| Index: chrome/browser/sync/test_profile_sync_service.cc
|
| diff --git a/chrome/browser/sync/test_profile_sync_service.cc b/chrome/browser/sync/test_profile_sync_service.cc
|
| index bb544169328e023931ff5ae8e20a1ca9187bfb94..23a8cf36c9534c6fbd03bd338b5cf9fe0da9d79f 100644
|
| --- a/chrome/browser/sync/test_profile_sync_service.cc
|
| +++ b/chrome/browser/sync/test_profile_sync_service.cc
|
| @@ -315,13 +315,14 @@ void TestProfileSyncService::CreateBackend() {
|
| }
|
|
|
| scoped_ptr<OAuth2TokenService::Request> FakeOAuth2TokenService::StartRequest(
|
| + const std::string& account_id,
|
| const OAuth2TokenService::ScopeSet& scopes,
|
| OAuth2TokenService::Consumer* consumer) {
|
| // Ensure token in question is cached and never expires. Request will succeed
|
| // without network IO.
|
| - RegisterCacheEntry(GetRefreshToken(), scopes, "access_token",
|
| - base::Time::Max());
|
| - return ProfileOAuth2TokenService::StartRequest(scopes, consumer);
|
| + RegisterCacheEntry(
|
| + GetRefreshToken(account_id), scopes, "access_token", base::Time::Max());
|
| + return ProfileOAuth2TokenService::StartRequest(account_id, scopes, consumer);
|
| }
|
|
|
| BrowserContextKeyedService* FakeOAuth2TokenService::BuildTokenService(
|
| @@ -332,3 +333,14 @@ BrowserContextKeyedService* FakeOAuth2TokenService::BuildTokenService(
|
| service->Initialize(profile);
|
| return service;
|
| }
|
| +
|
| +void FakeOAuth2TokenService::PersistCredentials(
|
| + const std::string& account_id,
|
| + const std::string& refresh_token) {
|
| + // Disabling the token persistence.
|
| +}
|
| +
|
| +void FakeOAuth2TokenService::ClearPersistedCredentials(
|
| + const std::string& account_id) {
|
| + // Disabling the token persistence.
|
| +}
|
|
|