blob: 9a3c37c7bb47569e258b003da0a603fdc74f3c57 [file] [log] [blame]
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/policy/networking/network_configuration_updater.h"
#include "base/feature_list.h"
#include "base/functional/bind.h"
#include "base/functional/callback_helpers.h"
#include "base/logging.h"
#include "base/metrics/histogram_functions.h"
#include "base/values.h"
#include "chromeos/components/onc/onc_utils.h"
#include "components/policy/core/common/policy_map.h"
#include "components/policy/policy_constants.h"
#include "net/cert/x509_certificate.h"
#include "net/cert/x509_util_nss.h"
using chromeos::onc::CertificateScope;
using chromeos::onc::OncParsedCertificates;
namespace policy {
namespace {
// A predicate used for filtering server or authority certificates.
using ServerOrAuthorityCertPredicate = base::RepeatingCallback<bool(
const OncParsedCertificates::ServerOrAuthorityCertificate& cert)>;
// Returns a filtered copy of |sever_or_authority_certificates|. The filtered
// copy will contain a certificate from the input iff it matches |scope| and
// executing |predicate| on it returned true.
net::CertificateList GetFilteredCertificateListFromOnc(
const std::vector<OncParsedCertificates::ServerOrAuthorityCertificate>&
server_or_authority_certificates,
const CertificateScope& scope,
ServerOrAuthorityCertPredicate predicate) {
net::CertificateList certificates;
for (const auto& server_or_authority_cert :
server_or_authority_certificates) {
if (server_or_authority_cert.scope() == scope &&
predicate.Run(server_or_authority_cert))
certificates.push_back(server_or_authority_cert.certificate());
}
return certificates;
}
// Returns all extension IDs that were used in a Scope of a one of the
// |server_or_authority_certificates|.
std::set<std::string> CollectExtensionIds(
const std::vector<OncParsedCertificates::ServerOrAuthorityCertificate>&
server_or_authority_certificates) {
std::set<std::string> extension_ids;
for (const auto& cert : server_or_authority_certificates) {
if (cert.scope().is_extension_scoped())
extension_ids.insert(cert.scope().extension_id());
}
return extension_ids;
}
const char* const kOncRecommendedFieldsWorkaroundActionHistogram =
"Network.Ethernet.Policy.OncRecommendedFieldsWorkaroundAction";
// These values are persisted to logs. Entries should not be renumbered and
// numeric values should never be reused.
enum class OncRecommendedFieldsWorkaroundAction {
kEnabledAndNotAffected = 0,
kEnabledAndAffected = 1,
kDisabledAndNotAffected = 2,
kDisabledAndAffected = 3,
kMaxValue = kDisabledAndAffected,
};
void ReportOncRecommendedFieldsWorkaroundAction(bool enabled_by_feature,
bool affected) {
OncRecommendedFieldsWorkaroundAction action;
if (enabled_by_feature) {
if (affected) {
action = OncRecommendedFieldsWorkaroundAction::kEnabledAndAffected;
} else {
action = OncRecommendedFieldsWorkaroundAction::kEnabledAndNotAffected;
}
} else {
if (affected) {
action = OncRecommendedFieldsWorkaroundAction::kDisabledAndAffected;
} else {
action = OncRecommendedFieldsWorkaroundAction::kDisabledAndNotAffected;
}
}
base::UmaHistogramEnumeration(kOncRecommendedFieldsWorkaroundActionHistogram,
action);
}
// Sets the "Recommended" list of recommended field names in |onc_value|,
// which must be a dictionary, to |recommended_field_names|. If a
// "Recommended" list already existed in |onc_dict|, it's replaced.
void SetRecommended(
base::Value::Dict& onc_dict,
std::initializer_list<base::StringPiece> recommended_field_names) {
base::Value::List recommended_list;
for (const auto& recommended_field_name : recommended_field_names) {
recommended_list.Append(recommended_field_name);
}
onc_dict.Set(::onc::kRecommended, std::move(recommended_list));
}
void MarkFieldsAsRecommendedForBackwardsCompatibility(
base::Value::Dict& network_config_onc_dict) {
const bool enabled_by_feature = !base::FeatureList::IsEnabled(
kDisablePolicyEthernetRecommendedWorkaround);
bool affected = true;
// If anything has been recommended, trust the server and don't change
// anything.
if (network_config_onc_dict.contains(::onc::kRecommended)) {
affected = false;
}
// Ensure kStaticIPConfig exists because a "Recommended" field will be added
// to it, if not already present.
base::Value::Dict* static_ip_config = network_config_onc_dict.EnsureDict(
::onc::network_config::kStaticIPConfig);
if (static_ip_config->contains(::onc::kRecommended)) {
affected = false;
}
ReportOncRecommendedFieldsWorkaroundAction(enabled_by_feature, affected);
if (!enabled_by_feature || !affected) {
return;
}
SetRecommended(network_config_onc_dict,
{::onc::network_config::kIPAddressConfigType,
::onc::network_config::kNameServersConfigType});
SetRecommended(*static_ip_config,
{::onc::ipconfig::kGateway, ::onc::ipconfig::kIPAddress,
::onc::ipconfig::kRoutingPrefix, ::onc::ipconfig::kType,
::onc::ipconfig::kNameServers});
}
// Marks IP Address config fields as "Recommended" for Ethernet network
// configs without authentication. The reason is that Chrome OS used to treat
// Ethernet networks without authentication as unmanaged, so users were able
// to edit the IP address even if there was a policy for Ethernet. This
// behavior should be preserved for now to not break existing use cases.
// TODO(https://crbug.com/931412): Remove this when the server sets
// "Recommended".
void MarkFieldsAsRecommendedForBackwardsCompatibility(
base::Value::List& network_configs_onc) {
for (auto& network_config_onc : network_configs_onc) {
DCHECK(network_config_onc.is_dict());
base::Value::Dict& network_config_onc_dict = network_config_onc.GetDict();
const std::string* type =
network_config_onc_dict.FindString(::onc::network_config::kType);
if (!type || *type != ::onc::network_type::kEthernet) {
continue;
}
const base::Value::Dict* ethernet =
network_config_onc_dict.FindDict(::onc::network_config::kEthernet);
if (!ethernet) {
continue;
}
const std::string* auth =
ethernet->FindString(::onc::ethernet::kAuthentication);
if (!auth || *auth != ::onc::ethernet::kAuthenticationNone) {
continue;
}
MarkFieldsAsRecommendedForBackwardsCompatibility(network_config_onc_dict);
}
}
} // namespace
BASE_FEATURE(kDisablePolicyEthernetRecommendedWorkaround,
"DisablePolicyEthernetRecommendedWorkaround",
base::FEATURE_DISABLED_BY_DEFAULT);
NetworkConfigurationUpdater::~NetworkConfigurationUpdater() {
for (auto& observer : observer_list_) {
observer.OnPolicyCertificateProviderDestroying();
}
policy_service_->RemoveObserver(POLICY_DOMAIN_CHROME, this);
}
void NetworkConfigurationUpdater::OnPolicyUpdated(const PolicyNamespace& ns,
const PolicyMap& previous,
const PolicyMap& current) {
// Ignore this call. Policy changes are already observed by the registrar.
}
void NetworkConfigurationUpdater::OnPolicyServiceInitialized(
PolicyDomain domain) {
if (domain != POLICY_DOMAIN_CHROME)
return;
if (policy_service_->IsInitializationComplete(POLICY_DOMAIN_CHROME)) {
VLOG(1) << LogHeader() << " initialized.";
policy_service_->RemoveObserver(POLICY_DOMAIN_CHROME, this);
ApplyPolicy();
}
}
void NetworkConfigurationUpdater::AddPolicyProvidedCertsObserver(
ash::PolicyCertificateProvider::Observer* observer) {
observer_list_.AddObserver(observer);
}
void NetworkConfigurationUpdater::RemovePolicyProvidedCertsObserver(
ash::PolicyCertificateProvider::Observer* observer) {
observer_list_.RemoveObserver(observer);
}
net::CertificateList
NetworkConfigurationUpdater::GetAllServerAndAuthorityCertificates(
const CertificateScope& scope) const {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
return GetFilteredCertificateListFromOnc(
certs_->server_or_authority_certificates(), scope,
base::BindRepeating(
[](const OncParsedCertificates::ServerOrAuthorityCertificate& cert) {
return true;
}));
}
net::CertificateList NetworkConfigurationUpdater::GetAllAuthorityCertificates(
const CertificateScope& scope) const {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
return GetFilteredCertificateListFromOnc(
certs_->server_or_authority_certificates(), scope,
base::BindRepeating(
[](const OncParsedCertificates::ServerOrAuthorityCertificate& cert) {
return cert.type() ==
OncParsedCertificates::ServerOrAuthorityCertificate::Type::
kAuthority;
}));
}
net::CertificateList NetworkConfigurationUpdater::GetWebTrustedCertificates(
const CertificateScope& scope) const {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
return GetFilteredCertificateListFromOnc(
certs_->server_or_authority_certificates(), scope,
base::BindRepeating(
[](const OncParsedCertificates::ServerOrAuthorityCertificate& cert) {
return cert.web_trust_requested();
}));
}
net::CertificateList
NetworkConfigurationUpdater::GetCertificatesWithoutWebTrust(
const CertificateScope& scope) const {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
return GetFilteredCertificateListFromOnc(
certs_->server_or_authority_certificates(), scope,
base::BindRepeating(
[](const OncParsedCertificates::ServerOrAuthorityCertificate& cert) {
return !cert.web_trust_requested();
}));
}
const std::set<std::string>&
NetworkConfigurationUpdater::GetExtensionIdsWithPolicyCertificates() const {
return extension_ids_with_policy_certificates_;
}
NetworkConfigurationUpdater::NetworkConfigurationUpdater(
onc::ONCSource onc_source,
std::string policy_key,
PolicyService* policy_service)
: onc_source_(onc_source),
policy_key_(policy_key),
policy_change_registrar_(
policy_service,
PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())),
policy_service_(policy_service),
certs_(std::make_unique<OncParsedCertificates>()) {}
void NetworkConfigurationUpdater::Init() {
policy_change_registrar_.Observe(
policy_key_,
base::BindRepeating(&NetworkConfigurationUpdater::OnPolicyChanged,
base::Unretained(this)));
if (policy_service_->IsInitializationComplete(POLICY_DOMAIN_CHROME)) {
VLOG(1) << LogHeader() << " is already initialized.";
ApplyPolicy();
} else {
policy_service_->AddObserver(POLICY_DOMAIN_CHROME, this);
}
}
void NetworkConfigurationUpdater::ParseCurrentPolicy(
base::Value::List* network_configs,
base::Value::Dict* global_network_config,
base::Value::List* certificates) {
const PolicyMap& policies = policy_service_->GetPolicies(
PolicyNamespace(POLICY_DOMAIN_CHROME, std::string()));
const base::Value* policy_value =
policies.GetValue(policy_key_, base::Value::Type::STRING);
if (!policies.IsPolicySet(policy_key_))
VLOG(2) << LogHeader() << " is not set.";
else if (!policy_value)
LOG(ERROR) << LogHeader() << " is not a string value.";
const std::string onc_blob = policy_value && policy_value->is_string()
? policy_value->GetString()
: std::string();
chromeos::onc::ParseAndValidateOncForImport(
onc_blob, onc_source_, std::string() /* no passphrase */, network_configs,
global_network_config, certificates);
}
const std::vector<OncParsedCertificates::ClientCertificate>&
NetworkConfigurationUpdater::GetClientCertificates() const {
return certs_->client_certificates();
}
void NetworkConfigurationUpdater::OnPolicyChanged(const base::Value* previous,
const base::Value* current) {
ApplyPolicy();
}
void NetworkConfigurationUpdater::ApplyPolicy() {
base::Value::List network_configs;
base::Value::Dict global_network_config;
base::Value::List certificates;
ParseCurrentPolicy(&network_configs, &global_network_config, &certificates);
ImportCertificates(std::move(certificates));
MarkFieldsAsRecommendedForBackwardsCompatibility(network_configs);
ApplyNetworkPolicy(network_configs, global_network_config);
}
std::string NetworkConfigurationUpdater::LogHeader() const {
return chromeos::onc::GetSourceAsString(onc_source_);
}
void NetworkConfigurationUpdater::ImportCertificates(
base::Value::List certificates_onc) {
std::unique_ptr<OncParsedCertificates> incoming_certs =
std::make_unique<OncParsedCertificates>(certificates_onc);
bool server_or_authority_certs_changed =
certs_->server_or_authority_certificates() !=
incoming_certs->server_or_authority_certificates();
bool client_certs_changed =
certs_->client_certificates() != incoming_certs->client_certificates();
if (!server_or_authority_certs_changed && !client_certs_changed)
return;
certs_ = std::move(incoming_certs);
extension_ids_with_policy_certificates_ =
CollectExtensionIds(certs_->server_or_authority_certificates());
if (client_certs_changed)
ImportClientCertificates();
if (server_or_authority_certs_changed)
NotifyPolicyProvidedCertsChanged();
}
void NetworkConfigurationUpdater::NotifyPolicyProvidedCertsChanged() {
for (auto& observer : observer_list_)
observer.OnPolicyProvidedCertsChanged();
}
} // namespace policy