summaryrefslogtreecommitdiff
path: root/src/components/policy/policy_regular/src/policy_helper.cc
diff options
context:
space:
mode:
Diffstat (limited to 'src/components/policy/policy_regular/src/policy_helper.cc')
-rw-r--r--src/components/policy/policy_regular/src/policy_helper.cc91
1 files changed, 44 insertions, 47 deletions
diff --git a/src/components/policy/policy_regular/src/policy_helper.cc b/src/components/policy/policy_regular/src/policy_helper.cc
index 870c44a5c6..a54a44f97d 100644
--- a/src/components/policy/policy_regular/src/policy_helper.cc
+++ b/src/components/policy/policy_regular/src/policy_helper.cc
@@ -379,16 +379,16 @@ bool CheckAppPolicy::operator()(const AppPoliciesValueType& app_policy) {
}
}
if (RESULT_NO_CHANGES == result) {
- LOG4CXX_INFO(logger_,
- "Permissions for application:" << app_id
- << " wasn't changed.");
+ LOG4CXX_INFO(
+ logger_,
+ "Permissions for application:" << app_id << " wasn't changed.");
AddResult(app_id, RESULT_NO_CHANGES);
return true;
}
- LOG4CXX_INFO(logger_,
- "Permissions for application:" << app_id
- << " have been changed.");
+ LOG4CXX_INFO(
+ logger_,
+ "Permissions for application:" << app_id << " have been changed.");
if (IsPredefinedApp(app_policy)) {
LOG4CXX_DEBUG(logger_, "app id: " << app_id << " is predefined app");
@@ -568,40 +568,38 @@ bool CheckAppPolicy::IsEncryptionRequiredFlagChanged(
auto get_app_encryption_needed =
[](const std::string& policy_app_id,
policy_table::ApplicationPolicies& policies)
- -> rpc::Optional<rpc::Boolean> {
- auto it = policies.find(policy_app_id);
- if (policies.end() == it) {
- LOG4CXX_WARN(logger_,
- "App is not present in policies" << policy_app_id);
- return rpc::Optional<rpc::Boolean>(false);
- }
- return it->second.encryption_required;
- };
+ -> rpc::Optional<rpc::Boolean> {
+ auto it = policies.find(policy_app_id);
+ if (policies.end() == it) {
+ LOG4CXX_WARN(logger_, "App is not present in policies" << policy_app_id);
+ return rpc::Optional<rpc::Boolean>(false);
+ }
+ return it->second.encryption_required;
+ };
auto get_app_groups =
[](const std::string& policy_app_id,
policy_table::ApplicationPolicies& policies) -> policy_table::Strings {
- policy_table::Strings result;
- auto it = policies.find(policy_app_id);
- if (policies.end() == it) {
- LOG4CXX_WARN(logger_,
- "App is not present in policies" << policy_app_id);
- return result;
- }
- auto& groups = it->second.groups;
- std::copy(groups.begin(), groups.end(), std::back_inserter(result));
- return result;
- };
-
- auto get_app_rpcs =
- [](const std::string group_name, const FunctionalGroupings& groups)
- -> rpc::Optional<policy_table::Rpcs> {
- auto it = groups.find(group_name);
- if (it == groups.end()) {
- return rpc::Optional<policy_table::Rpcs>();
- }
- return rpc::Optional<policy_table::Rpcs>(it->second);
- };
+ policy_table::Strings result;
+ auto it = policies.find(policy_app_id);
+ if (policies.end() == it) {
+ LOG4CXX_WARN(logger_, "App is not present in policies" << policy_app_id);
+ return result;
+ }
+ auto& groups = it->second.groups;
+ std::copy(groups.begin(), groups.end(), std::back_inserter(result));
+ return result;
+ };
+
+ auto get_app_rpcs = [](const std::string group_name,
+ const FunctionalGroupings& groups)
+ -> rpc::Optional<policy_table::Rpcs> {
+ auto it = groups.find(group_name);
+ if (it == groups.end()) {
+ return rpc::Optional<policy_table::Rpcs>();
+ }
+ return rpc::Optional<policy_table::Rpcs>(it->second);
+ };
const auto snapshot_groups = get_app_groups(
app_policy.first, snapshot_->policy_table.app_policies_section.apps);
@@ -612,7 +610,6 @@ bool CheckAppPolicy::IsEncryptionRequiredFlagChanged(
[this, &get_app_rpcs](
const rpc::policy_table_interface_base::Strings& app_groups,
const std::shared_ptr<rpc::policy_table_interface_base::Table> pt) {
-
for (const auto& group : app_groups) {
const auto rpcs =
get_app_rpcs(group, pt->policy_table.functional_groupings);
@@ -880,16 +877,16 @@ bool ProcessFunctionalGroup::operator()(const StringsValueType& group_name) {
void ProcessFunctionalGroup::FillEncryptionFlagForRpcs(
const EncryptionRequired encryption_required) {
- auto update_encryption_required =
- [](EncryptionRequired& current, const EncryptionRequired& incoming) {
- if (!incoming.is_initialized()) {
- return;
- }
- if (current.is_initialized() && *current) {
- return;
- }
- current = incoming;
- };
+ auto update_encryption_required = [](EncryptionRequired& current,
+ const EncryptionRequired& incoming) {
+ if (!incoming.is_initialized()) {
+ return;
+ }
+ if (current.is_initialized() && *current) {
+ return;
+ }
+ current = incoming;
+ };
for (auto& item : data_) {
update_encryption_required(item.second.require_encryption,