Index: chrome/browser/sync/signin_manager_unittest.cc |
diff --git a/chrome/browser/sync/signin_manager_unittest.cc b/chrome/browser/sync/signin_manager_unittest.cc |
index 3121b6575bfa3e1cb6c11481cb20975c2e928c0e..a26be73353bf207599a46a3cf4b5c448a0739d98 100644 |
--- a/chrome/browser/sync/signin_manager_unittest.cc |
+++ b/chrome/browser/sync/signin_manager_unittest.cc |
@@ -99,12 +99,13 @@ class SigninManagerTest : public TokenServiceTestHarness { |
TEST_F(SigninManagerTest, SignInClientLogin) { |
browser_sync::SetIsUsingOAuthForTest(false); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignIn("username", "password", "", ""); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateValidResponseClientLogin(); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
// Should go into token service and stop. |
EXPECT_EQ(1U, google_login_success_.size()); |
@@ -113,16 +114,16 @@ TEST_F(SigninManagerTest, SignInClientLogin) { |
// Should persist across resets. |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
-TEST_F(SigninManagerTest, ClearInMemoryData) { |
+TEST_F(SigninManagerTest, ClearTransientSigninData) { |
browser_sync::SetIsUsingOAuthForTest(false); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignIn("username", "password", "", ""); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateValidResponseClientLogin(); |
@@ -130,11 +131,12 @@ TEST_F(SigninManagerTest, ClearInMemoryData) { |
EXPECT_EQ(1U, google_login_success_.size()); |
EXPECT_EQ(0U, google_login_failure_.size()); |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
// Now clear the in memory data. |
- manager_->ClearInMemoryData(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ manager_->ClearTransientSigninData(); |
+ EXPECT_TRUE(manager_->last_result_.data.empty()); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
// Ensure preferences are not modified. |
EXPECT_FALSE( |
@@ -145,19 +147,18 @@ TEST_F(SigninManagerTest, ClearInMemoryData) { |
manager_->Initialize(profile_.get()); |
// Now make sure we have the right user name. |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
- |
// NOTE: OAuth's "StartOAuthSignIn" is called before collecting credentials |
// from the user. See also SigninManagerTest::SignInClientLogin. |
TEST_F(SigninManagerTest, SignInOAuth) { |
browser_sync::SetIsUsingOAuthForTest(true); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateValidSigninOAuth(); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
// Should go into token service and stop. |
EXPECT_EQ(1U, google_login_success_.size()); |
@@ -166,7 +167,7 @@ TEST_F(SigninManagerTest, SignInOAuth) { |
// Should persist across resets. |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
TEST_F(SigninManagerTest, SignOutClientLogin) { |
@@ -176,13 +177,13 @@ TEST_F(SigninManagerTest, SignOutClientLogin) { |
SimulateValidResponseClientLogin(); |
manager_->OnClientLoginSuccess(credentials_); |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
manager_->SignOut(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Should not be persisted anymore |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignOutOAuth) { |
@@ -190,16 +191,16 @@ TEST_F(SigninManagerTest, SignOutOAuth) { |
manager_->Initialize(profile_.get()); |
SimulateValidSigninOAuth(); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
- EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetAuthenticatedUsername()); |
manager_->SignOut(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Should not be persisted anymore |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
@@ -212,12 +213,12 @@ TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(1U, google_login_failure_.size()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Should not be persisted |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
@@ -230,7 +231,8 @@ TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(1U, google_login_failure_.size()); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
+ EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); |
manager_->ProvideSecondFactorAccessCode("access"); |
SimulateValidResponseClientLogin(); |
@@ -249,7 +251,8 @@ TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(1U, google_login_failure_.size()); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
+ EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); |
manager_->ProvideSecondFactorAccessCode("badaccess"); |
GoogleServiceAuthError error2( |
@@ -258,7 +261,7 @@ TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(2U, google_login_failure_.size()); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->ProvideSecondFactorAccessCode("badaccess"); |
GoogleServiceAuthError error3(GoogleServiceAuthError::CONNECTION_FAILED); |
@@ -266,7 +269,7 @@ TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(3U, google_login_failure_.size()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignOutMidConnect) { |
@@ -277,16 +280,16 @@ TEST_F(SigninManagerTest, SignOutMidConnect) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(0U, google_login_failure_.size()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignOutOnUserInfoSucessRaceTest) { |
browser_sync::SetIsUsingOAuthForTest(true); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateSigninStartOAuth(); |
manager_->SignOut(); |
SimulateOAuthUserInfoSuccess(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |