| Index: chrome/browser/chromeos/policy/policy_cert_service.h
|
| diff --git a/chrome/browser/chromeos/policy/policy_cert_service.h b/chrome/browser/chromeos/policy/policy_cert_service.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..a32040f255f29084b300a85c10a6956c49e6d2f1
|
| --- /dev/null
|
| +++ b/chrome/browser/chromeos/policy/policy_cert_service.h
|
| @@ -0,0 +1,74 @@
|
| +// Copyright 2013 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_CERT_SERVICE_H_
|
| +#define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_CERT_SERVICE_H_
|
| +
|
| +#include <vector>
|
| +
|
| +#include "base/basictypes.h"
|
| +#include "base/compiler_specific.h"
|
| +#include "base/memory/ref_counted.h"
|
| +#include "base/memory/scoped_ptr.h"
|
| +#include "base/memory/weak_ptr.h"
|
| +#include "chrome/browser/chromeos/policy/user_network_configuration_updater.h"
|
| +#include "components/browser_context_keyed_service/browser_context_keyed_service.h"
|
| +
|
| +class PrefService;
|
| +
|
| +namespace net {
|
| +class X509Certificate;
|
| +typedef std::vector<scoped_refptr<X509Certificate> > CertificateList;
|
| +}
|
| +
|
| +namespace policy {
|
| +
|
| +class PolicyCertVerifier;
|
| +
|
| +// This service is the counterpart of PolicyCertVerifier on the UI thread. It's
|
| +// responsible for pushing the current list of trust anchors to the CertVerifier
|
| +// and marking the profile's prefs if any of the trust anchors was used.
|
| +// Except for unit tests, PolicyCertVerifier should only be created through this
|
| +// class.
|
| +class PolicyCertService
|
| + : public BrowserContextKeyedService,
|
| + public UserNetworkConfigurationUpdater::WebTrustedCertsObserver {
|
| + public:
|
| + PolicyCertService(UserNetworkConfigurationUpdater* net_conf_updater,
|
| + PrefService* user_prefs);
|
| + virtual ~PolicyCertService();
|
| +
|
| + // Creates an associated PolicyCertVerifier. The returned object must only be
|
| + // used on the IO thread and must outlive this object.
|
| + scoped_ptr<PolicyCertVerifier> CreatePolicyCertVerifier();
|
| +
|
| + // Returns true if the profile with |user_prefs| has used certificates
|
| + // installed via policy to establish a secure connection before. This means
|
| + // that it may have cached content from an untrusted source.
|
| + bool UsedPolicyCertificates() const;
|
| +
|
| + // UserNetworkConfigurationUpdater::WebTrustedCertsObserver:
|
| + virtual void OnTrustAnchorsChanged(const net::CertificateList& trust_anchors)
|
| + OVERRIDE;
|
| +
|
| + // BrowserContextKeyedService:
|
| + virtual void Shutdown() OVERRIDE;
|
| +
|
| + private:
|
| + void SetUsedPolicyCertificatesOnce();
|
| +
|
| + PolicyCertVerifier* cert_verifier_;
|
| + UserNetworkConfigurationUpdater* net_conf_updater_;
|
| + PrefService* user_prefs_;
|
| +
|
| + // Weak pointers to handle callbacks from PolicyCertVerifier on the IO thread.
|
| + // The factory and the created WeakPtrs must only be used on the UI thread.
|
| + base::WeakPtrFactory<PolicyCertService> weak_ptr_factory_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(PolicyCertService);
|
| +};
|
| +
|
| +} // namespace policy
|
| +
|
| +#endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_CERT_SERVICE_H_
|
|
|