Emit verify-certificate only when default verifier fails
This commit is contained in:
parent
e3517b701e
commit
ebe66daa56
4 changed files with 65 additions and 68 deletions
|
@ -266,11 +266,12 @@ void Session::RequestCertVerification(
|
||||||
const scoped_refptr<AtomCertVerifier::CertVerifyRequest>& request) {
|
const scoped_refptr<AtomCertVerifier::CertVerifyRequest>& request) {
|
||||||
bool prevent_default = Emit(
|
bool prevent_default = Emit(
|
||||||
"verify-certificate",
|
"verify-certificate",
|
||||||
request->hostname(),
|
request->args().hostname,
|
||||||
make_scoped_refptr(request->cert()),
|
request->args().cert,
|
||||||
base::Bind(&PassVerificationResult, request));
|
base::Bind(&PassVerificationResult, request));
|
||||||
|
|
||||||
if (!prevent_default)
|
if (!prevent_default)
|
||||||
|
// Tell the request to use the result of default verifier.
|
||||||
request->ContinueWithResult(net::ERR_IO_PENDING);
|
request->ContinueWithResult(net::ERR_IO_PENDING);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -15,6 +15,9 @@ using content::BrowserThread;
|
||||||
|
|
||||||
namespace atom {
|
namespace atom {
|
||||||
|
|
||||||
|
AtomCertVerifier::CertVerifyRequest::~CertVerifyRequest() {
|
||||||
|
}
|
||||||
|
|
||||||
void AtomCertVerifier::CertVerifyRequest::ContinueWithResult(int result) {
|
void AtomCertVerifier::CertVerifyRequest::ContinueWithResult(int result) {
|
||||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||||
|
|
||||||
|
@ -22,25 +25,10 @@ void AtomCertVerifier::CertVerifyRequest::ContinueWithResult(int result) {
|
||||||
return;
|
return;
|
||||||
|
|
||||||
handled_ = true;
|
handled_ = true;
|
||||||
|
|
||||||
if (result != net::ERR_IO_PENDING) {
|
|
||||||
BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
|
|
||||||
base::Bind(callback_, result));
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
BrowserThread::PostTask(
|
BrowserThread::PostTask(
|
||||||
BrowserThread::IO, FROM_HERE,
|
BrowserThread::IO, FROM_HERE,
|
||||||
base::Bind(&CertVerifyRequest::DelegateToDefaultVerifier, this));
|
base::Bind(args_.callback,
|
||||||
}
|
result == net::ERR_IO_PENDING ? result_ : result));
|
||||||
|
|
||||||
void AtomCertVerifier::CertVerifyRequest::DelegateToDefaultVerifier() {
|
|
||||||
DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
|
||||||
int result = cert_verifier_->default_cert_verifier_->Verify(
|
|
||||||
cert_.get(), hostname_, ocsp_response_, flags_, crl_set_.get(),
|
|
||||||
verify_result_, callback_, out_req_, net_log_);
|
|
||||||
if (result != net::ERR_IO_PENDING)
|
|
||||||
callback_.Run(result);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
AtomCertVerifier::AtomCertVerifier()
|
AtomCertVerifier::AtomCertVerifier()
|
||||||
|
@ -66,18 +54,42 @@ int AtomCertVerifier::Verify(
|
||||||
if (callback.is_null() || !verify_result || hostname.empty() || !delegate_)
|
if (callback.is_null() || !verify_result || hostname.empty() || !delegate_)
|
||||||
return net::ERR_INVALID_ARGUMENT;
|
return net::ERR_INVALID_ARGUMENT;
|
||||||
|
|
||||||
CertVerifyRequest* request = new CertVerifyRequest(
|
VerifyArgs args = { cert, hostname, callback };
|
||||||
this, cert, hostname, ocsp_response, flags, crl_set, verify_result,
|
int result = default_cert_verifier_->Verify(
|
||||||
callback, out_req, net_log);
|
cert, hostname, ocsp_response, flags, crl_set, verify_result,
|
||||||
BrowserThread::PostTask(BrowserThread::UI, FROM_HERE,
|
base::Bind(&AtomCertVerifier::OnDefaultVerificationResult,
|
||||||
base::Bind(&Delegate::RequestCertVerification,
|
base::Unretained(this), args),
|
||||||
base::Unretained(delegate_),
|
out_req, net_log);
|
||||||
make_scoped_refptr(request)));
|
if (result != net::OK && result != net::ERR_IO_PENDING) {
|
||||||
return net::ERR_IO_PENDING;
|
// The default verifier fails immediately.
|
||||||
|
VerifyCertificateFromDelegate(args, result);
|
||||||
|
return net::ERR_IO_PENDING;
|
||||||
|
}
|
||||||
|
|
||||||
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool AtomCertVerifier::SupportsOCSPStapling() {
|
bool AtomCertVerifier::SupportsOCSPStapling() {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void AtomCertVerifier::VerifyCertificateFromDelegate(
|
||||||
|
const VerifyArgs& args, int result) {
|
||||||
|
CertVerifyRequest* request = new CertVerifyRequest(this, result, args);
|
||||||
|
BrowserThread::PostTask(BrowserThread::UI, FROM_HERE,
|
||||||
|
base::Bind(&Delegate::RequestCertVerification,
|
||||||
|
base::Unretained(delegate_),
|
||||||
|
make_scoped_refptr(request)));
|
||||||
|
}
|
||||||
|
|
||||||
|
void AtomCertVerifier::OnDefaultVerificationResult(
|
||||||
|
const VerifyArgs& args, int result) {
|
||||||
|
if (result == net::OK) {
|
||||||
|
args.callback.Run(result);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
VerifyCertificateFromDelegate(args, result);
|
||||||
|
}
|
||||||
|
|
||||||
} // namespace atom
|
} // namespace atom
|
||||||
|
|
|
@ -14,55 +14,35 @@ namespace atom {
|
||||||
|
|
||||||
class AtomCertVerifier : public net::CertVerifier {
|
class AtomCertVerifier : public net::CertVerifier {
|
||||||
public:
|
public:
|
||||||
|
struct VerifyArgs {
|
||||||
|
scoped_refptr<net::X509Certificate> cert;
|
||||||
|
const std::string& hostname;
|
||||||
|
net::CompletionCallback callback;
|
||||||
|
};
|
||||||
|
|
||||||
class CertVerifyRequest
|
class CertVerifyRequest
|
||||||
: public base::RefCountedThreadSafe<CertVerifyRequest> {
|
: public base::RefCountedThreadSafe<CertVerifyRequest> {
|
||||||
public:
|
public:
|
||||||
CertVerifyRequest(AtomCertVerifier* cert_verifier,
|
CertVerifyRequest(AtomCertVerifier* cert_verifier,
|
||||||
net::X509Certificate* cert,
|
int result,
|
||||||
const std::string& hostname,
|
const VerifyArgs& args)
|
||||||
const std::string& ocsp_response,
|
|
||||||
int flags,
|
|
||||||
net::CRLSet* crl_set,
|
|
||||||
net::CertVerifyResult* verify_result,
|
|
||||||
const net::CompletionCallback& callback,
|
|
||||||
scoped_ptr<Request>* out_req,
|
|
||||||
const net::BoundNetLog& net_log)
|
|
||||||
: cert_verifier_(cert_verifier),
|
: cert_verifier_(cert_verifier),
|
||||||
cert_(cert),
|
result_(result),
|
||||||
hostname_(hostname),
|
args_(args),
|
||||||
ocsp_response_(ocsp_response),
|
|
||||||
flags_(flags),
|
|
||||||
crl_set_(crl_set),
|
|
||||||
verify_result_(verify_result),
|
|
||||||
callback_(callback),
|
|
||||||
out_req_(out_req),
|
|
||||||
net_log_(net_log),
|
|
||||||
handled_(false) {
|
handled_(false) {
|
||||||
}
|
}
|
||||||
|
|
||||||
void ContinueWithResult(int result);
|
void ContinueWithResult(int result);
|
||||||
|
|
||||||
const std::string& hostname() const { return hostname_; }
|
const VerifyArgs& args() const { return args_; }
|
||||||
net::X509Certificate* cert() const { return cert_.get(); }
|
|
||||||
|
|
||||||
private:
|
private:
|
||||||
friend class base::RefCountedThreadSafe<CertVerifyRequest>;
|
friend class base::RefCountedThreadSafe<CertVerifyRequest>;
|
||||||
~CertVerifyRequest() {}
|
~CertVerifyRequest();
|
||||||
|
|
||||||
void DelegateToDefaultVerifier();
|
|
||||||
|
|
||||||
AtomCertVerifier* cert_verifier_;
|
AtomCertVerifier* cert_verifier_;
|
||||||
|
int result_;
|
||||||
scoped_refptr<net::X509Certificate> cert_;
|
VerifyArgs args_;
|
||||||
std::string hostname_;
|
|
||||||
std::string ocsp_response_;
|
|
||||||
int flags_;
|
|
||||||
scoped_refptr<net::CRLSet> crl_set_;
|
|
||||||
net::CertVerifyResult* verify_result_;
|
|
||||||
net::CompletionCallback callback_;
|
|
||||||
scoped_ptr<Request>* out_req_;
|
|
||||||
const net::BoundNetLog& net_log_;
|
|
||||||
|
|
||||||
bool handled_;
|
bool handled_;
|
||||||
|
|
||||||
DISALLOW_COPY_AND_ASSIGN(CertVerifyRequest);
|
DISALLOW_COPY_AND_ASSIGN(CertVerifyRequest);
|
||||||
|
@ -100,6 +80,9 @@ class AtomCertVerifier : public net::CertVerifier {
|
||||||
private:
|
private:
|
||||||
friend class CertVerifyRequest;
|
friend class CertVerifyRequest;
|
||||||
|
|
||||||
|
void VerifyCertificateFromDelegate(const VerifyArgs& args, int result);
|
||||||
|
void OnDefaultVerificationResult(const VerifyArgs& args, int result);
|
||||||
|
|
||||||
Delegate* delegate_;
|
Delegate* delegate_;
|
||||||
scoped_ptr<net::CertVerifier> default_cert_verifier_;
|
scoped_ptr<net::CertVerifier> default_cert_verifier_;
|
||||||
|
|
||||||
|
|
|
@ -21,7 +21,7 @@ var session = win.webContents.session
|
||||||
* `item` [DownloadItem](download-item.md)
|
* `item` [DownloadItem](download-item.md)
|
||||||
* `webContents` [WebContents](web-contents.md)
|
* `webContents` [WebContents](web-contents.md)
|
||||||
|
|
||||||
Fired when Electron is about to download `item` in `webContents`.
|
Emitted when Electron is about to download `item` in `webContents`.
|
||||||
|
|
||||||
Calling `event.preventDefault()` will cancel the download.
|
Calling `event.preventDefault()` will cancel the download.
|
||||||
|
|
||||||
|
@ -43,18 +43,19 @@ session.on('will-download', function(event, item, webContents) {
|
||||||
* `issuerName` String
|
* `issuerName` String
|
||||||
* `callback` Function
|
* `callback` Function
|
||||||
|
|
||||||
Fired whenever a server certificate verification is requested by the
|
Emitted when failed to verify the `certificate` for `hostname`, to trust the
|
||||||
network layer with `hostname`, `certificate` and `callback`.
|
certificate you should prevent the default behavior with
|
||||||
`callback` should be called with a boolean response to
|
`event.preventDefault()` and call `callback(true)`.
|
||||||
indicate continuation or cancellation of the request.
|
|
||||||
|
|
||||||
```js
|
```js
|
||||||
session.on('verify-certificate', function(event, hostname, certificate, callback) {
|
session.on('verify-certificate', function(event, hostname, certificate, callback) {
|
||||||
if (hostname == "github.com") {
|
if (hostname == "github.com") {
|
||||||
// verification logic
|
// Verification logic.
|
||||||
|
event.preventDefault();
|
||||||
callback(true);
|
callback(true);
|
||||||
|
} else {
|
||||||
|
callback(false);
|
||||||
}
|
}
|
||||||
callback(false);
|
|
||||||
});
|
});
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue