blob: 8100461ceb89a103888085b81e9bf12c979d40d5 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/ssl/ssl_client_auth_handler.h"
#include <utility>
#include "base/bind.h"
#include "base/check_op.h"
#include "base/macros.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/client_certificate_delegate.h"
#include "content/public/browser/content_browser_client.h"
#include "content/public/common/content_client.h"
#include "net/ssl/client_cert_store.h"
#include "net/ssl/ssl_private_key.h"
namespace content {
class SSLClientAuthHandler::ClientCertificateDelegateImpl
: public ClientCertificateDelegate {
public:
explicit ClientCertificateDelegateImpl(
base::WeakPtr<SSLClientAuthHandler> handler)
: handler_(std::move(handler)) {}
~ClientCertificateDelegateImpl() override {
if (!continue_called_ && handler_) {
handler_->delegate_->CancelCertificateSelection();
}
}
// ClientCertificateDelegate implementation:
void ContinueWithCertificate(scoped_refptr<net::X509Certificate> cert,
scoped_refptr<net::SSLPrivateKey> key) override {
DCHECK(!continue_called_);
continue_called_ = true;
if (handler_) {
handler_->delegate_->ContinueWithCertificate(std::move(cert),
std::move(key));
}
}
private:
base::WeakPtr<SSLClientAuthHandler> handler_;
bool continue_called_ = false;
DISALLOW_COPY_AND_ASSIGN(ClientCertificateDelegateImpl);
};
// A reference-counted core to allow the ClientCertStore and SSLCertRequestInfo
// to outlive SSLClientAuthHandler if needbe.
//
// TODO(davidben): Fix ClientCertStore's lifetime contract. See
// https://crbug.com/1011579.
class SSLClientAuthHandler::Core : public base::RefCountedThreadSafe<Core> {
public:
Core(const base::WeakPtr<SSLClientAuthHandler>& handler,
std::unique_ptr<net::ClientCertStore> client_cert_store,
net::SSLCertRequestInfo* cert_request_info)
: handler_(handler),
client_cert_store_(std::move(client_cert_store)),
cert_request_info_(cert_request_info) {}
bool has_client_cert_store() const { return !!client_cert_store_; }
void GetClientCerts() {
if (client_cert_store_) {
// TODO(davidben): This is still a cyclical ownership where
// GetClientCerts' requirement that |client_cert_store_| remains alive
// until the call completes is maintained by the reference held in the
// callback.
client_cert_store_->GetClientCerts(
*cert_request_info_,
base::BindOnce(&SSLClientAuthHandler::Core::DidGetClientCerts, this));
} else {
DidGetClientCerts(net::ClientCertIdentityList());
}
}
private:
friend class base::RefCountedThreadSafe<Core>;
~Core() {}
// Called when |client_cert_store_| is done retrieving the cert list.
void DidGetClientCerts(net::ClientCertIdentityList client_certs) {
// Run this on a PostTask to avoid reentrancy problems.
GetUIThreadTaskRunner({})->PostTask(
FROM_HERE,
base::BindOnce(&SSLClientAuthHandler::DidGetClientCerts,
std::move(handler_), std::move(client_certs)));
}
base::WeakPtr<SSLClientAuthHandler> handler_;
std::unique_ptr<net::ClientCertStore> client_cert_store_;
scoped_refptr<net::SSLCertRequestInfo> cert_request_info_;
};
SSLClientAuthHandler::SSLClientAuthHandler(
std::unique_ptr<net::ClientCertStore> client_cert_store,
WebContents::Getter web_contents_getter,
net::SSLCertRequestInfo* cert_request_info,
Delegate* delegate)
: web_contents_getter_(std::move(web_contents_getter)),
cert_request_info_(cert_request_info),
delegate_(delegate) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
core_ = new Core(weak_factory_.GetWeakPtr(), std::move(client_cert_store),
cert_request_info_.get());
}
SSLClientAuthHandler::~SSLClientAuthHandler() {
// Invalidate our WeakPtrs in case invoking the cancellation callback would
// cause |this| to be destructed again.
weak_factory_.InvalidateWeakPtrs();
if (cancellation_callback_) {
std::move(cancellation_callback_).Run();
}
}
void SSLClientAuthHandler::SelectCertificate() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
// |core_| will call DidGetClientCerts when done.
core_->GetClientCerts();
}
void SSLClientAuthHandler::DidGetClientCerts(
net::ClientCertIdentityList client_certs) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
WebContents* web_contents = web_contents_getter_.Run();
if (!web_contents) {
delegate_->CancelCertificateSelection();
return;
}
// Note that if |client_cert_store_| is NULL, we intentionally fall through to
// SelectClientCertificate(). This is for platforms where the client cert
// matching is not performed by Chrome. Those platforms handle the cert
// matching before showing the dialog.
if (core_->has_client_cert_store() && client_certs.empty()) {
// No need to query the user if there are no certs to choose from.
delegate_->ContinueWithCertificate(nullptr, nullptr);
return;
}
// SelectClientCertificate() may call back into |delegate_| synchronously and
// destroy this object, so guard the cancellation callback logic by a WeakPtr.
base::WeakPtr<SSLClientAuthHandler> weak_self = weak_factory_.GetWeakPtr();
base::OnceClosure cancellation_callback =
GetContentClient()->browser()->SelectClientCertificate(
web_contents, cert_request_info_.get(), std::move(client_certs),
std::make_unique<ClientCertificateDelegateImpl>(weak_self));
if (weak_self) {
cancellation_callback_ = std::move(cancellation_callback);
} else if (!cancellation_callback.is_null()) {
std::move(cancellation_callback).Run();
}
}
} // namespace content