| // Copyright 2014 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "buffet/manager.h" |
| |
| #include <map> |
| #include <set> |
| #include <string> |
| |
| #include <base/bind.h> |
| #include <base/bind_helpers.h> |
| #include <base/json/json_reader.h> |
| #include <base/json/json_writer.h> |
| #include <base/time/time.h> |
| #include <chromeos/dbus/async_event_sequencer.h> |
| #include <chromeos/dbus/exported_object_manager.h> |
| #include <chromeos/errors/error.h> |
| #include <chromeos/http/http_transport.h> |
| #include <chromeos/key_value_store.h> |
| #include <dbus/bus.h> |
| #include <dbus/object_path.h> |
| #include <dbus/values_util.h> |
| |
| #include "buffet/base_api_handler.h" |
| #include "buffet/commands/command_instance.h" |
| #include "buffet/commands/schema_constants.h" |
| #include "buffet/privet/constants.h" |
| #include "buffet/privet/security_manager.h" |
| #include "buffet/privet/wifi_bootstrap_manager.h" |
| #include "buffet/states/state_change_queue.h" |
| #include "buffet/states/state_manager.h" |
| #include "buffet/storage_impls.h" |
| |
| using chromeos::dbus_utils::AsyncEventSequencer; |
| using chromeos::dbus_utils::ExportedObjectManager; |
| |
| namespace buffet { |
| |
| namespace { |
| |
| // Max of 100 state update events should be enough in the queue. |
| const size_t kMaxStateChangeQueueSize = 100; |
| // The number of seconds each HTTP request will be allowed before timing out. |
| const int kRequestTimeoutSeconds = 30; |
| |
| const char kPairingSessionIdKey[] = "sessionId"; |
| const char kPairingModeKey[] = "mode"; |
| const char kPairingCodeKey[] = "code"; |
| |
| } // anonymous namespace |
| |
| Manager::Manager(const base::WeakPtr<ExportedObjectManager>& object_manager) |
| : dbus_object_(object_manager.get(), |
| object_manager->GetBus(), |
| org::chromium::Buffet::ManagerAdaptor::GetObjectPath()) { |
| } |
| |
| Manager::~Manager() { |
| } |
| |
| void Manager::Start(const Options& options, AsyncEventSequencer* sequencer) { |
| command_manager_ = |
| std::make_shared<CommandManager>(dbus_object_.GetObjectManager()); |
| command_manager_->AddOnCommandDefChanged(base::Bind( |
| &Manager::OnCommandDefsChanged, weak_ptr_factory_.GetWeakPtr())); |
| command_manager_->Startup(base::FilePath{"/etc/buffet"}, |
| options.test_definitions_path); |
| state_change_queue_.reset(new StateChangeQueue(kMaxStateChangeQueueSize)); |
| state_manager_ = std::make_shared<StateManager>(state_change_queue_.get()); |
| state_manager_->AddOnChangedCallback( |
| base::Bind(&Manager::OnStateChanged, weak_ptr_factory_.GetWeakPtr())); |
| state_manager_->Startup(); |
| |
| std::unique_ptr<BuffetConfig> config{new BuffetConfig{options.state_path}}; |
| config->AddOnChangedCallback( |
| base::Bind(&Manager::OnConfigChanged, weak_ptr_factory_.GetWeakPtr())); |
| config->Load(options.config_path); |
| |
| auto transport = chromeos::http::Transport::CreateDefault(); |
| transport->SetDefaultTimeout(base::TimeDelta::FromSeconds( |
| kRequestTimeoutSeconds)); |
| |
| // TODO(avakulenko): Figure out security implications of storing |
| // device info state data unencrypted. |
| device_info_.reset(new DeviceRegistrationInfo( |
| command_manager_, state_manager_, std::move(config), transport, |
| options.xmpp_enabled)); |
| device_info_->AddOnRegistrationChangedCallback(base::Bind( |
| &Manager::OnRegistrationChanged, weak_ptr_factory_.GetWeakPtr())); |
| |
| base_api_handler_.reset(new BaseApiHandler{ |
| device_info_->AsWeakPtr(), state_manager_, command_manager_}); |
| |
| device_info_->Start(); |
| |
| dbus_adaptor_.RegisterWithDBusObject(&dbus_object_); |
| dbus_object_.RegisterAsync( |
| sequencer->GetHandler("Manager.RegisterAsync() failed.", true)); |
| |
| if (!options.privet.disable_privet) |
| StartPrivet(options.privet, sequencer); |
| } |
| |
| void Manager::StartPrivet(const privetd::Manager::Options& options, |
| AsyncEventSequencer* sequencer) { |
| privet_.reset(new privetd::Manager{}); |
| privet_->Start(options, dbus_object_.GetBus(), device_info_.get(), |
| command_manager_.get(), state_manager_.get(), sequencer); |
| |
| if (privet_->GetWifiBootstrapManager()) { |
| privet_->GetWifiBootstrapManager()->RegisterStateListener(base::Bind( |
| &Manager::UpdateWiFiBootstrapState, weak_ptr_factory_.GetWeakPtr())); |
| } else { |
| UpdateWiFiBootstrapState(privetd::WifiBootstrapManager::kDisabled); |
| } |
| |
| privet_->GetSecurityManager()->RegisterPairingListeners( |
| base::Bind(&Manager::OnPairingStart, weak_ptr_factory_.GetWeakPtr()), |
| base::Bind(&Manager::OnPairingEnd, weak_ptr_factory_.GetWeakPtr())); |
| // TODO(wiley) Watch for appropriate state variables from |cloud_delegate|. |
| } |
| |
| void Manager::Stop() { |
| if (privet_) |
| privet_->OnShutdown(); |
| } |
| |
| void Manager::CheckDeviceRegistered(DBusMethodResponse<std::string> response) { |
| LOG(INFO) << "Received call to Manager.CheckDeviceRegistered()"; |
| chromeos::ErrorPtr error; |
| bool registered = device_info_->HaveRegistrationCredentials(&error); |
| // If it fails due to any reason other than 'device not registered', |
| // treat it as a real error and report it to the caller. |
| if (!registered && |
| !error->HasError(kErrorDomainGCD, "device_not_registered")) { |
| response->ReplyWithError(error.get()); |
| return; |
| } |
| |
| response->Return(registered ? device_info_->GetConfig().device_id() |
| : std::string()); |
| } |
| |
| void Manager::GetDeviceInfo(DBusMethodResponse<std::string> response) { |
| LOG(INFO) << "Received call to Manager.GetDeviceInfo()"; |
| |
| chromeos::ErrorPtr error; |
| auto device_info = device_info_->GetDeviceInfo(&error); |
| if (!device_info) { |
| response->ReplyWithError(error.get()); |
| return; |
| } |
| |
| std::string device_info_str; |
| base::JSONWriter::WriteWithOptions(device_info.get(), |
| base::JSONWriter::OPTIONS_PRETTY_PRINT, &device_info_str); |
| response->Return(device_info_str); |
| } |
| |
| void Manager::RegisterDevice(DBusMethodResponse<std::string> response, |
| const std::string& ticket_id) { |
| LOG(INFO) << "Received call to Manager.RegisterDevice()"; |
| |
| chromeos::ErrorPtr error; |
| std::string device_id = device_info_->RegisterDevice(ticket_id, &error); |
| if (!device_id.empty()) { |
| response->Return(device_id); |
| return; |
| } |
| if (!error) { |
| // TODO(zeuthen): This can be changed to CHECK(error) once |
| // RegisterDevice() has been fixed to set |error| when failing. |
| chromeos::Error::AddTo(&error, FROM_HERE, kErrorDomainGCD, "internal_error", |
| "device_id empty but error not set"); |
| } |
| response->ReplyWithError(error.get()); |
| } |
| |
| void Manager::UpdateState(DBusMethodResponse<> response, |
| const chromeos::VariantDictionary& property_set) { |
| chromeos::ErrorPtr error; |
| if (!state_manager_->SetProperties(property_set, &error)) |
| response->ReplyWithError(error.get()); |
| else |
| response->Return(); |
| } |
| |
| bool Manager::GetState(chromeos::ErrorPtr* error, std::string* state) { |
| auto json = state_manager_->GetStateValuesAsJson(error); |
| if (!json) |
| return false; |
| base::JSONWriter::WriteWithOptions( |
| json.get(), base::JSONWriter::OPTIONS_PRETTY_PRINT, state); |
| return true; |
| } |
| |
| void Manager::AddCommand(DBusMethodResponse<std::string> response, |
| const std::string& json_command, |
| const std::string& in_user_role) { |
| std::string error_message; |
| std::unique_ptr<base::Value> value(base::JSONReader::ReadAndReturnError( |
| json_command, base::JSON_PARSE_RFC, nullptr, &error_message)); |
| const base::DictionaryValue* command{nullptr}; |
| if (!value || !value->GetAsDictionary(&command)) { |
| return response->ReplyWithError(FROM_HERE, chromeos::errors::json::kDomain, |
| chromeos::errors::json::kParseError, |
| error_message); |
| } |
| |
| chromeos::ErrorPtr error; |
| UserRole role; |
| if (!FromString(in_user_role, &role, &error)) |
| return response->ReplyWithError(error.get()); |
| |
| std::string id; |
| if (!command_manager_->AddCommand(*command, role, &id, &error)) |
| return response->ReplyWithError(error.get()); |
| |
| response->Return(id); |
| } |
| |
| void Manager::GetCommand(DBusMethodResponse<std::string> response, |
| const std::string& id) { |
| const CommandInstance* command = command_manager_->FindCommand(id); |
| if (!command) { |
| response->ReplyWithError(FROM_HERE, kErrorDomainGCD, "unknown_command", |
| "Can't find command with id: " + id); |
| return; |
| } |
| std::string command_str; |
| base::JSONWriter::WriteWithOptions(command->ToJson().get(), |
| base::JSONWriter::OPTIONS_PRETTY_PRINT, &command_str); |
| response->Return(command_str); |
| } |
| |
| void Manager::SetCommandVisibility( |
| std::unique_ptr<chromeos::dbus_utils::DBusMethodResponse<>> response, |
| const std::vector<std::string>& in_names, |
| const std::string& in_visibility) { |
| CommandDefinition::Visibility visibility; |
| chromeos::ErrorPtr error; |
| if (!visibility.FromString(in_visibility, &error)) { |
| response->ReplyWithError(error.get()); |
| return; |
| } |
| if (!command_manager_->SetCommandVisibility(in_names, visibility, &error)) { |
| response->ReplyWithError(error.get()); |
| return; |
| } |
| response->Return(); |
| } |
| |
| std::string Manager::TestMethod(const std::string& message) { |
| LOG(INFO) << "Received call to test method: " << message; |
| return message; |
| } |
| |
| bool Manager::EnableWiFiBootstrapping( |
| chromeos::ErrorPtr* error, |
| const dbus::ObjectPath& in_listener_path, |
| const chromeos::VariantDictionary& in_options) { |
| chromeos::Error::AddTo(error, FROM_HERE, privetd::errors::kDomain, |
| privetd::errors::kNotImplemented, |
| "Manual WiFi bootstrapping is not implemented"); |
| return false; |
| } |
| |
| bool Manager::DisableWiFiBootstrapping(chromeos::ErrorPtr* error) { |
| chromeos::Error::AddTo(error, FROM_HERE, privetd::errors::kDomain, |
| privetd::errors::kNotImplemented, |
| "Manual WiFi bootstrapping is not implemented"); |
| return false; |
| } |
| |
| bool Manager::EnableGCDBootstrapping( |
| chromeos::ErrorPtr* error, |
| const dbus::ObjectPath& in_listener_path, |
| const chromeos::VariantDictionary& in_options) { |
| chromeos::Error::AddTo(error, FROM_HERE, privetd::errors::kDomain, |
| privetd::errors::kNotImplemented, |
| "Manual GCD bootstrapping is not implemented"); |
| return false; |
| } |
| |
| bool Manager::DisableGCDBootstrapping(chromeos::ErrorPtr* error) { |
| chromeos::Error::AddTo(error, FROM_HERE, privetd::errors::kDomain, |
| privetd::errors::kNotImplemented, |
| "Manual GCD bootstrapping is not implemented"); |
| return false; |
| } |
| |
| bool Manager::UpdateDeviceInfo(chromeos::ErrorPtr* error, |
| const std::string& in_name, |
| const std::string& in_description, |
| const std::string& in_location) { |
| return device_info_->UpdateDeviceInfo(in_name, in_description, in_location, |
| error); |
| } |
| |
| bool Manager::UpdateServiceConfig(chromeos::ErrorPtr* error, |
| const std::string& client_id, |
| const std::string& client_secret, |
| const std::string& api_key, |
| const std::string& oauth_url, |
| const std::string& service_url) { |
| return device_info_->UpdateServiceConfig(client_id, client_secret, api_key, |
| oauth_url, service_url, error); |
| } |
| |
| void Manager::OnCommandDefsChanged() { |
| // Limit only to commands that are visible to the local clients. |
| auto commands = command_manager_->GetCommandDictionary().GetCommandsAsJson( |
| [](const buffet::CommandDefinition* def) { |
| return def->GetVisibility().local; |
| }, true, nullptr); |
| CHECK(commands); |
| std::string json; |
| base::JSONWriter::WriteWithOptions(commands.get(), |
| base::JSONWriter::OPTIONS_PRETTY_PRINT, &json); |
| dbus_adaptor_.SetCommandDefs(json); |
| } |
| |
| void Manager::OnStateChanged() { |
| auto state = state_manager_->GetStateValuesAsJson(nullptr); |
| CHECK(state); |
| std::string json; |
| base::JSONWriter::WriteWithOptions( |
| state.get(), base::JSONWriter::OPTIONS_PRETTY_PRINT, &json); |
| dbus_adaptor_.SetState(json); |
| } |
| |
| void Manager::OnRegistrationChanged(RegistrationStatus status) { |
| dbus_adaptor_.SetStatus(StatusToString(status)); |
| } |
| |
| void Manager::OnConfigChanged(const BuffetConfig& config) { |
| dbus_adaptor_.SetDeviceId(config.device_id()); |
| dbus_adaptor_.SetOemName(config.oem_name()); |
| dbus_adaptor_.SetModelName(config.model_name()); |
| dbus_adaptor_.SetModelId(config.model_id()); |
| dbus_adaptor_.SetName(config.name()); |
| dbus_adaptor_.SetDescription(config.description()); |
| dbus_adaptor_.SetLocation(config.location()); |
| dbus_adaptor_.SetAnonymousAccessRole(config.local_anonymous_access_role()); |
| } |
| |
| void Manager::UpdateWiFiBootstrapState( |
| privetd::WifiBootstrapManager::State state) { |
| switch (state) { |
| case privetd::WifiBootstrapManager::kDisabled: |
| dbus_adaptor_.SetWiFiBootstrapState("disabled"); |
| break; |
| case privetd::WifiBootstrapManager::kBootstrapping: |
| dbus_adaptor_.SetWiFiBootstrapState("waiting"); |
| break; |
| case privetd::WifiBootstrapManager::kMonitoring: |
| dbus_adaptor_.SetWiFiBootstrapState("monitoring"); |
| break; |
| case privetd::WifiBootstrapManager::kConnecting: |
| dbus_adaptor_.SetWiFiBootstrapState("connecting"); |
| break; |
| } |
| } |
| |
| void Manager::OnPairingStart(const std::string& session_id, |
| privetd::PairingType pairing_type, |
| const std::vector<uint8_t>& code) { |
| // For now, just overwrite the exposed PairInfo with |
| // the most recent pairing attempt. |
| dbus_adaptor_.SetPairingInfo(chromeos::VariantDictionary{ |
| {kPairingSessionIdKey, session_id}, |
| {kPairingModeKey, PairingTypeToString(pairing_type)}, |
| {kPairingCodeKey, code}, |
| }); |
| } |
| |
| void Manager::OnPairingEnd(const std::string& session_id) { |
| auto exposed_pairing_attempt = dbus_adaptor_.GetPairingInfo(); |
| auto it = exposed_pairing_attempt.find(kPairingSessionIdKey); |
| if (it == exposed_pairing_attempt.end()) { |
| return; |
| } |
| std::string exposed_session{it->second.TryGet<std::string>()}; |
| if (exposed_session == session_id) { |
| dbus_adaptor_.SetPairingInfo(chromeos::VariantDictionary{}); |
| } |
| } |
| |
| } // namespace buffet |