[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 1 | // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "chrome/browser/policy/user_policy_token_cache.h" |
| 6 | |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 7 | #include "base/bind.h" |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 8 | #include "base/file_util.h" |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 9 | #include "base/metrics/histogram.h" |
| 10 | #include "chrome/browser/policy/enterprise_metrics.h" |
[email protected] | 8a47513 | 2011-07-09 22:17:33 | [diff] [blame] | 11 | #include "chrome/browser/policy/proto/device_management_local.pb.h" |
[email protected] | c38831a1 | 2011-10-28 12:44:49 | [diff] [blame^] | 12 | #include "content/public/browser/browser_thread.h" |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 13 | |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 14 | namespace { |
| 15 | |
| 16 | // Other places can sample on the same UMA counter, so make sure they all do |
| 17 | // it on the same thread (UI). |
| 18 | void SampleUMAOnUIThread(policy::MetricToken sample) { |
| 19 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 20 | UMA_HISTOGRAM_ENUMERATION(policy::kMetricToken, sample, |
| 21 | policy::kMetricTokenSize); |
| 22 | } |
| 23 | |
| 24 | void SampleUMA(policy::MetricToken sample) { |
| 25 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
| 26 | BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 27 | base::Bind(&SampleUMAOnUIThread, sample)); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 28 | } |
| 29 | |
| 30 | } // namespace |
| 31 | |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 32 | namespace policy { |
| 33 | |
| 34 | namespace em = enterprise_management; |
| 35 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 36 | UserPolicyTokenLoader::Delegate::~Delegate() {} |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 37 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 38 | UserPolicyTokenLoader::UserPolicyTokenLoader( |
| 39 | const base::WeakPtr<Delegate>& delegate, |
| 40 | const FilePath& cache_file) |
| 41 | : delegate_(delegate), |
| 42 | cache_file_(cache_file) {} |
| 43 | |
| 44 | void UserPolicyTokenLoader::Load() { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 45 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 46 | BrowserThread::PostTask( |
| 47 | BrowserThread::FILE, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 48 | base::Bind(&UserPolicyTokenLoader::LoadOnFileThread, this)); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 49 | } |
| 50 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 51 | void UserPolicyTokenLoader::Store(const std::string& token, |
[email protected] | f5ba12b | 2011-09-21 12:25:38 | [diff] [blame] | 52 | const std::string& device_id) { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 53 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 54 | BrowserThread::PostTask( |
| 55 | BrowserThread::FILE, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 56 | base::Bind(&UserPolicyTokenLoader::StoreOnFileThread, |
| 57 | this, |
| 58 | token, |
| 59 | device_id)); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 60 | } |
| 61 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 62 | UserPolicyTokenLoader::~UserPolicyTokenLoader() { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 63 | } |
| 64 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 65 | void UserPolicyTokenLoader::LoadOnFileThread() { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 66 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
| 67 | std::string device_token; |
| 68 | std::string device_id; |
| 69 | |
| 70 | if (file_util::PathExists(cache_file_)) { |
| 71 | std::string data; |
| 72 | em::DeviceCredentials device_credentials; |
| 73 | if (file_util::ReadFileToString(cache_file_, &data) && |
| 74 | device_credentials.ParseFromArray(data.c_str(), data.size())) { |
| 75 | device_token = device_credentials.device_token(); |
| 76 | device_id = device_credentials.device_id(); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 77 | SampleUMA(kMetricTokenLoadSucceeded); |
| 78 | } else { |
| 79 | SampleUMA(kMetricTokenLoadFailed); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 80 | } |
| 81 | } |
| 82 | |
| 83 | BrowserThread::PostTask( |
| 84 | BrowserThread::UI, FROM_HERE, |
[email protected] | d203dec | 2011-10-04 13:18:16 | [diff] [blame] | 85 | base::Bind(&UserPolicyTokenLoader::NotifyOnUIThread, |
| 86 | this, |
| 87 | device_token, |
| 88 | device_id)); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 89 | } |
| 90 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 91 | void UserPolicyTokenLoader::NotifyOnUIThread(const std::string& token, |
| 92 | const std::string& device_id) { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 93 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 94 | if (delegate_.get()) |
| 95 | delegate_->OnTokenLoaded(token, device_id); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 96 | } |
| 97 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 98 | void UserPolicyTokenLoader::StoreOnFileThread(const std::string& token, |
| 99 | const std::string& device_id) { |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 100 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
| 101 | em::DeviceCredentials device_credentials; |
| 102 | device_credentials.set_device_token(token); |
| 103 | device_credentials.set_device_id(device_id); |
| 104 | std::string data; |
| 105 | bool success = device_credentials.SerializeToString(&data); |
| 106 | if (!success) { |
| 107 | LOG(WARNING) << "Failed serialize device token data, will not write " |
| 108 | << cache_file_.value(); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 109 | SampleUMA(kMetricTokenStoreFailed); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 110 | return; |
| 111 | } |
| 112 | |
| 113 | if (!file_util::CreateDirectory(cache_file_.DirName())) { |
| 114 | LOG(WARNING) << "Failed to create directory " |
| 115 | << cache_file_.DirName().value(); |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 116 | SampleUMA(kMetricTokenStoreFailed); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 117 | return; |
| 118 | } |
| 119 | |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 120 | int size = data.size(); |
| 121 | if (file_util::WriteFile(cache_file_, data.c_str(), size) != size) { |
| 122 | LOG(WARNING) << "Failed to write " << cache_file_.value(); |
| 123 | SampleUMA(kMetricTokenStoreFailed); |
[email protected] | 03dd5da | 2011-07-21 13:28:29 | [diff] [blame] | 124 | return; |
[email protected] | c94de18 | 2011-07-08 15:44:40 | [diff] [blame] | 125 | } |
| 126 | |
| 127 | SampleUMA(kMetricTokenStoreSucceeded); |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 128 | } |
| 129 | |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 130 | UserPolicyTokenCache::UserPolicyTokenCache( |
| 131 | CloudPolicyDataStore* data_store, |
| 132 | const FilePath& cache_file) |
| 133 | : ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)), |
| 134 | data_store_(data_store) { |
| 135 | loader_ = new UserPolicyTokenLoader(weak_ptr_factory_.GetWeakPtr(), |
| 136 | cache_file); |
| 137 | data_store_->AddObserver(this); |
| 138 | } |
| 139 | |
| 140 | UserPolicyTokenCache::~UserPolicyTokenCache() { |
| 141 | if (data_store_) |
| 142 | data_store_->RemoveObserver(this); |
| 143 | } |
| 144 | |
| 145 | void UserPolicyTokenCache::Load() { |
| 146 | loader_->Load(); |
| 147 | } |
| 148 | |
| 149 | void UserPolicyTokenCache::OnTokenLoaded(const std::string& token, |
| 150 | const std::string& device_id) { |
| 151 | token_ = token; |
| 152 | if (data_store_) { |
| 153 | data_store_->set_device_id(device_id); |
| 154 | data_store_->SetDeviceToken(token, true); |
| 155 | } |
| 156 | } |
| 157 | |
[email protected] | 8a47513 | 2011-07-09 22:17:33 | [diff] [blame] | 158 | void UserPolicyTokenCache::OnDeviceTokenChanged() { |
[email protected] | 3f8fa2d | 2011-07-14 18:48:39 | [diff] [blame] | 159 | const std::string& new_token(data_store_->device_token()); |
| 160 | if (!new_token.empty() && !data_store_->device_id().empty()) { |
| 161 | if (token_ == new_token) |
| 162 | return; |
| 163 | |
| 164 | token_ = new_token; |
| 165 | loader_->Store(new_token, data_store_->device_id()); |
[email protected] | 8a47513 | 2011-07-09 22:17:33 | [diff] [blame] | 166 | } |
| 167 | } |
| 168 | |
| 169 | void UserPolicyTokenCache::OnCredentialsChanged() { |
| 170 | } |
| 171 | |
[email protected] | eb938e2 | 2011-06-21 20:56:18 | [diff] [blame] | 172 | } // namespace policy |