Index: chrome/browser/chromeos/policy/network_policy_service.cc |
diff --git a/chrome/browser/chromeos/policy/network_policy_service.cc b/chrome/browser/chromeos/policy/network_policy_service.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..b5f7ae3ce80b38dcb62aabf99e9be404e562ef5a |
--- /dev/null |
+++ b/chrome/browser/chromeos/policy/network_policy_service.cc |
@@ -0,0 +1,80 @@ |
+// Copyright 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/chromeos/policy/network_policy_service.h" |
+ |
+#include "base/bind.h" |
+#include "base/bind_helpers.h" |
+#include "base/logging.h" |
+#include "base/prefs/pref_service.h" |
+#include "chrome/browser/browser_process.h" |
+#include "chrome/browser/chromeos/login/user.h" |
+#include "chrome/browser/chromeos/login/user_manager.h" |
+#include "chrome/browser/chromeos/policy/policy_cert_verifier.h" |
+#include "chrome/browser/chromeos/policy/user_network_configuration_updater.h" |
+#include "chrome/browser/policy/browser_policy_connector.h" |
+#include "chrome/common/pref_names.h" |
+#include "chromeos/network/network_handler.h" |
+#include "chromeos/network/onc/onc_certificate_importer_impl.h" |
+ |
+namespace policy { |
+ |
+NetworkPolicyService::~NetworkPolicyService() {} |
+ |
+NetworkPolicyService::NetworkPolicyService(PrefService* user_prefs, |
+ PolicyService* policy_service) |
+ : user_prefs_(user_prefs) { |
+ chromeos::UserManager* user_manager = chromeos::UserManager::Get(); |
+ chromeos::User* user = user_manager->GetActiveUser(); |
Joao da Silva
2013/10/16 12:44:58
Pass |user| in the ctor
pneubeck (no reviews)
2013/10/22 18:47:41
Done.
|
+ CHECK(user); |
+ std::string username = user->email(); |
+ |
+ BrowserPolicyConnector* connector = |
+ g_browser_process->browser_policy_connector(); |
+ // Allow trusted certs from policy only for accounts with managed user |
+ // affiliation, i.e users that are managed by the same domain as the device. |
+ bool allow_trusted_certs_from_policy = |
+ connector->GetUserAffiliation(username) == USER_AFFILIATION_MANAGED && |
+ user->GetType() == chromeos::User::USER_TYPE_REGULAR; |
Joao da Silva
2013/10/16 12:44:58
pass in ctor
pneubeck (no reviews)
2013/10/22 18:47:41
do you mean, that I should forward user to UserNe
Joao da Silva
2013/10/23 07:45:54
I was suggesting to pass |allow_trusted_certs_from
pneubeck (no reviews)
2013/10/23 11:22:09
Done.
|
+ |
+ network_configuration_updater_ = |
+ UserNetworkConfigurationUpdater::CreateForUserPolicy( |
+ allow_trusted_certs_from_policy, |
+ *user, |
+ scoped_ptr<chromeos::onc::CertificateImporter>( |
+ new chromeos::onc::CertificateImporterImpl), |
+ policy_service, |
+ chromeos::NetworkHandler::Get() |
+ ->managed_network_configuration_handler()); |
+} |
+ |
+void NetworkPolicyService::SetPolicyCertVerifier( |
+ PolicyCertVerifier* cert_verifier) { |
+ network_configuration_updater_->SetPolicyCertVerifier(cert_verifier); |
+ cert_verifier_subscription_ = cert_verifier->RegisterAnchorUsedCallback( |
+ base::Bind(&NetworkPolicyService::SetUsedPolicyCertificatesOnce, |
+ base::Unretained(this))); |
+} |
+ |
+void NetworkPolicyService::GetWebTrustedCertificates( |
+ net::CertificateList* certs) const { |
+ certs->clear(); |
+ network_configuration_updater_->GetWebTrustedCertificates(certs); |
+} |
+ |
+bool NetworkPolicyService::UsedPolicyCertificates() { |
+ return user_prefs_->GetBoolean(prefs::kUsedPolicyCertificatesOnce); |
+} |
+ |
+void NetworkPolicyService::Shutdown() { |
+ network_configuration_updater_.reset(); |
+ user_prefs_ = NULL; |
+} |
+ |
+void NetworkPolicyService::SetUsedPolicyCertificatesOnce() { |
+ DCHECK(user_prefs_); |
+ user_prefs_->SetBoolean(prefs::kUsedPolicyCertificatesOnce, true); |
+} |
+ |
+} // namespace policy |