Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(5406)

Unified Diff: chrome/browser/io_thread.cc

Issue 1414313002: Allow dynamic updating of authentication policies (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix NET_EXPORTS Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/io_thread.cc
diff --git a/chrome/browser/io_thread.cc b/chrome/browser/io_thread.cc
index e4d8c77bf04e7358d00b02376bc4442b741dde59..f9eebd821b221015c510d23e13d94b3b2dc1606f 100644
--- a/chrome/browser/io_thread.cc
+++ b/chrome/browser/io_thread.cc
@@ -463,16 +463,31 @@ IOThread::IOThread(
creation_time_(base::TimeTicks::Now()),
weak_factory_(this) {
auth_schemes_ = local_state->GetString(prefs::kAuthSchemes);
- negotiate_disable_cname_lookup_ = local_state->GetBoolean(
- prefs::kDisableAuthNegotiateCnameLookup);
- negotiate_enable_port_ = local_state->GetBoolean(
- prefs::kEnableAuthNegotiatePort);
- auth_server_whitelist_ = local_state->GetString(prefs::kAuthServerWhitelist);
- auth_delegate_whitelist_ = local_state->GetString(
- prefs::kAuthNegotiateDelegateWhitelist);
+ negotiate_disable_cname_lookup_.Init(
+ prefs::kDisableAuthNegotiateCnameLookup, local_state,
+ base::Bind(&IOThread::UpdateNegotiateDisableCnameLookup,
+ base::Unretained(this)));
+ scoped_refptr<base::SingleThreadTaskRunner> io_thread_proxy =
+ BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO);
+ negotiate_disable_cname_lookup_.MoveToThread(io_thread_proxy);
+ negotiate_enable_port_.Init(
+ prefs::kEnableAuthNegotiatePort, local_state,
+ base::Bind(&IOThread::UpdateNegotiateEnablePort, base::Unretained(this)));
+ negotiate_enable_port_.MoveToThread(io_thread_proxy);
+ auth_server_whitelist_.Init(
+ prefs::kAuthServerWhitelist, local_state,
+ base::Bind(&IOThread::UpdateServerWhitelist, base::Unretained(this)));
+ auth_server_whitelist_.MoveToThread(io_thread_proxy);
+ auth_delegate_whitelist_.Init(
+ prefs::kAuthNegotiateDelegateWhitelist, local_state,
+ base::Bind(&IOThread::UpdateDelegateWhitelist, base::Unretained(this)));
+ auth_delegate_whitelist_.MoveToThread(io_thread_proxy);
gssapi_library_name_ = local_state->GetString(prefs::kGSSAPILibraryName);
- auth_android_negotiate_account_type_ =
- local_state->GetString(prefs::kAuthAndroidNegotiateAccountType);
+ auth_android_negotiate_account_type_.Init(
+ prefs::kAuthAndroidNegotiateAccountType, local_state,
+ base::Bind(&IOThread::UpdateAndroidAuthNegotiateAccountType,
+ base::Unretained(this)));
+ auth_android_negotiate_account_type_.MoveToThread(io_thread_proxy);
pref_proxy_config_tracker_.reset(
ProxyServiceFactory::CreatePrefProxyConfigTrackerOfLocalState(
local_state));
@@ -498,13 +513,11 @@ IOThread::IOThread(
local_state,
base::Bind(&IOThread::UpdateDnsClientEnabled,
base::Unretained(this)));
- dns_client_enabled_.MoveToThread(
- BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO));
+ dns_client_enabled_.MoveToThread(io_thread_proxy);
quick_check_enabled_.Init(prefs::kQuickCheckEnabled,
local_state);
- quick_check_enabled_.MoveToThread(
- BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO));
+ quick_check_enabled_.MoveToThread(io_thread_proxy);
#if defined(ENABLE_CONFIGURATION_POLICY)
is_spdy_disabled_by_policy_ = policy_service->GetPolicies(
@@ -728,8 +741,7 @@ void IOThread::Init() {
globals_->ssl_config_service = GetSSLConfigService();
- globals_->http_auth_handler_factory.reset(CreateDefaultAuthHandlerFactory(
- globals_->host_resolver.get()));
+ CreateDefaultAuthHandlerFactory();
globals_->http_server_properties.reset(new net::HttpServerPropertiesImpl());
// For the ProxyScriptFetcher, we use a direct ProxyService.
globals_->proxy_script_fetcher_proxy_service =
@@ -867,6 +879,11 @@ void IOThread::CleanUp() {
network_change_observer_.reset();
system_proxy_config_service_.reset();
+#if defined(OS_ANDROID)
+ // Only needed for tests, since we never do a clean shutdown of the real
+ // application on Android.
+ external_data_use_observer_.reset();
+#endif
delete globals_;
globals_ = NULL;
@@ -1005,30 +1022,56 @@ void IOThread::RegisterPrefs(PrefRegistrySimple* registry) {
registry->RegisterBooleanPref(prefs::kQuickCheckEnabled, true);
}
-net::HttpAuthHandlerFactory* IOThread::CreateDefaultAuthHandlerFactory(
- net::HostResolver* resolver) {
- net::HttpAuthFilterWhitelist* auth_filter_default_credentials = NULL;
- if (!auth_server_whitelist_.empty()) {
- auth_filter_default_credentials =
- new net::HttpAuthFilterWhitelist(auth_server_whitelist_);
+void IOThread::UpdateServerWhitelist() {
+ std::string server_whitelist = auth_server_whitelist_.GetValue();
+ if (server_whitelist.empty()) {
+ globals_->url_security_manager->SetDefaultWhitelist(
+ scoped_ptr<net::HttpAuthFilterWhitelist>());
+ } else {
+ globals_->url_security_manager->SetDefaultWhitelist(
+ make_scoped_ptr(new net::HttpAuthFilterWhitelist(server_whitelist)));
}
- net::HttpAuthFilterWhitelist* auth_filter_delegate = NULL;
- if (!auth_delegate_whitelist_.empty()) {
- auth_filter_delegate =
- new net::HttpAuthFilterWhitelist(auth_delegate_whitelist_);
+}
+
+void IOThread::UpdateDelegateWhitelist() {
+ std::string delegate_whitelist = auth_delegate_whitelist_.GetValue();
+ if (delegate_whitelist.empty()) {
+ globals_->url_security_manager->SetDelegateWhitelist(
+ scoped_ptr<net::HttpAuthFilterWhitelist>());
+ } else {
+ globals_->url_security_manager->SetDelegateWhitelist(
+ make_scoped_ptr(new net::HttpAuthFilterWhitelist(delegate_whitelist)));
}
- globals_->url_security_manager.reset(
- net::URLSecurityManager::Create(auth_filter_default_credentials,
- auth_filter_delegate));
- std::vector<std::string> supported_schemes = base::SplitString(
- auth_schemes_, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
+}
+
+void IOThread::UpdateAndroidAuthNegotiateAccountType() {
+ globals_->http_auth_handler_factory->SetAndroidAuthNegotiateAccountType(
+ auth_android_negotiate_account_type_.GetValue());
+}
+
+void IOThread::UpdateNegotiateDisableCnameLookup() {
+ globals_->http_auth_handler_factory->SetNegotiateDisableCnameLookup(
+ negotiate_disable_cname_lookup_.GetValue());
+}
+
+void IOThread::UpdateNegotiateEnablePort() {
+ globals_->http_auth_handler_factory->SetNegotiateEnablePort(
+ negotiate_enable_port_.GetValue());
+}
- scoped_ptr<net::HttpAuthHandlerRegistryFactory> registry_factory(
+void IOThread::CreateDefaultAuthHandlerFactory() {
+ std::vector<std::string> supported_schemes = base::SplitString(
+ auth_schemes_, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_NONEMPTY);
+ globals_->url_security_manager.reset(net::URLSecurityManager::Create());
+ globals_->http_auth_handler_factory.reset(
net::HttpAuthHandlerRegistryFactory::Create(
- supported_schemes, globals_->url_security_manager.get(), resolver,
- gssapi_library_name_, auth_android_negotiate_account_type_,
- negotiate_disable_cname_lookup_, negotiate_enable_port_));
- return registry_factory.release();
+ supported_schemes, globals_->url_security_manager.get(),
+ globals_->host_resolver.get(), gssapi_library_name_));
+ UpdateServerWhitelist();
+ UpdateDelegateWhitelist();
+ UpdateAndroidAuthNegotiateAccountType();
+ UpdateNegotiateDisableCnameLookup();
+ UpdateNegotiateEnablePort();
}
void IOThread::ClearHostCache() {

Powered by Google App Engine
This is Rietveld 408576698