summaryrefslogtreecommitdiff
path: root/chromium/components/policy/core/common/policy_proto_decoders.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/components/policy/core/common/policy_proto_decoders.cc')
-rw-r--r--chromium/components/policy/core/common/policy_proto_decoders.cc213
1 files changed, 213 insertions, 0 deletions
diff --git a/chromium/components/policy/core/common/policy_proto_decoders.cc b/chromium/components/policy/core/common/policy_proto_decoders.cc
new file mode 100644
index 00000000000..11521b3b083
--- /dev/null
+++ b/chromium/components/policy/core/common/policy_proto_decoders.cc
@@ -0,0 +1,213 @@
+// Copyright 2018 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "components/policy/core/common/policy_proto_decoders.h"
+
+#include <cstring>
+#include <limits>
+#include <memory>
+
+#include "base/json/json_reader.h"
+#include "base/logging.h"
+#include "base/strings/string_number_conversions.h"
+#include "base/strings/utf_string_conversions.h"
+#include "base/values.h"
+#include "components/policy/core/common/cloud/cloud_external_data_manager.h"
+#include "components/policy/core/common/policy_map.h"
+#include "components/policy/policy_constants.h"
+#include "components/policy/proto/cloud_policy.pb.h"
+#include "components/strings/grit/components_strings.h"
+
+namespace policy {
+
+namespace em = enterprise_management;
+
+namespace {
+
+// Returns true and sets |level| to a PolicyLevel if the policy has been set
+// at that level. Returns false if the policy is not set, or has been set at
+// the level of PolicyOptions::UNSET.
+template <class AnyPolicyProto>
+bool GetPolicyLevel(const AnyPolicyProto& policy_proto, PolicyLevel* level) {
+ if (!policy_proto.has_value()) {
+ return false;
+ }
+ if (!policy_proto.has_policy_options()) {
+ *level = POLICY_LEVEL_MANDATORY; // Default level.
+ return true;
+ }
+ switch (policy_proto.policy_options().mode()) {
+ case em::PolicyOptions::MANDATORY:
+ *level = POLICY_LEVEL_MANDATORY;
+ return true;
+ case em::PolicyOptions::RECOMMENDED:
+ *level = POLICY_LEVEL_RECOMMENDED;
+ return true;
+ case em::PolicyOptions::UNSET:
+ return false;
+ }
+}
+
+// Convert a BooleanPolicyProto to a bool base::Value.
+base::Value DecodeBooleanProto(const em::BooleanPolicyProto& proto) {
+ return base::Value(proto.value());
+}
+
+// Convert an IntegerPolicyProto to an int base::Value.
+base::Value DecodeIntegerProto(const em::IntegerPolicyProto& proto,
+ std::string* error) {
+ google::protobuf::int64 value = proto.value();
+
+ if (value < std::numeric_limits<int>::min() ||
+ value > std::numeric_limits<int>::max()) {
+ LOG(WARNING) << "Integer value " << value << " out of numeric limits";
+ *error = "Number out of range - invalid int32";
+ return base::Value(base::NumberToString(value));
+ }
+
+ return base::Value(static_cast<int>(value));
+}
+
+// Convert a StringPolicyProto to a string base::Value.
+base::Value DecodeStringProto(const em::StringPolicyProto& proto) {
+ return base::Value(proto.value());
+}
+
+// Convert a StringListPolicyProto to a List base::Value, where each list value
+// is of Type::STRING.
+base::Value DecodeStringListProto(const em::StringListPolicyProto& proto) {
+ base::Value list_value(base::Value::Type::LIST);
+ for (const auto& entry : proto.value().entries())
+ list_value.Append(entry);
+ return list_value;
+}
+
+// Convert a StringPolicyProto to a base::Value of any type (for example,
+// Type::DICTIONARY or Type::LIST) by parsing it as JSON.
+base::Value DecodeJsonProto(const em::StringPolicyProto& proto,
+ std::string* error) {
+ const std::string& json = proto.value();
+ base::JSONReader::ValueWithError value_with_error =
+ base::JSONReader::ReadAndReturnValueWithError(
+ json, base::JSONParserOptions::JSON_ALLOW_TRAILING_COMMAS);
+
+ if (!value_with_error.value) {
+ // Can't parse as JSON so return it as a string, and leave it to the handler
+ // to validate.
+ LOG(WARNING) << "Invalid JSON: " << json;
+ *error = value_with_error.error_message;
+ return base::Value(json);
+ }
+
+ // Accept any Value type that parsed as JSON, and leave it to the handler to
+ // convert and check the concrete type.
+ error->clear();
+ return std::move(value_with_error.value.value());
+}
+
+bool PerProfileMatches(bool policy_per_profile,
+ PolicyPerProfileFilter per_profile_enum) {
+ switch (per_profile_enum) {
+ case PolicyPerProfileFilter::kTrue:
+ return policy_per_profile;
+ case PolicyPerProfileFilter::kFalse:
+ return !policy_per_profile;
+ case PolicyPerProfileFilter::kAny:
+ return true;
+ }
+}
+
+} // namespace
+
+void DecodeProtoFields(
+ const em::CloudPolicySettings& policy,
+ base::WeakPtr<CloudExternalDataManager> external_data_manager,
+ PolicySource source,
+ PolicyScope scope,
+ PolicyMap* map,
+ PolicyPerProfileFilter per_profile) {
+ PolicyLevel level;
+
+ for (const BooleanPolicyAccess& access : kBooleanPolicyAccess) {
+ if (!PerProfileMatches(access.per_profile, per_profile) ||
+ !access.has_proto(policy))
+ continue;
+
+ const em::BooleanPolicyProto& proto = access.get_proto(policy);
+ if (!GetPolicyLevel(proto, &level))
+ continue;
+
+ map->Set(access.policy_key, level, scope, source, DecodeBooleanProto(proto),
+ nullptr);
+ }
+
+ for (const IntegerPolicyAccess& access : kIntegerPolicyAccess) {
+ if (!PerProfileMatches(access.per_profile, per_profile) ||
+ !access.has_proto(policy))
+ continue;
+
+ const em::IntegerPolicyProto& proto = access.get_proto(policy);
+ if (!GetPolicyLevel(proto, &level))
+ continue;
+
+ std::string error;
+ map->Set(access.policy_key, level, scope, source,
+ DecodeIntegerProto(proto, &error), nullptr);
+ if (!error.empty())
+ map->AddMessage(access.policy_key, PolicyMap::MessageType::kError,
+ IDS_POLICY_PROTO_PARSING_ERROR,
+ {base::UTF8ToUTF16(error)});
+ }
+
+ for (const StringPolicyAccess& access : kStringPolicyAccess) {
+ if (!PerProfileMatches(access.per_profile, per_profile) ||
+ !access.has_proto(policy))
+ continue;
+
+ const em::StringPolicyProto& proto = access.get_proto(policy);
+ if (!GetPolicyLevel(proto, &level))
+ continue;
+
+ std::string error;
+ base::Value value = (access.type == StringPolicyType::STRING)
+ ? DecodeStringProto(proto)
+ : DecodeJsonProto(proto, &error);
+
+ // EXTERNAL policies represent a single piece of external data that is
+ // retrieved by an ExternalDataFetcher.
+ // kWebAppInstallForceList is currently the only policy that is a JSON
+ // policy (containing mostly non-external data) which can contain
+ // references to multiple pieces of external data as well. For that it
+ // needs an ExternalDataFetcher. If we ever create a second such policy,
+ // create a new type for it instead of special-casing the policies here.
+ std::unique_ptr<ExternalDataFetcher> external_data_fetcher =
+ (access.type == StringPolicyType::EXTERNAL ||
+ strcmp(access.policy_key, key::kWebAppInstallForceList) == 0)
+ ? std::make_unique<ExternalDataFetcher>(external_data_manager,
+ access.policy_key)
+ : nullptr;
+
+ map->Set(access.policy_key, level, scope, source, std::move(value),
+ std::move(external_data_fetcher));
+ if (!error.empty())
+ map->AddMessage(access.policy_key, PolicyMap::MessageType::kError,
+ IDS_POLICY_PROTO_PARSING_ERROR,
+ {base::UTF8ToUTF16(error)});
+ }
+
+ for (const StringListPolicyAccess& access : kStringListPolicyAccess) {
+ if (!PerProfileMatches(access.per_profile, per_profile) ||
+ !access.has_proto(policy))
+ continue;
+
+ const em::StringListPolicyProto& proto = access.get_proto(policy);
+ if (!GetPolicyLevel(proto, &level))
+ continue;
+
+ map->Set(access.policy_key, level, scope, source,
+ DecodeStringListProto(proto), nullptr);
+ }
+}
+
+} // namespace policy