summaryrefslogtreecommitdiffstats
path: root/content/browser/ssl
diff options
context:
space:
mode:
authordavidben <davidben@chromium.org>2014-12-03 11:41:51 -0800
committerCommit bot <commit-bot@chromium.org>2014-12-03 19:42:30 +0000
commit78fee7dab63602d70b5fe3f58ee114d2968187a6 (patch)
treec06da125d52b7d39029512389f6cbb9005c68c60 /content/browser/ssl
parent426c5c108f7d63cfe388a0442c31cd1e7f006e34 (diff)
downloadchromium_src-78fee7dab63602d70b5fe3f58ee114d2968187a6.zip
chromium_src-78fee7dab63602d70b5fe3f58ee114d2968187a6.tar.gz
chromium_src-78fee7dab63602d70b5fe3f58ee114d2968187a6.tar.bz2
Re-revert of "Remove SSLClientAuthHandler's RDH dependency." (https://codereview.chromium.org/596873002)
Reason for revert: Causes browser crash if URL request is cancelled during client cert loading. This is a reland of https://codereview.chromium.org/766463002/ which reverted https://codereview.chromium.org/596873002. The revert was reverted because it introduced a memory leak. The source of this memory leak was a reference cycle in chrome/browser/chromeos/net/client_cert_filter_chromeos.cc whose fix is included in this CL. If InitIfSlotsAvailable returns true (synchronously), the callback should not be retained. This was not a problem before as the code in question was introduced after https://codereview.chromium.org/596873002 which unrefcounted an object. After this is merged into M-40, https://codereview.chromium.org/596873002 should be reworked with the crash fixed as this reference cycle is too subtle and the object really needn't be reference-counted. TBR=mmenke@chromium.org,benm@chromium.org,jam@chromium.org BUG=422765, 427844, 376003 Review URL: https://codereview.chromium.org/773003004 Cr-Commit-Position: refs/heads/master@{#306649}
Diffstat (limited to 'content/browser/ssl')
-rw-r--r--content/browser/ssl/ssl_client_auth_handler.cc111
-rw-r--r--content/browser/ssl/ssl_client_auth_handler.h58
2 files changed, 100 insertions, 69 deletions
diff --git a/content/browser/ssl/ssl_client_auth_handler.cc b/content/browser/ssl/ssl_client_auth_handler.cc
index 7eb680f..b063e619 100644
--- a/content/browser/ssl/ssl_client_auth_handler.cc
+++ b/content/browser/ssl/ssl_client_auth_handler.cc
@@ -5,84 +5,77 @@
#include "content/browser/ssl/ssl_client_auth_handler.h"
#include "base/bind.h"
-#include "base/logging.h"
+#include "content/browser/loader/resource_dispatcher_host_impl.h"
#include "content/browser/loader/resource_request_info_impl.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/content_browser_client.h"
#include "net/cert/x509_certificate.h"
+#include "net/http/http_transaction_factory.h"
#include "net/ssl/client_cert_store.h"
#include "net/url_request/url_request.h"
+#include "net/url_request/url_request_context.h"
namespace content {
-namespace {
-
-typedef base::Callback<void(net::X509Certificate*)> CertificateCallback;
-
-void CertificateSelectedOnUIThread(
- const CertificateCallback& io_thread_callback,
- net::X509Certificate* cert) {
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
-
- BrowserThread::PostTask(
- BrowserThread::IO, FROM_HERE,
- base::Bind(io_thread_callback, make_scoped_refptr(cert)));
-}
-
-void SelectCertificateOnUIThread(
- int render_process_host_id,
- int render_frame_host_id,
- net::SSLCertRequestInfo* cert_request_info,
- const CertificateCallback& io_thread_callback) {
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
-
- GetContentClient()->browser()->SelectClientCertificate(
- render_process_host_id, render_frame_host_id, cert_request_info,
- base::Bind(&CertificateSelectedOnUIThread, io_thread_callback));
-}
-
-} // namespace
-
SSLClientAuthHandler::SSLClientAuthHandler(
scoped_ptr<net::ClientCertStore> client_cert_store,
net::URLRequest* request,
- net::SSLCertRequestInfo* cert_request_info,
- const SSLClientAuthHandler::CertificateCallback& callback)
+ net::SSLCertRequestInfo* cert_request_info)
: request_(request),
+ http_network_session_(
+ request_->context()->http_transaction_factory()->GetSession()),
cert_request_info_(cert_request_info),
- client_cert_store_(client_cert_store.Pass()),
- callback_(callback),
- weak_factory_(this) {
+ client_cert_store_(client_cert_store.Pass()) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
}
SSLClientAuthHandler::~SSLClientAuthHandler() {
+ // If we were simply dropped, then act as if we selected no certificate.
+ DoCertificateSelected(NULL);
+}
+
+void SSLClientAuthHandler::OnRequestCancelled() {
+ request_ = NULL;
}
void SSLClientAuthHandler::SelectCertificate() {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
+ DCHECK(request_);
if (client_cert_store_) {
client_cert_store_->GetClientCerts(
*cert_request_info_,
&cert_request_info_->client_certs,
- base::Bind(&SSLClientAuthHandler::DidGetClientCerts,
- weak_factory_.GetWeakPtr()));
+ base::Bind(&SSLClientAuthHandler::DidGetClientCerts, this));
} else {
DidGetClientCerts();
}
}
+void SSLClientAuthHandler::CertificateSelected(net::X509Certificate* cert) {
+ DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
+
+ DVLOG(1) << this << " CertificateSelected " << cert;
+ BrowserThread::PostTask(
+ BrowserThread::IO, FROM_HERE,
+ base::Bind(
+ &SSLClientAuthHandler::DoCertificateSelected, this,
+ make_scoped_refptr(cert)));
+}
+
void SSLClientAuthHandler::DidGetClientCerts() {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
+ // Request may have cancelled while we were getting client certs.
+ if (!request_)
+ return;
// Note that if |client_cert_store_| is NULL, we intentionally fall through to
// DoCertificateSelected. This is for platforms where the client cert matching
- // is not performed by Chrome. Those platforms handle the cert matching before
- // showing the dialog.
+ // is not performed by Chrome, the platform can handle the cert matching
+ // before showing the dialog.
if (client_cert_store_ && cert_request_info_->client_certs.empty()) {
// No need to query the user if there are no certs to choose from.
- CertificateSelected(NULL);
+ DoCertificateSelected(NULL);
return;
}
@@ -90,27 +83,43 @@ void SSLClientAuthHandler::DidGetClientCerts() {
int render_frame_host_id;
if (!ResourceRequestInfo::ForRequest(request_)->GetAssociatedRenderFrame(
&render_process_host_id,
- &render_frame_host_id)) {
+ &render_frame_host_id))
NOTREACHED();
- CertificateSelected(NULL);
- return;
- }
+ // If the RVH does not exist by the time this task gets run, then the task
+ // will be dropped and the scoped_refptr to SSLClientAuthHandler will go
+ // away, so we do not leak anything. The destructor takes care of ensuring
+ // the net::URLRequest always gets a response.
BrowserThread::PostTask(
BrowserThread::UI, FROM_HERE,
- base::Bind(&SelectCertificateOnUIThread,
- render_process_host_id, render_frame_host_id,
- cert_request_info_,
- base::Bind(&SSLClientAuthHandler::CertificateSelected,
- weak_factory_.GetWeakPtr())));
+ base::Bind(
+ &SSLClientAuthHandler::DoSelectCertificate, this,
+ render_process_host_id, render_frame_host_id));
}
-void SSLClientAuthHandler::CertificateSelected(net::X509Certificate* cert) {
+void SSLClientAuthHandler::DoCertificateSelected(net::X509Certificate* cert) {
DVLOG(1) << this << " DoCertificateSelected " << cert;
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
+ // request_ could have been NULLed if the request was cancelled while the
+ // user was choosing a cert, or because we have already responded to the
+ // certificate.
+ if (request_) {
+ request_->ContinueWithCertificate(cert);
+
+ ResourceDispatcherHostImpl::Get()->
+ ClearSSLClientAuthHandlerForRequest(request_);
+ request_ = NULL;
+ }
+}
- callback_.Run(cert);
- // |this| may be deleted at this point.
+void SSLClientAuthHandler::DoSelectCertificate(
+ int render_process_host_id, int render_frame_host_id) {
+ GetContentClient()->browser()->SelectClientCertificate(
+ render_process_host_id,
+ render_frame_host_id,
+ http_network_session_,
+ cert_request_info_.get(),
+ base::Bind(&SSLClientAuthHandler::CertificateSelected, this));
}
} // namespace content
diff --git a/content/browser/ssl/ssl_client_auth_handler.h b/content/browser/ssl/ssl_client_auth_handler.h
index f95e65d..b848d54 100644
--- a/content/browser/ssl/ssl_client_auth_handler.h
+++ b/content/browser/ssl/ssl_client_auth_handler.h
@@ -6,57 +6,79 @@
#define CONTENT_BROWSER_SSL_SSL_CLIENT_AUTH_HANDLER_H_
#include "base/basictypes.h"
-#include "base/callback.h"
#include "base/memory/ref_counted.h"
-#include "base/memory/weak_ptr.h"
+#include "base/sequenced_task_runner_helpers.h"
+#include "content/common/content_export.h"
#include "content/public/browser/browser_thread.h"
#include "net/ssl/ssl_cert_request_info.h"
namespace net {
class ClientCertStore;
+class HttpNetworkSession;
class URLRequest;
class X509Certificate;
} // namespace net
namespace content {
+class ResourceContext;
+
// This class handles the approval and selection of a certificate for SSL client
-// authentication by the user. Should only be used on the IO thread. If the
-// SSLClientAuthHandler is destroyed before the certificate is selected, the
-// selection is canceled and the callback never called.
-class SSLClientAuthHandler {
+// authentication by the user.
+// It is self-owned and deletes itself when the UI reports the user selection or
+// when the net::URLRequest is cancelled.
+class CONTENT_EXPORT SSLClientAuthHandler
+ : public base::RefCountedThreadSafe<
+ SSLClientAuthHandler, BrowserThread::DeleteOnIOThread> {
public:
- typedef base::Callback<void(net::X509Certificate*)> CertificateCallback;
-
SSLClientAuthHandler(scoped_ptr<net::ClientCertStore> client_cert_store,
net::URLRequest* request,
- net::SSLCertRequestInfo* cert_request_info,
- const CertificateCallback& callback);
- ~SSLClientAuthHandler();
+ net::SSLCertRequestInfo* cert_request_info);
// Selects a certificate and resumes the URL request with that certificate.
+ // Should only be called on the IO thread.
void SelectCertificate();
+ // Invoked when the request associated with this handler is cancelled.
+ // Should only be called on the IO thread.
+ void OnRequestCancelled();
+
+ // Calls DoCertificateSelected on the I/O thread.
+ // Called on the UI thread after the user has made a selection (which may
+ // be long after DoSelectCertificate returns, if the UI is modeless/async.)
+ void CertificateSelected(net::X509Certificate* cert);
+
+ protected:
+ virtual ~SSLClientAuthHandler();
+
private:
+ friend class base::RefCountedThreadSafe<
+ SSLClientAuthHandler, BrowserThread::DeleteOnIOThread>;
+ friend class BrowserThread;
+ friend class base::DeleteHelper<SSLClientAuthHandler>;
+
// Called when ClientCertStore is done retrieving the cert list.
void DidGetClientCerts();
- // Called when the user has selected a cert.
- void CertificateSelected(net::X509Certificate* cert);
+ // Notifies that the user has selected a cert.
+ // Called on the IO thread.
+ void DoCertificateSelected(net::X509Certificate* cert);
+
+ // Selects a client certificate on the UI thread.
+ void DoSelectCertificate(int render_process_host_id,
+ int render_frame_host_id);
// The net::URLRequest that triggered this client auth.
net::URLRequest* request_;
+ // The HttpNetworkSession |request_| is associated with.
+ const net::HttpNetworkSession* http_network_session_;
+
// The certs to choose from.
scoped_refptr<net::SSLCertRequestInfo> cert_request_info_;
scoped_ptr<net::ClientCertStore> client_cert_store_;
- // The callback to call when the certificate is selected.
- CertificateCallback callback_;
-
- base::WeakPtrFactory<SSLClientAuthHandler> weak_factory_;
-
DISALLOW_COPY_AND_ASSIGN(SSLClientAuthHandler);
};