blob: 9b4626fdd43053566f203f5136c90865dec76622 [file] [log] [blame]
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_PUBLIC_BROWSER_UTILITY_PROCESS_MOJO_CLIENT_H_
#define CONTENT_PUBLIC_BROWSER_UTILITY_PROCESS_MOJO_CLIENT_H_
#include <string>
#include "base/callback.h"
#include "base/files/file_path.h"
#include "base/logging.h"
#include "base/macros.h"
#include "base/strings/string16.h"
#include "base/threading/thread_checker.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/utility_process_host.h"
#include "content/public/browser/utility_process_host_client.h"
#include "mojo/public/cpp/bindings/interface_ptr.h"
#include "services/service_manager/public/cpp/interface_provider.h"
namespace content {
// Implements a client to a Mojo service running on a utility process. Takes
// care of starting the utility process and connecting to the remote Mojo
// service. The utility process is terminated in the destructor.
// Note: This class is not thread-safe. It is bound to the
// SingleThreadTaskRunner it is created on.
template <class MojoInterface>
class UtilityProcessMojoClient {
public:
explicit UtilityProcessMojoClient(const base::string16& process_name) {
helper_.reset(new Helper(process_name));
}
~UtilityProcessMojoClient() {
BrowserThread::DeleteSoon(BrowserThread::IO, FROM_HERE, helper_.release());
}
// Sets the error callback. A valid callback must be set before calling
// Start().
void set_error_callback(const base::Closure& error_callback) {
error_callback_ = error_callback;
}
// Allows a directory to be opened through the utility process sandbox.
void set_exposed_directory(const base::FilePath& directory) {
DCHECK(!start_called_);
DCHECK(!directory.empty());
helper_->set_exposed_directory(directory);
}
// Disables the sandbox in the utility process.
void set_disable_sandbox() {
DCHECK(!start_called_);
helper_->set_disable_sandbox();
}
#if defined(OS_WIN)
// Allows the utility process to run with elevated privileges.
void set_run_elevated() {
DCHECK(!start_called_);
helper_->set_run_elevated();
}
#endif // defined(OS_WIN)
// Starts the utility process and connects to the remote Mojo service.
void Start() {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
DCHECK(error_callback_);
DCHECK(!start_called_);
start_called_ = true;
auto request = MakeRequest(&service_);
service_.set_connection_error_handler(error_callback_);
helper_->Start(MojoInterface::Name_, request.PassMessagePipe());
}
// Returns the Mojo service used to make calls to the utility process.
MojoInterface* service() WARN_UNUSED_RESULT {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
DCHECK(start_called_);
return service_.get();
}
private:
// Helper class that takes care of managing the lifetime of the utility
// process on the IO thread.
class Helper {
public:
explicit Helper(const base::string16& process_name)
: process_name_(process_name) {}
~Helper() {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
// |utility_host_| manages its own lifetime but this forces the process to
// terminate if it's still alive.
delete utility_host_.get();
}
// Starts the utility process on the IO thread.
void Start(const std::string& mojo_interface_name,
mojo::ScopedMessagePipeHandle interface_pipe) {
BrowserThread::PostTask(
BrowserThread::IO, FROM_HERE,
base::BindOnce(&Helper::StartOnIOThread, base::Unretained(this),
mojo_interface_name, base::Passed(&interface_pipe)));
}
void set_exposed_directory(const base::FilePath& directory) {
exposed_directory_ = directory;
}
void set_disable_sandbox() { disable_sandbox_ = true; }
#if defined(OS_WIN)
void set_run_elevated() {
disable_sandbox_ = true;
run_elevated_ = true;
}
#endif // defined(OS_WIN)
private:
// Starts the utility process and binds the specified interface.
void StartOnIOThread(const std::string& interface_name,
mojo::ScopedMessagePipeHandle interface_pipe) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
utility_host_ = UtilityProcessHost::Create(nullptr, nullptr)->AsWeakPtr();
utility_host_->SetName(process_name_);
if (!exposed_directory_.empty())
utility_host_->SetExposedDir(exposed_directory_);
if (disable_sandbox_)
utility_host_->SetSandboxType(service_manager::SANDBOX_TYPE_NO_SANDBOX);
#if defined(OS_WIN)
if (run_elevated_) {
DCHECK(disable_sandbox_);
utility_host_->ElevatePrivileges();
}
#endif // defined(OS_WIN)
utility_host_->Start();
utility_host_->BindInterface(interface_name, std::move(interface_pipe));
}
// Properties of the utility process.
base::string16 process_name_;
base::FilePath exposed_directory_;
bool disable_sandbox_ = false;
#if defined(OS_WIN)
bool run_elevated_ = false;
#endif // defined(OS_WIN)
// Must only be accessed on the IO thread.
base::WeakPtr<UtilityProcessHost> utility_host_;
DISALLOW_COPY_AND_ASSIGN(Helper);
};
std::unique_ptr<Helper> helper_;
// Called when a connection error happens or if the process didn't start.
base::Closure error_callback_;
mojo::InterfacePtr<MojoInterface> service_;
// Enforce calling Start() before getting the service.
bool start_called_ = false;
// Checks that this class is always accessed from the same thread.
SEQUENCE_CHECKER(sequence_checker_);
DISALLOW_COPY_AND_ASSIGN(UtilityProcessMojoClient);
};
} // namespace content
#endif // CONTENT_PUBLIC_BROWSER_UTILITY_PROCESS_MOJO_CLIENT_H_