mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-04-03 04:52:54 +00:00
Bug 1045738 - Allow FxA to sign an assertion while offline if its certificate is viable. r=ferjm
This commit is contained in:
parent
9293e8da7b
commit
a0ff96a82c
@ -146,7 +146,11 @@ AccountState.prototype = {
|
||||
log.debug(" getCertificate already had one");
|
||||
return this.resolve(this.cert.cert);
|
||||
}
|
||||
// else get our cert signed
|
||||
|
||||
if (Services.io.offline) {
|
||||
return this.reject(new Error(ERROR_OFFLINE));
|
||||
}
|
||||
|
||||
let willBeValidUntil = this.fxaInternal.now() + CERT_LIFETIME;
|
||||
return this.fxaInternal.getCertificateSigned(data.sessionToken,
|
||||
keyPair.serializedPublicKey,
|
||||
|
@ -180,6 +180,7 @@ this.FxAccountsManager = {
|
||||
* See the latter method for possible (error code, errno) pairs.
|
||||
*/
|
||||
_handleGetAssertionError: function(reason, aAudience, aPrincipal) {
|
||||
log.debug("FxAccountsManager._handleGetAssertionError()");
|
||||
let errno = (reason ? reason.errno : NaN) || NaN;
|
||||
// If the previously valid email/password pair is no longer valid ...
|
||||
if (errno == ERRNO_INVALID_AUTH_TOKEN) {
|
||||
@ -306,6 +307,9 @@ this.FxAccountsManager = {
|
||||
},
|
||||
|
||||
_uiRequest: function(aRequest, aAudience, aPrincipal, aParams) {
|
||||
if (Services.io.offline) {
|
||||
return this._error(ERROR_OFFLINE);
|
||||
}
|
||||
let ui = Cc["@mozilla.org/fxaccounts/fxaccounts-ui-glue;1"]
|
||||
.createInstance(Ci.nsIFxAccountsUIGlue);
|
||||
if (!ui[aRequest]) {
|
||||
@ -387,11 +391,9 @@ this.FxAccountsManager = {
|
||||
if (this._activeSession) {
|
||||
// If our cache says that the account is not yet verified,
|
||||
// we kick off verification before returning what we have.
|
||||
if (this._activeSession && !this._activeSession.verified &&
|
||||
!Services.io.offline) {
|
||||
if (!this._activeSession.verified) {
|
||||
this.verificationStatus(this._activeSession);
|
||||
}
|
||||
|
||||
log.debug("Account " + JSON.stringify(this._user));
|
||||
return Promise.resolve(this._user);
|
||||
}
|
||||
@ -407,8 +409,7 @@ this.FxAccountsManager = {
|
||||
this._activeSession = user;
|
||||
// If we get a stored information of a not yet verified account,
|
||||
// we kick off verification before returning what we have.
|
||||
if (!user.verified && !Services.io.offline) {
|
||||
log.debug("Unverified account");
|
||||
if (!user.verified) {
|
||||
this.verificationStatus(user);
|
||||
}
|
||||
|
||||
@ -461,7 +462,8 @@ this.FxAccountsManager = {
|
||||
}
|
||||
|
||||
if (Services.io.offline) {
|
||||
this._error(ERROR_OFFLINE);
|
||||
log.warn("Offline; skipping verification.");
|
||||
return;
|
||||
}
|
||||
|
||||
let client = this._getFxAccountsClient();
|
||||
@ -507,13 +509,13 @@ this.FxAccountsManager = {
|
||||
if (!aAudience) {
|
||||
return this._error(ERROR_INVALID_AUDIENCE);
|
||||
}
|
||||
if (Services.io.offline) {
|
||||
return this._error(ERROR_OFFLINE);
|
||||
}
|
||||
|
||||
let secMan = Cc["@mozilla.org/scriptsecuritymanager;1"]
|
||||
.getService(Ci.nsIScriptSecurityManager);
|
||||
let uri = Services.io.newURI(aPrincipal.origin, null, null);
|
||||
log.debug("FxAccountsManager.getAssertion() aPrincipal: ",
|
||||
aPrincipal.origin, aPrincipal.appId,
|
||||
aPrincipal.isInBrowserElement);
|
||||
let principal = secMan.getAppCodebasePrincipal(uri,
|
||||
aPrincipal.appId, aPrincipal.isInBrowserElement);
|
||||
|
||||
|
@ -184,6 +184,45 @@ add_task(function test_get_signed_in_user_initially_unset() {
|
||||
do_check_eq(result, null);
|
||||
});
|
||||
|
||||
add_task(function test_getCertificate() {
|
||||
_("getCertificate()");
|
||||
// This test, unlike the rest, uses an un-mocked FxAccounts instance.
|
||||
// However, we still need to pass an object to the constructor to
|
||||
// force it to expose "internal".
|
||||
let fxa = new FxAccounts({onlySetInternal: true})
|
||||
let credentials = {
|
||||
email: "foo@example.com",
|
||||
uid: "1234@lcip.org",
|
||||
assertion: "foobar",
|
||||
sessionToken: "dead",
|
||||
kA: "beef",
|
||||
kB: "cafe",
|
||||
verified: true
|
||||
};
|
||||
yield fxa.setSignedInUser(credentials);
|
||||
|
||||
// Test that an expired cert throws if we're offline.
|
||||
fxa.internal.currentAccountState.cert = {
|
||||
validUntil: Date.parse("Mon, 13 Jan 2000 21:45:06 GMT")
|
||||
};
|
||||
let offline = Services.io.offline;
|
||||
Services.io.offline = true;
|
||||
// This call would break from missing parameters ...
|
||||
fxa.internal.currentAccountState.getCertificate().then(
|
||||
result => {
|
||||
Services.io.offline = offline;
|
||||
do_throw("Unexpected success");
|
||||
},
|
||||
err => {
|
||||
Services.io.offline = offline;
|
||||
// ... so we have to check the error string.
|
||||
do_check_eq(err, "Error: OFFLINE");
|
||||
}
|
||||
);
|
||||
_("----- DONE ----\n");
|
||||
});
|
||||
|
||||
|
||||
// Sanity-check that our mocked client is working correctly
|
||||
add_test(function test_client_mock() {
|
||||
do_test_pending();
|
||||
|
@ -16,6 +16,9 @@ Cu.import("resource://gre/modules/Promise.jsm");
|
||||
let passwordResetOnServer = false;
|
||||
let deletedOnServer = false;
|
||||
|
||||
// Global representing FxAccounts state
|
||||
let certExpired = false;
|
||||
|
||||
// Mock RP
|
||||
let principal = {origin: 'app://settings.gaiamobile.org', appId: 27}
|
||||
|
||||
@ -127,6 +130,8 @@ FxAccountsManager._fxAccounts = {
|
||||
let deferred = Promise.defer();
|
||||
if (passwordResetOnServer || deletedOnServer) {
|
||||
deferred.reject({errno: ERRNO_INVALID_AUTH_TOKEN});
|
||||
} else if (Services.io.offline && certExpired) {
|
||||
deferred.reject(new Error(ERROR_OFFLINE));
|
||||
} else {
|
||||
deferred.resolve(this._assertion);
|
||||
}
|
||||
@ -366,6 +371,68 @@ add_test(function(test_getAssertion_active_session_verified_account) {
|
||||
);
|
||||
});
|
||||
|
||||
add_test(function() {
|
||||
// getAssertion() succeeds if offline with valid cert
|
||||
do_print("= getAssertion active session, valid cert, offline");
|
||||
FxAccountsManager._fxAccounts._signedInUser.verified = true;
|
||||
FxAccountsManager._activeSession.verified = true;
|
||||
Services.io.offline = true;
|
||||
FxAccountsManager.getAssertion("audience", principal).then(
|
||||
result => {
|
||||
FxAccountsManager._fxAccounts._reset();
|
||||
Services.io.offline = false;
|
||||
run_next_test();
|
||||
},
|
||||
error => {
|
||||
Services.io.offline = false;
|
||||
do_throw("Unexpected error: " + error);
|
||||
}
|
||||
);
|
||||
});
|
||||
|
||||
add_test(function() {
|
||||
// getAssertion() rejects if offline and cert expired.
|
||||
do_print("= getAssertion active session, expired cert, offline");
|
||||
FxAccountsManager._fxAccounts._signedInUser.verified = true;
|
||||
FxAccountsManager._activeSession.verified = true;
|
||||
Services.io.offline = true;
|
||||
certExpired = true;
|
||||
FxAccountsManager.getAssertion("audience", principal).then(
|
||||
result => {
|
||||
Services.io.offline = false;
|
||||
certExpired = false;
|
||||
do_throw("Unexpected success");
|
||||
},
|
||||
error => {
|
||||
FxAccountsManager._fxAccounts._reset();
|
||||
Services.io.offline = false;
|
||||
certExpired = false;
|
||||
run_next_test();
|
||||
}
|
||||
);
|
||||
});
|
||||
|
||||
add_test(function() {
|
||||
// getAssertion() rejects if offline and UI needed.
|
||||
do_print("= getAssertion active session, trigger UI, offline");
|
||||
let user = FxAccountsManager._fxAccounts._signedInUser;
|
||||
FxAccountsManager._fxAccounts._signedInUser = null;
|
||||
Services.io.offline = true;
|
||||
FxAccountsManager.getAssertion("audience", principal).then(
|
||||
result => {
|
||||
Services.io.offline = false;
|
||||
do_throw("Unexpected success");
|
||||
},
|
||||
error => {
|
||||
do_check_false(FxAccountsUIGlue._signInFlowCalled);
|
||||
FxAccountsManager._fxAccounts._reset();
|
||||
FxAccountsManager._fxAccounts._signedInUser = user;
|
||||
Services.io.offline = false;
|
||||
run_next_test();
|
||||
}
|
||||
);
|
||||
});
|
||||
|
||||
add_test(function(test_getAssertion_refreshAuth) {
|
||||
do_print("= getAssertion refreshAuth =");
|
||||
let gracePeriod = 1200;
|
||||
|
Loading…
x
Reference in New Issue
Block a user