Index: components/password_manager/core/browser/password_store.cc |
diff --git a/components/password_manager/core/browser/password_store.cc b/components/password_manager/core/browser/password_store.cc |
index b0c45ebc5298c7a50187a3a8a4844a74f1cda727..2f56af9874dd692e068ff4eb3de99be7d92ac651 100644 |
--- a/components/password_manager/core/browser/password_store.cc |
+++ b/components/password_manager/core/browser/password_store.cc |
@@ -154,7 +154,6 @@ void PasswordStore::TrimAffiliationCache() { |
} |
void PasswordStore::GetLogins(const PasswordForm& form, |
- AuthorizationPromptPolicy prompt_policy, |
PasswordStoreConsumer* consumer) { |
// Per http://crbug.com/121738, we deliberately ignore saved logins for |
// http*://www.google.com/ that were stored prior to 2012. (Google now uses |
@@ -179,10 +178,10 @@ void PasswordStore::GetLogins(const PasswordForm& form, |
if (affiliated_match_helper_) { |
affiliated_match_helper_->GetAffiliatedAndroidRealms( |
form, base::Bind(&PasswordStore::ScheduleGetLoginsWithAffiliations, |
- this, form, prompt_policy, base::Passed(&request))); |
+ this, form, base::Passed(&request))); |
} else { |
ScheduleTask(base::Bind(&PasswordStore::GetLoginsImpl, this, form, |
- prompt_policy, base::Passed(&request))); |
+ base::Passed(&request))); |
} |
} |
@@ -263,9 +262,8 @@ PasswordStore::GetBackgroundTaskRunner() { |
} |
void PasswordStore::GetLoginsImpl(const autofill::PasswordForm& form, |
- AuthorizationPromptPolicy prompt_policy, |
scoped_ptr<GetLoginsRequest> request) { |
- request->NotifyConsumerWithResults(FillMatchingLogins(form, prompt_policy)); |
+ request->NotifyConsumerWithResults(FillMatchingLogins(form)); |
} |
@@ -419,17 +417,15 @@ void PasswordStore::NotifySiteStats(const GURL& origin_domain, |
void PasswordStore::GetLoginsWithAffiliationsImpl( |
const PasswordForm& form, |
- AuthorizationPromptPolicy prompt_policy, |
scoped_ptr<GetLoginsRequest> request, |
const std::vector<std::string>& additional_android_realms) { |
DCHECK(GetBackgroundTaskRunner()->BelongsToCurrentThread()); |
- ScopedVector<PasswordForm> results(FillMatchingLogins(form, prompt_policy)); |
+ ScopedVector<PasswordForm> results(FillMatchingLogins(form)); |
for (const std::string& realm : additional_android_realms) { |
PasswordForm android_form; |
android_form.scheme = PasswordForm::SCHEME_HTML; |
android_form.signon_realm = realm; |
- ScopedVector<PasswordForm> more_results( |
- FillMatchingLogins(android_form, DISALLOW_PROMPT)); |
+ ScopedVector<PasswordForm> more_results(FillMatchingLogins(android_form)); |
for (PasswordForm* form : more_results) |
form->is_affiliation_based_match = true; |
ScopedVector<PasswordForm>::iterator it_first_federated = std::partition( |
@@ -445,19 +441,17 @@ void PasswordStore::GetLoginsWithAffiliationsImpl( |
void PasswordStore::ScheduleGetLoginsWithAffiliations( |
const PasswordForm& form, |
- AuthorizationPromptPolicy prompt_policy, |
scoped_ptr<GetLoginsRequest> request, |
const std::vector<std::string>& additional_android_realms) { |
ScheduleTask(base::Bind(&PasswordStore::GetLoginsWithAffiliationsImpl, this, |
- form, prompt_policy, base::Passed(&request), |
+ form, base::Passed(&request), |
additional_android_realms)); |
} |
scoped_ptr<PasswordForm> PasswordStore::GetLoginImpl( |
const PasswordForm& primary_key) { |
DCHECK(GetBackgroundTaskRunner()->BelongsToCurrentThread()); |
- ScopedVector<PasswordForm> candidates( |
- FillMatchingLogins(primary_key, DISALLOW_PROMPT)); |
+ ScopedVector<PasswordForm> candidates(FillMatchingLogins(primary_key)); |
for (PasswordForm*& candidate : candidates) { |
if (ArePasswordFormUniqueKeyEqual(*candidate, primary_key) && |
!candidate->is_public_suffix_match) { |
@@ -498,7 +492,7 @@ void PasswordStore::UpdateAffiliatedWebLoginsImpl( |
web_form_template.scheme = PasswordForm::SCHEME_HTML; |
web_form_template.signon_realm = affiliated_web_realm; |
ScopedVector<PasswordForm> web_logins( |
- FillMatchingLogins(web_form_template, DISALLOW_PROMPT)); |
+ FillMatchingLogins(web_form_template)); |
for (PasswordForm* web_login : web_logins) { |
// Do not update HTTP logins, logins saved under insecure conditions, and |
// non-HTML login forms; PSL matches; logins with a different username; |