File: session_authz_reauthorizer.cc

package info (click to toggle)
chromium 138.0.7204.183-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 6,071,908 kB
  • sloc: cpp: 34,937,088; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,953; asm: 946,768; xml: 739,971; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,806; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (142 lines) | stat: -rw-r--r-- 5,172 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "remoting/protocol/session_authz_reauthorizer.h"

#include <memory>

#include "base/check.h"
#include "base/functional/bind.h"
#include "base/location.h"
#include "base/logging.h"
#include "base/strings/stringprintf.h"
#include "base/time/time.h"
#include "net/base/backoff_entry.h"
#include "remoting/base/logging.h"
#include "remoting/proto/session_authz_service.h"
#include "remoting/protocol/errors.h"
#include "remoting/protocol/session.h"

namespace remoting::protocol {
namespace {

constexpr net::BackoffEntry::Policy kBackoffPolicy = {
    .num_errors_to_ignore = 0,
    .initial_delay_ms = base::Seconds(5).InMilliseconds(),
    .multiply_factor = 2,
    .jitter_factor = 0.5,
    .maximum_backoff_ms = base::Minutes(1).InMilliseconds(),
    .entry_lifetime_ms = -1,  // never discard.
    // InformOfRequest() is called before the retry task is scheduled, so the
    // initial delay is technically used.
    .always_use_initial_delay = false,
};

bool IsRetriableError(HttpStatus::Code code) {
  DCHECK_NE(code, HttpStatus::Code::OK);
  switch (code) {
    case HttpStatus::Code::ABORTED:
    case HttpStatus::Code::UNAVAILABLE:
    case HttpStatus::Code::NETWORK_ERROR:
    case HttpStatus::Code::UNKNOWN:
      return true;
    default:
      return false;
  }
}

}  // namespace

SessionAuthzReauthorizer::SessionAuthzReauthorizer(
    SessionAuthzServiceClient* service_client,
    std::string_view session_id,
    std::string_view session_reauth_token,
    base::TimeDelta session_reauth_token_lifetime,
    OnReauthorizationFailedCallback on_reauthorization_failed)
    : service_client_(service_client),
      session_id_(session_id),
      session_reauth_token_(session_reauth_token),
      token_expire_time_(base::TimeTicks::Now() +
                         session_reauth_token_lifetime),
      on_reauthorization_failed_(std::move(on_reauthorization_failed)) {}

SessionAuthzReauthorizer::~SessionAuthzReauthorizer() = default;

void SessionAuthzReauthorizer::Start() {
  HOST_LOG << "SessionAuthz reauthorizer has started.";
  ScheduleNextReauth();
}

const net::BackoffEntry* SessionAuthzReauthorizer::GetBackoffEntryForTest()
    const {
  return backoff_entry_.get();
}

void SessionAuthzReauthorizer::ScheduleNextReauth() {
  base::TimeDelta next_reauth_interval =
      backoff_entry_ ? backoff_entry_->GetTimeUntilRelease()
                     : (token_expire_time_ - base::TimeTicks::Now()) / 2;
  reauthorize_timer_.Start(FROM_HERE, next_reauth_interval, this,
                           &SessionAuthzReauthorizer::Reauthorize);
  HOST_LOG << "Next reauthorization scheduled in " << next_reauth_interval;
}

void SessionAuthzReauthorizer::Reauthorize() {
  HOST_LOG << "Reauthorizing session...";
  service_client_->ReauthorizeHost(
      session_reauth_token_, session_id_,
      base::BindOnce(&SessionAuthzReauthorizer::OnReauthorizeResult,
                     base::Unretained(this)));
}

void SessionAuthzReauthorizer::OnReauthorizeResult(
    const HttpStatus& status,
    std::unique_ptr<internal::ReauthorizeHostResponseStruct> response) {
  if (!status.ok()) {
    Authenticator::RejectionDetails rejection_details(base::StringPrintf(
        "SessionAuthz reauthorization failed with error. Code: %d Message: %s",
        static_cast<int>(status.error_code()), status.error_message()));
    if (!IsRetriableError(status.error_code())) {
      LOG(ERROR) << "Error is non-retriable. Closing the session.";
      NotifyReauthorizationFailed(status.error_code(), rejection_details);
      return;
    }
    if (!backoff_entry_) {
      backoff_entry_ = std::make_unique<net::BackoffEntry>(&kBackoffPolicy);
    }
    backoff_entry_->InformOfRequest(false);
    // Add some leeway to account for network latencies.
    if (backoff_entry_->GetReleaseTime() >
        (token_expire_time_ - base::Seconds(5))) {
      LOG(ERROR) << "No more retries remaining. Closing the session.";
      NotifyReauthorizationFailed(status.error_code(), rejection_details);
      return;
    }
    ScheduleNextReauth();
    return;
  }

  DCHECK(response->session_reauth_token_lifetime.is_positive());
  backoff_entry_.reset();
  session_reauth_token_ = response->session_reauth_token;
  token_expire_time_ =
      base::TimeTicks::Now() + response->session_reauth_token_lifetime;
  VLOG(1) << "SessionAuthz reauthorization succeeded.";
  ScheduleNextReauth();
}

void SessionAuthzReauthorizer::NotifyReauthorizationFailed(
    HttpStatus::Code error_code,
    const Authenticator::RejectionDetails& details) {
  // Make sure the callback causes the reauthorizer to be destroyed (which
  // implies the session is closed). Otherwise, crash the process.
  reauthorize_timer_.Start(
      FROM_HERE, base::Seconds(30), base::BindOnce([]() {
        LOG(FATAL) << "SessionAuthzReauthorizer is still alive after the "
                   << "reauthorization failure has been notified.";
      }));
  std::move(on_reauthorization_failed_).Run(error_code, details);
}

}  // namespace remoting::protocol