| Index: sync/test/fake_server/fake_server.cc
|
| diff --git a/sync/test/fake_server/fake_server.cc b/sync/test/fake_server/fake_server.cc
|
| index 7626073eb73d7cf895416c490971b1413328807e..6981632f0b8e2df3b11f309a128e252a68d5e0e7 100644
|
| --- a/sync/test/fake_server/fake_server.cc
|
| +++ b/sync/test/fake_server/fake_server.cc
|
| @@ -149,7 +149,8 @@ scoped_ptr<UpdateSieve> UpdateSieve::Create(
|
| FakeServer::FakeServer() : version_(0),
|
| store_birthday_(kDefaultStoreBirthday),
|
| authenticated_(true),
|
| - error_type_(sync_pb::SyncEnums::SUCCESS) {
|
| + error_type_(sync_pb::SyncEnums::SUCCESS),
|
| + network_enabled_(true) {
|
| keystore_keys_.push_back(kDefaultKeystoreKey);
|
| CHECK(CreateDefaultPermanentItems());
|
| }
|
| @@ -218,6 +219,11 @@ void FakeServer::SaveEntity(FakeServerEntity* entity) {
|
|
|
| void FakeServer::HandleCommand(const string& request,
|
| const HandleCommandCallback& callback) {
|
| + if (!network_enabled_) {
|
| + callback.Run(net::ERR_FAILED, net::ERR_FAILED, string());
|
| + return;
|
| + }
|
| +
|
| if (!authenticated_) {
|
| callback.Run(0, net::HTTP_UNAUTHORIZED, string());
|
| return;
|
| @@ -539,4 +545,12 @@ void FakeServer::RemoveObserver(Observer* observer) {
|
| observers_.RemoveObserver(observer);
|
| }
|
|
|
| +void FakeServer::EnableNetwork() {
|
| + network_enabled_ = true;
|
| +}
|
| +
|
| +void FakeServer::DisableNetwork() {
|
| + network_enabled_ = false;
|
| +}
|
| +
|
| } // namespace fake_server
|
|
|