Chromium Code Reviews| Index: chromeos/network/network_connection_handler.cc |
| diff --git a/chromeos/network/network_connection_handler.cc b/chromeos/network/network_connection_handler.cc |
| index 81d3492a47e1bb2af29b7fadf0690cb0785d85c7..d64bd5cafeceb413f4fabb3ea6dfd3f177986d84 100644 |
| --- a/chromeos/network/network_connection_handler.cc |
| +++ b/chromeos/network/network_connection_handler.cc |
| @@ -422,8 +422,10 @@ void NetworkConnectionHandler::VerifyConfiguredAndConnect( |
| std::string profile; |
| service_properties.GetStringWithoutPathExpansion(shill::kProfileProperty, |
| &profile); |
| - const base::DictionaryValue* user_policy = |
| - managed_configuration_handler_->FindPolicyByGuidAndProfile(guid, profile); |
| + ::onc::ONCSource onc_source; |
|
emaxx
2017/04/20 20:10:39
nit: I believe the general guideline is to initial
pmarko
2017/04/24 14:49:56
Done. (also in chromeos/network/client_cert_resolv
|
| + const base::DictionaryValue* policy = |
| + managed_configuration_handler_->FindPolicyByGuidAndProfile(guid, profile, |
| + &onc_source); |
| if (IsNetworkProhibitedByPolicy(type, guid, profile)) { |
| ErrorCallbackForPendingRequest(service_path, kErrorUnmanagedNetwork); |
| @@ -431,8 +433,10 @@ void NetworkConnectionHandler::VerifyConfiguredAndConnect( |
| } |
| client_cert::ClientCertConfig cert_config_from_policy; |
| - if (user_policy) |
| - client_cert::OncToClientCertConfig(*user_policy, &cert_config_from_policy); |
| + if (policy) { |
| + client_cert::OncToClientCertConfig(onc_source, *policy, |
| + &cert_config_from_policy); |
| + } |
| client_cert::ConfigType client_cert_type = client_cert::CONFIG_TYPE_NONE; |
| if (type == shill::kTypeVPN) { |
| @@ -558,7 +562,7 @@ bool NetworkConnectionHandler::IsNetworkProhibitedByPolicy( |
| return false; |
| } |
| return !managed_configuration_handler_->FindPolicyByGuidAndProfile( |
| - guid, profile_path); |
| + guid, profile_path, nullptr); |
| } |
| void NetworkConnectionHandler::QueueConnectRequest( |