Chromium Code Reviews| Index: chrome/browser/supervised_user/supervised_user_sync_service.cc |
| diff --git a/chrome/browser/managed_mode/managed_user_sync_service.cc b/chrome/browser/supervised_user/supervised_user_sync_service.cc |
| similarity index 66% |
| rename from chrome/browser/managed_mode/managed_user_sync_service.cc |
| rename to chrome/browser/supervised_user/supervised_user_sync_service.cc |
| index d41582a15f6e2ff25fdc7c6bb80b19021c41d250..77eecf1b9ccc4a026cbb807aa05762a2f467e296 100644 |
| --- a/chrome/browser/managed_mode/managed_user_sync_service.cc |
| +++ b/chrome/browser/supervised_user/supervised_user_sync_service.cc |
| @@ -2,7 +2,7 @@ |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| -#include "chrome/browser/managed_mode/managed_user_sync_service.h" |
| +#include "chrome/browser/supervised_user/supervised_user_sync_service.h" |
| #include "base/bind.h" |
| #include "base/callback.h" |
| @@ -82,20 +82,21 @@ SyncData CreateSyncDataFromDictionaryEntry(const std::string& id, |
| bool success = value.GetAsDictionary(&dict); |
| DCHECK(success); |
| bool acknowledged = false; |
| - dict->GetBoolean(ManagedUserSyncService::kAcknowledged, &acknowledged); |
| + dict->GetBoolean(SupervisedUserSyncService::kAcknowledged, &acknowledged); |
| std::string name; |
| - dict->GetString(ManagedUserSyncService::kName, &name); |
| + dict->GetString(SupervisedUserSyncService::kName, &name); |
| DCHECK(!name.empty()); |
| std::string master_key; |
| - dict->GetString(ManagedUserSyncService::kMasterKey, &master_key); |
| + dict->GetString(SupervisedUserSyncService::kMasterKey, &master_key); |
| std::string chrome_avatar; |
| - dict->GetString(ManagedUserSyncService::kChromeAvatar, &chrome_avatar); |
| + dict->GetString(SupervisedUserSyncService::kChromeAvatar, &chrome_avatar); |
| std::string chromeos_avatar; |
| - dict->GetString(ManagedUserSyncService::kChromeOsAvatar, &chromeos_avatar); |
| + dict->GetString(SupervisedUserSyncService::kChromeOsAvatar, &chromeos_avatar); |
| std::string signature; |
| - dict->GetString(ManagedUserSyncService::kPasswordSignatureKey, &signature); |
| + dict->GetString(SupervisedUserSyncService::kPasswordSignatureKey, &signature); |
| std::string encryption; |
| - dict->GetString(ManagedUserSyncService::kPasswordEncryptionKey, &encryption); |
| + dict->GetString(SupervisedUserSyncService::kPasswordEncryptionKey, |
| + &encryption); |
| return CreateLocalSyncData(id, |
| name, |
| @@ -109,39 +110,39 @@ SyncData CreateSyncDataFromDictionaryEntry(const std::string& id, |
| } // namespace |
| -const char ManagedUserSyncService::kAcknowledged[] = "acknowledged"; |
| -const char ManagedUserSyncService::kChromeAvatar[] = "chromeAvatar"; |
| -const char ManagedUserSyncService::kChromeOsAvatar[] = "chromeOsAvatar"; |
| -const char ManagedUserSyncService::kMasterKey[] = "masterKey"; |
| -const char ManagedUserSyncService::kName[] = "name"; |
| -const char ManagedUserSyncService::kPasswordSignatureKey[] = |
| +const char SupervisedUserSyncService::kAcknowledged[] = "acknowledged"; |
| +const char SupervisedUserSyncService::kChromeAvatar[] = "chromeAvatar"; |
| +const char SupervisedUserSyncService::kChromeOsAvatar[] = "chromeOsAvatar"; |
| +const char SupervisedUserSyncService::kMasterKey[] = "masterKey"; |
| +const char SupervisedUserSyncService::kName[] = "name"; |
| +const char SupervisedUserSyncService::kPasswordSignatureKey[] = |
| "passwordSignatureKey"; |
| -const char ManagedUserSyncService::kPasswordEncryptionKey[] = |
| +const char SupervisedUserSyncService::kPasswordEncryptionKey[] = |
| "passwordEncryptionKey"; |
| -const int ManagedUserSyncService::kNoAvatar = -100; |
| +const int SupervisedUserSyncService::kNoAvatar = -100; |
| -ManagedUserSyncService::ManagedUserSyncService(PrefService* prefs) |
| +SupervisedUserSyncService::SupervisedUserSyncService(PrefService* prefs) |
| : prefs_(prefs) { |
| pref_change_registrar_.Init(prefs_); |
| pref_change_registrar_.Add( |
| prefs::kGoogleServicesLastUsername, |
| - base::Bind(&ManagedUserSyncService::OnLastSignedInUsernameChange, |
| + base::Bind(&SupervisedUserSyncService::OnLastSignedInUsernameChange, |
| base::Unretained(this))); |
| } |
| -ManagedUserSyncService::~ManagedUserSyncService() { |
| +SupervisedUserSyncService::~SupervisedUserSyncService() { |
| } |
| // static |
| -void ManagedUserSyncService::RegisterProfilePrefs( |
| +void SupervisedUserSyncService::RegisterProfilePrefs( |
| PrefRegistrySyncable* registry) { |
| registry->RegisterDictionaryPref(prefs::kSupervisedUsers, |
| PrefRegistrySyncable::UNSYNCABLE_PREF); |
| } |
| // static |
| -bool ManagedUserSyncService::GetAvatarIndex(const std::string& avatar_str, |
| - int* avatar_index) { |
| +bool SupervisedUserSyncService::GetAvatarIndex(const std::string& avatar_str, |
| + int* avatar_index) { |
| DCHECK(avatar_index); |
| if (avatar_str.empty()) { |
| *avatar_index = kNoAvatar; |
| @@ -183,7 +184,7 @@ bool ManagedUserSyncService::GetAvatarIndex(const std::string& avatar_str, |
| } |
| // static |
| -std::string ManagedUserSyncService::BuildAvatarString(int avatar_index) { |
| +std::string SupervisedUserSyncService::BuildAvatarString(int avatar_index) { |
| #if defined(OS_CHROMEOS) |
| const char* prefix = kChromeOSAvatarPrefix; |
| #else |
| @@ -192,17 +193,17 @@ std::string ManagedUserSyncService::BuildAvatarString(int avatar_index) { |
| return base::StringPrintf("%s%d", prefix, avatar_index); |
| } |
| -void ManagedUserSyncService::AddObserver( |
| - ManagedUserSyncServiceObserver* observer) { |
| +void SupervisedUserSyncService::AddObserver( |
| + SupervisedUserSyncServiceObserver* observer) { |
| observers_.AddObserver(observer); |
| } |
| -void ManagedUserSyncService::RemoveObserver( |
| - ManagedUserSyncServiceObserver* observer) { |
| +void SupervisedUserSyncService::RemoveObserver( |
| + SupervisedUserSyncServiceObserver* observer) { |
| observers_.RemoveObserver(observer); |
| } |
| -scoped_ptr<base::DictionaryValue> ManagedUserSyncService::CreateDictionary( |
| +scoped_ptr<base::DictionaryValue> SupervisedUserSyncService::CreateDictionary( |
| const std::string& name, |
| const std::string& master_key, |
| const std::string& signature_key, |
| @@ -227,38 +228,39 @@ scoped_ptr<base::DictionaryValue> ManagedUserSyncService::CreateDictionary( |
| return result.Pass(); |
| } |
| -void ManagedUserSyncService::AddManagedUser(const std::string& id, |
| - const std::string& name, |
| - const std::string& master_key, |
| - const std::string& signature_key, |
| - const std::string& encryption_key, |
| - int avatar_index) { |
| - UpdateManagedUserImpl(id, |
| - name, |
| - master_key, |
| - signature_key, |
| - encryption_key, |
| - avatar_index, |
| - true /* add */); |
| +void SupervisedUserSyncService::AddSupervisedUser( |
| + const std::string& id, |
| + const std::string& name, |
| + const std::string& master_key, |
| + const std::string& signature_key, |
|
Pam (message me for reviews)
2014/06/16 23:51:51
FWIW, the header has these as password_signature_k
|
| + const std::string& encryption_key, |
| + int avatar_index) { |
| + UpdateSupervisedUserImpl(id, |
| + name, |
| + master_key, |
| + signature_key, |
| + encryption_key, |
| + avatar_index, |
| + true /* add */); |
| } |
| -void ManagedUserSyncService::UpdateManagedUser( |
| +void SupervisedUserSyncService::UpdateSupervisedUser( |
| const std::string& id, |
| const std::string& name, |
| const std::string& master_key, |
| const std::string& signature_key, |
| const std::string& encryption_key, |
| int avatar_index) { |
| - UpdateManagedUserImpl(id, |
| - name, |
| - master_key, |
| - signature_key, |
| - encryption_key, |
| - avatar_index, |
| - false /* update */); |
| + UpdateSupervisedUserImpl(id, |
| + name, |
| + master_key, |
| + signature_key, |
| + encryption_key, |
| + avatar_index, |
| + false /* update */); |
| } |
| -void ManagedUserSyncService::UpdateManagedUserImpl( |
| +void SupervisedUserSyncService::UpdateSupervisedUserImpl( |
| const std::string& id, |
| const std::string& name, |
| const std::string& master_key, |
| @@ -289,7 +291,7 @@ void ManagedUserSyncService::UpdateManagedUserImpl( |
| DCHECK(!error.IsSet()) << error.ToString(); |
| } |
| -void ManagedUserSyncService::DeleteManagedUser(const std::string& id) { |
| +void SupervisedUserSyncService::DeleteSupervisedUser(const std::string& id) { |
| DictionaryPrefUpdate update(prefs_, prefs::kSupervisedUsers); |
| bool success = update->RemoveWithoutPathExpansion(id, NULL); |
| DCHECK(success); |
| @@ -307,12 +309,12 @@ void ManagedUserSyncService::DeleteManagedUser(const std::string& id) { |
| DCHECK(!sync_error.IsSet()); |
| } |
| -const base::DictionaryValue* ManagedUserSyncService::GetManagedUsers() { |
| +const base::DictionaryValue* SupervisedUserSyncService::GetSupervisedUsers() { |
| DCHECK(sync_processor_); |
| return prefs_->GetDictionary(prefs::kSupervisedUsers); |
| } |
| -bool ManagedUserSyncService::UpdateManagedUserAvatarIfNeeded( |
| +bool SupervisedUserSyncService::UpdateSupervisedUserAvatarIfNeeded( |
| const std::string& id, |
| int avatar_index) { |
| DictionaryPrefUpdate update(prefs_, prefs::kSupervisedUsers); |
| @@ -323,19 +325,22 @@ bool ManagedUserSyncService::UpdateManagedUserAvatarIfNeeded( |
| DCHECK(success); |
| bool acknowledged = false; |
| - value->GetBoolean(ManagedUserSyncService::kAcknowledged, &acknowledged); |
| + value->GetBoolean(SupervisedUserSyncService::kAcknowledged, &acknowledged); |
| std::string name; |
| - value->GetString(ManagedUserSyncService::kName, &name); |
| + value->GetString(SupervisedUserSyncService::kName, &name); |
| std::string master_key; |
| - value->GetString(ManagedUserSyncService::kMasterKey, &master_key); |
| + value->GetString(SupervisedUserSyncService::kMasterKey, &master_key); |
| std::string signature; |
| - value->GetString(ManagedUserSyncService::kPasswordSignatureKey, &signature); |
| + value->GetString(SupervisedUserSyncService::kPasswordSignatureKey, |
| + &signature); |
| std::string encryption; |
| - value->GetString(ManagedUserSyncService::kPasswordEncryptionKey, &encryption); |
| + value->GetString(SupervisedUserSyncService::kPasswordEncryptionKey, |
| + &encryption); |
| std::string chromeos_avatar; |
| - value->GetString(ManagedUserSyncService::kChromeOsAvatar, &chromeos_avatar); |
| + value->GetString(SupervisedUserSyncService::kChromeOsAvatar, |
| + &chromeos_avatar); |
| std::string chrome_avatar; |
| - value->GetString(ManagedUserSyncService::kChromeAvatar, &chrome_avatar); |
| + value->GetString(SupervisedUserSyncService::kChromeAvatar, &chrome_avatar); |
| // The following check is just for safety. We want to avoid that the existing |
| // avatar selection is overwritten. Currently we don't allow the user to |
| // choose a different avatar in the recreation dialog, anyway, if there is |
| @@ -372,16 +377,17 @@ bool ManagedUserSyncService::UpdateManagedUserAvatarIfNeeded( |
| return true; |
| } |
| -void ManagedUserSyncService::ClearManagedUserAvatar(const std::string& id) { |
| - bool cleared = UpdateManagedUserAvatarIfNeeded(id, kNoAvatar); |
| +void SupervisedUserSyncService::ClearSupervisedUserAvatar( |
| + const std::string& id) { |
| + bool cleared = UpdateSupervisedUserAvatarIfNeeded(id, kNoAvatar); |
| DCHECK(cleared); |
| } |
| -void ManagedUserSyncService::GetManagedUsersAsync( |
| - const ManagedUsersCallback& callback) { |
| +void SupervisedUserSyncService::GetSupervisedUsersAsync( |
| + const SupervisedUsersCallback& callback) { |
| // If we are already syncing, just run the callback. |
| if (sync_processor_) { |
| - callback.Run(GetManagedUsers()); |
| + callback.Run(GetSupervisedUsers()); |
| return; |
| } |
| @@ -389,11 +395,11 @@ void ManagedUserSyncService::GetManagedUsersAsync( |
| callbacks_.push_back(callback); |
| } |
| -void ManagedUserSyncService::Shutdown() { |
| - NotifyManagedUsersSyncingStopped(); |
| +void SupervisedUserSyncService::Shutdown() { |
| + NotifySupervisedUsersSyncingStopped(); |
| } |
| -SyncMergeResult ManagedUserSyncService::MergeDataAndStartSyncing( |
| +SyncMergeResult SupervisedUserSyncService::MergeDataAndStartSyncing( |
| ModelType type, |
| const SyncDataList& initial_sync_data, |
| scoped_ptr<SyncChangeProcessor> sync_processor, |
| @@ -414,24 +420,24 @@ SyncMergeResult ManagedUserSyncService::MergeDataAndStartSyncing( |
| for (SyncDataList::const_iterator it = initial_sync_data.begin(); |
| it != initial_sync_data.end(); ++it) { |
| DCHECK_EQ(SUPERVISED_USERS, it->GetDataType()); |
| - const ManagedUserSpecifics& managed_user = |
| + const ManagedUserSpecifics& supervised_user = |
| it->GetSpecifics().managed_user(); |
| base::DictionaryValue* value = new base::DictionaryValue(); |
| - value->SetString(kName, managed_user.name()); |
| - value->SetBoolean(kAcknowledged, managed_user.acknowledged()); |
| - value->SetString(kMasterKey, managed_user.master_key()); |
| - value->SetString(kChromeAvatar, managed_user.chrome_avatar()); |
| - value->SetString(kChromeOsAvatar, managed_user.chromeos_avatar()); |
| + value->SetString(kName, supervised_user.name()); |
| + value->SetBoolean(kAcknowledged, supervised_user.acknowledged()); |
| + value->SetString(kMasterKey, supervised_user.master_key()); |
| + value->SetString(kChromeAvatar, supervised_user.chrome_avatar()); |
| + value->SetString(kChromeOsAvatar, supervised_user.chromeos_avatar()); |
| value->SetString(kPasswordSignatureKey, |
| - managed_user.password_signature_key()); |
| + supervised_user.password_signature_key()); |
| value->SetString(kPasswordEncryptionKey, |
| - managed_user.password_encryption_key()); |
| - if (dict->HasKey(managed_user.id())) |
| + supervised_user.password_encryption_key()); |
| + if (dict->HasKey(supervised_user.id())) |
| num_items_modified++; |
| else |
| num_items_added++; |
| - dict->SetWithoutPathExpansion(managed_user.id(), value); |
| - seen_ids.insert(managed_user.id()); |
| + dict->SetWithoutPathExpansion(supervised_user.id(), value); |
| + seen_ids.insert(supervised_user.id()); |
| } |
| for (base::DictionaryValue::Iterator it(*dict); !it.IsAtEnd(); it.Advance()) { |
| @@ -454,16 +460,16 @@ SyncMergeResult ManagedUserSyncService::MergeDataAndStartSyncing( |
| return result; |
| } |
| -void ManagedUserSyncService::StopSyncing(ModelType type) { |
| +void SupervisedUserSyncService::StopSyncing(ModelType type) { |
| DCHECK_EQ(SUPERVISED_USERS, type); |
| // The observers may want to change the Sync data, so notify them before |
| // resetting the |sync_processor_|. |
| - NotifyManagedUsersSyncingStopped(); |
| + NotifySupervisedUsersSyncingStopped(); |
| sync_processor_.reset(); |
| error_handler_.reset(); |
| } |
| -SyncDataList ManagedUserSyncService::GetAllSyncData( |
| +SyncDataList SupervisedUserSyncService::GetAllSyncData( |
| ModelType type) const { |
| SyncDataList data; |
| DictionaryPrefUpdate update(prefs_, prefs::kSupervisedUsers); |
| @@ -474,7 +480,7 @@ SyncDataList ManagedUserSyncService::GetAllSyncData( |
| return data; |
| } |
| -SyncError ManagedUserSyncService::ProcessSyncChanges( |
| +SyncError SupervisedUserSyncService::ProcessSyncChanges( |
| const tracked_objects::Location& from_here, |
| const SyncChangeList& change_list) { |
| SyncError error; |
| @@ -484,45 +490,46 @@ SyncError ManagedUserSyncService::ProcessSyncChanges( |
| it != change_list.end(); ++it) { |
| SyncData data = it->sync_data(); |
| DCHECK_EQ(SUPERVISED_USERS, data.GetDataType()); |
| - const ManagedUserSpecifics& managed_user = |
| + const ManagedUserSpecifics& supervised_user = |
| data.GetSpecifics().managed_user(); |
| switch (it->change_type()) { |
| case SyncChange::ACTION_ADD: |
| case SyncChange::ACTION_UPDATE: { |
| // Every item we get from the server should be acknowledged. |
| - DCHECK(managed_user.acknowledged()); |
| + DCHECK(supervised_user.acknowledged()); |
| const base::DictionaryValue* old_value = NULL; |
| - dict->GetDictionaryWithoutPathExpansion(managed_user.id(), &old_value); |
| + dict->GetDictionaryWithoutPathExpansion(supervised_user.id(), |
| + &old_value); |
| - // For an update action, the managed user should already exist, for an |
| - // add action, it should not. |
| + // For an update action, the supervised user should already exist, for |
| + // an add action, it should not. |
| DCHECK_EQ( |
| old_value ? SyncChange::ACTION_UPDATE : SyncChange::ACTION_ADD, |
| it->change_type()); |
| - // If the managed user switched from unacknowledged to acknowledged, |
| + // If the supervised user switched from unacknowledged to acknowledged, |
| // we might need to continue with a registration. |
| if (old_value && !old_value->HasKey(kAcknowledged)) |
| - NotifyManagedUserAcknowledged(managed_user.id()); |
| + NotifySupervisedUserAcknowledged(supervised_user.id()); |
| base::DictionaryValue* value = new base::DictionaryValue; |
| - value->SetString(kName, managed_user.name()); |
| - value->SetBoolean(kAcknowledged, managed_user.acknowledged()); |
| - value->SetString(kMasterKey, managed_user.master_key()); |
| - value->SetString(kChromeAvatar, managed_user.chrome_avatar()); |
| - value->SetString(kChromeOsAvatar, managed_user.chromeos_avatar()); |
| + value->SetString(kName, supervised_user.name()); |
| + value->SetBoolean(kAcknowledged, supervised_user.acknowledged()); |
| + value->SetString(kMasterKey, supervised_user.master_key()); |
| + value->SetString(kChromeAvatar, supervised_user.chrome_avatar()); |
| + value->SetString(kChromeOsAvatar, supervised_user.chromeos_avatar()); |
| value->SetString(kPasswordSignatureKey, |
| - managed_user.password_signature_key()); |
| + supervised_user.password_signature_key()); |
| value->SetString(kPasswordEncryptionKey, |
| - managed_user.password_encryption_key()); |
| - dict->SetWithoutPathExpansion(managed_user.id(), value); |
| + supervised_user.password_encryption_key()); |
| + dict->SetWithoutPathExpansion(supervised_user.id(), value); |
| - NotifyManagedUsersChanged(); |
| + NotifySupervisedUsersChanged(); |
| break; |
| } |
| case SyncChange::ACTION_DELETE: { |
| - DCHECK(dict->HasKey(managed_user.id())) << managed_user.id(); |
| - dict->RemoveWithoutPathExpansion(managed_user.id(), NULL); |
| + DCHECK(dict->HasKey(supervised_user.id())) << supervised_user.id(); |
| + dict->RemoveWithoutPathExpansion(supervised_user.id(), NULL); |
| break; |
| } |
| case SyncChange::ACTION_INVALID: { |
| @@ -534,37 +541,37 @@ SyncError ManagedUserSyncService::ProcessSyncChanges( |
| return error; |
| } |
| -void ManagedUserSyncService::OnLastSignedInUsernameChange() { |
| +void SupervisedUserSyncService::OnLastSignedInUsernameChange() { |
| DCHECK(!sync_processor_); |
| - // If the last signed in user changes, we clear all data, to avoid managed |
| + // If the last signed in user changes, we clear all data, to avoid supervised |
| // users from one custodian appearing in another one's profile. |
| prefs_->ClearPref(prefs::kSupervisedUsers); |
| } |
| -void ManagedUserSyncService::NotifyManagedUserAcknowledged( |
| - const std::string& managed_user_id) { |
| - FOR_EACH_OBSERVER(ManagedUserSyncServiceObserver, observers_, |
| - OnManagedUserAcknowledged(managed_user_id)); |
| +void SupervisedUserSyncService::NotifySupervisedUserAcknowledged( |
| + const std::string& supervised_user_id) { |
| + FOR_EACH_OBSERVER(SupervisedUserSyncServiceObserver, observers_, |
| + OnSupervisedUserAcknowledged(supervised_user_id)); |
| } |
| -void ManagedUserSyncService::NotifyManagedUsersSyncingStopped() { |
| - FOR_EACH_OBSERVER(ManagedUserSyncServiceObserver, observers_, |
| - OnManagedUsersSyncingStopped()); |
| +void SupervisedUserSyncService::NotifySupervisedUsersSyncingStopped() { |
| + FOR_EACH_OBSERVER(SupervisedUserSyncServiceObserver, observers_, |
| + OnSupervisedUsersSyncingStopped()); |
| } |
| -void ManagedUserSyncService::NotifyManagedUsersChanged() { |
| - FOR_EACH_OBSERVER(ManagedUserSyncServiceObserver, |
| +void SupervisedUserSyncService::NotifySupervisedUsersChanged() { |
| + FOR_EACH_OBSERVER(SupervisedUserSyncServiceObserver, |
| observers_, |
| - OnManagedUsersChanged()); |
| + OnSupervisedUsersChanged()); |
| } |
| -void ManagedUserSyncService::DispatchCallbacks() { |
| - const base::DictionaryValue* managed_users = |
| +void SupervisedUserSyncService::DispatchCallbacks() { |
| + const base::DictionaryValue* supervised_users = |
| prefs_->GetDictionary(prefs::kSupervisedUsers); |
| - for (std::vector<ManagedUsersCallback>::iterator it = callbacks_.begin(); |
| + for (std::vector<SupervisedUsersCallback>::iterator it = callbacks_.begin(); |
| it != callbacks_.end(); ++it) { |
| - it->Run(managed_users); |
| + it->Run(supervised_users); |
| } |
| callbacks_.clear(); |
| } |