Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(391)

Side by Side Diff: chrome/browser/policy/device_management_policy_provider.cc

Issue 6079012: Allow policy refresh rate to be configured through policy. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Back to InSequence declarations with scoping Created 9 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/policy/device_management_policy_provider.h" 5 #include "chrome/browser/policy/device_management_policy_provider.h"
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/file_util.h" 8 #include "base/file_util.h"
9 #include "base/path_service.h" 9 #include "base/path_service.h"
10 #include "base/rand_util.h" 10 #include "base/rand_util.h"
11 #include "base/task.h" 11 #include "base/task.h"
12 #include "chrome/browser/browser_thread.h" 12 #include "chrome/browser/browser_thread.h"
13 #include "chrome/browser/policy/device_management_backend.h" 13 #include "chrome/browser/policy/device_management_backend.h"
14 #include "chrome/browser/policy/device_management_policy_cache.h" 14 #include "chrome/browser/policy/device_management_policy_cache.h"
15 #include "chrome/browser/policy/profile_policy_context.h"
15 #include "chrome/browser/policy/proto/device_management_constants.h" 16 #include "chrome/browser/policy/proto/device_management_constants.h"
16 #include "chrome/browser/profiles/profile.h" 17 #include "chrome/browser/profiles/profile.h"
17 #include "chrome/common/chrome_paths.h" 18 #include "chrome/common/chrome_paths.h"
18 #include "chrome/common/chrome_switches.h" 19 #include "chrome/common/chrome_switches.h"
19 #include "chrome/common/notification_service.h" 20 #include "chrome/common/notification_service.h"
20 #include "chrome/common/notification_type.h" 21 #include "chrome/common/notification_type.h"
21 22
22 namespace policy { 23 namespace policy {
23 24
24 namespace em = enterprise_management; 25 namespace em = enterprise_management;
25 26
26 const int64 kPolicyRefreshRateInMilliseconds = 3 * 60 * 60 * 1000; // 3 hours 27 // The maximum ratio in percent of the policy refresh rate we use for adjusting
27 const int64 kPolicyRefreshMaxEarlierInMilliseconds = 20 * 60 * 1000; // 20 mins 28 // the policy refresh time instant. The rationale is to avoid load spikes if
29 // from many devices that were set up in sync for some reason.
30 const int kPolicyRefreshDeviationFactorPercent = 10;
31 // Maximum deviation we are willing to accept.
32 const int64 kPolicyRefreshDeviationMaxInMilliseconds = 30 * 60 * 1000;
33
28 // These are the base values for delays before retrying after an error. They 34 // These are the base values for delays before retrying after an error. They
29 // will be doubled each time they are used. 35 // will be doubled each time they are used.
30 const int64 kPolicyRefreshErrorDelayInMilliseconds = 3 * 1000; // 3 seconds 36 const int64 kPolicyRefreshErrorDelayInMilliseconds = 3 * 1000; // 3 seconds
31 const int64 kDeviceTokenRefreshErrorDelayInMilliseconds = 3 * 1000; 37 const int64 kDeviceTokenRefreshErrorDelayInMilliseconds = 3 * 1000;
32 // For unmanaged devices, check once per day whether they're still unmanaged. 38 // For unmanaged devices, check once per day whether they're still unmanaged.
33 const int64 kPolicyRefreshUnmanagedDeviceInMilliseconds = 24 * 60 * 60 * 1000; 39 const int64 kPolicyRefreshUnmanagedDeviceInMilliseconds = 24 * 60 * 60 * 1000;
34 40
35 const FilePath::StringType kDeviceTokenFilename = FILE_PATH_LITERAL("Token"); 41 const FilePath::StringType kDeviceTokenFilename = FILE_PATH_LITERAL("Token");
36 const FilePath::StringType kPolicyFilename = FILE_PATH_LITERAL("Policy"); 42 const FilePath::StringType kPolicyFilename = FILE_PATH_LITERAL("Policy");
37 43
38 // Ensures that the portion of the policy provider implementation that requires 44 // Calls back into the provider to refresh policy.
39 // the IOThread is deferred until the IOThread is fully initialized. The policy 45 class DeviceManagementPolicyProvider::RefreshTask : public CancelableTask {
40 // provider posts this task on the UI thread during its constructor, thereby
41 // guaranteeing that the code won't get executed until after the UI and IO
42 // threads are fully constructed.
43 class DeviceManagementPolicyProvider::InitializeAfterIOThreadExistsTask
44 : public Task {
45 public: 46 public:
46 explicit InitializeAfterIOThreadExistsTask( 47 explicit RefreshTask(DeviceManagementPolicyProvider* provider)
47 base::WeakPtr<DeviceManagementPolicyProvider> provider)
48 : provider_(provider) {
49 }
50
51 // Task implementation:
52 virtual void Run() {
53 DeviceManagementPolicyProvider* provider = provider_.get();
54 if (provider)
55 provider->InitializeAfterIOThreadExists();
56 }
57
58 private:
59 base::WeakPtr<DeviceManagementPolicyProvider> provider_;
60 };
61
62 class DeviceManagementPolicyProvider::RefreshTask : public Task {
63 public:
64 explicit RefreshTask(base::WeakPtr<DeviceManagementPolicyProvider> provider)
65 : provider_(provider) {} 48 : provider_(provider) {}
66 49
67 // Task implementation: 50 // Task implementation:
68 virtual void Run() { 51 virtual void Run() {
69 DeviceManagementPolicyProvider* provider = provider_.get(); 52 if (provider_)
70 if (provider) 53 provider_->RefreshTaskExecute();
71 provider->RefreshTaskExecute(); 54 }
55
56 // CancelableTask implementation:
57 virtual void Cancel() {
58 provider_ = NULL;
72 } 59 }
73 60
74 private: 61 private:
75 base::WeakPtr<DeviceManagementPolicyProvider> provider_; 62 DeviceManagementPolicyProvider* provider_;
76 }; 63 };
77 64
78 DeviceManagementPolicyProvider::DeviceManagementPolicyProvider( 65 DeviceManagementPolicyProvider::DeviceManagementPolicyProvider(
79 const ConfigurationPolicyProvider::PolicyDefinitionList* policy_list, 66 const ConfigurationPolicyProvider::PolicyDefinitionList* policy_list,
80 DeviceManagementBackend* backend, 67 DeviceManagementBackend* backend,
81 Profile* profile) 68 Profile* profile)
82 : ConfigurationPolicyProvider(policy_list) { 69 : ConfigurationPolicyProvider(policy_list) {
83 Initialize(backend, 70 Initialize(backend,
84 profile, 71 profile,
85 kPolicyRefreshRateInMilliseconds, 72 ProfilePolicyContext::kDefaultPolicyRefreshRateInMilliseconds,
86 kPolicyRefreshMaxEarlierInMilliseconds, 73 kPolicyRefreshDeviationFactorPercent,
74 kPolicyRefreshDeviationMaxInMilliseconds,
87 kPolicyRefreshErrorDelayInMilliseconds, 75 kPolicyRefreshErrorDelayInMilliseconds,
88 kDeviceTokenRefreshErrorDelayInMilliseconds, 76 kDeviceTokenRefreshErrorDelayInMilliseconds,
89 kPolicyRefreshUnmanagedDeviceInMilliseconds); 77 kPolicyRefreshUnmanagedDeviceInMilliseconds);
90 } 78 }
91 79
92 DeviceManagementPolicyProvider::DeviceManagementPolicyProvider(
93 const PolicyDefinitionList* policy_list,
94 DeviceManagementBackend* backend,
95 Profile* profile,
96 int64 policy_refresh_rate_ms,
97 int64 policy_refresh_max_earlier_ms,
98 int64 policy_refresh_error_delay_ms,
99 int64 token_fetch_error_delay_ms,
100 int64 unmanaged_device_refresh_rate_ms)
101 : ConfigurationPolicyProvider(policy_list) {
102 Initialize(backend,
103 profile,
104 policy_refresh_rate_ms,
105 policy_refresh_max_earlier_ms,
106 policy_refresh_error_delay_ms,
107 token_fetch_error_delay_ms,
108 unmanaged_device_refresh_rate_ms);
109 }
110
111 DeviceManagementPolicyProvider::~DeviceManagementPolicyProvider() { 80 DeviceManagementPolicyProvider::~DeviceManagementPolicyProvider() {
112 FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer, 81 FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer,
113 observer_list_, 82 observer_list_,
114 OnProviderGoingAway()); 83 OnProviderGoingAway());
84 CancelRefreshTask();
115 } 85 }
116 86
117 bool DeviceManagementPolicyProvider::Provide( 87 bool DeviceManagementPolicyProvider::Provide(
118 ConfigurationPolicyStoreInterface* policy_store) { 88 ConfigurationPolicyStoreInterface* policy_store) {
119 scoped_ptr<DictionaryValue> policies(cache_->GetPolicy()); 89 scoped_ptr<DictionaryValue> policies(cache_->GetPolicy());
120 DecodePolicyValueTree(policies.get(), policy_store); 90 DecodePolicyValueTree(policies.get(), policy_store);
121 return true; 91 return true;
122 } 92 }
123 93
124 bool DeviceManagementPolicyProvider::IsInitializationComplete() const { 94 bool DeviceManagementPolicyProvider::IsInitializationComplete() const {
125 return !waiting_for_initial_policies_; 95 return !cache_->last_policy_refresh_time().is_null();
126 } 96 }
127 97
128 void DeviceManagementPolicyProvider::HandlePolicyResponse( 98 void DeviceManagementPolicyProvider::HandlePolicyResponse(
129 const em::DevicePolicyResponse& response) { 99 const em::DevicePolicyResponse& response) {
130 if (cache_->SetPolicy(response)) 100 DCHECK(TokenAvailable());
101 if (cache_->SetPolicy(response)) {
102 initial_fetch_done_ = true;
131 NotifyCloudPolicyUpdate(); 103 NotifyCloudPolicyUpdate();
132 policy_request_pending_ = false; 104 }
133 // Reset the error delay since policy fetching succeeded this time. 105 SetState(STATE_POLICY_VALID);
134 policy_refresh_error_delay_ms_ = kPolicyRefreshErrorDelayInMilliseconds;
135 ScheduleRefreshTask(GetRefreshTaskDelay());
136 // Update this provider's internal waiting state, but don't notify anyone
137 // else yet (that's done by the PrefValueStore that receives the policy).
138 waiting_for_initial_policies_ = false;
139 } 106 }
140 107
141 void DeviceManagementPolicyProvider::OnError( 108 void DeviceManagementPolicyProvider::OnError(
142 DeviceManagementBackend::ErrorCode code) { 109 DeviceManagementBackend::ErrorCode code) {
143 policy_request_pending_ = false; 110 DCHECK(TokenAvailable());
144 if (code == DeviceManagementBackend::kErrorServiceDeviceNotFound || 111 if (code == DeviceManagementBackend::kErrorServiceDeviceNotFound ||
145 code == DeviceManagementBackend::kErrorServiceManagementTokenInvalid) { 112 code == DeviceManagementBackend::kErrorServiceManagementTokenInvalid) {
146 LOG(WARNING) << "The device token was either invalid or unknown to the " 113 LOG(WARNING) << "The device token was either invalid or unknown to the "
147 << "device manager, re-registering device."; 114 << "device manager, re-registering device.";
148 token_fetcher_->Restart(); 115 SetState(STATE_TOKEN_RESET);
149 } else if (code == 116 } else if (code ==
150 DeviceManagementBackend::kErrorServiceManagementNotSupported) { 117 DeviceManagementBackend::kErrorServiceManagementNotSupported) {
151 VLOG(1) << "The device is no longer managed, resetting device token."; 118 VLOG(1) << "The device is no longer managed, resetting device token.";
152 token_fetcher_->Restart(); 119 SetState(STATE_TOKEN_RESET);
153 } else { 120 } else {
154 LOG(WARNING) << "Could not provide policy from the device manager (error = " 121 LOG(WARNING) << "Could not provide policy from the device manager (error = "
155 << code << "), will retry in " 122 << code << "), will retry in "
156 << (policy_refresh_error_delay_ms_/1000) << " seconds."; 123 << (effective_policy_refresh_error_delay_ms_ / 1000)
157 ScheduleRefreshTask(policy_refresh_error_delay_ms_); 124 << " seconds.";
158 policy_refresh_error_delay_ms_ *= 2; 125 SetState(STATE_POLICY_ERROR);
159 if (policy_refresh_rate_ms_ &&
160 policy_refresh_rate_ms_ < policy_refresh_error_delay_ms_) {
161 policy_refresh_error_delay_ms_ = policy_refresh_rate_ms_;
162 }
163 } 126 }
164 StopWaitingForInitialPolicies();
165 } 127 }
166 128
167 void DeviceManagementPolicyProvider::OnTokenSuccess() { 129 void DeviceManagementPolicyProvider::OnTokenSuccess() {
168 if (policy_request_pending_) 130 DCHECK(!TokenAvailable());
169 return;
170 cache_->SetDeviceUnmanaged(false); 131 cache_->SetDeviceUnmanaged(false);
171 SendPolicyRequest(); 132 SetState(STATE_TOKEN_VALID);
172 } 133 }
173 134
174 void DeviceManagementPolicyProvider::OnTokenError() { 135 void DeviceManagementPolicyProvider::OnTokenError() {
136 DCHECK(!TokenAvailable());
175 LOG(WARNING) << "Could not retrieve device token."; 137 LOG(WARNING) << "Could not retrieve device token.";
176 ScheduleRefreshTask(token_fetch_error_delay_ms_); 138 SetState(STATE_TOKEN_ERROR);
177 token_fetch_error_delay_ms_ *= 2;
178 if (token_fetch_error_delay_ms_ > policy_refresh_rate_ms_)
179 token_fetch_error_delay_ms_ = policy_refresh_rate_ms_;
180 StopWaitingForInitialPolicies();
181 } 139 }
182 140
183 void DeviceManagementPolicyProvider::OnNotManaged() { 141 void DeviceManagementPolicyProvider::OnNotManaged() {
142 DCHECK(!TokenAvailable());
184 VLOG(1) << "This device is not managed."; 143 VLOG(1) << "This device is not managed.";
185 cache_->SetDeviceUnmanaged(true); 144 cache_->SetDeviceUnmanaged(true);
186 ScheduleRefreshTask(unmanaged_device_refresh_rate_ms_); 145 SetState(STATE_UNMANAGED);
187 StopWaitingForInitialPolicies(); 146 }
147
148 void DeviceManagementPolicyProvider::SetRefreshRate(
149 int64 refresh_rate_milliseconds) {
150 policy_refresh_rate_ms_ = refresh_rate_milliseconds;
151
152 // Reschedule the refresh task if necessary.
153 if (state_ == STATE_POLICY_VALID)
154 SetState(STATE_POLICY_VALID);
155 }
156
157 DeviceManagementPolicyProvider::DeviceManagementPolicyProvider(
158 const PolicyDefinitionList* policy_list,
159 DeviceManagementBackend* backend,
160 Profile* profile,
161 int64 policy_refresh_rate_ms,
162 int policy_refresh_deviation_factor_percent,
163 int64 policy_refresh_deviation_max_ms,
164 int64 policy_refresh_error_delay_ms,
165 int64 token_fetch_error_delay_ms,
166 int64 unmanaged_device_refresh_rate_ms)
167 : ConfigurationPolicyProvider(policy_list) {
168 Initialize(backend,
169 profile,
170 policy_refresh_rate_ms,
171 policy_refresh_deviation_factor_percent,
172 policy_refresh_deviation_max_ms,
173 policy_refresh_error_delay_ms,
174 token_fetch_error_delay_ms,
175 unmanaged_device_refresh_rate_ms);
176 }
177
178 void DeviceManagementPolicyProvider::Initialize(
179 DeviceManagementBackend* backend,
180 Profile* profile,
181 int64 policy_refresh_rate_ms,
182 int policy_refresh_deviation_factor_percent,
183 int64 policy_refresh_deviation_max_ms,
184 int64 policy_refresh_error_delay_ms,
185 int64 token_fetch_error_delay_ms,
186 int64 unmanaged_device_refresh_rate_ms) {
187 DCHECK(profile);
188 backend_.reset(backend);
189 profile_ = profile;
190 storage_dir_ = GetOrCreateDeviceManagementDir(profile_->GetPath());
191 state_ = STATE_INITIALIZING;
192 initial_fetch_done_ = false;
193 refresh_task_ = NULL;
194 policy_refresh_rate_ms_ = policy_refresh_rate_ms;
195 policy_refresh_deviation_factor_percent_ =
196 policy_refresh_deviation_factor_percent;
197 policy_refresh_deviation_max_ms_ = policy_refresh_deviation_max_ms;
198 policy_refresh_error_delay_ms_ = policy_refresh_error_delay_ms;
199 effective_policy_refresh_error_delay_ms_ = policy_refresh_error_delay_ms;
200 token_fetch_error_delay_ms_ = token_fetch_error_delay_ms;
201 effective_token_fetch_error_delay_ms_ = token_fetch_error_delay_ms;
202 unmanaged_device_refresh_rate_ms_ = unmanaged_device_refresh_rate_ms;
203
204 const FilePath policy_path = storage_dir_.Append(kPolicyFilename);
205 cache_.reset(new DeviceManagementPolicyCache(policy_path));
206 cache_->LoadPolicyFromFile();
207
208 SetDeviceTokenFetcher(new DeviceTokenFetcher(backend_.get(), profile,
209 GetTokenPath()));
210
211 if (cache_->is_device_unmanaged()) {
212 // This is a non-first login on an unmanaged device.
213 SetState(STATE_UNMANAGED);
214 } else {
215 SetState(STATE_INITIALIZING);
216 }
188 } 217 }
189 218
190 void DeviceManagementPolicyProvider::AddObserver( 219 void DeviceManagementPolicyProvider::AddObserver(
191 ConfigurationPolicyProvider::Observer* observer) { 220 ConfigurationPolicyProvider::Observer* observer) {
192 observer_list_.AddObserver(observer); 221 observer_list_.AddObserver(observer);
193 } 222 }
194 223
195 void DeviceManagementPolicyProvider::RemoveObserver( 224 void DeviceManagementPolicyProvider::RemoveObserver(
196 ConfigurationPolicyProvider::Observer* observer) { 225 ConfigurationPolicyProvider::Observer* observer) {
197 observer_list_.RemoveObserver(observer); 226 observer_list_.RemoveObserver(observer);
198 } 227 }
199 228
200 void DeviceManagementPolicyProvider::NotifyCloudPolicyUpdate() {
201 FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer,
202 observer_list_,
203 OnUpdatePolicy());
204 }
205
206 void DeviceManagementPolicyProvider::Initialize(
207 DeviceManagementBackend* backend,
208 Profile* profile,
209 int64 policy_refresh_rate_ms,
210 int64 policy_refresh_max_earlier_ms,
211 int64 policy_refresh_error_delay_ms,
212 int64 token_fetch_error_delay_ms,
213 int64 unmanaged_device_refresh_rate_ms) {
214 backend_.reset(backend);
215 profile_ = profile;
216 storage_dir_ = GetOrCreateDeviceManagementDir(profile_->GetPath());
217 policy_request_pending_ = false;
218 refresh_task_pending_ = false;
219 waiting_for_initial_policies_ = true;
220 policy_refresh_rate_ms_ = policy_refresh_rate_ms;
221 policy_refresh_max_earlier_ms_ = policy_refresh_max_earlier_ms;
222 policy_refresh_error_delay_ms_ = policy_refresh_error_delay_ms;
223 token_fetch_error_delay_ms_ = token_fetch_error_delay_ms;
224 unmanaged_device_refresh_rate_ms_ = unmanaged_device_refresh_rate_ms;
225
226 const FilePath policy_path = storage_dir_.Append(kPolicyFilename);
227 cache_.reset(new DeviceManagementPolicyCache(policy_path));
228 cache_->LoadPolicyFromFile();
229
230 if (cache_->is_device_unmanaged()) {
231 // This is a non-first login on an unmanaged device.
232 waiting_for_initial_policies_ = false;
233 // Defer token_fetcher_ initialization until this device should ask for
234 // a device token again.
235 base::Time unmanaged_timestamp = cache_->last_policy_refresh_time();
236 int64 delay = unmanaged_device_refresh_rate_ms_ -
237 (base::Time::NowFromSystemTime().ToInternalValue() -
238 unmanaged_timestamp.ToInternalValue());
239 if (delay < 0)
240 delay = 0;
241 BrowserThread::PostDelayedTask(
242 BrowserThread::UI, FROM_HERE,
243 new InitializeAfterIOThreadExistsTask(AsWeakPtr()),
244 delay);
245 } else {
246 if (file_util::PathExists(
247 storage_dir_.Append(kDeviceTokenFilename))) {
248 // This is a non-first login on a managed device.
249 waiting_for_initial_policies_ = false;
250 }
251 // Defer initialization that requires the IOThread until after the IOThread
252 // has been initialized.
253 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE,
254 new InitializeAfterIOThreadExistsTask(AsWeakPtr()));
255 }
256 }
257
258 void DeviceManagementPolicyProvider::InitializeAfterIOThreadExists() {
259 if (profile_) {
260 if (!token_fetcher_) {
261 token_fetcher_ = new DeviceTokenFetcher(
262 backend_.get(), profile_, GetTokenPath());
263 }
264 registrar_.Init(token_fetcher_);
265 registrar_.AddObserver(this);
266 token_fetcher_->StartFetching();
267 }
268 }
269
270 void DeviceManagementPolicyProvider::SendPolicyRequest() { 229 void DeviceManagementPolicyProvider::SendPolicyRequest() {
271 if (policy_request_pending_)
272 return;
273
274 policy_request_pending_ = true;
275 em::DevicePolicyRequest policy_request; 230 em::DevicePolicyRequest policy_request;
276 policy_request.set_policy_scope(kChromePolicyScope); 231 policy_request.set_policy_scope(kChromePolicyScope);
277 em::DevicePolicySettingRequest* setting = 232 em::DevicePolicySettingRequest* setting =
278 policy_request.add_setting_request(); 233 policy_request.add_setting_request();
279 setting->set_key(kChromeDevicePolicySettingKey); 234 setting->set_key(kChromeDevicePolicySettingKey);
280 setting->set_watermark(""); 235 setting->set_watermark("");
281 backend_->ProcessPolicyRequest(token_fetcher_->GetDeviceToken(), 236 backend_->ProcessPolicyRequest(token_fetcher_->GetDeviceToken(),
282 token_fetcher_->GetDeviceID(), 237 token_fetcher_->GetDeviceID(),
283 policy_request, this); 238 policy_request, this);
284 } 239 }
285 240
286 void DeviceManagementPolicyProvider::RefreshTaskExecute() { 241 void DeviceManagementPolicyProvider::RefreshTaskExecute() {
287 DCHECK(refresh_task_pending_); 242 DCHECK(refresh_task_);
288 refresh_task_pending_ = false; 243 refresh_task_ = NULL;
289 // If there is no valid device token, the token_fetcher_ apparently failed, 244
290 // so it must be restarted. 245 switch (state_) {
291 if (!token_fetcher_->IsTokenValid()) { 246 case STATE_INITIALIZING:
292 if (token_fetcher_->IsTokenPending()) { 247 token_fetcher_->StartFetching();
293 NOTREACHED();
294 return; 248 return;
295 } 249 case STATE_TOKEN_VALID:
296 token_fetcher_->Restart(); 250 case STATE_POLICY_VALID:
297 return; 251 case STATE_POLICY_ERROR:
252 SendPolicyRequest();
253 return;
254 case STATE_UNMANAGED:
255 case STATE_TOKEN_ERROR:
256 case STATE_TOKEN_RESET:
257 token_fetcher_->Restart();
258 return;
298 } 259 }
299 // If there is a device token, just refresh policies. 260
300 SendPolicyRequest(); 261 NOTREACHED() << "Unhandled state";
301 } 262 }
302 263
303 void DeviceManagementPolicyProvider::ScheduleRefreshTask( 264 void DeviceManagementPolicyProvider::CancelRefreshTask() {
304 int64 delay_in_milliseconds) { 265 if (refresh_task_) {
305 // This check is simply a safeguard, the situation currently cannot happen. 266 refresh_task_->Cancel();
306 if (refresh_task_pending_) { 267 refresh_task_ = NULL;
307 NOTREACHED();
308 return;
309 } 268 }
310 refresh_task_pending_ = true;
311 BrowserThread::PostDelayedTask(BrowserThread::UI, FROM_HERE,
312 new RefreshTask(AsWeakPtr()),
313 delay_in_milliseconds);
314 } 269 }
315 270
316 int64 DeviceManagementPolicyProvider::GetRefreshTaskDelay() { 271 void DeviceManagementPolicyProvider::NotifyCloudPolicyUpdate() {
317 int64 delay = policy_refresh_rate_ms_; 272 FOR_EACH_OBSERVER(ConfigurationPolicyProvider::Observer,
318 if (policy_refresh_max_earlier_ms_) 273 observer_list_,
319 delay -= base::RandGenerator(policy_refresh_max_earlier_ms_); 274 OnUpdatePolicy());
320 return delay;
321 } 275 }
322 276
323 FilePath DeviceManagementPolicyProvider::GetTokenPath() { 277 FilePath DeviceManagementPolicyProvider::GetTokenPath() {
324 return storage_dir_.Append(kDeviceTokenFilename); 278 return storage_dir_.Append(kDeviceTokenFilename);
325 } 279 }
326 280
327 void DeviceManagementPolicyProvider::SetDeviceTokenFetcher( 281 void DeviceManagementPolicyProvider::SetDeviceTokenFetcher(
328 DeviceTokenFetcher* token_fetcher) { 282 DeviceTokenFetcher* token_fetcher) {
329 DCHECK(!token_fetcher_); 283 registrar_.Init(token_fetcher);
284 registrar_.AddObserver(this);
330 token_fetcher_ = token_fetcher; 285 token_fetcher_ = token_fetcher;
331 } 286 }
332 287
333 void DeviceManagementPolicyProvider::StopWaitingForInitialPolicies() { 288 void DeviceManagementPolicyProvider::SetState(
334 waiting_for_initial_policies_ = false; 289 DeviceManagementPolicyProvider::ProviderState new_state) {
335 // Notify observers that initial policy fetch is complete. 290 state_ = new_state;
336 NotifyCloudPolicyUpdate(); 291
292 // If this state transition completes the initial policy fetch, let the
293 // observers now.
294 if (!initial_fetch_done_ &&
295 new_state != STATE_INITIALIZING &&
296 new_state != STATE_TOKEN_VALID) {
297 initial_fetch_done_ = true;
298 NotifyCloudPolicyUpdate();
299 }
300
301 base::Time now(base::Time::NowFromSystemTime());
302 base::Time refresh_at;
303 base::Time last_refresh(cache_->last_policy_refresh_time());
304 if (last_refresh.is_null())
305 last_refresh = now;
306
307 // Determine when to take the next step.
308 switch (state_) {
309 case STATE_INITIALIZING:
310 refresh_at = now;
311 break;
312 case STATE_TOKEN_VALID:
313 effective_token_fetch_error_delay_ms_ = token_fetch_error_delay_ms_;
314 refresh_at = now;
315 break;
316 case STATE_TOKEN_RESET:
317 refresh_at = now;
318 break;
319 case STATE_UNMANAGED:
320 refresh_at = last_refresh +
321 base::TimeDelta::FromMilliseconds(unmanaged_device_refresh_rate_ms_);
322 break;
323 case STATE_POLICY_VALID:
324 effective_policy_refresh_error_delay_ms_ = policy_refresh_error_delay_ms_;
325 refresh_at =
326 last_refresh + base::TimeDelta::FromMilliseconds(GetRefreshDelay());
327 break;
328 case STATE_TOKEN_ERROR:
329 refresh_at = now + base::TimeDelta::FromMilliseconds(
330 effective_token_fetch_error_delay_ms_);
331 effective_token_fetch_error_delay_ms_ *= 2;
332 if (effective_token_fetch_error_delay_ms_ > policy_refresh_rate_ms_)
333 effective_token_fetch_error_delay_ms_ = policy_refresh_rate_ms_;
334 break;
335 case STATE_POLICY_ERROR:
336 refresh_at = now + base::TimeDelta::FromMilliseconds(
337 effective_policy_refresh_error_delay_ms_);
338 effective_policy_refresh_error_delay_ms_ *= 2;
339 if (effective_policy_refresh_error_delay_ms_ > policy_refresh_rate_ms_)
340 effective_policy_refresh_error_delay_ms_ = policy_refresh_rate_ms_;
341 break;
342 }
343
344 // Update the refresh task.
345 CancelRefreshTask();
346 if (!refresh_at.is_null()) {
347 refresh_task_ = new RefreshTask(this);
348 int64 delay = std::max<int64>((refresh_at - now).InMilliseconds(), 0);
349 BrowserThread::PostDelayedTask(BrowserThread::UI, FROM_HERE, refresh_task_,
350 delay);
351 }
352 }
353
354 int64 DeviceManagementPolicyProvider::GetRefreshDelay() {
355 int64 deviation = (policy_refresh_deviation_factor_percent_ *
356 policy_refresh_rate_ms_) / 100;
357 deviation = std::min(deviation, policy_refresh_deviation_max_ms_);
358 return policy_refresh_rate_ms_ - base::RandGenerator(deviation + 1);
359 }
360
361 bool DeviceManagementPolicyProvider::TokenAvailable() const {
362 return state_ == STATE_TOKEN_VALID ||
363 state_ == STATE_POLICY_VALID ||
364 state_ == STATE_POLICY_ERROR;
337 } 365 }
338 366
339 // static 367 // static
340 std::string DeviceManagementPolicyProvider::GetDeviceManagementURL() { 368 std::string DeviceManagementPolicyProvider::GetDeviceManagementURL() {
341 return CommandLine::ForCurrentProcess()->GetSwitchValueASCII( 369 return CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
342 switches::kDeviceManagementUrl); 370 switches::kDeviceManagementUrl);
343 } 371 }
344 372
345 // static 373 // static
346 FilePath DeviceManagementPolicyProvider::GetOrCreateDeviceManagementDir( 374 FilePath DeviceManagementPolicyProvider::GetOrCreateDeviceManagementDir(
347 const FilePath& user_data_dir) { 375 const FilePath& user_data_dir) {
348 const FilePath device_management_dir = user_data_dir.Append( 376 const FilePath device_management_dir = user_data_dir.Append(
349 FILE_PATH_LITERAL("Device Management")); 377 FILE_PATH_LITERAL("Device Management"));
350 if (!file_util::DirectoryExists(device_management_dir)) { 378 if (!file_util::DirectoryExists(device_management_dir)) {
351 if (!file_util::CreateDirectory(device_management_dir)) 379 if (!file_util::CreateDirectory(device_management_dir))
352 NOTREACHED(); 380 NOTREACHED();
353 } 381 }
354 return device_management_dir; 382 return device_management_dir;
355 } 383 }
356 384
357 } // namespace policy 385 } // namespace policy
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698