chromium/chrome/browser/ash/settings/device_settings_service.cc

// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "chrome/browser/ash/settings/device_settings_service.h"

#include <utility>

#include "base/functional/bind.h"
#include "base/location.h"
#include "base/logging.h"
#include "base/metrics/histogram_functions.h"
#include "base/task/single_thread_task_runner.h"
#include "base/time/time.h"
#include "chrome/browser/ash/policy/off_hours/device_off_hours_controller.h"
#include "chrome/browser/ash/policy/off_hours/off_hours_policy_applier.h"
#include "chrome/browser/ash/settings/session_manager_operation.h"
#include "chrome/browser/browser_process.h"
#include "chrome/common/pref_names.h"
#include "chromeos/ash/components/install_attributes/install_attributes.h"
#include "components/ownership/owner_key_util.h"
#include "components/policy/core/common/cloud/cloud_policy_constants.h"
#include "components/policy/core/common/cloud/enterprise_metrics.h"
#include "components/policy/proto/chrome_device_policy.pb.h"
#include "components/prefs/pref_service.h"
#include "content/public/browser/browser_thread.h"

#include "crypto/rsa_private_key.h"

namespace em = enterprise_management;

using ownership::OwnerKeyUtil;
using ownership::PublicKey;
using policy::PolicyDeviceIdValidity;

namespace ash {
namespace {

constexpr char kDeviceIdValidityOldEnrollmentEnterprise[] =
    "Enterprise.DevicePolicyDeviceIdValidity2.OldEnrollmentEnterprise";
constexpr char kDeviceIdValidityOldEnrollmentDemo[] =
    "Enterprise.DevicePolicyDeviceIdValidity2.OldEnrollmentDemo";
constexpr char kDeviceIdValidityNewEnrollmentEnterprise[] =
    "Enterprise.DevicePolicyDeviceIdValidity2.NewEnrollmentEnterprise";
constexpr char kDeviceIdValidityNewEnrollmentDemo[] =
    "Enterprise.DevicePolicyDeviceIdValidity2.NewEnrollmentDemo";
constexpr char kDeviceLocalAccountCount[] =
    "Enterprise.DeviceLocalAccountCount";

void RecordDeviceIdValidityMetric(em::PolicyData* policy_data) {
  // The enrollment version pref was added in M121. All the devices enrolled
  // before that don't have the pref on local state.
  auto* local_state = g_browser_process->local_state();
  const bool is_old_enrollment =
      !local_state ||
      local_state->GetString(prefs::kEnrollmentVersionOS).empty();
  InstallAttributes* install_attributes = InstallAttributes::Get();
  const bool is_demo_mode =
      install_attributes->GetMode() == policy::DEVICE_MODE_DEMO;

  PolicyDeviceIdValidity device_id_validity = PolicyDeviceIdValidity::kValid;
  if (install_attributes->GetDeviceId().empty()) {
    device_id_validity = PolicyDeviceIdValidity::kActualIdUnknown;
  } else if (!policy_data->has_device_id()) {
    device_id_validity = PolicyDeviceIdValidity::kMissing;
  } else if (policy_data->device_id() != install_attributes->GetDeviceId()) {
    device_id_validity = PolicyDeviceIdValidity::kInvalid;
  }

  const char* histogram_name = kDeviceIdValidityNewEnrollmentEnterprise;
  if (is_demo_mode) {
    histogram_name = is_old_enrollment ? kDeviceIdValidityOldEnrollmentDemo
                                       : kDeviceIdValidityNewEnrollmentDemo;
  } else if (is_old_enrollment) {
    histogram_name = kDeviceIdValidityOldEnrollmentEnterprise;
  }
  base::UmaHistogramEnumeration(histogram_name, device_id_validity);
}

void RecordDeviceLocalAccountsMetric(
    const em::ChromeDeviceSettingsProto& settings) {
  base::UmaHistogramCustomCounts(
      kDeviceLocalAccountCount,
      settings.device_local_accounts().account().size(),
      /*min=*/1,
      /*exclusive_max=*/500,
      /*buckets=*/100);
}

}  // namespace

DeviceSettingsService::Observer::~Observer() {}

void DeviceSettingsService::Observer::OwnershipStatusChanged() {}

void DeviceSettingsService::Observer::DeviceSettingsUpdated() {}

void DeviceSettingsService::Observer::OnDeviceSettingsServiceShutdown() {}

static DeviceSettingsService* g_device_settings_service = nullptr;

// static
void DeviceSettingsService::Initialize() {
  CHECK(!g_device_settings_service);
  g_device_settings_service = new DeviceSettingsService();
}

// static
bool DeviceSettingsService::IsInitialized() {
  return g_device_settings_service;
}

// static
void DeviceSettingsService::Shutdown() {
  DCHECK(g_device_settings_service);
  delete g_device_settings_service;
  g_device_settings_service = nullptr;
}

// static
DeviceSettingsService* DeviceSettingsService::Get() {
  CHECK(g_device_settings_service);
  return g_device_settings_service;
}

// static
const char* DeviceSettingsService::StatusToString(Status status) {
  switch (status) {
    case STORE_SUCCESS:
      return "SUCCESS";
    case STORE_KEY_UNAVAILABLE:
      return "KEY_UNAVAILABLE";
    case STORE_OPERATION_FAILED:
      return "OPERATION_FAILED";
    case STORE_NO_POLICY:
      return "NO_POLICY";
    case STORE_INVALID_POLICY:
      return "INVALID_POLICY";
    case STORE_VALIDATION_ERROR:
      return "VALIDATION_ERROR";
  }
  return "UNKNOWN";
}

DeviceSettingsService::DeviceSettingsService() {
  device_off_hours_controller_ =
      std::make_unique<policy::off_hours::DeviceOffHoursController>();
}

DeviceSettingsService::~DeviceSettingsService() {
  DCHECK(pending_operations_.empty());
  for (auto& observer : observers_)
    observer.OnDeviceSettingsServiceShutdown();
}

void DeviceSettingsService::SetSessionManager(
    SessionManagerClient* session_manager_client,
    scoped_refptr<OwnerKeyUtil> owner_key_util) {
  DCHECK(session_manager_client);
  DCHECK(owner_key_util.get());
  DCHECK(!session_manager_client_);
  DCHECK(!owner_key_util_.get());

  session_manager_client_ = session_manager_client;
  owner_key_util_ = owner_key_util;

  session_manager_client_->AddObserver(this);

  StartNextOperation();
}

void DeviceSettingsService::UnsetSessionManager() {
  pending_operations_.clear();

  if (session_manager_client_)
    session_manager_client_->RemoveObserver(this);
  session_manager_client_ = nullptr;
  owner_key_util_.reset();
}

void DeviceSettingsService::SetDeviceMode(policy::DeviceMode device_mode) {
  if (device_mode_ == device_mode)
    return;

  // Device mode can only change if was not set yet.
  DCHECK(policy::DEVICE_MODE_PENDING == device_mode_ ||
         policy::DEVICE_MODE_NOT_SET == device_mode_);
  device_mode_ = device_mode;
  if (GetOwnershipStatus() != OwnershipStatus::kOwnershipUnknown) {
    RunPendingOwnershipStatusCallbacks();
  }
}

scoped_refptr<PublicKey> DeviceSettingsService::GetPublicKey() {
  return public_key_;
}

void DeviceSettingsService::SetDeviceOffHoursControllerForTesting(
    std::unique_ptr<policy::off_hours::DeviceOffHoursController> controller) {
  device_off_hours_controller_ = std::move(controller);
}

void DeviceSettingsService::Load() {
  EnqueueLoad(false);
}

void DeviceSettingsService::LoadIfNotPresent() {
  // Return if there is already some policy loaded (policy_fetch_response_), or
  // if there are any pending operations (|pending_operations_| not empty). The
  // pending operations can be of two types only, load or store. If a loading
  // operation is in the queue, then a request to load will be issued soon. If a
  // store operation is pending, then the policy data is already available and
  // will be stored soon. In either case, it's not needed to load again.
  if (policy_fetch_response_ || !pending_operations_.empty())
    return;

  EnqueueLoad(false);
}

void DeviceSettingsService::LoadImmediately() {
  if (session_stopping_) {
    LOG(WARNING) << "Fail the blocking request when the session is stopping";
    // No need to HandleCompletedOperation, as there's no callback waiting.
    return;
  }
  std::unique_ptr<SessionManagerOperation> operation(new LoadSettingsOperation(
      /*request_key_load=*/true, /*force_immediate_load=*/true,
      base::BindOnce(&DeviceSettingsService::HandleCompletedOperation,
                     weak_factory_.GetWeakPtr(), base::OnceClosure())));
  operation->Start(session_manager_client_, owner_key_util_, public_key_);
}

void DeviceSettingsService::Store(
    std::unique_ptr<em::PolicyFetchResponse> policy,
    base::OnceClosure callback) {
  Enqueue(std::make_unique<StoreSettingsOperation>(
      base::BindOnce(&DeviceSettingsService::HandleCompletedAsyncOperation,
                     weak_factory_.GetWeakPtr(), std::move(callback)),
      std::move(policy)));
}

DeviceSettingsService::OwnershipStatus
DeviceSettingsService::GetOwnershipStatus() {
  if (public_key_.get())
    return public_key_->is_empty() ? OwnershipStatus::kOwnershipNone
                                   : OwnershipStatus::kOwnershipTaken;
  return OwnershipStatus::kOwnershipUnknown;
}

void DeviceSettingsService::GetOwnershipStatusAsync(
    OwnershipStatusCallback callback) {
  if (GetOwnershipStatus() != OwnershipStatus::kOwnershipUnknown) {
    // Report status immediately.
    base::SingleThreadTaskRunner::GetCurrentDefault()->PostTask(
        FROM_HERE,
        base::BindOnce(&DeviceSettingsService::ValidateOwnershipStatusAndNotify,
                       weak_factory_.GetWeakPtr(), std::move(callback)));
  } else {
    // If the key hasn't been loaded yet, enqueue the callback to be fired when
    // the next SessionManagerOperation completes. If no operation is pending,
    // start a load operation to fetch the key and report the result.
    pending_ownership_status_callbacks_.push_back(std::move(callback));
    if (pending_operations_.empty())
      EnqueueLoad(false);
  }
}

void DeviceSettingsService::ValidateOwnershipStatusAndNotify(
    OwnershipStatusCallback callback) {
  if (GetOwnershipStatus() == OwnershipStatus::kOwnershipUnknown) {
    // OwnerKeySet() could be called upon user sign-in while event was in queue,
    // which resets status to OwnershipStatus::kOwnershipUnknown.
    // We need to retry the logic in this case.
    GetOwnershipStatusAsync(std::move(callback));
    return;
  }
  std::move(callback).Run(GetOwnershipStatus());
}

bool DeviceSettingsService::HasPrivateOwnerKey() {
  return owner_settings_service_ && owner_settings_service_->IsOwner();
}

void DeviceSettingsService::InitOwner(
    const std::string& username,
    const base::WeakPtr<ownership::OwnerSettingsService>&
        owner_settings_service) {
  // When InitOwner() is called twice with the same |username| it's
  // worth to reload settings since owner key may become available.
  if (!username_.empty() && username_ != username)
    return;
  username_ = username;
  owner_settings_service_ = owner_settings_service;

  // Reset the flag since consumer ownership should be established now.
  will_establish_consumer_ownership_ = false;

  EnsureReload(true);
}

const std::string& DeviceSettingsService::GetUsername() const {
  return username_;
}

ownership::OwnerSettingsService*
DeviceSettingsService::GetOwnerSettingsService() const {
  return owner_settings_service_.get();
}

void DeviceSettingsService::MarkWillEstablishConsumerOwnership() {
  will_establish_consumer_ownership_ = true;
}

void DeviceSettingsService::AddObserver(Observer* observer) {
  observers_.AddObserver(observer);
}

void DeviceSettingsService::RemoveObserver(Observer* observer) {
  observers_.RemoveObserver(observer);
}

void DeviceSettingsService::OwnerKeySet(bool success) {
  if (!success) {
    LOG(ERROR) << "Owner key change failed.";
    return;
  }

  public_key_.reset();

  if (!will_establish_consumer_ownership_) {
    EnsureReload(true);
  }
}

void DeviceSettingsService::PropertyChangeComplete(bool success) {
  if (!success) {
    LOG(ERROR) << "Policy update failed.";
    return;
  }

  if (GetOwnershipStatus() == OwnershipStatus::kOwnershipTaken ||
      !will_establish_consumer_ownership_) {
    EnsureReload(false);
  }
}

void DeviceSettingsService::SessionStopping() {
  session_stopping_ = true;
}

void DeviceSettingsService::Enqueue(
    std::unique_ptr<SessionManagerOperation> operation) {
  const bool was_empty = pending_operations_.empty();
  pending_operations_.push_back(std::move(operation));
  if (was_empty)
    StartNextOperation();
}

void DeviceSettingsService::EnqueueLoad(bool request_key_load) {
  Enqueue(std::make_unique<LoadSettingsOperation>(
      request_key_load, /*force_immediate_load=*/false,
      base::BindOnce(&DeviceSettingsService::HandleCompletedAsyncOperation,
                     weak_factory_.GetWeakPtr(), base::OnceClosure())));
}

void DeviceSettingsService::EnsureReload(bool request_key_load) {
  if (!pending_operations_.empty())
    pending_operations_.front()->RestartLoad(request_key_load);
  else
    EnqueueLoad(request_key_load);
}

void DeviceSettingsService::StartNextOperation() {
  if (!pending_operations_.empty() && session_manager_client_ &&
      owner_key_util_.get()) {
    pending_operations_.front()->Start(session_manager_client_, owner_key_util_,
                                       public_key_);
  }
}

void DeviceSettingsService::HandleCompletedAsyncOperation(
    base::OnceClosure callback,
    SessionManagerOperation* operation,
    Status status) {
  DCHECK_EQ(operation, pending_operations_.front().get());
  HandleCompletedOperation(std::move(callback), operation, status);
  // Only remove the pending operation here, so new operations triggered by
  // any of the callbacks above are queued up properly.
  pending_operations_.pop_front();

  StartNextOperation();
}

void DeviceSettingsService::HandleCompletedOperation(
    base::OnceClosure callback,
    SessionManagerOperation* operation,
    Status status) {
  store_status_ = status;
  if (status == STORE_SUCCESS) {
    policy_fetch_response_ = std::move(operation->policy_fetch_response());
    policy_data_ = std::move(operation->policy_data());
    device_settings_ = std::move(operation->device_settings());
    // Log histograms only if the device is managed and the policy is in
    // good state.
    if (policy_data_ && policy_data_->has_request_token() &&
        InstallAttributes::Get()->IsEnterpriseManaged()) {
      RecordDeviceIdValidityMetric(policy_data_.get());
      RecordDeviceLocalAccountsMetric(*device_settings_);
    }
    // Update "OffHours" policy state and apply "OffHours" policy to current
    // proto only during "OffHours" mode. When "OffHours" mode begins and ends
    // DeviceOffHoursController requests DeviceSettingsService to asynchronously
    // reload device policies. (See |DeviceOffHoursController| class
    // description)
    device_off_hours_controller_->UpdateOffHoursPolicy(*device_settings_);
    if (device_off_hours_controller_->is_off_hours_mode()) {
      std::unique_ptr<em::ChromeDeviceSettingsProto> off_device_settings =
          policy::off_hours::ApplyOffHoursPolicyToProto(*device_settings_);
      if (off_device_settings)
        device_settings_.swap(off_device_settings);
    }
  } else if (status != STORE_KEY_UNAVAILABLE) {
    LOG(ERROR) << "Session manager operation failed: " << status << " ("
               << StatusToString(status) << ")";
  }

  public_key_ = scoped_refptr<PublicKey>(operation->public_key());
  if (GetOwnershipStatus() != previous_ownership_status_) {
    // TODO(b/293598969): Investigate onwerhip status condition to prevent the
    // bugs in future. Check whether ownership status goes to kOwnershipTaken in
    // the end. Remove this when it's resolved.
    LOG(WARNING) << "Ownership status is changed from "
                 << previous_ownership_status_ << " to "
                 << GetOwnershipStatus();

    previous_ownership_status_ = GetOwnershipStatus();
    NotifyOwnershipStatusChanged();
  }
  NotifyDeviceSettingsUpdated();
  RunPendingOwnershipStatusCallbacks();

  // The completion callback happens after the notification so clients can
  // filter self-triggered updates.
  if (!callback.is_null())
    std::move(callback).Run();
}

void DeviceSettingsService::NotifyOwnershipStatusChanged() const {
  for (auto& observer : observers_)
    observer.OwnershipStatusChanged();
}

void DeviceSettingsService::NotifyDeviceSettingsUpdated() const {
  for (auto& observer : observers_)
    observer.DeviceSettingsUpdated();
}

void DeviceSettingsService::RunPendingOwnershipStatusCallbacks() {
  std::vector<OwnershipStatusCallback> callbacks;
  callbacks.swap(pending_ownership_status_callbacks_);
  for (auto& callback : callbacks) {
    std::move(callback).Run(GetOwnershipStatus());
  }
}

bool DeviceSettingsService::IsDeviceManaged() const {
  if (!policy_data_ || policy_data_->state() != em::PolicyData::ACTIVE) {
    return false;
  }
  if (policy_data_->has_management_mode()) {
    return policy_data_->management_mode() ==
           em::PolicyData::ENTERPRISE_MANAGED;
  } else {
    // The old device settings didn't have a management_mode. For those we
    // have to rely on the presence of request_token.
    return policy_data_->has_request_token();
  }
}

bool DeviceSettingsService::HasDmToken() const {
  return policy_data_ && policy_data_->has_request_token();
}

std::ostream& operator<<(std::ostream& ostream,
                         DeviceSettingsService::OwnershipStatus status) {
  switch (status) {
    case DeviceSettingsService::OwnershipStatus::kOwnershipUnknown:
      return ostream << "kOwnershipUnknown";
    case DeviceSettingsService::OwnershipStatus::kOwnershipNone:
      return ostream << "kOwnershipNone";
    case DeviceSettingsService::OwnershipStatus::kOwnershipTaken:
      return ostream << "kOwnershipTaken";
  }
}

ScopedTestDeviceSettingsService::ScopedTestDeviceSettingsService() {
  DeviceSettingsService::Initialize();
}

ScopedTestDeviceSettingsService::~ScopedTestDeviceSettingsService() {
  // Clean pending operations.
  DeviceSettingsService::Get()->UnsetSessionManager();
  DeviceSettingsService::Shutdown();
}

}  // namespace ash