| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/ui/webui/sync_setup_handler.h" |
| |
| #include <vector> |
| |
| #include "base/command_line.h" |
| #include "base/json/json_writer.h" |
| #include "base/memory/scoped_ptr.h" |
| #include "base/prefs/pref_service.h" |
| #include "base/stl_util.h" |
| #include "base/values.h" |
| #include "chrome/browser/signin/fake_auth_status_provider.h" |
| #include "chrome/browser/signin/fake_signin_manager.h" |
| #include "chrome/browser/signin/profile_oauth2_token_service.h" |
| #include "chrome/browser/signin/profile_oauth2_token_service_factory.h" |
| #include "chrome/browser/signin/signin_manager.h" |
| #include "chrome/browser/signin/signin_manager_factory.h" |
| #include "chrome/browser/sync/profile_sync_service_factory.h" |
| #include "chrome/browser/sync/profile_sync_service_mock.h" |
| #include "chrome/browser/ui/webui/signin/login_ui_service.h" |
| #include "chrome/browser/ui/webui/signin/login_ui_service_factory.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "chrome/common/pref_names.h" |
| #include "chrome/test/base/testing_profile.h" |
| #include "chrome/test/base/testing_browser_process.h" |
| #include "chrome/test/base/scoped_testing_local_state.h" |
| #include "content/public/browser/web_ui.h" |
| #include "content/public/test/test_browser_thread.h" |
| #include "content/public/test/test_browser_thread_bundle.h" |
| #include "grit/generated_resources.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "ui/base/l10n/l10n_util.h" |
| #include "ui/base/layout.h" |
| |
| using ::testing::_; |
| using ::testing::Mock; |
| using ::testing::Return; |
| using ::testing::ReturnRef; |
| using ::testing::Values; |
| |
| typedef GoogleServiceAuthError AuthError; |
| |
| namespace { |
| |
| MATCHER_P(ModelTypeSetMatches, value, "") { return arg.Equals(value); } |
| |
| const char kTestUser[] = "chrome.p13n.test@gmail.com"; |
| |
| // Returns a ModelTypeSet with all user selectable types set. |
| syncer::ModelTypeSet GetAllTypes() { |
| return syncer::UserSelectableTypes(); |
| } |
| |
| enum SyncAllDataConfig { |
| SYNC_ALL_DATA, |
| CHOOSE_WHAT_TO_SYNC, |
| SYNC_NOTHING |
| }; |
| |
| enum EncryptAllConfig { |
| ENCRYPT_ALL_DATA, |
| ENCRYPT_PASSWORDS |
| }; |
| |
| // Create a json-format string with the key/value pairs appropriate for a call |
| // to HandleConfigure(). If |extra_values| is non-null, then the values from |
| // the passed dictionary are added to the json. |
| std::string GetConfiguration(const DictionaryValue* extra_values, |
| SyncAllDataConfig sync_all, |
| syncer::ModelTypeSet types, |
| const std::string& passphrase, |
| EncryptAllConfig encrypt_all) { |
| DictionaryValue result; |
| if (extra_values) |
| result.MergeDictionary(extra_values); |
| result.SetBoolean("syncAllDataTypes", sync_all == SYNC_ALL_DATA); |
| result.SetBoolean("syncNothing", sync_all == SYNC_NOTHING); |
| result.SetBoolean("encryptAllData", encrypt_all == ENCRYPT_ALL_DATA); |
| result.SetBoolean("usePassphrase", !passphrase.empty()); |
| if (!passphrase.empty()) |
| result.SetString("passphrase", passphrase); |
| // Add all of our data types. |
| result.SetBoolean("appsSynced", types.Has(syncer::APPS)); |
| result.SetBoolean("autofillSynced", types.Has(syncer::AUTOFILL)); |
| result.SetBoolean("bookmarksSynced", types.Has(syncer::BOOKMARKS)); |
| result.SetBoolean("extensionsSynced", types.Has(syncer::EXTENSIONS)); |
| result.SetBoolean("passwordsSynced", types.Has(syncer::PASSWORDS)); |
| result.SetBoolean("preferencesSynced", types.Has(syncer::PREFERENCES)); |
| result.SetBoolean("tabsSynced", types.Has(syncer::PROXY_TABS)); |
| result.SetBoolean("themesSynced", types.Has(syncer::THEMES)); |
| result.SetBoolean("typedUrlsSynced", types.Has(syncer::TYPED_URLS)); |
| std::string args; |
| base::JSONWriter::Write(&result, &args); |
| return args; |
| } |
| |
| // Checks whether the passed |dictionary| contains a |key| with the given |
| // |expected_value|. If |omit_if_false| is true, then the value should only |
| // be present if |expected_value| is true. |
| void CheckBool(const DictionaryValue* dictionary, |
| const std::string& key, |
| bool expected_value, |
| bool omit_if_false) { |
| if (omit_if_false && !expected_value) { |
| EXPECT_FALSE(dictionary->HasKey(key)) << |
| "Did not expect to find value for " << key; |
| } else { |
| bool actual_value; |
| EXPECT_TRUE(dictionary->GetBoolean(key, &actual_value)) << |
| "No value found for " << key; |
| EXPECT_EQ(actual_value, expected_value) << |
| "Mismatch found for " << key; |
| } |
| } |
| |
| void CheckBool(const DictionaryValue* dictionary, |
| const std::string& key, |
| bool expected_value) { |
| return CheckBool(dictionary, key, expected_value, false); |
| } |
| |
| // Checks to make sure that the values stored in |dictionary| match the values |
| // expected by the showSyncSetupPage() JS function for a given set of data |
| // types. |
| void CheckConfigDataTypeArguments(DictionaryValue* dictionary, |
| SyncAllDataConfig config, |
| syncer::ModelTypeSet types) { |
| CheckBool(dictionary, "syncAllDataTypes", config == SYNC_ALL_DATA); |
| CheckBool(dictionary, "syncNothing", config == SYNC_NOTHING); |
| CheckBool(dictionary, "appsSynced", types.Has(syncer::APPS)); |
| CheckBool(dictionary, "autofillSynced", types.Has(syncer::AUTOFILL)); |
| CheckBool(dictionary, "bookmarksSynced", types.Has(syncer::BOOKMARKS)); |
| CheckBool(dictionary, "extensionsSynced", types.Has(syncer::EXTENSIONS)); |
| CheckBool(dictionary, "passwordsSynced", types.Has(syncer::PASSWORDS)); |
| CheckBool(dictionary, "preferencesSynced", types.Has(syncer::PREFERENCES)); |
| CheckBool(dictionary, "tabsSynced", types.Has(syncer::PROXY_TABS)); |
| CheckBool(dictionary, "themesSynced", types.Has(syncer::THEMES)); |
| CheckBool(dictionary, "typedUrlsSynced", types.Has(syncer::TYPED_URLS)); |
| } |
| |
| |
| } // namespace |
| |
| // Test instance of WebUI that tracks the data passed to |
| // CallJavascriptFunction(). |
| class TestWebUI : public content::WebUI { |
| public: |
| virtual ~TestWebUI() { |
| ClearTrackedCalls(); |
| } |
| |
| void ClearTrackedCalls() { |
| // Manually free the arguments stored in CallData, since there's no good |
| // way to use a self-freeing reference like scoped_ptr in a std::vector. |
| for (std::vector<CallData>::iterator i = call_data_.begin(); |
| i != call_data_.end(); |
| ++i) { |
| delete i->arg1; |
| delete i->arg2; |
| } |
| call_data_.clear(); |
| } |
| |
| virtual void CallJavascriptFunction(const std::string& function_name) |
| OVERRIDE { |
| call_data_.push_back(CallData()); |
| call_data_.back().function_name = function_name; |
| } |
| |
| virtual void CallJavascriptFunction(const std::string& function_name, |
| const base::Value& arg1) OVERRIDE { |
| call_data_.push_back(CallData()); |
| call_data_.back().function_name = function_name; |
| call_data_.back().arg1 = arg1.DeepCopy(); |
| } |
| |
| virtual void CallJavascriptFunction(const std::string& function_name, |
| const base::Value& arg1, |
| const base::Value& arg2) OVERRIDE { |
| call_data_.push_back(CallData()); |
| call_data_.back().function_name = function_name; |
| call_data_.back().arg1 = arg1.DeepCopy(); |
| call_data_.back().arg2 = arg2.DeepCopy(); |
| } |
| |
| virtual content::WebContents* GetWebContents() const OVERRIDE { |
| return NULL; |
| } |
| virtual content::WebUIController* GetController() const OVERRIDE { |
| return NULL; |
| } |
| virtual void SetController(content::WebUIController* controller) OVERRIDE {} |
| virtual ui::ScaleFactor GetDeviceScaleFactor() const OVERRIDE { |
| return ui::SCALE_FACTOR_100P; |
| } |
| virtual const base::string16& GetOverriddenTitle() const OVERRIDE { |
| return temp_string_; |
| } |
| virtual void OverrideTitle(const base::string16& title) OVERRIDE {} |
| virtual content::PageTransition GetLinkTransitionType() const OVERRIDE { |
| return content::PAGE_TRANSITION_LINK; |
| } |
| virtual void SetLinkTransitionType(content::PageTransition type) OVERRIDE {} |
| virtual int GetBindings() const OVERRIDE { |
| return 0; |
| } |
| virtual void SetBindings(int bindings) OVERRIDE {} |
| virtual void SetFrameXPath(const std::string& xpath) OVERRIDE {} |
| virtual void AddMessageHandler( |
| content::WebUIMessageHandler* handler) OVERRIDE {} |
| virtual void RegisterMessageCallback( |
| const std::string& message, |
| const MessageCallback& callback) OVERRIDE {} |
| virtual void ProcessWebUIMessage(const GURL& source_url, |
| const std::string& message, |
| const base::ListValue& args) OVERRIDE {} |
| virtual void CallJavascriptFunction(const std::string& function_name, |
| const base::Value& arg1, |
| const base::Value& arg2, |
| const base::Value& arg3) OVERRIDE {} |
| virtual void CallJavascriptFunction(const std::string& function_name, |
| const base::Value& arg1, |
| const base::Value& arg2, |
| const base::Value& arg3, |
| const base::Value& arg4) OVERRIDE {} |
| virtual void CallJavascriptFunction( |
| const std::string& function_name, |
| const std::vector<const base::Value*>& args) OVERRIDE {} |
| |
| class CallData { |
| public: |
| CallData() : arg1(NULL), arg2(NULL) {} |
| std::string function_name; |
| Value* arg1; |
| Value* arg2; |
| }; |
| const std::vector<CallData>& call_data() { return call_data_; } |
| private: |
| std::vector<CallData> call_data_; |
| base::string16 temp_string_; |
| }; |
| |
| class TestingSyncSetupHandler : public SyncSetupHandler { |
| public: |
| TestingSyncSetupHandler(content::WebUI* web_ui, Profile* profile) |
| : SyncSetupHandler(NULL), |
| profile_(profile) { |
| set_web_ui(web_ui); |
| } |
| virtual ~TestingSyncSetupHandler() { |
| set_web_ui(NULL); |
| } |
| |
| virtual void FocusUI() OVERRIDE {} |
| |
| virtual Profile* GetProfile() const OVERRIDE { return profile_; } |
| |
| using SyncSetupHandler::is_configuring_sync; |
| |
| private: |
| #if !defined(OS_CHROMEOS) |
| virtual void DisplayGaiaLoginInNewTabOrWindow() OVERRIDE {} |
| #endif |
| |
| // Weak pointer to parent profile. |
| Profile* profile_; |
| DISALLOW_COPY_AND_ASSIGN(TestingSyncSetupHandler); |
| }; |
| |
| // The boolean parameter indicates whether the test is run with ClientOAuth |
| // or not. The test parameter is a bool: whether or not to test with/ |
| // /ClientLogin enabled or not. |
| class SyncSetupHandlerTest : public testing::Test { |
| public: |
| SyncSetupHandlerTest() : error_(GoogleServiceAuthError::NONE) {} |
| virtual void SetUp() OVERRIDE { |
| error_ = GoogleServiceAuthError::AuthErrorNone(); |
| profile_.reset(ProfileSyncServiceMock::MakeSignedInTestingProfile()); |
| |
| mock_pss_ = static_cast<ProfileSyncServiceMock*>( |
| ProfileSyncServiceFactory::GetInstance()->SetTestingFactoryAndUse( |
| profile_.get(), |
| ProfileSyncServiceMock::BuildMockProfileSyncService)); |
| EXPECT_CALL(*mock_pss_, GetAuthError()).WillRepeatedly(ReturnRef(error_)); |
| ON_CALL(*mock_pss_, GetPassphraseType()).WillByDefault( |
| Return(syncer::IMPLICIT_PASSPHRASE)); |
| ON_CALL(*mock_pss_, GetPassphraseTime()).WillByDefault( |
| Return(base::Time())); |
| ON_CALL(*mock_pss_, GetExplicitPassphraseTime()).WillByDefault( |
| Return(base::Time())); |
| |
| mock_pss_->Initialize(); |
| |
| #if defined(OS_CHROMEOS) |
| mock_signin_ = static_cast<SigninManagerBase*>( |
| SigninManagerFactory::GetInstance()->SetTestingFactoryAndUse( |
| profile_.get(), FakeSigninManagerBase::Build)); |
| #else |
| mock_signin_ = static_cast<SigninManagerBase*>( |
| SigninManagerFactory::GetInstance()->SetTestingFactoryAndUse( |
| profile_.get(), FakeSigninManager::Build)); |
| #endif |
| handler_.reset(new TestingSyncSetupHandler(&web_ui_, profile_.get())); |
| } |
| |
| // Setup the expectations for calls made when displaying the config page. |
| void SetDefaultExpectationsForConfigPage() { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()). |
| WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, GetRegisteredDataTypes()). |
| WillRepeatedly(Return(GetAllTypes())); |
| EXPECT_CALL(*mock_pss_, GetPreferredDataTypes()). |
| WillRepeatedly(Return(GetAllTypes())); |
| EXPECT_CALL(*mock_pss_, GetActiveDataTypes()). |
| WillRepeatedly(Return(GetAllTypes())); |
| EXPECT_CALL(*mock_pss_, EncryptEverythingEnabled()). |
| WillRepeatedly(Return(false)); |
| } |
| |
| void SetupInitializedProfileSyncService() { |
| // An initialized ProfileSyncService will have already completed sync setup |
| // and will have an initialized sync backend. |
| if (!mock_signin_->IsInitialized()) { |
| profile_->GetPrefs()->SetString( |
| prefs::kGoogleServicesUsername, kTestUser); |
| mock_signin_->Initialize(profile_.get(), NULL); |
| } |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, sync_initialized()).WillRepeatedly(Return(true)); |
| } |
| |
| void ExpectConfig() { |
| ASSERT_EQ(1U, web_ui_.call_data().size()); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data.function_name); |
| std::string page; |
| ASSERT_TRUE(data.arg1->GetAsString(&page)); |
| EXPECT_EQ(page, "configure"); |
| } |
| |
| void ExpectDone() { |
| ASSERT_EQ(1U, web_ui_.call_data().size()); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data.function_name); |
| std::string page; |
| ASSERT_TRUE(data.arg1->GetAsString(&page)); |
| EXPECT_EQ(page, "done"); |
| } |
| |
| void ExpectSpinnerAndClose() { |
| // We expect a call to SyncSetupOverlay.showSyncSetupPage. |
| EXPECT_EQ(1U, web_ui_.call_data().size()); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data.function_name); |
| |
| std::string page; |
| ASSERT_TRUE(data.arg1->GetAsString(&page)); |
| EXPECT_EQ(page, "spinner"); |
| // Cancelling the spinner dialog will cause CloseSyncSetup(). |
| handler_->CloseSyncSetup(); |
| EXPECT_EQ(NULL, |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| } |
| |
| // It's difficult to notify sync listeners when using a ProfileSyncServiceMock |
| // so this helper routine dispatches an OnStateChanged() notification to the |
| // SyncStartupTracker. |
| void NotifySyncListeners() { |
| if (handler_->sync_startup_tracker_) |
| handler_->sync_startup_tracker_->OnStateChanged(); |
| } |
| |
| content::TestBrowserThreadBundle thread_bundle_; |
| scoped_ptr<Profile> profile_; |
| ProfileSyncServiceMock* mock_pss_; |
| GoogleServiceAuthError error_; |
| SigninManagerBase* mock_signin_; |
| TestWebUI web_ui_; |
| scoped_ptr<TestingSyncSetupHandler> handler_; |
| }; |
| |
| TEST_F(SyncSetupHandlerTest, Basic) { |
| } |
| |
| #if !defined(OS_CHROMEOS) |
| TEST_F(SyncSetupHandlerTest, DisplayBasicLogin) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| handler_->HandleStartSignin(NULL); |
| |
| // Sync setup hands off control to the gaia login tab. |
| EXPECT_EQ(NULL, |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| |
| ASSERT_FALSE(handler_->is_configuring_sync()); |
| |
| handler_->CloseSyncSetup(); |
| EXPECT_EQ(NULL, |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSyncSetupWhenNotSignedIn) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| handler_->HandleShowSetupUI(NULL); |
| |
| // We expect a call to SyncSetupOverlay.showSyncSetupPage. |
| ASSERT_EQ(1U, web_ui_.call_data().size()); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data.function_name); |
| |
| ASSERT_FALSE(handler_->is_configuring_sync()); |
| EXPECT_EQ(NULL, |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| } |
| #endif |
| |
| // Verifies that the handler correctly handles a cancellation when |
| // it is displaying the spinner to the user. |
| TEST_F(SyncSetupHandlerTest, DisplayConfigureWithBackendDisabledAndCancel) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(true)); |
| profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, kTestUser); |
| mock_signin_->Initialize(profile_.get(), NULL); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| error_ = GoogleServiceAuthError::AuthErrorNone(); |
| EXPECT_CALL(*mock_pss_, sync_initialized()).WillRepeatedly(Return(false)); |
| |
| // We're simulating a user setting up sync, which would cause the backend to |
| // kick off initialization, but not download user data types. The sync |
| // backend will try to download control data types (e.g encryption info), but |
| // that won't finish for this test as we're simulating cancelling while the |
| // spinner is showing. |
| handler_->HandleShowSetupUI(NULL); |
| |
| EXPECT_EQ(handler_.get(), |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| |
| ExpectSpinnerAndClose(); |
| } |
| |
| // Verifies that the handler correctly transitions from showing the spinner |
| // to showing a configuration page when sync setup completes successfully. |
| TEST_F(SyncSetupHandlerTest, |
| DisplayConfigureWithBackendDisabledAndSyncStartupCompleted) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(true)); |
| profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, kTestUser); |
| mock_signin_->Initialize(profile_.get(), NULL); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| error_ = GoogleServiceAuthError::AuthErrorNone(); |
| // Sync backend is stopped initially, and will start up. |
| EXPECT_CALL(*mock_pss_, sync_initialized()) |
| .WillRepeatedly(Return(false)); |
| SetDefaultExpectationsForConfigPage(); |
| |
| handler_->OpenSyncSetup(); |
| |
| // We expect a call to SyncSetupOverlay.showSyncSetupPage. |
| EXPECT_EQ(1U, web_ui_.call_data().size()); |
| |
| const TestWebUI::CallData& data0 = web_ui_.call_data()[0]; |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data0.function_name); |
| std::string page; |
| ASSERT_TRUE(data0.arg1->GetAsString(&page)); |
| EXPECT_EQ(page, "spinner"); |
| |
| Mock::VerifyAndClearExpectations(mock_pss_); |
| // Now, act as if the ProfileSyncService has started up. |
| SetDefaultExpectationsForConfigPage(); |
| EXPECT_CALL(*mock_pss_, sync_initialized()) |
| .WillRepeatedly(Return(true)); |
| error_ = GoogleServiceAuthError::AuthErrorNone(); |
| EXPECT_CALL(*mock_pss_, GetAuthError()).WillRepeatedly(ReturnRef(error_)); |
| NotifySyncListeners(); |
| |
| // We expect a second call to SyncSetupOverlay.showSyncSetupPage. |
| EXPECT_EQ(2U, web_ui_.call_data().size()); |
| const TestWebUI::CallData& data1 = web_ui_.call_data().back(); |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data1.function_name); |
| ASSERT_TRUE(data1.arg1->GetAsString(&page)); |
| EXPECT_EQ(page, "configure"); |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data1.arg2->GetAsDictionary(&dictionary)); |
| CheckBool(dictionary, "passphraseFailed", false); |
| CheckBool(dictionary, "showSyncEverythingPage", false); |
| CheckBool(dictionary, "syncAllDataTypes", true); |
| CheckBool(dictionary, "encryptAllData", false); |
| CheckBool(dictionary, "usePassphrase", false); |
| } |
| |
| // Verifies the case where the user cancels after the sync backend has |
| // initialized (meaning it already transitioned from the spinner to a proper |
| // configuration page, tested by |
| // DisplayConfigureWithBackendDisabledAndSigninSuccess), but before the user |
| // before the user has continued on. |
| TEST_F(SyncSetupHandlerTest, |
| DisplayConfigureWithBackendDisabledAndCancelAfterSigninSuccess) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(true)); |
| profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, kTestUser); |
| mock_signin_->Initialize(profile_.get(), NULL); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| error_ = GoogleServiceAuthError::AuthErrorNone(); |
| EXPECT_CALL(*mock_pss_, sync_initialized()) |
| .WillOnce(Return(false)) |
| .WillRepeatedly(Return(true)); |
| SetDefaultExpectationsForConfigPage(); |
| handler_->OpenSyncSetup(); |
| |
| // It's important to tell sync the user cancelled the setup flow before we |
| // tell it we're through with the setup progress. |
| testing::InSequence seq; |
| EXPECT_CALL(*mock_pss_, DisableForUser()); |
| EXPECT_CALL(*mock_pss_, SetSetupInProgress(false)); |
| |
| handler_->CloseSyncSetup(); |
| EXPECT_EQ(NULL, |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, |
| DisplayConfigureWithBackendDisabledAndSigninFailed) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(true)); |
| profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, kTestUser); |
| mock_signin_->Initialize(profile_.get(), NULL); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| error_ = GoogleServiceAuthError::AuthErrorNone(); |
| EXPECT_CALL(*mock_pss_, sync_initialized()).WillRepeatedly(Return(false)); |
| |
| handler_->OpenSyncSetup(); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data.function_name); |
| std::string page; |
| ASSERT_TRUE(data.arg1->GetAsString(&page)); |
| EXPECT_EQ(page, "spinner"); |
| Mock::VerifyAndClearExpectations(mock_pss_); |
| error_ = GoogleServiceAuthError( |
| GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS); |
| EXPECT_CALL(*mock_pss_, GetAuthError()).WillRepeatedly(ReturnRef(error_)); |
| NotifySyncListeners(); |
| |
| // On failure, the dialog will be closed. |
| EXPECT_EQ(NULL, |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| } |
| |
| #if !defined(OS_CHROMEOS) |
| |
| class SyncSetupHandlerNonCrosTest : public SyncSetupHandlerTest { |
| public: |
| SyncSetupHandlerNonCrosTest() {} |
| virtual void SetUp() OVERRIDE { |
| SyncSetupHandlerTest::SetUp(); |
| mock_signin_ = static_cast<SigninManagerBase*>( |
| SigninManagerFactory::GetInstance()->SetTestingFactoryAndUse( |
| profile_.get(), FakeSigninManager::Build)); |
| } |
| }; |
| |
| TEST_F(SyncSetupHandlerNonCrosTest, HandleGaiaAuthFailure) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, HasUnrecoverableError()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| // Open the web UI. |
| handler_->OpenSyncSetup(); |
| |
| ASSERT_FALSE(handler_->is_configuring_sync()); |
| } |
| |
| // TODO(kochi): We need equivalent tests for ChromeOS. |
| TEST_F(SyncSetupHandlerNonCrosTest, UnrecoverableErrorInitializingSync) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| // Open the web UI. |
| handler_->OpenSyncSetup(); |
| |
| ASSERT_FALSE(handler_->is_configuring_sync()); |
| } |
| |
| TEST_F(SyncSetupHandlerNonCrosTest, GaiaErrorInitializingSync) { |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, HasSyncSetupCompleted()) |
| .WillRepeatedly(Return(false)); |
| // Open the web UI. |
| handler_->OpenSyncSetup(); |
| |
| ASSERT_FALSE(handler_->is_configuring_sync()); |
| } |
| |
| #endif // #if !defined(OS_CHROMEOS) |
| |
| TEST_F(SyncSetupHandlerTest, TestSyncEverything) { |
| std::string args = GetConfiguration( |
| NULL, SYNC_ALL_DATA, GetAllTypes(), std::string(), ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, OnUserChoseDatatypes(true, _)); |
| handler_->HandleConfigure(&list_args); |
| |
| // Ensure that we navigated to the "done" state since we don't need a |
| // passphrase. |
| ExpectDone(); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, TestSyncNothing) { |
| std::string args = GetConfiguration( |
| NULL, SYNC_NOTHING, GetAllTypes(), std::string(), ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, DisableForUser()); |
| SetupInitializedProfileSyncService(); |
| handler_->HandleConfigure(&list_args); |
| |
| // We expect a call to SyncSetupOverlay.showSyncSetupPage. |
| ASSERT_EQ(1U, web_ui_.call_data().size()); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| EXPECT_EQ("SyncSetupOverlay.showSyncSetupPage", data.function_name); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, TurnOnEncryptAll) { |
| std::string args = GetConfiguration( |
| NULL, SYNC_ALL_DATA, GetAllTypes(), std::string(), ENCRYPT_ALL_DATA); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, EnableEncryptEverything()); |
| EXPECT_CALL(*mock_pss_, OnUserChoseDatatypes(true, _)); |
| handler_->HandleConfigure(&list_args); |
| |
| // Ensure that we navigated to the "done" state since we don't need a |
| // passphrase. |
| ExpectDone(); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, TestPassphraseStillRequired) { |
| std::string args = GetConfiguration( |
| NULL, SYNC_ALL_DATA, GetAllTypes(), std::string(), ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, OnUserChoseDatatypes(_, _)); |
| SetDefaultExpectationsForConfigPage(); |
| |
| // We should navigate back to the configure page since we need a passphrase. |
| handler_->HandleConfigure(&list_args); |
| |
| ExpectConfig(); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, SuccessfullySetPassphrase) { |
| DictionaryValue dict; |
| dict.SetBoolean("isGooglePassphrase", true); |
| std::string args = GetConfiguration(&dict, |
| SYNC_ALL_DATA, |
| GetAllTypes(), |
| "gaiaPassphrase", |
| ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| // Act as if an encryption passphrase is required the first time, then never |
| // again after that. |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()).WillOnce(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, OnUserChoseDatatypes(_, _)); |
| EXPECT_CALL(*mock_pss_, SetDecryptionPassphrase("gaiaPassphrase")). |
| WillOnce(Return(true)); |
| |
| handler_->HandleConfigure(&list_args); |
| // We should navigate to "done" page since we finished configuring. |
| ExpectDone(); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, SelectCustomEncryption) { |
| DictionaryValue dict; |
| dict.SetBoolean("isGooglePassphrase", false); |
| std::string args = GetConfiguration(&dict, |
| SYNC_ALL_DATA, |
| GetAllTypes(), |
| "custom_passphrase", |
| ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, OnUserChoseDatatypes(_, _)); |
| EXPECT_CALL(*mock_pss_, |
| SetEncryptionPassphrase("custom_passphrase", |
| ProfileSyncService::EXPLICIT)); |
| |
| handler_->HandleConfigure(&list_args); |
| // We should navigate to "done" page since we finished configuring. |
| ExpectDone(); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, UnsuccessfullySetPassphrase) { |
| DictionaryValue dict; |
| dict.SetBoolean("isGooglePassphrase", true); |
| std::string args = GetConfiguration(&dict, |
| SYNC_ALL_DATA, |
| GetAllTypes(), |
| "invalid_passphrase", |
| ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, OnUserChoseDatatypes(_, _)); |
| EXPECT_CALL(*mock_pss_, SetDecryptionPassphrase("invalid_passphrase")). |
| WillOnce(Return(false)); |
| |
| SetDefaultExpectationsForConfigPage(); |
| // We should navigate back to the configure page since we need a passphrase. |
| handler_->HandleConfigure(&list_args); |
| |
| ExpectConfig(); |
| |
| // Make sure we display an error message to the user due to the failed |
| // passphrase. |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data.arg2->GetAsDictionary(&dictionary)); |
| CheckBool(dictionary, "passphraseFailed", true); |
| } |
| |
| // Walks through each user selectable type, and tries to sync just that single |
| // data type. |
| TEST_F(SyncSetupHandlerTest, TestSyncIndividualTypes) { |
| syncer::ModelTypeSet user_selectable_types = GetAllTypes(); |
| syncer::ModelTypeSet::Iterator it; |
| for (it = user_selectable_types.First(); it.Good(); it.Inc()) { |
| syncer::ModelTypeSet type_to_set; |
| type_to_set.Put(it.Get()); |
| std::string args = GetConfiguration(NULL, |
| CHOOSE_WHAT_TO_SYNC, |
| type_to_set, |
| std::string(), |
| ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, |
| OnUserChoseDatatypes(false, ModelTypeSetMatches(type_to_set))); |
| handler_->HandleConfigure(&list_args); |
| |
| ExpectDone(); |
| Mock::VerifyAndClearExpectations(mock_pss_); |
| web_ui_.ClearTrackedCalls(); |
| } |
| } |
| |
| TEST_F(SyncSetupHandlerTest, TestSyncAllManually) { |
| std::string args = GetConfiguration(NULL, |
| CHOOSE_WHAT_TO_SYNC, |
| GetAllTypes(), |
| std::string(), |
| ENCRYPT_PASSWORDS); |
| ListValue list_args; |
| list_args.Append(new StringValue(args)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequiredForDecryption()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| EXPECT_CALL(*mock_pss_, |
| OnUserChoseDatatypes(false, ModelTypeSetMatches(GetAllTypes()))); |
| handler_->HandleConfigure(&list_args); |
| |
| ExpectDone(); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSyncSetup) { |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| // This should display the sync setup dialog (not login). |
| SetDefaultExpectationsForConfigPage(); |
| handler_->OpenSyncSetup(); |
| |
| ExpectConfig(); |
| } |
| |
| // We do not display signin on chromeos in the case of auth error. |
| TEST_F(SyncSetupHandlerTest, ShowSigninOnAuthError) { |
| // Initialize the system to a signed in state, but with an auth error. |
| error_ = GoogleServiceAuthError( |
| GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS); |
| |
| SetupInitializedProfileSyncService(); |
| mock_signin_->SetAuthenticatedUsername(kTestUser); |
| FakeAuthStatusProvider provider( |
| SigninGlobalError::GetForProfile(profile_.get())); |
| provider.SetAuthError(kTestUser, error_); |
| EXPECT_CALL(*mock_pss_, IsSyncEnabledAndLoggedIn()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsOAuthRefreshTokenAvailable()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, sync_initialized()).WillRepeatedly(Return(false)); |
| |
| #if defined(OS_CHROMEOS) |
| // On ChromeOS, auth errors are ignored - instead we just try to start the |
| // sync backend (which will fail due to the auth error). This should only |
| // happen if the user manually navigates to chrome://settings/syncSetup - |
| // clicking on the button in the UI will sign the user out rather than |
| // displaying a spinner. Should be no visible UI on ChromeOS in this case. |
| EXPECT_EQ(NULL, LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| #else |
| |
| // On ChromeOS, this should display the spinner while we try to startup the |
| // sync backend, and on desktop this displays the login dialog. |
| handler_->OpenSyncSetup(); |
| |
| // Sync setup is closed when re-auth is in progress. |
| EXPECT_EQ(NULL, |
| LoginUIServiceFactory::GetForProfile( |
| profile_.get())->current_login_ui()); |
| |
| ASSERT_FALSE(handler_->is_configuring_sync()); |
| #endif |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSetupSyncEverything) { |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| SetDefaultExpectationsForConfigPage(); |
| // This should display the sync setup dialog (not login). |
| handler_->OpenSyncSetup(); |
| |
| ExpectConfig(); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data.arg2->GetAsDictionary(&dictionary)); |
| CheckBool(dictionary, "showSyncEverythingPage", false); |
| CheckBool(dictionary, "syncAllDataTypes", true); |
| CheckBool(dictionary, "appsRegistered", true); |
| CheckBool(dictionary, "autofillRegistered", true); |
| CheckBool(dictionary, "bookmarksRegistered", true); |
| CheckBool(dictionary, "extensionsRegistered", true); |
| CheckBool(dictionary, "passwordsRegistered", true); |
| CheckBool(dictionary, "preferencesRegistered", true); |
| CheckBool(dictionary, "tabsRegistered", true); |
| CheckBool(dictionary, "themesRegistered", true); |
| CheckBool(dictionary, "typedUrlsRegistered", true); |
| CheckBool(dictionary, "showPassphrase", false); |
| CheckBool(dictionary, "usePassphrase", false); |
| CheckBool(dictionary, "passphraseFailed", false); |
| CheckBool(dictionary, "encryptAllData", false); |
| CheckConfigDataTypeArguments(dictionary, SYNC_ALL_DATA, GetAllTypes()); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSetupManuallySyncAll) { |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| browser_sync::SyncPrefs sync_prefs(profile_->GetPrefs()); |
| sync_prefs.SetKeepEverythingSynced(false); |
| SetDefaultExpectationsForConfigPage(); |
| // This should display the sync setup dialog (not login). |
| handler_->OpenSyncSetup(); |
| |
| ExpectConfig(); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data.arg2->GetAsDictionary(&dictionary)); |
| CheckConfigDataTypeArguments(dictionary, CHOOSE_WHAT_TO_SYNC, GetAllTypes()); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSetupSyncForAllTypesIndividually) { |
| syncer::ModelTypeSet user_selectable_types = GetAllTypes(); |
| syncer::ModelTypeSet::Iterator it; |
| for (it = user_selectable_types.First(); it.Good(); it.Inc()) { |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| browser_sync::SyncPrefs sync_prefs(profile_->GetPrefs()); |
| sync_prefs.SetKeepEverythingSynced(false); |
| SetDefaultExpectationsForConfigPage(); |
| syncer::ModelTypeSet types; |
| types.Put(it.Get()); |
| EXPECT_CALL(*mock_pss_, GetPreferredDataTypes()). |
| WillRepeatedly(Return(types)); |
| |
| // This should display the sync setup dialog (not login). |
| handler_->OpenSyncSetup(); |
| |
| ExpectConfig(); |
| // Close the config overlay. |
| LoginUIServiceFactory::GetForProfile(profile_.get())->LoginUIClosed( |
| handler_.get()); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data.arg2->GetAsDictionary(&dictionary)); |
| CheckConfigDataTypeArguments(dictionary, CHOOSE_WHAT_TO_SYNC, types); |
| Mock::VerifyAndClearExpectations(mock_pss_); |
| // Clean up so we can loop back to display the dialog again. |
| web_ui_.ClearTrackedCalls(); |
| } |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSetupGaiaPassphraseRequired) { |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| SetDefaultExpectationsForConfigPage(); |
| |
| // This should display the sync setup dialog (not login). |
| handler_->OpenSyncSetup(); |
| |
| ExpectConfig(); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data.arg2->GetAsDictionary(&dictionary)); |
| CheckBool(dictionary, "showPassphrase", true); |
| CheckBool(dictionary, "usePassphrase", false); |
| CheckBool(dictionary, "passphraseFailed", false); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSetupCustomPassphraseRequired) { |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_pss_, GetPassphraseType()) |
| .WillRepeatedly(Return(syncer::CUSTOM_PASSPHRASE)); |
| SetupInitializedProfileSyncService(); |
| SetDefaultExpectationsForConfigPage(); |
| |
| // This should display the sync setup dialog (not login). |
| handler_->OpenSyncSetup(); |
| |
| ExpectConfig(); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data.arg2->GetAsDictionary(&dictionary)); |
| CheckBool(dictionary, "showPassphrase", true); |
| CheckBool(dictionary, "usePassphrase", true); |
| CheckBool(dictionary, "passphraseFailed", false); |
| } |
| |
| TEST_F(SyncSetupHandlerTest, ShowSetupEncryptAll) { |
| EXPECT_CALL(*mock_pss_, IsPassphraseRequired()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_pss_, IsUsingSecondaryPassphrase()) |
| .WillRepeatedly(Return(false)); |
| SetupInitializedProfileSyncService(); |
| SetDefaultExpectationsForConfigPage(); |
| EXPECT_CALL(*mock_pss_, EncryptEverythingEnabled()). |
| WillRepeatedly(Return(true)); |
| |
| // This should display the sync setup dialog (not login). |
| handler_->OpenSyncSetup(); |
| |
| ExpectConfig(); |
| const TestWebUI::CallData& data = web_ui_.call_data()[0]; |
| DictionaryValue* dictionary; |
| ASSERT_TRUE(data.arg2->GetAsDictionary(&dictionary)); |
| CheckBool(dictionary, "encryptAllData", true); |
| } |