network_ui_data.cc revision c2e0dbddbe15c98d52c4786dac06cb8952a8ae6d
1// Copyright (c) 2012 The Chromium Authors. All rights reserved. 2// Use of this source code is governed by a BSD-style license that can be 3// found in the LICENSE file. 4 5#include "chromeos/network/network_ui_data.h" 6 7#include "base/logging.h" 8#include "base/values.h" 9#include "chromeos/network/onc/onc_signature.h" 10 11namespace chromeos { 12 13// Top-level UI data dictionary keys. 14const char NetworkUIData::kKeyONCSource[] = "onc_source"; 15const char NetworkUIData::kKeyCertificatePattern[] = "certificate_pattern"; 16const char NetworkUIData::kKeyCertificateType[] = "certificate_type"; 17const char NetworkUIData::kKeyUserSettings[] = "user_settings"; 18 19namespace { 20 21template <typename Enum> 22struct StringEnumEntry { 23 const char* string; 24 Enum enum_value; 25}; 26 27const StringEnumEntry<onc::ONCSource> kONCSourceTable[] = { 28 { "user_import", onc::ONC_SOURCE_USER_IMPORT }, 29 { "device_policy", onc::ONC_SOURCE_DEVICE_POLICY }, 30 { "user_policy", onc::ONC_SOURCE_USER_POLICY } 31}; 32 33const StringEnumEntry<ClientCertType> kClientCertTable[] = { 34 { "none", CLIENT_CERT_TYPE_NONE }, 35 { "pattern", CLIENT_CERT_TYPE_PATTERN }, 36 { "ref", CLIENT_CERT_TYPE_REF } 37}; 38 39// Converts |enum_value| to the corresponding string according to |table|. If no 40// enum value of the table matches (which can only occur if incorrect casting 41// was used to obtain |enum_value|), returns an empty string instead. 42template <typename Enum, int N> 43std::string EnumToString(const StringEnumEntry<Enum>(& table)[N], 44 Enum enum_value) { 45 for (int i = 0; i < N; ++i) { 46 if (table[i].enum_value == enum_value) 47 return table[i].string; 48 } 49 return std::string(); 50} 51 52// Converts |str| to the corresponding enum value according to |table|. If no 53// string of the table matches, returns |fallback| instead. 54template<typename Enum, int N> 55Enum StringToEnum(const StringEnumEntry<Enum>(& table)[N], 56 const std::string& str, 57 Enum fallback) { 58 for (int i = 0; i < N; ++i) { 59 if (table[i].string == str) 60 return table[i].enum_value; 61 } 62 return fallback; 63} 64 65} // namespace 66 67NetworkUIData::NetworkUIData() 68 : onc_source_(onc::ONC_SOURCE_NONE), 69 certificate_type_(CLIENT_CERT_TYPE_NONE) { 70} 71 72NetworkUIData::NetworkUIData(const NetworkUIData& other) { 73 *this = other; 74} 75 76NetworkUIData& NetworkUIData::operator=(const NetworkUIData& other) { 77 certificate_pattern_ = other.certificate_pattern_; 78 onc_source_ = other.onc_source_; 79 certificate_type_ = other.certificate_type_; 80 if (other.user_settings_) 81 user_settings_.reset(other.user_settings_->DeepCopy()); 82 policy_guid_ = other.policy_guid_; 83 return *this; 84} 85 86NetworkUIData::NetworkUIData(const DictionaryValue& dict) { 87 std::string source; 88 dict.GetString(kKeyONCSource, &source); 89 onc_source_ = StringToEnum(kONCSourceTable, source, onc::ONC_SOURCE_NONE); 90 91 std::string type_string; 92 dict.GetString(kKeyCertificateType, &type_string); 93 certificate_type_ = 94 StringToEnum(kClientCertTable, type_string, CLIENT_CERT_TYPE_NONE); 95 96 if (certificate_type_ == CLIENT_CERT_TYPE_PATTERN) { 97 const DictionaryValue* cert_dict = NULL; 98 dict.GetDictionary(kKeyCertificatePattern, &cert_dict); 99 if (cert_dict) 100 certificate_pattern_.CopyFromDictionary(*cert_dict); 101 if (certificate_pattern_.Empty()) { 102 LOG(ERROR) << "Couldn't parse a valid certificate pattern."; 103 certificate_type_ = CLIENT_CERT_TYPE_NONE; 104 } 105 } 106 107 const DictionaryValue* user_settings = NULL; 108 if (dict.GetDictionary(kKeyUserSettings, &user_settings)) 109 user_settings_.reset(user_settings->DeepCopy()); 110} 111 112NetworkUIData::~NetworkUIData() { 113} 114 115void NetworkUIData::FillDictionary(base::DictionaryValue* dict) const { 116 dict->Clear(); 117 118 std::string source_string = EnumToString(kONCSourceTable, onc_source_); 119 if (!source_string.empty()) 120 dict->SetString(kKeyONCSource, source_string); 121 122 if (certificate_type_ != CLIENT_CERT_TYPE_NONE) { 123 std::string type_string = EnumToString(kClientCertTable, certificate_type_); 124 dict->SetString(kKeyCertificateType, type_string); 125 126 if (certificate_type_ == CLIENT_CERT_TYPE_PATTERN && 127 !certificate_pattern_.Empty()) { 128 dict->Set(kKeyCertificatePattern, 129 certificate_pattern_.CreateAsDictionary()); 130 } 131 } 132 if (user_settings_) 133 dict->SetWithoutPathExpansion(kKeyUserSettings, 134 user_settings_->DeepCopy()); 135} 136 137namespace { 138 139void TranslateClientCertType(const std::string& client_cert_type, 140 NetworkUIData* ui_data) { 141 using namespace onc::certificate; 142 ClientCertType type; 143 if (client_cert_type == kNone) { 144 type = CLIENT_CERT_TYPE_NONE; 145 } else if (client_cert_type == kRef) { 146 type = CLIENT_CERT_TYPE_REF; 147 } else if (client_cert_type == kPattern) { 148 type = CLIENT_CERT_TYPE_PATTERN; 149 } else { 150 type = CLIENT_CERT_TYPE_NONE; 151 NOTREACHED(); 152 } 153 154 ui_data->set_certificate_type(type); 155} 156 157void TranslateCertificatePattern(const base::DictionaryValue& onc_object, 158 NetworkUIData* ui_data) { 159 CertificatePattern pattern; 160 bool success = pattern.CopyFromDictionary(onc_object); 161 DCHECK(success); 162 ui_data->set_certificate_pattern(pattern); 163} 164 165void TranslateEAP(const base::DictionaryValue& eap, 166 NetworkUIData* ui_data) { 167 std::string client_cert_type; 168 if (eap.GetStringWithoutPathExpansion(onc::eap::kClientCertType, 169 &client_cert_type)) { 170 TranslateClientCertType(client_cert_type, ui_data); 171 } 172} 173 174void TranslateIPsec(const base::DictionaryValue& ipsec, 175 NetworkUIData* ui_data) { 176 std::string client_cert_type; 177 if (ipsec.GetStringWithoutPathExpansion(onc::vpn::kClientCertType, 178 &client_cert_type)) { 179 TranslateClientCertType(client_cert_type, ui_data); 180 } 181} 182 183void TranslateOpenVPN(const base::DictionaryValue& openvpn, 184 NetworkUIData* ui_data) { 185 std::string client_cert_type; 186 if (openvpn.GetStringWithoutPathExpansion(onc::vpn::kClientCertType, 187 &client_cert_type)) { 188 TranslateClientCertType(client_cert_type, ui_data); 189 } 190} 191 192void TranslateONCHierarchy(const onc::OncValueSignature& signature, 193 const base::DictionaryValue& onc_object, 194 NetworkUIData* ui_data) { 195 if (&signature == &onc::kCertificatePatternSignature) 196 TranslateCertificatePattern(onc_object, ui_data); 197 else if (&signature == &onc::kEAPSignature) 198 TranslateEAP(onc_object, ui_data); 199 else if (&signature == &onc::kIPsecSignature) 200 TranslateIPsec(onc_object, ui_data); 201 else if (&signature == &onc::kOpenVPNSignature) 202 TranslateOpenVPN(onc_object, ui_data); 203 204 // Recurse into nested objects. 205 for (base::DictionaryValue::Iterator it(onc_object); !it.IsAtEnd(); 206 it.Advance()) { 207 const base::DictionaryValue* inner_object; 208 if (!it.value().GetAsDictionary(&inner_object)) 209 continue; 210 211 const onc::OncFieldSignature* field_signature = 212 GetFieldSignature(signature, it.key()); 213 214 TranslateONCHierarchy(*field_signature->value_signature, *inner_object, 215 ui_data); 216 } 217} 218 219} // namespace 220 221scoped_ptr<NetworkUIData> CreateUIDataFromONC( 222 onc::ONCSource onc_source, 223 const base::DictionaryValue& onc_network) { 224 scoped_ptr<NetworkUIData> ui_data(new NetworkUIData()); 225 TranslateONCHierarchy(onc::kNetworkConfigurationSignature, onc_network, 226 ui_data.get()); 227 228 ui_data->set_onc_source(onc_source); 229 230 return ui_data.Pass(); 231} 232 233} // namespace chromeos 234