Index: chrome/browser/policy/user_policy_cache.cc |
diff --git a/chrome/browser/policy/user_policy_cache.cc b/chrome/browser/policy/user_policy_cache.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..12845f06aedf583b0152c199c3c994bd74d0be6d |
--- /dev/null |
+++ b/chrome/browser/policy/user_policy_cache.cc |
@@ -0,0 +1,153 @@ |
+// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/policy/user_policy_cache.h" |
+ |
+#include <string> |
+ |
+#include "base/file_util.h" |
+#include "base/logging.h" |
+#include "base/task.h" |
+#include "chrome/browser/policy/policy_map.h" |
+#include "chrome/browser/policy/proto/cloud_policy.pb.h" |
+#include "chrome/browser/policy/proto/device_management_local.pb.h" |
+#include "content/browser/browser_thread.h" |
+#include "policy/configuration_policy_type.h" |
+ |
+namespace policy { |
+ |
+// Decodes a CloudPolicySettings object into two maps with mandatory and |
+// recommended settings, respectively. The implementation is generated code |
+// in policy/cloud_policy_generated.cc. |
+void DecodePolicy(const em::CloudPolicySettings& policy, |
+ PolicyMap* mandatory, PolicyMap* recommended); |
+ |
+// Saves policy information to a file. |
+class PersistPolicyTask : public Task { |
+ public: |
+ PersistPolicyTask(const FilePath& path, |
+ const em::PolicyFetchResponse* cloud_policy_response, |
+ const bool is_unmanaged) |
+ : path_(path), |
+ cloud_policy_response_(cloud_policy_response), |
+ is_unmanaged_(is_unmanaged) {} |
+ |
+ private: |
+ // Task override. |
+ virtual void Run(); |
+ |
+ const FilePath path_; |
+ scoped_ptr<const em::PolicyFetchResponse> cloud_policy_response_; |
+ const bool is_unmanaged_; |
+}; |
+ |
+void PersistPolicyTask::Run() { |
+ DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE)); |
+ std::string data; |
+ em::CachedCloudPolicyResponse cached_policy; |
+ if (cloud_policy_response_.get()) { |
+ cached_policy.mutable_cloud_policy()->CopyFrom(*cloud_policy_response_); |
+ } |
+ if (is_unmanaged_) { |
+ cached_policy.set_unmanaged(true); |
+ cached_policy.set_timestamp(base::Time::NowFromSystemTime().ToTimeT()); |
+ } |
+ if (!cached_policy.SerializeToString(&data)) { |
+ LOG(WARNING) << "Failed to serialize policy data"; |
+ return; |
+ } |
+ |
+ int size = data.size(); |
+ if (file_util::WriteFile(path_, data.c_str(), size) != size) { |
+ LOG(WARNING) << "Failed to write " << path_.value(); |
+ return; |
+ } |
+} |
+ |
+UserPolicyCache::UserPolicyCache(const FilePath& backing_file_path) |
+ : backing_file_path_(backing_file_path) { |
+} |
+ |
+UserPolicyCache::~UserPolicyCache() { |
+} |
+ |
+void UserPolicyCache::Load() { |
+ // TODO(jkummerow): This method is doing file IO during browser startup. In |
+ // the long run it would be better to delay this until the FILE thread exists. |
+ if (!file_util::PathExists(backing_file_path_) || initialization_complete()) { |
+ return; |
+ } |
+ |
+ // Read the protobuf from the file. |
+ std::string data; |
+ if (!file_util::ReadFileToString(backing_file_path_, &data)) { |
+ LOG(WARNING) << "Failed to read policy data from " |
+ << backing_file_path_.value(); |
+ return; |
+ } |
+ |
+ em::CachedCloudPolicyResponse cached_response; |
+ if (!cached_response.ParseFromArray(data.c_str(), data.size())) { |
+ LOG(WARNING) << "Failed to parse policy data read from " |
+ << backing_file_path_.value(); |
+ return; |
+ } |
+ |
+ if (cached_response.unmanaged()) { |
+ SetUnmanagedInternal(base::Time::FromTimeT(cached_response.timestamp())); |
+ } else if (cached_response.has_cloud_policy()) { |
+ base::Time timestamp; |
+ if (SetPolicyInternal(cached_response.cloud_policy(), ×tamp, true)) |
+ set_last_policy_refresh_time(timestamp); |
+ } |
+} |
+ |
+void UserPolicyCache::SetPolicy(const em::PolicyFetchResponse& policy) { |
+ base::Time now = base::Time::NowFromSystemTime(); |
+ set_last_policy_refresh_time(now); |
+ bool ok = SetPolicyInternal(policy, NULL, false); |
+ if (ok) |
+ PersistPolicy(policy, now); |
+} |
+ |
+void UserPolicyCache::SetUnmanaged() { |
+ DCHECK(CalledOnValidThread()); |
+ SetUnmanagedInternal(base::Time::NowFromSystemTime()); |
+ BrowserThread::PostTask( |
+ BrowserThread::FILE, |
+ FROM_HERE, |
+ new PersistPolicyTask(backing_file_path_, NULL, true)); |
+} |
+ |
+void UserPolicyCache::PersistPolicy(const em::PolicyFetchResponse& policy, |
+ const base::Time& timestamp) { |
+ if (timestamp > base::Time::NowFromSystemTime() + |
+ base::TimeDelta::FromMinutes(1)) { |
+ LOG(WARNING) << "Server returned policy with timestamp from the future, " |
+ "not persisting to disk."; |
+ } else { |
+ em::PolicyFetchResponse* policy_copy = new em::PolicyFetchResponse; |
+ policy_copy->CopyFrom(policy); |
+ BrowserThread::PostTask( |
+ BrowserThread::FILE, |
+ FROM_HERE, |
+ new PersistPolicyTask(backing_file_path_, policy_copy, false)); |
+ } |
+} |
+ |
+bool UserPolicyCache::DecodePolicyData(const em::PolicyData& policy_data, |
+ PolicyMap* mandatory, |
+ PolicyMap* recommended) { |
+ // TODO(jkummerow): Verify policy_data.device_token(). Needs final |
+ // specification which token we're actually sending / expecting to get back. |
+ em::CloudPolicySettings policy; |
+ if (!policy.ParseFromString(policy_data.policy_value())) { |
+ LOG(WARNING) << "Failed to parse CloudPolicySettings protobuf."; |
+ return false; |
+ } |
+ DecodePolicy(policy, mandatory, recommended); |
+ return true; |
+} |
+ |
+} // namespace policy |