Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(223)

Side by Side Diff: content/browser/ssl/ssl_policy.cc

Issue 2213193005: Make SSLErrorHandler UI-thread-only and not-refcounted (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rebase on top of https://codereview.chromium.org/2222003002/ Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/ssl/ssl_policy.h" 5 #include "content/browser/ssl/ssl_policy.h"
6 6
7 #include "base/base_switches.h" 7 #include "base/base_switches.h"
8 #include "base/bind.h" 8 #include "base/bind.h"
9 #include "base/command_line.h" 9 #include "base/command_line.h"
10 #include "base/memory/singleton.h" 10 #include "base/memory/singleton.h"
(...skipping 17 matching lines...) Expand all
28 namespace content { 28 namespace content {
29 29
30 namespace { 30 namespace {
31 31
32 // Events for UMA. Do not reorder or change! 32 // Events for UMA. Do not reorder or change!
33 enum SSLGoodCertSeenEvent { 33 enum SSLGoodCertSeenEvent {
34 NO_PREVIOUS_EXCEPTION = 0, 34 NO_PREVIOUS_EXCEPTION = 0,
35 HAD_PREVIOUS_EXCEPTION = 1, 35 HAD_PREVIOUS_EXCEPTION = 1,
36 SSL_GOOD_CERT_SEEN_EVENT_MAX = 2 36 SSL_GOOD_CERT_SEEN_EVENT_MAX = 2
37 }; 37 };
38
39 void OnAllowCertificate(SSLErrorHandler* handler,
40 const SSLPolicy* const policy,
41 CertificateRequestResultType decision) {
42 DCHECK(handler->ssl_info().is_valid());
43 switch (decision) {
44 case CERTIFICATE_REQUEST_RESULT_TYPE_CONTINUE:
45 // Note that we should not call SetMaxSecurityStyle here, because the
46 // active
nasko 2016/08/08 20:57:06 nit: Let's reflow the comment since it is moving a
estark 2016/08/09 05:35:01 Done.
47 // NavigationEntry has just been deleted (in HideInterstitialPage) and the
48 // new NavigationEntry will not be set until DidNavigate. This is ok,
49 // because the new NavigationEntry will have its max security style set
50 // within DidNavigate.
51 //
52 // While AllowCertForHost() executes synchronously on this thread,
53 // ContinueRequest() gets posted to a different thread. Calling
54 // AllowCertForHost() first ensures deterministic ordering.
55 policy->backend()->AllowCertForHost(*handler->ssl_info().cert.get(),
56 handler->request_url().host(),
57 handler->cert_error());
58 handler->ContinueRequest();
59 return;
60 case CERTIFICATE_REQUEST_RESULT_TYPE_DENY:
61 handler->DenyRequest();
62 return;
63 case CERTIFICATE_REQUEST_RESULT_TYPE_CANCEL:
64 handler->CancelRequest();
65 return;
66 }
38 } 67 }
39 68
69 } // namespace
70
40 SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) 71 SSLPolicy::SSLPolicy(SSLPolicyBackend* backend)
41 : backend_(backend) { 72 : backend_(backend) {
42 DCHECK(backend_); 73 DCHECK(backend_);
43 } 74 }
44 75
45 void SSLPolicy::OnCertError(SSLErrorHandler* handler) { 76 void SSLPolicy::OnCertError(std::unique_ptr<SSLErrorHandler> handler) {
46 bool expired_previous_decision = false; 77 bool expired_previous_decision = false;
47 // First we check if we know the policy for this error. 78 // First we check if we know the policy for this error.
48 DCHECK(handler->ssl_info().is_valid()); 79 DCHECK(handler->ssl_info().is_valid());
49 SSLHostStateDelegate::CertJudgment judgment = 80 SSLHostStateDelegate::CertJudgment judgment =
50 backend_->QueryPolicy(*handler->ssl_info().cert.get(), 81 backend_->QueryPolicy(*handler->ssl_info().cert.get(),
51 handler->request_url().host(), 82 handler->request_url().host(),
52 handler->cert_error(), 83 handler->cert_error(),
53 &expired_previous_decision); 84 &expired_previous_decision);
54 85
55 if (judgment == SSLHostStateDelegate::ALLOWED) { 86 if (judgment == SSLHostStateDelegate::ALLOWED) {
(...skipping 12 matching lines...) Expand all
68 case net::ERR_CERT_WEAK_KEY: 99 case net::ERR_CERT_WEAK_KEY:
69 case net::ERR_CERT_NAME_CONSTRAINT_VIOLATION: 100 case net::ERR_CERT_NAME_CONSTRAINT_VIOLATION:
70 case net::ERR_CERT_VALIDITY_TOO_LONG: 101 case net::ERR_CERT_VALIDITY_TOO_LONG:
71 case net::ERR_CERTIFICATE_TRANSPARENCY_REQUIRED: 102 case net::ERR_CERTIFICATE_TRANSPARENCY_REQUIRED:
72 if (!handler->fatal()) 103 if (!handler->fatal())
73 options_mask |= OVERRIDABLE; 104 options_mask |= OVERRIDABLE;
74 else 105 else
75 options_mask |= STRICT_ENFORCEMENT; 106 options_mask |= STRICT_ENFORCEMENT;
76 if (expired_previous_decision) 107 if (expired_previous_decision)
77 options_mask |= EXPIRED_PREVIOUS_DECISION; 108 options_mask |= EXPIRED_PREVIOUS_DECISION;
78 OnCertErrorInternal(handler, options_mask); 109 OnCertErrorInternal(std::move(handler), options_mask);
79 break; 110 break;
80 case net::ERR_CERT_NO_REVOCATION_MECHANISM: 111 case net::ERR_CERT_NO_REVOCATION_MECHANISM:
81 // Ignore this error. 112 // Ignore this error.
82 handler->ContinueRequest(); 113 handler->ContinueRequest();
83 break; 114 break;
84 case net::ERR_CERT_UNABLE_TO_CHECK_REVOCATION: 115 case net::ERR_CERT_UNABLE_TO_CHECK_REVOCATION:
85 // We ignore this error but will show a warning status in the location 116 // We ignore this error but will show a warning status in the location
86 // bar. 117 // bar.
87 handler->ContinueRequest(); 118 handler->ContinueRequest();
88 break; 119 break;
89 case net::ERR_CERT_CONTAINS_ERRORS: 120 case net::ERR_CERT_CONTAINS_ERRORS:
90 case net::ERR_CERT_REVOKED: 121 case net::ERR_CERT_REVOKED:
91 case net::ERR_CERT_INVALID: 122 case net::ERR_CERT_INVALID:
92 case net::ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY: 123 case net::ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY:
93 case net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN: 124 case net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN:
94 if (handler->fatal()) 125 if (handler->fatal())
95 options_mask |= STRICT_ENFORCEMENT; 126 options_mask |= STRICT_ENFORCEMENT;
96 if (expired_previous_decision) 127 if (expired_previous_decision)
97 options_mask |= EXPIRED_PREVIOUS_DECISION; 128 options_mask |= EXPIRED_PREVIOUS_DECISION;
98 OnCertErrorInternal(handler, options_mask); 129 OnCertErrorInternal(std::move(handler), options_mask);
99 break; 130 break;
100 default: 131 default:
101 NOTREACHED(); 132 NOTREACHED();
102 handler->CancelRequest(); 133 handler->CancelRequest();
103 break; 134 break;
104 } 135 }
105 } 136 }
106 137
107 void SSLPolicy::DidRunInsecureContent(NavigationEntryImpl* entry, 138 void SSLPolicy::DidRunInsecureContent(NavigationEntryImpl* entry,
108 const GURL& security_origin) { 139 const GURL& security_origin) {
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after
187 // Minor errors don't lower the security style to 218 // Minor errors don't lower the security style to
188 // SECURITY_STYLE_AUTHENTICATION_BROKEN. 219 // SECURITY_STYLE_AUTHENTICATION_BROKEN.
189 if (net::IsCertStatusError(cert_status) && 220 if (net::IsCertStatusError(cert_status) &&
190 !net::IsCertStatusMinorError(cert_status)) { 221 !net::IsCertStatusMinorError(cert_status)) {
191 return SECURITY_STYLE_AUTHENTICATION_BROKEN; 222 return SECURITY_STYLE_AUTHENTICATION_BROKEN;
192 } 223 }
193 224
194 return SECURITY_STYLE_AUTHENTICATED; 225 return SECURITY_STYLE_AUTHENTICATED;
195 } 226 }
196 227
197 void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLErrorHandler> handler,
198 CertificateRequestResultType decision) {
199 DCHECK(handler->ssl_info().is_valid());
200 switch (decision) {
201 case CERTIFICATE_REQUEST_RESULT_TYPE_CONTINUE:
202 // Note that we should not call SetMaxSecurityStyle here, because the
203 // active
204 // NavigationEntry has just been deleted (in HideInterstitialPage) and the
205 // new NavigationEntry will not be set until DidNavigate. This is ok,
206 // because the new NavigationEntry will have its max security style set
207 // within DidNavigate.
208 //
209 // While AllowCertForHost() executes synchronously on this thread,
210 // ContinueRequest() gets posted to a different thread. Calling
211 // AllowCertForHost() first ensures deterministic ordering.
212 backend_->AllowCertForHost(*handler->ssl_info().cert.get(),
213 handler->request_url().host(),
214 handler->cert_error());
215 handler->ContinueRequest();
216 return;
217 case CERTIFICATE_REQUEST_RESULT_TYPE_DENY:
218 handler->DenyRequest();
219 return;
220 case CERTIFICATE_REQUEST_RESULT_TYPE_CANCEL:
221 handler->CancelRequest();
222 return;
223 }
224 }
225
226 //////////////////////////////////////////////////////////////////////////////// 228 ////////////////////////////////////////////////////////////////////////////////
227 // Certificate Error Routines 229 // Certificate Error Routines
228 230
229 void SSLPolicy::OnCertErrorInternal(SSLErrorHandler* handler, 231 void SSLPolicy::OnCertErrorInternal(std::unique_ptr<SSLErrorHandler> handler,
230 int options_mask) { 232 int options_mask) {
231 bool overridable = (options_mask & OVERRIDABLE) != 0; 233 bool overridable = (options_mask & OVERRIDABLE) != 0;
232 bool strict_enforcement = (options_mask & STRICT_ENFORCEMENT) != 0; 234 bool strict_enforcement = (options_mask & STRICT_ENFORCEMENT) != 0;
233 bool expired_previous_decision = 235 bool expired_previous_decision =
234 (options_mask & EXPIRED_PREVIOUS_DECISION) != 0; 236 (options_mask & EXPIRED_PREVIOUS_DECISION) != 0;
237
238 WebContents* web_contents = handler->web_contents();
239 int cert_error = handler->cert_error();
240 const net::SSLInfo& ssl_info = handler->ssl_info();
241 const GURL& request_url = handler->request_url();
242 ResourceType resource_type = handler->resource_type();
235 GetContentClient()->browser()->AllowCertificateError( 243 GetContentClient()->browser()->AllowCertificateError(
236 handler->GetManager()->controller()->GetWebContents(), 244 web_contents, cert_error, ssl_info, request_url, resource_type,
237 handler->cert_error(), handler->ssl_info(), handler->request_url(), 245 overridable, strict_enforcement, expired_previous_decision,
238 handler->resource_type(), overridable, strict_enforcement, 246 base::Bind(&OnAllowCertificate, base::Owned(handler.release()), this));
239 expired_previous_decision,
240 base::Bind(&SSLPolicy::OnAllowCertificate, base::Unretained(this),
241 make_scoped_refptr(handler)));
242 } 247 }
243 248
244 void SSLPolicy::InitializeEntryIfNeeded(NavigationEntryImpl* entry) { 249 void SSLPolicy::InitializeEntryIfNeeded(NavigationEntryImpl* entry) {
245 if (entry->GetSSL().security_style != SECURITY_STYLE_UNKNOWN) 250 if (entry->GetSSL().security_style != SECURITY_STYLE_UNKNOWN)
246 return; 251 return;
247 252
248 entry->GetSSL().security_style = GetSecurityStyleForResource( 253 entry->GetSSL().security_style = GetSecurityStyleForResource(
249 entry->GetURL(), entry->GetSSL().cert_id, entry->GetSSL().cert_status); 254 entry->GetURL(), entry->GetSSL().cert_id, entry->GetSSL().cert_status);
250 } 255 }
251 256
252 void SSLPolicy::OriginRanInsecureContent(const std::string& origin, int pid) { 257 void SSLPolicy::OriginRanInsecureContent(const std::string& origin, int pid) {
253 GURL parsed_origin(origin); 258 GURL parsed_origin(origin);
254 if (parsed_origin.SchemeIsCryptographic()) 259 if (parsed_origin.SchemeIsCryptographic())
255 backend_->HostRanInsecureContent(parsed_origin.host(), pid); 260 backend_->HostRanInsecureContent(parsed_origin.host(), pid);
256 } 261 }
257 262
258 } // namespace content 263 } // namespace content
OLDNEW
« content/browser/ssl/ssl_manager.cc ('K') | « content/browser/ssl/ssl_policy.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698