| // Copyright 2012 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "remoting/protocol/jingle_session.h" |
| |
| #include <stdint.h> |
| |
| #include <algorithm> |
| #include <limits> |
| #include <memory> |
| #include <string> |
| #include <string_view> |
| #include <utility> |
| |
| #include "base/functional/bind.h" |
| #include "base/functional/callback.h" |
| #include "base/location.h" |
| #include "base/logging.h" |
| #include "base/notreached.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/string_split.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/task/single_thread_task_runner.h" |
| #include "base/time/time.h" |
| #include "remoting/base/constants.h" |
| #include "remoting/base/source_location.h" |
| #include "remoting/protocol/authenticator.h" |
| #include "remoting/protocol/content_description.h" |
| #include "remoting/protocol/errors.h" |
| #include "remoting/protocol/jingle_messages.h" |
| #include "remoting/protocol/jingle_session_manager.h" |
| #include "remoting/protocol/session_config.h" |
| #include "remoting/protocol/session_observer.h" |
| #include "remoting/protocol/session_plugin.h" |
| #include "remoting/protocol/transport.h" |
| #include "remoting/signaling/iq_sender.h" |
| #include "remoting/signaling/xmpp_constants.h" |
| #include "third_party/libjingle_xmpp/xmllite/xmlelement.h" |
| #include "third_party/webrtc/api/candidate.h" |
| |
| using jingle_xmpp::XmlElement; |
| |
| namespace remoting::protocol { |
| |
| namespace { |
| |
| // Timeouts have been temporarily increased for testing. |
| // TODO(rkjnsn): Revert default and session timeouts once done with testing. |
| |
| // How long we should wait for a response from the other end. This value is used |
| // for all requests except |transport-info|. |
| // const int kDefaultMessageTimeout = 10; |
| const int kDefaultMessageTimeout = 35; // For testing |
| |
| // During a reconnection, it usually takes longer for the peer to respond due to |
| // pending messages in the channel from the previous session. From experiment, |
| // it can take up to 20s for the session to reconnect. To make it safe, setting |
| // the timeout to 30s. |
| // const int kSessionInitiateAndAcceptTimeout = kDefaultMessageTimeout * 3; |
| const int kSessionInitiateAndAcceptTimeout = 45; // For testing |
| |
| // Timeout for the transport-info messages. |
| const int kTransportInfoTimeout = 10 * 60; |
| |
| // Special value for an invalid sequential ID for an incoming IQ. |
| const int kInvalid = -1; |
| |
| // Special value indicating that any sequential ID is valid for the next |
| // incoming IQ. |
| const int kAny = -1; |
| |
| ErrorCode AuthRejectionReasonToErrorCode( |
| Authenticator::RejectionReason reason) { |
| switch (reason) { |
| case Authenticator::RejectionReason::INVALID_CREDENTIALS: |
| return ErrorCode::AUTHENTICATION_FAILED; |
| case Authenticator::RejectionReason::INVALID_ACCOUNT_ID: |
| return ErrorCode::INVALID_ACCOUNT; |
| case Authenticator::RejectionReason::TOO_MANY_CONNECTIONS: |
| return ErrorCode::SESSION_REJECTED; |
| case Authenticator::RejectionReason::REJECTED_BY_USER: |
| return ErrorCode::SESSION_REJECTED; |
| case Authenticator::RejectionReason::AUTHZ_POLICY_CHECK_FAILED: |
| return ErrorCode::AUTHZ_POLICY_CHECK_FAILED; |
| case Authenticator::RejectionReason::REAUTHZ_POLICY_CHECK_FAILED: |
| return ErrorCode::REAUTHZ_POLICY_CHECK_FAILED; |
| case Authenticator::RejectionReason::LOCATION_AUTHZ_POLICY_CHECK_FAILED: |
| return ErrorCode::LOCATION_AUTHZ_POLICY_CHECK_FAILED; |
| case Authenticator::RejectionReason::UNAUTHORIZED_ACCOUNT: |
| return ErrorCode::UNAUTHORIZED_ACCOUNT; |
| case Authenticator::RejectionReason::NO_COMMON_AUTH_METHOD: |
| return ErrorCode::NO_COMMON_AUTH_METHOD; |
| case Authenticator::RejectionReason::INVALID_STATE: |
| return ErrorCode::INVALID_STATE; |
| case Authenticator::RejectionReason::INVALID_ARGUMENT: |
| return ErrorCode::INVALID_ARGUMENT; |
| case Authenticator::RejectionReason::UNEXPECTED_ERROR: |
| return ErrorCode::UNEXPECTED_AUTHENTICATOR_ERROR; |
| case Authenticator::RejectionReason::NETWORK_FAILURE: |
| return ErrorCode::NETWORK_FAILURE; |
| } |
| } |
| |
| // Extracts a sequential id from the id attribute of the IQ stanza. |
| int GetSequentialId(const std::string& id) { |
| std::vector<std::string> tokens = |
| SplitString(id, "_", base::TRIM_WHITESPACE, base::SPLIT_WANT_NONEMPTY); |
| // Legacy endpoints does not encode the IQ ordering in the ID attribute |
| if (tokens.size() != 2) { |
| return kInvalid; |
| } |
| |
| int result = kInvalid; |
| if (!base::StringToInt(tokens[1], &result)) { |
| return kInvalid; |
| } |
| return result; |
| } |
| |
| } // namespace |
| |
| // A Queue that sorts incoming messages and returns them in the ascending order |
| // of sequence ids. The sequence id can be extracted from the ID attribute of |
| // an IQ stanza, which have the following format <opaque_string>_<sequence_id>. |
| // |
| // Background: |
| // The chromoting signaling channel does not guarantee that the incoming IQs are |
| // delivered in the order that it is sent. |
| // |
| // This behavior leads to transient session setup failures. For instance, |
| // a <transport-info> that is sent after a <session-info> message is sometimes |
| // delivered to the client out of order, causing the client to close the |
| // session due to an unexpected request. |
| class JingleSession::OrderedMessageQueue { |
| public: |
| OrderedMessageQueue() = default; |
| |
| OrderedMessageQueue(const OrderedMessageQueue&) = delete; |
| OrderedMessageQueue& operator=(const OrderedMessageQueue&) = delete; |
| |
| ~OrderedMessageQueue() = default; |
| |
| // Returns the list of messages ordered by their sequential IDs. |
| std::vector<PendingMessage> OnIncomingMessage( |
| const std::string& id, |
| PendingMessage&& pending_message); |
| |
| // Sets the initial ID of the session initiate message. |
| void SetInitialId(const std::string& id); |
| |
| private: |
| // Implements an ordered list by using map with the |sequence_id| as the key, |
| // so that |queue_| is always sorted by |sequence_id|. |
| std::map<int, PendingMessage> queue_; |
| |
| int next_incoming_ = kAny; |
| }; |
| |
| std::vector<JingleSession::PendingMessage> |
| JingleSession::OrderedMessageQueue::OnIncomingMessage( |
| const std::string& id, |
| JingleSession::PendingMessage&& message) { |
| std::vector<JingleSession::PendingMessage> result; |
| int current = GetSequentialId(id); |
| // If there is no sequencing order encoded in the id, just return the |
| // message. |
| if (current == kInvalid) { |
| result.push_back(std::move(message)); |
| return result; |
| } |
| |
| if (next_incoming_ == kAny) { |
| next_incoming_ = current; |
| } |
| |
| // Ensure there are no duplicate sequence ids. |
| DCHECK_GE(current, next_incoming_); |
| DCHECK(queue_.find(current) == queue_.end()); |
| |
| queue_.insert(std::make_pair(current, std::move(message))); |
| |
| auto it = queue_.begin(); |
| while (it != queue_.end() && it->first == next_incoming_) { |
| result.push_back(std::move(it->second)); |
| it = queue_.erase(it); |
| next_incoming_++; |
| } |
| |
| if (current - next_incoming_ >= 3) { |
| LOG(WARNING) << "Multiple messages are missing: expected= " |
| << next_incoming_ << " current= " << current; |
| } |
| return result; |
| } |
| |
| void JingleSession::OrderedMessageQueue::SetInitialId(const std::string& id) { |
| int current = GetSequentialId(id); |
| if (current != kInvalid) { |
| next_incoming_ = current + 1; |
| } |
| } |
| |
| JingleSession::PendingMessage::PendingMessage() = default; |
| JingleSession::PendingMessage::PendingMessage(PendingMessage&& moved) = default; |
| JingleSession::PendingMessage::PendingMessage( |
| std::unique_ptr<JingleMessage> message, |
| ReplyCallback reply_callback) |
| : message(std::move(message)), reply_callback(std::move(reply_callback)) {} |
| JingleSession::PendingMessage::~PendingMessage() = default; |
| |
| JingleSession::PendingMessage& JingleSession::PendingMessage::operator=( |
| PendingMessage&& moved) = default; |
| |
| JingleSession::JingleSession(JingleSessionManager* session_manager) |
| : session_manager_(session_manager), |
| event_handler_(nullptr), |
| state_(INITIALIZING), |
| error_(ErrorCode::OK), |
| message_queue_(new OrderedMessageQueue) {} |
| |
| JingleSession::~JingleSession() { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| session_manager_->SessionDestroyed(this); |
| } |
| |
| void JingleSession::SetEventHandler(Session::EventHandler* event_handler) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| DCHECK(event_handler); |
| event_handler_ = event_handler; |
| } |
| |
| ErrorCode JingleSession::error() const { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| return error_; |
| } |
| |
| void JingleSession::StartConnection( |
| const SignalingAddress& peer_address, |
| std::unique_ptr<Authenticator> authenticator) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| DCHECK(authenticator.get()); |
| DCHECK_EQ(authenticator->state(), Authenticator::MESSAGE_READY); |
| |
| peer_address_ = peer_address; |
| authenticator_ = std::move(authenticator); |
| authenticator_->set_state_change_after_accepted_callback(base::BindRepeating( |
| &JingleSession::OnAuthenticatorStateChangeAfterAccepted, |
| base::Unretained(this))); |
| |
| // Generate random session ID. There are usually not more than 1 |
| // concurrent session per host, so a random 64-bit integer provides |
| // enough entropy. In the worst case connection will fail when two |
| // clients generate the same session ID concurrently. |
| session_id_ = base::NumberToString( |
| base::RandGenerator(std::numeric_limits<uint64_t>::max())); |
| |
| // Delay sending session-initiate message to ensure SessionPlugin can be |
| // attached before the message. |
| base::SingleThreadTaskRunner::GetCurrentDefault()->PostTask( |
| FROM_HERE, base::BindOnce(&JingleSession::SendSessionInitiateMessage, |
| weak_factory_.GetWeakPtr())); |
| |
| SetState(CONNECTING); |
| } |
| |
| void JingleSession::InitializeIncomingConnection( |
| const std::string& message_id, |
| const JingleMessage& initiate_message, |
| std::unique_ptr<Authenticator> authenticator) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| DCHECK(initiate_message.description.get()); |
| DCHECK(authenticator.get()); |
| DCHECK_EQ(authenticator->state(), Authenticator::WAITING_MESSAGE); |
| |
| peer_address_ = initiate_message.from; |
| authenticator_ = std::move(authenticator); |
| authenticator_->set_state_change_after_accepted_callback(base::BindRepeating( |
| &JingleSession::OnAuthenticatorStateChangeAfterAccepted, |
| base::Unretained(this))); |
| session_id_ = initiate_message.sid; |
| message_queue_->SetInitialId(message_id); |
| |
| SetState(ACCEPTING); |
| |
| config_ = |
| SessionConfig::SelectCommon(initiate_message.description->config(), |
| session_manager_->protocol_config_.get()); |
| if (!config_) { |
| Close(ErrorCode::INCOMPATIBLE_PROTOCOL, |
| base::StringPrintf("Rejecting connection from %s because no " |
| "compatible configuration has " |
| "been found.", |
| peer_address_.id()), |
| FROM_HERE); |
| return; |
| } |
| } |
| |
| void JingleSession::AcceptIncomingConnection( |
| const JingleMessage& initiate_message) { |
| DCHECK(config_); |
| |
| ProcessIncomingPluginMessage(initiate_message); |
| // Process the first authentication message. |
| const jingle_xmpp::XmlElement* first_auth_message = |
| initiate_message.description->authenticator_message(); |
| |
| if (!first_auth_message) { |
| Close(ErrorCode::INVALID_ARGUMENT, |
| "Cannot find the first authentication message.", FROM_HERE); |
| return; |
| } |
| |
| DCHECK_EQ(authenticator_->state(), Authenticator::WAITING_MESSAGE); |
| // |authenticator_| is owned, so Unretained() is safe here. |
| authenticator_->ProcessMessage( |
| first_auth_message, |
| base::BindOnce(&JingleSession::ContinueAcceptIncomingConnection, |
| base::Unretained(this))); |
| } |
| |
| void JingleSession::ContinueAcceptIncomingConnection() { |
| DCHECK_NE(authenticator_->state(), Authenticator::PROCESSING_MESSAGE); |
| if (authenticator_->state() == Authenticator::REJECTED) { |
| Authenticator::RejectionDetails details = |
| authenticator_->rejection_details(); |
| Close(AuthRejectionReasonToErrorCode(authenticator_->rejection_reason()), |
| details.message, details.location); |
| return; |
| } |
| |
| // Send the session-accept message. |
| std::unique_ptr<JingleMessage> message(new JingleMessage( |
| peer_address_, JingleMessage::SESSION_ACCEPT, session_id_)); |
| |
| std::unique_ptr<jingle_xmpp::XmlElement> auth_message; |
| if (authenticator_->state() == Authenticator::MESSAGE_READY) { |
| auth_message = authenticator_->GetNextMessage(); |
| } |
| |
| message->description = std::make_unique<ContentDescription>( |
| CandidateSessionConfig::CreateFrom(*config_), std::move(auth_message)); |
| SendMessage(std::move(message)); |
| |
| // Update state. |
| SetState(ACCEPTED); |
| |
| if (authenticator_->state() == Authenticator::ACCEPTED) { |
| OnAuthenticated(); |
| } else { |
| DCHECK_EQ(authenticator_->state(), Authenticator::WAITING_MESSAGE); |
| if (authenticator_->started()) { |
| SetState(AUTHENTICATING); |
| } |
| } |
| } |
| |
| const std::string& JingleSession::jid() { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| return peer_address_.id(); |
| } |
| |
| const SessionConfig& JingleSession::config() { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| return *config_; |
| } |
| |
| const Authenticator& JingleSession::authenticator() const { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| return *authenticator_; |
| } |
| |
| void JingleSession::SetTransport(Transport* transport) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| DCHECK(!transport_); |
| DCHECK(transport); |
| transport_ = transport; |
| } |
| |
| void JingleSession::SendTransportInfo( |
| std::unique_ptr<jingle_xmpp::XmlElement> transport_info) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| DCHECK_EQ(state_, AUTHENTICATED); |
| |
| std::unique_ptr<JingleMessage> message(new JingleMessage( |
| peer_address_, JingleMessage::TRANSPORT_INFO, session_id_)); |
| message->transport_info = std::move(transport_info); |
| AddPluginAttachments(message.get()); |
| |
| std::unique_ptr<jingle_xmpp::XmlElement> stanza = message->ToXml(); |
| stanza->AddAttr(kQNameId, GetNextOutgoingId()); |
| |
| auto request = session_manager_->iq_sender()->SendIq( |
| std::move(stanza), base::BindOnce(&JingleSession::OnTransportInfoResponse, |
| base::Unretained(this))); |
| if (request) { |
| request->SetTimeout(base::Seconds(kTransportInfoTimeout)); |
| transport_info_requests_.push_back(std::move(request)); |
| } else { |
| LOG(ERROR) << "Failed to send a transport-info message"; |
| } |
| } |
| |
| void JingleSession::Close(protocol::ErrorCode error, |
| std::string_view error_details, |
| const SourceLocation& error_location) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| |
| if (is_session_active()) { |
| // Send session-terminate message with the appropriate error code. |
| JingleMessage::Reason reason; |
| switch (error) { |
| case ErrorCode::OK: |
| reason = JingleMessage::SUCCESS; |
| break; |
| case ErrorCode::SESSION_REJECTED: |
| case ErrorCode::AUTHENTICATION_FAILED: |
| case ErrorCode::INVALID_ACCOUNT: |
| reason = JingleMessage::DECLINE; |
| break; |
| case ErrorCode::INCOMPATIBLE_PROTOCOL: |
| reason = JingleMessage::INCOMPATIBLE_PARAMETERS; |
| break; |
| case ErrorCode::HOST_OVERLOAD: |
| reason = JingleMessage::CANCEL; |
| break; |
| case ErrorCode::MAX_SESSION_LENGTH: |
| reason = JingleMessage::EXPIRED; |
| break; |
| case ErrorCode::HOST_CONFIGURATION_ERROR: |
| reason = JingleMessage::FAILED_APPLICATION; |
| break; |
| default: |
| reason = JingleMessage::GENERAL_ERROR; |
| } |
| |
| std::unique_ptr<JingleMessage> message(new JingleMessage( |
| peer_address_, JingleMessage::SESSION_TERMINATE, session_id_)); |
| message->reason = reason; |
| message->error_code = error; |
| if (!error_details.empty()) { |
| message->error_details = error_details; |
| } |
| if (!error_location.is_null()) { |
| message->error_location = error_location.ToString(); |
| } |
| if (error != ErrorCode::OK) { |
| std::string additional_logs; |
| if (!error_details.empty()) { |
| additional_logs += ": "; |
| additional_logs += error_details; |
| } |
| if (!message->error_location.empty()) { |
| additional_logs += " (" + message->error_location + ")"; |
| } |
| LOG(WARNING) << "Session closed with error " << static_cast<int>(error) |
| << additional_logs; |
| } |
| SendMessage(std::move(message)); |
| } |
| |
| error_ = error; |
| |
| if (state_ != FAILED && state_ != CLOSED) { |
| if (error != ErrorCode::OK) { |
| SetState(FAILED); |
| } else { |
| SetState(CLOSED); |
| } |
| } |
| } |
| |
| void JingleSession::AddPlugin(SessionPlugin* plugin) { |
| DCHECK(plugin); |
| plugins_.push_back(plugin); |
| } |
| |
| void JingleSession::SendMessage(std::unique_ptr<JingleMessage> message) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| |
| if (message->action != JingleMessage::SESSION_TERMINATE) { |
| // When the host accepts session-initiate message from a client JID it |
| // doesn't recognize it sends session-terminate without session-accept. |
| // Attaching plugin information to this session-terminate message may lead |
| // to privacy issues (e.g. leaking Windows version to someone who does not |
| // own the host). So a simply approach is to ignore plugins when sending |
| // SESSION_TERMINATE message. |
| AddPluginAttachments(message.get()); |
| } |
| std::unique_ptr<jingle_xmpp::XmlElement> stanza = message->ToXml(); |
| stanza->AddAttr(kQNameId, GetNextOutgoingId()); |
| |
| auto request = session_manager_->iq_sender()->SendIq( |
| std::move(stanza), |
| base::BindOnce(&JingleSession::OnMessageResponse, base::Unretained(this), |
| message->action)); |
| |
| int timeout = kDefaultMessageTimeout; |
| if (message->action == JingleMessage::SESSION_INITIATE || |
| message->action == JingleMessage::SESSION_ACCEPT) { |
| timeout = kSessionInitiateAndAcceptTimeout; |
| } |
| if (request) { |
| request->SetTimeout(base::Seconds(timeout)); |
| pending_requests_.push_back(std::move(request)); |
| } else { |
| LOG(ERROR) << "Failed to send a " |
| << JingleMessage::GetActionName(message->action) << " message"; |
| } |
| } |
| |
| void JingleSession::OnMessageResponse(JingleMessage::ActionType request_type, |
| IqRequest* request, |
| const jingle_xmpp::XmlElement* response) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| |
| // Delete the request from the list of pending requests. |
| pending_requests_.erase(std::ranges::find(pending_requests_, request, |
| &std::unique_ptr<IqRequest>::get)); |
| |
| // Ignore all responses after session was closed. |
| if (state_ == CLOSED || state_ == FAILED) { |
| return; |
| } |
| |
| std::string type_str = JingleMessage::GetActionName(request_type); |
| |
| // |response| will be nullptr if the request timed out. |
| if (!response) { |
| Close(ErrorCode::SIGNALING_TIMEOUT, |
| base::StringPrintf("%s request timed out.", type_str), FROM_HERE); |
| return; |
| } else { |
| const std::string& type = |
| response->Attr(jingle_xmpp::QName(std::string(), "type")); |
| if (type != "result") { |
| // TODO(sergeyu): There may be different reasons for error |
| // here. Parse the response stanza to find failure reason. |
| Close(ErrorCode::PEER_IS_OFFLINE, |
| base::StringPrintf( |
| "Received error in response to %s message: \"%s\". " |
| "Terminating the session.", |
| type_str, response->Str()), |
| FROM_HERE); |
| } |
| } |
| } |
| |
| void JingleSession::OnTransportInfoResponse( |
| IqRequest* request, |
| const jingle_xmpp::XmlElement* response) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| DCHECK(!transport_info_requests_.empty()); |
| |
| // Consider transport-info requests sent before this one lost and delete |
| // all IqRequest objects in front of |request|. |
| auto request_it = std::ranges::find(transport_info_requests_, request, |
| &std::unique_ptr<IqRequest>::get); |
| DCHECK(request_it != transport_info_requests_.end()); |
| transport_info_requests_.erase(transport_info_requests_.begin(), |
| request_it + 1); |
| |
| // Ignore transport-info timeouts. |
| if (!response) { |
| LOG(ERROR) << "transport-info request has timed out."; |
| return; |
| } |
| |
| const std::string& type = |
| response->Attr(jingle_xmpp::QName(std::string(), "type")); |
| if (type != "result") { |
| Close(ErrorCode::PEER_IS_OFFLINE, |
| base::StringPrintf( |
| "Received error in response to transport-info message: \"%s\". " |
| "Terminating the session.", |
| response->Str()), |
| FROM_HERE); |
| } |
| } |
| |
| void JingleSession::OnIncomingMessage(const std::string& id, |
| std::unique_ptr<JingleMessage> message, |
| ReplyCallback reply_callback) { |
| ProcessIncomingPluginMessage(*message); |
| std::vector<PendingMessage> ordered = message_queue_->OnIncomingMessage( |
| id, PendingMessage{std::move(message), std::move(reply_callback)}); |
| base::WeakPtr<JingleSession> self = weak_factory_.GetWeakPtr(); |
| for (auto& pending_message : ordered) { |
| ProcessIncomingMessage(std::move(pending_message.message), |
| std::move(pending_message.reply_callback)); |
| if (!self) { |
| return; |
| } |
| } |
| } |
| |
| void JingleSession::ProcessIncomingMessage( |
| std::unique_ptr<JingleMessage> message, |
| ReplyCallback reply_callback) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| |
| if (peer_address_ != message->from) { |
| // Ignore messages received from a different Jid. |
| std::move(reply_callback).Run(JingleMessageReply::INVALID_SID); |
| return; |
| } |
| |
| switch (message->action) { |
| case JingleMessage::SESSION_ACCEPT: |
| OnAccept(std::move(message), std::move(reply_callback)); |
| break; |
| |
| case JingleMessage::SESSION_INFO: |
| OnSessionInfo(std::move(message), std::move(reply_callback)); |
| break; |
| |
| case JingleMessage::TRANSPORT_INFO: |
| OnTransportInfo(std::move(message), std::move(reply_callback)); |
| break; |
| |
| case JingleMessage::SESSION_TERMINATE: |
| OnTerminate(std::move(message), std::move(reply_callback)); |
| break; |
| |
| default: |
| std::move(reply_callback).Run(JingleMessageReply::UNEXPECTED_REQUEST); |
| } |
| } |
| |
| void JingleSession::OnAccept(std::unique_ptr<JingleMessage> message, |
| ReplyCallback reply_callback) { |
| if (state_ != CONNECTING) { |
| std::move(reply_callback).Run(JingleMessageReply::UNEXPECTED_REQUEST); |
| return; |
| } |
| |
| std::move(reply_callback).Run(JingleMessageReply::NONE); |
| |
| const jingle_xmpp::XmlElement* auth_message = |
| message->description->authenticator_message(); |
| if (!auth_message) { |
| Close(ErrorCode::INVALID_ARGUMENT, |
| "Received session-accept without authentication message", FROM_HERE); |
| return; |
| } |
| |
| ErrorCode error_code; |
| std::string error_details; |
| base::Location error_location; |
| if (!InitializeConfigFromDescription(message->description.get(), error_code, |
| error_details, error_location)) { |
| Close(error_code, error_details, error_location); |
| return; |
| } |
| |
| SetState(ACCEPTED); |
| |
| DCHECK(authenticator_->state() == Authenticator::WAITING_MESSAGE); |
| authenticator_->ProcessMessage( |
| auth_message, base::BindOnce(&JingleSession::ProcessAuthenticationStep, |
| base::Unretained(this))); |
| } |
| |
| void JingleSession::OnSessionInfo(std::unique_ptr<JingleMessage> message, |
| ReplyCallback reply_callback) { |
| if (!message->info.get() || |
| !Authenticator::IsAuthenticatorMessage(message->info.get())) { |
| std::move(reply_callback).Run(JingleMessageReply::UNSUPPORTED_INFO); |
| return; |
| } |
| |
| if ((state_ != ACCEPTED && state_ != AUTHENTICATING) || |
| authenticator_->state() != Authenticator::WAITING_MESSAGE) { |
| std::move(reply_callback).Run(JingleMessageReply::UNEXPECTED_REQUEST); |
| Close(ErrorCode::INVALID_ARGUMENT, |
| base::StringPrintf("Received unexpected authenticator message %s", |
| message->info->Str()), |
| FROM_HERE); |
| return; |
| } |
| |
| std::move(reply_callback).Run(JingleMessageReply::NONE); |
| |
| authenticator_->ProcessMessage( |
| message->info.get(), |
| base::BindOnce(&JingleSession::ProcessAuthenticationStep, |
| base::Unretained(this))); |
| } |
| |
| void JingleSession::OnTransportInfo(std::unique_ptr<JingleMessage> message, |
| ReplyCallback reply_callback) { |
| if (!message->transport_info) { |
| std::move(reply_callback).Run(JingleMessageReply::BAD_REQUEST); |
| return; |
| } |
| |
| if (state_ == AUTHENTICATING) { |
| pending_transport_info_.push_back( |
| PendingMessage{std::move(message), std::move(reply_callback)}); |
| } else if (state_ == AUTHENTICATED) { |
| std::move(reply_callback) |
| .Run(transport_->ProcessTransportInfo(message->transport_info.get()) |
| ? JingleMessageReply::NONE |
| : JingleMessageReply::BAD_REQUEST); |
| } else { |
| LOG(ERROR) << "Received unexpected transport-info message."; |
| std::move(reply_callback).Run(JingleMessageReply::UNEXPECTED_REQUEST); |
| } |
| } |
| |
| void JingleSession::OnTerminate(std::unique_ptr<JingleMessage> message, |
| ReplyCallback reply_callback) { |
| if (!is_session_active()) { |
| LOG(WARNING) << "Received unexpected session-terminate message."; |
| std::move(reply_callback).Run(JingleMessageReply::UNEXPECTED_REQUEST); |
| return; |
| } |
| |
| std::move(reply_callback).Run(JingleMessageReply::NONE); |
| |
| error_ = message->error_code; |
| if (error_ == ErrorCode::UNKNOWN_ERROR) { |
| // get error code from message.reason for compatibility with older versions |
| // that do not add <error-code>. |
| switch (message->reason) { |
| case JingleMessage::SUCCESS: |
| if (state_ == CONNECTING) { |
| error_ = ErrorCode::SESSION_REJECTED; |
| } else { |
| error_ = ErrorCode::OK; |
| } |
| break; |
| case JingleMessage::DECLINE: |
| error_ = ErrorCode::AUTHENTICATION_FAILED; |
| break; |
| case JingleMessage::CANCEL: |
| error_ = ErrorCode::HOST_OVERLOAD; |
| break; |
| case JingleMessage::EXPIRED: |
| error_ = ErrorCode::MAX_SESSION_LENGTH; |
| break; |
| case JingleMessage::INCOMPATIBLE_PARAMETERS: |
| error_ = ErrorCode::INCOMPATIBLE_PROTOCOL; |
| break; |
| case JingleMessage::FAILED_APPLICATION: |
| error_ = ErrorCode::HOST_CONFIGURATION_ERROR; |
| break; |
| case JingleMessage::GENERAL_ERROR: |
| error_ = ErrorCode::CHANNEL_CONNECTION_ERROR; |
| break; |
| default: |
| error_ = ErrorCode::UNKNOWN_ERROR; |
| } |
| } else if (error_ == ErrorCode::SESSION_REJECTED) { |
| // For backward compatibility, we still use AUTHENTICATION_FAILED for |
| // SESSION_REJECTED error. |
| // TODO(zijiehe): Handle SESSION_REJECTED error in WebApp. Tracked by |
| // http://crbug.com/618036. |
| error_ = ErrorCode::AUTHENTICATION_FAILED; |
| } |
| |
| if (error_ != ErrorCode::OK) { |
| SetState(FAILED); |
| } else { |
| SetState(CLOSED); |
| } |
| } |
| |
| void JingleSession::OnAuthenticatorStateChangeAfterAccepted() { |
| if (authenticator_->state() == Authenticator::REJECTED) { |
| Authenticator::RejectionDetails details = |
| authenticator_->rejection_details(); |
| Close(AuthRejectionReasonToErrorCode(authenticator_->rejection_reason()), |
| details.message, details.location); |
| } else { |
| NOTREACHED() << "Unexpected authenticator state: " |
| << authenticator_->state(); |
| } |
| } |
| |
| bool JingleSession::InitializeConfigFromDescription( |
| const ContentDescription* description, |
| ErrorCode& error_code, |
| std::string& error_details, |
| base::Location& error_location) { |
| DCHECK(description); |
| config_ = SessionConfig::GetFinalConfig(description->config()); |
| if (!config_) { |
| error_code = ErrorCode::INVALID_ARGUMENT; |
| error_details = |
| "Received session-accept message does not specify the session " |
| "configuration."; |
| error_location = FROM_HERE; |
| return false; |
| } |
| if (!session_manager_->protocol_config_->IsSupported(*config_)) { |
| error_code = ErrorCode::INCOMPATIBLE_PROTOCOL; |
| error_details = |
| "Received session-accept message specifies an invalid session " |
| "configuration."; |
| error_location = FROM_HERE; |
| return false; |
| } |
| |
| return true; |
| } |
| |
| void JingleSession::ProcessAuthenticationStep() { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| DCHECK_NE(authenticator_->state(), Authenticator::PROCESSING_MESSAGE); |
| |
| if (state_ != ACCEPTED && state_ != AUTHENTICATING) { |
| DCHECK(state_ == FAILED || state_ == CLOSED); |
| // The remote host closed the connection while the authentication was being |
| // processed asynchronously, nothing to do. |
| return; |
| } |
| |
| if (authenticator_->state() == Authenticator::MESSAGE_READY) { |
| std::unique_ptr<JingleMessage> message(new JingleMessage( |
| peer_address_, JingleMessage::SESSION_INFO, session_id_)); |
| message->info = authenticator_->GetNextMessage(); |
| DCHECK(message->info.get()); |
| SendMessage(std::move(message)); |
| } |
| DCHECK_NE(authenticator_->state(), Authenticator::MESSAGE_READY); |
| |
| if (authenticator_->started()) { |
| base::WeakPtr<JingleSession> self = weak_factory_.GetWeakPtr(); |
| SetState(AUTHENTICATING); |
| if (!self) { |
| return; |
| } |
| } |
| |
| if (authenticator_->state() == Authenticator::ACCEPTED) { |
| OnAuthenticated(); |
| } else if (authenticator_->state() == Authenticator::REJECTED) { |
| Authenticator::RejectionDetails details = |
| authenticator_->rejection_details(); |
| Close(AuthRejectionReasonToErrorCode(authenticator_->rejection_reason()), |
| details.message, details.location); |
| } |
| } |
| |
| void JingleSession::OnAuthenticated() { |
| transport_->Start(authenticator_.get(), |
| base::BindRepeating(&JingleSession::SendTransportInfo, |
| weak_factory_.GetWeakPtr())); |
| |
| base::WeakPtr<JingleSession> self = weak_factory_.GetWeakPtr(); |
| std::vector<PendingMessage> messages_to_process; |
| std::swap(messages_to_process, pending_transport_info_); |
| for (auto& message : messages_to_process) { |
| std::move(message.reply_callback) |
| .Run(transport_->ProcessTransportInfo( |
| message.message->transport_info.get()) |
| ? JingleMessageReply::NONE |
| : JingleMessageReply::BAD_REQUEST); |
| if (!self) { |
| return; |
| } |
| } |
| |
| SetState(AUTHENTICATED); |
| } |
| |
| void JingleSession::SetState(State new_state) { |
| DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
| |
| if (new_state != state_) { |
| DCHECK_NE(state_, CLOSED); |
| DCHECK_NE(state_, FAILED); |
| |
| state_ = new_state; |
| // Observers must be called before the event handler, since the event |
| // handler may destroy the session. |
| for (SessionObserver& observer : session_manager_->observers_) { |
| observer.OnSessionStateChange(*this, new_state); |
| } |
| if (event_handler_) { |
| event_handler_->OnSessionStateChange(new_state); |
| } |
| } |
| } |
| |
| bool JingleSession::is_session_active() { |
| return state_ == CONNECTING || state_ == ACCEPTING || state_ == ACCEPTED || |
| state_ == AUTHENTICATING || state_ == AUTHENTICATED; |
| } |
| |
| void JingleSession::ProcessIncomingPluginMessage(const JingleMessage& message) { |
| if (!message.attachments) { |
| return; |
| } |
| for (remoting::protocol::SessionPlugin* plugin : plugins_) { |
| plugin->OnIncomingMessage(*(message.attachments)); |
| } |
| } |
| |
| void JingleSession::AddPluginAttachments(JingleMessage* message) { |
| DCHECK(message); |
| for (remoting::protocol::SessionPlugin* plugin : plugins_) { |
| std::unique_ptr<XmlElement> attachment = plugin->GetNextMessage(); |
| if (attachment) { |
| message->AddAttachment(std::move(attachment)); |
| } |
| } |
| } |
| |
| void JingleSession::SendSessionInitiateMessage() { |
| if (state_ != CONNECTING) { |
| return; |
| } |
| std::unique_ptr<JingleMessage> message(new JingleMessage( |
| peer_address_, JingleMessage::SESSION_INITIATE, session_id_)); |
| message->initiator = |
| session_manager_->signal_strategy_->GetLocalAddress().id(); |
| message->description = std::make_unique<ContentDescription>( |
| session_manager_->protocol_config_->Clone(), |
| authenticator_->GetNextMessage()); |
| SendMessage(std::move(message)); |
| } |
| |
| std::string JingleSession::GetNextOutgoingId() { |
| return outgoing_id_prefix_ + "_" + base::NumberToString(++next_outgoing_id_); |
| } |
| |
| } // namespace remoting::protocol |