| // Copyright 2020 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| #include "system-proxy/system_proxy_adaptor.h" |
| |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include <base/location.h> |
| #include <base/time/time.h> |
| #include <brillo/dbus/dbus_object.h> |
| #include <brillo/message_loops/message_loop.h> |
| #include <chromeos/dbus/service_constants.h> |
| #include <chromeos/patchpanel/client.h> |
| #include <dbus/object_proxy.h> |
| |
| #include "system-proxy/kerberos_client.h" |
| #include "system_proxy/proto_bindings/system_proxy_service.pb.h" |
| #include "system-proxy/sandboxed_worker.h" |
| |
| namespace system_proxy { |
| namespace { |
| |
| constexpr int kProxyPort = 3128; |
| constexpr char kNoCredentialsSpecifiedError[] = |
| "No authentication credentials specified"; |
| constexpr char kOnlySystemTrafficSupportedError[] = |
| "Only system services traffic is currenly supported"; |
| constexpr char kFailedToStartWorkerError[] = "Failed to start worker process"; |
| // Time delay for calling patchpanel::ConnectNamespace(). Patchpanel needs to |
| // enter the network namespace of the worker process to configure it and fails |
| // if it's soon after the process starts. See https://crbug.com/1095170 for |
| // details. |
| constexpr base::TimeDelta kConnectNamespaceDelay = |
| base::TimeDelta::FromSeconds(1); |
| constexpr int kNetworkNamespaceReconnectAttempts = 3; |
| |
| // Serializes |proto| to a vector of bytes. |
| std::vector<uint8_t> SerializeProto( |
| const google::protobuf::MessageLite& proto) { |
| std::vector<uint8_t> proto_blob(proto.ByteSizeLong()); |
| bool result = proto.SerializeToArray(proto_blob.data(), proto_blob.size()); |
| DCHECK(result); |
| return proto_blob; |
| } |
| |
| // Parses a proto from an array of bytes |proto_blob|. Returns |
| // ERROR_PARSE_REQUEST_FAILED on error. |
| std::string DeserializeProto(const base::Location& from_here, |
| google::protobuf::MessageLite* proto, |
| const std::vector<uint8_t>& proto_blob) { |
| if (!proto->ParseFromArray(proto_blob.data(), proto_blob.size())) { |
| const std::string error_message = "Failed to parse proto message."; |
| LOG(ERROR) << from_here.ToString() << error_message; |
| return error_message; |
| } |
| return ""; |
| } |
| } // namespace |
| |
| SystemProxyAdaptor::SystemProxyAdaptor( |
| std::unique_ptr<brillo::dbus_utils::DBusObject> dbus_object) |
| : org::chromium::SystemProxyAdaptor(this), |
| netns_reconnect_attempts_available_(kNetworkNamespaceReconnectAttempts), |
| dbus_object_(std::move(dbus_object)), |
| weak_ptr_factory_(this) { |
| kerberos_client_ = std::make_unique<KerberosClient>(dbus_object_->GetBus()); |
| } |
| |
| SystemProxyAdaptor::~SystemProxyAdaptor() = default; |
| |
| void SystemProxyAdaptor::RegisterAsync( |
| const brillo::dbus_utils::AsyncEventSequencer::CompletionAction& |
| completion_callback) { |
| RegisterWithDBusObject(dbus_object_.get()); |
| dbus_object_->RegisterAsync(completion_callback); |
| } |
| |
| std::vector<uint8_t> SystemProxyAdaptor::SetAuthenticationDetails( |
| const std::vector<uint8_t>& request_blob) { |
| LOG(INFO) << "Received set authentication details request."; |
| |
| SetAuthenticationDetailsRequest request; |
| const std::string error_message = |
| DeserializeProto(FROM_HERE, &request, request_blob); |
| |
| SetAuthenticationDetailsResponse response; |
| if (!error_message.empty()) { |
| response.set_error_message(error_message); |
| return SerializeProto(response); |
| } |
| |
| if (!request.has_credentials() && !request.has_kerberos_enabled()) { |
| response.set_error_message(kNoCredentialsSpecifiedError); |
| return SerializeProto(response); |
| } |
| |
| if (request.traffic_type() != TrafficOrigin::SYSTEM) { |
| response.set_error_message(kOnlySystemTrafficSupportedError); |
| return SerializeProto(response); |
| } |
| |
| if (!CreateWorkerIfNeeded(/* user_traffic */ false)) { |
| response.set_error_message(kFailedToStartWorkerError); |
| return SerializeProto(response); |
| } |
| |
| if (request.has_credentials()) { |
| if (!request.credentials().has_username() || |
| !request.credentials().has_password()) { |
| response.set_error_message(kNoCredentialsSpecifiedError); |
| return SerializeProto(response); |
| } |
| brillo::MessageLoop::current()->PostTask( |
| FROM_HERE, base::Bind(&SystemProxyAdaptor::SetCredentialsTask, |
| weak_ptr_factory_.GetWeakPtr(), |
| system_services_worker_.get(), |
| request.credentials().username(), |
| request.credentials().password())); |
| } |
| |
| if (request.has_kerberos_enabled()) { |
| std::string principal_name = request.has_active_principal_name() |
| ? request.active_principal_name() |
| : std::string(); |
| |
| brillo::MessageLoop::current()->PostTask( |
| FROM_HERE, base::Bind(&SystemProxyAdaptor::SetKerberosEnabledTask, |
| weak_ptr_factory_.GetWeakPtr(), |
| system_services_worker_.get(), |
| request.kerberos_enabled(), principal_name)); |
| } |
| |
| return SerializeProto(response); |
| } |
| |
| std::vector<uint8_t> SystemProxyAdaptor::SetSystemTrafficCredentials( |
| const std::vector<uint8_t>& request_blob) { |
| LOG(INFO) << "Received set credentials request."; |
| |
| SetSystemTrafficCredentialsRequest request; |
| const std::string error_message = |
| DeserializeProto(FROM_HERE, &request, request_blob); |
| |
| SetSystemTrafficCredentialsResponse response; |
| if (!error_message.empty()) { |
| response.set_error_message(error_message); |
| return SerializeProto(response); |
| } |
| |
| if (!request.has_system_services_username() || |
| !request.has_system_services_password()) { |
| response.set_error_message(kNoCredentialsSpecifiedError); |
| return SerializeProto(response); |
| } |
| |
| if (!CreateWorkerIfNeeded(/* user_traffic */ false)) { |
| response.set_error_message(kFailedToStartWorkerError); |
| return SerializeProto(response); |
| } |
| |
| brillo::MessageLoop::current()->PostTask( |
| FROM_HERE, |
| base::Bind(&SystemProxyAdaptor::SetCredentialsTask, |
| weak_ptr_factory_.GetWeakPtr(), system_services_worker_.get(), |
| request.system_services_username(), |
| request.system_services_password())); |
| |
| return SerializeProto(response); |
| } |
| |
| std::vector<uint8_t> SystemProxyAdaptor::ShutDown() { |
| LOG(INFO) << "Received shutdown request."; |
| |
| std::string error_message; |
| if (system_services_worker_ && system_services_worker_->IsRunning()) { |
| if (!system_services_worker_->Stop()) |
| error_message = |
| "Failure to terminate worker process for system services traffic."; |
| } |
| |
| if (arc_worker_ && arc_worker_->IsRunning()) { |
| if (!arc_worker_->Stop()) |
| error_message += "Failure to terminate worker process for arc traffic."; |
| } |
| |
| ShutDownResponse response; |
| if (!error_message.empty()) |
| response.set_error_message(error_message); |
| |
| brillo::MessageLoop::current()->PostTask( |
| FROM_HERE, base::Bind(&SystemProxyAdaptor::ShutDownTask, |
| weak_ptr_factory_.GetWeakPtr())); |
| |
| return SerializeProto(response); |
| } |
| |
| void SystemProxyAdaptor::GetChromeProxyServersAsync( |
| const std::string& target_url, |
| const brillo::http::GetChromeProxyServersCallback& callback) { |
| brillo::http::GetChromeProxyServersAsync(dbus_object_->GetBus(), target_url, |
| move(callback)); |
| } |
| |
| std::unique_ptr<SandboxedWorker> SystemProxyAdaptor::CreateWorker() { |
| return std::make_unique<SandboxedWorker>(weak_ptr_factory_.GetWeakPtr()); |
| } |
| |
| bool SystemProxyAdaptor::CreateWorkerIfNeeded(bool user_traffic) { |
| if (user_traffic) { |
| // Not supported at the moment. |
| return false; |
| } |
| if (system_services_worker_) { |
| return true; |
| } |
| |
| system_services_worker_ = CreateWorker(); |
| if (!StartWorker(system_services_worker_.get(), |
| /* user_traffic= */ false)) { |
| system_services_worker_.reset(); |
| return false; |
| } |
| // patchpanel_proxy is owned by |dbus_object_->bus_|. |
| dbus::ObjectProxy* patchpanel_proxy = dbus_object_->GetBus()->GetObjectProxy( |
| patchpanel::kPatchPanelServiceName, |
| dbus::ObjectPath(patchpanel::kPatchPanelServicePath)); |
| patchpanel_proxy->WaitForServiceToBeAvailable( |
| base::Bind(&SystemProxyAdaptor::OnPatchpanelServiceAvailable, |
| weak_ptr_factory_.GetWeakPtr())); |
| return true; |
| } |
| |
| void SystemProxyAdaptor::SetCredentialsTask(SandboxedWorker* worker, |
| const std::string& username, |
| const std::string& password) { |
| DCHECK(worker); |
| worker->SetUsernameAndPassword(username, password); |
| } |
| |
| void SystemProxyAdaptor::SetKerberosEnabledTask( |
| SandboxedWorker* worker, |
| bool kerberos_enabled, |
| const std::string& principal_name) { |
| DCHECK(worker); |
| |
| worker->SetKerberosEnabled(kerberos_enabled, |
| kerberos_client_->krb5_conf_path(), |
| kerberos_client_->krb5_ccache_path()); |
| kerberos_client_->SetKerberosEnabled(kerberos_enabled); |
| if (kerberos_enabled) { |
| kerberos_client_->SetPrincipalName(principal_name); |
| } |
| } |
| |
| void SystemProxyAdaptor::ShutDownTask() { |
| brillo::MessageLoop::current()->BreakLoop(); |
| } |
| |
| bool SystemProxyAdaptor::StartWorker(SandboxedWorker* worker, |
| bool user_traffic) { |
| DCHECK(worker); |
| return worker->Start(); |
| } |
| |
| // Called when the patchpanel D-Bus service becomes available. |
| void SystemProxyAdaptor::OnPatchpanelServiceAvailable(bool is_available) { |
| if (!is_available) { |
| LOG(ERROR) << "Patchpanel service not available"; |
| return; |
| } |
| if (system_services_worker_) { |
| ConnectNamespace(system_services_worker_.get(), /* user_traffic= */ false); |
| } |
| } |
| |
| void SystemProxyAdaptor::ConnectNamespace(SandboxedWorker* worker, |
| bool user_traffic) { |
| DCHECK(system_services_worker_->IsRunning()); |
| DCHECK_GT(netns_reconnect_attempts_available_, 0); |
| --netns_reconnect_attempts_available_; |
| // TODO(b/160736881, acostinas): Remove the delay after patchpanel |
| // implements "ip netns" to create the veth pair across network namespaces. |
| brillo::MessageLoop::current()->PostDelayedTask( |
| FROM_HERE, |
| base::Bind(&SystemProxyAdaptor::ConnectNamespaceTask, |
| weak_ptr_factory_.GetWeakPtr(), worker, |
| /* user_traffic= */ false), |
| kConnectNamespaceDelay); |
| } |
| |
| void SystemProxyAdaptor::ConnectNamespaceTask(SandboxedWorker* worker, |
| bool user_traffic) { |
| std::unique_ptr<patchpanel::Client> patchpanel_client = |
| patchpanel::Client::New(); |
| if (!patchpanel_client) { |
| LOG(ERROR) << "Failed to open networking service client"; |
| return; |
| } |
| |
| std::pair<base::ScopedFD, patchpanel::ConnectNamespaceResponse> result = |
| patchpanel_client->ConnectNamespace( |
| worker->pid(), "" /* outbound_ifname */, user_traffic); |
| |
| if (!result.first.is_valid()) { |
| LOG(ERROR) << "Failed to setup network namespace on attempt " |
| << kNetworkNamespaceReconnectAttempts - |
| netns_reconnect_attempts_available_; |
| if (netns_reconnect_attempts_available_ > 0) { |
| ConnectNamespace(worker, user_traffic); |
| } |
| return; |
| } |
| |
| worker->SetNetNamespaceLifelineFd(std::move(result.first)); |
| if (!worker->SetListeningAddress(result.second.host_ipv4_address(), |
| kProxyPort)) { |
| return; |
| } |
| OnNamespaceConnected(worker, user_traffic); |
| } |
| |
| void SystemProxyAdaptor::OnNamespaceConnected(SandboxedWorker* worker, |
| bool user_traffic) { |
| WorkerActiveSignalDetails details; |
| details.set_traffic_origin(user_traffic ? TrafficOrigin::USER |
| : TrafficOrigin::SYSTEM); |
| details.set_local_proxy_url(worker->local_proxy_host_and_port()); |
| SendWorkerActiveSignal(SerializeProto(details)); |
| } |
| |
| } // namespace system_proxy |