bug 1278605 - ensure that nsICertOverrideService can be implemented in JS r=Cykesiopka

MozReview-Commit-ID: KSVeraWuRPZ

--HG--
extra : rebase_source : 15f7abb08b57c8525e44f39c5e10c9cc5299dc47
This commit is contained in:
David Keeler 2016-06-07 11:27:33 -07:00
parent e1b0b79d4d
commit febcbb464f
3 changed files with 70 additions and 19 deletions

View File

@ -10,6 +10,7 @@
#include "mozilla/Casting.h"
#include "mozilla/Telemetry.h"
#include "mozilla/TimeStamp.h"
#include "mozilla/unused.h"
#include "nsContentUtils.h"
#include "nsICertOverrideService.h"
#include "nsIHttpChannelInternal.h"
@ -1232,25 +1233,17 @@ void HandshakeCallback(PRFileDesc* fd, void* client_data) {
status->SetServerCert(nssc, nsNSSCertificate::ev_status_unknown);
}
nsCOMPtr<nsICertOverrideService> overrideService =
do_GetService(NS_CERTOVERRIDE_CONTRACTID);
if (overrideService) {
bool haveOverride;
uint32_t overrideBits = 0; // Unused.
bool isTemporaryOverride; // Unused.
const nsACString& hostString(infoObject->GetHostName());
const int32_t port(infoObject->GetPort());
nsCOMPtr<nsIX509Cert> cert;
status->GetServerCert(getter_AddRefs(cert));
nsresult nsrv = overrideService->HasMatchingOverride(hostString, port,
cert,
&overrideBits,
&isTemporaryOverride,
&haveOverride);
if (NS_SUCCEEDED(nsrv) && haveOverride) {
state |= nsIWebProgressListener::STATE_CERT_USER_OVERRIDDEN;
}
bool domainMismatch;
bool untrusted;
bool notValidAtThisTime;
// These all return NS_OK, so don't even bother checking the return values.
Unused << status->GetIsDomainMismatch(&domainMismatch);
Unused << status->GetIsUntrusted(&untrusted);
Unused << status->GetIsNotValidAtThisTime(&notValidAtThisTime);
// If we're here, the TLS handshake has succeeded. Thus if any of these
// booleans are true, the user has added an override for a certificate error.
if (domainMismatch || untrusted || notValidAtThisTime) {
state |= nsIWebProgressListener::STATE_CERT_USER_OVERRIDDEN;
}
infoObject->SetSecurityState(state);

View File

@ -0,0 +1,56 @@
/* -*- tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* Any copyright is dedicated to the Public Domain.
* http://creativecommons.org/publicdomain/zero/1.0/ */
"use strict";
// This test ensures that nsICertOverrideService can be implemented in JS.
// It does so by creating and registering a mock implementation that indicates
// a specific host ("expired.example.com") has a matching override (ERROR_TIME).
// Connections to that host should succeed.
// Mock implementation of nsICertOverrideService
const gCertOverrideService = {
rememberValidityOverride() {
throw Cr.NS_ERROR_NOT_IMPLEMENTED;
},
rememberTemporaryValidityOverrideUsingFingerprint() {
throw Cr.NS_ERROR_NOT_IMPLEMENTED;
},
hasMatchingOverride(hostname, port, cert, overrideBits, isTemporary) {
Assert.equal(hostname, "expired.example.com",
"hasMatchingOverride: hostname should be expired.example.com");
overrideBits.value = Ci.nsICertOverrideService.ERROR_TIME;
isTemporary.value = false;
return true;
},
getValidityOverride() {
throw Cr.NS_ERROR_NOT_IMPLEMENTED;
},
clearValidityOverride() {
throw Cr.NS_ERROR_NOT_IMPLEMENTED;
},
isCertUsedForOverrides() {
throw Cr.NS_ERROR_NOT_IMPLEMENTED;
},
QueryInterface: XPCOMUtils.generateQI([Ci.nsICertOverrideService])
};
function run_test() {
do_get_profile();
let certOverrideServiceCID =
MockRegistrar.register("@mozilla.org/security/certoverride;1",
gCertOverrideService);
do_register_cleanup(() => {
MockRegistrar.unregister(certOverrideServiceCID);
});
add_tls_server_setup("BadCertServer", "bad_certs");
add_connection_test("expired.example.com", PRErrorCodeSuccess);
run_next_test();
}

View File

@ -68,6 +68,8 @@ run-sequentially = hardcoded ports
skip-if = toolkit == 'android' || toolkit == 'gonk'
[test_hmac.js]
[test_intermediate_basic_usage_constraints.js]
[test_js_cert_override_service.js]
run-sequentially = hardcoded ports
[test_keysize.js]
[test_keysize_ev.js]
# OCSP requests in this test time out on slow B2G Emulator debug builds.