Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(341)

Side by Side Diff: extensions/browser/api/cast_channel/cast_socket.cc

Issue 2926313002: Revert of [cast_channel] Move cast_channel related files from //extensions to //components (Closed)
Patch Set: Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "extensions/browser/api/cast_channel/cast_socket.h"
6
7 #include <stdlib.h>
8 #include <string.h>
9
10 #include <utility>
11
12 #include "base/bind.h"
13 #include "base/callback_helpers.h"
14 #include "base/format_macros.h"
15 #include "base/lazy_instance.h"
16 #include "base/location.h"
17 #include "base/memory/ptr_util.h"
18 #include "base/numerics/safe_conversions.h"
19 #include "base/single_thread_task_runner.h"
20 #include "base/strings/string_number_conversions.h"
21 #include "base/strings/stringprintf.h"
22 #include "base/sys_byteorder.h"
23 #include "base/threading/thread_task_runner_handle.h"
24 #include "base/time/time.h"
25 #include "extensions/browser/api/cast_channel/cast_auth_util.h"
26 #include "extensions/browser/api/cast_channel/cast_framer.h"
27 #include "extensions/browser/api/cast_channel/cast_message_util.h"
28 #include "extensions/browser/api/cast_channel/cast_transport.h"
29 #include "extensions/browser/api/cast_channel/logger.h"
30 #include "extensions/common/api/cast_channel/cast_channel.pb.h"
31 #include "net/base/address_list.h"
32 #include "net/base/host_port_pair.h"
33 #include "net/base/net_errors.h"
34 #include "net/cert/cert_verifier.h"
35 #include "net/cert/cert_verify_result.h"
36 #include "net/cert/ct_policy_enforcer.h"
37 #include "net/cert/multi_log_ct_verifier.h"
38 #include "net/cert/x509_certificate.h"
39 #include "net/http/transport_security_state.h"
40 #include "net/log/net_log.h"
41 #include "net/log/net_log_source_type.h"
42 #include "net/socket/client_socket_factory.h"
43 #include "net/socket/client_socket_handle.h"
44 #include "net/socket/ssl_client_socket.h"
45 #include "net/socket/stream_socket.h"
46 #include "net/socket/tcp_client_socket.h"
47 #include "net/ssl/ssl_config_service.h"
48 #include "net/ssl/ssl_info.h"
49
50 // Helper for logging data with remote host IP and authentication state.
51 // Assumes |ip_endpoint_| of type net::IPEndPoint and |channel_auth_| of enum
52 // type ChannelAuthType are available in the current scope.
53 #define CONNECTION_INFO() \
54 "[" << ip_endpoint_.ToString() \
55 << ", auth=" << ::cast_channel::ChannelAuthTypeToString(channel_auth_) \
56 << "] "
57 #define VLOG_WITH_CONNECTION(level) VLOG(level) << CONNECTION_INFO()
58 #define LOG_WITH_CONNECTION(level) LOG(level) << CONNECTION_INFO()
59
60 namespace extensions {
61 namespace api {
62 namespace cast_channel {
63 namespace {
64
65 bool IsTerminalState(proto::ConnectionState state) {
66 return state == proto::CONN_STATE_FINISHED ||
67 state == proto::CONN_STATE_ERROR || state == proto::CONN_STATE_TIMEOUT;
68 }
69
70 // Cert verifier which blindly accepts all certificates, regardless of validity.
71 class FakeCertVerifier : public net::CertVerifier {
72 public:
73 FakeCertVerifier() {}
74 ~FakeCertVerifier() override {}
75
76 int Verify(const RequestParams& params,
77 net::CRLSet*,
78 net::CertVerifyResult* verify_result,
79 const net::CompletionCallback&,
80 std::unique_ptr<Request>*,
81 const net::NetLogWithSource&) override {
82 verify_result->Reset();
83 verify_result->verified_cert = params.certificate();
84 return net::OK;
85 }
86 };
87
88 } // namespace
89
90 using ChannelError = ::cast_channel::ChannelError;
91 using ChannelAuthType = ::cast_channel::ChannelAuthType;
92 using ReadyState = ::cast_channel::ReadyState;
93
94 CastSocketImpl::CastSocketImpl(const std::string& owner_extension_id,
95 const net::IPEndPoint& ip_endpoint,
96 ChannelAuthType channel_auth,
97 net::NetLog* net_log,
98 const base::TimeDelta& timeout,
99 bool keep_alive,
100 const scoped_refptr<Logger>& logger,
101 uint64_t device_capabilities)
102 : CastSocketImpl(owner_extension_id,
103 ip_endpoint,
104 channel_auth,
105 net_log,
106 timeout,
107 keep_alive,
108 logger,
109 device_capabilities,
110 AuthContext::Create()) {}
111
112 CastSocketImpl::CastSocketImpl(const std::string& owner_extension_id,
113 const net::IPEndPoint& ip_endpoint,
114 ChannelAuthType channel_auth,
115 net::NetLog* net_log,
116 const base::TimeDelta& timeout,
117 bool keep_alive,
118 const scoped_refptr<Logger>& logger,
119 uint64_t device_capabilities,
120 const AuthContext& auth_context)
121 : channel_id_(0),
122 ip_endpoint_(ip_endpoint),
123 channel_auth_(channel_auth),
124 net_log_(net_log),
125 keep_alive_(keep_alive),
126 logger_(logger),
127 auth_context_(auth_context),
128 connect_timeout_(timeout),
129 connect_timeout_timer_(new base::OneShotTimer),
130 is_canceled_(false),
131 device_capabilities_(device_capabilities),
132 audio_only_(false),
133 connect_state_(proto::CONN_STATE_START_CONNECT),
134 error_state_(ChannelError::NONE),
135 ready_state_(ReadyState::NONE),
136 auth_delegate_(nullptr) {
137 DCHECK(net_log_);
138 net_log_source_.type = net::NetLogSourceType::SOCKET;
139 net_log_source_.id = net_log_->NextID();
140 }
141
142 CastSocketImpl::~CastSocketImpl() {
143 // Ensure that resources are freed but do not run pending callbacks that
144 // would result in re-entrancy.
145 CloseInternal();
146
147 if (!connect_callback_.is_null())
148 base::ResetAndReturn(&connect_callback_).Run(ChannelError::UNKNOWN);
149 }
150
151 ReadyState CastSocketImpl::ready_state() const {
152 return ready_state_;
153 }
154
155 ChannelError CastSocketImpl::error_state() const {
156 return error_state_;
157 }
158
159 const net::IPEndPoint& CastSocketImpl::ip_endpoint() const {
160 return ip_endpoint_;
161 }
162
163 int CastSocketImpl::id() const {
164 return channel_id_;
165 }
166
167 void CastSocketImpl::set_id(int id) {
168 channel_id_ = id;
169 }
170
171 ChannelAuthType CastSocketImpl::channel_auth() const {
172 return channel_auth_;
173 }
174
175 bool CastSocketImpl::keep_alive() const {
176 return keep_alive_;
177 }
178
179 bool CastSocketImpl::audio_only() const {
180 return audio_only_;
181 }
182
183 std::unique_ptr<net::TCPClientSocket> CastSocketImpl::CreateTcpSocket() {
184 net::AddressList addresses(ip_endpoint_);
185 return std::unique_ptr<net::TCPClientSocket>(
186 new net::TCPClientSocket(addresses, nullptr, net_log_, net_log_source_));
187 // Options cannot be set on the TCPClientSocket yet, because the
188 // underlying platform socket will not be created until Bind()
189 // or Connect() is called.
190 }
191
192 std::unique_ptr<net::SSLClientSocket> CastSocketImpl::CreateSslSocket(
193 std::unique_ptr<net::StreamSocket> socket) {
194 net::SSLConfig ssl_config;
195 cert_verifier_ = base::WrapUnique(new FakeCertVerifier);
196 transport_security_state_.reset(new net::TransportSecurityState);
197 cert_transparency_verifier_.reset(new net::MultiLogCTVerifier());
198 ct_policy_enforcer_.reset(new net::CTPolicyEnforcer());
199
200 // Note that |context| fields remain owned by CastSocketImpl.
201 net::SSLClientSocketContext context;
202 context.cert_verifier = cert_verifier_.get();
203 context.transport_security_state = transport_security_state_.get();
204 context.cert_transparency_verifier = cert_transparency_verifier_.get();
205 context.ct_policy_enforcer = ct_policy_enforcer_.get();
206
207 std::unique_ptr<net::ClientSocketHandle> connection(
208 new net::ClientSocketHandle);
209 connection->SetSocket(std::move(socket));
210 net::HostPortPair host_and_port = net::HostPortPair::FromIPEndPoint(
211 ip_endpoint_);
212
213 return net::ClientSocketFactory::GetDefaultFactory()->CreateSSLClientSocket(
214 std::move(connection), host_and_port, ssl_config, context);
215 }
216
217 scoped_refptr<net::X509Certificate> CastSocketImpl::ExtractPeerCert() {
218 net::SSLInfo ssl_info;
219 if (!socket_->GetSSLInfo(&ssl_info) || !ssl_info.cert.get())
220 return nullptr;
221
222 return ssl_info.cert;
223 }
224
225 bool CastSocketImpl::VerifyChannelPolicy(const AuthResult& result) {
226 audio_only_ = (result.channel_policies & AuthResult::POLICY_AUDIO_ONLY) != 0;
227 if (audio_only_ &&
228 (device_capabilities_ & CastDeviceCapability::VIDEO_OUT) != 0) {
229 LOG_WITH_CONNECTION(ERROR)
230 << "Audio only channel policy enforced for video out capable device";
231 return false;
232 }
233 return true;
234 }
235
236 bool CastSocketImpl::VerifyChallengeReply() {
237 DCHECK(peer_cert_);
238 AuthResult result =
239 AuthenticateChallengeReply(*challenge_reply_, *peer_cert_, auth_context_);
240 logger_->LogSocketChallengeReplyEvent(channel_id_, result);
241 if (result.success()) {
242 VLOG(1) << result.error_message;
243 if (!VerifyChannelPolicy(result)) {
244 return false;
245 }
246 }
247 return result.success();
248 }
249
250 void CastSocketImpl::SetTransportForTesting(
251 std::unique_ptr<CastTransport> transport) {
252 transport_ = std::move(transport);
253 }
254
255 void CastSocketImpl::Connect(std::unique_ptr<CastTransport::Delegate> delegate,
256 base::Callback<void(ChannelError)> callback) {
257 DCHECK(CalledOnValidThread());
258 VLOG_WITH_CONNECTION(1) << "Connect readyState = "
259 << ::cast_channel::ReadyStateToString(ready_state_);
260 DCHECK_EQ(proto::CONN_STATE_START_CONNECT, connect_state_);
261
262 delegate_ = std::move(delegate);
263
264 if (ready_state_ != ReadyState::NONE) {
265 callback.Run(ChannelError::CONNECT_ERROR);
266 return;
267 }
268
269 connect_callback_ = callback;
270 SetReadyState(ReadyState::CONNECTING);
271 SetConnectState(proto::CONN_STATE_TCP_CONNECT);
272
273 // Set up connection timeout.
274 if (connect_timeout_.InMicroseconds() > 0) {
275 DCHECK(connect_timeout_callback_.IsCancelled());
276 connect_timeout_callback_.Reset(
277 base::Bind(&CastSocketImpl::OnConnectTimeout, base::Unretained(this)));
278 GetTimer()->Start(FROM_HERE,
279 connect_timeout_,
280 connect_timeout_callback_.callback());
281 }
282
283 DoConnectLoop(net::OK);
284 }
285
286 CastTransport* CastSocketImpl::transport() const {
287 return transport_.get();
288 }
289
290 void CastSocketImpl::OnConnectTimeout() {
291 DCHECK(CalledOnValidThread());
292 // Stop all pending connection setup tasks and report back to the client.
293 is_canceled_ = true;
294 VLOG_WITH_CONNECTION(1) << "Timeout while establishing a connection.";
295 SetErrorState(ChannelError::CONNECT_TIMEOUT);
296 DoConnectCallback();
297 }
298
299 void CastSocketImpl::ResetConnectLoopCallback() {
300 DCHECK(connect_loop_callback_.IsCancelled());
301 connect_loop_callback_.Reset(
302 base::Bind(&CastSocketImpl::DoConnectLoop, base::Unretained(this)));
303 }
304
305 void CastSocketImpl::PostTaskToStartConnectLoop(int result) {
306 DCHECK(CalledOnValidThread());
307
308 ResetConnectLoopCallback();
309 base::ThreadTaskRunnerHandle::Get()->PostTask(
310 FROM_HERE, base::Bind(connect_loop_callback_.callback(), result));
311 }
312
313 // This method performs the state machine transitions for connection flow.
314 // There are two entry points to this method:
315 // 1. Connect method: this starts the flow
316 // 2. Callback from network operations that finish asynchronously.
317 void CastSocketImpl::DoConnectLoop(int result) {
318 connect_loop_callback_.Cancel();
319 if (is_canceled_) {
320 LOG_WITH_CONNECTION(ERROR) << "CANCELLED - Aborting DoConnectLoop.";
321 return;
322 }
323
324 // Network operations can either finish synchronously or asynchronously.
325 // This method executes the state machine transitions in a loop so that
326 // correct state transitions happen even when network operations finish
327 // synchronously.
328 int rv = result;
329 do {
330 proto::ConnectionState state = connect_state_;
331 connect_state_ = proto::CONN_STATE_UNKNOWN;
332 switch (state) {
333 case proto::CONN_STATE_TCP_CONNECT:
334 rv = DoTcpConnect();
335 break;
336 case proto::CONN_STATE_TCP_CONNECT_COMPLETE:
337 rv = DoTcpConnectComplete(rv);
338 break;
339 case proto::CONN_STATE_SSL_CONNECT:
340 DCHECK_EQ(net::OK, rv);
341 rv = DoSslConnect();
342 break;
343 case proto::CONN_STATE_SSL_CONNECT_COMPLETE:
344 rv = DoSslConnectComplete(rv);
345 break;
346 case proto::CONN_STATE_AUTH_CHALLENGE_SEND:
347 rv = DoAuthChallengeSend();
348 break;
349 case proto::CONN_STATE_AUTH_CHALLENGE_SEND_COMPLETE:
350 rv = DoAuthChallengeSendComplete(rv);
351 break;
352 case proto::CONN_STATE_AUTH_CHALLENGE_REPLY_COMPLETE:
353 rv = DoAuthChallengeReplyComplete(rv);
354 DCHECK(IsTerminalState(connect_state_));
355 break;
356 default:
357 NOTREACHED() << "Unknown state in connect flow: " << state;
358 SetConnectState(proto::CONN_STATE_FINISHED);
359 SetErrorState(ChannelError::UNKNOWN);
360 DoConnectCallback();
361 return;
362 }
363 } while (rv != net::ERR_IO_PENDING && !IsTerminalState(connect_state_));
364 // Exit the state machine if an asynchronous network operation is pending
365 // or if the state machine is in the terminal "finished" state.
366
367 if (IsTerminalState(connect_state_)) {
368 DCHECK_NE(rv, net::ERR_IO_PENDING);
369 GetTimer()->Stop();
370 DoConnectCallback();
371 } else {
372 DCHECK_EQ(rv, net::ERR_IO_PENDING);
373 }
374 }
375
376 int CastSocketImpl::DoTcpConnect() {
377 DCHECK(connect_loop_callback_.IsCancelled());
378 VLOG_WITH_CONNECTION(1) << "DoTcpConnect";
379 SetConnectState(proto::CONN_STATE_TCP_CONNECT_COMPLETE);
380 tcp_socket_ = CreateTcpSocket();
381
382 int rv = tcp_socket_->Connect(
383 base::Bind(&CastSocketImpl::DoConnectLoop, base::Unretained(this)));
384 logger_->LogSocketEventWithRv(channel_id_, proto::TCP_SOCKET_CONNECT, rv);
385 return rv;
386 }
387
388 int CastSocketImpl::DoTcpConnectComplete(int connect_result) {
389 VLOG_WITH_CONNECTION(1) << "DoTcpConnectComplete: " << connect_result;
390 logger_->LogSocketEventWithRv(channel_id_, proto::TCP_SOCKET_CONNECT_COMPLETE,
391 connect_result);
392 if (connect_result == net::OK) {
393 SetConnectState(proto::CONN_STATE_SSL_CONNECT);
394 } else if (connect_result == net::ERR_CONNECTION_TIMED_OUT) {
395 SetConnectState(proto::CONN_STATE_FINISHED);
396 SetErrorState(ChannelError::CONNECT_TIMEOUT);
397 } else {
398 SetConnectState(proto::CONN_STATE_FINISHED);
399 SetErrorState(ChannelError::CONNECT_ERROR);
400 }
401 return connect_result;
402 }
403
404 int CastSocketImpl::DoSslConnect() {
405 DCHECK(connect_loop_callback_.IsCancelled());
406 VLOG_WITH_CONNECTION(1) << "DoSslConnect";
407 SetConnectState(proto::CONN_STATE_SSL_CONNECT_COMPLETE);
408 socket_ = CreateSslSocket(std::move(tcp_socket_));
409
410 int rv = socket_->Connect(
411 base::Bind(&CastSocketImpl::DoConnectLoop, base::Unretained(this)));
412 logger_->LogSocketEventWithRv(channel_id_, proto::SSL_SOCKET_CONNECT, rv);
413 return rv;
414 }
415
416 int CastSocketImpl::DoSslConnectComplete(int result) {
417 logger_->LogSocketEventWithRv(channel_id_, proto::SSL_SOCKET_CONNECT_COMPLETE,
418 result);
419 VLOG_WITH_CONNECTION(1) << "DoSslConnectComplete: " << result;
420 if (result == net::OK) {
421 peer_cert_ = ExtractPeerCert();
422
423 if (!peer_cert_) {
424 LOG_WITH_CONNECTION(WARNING) << "Could not extract peer cert.";
425 SetConnectState(proto::CONN_STATE_FINISHED);
426 SetErrorState(ChannelError::AUTHENTICATION_ERROR);
427 return net::ERR_CERT_INVALID;
428 }
429
430 // SSL connection succeeded.
431 if (!transport_.get()) {
432 // Create a channel transport if one wasn't already set (e.g. by test
433 // code).
434 transport_.reset(new CastTransportImpl(this->socket_.get(), channel_id_,
435 ip_endpoint_, channel_auth_,
436 logger_));
437 }
438 auth_delegate_ = new AuthTransportDelegate(this);
439 transport_->SetReadDelegate(base::WrapUnique(auth_delegate_));
440 SetConnectState(proto::CONN_STATE_AUTH_CHALLENGE_SEND);
441 } else if (result == net::ERR_CONNECTION_TIMED_OUT) {
442 SetConnectState(proto::CONN_STATE_FINISHED);
443 SetErrorState(ChannelError::CONNECT_TIMEOUT);
444 } else {
445 SetConnectState(proto::CONN_STATE_FINISHED);
446 SetErrorState(ChannelError::AUTHENTICATION_ERROR);
447 }
448 return result;
449 }
450
451 int CastSocketImpl::DoAuthChallengeSend() {
452 VLOG_WITH_CONNECTION(1) << "DoAuthChallengeSend";
453 SetConnectState(proto::CONN_STATE_AUTH_CHALLENGE_SEND_COMPLETE);
454
455 CastMessage challenge_message;
456 CreateAuthChallengeMessage(&challenge_message, auth_context_);
457 VLOG_WITH_CONNECTION(1) << "Sending challenge: "
458 << CastMessageToString(challenge_message);
459
460 ResetConnectLoopCallback();
461 transport_->SendMessage(challenge_message, connect_loop_callback_.callback());
462
463 // Always return IO_PENDING since the result is always asynchronous.
464 return net::ERR_IO_PENDING;
465 }
466
467 int CastSocketImpl::DoAuthChallengeSendComplete(int result) {
468 VLOG_WITH_CONNECTION(1) << "DoAuthChallengeSendComplete: " << result;
469 if (result < 0) {
470 SetConnectState(proto::CONN_STATE_ERROR);
471 SetErrorState(ChannelError::CAST_SOCKET_ERROR);
472 logger_->LogSocketEventWithRv(channel_id_,
473 proto::SEND_AUTH_CHALLENGE_FAILED, result);
474 return result;
475 }
476 transport_->Start();
477 SetConnectState(proto::CONN_STATE_AUTH_CHALLENGE_REPLY_COMPLETE);
478 return net::ERR_IO_PENDING;
479 }
480
481 CastSocketImpl::AuthTransportDelegate::AuthTransportDelegate(
482 CastSocketImpl* socket)
483 : socket_(socket), error_state_(ChannelError::NONE) {
484 DCHECK(socket);
485 }
486
487 ChannelError CastSocketImpl::AuthTransportDelegate::error_state() const {
488 return error_state_;
489 }
490
491 LastErrors CastSocketImpl::AuthTransportDelegate::last_errors() const {
492 return last_errors_;
493 }
494
495 void CastSocketImpl::AuthTransportDelegate::OnError(ChannelError error_state) {
496 error_state_ = error_state;
497 socket_->PostTaskToStartConnectLoop(net::ERR_CONNECTION_FAILED);
498 }
499
500 void CastSocketImpl::AuthTransportDelegate::OnMessage(
501 const CastMessage& message) {
502 if (!IsAuthMessage(message)) {
503 error_state_ = ChannelError::TRANSPORT_ERROR;
504 socket_->PostTaskToStartConnectLoop(net::ERR_INVALID_RESPONSE);
505 } else {
506 socket_->challenge_reply_.reset(new CastMessage(message));
507 socket_->PostTaskToStartConnectLoop(net::OK);
508 }
509 }
510
511 void CastSocketImpl::AuthTransportDelegate::Start() {
512 }
513
514 int CastSocketImpl::DoAuthChallengeReplyComplete(int result) {
515 VLOG_WITH_CONNECTION(1) << "DoAuthChallengeReplyComplete: " << result;
516
517 if (auth_delegate_->error_state() != ChannelError::NONE) {
518 SetErrorState(auth_delegate_->error_state());
519 SetConnectState(proto::CONN_STATE_ERROR);
520 return net::ERR_CONNECTION_FAILED;
521 }
522 auth_delegate_ = nullptr;
523
524 if (result < 0) {
525 SetConnectState(proto::CONN_STATE_ERROR);
526 return result;
527 }
528
529 if (!VerifyChallengeReply()) {
530 SetErrorState(ChannelError::AUTHENTICATION_ERROR);
531 SetConnectState(proto::CONN_STATE_ERROR);
532 return net::ERR_CONNECTION_FAILED;
533 }
534 VLOG_WITH_CONNECTION(1) << "Auth challenge verification succeeded";
535
536 SetConnectState(proto::CONN_STATE_FINISHED);
537 return net::OK;
538 }
539
540 void CastSocketImpl::DoConnectCallback() {
541 VLOG(1) << "DoConnectCallback (error_state = "
542 << ::cast_channel::ChannelErrorToString(error_state_) << ")";
543 if (connect_callback_.is_null()) {
544 DLOG(FATAL) << "Connection callback invoked multiple times.";
545 return;
546 }
547
548 if (error_state_ == ChannelError::NONE) {
549 SetReadyState(ReadyState::OPEN);
550 transport_->SetReadDelegate(std::move(delegate_));
551 } else {
552 CloseInternal();
553 }
554
555 base::ResetAndReturn(&connect_callback_).Run(error_state_);
556 }
557
558 void CastSocketImpl::Close(const net::CompletionCallback& callback) {
559 DCHECK(CalledOnValidThread());
560 CloseInternal();
561 // Run this callback last. It may delete the socket.
562 callback.Run(net::OK);
563 }
564
565 void CastSocketImpl::CloseInternal() {
566 // TODO(mfoltz): Enforce this when CastChannelAPITest is rewritten to create
567 // and free sockets on the same thread. crbug.com/398242
568 DCHECK(CalledOnValidThread());
569 if (ready_state_ == ReadyState::CLOSED) {
570 return;
571 }
572
573 VLOG_WITH_CONNECTION(1) << "Close ReadyState = "
574 << ::cast_channel::ReadyStateToString(ready_state_);
575 transport_.reset();
576 tcp_socket_.reset();
577 socket_.reset();
578 transport_security_state_.reset();
579 if (GetTimer()) {
580 GetTimer()->Stop();
581 }
582
583 // Cancel callbacks that we queued ourselves to re-enter the connect or read
584 // loops.
585 connect_loop_callback_.Cancel();
586 connect_timeout_callback_.Cancel();
587 SetReadyState(ReadyState::CLOSED);
588 }
589
590 bool CastSocketImpl::CalledOnValidThread() const {
591 return thread_checker_.CalledOnValidThread();
592 }
593
594 base::Timer* CastSocketImpl::GetTimer() {
595 return connect_timeout_timer_.get();
596 }
597
598 void CastSocketImpl::SetConnectState(proto::ConnectionState connect_state) {
599 if (connect_state_ != connect_state) {
600 connect_state_ = connect_state;
601 }
602 }
603
604 void CastSocketImpl::SetReadyState(ReadyState ready_state) {
605 if (ready_state_ != ready_state)
606 ready_state_ = ready_state;
607 }
608
609 void CastSocketImpl::SetErrorState(ChannelError error_state) {
610 VLOG_WITH_CONNECTION(1) << "SetErrorState "
611 << ::cast_channel::ChannelErrorToString(error_state);
612 DCHECK_EQ(ChannelError::NONE, error_state_);
613 error_state_ = error_state;
614 delegate_->OnError(error_state_);
615 }
616
617 } // namespace cast_channel
618 } // namespace api
619 } // namespace extensions
620 #undef VLOG_WITH_CONNECTION
OLDNEW
« no previous file with comments | « extensions/browser/api/cast_channel/cast_socket.h ('k') | extensions/browser/api/cast_channel/cast_socket_service.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698