session_manager_operation.cc revision 5d1f7b1de12d16ceb2c938c56701a3e8bfa558f7
1// Copyright (c) 2012 The Chromium Authors. All rights reserved. 2// Use of this source code is governed by a BSD-style license that can be 3// found in the LICENSE file. 4 5#include "chrome/browser/chromeos/settings/session_manager_operation.h" 6 7#include "base/bind.h" 8#include "base/bind_helpers.h" 9#include "base/files/file_path.h" 10#include "base/message_loop/message_loop.h" 11#include "base/stl_util.h" 12#include "base/task_runner_util.h" 13#include "base/threading/sequenced_worker_pool.h" 14#include "base/time/time.h" 15#include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" 16#include "chrome/browser/chromeos/settings/owner_key_util.h" 17#include "components/policy/core/common/cloud/cloud_policy_constants.h" 18#include "content/public/browser/browser_thread.h" 19#include "crypto/rsa_private_key.h" 20#include "crypto/signature_creator.h" 21#include "policy/proto/device_management_backend.pb.h" 22 23namespace em = enterprise_management; 24 25namespace chromeos { 26 27SessionManagerOperation::SessionManagerOperation(const Callback& callback) 28 : session_manager_client_(NULL), 29 weak_factory_(this), 30 callback_(callback), 31 force_key_load_(false), 32 is_loading_(false) {} 33 34SessionManagerOperation::~SessionManagerOperation() {} 35 36void SessionManagerOperation::Start( 37 SessionManagerClient* session_manager_client, 38 scoped_refptr<OwnerKeyUtil> owner_key_util, 39 scoped_refptr<OwnerKey> owner_key) { 40 session_manager_client_ = session_manager_client; 41 owner_key_util_ = owner_key_util; 42 owner_key_ = owner_key; 43 Run(); 44} 45 46void SessionManagerOperation::RestartLoad(bool key_changed) { 47 if (key_changed) 48 owner_key_ = NULL; 49 50 if (!is_loading_) 51 return; 52 53 // Abort previous load operations. 54 weak_factory_.InvalidateWeakPtrs(); 55 // Mark as not loading to start loading again. 56 is_loading_ = false; 57 StartLoading(); 58} 59 60void SessionManagerOperation::StartLoading() { 61 if (is_loading_) 62 return; 63 is_loading_ = true; 64 EnsureOwnerKey(base::Bind(&SessionManagerOperation::RetrieveDeviceSettings, 65 weak_factory_.GetWeakPtr())); 66} 67 68void SessionManagerOperation::ReportResult( 69 DeviceSettingsService::Status status) { 70 callback_.Run(this, status); 71} 72 73void SessionManagerOperation::EnsureOwnerKey(const base::Closure& callback) { 74 if (force_key_load_ || !owner_key_.get() || !owner_key_->public_key()) { 75 scoped_refptr<base::TaskRunner> task_runner = 76 content::BrowserThread::GetBlockingPool()-> 77 GetTaskRunnerWithShutdownBehavior( 78 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN); 79 base::PostTaskAndReplyWithResult( 80 task_runner.get(), 81 FROM_HERE, 82 base::Bind(&SessionManagerOperation::LoadOwnerKey, 83 owner_key_util_, owner_key_), 84 base::Bind(&SessionManagerOperation::StoreOwnerKey, 85 weak_factory_.GetWeakPtr(), callback)); 86 } else { 87 callback.Run(); 88 } 89} 90 91// static 92scoped_refptr<OwnerKey> SessionManagerOperation::LoadOwnerKey( 93 scoped_refptr<OwnerKeyUtil> util, 94 scoped_refptr<OwnerKey> current_key) { 95 scoped_ptr<std::vector<uint8> > public_key; 96 scoped_ptr<crypto::RSAPrivateKey> private_key; 97 98 // Keep any already-existing keys. 99 if (current_key.get()) { 100 if (current_key->public_key()) 101 public_key.reset(new std::vector<uint8>(*current_key->public_key())); 102 if (current_key->private_key()) 103 private_key.reset(current_key->private_key()->Copy()); 104 } 105 106 if (!public_key.get() && util->IsPublicKeyPresent()) { 107 public_key.reset(new std::vector<uint8>()); 108 if (!util->ImportPublicKey(public_key.get())) 109 LOG(ERROR) << "Failed to load public owner key."; 110 } 111 112 if (public_key.get() && !private_key.get()) { 113 private_key.reset(util->FindPrivateKey(*public_key)); 114 if (!private_key.get()) 115 VLOG(1) << "Failed to load private owner key."; 116 } 117 118 return new OwnerKey(public_key.Pass(), private_key.Pass()); 119} 120 121void SessionManagerOperation::StoreOwnerKey(const base::Closure& callback, 122 scoped_refptr<OwnerKey> new_key) { 123 force_key_load_ = false; 124 owner_key_ = new_key; 125 126 if (!owner_key_.get() || !owner_key_->public_key()) { 127 ReportResult(DeviceSettingsService::STORE_KEY_UNAVAILABLE); 128 return; 129 } 130 131 callback.Run(); 132} 133 134void SessionManagerOperation::RetrieveDeviceSettings() { 135 session_manager_client()->RetrieveDevicePolicy( 136 base::Bind(&SessionManagerOperation::ValidateDeviceSettings, 137 weak_factory_.GetWeakPtr())); 138} 139 140void SessionManagerOperation::ValidateDeviceSettings( 141 const std::string& policy_blob) { 142 scoped_ptr<em::PolicyFetchResponse> policy(new em::PolicyFetchResponse()); 143 if (policy_blob.empty()) { 144 ReportResult(DeviceSettingsService::STORE_NO_POLICY); 145 return; 146 } 147 148 if (!policy->ParseFromString(policy_blob) || 149 !policy->IsInitialized()) { 150 ReportResult(DeviceSettingsService::STORE_INVALID_POLICY); 151 return; 152 } 153 154 base::SequencedWorkerPool* pool = 155 content::BrowserThread::GetBlockingPool(); 156 scoped_refptr<base::SequencedTaskRunner> background_task_runner = 157 pool->GetSequencedTaskRunnerWithShutdownBehavior( 158 pool->GetSequenceToken(), 159 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN); 160 161 policy::DeviceCloudPolicyValidator* validator = 162 policy::DeviceCloudPolicyValidator::Create(policy.Pass(), 163 background_task_runner); 164 165 166 // Policy auto-generated by session manager doesn't include a timestamp, so 167 // the timestamp shouldn't be verified in that case. 168 // 169 // Additionally, offline devices can get their clock set backwards in time 170 // under some hardware conditions; checking the timestamp now could likely 171 // find a value in the future, and prevent the user from signing-in or 172 // starting guest mode. Tlsdate will eventually fix the clock when the device 173 // is back online, but the network configuration may come from device ONC. 174 // 175 // To prevent all of these issues the timestamp is just not verified when 176 // loading the device policy from the cache. Note that the timestamp is still 177 // verified during enrollment and when a new policy is fetched from the 178 // server. 179 validator->ValidateAgainstCurrentPolicy( 180 policy_data_.get(), 181 policy::CloudPolicyValidatorBase::TIMESTAMP_NOT_REQUIRED, 182 policy::CloudPolicyValidatorBase::DM_TOKEN_NOT_REQUIRED); 183 validator->ValidatePolicyType(policy::dm_protocol::kChromeDevicePolicyType); 184 validator->ValidatePayload(); 185 // We don't check the DMServer verification key below, because the signing 186 // key is validated when it is installed. 187 validator->ValidateSignature(owner_key_->public_key_as_string(), 188 std::string(), // No key validation check. 189 std::string(), 190 false); 191 validator->StartValidation( 192 base::Bind(&SessionManagerOperation::ReportValidatorStatus, 193 weak_factory_.GetWeakPtr())); 194} 195 196void SessionManagerOperation::ReportValidatorStatus( 197 policy::DeviceCloudPolicyValidator* validator) { 198 DeviceSettingsService::Status status = 199 DeviceSettingsService::STORE_VALIDATION_ERROR; 200 if (validator->success()) { 201 status = DeviceSettingsService::STORE_SUCCESS; 202 policy_data_ = validator->policy_data().Pass(); 203 device_settings_ = validator->payload().Pass(); 204 } else { 205 LOG(ERROR) << "Policy validation failed: " << validator->status(); 206 207 // Those are mostly caused by RTC loss and are recoverable. 208 if (validator->status() == 209 policy::DeviceCloudPolicyValidator::VALIDATION_BAD_TIMESTAMP) { 210 status = DeviceSettingsService::STORE_TEMP_VALIDATION_ERROR; 211 } 212 } 213 214 ReportResult(status); 215} 216 217LoadSettingsOperation::LoadSettingsOperation(const Callback& callback) 218 : SessionManagerOperation(callback) {} 219 220LoadSettingsOperation::~LoadSettingsOperation() {} 221 222void LoadSettingsOperation::Run() { 223 StartLoading(); 224} 225 226StoreSettingsOperation::StoreSettingsOperation( 227 const Callback& callback, 228 scoped_ptr<em::PolicyFetchResponse> policy) 229 : SessionManagerOperation(callback), 230 policy_(policy.Pass()), 231 weak_factory_(this) {} 232 233StoreSettingsOperation::~StoreSettingsOperation() {} 234 235void StoreSettingsOperation::Run() { 236 session_manager_client()->StoreDevicePolicy( 237 policy_->SerializeAsString(), 238 base::Bind(&StoreSettingsOperation::HandleStoreResult, 239 weak_factory_.GetWeakPtr())); 240} 241 242void StoreSettingsOperation::HandleStoreResult(bool success) { 243 if (!success) 244 ReportResult(DeviceSettingsService::STORE_OPERATION_FAILED); 245 else 246 StartLoading(); 247} 248 249SignAndStoreSettingsOperation::SignAndStoreSettingsOperation( 250 const Callback& callback, 251 scoped_ptr<em::ChromeDeviceSettingsProto> new_settings, 252 const std::string& username) 253 : SessionManagerOperation(callback), 254 new_settings_(new_settings.Pass()), 255 username_(username), 256 weak_factory_(this) { 257 DCHECK(new_settings_.get()); 258} 259 260SignAndStoreSettingsOperation::~SignAndStoreSettingsOperation() {} 261 262void SignAndStoreSettingsOperation::Run() { 263 EnsureOwnerKey(base::Bind(&SignAndStoreSettingsOperation::StartSigning, 264 weak_factory_.GetWeakPtr())); 265} 266 267void SignAndStoreSettingsOperation::StartSigning() { 268 if (!owner_key().get() || !owner_key()->private_key() || username_.empty()) { 269 ReportResult(DeviceSettingsService::STORE_KEY_UNAVAILABLE); 270 return; 271 } 272 273 base::PostTaskAndReplyWithResult( 274 content::BrowserThread::GetBlockingPool(), 275 FROM_HERE, 276 base::Bind(&SignAndStoreSettingsOperation::AssembleAndSignPolicy, 277 base::Passed(&new_settings_), username_, owner_key()), 278 base::Bind(&SignAndStoreSettingsOperation::StoreDeviceSettingsBlob, 279 weak_factory_.GetWeakPtr())); 280} 281 282// static 283std::string SignAndStoreSettingsOperation::AssembleAndSignPolicy( 284 scoped_ptr<em::ChromeDeviceSettingsProto> device_settings, 285 const std::string& username, 286 scoped_refptr<OwnerKey> owner_key) { 287 // Assemble the policy. 288 em::PolicyFetchResponse policy_response; 289 em::PolicyData policy; 290 policy.set_policy_type(policy::dm_protocol::kChromeDevicePolicyType); 291 policy.set_timestamp((base::Time::NowFromSystemTime() - 292 base::Time::UnixEpoch()).InMilliseconds()); 293 policy.set_username(username); 294 if (!device_settings->SerializeToString(policy.mutable_policy_value()) || 295 !policy.SerializeToString(policy_response.mutable_policy_data())) { 296 LOG(ERROR) << "Failed to encode policy payload."; 297 return std::string(); 298 } 299 300 // Generate the signature. 301 scoped_ptr<crypto::SignatureCreator> signature_creator( 302 crypto::SignatureCreator::Create(owner_key->private_key())); 303 signature_creator->Update( 304 reinterpret_cast<const uint8*>(policy_response.policy_data().c_str()), 305 policy_response.policy_data().size()); 306 std::vector<uint8> signature_bytes; 307 std::string policy_blob; 308 if (!signature_creator->Final(&signature_bytes)) { 309 LOG(ERROR) << "Failed to create policy signature."; 310 return std::string(); 311 } 312 313 policy_response.mutable_policy_data_signature()->assign( 314 reinterpret_cast<const char*>(vector_as_array(&signature_bytes)), 315 signature_bytes.size()); 316 return policy_response.SerializeAsString(); 317} 318 319void SignAndStoreSettingsOperation::StoreDeviceSettingsBlob( 320 std::string device_settings_blob) { 321 if (device_settings_blob.empty()) { 322 ReportResult(DeviceSettingsService::STORE_POLICY_ERROR); 323 return; 324 } 325 326 session_manager_client()->StoreDevicePolicy( 327 device_settings_blob, 328 base::Bind(&SignAndStoreSettingsOperation::HandleStoreResult, 329 weak_factory_.GetWeakPtr())); 330} 331 332void SignAndStoreSettingsOperation::HandleStoreResult(bool success) { 333 if (!success) 334 ReportResult(DeviceSettingsService::STORE_OPERATION_FAILED); 335 else 336 StartLoading(); 337} 338 339} // namespace chromeos 340