| Index: chrome/browser/sync/engine/syncapi.cc
|
| ===================================================================
|
| --- chrome/browser/sync/engine/syncapi.cc (revision 30948)
|
| +++ chrome/browser/sync/engine/syncapi.cc (working copy)
|
| @@ -133,8 +133,8 @@
|
| namespace sync_api {
|
| class ModelSafeWorkerBridge;
|
|
|
| -static const PSTR_CHAR kBookmarkSyncUserSettingsDatabase[] =
|
| - PSTR("BookmarkSyncSettings.sqlite3");
|
| +static const FilePath::CharType kBookmarkSyncUserSettingsDatabase[] =
|
| + FILE_PATH_LITERAL("BookmarkSyncSettings.sqlite3");
|
| static const PSTR_CHAR kDefaultNameForNewNodes[] = PSTR(" ");
|
|
|
| // The list of names which are reserved for use by the server.
|
| @@ -171,29 +171,11 @@
|
| return !string.empty() && *string.rbegin() == ' ';
|
| }
|
|
|
| -static inline void String16ToPathString(const sync_char16 *in,
|
| - PathString *out) {
|
| - string16 in_str(in);
|
| -#if defined(OS_WIN)
|
| - out->assign(in_str);
|
| -#else
|
| - UTF16ToUTF8(in_str.c_str(), in_str.length(), out);
|
| -#endif
|
| -}
|
| -
|
| -static inline void PathStringToString16(const PathString& in, string16* out) {
|
| -#if defined(OS_WIN)
|
| - out->assign(in);
|
| -#else
|
| - UTF8ToUTF16(in.c_str(), in.length(), out);
|
| -#endif
|
| -}
|
| -
|
| // When taking a name from the syncapi, append a space if it matches the
|
| // pattern of a server-illegal name followed by zero or more spaces.
|
| static void SyncAPINameToServerName(const sync_char16 *sync_api_name,
|
| PathString* out) {
|
| - String16ToPathString(sync_api_name, out);
|
| + *out = UTF16ToUTF8(sync_api_name);
|
| string16 sync_api_name_str(sync_api_name);
|
| if (IsNameServerIllegalAfterTrimming(sync_api_name_str))
|
| out->append(PSTR(" "));
|
| @@ -204,8 +186,7 @@
|
| // space.
|
| static void ServerNameToSyncAPIName(const PathString& server_name,
|
| string16*out) {
|
| - string16 server_name_str;
|
| - PathStringToString16(server_name, &server_name_str);
|
| + string16 server_name_str(UTF8ToUTF16(server_name));
|
| if (IsNameServerIllegalAfterTrimming(server_name_str) &&
|
| EndsWithSpace(server_name_str))
|
| out->assign(server_name_str, 0, server_name_str.size() - 1);
|
| @@ -272,7 +253,7 @@
|
|
|
| const sync_char16* BaseNode::GetURL() const {
|
| // Store the string in data_ so that the returned pointer is valid.
|
| - PathStringToString16(GetEntry()->Get(syncable::BOOKMARK_URL), &data_->url);
|
| + data_->url = UTF8ToUTF16(GetEntry()->Get(syncable::BOOKMARK_URL));
|
| return data_->url.c_str();
|
| }
|
|
|
| @@ -357,8 +338,7 @@
|
| }
|
|
|
| void WriteNode::SetURL(const sync_char16* url) {
|
| - PathString url_string;
|
| - String16ToPathString(url, &url_string);
|
| + PathString url_string(UTF16ToUTF8(url));
|
| if (url_string == entry_->Get(syncable::BOOKMARK_URL))
|
| return; // Skip redundant changes.
|
|
|
| @@ -543,8 +523,7 @@
|
|
|
| bool ReadNode::InitByTagLookup(const sync_char16* tag) {
|
| DCHECK(!entry_) << "Init called twice";
|
| - PathString tag_string;
|
| - String16ToPathString(tag, &tag_string);
|
| + PathString tag_string(UTF16ToUTF8(tag));
|
| if (tag_string.empty())
|
| return false;
|
| syncable::BaseTransaction* trans = transaction_->GetWrappedTrans();
|
| @@ -702,7 +681,7 @@
|
|
|
| ~SyncInternal() { }
|
|
|
| - bool Init(const PathString& database_location,
|
| + bool Init(const FilePath& database_location,
|
| const std::string& sync_server_and_path,
|
| int port,
|
| const char* gaia_service_id,
|
| @@ -941,7 +920,7 @@
|
| data_ = new SyncInternal(this);
|
| }
|
|
|
| -bool SyncManager::Init(const sync_char16* database_location,
|
| +bool SyncManager::Init(const FilePath& database_location,
|
| const char* sync_server_and_path,
|
| int sync_server_port,
|
| const char* gaia_service_id,
|
| @@ -952,13 +931,10 @@
|
| ModelSafeWorkerInterface* model_safe_worker,
|
| bool attempt_last_user_authentication,
|
| const char* user_agent) {
|
| - DCHECK(database_location);
|
| DCHECK(post_factory);
|
|
|
| - PathString db_path;
|
| - String16ToPathString(database_location, &db_path);
|
| string server_string(sync_server_and_path);
|
| - return data_->Init(db_path,
|
| + return data_->Init(database_location,
|
| server_string,
|
| sync_server_port,
|
| gaia_service_id,
|
| @@ -982,13 +958,12 @@
|
| }
|
|
|
| const char* SyncManager::SyncInternal::GetAuthenticatedUsername() {
|
| - cached_auth_watcher_email_ = browser_sync::ToUTF8(
|
| - username_for_share()).get_string();
|
| + cached_auth_watcher_email_ = username_for_share();
|
| return cached_auth_watcher_email_.c_str();
|
| }
|
|
|
| bool SyncManager::SyncInternal::Init(
|
| - const PathString& database_location,
|
| + const FilePath& database_location,
|
| const std::string& sync_server_and_path,
|
| int port,
|
| const char* gaia_service_id,
|
| @@ -1001,8 +976,8 @@
|
|
|
| // Set up UserSettings, creating the db if necessary. We need this to
|
| // instantiate a URLFactory to give to the Syncer.
|
| - PathString settings_db_file = AppendSlash(database_location) +
|
| - kBookmarkSyncUserSettingsDatabase;
|
| + FilePath settings_db_file =
|
| + database_location.Append(FilePath(kBookmarkSyncUserSettingsDatabase));
|
| user_settings_.reset(new UserSettings());
|
| if (!user_settings_->Init(settings_db_file))
|
| return false;
|
| @@ -1103,8 +1078,7 @@
|
|
|
| void SyncManager::SyncInternal::Authenticate(const std::string& username,
|
| const std::string& password) {
|
| - DCHECK(username_for_share().empty() ||
|
| - (username == browser_sync::ToUTF8(username_for_share()).get_string()))
|
| + DCHECK(username_for_share().empty() || username == username_for_share())
|
| << "Username change from valid username detected";
|
| if (allstatus()->status().authenticated)
|
| return;
|
| @@ -1127,13 +1101,7 @@
|
| return;
|
| }
|
|
|
| - browser_sync::ToPathString s(username);
|
| - if (s.good()) {
|
| - share_.authenticated_name = s.get_string16();
|
| - } else {
|
| - RaiseAuthNeededEvent();
|
| - return;
|
| - }
|
| + share_.authenticated_name = username;
|
|
|
| // We optimize by opening the directory before the "fresh" authentication
|
| // attempt completes so that we can immediately begin processing changes.
|
| @@ -1449,16 +1417,12 @@
|
| // We now know the supplied username and password were valid. If this
|
| // wasn't the first sync, authenticated_name should already be assigned.
|
| if (username_for_share().empty()) {
|
| - browser_sync::ToPathString s(event.user_email);
|
| - if (s.good())
|
| - share_.authenticated_name = s.get_string16();
|
| + share_.authenticated_name = event.user_email;
|
| }
|
|
|
| - DCHECK(LowerCaseEqualsASCII(browser_sync::ToUTF8(
|
| - username_for_share()).get_string(),
|
| + DCHECK(LowerCaseEqualsASCII(username_for_share(),
|
| StringToLowerASCII(event.user_email).c_str()))
|
| - << "username_for_share= "
|
| - << browser_sync::ToUTF8(username_for_share())
|
| + << "username_for_share= " << username_for_share()
|
| << ", event.user_email= " << event.user_email;
|
|
|
| if (observer_)
|
| @@ -1536,7 +1500,7 @@
|
|
|
| void SyncManager::SyncInternal::SetupForTestMode(
|
| const sync_char16* test_username) {
|
| - String16ToPathString(test_username, &share_.authenticated_name);
|
| + share_.authenticated_name = UTF16ToUTF8(test_username);
|
|
|
| if (!dir_manager()->Open(username_for_share()))
|
| DCHECK(false) << "Could not open directory when running in test mode";
|
|
|