// Copyright (c) 2011 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/browser/policy/cloud_policy_cache.h" #include #include "base/file_util.h" #include "base/logging.h" #include "base/task.h" #include "base/values.h" #include "content/browser/browser_thread.h" #include "chrome/browser/policy/configuration_policy_pref_store.h" #include "chrome/browser/policy/proto/cloud_policy.pb.h" #include "chrome/browser/policy/proto/device_management_constants.h" #include "chrome/browser/policy/proto/device_management_local.pb.h" using google::protobuf::RepeatedField; using google::protobuf::RepeatedPtrField; // This CloudPolicyCache currently supports two protocols for the interaction // with DMServer: the old "DevicePolicy" format, which is being used in the // CrOS Pilot Program and will be deprecated afterwards, and the new // "CloudPolicy" format, which will be used exclusively after the public launch // of ChromeOS. namespace policy { // Decodes a CloudPolicySettings object into two maps with mandatory and // recommended settings, respectively. The implementation is generated code // in policy/cloud_policy_generated.cc. void DecodePolicy(const em::CloudPolicySettings& policy, PolicyMap* mandatory, PolicyMap* recommended); // A thin ConfigurationPolicyProvider implementation sitting on top of // CloudPolicyCache for hooking up with ConfigurationPolicyPrefStore. class CloudPolicyCache::CloudPolicyProvider : public ConfigurationPolicyProvider { public: CloudPolicyProvider(const PolicyDefinitionList* policy_list, CloudPolicyCache* cache, CloudPolicyCache::PolicyLevel level) : ConfigurationPolicyProvider(policy_list), cache_(cache), level_(level) {} virtual ~CloudPolicyProvider() {} virtual bool Provide(ConfigurationPolicyStoreInterface* store) { if (!cache_->has_device_policy()) { if (level_ == POLICY_LEVEL_MANDATORY) ApplyPolicyMap(&cache_->mandatory_policy_, store); else if (level_ == POLICY_LEVEL_RECOMMENDED) ApplyPolicyMap(&cache_->recommended_policy_, store); } else { ApplyPolicyValueTree(cache_->device_policy_.get(), store); } return true; } virtual bool IsInitializationComplete() const { return cache_->initialization_complete_; } virtual void AddObserver(ConfigurationPolicyProvider::Observer* observer) { cache_->observer_list_.AddObserver(observer); } virtual void RemoveObserver(ConfigurationPolicyProvider::Observer* observer) { cache_->observer_list_.RemoveObserver(observer); } private: // The underlying policy cache. CloudPolicyCache* cache_; // Policy level this provider will handle. CloudPolicyCache::PolicyLevel level_; DISALLOW_COPY_AND_ASSIGN(CloudPolicyProvider); }; // Saves policy information to a file. class PersistPolicyTask : public Task { public: PersistPolicyTask(const FilePath& path, const em::PolicyFetchResponse* cloud_policy_response, const em::DevicePolicyResponse* device_policy_response, const bool is_unmanaged) : path_(path), cloud_policy_response_(cloud_policy_response), device_policy_response_(device_policy_response), is_unmanaged_(is_unmanaged) {} private: // Task override. virtual void Run(); const FilePath path_; scoped_ptr cloud_policy_response_; scoped_ptr device_policy_response_; const bool is_unmanaged_; }; void PersistPolicyTask::Run() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); std::string data; em::CachedCloudPolicyResponse cached_policy; if (cloud_policy_response_.get()) { cached_policy.mutable_cloud_policy()->CopyFrom(*cloud_policy_response_); } else if (device_policy_response_.get()) { cached_policy.mutable_device_policy()->CopyFrom(*device_policy_response_); cached_policy.set_timestamp(base::Time::NowFromSystemTime().ToTimeT()); } if (is_unmanaged_) { cached_policy.set_unmanaged(true); cached_policy.set_timestamp(base::Time::NowFromSystemTime().ToTimeT()); } if (!cached_policy.SerializeToString(&data)) { LOG(WARNING) << "Failed to serialize policy data"; return; } int size = data.size(); if (file_util::WriteFile(path_, data.c_str(), size) != size) { LOG(WARNING) << "Failed to write " << path_.value(); return; } } CloudPolicyCache::CloudPolicyCache( const FilePath& backing_file_path) : backing_file_path_(backing_file_path), device_policy_(new DictionaryValue), initialization_complete_(false), is_unmanaged_(false), has_device_policy_(false) { managed_policy_provider_.reset( new CloudPolicyProvider( ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), this, POLICY_LEVEL_MANDATORY)); recommended_policy_provider_.reset( new CloudPolicyProvider( ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), this, POLICY_LEVEL_RECOMMENDED)); } CloudPolicyCache::~CloudPolicyCache() { FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer, observer_list_, OnProviderGoingAway()); } void CloudPolicyCache::LoadFromFile() { // TODO(jkummerow): This method is doing file IO during browser startup. In // the long run it would be better to delay this until the FILE thread exists. if (!file_util::PathExists(backing_file_path_) || initialization_complete_) { return; } // Read the protobuf from the file. std::string data; if (!file_util::ReadFileToString(backing_file_path_, &data)) { LOG(WARNING) << "Failed to read policy data from " << backing_file_path_.value(); return; } em::CachedCloudPolicyResponse cached_response; if (!cached_response.ParseFromArray(data.c_str(), data.size())) { LOG(WARNING) << "Failed to parse policy data read from " << backing_file_path_.value(); return; } base::Time timestamp; PolicyMap mandatory_policy; PolicyMap recommended_policy; is_unmanaged_ = cached_response.unmanaged(); if (is_unmanaged_ || cached_response.has_device_policy()) timestamp = base::Time::FromTimeT(cached_response.timestamp()); if (cached_response.has_cloud_policy()) { DCHECK(!is_unmanaged_); bool ok = DecodePolicyResponse(cached_response.cloud_policy(), &mandatory_policy, &recommended_policy, ×tamp); if (!ok) { LOG(WARNING) << "Decoding policy data failed."; return; } } if (timestamp > base::Time::NowFromSystemTime()) { LOG(WARNING) << "Rejected policy data from " << backing_file_path_.value() << ", file is from the future."; return; } // Swap in the new policy information. if (cached_response.has_cloud_policy()) { mandatory_policy_.Swap(&mandatory_policy); recommended_policy_.Swap(&recommended_policy); has_device_policy_ = false; } else if (cached_response.has_device_policy()) { scoped_ptr value( DecodeDevicePolicy(cached_response.device_policy())); device_policy_.reset(value.release()); has_device_policy_ = true; } last_policy_refresh_time_ = timestamp; initialization_complete_ = true; FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer, observer_list_, OnUpdatePolicy()); } void CloudPolicyCache::SetPolicy(const em::PolicyFetchResponse& policy) { DCHECK(CalledOnValidThread()); bool initialization_was_not_complete = !initialization_complete_; is_unmanaged_ = false; base::Time timestamp; PolicyMap mandatory_policy; PolicyMap recommended_policy; bool ok = DecodePolicyResponse(policy, &mandatory_policy, &recommended_policy, ×tamp); if (!ok) return; const bool new_policy_differs = !mandatory_policy_.Equals(mandatory_policy) || !recommended_policy_.Equals(recommended_policy); mandatory_policy_.Swap(&mandatory_policy); recommended_policy_.Swap(&recommended_policy); initialization_complete_ = true; last_policy_refresh_time_ = timestamp; has_device_policy_ = false; if (new_policy_differs || initialization_was_not_complete) { FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer, observer_list_, OnUpdatePolicy()); } if (timestamp > base::Time::NowFromSystemTime() + base::TimeDelta::FromMinutes(1)) { LOG(WARNING) << "Server returned policy with timestamp from the future, " "not persisting to disk."; } else { em::PolicyFetchResponse* policy_copy = new em::PolicyFetchResponse; policy_copy->CopyFrom(policy); BrowserThread::PostTask( BrowserThread::FILE, FROM_HERE, new PersistPolicyTask(backing_file_path_, policy_copy, NULL, false)); } } void CloudPolicyCache::SetDevicePolicy(const em::DevicePolicyResponse& policy) { DCHECK(CalledOnValidThread()); bool initialization_was_not_complete = !initialization_complete_; is_unmanaged_ = false; DictionaryValue* value = DecodeDevicePolicy(policy); const bool new_policy_differs = !(value->Equals(device_policy_.get())); base::Time now(base::Time::NowFromSystemTime()); device_policy_.reset(value); initialization_complete_ = true; last_policy_refresh_time_ = now; has_device_policy_ = true; if (new_policy_differs || initialization_was_not_complete) { FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer, observer_list_, OnUpdatePolicy()); } em::DevicePolicyResponse* policy_copy = new em::DevicePolicyResponse; policy_copy->CopyFrom(policy); BrowserThread::PostTask( BrowserThread::FILE, FROM_HERE, new PersistPolicyTask(backing_file_path_, NULL, policy_copy, false)); } ConfigurationPolicyProvider* CloudPolicyCache::GetManagedPolicyProvider() { DCHECK(CalledOnValidThread()); return managed_policy_provider_.get(); } ConfigurationPolicyProvider* CloudPolicyCache::GetRecommendedPolicyProvider() { DCHECK(CalledOnValidThread()); return recommended_policy_provider_.get(); } void CloudPolicyCache::SetUnmanaged() { DCHECK(CalledOnValidThread()); is_unmanaged_ = true; mandatory_policy_.Clear(); recommended_policy_.Clear(); device_policy_.reset(new DictionaryValue); last_policy_refresh_time_ = base::Time::NowFromSystemTime(); FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer, observer_list_, OnUpdatePolicy()); BrowserThread::PostTask( BrowserThread::FILE, FROM_HERE, new PersistPolicyTask(backing_file_path_, NULL, NULL, true)); } // static bool CloudPolicyCache::DecodePolicyResponse( const em::PolicyFetchResponse& policy_response, PolicyMap* mandatory, PolicyMap* recommended, base::Time* timestamp) { std::string data = policy_response.policy_data(); if (!VerifySignature(policy_response.policy_data_signature(), data, policy_response.certificate_chain())) { LOG(WARNING) << "Failed to verify signature."; return false; } em::PolicyData policy_data; if (!policy_data.ParseFromString(data)) { LOG(WARNING) << "Failed to parse PolicyData protobuf."; return false; } // TODO(jkummerow): Verify policy_data.device_token(). Needs final // specification which token we're actually sending / expecting to get back. // TODO(jkummerow): Store policy_data.device_name(), if we decide to transfer // it from the server to the client. *timestamp = base::Time::UnixEpoch() + base::TimeDelta::FromMilliseconds(policy_data.timestamp()); em::CloudPolicySettings policy; if (!policy.ParseFromString(policy_data.policy_value())) { LOG(WARNING) << "Failed to parse CloudPolicySettings protobuf."; return false; } DecodePolicy(policy, mandatory, recommended); return true; } // static bool CloudPolicyCache::VerifySignature( const std::string& signature, const std::string& data, const RepeatedPtrField& certificate_chain) { // TODO(jkummerow): Implement this. Non-trivial because we want to do it // for all platforms -> it's enough work to deserve its own CL. // Don't forget to also verify the hostname of the server against the cert. return true; } // static Value* CloudPolicyCache::DecodeIntegerValue(google::protobuf::int64 value) { if (value < std::numeric_limits::min() || value > std::numeric_limits::max()) { LOG(WARNING) << "Integer value " << value << " out of numeric limits, ignoring."; return NULL; } return Value::CreateIntegerValue(static_cast(value)); } // static Value* CloudPolicyCache::DecodeValue(const em::GenericValue& value) { if (!value.has_value_type()) return NULL; switch (value.value_type()) { case em::GenericValue::VALUE_TYPE_BOOL: if (value.has_bool_value()) return Value::CreateBooleanValue(value.bool_value()); return NULL; case em::GenericValue::VALUE_TYPE_INT64: if (value.has_int64_value()) return DecodeIntegerValue(value.int64_value()); return NULL; case em::GenericValue::VALUE_TYPE_STRING: if (value.has_string_value()) return Value::CreateStringValue(value.string_value()); return NULL; case em::GenericValue::VALUE_TYPE_DOUBLE: if (value.has_double_value()) return Value::CreateDoubleValue(value.double_value()); return NULL; case em::GenericValue::VALUE_TYPE_BYTES: if (value.has_bytes_value()) { std::string bytes = value.bytes_value(); return BinaryValue::CreateWithCopiedBuffer(bytes.c_str(), bytes.size()); } return NULL; case em::GenericValue::VALUE_TYPE_BOOL_ARRAY: { ListValue* list = new ListValue; RepeatedField::const_iterator i; for (i = value.bool_array().begin(); i != value.bool_array().end(); ++i) list->Append(Value::CreateBooleanValue(*i)); return list; } case em::GenericValue::VALUE_TYPE_INT64_ARRAY: { ListValue* list = new ListValue; RepeatedField::const_iterator i; for (i = value.int64_array().begin(); i != value.int64_array().end(); ++i) { Value* int_value = DecodeIntegerValue(*i); if (int_value) list->Append(int_value); } return list; } case em::GenericValue::VALUE_TYPE_STRING_ARRAY: { ListValue* list = new ListValue; RepeatedPtrField::const_iterator i; for (i = value.string_array().begin(); i != value.string_array().end(); ++i) list->Append(Value::CreateStringValue(*i)); return list; } case em::GenericValue::VALUE_TYPE_DOUBLE_ARRAY: { ListValue* list = new ListValue; RepeatedField::const_iterator i; for (i = value.double_array().begin(); i != value.double_array().end(); ++i) list->Append(Value::CreateDoubleValue(*i)); return list; } default: NOTREACHED() << "Unhandled value type"; } return NULL; } // static DictionaryValue* CloudPolicyCache::DecodeDevicePolicy( const em::DevicePolicyResponse& policy) { DictionaryValue* result = new DictionaryValue; RepeatedPtrField::const_iterator setting; for (setting = policy.setting().begin(); setting != policy.setting().end(); ++setting) { // Wrong policy key? Skip. if (setting->policy_key().compare(kChromeDevicePolicySettingKey) != 0) continue; // No policy value? Skip. if (!setting->has_policy_value()) continue; // Iterate through all the name-value pairs wrapped in |setting|. const em::GenericSetting& policy_value(setting->policy_value()); RepeatedPtrField::const_iterator named_value; for (named_value = policy_value.named_value().begin(); named_value != policy_value.named_value().end(); ++named_value) { if (named_value->has_value()) { Value* decoded_value = CloudPolicyCache::DecodeValue(named_value->value()); if (decoded_value) result->Set(named_value->name(), decoded_value); } } } return result; } } // namespace policy