| Index: remoting/host/security_key/remote_security_key_ipc_server_impl.cc
|
| diff --git a/remoting/host/security_key/remote_security_key_ipc_server_impl.cc b/remoting/host/security_key/remote_security_key_ipc_server_impl.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..f3c9d5a90f68069ed2dc83118d8af7912f9f28be
|
| --- /dev/null
|
| +++ b/remoting/host/security_key/remote_security_key_ipc_server_impl.cc
|
| @@ -0,0 +1,194 @@
|
| +// Copyright 2016 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "remoting/host/security_key/remote_security_key_ipc_server_impl.h"
|
| +
|
| +#include <cstdint>
|
| +#include <memory>
|
| +#include <string>
|
| +
|
| +#include "base/callback.h"
|
| +#include "base/callback_helpers.h"
|
| +#include "base/location.h"
|
| +#include "base/threading/thread_checker.h"
|
| +#include "base/threading/thread_task_runner_handle.h"
|
| +#include "base/timer/timer.h"
|
| +#include "ipc/ipc_channel.h"
|
| +#include "ipc/ipc_message.h"
|
| +#include "ipc/ipc_message_macros.h"
|
| +#include "remoting/base/logging.h"
|
| +#include "remoting/host/chromoting_messages.h"
|
| +
|
| +#if defined(OS_WIN)
|
| +#include "base/strings/stringprintf.h"
|
| +#include "base/strings/utf_string_conversions.h"
|
| +#include "base/win/win_util.h"
|
| +#include "remoting/host/ipc_util.h"
|
| +#endif // defined(OS_WIN)
|
| +
|
| +namespace {
|
| +
|
| +// Returns the command code (the first byte of the data) if it exists, or -1 if
|
| +// the data is empty.
|
| +unsigned int GetCommandCode(const std::string& data) {
|
| + return data.empty() ? -1 : static_cast<unsigned int>(data[0]);
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +namespace remoting {
|
| +
|
| +RemoteSecurityKeyIpcServerImpl::RemoteSecurityKeyIpcServerImpl(
|
| + int connection_id,
|
| + uint32_t peer_session_id,
|
| + base::TimeDelta initial_connect_timeout,
|
| + const GnubbyAuthHandler::SendMessageCallback& message_callback,
|
| + const base::Closure& done_callback)
|
| + : connection_id_(connection_id),
|
| + peer_session_id_(peer_session_id),
|
| + initial_connect_timeout_(initial_connect_timeout),
|
| + done_callback_(done_callback),
|
| + message_callback_(message_callback),
|
| + weak_factory_(this) {
|
| + DCHECK_GT(connection_id_, 0);
|
| + DCHECK(!done_callback_.is_null());
|
| + DCHECK(!message_callback_.is_null());
|
| +}
|
| +
|
| +RemoteSecurityKeyIpcServerImpl::~RemoteSecurityKeyIpcServerImpl() {}
|
| +
|
| +bool RemoteSecurityKeyIpcServerImpl::CreateChannel(
|
| + const std::string& channel_name,
|
| + base::TimeDelta request_timeout) {
|
| + DCHECK(thread_checker_.CalledOnValidThread());
|
| + DCHECK(!ipc_channel_);
|
| + security_key_request_timeout_ = request_timeout;
|
| +
|
| +#if defined(OS_WIN)
|
| + // Create a named pipe owned by the current user (the LocalService account
|
| + // (SID: S-1-5-19) when running in the network process) which is available to
|
| + // all authenticated users.
|
| + // presubmit: allow wstring
|
| + std::wstring user_sid;
|
| + if (!base::win::GetUserSidString(&user_sid)) {
|
| + return false;
|
| + }
|
| + std::string user_sid_utf8 = base::WideToUTF8(user_sid);
|
| + std::string security_descriptor = base::StringPrintf(
|
| + "O:%sG:%sD:(A;;GA;;;AU)", user_sid_utf8.c_str(), user_sid_utf8.c_str());
|
| +
|
| + base::win::ScopedHandle pipe;
|
| + if (!CreateIpcChannel(channel_name, security_descriptor, &pipe)) {
|
| + return false;
|
| + }
|
| +
|
| + ipc_channel_ =
|
| + IPC::Channel::CreateNamedServer(IPC::ChannelHandle(pipe.Get()), this);
|
| +#else // defined(OS_WIN)
|
| + ipc_channel_ =
|
| + IPC::Channel::CreateNamedServer(IPC::ChannelHandle(channel_name), this);
|
| +#endif // !defined(OS_WIN)
|
| +
|
| + if (!ipc_channel_->Connect()) {
|
| + ipc_channel_.reset();
|
| + return false;
|
| + }
|
| + // It is safe to use base::Unretained here as |timer_| will be stopped and
|
| + // this task will be removed when this instance is being destroyed. All
|
| + // methods must execute on the same thread (due to |thread_Checker_| so
|
| + // the posted task and D'Tor can not execute concurrently.
|
| + timer_.Start(FROM_HERE, initial_connect_timeout_,
|
| + base::Bind(&RemoteSecurityKeyIpcServerImpl::OnChannelError,
|
| + base::Unretained(this)));
|
| + return true;
|
| +}
|
| +
|
| +bool RemoteSecurityKeyIpcServerImpl::SendResponse(const std::string& response) {
|
| + DCHECK(thread_checker_.CalledOnValidThread());
|
| +
|
| + // Since we have received a response, we update the timer and wait
|
| + // for a subsequent request.
|
| + timer_.Start(FROM_HERE, security_key_request_timeout_,
|
| + base::Bind(&RemoteSecurityKeyIpcServerImpl::OnChannelError,
|
| + base::Unretained(this)));
|
| +
|
| + return ipc_channel_->Send(
|
| + new ChromotingNetworkToRemoteSecurityKeyMsg_Response(response));
|
| +}
|
| +
|
| +bool RemoteSecurityKeyIpcServerImpl::OnMessageReceived(
|
| + const IPC::Message& message) {
|
| + DCHECK(thread_checker_.CalledOnValidThread());
|
| +
|
| + if (connection_close_pending_) {
|
| + LOG(WARNING) << "IPC Message ignored because channel is being closed.";
|
| + return false;
|
| + }
|
| +
|
| + bool handled = true;
|
| + IPC_BEGIN_MESSAGE_MAP(RemoteSecurityKeyIpcServerImpl, message)
|
| + IPC_MESSAGE_HANDLER(ChromotingRemoteSecurityKeyToNetworkMsg_Request,
|
| + OnSecurityKeyRequest)
|
| + IPC_MESSAGE_UNHANDLED(handled = false)
|
| + IPC_END_MESSAGE_MAP()
|
| +
|
| + CHECK(handled) << "Received unexpected IPC type: " << message.type();
|
| + return handled;
|
| +}
|
| +
|
| +void RemoteSecurityKeyIpcServerImpl::OnChannelConnected(int32_t peer_pid) {
|
| + DCHECK(thread_checker_.CalledOnValidThread());
|
| +
|
| +#if defined(OS_WIN)
|
| + DWORD peer_session_id;
|
| + if (!ProcessIdToSessionId(peer_pid, &peer_session_id)) {
|
| + PLOG(ERROR) << "ProcessIdToSessionId() failed";
|
| + connection_close_pending_ = true;
|
| + } else if (peer_session_id != peer_session_id_) {
|
| + LOG(ERROR) << "Ignoring connection attempt from outside remoted session.";
|
| + connection_close_pending_ = true;
|
| + }
|
| + if (connection_close_pending_) {
|
| + base::ThreadTaskRunnerHandle::Get()->PostTask(
|
| + FROM_HERE, base::Bind(&RemoteSecurityKeyIpcServerImpl::OnChannelError,
|
| + weak_factory_.GetWeakPtr()));
|
| + return;
|
| + }
|
| +#else // !defined(OS_WIN)
|
| + CHECK_EQ(peer_session_id_, UINT32_MAX);
|
| +#endif // !defined(OS_WIN)
|
| +
|
| + // Reset the timer to give the client a chance to send the request.
|
| + timer_.Start(FROM_HERE, initial_connect_timeout_,
|
| + base::Bind(&RemoteSecurityKeyIpcServerImpl::OnChannelError,
|
| + base::Unretained(this)));
|
| +}
|
| +
|
| +void RemoteSecurityKeyIpcServerImpl::OnChannelError() {
|
| + DCHECK(thread_checker_.CalledOnValidThread());
|
| + if (ipc_channel_) {
|
| + ipc_channel_->Close();
|
| + connection_close_pending_ = false;
|
| + }
|
| +
|
| + if (!done_callback_.is_null()) {
|
| + // Note: This callback may result in this object being torn down.
|
| + base::ResetAndReturn(&done_callback_).Run();
|
| + }
|
| +}
|
| +
|
| +void RemoteSecurityKeyIpcServerImpl::OnSecurityKeyRequest(
|
| + const std::string& request_data) {
|
| + DCHECK(thread_checker_.CalledOnValidThread());
|
| +
|
| + // Reset the timer to give the client a chance to send the response.
|
| + timer_.Start(FROM_HERE, security_key_request_timeout_,
|
| + base::Bind(&RemoteSecurityKeyIpcServerImpl::OnChannelError,
|
| + base::Unretained(this)));
|
| +
|
| + HOST_LOG << "Received gnubby request: " << GetCommandCode(request_data);
|
| + message_callback_.Run(connection_id_, request_data);
|
| +}
|
| +
|
| +} // namespace remoting
|
|
|