OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chromeos/dbus/session_manager_client.h" | 5 #include "chromeos/dbus/session_manager_client.h" |
6 | 6 |
| 7 #include <sys/socket.h> |
| 8 |
7 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/callback.h" |
8 #include "base/files/file_path.h" | 11 #include "base/files/file_path.h" |
9 #include "base/files/file_util.h" | 12 #include "base/files/file_util.h" |
10 #include "base/location.h" | 13 #include "base/location.h" |
11 #include "base/path_service.h" | 14 #include "base/path_service.h" |
12 #include "base/strings/string_number_conversions.h" | 15 #include "base/strings/string_number_conversions.h" |
13 #include "base/strings/string_util.h" | 16 #include "base/strings/string_util.h" |
14 #include "base/task_runner_util.h" | 17 #include "base/task_runner_util.h" |
15 #include "base/threading/worker_pool.h" | 18 #include "base/threading/worker_pool.h" |
16 #include "chromeos/chromeos_paths.h" | 19 #include "chromeos/chromeos_paths.h" |
17 #include "chromeos/dbus/blocking_method_caller.h" | 20 #include "chromeos/dbus/blocking_method_caller.h" |
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
51 // Helper to write a file in a background thread. | 54 // Helper to write a file in a background thread. |
52 void StoreFile(const base::FilePath& path, const std::string& data) { | 55 void StoreFile(const base::FilePath& path, const std::string& data) { |
53 const int size = static_cast<int>(data.size()); | 56 const int size = static_cast<int>(data.size()); |
54 if (path.empty() || | 57 if (path.empty() || |
55 !base::CreateDirectory(path.DirName()) || | 58 !base::CreateDirectory(path.DirName()) || |
56 base::WriteFile(path, data.data(), size) != size) { | 59 base::WriteFile(path, data.data(), size) != size) { |
57 LOG(WARNING) << "Failed to write to " << path.value(); | 60 LOG(WARNING) << "Failed to write to " << path.value(); |
58 } | 61 } |
59 } | 62 } |
60 | 63 |
| 64 // Creates a pair of file descriptors that form a conduit for trustworthy |
| 65 // transfer of credentials between Chrome and the session_manager |
| 66 void CreateValidCredConduit(dbus::FileDescriptor* local_auth_fd, |
| 67 dbus::FileDescriptor* remote_auth_fd) { |
| 68 int sockets[2] = {-1, -1}; |
| 69 if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets) < 0) { |
| 70 PLOG(ERROR) << "Failed to create a unix domain socketpair"; |
| 71 return; |
| 72 } |
| 73 |
| 74 local_auth_fd->PutValue(sockets[0]); |
| 75 local_auth_fd->CheckValidity(); |
| 76 |
| 77 remote_auth_fd->PutValue(sockets[1]); |
| 78 remote_auth_fd->CheckValidity(); |
| 79 } |
| 80 |
61 } // namespace | 81 } // namespace |
62 | 82 |
63 // The SessionManagerClient implementation used in production. | 83 // The SessionManagerClient implementation used in production. |
64 class SessionManagerClientImpl : public SessionManagerClient { | 84 class SessionManagerClientImpl : public SessionManagerClient { |
65 public: | 85 public: |
66 SessionManagerClientImpl() | 86 SessionManagerClientImpl() |
67 : session_manager_proxy_(NULL), | 87 : session_manager_proxy_(NULL), |
68 screen_is_locked_(false), | 88 screen_is_locked_(false), |
69 weak_ptr_factory_(this) {} | 89 weak_ptr_factory_(this) {} |
70 | 90 |
(...skipping 18 matching lines...) Expand all Loading... |
89 | 109 |
90 bool IsScreenLocked() const override { return screen_is_locked_; } | 110 bool IsScreenLocked() const override { return screen_is_locked_; } |
91 | 111 |
92 void EmitLoginPromptVisible() override { | 112 void EmitLoginPromptVisible() override { |
93 SimpleMethodCallToSessionManager( | 113 SimpleMethodCallToSessionManager( |
94 login_manager::kSessionManagerEmitLoginPromptVisible); | 114 login_manager::kSessionManagerEmitLoginPromptVisible); |
95 FOR_EACH_OBSERVER(Observer, observers_, EmitLoginPromptVisibleCalled()); | 115 FOR_EACH_OBSERVER(Observer, observers_, EmitLoginPromptVisibleCalled()); |
96 } | 116 } |
97 | 117 |
98 void RestartJob(int pid, const std::string& command_line) override { | 118 void RestartJob(int pid, const std::string& command_line) override { |
99 dbus::MethodCall method_call(login_manager::kSessionManagerInterface, | 119 dbus::ScopedFileDescriptor local_auth_fd(new dbus::FileDescriptor()); |
100 login_manager::kSessionManagerRestartJob); | 120 dbus::ScopedFileDescriptor remote_auth_fd(new dbus::FileDescriptor()); |
101 dbus::MessageWriter writer(&method_call); | 121 |
102 writer.AppendInt32(pid); | 122 // The session_manager provides a new method to replace RestartJob, called |
103 writer.AppendString(command_line); | 123 // RestartJobWithAuth, that is able to be used correctly within a PID |
104 session_manager_proxy_->CallMethod( | 124 // namespace. To use it, the caller must create a unix domain socket pair |
105 &method_call, | 125 // and pass one end over dbus while holding the local end open for the |
106 dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, | 126 // duration of the call. |
107 base::Bind(&SessionManagerClientImpl::OnRestartJob, | 127 // Here, we call CreateValidCredConduit() to create the socket pair, |
108 weak_ptr_factory_.GetWeakPtr())); | 128 // and then pass both ends along to CallRestartJobWithValidFd(), which |
| 129 // takes care of them from there. |
| 130 // NB: PostTaskAndReply ensures that the second callback (which owns the |
| 131 // ScopedFileDescriptor objects) outlives the first, so passing the |
| 132 // bare pointers to CreateValidCredConduit is safe. |
| 133 base::WorkerPool::PostTaskAndReply( |
| 134 FROM_HERE, base::Bind(&CreateValidCredConduit, local_auth_fd.get(), |
| 135 remote_auth_fd.get()), |
| 136 base::Bind(&SessionManagerClientImpl::CallRestartJobWithValidFd, |
| 137 weak_ptr_factory_.GetWeakPtr(), base::Passed(&local_auth_fd), |
| 138 base::Passed(&remote_auth_fd), command_line), |
| 139 false); |
109 } | 140 } |
110 | 141 |
111 void StartSession(const std::string& user_email) override { | 142 void StartSession(const std::string& user_email) override { |
112 dbus::MethodCall method_call(login_manager::kSessionManagerInterface, | 143 dbus::MethodCall method_call(login_manager::kSessionManagerInterface, |
113 login_manager::kSessionManagerStartSession); | 144 login_manager::kSessionManagerStartSession); |
114 dbus::MessageWriter writer(&method_call); | 145 dbus::MessageWriter writer(&method_call); |
115 writer.AppendString(user_email); | 146 writer.AppendString(user_email); |
116 writer.AppendString(""); // Unique ID is deprecated | 147 writer.AppendString(""); // Unique ID is deprecated |
117 session_manager_proxy_->CallMethod( | 148 session_manager_proxy_->CallMethod( |
118 &method_call, | 149 &method_call, |
(...skipping 253 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
372 session_manager_proxy_->CallMethod( | 403 session_manager_proxy_->CallMethod( |
373 &method_call, | 404 &method_call, |
374 dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, | 405 dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, |
375 base::Bind( | 406 base::Bind( |
376 &SessionManagerClientImpl::OnStorePolicy, | 407 &SessionManagerClientImpl::OnStorePolicy, |
377 weak_ptr_factory_.GetWeakPtr(), | 408 weak_ptr_factory_.GetWeakPtr(), |
378 method_name, | 409 method_name, |
379 callback)); | 410 callback)); |
380 } | 411 } |
381 | 412 |
| 413 // Calls RestartJobWithAuth to tell the session manager to restart the |
| 414 // browser using the contents of command_line, authorizing the call |
| 415 // using credentials acquired via remote_auth_fd. |
| 416 // Ownership of local_auth_fd is held for the duration of the dbus call. |
| 417 void CallRestartJobWithValidFd(dbus::ScopedFileDescriptor local_auth_fd, |
| 418 dbus::ScopedFileDescriptor remote_auth_fd, |
| 419 const std::string& command_line) { |
| 420 dbus::MethodCall method_call( |
| 421 login_manager::kSessionManagerInterface, |
| 422 login_manager::kSessionManagerRestartJobWithAuth); |
| 423 dbus::MessageWriter writer(&method_call); |
| 424 writer.AppendFileDescriptor(*remote_auth_fd); |
| 425 writer.AppendString(command_line); |
| 426 |
| 427 // Ownership of local_auth_fd is passed to the callback that is to be |
| 428 // called on completion of this method call. This keeps the browser end |
| 429 // of the socket-pair alive for the duration of the RPC. |
| 430 session_manager_proxy_->CallMethod( |
| 431 &method_call, dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, |
| 432 base::Bind(&SessionManagerClientImpl::OnRestartJob, |
| 433 weak_ptr_factory_.GetWeakPtr(), |
| 434 base::Passed(&local_auth_fd))); |
| 435 } |
| 436 |
382 // Called when kSessionManagerRestartJob method is complete. | 437 // Called when kSessionManagerRestartJob method is complete. |
383 void OnRestartJob(dbus::Response* response) { | 438 // Now that the call is complete, local_auth_fd can be closed and discarded, |
| 439 // which will happen automatically when it goes out of scope. |
| 440 void OnRestartJob(dbus::ScopedFileDescriptor local_auth_fd, |
| 441 dbus::Response* response) { |
384 LOG_IF(ERROR, !response) | 442 LOG_IF(ERROR, !response) |
385 << "Failed to call " | 443 << "Failed to call " |
386 << login_manager::kSessionManagerRestartJob; | 444 << login_manager::kSessionManagerRestartJob; |
387 } | 445 } |
388 | 446 |
389 // Called when kSessionManagerStartSession method is complete. | 447 // Called when kSessionManagerStartSession method is complete. |
390 void OnStartSession(dbus::Response* response) { | 448 void OnStartSession(dbus::Response* response) { |
391 LOG_IF(ERROR, !response) | 449 LOG_IF(ERROR, !response) |
392 << "Failed to call " | 450 << "Failed to call " |
393 << login_manager::kSessionManagerStartSession; | 451 << login_manager::kSessionManagerStartSession; |
(...skipping 350 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
744 | 802 |
745 SessionManagerClient* SessionManagerClient::Create( | 803 SessionManagerClient* SessionManagerClient::Create( |
746 DBusClientImplementationType type) { | 804 DBusClientImplementationType type) { |
747 if (type == REAL_DBUS_CLIENT_IMPLEMENTATION) | 805 if (type == REAL_DBUS_CLIENT_IMPLEMENTATION) |
748 return new SessionManagerClientImpl(); | 806 return new SessionManagerClientImpl(); |
749 DCHECK_EQ(STUB_DBUS_CLIENT_IMPLEMENTATION, type); | 807 DCHECK_EQ(STUB_DBUS_CLIENT_IMPLEMENTATION, type); |
750 return new SessionManagerClientStubImpl(); | 808 return new SessionManagerClientStubImpl(); |
751 } | 809 } |
752 | 810 |
753 } // namespace chromeos | 811 } // namespace chromeos |
OLD | NEW |