diff options
Diffstat (limited to 'src/components/policy/policy_external/src/policy_manager_impl.cc')
-rw-r--r-- | src/components/policy/policy_external/src/policy_manager_impl.cc | 28 |
1 files changed, 9 insertions, 19 deletions
diff --git a/src/components/policy/policy_external/src/policy_manager_impl.cc b/src/components/policy/policy_external/src/policy_manager_impl.cc index fc7fc0f171..9bcea70803 100644 --- a/src/components/policy/policy_external/src/policy_manager_impl.cc +++ b/src/components/policy/policy_external/src/policy_manager_impl.cc @@ -465,7 +465,6 @@ PolicyManager::PtProcessingResult PolicyManagerImpl::LoadPT( const std::string& file, const BinaryMessage& pt_content) { SDL_LOG_INFO("LoadPT of size " << pt_content.size()); SDL_LOG_DEBUG( - "PTU content is: " << std::string(pt_content.begin(), pt_content.end())); // Parse message into table struct @@ -491,7 +490,6 @@ PolicyManager::PtProcessingResult PolicyManagerImpl::LoadPT( auto policy_table_snapshot = cache_->GenerateSnapshot(); if (!policy_table_snapshot) { SDL_LOG_ERROR( - "Failed to create snapshot of policy table, trying another exchange"); return PtProcessingResult::kNewPtRequired; } @@ -507,7 +505,6 @@ PolicyManager::PtProcessingResult PolicyManagerImpl::LoadPT( // Replace current data with updated if (!cache_->ApplyUpdate(*pt_update)) { SDL_LOG_WARN( - "Unsuccessful save of updated policy table, trying another exchange"); return PtProcessingResult::kNewPtRequired; } @@ -968,7 +965,6 @@ void PolicyManagerImpl::CheckPermissions(const PTString& device_id, hmi_level)) { // RPC found in allowed == allowed by backend, but disallowed by user SDL_LOG_DEBUG( - "RPC found in allowed == allowed by backend, but disallowed by user"); result.hmi_level_permitted = kRpcUserDisallowed; } else { @@ -1266,7 +1262,6 @@ void PolicyManagerImpl::CheckPendingPermissionsChanges( app_permissions_diff_.find(policy_app_id); if (app_permissions_diff_.end() == it_pending) { SDL_LOG_WARN( - "No pending permissions had been found for appID: " << policy_app_id); return; } @@ -1284,7 +1279,6 @@ void PolicyManagerImpl::CheckPendingPermissionsChanges( for (; it_groups != it_end_groups; ++it_groups) { if (policy::kGroupUndefined == it_groups->state) { SDL_LOG_DEBUG( - "Unconsented groups still present for appID: " << policy_app_id); it_pending->second.appPermissionsConsentNeeded = true; return; @@ -1292,7 +1286,6 @@ void PolicyManagerImpl::CheckPendingPermissionsChanges( } SDL_LOG_DEBUG( - "Unconsented groups not present anymore for appID: " << policy_app_id); it_pending->second.appPermissionsConsentNeeded = false; return; @@ -2254,16 +2247,14 @@ void PolicyManagerImpl::AddNewApplication(const std::string& device_id, if (kDeviceHasNoConsent == device_consent || kDeviceDisallowed == device_consent) { - SDL_LOG_INFO( - - "Setting " << policy::kPreDataConsentId - << " permissions for application id: " << application_id); + SDL_LOG_INFO("Setting " + << policy::kPreDataConsentId + << " permissions for application id: " << application_id); cache_->SetPredataPolicy(application_id); } else { - SDL_LOG_INFO( - - "Setting " << policy::kDefaultId - << " permissions for application id: " << application_id); + SDL_LOG_INFO("Setting " + << policy::kDefaultId + << " permissions for application id: " << application_id); cache_->SetDefaultPolicy(application_id); } @@ -2284,10 +2275,9 @@ void PolicyManagerImpl::PromoteExistedApplication( << " device_consent: " << device_consent); if (kDeviceAllowed == device_consent && cache_->IsPredataPolicy(application_id)) { - SDL_LOG_INFO( - - "Setting " << policy::kDefaultId - << " permissions for application id: " << application_id); + SDL_LOG_INFO("Setting " + << policy::kDefaultId + << " permissions for application id: " << application_id); cache_->SetDefaultPolicy(application_id); } ProcessExternalConsentStatusForApp( |