Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1365)

Unified Diff: net/socket/unix_domain_socket_posix.cc

Issue 376323002: Refactor unix domain socket. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Revert filename of unix domain listen socket temporarily for review convenience Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/socket/unix_domain_socket_posix.cc
diff --git a/net/socket/unix_domain_socket_posix.cc b/net/socket/unix_domain_socket_posix.cc
index 3141f7166b22abb033b8278065ac0b4313e21c70..9c38e95c7cecebccbf1941206c5d240a8cc38c97 100644
--- a/net/socket/unix_domain_socket_posix.cc
+++ b/net/socket/unix_domain_socket_posix.cc
@@ -4,9 +4,6 @@
#include "net/socket/unix_domain_socket_posix.h"
-#include <cstring>
-#include <string>
-
#include <errno.h>
#include <sys/socket.h>
#include <sys/stat.h>
@@ -14,6 +11,9 @@
#include <sys/un.h>
#include <unistd.h>
+#include <cstring>
+#include <string>
+
#include "base/bind.h"
#include "base/callback.h"
#include "base/posix/eintr_wrapper.h"
@@ -22,57 +22,62 @@
#include "net/base/net_errors.h"
#include "net/base/net_util.h"
#include "net/socket/socket_descriptor.h"
+#include "net/socket/unix_domain_client_socket_posix.h"
namespace net {
namespace {
-bool NoAuthenticationCallback(uid_t, gid_t) {
- return true;
-}
+int CreateAndBind(const std::string& socket_path,
+ bool use_abstract_namespace,
+ SocketDescriptor* socket_fd) {
+ SockaddrStorage address;
+ if (!UnixDomainClientSocket::FillAddress(socket_path,
+ use_abstract_namespace,
+ &address))
+ return ERR_ADDRESS_INVALID;
mmenke 2014/07/11 20:44:05 nit: Use braces when the condition takes up more
byungchul 2014/07/14 17:49:23 Done.
-bool GetPeerIds(int socket, uid_t* user_id, gid_t* group_id) {
-#if defined(OS_LINUX) || defined(OS_ANDROID)
- struct ucred user_cred;
- socklen_t len = sizeof(user_cred);
- if (getsockopt(socket, SOL_SOCKET, SO_PEERCRED, &user_cred, &len) == -1)
- return false;
- *user_id = user_cred.uid;
- *group_id = user_cred.gid;
-#else
- if (getpeereid(socket, user_id, group_id) == -1)
- return false;
-#endif
- return true;
+ SocketDescriptor s = CreatePlatformSocket(PF_UNIX, SOCK_STREAM, 0);
mmenke 2014/07/11 20:44:05 nit: The name "s" violates the google naming guid
byungchul 2014/07/14 17:49:23 Done.
+ if (s == kInvalidSocket)
+ return errno ? MapSystemError(errno) : ERR_UNEXPECTED;
+
+ if (bind(s, address.addr, address.addr_len) < 0) {
+ int rv = MapSystemError(errno);
+ close(s);
+ PLOG(ERROR) << "Could not bind unix domain socket to " << socket_path
+ << (use_abstract_namespace ? " (with abstract namespace)" : "");
+ return rv;
+ }
+
+ DCHECK(socket_fd);
mmenke 2014/07/11 20:44:05 nit: Know this was here before, but since we're c
byungchul 2014/07/14 17:49:23 Done.
+ *socket_fd = s;
+ return OK;
}
} // namespace
// static
-UnixDomainSocket::AuthCallback UnixDomainSocket::NoAuthentication() {
- return base::Bind(NoAuthenticationCallback);
-}
-
-// static
-scoped_ptr<UnixDomainSocket> UnixDomainSocket::CreateAndListenInternal(
+scoped_ptr<UnixDomainListenSocket>
+UnixDomainListenSocket::CreateAndListenInternal(
const std::string& path,
const std::string& fallback_path,
StreamListenSocket::Delegate* del,
const AuthCallback& auth_callback,
bool use_abstract_namespace) {
- SocketDescriptor s = CreateAndBind(path, use_abstract_namespace);
- if (s == kInvalidSocket && !fallback_path.empty())
- s = CreateAndBind(fallback_path, use_abstract_namespace);
- if (s == kInvalidSocket)
- return scoped_ptr<UnixDomainSocket>();
- scoped_ptr<UnixDomainSocket> sock(
- new UnixDomainSocket(s, del, auth_callback));
+ SocketDescriptor socket_fd = kInvalidSocket;
+ int rv = CreateAndBind(path, use_abstract_namespace, &socket_fd);
+ if (rv != OK && !fallback_path.empty())
+ rv = CreateAndBind(fallback_path, use_abstract_namespace, &socket_fd);
+ if (rv != OK)
+ return scoped_ptr<UnixDomainListenSocket>();
+ scoped_ptr<UnixDomainListenSocket> sock(
+ new UnixDomainListenSocket(socket_fd, del, auth_callback));
sock->Listen();
return sock.Pass();
}
// static
-scoped_ptr<UnixDomainSocket> UnixDomainSocket::CreateAndListen(
+scoped_ptr<UnixDomainListenSocket> UnixDomainListenSocket::CreateAndListen(
const std::string& path,
StreamListenSocket::Delegate* del,
const AuthCallback& auth_callback) {
@@ -81,8 +86,8 @@ scoped_ptr<UnixDomainSocket> UnixDomainSocket::CreateAndListen(
#if defined(SOCKET_ABSTRACT_NAMESPACE_SUPPORTED)
// static
-scoped_ptr<UnixDomainSocket>
-UnixDomainSocket::CreateAndListenWithAbstractNamespace(
+scoped_ptr<UnixDomainListenSocket>
+UnixDomainListenSocket::CreateAndListenWithAbstractNamespace(
const std::string& path,
const std::string& fallback_path,
StreamListenSocket::Delegate* del,
@@ -92,101 +97,65 @@ UnixDomainSocket::CreateAndListenWithAbstractNamespace(
}
#endif
-UnixDomainSocket::UnixDomainSocket(
+UnixDomainListenSocket::UnixDomainListenSocket(
SocketDescriptor s,
StreamListenSocket::Delegate* del,
const AuthCallback& auth_callback)
: StreamListenSocket(s, del),
auth_callback_(auth_callback) {}
-UnixDomainSocket::~UnixDomainSocket() {}
-
-// static
-SocketDescriptor UnixDomainSocket::CreateAndBind(const std::string& path,
- bool use_abstract_namespace) {
- sockaddr_un addr;
- static const size_t kPathMax = sizeof(addr.sun_path);
- if (use_abstract_namespace + path.size() + 1 /* '\0' */ > kPathMax)
- return kInvalidSocket;
- const SocketDescriptor s = CreatePlatformSocket(PF_UNIX, SOCK_STREAM, 0);
- if (s == kInvalidSocket)
- return kInvalidSocket;
- memset(&addr, 0, sizeof(addr));
- addr.sun_family = AF_UNIX;
- socklen_t addr_len;
- if (use_abstract_namespace) {
- // Convert the path given into abstract socket name. It must start with
- // the '\0' character, so we are adding it. |addr_len| must specify the
- // length of the structure exactly, as potentially the socket name may
- // have '\0' characters embedded (although we don't support this).
- // Note that addr.sun_path is already zero initialized.
- memcpy(addr.sun_path + 1, path.c_str(), path.size());
- addr_len = path.size() + offsetof(struct sockaddr_un, sun_path) + 1;
- } else {
- memcpy(addr.sun_path, path.c_str(), path.size());
- addr_len = sizeof(sockaddr_un);
- }
- if (bind(s, reinterpret_cast<sockaddr*>(&addr), addr_len)) {
- LOG(ERROR) << "Could not bind unix domain socket to " << path;
- if (use_abstract_namespace)
- LOG(ERROR) << " (with abstract namespace enabled)";
- if (IGNORE_EINTR(close(s)) < 0)
- LOG(ERROR) << "close() error";
- return kInvalidSocket;
- }
- return s;
-}
+UnixDomainListenSocket::~UnixDomainListenSocket() {}
-void UnixDomainSocket::Accept() {
+void UnixDomainListenSocket::Accept() {
SocketDescriptor conn = StreamListenSocket::AcceptSocket();
if (conn == kInvalidSocket)
return;
uid_t user_id;
gid_t group_id;
- if (!GetPeerIds(conn, &user_id, &group_id) ||
+ if (!UnixDomainServerSocket::GetPeerIds(conn, &user_id, &group_id) ||
!auth_callback_.Run(user_id, group_id)) {
if (IGNORE_EINTR(close(conn)) < 0)
LOG(ERROR) << "close() error";
return;
}
- scoped_ptr<UnixDomainSocket> sock(
- new UnixDomainSocket(conn, socket_delegate_, auth_callback_));
+ scoped_ptr<UnixDomainListenSocket> sock(
+ new UnixDomainListenSocket(conn, socket_delegate_, auth_callback_));
// It's up to the delegate to AddRef if it wants to keep it around.
sock->WatchSocket(WAITING_READ);
socket_delegate_->DidAccept(this, sock.PassAs<StreamListenSocket>());
}
-UnixDomainSocketFactory::UnixDomainSocketFactory(
+UnixDomainListenSocketFactory::UnixDomainListenSocketFactory(
const std::string& path,
- const UnixDomainSocket::AuthCallback& auth_callback)
+ const UnixDomainListenSocket::AuthCallback& auth_callback)
: path_(path),
auth_callback_(auth_callback) {}
-UnixDomainSocketFactory::~UnixDomainSocketFactory() {}
+UnixDomainListenSocketFactory::~UnixDomainListenSocketFactory() {}
-scoped_ptr<StreamListenSocket> UnixDomainSocketFactory::CreateAndListen(
+scoped_ptr<StreamListenSocket> UnixDomainListenSocketFactory::CreateAndListen(
StreamListenSocket::Delegate* delegate) const {
- return UnixDomainSocket::CreateAndListen(
+ return UnixDomainListenSocket::CreateAndListen(
path_, delegate, auth_callback_).PassAs<StreamListenSocket>();
}
#if defined(SOCKET_ABSTRACT_NAMESPACE_SUPPORTED)
-UnixDomainSocketWithAbstractNamespaceFactory::
-UnixDomainSocketWithAbstractNamespaceFactory(
+UnixDomainListenSocketWithAbstractNamespaceFactory::
+UnixDomainListenSocketWithAbstractNamespaceFactory(
const std::string& path,
const std::string& fallback_path,
- const UnixDomainSocket::AuthCallback& auth_callback)
- : UnixDomainSocketFactory(path, auth_callback),
+ const UnixDomainListenSocket::AuthCallback& auth_callback)
+ : UnixDomainListenSocketFactory(path, auth_callback),
fallback_path_(fallback_path) {}
-UnixDomainSocketWithAbstractNamespaceFactory::
-~UnixDomainSocketWithAbstractNamespaceFactory() {}
+UnixDomainListenSocketWithAbstractNamespaceFactory::
+~UnixDomainListenSocketWithAbstractNamespaceFactory() {}
scoped_ptr<StreamListenSocket>
-UnixDomainSocketWithAbstractNamespaceFactory::CreateAndListen(
+UnixDomainListenSocketWithAbstractNamespaceFactory::CreateAndListen(
StreamListenSocket::Delegate* delegate) const {
- return UnixDomainSocket::CreateAndListenWithAbstractNamespace(
+ return UnixDomainListenSocket::CreateAndListenWithAbstractNamespace(
path_, fallback_path_, delegate, auth_callback_)
.PassAs<StreamListenSocket>();
}

Powered by Google App Engine
This is Rietveld 408576698