Index: chrome/browser/policy/user_policy_token_cache.cc |
diff --git a/chrome/browser/policy/user_policy_token_cache.cc b/chrome/browser/policy/user_policy_token_cache.cc |
deleted file mode 100644 |
index 64ab1d76f1d6fbad8836e325b0b1392913c8d83b..0000000000000000000000000000000000000000 |
--- a/chrome/browser/policy/user_policy_token_cache.cc |
+++ /dev/null |
@@ -1,174 +0,0 @@ |
-// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/policy/user_policy_token_cache.h" |
- |
-#include "base/bind.h" |
-#include "base/file_util.h" |
-#include "base/metrics/histogram.h" |
-#include "chrome/browser/policy/enterprise_metrics.h" |
-#include "chrome/browser/policy/proto/device_management_local.pb.h" |
-#include "content/public/browser/browser_thread.h" |
- |
-using content::BrowserThread; |
- |
-namespace { |
- |
-// Other places can sample on the same UMA counter, so make sure they all do |
-// it on the same thread (UI). |
-void SampleUMAOnUIThread(policy::MetricToken sample) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- UMA_HISTOGRAM_ENUMERATION(policy::kMetricToken, sample, |
- policy::kMetricTokenSize); |
-} |
- |
-void SampleUMA(policy::MetricToken sample) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, |
- base::Bind(&SampleUMAOnUIThread, sample)); |
-} |
- |
-} // namespace |
- |
-namespace policy { |
- |
-namespace em = enterprise_management; |
- |
-UserPolicyTokenLoader::Delegate::~Delegate() {} |
- |
-UserPolicyTokenLoader::UserPolicyTokenLoader( |
- const base::WeakPtr<Delegate>& delegate, |
- const FilePath& cache_file) |
- : delegate_(delegate), |
- cache_file_(cache_file) {} |
- |
-void UserPolicyTokenLoader::Load() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- BrowserThread::PostTask( |
- BrowserThread::FILE, FROM_HERE, |
- base::Bind(&UserPolicyTokenLoader::LoadOnFileThread, this)); |
-} |
- |
-void UserPolicyTokenLoader::Store(const std::string& token, |
- const std::string& device_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- BrowserThread::PostTask( |
- BrowserThread::FILE, FROM_HERE, |
- base::Bind(&UserPolicyTokenLoader::StoreOnFileThread, |
- this, |
- token, |
- device_id)); |
-} |
- |
-UserPolicyTokenLoader::~UserPolicyTokenLoader() { |
-} |
- |
-void UserPolicyTokenLoader::LoadOnFileThread() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- std::string device_token; |
- std::string device_id; |
- |
- if (file_util::PathExists(cache_file_)) { |
- std::string data; |
- em::DeviceCredentials device_credentials; |
- if (file_util::ReadFileToString(cache_file_, &data) && |
- device_credentials.ParseFromArray(data.c_str(), data.size())) { |
- device_token = device_credentials.device_token(); |
- device_id = device_credentials.device_id(); |
- SampleUMA(kMetricTokenLoadSucceeded); |
- } else { |
- SampleUMA(kMetricTokenLoadFailed); |
- } |
- } |
- |
- BrowserThread::PostTask( |
- BrowserThread::UI, FROM_HERE, |
- base::Bind(&UserPolicyTokenLoader::NotifyOnUIThread, |
- this, |
- device_token, |
- device_id)); |
-} |
- |
-void UserPolicyTokenLoader::NotifyOnUIThread(const std::string& token, |
- const std::string& device_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- if (delegate_.get()) |
- delegate_->OnTokenLoaded(token, device_id); |
-} |
- |
-void UserPolicyTokenLoader::StoreOnFileThread(const std::string& token, |
- const std::string& device_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- em::DeviceCredentials device_credentials; |
- device_credentials.set_device_token(token); |
- device_credentials.set_device_id(device_id); |
- std::string data; |
- bool success = device_credentials.SerializeToString(&data); |
- if (!success) { |
- LOG(WARNING) << "Failed serialize device token data, will not write " |
- << cache_file_.value(); |
- SampleUMA(kMetricTokenStoreFailed); |
- return; |
- } |
- |
- if (!file_util::CreateDirectory(cache_file_.DirName())) { |
- LOG(WARNING) << "Failed to create directory " |
- << cache_file_.DirName().value(); |
- SampleUMA(kMetricTokenStoreFailed); |
- return; |
- } |
- |
- int size = data.size(); |
- if (file_util::WriteFile(cache_file_, data.c_str(), size) != size) { |
- LOG(WARNING) << "Failed to write " << cache_file_.value(); |
- SampleUMA(kMetricTokenStoreFailed); |
- return; |
- } |
- |
- SampleUMA(kMetricTokenStoreSucceeded); |
-} |
- |
-UserPolicyTokenCache::UserPolicyTokenCache( |
- CloudPolicyDataStore* data_store, |
- const FilePath& cache_file) |
- : ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)), |
- data_store_(data_store) { |
- loader_ = new UserPolicyTokenLoader(weak_ptr_factory_.GetWeakPtr(), |
- cache_file); |
- data_store_->AddObserver(this); |
-} |
- |
-UserPolicyTokenCache::~UserPolicyTokenCache() { |
- if (data_store_) |
- data_store_->RemoveObserver(this); |
-} |
- |
-void UserPolicyTokenCache::Load() { |
- loader_->Load(); |
-} |
- |
-void UserPolicyTokenCache::OnTokenLoaded(const std::string& token, |
- const std::string& device_id) { |
- token_ = token; |
- if (data_store_) { |
- data_store_->set_device_id(device_id); |
- data_store_->SetDeviceToken(token, true); |
- } |
-} |
- |
-void UserPolicyTokenCache::OnDeviceTokenChanged() { |
- const std::string& new_token(data_store_->device_token()); |
- if (!new_token.empty() && !data_store_->device_id().empty()) { |
- if (token_ == new_token) |
- return; |
- |
- token_ = new_token; |
- loader_->Store(new_token, data_store_->device_id()); |
- } |
-} |
- |
-void UserPolicyTokenCache::OnCredentialsChanged() { |
-} |
- |
-} // namespace policy |