OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/policy/enterprise_install_attributes.h" | 5 #include "chrome/browser/chromeos/policy/enterprise_install_attributes.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/files/file_util.h" | 10 #include "base/files/file_util.h" |
11 #include "base/location.h" | 11 #include "base/location.h" |
12 #include "base/logging.h" | 12 #include "base/logging.h" |
13 #include "base/message_loop/message_loop.h" | 13 #include "base/message_loop/message_loop.h" |
| 14 #include "base/metrics/histogram_base.h" |
| 15 #include "base/metrics/histogram_macros.h" |
| 16 #include "base/time/time.h" |
14 #include "chrome/browser/chromeos/policy/proto/install_attributes.pb.h" | 17 #include "chrome/browser/chromeos/policy/proto/install_attributes.pb.h" |
15 #include "chromeos/cryptohome/cryptohome_util.h" | 18 #include "chromeos/cryptohome/cryptohome_util.h" |
16 #include "chromeos/dbus/dbus_thread_manager.h" | 19 #include "chromeos/dbus/dbus_thread_manager.h" |
17 #include "google_apis/gaia/gaia_auth_util.h" | 20 #include "google_apis/gaia/gaia_auth_util.h" |
18 | 21 |
19 namespace policy { | 22 namespace policy { |
20 | 23 |
21 namespace cryptohome_util = chromeos::cryptohome_util; | 24 namespace cryptohome_util = chromeos::cryptohome_util; |
22 | 25 |
23 namespace { | 26 namespace { |
24 | 27 |
| 28 // Number of TPM lock state query retries during consistency check. |
| 29 int kDbusRetryCount = 12; |
| 30 |
| 31 // Interval of TPM lock state query retries during consistency check. |
| 32 int kDbusRetryIntervalInSeconds = 5; |
| 33 |
25 bool ReadMapKey(const std::map<std::string, std::string>& map, | 34 bool ReadMapKey(const std::map<std::string, std::string>& map, |
26 const std::string& key, | 35 const std::string& key, |
27 std::string* value) { | 36 std::string* value) { |
28 std::map<std::string, std::string>::const_iterator entry = map.find(key); | 37 std::map<std::string, std::string>::const_iterator entry = map.find(key); |
29 if (entry == map.end()) | 38 if (entry == map.end()) |
30 return false; | 39 return false; |
31 | 40 |
32 *value = entry->second; | 41 *value = entry->second; |
33 return true; | 42 return true; |
34 } | 43 } |
(...skipping 14 matching lines...) Expand all Loading... |
49 attribute = install_attrs_proto.add_attributes(); | 58 attribute = install_attrs_proto.add_attributes(); |
50 attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseUser); | 59 attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseUser); |
51 attribute->set_value(user_name); | 60 attribute->set_value(user_name); |
52 | 61 |
53 return install_attrs_proto.SerializeAsString(); | 62 return install_attrs_proto.SerializeAsString(); |
54 } | 63 } |
55 | 64 |
56 EnterpriseInstallAttributes::EnterpriseInstallAttributes( | 65 EnterpriseInstallAttributes::EnterpriseInstallAttributes( |
57 chromeos::CryptohomeClient* cryptohome_client) | 66 chromeos::CryptohomeClient* cryptohome_client) |
58 : device_locked_(false), | 67 : device_locked_(false), |
| 68 consistency_check_running_(false), |
| 69 device_lock_running_(false), |
59 registration_mode_(DEVICE_MODE_PENDING), | 70 registration_mode_(DEVICE_MODE_PENDING), |
60 cryptohome_client_(cryptohome_client), | 71 cryptohome_client_(cryptohome_client), |
61 weak_ptr_factory_(this) { | 72 weak_ptr_factory_(this) { |
62 } | 73 } |
63 | 74 |
64 EnterpriseInstallAttributes::~EnterpriseInstallAttributes() {} | 75 EnterpriseInstallAttributes::~EnterpriseInstallAttributes() {} |
65 | 76 |
66 void EnterpriseInstallAttributes::ReadCacheFile( | 77 void EnterpriseInstallAttributes::Init(const base::FilePath& cache_file) { |
67 const base::FilePath& cache_file) { | 78 DCHECK_EQ(false, device_locked_); |
68 if (device_locked_ || !base::PathExists(cache_file)) | 79 |
| 80 // The actual check happens asynchronously, thus it is ok to trigger it before |
| 81 // Init() has completed. |
| 82 TriggerConsistencyCheck(kDbusRetryCount * kDbusRetryIntervalInSeconds); |
| 83 |
| 84 if (!base::PathExists(cache_file)) |
69 return; | 85 return; |
70 | 86 |
71 device_locked_ = true; | 87 device_locked_ = true; |
72 | 88 |
73 char buf[16384]; | 89 char buf[16384]; |
74 int len = base::ReadFile(cache_file, buf, sizeof(buf)); | 90 int len = base::ReadFile(cache_file, buf, sizeof(buf)); |
75 if (len == -1 || len >= static_cast<int>(sizeof(buf))) { | 91 if (len == -1 || len >= static_cast<int>(sizeof(buf))) { |
76 PLOG(ERROR) << "Failed to read " << cache_file.value(); | 92 PLOG(ERROR) << "Failed to read " << cache_file.value(); |
77 return; | 93 return; |
78 } | 94 } |
(...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
142 } | 158 } |
143 callback.Run(); | 159 callback.Run(); |
144 } | 160 } |
145 | 161 |
146 void EnterpriseInstallAttributes::LockDevice( | 162 void EnterpriseInstallAttributes::LockDevice( |
147 const std::string& user, | 163 const std::string& user, |
148 DeviceMode device_mode, | 164 DeviceMode device_mode, |
149 const std::string& device_id, | 165 const std::string& device_id, |
150 const LockResultCallback& callback) { | 166 const LockResultCallback& callback) { |
151 DCHECK(!callback.is_null()); | 167 DCHECK(!callback.is_null()); |
| 168 CHECK_EQ(device_lock_running_, false); |
152 CHECK_NE(device_mode, DEVICE_MODE_PENDING); | 169 CHECK_NE(device_mode, DEVICE_MODE_PENDING); |
153 CHECK_NE(device_mode, DEVICE_MODE_NOT_SET); | 170 CHECK_NE(device_mode, DEVICE_MODE_NOT_SET); |
154 | 171 |
155 // Check for existing lock first. | 172 // Check for existing lock first. |
156 if (device_locked_) { | 173 if (device_locked_) { |
157 if (device_mode != registration_mode_) { | 174 if (device_mode != registration_mode_) { |
158 callback.Run(LOCK_WRONG_MODE); | 175 callback.Run(LOCK_WRONG_MODE); |
159 return; | 176 return; |
160 } | 177 } |
161 | 178 |
(...skipping 17 matching lines...) Expand all Loading... |
179 case DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH: | 196 case DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH: |
180 // The user parameter is ignored for consumer devices. | 197 // The user parameter is ignored for consumer devices. |
181 break; | 198 break; |
182 } | 199 } |
183 | 200 |
184 // Already locked in the right mode, signal success. | 201 // Already locked in the right mode, signal success. |
185 callback.Run(LOCK_SUCCESS); | 202 callback.Run(LOCK_SUCCESS); |
186 return; | 203 return; |
187 } | 204 } |
188 | 205 |
| 206 // In case the consistency check is still running, postpone the device locking |
| 207 // until it has finished. This should not introduce additional delay since |
| 208 // device locking must wait for TPM initialization anyways. |
| 209 if (consistency_check_running_) { |
| 210 CHECK(post_check_action_.is_null()); |
| 211 post_check_action_ = base::Bind(&EnterpriseInstallAttributes::LockDevice, |
| 212 weak_ptr_factory_.GetWeakPtr(), |
| 213 user, |
| 214 device_mode, |
| 215 device_id, |
| 216 callback); |
| 217 return; |
| 218 } |
| 219 |
| 220 device_lock_running_ = true; |
189 cryptohome_client_->InstallAttributesIsReady( | 221 cryptohome_client_->InstallAttributesIsReady( |
190 base::Bind(&EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady, | 222 base::Bind(&EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady, |
191 weak_ptr_factory_.GetWeakPtr(), | 223 weak_ptr_factory_.GetWeakPtr(), |
192 user, | 224 user, |
193 device_mode, | 225 device_mode, |
194 device_id, | 226 device_id, |
195 callback)); | 227 callback)); |
196 } | 228 } |
197 | 229 |
198 void EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady( | 230 void EnterpriseInstallAttributes::LockDeviceIfAttributesIsReady( |
199 const std::string& user, | 231 const std::string& user, |
200 DeviceMode device_mode, | 232 DeviceMode device_mode, |
201 const std::string& device_id, | 233 const std::string& device_id, |
202 const LockResultCallback& callback, | 234 const LockResultCallback& callback, |
203 chromeos::DBusMethodCallStatus call_status, | 235 chromeos::DBusMethodCallStatus call_status, |
204 bool result) { | 236 bool result) { |
205 if (call_status != chromeos::DBUS_METHOD_CALL_SUCCESS || !result) { | 237 if (call_status != chromeos::DBUS_METHOD_CALL_SUCCESS || !result) { |
| 238 device_lock_running_ = false; |
206 callback.Run(LOCK_NOT_READY); | 239 callback.Run(LOCK_NOT_READY); |
207 return; | 240 return; |
208 } | 241 } |
209 | 242 |
210 // Clearing the TPM password seems to be always a good deal. | 243 // Clearing the TPM password seems to be always a good deal. |
211 if (cryptohome_util::TpmIsEnabled() && | 244 if (cryptohome_util::TpmIsEnabled() && |
212 !cryptohome_util::TpmIsBeingOwned() && | 245 !cryptohome_util::TpmIsBeingOwned() && |
213 cryptohome_util::TpmIsOwned()) { | 246 cryptohome_util::TpmIsOwned()) { |
214 cryptohome_client_->CallTpmClearStoredPasswordAndBlock(); | 247 cryptohome_client_->CallTpmClearStoredPasswordAndBlock(); |
215 } | 248 } |
216 | 249 |
217 // Make sure we really have a working InstallAttrs. | 250 // Make sure we really have a working InstallAttrs. |
218 if (cryptohome_util::InstallAttributesIsInvalid()) { | 251 if (cryptohome_util::InstallAttributesIsInvalid()) { |
219 LOG(ERROR) << "Install attributes invalid."; | 252 LOG(ERROR) << "Install attributes invalid."; |
| 253 device_lock_running_ = false; |
220 callback.Run(LOCK_BACKEND_INVALID); | 254 callback.Run(LOCK_BACKEND_INVALID); |
221 return; | 255 return; |
222 } | 256 } |
223 | 257 |
224 if (!cryptohome_util::InstallAttributesIsFirstInstall()) { | 258 if (!cryptohome_util::InstallAttributesIsFirstInstall()) { |
225 LOG(ERROR) << "Install attributes already installed."; | 259 LOG(ERROR) << "Install attributes already installed."; |
| 260 device_lock_running_ = false; |
226 callback.Run(LOCK_ALREADY_LOCKED); | 261 callback.Run(LOCK_ALREADY_LOCKED); |
227 return; | 262 return; |
228 } | 263 } |
229 | 264 |
230 std::string mode = GetDeviceModeString(device_mode); | 265 std::string mode = GetDeviceModeString(device_mode); |
231 std::string registration_user; | 266 std::string registration_user; |
232 if (!user.empty()) | 267 if (!user.empty()) |
233 registration_user = gaia::CanonicalizeEmail(user); | 268 registration_user = gaia::CanonicalizeEmail(user); |
234 | 269 |
235 if (device_mode == DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH) { | 270 if (device_mode == DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH) { |
236 // Set values in the InstallAttrs and lock it. | 271 // Set values in the InstallAttrs and lock it. |
237 if (!cryptohome_util::InstallAttributesSet(kAttrConsumerKioskEnabled, | 272 if (!cryptohome_util::InstallAttributesSet(kAttrConsumerKioskEnabled, |
238 "true")) { | 273 "true")) { |
239 LOG(ERROR) << "Failed writing attributes."; | 274 LOG(ERROR) << "Failed writing attributes."; |
| 275 device_lock_running_ = false; |
240 callback.Run(LOCK_SET_ERROR); | 276 callback.Run(LOCK_SET_ERROR); |
241 return; | 277 return; |
242 } | 278 } |
243 } else { | 279 } else { |
244 std::string domain = gaia::ExtractDomainName(registration_user); | 280 std::string domain = gaia::ExtractDomainName(registration_user); |
245 // Set values in the InstallAttrs and lock it. | 281 // Set values in the InstallAttrs and lock it. |
246 if (!cryptohome_util::InstallAttributesSet(kAttrEnterpriseOwned, "true") || | 282 if (!cryptohome_util::InstallAttributesSet(kAttrEnterpriseOwned, "true") || |
247 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseUser, | 283 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseUser, |
248 registration_user) || | 284 registration_user) || |
249 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseDomain, | 285 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseDomain, |
250 domain) || | 286 domain) || |
251 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseMode, mode) || | 287 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseMode, mode) || |
252 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseDeviceId, | 288 !cryptohome_util::InstallAttributesSet(kAttrEnterpriseDeviceId, |
253 device_id)) { | 289 device_id)) { |
254 LOG(ERROR) << "Failed writing attributes."; | 290 LOG(ERROR) << "Failed writing attributes."; |
| 291 device_lock_running_ = false; |
255 callback.Run(LOCK_SET_ERROR); | 292 callback.Run(LOCK_SET_ERROR); |
256 return; | 293 return; |
257 } | 294 } |
258 } | 295 } |
259 | 296 |
260 if (!cryptohome_util::InstallAttributesFinalize() || | 297 if (!cryptohome_util::InstallAttributesFinalize() || |
261 cryptohome_util::InstallAttributesIsFirstInstall()) { | 298 cryptohome_util::InstallAttributesIsFirstInstall()) { |
262 LOG(ERROR) << "Failed locking."; | 299 LOG(ERROR) << "Failed locking."; |
| 300 device_lock_running_ = false; |
263 callback.Run(LOCK_FINALIZE_ERROR); | 301 callback.Run(LOCK_FINALIZE_ERROR); |
264 return; | 302 return; |
265 } | 303 } |
266 | 304 |
267 ReadImmutableAttributes( | 305 ReadImmutableAttributes( |
268 base::Bind(&EnterpriseInstallAttributes::OnReadImmutableAttributes, | 306 base::Bind(&EnterpriseInstallAttributes::OnReadImmutableAttributes, |
269 weak_ptr_factory_.GetWeakPtr(), | 307 weak_ptr_factory_.GetWeakPtr(), |
270 registration_user, | 308 registration_user, |
271 callback)); | 309 callback)); |
272 } | 310 } |
273 | 311 |
274 void EnterpriseInstallAttributes::OnReadImmutableAttributes( | 312 void EnterpriseInstallAttributes::OnReadImmutableAttributes( |
275 const std::string& registration_user, | 313 const std::string& registration_user, |
276 const LockResultCallback& callback) { | 314 const LockResultCallback& callback) { |
277 | 315 |
278 if (GetRegistrationUser() != registration_user) { | 316 if (GetRegistrationUser() != registration_user) { |
279 LOG(ERROR) << "Locked data doesn't match."; | 317 LOG(ERROR) << "Locked data doesn't match."; |
| 318 device_lock_running_ = false; |
280 callback.Run(LOCK_READBACK_ERROR); | 319 callback.Run(LOCK_READBACK_ERROR); |
281 return; | 320 return; |
282 } | 321 } |
283 | 322 |
| 323 device_lock_running_ = false; |
284 callback.Run(LOCK_SUCCESS); | 324 callback.Run(LOCK_SUCCESS); |
285 } | 325 } |
286 | 326 |
287 bool EnterpriseInstallAttributes::IsEnterpriseDevice() { | 327 bool EnterpriseInstallAttributes::IsEnterpriseDevice() { |
288 return device_locked_ && !registration_user_.empty(); | 328 return device_locked_ && !registration_user_.empty(); |
289 } | 329 } |
290 | 330 |
291 bool EnterpriseInstallAttributes::IsConsumerKioskDeviceWithAutoLaunch() { | 331 bool EnterpriseInstallAttributes::IsConsumerKioskDeviceWithAutoLaunch() { |
292 return device_locked_ && | 332 return device_locked_ && |
293 registration_mode_ == DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH; | 333 registration_mode_ == DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH; |
(...skipping 17 matching lines...) Expand all Loading... |
311 if (!IsEnterpriseDevice()) | 351 if (!IsEnterpriseDevice()) |
312 return std::string(); | 352 return std::string(); |
313 | 353 |
314 return registration_device_id_; | 354 return registration_device_id_; |
315 } | 355 } |
316 | 356 |
317 DeviceMode EnterpriseInstallAttributes::GetMode() { | 357 DeviceMode EnterpriseInstallAttributes::GetMode() { |
318 return registration_mode_; | 358 return registration_mode_; |
319 } | 359 } |
320 | 360 |
| 361 void EnterpriseInstallAttributes::TriggerConsistencyCheck(int dbus_retries) { |
| 362 consistency_check_running_ = true; |
| 363 cryptohome_client_->TpmIsOwned( |
| 364 base::Bind(&EnterpriseInstallAttributes::OnTpmOwnerCheckCompleted, |
| 365 weak_ptr_factory_.GetWeakPtr(), |
| 366 dbus_retries)); |
| 367 } |
| 368 |
| 369 void EnterpriseInstallAttributes::OnTpmOwnerCheckCompleted( |
| 370 int dbus_retries_remaining, |
| 371 chromeos::DBusMethodCallStatus call_status, |
| 372 bool result) { |
| 373 if (call_status != chromeos::DBUS_METHOD_CALL_SUCCESS && |
| 374 dbus_retries_remaining) { |
| 375 base::MessageLoop::current()->PostDelayedTask( |
| 376 FROM_HERE, |
| 377 base::Bind(&EnterpriseInstallAttributes::TriggerConsistencyCheck, |
| 378 weak_ptr_factory_.GetWeakPtr(), |
| 379 dbus_retries_remaining - 1), |
| 380 base::TimeDelta::FromSeconds(kDbusRetryIntervalInSeconds)); |
| 381 return; |
| 382 } |
| 383 |
| 384 base::HistogramBase::Sample state = device_locked_; |
| 385 state |= 0x2 * (registration_mode_ == DEVICE_MODE_ENTERPRISE); |
| 386 if (call_status == chromeos::DBUS_METHOD_CALL_SUCCESS) |
| 387 state |= 0x4 * result; |
| 388 else |
| 389 state = 0x8; // This case is not a bit mask. |
| 390 UMA_HISTOGRAM_ENUMERATION("Enterprise.AttributesTPMConsistency", state, 9); |
| 391 |
| 392 // Run any action (LockDevice call) that might have queued behind the |
| 393 // consistency check. |
| 394 consistency_check_running_ = false; |
| 395 if (!post_check_action_.is_null()) { |
| 396 post_check_action_.Run(); |
| 397 post_check_action_.Reset(); |
| 398 } |
| 399 } |
| 400 |
321 // Warning: The values for these keys (but not the keys themselves) are stored | 401 // Warning: The values for these keys (but not the keys themselves) are stored |
322 // in the protobuf with a trailing zero. Also note that some of these constants | 402 // in the protobuf with a trailing zero. Also note that some of these constants |
323 // have been copied to login_manager/device_policy_service.cc. Please make sure | 403 // have been copied to login_manager/device_policy_service.cc. Please make sure |
324 // that all changes to the constants are reflected there as well. | 404 // that all changes to the constants are reflected there as well. |
325 const char EnterpriseInstallAttributes::kConsumerDeviceMode[] = "consumer"; | 405 const char EnterpriseInstallAttributes::kConsumerDeviceMode[] = "consumer"; |
326 const char EnterpriseInstallAttributes::kEnterpriseDeviceMode[] = "enterprise"; | 406 const char EnterpriseInstallAttributes::kEnterpriseDeviceMode[] = "enterprise"; |
327 const char EnterpriseInstallAttributes::kLegacyRetailDeviceMode[] = "kiosk"; | 407 const char EnterpriseInstallAttributes::kLegacyRetailDeviceMode[] = "kiosk"; |
328 const char EnterpriseInstallAttributes::kConsumerKioskDeviceMode[] = | 408 const char EnterpriseInstallAttributes::kConsumerKioskDeviceMode[] = |
329 "consumer_kiosk"; | 409 "consumer_kiosk"; |
330 const char EnterpriseInstallAttributes::kUnknownDeviceMode[] = "unknown"; | 410 const char EnterpriseInstallAttributes::kUnknownDeviceMode[] = "unknown"; |
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
408 &consumer_kiosk_enabled) && | 488 &consumer_kiosk_enabled) && |
409 consumer_kiosk_enabled == "true") { | 489 consumer_kiosk_enabled == "true") { |
410 registration_mode_ = DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH; | 490 registration_mode_ = DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH; |
411 } else if (enterprise_user.empty() && enterprise_owned != "true") { | 491 } else if (enterprise_user.empty() && enterprise_owned != "true") { |
412 // |registration_user_| is empty on consumer devices. | 492 // |registration_user_| is empty on consumer devices. |
413 registration_mode_ = DEVICE_MODE_CONSUMER; | 493 registration_mode_ = DEVICE_MODE_CONSUMER; |
414 } | 494 } |
415 } | 495 } |
416 | 496 |
417 } // namespace policy | 497 } // namespace policy |
OLD | NEW |