OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2017 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #ifndef COMPONENTS_SYNC_DRIVER_SYNC_SERVICE_CRYPTO_H_ | |
6 #define COMPONENTS_SYNC_DRIVER_SYNC_SERVICE_CRYPTO_H_ | |
7 | |
8 #include <memory> | |
9 #include <string> | |
10 | |
11 #include "base/callback.h" | |
12 #include "base/memory/weak_ptr.h" | |
13 #include "components/sync/base/model_type.h" | |
14 #include "components/sync/engine/sync_encryption_handler.h" | |
15 #include "components/sync/engine/sync_engine.h" | |
16 | |
17 namespace syncer { | |
18 | |
19 class DataTypeManager; | |
20 class SyncPrefs; | |
21 | |
22 // This class functions as an extension of SyncServiceBase that handles things | |
skym
2017/01/31 01:58:54
Extension is an odd word that I think you're tryin
maxbogue
2017/01/31 07:51:10
Good point. Changed the wording to be "a mostly in
| |
23 // related to encryption, including holding lots of state and handling | |
24 // communications with the sync thread. | |
25 class SyncServiceCrypto : public SyncEncryptionHandler::Observer { | |
26 public: | |
27 SyncServiceCrypto(const base::Closure& notify_observers, | |
28 const base::Callback<ModelTypeSet()>& get_preferred_types, | |
29 SyncPrefs* sync_prefs); | |
30 ~SyncServiceCrypto() override; | |
31 | |
32 // See the SyncService header. | |
skym
2017/01/31 01:58:54
Usually we use interfaces when multiple classes im
maxbogue
2017/01/31 07:51:10
I think it would be good to do, but quite frankly
| |
33 base::Time GetExplicitPassphraseTime() const; | |
34 bool IsUsingSecondaryPassphrase() const; | |
35 void EnableEncryptEverything(); | |
36 bool IsEncryptEverythingEnabled() const; | |
37 void SetEncryptionPassphrase(const std::string& passphrase, bool is_explicit); | |
38 bool SetDecryptionPassphrase(const std::string& passphrase); | |
39 | |
40 // Returns the actual passphrase type being used for encryption. | |
41 PassphraseType GetPassphraseType() const; | |
42 | |
43 // Returns true if encrypting all the sync data is allowed. If this method | |
44 // returns false, EnableEncryptEverything() should not be called. | |
45 bool IsEncryptEverythingAllowed() const; | |
46 | |
47 // Sets whether encrypting all the sync data is allowed or not. | |
48 void SetEncryptEverythingAllowed(bool allowed); | |
49 | |
50 // Returns the current set of encrypted data types. | |
51 ModelTypeSet GetEncryptedDataTypes() const; | |
52 | |
53 // SyncEncryptionHandler::Observer implementation. | |
54 void OnPassphraseRequired( | |
55 PassphraseRequiredReason reason, | |
56 const sync_pb::EncryptedData& pending_keys) override; | |
57 void OnPassphraseAccepted() override; | |
58 void OnBootstrapTokenUpdated(const std::string& bootstrap_token, | |
59 BootstrapTokenType type) override; | |
60 void OnEncryptedTypesChanged(ModelTypeSet encrypted_types, | |
61 bool encrypt_everything) override; | |
62 void OnEncryptionComplete() override; | |
63 void OnCryptographerStateChanged(Cryptographer* cryptographer) override; | |
64 void OnPassphraseTypeChanged(PassphraseType type, | |
65 base::Time passphrase_time) override; | |
66 void OnLocalSetPassphraseEncryption( | |
67 const SyncEncryptionHandler::NigoriState& nigori_state) override; | |
68 | |
69 // Calls data type manager to start catch up configure. | |
70 void BeginConfigureCatchUpBeforeClear(); | |
71 | |
72 // Used to provide the engine and DTM when the engine is initialized. | |
73 void SetSyncEngine(SyncEngine* engine) { engine_ = engine; } | |
74 void SetDataTypeManager(DataTypeManager* dtm) { data_type_manager_ = dtm; } | |
75 | |
76 // Creates a proxy observer object that will post calls to this thread. | |
77 std::unique_ptr<SyncEncryptionHandler::Observer> GetEncryptionObserverProxy(); | |
78 | |
79 // Takes the previously saved nigori state; null if there isn't any. | |
80 std::unique_ptr<SyncEncryptionHandler::NigoriState> TakeSavedNigoriState(); | |
81 | |
82 // Sets the cached passphrase. | |
83 void CachePassphrase(const std::string& passphrase) { | |
84 cached_passphrase_ = passphrase; | |
85 } | |
86 | |
87 // During initial signin, ProfileSyncService caches the user's signin | |
88 // passphrase so it can be used to encrypt/decrypt data after sync starts up. | |
89 // This routine is invoked once the engine has started up to use the | |
90 // cached passphrase and clear it out when it is done. | |
91 void ConsumeCachedPassphraseIfPossible(); | |
92 | |
93 PassphraseRequiredReason passphrase_required_reason() const { | |
94 return passphrase_required_reason_; | |
95 } | |
96 const std::string& cached_passphrase() { return cached_passphrase_; } | |
97 bool encryption_pending() { return encryption_pending_; } | |
98 | |
99 private: | |
100 // Checks if |passphrase| can be used to decrypt the cryptographer's pending | |
101 // keys that were cached during NotifyPassphraseRequired. Returns true if | |
102 // decryption was successful. Returns false otherwise. Must be called with a | |
103 // non-empty pending keys cache. | |
104 bool CheckPassphraseAgainstCachedPendingKeys( | |
105 const std::string& passphrase) const; | |
106 | |
107 // Calls SyncServiceBase::NotifyObservers(). Never null. | |
108 const base::Closure notify_observers_; | |
109 | |
110 // Calls SyncService::GetPreferredDataTypes(). Never null. | |
111 const base::Callback<ModelTypeSet()> get_preferred_types_; | |
112 | |
113 // A pointer to the sync prefs. Never null and guaranteed to outlive us. | |
114 SyncPrefs* const sync_prefs_; | |
115 | |
116 // These are only not-null when the engine is initialized. | |
117 SyncEngine* engine_ = nullptr; | |
118 DataTypeManager* data_type_manager_ = nullptr; | |
119 | |
120 // Was the last SYNC_PASSPHRASE_REQUIRED notification sent because it | |
121 // was required for encryption, decryption with a cached passphrase, or | |
122 // because a new passphrase is required? | |
123 PassphraseRequiredReason passphrase_required_reason_ = | |
124 REASON_PASSPHRASE_NOT_REQUIRED; | |
125 | |
126 // Sometimes we need to temporarily hold on to a passphrase because we don't | |
127 // yet have a engine to send it to. This happens during initialization as | |
128 // we don't StartUp until we have a valid token, which happens after valid | |
129 // credentials were provided. | |
130 std::string cached_passphrase_; | |
131 | |
132 // The current set of encrypted types. Always a superset of | |
133 // Cryptographer::SensitiveTypes(). | |
134 ModelTypeSet encrypted_types_ = SyncEncryptionHandler::SensitiveTypes(); | |
135 | |
136 // Whether encrypting everything is allowed. | |
137 bool encrypt_everything_allowed_ = true; | |
138 | |
139 // Whether we want to encrypt everything. | |
140 bool encrypt_everything_ = false; | |
141 | |
142 // Whether we're waiting for an attempt to encryption all sync data to | |
143 // complete. We track this at this layer in order to allow the user to cancel | |
144 // if they e.g. don't remember their explicit passphrase. | |
145 bool encryption_pending_ = false; | |
146 | |
147 // Nigori state after user switching to custom passphrase, saved until | |
148 // transition steps complete. It will be injected into new engine after sync | |
149 // restart. | |
150 std::unique_ptr<SyncEncryptionHandler::NigoriState> saved_nigori_state_; | |
151 | |
152 // We cache the cryptographer's pending keys whenever NotifyPassphraseRequired | |
153 // is called. This way, before the UI calls SetDecryptionPassphrase on the | |
154 // syncer, it can avoid the overhead of an asynchronous decryption call and | |
155 // give the user immediate feedback about the passphrase entered by first | |
156 // trying to decrypt the cached pending keys on the UI thread. Note that | |
157 // SetDecryptionPassphrase can still fail after the cached pending keys are | |
158 // successfully decrypted if the pending keys have changed since the time they | |
159 // were cached. | |
160 sync_pb::EncryptedData cached_pending_keys_; | |
161 | |
162 // The state of the passphrase required to decrypt the bag of encryption keys | |
163 // in the nigori node. Updated whenever a new nigori node arrives or the user | |
164 // manually changes their passphrase state. Cached so we can synchronously | |
165 // check it from the UI thread. | |
166 PassphraseType cached_passphrase_type_ = PassphraseType::IMPLICIT_PASSPHRASE; | |
167 | |
168 // If an explicit passphrase is in use, the time at which the passphrase was | |
169 // first set (if available). | |
170 base::Time cached_explicit_passphrase_time_; | |
171 | |
172 base::ThreadChecker thread_checker_; | |
173 base::WeakPtrFactory<SyncServiceCrypto> weak_factory_; | |
174 | |
175 DISALLOW_COPY_AND_ASSIGN(SyncServiceCrypto); | |
176 }; | |
177 | |
178 } // namespace syncer | |
179 | |
180 #endif // COMPONENTS_SYNC_DRIVER_SYNC_SERVICE_CRYPTO_H_ | |
OLD | NEW |