Index: chrome/browser/sync/engine/apply_updates_command_unittest.cc |
diff --git a/chrome/browser/sync/engine/apply_updates_command_unittest.cc b/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
index 734f9207fd97a14ed67c7dbbb6dd549fb0167865..cadc14fe77963d49fa592f18d1a26970091db6b3 100644 |
--- a/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
+++ b/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
@@ -27,7 +27,6 @@ namespace browser_sync { |
using sessions::SyncSession; |
using std::string; |
using syncable::Entry; |
-using syncable::GetAllRealModelTypes; |
using syncable::Id; |
using syncable::MutableEntry; |
using syncable::ReadTransaction; |
@@ -427,16 +426,16 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdate) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelTypeSet encrypted_types; |
- encrypted_types.insert(syncable::PASSWORDS); |
- encrypted_types.insert(syncable::NIGORI); |
+ syncable::ModelEnumSet encrypted_types; |
+ encrypted_types.Put(syncable::PASSWORDS); |
+ encrypted_types.Put(syncable::NIGORI); |
{ |
ScopedDirLookup dir(syncdb()->manager(), syncdb()->name()); |
ASSERT_TRUE(dir.good()); |
ReadTransaction trans(FROM_HERE, dir); |
cryptographer = |
session()->context()->directory_manager()->GetCryptographer(&trans); |
- EXPECT_EQ(encrypted_types, cryptographer->GetEncryptedTypes()); |
+ EXPECT_TRUE(cryptographer->GetEncryptedTypes().Equals(encrypted_types)); |
} |
// Nigori node updates should update the Cryptographer. |
@@ -449,7 +448,7 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdate) { |
specifics.MutableExtension(sync_pb::nigori); |
other_cryptographer.GetKeys(nigori->mutable_encrypted()); |
nigori->set_encrypt_bookmarks(true); |
- encrypted_types.insert(syncable::BOOKMARKS); |
+ encrypted_types.Put(syncable::BOOKMARKS); |
CreateUnappliedNewItem(syncable::ModelTypeToRootTag(syncable::NIGORI), |
specifics, true); |
EXPECT_FALSE(cryptographer->has_pending_keys()); |
@@ -470,23 +469,25 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdate) { |
EXPECT_FALSE(cryptographer->is_ready()); |
EXPECT_TRUE(cryptographer->has_pending_keys()); |
- EXPECT_EQ(GetAllRealModelTypes(), cryptographer->GetEncryptedTypes()); |
+ EXPECT_TRUE( |
+ cryptographer->GetEncryptedTypes() |
+ .Equals(syncable::ModelEnumSet::All())); |
} |
TEST_F(ApplyUpdatesCommandTest, NigoriUpdateForDisabledTypes) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelTypeSet encrypted_types; |
- encrypted_types.insert(syncable::PASSWORDS); |
- encrypted_types.insert(syncable::NIGORI); |
+ syncable::ModelEnumSet encrypted_types; |
+ encrypted_types.Put(syncable::PASSWORDS); |
+ encrypted_types.Put(syncable::NIGORI); |
{ |
ScopedDirLookup dir(syncdb()->manager(), syncdb()->name()); |
ASSERT_TRUE(dir.good()); |
ReadTransaction trans(FROM_HERE, dir); |
cryptographer = |
session()->context()->directory_manager()->GetCryptographer(&trans); |
- EXPECT_EQ(encrypted_types, cryptographer->GetEncryptedTypes()); |
+ EXPECT_TRUE(cryptographer->GetEncryptedTypes().Equals(encrypted_types)); |
} |
// Nigori node updates should update the Cryptographer. |
@@ -500,8 +501,8 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdateForDisabledTypes) { |
other_cryptographer.GetKeys(nigori->mutable_encrypted()); |
nigori->set_encrypt_sessions(true); |
nigori->set_encrypt_themes(true); |
- encrypted_types.insert(syncable::SESSIONS); |
- encrypted_types.insert(syncable::THEMES); |
+ encrypted_types.Put(syncable::SESSIONS); |
+ encrypted_types.Put(syncable::THEMES); |
CreateUnappliedNewItem(syncable::ModelTypeToRootTag(syncable::NIGORI), |
specifics, true); |
EXPECT_FALSE(cryptographer->has_pending_keys()); |
@@ -522,23 +523,25 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdateForDisabledTypes) { |
EXPECT_FALSE(cryptographer->is_ready()); |
EXPECT_TRUE(cryptographer->has_pending_keys()); |
- EXPECT_EQ(GetAllRealModelTypes(), cryptographer->GetEncryptedTypes()); |
+ EXPECT_TRUE( |
+ cryptographer->GetEncryptedTypes() |
+ .Equals(syncable::ModelEnumSet::All())); |
} |
TEST_F(ApplyUpdatesCommandTest, EncryptUnsyncedChanges) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelTypeSet encrypted_types; |
- encrypted_types.insert(syncable::PASSWORDS); |
- encrypted_types.insert(syncable::NIGORI); |
+ syncable::ModelEnumSet encrypted_types; |
+ encrypted_types.Put(syncable::PASSWORDS); |
+ encrypted_types.Put(syncable::NIGORI); |
{ |
ScopedDirLookup dir(syncdb()->manager(), syncdb()->name()); |
ASSERT_TRUE(dir.good()); |
ReadTransaction trans(FROM_HERE, dir); |
cryptographer = |
session()->context()->directory_manager()->GetCryptographer(&trans); |
- EXPECT_EQ(encrypted_types, cryptographer->GetEncryptedTypes()); |
+ EXPECT_TRUE(cryptographer->GetEncryptedTypes().Equals(encrypted_types)); |
// With default encrypted_types, this should be true. |
@@ -576,7 +579,7 @@ TEST_F(ApplyUpdatesCommandTest, EncryptUnsyncedChanges) { |
specifics.MutableExtension(sync_pb::nigori); |
cryptographer->GetKeys(nigori->mutable_encrypted()); |
nigori->set_encrypt_bookmarks(true); |
- encrypted_types.insert(syncable::BOOKMARKS); |
+ encrypted_types.Put(syncable::BOOKMARKS); |
CreateUnappliedNewItem(syncable::ModelTypeToRootTag(syncable::NIGORI), |
specifics, true); |
EXPECT_FALSE(cryptographer->has_pending_keys()); |
@@ -618,7 +621,8 @@ TEST_F(ApplyUpdatesCommandTest, EncryptUnsyncedChanges) { |
// If ProcessUnsyncedChangesForEncryption worked, all our unsynced changes |
// should be encrypted now. |
- EXPECT_EQ(GetAllRealModelTypes(), cryptographer->GetEncryptedTypes()); |
+ EXPECT_TRUE(syncable::ModelEnumSet::All().Equals( |
+ cryptographer->GetEncryptedTypes())); |
EXPECT_TRUE(VerifyUnsyncedChangesAreEncrypted(&trans, encrypted_types)); |
Syncer::UnsyncedMetaHandles handles; |
@@ -631,17 +635,16 @@ TEST_F(ApplyUpdatesCommandTest, CannotEncryptUnsyncedChanges) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelTypeSet encrypted_types; |
- encrypted_types.insert(syncable::PASSWORDS); |
- encrypted_types.insert(syncable::NIGORI); |
+ syncable::ModelEnumSet encrypted_types; |
+ encrypted_types.Put(syncable::PASSWORDS); |
+ encrypted_types.Put(syncable::NIGORI); |
{ |
ScopedDirLookup dir(syncdb()->manager(), syncdb()->name()); |
ASSERT_TRUE(dir.good()); |
ReadTransaction trans(FROM_HERE, dir); |
cryptographer = |
session()->context()->directory_manager()->GetCryptographer(&trans); |
- EXPECT_EQ(encrypted_types, cryptographer->GetEncryptedTypes()); |
- |
+ EXPECT_TRUE(cryptographer->GetEncryptedTypes().Equals(encrypted_types)); |
// With default encrypted_types, this should be true. |
EXPECT_TRUE(VerifyUnsyncedChangesAreEncrypted(&trans, encrypted_types)); |
@@ -681,7 +684,7 @@ TEST_F(ApplyUpdatesCommandTest, CannotEncryptUnsyncedChanges) { |
specifics.MutableExtension(sync_pb::nigori); |
other_cryptographer.GetKeys(nigori->mutable_encrypted()); |
nigori->set_encrypt_bookmarks(true); |
- encrypted_types.insert(syncable::BOOKMARKS); |
+ encrypted_types.Put(syncable::BOOKMARKS); |
CreateUnappliedNewItem(syncable::ModelTypeToRootTag(syncable::NIGORI), |
specifics, true); |
EXPECT_FALSE(cryptographer->has_pending_keys()); |
@@ -725,10 +728,12 @@ TEST_F(ApplyUpdatesCommandTest, CannotEncryptUnsyncedChanges) { |
// Since we're in conflict, the specifics don't reflect the unapplied |
// changes. |
EXPECT_FALSE(VerifyUnsyncedChangesAreEncrypted(&trans, encrypted_types)); |
- encrypted_types.clear(); |
- encrypted_types.insert(syncable::PASSWORDS); |
- encrypted_types.insert(syncable::BOOKMARKS); |
- EXPECT_EQ(GetAllRealModelTypes(), cryptographer->GetEncryptedTypes()); |
+ encrypted_types.Clear(); |
+ encrypted_types.Put(syncable::PASSWORDS); |
+ encrypted_types.Put(syncable::BOOKMARKS); |
+ EXPECT_TRUE( |
+ cryptographer->GetEncryptedTypes().Equals( |
+ syncable::ModelEnumSet().All())); |
Syncer::UnsyncedMetaHandles handles; |
SyncerUtil::GetUnsyncedEntries(&trans, &handles); |