Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/host/plugin/daemon_controller.h" | 5 #include "remoting/host/plugin/daemon_controller.h" |
| 6 | 6 |
| 7 #include <launch.h> | |
| 8 #include <ServiceManagement/ServiceManagement.h> | |
| 9 | |
| 7 #include "base/basictypes.h" | 10 #include "base/basictypes.h" |
| 11 #include "base/bind.h" | |
| 8 #include "base/compiler_specific.h" | 12 #include "base/compiler_specific.h" |
| 9 #include "base/logging.h" | 13 #include "base/logging.h" |
| 14 #include "base/mac/authorization_util.h" | |
| 15 #include "base/mac/foundation_util.h" | |
| 16 #include "base/mac/mac_logging.h" | |
| 17 #include "base/mac/scoped_authorizationref.h" | |
| 18 #include "base/mac/scoped_cftyperef.h" | |
| 19 #include "base/threading/thread.h" | |
| 10 | 20 |
| 11 namespace remoting { | 21 namespace remoting { |
| 12 | 22 |
| 13 namespace { | 23 namespace { |
| 14 | 24 |
| 25 // The name of the Remoting Host service that is registered with launchd. | |
| 26 #define kServiceName "com.google.chrome_remote_desktop" | |
|
Jamie
2012/03/23 03:24:05
Any reason not to make this a const char[]?
Lambros
2012/03/26 19:15:26
The CFSTR() macro seems to need a literal string.
| |
| 27 | |
| 28 // This helper script is executed as root. It is passed a command-line option | |
| 29 // (--enable or --disable), which causes it to create or remove a trigger file. | |
| 30 // The trigger file (defined in the service's plist file) informs launchd | |
| 31 // whether the Host service should be running. Creating the trigger file causes | |
| 32 // launchd to immediately start the service. Deleting the trigger file has no | |
| 33 // immediate effect, but it prevents the service from being restarted if it | |
| 34 // becomes stopped. | |
| 35 const char kStartStopTool[] = "/Library/PrivilegedHelperTools/me2me.sh"; | |
|
garykac
2012/03/23 16:28:29
Since this is a system directory that includes fil
Lambros
2012/03/26 19:15:26
Done.
| |
| 36 | |
| 15 class DaemonControllerMac : public remoting::DaemonController { | 37 class DaemonControllerMac : public remoting::DaemonController { |
| 16 public: | 38 public: |
| 17 DaemonControllerMac(); | 39 DaemonControllerMac(); |
| 40 virtual ~DaemonControllerMac(); | |
| 18 | 41 |
| 19 virtual State GetState() OVERRIDE; | 42 virtual State GetState() OVERRIDE; |
| 20 virtual bool SetPin(const std::string& pin) OVERRIDE; | 43 virtual bool SetPin(const std::string& pin) OVERRIDE; |
| 21 virtual bool Start() OVERRIDE; | 44 virtual bool Start() OVERRIDE; |
| 22 virtual bool Stop() OVERRIDE; | 45 virtual bool Stop() OVERRIDE; |
| 23 | 46 |
| 24 private: | 47 private: |
| 48 void DoStart(); | |
| 49 void DoStop(); | |
| 50 | |
| 51 bool RunToolScriptAsRoot(const char* command); | |
| 52 bool StopService(); | |
| 53 | |
| 54 // The API for gaining root privileges is blocking (it prompts the user for | |
| 55 // a password). Since Start() and Stop() must not block the main thread, they | |
| 56 // need to post their tasks to a separate thread. | |
| 57 base::Thread root_thread_; | |
|
Jamie
2012/03/23 03:24:05
I think auth_thread might be a better name, since
Sergey Ulanov
2012/03/23 17:56:48
+1
Lambros
2012/03/26 19:15:26
Done.
| |
| 58 | |
| 59 // This distinguishes between STATE_START_FAILED and STATE_STOPPED in | |
| 60 // GetState(). | |
| 61 bool start_failed_; | |
| 62 | |
| 25 DISALLOW_COPY_AND_ASSIGN(DaemonControllerMac); | 63 DISALLOW_COPY_AND_ASSIGN(DaemonControllerMac); |
| 26 }; | 64 }; |
| 27 | 65 |
| 28 DaemonControllerMac::DaemonControllerMac() { | 66 DaemonControllerMac::DaemonControllerMac() |
| 67 : root_thread_("Root thread"), | |
| 68 start_failed_(false) { | |
| 69 root_thread_.Start(); | |
| 70 } | |
| 71 | |
| 72 DaemonControllerMac::~DaemonControllerMac() { | |
| 73 // This will block if the thread is waiting on a root password prompt. There | |
| 74 // doesn't seem to be an easy solution for this, other than to spawn a | |
| 75 // separate process to do the root elevation. | |
| 76 | |
| 77 // TODO(lambroslambrou): Improve this, either by finding a way to terminate | |
| 78 // the thread, or by moving to a separate process. | |
| 79 root_thread_.Stop(); | |
| 29 } | 80 } |
| 30 | 81 |
| 31 remoting::DaemonController::State DaemonControllerMac::GetState() { | 82 remoting::DaemonController::State DaemonControllerMac::GetState() { |
| 32 return remoting::DaemonController::STATE_NOT_IMPLEMENTED; | 83 base::mac::ScopedCFTypeRef<CFDictionaryRef> job( |
| 84 SMJobCopyDictionary(kSMDomainUserLaunchd, CFSTR(kServiceName))); | |
| 85 if (!job) | |
| 86 return remoting::DaemonController::STATE_NOT_INSTALLED; | |
|
Jamie
2012/03/23 03:24:05
Until we have an installation story, I think you s
Lambros
2012/03/26 19:15:26
Done.
| |
| 87 | |
| 88 if (CFDictionaryGetValue(job.get(), CFSTR("PID"))) { | |
| 89 return remoting::DaemonController::STATE_STARTED; | |
| 90 } else { | |
| 91 // Service is stopped, or a start attempt failed. | |
| 92 return start_failed_ ? remoting::DaemonController::STATE_START_FAILED : | |
| 93 remoting::DaemonController::STATE_STOPPED; | |
| 94 } | |
| 33 } | 95 } |
| 34 | 96 |
| 35 bool DaemonControllerMac::SetPin(const std::string& pin) { | 97 bool DaemonControllerMac::SetPin(const std::string& pin) { |
| 36 NOTIMPLEMENTED(); | 98 NOTIMPLEMENTED(); |
| 37 return false; | 99 return false; |
| 38 } | 100 } |
| 39 | 101 |
| 40 bool DaemonControllerMac::Start() { | 102 bool DaemonControllerMac::Start() { |
| 41 NOTIMPLEMENTED(); | 103 start_failed_ = false; |
| 42 return false; | 104 root_thread_.message_loop_proxy()->PostTask( |
| 105 FROM_HERE, | |
| 106 base::Bind(&DaemonControllerMac::DoStart, base::Unretained(this))); | |
|
Sergey Ulanov
2012/03/23 17:56:48
Add comment that it is safe to use base::Unretaine
Lambros
2012/03/26 19:15:26
Done.
| |
| 107 return true; | |
| 43 } | 108 } |
| 44 | 109 |
| 45 bool DaemonControllerMac::Stop() { | 110 bool DaemonControllerMac::Stop() { |
| 46 NOTIMPLEMENTED(); | 111 root_thread_.message_loop_proxy()->PostTask( |
| 47 return false; | 112 FROM_HERE, |
| 113 base::Bind(&DaemonControllerMac::DoStop, base::Unretained(this))); | |
| 114 return true; | |
| 115 } | |
| 116 | |
| 117 void DaemonControllerMac::DoStart() { | |
| 118 // Creating the trigger file causes launchd to start the service, so the | |
| 119 // extra step performed in DoStop() is not necessary here. | |
| 120 if (!RunToolScriptAsRoot("--enable")) | |
| 121 start_failed_ = true; | |
| 122 } | |
| 123 | |
| 124 void DaemonControllerMac::DoStop() { | |
| 125 if (!RunToolScriptAsRoot("--disable")) | |
| 126 return; | |
| 127 | |
| 128 // Deleting the trigger file does not cause launchd to stop the service. | |
| 129 // Since the service is running for the local user's desktop (not as root), | |
| 130 // it has to be stopped for that user. This cannot easily be done in the | |
| 131 // shell-script running as root, so it is done here instead. | |
| 132 StopService(); | |
| 133 } | |
| 134 | |
| 135 bool DaemonControllerMac::RunToolScriptAsRoot(const char* command) { | |
| 136 base::mac::ScopedAuthorizationRef authorization( | |
| 137 base::mac::AuthorizationCreateToRunAsRoot(CFSTR(""))); | |
| 138 if (!authorization) { | |
| 139 LOG(ERROR) << "Failed to get root privileges."; | |
| 140 return false; | |
| 141 } | |
| 142 | |
| 143 const char* arguments[] = {command, NULL}; | |
|
Sergey Ulanov
2012/03/23 17:56:48
nit: add spaces after { and before }.
Lambros
2012/03/26 19:15:26
Done.
| |
| 144 int exit_status; | |
| 145 OSStatus status = base::mac::ExecuteWithPrivilegesAndWait( | |
| 146 authorization.get(), | |
| 147 kStartStopTool, | |
| 148 kAuthorizationFlagDefaults, | |
| 149 arguments, | |
| 150 NULL, | |
| 151 &exit_status); | |
| 152 if (status != errAuthorizationSuccess) { | |
| 153 OSSTATUS_LOG(ERROR, status) << "AuthorizationExecuteWithPrivileges"; | |
| 154 return false; | |
| 155 } | |
| 156 if (exit_status != 0) { | |
| 157 LOG(ERROR) << kStartStopTool << " failed with exit status " << exit_status; | |
| 158 return false; | |
| 159 } | |
| 160 | |
| 161 return true; | |
| 162 } | |
| 163 | |
| 164 bool DaemonControllerMac::StopService() { | |
| 165 launch_data_t message = launch_data_alloc(LAUNCH_DATA_DICTIONARY); | |
|
Sergey Ulanov
2012/03/23 17:56:48
Maybe move ScopedLaunchData from chrome/browser/ma
| |
| 166 launch_data_dict_insert(message, launch_data_new_string(kServiceName), | |
| 167 LAUNCH_KEY_STOPJOB); | |
| 168 launch_data_t response = launch_msg(message); | |
| 169 launch_data_free(message); | |
| 170 | |
| 171 if (!response) { | |
| 172 LOG(ERROR) << "Failed to send message to launchd"; | |
| 173 return false; | |
| 174 } | |
| 175 | |
| 176 bool success = false; | |
| 177 if (launch_data_get_type(response) == LAUNCH_DATA_ERRNO) { | |
| 178 int error = launch_data_get_errno(response); | |
| 179 if (error) { | |
| 180 LOG(ERROR) << "launchd returned error " << error; | |
| 181 } else { | |
| 182 success = true; | |
| 183 } | |
| 184 } else { | |
| 185 LOG(ERROR) << "launchd returned unexpected response"; | |
| 186 } | |
| 187 | |
| 188 launch_data_free(response); | |
| 189 return success; | |
| 48 } | 190 } |
| 49 | 191 |
| 50 } // namespace | 192 } // namespace |
| 51 | 193 |
| 52 DaemonController* remoting::DaemonController::Create() { | 194 DaemonController* remoting::DaemonController::Create() { |
| 53 return new DaemonControllerMac(); | 195 return new DaemonControllerMac(); |
| 54 } | 196 } |
| 55 | 197 |
| 56 } // namespace remoting | 198 } // namespace remoting |
| OLD | NEW |