Index: chromeos/network/onc/onc_certificate_importer_impl.h |
diff --git a/chromeos/network/onc/onc_certificate_importer_impl.h b/chromeos/network/onc/onc_certificate_importer_impl.h |
index 079cd88ecf7d38714bdb2500ea16bc4094142f73..36bc413ae910ad4a5f8c30251c9393697211dea7 100644 |
--- a/chromeos/network/onc/onc_certificate_importer_impl.h |
+++ b/chromeos/network/onc/onc_certificate_importer_impl.h |
@@ -12,7 +12,6 @@ |
#include "base/basictypes.h" |
#include "base/memory/ref_counted.h" |
#include "base/memory/scoped_ptr.h" |
-#include "base/memory/weak_ptr.h" |
#include "chromeos/chromeos_export.h" |
#include "chromeos/network/onc/onc_certificate_importer.h" |
#include "components/onc/onc_constants.h" |
@@ -20,8 +19,6 @@ |
namespace base { |
class DictionaryValue; |
class ListValue; |
-class SequencedTaskRunner; |
-class SingleThreadTaskRunner; |
} |
namespace net { |
@@ -34,36 +31,34 @@ |
namespace onc { |
// This class handles certificate imports from ONC (both policy and user |
-// imports) into a certificate store. The GUID of Client certificates is stored |
-// together with the certificate as Nickname. In contrast, Server and CA |
+// imports) into the certificate store. The GUID of Client certificates is |
+// stored together with the certificate as Nickname. In contrast, Server and CA |
// certificates are identified by their PEM and not by GUID. |
// TODO(pneubeck): Replace Nickname by PEM for Client |
// certificates. http://crbug.com/252119 |
class CHROMEOS_EXPORT CertificateImporterImpl : public CertificateImporter { |
public: |
- // |io_task_runner| will be used for NSSCertDatabase accesses. |
- CertificateImporterImpl( |
- const scoped_refptr<base::SequencedTaskRunner>& io_task_runner, |
- net::NSSCertDatabase* target_nssdb_); |
- virtual ~CertificateImporterImpl(); |
+ typedef std::map<std::string, scoped_refptr<net::X509Certificate> > |
+ CertsByGUID; |
+ |
+ explicit CertificateImporterImpl(net::NSSCertDatabase* target_nssdb_); |
// CertificateImporter overrides |
- virtual void ImportCertificates(const base::ListValue& certificates, |
- ::onc::ONCSource source, |
- const DoneCallback& done_callback) OVERRIDE; |
+ virtual bool ImportCertificates( |
+ const base::ListValue& certificates, |
+ ::onc::ONCSource source, |
+ net::CertificateList* onc_trusted_certificates) OVERRIDE; |
+ |
+ // This implements ImportCertificates. Additionally, if |
+ // |imported_server_and_ca_certs| is not NULL, it will be filled with the |
+ // (GUID, Certificate) pairs of all succesfully imported Server and CA |
+ // certificates. |
+ bool ParseAndStoreCertificates(bool allow_trust_imports, |
+ const base::ListValue& onc_certificates, |
+ net::CertificateList* onc_trusted_certificates, |
+ CertsByGUID* imported_server_and_ca_certs); |
private: |
- void RunDoneCallback(const CertificateImporter::DoneCallback& callback, |
- bool success, |
- const net::CertificateList& onc_trusted_certificates); |
- |
- // This is the synchronous implementation of ImportCertificates. It is |
- // executed on the given |io_task_runner_|. |
- static void ParseAndStoreCertificates(::onc::ONCSource source, |
- const DoneCallback& done_callback, |
- base::ListValue* certificates, |
- net::NSSCertDatabase* nssdb); |
- |
// Lists the certificates that have the string |label| as their certificate |
// nickname (exact match). |
static void ListCertsWithNickname(const std::string& label, |
@@ -77,35 +72,29 @@ |
// Parses and stores/removes |certificate| in/from the certificate |
// store. Returns true if the operation succeeded. |
- static bool ParseAndStoreCertificate( |
+ bool ParseAndStoreCertificate( |
bool allow_trust_imports, |
const base::DictionaryValue& certificate, |
- net::NSSCertDatabase* nssdb, |
- net::CertificateList* onc_trusted_certificates); |
+ net::CertificateList* onc_trusted_certificates, |
+ CertsByGUID* imported_server_and_ca_certs); |
// Imports the Server or CA certificate |certificate|. Web trust is only |
// applied if the certificate requests the TrustBits attribute "Web" and if |
// the |allow_trust_imports| permission is granted, otherwise the attribute is |
// ignored. |
- static bool ParseServerOrCaCertificate( |
+ bool ParseServerOrCaCertificate( |
bool allow_trust_imports, |
const std::string& cert_type, |
const std::string& guid, |
const base::DictionaryValue& certificate, |
- net::NSSCertDatabase* nssdb, |
- net::CertificateList* onc_trusted_certificates); |
+ net::CertificateList* onc_trusted_certificates, |
+ CertsByGUID* imported_server_and_ca_certs); |
- static bool ParseClientCertificate(const std::string& guid, |
- const base::DictionaryValue& certificate, |
- net::NSSCertDatabase* nssdb); |
- |
- // The task runner to use for NSSCertDatabase accesses. |
- scoped_refptr<base::SequencedTaskRunner> io_task_runner_; |
+ bool ParseClientCertificate(const std::string& guid, |
+ const base::DictionaryValue& certificate); |
// The certificate database to which certificates are imported. |
net::NSSCertDatabase* target_nssdb_; |
- |
- base::WeakPtrFactory<CertificateImporterImpl> weak_factory_; |
DISALLOW_COPY_AND_ASSIGN(CertificateImporterImpl); |
}; |