Index: remoting/host/policy_hack/policy_watcher_linux.cc |
diff --git a/remoting/host/policy_hack/policy_watcher_linux.cc b/remoting/host/policy_hack/policy_watcher_linux.cc |
deleted file mode 100644 |
index 20724b81697467849407ec253721b4b66f8a9878..0000000000000000000000000000000000000000 |
--- a/remoting/host/policy_hack/policy_watcher_linux.cc |
+++ /dev/null |
@@ -1,256 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-// Most of this code is copied from various classes in |
-// src/chrome/browser/policy. In particular, look at |
-// |
-// file_based_policy_loader.{h,cc} |
-// config_dir_policy_provider.{h,cc} |
-// |
-// This is a reduction of the functionality in those classes. |
- |
-#include <set> |
- |
-#include "remoting/host/policy_hack/policy_watcher.h" |
- |
-#include "base/bind.h" |
-#include "base/compiler_specific.h" |
-#include "base/files/file_enumerator.h" |
-#include "base/files/file_path.h" |
-#include "base/files/file_path_watcher.h" |
-#include "base/files/file_util.h" |
-#include "base/json/json_file_value_serializer.h" |
-#include "base/memory/scoped_ptr.h" |
-#include "base/memory/weak_ptr.h" |
-#include "base/single_thread_task_runner.h" |
-#include "base/synchronization/waitable_event.h" |
-#include "base/time/time.h" |
-#include "base/values.h" |
- |
-namespace remoting { |
-namespace policy_hack { |
- |
-namespace { |
- |
-const base::FilePath::CharType kPolicyDir[] = |
- // Always read the Chrome policies (even on Chromium) so that policy |
- // enforcement can't be bypassed by running Chromium. |
- FILE_PATH_LITERAL("/etc/opt/chrome/policies/managed"); |
- |
-// Amount of time we wait for the files on disk to settle before trying to load |
-// them. This alleviates the problem of reading partially written files and |
-// makes it possible to batch quasi-simultaneous changes. |
-const int kSettleIntervalSeconds = 5; |
- |
-} // namespace |
- |
-class PolicyWatcherLinux : public PolicyWatcher { |
- public: |
- PolicyWatcherLinux(scoped_refptr<base::SingleThreadTaskRunner> task_runner, |
- const base::FilePath& config_dir) |
- : PolicyWatcher(task_runner), |
- config_dir_(config_dir), |
- weak_factory_(this) { |
- } |
- |
- ~PolicyWatcherLinux() override {} |
- |
- protected: |
- void StartWatchingInternal() override { |
- DCHECK(OnPolicyWatcherThread()); |
- watcher_.reset(new base::FilePathWatcher()); |
- |
- if (!config_dir_.empty() && |
- !watcher_->Watch( |
- config_dir_, false, |
- base::Bind(&PolicyWatcherLinux::OnFilePathChanged, |
- weak_factory_.GetWeakPtr()))) { |
- OnFilePathChanged(config_dir_, true); |
- } |
- |
- // There might have been changes to the directory in the time between |
- // construction of the loader and initialization of the watcher. Call reload |
- // to detect if that is the case. |
- Reload(); |
- |
- ScheduleFallbackReloadTask(); |
- } |
- |
- void StopWatchingInternal() override { |
- DCHECK(OnPolicyWatcherThread()); |
- |
- // Stop watching for changes to files in the policies directory. |
- watcher_.reset(); |
- |
- // Orphan any pending OnFilePathChanged tasks. |
- weak_factory_.InvalidateWeakPtrs(); |
- } |
- |
- private: |
- void OnFilePathChanged(const base::FilePath& path, bool error) { |
- DCHECK(OnPolicyWatcherThread()); |
- |
- if (!error) |
- Reload(); |
- else |
- LOG(ERROR) << "PolicyWatcherLinux on " << path.value() << " failed."; |
- } |
- |
- base::Time GetLastModification() { |
- DCHECK(OnPolicyWatcherThread()); |
- base::Time last_modification = base::Time(); |
- base::File::Info file_info; |
- |
- // If the path does not exist or points to a directory, it's safe to load. |
- if (!base::GetFileInfo(config_dir_, &file_info) || |
- !file_info.is_directory) { |
- return last_modification; |
- } |
- |
- // Enumerate the files and find the most recent modification timestamp. |
- base::FileEnumerator file_enumerator(config_dir_, |
- false, |
- base::FileEnumerator::FILES); |
- for (base::FilePath config_file = file_enumerator.Next(); |
- !config_file.empty(); |
- config_file = file_enumerator.Next()) { |
- if (base::GetFileInfo(config_file, &file_info) && |
- !file_info.is_directory) { |
- last_modification = std::max(last_modification, |
- file_info.last_modified); |
- } |
- } |
- |
- return last_modification; |
- } |
- |
- // Returns NULL if the policy dictionary couldn't be read. |
- scoped_ptr<base::DictionaryValue> Load() { |
- DCHECK(OnPolicyWatcherThread()); |
- // Enumerate the files and sort them lexicographically. |
- std::set<base::FilePath> files; |
- base::FileEnumerator file_enumerator(config_dir_, false, |
- base::FileEnumerator::FILES); |
- for (base::FilePath config_file_path = file_enumerator.Next(); |
- !config_file_path.empty(); config_file_path = file_enumerator.Next()) |
- files.insert(config_file_path); |
- |
- // Start with an empty dictionary and merge the files' contents. |
- scoped_ptr<base::DictionaryValue> policy(new base::DictionaryValue()); |
- for (std::set<base::FilePath>::iterator config_file_iter = files.begin(); |
- config_file_iter != files.end(); ++config_file_iter) { |
- JSONFileValueSerializer deserializer(*config_file_iter); |
- deserializer.set_allow_trailing_comma(true); |
- int error_code = 0; |
- std::string error_msg; |
- scoped_ptr<base::Value> value( |
- deserializer.Deserialize(&error_code, &error_msg)); |
- if (!value.get()) { |
- LOG(WARNING) << "Failed to read configuration file " |
- << config_file_iter->value() << ": " << error_msg; |
- return nullptr; |
- } |
- if (!value->IsType(base::Value::TYPE_DICTIONARY)) { |
- LOG(WARNING) << "Expected JSON dictionary in configuration file " |
- << config_file_iter->value(); |
- return nullptr; |
- } |
- policy->MergeDictionary(static_cast<base::DictionaryValue*>(value.get())); |
- } |
- |
- return policy.Pass(); |
- } |
- |
- void Reload() override { |
- DCHECK(OnPolicyWatcherThread()); |
- // Check the directory time in order to see whether a reload is required. |
- base::TimeDelta delay; |
- base::Time now = base::Time::Now(); |
- if (!IsSafeToReloadPolicy(now, &delay)) { |
- ScheduleReloadTask(delay); |
- return; |
- } |
- |
- // Check again in case the directory has changed while reading it. |
- if (!IsSafeToReloadPolicy(now, &delay)) { |
- ScheduleReloadTask(delay); |
- return; |
- } |
- |
- // Load the policy definitions. |
- scoped_ptr<base::DictionaryValue> new_policy = Load(); |
- if (new_policy.get()) { |
- UpdatePolicies(new_policy.get()); |
- ScheduleFallbackReloadTask(); |
- } else { |
- // A failure to load policy definitions is probably temporary, so try |
- // again soon. |
- SignalTransientPolicyError(); |
- ScheduleReloadTask(base::TimeDelta::FromSeconds(kSettleIntervalSeconds)); |
- } |
- } |
- |
- bool IsSafeToReloadPolicy(const base::Time& now, base::TimeDelta* delay) { |
- DCHECK(OnPolicyWatcherThread()); |
- DCHECK(delay); |
- const base::TimeDelta kSettleInterval = |
- base::TimeDelta::FromSeconds(kSettleIntervalSeconds); |
- |
- base::Time last_modification = GetLastModification(); |
- if (last_modification.is_null()) |
- return true; |
- |
- if (last_modification_file_.is_null()) |
- last_modification_file_ = last_modification; |
- |
- // If there was a change since the last recorded modification, wait some |
- // more. |
- if (last_modification != last_modification_file_) { |
- last_modification_file_ = last_modification; |
- last_modification_clock_ = now; |
- *delay = kSettleInterval; |
- return false; |
- } |
- |
- // Check whether the settle interval has elapsed. |
- base::TimeDelta age = now - last_modification_clock_; |
- if (age < kSettleInterval) { |
- *delay = kSettleInterval - age; |
- return false; |
- } |
- |
- return true; |
- } |
- |
- // Managed with a scoped_ptr rather than being declared as an inline member to |
- // decouple the watcher's life cycle from the PolicyWatcherLinux. This |
- // decoupling makes it possible to destroy the watcher before the loader's |
- // destructor is called (e.g. during Stop), since |watcher_| internally holds |
- // a reference to the loader and keeps it alive. |
- scoped_ptr<base::FilePathWatcher> watcher_; |
- |
- // Records last known modification timestamp of |config_dir_|. |
- base::Time last_modification_file_; |
- |
- // The wall clock time at which the last modification timestamp was |
- // recorded. It's better to not assume the file notification time and the |
- // wall clock times come from the same source, just in case there is some |
- // non-local filesystem involved. |
- base::Time last_modification_clock_; |
- |
- const base::FilePath config_dir_; |
- |
- // Allows us to cancel any inflight FileWatcher events or scheduled reloads. |
- base::WeakPtrFactory<PolicyWatcherLinux> weak_factory_; |
-}; |
- |
-scoped_ptr<PolicyWatcher> PolicyWatcher::Create( |
- policy::PolicyService* policy_service, |
- scoped_refptr<base::SingleThreadTaskRunner> task_runner) { |
- base::FilePath policy_dir(kPolicyDir); |
- return make_scoped_ptr(new PolicyWatcherLinux(task_runner, policy_dir)); |
-} |
- |
-} // namespace policy_hack |
-} // namespace remoting |