Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(361)

Unified Diff: extensions/browser/api/cast_channel/cast_socket.cc

Issue 2926313002: Revert of [cast_channel] Move cast_channel related files from //extensions to //components (Closed)
Patch Set: Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: extensions/browser/api/cast_channel/cast_socket.cc
diff --git a/extensions/browser/api/cast_channel/cast_socket.cc b/extensions/browser/api/cast_channel/cast_socket.cc
new file mode 100644
index 0000000000000000000000000000000000000000..cb25862539fe78646410009226394f066d8bc9af
--- /dev/null
+++ b/extensions/browser/api/cast_channel/cast_socket.cc
@@ -0,0 +1,620 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "extensions/browser/api/cast_channel/cast_socket.h"
+
+#include <stdlib.h>
+#include <string.h>
+
+#include <utility>
+
+#include "base/bind.h"
+#include "base/callback_helpers.h"
+#include "base/format_macros.h"
+#include "base/lazy_instance.h"
+#include "base/location.h"
+#include "base/memory/ptr_util.h"
+#include "base/numerics/safe_conversions.h"
+#include "base/single_thread_task_runner.h"
+#include "base/strings/string_number_conversions.h"
+#include "base/strings/stringprintf.h"
+#include "base/sys_byteorder.h"
+#include "base/threading/thread_task_runner_handle.h"
+#include "base/time/time.h"
+#include "extensions/browser/api/cast_channel/cast_auth_util.h"
+#include "extensions/browser/api/cast_channel/cast_framer.h"
+#include "extensions/browser/api/cast_channel/cast_message_util.h"
+#include "extensions/browser/api/cast_channel/cast_transport.h"
+#include "extensions/browser/api/cast_channel/logger.h"
+#include "extensions/common/api/cast_channel/cast_channel.pb.h"
+#include "net/base/address_list.h"
+#include "net/base/host_port_pair.h"
+#include "net/base/net_errors.h"
+#include "net/cert/cert_verifier.h"
+#include "net/cert/cert_verify_result.h"
+#include "net/cert/ct_policy_enforcer.h"
+#include "net/cert/multi_log_ct_verifier.h"
+#include "net/cert/x509_certificate.h"
+#include "net/http/transport_security_state.h"
+#include "net/log/net_log.h"
+#include "net/log/net_log_source_type.h"
+#include "net/socket/client_socket_factory.h"
+#include "net/socket/client_socket_handle.h"
+#include "net/socket/ssl_client_socket.h"
+#include "net/socket/stream_socket.h"
+#include "net/socket/tcp_client_socket.h"
+#include "net/ssl/ssl_config_service.h"
+#include "net/ssl/ssl_info.h"
+
+// Helper for logging data with remote host IP and authentication state.
+// Assumes |ip_endpoint_| of type net::IPEndPoint and |channel_auth_| of enum
+// type ChannelAuthType are available in the current scope.
+#define CONNECTION_INFO() \
+ "[" << ip_endpoint_.ToString() \
+ << ", auth=" << ::cast_channel::ChannelAuthTypeToString(channel_auth_) \
+ << "] "
+#define VLOG_WITH_CONNECTION(level) VLOG(level) << CONNECTION_INFO()
+#define LOG_WITH_CONNECTION(level) LOG(level) << CONNECTION_INFO()
+
+namespace extensions {
+namespace api {
+namespace cast_channel {
+namespace {
+
+bool IsTerminalState(proto::ConnectionState state) {
+ return state == proto::CONN_STATE_FINISHED ||
+ state == proto::CONN_STATE_ERROR || state == proto::CONN_STATE_TIMEOUT;
+}
+
+// Cert verifier which blindly accepts all certificates, regardless of validity.
+class FakeCertVerifier : public net::CertVerifier {
+ public:
+ FakeCertVerifier() {}
+ ~FakeCertVerifier() override {}
+
+ int Verify(const RequestParams& params,
+ net::CRLSet*,
+ net::CertVerifyResult* verify_result,
+ const net::CompletionCallback&,
+ std::unique_ptr<Request>*,
+ const net::NetLogWithSource&) override {
+ verify_result->Reset();
+ verify_result->verified_cert = params.certificate();
+ return net::OK;
+ }
+};
+
+} // namespace
+
+using ChannelError = ::cast_channel::ChannelError;
+using ChannelAuthType = ::cast_channel::ChannelAuthType;
+using ReadyState = ::cast_channel::ReadyState;
+
+CastSocketImpl::CastSocketImpl(const std::string& owner_extension_id,
+ const net::IPEndPoint& ip_endpoint,
+ ChannelAuthType channel_auth,
+ net::NetLog* net_log,
+ const base::TimeDelta& timeout,
+ bool keep_alive,
+ const scoped_refptr<Logger>& logger,
+ uint64_t device_capabilities)
+ : CastSocketImpl(owner_extension_id,
+ ip_endpoint,
+ channel_auth,
+ net_log,
+ timeout,
+ keep_alive,
+ logger,
+ device_capabilities,
+ AuthContext::Create()) {}
+
+CastSocketImpl::CastSocketImpl(const std::string& owner_extension_id,
+ const net::IPEndPoint& ip_endpoint,
+ ChannelAuthType channel_auth,
+ net::NetLog* net_log,
+ const base::TimeDelta& timeout,
+ bool keep_alive,
+ const scoped_refptr<Logger>& logger,
+ uint64_t device_capabilities,
+ const AuthContext& auth_context)
+ : channel_id_(0),
+ ip_endpoint_(ip_endpoint),
+ channel_auth_(channel_auth),
+ net_log_(net_log),
+ keep_alive_(keep_alive),
+ logger_(logger),
+ auth_context_(auth_context),
+ connect_timeout_(timeout),
+ connect_timeout_timer_(new base::OneShotTimer),
+ is_canceled_(false),
+ device_capabilities_(device_capabilities),
+ audio_only_(false),
+ connect_state_(proto::CONN_STATE_START_CONNECT),
+ error_state_(ChannelError::NONE),
+ ready_state_(ReadyState::NONE),
+ auth_delegate_(nullptr) {
+ DCHECK(net_log_);
+ net_log_source_.type = net::NetLogSourceType::SOCKET;
+ net_log_source_.id = net_log_->NextID();
+}
+
+CastSocketImpl::~CastSocketImpl() {
+ // Ensure that resources are freed but do not run pending callbacks that
+ // would result in re-entrancy.
+ CloseInternal();
+
+ if (!connect_callback_.is_null())
+ base::ResetAndReturn(&connect_callback_).Run(ChannelError::UNKNOWN);
+}
+
+ReadyState CastSocketImpl::ready_state() const {
+ return ready_state_;
+}
+
+ChannelError CastSocketImpl::error_state() const {
+ return error_state_;
+}
+
+const net::IPEndPoint& CastSocketImpl::ip_endpoint() const {
+ return ip_endpoint_;
+}
+
+int CastSocketImpl::id() const {
+ return channel_id_;
+}
+
+void CastSocketImpl::set_id(int id) {
+ channel_id_ = id;
+}
+
+ChannelAuthType CastSocketImpl::channel_auth() const {
+ return channel_auth_;
+}
+
+bool CastSocketImpl::keep_alive() const {
+ return keep_alive_;
+}
+
+bool CastSocketImpl::audio_only() const {
+ return audio_only_;
+}
+
+std::unique_ptr<net::TCPClientSocket> CastSocketImpl::CreateTcpSocket() {
+ net::AddressList addresses(ip_endpoint_);
+ return std::unique_ptr<net::TCPClientSocket>(
+ new net::TCPClientSocket(addresses, nullptr, net_log_, net_log_source_));
+ // Options cannot be set on the TCPClientSocket yet, because the
+ // underlying platform socket will not be created until Bind()
+ // or Connect() is called.
+}
+
+std::unique_ptr<net::SSLClientSocket> CastSocketImpl::CreateSslSocket(
+ std::unique_ptr<net::StreamSocket> socket) {
+ net::SSLConfig ssl_config;
+ cert_verifier_ = base::WrapUnique(new FakeCertVerifier);
+ transport_security_state_.reset(new net::TransportSecurityState);
+ cert_transparency_verifier_.reset(new net::MultiLogCTVerifier());
+ ct_policy_enforcer_.reset(new net::CTPolicyEnforcer());
+
+ // Note that |context| fields remain owned by CastSocketImpl.
+ net::SSLClientSocketContext context;
+ context.cert_verifier = cert_verifier_.get();
+ context.transport_security_state = transport_security_state_.get();
+ context.cert_transparency_verifier = cert_transparency_verifier_.get();
+ context.ct_policy_enforcer = ct_policy_enforcer_.get();
+
+ std::unique_ptr<net::ClientSocketHandle> connection(
+ new net::ClientSocketHandle);
+ connection->SetSocket(std::move(socket));
+ net::HostPortPair host_and_port = net::HostPortPair::FromIPEndPoint(
+ ip_endpoint_);
+
+ return net::ClientSocketFactory::GetDefaultFactory()->CreateSSLClientSocket(
+ std::move(connection), host_and_port, ssl_config, context);
+}
+
+scoped_refptr<net::X509Certificate> CastSocketImpl::ExtractPeerCert() {
+ net::SSLInfo ssl_info;
+ if (!socket_->GetSSLInfo(&ssl_info) || !ssl_info.cert.get())
+ return nullptr;
+
+ return ssl_info.cert;
+}
+
+bool CastSocketImpl::VerifyChannelPolicy(const AuthResult& result) {
+ audio_only_ = (result.channel_policies & AuthResult::POLICY_AUDIO_ONLY) != 0;
+ if (audio_only_ &&
+ (device_capabilities_ & CastDeviceCapability::VIDEO_OUT) != 0) {
+ LOG_WITH_CONNECTION(ERROR)
+ << "Audio only channel policy enforced for video out capable device";
+ return false;
+ }
+ return true;
+}
+
+bool CastSocketImpl::VerifyChallengeReply() {
+ DCHECK(peer_cert_);
+ AuthResult result =
+ AuthenticateChallengeReply(*challenge_reply_, *peer_cert_, auth_context_);
+ logger_->LogSocketChallengeReplyEvent(channel_id_, result);
+ if (result.success()) {
+ VLOG(1) << result.error_message;
+ if (!VerifyChannelPolicy(result)) {
+ return false;
+ }
+ }
+ return result.success();
+}
+
+void CastSocketImpl::SetTransportForTesting(
+ std::unique_ptr<CastTransport> transport) {
+ transport_ = std::move(transport);
+}
+
+void CastSocketImpl::Connect(std::unique_ptr<CastTransport::Delegate> delegate,
+ base::Callback<void(ChannelError)> callback) {
+ DCHECK(CalledOnValidThread());
+ VLOG_WITH_CONNECTION(1) << "Connect readyState = "
+ << ::cast_channel::ReadyStateToString(ready_state_);
+ DCHECK_EQ(proto::CONN_STATE_START_CONNECT, connect_state_);
+
+ delegate_ = std::move(delegate);
+
+ if (ready_state_ != ReadyState::NONE) {
+ callback.Run(ChannelError::CONNECT_ERROR);
+ return;
+ }
+
+ connect_callback_ = callback;
+ SetReadyState(ReadyState::CONNECTING);
+ SetConnectState(proto::CONN_STATE_TCP_CONNECT);
+
+ // Set up connection timeout.
+ if (connect_timeout_.InMicroseconds() > 0) {
+ DCHECK(connect_timeout_callback_.IsCancelled());
+ connect_timeout_callback_.Reset(
+ base::Bind(&CastSocketImpl::OnConnectTimeout, base::Unretained(this)));
+ GetTimer()->Start(FROM_HERE,
+ connect_timeout_,
+ connect_timeout_callback_.callback());
+ }
+
+ DoConnectLoop(net::OK);
+}
+
+CastTransport* CastSocketImpl::transport() const {
+ return transport_.get();
+}
+
+void CastSocketImpl::OnConnectTimeout() {
+ DCHECK(CalledOnValidThread());
+ // Stop all pending connection setup tasks and report back to the client.
+ is_canceled_ = true;
+ VLOG_WITH_CONNECTION(1) << "Timeout while establishing a connection.";
+ SetErrorState(ChannelError::CONNECT_TIMEOUT);
+ DoConnectCallback();
+}
+
+void CastSocketImpl::ResetConnectLoopCallback() {
+ DCHECK(connect_loop_callback_.IsCancelled());
+ connect_loop_callback_.Reset(
+ base::Bind(&CastSocketImpl::DoConnectLoop, base::Unretained(this)));
+}
+
+void CastSocketImpl::PostTaskToStartConnectLoop(int result) {
+ DCHECK(CalledOnValidThread());
+
+ ResetConnectLoopCallback();
+ base::ThreadTaskRunnerHandle::Get()->PostTask(
+ FROM_HERE, base::Bind(connect_loop_callback_.callback(), result));
+}
+
+// This method performs the state machine transitions for connection flow.
+// There are two entry points to this method:
+// 1. Connect method: this starts the flow
+// 2. Callback from network operations that finish asynchronously.
+void CastSocketImpl::DoConnectLoop(int result) {
+ connect_loop_callback_.Cancel();
+ if (is_canceled_) {
+ LOG_WITH_CONNECTION(ERROR) << "CANCELLED - Aborting DoConnectLoop.";
+ return;
+ }
+
+ // Network operations can either finish synchronously or asynchronously.
+ // This method executes the state machine transitions in a loop so that
+ // correct state transitions happen even when network operations finish
+ // synchronously.
+ int rv = result;
+ do {
+ proto::ConnectionState state = connect_state_;
+ connect_state_ = proto::CONN_STATE_UNKNOWN;
+ switch (state) {
+ case proto::CONN_STATE_TCP_CONNECT:
+ rv = DoTcpConnect();
+ break;
+ case proto::CONN_STATE_TCP_CONNECT_COMPLETE:
+ rv = DoTcpConnectComplete(rv);
+ break;
+ case proto::CONN_STATE_SSL_CONNECT:
+ DCHECK_EQ(net::OK, rv);
+ rv = DoSslConnect();
+ break;
+ case proto::CONN_STATE_SSL_CONNECT_COMPLETE:
+ rv = DoSslConnectComplete(rv);
+ break;
+ case proto::CONN_STATE_AUTH_CHALLENGE_SEND:
+ rv = DoAuthChallengeSend();
+ break;
+ case proto::CONN_STATE_AUTH_CHALLENGE_SEND_COMPLETE:
+ rv = DoAuthChallengeSendComplete(rv);
+ break;
+ case proto::CONN_STATE_AUTH_CHALLENGE_REPLY_COMPLETE:
+ rv = DoAuthChallengeReplyComplete(rv);
+ DCHECK(IsTerminalState(connect_state_));
+ break;
+ default:
+ NOTREACHED() << "Unknown state in connect flow: " << state;
+ SetConnectState(proto::CONN_STATE_FINISHED);
+ SetErrorState(ChannelError::UNKNOWN);
+ DoConnectCallback();
+ return;
+ }
+ } while (rv != net::ERR_IO_PENDING && !IsTerminalState(connect_state_));
+ // Exit the state machine if an asynchronous network operation is pending
+ // or if the state machine is in the terminal "finished" state.
+
+ if (IsTerminalState(connect_state_)) {
+ DCHECK_NE(rv, net::ERR_IO_PENDING);
+ GetTimer()->Stop();
+ DoConnectCallback();
+ } else {
+ DCHECK_EQ(rv, net::ERR_IO_PENDING);
+ }
+}
+
+int CastSocketImpl::DoTcpConnect() {
+ DCHECK(connect_loop_callback_.IsCancelled());
+ VLOG_WITH_CONNECTION(1) << "DoTcpConnect";
+ SetConnectState(proto::CONN_STATE_TCP_CONNECT_COMPLETE);
+ tcp_socket_ = CreateTcpSocket();
+
+ int rv = tcp_socket_->Connect(
+ base::Bind(&CastSocketImpl::DoConnectLoop, base::Unretained(this)));
+ logger_->LogSocketEventWithRv(channel_id_, proto::TCP_SOCKET_CONNECT, rv);
+ return rv;
+}
+
+int CastSocketImpl::DoTcpConnectComplete(int connect_result) {
+ VLOG_WITH_CONNECTION(1) << "DoTcpConnectComplete: " << connect_result;
+ logger_->LogSocketEventWithRv(channel_id_, proto::TCP_SOCKET_CONNECT_COMPLETE,
+ connect_result);
+ if (connect_result == net::OK) {
+ SetConnectState(proto::CONN_STATE_SSL_CONNECT);
+ } else if (connect_result == net::ERR_CONNECTION_TIMED_OUT) {
+ SetConnectState(proto::CONN_STATE_FINISHED);
+ SetErrorState(ChannelError::CONNECT_TIMEOUT);
+ } else {
+ SetConnectState(proto::CONN_STATE_FINISHED);
+ SetErrorState(ChannelError::CONNECT_ERROR);
+ }
+ return connect_result;
+}
+
+int CastSocketImpl::DoSslConnect() {
+ DCHECK(connect_loop_callback_.IsCancelled());
+ VLOG_WITH_CONNECTION(1) << "DoSslConnect";
+ SetConnectState(proto::CONN_STATE_SSL_CONNECT_COMPLETE);
+ socket_ = CreateSslSocket(std::move(tcp_socket_));
+
+ int rv = socket_->Connect(
+ base::Bind(&CastSocketImpl::DoConnectLoop, base::Unretained(this)));
+ logger_->LogSocketEventWithRv(channel_id_, proto::SSL_SOCKET_CONNECT, rv);
+ return rv;
+}
+
+int CastSocketImpl::DoSslConnectComplete(int result) {
+ logger_->LogSocketEventWithRv(channel_id_, proto::SSL_SOCKET_CONNECT_COMPLETE,
+ result);
+ VLOG_WITH_CONNECTION(1) << "DoSslConnectComplete: " << result;
+ if (result == net::OK) {
+ peer_cert_ = ExtractPeerCert();
+
+ if (!peer_cert_) {
+ LOG_WITH_CONNECTION(WARNING) << "Could not extract peer cert.";
+ SetConnectState(proto::CONN_STATE_FINISHED);
+ SetErrorState(ChannelError::AUTHENTICATION_ERROR);
+ return net::ERR_CERT_INVALID;
+ }
+
+ // SSL connection succeeded.
+ if (!transport_.get()) {
+ // Create a channel transport if one wasn't already set (e.g. by test
+ // code).
+ transport_.reset(new CastTransportImpl(this->socket_.get(), channel_id_,
+ ip_endpoint_, channel_auth_,
+ logger_));
+ }
+ auth_delegate_ = new AuthTransportDelegate(this);
+ transport_->SetReadDelegate(base::WrapUnique(auth_delegate_));
+ SetConnectState(proto::CONN_STATE_AUTH_CHALLENGE_SEND);
+ } else if (result == net::ERR_CONNECTION_TIMED_OUT) {
+ SetConnectState(proto::CONN_STATE_FINISHED);
+ SetErrorState(ChannelError::CONNECT_TIMEOUT);
+ } else {
+ SetConnectState(proto::CONN_STATE_FINISHED);
+ SetErrorState(ChannelError::AUTHENTICATION_ERROR);
+ }
+ return result;
+}
+
+int CastSocketImpl::DoAuthChallengeSend() {
+ VLOG_WITH_CONNECTION(1) << "DoAuthChallengeSend";
+ SetConnectState(proto::CONN_STATE_AUTH_CHALLENGE_SEND_COMPLETE);
+
+ CastMessage challenge_message;
+ CreateAuthChallengeMessage(&challenge_message, auth_context_);
+ VLOG_WITH_CONNECTION(1) << "Sending challenge: "
+ << CastMessageToString(challenge_message);
+
+ ResetConnectLoopCallback();
+ transport_->SendMessage(challenge_message, connect_loop_callback_.callback());
+
+ // Always return IO_PENDING since the result is always asynchronous.
+ return net::ERR_IO_PENDING;
+}
+
+int CastSocketImpl::DoAuthChallengeSendComplete(int result) {
+ VLOG_WITH_CONNECTION(1) << "DoAuthChallengeSendComplete: " << result;
+ if (result < 0) {
+ SetConnectState(proto::CONN_STATE_ERROR);
+ SetErrorState(ChannelError::CAST_SOCKET_ERROR);
+ logger_->LogSocketEventWithRv(channel_id_,
+ proto::SEND_AUTH_CHALLENGE_FAILED, result);
+ return result;
+ }
+ transport_->Start();
+ SetConnectState(proto::CONN_STATE_AUTH_CHALLENGE_REPLY_COMPLETE);
+ return net::ERR_IO_PENDING;
+}
+
+CastSocketImpl::AuthTransportDelegate::AuthTransportDelegate(
+ CastSocketImpl* socket)
+ : socket_(socket), error_state_(ChannelError::NONE) {
+ DCHECK(socket);
+}
+
+ChannelError CastSocketImpl::AuthTransportDelegate::error_state() const {
+ return error_state_;
+}
+
+LastErrors CastSocketImpl::AuthTransportDelegate::last_errors() const {
+ return last_errors_;
+}
+
+void CastSocketImpl::AuthTransportDelegate::OnError(ChannelError error_state) {
+ error_state_ = error_state;
+ socket_->PostTaskToStartConnectLoop(net::ERR_CONNECTION_FAILED);
+}
+
+void CastSocketImpl::AuthTransportDelegate::OnMessage(
+ const CastMessage& message) {
+ if (!IsAuthMessage(message)) {
+ error_state_ = ChannelError::TRANSPORT_ERROR;
+ socket_->PostTaskToStartConnectLoop(net::ERR_INVALID_RESPONSE);
+ } else {
+ socket_->challenge_reply_.reset(new CastMessage(message));
+ socket_->PostTaskToStartConnectLoop(net::OK);
+ }
+}
+
+void CastSocketImpl::AuthTransportDelegate::Start() {
+}
+
+int CastSocketImpl::DoAuthChallengeReplyComplete(int result) {
+ VLOG_WITH_CONNECTION(1) << "DoAuthChallengeReplyComplete: " << result;
+
+ if (auth_delegate_->error_state() != ChannelError::NONE) {
+ SetErrorState(auth_delegate_->error_state());
+ SetConnectState(proto::CONN_STATE_ERROR);
+ return net::ERR_CONNECTION_FAILED;
+ }
+ auth_delegate_ = nullptr;
+
+ if (result < 0) {
+ SetConnectState(proto::CONN_STATE_ERROR);
+ return result;
+ }
+
+ if (!VerifyChallengeReply()) {
+ SetErrorState(ChannelError::AUTHENTICATION_ERROR);
+ SetConnectState(proto::CONN_STATE_ERROR);
+ return net::ERR_CONNECTION_FAILED;
+ }
+ VLOG_WITH_CONNECTION(1) << "Auth challenge verification succeeded";
+
+ SetConnectState(proto::CONN_STATE_FINISHED);
+ return net::OK;
+}
+
+void CastSocketImpl::DoConnectCallback() {
+ VLOG(1) << "DoConnectCallback (error_state = "
+ << ::cast_channel::ChannelErrorToString(error_state_) << ")";
+ if (connect_callback_.is_null()) {
+ DLOG(FATAL) << "Connection callback invoked multiple times.";
+ return;
+ }
+
+ if (error_state_ == ChannelError::NONE) {
+ SetReadyState(ReadyState::OPEN);
+ transport_->SetReadDelegate(std::move(delegate_));
+ } else {
+ CloseInternal();
+ }
+
+ base::ResetAndReturn(&connect_callback_).Run(error_state_);
+}
+
+void CastSocketImpl::Close(const net::CompletionCallback& callback) {
+ DCHECK(CalledOnValidThread());
+ CloseInternal();
+ // Run this callback last. It may delete the socket.
+ callback.Run(net::OK);
+}
+
+void CastSocketImpl::CloseInternal() {
+ // TODO(mfoltz): Enforce this when CastChannelAPITest is rewritten to create
+ // and free sockets on the same thread. crbug.com/398242
+ DCHECK(CalledOnValidThread());
+ if (ready_state_ == ReadyState::CLOSED) {
+ return;
+ }
+
+ VLOG_WITH_CONNECTION(1) << "Close ReadyState = "
+ << ::cast_channel::ReadyStateToString(ready_state_);
+ transport_.reset();
+ tcp_socket_.reset();
+ socket_.reset();
+ transport_security_state_.reset();
+ if (GetTimer()) {
+ GetTimer()->Stop();
+ }
+
+ // Cancel callbacks that we queued ourselves to re-enter the connect or read
+ // loops.
+ connect_loop_callback_.Cancel();
+ connect_timeout_callback_.Cancel();
+ SetReadyState(ReadyState::CLOSED);
+}
+
+bool CastSocketImpl::CalledOnValidThread() const {
+ return thread_checker_.CalledOnValidThread();
+}
+
+base::Timer* CastSocketImpl::GetTimer() {
+ return connect_timeout_timer_.get();
+}
+
+void CastSocketImpl::SetConnectState(proto::ConnectionState connect_state) {
+ if (connect_state_ != connect_state) {
+ connect_state_ = connect_state;
+ }
+}
+
+void CastSocketImpl::SetReadyState(ReadyState ready_state) {
+ if (ready_state_ != ready_state)
+ ready_state_ = ready_state;
+}
+
+void CastSocketImpl::SetErrorState(ChannelError error_state) {
+ VLOG_WITH_CONNECTION(1) << "SetErrorState "
+ << ::cast_channel::ChannelErrorToString(error_state);
+ DCHECK_EQ(ChannelError::NONE, error_state_);
+ error_state_ = error_state;
+ delegate_->OnError(error_state_);
+}
+
+} // namespace cast_channel
+} // namespace api
+} // namespace extensions
+#undef VLOG_WITH_CONNECTION
« no previous file with comments | « extensions/browser/api/cast_channel/cast_socket.h ('k') | extensions/browser/api/cast_channel/cast_socket_service.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698