Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(468)

Unified Diff: components/sync/driver/glue/sync_backend_host_impl.cc

Issue 2663783002: [Sync] Split encryption state and logic out of PSS and SBHI. (Closed)
Patch Set: Tweak comment. Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/sync/driver/glue/sync_backend_host_impl.cc
diff --git a/components/sync/driver/glue/sync_backend_host_impl.cc b/components/sync/driver/glue/sync_backend_host_impl.cc
index 0106db4c35c75d85980b0eba0576772245170838..a15801b563a37fcc4f7d4e8009d06505c5cf73a6 100644
--- a/components/sync/driver/glue/sync_backend_host_impl.cc
+++ b/components/sync/driver/glue/sync_backend_host_impl.cc
@@ -106,65 +106,17 @@ void SyncBackendHostImpl::StartSyncingWithServer() {
void SyncBackendHostImpl::SetEncryptionPassphrase(const std::string& passphrase,
bool is_explicit) {
DCHECK(thread_checker_.CalledOnValidThread());
-
- if (!IsNigoriEnabled()) {
- NOTREACHED() << "SetEncryptionPassphrase must never be called when nigori"
- " is disabled.";
- return;
- }
-
- // We should never be called with an empty passphrase.
- DCHECK(!passphrase.empty());
-
- // SetEncryptionPassphrase should never be called if we are currently
- // encrypted with an explicit passphrase.
- DCHECK(cached_passphrase_type_ == PassphraseType::KEYSTORE_PASSPHRASE ||
- cached_passphrase_type_ == PassphraseType::IMPLICIT_PASSPHRASE);
-
- // Post an encryption task on the syncer thread.
sync_task_runner_->PostTask(
FROM_HERE, base::Bind(&SyncBackendHostCore::DoSetEncryptionPassphrase,
core_, passphrase, is_explicit));
}
-bool SyncBackendHostImpl::SetDecryptionPassphrase(
+void SyncBackendHostImpl::SetDecryptionPassphrase(
const std::string& passphrase) {
DCHECK(thread_checker_.CalledOnValidThread());
-
- if (!IsNigoriEnabled()) {
- NOTREACHED() << "SetDecryptionPassphrase must never be called when nigori"
- " is disabled.";
- return false;
- }
-
- // We should never be called with an empty passphrase.
- DCHECK(!passphrase.empty());
-
- // This should only be called when we have cached pending keys.
- DCHECK(cached_pending_keys_.has_blob());
-
- // Check the passphrase that was provided against our local cache of the
- // cryptographer's pending keys. If this was unsuccessful, the UI layer can
- // immediately call OnPassphraseRequired without showing the user a spinner.
- if (!CheckPassphraseAgainstCachedPendingKeys(passphrase))
- return false;
-
- // Post a decryption task on the syncer thread.
sync_task_runner_->PostTask(
FROM_HERE, base::Bind(&SyncBackendHostCore::DoSetDecryptionPassphrase,
core_, passphrase));
-
- // Since we were able to decrypt the cached pending keys with the passphrase
- // provided, we immediately alert the UI layer that the passphrase was
- // accepted. This will avoid the situation where a user enters a passphrase,
- // clicks OK, immediately reopens the advanced settings dialog, and gets an
- // unnecessary prompt for a passphrase.
- // Note: It is not guaranteed that the passphrase will be accepted by the
- // syncer thread, since we could receive a new nigori node while the task is
- // pending. This scenario is a valid race, and SetDecryptionPassphrase can
- // trigger a new OnPassphraseRequired if it needs to.
- NotifyPassphraseAccepted();
- return true;
}
void SyncBackendHostImpl::StopSyncingForShutdown() {
@@ -267,18 +219,6 @@ bool SyncBackendHostImpl::HasUnsyncedItems() const {
return core_->sync_manager()->HasUnsyncedItems();
}
-bool SyncBackendHostImpl::IsNigoriEnabled() const {
- return registrar_ && registrar_->IsNigoriEnabled();
-}
-
-PassphraseType SyncBackendHostImpl::GetPassphraseType() const {
- return cached_passphrase_type_;
-}
-
-base::Time SyncBackendHostImpl::GetExplicitPassphraseTime() const {
- return cached_explicit_passphrase_time_;
-}
-
bool SyncBackendHostImpl::IsCryptographerReady(
const BaseTransaction* trans) const {
return initialized() && trans->GetCryptographer() &&
@@ -406,16 +346,6 @@ void SyncBackendHostImpl::RetryConfigurationOnFrontendLoop(
retry_callback.Run();
}
-void SyncBackendHostImpl::PersistEncryptionBootstrapToken(
- const std::string& token,
- BootstrapTokenType token_type) {
- CHECK(sync_prefs_.get());
- if (token_type == PASSPHRASE_BOOTSTRAP_TOKEN)
- sync_prefs_->SetEncryptionBootstrapToken(token);
- else
- sync_prefs_->SetKeystoreEncryptionBootstrapToken(token);
-}
-
void SyncBackendHostImpl::HandleActionableErrorEventOnFrontendLoop(
const SyncProtocolError& sync_error) {
DCHECK(thread_checker_.CalledOnValidThread());
@@ -445,63 +375,6 @@ std::string SyncBackendHostImpl::GetOwnerName() const {
return "SyncBackendHostImpl";
}
-bool SyncBackendHostImpl::CheckPassphraseAgainstCachedPendingKeys(
- const std::string& passphrase) const {
- DCHECK(cached_pending_keys_.has_blob());
- DCHECK(!passphrase.empty());
- Nigori nigori;
- nigori.InitByDerivation("localhost", "dummy", passphrase);
- std::string plaintext;
- bool result = nigori.Decrypt(cached_pending_keys_.blob(), &plaintext);
- DVLOG_IF(1, result) << "Passphrase failed to decrypt pending keys.";
- return result;
-}
-
-void SyncBackendHostImpl::NotifyPassphraseRequired(
- PassphraseRequiredReason reason,
- sync_pb::EncryptedData pending_keys) {
- DCHECK(thread_checker_.CalledOnValidThread());
-
- // Update our cache of the cryptographer's pending keys.
- cached_pending_keys_ = pending_keys;
-
- host_->OnPassphraseRequired(reason, pending_keys);
-}
-
-void SyncBackendHostImpl::NotifyPassphraseAccepted() {
- DCHECK(thread_checker_.CalledOnValidThread());
- // Clear our cache of the cryptographer's pending keys.
- cached_pending_keys_.clear_blob();
- host_->OnPassphraseAccepted();
-}
-
-void SyncBackendHostImpl::NotifyEncryptedTypesChanged(
- ModelTypeSet encrypted_types,
- bool encrypt_everything) {
- DCHECK(thread_checker_.CalledOnValidThread());
- host_->OnEncryptedTypesChanged(encrypted_types, encrypt_everything);
-}
-
-void SyncBackendHostImpl::NotifyEncryptionComplete() {
- DCHECK(thread_checker_.CalledOnValidThread());
- host_->OnEncryptionComplete();
-}
-
-void SyncBackendHostImpl::HandlePassphraseTypeChangedOnFrontendLoop(
- PassphraseType type,
- base::Time explicit_passphrase_time) {
- DCHECK(thread_checker_.CalledOnValidThread());
- DVLOG(1) << "Passphrase type changed to " << PassphraseTypeToString(type);
- cached_passphrase_type_ = type;
- cached_explicit_passphrase_time_ = explicit_passphrase_time;
-}
-
-void SyncBackendHostImpl::HandleLocalSetPassphraseEncryptionOnFrontendLoop(
- const SyncEncryptionHandler::NigoriState& nigori_state) {
- DCHECK(thread_checker_.CalledOnValidThread());
- host_->OnLocalSetPassphraseEncryption(nigori_state);
-}
-
void SyncBackendHostImpl::HandleConnectionStatusChangeOnFrontendLoop(
ConnectionStatus status) {
DCHECK(thread_checker_.CalledOnValidThread());
« no previous file with comments | « components/sync/driver/glue/sync_backend_host_impl.h ('k') | components/sync/driver/glue/sync_backend_host_impl_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698