| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // This file implements a standalone host process for Me2Me. | 5 // This file implements a standalone host process for Me2Me. |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/callback.h" | 10 #include "base/callback.h" |
| (...skipping 1066 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1077 // If the user does not have a Google email, their client JID will not be | 1077 // If the user does not have a Google email, their client JID will not be |
| 1078 // based on their email. In that case, the username/host domain policies | 1078 // based on their email. In that case, the username/host domain policies |
| 1079 // would be meaningless, since there is no way to check that the JID | 1079 // would be meaningless, since there is no way to check that the JID |
| 1080 // trying to connect actually corresponds to the owner email in question. | 1080 // trying to connect actually corresponds to the owner email in question. |
| 1081 if (host_owner_ != host_owner_email_) { | 1081 if (host_owner_ != host_owner_email_) { |
| 1082 LOG(ERROR) << "The username and host domain policies cannot be enabled " | 1082 LOG(ERROR) << "The username and host domain policies cannot be enabled " |
| 1083 << "for accounts with a non-Google email."; | 1083 << "for accounts with a non-Google email."; |
| 1084 ShutdownHost(kInvalidHostDomainExitCode); | 1084 ShutdownHost(kInvalidHostDomainExitCode); |
| 1085 } | 1085 } |
| 1086 | 1086 |
| 1087 if (!EndsWith(host_owner_, std::string("@") + host_domain_, false)) { | 1087 if (!base::EndsWith(host_owner_, std::string("@") + host_domain_, false)) { |
| 1088 LOG(ERROR) << "The host domain does not match the policy."; | 1088 LOG(ERROR) << "The host domain does not match the policy."; |
| 1089 ShutdownHost(kInvalidHostDomainExitCode); | 1089 ShutdownHost(kInvalidHostDomainExitCode); |
| 1090 } | 1090 } |
| 1091 } | 1091 } |
| 1092 } | 1092 } |
| 1093 | 1093 |
| 1094 bool HostProcess::OnHostDomainPolicyUpdate(base::DictionaryValue* policies) { | 1094 bool HostProcess::OnHostDomainPolicyUpdate(base::DictionaryValue* policies) { |
| 1095 // Returns true if the host has to be restarted after this policy update. | 1095 // Returns true if the host has to be restarted after this policy update. |
| 1096 DCHECK(context_->network_task_runner()->BelongsToCurrentThread()); | 1096 DCHECK(context_->network_task_runner()->BelongsToCurrentThread()); |
| 1097 | 1097 |
| (...skipping 535 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1633 base::TimeDelta::FromSeconds(kShutdownTimeoutSeconds)); | 1633 base::TimeDelta::FromSeconds(kShutdownTimeoutSeconds)); |
| 1634 new HostProcess(context.Pass(), &exit_code, &shutdown_watchdog); | 1634 new HostProcess(context.Pass(), &exit_code, &shutdown_watchdog); |
| 1635 | 1635 |
| 1636 // Run the main (also UI) message loop until the host no longer needs it. | 1636 // Run the main (also UI) message loop until the host no longer needs it. |
| 1637 message_loop.Run(); | 1637 message_loop.Run(); |
| 1638 | 1638 |
| 1639 return exit_code; | 1639 return exit_code; |
| 1640 } | 1640 } |
| 1641 | 1641 |
| 1642 } // namespace remoting | 1642 } // namespace remoting |
| OLD | NEW |