OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // This file implements a standalone host process for Me2Me. | 5 // This file implements a standalone host process for Me2Me. |
6 | 6 |
7 #if defined(OS_WIN) | 7 #if defined(OS_WIN) |
8 #include <windows.h> | 8 #include <windows.h> |
9 #endif | 9 #endif |
10 | 10 |
(...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
60 const char kHostConfigSwitchName[] = "host-config"; | 60 const char kHostConfigSwitchName[] = "host-config"; |
61 | 61 |
62 const FilePath::CharType kDefaultAuthConfigFile[] = | 62 const FilePath::CharType kDefaultAuthConfigFile[] = |
63 FILE_PATH_LITERAL("auth.json"); | 63 FILE_PATH_LITERAL("auth.json"); |
64 const FilePath::CharType kDefaultHostConfigFile[] = | 64 const FilePath::CharType kDefaultHostConfigFile[] = |
65 FILE_PATH_LITERAL("host.json"); | 65 FILE_PATH_LITERAL("host.json"); |
66 | 66 |
67 const int kMinPortNumber = 12400; | 67 const int kMinPortNumber = 12400; |
68 const int kMaxPortNumber = 12409; | 68 const int kMaxPortNumber = 12409; |
69 | 69 |
70 const remoting::OAuthClientInfo kUnofficialOAuth2ClientInfo = { | |
71 "440925447803-2pi3v45bff6tp1rde2f7q6lgbor3o5uj.apps.googleusercontent.com", | |
72 "W2ieEsG-R1gIA4MMurGrgMc_" | |
73 }; | |
74 | |
75 const remoting::OAuthClientInfo kOfficialOAuth2ClientInfo = { | |
76 "440925447803-avn2sj1kc099s0r7v62je5s339mu0am1.apps.googleusercontent.com", | |
77 "Bgur6DFiOMM1h8x-AQpuTQlK" | |
78 }; | |
79 | |
70 } // namespace | 80 } // namespace |
71 | 81 |
72 namespace remoting { | 82 namespace remoting { |
73 | 83 |
74 class HostProcess | 84 class HostProcess |
75 : public HeartbeatSender::Listener { | 85 : public HeartbeatSender::Listener { |
76 public: | 86 public: |
77 HostProcess() | 87 HostProcess() |
78 : message_loop_(MessageLoop::TYPE_UI), | 88 : message_loop_(MessageLoop::TYPE_UI), |
89 #ifdef OFFICIAL_BUILD | |
90 oauth_use_official_client_id_(true), | |
91 #else | |
92 oauth_use_official_client_id_(false), | |
93 #endif | |
79 allow_nat_traversal_(true), | 94 allow_nat_traversal_(true), |
80 restarting_(false), | 95 restarting_(false), |
81 exit_code_(kSuccessExitCode) { | 96 exit_code_(kSuccessExitCode) { |
82 context_.reset( | 97 context_.reset( |
83 new ChromotingHostContext(message_loop_.message_loop_proxy())); | 98 new ChromotingHostContext(message_loop_.message_loop_proxy())); |
84 context_->Start(); | 99 context_->Start(); |
85 network_change_notifier_.reset(net::NetworkChangeNotifier::Create()); | 100 network_change_notifier_.reset(net::NetworkChangeNotifier::Create()); |
86 config_updated_timer_.reset(new base::DelayTimer<HostProcess>( | 101 config_updated_timer_.reset(new base::DelayTimer<HostProcess>( |
87 FROM_HERE, base::TimeDelta::FromSeconds(2), this, | 102 FROM_HERE, base::TimeDelta::FromSeconds(2), this, |
88 &HostProcess::ConfigUpdated)); | 103 &HostProcess::ConfigUpdated)); |
(...skipping 144 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
233 | 248 |
234 // Use an XMPP connection to the Talk network for session signalling. | 249 // Use an XMPP connection to the Talk network for session signalling. |
235 if (!auth_config.GetString(kXmppLoginConfigPath, &xmpp_login_) || | 250 if (!auth_config.GetString(kXmppLoginConfigPath, &xmpp_login_) || |
236 !(auth_config.GetString(kXmppAuthTokenConfigPath, &xmpp_auth_token_) || | 251 !(auth_config.GetString(kXmppAuthTokenConfigPath, &xmpp_auth_token_) || |
237 auth_config.GetString(kOAuthRefreshTokenConfigPath, | 252 auth_config.GetString(kOAuthRefreshTokenConfigPath, |
238 &oauth_refresh_token_))) { | 253 &oauth_refresh_token_))) { |
239 LOG(ERROR) << "XMPP credentials are not defined in the config."; | 254 LOG(ERROR) << "XMPP credentials are not defined in the config."; |
240 return false; | 255 return false; |
241 } | 256 } |
242 | 257 |
258 // It is okay to not have this value and we will use the default value | |
259 // depending on whether this is an official build or not. | |
Wez
2012/04/20 22:29:46
nit: Suggest "If the client-Id type to use is not
| |
260 auth_config.GetBoolean(kOAuthUseOfficialClientIdConfigPath, | |
261 &oauth_use_official_client_id_); | |
262 | |
243 if (!oauth_refresh_token_.empty()) { | 263 if (!oauth_refresh_token_.empty()) { |
244 xmpp_auth_token_ = ""; // This will be set to the access token later. | 264 xmpp_auth_token_ = ""; // This will be set to the access token later. |
245 xmpp_auth_service_ = "oauth2"; | 265 xmpp_auth_service_ = "oauth2"; |
246 } else if (!auth_config.GetString(kXmppAuthServiceConfigPath, | 266 } else if (!auth_config.GetString(kXmppAuthServiceConfigPath, |
247 &xmpp_auth_service_)) { | 267 &xmpp_auth_service_)) { |
248 // For the me2me host, we default to ClientLogin token for chromiumsync | 268 // For the me2me host, we default to ClientLogin token for chromiumsync |
249 // because earlier versions of the host had no HTTP stack with which to | 269 // because earlier versions of the host had no HTTP stack with which to |
250 // request an OAuth2 access token. | 270 // request an OAuth2 access token. |
251 xmpp_auth_service_ = kChromotingTokenDefaultServiceName; | 271 xmpp_auth_service_ = kChromotingTokenDefaultServiceName; |
252 } | 272 } |
(...skipping 28 matching lines...) Expand all Loading... | |
281 | 301 |
282 if (!signal_strategy_.get()) { | 302 if (!signal_strategy_.get()) { |
283 signal_strategy_.reset( | 303 signal_strategy_.reset( |
284 new XmppSignalStrategy(context_->jingle_thread(), xmpp_login_, | 304 new XmppSignalStrategy(context_->jingle_thread(), xmpp_login_, |
285 xmpp_auth_token_, xmpp_auth_service_)); | 305 xmpp_auth_token_, xmpp_auth_service_)); |
286 | 306 |
287 signaling_connector_.reset( | 307 signaling_connector_.reset( |
288 new SignalingConnector(signal_strategy_.get())); | 308 new SignalingConnector(signal_strategy_.get())); |
289 | 309 |
290 if (!oauth_refresh_token_.empty()) { | 310 if (!oauth_refresh_token_.empty()) { |
311 OAuthClientInfo client_info = kUnofficialOAuth2ClientInfo; | |
312 | |
313 #ifdef OFFICIAL_BUILD | |
314 if (oauth_use_official_client_id_) { | |
315 client_info = kOfficialOAuth2ClientInfo; | |
316 } | |
317 #endif // OFFICIAL_BUILD | |
318 | |
291 scoped_ptr<SignalingConnector::OAuthCredentials> oauth_credentials( | 319 scoped_ptr<SignalingConnector::OAuthCredentials> oauth_credentials( |
292 new SignalingConnector::OAuthCredentials( | 320 new SignalingConnector::OAuthCredentials( |
293 xmpp_login_, oauth_refresh_token_)); | 321 xmpp_login_, oauth_refresh_token_, client_info)); |
294 signaling_connector_->EnableOAuth( | 322 signaling_connector_->EnableOAuth( |
295 oauth_credentials.Pass(), | 323 oauth_credentials.Pass(), |
296 base::Bind(&HostProcess::OnOAuthFailed, base::Unretained(this)), | 324 base::Bind(&HostProcess::OnOAuthFailed, base::Unretained(this)), |
297 context_->url_request_context_getter()); | 325 context_->url_request_context_getter()); |
298 } | 326 } |
299 } | 327 } |
300 | 328 |
301 if (!desktop_environment_.get()) { | 329 if (!desktop_environment_.get()) { |
302 desktop_environment_ = | 330 desktop_environment_ = |
303 DesktopEnvironment::CreateForService(context_.get()); | 331 DesktopEnvironment::CreateForService(context_.get()); |
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
366 FilePath host_config_path_; | 394 FilePath host_config_path_; |
367 | 395 |
368 std::string host_id_; | 396 std::string host_id_; |
369 HostKeyPair key_pair_; | 397 HostKeyPair key_pair_; |
370 protocol::SharedSecretHash host_secret_hash_; | 398 protocol::SharedSecretHash host_secret_hash_; |
371 std::string xmpp_login_; | 399 std::string xmpp_login_; |
372 std::string xmpp_auth_token_; | 400 std::string xmpp_auth_token_; |
373 std::string xmpp_auth_service_; | 401 std::string xmpp_auth_service_; |
374 | 402 |
375 std::string oauth_refresh_token_; | 403 std::string oauth_refresh_token_; |
404 bool oauth_use_official_client_id_; | |
376 | 405 |
377 scoped_ptr<policy_hack::NatPolicy> nat_policy_; | 406 scoped_ptr<policy_hack::NatPolicy> nat_policy_; |
378 bool allow_nat_traversal_; | 407 bool allow_nat_traversal_; |
379 scoped_ptr<base::files::FilePathWatcher> config_watcher_; | 408 scoped_ptr<base::files::FilePathWatcher> config_watcher_; |
380 scoped_ptr<base::DelayTimer<HostProcess> > config_updated_timer_; | 409 scoped_ptr<base::DelayTimer<HostProcess> > config_updated_timer_; |
381 | 410 |
382 bool restarting_; | 411 bool restarting_; |
383 | 412 |
384 scoped_ptr<XmppSignalStrategy> signal_strategy_; | 413 scoped_ptr<XmppSignalStrategy> signal_strategy_; |
385 scoped_ptr<SignalingConnector> signaling_connector_; | 414 scoped_ptr<SignalingConnector> signaling_connector_; |
(...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
435 int CALLBACK WinMain(HINSTANCE instance, | 464 int CALLBACK WinMain(HINSTANCE instance, |
436 HINSTANCE previous_instance, | 465 HINSTANCE previous_instance, |
437 LPSTR command_line, | 466 LPSTR command_line, |
438 int show_command) { | 467 int show_command) { |
439 // CommandLine::Init() ignores the passed |argc| and |argv| on Windows getting | 468 // CommandLine::Init() ignores the passed |argc| and |argv| on Windows getting |
440 // the command line from GetCommandLineW(), so we can safely pass NULL here. | 469 // the command line from GetCommandLineW(), so we can safely pass NULL here. |
441 return main(0, NULL); | 470 return main(0, NULL); |
442 } | 471 } |
443 | 472 |
444 #endif | 473 #endif |
OLD | NEW |