Index: chrome/android/javatests/src/org/chromium/chrome/browser/signin/OAuth2TokenServiceIntegrationTest.java |
diff --git a/chrome/android/javatests/src/org/chromium/chrome/browser/signin/OAuth2TokenServiceIntegrationTest.java b/chrome/android/javatests/src/org/chromium/chrome/browser/signin/OAuth2TokenServiceIntegrationTest.java |
index a1b8b11dc0eaf03d1298eb8d5fd0d2b373c25470..8500c46bc7e0d3a9d7baa0f3eab0f83c4628c914 100644 |
--- a/chrome/android/javatests/src/org/chromium/chrome/browser/signin/OAuth2TokenServiceIntegrationTest.java |
+++ b/chrome/android/javatests/src/org/chromium/chrome/browser/signin/OAuth2TokenServiceIntegrationTest.java |
@@ -75,7 +75,7 @@ public class OAuth2TokenServiceIntegrationTest { |
AccountManagerHelper.overrideAccountManagerHelperForTests(mContext, mAccountManager); |
// Make sure there is no account signed in yet. |
- mChromeSigninController = ChromeSigninController.get(mContext); |
+ mChromeSigninController = ChromeSigninController.get(); |
mChromeSigninController.setSignedInAccountName(null); |
// Seed test accounts to AccountTrackerService. |
@@ -95,7 +95,7 @@ public class OAuth2TokenServiceIntegrationTest { |
@Override |
public void run() { |
mChromeSigninController.setSignedInAccountName(null); |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
} |
}); |
} |
@@ -106,12 +106,12 @@ public class OAuth2TokenServiceIntegrationTest { |
public void run() { |
AccountIdProvider.setInstanceForTest(new AccountIdProvider() { |
@Override |
- public String getAccountId(Context ctx, String accountName) { |
+ public String getAccountId(String accountName) { |
return "gaia-id-" + accountName; |
} |
@Override |
- public boolean canBeUsed(Context ctx) { |
+ public boolean canBeUsed() { |
return true; |
} |
}); |
@@ -125,10 +125,9 @@ public class OAuth2TokenServiceIntegrationTest { |
public void run() { |
AccountIdProvider provider = AccountIdProvider.getInstance(); |
String[] accountNames = {TEST_ACCOUNT1.name, TEST_ACCOUNT2.name}; |
- String[] accountIds = {provider.getAccountId(context, accountNames[0]), |
- provider.getAccountId(context, accountNames[1])}; |
- AccountTrackerService.get(context).syncForceRefreshForTest( |
- accountIds, accountNames); |
+ String[] accountIds = {provider.getAccountId(accountNames[0]), |
+ provider.getAccountId(accountNames[1])}; |
+ AccountTrackerService.get().syncForceRefreshForTest(accountIds, accountNames); |
} |
}); |
} |
@@ -244,7 +243,7 @@ public class OAuth2TokenServiceIntegrationTest { |
@Override |
public void run() { |
// Run test. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
// Ensure no calls have been made to the observer. |
Assert.assertEquals(0, mObserver.getAvailableCallCount()); |
@@ -264,7 +263,7 @@ public class OAuth2TokenServiceIntegrationTest { |
mAccountManager.addAccountHolderExplicitly(TEST_ACCOUNT_HOLDER_1); |
// Run test. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
// Ensure no calls have been made to the observer. |
Assert.assertEquals(0, mObserver.getAvailableCallCount()); |
@@ -287,7 +286,7 @@ public class OAuth2TokenServiceIntegrationTest { |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
// Run test. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
// Ensure one call for the signed in account. |
Assert.assertEquals(1, mObserver.getAvailableCallCount()); |
@@ -295,13 +294,13 @@ public class OAuth2TokenServiceIntegrationTest { |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
// Validate again and make sure no new calls are made. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(1, mObserver.getAvailableCallCount()); |
Assert.assertEquals(0, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
// Validate again with force notifications and make sure one new calls is made. |
- mOAuth2TokenService.validateAccounts(mContext, true); |
+ mOAuth2TokenService.validateAccounts(true); |
Assert.assertEquals(2, mObserver.getAvailableCallCount()); |
Assert.assertEquals(0, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
@@ -322,13 +321,13 @@ public class OAuth2TokenServiceIntegrationTest { |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
// Run one validation. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(1, mObserver.getAvailableCallCount()); |
Assert.assertEquals(0, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
// Re-run validation. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(1, mObserver.getAvailableCallCount()); |
Assert.assertEquals(0, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
@@ -349,7 +348,7 @@ public class OAuth2TokenServiceIntegrationTest { |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
// Run one validation. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(1, mObserver.getAvailableCallCount()); |
Assert.assertEquals(0, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
@@ -361,7 +360,7 @@ public class OAuth2TokenServiceIntegrationTest { |
seedAccountTrackerService(mContext); |
// Re-run validation. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(2, mObserver.getAvailableCallCount()); |
Assert.assertEquals(0, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
@@ -383,11 +382,11 @@ public class OAuth2TokenServiceIntegrationTest { |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
// Run one validation. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(2, mObserver.getAvailableCallCount()); |
mAccountManager.removeAccountHolderExplicitly(TEST_ACCOUNT_HOLDER_2); |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(2, mObserver.getAvailableCallCount()); |
Assert.assertEquals(1, mObserver.getRevokedCallCount()); |
@@ -409,7 +408,7 @@ public class OAuth2TokenServiceIntegrationTest { |
// Mark user as signed in. |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(2, mObserver.getAvailableCallCount()); |
// Remove all. |
@@ -417,7 +416,7 @@ public class OAuth2TokenServiceIntegrationTest { |
mAccountManager.removeAccountHolderExplicitly(TEST_ACCOUNT_HOLDER_2); |
// Re-validate and run checks. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(2, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
} |
@@ -438,7 +437,7 @@ public class OAuth2TokenServiceIntegrationTest { |
// Mark user as signed in. |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(2, mObserver.getAvailableCallCount()); |
// Remove all. |
@@ -447,7 +446,7 @@ public class OAuth2TokenServiceIntegrationTest { |
mAccountManager.removeAccountHolderExplicitly(TEST_ACCOUNT_HOLDER_2); |
// Re-validate and run checks. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
Assert.assertEquals(2, mObserver.getRevokedCallCount()); |
Assert.assertEquals(0, mObserver.getLoadedCallCount()); |
} |
@@ -468,7 +467,7 @@ public class OAuth2TokenServiceIntegrationTest { |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
// Run test. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
// All accounts will be notified. It is up to the observer |
// to design if any action is needed. |
@@ -489,7 +488,7 @@ public class OAuth2TokenServiceIntegrationTest { |
mChromeSigninController.setSignedInAccountName(TEST_ACCOUNT1.name); |
// Run test. |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
// Ensure no calls have been made to the observer. |
Assert.assertEquals(0, mObserver.getAvailableCallCount()); |
@@ -511,12 +510,12 @@ public class OAuth2TokenServiceIntegrationTest { |
@Override |
public void onRefreshTokenAvailable(Account account) { |
super.onRefreshTokenAvailable(account); |
- Assert.assertEquals(1, OAuth2TokenService.getAccounts(mContext).length); |
+ Assert.assertEquals(1, OAuth2TokenService.getAccounts().length); |
} |
}; |
addObserver(ob); |
- mOAuth2TokenService.validateAccounts(mContext, false); |
+ mOAuth2TokenService.validateAccounts(false); |
} |
}); |
} |