Index: chromeos/dbus/session_manager_client.cc |
diff --git a/chromeos/dbus/session_manager_client.cc b/chromeos/dbus/session_manager_client.cc |
index ff5f46536ddb434ba9c83fd48a19d336e744c21a..9de2800c89e1f0949a10b49bc3085fb53ae999cd 100644 |
--- a/chromeos/dbus/session_manager_client.cc |
+++ b/chromeos/dbus/session_manager_client.cc |
@@ -4,7 +4,10 @@ |
#include "chromeos/dbus/session_manager_client.h" |
+#include <sys/socket.h> |
+ |
#include "base/bind.h" |
+#include "base/callback.h" |
#include "base/files/file_path.h" |
#include "base/files/file_util.h" |
#include "base/location.h" |
@@ -58,6 +61,23 @@ void StoreFile(const base::FilePath& path, const std::string& data) { |
} |
} |
+// Creates a pair of file descriptors that form a conduit for trustworthy |
+// transfer of credentials between Chrome and the session_manager |
+void CreateValidCredConduit(dbus::FileDescriptor* local_auth_fd, |
+ dbus::FileDescriptor* remote_auth_fd) { |
+ int sockets[2] = {-1, -1}; |
+ if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets) < 0) { |
+ PLOG(ERROR) << "Failed to create a unix domain socketpair"; |
+ return; |
+ } |
+ |
+ local_auth_fd->PutValue(sockets[0]); |
+ local_auth_fd->CheckValidity(); |
+ |
+ remote_auth_fd->PutValue(sockets[1]); |
+ remote_auth_fd->CheckValidity(); |
+} |
+ |
} // namespace |
// The SessionManagerClient implementation used in production. |
@@ -96,16 +116,21 @@ class SessionManagerClientImpl : public SessionManagerClient { |
} |
void RestartJob(int pid, const std::string& command_line) override { |
- dbus::MethodCall method_call(login_manager::kSessionManagerInterface, |
- login_manager::kSessionManagerRestartJob); |
- dbus::MessageWriter writer(&method_call); |
- writer.AppendInt32(pid); |
- writer.AppendString(command_line); |
- session_manager_proxy_->CallMethod( |
- &method_call, |
- dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, |
- base::Bind(&SessionManagerClientImpl::OnRestartJob, |
- weak_ptr_factory_.GetWeakPtr())); |
+ dbus::ScopedFileDescriptor local_auth_fd(new dbus::FileDescriptor()); |
+ dbus::ScopedFileDescriptor remote_auth_fd(new dbus::FileDescriptor()); |
+ |
+ base::Closure pipe_creator = base::Bind( |
+ &CreateValidCredConduit, local_auth_fd.get(), remote_auth_fd.get()); |
+ dbus::ObjectProxy::ResponseCallback on_restart_job = base::Bind( |
+ &SessionManagerClientImpl::OnRestartJob, weak_ptr_factory_.GetWeakPtr(), |
+ base::Passed(&local_auth_fd)); |
+ base::Closure call_performer = |
+ base::Bind(&SessionManagerClientImpl::CallRestartJobWithValidFd, |
+ weak_ptr_factory_.GetWeakPtr(), |
+ base::Passed(&remote_auth_fd), command_line, on_restart_job); |
+ |
+ base::WorkerPool::PostTaskAndReply(FROM_HERE, pipe_creator, call_performer, |
+ false); |
stevenjb
2015/04/28 01:25:26
This is all pretty confusing. I'm pretty sure I fo
|
} |
void StartSession(const std::string& user_email) override { |
@@ -379,8 +404,22 @@ class SessionManagerClientImpl : public SessionManagerClient { |
callback)); |
} |
+ void CallRestartJobWithValidFd(dbus::ScopedFileDescriptor remote_auth_fd, |
+ const std::string& command_line, |
+ dbus::ObjectProxy::ResponseCallback callback) { |
+ dbus::MethodCall method_call( |
+ login_manager::kSessionManagerInterface, |
+ login_manager::kSessionManagerRestartJobWithAuth); |
+ dbus::MessageWriter writer(&method_call); |
+ writer.AppendFileDescriptor(*remote_auth_fd); |
+ writer.AppendString(command_line); |
+ session_manager_proxy_->CallMethod( |
+ &method_call, dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, callback); |
+ } |
+ |
// Called when kSessionManagerRestartJob method is complete. |
- void OnRestartJob(dbus::Response* response) { |
+ void OnRestartJob(dbus::ScopedFileDescriptor local_auth_fd, |
+ dbus::Response* response) { |
LOG_IF(ERROR, !response) |
<< "Failed to call " |
<< login_manager::kSessionManagerRestartJob; |