Index: chrome/browser/policy/profile_policy_connector.cc |
diff --git a/chrome/browser/policy/profile_policy_connector.cc b/chrome/browser/policy/profile_policy_connector.cc |
index 7529b44be9f9e00b3da32c86b1b0a08d94c6d6a8..72cd5b83e40886bfd2c0afe8a258411f6bd99d4c 100644 |
--- a/chrome/browser/policy/profile_policy_connector.cc |
+++ b/chrome/browser/policy/profile_policy_connector.cc |
@@ -20,11 +20,8 @@ |
#include "chrome/browser/chromeos/policy/device_local_account_policy_provider.h" |
#include "chrome/browser/chromeos/policy/login_profile_policy_provider.h" |
#include "chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos.h" |
-#include "chrome/browser/chromeos/policy/user_network_configuration_updater.h" |
#include "chrome/browser/policy/policy_service.h" |
#include "chrome/common/pref_names.h" |
-#include "chromeos/network/network_handler.h" |
-#include "chromeos/network/onc/onc_certificate_importer_impl.h" |
#else |
#include "chrome/browser/policy/cloud/user_cloud_policy_manager.h" |
#endif |
@@ -57,7 +54,6 @@ void ProfilePolicyConnector::Init( |
providers.push_back(user_cloud_policy_manager); |
#if defined(OS_CHROMEOS) |
- bool allow_trusted_certs_from_policy = false; |
if (!user) { |
// This case occurs for the signin profile. |
special_user_policy_provider_.reset( |
@@ -68,11 +64,6 @@ void ProfilePolicyConnector::Init( |
is_primary_user_ = user == chromeos::UserManager::Get()->GetPrimaryUser(); |
if (user->GetType() == chromeos::User::USER_TYPE_PUBLIC_ACCOUNT) |
InitializeDeviceLocalAccountPolicyProvider(user->email()); |
- // Allow trusted certs from policy only for managed regular accounts. |
- const bool is_managed = connector->GetUserAffiliation(user->email()) == |
- USER_AFFILIATION_MANAGED; |
- if (is_managed && user->GetType() == chromeos::User::USER_TYPE_REGULAR) |
- allow_trusted_certs_from_policy = true; |
} |
if (special_user_policy_provider_) |
providers.push_back(special_user_policy_provider_.get()); |
@@ -86,16 +77,6 @@ void ProfilePolicyConnector::Init( |
connector->SetUserPolicyDelegate(user_cloud_policy_manager); |
else if (special_user_policy_provider_) |
connector->SetUserPolicyDelegate(special_user_policy_provider_.get()); |
- |
- network_configuration_updater_ = |
- UserNetworkConfigurationUpdater::CreateForUserPolicy( |
- allow_trusted_certs_from_policy, |
- *user, |
- scoped_ptr<chromeos::onc::CertificateImporter>( |
- new chromeos::onc::CertificateImporterImpl), |
- policy_service(), |
- chromeos::NetworkHandler::Get() |
- ->managed_network_configuration_handler()); |
} |
#endif |
} |
@@ -108,30 +89,16 @@ void ProfilePolicyConnector::Shutdown() { |
#if defined(OS_CHROMEOS) |
if (is_primary_user_) |
g_browser_process->browser_policy_connector()->SetUserPolicyDelegate(NULL); |
- network_configuration_updater_.reset(); |
if (special_user_policy_provider_) |
special_user_policy_provider_->Shutdown(); |
#endif |
} |
#if defined(OS_CHROMEOS) |
-void ProfilePolicyConnector::SetPolicyCertVerifier( |
- PolicyCertVerifier* cert_verifier) { |
- if (network_configuration_updater_) |
- network_configuration_updater_->SetPolicyCertVerifier(cert_verifier); |
-} |
- |
base::Closure ProfilePolicyConnector::GetPolicyCertTrustedCallback() { |
return base::Bind(&ProfilePolicyConnector::SetUsedPolicyCertificatesOnce, |
weak_ptr_factory_.GetWeakPtr()); |
} |
- |
-void ProfilePolicyConnector::GetWebTrustedCertificates( |
- net::CertificateList* certs) const { |
- certs->clear(); |
- if (network_configuration_updater_) |
- network_configuration_updater_->GetWebTrustedCertificates(certs); |
-} |
#endif |
bool ProfilePolicyConnector::UsedPolicyCertificates() { |