Index: chrome/browser/sync/engine/apply_updates_command_unittest.cc |
diff --git a/chrome/browser/sync/engine/apply_updates_command_unittest.cc b/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
index b951e4fd6b3dcb3afb66b92907f3d763c13d482e..2266c2edbf746f132fd3eb9ecdf353a577ca31df 100644 |
--- a/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
+++ b/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
@@ -63,6 +63,7 @@ class ApplyUpdatesCommandTest : public SyncerCommandTest { |
(*mutable_routing_info())[syncable::PASSWORDS] = GROUP_PASSWORD; |
(*mutable_routing_info())[syncable::NIGORI] = GROUP_PASSIVE; |
SyncerCommandTest::SetUp(); |
+ ExpectNoGroupsToChange(apply_updates_command_); |
} |
// Create a new unapplied folder node with a parent. |
@@ -160,6 +161,7 @@ TEST_F(ApplyUpdatesCommandTest, Simple) { |
DefaultBookmarkSpecifics(), |
"parent"); |
+ ExpectGroupToChange(apply_updates_command_, GROUP_UI); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -195,6 +197,7 @@ TEST_F(ApplyUpdatesCommandTest, UpdateWithChildrenBeforeParents) { |
DefaultBookmarkSpecifics(), |
"parent"); |
+ ExpectGroupToChange(apply_updates_command_, GROUP_UI); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -218,6 +221,7 @@ TEST_F(ApplyUpdatesCommandTest, NestedItemsWithUnknownParent) { |
DefaultBookmarkSpecifics(), |
"some_item"); |
+ ExpectGroupToChange(apply_updates_command_, GROUP_UI); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -254,6 +258,7 @@ TEST_F(ApplyUpdatesCommandTest, ItemsBothKnownAndUnknown) { |
DefaultBookmarkSpecifics(), |
root_server_id); |
+ ExpectGroupToChange(apply_updates_command_, GROUP_UI); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -292,6 +297,7 @@ TEST_F(ApplyUpdatesCommandTest, DecryptablePassword) { |
specifics.MutableExtension(sync_pb::password)->mutable_encrypted()); |
CreateUnappliedNewItem("item", specifics, false); |
+ ExpectGroupToChange(apply_updates_command_, GROUP_PASSWORD); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -320,6 +326,7 @@ TEST_F(ApplyUpdatesCommandTest, UndecryptableData) { |
encrypted_password.MutableExtension(sync_pb::password); |
CreateUnappliedNewItem("item3", encrypted_password, false); |
+ ExpectGroupsToChange(apply_updates_command_, GROUP_UI, GROUP_PASSWORD); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -394,6 +401,7 @@ TEST_F(ApplyUpdatesCommandTest, SomeUndecryptablePassword) { |
CreateUnappliedNewItem("item2", specifics, false); |
} |
+ ExpectGroupToChange(apply_updates_command_, GROUP_PASSWORD); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -448,6 +456,7 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdate) { |
specifics, true); |
EXPECT_FALSE(cryptographer->has_pending_keys()); |
+ ExpectGroupToChange(apply_updates_command_, GROUP_PASSIVE); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -499,6 +508,7 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdateForDisabledTypes) { |
specifics, true); |
EXPECT_FALSE(cryptographer->has_pending_keys()); |
+ ExpectGroupToChange(apply_updates_command_, GROUP_PASSIVE); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -586,6 +596,7 @@ TEST_F(ApplyUpdatesCommandTest, EncryptUnsyncedChanges) { |
EXPECT_EQ(2*batch_s+1, handles.size()); |
} |
+ ExpectGroupToChange(apply_updates_command_, GROUP_PASSIVE); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |
@@ -688,6 +699,7 @@ TEST_F(ApplyUpdatesCommandTest, CannotEncryptUnsyncedChanges) { |
EXPECT_EQ(2*batch_s+1, handles.size()); |
} |
+ ExpectGroupToChange(apply_updates_command_, GROUP_PASSIVE); |
apply_updates_command_.ExecuteImpl(session()); |
sessions::StatusController* status = session()->mutable_status_controller(); |