Index: sync/internal_api/sync_manager_impl_unittest.cc |
diff --git a/sync/internal_api/sync_manager_impl_unittest.cc b/sync/internal_api/sync_manager_impl_unittest.cc |
index 48b81c186a3f05c00b6fcbf56e7aba569d406501..a877486b7ee432de631a11ed06816debf85487a1 100644 |
--- a/sync/internal_api/sync_manager_impl_unittest.cc |
+++ b/sync/internal_api/sync_manager_impl_unittest.cc |
@@ -227,35 +227,25 @@ class SyncApiTest : public testing::Test { |
public: |
virtual void SetUp() { |
test_user_share_.SetUp(); |
- SetUpEncryption(); |
} |
virtual void TearDown() { |
test_user_share_.TearDown(); |
} |
- void SetUpEncryption() { |
- ReadTransaction trans(FROM_HERE, test_user_share_.user_share()); |
- encryption_handler_.reset( |
- new SyncEncryptionHandlerImpl(test_user_share_.user_share(), |
- trans.GetCryptographer())); |
- trans.GetCryptographer()->SetNigoriHandler(encryption_handler_.get()); |
- } |
- |
protected: |
MessageLoop message_loop_; |
TestUserShare test_user_share_; |
- scoped_ptr<SyncEncryptionHandlerImpl> encryption_handler_; |
}; |
TEST_F(SyncApiTest, SanityCheckTest) { |
{ |
ReadTransaction trans(FROM_HERE, test_user_share_.user_share()); |
- EXPECT_TRUE(trans.GetWrappedTrans() != NULL); |
+ EXPECT_TRUE(trans.GetWrappedTrans()); |
} |
{ |
WriteTransaction trans(FROM_HERE, test_user_share_.user_share()); |
- EXPECT_TRUE(trans.GetWrappedTrans() != NULL); |
+ EXPECT_TRUE(trans.GetWrappedTrans()); |
} |
{ |
// No entries but root should exist |
@@ -485,7 +475,7 @@ TEST_F(SyncApiTest, WriteEncryptedTitle) { |
ReadTransaction trans(FROM_HERE, test_user_share_.user_share()); |
trans.GetCryptographer()->AddKey(params); |
} |
- encryption_handler_->EnableEncryptEverything(); |
+ test_user_share_.encryption_handler()->EnableEncryptEverything(); |
{ |
WriteTransaction trans(FROM_HERE, test_user_share_.user_share()); |
ReadNode root_node(&trans); |
@@ -861,7 +851,7 @@ class SyncManagerTest : public testing::Test, |
if (nigori_status == WRITE_TO_NIGORI) { |
sync_pb::NigoriSpecifics nigori; |
cryptographer->GetKeys(nigori.mutable_encrypted()); |
- cryptographer->UpdateNigoriFromEncryptedTypes( |
+ share->directory->GetNigoriHandler()->UpdateNigoriFromEncryptedTypes( |
&nigori, |
trans.GetWrappedTrans()); |
WriteNode node(&trans); |
@@ -924,9 +914,14 @@ class SyncManagerTest : public testing::Test, |
// Gets the set of encrypted types from the cryptographer |
// Note: opens a transaction. May be called from any thread. |
- syncer::ModelTypeSet GetEncryptedDataTypesForTest() { |
+ ModelTypeSet GetEncryptedTypes() { |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- return GetEncryptedTypes(&trans); |
+ return GetEncryptedTypesWithTrans(&trans); |
+ } |
+ |
+ ModelTypeSet GetEncryptedTypesWithTrans(BaseTransaction* trans) { |
+ return trans->GetDirectory()->GetNigoriHandler()-> |
+ GetEncryptedTypes(trans->GetWrappedTrans()); |
} |
void SimulateEnableNotificationsForTest() { |
@@ -1379,11 +1374,12 @@ TEST_F(SyncManagerTest, RefreshEncryptionReady) { |
EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, DEFAULT_ENCRYPTION)); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, false)); |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
- const ModelTypeSet encrypted_types = GetEncryptedDataTypesForTest(); |
+ const ModelTypeSet encrypted_types = GetEncryptedTypes(); |
EXPECT_TRUE(encrypted_types.Has(PASSWORDS)); |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
@@ -1408,10 +1404,11 @@ TEST_F(SyncManagerTest, RefreshEncryptionNotReady) { |
// is not ready. |
EXPECT_CALL(encryption_observer_, OnPassphraseRequired(_, _)).Times(1); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, false)); |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
- const ModelTypeSet encrypted_types = GetEncryptedDataTypesForTest(); |
+ const ModelTypeSet encrypted_types = GetEncryptedTypes(); |
EXPECT_TRUE(encrypted_types.Has(PASSWORDS)); // Hardcoded. |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
} |
@@ -1421,12 +1418,13 @@ TEST_F(SyncManagerTest, RefreshEncryptionEmptyNigori) { |
EXPECT_TRUE(SetUpEncryption(DONT_WRITE_NIGORI, DEFAULT_ENCRYPTION)); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()).Times(1); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, false)); |
// Should write to nigori. |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
- const ModelTypeSet encrypted_types = GetEncryptedDataTypesForTest(); |
+ const ModelTypeSet encrypted_types = GetEncryptedTypes(); |
EXPECT_TRUE(encrypted_types.Has(PASSWORDS)); // Hardcoded. |
EXPECT_FALSE(EncryptEverythingEnabledForTest()); |
@@ -1483,21 +1481,18 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_TRUE(GetEncryptedTypes(&trans).Equals( |
+ EXPECT_TRUE(GetEncryptedTypesWithTrans(&trans).Equals( |
SyncEncryptionHandler::SensitiveTypes())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
BOOKMARKS, |
false /* not encrypted */)); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
SESSIONS, |
false /* not encrypted */)); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
THEMES, |
false /* not encrypted */)); |
} |
@@ -1510,21 +1505,18 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
EXPECT_TRUE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_TRUE(GetEncryptedTypes(&trans).Equals( |
+ EXPECT_TRUE(GetEncryptedTypesWithTrans(&trans).Equals( |
ModelTypeSet::All())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
BOOKMARKS, |
true /* is encrypted */)); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
SESSIONS, |
true /* is encrypted */)); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
THEMES, |
true /* is encrypted */)); |
} |
@@ -1540,20 +1532,17 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
EXPECT_TRUE(EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_TRUE(GetEncryptedTypes(&trans).Equals(ModelTypeSet::All())); |
+ EXPECT_TRUE(GetEncryptedTypesWithTrans(&trans).Equals(ModelTypeSet::All())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
BOOKMARKS, |
true /* is encrypted */)); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
SESSIONS, |
true /* is encrypted */)); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
THEMES, |
true /* is encrypted */)); |
} |
@@ -2014,7 +2003,6 @@ TEST_F(SyncManagerTest, EncryptBookmarksWithLegacyData) { |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
BOOKMARKS, |
false /* not encrypted */)); |
} |
@@ -2028,10 +2016,9 @@ TEST_F(SyncManagerTest, EncryptBookmarksWithLegacyData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_TRUE(GetEncryptedTypes(&trans).Equals(ModelTypeSet::All())); |
+ EXPECT_TRUE(GetEncryptedTypesWithTrans(&trans).Equals(ModelTypeSet::All())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
- trans.GetCryptographer(), |
BOOKMARKS, |
true /* is encrypted */)); |
@@ -2114,6 +2101,7 @@ TEST_F(SyncManagerTest, UpdateEntryWithEncryption) { |
EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, FULL_ENCRYPTION)); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, true)); |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
{ |
@@ -2161,6 +2149,7 @@ TEST_F(SyncManagerTest, UpdateEntryWithEncryption) { |
testing::Mock::VerifyAndClearExpectations(&encryption_observer_); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, false)); |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
@@ -2367,6 +2356,7 @@ TEST_F(SyncManagerTest, UpdatePasswordReencryptEverything) { |
testing::Mock::VerifyAndClearExpectations(&encryption_observer_); |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, false)); |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
EXPECT_FALSE(ResetUnsyncedEntry(PASSWORDS, client_tag)); |
@@ -2429,6 +2419,7 @@ TEST_F(SyncManagerTest, SetBookmarkTitleWithEncryption) { |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, FULL_ENCRYPTION)); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, true)); |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
EXPECT_TRUE(ResetUnsyncedEntry(BOOKMARKS, client_tag)); |
@@ -2525,6 +2516,7 @@ TEST_F(SyncManagerTest, SetNonBookmarkTitleWithEncryption) { |
EXPECT_CALL(encryption_observer_, OnEncryptionComplete()); |
EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, FULL_ENCRYPTION)); |
EXPECT_CALL(encryption_observer_, OnCryptographerStateChanged(_)); |
+ EXPECT_CALL(encryption_observer_, OnEncryptedTypesChanged(_, true)); |
sync_manager_.GetEncryptionHandler()->Init(); |
PumpLoop(); |
EXPECT_TRUE(ResetUnsyncedEntry(PREFERENCES, client_tag)); |