| Index: chrome/browser/policy/device_policy_cache.cc
|
| diff --git a/chrome/browser/policy/device_policy_cache.cc b/chrome/browser/policy/device_policy_cache.cc
|
| deleted file mode 100644
|
| index 88fdea72838b262c272dce6128cf2e487cfb737b..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/policy/device_policy_cache.cc
|
| +++ /dev/null
|
| @@ -1,261 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/policy/device_policy_cache.h"
|
| -
|
| -#include "base/bind.h"
|
| -#include "base/logging.h"
|
| -#include "base/memory/scoped_ptr.h"
|
| -#include "base/metrics/histogram.h"
|
| -#include "base/values.h"
|
| -#include "chrome/browser/policy/cloud_policy_data_store.h"
|
| -#include "chrome/browser/policy/device_policy_decoder_chromeos.h"
|
| -#include "chrome/browser/policy/enterprise_install_attributes.h"
|
| -#include "chrome/browser/policy/enterprise_metrics.h"
|
| -#include "chrome/browser/policy/policy_map.h"
|
| -#include "chrome/browser/policy/proto/chrome_device_policy.pb.h"
|
| -#include "chrome/browser/policy/proto/device_management_backend.pb.h"
|
| -#include "chrome/browser/policy/proto/device_management_local.pb.h"
|
| -#include "google_apis/gaia/gaia_auth_util.h"
|
| -
|
| -namespace em = enterprise_management;
|
| -
|
| -namespace policy {
|
| -
|
| -DevicePolicyCache::DevicePolicyCache(
|
| - CloudPolicyDataStore* data_store,
|
| - EnterpriseInstallAttributes* install_attributes)
|
| - : data_store_(data_store),
|
| - install_attributes_(install_attributes),
|
| - device_settings_service_(chromeos::DeviceSettingsService::Get()),
|
| - ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)),
|
| - policy_fetch_pending_(false) {
|
| - device_settings_service_->AddObserver(this);
|
| -}
|
| -
|
| -DevicePolicyCache::DevicePolicyCache(
|
| - CloudPolicyDataStore* data_store,
|
| - EnterpriseInstallAttributes* install_attributes,
|
| - chromeos::DeviceSettingsService* device_settings_service)
|
| - : data_store_(data_store),
|
| - install_attributes_(install_attributes),
|
| - device_settings_service_(device_settings_service),
|
| - ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)),
|
| - policy_fetch_pending_(false) {
|
| - device_settings_service_->AddObserver(this);
|
| -}
|
| -
|
| -DevicePolicyCache::~DevicePolicyCache() {
|
| - device_settings_service_->RemoveObserver(this);
|
| -}
|
| -
|
| -void DevicePolicyCache::Load() {
|
| - DeviceSettingsUpdated();
|
| -}
|
| -
|
| -bool DevicePolicyCache::SetPolicy(const em::PolicyFetchResponse& policy) {
|
| - DCHECK(IsReady());
|
| -
|
| - // Make sure we have an enterprise device.
|
| - std::string registration_domain(install_attributes_->GetDomain());
|
| - if (registration_domain.empty()) {
|
| - LOG(WARNING) << "Refusing to accept policy on non-enterprise device.";
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy,
|
| - kMetricPolicyFetchNonEnterpriseDevice,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::POLICY_LOCAL_ERROR);
|
| - return false;
|
| - }
|
| -
|
| - // Check the user this policy is for against the device-locked name.
|
| - em::PolicyData policy_data;
|
| - if (!policy_data.ParseFromString(policy.policy_data())) {
|
| - LOG(WARNING) << "Invalid policy protobuf";
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyFetchInvalidPolicy,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::POLICY_LOCAL_ERROR);
|
| - return false;
|
| - }
|
| -
|
| - // Existing installations may not have a canonicalized version of the
|
| - // registration domain in install attributes, so lower-case the data here.
|
| - if (registration_domain != gaia::ExtractDomainName(policy_data.username())) {
|
| - LOG(WARNING) << "Refusing policy blob for " << policy_data.username()
|
| - << " which doesn't match domain " << registration_domain;
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyFetchUserMismatch,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::POLICY_LOCAL_ERROR);
|
| - return false;
|
| - }
|
| -
|
| - set_last_policy_refresh_time(base::Time::NowFromSystemTime());
|
| -
|
| - // Start a store operation.
|
| - policy_fetch_pending_ = true;
|
| - device_settings_service_->Store(
|
| - scoped_ptr<em::PolicyFetchResponse>(new em::PolicyFetchResponse(policy)),
|
| - base::Bind(&DevicePolicyCache::PolicyStoreOpCompleted,
|
| - weak_ptr_factory_.GetWeakPtr()));
|
| - return true;
|
| -}
|
| -
|
| -void DevicePolicyCache::SetUnmanaged() {
|
| - LOG(WARNING) << "Tried to set DevicePolicyCache to 'unmanaged'!";
|
| - // This is not supported for DevicePolicyCache.
|
| -}
|
| -
|
| -void DevicePolicyCache::SetFetchingDone() {
|
| - // Don't send the notification just yet if there is a pending policy
|
| - // store/reload cycle.
|
| - if (!policy_fetch_pending_)
|
| - CloudPolicyCacheBase::SetFetchingDone();
|
| -}
|
| -
|
| -void DevicePolicyCache::OwnershipStatusChanged() {}
|
| -
|
| -void DevicePolicyCache::DeviceSettingsUpdated() {
|
| - DCHECK(CalledOnValidThread());
|
| - chromeos::DeviceSettingsService::Status status =
|
| - device_settings_service_->status();
|
| - const em::PolicyData* policy_data = device_settings_service_->policy_data();
|
| - if (status == chromeos::DeviceSettingsService::STORE_SUCCESS &&
|
| - !policy_data) {
|
| - // Initial policy load is still pending.
|
| - return;
|
| - }
|
| -
|
| - if (!IsReady()) {
|
| - std::string device_token;
|
| - InstallInitialPolicy(status, policy_data, &device_token);
|
| - SetTokenAndFlagReady(device_token);
|
| - } else { // In other words, IsReady() == true
|
| - if (status != chromeos::DeviceSettingsService::STORE_SUCCESS ||
|
| - !policy_data) {
|
| - if (status == chromeos::DeviceSettingsService::STORE_VALIDATION_ERROR) {
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyFetchBadSignature,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::SIGNATURE_MISMATCH);
|
| - } else {
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyFetchOtherFailed,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::POLICY_LOCAL_ERROR);
|
| - }
|
| - } else {
|
| - em::PolicyFetchResponse policy_response;
|
| - CHECK(policy_data->SerializeToString(
|
| - policy_response.mutable_policy_data()));
|
| - bool ok = SetPolicyInternal(policy_response, NULL, false);
|
| - if (ok) {
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyFetchOK,
|
| - kMetricPolicySize);
|
| - }
|
| - }
|
| - }
|
| -}
|
| -
|
| -bool DevicePolicyCache::DecodePolicyData(const em::PolicyData& policy_data,
|
| - PolicyMap* policies) {
|
| - em::ChromeDeviceSettingsProto policy;
|
| - if (!policy.ParseFromString(policy_data.policy_value())) {
|
| - LOG(WARNING) << "Failed to parse ChromeDeviceSettingsProto.";
|
| - return false;
|
| - }
|
| - DecodeDevicePolicy(policy, policies, install_attributes_);
|
| - return true;
|
| -}
|
| -
|
| -void DevicePolicyCache::PolicyStoreOpCompleted() {
|
| - DCHECK(CalledOnValidThread());
|
| - chromeos::DeviceSettingsService::Status status =
|
| - device_settings_service_->status();
|
| - if (status != chromeos::DeviceSettingsService::STORE_SUCCESS) {
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyStoreFailed,
|
| - kMetricPolicySize);
|
| - if (status == chromeos::DeviceSettingsService::STORE_VALIDATION_ERROR) {
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyFetchBadSignature,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::SIGNATURE_MISMATCH);
|
| - } else {
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyFetchOtherFailed,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::POLICY_LOCAL_ERROR);
|
| - }
|
| - CheckFetchingDone();
|
| - return;
|
| - }
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyStoreSucceeded,
|
| - kMetricPolicySize);
|
| -
|
| - CheckFetchingDone();
|
| -}
|
| -
|
| -void DevicePolicyCache::InstallInitialPolicy(
|
| - chromeos::DeviceSettingsService::Status status,
|
| - const em::PolicyData* policy_data,
|
| - std::string* device_token) {
|
| - if (status == chromeos::DeviceSettingsService::STORE_NO_POLICY ||
|
| - status == chromeos::DeviceSettingsService::STORE_KEY_UNAVAILABLE) {
|
| - InformNotifier(CloudPolicySubsystem::UNENROLLED,
|
| - CloudPolicySubsystem::NO_DETAILS);
|
| - return;
|
| - }
|
| - if (!policy_data) {
|
| - LOG(WARNING) << "Failed to parse PolicyData protobuf.";
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyLoadFailed,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::POLICY_LOCAL_ERROR);
|
| - return;
|
| - }
|
| - if (!policy_data->has_request_token() ||
|
| - policy_data->request_token().empty()) {
|
| - SetUnmanagedInternal(base::Time::NowFromSystemTime());
|
| - InformNotifier(CloudPolicySubsystem::UNMANAGED,
|
| - CloudPolicySubsystem::NO_DETAILS);
|
| - // TODO(jkummerow): Reminder: When we want to feed device-wide settings
|
| - // made by a local owner into this cache, we need to call
|
| - // SetPolicyInternal() here.
|
| - return;
|
| - }
|
| - if (!policy_data->has_username() || !policy_data->has_device_id()) {
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyLoadFailed,
|
| - kMetricPolicySize);
|
| - InformNotifier(CloudPolicySubsystem::LOCAL_ERROR,
|
| - CloudPolicySubsystem::POLICY_LOCAL_ERROR);
|
| - return;
|
| - }
|
| - UMA_HISTOGRAM_ENUMERATION(kMetricPolicy, kMetricPolicyLoadSucceeded,
|
| - kMetricPolicySize);
|
| - data_store_->set_user_name(policy_data->username());
|
| - data_store_->set_device_id(policy_data->device_id());
|
| - *device_token = policy_data->request_token();
|
| - base::Time timestamp;
|
| - em::PolicyFetchResponse policy_response;
|
| - CHECK(policy_data->SerializeToString(policy_response.mutable_policy_data()));
|
| - if (SetPolicyInternal(policy_response, ×tamp, true))
|
| - set_last_policy_refresh_time(timestamp);
|
| -}
|
| -
|
| -void DevicePolicyCache::SetTokenAndFlagReady(const std::string& device_token) {
|
| - // We need to call SetDeviceToken unconditionally to indicate the cache has
|
| - // finished loading.
|
| - data_store_->SetDeviceToken(device_token, true);
|
| - SetReady();
|
| -}
|
| -
|
| -void DevicePolicyCache::CheckFetchingDone() {
|
| - if (policy_fetch_pending_) {
|
| - CloudPolicyCacheBase::SetFetchingDone();
|
| - policy_fetch_pending_ = false;
|
| - }
|
| -}
|
| -
|
| -} // namespace policy
|
|
|