OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/options/vpn_config_view.h" | 5 #include "chrome/browser/chromeos/options/vpn_config_view.h" |
6 | 6 |
7 #include "ash/system/chromeos/network/network_connect.h" | 7 #include "ash/system/chromeos/network/network_connect.h" |
8 #include "base/bind.h" | 8 #include "base/bind.h" |
9 #include "base/strings/string_util.h" | 9 #include "base/strings/string_util.h" |
10 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
(...skipping 356 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
367 bool modifiable = false; | 367 bool modifiable = false; |
368 ChildNetworkConfigView::GetShareStateForLoginState(&shared, &modifiable); | 368 ChildNetworkConfigView::GetShareStateForLoginState(&shared, &modifiable); |
369 | 369 |
370 bool only_policy_autoconnect = | 370 bool only_policy_autoconnect = |
371 onc::PolicyAllowsOnlyPolicyNetworksToAutoconnect(!shared); | 371 onc::PolicyAllowsOnlyPolicyNetworksToAutoconnect(!shared); |
372 if (only_policy_autoconnect) { | 372 if (only_policy_autoconnect) { |
373 properties.SetBooleanWithoutPathExpansion(shill::kAutoConnectProperty, | 373 properties.SetBooleanWithoutPathExpansion(shill::kAutoConnectProperty, |
374 false); | 374 false); |
375 } | 375 } |
376 | 376 |
377 ash::network_connect::CreateConfigurationAndConnect(&properties, shared); | 377 ash::NetworkConnect::Get()->CreateConfigurationAndConnect(&properties, |
| 378 shared); |
378 } else { | 379 } else { |
379 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> | 380 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> |
380 GetNetworkState(service_path_); | 381 GetNetworkState(service_path_); |
381 if (!vpn) { | 382 if (!vpn) { |
382 // Shill no longer knows about this network (edge case). | 383 // Shill no longer knows about this network (edge case). |
383 // TODO(stevenjb): Add notification for this. | 384 // TODO(stevenjb): Add notification for this. |
384 NET_LOG_ERROR("Network not found", service_path_); | 385 NET_LOG_ERROR("Network not found", service_path_); |
385 return true; // Close dialog | 386 return true; // Close dialog |
386 } | 387 } |
387 base::DictionaryValue properties; | 388 base::DictionaryValue properties; |
388 SetConfigProperties(&properties); | 389 SetConfigProperties(&properties); |
389 ash::network_connect::ConfigureNetworkAndConnect( | 390 ash::NetworkConnect::Get()->ConfigureNetworkAndConnect( |
390 service_path_, properties, false /* not shared */); | 391 service_path_, properties, false /* not shared */); |
391 } | 392 } |
392 return true; // Close dialog. | 393 return true; // Close dialog. |
393 } | 394 } |
394 | 395 |
395 void VPNConfigView::Cancel() { | 396 void VPNConfigView::Cancel() { |
396 } | 397 } |
397 | 398 |
398 void VPNConfigView::InitFocus() { | 399 void VPNConfigView::InitFocus() { |
399 views::View* view_to_focus = GetInitiallyFocusedView(); | 400 views::View* view_to_focus = GetInitiallyFocusedView(); |
(...skipping 592 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
992 } else if (!IsUserCertValid()) { | 993 } else if (!IsUserCertValid()) { |
993 error_msg = l10n_util::GetStringUTF16( | 994 error_msg = l10n_util::GetStringUTF16( |
994 IDS_OPTIONS_SETTINGS_INTERNET_OPTIONS_REQUIRE_HARDWARE_BACKED); | 995 IDS_OPTIONS_SETTINGS_INTERNET_OPTIONS_REQUIRE_HARDWARE_BACKED); |
995 } | 996 } |
996 } | 997 } |
997 if (error_msg.empty() && !service_path_.empty()) { | 998 if (error_msg.empty() && !service_path_.empty()) { |
998 // TODO(kuan): differentiate between bad psk and user passphrases. | 999 // TODO(kuan): differentiate between bad psk and user passphrases. |
999 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> | 1000 const NetworkState* vpn = NetworkHandler::Get()->network_state_handler()-> |
1000 GetNetworkState(service_path_); | 1001 GetNetworkState(service_path_); |
1001 if (vpn && vpn->connection_state() == shill::kStateFailure) | 1002 if (vpn && vpn->connection_state() == shill::kStateFailure) |
1002 error_msg = ash::network_connect::ErrorString( | 1003 error_msg = ash::NetworkConnect::Get()->GetErrorString( |
1003 vpn->last_error(), vpn->path()); | 1004 vpn->last_error(), vpn->path()); |
1004 } | 1005 } |
1005 if (!error_msg.empty()) { | 1006 if (!error_msg.empty()) { |
1006 error_label_->SetText(error_msg); | 1007 error_label_->SetText(error_msg); |
1007 error_label_->SetVisible(true); | 1008 error_label_->SetVisible(true); |
1008 } else { | 1009 } else { |
1009 error_label_->SetVisible(false); | 1010 error_label_->SetVisible(false); |
1010 } | 1011 } |
1011 } | 1012 } |
1012 | 1013 |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1064 property_ui_data->ParseOncProperty( | 1065 property_ui_data->ParseOncProperty( |
1065 onc_source, | 1066 onc_source, |
1066 onc, | 1067 onc, |
1067 base::StringPrintf("%s.%s.%s", | 1068 base::StringPrintf("%s.%s.%s", |
1068 ::onc::network_config::kVPN, | 1069 ::onc::network_config::kVPN, |
1069 dict_key.c_str(), | 1070 dict_key.c_str(), |
1070 key.c_str())); | 1071 key.c_str())); |
1071 } | 1072 } |
1072 | 1073 |
1073 } // namespace chromeos | 1074 } // namespace chromeos |
OLD | NEW |