blob: 64ab1d76f1d6fbad8836e325b0b1392913c8d83b [file] [log] [blame]
[email protected]eb938e22011-06-21 20:56:181// Copyright (c) 2011 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "chrome/browser/policy/user_policy_token_cache.h"
6
[email protected]d203dec2011-10-04 13:18:167#include "base/bind.h"
[email protected]eb938e22011-06-21 20:56:188#include "base/file_util.h"
[email protected]c94de182011-07-08 15:44:409#include "base/metrics/histogram.h"
10#include "chrome/browser/policy/enterprise_metrics.h"
[email protected]8a475132011-07-09 22:17:3311#include "chrome/browser/policy/proto/device_management_local.pb.h"
[email protected]c38831a12011-10-28 12:44:4912#include "content/public/browser/browser_thread.h"
[email protected]eb938e22011-06-21 20:56:1813
[email protected]631bb742011-11-02 11:29:3914using content::BrowserThread;
15
[email protected]c94de182011-07-08 15:44:4016namespace {
17
18// Other places can sample on the same UMA counter, so make sure they all do
19// it on the same thread (UI).
20void SampleUMAOnUIThread(policy::MetricToken sample) {
21 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
22 UMA_HISTOGRAM_ENUMERATION(policy::kMetricToken, sample,
23 policy::kMetricTokenSize);
24}
25
26void SampleUMA(policy::MetricToken sample) {
27 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
28 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1629 base::Bind(&SampleUMAOnUIThread, sample));
[email protected]c94de182011-07-08 15:44:4030}
31
32} // namespace
33
[email protected]eb938e22011-06-21 20:56:1834namespace policy {
35
36namespace em = enterprise_management;
37
[email protected]3f8fa2d2011-07-14 18:48:3938UserPolicyTokenLoader::Delegate::~Delegate() {}
[email protected]eb938e22011-06-21 20:56:1839
[email protected]3f8fa2d2011-07-14 18:48:3940UserPolicyTokenLoader::UserPolicyTokenLoader(
41 const base::WeakPtr<Delegate>& delegate,
42 const FilePath& cache_file)
43 : delegate_(delegate),
44 cache_file_(cache_file) {}
45
46void UserPolicyTokenLoader::Load() {
[email protected]eb938e22011-06-21 20:56:1847 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
48 BrowserThread::PostTask(
49 BrowserThread::FILE, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1650 base::Bind(&UserPolicyTokenLoader::LoadOnFileThread, this));
[email protected]eb938e22011-06-21 20:56:1851}
52
[email protected]3f8fa2d2011-07-14 18:48:3953void UserPolicyTokenLoader::Store(const std::string& token,
[email protected]f5ba12b2011-09-21 12:25:3854 const std::string& device_id) {
[email protected]eb938e22011-06-21 20:56:1855 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
56 BrowserThread::PostTask(
57 BrowserThread::FILE, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1658 base::Bind(&UserPolicyTokenLoader::StoreOnFileThread,
59 this,
60 token,
61 device_id));
[email protected]eb938e22011-06-21 20:56:1862}
63
[email protected]3f8fa2d2011-07-14 18:48:3964UserPolicyTokenLoader::~UserPolicyTokenLoader() {
[email protected]eb938e22011-06-21 20:56:1865}
66
[email protected]3f8fa2d2011-07-14 18:48:3967void UserPolicyTokenLoader::LoadOnFileThread() {
[email protected]eb938e22011-06-21 20:56:1868 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
69 std::string device_token;
70 std::string device_id;
71
72 if (file_util::PathExists(cache_file_)) {
73 std::string data;
74 em::DeviceCredentials device_credentials;
75 if (file_util::ReadFileToString(cache_file_, &data) &&
76 device_credentials.ParseFromArray(data.c_str(), data.size())) {
77 device_token = device_credentials.device_token();
78 device_id = device_credentials.device_id();
[email protected]c94de182011-07-08 15:44:4079 SampleUMA(kMetricTokenLoadSucceeded);
80 } else {
81 SampleUMA(kMetricTokenLoadFailed);
[email protected]eb938e22011-06-21 20:56:1882 }
83 }
84
85 BrowserThread::PostTask(
86 BrowserThread::UI, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1687 base::Bind(&UserPolicyTokenLoader::NotifyOnUIThread,
88 this,
89 device_token,
90 device_id));
[email protected]eb938e22011-06-21 20:56:1891}
92
[email protected]3f8fa2d2011-07-14 18:48:3993void UserPolicyTokenLoader::NotifyOnUIThread(const std::string& token,
94 const std::string& device_id) {
[email protected]eb938e22011-06-21 20:56:1895 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]3f8fa2d2011-07-14 18:48:3996 if (delegate_.get())
97 delegate_->OnTokenLoaded(token, device_id);
[email protected]eb938e22011-06-21 20:56:1898}
99
[email protected]3f8fa2d2011-07-14 18:48:39100void UserPolicyTokenLoader::StoreOnFileThread(const std::string& token,
101 const std::string& device_id) {
[email protected]eb938e22011-06-21 20:56:18102 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
103 em::DeviceCredentials device_credentials;
104 device_credentials.set_device_token(token);
105 device_credentials.set_device_id(device_id);
106 std::string data;
107 bool success = device_credentials.SerializeToString(&data);
108 if (!success) {
109 LOG(WARNING) << "Failed serialize device token data, will not write "
110 << cache_file_.value();
[email protected]c94de182011-07-08 15:44:40111 SampleUMA(kMetricTokenStoreFailed);
[email protected]eb938e22011-06-21 20:56:18112 return;
113 }
114
115 if (!file_util::CreateDirectory(cache_file_.DirName())) {
116 LOG(WARNING) << "Failed to create directory "
117 << cache_file_.DirName().value();
[email protected]c94de182011-07-08 15:44:40118 SampleUMA(kMetricTokenStoreFailed);
[email protected]eb938e22011-06-21 20:56:18119 return;
120 }
121
[email protected]c94de182011-07-08 15:44:40122 int size = data.size();
123 if (file_util::WriteFile(cache_file_, data.c_str(), size) != size) {
124 LOG(WARNING) << "Failed to write " << cache_file_.value();
125 SampleUMA(kMetricTokenStoreFailed);
[email protected]03dd5da2011-07-21 13:28:29126 return;
[email protected]c94de182011-07-08 15:44:40127 }
128
129 SampleUMA(kMetricTokenStoreSucceeded);
[email protected]eb938e22011-06-21 20:56:18130}
131
[email protected]3f8fa2d2011-07-14 18:48:39132UserPolicyTokenCache::UserPolicyTokenCache(
133 CloudPolicyDataStore* data_store,
134 const FilePath& cache_file)
135 : ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)),
136 data_store_(data_store) {
137 loader_ = new UserPolicyTokenLoader(weak_ptr_factory_.GetWeakPtr(),
138 cache_file);
139 data_store_->AddObserver(this);
140}
141
142UserPolicyTokenCache::~UserPolicyTokenCache() {
143 if (data_store_)
144 data_store_->RemoveObserver(this);
145}
146
147void UserPolicyTokenCache::Load() {
148 loader_->Load();
149}
150
151void UserPolicyTokenCache::OnTokenLoaded(const std::string& token,
152 const std::string& device_id) {
153 token_ = token;
154 if (data_store_) {
155 data_store_->set_device_id(device_id);
156 data_store_->SetDeviceToken(token, true);
157 }
158}
159
[email protected]8a475132011-07-09 22:17:33160void UserPolicyTokenCache::OnDeviceTokenChanged() {
[email protected]3f8fa2d2011-07-14 18:48:39161 const std::string& new_token(data_store_->device_token());
162 if (!new_token.empty() && !data_store_->device_id().empty()) {
163 if (token_ == new_token)
164 return;
165
166 token_ = new_token;
167 loader_->Store(new_token, data_store_->device_id());
[email protected]8a475132011-07-09 22:17:33168 }
169}
170
171void UserPolicyTokenCache::OnCredentialsChanged() {
172}
173
[email protected]eb938e22011-06-21 20:56:18174} // namespace policy