Index: chrome/browser/sync/test/integration/two_client_passwords_sync_test.cc |
diff --git a/chrome/browser/sync/test/integration/two_client_passwords_sync_test.cc b/chrome/browser/sync/test/integration/two_client_passwords_sync_test.cc |
index 1e8a44752249976cd8c76f4253979de3f49be63c..157e8cb2e6a890501b1e07f4a83ecfeb4e3ccaaf 100644 |
--- a/chrome/browser/sync/test/integration/two_client_passwords_sync_test.cc |
+++ b/chrome/browser/sync/test/integration/two_client_passwords_sync_test.cc |
@@ -22,8 +22,6 @@ |
using passwords_helper::AddLogin; |
using passwords_helper::AllProfilesContainSamePasswordForms; |
using passwords_helper::AllProfilesContainSamePasswordFormsAsVerifier; |
-using passwords_helper::AwaitAllProfilesContainSamePasswordForms; |
-using passwords_helper::AwaitProfileContainsSamePasswordFormsAsVerifier; |
using passwords_helper::CreateTestPasswordForm; |
using passwords_helper::GetPasswordCount; |
using passwords_helper::GetPasswordStore; |
@@ -32,8 +30,6 @@ using passwords_helper::GetVerifierPasswordStore; |
using passwords_helper::RemoveLogin; |
using passwords_helper::RemoveLogins; |
using passwords_helper::UpdateLogin; |
-using sync_integration_test_util::AwaitPassphraseAccepted; |
-using sync_integration_test_util::AwaitPassphraseRequired; |
using autofill::PasswordForm; |
@@ -53,13 +49,13 @@ class TwoClientPasswordsSyncTest : public SyncTest { |
// TCM ID - 3732277 |
IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, E2E_ENABLED(Add)) { |
ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
PasswordForm form = CreateTestPasswordForm(0); |
AddLogin(GetPasswordStore(0), form); |
ASSERT_EQ(1, GetPasswordCount(0)); |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
ASSERT_EQ(1, GetPasswordCount(1)); |
} |
@@ -74,7 +70,7 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, E2E_ENABLED(Race)) { |
form1.password_value = base::ASCIIToUTF16("new_password"); |
AddLogin(GetPasswordStore(1), form1); |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
} |
IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, |
@@ -83,17 +79,17 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, |
GetSyncService(0)->SetEncryptionPassphrase( |
kValidPassphrase, browser_sync::ProfileSyncService::EXPLICIT); |
- ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(0))); |
+ ASSERT_TRUE(PassphraseAcceptedChecker(GetSyncService(0)).Wait()); |
- ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1))); |
+ ASSERT_TRUE(PassphraseRequiredChecker(GetSyncService(1)).Wait()); |
ASSERT_TRUE(GetSyncService(1)->SetDecryptionPassphrase(kValidPassphrase)); |
- ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(1))); |
+ ASSERT_TRUE(PassphraseAcceptedChecker(GetSyncService(1)).Wait()); |
PasswordForm form = CreateTestPasswordForm(0); |
AddLogin(GetPasswordStore(0), form); |
ASSERT_EQ(1, GetPasswordCount(0)); |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
} |
// TCM ID - 4603879 |
@@ -106,7 +102,7 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, Update) { |
AddLogin(GetPasswordStore(0), form); |
// Wait for client 0 to commit and client 1 to receive the update. |
- ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(1)); |
+ ASSERT_TRUE(SamePasswordFormsAsVerifierChecker(1).Wait()); |
form.password_value = base::ASCIIToUTF16("new_password"); |
UpdateLogin(GetVerifierPasswordStore(), form); |
@@ -114,7 +110,7 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, Update) { |
ASSERT_EQ(1, GetVerifierPasswordCount()); |
// Wait for client 1 to commit and client 0 to receive the update. |
- ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(0)); |
+ ASSERT_TRUE(SamePasswordFormsAsVerifierChecker(0).Wait()); |
ASSERT_TRUE(AllProfilesContainSamePasswordFormsAsVerifier()); |
} |
@@ -131,14 +127,14 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, Delete) { |
AddLogin(GetPasswordStore(0), form1); |
// Wait for client 0 to commit and client 1 to receive the update. |
- ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(1)); |
+ ASSERT_TRUE(SamePasswordFormsAsVerifierChecker(1).Wait()); |
RemoveLogin(GetPasswordStore(1), form0); |
RemoveLogin(GetVerifierPasswordStore(), form0); |
ASSERT_EQ(1, GetVerifierPasswordCount()); |
// Wait for deletion from client 1 to propagate. |
- ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(0)); |
+ ASSERT_TRUE(SamePasswordFormsAsVerifierChecker(0).Wait()); |
ASSERT_TRUE(AllProfilesContainSamePasswordFormsAsVerifier()); |
} |
@@ -149,16 +145,16 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, |
ASSERT_TRUE(GetClient(0)->SetupSync()); |
GetSyncService(0)->SetEncryptionPassphrase( |
kValidPassphrase, browser_sync::ProfileSyncService::EXPLICIT); |
- ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(0))); |
+ ASSERT_TRUE(PassphraseAcceptedChecker(GetSyncService(0)).Wait()); |
// When client 1 hits a passphrase required state, we can infer that |
// client 0's passphrase has been committed. to the server. |
ASSERT_FALSE(GetClient(1)->SetupSync()); |
- ASSERT_TRUE(AwaitPassphraseRequired(GetSyncService(1))); |
+ ASSERT_TRUE(PassphraseRequiredChecker(GetSyncService(1)).Wait()); |
// Get client 1 out of the passphrase required state. |
ASSERT_TRUE(GetSyncService(1)->SetDecryptionPassphrase(kValidPassphrase)); |
- ASSERT_TRUE(AwaitPassphraseAccepted(GetSyncService(1))); |
+ ASSERT_TRUE(PassphraseAcceptedChecker(GetSyncService(1)).Wait()); |
// We must mark the setup complete now, since we just entered the passphrase |
// and the previous SetupSync() call failed. |
@@ -168,7 +164,7 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, |
PasswordForm form0 = CreateTestPasswordForm(0); |
AddLogin(GetPasswordStore(0), form0); |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
} |
IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, E2E_ONLY(Delete)) { |
@@ -183,19 +179,19 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, E2E_ONLY(Delete)) { |
const int init_password_count = GetPasswordCount(0); |
// Wait for client 0 to commit and client 1 to receive the update. |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
ASSERT_EQ(init_password_count, GetPasswordCount(1)); |
RemoveLogin(GetPasswordStore(1), form0); |
// Wait for deletion from client 1 to propagate. |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
ASSERT_EQ(init_password_count - 1, GetPasswordCount(0)); |
RemoveLogin(GetPasswordStore(1), form1); |
// Wait for deletion from client 1 to propagate. |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
ASSERT_EQ(init_password_count - 2, GetPasswordCount(0)); |
} |
@@ -216,12 +212,12 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, MAYBE_DeleteAll) { |
PasswordForm form1 = CreateTestPasswordForm(1); |
AddLogin(GetVerifierPasswordStore(), form1); |
AddLogin(GetPasswordStore(0), form1); |
- ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(1)); |
+ ASSERT_TRUE(SamePasswordFormsAsVerifierChecker(1).Wait()); |
ASSERT_TRUE(AllProfilesContainSamePasswordFormsAsVerifier()); |
RemoveLogins(GetPasswordStore(1)); |
RemoveLogins(GetVerifierPasswordStore()); |
- ASSERT_TRUE(AwaitProfileContainsSamePasswordFormsAsVerifier(0)); |
+ ASSERT_TRUE(SamePasswordFormsAsVerifierChecker(0).Wait()); |
ASSERT_TRUE(AllProfilesContainSamePasswordFormsAsVerifier()); |
ASSERT_EQ(0, GetVerifierPasswordCount()); |
} |
@@ -238,15 +234,15 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, E2E_ENABLED(Merge)) { |
PasswordForm form2 = CreateTestPasswordForm(2); |
AddLogin(GetPasswordStore(1), form2); |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
ASSERT_EQ(3, GetPasswordCount(0)); |
} |
IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, E2E_ONLY(TwoClientAddPass)) { |
ASSERT_TRUE(SetupSync()) << "SetupSync() failed."; |
// All profiles should sync same passwords. |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()) << |
- "Initial password forms did not match for all profiles"; |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()) |
+ << "Initial password forms did not match for all profiles"; |
const int init_password_count = GetPasswordCount(0); |
// Add one new password per profile. A unique form is created for each to |
@@ -257,7 +253,7 @@ IN_PROC_BROWSER_TEST_F(TwoClientPasswordsSyncTest, E2E_ONLY(TwoClientAddPass)) { |
} |
// Blocks and waits for password forms in all profiles to match. |
- ASSERT_TRUE(AwaitAllProfilesContainSamePasswordForms()); |
+ ASSERT_TRUE(SamePasswordFormsChecker().Wait()); |
// Check that total number of passwords is as expected. |
for (int i = 0; i < num_clients(); ++i) { |