| Index: chrome/browser/sync/engine/syncer_unittest.cc
|
| diff --git a/chrome/browser/sync/engine/syncer_unittest.cc b/chrome/browser/sync/engine/syncer_unittest.cc
|
| index 374dec06df25a8246d2792ddeb275e495c76f73d..3a454954bb70d5b99a5da6dc6c029ea533f8878e 100644
|
| --- a/chrome/browser/sync/engine/syncer_unittest.cc
|
| +++ b/chrome/browser/sync/engine/syncer_unittest.cc
|
| @@ -234,8 +234,8 @@ class SyncerTest : public testing::Test,
|
| EXPECT_FALSE(entry->Get(IS_DIR));
|
| EXPECT_FALSE(entry->Get(IS_DEL));
|
| sync_pb::EntitySpecifics specifics;
|
| - specifics.MutableExtension(sync_pb::bookmark)->set_url("http://demo/");
|
| - specifics.MutableExtension(sync_pb::bookmark)->set_favicon("PNG");
|
| + specifics.mutable_bookmark()->set_url("http://demo/");
|
| + specifics.mutable_bookmark()->set_favicon("PNG");
|
| entry->Put(syncable::SPECIFICS, specifics);
|
| entry->Put(syncable::IS_UNSYNCED, true);
|
| }
|
| @@ -246,9 +246,9 @@ class SyncerTest : public testing::Test,
|
| }
|
| void VerifyTestBookmarkDataInEntry(Entry* entry) {
|
| const sync_pb::EntitySpecifics& specifics = entry->Get(syncable::SPECIFICS);
|
| - EXPECT_TRUE(specifics.HasExtension(sync_pb::bookmark));
|
| - EXPECT_EQ("PNG", specifics.GetExtension(sync_pb::bookmark).favicon());
|
| - EXPECT_EQ("http://demo/", specifics.GetExtension(sync_pb::bookmark).url());
|
| + EXPECT_TRUE(specifics.has_bookmark());
|
| + EXPECT_EQ("PNG", specifics.bookmark().favicon());
|
| + EXPECT_EQ("http://demo/", specifics.bookmark().url());
|
| }
|
|
|
| void SyncRepeatedlyToTriggerConflictResolution(SyncSession* session) {
|
| @@ -264,13 +264,13 @@ class SyncerTest : public testing::Test,
|
| }
|
| sync_pb::EntitySpecifics DefaultBookmarkSpecifics() {
|
| sync_pb::EntitySpecifics result;
|
| - AddDefaultExtensionValue(syncable::BOOKMARKS, &result);
|
| + AddDefaultFieldValue(syncable::BOOKMARKS, &result);
|
| return result;
|
| }
|
|
|
| sync_pb::EntitySpecifics DefaultPreferencesSpecifics() {
|
| sync_pb::EntitySpecifics result;
|
| - AddDefaultExtensionValue(syncable::PREFERENCES, &result);
|
| + AddDefaultFieldValue(syncable::PREFERENCES, &result);
|
| return result;
|
| }
|
| // Enumeration of alterations to entries for commit ordering tests.
|
| @@ -581,7 +581,7 @@ TEST_F(SyncerTest, GetCommitIdsCommandTruncates) {
|
| TEST_F(SyncerTest, GetCommitIdsFiltersThrottledEntries) {
|
| const syncable::ModelTypeSet throttled_types(syncable::BOOKMARKS);
|
| sync_pb::EntitySpecifics bookmark_data;
|
| - AddDefaultExtensionValue(syncable::BOOKMARKS, &bookmark_data);
|
| + AddDefaultFieldValue(syncable::BOOKMARKS, &bookmark_data);
|
|
|
| mock_server_->AddUpdateDirectory(1, 0, "A", 10, 10);
|
| SyncShareAsDelegate();
|
| @@ -646,9 +646,9 @@ TEST_F(SyncerTest, GetCommitIdsFiltersUnreadyEntries) {
|
| KeyParams key_params = {"localhost", "dummy", "foobar"};
|
| KeyParams other_params = {"localhost", "dummy", "foobar2"};
|
| sync_pb::EntitySpecifics bookmark, encrypted_bookmark;
|
| - bookmark.MutableExtension(sync_pb::bookmark)->set_url("url");
|
| - bookmark.MutableExtension(sync_pb::bookmark)->set_title("title");
|
| - AddDefaultExtensionValue(syncable::BOOKMARKS, &encrypted_bookmark);
|
| + bookmark.mutable_bookmark()->set_url("url");
|
| + bookmark.mutable_bookmark()->set_title("title");
|
| + AddDefaultFieldValue(syncable::BOOKMARKS, &encrypted_bookmark);
|
| mock_server_->AddUpdateDirectory(1, 0, "A", 10, 10);
|
| mock_server_->AddUpdateDirectory(2, 0, "B", 10, 10);
|
| mock_server_->AddUpdateDirectory(3, 0, "C", 10, 10);
|
| @@ -663,8 +663,7 @@ TEST_F(SyncerTest, GetCommitIdsFiltersUnreadyEntries) {
|
| browser_sync::Cryptographer other_cryptographer(&encryptor_);
|
| other_cryptographer.AddKey(other_params);
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| other_cryptographer.GetKeys(nigori->mutable_encrypted());
|
| nigori->set_encrypt_bookmarks(true);
|
| // Set up with an old passphrase, but have pending keys
|
| @@ -762,19 +761,19 @@ TEST_F(SyncerTest, EncryptionAwareConflicts) {
|
| browser_sync::Cryptographer other_cryptographer(&encryptor_);
|
| other_cryptographer.AddKey(key_params);
|
| sync_pb::EntitySpecifics bookmark, encrypted_bookmark, modified_bookmark;
|
| - bookmark.MutableExtension(sync_pb::bookmark)->set_title("title");
|
| + bookmark.mutable_bookmark()->set_title("title");
|
| other_cryptographer.Encrypt(bookmark,
|
| encrypted_bookmark.mutable_encrypted());
|
| - AddDefaultExtensionValue(syncable::BOOKMARKS, &encrypted_bookmark);
|
| - modified_bookmark.MutableExtension(sync_pb::bookmark)->set_title("title2");
|
| + AddDefaultFieldValue(syncable::BOOKMARKS, &encrypted_bookmark);
|
| + modified_bookmark.mutable_bookmark()->set_title("title2");
|
| other_cryptographer.Encrypt(modified_bookmark,
|
| modified_bookmark.mutable_encrypted());
|
| sync_pb::EntitySpecifics pref, encrypted_pref, modified_pref;
|
| - pref.MutableExtension(sync_pb::preference)->set_name("name");
|
| - AddDefaultExtensionValue(syncable::PREFERENCES, &encrypted_pref);
|
| + pref.mutable_preference()->set_name("name");
|
| + AddDefaultFieldValue(syncable::PREFERENCES, &encrypted_pref);
|
| other_cryptographer.Encrypt(pref,
|
| encrypted_pref.mutable_encrypted());
|
| - modified_pref.MutableExtension(sync_pb::preference)->set_name("name2");
|
| + modified_pref.mutable_preference()->set_name("name2");
|
| other_cryptographer.Encrypt(modified_pref,
|
| modified_pref.mutable_encrypted());
|
| {
|
| @@ -782,8 +781,7 @@ TEST_F(SyncerTest, EncryptionAwareConflicts) {
|
| // have pending keys.
|
| WriteTransaction wtrans(FROM_HERE, UNITTEST, directory());
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| other_cryptographer.GetKeys(nigori->mutable_encrypted());
|
| nigori->set_encrypt_bookmarks(true);
|
| nigori->set_encrypt_preferences(true);
|
| @@ -947,19 +945,17 @@ TEST_F(SyncerTest, NigoriConflicts) {
|
| other_cryptographer.AddKey(other_key_params);
|
| syncable::ModelTypeSet encrypted_types(syncable::PASSWORDS, syncable::NIGORI);
|
| sync_pb::EntitySpecifics initial_nigori_specifics;
|
| - initial_nigori_specifics.MutableExtension(sync_pb::nigori);
|
| + initial_nigori_specifics.mutable_nigori();
|
| mock_server_->SetNigori(1, 10, 10, initial_nigori_specifics);
|
|
|
| // Data for testing encryption/decryption.
|
| sync_pb::EntitySpecifics other_encrypted_specifics;
|
| - other_encrypted_specifics.MutableExtension(sync_pb::bookmark)->
|
| - set_title("title");
|
| + other_encrypted_specifics.mutable_bookmark()->set_title("title");
|
| other_cryptographer.Encrypt(
|
| other_encrypted_specifics,
|
| other_encrypted_specifics.mutable_encrypted());
|
| sync_pb::EntitySpecifics our_encrypted_specifics;
|
| - our_encrypted_specifics.MutableExtension(sync_pb::bookmark)->
|
| - set_title("title2");
|
| + our_encrypted_specifics.mutable_bookmark()->set_title("title2");
|
|
|
| // Receive the initial nigori node.
|
| SyncShareAsDelegate();
|
| @@ -968,8 +964,7 @@ TEST_F(SyncerTest, NigoriConflicts) {
|
| // Local changes with different passphrase, different types, and sync_tabs.
|
| WriteTransaction wtrans(FROM_HERE, UNITTEST, directory());
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| cryptographer(&wtrans)->AddKey(local_key_params);
|
| cryptographer(&wtrans)->Encrypt(
|
| our_encrypted_specifics,
|
| @@ -990,8 +985,7 @@ TEST_F(SyncerTest, NigoriConflicts) {
|
| }
|
| {
|
| sync_pb::EntitySpecifics specifics;
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| other_cryptographer.GetKeys(nigori->mutable_encrypted());
|
| nigori->set_encrypt_bookmarks(true);
|
| nigori->set_encrypt_preferences(true);
|
| @@ -1019,14 +1013,13 @@ TEST_F(SyncerTest, NigoriConflicts) {
|
| EXPECT_TRUE(encrypted_types.Equals(
|
| cryptographer(&wtrans)->GetEncryptedTypes()));
|
| EXPECT_TRUE(cryptographer(&wtrans)->encrypt_everything());
|
| - EXPECT_TRUE(specifics.GetExtension(sync_pb::nigori).sync_tabs());
|
| + EXPECT_TRUE(specifics.nigori().sync_tabs());
|
| // Supply the pending keys. Afterwards, we should be able to decrypt both
|
| // our own encrypted data and data encrypted by the other cryptographer,
|
| // but the key provided by the other cryptographer should be the default.
|
| EXPECT_TRUE(cryptographer(&wtrans)->DecryptPendingKeys(other_key_params));
|
| EXPECT_FALSE(cryptographer(&wtrans)->has_pending_keys());
|
| - sync_pb::NigoriSpecifics* nigori =
|
| - specifics.MutableExtension(sync_pb::nigori);
|
| + sync_pb::NigoriSpecifics* nigori = specifics.mutable_nigori();
|
| cryptographer(&wtrans)->GetKeys(nigori->mutable_encrypted());
|
| cryptographer(&wtrans)->UpdateNigoriFromEncryptedTypes(nigori);
|
| // Normally this would be written as part of SetPassphrase, but we do it
|
| @@ -1054,8 +1047,7 @@ TEST_F(SyncerTest, NigoriConflicts) {
|
| other_encrypted_specifics.encrypted()));
|
| EXPECT_TRUE(cryptographer(&wtrans)->
|
| CanDecryptUsingDefaultKey(other_encrypted_specifics.encrypted()));
|
| - EXPECT_TRUE(nigori_entry.Get(SPECIFICS).GetExtension(sync_pb::nigori)
|
| - .sync_tabs());
|
| + EXPECT_TRUE(nigori_entry.Get(SPECIFICS).nigori().sync_tabs());
|
| }
|
| }
|
|
|
| @@ -2299,7 +2291,7 @@ TEST_F(SyncerTest, DoublyChangedWithResolver) {
|
| ASSERT_TRUE(child.good());
|
| EXPECT_TRUE(child.Get(syncable::IS_UNSYNCED));
|
| EXPECT_FALSE(child.Get(syncable::IS_UNAPPLIED_UPDATE));
|
| - EXPECT_TRUE(child.Get(SPECIFICS).HasExtension(sync_pb::bookmark));
|
| + EXPECT_TRUE(child.Get(SPECIFICS).has_bookmark());
|
| EXPECT_EQ("Pete.htm", child.Get(NON_UNIQUE_NAME));
|
| VerifyTestBookmarkDataInEntry(&child);
|
| }
|
| @@ -2727,7 +2719,7 @@ TEST_F(SyncerTest, NewEntryAndAlteredServerEntrySharePath) {
|
| EXPECT_EQ("Bar.htm", server.Get(NON_UNIQUE_NAME));
|
| EXPECT_EQ("Bar.htm", local.Get(NON_UNIQUE_NAME));
|
| EXPECT_EQ("http://google.com", // Default from AddUpdateBookmark.
|
| - server.Get(SPECIFICS).GetExtension(sync_pb::bookmark).url());
|
| + server.Get(SPECIFICS).bookmark().url());
|
| }
|
| }
|
|
|
| @@ -2793,7 +2785,7 @@ TEST_F(SyncerTest, NewEntryAndAlteredServerEntrySharePath_OldBookmarksProto) {
|
| EXPECT_EQ("Bar.htm", server.Get(NON_UNIQUE_NAME));
|
| EXPECT_EQ("Bar.htm", local.Get(NON_UNIQUE_NAME));
|
| EXPECT_EQ("http://google.com", // Default from AddUpdateBookmark.
|
| - server.Get(SPECIFICS).GetExtension(sync_pb::bookmark).url());
|
| + server.Get(SPECIFICS).bookmark().url());
|
| }
|
| }
|
|
|
| @@ -3521,11 +3513,9 @@ TEST_F(SyncerTest, ClientTagUncommittedTagMatchesUpdate) {
|
| int64 original_metahandle = 0;
|
|
|
| sync_pb::EntitySpecifics local_bookmark(DefaultBookmarkSpecifics());
|
| - local_bookmark.MutableExtension(sync_pb::bookmark)->
|
| - set_url("http://foo/localsite");
|
| + local_bookmark.mutable_bookmark()->set_url("http://foo/localsite");
|
| sync_pb::EntitySpecifics server_bookmark(DefaultBookmarkSpecifics());
|
| - server_bookmark.MutableExtension(sync_pb::bookmark)->
|
| - set_url("http://bar/serversite");
|
| + server_bookmark.mutable_bookmark()->set_url("http://bar/serversite");
|
|
|
| {
|
| WriteTransaction trans(FROM_HERE, UNITTEST, directory());
|
|
|