Index: chrome/browser/sync/signin_manager_unittest.cc |
diff --git a/chrome/browser/sync/signin_manager_unittest.cc b/chrome/browser/sync/signin_manager_unittest.cc |
index 14f51ecbc6d26d7e705dfe48712b550f9570c7dc..fdfe44084dfe0c6424405ba96a8ab12da39622fc 100644 |
--- a/chrome/browser/sync/signin_manager_unittest.cc |
+++ b/chrome/browser/sync/signin_manager_unittest.cc |
@@ -98,12 +98,13 @@ class SigninManagerTest : public TokenServiceTestHarness { |
TEST_F(SigninManagerTest, SignInClientLogin) { |
browser_sync::SetIsUsingOAuthForTest(false); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignIn("username", "password", "", ""); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateValidResponseClientLogin(); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
// Should go into token service and stop. |
EXPECT_EQ(1U, google_login_success_.size()); |
@@ -112,16 +113,16 @@ TEST_F(SigninManagerTest, SignInClientLogin) { |
// Should persist across resets. |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
-TEST_F(SigninManagerTest, ClearInMemoryData) { |
+TEST_F(SigninManagerTest, ClearTransientSigninData) { |
browser_sync::SetIsUsingOAuthForTest(false); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->StartSignIn("username", "password", "", ""); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateValidResponseClientLogin(); |
@@ -129,11 +130,12 @@ TEST_F(SigninManagerTest, ClearInMemoryData) { |
EXPECT_EQ(1U, google_login_success_.size()); |
EXPECT_EQ(0U, google_login_failure_.size()); |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
// Now clear the in memory data. |
- manager_->ClearInMemoryData(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ manager_->ClearTransientSigninData(); |
+ EXPECT_TRUE(manager_->last_result_.data.empty()); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
// Ensure preferences are not modified. |
EXPECT_FALSE( |
@@ -144,19 +146,18 @@ TEST_F(SigninManagerTest, ClearInMemoryData) { |
manager_->Initialize(profile_.get()); |
// Now make sure we have the right user name. |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
- |
// NOTE: OAuth's "StartOAuthSignIn" is called before collecting credentials |
// from the user. See also SigninManagerTest::SignInClientLogin. |
TEST_F(SigninManagerTest, SignInOAuth) { |
browser_sync::SetIsUsingOAuthForTest(true); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateValidSigninOAuth(); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
// Should go into token service and stop. |
EXPECT_EQ(1U, google_login_success_.size()); |
@@ -165,7 +166,7 @@ TEST_F(SigninManagerTest, SignInOAuth) { |
// Should persist across resets. |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
TEST_F(SigninManagerTest, SignOutClientLogin) { |
@@ -175,13 +176,13 @@ TEST_F(SigninManagerTest, SignOutClientLogin) { |
SimulateValidResponseClientLogin(); |
manager_->OnClientLoginSuccess(credentials_); |
- EXPECT_EQ("user@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
manager_->SignOut(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Should not be persisted anymore |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignOutOAuth) { |
@@ -189,16 +190,16 @@ TEST_F(SigninManagerTest, SignOutOAuth) { |
manager_->Initialize(profile_.get()); |
SimulateValidSigninOAuth(); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
- EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetUsername()); |
+ EXPECT_EQ("user-xZIuqTKu@gmail.com", manager_->GetAuthenticatedUsername()); |
manager_->SignOut(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Should not be persisted anymore |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
@@ -211,12 +212,12 @@ TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(1U, google_login_failure_.size()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
// Should not be persisted |
manager_.reset(new SigninManager()); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
@@ -229,7 +230,8 @@ TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(1U, google_login_failure_.size()); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
+ EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); |
manager_->ProvideSecondFactorAccessCode("access"); |
SimulateValidResponseClientLogin(); |
@@ -248,7 +250,8 @@ TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(1U, google_login_failure_.size()); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
+ EXPECT_FALSE(manager_->possibly_invalid_username_.empty()); |
manager_->ProvideSecondFactorAccessCode("badaccess"); |
GoogleServiceAuthError error2( |
@@ -257,7 +260,7 @@ TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(2U, google_login_failure_.size()); |
- EXPECT_FALSE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
manager_->ProvideSecondFactorAccessCode("badaccess"); |
GoogleServiceAuthError error3(GoogleServiceAuthError::CONNECTION_FAILED); |
@@ -265,7 +268,7 @@ TEST_F(SigninManagerTest, ProvideSecondFactorFailure) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(3U, google_login_failure_.size()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignOutMidConnect) { |
@@ -276,16 +279,16 @@ TEST_F(SigninManagerTest, SignOutMidConnect) { |
EXPECT_EQ(0U, google_login_success_.size()); |
EXPECT_EQ(0U, google_login_failure_.size()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |
TEST_F(SigninManagerTest, SignOutOnUserInfoSucessRaceTest) { |
browser_sync::SetIsUsingOAuthForTest(true); |
manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
SimulateSigninStartOAuth(); |
manager_->SignOut(); |
SimulateOAuthUserInfoSuccess(); |
- EXPECT_TRUE(manager_->GetUsername().empty()); |
+ EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
} |