network_service_allow_remote_certificate_verification_logic.patch 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
  2. From: Jeremy Apthorp <[email protected]>
  3. Date: Wed, 8 May 2019 17:25:55 -0700
  4. Subject: network_service_allow_remote_certificate_verification_logic.patch
  5. This adds a callback from the network service that's used to implement
  6. session.setCertificateVerifyCallback.
  7. diff --git a/services/network/network_context.cc b/services/network/network_context.cc
  8. index a38eeaf6e58af7bf02fe82b035cc8d9726057965..83fde65c34f12fee6b2ef867f94fdd31252b60cf 100644
  9. --- a/services/network/network_context.cc
  10. +++ b/services/network/network_context.cc
  11. @@ -117,6 +117,11 @@
  12. #include "services/network/web_transport.h"
  13. #include "third_party/abseil-cpp/absl/types/optional.h"
  14. +// Electron
  15. +#include "net/cert/caching_cert_verifier.h"
  16. +#include "net/cert/cert_verify_proc.h"
  17. +#include "net/cert/multi_threaded_cert_verifier.h"
  18. +
  19. #if BUILDFLAG(IS_CT_SUPPORTED)
  20. #include "components/certificate_transparency/chrome_ct_policy_enforcer.h"
  21. #include "components/certificate_transparency/chrome_require_ct_delegate.h"
  22. @@ -400,6 +405,79 @@ void GetCTPolicyConfigForCTLogInfo(
  23. } // namespace
  24. +class RemoteCertVerifier : public net::CertVerifier {
  25. + public:
  26. + RemoteCertVerifier(std::unique_ptr<net::CertVerifier> upstream): upstream_(std::move(upstream)) {
  27. + }
  28. + ~RemoteCertVerifier() override = default;
  29. +
  30. + void Bind(
  31. + mojo::PendingRemote<mojom::CertVerifierClient> client_info) {
  32. + client_.reset();
  33. + if (client_info.is_valid()) {
  34. + client_.Bind(std::move(client_info));
  35. + }
  36. + }
  37. +
  38. + // CertVerifier implementation
  39. + int Verify(const RequestParams& params,
  40. + net::CertVerifyResult* verify_result,
  41. + net::CompletionOnceCallback callback,
  42. + std::unique_ptr<Request>* out_req,
  43. + const net::NetLogWithSource& net_log) override {
  44. + out_req->reset();
  45. +
  46. + net::CompletionOnceCallback callback2 = base::BindOnce(
  47. + &RemoteCertVerifier::OnRequestFinished, base::Unretained(this),
  48. + params, std::move(callback), verify_result);
  49. + int result = upstream_->Verify(params, verify_result,
  50. + std::move(callback2), out_req, net_log);
  51. + if (result != net::ERR_IO_PENDING) {
  52. + // Synchronous completion
  53. + }
  54. +
  55. + return result;
  56. + }
  57. +
  58. +
  59. + void SetConfig(const Config& config) override {
  60. + upstream_->SetConfig(config);
  61. + }
  62. +
  63. + void OnRequestFinished(const RequestParams& params, net::CompletionOnceCallback callback, net::CertVerifyResult* verify_result, int error) {
  64. + if (client_.is_bound()) {
  65. + client_->Verify(error, *verify_result, params.certificate(),
  66. + params.hostname(), params.flags(), params.ocsp_response(),
  67. + base::BindOnce(&RemoteCertVerifier::OnRemoteResponse,
  68. + base::Unretained(this), params, verify_result, error,
  69. + std::move(callback)));
  70. + } else {
  71. + std::move(callback).Run(error);
  72. + }
  73. + }
  74. +
  75. + void OnRemoteResponse(
  76. + const RequestParams& params,
  77. + net::CertVerifyResult* verify_result,
  78. + int error,
  79. + net::CompletionOnceCallback callback,
  80. + int error2,
  81. + const net::CertVerifyResult& verify_result2) {
  82. + if (error2 == net::ERR_ABORTED) {
  83. + // use the default
  84. + std::move(callback).Run(error);
  85. + } else {
  86. + // use the override
  87. + verify_result->Reset();
  88. + verify_result->verified_cert = verify_result2.verified_cert;
  89. + std::move(callback).Run(error2);
  90. + }
  91. + }
  92. + private:
  93. + std::unique_ptr<net::CertVerifier> upstream_;
  94. + mojo::Remote<mojom::CertVerifierClient> client_;
  95. +};
  96. +
  97. constexpr uint32_t NetworkContext::kMaxOutstandingRequestsPerProcess;
  98. NetworkContext::PendingCertVerify::PendingCertVerify() = default;
  99. @@ -612,6 +690,13 @@ void NetworkContext::SetClient(
  100. client_.Bind(std::move(client));
  101. }
  102. +void NetworkContext::SetCertVerifierClient(
  103. + mojo::PendingRemote<mojom::CertVerifierClient> client) {
  104. + if (remote_cert_verifier_) {
  105. + remote_cert_verifier_->Bind(std::move(client));
  106. + }
  107. +}
  108. +
  109. void NetworkContext::CreateURLLoaderFactory(
  110. mojo::PendingReceiver<mojom::URLLoaderFactory> receiver,
  111. mojom::URLLoaderFactoryParamsPtr params) {
  112. @@ -1996,6 +2081,9 @@ URLRequestContextOwner NetworkContext::MakeURLRequestContext(
  113. std::move(cert_verifier));
  114. cert_verifier = base::WrapUnique(cert_verifier_with_trust_anchors_);
  115. #endif // BUILDFLAG(IS_CHROMEOS_ASH)
  116. + auto remote_cert_verifier = std::make_unique<RemoteCertVerifier>(std::move(cert_verifier));
  117. + remote_cert_verifier_ = remote_cert_verifier.get();
  118. + cert_verifier = std::make_unique<net::CachingCertVerifier>(std::move(remote_cert_verifier));
  119. }
  120. builder.SetCertVerifier(IgnoreErrorsCertVerifier::MaybeWrapCertVerifier(
  121. diff --git a/services/network/network_context.h b/services/network/network_context.h
  122. index 7ecd11bb762d0ccaa104d0cc198b66db2aed8143..1f09e757f9ac7f9f101066beddbd2f540cfd5b7d 100644
  123. --- a/services/network/network_context.h
  124. +++ b/services/network/network_context.h
  125. @@ -91,6 +91,7 @@ class DomainReliabilityMonitor;
  126. namespace network {
  127. class CertVerifierWithTrustAnchors;
  128. +class RemoteCertVerifier;
  129. class CookieManager;
  130. class ExpectCTReporter;
  131. class HostResolver;
  132. @@ -195,6 +196,8 @@ class COMPONENT_EXPORT(NETWORK_SERVICE) NetworkContext
  133. void CreateURLLoaderFactory(
  134. mojo::PendingReceiver<mojom::URLLoaderFactory> receiver,
  135. mojom::URLLoaderFactoryParamsPtr params) override;
  136. + void SetCertVerifierClient(
  137. + mojo::PendingRemote<mojom::CertVerifierClient> client) override;
  138. void ResetURLLoaderFactories() override;
  139. void GetCookieManager(
  140. mojo::PendingReceiver<mojom::CookieManager> receiver) override;
  141. @@ -707,6 +710,8 @@ class COMPONENT_EXPORT(NETWORK_SERVICE) NetworkContext
  142. CertVerifierWithTrustAnchors* cert_verifier_with_trust_anchors_ = nullptr;
  143. #endif
  144. + RemoteCertVerifier* remote_cert_verifier_ = nullptr;
  145. +
  146. // CertNetFetcher used by the context's CertVerifier. May be nullptr if
  147. // CertNetFetcher is not used by the current platform, or if the actual
  148. // net::CertVerifier is instantiated outside of the network service.
  149. diff --git a/services/network/public/mojom/network_context.mojom b/services/network/public/mojom/network_context.mojom
  150. index 25d6c99d4f6bed4f464b7081e33f2a16b65d3521..5dfc30d2feb37f78dd6eac088366a0dc3e1cf8e4 100644
  151. --- a/services/network/public/mojom/network_context.mojom
  152. +++ b/services/network/public/mojom/network_context.mojom
  153. @@ -189,6 +189,17 @@ struct CTPolicy {
  154. array<string> excluded_legacy_spkis;
  155. };
  156. +interface CertVerifierClient {
  157. + Verify(
  158. + int32 default_error,
  159. + CertVerifyResult default_result,
  160. + X509Certificate certificate,
  161. + string hostname,
  162. + int32 flags,
  163. + string? ocsp_response
  164. + ) => (int32 error_code, CertVerifyResult result);
  165. +};
  166. +
  167. // Parameters for constructing a network context.
  168. struct NetworkContextParams {
  169. // Name used by memory tools to identify the context.
  170. @@ -724,6 +735,9 @@ interface NetworkContext {
  171. // Sets a client for this network context.
  172. SetClient(pending_remote<NetworkContextClient> client);
  173. + // Sets a certificate verifier client for this network context.
  174. + SetCertVerifierClient(pending_remote<CertVerifierClient>? client);
  175. +
  176. // Creates a new URLLoaderFactory with the given |params|.
  177. CreateURLLoaderFactory(pending_receiver<URLLoaderFactory> url_loader_factory,
  178. URLLoaderFactoryParams params);