[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 1 | // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "chrome/browser/policy/user_policy_token_cache.h" |
| 6 | |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 7 | #include "base/bind.h" |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 8 | #include "base/file_util.h" |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 9 | #include "base/metrics/histogram.h" |
| 10 | #include "chrome/browser/policy/enterprise_metrics.h" |
[email protected] | 8a47513 | 2011-07-09 22:17:33 | [diff] [blame] | 11 | #include "chrome/browser/policy/proto/device_management_local.pb.h" |
[email protected] | c38831a1 | 2011-10-28 12:44:49 | [diff] [blame] | 12 | #include "content/public/browser/browser_thread.h" |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 13 | |
[email protected] | 631bb74 | 2011-11-02 11:29:39 | [diff] [blame] | 14 | using content::BrowserThread; |
| 15 | |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 16 | namespace { |
| 17 | |
| 18 | // Other places can sample on the same UMA counter, so make sure they all do |
| 19 | // it on the same thread (UI). |
| 20 | void SampleUMAOnUIThread(policy::MetricToken sample) { |
| 21 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 22 | UMA_HISTOGRAM_ENUMERATION(policy::kMetricToken, sample, |
| 23 | policy::kMetricTokenSize); |
| 24 | } |
| 25 | |
| 26 | void SampleUMA(policy::MetricToken sample) { |
| 27 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
| 28 | BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 29 | base::Bind(&SampleUMAOnUIThread, sample)); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 30 | } |
| 31 | |
| 32 | } // namespace |
| 33 | |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 34 | namespace policy { |
| 35 | |
| 36 | namespace em = enterprise_management; |
| 37 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 38 | UserPolicyTokenLoader::Delegate::~Delegate() {} |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 39 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 40 | UserPolicyTokenLoader::UserPolicyTokenLoader( |
| 41 | const base::WeakPtr<Delegate>& delegate, |
| 42 | const FilePath& cache_file) |
| 43 | : delegate_(delegate), |
| 44 | cache_file_(cache_file) {} |
| 45 | |
| 46 | void UserPolicyTokenLoader::Load() { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 47 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 48 | BrowserThread::PostTask( |
| 49 | BrowserThread::FILE, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 50 | base::Bind(&UserPolicyTokenLoader::LoadOnFileThread, this)); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 51 | } |
| 52 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 53 | void UserPolicyTokenLoader::Store(const std::string& token, |
[email protected] | f5ba12b | 2011-09-21 12:25:38 | [diff] [blame] | 54 | const std::string& device_id) { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 55 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 56 | BrowserThread::PostTask( |
| 57 | BrowserThread::FILE, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 58 | base::Bind(&UserPolicyTokenLoader::StoreOnFileThread, |
| 59 | this, |
| 60 | token, |
| 61 | device_id)); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 62 | } |
| 63 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 64 | UserPolicyTokenLoader::~UserPolicyTokenLoader() { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 65 | } |
| 66 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 67 | void UserPolicyTokenLoader::LoadOnFileThread() { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 68 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
| 69 | std::string device_token; |
| 70 | std::string device_id; |
| 71 | |
| 72 | if (file_util::PathExists(cache_file_)) { |
| 73 | std::string data; |
| 74 | em::DeviceCredentials device_credentials; |
| 75 | if (file_util::ReadFileToString(cache_file_, &data) && |
| 76 | device_credentials.ParseFromArray(data.c_str(), data.size())) { |
| 77 | device_token = device_credentials.device_token(); |
| 78 | device_id = device_credentials.device_id(); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 79 | SampleUMA(kMetricTokenLoadSucceeded); |
| 80 | } else { |
| 81 | SampleUMA(kMetricTokenLoadFailed); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 82 | } |
| 83 | } |
| 84 | |
| 85 | BrowserThread::PostTask( |
| 86 | BrowserThread::UI, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 87 | base::Bind(&UserPolicyTokenLoader::NotifyOnUIThread, |
| 88 | this, |
| 89 | device_token, |
| 90 | device_id)); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 91 | } |
| 92 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 93 | void UserPolicyTokenLoader::NotifyOnUIThread(const std::string& token, |
| 94 | const std::string& device_id) { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 95 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 96 | if (delegate_.get()) |
| 97 | delegate_->OnTokenLoaded(token, device_id); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 98 | } |
| 99 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 100 | void UserPolicyTokenLoader::StoreOnFileThread(const std::string& token, |
| 101 | const std::string& device_id) { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 102 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
| 103 | em::DeviceCredentials device_credentials; |
| 104 | device_credentials.set_device_token(token); |
| 105 | device_credentials.set_device_id(device_id); |
| 106 | std::string data; |
| 107 | bool success = device_credentials.SerializeToString(&data); |
| 108 | if (!success) { |
| 109 | LOG(WARNING) << "Failed serialize device token data, will not write " |
| 110 | << cache_file_.value(); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 111 | SampleUMA(kMetricTokenStoreFailed); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 112 | return; |
| 113 | } |
| 114 | |
| 115 | if (!file_util::CreateDirectory(cache_file_.DirName())) { |
| 116 | LOG(WARNING) << "Failed to create directory " |
| 117 | << cache_file_.DirName().value(); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 118 | SampleUMA(kMetricTokenStoreFailed); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 119 | return; |
| 120 | } |
| 121 | |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 122 | int size = data.size(); |
| 123 | if (file_util::WriteFile(cache_file_, data.c_str(), size) != size) { |
| 124 | LOG(WARNING) << "Failed to write " << cache_file_.value(); |
| 125 | SampleUMA(kMetricTokenStoreFailed); |
[email protected] | 03dd5da | 2011-07-21 13:28:29 | [diff] [blame] | 126 | return; |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 127 | } |
| 128 | |
| 129 | SampleUMA(kMetricTokenStoreSucceeded); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 130 | } |
| 131 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 132 | UserPolicyTokenCache::UserPolicyTokenCache( |
| 133 | CloudPolicyDataStore* data_store, |
| 134 | const FilePath& cache_file) |
| 135 | : ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)), |
| 136 | data_store_(data_store) { |
| 137 | loader_ = new UserPolicyTokenLoader(weak_ptr_factory_.GetWeakPtr(), |
| 138 | cache_file); |
| 139 | data_store_->AddObserver(this); |
| 140 | } |
| 141 | |
| 142 | UserPolicyTokenCache::~UserPolicyTokenCache() { |
| 143 | if (data_store_) |
| 144 | data_store_->RemoveObserver(this); |
| 145 | } |
| 146 | |
| 147 | void UserPolicyTokenCache::Load() { |
| 148 | loader_->Load(); |
| 149 | } |
| 150 | |
| 151 | void UserPolicyTokenCache::OnTokenLoaded(const std::string& token, |
| 152 | const std::string& device_id) { |
| 153 | token_ = token; |
| 154 | if (data_store_) { |
| 155 | data_store_->set_device_id(device_id); |
| 156 | data_store_->SetDeviceToken(token, true); |
| 157 | } |
| 158 | } |
| 159 | |
[email protected] | 8a47513 | 2011-07-09 22:17:33 | [diff] [blame] | 160 | void UserPolicyTokenCache::OnDeviceTokenChanged() { |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 161 | const std::string& new_token(data_store_->device_token()); |
| 162 | if (!new_token.empty() && !data_store_->device_id().empty()) { |
| 163 | if (token_ == new_token) |
| 164 | return; |
| 165 | |
| 166 | token_ = new_token; |
| 167 | loader_->Store(new_token, data_store_->device_id()); |
[email protected] | 8a47513 | 2011-07-09 22:17:33 | [diff] [blame] | 168 | } |
| 169 | } |
| 170 | |
| 171 | void UserPolicyTokenCache::OnCredentialsChanged() { |
| 172 | } |
| 173 | |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 174 | } // namespace policy |