Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(72)

Side by Side Diff: components/gcm_driver/crypto/gcm_key_store.h

Issue 1953273002: Add support to GCMKeyStore for multiple keys per app_id (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@iid6fixstore
Patch Set: Simplify Decrypt fallback by banning IID token & GCM reg from sharing same app_id Created 4 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef COMPONENTS_GCM_DRIVER_CRYPTO_GCM_KEY_STORE_H_ 5 #ifndef COMPONENTS_GCM_DRIVER_CRYPTO_GCM_KEY_STORE_H_
6 #define COMPONENTS_GCM_DRIVER_CRYPTO_GCM_KEY_STORE_H_ 6 #define COMPONENTS_GCM_DRIVER_CRYPTO_GCM_KEY_STORE_H_
7 7
8 #include <map>
9 #include <memory> 8 #include <memory>
10 #include <string> 9 #include <string>
10 #include <unordered_map>
11 #include <utility>
11 #include <vector> 12 #include <vector>
12 13
13 #include "base/callback_forward.h" 14 #include "base/callback_forward.h"
14 #include "base/files/file_path.h" 15 #include "base/files/file_path.h"
15 #include "base/macros.h" 16 #include "base/macros.h"
16 #include "base/memory/ref_counted.h" 17 #include "base/memory/ref_counted.h"
17 #include "base/memory/weak_ptr.h" 18 #include "base/memory/weak_ptr.h"
18 #include "components/gcm_driver/crypto/proto/gcm_encryption_data.pb.h" 19 #include "components/gcm_driver/crypto/proto/gcm_encryption_data.pb.h"
19 #include "components/gcm_driver/gcm_delayed_task_controller.h" 20 #include "components/gcm_driver/gcm_delayed_task_controller.h"
20 21
21 namespace base { 22 namespace base {
22 class SequencedTaskRunner; 23 class SequencedTaskRunner;
23 } 24 }
24 25
25 namespace leveldb_proto { 26 namespace leveldb_proto {
26 template <typename T> 27 template <typename T>
27 class ProtoDatabase; 28 class ProtoDatabase;
28 } 29 }
29 30
30 namespace gcm { 31 namespace gcm {
31 32
32 // Key storage for use with encrypted messages received from Google Cloud 33 // Key storage for use with encrypted messages received from Google Cloud
33 // Messaging. It provides the ability to create and store a key-pair for a given 34 // Messaging. It provides the ability to create and store a key-pair for a given
34 // app id, as well as retrieving and deleting key-pairs. 35 // app id + authorized entity pair, and to retrieve and delete key-pairs.
35 // 36 //
36 // This class is backed by a proto database and might end up doing file I/O on 37 // This class is backed by a proto database and might end up doing file I/O on
37 // a background task runner. For this reason, all public APIs take a callback 38 // a background task runner. For this reason, all public APIs take a callback
38 // rather than returning the result. Do not rely on the timing of the callbacks. 39 // rather than returning the result. Do not rely on the timing of the callbacks.
39 class GCMKeyStore { 40 class GCMKeyStore {
40 public: 41 public:
41 using KeysCallback = base::Callback<void(const KeyPair& pair, 42 using KeysCallback = base::Callback<void(const KeyPair& pair,
42 const std::string& auth_secret)>; 43 const std::string& auth_secret)>;
43 44
44 GCMKeyStore( 45 GCMKeyStore(
45 const base::FilePath& key_store_path, 46 const base::FilePath& key_store_path,
46 const scoped_refptr<base::SequencedTaskRunner>& blocking_task_runner); 47 const scoped_refptr<base::SequencedTaskRunner>& blocking_task_runner);
47 ~GCMKeyStore(); 48 ~GCMKeyStore();
48 49
49 // Retrieves the public/private key-pair associated with |app_id|, and 50 // Retrieves the public/private key-pair associated with the |app_id| +
50 // invokes |callback| when they are available, or when an error occurred. 51 // authorized entity pair, and invokes |callback| when they are available, or
51 void GetKeys(const std::string& app_id, const KeysCallback& callback); 52 // when an error occurred.
53 // |instance_id_authorized_entity|: pass InstanceID token's authorized_entity
54 // or "" for legacy GCM registrations.
55 // |fallback_to_empty_authorized_entity|: if true and the keys are not found,
56 // will try again with empty authorized
57 // entity (use this when you're not
58 // sure if you have an Instance ID).
59 void GetKeys(const std::string& app_id,
60 const std::string& instance_id_authorized_entity,
61 bool fallback_to_empty_authorized_entity,
62 const KeysCallback& callback);
52 63
53 // Creates a new public/private key-pair for |app_id|, and invokes 64 // Creates a new public/private key-pair for the |app_id| + authorized entity
54 // |callback| when they are available, or when an error occurred. 65 // pair, and invokes |callback| when they are available, or when an error
55 void CreateKeys(const std::string& app_id, const KeysCallback& callback); 66 // occurred. Simultaneously using the same |app_id| for both a legacy GCM
67 // registration and one or more InstanceID tokens is not supported.
68 // |instance_id_authorized_entity|: pass InstanceID token's authorized_entity
69 // or "" for legacy GCM registrations.
70 void CreateKeys(const std::string& app_id,
71 const std::string& instance_id_authorized_entity,
72 const KeysCallback& callback);
56 73
57 // Removes the keys associated with |app_id|, and invokes |callback| when 74 // Removes the keys associated with the |app_id| + authorized entity pair, and
58 // the operation has finished. 75 // invokes |callback| when the operation has finished.
59 void RemoveKeys(const std::string& app_id, const base::Closure& callback); 76 // |instance_id_authorized_entity|: pass InstanceID token's authorized_entity
77 // or "*" to remove for all InstanceID tokens
78 // or "" for legacy GCM registrations.
79 void RemoveKeys(const std::string& app_id,
80 const std::string& instance_id_authorized_entity,
81 const base::Closure& callback);
60 82
61 private: 83 private:
62 // Initializes the database if necessary, and runs |done_closure| when done. 84 // Initializes the database if necessary, and runs |done_closure| when done.
63 void LazyInitialize(const base::Closure& done_closure); 85 void LazyInitialize(const base::Closure& done_closure);
64 86
65 void DidInitialize(bool success); 87 void DidInitialize(bool success);
66 void DidLoadKeys(bool success, 88 void DidLoadKeys(bool success,
67 std::unique_ptr<std::vector<EncryptionData>> entries); 89 std::unique_ptr<std::vector<EncryptionData>> entries);
68 90
69 void DidStoreKeys(const KeyPair& pair, 91 void DidStoreKeys(const KeyPair& pair,
70 const std::string& auth_secret, 92 const std::string& auth_secret,
71 const KeysCallback& callback, 93 const KeysCallback& callback,
72 bool success); 94 bool success);
73 95
74 void DidRemoveKeys(const base::Closure& callback, bool success); 96 void DidRemoveKeys(const base::Closure& callback, bool success);
75 97
76 // Private implementations of the API that will be executed when the database 98 // Private implementations of the API that will be executed when the database
77 // has either been successfully loaded, or failed to load. 99 // has either been successfully loaded, or failed to load.
78 100
79 void GetKeysAfterInitialize(const std::string& app_id, 101 void GetKeysAfterInitialize(const std::string& app_id,
102 const std::string& instance_id_authorized_entity,
103 bool fallback_to_empty_authorized_entity,
80 const KeysCallback& callback); 104 const KeysCallback& callback);
81 void CreateKeysAfterInitialize(const std::string& app_id, 105 void CreateKeysAfterInitialize(
82 const KeysCallback& callback); 106 const std::string& app_id,
83 void RemoveKeysAfterInitialize(const std::string& app_id, 107 const std::string& instance_id_authorized_entity,
84 const base::Closure& callback); 108 const KeysCallback& callback);
109 void RemoveKeysAfterInitialize(
110 const std::string& app_id,
111 const std::string& instance_id_authorized_entity,
112 const base::Closure& callback);
85 113
86 // Path in which the key store database will be saved. 114 // Path in which the key store database will be saved.
87 base::FilePath key_store_path_; 115 base::FilePath key_store_path_;
88 116
89 // Blocking task runner which the database will do I/O operations on. 117 // Blocking task runner which the database will do I/O operations on.
90 scoped_refptr<base::SequencedTaskRunner> blocking_task_runner_; 118 scoped_refptr<base::SequencedTaskRunner> blocking_task_runner_;
91 119
92 // Instance of the ProtoDatabase backing the key store. 120 // Instance of the ProtoDatabase backing the key store.
93 std::unique_ptr<leveldb_proto::ProtoDatabase<EncryptionData>> database_; 121 std::unique_ptr<leveldb_proto::ProtoDatabase<EncryptionData>> database_;
94 122
95 enum class State; 123 enum class State;
96 124
97 // The current state of the database. It has to be initialized before use. 125 // The current state of the database. It has to be initialized before use.
98 State state_; 126 State state_;
99 127
100 // Controller for tasks that should be executed once the key store has 128 // Controller for tasks that should be executed once the key store has
101 // finished initializing. 129 // finished initializing.
102 GCMDelayedTaskController delayed_task_controller_; 130 GCMDelayedTaskController delayed_task_controller_;
103 131
104 // Mapping of an app id to the loaded key pair and authentication secrets. 132 // Nested map from app_id to a map from instance_id_authorized_entity to the
105 // TODO(peter): Switch these to std::unordered_map<> once allowed. 133 // loaded key pair and authentication secrets.
106 std::map<std::string, KeyPair> key_pairs_; 134 using KeyPairAndAuthSecret = std::pair<KeyPair, std::string>;
107 std::map<std::string, std::string> auth_secrets_; 135 std::unordered_map<std::string,
Peter Beverloo 2016/05/09 14:10:10 Why can't we use a multimap from |app_id| to a tup
johnme 2016/05/09 18:15:55 I considered that, but I'm not convinced a multima
136 std::unordered_map<std::string, KeyPairAndAuthSecret>>
137 key_data_;
108 138
109 base::WeakPtrFactory<GCMKeyStore> weak_factory_; 139 base::WeakPtrFactory<GCMKeyStore> weak_factory_;
110 140
111 DISALLOW_COPY_AND_ASSIGN(GCMKeyStore); 141 DISALLOW_COPY_AND_ASSIGN(GCMKeyStore);
112 }; 142 };
113 143
114 } // namespace gcm 144 } // namespace gcm
115 145
116 #endif // COMPONENTS_GCM_DRIVER_CRYPTO_GCM_KEY_STORE_H_ 146 #endif // COMPONENTS_GCM_DRIVER_CRYPTO_GCM_KEY_STORE_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698