Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <utility> | 5 #include <utility> |
| 6 | 6 |
| 7 #include "base/base64.h" | 7 #include "base/base64.h" |
| 8 #include "base/base_switches.h" | 8 #include "base/base_switches.h" |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| (...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 97 #include "net/base/net_errors.h" | 97 #include "net/base/net_errors.h" |
| 98 #include "net/cert/asn1_util.h" | 98 #include "net/cert/asn1_util.h" |
| 99 #include "net/cert/cert_status_flags.h" | 99 #include "net/cert/cert_status_flags.h" |
| 100 #include "net/cert/mock_cert_verifier.h" | 100 #include "net/cert/mock_cert_verifier.h" |
| 101 #include "net/cert/x509_certificate.h" | 101 #include "net/cert/x509_certificate.h" |
| 102 #include "net/dns/mock_host_resolver.h" | 102 #include "net/dns/mock_host_resolver.h" |
| 103 #include "net/http/http_response_headers.h" | 103 #include "net/http/http_response_headers.h" |
| 104 #include "net/ssl/ssl_info.h" | 104 #include "net/ssl/ssl_info.h" |
| 105 #include "net/test/cert_test_util.h" | 105 #include "net/test/cert_test_util.h" |
| 106 #include "net/test/embedded_test_server/embedded_test_server.h" | 106 #include "net/test/embedded_test_server/embedded_test_server.h" |
| 107 #include "net/test/embedded_test_server/http_request.h" | |
| 107 #include "net/test/embedded_test_server/request_handler_util.h" | 108 #include "net/test/embedded_test_server/request_handler_util.h" |
| 108 #include "net/test/spawned_test_server/spawned_test_server.h" | 109 #include "net/test/spawned_test_server/spawned_test_server.h" |
| 109 #include "net/test/test_certificate_data.h" | 110 #include "net/test/test_certificate_data.h" |
| 110 #include "net/test/test_data_directory.h" | 111 #include "net/test/test_data_directory.h" |
| 111 #include "net/url_request/url_request_context.h" | 112 #include "net/url_request/url_request_context.h" |
| 112 #include "net/url_request/url_request_filter.h" | 113 #include "net/url_request/url_request_filter.h" |
| 113 #include "net/url_request/url_request_job.h" | 114 #include "net/url_request/url_request_job.h" |
| 114 #include "net/url_request/url_request_test_util.h" | 115 #include "net/url_request/url_request_test_util.h" |
| 115 | 116 |
| 116 #if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION) | 117 #if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION) |
| (...skipping 3449 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 3566 | 3567 |
| 3567 // Open a second tab, close the first, and then trigger the network time | 3568 // Open a second tab, close the first, and then trigger the network time |
| 3568 // response and wait for the response; no crash should occur. | 3569 // response and wait for the response; no crash should occur. |
| 3569 ASSERT_TRUE(https_server_.Start()); | 3570 ASSERT_TRUE(https_server_.Start()); |
| 3570 AddTabAtIndex(1, https_server_.GetURL("/"), ui::PAGE_TRANSITION_TYPED); | 3571 AddTabAtIndex(1, https_server_.GetURL("/"), ui::PAGE_TRANSITION_TYPED); |
| 3571 chrome::CloseWebContents(browser(), contents, false); | 3572 chrome::CloseWebContents(browser(), contents, false); |
| 3572 ASSERT_NO_FATAL_FAILURE(CheckTimeQueryPending()); | 3573 ASSERT_NO_FATAL_FAILURE(CheckTimeQueryPending()); |
| 3573 TriggerTimeResponse(); | 3574 TriggerTimeResponse(); |
| 3574 } | 3575 } |
| 3575 | 3576 |
| 3577 // Fails with a CHECK for all requests over HTTP except for favicons. This is to | |
| 3578 // ensure that name mismatch redirect feature's suggest URL ping stops on | |
| 3579 // redirects and never hits an HTTP URL. | |
| 3580 class HttpNameMismatchPingInterceptor : public net::URLRequestInterceptor { | |
| 3581 public: | |
| 3582 HttpNameMismatchPingInterceptor() {} | |
| 3583 ~HttpNameMismatchPingInterceptor() override {} | |
| 3584 | |
| 3585 net::URLRequestJob* MaybeInterceptRequest( | |
| 3586 net::URLRequest* request, | |
| 3587 net::NetworkDelegate* delegate) const override { | |
| 3588 if (request->url().path() == "/favicon.ico") { | |
| 3589 // Ignore favicon requests. | |
|
elawrence
2017/06/03 18:45:11
As someone new to this code, it would be nice if t
meacer
2017/06/05 21:57:59
Done.
| |
| 3590 return nullptr; | |
| 3591 } | |
| 3592 | |
| 3593 CHECK(request->url().SchemeIsCryptographic()) | |
|
elawrence
2017/06/03 18:45:11
Can this check ever pass? Below, AddHostnameInterc
meacer
2017/06/05 21:57:59
No, it can never pass. Converted to CHECK(false).
| |
| 3594 << "Name mismatch pings must never be over HTTP. This request was for " | |
| 3595 << request->url(); | |
| 3596 return nullptr; | |
| 3597 } | |
| 3598 | |
| 3599 private: | |
| 3600 DISALLOW_COPY_AND_ASSIGN(HttpNameMismatchPingInterceptor); | |
| 3601 }; | |
| 3602 | |
| 3576 class CommonNameMismatchBrowserTest : public CertVerifierBrowserTest { | 3603 class CommonNameMismatchBrowserTest : public CertVerifierBrowserTest { |
| 3577 public: | 3604 public: |
| 3578 CommonNameMismatchBrowserTest() : CertVerifierBrowserTest() {} | 3605 CommonNameMismatchBrowserTest() : CertVerifierBrowserTest() { |
| 3579 ~CommonNameMismatchBrowserTest() override {} | 3606 // Add interceptors for HTTP versions of example.org and www.example.org. |
| 3607 // These are the hostnames used in the tests, and we never want them to be | |
| 3608 // contacted over HTTP. | |
| 3609 net::URLRequestFilter::GetInstance()->AddHostnameInterceptor( | |
| 3610 "http", "example.org", | |
| 3611 std::unique_ptr<HttpNameMismatchPingInterceptor>( | |
| 3612 new HttpNameMismatchPingInterceptor())); | |
| 3613 net::URLRequestFilter::GetInstance()->AddHostnameInterceptor( | |
| 3614 "http", "www.example.org", | |
| 3615 std::unique_ptr<HttpNameMismatchPingInterceptor>( | |
| 3616 new HttpNameMismatchPingInterceptor())); | |
| 3617 } | |
| 3618 ~CommonNameMismatchBrowserTest() override { | |
| 3619 net::URLRequestFilter::GetInstance()->ClearHandlers(); | |
| 3620 } | |
| 3580 | 3621 |
| 3581 void SetUpCommandLine(base::CommandLine* command_line) override { | 3622 void SetUpCommandLine(base::CommandLine* command_line) override { |
| 3582 // Enable finch experiment for SSL common name mismatch handling. | 3623 // Enable finch experiment for SSL common name mismatch handling. |
| 3583 command_line->AppendSwitchASCII(switches::kForceFieldTrials, | 3624 command_line->AppendSwitchASCII(switches::kForceFieldTrials, |
| 3584 "SSLCommonNameMismatchHandling/Enabled/"); | 3625 "SSLCommonNameMismatchHandling/Enabled/"); |
| 3585 } | 3626 } |
| 3586 | 3627 |
| 3587 void SetUpOnMainThread() override { | 3628 void SetUpOnMainThread() override { |
| 3588 CertVerifierBrowserTest::SetUpOnMainThread(); | 3629 CertVerifierBrowserTest::SetUpOnMainThread(); |
| 3589 host_resolver()->AddRule("*", "127.0.0.1"); | 3630 host_resolver()->AddRule("*", "127.0.0.1"); |
| 3590 } | 3631 } |
| 3591 }; | 3632 }; |
| 3592 | 3633 |
| 3593 // Visit the URL www.mail.example.com on a server that presents a valid | 3634 // Visit the URL www.mail.example.com on a server that presents a valid |
| 3594 // certificate for mail.example.com. Verify that the page navigates to | 3635 // certificate for mail.example.com. Verify that the page navigates to |
| 3595 // mail.example.com. | 3636 // mail.example.com. |
| 3596 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 3637 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
| 3597 ShouldShowWWWSubdomainMismatchInterstitial) { | 3638 ShouldShowWWWSubdomainMismatchInterstitial) { |
| 3598 net::EmbeddedTestServer https_server_example_domain_( | 3639 net::EmbeddedTestServer https_server_example_domain( |
| 3599 net::EmbeddedTestServer::TYPE_HTTPS); | 3640 net::EmbeddedTestServer::TYPE_HTTPS); |
| 3600 https_server_example_domain_.ServeFilesFromSourceDirectory( | 3641 https_server_example_domain.ServeFilesFromSourceDirectory( |
| 3601 base::FilePath(kDocRoot)); | 3642 base::FilePath(kDocRoot)); |
| 3602 ASSERT_TRUE(https_server_example_domain_.Start()); | 3643 ASSERT_TRUE(https_server_example_domain.Start()); |
| 3603 | 3644 |
| 3604 scoped_refptr<net::X509Certificate> cert = | 3645 scoped_refptr<net::X509Certificate> cert = |
| 3605 https_server_example_domain_.GetCertificate(); | 3646 https_server_example_domain.GetCertificate(); |
| 3606 | 3647 |
| 3607 // Use the "spdy_pooling.pem" cert which has "mail.example.com" | 3648 // Use the "spdy_pooling.pem" cert which has "mail.example.com" |
| 3608 // as one of its SANs. | 3649 // as one of its SANs. |
| 3609 net::CertVerifyResult verify_result; | 3650 net::CertVerifyResult verify_result; |
| 3610 verify_result.verified_cert = | 3651 verify_result.verified_cert = |
| 3611 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3652 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3612 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; | 3653 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; |
| 3613 | 3654 |
| 3614 // Request to "www.mail.example.com" should result in | 3655 // Request to "www.mail.example.com" should result in |
| 3615 // |net::ERR_CERT_COMMON_NAME_INVALID| error. | 3656 // |net::ERR_CERT_COMMON_NAME_INVALID| error. |
| 3616 mock_cert_verifier()->AddResultForCertAndHost( | 3657 mock_cert_verifier()->AddResultForCertAndHost( |
| 3617 cert.get(), "www.mail.example.com", verify_result, | 3658 cert.get(), "www.mail.example.com", verify_result, |
| 3618 net::ERR_CERT_COMMON_NAME_INVALID); | 3659 net::ERR_CERT_COMMON_NAME_INVALID); |
| 3619 | 3660 |
| 3620 net::CertVerifyResult verify_result_valid; | 3661 net::CertVerifyResult verify_result_valid; |
| 3621 verify_result_valid.verified_cert = | 3662 verify_result_valid.verified_cert = |
| 3622 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3663 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3623 // Request to "www.mail.example.com" should not result in any error. | 3664 // Request to "www.mail.example.com" should not result in any error. |
| 3624 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", | 3665 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", |
| 3625 verify_result_valid, net::OK); | 3666 verify_result_valid, net::OK); |
| 3626 | 3667 |
| 3627 // Use a complex URL to ensure the path, etc., are preserved. The path itself | 3668 // Use a complex URL to ensure the path, etc., are preserved. The path itself |
| 3628 // does not matter. | 3669 // does not matter. |
| 3629 GURL https_server_url = | 3670 const GURL https_server_url = |
| 3630 https_server_example_domain_.GetURL("/ssl/google.html?a=b#anchor"); | 3671 https_server_example_domain.GetURL("/ssl/google.html?a=b#anchor"); |
| 3631 GURL::Replacements replacements; | 3672 GURL::Replacements replacements; |
| 3632 replacements.SetHostStr("www.mail.example.com"); | 3673 replacements.SetHostStr("www.mail.example.com"); |
| 3633 GURL https_server_mismatched_url = | 3674 const GURL https_server_mismatched_url = |
| 3634 https_server_url.ReplaceComponents(replacements); | 3675 https_server_url.ReplaceComponents(replacements); |
| 3635 | 3676 |
| 3636 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); | 3677 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); |
| 3637 content::TestNavigationObserver observer( | 3678 content::TestNavigationObserver observer( |
| 3638 contents, | 3679 contents, |
| 3639 // With PlzNavigate, the renderer only sees one navigation (i.e. not the | 3680 // With PlzNavigate, the renderer only sees one navigation (i.e. not the |
| 3640 // redirect, since that happens in the browser). | 3681 // redirect, since that happens in the browser). |
| 3641 content::IsBrowserSideNavigationEnabled() ? 1 : 2); | 3682 content::IsBrowserSideNavigationEnabled() ? 1 : 2); |
| 3642 ui_test_utils::NavigateToURL(browser(), https_server_mismatched_url); | 3683 ui_test_utils::NavigateToURL(browser(), https_server_mismatched_url); |
| 3643 observer.Wait(); | 3684 observer.Wait(); |
| 3644 | 3685 |
| 3645 CheckSecurityState(contents, CertError::NONE, security_state::SECURE, | 3686 CheckSecurityState(contents, CertError::NONE, security_state::SECURE, |
| 3646 AuthState::NONE); | 3687 AuthState::NONE); |
| 3647 replacements.SetHostStr("mail.example.com"); | 3688 replacements.SetHostStr("mail.example.com"); |
| 3648 GURL https_server_new_url = https_server_url.ReplaceComponents(replacements); | 3689 GURL https_server_new_url = https_server_url.ReplaceComponents(replacements); |
| 3649 // Verify that the current URL is the suggested URL. | 3690 // Verify that the current URL is the suggested URL. |
| 3650 EXPECT_EQ(https_server_new_url.spec(), | 3691 EXPECT_EQ(https_server_new_url.spec(), |
| 3651 contents->GetLastCommittedURL().spec()); | 3692 contents->GetLastCommittedURL().spec()); |
| 3652 } | 3693 } |
| 3653 | 3694 |
| 3654 // Visit the URL example.org on a server that presents a valid certificate | 3695 // Visit the URL example.org on a server that presents a valid certificate |
| 3655 // for www.example.org. Verify that the page redirects to www.example.org. | 3696 // for www.example.org. Verify that the page redirects to www.example.org. |
| 3656 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 3697 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
| 3657 CheckWWWSubdomainMismatchInverse) { | 3698 CheckWWWSubdomainMismatchInverse) { |
| 3658 net::EmbeddedTestServer https_server_example_domain_( | 3699 net::EmbeddedTestServer https_server_example_domain( |
| 3659 net::EmbeddedTestServer::TYPE_HTTPS); | 3700 net::EmbeddedTestServer::TYPE_HTTPS); |
| 3660 https_server_example_domain_.ServeFilesFromSourceDirectory( | 3701 https_server_example_domain.ServeFilesFromSourceDirectory( |
| 3661 base::FilePath(kDocRoot)); | 3702 base::FilePath(kDocRoot)); |
| 3662 ASSERT_TRUE(https_server_example_domain_.Start()); | 3703 ASSERT_TRUE(https_server_example_domain.Start()); |
| 3663 | 3704 |
| 3664 scoped_refptr<net::X509Certificate> cert = | 3705 scoped_refptr<net::X509Certificate> cert = |
| 3665 https_server_example_domain_.GetCertificate(); | 3706 https_server_example_domain.GetCertificate(); |
| 3666 | 3707 |
| 3667 net::CertVerifyResult verify_result; | 3708 net::CertVerifyResult verify_result; |
| 3668 verify_result.verified_cert = | 3709 verify_result.verified_cert = |
| 3669 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3710 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3670 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; | 3711 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; |
| 3671 | 3712 |
| 3672 mock_cert_verifier()->AddResultForCertAndHost( | 3713 mock_cert_verifier()->AddResultForCertAndHost( |
| 3673 cert.get(), "example.org", verify_result, | 3714 cert.get(), "example.org", verify_result, |
| 3674 net::ERR_CERT_COMMON_NAME_INVALID); | 3715 net::ERR_CERT_COMMON_NAME_INVALID); |
| 3675 | 3716 |
| 3676 net::CertVerifyResult verify_result_valid; | 3717 net::CertVerifyResult verify_result_valid; |
| 3677 verify_result_valid.verified_cert = | 3718 verify_result_valid.verified_cert = |
| 3678 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3719 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3679 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "www.example.org", | 3720 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "www.example.org", |
| 3680 verify_result_valid, net::OK); | 3721 verify_result_valid, net::OK); |
| 3681 | 3722 |
| 3682 GURL https_server_url = | 3723 const GURL https_server_url = |
| 3683 https_server_example_domain_.GetURL("/ssl/google.html?a=b"); | 3724 https_server_example_domain.GetURL("/ssl/google.html?a=b"); |
| 3684 GURL::Replacements replacements; | 3725 GURL::Replacements replacements; |
| 3685 replacements.SetHostStr("example.org"); | 3726 replacements.SetHostStr("example.org"); |
| 3686 GURL https_server_mismatched_url = | 3727 const GURL https_server_mismatched_url = |
| 3687 https_server_url.ReplaceComponents(replacements); | 3728 https_server_url.ReplaceComponents(replacements); |
| 3688 | 3729 |
| 3689 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); | 3730 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); |
| 3690 content::TestNavigationObserver observer( | 3731 content::TestNavigationObserver observer( |
| 3691 contents, | 3732 contents, |
| 3692 // With PlzNavigate, the renderer only sees one navigation (i.e. not the | 3733 // With PlzNavigate, the renderer only sees one navigation (i.e. not the |
| 3693 // redirect, since that happens in the browser). | 3734 // redirect, since that happens in the browser). |
| 3694 content::IsBrowserSideNavigationEnabled() ? 1 : 2); | 3735 content::IsBrowserSideNavigationEnabled() ? 1 : 2); |
| 3695 ui_test_utils::NavigateToURL(browser(), https_server_mismatched_url); | 3736 ui_test_utils::NavigateToURL(browser(), https_server_mismatched_url); |
| 3696 observer.Wait(); | 3737 observer.Wait(); |
| 3697 | 3738 |
| 3698 CheckSecurityState(contents, CertError::NONE, security_state::SECURE, | 3739 CheckSecurityState(contents, CertError::NONE, security_state::SECURE, |
| 3699 AuthState::NONE); | 3740 AuthState::NONE); |
| 3700 } | 3741 } |
| 3701 | 3742 |
| 3743 namespace { | |
| 3744 // Redirects incoming request to http://example.org. | |
| 3745 std::unique_ptr<net::test_server::HttpResponse> HTTPSToHTTPRedirectHandler( | |
| 3746 const net::EmbeddedTestServer* test_server, | |
| 3747 const net::test_server::HttpRequest& request) { | |
| 3748 GURL::Replacements replacements; | |
| 3749 replacements.SetHostStr("example.org"); | |
| 3750 replacements.SetSchemeStr("http"); | |
| 3751 const GURL redirect_url = | |
| 3752 test_server->base_url().ReplaceComponents(replacements); | |
| 3753 | |
| 3754 std::unique_ptr<net::test_server::BasicHttpResponse> http_response( | |
| 3755 new net::test_server::BasicHttpResponse); | |
| 3756 http_response->set_code(net::HTTP_MOVED_PERMANENTLY); | |
| 3757 http_response->AddCustomHeader("Location", redirect_url.spec()); | |
| 3758 return std::move(http_response); | |
| 3759 } | |
| 3760 } // namespace | |
| 3761 | |
| 3762 // Common name mismatch handling feature should ignore redirects when pinging | |
| 3763 // the suggested hostname. Visit the URL example.org on a server that presents a | |
| 3764 // valid certificate for www.example.org. In this case, www.example.org | |
| 3765 // redirects to http://example.org, and the SSL error should not be redirected | |
| 3766 // to this URL. | |
| 3767 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | |
| 3768 WWWSubdomainMismatch_StopOnRedirects) { | |
| 3769 net::EmbeddedTestServer https_server_example_domain( | |
| 3770 net::EmbeddedTestServer::TYPE_HTTPS); | |
| 3771 | |
| 3772 // Redirect all URLs to http://example.org. Since this test will trigger only | |
| 3773 // one request to check the suggested URL, redirecting all requests is OK. | |
| 3774 // We would normally use content::SetupCrossSiteRedirector here, but that | |
| 3775 // function does not support https to http redirects. | |
| 3776 // This must be done before ServeFilesFromSourceDirectory(), otherwise the | |
| 3777 // test server will serve files instead of redirecting requests to them. | |
| 3778 https_server_example_domain.RegisterRequestHandler( | |
| 3779 base::Bind(&HTTPSToHTTPRedirectHandler, &https_server_example_domain)); | |
| 3780 | |
| 3781 https_server_example_domain.ServeFilesFromSourceDirectory( | |
| 3782 base::FilePath(kDocRoot)); | |
| 3783 | |
| 3784 ASSERT_TRUE(https_server_example_domain.Start()); | |
| 3785 | |
| 3786 scoped_refptr<net::X509Certificate> cert = | |
| 3787 https_server_example_domain.GetCertificate(); | |
| 3788 | |
| 3789 net::CertVerifyResult verify_result; | |
| 3790 verify_result.verified_cert = | |
| 3791 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | |
| 3792 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; | |
| 3793 | |
| 3794 mock_cert_verifier()->AddResultForCertAndHost( | |
| 3795 cert.get(), "example.org", verify_result, | |
| 3796 net::ERR_CERT_COMMON_NAME_INVALID); | |
| 3797 | |
| 3798 net::CertVerifyResult verify_result_valid; | |
| 3799 verify_result_valid.verified_cert = | |
| 3800 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | |
| 3801 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "www.example.org", | |
| 3802 verify_result_valid, net::OK); | |
| 3803 | |
| 3804 // The user will visit https://example.org:port/ssl/blank.html. | |
| 3805 GURL::Replacements replacements; | |
| 3806 replacements.SetHostStr("example.org"); | |
| 3807 const GURL https_server_mismatched_url = | |
| 3808 https_server_example_domain.GetURL("/ssl/blank.html") | |
| 3809 .ReplaceComponents(replacements); | |
| 3810 | |
| 3811 // Should simply show an interstitial, because the suggested URL | |
| 3812 // (https://www.example.org) redirected to http://example.org. | |
| 3813 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); | |
| 3814 ui_test_utils::NavigateToURL(browser(), https_server_mismatched_url); | |
| 3815 WaitForInterstitialAttach(contents); | |
| 3816 | |
| 3817 CheckSecurityState(contents, net::CERT_STATUS_COMMON_NAME_INVALID, | |
| 3818 security_state::DANGEROUS, | |
| 3819 AuthState::SHOWING_INTERSTITIAL); | |
| 3820 } | |
| 3821 | |
| 3702 // Tests this scenario: | 3822 // Tests this scenario: |
| 3703 // - |CommonNameMismatchHandler| does not give a callback as it's set into the | 3823 // - |CommonNameMismatchHandler| does not give a callback as it's set into the |
| 3704 // state |IGNORE_REQUESTS_FOR_TESTING|. So no suggested URL check result can | 3824 // state |IGNORE_REQUESTS_FOR_TESTING|. So no suggested URL check result can |
| 3705 // arrive. | 3825 // arrive. |
| 3706 // - A cert error triggers an interstitial timer with a very long timeout. | 3826 // - A cert error triggers an interstitial timer with a very long timeout. |
| 3707 // - No suggested URL check results arrive, causing the tab to appear as loading | 3827 // - No suggested URL check results arrive, causing the tab to appear as loading |
| 3708 // indefinitely (also because the timer has a long timeout). | 3828 // indefinitely (also because the timer has a long timeout). |
| 3709 // - Stopping the page load shouldn't result in any interstitials. | 3829 // - Stopping the page load shouldn't result in any interstitials. |
| 3710 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 3830 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
| 3711 InterstitialStopNavigationWhileLoading) { | 3831 InterstitialStopNavigationWhileLoading) { |
| 3712 net::EmbeddedTestServer https_server_example_domain_( | 3832 net::EmbeddedTestServer https_server_example_domain( |
| 3713 net::EmbeddedTestServer::TYPE_HTTPS); | 3833 net::EmbeddedTestServer::TYPE_HTTPS); |
| 3714 https_server_example_domain_.ServeFilesFromSourceDirectory( | 3834 https_server_example_domain.ServeFilesFromSourceDirectory( |
| 3715 base::FilePath(kDocRoot)); | 3835 base::FilePath(kDocRoot)); |
| 3716 ASSERT_TRUE(https_server_example_domain_.Start()); | 3836 ASSERT_TRUE(https_server_example_domain.Start()); |
| 3717 | 3837 |
| 3718 scoped_refptr<net::X509Certificate> cert = | 3838 scoped_refptr<net::X509Certificate> cert = |
| 3719 https_server_example_domain_.GetCertificate(); | 3839 https_server_example_domain.GetCertificate(); |
| 3720 | 3840 |
| 3721 net::CertVerifyResult verify_result; | 3841 net::CertVerifyResult verify_result; |
| 3722 verify_result.verified_cert = | 3842 verify_result.verified_cert = |
| 3723 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3843 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3724 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; | 3844 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; |
| 3725 | 3845 |
| 3726 mock_cert_verifier()->AddResultForCertAndHost( | 3846 mock_cert_verifier()->AddResultForCertAndHost( |
| 3727 cert.get(), "www.mail.example.com", verify_result, | 3847 cert.get(), "www.mail.example.com", verify_result, |
| 3728 net::ERR_CERT_COMMON_NAME_INVALID); | 3848 net::ERR_CERT_COMMON_NAME_INVALID); |
| 3729 | 3849 |
| 3730 net::CertVerifyResult verify_result_valid; | 3850 net::CertVerifyResult verify_result_valid; |
| 3731 verify_result_valid.verified_cert = | 3851 verify_result_valid.verified_cert = |
| 3732 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3852 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3733 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", | 3853 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", |
| 3734 verify_result_valid, net::OK); | 3854 verify_result_valid, net::OK); |
| 3735 | 3855 |
| 3736 GURL https_server_url = | 3856 const GURL https_server_url = |
| 3737 https_server_example_domain_.GetURL("/ssl/google.html?a=b"); | 3857 https_server_example_domain.GetURL("/ssl/google.html?a=b"); |
| 3738 GURL::Replacements replacements; | 3858 GURL::Replacements replacements; |
| 3739 replacements.SetHostStr("www.mail.example.com"); | 3859 replacements.SetHostStr("www.mail.example.com"); |
| 3740 GURL https_server_mismatched_url = | 3860 const GURL https_server_mismatched_url = |
| 3741 https_server_url.ReplaceComponents(replacements); | 3861 https_server_url.ReplaceComponents(replacements); |
| 3742 | 3862 |
| 3743 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); | 3863 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); |
| 3744 CommonNameMismatchHandler::set_state_for_testing( | 3864 CommonNameMismatchHandler::set_state_for_testing( |
| 3745 CommonNameMismatchHandler::IGNORE_REQUESTS_FOR_TESTING); | 3865 CommonNameMismatchHandler::IGNORE_REQUESTS_FOR_TESTING); |
| 3746 // Set delay long enough so that the page appears loading. | 3866 // Set delay long enough so that the page appears loading. |
| 3747 SSLErrorHandler::SetInterstitialDelayForTesting( | 3867 SSLErrorHandler::SetInterstitialDelayForTesting( |
| 3748 base::TimeDelta::FromHours(1)); | 3868 base::TimeDelta::FromHours(1)); |
| 3749 SSLInterstitialTimerObserver interstitial_timer_observer(contents); | 3869 SSLInterstitialTimerObserver interstitial_timer_observer(contents); |
| 3750 | 3870 |
| (...skipping 14 matching lines...) Expand all Loading... | |
| 3765 // Make sure that the |SSLErrorHandler| is deleted. | 3885 // Make sure that the |SSLErrorHandler| is deleted. |
| 3766 EXPECT_FALSE(ssl_error_handler); | 3886 EXPECT_FALSE(ssl_error_handler); |
| 3767 EXPECT_FALSE(contents->ShowingInterstitialPage()); | 3887 EXPECT_FALSE(contents->ShowingInterstitialPage()); |
| 3768 EXPECT_FALSE(contents->IsLoading()); | 3888 EXPECT_FALSE(contents->IsLoading()); |
| 3769 } | 3889 } |
| 3770 | 3890 |
| 3771 // Same as above, but instead of stopping, the loading page is reloaded. The end | 3891 // Same as above, but instead of stopping, the loading page is reloaded. The end |
| 3772 // result is the same. (i.e. page load stops, no interstitials shown) | 3892 // result is the same. (i.e. page load stops, no interstitials shown) |
| 3773 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 3893 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
| 3774 InterstitialReloadNavigationWhileLoading) { | 3894 InterstitialReloadNavigationWhileLoading) { |
| 3775 net::EmbeddedTestServer https_server_example_domain_( | 3895 net::EmbeddedTestServer https_server_example_domain( |
| 3776 net::EmbeddedTestServer::TYPE_HTTPS); | 3896 net::EmbeddedTestServer::TYPE_HTTPS); |
| 3777 https_server_example_domain_.ServeFilesFromSourceDirectory( | 3897 https_server_example_domain.ServeFilesFromSourceDirectory( |
| 3778 base::FilePath(kDocRoot)); | 3898 base::FilePath(kDocRoot)); |
| 3779 ASSERT_TRUE(https_server_example_domain_.Start()); | 3899 ASSERT_TRUE(https_server_example_domain.Start()); |
| 3780 | 3900 |
| 3781 scoped_refptr<net::X509Certificate> cert = | 3901 scoped_refptr<net::X509Certificate> cert = |
| 3782 https_server_example_domain_.GetCertificate(); | 3902 https_server_example_domain.GetCertificate(); |
| 3783 | 3903 |
| 3784 net::CertVerifyResult verify_result; | 3904 net::CertVerifyResult verify_result; |
| 3785 verify_result.verified_cert = | 3905 verify_result.verified_cert = |
| 3786 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3906 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3787 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; | 3907 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; |
| 3788 | 3908 |
| 3789 mock_cert_verifier()->AddResultForCertAndHost( | 3909 mock_cert_verifier()->AddResultForCertAndHost( |
| 3790 cert.get(), "www.mail.example.com", verify_result, | 3910 cert.get(), "www.mail.example.com", verify_result, |
| 3791 net::ERR_CERT_COMMON_NAME_INVALID); | 3911 net::ERR_CERT_COMMON_NAME_INVALID); |
| 3792 | 3912 |
| 3793 net::CertVerifyResult verify_result_valid; | 3913 net::CertVerifyResult verify_result_valid; |
| 3794 verify_result_valid.verified_cert = | 3914 verify_result_valid.verified_cert = |
| 3795 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3915 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3796 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", | 3916 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", |
| 3797 verify_result_valid, net::OK); | 3917 verify_result_valid, net::OK); |
| 3798 | 3918 |
| 3799 GURL https_server_url = | 3919 const GURL https_server_url = |
| 3800 https_server_example_domain_.GetURL("/ssl/google.html?a=b"); | 3920 https_server_example_domain.GetURL("/ssl/google.html?a=b"); |
| 3801 GURL::Replacements replacements; | 3921 GURL::Replacements replacements; |
| 3802 replacements.SetHostStr("www.mail.example.com"); | 3922 replacements.SetHostStr("www.mail.example.com"); |
| 3803 GURL https_server_mismatched_url = | 3923 const GURL https_server_mismatched_url = |
| 3804 https_server_url.ReplaceComponents(replacements); | 3924 https_server_url.ReplaceComponents(replacements); |
| 3805 | 3925 |
| 3806 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); | 3926 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); |
| 3807 CommonNameMismatchHandler::set_state_for_testing( | 3927 CommonNameMismatchHandler::set_state_for_testing( |
| 3808 CommonNameMismatchHandler::IGNORE_REQUESTS_FOR_TESTING); | 3928 CommonNameMismatchHandler::IGNORE_REQUESTS_FOR_TESTING); |
| 3809 // Set delay long enough so that the page appears loading. | 3929 // Set delay long enough so that the page appears loading. |
| 3810 SSLErrorHandler::SetInterstitialDelayForTesting( | 3930 SSLErrorHandler::SetInterstitialDelayForTesting( |
| 3811 base::TimeDelta::FromHours(1)); | 3931 base::TimeDelta::FromHours(1)); |
| 3812 SSLInterstitialTimerObserver interstitial_timer_observer(contents); | 3932 SSLInterstitialTimerObserver interstitial_timer_observer(contents); |
| 3813 | 3933 |
| (...skipping 12 matching lines...) Expand all Loading... | |
| 3826 // Make sure that the |SSLErrorHandler| is deleted. | 3946 // Make sure that the |SSLErrorHandler| is deleted. |
| 3827 EXPECT_FALSE(ssl_error_handler); | 3947 EXPECT_FALSE(ssl_error_handler); |
| 3828 EXPECT_FALSE(contents->ShowingInterstitialPage()); | 3948 EXPECT_FALSE(contents->ShowingInterstitialPage()); |
| 3829 EXPECT_FALSE(contents->IsLoading()); | 3949 EXPECT_FALSE(contents->IsLoading()); |
| 3830 } | 3950 } |
| 3831 | 3951 |
| 3832 // Same as above, but instead of reloading, the page is navigated away. The | 3952 // Same as above, but instead of reloading, the page is navigated away. The |
| 3833 // new page should load, and no interstitials should be shown. | 3953 // new page should load, and no interstitials should be shown. |
| 3834 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, | 3954 IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
| 3835 InterstitialNavigateAwayWhileLoading) { | 3955 InterstitialNavigateAwayWhileLoading) { |
| 3836 net::EmbeddedTestServer https_server_example_domain_( | 3956 net::EmbeddedTestServer https_server_example_domain( |
| 3837 net::EmbeddedTestServer::TYPE_HTTPS); | 3957 net::EmbeddedTestServer::TYPE_HTTPS); |
| 3838 https_server_example_domain_.ServeFilesFromSourceDirectory( | 3958 https_server_example_domain.ServeFilesFromSourceDirectory( |
| 3839 base::FilePath(kDocRoot)); | 3959 base::FilePath(kDocRoot)); |
| 3840 ASSERT_TRUE(https_server_example_domain_.Start()); | 3960 ASSERT_TRUE(https_server_example_domain.Start()); |
| 3841 | 3961 |
| 3842 scoped_refptr<net::X509Certificate> cert = | 3962 scoped_refptr<net::X509Certificate> cert = |
| 3843 https_server_example_domain_.GetCertificate(); | 3963 https_server_example_domain.GetCertificate(); |
| 3844 | 3964 |
| 3845 net::CertVerifyResult verify_result; | 3965 net::CertVerifyResult verify_result; |
| 3846 verify_result.verified_cert = | 3966 verify_result.verified_cert = |
| 3847 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3967 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3848 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; | 3968 verify_result.cert_status = net::CERT_STATUS_COMMON_NAME_INVALID; |
| 3849 | 3969 |
| 3850 mock_cert_verifier()->AddResultForCertAndHost( | 3970 mock_cert_verifier()->AddResultForCertAndHost( |
| 3851 cert.get(), "www.mail.example.com", verify_result, | 3971 cert.get(), "www.mail.example.com", verify_result, |
| 3852 net::ERR_CERT_COMMON_NAME_INVALID); | 3972 net::ERR_CERT_COMMON_NAME_INVALID); |
| 3853 | 3973 |
| 3854 net::CertVerifyResult verify_result_valid; | 3974 net::CertVerifyResult verify_result_valid; |
| 3855 verify_result_valid.verified_cert = | 3975 verify_result_valid.verified_cert = |
| 3856 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); | 3976 net::ImportCertFromFile(net::GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 3857 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", | 3977 mock_cert_verifier()->AddResultForCertAndHost(cert.get(), "mail.example.com", |
| 3858 verify_result_valid, net::OK); | 3978 verify_result_valid, net::OK); |
| 3859 | 3979 |
| 3860 GURL https_server_url = | 3980 const GURL https_server_url = |
| 3861 https_server_example_domain_.GetURL("/ssl/google.html?a=b"); | 3981 https_server_example_domain.GetURL("/ssl/google.html?a=b"); |
| 3862 GURL::Replacements replacements; | 3982 GURL::Replacements replacements; |
| 3863 replacements.SetHostStr("www.mail.example.com"); | 3983 replacements.SetHostStr("www.mail.example.com"); |
| 3864 GURL https_server_mismatched_url = | 3984 const GURL https_server_mismatched_url = |
| 3865 https_server_url.ReplaceComponents(replacements); | 3985 https_server_url.ReplaceComponents(replacements); |
| 3866 | 3986 |
| 3867 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); | 3987 WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); |
| 3868 CommonNameMismatchHandler::set_state_for_testing( | 3988 CommonNameMismatchHandler::set_state_for_testing( |
| 3869 CommonNameMismatchHandler::IGNORE_REQUESTS_FOR_TESTING); | 3989 CommonNameMismatchHandler::IGNORE_REQUESTS_FOR_TESTING); |
| 3870 // Set delay long enough so that the page appears loading. | 3990 // Set delay long enough so that the page appears loading. |
| 3871 SSLErrorHandler::SetInterstitialDelayForTesting( | 3991 SSLErrorHandler::SetInterstitialDelayForTesting( |
| 3872 base::TimeDelta::FromHours(1)); | 3992 base::TimeDelta::FromHours(1)); |
| 3873 SSLInterstitialTimerObserver interstitial_timer_observer(contents); | 3993 SSLInterstitialTimerObserver interstitial_timer_observer(contents); |
| 3874 | 3994 |
| (...skipping 730 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 4605 | 4725 |
| 4606 // Visit a page over https that contains a frame with a redirect. | 4726 // Visit a page over https that contains a frame with a redirect. |
| 4607 | 4727 |
| 4608 // XMLHttpRequest insecure content in synchronous mode. | 4728 // XMLHttpRequest insecure content in synchronous mode. |
| 4609 | 4729 |
| 4610 // XMLHttpRequest insecure content in asynchronous mode. | 4730 // XMLHttpRequest insecure content in asynchronous mode. |
| 4611 | 4731 |
| 4612 // XMLHttpRequest over bad ssl in synchronous mode. | 4732 // XMLHttpRequest over bad ssl in synchronous mode. |
| 4613 | 4733 |
| 4614 // XMLHttpRequest over OK ssl in synchronous mode. | 4734 // XMLHttpRequest over OK ssl in synchronous mode. |
| OLD | NEW |