1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
|
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "remoting/protocol/session_authz_reauthorizer.h"
#include <memory>
#include "base/check.h"
#include "base/functional/bind.h"
#include "base/location.h"
#include "base/logging.h"
#include "base/strings/stringprintf.h"
#include "base/time/time.h"
#include "net/base/backoff_entry.h"
#include "remoting/base/logging.h"
#include "remoting/proto/session_authz_service.h"
#include "remoting/protocol/errors.h"
#include "remoting/protocol/session.h"
namespace remoting::protocol {
SessionAuthzReauthorizer::SessionAuthzReauthorizer(
SessionAuthzServiceClient* service_client,
std::string_view session_id,
std::string_view session_reauth_token,
base::TimeDelta session_reauth_token_lifetime,
OnReauthorizationFailedCallback on_reauthorization_failed)
: service_client_(service_client),
session_id_(session_id),
session_reauth_token_(session_reauth_token),
token_expire_time_(base::TimeTicks::Now() +
session_reauth_token_lifetime),
on_reauthorization_failed_(std::move(on_reauthorization_failed)) {}
SessionAuthzReauthorizer::~SessionAuthzReauthorizer() = default;
void SessionAuthzReauthorizer::Start() {
HOST_LOG << "SessionAuthz reauthorizer has started.";
ScheduleNextReauth();
}
void SessionAuthzReauthorizer::ScheduleNextReauth() {
base::TimeDelta next_reauth_interval =
(token_expire_time_ - base::TimeTicks::Now()) / 2;
reauthorize_timer_.Start(FROM_HERE, next_reauth_interval, this,
&SessionAuthzReauthorizer::Reauthorize);
HOST_LOG << "Next reauthorization scheduled in " << next_reauth_interval;
}
void SessionAuthzReauthorizer::Reauthorize() {
HOST_LOG << "Reauthorizing session...";
service_client_->ReauthorizeHost(
session_reauth_token_, session_id_, token_expire_time_,
base::BindOnce(&SessionAuthzReauthorizer::OnReauthorizeResult,
base::Unretained(this)));
}
void SessionAuthzReauthorizer::OnReauthorizeResult(
const HttpStatus& status,
std::unique_ptr<internal::ReauthorizeHostResponseStruct> response) {
if (!status.ok()) {
Authenticator::RejectionDetails rejection_details(base::StringPrintf(
"SessionAuthz reauthorization failed with error. Code: %d Message: %s",
static_cast<int>(status.error_code()), status.error_message()));
NotifyReauthorizationFailed(status.error_code(), rejection_details);
return;
}
DCHECK(response->session_reauth_token_lifetime.is_positive());
session_reauth_token_ = response->session_reauth_token;
token_expire_time_ =
base::TimeTicks::Now() + response->session_reauth_token_lifetime;
VLOG(1) << "SessionAuthz reauthorization succeeded.";
ScheduleNextReauth();
}
void SessionAuthzReauthorizer::NotifyReauthorizationFailed(
HttpStatus::Code error_code,
const Authenticator::RejectionDetails& details) {
// Make sure the callback causes the reauthorizer to be destroyed (which
// implies the session is closed). Otherwise, crash the process.
reauthorize_timer_.Start(
FROM_HERE, base::Seconds(30), base::BindOnce([]() {
LOG(FATAL) << "SessionAuthzReauthorizer is still alive after the "
<< "reauthorization failure has been notified.";
}));
std::move(on_reauthorization_failed_).Run(error_code, details);
}
} // namespace remoting::protocol
|