| Index: chrome/browser/chromeos/settings/device_settings_provider.cc
|
| diff --git a/chrome/browser/chromeos/settings/device_settings_provider.cc b/chrome/browser/chromeos/settings/device_settings_provider.cc
|
| index 1da9fbce411e2f914bdd15e1a432556ee8a1b446..01aca4b7cd5538f7874502f130d4f3939b0f502a 100644
|
| --- a/chrome/browser/chromeos/settings/device_settings_provider.cc
|
| +++ b/chrome/browser/chromeos/settings/device_settings_provider.cc
|
| @@ -463,7 +463,8 @@ void DeviceSettingsProvider::DoSet(const std::string& path,
|
| // Make sure that either the current user is the device owner or the
|
| // device doesn't have an owner yet.
|
| if (!(device_settings_service_->HasPrivateOwnerKey() ||
|
| - ownership_status_ == DeviceSettingsService::OWNERSHIP_NONE)) {
|
| + ownership_status_ == DeviceSettingsService::OWNERSHIP_NONE) ||
|
| + !device_settings_service_->GetOwnerSettingsService()) {
|
| LOG(WARNING) << "Changing settings from non-owner, setting=" << path;
|
|
|
| // Revert UI change.
|
| @@ -471,13 +472,14 @@ void DeviceSettingsProvider::DoSet(const std::string& path,
|
| return;
|
| }
|
|
|
| - if (IsDeviceSetting(path)) {
|
| - pending_changes_.push_back(PendingQueueElement(path, in_value.DeepCopy()));
|
| - if (!store_callback_factory_.HasWeakPtrs())
|
| - SetInPolicy();
|
| - } else {
|
| + if (!IsDeviceSetting(path)) {
|
| NOTREACHED() << "Try to set unhandled cros setting " << path;
|
| + return;
|
| }
|
| +
|
| + pending_changes_.push_back(PendingQueueElement(path, in_value.DeepCopy()));
|
| + if (!store_callback_factory_.HasWeakPtrs())
|
| + SetInPolicy();
|
| }
|
|
|
| void DeviceSettingsProvider::OwnershipStatusChanged() {
|
| @@ -546,223 +548,11 @@ void DeviceSettingsProvider::SetInPolicy() {
|
| pending_changes_.pop_front();
|
|
|
| trusted_status_ = TEMPORARILY_UNTRUSTED;
|
| - if (prop == kAccountsPrefAllowNewUser) {
|
| - em::AllowNewUsersProto* allow =
|
| - device_settings_.mutable_allow_new_users();
|
| - bool allow_value;
|
| - if (value->GetAsBoolean(&allow_value))
|
| - allow->set_allow_new_users(allow_value);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kAccountsPrefAllowGuest) {
|
| - em::GuestModeEnabledProto* guest =
|
| - device_settings_.mutable_guest_mode_enabled();
|
| - bool guest_value;
|
| - if (value->GetAsBoolean(&guest_value))
|
| - guest->set_guest_mode_enabled(guest_value);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kAccountsPrefSupervisedUsersEnabled) {
|
| - em::SupervisedUsersSettingsProto* supervised =
|
| - device_settings_.mutable_supervised_users_settings();
|
| - bool supervised_value;
|
| - if (value->GetAsBoolean(&supervised_value))
|
| - supervised->set_supervised_users_enabled(supervised_value);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kAccountsPrefShowUserNamesOnSignIn) {
|
| - em::ShowUserNamesOnSigninProto* show =
|
| - device_settings_.mutable_show_user_names();
|
| - bool show_value;
|
| - if (value->GetAsBoolean(&show_value))
|
| - show->set_show_user_names(show_value);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kAccountsPrefDeviceLocalAccounts) {
|
| - em::DeviceLocalAccountsProto* device_local_accounts =
|
| - device_settings_.mutable_device_local_accounts();
|
| - device_local_accounts->clear_account();
|
| - const base::ListValue* accounts_list = NULL;
|
| - if (value->GetAsList(&accounts_list)) {
|
| - for (base::ListValue::const_iterator entry(accounts_list->begin());
|
| - entry != accounts_list->end(); ++entry) {
|
| - const base::DictionaryValue* entry_dict = NULL;
|
| - if ((*entry)->GetAsDictionary(&entry_dict)) {
|
| - em::DeviceLocalAccountInfoProto* account =
|
| - device_local_accounts->add_account();
|
| - std::string account_id;
|
| - if (entry_dict->GetStringWithoutPathExpansion(
|
| - kAccountsPrefDeviceLocalAccountsKeyId, &account_id)) {
|
| - account->set_account_id(account_id);
|
| - }
|
| - int type;
|
| - if (entry_dict->GetIntegerWithoutPathExpansion(
|
| - kAccountsPrefDeviceLocalAccountsKeyType, &type)) {
|
| - account->set_type(
|
| - static_cast<em::DeviceLocalAccountInfoProto::AccountType>(
|
| - type));
|
| - }
|
| - std::string kiosk_app_id;
|
| - if (entry_dict->GetStringWithoutPathExpansion(
|
| - kAccountsPrefDeviceLocalAccountsKeyKioskAppId,
|
| - &kiosk_app_id)) {
|
| - account->mutable_kiosk_app()->set_app_id(kiosk_app_id);
|
| - }
|
| - } else {
|
| - NOTREACHED();
|
| - }
|
| - }
|
| - } else {
|
| - NOTREACHED();
|
| - }
|
| - } else if (prop == kAccountsPrefDeviceLocalAccountAutoLoginId) {
|
| - em::DeviceLocalAccountsProto* device_local_accounts =
|
| - device_settings_.mutable_device_local_accounts();
|
| - std::string id;
|
| - if (value->GetAsString(&id))
|
| - device_local_accounts->set_auto_login_id(id);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kAccountsPrefDeviceLocalAccountAutoLoginDelay) {
|
| - em::DeviceLocalAccountsProto* device_local_accounts =
|
| - device_settings_.mutable_device_local_accounts();
|
| - int delay;
|
| - if (value->GetAsInteger(&delay))
|
| - device_local_accounts->set_auto_login_delay(delay);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kAccountsPrefDeviceLocalAccountAutoLoginBailoutEnabled) {
|
| - em::DeviceLocalAccountsProto* device_local_accounts =
|
| - device_settings_.mutable_device_local_accounts();
|
| - bool enabled;
|
| - if (value->GetAsBoolean(&enabled))
|
| - device_local_accounts->set_enable_auto_login_bailout(enabled);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop ==
|
| - kAccountsPrefDeviceLocalAccountPromptForNetworkWhenOffline) {
|
| - em::DeviceLocalAccountsProto* device_local_accounts =
|
| - device_settings_.mutable_device_local_accounts();
|
| - bool should_prompt;
|
| - if (value->GetAsBoolean(&should_prompt))
|
| - device_local_accounts->set_prompt_for_network_when_offline(should_prompt);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kSignedDataRoamingEnabled) {
|
| - em::DataRoamingEnabledProto* roam =
|
| - device_settings_.mutable_data_roaming_enabled();
|
| - bool roaming_value = false;
|
| - if (value->GetAsBoolean(&roaming_value))
|
| - roam->set_data_roaming_enabled(roaming_value);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kReleaseChannel) {
|
| - em::ReleaseChannelProto* release_channel =
|
| - device_settings_.mutable_release_channel();
|
| - std::string channel_value;
|
| - if (value->GetAsString(&channel_value))
|
| - release_channel->set_release_channel(channel_value);
|
| - else
|
| - NOTREACHED();
|
| - } else if (prop == kStatsReportingPref) {
|
| - em::MetricsEnabledProto* metrics =
|
| - device_settings_.mutable_metrics_enabled();
|
| - bool metrics_value = false;
|
| - if (value->GetAsBoolean(&metrics_value))
|
| - metrics->set_metrics_enabled(metrics_value);
|
| - else
|
| - NOTREACHED();
|
| + DeviceSettingsService::UpdateDeviceSettings(prop, *value, device_settings_);
|
| +
|
| + bool metrics_value;
|
| + if (prop == kStatsReportingPref && value->GetAsBoolean(&metrics_value))
|
| ApplyMetricsSetting(false, metrics_value);
|
| - } else if (prop == kAccountsPrefUsers) {
|
| - em::UserWhitelistProto* whitelist_proto =
|
| - device_settings_.mutable_user_whitelist();
|
| - whitelist_proto->clear_user_whitelist();
|
| - const base::ListValue* users;
|
| - if (value->GetAsList(&users)) {
|
| - for (base::ListValue::const_iterator i = users->begin();
|
| - i != users->end(); ++i) {
|
| - std::string email;
|
| - if ((*i)->GetAsString(&email))
|
| - whitelist_proto->add_user_whitelist(email);
|
| - }
|
| - }
|
| - } else if (prop == kAccountsPrefEphemeralUsersEnabled) {
|
| - em::EphemeralUsersEnabledProto* ephemeral_users_enabled =
|
| - device_settings_.mutable_ephemeral_users_enabled();
|
| - bool ephemeral_users_enabled_value = false;
|
| - if (value->GetAsBoolean(&ephemeral_users_enabled_value)) {
|
| - ephemeral_users_enabled->set_ephemeral_users_enabled(
|
| - ephemeral_users_enabled_value);
|
| - } else {
|
| - NOTREACHED();
|
| - }
|
| - } else if (prop == kAllowRedeemChromeOsRegistrationOffers) {
|
| - em::AllowRedeemChromeOsRegistrationOffersProto* allow_redeem_offers =
|
| - device_settings_.mutable_allow_redeem_offers();
|
| - bool allow_redeem_offers_value;
|
| - if (value->GetAsBoolean(&allow_redeem_offers_value)) {
|
| - allow_redeem_offers->set_allow_redeem_offers(
|
| - allow_redeem_offers_value);
|
| - } else {
|
| - NOTREACHED();
|
| - }
|
| - } else if (prop == kStartUpFlags) {
|
| - em::StartUpFlagsProto* flags_proto =
|
| - device_settings_.mutable_start_up_flags();
|
| - flags_proto->Clear();
|
| - const base::ListValue* flags;
|
| - if (value->GetAsList(&flags)) {
|
| - for (base::ListValue::const_iterator i = flags->begin();
|
| - i != flags->end(); ++i) {
|
| - std::string flag;
|
| - if ((*i)->GetAsString(&flag))
|
| - flags_proto->add_flags(flag);
|
| - }
|
| - }
|
| - } else if (prop == kSystemUse24HourClock) {
|
| - em::SystemUse24HourClockProto* use_24hour_clock_proto =
|
| - device_settings_.mutable_use_24hour_clock();
|
| - use_24hour_clock_proto->Clear();
|
| - bool use_24hour_clock_value;
|
| - if (value->GetAsBoolean(&use_24hour_clock_value)) {
|
| - use_24hour_clock_proto->set_use_24hour_clock(use_24hour_clock_value);
|
| - } else {
|
| - NOTREACHED();
|
| - }
|
| - } else if (prop == kAttestationForContentProtectionEnabled) {
|
| - em::AttestationSettingsProto* attestation_settings =
|
| - device_settings_.mutable_attestation_settings();
|
| - bool setting_enabled;
|
| - if (value->GetAsBoolean(&setting_enabled)) {
|
| - attestation_settings->set_content_protection_enabled(setting_enabled);
|
| - } else {
|
| - NOTREACHED();
|
| - }
|
| - } else {
|
| - // The remaining settings don't support Set(), since they are not
|
| - // intended to be customizable by the user:
|
| - // kAccountsPrefTransferSAMLCookies
|
| - // kAppPack
|
| - // kDeviceAttestationEnabled
|
| - // kDeviceOwner
|
| - // kIdleLogoutTimeout
|
| - // kIdleLogoutWarningDuration
|
| - // kReleaseChannelDelegated
|
| - // kReportDeviceActivityTimes
|
| - // kReportDeviceBootMode
|
| - // kReportDeviceLocation
|
| - // kReportDeviceVersionInfo
|
| - // kReportDeviceNetworkInterfaces
|
| - // kReportDeviceUsers
|
| - // kScreenSaverExtensionId
|
| - // kScreenSaverTimeout
|
| - // kServiceAccountIdentity
|
| - // kStartUpUrls
|
| - // kSystemTimezonePolicy
|
| - // kVariationsRestrictParameter
|
| -
|
| - LOG(FATAL) << "Device setting " << prop << " is read-only.";
|
| - }
|
|
|
| em::PolicyData data;
|
| data.set_username(device_settings_service_->GetUsername());
|
|
|