Chromium Code Reviews| Index: remoting/host/policy_hack/policy_watcher_chromeos.cc |
| diff --git a/remoting/host/policy_hack/policy_watcher_chromeos.cc b/remoting/host/policy_hack/policy_watcher_chromeos.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..abcec4f9927792d127b059dfd93f9c53d694a375 |
| --- /dev/null |
| +++ b/remoting/host/policy_hack/policy_watcher_chromeos.cc |
| @@ -0,0 +1,89 @@ |
| +// Copyright 2014 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "remoting/host/policy_hack/policy_watcher.h" |
| + |
| +#include "components/policy/core/common/policy_service.h" |
| +#include "remoting/base/auto_thread_task_runner.h" |
| + |
| +using namespace policy; |
| + |
| +namespace remoting { |
| +namespace policy_hack { |
| + |
| +namespace { |
| + |
| +class PolicyWatcherChromeOS : public PolicyWatcher, |
| + public PolicyService::Observer { |
| + public: |
| + PolicyWatcherChromeOS(scoped_refptr<base::SingleThreadTaskRunner> task_runner, |
| + PolicyService* policy_service); |
| + |
| + virtual ~PolicyWatcherChromeOS() {} |
|
Wez
2014/10/17 17:58:01
Don't inline virtuals, even destructors (except in
kelvinp
2014/10/20 00:21:18
Done.
|
| + |
| + // PolicyService::Observer implementation. |
|
Wez
2014/10/17 17:58:01
s/implementation/interface
kelvinp
2014/10/20 00:21:18
Seems like sergey prefers implementation and you p
|
| + virtual void OnPolicyUpdated(const PolicyNamespace& ns, |
| + const PolicyMap& previous, |
| + const PolicyMap& current) OVERRIDE; |
| + |
| + protected: |
| + // PolicyWatcher overrides. |
|
Wez
2014/10/17 17:58:01
s/overrides/interface
kelvinp
2014/10/20 00:21:18
Done.
|
| + virtual void Reload() OVERRIDE; |
| + virtual void StartWatchingInternal() OVERRIDE; |
| + virtual void StopWatchingInternal() OVERRIDE; |
| + |
| + private: |
| + PolicyService* policy_service_; |
| + |
| + DISALLOW_COPY_AND_ASSIGN(PolicyWatcherChromeOS); |
| +}; |
| + |
| +PolicyWatcherChromeOS::PolicyWatcherChromeOS( |
| + scoped_refptr<base::SingleThreadTaskRunner> task_runner, |
| + PolicyService* policy_service) |
|
Wez
2014/10/17 17:58:01
What's the lifetime guarantee/requirement on polic
kelvinp
2014/10/20 00:21:18
Good point. Comments added.
|
| + : PolicyWatcher(task_runner), policy_service_(policy_service) { |
| + DCHECK(policy_service_); |
| +} |
| + |
| +void PolicyWatcherChromeOS::OnPolicyUpdated(const PolicyNamespace& ns, |
| + const PolicyMap& previous, |
| + const PolicyMap& current) { |
| + Reload(); |
| +} |
| + |
| +void PolicyWatcherChromeOS::Reload(){ |
|
Wez
2014/10/17 17:58:01
nit: Space between () and {
kelvinp
2014/10/20 00:21:18
Done.
|
| + const PolicyMap& map = policy_service_->GetPolicies( |
| + PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())); |
|
Wez
2014/10/17 17:58:01
This is redundant in the OnPolicyUpdated case, sin
kelvinp
2014/10/20 00:21:18
Done.
|
| + |
| + scoped_ptr<base::DictionaryValue> policy_dict(new base::DictionaryValue()); |
| + |
| + for (PolicyMap::const_iterator it = map.begin(); it != map.end(); it++) { |
| + policy_dict->Set(it->first, it->second.value->DeepCopy()); |
| + } |
| + |
| + UpdatePolicies(policy_dict.get()); |
| +}; |
| + |
| +void PolicyWatcherChromeOS::StartWatchingInternal() { |
| + policy_service_->AddObserver(POLICY_DOMAIN_CHROME, this); |
| + Reload(); |
| +}; |
| + |
| +void PolicyWatcherChromeOS::StopWatchingInternal(){ |
| + policy_service_->RemoveObserver(POLICY_DOMAIN_CHROME, this); |
| +}; |
| + |
| +} // namespace |
| + |
| +PolicyWatcher* PolicyWatcher::Create( |
| + ChromotingHostContext* context, |
| + scoped_refptr<base::SingleThreadTaskRunner> task_runner) { |
| + // The PolicyWatcher on ChromeOS accesses the PolicyService object, which must |
| + // be called on the UI thread of the browser process. |
| + return new PolicyWatcherChromeOS(context->ui_task_runner(), |
| + context->policy_service()); |
| +} |
| + |
| +} // namespace policy_hack |
| +} // namespace remoting |