[go: nahoru, domu]

blob: f1f6a9cb247b7f58f1ceae2b5a9d88f2c0efaf49 [file] [log] [blame]
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROME_BROWSER_ASH_POLICY_CORE_USER_CLOUD_POLICY_MANAGER_ASH_H_
#define CHROME_BROWSER_ASH_POLICY_CORE_USER_CLOUD_POLICY_MANAGER_ASH_H_
#include <memory>
#include <string>
#include "base/files/file_path.h"
#include "base/functional/bind.h"
#include "base/memory/raw_ptr.h"
#include "base/memory/ref_counted.h"
#include "base/scoped_observation.h"
#include "base/time/time.h"
#include "base/timer/timer.h"
#include "chrome/browser/ash/policy/login/wildcard_login_checker.h"
#include "chrome/browser/profiles/profile_observer.h"
#include "components/account_id/account_id.h"
#include "components/keyed_service/core/keyed_service.h"
#include "components/keyed_service/core/keyed_service_shutdown_notifier.h"
#include "components/policy/core/common/cloud/cloud_policy_client.h"
#include "components/policy/core/common/cloud/cloud_policy_constants.h"
#include "components/policy/core/common/cloud/cloud_policy_manager.h"
#include "components/policy/core/common/cloud/cloud_policy_service.h"
#include "components/session_manager/core/session_manager_observer.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
class GoogleServiceAuthError;
class PrefService;
class Profile;
namespace base {
class SequencedTaskRunner;
}
namespace network {
class SharedURLLoaderFactory;
}
namespace enterprise_reporting {
class ReportScheduler;
}
namespace policy {
class ArcAppInstallEventLogUploader;
class CloudExternalDataManager;
class DeviceManagementService;
class PolicyOAuth2TokenFetcher;
class RemoteCommandsInvalidator;
// Implements logic for initializing user policy on Ash.
class UserCloudPolicyManagerAsh
: public CloudPolicyManager,
public CloudPolicyClient::Observer,
public CloudPolicyService::Observer,
public ProfileObserver,
public session_manager::SessionManagerObserver {
public:
// Enum describing what behavior we want to enforce here.
enum class PolicyEnforcement {
// No policy enforcement - it's OK to start the session even without a
// policy check because it has previously been established that this
// session is unmanaged.
kPolicyOptional,
// This is a managed session so require a successful policy load before
// completing profile initialization.
kPolicyRequired,
// It is unknown whether this session should be managed, so require a check
// with the policy server before initializing the profile.
kServerCheckRequired
};
// |enforcement_type| specifies what kind of policy state will be
// enforced by this object:
//
// * kPolicyOptional: The class will kick off a background policy fetch to
// detect whether the user has become managed since the last signin, but
// there's no enforcement (it's OK for the server request to fail, and the
// profile initialization is allowed to proceed immediately).
//
// * kServerCheckRequired: Profile initialization will be blocked
// (IsInitializationComplete() will return false) until we have made a
// successful call to DMServer to check for policy or loaded policy from
// cache. If this call is unsuccessful due to network/server errors, then
// |fatal_error_callback| is invoked to close the session.
//
// * kPolicyRequired: A background policy refresh will be initiated. If a
// non-zero |policy_refresh_timeout| is passed, then profile initialization
// will be blocked (IsInitializationComplete() will return false) until
// either the fetch completes or the timeout fires. |fatal_error_callback|
// will be invoked if the system could not load policy from either cache or
// the server.
//
// |account_id| is the AccountId associated with the user's session.
// |task_runner| is the runner for policy refresh tasks.
UserCloudPolicyManagerAsh(
Profile* profile,
std::unique_ptr<CloudPolicyStore> store,
std::unique_ptr<CloudExternalDataManager> external_data_manager,
const base::FilePath& component_policy_cache_path,
PolicyEnforcement enforcement_type,
PrefService* local_state,
base::TimeDelta policy_refresh_timeout,
base::OnceClosure fatal_error_callback,
const AccountId& account_id,
const scoped_refptr<base::SequencedTaskRunner>& task_runner);
UserCloudPolicyManagerAsh(const UserCloudPolicyManagerAsh&) = delete;
UserCloudPolicyManagerAsh& operator=(const UserCloudPolicyManagerAsh&) =
delete;
~UserCloudPolicyManagerAsh() override;
// Initializes the cloud connection. |local_state| and
// |device_management_service| must stay valid until this object is deleted.
void ConnectManagementService(
DeviceManagementService* device_management_service,
scoped_refptr<network::SharedURLLoaderFactory> system_url_loader_factory);
// This class is one of the policy providers, and must be ready for the
// creation of the Profile's PrefService; all the other KeyedServices depend
// on the PrefService, so this class can't depend on other
// BrowserContextKeyedServices to avoid a circular dependency. So instead of
// using the ProfileOAuth2TokenService directly to get the access token, a 3rd
// service (UserCloudPolicyTokenForwarder) will fetch it later and pass it to
// this method once available.
// UserCloudPolicyTokenForwarder will continue delivering fresh OAuth tokens
// upon expected previous token expiration if this class requires OAuth token
// to be always available (needed for child user). The |access_token| is used
// to authenticate the registration request to DMServer for all users. It is
// also used to authorize policy fetch request and status upload for child
// user.
// Note: This method will be called once for regular user and multiple times
// (periodically) for child user.
virtual void OnAccessTokenAvailable(const std::string& access_token);
// Whether OAuth2 token is required for DMServer requests (policy fetch,
// uploading status report) for child user.
bool RequiresOAuthTokenForChildUser() const;
// Indicates a wildcard login check should be performed once an access token
// is available.
void EnableWildcardLoginCheck(const std::string& username);
// Return the ArcAppInstallEventLogUploader used to send app push-install
// event logs to the policy server.
ArcAppInstallEventLogUploader* GetAppInstallEventLogUploader();
// ConfigurationPolicyProvider:
void Shutdown() override;
bool IsInitializationComplete(PolicyDomain domain) const override;
// CloudPolicyService::Observer:
void OnCloudPolicyServiceInitializationCompleted() override;
// CloudPolicyClient::Observer:
void OnPolicyFetched(CloudPolicyClient* client) override;
void OnRegistrationStateChanged(CloudPolicyClient* client) override;
void OnClientError(CloudPolicyClient* client) override;
// ComponentCloudPolicyService::Delegate:
void OnComponentCloudPolicyUpdated() override;
// CloudPolicyManager:
void OnStoreLoaded(CloudPolicyStore* cloud_policy_store) override;
// SessionManagerObserver:
void OnUserProfileLoaded(const AccountId& account_id) override;
// Helper function to force a policy fetch timeout.
void ForceTimeoutForTest();
// Sets the SharedURLLoaderFactory's that should be used for tests instead of
// retrieving one from the BrowserProcess object in FetchPolicyOAuthToken().
void SetSignInURLLoaderFactoryForTests(
scoped_refptr<network::SharedURLLoaderFactory> signin_url_loader_factory);
void SetSystemURLLoaderFactoryForTests(
scoped_refptr<network::SharedURLLoaderFactory> system_url_loader_factory);
// Set a refresh token to be used in tests instead of the user context refresh
// token when fetching the policy OAuth token.
void SetUserContextRefreshTokenForTests(const std::string& refresh_token);
// Return the ReportScheduler used to report usage data to the server.
enterprise_reporting::ReportScheduler* GetReportSchedulerForTesting();
static void EnsureFactoryBuilt();
protected:
// CloudPolicyManager:
void GetChromePolicy(PolicyMap* policy_map) override;
private:
// Sets the appropriate persistent flags to mark whether the current session
// requires policy. If |policy_required| is true, this ensures that future
// instances of this session will not start up unless a valid policy blob can
// be loaded.
void SetPolicyRequired(bool policy_required);
// Fetches a policy token using the refresh token if available, or the
// authentication context of the signin context, and calls back
// OnOAuth2PolicyTokenFetched when done.
void FetchPolicyOAuthToken();
// Called once the policy access token is available, and starts the
// registration with the policy server if the token was successfully fetched.
void OnOAuth2PolicyTokenFetched(const std::string& policy_token,
const GoogleServiceAuthError& error);
// Completion handler for the explicit policy fetch triggered on startup in
// case |waiting_for_policy_fetch_| is true. |success| is true if the
// fetch was successful.
void OnInitialPolicyFetchComplete(bool success);
// Called when |policy_refresh_timeout_| times out, to cancel the blocking
// wait for the policy refresh.
void OnPolicyRefreshTimeout();
// Called when a wildcard check has completed, to allow us to exit the session
// if required.
void OnWildcardCheckCompleted(const std::string& username,
WildcardLoginChecker::Result result);
// Cancels waiting for the initial policy fetch/refresh and flags the
// ConfigurationPolicyProvider ready (assuming all other initialization tasks
// have completed). Pass |true| and |std::string()| if policy fetch was
// successful (either because policy was successfully fetched, or if DMServer
// has notified us that the user is not managed). Otherwise, pass |false| and
// a string indicating the failure reason.
//
// Note: |failure_reason| will get passed to syslog in case of |success| being
// false. Make sure it does not contain any privacy-sensitive information.
void CancelWaitForPolicyFetch(bool success,
const std::string& failure_reason);
// Starts refresh scheduler if all the required conditions are fullfilled.
// Exits immediately if refresh scheduler is already started, so it is safe to
// call it multiple times.
void StartRefreshSchedulerIfReady();
// Starts report scheduler if all the required conditions are fulfilled.
// Exits immediately if corresponding feature flag is closed. Pass |true| to
// pend creation until all profiles are loaded in profile manager.
void StartReportSchedulerIfReady(bool enable_delayed_creation);
// ProfileObserver overrides:
void OnProfileInitializationComplete(Profile* profile) override;
// Called on profile shutdown.
void ShutdownRemoteCommands();
// Profile associated with the current user.
const raw_ptr<Profile, ExperimentalAsh> profile_;
// Owns the store, note that CloudPolicyManager just keeps a plain pointer.
std::unique_ptr<CloudPolicyStore> store_;
// Manages external data referenced by policies.
std::unique_ptr<CloudExternalDataManager> external_data_manager_;
// Helper used to send app push-install event logs to the policy server.
std::unique_ptr<ArcAppInstallEventLogUploader>
app_install_event_log_uploader_;
// Scheduler used to report usage data to DM server periodically.
std::unique_ptr<enterprise_reporting::ReportScheduler> report_scheduler_;
// Username for the wildcard login check if applicable, empty otherwise.
std::string wildcard_username_;
// Path where policy for components will be cached.
base::FilePath component_policy_cache_path_;
// Whether we're waiting for a policy fetch to complete before reporting
// IsInitializationComplete().
bool waiting_for_policy_fetch_ = false;
// What kind of enforcement we need to implement.
PolicyEnforcement enforcement_type_;
// A timer that puts a hard limit on the maximum time to wait for a policy
// refresh.
base::OneShotTimer policy_refresh_timeout_;
// The pref service to pass to the refresh scheduler on initialization.
base::raw_ptr<PrefService> local_state_ = nullptr;
// Used to fetch the policy OAuth token, when necessary. This object holds
// a callback with an unretained reference to the manager, when it exists.
std::unique_ptr<PolicyOAuth2TokenFetcher> token_fetcher_;
// Keeps alive the wildcard checker while its running.
std::unique_ptr<WildcardLoginChecker> wildcard_login_checker_;
// The access token passed to OnAccessTokenAvailable. It is stored here so
// that it can be used if OnCloudPolicyServiceInitializationCompleted is
// called later.
std::string access_token_;
// The AccountId associated with the user whose policy is being loaded.
const AccountId account_id_;
// The callback to invoke if the user session should be shutdown. This is
// injected in the constructor to make it easier to write tests.
base::OnceClosure fatal_error_callback_;
// Invalidator used for remote commands to be delivered to this user.
std::unique_ptr<RemoteCommandsInvalidator> invalidator_;
// Listening to notification that profile is destroyed.
base::CallbackListSubscription shutdown_subscription_;
// The SharedURLLoaderFactory used in some tests to simulate network requests.
scoped_refptr<network::SharedURLLoaderFactory>
system_url_loader_factory_for_tests_;
scoped_refptr<network::SharedURLLoaderFactory>
signin_url_loader_factory_for_tests_;
base::ScopedObservation<Profile, ProfileObserver> observed_profile_{this};
// Refresh token used in tests instead of the user context refresh token to
// fetch the policy OAuth token.
absl::optional<std::string> user_context_refresh_token_for_tests_;
// Used to track the reregistration state of the CloudPolicyClient, i.e.
// whether this class has triggered a re-registration after the client failed
// to load policy with error |DM_STATUS_SERVICE_DEVICE_NOT_FOUND|.
bool is_in_reregistration_state_ = false;
};
} // namespace policy
#endif // CHROME_BROWSER_ASH_POLICY_CORE_USER_CLOUD_POLICY_MANAGER_ASH_H_