OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Most of this code is copied from various classes in | 5 // Most of this code is copied from various classes in |
6 // src/chrome/browser/policy. In particular, look at | 6 // src/chrome/browser/policy. In particular, look at |
7 // | 7 // |
8 // file_based_policy_loader.{h,cc} | 8 // file_based_policy_loader.{h,cc} |
9 // config_dir_policy_provider.{h,cc} | 9 // config_dir_policy_provider.{h,cc} |
10 // | 10 // |
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
44 | 44 |
45 } // namespace | 45 } // namespace |
46 | 46 |
47 class PolicyWatcherLinux : public PolicyWatcher { | 47 class PolicyWatcherLinux : public PolicyWatcher { |
48 public: | 48 public: |
49 PolicyWatcherLinux(scoped_refptr<base::SingleThreadTaskRunner> task_runner, | 49 PolicyWatcherLinux(scoped_refptr<base::SingleThreadTaskRunner> task_runner, |
50 const base::FilePath& config_dir) | 50 const base::FilePath& config_dir) |
51 : PolicyWatcher(task_runner), | 51 : PolicyWatcher(task_runner), |
52 config_dir_(config_dir), | 52 config_dir_(config_dir), |
53 weak_factory_(this) { | 53 weak_factory_(this) { |
54 // Detach the factory because we ensure that only the policy thread ever | |
55 // calls methods on this. Also, the API contract of having to call | |
56 // StopWatching() (which signals completion) after StartWatching() | |
57 // before this object can be destructed ensures there are no users of | |
58 // this object before it is destructed. | |
59 weak_factory_.DetachFromThread(); | |
60 } | 54 } |
61 | 55 |
62 virtual ~PolicyWatcherLinux() {} | 56 virtual ~PolicyWatcherLinux() {} |
63 | 57 |
64 protected: | 58 protected: |
65 virtual void StartWatchingInternal() OVERRIDE { | 59 virtual void StartWatchingInternal() OVERRIDE { |
66 DCHECK(OnPolicyWatcherThread()); | 60 DCHECK(OnPolicyWatcherThread()); |
67 watcher_.reset(new base::FilePathWatcher()); | 61 watcher_.reset(new base::FilePathWatcher()); |
68 | 62 |
69 if (!config_dir_.empty() && | 63 if (!config_dir_.empty() && |
70 !watcher_->Watch( | 64 !watcher_->Watch( |
71 config_dir_, false, | 65 config_dir_, false, |
72 base::Bind(&PolicyWatcherLinux::OnFilePathChanged, | 66 base::Bind(&PolicyWatcherLinux::OnFilePathChanged, |
73 weak_factory_.GetWeakPtr()))) { | 67 weak_factory_.GetWeakPtr()))) { |
74 OnFilePathChanged(config_dir_, true); | 68 OnFilePathChanged(config_dir_, true); |
75 } | 69 } |
76 | 70 |
77 // There might have been changes to the directory in the time between | 71 // There might have been changes to the directory in the time between |
78 // construction of the loader and initialization of the watcher. Call reload | 72 // construction of the loader and initialization of the watcher. Call reload |
79 // to detect if that is the case. | 73 // to detect if that is the case. |
80 Reload(); | 74 Reload(); |
81 | 75 |
82 ScheduleFallbackReloadTask(); | 76 ScheduleFallbackReloadTask(); |
83 } | 77 } |
84 | 78 |
85 virtual void StopWatchingInternal() OVERRIDE { | 79 virtual void StopWatchingInternal() OVERRIDE { |
86 DCHECK(OnPolicyWatcherThread()); | 80 DCHECK(OnPolicyWatcherThread()); |
87 // Cancel any inflight requests. | 81 |
| 82 // Stop watching for changes to files in the policies directory. |
88 watcher_.reset(); | 83 watcher_.reset(); |
| 84 |
| 85 // Orphan any pending OnFilePathChanged tasks. |
| 86 weak_factory_.InvalidateWeakPtrs(); |
89 } | 87 } |
90 | 88 |
91 private: | 89 private: |
92 void OnFilePathChanged(const base::FilePath& path, bool error) { | 90 void OnFilePathChanged(const base::FilePath& path, bool error) { |
93 DCHECK(OnPolicyWatcherThread()); | 91 DCHECK(OnPolicyWatcherThread()); |
94 | 92 |
95 if (!error) | 93 if (!error) |
96 Reload(); | 94 Reload(); |
97 else | 95 else |
98 LOG(ERROR) << "PolicyWatcherLinux on " << path.value() << " failed."; | 96 LOG(ERROR) << "PolicyWatcherLinux on " << path.value() << " failed."; |
(...skipping 147 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
246 }; | 244 }; |
247 | 245 |
248 PolicyWatcher* PolicyWatcher::Create( | 246 PolicyWatcher* PolicyWatcher::Create( |
249 scoped_refptr<base::SingleThreadTaskRunner> task_runner) { | 247 scoped_refptr<base::SingleThreadTaskRunner> task_runner) { |
250 base::FilePath policy_dir(kPolicyDir); | 248 base::FilePath policy_dir(kPolicyDir); |
251 return new PolicyWatcherLinux(task_runner, policy_dir); | 249 return new PolicyWatcherLinux(task_runner, policy_dir); |
252 } | 250 } |
253 | 251 |
254 } // namespace policy_hack | 252 } // namespace policy_hack |
255 } // namespace remoting | 253 } // namespace remoting |
OLD | NEW |