| Index: chrome/browser/chromeos/policy/device_cloud_policy_invalidator.cc
|
| diff --git a/chrome/browser/chromeos/policy/device_cloud_policy_invalidator.cc b/chrome/browser/chromeos/policy/device_cloud_policy_invalidator.cc
|
| index fba75c495bf54ac6f2169ca95fd429058baad3c5..e41442e055e29e8164f435da5d62b53b6971466f 100644
|
| --- a/chrome/browser/chromeos/policy/device_cloud_policy_invalidator.cc
|
| +++ b/chrome/browser/chromeos/policy/device_cloud_policy_invalidator.cc
|
| @@ -4,264 +4,45 @@
|
|
|
| #include "chrome/browser/chromeos/policy/device_cloud_policy_invalidator.h"
|
|
|
| -#include <string>
|
| -#include <vector>
|
| -
|
| #include "base/logging.h"
|
| #include "base/message_loop/message_loop_proxy.h"
|
| #include "base/time/clock.h"
|
| #include "base/time/default_clock.h"
|
| #include "chrome/browser/browser_process.h"
|
| #include "chrome/browser/browser_process_platform_part_chromeos.h"
|
| -#include "chrome/browser/chrome_notification_types.h"
|
| #include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h"
|
| #include "chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.h"
|
| -#include "chrome/browser/chromeos/policy/ticl_device_settings_provider.h"
|
| -#include "chrome/browser/chromeos/profiles/profile_helper.h"
|
| -#include "chrome/browser/chromeos/settings/device_identity_provider.h"
|
| -#include "chrome/browser/chromeos/settings/device_oauth2_token_service_factory.h"
|
| -#include "chrome/browser/invalidation/profile_invalidation_provider_factory.h"
|
| #include "chrome/browser/policy/cloud/cloud_policy_invalidator.h"
|
| -#include "chrome/browser/profiles/profile_manager.h"
|
| -#include "chrome/common/chrome_content_client.h"
|
| -#include "components/invalidation/invalidation_handler.h"
|
| -#include "components/invalidation/invalidation_service.h"
|
| -#include "components/invalidation/invalidation_state_tracker.h"
|
| -#include "components/invalidation/invalidator_state.h"
|
| -#include "components/invalidation/invalidator_storage.h"
|
| -#include "components/invalidation/profile_invalidation_provider.h"
|
| -#include "components/invalidation/ticl_invalidation_service.h"
|
| -#include "components/invalidation/ticl_settings_provider.h"
|
| -#include "components/policy/core/common/cloud/cloud_policy_constants.h"
|
| -#include "components/user_manager/user.h"
|
| -#include "content/public/browser/notification_details.h"
|
| -#include "content/public/browser/notification_service.h"
|
| -#include "google_apis/gaia/identity_provider.h"
|
| -#include "net/url_request/url_request_context_getter.h"
|
| #include "policy/proto/device_management_backend.pb.h"
|
|
|
| -class Profile;
|
| -
|
| namespace policy {
|
|
|
| -class DeviceCloudPolicyInvalidator::InvalidationServiceObserver
|
| - : public syncer::InvalidationHandler {
|
| - public:
|
| - explicit InvalidationServiceObserver(
|
| - DeviceCloudPolicyInvalidator* parent,
|
| - invalidation::InvalidationService* invalidation_service);
|
| - ~InvalidationServiceObserver() override;
|
| -
|
| - invalidation::InvalidationService* GetInvalidationService();
|
| - bool IsServiceConnected() const;
|
| -
|
| - // public syncer::InvalidationHandler:
|
| - void OnInvalidatorStateChange(syncer::InvalidatorState state) override;
|
| - void OnIncomingInvalidation(
|
| - const syncer::ObjectIdInvalidationMap& invalidation_map) override;
|
| - std::string GetOwnerName() const override;
|
| -
|
| - private:
|
| - DeviceCloudPolicyInvalidator* parent_;
|
| - invalidation::InvalidationService* invalidation_service_;
|
| - bool is_service_connected_;
|
| -
|
| - DISALLOW_COPY_AND_ASSIGN(InvalidationServiceObserver);
|
| -};
|
| -
|
| -DeviceCloudPolicyInvalidator::InvalidationServiceObserver::
|
| - InvalidationServiceObserver(
|
| - DeviceCloudPolicyInvalidator* parent,
|
| - invalidation::InvalidationService* invalidation_service)
|
| - : parent_(parent),
|
| - invalidation_service_(invalidation_service),
|
| - is_service_connected_(invalidation_service->GetInvalidatorState() ==
|
| - syncer::INVALIDATIONS_ENABLED) {
|
| - invalidation_service_->RegisterInvalidationHandler(this);
|
| -}
|
| -
|
| -DeviceCloudPolicyInvalidator::InvalidationServiceObserver::
|
| - ~InvalidationServiceObserver() {
|
| - invalidation_service_->UnregisterInvalidationHandler(this);
|
| -}
|
| -
|
| -invalidation::InvalidationService*
|
| -DeviceCloudPolicyInvalidator::InvalidationServiceObserver::
|
| - GetInvalidationService() {
|
| - return invalidation_service_;
|
| -}
|
| -
|
| -bool DeviceCloudPolicyInvalidator::InvalidationServiceObserver::
|
| - IsServiceConnected() const {
|
| - return is_service_connected_;
|
| -}
|
| -
|
| -void DeviceCloudPolicyInvalidator::InvalidationServiceObserver::
|
| - OnInvalidatorStateChange(syncer::InvalidatorState state) {
|
| - const bool is_service_connected = (state == syncer::INVALIDATIONS_ENABLED);
|
| - if (is_service_connected == is_service_connected_)
|
| - return;
|
| -
|
| - is_service_connected_ = is_service_connected;
|
| - if (is_service_connected_)
|
| - parent_->OnInvalidationServiceConnected(invalidation_service_);
|
| - else
|
| - parent_->OnInvalidationServiceDisconnected(invalidation_service_);
|
| -}
|
| -
|
| -void DeviceCloudPolicyInvalidator::InvalidationServiceObserver::
|
| - OnIncomingInvalidation(
|
| - const syncer::ObjectIdInvalidationMap& invalidation_map) {
|
| -}
|
| -
|
| -std::string DeviceCloudPolicyInvalidator::InvalidationServiceObserver::
|
| - GetOwnerName() const {
|
| - return "DevicePolicy";
|
| -}
|
| -
|
| -DeviceCloudPolicyInvalidator::DeviceCloudPolicyInvalidator()
|
| - : invalidation_service_(NULL),
|
| +DeviceCloudPolicyInvalidator::DeviceCloudPolicyInvalidator(
|
| + AffiliatedInvalidationServiceProvider* invalidation_service_provider)
|
| + : invalidation_service_provider_(invalidation_service_provider),
|
| highest_handled_invalidation_version_(0) {
|
| - // The DeviceCloudPolicyInvalidator should be created before any user
|
| - // Profiles.
|
| - DCHECK(g_browser_process->profile_manager()->GetLoadedProfiles().empty());
|
| -
|
| - // Subscribe to notification about new user profiles becoming available.
|
| - registrar_.Add(this,
|
| - chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
|
| - content::NotificationService::AllSources());
|
| -
|
| - TryToCreateInvalidator();
|
| + invalidation_service_provider_->RegisterConsumer(this);
|
| }
|
|
|
| DeviceCloudPolicyInvalidator::~DeviceCloudPolicyInvalidator() {
|
| DestroyInvalidator();
|
| + invalidation_service_provider_->UnregisterConsumer(this);
|
| }
|
|
|
| -void DeviceCloudPolicyInvalidator::Observe(
|
| - int type,
|
| - const content::NotificationSource& source,
|
| - const content::NotificationDetails& details) {
|
| - DCHECK_EQ(chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED, type);
|
| - Profile* profile = content::Details<Profile>(details).ptr();
|
| - invalidation::ProfileInvalidationProvider* invalidation_provider =
|
| - invalidation::ProfileInvalidationProviderFactory::GetForProfile(profile);
|
| - if (!invalidation_provider) {
|
| - // If the Profile does not support invalidation (e.g. guest, incognito),
|
| - // ignore it.
|
| - return;
|
| - }
|
| - user_manager::User* user =
|
| - chromeos::ProfileHelper::Get()->GetUserByProfile(profile);
|
| - if (!user ||
|
| - g_browser_process->platform_part()->browser_policy_connector_chromeos()->
|
| - GetUserAffiliation(user->email()) != USER_AFFILIATION_MANAGED) {
|
| - // If the Profile belongs to a user who is not affiliated with the domain
|
| - // the device is enrolled into, ignore it.
|
| - return;
|
| - }
|
| - // Create a state observer for the user's invalidation service.
|
| - profile_invalidation_service_observers_.push_back(
|
| - new InvalidationServiceObserver(
|
| - this,
|
| - invalidation_provider->GetInvalidationService()));
|
| -
|
| - TryToCreateInvalidator();
|
| -}
|
| -
|
| -void DeviceCloudPolicyInvalidator::OnInvalidationServiceConnected(
|
| - invalidation::InvalidationService* invalidation_service) {
|
| - if (!device_invalidation_service_) {
|
| - // The lack of a device-global invalidation service implies that a
|
| - // |CloudPolicyInvalidator| backed by another connected service exists
|
| - // already. There is no need to switch from that to the service which just
|
| - // connected.
|
| - return;
|
| - }
|
| -
|
| - if (invalidation_service != device_invalidation_service_.get()) {
|
| - // If an invalidation service other than the device-global one connected,
|
| - // destroy the device-global service and the |CloudPolicyInvalidator| backed
|
| - // by it, if any.
|
| - DestroyInvalidator();
|
| - DestroyDeviceInvalidationService();
|
| - }
|
| -
|
| - // Create a |CloudPolicyInvalidator| backed by the invalidation service which
|
| - // just connected.
|
| - CreateInvalidator(invalidation_service);
|
| -}
|
| -
|
| -void DeviceCloudPolicyInvalidator::OnInvalidationServiceDisconnected(
|
| +void DeviceCloudPolicyInvalidator::OnInvalidationServiceSet(
|
| invalidation::InvalidationService* invalidation_service) {
|
| - if (invalidation_service != invalidation_service_) {
|
| - // If the invalidation service which disconnected is not backing the current
|
| - // |CloudPolicyInvalidator|, return.
|
| - return;
|
| - }
|
| -
|
| - // Destroy the |CloudPolicyInvalidator| backed by the invalidation service
|
| - // which just disconnected.
|
| DestroyInvalidator();
|
| -
|
| - // Try to create a |CloudPolicyInvalidator| backed by another invalidation
|
| - // service.
|
| - TryToCreateInvalidator();
|
| + if (invalidation_service)
|
| + CreateInvalidator(invalidation_service);
|
| }
|
|
|
| -void DeviceCloudPolicyInvalidator::TryToCreateInvalidator() {
|
| - if (invalidator_) {
|
| - // If a |CloudPolicyInvalidator| exists already, return.
|
| - return;
|
| - }
|
| -
|
| - for (ScopedVector<InvalidationServiceObserver>::const_iterator it =
|
| - profile_invalidation_service_observers_.begin();
|
| - it != profile_invalidation_service_observers_.end(); ++it) {
|
| - if ((*it)->IsServiceConnected()) {
|
| - // If a connected invalidation service belonging to an affiliated
|
| - // logged-in user is found, create a |CloudPolicyInvalidator| backed by
|
| - // that service and destroy the device-global service, if any.
|
| - DestroyDeviceInvalidationService();
|
| - CreateInvalidator((*it)->GetInvalidationService());
|
| - return;
|
| - }
|
| - }
|
| -
|
| - if (!device_invalidation_service_) {
|
| - // If no other connected invalidation service was found, ensure that a
|
| - // device-global service is running.
|
| - device_invalidation_service_.reset(
|
| - new invalidation::TiclInvalidationService(
|
| - GetUserAgent(),
|
| - scoped_ptr<IdentityProvider>(new chromeos::DeviceIdentityProvider(
|
| - chromeos::DeviceOAuth2TokenServiceFactory::Get())),
|
| - scoped_ptr<invalidation::TiclSettingsProvider>(
|
| - new TiclDeviceSettingsProvider),
|
| - g_browser_process->gcm_driver(),
|
| - g_browser_process->system_request_context()));
|
| - device_invalidation_service_->Init(
|
| - scoped_ptr<syncer::InvalidationStateTracker>(
|
| - new invalidation::InvalidatorStorage(
|
| - g_browser_process->local_state())));
|
| - device_invalidation_service_observer_.reset(
|
| - new InvalidationServiceObserver(
|
| - this,
|
| - device_invalidation_service_.get()));
|
| - }
|
| -
|
| - if (device_invalidation_service_observer_->IsServiceConnected()) {
|
| - // If the device-global invalidation service is connected, create a
|
| - // |CloudPolicyInvalidator| backed by it. Otherwise, a
|
| - // |CloudPolicyInvalidator| will be created later when a connected service
|
| - // becomes available.
|
| - CreateInvalidator(device_invalidation_service_.get());
|
| - }
|
| +CloudPolicyInvalidator*
|
| +DeviceCloudPolicyInvalidator::GetInvalidatorForTest() const {
|
| + return invalidator_.get();
|
| }
|
|
|
| void DeviceCloudPolicyInvalidator::CreateInvalidator(
|
| invalidation::InvalidationService* invalidation_service) {
|
| - invalidation_service_ = invalidation_service;
|
| DCHECK(!invalidator_);
|
| invalidator_.reset(new CloudPolicyInvalidator(
|
| enterprise_management::DeviceRegisterRequest::DEVICE,
|
| @@ -274,18 +55,13 @@ void DeviceCloudPolicyInvalidator::CreateInvalidator(
|
| }
|
|
|
| void DeviceCloudPolicyInvalidator::DestroyInvalidator() {
|
| - if (invalidator_) {
|
| - highest_handled_invalidation_version_ =
|
| - invalidator_->highest_handled_invalidation_version();
|
| - invalidator_->Shutdown();
|
| - }
|
| - invalidator_.reset();
|
| - invalidation_service_ = NULL;
|
| -}
|
| + if (!invalidator_)
|
| + return;
|
|
|
| -void DeviceCloudPolicyInvalidator::DestroyDeviceInvalidationService() {
|
| - device_invalidation_service_observer_.reset();
|
| - device_invalidation_service_.reset();
|
| + highest_handled_invalidation_version_ =
|
| + invalidator_->highest_handled_invalidation_version();
|
| + invalidator_->Shutdown();
|
| + invalidator_.reset();
|
| }
|
|
|
| } // namespace policy
|
|
|