Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1261)

Unified Diff: sync/internal_api/js_sync_encryption_handler_observer_unittest.cc

Issue 2130453004: [Sync] Move //sync to //components/sync. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebase. Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: sync/internal_api/js_sync_encryption_handler_observer_unittest.cc
diff --git a/sync/internal_api/js_sync_encryption_handler_observer_unittest.cc b/sync/internal_api/js_sync_encryption_handler_observer_unittest.cc
deleted file mode 100644
index d8b18a508c72acea0e8586ac677b4562fe6e3167..0000000000000000000000000000000000000000
--- a/sync/internal_api/js_sync_encryption_handler_observer_unittest.cc
+++ /dev/null
@@ -1,171 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "sync/internal_api/js_sync_encryption_handler_observer.h"
-
-#include "base/location.h"
-#include "base/run_loop.h"
-#include "base/values.h"
-#include "sync/internal_api/public/base/model_type.h"
-#include "sync/internal_api/public/util/sync_string_conversions.h"
-#include "sync/internal_api/public/util/weak_handle.h"
-#include "sync/js/js_event_details.h"
-#include "sync/js/js_test_util.h"
-#include "sync/test/fake_encryptor.h"
-#include "sync/util/cryptographer.h"
-#include "sync/util/time.h"
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace syncer {
-namespace {
-
-using ::testing::InSequence;
-using ::testing::StrictMock;
-
-class JsSyncEncryptionHandlerObserverTest : public testing::Test {
- protected:
- JsSyncEncryptionHandlerObserverTest() {
- js_sync_encryption_handler_observer_.SetJsEventHandler(
- mock_js_event_handler_.AsWeakHandle());
- }
-
- private:
- // This must be destroyed after the member variables below in order
- // for WeakHandles to be destroyed properly.
- base::MessageLoop message_loop_;
-
- protected:
- StrictMock<MockJsEventHandler> mock_js_event_handler_;
- JsSyncEncryptionHandlerObserver js_sync_encryption_handler_observer_;
-
- void PumpLoop() {
- base::RunLoop().RunUntilIdle();
- }
-};
-
-TEST_F(JsSyncEncryptionHandlerObserverTest, NoArgNotifiations) {
- InSequence dummy;
-
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent("onEncryptionComplete",
- HasDetails(JsEventDetails())));
-
- js_sync_encryption_handler_observer_.OnEncryptionComplete();
- PumpLoop();
-}
-
-TEST_F(JsSyncEncryptionHandlerObserverTest, OnPassphraseRequired) {
- InSequence dummy;
-
- base::DictionaryValue reason_passphrase_not_required_details;
- base::DictionaryValue reason_encryption_details;
- base::DictionaryValue reason_decryption_details;
-
- reason_passphrase_not_required_details.SetString(
- "reason",
- PassphraseRequiredReasonToString(REASON_PASSPHRASE_NOT_REQUIRED));
- reason_encryption_details.SetString(
- "reason",
- PassphraseRequiredReasonToString(REASON_ENCRYPTION));
- reason_decryption_details.SetString(
- "reason",
- PassphraseRequiredReasonToString(REASON_DECRYPTION));
-
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent("onPassphraseRequired",
- HasDetailsAsDictionary(
- reason_passphrase_not_required_details)));
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent("onPassphraseRequired",
- HasDetailsAsDictionary(reason_encryption_details)));
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent("onPassphraseRequired",
- HasDetailsAsDictionary(reason_decryption_details)));
-
- js_sync_encryption_handler_observer_.OnPassphraseRequired(
- REASON_PASSPHRASE_NOT_REQUIRED,
- sync_pb::EncryptedData());
- js_sync_encryption_handler_observer_.OnPassphraseRequired(REASON_ENCRYPTION,
- sync_pb::EncryptedData());
- js_sync_encryption_handler_observer_.OnPassphraseRequired(REASON_DECRYPTION,
- sync_pb::EncryptedData());
- PumpLoop();
-}
-
-TEST_F(JsSyncEncryptionHandlerObserverTest, OnBootstrapTokenUpdated) {
- base::DictionaryValue bootstrap_token_details;
- bootstrap_token_details.SetString("bootstrapToken", "<redacted>");
- bootstrap_token_details.SetString("type", "PASSPHRASE_BOOTSTRAP_TOKEN");
-
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent(
- "onBootstrapTokenUpdated",
- HasDetailsAsDictionary(bootstrap_token_details)));
-
- js_sync_encryption_handler_observer_.OnBootstrapTokenUpdated(
- "sensitive_token", PASSPHRASE_BOOTSTRAP_TOKEN);
- PumpLoop();
-}
-
-TEST_F(JsSyncEncryptionHandlerObserverTest, OnEncryptedTypesChanged) {
- base::DictionaryValue expected_details;
- base::ListValue* encrypted_type_values = new base::ListValue();
- const bool encrypt_everything = false;
- expected_details.Set("encryptedTypes", encrypted_type_values);
- expected_details.SetBoolean("encryptEverything", encrypt_everything);
- ModelTypeSet encrypted_types;
-
- for (int i = FIRST_REAL_MODEL_TYPE; i < MODEL_TYPE_COUNT; ++i) {
- ModelType type = ModelTypeFromInt(i);
- encrypted_types.Put(type);
- encrypted_type_values->AppendString(ModelTypeToString(type));
- }
-
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent("onEncryptedTypesChanged",
- HasDetailsAsDictionary(expected_details)));
-
- js_sync_encryption_handler_observer_.OnEncryptedTypesChanged(
- encrypted_types, encrypt_everything);
- PumpLoop();
-}
-
-
-TEST_F(JsSyncEncryptionHandlerObserverTest, OnCryptographerStateChanged) {
- base::DictionaryValue expected_details;
- bool expected_ready = false;
- bool expected_pending = false;
- expected_details.SetBoolean("ready", expected_ready);
- expected_details.SetBoolean("hasPendingKeys", expected_pending);
- ModelTypeSet encrypted_types;
-
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent("onCryptographerStateChanged",
- HasDetailsAsDictionary(expected_details)));
-
- FakeEncryptor encryptor;
- Cryptographer cryptographer(&encryptor);
-
- js_sync_encryption_handler_observer_.OnCryptographerStateChanged(
- &cryptographer);
- PumpLoop();
-}
-
-TEST_F(JsSyncEncryptionHandlerObserverTest, OnPassphraseTypeChanged) {
- InSequence dummy;
-
- base::DictionaryValue passphrase_type_details;
- passphrase_type_details.SetString("passphraseType", "IMPLICIT_PASSPHRASE");
- passphrase_type_details.SetInteger("explicitPassphraseTime", 10);
- EXPECT_CALL(mock_js_event_handler_,
- HandleJsEvent("onPassphraseTypeChanged",
- HasDetailsAsDictionary(passphrase_type_details)));
-
- js_sync_encryption_handler_observer_.OnPassphraseTypeChanged(
- IMPLICIT_PASSPHRASE, ProtoTimeToTime(10));
- PumpLoop();
-}
-
-} // namespace
-} // namespace syncer
« no previous file with comments | « sync/internal_api/js_sync_encryption_handler_observer.cc ('k') | sync/internal_api/js_sync_manager_observer.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698