Chromium Code Reviews| Index: content/browser/renderer_host/pepper/pepper_tcp_socket_message_filter.cc |
| diff --git a/content/browser/renderer_host/pepper/pepper_tcp_socket_message_filter.cc b/content/browser/renderer_host/pepper/pepper_tcp_socket_message_filter.cc |
| index aa63ab16308c0460405505cc639b591e355ec426..4e2bea473691ddab186c74864f540e3f15555dcb 100644 |
| --- a/content/browser/renderer_host/pepper/pepper_tcp_socket_message_filter.cc |
| +++ b/content/browser/renderer_host/pepper/pepper_tcp_socket_message_filter.cc |
| @@ -36,6 +36,10 @@ |
| #include "ppapi/proxy/tcp_socket_resource_base.h" |
| #include "ppapi/shared_impl/private/net_address_private_impl.h" |
| +#if defined(OS_CHROMEOS) |
| +#include "chromeos/network/firewall_hole.h" |
| +#endif // defined(OS_CHROMEOS) |
| + |
| using ppapi::NetAddressPrivateImpl; |
| using ppapi::host::NetErrorToPepperError; |
| using ppapi::proxy::TCPSocketResourceBase; |
| @@ -470,6 +474,10 @@ int32_t PepperTCPSocketMessageFilter::OnMsgClose( |
| return PP_OK; |
| state_.DoTransition(TCPSocketState::CLOSE, true); |
| +#if defined(OS_CHROMEOS) |
| + // Close the firewall hole, it is no longer needed. |
| + firewall_hole_.reset(nullptr); |
| +#endif // defined(OS_CHROMEOS) |
| // Make sure we get no further callbacks from |socket_| or |ssl_socket_|. |
| if (socket_) { |
| socket_->Close(); |
| @@ -713,8 +721,7 @@ void PepperTCPSocketMessageFilter::DoListen( |
| } |
| int32_t pp_result = NetErrorToPepperError(socket_->Listen(backlog)); |
| - SendListenReply(context, pp_result); |
| - state_.DoTransition(TCPSocketState::LISTEN, pp_result == PP_OK); |
| + MaybeOpenFirewallHole(context, pp_result); |
|
bbudge
2015/07/09 19:55:17
Have chromeos-specific code here to make it cleare
|
| } |
| void PepperTCPSocketMessageFilter::OnResolveCompleted( |
| @@ -926,6 +933,49 @@ void PepperTCPSocketMessageFilter::OnWriteCompleted( |
| write_buffer_base_ = NULL; |
| } |
| +void PepperTCPSocketMessageFilter::ListenComplete( |
|
bbudge
2015/07/09 19:55:17
OnListenCompleted for consistency.
avallee
2015/07/13 18:29:10
Done.
|
| + const ppapi::host::ReplyMessageContext& context, |
| + int32_t pp_result) { |
| + DCHECK_CURRENTLY_ON(BrowserThread::IO); |
| + SendListenReply(context, pp_result); |
| + state_.DoTransition(TCPSocketState::LISTEN, pp_result == PP_OK); |
| +} |
|
bbudge
2015/07/09 19:55:17
nit: blank line
avallee
2015/07/13 18:29:10
Done.
|
| +void PepperTCPSocketMessageFilter::MaybeOpenFirewallHole( |
| + const ppapi::host::ReplyMessageContext& context, |
| + int32_t pp_result) { |
| +#if defined(OS_CHROMEOS) |
| + if (pp_result == PP_OK) { |
| + net::IPEndPoint local_addr; |
| + // Has already been called successfully in DoBind(). |
| + socket_->GetLocalAddress(&local_addr); |
| + pepper_socket_utils::FirewallHoleOpenCallback callback = |
| + base::Bind(&PepperTCPSocketMessageFilter::OnFirewallHoleOpened, |
| + base::Unretained(this), context, pp_result); |
| + BrowserThread::PostTask( |
| + BrowserThread::UI, FROM_HERE, |
| + base::Bind(&pepper_socket_utils::OpenTCPFirewallHole, local_addr, |
| + callback)); |
| + return; |
| + } |
| +#endif |
| + ListenComplete(context, pp_result); |
| +} |
| + |
| +#if defined(OS_CHROMEOS) |
| +void PepperTCPSocketMessageFilter::OnFirewallHoleOpened( |
| + const ppapi::host::ReplyMessageContext& context, |
| + int32_t result, |
| + scoped_ptr<chromeos::FirewallHole> hole) { |
| + LOG_IF(WARNING, !hole.get()) << "Firewall hole could not be opened."; |
| + firewall_hole_.reset(hole.release()); |
| + |
| + BrowserThread::PostTask( |
| + BrowserThread::IO, FROM_HERE, |
| + base::Bind(&PepperTCPSocketMessageFilter::ListenComplete, |
| + base::Unretained(this), context, result)); |
| +} |
| +#endif // defined(OS_CHROMEOS) |
| + |
| void PepperTCPSocketMessageFilter::OnAcceptCompleted( |
| const ppapi::host::ReplyMessageContext& context, |
| int net_result) { |