| Index: remoting/host/policy_hack/policy_watcher_chromeos.cc
|
| diff --git a/remoting/host/policy_hack/policy_watcher_chromeos.cc b/remoting/host/policy_hack/policy_watcher_chromeos.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..39d1d97bf8bd145766b7843ba82cff181092776f
|
| --- /dev/null
|
| +++ b/remoting/host/policy_hack/policy_watcher_chromeos.cc
|
| @@ -0,0 +1,90 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "remoting/host/policy_hack/policy_watcher.h"
|
| +
|
| +#include "components/policy/core/common/policy_service.h"
|
| +#include "content/public/browser/browser_thread.h"
|
| +#include "remoting/base/auto_thread_task_runner.h"
|
| +
|
| +using namespace policy;
|
| +
|
| +namespace remoting {
|
| +namespace policy_hack {
|
| +
|
| +namespace {
|
| +
|
| +class PolicyWatcherChromeOS : public PolicyWatcher,
|
| + public PolicyService::Observer {
|
| + public:
|
| + PolicyWatcherChromeOS(scoped_refptr<base::SingleThreadTaskRunner> task_runner,
|
| + PolicyService* policy_service);
|
| +
|
| + ~PolicyWatcherChromeOS() override;
|
| +
|
| + // PolicyService::Observer interface.
|
| + void OnPolicyUpdated(const PolicyNamespace& ns,
|
| + const PolicyMap& previous,
|
| + const PolicyMap& current) override;
|
| +
|
| + protected:
|
| + // PolicyWatcher interface.
|
| + void Reload() override;
|
| + void StartWatchingInternal() override;
|
| + void StopWatchingInternal() override;
|
| +
|
| + private:
|
| + PolicyService* policy_service_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(PolicyWatcherChromeOS);
|
| +};
|
| +
|
| +PolicyWatcherChromeOS::PolicyWatcherChromeOS(
|
| + scoped_refptr<base::SingleThreadTaskRunner> task_runner,
|
| + PolicyService* policy_service)
|
| + : PolicyWatcher(task_runner), policy_service_(policy_service) {
|
| +}
|
| +
|
| +PolicyWatcherChromeOS::~PolicyWatcherChromeOS() {
|
| +}
|
| +
|
| +void PolicyWatcherChromeOS::OnPolicyUpdated(const PolicyNamespace& ns,
|
| + const PolicyMap& previous,
|
| + const PolicyMap& current) {
|
| + scoped_ptr<base::DictionaryValue> policy_dict(new base::DictionaryValue());
|
| + for (PolicyMap::const_iterator it = current.begin(); it != current.end();
|
| + it++) {
|
| + policy_dict->Set(it->first, it->second.value->DeepCopy());
|
| + }
|
| + UpdatePolicies(policy_dict.get());
|
| +}
|
| +
|
| +void PolicyWatcherChromeOS::Reload() {
|
| + PolicyNamespace ns(POLICY_DOMAIN_CHROME, std::string());
|
| + const PolicyMap& current = policy_service_->GetPolicies(ns);
|
| + OnPolicyUpdated(ns, current, current);
|
| +};
|
| +
|
| +void PolicyWatcherChromeOS::StartWatchingInternal() {
|
| + policy_service_->AddObserver(POLICY_DOMAIN_CHROME, this);
|
| + Reload();
|
| +};
|
| +
|
| +void PolicyWatcherChromeOS::StopWatchingInternal() {
|
| + policy_service_->RemoveObserver(POLICY_DOMAIN_CHROME, this);
|
| +};
|
| +
|
| +} // namespace
|
| +
|
| +scoped_ptr<PolicyWatcher> PolicyWatcher::Create(
|
| + policy::PolicyService* policy_service,
|
| + scoped_refptr<base::SingleThreadTaskRunner> task_runner) {
|
| + return make_scoped_ptr(new PolicyWatcherChromeOS(
|
| + content::BrowserThread::GetMessageLoopProxyForThread(
|
| + content::BrowserThread::UI),
|
| + policy_service));
|
| +}
|
| +
|
| +} // namespace policy_hack
|
| +} // namespace remoting
|
|
|