Index: chrome/browser/sync/internal_api/sync_manager.cc |
diff --git a/chrome/browser/sync/internal_api/sync_manager.cc b/chrome/browser/sync/internal_api/sync_manager.cc |
index ba62edda3d0be72b46e8e693374dd942f33193fc..6e6f17664eaebac9f8336f9fb3ad74c1feb10ae8 100644 |
--- a/chrome/browser/sync/internal_api/sync_manager.cc |
+++ b/chrome/browser/sync/internal_api/sync_manager.cc |
@@ -1080,7 +1080,7 @@ void SyncManager::SyncInternal::UpdateCryptographerAndNigoriCallback( |
Cryptographer* cryptographer = trans.GetCryptographer(); |
WriteNode node(&trans); |
- if (node.InitByTagLookup(kNigoriTag)) { |
+ if (node.InitByTagLookup(kNigoriTag) == sync_api::BaseNode::INIT_OK) { |
sync_pb::NigoriSpecifics nigori(node.GetNigoriSpecifics()); |
Cryptographer::UpdateResult result = cryptographer->Update(nigori); |
if (result == Cryptographer::NEEDS_PASSPHRASE) { |
@@ -1253,7 +1253,7 @@ void SyncManager::SyncInternal::MaybeSetSyncTabsInNigoriNode( |
if (initialized_ && enabled_types.Has(syncable::SESSIONS)) { |
WriteTransaction trans(FROM_HERE, GetUserShare()); |
WriteNode node(&trans); |
- if (!node.InitByTagLookup(kNigoriTag)) { |
+ if (node.InitByTagLookup(kNigoriTag) != sync_api::BaseNode::INIT_OK) { |
LOG(WARNING) << "Unable to set 'sync_tabs' bit because Nigori node not " |
<< "found."; |
return; |
@@ -1279,7 +1279,7 @@ void SyncManager::SyncInternal::SetEncryptionPassphrase( |
Cryptographer* cryptographer = trans.GetCryptographer(); |
KeyParams key_params = {"localhost", "dummy", passphrase}; |
WriteNode node(&trans); |
- if (!node.InitByTagLookup(kNigoriTag)) { |
+ if (node.InitByTagLookup(kNigoriTag) != sync_api::BaseNode::INIT_OK) { |
// TODO(albertb): Plumb an UnrecoverableError all the way back to the PSS. |
NOTREACHED(); |
return; |
@@ -1393,7 +1393,7 @@ void SyncManager::SyncInternal::SetDecryptionPassphrase( |
Cryptographer* cryptographer = trans.GetCryptographer(); |
KeyParams key_params = {"localhost", "dummy", passphrase}; |
WriteNode node(&trans); |
- if (!node.InitByTagLookup(kNigoriTag)) { |
+ if (node.InitByTagLookup(kNigoriTag) != sync_api::BaseNode::INIT_OK) { |
// TODO(albertb): Plumb an UnrecoverableError all the way back to the PSS. |
NOTREACHED(); |
return; |
@@ -1582,7 +1582,7 @@ void SyncManager::SyncInternal::FinishSetPassphrase( |
bool SyncManager::SyncInternal::IsUsingExplicitPassphrase() { |
ReadTransaction trans(FROM_HERE, &share_); |
ReadNode node(&trans); |
- if (!node.InitByTagLookup(kNigoriTag)) { |
+ if (node.InitByTagLookup(kNigoriTag) != sync_api::BaseNode::INIT_OK) { |
// TODO(albertb): Plumb an UnrecoverableError all the way back to the PSS. |
NOTREACHED(); |
return false; |
@@ -1596,7 +1596,7 @@ void SyncManager::SyncInternal::RefreshEncryption() { |
WriteTransaction trans(FROM_HERE, GetUserShare()); |
WriteNode node(&trans); |
- if (!node.InitByTagLookup(kNigoriTag)) { |
+ if (node.InitByTagLookup(kNigoriTag) != sync_api::BaseNode::INIT_OK) { |
NOTREACHED() << "Unable to set encrypted datatypes because Nigori node not " |
<< "found."; |
return; |
@@ -1643,7 +1643,7 @@ void SyncManager::SyncInternal::ReEncryptEverything(WriteTransaction* trans) { |
continue; |
ReadNode type_root(trans); |
tag = syncable::ModelTypeToRootTag(iter.Get()); |
- if (!type_root.InitByTagLookup(tag)) { |
+ if (type_root.InitByTagLookup(tag) != sync_api::BaseNode::INIT_OK) { |
// This can happen when we enable a datatype for the first time on restart |
// (for example when we upgrade) and therefore haven't done the initial |
// download for that type at the time we RefreshEncryption. There's |
@@ -1662,7 +1662,7 @@ void SyncManager::SyncInternal::ReEncryptEverything(WriteTransaction* trans) { |
continue; |
WriteNode child(trans); |
- if (!child.InitByIdLookup(child_id)) { |
+ if (child.InitByIdLookup(child_id) != sync_api::BaseNode::INIT_OK) { |
NOTREACHED(); |
continue; |
} |
@@ -1685,11 +1685,12 @@ void SyncManager::SyncInternal::ReEncryptEverything(WriteTransaction* trans) { |
syncable::ModelTypeToRootTag(syncable::PASSWORDS); |
// It's possible we'll have the password routing info and not the password |
// root if we attempted to set a passphrase before passwords was enabled. |
- if (passwords_root.InitByTagLookup(passwords_tag)) { |
+ if (passwords_root.InitByTagLookup(passwords_tag) == |
+ sync_api::BaseNode::INIT_OK) { |
int64 child_id = passwords_root.GetFirstChildId(); |
while (child_id != kInvalidId) { |
WriteNode child(trans); |
- if (!child.InitByIdLookup(child_id)) { |
+ if (child.InitByIdLookup(child_id) != sync_api::BaseNode::INIT_OK) { |
NOTREACHED(); |
return; |
} |
@@ -2092,7 +2093,8 @@ void SyncManager::SyncInternal::OnSyncEngineEvent( |
// that the nigori node is up to date at the end of each cycle. |
WriteTransaction trans(FROM_HERE, GetUserShare()); |
WriteNode nigori_node(&trans); |
- if (nigori_node.InitByTagLookup(kNigoriTag)) { |
+ if (nigori_node.InitByTagLookup(kNigoriTag) == |
+ sync_api::BaseNode::INIT_OK) { |
Cryptographer* cryptographer = trans.GetCryptographer(); |
UpdateNigoriEncryptionState(cryptographer, &nigori_node); |
} |
@@ -2272,7 +2274,7 @@ JsArgList GetNodeInfoById(const JsArgList& args, |
continue; |
} |
ReadNode node(&trans); |
- if (!node.InitByIdLookup(id)) { |
+ if (node.InitByIdLookup(id) != sync_api::BaseNode::INIT_OK) { |
continue; |
} |
node_summaries->Append((node.*info_getter)()); |
@@ -2480,7 +2482,7 @@ bool SyncManager::ReceivedExperimentalTypes(syncable::ModelTypeSet* to_add) |
const { |
ReadTransaction trans(FROM_HERE, GetUserShare()); |
ReadNode node(&trans); |
- if (!node.InitByTagLookup(kNigoriTag)) { |
+ if (node.InitByTagLookup(kNigoriTag) != sync_api::BaseNode::INIT_OK) { |
DVLOG(1) << "Couldn't find Nigori node."; |
return false; |
} |