Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(23)

Unified Diff: chrome/browser/sync/notifier/communicator/single_login_attempt.cc

Issue 1956001: Moved XMPP notifier library from chrome/browser/sync to chrome/common.... (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: '' Created 10 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/sync/notifier/communicator/single_login_attempt.cc
===================================================================
--- chrome/browser/sync/notifier/communicator/single_login_attempt.cc (revision 46353)
+++ chrome/browser/sync/notifier/communicator/single_login_attempt.cc (working copy)
@@ -1,570 +0,0 @@
-// Copyright (c) 2009 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include <algorithm>
-#include <string>
-#include <vector>
-
-#include "chrome/browser/sync/notifier/communicator/single_login_attempt.h"
-
-#include "base/logging.h"
-#include "chrome/browser/sync/notifier/communicator/connection_options.h"
-#include "chrome/browser/sync/notifier/communicator/connection_settings.h"
-#include "chrome/browser/sync/notifier/communicator/const_communicator.h"
-#include "chrome/browser/sync/notifier/communicator/login_failure.h"
-#include "chrome/browser/sync/notifier/communicator/login_settings.h"
-#include "chrome/browser/sync/notifier/communicator/product_info.h"
-#include "chrome/browser/sync/notifier/communicator/xmpp_connection_generator.h"
-#include "chrome/browser/sync/notifier/communicator/xmpp_socket_adapter.h"
-#include "talk/base/asynchttprequest.h"
-#include "talk/base/firewallsocketserver.h"
-#include "talk/base/signalthread.h"
-#include "talk/base/taskrunner.h"
-#include "talk/base/winsock_initializer.h"
-#include "talk/xmllite/xmlelement.h"
-#include "talk/xmpp/saslcookiemechanism.h"
-#include "talk/xmpp/saslhandler.h"
-#include "talk/xmpp/xmppclient.h"
-#include "talk/xmpp/xmppclientsettings.h"
-#include "talk/xmpp/xmppconstants.h"
-
-namespace notifier {
-
-static void GetClientErrorInformation(
- buzz::XmppClient* client,
- buzz::XmppEngine::Error* error,
- int* subcode,
- buzz::XmlElement** stream_error) {
- ASSERT(client != NULL);
- ASSERT(error && subcode && stream_error);
-
- *error = client->GetError(subcode);
-
- *stream_error = NULL;
- if (*error == buzz::XmppEngine::ERROR_STREAM) {
- const buzz::XmlElement* error_element = client->GetStreamError();
- if (error_element) {
- *stream_error = new buzz::XmlElement(*error_element);
- }
- }
-}
-
-namespace {
-
-const char kGaiaAuthMechanism[] = "X-GOOGLE-TOKEN";
-
-// This class looks for the X-GOOGLE-TOKEN auth mechanism and uses
-// that instead of the default auth mechanism (PLAIN).
-class GaiaOnlySaslHandler : public buzz::SaslHandler {
- public:
- GaiaOnlySaslHandler(
- const std::string& username,
- const std::string& token,
- const std::string& token_service)
- : username_(username),
- token_(token),
- token_service_(token_service) {}
-
- virtual std::string ChooseBestSaslMechanism(
- const std::vector<std::string> & mechanisms, bool encrypted) {
- return (std::find(mechanisms.begin(),
- mechanisms.end(), kGaiaAuthMechanism) !=
- mechanisms.end()) ? kGaiaAuthMechanism : "";
- }
-
- virtual buzz::SaslMechanism* CreateSaslMechanism(
- const std::string& mechanism) {
- return
- (mechanism == kGaiaAuthMechanism) ?
- new buzz::SaslCookieMechanism(
- kGaiaAuthMechanism, username_, token_, token_service_)
- : NULL;
- }
-
- virtual bool GetTlsServerInfo(const talk_base::SocketAddress& server,
- std::string* tls_server_hostname,
- std::string* tls_server_domain) {
- std::string server_ip = server.IPAsString();
- if ((server_ip == buzz::STR_TALK_GOOGLE_COM) ||
- (server_ip == buzz::STR_TALKX_L_GOOGLE_COM)) {
- // For Gaia auth, the talk.google.com server expects you to use
- // "gmail.com" in the stream, and expects the domain certificate
- // to be "gmail.com" as well.
- *tls_server_hostname = buzz::STR_GMAIL_COM;
- *tls_server_domain = buzz::STR_GMAIL_COM;
- return true;
- }
- return false;
- }
-
- private:
- std::string username_, token_, token_service_;
-};
-
-} // namespace
-
-SingleLoginAttempt::SingleLoginAttempt(talk_base::Task* parent,
- LoginSettings* login_settings,
- bool successful_connection)
- : talk_base::Task(parent),
- state_(buzz::XmppEngine::STATE_NONE),
- code_(buzz::XmppEngine::ERROR_NONE),
- subcode_(0),
- need_authentication_(false),
- certificate_expired_(false),
- cookie_refreshed_(false),
- successful_connection_(successful_connection),
- login_settings_(login_settings),
- client_(NULL) {
-#if defined(OS_WIN)
- talk_base::EnsureWinsockInit();
-#endif
- connection_generator_.reset(new XmppConnectionGenerator(
- this,
- &login_settings_->connection_options(),
- login_settings_->proxy_only(),
- login_settings_->server_list(),
- login_settings_->server_count()));
-
- connection_generator_->SignalExhaustedSettings.connect(
- this,
- &SingleLoginAttempt::OnAttemptedAllConnections);
- connection_generator_->SignalNewSettings.connect(
- this,
- &SingleLoginAttempt::DoLogin);
-}
-
-SingleLoginAttempt::~SingleLoginAttempt() {
- // If this assertion goes off, it means that "Stop()" didn't get called like
- // it should have been.
- ASSERT(client_ == NULL);
-}
-
-bool SingleLoginAttempt::auto_reconnect() const {
- return login_settings_->connection_options().auto_reconnect();
-}
-
-const talk_base::ProxyInfo& SingleLoginAttempt::proxy() const {
- ASSERT(connection_generator_.get());
- return connection_generator_->proxy();
-}
-
-int SingleLoginAttempt::ProcessStart() {
- ASSERT(GetState() == talk_base::Task::STATE_START);
- connection_generator_->StartGenerating();
-
- // After being started, this class is callback driven and does signaling from
- // those callbacks (with checks to see if it is done if it may be called back
- // from something that isn't a child task).
- return talk_base::Task::STATE_BLOCKED;
-}
-
-void SingleLoginAttempt::Stop() {
- ClearClient();
- talk_base::Task::Stop();
-
- // No more signals should happen after being stopped. This is needed because
- // some of these signals happen due to other components doing signaling which
- // may continue running even though this task is stopped.
- SignalUnexpectedDisconnect.disconnect_all();
- SignalRedirect.disconnect_all();
- SignalLoginFailure.disconnect_all();
- SignalNeedAutoReconnect.disconnect_all();
- SignalClientStateChange.disconnect_all();
-}
-
-void SingleLoginAttempt::OnAttemptedAllConnections(
- bool successfully_resolved_dns,
- int first_dns_error) {
-
- // Maybe we needed proxy authentication?
- if (need_authentication_) {
- LoginFailure failure(LoginFailure::PROXY_AUTHENTICATION_ERROR);
- SignalLoginFailure(failure);
- return;
- }
-
- if (certificate_expired_) {
- LoginFailure failure(LoginFailure::CERTIFICATE_EXPIRED_ERROR);
- SignalLoginFailure(failure);
- return;
- }
-
- if (!successfully_resolved_dns) {
- code_ = buzz::XmppEngine::ERROR_SOCKET;
- subcode_ = first_dns_error;
- }
-
- LOG(INFO) << "Connection failed with error " << code_;
-
- // We were connected and we had a problem.
- if (successful_connection_ && auto_reconnect()) {
- SignalNeedAutoReconnect();
- // Expect to be deleted at this point.
- return;
- }
-
- DiagnoseConnectionError();
-}
-
-void SingleLoginAttempt::UseNextConnection() {
- ASSERT(connection_generator_.get() != NULL);
- ClearClient();
- connection_generator_->UseNextConnection();
-}
-
-void SingleLoginAttempt::UseCurrentConnection() {
- ASSERT(connection_generator_.get() != NULL);
- ClearClient();
- connection_generator_->UseCurrentConnection();
-}
-
-void SingleLoginAttempt::DoLogin(
- const ConnectionSettings& connection_settings) {
- if (client_) {
- return;
- }
-
- buzz::XmppClientSettings client_settings;
- // Set the user settings portion.
- *static_cast<buzz::XmppClientSettings*>(&client_settings) =
- login_settings_->user_settings();
- // Fill in the rest of the client settings.
- connection_settings.FillXmppClientSettings(&client_settings);
-
- client_ = new buzz::XmppClient(this);
- SignalLogInput.repeat(client_->SignalLogInput);
- SignalLogOutput.repeat(client_->SignalLogOutput);
-
- // Listen for connection progress.
- client_->SignalStateChange.connect(this,
- &SingleLoginAttempt::OnClientStateChange);
-
- // Transition to "start".
- OnClientStateChange(buzz::XmppEngine::STATE_START);
- // Start connecting.
- client_->Connect(client_settings, login_settings_->lang(),
- CreateSocket(client_settings),
- NULL,
- CreateSaslHandler(client_settings));
- client_->Start();
-}
-
-void SingleLoginAttempt::OnAuthenticationError() {
- // We can check this flag later if all connection options fail.
- need_authentication_ = true;
-}
-
-void SingleLoginAttempt::OnCertificateExpired() {
- // We can check this flag later if all connection options fail.
- certificate_expired_ = true;
-}
-
-buzz::AsyncSocket* SingleLoginAttempt::CreateSocket(
- const buzz::XmppClientSettings& xcs) {
- bool allow_unverified_certs =
- login_settings_->connection_options().allow_unverified_certs();
- XmppSocketAdapter* adapter = new XmppSocketAdapter(xcs,
- allow_unverified_certs);
- adapter->SignalAuthenticationError.connect(
- this,
- &SingleLoginAttempt::OnAuthenticationError);
- if (login_settings_->firewall()) {
- adapter->set_firewall(true);
- }
- return adapter;
-}
-
-buzz::SaslHandler* SingleLoginAttempt::CreateSaslHandler(
- const buzz::XmppClientSettings& xcs) {
- buzz::Jid jid(xcs.user(), xcs.host(), buzz::STR_EMPTY);
- return new GaiaOnlySaslHandler(
- jid.Str(), xcs.auth_cookie(), xcs.token_service());
-}
-
-void SingleLoginAttempt::OnFreshAuthCookie(const std::string& auth_cookie) {
- // Remember this is a fresh cookie.
- cookie_refreshed_ = true;
-
- // TODO(sync): do the cookie logic (part of which is in the #if 0 below).
-
- // The following code is what PhoneWindow does for the equivalent method.
-#if 0
- // Save cookie
- AccountInfo current(account_history_.current());
- current.set_auth_cookie(auth_cookie);
- account_history_.set_current(current);
-
- // Calc next time to refresh cookie, between 5 and 10 days. The cookie has
- // 14 days of life; this gives at least 4 days of retries before the current
- // cookie expires, maximizing the chance of having a valid cookie next time
- // the connection servers go down.
- FTULL now;
-
- // NOTE: The following line is win32. Address this when implementing this
- // code (doing "the cookie logic").
- GetSystemTimeAsFileTime(&(now.ft));
- ULONGLONG five_days = (ULONGLONG)10000 * 1000 * 60 * 60 * 24 * 5; // 5 days
- ULONGLONG random = (ULONGLONG)10000 * // get to 100 ns units
- ((rand() % (5 * 24 * 60)) * (60 * 1000) + // random min. in 5 day period
- (rand() % 1000) * 60); // random 1/1000th of a minute
- next_cookie_refresh_ = now.ull + five_days + random; // 5-10 days
-#endif
-}
-
-void SingleLoginAttempt::DiagnoseConnectionError() {
- switch (code_) {
- case buzz::XmppEngine::ERROR_MISSING_USERNAME:
- case buzz::XmppEngine::ERROR_NETWORK_TIMEOUT:
- case buzz::XmppEngine::ERROR_DOCUMENT_CLOSED:
- case buzz::XmppEngine::ERROR_BIND:
- case buzz::XmppEngine::ERROR_AUTH:
- case buzz::XmppEngine::ERROR_TLS:
- case buzz::XmppEngine::ERROR_UNAUTHORIZED:
- case buzz::XmppEngine::ERROR_VERSION:
- case buzz::XmppEngine::ERROR_STREAM:
- case buzz::XmppEngine::ERROR_XML:
- case buzz::XmppEngine::ERROR_NONE:
- default: {
- LoginFailure failure(LoginFailure::XMPP_ERROR, code_, subcode_);
- SignalLoginFailure(failure);
- return;
- }
-
- // The following errors require diagnosistics:
- // * spurious close of connection
- // * socket errors after auth
- case buzz::XmppEngine::ERROR_CONNECTION_CLOSED:
- case buzz::XmppEngine::ERROR_SOCKET:
- break;
- }
-
- talk_base::AsyncHttpRequest *http_request =
- new talk_base::AsyncHttpRequest(GetUserAgentString());
- http_request->set_host("www.google.com");
- http_request->set_port(80);
- http_request->set_secure(false);
- http_request->request().path = "/";
- http_request->request().verb = talk_base::HV_GET;
-
- talk_base::ProxyInfo proxy;
- ASSERT(connection_generator_.get() != NULL);
- if (connection_generator_.get()) {
- proxy = connection_generator_->proxy();
- }
- http_request->set_proxy(proxy);
- http_request->set_firewall(login_settings_->firewall());
-
- http_request->SignalWorkDone.connect(this,
- &SingleLoginAttempt::OnHttpTestDone);
- http_request->Start();
- http_request->Release();
-}
-
-void SingleLoginAttempt::OnHttpTestDone(talk_base::SignalThread* thread) {
- ASSERT(thread != NULL);
-
- talk_base::AsyncHttpRequest* request =
- static_cast<talk_base::AsyncHttpRequest*>(thread);
-
- if (request->response().scode == 200) {
- // We were able to do an HTTP GET of www.google.com:80
-
- //
- // The original error should be reported
- //
- LoginFailure failure(LoginFailure::XMPP_ERROR, code_, subcode_);
- SignalLoginFailure(failure);
- return;
- }
-
- // Otherwise lets transmute the error into ERROR_SOCKET, and put the subcode
- // as an indicator of what we think the problem might be.
-
-#if 0
- // TODO(sync): determine if notifier has an analogous situation.
-
- //
- // We weren't able to do an HTTP GET of www.google.com:80
- //
- GAutoupdater::Version version_logged_in(g_options.version_logged_in());
- GAutoupdater::Version version_installed(GetProductVersion().c_str());
- if (version_logged_in < version_installed) {
- //
- // Google Talk has been updated and can no longer connect to the Google
- // Talk Service. Your firewall is probably not allowing the new version of
- // Google Talk to connect to the internet. Please adjust your firewall
- // settings to allow the new version of Google Talk to connect to the
- // internet.
- //
- // We'll use the "error=1" to help figure this out for now.
- //
- LoginFailure failure(LoginFailure::XMPP_ERROR,
- buzz::XmppEngine::ERROR_SOCKET,
- 1);
- SignalLoginFailure(failure);
- return;
- }
-#endif
-
- //
- // Any other checking we can add here?
- //
-
- //
- // Google Talk is unable to use your internet connection. Either your network
- // isn't configured or Google Talk is being blocked by a local firewall.
- //
- // We'll use the "error=0" to help figure this out for now
- //
- LoginFailure failure(LoginFailure::XMPP_ERROR,
- buzz::XmppEngine::ERROR_SOCKET,
- 0);
- SignalLoginFailure(failure);
-}
-
-void SingleLoginAttempt::OnClientStateChange(buzz::XmppEngine::State state) {
- if (state_ == state)
- return;
-
- buzz::XmppEngine::State previous_state = state_;
- state_ = state;
-
- switch (state) {
- case buzz::XmppEngine::STATE_NONE:
- case buzz::XmppEngine::STATE_START:
- case buzz::XmppEngine::STATE_OPENING:
- // Do nothing.
- break;
- case buzz::XmppEngine::STATE_OPEN:
- successful_connection_ = true;
- break;
- case buzz::XmppEngine::STATE_CLOSED:
- OnClientStateChangeClosed(previous_state);
- break;
- }
- SignalClientStateChange(state);
- if (state_ == buzz::XmppEngine::STATE_CLOSED) {
- OnClientStateChange(buzz::XmppEngine::STATE_NONE);
- }
-}
-
-void SingleLoginAttempt::ClearClient() {
- if (client_ != NULL) {
- client_->Disconnect();
-
- // If this assertion goes off, it means that the disconnect didn't occur
- // properly. See SingleLoginAttempt::OnClientStateChange,
- // case XmppEngine::STATE_CLOSED
- ASSERT(client_ == NULL);
- }
-}
-
-void SingleLoginAttempt::OnClientStateChangeClosed(
- buzz::XmppEngine::State previous_state) {
- buzz::XmppEngine::Error error = buzz::XmppEngine::ERROR_NONE;
- int error_subcode = 0;
- buzz::XmlElement* stream_error_ptr;
- GetClientErrorInformation(client_,
- &error,
- &error_subcode,
- &stream_error_ptr);
- scoped_ptr<buzz::XmlElement> stream_error(stream_error_ptr);
-
- client_->SignalStateChange.disconnect(this);
- client_ = NULL;
-
- if (error == buzz::XmppEngine::ERROR_NONE) {
- SignalLogoff();
- return;
- } else if (previous_state == buzz::XmppEngine::STATE_OPEN) {
- // Handler should attempt reconnect.
- SignalUnexpectedDisconnect();
- return;
- } else {
- HandleConnectionError(error, error_subcode, stream_error.get());
- }
-}
-
-void SingleLoginAttempt::HandleConnectionPasswordError() {
- LOG(INFO) << "SingleLoginAttempt::HandleConnectionPasswordError";
- LoginFailure failure(LoginFailure::XMPP_ERROR, code_, subcode_);
- SignalLoginFailure(failure);
-}
-
-void SingleLoginAttempt::HandleConnectionError(
- buzz::XmppEngine::Error code,
- int subcode,
- const buzz::XmlElement* stream_error) {
- LOG(INFO) << "(" << code << ", " << subcode << ")";
-
- // Save off the error code information, so we can use it to tell the user
- // what went wrong if all else fails.
- code_ = code;
- subcode_ = subcode;
- if ((code_ == buzz::XmppEngine::ERROR_UNAUTHORIZED) ||
- (code_ == buzz::XmppEngine::ERROR_MISSING_USERNAME)) {
- // There was a problem with credentials (username/password).
- HandleConnectionPasswordError();
- return;
- }
-
- // Unexpected disconnect,
- // Unreachable host,
- // Or internal server binding error -
- // All these are temporary problems, so continue reconnecting.
-
- // GaiaAuth signals this directly via SignalCertificateExpired, but
- // SChannelAdapter propagates the error through SocketWindow as a socket
- // error.
- if (code_ == buzz::XmppEngine::ERROR_SOCKET &&
- subcode_ == SEC_E_CERT_EXPIRED) {
- certificate_expired_ = true;
- }
-
- login_settings_->modifiable_user_settings()->set_resource("");
-
- // Look for stream::error server redirection stanza "see-other-host".
- if (stream_error) {
- const buzz::XmlElement* other =
- stream_error->FirstNamed(buzz::QN_XSTREAM_SEE_OTHER_HOST);
- if (other) {
- const buzz::XmlElement* text =
- stream_error->FirstNamed(buzz::QN_XSTREAM_TEXT);
- if (text) {
- // Yep, its a "stream:error" with "see-other-host" text, let's parse
- // out the server:port, and then reconnect with that.
- const std::string& redirect = text->BodyText();
- size_t colon = redirect.find(":");
- int redirect_port = kDefaultXmppPort;
- std::string redirect_server;
- if (colon == std::string::npos) {
- redirect_server = redirect;
- } else {
- redirect_server = redirect.substr(0, colon);
- const std::string& port_text = redirect.substr(colon + 1);
- std::istringstream ist(port_text);
- ist >> redirect_port;
- }
- // We never allow a redirect to port 0.
- if (redirect_port == 0) {
- redirect_port = kDefaultXmppPort;
- }
- SignalRedirect(redirect_server, redirect_port);
- // May be deleted at this point.
- return;
- }
- }
- }
-
- ASSERT(connection_generator_.get() != NULL);
- if (!connection_generator_.get()) {
- return;
- }
-
- // Iterate to the next possible connection (still trying to connect).
- UseNextConnection();
-}
-
-} // namespace notifier

Powered by Google App Engine
This is Rietveld 408576698