Index: components/certificate_transparency/ct_policy_manager.cc |
diff --git a/components/certificate_transparency/ct_policy_manager.cc b/components/certificate_transparency/ct_policy_manager.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..c3ba37b78e0afbfc6bc8328dee011114e4815176 |
--- /dev/null |
+++ b/components/certificate_transparency/ct_policy_manager.cc |
@@ -0,0 +1,266 @@ |
+// Copyright 2016 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "components/certificate_transparency/ct_policy_manager.h" |
+ |
+#include <map> |
+#include <set> |
+#include <string> |
+ |
+#include "base/bind.h" |
+#include "base/callback.h" |
+#include "base/location.h" |
+#include "base/sequenced_task_runner.h" |
+#include "base/strings/string_util.h" |
+#include "base/threading/sequenced_task_runner_handle.h" |
+#include "base/values.h" |
+#include "components/certificate_transparency/pref_names.h" |
+#include "components/prefs/pref_registry_simple.h" |
+#include "components/prefs/pref_service.h" |
+#include "components/url_formatter/url_fixer.h" |
+#include "components/url_matcher/url_matcher.h" |
+ |
+namespace certificate_transparency { |
+ |
+class CTPolicyManager::CTDelegate |
+ : public net::TransportSecurityState::RequireCTDelegate { |
+ public: |
+ explicit CTDelegate( |
+ scoped_refptr<base::SequencedTaskRunner> network_task_runner); |
+ ~CTDelegate() override = default; |
+ |
+ // Called on the prefs task runner. Updates the CTDelegate to require CT |
+ // for |required_hosts|, and exclude |excluded_hosts| from CT policies. |
+ void UpdateFromPrefs(const base::ListValue* required_hosts, |
+ const base::ListValue* excluded_hosts); |
+ |
+ // RequireCTDelegate implementation |
+ // Called on the network task runner. |
+ CTRequirementLevel IsCTRequiredForHost(const std::string& hostname) override; |
+ |
+ private: |
+ struct Filter { |
+ bool ct_required = false; |
+ bool match_subdomains = false; |
+ size_t host_length = 0; |
+ }; |
+ |
+ // Called on the |network_task_runner_|, updates the |url_matcher_| to |
+ // require CT for |required_hosts| and exclude |excluded_hosts|, both |
+ // of which are Lists of Strings which are URLBlacklist filters. |
+ void Update(base::ListValue* required_hosts, base::ListValue* excluded_hosts); |
+ |
+ // Parses the filters from |host_patterns|, adding them as filters to |
+ // |filters_| (with |ct_required| indicating whether or not CT is required |
+ // for that host), and updating |*conditions| with the corresponding |
+ // URLMatcher::Conditions to match the host. |
+ void AddFilters(bool ct_required, |
+ base::ListValue* host_patterns, |
+ url_matcher::URLMatcherConditionSet::Vector* conditions); |
+ |
+ // Returns true if |lhs| has greater precedence than |rhs|. |
+ bool FilterTakesPrecedence(const Filter& lhs, const Filter& rhs) const; |
+ |
+ scoped_refptr<base::SequencedTaskRunner> network_task_runner_; |
+ std::unique_ptr<url_matcher::URLMatcher> url_matcher_; |
+ url_matcher::URLMatcherConditionSet::ID next_id_; |
+ std::map<url_matcher::URLMatcherConditionSet::ID, Filter> filters_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(CTDelegate); |
+}; |
+ |
+CTPolicyManager::CTDelegate::CTDelegate( |
+ scoped_refptr<base::SequencedTaskRunner> network_task_runner) |
+ : network_task_runner_(std::move(network_task_runner)), |
+ url_matcher_(new url_matcher::URLMatcher), |
+ next_id_(0) {} |
+ |
+void CTPolicyManager::CTDelegate::UpdateFromPrefs( |
+ const base::ListValue* required_hosts, |
+ const base::ListValue* excluded_hosts) { |
+ network_task_runner_->PostTask( |
+ FROM_HERE, |
+ base::Bind(&CTDelegate::Update, base::Unretained(this), |
+ base::Owned(required_hosts->CreateDeepCopy().release()), |
eroman
2016/06/30 02:24:36
How about:
base::Passed(required_hosts->CreateDe
|
+ base::Owned(excluded_hosts->CreateDeepCopy().release()))); |
eroman
2016/06/30 02:24:36
ditto
Ryan Sleevi
2016/06/30 02:39:43
Unfortunately, base::Passed() (and std::unique_ptr
|
+} |
+ |
+net::TransportSecurityState::RequireCTDelegate::CTRequirementLevel |
+CTPolicyManager::CTDelegate::IsCTRequiredForHost(const std::string& hostname) { |
+ DCHECK(network_task_runner_->RunsTasksOnCurrentThread()); |
+ |
+ // The scheme and port are ignored in the policy, and the contract of a |
+ // RequireCTDelegate is that the host is always in URL form. |
+ // TODO(rsleevi): Guarantee this |
+ std::set<url_matcher::URLMatcherConditionSet::ID> matching_ids = |
+ url_matcher_->MatchURL(GURL("https://" + hostname)); |
+ if (matching_ids.empty()) |
+ return CTRequirementLevel::DEFAULT; |
+ |
+ // Determine the overall policy by determining the most specific policy. |
+ std::map<url_matcher::URLMatcherConditionSet::ID, Filter>::const_iterator it = |
eroman
2016/06/30 02:24:36
nit: auto ?
Ryan Sleevi
2016/06/30 02:39:43
Auto binds to the non-const iterator (until C++14'
|
+ filters_.begin(); |
+ const Filter* active_filter = nullptr; |
+ for (const auto& match : matching_ids) { |
+ // Because both |filters_| and |matching_ids| are sorted on the ID, |
+ // treat both as forward-only iterators. |
+ while (it != filters_.end() && it->first < match) |
+ ++it; |
+ if (it == filters_.end()) { |
+ NOTREACHED(); |
+ break; |
+ } |
+ |
+ if (!active_filter || FilterTakesPrecedence(it->second, *active_filter)) |
+ active_filter = &it->second; |
+ } |
+ CHECK(active_filter); |
+ |
+ return active_filter->ct_required ? CTRequirementLevel::REQUIRED |
+ : CTRequirementLevel::NOT_REQUIRED; |
+} |
+ |
+void CTPolicyManager::CTDelegate::Update(base::ListValue* required_hosts, |
eroman
2016/06/30 02:24:36
can these ptrs be const? (throughout)
Ryan Sleevi
2016/06/30 02:39:43
Unfortunately, the callback helpers get ornery abo
|
+ base::ListValue* excluded_hosts) { |
+ DCHECK(network_task_runner_->RunsTasksOnCurrentThread()); |
+ |
+ url_matcher_.reset(new url_matcher::URLMatcher); |
+ filters_.clear(); |
+ next_id_ = 0; |
+ |
+ url_matcher::URLMatcherConditionSet::Vector all_conditions; |
+ AddFilters(true, required_hosts, &all_conditions); |
+ AddFilters(false, excluded_hosts, &all_conditions); |
+ |
+ url_matcher_->AddConditionSets(all_conditions); |
+} |
+ |
+void CTPolicyManager::CTDelegate::AddFilters( |
+ bool ct_required, |
+ base::ListValue* hosts, |
+ url_matcher::URLMatcherConditionSet::Vector* conditions) { |
+ for (size_t i = 0; i < hosts->GetSize(); ++i) { |
+ std::string pattern; |
+ if (!hosts->GetString(i, &pattern)) |
+ continue; |
+ |
+ Filter filter; |
+ filter.ct_required = ct_required; |
+ |
+ // Parse the pattern just to the hostname, ignoring all other portions of |
+ // the URL. |
+ url::Parsed parsed; |
+ std::string ignored_scheme = url_formatter::SegmentURL(pattern, &parsed); |
+ if (!parsed.host.is_nonempty()) |
+ continue; // If there is no host to match, can't apply the filter. |
+ |
+ std::string lc_host = base::ToLowerASCII( |
eroman
2016/06/30 02:24:36
Is this required?
Does condition_factory->CreateHo
Ryan Sleevi
2016/06/30 02:39:43
From what I could tell, implicitly it does - unfor
|
+ base::StringPiece(pattern).substr(parsed.host.begin, parsed.host.len)); |
+ if (lc_host == "*") { |
+ // Wildcard hosts are not allowed and ignored. |
+ continue; |
+ } else if (lc_host[0] == '.') { |
+ // A leading dot means exact match and to not match subdomains. |
eroman
2016/06/30 02:24:36
This is the opposite of what I would have expected
|
+ lc_host.erase(0, 1); |
+ filter.match_subdomains = false; |
+ } else { |
+ // Canonicalize the host to make sure it's not an IP address, as |
+ // matching subdomains is not desirable for those. |
+ url::RawCanonOutputT<char> output; |
+ url::CanonHostInfo host_info; |
+ url::CanonicalizeHostVerbose(pattern.c_str(), parsed.host, &output, |
+ &host_info); |
+ // TODO(rsleevi): Use canonicalized form? |
+ if (host_info.family == url::CanonHostInfo::NEUTRAL) { |
eroman
2016/06/30 02:24:36
The comment above makes it sound like this is only
|
+ // Match subdomains (implicit by the omission of '.'). Add in a |
+ // leading dot to make sure matches only happen at the domain |
+ // component boundary. |
+ lc_host.insert(lc_host.begin(), '.'); |
+ filter.match_subdomains = true; |
+ } else { |
+ filter.match_subdomains = false; |
+ } |
+ } |
+ filter.host_length = lc_host.size(); |
+ |
+ // Create a condition for the URLMatcher that matches the hostname (and/or |
+ // subdomains). |
+ url_matcher::URLMatcherConditionFactory* condition_factory = |
+ url_matcher_->condition_factory(); |
+ std::set<url_matcher::URLMatcherCondition> condition_set; |
+ condition_set.insert( |
+ filter.match_subdomains |
+ ? condition_factory->CreateHostSuffixCondition(lc_host) |
eroman
2016/06/30 02:24:36
What happens if lc_host is "*" at this point?
(whi
Ryan Sleevi
2016/06/30 02:39:43
It does nothing, actually - it's just a 'bad filte
|
+ : condition_factory->CreateHostEqualsCondition(lc_host)); |
+ conditions->push_back( |
eroman
2016/06/30 02:24:36
I don't think I quite grok how the URLMatcher stuf
Ryan Sleevi
2016/06/30 07:42:33
Correct
|
+ new url_matcher::URLMatcherConditionSet(next_id_, condition_set)); |
+ filters_[next_id_] = filter; |
+ ++next_id_; |
+ } |
+} |
+ |
+bool CTPolicyManager::CTDelegate::FilterTakesPrecedence( |
+ const Filter& lhs, |
+ const Filter& rhs) const { |
+ if (lhs.match_subdomains != rhs.match_subdomains) |
+ return !lhs.match_subdomains; // Prefer the more explicit policy. |
eroman
2016/06/30 02:24:36
side-comment: In practice this is probably redund
Ryan Sleevi
2016/06/30 02:39:43
Yup, I noticed this too. Here, I'm cargo-culting U
|
+ |
+ if (lhs.host_length != rhs.host_length) |
+ return lhs.host_length > rhs.host_length; // Prefer the longer host match. |
+ |
+ if (lhs.ct_required != rhs.ct_required) |
+ return lhs.ct_required; // Prefer the policy that requires CT. |
+ |
+ return false; |
+} |
+ |
+// static |
+void CTPolicyManager::RegisterPrefs(PrefRegistrySimple* registry) { |
+ registry->RegisterListPref(prefs::kCTRequiredHosts); |
+ registry->RegisterListPref(prefs::kCTExcludedHosts); |
+} |
+ |
+CTPolicyManager::CTPolicyManager( |
+ PrefService* pref_service, |
+ scoped_refptr<base::SequencedTaskRunner> network_task_runner) |
+ : delegate_(new CTDelegate(std::move(network_task_runner))), |
+ weak_factory_(this) { |
+ pref_change_registrar_.Init(pref_service); |
+ pref_change_registrar_.Add( |
+ prefs::kCTRequiredHosts, |
+ base::Bind(&CTPolicyManager::ScheduleUpdate, base::Unretained(this))); |
+ pref_change_registrar_.Add( |
+ prefs::kCTExcludedHosts, |
+ base::Bind(&CTPolicyManager::ScheduleUpdate, base::Unretained(this))); |
+ |
+ ScheduleUpdate(); |
+} |
+ |
+CTPolicyManager::~CTPolicyManager() {} |
+ |
+void CTPolicyManager::Shutdown() { |
+ pref_change_registrar_.RemoveAll(); |
+} |
+ |
+net::TransportSecurityState::RequireCTDelegate* CTPolicyManager::GetDelegate() { |
+ return delegate_.get(); |
+} |
+ |
+void CTPolicyManager::ScheduleUpdate() { |
+ // Cancel any pending updates, and schedule a new update. If this method |
+ // is called again, this pending update will be cancelled because the weak |
+ // pointer is invalidated, and the new update will take precedence. |
+ weak_factory_.InvalidateWeakPtrs(); |
+ base::SequencedTaskRunnerHandle::Get()->PostTask( |
+ FROM_HERE, |
+ base::Bind(&CTPolicyManager::Update, weak_factory_.GetWeakPtr())); |
+} |
+ |
+void CTPolicyManager::Update() { |
+ delegate_->UpdateFromPrefs( |
+ pref_change_registrar_.prefs()->GetList(prefs::kCTRequiredHosts), |
+ pref_change_registrar_.prefs()->GetList(prefs::kCTExcludedHosts)); |
+} |
+ |
+} // namespace certificate_transparency |