Chromium Code Reviews| Index: components/policy/core/common/policy_loader_win.cc |
| diff --git a/components/policy/core/common/policy_loader_win.cc b/components/policy/core/common/policy_loader_win.cc |
| index f8b63582ac4b103a9feca9adba833075f9acd2c6..d739a038a030658d6779f0d55432bde312925cf1 100644 |
| --- a/components/policy/core/common/policy_loader_win.cc |
| +++ b/components/policy/core/common/policy_loader_win.cc |
| @@ -12,6 +12,7 @@ |
| #include <stddef.h> |
| #include <userenv.h> // For GPO functions |
| +#include <memory> |
| #include <string> |
| #include <vector> |
| @@ -22,7 +23,7 @@ |
| #include "base/lazy_instance.h" |
| #include "base/logging.h" |
| #include "base/macros.h" |
| -#include "base/memory/scoped_ptr.h" |
| +#include "base/memory/ptr_util.h" |
| #include "base/metrics/histogram.h" |
| #include "base/metrics/sparse_histogram.h" |
| #include "base/scoped_native_library.h" |
| @@ -104,7 +105,7 @@ enum DomainCheckErrors { |
| // add an "items" attribute to lists that don't declare it. |
| std::string PatchSchema(const std::string& schema) { |
| base::JSONParserOptions options = base::JSON_PARSE_RFC; |
| - scoped_ptr<base::Value> json = base::JSONReader::Read(schema, options); |
| + std::unique_ptr<base::Value> json = base::JSONReader::Read(schema, options); |
| base::DictionaryValue* dict = NULL; |
| base::DictionaryValue* properties = NULL; |
| if (!json || |
| @@ -121,7 +122,7 @@ std::string PatchSchema(const std::string& schema) { |
| policy_schema->GetString(schema::kType, &type) && |
| type == schema::kArray && |
| !policy_schema->HasKey(schema::kItems)) { |
| - scoped_ptr<base::DictionaryValue> items(new base::DictionaryValue()); |
| + std::unique_ptr<base::DictionaryValue> items(new base::DictionaryValue()); |
| items->SetString(schema::kType, schema::kString); |
| policy_schema->Set(schema::kItems, items.release()); |
| } |
| @@ -146,7 +147,7 @@ void FilterUntrustedPolicy(PolicyMap* policy) { |
| if (!map_entry->value->GetAsList(&policy_list_value)) |
| return; |
| - scoped_ptr<base::ListValue> filtered_values(new base::ListValue); |
| + std::unique_ptr<base::ListValue> filtered_values(new base::ListValue); |
| for (base::ListValue::const_iterator list_entry(policy_list_value->begin()); |
| list_entry != policy_list_value->end(); ++list_entry) { |
| std::string entry; |
| @@ -317,7 +318,7 @@ void ParsePolicy(const RegistryDict* gpo_dict, |
| if (!gpo_dict) |
| return; |
| - scoped_ptr<base::Value> policy_value(gpo_dict->ConvertToJSON(schema)); |
| + std::unique_ptr<base::Value> policy_value(gpo_dict->ConvertToJSON(schema)); |
| const base::DictionaryValue* policy_dict = NULL; |
| if (!policy_value->GetAsDictionary(&policy_dict) || !policy_dict) { |
| LOG(WARNING) << "Root policy object is not a dictionary!"; |
| @@ -402,13 +403,11 @@ PolicyLoaderWin::~PolicyLoaderWin() { |
| } |
| // static |
| -scoped_ptr<PolicyLoaderWin> PolicyLoaderWin::Create( |
| +std::unique_ptr<PolicyLoaderWin> PolicyLoaderWin::Create( |
| scoped_refptr<base::SequencedTaskRunner> task_runner, |
| const base::string16& chrome_policy_key) { |
| - return make_scoped_ptr( |
| - new PolicyLoaderWin(task_runner, |
| - chrome_policy_key, |
| - g_win_gpo_list_provider.Pointer())); |
| + return base::WrapUnique(new PolicyLoaderWin( |
|
Thiemo Nagel
2016/04/20 20:34:19
Optional nit: Preserving existing indentation woul
dcheng
2016/04/20 20:56:31
I'd prefer not to fight clang-format here. If we k
|
| + task_runner, chrome_policy_key, g_win_gpo_list_provider.Pointer())); |
| } |
| void PolicyLoaderWin::InitOnBackgroundThread() { |
| @@ -417,7 +416,7 @@ void PolicyLoaderWin::InitOnBackgroundThread() { |
| CollectEnterpriseUMAs(); |
| } |
| -scoped_ptr<PolicyBundle> PolicyLoaderWin::Load() { |
| +std::unique_ptr<PolicyBundle> PolicyLoaderWin::Load() { |
| // Reset the watches BEFORE reading the individual policies to avoid |
| // missing a change notification. |
| if (is_initialized_) |
| @@ -437,7 +436,7 @@ scoped_ptr<PolicyBundle> PolicyLoaderWin::Load() { |
| << (is_enterprise ? "enabled." : "disabled."); |
| // Load policy data for the different scopes/levels and merge them. |
| - scoped_ptr<PolicyBundle> bundle(new PolicyBundle()); |
| + std::unique_ptr<PolicyBundle> bundle(new PolicyBundle()); |
| PolicyMap* chrome_policy = |
| &bundle->Get(PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())); |
| for (size_t i = 0; i < arraysize(kScopes); ++i) { |
| @@ -470,9 +469,9 @@ scoped_ptr<PolicyBundle> PolicyLoaderWin::Load() { |
| } |
| // Remove special-cased entries from the GPO dictionary. |
| - scoped_ptr<RegistryDict> recommended_dict( |
| + std::unique_ptr<RegistryDict> recommended_dict( |
| gpo_dict.RemoveKey(kKeyRecommended)); |
| - scoped_ptr<RegistryDict> third_party_dict( |
| + std::unique_ptr<RegistryDict> third_party_dict( |
| gpo_dict.RemoveKey(kKeyThirdParty)); |
| // Load Chrome policy. |