Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <stddef.h> | 5 #include <stddef.h> |
| 6 #include <stdint.h> | 6 #include <stdint.h> |
| 7 #include <stdlib.h> | 7 #include <stdlib.h> |
| 8 | 8 |
| 9 #include <memory> | 9 #include <memory> |
| 10 #include <string> | 10 #include <string> |
| 11 #include <vector> | 11 #include <vector> |
| 12 | 12 |
| 13 #include "base/bind.h" | 13 #include "base/bind.h" |
| 14 #include "base/callback.h" | 14 #include "base/callback.h" |
| 15 #include "base/files/file_path.h" | 15 #include "base/files/file_path.h" |
| 16 #include "base/files/file_util.h" | 16 #include "base/files/file_util.h" |
| 17 #include "base/run_loop.h" | 17 #include "base/run_loop.h" |
| 18 #include "base/strings/string_number_conversions.h" | 18 #include "base/strings/string_number_conversions.h" |
| 19 #include "base/strings/utf_string_conversions.h" | 19 #include "base/strings/utf_string_conversions.h" |
| 20 #include "base/values.h" | 20 #include "base/values.h" |
| 21 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice.h" | |
| 22 #include "chrome/browser/chromeos/certificate_provider/certificate_provider_serv ice_factory.h" | |
| 23 #include "chrome/browser/extensions/api/certificate_provider/certificate_provide r_api.h" | |
| 21 #include "chrome/browser/extensions/extension_apitest.h" | 24 #include "chrome/browser/extensions/extension_apitest.h" |
| 22 #include "chrome/browser/ui/tabs/tab_strip_model.h" | 25 #include "chrome/browser/ui/tabs/tab_strip_model.h" |
| 23 #include "chrome/test/base/ui_test_utils.h" | 26 #include "chrome/test/base/ui_test_utils.h" |
| 24 #include "components/policy/core/browser/browser_policy_connector.h" | 27 #include "components/policy/core/browser/browser_policy_connector.h" |
| 25 #include "components/policy/core/common/mock_configuration_policy_provider.h" | 28 #include "components/policy/core/common/mock_configuration_policy_provider.h" |
| 26 #include "components/policy/core/common/policy_map.h" | 29 #include "components/policy/core/common/policy_map.h" |
| 27 #include "components/policy/core/common/policy_types.h" | 30 #include "components/policy/core/common/policy_types.h" |
| 28 #include "components/policy/policy_constants.h" | 31 #include "components/policy/policy_constants.h" |
| 29 #include "content/public/browser/render_frame_host.h" | 32 #include "content/public/browser/render_frame_host.h" |
| 30 #include "content/public/browser/web_contents.h" | 33 #include "content/public/browser/web_contents.h" |
| 31 #include "content/public/test/test_navigation_observer.h" | 34 #include "content/public/test/test_navigation_observer.h" |
| 32 #include "content/public/test/test_utils.h" | 35 #include "content/public/test/test_utils.h" |
| 33 #include "crypto/rsa_private_key.h" | 36 #include "crypto/rsa_private_key.h" |
| 34 #include "extensions/common/extension.h" | 37 #include "extensions/common/extension.h" |
| 38 #include "extensions/test/extension_test_message_listener.h" | |
| 35 #include "extensions/test/result_catcher.h" | 39 #include "extensions/test/result_catcher.h" |
| 36 #include "net/test/spawned_test_server/spawned_test_server.h" | 40 #include "net/test/spawned_test_server/spawned_test_server.h" |
| 37 #include "testing/gmock/include/gmock/gmock.h" | 41 #include "testing/gmock/include/gmock/gmock.h" |
| 38 #include "third_party/boringssl/src/include/openssl/evp.h" | 42 #include "third_party/boringssl/src/include/openssl/evp.h" |
| 39 #include "third_party/boringssl/src/include/openssl/rsa.h" | 43 #include "third_party/boringssl/src/include/openssl/rsa.h" |
| 44 #include "ui/views/controls/label.h" | |
| 45 #include "ui/views/controls/textfield/textfield.h" | |
| 46 #include "ui/views/widget/widget.h" | |
| 47 #include "ui/views/widget/widget_observer.h" | |
| 40 | 48 |
| 41 using testing::Return; | 49 using testing::Return; |
| 42 using testing::_; | 50 using testing::_; |
| 43 | 51 |
| 44 namespace { | 52 namespace { |
| 45 | 53 |
| 46 void IgnoreResult(const base::Closure& callback, const base::Value* value) { | 54 void IgnoreResult(const base::Closure& callback, const base::Value* value) { |
| 47 callback.Run(); | 55 callback.Run(); |
| 48 } | 56 } |
| 49 | 57 |
| (...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 114 std::string JsUint8Array(const std::vector<uint8_t>& bytes) { | 122 std::string JsUint8Array(const std::vector<uint8_t>& bytes) { |
| 115 std::string res = "new Uint8Array(["; | 123 std::string res = "new Uint8Array(["; |
| 116 for (const uint8_t byte : bytes) { | 124 for (const uint8_t byte : bytes) { |
| 117 res += base::UintToString(byte); | 125 res += base::UintToString(byte); |
| 118 res += ", "; | 126 res += ", "; |
| 119 } | 127 } |
| 120 res += "])"; | 128 res += "])"; |
| 121 return res; | 129 return res; |
| 122 } | 130 } |
| 123 | 131 |
| 132 // Enters the code in the ShowPinDialog window and pushes the OK event. | |
| 133 void EnterCode(chromeos::CertificateProviderService* service, | |
| 134 const base::string16& code) { | |
| 135 chromeos::RequestPinView* view = | |
| 136 service->pin_dialog_manager()->active_view_for_testing(); | |
| 137 view->textfield_for_testing()->SetText(code); | |
| 138 view->Accept(); | |
| 139 base::RunLoop().RunUntilIdle(); | |
| 140 } | |
| 141 | |
| 142 // Enters the valid code for extensions from local example folders, in the | |
| 143 // ShowPinDialog window and waits for the window to close. The extension code | |
| 144 // is expected to send "Success" message after the validation and request to | |
| 145 // stopPinRequest is done. | |
| 146 void EnterCorrectPin(chromeos::CertificateProviderService* service) { | |
| 147 ExtensionTestMessageListener listener(false); | |
| 148 EnterCode(service, base::ASCIIToUTF16("1234")); | |
| 149 ASSERT_TRUE(listener.WaitUntilSatisfied()); | |
| 150 EXPECT_EQ("Success", listener.message()); | |
| 151 } | |
| 152 | |
| 153 // Enters an invalid code for extensions from local example folders, in the | |
| 154 // ShowPinDialog window and waits for the window to update with the error. The | |
| 155 // extension code is expected to send "Invalid PIN" message after the validation | |
| 156 // and the new requestPin (with the error) is done. | |
| 157 void EnterWrongPin(chromeos::CertificateProviderService* service) { | |
| 158 ExtensionTestMessageListener listener(false); | |
| 159 EnterCode(service, base::ASCIIToUTF16("567")); | |
| 160 ASSERT_TRUE(listener.WaitUntilSatisfied()); | |
| 161 EXPECT_EQ("Invalid PIN", listener.message()); | |
| 162 | |
| 163 // Check that we have an error message displayed. | |
| 164 chromeos::RequestPinView* view = | |
| 165 service->pin_dialog_manager()->active_view_for_testing(); | |
| 166 EXPECT_EQ(SK_ColorRED, view->error_label_for_testing()->enabled_color()); | |
| 167 } | |
| 168 | |
| 124 class CertificateProviderApiTest : public ExtensionApiTest { | 169 class CertificateProviderApiTest : public ExtensionApiTest { |
| 125 public: | 170 public: |
| 126 CertificateProviderApiTest() {} | 171 CertificateProviderApiTest() {} |
| 127 | 172 |
| 128 void SetUpInProcessBrowserTestFixture() override { | 173 void SetUpInProcessBrowserTestFixture() override { |
| 129 EXPECT_CALL(provider_, IsInitializationComplete(_)) | 174 EXPECT_CALL(provider_, IsInitializationComplete(_)) |
| 130 .WillRepeatedly(Return(true)); | 175 .WillRepeatedly(Return(true)); |
| 131 policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_); | 176 policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_); |
| 132 | 177 |
| 133 ExtensionApiTest::SetUpInProcessBrowserTestFixture(); | 178 ExtensionApiTest::SetUpInProcessBrowserTestFixture(); |
| (...skipping 15 matching lines...) Expand all Loading... | |
| 149 nullptr); | 194 nullptr); |
| 150 provider_.UpdateChromePolicy(policy); | 195 provider_.UpdateChromePolicy(policy); |
| 151 | 196 |
| 152 content::RunAllPendingInMessageLoop(); | 197 content::RunAllPendingInMessageLoop(); |
| 153 } | 198 } |
| 154 | 199 |
| 155 protected: | 200 protected: |
| 156 policy::MockConfigurationPolicyProvider provider_; | 201 policy::MockConfigurationPolicyProvider provider_; |
| 157 }; | 202 }; |
| 158 | 203 |
| 204 class CertificateProviderRequestPinTest : public CertificateProviderApiTest { | |
| 205 public: | |
| 206 // Loads certificate_provider extension from |folder| and |file_name|. | |
| 207 // Returns the CertificateProviderService object from browser context. | |
| 208 chromeos::CertificateProviderService* LoadRequestPinExtension( | |
| 209 const std::string& folder, | |
| 210 const std::string& file_name) { | |
| 211 const base::FilePath extension_path = | |
| 212 test_data_dir_.AppendASCII("certificate_provider/" + folder); | |
| 213 const extensions::Extension* const extension = | |
| 214 LoadExtension(extension_path); | |
| 215 chromeos::CertificateProviderService* service = | |
| 216 chromeos::CertificateProviderServiceFactory::GetForBrowserContext( | |
| 217 profile()); | |
| 218 service->pin_dialog_manager()->AddSignRequestId(extension->id(), 123); | |
| 219 ui_test_utils::NavigateToURL(browser(), | |
| 220 extension->GetResourceURL(file_name)); | |
| 221 return service; | |
| 222 } | |
| 223 }; | |
| 224 | |
| 159 } // namespace | 225 } // namespace |
| 160 | 226 |
| 161 IN_PROC_BROWSER_TEST_F(CertificateProviderApiTest, Basic) { | 227 IN_PROC_BROWSER_TEST_F(CertificateProviderApiTest, Basic) { |
| 162 // Start an HTTPS test server that requests a client certificate. | 228 // Start an HTTPS test server that requests a client certificate. |
| 163 net::SpawnedTestServer::SSLOptions ssl_options; | 229 net::SpawnedTestServer::SSLOptions ssl_options; |
| 164 ssl_options.request_client_certificate = true; | 230 ssl_options.request_client_certificate = true; |
| 165 net::SpawnedTestServer https_server(net::SpawnedTestServer::TYPE_HTTPS, | 231 net::SpawnedTestServer https_server(net::SpawnedTestServer::TYPE_HTTPS, |
| 166 ssl_options, base::FilePath()); | 232 ssl_options, base::FilePath()); |
| 167 ASSERT_TRUE(https_server.Start()); | 233 ASSERT_TRUE(https_server.Start()); |
| 168 | 234 |
| (...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 260 base::RunLoop run_loop; | 326 base::RunLoop run_loop; |
| 261 const std::string code = "replyWithSignatureSecondTime();"; | 327 const std::string code = "replyWithSignatureSecondTime();"; |
| 262 bool result = false; | 328 bool result = false; |
| 263 extension_contents->GetMainFrame()->ExecuteJavaScriptForTests( | 329 extension_contents->GetMainFrame()->ExecuteJavaScriptForTests( |
| 264 base::ASCIIToUTF16(code), | 330 base::ASCIIToUTF16(code), |
| 265 base::Bind(&StoreBool, &result, run_loop.QuitClosure())); | 331 base::Bind(&StoreBool, &result, run_loop.QuitClosure())); |
| 266 run_loop.Run(); | 332 run_loop.Run(); |
| 267 EXPECT_TRUE(result); | 333 EXPECT_TRUE(result); |
| 268 } | 334 } |
| 269 } | 335 } |
| 336 | |
| 337 // User enters the correct PIN. | |
| 338 IN_PROC_BROWSER_TEST_F(CertificateProviderRequestPinTest, ShowPinDialogAccept) { | |
| 339 chromeos::CertificateProviderService* service = | |
| 340 LoadRequestPinExtension("request_pin", "basic.html"); | |
| 341 | |
| 342 // Enter the valid PIN. | |
| 343 EnterCorrectPin(service); | |
| 344 | |
| 345 // The view should be set to nullptr when the window is closed. | |
| 346 EXPECT_EQ(service->pin_dialog_manager()->active_view_for_testing(), nullptr); | |
| 347 } | |
| 348 | |
| 349 // User closes the dialog kMaxClosedDialogsPer10Mins times, and the extension | |
| 350 // should be blocked from showing it again. | |
| 351 IN_PROC_BROWSER_TEST_F(CertificateProviderRequestPinTest, ShowPinDialogClose) { | |
| 352 chromeos::CertificateProviderService* service = | |
| 353 LoadRequestPinExtension("request_pin", "basic.html"); | |
| 354 | |
| 355 views::Widget* window = | |
| 356 service->pin_dialog_manager()->active_window_for_testing(); | |
| 357 for (int i = 0; | |
| 358 i < extensions::api::certificate_provider::kMaxClosedDialogsPer10Mins; | |
| 359 i++) { | |
| 360 ExtensionTestMessageListener listener(false); | |
| 361 window->Close(); | |
| 362 ASSERT_TRUE(listener.WaitUntilSatisfied()); | |
| 363 EXPECT_EQ("User closed the dialog", listener.message()); | |
|
Devlin
2016/11/29 21:09:04
Here and below, you can pass an expected message t
igorcov
2016/11/30 15:32:38
Done.
| |
| 364 window = service->pin_dialog_manager()->active_window_for_testing(); | |
| 365 } | |
| 366 | |
| 367 std::unique_ptr<ExtensionTestMessageListener> listener( | |
| 368 new ExtensionTestMessageListener(true)); | |
| 369 window->Close(); | |
| 370 ASSERT_TRUE(listener->WaitUntilSatisfied()); | |
| 371 EXPECT_EQ("User closed the dialog", listener->message()); | |
| 372 listener->Reply("GetLastError"); | |
| 373 listener.reset(new ExtensionTestMessageListener(false)); | |
|
Devlin
2016/11/29 21:09:04
nit: I'd just use two different listeners (stack-a
igorcov
2016/11/30 15:32:38
Done.
| |
| 374 ASSERT_TRUE(listener->WaitUntilSatisfied()); | |
| 375 EXPECT_EQ( | |
| 376 "This request exceeds the MAX_PIN_DIALOGS_CLOSED_PER_10_MINUTES quota.", | |
| 377 listener->message()); | |
| 378 EXPECT_EQ(service->pin_dialog_manager()->active_view_for_testing(), nullptr); | |
| 379 } | |
| 380 | |
| 381 // User enters a wrong PIN first and a correct PIN on the second try. | |
| 382 IN_PROC_BROWSER_TEST_F(CertificateProviderRequestPinTest, | |
| 383 ShowPinDialogWrongPin) { | |
| 384 chromeos::CertificateProviderService* service = | |
| 385 LoadRequestPinExtension("request_pin", "basic.html"); | |
| 386 EnterWrongPin(service); | |
| 387 | |
| 388 // The window should be active. | |
| 389 EXPECT_EQ( | |
| 390 service->pin_dialog_manager()->active_window_for_testing()->IsVisible(), | |
| 391 true); | |
| 392 EXPECT_NE(service->pin_dialog_manager()->active_view_for_testing(), nullptr); | |
| 393 | |
| 394 // Enter the valid PIN. | |
| 395 EnterCorrectPin(service); | |
| 396 | |
| 397 // The view should be set to nullptr when the window is closed. | |
| 398 EXPECT_EQ(service->pin_dialog_manager()->active_view_for_testing(), nullptr); | |
| 399 } | |
| 400 | |
| 401 // User enters wrong PIN three times. | |
| 402 IN_PROC_BROWSER_TEST_F(CertificateProviderRequestPinTest, | |
| 403 ShowPinDialogWrongPinThreeTimes) { | |
| 404 chromeos::CertificateProviderService* service = | |
| 405 LoadRequestPinExtension("request_pin", "basic.html"); | |
| 406 for (int i = 0; i < 3; i++) { | |
| 407 EnterWrongPin(service); | |
| 408 } | |
| 409 | |
| 410 chromeos::RequestPinView* view = | |
| 411 service->pin_dialog_manager()->active_view_for_testing(); | |
| 412 | |
| 413 // The textfield has to be disabled, as extension does not allow input now. | |
| 414 EXPECT_EQ(view->textfield_for_testing()->enabled(), false); | |
| 415 | |
| 416 // Close the dialog. | |
| 417 ExtensionTestMessageListener listener(false); | |
| 418 service->pin_dialog_manager()->active_window_for_testing()->Close(); | |
| 419 ASSERT_TRUE(listener.WaitUntilSatisfied()); | |
| 420 EXPECT_EQ("No attempt left", listener.message()); | |
| 421 EXPECT_EQ(service->pin_dialog_manager()->active_view_for_testing(), nullptr); | |
| 422 } | |
| 423 | |
| 424 // User closes the dialog while the extension is processing the request. | |
| 425 IN_PROC_BROWSER_TEST_F(CertificateProviderRequestPinTest, | |
| 426 ShowPinDialogCloseWhileProcessing) { | |
| 427 chromeos::CertificateProviderService* service = | |
| 428 LoadRequestPinExtension("request_pin", "basic_lock.html"); | |
| 429 | |
| 430 EnterCode(service, base::ASCIIToUTF16("123")); | |
| 431 service->pin_dialog_manager()->active_window_for_testing()->Close(); | |
| 432 base::RunLoop().RunUntilIdle(); | |
| 433 | |
| 434 // The view should be set to nullptr when the window is closed. | |
| 435 EXPECT_EQ(service->pin_dialog_manager()->active_view_for_testing(), nullptr); | |
| 436 } | |
| OLD | NEW |