OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/settings/device_settings_provider.h" | 5 #include "chrome/browser/chromeos/settings/device_settings_provider.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
9 #include "base/callback.h" | 9 #include "base/callback.h" |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
(...skipping 198 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
209 else | 209 else |
210 NOTREACHED(); | 210 NOTREACHED(); |
211 } else if (prop == kAccountsPrefAllowGuest) { | 211 } else if (prop == kAccountsPrefAllowGuest) { |
212 em::GuestModeEnabledProto* guest = | 212 em::GuestModeEnabledProto* guest = |
213 device_settings_.mutable_guest_mode_enabled(); | 213 device_settings_.mutable_guest_mode_enabled(); |
214 bool guest_value; | 214 bool guest_value; |
215 if (value->GetAsBoolean(&guest_value)) | 215 if (value->GetAsBoolean(&guest_value)) |
216 guest->set_guest_mode_enabled(guest_value); | 216 guest->set_guest_mode_enabled(guest_value); |
217 else | 217 else |
218 NOTREACHED(); | 218 NOTREACHED(); |
219 } else if (prop == kAccountsPrefSupervisedUsersEnabled) { | |
220 em::SupervisedUsersSettingsProto* supervised = | |
221 device_settings_.mutable_supervised_users_settings(); | |
222 bool supervised_value; | |
223 if (value->GetAsBoolean(&supervised_value)) | |
224 supervised->set_supervised_users_enabled(supervised_value); | |
225 else | |
226 NOTREACHED(); | |
219 } else if (prop == kAccountsPrefShowUserNamesOnSignIn) { | 227 } else if (prop == kAccountsPrefShowUserNamesOnSignIn) { |
220 em::ShowUserNamesOnSigninProto* show = | 228 em::ShowUserNamesOnSigninProto* show = |
221 device_settings_.mutable_show_user_names(); | 229 device_settings_.mutable_show_user_names(); |
222 bool show_value; | 230 bool show_value; |
223 if (value->GetAsBoolean(&show_value)) | 231 if (value->GetAsBoolean(&show_value)) |
224 show->set_show_user_names(show_value); | 232 show->set_show_user_names(show_value); |
225 else | 233 else |
226 NOTREACHED(); | 234 NOTREACHED(); |
227 } else if (prop == kAccountsPrefDeviceLocalAccounts) { | 235 } else if (prop == kAccountsPrefDeviceLocalAccounts) { |
228 em::DeviceLocalAccountsProto* device_local_accounts = | 236 em::DeviceLocalAccountsProto* device_local_accounts = |
(...skipping 151 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
380 device_settings_.mutable_attestation_settings(); | 388 device_settings_.mutable_attestation_settings(); |
381 bool setting_enabled; | 389 bool setting_enabled; |
382 if (value->GetAsBoolean(&setting_enabled)) { | 390 if (value->GetAsBoolean(&setting_enabled)) { |
383 attestation_settings->set_content_protection_enabled(setting_enabled); | 391 attestation_settings->set_content_protection_enabled(setting_enabled); |
384 } else { | 392 } else { |
385 NOTREACHED(); | 393 NOTREACHED(); |
386 } | 394 } |
387 } else { | 395 } else { |
388 // The remaining settings don't support Set(), since they are not | 396 // The remaining settings don't support Set(), since they are not |
389 // intended to be customizable by the user: | 397 // intended to be customizable by the user: |
390 // kAccountsPrefSupervisedUsersEnabled | |
391 // kAppPack | 398 // kAppPack |
392 // kDeviceAttestationEnabled | 399 // kDeviceAttestationEnabled |
393 // kDeviceOwner | 400 // kDeviceOwner |
394 // kIdleLogoutTimeout | 401 // kIdleLogoutTimeout |
395 // kIdleLogoutWarningDuration | 402 // kIdleLogoutWarningDuration |
396 // kReleaseChannelDelegated | 403 // kReleaseChannelDelegated |
397 // kReportDeviceActivityTimes | 404 // kReportDeviceActivityTimes |
398 // kReportDeviceBootMode | 405 // kReportDeviceBootMode |
399 // kReportDeviceLocation | 406 // kReportDeviceLocation |
400 // kReportDeviceVersionInfo | 407 // kReportDeviceVersionInfo |
(...skipping 29 matching lines...) Expand all Loading... | |
430 } | 437 } |
431 } | 438 } |
432 | 439 |
433 void DeviceSettingsProvider::DecodeLoginPolicies( | 440 void DeviceSettingsProvider::DecodeLoginPolicies( |
434 const em::ChromeDeviceSettingsProto& policy, | 441 const em::ChromeDeviceSettingsProto& policy, |
435 PrefValueMap* new_values_cache) const { | 442 PrefValueMap* new_values_cache) const { |
436 // For all our boolean settings the following is applicable: | 443 // For all our boolean settings the following is applicable: |
437 // true is default permissive value and false is safe prohibitive value. | 444 // true is default permissive value and false is safe prohibitive value. |
438 // Exceptions: | 445 // Exceptions: |
439 // kAccountsPrefEphemeralUsersEnabled has a default value of false. | 446 // kAccountsPrefEphemeralUsersEnabled has a default value of false. |
447 // kAccountsPrefSupervisedUsersEnabled has a default value of false | |
448 // for enterprise devices and true for consumer devices. | |
440 if (policy.has_allow_new_users() && | 449 if (policy.has_allow_new_users() && |
441 policy.allow_new_users().has_allow_new_users()) { | 450 policy.allow_new_users().has_allow_new_users()) { |
442 if (policy.allow_new_users().allow_new_users()) { | 451 if (policy.allow_new_users().allow_new_users()) { |
443 // New users allowed, user whitelist ignored. | 452 // New users allowed, user whitelist ignored. |
444 new_values_cache->SetBoolean(kAccountsPrefAllowNewUser, true); | 453 new_values_cache->SetBoolean(kAccountsPrefAllowNewUser, true); |
445 } else { | 454 } else { |
446 // New users not allowed, enforce user whitelist if present. | 455 // New users not allowed, enforce user whitelist if present. |
447 new_values_cache->SetBoolean(kAccountsPrefAllowNewUser, | 456 new_values_cache->SetBoolean(kAccountsPrefAllowNewUser, |
448 !policy.has_user_whitelist()); | 457 !policy.has_user_whitelist()); |
449 } | 458 } |
450 } else { | 459 } else { |
451 // No configured allow-new-users value, enforce whitelist if non-empty. | 460 // No configured allow-new-users value, enforce whitelist if non-empty. |
452 new_values_cache->SetBoolean( | 461 new_values_cache->SetBoolean( |
453 kAccountsPrefAllowNewUser, | 462 kAccountsPrefAllowNewUser, |
454 policy.user_whitelist().user_whitelist_size() == 0); | 463 policy.user_whitelist().user_whitelist_size() == 0); |
455 } | 464 } |
456 | 465 |
457 new_values_cache->SetBoolean( | 466 new_values_cache->SetBoolean( |
458 kAccountsPrefAllowGuest, | 467 kAccountsPrefAllowGuest, |
459 !policy.has_guest_mode_enabled() || | 468 !policy.has_guest_mode_enabled() || |
460 !policy.guest_mode_enabled().has_guest_mode_enabled() || | 469 !policy.guest_mode_enabled().has_guest_mode_enabled() || |
461 policy.guest_mode_enabled().guest_mode_enabled()); | 470 policy.guest_mode_enabled().guest_mode_enabled()); |
462 | 471 |
472 if (g_browser_process->is_browser_policy_connector_created()) { | |
jam
2014/05/13 21:09:11
why this check? it's not deterministic when you're
merkulova
2014/05/14 06:30:10
It's a check that covers unit tests where browser
jam
2014/05/14 17:29:46
Can you find another way of doing this without add
merkulova
2014/05/23 09:27:15
Done.
jam
2014/05/28 17:38:40
thanks, removing myself as reviewer
| |
473 policy::BrowserPolicyConnectorChromeOS* connector = | |
474 g_browser_process->platform_part()->browser_policy_connector_chromeos(); | |
475 bool supervised_users_enabled = false; | |
476 if (connector->IsEnterpriseManaged()) { | |
477 supervised_users_enabled = | |
478 policy.has_supervised_users_settings() && | |
479 policy.supervised_users_settings().has_supervised_users_enabled() && | |
480 policy.supervised_users_settings().supervised_users_enabled(); | |
481 } else { | |
482 supervised_users_enabled = | |
483 !policy.has_supervised_users_settings() || | |
484 !policy.supervised_users_settings().has_supervised_users_enabled() || | |
485 policy.supervised_users_settings().supervised_users_enabled(); | |
486 } | |
487 new_values_cache->SetBoolean( | |
488 kAccountsPrefSupervisedUsersEnabled, supervised_users_enabled); | |
489 } else { | |
490 // For unit tests. | |
491 new_values_cache->SetBoolean(kAccountsPrefSupervisedUsersEnabled, true); | |
492 } | |
493 | |
463 new_values_cache->SetBoolean( | 494 new_values_cache->SetBoolean( |
464 kAccountsPrefShowUserNamesOnSignIn, | 495 kAccountsPrefShowUserNamesOnSignIn, |
465 !policy.has_show_user_names() || | 496 !policy.has_show_user_names() || |
466 !policy.show_user_names().has_show_user_names() || | 497 !policy.show_user_names().has_show_user_names() || |
467 policy.show_user_names().show_user_names()); | 498 policy.show_user_names().show_user_names()); |
468 | 499 |
469 new_values_cache->SetBoolean( | 500 new_values_cache->SetBoolean( |
470 kAccountsPrefEphemeralUsersEnabled, | 501 kAccountsPrefEphemeralUsersEnabled, |
471 policy.has_ephemeral_users_enabled() && | 502 policy.has_ephemeral_users_enabled() && |
472 policy.ephemeral_users_enabled().has_ephemeral_users_enabled() && | 503 policy.ephemeral_users_enabled().has_ephemeral_users_enabled() && |
473 policy.ephemeral_users_enabled().ephemeral_users_enabled()); | 504 policy.ephemeral_users_enabled().ephemeral_users_enabled()); |
474 | 505 |
475 new_values_cache->SetBoolean( | |
476 kAccountsPrefSupervisedUsersEnabled, | |
477 policy.has_supervised_users_settings() && | |
478 policy.supervised_users_settings().supervised_users_enabled()); | |
479 | |
480 base::ListValue* list = new base::ListValue(); | 506 base::ListValue* list = new base::ListValue(); |
481 const em::UserWhitelistProto& whitelist_proto = policy.user_whitelist(); | 507 const em::UserWhitelistProto& whitelist_proto = policy.user_whitelist(); |
482 const RepeatedPtrField<std::string>& whitelist = | 508 const RepeatedPtrField<std::string>& whitelist = |
483 whitelist_proto.user_whitelist(); | 509 whitelist_proto.user_whitelist(); |
484 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); | 510 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); |
485 it != whitelist.end(); ++it) { | 511 it != whitelist.end(); ++it) { |
486 list->Append(new base::StringValue(*it)); | 512 list->Append(new base::StringValue(*it)); |
487 } | 513 } |
488 new_values_cache->SetValue(kAccountsPrefUsers, list); | 514 new_values_cache->SetValue(kAccountsPrefUsers, list); |
489 | 515 |
(...skipping 483 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
973 void DeviceSettingsProvider::AttemptMigration() { | 999 void DeviceSettingsProvider::AttemptMigration() { |
974 if (device_settings_service_->HasPrivateOwnerKey()) { | 1000 if (device_settings_service_->HasPrivateOwnerKey()) { |
975 PrefValueMap::const_iterator i; | 1001 PrefValueMap::const_iterator i; |
976 for (i = migration_values_.begin(); i != migration_values_.end(); ++i) | 1002 for (i = migration_values_.begin(); i != migration_values_.end(); ++i) |
977 DoSet(i->first, *i->second); | 1003 DoSet(i->first, *i->second); |
978 migration_values_.Clear(); | 1004 migration_values_.Clear(); |
979 } | 1005 } |
980 } | 1006 } |
981 | 1007 |
982 } // namespace chromeos | 1008 } // namespace chromeos |
OLD | NEW |