Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1076)

Side by Side Diff: chrome/browser/policy/profile_policy_connector.cc

Issue 53923004: policy: Make UserNetworkConfigurationUpdater a BCKS. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebased. Created 7 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/policy/profile_policy_connector.h" 5 #include "chrome/browser/policy/profile_policy_connector.h"
6 6
7 #include <vector> 7 #include <vector>
8 8
9 #include "base/logging.h" 9 #include "base/logging.h"
10 #include "chrome/browser/browser_process.h" 10 #include "chrome/browser/browser_process.h"
11 #include "chrome/browser/policy/browser_policy_connector.h" 11 #include "chrome/browser/policy/browser_policy_connector.h"
12 #include "chrome/browser/policy/configuration_policy_provider.h" 12 #include "chrome/browser/policy/configuration_policy_provider.h"
13 #include "chrome/browser/policy/policy_service.h" 13 #include "chrome/browser/policy/policy_service.h"
14 14
15 #if defined(OS_CHROMEOS) 15 #if defined(OS_CHROMEOS)
16 #include "base/bind.h" 16 #include "base/bind.h"
17 #include "base/prefs/pref_service.h" 17 #include "base/prefs/pref_service.h"
18 #include "chrome/browser/chromeos/login/user.h" 18 #include "chrome/browser/chromeos/login/user.h"
19 #include "chrome/browser/chromeos/login/user_manager.h" 19 #include "chrome/browser/chromeos/login/user_manager.h"
20 #include "chrome/browser/chromeos/policy/device_local_account_policy_provider.h" 20 #include "chrome/browser/chromeos/policy/device_local_account_policy_provider.h"
21 #include "chrome/browser/chromeos/policy/login_profile_policy_provider.h" 21 #include "chrome/browser/chromeos/policy/login_profile_policy_provider.h"
22 #include "chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos.h" 22 #include "chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos.h"
23 #include "chrome/browser/chromeos/policy/user_network_configuration_updater.h"
24 #include "chrome/browser/policy/policy_service.h" 23 #include "chrome/browser/policy/policy_service.h"
25 #include "chrome/common/pref_names.h" 24 #include "chrome/common/pref_names.h"
26 #include "chromeos/network/network_handler.h"
27 #include "chromeos/network/onc/onc_certificate_importer_impl.h"
28 #else 25 #else
29 #include "chrome/browser/policy/cloud/user_cloud_policy_manager.h" 26 #include "chrome/browser/policy/cloud/user_cloud_policy_manager.h"
30 #endif 27 #endif
31 28
32 namespace policy { 29 namespace policy {
33 30
34 ProfilePolicyConnector::ProfilePolicyConnector(Profile* profile) 31 ProfilePolicyConnector::ProfilePolicyConnector(Profile* profile)
35 : 32 :
36 #if defined(OS_CHROMEOS) 33 #if defined(OS_CHROMEOS)
37 is_primary_user_(false), 34 is_primary_user_(false),
(...skipping 12 matching lines...) Expand all
50 BrowserPolicyConnector* connector = 47 BrowserPolicyConnector* connector =
51 g_browser_process->browser_policy_connector(); 48 g_browser_process->browser_policy_connector();
52 // |providers| contains a list of the policy providers available for the 49 // |providers| contains a list of the policy providers available for the
53 // PolicyService of this connector. 50 // PolicyService of this connector.
54 std::vector<ConfigurationPolicyProvider*> providers; 51 std::vector<ConfigurationPolicyProvider*> providers;
55 52
56 if (user_cloud_policy_manager) 53 if (user_cloud_policy_manager)
57 providers.push_back(user_cloud_policy_manager); 54 providers.push_back(user_cloud_policy_manager);
58 55
59 #if defined(OS_CHROMEOS) 56 #if defined(OS_CHROMEOS)
60 bool allow_trusted_certs_from_policy = false;
61 if (!user) { 57 if (!user) {
62 // This case occurs for the signin profile. 58 // This case occurs for the signin profile.
63 special_user_policy_provider_.reset( 59 special_user_policy_provider_.reset(
64 new LoginProfilePolicyProvider(connector->GetPolicyService())); 60 new LoginProfilePolicyProvider(connector->GetPolicyService()));
65 special_user_policy_provider_->Init(); 61 special_user_policy_provider_->Init();
66 } else { 62 } else {
67 // |user| should never be NULL except for the signin profile. 63 // |user| should never be NULL except for the signin profile.
68 is_primary_user_ = user == chromeos::UserManager::Get()->GetPrimaryUser(); 64 is_primary_user_ = user == chromeos::UserManager::Get()->GetPrimaryUser();
69 if (user->GetType() == chromeos::User::USER_TYPE_PUBLIC_ACCOUNT) 65 if (user->GetType() == chromeos::User::USER_TYPE_PUBLIC_ACCOUNT)
70 InitializeDeviceLocalAccountPolicyProvider(user->email()); 66 InitializeDeviceLocalAccountPolicyProvider(user->email());
71 // Allow trusted certs from policy only for managed regular accounts.
72 const bool is_managed = connector->GetUserAffiliation(user->email()) ==
73 USER_AFFILIATION_MANAGED;
74 if (is_managed && user->GetType() == chromeos::User::USER_TYPE_REGULAR)
75 allow_trusted_certs_from_policy = true;
76 } 67 }
77 if (special_user_policy_provider_) 68 if (special_user_policy_provider_)
78 providers.push_back(special_user_policy_provider_.get()); 69 providers.push_back(special_user_policy_provider_.get());
79 #endif 70 #endif
80 71
81 policy_service_ = connector->CreatePolicyService(providers); 72 policy_service_ = connector->CreatePolicyService(providers);
82 73
83 #if defined(OS_CHROMEOS) 74 #if defined(OS_CHROMEOS)
84 if (is_primary_user_) { 75 if (is_primary_user_) {
85 if (user_cloud_policy_manager) 76 if (user_cloud_policy_manager)
86 connector->SetUserPolicyDelegate(user_cloud_policy_manager); 77 connector->SetUserPolicyDelegate(user_cloud_policy_manager);
87 else if (special_user_policy_provider_) 78 else if (special_user_policy_provider_)
88 connector->SetUserPolicyDelegate(special_user_policy_provider_.get()); 79 connector->SetUserPolicyDelegate(special_user_policy_provider_.get());
89
90 network_configuration_updater_ =
91 UserNetworkConfigurationUpdater::CreateForUserPolicy(
92 allow_trusted_certs_from_policy,
93 *user,
94 scoped_ptr<chromeos::onc::CertificateImporter>(
95 new chromeos::onc::CertificateImporterImpl),
96 policy_service(),
97 chromeos::NetworkHandler::Get()
98 ->managed_network_configuration_handler());
99 } 80 }
100 #endif 81 #endif
101 } 82 }
102 83
103 void ProfilePolicyConnector::InitForTesting(scoped_ptr<PolicyService> service) { 84 void ProfilePolicyConnector::InitForTesting(scoped_ptr<PolicyService> service) {
104 policy_service_ = service.Pass(); 85 policy_service_ = service.Pass();
105 } 86 }
106 87
107 void ProfilePolicyConnector::Shutdown() { 88 void ProfilePolicyConnector::Shutdown() {
108 #if defined(OS_CHROMEOS) 89 #if defined(OS_CHROMEOS)
109 if (is_primary_user_) 90 if (is_primary_user_)
110 g_browser_process->browser_policy_connector()->SetUserPolicyDelegate(NULL); 91 g_browser_process->browser_policy_connector()->SetUserPolicyDelegate(NULL);
111 network_configuration_updater_.reset();
112 if (special_user_policy_provider_) 92 if (special_user_policy_provider_)
113 special_user_policy_provider_->Shutdown(); 93 special_user_policy_provider_->Shutdown();
114 #endif 94 #endif
115 } 95 }
116 96
117 #if defined(OS_CHROMEOS) 97 #if defined(OS_CHROMEOS)
118 void ProfilePolicyConnector::SetPolicyCertVerifier(
119 PolicyCertVerifier* cert_verifier) {
120 if (network_configuration_updater_)
121 network_configuration_updater_->SetPolicyCertVerifier(cert_verifier);
122 }
123
124 base::Closure ProfilePolicyConnector::GetPolicyCertTrustedCallback() { 98 base::Closure ProfilePolicyConnector::GetPolicyCertTrustedCallback() {
125 return base::Bind(&ProfilePolicyConnector::SetUsedPolicyCertificatesOnce, 99 return base::Bind(&ProfilePolicyConnector::SetUsedPolicyCertificatesOnce,
126 weak_ptr_factory_.GetWeakPtr()); 100 weak_ptr_factory_.GetWeakPtr());
127 } 101 }
128
129 void ProfilePolicyConnector::GetWebTrustedCertificates(
130 net::CertificateList* certs) const {
131 certs->clear();
132 if (network_configuration_updater_)
133 network_configuration_updater_->GetWebTrustedCertificates(certs);
134 }
135 #endif 102 #endif
136 103
137 bool ProfilePolicyConnector::UsedPolicyCertificates() { 104 bool ProfilePolicyConnector::UsedPolicyCertificates() {
138 #if defined(OS_CHROMEOS) 105 #if defined(OS_CHROMEOS)
139 return profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce); 106 return profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce);
140 #else 107 #else
141 return false; 108 return false;
142 #endif 109 #endif
143 } 110 }
144 111
(...skipping 10 matching lines...) Expand all
155 connector->GetDeviceLocalAccountPolicyService(); 122 connector->GetDeviceLocalAccountPolicyService();
156 if (!device_local_account_policy_service) 123 if (!device_local_account_policy_service)
157 return; 124 return;
158 special_user_policy_provider_.reset(new DeviceLocalAccountPolicyProvider( 125 special_user_policy_provider_.reset(new DeviceLocalAccountPolicyProvider(
159 username, device_local_account_policy_service)); 126 username, device_local_account_policy_service));
160 special_user_policy_provider_->Init(); 127 special_user_policy_provider_->Init();
161 } 128 }
162 #endif 129 #endif
163 130
164 } // namespace policy 131 } // namespace policy
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698