blob: ba5219ff1c41a5e0de18baf0b8b7a2603f188d60 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
|
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "remoting/host/security_key/fake_remote_security_key_ipc_client.h"
#include "base/callback.h"
#include "base/macros.h"
#include "base/memory/scoped_ptr.h"
#include "base/run_loop.h"
#include "base/thread_task_runner_handle.h"
#include "ipc/ipc_channel.h"
#include "ipc/ipc_message.h"
#include "ipc/ipc_message_macros.h"
#include "remoting/host/chromoting_messages.h"
#include "remoting/host/security_key/gnubby_auth_handler.h"
namespace remoting {
FakeRemoteSecurityKeyIpcClient::FakeRemoteSecurityKeyIpcClient(
base::Closure channel_event_callback)
: channel_event_callback_(channel_event_callback) {
DCHECK(!channel_event_callback_.is_null());
}
FakeRemoteSecurityKeyIpcClient::~FakeRemoteSecurityKeyIpcClient() {}
bool FakeRemoteSecurityKeyIpcClient::Connect(const std::string& channel_name) {
// The retry loop is needed as the IPC Servers we connect to are reset (torn
// down and recreated) in some tests and we should be resilient in that case.
IPC::ChannelHandle channel_handle(channel_name);
for (int i = 0; i < 5; i++) {
client_channel_ = IPC::Channel::CreateClient(channel_handle, this);
if (client_channel_->Connect()) {
return true;
}
base::RunLoop run_loop;
base::ThreadTaskRunnerHandle::Get()->PostDelayedTask(
FROM_HERE, run_loop.QuitClosure(),
base::TimeDelta::FromMilliseconds(100));
run_loop.Run();
}
return false;
}
void FakeRemoteSecurityKeyIpcClient::CloseChannel() {
client_channel_.reset();
channel_event_callback_.Run();
}
void FakeRemoteSecurityKeyIpcClient::SendRequest(
const std::string& request_payload) {
client_channel_->Send(
new ChromotingRemoteSecurityKeyToNetworkMsg_Request(request_payload));
}
bool FakeRemoteSecurityKeyIpcClient::OnMessageReceived(
const IPC::Message& message) {
bool handled = true;
IPC_BEGIN_MESSAGE_MAP(FakeRemoteSecurityKeyIpcClient, message)
IPC_MESSAGE_HANDLER(
ChromotingNetworkToRemoteSecurityKeyMsg_ConnectionDetails,
OnConnectionDetails)
IPC_MESSAGE_HANDLER(ChromotingNetworkToRemoteSecurityKeyMsg_Response,
OnSecurityKeyResponse)
IPC_MESSAGE_UNHANDLED(handled = false)
IPC_END_MESSAGE_MAP()
CHECK(handled) << "Received unexpected IPC type: " << message.type();
return handled;
}
void FakeRemoteSecurityKeyIpcClient::OnChannelConnected(int32_t peer_pid) {
channel_event_callback_.Run();
}
void FakeRemoteSecurityKeyIpcClient::OnChannelError() {
channel_event_callback_.Run();
}
void FakeRemoteSecurityKeyIpcClient::OnConnectionDetails(
const std::string& channel_name) {
last_message_received_ = channel_name;
channel_event_callback_.Run();
}
void FakeRemoteSecurityKeyIpcClient::OnSecurityKeyResponse(
const std::string& request_data) {
last_message_received_ = request_data;
channel_event_callback_.Run();
}
} // namespace remoting
|