| Index: chrome/browser/sync/glue/password_model_associator.cc
|
| diff --git a/chrome/browser/sync/glue/password_model_associator.cc b/chrome/browser/sync/glue/password_model_associator.cc
|
| index d6708b5c7b0fd6c4ad5ba439d49b10ebd4005e79..3ed594640a89ecd590fd59d9dcbe5aedfc466cd3 100644
|
| --- a/chrome/browser/sync/glue/password_model_associator.cc
|
| +++ b/chrome/browser/sync/glue/password_model_associator.cc
|
| @@ -45,8 +45,7 @@ bool PasswordModelAssociator::AssociateModels() {
|
| abort_association_pending_ = false;
|
| }
|
|
|
| - sync_api::WriteTransaction trans(
|
| - sync_service_->backend()->GetUserShareHandle());
|
| + sync_api::WriteTransaction trans(sync_service_->GetUserShare());
|
| sync_api::ReadNode password_root(&trans);
|
| if (!password_root.InitByTagLookup(kPasswordTag)) {
|
| LOG(ERROR) << "Server did not create the top-level password node. We "
|
| @@ -176,8 +175,7 @@ bool PasswordModelAssociator::SyncModelHasUserCreatedNodes(bool* has_nodes) {
|
| << "might be running against an out-of-date server.";
|
| return false;
|
| }
|
| - sync_api::ReadTransaction trans(
|
| - sync_service_->backend()->GetUserShareHandle());
|
| + sync_api::ReadTransaction trans(sync_service_->GetUserShare());
|
|
|
| sync_api::ReadNode password_node(&trans);
|
| if (!password_node.InitByIdLookup(password_sync_id)) {
|
| @@ -241,8 +239,7 @@ void PasswordModelAssociator::Disassociate(int64 sync_id) {
|
|
|
| bool PasswordModelAssociator::GetSyncIdForTaggedNode(const std::string& tag,
|
| int64* sync_id) {
|
| - sync_api::ReadTransaction trans(
|
| - sync_service_->backend()->GetUserShareHandle());
|
| + sync_api::ReadTransaction trans(sync_service_->GetUserShare());
|
| sync_api::ReadNode sync_node(&trans);
|
| if (!sync_node.InitByTagLookup(tag.c_str()))
|
| return false;
|
|
|