Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(320)

Side by Side Diff: chrome/browser/chromeos/policy/enrollment_handler_chromeos.h

Issue 465413002: Minor cleanup of EnrollmentHandlerChromeOS. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_ENROLLMENT_HANDLER_CHROMEOS_H_ 5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_ENROLLMENT_HANDLER_CHROMEOS_H_
6 #define CHROME_BROWSER_CHROMEOS_POLICY_ENROLLMENT_HANDLER_CHROMEOS_H_ 6 #define CHROME_BROWSER_CHROMEOS_POLICY_ENROLLMENT_HANDLER_CHROMEOS_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "base/basictypes.h" 10 #include "base/basictypes.h"
(...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after
114 STEP_ROBOT_AUTH_FETCH, // Fetching device API auth code. 114 STEP_ROBOT_AUTH_FETCH, // Fetching device API auth code.
115 STEP_ROBOT_AUTH_REFRESH, // Fetching device API refresh token. 115 STEP_ROBOT_AUTH_REFRESH, // Fetching device API refresh token.
116 STEP_LOCK_DEVICE, // Writing installation-time attributes. 116 STEP_LOCK_DEVICE, // Writing installation-time attributes.
117 STEP_STORE_TOKEN_AND_ID, // Storing DM token and virtual device ID. 117 STEP_STORE_TOKEN_AND_ID, // Storing DM token and virtual device ID.
118 STEP_STORE_ROBOT_AUTH, // Encrypting & writing robot refresh token. 118 STEP_STORE_ROBOT_AUTH, // Encrypting & writing robot refresh token.
119 STEP_STORE_POLICY, // Storing policy and API refresh token. 119 STEP_STORE_POLICY, // Storing policy and API refresh token.
120 STEP_FINISHED, // Enrollment process finished, no further action. 120 STEP_FINISHED, // Enrollment process finished, no further action.
121 }; 121 };
122 122
123 // Handles the response to a request for server-backed state keys. 123 // Handles the response to a request for server-backed state keys.
124 void CheckStateKeys(const std::vector<std::string>& state_keys); 124 void HandleStateKeysResult(const std::vector<std::string>& state_keys);
125 125
126 // Starts registration if the store is initialized. 126 // Starts registration if the store is initialized.
127 void AttemptRegistration(); 127 void StartRegistration();
128 128
129 // Handles the policy validation result, proceeding with installation-time 129 // Handles the policy validation result, proceeding with device lock if
130 // attributes locking if successful. 130 // successful.
131 void PolicyValidated(DeviceCloudPolicyValidator* validator); 131 void HandlePolicyValidationResult(DeviceCloudPolicyValidator* validator);
132 132
133 // Calls LockDevice() and proceeds to policy installation. If unsuccessful, 133 // Calls InstallAttributes::LockDevice() for enterprise enrollment and
134 // reports the result. Actual installation or error report will be done in 134 // DeviceSettingsService::SetManagementSettings() for consumer
135 // HandleLockDeviceResult(). 135 // enrollment.
136 void StartLockDevice(); 136 void StartLockDevice();
137 137
138 // Checks the status after SetManagementSettings() is done. Proceeds to 138 // Checks the status after SetManagementSettings() is done. Proceeds to
139 // robot auth code storing if successful. 139 // robot auth code storing if successful.
140 void OnSetManagementSettingsDone(); 140 void HandleSetManagementSettingsDone();
141 141
142 // Helper for StartLockDevice(). It performs the actual action based on 142 // Handle callback from InstallAttributes::LockDevice() and retry on failure.
143 // the result of LockDevice.
144 void HandleLockDeviceResult( 143 void HandleLockDeviceResult(
145 EnterpriseInstallAttributes::LockResult lock_result); 144 EnterpriseInstallAttributes::LockResult lock_result);
146 145
147 // Stores robot auth token. 146 // Initiates storing of robot auth token.
148 void StoreRobotAuth(); 147 void StartStoreRobotAuth();
149 148
150 // Handles completion of the robot token store operation. 149 // Handles completion of the robot token store operation.
151 void HandleRobotAuthTokenStored(bool result); 150 void HandleStoreRobotAuthTokenResult(bool result);
152 151
153 // Drops any ongoing actions. 152 // Drops any ongoing actions.
154 void Stop(); 153 void Stop();
155 154
156 // Reports the result of the enrollment process to the initiator. 155 // Reports the result of the enrollment process to the initiator.
157 void ReportResult(EnrollmentStatus status); 156 void ReportResult(EnrollmentStatus status);
158 157
159 DeviceCloudPolicyStoreChromeOS* store_; 158 DeviceCloudPolicyStoreChromeOS* store_;
160 EnterpriseInstallAttributes* install_attributes_; 159 EnterpriseInstallAttributes* install_attributes_;
161 ServerBackedStateKeysBroker* state_keys_broker_; 160 ServerBackedStateKeysBroker* state_keys_broker_;
(...skipping 29 matching lines...) Expand all
191 int lockbox_init_duration_; 190 int lockbox_init_duration_;
192 191
193 base::WeakPtrFactory<EnrollmentHandlerChromeOS> weak_ptr_factory_; 192 base::WeakPtrFactory<EnrollmentHandlerChromeOS> weak_ptr_factory_;
194 193
195 DISALLOW_COPY_AND_ASSIGN(EnrollmentHandlerChromeOS); 194 DISALLOW_COPY_AND_ASSIGN(EnrollmentHandlerChromeOS);
196 }; 195 };
197 196
198 } // namespace policy 197 } // namespace policy
199 198
200 #endif // CHROME_BROWSER_CHROMEOS_POLICY_ENROLLMENT_HANDLER_CHROMEOS_H_ 199 #endif // CHROME_BROWSER_CHROMEOS_POLICY_ENROLLMENT_HANDLER_CHROMEOS_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698