blob: 8d8027314e4fd7e554acd8ff40884d699c85f55f [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/bind.h"
#include "base/files/file_path.h"
#include "base/synchronization/waitable_event.h"
#include "base/task/post_task.h"
#include "build/build_config.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ssl/ssl_client_auth_requestor_mock.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_window.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/browser/ui/views/ssl_client_certificate_selector.h"
#include "chrome/test/base/in_process_browser_test.h"
#include "chrome/test/base/interactive_test_utils.h"
#include "chrome/test/base/ui_test_utils.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/client_certificate_delegate.h"
#include "content/public/browser/web_contents.h"
#include "content/public/test/browser_test_utils.h"
#include "net/base/request_priority.h"
#include "net/cert/x509_certificate.h"
#include "net/http/http_transaction_factory.h"
#include "net/ssl/client_cert_identity_test_util.h"
#include "net/ssl/ssl_cert_request_info.h"
#include "net/test/cert_test_util.h"
#include "net/test/test_data_directory.h"
#include "net/traffic_annotation/network_traffic_annotation_test_helper.h"
#include "net/url_request/url_request.h"
#include "net/url_request/url_request_context.h"
#include "net/url_request/url_request_context_getter.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "ui/views/test/widget_test.h"
using ::testing::Mock;
using ::testing::StrictMock;
using content::BrowserThread;
// We don't have a way to do end-to-end SSL client auth testing, so this test
// creates a certificate selector_ manually with a mocked
// SSLClientAuthHandler.
class SSLClientCertificateSelectorTest : public InProcessBrowserTest {
public:
SSLClientCertificateSelectorTest()
: io_loop_finished_event_(
base::WaitableEvent::ResetPolicy::AUTOMATIC,
base::WaitableEvent::InitialState::NOT_SIGNALED),
selector_(NULL) {}
void SetUpInProcessBrowserTestFixture() override {
base::FilePath certs_dir = net::GetTestCertsDirectory();
cert_identity_1_ = net::FakeClientCertIdentity::CreateFromCertAndKeyFiles(
certs_dir, "client_1.pem", "client_1.pk8");
ASSERT_TRUE(cert_identity_1_);
cert_identity_2_ = net::FakeClientCertIdentity::CreateFromCertAndKeyFiles(
certs_dir, "client_2.pem", "client_2.pk8");
ASSERT_TRUE(cert_identity_2_);
cert_request_info_ = new net::SSLCertRequestInfo;
cert_request_info_->host_and_port = net::HostPortPair("foo", 123);
}
void SetUpOnMainThread() override {
base::PostTaskWithTraits(
FROM_HERE, {BrowserThread::IO},
base::BindOnce(&SSLClientCertificateSelectorTest::SetUpOnIOThread,
base::Unretained(this)));
io_loop_finished_event_.Wait();
content::WaitForLoadStop(
browser()->tab_strip_model()->GetActiveWebContents());
net::ClientCertIdentityList cert_identity_list;
cert_identity_list.push_back(cert_identity_1_->Copy());
cert_identity_list.push_back(cert_identity_2_->Copy());
selector_ = new SSLClientCertificateSelector(
browser()->tab_strip_model()->GetActiveWebContents(),
auth_requestor_->cert_request_info_, std::move(cert_identity_list),
auth_requestor_->CreateDelegate());
selector_->Init();
selector_->Show();
ASSERT_TRUE(selector_->GetSelectedCert());
EXPECT_EQ(cert_identity_1_->certificate(),
selector_->GetSelectedCert()->certificate());
}
virtual void SetUpOnIOThread() {
auth_requestor_ = new StrictMock<SSLClientAuthRequestorMock>(
cert_request_info_);
io_loop_finished_event_.Signal();
}
// Have to release our reference to the auth handler during the test to allow
// it to be destroyed while the Browser and its IO thread still exist.
void TearDownOnMainThread() override {
base::PostTaskWithTraits(
FROM_HERE, {BrowserThread::IO},
base::BindOnce(&SSLClientCertificateSelectorTest::CleanUpOnIOThread,
base::Unretained(this)));
io_loop_finished_event_.Wait();
auth_requestor_ = NULL;
}
virtual void CleanUpOnIOThread() {
io_loop_finished_event_.Signal();
}
protected:
std::unique_ptr<net::URLRequest> MakeURLRequest(
net::URLRequestContextGetter* context_getter) {
return context_getter->GetURLRequestContext()->CreateRequest(
GURL("https://example"), net::DEFAULT_PRIORITY, NULL,
TRAFFIC_ANNOTATION_FOR_TESTS);
}
base::WaitableEvent io_loop_finished_event_;
std::unique_ptr<net::FakeClientCertIdentity> cert_identity_1_;
std::unique_ptr<net::FakeClientCertIdentity> cert_identity_2_;
scoped_refptr<net::SSLCertRequestInfo> cert_request_info_;
scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_;
// The selector will be deleted when a cert is selected or the tab is closed.
SSLClientCertificateSelector* selector_;
};
class SSLClientCertificateSelectorMultiTabTest
: public SSLClientCertificateSelectorTest {
public:
void SetUpInProcessBrowserTestFixture() override {
SSLClientCertificateSelectorTest::SetUpInProcessBrowserTestFixture();
cert_request_info_1_ = new net::SSLCertRequestInfo;
cert_request_info_1_->host_and_port = net::HostPortPair("bar", 123);
cert_request_info_2_ = new net::SSLCertRequestInfo;
cert_request_info_2_->host_and_port = net::HostPortPair("bar", 123);
}
void SetUpOnMainThread() override {
// Also calls SetUpOnIOThread.
SSLClientCertificateSelectorTest::SetUpOnMainThread();
AddTabAtIndex(1, GURL("about:blank"), ui::PAGE_TRANSITION_LINK);
AddTabAtIndex(2, GURL("about:blank"), ui::PAGE_TRANSITION_LINK);
ASSERT_TRUE(NULL != browser()->tab_strip_model()->GetWebContentsAt(0));
ASSERT_TRUE(NULL != browser()->tab_strip_model()->GetWebContentsAt(1));
ASSERT_TRUE(NULL != browser()->tab_strip_model()->GetWebContentsAt(2));
content::WaitForLoadStop(browser()->tab_strip_model()->GetWebContentsAt(1));
content::WaitForLoadStop(browser()->tab_strip_model()->GetWebContentsAt(2));
net::ClientCertIdentityList cert_identity_list_1;
cert_identity_list_1.push_back(cert_identity_1_->Copy());
cert_identity_list_1.push_back(cert_identity_2_->Copy());
selector_1_ = new SSLClientCertificateSelector(
browser()->tab_strip_model()->GetWebContentsAt(1),
auth_requestor_1_->cert_request_info_, std::move(cert_identity_list_1),
auth_requestor_1_->CreateDelegate());
selector_1_->Init();
selector_1_->Show();
net::ClientCertIdentityList cert_identity_list_2;
cert_identity_list_2.push_back(cert_identity_1_->Copy());
cert_identity_list_2.push_back(cert_identity_2_->Copy());
selector_2_ = new SSLClientCertificateSelector(
browser()->tab_strip_model()->GetWebContentsAt(2),
auth_requestor_2_->cert_request_info_, std::move(cert_identity_list_2),
auth_requestor_2_->CreateDelegate());
selector_2_->Init();
selector_2_->Show();
EXPECT_EQ(2, browser()->tab_strip_model()->active_index());
ASSERT_TRUE(selector_1_->GetSelectedCert());
EXPECT_EQ(cert_identity_1_->certificate(),
selector_1_->GetSelectedCert()->certificate());
ASSERT_TRUE(selector_2_->GetSelectedCert());
EXPECT_EQ(cert_identity_1_->certificate(),
selector_2_->GetSelectedCert()->certificate());
}
void SetUpOnIOThread() override {
auth_requestor_1_ = new StrictMock<SSLClientAuthRequestorMock>(
cert_request_info_1_);
auth_requestor_2_ = new StrictMock<SSLClientAuthRequestorMock>(
cert_request_info_2_);
SSLClientCertificateSelectorTest::SetUpOnIOThread();
}
void TearDownOnMainThread() override {
auth_requestor_2_ = NULL;
auth_requestor_1_ = NULL;
SSLClientCertificateSelectorTest::TearDownOnMainThread();
}
void CleanUpOnIOThread() override {
SSLClientCertificateSelectorTest::CleanUpOnIOThread();
}
protected:
scoped_refptr<net::SSLCertRequestInfo> cert_request_info_1_;
scoped_refptr<net::SSLCertRequestInfo> cert_request_info_2_;
scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_1_;
scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_2_;
SSLClientCertificateSelector* selector_1_;
SSLClientCertificateSelector* selector_2_;
};
class SSLClientCertificateSelectorMultiProfileTest
: public SSLClientCertificateSelectorTest {
public:
SSLClientCertificateSelectorMultiProfileTest() = default;
~SSLClientCertificateSelectorMultiProfileTest() override = default;
void SetUpInProcessBrowserTestFixture() override {
SSLClientCertificateSelectorTest::SetUpInProcessBrowserTestFixture();
cert_request_info_1_ = new net::SSLCertRequestInfo;
cert_request_info_1_->host_and_port = net::HostPortPair("foo", 123);
}
void SetUpOnMainThread() override {
browser_1_ = CreateIncognitoBrowser();
// Also calls SetUpOnIOThread.
SSLClientCertificateSelectorTest::SetUpOnMainThread();
net::ClientCertIdentityList cert_identity_list;
cert_identity_list.push_back(cert_identity_1_->Copy());
cert_identity_list.push_back(cert_identity_2_->Copy());
selector_1_ = new SSLClientCertificateSelector(
browser_1_->tab_strip_model()->GetActiveWebContents(),
auth_requestor_1_->cert_request_info_, std::move(cert_identity_list),
auth_requestor_1_->CreateDelegate());
selector_1_->Init();
selector_1_->Show();
gfx::NativeWindow window = browser_1_->window()->GetNativeWindow();
views::Widget* widget = views::Widget::GetWidgetForNativeWindow(window);
ASSERT_NE(nullptr, widget);
views::test::WidgetActivationWaiter waiter(widget, true);
waiter.Wait();
ASSERT_TRUE(selector_1_->GetSelectedCert());
EXPECT_EQ(cert_identity_1_->certificate(),
selector_1_->GetSelectedCert()->certificate());
}
void SetUpOnIOThread() override {
auth_requestor_1_ = new StrictMock<SSLClientAuthRequestorMock>(
cert_request_info_1_);
SSLClientCertificateSelectorTest::SetUpOnIOThread();
}
void TearDownOnMainThread() override {
auth_requestor_1_ = NULL;
SSLClientCertificateSelectorTest::TearDownOnMainThread();
}
void CleanUpOnIOThread() override {
SSLClientCertificateSelectorTest::CleanUpOnIOThread();
}
protected:
Browser* browser_1_;
scoped_refptr<net::SSLCertRequestInfo> cert_request_info_1_;
scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_1_;
SSLClientCertificateSelector* selector_1_;
private:
DISALLOW_COPY_AND_ASSIGN(SSLClientCertificateSelectorMultiProfileTest);
};
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, SelectNone) {
EXPECT_CALL(*auth_requestor_.get(), CancelCertificateSelection());
// Let the mock get checked on destruction.
}
#if defined(OS_MACOSX)
// Focusing or input is not completely working on Mac: http://crbug.com/824418
#define MAYBE_Escape DISABLED_Escape
#else
#define MAYBE_Escape Escape
#endif
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, MAYBE_Escape) {
EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(nullptr, nullptr));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_ESCAPE, false, false, false, false));
Mock::VerifyAndClear(auth_requestor_.get());
}
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, SelectDefault) {
EXPECT_CALL(*auth_requestor_.get(),
CertificateSelected(cert_identity_1_->certificate(),
cert_identity_1_->ssl_private_key()));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_RETURN, false, false, false, false));
Mock::VerifyAndClear(auth_requestor_.get());
}
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiTabTest, MAYBE_Escape) {
// auth_requestor_1_ should get selected automatically by the
// SSLClientAuthObserver when selector_2_ is accepted, since both 1 & 2 have
// the same host:port.
EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(nullptr, nullptr));
EXPECT_CALL(*auth_requestor_2_.get(), CertificateSelected(nullptr, nullptr));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_ESCAPE, false, false, false, false));
Mock::VerifyAndClear(auth_requestor_.get());
Mock::VerifyAndClear(auth_requestor_1_.get());
Mock::VerifyAndClear(auth_requestor_2_.get());
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
EXPECT_CALL(*auth_requestor_.get(), CancelCertificateSelection());
}
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiTabTest, SelectSecond) {
// auth_requestor_1_ should get selected automatically by the
// SSLClientAuthObserver when selector_2_ is accepted, since both 1 & 2 have
// the same host:port.
EXPECT_CALL(*auth_requestor_1_.get(),
CertificateSelected(cert_identity_2_->certificate(),
cert_identity_2_->ssl_private_key()));
EXPECT_CALL(*auth_requestor_2_.get(),
CertificateSelected(cert_identity_2_->certificate(),
cert_identity_2_->ssl_private_key()));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_DOWN, false, false, false, false));
ASSERT_TRUE(selector_->GetSelectedCert());
EXPECT_EQ(cert_identity_1_->certificate(),
selector_->GetSelectedCert()->certificate());
ASSERT_TRUE(selector_1_->GetSelectedCert());
EXPECT_EQ(cert_identity_1_->certificate(),
selector_1_->GetSelectedCert()->certificate());
ASSERT_TRUE(selector_2_->GetSelectedCert());
EXPECT_EQ(cert_identity_2_->certificate(),
selector_2_->GetSelectedCert()->certificate());
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_RETURN, false, false, false, false));
Mock::VerifyAndClear(auth_requestor_.get());
Mock::VerifyAndClear(auth_requestor_1_.get());
Mock::VerifyAndClear(auth_requestor_2_.get());
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
EXPECT_CALL(*auth_requestor_.get(), CancelCertificateSelection());
}
#if defined(OS_MACOSX)
// Widget activation doesn't work on Mac: https://crbug.com/823543
#define MAYBE_Escape DISABLED_Escape
#else
#define MAYBE_Escape Escape
#endif
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiProfileTest,
MAYBE_Escape) {
EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(nullptr, nullptr));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser_1_, ui::VKEY_ESCAPE, false, false, false, false));
Mock::VerifyAndClear(auth_requestor_.get());
Mock::VerifyAndClear(auth_requestor_1_.get());
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
EXPECT_CALL(*auth_requestor_.get(), CancelCertificateSelection());
}
#if defined(OS_MACOSX)
// Widget activation doesn't work on Mac: https://crbug.com/823543
#define MAYBE_SelectDefault DISABLED_SelectDefault
#else
#define MAYBE_SelectDefault SelectDefault
#endif
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiProfileTest,
MAYBE_SelectDefault) {
EXPECT_CALL(*auth_requestor_1_.get(),
CertificateSelected(cert_identity_1_->certificate(),
cert_identity_1_->ssl_private_key()));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser_1_, ui::VKEY_RETURN, false, false, false, false));
Mock::VerifyAndClear(auth_requestor_.get());
Mock::VerifyAndClear(auth_requestor_1_.get());
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
EXPECT_CALL(*auth_requestor_.get(), CancelCertificateSelection());
}