OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ | 5 #ifndef REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ |
6 #define REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ | 6 #define REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ |
7 | 7 |
8 #include "base/callback.h" | 8 #include "base/callback.h" |
9 #include "base/memory/weak_ptr.h" | 9 #include "base/memory/weak_ptr.h" |
10 #include "base/values.h" | 10 #include "base/values.h" |
11 #include "components/policy/core/common/policy_service.h" | |
12 | 11 |
13 namespace base { | 12 namespace base { |
14 class SingleThreadTaskRunner; | 13 class SingleThreadTaskRunner; |
15 class TimeDelta; | 14 class TimeDelta; |
16 class WaitableEvent; | 15 class WaitableEvent; |
17 } // namespace base | 16 } // namespace base |
18 | 17 |
| 18 namespace policy { |
| 19 class PolicyService; |
| 20 } // namespace policy |
| 21 |
19 namespace remoting { | 22 namespace remoting { |
20 namespace policy_hack { | 23 namespace policy_hack { |
21 | 24 |
22 // Watches for changes to the managed remote access host policies. | 25 // Watches for changes to the managed remote access host policies. |
23 // If StartWatching() has been called, then before this object can be deleted, | 26 // If StartWatching() has been called, then before this object can be deleted, |
24 // StopWatching() have completed (the provided |done| event must be signaled). | 27 // StopWatching() have completed (the provided |done| event must be signaled). |
25 class PolicyWatcher { | 28 class PolicyWatcher { |
26 public: | 29 public: |
27 // Called first with all policies, and subsequently with any changed policies. | 30 // Called first with all policies, and subsequently with any changed policies. |
28 typedef base::Callback<void(scoped_ptr<base::DictionaryValue>)> | 31 typedef base::Callback<void(scoped_ptr<base::DictionaryValue>)> |
29 PolicyUpdatedCallback; | 32 PolicyUpdatedCallback; |
30 | 33 |
| 34 // TODO(lukasza): PolicyErrorCallback never gets called by |
| 35 // PolicyServiceWatcher. Need to either 1) remove error-handling from |
| 36 // PolicyWatcher or 2) add error-handling around PolicyService |
| 37 // 2a) Add policy name/type validation via policy::Schema::Normalize. |
| 38 // 2b) Consider exposing parsing errors from policy::ConfigDirPolicyLoader. |
| 39 |
31 // Called after detecting malformed policies. | 40 // Called after detecting malformed policies. |
32 typedef base::Callback<void()> PolicyErrorCallback; | 41 typedef base::Callback<void()> PolicyErrorCallback; |
33 | 42 |
| 43 // Derived classes specify which |task_runner| should be used for calling |
| 44 // their StartWatchingInternal and StopWatchingInternal methods. |
| 45 // Derived classes promise back to call UpdatePolicies and other instance |
| 46 // methods on the same |task_runner|. |
34 explicit PolicyWatcher( | 47 explicit PolicyWatcher( |
35 scoped_refptr<base::SingleThreadTaskRunner> task_runner); | 48 const scoped_refptr<base::SingleThreadTaskRunner>& task_runner); |
| 49 |
36 virtual ~PolicyWatcher(); | 50 virtual ~PolicyWatcher(); |
37 | 51 |
38 // This guarantees that the |policy_updated_callback| is called at least once | 52 // This guarantees that the |policy_updated_callback| is called at least once |
39 // with the current policies. After that, |policy_updated_callback| will be | 53 // with the current policies. After that, |policy_updated_callback| will be |
40 // called whenever a change to any policy is detected. It will then be called | 54 // called whenever a change to any policy is detected. It will then be called |
41 // only with the changed policies. | 55 // only with the changed policies. |
42 // | 56 // |
43 // |policy_error_callback| will be called when malformed policies are detected | 57 // |policy_error_callback| will be called when malformed policies are detected |
44 // (i.e. wrong type of policy value, or unparseable files under | 58 // (i.e. wrong type of policy value, or unparseable files under |
45 // /etc/opt/chrome/policies/managed). | 59 // /etc/opt/chrome/policies/managed). |
46 // When called, the |policy_error_callback| is responsible for mitigating the | 60 // When called, the |policy_error_callback| is responsible for mitigating the |
47 // security risk of running with incorrectly formulated policies (by either | 61 // security risk of running with incorrectly formulated policies (by either |
48 // shutting down or locking down the host). | 62 // shutting down or locking down the host). |
49 // After calling |policy_error_callback| PolicyWatcher will continue watching | 63 // After calling |policy_error_callback| PolicyWatcher will continue watching |
50 // for policy changes and will call |policy_updated_callback| when the error | 64 // for policy changes and will call |policy_updated_callback| when the error |
51 // is recovered from and may call |policy_error_callback| when new errors are | 65 // is recovered from and may call |policy_error_callback| when new errors are |
52 // found. | 66 // found. |
| 67 // |
| 68 // See |Create| method's description for comments about which thread will |
| 69 // be used to run the callbacks. |
53 virtual void StartWatching( | 70 virtual void StartWatching( |
54 const PolicyUpdatedCallback& policy_updated_callback, | 71 const PolicyUpdatedCallback& policy_updated_callback, |
55 const PolicyErrorCallback& policy_error_callback); | 72 const PolicyErrorCallback& policy_error_callback); |
56 | 73 |
57 // Should be called after StartWatching() before the object is deleted. Calls | 74 // Should be called after StartWatching() before the object is deleted. Calls |
58 // should wait for |stopped_callback| to be called before deleting it. | 75 // should wait for |stopped_callback| to be called before deleting it. |
59 virtual void StopWatching(const base::Closure& stopped_callback); | 76 virtual void StopWatching(const base::Closure& stopped_callback); |
60 | 77 |
61 // Implemented by each platform. |task_runner| should be an IO message loop. | 78 // Specify a |policy_service| to borrow (on Chrome OS, from the browser |
62 // |policy_service| is currently only used on ChromeOS. The caller must | 79 // process) or specify nullptr to internally construct and use a new |
63 // ensure that |policy_service| remains valid for the lifetime of | 80 // PolicyService (on other OS-es). |
64 // PolicyWatcher. | 81 // |
| 82 // When |policy_service| is null, then |task_runner| is used for reading the |
| 83 // policy from files / registry / preferences. PolicyUpdatedCallback and |
| 84 // PolicyErrorCallback will be called on the same |task_runner|. |
| 85 // |task_runner| should be of TYPE_IO type. |
| 86 // |
| 87 // When |policy_service| is specified then |task_runner| argument is ignored |
| 88 // and 1) BrowserThread::UI is used for PolicyUpdatedCallback and |
| 89 // PolicyErrorCallback and 2) BrowserThread::FILE is used for reading the |
| 90 // policy from files / registry / preferences (although (2) is just an |
| 91 // implementation detail and should likely be ignored outside of |
| 92 // PolicyWatcher). |
65 static scoped_ptr<PolicyWatcher> Create( | 93 static scoped_ptr<PolicyWatcher> Create( |
66 policy::PolicyService* policy_service, | 94 policy::PolicyService* policy_service, |
67 scoped_refptr<base::SingleThreadTaskRunner> task_runner); | 95 const scoped_refptr<base::SingleThreadTaskRunner>& task_runner); |
68 | 96 |
69 // The name of the NAT traversal policy. | 97 // The name of the NAT traversal policy. |
70 static const char kNatPolicyName[]; | 98 static const char kNatPolicyName[]; |
71 | 99 |
72 // The name of the policy for requiring 2-factor authentication. | 100 // The name of the policy for requiring 2-factor authentication. |
73 static const char kHostRequireTwoFactorPolicyName[]; | 101 static const char kHostRequireTwoFactorPolicyName[]; |
74 | 102 |
75 // The name of the host domain policy. | 103 // The name of the host domain policy. |
76 static const char kHostDomainPolicyName[]; | 104 static const char kHostDomainPolicyName[]; |
77 | 105 |
(...skipping 24 matching lines...) Expand all Loading... |
102 | 130 |
103 // The name of the policy that restricts the range of host UDP ports. | 131 // The name of the policy that restricts the range of host UDP ports. |
104 static const char kUdpPortRangePolicyName[]; | 132 static const char kUdpPortRangePolicyName[]; |
105 | 133 |
106 // The name of the policy for overriding policies, for use in testing. | 134 // The name of the policy for overriding policies, for use in testing. |
107 static const char kHostDebugOverridePoliciesName[]; | 135 static const char kHostDebugOverridePoliciesName[]; |
108 | 136 |
109 protected: | 137 protected: |
110 virtual void StartWatchingInternal() = 0; | 138 virtual void StartWatchingInternal() = 0; |
111 virtual void StopWatchingInternal() = 0; | 139 virtual void StopWatchingInternal() = 0; |
112 virtual void Reload() = 0; | |
113 | 140 |
114 // Used to check if the class is on the right thread. | 141 // Used to check if the class is on the right thread. |
115 bool OnPolicyWatcherThread() const; | 142 bool OnPolicyWatcherThread() const; |
116 | 143 |
117 // Takes the policy dictionary from the OS specific store and extracts the | 144 // Takes the policy dictionary from the OS specific store and extracts the |
118 // relevant policies. | 145 // relevant policies. |
119 void UpdatePolicies(const base::DictionaryValue* new_policy); | 146 void UpdatePolicies(const base::DictionaryValue* new_policy); |
120 | 147 |
121 // Signals policy error to the registered |PolicyErrorCallback|. | 148 // Signals policy error to the registered |PolicyErrorCallback|. |
122 void SignalPolicyError(); | 149 void SignalPolicyError(); |
123 | 150 |
124 // Called whenever a transient error occurs during reading of policy files. | 151 // Called whenever a transient error occurs during reading of policy files. |
125 // This will increment a counter, and will trigger a call to | 152 // This will increment a counter, and will trigger a call to |
126 // SignalPolicyError() only after a threshold count is reached. | 153 // SignalPolicyError() only after a threshold count is reached. |
127 // The counter is reset whenever policy has been successfully read. | 154 // The counter is reset whenever policy has been successfully read. |
128 void SignalTransientPolicyError(); | 155 void SignalTransientPolicyError(); |
129 | 156 |
130 // Used for time-based reloads in case something goes wrong with the | |
131 // notification system. | |
132 void ScheduleFallbackReloadTask(); | |
133 void ScheduleReloadTask(const base::TimeDelta& delay); | |
134 | |
135 // Returns a DictionaryValue containing the default values for each policy. | 157 // Returns a DictionaryValue containing the default values for each policy. |
136 const base::DictionaryValue& Defaults() const; | 158 const base::DictionaryValue& Defaults() const; |
137 | 159 |
138 private: | 160 private: |
139 void StopWatchingOnPolicyWatcherThread(); | 161 void StopWatchingOnPolicyWatcherThread(); |
140 scoped_refptr<base::SingleThreadTaskRunner> task_runner_; | 162 scoped_refptr<base::SingleThreadTaskRunner> task_runner_; |
141 | 163 |
142 PolicyUpdatedCallback policy_updated_callback_; | 164 PolicyUpdatedCallback policy_updated_callback_; |
143 PolicyErrorCallback policy_error_callback_; | 165 PolicyErrorCallback policy_error_callback_; |
144 int transient_policy_error_retry_counter_; | 166 int transient_policy_error_retry_counter_; |
145 | 167 |
146 scoped_ptr<base::DictionaryValue> old_policies_; | 168 scoped_ptr<base::DictionaryValue> old_policies_; |
147 scoped_ptr<base::DictionaryValue> default_values_; | 169 scoped_ptr<base::DictionaryValue> default_values_; |
148 scoped_ptr<base::DictionaryValue> bad_type_values_; | 170 scoped_ptr<base::DictionaryValue> bad_type_values_; |
149 | 171 |
150 // Allows us to cancel any inflight FileWatcher events or scheduled reloads. | 172 // Allows us to cancel any inflight FileWatcher events or scheduled reloads. |
151 base::WeakPtrFactory<PolicyWatcher> weak_factory_; | 173 base::WeakPtrFactory<PolicyWatcher> weak_factory_; |
152 }; | 174 }; |
153 | 175 |
154 } // namespace policy_hack | 176 } // namespace policy_hack |
155 } // namespace remoting | 177 } // namespace remoting |
156 | 178 |
157 #endif // REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ | 179 #endif // REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ |
OLD | NEW |