Index: chrome/browser/sync/test_profile_sync_service.cc |
diff --git a/chrome/browser/sync/test_profile_sync_service.cc b/chrome/browser/sync/test_profile_sync_service.cc |
index bb544169328e023931ff5ae8e20a1ca9187bfb94..23a8cf36c9534c6fbd03bd338b5cf9fe0da9d79f 100644 |
--- a/chrome/browser/sync/test_profile_sync_service.cc |
+++ b/chrome/browser/sync/test_profile_sync_service.cc |
@@ -315,13 +315,14 @@ void TestProfileSyncService::CreateBackend() { |
} |
scoped_ptr<OAuth2TokenService::Request> FakeOAuth2TokenService::StartRequest( |
+ const std::string& account_id, |
const OAuth2TokenService::ScopeSet& scopes, |
OAuth2TokenService::Consumer* consumer) { |
// Ensure token in question is cached and never expires. Request will succeed |
// without network IO. |
- RegisterCacheEntry(GetRefreshToken(), scopes, "access_token", |
- base::Time::Max()); |
- return ProfileOAuth2TokenService::StartRequest(scopes, consumer); |
+ RegisterCacheEntry( |
+ GetRefreshToken(account_id), scopes, "access_token", base::Time::Max()); |
+ return ProfileOAuth2TokenService::StartRequest(account_id, scopes, consumer); |
} |
BrowserContextKeyedService* FakeOAuth2TokenService::BuildTokenService( |
@@ -332,3 +333,14 @@ BrowserContextKeyedService* FakeOAuth2TokenService::BuildTokenService( |
service->Initialize(profile); |
return service; |
} |
+ |
+void FakeOAuth2TokenService::PersistCredentials( |
+ const std::string& account_id, |
+ const std::string& refresh_token) { |
+ // Disabling the token persistence. |
+} |
+ |
+void FakeOAuth2TokenService::ClearPersistedCredentials( |
+ const std::string& account_id) { |
+ // Disabling the token persistence. |
+} |