OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Most of this code is copied from various classes in | 5 // Most of this code is copied from various classes in |
6 // src/chrome/browser/policy. In particular, look at | 6 // src/chrome/browser/policy. In particular, look at |
7 // | 7 // |
8 // file_based_policy_loader.{h,cc} | 8 // file_based_policy_loader.{h,cc} |
9 // config_dir_policy_provider.{h,cc} | 9 // config_dir_policy_provider.{h,cc} |
10 // | 10 // |
(...skipping 14 matching lines...) Expand all Loading... |
25 #include "base/single_thread_task_runner.h" | 25 #include "base/single_thread_task_runner.h" |
26 #include "base/synchronization/waitable_event.h" | 26 #include "base/synchronization/waitable_event.h" |
27 #include "base/time.h" | 27 #include "base/time.h" |
28 #include "base/values.h" | 28 #include "base/values.h" |
29 | 29 |
30 namespace remoting { | 30 namespace remoting { |
31 namespace policy_hack { | 31 namespace policy_hack { |
32 | 32 |
33 namespace { | 33 namespace { |
34 | 34 |
35 const FilePath::CharType kPolicyDir[] = | 35 const base::FilePath::CharType kPolicyDir[] = |
36 // Always read the Chrome policies (even on Chromium) so that policy | 36 // Always read the Chrome policies (even on Chromium) so that policy |
37 // enforcement can't be bypassed by running Chromium. | 37 // enforcement can't be bypassed by running Chromium. |
38 FILE_PATH_LITERAL("/etc/opt/chrome/policies/managed"); | 38 FILE_PATH_LITERAL("/etc/opt/chrome/policies/managed"); |
39 | 39 |
40 // Amount of time we wait for the files on disk to settle before trying to load | 40 // Amount of time we wait for the files on disk to settle before trying to load |
41 // them. This alleviates the problem of reading partially written files and | 41 // them. This alleviates the problem of reading partially written files and |
42 // makes it possible to batch quasi-simultaneous changes. | 42 // makes it possible to batch quasi-simultaneous changes. |
43 const int kSettleIntervalSeconds = 5; | 43 const int kSettleIntervalSeconds = 5; |
44 | 44 |
45 } // namespace | 45 } // namespace |
46 | 46 |
47 class PolicyWatcherLinux : public PolicyWatcher { | 47 class PolicyWatcherLinux : public PolicyWatcher { |
48 public: | 48 public: |
49 PolicyWatcherLinux(scoped_refptr<base::SingleThreadTaskRunner> task_runner, | 49 PolicyWatcherLinux(scoped_refptr<base::SingleThreadTaskRunner> task_runner, |
50 const FilePath& config_dir) | 50 const base::FilePath& config_dir) |
51 : PolicyWatcher(task_runner), | 51 : PolicyWatcher(task_runner), |
52 config_dir_(config_dir), | 52 config_dir_(config_dir), |
53 ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)) { | 53 ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)) { |
54 // Detach the factory because we ensure that only the policy thread ever | 54 // Detach the factory because we ensure that only the policy thread ever |
55 // calls methods on this. Also, the API contract of having to call | 55 // calls methods on this. Also, the API contract of having to call |
56 // StopWatching() (which signals completion) after StartWatching() | 56 // StopWatching() (which signals completion) after StartWatching() |
57 // before this object can be destructed ensures there are no users of | 57 // before this object can be destructed ensures there are no users of |
58 // this object before it is destructed. | 58 // this object before it is destructed. |
59 weak_factory_.DetachFromThread(); | 59 weak_factory_.DetachFromThread(); |
60 } | 60 } |
(...skipping 21 matching lines...) Expand all Loading... |
82 ScheduleFallbackReloadTask(); | 82 ScheduleFallbackReloadTask(); |
83 } | 83 } |
84 | 84 |
85 virtual void StopWatchingInternal() OVERRIDE { | 85 virtual void StopWatchingInternal() OVERRIDE { |
86 DCHECK(OnPolicyWatcherThread()); | 86 DCHECK(OnPolicyWatcherThread()); |
87 // Cancel any inflight requests. | 87 // Cancel any inflight requests. |
88 watcher_.reset(); | 88 watcher_.reset(); |
89 } | 89 } |
90 | 90 |
91 private: | 91 private: |
92 void OnFilePathChanged(const FilePath& path, bool error) { | 92 void OnFilePathChanged(const base::FilePath& path, bool error) { |
93 DCHECK(OnPolicyWatcherThread()); | 93 DCHECK(OnPolicyWatcherThread()); |
94 | 94 |
95 if (!error) | 95 if (!error) |
96 Reload(); | 96 Reload(); |
97 else | 97 else |
98 LOG(ERROR) << "PolicyWatcherLinux on " << path.value() << " failed."; | 98 LOG(ERROR) << "PolicyWatcherLinux on " << path.value() << " failed."; |
99 } | 99 } |
100 | 100 |
101 base::Time GetLastModification() { | 101 base::Time GetLastModification() { |
102 DCHECK(OnPolicyWatcherThread()); | 102 DCHECK(OnPolicyWatcherThread()); |
103 base::Time last_modification = base::Time(); | 103 base::Time last_modification = base::Time(); |
104 base::PlatformFileInfo file_info; | 104 base::PlatformFileInfo file_info; |
105 | 105 |
106 // If the path does not exist or points to a directory, it's safe to load. | 106 // If the path does not exist or points to a directory, it's safe to load. |
107 if (!file_util::GetFileInfo(config_dir_, &file_info) || | 107 if (!file_util::GetFileInfo(config_dir_, &file_info) || |
108 !file_info.is_directory) { | 108 !file_info.is_directory) { |
109 return last_modification; | 109 return last_modification; |
110 } | 110 } |
111 | 111 |
112 // Enumerate the files and find the most recent modification timestamp. | 112 // Enumerate the files and find the most recent modification timestamp. |
113 file_util::FileEnumerator file_enumerator(config_dir_, | 113 file_util::FileEnumerator file_enumerator(config_dir_, |
114 false, | 114 false, |
115 file_util::FileEnumerator::FILES); | 115 file_util::FileEnumerator::FILES); |
116 for (FilePath config_file = file_enumerator.Next(); | 116 for (base::FilePath config_file = file_enumerator.Next(); |
117 !config_file.empty(); | 117 !config_file.empty(); |
118 config_file = file_enumerator.Next()) { | 118 config_file = file_enumerator.Next()) { |
119 if (file_util::GetFileInfo(config_file, &file_info) && | 119 if (file_util::GetFileInfo(config_file, &file_info) && |
120 !file_info.is_directory) { | 120 !file_info.is_directory) { |
121 last_modification = std::max(last_modification, | 121 last_modification = std::max(last_modification, |
122 file_info.last_modified); | 122 file_info.last_modified); |
123 } | 123 } |
124 } | 124 } |
125 | 125 |
126 return last_modification; | 126 return last_modification; |
127 } | 127 } |
128 | 128 |
129 // Returns NULL if the policy dictionary couldn't be read. | 129 // Returns NULL if the policy dictionary couldn't be read. |
130 scoped_ptr<DictionaryValue> Load() { | 130 scoped_ptr<DictionaryValue> Load() { |
131 DCHECK(OnPolicyWatcherThread()); | 131 DCHECK(OnPolicyWatcherThread()); |
132 // Enumerate the files and sort them lexicographically. | 132 // Enumerate the files and sort them lexicographically. |
133 std::set<FilePath> files; | 133 std::set<base::FilePath> files; |
134 file_util::FileEnumerator file_enumerator(config_dir_, false, | 134 file_util::FileEnumerator file_enumerator(config_dir_, false, |
135 file_util::FileEnumerator::FILES); | 135 file_util::FileEnumerator::FILES); |
136 for (FilePath config_file_path = file_enumerator.Next(); | 136 for (base::FilePath config_file_path = file_enumerator.Next(); |
137 !config_file_path.empty(); config_file_path = file_enumerator.Next()) | 137 !config_file_path.empty(); config_file_path = file_enumerator.Next()) |
138 files.insert(config_file_path); | 138 files.insert(config_file_path); |
139 | 139 |
140 // Start with an empty dictionary and merge the files' contents. | 140 // Start with an empty dictionary and merge the files' contents. |
141 scoped_ptr<DictionaryValue> policy(new DictionaryValue()); | 141 scoped_ptr<DictionaryValue> policy(new DictionaryValue()); |
142 for (std::set<FilePath>::iterator config_file_iter = files.begin(); | 142 for (std::set<base::FilePath>::iterator config_file_iter = files.begin(); |
143 config_file_iter != files.end(); ++config_file_iter) { | 143 config_file_iter != files.end(); ++config_file_iter) { |
144 JSONFileValueSerializer deserializer(*config_file_iter); | 144 JSONFileValueSerializer deserializer(*config_file_iter); |
145 deserializer.set_allow_trailing_comma(true); | 145 deserializer.set_allow_trailing_comma(true); |
146 int error_code = 0; | 146 int error_code = 0; |
147 std::string error_msg; | 147 std::string error_msg; |
148 scoped_ptr<Value> value( | 148 scoped_ptr<Value> value( |
149 deserializer.Deserialize(&error_code, &error_msg)); | 149 deserializer.Deserialize(&error_code, &error_msg)); |
150 if (!value.get()) { | 150 if (!value.get()) { |
151 LOG(WARNING) << "Failed to read configuration file " | 151 LOG(WARNING) << "Failed to read configuration file " |
152 << config_file_iter->value() << ": " << error_msg; | 152 << config_file_iter->value() << ": " << error_msg; |
(...skipping 79 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
232 | 232 |
233 // Records last known modification timestamp of |config_dir_|. | 233 // Records last known modification timestamp of |config_dir_|. |
234 base::Time last_modification_file_; | 234 base::Time last_modification_file_; |
235 | 235 |
236 // The wall clock time at which the last modification timestamp was | 236 // The wall clock time at which the last modification timestamp was |
237 // recorded. It's better to not assume the file notification time and the | 237 // recorded. It's better to not assume the file notification time and the |
238 // wall clock times come from the same source, just in case there is some | 238 // wall clock times come from the same source, just in case there is some |
239 // non-local filesystem involved. | 239 // non-local filesystem involved. |
240 base::Time last_modification_clock_; | 240 base::Time last_modification_clock_; |
241 | 241 |
242 const FilePath config_dir_; | 242 const base::FilePath config_dir_; |
243 | 243 |
244 // Allows us to cancel any inflight FileWatcher events or scheduled reloads. | 244 // Allows us to cancel any inflight FileWatcher events or scheduled reloads. |
245 base::WeakPtrFactory<PolicyWatcherLinux> weak_factory_; | 245 base::WeakPtrFactory<PolicyWatcherLinux> weak_factory_; |
246 }; | 246 }; |
247 | 247 |
248 PolicyWatcher* PolicyWatcher::Create( | 248 PolicyWatcher* PolicyWatcher::Create( |
249 scoped_refptr<base::SingleThreadTaskRunner> task_runner) { | 249 scoped_refptr<base::SingleThreadTaskRunner> task_runner) { |
250 FilePath policy_dir(kPolicyDir); | 250 base::FilePath policy_dir(kPolicyDir); |
251 return new PolicyWatcherLinux(task_runner, policy_dir); | 251 return new PolicyWatcherLinux(task_runner, policy_dir); |
252 } | 252 } |
253 | 253 |
254 } // namespace policy_hack | 254 } // namespace policy_hack |
255 } // namespace remoting | 255 } // namespace remoting |
OLD | NEW |