Chromium Code Reviews| Index: chrome/browser/chromeos/attestation/attestation_policy_observer.cc |
| diff --git a/chrome/browser/chromeos/attestation/attestation_policy_observer.cc b/chrome/browser/chromeos/attestation/attestation_policy_observer.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..6621fe89844ed7bfaf9959e96433c122d41fe44b |
| --- /dev/null |
| +++ b/chrome/browser/chromeos/attestation/attestation_policy_observer.cc |
| @@ -0,0 +1,181 @@ |
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "chrome/browser/chromeos/attestation/attestation_policy_observer.h" |
| + |
| +#include <string> |
| + |
| +#include "base/bind.h" |
| +#include "chrome/browser/chromeos/attestation/attestation_ca_client.h" |
| +#include "chrome/browser/chromeos/settings/cros_settings.h" |
| +#include "chrome/browser/policy/cloud/cloud_policy_client.h" |
| +#include "chrome/browser/policy/cloud/cloud_policy_manager.h" |
| +#include "chrome/common/chrome_notification_types.h" |
| +#include "chromeos/attestation/attestation_flow.h" |
| +#include "chromeos/cryptohome/async_method_caller.h" |
| +#include "chromeos/dbus/cryptohome_client.h" |
| +#include "chromeos/dbus/dbus_method_call_status.h" |
| +#include "chromeos/dbus/dbus_thread_manager.h" |
| +#include "content/public/browser/notification_details.h" |
| + |
| +using std::string; |
|
jochen (gone - plz use gerrit)
2013/04/18 06:49:16
we commonly don't use using for stl stuff
satorux1
2013/04/18 07:04:09
Right. Please fix!
dkrahn
2013/04/18 18:29:41
Done.
|
| + |
| +namespace { |
| + |
| +// A dbus callback which handles a boolean result. |
| +// |
| +// Parameters |
| +// on_true - Called when status=success and value=true. |
| +// on_false - Called when status=success and value=false. |
| +// status - The dbus operation status. |
| +// value - The value returned by the dbus operation. |
| +void DBusBoolRedirectCallback(const base::Closure& on_true, |
| + const base::Closure& on_false, |
| + chromeos::DBusMethodCallStatus status, |
| + bool value) { |
| + if (status != chromeos::DBUS_METHOD_CALL_SUCCESS) |
| + return; |
| + const base::Closure& task = value ? on_true : on_false; |
| + if (!task.is_null()) |
| + task.Run(); |
| +} |
| + |
| +// A dbus callback which handles a string result. |
| +// |
| +// Parameters |
| +// on_success - Called when status=success and result=true. |
| +// status - The dbus operation status. |
| +// result - The result returned by the dbus operation. |
| +// data - The data returned by the dbus operation. |
| +void DBusStringCallback(const base::Callback<void(const string&)> on_success, |
| + chromeos::DBusMethodCallStatus status, |
| + bool result, |
| + const string& data) { |
| + if (status != chromeos::DBUS_METHOD_CALL_SUCCESS || !result) |
| + return; |
| + on_success.Run(data); |
| +} |
| + |
| +} // namespace |
| + |
| +namespace chromeos { |
| +namespace attestation { |
| + |
| +const char AttestationPolicyObserver::kEnterpriseMachineKey[] = |
| + "attest-ent-machine"; |
| + |
| +AttestationPolicyObserver::AttestationPolicyObserver( |
| + policy::CloudPolicyClient* policy_client) |
| + : ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)), |
| + cros_settings_(CrosSettings::Get()), |
| + policy_client_(policy_client), |
| + cryptohome_client_(NULL), |
| + attestation_flow_(NULL) { |
|
satorux1
2013/04/18 05:43:16
On what thread this project lives?
I expect it to
dkrahn
2013/04/18 18:29:41
Done.
|
| + cros_settings_->AddSettingsObserver(kDeviceAttestationEnabled, this); |
| + Start(); |
| +} |
| + |
| +AttestationPolicyObserver::AttestationPolicyObserver( |
| + policy::CloudPolicyClient* policy_client, |
| + CryptohomeClient* cryptohome_client, |
| + AttestationFlow* attestation_flow) |
| + : ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)), |
| + cros_settings_(CrosSettings::Get()), |
| + policy_client_(policy_client), |
| + cryptohome_client_(cryptohome_client), |
| + attestation_flow_(attestation_flow) { |
| + cros_settings_->AddSettingsObserver(kDeviceAttestationEnabled, this); |
| + Start(); |
| +} |
| + |
| +AttestationPolicyObserver::~AttestationPolicyObserver() { |
| + cros_settings_->RemoveSettingsObserver(kDeviceAttestationEnabled, this); |
| +} |
| + |
| +void AttestationPolicyObserver::Observe( |
| + int type, |
| + const content::NotificationSource& source, |
| + const content::NotificationDetails& details) { |
| + string* path = content::Details<string>(details).ptr(); |
| + if (type != chrome::NOTIFICATION_SYSTEM_SETTING_CHANGED || |
| + *path != kDeviceAttestationEnabled) { |
| + LOG(WARNING) << "AttestationPolicyObserver: Unexpected event received."; |
| + return; |
| + } |
| + Start(); |
| +} |
| + |
| +void AttestationPolicyObserver::Start() { |
| + // If attestation is not enabled, there is nothing to do. |
| + bool enabled = false; |
| + if (!cros_settings_->GetBoolean(kDeviceAttestationEnabled, &enabled) || |
| + !enabled) |
| + return; |
| + |
| + // We expect a registered CloudPolicyClient. |
| + if (!policy_client_->is_registered()) { |
| + LOG(ERROR) << "AttestationPolicyObserver: Invalid CloudPolicyClient."; |
| + return; |
| + } |
| + |
| + if (!cryptohome_client_) |
| + cryptohome_client_ = DBusThreadManager::Get()->GetCryptohomeClient(); |
| + |
| + if (!attestation_flow_) { |
| + scoped_ptr<ServerProxy> attestation_ca_client(new AttestationCAClient()); |
| + default_attestation_flow_.reset(new AttestationFlow( |
| + cryptohome::AsyncMethodCaller::GetInstance(), |
| + cryptohome_client_, |
| + attestation_ca_client.Pass())); |
| + attestation_flow_ = default_attestation_flow_.get(); |
| + } |
| + |
| + // Start a dbus call to check if an Enterprise Machine Key already exists. |
| + base::Closure on_does_exist = |
| + base::Bind(&AttestationPolicyObserver::GetExistingCertificate, |
| + weak_factory_.GetWeakPtr()); |
| + base::Closure on_does_not_exist = |
| + base::Bind(&AttestationPolicyObserver::GetNewCertificate, |
| + weak_factory_.GetWeakPtr()); |
| + cryptohome_client_->TpmAttestationDoesKeyExist( |
| + CryptohomeClient::DEVICE_KEY, |
| + kEnterpriseMachineKey, |
| + base::Bind(DBusBoolRedirectCallback, on_does_exist, on_does_not_exist)); |
| +} |
| + |
| +void AttestationPolicyObserver::GetNewCertificate() { |
| + // We can reuse the dbus callback handler logic. |
| + attestation_flow_->GetCertificate( |
| + kEnterpriseMachineKey, |
| + base::Bind(DBusStringCallback, |
| + base::Bind(&AttestationPolicyObserver::UploadCertificate, |
| + weak_factory_.GetWeakPtr()), |
| + DBUS_METHOD_CALL_SUCCESS)); |
| +} |
| + |
| +void AttestationPolicyObserver::GetExistingCertificate() { |
| + cryptohome_client_->TpmAttestationGetCertificate( |
| + CryptohomeClient::DEVICE_KEY, |
| + kEnterpriseMachineKey, |
| + base::Bind(DBusStringCallback, |
| + base::Bind(&AttestationPolicyObserver::CheckCertificateExpiry, |
| + weak_factory_.GetWeakPtr()))); |
| +} |
| + |
| +void AttestationPolicyObserver::CheckCertificateExpiry( |
| + const string& certificate) { |
| + // TODO(dkrahn): Check if the certificate will expire soon, for now assume no. |
| + CheckIfUploaded(certificate); |
| +} |
| + |
| +void AttestationPolicyObserver::UploadCertificate(const string& certificate) { |
| + // TODO(dkrahn): Upload the certificate. |
| +} |
| + |
| +void AttestationPolicyObserver::CheckIfUploaded(const string& certificate) { |
| + // TODO(dkrahn): Check if we've already uploaded the certificate. |
| +} |
| + |
| +} // namespace attestation |
| +} // namespace chromeos |