Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(605)

Unified Diff: chromeos/network/firewall_hole.cc

Issue 965613002: Open a firewall hole when a TCP server or UDP socket is bound. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebased. Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chromeos/network/firewall_hole.h ('k') | chromeos/network/firewall_hole_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chromeos/network/firewall_hole.cc
diff --git a/chromeos/network/firewall_hole.cc b/chromeos/network/firewall_hole.cc
new file mode 100644
index 0000000000000000000000000000000000000000..425e423fe8c9a0e0559b28dbd3665393358b5572
--- /dev/null
+++ b/chromeos/network/firewall_hole.cc
@@ -0,0 +1,164 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "chromeos/network/firewall_hole.h"
+
+#include <fcntl.h>
+#include <unistd.h>
+
+#include "base/bind.h"
+#include "base/location.h"
+#include "base/threading/worker_pool.h"
+#include "chromeos/dbus/dbus_thread_manager.h"
+#include "chromeos/dbus/permission_broker_client.h"
+#include "dbus/file_descriptor.h"
+
+namespace chromeos {
+
+namespace {
+
+// Creates a pair of file descriptors that form a "lifeline" between Chrome and
+// firewalld. If this pipe is closed unexpectedly (i.e. Chrome crashes) then
+// firewalld will notice and close the hole in the firewall.
+void CreateValidLifeline(dbus::FileDescriptor* lifeline_local,
+ dbus::FileDescriptor* lifeline_remote) {
+ int lifeline[2] = {-1, -1};
+ if (pipe2(lifeline, O_CLOEXEC) < 0) {
+ PLOG(ERROR) << "Failed to create a lifeline pipe";
+ return;
+ }
+
+ lifeline_local->PutValue(lifeline[0]);
+ lifeline_local->CheckValidity();
+
+ lifeline_remote->PutValue(lifeline[1]);
+ lifeline_remote->CheckValidity();
+}
+
+const char* PortTypeToString(FirewallHole::PortType type) {
+ switch (type) {
+ case FirewallHole::PortType::TCP:
+ return "TCP";
+ case FirewallHole::PortType::UDP:
+ return "UDP";
+ }
+ NOTREACHED();
+ return nullptr;
+}
+
+void PortReleased(FirewallHole::PortType type,
+ uint16_t port,
+ const std::string& interface,
+ FirewallHole::ScopedFileDescriptor lifeline_fd,
+ bool success) {
+ if (!success) {
+ LOG(WARNING) << "Failed to release firewall hole for "
+ << PortTypeToString(type) << " port " << port << " on "
+ << interface << ".";
+ }
+}
+
+} // namespace
+
+void CHROMEOS_EXPORT FirewallHole::FileDescriptorDeleter::operator()(
+ dbus::FileDescriptor* fd) {
+ base::WorkerPool::PostTask(
+ FROM_HERE, base::Bind(&base::DeletePointer<dbus::FileDescriptor>, fd),
+ false);
+}
+
+// static
+void FirewallHole::Open(PortType type,
+ uint16_t port,
+ const std::string& interface,
+ const OpenCallback& callback) {
+ ScopedFileDescriptor lifeline_local(new dbus::FileDescriptor());
+ ScopedFileDescriptor lifeline_remote(new dbus::FileDescriptor());
+
+ // This closure shares pointers with the one below. PostTaskAndReply
+ // guarantees that it will always be deleted first.
+ base::Closure create_lifeline_closure = base::Bind(
+ &CreateValidLifeline, lifeline_local.get(), lifeline_remote.get());
+
+ base::WorkerPool::PostTaskAndReply(
+ FROM_HERE, create_lifeline_closure,
+ base::Bind(&FirewallHole::RequestPortAccess, type, port, interface,
+ base::Passed(&lifeline_local), base::Passed(&lifeline_remote),
+ callback),
+ false);
+}
+
+FirewallHole::~FirewallHole() {
+ base::Callback<void(bool)> port_released_closure = base::Bind(
+ &PortReleased, type_, port_, interface_, base::Passed(&lifeline_fd_));
+
+ PermissionBrokerClient* client =
+ DBusThreadManager::Get()->GetPermissionBrokerClient();
+ DCHECK(client) << "Could not get permission broker client.";
+ switch (type_) {
+ case PortType::TCP:
+ client->ReleaseTcpPort(port_, interface_, port_released_closure);
+ return;
+ case PortType::UDP:
+ client->ReleaseUdpPort(port_, interface_, port_released_closure);
+ return;
+ }
+}
+
+void FirewallHole::RequestPortAccess(PortType type,
+ uint16_t port,
+ const std::string& interface,
+ ScopedFileDescriptor lifeline_local,
+ ScopedFileDescriptor lifeline_remote,
+ const OpenCallback& callback) {
+ if (!lifeline_local->is_valid() || !lifeline_remote->is_valid()) {
+ callback.Run(nullptr);
+ return;
+ }
+
+ base::Callback<void(bool)> access_granted_closure =
+ base::Bind(&FirewallHole::PortAccessGranted, type, port, interface,
+ base::Passed(&lifeline_local), callback);
+
+ PermissionBrokerClient* client =
+ DBusThreadManager::Get()->GetPermissionBrokerClient();
+ DCHECK(client) << "Could not get permission broker client.";
+
+ switch (type) {
+ case PortType::TCP:
+ client->RequestTcpPortAccess(port, interface, *lifeline_remote,
+ access_granted_closure);
+ return;
+ case PortType::UDP:
+ client->RequestUdpPortAccess(port, interface, *lifeline_remote,
+ access_granted_closure);
+ return;
+ }
+}
+
+void FirewallHole::PortAccessGranted(PortType type,
+ uint16_t port,
+ const std::string& interface,
+ ScopedFileDescriptor lifeline_fd,
+ const FirewallHole::OpenCallback& callback,
+ bool success) {
+ if (success) {
+ callback.Run(make_scoped_ptr(
+ new FirewallHole(type, port, interface, lifeline_fd.Pass())));
+ } else {
+ callback.Run(nullptr);
+ }
+}
+
+FirewallHole::FirewallHole(PortType type,
+ uint16_t port,
+ const std::string& interface,
+ ScopedFileDescriptor lifeline_fd)
+ : type_(type),
+ port_(port),
+ interface_(interface),
+ lifeline_fd_(lifeline_fd.Pass()) {
+}
+
+} // namespace chromeos
« no previous file with comments | « chromeos/network/firewall_hole.h ('k') | chromeos/network/firewall_hole_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698