blob: efcb8b6eca7b021114907968d7bd236b782d8a73 [file] [log] [blame]
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "blimp/client/session/assignment_source.h"
#include "base/bind.h"
#include "base/callback_helpers.h"
#include "base/command_line.h"
#include "base/files/file_util.h"
#include "base/json/json_reader.h"
#include "base/json/json_writer.h"
#include "base/location.h"
#include "base/memory/ref_counted.h"
#include "base/numerics/safe_conversions.h"
#include "base/strings/string_number_conversions.h"
#include "base/task_runner_util.h"
#include "base/threading/thread_restrictions.h"
#include "base/values.h"
#include "blimp/client/app/blimp_client_switches.h"
#include "blimp/common/get_client_token.h"
#include "blimp/common/protocol_version.h"
#include "components/safe_json/safe_json_parser.h"
#include "net/base/ip_address.h"
#include "net/base/ip_endpoint.h"
#include "net/base/load_flags.h"
#include "net/base/net_errors.h"
#include "net/http/http_status_code.h"
#include "net/proxy/proxy_config_service.h"
#include "net/proxy/proxy_service.h"
#include "net/url_request/url_fetcher.h"
#include "net/url_request/url_request_context.h"
#include "net/url_request/url_request_context_builder.h"
#include "net/url_request/url_request_context_getter.h"
namespace blimp {
namespace client {
namespace {
// Assignment request JSON keys.
const char kProtocolVersionKey[] = "protocol_version";
// Assignment response JSON keys.
const char kClientTokenKey[] = "clientToken";
const char kHostKey[] = "host";
const char kPortKey[] = "port";
const char kCertificateKey[] = "certificate";
// Possible arguments for the "--engine-transport" command line parameter.
const char kSSLTransportValue[] = "ssl";
const char kTCPTransportValue[] = "tcp";
class SimpleURLRequestContextGetter : public net::URLRequestContextGetter {
public:
SimpleURLRequestContextGetter(
scoped_refptr<base::SingleThreadTaskRunner> io_loop_task_runner)
: io_loop_task_runner_(std::move(io_loop_task_runner)),
proxy_config_service_(net::ProxyService::CreateSystemProxyConfigService(
io_loop_task_runner_,
io_loop_task_runner_)) {}
// net::URLRequestContextGetter implementation.
net::URLRequestContext* GetURLRequestContext() override {
if (!url_request_context_) {
net::URLRequestContextBuilder builder;
builder.set_proxy_config_service(std::move(proxy_config_service_));
builder.DisableHttpCache();
url_request_context_ = builder.Build();
}
return url_request_context_.get();
}
scoped_refptr<base::SingleThreadTaskRunner> GetNetworkTaskRunner()
const override {
return io_loop_task_runner_;
}
private:
~SimpleURLRequestContextGetter() override {}
scoped_refptr<base::SingleThreadTaskRunner> io_loop_task_runner_;
std::unique_ptr<net::URLRequestContext> url_request_context_;
// Temporary storage for the ProxyConfigService, which needs to be created on
// the main thread but cleared on the IO thread. This will be built in the
// constructor and cleared on the IO thread. Due to the usage of this class
// this is safe.
std::unique_ptr<net::ProxyConfigService> proxy_config_service_;
DISALLOW_COPY_AND_ASSIGN(SimpleURLRequestContextGetter);
};
bool IsValidIpPortNumber(unsigned port) {
return port > 0 && port <= 65535;
}
// Populates an Assignment using command-line parameters, if provided.
// Returns a null Assignment if no parameters were set.
// Must be called on a thread suitable for file IO.
Assignment GetAssignmentFromCommandLine() {
Assignment assignment;
const base::CommandLine* cmd_line = base::CommandLine::ForCurrentProcess();
assignment.client_token = GetClientToken(*cmd_line);
CHECK(!assignment.client_token.empty()) << "No client token provided.";
unsigned port_parsed = 0;
if (!base::StringToUint(
cmd_line->GetSwitchValueASCII(switches::kEnginePort),
&port_parsed) || !IsValidIpPortNumber(port_parsed)) {
DLOG(FATAL) << "--engine-port must be a value between 1 and 65535.";
return Assignment();
}
net::IPAddress ip_address;
std::string ip_str = cmd_line->GetSwitchValueASCII(switches::kEngineIP);
if (!ip_address.AssignFromIPLiteral(ip_str)) {
DLOG(FATAL) << "Invalid engine IP " << ip_str;
return Assignment();
}
assignment.engine_endpoint =
net::IPEndPoint(ip_address, base::checked_cast<uint16_t>(port_parsed));
std::string transport_str =
cmd_line->GetSwitchValueASCII(switches::kEngineTransport);
if (transport_str == kSSLTransportValue) {
assignment.transport_protocol = Assignment::TransportProtocol::SSL;
} else if (transport_str == kTCPTransportValue) {
assignment.transport_protocol = Assignment::TransportProtocol::TCP;
} else {
DLOG(FATAL) << "Invalid engine transport " << transport_str;
return Assignment();
}
scoped_refptr<net::X509Certificate> cert;
if (assignment.transport_protocol == Assignment::TransportProtocol::SSL) {
base::FilePath cert_path =
cmd_line->GetSwitchValuePath(switches::kEngineCertPath);
if (cert_path.empty()) {
DLOG(FATAL) << "Missing required parameter --"
<< switches::kEngineCertPath << ".";
return Assignment();
}
std::string cert_str;
if (!base::ReadFileToString(cert_path, &cert_str)) {
DLOG(FATAL) << "Couldn't read from file: "
<< cert_path.LossyDisplayName();
return Assignment();
}
net::CertificateList cert_list =
net::X509Certificate::CreateCertificateListFromBytes(
cert_str.data(), cert_str.size(),
net::X509Certificate::FORMAT_PEM_CERT_SEQUENCE);
DLOG_IF(FATAL, (cert_list.size() != 1u))
<< "Only one cert is allowed in PEM cert list.";
assignment.cert = std::move(cert_list[0]);
}
if (!assignment.IsValid()) {
DLOG(FATAL) << "Invalid command-line assignment.";
return Assignment();
}
return assignment;
}
} // namespace
Assignment::Assignment() : transport_protocol(TransportProtocol::UNKNOWN) {}
Assignment::Assignment(const Assignment& other) = default;
Assignment::~Assignment() {}
bool Assignment::IsValid() const {
if (engine_endpoint.address().empty() || engine_endpoint.port() == 0 ||
transport_protocol == TransportProtocol::UNKNOWN) {
return false;
}
if (transport_protocol == TransportProtocol::SSL && !cert) {
return false;
}
return true;
}
AssignmentSource::AssignmentSource(
const GURL& assigner_endpoint,
const scoped_refptr<base::SingleThreadTaskRunner>& network_task_runner,
const scoped_refptr<base::SingleThreadTaskRunner>& file_task_runner)
: assigner_endpoint_(assigner_endpoint),
file_task_runner_(std::move(file_task_runner)),
url_request_context_(
new SimpleURLRequestContextGetter(network_task_runner)),
weak_factory_(this) {
DCHECK(assigner_endpoint_.is_valid());
}
AssignmentSource::~AssignmentSource() {}
void AssignmentSource::GetAssignment(const std::string& client_auth_token,
const AssignmentCallback& callback) {
DCHECK(callback_.is_null());
callback_ = AssignmentCallback(callback);
if (base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kEngineIP)) {
base::PostTaskAndReplyWithResult(
file_task_runner_.get(), FROM_HERE,
base::Bind(&GetAssignmentFromCommandLine),
base::Bind(&AssignmentSource::OnGetAssignmentFromCommandLineDone,
weak_factory_.GetWeakPtr(), client_auth_token));
} else {
QueryAssigner(client_auth_token);
}
}
void AssignmentSource::OnGetAssignmentFromCommandLineDone(
const std::string& client_auth_token,
Assignment parsed_assignment) {
// If GetAssignmentFromCommandLine succeeded, then return its output.
if (parsed_assignment.IsValid()) {
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::RESULT_OK, parsed_assignment);
return;
}
// If no assignment was passed via the command line, then fall back on
// querying the Assigner service.
QueryAssigner(client_auth_token);
}
void AssignmentSource::QueryAssigner(const std::string& client_auth_token) {
// Call out to the network for a real assignment. Build the network request
// to hit the assigner.
url_fetcher_ =
net::URLFetcher::Create(assigner_endpoint_, net::URLFetcher::POST, this);
url_fetcher_->SetRequestContext(url_request_context_.get());
url_fetcher_->SetLoadFlags(net::LOAD_DO_NOT_SAVE_COOKIES |
net::LOAD_DO_NOT_SEND_COOKIES);
url_fetcher_->AddExtraRequestHeader("Authorization: Bearer " +
client_auth_token);
// Write the JSON for the request data.
base::DictionaryValue dictionary;
dictionary.SetString(kProtocolVersionKey,
base::IntToString(kProtocolVersion));
std::string json;
base::JSONWriter::Write(dictionary, &json);
url_fetcher_->SetUploadData("application/json", json);
url_fetcher_->Start();
}
void AssignmentSource::OnURLFetchComplete(const net::URLFetcher* source) {
DCHECK(!callback_.is_null());
DCHECK_EQ(url_fetcher_.get(), source);
if (!source->GetStatus().is_success()) {
DVLOG(1) << "Assignment request failed due to network error: "
<< net::ErrorToString(source->GetStatus().error());
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_NETWORK_FAILURE, Assignment());
return;
}
switch (source->GetResponseCode()) {
case net::HTTP_OK:
ParseAssignerResponse();
break;
case net::HTTP_BAD_REQUEST:
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_REQUEST, Assignment());
break;
case net::HTTP_UNAUTHORIZED:
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_EXPIRED_ACCESS_TOKEN,
Assignment());
break;
case net::HTTP_FORBIDDEN:
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_USER_INVALID, Assignment());
break;
case 429: // Too Many Requests
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_OUT_OF_VMS, Assignment());
break;
case net::HTTP_INTERNAL_SERVER_ERROR:
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_SERVER_ERROR, Assignment());
break;
default:
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_RESPONSE, Assignment());
break;
}
}
void AssignmentSource::ParseAssignerResponse() {
DCHECK(url_fetcher_.get());
DCHECK(url_fetcher_->GetStatus().is_success());
DCHECK_EQ(net::HTTP_OK, url_fetcher_->GetResponseCode());
// Grab the response from the assigner request.
std::string response;
if (!url_fetcher_->GetResponseAsString(&response)) {
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_RESPONSE, Assignment());
return;
}
safe_json::SafeJsonParser::Parse(
response,
base::Bind(&AssignmentSource::OnJsonParsed, weak_factory_.GetWeakPtr()),
base::Bind(&AssignmentSource::OnJsonParseError,
weak_factory_.GetWeakPtr()));
}
void AssignmentSource::OnJsonParsed(std::unique_ptr<base::Value> json) {
const base::DictionaryValue* dict;
if (!json->GetAsDictionary(&dict)) {
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_RESPONSE, Assignment());
return;
}
// Validate that all the expected fields are present.
std::string client_token;
std::string host;
int port;
std::string cert_str;
if (!(dict->GetString(kClientTokenKey, &client_token) &&
dict->GetString(kHostKey, &host) && dict->GetInteger(kPortKey, &port) &&
dict->GetString(kCertificateKey, &cert_str))) {
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_RESPONSE, Assignment());
return;
}
net::IPAddress ip_address;
if (!ip_address.AssignFromIPLiteral(host)) {
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_RESPONSE, Assignment());
return;
}
if (!base::IsValueInRangeForNumericType<uint16_t>(port)) {
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_RESPONSE, Assignment());
return;
}
net::CertificateList cert_list =
net::X509Certificate::CreateCertificateListFromBytes(
cert_str.data(), cert_str.size(),
net::X509Certificate::FORMAT_PEM_CERT_SEQUENCE);
if (cert_list.size() != 1) {
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_INVALID_CERT, Assignment());
return;
}
// The assigner assumes SSL-only and all engines it assigns only communicate
// over SSL.
Assignment assignment;
assignment.transport_protocol = Assignment::TransportProtocol::SSL;
assignment.engine_endpoint = net::IPEndPoint(ip_address, port);
assignment.client_token = client_token;
assignment.cert = std::move(cert_list[0]);
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_OK, assignment);
}
void AssignmentSource::OnJsonParseError(const std::string& error) {
DLOG(ERROR) << "Error while parsing assigner JSON: " << error;
base::ResetAndReturn(&callback_)
.Run(AssignmentSource::Result::RESULT_BAD_RESPONSE, Assignment());
}
} // namespace client
} // namespace blimp