//----------------------------------------------------------------------- // // Copyright (c) Andrew Arnott. All rights reserved. // //----------------------------------------------------------------------- namespace DotNetOpenAuth.Test.Mocks { using System; using System.Collections.Generic; using System.Diagnostics; using System.Linq; using DotNetOpenAuth.OAuth.ChannelElements; using DotNetOpenAuth.OAuth.Messages; internal class InMemoryTokenManager : IConsumerTokenManager, IServiceProviderTokenManager { private Dictionary consumersAndSecrets = new Dictionary(); private Dictionary tokensAndSecrets = new Dictionary(); private Dictionary tokensAndVerifiers = new Dictionary(); /// /// Request tokens that have been issued, and whether they have been authorized yet. /// private Dictionary requestTokens = new Dictionary(); /// /// Access tokens that have been issued and have not yet expired. /// private List accessTokens = new List(); #region IConsumerTokenManager Members public string ConsumerKey { get { return this.consumersAndSecrets.Keys.Single(); } } public string ConsumerSecret { get { return this.consumersAndSecrets.Values.Single(); } } #endregion #region ITokenManager Members public string GetTokenSecret(string token) { return this.tokensAndSecrets[token]; } public void StoreNewRequestToken(UnauthorizedTokenRequest request, ITokenSecretContainingMessage response) { this.tokensAndSecrets[response.Token] = response.TokenSecret; this.requestTokens.Add(response.Token, false); } /// /// Checks whether a given request token has already been authorized /// by some user for use by the Consumer that requested it. /// /// The Consumer's request token. /// /// True if the request token has already been fully authorized by the user /// who owns the relevant protected resources. False if the token has not yet /// been authorized, has expired or does not exist. /// public bool IsRequestTokenAuthorized(string requestToken) { return this.requestTokens[requestToken]; } public void ExpireRequestTokenAndStoreNewAccessToken(string consumerKey, string requestToken, string accessToken, string accessTokenSecret) { // The following line is commented out because consumers don't mark their own tokens // as authorized... only the SPs do. And since we multi-purpose this test class for // both SPs and Consumers, we won't do this extra check. ////Debug.Assert(this.requestTokens[requestToken], "Unauthorized token should not be exchanged for access token."); this.requestTokens.Remove(requestToken); this.accessTokens.Add(accessToken); this.tokensAndSecrets.Remove(requestToken); this.tokensAndSecrets[accessToken] = accessTokenSecret; } /// /// Classifies a token as a request token or an access token. /// /// The token to classify. /// Request or Access token, or invalid if the token is not recognized. public TokenType GetTokenType(string token) { if (this.requestTokens.ContainsKey(token)) { return TokenType.RequestToken; } else if (this.accessTokens.Contains(token)) { return TokenType.AccessToken; } else { return TokenType.InvalidToken; } } #endregion #region IServiceProviderTokenManager Members public string GetConsumerSecret(string consumerKey) { return this.consumersAndSecrets[consumerKey]; } public void SetRequestTokenVerifier(string requestToken, string verifier) { this.tokensAndVerifiers[requestToken] = verifier; } public string GetRequestTokenVerifier(string requestToken) { return this.tokensAndVerifiers[requestToken]; } #endregion /// /// Tells a Service Provider's token manager about a consumer and its secret /// so that the SP can verify the Consumer's signed messages. /// /// The consumer description. internal void AddConsumer(ConsumerDescription consumerDescription) { this.consumersAndSecrets.Add(consumerDescription.ConsumerKey, consumerDescription.ConsumerSecret); } /// /// Marks an existing token as authorized. /// /// The request token. internal void AuthorizeRequestToken(string requestToken) { if (requestToken == null) { throw new ArgumentNullException("requestToken"); } this.requestTokens[requestToken] = true; } } }