blob: 026041e8329dd26d14f8c540f888345d1ad088a3 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "remoting/host/setup/me2me_native_messaging_host_main.h"
#include <cstdint>
#include <memory>
#include <string>
#include <utility>
#include "base/at_exit.h"
#include "base/command_line.h"
#include "base/files/file.h"
#include "base/i18n/icu_util.h"
#include "base/run_loop.h"
#include "base/strings/string_number_conversions.h"
#include "base/task/single_thread_task_executor.h"
#include "base/task/thread_pool/thread_pool.h"
#include "base/threading/thread.h"
#include "build/build_config.h"
#include "mojo/core/embedder/embedder.h"
#include "net/url_request/url_fetcher.h"
#include "remoting/base/auto_thread_task_runner.h"
#include "remoting/base/breakpad.h"
#include "remoting/base/gaia_oauth_client.h"
#include "remoting/base/url_request_context_getter.h"
#include "remoting/host/chromoting_host_context.h"
#include "remoting/host/host_exit_codes.h"
#include "remoting/host/logging.h"
#include "remoting/host/native_messaging/native_messaging_pipe.h"
#include "remoting/host/native_messaging/pipe_messaging_channel.h"
#include "remoting/host/pairing_registry_delegate.h"
#include "remoting/host/setup/me2me_native_messaging_host.h"
#include "remoting/host/switches.h"
#include "remoting/host/usage_stats_consent.h"
#include "services/network/public/cpp/shared_url_loader_factory.h"
#include "services/network/transitional_url_loader_factory_owner.h"
#if defined(OS_MACOSX)
#include "base/mac/scoped_nsautorelease_pool.h"
#endif // defined(OS_MACOSX)
#if defined(OS_WIN)
#include "base/process/process_info.h"
#include "base/win/registry.h"
#include "remoting/host/pairing_registry_delegate_win.h"
#endif // defined(OS_WIN)
#if defined(USE_GLIB) && !defined(OS_CHROMEOS)
#include <glib-object.h>
#endif // defined(USE_GLIB) && !defined(OS_CHROMEOS)
using remoting::protocol::PairingRegistry;
namespace remoting {
int Me2MeNativeMessagingHostMain(int argc, char** argv) {
// This object instance is required by Chrome code (such as
// SingleThreadTaskExecutor).
base::AtExitManager exit_manager;
base::CommandLine::Init(argc, argv);
remoting::InitHostLogging();
#if defined(OS_MACOSX)
// Needed so we don't leak objects when threads are created.
base::mac::ScopedNSAutoreleasePool pool;
#endif // defined(OS_MACOSX)
#if defined(USE_GLIB) && !defined(OS_CHROMEOS)
// g_type_init will be deprecated in 2.36. 2.35 is the development
// version for 2.36, hence do not call g_type_init starting 2.35.
// http://developer.gnome.org/gobject/unstable/gobject-Type-Information.html#g-type-init
#if !GLIB_CHECK_VERSION(2, 35, 0)
g_type_init();
#endif
#endif // defined(USE_GLIB) && !defined(OS_CHROMEOS)
// Required to find the ICU data file, used by some file_util routines.
base::i18n::InitializeICU();
#if defined(REMOTING_ENABLE_BREAKPAD)
// Initialize Breakpad as early as possible. On Mac the command-line needs to
// be initialized first, so that the preference for crash-reporting can be
// looked up in the config file.
if (IsUsageStatsAllowed()) {
InitializeCrashReporting();
}
#endif // defined(REMOTING_ENABLE_BREAKPAD)
base::ThreadPoolInstance::CreateAndStartWithDefaultParams("Me2Me");
mojo::core::Init();
// An IO thread is needed for the pairing registry and URL context getter.
base::Thread io_thread("io_thread");
io_thread.StartWithOptions(
base::Thread::Options(base::MessagePump::Type::IO, 0));
base::SingleThreadTaskExecutor main_task_executor(
base::MessagePump::Type::UI);
base::RunLoop run_loop;
scoped_refptr<DaemonController> daemon_controller =
DaemonController::Create();
// Pass handle of the native view to the controller so that the UAC prompts
// are focused properly.
const base::CommandLine* command_line =
base::CommandLine::ForCurrentProcess();
int64_t native_view_handle = 0;
if (command_line->HasSwitch(kParentWindowSwitchName)) {
std::string native_view =
command_line->GetSwitchValueASCII(kParentWindowSwitchName);
if (!base::StringToInt64(native_view, &native_view_handle)) {
LOG(WARNING) << "Invalid parameter value --" << kParentWindowSwitchName
<< "=" << native_view;
}
}
base::File read_file;
base::File write_file;
bool needs_elevation = false;
#if defined(OS_WIN)
needs_elevation = !base::IsCurrentProcessElevated();
if (command_line->HasSwitch(kElevateSwitchName)) {
DCHECK(!needs_elevation);
// The "elevate" switch is always accompanied by the "input" and "output"
// switches whose values name named pipes that should be used in place of
// stdin and stdout.
DCHECK(command_line->HasSwitch(kInputSwitchName));
DCHECK(command_line->HasSwitch(kOutputSwitchName));
// presubmit: allow wstring
std::wstring input_pipe_name =
command_line->GetSwitchValueNative(kInputSwitchName);
// presubmit: allow wstring
std::wstring output_pipe_name =
command_line->GetSwitchValueNative(kOutputSwitchName);
// A NULL SECURITY_ATTRIBUTES signifies that the handle can't be inherited.
read_file =
base::File(CreateFile(input_pipe_name.c_str(), GENERIC_READ, 0, nullptr,
OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, nullptr));
if (!read_file.IsValid()) {
PLOG(ERROR) << "CreateFile failed on '" << input_pipe_name << "'";
return kInitializationFailed;
}
write_file = base::File(CreateFile(
output_pipe_name.c_str(), GENERIC_WRITE, 0, nullptr, OPEN_EXISTING,
FILE_ATTRIBUTE_NORMAL, nullptr));
if (!write_file.IsValid()) {
PLOG(ERROR) << "CreateFile failed on '" << output_pipe_name << "'";
return kInitializationFailed;
}
} else {
// GetStdHandle() returns pseudo-handles for stdin and stdout even if
// the hosting executable specifies "Windows" subsystem. However the
// returned handles are invalid in that case unless standard input and
// output are redirected to a pipe or file.
read_file = base::File(GetStdHandle(STD_INPUT_HANDLE));
write_file = base::File(GetStdHandle(STD_OUTPUT_HANDLE));
// After the native messaging channel starts the native messaging reader
// will keep doing blocking read operations on the input named pipe.
// If any other thread tries to perform any operation on STDIN, it will also
// block because the input named pipe is synchronous (non-overlapped).
// It is pretty common for a DLL to query the device info (GetFileType) of
// the STD* handles at startup. So any LoadLibrary request can potentially
// be blocked. To prevent that from happening we close STDIN and STDOUT
// handles as soon as we retrieve the corresponding file handles.
SetStdHandle(STD_INPUT_HANDLE, nullptr);
SetStdHandle(STD_OUTPUT_HANDLE, nullptr);
}
#elif defined(OS_POSIX)
// The files will be automatically closed.
read_file = base::File(STDIN_FILENO);
write_file = base::File(STDOUT_FILENO);
#else
#error Not implemented.
#endif
// OAuth client (for credential requests). IO thread is used for blocking
scoped_refptr<net::URLRequestContextGetter> url_request_context_getter(
new URLRequestContextGetter(io_thread.task_runner()));
network::TransitionalURLLoaderFactoryOwner url_loader_factory_owner(
url_request_context_getter);
std::unique_ptr<OAuthClient> oauth_client(
new GaiaOAuthClient(url_loader_factory_owner.GetURLLoaderFactory()));
net::URLFetcher::SetIgnoreCertificateRequests(true);
// Create the pairing registry.
scoped_refptr<PairingRegistry> pairing_registry;
#if defined(OS_WIN)
base::win::RegKey root;
LONG result = root.Open(HKEY_LOCAL_MACHINE, kPairingRegistryKeyName,
KEY_READ);
if (result != ERROR_SUCCESS) {
SetLastError(result);
PLOG(ERROR) << "Failed to open HKLM\\" << kPairingRegistryKeyName;
return kInitializationFailed;
}
base::win::RegKey unprivileged;
result = unprivileged.Open(root.Handle(), kPairingRegistryClientsKeyName,
needs_elevation ? KEY_READ : KEY_READ | KEY_WRITE);
if (result != ERROR_SUCCESS) {
SetLastError(result);
PLOG(ERROR) << "Failed to open HKLM\\" << kPairingRegistryKeyName
<< "\\" << kPairingRegistryClientsKeyName;
return kInitializationFailed;
}
// Only try to open the privileged key if the current process is elevated.
base::win::RegKey privileged;
if (!needs_elevation) {
result = privileged.Open(root.Handle(), kPairingRegistrySecretsKeyName,
KEY_READ | KEY_WRITE);
if (result != ERROR_SUCCESS) {
SetLastError(result);
PLOG(ERROR) << "Failed to open HKLM\\" << kPairingRegistryKeyName << "\\"
<< kPairingRegistrySecretsKeyName;
return kInitializationFailed;
}
}
// Initialize the pairing registry delegate and set the root keys.
std::unique_ptr<PairingRegistryDelegateWin> delegate(
new PairingRegistryDelegateWin());
if (!delegate->SetRootKeys(privileged.Take(), unprivileged.Take()))
return kInitializationFailed;
pairing_registry =
new PairingRegistry(io_thread.task_runner(), std::move(delegate));
#else // defined(OS_WIN)
pairing_registry =
CreatePairingRegistry(io_thread.task_runner());
#endif // !defined(OS_WIN)
std::unique_ptr<NativeMessagingPipe> native_messaging_pipe(
new NativeMessagingPipe());
// Set up the native messaging channel.
std::unique_ptr<extensions::NativeMessagingChannel> channel(
new PipeMessagingChannel(std::move(read_file), std::move(write_file)));
std::unique_ptr<ChromotingHostContext> context =
ChromotingHostContext::Create(new remoting::AutoThreadTaskRunner(
main_task_executor.task_runner(), run_loop.QuitClosure()));
// Create the native messaging host.
std::unique_ptr<extensions::NativeMessageHost> host(
new Me2MeNativeMessagingHost(needs_elevation,
static_cast<intptr_t>(native_view_handle),
std::move(context), daemon_controller,
pairing_registry, std::move(oauth_client)));
host->Start(native_messaging_pipe.get());
native_messaging_pipe->Start(std::move(host), std::move(channel));
// Run the loop until channel is alive.
run_loop.Run();
// Block until tasks blocking shutdown have completed their execution.
base::ThreadPoolInstance::Get()->Shutdown();
return kSuccessExitCode;
}
} // namespace remoting