| Index: sync/internal_api/js_sync_encryption_handler_observer_unittest.cc
|
| diff --git a/sync/internal_api/js_sync_encryption_handler_observer_unittest.cc b/sync/internal_api/js_sync_encryption_handler_observer_unittest.cc
|
| deleted file mode 100644
|
| index d8b18a508c72acea0e8586ac677b4562fe6e3167..0000000000000000000000000000000000000000
|
| --- a/sync/internal_api/js_sync_encryption_handler_observer_unittest.cc
|
| +++ /dev/null
|
| @@ -1,171 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sync/internal_api/js_sync_encryption_handler_observer.h"
|
| -
|
| -#include "base/location.h"
|
| -#include "base/run_loop.h"
|
| -#include "base/values.h"
|
| -#include "sync/internal_api/public/base/model_type.h"
|
| -#include "sync/internal_api/public/util/sync_string_conversions.h"
|
| -#include "sync/internal_api/public/util/weak_handle.h"
|
| -#include "sync/js/js_event_details.h"
|
| -#include "sync/js/js_test_util.h"
|
| -#include "sync/test/fake_encryptor.h"
|
| -#include "sync/util/cryptographer.h"
|
| -#include "sync/util/time.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -namespace syncer {
|
| -namespace {
|
| -
|
| -using ::testing::InSequence;
|
| -using ::testing::StrictMock;
|
| -
|
| -class JsSyncEncryptionHandlerObserverTest : public testing::Test {
|
| - protected:
|
| - JsSyncEncryptionHandlerObserverTest() {
|
| - js_sync_encryption_handler_observer_.SetJsEventHandler(
|
| - mock_js_event_handler_.AsWeakHandle());
|
| - }
|
| -
|
| - private:
|
| - // This must be destroyed after the member variables below in order
|
| - // for WeakHandles to be destroyed properly.
|
| - base::MessageLoop message_loop_;
|
| -
|
| - protected:
|
| - StrictMock<MockJsEventHandler> mock_js_event_handler_;
|
| - JsSyncEncryptionHandlerObserver js_sync_encryption_handler_observer_;
|
| -
|
| - void PumpLoop() {
|
| - base::RunLoop().RunUntilIdle();
|
| - }
|
| -};
|
| -
|
| -TEST_F(JsSyncEncryptionHandlerObserverTest, NoArgNotifiations) {
|
| - InSequence dummy;
|
| -
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent("onEncryptionComplete",
|
| - HasDetails(JsEventDetails())));
|
| -
|
| - js_sync_encryption_handler_observer_.OnEncryptionComplete();
|
| - PumpLoop();
|
| -}
|
| -
|
| -TEST_F(JsSyncEncryptionHandlerObserverTest, OnPassphraseRequired) {
|
| - InSequence dummy;
|
| -
|
| - base::DictionaryValue reason_passphrase_not_required_details;
|
| - base::DictionaryValue reason_encryption_details;
|
| - base::DictionaryValue reason_decryption_details;
|
| -
|
| - reason_passphrase_not_required_details.SetString(
|
| - "reason",
|
| - PassphraseRequiredReasonToString(REASON_PASSPHRASE_NOT_REQUIRED));
|
| - reason_encryption_details.SetString(
|
| - "reason",
|
| - PassphraseRequiredReasonToString(REASON_ENCRYPTION));
|
| - reason_decryption_details.SetString(
|
| - "reason",
|
| - PassphraseRequiredReasonToString(REASON_DECRYPTION));
|
| -
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent("onPassphraseRequired",
|
| - HasDetailsAsDictionary(
|
| - reason_passphrase_not_required_details)));
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent("onPassphraseRequired",
|
| - HasDetailsAsDictionary(reason_encryption_details)));
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent("onPassphraseRequired",
|
| - HasDetailsAsDictionary(reason_decryption_details)));
|
| -
|
| - js_sync_encryption_handler_observer_.OnPassphraseRequired(
|
| - REASON_PASSPHRASE_NOT_REQUIRED,
|
| - sync_pb::EncryptedData());
|
| - js_sync_encryption_handler_observer_.OnPassphraseRequired(REASON_ENCRYPTION,
|
| - sync_pb::EncryptedData());
|
| - js_sync_encryption_handler_observer_.OnPassphraseRequired(REASON_DECRYPTION,
|
| - sync_pb::EncryptedData());
|
| - PumpLoop();
|
| -}
|
| -
|
| -TEST_F(JsSyncEncryptionHandlerObserverTest, OnBootstrapTokenUpdated) {
|
| - base::DictionaryValue bootstrap_token_details;
|
| - bootstrap_token_details.SetString("bootstrapToken", "<redacted>");
|
| - bootstrap_token_details.SetString("type", "PASSPHRASE_BOOTSTRAP_TOKEN");
|
| -
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent(
|
| - "onBootstrapTokenUpdated",
|
| - HasDetailsAsDictionary(bootstrap_token_details)));
|
| -
|
| - js_sync_encryption_handler_observer_.OnBootstrapTokenUpdated(
|
| - "sensitive_token", PASSPHRASE_BOOTSTRAP_TOKEN);
|
| - PumpLoop();
|
| -}
|
| -
|
| -TEST_F(JsSyncEncryptionHandlerObserverTest, OnEncryptedTypesChanged) {
|
| - base::DictionaryValue expected_details;
|
| - base::ListValue* encrypted_type_values = new base::ListValue();
|
| - const bool encrypt_everything = false;
|
| - expected_details.Set("encryptedTypes", encrypted_type_values);
|
| - expected_details.SetBoolean("encryptEverything", encrypt_everything);
|
| - ModelTypeSet encrypted_types;
|
| -
|
| - for (int i = FIRST_REAL_MODEL_TYPE; i < MODEL_TYPE_COUNT; ++i) {
|
| - ModelType type = ModelTypeFromInt(i);
|
| - encrypted_types.Put(type);
|
| - encrypted_type_values->AppendString(ModelTypeToString(type));
|
| - }
|
| -
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent("onEncryptedTypesChanged",
|
| - HasDetailsAsDictionary(expected_details)));
|
| -
|
| - js_sync_encryption_handler_observer_.OnEncryptedTypesChanged(
|
| - encrypted_types, encrypt_everything);
|
| - PumpLoop();
|
| -}
|
| -
|
| -
|
| -TEST_F(JsSyncEncryptionHandlerObserverTest, OnCryptographerStateChanged) {
|
| - base::DictionaryValue expected_details;
|
| - bool expected_ready = false;
|
| - bool expected_pending = false;
|
| - expected_details.SetBoolean("ready", expected_ready);
|
| - expected_details.SetBoolean("hasPendingKeys", expected_pending);
|
| - ModelTypeSet encrypted_types;
|
| -
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent("onCryptographerStateChanged",
|
| - HasDetailsAsDictionary(expected_details)));
|
| -
|
| - FakeEncryptor encryptor;
|
| - Cryptographer cryptographer(&encryptor);
|
| -
|
| - js_sync_encryption_handler_observer_.OnCryptographerStateChanged(
|
| - &cryptographer);
|
| - PumpLoop();
|
| -}
|
| -
|
| -TEST_F(JsSyncEncryptionHandlerObserverTest, OnPassphraseTypeChanged) {
|
| - InSequence dummy;
|
| -
|
| - base::DictionaryValue passphrase_type_details;
|
| - passphrase_type_details.SetString("passphraseType", "IMPLICIT_PASSPHRASE");
|
| - passphrase_type_details.SetInteger("explicitPassphraseTime", 10);
|
| - EXPECT_CALL(mock_js_event_handler_,
|
| - HandleJsEvent("onPassphraseTypeChanged",
|
| - HasDetailsAsDictionary(passphrase_type_details)));
|
| -
|
| - js_sync_encryption_handler_observer_.OnPassphraseTypeChanged(
|
| - IMPLICIT_PASSPHRASE, ProtoTimeToTime(10));
|
| - PumpLoop();
|
| -}
|
| -
|
| -} // namespace
|
| -} // namespace syncer
|
|
|