator()
  144. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  145. let urlRequest1 = URLRequest.makeHTTPBinRequest(path: "/status/200")
  146. let urlRequest2 = URLRequest.makeHTTPBinRequest(path: "/status/202")
  147. let session = Session()
  148. let expect = expectation(description: "both requests should complete")
  149. expect.expectedFulfillmentCount = 2
  150. var response1: AFDataResponse<Data?>?
  151. var response2: AFDataResponse<Data?>?
  152. // When
  153. let request1 = session.request(urlRequest1, interceptor: interceptor).validate().response {
  154. response1 = $0
  155. expect.fulfill()
  156. }
  157. let request2 = session.request(urlRequest2, interceptor: interceptor).validate().response {
  158. response2 = $0
  159. expect.fulfill()
  160. }
  161. waitForExpectations(timeout: timeout)
  162. // Then
  163. XCTAssertEqual(response1?.request?.headers["Authorization"], "Bearer a1")
  164. XCTAssertEqual(response2?.request?.headers["Authorization"], "Bearer a1")
  165. XCTAssertEqual(response1?.result.isSuccess, true)
  166. XCTAssertEqual(response2?.result.isSuccess, true)
  167. XCTAssertEqual(authenticator.applyCount, 2)
  168. XCTAssertEqual(authenticator.refreshCount, 1)
  169. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 0)
  170. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  171. XCTAssertEqual(request1.retryCount, 0)
  172. XCTAssertEqual(request2.retryCount, 0)
  173. }
  174. func testThatInterceptorThrowsMissingCredentialErrorWhenCredentialIsNil() {
  175. // Given
  176. let authenticator = TestAuthenticator()
  177. let interceptor = AuthenticationInterceptor(authenticator: authenticator)
  178. let urlRequest = URLRequest.makeHTTPBinRequest()
  179. let session = Session()
  180. let expect = expectation(description: "request should complete")
  181. var response: AFDataResponse<Data?>?
  182. // When
  183. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  184. response = $0
  185. expect.fulfill()
  186. }
  187. waitForExpectations(timeout: timeout)
  188. // Then
  189. XCTAssertEqual(response?.request?.headers.count, 0)
  190. XCTAssertEqual(response?.result.isFailure, true)
  191. XCTAssertEqual(response?.result.failure?.asAFError?.isRequestAdaptationError, true)
  192. XCTAssertEqual(response?.result.failure?.asAFError?.underlyingError as? AuthenticationError, .missingCredential)
  193. XCTAssertEqual(authenticator.applyCount, 0)
  194. XCTAssertEqual(authenticator.refreshCount, 0)
  195. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 0)
  196. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  197. XCTAssertEqual(request.retryCount, 0)
  198. }
  199. func testThatInterceptorRethrowsRefreshErrorFromAdapt() {
  200. // Given
  201. let credential = TestCredential(requiresRefresh: true)
  202. let authenticator = TestAuthenticator(refreshResult: .failure(TestAuthError.refreshNetworkFailure))
  203. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  204. let session = Session()
  205. let urlRequest = URLRequest.makeHTTPBinRequest()
  206. let expect = expectation(description: "request should complete")
  207. var response: AFDataResponse<Data?>?
  208. // When
  209. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  210. response = $0
  211. expect.fulfill()
  212. }
  213. waitForExpectations(timeout: timeout)
  214. // Then
  215. XCTAssertEqual(response?.request?.headers.count, 0)
  216. XCTAssertEqual(response?.result.isFailure, true)
  217. XCTAssertEqual(response?.result.failure?.asAFError?.isRequestAdaptationError, true)
  218. XCTAssertEqual(response?.result.failure?.asAFError?.underlyingError as? TestAuthError, .refreshNetworkFailure)
  219. if case let .requestRetryFailed(_, originalError) = response?.result.failure {
  220. XCTAssertEqual(originalError.asAFError?.isResponseValidationError, true)
  221. XCTAssertEqual(originalError.asAFError?.responseCode, 401)
  222. }
  223. XCTAssertEqual(authenticator.applyCount, 0)
  224. XCTAssertEqual(authenticator.refreshCount, 1)
  225. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 0)
  226. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  227. XCTAssertEqual(request.retryCount, 0)
  228. }
  229. // MARK: - Tests - Retry
  230. func testThatInterceptorDoesNotRetryWithoutResponse() {
  231. // Given
  232. let credential = TestCredential()
  233. let authenticator = TestAuthenticator()
  234. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  235. let urlRequest = URLRequest(url: URL(string: "/invalid/path")!)
  236. let session = Session()
  237. let expect = expectation(description: "request should complete")
  238. var response: AFDataResponse<Data?>?
  239. // When
  240. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  241. response = $0
  242. expect.fulfill()
  243. }
  244. waitForExpectations(timeout: timeout)
  245. // Then
  246. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a0")
  247. XCTAssertEqual(response?.result.isFailure, true)
  248. XCTAssertEqual(response?.result.failure?.asAFError?.isSessionTaskError, true)
  249. XCTAssertEqual(authenticator.applyCount, 1)
  250. XCTAssertEqual(authenticator.refreshCount, 0)
  251. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 0)
  252. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  253. XCTAssertEqual(request.retryCount, 0)
  254. }
  255. func testThatInterceptorDoesNotRetryWhenRequestDoesNotFailDueToAuthError() {
  256. // Given
  257. let credential = TestCredential()
  258. let authenticator = TestAuthenticator()
  259. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  260. let urlRequest = URLRequest.makeHTTPBinRequest(path: "status/500")
  261. let session = Session()
  262. let expect = expectation(description: "request should complete")
  263. var response: AFDataResponse<Data?>?
  264. // When
  265. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  266. response = $0
  267. expect.fulfill()
  268. }
  269. waitForExpectations(timeout: timeout)
  270. // Then
  271. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a0")
  272. XCTAssertEqual(response?.result.isFailure, true)
  273. XCTAssertEqual(response?.result.failure?.asAFError?.isResponseValidationError, true)
  274. XCTAssertEqual(response?.result.failure?.asAFError?.responseCode, 500)
  275. XCTAssertEqual(authenticator.applyCount, 1)
  276. XCTAssertEqual(authenticator.refreshCount, 0)
  277. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 1)
  278. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  279. XCTAssertEqual(request.retryCount, 0)
  280. }
  281. func testThatInterceptorThrowsMissingCredentialErrorWhenCredentialIsNilAndRequestShouldBeRetried() {
  282. // Given
  283. let credential = TestCredential()
  284. let authenticator = TestAuthenticator()
  285. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  286. let eventMonitor = ClosureEventMonitor()
  287. eventMonitor.requestDidCreateTask = { _, _ in interceptor.credential = nil }
  288. let session = Session(eventMonitors: [eventMonitor])
  289. let urlRequest = URLRequest.makeHTTPBinRequest(path: "status/401")
  290. let expect = expectation(description: "request should complete")
  291. var response: AFDataResponse<Data?>?
  292. // When
  293. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  294. response = $0
  295. expect.fulfill()
  296. }
  297. waitForExpectations(timeout: timeout)
  298. // Then
  299. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a0")
  300. XCTAssertEqual(response?.result.isFailure, true)
  301. XCTAssertEqual(response?.result.failure?.asAFError?.isRequestRetryError, true)
  302. XCTAssertEqual(response?.result.failure?.asAFError?.underlyingError as? AuthenticationError, .missingCredential)
  303. if case let .requestRetryFailed(_, originalError) = response?.result.failure {
  304. XCTAssertEqual(originalError.asAFError?.isResponseValidationError, true)
  305. XCTAssertEqual(originalError.asAFError?.responseCode, 401)
  306. }
  307. XCTAssertEqual(authenticator.applyCount, 1)
  308. XCTAssertEqual(authenticator.refreshCount, 0)
  309. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 1)
  310. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  311. XCTAssertEqual(request.retryCount, 0)
  312. }
  313. func testThatInterceptorRetriesRequestThatFailedWithOutdatedCredential() {
  314. // Given
  315. let credential = TestCredential()
  316. let authenticator = TestAuthenticator()
  317. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  318. let eventMonitor = ClosureEventMonitor()
  319. eventMonitor.requestDidCreateTask = { _, _ in
  320. interceptor.credential = TestCredential(accessToken: "a1",
  321. refreshToken: "r1",
  322. userID: "u0",
  323. expiration: Date(),
  324. requiresRefresh: false)
  325. }
  326. let session = Session(eventMonitors: [eventMonitor])
  327. let pathAdapter = PathAdapter(paths: ["/status/401", "/status/200"])
  328. let compositeInterceptor = Interceptor(adapters: [pathAdapter, interceptor], retriers: [interceptor])
  329. let urlRequest = URLRequest.makeHTTPBinRequest()
  330. let expect = expectation(description: "request should complete")
  331. var response: AFDataResponse<Data?>?
  332. // When
  333. let request = session.request(urlRequest, interceptor: compositeInterceptor).validate().response {
  334. response = $0
  335. expect.fulfill()
  336. }
  337. waitForExpectations(timeout: timeout)
  338. // Then
  339. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a1")
  340. XCTAssertEqual(response?.result.isSuccess, true)
  341. XCTAssertEqual(authenticator.applyCount, 2)
  342. XCTAssertEqual(authenticator.refreshCount, 0)
  343. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 1)
  344. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 1)
  345. XCTAssertEqual(request.retryCount, 1)
  346. }
  347. // Produces double lock reported in https://github.com/Alamofire/Alamofire/issues/3294#issuecomment-703241558
  348. func testThatInterceptorDoesNotDeadlockWhenAuthenticatorCallsRefreshCompletionSynchronouslyOnCallingQueue() {
  349. // Given
  350. let credential = TestCredential(requiresRefresh: true)
  351. let authenticator = TestAuthenticator(shouldRefreshAsynchronously: false)
  352. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  353. let eventMonitor = ClosureEventMonitor()
  354. eventMonitor.requestDidCreateTask = { _, _ in
  355. interceptor.credential = TestCredential(accessToken: "a1",
  356. refreshToken: "r1",
  357. userID: "u0",
  358. expiration: Date(),
  359. requiresRefresh: false)
  360. }
  361. let session = Session(eventMonitors: [eventMonitor])
  362. let pathAdapter = PathAdapter(paths: ["/status/200"])
  363. let compositeInterceptor = Interceptor(adapters: [pathAdapter, interceptor], retriers: [interceptor])
  364. let urlRequest = URLRequest.makeHTTPBinRequest()
  365. let expect = expectation(description: "request should complete")
  366. var response: AFDataResponse<Data?>?
  367. // When
  368. let request = session.request(urlRequest, interceptor: compositeInterceptor).validate().response {
  369. response = $0
  370. expect.fulfill()
  371. }
  372. waitForExpectations(timeout: timeout)
  373. // Then
  374. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a1")
  375. XCTAssertEqual(response?.result.isSuccess, true)
  376. XCTAssertEqual(authenticator.applyCount, 1)
  377. XCTAssertEqual(authenticator.refreshCount, 1)
  378. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 0)
  379. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 0)
  380. XCTAssertEqual(request.retryCount, 0)
  381. }
  382. func testThatInterceptorRetriesRequestAfterRefresh() {
  383. // Given
  384. let credential = TestCredential()
  385. let authenticator = TestAuthenticator()
  386. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  387. let pathAdapter = PathAdapter(paths: ["/status/401", "/status/200"])
  388. let compositeInterceptor = Interceptor(adapters: [pathAdapter, interceptor], retriers: [interceptor])
  389. let session = Session()
  390. let urlRequest = URLRequest.makeHTTPBinRequest()
  391. let expect = expectation(description: "request should complete")
  392. var response: AFDataResponse<Data?>?
  393. // When
  394. let request = session.request(urlRequest, interceptor: compositeInterceptor).validate().response {
  395. response = $0
  396. expect.fulfill()
  397. }
  398. waitForExpectations(timeout: timeout)
  399. // Then
  400. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a1")
  401. XCTAssertEqual(response?.result.isSuccess, true)
  402. XCTAssertEqual(authenticator.applyCount, 2)
  403. XCTAssertEqual(authenticator.refreshCount, 1)
  404. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 1)
  405. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 1)
  406. XCTAssertEqual(request.retryCount, 1)
  407. }
  408. func testThatInterceptorRethrowsRefreshErrorFromRetry() {
  409. // Given
  410. let credential = TestCredential()
  411. let authenticator = TestAuthenticator(refreshResult: .failure(TestAuthError.refreshNetworkFailure))
  412. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  413. let session = Session()
  414. let urlRequest = URLRequest.makeHTTPBinRequest(path: "/status/401")
  415. let expect = expectation(description: "request should complete")
  416. var response: AFDataResponse<Data?>?
  417. // When
  418. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  419. response = $0
  420. expect.fulfill()
  421. }
  422. waitForExpectations(timeout: timeout)
  423. // Then
  424. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a0")
  425. XCTAssertEqual(response?.result.isFailure, true)
  426. XCTAssertEqual(response?.result.failure?.asAFError?.isRequestRetryError, true)
  427. XCTAssertEqual(response?.result.failure?.asAFError?.underlyingError as? TestAuthError, .refreshNetworkFailure)
  428. if case let .requestRetryFailed(_, originalError) = response?.result.failure {
  429. XCTAssertEqual(originalError.asAFError?.isResponseValidationError, true)
  430. XCTAssertEqual(originalError.asAFError?.responseCode, 401)
  431. }
  432. XCTAssertEqual(authenticator.applyCount, 1)
  433. XCTAssertEqual(authenticator.refreshCount, 1)
  434. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 1)
  435. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 1)
  436. XCTAssertEqual(request.retryCount, 0)
  437. }
  438. func testThatInterceptorTriggersRefreshWithMultipleParallelRequestsReturning401Responses() {
  439. // Given
  440. let credential = TestCredential()
  441. let authenticator = TestAuthenticator()
  442. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  443. let requestCount = 6
  444. let urlRequest = URLRequest.makeHTTPBinRequest()
  445. let session = Session()
  446. let expect = expectation(description: "both requests should complete")
  447. expect.expectedFulfillmentCount = requestCount
  448. var requests: [Int: Request] = [:]
  449. var responses: [Int: AFDataResponse<Data?>] = [:]
  450. for index in 0..<requestCount {
  451. let pathAdapter = PathAdapter(paths: ["/status/401", "/status/20\(index)"])
  452. let compositeInterceptor = Interceptor(adapters: [pathAdapter, interceptor], retriers: [interceptor])
  453. // When
  454. let request = session.request(urlRequest, interceptor: compositeInterceptor).validate().response {
  455. responses[index] = $0
  456. expect.fulfill()
  457. }
  458. requests[index] = request
  459. }
  460. waitForExpectations(timeout: timeout)
  461. // Then
  462. for index in 0..<requestCount {
  463. let response = responses[index]
  464. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a1")
  465. XCTAssertEqual(response?.result.isSuccess, true)
  466. let request = requests[index]
  467. XCTAssertEqual(request?.retryCount, 1)
  468. }
  469. XCTAssertEqual(authenticator.applyCount, 12)
  470. XCTAssertEqual(authenticator.refreshCount, 1)
  471. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 6)
  472. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 6)
  473. }
  474. // MARK: - Tests - Excessive Refresh
  475. func testThatInterceptorIgnoresExcessiveRefreshWhenRefreshWindowIsNil() {
  476. // Given
  477. let credential = TestCredential()
  478. let authenticator = TestAuthenticator()
  479. let interceptor = AuthenticationInterceptor(authenticator: authenticator, credential: credential)
  480. let pathAdapter = PathAdapter(paths: ["/status/401",
  481. "/status/401",
  482. "/status/401",
  483. "/status/401",
  484. "/status/401",
  485. "/status/200"])
  486. let compositeInterceptor = Interceptor(adapters: [pathAdapter, interceptor], retriers: [interceptor])
  487. let session = Session()
  488. let urlRequest = URLRequest.makeHTTPBinRequest()
  489. let expect = expectation(description: "request should complete")
  490. var response: AFDataResponse<Data?>?
  491. // When
  492. let request = session.request(urlRequest, interceptor: compositeInterceptor).validate().response {
  493. response = $0
  494. expect.fulfill()
  495. }
  496. waitForExpectations(timeout: timeout)
  497. // Then
  498. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a5")
  499. XCTAssertEqual(response?.result.isSuccess, true)
  500. XCTAssertEqual(authenticator.applyCount, 6)
  501. XCTAssertEqual(authenticator.refreshCount, 5)
  502. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 5)
  503. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 5)
  504. XCTAssertEqual(request.retryCount, 5)
  505. }
  506. func testThatInterceptorThrowsExcessiveRefreshErrorWhenExcessiveRefreshOccurs() {
  507. // Given
  508. let credential = TestCredential()
  509. let authenticator = TestAuthenticator()
  510. let interceptor = AuthenticationInterceptor(authenticator: authenticator,
  511. credential: credential,
  512. refreshWindow: .init(interval: 30, maximumAttempts: 2))
  513. let session = Session()
  514. let urlRequest = URLRequest.makeHTTPBinRequest(path: "/status/401")
  515. let expect = expectation(description: "request should complete")
  516. var response: AFDataResponse<Data?>?
  517. // When
  518. let request = session.request(urlRequest, interceptor: interceptor).validate().response {
  519. response = $0
  520. expect.fulfill()
  521. }
  522. waitForExpectations(timeout: timeout)
  523. // Then
  524. XCTAssertEqual(response?.request?.headers["Authorization"], "Bearer a2")
  525. XCTAssertEqual(response?.result.isFailure, true)
  526. XCTAssertEqual(response?.result.failure?.asAFError?.isRequestRetryError, true)
  527. XCTAssertEqual(response?.result.failure?.asAFError?.underlyingError as? AuthenticationError, .excessiveRefresh)
  528. if case let .requestRetryFailed(_, originalError) = response?.result.failure {
  529. XCTAssertEqual(originalError.asAFError?.isResponseValidationError, true)
  530. XCTAssertEqual(originalError.asAFError?.responseCode, 401)
  531. }
  532. XCTAssertEqual(authenticator.applyCount, 3)
  533. XCTAssertEqual(authenticator.refreshCount, 2)
  534. XCTAssertEqual(authenticator.didRequestFailDueToAuthErrorCount, 3)
  535. XCTAssertEqual(authenticator.isRequestAuthenticatedWithCredentialCount, 3)
  536. XCTAssertEqual(request.retryCount, 2)
  537. }
  538. }