| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_ENTERPRISE_INSTALL_ATTRIBUTES_H_ | |
| 6 #define CHROME_BROWSER_CHROMEOS_POLICY_ENTERPRISE_INSTALL_ATTRIBUTES_H_ | |
| 7 | |
| 8 #include <map> | |
| 9 #include <string> | |
| 10 | |
| 11 #include "base/callback.h" | |
| 12 #include "base/compiler_specific.h" | |
| 13 #include "base/files/file_path.h" | |
| 14 #include "base/gtest_prod_util.h" | |
| 15 #include "base/macros.h" | |
| 16 #include "base/memory/weak_ptr.h" | |
| 17 #include "chromeos/dbus/cryptohome_client.h" | |
| 18 #include "chromeos/dbus/dbus_method_call_status.h" | |
| 19 #include "components/policy/core/common/cloud/cloud_policy_constants.h" | |
| 20 | |
| 21 namespace policy { | |
| 22 | |
| 23 // Brokers access to the enterprise-related installation-time attributes on | |
| 24 // ChromeOS. | |
| 25 // TODO(zelidrag, mnissler): Rename + move this class - http://crbug.com/249513. | |
| 26 class EnterpriseInstallAttributes { | |
| 27 public: | |
| 28 // EnterpriseInstallAttributes status codes. Do not change the numeric ids or | |
| 29 // the meaning of the existing codes to preserve the interpretability of old | |
| 30 // logfiles. | |
| 31 enum LockResult { | |
| 32 LOCK_SUCCESS = 0, // Success. | |
| 33 LOCK_NOT_READY = 1, // Backend/TPM still initializing. | |
| 34 LOCK_TIMEOUT = 2, // Backend/TPM timed out. | |
| 35 LOCK_BACKEND_INVALID = 3, // Backend failed to initialize. | |
| 36 LOCK_ALREADY_LOCKED = 4, // TPM has already been locked. | |
| 37 LOCK_SET_ERROR = 5, // Failed to set attributes. | |
| 38 LOCK_FINALIZE_ERROR = 6, // Backend failed to lock. | |
| 39 LOCK_READBACK_ERROR = 7, // Inconsistency reading back registration data. | |
| 40 LOCK_WRONG_DOMAIN = 8, // Device already registered to another domain. | |
| 41 LOCK_WRONG_MODE = 9, // Device already locked to a different mode. | |
| 42 }; | |
| 43 | |
| 44 // A callback to handle responses of methods returning a LockResult value. | |
| 45 typedef base::Callback<void(LockResult lock_result)> LockResultCallback; | |
| 46 | |
| 47 // Return serialized InstallAttributes of an enterprise-owned configuration. | |
| 48 static std::string GetEnterpriseOwnedInstallAttributesBlobForTesting( | |
| 49 const std::string& user_name); | |
| 50 | |
| 51 explicit EnterpriseInstallAttributes( | |
| 52 chromeos::CryptohomeClient* cryptohome_client); | |
| 53 ~EnterpriseInstallAttributes(); | |
| 54 | |
| 55 // Tries to read install attributes from the cache file which is created early | |
| 56 // during the boot process. The cache file is used to work around slow | |
| 57 // cryptohome startup, which takes a while to register its DBus interface. | |
| 58 // (See http://crosbug.com/37367 for background on this.) | |
| 59 void Init(const base::FilePath& cache_file); | |
| 60 | |
| 61 // Makes sure the local caches for enterprise-related install attributes are | |
| 62 // up to date with what cryptohome has. This method checks the readiness of | |
| 63 // attributes and read them if ready. Actual read will be performed in | |
| 64 // ReadAttributesIfReady(). | |
| 65 void ReadImmutableAttributes(const base::Closure& callback); | |
| 66 | |
| 67 // Locks the device to be an enterprise device registered by the given user. | |
| 68 // This can also be called after the lock has already been taken, in which | |
| 69 // case it checks that the passed user agrees with the locked attribute. | |
| 70 // |callback| must not be null and is called with the result. Must not be | |
| 71 // called while a previous LockDevice() invocation is still pending. | |
| 72 void LockDevice(const std::string& user, | |
| 73 DeviceMode device_mode, | |
| 74 const std::string& device_id, | |
| 75 const LockResultCallback& callback); | |
| 76 | |
| 77 // Checks whether this is an enterprise device. | |
| 78 bool IsEnterpriseDevice() const; | |
| 79 | |
| 80 // Checks whether this is a consumer kiosk enabled device. | |
| 81 bool IsConsumerKioskDeviceWithAutoLaunch(); | |
| 82 | |
| 83 // Gets the domain this device belongs to or an empty string if the device is | |
| 84 // not an enterprise device. | |
| 85 std::string GetDomain() const; | |
| 86 | |
| 87 // Gets the device id that was generated when the device was registered. | |
| 88 // Returns an empty string if the device is not an enterprise device or the | |
| 89 // device id was not stored in the lockbox (prior to R19). | |
| 90 std::string GetDeviceId(); | |
| 91 | |
| 92 // Gets the mode the device was enrolled to. The return value for devices that | |
| 93 // are not locked yet will be DEVICE_MODE_UNKNOWN. | |
| 94 DeviceMode GetMode(); | |
| 95 | |
| 96 protected: | |
| 97 // True if install attributes have been read successfully. False if read | |
| 98 // failed or no read attempt was made. | |
| 99 bool device_locked_; | |
| 100 | |
| 101 // Whether the TPM / install attributes consistency check is running. | |
| 102 bool consistency_check_running_; | |
| 103 | |
| 104 // To be run after the consistency check has finished. | |
| 105 base::Closure post_check_action_; | |
| 106 | |
| 107 // Wether the LockDevice() initiated TPM calls are running. | |
| 108 bool device_lock_running_; | |
| 109 | |
| 110 std::string registration_user_; | |
| 111 std::string registration_domain_; | |
| 112 std::string registration_device_id_; | |
| 113 DeviceMode registration_mode_; | |
| 114 | |
| 115 private: | |
| 116 FRIEND_TEST_ALL_PREFIXES(EnterpriseInstallAttributesTest, | |
| 117 DeviceLockedFromOlderVersion); | |
| 118 FRIEND_TEST_ALL_PREFIXES(EnterpriseInstallAttributesTest, | |
| 119 GetRegistrationUser); | |
| 120 FRIEND_TEST_ALL_PREFIXES(EnterpriseInstallAttributesTest, Init); | |
| 121 FRIEND_TEST_ALL_PREFIXES(EnterpriseInstallAttributesTest, | |
| 122 InitForConsumerKiosk); | |
| 123 FRIEND_TEST_ALL_PREFIXES(EnterpriseInstallAttributesTest, LockCanonicalize); | |
| 124 FRIEND_TEST_ALL_PREFIXES(EnterpriseInstallAttributesTest, | |
| 125 VerifyFakeInstallAttributesCache); | |
| 126 | |
| 127 // Constants for the possible device modes that can be stored in the lockbox. | |
| 128 static const char kConsumerDeviceMode[]; | |
| 129 static const char kEnterpriseDeviceMode[]; | |
| 130 static const char kLegacyRetailDeviceMode[]; | |
| 131 static const char kConsumerKioskDeviceMode[]; | |
| 132 static const char kUnknownDeviceMode[]; | |
| 133 | |
| 134 // Field names in the lockbox. | |
| 135 static const char kAttrEnterpriseDeviceId[]; | |
| 136 static const char kAttrEnterpriseDomain[]; | |
| 137 static const char kAttrEnterpriseMode[]; | |
| 138 static const char kAttrEnterpriseOwned[]; | |
| 139 static const char kAttrEnterpriseUser[]; | |
| 140 static const char kAttrConsumerKioskEnabled[]; | |
| 141 | |
| 142 // Called by |cryptohome_client_| when the cryptohome service becomes | |
| 143 // initially available over D-Bus. | |
| 144 void OnCryptohomeServiceInitiallyAvailable(bool service_is_ready); | |
| 145 | |
| 146 // Translates DeviceMode constants to strings used in the lockbox. | |
| 147 std::string GetDeviceModeString(DeviceMode mode); | |
| 148 | |
| 149 // Translates strings used in the lockbox to DeviceMode values. | |
| 150 DeviceMode GetDeviceModeFromString(const std::string& mode); | |
| 151 | |
| 152 // Decodes the install attributes provided in |attr_map|. | |
| 153 void DecodeInstallAttributes( | |
| 154 const std::map<std::string, std::string>& attr_map); | |
| 155 | |
| 156 // Helper for ReadImmutableAttributes. | |
| 157 void ReadAttributesIfReady( | |
| 158 const base::Closure& callback, | |
| 159 chromeos::DBusMethodCallStatus call_status, | |
| 160 bool result); | |
| 161 | |
| 162 // Helper for LockDevice(). Handles the result of InstallAttributesIsReady() | |
| 163 // and continue processing LockDevice if the result is true. | |
| 164 void LockDeviceIfAttributesIsReady( | |
| 165 const std::string& user, | |
| 166 DeviceMode device_mode, | |
| 167 const std::string& device_id, | |
| 168 const LockResultCallback& callback, | |
| 169 chromeos::DBusMethodCallStatus call_status, | |
| 170 bool result); | |
| 171 | |
| 172 // Confirms the registered user and invoke the callback. | |
| 173 void OnReadImmutableAttributes(const std::string& user, | |
| 174 const LockResultCallback& callback); | |
| 175 | |
| 176 // Check state of install attributes against TPM lock state and generate UMA | |
| 177 // for the result. Asynchronously retry |dbus_retries| times in case of DBUS | |
| 178 // errors (cryptohomed startup is slow). | |
| 179 void TriggerConsistencyCheck(int dbus_retries); | |
| 180 | |
| 181 // Callback for TpmIsOwned() DBUS call. Generates UMA or schedules retry in | |
| 182 // case of DBUS error. | |
| 183 void OnTpmOwnerCheckCompleted(int dbus_retries_remaining, | |
| 184 chromeos::DBusMethodCallStatus call_status, | |
| 185 bool result); | |
| 186 | |
| 187 // Gets the user that registered the device. Returns an empty string if the | |
| 188 // device is not an enterprise device. | |
| 189 std::string GetRegistrationUser() const; | |
| 190 | |
| 191 chromeos::CryptohomeClient* cryptohome_client_; | |
| 192 | |
| 193 base::WeakPtrFactory<EnterpriseInstallAttributes> weak_ptr_factory_; | |
| 194 | |
| 195 DISALLOW_COPY_AND_ASSIGN(EnterpriseInstallAttributes); | |
| 196 }; | |
| 197 | |
| 198 } // namespace policy | |
| 199 | |
| 200 #endif // CHROME_BROWSER_CHROMEOS_POLICY_ENTERPRISE_INSTALL_ATTRIBUTES_H_ | |
| OLD | NEW |