chromium/chromeos/ash/components/network/system_token_cert_db_storage.cc

// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "chromeos/ash/components/network/system_token_cert_db_storage.h"

#include "base/callback_list.h"
#include "base/check_op.h"
#include "base/functional/callback.h"
#include "base/location.h"
#include "base/observer_list.h"
#include "base/observer_list_types.h"
#include "base/sequence_checker.h"
#include "base/timer/timer.h"
#include "net/cert/nss_cert_database.h"

namespace ash {

namespace {

// Owned `ChromeBrowserMainPartsAsh`.
SystemTokenCertDbStorage* g_system_token_cert_db_storage = nullptr;

}  // namespace

// static
constexpr base::TimeDelta SystemTokenCertDbStorage::kMaxCertDbRetrievalDelay;

// static
void SystemTokenCertDbStorage::Initialize() {
  DCHECK_EQ(g_system_token_cert_db_storage, nullptr);
  g_system_token_cert_db_storage = new SystemTokenCertDbStorage();
}

// static
void SystemTokenCertDbStorage::Shutdown() {
  DCHECK_NE(g_system_token_cert_db_storage, nullptr);
  delete g_system_token_cert_db_storage;
  g_system_token_cert_db_storage = nullptr;
}

// static
SystemTokenCertDbStorage* SystemTokenCertDbStorage::Get() {
  return g_system_token_cert_db_storage;
}

void SystemTokenCertDbStorage::SetDatabase(
    net::NSSCertDatabase* system_token_cert_database) {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);

  DCHECK_EQ(system_token_cert_database_, nullptr);
  system_token_cert_database_ = std::move(system_token_cert_database);
  system_token_cert_db_retrieval_timer_.Stop();
  get_system_token_cert_db_callback_list_.Notify(system_token_cert_database_);
}

void SystemTokenCertDbStorage::ResetDatabase() {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);

  system_token_cert_database_ = nullptr;
  // If any consumer asks for the database between now and when
  // SystemTokenCertDbStorage is destroyed, respond with a failure.
  system_token_cert_db_retrieval_failed_ = true;

  // Notify observers that the SystemTokenCertDbStorage and the
  // NSSCertDatabase it provides can not be used anymore.
  for (auto& observer : g_system_token_cert_db_storage->observers_)
    observer.OnSystemTokenCertDbDestroyed();
}

void SystemTokenCertDbStorage::GetDatabase(GetDatabaseCallback callback) {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);

  DCHECK(callback);

  if (system_token_cert_database_) {
    std::move(callback).Run(system_token_cert_database_.get());
  } else if (system_token_cert_db_retrieval_failed_) {
    std::move(callback).Run(/*nss_cert_database=*/nullptr);
  } else {
    get_system_token_cert_db_callback_list_.AddUnsafe(std::move(callback));

    if (!system_token_cert_db_retrieval_timer_.IsRunning()) {
      system_token_cert_db_retrieval_timer_.Start(
          FROM_HERE, kMaxCertDbRetrievalDelay, /*receiver=*/this,
          &SystemTokenCertDbStorage::OnSystemTokenDbRetrievalTimeout);
    }
  }
}

void SystemTokenCertDbStorage::AddObserver(Observer* observer) {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);

  observers_.AddObserver(observer);
}

void SystemTokenCertDbStorage::RemoveObserver(Observer* observer) {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);

  observers_.RemoveObserver(observer);
}

SystemTokenCertDbStorage::SystemTokenCertDbStorage() = default;

SystemTokenCertDbStorage::~SystemTokenCertDbStorage() {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
}

void SystemTokenCertDbStorage::OnSystemTokenDbRetrievalTimeout() {
  DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);

  system_token_cert_db_retrieval_failed_ = true;
  get_system_token_cert_db_callback_list_.Notify(
      /*nss_cert_database=*/nullptr);
}

}  // namespace ash