Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(129)

Unified Diff: chromeos/dbus/session_manager_client.cc

Issue 2310823003: chromeos: Remove dbus::FileDescriptor from SessionManagerClient (Closed)
Patch Set: Add a comment Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chromeos/dbus/session_manager_client.h ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chromeos/dbus/session_manager_client.cc
diff --git a/chromeos/dbus/session_manager_client.cc b/chromeos/dbus/session_manager_client.cc
index f5014125dd1ded8ed27d84486c01a1ce7bde038d..c68cd9a272ff3936c2bd458e7a0b0574e02d745b 100644
--- a/chromeos/dbus/session_manager_client.cc
+++ b/chromeos/dbus/session_manager_client.cc
@@ -6,7 +6,6 @@
#include <stddef.h>
#include <stdint.h>
-#include <sys/socket.h>
#include <memory>
@@ -68,23 +67,6 @@ void StoreFile(const base::FilePath& path, const std::string& data) {
}
}
-// Creates a pair of file descriptors that form a conduit for trustworthy
-// transfer of credentials between Chrome and the session_manager
-void CreateValidCredConduit(dbus::FileDescriptor* local_auth_fd,
- dbus::FileDescriptor* remote_auth_fd) {
- int sockets[2] = {-1, -1};
- if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets) < 0) {
- PLOG(ERROR) << "Failed to create a unix domain socketpair";
- return;
- }
-
- local_auth_fd->PutValue(sockets[0]);
- local_auth_fd->CheckValidity();
-
- remote_auth_fd->PutValue(sockets[1]);
- remote_auth_fd->CheckValidity();
-}
-
} // namespace
// The SessionManagerClient implementation used in production.
@@ -122,39 +104,18 @@ class SessionManagerClientImpl : public SessionManagerClient {
FOR_EACH_OBSERVER(Observer, observers_, EmitLoginPromptVisibleCalled());
}
- void RestartJob(const std::vector<std::string>& argv) override {
- dbus::ScopedFileDescriptor local_auth_fd(new dbus::FileDescriptor);
- dbus::ScopedFileDescriptor remote_auth_fd(new dbus::FileDescriptor);
-
- // session_manager's RestartJob call requires the caller to open a socket
- // pair and pass one end over dbus while holding the local end open for the
- // duration of the call. session_manager uses this to determine whether the
- // PID the restart request originates from belongs to the browser itself.
- //
- // Here, we call CreateValidCredConduit() to create the socket pair,
- // and then pass both ends along to CallRestartJobWithValidFd(), which
- // takes care of them from there.
- // NB: PostTaskAndReply ensures that the second callback (which owns the
- // ScopedFileDescriptor objects) outlives the first, so passing the
- // bare pointers to CreateValidCredConduit is safe...
- // -- BUT --
- // you have to grab pointers to the contents of {local,remote}_auth_fd
- // _before_ they're acted on by base::Passed() below. Passing ownership
- // of the ScopedFileDescriptor objects to the callback actually nulls
- // out the storage inside the local instances. Since there are
- // no guarantees about the order of evaluation of arguments in a
- // function call, merely having them appear earlier among the args
- // to PostTaskAndReply() is not enough. Relying on this crashed on
- // some platforms.
- base::Closure create_credentials_conduit_closure = base::Bind(
- &CreateValidCredConduit, local_auth_fd.get(), remote_auth_fd.get());
-
- base::WorkerPool::PostTaskAndReply(
- FROM_HERE, create_credentials_conduit_closure,
- base::Bind(&SessionManagerClientImpl::CallRestartJobWithValidFd,
- weak_ptr_factory_.GetWeakPtr(), base::Passed(&local_auth_fd),
- base::Passed(&remote_auth_fd), argv),
- false);
+ void RestartJob(int socket_fd,
+ const std::vector<std::string>& argv,
+ const VoidDBusMethodCallback& callback) override {
+ dbus::MethodCall method_call(login_manager::kSessionManagerInterface,
+ login_manager::kSessionManagerRestartJob);
+ dbus::MessageWriter writer(&method_call);
+ writer.AppendFileDescriptor(socket_fd);
+ writer.AppendArrayOfStrings(argv);
+ session_manager_proxy_->CallMethod(
+ &method_call, dbus::ObjectProxy::TIMEOUT_USE_DEFAULT,
+ base::Bind(&SessionManagerClientImpl::OnRestartJob,
+ weak_ptr_factory_.GetWeakPtr(), callback));
}
void StartSession(const cryptohome::Identification& cryptohome_id) override {
@@ -505,39 +466,14 @@ class SessionManagerClientImpl : public SessionManagerClient {
callback));
}
- // Calls RestartJob to tell the session manager to restart the browser using
- // the contents of |argv| as the command line, authorizing the call using
- // credentials acquired via |remote_auth_fd|. Ownership of |local_auth_fd| is
- // held for the duration of the dbus call.
- void CallRestartJobWithValidFd(dbus::ScopedFileDescriptor local_auth_fd,
- dbus::ScopedFileDescriptor remote_auth_fd,
- const std::vector<std::string>& argv) {
- VLOG(1) << "CallRestartJobWithValidFd";
- dbus::MethodCall method_call(login_manager::kSessionManagerInterface,
- login_manager::kSessionManagerRestartJob);
- dbus::MessageWriter writer(&method_call);
- writer.AppendFileDescriptor(*remote_auth_fd);
- writer.AppendArrayOfStrings(argv);
-
- // Ownership of local_auth_fd is passed to the callback that is to be
- // called on completion of this method call. This keeps the browser end
- // of the socket-pair alive for the duration of the RPC.
- session_manager_proxy_->CallMethod(
- &method_call, dbus::ObjectProxy::TIMEOUT_USE_DEFAULT,
- base::Bind(&SessionManagerClientImpl::OnRestartJob,
- weak_ptr_factory_.GetWeakPtr(),
- base::Passed(&local_auth_fd)));
- }
-
// Called when kSessionManagerRestartJob method is complete.
- // Now that the call is complete, local_auth_fd can be closed and discarded,
- // which will happen automatically when it goes out of scope.
- void OnRestartJob(dbus::ScopedFileDescriptor local_auth_fd,
+ void OnRestartJob(const VoidDBusMethodCallback& callback,
dbus::Response* response) {
- VLOG(1) << "OnRestartJob";
LOG_IF(ERROR, !response)
<< "Failed to call "
<< login_manager::kSessionManagerRestartJob;
+ callback.Run(response ? DBUS_METHOD_CALL_SUCCESS
+ : DBUS_METHOD_CALL_FAILURE);
}
// Called when kSessionManagerStartSession method is complete.
@@ -816,7 +752,9 @@ class SessionManagerClientStubImpl : public SessionManagerClient {
}
bool IsScreenLocked() const override { return screen_is_locked_; }
void EmitLoginPromptVisible() override {}
- void RestartJob(const std::vector<std::string>& argv) override {}
+ void RestartJob(int socket_fd,
+ const std::vector<std::string>& argv,
+ const VoidDBusMethodCallback& callback) override {}
void StartSession(const cryptohome::Identification& cryptohome_id) override {}
void StopSession() override {}
void NotifySupervisedUserCreationStarted() override {}
« no previous file with comments | « chromeos/dbus/session_manager_client.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698