| OLD | NEW |
| 1 // Copyright (c) 2014 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/policy/core/common/policy_loader_win.h" | 5 #include "components/policy/core/common/policy_loader_win.h" |
| 6 | 6 |
| 7 #include <ntdsapi.h> // For Ds[Un]Bind | 7 #include <ntdsapi.h> // For Ds[Un]Bind |
| 8 #include <rpc.h> // For struct GUID | 8 #include <rpc.h> // For struct GUID |
| 9 #include <shlwapi.h> // For PathIsUNC() | 9 #include <shlwapi.h> // For PathIsUNC() |
| 10 #include <stddef.h> | 10 #include <stddef.h> |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 59 ";https://clients2.google.com/service/update2/crx"; | 59 ";https://clients2.google.com/service/update2/crx"; |
| 60 // String to be prepended to each blocked entry. | 60 // String to be prepended to each blocked entry. |
| 61 const char kBlockedExtensionPrefix[] = "[BLOCKED]"; | 61 const char kBlockedExtensionPrefix[] = "[BLOCKED]"; |
| 62 | 62 |
| 63 // List of policies that are considered only if the user is part of a AD domain. | 63 // List of policies that are considered only if the user is part of a AD domain. |
| 64 // Please document any new additions in policy_templates.json! | 64 // Please document any new additions in policy_templates.json! |
| 65 const char* kInsecurePolicies[] = { | 65 const char* kInsecurePolicies[] = { |
| 66 key::kMetricsReportingEnabled, key::kDefaultSearchProviderEnabled, | 66 key::kMetricsReportingEnabled, key::kDefaultSearchProviderEnabled, |
| 67 key::kHomepageIsNewTabPage, key::kHomepageLocation, | 67 key::kHomepageIsNewTabPage, key::kHomepageLocation, |
| 68 key::kNewTabPageLocation, key::kRestoreOnStartup, | 68 key::kNewTabPageLocation, key::kRestoreOnStartup, |
| 69 key::kRestoreOnStartupURLs}; | 69 key::kRestoreOnStartupURLs, key::kSafeBrowsingForTrustedSourcesEnabled}; |
| 70 | 70 |
| 71 #pragma warning(push) | 71 #pragma warning(push) |
| 72 #pragma warning(disable : 4068) // unknown pragmas | 72 #pragma warning(disable : 4068) // unknown pragmas |
| 73 // TODO(dcheng): Remove pragma once http://llvm.org/PR24007 is fixed. | 73 // TODO(dcheng): Remove pragma once http://llvm.org/PR24007 is fixed. |
| 74 #pragma clang diagnostic ignored "-Wmissing-braces" | 74 #pragma clang diagnostic ignored "-Wmissing-braces" |
| 75 // The GUID of the registry settings group policy extension. | 75 // The GUID of the registry settings group policy extension. |
| 76 GUID kRegistrySettingsCSEGUID = REGISTRY_EXTENSION_GUID; | 76 GUID kRegistrySettingsCSEGUID = REGISTRY_EXTENSION_GUID; |
| 77 #pragma warning(pop) | 77 #pragma warning(pop) |
| 78 | 78 |
| 79 // The list of possible errors that can occur while collecting information about | 79 // The list of possible errors that can occur while collecting information about |
| (...skipping 535 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 615 | 615 |
| 616 void PolicyLoaderWin::OnObjectSignaled(HANDLE object) { | 616 void PolicyLoaderWin::OnObjectSignaled(HANDLE object) { |
| 617 DCHECK(object == user_policy_changed_event_.handle() || | 617 DCHECK(object == user_policy_changed_event_.handle() || |
| 618 object == machine_policy_changed_event_.handle()) | 618 object == machine_policy_changed_event_.handle()) |
| 619 << "unexpected object signaled policy reload, obj = " << std::showbase | 619 << "unexpected object signaled policy reload, obj = " << std::showbase |
| 620 << std::hex << object; | 620 << std::hex << object; |
| 621 Reload(false); | 621 Reload(false); |
| 622 } | 622 } |
| 623 | 623 |
| 624 } // namespace policy | 624 } // namespace policy |
| OLD | NEW |