Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/cros/onc_network_parser.h" | 5 #include "chrome/browser/chromeos/cros/onc_network_parser.h" |
| 6 | 6 |
| 7 #include "base/base64.h" | 7 #include "base/base64.h" |
| 8 #include "base/json/json_value_serializer.h" | 8 #include "base/json/json_value_serializer.h" |
| 9 #include "base/json/json_writer.h" // for debug output only. | |
| 9 #include "base/stringprintf.h" | 10 #include "base/stringprintf.h" |
| 10 #include "base/values.h" | 11 #include "base/values.h" |
| 11 #include "chrome/browser/chromeos/cros/native_network_constants.h" | 12 #include "chrome/browser/chromeos/cros/native_network_constants.h" |
| 12 #include "chrome/browser/chromeos/cros/native_network_parser.h" | 13 #include "chrome/browser/chromeos/cros/native_network_parser.h" |
| 13 #include "chrome/browser/chromeos/cros/network_library.h" | 14 #include "chrome/browser/chromeos/cros/network_library.h" |
| 14 #include "net/base/cert_database.h" | 15 #include "net/base/cert_database.h" |
| 15 #include "net/base/crypto_module.h" | 16 #include "net/base/crypto_module.h" |
| 16 #include "net/base/net_errors.h" | 17 #include "net/base/net_errors.h" |
| 17 #include "net/base/x509_certificate.h" | 18 #include "net/base/x509_certificate.h" |
| 18 #include "third_party/cros_system_api/dbus/service_constants.h" | 19 #include "third_party/cros_system_api/dbus/service_constants.h" |
| 19 | 20 |
| 20 namespace chromeos { | 21 namespace chromeos { |
| 21 | 22 |
| 22 // Local constants. | 23 // Local constants. |
| 23 namespace { | 24 namespace { |
| 24 | 25 |
| 25 EnumMapper<PropertyIndex>::Pair property_index_table[] = { | 26 const base::Value::Type TYPE_BOOLEAN = base::Value::TYPE_BOOLEAN; |
| 26 { "GUID", PROPERTY_INDEX_GUID }, | 27 const base::Value::Type TYPE_DICTIONARY = base::Value::TYPE_DICTIONARY; |
| 27 { "Name", PROPERTY_INDEX_NAME }, | 28 const base::Value::Type TYPE_INTEGER = base::Value::TYPE_INTEGER; |
| 28 { "Remove", PROPERTY_INDEX_REMOVE }, | 29 const base::Value::Type TYPE_LIST = base::Value::TYPE_LIST; |
| 29 { "ProxyURL", PROPERTY_INDEX_PROXY_CONFIG }, | 30 const base::Value::Type TYPE_STRING = base::Value::TYPE_STRING; |
| 30 { "Type", PROPERTY_INDEX_TYPE }, | 31 |
| 31 { "SSID", PROPERTY_INDEX_SSID }, | 32 // Only used currently to keep NetworkParser superclass happy. |
| 32 { "Passphrase", PROPERTY_INDEX_PASSPHRASE }, | 33 EnumMapper<PropertyIndex>::Pair network_configuration_table[] = { |
| 33 { "AutoConnect", PROPERTY_INDEX_AUTO_CONNECT }, | 34 { "GUID", PROPERTY_INDEX_GUID } |
| 34 { "HiddenSSID", PROPERTY_INDEX_HIDDEN_SSID }, | 35 }; |
| 35 { "Security", PROPERTY_INDEX_SECURITY }, | 36 |
| 36 { "EAP", PROPERTY_INDEX_EAP }, | 37 OncValueSignature network_configuration_signature[] = { |
| 37 { "Outer", PROPERTY_INDEX_EAP_METHOD }, | 38 // TODO(crosbug.com/23673): Support Ethernet settings. |
| 38 { "Inner", PROPERTY_INDEX_EAP_PHASE_2_AUTH }, | 39 { "GUID", PROPERTY_INDEX_GUID, TYPE_STRING }, |
| 39 { "UseSystemCAs", PROPERTY_INDEX_EAP_USE_SYSTEM_CAS }, | 40 { "Name", PROPERTY_INDEX_NAME, TYPE_STRING }, |
| 40 { "ServerCARef", PROPERTY_INDEX_EAP_CA_CERT }, | 41 // TODO(crosbug.com/23674): Support ProxySettings. |
| 41 { "ClientCARef", PROPERTY_INDEX_EAP_CLIENT_CERT }, | 42 // TODO(crosbug.com/23604): Handle removing networks. |
| 42 { "ClientCertPattern", PROPERTY_INDEX_EAP_CLIENT_CERT_PATTERN }, | 43 { "Remove", PROPERTY_INDEX_ONC_REMOVE, TYPE_BOOLEAN }, |
| 43 { "Identity", PROPERTY_INDEX_EAP_IDENTITY }, | 44 { "Type", PROPERTY_INDEX_TYPE, TYPE_STRING }, |
| 44 { "Password", PROPERTY_INDEX_EAP_PASSWORD }, | 45 { "WiFi", PROPERTY_INDEX_ONC_WIFI, TYPE_DICTIONARY }, |
| 45 { "AnonymousIdentity", PROPERTY_INDEX_EAP_ANONYMOUS_IDENTITY }, | 46 { "VPN", PROPERTY_INDEX_ONC_VPN, TYPE_DICTIONARY } |
| 47 }; | |
| 48 | |
| 49 OncValueSignature wifi_signature[] = { | |
| 50 { "AutoConnect", PROPERTY_INDEX_AUTO_CONNECT, TYPE_BOOLEAN }, | |
| 51 { "EAP", PROPERTY_INDEX_EAP, TYPE_DICTIONARY }, | |
| 52 { "HiddenSSID", PROPERTY_INDEX_HIDDEN_SSID, TYPE_BOOLEAN }, | |
| 53 { "Passphrase", PROPERTY_INDEX_PASSPHRASE, TYPE_STRING }, | |
| 54 { "ProxyURL", PROPERTY_INDEX_PROXY_CONFIG, TYPE_STRING }, | |
| 55 { "Security", PROPERTY_INDEX_SECURITY, TYPE_STRING }, | |
| 56 { "SSID", PROPERTY_INDEX_SSID, TYPE_STRING }, | |
| 57 { NULL } | |
| 58 }; | |
| 59 | |
| 60 OncValueSignature eap_signature[] = { | |
| 61 { "AnonymousIdentity", PROPERTY_INDEX_EAP_ANONYMOUS_IDENTITY, TYPE_STRING }, | |
| 62 { "ClientCertPattern", PROPERTY_INDEX_ONC_CLIENT_CERT_PATTERN, | |
| 63 TYPE_DICTIONARY }, | |
| 64 { "ClientCertRef", PROPERTY_INDEX_ONC_CLIENT_CERT_REF, TYPE_STRING }, | |
| 65 { "ClientCertType", PROPERTY_INDEX_ONC_CLIENT_CERT_TYPE, TYPE_STRING }, | |
| 66 { "Identity", PROPERTY_INDEX_EAP_IDENTITY, TYPE_STRING }, | |
| 67 { "Inner", PROPERTY_INDEX_EAP_PHASE_2_AUTH, TYPE_STRING }, | |
| 68 { "Outer", PROPERTY_INDEX_EAP_METHOD, TYPE_STRING }, | |
| 69 { "Password", PROPERTY_INDEX_EAP_PASSWORD, TYPE_STRING }, | |
| 70 { "ServerCARef", PROPERTY_INDEX_EAP_CA_CERT, TYPE_STRING }, | |
| 71 { "UseSystemCAs", PROPERTY_INDEX_EAP_USE_SYSTEM_CAS, TYPE_BOOLEAN }, | |
| 72 { NULL } | |
| 73 }; | |
| 74 | |
| 75 OncValueSignature vpn_signature[] = { | |
| 76 { "Host", PROPERTY_INDEX_HOST, TYPE_STRING }, | |
| 77 { "IPsec", PROPERTY_INDEX_ONC_IPSEC, TYPE_DICTIONARY }, | |
| 78 { "L2TP", PROPERTY_INDEX_ONC_L2TP, TYPE_DICTIONARY }, | |
| 79 { "OpenVPN", PROPERTY_INDEX_ONC_OPENVPN, TYPE_DICTIONARY }, | |
| 80 { "Type", PROPERTY_INDEX_PROVIDER_TYPE, TYPE_STRING }, | |
| 81 { NULL } | |
| 82 }; | |
| 83 | |
| 84 OncValueSignature ipsec_signature[] = { | |
| 85 { "AuthenticationType", PROPERTY_INDEX_IPSEC_AUTHENTICATIONTYPE, | |
| 86 TYPE_STRING }, | |
| 87 { "Group", PROPERTY_INDEX_L2TPIPSEC_GROUP_NAME, TYPE_STRING }, | |
| 88 { "IKEVersion", PROPERTY_INDEX_IPSEC_IKEVERSION, TYPE_INTEGER }, | |
| 89 { "ClientCertPattern", PROPERTY_INDEX_ONC_CLIENT_CERT_PATTERN, | |
| 90 TYPE_DICTIONARY }, | |
| 91 { "ClientCertRef", PROPERTY_INDEX_ONC_CLIENT_CERT_REF, TYPE_STRING }, | |
| 92 { "ClientCertType", PROPERTY_INDEX_ONC_CLIENT_CERT_TYPE, TYPE_STRING }, | |
| 93 // Note: EAP and XAUTH not yet supported. | |
| 94 { "PSK", PROPERTY_INDEX_L2TPIPSEC_PSK, TYPE_STRING }, | |
| 95 { "SaveCredentials", PROPERTY_INDEX_SAVE_CREDENTIALS, TYPE_BOOLEAN }, | |
| 96 { "ServerCARef", PROPERTY_INDEX_L2TPIPSEC_CA_CERT_NSS, TYPE_STRING }, | |
| 97 { NULL } | |
| 98 }; | |
| 99 | |
| 100 OncValueSignature l2tp_signature[] = { | |
| 101 { "Password", PROPERTY_INDEX_L2TPIPSEC_PASSWORD, TYPE_STRING }, | |
| 102 { "SaveCredentials", PROPERTY_INDEX_SAVE_CREDENTIALS, TYPE_BOOLEAN }, | |
| 103 { "Username", PROPERTY_INDEX_L2TPIPSEC_USER, TYPE_STRING }, | |
| 104 { NULL } | |
| 105 }; | |
| 106 | |
| 107 OncValueSignature openvpn_signature[] = { | |
| 108 { "Auth", PROPERTY_INDEX_OPEN_VPN_AUTH, TYPE_STRING }, | |
| 109 { "AuthRetry", PROPERTY_INDEX_OPEN_VPN_AUTHRETRY, TYPE_STRING }, | |
| 110 { "AuthNoCache", PROPERTY_INDEX_OPEN_VPN_AUTHNOCACHE, TYPE_BOOLEAN }, | |
| 111 { "Cipher", PROPERTY_INDEX_OPEN_VPN_CIPHER, TYPE_STRING }, | |
| 112 { "ClientCertPattern", PROPERTY_INDEX_ONC_CLIENT_CERT_PATTERN, | |
| 113 TYPE_DICTIONARY }, | |
| 114 { "ClientCertRef", PROPERTY_INDEX_ONC_CLIENT_CERT_REF, TYPE_STRING }, | |
| 115 { "ClientCertType", PROPERTY_INDEX_ONC_CLIENT_CERT_TYPE, TYPE_STRING }, | |
| 116 { "CompLZO", PROPERTY_INDEX_OPEN_VPN_COMPLZO, TYPE_STRING }, | |
| 117 { "CompNoAdapt", PROPERTY_INDEX_OPEN_VPN_COMPNOADAPT, TYPE_BOOLEAN }, | |
| 118 { "KeyDirection", PROPERTY_INDEX_OPEN_VPN_KEYDIRECTION, TYPE_STRING }, | |
| 119 { "NsCertType", PROPERTY_INDEX_OPEN_VPN_NSCERTTYPE, TYPE_STRING }, | |
| 120 { "Password", PROPERTY_INDEX_OPEN_VPN_PASSWORD, TYPE_STRING }, | |
| 121 { "Port", PROPERTY_INDEX_OPEN_VPN_PORT, TYPE_INTEGER }, | |
| 122 { "Proto", PROPERTY_INDEX_OPEN_VPN_PROTO, TYPE_STRING }, | |
| 123 { "PushPeerInfo", PROPERTY_INDEX_OPEN_VPN_PUSHPEERINFO, TYPE_BOOLEAN }, | |
| 124 { "RemoteCertEKU", PROPERTY_INDEX_OPEN_VPN_REMOTECERTEKU, TYPE_STRING }, | |
| 125 { "RemoteCertKU", PROPERTY_INDEX_OPEN_VPN_REMOTECERTKU, TYPE_LIST }, | |
| 126 { "RemoteCertTLS", PROPERTY_INDEX_OPEN_VPN_REMOTECERTTLS, TYPE_STRING }, | |
| 127 { "RenegSec", PROPERTY_INDEX_OPEN_VPN_RENEGSEC, TYPE_INTEGER }, | |
| 128 { "SaveCredentials", PROPERTY_INDEX_SAVE_CREDENTIALS, TYPE_BOOLEAN }, | |
| 129 { "ServerCARef", PROPERTY_INDEX_OPEN_VPN_CACERT, TYPE_STRING }, | |
| 130 { "ServerCertRef", PROPERTY_INDEX_OPEN_VPN_CERT, TYPE_STRING }, | |
| 131 { "ServerPollTimeout", PROPERTY_INDEX_OPEN_VPN_SERVERPOLLTIMEOUT, | |
| 132 TYPE_INTEGER }, | |
| 133 { "Shaper", PROPERTY_INDEX_OPEN_VPN_SHAPER, TYPE_INTEGER }, | |
| 134 { "StaticChallenge", PROPERTY_INDEX_OPEN_VPN_STATICCHALLENGE, TYPE_STRING }, | |
| 135 { "TLSAuthContents", PROPERTY_INDEX_OPEN_VPN_TLSAUTHCONTENTS, TYPE_STRING }, | |
| 136 { "TLSRemote", PROPERTY_INDEX_OPEN_VPN_TLSREMOTE, TYPE_STRING }, | |
| 137 { "Username", PROPERTY_INDEX_OPEN_VPN_USER, TYPE_STRING }, | |
| 138 { NULL } | |
| 46 }; | 139 }; |
| 47 | 140 |
| 48 // Serve the singleton mapper instance. | 141 // Serve the singleton mapper instance. |
| 49 const EnumMapper<PropertyIndex>* get_onc_mapper() { | 142 const EnumMapper<PropertyIndex>* get_onc_mapper() { |
| 50 CR_DEFINE_STATIC_LOCAL(const EnumMapper<PropertyIndex>, mapper, | 143 CR_DEFINE_STATIC_LOCAL(const EnumMapper<PropertyIndex>, mapper, |
| 51 (property_index_table, | 144 (network_configuration_table, |
| 52 arraysize(property_index_table), | 145 arraysize(network_configuration_table), |
| 53 PROPERTY_INDEX_UNKNOWN)); | 146 PROPERTY_INDEX_UNKNOWN)); |
| 54 return &mapper; | 147 return &mapper; |
| 55 } | 148 } |
| 56 | 149 |
| 57 ConnectionType ParseNetworkType(const std::string& type) { | 150 ConnectionType ParseNetworkType(const std::string& type) { |
| 58 static EnumMapper<ConnectionType>::Pair table[] = { | 151 static EnumMapper<ConnectionType>::Pair table[] = { |
| 59 { "WiFi", TYPE_WIFI }, | 152 { "WiFi", TYPE_WIFI }, |
| 60 { "VPN", TYPE_VPN }, | 153 { "VPN", TYPE_VPN }, |
| 61 }; | 154 }; |
| 62 CR_DEFINE_STATIC_LOCAL(EnumMapper<ConnectionType>, parser, | 155 CR_DEFINE_STATIC_LOCAL(EnumMapper<ConnectionType>, parser, |
| 63 (table, arraysize(table), TYPE_UNKNOWN)); | 156 (table, arraysize(table), TYPE_UNKNOWN)); |
| 64 return parser.Get(type); | 157 return parser.Get(type); |
| 65 } | 158 } |
| 66 | 159 |
| 67 } // namespace | 160 } // namespace |
| 68 | 161 |
| 69 // -------------------- OncNetworkParser -------------------- | 162 // -------------------- OncNetworkParser -------------------- |
| 70 | 163 |
| 71 OncNetworkParser::OncNetworkParser(const std::string& onc_blob) | 164 OncNetworkParser::OncNetworkParser(const std::string& onc_blob) |
| 72 : NetworkParser(get_onc_mapper()), | 165 : NetworkParser(get_onc_mapper()), |
| 73 network_configs_(NULL), | 166 network_configs_(NULL), |
| 74 certificates_(NULL) { | 167 certificates_(NULL) { |
| 168 VLOG(2) << __func__ << ": OncNetworkParser called on " << onc_blob; | |
| 75 JSONStringValueSerializer deserializer(onc_blob); | 169 JSONStringValueSerializer deserializer(onc_blob); |
| 76 deserializer.set_allow_trailing_comma(true); | 170 deserializer.set_allow_trailing_comma(true); |
| 77 scoped_ptr<base::Value> root(deserializer.Deserialize(NULL, &parse_error_)); | 171 scoped_ptr<base::Value> root(deserializer.Deserialize(NULL, &parse_error_)); |
| 78 | 172 |
| 79 if (!root.get() || root->GetType() != base::Value::TYPE_DICTIONARY) { | 173 if (!root.get() || root->GetType() != base::Value::TYPE_DICTIONARY) { |
| 80 LOG(WARNING) << "OncNetworkParser received bad ONC file: " << parse_error_; | 174 LOG(WARNING) << "OncNetworkParser received bad ONC file: " << parse_error_; |
| 81 } else { | 175 } else { |
| 82 root_dict_.reset(static_cast<DictionaryValue*>(root.release())); | 176 root_dict_.reset(static_cast<DictionaryValue*>(root.release())); |
| 83 // At least one of NetworkConfigurations or Certificates is required. | 177 // At least one of NetworkConfigurations or Certificates is required. |
| 84 if (!root_dict_->GetList("NetworkConfigurations", &network_configs_) && | 178 bool has_network_configurations = |
| 85 !root_dict_->GetList("Certificates", &certificates_)) { | 179 root_dict_->GetList("NetworkConfigurations", &network_configs_); |
| 180 bool has_certificates = | |
| 181 root_dict_->GetList("Certificates", &certificates_); | |
| 182 VLOG(2) << "ONC file has " << GetNetworkConfigsSize() << " networks and " | |
| 183 << GetCertificatesSize() << " certificates"; | |
| 184 if (!has_network_configurations || !has_certificates) { | |
| 86 LOG(WARNING) << "ONC file has no NetworkConfigurations or Certificates."; | 185 LOG(WARNING) << "ONC file has no NetworkConfigurations or Certificates."; |
| 87 } | 186 } |
| 88 } | 187 } |
| 89 } | 188 } |
| 90 | 189 |
| 91 OncNetworkParser::OncNetworkParser() | 190 OncNetworkParser::OncNetworkParser() |
| 92 : NetworkParser(get_onc_mapper()), | 191 : NetworkParser(get_onc_mapper()), |
| 93 network_configs_(NULL), | 192 network_configs_(NULL), |
| 94 certificates_(NULL) { | 193 certificates_(NULL) { |
| 95 } | 194 } |
| (...skipping 15 matching lines...) Expand all Loading... | |
| 111 } | 210 } |
| 112 | 211 |
| 113 bool OncNetworkParser::ParseCertificate(int cert_index) { | 212 bool OncNetworkParser::ParseCertificate(int cert_index) { |
| 114 CHECK(certificates_); | 213 CHECK(certificates_); |
| 115 CHECK(static_cast<size_t>(cert_index) < certificates_->GetSize()); | 214 CHECK(static_cast<size_t>(cert_index) < certificates_->GetSize()); |
| 116 CHECK(cert_index >= 0); | 215 CHECK(cert_index >= 0); |
| 117 base::DictionaryValue* certificate = NULL; | 216 base::DictionaryValue* certificate = NULL; |
| 118 certificates_->GetDictionary(cert_index, &certificate); | 217 certificates_->GetDictionary(cert_index, &certificate); |
| 119 CHECK(certificate); | 218 CHECK(certificate); |
| 120 | 219 |
| 220 if (VLOG_IS_ON(2)) { | |
| 221 std::string certificate_json; | |
| 222 base::JSONWriter::Write(static_cast<base::Value*>(certificate), | |
| 223 true, &certificate_json); | |
| 224 VLOG(2) << "Parsing certificate at index " << cert_index | |
| 225 << ": " << certificate_json; | |
| 226 } | |
| 227 | |
| 121 // Get out the attributes of the given cert. | 228 // Get out the attributes of the given cert. |
| 122 std::string guid; | 229 std::string guid; |
| 123 bool remove = false; | 230 bool remove = false; |
| 124 if (!certificate->GetString("GUID", &guid) || guid.empty()) { | 231 if (!certificate->GetString("GUID", &guid) || guid.empty()) { |
| 125 LOG(WARNING) << "ONC File: certificate missing identifier at index" | 232 LOG(WARNING) << "ONC File: certificate missing identifier at index" |
| 126 << cert_index; | 233 << cert_index; |
| 127 return false; | 234 return false; |
| 128 } | 235 } |
| 129 | 236 |
| 130 if (!certificate->GetBoolean("Remove", &remove)) | 237 if (!certificate->GetBoolean("Remove", &remove)) |
| (...skipping 17 matching lines...) Expand all Loading... | |
| 148 << " at index " << cert_index; | 255 << " at index " << cert_index; |
| 149 return false; | 256 return false; |
| 150 } | 257 } |
| 151 | 258 |
| 152 Network* OncNetworkParser::ParseNetwork(int n) { | 259 Network* OncNetworkParser::ParseNetwork(int n) { |
| 153 if (!network_configs_) | 260 if (!network_configs_) |
| 154 return NULL; | 261 return NULL; |
| 155 DictionaryValue* info = NULL; | 262 DictionaryValue* info = NULL; |
| 156 if (!network_configs_->GetDictionary(n, &info)) | 263 if (!network_configs_->GetDictionary(n, &info)) |
| 157 return NULL; | 264 return NULL; |
| 158 // Parse Open Network Configuration blob into a temporary Network object. | 265 if (VLOG_IS_ON(2)) { |
| 266 std::string network_json; | |
| 267 base::JSONWriter::Write(static_cast<base::Value*>(info), | |
| 268 true, &network_json); | |
| 269 VLOG(2) << "Parsing network at index " << n | |
| 270 << ": " << network_json; | |
| 271 } | |
| 272 | |
| 159 return CreateNetworkFromInfo(std::string(), *info); | 273 return CreateNetworkFromInfo(std::string(), *info); |
| 160 } | 274 } |
| 161 | 275 |
| 162 Network* OncNetworkParser::CreateNetworkFromInfo( | 276 Network* OncNetworkParser::CreateNetworkFromInfo( |
| 163 const std::string& service_path, | 277 const std::string& service_path, |
| 164 const DictionaryValue& info) { | 278 const DictionaryValue& info) { |
| 165 ConnectionType type = ParseTypeFromDictionary(info); | 279 ConnectionType type = ParseTypeFromDictionary(info); |
| 166 if (type == TYPE_UNKNOWN) // Return NULL if cannot parse network type. | 280 if (type == TYPE_UNKNOWN) // Return NULL if cannot parse network type. |
| 167 return NULL; | 281 return NULL; |
| 168 scoped_ptr<Network> network(CreateNewNetwork(type, service_path)); | 282 scoped_ptr<Network> network(CreateNewNetwork(type, service_path)); |
| 169 // Update property with native value for type. | 283 if (!ParseNestedObject(network.get(), |
| 170 std::string str = NativeNetworkParser::network_type_mapper()->GetKey(type); | 284 "NetworkConfiguration", |
| 171 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); | 285 static_cast<const base::Value&>(info), |
| 172 network->UpdatePropertyMap(PROPERTY_INDEX_TYPE, *val.get()); | 286 network_configuration_signature, |
| 173 | 287 ParseNetworkConfigurationValue)) { |
| 174 // Get the child dictionary with properties for the network. | 288 LOG(WARNING) << "Network " << network->name() << " had problems."; |
|
stevenjb
2011/12/05 18:38:18
Maybe "failed to parse nested object" instead of "
kmixter1
2011/12/05 20:34:43
I get caught up on the "parse" verb used here and
| |
| 175 // And copy all the values from this network type dictionary to parent. | |
| 176 DictionaryValue* dict; | |
| 177 if (!info.GetDictionary(GetTypeFromDictionary(info), &dict)) | |
| 178 return NULL; | 289 return NULL; |
| 179 | 290 } |
| 180 // Add GUID from the parent dictionary. | 291 if (VLOG_IS_ON(2)) { |
| 181 dict->SetString("GUID", GetGuidFromDictionary(info)); | 292 VLOG(2) << "Created Network '" << network->name() |
| 182 | 293 << "' from info. Path:" << service_path |
| 183 UpdateNetworkFromInfo(*dict, network.get()); | 294 << " Type:" << ConnectionTypeToString(type); |
| 184 VLOG(2) << "Created Network '" << network->name() | 295 } |
| 185 << "' from info. Path:" << service_path | |
| 186 << " Type:" << ConnectionTypeToString(type); | |
| 187 return network.release(); | 296 return network.release(); |
| 188 } | 297 } |
| 189 | 298 |
| 190 Network* OncNetworkParser::CreateNewNetwork( | 299 Network* OncNetworkParser::CreateNewNetwork( |
| 191 ConnectionType type, const std::string& service_path) { | 300 ConnectionType type, const std::string& service_path) { |
| 192 Network* network = NetworkParser::CreateNewNetwork(type, service_path); | 301 Network* network = NetworkParser::CreateNewNetwork(type, service_path); |
| 193 if (network) { | 302 if (network) { |
| 194 if (type == TYPE_WIFI) | 303 if (type == TYPE_WIFI) |
| 195 network->SetNetworkParser(new OncWifiNetworkParser()); | 304 network->SetNetworkParser(new OncWifiNetworkParser()); |
| 196 else if (type == TYPE_VPN) | 305 else if (type == TYPE_VPN) |
| (...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 287 << net::ErrorToString(failures[0].net_error) | 396 << net::ErrorToString(failures[0].net_error) |
| 288 << ") importing " << cert_type << " certificate at index " | 397 << ") importing " << cert_type << " certificate at index " |
| 289 << cert_index; | 398 << cert_index; |
| 290 return false; | 399 return false; |
| 291 } | 400 } |
| 292 if (!success) { | 401 if (!success) { |
| 293 LOG(WARNING) << "ONC File: Unknown error importing " << cert_type | 402 LOG(WARNING) << "ONC File: Unknown error importing " << cert_type |
| 294 << " certificate at index " << cert_index; | 403 << " certificate at index " << cert_index; |
| 295 return false; | 404 return false; |
| 296 } | 405 } |
| 406 VLOG(2) << "Successfully imported server/ca certificate at index " | |
| 407 << cert_index; | |
| 297 return true; | 408 return true; |
| 298 } | 409 } |
| 299 | 410 |
| 300 bool OncNetworkParser::ParseClientCertificate( | 411 bool OncNetworkParser::ParseClientCertificate( |
| 301 int cert_index, | 412 int cert_index, |
| 302 base::DictionaryValue* certificate) { | 413 base::DictionaryValue* certificate) { |
| 303 net::CertDatabase cert_database; | 414 net::CertDatabase cert_database; |
| 304 std::string pkcs12_data; | 415 std::string pkcs12_data; |
| 305 if (!certificate->GetString("PKCS12", &pkcs12_data) || | 416 if (!certificate->GetString("PKCS12", &pkcs12_data) || |
| 306 pkcs12_data.empty()) { | 417 pkcs12_data.empty()) { |
| (...skipping 12 matching lines...) Expand all Loading... | |
| 319 // Since this has a private key, always use the private module. | 430 // Since this has a private key, always use the private module. |
| 320 scoped_refptr<net::CryptoModule> module(cert_database.GetPrivateModule()); | 431 scoped_refptr<net::CryptoModule> module(cert_database.GetPrivateModule()); |
| 321 int result = cert_database.ImportFromPKCS12( | 432 int result = cert_database.ImportFromPKCS12( |
| 322 module.get(), decoded_pkcs12, string16(), false); | 433 module.get(), decoded_pkcs12, string16(), false); |
| 323 if (result != net::OK) { | 434 if (result != net::OK) { |
| 324 LOG(WARNING) << "ONC File: Unable to import Client certificate at index " | 435 LOG(WARNING) << "ONC File: Unable to import Client certificate at index " |
| 325 << cert_index | 436 << cert_index |
| 326 << " (error " << net::ErrorToString(result) << ")."; | 437 << " (error " << net::ErrorToString(result) << ")."; |
| 327 return false; | 438 return false; |
| 328 } | 439 } |
| 440 VLOG(2) << "Successfully imported client certificate at index " | |
| 441 << cert_index; | |
| 329 return true; | 442 return true; |
| 330 } | 443 } |
| 331 | 444 |
| 445 bool OncNetworkParser::ParseNestedObject(Network* network, | |
| 446 const std::string& onc_type, | |
| 447 const base::Value& value, | |
| 448 OncValueSignature* signature, | |
| 449 ParserPointer parser) { | |
| 450 bool any_errors = false; | |
| 451 if (!value.IsType(base::Value::TYPE_DICTIONARY)) { | |
| 452 VLOG(1) << network->name() << ": expected object of type " << onc_type; | |
| 453 return false; | |
| 454 } | |
| 455 VLOG(2) << "Parsing nested object of type " << onc_type; | |
| 456 const DictionaryValue* dict = NULL; | |
| 457 value.GetAsDictionary(&dict); | |
| 458 for (DictionaryValue::key_iterator iter = dict->begin_keys(); | |
| 459 iter != dict->end_keys(); ++iter) { | |
| 460 const std::string& key = *iter; | |
| 461 base::Value* inner_value = NULL; | |
| 462 dict->GetWithoutPathExpansion(key, &inner_value); | |
| 463 int field_index; | |
| 464 for (field_index = 0; signature[field_index].field != NULL; ++field_index) { | |
| 465 if (key == signature[field_index].field) | |
| 466 break; | |
| 467 } | |
| 468 if (signature[field_index].field == NULL) { | |
| 469 VLOG(1) << network->name() << ": unexpected field: " | |
| 470 << key << ", in type: " << onc_type; | |
| 471 any_errors = true; | |
| 472 continue; | |
| 473 } | |
| 474 if (!inner_value->IsType(signature[field_index].type)) { | |
| 475 VLOG(1) << network->name() << ": field with wrong type: " << key | |
| 476 << ", actual type: " << inner_value->GetType() | |
| 477 << ", expected type: " << signature[field_index].type; | |
| 478 any_errors = true; | |
| 479 continue; | |
| 480 } | |
| 481 PropertyIndex index = signature[field_index].index; | |
| 482 // We need to UpdatePropertyMap now since parser might want to | |
| 483 // change the mapped value. | |
| 484 network->UpdatePropertyMap(index, *inner_value); | |
| 485 if (!parser(this, index, *inner_value, network)) { | |
| 486 VLOG(1) << network->name() << ": problem(s) with field: " << key; | |
| 487 any_errors = true; | |
| 488 continue; | |
| 489 } | |
| 490 if (VLOG_IS_ON(2)) { | |
| 491 std::string value_json; | |
| 492 base::JSONWriter::Write(inner_value, true, &value_json); | |
| 493 VLOG(2) << network->name() << ": Successfully parsed [" << key | |
| 494 << "(" << index << ")] = " << value_json; | |
| 495 } | |
| 496 } | |
| 497 return !any_errors; | |
| 498 } | |
| 499 | |
| 500 bool OncNetworkParser::CheckNetworkType(Network* network, | |
| 501 ConnectionType expected, | |
| 502 const std::string& onc_type) { | |
| 503 if (expected != network->type()) { | |
|
stevenjb
2011/12/05 18:38:18
Since this is unexpected, we should really log a w
kmixter1
2011/12/05 20:34:43
Done.
| |
| 504 VLOG(2) << network->name() | |
| 505 << ": " << onc_type << " field unexpected for this type network"; | |
| 506 return false; | |
| 507 } | |
| 508 return true; | |
| 509 } | |
| 510 | |
|
Mattias Nissler (ping if slow)
2011/12/05 09:33:32
we usually put "// static" comments in the impleme
kmixter1
2011/12/05 20:34:43
Done.
| |
| 511 std::string OncNetworkParser::GetStringValue(const base::Value& value) { | |
| 512 std::string string_value; | |
| 513 value.GetAsString(&string_value); | |
| 514 return string_value; | |
| 515 } | |
| 516 | |
| 517 const bool OncNetworkParser::GetBooleanValue(const base::Value& value) { | |
| 518 bool bool_value = false; | |
| 519 value.GetAsBoolean(&bool_value); | |
| 520 return bool_value; | |
| 521 } | |
| 522 | |
| 523 std::string OncNetworkParser::ConvertValueToString( | |
| 524 const base::Value& value) { | |
| 525 std::string value_json; | |
| 526 base::JSONWriter::Write(&value, false, &value_json); | |
| 527 return value_json; | |
| 528 } | |
| 529 | |
| 530 bool OncNetworkParser::ParseNetworkConfigurationValue( | |
| 531 OncNetworkParser* parser, | |
| 532 PropertyIndex index, | |
| 533 const base::Value& value, | |
| 534 Network* network) { | |
| 535 switch (index) { | |
| 536 case PROPERTY_INDEX_ONC_WIFI: { | |
| 537 return parser->ParseNestedObject(network, | |
| 538 "WiFi", | |
| 539 value, | |
| 540 wifi_signature, | |
| 541 OncWifiNetworkParser::ParseWifiValue); | |
| 542 } | |
| 543 case PROPERTY_INDEX_ONC_VPN: { | |
| 544 if (!CheckNetworkType(network, TYPE_VPN, "VPN")) | |
| 545 return false; | |
| 546 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); | |
| 547 // Got the "VPN" field. Immediately store the VPN.Type field | |
| 548 // value so that we can properly validate fields in the VPN | |
| 549 // object based on the type. | |
| 550 const DictionaryValue* dict = NULL; | |
| 551 CHECK(value.GetAsDictionary(&dict)); | |
| 552 std::string provider_type_string; | |
| 553 if (!dict->GetString("Type", &provider_type_string)) { | |
| 554 VLOG(1) << network->name() << ": VPN.Type is missing"; | |
| 555 return false; | |
| 556 } | |
| 557 ProviderType provider_type = | |
| 558 OncVirtualNetworkParser::ParseProviderType(provider_type_string); | |
| 559 virtual_network->set_provider_type(provider_type); | |
| 560 return parser->ParseNestedObject(network, | |
| 561 "VPN", | |
| 562 value, | |
| 563 vpn_signature, | |
| 564 OncVirtualNetworkParser::ParseVPNValue); | |
| 565 return true; | |
| 566 } | |
| 567 case PROPERTY_INDEX_ONC_REMOVE: | |
| 568 VLOG(1) << network->name() << ": Remove field not yet implemented"; | |
| 569 return false; | |
| 570 case PROPERTY_INDEX_TYPE: { | |
| 571 // Update property with native value for type. | |
| 572 std::string str = | |
| 573 NativeNetworkParser::network_type_mapper()->GetKey(network->type()); | |
| 574 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); | |
| 575 network->UpdatePropertyMap(PROPERTY_INDEX_TYPE, *val.get()); | |
| 576 return true; | |
| 577 } | |
| 578 case PROPERTY_INDEX_GUID: | |
| 579 case PROPERTY_INDEX_NAME: | |
| 580 // Fall back to generic parser for these. | |
| 581 return parser->ParseValue(index, value, network); | |
| 582 default: | |
| 583 break; | |
| 584 } | |
| 585 return false; | |
| 586 } | |
| 587 | |
| 332 // -------------------- OncWirelessNetworkParser -------------------- | 588 // -------------------- OncWirelessNetworkParser -------------------- |
| 333 | 589 |
| 334 OncWirelessNetworkParser::OncWirelessNetworkParser() {} | 590 OncWirelessNetworkParser::OncWirelessNetworkParser() {} |
| 335 OncWirelessNetworkParser::~OncWirelessNetworkParser() {} | 591 OncWirelessNetworkParser::~OncWirelessNetworkParser() {} |
| 336 | 592 |
| 337 bool OncWirelessNetworkParser::ParseValue(PropertyIndex index, | |
| 338 const base::Value& value, | |
| 339 Network* network) { | |
| 340 DCHECK_NE(TYPE_ETHERNET, network->type()); | |
| 341 DCHECK_NE(TYPE_VPN, network->type()); | |
| 342 return OncNetworkParser::ParseValue(index, value, network); | |
| 343 } | |
| 344 | |
| 345 // -------------------- OncWifiNetworkParser -------------------- | 593 // -------------------- OncWifiNetworkParser -------------------- |
| 346 | 594 |
| 347 OncWifiNetworkParser::OncWifiNetworkParser() {} | 595 OncWifiNetworkParser::OncWifiNetworkParser() {} |
| 596 | |
| 348 OncWifiNetworkParser::~OncWifiNetworkParser() {} | 597 OncWifiNetworkParser::~OncWifiNetworkParser() {} |
| 349 | 598 |
| 350 bool OncWifiNetworkParser::ParseValue(PropertyIndex index, | 599 bool OncWifiNetworkParser::ParseWifiValue(OncNetworkParser* parser, |
| 351 const base::Value& value, | 600 PropertyIndex index, |
| 352 Network* network) { | 601 const base::Value& value, |
| 353 DCHECK_EQ(TYPE_WIFI, network->type()); | 602 Network* network) { |
| 603 if (!CheckNetworkType(network, TYPE_WIFI, "WiFi")) | |
| 604 return false; | |
| 354 WifiNetwork* wifi_network = static_cast<WifiNetwork*>(network); | 605 WifiNetwork* wifi_network = static_cast<WifiNetwork*>(network); |
| 355 switch (index) { | 606 switch (index) { |
| 356 case PROPERTY_INDEX_SSID: { | 607 case PROPERTY_INDEX_SSID: |
| 357 std::string ssid; | 608 wifi_network->SetName(GetStringValue(value)); |
| 358 if (!value.GetAsString(&ssid)) | |
| 359 break; | |
| 360 wifi_network->SetName(ssid); | |
| 361 return true; | 609 return true; |
| 362 } | |
| 363 case PROPERTY_INDEX_GUID: { | |
| 364 std::string unique_id; | |
| 365 if (!value.GetAsString(&unique_id)) | |
| 366 break; | |
| 367 wifi_network->set_unique_id(unique_id); | |
| 368 return true; | |
| 369 } | |
| 370 case PROPERTY_INDEX_SECURITY: { | 610 case PROPERTY_INDEX_SECURITY: { |
| 371 std::string security_string; | 611 ConnectionSecurity security = ParseSecurity(GetStringValue(value)); |
| 372 if (!value.GetAsString(&security_string)) | |
| 373 break; | |
| 374 ConnectionSecurity security = ParseSecurity(security_string); | |
| 375 wifi_network->set_encryption(security); | 612 wifi_network->set_encryption(security); |
| 376 // Also update property with native value for security. | 613 // Also update property with native value for security. |
| 377 std::string str = | 614 std::string str = |
| 378 NativeNetworkParser::network_security_mapper()->GetKey(security); | 615 NativeNetworkParser::network_security_mapper()->GetKey(security); |
| 379 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); | 616 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); |
| 380 wifi_network->UpdatePropertyMap(index, *val.get()); | 617 wifi_network->UpdatePropertyMap(index, *val.get()); |
| 381 return true; | 618 return true; |
| 382 } | 619 } |
| 383 case PROPERTY_INDEX_PASSPHRASE: { | 620 case PROPERTY_INDEX_PASSPHRASE: |
| 384 std::string passphrase; | 621 wifi_network->set_passphrase(GetStringValue(value)); |
| 385 if (!value.GetAsString(&passphrase)) | |
| 386 break; | |
| 387 wifi_network->set_passphrase(passphrase); | |
| 388 return true; | 622 return true; |
| 389 } | 623 case PROPERTY_INDEX_IDENTITY: |
| 390 case PROPERTY_INDEX_IDENTITY: { | 624 wifi_network->set_identity(GetStringValue(value)); |
| 391 std::string identity; | |
| 392 if (!value.GetAsString(&identity)) | |
| 393 break; | |
| 394 wifi_network->set_identity(identity); | |
| 395 return true; | 625 return true; |
| 396 } | 626 case PROPERTY_INDEX_EAP: |
| 397 case PROPERTY_INDEX_EAP: { | 627 parser->ParseNestedObject(wifi_network, |
| 398 DCHECK_EQ(value.GetType(), Value::TYPE_DICTIONARY); | 628 "EAP", |
| 399 const DictionaryValue& dict = static_cast<const DictionaryValue&>(value); | 629 value, |
| 400 for (DictionaryValue::key_iterator iter = dict.begin_keys(); | 630 eap_signature, |
| 401 iter != dict.end_keys(); ++iter) { | 631 ParseEAPValue); |
| 402 const std::string& key = *iter; | |
| 403 base::Value* eap_value; | |
| 404 bool res = dict.GetWithoutPathExpansion(key, &eap_value); | |
| 405 DCHECK(res); | |
| 406 if (res) { | |
| 407 PropertyIndex index = mapper().Get(key); | |
| 408 wifi_network->UpdatePropertyMap(index, *eap_value); | |
| 409 if (!ParseEAPValue(index, *eap_value, wifi_network)) | |
| 410 VLOG(1) << network->name() << ": EAP unhandled key: " << key | |
| 411 << " Type: " << eap_value->GetType(); | |
| 412 } | |
| 413 } | |
| 414 return true; | 632 return true; |
| 415 } | 633 case PROPERTY_INDEX_AUTO_CONNECT: |
| 634 network->set_auto_connect(GetBooleanValue(value)); | |
| 635 return true; | |
| 636 case PROPERTY_INDEX_HIDDEN_SSID: | |
| 637 // Pass this through to connection manager as is. | |
| 638 return true; | |
| 416 default: | 639 default: |
| 417 return OncWirelessNetworkParser::ParseValue(index, value, network); | 640 break; |
| 418 } | 641 } |
| 419 return false; | 642 return false; |
| 420 } | 643 } |
| 421 | 644 |
| 422 | 645 bool OncWifiNetworkParser::ParseEAPValue(OncNetworkParser*, |
| 423 bool OncWifiNetworkParser::ParseEAPValue(PropertyIndex index, | 646 PropertyIndex index, |
| 424 const base::Value& value, | 647 const base::Value& value, |
| 425 WifiNetwork* wifi_network) { | 648 Network* network) { |
| 649 if (!CheckNetworkType(network, TYPE_WIFI, "EAP")) | |
| 650 return false; | |
| 651 WifiNetwork* wifi_network = static_cast<WifiNetwork*>(network); | |
| 426 switch (index) { | 652 switch (index) { |
| 427 case PROPERTY_INDEX_EAP_IDENTITY: { | 653 case PROPERTY_INDEX_EAP_IDENTITY: |
| 428 std::string eap_identity; | 654 wifi_network->set_eap_identity(GetStringValue(value)); |
| 429 if (!value.GetAsString(&eap_identity)) | |
| 430 break; | |
| 431 wifi_network->set_eap_identity(eap_identity); | |
| 432 return true; | 655 return true; |
| 433 } | |
| 434 case PROPERTY_INDEX_EAP_METHOD: { | 656 case PROPERTY_INDEX_EAP_METHOD: { |
| 435 std::string eap_method_str; | 657 EAPMethod eap_method = ParseEAPMethod(GetStringValue(value)); |
| 436 if (!value.GetAsString(&eap_method_str)) | |
| 437 break; | |
| 438 EAPMethod eap_method = ParseEAPMethod(eap_method_str); | |
| 439 wifi_network->set_eap_method(eap_method); | 658 wifi_network->set_eap_method(eap_method); |
| 440 // Also update property with native value for EAP method. | 659 // Also update property with native value for EAP method. |
| 441 std::string str = | 660 std::string str = |
| 442 NativeNetworkParser::network_eap_method_mapper()->GetKey(eap_method); | 661 NativeNetworkParser::network_eap_method_mapper()->GetKey(eap_method); |
| 443 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); | 662 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); |
| 444 wifi_network->UpdatePropertyMap(index, *val.get()); | 663 wifi_network->UpdatePropertyMap(index, *val.get()); |
| 445 return true; | 664 return true; |
| 446 } | 665 } |
| 447 case PROPERTY_INDEX_EAP_PHASE_2_AUTH: { | 666 case PROPERTY_INDEX_EAP_PHASE_2_AUTH: { |
| 448 std::string eap_phase_2_auth_str; | 667 EAPPhase2Auth eap_phase_2_auth = ParseEAPPhase2Auth( |
| 449 if (!value.GetAsString(&eap_phase_2_auth_str)) | 668 GetStringValue(value)); |
| 450 break; | |
| 451 EAPPhase2Auth eap_phase_2_auth = ParseEAPPhase2Auth(eap_phase_2_auth_str); | |
| 452 wifi_network->set_eap_phase_2_auth(eap_phase_2_auth); | 669 wifi_network->set_eap_phase_2_auth(eap_phase_2_auth); |
| 453 // Also update property with native value for EAP phase 2 auth. | 670 // Also update property with native value for EAP phase 2 auth. |
| 454 std::string str = NativeNetworkParser::network_eap_auth_mapper()->GetKey( | 671 std::string str = NativeNetworkParser::network_eap_auth_mapper()->GetKey( |
| 455 eap_phase_2_auth); | 672 eap_phase_2_auth); |
| 456 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); | 673 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); |
| 457 wifi_network->UpdatePropertyMap(index, *val.get()); | 674 wifi_network->UpdatePropertyMap(index, *val.get()); |
| 458 return true; | 675 return true; |
| 459 } | 676 } |
| 460 case PROPERTY_INDEX_EAP_ANONYMOUS_IDENTITY: { | 677 case PROPERTY_INDEX_EAP_ANONYMOUS_IDENTITY: |
| 461 std::string eap_anonymous_identity; | 678 wifi_network->set_eap_anonymous_identity(GetStringValue(value)); |
| 462 if (!value.GetAsString(&eap_anonymous_identity)) | |
| 463 break; | |
| 464 wifi_network->set_eap_anonymous_identity(eap_anonymous_identity); | |
| 465 return true; | 679 return true; |
| 466 } | 680 case PROPERTY_INDEX_EAP_CERT_ID: |
| 467 case PROPERTY_INDEX_EAP_CERT_ID: { | 681 wifi_network->set_eap_client_cert_pkcs11_id(GetStringValue(value)); |
| 468 std::string eap_client_cert_pkcs11_id; | |
| 469 if (!value.GetAsString(&eap_client_cert_pkcs11_id)) | |
| 470 break; | |
| 471 wifi_network->set_eap_client_cert_pkcs11_id(eap_client_cert_pkcs11_id); | |
| 472 return true; | 682 return true; |
| 473 } | 683 case PROPERTY_INDEX_EAP_CA_CERT_NSS: |
| 474 case PROPERTY_INDEX_EAP_CA_CERT_NSS: { | 684 wifi_network->set_eap_server_ca_cert_nss_nickname(GetStringValue(value)); |
| 475 std::string eap_server_ca_cert_nss_nickname; | |
| 476 if (!value.GetAsString(&eap_server_ca_cert_nss_nickname)) | |
| 477 break; | |
| 478 wifi_network->set_eap_server_ca_cert_nss_nickname( | |
| 479 eap_server_ca_cert_nss_nickname); | |
| 480 return true; | 685 return true; |
| 481 } | 686 case PROPERTY_INDEX_EAP_USE_SYSTEM_CAS: |
| 482 case PROPERTY_INDEX_EAP_USE_SYSTEM_CAS: { | 687 wifi_network->set_eap_use_system_cas(GetBooleanValue(value)); |
| 483 bool eap_use_system_cas; | |
| 484 if (!value.GetAsBoolean(&eap_use_system_cas)) | |
| 485 break; | |
| 486 wifi_network->set_eap_use_system_cas(eap_use_system_cas); | |
| 487 return true; | 688 return true; |
| 488 } | 689 case PROPERTY_INDEX_EAP_PASSWORD: |
| 489 case PROPERTY_INDEX_EAP_PASSWORD: { | 690 wifi_network->set_eap_passphrase(GetStringValue(value)); |
| 490 std::string eap_passphrase; | |
| 491 if (!value.GetAsString(&eap_passphrase)) | |
| 492 break; | |
| 493 wifi_network->set_eap_passphrase(eap_passphrase); | |
| 494 return true; | 691 return true; |
| 495 } | 692 case PROPERTY_INDEX_ONC_CLIENT_CERT_PATTERN: |
| 693 case PROPERTY_INDEX_ONC_CLIENT_CERT_REF: | |
| 694 case PROPERTY_INDEX_ONC_CLIENT_CERT_TYPE: | |
| 695 // TODO(crosbug.com/19409): Support certificate patterns. | |
| 696 // Ignore for now. | |
| 697 return true; | |
| 496 default: | 698 default: |
| 497 break; | 699 break; |
| 498 } | 700 } |
| 499 return false; | 701 return false; |
| 500 } | 702 } |
| 501 | 703 |
| 502 ConnectionSecurity OncWifiNetworkParser::ParseSecurity( | 704 ConnectionSecurity OncWifiNetworkParser::ParseSecurity( |
| 503 const std::string& security) { | 705 const std::string& security) { |
| 504 static EnumMapper<ConnectionSecurity>::Pair table[] = { | 706 static EnumMapper<ConnectionSecurity>::Pair table[] = { |
| 505 { "None", SECURITY_NONE }, | 707 { "None", SECURITY_NONE }, |
| 506 { "WEP", SECURITY_WEP }, | 708 { "WEP-PSK", SECURITY_WEP }, |
| 507 { "WPA", SECURITY_WPA }, | 709 { "WPA-PSK", SECURITY_WPA }, |
| 508 { "WPA2", SECURITY_8021X }, | 710 { "WPA-EAP", SECURITY_8021X }, |
| 509 }; | 711 }; |
| 510 CR_DEFINE_STATIC_LOCAL(EnumMapper<ConnectionSecurity>, parser, | 712 CR_DEFINE_STATIC_LOCAL(EnumMapper<ConnectionSecurity>, parser, |
| 511 (table, arraysize(table), SECURITY_UNKNOWN)); | 713 (table, arraysize(table), SECURITY_UNKNOWN)); |
| 512 return parser.Get(security); | 714 return parser.Get(security); |
| 513 } | 715 } |
| 514 | 716 |
| 515 EAPMethod OncWifiNetworkParser::ParseEAPMethod(const std::string& method) { | 717 EAPMethod OncWifiNetworkParser::ParseEAPMethod(const std::string& method) { |
| 516 static EnumMapper<EAPMethod>::Pair table[] = { | 718 static EnumMapper<EAPMethod>::Pair table[] = { |
| 517 { "PEAP", EAP_METHOD_PEAP }, | 719 { "PEAP", EAP_METHOD_PEAP }, |
| 518 { "EAP-TLS", EAP_METHOD_TLS }, | 720 { "EAP-TLS", EAP_METHOD_TLS }, |
| (...skipping 28 matching lines...) Expand all Loading... | |
| 547 const DictionaryValue& info, | 749 const DictionaryValue& info, |
| 548 Network* network) { | 750 Network* network) { |
| 549 DCHECK_EQ(TYPE_VPN, network->type()); | 751 DCHECK_EQ(TYPE_VPN, network->type()); |
| 550 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); | 752 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); |
| 551 if (!OncNetworkParser::UpdateNetworkFromInfo(info, network)) | 753 if (!OncNetworkParser::UpdateNetworkFromInfo(info, network)) |
| 552 return false; | 754 return false; |
| 553 VLOG(1) << "Updating VPN '" << virtual_network->name() | 755 VLOG(1) << "Updating VPN '" << virtual_network->name() |
| 554 << "': Server: " << virtual_network->server_hostname() | 756 << "': Server: " << virtual_network->server_hostname() |
| 555 << " Type: " | 757 << " Type: " |
| 556 << ProviderTypeToString(virtual_network->provider_type()); | 758 << ProviderTypeToString(virtual_network->provider_type()); |
| 557 if (virtual_network->provider_type() == PROVIDER_TYPE_L2TP_IPSEC_PSK) { | |
| 558 if (!virtual_network->client_cert_id().empty()) | |
| 559 virtual_network->set_provider_type(PROVIDER_TYPE_L2TP_IPSEC_USER_CERT); | |
| 560 } | |
| 561 return true; | 759 return true; |
| 562 } | 760 } |
| 563 | 761 |
| 564 bool OncVirtualNetworkParser::ParseValue(PropertyIndex index, | 762 bool OncVirtualNetworkParser::ParseVPNValue(OncNetworkParser* parser, |
| 565 const base::Value& value, | 763 PropertyIndex index, |
| 566 Network* network) { | 764 const base::Value& value, |
| 567 DCHECK_EQ(TYPE_VPN, network->type()); | 765 Network* network) { |
| 568 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); | 766 if (!CheckNetworkType(network, TYPE_VPN, "VPN")) |
| 569 switch (index) { | 767 return false; |
| 570 case PROPERTY_INDEX_PROVIDER: { | 768 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); |
| 571 DCHECK_EQ(value.GetType(), Value::TYPE_DICTIONARY); | 769 switch (index) { |
| 572 const DictionaryValue& dict = static_cast<const DictionaryValue&>(value); | 770 case PROPERTY_INDEX_HOST: { |
| 573 for (DictionaryValue::key_iterator iter = dict.begin_keys(); | 771 virtual_network->set_server_hostname(GetStringValue(value)); |
| 574 iter != dict.end_keys(); ++iter) { | 772 // Flimflam requires a domain property which is unused. |
| 575 const std::string& key = *iter; | 773 network->UpdatePropertyMap(PROPERTY_INDEX_VPN_DOMAIN, |
| 576 base::Value* provider_value; | 774 base::StringValue("")); |
| 577 bool res = dict.GetWithoutPathExpansion(key, &provider_value); | 775 return true; |
| 578 DCHECK(res); | 776 } |
| 579 if (res) { | 777 case PROPERTY_INDEX_ONC_IPSEC: |
| 580 PropertyIndex index = mapper().Get(key); | 778 if (virtual_network->provider_type() != PROVIDER_TYPE_L2TP_IPSEC_PSK && |
| 581 if (!ParseProviderValue(index, *provider_value, virtual_network)) | 779 virtual_network->provider_type() != |
| 582 VLOG(1) << network->name() << ": Provider unhandled key: " << key | 780 PROVIDER_TYPE_L2TP_IPSEC_USER_CERT) { |
| 583 << " Type: " << provider_value->GetType(); | 781 VLOG(1) << "IPsec field not allowed with this VPN type"; |
| 584 } | 782 return false; |
| 585 } | 783 } |
| 586 return true; | 784 return parser->ParseNestedObject(network, |
| 587 } | 785 "IPsec", |
| 588 default: | 786 value, |
| 589 return OncNetworkParser::ParseValue(index, value, network); | 787 ipsec_signature, |
| 788 ParseIPsecValue); | |
| 789 case PROPERTY_INDEX_ONC_L2TP: | |
| 790 if (virtual_network->provider_type() != PROVIDER_TYPE_L2TP_IPSEC_PSK) { | |
| 791 VLOG(1) << "L2TP field not allowed with this VPN type"; | |
| 792 return false; | |
| 793 } | |
| 794 return parser->ParseNestedObject(network, | |
| 795 "L2TP", | |
| 796 value, | |
| 797 l2tp_signature, | |
| 798 ParseL2TPValue); | |
| 799 case PROPERTY_INDEX_ONC_OPENVPN: | |
| 800 if (virtual_network->provider_type() != PROVIDER_TYPE_OPEN_VPN) { | |
| 801 VLOG(1) << "OpenVPN field not allowed with this VPN type"; | |
| 802 return false; | |
| 803 } | |
| 804 return parser->ParseNestedObject(network, | |
| 805 "OpenVPN", | |
| 806 value, | |
| 807 openvpn_signature, | |
| 808 ParseOpenVPNValue); | |
| 809 case PROPERTY_INDEX_PROVIDER_TYPE: { | |
| 810 // Update property with native value for provider type. | |
| 811 ProviderType provider_type = GetCanonicalProviderType( | |
| 812 virtual_network->provider_type()); | |
| 813 std::string str = | |
| 814 NativeVirtualNetworkParser::provider_type_mapper()->GetKey( | |
| 815 provider_type); | |
| 816 scoped_ptr<StringValue> val(Value::CreateStringValue(str)); | |
| 817 network->UpdatePropertyMap(PROPERTY_INDEX_PROVIDER_TYPE, *val.get()); | |
| 818 return true; | |
| 819 } | |
| 820 default: | |
| 590 break; | 821 break; |
| 591 } | 822 } |
| 592 return false; | 823 return false; |
| 593 } | 824 } |
| 594 | 825 |
| 595 bool OncVirtualNetworkParser::ParseProviderValue(PropertyIndex index, | 826 bool OncVirtualNetworkParser::ParseIPsecValue(OncNetworkParser* parser, |
| 596 const base::Value& value, | 827 PropertyIndex index, |
| 597 VirtualNetwork* network) { | 828 const base::Value& value, |
| 598 switch (index) { | 829 Network* network) { |
| 599 case PROPERTY_INDEX_HOST: { | 830 if (!CheckNetworkType(network, TYPE_VPN, "IPsec")) |
| 600 std::string server_hostname; | 831 return false; |
| 601 if (!value.GetAsString(&server_hostname)) | 832 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); |
| 833 switch (index) { | |
| 834 case PROPERTY_INDEX_IPSEC_AUTHENTICATIONTYPE: | |
| 835 virtual_network->set_provider_type( | |
| 836 UpdateProviderTypeWithAuthType(virtual_network->provider_type(), | |
| 837 GetStringValue(value))); | |
| 838 return true; | |
| 839 case PROPERTY_INDEX_L2TPIPSEC_CA_CERT_NSS: | |
| 840 virtual_network->set_ca_cert_nss(GetStringValue(value)); | |
| 841 return true; | |
| 842 case PROPERTY_INDEX_L2TPIPSEC_PSK: | |
| 843 virtual_network->set_psk_passphrase(GetStringValue(value)); | |
| 844 return true; | |
| 845 case PROPERTY_INDEX_L2TPIPSEC_GROUP_NAME: | |
| 846 virtual_network->set_group_name(GetStringValue(value)); | |
| 847 return true; | |
| 848 case PROPERTY_INDEX_SAVE_CREDENTIALS: | |
| 849 // Note that the specification allows different settings for | |
| 850 // IPsec credentials (PSK) and L2TP credentials (username and | |
| 851 // password) but we merge them in our implementation as is required | |
| 852 // with the current connection manager. | |
| 853 virtual_network->set_save_credentials(GetBooleanValue(value)); | |
| 854 return true; | |
| 855 case PROPERTY_INDEX_ONC_CLIENT_CERT_PATTERN: | |
| 856 case PROPERTY_INDEX_ONC_CLIENT_CERT_REF: | |
| 857 case PROPERTY_INDEX_ONC_CLIENT_CERT_TYPE: | |
| 858 // TODO(crosbug.com/19409): Support certificate patterns. | |
| 859 // Ignore for now. | |
| 860 return true; | |
| 861 case PROPERTY_INDEX_IPSEC_IKEVERSION: | |
| 862 if (!value.IsType(TYPE_STRING)) { | |
| 863 // Flimflam wants all provider properties to be strings. | |
| 864 virtual_network->UpdatePropertyMap( | |
| 865 index, | |
| 866 StringValue(ConvertValueToString(value))); | |
| 867 } | |
| 868 return true; | |
| 869 default: | |
| 870 break; | |
| 871 } | |
| 872 return false; | |
| 873 } | |
| 874 | |
| 875 ProviderType OncVirtualNetworkParser::UpdateProviderTypeWithAuthType( | |
| 876 ProviderType provider, | |
| 877 const std::string& auth_type) { | |
| 878 switch (provider) { | |
| 879 case PROVIDER_TYPE_L2TP_IPSEC_PSK: | |
| 880 case PROVIDER_TYPE_L2TP_IPSEC_USER_CERT: | |
| 881 if (auth_type == "Cert") { | |
| 882 return PROVIDER_TYPE_L2TP_IPSEC_USER_CERT; | |
| 883 } else { | |
| 884 if (auth_type != "PSK") { | |
| 885 VLOG(1) << "Unexpected authentication type " << auth_type; | |
| 602 break; | 886 break; |
| 603 network->set_server_hostname(server_hostname); | 887 } |
| 604 return true; | 888 return PROVIDER_TYPE_L2TP_IPSEC_PSK; |
| 605 } | 889 } |
| 606 case PROPERTY_INDEX_NAME: { | 890 default: |
| 607 std::string name; | 891 VLOG(1) << "Unexpected provider type with authentication type " |
| 608 if (!value.GetAsString(&name)) | 892 << auth_type; |
| 609 break; | 893 break; |
| 610 network->set_name(name); | 894 } |
| 611 return true; | 895 return provider; |
| 612 } | 896 } |
| 613 case PROPERTY_INDEX_TYPE: { | 897 |
| 614 std::string provider_type_string; | 898 ProviderType OncVirtualNetworkParser::GetCanonicalProviderType( |
| 615 if (!value.GetAsString(&provider_type_string)) | 899 ProviderType provider_type) { |
| 616 break; | 900 if (provider_type == PROVIDER_TYPE_L2TP_IPSEC_USER_CERT) |
| 617 network->set_provider_type(ParseProviderType(provider_type_string)); | 901 return PROVIDER_TYPE_L2TP_IPSEC_PSK; |
| 618 return true; | 902 return provider_type; |
| 619 } | 903 } |
| 620 case PROPERTY_INDEX_L2TPIPSEC_CA_CERT_NSS: { | 904 |
| 621 std::string ca_cert_nss; | 905 bool OncVirtualNetworkParser::ParseL2TPValue(OncNetworkParser*, |
| 622 if (!value.GetAsString(&ca_cert_nss)) | 906 PropertyIndex index, |
| 623 break; | 907 const base::Value& value, |
| 624 network->set_ca_cert_nss(ca_cert_nss); | 908 Network* network) { |
| 625 return true; | 909 if (!CheckNetworkType(network, TYPE_VPN, "L2TP")) |
| 626 } | 910 return false; |
| 627 case PROPERTY_INDEX_L2TPIPSEC_PSK: { | 911 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); |
| 628 std::string psk_passphrase; | 912 switch (index) { |
| 629 if (!value.GetAsString(&psk_passphrase)) | 913 case PROPERTY_INDEX_L2TPIPSEC_PASSWORD: |
| 630 break; | 914 virtual_network->set_user_passphrase(GetStringValue(value)); |
| 631 network->set_psk_passphrase(psk_passphrase); | 915 return true; |
| 632 return true; | 916 case PROPERTY_INDEX_L2TPIPSEC_USER: |
| 633 } | 917 virtual_network->set_username(GetStringValue(value)); |
| 634 case PROPERTY_INDEX_L2TPIPSEC_CLIENT_CERT_ID: { | 918 return true; |
| 635 std::string client_cert_id; | 919 case PROPERTY_INDEX_SAVE_CREDENTIALS: |
| 636 if (!value.GetAsString(&client_cert_id)) | 920 // Note that the specification allows different settings for |
| 637 break; | 921 // IPsec credentials (PSK) and L2TP credentials (username and |
| 638 network->set_client_cert_id(client_cert_id); | 922 // password) but we merge them in our implementation as is required |
| 639 return true; | 923 // with the current connection manager. |
| 640 } | 924 virtual_network->set_save_credentials(GetBooleanValue(value)); |
| 641 case PROPERTY_INDEX_L2TPIPSEC_USER: { | 925 return true; |
| 642 std::string username; | 926 default: |
| 643 if (!value.GetAsString(&username)) | 927 break; |
| 644 break; | 928 } |
| 645 network->set_username(username); | 929 return false; |
| 646 return true; | 930 } |
| 647 } | 931 |
| 648 case PROPERTY_INDEX_L2TPIPSEC_PASSWORD: { | 932 bool OncVirtualNetworkParser::ParseOpenVPNValue(OncNetworkParser*, |
| 649 std::string user_passphrase; | 933 PropertyIndex index, |
| 650 if (!value.GetAsString(&user_passphrase)) | 934 const base::Value& value, |
| 651 break; | 935 Network* network) { |
| 652 network->set_user_passphrase(user_passphrase); | 936 if (!CheckNetworkType(network, TYPE_VPN, "OpenVPN")) |
| 653 return true; | 937 return false; |
| 654 } | 938 VirtualNetwork* virtual_network = static_cast<VirtualNetwork*>(network); |
| 655 case PROPERTY_INDEX_L2TPIPSEC_GROUP_NAME: { | 939 switch (index) { |
| 656 std::string group_name; | 940 case PROPERTY_INDEX_OPEN_VPN_PASSWORD: |
| 657 if (!value.GetAsString(&group_name)) | 941 virtual_network->set_user_passphrase(GetStringValue(value)); |
| 658 break; | 942 return true; |
| 659 network->set_group_name(group_name); | 943 case PROPERTY_INDEX_OPEN_VPN_USER: |
| 660 return true; | 944 virtual_network->set_username(GetStringValue(value)); |
| 661 } | 945 return true; |
| 662 default: | 946 case PROPERTY_INDEX_SAVE_CREDENTIALS: |
| 663 break; | 947 virtual_network->set_save_credentials(GetBooleanValue(value)); |
| 664 } | 948 return true; |
| 949 case PROPERTY_INDEX_OPEN_VPN_CACERT: | |
| 950 virtual_network->set_ca_cert_nss(GetStringValue(value)); | |
| 951 return true; | |
| 952 case PROPERTY_INDEX_OPEN_VPN_REMOTECERTKU: { | |
| 953 // ONC supports a list of these, but we flimflam supports only one | |
| 954 // today. So extract the first. | |
| 955 const base::ListValue* value_list = NULL; | |
| 956 value.GetAsList(&value_list); | |
| 957 base::Value* first_item = NULL; | |
| 958 if (!value_list->Get(0, &first_item) || | |
| 959 !first_item->IsType(base::Value::TYPE_STRING)) { | |
| 960 VLOG(1) << "RemoteCertKU must be non-empty list of strings"; | |
| 961 return false; | |
| 962 } | |
| 963 virtual_network->UpdatePropertyMap(index, *first_item); | |
| 964 return true; | |
| 965 } | |
| 966 case PROPERTY_INDEX_OPEN_VPN_AUTH: | |
| 967 case PROPERTY_INDEX_OPEN_VPN_AUTHRETRY: | |
| 968 case PROPERTY_INDEX_OPEN_VPN_AUTHNOCACHE: | |
| 969 case PROPERTY_INDEX_OPEN_VPN_CERT: | |
| 970 case PROPERTY_INDEX_OPEN_VPN_CIPHER: | |
| 971 case PROPERTY_INDEX_OPEN_VPN_COMPLZO: | |
| 972 case PROPERTY_INDEX_OPEN_VPN_COMPNOADAPT: | |
| 973 case PROPERTY_INDEX_OPEN_VPN_KEYDIRECTION: | |
| 974 case PROPERTY_INDEX_OPEN_VPN_NSCERTTYPE: | |
| 975 case PROPERTY_INDEX_OPEN_VPN_PORT: | |
| 976 case PROPERTY_INDEX_OPEN_VPN_PROTO: | |
| 977 case PROPERTY_INDEX_OPEN_VPN_PUSHPEERINFO: | |
| 978 case PROPERTY_INDEX_OPEN_VPN_REMOTECERTEKU: | |
| 979 case PROPERTY_INDEX_OPEN_VPN_REMOTECERTTLS: | |
| 980 case PROPERTY_INDEX_OPEN_VPN_RENEGSEC: | |
| 981 case PROPERTY_INDEX_OPEN_VPN_SERVERPOLLTIMEOUT: | |
| 982 case PROPERTY_INDEX_OPEN_VPN_SHAPER: | |
| 983 case PROPERTY_INDEX_OPEN_VPN_STATICCHALLENGE: | |
| 984 case PROPERTY_INDEX_OPEN_VPN_TLSAUTHCONTENTS: | |
| 985 case PROPERTY_INDEX_OPEN_VPN_TLSREMOTE: | |
| 986 if (!value.IsType(TYPE_STRING)) { | |
| 987 // Flimflam wants all provider properties to be strings. | |
| 988 virtual_network->UpdatePropertyMap( | |
| 989 index, | |
| 990 StringValue(ConvertValueToString(value))); | |
| 991 } | |
| 992 return true; | |
| 993 case PROPERTY_INDEX_ONC_CLIENT_CERT_PATTERN: | |
| 994 case PROPERTY_INDEX_ONC_CLIENT_CERT_REF: | |
| 995 case PROPERTY_INDEX_ONC_CLIENT_CERT_TYPE: | |
| 996 // TODO(crosbug.com/19409): Support certificate patterns. | |
| 997 // Ignore for now. | |
| 998 return true; | |
| 999 | |
| 1000 default: | |
| 1001 break; | |
| 1002 } | |
| 665 return false; | 1003 return false; |
| 666 } | 1004 } |
| 667 | 1005 |
| 668 ProviderType OncVirtualNetworkParser::ParseProviderType( | 1006 ProviderType OncVirtualNetworkParser::ParseProviderType( |
| 669 const std::string& type) { | 1007 const std::string& type) { |
| 670 static EnumMapper<ProviderType>::Pair table[] = { | 1008 static EnumMapper<ProviderType>::Pair table[] = { |
| 671 { flimflam::kProviderL2tpIpsec, PROVIDER_TYPE_L2TP_IPSEC_PSK }, | 1009 // We initially map to L2TP-IPsec PSK and then fix this up based |
| 672 { flimflam::kProviderOpenVpn, PROVIDER_TYPE_OPEN_VPN }, | 1010 // on the value of AuthenticationType. |
| 1011 { "L2TP-IPsec", PROVIDER_TYPE_L2TP_IPSEC_PSK }, | |
| 1012 { "OpenVPN", PROVIDER_TYPE_OPEN_VPN }, | |
| 673 }; | 1013 }; |
| 674 CR_DEFINE_STATIC_LOCAL(EnumMapper<ProviderType>, parser, | 1014 CR_DEFINE_STATIC_LOCAL(EnumMapper<ProviderType>, parser, |
| 675 (table, arraysize(table), PROVIDER_TYPE_MAX)); | 1015 (table, arraysize(table), PROVIDER_TYPE_MAX)); |
| 676 return parser.Get(type); | 1016 return parser.Get(type); |
| 677 } | 1017 } |
| 678 | 1018 |
| 679 } // namespace chromeos | 1019 } // namespace chromeos |
| OLD | NEW |