Index: chrome/browser/policy/profile_policy_connector.cc |
diff --git a/chrome/browser/policy/profile_policy_connector.cc b/chrome/browser/policy/profile_policy_connector.cc |
index b45db05ac32f10b50a959b00a96543e9d3c15fa8..96812cc16b1ed1de3d68d94cf0eb471cb944bf7c 100644 |
--- a/chrome/browser/policy/profile_policy_connector.cc |
+++ b/chrome/browser/policy/profile_policy_connector.cc |
@@ -20,11 +20,8 @@ |
#include "chrome/browser/chromeos/login/user_manager.h" |
#include "chrome/browser/chromeos/policy/device_local_account_policy_provider.h" |
#include "chrome/browser/chromeos/policy/login_profile_policy_provider.h" |
-#include "chrome/browser/chromeos/policy/user_network_configuration_updater.h" |
#include "chrome/browser/policy/policy_service.h" |
#include "chrome/common/pref_names.h" |
-#include "chromeos/network/network_handler.h" |
-#include "chromeos/network/onc/onc_certificate_importer_impl.h" |
#endif |
namespace policy { |
@@ -55,7 +52,6 @@ void ProfilePolicyConnector::Init( |
providers.push_back(user_cloud_policy_manager); |
#if defined(OS_CHROMEOS) |
- bool allow_trusted_certs_from_policy = false; |
if (!user) { |
// This case occurs for the signin profile. |
special_user_policy_provider_.reset( |
@@ -66,11 +62,6 @@ void ProfilePolicyConnector::Init( |
is_primary_user_ = user == chromeos::UserManager::Get()->GetPrimaryUser(); |
if (user->GetType() == chromeos::User::USER_TYPE_PUBLIC_ACCOUNT) |
InitializeDeviceLocalAccountPolicyProvider(user->email()); |
- // Allow trusted certs from policy only for managed regular accounts. |
- const bool is_managed = connector->GetUserAffiliation(user->email()) == |
- USER_AFFILIATION_MANAGED; |
- if (is_managed && user->GetType() == chromeos::User::USER_TYPE_REGULAR) |
- allow_trusted_certs_from_policy = true; |
} |
if (special_user_policy_provider_) |
providers.push_back(special_user_policy_provider_.get()); |
@@ -84,16 +75,6 @@ void ProfilePolicyConnector::Init( |
connector->SetUserPolicyDelegate(user_cloud_policy_manager); |
else if (special_user_policy_provider_) |
connector->SetUserPolicyDelegate(special_user_policy_provider_.get()); |
- |
- network_configuration_updater_ = |
- UserNetworkConfigurationUpdater::CreateForUserPolicy( |
- allow_trusted_certs_from_policy, |
- *user, |
- scoped_ptr<chromeos::onc::CertificateImporter>( |
- new chromeos::onc::CertificateImporterImpl), |
- policy_service(), |
- chromeos::NetworkHandler::Get() |
- ->managed_network_configuration_handler()); |
} |
#endif |
} |
@@ -106,30 +87,16 @@ void ProfilePolicyConnector::Shutdown() { |
#if defined(OS_CHROMEOS) |
if (is_primary_user_) |
g_browser_process->browser_policy_connector()->SetUserPolicyDelegate(NULL); |
- network_configuration_updater_.reset(); |
if (special_user_policy_provider_) |
special_user_policy_provider_->Shutdown(); |
#endif |
} |
#if defined(OS_CHROMEOS) |
-void ProfilePolicyConnector::SetPolicyCertVerifier( |
- PolicyCertVerifier* cert_verifier) { |
- if (network_configuration_updater_) |
- network_configuration_updater_->SetPolicyCertVerifier(cert_verifier); |
-} |
- |
base::Closure ProfilePolicyConnector::GetPolicyCertTrustedCallback() { |
return base::Bind(&ProfilePolicyConnector::SetUsedPolicyCertificatesOnce, |
weak_ptr_factory_.GetWeakPtr()); |
} |
- |
-void ProfilePolicyConnector::GetWebTrustedCertificates( |
- net::CertificateList* certs) const { |
- certs->clear(); |
- if (network_configuration_updater_) |
- network_configuration_updater_->GetWebTrustedCertificates(certs); |
-} |
#endif |
bool ProfilePolicyConnector::UsedPolicyCertificates() { |