//-----------------------------------------------------------------------
//
// Copyright (c) Andrew Arnott. All rights reserved.
//
//-----------------------------------------------------------------------
namespace DotNetOpenAuth.Test.Mocks {
using System;
using System.Collections.Generic;
using System.Diagnostics;
using System.Linq;
using DotNetOpenAuth.OAuth.ChannelElements;
using DotNetOpenAuth.OAuth.Messages;
internal class InMemoryTokenManager : IConsumerTokenManager, IServiceProviderTokenManager {
private Dictionary consumersAndSecrets = new Dictionary();
private Dictionary tokensAndSecrets = new Dictionary();
private Dictionary tokensAndVerifiers = new Dictionary();
///
/// Request tokens that have been issued, and whether they have been authorized yet.
///
private Dictionary requestTokens = new Dictionary();
///
/// Access tokens that have been issued and have not yet expired.
///
private List accessTokens = new List();
#region IConsumerTokenManager Members
public string ConsumerKey {
get { return this.consumersAndSecrets.Keys.Single(); }
}
public string ConsumerSecret {
get { return this.consumersAndSecrets.Values.Single(); }
}
#endregion
#region ITokenManager Members
public string GetTokenSecret(string token) {
return this.tokensAndSecrets[token];
}
public void StoreNewRequestToken(UnauthorizedTokenRequest request, ITokenSecretContainingMessage response) {
this.tokensAndSecrets[response.Token] = response.TokenSecret;
this.requestTokens.Add(response.Token, false);
}
///
/// Checks whether a given request token has already been authorized
/// by some user for use by the Consumer that requested it.
///
/// The Consumer's request token.
///
/// True if the request token has already been fully authorized by the user
/// who owns the relevant protected resources. False if the token has not yet
/// been authorized, has expired or does not exist.
///
public bool IsRequestTokenAuthorized(string requestToken) {
return this.requestTokens[requestToken];
}
public void ExpireRequestTokenAndStoreNewAccessToken(string consumerKey, string requestToken, string accessToken, string accessTokenSecret) {
// The following line is commented out because consumers don't mark their own tokens
// as authorized... only the SPs do. And since we multi-purpose this test class for
// both SPs and Consumers, we won't do this extra check.
////Debug.Assert(this.requestTokens[requestToken], "Unauthorized token should not be exchanged for access token.");
this.requestTokens.Remove(requestToken);
this.accessTokens.Add(accessToken);
this.tokensAndSecrets.Remove(requestToken);
this.tokensAndSecrets[accessToken] = accessTokenSecret;
}
///
/// Classifies a token as a request token or an access token.
///
/// The token to classify.
/// Request or Access token, or invalid if the token is not recognized.
public TokenType GetTokenType(string token) {
if (this.requestTokens.ContainsKey(token)) {
return TokenType.RequestToken;
} else if (this.accessTokens.Contains(token)) {
return TokenType.AccessToken;
} else {
return TokenType.InvalidToken;
}
}
#endregion
#region IServiceProviderTokenManager Members
public string GetConsumerSecret(string consumerKey) {
return this.consumersAndSecrets[consumerKey];
}
public void SetRequestTokenVerifier(string requestToken, string verifier) {
this.tokensAndVerifiers[requestToken] = verifier;
}
public string GetRequestTokenVerifier(string requestToken) {
return this.tokensAndVerifiers[requestToken];
}
#endregion
///
/// Tells a Service Provider's token manager about a consumer and its secret
/// so that the SP can verify the Consumer's signed messages.
///
/// The consumer description.
internal void AddConsumer(ConsumerDescription consumerDescription) {
this.consumersAndSecrets.Add(consumerDescription.ConsumerKey, consumerDescription.ConsumerSecret);
}
///
/// Marks an existing token as authorized.
///
/// The request token.
internal void AuthorizeRequestToken(string requestToken) {
if (requestToken == null) {
throw new ArgumentNullException("requestToken");
}
this.requestTokens[requestToken] = true;
}
}
}