| Index: chrome/browser/ui/views/ssl_client_certificate_selector_browsertest.cc
|
| diff --git a/chrome/browser/ui/views/ssl_client_certificate_selector_browsertest.cc b/chrome/browser/ui/views/ssl_client_certificate_selector_browsertest.cc
|
| index f7e547ded522186e8ce68b311e743db70f1db565..aa76df18b63cfa50da36398942acfd2abe6d61c3 100644
|
| --- a/chrome/browser/ui/views/ssl_client_certificate_selector_browsertest.cc
|
| +++ b/chrome/browser/ui/views/ssl_client_certificate_selector_browsertest.cc
|
| @@ -21,6 +21,7 @@
|
| #include "net/base/request_priority.h"
|
| #include "net/cert/x509_certificate.h"
|
| #include "net/http/http_transaction_factory.h"
|
| +#include "net/ssl/client_cert_identity_test_util.h"
|
| #include "net/ssl/ssl_cert_request_info.h"
|
| #include "net/test/cert_test_util.h"
|
| #include "net/test/test_data_directory.h"
|
| @@ -31,10 +32,6 @@
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| #include "ui/views/test/widget_test.h"
|
|
|
| -#if defined(USE_NSS_CERTS)
|
| -#include "crypto/scoped_test_nss_db.h"
|
| -#endif
|
| -
|
| using ::testing::Mock;
|
| using ::testing::StrictMock;
|
| using content::BrowserThread;
|
| @@ -55,28 +52,15 @@ class SSLClientCertificateSelectorTest : public InProcessBrowserTest {
|
| void SetUpInProcessBrowserTestFixture() override {
|
| base::FilePath certs_dir = net::GetTestCertsDirectory();
|
|
|
| -#if defined(USE_NSS_CERTS)
|
| - // If USE_NSS_CERTS, the selector tries to unlock the slot where the
|
| - // private key of each certificate is stored. If no private key is found,
|
| - // the slot would be null and the unlock will crash.
|
| - ASSERT_TRUE(test_nssdb_.is_open());
|
| - client_cert_1_ = net::ImportClientCertAndKeyFromFile(
|
| - certs_dir, "client_1.pem", "client_1.pk8", test_nssdb_.slot());
|
| - client_cert_2_ = net::ImportClientCertAndKeyFromFile(
|
| - certs_dir, "client_2.pem", "client_2.pk8", test_nssdb_.slot());
|
| -#else
|
| - // No unlock is attempted if !USE_NSS_CERTS. Thus, there is no need to
|
| - // import a private key.
|
| - client_cert_1_ = net::ImportCertFromFile(certs_dir, "client_1.pem");
|
| - client_cert_2_ = net::ImportCertFromFile(certs_dir, "client_2.pem");
|
| -#endif
|
| - ASSERT_NE(nullptr, client_cert_1_.get());
|
| - ASSERT_NE(nullptr, client_cert_2_.get());
|
| + cert_identity_1_ = net::FakeClientCertIdentity::CreateFromCertAndKeyFiles(
|
| + certs_dir, "client_1.pem", "client_1.pk8");
|
| + ASSERT_TRUE(cert_identity_1_);
|
| + cert_identity_2_ = net::FakeClientCertIdentity::CreateFromCertAndKeyFiles(
|
| + certs_dir, "client_2.pem", "client_2.pk8");
|
| + ASSERT_TRUE(cert_identity_2_);
|
|
|
| cert_request_info_ = new net::SSLCertRequestInfo;
|
| cert_request_info_->host_and_port = net::HostPortPair("foo", 123);
|
| - client_certs_.push_back(client_cert_1_);
|
| - client_certs_.push_back(client_cert_2_);
|
| }
|
|
|
| void SetUpOnMainThread() override {
|
| @@ -91,14 +75,19 @@ class SSLClientCertificateSelectorTest : public InProcessBrowserTest {
|
|
|
| content::WaitForLoadStop(
|
| browser()->tab_strip_model()->GetActiveWebContents());
|
| + net::ClientCertIdentityList cert_identity_list;
|
| + cert_identity_list.push_back(cert_identity_1_->Copy());
|
| + cert_identity_list.push_back(cert_identity_2_->Copy());
|
| selector_ = new SSLClientCertificateSelector(
|
| browser()->tab_strip_model()->GetActiveWebContents(),
|
| - auth_requestor_->cert_request_info_, client_certs_,
|
| + auth_requestor_->cert_request_info_, std::move(cert_identity_list),
|
| auth_requestor_->CreateDelegate());
|
| selector_->Init();
|
| selector_->Show();
|
|
|
| - EXPECT_EQ(client_cert_1_.get(), selector_->GetSelectedCert());
|
| + ASSERT_TRUE(selector_->GetSelectedCert());
|
| + EXPECT_EQ(cert_identity_1_->certificate(),
|
| + selector_->GetSelectedCert()->certificate());
|
| }
|
|
|
| virtual void SetUpOnIOThread() {
|
| @@ -143,16 +132,12 @@ class SSLClientCertificateSelectorTest : public InProcessBrowserTest {
|
| scoped_refptr<net::URLRequestContextGetter> url_request_context_getter_;
|
| net::URLRequest* url_request_;
|
|
|
| - scoped_refptr<net::X509Certificate> client_cert_1_;
|
| - scoped_refptr<net::X509Certificate> client_cert_2_;
|
| - net::CertificateList client_certs_;
|
| + std::unique_ptr<net::FakeClientCertIdentity> cert_identity_1_;
|
| + std::unique_ptr<net::FakeClientCertIdentity> cert_identity_2_;
|
| scoped_refptr<net::SSLCertRequestInfo> cert_request_info_;
|
| scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_;
|
| // The selector will be deleted when a cert is selected or the tab is closed.
|
| SSLClientCertificateSelector* selector_;
|
| -#if defined(USE_NSS_CERTS)
|
| - crypto::ScopedTestNSSDB test_nssdb_;
|
| -#endif
|
| };
|
|
|
| class SSLClientCertificateSelectorMultiTabTest
|
| @@ -163,13 +148,9 @@ class SSLClientCertificateSelectorMultiTabTest
|
|
|
| cert_request_info_1_ = new net::SSLCertRequestInfo;
|
| cert_request_info_1_->host_and_port = net::HostPortPair("bar", 123);
|
| - client_certs_1_.push_back(client_cert_1_);
|
| - client_certs_1_.push_back(client_cert_2_);
|
|
|
| cert_request_info_2_ = new net::SSLCertRequestInfo;
|
| cert_request_info_2_->host_and_port = net::HostPortPair("bar", 123);
|
| - client_certs_2_.push_back(client_cert_1_);
|
| - client_certs_2_.push_back(client_cert_2_);
|
| }
|
|
|
| void SetUpOnMainThread() override {
|
| @@ -184,22 +165,33 @@ class SSLClientCertificateSelectorMultiTabTest
|
| content::WaitForLoadStop(browser()->tab_strip_model()->GetWebContentsAt(1));
|
| content::WaitForLoadStop(browser()->tab_strip_model()->GetWebContentsAt(2));
|
|
|
| + net::ClientCertIdentityList cert_identity_list_1;
|
| + cert_identity_list_1.push_back(cert_identity_1_->Copy());
|
| + cert_identity_list_1.push_back(cert_identity_2_->Copy());
|
| selector_1_ = new SSLClientCertificateSelector(
|
| browser()->tab_strip_model()->GetWebContentsAt(1),
|
| - auth_requestor_1_->cert_request_info_, client_certs_1_,
|
| + auth_requestor_1_->cert_request_info_, std::move(cert_identity_list_1),
|
| auth_requestor_1_->CreateDelegate());
|
| selector_1_->Init();
|
| selector_1_->Show();
|
| +
|
| + net::ClientCertIdentityList cert_identity_list_2;
|
| + cert_identity_list_2.push_back(cert_identity_1_->Copy());
|
| + cert_identity_list_2.push_back(cert_identity_2_->Copy());
|
| selector_2_ = new SSLClientCertificateSelector(
|
| browser()->tab_strip_model()->GetWebContentsAt(2),
|
| - auth_requestor_2_->cert_request_info_, client_certs_2_,
|
| + auth_requestor_2_->cert_request_info_, std::move(cert_identity_list_2),
|
| auth_requestor_2_->CreateDelegate());
|
| selector_2_->Init();
|
| selector_2_->Show();
|
|
|
| EXPECT_EQ(2, browser()->tab_strip_model()->active_index());
|
| - EXPECT_EQ(client_cert_1_.get(), selector_1_->GetSelectedCert());
|
| - EXPECT_EQ(client_cert_1_.get(), selector_2_->GetSelectedCert());
|
| + ASSERT_TRUE(selector_1_->GetSelectedCert());
|
| + EXPECT_EQ(cert_identity_1_->certificate(),
|
| + selector_1_->GetSelectedCert()->certificate());
|
| + ASSERT_TRUE(selector_2_->GetSelectedCert());
|
| + EXPECT_EQ(cert_identity_1_->certificate(),
|
| + selector_2_->GetSelectedCert()->certificate());
|
| }
|
|
|
| void SetUpOnIOThread() override {
|
| @@ -235,8 +227,6 @@ class SSLClientCertificateSelectorMultiTabTest
|
| net::URLRequest* url_request_2_;
|
| scoped_refptr<net::SSLCertRequestInfo> cert_request_info_1_;
|
| scoped_refptr<net::SSLCertRequestInfo> cert_request_info_2_;
|
| - net::CertificateList client_certs_1_;
|
| - net::CertificateList client_certs_2_;
|
| scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_1_;
|
| scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_2_;
|
| SSLClientCertificateSelector* selector_1_;
|
| @@ -251,8 +241,6 @@ class SSLClientCertificateSelectorMultiProfileTest
|
|
|
| cert_request_info_1_ = new net::SSLCertRequestInfo;
|
| cert_request_info_1_->host_and_port = net::HostPortPair("foo", 123);
|
| - client_certs_1_.push_back(client_cert_1_);
|
| - client_certs_1_.push_back(client_cert_2_);
|
| }
|
|
|
| void SetUpOnMainThread() override {
|
| @@ -262,9 +250,12 @@ class SSLClientCertificateSelectorMultiProfileTest
|
| // Also calls SetUpOnIOThread.
|
| SSLClientCertificateSelectorTest::SetUpOnMainThread();
|
|
|
| + net::ClientCertIdentityList cert_identity_list;
|
| + cert_identity_list.push_back(cert_identity_1_->Copy());
|
| + cert_identity_list.push_back(cert_identity_2_->Copy());
|
| selector_1_ = new SSLClientCertificateSelector(
|
| browser_1_->tab_strip_model()->GetActiveWebContents(),
|
| - auth_requestor_1_->cert_request_info_, client_certs_1_,
|
| + auth_requestor_1_->cert_request_info_, std::move(cert_identity_list),
|
| auth_requestor_1_->CreateDelegate());
|
| selector_1_->Init();
|
| selector_1_->Show();
|
| @@ -275,7 +266,9 @@ class SSLClientCertificateSelectorMultiProfileTest
|
| views::test::WidgetActivationWaiter waiter(widget, true);
|
| waiter.Wait();
|
|
|
| - EXPECT_EQ(client_cert_1_.get(), selector_1_->GetSelectedCert());
|
| + ASSERT_TRUE(selector_1_->GetSelectedCert());
|
| + EXPECT_EQ(cert_identity_1_->certificate(),
|
| + selector_1_->GetSelectedCert()->certificate());
|
| }
|
|
|
| void SetUpOnIOThread() override {
|
| @@ -304,7 +297,6 @@ class SSLClientCertificateSelectorMultiProfileTest
|
| scoped_refptr<net::URLRequestContextGetter> url_request_context_getter_1_;
|
| net::URLRequest* url_request_1_;
|
| scoped_refptr<net::SSLCertRequestInfo> cert_request_info_1_;
|
| - net::CertificateList client_certs_1_;
|
| scoped_refptr<StrictMock<SSLClientAuthRequestorMock> > auth_requestor_1_;
|
| SSLClientCertificateSelector* selector_1_;
|
| };
|
| @@ -316,7 +308,7 @@ IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, SelectNone) {
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, Escape) {
|
| - EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(NULL));
|
| + EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(nullptr, nullptr));
|
|
|
| EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
|
| browser(), ui::VKEY_ESCAPE, false, false, false, false));
|
| @@ -326,7 +318,8 @@ IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, Escape) {
|
|
|
| IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, SelectDefault) {
|
| EXPECT_CALL(*auth_requestor_.get(),
|
| - CertificateSelected(client_cert_1_.get()));
|
| + CertificateSelected(cert_identity_1_->certificate(),
|
| + cert_identity_1_->ssl_private_key()));
|
|
|
| EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
|
| browser(), ui::VKEY_RETURN, false, false, false, false));
|
| @@ -338,8 +331,8 @@ IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiTabTest, Escape) {
|
| // auth_requestor_1_ should get selected automatically by the
|
| // SSLClientAuthObserver when selector_2_ is accepted, since both 1 & 2 have
|
| // the same host:port.
|
| - EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(NULL));
|
| - EXPECT_CALL(*auth_requestor_2_.get(), CertificateSelected(NULL));
|
| + EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(nullptr, nullptr));
|
| + EXPECT_CALL(*auth_requestor_2_.get(), CertificateSelected(nullptr, nullptr));
|
|
|
| EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
|
| browser(), ui::VKEY_ESCAPE, false, false, false, false));
|
| @@ -358,16 +351,24 @@ IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiTabTest, SelectSecond) {
|
| // SSLClientAuthObserver when selector_2_ is accepted, since both 1 & 2 have
|
| // the same host:port.
|
| EXPECT_CALL(*auth_requestor_1_.get(),
|
| - CertificateSelected(client_cert_2_.get()));
|
| + CertificateSelected(cert_identity_2_->certificate(),
|
| + cert_identity_2_->ssl_private_key()));
|
| EXPECT_CALL(*auth_requestor_2_.get(),
|
| - CertificateSelected(client_cert_2_.get()));
|
| + CertificateSelected(cert_identity_2_->certificate(),
|
| + cert_identity_2_->ssl_private_key()));
|
|
|
| EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
|
| browser(), ui::VKEY_DOWN, false, false, false, false));
|
|
|
| - EXPECT_EQ(client_cert_1_.get(), selector_->GetSelectedCert());
|
| - EXPECT_EQ(client_cert_1_.get(), selector_1_->GetSelectedCert());
|
| - EXPECT_EQ(client_cert_2_.get(), selector_2_->GetSelectedCert());
|
| + ASSERT_TRUE(selector_->GetSelectedCert());
|
| + EXPECT_EQ(cert_identity_1_->certificate(),
|
| + selector_->GetSelectedCert()->certificate());
|
| + ASSERT_TRUE(selector_1_->GetSelectedCert());
|
| + EXPECT_EQ(cert_identity_1_->certificate(),
|
| + selector_1_->GetSelectedCert()->certificate());
|
| + ASSERT_TRUE(selector_2_->GetSelectedCert());
|
| + EXPECT_EQ(cert_identity_2_->certificate(),
|
| + selector_2_->GetSelectedCert()->certificate());
|
|
|
| EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
|
| browser(), ui::VKEY_RETURN, false, false, false, false));
|
| @@ -382,7 +383,7 @@ IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiTabTest, SelectSecond) {
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiProfileTest, Escape) {
|
| - EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(NULL));
|
| + EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(nullptr, nullptr));
|
|
|
| EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
|
| browser_1_, ui::VKEY_ESCAPE, false, false, false, false));
|
| @@ -398,7 +399,8 @@ IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiProfileTest, Escape) {
|
| IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiProfileTest,
|
| SelectDefault) {
|
| EXPECT_CALL(*auth_requestor_1_.get(),
|
| - CertificateSelected(client_cert_1_.get()));
|
| + CertificateSelected(cert_identity_1_->certificate(),
|
| + cert_identity_1_->ssl_private_key()));
|
|
|
| EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
|
| browser_1_, ui::VKEY_RETURN, false, false, false, false));
|
|
|