Index: chrome/browser/safe_browsing/incident_reporting/finch_config_signature_analyzer.cc |
diff --git a/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.cc b/chrome/browser/safe_browsing/incident_reporting/finch_config_signature_analyzer.cc |
similarity index 52% |
copy from chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.cc |
copy to chrome/browser/safe_browsing/incident_reporting/finch_config_signature_analyzer.cc |
index 34527ebd29714b5e3bc8a2feb40c15d3966fda22..116fce9f8e5fe8148a93d77cb84ec74a3250760f 100644 |
--- a/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.cc |
+++ b/chrome/browser/safe_browsing/incident_reporting/finch_config_signature_analyzer.cc |
@@ -2,31 +2,22 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#include "chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.h" |
+#include "chrome/browser/safe_browsing/incident_reporting/finch_config_signature_analyzer.h" |
#include "chrome/browser/browser_process.h" |
+#include "chrome/browser/metrics/variations/variations_service.h" |
#include "chrome/browser/safe_browsing/incident_reporting/add_incident_callback.h" |
#include "chrome/browser/safe_browsing/safe_browsing_service.h" |
namespace safe_browsing { |
-void RegisterBlacklistLoadAnalysis() { |
-#if defined(OS_WIN) |
+void RegisterFinchConfigSignatureAnalysis() { |
scoped_refptr<SafeBrowsingService> safe_browsing_service( |
g_browser_process->safe_browsing_service()); |
- safe_browsing_service->RegisterDelayedAnalysisCallback( |
- base::Bind(&VerifyBlacklistLoadState)); |
-#endif |
+ safe_browsing_service->RegisterDelayedAnalysisCallback(base::Bind( |
+ &chrome_variations::VariationsService::OnDelayedSendIncidentReport, |
+ base::Unretained(g_browser_process->variations_service()))); |
grt (UTC plus 2)
2014/10/10 17:45:42
make OnDelayedSendIncidentReport a free function i
Georges Khalil
2014/10/10 20:19:32
Done.
|
} |
-#if !defined(OS_WIN) |
-void VerifyBlacklistLoadState(const AddIncidentCallback& callback) { |
-} |
- |
-bool GetLoadedBlacklistedModules(std::vector<base::string16>* module_names) { |
- return false; |
-} |
-#endif // !defined(OS_WIN) |
- |
} // namespace safe_browsing |