Chromium Code Reviews| Index: chromeos/dbus/session_manager_client.cc |
| diff --git a/chromeos/dbus/session_manager_client.cc b/chromeos/dbus/session_manager_client.cc |
| index ff5f46536ddb434ba9c83fd48a19d336e744c21a..9de2800c89e1f0949a10b49bc3085fb53ae999cd 100644 |
| --- a/chromeos/dbus/session_manager_client.cc |
| +++ b/chromeos/dbus/session_manager_client.cc |
| @@ -4,7 +4,10 @@ |
| #include "chromeos/dbus/session_manager_client.h" |
| +#include <sys/socket.h> |
| + |
| #include "base/bind.h" |
| +#include "base/callback.h" |
| #include "base/files/file_path.h" |
| #include "base/files/file_util.h" |
| #include "base/location.h" |
| @@ -58,6 +61,23 @@ void StoreFile(const base::FilePath& path, const std::string& data) { |
| } |
| } |
| +// Creates a pair of file descriptors that form a conduit for trustworthy |
| +// transfer of credentials between Chrome and the session_manager |
| +void CreateValidCredConduit(dbus::FileDescriptor* local_auth_fd, |
| + dbus::FileDescriptor* remote_auth_fd) { |
| + int sockets[2] = {-1, -1}; |
| + if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets) < 0) { |
| + PLOG(ERROR) << "Failed to create a unix domain socketpair"; |
| + return; |
| + } |
| + |
| + local_auth_fd->PutValue(sockets[0]); |
| + local_auth_fd->CheckValidity(); |
| + |
| + remote_auth_fd->PutValue(sockets[1]); |
| + remote_auth_fd->CheckValidity(); |
| +} |
| + |
| } // namespace |
| // The SessionManagerClient implementation used in production. |
| @@ -96,16 +116,21 @@ class SessionManagerClientImpl : public SessionManagerClient { |
| } |
| void RestartJob(int pid, const std::string& command_line) override { |
| - dbus::MethodCall method_call(login_manager::kSessionManagerInterface, |
| - login_manager::kSessionManagerRestartJob); |
| - dbus::MessageWriter writer(&method_call); |
| - writer.AppendInt32(pid); |
| - writer.AppendString(command_line); |
| - session_manager_proxy_->CallMethod( |
| - &method_call, |
| - dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, |
| - base::Bind(&SessionManagerClientImpl::OnRestartJob, |
| - weak_ptr_factory_.GetWeakPtr())); |
| + dbus::ScopedFileDescriptor local_auth_fd(new dbus::FileDescriptor()); |
| + dbus::ScopedFileDescriptor remote_auth_fd(new dbus::FileDescriptor()); |
| + |
| + base::Closure pipe_creator = base::Bind( |
| + &CreateValidCredConduit, local_auth_fd.get(), remote_auth_fd.get()); |
| + dbus::ObjectProxy::ResponseCallback on_restart_job = base::Bind( |
| + &SessionManagerClientImpl::OnRestartJob, weak_ptr_factory_.GetWeakPtr(), |
| + base::Passed(&local_auth_fd)); |
| + base::Closure call_performer = |
| + base::Bind(&SessionManagerClientImpl::CallRestartJobWithValidFd, |
| + weak_ptr_factory_.GetWeakPtr(), |
| + base::Passed(&remote_auth_fd), command_line, on_restart_job); |
| + |
| + base::WorkerPool::PostTaskAndReply(FROM_HERE, pipe_creator, call_performer, |
| + false); |
|
stevenjb
2015/04/28 01:25:26
This is all pretty confusing. I'm pretty sure I fo
|
| } |
| void StartSession(const std::string& user_email) override { |
| @@ -379,8 +404,22 @@ class SessionManagerClientImpl : public SessionManagerClient { |
| callback)); |
| } |
| + void CallRestartJobWithValidFd(dbus::ScopedFileDescriptor remote_auth_fd, |
| + const std::string& command_line, |
| + dbus::ObjectProxy::ResponseCallback callback) { |
| + dbus::MethodCall method_call( |
| + login_manager::kSessionManagerInterface, |
| + login_manager::kSessionManagerRestartJobWithAuth); |
| + dbus::MessageWriter writer(&method_call); |
| + writer.AppendFileDescriptor(*remote_auth_fd); |
| + writer.AppendString(command_line); |
| + session_manager_proxy_->CallMethod( |
| + &method_call, dbus::ObjectProxy::TIMEOUT_USE_DEFAULT, callback); |
| + } |
| + |
| // Called when kSessionManagerRestartJob method is complete. |
| - void OnRestartJob(dbus::Response* response) { |
| + void OnRestartJob(dbus::ScopedFileDescriptor local_auth_fd, |
| + dbus::Response* response) { |
| LOG_IF(ERROR, !response) |
| << "Failed to call " |
| << login_manager::kSessionManagerRestartJob; |