Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(218)

Side by Side Diff: chrome/browser/extensions/api/certificate_provider/certificate_provider_api.cc

Issue 2094333002: Implementation for chrome.certificateProvider.requestPin/stopPinRequest (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Implemented the stopPinRequest functionality Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/extensions/api/certificate_provider/certificate_provide r_api.h" 5 #include "chrome/browser/extensions/api/certificate_provider/certificate_provide r_api.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 #include <stdint.h> 8 #include <stdint.h>
9 9
10 #include <memory> 10 #include <memory>
11 #include <vector> 11 #include <vector>
12 12
13 #include "base/logging.h" 13 #include "base/logging.h"
14 #include "base/strings/utf_string_conversions.h"
14 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice.h" 15 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice.h"
15 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice_factory.h" 16 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice_factory.h"
16 #include "chrome/common/extensions/api/certificate_provider.h" 17 #include "chrome/common/extensions/api/certificate_provider.h"
17 #include "chrome/common/extensions/api/certificate_provider_internal.h" 18 #include "chrome/common/extensions/api/certificate_provider_internal.h"
19 #include "chrome/grit/generated_resources.h"
18 #include "content/public/common/console_message_level.h" 20 #include "content/public/common/console_message_level.h"
19 #include "net/cert/x509_certificate.h" 21 #include "net/cert/x509_certificate.h"
20 #include "net/ssl/ssl_private_key.h" 22 #include "net/ssl/ssl_private_key.h"
23 #include "ui/base/l10n/l10n_util.h"
21 24
22 namespace extensions { 25 namespace extensions {
23 26
24 namespace api_cp = api::certificate_provider; 27 namespace api_cp = api::certificate_provider;
25 namespace api_cpi = api::certificate_provider_internal; 28 namespace api_cpi = api::certificate_provider_internal;
26 29
27 namespace { 30 namespace {
28 31
29 const char kErrorInvalidX509Cert[] = 32 const char kErrorInvalidX509Cert[] =
30 "Certificate is not a valid X.509 certificate."; 33 "Certificate is not a valid X.509 certificate.";
31 const char kErrorECDSANotSupported[] = "Key type ECDSA not supported."; 34 const char kErrorECDSANotSupported[] = "Key type ECDSA not supported.";
32 const char kErrorUnknownKeyType[] = "Key type unknown."; 35 const char kErrorUnknownKeyType[] = "Key type unknown.";
33 const char kErrorAborted[] = "Request was aborted."; 36 const char kErrorAborted[] = "Request was aborted.";
34 const char kErrorTimeout[] = "Request timed out, reply rejected."; 37 const char kErrorTimeout[] = "Request timed out, reply rejected.";
35 38
36 } // namespace 39 } // namespace
37 40
41 const int MAX_CLOSED_DIALOGS_PER_10_MINUTES = 2;
42
38 CertificateProviderInternalReportCertificatesFunction:: 43 CertificateProviderInternalReportCertificatesFunction::
39 ~CertificateProviderInternalReportCertificatesFunction() {} 44 ~CertificateProviderInternalReportCertificatesFunction() {}
40 45
41 ExtensionFunction::ResponseAction 46 ExtensionFunction::ResponseAction
42 CertificateProviderInternalReportCertificatesFunction::Run() { 47 CertificateProviderInternalReportCertificatesFunction::Run() {
43 std::unique_ptr<api_cpi::ReportCertificates::Params> params( 48 std::unique_ptr<api_cpi::ReportCertificates::Params> params(
44 api_cpi::ReportCertificates::Params::Create(*args_)); 49 api_cpi::ReportCertificates::Params::Create(*args_));
45 EXTENSION_FUNCTION_VALIDATE(params); 50 EXTENSION_FUNCTION_VALIDATE(params);
46 51
47 chromeos::CertificateProviderService* const service = 52 chromeos::CertificateProviderService* const service =
(...skipping 93 matching lines...) Expand 10 before | Expand all | Expand 10 after
141 out_info->supported_hashes.push_back(net::SSLPrivateKey::Hash::SHA512); 146 out_info->supported_hashes.push_back(net::SSLPrivateKey::Hash::SHA512);
142 break; 147 break;
143 case api_cp::HASH_NONE: 148 case api_cp::HASH_NONE:
144 NOTREACHED(); 149 NOTREACHED();
145 return false; 150 return false;
146 } 151 }
147 } 152 }
148 return true; 153 return true;
149 } 154 }
150 155
156 base::string16 GetErrorMessageForType(api_cp::PinRequestErrorType error_type) {
157 switch (error_type) {
158 case api_cp::PinRequestErrorType::PIN_REQUEST_ERROR_TYPE_INVALID_PIN:
159 return l10n_util::GetStringUTF16(
160 IDS_REQUEST_PIN_DIALOG_INVALID_PIN_ERROR);
161 case api_cp::PinRequestErrorType::PIN_REQUEST_ERROR_TYPE_INVALID_PUK:
162 return l10n_util::GetStringUTF16(
163 IDS_REQUEST_PIN_DIALOG_INVALID_PUK_ERROR);
164 case
165 api_cp::PinRequestErrorType::PIN_REQUEST_ERROR_TYPE_MAX_ATTEMPTS_EXCEEDED:
166 return l10n_util::GetStringUTF16(
167 IDS_REQUEST_PIN_DIALOG_MAX_ATTEMPTS_EXCEEDED_ERROR);
168 case api_cp::PinRequestErrorType::PIN_REQUEST_ERROR_TYPE_UNKNOWN_ERROR:
169 return l10n_util::GetStringUTF16(
170 IDS_REQUEST_PIN_DIALOG_UNKNOWN_ERROR);
171 case api_cp::PinRequestErrorType::PIN_REQUEST_ERROR_TYPE_NONE:
172 return base::string16();
173 }
174 }
stevenjb 2016/08/09 21:04:39 This is UI code, it shouldn't be in the API. We sh
igorcov1 2016/08/10 18:05:04 Done.
175
176 CertificateProviderStopPinRequestFunction::
177 ~CertificateProviderStopPinRequestFunction() {}
178
179 ExtensionFunction::ResponseAction
180 CertificateProviderStopPinRequestFunction::Run() {
181 std::unique_ptr<api_cp::RequestPin::Params> params(
182 api_cp::RequestPin::Params::Create(*args_));
183 EXTENSION_FUNCTION_VALIDATE(params.get());
184
185 base::string16 error_message = GetErrorMessageForType(
186 params->details.error_type);
187 chromeos::CertificateProviderService* const service =
188 chromeos::CertificateProviderServiceFactory::GetForBrowserContext(
189 browser_context());
190 DCHECK(service);
191 if (error_message.empty()) {
192 bool dialog_closed = service->CloseDialog(extension_id());
193 if (!dialog_closed) {
194 // This might happen if the user closed the dialog while extension was
195 // processing the input.
196 LOG(ERROR) << "Wrong extension requesting to close the dialog";
197 return RespondNow(Error("No active dialog from extension."));
198 }
199
200 std::unique_ptr<base::ListValue> create_results(new base::ListValue());
201 return RespondNow(ArgumentList(std::move(create_results)));
202 } else {
stevenjb 2016/08/09 21:04:39 no else
igorcov1 2016/08/10 18:05:04 Done.
203 bool success = service->UpdatePinDialog(
204 extension()->id(),
205 error_message,
206 false,
207 base::Bind(&CertificateProviderStopPinRequestFunction::DialogClosed,
208 this));
209 if (success) {
210 return RespondLater();
211 } else {
stevenjb 2016/08/09 21:04:39 invert, no else
igorcov1 2016/08/10 18:05:04 Done.
212 return RespondNow(Error("No active dialog from extension."));
213 }
214 }
215 }
216
217 void CertificateProviderStopPinRequestFunction::DialogClosed(
218 const base::string16& value) {
219 std::unique_ptr<base::ListValue> create_results(new base::ListValue());
220 chromeos::CertificateProviderService* const service =
221 chromeos::CertificateProviderServiceFactory::GetForBrowserContext(
222 browser_context());
223 DCHECK(service);
224
225 Respond(ArgumentList(std::move(create_results)));
226 service->OnPinDialogInput(extension_id(), true);
227 }
228
229 CertificateProviderRequestPinFunction::
230 ~CertificateProviderRequestPinFunction() {}
231
232 bool CertificateProviderRequestPinFunction::ShouldSkipQuotaLimiting() const {
233 chromeos::CertificateProviderService* const service =
234 chromeos::CertificateProviderServiceFactory::GetForBrowserContext(
235 browser_context());
236 DCHECK(service);
237
238 return !service->LastPinDialogClosed(extension_id());
239 }
240
241 void CertificateProviderRequestPinFunction::GetQuotaLimitHeuristics(
242 extensions::QuotaLimitHeuristics* heuristics) const {
243 QuotaLimitHeuristic::Config short_limit_config = {
244 extensions::MAX_CLOSED_DIALOGS_PER_10_MINUTES,
245 base::TimeDelta::FromMinutes(1)};
246 heuristics->push_back(new QuotaService::TimedLimit(
247 short_limit_config, new QuotaLimitHeuristic::SingletonBucketMapper(),
248 "MAX_SHOW_DIALOGS_PER_MINUTE"));
249 }
250
251 ExtensionFunction::ResponseAction
252 CertificateProviderRequestPinFunction::Run() {
253 std::unique_ptr<api_cp::RequestPin::Params> params(
254 api_cp::RequestPin::Params::Create(*args_));
255 EXTENSION_FUNCTION_VALIDATE(params.get());
256
257 api_cp::PinRequestType pin_dialog_type =
258 (params->details.request_type) ?
259 params->details.request_type :
260 api_cp::PinRequestType::PIN_REQUEST_TYPE_PIN;
261
262 base::string16 error_message = GetErrorMessageForType(
263 params->details.error_type);
264
265 bool accept_input = true;
266 if (params->details.attempts_left) {
267 int attempts_left = *(params->details.attempts_left.get());
268 accept_input = attempts_left > 0;
269 error_message.append(l10n_util::GetStringFUTF16(
270 IDS_REQUEST_PIN_DIALOG_ATTEMPTS_LEFT,
271 base::ASCIIToUTF16(std::to_string(attempts_left))));
272 }
273
274 const std::string dialog_type =
275 (pin_dialog_type == api_cp::PinRequestType::PIN_REQUEST_TYPE_PIN) ?
276 "PIN: " : "PUK: ";
277
278 chromeos::CertificateProviderService* const service =
279 chromeos::CertificateProviderServiceFactory::GetForBrowserContext(
280 browser_context());
281 DCHECK(service);
282
283 chromeos::RequestPinResponse success = service->ShowPinDialog(
284 extension()->id(),
285 extension()->name(),
286 params->details.sign_request_id,
287 dialog_type,
288 error_message,
289 accept_input,
290 base::Bind(&CertificateProviderRequestPinFunction::OnInputReceived,
291 this));
292 switch (success) {
293 case chromeos::RequestPinResponse::SUCCESS: return RespondLater();
294 case chromeos::RequestPinResponse::INVALID_ID:
295 return RespondNow(Error("Invalid signRequestId"));
296 case chromeos::RequestPinResponse::OTHER_FLOW_IN_PROGRESS:
297 return RespondNow(Error("Other flow in progress"));
298 }
299 }
300
301 void CertificateProviderRequestPinFunction::OnInputReceived(
302 const base::string16& value) {
303 std::unique_ptr<base::ListValue> create_results(new base::ListValue());
304 chromeos::CertificateProviderService* const service =
305 chromeos::CertificateProviderServiceFactory::GetForBrowserContext(
306 browser_context());
307 DCHECK(service);
308 if (!value.empty()) {
309 api::certificate_provider::PinResponseDetails details;
310 details.user_input.reset(new std::string(value.begin(), value.end()));
311 create_results->Append(details.ToValue());
312 }
313
314 Respond(ArgumentList(std::move(create_results)));
315 service->OnPinDialogInput(extension_id(), value.empty());
316 }
317
151 CertificateProviderInternalReportSignatureFunction:: 318 CertificateProviderInternalReportSignatureFunction::
152 ~CertificateProviderInternalReportSignatureFunction() {} 319 ~CertificateProviderInternalReportSignatureFunction() {}
153 320
154 ExtensionFunction::ResponseAction 321 ExtensionFunction::ResponseAction
155 CertificateProviderInternalReportSignatureFunction::Run() { 322 CertificateProviderInternalReportSignatureFunction::Run() {
156 std::unique_ptr<api_cpi::ReportSignature::Params> params( 323 std::unique_ptr<api_cpi::ReportSignature::Params> params(
157 api_cpi::ReportSignature::Params::Create(*args_)); 324 api_cpi::ReportSignature::Params::Create(*args_));
158 EXTENSION_FUNCTION_VALIDATE(params); 325 EXTENSION_FUNCTION_VALIDATE(params);
159 326
160 chromeos::CertificateProviderService* const service = 327 chromeos::CertificateProviderService* const service =
161 chromeos::CertificateProviderServiceFactory::GetForBrowserContext( 328 chromeos::CertificateProviderServiceFactory::GetForBrowserContext(
162 browser_context()); 329 browser_context());
163 DCHECK(service); 330 DCHECK(service);
164 331
165 std::vector<uint8_t> signature; 332 std::vector<uint8_t> signature;
166 // If an error occurred, |signature| will not be set. 333 // If an error occurred, |signature| will not be set.
167 if (params->signature) 334 if (params->signature)
168 signature.assign(params->signature->begin(), params->signature->end()); 335 signature.assign(params->signature->begin(), params->signature->end());
169 336
170 service->ReplyToSignRequest(extension_id(), params->request_id, signature); 337 service->ReplyToSignRequest(extension_id(), params->request_id, signature);
171 return RespondNow(NoArguments()); 338 return RespondNow(NoArguments());
172 } 339 }
173 340
174 } // namespace extensions 341 } // namespace extensions
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698