| Index: chrome/browser/chromeos/settings/install_attributes.cc
|
| diff --git a/chrome/browser/chromeos/policy/enterprise_install_attributes.cc b/chrome/browser/chromeos/settings/install_attributes.cc
|
| similarity index 68%
|
| rename from chrome/browser/chromeos/policy/enterprise_install_attributes.cc
|
| rename to chrome/browser/chromeos/settings/install_attributes.cc
|
| index 70f673e9f5c673ef34efc0097954ecf74f2263ca..45039d24fc4956a71d5ed70a566a6d688c64dc6a 100644
|
| --- a/chrome/browser/chromeos/policy/enterprise_install_attributes.cc
|
| +++ b/chrome/browser/chromeos/settings/install_attributes.cc
|
| @@ -2,7 +2,7 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "chrome/browser/chromeos/policy/enterprise_install_attributes.h"
|
| +#include "chrome/browser/chromeos/settings/install_attributes.h"
|
|
|
| #include <stddef.h>
|
|
|
| @@ -23,9 +23,7 @@
|
| #include "chromeos/dbus/dbus_thread_manager.h"
|
| #include "google_apis/gaia/gaia_auth_util.h"
|
|
|
| -namespace policy {
|
| -
|
| -namespace cryptohome_util = chromeos::cryptohome_util;
|
| +namespace chromeos {
|
|
|
| namespace {
|
|
|
| @@ -50,44 +48,43 @@ bool ReadMapKey(const std::map<std::string, std::string>& map,
|
|
|
| // static
|
| std::string
|
| -EnterpriseInstallAttributes::GetEnterpriseOwnedInstallAttributesBlobForTesting(
|
| +InstallAttributes::GetEnterpriseOwnedInstallAttributesBlobForTesting(
|
| const std::string& user_name) {
|
| cryptohome::SerializedInstallAttributes install_attrs_proto;
|
| - cryptohome::SerializedInstallAttributes::Attribute* attribute = NULL;
|
| + cryptohome::SerializedInstallAttributes::Attribute* attribute = nullptr;
|
|
|
| attribute = install_attrs_proto.add_attributes();
|
| - attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseOwned);
|
| + attribute->set_name(InstallAttributes::kAttrEnterpriseOwned);
|
| attribute->set_value("true");
|
|
|
| attribute = install_attrs_proto.add_attributes();
|
| - attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseUser);
|
| + attribute->set_name(InstallAttributes::kAttrEnterpriseUser);
|
| attribute->set_value(user_name);
|
|
|
| return install_attrs_proto.SerializeAsString();
|
| }
|
|
|
| -EnterpriseInstallAttributes::EnterpriseInstallAttributes(
|
| - chromeos::CryptohomeClient* cryptohome_client)
|
| +InstallAttributes::InstallAttributes(CryptohomeClient* cryptohome_client)
|
| : device_locked_(false),
|
| consistency_check_running_(false),
|
| device_lock_running_(false),
|
| - registration_mode_(DEVICE_MODE_PENDING),
|
| + registration_mode_(policy::DEVICE_MODE_PENDING),
|
| cryptohome_client_(cryptohome_client),
|
| weak_ptr_factory_(this) {
|
| }
|
|
|
| -EnterpriseInstallAttributes::~EnterpriseInstallAttributes() {}
|
| +InstallAttributes::~InstallAttributes() {}
|
|
|
| -void EnterpriseInstallAttributes::Init(const base::FilePath& cache_file) {
|
| +void InstallAttributes::Init(const base::FilePath& cache_file) {
|
| DCHECK(!device_locked_);
|
|
|
| // Mark the consistency check as running to ensure that LockDevice() is
|
| // blocked, but wait for the cryptohome service to be available before
|
| // actually calling TriggerConsistencyCheck().
|
| consistency_check_running_ = true;
|
| - cryptohome_client_->WaitForServiceToBeAvailable(base::Bind(
|
| - &EnterpriseInstallAttributes::OnCryptohomeServiceInitiallyAvailable,
|
| - weak_ptr_factory_.GetWeakPtr()));
|
| + cryptohome_client_->WaitForServiceToBeAvailable(
|
| + base::Bind(&InstallAttributes::OnCryptohomeServiceInitiallyAvailable,
|
| + weak_ptr_factory_.GetWeakPtr()));
|
|
|
| if (!base::PathExists(cache_file))
|
| return;
|
| @@ -122,25 +119,22 @@ void EnterpriseInstallAttributes::Init(const base::FilePath& cache_file) {
|
| DecodeInstallAttributes(attr_map);
|
| }
|
|
|
| -void EnterpriseInstallAttributes::ReadImmutableAttributes(
|
| - const base::Closure& callback) {
|
| +void InstallAttributes::ReadImmutableAttributes(const base::Closure& callback) {
|
| if (device_locked_) {
|
| callback.Run();
|
| return;
|
| }
|
|
|
| cryptohome_client_->InstallAttributesIsReady(
|
| - base::Bind(&EnterpriseInstallAttributes::ReadAttributesIfReady,
|
| - weak_ptr_factory_.GetWeakPtr(),
|
| - callback));
|
| + base::Bind(&InstallAttributes::ReadAttributesIfReady,
|
| + weak_ptr_factory_.GetWeakPtr(), callback));
|
| }
|
|
|
| -void EnterpriseInstallAttributes::ReadAttributesIfReady(
|
| - const base::Closure& callback,
|
| - chromeos::DBusMethodCallStatus call_status,
|
| - bool result) {
|
| - if (call_status == chromeos::DBUS_METHOD_CALL_SUCCESS && result) {
|
| - registration_mode_ = DEVICE_MODE_NOT_SET;
|
| +void InstallAttributes::ReadAttributesIfReady(const base::Closure& callback,
|
| + DBusMethodCallStatus call_status,
|
| + bool result) {
|
| + if (call_status == DBUS_METHOD_CALL_SUCCESS && result) {
|
| + registration_mode_ = policy::DEVICE_MODE_NOT_SET;
|
| if (!cryptohome_util::InstallAttributesIsInvalid() &&
|
| !cryptohome_util::InstallAttributesIsFirstInstall()) {
|
| device_locked_ = true;
|
| @@ -167,15 +161,14 @@ void EnterpriseInstallAttributes::ReadAttributesIfReady(
|
| callback.Run();
|
| }
|
|
|
| -void EnterpriseInstallAttributes::LockDevice(
|
| - const std::string& user,
|
| - DeviceMode device_mode,
|
| - const std::string& device_id,
|
| - const LockResultCallback& callback) {
|
| +void InstallAttributes::LockDevice(const std::string& user,
|
| + policy::DeviceMode device_mode,
|
| + const std::string& device_id,
|
| + const LockResultCallback& callback) {
|
| DCHECK(!callback.is_null());
|
| CHECK_EQ(device_lock_running_, false);
|
| - CHECK_NE(device_mode, DEVICE_MODE_PENDING);
|
| - CHECK_NE(device_mode, DEVICE_MODE_NOT_SET);
|
| + CHECK_NE(device_mode, policy::DEVICE_MODE_PENDING);
|
| + CHECK_NE(device_mode, policy::DEVICE_MODE_NOT_SET);
|
|
|
| // Check for existing lock first.
|
| if (device_locked_) {
|
| @@ -185,8 +178,8 @@ void EnterpriseInstallAttributes::LockDevice(
|
| }
|
|
|
| switch (registration_mode_) {
|
| - case DEVICE_MODE_ENTERPRISE:
|
| - case DEVICE_MODE_LEGACY_RETAIL_MODE: {
|
| + case policy::DEVICE_MODE_ENTERPRISE:
|
| + case policy::DEVICE_MODE_LEGACY_RETAIL_MODE: {
|
| // Check domain match for enterprise devices.
|
| std::string domain = gaia::ExtractDomainName(user);
|
| if (registration_domain_.empty() || domain != registration_domain_) {
|
| @@ -195,13 +188,13 @@ void EnterpriseInstallAttributes::LockDevice(
|
| }
|
| break;
|
| }
|
| - case DEVICE_MODE_NOT_SET:
|
| - case DEVICE_MODE_PENDING:
|
| + case policy::DEVICE_MODE_NOT_SET:
|
| + case policy::DEVICE_MODE_PENDING:
|
| // This case can't happen due to the CHECK_NE asserts above.
|
| NOTREACHED();
|
| break;
|
| - case DEVICE_MODE_CONSUMER:
|
| - case DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH:
|
| + case policy::DEVICE_MODE_CONSUMER:
|
| + case policy::DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH:
|
| // The user parameter is ignored for consumer devices.
|
| break;
|
| }
|
| @@ -216,7 +209,7 @@ void EnterpriseInstallAttributes::LockDevice(
|
| // device locking must wait for TPM initialization anyways.
|
| if (consistency_check_running_) {
|
| CHECK(post_check_action_.is_null());
|
| - post_check_action_ = base::Bind(&EnterpriseInstallAttributes::LockDevice,
|
| + post_check_action_ = base::Bind(&InstallAttributes::LockDevice,
|
| weak_ptr_factory_.GetWeakPtr(),
|
| user,
|
| device_mode,
|
| @@ -227,7 +220,7 @@ void EnterpriseInstallAttributes::LockDevice(
|
|
|
| device_lock_running_ = true;
|
| cryptohome_client_->InstallAttributesIsReady(
|
| - base::Bind(&EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady,
|
| + base::Bind(&InstallAttributes::LockDeviceIfAttributesIsReady,
|
| weak_ptr_factory_.GetWeakPtr(),
|
| user,
|
| device_mode,
|
| @@ -235,14 +228,14 @@ void EnterpriseInstallAttributes::LockDevice(
|
| callback));
|
| }
|
|
|
| -void EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady(
|
| +void InstallAttributes::LockDeviceIfAttributesIsReady(
|
| const std::string& user,
|
| - DeviceMode device_mode,
|
| + policy::DeviceMode device_mode,
|
| const std::string& device_id,
|
| const LockResultCallback& callback,
|
| - chromeos::DBusMethodCallStatus call_status,
|
| + DBusMethodCallStatus call_status,
|
| bool result) {
|
| - if (call_status != chromeos::DBUS_METHOD_CALL_SUCCESS || !result) {
|
| + if (call_status != DBUS_METHOD_CALL_SUCCESS || !result) {
|
| device_lock_running_ = false;
|
| callback.Run(LOCK_NOT_READY);
|
| return;
|
| @@ -275,7 +268,7 @@ void EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady(
|
| if (!user.empty())
|
| registration_user = gaia::CanonicalizeEmail(user);
|
|
|
| - if (device_mode == DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH) {
|
| + if (device_mode == policy::DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH) {
|
| // Set values in the InstallAttrs and lock it.
|
| if (!cryptohome_util::InstallAttributesSet(kAttrConsumerKioskEnabled,
|
| "true")) {
|
| @@ -290,8 +283,7 @@ void EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady(
|
| if (!cryptohome_util::InstallAttributesSet(kAttrEnterpriseOwned, "true") ||
|
| !cryptohome_util::InstallAttributesSet(kAttrEnterpriseUser,
|
| registration_user) ||
|
| - !cryptohome_util::InstallAttributesSet(kAttrEnterpriseDomain,
|
| - domain) ||
|
| + !cryptohome_util::InstallAttributesSet(kAttrEnterpriseDomain, domain) ||
|
| !cryptohome_util::InstallAttributesSet(kAttrEnterpriseMode, mode) ||
|
| !cryptohome_util::InstallAttributesSet(kAttrEnterpriseDeviceId,
|
| device_id)) {
|
| @@ -311,13 +303,13 @@ void EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady(
|
| }
|
|
|
| ReadImmutableAttributes(
|
| - base::Bind(&EnterpriseInstallAttributes::OnReadImmutableAttributes,
|
| + base::Bind(&InstallAttributes::OnReadImmutableAttributes,
|
| weak_ptr_factory_.GetWeakPtr(),
|
| registration_user,
|
| callback));
|
| }
|
|
|
| -void EnterpriseInstallAttributes::OnReadImmutableAttributes(
|
| +void InstallAttributes::OnReadImmutableAttributes(
|
| const std::string& registration_user,
|
| const LockResultCallback& callback) {
|
|
|
| @@ -332,57 +324,56 @@ void EnterpriseInstallAttributes::OnReadImmutableAttributes(
|
| callback.Run(LOCK_SUCCESS);
|
| }
|
|
|
| -bool EnterpriseInstallAttributes::IsEnterpriseDevice() const {
|
| +bool InstallAttributes::IsEnterpriseDevice() const {
|
| return device_locked_ && !registration_user_.empty();
|
| }
|
|
|
| -bool EnterpriseInstallAttributes::IsConsumerKioskDeviceWithAutoLaunch() {
|
| +bool InstallAttributes::IsConsumerKioskDeviceWithAutoLaunch() {
|
| return device_locked_ &&
|
| - registration_mode_ == DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH;
|
| + registration_mode_ == policy::DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH;
|
| }
|
|
|
| -std::string EnterpriseInstallAttributes::GetDomain() const {
|
| +std::string InstallAttributes::GetDomain() const {
|
| if (!IsEnterpriseDevice())
|
| return std::string();
|
|
|
| return registration_domain_;
|
| }
|
|
|
| -std::string EnterpriseInstallAttributes::GetDeviceId() {
|
| +std::string InstallAttributes::GetDeviceId() {
|
| if (!IsEnterpriseDevice())
|
| return std::string();
|
|
|
| return registration_device_id_;
|
| }
|
|
|
| -DeviceMode EnterpriseInstallAttributes::GetMode() {
|
| +policy::DeviceMode InstallAttributes::GetMode() {
|
| return registration_mode_;
|
| }
|
|
|
| -void EnterpriseInstallAttributes::TriggerConsistencyCheck(int dbus_retries) {
|
| +void InstallAttributes::TriggerConsistencyCheck(int dbus_retries) {
|
| cryptohome_client_->TpmIsOwned(
|
| - base::Bind(&EnterpriseInstallAttributes::OnTpmOwnerCheckCompleted,
|
| + base::Bind(&InstallAttributes::OnTpmOwnerCheckCompleted,
|
| weak_ptr_factory_.GetWeakPtr(),
|
| dbus_retries));
|
| }
|
|
|
| -void EnterpriseInstallAttributes::OnTpmOwnerCheckCompleted(
|
| +void InstallAttributes::OnTpmOwnerCheckCompleted(
|
| int dbus_retries_remaining,
|
| - chromeos::DBusMethodCallStatus call_status,
|
| + DBusMethodCallStatus call_status,
|
| bool result) {
|
| - if (call_status != chromeos::DBUS_METHOD_CALL_SUCCESS &&
|
| - dbus_retries_remaining) {
|
| + if (call_status != DBUS_METHOD_CALL_SUCCESS && dbus_retries_remaining) {
|
| base::ThreadTaskRunnerHandle::Get()->PostDelayedTask(
|
| FROM_HERE,
|
| - base::Bind(&EnterpriseInstallAttributes::TriggerConsistencyCheck,
|
| + base::Bind(&InstallAttributes::TriggerConsistencyCheck,
|
| weak_ptr_factory_.GetWeakPtr(), dbus_retries_remaining - 1),
|
| base::TimeDelta::FromSeconds(kDbusRetryIntervalInSeconds));
|
| return;
|
| }
|
|
|
| base::HistogramBase::Sample state = device_locked_;
|
| - state |= 0x2 * (registration_mode_ == DEVICE_MODE_ENTERPRISE);
|
| - if (call_status == chromeos::DBUS_METHOD_CALL_SUCCESS)
|
| + state |= 0x2 * (registration_mode_ == policy::DEVICE_MODE_ENTERPRISE);
|
| + if (call_status == DBUS_METHOD_CALL_SUCCESS)
|
| state |= 0x4 * result;
|
| else
|
| state = 0x8; // This case is not a bit mask.
|
| @@ -401,27 +392,22 @@ void EnterpriseInstallAttributes::OnTpmOwnerCheckCompleted(
|
| // in the protobuf with a trailing zero. Also note that some of these constants
|
| // have been copied to login_manager/device_policy_service.cc. Please make sure
|
| // that all changes to the constants are reflected there as well.
|
| -const char EnterpriseInstallAttributes::kConsumerDeviceMode[] = "consumer";
|
| -const char EnterpriseInstallAttributes::kEnterpriseDeviceMode[] = "enterprise";
|
| -const char EnterpriseInstallAttributes::kLegacyRetailDeviceMode[] = "kiosk";
|
| -const char EnterpriseInstallAttributes::kConsumerKioskDeviceMode[] =
|
| - "consumer_kiosk";
|
| -const char EnterpriseInstallAttributes::kUnknownDeviceMode[] = "unknown";
|
| -
|
| -const char EnterpriseInstallAttributes::kAttrEnterpriseDeviceId[] =
|
| +const char InstallAttributes::kConsumerDeviceMode[] = "consumer";
|
| +const char InstallAttributes::kEnterpriseDeviceMode[] = "enterprise";
|
| +const char InstallAttributes::kLegacyRetailDeviceMode[] = "kiosk";
|
| +const char InstallAttributes::kConsumerKioskDeviceMode[] = "consumer_kiosk";
|
| +const char InstallAttributes::kUnknownDeviceMode[] = "unknown";
|
| +
|
| +const char InstallAttributes::kAttrEnterpriseDeviceId[] =
|
| "enterprise.device_id";
|
| -const char EnterpriseInstallAttributes::kAttrEnterpriseDomain[] =
|
| - "enterprise.domain";
|
| -const char EnterpriseInstallAttributes::kAttrEnterpriseMode[] =
|
| - "enterprise.mode";
|
| -const char EnterpriseInstallAttributes::kAttrEnterpriseOwned[] =
|
| - "enterprise.owned";
|
| -const char EnterpriseInstallAttributes::kAttrEnterpriseUser[] =
|
| - "enterprise.user";
|
| -const char EnterpriseInstallAttributes::kAttrConsumerKioskEnabled[] =
|
| +const char InstallAttributes::kAttrEnterpriseDomain[] = "enterprise.domain";
|
| +const char InstallAttributes::kAttrEnterpriseMode[] = "enterprise.mode";
|
| +const char InstallAttributes::kAttrEnterpriseOwned[] = "enterprise.owned";
|
| +const char InstallAttributes::kAttrEnterpriseUser[] = "enterprise.user";
|
| +const char InstallAttributes::kAttrConsumerKioskEnabled[] =
|
| "consumer.app_kiosk_enabled";
|
|
|
| -void EnterpriseInstallAttributes::OnCryptohomeServiceInitiallyAvailable(
|
| +void InstallAttributes::OnCryptohomeServiceInitiallyAvailable(
|
| bool service_is_ready) {
|
| if (!service_is_ready)
|
| LOG(ERROR) << "Failed waiting for cryptohome D-Bus service availability.";
|
| @@ -431,39 +417,39 @@ void EnterpriseInstallAttributes::OnCryptohomeServiceInitiallyAvailable(
|
| TriggerConsistencyCheck(kDbusRetryCount);
|
| }
|
|
|
| -std::string EnterpriseInstallAttributes::GetDeviceModeString(DeviceMode mode) {
|
| +std::string InstallAttributes::GetDeviceModeString(policy::DeviceMode mode) {
|
| switch (mode) {
|
| - case DEVICE_MODE_CONSUMER:
|
| - return EnterpriseInstallAttributes::kConsumerDeviceMode;
|
| - case DEVICE_MODE_ENTERPRISE:
|
| - return EnterpriseInstallAttributes::kEnterpriseDeviceMode;
|
| - case DEVICE_MODE_LEGACY_RETAIL_MODE:
|
| - return EnterpriseInstallAttributes::kLegacyRetailDeviceMode;
|
| - case DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH:
|
| - return EnterpriseInstallAttributes::kConsumerKioskDeviceMode;
|
| - case DEVICE_MODE_PENDING:
|
| - case DEVICE_MODE_NOT_SET:
|
| + case policy::DEVICE_MODE_CONSUMER:
|
| + return InstallAttributes::kConsumerDeviceMode;
|
| + case policy::DEVICE_MODE_ENTERPRISE:
|
| + return InstallAttributes::kEnterpriseDeviceMode;
|
| + case policy::DEVICE_MODE_LEGACY_RETAIL_MODE:
|
| + return InstallAttributes::kLegacyRetailDeviceMode;
|
| + case policy::DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH:
|
| + return InstallAttributes::kConsumerKioskDeviceMode;
|
| + case policy::DEVICE_MODE_PENDING:
|
| + case policy::DEVICE_MODE_NOT_SET:
|
| break;
|
| }
|
| NOTREACHED() << "Invalid device mode: " << mode;
|
| - return EnterpriseInstallAttributes::kUnknownDeviceMode;
|
| + return InstallAttributes::kUnknownDeviceMode;
|
| }
|
|
|
| -DeviceMode EnterpriseInstallAttributes::GetDeviceModeFromString(
|
| +policy::DeviceMode InstallAttributes::GetDeviceModeFromString(
|
| const std::string& mode) {
|
| - if (mode == EnterpriseInstallAttributes::kConsumerDeviceMode)
|
| - return DEVICE_MODE_CONSUMER;
|
| - else if (mode == EnterpriseInstallAttributes::kEnterpriseDeviceMode)
|
| - return DEVICE_MODE_ENTERPRISE;
|
| - else if (mode == EnterpriseInstallAttributes::kLegacyRetailDeviceMode)
|
| - return DEVICE_MODE_LEGACY_RETAIL_MODE;
|
| - else if (mode == EnterpriseInstallAttributes::kConsumerKioskDeviceMode)
|
| - return DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH;
|
| + if (mode == InstallAttributes::kConsumerDeviceMode)
|
| + return policy::DEVICE_MODE_CONSUMER;
|
| + else if (mode == InstallAttributes::kEnterpriseDeviceMode)
|
| + return policy::DEVICE_MODE_ENTERPRISE;
|
| + else if (mode == InstallAttributes::kLegacyRetailDeviceMode)
|
| + return policy::DEVICE_MODE_LEGACY_RETAIL_MODE;
|
| + else if (mode == InstallAttributes::kConsumerKioskDeviceMode)
|
| + return policy::DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH;
|
| NOTREACHED() << "Unknown device mode string: " << mode;
|
| - return DEVICE_MODE_NOT_SET;
|
| + return policy::DEVICE_MODE_NOT_SET;
|
| }
|
|
|
| -void EnterpriseInstallAttributes::DecodeInstallAttributes(
|
| +void InstallAttributes::DecodeInstallAttributes(
|
| const std::map<std::string, std::string>& attr_map) {
|
| std::string enterprise_owned;
|
| std::string enterprise_user;
|
| @@ -476,7 +462,7 @@ void EnterpriseInstallAttributes::DecodeInstallAttributes(
|
|
|
| // Initialize the mode to the legacy enterprise mode here and update
|
| // below if more information is present.
|
| - registration_mode_ = DEVICE_MODE_ENTERPRISE;
|
| + registration_mode_ = policy::DEVICE_MODE_ENTERPRISE;
|
|
|
| // If we could extract basic setting we should try to extract the
|
| // extended ones too. We try to set these to defaults as good as
|
| @@ -496,18 +482,18 @@ void EnterpriseInstallAttributes::DecodeInstallAttributes(
|
| kAttrConsumerKioskEnabled,
|
| &consumer_kiosk_enabled) &&
|
| consumer_kiosk_enabled == "true") {
|
| - registration_mode_ = DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH;
|
| + registration_mode_ = policy::DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH;
|
| } else if (enterprise_user.empty() && enterprise_owned != "true") {
|
| // |registration_user_| is empty on consumer devices.
|
| - registration_mode_ = DEVICE_MODE_CONSUMER;
|
| + registration_mode_ = policy::DEVICE_MODE_CONSUMER;
|
| }
|
| }
|
|
|
| -std::string EnterpriseInstallAttributes::GetRegistrationUser() const {
|
| +std::string InstallAttributes::GetRegistrationUser() const {
|
| if (!device_locked_)
|
| return std::string();
|
|
|
| return registration_user_;
|
| }
|
|
|
| -} // namespace policy
|
| +} // namespace chromeos
|
|
|