[epiphany/wip/sync-rebase: 43/86] sync-service: Implement asynchronous Storage Server requests
- From: Michael Catanzaro <mcatanzaro src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [epiphany/wip/sync-rebase: 43/86] sync-service: Implement asynchronous Storage Server requests
- Date: Fri, 7 Oct 2016 22:52:20 +0000 (UTC)
commit 88433015df4336189c38638ce79970d6d925e796
Author: Gabriel Ivascu <ivascu gabriel59 gmail com>
Date: Thu Jul 28 18:33:16 2016 +0300
sync-service: Implement asynchronous Storage Server requests
src/ephy-sync-service.c | 200 ++++++++++++++++++++++++++++++++++++++++-------
1 files changed, 172 insertions(+), 28 deletions(-)
---
diff --git a/src/ephy-sync-service.c b/src/ephy-sync-service.c
index f210548..9af0c90 100644
--- a/src/ephy-sync-service.c
+++ b/src/ephy-sync-service.c
@@ -62,11 +62,58 @@ struct _EphySyncService {
G_DEFINE_TYPE (EphySyncService, ephy_sync_service, G_TYPE_OBJECT);
+typedef struct {
+ EphySyncService *service;
+ const gchar *endpoint;
+ const gchar *method;
+ gchar *request_body;
+ gint64 modified_since;
+ gint64 unmodified_since;
+ SoupSessionCallback callback;
+ gpointer user_data;
+} StorageServerRequestAsyncData;
+
static gchar *
build_json_string (const gchar *first_key,
const gchar *first_value,
...) G_GNUC_NULL_TERMINATED;
+static StorageServerRequestAsyncData *
+storage_server_request_async_data_new (EphySyncService *service,
+ const gchar *endpoint,
+ const gchar *method,
+ gchar *request_body,
+ gint64 modified_since,
+ gint64 unmodified_since,
+ SoupSessionCallback callback,
+ gpointer user_data)
+{
+ StorageServerRequestAsyncData *data;
+
+ data = g_slice_new (StorageServerRequestAsyncData);
+ data->service = g_object_ref (service);
+ data->endpoint = endpoint;
+ data->method = method;
+ data->request_body = g_strdup (request_body);
+ data->modified_since = modified_since;
+ data->unmodified_since = unmodified_since;
+ data->callback = callback;
+ data->user_data = user_data;
+
+ return data;
+}
+
+static void
+storage_server_request_async_data_free (StorageServerRequestAsyncData *data)
+{
+ if (G_UNLIKELY (!data))
+ return;
+
+ g_object_unref (data->service);
+ g_free (data->request_body);
+ g_slice_free (StorageServerRequestAsyncData, data);
+}
+
static gchar *
build_json_string (const gchar *first_key,
const gchar *first_value,
@@ -193,7 +240,8 @@ ephy_sync_service_fxa_hawk_post_async (EphySyncService *self,
guint8 *key,
gsize key_length,
gchar *request_body,
- SoupSessionCallback callback)
+ SoupSessionCallback callback,
+ gpointer user_data)
{
EphySyncCryptoHawkOptions *hawk_options;
EphySyncCryptoHawkHeader *hawk_header;
@@ -220,7 +268,7 @@ ephy_sync_service_fxa_hawk_post_async (EphySyncService *self,
"authorization", hawk_header->header);
soup_message_headers_append (message->request_headers,
"content-type", content_type);
- soup_session_queue_message (self->soup_session, message, callback, self);
+ soup_session_queue_message (self->soup_session, message, callback, user_data);
g_free (url);
ephy_sync_crypto_hawk_options_free (hawk_options);
@@ -265,6 +313,68 @@ ephy_sync_service_fxa_hawk_get_sync (EphySyncService *self,
return message->status_code;
}
+static void
+ephy_sync_service_send_storage_request (EphySyncService *self,
+ StorageServerRequestAsyncData *data)
+{
+ EphySyncCryptoHawkOptions *hawk_options = NULL;
+ EphySyncCryptoHawkHeader *hawk_header;
+ SoupMessage *message;
+ gchar *url;
+ gchar *if_modified_since = NULL;
+ gchar *if_unmodified_since = NULL;
+ const gchar *content_type = "application/json";
+
+ url = g_strdup_printf ("%s/%s", self->storage_endpoint, data->endpoint);
+ message = soup_message_new (data->method, url);
+
+ if (data->request_body != NULL) {
+ hawk_options = ephy_sync_crypto_hawk_options_new (NULL, NULL, NULL,
+ g_strdup (content_type),
+ NULL, NULL, NULL,
+ g_strdup (data->request_body),
+ NULL);
+ soup_message_set_request (message, content_type,
+ SOUP_MEMORY_COPY,
+ data->request_body, strlen (data->request_body));
+ }
+
+ if (g_strcmp0 (data->method, SOUP_METHOD_POST) == 0) {
+ soup_message_headers_append (message->request_headers,
+ "content-type", content_type);
+ }
+
+ if (data->modified_since >= 0) {
+ if_modified_since = g_strdup_printf ("%ld", data->modified_since);
+ soup_message_headers_append (message->request_headers,
+ "X-If-Modified-Since", if_modified_since);
+ }
+
+ if (data->unmodified_since >= 0) {
+ if_unmodified_since = g_strdup_printf ("%ld", data->unmodified_since);
+ soup_message_headers_append (message->request_headers,
+ "X-If-Unmodified-Since", if_unmodified_since);
+ }
+
+ hawk_header = ephy_sync_crypto_compute_hawk_header (url, data->method,
+ self->storage_credentials_id,
+ (guint8 *) self->storage_credentials_key,
+ strlen (self->storage_credentials_key),
+ hawk_options);
+ soup_message_headers_append (message->request_headers,
+ "authorization", hawk_header->header);
+ soup_session_queue_message (self->soup_session, message,
+ data->callback, data->user_data);
+
+ if (hawk_options != NULL)
+ ephy_sync_crypto_hawk_options_free (hawk_options);
+
+ g_free (url);
+ g_free (if_modified_since);
+ g_free (if_unmodified_since);
+ storage_server_request_async_data_free (data);
+}
+
static gboolean
ephy_sync_service_certificate_is_valid (EphySyncService *self,
const gchar *certificate)
@@ -329,41 +439,50 @@ obtain_storage_credentials_response_cb (SoupSession *session,
SoupMessage *message,
gpointer user_data)
{
- EphySyncService *self;
+ StorageServerRequestAsyncData *data;
+ EphySyncService *service;
JsonParser *parser;
JsonObject *json;
JsonObject *errors;
JsonArray *array;
- self = EPHY_SYNC_SERVICE (user_data);
+ data = (StorageServerRequestAsyncData *) user_data;
+ service = EPHY_SYNC_SERVICE (data->service);
parser = json_parser_new ();
json_parser_load_from_data (parser, message->response_body->data, -1, NULL);
json = json_node_get_object (json_parser_get_root (parser));
if (message->status_code == STATUS_OK) {
- self->storage_endpoint = g_strdup (json_object_get_string_member (json, "api_endpoint"));
- self->storage_credentials_id = g_strdup (json_object_get_string_member (json, "id"));
- self->storage_credentials_key = g_strdup (json_object_get_string_member (json, "key"));
- self->storage_credentials_expiry_time = json_object_get_int_member (json, "duration") +
current_time_in_seconds;
+ service->storage_endpoint = g_strdup (json_object_get_string_member (json, "api_endpoint"));
+ service->storage_credentials_id = g_strdup (json_object_get_string_member (json, "id"));
+ service->storage_credentials_key = g_strdup (json_object_get_string_member (json, "key"));
+ service->storage_credentials_expiry_time = json_object_get_int_member (json, "duration") +
current_time_in_seconds;
} else if (message->status_code == 401) {
array = json_object_get_array_member (json, "errors");
errors = json_node_get_object (json_array_get_element (array, 0));
-
g_warning ("Failed to talk to the Token Server: %s: %s",
json_object_get_string_member (json, "status"),
json_object_get_string_member (errors, "description"));
+ storage_server_request_async_data_free (data);
+ goto out;
} else {
g_warning ("Failed to talk to the Token Server, status code %u. "
"See https://docs.services.mozilla.com/token/apis.html#error-responses",
message->status_code);
+ storage_server_request_async_data_free (data);
+ goto out;
}
+ ephy_sync_service_send_storage_request (service, data);
+
+out:
g_object_unref (parser);
}
static void
-ephy_sync_service_obtain_storage_credentials (EphySyncService *self)
+ephy_sync_service_obtain_storage_credentials (EphySyncService *self,
+ gpointer user_data)
{
SoupMessage *message;
guint8 *kB = NULL;
@@ -397,7 +516,7 @@ ephy_sync_service_obtain_storage_credentials (EphySyncService *self)
soup_message_headers_append (message->request_headers,
"authorization", authorization);
soup_session_queue_message (self->soup_session, message,
- obtain_storage_credentials_response_cb, self);
+ obtain_storage_credentials_response_cb, user_data);
g_free (kB);
g_free (hashed_kB);
@@ -412,12 +531,14 @@ obtain_signed_certificate_response_cb (SoupSession *session,
SoupMessage *message,
gpointer user_data)
{
- EphySyncService *self;
+ StorageServerRequestAsyncData *data;
+ EphySyncService *service;
JsonParser *parser;
JsonObject *json;
const gchar *certificate;
- self = EPHY_SYNC_SERVICE (user_data);
+ data = (StorageServerRequestAsyncData *) user_data;
+ service = EPHY_SYNC_SERVICE (data->service);
parser = json_parser_new ();
json_parser_load_from_data (parser, message->response_body->data, -1, NULL);
@@ -427,27 +548,30 @@ obtain_signed_certificate_response_cb (SoupSession *session,
g_warning ("FxA server errno: %ld, errmsg: %s",
json_object_get_int_member (json, "errno"),
json_object_get_string_member (json, "message"));
+ storage_server_request_async_data_free (data);
goto out;
}
certificate = json_object_get_string_member (json, "cert");
- if (ephy_sync_service_certificate_is_valid (self, certificate) == FALSE) {
- ephy_sync_crypto_rsa_key_pair_free (self->keypair);
+ if (ephy_sync_service_certificate_is_valid (service, certificate) == FALSE) {
+ ephy_sync_crypto_rsa_key_pair_free (service->keypair);
+ storage_server_request_async_data_free (data);
goto out;
}
- self->certificate = g_strdup (certificate);
+ service->certificate = g_strdup (certificate);
/* See the comment in ephy_sync_service_send_storage_message(). */
- ephy_sync_service_obtain_storage_credentials (self);
+ ephy_sync_service_obtain_storage_credentials (service, user_data);
out:
g_object_unref (parser);
}
static void
-ephy_sync_service_obtain_signed_certificate (EphySyncService *self)
+ephy_sync_service_obtain_signed_certificate (EphySyncService *self,
+ gpointer user_data)
{
EphySyncCryptoProcessedST *processed_st;
gchar *tokenID;
@@ -485,7 +609,8 @@ ephy_sync_service_obtain_signed_certificate (EphySyncService *self)
processed_st->reqHMACkey,
EPHY_SYNC_TOKEN_LENGTH,
request_body,
- obtain_signed_certificate_response_cb);
+ obtain_signed_certificate_response_cb,
+ user_data);
ephy_sync_crypto_processed_st_free (processed_st);
g_free (tokenID);
@@ -495,23 +620,42 @@ ephy_sync_service_obtain_signed_certificate (EphySyncService *self)
g_free (e_str);
}
-/* FIXME: Pass the data to be sent to the storage server. */
static void
-ephy_sync_service_send_storage_message (EphySyncService *self)
+ephy_sync_service_send_storage_message (EphySyncService *self,
+ const gchar *endpoint,
+ const gchar *method,
+ gchar *request_body,
+ gint64 modified_since,
+ gint64 unmodified_since,
+ SoupSessionCallback callback,
+ gpointer user_data)
{
- if (ephy_sync_service_storage_credentials_is_expired (self) == FALSE)
+ StorageServerRequestAsyncData *data;
+
+ data = storage_server_request_async_data_new (self, endpoint,
+ method, request_body,
+ modified_since, unmodified_since,
+ callback, user_data);
+
+ if (ephy_sync_service_storage_credentials_is_expired (self) == FALSE) {
+ ephy_sync_service_send_storage_request (self, data);
return;
+ }
- /* Drop the old certificate. */
+ /* Drop the old certificate and storage credentials. */
g_clear_pointer (&self->certificate, g_free);
+ g_clear_pointer (&self->storage_credentials_id, g_free);
+ g_clear_pointer (&self->storage_credentials_key, g_free);
+ self->storage_credentials_expiry_time = 0;
/* The only purpose of certificates is to obtain a signed BrowserID that is
- * needed to talk to the Token Server.
- * Since ephy_sync_service_obtain_signed_certificate() completes asynchronously
- * (and we can't know when that happens), we will trust it to send a request to
- * the Token Server.
+ * needed to talk to the Token Server. From the Token Server we will obtain
+ * the credentials needed to talk to the Storage Server. Since both
+ * ephy_sync_service_obtain_signed_certificate() and
+ * ephy_sync_service_obtain_storage_credentials() complete asynchronously, we
+ * need to entrust them the task of sending the request to the Storage Server.
*/
- ephy_sync_service_obtain_signed_certificate (self);
+ ephy_sync_service_obtain_signed_certificate (self, data);
}
static void
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]