Home | History | Annotate | Download | only in policy
      1 // Copyright 2013 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "chrome/browser/chromeos/policy/policy_cert_service.h"
      6 
      7 #include "base/bind.h"
      8 #include "base/bind_helpers.h"
      9 #include "base/logging.h"
     10 #include "chrome/browser/chromeos/login/users/user_manager.h"
     11 #include "chrome/browser/chromeos/policy/policy_cert_service_factory.h"
     12 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h"
     13 #include "content/public/browser/browser_thread.h"
     14 #include "net/cert/x509_certificate.h"
     15 
     16 namespace policy {
     17 
     18 PolicyCertService::~PolicyCertService() {
     19   DCHECK(cert_verifier_)
     20       << "CreatePolicyCertVerifier() must be called after construction.";
     21 }
     22 
     23 PolicyCertService::PolicyCertService(
     24     const std::string& user_id,
     25     UserNetworkConfigurationUpdater* net_conf_updater,
     26     chromeos::UserManager* user_manager)
     27     : cert_verifier_(NULL),
     28       user_id_(user_id),
     29       net_conf_updater_(net_conf_updater),
     30       user_manager_(user_manager),
     31       has_trust_anchors_(false),
     32       weak_ptr_factory_(this) {
     33   DCHECK(net_conf_updater_);
     34   DCHECK(user_manager_);
     35 }
     36 
     37 PolicyCertService::PolicyCertService(const std::string& user_id,
     38                                      PolicyCertVerifier* verifier,
     39                                      chromeos::UserManager* user_manager)
     40     : cert_verifier_(verifier),
     41       user_id_(user_id),
     42       net_conf_updater_(NULL),
     43       user_manager_(user_manager),
     44       has_trust_anchors_(false),
     45       weak_ptr_factory_(this) {}
     46 
     47 scoped_ptr<PolicyCertVerifier> PolicyCertService::CreatePolicyCertVerifier() {
     48   base::Closure callback = base::Bind(
     49       &PolicyCertServiceFactory::SetUsedPolicyCertificates, user_id_);
     50   cert_verifier_ = new PolicyCertVerifier(
     51       base::Bind(base::IgnoreResult(&content::BrowserThread::PostTask),
     52                  content::BrowserThread::UI,
     53                  FROM_HERE,
     54                  callback));
     55   // Certs are forwarded to |cert_verifier_|, thus register here after
     56   // |cert_verifier_| is created.
     57   net_conf_updater_->AddTrustedCertsObserver(this);
     58 
     59   // Set the current list of trust anchors.
     60   net::CertificateList trust_anchors;
     61   net_conf_updater_->GetWebTrustedCertificates(&trust_anchors);
     62   OnTrustAnchorsChanged(trust_anchors);
     63 
     64   return make_scoped_ptr(cert_verifier_);
     65 }
     66 
     67 void PolicyCertService::OnTrustAnchorsChanged(
     68     const net::CertificateList& trust_anchors) {
     69   DCHECK(cert_verifier_);
     70 
     71   // Do not use certificates installed via ONC policy if the current session has
     72   // multiple profiles. This is important to make sure that any possibly tainted
     73   // data is absolutely confined to the managed profile and never, ever leaks to
     74   // any other profile.
     75   if (!trust_anchors.empty() && user_manager_->GetLoggedInUsers().size() > 1u) {
     76     LOG(ERROR) << "Ignoring ONC-pushed certificates update because multiple "
     77                << "users are logged in.";
     78     return;
     79   }
     80 
     81   has_trust_anchors_ = !trust_anchors.empty();
     82 
     83   // It's safe to use base::Unretained here, because it's guaranteed that
     84   // |cert_verifier_| outlives this object (see description of
     85   // CreatePolicyCertVerifier).
     86   // Note: ProfileIOData, which owns the CertVerifier is deleted by a
     87   // DeleteSoon on IO, i.e. after all pending tasks on IO are finished.
     88   content::BrowserThread::PostTask(
     89       content::BrowserThread::IO,
     90       FROM_HERE,
     91       base::Bind(&PolicyCertVerifier::SetTrustAnchors,
     92                  base::Unretained(cert_verifier_),
     93                  trust_anchors));
     94 }
     95 
     96 bool PolicyCertService::UsedPolicyCertificates() const {
     97   return PolicyCertServiceFactory::UsedPolicyCertificates(user_id_);
     98 }
     99 
    100 void PolicyCertService::Shutdown() {
    101   weak_ptr_factory_.InvalidateWeakPtrs();
    102   if (net_conf_updater_)
    103     net_conf_updater_->RemoveTrustedCertsObserver(this);
    104   OnTrustAnchorsChanged(net::CertificateList());
    105   net_conf_updater_ = NULL;
    106 }
    107 
    108 // static
    109 scoped_ptr<PolicyCertService> PolicyCertService::CreateForTesting(
    110     const std::string& user_id,
    111     PolicyCertVerifier* verifier,
    112     chromeos::UserManager* user_manager) {
    113   return make_scoped_ptr(
    114       new PolicyCertService(user_id, verifier, user_manager));
    115 }
    116 
    117 }  // namespace policy
    118