Index: chrome/browser/sync/internal_api/syncapi_unittest.cc |
diff --git a/chrome/browser/sync/internal_api/syncapi_unittest.cc b/chrome/browser/sync/internal_api/syncapi_unittest.cc |
index 0c3cd6f10874184c3738a5103502cb2769b863fb..86e2a83319e647807dc496fecefa90b0f312f83f 100644 |
--- a/chrome/browser/sync/internal_api/syncapi_unittest.cc |
+++ b/chrome/browser/sync/internal_api/syncapi_unittest.cc |
@@ -46,6 +46,7 @@ |
#include "chrome/browser/sync/protocol/sync.pb.h" |
#include "chrome/browser/sync/sessions/sync_session.h" |
#include "chrome/browser/sync/syncable/directory_manager.h" |
+#include "chrome/browser/sync/syncable/model_type_test_util.h" |
#include "chrome/browser/sync/syncable/syncable.h" |
#include "chrome/browser/sync/syncable/syncable_id.h" |
#include "chrome/browser/sync/test/engine/test_user_share.h" |
@@ -72,10 +73,9 @@ using browser_sync::ModelSafeWorkerRegistrar; |
using browser_sync::sessions::SyncSessionSnapshot; |
using browser_sync::WeakHandle; |
using content::BrowserThread; |
-using syncable::GetAllRealModelTypes; |
using syncable::kEncryptedString; |
+using syncable::ModelEnumSet; |
using syncable::ModelType; |
-using syncable::ModelTypeSet; |
using test::ExpectDictStringValue; |
using testing::_; |
using testing::AnyNumber; |
@@ -632,7 +632,7 @@ class SyncManagerObserverMock : public SyncManager::Observer { |
MOCK_METHOD0(OnClearServerDataFailed, void()); // NOLINT |
MOCK_METHOD0(OnClearServerDataSucceeded, void()); // NOLINT |
MOCK_METHOD2(OnEncryptedTypesChanged, |
- void(const ModelTypeSet&, bool)); // NOLINT |
+ void(ModelEnumSet, bool)); // NOLINT |
MOCK_METHOD0(OnEncryptionComplete, void()); // NOLINT |
MOCK_METHOD1(OnActionableError, |
void(const browser_sync::SyncProtocolError&)); // NOLINT |
@@ -854,7 +854,7 @@ TEST_F(SyncManagerTest, UpdateEnabledTypes) { |
} |
TEST_F(SyncManagerTest, DoNotSyncTabsInNigoriNode) { |
- syncable::ModelEnumSet encrypted_types(syncable::TYPED_URLS); |
+ const syncable::ModelEnumSet encrypted_types(syncable::TYPED_URLS); |
sync_manager_.MaybeSetSyncTabsInNigoriNode(encrypted_types); |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -864,7 +864,7 @@ TEST_F(SyncManagerTest, DoNotSyncTabsInNigoriNode) { |
} |
TEST_F(SyncManagerTest, SyncTabsInNigoriNode) { |
- syncable::ModelEnumSet encrypted_types(syncable::SESSIONS); |
+ const syncable::ModelEnumSet encrypted_types(syncable::SESSIONS); |
sync_manager_.MaybeSetSyncTabsInNigoriNode(encrypted_types); |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1159,7 +1159,8 @@ TEST_F(SyncManagerTest, OnIncomingNotification) { |
StrictMock<MockJsEventHandler> event_handler; |
const syncable::ModelEnumSet empty_model_types; |
- syncable::ModelEnumSet model_types(syncable::BOOKMARKS, syncable::THEMES); |
+ const syncable::ModelEnumSet model_types( |
+ syncable::BOOKMARKS, syncable::THEMES); |
// Build expected_args to have a single argument with the string |
// equivalents of model_types. |
@@ -1197,9 +1198,9 @@ TEST_F(SyncManagerTest, RefreshEncryptionReady) { |
EXPECT_TRUE(SetUpEncryption(true)); |
EXPECT_CALL(observer_, OnEncryptionComplete()); |
sync_manager_.RefreshEncryption(); |
- syncable::ModelTypeSet encrypted_types = |
+ const syncable::ModelEnumSet encrypted_types = |
sync_manager_.GetEncryptedDataTypesForTest(); |
- EXPECT_EQ(1U, encrypted_types.count(syncable::PASSWORDS)); |
+ EXPECT_TRUE(encrypted_types.Has(syncable::PASSWORDS)); |
EXPECT_FALSE(sync_manager_.EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1217,9 +1218,9 @@ TEST_F(SyncManagerTest, RefreshEncryptionReady) { |
TEST_F(SyncManagerTest, RefreshEncryptionNotReady) { |
// Don't set up encryption (no nigori node created). |
sync_manager_.RefreshEncryption(); // Should fail. |
- syncable::ModelTypeSet encrypted_types = |
+ const syncable::ModelEnumSet encrypted_types = |
sync_manager_.GetEncryptedDataTypesForTest(); |
- EXPECT_EQ(1U, encrypted_types.count(syncable::PASSWORDS)); // Hardcoded. |
+ EXPECT_TRUE(encrypted_types.Has(syncable::PASSWORDS)); // Hardcoded. |
EXPECT_FALSE(sync_manager_.EncryptEverythingEnabledForTest()); |
} |
@@ -1228,9 +1229,9 @@ TEST_F(SyncManagerTest, RefreshEncryptionEmptyNigori) { |
EXPECT_TRUE(SetUpEncryption(false)); |
EXPECT_CALL(observer_, OnEncryptionComplete()); |
sync_manager_.RefreshEncryption(); // Should write to nigori. |
- syncable::ModelTypeSet encrypted_types = |
+ const syncable::ModelEnumSet encrypted_types = |
sync_manager_.GetEncryptedDataTypesForTest(); |
- EXPECT_EQ(1U, encrypted_types.count(syncable::PASSWORDS)); // Hardcoded. |
+ EXPECT_TRUE(encrypted_types.Has(syncable::PASSWORDS)); // Hardcoded. |
EXPECT_FALSE(sync_manager_.EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
@@ -1247,7 +1248,8 @@ TEST_F(SyncManagerTest, RefreshEncryptionEmptyNigori) { |
TEST_F(SyncManagerTest, EncryptDataTypesWithNoData) { |
EXPECT_TRUE(SetUpEncryption(true)); |
EXPECT_CALL(observer_, |
- OnEncryptedTypesChanged(GetAllRealModelTypes(), true)); |
+ OnEncryptedTypesChanged( |
+ HasModelTypes(syncable::ModelEnumSet::All()), true)); |
EXPECT_CALL(observer_, OnEncryptionComplete()); |
sync_manager_.EnableEncryptEverything(); |
EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest()); |
@@ -1283,7 +1285,8 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_EQ(Cryptographer::SensitiveTypes(), GetEncryptedTypes(&trans)); |
+ EXPECT_TRUE(GetEncryptedTypes(&trans).Equals( |
+ Cryptographer::SensitiveTypes())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
trans.GetCryptographer(), |
@@ -1302,13 +1305,15 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
} |
EXPECT_CALL(observer_, |
- OnEncryptedTypesChanged(GetAllRealModelTypes(), true)); |
+ OnEncryptedTypesChanged( |
+ HasModelTypes(syncable::ModelEnumSet::All()), true)); |
EXPECT_CALL(observer_, OnEncryptionComplete()); |
sync_manager_.EnableEncryptEverything(); |
EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans)); |
+ EXPECT_TRUE(GetEncryptedTypes(&trans).Equals( |
+ syncable::ModelEnumSet::All())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
trans.GetCryptographer(), |
@@ -1334,7 +1339,8 @@ TEST_F(SyncManagerTest, EncryptDataTypesWithData) { |
EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans)); |
+ EXPECT_TRUE(GetEncryptedTypes(&trans).Equals( |
+ syncable::ModelEnumSet::All())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
trans.GetCryptographer(), |
@@ -1494,14 +1500,16 @@ TEST_F(SyncManagerTest, EncryptBookmarksWithLegacyData) { |
} |
EXPECT_CALL(observer_, |
- OnEncryptedTypesChanged(GetAllRealModelTypes(), true)); |
+ OnEncryptedTypesChanged( |
+ HasModelTypes(syncable::ModelEnumSet::All()), true)); |
EXPECT_CALL(observer_, OnEncryptionComplete()); |
sync_manager_.EnableEncryptEverything(); |
EXPECT_TRUE(sync_manager_.EncryptEverythingEnabledForTest()); |
{ |
ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare()); |
- EXPECT_EQ(GetAllRealModelTypes(), GetEncryptedTypes(&trans)); |
+ EXPECT_TRUE(GetEncryptedTypes(&trans).Equals( |
+ syncable::ModelEnumSet::All())); |
EXPECT_TRUE(syncable::VerifyDataTypeEncryptionForTest( |
trans.GetWrappedTrans(), |
trans.GetCryptographer(), |