Index: chrome/browser/policy/user_policy_token_loader.cc |
diff --git a/chrome/browser/policy/user_policy_token_cache.cc b/chrome/browser/policy/user_policy_token_loader.cc |
similarity index 50% |
rename from chrome/browser/policy/user_policy_token_cache.cc |
rename to chrome/browser/policy/user_policy_token_loader.cc |
index 64ab1d76f1d6fbad8836e325b0b1392913c8d83b..0891d00b00a124942a083aef92b1c8074af1f901 100644 |
--- a/chrome/browser/policy/user_policy_token_cache.cc |
+++ b/chrome/browser/policy/user_policy_token_loader.cc |
@@ -2,7 +2,7 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#include "chrome/browser/policy/user_policy_token_cache.h" |
+#include "chrome/browser/policy/user_policy_token_loader.h" |
#include "base/bind.h" |
#include "base/file_util.h" |
@@ -50,17 +50,6 @@ void UserPolicyTokenLoader::Load() { |
base::Bind(&UserPolicyTokenLoader::LoadOnFileThread, this)); |
} |
-void UserPolicyTokenLoader::Store(const std::string& token, |
- const std::string& device_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- BrowserThread::PostTask( |
- BrowserThread::FILE, FROM_HERE, |
- base::Bind(&UserPolicyTokenLoader::StoreOnFileThread, |
- this, |
- token, |
- device_id)); |
-} |
- |
UserPolicyTokenLoader::~UserPolicyTokenLoader() { |
} |
@@ -97,78 +86,4 @@ void UserPolicyTokenLoader::NotifyOnUIThread(const std::string& token, |
delegate_->OnTokenLoaded(token, device_id); |
} |
-void UserPolicyTokenLoader::StoreOnFileThread(const std::string& token, |
- const std::string& device_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
- em::DeviceCredentials device_credentials; |
- device_credentials.set_device_token(token); |
- device_credentials.set_device_id(device_id); |
- std::string data; |
- bool success = device_credentials.SerializeToString(&data); |
- if (!success) { |
- LOG(WARNING) << "Failed serialize device token data, will not write " |
- << cache_file_.value(); |
- SampleUMA(kMetricTokenStoreFailed); |
- return; |
- } |
- |
- if (!file_util::CreateDirectory(cache_file_.DirName())) { |
- LOG(WARNING) << "Failed to create directory " |
- << cache_file_.DirName().value(); |
- SampleUMA(kMetricTokenStoreFailed); |
- return; |
- } |
- |
- int size = data.size(); |
- if (file_util::WriteFile(cache_file_, data.c_str(), size) != size) { |
- LOG(WARNING) << "Failed to write " << cache_file_.value(); |
- SampleUMA(kMetricTokenStoreFailed); |
- return; |
- } |
- |
- SampleUMA(kMetricTokenStoreSucceeded); |
-} |
- |
-UserPolicyTokenCache::UserPolicyTokenCache( |
- CloudPolicyDataStore* data_store, |
- const FilePath& cache_file) |
- : ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)), |
- data_store_(data_store) { |
- loader_ = new UserPolicyTokenLoader(weak_ptr_factory_.GetWeakPtr(), |
- cache_file); |
- data_store_->AddObserver(this); |
-} |
- |
-UserPolicyTokenCache::~UserPolicyTokenCache() { |
- if (data_store_) |
- data_store_->RemoveObserver(this); |
-} |
- |
-void UserPolicyTokenCache::Load() { |
- loader_->Load(); |
-} |
- |
-void UserPolicyTokenCache::OnTokenLoaded(const std::string& token, |
- const std::string& device_id) { |
- token_ = token; |
- if (data_store_) { |
- data_store_->set_device_id(device_id); |
- data_store_->SetDeviceToken(token, true); |
- } |
-} |
- |
-void UserPolicyTokenCache::OnDeviceTokenChanged() { |
- const std::string& new_token(data_store_->device_token()); |
- if (!new_token.empty() && !data_store_->device_id().empty()) { |
- if (token_ == new_token) |
- return; |
- |
- token_ = new_token; |
- loader_->Store(new_token, data_store_->device_id()); |
- } |
-} |
- |
-void UserPolicyTokenCache::OnCredentialsChanged() { |
-} |
- |
} // namespace policy |