| Index: chrome/browser/sync/internal_api/syncapi_unittest.cc
|
| diff --git a/chrome/browser/sync/internal_api/syncapi_unittest.cc b/chrome/browser/sync/internal_api/syncapi_unittest.cc
|
| index 24dcffa8e36f8021aef6456e6544986a562aa85d..fd993c24485d398204aa83e5d865e3b16805b94d 100644
|
| --- a/chrome/browser/sync/internal_api/syncapi_unittest.cc
|
| +++ b/chrome/browser/sync/internal_api/syncapi_unittest.cc
|
| @@ -629,7 +629,9 @@ class SyncManagerObserverMock : public SyncManager::Observer {
|
| MOCK_METHOD1(OnUpdatedToken, void(const std::string&)); // NOLINT
|
| MOCK_METHOD0(OnClearServerDataFailed, void()); // NOLINT
|
| MOCK_METHOD0(OnClearServerDataSucceeded, void()); // NOLINT
|
| - MOCK_METHOD1(OnEncryptionComplete, void(const ModelTypeSet&)); // NOLINT
|
| + MOCK_METHOD2(OnEncryptedTypesChanged,
|
| + void(const ModelTypeSet&, bool)); // NOLINT
|
| + MOCK_METHOD0(OnEncryptionComplete, void()); // NOLINT
|
| MOCK_METHOD1(OnActionableError,
|
| void(const browser_sync::SyncProtocolError&)); // NOLINT
|
| };
|
| @@ -1195,9 +1197,9 @@ TEST_F(SyncManagerTest, RefreshEncryptionReady) {
|
| EXPECT_TRUE(SetUpEncryption());
|
| sync_manager_.RefreshEncryption();
|
| syncable::ModelTypeSet encrypted_types =
|
| - sync_manager_.GetEncryptedDataTypes();
|
| + sync_manager_.GetEncryptedDataTypesForTest();
|
| EXPECT_EQ(1U, encrypted_types.count(syncable::PASSWORDS));
|
| - EXPECT_FALSE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_FALSE(sync_manager_.EncryptEverythingEnabledForTest());
|
| }
|
|
|
| // Attempt to refresh encryption when nigori not downloaded.
|
| @@ -1205,16 +1207,18 @@ TEST_F(SyncManagerTest, RefreshEncryptionNotReady) {
|
| // Don't set up encryption (no nigori node created).
|
| sync_manager_.RefreshEncryption(); // Should fail.
|
| syncable::ModelTypeSet encrypted_types =
|
| - sync_manager_.GetEncryptedDataTypes();
|
| + sync_manager_.GetEncryptedDataTypesForTest();
|
| EXPECT_EQ(1U, encrypted_types.count(syncable::PASSWORDS)); // Hardcoded.
|
| - EXPECT_FALSE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_FALSE(sync_manager_.EncryptEverythingEnabledForTest());
|
| }
|
|
|
| TEST_F(SyncManagerTest, EncryptDataTypesWithNoData) {
|
| EXPECT_TRUE(SetUpEncryption());
|
| - EXPECT_CALL(observer_, OnEncryptionComplete(GetAllRealModelTypes()));
|
| + EXPECT_CALL(observer_,
|
| + OnEncryptedTypesChanged(GetAllRealModelTypes(), true));
|
| + EXPECT_CALL(observer_, OnEncryptionComplete());
|
| sync_manager_.EnableEncryptEverything();
|
| - EXPECT_TRUE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest());
|
| }
|
|
|
| TEST_F(SyncManagerTest, EncryptDataTypesWithData) {
|
| @@ -1262,9 +1266,11 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) {
|
| false /* not encrypted */));
|
| }
|
|
|
| - EXPECT_CALL(observer_, OnEncryptionComplete(GetAllRealModelTypes()));
|
| + EXPECT_CALL(observer_,
|
| + OnEncryptedTypesChanged(GetAllRealModelTypes(), true));
|
| + EXPECT_CALL(observer_, OnEncryptionComplete());
|
| sync_manager_.EnableEncryptEverything();
|
| - EXPECT_TRUE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest());
|
| {
|
| ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
|
| EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans));
|
| @@ -1284,10 +1290,10 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) {
|
|
|
| // Trigger's a ReEncryptEverything with new passphrase.
|
| testing::Mock::VerifyAndClearExpectations(&observer_);
|
| - EXPECT_CALL(observer_, OnPassphraseAccepted(_)).Times(1);
|
| - EXPECT_CALL(observer_, OnEncryptionComplete(GetAllRealModelTypes())).Times(1);
|
| + EXPECT_CALL(observer_, OnPassphraseAccepted(_));
|
| + EXPECT_CALL(observer_, OnEncryptionComplete());
|
| sync_manager_.SetPassphrase("new_passphrase", true);
|
| - EXPECT_TRUE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest());
|
| {
|
| ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
|
| EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans));
|
| @@ -1309,7 +1315,7 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) {
|
| // TODO(zea): add logic to ensure nothing was written.
|
| testing::Mock::VerifyAndClearExpectations(&observer_);
|
| EXPECT_CALL(observer_, OnPassphraseAccepted(_)).Times(0);
|
| - EXPECT_CALL(observer_, OnEncryptionComplete(GetAllRealModelTypes())).Times(1);
|
| + EXPECT_CALL(observer_, OnEncryptionComplete());
|
| sync_manager_.EnableEncryptEverything();
|
| }
|
|
|
| @@ -1328,9 +1334,9 @@ TEST_F(SyncManagerTest, SetPassphraseWithPassword) {
|
| password_node.SetPasswordSpecifics(data);
|
| }
|
| EXPECT_CALL(observer_, OnPassphraseAccepted(_));
|
| - EXPECT_CALL(observer_, OnEncryptionComplete(_));
|
| + EXPECT_CALL(observer_, OnEncryptionComplete());
|
| sync_manager_.SetPassphrase("new_passphrase", true);
|
| - EXPECT_FALSE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_FALSE(sync_manager_.EncryptEverythingEnabledForTest());
|
| {
|
| ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
|
| ReadNode password_node(&trans);
|
| @@ -1357,9 +1363,9 @@ TEST_F(SyncManagerTest, SetPassphraseWithEmptyPasswordNode) {
|
| node_id = password_node.GetId();
|
| }
|
| EXPECT_CALL(observer_, OnPassphraseAccepted(_));
|
| - EXPECT_CALL(observer_, OnEncryptionComplete(_));
|
| + EXPECT_CALL(observer_, OnEncryptionComplete());
|
| sync_manager_.SetPassphrase("new_passphrase", true);
|
| - EXPECT_FALSE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_FALSE(sync_manager_.EncryptEverythingEnabledForTest());
|
| {
|
| ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
|
| ReadNode password_node(&trans);
|
| @@ -1445,9 +1451,11 @@ TEST_F(SyncManagerTest, EncryptBookmarksWithLegacyData) {
|
| false /* not encrypted */));
|
| }
|
|
|
| - EXPECT_CALL(observer_, OnEncryptionComplete(GetAllRealModelTypes()));
|
| + EXPECT_CALL(observer_,
|
| + OnEncryptedTypesChanged(GetAllRealModelTypes(), true));
|
| + EXPECT_CALL(observer_, OnEncryptionComplete());
|
| sync_manager_.EnableEncryptEverything();
|
| - EXPECT_TRUE(sync_manager_.EncryptEverythingEnabled());
|
| + EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest());
|
|
|
| {
|
| ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
|
|
|