Index: chromeos/network/policy_util.cc |
diff --git a/chromeos/network/policy_util.cc b/chromeos/network/policy_util.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..e1a01a78dbad87048a591f89b29eaa615e040730 |
--- /dev/null |
+++ b/chromeos/network/policy_util.cc |
@@ -0,0 +1,200 @@ |
+// Copyright 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chromeos/network/policy_util.h" |
+ |
+#include "base/logging.h" |
+#include "chromeos/network/network_profile.h" |
+#include "chromeos/network/network_ui_data.h" |
+#include "chromeos/network/onc/onc_constants.h" |
+#include "chromeos/network/onc/onc_merger.h" |
+#include "chromeos/network/onc/onc_normalizer.h" |
+#include "chromeos/network/onc/onc_signature.h" |
+#include "chromeos/network/onc/onc_translator.h" |
+#include "chromeos/network/onc/onc_utils.h" |
+#include "chromeos/network/shill_property_util.h" |
+#include "third_party/cros_system_api/dbus/service_constants.h" |
+ |
+namespace chromeos { |
+ |
+namespace policy_util { |
+ |
+namespace { |
+ |
+// This fake credential contains a random postfix which is extremly unlikely to |
+// be used by any user. |
+const char kFakeCredential[] = "FAKE_CREDENTIAL_VPaJDV9x"; |
+ |
+ |
+// Removes all kFakeCredential values from sensitive fields (determined by |
+// onc::FieldIsCredential) of |onc_object|. |
+void RemoveFakeCredentials( |
+ const onc::OncValueSignature& signature, |
+ base::DictionaryValue* onc_object) { |
+ base::DictionaryValue::Iterator it(*onc_object); |
+ while (!it.IsAtEnd()) { |
+ base::Value* value = NULL; |
+ std::string field_name = it.key(); |
+ // We need the non-const entry to remove nested values but DictionaryValue |
+ // has no non-const iterator. |
+ onc_object->GetWithoutPathExpansion(field_name, &value); |
+ // Advance before delete. |
+ it.Advance(); |
+ |
+ // If |value| is a dictionary, recurse. |
+ base::DictionaryValue* nested_object = NULL; |
+ if (value->GetAsDictionary(&nested_object)) { |
+ const onc::OncFieldSignature* field_signature = |
+ onc::GetFieldSignature(signature, field_name); |
+ |
+ RemoveFakeCredentials(*field_signature->value_signature, |
+ nested_object); |
+ continue; |
+ } |
+ |
+ // If |value| is a string, check if it is a fake credential. |
+ std::string string_value; |
+ if (value->GetAsString(&string_value) && |
+ onc::FieldIsCredential(signature, field_name)) { |
+ if (string_value == kFakeCredential) { |
+ // The value wasn't modified by the UI, thus we remove the field to keep |
+ // the existing value that is stored in Shill. |
+ onc_object->RemoveWithoutPathExpansion(field_name, NULL); |
+ } |
+ // Otherwise, the value is set and modified by the UI, thus we keep that |
+ // value to overwrite whatever is stored in Shill. |
+ } |
+ } |
+} |
+ |
+// Returns true if |policy| matches |actual_network|, which must be part of a |
+// ONC NetworkConfiguration. This should be the only such matching function |
+// within Chrome. Shill does such matching in several functions for network |
+// identification. For compatibility, we currently should stick to Shill's |
+// matching behavior. |
+bool IsPolicyMatching(const base::DictionaryValue& policy, |
+ const base::DictionaryValue& actual_network) { |
+ std::string policy_type; |
+ policy.GetStringWithoutPathExpansion(onc::network_config::kType, |
+ &policy_type); |
+ std::string network_type; |
+ actual_network.GetStringWithoutPathExpansion(onc::network_config::kType, |
+ &network_type); |
+ if (policy_type != network_type) |
+ return false; |
+ |
+ if (network_type != onc::network_type::kWiFi) |
+ return false; |
+ |
+ const base::DictionaryValue* policy_wifi = NULL; |
+ policy.GetDictionaryWithoutPathExpansion(onc::network_config::kWiFi, |
+ &policy_wifi); |
+ const base::DictionaryValue* actual_wifi = NULL; |
+ actual_network.GetDictionaryWithoutPathExpansion(onc::network_config::kWiFi, |
+ &actual_wifi); |
+ if (!policy_wifi || !actual_wifi) |
+ return false; |
+ |
+ std::string policy_ssid; |
+ policy_wifi->GetStringWithoutPathExpansion(onc::wifi::kSSID, &policy_ssid); |
+ std::string actual_ssid; |
+ actual_wifi->GetStringWithoutPathExpansion(onc::wifi::kSSID, &actual_ssid); |
+ return (policy_ssid == actual_ssid); |
+} |
+ |
+} // namespace |
+ |
+scoped_ptr<base::DictionaryValue> CreateShillConfiguration( |
+ const NetworkProfile& profile, |
+ const std::string& guid, |
+ const base::DictionaryValue* policy, |
+ const base::DictionaryValue* settings) { |
+ scoped_ptr<base::DictionaryValue> effective; |
+ onc::ONCSource onc_source = onc::ONC_SOURCE_NONE; |
+ if (policy) { |
+ if (profile.type() == NetworkProfile::TYPE_SHARED) { |
+ effective = onc::MergeSettingsAndPoliciesToEffective( |
+ NULL, // no user policy |
+ policy, // device policy |
+ NULL, // no user settings |
+ settings); // shared settings |
+ onc_source = onc::ONC_SOURCE_DEVICE_POLICY; |
+ } else if (profile.type() == NetworkProfile::TYPE_USER) { |
+ effective = onc::MergeSettingsAndPoliciesToEffective( |
+ policy, // user policy |
+ NULL, // no device policy |
+ settings, // user settings |
+ NULL); // no shared settings |
+ onc_source = onc::ONC_SOURCE_USER_POLICY; |
+ } else { |
+ NOTREACHED(); |
+ } |
+ } else if (settings) { |
+ effective.reset(settings->DeepCopy()); |
+ // TODO(pneubeck): change to source ONC_SOURCE_USER |
+ onc_source = onc::ONC_SOURCE_NONE; |
+ } else { |
+ NOTREACHED(); |
+ onc_source = onc::ONC_SOURCE_NONE; |
+ } |
+ |
+ RemoveFakeCredentials(onc::kNetworkConfigurationSignature, |
+ effective.get()); |
+ |
+ effective->SetStringWithoutPathExpansion(onc::network_config::kGUID, guid); |
+ |
+ // Remove irrelevant fields. |
+ onc::Normalizer normalizer(true /* remove recommended fields */); |
+ effective = normalizer.NormalizeObject(&onc::kNetworkConfigurationSignature, |
+ *effective); |
+ |
+ scoped_ptr<base::DictionaryValue> shill_dictionary( |
+ onc::TranslateONCObjectToShill(&onc::kNetworkConfigurationSignature, |
+ *effective)); |
+ |
+ shill_dictionary->SetStringWithoutPathExpansion(flimflam::kProfileProperty, |
+ profile.path); |
+ |
+ scoped_ptr<NetworkUIData> ui_data; |
+ if (policy) |
+ ui_data = NetworkUIData::CreateFromONC(onc_source, *policy); |
+ else |
+ ui_data.reset(new NetworkUIData()); |
+ |
+ if (settings) { |
+ // Shill doesn't know that sensitive data is contained in the UIData |
+ // property and might write it into logs or other insecure places. Thus, we |
+ // have to remove or mask credentials. |
+ // |
+ // Shill's GetProperties doesn't return credentials. Masking credentials |
+ // instead of just removing them, allows remembering if a credential is set |
+ // or not. |
+ scoped_ptr<base::DictionaryValue> sanitized_settings( |
+ onc::MaskCredentialsInOncObject(onc::kNetworkConfigurationSignature, |
+ *settings, |
+ kFakeCredential)); |
+ ui_data->set_user_settings(sanitized_settings.Pass()); |
+ } |
+ |
+ shill_property_util::SetUIData(*ui_data, shill_dictionary.get()); |
+ |
+ VLOG(2) << "Created Shill properties: " << *shill_dictionary; |
+ |
+ return shill_dictionary.Pass(); |
+} |
+ |
+const base::DictionaryValue* FindMatchingPolicy( |
+ const GuidToPolicyMap& policies, |
+ const base::DictionaryValue& actual_network) { |
+ for (GuidToPolicyMap::const_iterator it = policies.begin(); |
+ it != policies.end(); ++it) { |
+ if (IsPolicyMatching(*it->second, actual_network)) |
+ return it->second; |
+ } |
+ return NULL; |
+} |
+ |
+} // namespace policy_util |
+ |
+} // namespace chromeos |