| Index: chromeos/network/network_connection_handler.cc
|
| diff --git a/chromeos/network/network_connection_handler.cc b/chromeos/network/network_connection_handler.cc
|
| index 81d3492a47e1bb2af29b7fadf0690cb0785d85c7..53eb7ff45ef11ea06d349252929f45bcfeeccea9 100644
|
| --- a/chromeos/network/network_connection_handler.cc
|
| +++ b/chromeos/network/network_connection_handler.cc
|
| @@ -422,8 +422,10 @@ void NetworkConnectionHandler::VerifyConfiguredAndConnect(
|
| std::string profile;
|
| service_properties.GetStringWithoutPathExpansion(shill::kProfileProperty,
|
| &profile);
|
| - const base::DictionaryValue* user_policy =
|
| - managed_configuration_handler_->FindPolicyByGuidAndProfile(guid, profile);
|
| + ::onc::ONCSource onc_source = onc::ONC_SOURCE_NONE;
|
| + const base::DictionaryValue* policy =
|
| + managed_configuration_handler_->FindPolicyByGuidAndProfile(guid, profile,
|
| + &onc_source);
|
|
|
| if (IsNetworkProhibitedByPolicy(type, guid, profile)) {
|
| ErrorCallbackForPendingRequest(service_path, kErrorUnmanagedNetwork);
|
| @@ -431,8 +433,10 @@ void NetworkConnectionHandler::VerifyConfiguredAndConnect(
|
| }
|
|
|
| client_cert::ClientCertConfig cert_config_from_policy;
|
| - if (user_policy)
|
| - client_cert::OncToClientCertConfig(*user_policy, &cert_config_from_policy);
|
| + if (policy) {
|
| + client_cert::OncToClientCertConfig(onc_source, *policy,
|
| + &cert_config_from_policy);
|
| + }
|
|
|
| client_cert::ConfigType client_cert_type = client_cert::CONFIG_TYPE_NONE;
|
| if (type == shill::kTypeVPN) {
|
| @@ -481,9 +485,7 @@ void NetworkConnectionHandler::VerifyConfiguredAndConnect(
|
| if (cert_config_from_policy.client_cert_type ==
|
| onc::client_cert::kPattern) {
|
| if (!ClientCertResolver::ResolveCertificatePatternSync(
|
| - client_cert_type,
|
| - cert_config_from_policy.pattern,
|
| - &config_properties)) {
|
| + client_cert_type, cert_config_from_policy, &config_properties)) {
|
| ErrorCallbackForPendingRequest(service_path, kErrorCertificateRequired);
|
| return;
|
| }
|
| @@ -558,7 +560,7 @@ bool NetworkConnectionHandler::IsNetworkProhibitedByPolicy(
|
| return false;
|
| }
|
| return !managed_configuration_handler_->FindPolicyByGuidAndProfile(
|
| - guid, profile_path);
|
| + guid, profile_path, nullptr /* onc_source */);
|
| }
|
|
|
| void NetworkConnectionHandler::QueueConnectRequest(
|
|
|