OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/policy/user_policy_token_cache.h" | |
6 | |
7 #include "base/bind.h" | |
8 #include "base/file_util.h" | |
9 #include "base/metrics/histogram.h" | |
10 #include "chrome/browser/policy/enterprise_metrics.h" | |
11 #include "chrome/browser/policy/proto/device_management_local.pb.h" | |
12 #include "content/public/browser/browser_thread.h" | |
13 | |
14 using content::BrowserThread; | |
15 | |
16 namespace { | |
17 | |
18 // Other places can sample on the same UMA counter, so make sure they all do | |
19 // it on the same thread (UI). | |
20 void SampleUMAOnUIThread(policy::MetricToken sample) { | |
21 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
22 UMA_HISTOGRAM_ENUMERATION(policy::kMetricToken, sample, | |
23 policy::kMetricTokenSize); | |
24 } | |
25 | |
26 void SampleUMA(policy::MetricToken sample) { | |
27 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); | |
28 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, | |
29 base::Bind(&SampleUMAOnUIThread, sample)); | |
30 } | |
31 | |
32 } // namespace | |
33 | |
34 namespace policy { | |
35 | |
36 namespace em = enterprise_management; | |
37 | |
38 UserPolicyTokenLoader::Delegate::~Delegate() {} | |
39 | |
40 UserPolicyTokenLoader::UserPolicyTokenLoader( | |
41 const base::WeakPtr<Delegate>& delegate, | |
42 const FilePath& cache_file) | |
43 : delegate_(delegate), | |
44 cache_file_(cache_file) {} | |
45 | |
46 void UserPolicyTokenLoader::Load() { | |
47 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
48 BrowserThread::PostTask( | |
49 BrowserThread::FILE, FROM_HERE, | |
50 base::Bind(&UserPolicyTokenLoader::LoadOnFileThread, this)); | |
51 } | |
52 | |
53 void UserPolicyTokenLoader::Store(const std::string& token, | |
54 const std::string& device_id) { | |
55 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
56 BrowserThread::PostTask( | |
57 BrowserThread::FILE, FROM_HERE, | |
58 base::Bind(&UserPolicyTokenLoader::StoreOnFileThread, | |
59 this, | |
60 token, | |
61 device_id)); | |
62 } | |
63 | |
64 UserPolicyTokenLoader::~UserPolicyTokenLoader() { | |
65 } | |
66 | |
67 void UserPolicyTokenLoader::LoadOnFileThread() { | |
68 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); | |
69 std::string device_token; | |
70 std::string device_id; | |
71 | |
72 if (file_util::PathExists(cache_file_)) { | |
73 std::string data; | |
74 em::DeviceCredentials device_credentials; | |
75 if (file_util::ReadFileToString(cache_file_, &data) && | |
76 device_credentials.ParseFromArray(data.c_str(), data.size())) { | |
77 device_token = device_credentials.device_token(); | |
78 device_id = device_credentials.device_id(); | |
79 SampleUMA(kMetricTokenLoadSucceeded); | |
80 } else { | |
81 SampleUMA(kMetricTokenLoadFailed); | |
82 } | |
83 } | |
84 | |
85 BrowserThread::PostTask( | |
86 BrowserThread::UI, FROM_HERE, | |
87 base::Bind(&UserPolicyTokenLoader::NotifyOnUIThread, | |
88 this, | |
89 device_token, | |
90 device_id)); | |
91 } | |
92 | |
93 void UserPolicyTokenLoader::NotifyOnUIThread(const std::string& token, | |
94 const std::string& device_id) { | |
95 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
96 if (delegate_.get()) | |
97 delegate_->OnTokenLoaded(token, device_id); | |
98 } | |
99 | |
100 void UserPolicyTokenLoader::StoreOnFileThread(const std::string& token, | |
101 const std::string& device_id) { | |
102 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); | |
103 em::DeviceCredentials device_credentials; | |
104 device_credentials.set_device_token(token); | |
105 device_credentials.set_device_id(device_id); | |
106 std::string data; | |
107 bool success = device_credentials.SerializeToString(&data); | |
108 if (!success) { | |
109 LOG(WARNING) << "Failed serialize device token data, will not write " | |
110 << cache_file_.value(); | |
111 SampleUMA(kMetricTokenStoreFailed); | |
112 return; | |
113 } | |
114 | |
115 if (!file_util::CreateDirectory(cache_file_.DirName())) { | |
116 LOG(WARNING) << "Failed to create directory " | |
117 << cache_file_.DirName().value(); | |
118 SampleUMA(kMetricTokenStoreFailed); | |
119 return; | |
120 } | |
121 | |
122 int size = data.size(); | |
123 if (file_util::WriteFile(cache_file_, data.c_str(), size) != size) { | |
124 LOG(WARNING) << "Failed to write " << cache_file_.value(); | |
125 SampleUMA(kMetricTokenStoreFailed); | |
126 return; | |
127 } | |
128 | |
129 SampleUMA(kMetricTokenStoreSucceeded); | |
130 } | |
131 | |
132 UserPolicyTokenCache::UserPolicyTokenCache( | |
133 CloudPolicyDataStore* data_store, | |
134 const FilePath& cache_file) | |
135 : ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)), | |
136 data_store_(data_store) { | |
137 loader_ = new UserPolicyTokenLoader(weak_ptr_factory_.GetWeakPtr(), | |
138 cache_file); | |
139 data_store_->AddObserver(this); | |
140 } | |
141 | |
142 UserPolicyTokenCache::~UserPolicyTokenCache() { | |
143 if (data_store_) | |
144 data_store_->RemoveObserver(this); | |
145 } | |
146 | |
147 void UserPolicyTokenCache::Load() { | |
148 loader_->Load(); | |
149 } | |
150 | |
151 void UserPolicyTokenCache::OnTokenLoaded(const std::string& token, | |
152 const std::string& device_id) { | |
153 token_ = token; | |
154 if (data_store_) { | |
155 data_store_->set_device_id(device_id); | |
156 data_store_->SetDeviceToken(token, true); | |
157 } | |
158 } | |
159 | |
160 void UserPolicyTokenCache::OnDeviceTokenChanged() { | |
161 const std::string& new_token(data_store_->device_token()); | |
162 if (!new_token.empty() && !data_store_->device_id().empty()) { | |
163 if (token_ == new_token) | |
164 return; | |
165 | |
166 token_ = new_token; | |
167 loader_->Store(new_token, data_store_->device_id()); | |
168 } | |
169 } | |
170 | |
171 void UserPolicyTokenCache::OnCredentialsChanged() { | |
172 } | |
173 | |
174 } // namespace policy | |
OLD | NEW |