| Index: chrome/browser/sync/glue/sync_backend_host.cc
|
| ===================================================================
|
| --- chrome/browser/sync/glue/sync_backend_host.cc (revision 75295)
|
| +++ chrome/browser/sync/glue/sync_backend_host.cc (working copy)
|
| @@ -30,7 +30,6 @@
|
| // TODO(tim): Remove this! We should have a syncapi pass-thru instead.
|
| #include "chrome/browser/sync/syncable/directory_manager.h" // Cryptographer.
|
| #include "chrome/browser/sync/syncable/model_type.h"
|
| -#include "chrome/browser/sync/syncable/nigori_util.h"
|
| #include "chrome/common/chrome_switches.h"
|
| #include "chrome/common/chrome_version_info.h"
|
| #include "chrome/common/net/gaia/gaia_constants.h"
|
| @@ -126,13 +125,17 @@
|
| registrar_.workers[GROUP_PASSWORD] =
|
| new PasswordModelWorker(password_store);
|
| } else {
|
| - LOG_IF(WARNING, types.count(syncable::PASSWORDS) > 0) << "Password store "
|
| - << "not initialized, cannot sync passwords";
|
| + LOG(WARNING) << "Password store not initialized, cannot sync passwords";
|
| registrar_.routing_info.erase(syncable::PASSWORDS);
|
| }
|
|
|
| - // Nigori is populated by default now.
|
| - registrar_.routing_info[syncable::NIGORI] = GROUP_PASSIVE;
|
| + // TODO(tim): Remove this special case once NIGORI is populated by
|
| + // default. We piggy back off of the passwords flag for now to not
|
| + // require both encryption and passwords flags.
|
| + bool enable_encryption = !CommandLine::ForCurrentProcess()->HasSwitch(
|
| + switches::kDisableSyncPasswords) || types.count(syncable::PASSWORDS);
|
| + if (enable_encryption)
|
| + registrar_.routing_info[syncable::NIGORI] = GROUP_PASSIVE;
|
|
|
| InitCore(Core::DoInitializeOptions(
|
| sync_service_url,
|
| @@ -404,14 +407,6 @@
|
| }
|
| }
|
|
|
| -void SyncBackendHost::EncryptDataTypes(
|
| - const syncable::ModelTypeSet& encrypted_types) {
|
| - core_thread_.message_loop()->PostTask(FROM_HERE,
|
| - NewRunnableMethod(core_.get(),
|
| - &SyncBackendHost::Core::DoEncryptDataTypes,
|
| - encrypted_types));
|
| -}
|
| -
|
| void SyncBackendHost::RequestNudge() {
|
| core_thread_.message_loop()->PostTask(FROM_HERE,
|
| NewRunnableMethod(core_.get(), &SyncBackendHost::Core::DoRequestNudge));
|
| @@ -516,14 +511,6 @@
|
| Details<const TokenAvailableDetails>(&details));
|
| }
|
|
|
| -void SyncBackendHost::Core::NotifyEncryptionComplete(
|
| - const syncable::ModelTypeSet& encrypted_types) {
|
| - if (!host_)
|
| - return;
|
| - DCHECK_EQ(MessageLoop::current(), host_->frontend_loop_);
|
| - host_->frontend_->OnEncryptionComplete(encrypted_types);
|
| -}
|
| -
|
| SyncBackendHost::Core::DoInitializeOptions::DoInitializeOptions(
|
| const GURL& service_url,
|
| sync_api::HttpPostProviderFactory* http_bridge_factory,
|
| @@ -682,12 +669,6 @@
|
| syncapi_->SetPassphrase(passphrase, is_explicit);
|
| }
|
|
|
| -void SyncBackendHost::Core::DoEncryptDataTypes(
|
| - const syncable::ModelTypeSet& encrypted_types) {
|
| - DCHECK(MessageLoop::current() == host_->core_thread_.message_loop());
|
| - syncapi_->EncryptDataTypes(encrypted_types);
|
| -}
|
| -
|
| UIModelWorker* SyncBackendHost::ui_worker() {
|
| ModelSafeWorker* w = registrar_.workers[GROUP_UI];
|
| if (w == NULL)
|
| @@ -907,14 +888,6 @@
|
| &Core::HandleClearServerDataFailedOnFrontendLoop));
|
| }
|
|
|
| -void SyncBackendHost::Core::OnEncryptionComplete(
|
| - const syncable::ModelTypeSet& encrypted_types) {
|
| - host_->frontend_loop_->PostTask(
|
| - FROM_HERE,
|
| - NewRunnableMethod(this, &Core::NotifyEncryptionComplete,
|
| - encrypted_types));
|
| -}
|
| -
|
| void SyncBackendHost::Core::RouteJsEvent(
|
| const std::string& name, const JsArgList& args,
|
| const JsEventHandler* target) {
|
|
|