| Index: chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.cc
|
| diff --git a/chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.cc b/chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.cc
|
| deleted file mode 100644
|
| index 36cacfa750a859c9281089f2408867a0c1e59e2b..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.cc
|
| +++ /dev/null
|
| @@ -1,258 +0,0 @@
|
| -// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.h"
|
| -
|
| -#include <utility>
|
| -
|
| -#include "base/bind.h"
|
| -#include "base/command_line.h"
|
| -#include "base/files/file_path.h"
|
| -#include "base/logging.h"
|
| -#include "base/memory/ref_counted.h"
|
| -#include "base/path_service.h"
|
| -#include "base/sequenced_task_runner.h"
|
| -#include "base/threading/sequenced_worker_pool.h"
|
| -#include "base/threading/thread_task_runner_handle.h"
|
| -#include "base/time/time.h"
|
| -#include "chrome/browser/browser_process.h"
|
| -#include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h"
|
| -#include "chrome/browser/chromeos/policy/user_cloud_external_data_manager.h"
|
| -#include "chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos.h"
|
| -#include "chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos.h"
|
| -#include "chrome/browser/chromeos/profiles/profile_helper.h"
|
| -#include "chrome/browser/chromeos/settings/cros_settings.h"
|
| -#include "chrome/browser/policy/schema_registry_service.h"
|
| -#include "chrome/browser/policy/schema_registry_service_factory.h"
|
| -#include "chrome/browser/profiles/profile.h"
|
| -#include "chromeos/chromeos_paths.h"
|
| -#include "chromeos/chromeos_switches.h"
|
| -#include "chromeos/dbus/dbus_thread_manager.h"
|
| -#include "components/keyed_service/content/browser_context_dependency_manager.h"
|
| -#include "components/policy/core/browser/browser_policy_connector.h"
|
| -#include "components/policy/core/common/cloud/cloud_external_data_manager.h"
|
| -#include "components/policy/core/common/cloud/device_management_service.h"
|
| -#include "components/policy/policy_constants.h"
|
| -#include "components/user_manager/user.h"
|
| -#include "components/user_manager/user_manager.h"
|
| -#include "content/public/browser/browser_thread.h"
|
| -#include "net/url_request/url_request_context_getter.h"
|
| -
|
| -namespace policy {
|
| -
|
| -namespace {
|
| -
|
| -// Directory under the profile directory where policy-related resources are
|
| -// stored, see the following constants for details.
|
| -const base::FilePath::CharType kPolicy[] = FILE_PATH_LITERAL("Policy");
|
| -
|
| -// Directory under kPolicy, in the user's profile dir, where policy for
|
| -// components is cached.
|
| -const base::FilePath::CharType kComponentsDir[] =
|
| - FILE_PATH_LITERAL("Components");
|
| -
|
| -// Directory in which to store external policy data. This is specified relative
|
| -// to kPolicy.
|
| -const base::FilePath::CharType kPolicyExternalDataDir[] =
|
| - FILE_PATH_LITERAL("External Data");
|
| -
|
| -// Timeout in seconds after which to abandon the initial policy fetch and start
|
| -// the session regardless.
|
| -const int kInitialPolicyFetchTimeoutSeconds = 10;
|
| -
|
| -} // namespace
|
| -
|
| -// static
|
| -UserCloudPolicyManagerFactoryChromeOS*
|
| - UserCloudPolicyManagerFactoryChromeOS::GetInstance() {
|
| - return base::Singleton<UserCloudPolicyManagerFactoryChromeOS>::get();
|
| -}
|
| -
|
| -// static
|
| -UserCloudPolicyManagerChromeOS*
|
| - UserCloudPolicyManagerFactoryChromeOS::GetForProfile(
|
| - Profile* profile) {
|
| - return GetInstance()->GetManagerForProfile(profile);
|
| -}
|
| -
|
| -// static
|
| -std::unique_ptr<UserCloudPolicyManagerChromeOS>
|
| -UserCloudPolicyManagerFactoryChromeOS::CreateForProfile(
|
| - Profile* profile,
|
| - bool force_immediate_load,
|
| - scoped_refptr<base::SequencedTaskRunner> background_task_runner) {
|
| - return GetInstance()->CreateManagerForProfile(
|
| - profile, force_immediate_load, background_task_runner);
|
| -}
|
| -
|
| -UserCloudPolicyManagerFactoryChromeOS::UserCloudPolicyManagerFactoryChromeOS()
|
| - : BrowserContextKeyedBaseFactory(
|
| - "UserCloudPolicyManagerChromeOS",
|
| - BrowserContextDependencyManager::GetInstance()) {
|
| - DependsOn(SchemaRegistryServiceFactory::GetInstance());
|
| -}
|
| -
|
| -UserCloudPolicyManagerFactoryChromeOS::
|
| - ~UserCloudPolicyManagerFactoryChromeOS() {}
|
| -
|
| -UserCloudPolicyManagerChromeOS*
|
| - UserCloudPolicyManagerFactoryChromeOS::GetManagerForProfile(
|
| - Profile* profile) {
|
| - // Get the manager for the original profile, since the PolicyService is
|
| - // also shared between the incognito Profile and the original Profile.
|
| - ManagerMap::const_iterator it = managers_.find(profile->GetOriginalProfile());
|
| - return it != managers_.end() ? it->second : NULL;
|
| -}
|
| -
|
| -std::unique_ptr<UserCloudPolicyManagerChromeOS>
|
| -UserCloudPolicyManagerFactoryChromeOS::CreateManagerForProfile(
|
| - Profile* profile,
|
| - bool force_immediate_load,
|
| - scoped_refptr<base::SequencedTaskRunner> background_task_runner) {
|
| - const base::CommandLine* command_line =
|
| - base::CommandLine::ForCurrentProcess();
|
| - // Don't initialize cloud policy for the signin profile.
|
| - if (chromeos::ProfileHelper::IsSigninProfile(profile))
|
| - return std::unique_ptr<UserCloudPolicyManagerChromeOS>();
|
| -
|
| - // |user| should never be NULL except for the signin profile. This object is
|
| - // created as part of the Profile creation, which happens right after
|
| - // sign-in. The just-signed-in User is the active user during that time.
|
| - const user_manager::User* user =
|
| - chromeos::ProfileHelper::Get()->GetUserByProfile(profile);
|
| - CHECK(user);
|
| -
|
| - // User policy exists for enterprise accounts only:
|
| - // - For regular enterprise users (those who have a GAIA account), a
|
| - // |UserCloudPolicyManagerChromeOS| is created here.
|
| - // - For device-local accounts, policy is provided by
|
| - // |DeviceLocalAccountPolicyService|.
|
| - // All other user types do not have user policy.
|
| - const AccountId account_id = user->GetAccountId();
|
| - if (!user->HasGaiaAccount() || user->IsSupervised() ||
|
| - BrowserPolicyConnector::IsNonEnterpriseUser(account_id.GetUserEmail())) {
|
| - return std::unique_ptr<UserCloudPolicyManagerChromeOS>();
|
| - }
|
| -
|
| - policy::BrowserPolicyConnectorChromeOS* connector =
|
| - g_browser_process->platform_part()->browser_policy_connector_chromeos();
|
| - const bool is_browser_restart =
|
| - command_line->HasSwitch(chromeos::switches::kLoginUser);
|
| - const user_manager::UserManager* const user_manager =
|
| - user_manager::UserManager::Get();
|
| -
|
| - // We want to block for policy in a few situations: if the user is new, or
|
| - // if we are forcing an online signin. An online signin will be forced if
|
| - // there has been a credential error, or if the initial session creation
|
| - // was not completed (the oauth_token_status is not set to valid by
|
| - // OAuth2LoginManager until profile creation/session restore is complete).
|
| - const bool block_forever_for_policy =
|
| - !user_manager->IsLoggedInAsStub() &&
|
| - (user_manager->IsCurrentUserNew() ||
|
| - user_manager->GetActiveUser()->force_online_signin() ||
|
| - user_manager->GetActiveUser()->oauth_token_status() !=
|
| - user_manager::User::OAUTH2_TOKEN_STATUS_VALID);
|
| -
|
| - const bool wait_for_policy_fetch =
|
| - block_forever_for_policy || !is_browser_restart;
|
| -
|
| - base::TimeDelta initial_policy_fetch_timeout;
|
| - if (block_forever_for_policy) {
|
| - initial_policy_fetch_timeout = base::TimeDelta::Max();
|
| - } else if (wait_for_policy_fetch) {
|
| - initial_policy_fetch_timeout =
|
| - base::TimeDelta::FromSeconds(kInitialPolicyFetchTimeoutSeconds);
|
| - }
|
| -
|
| - DeviceManagementService* device_management_service =
|
| - connector->device_management_service();
|
| - if (wait_for_policy_fetch)
|
| - device_management_service->ScheduleInitialization(0);
|
| -
|
| - base::FilePath profile_dir = profile->GetPath();
|
| - const base::FilePath component_policy_cache_dir =
|
| - profile_dir.Append(kPolicy).Append(kComponentsDir);
|
| - const base::FilePath external_data_dir =
|
| - profile_dir.Append(kPolicy).Append(kPolicyExternalDataDir);
|
| - base::FilePath policy_key_dir;
|
| - CHECK(PathService::Get(chromeos::DIR_USER_POLICY_KEYS, &policy_key_dir));
|
| -
|
| - std::unique_ptr<UserCloudPolicyStoreChromeOS> store(
|
| - new UserCloudPolicyStoreChromeOS(
|
| - chromeos::DBusThreadManager::Get()->GetCryptohomeClient(),
|
| - chromeos::DBusThreadManager::Get()->GetSessionManagerClient(),
|
| - background_task_runner, account_id, policy_key_dir));
|
| -
|
| - scoped_refptr<base::SequencedTaskRunner> backend_task_runner =
|
| - content::BrowserThread::GetBlockingPool()->GetSequencedTaskRunner(
|
| - content::BrowserThread::GetBlockingPool()->GetSequenceToken());
|
| - scoped_refptr<base::SequencedTaskRunner> io_task_runner =
|
| - content::BrowserThread::GetTaskRunnerForThread(
|
| - content::BrowserThread::IO);
|
| - std::unique_ptr<CloudExternalDataManager> external_data_manager(
|
| - new UserCloudExternalDataManager(base::Bind(&GetChromePolicyDetails),
|
| - backend_task_runner, io_task_runner,
|
| - external_data_dir, store.get()));
|
| - if (force_immediate_load)
|
| - store->LoadImmediately();
|
| -
|
| - scoped_refptr<base::SequencedTaskRunner> file_task_runner =
|
| - content::BrowserThread::GetTaskRunnerForThread(
|
| - content::BrowserThread::FILE);
|
| -
|
| - std::unique_ptr<UserCloudPolicyManagerChromeOS> manager(
|
| - new UserCloudPolicyManagerChromeOS(
|
| - std::move(store), std::move(external_data_manager),
|
| - component_policy_cache_dir, wait_for_policy_fetch,
|
| - initial_policy_fetch_timeout, base::ThreadTaskRunnerHandle::Get(),
|
| - file_task_runner, io_task_runner));
|
| -
|
| - bool wildcard_match = false;
|
| - if (connector->IsEnterpriseManaged() &&
|
| - chromeos::CrosSettings::IsWhitelisted(account_id.GetUserEmail(),
|
| - &wildcard_match) &&
|
| - wildcard_match &&
|
| - !connector->IsNonEnterpriseUser(account_id.GetUserEmail())) {
|
| - manager->EnableWildcardLoginCheck(account_id.GetUserEmail());
|
| - }
|
| -
|
| - manager->Init(
|
| - SchemaRegistryServiceFactory::GetForContext(profile)->registry());
|
| - manager->Connect(g_browser_process->local_state(), device_management_service,
|
| - g_browser_process->system_request_context());
|
| -
|
| - DCHECK(managers_.find(profile) == managers_.end());
|
| - managers_[profile] = manager.get();
|
| - return manager;
|
| -}
|
| -
|
| -void UserCloudPolicyManagerFactoryChromeOS::BrowserContextShutdown(
|
| - content::BrowserContext* context) {
|
| - Profile* profile = static_cast<Profile*>(context);
|
| - if (profile->IsOffTheRecord())
|
| - return;
|
| - UserCloudPolicyManagerChromeOS* manager = GetManagerForProfile(profile);
|
| - if (manager)
|
| - manager->Shutdown();
|
| -}
|
| -
|
| -void UserCloudPolicyManagerFactoryChromeOS::BrowserContextDestroyed(
|
| - content::BrowserContext* context) {
|
| - Profile* profile = static_cast<Profile*>(context);
|
| - managers_.erase(profile);
|
| - BrowserContextKeyedBaseFactory::BrowserContextDestroyed(context);
|
| -}
|
| -
|
| -void UserCloudPolicyManagerFactoryChromeOS::SetEmptyTestingFactory(
|
| - content::BrowserContext* context) {}
|
| -
|
| -bool UserCloudPolicyManagerFactoryChromeOS::HasTestingFactory(
|
| - content::BrowserContext* context) {
|
| - return false;
|
| -}
|
| -
|
| -void UserCloudPolicyManagerFactoryChromeOS::CreateServiceNow(
|
| - content::BrowserContext* context) {}
|
| -
|
| -} // namespace policy
|
|
|