OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/ui/webui/sync_setup_handler.h" | 5 #include "chrome/browser/ui/webui/sync_setup_handler.h" |
6 | 6 |
7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
8 #include "base/bind.h" | 8 #include "base/bind.h" |
9 #include "base/bind_helpers.h" | 9 #include "base/bind_helpers.h" |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
(...skipping 337 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
348 // encryptionEnabled: true if sync supports encryption | 348 // encryptionEnabled: true if sync supports encryption |
349 // encryptAllData: true if user wants to encrypt all data (not just | 349 // encryptAllData: true if user wants to encrypt all data (not just |
350 // passwords) | 350 // passwords) |
351 // usePassphrase: true if the data is encrypted with a secondary passphrase | 351 // usePassphrase: true if the data is encrypted with a secondary passphrase |
352 // show_passphrase: true if a passphrase is needed to decrypt the sync data | 352 // show_passphrase: true if a passphrase is needed to decrypt the sync data |
353 base::DictionaryValue args; | 353 base::DictionaryValue args; |
354 | 354 |
355 // Tell the UI layer which data types are registered/enabled by the user. | 355 // Tell the UI layer which data types are registered/enabled by the user. |
356 const syncer::ModelTypeSet registered_types = | 356 const syncer::ModelTypeSet registered_types = |
357 service->GetRegisteredDataTypes(); | 357 service->GetRegisteredDataTypes(); |
358 const syncer::ModelTypeSet preferred_types = | 358 const syncer::ModelTypeSet preferred_types = service->GetPreferredDataTypes(); |
359 service->GetPreferredDataTypes(); | 359 const syncer::ModelTypeSet enforced_types = service->GetForcedDataTypes(); |
360 ModelTypeNameMap type_names = GetSelectableTypeNameMap(); | 360 ModelTypeNameMap type_names = GetSelectableTypeNameMap(); |
361 for (ModelTypeNameMap::const_iterator it = type_names.begin(); | 361 for (ModelTypeNameMap::const_iterator it = type_names.begin(); |
362 it != type_names.end(); ++it) { | 362 it != type_names.end(); ++it) { |
363 syncer::ModelType sync_type = it->first; | 363 syncer::ModelType sync_type = it->first; |
364 const std::string key_name = it->second; | 364 const std::string key_name = it->second; |
365 args.SetBoolean(key_name + "Registered", | 365 args.SetBoolean(key_name + "Registered", registered_types.Has(sync_type)); |
366 registered_types.Has(sync_type)); | |
367 args.SetBoolean(key_name + "Synced", preferred_types.Has(sync_type)); | 366 args.SetBoolean(key_name + "Synced", preferred_types.Has(sync_type)); |
| 367 args.SetBoolean(key_name + "Enforced", enforced_types.Has(sync_type)); |
| 368 // TODO(treib): How do we want to handle pref groups, i.e. when only some of |
| 369 // the sync types behind a checkbox are force-enabled? crbug.com/403326 |
368 } | 370 } |
369 sync_driver::SyncPrefs sync_prefs(GetProfile()->GetPrefs()); | 371 sync_driver::SyncPrefs sync_prefs(GetProfile()->GetPrefs()); |
370 args.SetBoolean("passphraseFailed", passphrase_failed); | 372 args.SetBoolean("passphraseFailed", passphrase_failed); |
371 args.SetBoolean("showSyncEverythingPage", !show_advanced); | 373 args.SetBoolean("showSyncEverythingPage", !show_advanced); |
372 args.SetBoolean("syncAllDataTypes", sync_prefs.HasKeepEverythingSynced()); | 374 args.SetBoolean("syncAllDataTypes", sync_prefs.HasKeepEverythingSynced()); |
373 args.SetBoolean("syncNothing", false); // Always false during initial setup. | 375 args.SetBoolean("syncNothing", false); // Always false during initial setup. |
374 args.SetBoolean("encryptAllData", service->EncryptEverythingEnabled()); | 376 args.SetBoolean("encryptAllData", service->EncryptEverythingEnabled()); |
375 args.SetBoolean("isSupervised", GetProfile()->IsSupervised()); | 377 args.SetBoolean("isSupervised", GetProfile()->IsSupervised()); |
376 | 378 |
377 // We call IsPassphraseRequired() here, instead of calling | 379 // We call IsPassphraseRequired() here, instead of calling |
(...skipping 578 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
956 | 958 |
957 LoginUIService* service = GetLoginUIService(); | 959 LoginUIService* service = GetLoginUIService(); |
958 DCHECK(service); | 960 DCHECK(service); |
959 service->current_login_ui()->FocusUI(); | 961 service->current_login_ui()->FocusUI(); |
960 return true; | 962 return true; |
961 } | 963 } |
962 | 964 |
963 LoginUIService* SyncSetupHandler::GetLoginUIService() const { | 965 LoginUIService* SyncSetupHandler::GetLoginUIService() const { |
964 return LoginUIServiceFactory::GetForProfile(GetProfile()); | 966 return LoginUIServiceFactory::GetForProfile(GetProfile()); |
965 } | 967 } |
OLD | NEW |