Index: chrome/browser/chromeos/policy/network_policy_service.h |
diff --git a/chrome/browser/chromeos/policy/network_policy_service.h b/chrome/browser/chromeos/policy/network_policy_service.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..c3e4c07f75a2da93d89c951c4c67a7edda9b2a64 |
--- /dev/null |
+++ b/chrome/browser/chromeos/policy/network_policy_service.h |
@@ -0,0 +1,72 @@ |
+// Copyright 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CHROME_BROWSER_CHROMEOS_POLICY_NETWORK_POLICY_SERVICE_H_ |
+#define CHROME_BROWSER_CHROMEOS_POLICY_NETWORK_POLICY_SERVICE_H_ |
+ |
+#include <vector> |
+ |
+#include "base/callback.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "base/memory/weak_ptr.h" |
+#include "components/browser_context_keyed_service/browser_context_keyed_service.h" |
+ |
+class Profile; |
+class PrefService; |
+ |
+namespace net { |
+class CertTrustAnchorProvider; |
+class X509Certificate; |
+typedef std::vector<scoped_refptr<X509Certificate> > CertificateList; |
+} |
+ |
+namespace policy { |
+ |
+class PolicyCertVerifier; |
+class PolicyService; |
+class UserNetworkConfigurationUpdater; |
+ |
+class NetworkPolicyService : public BrowserContextKeyedService { |
+ public: |
+ NetworkPolicyService(Profile* profile, PolicyService* policy_service); |
Mattias Nissler (ping if slow)
2013/09/20 12:35:23
You actually don't need a full profile, please pas
pneubeck (no reviews)
2013/10/15 13:23:11
Done.
|
+ virtual ~NetworkPolicyService(); |
+ |
+ // Sets the CertVerifier on which the current list of Web trusted server and |
+ // CA certificates will be set. Policy updates will trigger further calls to |
+ // |cert_verifier| later. |cert_verifier| must be valid until |
+ // SetPolicyCertVerifier is called again (with another CertVerifier or NULL) |
+ // or until this Connector is destructed. |cert_verifier|'s methods are only |
+ // called on the IO thread. This function must be called on the UI thread. |
+ void SetPolicyCertVerifier(PolicyCertVerifier* cert_verifier); |
+ |
+ void SetUsedPolicyCertificatesOnce(); |
Mattias Nissler (ping if slow)
2013/09/20 12:35:23
Why is this public?
pneubeck (no reviews)
2013/10/15 13:23:11
Done.
|
+ |
+ // Returns a callback that should be called if a policy installed certificate |
+ // was trusted for the associated profile. The closure can be safely used (on |
+ // the UI thread) even after this Connector is destructed. |
Mattias Nissler (ping if slow)
2013/09/20 12:35:23
I'm still feeling a bit uneasy about the weak ptr
pneubeck (no reviews)
2013/09/20 12:39:36
Who should generate and who should listen? (your c
|
+ base::Closure GetPolicyCertTrustedCallback(); |
+ |
+ // Sets |certs| to the list of Web trusted server and CA certificates from the |
+ // last received ONC user policy. |
+ void GetWebTrustedCertificates(net::CertificateList* certs) const; |
+ |
+ // Returns true if the profile with |user_prefs| has used certificates |
+ // installed via policy to establish a secure connection before. This means |
+ // that it may have cached content from an untrusted source. |
+ bool UsedPolicyCertificates(); |
+ |
+ // BrowserContextKeyedService: |
+ virtual void Shutdown() OVERRIDE; |
+ |
+ private: |
+ PrefService* user_prefs_; |
+ scoped_ptr<UserNetworkConfigurationUpdater> network_configuration_updater_; |
+ base::WeakPtrFactory<NetworkPolicyService> weak_ptr_factory_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(NetworkPolicyService); |
+}; |
+ |
+} // namespace policy |
+ |
+#endif // CHROME_BROWSER_CHROMEOS_POLICY_NETWORK_POLICY_SERVICE_H_ |