Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(898)

Unified Diff: chrome/browser/sync/internal_api/syncapi_unittest.cc

Issue 9315048: [Sync] Fix idempotency check for passwords datatype. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase Created 8 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/browser/sync/internal_api/base_node.h ('k') | chrome/browser/sync/internal_api/write_node.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/sync/internal_api/syncapi_unittest.cc
diff --git a/chrome/browser/sync/internal_api/syncapi_unittest.cc b/chrome/browser/sync/internal_api/syncapi_unittest.cc
index c0b520de7e5716f178365ab202246fed7ee8ca78..4927d05a2b0a0e800065a9e426aa7e6b3460edc0 100644
--- a/chrome/browser/sync/internal_api/syncapi_unittest.cc
+++ b/chrome/browser/sync/internal_api/syncapi_unittest.cc
@@ -2028,4 +2028,157 @@ TEST_F(SyncManagerTest, UpdateEntryWithEncryption) {
}
}
+// Passwords have their own handling for encryption. Verify it does not result
+// in unnecessary writes via SetEntitySpecifics.
+TEST_F(SyncManagerTest, UpdatePasswordSetEntitySpecificsNoChange) {
+ std::string client_tag = "title";
+ EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, DEFAULT_ENCRYPTION));
+ sync_pb::EntitySpecifics entity_specifics;
+ {
+ ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ sync_pb::PasswordSpecificsData data;
+ data.set_password_value("secret");
+ cryptographer->Encrypt(
+ data,
+ entity_specifics.MutableExtension(sync_pb::password)->
+ mutable_encrypted());
+ }
+ MakeServerNode(sync_manager_.GetUserShare(), syncable::PASSWORDS, client_tag,
+ BaseNode::GenerateSyncableHash(syncable::PASSWORDS,
+ client_tag),
+ entity_specifics);
+ // New node shouldn't start off unsynced.
+ EXPECT_FALSE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+
+ // Manually change to the same data via SetEntitySpecifics. Should not set
+ // is_unsynced.
+ {
+ WriteTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
+ WriteNode node(&trans);
+ EXPECT_TRUE(node.InitByClientTagLookup(syncable::PASSWORDS, client_tag));
+ node.SetEntitySpecifics(entity_specifics);
+ }
+ EXPECT_FALSE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+}
+
+// Passwords have their own handling for encryption. Verify it does not result
+// in unnecessary writes via SetPasswordSpecifics.
+TEST_F(SyncManagerTest, UpdatePasswordSetPasswordSpecifics) {
+ std::string client_tag = "title";
+ EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, DEFAULT_ENCRYPTION));
+ sync_pb::EntitySpecifics entity_specifics;
+ {
+ ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ sync_pb::PasswordSpecificsData data;
+ data.set_password_value("secret");
+ cryptographer->Encrypt(
+ data,
+ entity_specifics.MutableExtension(sync_pb::password)->
+ mutable_encrypted());
+ }
+ MakeServerNode(sync_manager_.GetUserShare(), syncable::PASSWORDS, client_tag,
+ BaseNode::GenerateSyncableHash(syncable::PASSWORDS,
+ client_tag),
+ entity_specifics);
+ // New node shouldn't start off unsynced.
+ EXPECT_FALSE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+
+ // Manually change to the same data via SetPasswordSpecifics. Should not set
+ // is_unsynced.
+ {
+ WriteTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
+ WriteNode node(&trans);
+ EXPECT_TRUE(node.InitByClientTagLookup(syncable::PASSWORDS, client_tag));
+ node.SetPasswordSpecifics(node.GetPasswordSpecifics());
+ }
+ EXPECT_FALSE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+
+ // Manually change to different data. Should set is_unsynced.
+ {
+ WriteTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
+ WriteNode node(&trans);
+ EXPECT_TRUE(node.InitByClientTagLookup(syncable::PASSWORDS, client_tag));
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ sync_pb::PasswordSpecificsData data;
+ data.set_password_value("secret2");
+ cryptographer->Encrypt(
+ data,
+ entity_specifics.MutableExtension(sync_pb::password)->
+ mutable_encrypted());
+ node.SetPasswordSpecifics(data);
+ const syncable::Entry* node_entry = node.GetEntry();
+ EXPECT_TRUE(node_entry->Get(IS_UNSYNCED));
+ }
+}
+
+// Passwords have their own handling for encryption. Verify setting a new
+// passphrase updates the data.
+TEST_F(SyncManagerTest, UpdatePasswordNewPassphrase) {
+ std::string client_tag = "title";
+ EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, DEFAULT_ENCRYPTION));
+ sync_pb::EntitySpecifics entity_specifics;
+ {
+ ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ sync_pb::PasswordSpecificsData data;
+ data.set_password_value("secret");
+ cryptographer->Encrypt(
+ data,
+ entity_specifics.MutableExtension(sync_pb::password)->
+ mutable_encrypted());
+ }
+ MakeServerNode(sync_manager_.GetUserShare(), syncable::PASSWORDS, client_tag,
+ BaseNode::GenerateSyncableHash(syncable::PASSWORDS,
+ client_tag),
+ entity_specifics);
+ // New node shouldn't start off unsynced.
+ EXPECT_FALSE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+
+ // Set a new passphrase. Should set is_unsynced.
+ testing::Mock::VerifyAndClearExpectations(&observer_);
+ EXPECT_CALL(observer_, OnBootstrapTokenUpdated(_));
+ EXPECT_CALL(observer_, OnPassphraseAccepted());
+ EXPECT_CALL(observer_, OnEncryptionComplete());
+ sync_manager_.SetPassphrase("new_passphrase", true, true);
+ EXPECT_TRUE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+}
+
+// Passwords have their own handling for encryption. Verify it does not result
+// in unnecessary writes via ReencryptEverything.
+TEST_F(SyncManagerTest, UpdatePasswordReencryptEverything) {
+ std::string client_tag = "title";
+ EXPECT_TRUE(SetUpEncryption(WRITE_TO_NIGORI, DEFAULT_ENCRYPTION));
+ sync_pb::EntitySpecifics entity_specifics;
+ {
+ ReadTransaction trans(FROM_HERE, sync_manager_.GetUserShare());
+ Cryptographer* cryptographer = trans.GetCryptographer();
+ sync_pb::PasswordSpecificsData data;
+ data.set_password_value("secret");
+ cryptographer->Encrypt(
+ data,
+ entity_specifics.MutableExtension(sync_pb::password)->
+ mutable_encrypted());
+ }
+ MakeServerNode(sync_manager_.GetUserShare(), syncable::PASSWORDS, client_tag,
+ BaseNode::GenerateSyncableHash(syncable::PASSWORDS,
+ client_tag),
+ entity_specifics);
+ // New node shouldn't start off unsynced.
+ EXPECT_FALSE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+
+ // Force a re-encrypt everything. Should not set is_unsynced.
+ testing::Mock::VerifyAndClearExpectations(&observer_);
+ EXPECT_CALL(observer_, OnEncryptionComplete());
+ sync_manager_.RefreshNigori(base::Bind(&SyncManagerTest::EmptyClosure,
+ base::Unretained(this)));
+ scoped_refptr<base::ThreadTestHelper> helper(
+ new base::ThreadTestHelper(
+ BrowserThread::GetMessageLoopProxyForThread(BrowserThread::FILE)));
+ ASSERT_TRUE(helper->Run());
+ PumpLoop();
+ EXPECT_FALSE(ResetUnsyncedEntry(syncable::PASSWORDS, client_tag));
+}
+
} // namespace browser_sync
« no previous file with comments | « chrome/browser/sync/internal_api/base_node.h ('k') | chrome/browser/sync/internal_api/write_node.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698