session_manager_operation.cc revision 8bcbed890bc3ce4d7a057a8f32cab53fa534672e
1// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "chrome/browser/chromeos/settings/session_manager_operation.h"
6
7#include "base/bind.h"
8#include "base/bind_helpers.h"
9#include "base/files/file_path.h"
10#include "base/message_loop/message_loop.h"
11#include "base/stl_util.h"
12#include "base/task_runner_util.h"
13#include "base/threading/sequenced_worker_pool.h"
14#include "base/time/time.h"
15#include "chrome/browser/chromeos/settings/owner_key_util.h"
16#include "chrome/browser/policy/cloud/cloud_policy_constants.h"
17#include "chrome/browser/policy/proto/chromeos/chrome_device_policy.pb.h"
18#include "chrome/browser/policy/proto/cloud/device_management_backend.pb.h"
19#include "content/public/browser/browser_thread.h"
20#include "crypto/rsa_private_key.h"
21#include "crypto/signature_creator.h"
22
23namespace em = enterprise_management;
24
25namespace chromeos {
26
27SessionManagerOperation::SessionManagerOperation(const Callback& callback)
28    : session_manager_client_(NULL),
29      weak_factory_(this),
30      callback_(callback),
31      force_key_load_(false),
32      is_loading_(false) {}
33
34SessionManagerOperation::~SessionManagerOperation() {}
35
36void SessionManagerOperation::Start(
37    SessionManagerClient* session_manager_client,
38    scoped_refptr<OwnerKeyUtil> owner_key_util,
39    scoped_refptr<OwnerKey> owner_key) {
40  session_manager_client_ = session_manager_client;
41  owner_key_util_ = owner_key_util;
42  owner_key_ = owner_key;
43  Run();
44}
45
46void SessionManagerOperation::RestartLoad(bool key_changed) {
47  if (key_changed)
48    owner_key_ = NULL;
49
50  if (!is_loading_)
51    return;
52
53  // Abort previous load operations.
54  weak_factory_.InvalidateWeakPtrs();
55  StartLoading();
56}
57
58void SessionManagerOperation::StartLoading() {
59  is_loading_ = true;
60  EnsureOwnerKey(base::Bind(&SessionManagerOperation::RetrieveDeviceSettings,
61                            weak_factory_.GetWeakPtr()));
62}
63
64void SessionManagerOperation::ReportResult(
65    DeviceSettingsService::Status status) {
66  callback_.Run(this, status);
67}
68
69void SessionManagerOperation::EnsureOwnerKey(const base::Closure& callback) {
70  if (force_key_load_ || !owner_key_.get() || !owner_key_->public_key()) {
71    base::PostTaskAndReplyWithResult(
72        content::BrowserThread::GetBlockingPool(),
73        FROM_HERE,
74        base::Bind(&SessionManagerOperation::LoadOwnerKey,
75                   owner_key_util_, owner_key_),
76        base::Bind(&SessionManagerOperation::StoreOwnerKey,
77                   weak_factory_.GetWeakPtr(), callback));
78  } else {
79    callback.Run();
80  }
81}
82
83// static
84scoped_refptr<OwnerKey> SessionManagerOperation::LoadOwnerKey(
85    scoped_refptr<OwnerKeyUtil> util,
86    scoped_refptr<OwnerKey> current_key) {
87  scoped_ptr<std::vector<uint8> > public_key;
88  scoped_ptr<crypto::RSAPrivateKey> private_key;
89
90  // Keep any already-existing keys.
91  if (current_key.get()) {
92    if (current_key->public_key())
93      public_key.reset(new std::vector<uint8>(*current_key->public_key()));
94    if (current_key->private_key())
95      private_key.reset(current_key->private_key()->Copy());
96  }
97
98  if (!public_key.get() && util->IsPublicKeyPresent()) {
99    public_key.reset(new std::vector<uint8>());
100    if (!util->ImportPublicKey(public_key.get()))
101      LOG(ERROR) << "Failed to load public owner key.";
102  }
103
104  if (public_key.get() && !private_key.get()) {
105    private_key.reset(util->FindPrivateKey(*public_key));
106    if (!private_key.get())
107      VLOG(1) << "Failed to load private owner key.";
108  }
109
110  return new OwnerKey(public_key.Pass(), private_key.Pass());
111}
112
113void SessionManagerOperation::StoreOwnerKey(const base::Closure& callback,
114                                            scoped_refptr<OwnerKey> new_key) {
115  force_key_load_ = false;
116  owner_key_ = new_key;
117
118  if (!owner_key_.get() || !owner_key_->public_key()) {
119    ReportResult(DeviceSettingsService::STORE_KEY_UNAVAILABLE);
120    return;
121  }
122
123  callback.Run();
124}
125
126void SessionManagerOperation::RetrieveDeviceSettings() {
127  session_manager_client()->RetrieveDevicePolicy(
128      base::Bind(&SessionManagerOperation::ValidateDeviceSettings,
129                 weak_factory_.GetWeakPtr()));
130}
131
132void SessionManagerOperation::ValidateDeviceSettings(
133    const std::string& policy_blob) {
134  scoped_ptr<em::PolicyFetchResponse> policy(new em::PolicyFetchResponse());
135  if (policy_blob.empty()) {
136    ReportResult(DeviceSettingsService::STORE_NO_POLICY);
137    return;
138  }
139
140  if (!policy->ParseFromString(policy_blob) ||
141      !policy->IsInitialized()) {
142    ReportResult(DeviceSettingsService::STORE_INVALID_POLICY);
143    return;
144  }
145
146  base::SequencedWorkerPool* pool =
147      content::BrowserThread::GetBlockingPool();
148  scoped_refptr<base::SequencedTaskRunner> background_task_runner =
149      pool->GetSequencedTaskRunnerWithShutdownBehavior(
150          pool->GetSequenceToken(),
151          base::SequencedWorkerPool::SKIP_ON_SHUTDOWN);
152
153  policy::DeviceCloudPolicyValidator* validator =
154      policy::DeviceCloudPolicyValidator::Create(policy.Pass(),
155                                                 background_task_runner);
156
157  // Policy auto-generated by session manager doesn't include a timestamp, so we
158  // need to allow missing timestamps.
159  const bool require_timestamp =
160      policy_data_.get() && policy_data_->has_request_token();
161  validator->ValidateAgainstCurrentPolicy(
162      policy_data_.get(),
163      require_timestamp ?
164          policy::CloudPolicyValidatorBase::TIMESTAMP_REQUIRED :
165          policy::CloudPolicyValidatorBase::TIMESTAMP_NOT_REQUIRED,
166      policy::CloudPolicyValidatorBase::DM_TOKEN_NOT_REQUIRED);
167  validator->ValidatePolicyType(policy::dm_protocol::kChromeDevicePolicyType);
168  validator->ValidatePayload();
169  validator->ValidateSignature(*owner_key_->public_key(), false);
170  validator->StartValidation(
171      base::Bind(&SessionManagerOperation::ReportValidatorStatus,
172                 weak_factory_.GetWeakPtr()));
173}
174
175void SessionManagerOperation::ReportValidatorStatus(
176    policy::DeviceCloudPolicyValidator* validator) {
177  DeviceSettingsService::Status status =
178      DeviceSettingsService::STORE_VALIDATION_ERROR;
179  if (validator->success()) {
180    status = DeviceSettingsService::STORE_SUCCESS;
181    policy_data_ = validator->policy_data().Pass();
182    device_settings_ = validator->payload().Pass();
183  } else {
184    LOG(ERROR) << "Policy validation failed: " << validator->status();
185
186    // Those are mostly caused by RTC loss and are recoverable.
187    if (validator->status() ==
188        policy::DeviceCloudPolicyValidator::VALIDATION_BAD_TIMESTAMP) {
189      status = DeviceSettingsService::STORE_TEMP_VALIDATION_ERROR;
190    }
191  }
192
193  ReportResult(status);
194}
195
196LoadSettingsOperation::LoadSettingsOperation(const Callback& callback)
197    : SessionManagerOperation(callback) {}
198
199LoadSettingsOperation::~LoadSettingsOperation() {}
200
201void LoadSettingsOperation::Run() {
202  StartLoading();
203}
204
205StoreSettingsOperation::StoreSettingsOperation(
206    const Callback& callback,
207    scoped_ptr<em::PolicyFetchResponse> policy)
208    : SessionManagerOperation(callback),
209      policy_(policy.Pass()),
210      weak_factory_(this) {}
211
212StoreSettingsOperation::~StoreSettingsOperation() {}
213
214void StoreSettingsOperation::Run() {
215  session_manager_client()->StoreDevicePolicy(
216      policy_->SerializeAsString(),
217      base::Bind(&StoreSettingsOperation::HandleStoreResult,
218                 weak_factory_.GetWeakPtr()));
219}
220
221void StoreSettingsOperation::HandleStoreResult(bool success) {
222  if (!success)
223    ReportResult(DeviceSettingsService::STORE_OPERATION_FAILED);
224  else
225    StartLoading();
226}
227
228SignAndStoreSettingsOperation::SignAndStoreSettingsOperation(
229    const Callback& callback,
230    scoped_ptr<em::ChromeDeviceSettingsProto> new_settings,
231    const std::string& username)
232    : SessionManagerOperation(callback),
233      new_settings_(new_settings.Pass()),
234      username_(username),
235      weak_factory_(this) {
236  DCHECK(new_settings_.get());
237}
238
239SignAndStoreSettingsOperation::~SignAndStoreSettingsOperation() {}
240
241void SignAndStoreSettingsOperation::Run() {
242  EnsureOwnerKey(base::Bind(&SignAndStoreSettingsOperation::StartSigning,
243                            weak_factory_.GetWeakPtr()));
244}
245
246void SignAndStoreSettingsOperation::StartSigning() {
247  if (!owner_key().get() || !owner_key()->private_key() || username_.empty()) {
248    ReportResult(DeviceSettingsService::STORE_KEY_UNAVAILABLE);
249    return;
250  }
251
252  base::PostTaskAndReplyWithResult(
253      content::BrowserThread::GetBlockingPool(),
254      FROM_HERE,
255      base::Bind(&SignAndStoreSettingsOperation::AssembleAndSignPolicy,
256                 base::Passed(&new_settings_), username_, owner_key()),
257      base::Bind(&SignAndStoreSettingsOperation::StoreDeviceSettingsBlob,
258                 weak_factory_.GetWeakPtr()));
259}
260
261// static
262std::string SignAndStoreSettingsOperation::AssembleAndSignPolicy(
263    scoped_ptr<em::ChromeDeviceSettingsProto> device_settings,
264    const std::string& username,
265    scoped_refptr<OwnerKey> owner_key) {
266  // Assemble the policy.
267  em::PolicyFetchResponse policy_response;
268  em::PolicyData policy;
269  policy.set_policy_type(policy::dm_protocol::kChromeDevicePolicyType);
270  policy.set_timestamp((base::Time::NowFromSystemTime() -
271                        base::Time::UnixEpoch()).InMilliseconds());
272  policy.set_username(username);
273  if (!device_settings->SerializeToString(policy.mutable_policy_value()) ||
274      !policy.SerializeToString(policy_response.mutable_policy_data())) {
275    LOG(ERROR) << "Failed to encode policy payload.";
276    return std::string();
277  }
278
279  // Generate the signature.
280  scoped_ptr<crypto::SignatureCreator> signature_creator(
281      crypto::SignatureCreator::Create(owner_key->private_key()));
282  signature_creator->Update(
283      reinterpret_cast<const uint8*>(policy_response.policy_data().c_str()),
284      policy_response.policy_data().size());
285  std::vector<uint8> signature_bytes;
286  std::string policy_blob;
287  if (!signature_creator->Final(&signature_bytes)) {
288    LOG(ERROR) << "Failed to create policy signature.";
289    return std::string();
290  }
291
292  policy_response.mutable_policy_data_signature()->assign(
293      reinterpret_cast<const char*>(vector_as_array(&signature_bytes)),
294      signature_bytes.size());
295  return policy_response.SerializeAsString();
296}
297
298void SignAndStoreSettingsOperation::StoreDeviceSettingsBlob(
299    std::string device_settings_blob) {
300  if (device_settings_blob.empty()) {
301    ReportResult(DeviceSettingsService::STORE_POLICY_ERROR);
302    return;
303  }
304
305  session_manager_client()->StoreDevicePolicy(
306      device_settings_blob,
307      base::Bind(&SignAndStoreSettingsOperation::HandleStoreResult,
308                 weak_factory_.GetWeakPtr()));
309}
310
311void SignAndStoreSettingsOperation::HandleStoreResult(bool success) {
312  if (!success)
313    ReportResult(DeviceSettingsService::STORE_OPERATION_FAILED);
314  else
315    StartLoading();
316}
317
318}  // namespace chromeos
319