Index: sync/internal_api/sync_manager_impl_unittest.cc |
diff --git a/sync/internal_api/sync_manager_impl_unittest.cc b/sync/internal_api/sync_manager_impl_unittest.cc |
index 022459935d6a3381703a72652d13e448dcc217ec..7c6f30cedfb7de05636d7bce8d98a4ad6f83387f 100644 |
--- a/sync/internal_api/sync_manager_impl_unittest.cc |
+++ b/sync/internal_api/sync_manager_impl_unittest.cc |
@@ -700,6 +700,7 @@ class SyncEncryptionHandlerObserverMock |
void(ModelTypeSet, bool)); // NOLINT |
MOCK_METHOD0(OnEncryptionComplete, void()); // NOLINT |
MOCK_METHOD1(OnCryptographerStateChanged, void(Cryptographer*)); // NOLINT |
+ MOCK_METHOD1(OnPassphraseStateChanged, void(PassphraseState)); // NOLINT |
}; |
class SyncNotifierMock : public SyncNotifier { |
@@ -1524,6 +1525,8 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", true); |
EXPECT_TRUE(EncryptEverythingEnabledForTest()); |
@@ -1564,8 +1567,8 @@ TEST_F(SyncManagerTest, SetInitialGaiaPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1598,8 +1601,8 @@ TEST_F(SyncManagerTest, UpdateGaiaPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1642,11 +1645,13 @@ TEST_F(SyncManagerTest, SetPassphraseWithPassword) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1698,8 +1703,8 @@ TEST_F(SyncManagerTest, SupplyPendingGAIAPass) { |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
sync_manager_.GetEncryptionHandler()->SetDecryptionPassphrase("passphrase2"); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1754,8 +1759,8 @@ TEST_F(SyncManagerTest, SupplyPendingOldGAIAPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_gaia", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
testing::Mock::VerifyAndClearExpectations(&encryption_observer_); |
{ |
@@ -1776,8 +1781,8 @@ TEST_F(SyncManagerTest, SupplyPendingOldGAIAPass) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"old_gaia", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
Cryptographer* cryptographer = trans.GetCryptographer(); |
@@ -1826,9 +1831,11 @@ TEST_F(SyncManagerTest, SupplyPendingExplicitPass) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetDecryptionPassphrase("explicit"); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1870,8 +1877,8 @@ TEST_F(SyncManagerTest, SupplyPendingGAIAPassUserProvided) { |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"passphrase", |
false); |
- EXPECT_FALSE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(IMPLICIT_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1899,11 +1906,13 @@ TEST_F(SyncManagerTest, SetPassphraseWithEmptyPasswordNode) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -2122,6 +2131,8 @@ TEST_F(SyncManagerTest, UpdateEntryWithEncryption) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
@@ -2317,11 +2328,13 @@ TEST_F(SyncManagerTest, UpdatePasswordNewPassphrase) { |
EXPECT_CALL(encryption_observer_, OnPassphraseAccepted()); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, |
+ OnPassphraseStateChanged(CUSTOM_PASSPHRASE)); |
sync_manager_.GetEncryptionHandler()->SetEncryptionPassphrase( |
"new_passphrase", |
true); |
- EXPECT_TRUE( |
- sync_manager_.GetEncryptionHandler()->IsUsingExplicitPassphrase()); |
+ EXPECT_EQ(CUSTOM_PASSPHRASE, |
akalin
2012/08/22 20:10:39
can you write a test that uses any of the other tw
Nicolas Zea
2012/08/22 20:18:33
Those will be in future CL's once the migration lo
|
+ sync_manager_.GetEncryptionHandler()->GetPassphraseState()); |
EXPECT_TRUE(ResetUnsyncedEntry(PASSWORDS, client_tag)); |
} |