Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(230)

Side by Side Diff: chrome/browser/chromeos/policy/device_policy_decoder_chromeos.cc

Issue 23460030: Clean up device policy definitions. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase. Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/chromeos/policy/device_policy_decoder_chromeos.h" 5 #include "chrome/browser/chromeos/policy/device_policy_decoder_chromeos.h"
6 6
7 #include <limits> 7 #include <limits>
8 8
9 #include "base/callback.h" 9 #include "base/callback.h"
10 #include "base/logging.h" 10 #include "base/logging.h"
(...skipping 126 matching lines...) Expand 10 before | Expand all | Expand 10 after
137 chromeos::kAccountsPrefDeviceLocalAccountsKeyId, 137 chromeos::kAccountsPrefDeviceLocalAccountsKeyId,
138 entry->account_id()); 138 entry->account_id());
139 } 139 }
140 entry_dict->SetIntegerWithoutPathExpansion( 140 entry_dict->SetIntegerWithoutPathExpansion(
141 chromeos::kAccountsPrefDeviceLocalAccountsKeyType, entry->type()); 141 chromeos::kAccountsPrefDeviceLocalAccountsKeyType, entry->type());
142 if (entry->kiosk_app().has_app_id()) { 142 if (entry->kiosk_app().has_app_id()) {
143 entry_dict->SetStringWithoutPathExpansion( 143 entry_dict->SetStringWithoutPathExpansion(
144 chromeos::kAccountsPrefDeviceLocalAccountsKeyKioskAppId, 144 chromeos::kAccountsPrefDeviceLocalAccountsKeyKioskAppId,
145 entry->kiosk_app().app_id()); 145 entry->kiosk_app().app_id());
146 } 146 }
147 if (entry->kiosk_app().has_update_url()) {
148 entry_dict->SetStringWithoutPathExpansion(
149 chromeos::kAccountsPrefDeviceLocalAccountsKeyKioskAppUpdateURL,
150 entry->kiosk_app().update_url());
151 }
152 } else if (entry->has_deprecated_public_session_id()) { 147 } else if (entry->has_deprecated_public_session_id()) {
153 // Deprecated public session specification. 148 // Deprecated public session specification.
154 entry_dict->SetStringWithoutPathExpansion( 149 entry_dict->SetStringWithoutPathExpansion(
155 chromeos::kAccountsPrefDeviceLocalAccountsKeyId, 150 chromeos::kAccountsPrefDeviceLocalAccountsKeyId,
156 entry->deprecated_public_session_id()); 151 entry->deprecated_public_session_id());
157 entry_dict->SetIntegerWithoutPathExpansion( 152 entry_dict->SetIntegerWithoutPathExpansion(
158 chromeos::kAccountsPrefDeviceLocalAccountsKeyType, 153 chromeos::kAccountsPrefDeviceLocalAccountsKeyType,
159 DeviceLocalAccount::TYPE_PUBLIC_SESSION); 154 DeviceLocalAccount::TYPE_PUBLIC_SESSION);
160 } 155 }
161 account_list->Append(entry_dict.release()); 156 account_list->Append(entry_dict.release());
(...skipping 290 matching lines...) Expand 10 before | Expand all | Expand 10 after
452 if (value) 447 if (value)
453 allowed_connection_types->Append(value); 448 allowed_connection_types->Append(value);
454 } 449 }
455 policies->Set(key::kDeviceUpdateAllowedConnectionTypes, 450 policies->Set(key::kDeviceUpdateAllowedConnectionTypes,
456 POLICY_LEVEL_MANDATORY, 451 POLICY_LEVEL_MANDATORY,
457 POLICY_SCOPE_MACHINE, 452 POLICY_SCOPE_MACHINE,
458 allowed_connection_types, 453 allowed_connection_types,
459 NULL); 454 NULL);
460 } 455 }
461 456
457 if (container.has_http_downloads_enabled()) {
458 policies->Set(
459 key::kDeviceUpdateHttpDownloadsEnabled,
460 POLICY_LEVEL_MANDATORY,
461 POLICY_SCOPE_MACHINE,
462 Value::CreateBooleanValue(container.http_downloads_enabled()),
463 NULL);
464 }
465
462 if (container.has_reboot_after_update()) { 466 if (container.has_reboot_after_update()) {
463 policies->Set(key::kRebootAfterUpdate, 467 policies->Set(key::kRebootAfterUpdate,
464 POLICY_LEVEL_MANDATORY, 468 POLICY_LEVEL_MANDATORY,
465 POLICY_SCOPE_MACHINE, 469 POLICY_SCOPE_MACHINE,
466 Value::CreateBooleanValue(container.reboot_after_update()), 470 Value::CreateBooleanValue(container.reboot_after_update()),
467 NULL); 471 NULL);
468 } 472 }
469 473
470 if (container.has_p2p_enabled()) { 474 if (container.has_p2p_enabled()) {
471 policies->Set(key::kDeviceAutoUpdateP2PEnabled, 475 policies->Set(key::kDeviceAutoUpdateP2PEnabled,
(...skipping 210 matching lines...) Expand 10 before | Expand all | Expand 10 after
682 DecodeLoginPolicies(policy, policies); 686 DecodeLoginPolicies(policy, policies);
683 DecodeKioskPolicies(policy, policies, install_attributes); 687 DecodeKioskPolicies(policy, policies, install_attributes);
684 DecodeNetworkPolicies(policy, policies, install_attributes); 688 DecodeNetworkPolicies(policy, policies, install_attributes);
685 DecodeReportingPolicies(policy, policies); 689 DecodeReportingPolicies(policy, policies);
686 DecodeAutoUpdatePolicies(policy, policies); 690 DecodeAutoUpdatePolicies(policy, policies);
687 DecodeAccessibilityPolicies(policy, policies); 691 DecodeAccessibilityPolicies(policy, policies);
688 DecodeGenericPolicies(policy, policies); 692 DecodeGenericPolicies(policy, policies);
689 } 693 }
690 694
691 } // namespace policy 695 } // namespace policy
OLDNEW
« no previous file with comments | « chrome/browser/chromeos/policy/device_local_account.cc ('k') | chrome/browser/chromeos/settings/cros_settings_names.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698