Chromium Code Reviews| Index: remoting/protocol/validating_authenticator.cc |
| diff --git a/remoting/protocol/validating_authenticator.cc b/remoting/protocol/validating_authenticator.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..d3da78d12427b741dfdc5359bbb02aebd98ee93c |
| --- /dev/null |
| +++ b/remoting/protocol/validating_authenticator.cc |
| @@ -0,0 +1,141 @@ |
| +// Copyright 2016 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "remoting/protocol/validating_authenticator.h" |
| + |
| +#include <memory> |
| +#include <string> |
| +#include <utility> |
| + |
| +#include "base/bind.h" |
| +#include "base/callback.h" |
| +#include "base/logging.h" |
| +#include "base/macros.h" |
| +#include "base/memory/ref_counted.h" |
| +#include "base/memory/weak_ptr.h" |
| +#include "remoting/protocol/authenticator.h" |
| +#include "remoting/protocol/channel_authenticator.h" |
| +#include "third_party/webrtc/libjingle/xmllite/xmlelement.h" |
| + |
| +namespace remoting { |
| +namespace protocol { |
| + |
| +ValidatingAuthenticator::ValidatingAuthenticator( |
| + const std::string& remote_jid, |
| + const ValidationCallback& validation_callback, |
| + std::unique_ptr<Authenticator> current_authenticator) |
| + : remote_jid_(remote_jid), |
| + validation_callback_(validation_callback), |
| + current_authenticator_(std::move(current_authenticator)), |
| + weak_factory_(this) { |
| + DCHECK(!remote_jid_.empty()); |
| + DCHECK(!validation_callback_.is_null()); |
| + DCHECK(current_authenticator_); |
| +} |
| + |
| +ValidatingAuthenticator::~ValidatingAuthenticator() {} |
| + |
| +Authenticator::State ValidatingAuthenticator::state() const { |
| + return state_; |
| +} |
| + |
| +bool ValidatingAuthenticator::started() const { |
| + return current_authenticator_->started(); |
| +} |
| + |
| +Authenticator::RejectionReason ValidatingAuthenticator::rejection_reason() |
| + const { |
| + return rejection_reason_; |
| +} |
| + |
| +const std::string& ValidatingAuthenticator::GetAuthKey() const { |
| + return current_authenticator_->GetAuthKey(); |
| +} |
| + |
| +std::unique_ptr<ChannelAuthenticator> |
| +ValidatingAuthenticator::CreateChannelAuthenticator() const { |
| + return current_authenticator_->CreateChannelAuthenticator(); |
| +} |
| + |
| +void ValidatingAuthenticator::ProcessMessage( |
| + const buzz::XmlElement* message, |
| + const base::Closure& resume_callback) { |
| + DCHECK_EQ(state_, WAITING_MESSAGE); |
| + state_ = PROCESSING_MESSAGE; |
| + |
| + if (first_message_received_) { |
| + current_authenticator_->ProcessMessage( |
| + message, base::Bind(&ValidatingAuthenticator::UpdateState, |
| + weak_factory_.GetWeakPtr(), resume_callback)); |
| + } else { |
| + first_message_received_ = true; |
| + validation_callback_.Run( |
| + remote_jid_, base::Bind(&ValidatingAuthenticator::OnValidateComplete, |
| + weak_factory_.GetWeakPtr(), |
| + base::Owned(new buzz::XmlElement(*message)), |
| + resume_callback)); |
| + } |
| +} |
| + |
| +std::unique_ptr<buzz::XmlElement> ValidatingAuthenticator::GetNextMessage() { |
| + std::unique_ptr<buzz::XmlElement> result( |
| + current_authenticator_->GetNextMessage()); |
| + state_ = current_authenticator_->state(); |
| + DCHECK(state_ == ACCEPTED || state_ == WAITING_MESSAGE); |
| + |
| + return result; |
| +} |
| + |
| +void ValidatingAuthenticator::OnValidateComplete( |
| + const buzz::XmlElement* message, |
| + const base::Closure& resume_callback, |
| + Result validation_result) { |
| + if (validation_result == Result::SUCCESS) { |
| + current_authenticator_->ProcessMessage( |
| + message, base::Bind(&ValidatingAuthenticator::UpdateState, |
| + weak_factory_.GetWeakPtr(), resume_callback)); |
| + return; |
| + } |
| + |
| + // |validation_result| represents a rejected state so map the result to a |
| + // rejection reason and call the callback to let the caller know the result. |
| + state_ = Authenticator::REJECTED; |
| + |
| + switch (validation_result) { |
| + case Result::ERROR_INVALID_CREDENTIALS: |
| + rejection_reason_ = Authenticator::INVALID_CREDENTIALS; |
| + break; |
| + |
| + case Result::ERROR_INVALID_ACCOUNT: |
| + rejection_reason_ = Authenticator::INVALID_ACCOUNT; |
| + break; |
| + |
| + case Result::ERROR_REJECTED_BY_USER: |
| + rejection_reason_ = Authenticator::REJECTED_BY_USER; |
| + break; |
| + |
| + default: |
|
Sergey Ulanov
2016/08/31 23:41:24
It's best to avoid default case for enum switch st
|
| + // Log an error and fail to prevent logging a misleading error value. |
| + CHECK(false) << "Unknown validation result value: " |
|
Sergey Ulanov
2016/08/31 23:41:24
I think NOTREACHED() would be appropriate here - t
|
| + << static_cast<unsigned int>(validation_result); |
| + } |
| + |
| + resume_callback.Run(); |
| +} |
| + |
| +void ValidatingAuthenticator::UpdateState( |
| + const base::Closure& resume_callback) { |
| + DCHECK_EQ(state_, PROCESSING_MESSAGE); |
| + |
| + // Update our current state before running |resume_callback|. |
| + state_ = current_authenticator_->state(); |
| + if (state_ == REJECTED) { |
| + rejection_reason_ = current_authenticator_->rejection_reason(); |
| + } |
| + |
| + resume_callback.Run(); |
| +} |
| + |
| +} // namespace protocol |
| +} // namespace remoting |