Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2217)

Unified Diff: chrome/browser/sync/glue/sync_backend_host_impl.h

Issue 61183003: Refactor SyncBackendHost (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fix patch upload + fix some other issues Created 7 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/sync/glue/sync_backend_host_impl.h
diff --git a/chrome/browser/sync/glue/sync_backend_host_impl.h b/chrome/browser/sync/glue/sync_backend_host_impl.h
new file mode 100644
index 0000000000000000000000000000000000000000..f24dce752c9a1e5a5425be5902e6a8d9e9c168a7
--- /dev/null
+++ b/chrome/browser/sync/glue/sync_backend_host_impl.h
@@ -0,0 +1,326 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CHROME_BROWSER_SYNC_GLUE_SYNC_BACKEND_HOST_IMPL_H_
+#define CHROME_BROWSER_SYNC_GLUE_SYNC_BACKEND_HOST_IMPL_H_
+
+#include <string>
+
+#include "base/basictypes.h"
+#include "base/callback.h"
+#include "base/compiler_specific.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/memory/weak_ptr.h"
+#include "base/threading/thread.h"
+#include "chrome/browser/sync/glue/backend_data_type_configurer.h"
+#include "chrome/browser/sync/glue/extensions_activity_monitor.h"
+#include "chrome/browser/sync/glue/sync_backend_host.h"
+#include "content/public/browser/notification_observer.h"
+#include "content/public/browser/notification_registrar.h"
+#include "sync/internal_api/public/base/model_type.h"
+#include "sync/internal_api/public/configure_reason.h"
+#include "sync/internal_api/public/sessions/sync_session_snapshot.h"
+#include "sync/internal_api/public/sync_manager.h"
+#include "sync/internal_api/public/util/report_unrecoverable_error_function.h"
+#include "sync/internal_api/public/util/unrecoverable_error_handler.h"
+#include "sync/internal_api/public/util/weak_handle.h"
+#include "sync/notifier/invalidation_handler.h"
+#include "sync/protocol/encryption.pb.h"
+#include "sync/protocol/sync_protocol_error.h"
+#include "sync/util/extensions_activity.h"
+
+class GURL;
+class Profile;
+
+namespace base {
+class MessageLoop;
+}
+
+namespace invalidation {
+class InvalidationService;
+}
+
+namespace syncer {
+class SyncManagerFactory;
+}
+
+namespace browser_sync {
+
+class ChangeProcessor;
+class SyncBackendHostCore;
+class SyncBackendRegistrar;
+class SyncPrefs;
+class SyncedDeviceTracker;
+struct DoInitializeOptions;
+
+// The only real implementation of the SyncBackendHost. See that interface's
+// definition for documentation of public methods.
+class SyncBackendHostImpl
+ : public SyncBackendHost,
+ public content::NotificationObserver,
+ public syncer::InvalidationHandler {
+ public:
+ typedef syncer::SyncStatus Status;
+
+ // Create a SyncBackendHost with a reference to the |frontend| that
+ // it serves and communicates to via the SyncFrontend interface (on
+ // the same thread it used to call the constructor). Must outlive
+ // |sync_prefs|.
+ SyncBackendHostImpl(
+ const std::string& name,
+ Profile* profile,
+ const base::WeakPtr<SyncPrefs>& sync_prefs);
+ virtual ~SyncBackendHostImpl();
+
+ // SyncBackendHost implementation.
+ virtual void Initialize(
+ SyncFrontend* frontend,
+ scoped_ptr<base::Thread> sync_thread,
+ const syncer::WeakHandle<syncer::JsEventHandler>& event_handler,
+ const GURL& service_url,
+ const syncer::SyncCredentials& credentials,
+ bool delete_sync_data_folder,
+ scoped_ptr<syncer::SyncManagerFactory> sync_manager_factory,
+ scoped_ptr<syncer::UnrecoverableErrorHandler> unrecoverable_error_handler,
+ syncer::ReportUnrecoverableErrorFunction
+ report_unrecoverable_error_function) OVERRIDE;
+ virtual void UpdateCredentials(
+ const syncer::SyncCredentials& credentials) OVERRIDE;
+ virtual void StartSyncingWithServer() OVERRIDE;
+ virtual void SetEncryptionPassphrase(
+ const std::string& passphrase,
+ bool is_explicit) OVERRIDE;
+ virtual bool SetDecryptionPassphrase(const std::string& passphrase)
+ WARN_UNUSED_RESULT OVERRIDE;
+ virtual void StopSyncingForShutdown() OVERRIDE;
+ virtual scoped_ptr<base::Thread> Shutdown(ShutdownOption option) OVERRIDE;
+ virtual void UnregisterInvalidationIds() OVERRIDE;
+ virtual void ConfigureDataTypes(
+ syncer::ConfigureReason reason,
+ const DataTypeConfigStateMap& config_state_map,
+ const base::Callback<void(syncer::ModelTypeSet,
+ syncer::ModelTypeSet)>& ready_task,
+ const base::Callback<void()>& retry_callback) OVERRIDE;
+ virtual void EnableEncryptEverything() OVERRIDE;
+ virtual void ActivateDataType(
+ syncer::ModelType type, syncer::ModelSafeGroup group,
+ ChangeProcessor* change_processor) OVERRIDE;
+ virtual void DeactivateDataType(syncer::ModelType type) OVERRIDE;
+ virtual syncer::UserShare* GetUserShare() const OVERRIDE;
+ virtual Status GetDetailedStatus() OVERRIDE;
+ virtual syncer::sessions::SyncSessionSnapshot
+ GetLastSessionSnapshot() const OVERRIDE;
+ virtual bool HasUnsyncedItems() const OVERRIDE;
+ virtual bool IsNigoriEnabled() const OVERRIDE;
+ virtual syncer::PassphraseType GetPassphraseType() const OVERRIDE;
+ virtual base::Time GetExplicitPassphraseTime() const OVERRIDE;
+ virtual bool IsCryptographerReady(
+ const syncer::BaseTransaction* trans) const OVERRIDE;
+ virtual void GetModelSafeRoutingInfo(
+ syncer::ModelSafeRoutingInfo* out) const OVERRIDE;
+ virtual SyncedDeviceTracker* GetSyncedDeviceTracker() const OVERRIDE;
+ virtual base::MessageLoop* GetSyncLoopForTesting() OVERRIDE;
+
+ protected:
+ // The types and functions below are protected so that test
+ // subclasses can use them.
+
+ // Allows tests to perform alternate core initialization work.
+ virtual void InitCore(scoped_ptr<DoInitializeOptions> options);
+
+ // Request the syncer to reconfigure with the specfied params.
+ // Virtual for testing.
+ virtual void RequestConfigureSyncer(
+ syncer::ConfigureReason reason,
+ syncer::ModelTypeSet to_download,
+ syncer::ModelTypeSet to_purge,
+ syncer::ModelTypeSet to_journal,
+ syncer::ModelTypeSet to_unapply,
+ syncer::ModelTypeSet to_ignore,
+ const syncer::ModelSafeRoutingInfo& routing_info,
+ const base::Callback<void(syncer::ModelTypeSet,
+ syncer::ModelTypeSet)>& ready_task,
+ const base::Closure& retry_callback);
+
+ // Called when the syncer has finished performing a configuration.
+ void FinishConfigureDataTypesOnFrontendLoop(
+ const syncer::ModelTypeSet enabled_types,
+ const syncer::ModelTypeSet succeeded_configuration_types,
+ const syncer::ModelTypeSet failed_configuration_types,
+ const base::Callback<void(syncer::ModelTypeSet,
+ syncer::ModelTypeSet)>& ready_task);
+
+ // Reports backend initialization success. Includes some objects from sync
+ // manager initialization to be passed back to the UI thread.
+ virtual void HandleInitializationSuccessOnFrontendLoop(
+ const syncer::WeakHandle<syncer::JsBackend> js_backend,
+ const syncer::WeakHandle<syncer::DataTypeDebugInfoListener>
+ debug_info_listener);
+
+ // Downloading of control types failed and will be retried. Invokes the
+ // frontend's sync configure retry method.
+ void HandleControlTypesDownloadRetry();
+
+ SyncFrontend* frontend() { return frontend_; }
+
+ private:
+ friend class SyncBackendHostCore;
+
+ // Checks if we have received a notice to turn on experimental datatypes
+ // (via the nigori node) and informs the frontend if that is the case.
+ // Note: it is illegal to call this before the backend is initialized.
+ void AddExperimentalTypes();
+
+ // Handles backend initialization failure.
+ void HandleInitializationFailureOnFrontendLoop();
+
+ // Called from Core::OnSyncCycleCompleted to handle updating frontend
+ // thread components.
+ void HandleSyncCycleCompletedOnFrontendLoop(
+ const syncer::sessions::SyncSessionSnapshot& snapshot);
+
+ // Called when the syncer failed to perform a configuration and will
+ // eventually retry. FinishingConfigurationOnFrontendLoop(..) will be called
+ // on successful completion.
+ void RetryConfigurationOnFrontendLoop(const base::Closure& retry_callback);
+
+ // Helpers to persist a token that can be used to bootstrap sync encryption
+ // across browser restart to avoid requiring the user to re-enter their
+ // passphrase. |token| must be valid UTF-8 as we use the PrefService for
+ // storage.
+ void PersistEncryptionBootstrapToken(
+ const std::string& token,
+ syncer::BootstrapTokenType token_type);
+
+ // For convenience, checks if initialization state is INITIALIZED.
+ bool initialized() const { return initialized_; }
+
+ // Let the front end handle the actionable error event.
+ void HandleActionableErrorEventOnFrontendLoop(
+ const syncer::SyncProtocolError& sync_error);
+
+ // Checks if |passphrase| can be used to decrypt the cryptographer's pending
+ // keys that were cached during NotifyPassphraseRequired. Returns true if
+ // decryption was successful. Returns false otherwise. Must be called with a
+ // non-empty pending keys cache.
+ bool CheckPassphraseAgainstCachedPendingKeys(
+ const std::string& passphrase) const;
+
+ // Invoked when a passphrase is required to decrypt a set of Nigori keys,
+ // or for encrypting. |reason| denotes why the passphrase was required.
+ // |pending_keys| is a copy of the cryptographer's pending keys, that are
+ // cached by the frontend. If there are no pending keys, or if the passphrase
+ // required reason is REASON_ENCRYPTION, an empty EncryptedData object is
+ // passed.
+ void NotifyPassphraseRequired(syncer::PassphraseRequiredReason reason,
+ sync_pb::EncryptedData pending_keys);
+
+ // Invoked when the passphrase provided by the user has been accepted.
+ void NotifyPassphraseAccepted();
+
+ // Invoked when the set of encrypted types or the encrypt
+ // everything flag changes.
+ void NotifyEncryptedTypesChanged(
+ syncer::ModelTypeSet encrypted_types,
+ bool encrypt_everything);
+
+ // Invoked when sync finishes encrypting new datatypes.
+ void NotifyEncryptionComplete();
+
+ // Invoked when the passphrase state has changed. Caches the passphrase state
+ // for later use on the UI thread.
+ // If |type| is FROZEN_IMPLICIT_PASSPHRASE or CUSTOM_PASSPHRASE,
+ // |explicit_passphrase_time| is the time at which that passphrase was set
+ // (if available).
+ void HandlePassphraseTypeChangedOnFrontendLoop(
+ syncer::PassphraseType type,
+ base::Time explicit_passphrase_time);
+
+ void HandleStopSyncingPermanentlyOnFrontendLoop();
+
+ // Dispatched to from OnConnectionStatusChange to handle updating
+ // frontend UI components.
+ void HandleConnectionStatusChangeOnFrontendLoop(
+ syncer::ConnectionStatus status);
+
+ // syncer::InvalidationHandler-like functions.
+ void HandleInvalidatorStateChangeOnFrontendLoop(
+ syncer::InvalidatorState state);
+ void HandleIncomingInvalidationOnFrontendLoop(
+ const syncer::ObjectIdInvalidationMap& invalidation_map);
+
+ // NotificationObserver implementation.
+ virtual void Observe(
+ int type,
+ const content::NotificationSource& source,
+ const content::NotificationDetails& details) OVERRIDE;
+
+ // InvalidationHandler implementation.
+ virtual void OnInvalidatorStateChange(
+ syncer::InvalidatorState state) OVERRIDE;
+ virtual void OnIncomingInvalidation(
+ const syncer::ObjectIdInvalidationMap& invalidation_map) OVERRIDE;
+
+ content::NotificationRegistrar notification_registrar_;
+
+ // A reference to the MessageLoop used to construct |this|, so we know how
+ // to safely talk back to the SyncFrontend.
+ base::MessageLoop* const frontend_loop_;
+
+ Profile* const profile_;
+
+ // Name used for debugging (set from profile_->GetDebugName()).
+ const std::string name_;
+
+ // Our core, which communicates directly to the syncapi. Use refptr instead
+ // of WeakHandle because |core_| is created on UI loop but released on
+ // sync loop.
+ scoped_refptr<SyncBackendHostCore> core_;
+
+ bool initialized_;
+
+ const base::WeakPtr<SyncPrefs> sync_prefs_;
+
+ ExtensionsActivityMonitor extensions_activity_monitor_;
+
+ scoped_ptr<SyncBackendRegistrar> registrar_;
+
+ // The frontend which we serve (and are owned by).
+ SyncFrontend* frontend_;
+
+ // We cache the cryptographer's pending keys whenever NotifyPassphraseRequired
+ // is called. This way, before the UI calls SetDecryptionPassphrase on the
+ // syncer, it can avoid the overhead of an asynchronous decryption call and
+ // give the user immediate feedback about the passphrase entered by first
+ // trying to decrypt the cached pending keys on the UI thread. Note that
+ // SetDecryptionPassphrase can still fail after the cached pending keys are
+ // successfully decrypted if the pending keys have changed since the time they
+ // were cached.
+ sync_pb::EncryptedData cached_pending_keys_;
+
+ // The state of the passphrase required to decrypt the bag of encryption keys
+ // in the nigori node. Updated whenever a new nigori node arrives or the user
+ // manually changes their passphrase state. Cached so we can synchronously
+ // check it from the UI thread.
+ syncer::PassphraseType cached_passphrase_type_;
+
+ // If an explicit passphrase is in use, the time at which the passphrase was
+ // first set (if available).
+ base::Time cached_explicit_passphrase_time_;
+
+ // UI-thread cache of the last SyncSessionSnapshot received from syncapi.
+ syncer::sessions::SyncSessionSnapshot last_snapshot_;
+
+ invalidation::InvalidationService* invalidator_;
+ bool invalidation_handler_registered_;
+
+ base::WeakPtrFactory<SyncBackendHostImpl> weak_ptr_factory_;
+
+ DISALLOW_COPY_AND_ASSIGN(SyncBackendHostImpl);
+};
+
+} // namespace browser_sync
+
+#endif // CHROME_BROWSER_SYNC_GLUE_SYNC_BACKEND_HOST_IMPL_H_
+
« no previous file with comments | « chrome/browser/sync/glue/sync_backend_host_core.cc ('k') | chrome/browser/sync/glue/sync_backend_host_impl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698