| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/utf_string_conversions.h" | 5 #include "base/utf_string_conversions.h" |
| 6 #include "chrome/browser/password_manager/password_form_data.h" | 6 #include "chrome/browser/password_manager/password_form_data.h" |
| 7 #include "chrome/browser/sync/profile_sync_service_harness.h" | 7 #include "chrome/browser/sync/profile_sync_service_harness.h" |
| 8 #include "chrome/browser/sync/sessions/session_state.h" | 8 #include "chrome/browser/sync/sessions/session_state.h" |
| 9 #include "chrome/test/live_sync/live_passwords_sync_test.h" | 9 #include "chrome/test/live_sync/live_passwords_sync_test.h" |
| 10 | 10 |
| 11 using webkit_glue::PasswordForm; | 11 using webkit_glue::PasswordForm; |
| 12 | 12 |
| 13 static const char* kValidPassphrase = "passphrase!"; | 13 static const char* kValidPassphrase = "passphrase!"; |
| 14 | 14 |
| 15 // TODO(rsimha): See http://crbug.com/78840. | 15 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, Add) { |
| 16 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, FLAKY_Add) { | |
| 17 | 16 |
| 18 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; | 17 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; |
| 19 | 18 |
| 20 PasswordForm form = CreateTestPasswordForm(0); | 19 PasswordForm form = CreateTestPasswordForm(0); |
| 21 AddLogin(GetVerifierPasswordStore(), form); | 20 AddLogin(GetVerifierPasswordStore(), form); |
| 22 AddLogin(GetPasswordStore(0), form); | 21 AddLogin(GetPasswordStore(0), form); |
| 23 | 22 |
| 24 std::vector<PasswordForm> verifier_forms; | 23 std::vector<PasswordForm> verifier_forms; |
| 25 GetLogins(GetVerifierPasswordStore(), verifier_forms); | 24 GetLogins(GetVerifierPasswordStore(), verifier_forms); |
| 26 ASSERT_EQ(1U, verifier_forms.size()); | 25 ASSERT_EQ(1U, verifier_forms.size()); |
| 27 | 26 |
| 28 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); | 27 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); |
| 29 | 28 |
| 30 std::vector<PasswordForm> forms0; | 29 std::vector<PasswordForm> forms0; |
| 31 GetLogins(GetPasswordStore(0), forms0); | 30 GetLogins(GetPasswordStore(0), forms0); |
| 32 ASSERT_TRUE(ContainsSamePasswordForms(verifier_forms, forms0)); | 31 ASSERT_TRUE(ContainsSamePasswordForms(verifier_forms, forms0)); |
| 33 | 32 |
| 34 std::vector<PasswordForm> forms1; | 33 std::vector<PasswordForm> forms1; |
| 35 GetLogins(GetPasswordStore(1), forms1); | 34 GetLogins(GetPasswordStore(1), forms1); |
| 36 ASSERT_TRUE(ContainsSamePasswordForms(verifier_forms, forms1)); | 35 ASSERT_TRUE(ContainsSamePasswordForms(verifier_forms, forms1)); |
| 37 } | 36 } |
| 38 | 37 |
| 39 // TODO(rsimha): See http://crbug.com/78840. | 38 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, Race) { |
| 40 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, FLAKY_Race) { | |
| 41 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; | 39 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; |
| 42 | 40 |
| 43 PasswordForm form0 = CreateTestPasswordForm(0); | 41 PasswordForm form0 = CreateTestPasswordForm(0); |
| 44 AddLogin(GetPasswordStore(0), form0); | 42 AddLogin(GetPasswordStore(0), form0); |
| 45 | 43 |
| 46 PasswordForm form1 = form0; | 44 PasswordForm form1 = form0; |
| 47 form1.password_value = ASCIIToUTF16("password1"); | 45 form1.password_value = ASCIIToUTF16("password1"); |
| 48 AddLogin(GetPasswordStore(1), form1); | 46 AddLogin(GetPasswordStore(1), form1); |
| 49 | 47 |
| 50 ASSERT_TRUE(AwaitQuiescence()); | 48 ASSERT_TRUE(AwaitQuiescence()); |
| 51 | 49 |
| 52 std::vector<PasswordForm> forms0; | 50 std::vector<PasswordForm> forms0; |
| 53 GetLogins(GetPasswordStore(0), forms0); | 51 GetLogins(GetPasswordStore(0), forms0); |
| 54 ASSERT_EQ(1U, forms0.size()); | 52 ASSERT_EQ(1U, forms0.size()); |
| 55 | 53 |
| 56 std::vector<PasswordForm> forms1; | 54 std::vector<PasswordForm> forms1; |
| 57 GetLogins(GetPasswordStore(1), forms1); | 55 GetLogins(GetPasswordStore(1), forms1); |
| 58 ASSERT_EQ(1U, forms1.size()); | 56 ASSERT_EQ(1U, forms1.size()); |
| 59 | 57 |
| 60 ASSERT_TRUE(ContainsSamePasswordForms(forms0, forms1)); | 58 ASSERT_TRUE(ContainsSamePasswordForms(forms0, forms1)); |
| 61 } | 59 } |
| 62 | 60 |
| 63 // TODO(rsimha): See http://crbug.com/78840. | 61 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, SetPassphrase) { |
| 64 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, FLAKY_SetPassphrase) { | |
| 65 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; | 62 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; |
| 66 | 63 |
| 67 SetPassphrase(0, kValidPassphrase, true); | 64 SetPassphrase(0, kValidPassphrase, true); |
| 68 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); | 65 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); |
| 69 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); | 66 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); |
| 70 | 67 |
| 71 SetPassphrase(1, kValidPassphrase, false); | 68 SetPassphrase(1, kValidPassphrase, false); |
| 72 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); | 69 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); |
| 70 ASSERT_TRUE(GetClient(1)->AwaitSyncCycleCompletion("Set passphrase.")); |
| 73 } | 71 } |
| 74 | 72 |
| 75 // TODO(rsimha): See http://crbug.com/78840. | |
| 76 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, | 73 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, |
| 77 FLAKY_SetPassphraseAndAddPassword) { | 74 SetPassphraseAndAddPassword) { |
| 78 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; | 75 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; |
| 79 | 76 |
| 80 SetPassphrase(0, kValidPassphrase, true); | 77 SetPassphrase(0, kValidPassphrase, true); |
| 81 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); | 78 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); |
| 82 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); | 79 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); |
| 83 | 80 |
| 84 SetPassphrase(1, kValidPassphrase, false); | 81 SetPassphrase(1, kValidPassphrase, false); |
| 85 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); | 82 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); |
| 86 | 83 |
| 87 PasswordForm form = CreateTestPasswordForm(0); | 84 PasswordForm form = CreateTestPasswordForm(0); |
| 88 AddLogin(GetPasswordStore(0), form); | 85 AddLogin(GetPasswordStore(0), form); |
| 89 | 86 |
| 90 std::vector<PasswordForm> forms0; | 87 std::vector<PasswordForm> forms0; |
| 91 GetLogins(GetPasswordStore(0), forms0); | 88 GetLogins(GetPasswordStore(0), forms0); |
| 92 ASSERT_EQ(1U, forms0.size()); | 89 ASSERT_EQ(1U, forms0.size()); |
| 93 | 90 |
| 94 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); | 91 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); |
| 95 | 92 |
| 96 std::vector<PasswordForm> forms1; | 93 std::vector<PasswordForm> forms1; |
| 97 GetLogins(GetPasswordStore(1), forms1); | 94 GetLogins(GetPasswordStore(1), forms1); |
| 98 ASSERT_EQ(1U, forms1.size()); | 95 ASSERT_EQ(1U, forms1.size()); |
| 99 } | 96 } |
| 100 | 97 |
| 101 // TODO(rsimha): See http://crbug.com/78840. | |
| 102 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, | 98 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, |
| 103 FLAKY_SetPassphraseAndThenSetupSync) { | 99 SetPassphraseAndThenSetupSync) { |
| 104 ASSERT_TRUE(SetupClients()) << "SetupClients() failed."; | 100 ASSERT_TRUE(SetupClients()) << "SetupClients() failed."; |
| 105 | 101 |
| 106 ASSERT_TRUE(GetClient(0)->SetupSync()); | 102 ASSERT_TRUE(GetClient(0)->SetupSync()); |
| 107 SetPassphrase(0, kValidPassphrase, true); | 103 SetPassphrase(0, kValidPassphrase, true); |
| 108 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); | 104 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); |
| 109 ASSERT_TRUE(GetClient(0)->AwaitSyncCycleCompletion("Initial sync.")); | 105 ASSERT_TRUE(GetClient(0)->AwaitSyncCycleCompletion("Initial sync.")); |
| 110 | 106 |
| 107 ASSERT_FALSE(GetClient(1)->SetupSync()); |
| 111 SetPassphrase(1, kValidPassphrase, false); | 108 SetPassphrase(1, kValidPassphrase, false); |
| 112 ASSERT_TRUE(GetClient(1)->SetupSync()); | |
| 113 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); | 109 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); |
| 110 ASSERT_TRUE(GetClient(1)->AwaitSyncCycleCompletion("Initial sync.")); |
| 114 } | 111 } |
| 115 | 112 |
| 116 // TODO(rsimha): See http://crbug.com/78840. | |
| 117 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, | 113 IN_PROC_BROWSER_TEST_F(TwoClientLivePasswordsSyncTest, |
| 118 FLAKY_SetPassphraseTwice) { | 114 SetPassphraseTwice) { |
| 119 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; | 115 ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; |
| 120 | 116 |
| 121 SetPassphrase(0, kValidPassphrase, true); | 117 SetPassphrase(0, kValidPassphrase, true); |
| 122 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); | 118 ASSERT_TRUE(GetClient(0)->AwaitPassphraseAccepted()); |
| 123 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); | 119 ASSERT_TRUE(GetClient(0)->AwaitMutualSyncCycleCompletion(GetClient(1))); |
| 124 | 120 |
| 125 SetPassphrase(1, kValidPassphrase, false); | 121 SetPassphrase(1, kValidPassphrase, false); |
| 126 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); | 122 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); |
| 123 ASSERT_TRUE(GetClient(1)->AwaitSyncCycleCompletion("Set passphrase.")); |
| 127 | 124 |
| 128 SetPassphrase(1, kValidPassphrase, false); | 125 SetPassphrase(1, kValidPassphrase, false); |
| 129 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); | 126 ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); |
| 127 ASSERT_TRUE(GetClient(1)->AwaitSyncCycleCompletion("Set passphrase again.")); |
| 130 } | 128 } |
| OLD | NEW |