blob: 29bafea36456579996fa137a7736fb92e510f5a4 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/ssl/ssl_client_auth_handler.h"
#include <utility>
#include "base/bind.h"
#include "base/logging.h"
#include "base/macros.h"
#include "base/task/post_task.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/client_certificate_delegate.h"
#include "content/public/browser/content_browser_client.h"
#include "content/public/browser/resource_request_info.h"
#include "net/ssl/client_cert_store.h"
#include "net/ssl/ssl_private_key.h"
#include "net/url_request/url_request.h"
namespace content {
namespace {
class ClientCertificateDelegateImpl : public ClientCertificateDelegate {
public:
explicit ClientCertificateDelegateImpl(
const base::WeakPtr<SSLClientAuthHandler>& handler)
: handler_(handler), continue_called_(false) {}
~ClientCertificateDelegateImpl() override {
if (!continue_called_) {
base::PostTaskWithTraits(
FROM_HERE, {BrowserThread::IO},
base::BindOnce(&SSLClientAuthHandler::CancelCertificateSelection,
handler_));
}
}
// ClientCertificateDelegate implementation:
void ContinueWithCertificate(scoped_refptr<net::X509Certificate> cert,
scoped_refptr<net::SSLPrivateKey> key) override {
DCHECK(!continue_called_);
continue_called_ = true;
base::PostTaskWithTraits(
FROM_HERE, {BrowserThread::IO},
base::BindOnce(&SSLClientAuthHandler::ContinueWithCertificate, handler_,
std::move(cert), std::move(key)));
}
private:
base::WeakPtr<SSLClientAuthHandler> handler_;
bool continue_called_;
DISALLOW_COPY_AND_ASSIGN(ClientCertificateDelegateImpl);
};
void SelectCertificateOnUIThread(
const ResourceRequestInfo::WebContentsGetter& wc_getter,
net::SSLCertRequestInfo* cert_request_info,
net::ClientCertIdentityList client_certs,
const base::WeakPtr<SSLClientAuthHandler>& handler) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
std::unique_ptr<ClientCertificateDelegate> delegate(
new ClientCertificateDelegateImpl(handler));
WebContents* web_contents = wc_getter.Run();
if (!web_contents)
return;
GetContentClient()->browser()->SelectClientCertificate(
web_contents, cert_request_info, std::move(client_certs),
std::move(delegate));
}
} // namespace
// A reference-counted core to allow the ClientCertStore and SSLCertRequestInfo
// to outlive SSLClientAuthHandler if needbe.
class SSLClientAuthHandler::Core : public base::RefCountedThreadSafe<Core> {
public:
Core(const base::WeakPtr<SSLClientAuthHandler>& handler,
std::unique_ptr<net::ClientCertStore> client_cert_store,
net::SSLCertRequestInfo* cert_request_info)
: handler_(handler),
client_cert_store_(std::move(client_cert_store)),
cert_request_info_(cert_request_info) {}
bool has_client_cert_store() const { return !!client_cert_store_; }
void GetClientCerts() {
if (client_cert_store_) {
// TODO(davidben): This is still a cyclical ownership where
// GetClientCerts' requirement that |client_cert_store_| remains alive
// until the call completes is maintained by the reference held in the
// callback.
client_cert_store_->GetClientCerts(
*cert_request_info_,
base::Bind(&SSLClientAuthHandler::Core::DidGetClientCerts, this));
} else {
DidGetClientCerts(net::ClientCertIdentityList());
}
}
private:
friend class base::RefCountedThreadSafe<Core>;
~Core() {}
// Called when |client_cert_store_| is done retrieving the cert list.
void DidGetClientCerts(net::ClientCertIdentityList client_certs) {
if (handler_)
handler_->DidGetClientCerts(std::move(client_certs));
}
base::WeakPtr<SSLClientAuthHandler> handler_;
std::unique_ptr<net::ClientCertStore> client_cert_store_;
scoped_refptr<net::SSLCertRequestInfo> cert_request_info_;
};
SSLClientAuthHandler::SSLClientAuthHandler(
std::unique_ptr<net::ClientCertStore> client_cert_store,
ResourceRequestInfo::WebContentsGetter web_contents_getter,
net::SSLCertRequestInfo* cert_request_info,
Delegate* delegate)
: web_contents_getter_(web_contents_getter),
cert_request_info_(cert_request_info),
delegate_(delegate),
weak_factory_(this) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
core_ = new Core(weak_factory_.GetWeakPtr(), std::move(client_cert_store),
cert_request_info_.get());
}
SSLClientAuthHandler::~SSLClientAuthHandler() {
}
void SSLClientAuthHandler::SelectCertificate() {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
// |core_| will call DidGetClientCerts when done.
core_->GetClientCerts();
}
// static
void SSLClientAuthHandler::ContinueWithCertificate(
const base::WeakPtr<SSLClientAuthHandler>& handler,
scoped_refptr<net::X509Certificate> cert,
scoped_refptr<net::SSLPrivateKey> key) {
if (handler)
handler->delegate_->ContinueWithCertificate(std::move(cert),
std::move(key));
}
// static
void SSLClientAuthHandler::CancelCertificateSelection(
const base::WeakPtr<SSLClientAuthHandler>& handler) {
if (handler)
handler->delegate_->CancelCertificateSelection();
}
void SSLClientAuthHandler::DidGetClientCerts(
net::ClientCertIdentityList client_certs) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
// Note that if |client_cert_store_| is NULL, we intentionally fall through to
// SelectCertificateOnUIThread. This is for platforms where the client cert
// matching is not performed by Chrome. Those platforms handle the cert
// matching before showing the dialog.
if (core_->has_client_cert_store() && client_certs.empty()) {
// No need to query the user if there are no certs to choose from.
//
// TODO(davidben): The WebContents-less check on the UI thread should come
// before checking ClientCertStore; ClientCertStore itself should probably
// be handled by the embedder (https://crbug.com/394131), especially since
// this doesn't work on Android (https://crbug.com/345641).
base::PostTaskWithTraits(
FROM_HERE, {BrowserThread::IO},
base::BindOnce(&SSLClientAuthHandler::ContinueWithCertificate,
weak_factory_.GetWeakPtr(), nullptr, nullptr));
return;
}
base::PostTaskWithTraits(
FROM_HERE, {BrowserThread::UI},
base::BindOnce(&SelectCertificateOnUIThread, web_contents_getter_,
base::RetainedRef(cert_request_info_),
std::move(client_certs), weak_factory_.GetWeakPtr()));
}
} // namespace content