Commit e6c54408 authored by dvadym's avatar dvadym Committed by Commit bot

Rename provisionally_saved_form -> submitted_form.

In PasswordFormManager provisionally_saved_form is actually submitted form and it's very unclear from variable name.

BUG=None

Review-Url: https://codereview.chromium.org/2605003003
Cr-Commit-Position: refs/heads/master@{#440855}
parent d4e617ae
...@@ -299,16 +299,16 @@ void PasswordFormManager::ProvisionallySave( ...@@ -299,16 +299,16 @@ void PasswordFormManager::ProvisionallySave(
OtherPossibleUsernamesAction action) { OtherPossibleUsernamesAction action) {
DCHECK_NE(RESULT_NO_MATCH, DoesManage(credentials)); DCHECK_NE(RESULT_NO_MATCH, DoesManage(credentials));
std::unique_ptr<autofill::PasswordForm> mutable_provisionally_saved_form( std::unique_ptr<autofill::PasswordForm> mutable_submitted_form(
new PasswordForm(credentials)); new PasswordForm(credentials));
if (credentials.IsPossibleChangePasswordForm() && if (credentials.IsPossibleChangePasswordForm() &&
!credentials.username_value.empty() && !credentials.username_value.empty() &&
IsProbablyNotUsername(credentials.username_value)) { IsProbablyNotUsername(credentials.username_value)) {
mutable_provisionally_saved_form->username_value.clear(); mutable_submitted_form->username_value.clear();
mutable_provisionally_saved_form->username_element.clear(); mutable_submitted_form->username_element.clear();
is_possible_change_password_form_without_username_ = true; is_possible_change_password_form_without_username_ = true;
} }
provisionally_saved_form_ = std::move(mutable_provisionally_saved_form); submitted_form_ = std::move(mutable_submitted_form);
other_possible_username_action_ = action; other_possible_username_action_ = action;
does_look_like_signup_form_ = credentials.does_look_like_signup_form; does_look_like_signup_form_ = credentials.does_look_like_signup_form;
...@@ -486,7 +486,7 @@ void PasswordFormManager::ProcessMatches( ...@@ -486,7 +486,7 @@ void PasswordFormManager::ProcessMatches(
// If password store was slow and provisionally saved form is already here // If password store was slow and provisionally saved form is already here
// then create pending credentials (see http://crbug.com/470322). // then create pending credentials (see http://crbug.com/470322).
if (provisionally_saved_form_) if (submitted_form_)
CreatePendingCredentials(); CreatePendingCredentials();
for (auto const& driver : drivers_) for (auto const& driver : drivers_)
...@@ -684,8 +684,7 @@ bool PasswordFormManager::UploadPasswordVote( ...@@ -684,8 +684,7 @@ bool PasswordFormManager::UploadPasswordVote(
autofill::ServerFieldTypeSet available_field_types; autofill::ServerFieldTypeSet available_field_types;
if (has_autofill_vote) { if (has_autofill_vote) {
if (is_update) { if (is_update) {
if (!provisionally_saved_form_ || if (!submitted_form_ || submitted_form_->new_password_element.empty())
provisionally_saved_form_->new_password_element.empty())
return false; return false;
SetAutofillTypesOnUpdate(password_type, &form_structure, SetAutofillTypesOnUpdate(password_type, &form_structure,
&available_field_types); &available_field_types);
...@@ -726,19 +725,17 @@ void PasswordFormManager::SetAutofillTypesOnUpdate( ...@@ -726,19 +725,17 @@ void PasswordFormManager::SetAutofillTypesOnUpdate(
password_type == autofill::PROBABLY_NEW_PASSWORD || password_type == autofill::PROBABLY_NEW_PASSWORD ||
password_type == autofill::NOT_NEW_PASSWORD) password_type == autofill::NOT_NEW_PASSWORD)
<< password_type; << password_type;
DCHECK(!provisionally_saved_form_->new_password_element.empty()); DCHECK(!submitted_form_->new_password_element.empty());
// Create a map from field names to field types. // Create a map from field names to field types.
std::map<base::string16, autofill::ServerFieldType> field_types; std::map<base::string16, autofill::ServerFieldType> field_types;
if (!provisionally_saved_form_->username_element.empty()) { if (!submitted_form_->username_element.empty()) {
field_types[provisionally_saved_form_->username_element] = field_types[submitted_form_->username_element] = autofill::USERNAME;
autofill::USERNAME;
} }
if (!provisionally_saved_form_->password_element.empty()) { if (!submitted_form_->password_element.empty()) {
field_types[provisionally_saved_form_->password_element] = field_types[submitted_form_->password_element] = autofill::PASSWORD;
autofill::PASSWORD;
} }
field_types[provisionally_saved_form_->new_password_element] = password_type; field_types[submitted_form_->new_password_element] = password_type;
// Find all password fields after |new_password_element| and set their type to // Find all password fields after |new_password_element| and set their type to
// |password_type|. They are considered to be confirmation fields. // |password_type|. They are considered to be confirmation fields.
...@@ -752,7 +749,7 @@ void PasswordFormManager::SetAutofillTypesOnUpdate( ...@@ -752,7 +749,7 @@ void PasswordFormManager::SetAutofillTypesOnUpdate(
field_types[field.name] = password_type; field_types[field.name] = password_type;
// We don't care about password fields after a confirmation field. // We don't care about password fields after a confirmation field.
break; break;
} else if (field.name == provisionally_saved_form_->new_password_element) { } else if (field.name == submitted_form_->new_password_element) {
is_new_password_field_found = true; is_new_password_field_found = true;
} }
} }
...@@ -868,15 +865,14 @@ void PasswordFormManager::AddFormClassifierVote( ...@@ -868,15 +865,14 @@ void PasswordFormManager::AddFormClassifierVote(
} }
void PasswordFormManager::CreatePendingCredentials() { void PasswordFormManager::CreatePendingCredentials() {
DCHECK(provisionally_saved_form_); DCHECK(submitted_form_);
base::string16 password_to_save(PasswordToSave(*provisionally_saved_form_)); base::string16 password_to_save(PasswordToSave(*submitted_form_));
// Make sure the important fields stay the same as the initially observed or // Make sure the important fields stay the same as the initially observed or
// autofilled ones, as they may have changed if the user experienced a login // autofilled ones, as they may have changed if the user experienced a login
// failure. // failure.
// Look for these credentials in the list containing auto-fill entries. // Look for these credentials in the list containing auto-fill entries.
const PasswordForm* saved_form = const PasswordForm* saved_form = FindBestSavedMatch(submitted_form_.get());
FindBestSavedMatch(provisionally_saved_form_.get());
if (saved_form != nullptr) { if (saved_form != nullptr) {
// The user signed in with a login we autofilled. // The user signed in with a login we autofilled.
pending_credentials_ = *saved_form; pending_credentials_ = *saved_form;
...@@ -906,9 +902,8 @@ void PasswordFormManager::CreatePendingCredentials() { ...@@ -906,9 +902,8 @@ void PasswordFormManager::CreatePendingCredentials() {
UpdateMetadataForUsage(&pending_credentials_); UpdateMetadataForUsage(&pending_credentials_);
// Update |pending_credentials_| in order to be able correctly save it. // Update |pending_credentials_| in order to be able correctly save it.
pending_credentials_.origin = provisionally_saved_form_->origin; pending_credentials_.origin = submitted_form_->origin;
pending_credentials_.signon_realm = pending_credentials_.signon_realm = submitted_form_->signon_realm;
provisionally_saved_form_->signon_realm;
// Normally, the copy of the PSL matched credentials, adapted for the // Normally, the copy of the PSL matched credentials, adapted for the
// current domain, is saved automatically without asking the user, because // current domain, is saved automatically without asking the user, because
...@@ -916,7 +911,7 @@ void PasswordFormManager::CreatePendingCredentials() { ...@@ -916,7 +911,7 @@ void PasswordFormManager::CreatePendingCredentials() {
// the user already agreed to store a password. // the user already agreed to store a password.
// //
// However, if the user changes the suggested password, it might indicate // However, if the user changes the suggested password, it might indicate
// that the autofilled credentials and |provisionally_saved_form_| // that the autofilled credentials and |submitted_form_|
// actually correspond to two different accounts (see // actually correspond to two different accounts (see
// http://crbug.com/385619). In that case the user should be asked again // http://crbug.com/385619). In that case the user should be asked again
// before saving the password. This is ensured by setting // before saving the password. This is ensured by setting
...@@ -924,9 +919,9 @@ void PasswordFormManager::CreatePendingCredentials() { ...@@ -924,9 +919,9 @@ void PasswordFormManager::CreatePendingCredentials() {
// |origin| and |signon_realm| to correct values. // |origin| and |signon_realm| to correct values.
// //
// There is still the edge case when the autofilled credentials represent // There is still the edge case when the autofilled credentials represent
// the same account as |provisionally_saved_form_| but the stored password // the same account as |submitted_form_| but the stored password
// was out of date. In that case, the user just had to manually enter the // was out of date. In that case, the user just had to manually enter the
// new password, which is now in |provisionally_saved_form_|. The best // new password, which is now in |submitted_form_|. The best
// thing would be to save automatically, and also update the original // thing would be to save automatically, and also update the original
// credentials. However, we have no way to tell if this is the case. // credentials. However, we have no way to tell if this is the case.
// This will likely happen infrequently, and the inconvenience put on the // This will likely happen infrequently, and the inconvenience put on the
...@@ -944,25 +939,23 @@ void PasswordFormManager::CreatePendingCredentials() { ...@@ -944,25 +939,23 @@ void PasswordFormManager::CreatePendingCredentials() {
} else if (other_possible_username_action_ == } else if (other_possible_username_action_ ==
ALLOW_OTHER_POSSIBLE_USERNAMES && ALLOW_OTHER_POSSIBLE_USERNAMES &&
UpdatePendingCredentialsIfOtherPossibleUsername( UpdatePendingCredentialsIfOtherPossibleUsername(
provisionally_saved_form_->username_value)) { submitted_form_->username_value)) {
// |pending_credentials_| is now set. Note we don't update // |pending_credentials_| is now set. Note we don't update
// |pending_credentials_.username_value| to |credentials.username_value| // |pending_credentials_.username_value| to |credentials.username_value|
// yet because we need to keep the original username to modify the stored // yet because we need to keep the original username to modify the stored
// credential. // credential.
selected_username_ = provisionally_saved_form_->username_value; selected_username_ = submitted_form_->username_value;
is_new_login_ = false; is_new_login_ = false;
} else if (!best_matches_.empty() && } else if (!best_matches_.empty() &&
provisionally_saved_form_->type != submitted_form_->type != autofill::PasswordForm::TYPE_API &&
autofill::PasswordForm::TYPE_API && (submitted_form_->IsPossibleChangePasswordFormWithoutUsername() ||
(provisionally_saved_form_ submitted_form_->username_element.empty())) {
->IsPossibleChangePasswordFormWithoutUsername() || const PasswordForm* best_update_match =
provisionally_saved_form_->username_element.empty())) { FindBestMatchForUpdatePassword(submitted_form_->password_value);
const PasswordForm* best_update_match = FindBestMatchForUpdatePassword(
provisionally_saved_form_->password_value);
retry_password_form_password_update_ = retry_password_form_password_update_ =
provisionally_saved_form_->username_element.empty() && submitted_form_->username_element.empty() &&
provisionally_saved_form_->new_password_element.empty(); submitted_form_->new_password_element.empty();
is_new_login_ = false; is_new_login_ = false;
if (best_update_match) { if (best_update_match) {
...@@ -975,14 +968,14 @@ void PasswordFormManager::CreatePendingCredentials() { ...@@ -975,14 +968,14 @@ void PasswordFormManager::CreatePendingCredentials() {
} else { } else {
// We don't care about |pending_credentials_| if we didn't find the best // We don't care about |pending_credentials_| if we didn't find the best
// match, since the user will select the correct one. // match, since the user will select the correct one.
pending_credentials_.origin = provisionally_saved_form_->origin; pending_credentials_.origin = submitted_form_->origin;
} }
} else { } else {
CreatePendingCredentialsForNewCredentials(); CreatePendingCredentialsForNewCredentials();
} }
if (!IsValidAndroidFacetURI(pending_credentials_.signon_realm)) { if (!IsValidAndroidFacetURI(pending_credentials_.signon_realm)) {
pending_credentials_.action = provisionally_saved_form_->action; pending_credentials_.action = submitted_form_->action;
// If the user selected credentials we autofilled from a PasswordForm // If the user selected credentials we autofilled from a PasswordForm
// that contained no action URL (IE6/7 imported passwords, for example), // that contained no action URL (IE6/7 imported passwords, for example),
// bless it with the action URL from the observed form. See bug 1107719. // bless it with the action URL from the observed form. See bug 1107719.
...@@ -991,21 +984,19 @@ void PasswordFormManager::CreatePendingCredentials() { ...@@ -991,21 +984,19 @@ void PasswordFormManager::CreatePendingCredentials() {
} }
pending_credentials_.password_value = password_to_save; pending_credentials_.password_value = password_to_save;
pending_credentials_.preferred = provisionally_saved_form_->preferred; pending_credentials_.preferred = submitted_form_->preferred;
CopyFieldPropertiesMasks(*provisionally_saved_form_, &pending_credentials_); CopyFieldPropertiesMasks(*submitted_form_, &pending_credentials_);
// If we're dealing with an API-driven provisionally saved form, then take // If we're dealing with an API-driven provisionally saved form, then take
// the server provided values. We don't do this for non-API forms, as // the server provided values. We don't do this for non-API forms, as
// those will never have those members set. // those will never have those members set.
if (provisionally_saved_form_->type == autofill::PasswordForm::TYPE_API) { if (submitted_form_->type == autofill::PasswordForm::TYPE_API) {
pending_credentials_.skip_zero_click = pending_credentials_.skip_zero_click = submitted_form_->skip_zero_click;
provisionally_saved_form_->skip_zero_click; pending_credentials_.display_name = submitted_form_->display_name;
pending_credentials_.display_name = provisionally_saved_form_->display_name; pending_credentials_.federation_origin = submitted_form_->federation_origin;
pending_credentials_.federation_origin = pending_credentials_.icon_url = submitted_form_->icon_url;
provisionally_saved_form_->federation_origin;
pending_credentials_.icon_url = provisionally_saved_form_->icon_url;
// Take the correct signon_realm for federated credentials. // Take the correct signon_realm for federated credentials.
pending_credentials_.signon_realm = provisionally_saved_form_->signon_realm; pending_credentials_.signon_realm = submitted_form_->signon_realm;
} }
if (user_action_ == kUserActionOverridePassword && if (user_action_ == kUserActionOverridePassword &&
...@@ -1153,13 +1144,11 @@ void PasswordFormManager::CreatePendingCredentialsForNewCredentials() { ...@@ -1153,13 +1144,11 @@ void PasswordFormManager::CreatePendingCredentialsForNewCredentials() {
// User typed in a new, unknown username. // User typed in a new, unknown username.
SetUserAction(kUserActionOverrideUsernameAndPassword); SetUserAction(kUserActionOverrideUsernameAndPassword);
pending_credentials_ = observed_form_; pending_credentials_ = observed_form_;
if (provisionally_saved_form_->was_parsed_using_autofill_predictions) if (submitted_form_->was_parsed_using_autofill_predictions)
pending_credentials_.username_element = pending_credentials_.username_element = submitted_form_->username_element;
provisionally_saved_form_->username_element; pending_credentials_.username_value = submitted_form_->username_value;
pending_credentials_.username_value =
provisionally_saved_form_->username_value;
pending_credentials_.other_possible_usernames = pending_credentials_.other_possible_usernames =
provisionally_saved_form_->other_possible_usernames; submitted_form_->other_possible_usernames;
// The password value will be filled in later, remove any garbage for now. // The password value will be filled in later, remove any garbage for now.
pending_credentials_.password_value.clear(); pending_credentials_.password_value.clear();
...@@ -1169,7 +1158,7 @@ void PasswordFormManager::CreatePendingCredentialsForNewCredentials() { ...@@ -1169,7 +1158,7 @@ void PasswordFormManager::CreatePendingCredentialsForNewCredentials() {
// are likely different than those on a login form, so do not bother saving // are likely different than those on a login form, so do not bother saving
// them. We will fill them with meaningful values during update when the user // them. We will fill them with meaningful values during update when the user
// goes onto a real login form for the first time. // goes onto a real login form for the first time.
if (!provisionally_saved_form_->new_password_element.empty()) { if (!submitted_form_->new_password_element.empty()) {
pending_credentials_.password_element.clear(); pending_credentials_.password_element.clear();
} }
} }
......
...@@ -177,8 +177,8 @@ class PasswordFormManager : public FormFetcher::Consumer { ...@@ -177,8 +177,8 @@ class PasswordFormManager : public FormFetcher::Consumer {
void MarkGenerationAvailable() { generation_available_ = true; } void MarkGenerationAvailable() { generation_available_ = true; }
// Returns the provisionally saved form, if it exists, otherwise nullptr. // Returns the provisionally saved form, if it exists, otherwise nullptr.
const autofill::PasswordForm* provisionally_saved_form() const { const autofill::PasswordForm* submitted_form() const {
return provisionally_saved_form_.get(); return submitted_form_.get();
} }
// Returns the pending credentials. // Returns the pending credentials.
...@@ -470,7 +470,7 @@ class PasswordFormManager : public FormFetcher::Consumer { ...@@ -470,7 +470,7 @@ class PasswordFormManager : public FormFetcher::Consumer {
const autofill::PasswordForm observed_form_; const autofill::PasswordForm observed_form_;
// Stores a submitted form. // Stores a submitted form.
std::unique_ptr<const autofill::PasswordForm> provisionally_saved_form_; std::unique_ptr<const autofill::PasswordForm> submitted_form_;
// Stores if for creating |pending_credentials_| other possible usernames // Stores if for creating |pending_credentials_| other possible usernames
// option should apply. // option should apply.
...@@ -483,7 +483,7 @@ class PasswordFormManager : public FormFetcher::Consumer { ...@@ -483,7 +483,7 @@ class PasswordFormManager : public FormFetcher::Consumer {
// Stores updated credentials when the form was submitted but success is still // Stores updated credentials when the form was submitted but success is still
// unknown. This variable contains credentials that are ready to be written // unknown. This variable contains credentials that are ready to be written
// (saved or updated) to a password store. It is calculated based on // (saved or updated) to a password store. It is calculated based on
// |provisionally_saved_form_| and |best_matches_|. // |submitted_form_| and |best_matches_|.
autofill::PasswordForm pending_credentials_; autofill::PasswordForm pending_credentials_;
// Whether pending_credentials_ stores a new login or is an update // Whether pending_credentials_ stores a new login or is an update
...@@ -541,7 +541,7 @@ class PasswordFormManager : public FormFetcher::Consumer { ...@@ -541,7 +541,7 @@ class PasswordFormManager : public FormFetcher::Consumer {
// |observed_form_| but also on the credentials that the user submitted. // |observed_form_| but also on the credentials that the user submitted.
bool is_possible_change_password_form_without_username_; bool is_possible_change_password_form_without_username_;
// True if |provisionally_saved_form_| looks like SignUp form according to // True if |submitted_form_| looks like SignUp form according to
// local heuristics. // local heuristics.
bool does_look_like_signup_form_ = false; bool does_look_like_signup_form_ = false;
......
...@@ -333,11 +333,11 @@ void PasswordManager::ProvisionallySavePassword(const PasswordForm& form) { ...@@ -333,11 +333,11 @@ void PasswordManager::ProvisionallySavePassword(const PasswordForm& form) {
manager.swap(*matched_manager_it); manager.swap(*matched_manager_it);
pending_login_managers_.erase(matched_manager_it); pending_login_managers_.erase(matched_manager_it);
PasswordForm provisionally_saved_form(form); PasswordForm submitted_form(form);
provisionally_saved_form.preferred = true; submitted_form.preferred = true;
if (logger) { if (logger) {
logger->LogPasswordForm(Logger::STRING_PROVISIONALLY_SAVED_FORM, logger->LogPasswordForm(Logger::STRING_PROVISIONALLY_SAVED_FORM,
provisionally_saved_form); submitted_form);
} }
PasswordFormManager::OtherPossibleUsernamesAction action = PasswordFormManager::OtherPossibleUsernamesAction action =
PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES; PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES;
...@@ -348,7 +348,7 @@ void PasswordManager::ProvisionallySavePassword(const PasswordForm& form) { ...@@ -348,7 +348,7 @@ void PasswordManager::ProvisionallySavePassword(const PasswordForm& form) {
Logger::STRING_IGNORE_POSSIBLE_USERNAMES, Logger::STRING_IGNORE_POSSIBLE_USERNAMES,
action == PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES); action == PasswordFormManager::IGNORE_OTHER_POSSIBLE_USERNAMES);
} }
manager->ProvisionallySave(provisionally_saved_form, action); manager->ProvisionallySave(submitted_form, action);
provisional_save_manager_.swap(manager); provisional_save_manager_.swap(manager);
// Cache the user-visible URL (i.e., the one seen in the omnibox). Once the // Cache the user-visible URL (i.e., the one seen in the omnibox). Once the
...@@ -678,9 +678,9 @@ void PasswordManager::OnLoginSuccessful() { ...@@ -678,9 +678,9 @@ void PasswordManager::OnLoginSuccessful() {
*provisional_save_manager_); *provisional_save_manager_);
if (base::FeatureList::IsEnabled(features::kDropSyncCredential)) { if (base::FeatureList::IsEnabled(features::kDropSyncCredential)) {
DCHECK(provisional_save_manager_->provisionally_saved_form()); DCHECK(provisional_save_manager_->submitted_form());
if (!client_->GetStoreResultFilter()->ShouldSave( if (!client_->GetStoreResultFilter()->ShouldSave(
*provisional_save_manager_->provisionally_saved_form())) { *provisional_save_manager_->submitted_form())) {
provisional_save_manager_->WipeStoreCopyIfOutdated(); provisional_save_manager_->WipeStoreCopyIfOutdated();
RecordFailure(SYNC_CREDENTIAL, RecordFailure(SYNC_CREDENTIAL,
provisional_save_manager_->observed_form().origin, provisional_save_manager_->observed_form().origin,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment