// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/browser/sync/glue/sync_backend_host_mock.h" #include "components/sync_driver/sync_frontend.h" namespace browser_sync { const char kTestCacheGuid[] = "test-guid"; SyncBackendHostMock::SyncBackendHostMock() : fail_initial_download_(false) {} SyncBackendHostMock::~SyncBackendHostMock() {} void SyncBackendHostMock::Initialize( sync_driver::SyncFrontend* frontend, scoped_ptr sync_thread, const syncer::WeakHandle& event_handler, const GURL& service_url, const syncer::SyncCredentials& credentials, bool delete_sync_data_folder, scoped_ptr sync_manager_factory, scoped_ptr unrecoverable_error_handler, syncer::ReportUnrecoverableErrorFunction report_unrecoverable_error_function, syncer::NetworkResources* network_resources) { frontend->OnBackendInitialized( syncer::WeakHandle(), syncer::WeakHandle(), kTestCacheGuid, !fail_initial_download_); } void SyncBackendHostMock::UpdateCredentials( const syncer::SyncCredentials& credentials) {} void SyncBackendHostMock::StartSyncingWithServer() {} void SyncBackendHostMock::SetEncryptionPassphrase( const std::string& passphrase, bool is_explicit) {} bool SyncBackendHostMock::SetDecryptionPassphrase( const std::string& passphrase) { return false; } void SyncBackendHostMock::StopSyncingForShutdown() {} scoped_ptr SyncBackendHostMock::Shutdown( syncer::ShutdownReason reason) { return scoped_ptr(); } void SyncBackendHostMock::UnregisterInvalidationIds() {} void SyncBackendHostMock::ConfigureDataTypes( syncer::ConfigureReason reason, const DataTypeConfigStateMap& config_state_map, const base::Callback& ready_task, const base::Callback& retry_callback) {} void SyncBackendHostMock::EnableEncryptEverything() {} void SyncBackendHostMock::ActivateDataType( syncer::ModelType type, syncer::ModelSafeGroup group, sync_driver::ChangeProcessor* change_processor) {} void SyncBackendHostMock::DeactivateDataType(syncer::ModelType type) {} syncer::UserShare* SyncBackendHostMock::GetUserShare() const { return NULL; } scoped_ptr SyncBackendHostMock::GetSyncContextProxy() { return scoped_ptr(); } SyncBackendHost::Status SyncBackendHostMock::GetDetailedStatus() { return SyncBackendHost::Status(); } syncer::sessions::SyncSessionSnapshot SyncBackendHostMock::GetLastSessionSnapshot() const { return syncer::sessions::SyncSessionSnapshot(); } bool SyncBackendHostMock::HasUnsyncedItems() const { return false; } bool SyncBackendHostMock::IsNigoriEnabled() const { return false; } syncer::PassphraseType SyncBackendHostMock::GetPassphraseType() const { return syncer::IMPLICIT_PASSPHRASE; } base::Time SyncBackendHostMock::GetExplicitPassphraseTime() const { return base::Time(); } bool SyncBackendHostMock::IsCryptographerReady( const syncer::BaseTransaction* trans) const { return false; } void SyncBackendHostMock::GetModelSafeRoutingInfo( syncer::ModelSafeRoutingInfo* out) const {} base::MessageLoop* SyncBackendHostMock::GetSyncLoopForTesting() { return NULL; } void SyncBackendHostMock::RequestBufferedProtocolEventsAndEnableForwarding() {} void SyncBackendHostMock::DisableProtocolEventForwarding() {} void SyncBackendHostMock::EnableDirectoryTypeDebugInfoForwarding() {} void SyncBackendHostMock::DisableDirectoryTypeDebugInfoForwarding() {} void SyncBackendHostMock::GetAllNodesForTypes( syncer::ModelTypeSet types, base::Callback& type, ScopedVector) > callback) {} void SyncBackendHostMock::set_fail_initial_download(bool should_fail) { fail_initial_download_ = should_fail; } } // namespace browser_sync