| Index: remoting/host/policy_hack/policy_watcher_chromeos.cc
|
| diff --git a/remoting/host/policy_hack/policy_watcher_chromeos.cc b/remoting/host/policy_hack/policy_watcher_chromeos.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..53303a6dfb546ce256578a252961fad660972883
|
| --- /dev/null
|
| +++ b/remoting/host/policy_hack/policy_watcher_chromeos.cc
|
| @@ -0,0 +1,94 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "remoting/host/policy_hack/policy_watcher.h"
|
| +
|
| +#include "base/single_thread_task_runner.h"
|
| +#include "chrome/browser/browser_process.h"
|
| +#include "components/policy/core/common/policy_service.h"
|
| +
|
| +using namespace policy;
|
| +
|
| +namespace remoting {
|
| +namespace policy_hack {
|
| +
|
| +namespace {
|
| +
|
| +class PolicyWatcherChromeOS : public PolicyWatcher,
|
| + public PolicyService::Observer {
|
| + public:
|
| + PolicyWatcherChromeOS(scoped_refptr<base::SingleThreadTaskRunner> task_runner,
|
| + PolicyService* policy_service);
|
| +
|
| + virtual ~PolicyWatcherChromeOS() {}
|
| +
|
| + // PolicyService::Observer implementation.
|
| + virtual void OnPolicyUpdated(const PolicyNamespace& ns,
|
| + const PolicyMap& previous,
|
| + const PolicyMap& current) OVERRIDE;
|
| +
|
| + protected:
|
| + // PolicyWatcher overrides.
|
| + virtual void Reload() OVERRIDE;
|
| + virtual void StartWatchingInternal() OVERRIDE;
|
| + virtual void StopWatchingInternal() OVERRIDE;
|
| +
|
| + private:
|
| + // Converts a policy map to DictionaryValues.
|
| + scoped_ptr<base::DictionaryValue> GetPolicyValues(const PolicyMap& map);
|
| +
|
| + PolicyService* policy_service_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(PolicyWatcherChromeOS);
|
| +};
|
| +
|
| +PolicyWatcherChromeOS::PolicyWatcherChromeOS(
|
| + scoped_refptr<base::SingleThreadTaskRunner> task_runner,
|
| + PolicyService* policy_service)
|
| + : PolicyWatcher(task_runner), policy_service_(policy_service) {
|
| + DCHECK(policy_service_);
|
| +}
|
| +
|
| +void PolicyWatcherChromeOS::OnPolicyUpdated(const PolicyNamespace& ns,
|
| + const PolicyMap& previous,
|
| + const PolicyMap& current) {
|
| + Reload();
|
| +}
|
| +
|
| +void PolicyWatcherChromeOS::Reload(){
|
| + const PolicyMap& map = policy_service_->GetPolicies(
|
| + PolicyNamespace(POLICY_DOMAIN_CHROME, std::string()));
|
| + scoped_ptr<base::DictionaryValue> policy_dict = GetPolicyValues(map);
|
| + DCHECK(policy_dict);
|
| + UpdatePolicies(policy_dict.get());
|
| +};
|
| +
|
| +void PolicyWatcherChromeOS::StartWatchingInternal() {
|
| + policy_service_->AddObserver(POLICY_DOMAIN_CHROME, this);
|
| + Reload();
|
| +};
|
| +
|
| +void PolicyWatcherChromeOS::StopWatchingInternal(){
|
| + policy_service_->RemoveObserver(POLICY_DOMAIN_CHROME, this);
|
| +};
|
| +
|
| +scoped_ptr<base::DictionaryValue> PolicyWatcherChromeOS::GetPolicyValues(
|
| + const PolicyMap& map) {
|
| + scoped_ptr<base::DictionaryValue> result(new base::DictionaryValue());
|
| + for (PolicyMap::const_iterator it = map.begin(); it != map.end(); it++) {
|
| + result->Set(it->first, it->second.value->DeepCopy());
|
| + }
|
| + return result.Pass();
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +PolicyWatcher* PolicyWatcher::Create(
|
| + scoped_refptr<base::SingleThreadTaskRunner> task_runner) {
|
| + return new PolicyWatcherChromeOS(task_runner,
|
| + g_browser_process->policy_service());
|
| +}
|
| +
|
| +} // namespace policy_hack
|
| +} // namespace remoting
|
|
|