blob: ea241e944f7d65a070c77936f826e98b138c3858 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef REMOTING_HOST_WTS_SESSION_PROCESS_LAUNCHER_WIN_H_
#define REMOTING_HOST_WTS_SESSION_PROCESS_LAUNCHER_WIN_H_
#include <windows.h>
#include "base/basictypes.h"
#include "base/file_path.h"
#include "base/compiler_specific.h"
#include "base/memory/ref_counted.h"
#include "base/memory/scoped_ptr.h"
#include "base/process.h"
#include "base/time.h"
#include "base/timer.h"
#include "base/win/scoped_handle.h"
#include "base/win/object_watcher.h"
#include "ipc/ipc_channel.h"
#include "remoting/host/wts_console_observer_win.h"
namespace base {
class MessageLoopProxy;
} // namespace base
namespace IPC {
class ChannelProxy;
class Message;
} // namespace IPC
namespace remoting {
class SasInjector;
class WtsConsoleMonitor;
class WtsSessionProcessLauncher
: public base::win::ObjectWatcher::Delegate,
public IPC::Channel::Listener,
public WtsConsoleObserver {
public:
// Constructs a WtsSessionProcessLauncher object. |host_binary| is the name of
// the executable to be launched in the console session. All interaction with
// |monitor| should happen on |main_message_loop|. |ipc_message_loop| has
// to be an I/O message loop.
WtsSessionProcessLauncher(
WtsConsoleMonitor* monitor,
const FilePath& host_binary,
scoped_refptr<base::MessageLoopProxy> main_message_loop,
scoped_refptr<base::MessageLoopProxy> ipc_message_loop);
virtual ~WtsSessionProcessLauncher();
// base::win::ObjectWatcher::Delegate implementation.
virtual void OnObjectSignaled(HANDLE object) OVERRIDE;
// IPC::Channel::Listener implementation.
virtual bool OnMessageReceived(const IPC::Message& message) OVERRIDE;
// WtsConsoleObserver implementation.
virtual void OnSessionAttached(uint32 session_id) OVERRIDE;
virtual void OnSessionDetached() OVERRIDE;
private:
// Attempts to launch the host process in the current console session.
// Schedules next launch attempt if creation of the process fails for any
// reason.
void LaunchProcess();
// Sends the Secure Attention Sequence to the session represented by
// |session_token_|.
void OnSendSasToConsole();
// Name of the host executable.
FilePath host_binary_;
// Time of the last launch attempt.
base::Time launch_time_;
// Current backoff delay.
base::TimeDelta launch_backoff_;
// Timer used to schedule the next attempt to launch the process.
base::OneShotTimer<WtsSessionProcessLauncher> timer_;
// The main service message loop.
scoped_refptr<base::MessageLoopProxy> main_message_loop_;
// Message loop used by the IPC channel.
scoped_refptr<base::MessageLoopProxy> ipc_message_loop_;
// This pointer is used to unsubscribe from session attach and detach events.
WtsConsoleMonitor* monitor_;
// Impersonation token that has the SE_TCB_NAME privilege enabled.
base::win::ScopedHandle privileged_token_;
// The handle of the process injected into the console session.
base::Process process_;
// Used to determine when the launched process terminates.
base::win::ObjectWatcher process_watcher_;
// The token to be used to launch a process in a different session.
base::win::ScopedHandle session_token_;
// Defines the states the process launcher can be in.
enum State {
StateDetached,
StateStarting,
StateAttached,
};
// Current state of the process launcher.
State state_;
// The Chromoting IPC channel connecting the service to the per-session
// process.
scoped_ptr<IPC::ChannelProxy> chromoting_channel_;
scoped_ptr<SasInjector> sas_injector_;
DISALLOW_COPY_AND_ASSIGN(WtsSessionProcessLauncher);
};
} // namespace remoting
#endif // REMOTING_HOST_WTS_SESSION_PROCESS_LAUNCHER_WIN_H_
|