| Index: chrome/browser/net/sqlite_origin_bound_cert_store_unittest.cc
|
| diff --git a/chrome/browser/net/sqlite_origin_bound_cert_store_unittest.cc b/chrome/browser/net/sqlite_origin_bound_cert_store_unittest.cc
|
| index cc3130d7b1959a89175ad7c7d686598ad5df5312..bc67ab6fd430b9adf1cf0c083da9821ce0034789 100644
|
| --- a/chrome/browser/net/sqlite_origin_bound_cert_store_unittest.cc
|
| +++ b/chrome/browser/net/sqlite_origin_bound_cert_store_unittest.cc
|
| @@ -12,6 +12,7 @@
|
| #include "chrome/browser/net/sqlite_origin_bound_cert_store.h"
|
| #include "chrome/common/chrome_constants.h"
|
| #include "content/test/test_browser_thread.h"
|
| +#include "net/base/cert_test_util.h"
|
| #include "sql/statement.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| @@ -24,6 +25,30 @@ class SQLiteOriginBoundCertStoreTest : public testing::Test {
|
| }
|
|
|
| protected:
|
| + static void ReadTestKeyAndCert(std::string* key, std::string* cert) {
|
| + FilePath key_path = net::GetTestCertsDirectory().AppendASCII(
|
| + "unittest.originbound.key.der");
|
| + FilePath cert_path = net::GetTestCertsDirectory().AppendASCII(
|
| + "unittest.originbound.der");
|
| + ASSERT_TRUE(file_util::ReadFileToString(key_path, key));
|
| + ASSERT_TRUE(file_util::ReadFileToString(cert_path, cert));
|
| + }
|
| +
|
| + static base::Time GetTestCertExpirationTime() {
|
| + // Cert expiration time from 'dumpasn1 unittest.originbound.der':
|
| + // GeneralizedTime 19/11/2111 02:23:45 GMT
|
| + base::Time::Exploded exploded_time;
|
| + exploded_time.year = 2111;
|
| + exploded_time.month = 11;
|
| + exploded_time.day_of_week = 0; // Unused.
|
| + exploded_time.day_of_month = 19;
|
| + exploded_time.hour = 2;
|
| + exploded_time.minute = 23;
|
| + exploded_time.second = 45;
|
| + exploded_time.millisecond = 0;
|
| + return base::Time::FromUTCExploded(exploded_time);
|
| + }
|
| +
|
| virtual void SetUp() {
|
| db_thread_.Start();
|
| ASSERT_TRUE(temp_dir_.CreateUniqueTempDir());
|
| @@ -36,7 +61,9 @@ class SQLiteOriginBoundCertStoreTest : public testing::Test {
|
| store_->AddOriginBoundCert(
|
| net::DefaultOriginBoundCertStore::OriginBoundCert(
|
| "https://encrypted.google.com:8443",
|
| - net::CLIENT_CERT_RSA_SIGN, "a", "b"));
|
| + net::CLIENT_CERT_RSA_SIGN,
|
| + base::Time(),
|
| + "a", "b"));
|
| }
|
|
|
| content::TestBrowserThread db_thread_;
|
| @@ -79,7 +106,10 @@ TEST_F(SQLiteOriginBoundCertStoreTest, RemoveOnDestruction) {
|
| TEST_F(SQLiteOriginBoundCertStoreTest, TestPersistence) {
|
| store_->AddOriginBoundCert(
|
| net::DefaultOriginBoundCertStore::OriginBoundCert(
|
| - "https://www.google.com/", net::CLIENT_CERT_ECDSA_SIGN, "c", "d"));
|
| + "https://www.google.com/",
|
| + net::CLIENT_CERT_ECDSA_SIGN,
|
| + base::Time(),
|
| + "c", "d"));
|
|
|
| std::vector<net::DefaultOriginBoundCertStore::OriginBoundCert*> certs;
|
| // Replace the store effectively destroying the current one and forcing it
|
| @@ -121,8 +151,7 @@ TEST_F(SQLiteOriginBoundCertStoreTest, TestPersistence) {
|
| store_ = NULL;
|
| // Make sure we wait until the destructor has run.
|
| ASSERT_TRUE(helper->Run());
|
| - STLDeleteContainerPointers(certs.begin(), certs.end());
|
| - certs.clear();
|
| + STLDeleteElements(&certs);
|
| store_ = new SQLiteOriginBoundCertStore(
|
| temp_dir_.path().Append(chrome::kOBCertFilename));
|
|
|
| @@ -131,12 +160,16 @@ TEST_F(SQLiteOriginBoundCertStoreTest, TestPersistence) {
|
| ASSERT_EQ(0U, certs.size());
|
| }
|
|
|
| -TEST_F(SQLiteOriginBoundCertStoreTest, TestUpgrade) {
|
| +TEST_F(SQLiteOriginBoundCertStoreTest, TestUpgradeV1) {
|
| // Reset the store. We'll be using a different database for this test.
|
| store_ = NULL;
|
|
|
| FilePath v1_db_path(temp_dir_.path().AppendASCII("v1db"));
|
|
|
| + std::string key_data;
|
| + std::string cert_data;
|
| + ReadTestKeyAndCert(&key_data, &cert_data);
|
| +
|
| // Create a version 1 database.
|
| {
|
| sql::Connection db;
|
| @@ -148,49 +181,160 @@ TEST_F(SQLiteOriginBoundCertStoreTest, TestUpgrade) {
|
| "INSERT INTO \"meta\" VALUES('last_compatible_version','1');"
|
| "CREATE TABLE origin_bound_certs ("
|
| "origin TEXT NOT NULL UNIQUE PRIMARY KEY,"
|
| - "private_key BLOB NOT NULL,cert BLOB NOT NULL);"
|
| - "INSERT INTO \"origin_bound_certs\" VALUES("
|
| - "'https://google.com',X'AA',X'BB');"
|
| + "private_key BLOB NOT NULL,cert BLOB NOT NULL);"));
|
| +
|
| + sql::Statement add_smt(db.GetUniqueStatement(
|
| + "INSERT INTO origin_bound_certs (origin, private_key, cert) "
|
| + "VALUES (?,?,?)"));
|
| + add_smt.BindString(0, "https://www.google.com:443");
|
| + add_smt.BindBlob(1, key_data.data(), key_data.size());
|
| + add_smt.BindBlob(2, cert_data.data(), cert_data.size());
|
| + ASSERT_TRUE(add_smt.Run());
|
| +
|
| + ASSERT_TRUE(db.Execute(
|
| "INSERT INTO \"origin_bound_certs\" VALUES("
|
| - "'https://foo.com',X'CC',X'DD');"
|
| + "'https://foo.com',X'AA',X'BB');"
|
| ));
|
| }
|
|
|
| - std::vector<net::DefaultOriginBoundCertStore::OriginBoundCert*> certs;
|
| - store_ = new SQLiteOriginBoundCertStore(v1_db_path);
|
| + // Load and test the DB contents twice. First time ensures that we can use
|
| + // the updated values immediately. Second time ensures that the updated
|
| + // values are stored and read correctly on next load.
|
| + for (int i = 0; i < 2; ++i) {
|
| + SCOPED_TRACE(i);
|
|
|
| - // Load the database and ensure the certs can be read and are marked as RSA.
|
| - ASSERT_TRUE(store_->Load(&certs));
|
| - ASSERT_EQ(2U, certs.size());
|
| - ASSERT_STREQ("https://google.com", certs[0]->origin().c_str());
|
| - ASSERT_EQ(net::CLIENT_CERT_RSA_SIGN, certs[0]->type());
|
| - ASSERT_STREQ("\xaa", certs[0]->private_key().c_str());
|
| - ASSERT_STREQ("\xbb", certs[0]->cert().c_str());
|
| - ASSERT_STREQ("https://foo.com", certs[1]->origin().c_str());
|
| - ASSERT_EQ(net::CLIENT_CERT_RSA_SIGN, certs[1]->type());
|
| - ASSERT_STREQ("\xcc", certs[1]->private_key().c_str());
|
| - ASSERT_STREQ("\xdd", certs[1]->cert().c_str());
|
| -
|
| - STLDeleteContainerPointers(certs.begin(), certs.end());
|
| - certs.clear();
|
| + std::vector<net::DefaultOriginBoundCertStore::OriginBoundCert*> certs;
|
| + store_ = new SQLiteOriginBoundCertStore(v1_db_path);
|
| +
|
| + // Load the database and ensure the certs can be read and are marked as RSA.
|
| + ASSERT_TRUE(store_->Load(&certs));
|
| + ASSERT_EQ(2U, certs.size());
|
| +
|
| + ASSERT_STREQ("https://www.google.com:443", certs[0]->origin().c_str());
|
| + ASSERT_EQ(net::CLIENT_CERT_RSA_SIGN, certs[0]->type());
|
| + ASSERT_EQ(GetTestCertExpirationTime(),
|
| + certs[0]->expiration_time());
|
| + ASSERT_EQ(key_data, certs[0]->private_key());
|
| + ASSERT_EQ(cert_data, certs[0]->cert());
|
| +
|
| + ASSERT_STREQ("https://foo.com", certs[1]->origin().c_str());
|
| + ASSERT_EQ(net::CLIENT_CERT_RSA_SIGN, certs[1]->type());
|
| + // Undecodable cert, expiration time will be uninitialized.
|
| + ASSERT_EQ(base::Time(), certs[1]->expiration_time());
|
| + ASSERT_STREQ("\xaa", certs[1]->private_key().c_str());
|
| + ASSERT_STREQ("\xbb", certs[1]->cert().c_str());
|
| +
|
| + STLDeleteElements(&certs);
|
| +
|
| + store_ = NULL;
|
| + // Make sure we wait until the destructor has run.
|
| + scoped_refptr<base::ThreadTestHelper> helper(
|
| + new base::ThreadTestHelper(
|
| + BrowserThread::GetMessageLoopProxyForThread(BrowserThread::DB)));
|
| + ASSERT_TRUE(helper->Run());
|
| +
|
| + // Verify the database version is updated.
|
| + {
|
| + sql::Connection db;
|
| + ASSERT_TRUE(db.Open(v1_db_path));
|
| + sql::Statement smt(db.GetUniqueStatement(
|
| + "SELECT value FROM meta WHERE key = \"version\""));
|
| + ASSERT_TRUE(smt);
|
| + ASSERT_TRUE(smt.Step());
|
| + EXPECT_EQ(3, smt.ColumnInt(0));
|
| + EXPECT_FALSE(smt.Step());
|
| + }
|
| + }
|
| +}
|
|
|
| +TEST_F(SQLiteOriginBoundCertStoreTest, TestUpgradeV2) {
|
| + // Reset the store. We'll be using a different database for this test.
|
| store_ = NULL;
|
| - // Make sure we wait until the destructor has run.
|
| - scoped_refptr<base::ThreadTestHelper> helper(
|
| - new base::ThreadTestHelper(
|
| - BrowserThread::GetMessageLoopProxyForThread(BrowserThread::DB)));
|
| - ASSERT_TRUE(helper->Run());
|
|
|
| - // Verify the database version is updated.
|
| + FilePath v2_db_path(temp_dir_.path().AppendASCII("v2db"));
|
| +
|
| + std::string key_data;
|
| + std::string cert_data;
|
| + ReadTestKeyAndCert(&key_data, &cert_data);
|
| +
|
| + // Create a version 2 database.
|
| {
|
| sql::Connection db;
|
| - ASSERT_TRUE(db.Open(v1_db_path));
|
| - sql::Statement smt(db.GetUniqueStatement(
|
| - "SELECT value FROM meta WHERE key = \"version\""));
|
| - ASSERT_TRUE(smt);
|
| - ASSERT_TRUE(smt.Step());
|
| - EXPECT_EQ(2, smt.ColumnInt(0));
|
| - EXPECT_FALSE(smt.Step());
|
| + ASSERT_TRUE(db.Open(v2_db_path));
|
| + ASSERT_TRUE(db.Execute(
|
| + "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY,"
|
| + "value LONGVARCHAR);"
|
| + "INSERT INTO \"meta\" VALUES('version','2');"
|
| + "INSERT INTO \"meta\" VALUES('last_compatible_version','1');"
|
| + "CREATE TABLE origin_bound_certs ("
|
| + "origin TEXT NOT NULL UNIQUE PRIMARY KEY,"
|
| + "private_key BLOB NOT NULL,"
|
| + "cert BLOB NOT NULL,"
|
| + "cert_type INTEGER);"
|
| + ));
|
| +
|
| + sql::Statement add_smt(db.GetUniqueStatement(
|
| + "INSERT INTO origin_bound_certs (origin, private_key, cert, cert_type) "
|
| + "VALUES (?,?,?,?)"));
|
| + add_smt.BindString(0, "https://www.google.com:443");
|
| + add_smt.BindBlob(1, key_data.data(), key_data.size());
|
| + add_smt.BindBlob(2, cert_data.data(), cert_data.size());
|
| + add_smt.BindInt64(3, 1);
|
| + ASSERT_TRUE(add_smt.Run());
|
| +
|
| + ASSERT_TRUE(db.Execute(
|
| + "INSERT INTO \"origin_bound_certs\" VALUES("
|
| + "'https://foo.com',X'AA',X'BB',64);"
|
| + ));
|
| + }
|
| +
|
| + // Load and test the DB contents twice. First time ensures that we can use
|
| + // the updated values immediately. Second time ensures that the updated
|
| + // values are saved and read correctly on next load.
|
| + for (int i = 0; i < 2; ++i) {
|
| + SCOPED_TRACE(i);
|
| +
|
| + std::vector<net::DefaultOriginBoundCertStore::OriginBoundCert*> certs;
|
| + store_ = new SQLiteOriginBoundCertStore(v2_db_path);
|
| +
|
| + // Load the database and ensure the certs can be read and are marked as RSA.
|
| + ASSERT_TRUE(store_->Load(&certs));
|
| + ASSERT_EQ(2U, certs.size());
|
| +
|
| + ASSERT_STREQ("https://www.google.com:443", certs[0]->origin().c_str());
|
| + ASSERT_EQ(net::CLIENT_CERT_RSA_SIGN, certs[0]->type());
|
| + ASSERT_EQ(GetTestCertExpirationTime(),
|
| + certs[0]->expiration_time());
|
| + ASSERT_EQ(key_data, certs[0]->private_key());
|
| + ASSERT_EQ(cert_data, certs[0]->cert());
|
| +
|
| + ASSERT_STREQ("https://foo.com", certs[1]->origin().c_str());
|
| + ASSERT_EQ(net::CLIENT_CERT_ECDSA_SIGN, certs[1]->type());
|
| + // Undecodable cert, expiration time will be uninitialized.
|
| + ASSERT_EQ(base::Time(), certs[1]->expiration_time());
|
| + ASSERT_STREQ("\xaa", certs[1]->private_key().c_str());
|
| + ASSERT_STREQ("\xbb", certs[1]->cert().c_str());
|
| +
|
| + STLDeleteElements(&certs);
|
| +
|
| + store_ = NULL;
|
| + // Make sure we wait until the destructor has run.
|
| + scoped_refptr<base::ThreadTestHelper> helper(
|
| + new base::ThreadTestHelper(
|
| + BrowserThread::GetMessageLoopProxyForThread(BrowserThread::DB)));
|
| + ASSERT_TRUE(helper->Run());
|
| +
|
| + // Verify the database version is updated.
|
| + {
|
| + sql::Connection db;
|
| + ASSERT_TRUE(db.Open(v2_db_path));
|
| + sql::Statement smt(db.GetUniqueStatement(
|
| + "SELECT value FROM meta WHERE key = \"version\""));
|
| + ASSERT_TRUE(smt);
|
| + ASSERT_TRUE(smt.Step());
|
| + EXPECT_EQ(3, smt.ColumnInt(0));
|
| + EXPECT_FALSE(smt.Step());
|
| + }
|
| }
|
| }
|
|
|
| @@ -212,6 +356,7 @@ TEST_F(SQLiteOriginBoundCertStoreTest, TestFlush) {
|
| net::DefaultOriginBoundCertStore::OriginBoundCert(
|
| origin,
|
| net::CLIENT_CERT_RSA_SIGN,
|
| + base::Time(),
|
| private_key,
|
| cert));
|
| }
|
|
|