File: userdataauth_client.h

package info (click to toggle)
chromium 138.0.7204.183-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 6,071,908 kB
  • sloc: cpp: 34,937,088; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,953; asm: 946,768; xml: 739,971; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,806; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (413 lines) | stat: -rw-r--r-- 17,469 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef CHROMEOS_ASH_COMPONENTS_DBUS_USERDATAAUTH_USERDATAAUTH_CLIENT_H_
#define CHROMEOS_ASH_COMPONENTS_DBUS_USERDATAAUTH_USERDATAAUTH_CLIENT_H_

#include "base/component_export.h"
#include "base/functional/callback.h"
#include "base/observer_list_types.h"
#include "base/scoped_observation_traits.h"
#include "chromeos/ash/components/dbus/cryptohome/UserDataAuth.pb.h"
#include "chromeos/ash/components/dbus/cryptohome/rpc.pb.h"
#include "chromeos/dbus/common/dbus_callback.h"

namespace dbus {
class Bus;
}

namespace ash {

// UserDataAuthClient is used to communicate with the org.chromium.UserDataAuth
// service exposed by cryptohomed. All method should be called from the origin
// thread (UI thread) which initializes the DBusThreadManager instance.
class COMPONENT_EXPORT(USERDATAAUTH_CLIENT) UserDataAuthClient {
 public:
  class Observer : public base::CheckedObserver {
   public:
    // Called when LowDiskSpace signal is received, when the cryptohome
    // partition is running out of disk space.
    virtual void LowDiskSpace(const ::user_data_auth::LowDiskSpace& status) {}

    // Called when DircryptoMigrationProgress signal is received.
    // Typically, called periodically during a migration is performed by
    // cryptohomed, as well as to notify the completion of migration.
    virtual void DircryptoMigrationProgress(
        const ::user_data_auth::DircryptoMigrationProgress& progress) {}
  };

  class FingerprintAuthObserver : public base::CheckedObserver {
   public:
    // Used for the legacy fingerprint auth scan signal.
    virtual void OnFingerprintScan(
        const ::user_data_auth::FingerprintScanResult& result) {}
    // Used for the legacy fingerprint enroll scan signal.
    virtual void OnEnrollScanDone(
        const ::user_data_auth::FingerprintScanResult& result,
        bool is_complete,
        int percent_complete) {}
  };

  // Processes sub messages embedded in the PrepareAuthFactorProgress signal
  // received
  class PrepareAuthFactorProgressObserver : public base::CheckedObserver {
   public:
    // Called when a fingerprint auth message is received.
    virtual void OnFingerprintAuthScan(
        const ::user_data_auth::AuthScanDone& result) {}

    // Called when a enroll progress is received.
    virtual void OnFingerprintEnrollProgress(
        const ::user_data_auth::AuthEnrollmentProgress& result) {}
  };

  class AuthFactorStatusUpdateObserver : public base::CheckedObserver {
   public:
    // Called when AuthFactorStatusUpdate signal is received.
    virtual void OnAuthFactorStatusUpdate(
        const ::user_data_auth::AuthFactorStatusUpdate& update) {}
  };

  using IsMountedCallback =
      chromeos::DBusMethodCallback<::user_data_auth::IsMountedReply>;
  using GetVaultPropertiesCallback =
      chromeos::DBusMethodCallback<::user_data_auth::GetVaultPropertiesReply>;
  using UnmountCallback =
      chromeos::DBusMethodCallback<::user_data_auth::UnmountReply>;
  using RemoveCallback =
      chromeos::DBusMethodCallback<::user_data_auth::RemoveReply>;

  using GetSupportedKeyPoliciesCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::GetSupportedKeyPoliciesReply>;
  using GetAccountDiskUsageCallback =
      chromeos::DBusMethodCallback<::user_data_auth::GetAccountDiskUsageReply>;

  // AuthSession interaction API.
  using StartAuthSessionCallback =
      chromeos::DBusMethodCallback<::user_data_auth::StartAuthSessionReply>;
  using GetAuthSessionStatusCallback =
      chromeos::DBusMethodCallback<::user_data_auth::GetAuthSessionStatusReply>;
  using InvalidateAuthSessionCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::InvalidateAuthSessionReply>;
  using ExtendAuthSessionCallback =
      chromeos::DBusMethodCallback<::user_data_auth::ExtendAuthSessionReply>;
  // AuthFactors API for AuthSession.
  using AuthenticateAuthFactorCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::AuthenticateAuthFactorReply>;
  using AddAuthFactorCallback =
      chromeos::DBusMethodCallback<::user_data_auth::AddAuthFactorReply>;
  using UpdateAuthFactorCallback =
      chromeos::DBusMethodCallback<::user_data_auth::UpdateAuthFactorReply>;
  using UpdateAuthFactorMetadataCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::UpdateAuthFactorMetadataReply>;
  using ReplaceAuthFactorCallback =
      chromeos::DBusMethodCallback<::user_data_auth::ReplaceAuthFactorReply>;
  using RemoveAuthFactorCallback =
      chromeos::DBusMethodCallback<::user_data_auth::RemoveAuthFactorReply>;
  using ListAuthFactorsCallback =
      chromeos::DBusMethodCallback<::user_data_auth::ListAuthFactorsReply>;
  using GetAuthFactorExtendedInfoCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::GetAuthFactorExtendedInfoReply>;

  // Asynchronous (biometric) AuthFactors API.
  using PrepareAuthFactorCallback =
      chromeos::DBusMethodCallback<::user_data_auth::PrepareAuthFactorReply>;
  using TerminateAuthFactorCallback =
      chromeos::DBusMethodCallback<::user_data_auth::TerminateAuthFactorReply>;
  // Home directory-related API.
  using PrepareGuestVaultCallback =
      chromeos::DBusMethodCallback<::user_data_auth::PrepareGuestVaultReply>;
  using PrepareEphemeralVaultCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::PrepareEphemeralVaultReply>;
  using CreatePersistentUserCallback =
      chromeos::DBusMethodCallback<::user_data_auth::CreatePersistentUserReply>;
  using PreparePersistentVaultCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::PreparePersistentVaultReply>;
  using PrepareVaultForMigrationCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::PrepareVaultForMigrationReply>;

  using StartMigrateToDircryptoCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::StartMigrateToDircryptoReply>;
  using NeedsDircryptoMigrationCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::NeedsDircryptoMigrationReply>;

  using GetArcDiskFeaturesCallback =
      chromeos::DBusMethodCallback<::user_data_auth::GetArcDiskFeaturesReply>;

  using GetRecoverableKeyStoresCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::GetRecoverableKeyStoresReply>;

  using SetUserDataStorageWriteEnabledCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::SetUserDataStorageWriteEnabledReply>;

  using LockFactorUntilRebootCallback = chromeos::DBusMethodCallback<
      ::user_data_auth::LockFactorUntilRebootReply>;

  // Not copyable or movable.
  UserDataAuthClient(const UserDataAuthClient&) = delete;
  UserDataAuthClient& operator=(const UserDataAuthClient&) = delete;

  // Creates and initializes the global instance. |bus| must not be null.
  static void Initialize(dbus::Bus* bus);

  // Creates and initializes a fake global instance if not already created.
  static void InitializeFake();

  // Override the global instance for testing. Must only be called in unit
  // tests, which bypass the normal browser startup and shutdown sequence. Use
  // InitializeFake or OverrideGlobalInstance in FakeUserDataAuth for browser
  // tests.
  static void OverrideGlobalInstanceForTesting(UserDataAuthClient*);

  // Destroys the global instance.
  static void Shutdown();

  // Returns the global instance which may be null if not initialized.
  static UserDataAuthClient* Get();

  // Returns the sanitized |username| that the stub implementation would return.
  static std::string GetStubSanitizedUsername(
      const cryptohome::AccountIdentifier& id);

  // Adds an observer.
  virtual void AddObserver(Observer* observer) = 0;

  // Removes an observer if added.
  virtual void RemoveObserver(Observer* observer) = 0;

  // Adds a fingerprint auth observer.
  virtual void AddFingerprintAuthObserver(
      FingerprintAuthObserver* observer) = 0;

  // Removes a fingerprint auth observer if added.
  virtual void RemoveFingerprintAuthObserver(
      FingerprintAuthObserver* observer) = 0;

  // Adds a PrepareAuthFactorProgress observer.
  virtual void AddPrepareAuthFactorProgressObserver(
      PrepareAuthFactorProgressObserver* observer) = 0;

  // Removes a PrepareAuthFactorProgress observer if added.
  virtual void RemovePrepareAuthFactorProgressObserver(
      PrepareAuthFactorProgressObserver* observer) = 0;

  virtual void AddAuthFactorStatusUpdateObserver(
      AuthFactorStatusUpdateObserver* observer) = 0;

  virtual void RemoveAuthFactorStatusUpdateObserver(
      AuthFactorStatusUpdateObserver* observer) = 0;

  // Actual DBus Methods:

  // Runs the callback as soon as the service becomes available.
  virtual void WaitForServiceToBeAvailable(
      chromeos::WaitForServiceToBeAvailableCallback callback) = 0;

  // Queries if user's vault is mounted.
  virtual void IsMounted(const ::user_data_auth::IsMountedRequest& request,
                         IsMountedCallback callback) = 0;

  // Queries user's vault properties.
  virtual void GetVaultProperties(
      const ::user_data_auth::GetVaultPropertiesRequest& request,
      GetVaultPropertiesCallback callback) = 0;

  // Unmounts user's vault.
  virtual void Unmount(const ::user_data_auth::UnmountRequest& request,
                       UnmountCallback callback) = 0;

  // Removes user's vault.
  virtual void Remove(const ::user_data_auth::RemoveRequest& request,
                      RemoveCallback callback) = 0;

  // Instructs cryptohome to migrate the vault from eCryptfs to Dircrypto.
  virtual void StartMigrateToDircrypto(
      const ::user_data_auth::StartMigrateToDircryptoRequest& request,
      StartMigrateToDircryptoCallback callback) = 0;

  // Check with cryptohome to see if a user's vault needs to be migrated.
  virtual void NeedsDircryptoMigration(
      const ::user_data_auth::NeedsDircryptoMigrationRequest& request,
      NeedsDircryptoMigrationCallback callback) = 0;

  // Check the capabilities/policies regarding a key. For instance, if low
  // entropy credential is supported.
  virtual void GetSupportedKeyPolicies(
      const ::user_data_auth::GetSupportedKeyPoliciesRequest& request,
      GetSupportedKeyPoliciesCallback callback) = 0;

  // Calculate the amount of disk space used by user's vault.
  virtual void GetAccountDiskUsage(
      const ::user_data_auth::GetAccountDiskUsageRequest& request,
      GetAccountDiskUsageCallback callback) = 0;

  // Starts an auth session.
  virtual void StartAuthSession(
      const ::user_data_auth::StartAuthSessionRequest& request,
      StartAuthSessionCallback callback) = 0;

  // This request is intended to happen when a user wants
  // to login to ChromeOS as a guest.
  virtual void PrepareGuestVault(
      const ::user_data_auth::PrepareGuestVaultRequest& request,
      PrepareGuestVaultCallback callback) = 0;

  // This request is intended when a policy (either device or enterprise)
  // has enabled ephemeral users. An ephemeral user is created
  // in a memory filesystem only and is never actually persisted to disk.
  virtual void PrepareEphemeralVault(
      const ::user_data_auth::PrepareEphemeralVaultRequest& request,
      PrepareEphemeralVaultCallback callback) = 0;

  // This will create user directories needed to store
  // keys and download policies. This will usually be called when a new user is
  // registering.
  virtual void CreatePersistentUser(
      const ::user_data_auth::CreatePersistentUserRequest& request,
      CreatePersistentUserCallback callback) = 0;

  // This makes available user directories for them to use.
  virtual void PreparePersistentVault(
      const ::user_data_auth::PreparePersistentVaultRequest& request,
      PreparePersistentVaultCallback callback) = 0;

  // Makes user directory available for migration.
  virtual void PrepareVaultForMigration(
      const ::user_data_auth::PrepareVaultForMigrationRequest& request,
      PrepareVaultForMigrationCallback callback) = 0;

  // This call is used to invalidate an AuthSession
  // once the need for one no longer exists.
  virtual void InvalidateAuthSession(
      const ::user_data_auth::InvalidateAuthSessionRequest& request,
      InvalidateAuthSessionCallback callback) = 0;

  // This call is used to extend the duration of
  //  AuthSession that it should be valid for.
  virtual void ExtendAuthSession(
      const ::user_data_auth::ExtendAuthSessionRequest& request,
      ExtendAuthSessionCallback callback) = 0;

  // This call adds an AuthFactor for a user. The call goes
  // through an authenticated AuthSession.
  virtual void AddAuthFactor(
      const ::user_data_auth::AddAuthFactorRequest& request,
      AddAuthFactorCallback callback) = 0;

  // This will Authenticate an existing AuthFactor.
  // This call will authenticate an AuthSession.
  virtual void AuthenticateAuthFactor(
      const ::user_data_auth::AuthenticateAuthFactorRequest& request,
      AuthenticateAuthFactorCallback callback) = 0;

  // This call will be used in the case of a user wanting
  // to update an AuthFactor. (E.g. Changing pin or password).
  virtual void UpdateAuthFactor(
      const ::user_data_auth::UpdateAuthFactorRequest& request,
      UpdateAuthFactorCallback callback) = 0;

  // This call will be used in the case of a user wanting
  // to update an AuthFactor's metadata. (E.g. Changing the user specified
  // name).
  virtual void UpdateAuthFactorMetadata(
      const ::user_data_auth::UpdateAuthFactorMetadataRequest& request,
      UpdateAuthFactorMetadataCallback callback) = 0;

  // This call will be used in the case of a user wanting to remove an existing
  // Authfactor and add a new one to replace it. (E.g. Changing to local
  // password from Gaia password).
  virtual void ReplaceAuthFactor(
      const ::user_data_auth::ReplaceAuthFactorRequest& request,
      ReplaceAuthFactorCallback callback) = 0;

  // This is called when a user wants to remove an
  // AuthFactor.
  virtual void RemoveAuthFactor(
      const ::user_data_auth::RemoveAuthFactorRequest& request,
      RemoveAuthFactorCallback callback) = 0;

  // This is called to determine all configured AuthFactors as well as supported
  // AuthFactors whenever AuthFactors-based API is used.
  virtual void ListAuthFactors(
      const ::user_data_auth::ListAuthFactorsRequest& request,
      ListAuthFactorsCallback callback) = 0;

  // This is called to get AuthFactor for given label along with optional
  // extended info.
  virtual void GetAuthFactorExtendedInfo(
      const ::user_data_auth::GetAuthFactorExtendedInfoRequest& request,
      GetAuthFactorExtendedInfoCallback callback) = 0;

  // This is called when a user wants to get an AuthSession status.
  virtual void GetAuthSessionStatus(
      const ::user_data_auth::GetAuthSessionStatusRequest& request,
      GetAuthSessionStatusCallback callback) = 0;

  // This is called to enable asynchronous auth factors (like Fingerprint).
  // Note that caller needs to add PrepareAuthFactorProgressObserver before this
  // call.
  virtual void PrepareAuthFactor(
      const ::user_data_auth::PrepareAuthFactorRequest& request,
      PrepareAuthFactorCallback callback) = 0;

  // Counterpart for `PrepareAuthFactor`, method is called to disable particular
  // asynchronous auth factor (like Fingerprint).
  // Note that caller needs to remove PrepareAuthFactorProgressObserver after
  // this call.
  virtual void TerminateAuthFactor(
      const ::user_data_auth::TerminateAuthFactorRequest& request,
      TerminateAuthFactorCallback callback) = 0;

  // Retrieve the ARC-related disk features supported.
  virtual void GetArcDiskFeatures(
      const ::user_data_auth::GetArcDiskFeaturesRequest& request,
      GetArcDiskFeaturesCallback callback) = 0;

  // Retrieve LSKF-wrapped key material for upload to a remote recovery service.
  virtual void GetRecoverableKeyStores(
      const ::user_data_auth::GetRecoverableKeyStoresRequest& request,
      GetRecoverableKeyStoresCallback callback) = 0;

  // Enable/disable write access permissions to MyFiles directory.
  virtual void SetUserDataStorageWriteEnabled(
      const ::user_data_auth::SetUserDataStorageWriteEnabledRequest& request,
      SetUserDataStorageWriteEnabledCallback callback) = 0;

  // Initiates a Cryptohome lock on the provided authentication factor type,
  // persisting until device reboot.
  // NOTE: The `LockFactorUntilRebootRequest` is only implemented for
  // `AUTH_FACTOR_TYPE_CRYPTOHOME_RECOVERY`.
  virtual void LockFactorUntilReboot(
      const ::user_data_auth::LockFactorUntilRebootRequest& request,
      LockFactorUntilRebootCallback callback) = 0;

 protected:
  // Initialize/Shutdown should be used instead.
  UserDataAuthClient();
  virtual ~UserDataAuthClient();
};

}  // namespace ash

namespace base {

template <>
struct ScopedObservationTraits<
    ash::UserDataAuthClient,
    ash::UserDataAuthClient::FingerprintAuthObserver> {
  static void AddObserver(
      ash::UserDataAuthClient* source,
      ash::UserDataAuthClient::FingerprintAuthObserver* observer) {
    source->AddFingerprintAuthObserver(observer);
  }
  static void RemoveObserver(
      ash::UserDataAuthClient* source,
      ash::UserDataAuthClient::FingerprintAuthObserver* observer) {
    source->RemoveFingerprintAuthObserver(observer);
  }
};

}  // namespace base

#endif  // CHROMEOS_ASH_COMPONENTS_DBUS_USERDATAAUTH_USERDATAAUTH_CLIENT_H_