blob: dab3302d29ca912d785d4e21cbdb8916d71d6134 [file] [log] [blame]
[email protected]eb938e22011-06-21 20:56:181// Copyright (c) 2011 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "chrome/browser/policy/user_policy_token_cache.h"
6
[email protected]d203dec2011-10-04 13:18:167#include "base/bind.h"
[email protected]eb938e22011-06-21 20:56:188#include "base/file_util.h"
[email protected]c94de182011-07-08 15:44:409#include "base/metrics/histogram.h"
10#include "chrome/browser/policy/enterprise_metrics.h"
[email protected]8a475132011-07-09 22:17:3311#include "chrome/browser/policy/proto/device_management_local.pb.h"
[email protected]c38831a12011-10-28 12:44:4912#include "content/public/browser/browser_thread.h"
[email protected]eb938e22011-06-21 20:56:1813
[email protected]c94de182011-07-08 15:44:4014namespace {
15
16// Other places can sample on the same UMA counter, so make sure they all do
17// it on the same thread (UI).
18void SampleUMAOnUIThread(policy::MetricToken sample) {
19 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
20 UMA_HISTOGRAM_ENUMERATION(policy::kMetricToken, sample,
21 policy::kMetricTokenSize);
22}
23
24void SampleUMA(policy::MetricToken sample) {
25 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
26 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1627 base::Bind(&SampleUMAOnUIThread, sample));
[email protected]c94de182011-07-08 15:44:4028}
29
30} // namespace
31
[email protected]eb938e22011-06-21 20:56:1832namespace policy {
33
34namespace em = enterprise_management;
35
[email protected]3f8fa2d2011-07-14 18:48:3936UserPolicyTokenLoader::Delegate::~Delegate() {}
[email protected]eb938e22011-06-21 20:56:1837
[email protected]3f8fa2d2011-07-14 18:48:3938UserPolicyTokenLoader::UserPolicyTokenLoader(
39 const base::WeakPtr<Delegate>& delegate,
40 const FilePath& cache_file)
41 : delegate_(delegate),
42 cache_file_(cache_file) {}
43
44void UserPolicyTokenLoader::Load() {
[email protected]eb938e22011-06-21 20:56:1845 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
46 BrowserThread::PostTask(
47 BrowserThread::FILE, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1648 base::Bind(&UserPolicyTokenLoader::LoadOnFileThread, this));
[email protected]eb938e22011-06-21 20:56:1849}
50
[email protected]3f8fa2d2011-07-14 18:48:3951void UserPolicyTokenLoader::Store(const std::string& token,
[email protected]f5ba12b2011-09-21 12:25:3852 const std::string& device_id) {
[email protected]eb938e22011-06-21 20:56:1853 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
54 BrowserThread::PostTask(
55 BrowserThread::FILE, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1656 base::Bind(&UserPolicyTokenLoader::StoreOnFileThread,
57 this,
58 token,
59 device_id));
[email protected]eb938e22011-06-21 20:56:1860}
61
[email protected]3f8fa2d2011-07-14 18:48:3962UserPolicyTokenLoader::~UserPolicyTokenLoader() {
[email protected]eb938e22011-06-21 20:56:1863}
64
[email protected]3f8fa2d2011-07-14 18:48:3965void UserPolicyTokenLoader::LoadOnFileThread() {
[email protected]eb938e22011-06-21 20:56:1866 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
67 std::string device_token;
68 std::string device_id;
69
70 if (file_util::PathExists(cache_file_)) {
71 std::string data;
72 em::DeviceCredentials device_credentials;
73 if (file_util::ReadFileToString(cache_file_, &data) &&
74 device_credentials.ParseFromArray(data.c_str(), data.size())) {
75 device_token = device_credentials.device_token();
76 device_id = device_credentials.device_id();
[email protected]c94de182011-07-08 15:44:4077 SampleUMA(kMetricTokenLoadSucceeded);
78 } else {
79 SampleUMA(kMetricTokenLoadFailed);
[email protected]eb938e22011-06-21 20:56:1880 }
81 }
82
83 BrowserThread::PostTask(
84 BrowserThread::UI, FROM_HERE,
[email protected]d203dec2011-10-04 13:18:1685 base::Bind(&UserPolicyTokenLoader::NotifyOnUIThread,
86 this,
87 device_token,
88 device_id));
[email protected]eb938e22011-06-21 20:56:1889}
90
[email protected]3f8fa2d2011-07-14 18:48:3991void UserPolicyTokenLoader::NotifyOnUIThread(const std::string& token,
92 const std::string& device_id) {
[email protected]eb938e22011-06-21 20:56:1893 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]3f8fa2d2011-07-14 18:48:3994 if (delegate_.get())
95 delegate_->OnTokenLoaded(token, device_id);
[email protected]eb938e22011-06-21 20:56:1896}
97
[email protected]3f8fa2d2011-07-14 18:48:3998void UserPolicyTokenLoader::StoreOnFileThread(const std::string& token,
99 const std::string& device_id) {
[email protected]eb938e22011-06-21 20:56:18100 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
101 em::DeviceCredentials device_credentials;
102 device_credentials.set_device_token(token);
103 device_credentials.set_device_id(device_id);
104 std::string data;
105 bool success = device_credentials.SerializeToString(&data);
106 if (!success) {
107 LOG(WARNING) << "Failed serialize device token data, will not write "
108 << cache_file_.value();
[email protected]c94de182011-07-08 15:44:40109 SampleUMA(kMetricTokenStoreFailed);
[email protected]eb938e22011-06-21 20:56:18110 return;
111 }
112
113 if (!file_util::CreateDirectory(cache_file_.DirName())) {
114 LOG(WARNING) << "Failed to create directory "
115 << cache_file_.DirName().value();
[email protected]c94de182011-07-08 15:44:40116 SampleUMA(kMetricTokenStoreFailed);
[email protected]eb938e22011-06-21 20:56:18117 return;
118 }
119
[email protected]c94de182011-07-08 15:44:40120 int size = data.size();
121 if (file_util::WriteFile(cache_file_, data.c_str(), size) != size) {
122 LOG(WARNING) << "Failed to write " << cache_file_.value();
123 SampleUMA(kMetricTokenStoreFailed);
[email protected]03dd5da2011-07-21 13:28:29124 return;
[email protected]c94de182011-07-08 15:44:40125 }
126
127 SampleUMA(kMetricTokenStoreSucceeded);
[email protected]eb938e22011-06-21 20:56:18128}
129
[email protected]3f8fa2d2011-07-14 18:48:39130UserPolicyTokenCache::UserPolicyTokenCache(
131 CloudPolicyDataStore* data_store,
132 const FilePath& cache_file)
133 : ALLOW_THIS_IN_INITIALIZER_LIST(weak_ptr_factory_(this)),
134 data_store_(data_store) {
135 loader_ = new UserPolicyTokenLoader(weak_ptr_factory_.GetWeakPtr(),
136 cache_file);
137 data_store_->AddObserver(this);
138}
139
140UserPolicyTokenCache::~UserPolicyTokenCache() {
141 if (data_store_)
142 data_store_->RemoveObserver(this);
143}
144
145void UserPolicyTokenCache::Load() {
146 loader_->Load();
147}
148
149void UserPolicyTokenCache::OnTokenLoaded(const std::string& token,
150 const std::string& device_id) {
151 token_ = token;
152 if (data_store_) {
153 data_store_->set_device_id(device_id);
154 data_store_->SetDeviceToken(token, true);
155 }
156}
157
[email protected]8a475132011-07-09 22:17:33158void UserPolicyTokenCache::OnDeviceTokenChanged() {
[email protected]3f8fa2d2011-07-14 18:48:39159 const std::string& new_token(data_store_->device_token());
160 if (!new_token.empty() && !data_store_->device_id().empty()) {
161 if (token_ == new_token)
162 return;
163
164 token_ = new_token;
165 loader_->Store(new_token, data_store_->device_id());
[email protected]8a475132011-07-09 22:17:33166 }
167}
168
169void UserPolicyTokenCache::OnCredentialsChanged() {
170}
171
[email protected]eb938e22011-06-21 20:56:18172} // namespace policy