OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice_factory.h" | |
6 | |
7 #include <string> | |
8 #include <vector> | |
9 | |
10 #include "base/logging.h" | |
11 #include "base/memory/scoped_ptr.h" | |
12 #include "base/memory/singleton.h" | |
13 #include "base/values.h" | |
14 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice.h" | |
15 #include "chrome/browser/chromeos/profiles/profile_helper.h" | |
16 #include "chrome/browser/profiles/incognito_helpers.h" | |
17 #include "chrome/browser/profiles/profile.h" | |
18 #include "chrome/common/extensions/api/certificate_provider.h" | |
19 #include "components/keyed_service/content/browser_context_dependency_manager.h" | |
20 #include "extensions/browser/event_listener_map.h" | |
21 #include "extensions/browser/event_router.h" | |
22 #include "extensions/browser/event_router_factory.h" | |
23 #include "extensions/browser/extension_event_histogram_value.h" | |
24 #include "extensions/browser/extension_registry.h" | |
25 #include "extensions/browser/extension_registry_factory.h" | |
26 #include "extensions/browser/extension_registry_observer.h" | |
27 #include "extensions/common/extension.h" | |
28 #include "net/ssl/ssl_private_key.h" | |
29 | |
30 namespace chromeos { | |
31 | |
32 namespace { | |
33 | |
34 namespace api_cp = extensions::api::certificate_provider; | |
35 | |
36 class DefaultDelegate : public CertificateProviderService::Delegate, | |
37 public extensions::ExtensionRegistryObserver { | |
38 public: | |
39 DefaultDelegate(CertificateProviderService* service, | |
40 extensions::ExtensionRegistry* registry, | |
41 extensions::EventRouter* event_router); | |
42 ~DefaultDelegate() override; | |
43 | |
44 // CertificateProviderService::Delegate: | |
45 std::vector<std::string> CertificateProviderExtensions() override; | |
46 void BroadcastCertificateRequest(int request_id) override; | |
47 bool DispatchSignRequestToExtension( | |
48 const std::string& extension_id, | |
49 int request_id, | |
50 net::SSLPrivateKey::Hash hash, | |
51 const scoped_refptr<net::X509Certificate>& certificate, | |
52 const std::string& digest) override; | |
53 | |
54 // extensions::ExtensionRegistryObserver: | |
55 void OnExtensionUnloaded( | |
56 content::BrowserContext* browser_context, | |
57 const extensions::Extension* extension, | |
58 extensions::UnloadedExtensionInfo::Reason reason) override; | |
59 | |
60 private: | |
61 CertificateProviderService* const service_; | |
62 extensions::ExtensionRegistry* const registry_; | |
63 extensions::EventRouter* const event_router_; | |
64 | |
65 DISALLOW_COPY_AND_ASSIGN(DefaultDelegate); | |
66 }; | |
67 | |
68 DefaultDelegate::DefaultDelegate(CertificateProviderService* service, | |
69 extensions::ExtensionRegistry* registry, | |
70 extensions::EventRouter* event_router) | |
71 : service_(service), registry_(registry), event_router_(event_router) { | |
72 DCHECK(service_); | |
73 DCHECK(event_router_); | |
74 registry_->AddObserver(this); | |
75 } | |
76 | |
77 DefaultDelegate::~DefaultDelegate() { | |
78 registry_->RemoveObserver(this); | |
79 } | |
80 | |
81 std::vector<std::string> DefaultDelegate::CertificateProviderExtensions() { | |
82 const std::string event_name(api_cp::OnCertificatesRequested::kEventName); | |
83 std::vector<std::string> ids; | |
84 for (const auto& listener : | |
85 event_router_->listeners().GetEventListenersByName(event_name)) { | |
86 ids.push_back(listener->extension_id()); | |
87 } | |
88 return ids; | |
89 } | |
90 | |
91 void DefaultDelegate::BroadcastCertificateRequest(int request_id) { | |
92 const std::string event_name(api_cp::OnCertificatesRequested::kEventName); | |
93 scoped_ptr<base::ListValue> internal_args(new base::ListValue); | |
94 internal_args->AppendInteger(request_id); | |
95 scoped_ptr<extensions::Event> event(new extensions::Event( | |
96 extensions::events::CERTIFICATEPROVIDER_ON_CERTIFICATES_REQUESTED, | |
97 event_name, internal_args.Pass())); | |
98 event_router_->BroadcastEvent(event.Pass()); | |
99 } | |
100 | |
101 bool DefaultDelegate::DispatchSignRequestToExtension( | |
102 const std::string& extension_id, | |
103 int request_id, | |
104 net::SSLPrivateKey::Hash hash, | |
105 const scoped_refptr<net::X509Certificate>& certificate, | |
106 const std::string& digest) { | |
107 const std::string event_name(api_cp::OnSignDigestRequested::kEventName); | |
108 if (!event_router_->ExtensionHasEventListener(extension_id, event_name)) | |
109 return false; | |
110 | |
111 api_cp::SignRequest request; | |
112 switch (hash) { | |
113 case net::SSLPrivateKey::Hash::MD5_SHA1: | |
114 request.hash = api_cp::HASH_MD5_SHA1; | |
115 break; | |
116 case net::SSLPrivateKey::Hash::SHA1: | |
117 request.hash = api_cp::HASH_SHA1; | |
118 break; | |
119 case net::SSLPrivateKey::Hash::SHA256: | |
120 request.hash = api_cp::HASH_SHA256; | |
121 break; | |
122 case net::SSLPrivateKey::Hash::SHA384: | |
123 request.hash = api_cp::HASH_SHA384; | |
124 break; | |
125 case net::SSLPrivateKey::Hash::SHA512: | |
126 request.hash = api_cp::HASH_SHA512; | |
127 break; | |
128 } | |
emaxx
2015/09/07 17:35:14
Maybe worth adding "default: NOTREACHED();".
pneubeck (no reviews)
2015/09/08 15:30:50
As it is, the compiler complains about a missing c
| |
129 request.digest.assign(digest.begin(), digest.end()); | |
130 std::string cert_der; | |
131 if (!net::X509Certificate::GetDEREncoded(certificate->os_cert_handle(), | |
bartfab (slow)
2015/09/08 14:55:17
Nit 1: #include "src/net/cert/x509_certificate.h"
pneubeck (no reviews)
2015/09/08 15:30:50
Done.
| |
132 &cert_der)) { | |
133 LOG(ERROR) << "Could not DER encode the certificate."; | |
134 return false; // Behave as if the extension wasn't registered anymore. | |
135 } | |
136 request.certificate.assign(cert_der.begin(), cert_der.end()); | |
137 | |
138 scoped_ptr<base::ListValue> internal_args(new base::ListValue); | |
139 internal_args->AppendInteger(request_id); | |
140 internal_args->Append(request.ToValue().Pass()); | |
141 | |
142 event_router_->DispatchEventToExtension( | |
143 extension_id, | |
144 make_scoped_ptr(new extensions::Event( | |
145 extensions::events::CERTIFICATEPROVIDER_ON_SIGN_DIGEST_REQUESTED, | |
146 event_name, internal_args.Pass()))); | |
147 return true; | |
148 } | |
149 | |
150 void DefaultDelegate::OnExtensionUnloaded( | |
151 content::BrowserContext* browser_context, | |
152 const extensions::Extension* extension, | |
153 extensions::UnloadedExtensionInfo::Reason reason) { | |
154 service_->OnExtensionUnloaded(extension->id()); | |
155 } | |
156 | |
157 } // namespace | |
158 | |
159 // static | |
160 CertificateProviderService* | |
161 CertificateProviderServiceFactory::GetForBrowserContext( | |
162 content::BrowserContext* context) { | |
163 return static_cast<CertificateProviderService*>( | |
164 GetInstance()->GetServiceForBrowserContext(context, true)); | |
165 } | |
166 | |
167 // static | |
168 CertificateProviderServiceFactory* | |
169 CertificateProviderServiceFactory::GetInstance() { | |
170 return Singleton<CertificateProviderServiceFactory>::get(); | |
171 } | |
172 | |
173 CertificateProviderServiceFactory::CertificateProviderServiceFactory() | |
174 : BrowserContextKeyedServiceFactory( | |
175 "CertificateProviderService", | |
176 BrowserContextDependencyManager::GetInstance()) { | |
177 DependsOn(extensions::EventRouterFactory::GetInstance()); | |
178 DependsOn(extensions::ExtensionRegistryFactory::GetInstance()); | |
179 } | |
180 | |
181 content::BrowserContext* | |
182 CertificateProviderServiceFactory::GetBrowserContextToUse( | |
183 content::BrowserContext* context) const { | |
184 return chrome::GetBrowserContextRedirectedInIncognito(context); | |
185 } | |
186 | |
187 bool CertificateProviderServiceFactory::ServiceIsNULLWhileTesting() const { | |
188 return true; | |
189 } | |
190 | |
191 KeyedService* CertificateProviderServiceFactory::BuildServiceInstanceFor( | |
192 content::BrowserContext* context) const { | |
193 if (chromeos::ProfileHelper::IsSigninProfile( | |
194 Profile::FromBrowserContext(context))) { | |
195 return nullptr; | |
196 } | |
197 CertificateProviderService* const service = new CertificateProviderService(); | |
198 service->SetDelegate(make_scoped_ptr(new DefaultDelegate( | |
199 service, | |
200 extensions::ExtensionRegistryFactory::GetForBrowserContext(context), | |
201 extensions::EventRouterFactory::GetForBrowserContext(context)))); | |
202 return service; | |
203 } | |
204 | |
205 } // namespace chromeos | |
OLD | NEW |