OLD | NEW |
(Empty) | |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "remoting/host/security_key/remote_security_key_ipc_client.h" |
| 6 |
| 7 #include <string> |
| 8 |
| 9 #include "base/bind.h" |
| 10 #include "base/callback.h" |
| 11 #include "base/callback_helpers.h" |
| 12 #include "base/threading/thread_task_runner_handle.h" |
| 13 #include "ipc/ipc_channel.h" |
| 14 #include "ipc/ipc_listener.h" |
| 15 #include "ipc/ipc_message.h" |
| 16 #include "ipc/ipc_message_macros.h" |
| 17 #include "remoting/host/chromoting_messages.h" |
| 18 #include "remoting/host/ipc_constants.h" |
| 19 #include "remoting/host/security_key/remote_security_key_ipc_constants.h" |
| 20 |
| 21 namespace remoting { |
| 22 |
| 23 RemoteSecurityKeyIpcClient::RemoteSecurityKeyIpcClient() |
| 24 : initial_ipc_channel_name_(remoting::GetRemoteSecurityKeyIpcChannelName()), |
| 25 weak_factory_(this) {} |
| 26 |
| 27 RemoteSecurityKeyIpcClient::~RemoteSecurityKeyIpcClient() {} |
| 28 |
| 29 bool RemoteSecurityKeyIpcClient::WaitForSecurityKeyIpcServerChannel() { |
| 30 DCHECK(thread_checker_.CalledOnValidThread()); |
| 31 |
| 32 // The retry loop is needed as the IPC Servers we connect to are reset (torn |
| 33 // down and recreated) and we should be resilient in that case. We need to |
| 34 // strike a balance between resilience and speed as we do not want to add |
| 35 // un-necessary delay to the local scenario when no session is active. |
| 36 // 500ms was chosen as a reasonable balance between reliability of remote |
| 37 // session detection and overhead added to the local security key operation |
| 38 // when no remote session is present. |
| 39 const base::TimeDelta kTotalWaitTime = base::TimeDelta::FromMilliseconds(500); |
| 40 const base::TimeDelta kPerIterationWaitTime = |
| 41 base::TimeDelta::FromMilliseconds(10); |
| 42 const int kLoopIterations = kTotalWaitTime / kPerIterationWaitTime; |
| 43 for (int i = 0; i < kLoopIterations; i++) { |
| 44 if (IPC::Channel::IsNamedServerInitialized(initial_ipc_channel_name_)) { |
| 45 return true; |
| 46 } |
| 47 |
| 48 base::PlatformThread::Sleep(kPerIterationWaitTime); |
| 49 } |
| 50 |
| 51 return false; |
| 52 } |
| 53 |
| 54 void RemoteSecurityKeyIpcClient::EstablishIpcConnection( |
| 55 const base::Closure& connection_ready_callback, |
| 56 const base::Closure& connection_error_callback) { |
| 57 DCHECK(thread_checker_.CalledOnValidThread()); |
| 58 DCHECK(!connection_ready_callback.is_null()); |
| 59 DCHECK(!connection_error_callback.is_null()); |
| 60 DCHECK(!ipc_channel_); |
| 61 |
| 62 connection_ready_callback_ = connection_ready_callback; |
| 63 connection_error_callback_ = connection_error_callback; |
| 64 |
| 65 ConnectToIpcChannel(initial_ipc_channel_name_); |
| 66 } |
| 67 |
| 68 bool RemoteSecurityKeyIpcClient::SendSecurityKeyRequest( |
| 69 const std::string& request_payload, |
| 70 const ResponseCallback& response_callback) { |
| 71 DCHECK(thread_checker_.CalledOnValidThread()); |
| 72 DCHECK(!request_payload.empty()); |
| 73 DCHECK(!response_callback.is_null()); |
| 74 |
| 75 if (!ipc_channel_) { |
| 76 LOG(ERROR) << "Request made before IPC connection was established."; |
| 77 return false; |
| 78 } |
| 79 |
| 80 if (!response_callback_.is_null()) { |
| 81 LOG(ERROR) |
| 82 << "Request made while waiting for a response to a previous request."; |
| 83 return false; |
| 84 } |
| 85 |
| 86 response_callback_ = response_callback; |
| 87 return ipc_channel_->Send( |
| 88 new ChromotingRemoteSecurityKeyToNetworkMsg_Request(request_payload)); |
| 89 } |
| 90 |
| 91 void RemoteSecurityKeyIpcClient::CloseIpcConnection() { |
| 92 DCHECK(thread_checker_.CalledOnValidThread()); |
| 93 ipc_channel_.reset(); |
| 94 } |
| 95 |
| 96 void RemoteSecurityKeyIpcClient::SetInitialIpcChannelNameForTest( |
| 97 const std::string& initial_ipc_channel_name) { |
| 98 initial_ipc_channel_name_ = initial_ipc_channel_name; |
| 99 } |
| 100 |
| 101 void RemoteSecurityKeyIpcClient::SetExpectedIpcServerSessionIdForTest( |
| 102 uint32_t expected_session_id) { |
| 103 expected_ipc_server_session_id_ = expected_session_id; |
| 104 } |
| 105 |
| 106 bool RemoteSecurityKeyIpcClient::OnMessageReceived( |
| 107 const IPC::Message& message) { |
| 108 DCHECK(thread_checker_.CalledOnValidThread()); |
| 109 |
| 110 bool handled = true; |
| 111 IPC_BEGIN_MESSAGE_MAP(RemoteSecurityKeyIpcClient, message) |
| 112 IPC_MESSAGE_HANDLER( |
| 113 ChromotingNetworkToRemoteSecurityKeyMsg_ConnectionDetails, |
| 114 OnConnectionDetails) |
| 115 IPC_MESSAGE_HANDLER(ChromotingNetworkToRemoteSecurityKeyMsg_Response, |
| 116 OnSecurityKeyResponse) |
| 117 IPC_MESSAGE_UNHANDLED(handled = false) |
| 118 IPC_END_MESSAGE_MAP() |
| 119 |
| 120 CHECK(handled) << "Received unexpected IPC type: " << message.type(); |
| 121 return handled; |
| 122 } |
| 123 |
| 124 void RemoteSecurityKeyIpcClient::OnChannelConnected(int32_t peer_pid) { |
| 125 DCHECK(thread_checker_.CalledOnValidThread()); |
| 126 |
| 127 #if defined(OS_WIN) |
| 128 DWORD peer_session_id; |
| 129 if (!ProcessIdToSessionId(peer_pid, &peer_session_id)) { |
| 130 uint32_t last_error = GetLastError(); |
| 131 LOG(ERROR) << "ProcessIdToSessionId failed with error code: " << last_error; |
| 132 base::ResetAndReturn(&connection_error_callback_).Run(); |
| 133 return; |
| 134 } |
| 135 |
| 136 if (peer_session_id != expected_ipc_server_session_id_) { |
| 137 LOG(ERROR) |
| 138 << "Cannot establish connection with IPC server running in session: " |
| 139 << peer_session_id; |
| 140 base::ResetAndReturn(&connection_error_callback_).Run(); |
| 141 return; |
| 142 } |
| 143 #endif // defined(OS_WIN) |
| 144 |
| 145 // If we have received the connection details already (i.e. |
| 146 // |ipc_channel_name_| is populated) then we signal that the connection is |
| 147 // ready for use. Otherwise this is the initial connection and we will wait |
| 148 // to receive the ConnectionDetails message before proceeding. |
| 149 if (!ipc_channel_name_.empty()) { |
| 150 base::ResetAndReturn(&connection_ready_callback_).Run(); |
| 151 } |
| 152 } |
| 153 |
| 154 void RemoteSecurityKeyIpcClient::OnChannelError() { |
| 155 DCHECK(thread_checker_.CalledOnValidThread()); |
| 156 |
| 157 if (!connection_error_callback_.is_null()) { |
| 158 base::ResetAndReturn(&connection_error_callback_).Run(); |
| 159 } |
| 160 } |
| 161 |
| 162 void RemoteSecurityKeyIpcClient::OnConnectionDetails( |
| 163 const std::string& channel_name) { |
| 164 DCHECK(thread_checker_.CalledOnValidThread()); |
| 165 ipc_channel_name_ = channel_name; |
| 166 |
| 167 // Now that we have received the name for the IPC channel we will use for our |
| 168 // security key request, we want to disconnect from the intial IPC channel |
| 169 // and then connect to the new one. |
| 170 // NOTE: We do not want to perform these tasks now as we are in the middle of |
| 171 // existing IPC message handler, thus we post the tasks so they will be |
| 172 // handled after this method completes. |
| 173 base::ThreadTaskRunnerHandle::Get()->PostTask( |
| 174 FROM_HERE, base::Bind(&RemoteSecurityKeyIpcClient::ConnectToIpcChannel, |
| 175 weak_factory_.GetWeakPtr(), |
| 176 base::ConstRef(ipc_channel_name_))); |
| 177 } |
| 178 |
| 179 void RemoteSecurityKeyIpcClient::OnSecurityKeyResponse( |
| 180 const std::string& response_data) { |
| 181 DCHECK(thread_checker_.CalledOnValidThread()); |
| 182 DCHECK(!connection_error_callback_.is_null()); |
| 183 |
| 184 if (!response_data.empty()) { |
| 185 base::ResetAndReturn(&response_callback_).Run(response_data); |
| 186 } else { |
| 187 LOG(ERROR) << "Invalid response received"; |
| 188 base::ResetAndReturn(&connection_error_callback_).Run(); |
| 189 } |
| 190 } |
| 191 |
| 192 void RemoteSecurityKeyIpcClient::ConnectToIpcChannel( |
| 193 const std::string& channel_name) { |
| 194 DCHECK(thread_checker_.CalledOnValidThread()); |
| 195 |
| 196 // Verify that any existing IPC connection has been closed. |
| 197 CloseIpcConnection(); |
| 198 |
| 199 // The retry loop is needed as the IPC Servers we connect to are reset (torn |
| 200 // down and recreated) and we should be resilient in that case. |
| 201 const base::TimeDelta kTotalWaitTime = |
| 202 base::TimeDelta::FromMilliseconds(1000); |
| 203 const base::TimeDelta kPerIterationWaitTime = |
| 204 base::TimeDelta::FromMilliseconds(25); |
| 205 const int kLoopIterations = kTotalWaitTime / kPerIterationWaitTime; |
| 206 IPC::ChannelHandle channel_handle(channel_name); |
| 207 for (int i = 0; i < kLoopIterations; i++) { |
| 208 ipc_channel_ = IPC::Channel::CreateNamedClient(channel_handle, this); |
| 209 if (ipc_channel_->Connect()) { |
| 210 return; |
| 211 } |
| 212 |
| 213 ipc_channel_.reset(); |
| 214 base::PlatformThread::Sleep(kPerIterationWaitTime); |
| 215 } |
| 216 |
| 217 if (!connection_error_callback_.is_null()) { |
| 218 base::ResetAndReturn(&connection_error_callback_).Run(); |
| 219 } |
| 220 } |
| 221 |
| 222 } // namespace remoting |
OLD | NEW |