blob: 676995f3ed797443c1a829442c816cdb60b7f4f2 [file] [log] [blame]
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chromeos/components/tether/disconnect_tethering_request_sender_impl.h"
#include <memory>
#include "base/memory/ptr_util.h"
#include "chromeos/components/proximity_auth/logging/logging.h"
#include "chromeos/components/tether/ble_connection_manager.h"
#include "chromeos/components/tether/tether_host_fetcher.h"
namespace chromeos {
namespace tether {
// static
DisconnectTetheringRequestSenderImpl::Factory*
DisconnectTetheringRequestSenderImpl::Factory::factory_instance_ = nullptr;
// static
std::unique_ptr<DisconnectTetheringRequestSender>
DisconnectTetheringRequestSenderImpl::Factory::NewInstance(
device_sync::DeviceSyncClient* device_sync_client,
secure_channel::SecureChannelClient* secure_channel_client,
BleConnectionManager* ble_connection_manager,
TetherHostFetcher* tether_host_fetcher) {
if (!factory_instance_)
factory_instance_ = new Factory();
return factory_instance_->BuildInstance(
device_sync_client, secure_channel_client, ble_connection_manager,
tether_host_fetcher);
}
// static
void DisconnectTetheringRequestSenderImpl::Factory::SetInstanceForTesting(
Factory* factory) {
factory_instance_ = factory;
}
std::unique_ptr<DisconnectTetheringRequestSender>
DisconnectTetheringRequestSenderImpl::Factory::BuildInstance(
device_sync::DeviceSyncClient* device_sync_client,
secure_channel::SecureChannelClient* secure_channel_client,
BleConnectionManager* ble_connection_manager,
TetherHostFetcher* tether_host_fetcher) {
return base::WrapUnique(new DisconnectTetheringRequestSenderImpl(
device_sync_client, secure_channel_client, ble_connection_manager,
tether_host_fetcher));
}
DisconnectTetheringRequestSenderImpl::DisconnectTetheringRequestSenderImpl(
device_sync::DeviceSyncClient* device_sync_client,
secure_channel::SecureChannelClient* secure_channel_client,
BleConnectionManager* ble_connection_manager,
TetherHostFetcher* tether_host_fetcher)
: device_sync_client_(device_sync_client),
secure_channel_client_(secure_channel_client),
ble_connection_manager_(ble_connection_manager),
tether_host_fetcher_(tether_host_fetcher),
weak_ptr_factory_(this) {}
DisconnectTetheringRequestSenderImpl::~DisconnectTetheringRequestSenderImpl() {
for (auto const& entry : device_id_to_operation_map_)
entry.second->RemoveObserver(this);
}
void DisconnectTetheringRequestSenderImpl::SendDisconnectRequestToDevice(
const std::string& device_id) {
if (base::ContainsKey(device_id_to_operation_map_, device_id))
return;
num_pending_host_fetches_++;
tether_host_fetcher_->FetchTetherHost(
device_id,
base::Bind(&DisconnectTetheringRequestSenderImpl::OnTetherHostFetched,
weak_ptr_factory_.GetWeakPtr(), device_id));
}
bool DisconnectTetheringRequestSenderImpl::HasPendingRequests() {
return !device_id_to_operation_map_.empty() || num_pending_host_fetches_ > 0;
}
void DisconnectTetheringRequestSenderImpl::OnTetherHostFetched(
const std::string& device_id,
base::Optional<cryptauth::RemoteDeviceRef> tether_host) {
num_pending_host_fetches_--;
DCHECK(num_pending_host_fetches_ >= 0);
if (!tether_host) {
PA_LOG(ERROR) << "Could not fetch device with ID "
<< cryptauth::RemoteDeviceRef::TruncateDeviceIdForLogs(
device_id)
<< ". Unable to send DisconnectTetheringRequest.";
return;
}
PA_LOG(INFO) << "Attempting to send DisconnectTetheringRequest to device "
<< "with ID "
<< cryptauth::RemoteDeviceRef::TruncateDeviceIdForLogs(
device_id);
std::unique_ptr<DisconnectTetheringOperation> disconnect_tethering_operation =
DisconnectTetheringOperation::Factory::NewInstance(
*tether_host, device_sync_client_, secure_channel_client_,
ble_connection_manager_);
// Add to the map.
device_id_to_operation_map_.emplace(
device_id, std::move(disconnect_tethering_operation));
// Start the operation; OnOperationFinished() will be called when finished.
device_id_to_operation_map_.at(device_id)->AddObserver(this);
device_id_to_operation_map_.at(device_id)->Initialize();
}
void DisconnectTetheringRequestSenderImpl::OnOperationFinished(
const std::string& device_id,
bool success) {
if (success) {
PA_LOG(INFO) << "Successfully sent DisconnectTetheringRequest to device "
<< "with ID "
<< cryptauth::RemoteDeviceRef::TruncateDeviceIdForLogs(
device_id);
} else {
PA_LOG(ERROR) << "Failed to send DisconnectTetheringRequest to device "
<< "with ID "
<< cryptauth::RemoteDeviceRef::TruncateDeviceIdForLogs(
device_id);
}
bool had_pending_requests = HasPendingRequests();
if (base::ContainsKey(device_id_to_operation_map_, device_id)) {
// Regardless of success/failure, unregister as a listener and delete the
// operation.
device_id_to_operation_map_.at(device_id)->RemoveObserver(this);
device_id_to_operation_map_.erase(device_id);
} else {
PA_LOG(ERROR)
<< "Operation finished, but device with ID "
<< cryptauth::RemoteDeviceRef::TruncateDeviceIdForLogs(device_id)
<< " was not being tracked by DisconnectTetheringRequestSender.";
}
// If there were pending reqests but now there are none, notify the Observers.
if (had_pending_requests && !HasPendingRequests())
NotifyPendingDisconnectRequestsComplete();
}
} // namespace tether
} // namespace chromeos