Index: chrome/browser/policy/policy_notifier.cc |
diff --git a/chrome/browser/policy/policy_notifier.cc b/chrome/browser/policy/policy_notifier.cc |
deleted file mode 100644 |
index 8f85af82b1222a71f1b93f25bf87a013c3a6f05c..0000000000000000000000000000000000000000 |
--- a/chrome/browser/policy/policy_notifier.cc |
+++ /dev/null |
@@ -1,81 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/policy/policy_notifier.h" |
- |
-namespace policy { |
- |
-void PolicyNotifier::AddObserver(CloudPolicySubsystem::Observer* observer) { |
- observer_list_.AddObserver(observer); |
-} |
- |
-void PolicyNotifier::RemoveObserver(CloudPolicySubsystem::Observer* observer) { |
- observer_list_.RemoveObserver(observer); |
-} |
- |
-PolicyNotifier::PolicyNotifier() |
- : state_(CloudPolicySubsystem::UNENROLLED), |
- error_details_(CloudPolicySubsystem::NO_DETAILS) { |
- for (int i = 0; i < NUM_SOURCES; ++i) { |
- component_states_[i] = CloudPolicySubsystem::UNENROLLED; |
- component_error_details_[i] = CloudPolicySubsystem::NO_DETAILS; |
- } |
-} |
- |
-PolicyNotifier::~PolicyNotifier() { |
-} |
- |
-void PolicyNotifier::Inform(PolicySubsystemState state, |
- ErrorDetails error_details, |
- StatusSource source) { |
- component_states_[source] = state; |
- component_error_details_[source] = error_details; |
- RecomputeState(); |
-} |
- |
-void PolicyNotifier::RecomputeState() { |
- // Define shortcuts. |
- PolicySubsystemState* s = component_states_; |
- ErrorDetails* e = component_error_details_; |
- |
- // Compute overall state. General idea: If any component knows we're |
- // unmanaged, set that as global state. Otherwise, ask components in the |
- // order they normally do work in. If anyone reports 'SUCCESS' or 'UNENROLLED' |
- // (which can also be read as 'undefined/unknown', ask the next component. |
- if (s[TOKEN_FETCHER] == CloudPolicySubsystem::UNMANAGED || |
- s[POLICY_CONTROLLER] == CloudPolicySubsystem::UNMANAGED || |
- s[POLICY_CACHE] == CloudPolicySubsystem::UNMANAGED) { |
- state_ = CloudPolicySubsystem::UNMANAGED; |
- error_details_ = CloudPolicySubsystem::NO_DETAILS; |
- } else if (s[TOKEN_FETCHER] == CloudPolicySubsystem::UNENROLLED && |
- (e[TOKEN_FETCHER] == CloudPolicySubsystem::BAD_SERIAL_NUMBER || |
- e[TOKEN_FETCHER] == CloudPolicySubsystem::BAD_ENROLLMENT_MODE || |
- e[TOKEN_FETCHER] == CloudPolicySubsystem::MISSING_LICENSES)) { |
- state_ = s[TOKEN_FETCHER]; |
- error_details_ = e[TOKEN_FETCHER]; |
- } else if (s[TOKEN_FETCHER] == CloudPolicySubsystem::NETWORK_ERROR) { |
- state_ = s[TOKEN_FETCHER]; |
- error_details_ = e[TOKEN_FETCHER]; |
- } else if (s[TOKEN_FETCHER] == CloudPolicySubsystem::BAD_GAIA_TOKEN) { |
- state_ = s[TOKEN_FETCHER]; |
- error_details_ = e[TOKEN_FETCHER]; |
- } else if (s[POLICY_CONTROLLER] == CloudPolicySubsystem::NETWORK_ERROR) { |
- state_ = s[POLICY_CONTROLLER]; |
- error_details_ = e[POLICY_CONTROLLER]; |
- } else if (s[TOKEN_FETCHER] == CloudPolicySubsystem::SUCCESS && |
- s[POLICY_CONTROLLER] != CloudPolicySubsystem::SUCCESS) { |
- // We need to be able to differentiate between token fetch success or |
- // policy fetch success. |
- state_ = CloudPolicySubsystem::TOKEN_FETCHED; |
- error_details_ = CloudPolicySubsystem::NO_DETAILS; |
- } else { |
- state_ = s[POLICY_CACHE]; |
- error_details_ = e[POLICY_CACHE]; |
- } |
- |
- FOR_EACH_OBSERVER(CloudPolicySubsystem::Observer, observer_list_, |
- OnPolicyStateChanged(state_, error_details_)); |
-} |
- |
-} // namespace policy |