Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/policy/configuration_policy_handler.h" | |
| 6 | |
| 7 #include <vector> | |
| 8 | |
| 9 #include "base/file_path.h" | |
| 10 #include "base/logging.h" | |
| 11 #include "base/stl_util.h" | |
| 12 #include "base/string16.h" | |
| 13 #include "base/string_number_conversions.h" | |
| 14 #include "base/string_util.cc" | |
| 15 #include "base/utf_string_conversions.h" | |
| 16 #include "chrome/browser/download/download_util.h" | |
| 17 #include "chrome/browser/policy/configuration_policy_handler_list.h" | |
| 18 #include "chrome/browser/policy/configuration_policy_pref_store.h" | |
| 19 #include "chrome/browser/policy/policy_path_parser.h" | |
| 20 #include "chrome/browser/prefs/proxy_config_dictionary.h" | |
| 21 #include "chrome/browser/prefs/proxy_prefs.h" | |
| 22 #include "chrome/browser/search_engines/search_terms_data.h" | |
| 23 #include "chrome/browser/search_engines/template_url.h" | |
| 24 #include "chrome/common/pref_names.h" | |
| 25 #include "grit/generated_resources.h" | |
| 26 | |
| 27 namespace policy { | |
| 28 | |
| 29 namespace { | |
| 30 | |
| 31 std::string ValueTypeToString(Value::Type type) { | |
| 32 static const char* strings[] = { "null", | |
| 33 "boolean", | |
| 34 "integer", | |
| 35 "double", | |
| 36 "string", | |
| 37 "binary", | |
| 38 "dictionary", | |
| 39 "list" }; | |
| 40 DCHECK(static_cast<size_t>(type) < arraysize(strings)); | |
| 41 return std::string(strings[type]); | |
| 42 } | |
| 43 | |
| 44 const PolicyToPreferenceMapEntry kDefaultSearchPolicyMap[] = { | |
| 45 { Value::TYPE_BOOLEAN, kPolicyDefaultSearchProviderEnabled, | |
| 46 prefs::kDefaultSearchProviderEnabled }, | |
| 47 { Value::TYPE_STRING, kPolicyDefaultSearchProviderName, | |
| 48 prefs::kDefaultSearchProviderName }, | |
| 49 { Value::TYPE_STRING, kPolicyDefaultSearchProviderKeyword, | |
| 50 prefs::kDefaultSearchProviderKeyword }, | |
| 51 { Value::TYPE_STRING, kPolicyDefaultSearchProviderSearchURL, | |
| 52 prefs::kDefaultSearchProviderSearchURL }, | |
| 53 { Value::TYPE_STRING, kPolicyDefaultSearchProviderSuggestURL, | |
| 54 prefs::kDefaultSearchProviderSuggestURL }, | |
| 55 { Value::TYPE_STRING, kPolicyDefaultSearchProviderInstantURL, | |
| 56 prefs::kDefaultSearchProviderInstantURL }, | |
| 57 { Value::TYPE_STRING, kPolicyDefaultSearchProviderIconURL, | |
| 58 prefs::kDefaultSearchProviderIconURL }, | |
| 59 { Value::TYPE_LIST, kPolicyDefaultSearchProviderEncodings, | |
| 60 prefs::kDefaultSearchProviderEncodings }, | |
| 61 }; | |
| 62 | |
| 63 // Implementation of SearchTermsData just for validation. | |
| 64 class SearchTermsDataForValidation : public SearchTermsData { | |
| 65 public: | |
| 66 SearchTermsDataForValidation() {} | |
| 67 | |
| 68 // Implementation of SearchTermsData. | |
| 69 virtual std::string GoogleBaseURLValue() const { | |
| 70 return "http://www.google.com/"; | |
| 71 } | |
| 72 virtual std::string GetApplicationLocale() const { | |
| 73 return "en"; | |
| 74 } | |
| 75 #if defined(OS_WIN) && defined(GOOGLE_CHROME_BUILD) | |
| 76 virtual string16 GetRlzParameterValue() const { | |
| 77 return string16(); | |
| 78 } | |
| 79 #endif | |
| 80 private: | |
| 81 DISALLOW_COPY_AND_ASSIGN(SearchTermsDataForValidation); | |
| 82 }; | |
| 83 | |
| 84 // This is used to check whether for a given ProxyMode value, the ProxyPacUrl, | |
| 85 // the ProxyBypassList and the ProxyServer policies are allowed to be specified. | |
| 86 // |error_message_id| is the message id of the localized error message to show | |
| 87 // when the policies are not specified as allowed. Each value of ProxyMode | |
| 88 // has a ProxyModeValidationEntry in the kProxyModeValidationMap below. | |
| 89 struct ProxyModeValidationEntry { | |
| 90 std::string mode_value; | |
| 91 bool pac_url_allowed; | |
| 92 bool bypass_list_allowed; | |
| 93 bool server_allowed; | |
| 94 int error_message_id; | |
| 95 }; | |
| 96 | |
| 97 const ProxyModeValidationEntry kProxyModeValidationMap[] = { | |
| 98 { ProxyPrefs::kDirectProxyModeName, | |
| 99 false, false, false, IDS_POLICY_PROXY_MODE_DISABLED_ERROR }, | |
| 100 { ProxyPrefs::kAutoDetectProxyModeName, | |
| 101 false, false, false, IDS_POLICY_PROXY_MODE_AUTO_DETECT_ERROR }, | |
| 102 { ProxyPrefs::kPacScriptProxyModeName, | |
| 103 true, false, false, IDS_POLICY_PROXY_MODE_PAC_URL_ERROR }, | |
| 104 { ProxyPrefs::kFixedServersProxyModeName, | |
| 105 false, true, true, IDS_POLICY_PROXY_MODE_FIXED_SERVERS_ERROR }, | |
| 106 { ProxyPrefs::kSystemProxyModeName, | |
| 107 false, false, false, IDS_POLICY_PROXY_MODE_SYSTEM_ERROR }, | |
| 108 }; | |
| 109 | |
| 110 } // namespace | |
| 111 | |
| 112 // TypeCheckingPolicyHandler | |
| 113 TypeCheckingPolicyHandler::TypeCheckingPolicyHandler( | |
| 114 ConfigurationPolicyType policy, | |
| 115 Value::Type value_type) | |
| 116 : policy_type_(policy), | |
| 117 value_type_(value_type) { | |
| 118 } | |
| 119 | |
| 120 TypeCheckingPolicyHandler::~TypeCheckingPolicyHandler() { | |
| 121 } | |
| 122 | |
| 123 ConfigurationPolicyType TypeCheckingPolicyHandler::policy_type() const { | |
| 124 return policy_type_; | |
| 125 } | |
| 126 | |
| 127 bool TypeCheckingPolicyHandler::CheckPolicySettings(const PolicyMap* policies, | |
| 128 PolicyErrorMap* errors) { | |
| 129 const Value* value = policies->Get(policy_type_); | |
| 130 if (value && value_type_ != value->GetType()) { | |
| 131 errors->AddError(policy_type_, | |
| 132 IDS_POLICY_TYPE_ERROR, ValueTypeToString(value_type_)); | |
| 133 return false; | |
| 134 } | |
| 135 return true; | |
| 136 } | |
| 137 | |
| 138 // SimplePolicyHandler | |
| 139 SimplePolicyHandler::SimplePolicyHandler( | |
| 140 ConfigurationPolicyType policy, | |
| 141 Value::Type value_type, | |
| 142 const char* pref_path) | |
| 143 : TypeCheckingPolicyHandler(policy, value_type), | |
| 144 pref_path_(pref_path) { | |
| 145 } | |
| 146 | |
| 147 SimplePolicyHandler::~SimplePolicyHandler() { | |
| 148 } | |
| 149 | |
| 150 void SimplePolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 151 PrefValueMap* prefs) { | |
| 152 const Value* value = policies->Get(policy_type()); | |
| 153 if (value) | |
| 154 prefs->SetValue(pref_path_, value->DeepCopy()); | |
| 155 } | |
| 156 | |
| 157 // SyncPolicyHandler | |
| 158 SyncPolicyHandler::SyncPolicyHandler() | |
| 159 : TypeCheckingPolicyHandler(kPolicySyncDisabled, | |
| 160 Value::TYPE_BOOLEAN) { | |
| 161 } | |
| 162 | |
| 163 SyncPolicyHandler::~SyncPolicyHandler() { | |
| 164 } | |
| 165 | |
| 166 void SyncPolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 167 PrefValueMap* prefs) { | |
| 168 const Value* value = policies->Get(policy_type()); | |
| 169 bool disable_sync; | |
| 170 if (value && value->GetAsBoolean(&disable_sync) && disable_sync) | |
| 171 prefs->SetValue(prefs::kSyncManaged, value->DeepCopy()); | |
| 172 } | |
| 173 | |
| 174 // AutofillPolicyHandler | |
| 175 AutofillPolicyHandler::AutofillPolicyHandler() | |
| 176 : TypeCheckingPolicyHandler(kPolicyAutoFillEnabled, | |
| 177 Value::TYPE_BOOLEAN) { | |
| 178 } | |
| 179 | |
| 180 AutofillPolicyHandler::~AutofillPolicyHandler() { | |
| 181 } | |
| 182 | |
| 183 void AutofillPolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 184 PrefValueMap* prefs) { | |
| 185 const Value* value = policies->Get(policy_type()); | |
| 186 bool auto_fill_enabled; | |
| 187 if (value && value->GetAsBoolean(&auto_fill_enabled) && !auto_fill_enabled) { | |
| 188 prefs->SetValue(prefs::kAutofillEnabled, | |
| 189 Value::CreateBooleanValue(false)); | |
| 190 } | |
| 191 } | |
| 192 | |
| 193 // DownloadDirPolicyHandler | |
| 194 DownloadDirPolicyHandler::DownloadDirPolicyHandler() | |
| 195 : TypeCheckingPolicyHandler(kPolicyDownloadDirectory, | |
| 196 Value::TYPE_STRING) { | |
| 197 } | |
| 198 | |
| 199 DownloadDirPolicyHandler::~DownloadDirPolicyHandler() { | |
| 200 } | |
| 201 | |
| 202 void DownloadDirPolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 203 PrefValueMap* prefs) { | |
| 204 const Value* value = policies->Get(policy_type()); | |
| 205 FilePath::StringType string_value; | |
| 206 if (!value || !value->GetAsString(&string_value)) | |
| 207 return; | |
| 208 | |
| 209 FilePath::StringType expanded_value = | |
| 210 policy::path_parser::ExpandPathVariables(string_value); | |
| 211 // Leaving the policy empty would revert to the default download location | |
| 212 // else we would point in an undefined location. We do this after the | |
| 213 // path expansion because it might lead to an empty string(e.g. for "\"\""). | |
| 214 if (expanded_value.empty()) | |
| 215 expanded_value = download_util::GetDefaultDownloadDirectory().value(); | |
| 216 prefs->SetValue(prefs::kDownloadDefaultDirectory, | |
| 217 Value::CreateStringValue(expanded_value)); | |
| 218 prefs->SetValue(prefs::kPromptForDownload, | |
| 219 Value::CreateBooleanValue(false)); | |
| 220 } | |
| 221 | |
| 222 // DiskCacheDirPolicyHandler | |
| 223 DiskCacheDirPolicyHandler::DiskCacheDirPolicyHandler() | |
| 224 : TypeCheckingPolicyHandler(kPolicyDiskCacheDir, | |
| 225 Value::TYPE_STRING) { | |
| 226 } | |
| 227 | |
| 228 DiskCacheDirPolicyHandler::~DiskCacheDirPolicyHandler() { | |
| 229 } | |
| 230 | |
| 231 void DiskCacheDirPolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 232 PrefValueMap* prefs) { | |
| 233 const Value* value = policies->Get(policy_type()); | |
| 234 FilePath::StringType string_value; | |
| 235 if (value && value->GetAsString(&string_value)) { | |
| 236 FilePath::StringType expanded_value = | |
| 237 policy::path_parser::ExpandPathVariables(string_value); | |
| 238 prefs->SetValue(prefs::kDiskCacheDir, | |
| 239 Value::CreateStringValue(expanded_value)); | |
| 240 } | |
| 241 } | |
| 242 | |
| 243 // FileSelectionDialogsHandler | |
| 244 FileSelectionDialogsHandler::FileSelectionDialogsHandler() | |
| 245 : TypeCheckingPolicyHandler(kPolicyAllowFileSelectionDialogs, | |
| 246 Value::TYPE_BOOLEAN) { | |
| 247 } | |
| 248 | |
| 249 FileSelectionDialogsHandler::~FileSelectionDialogsHandler() { | |
| 250 } | |
| 251 | |
| 252 void FileSelectionDialogsHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 253 PrefValueMap* prefs) { | |
| 254 const Value* value = policies->Get(policy_type()); | |
| 255 if (!value) | |
| 256 return; | |
| 257 | |
| 258 prefs->SetValue(prefs::kAllowFileSelectionDialogs, value->DeepCopy()); | |
| 259 // If file-selection dialogs are not allowed we forbid the user to be | |
| 260 // prompted for the download location, since this would end up in an Infobar | |
| 261 // explaining that file-selection dialogs are forbidden anyways. | |
| 262 bool allow_file_selection_dialogs = true; | |
| 263 if (value->GetAsBoolean(&allow_file_selection_dialogs) && | |
| 264 !allow_file_selection_dialogs) { | |
| 265 prefs->SetValue(prefs::kPromptForDownload, | |
| 266 Value::CreateBooleanValue(false)); | |
| 267 } | |
| 268 } | |
| 269 | |
| 270 // BookmarksPolicyHandler | |
| 271 BookmarksPolicyHandler::BookmarksPolicyHandler() | |
| 272 : TypeCheckingPolicyHandler(kPolicyBookmarkBarEnabled, | |
| 273 Value::TYPE_BOOLEAN) { | |
| 274 } | |
| 275 | |
| 276 BookmarksPolicyHandler::~BookmarksPolicyHandler() { | |
| 277 } | |
| 278 | |
| 279 void BookmarksPolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 280 PrefValueMap* prefs) { | |
| 281 const Value* value = policies->Get(policy_type()); | |
| 282 if (!value) | |
| 283 return; | |
| 284 | |
| 285 prefs->SetValue(prefs::kEnableBookmarkBar, value->DeepCopy()); | |
| 286 // kShowBookmarkBar is not managed directly by a policy, but when | |
| 287 // kEnableBookmarkBar is managed, kShowBookmarkBar should be false so that | |
| 288 // the bookmarks bar either is completely disabled or only shows on the NTP. | |
| 289 // This also disables the checkbox for this preference in the prefs UI. | |
| 290 prefs->SetValue(prefs::kShowBookmarkBar, Value::CreateBooleanValue(false)); | |
| 291 } | |
| 292 | |
| 293 // IncognitoModePolicyHandler | |
| 294 IncognitoModePolicyHandler::IncognitoModePolicyHandler() { | |
| 295 } | |
| 296 | |
| 297 IncognitoModePolicyHandler::~IncognitoModePolicyHandler() { | |
| 298 } | |
| 299 | |
| 300 bool IncognitoModePolicyHandler::CheckPolicySettings(const PolicyMap* policies, | |
| 301 PolicyErrorMap* errors) { | |
| 302 int int_value = IncognitoModePrefs::ENABLED; | |
| 303 const Value* availability = policies->Get(kPolicyIncognitoModeAvailability); | |
| 304 | |
| 305 if (availability) { | |
| 306 if (availability->GetAsInteger(&int_value)) { | |
| 307 IncognitoModePrefs::Availability availability_enum_value; | |
| 308 if (!IncognitoModePrefs::IntToAvailability(int_value, | |
| 309 &availability_enum_value)) { | |
| 310 errors->AddError(kPolicyIncognitoModeAvailability, | |
| 311 IDS_POLICY_OUT_OF_RANGE_ERROR, | |
| 312 base::IntToString(int_value)); | |
| 313 return false; | |
| 314 } | |
| 315 } else { | |
| 316 errors->AddError(kPolicyIncognitoModeAvailability, | |
| 317 IDS_POLICY_TYPE_ERROR, | |
| 318 ValueTypeToString(Value::TYPE_INTEGER)); | |
| 319 return false; | |
| 320 } | |
| 321 } else { | |
| 322 const Value* deprecated_enabled = policies->Get(kPolicyIncognitoEnabled); | |
| 323 // If kPolicyIncognitoModeAvailability is not specified, check the obsolete | |
| 324 // kPolicyIncognitoEnabled. | |
| 325 if (deprecated_enabled && | |
| 326 !deprecated_enabled->IsType(Value::TYPE_BOOLEAN)) { | |
| 327 errors->AddError(kPolicyIncognitoEnabled, | |
| 328 IDS_POLICY_TYPE_ERROR, | |
| 329 ValueTypeToString(Value::TYPE_BOOLEAN)); | |
| 330 return false; | |
| 331 } | |
| 332 } | |
| 333 return true; | |
| 334 } | |
| 335 | |
| 336 void IncognitoModePolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 337 PrefValueMap* prefs) { | |
| 338 const Value* availability = policies->Get(kPolicyIncognitoModeAvailability); | |
| 339 const Value* deprecated_enabled = policies->Get(kPolicyIncognitoEnabled); | |
| 340 if (availability) { | |
| 341 int int_value = IncognitoModePrefs::ENABLED; | |
| 342 IncognitoModePrefs::Availability availability_enum_value; | |
| 343 if (availability->GetAsInteger(&int_value) && | |
| 344 IncognitoModePrefs::IntToAvailability(int_value, | |
| 345 &availability_enum_value)) { | |
| 346 prefs->SetValue(prefs::kIncognitoModeAvailability, | |
| 347 Value::CreateIntegerValue(availability_enum_value)); | |
| 348 } | |
| 349 } else if (deprecated_enabled) { | |
| 350 bool enabled = true; | |
| 351 if (deprecated_enabled->GetAsBoolean(&enabled)) { | |
| 352 prefs->SetInteger(prefs::kIncognitoModeAvailability, | |
| 353 enabled ? IncognitoModePrefs::ENABLED : | |
| 354 IncognitoModePrefs::DISABLED); | |
| 355 } | |
| 356 } | |
| 357 } | |
| 358 | |
| 359 // DefaultSearchEncodingsPolicyHandler | |
| 360 DefaultSearchEncodingsPolicyHandler::DefaultSearchEncodingsPolicyHandler() | |
| 361 : TypeCheckingPolicyHandler(kPolicyDefaultSearchProviderEncodings, | |
| 362 Value::TYPE_LIST) { | |
| 363 } | |
| 364 | |
| 365 DefaultSearchEncodingsPolicyHandler::~DefaultSearchEncodingsPolicyHandler() { | |
| 366 } | |
| 367 | |
| 368 void DefaultSearchEncodingsPolicyHandler::ApplyPolicySettings( | |
| 369 const PolicyMap* policies, PrefValueMap* prefs) { | |
| 370 const Value* value = policies->Get(policy_type()); | |
| 371 const ListValue* list; | |
| 372 if (!value || !value->GetAsList(&list)) | |
| 373 return; | |
| 374 | |
| 375 ListValue::const_iterator iter(list->begin()); | |
| 376 ListValue::const_iterator end(list->end()); | |
| 377 std::vector<std::string> string_parts; | |
| 378 for (; iter != end; ++iter) { | |
| 379 std::string s; | |
| 380 if ((*iter)->GetAsString(&s)) { | |
| 381 string_parts.push_back(s); | |
| 382 } else { | |
| 383 NOTREACHED(); | |
| 384 } | |
| 385 } | |
| 386 std::string encodings = JoinString(string_parts, ';'); | |
| 387 prefs->SetValue(prefs::kDefaultSearchProviderEncodings, | |
| 388 Value::CreateStringValue(encodings)); | |
| 389 } | |
| 390 | |
| 391 // DefaultSearchPolicyHandler | |
| 392 DefaultSearchPolicyHandler::DefaultSearchPolicyHandler() { | |
| 393 for (size_t current = 0; | |
| 394 current < arraysize(kDefaultSearchPolicyMap); ++current) { | |
| 395 ConfigurationPolicyType policy_type = | |
| 396 kDefaultSearchPolicyMap[current].policy_type; | |
| 397 if (policy_type != kPolicyDefaultSearchProviderEncodings) { | |
| 398 handlers_.push_back( | |
| 399 new SimplePolicyHandler( | |
| 400 policy_type, | |
| 401 kDefaultSearchPolicyMap[current].value_type, | |
| 402 kDefaultSearchPolicyMap[current].preference_path)); | |
| 403 } else { | |
| 404 handlers_.push_back(new DefaultSearchEncodingsPolicyHandler()); | |
| 405 } | |
| 406 } | |
| 407 } | |
| 408 | |
| 409 DefaultSearchPolicyHandler::~DefaultSearchPolicyHandler() { | |
| 410 STLDeleteContainerPointers(handlers_.begin(), handlers_.end()); | |
| 411 handlers_.clear(); | |
| 412 } | |
| 413 | |
| 414 bool DefaultSearchPolicyHandler::CheckPolicySettings(const PolicyMap* policies, | |
| 415 PolicyErrorMap* errors) { | |
| 416 if (!CheckIndividualPolicies(policies, errors)) | |
| 417 return false; | |
| 418 | |
| 419 if (DefaultSearchProviderIsDisabled(policies)) { | |
| 420 // Add an error for all specified default search policies except | |
| 421 // DefaultSearchProviderEnabled. | |
| 422 int message_id = IDS_POLICY_DEFAULT_SEARCH_DISABLED; | |
| 423 for (size_t current = 0; | |
| 424 current < arraysize(kDefaultSearchPolicyMap); ++current) { | |
| 425 ConfigurationPolicyType policy_type = | |
| 426 kDefaultSearchPolicyMap[current].policy_type; | |
| 427 if (policy_type != kPolicyDefaultSearchProviderEnabled && | |
| 428 HasDefaultSearchPolicy(policies, policy_type)) { | |
| 429 errors->AddError(policy_type, message_id); | |
| 430 } | |
| 431 } | |
| 432 return true; | |
| 433 } | |
| 434 | |
| 435 const Value* search_url = | |
| 436 policies->Get(kPolicyDefaultSearchProviderSearchURL); | |
| 437 if (!search_url && AnyDefaultSearchPoliciesSpecified(policies)) { | |
| 438 errors->AddError(kPolicyDefaultSearchProviderSearchURL, | |
|
Mattias Nissler (ping if slow)
2011/09/30 13:33:35
Indentation
| |
| 439 IDS_POLICY_NOT_SPECIFIED_ERROR); | |
| 440 return false; | |
| 441 } | |
| 442 | |
| 443 if (search_url && !DefaultSearchURLIsValid(policies)) { | |
| 444 errors->AddError(kPolicyDefaultSearchProviderSearchURL, | |
| 445 IDS_POLICY_INVALID_SEARCH_URL_ERROR); | |
| 446 return false; | |
| 447 } | |
| 448 return true; | |
| 449 } | |
| 450 | |
| 451 void DefaultSearchPolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 452 PrefValueMap* prefs) { | |
| 453 if (DefaultSearchProviderIsDisabled(policies)) { | |
| 454 // If default search is disabled, we ignore the other fields. | |
| 455 prefs->SetString(prefs::kDefaultSearchProviderName, std::string()); | |
| 456 prefs->SetString(prefs::kDefaultSearchProviderSearchURL, std::string()); | |
| 457 prefs->SetString(prefs::kDefaultSearchProviderSuggestURL, std::string()); | |
| 458 prefs->SetString(prefs::kDefaultSearchProviderIconURL, std::string()); | |
| 459 prefs->SetString(prefs::kDefaultSearchProviderEncodings, std::string()); | |
| 460 prefs->SetString(prefs::kDefaultSearchProviderKeyword, std::string()); | |
| 461 prefs->SetString(prefs::kDefaultSearchProviderInstantURL, std::string()); | |
| 462 return; | |
| 463 } | |
| 464 | |
| 465 const Value* search_url = | |
| 466 policies->Get(kPolicyDefaultSearchProviderSearchURL); | |
| 467 // The search URL is required. | |
| 468 if (!search_url) | |
| 469 return; | |
| 470 | |
| 471 // The other entries are optional. Just make sure that they are all | |
| 472 // specified via policy, so that we don't use regular prefs. | |
| 473 if (DefaultSearchURLIsValid(policies)) { | |
| 474 | |
| 475 // Apply all default search policies. | |
| 476 PrefValueMap tmp_prefs; | |
| 477 HandlerList::const_iterator handler = handlers_.begin(); | |
| 478 for ( ; handler != handlers_.end(); ++handler) | |
| 479 (*handler)->ApplyPolicySettings(policies, &tmp_prefs); | |
| 480 | |
| 481 EnsureStringPrefExists(&tmp_prefs, prefs::kDefaultSearchProviderSuggestURL); | |
| 482 EnsureStringPrefExists(&tmp_prefs, prefs::kDefaultSearchProviderIconURL); | |
| 483 EnsureStringPrefExists(&tmp_prefs, prefs::kDefaultSearchProviderEncodings); | |
| 484 EnsureStringPrefExists(&tmp_prefs, prefs::kDefaultSearchProviderKeyword); | |
| 485 EnsureStringPrefExists(&tmp_prefs, prefs::kDefaultSearchProviderInstantURL); | |
| 486 | |
| 487 // For the name, default to the host if not specified. | |
| 488 std::string name; | |
| 489 if (!tmp_prefs.GetString(prefs::kDefaultSearchProviderName, &name) || | |
| 490 name.empty()) { | |
| 491 std::string search_url_string; | |
| 492 if (search_url->GetAsString(&search_url_string)) { | |
| 493 tmp_prefs.SetString(prefs::kDefaultSearchProviderName, | |
| 494 GURL(search_url_string).host()); | |
| 495 } | |
| 496 } | |
| 497 | |
| 498 // And clear the IDs since these are not specified via policy. | |
| 499 tmp_prefs.SetString(prefs::kDefaultSearchProviderID, std::string()); | |
| 500 tmp_prefs.SetString(prefs::kDefaultSearchProviderPrepopulateID, | |
| 501 std::string()); | |
| 502 prefs->MergeFrom(&tmp_prefs); | |
| 503 } | |
| 504 } | |
| 505 | |
| 506 bool DefaultSearchPolicyHandler::CheckIndividualPolicies( | |
| 507 const PolicyMap* policies, PolicyErrorMap* errors) { | |
| 508 bool ok = true; | |
| 509 HandlerList::const_iterator handler = handlers_.begin(); | |
| 510 for ( ; handler != handlers_.end(); ++handler) { | |
| 511 if (!(*handler)->CheckPolicySettings(policies, errors)) | |
| 512 ok = false; | |
| 513 } | |
| 514 return ok; | |
| 515 } | |
| 516 | |
| 517 bool DefaultSearchPolicyHandler::HasDefaultSearchPolicy( | |
| 518 const PolicyMap* policies, ConfigurationPolicyType policy_type) { | |
| 519 return policies->Get(policy_type) ? true : false; | |
| 520 } | |
| 521 | |
| 522 bool DefaultSearchPolicyHandler::AnyDefaultSearchPoliciesSpecified( | |
| 523 const PolicyMap* policies) { | |
| 524 for (size_t current = 0; | |
| 525 current < arraysize(kDefaultSearchPolicyMap); ++current) { | |
| 526 if (policies->Get(kDefaultSearchPolicyMap[current].policy_type)) | |
| 527 return true; | |
| 528 } | |
| 529 return false; | |
| 530 } | |
| 531 | |
| 532 bool DefaultSearchPolicyHandler::DefaultSearchProviderIsDisabled( | |
| 533 const PolicyMap* policies) { | |
| 534 const Value* provider_enabled = | |
| 535 policies->Get(kPolicyDefaultSearchProviderEnabled); | |
| 536 bool enabled = true; | |
| 537 return provider_enabled && | |
| 538 provider_enabled->GetAsBoolean(&enabled) && | |
| 539 !enabled; | |
| 540 } | |
| 541 | |
| 542 bool DefaultSearchPolicyHandler::DefaultSearchURLIsValid( | |
| 543 const PolicyMap* policies) { | |
| 544 const Value* search_url = | |
| 545 policies->Get(kPolicyDefaultSearchProviderSearchURL); | |
| 546 if (!search_url) | |
| 547 return true; | |
| 548 | |
| 549 std::string search_url_string; | |
| 550 if (search_url->GetAsString(&search_url_string)) { | |
| 551 SearchTermsDataForValidation search_terms_data; | |
| 552 const TemplateURLRef search_url_ref(search_url_string, 0, 0); | |
| 553 // It must support replacement (which implies it is valid). | |
| 554 return search_url_ref.SupportsReplacementUsingTermsData(search_terms_data); | |
| 555 } | |
| 556 return false; | |
| 557 } | |
| 558 | |
| 559 void DefaultSearchPolicyHandler::EnsureStringPrefExists( | |
| 560 PrefValueMap* prefs, const std::string& path) { | |
| 561 std::string value; | |
| 562 if (!prefs->GetString(path, &value)) | |
| 563 prefs->SetString(path, value); | |
| 564 } | |
| 565 | |
| 566 // ProxyPolicyHandler | |
| 567 ProxyPolicyHandler::ProxyPolicyHandler() { | |
| 568 } | |
| 569 | |
| 570 ProxyPolicyHandler::~ProxyPolicyHandler() { | |
| 571 } | |
| 572 | |
| 573 bool ProxyPolicyHandler::CheckPolicySettings(const PolicyMap* policies, | |
| 574 PolicyErrorMap* errors) { | |
| 575 const Value* mode = GetProxyPolicyValue(policies, kPolicyProxyMode); | |
| 576 const Value* server = GetProxyPolicyValue(policies, kPolicyProxyServer); | |
| 577 const Value* server_mode = | |
| 578 GetProxyPolicyValue(policies, kPolicyProxyServerMode); | |
| 579 const Value* pac_url = GetProxyPolicyValue(policies, kPolicyProxyPacUrl); | |
| 580 const Value* bypass_list = | |
| 581 GetProxyPolicyValue(policies, kPolicyProxyBypassList); | |
| 582 | |
| 583 if ((server || pac_url || bypass_list) && !(mode || server_mode)) { | |
| 584 errors->AddError(kPolicyProxyMode, | |
| 585 IDS_POLICY_NOT_SPECIFIED_ERROR); | |
| 586 return false; | |
| 587 } | |
| 588 | |
| 589 std::string mode_value; | |
| 590 if (!CheckProxyModeAndServerMode(policies, errors, &mode_value)) | |
| 591 return false; | |
| 592 | |
| 593 // If neither ProxyMode nor ProxyServerMode are specified, mode_value will be | |
| 594 // empty and the proxy shouldn't be configured at all. | |
| 595 if (mode_value.empty()) | |
| 596 return true; | |
| 597 | |
| 598 bool is_valid_mode = false; | |
| 599 for (size_t current = 0; | |
| 600 current != arraysize(kProxyModeValidationMap); ++current) { | |
| 601 const ProxyModeValidationEntry& entry = kProxyModeValidationMap[current]; | |
| 602 if (entry.mode_value != mode_value) | |
| 603 continue; | |
| 604 | |
| 605 is_valid_mode = true; | |
| 606 | |
| 607 if (!entry.pac_url_allowed && pac_url) | |
| 608 errors->AddError(kPolicyProxyPacUrl, entry.error_message_id); | |
| 609 if (!entry.bypass_list_allowed && bypass_list) | |
| 610 errors->AddError(kPolicyProxyPacUrl, entry.error_message_id); | |
| 611 if (!entry.server_allowed && server) | |
| 612 errors->AddError(kPolicyProxyPacUrl, entry.error_message_id); | |
| 613 | |
| 614 if ((!entry.pac_url_allowed && pac_url) || | |
| 615 (!entry.bypass_list_allowed && bypass_list) || | |
| 616 (!entry.server_allowed && server)) { | |
| 617 return false; | |
| 618 } | |
| 619 } | |
| 620 | |
| 621 if (!is_valid_mode) { | |
| 622 if (server_mode) { | |
| 623 errors->AddError(kPolicyProxyServerMode, IDS_POLICY_OUT_OF_RANGE_ERROR, | |
| 624 mode_value); | |
| 625 } else { | |
| 626 errors->AddError(kPolicyProxyMode, IDS_POLICY_OUT_OF_RANGE_ERROR, | |
| 627 mode_value); | |
| 628 } | |
| 629 return false; | |
| 630 } | |
| 631 return true; | |
| 632 } | |
| 633 | |
| 634 void ProxyPolicyHandler::ApplyPolicySettings(const PolicyMap* policies, | |
| 635 PrefValueMap* prefs) { | |
| 636 const Value* mode = GetProxyPolicyValue(policies, kPolicyProxyMode); | |
| 637 const Value* server = GetProxyPolicyValue(policies, kPolicyProxyServer); | |
| 638 const Value* server_mode = | |
| 639 GetProxyPolicyValue(policies, kPolicyProxyServerMode); | |
| 640 const Value* pac_url = GetProxyPolicyValue(policies, kPolicyProxyPacUrl); | |
| 641 const Value* bypass_list = | |
| 642 GetProxyPolicyValue(policies, kPolicyProxyBypassList); | |
| 643 | |
| 644 ProxyPrefs::ProxyMode proxy_mode; | |
| 645 if (mode) { | |
| 646 std::string string_mode; | |
| 647 if (!mode->GetAsString(&string_mode)) | |
| 648 return; | |
| 649 ProxyPrefs::StringToProxyMode(string_mode, &proxy_mode); | |
| 650 } else if (server_mode) { | |
| 651 int int_mode = 0; | |
| 652 if (!server_mode->GetAsInteger(&int_mode)) | |
| 653 return; | |
| 654 | |
| 655 switch (int_mode) { | |
| 656 case kPolicyNoProxyServerMode: | |
| 657 proxy_mode = ProxyPrefs::MODE_DIRECT; | |
| 658 break; | |
| 659 case kPolicyAutoDetectProxyServerMode: | |
| 660 proxy_mode = ProxyPrefs::MODE_AUTO_DETECT; | |
| 661 break; | |
| 662 case kPolicyManuallyConfiguredProxyServerMode: | |
| 663 proxy_mode = ProxyPrefs::MODE_FIXED_SERVERS; | |
| 664 if (pac_url) | |
| 665 proxy_mode = ProxyPrefs::MODE_PAC_SCRIPT; | |
| 666 break; | |
| 667 case kPolicyUseSystemProxyServerMode: | |
| 668 proxy_mode = ProxyPrefs::MODE_SYSTEM; | |
| 669 break; | |
| 670 default: | |
| 671 proxy_mode = ProxyPrefs::MODE_DIRECT; | |
| 672 NOTREACHED(); | |
| 673 } | |
| 674 } else { | |
| 675 return; | |
| 676 } | |
| 677 | |
| 678 switch (proxy_mode) { | |
| 679 case ProxyPrefs::MODE_DIRECT: | |
| 680 prefs->SetValue(prefs::kProxy, ProxyConfigDictionary::CreateDirect()); | |
| 681 break; | |
| 682 case ProxyPrefs::MODE_AUTO_DETECT: | |
| 683 prefs->SetValue(prefs::kProxy, ProxyConfigDictionary::CreateAutoDetect()); | |
| 684 break; | |
| 685 case ProxyPrefs::MODE_PAC_SCRIPT: { | |
| 686 std::string pac_url_string; | |
| 687 if (pac_url->GetAsString(&pac_url_string)) { | |
| 688 prefs->SetValue(prefs::kProxy, | |
| 689 ProxyConfigDictionary::CreatePacScript(pac_url_string, false)); | |
| 690 } | |
| 691 break; | |
| 692 } | |
| 693 case ProxyPrefs::MODE_FIXED_SERVERS: { | |
| 694 std::string proxy_server; | |
| 695 std::string bypass_list_string; | |
| 696 if (server->GetAsString(&proxy_server) && | |
| 697 bypass_list && | |
| 698 bypass_list->GetAsString(&bypass_list_string)) { | |
| 699 prefs->SetValue(prefs::kProxy, | |
| 700 ProxyConfigDictionary::CreateFixedServers( | |
| 701 proxy_server, bypass_list_string)); | |
| 702 } | |
| 703 break; | |
| 704 } | |
| 705 case ProxyPrefs::MODE_SYSTEM: | |
| 706 prefs->SetValue(prefs::kProxy, | |
| 707 ProxyConfigDictionary::CreateSystem()); | |
| 708 break; | |
| 709 case ProxyPrefs::kModeCount: | |
| 710 NOTREACHED(); | |
| 711 } | |
| 712 } | |
| 713 | |
| 714 const Value* ProxyPolicyHandler::GetProxyPolicyValue( | |
| 715 const PolicyMap* policies, ConfigurationPolicyType policy) { | |
| 716 const Value* value = policies->Get(policy); | |
| 717 std::string tmp; | |
| 718 if (!value || | |
| 719 value->IsType(Value::TYPE_NULL) || | |
| 720 (value->IsType(Value::TYPE_STRING) && | |
| 721 value->GetAsString(&tmp) && | |
| 722 tmp.empty())) { | |
| 723 return NULL; | |
| 724 } | |
| 725 return value; | |
| 726 } | |
| 727 | |
| 728 bool ProxyPolicyHandler::CheckProxyModeAndServerMode(const PolicyMap* policies, | |
| 729 PolicyErrorMap* errors, | |
| 730 std::string* mode_value) { | |
| 731 const Value* mode = GetProxyPolicyValue(policies, kPolicyProxyMode); | |
| 732 const Value* server = GetProxyPolicyValue(policies, kPolicyProxyServer); | |
| 733 const Value* server_mode = | |
| 734 GetProxyPolicyValue(policies, kPolicyProxyServerMode); | |
| 735 const Value* pac_url = GetProxyPolicyValue(policies, kPolicyProxyPacUrl); | |
| 736 | |
| 737 // If there's a server mode, convert it into a mode. | |
| 738 if (mode) { | |
| 739 if (server_mode) { | |
| 740 errors->AddError(kPolicyProxyMode, IDS_POLICY_PROXY_MODE_IGNORED); | |
| 741 } | |
| 742 if (!mode->GetAsString(mode_value)) { | |
| 743 errors->AddError(kPolicyProxyMode, IDS_POLICY_TYPE_ERROR, | |
| 744 ValueTypeToString(Value::TYPE_BOOLEAN)); | |
| 745 return false; | |
| 746 } | |
| 747 | |
| 748 ProxyPrefs::ProxyMode mode; | |
| 749 if (!ProxyPrefs::StringToProxyMode(*mode_value, &mode)) { | |
| 750 errors->AddError(kPolicyProxyMode, IDS_POLICY_INVALID_PROXY_MODE_ERROR); | |
| 751 return false; | |
| 752 } | |
| 753 | |
| 754 if (mode == ProxyPrefs::MODE_PAC_SCRIPT && !pac_url) { | |
| 755 errors->AddError(kPolicyProxyPacUrl, IDS_POLICY_NOT_SPECIFIED_ERROR); | |
| 756 return false; | |
| 757 } else if (mode == ProxyPrefs::MODE_FIXED_SERVERS && !server) { | |
| 758 errors->AddError(kPolicyProxyServer, IDS_POLICY_NOT_SPECIFIED_ERROR); | |
| 759 return false; | |
| 760 } | |
| 761 } else if (server_mode) { | |
| 762 int server_mode_value; | |
| 763 if (!server_mode->GetAsInteger(&server_mode_value)) { | |
| 764 errors->AddError(kPolicyProxyServerMode, IDS_POLICY_TYPE_ERROR, | |
| 765 ValueTypeToString(Value::TYPE_INTEGER)); | |
| 766 return false; | |
| 767 } | |
| 768 | |
| 769 switch (server_mode_value) { | |
| 770 case kPolicyNoProxyServerMode: | |
| 771 *mode_value = ProxyPrefs::kDirectProxyModeName; | |
| 772 break; | |
| 773 case kPolicyAutoDetectProxyServerMode: | |
| 774 *mode_value = ProxyPrefs::kAutoDetectProxyModeName; | |
| 775 break; | |
| 776 case kPolicyManuallyConfiguredProxyServerMode: | |
| 777 if (server && pac_url) { | |
| 778 int message_id = IDS_POLICY_PROXY_BOTH_SPECIFIED_ERROR; | |
| 779 errors->AddError(kPolicyProxyServer, message_id); | |
| 780 errors->AddError(kPolicyProxyPacUrl, message_id); | |
| 781 return false; | |
| 782 } | |
| 783 if (!server && !pac_url) { | |
| 784 int message_id = IDS_POLICY_PROXY_NEITHER_SPECIFIED_ERROR; | |
| 785 errors->AddError(kPolicyProxyServer, message_id); | |
| 786 errors->AddError(kPolicyProxyPacUrl, message_id); | |
| 787 return false; | |
| 788 } | |
| 789 if (pac_url) | |
| 790 *mode_value = ProxyPrefs::kPacScriptProxyModeName; | |
| 791 else | |
| 792 *mode_value = ProxyPrefs::kFixedServersProxyModeName; | |
| 793 break; | |
| 794 case kPolicyUseSystemProxyServerMode: | |
| 795 *mode_value = ProxyPrefs::kSystemProxyModeName; | |
| 796 break; | |
| 797 default: | |
| 798 errors->AddError(kPolicyProxyServer, IDS_POLICY_OUT_OF_RANGE_ERROR, | |
| 799 base::IntToString(server_mode_value)); | |
| 800 return false; | |
| 801 } | |
| 802 } | |
| 803 return true; | |
| 804 } | |
| 805 | |
| 806 } // namespace policy | |
| OLD | NEW |