NaCl: Update revision in DEPS, r12770 -> r12773
[chromium-blink-merge.git] / chrome / browser / net / sqlite_server_bound_cert_store_unittest.cc
blob1691274a8bed7740685995f116959a6d934b3a0d
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/bind.h"
6 #include "base/file_util.h"
7 #include "base/files/scoped_temp_dir.h"
8 #include "base/memory/ref_counted.h"
9 #include "base/memory/scoped_vector.h"
10 #include "base/message_loop/message_loop.h"
11 #include "base/run_loop.h"
12 #include "base/stl_util.h"
13 #include "chrome/browser/net/sqlite_server_bound_cert_store.h"
14 #include "chrome/common/chrome_constants.h"
15 #include "content/public/test/test_browser_thread_bundle.h"
16 #include "net/base/test_data_directory.h"
17 #include "net/ssl/ssl_client_cert_type.h"
18 #include "net/test/cert_test_util.h"
19 #include "sql/statement.h"
20 #include "testing/gtest/include/gtest/gtest.h"
21 #include "webkit/browser/quota/mock_special_storage_policy.h"
23 class SQLiteServerBoundCertStoreTest : public testing::Test {
24 public:
25 void Load(
26 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>* certs) {
27 base::RunLoop run_loop;
28 store_->Load(base::Bind(&SQLiteServerBoundCertStoreTest::OnLoaded,
29 base::Unretained(this),
30 &run_loop));
31 run_loop.Run();
32 certs->swap(certs_);
33 certs_.clear();
36 void OnLoaded(
37 base::RunLoop* run_loop,
38 scoped_ptr<ScopedVector<
39 net::DefaultServerBoundCertStore::ServerBoundCert> > certs) {
40 certs_.swap(*certs);
41 run_loop->Quit();
44 protected:
45 static void ReadTestKeyAndCert(std::string* key, std::string* cert) {
46 base::FilePath key_path = net::GetTestCertsDirectory().AppendASCII(
47 "unittest.originbound.key.der");
48 base::FilePath cert_path = net::GetTestCertsDirectory().AppendASCII(
49 "unittest.originbound.der");
50 ASSERT_TRUE(base::ReadFileToString(key_path, key));
51 ASSERT_TRUE(base::ReadFileToString(cert_path, cert));
54 static base::Time GetTestCertExpirationTime() {
55 // Cert expiration time from 'dumpasn1 unittest.originbound.der':
56 // GeneralizedTime 19/11/2111 02:23:45 GMT
57 // base::Time::FromUTCExploded can't generate values past 2038 on 32-bit
58 // linux, so we use the raw value here.
59 return base::Time::FromInternalValue(GG_INT64_C(16121816625000000));
62 static base::Time GetTestCertCreationTime() {
63 // UTCTime 13/12/2011 02:23:45 GMT
64 base::Time::Exploded exploded_time;
65 exploded_time.year = 2011;
66 exploded_time.month = 12;
67 exploded_time.day_of_week = 0; // Unused.
68 exploded_time.day_of_month = 13;
69 exploded_time.hour = 2;
70 exploded_time.minute = 23;
71 exploded_time.second = 45;
72 exploded_time.millisecond = 0;
73 return base::Time::FromUTCExploded(exploded_time);
76 virtual void SetUp() {
77 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir());
78 store_ = new SQLiteServerBoundCertStore(
79 temp_dir_.path().Append(chrome::kOBCertFilename),
80 base::MessageLoopProxy::current(),
81 NULL);
82 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs;
83 Load(&certs);
84 ASSERT_EQ(0u, certs.size());
85 // Make sure the store gets written at least once.
86 store_->AddServerBoundCert(
87 net::DefaultServerBoundCertStore::ServerBoundCert(
88 "google.com",
89 base::Time::FromInternalValue(1),
90 base::Time::FromInternalValue(2),
91 "a", "b"));
94 content::TestBrowserThreadBundle thread_bundle_;
95 base::ScopedTempDir temp_dir_;
96 scoped_refptr<SQLiteServerBoundCertStore> store_;
97 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs_;
100 // Test if data is stored as expected in the SQLite database.
101 TEST_F(SQLiteServerBoundCertStoreTest, TestPersistence) {
102 store_->AddServerBoundCert(
103 net::DefaultServerBoundCertStore::ServerBoundCert(
104 "foo.com",
105 base::Time::FromInternalValue(3),
106 base::Time::FromInternalValue(4),
107 "c", "d"));
109 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs;
110 // Replace the store effectively destroying the current one and forcing it
111 // to write its data to disk. Then we can see if after loading it again it
112 // is still there.
113 store_ = NULL;
114 // Make sure we wait until the destructor has run.
115 base::RunLoop().RunUntilIdle();
116 store_ = new SQLiteServerBoundCertStore(
117 temp_dir_.path().Append(chrome::kOBCertFilename),
118 base::MessageLoopProxy::current(),
119 NULL);
121 // Reload and test for persistence
122 Load(&certs);
123 ASSERT_EQ(2U, certs.size());
124 net::DefaultServerBoundCertStore::ServerBoundCert* goog_cert;
125 net::DefaultServerBoundCertStore::ServerBoundCert* foo_cert;
126 if (certs[0]->server_identifier() == "google.com") {
127 goog_cert = certs[0];
128 foo_cert = certs[1];
129 } else {
130 goog_cert = certs[1];
131 foo_cert = certs[0];
133 ASSERT_EQ("google.com", goog_cert->server_identifier());
134 ASSERT_STREQ("a", goog_cert->private_key().c_str());
135 ASSERT_STREQ("b", goog_cert->cert().c_str());
136 ASSERT_EQ(1, goog_cert->creation_time().ToInternalValue());
137 ASSERT_EQ(2, goog_cert->expiration_time().ToInternalValue());
138 ASSERT_EQ("foo.com", foo_cert->server_identifier());
139 ASSERT_STREQ("c", foo_cert->private_key().c_str());
140 ASSERT_STREQ("d", foo_cert->cert().c_str());
141 ASSERT_EQ(3, foo_cert->creation_time().ToInternalValue());
142 ASSERT_EQ(4, foo_cert->expiration_time().ToInternalValue());
144 // Now delete the cert and check persistence again.
145 store_->DeleteServerBoundCert(*certs[0]);
146 store_->DeleteServerBoundCert(*certs[1]);
147 store_ = NULL;
148 // Make sure we wait until the destructor has run.
149 base::RunLoop().RunUntilIdle();
150 certs.clear();
151 store_ = new SQLiteServerBoundCertStore(
152 temp_dir_.path().Append(chrome::kOBCertFilename),
153 base::MessageLoopProxy::current(),
154 NULL);
156 // Reload and check if the cert has been removed.
157 Load(&certs);
158 ASSERT_EQ(0U, certs.size());
161 TEST_F(SQLiteServerBoundCertStoreTest, TestUpgradeV1) {
162 // Reset the store. We'll be using a different database for this test.
163 store_ = NULL;
165 base::FilePath v1_db_path(temp_dir_.path().AppendASCII("v1db"));
167 std::string key_data;
168 std::string cert_data;
169 ReadTestKeyAndCert(&key_data, &cert_data);
171 // Create a version 1 database.
173 sql::Connection db;
174 ASSERT_TRUE(db.Open(v1_db_path));
175 ASSERT_TRUE(db.Execute(
176 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY,"
177 "value LONGVARCHAR);"
178 "INSERT INTO \"meta\" VALUES('version','1');"
179 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');"
180 "CREATE TABLE origin_bound_certs ("
181 "origin TEXT NOT NULL UNIQUE PRIMARY KEY,"
182 "private_key BLOB NOT NULL,cert BLOB NOT NULL);"));
184 sql::Statement add_smt(db.GetUniqueStatement(
185 "INSERT INTO origin_bound_certs (origin, private_key, cert) "
186 "VALUES (?,?,?)"));
187 add_smt.BindString(0, "google.com");
188 add_smt.BindBlob(1, key_data.data(), key_data.size());
189 add_smt.BindBlob(2, cert_data.data(), cert_data.size());
190 ASSERT_TRUE(add_smt.Run());
192 ASSERT_TRUE(db.Execute(
193 "INSERT INTO \"origin_bound_certs\" VALUES("
194 "'foo.com',X'AA',X'BB');"
198 // Load and test the DB contents twice. First time ensures that we can use
199 // the updated values immediately. Second time ensures that the updated
200 // values are stored and read correctly on next load.
201 for (int i = 0; i < 2; ++i) {
202 SCOPED_TRACE(i);
204 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs;
205 store_ = new SQLiteServerBoundCertStore(
206 v1_db_path, base::MessageLoopProxy::current(), NULL);
208 // Load the database. Because the existing v1 certs are implicitly of type
209 // RSA, which is unsupported, they're discarded.
210 Load(&certs);
211 ASSERT_EQ(0U, certs.size());
213 store_ = NULL;
214 base::RunLoop().RunUntilIdle();
216 // Verify the database version is updated.
218 sql::Connection db;
219 ASSERT_TRUE(db.Open(v1_db_path));
220 sql::Statement smt(db.GetUniqueStatement(
221 "SELECT value FROM meta WHERE key = \"version\""));
222 ASSERT_TRUE(smt.Step());
223 EXPECT_EQ(4, smt.ColumnInt(0));
224 EXPECT_FALSE(smt.Step());
229 TEST_F(SQLiteServerBoundCertStoreTest, TestUpgradeV2) {
230 // Reset the store. We'll be using a different database for this test.
231 store_ = NULL;
233 base::FilePath v2_db_path(temp_dir_.path().AppendASCII("v2db"));
235 std::string key_data;
236 std::string cert_data;
237 ReadTestKeyAndCert(&key_data, &cert_data);
239 // Create a version 2 database.
241 sql::Connection db;
242 ASSERT_TRUE(db.Open(v2_db_path));
243 ASSERT_TRUE(db.Execute(
244 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY,"
245 "value LONGVARCHAR);"
246 "INSERT INTO \"meta\" VALUES('version','2');"
247 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');"
248 "CREATE TABLE origin_bound_certs ("
249 "origin TEXT NOT NULL UNIQUE PRIMARY KEY,"
250 "private_key BLOB NOT NULL,"
251 "cert BLOB NOT NULL,"
252 "cert_type INTEGER);"
255 sql::Statement add_smt(db.GetUniqueStatement(
256 "INSERT INTO origin_bound_certs (origin, private_key, cert, cert_type) "
257 "VALUES (?,?,?,?)"));
258 add_smt.BindString(0, "google.com");
259 add_smt.BindBlob(1, key_data.data(), key_data.size());
260 add_smt.BindBlob(2, cert_data.data(), cert_data.size());
261 add_smt.BindInt64(3, 64);
262 ASSERT_TRUE(add_smt.Run());
264 ASSERT_TRUE(db.Execute(
265 "INSERT INTO \"origin_bound_certs\" VALUES("
266 "'foo.com',X'AA',X'BB',64);"
270 // Load and test the DB contents twice. First time ensures that we can use
271 // the updated values immediately. Second time ensures that the updated
272 // values are saved and read correctly on next load.
273 for (int i = 0; i < 2; ++i) {
274 SCOPED_TRACE(i);
276 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs;
277 store_ = new SQLiteServerBoundCertStore(
278 v2_db_path, base::MessageLoopProxy::current(), NULL);
280 // Load the database and ensure the certs can be read.
281 Load(&certs);
282 ASSERT_EQ(2U, certs.size());
284 ASSERT_EQ("google.com", certs[0]->server_identifier());
285 ASSERT_EQ(GetTestCertExpirationTime(),
286 certs[0]->expiration_time());
287 ASSERT_EQ(key_data, certs[0]->private_key());
288 ASSERT_EQ(cert_data, certs[0]->cert());
290 ASSERT_EQ("foo.com", certs[1]->server_identifier());
291 // Undecodable cert, expiration time will be uninitialized.
292 ASSERT_EQ(base::Time(), certs[1]->expiration_time());
293 ASSERT_STREQ("\xaa", certs[1]->private_key().c_str());
294 ASSERT_STREQ("\xbb", certs[1]->cert().c_str());
296 store_ = NULL;
297 // Make sure we wait until the destructor has run.
298 base::RunLoop().RunUntilIdle();
300 // Verify the database version is updated.
302 sql::Connection db;
303 ASSERT_TRUE(db.Open(v2_db_path));
304 sql::Statement smt(db.GetUniqueStatement(
305 "SELECT value FROM meta WHERE key = \"version\""));
306 ASSERT_TRUE(smt.Step());
307 EXPECT_EQ(4, smt.ColumnInt(0));
308 EXPECT_FALSE(smt.Step());
313 TEST_F(SQLiteServerBoundCertStoreTest, TestUpgradeV3) {
314 // Reset the store. We'll be using a different database for this test.
315 store_ = NULL;
317 base::FilePath v3_db_path(temp_dir_.path().AppendASCII("v3db"));
319 std::string key_data;
320 std::string cert_data;
321 ReadTestKeyAndCert(&key_data, &cert_data);
323 // Create a version 3 database.
325 sql::Connection db;
326 ASSERT_TRUE(db.Open(v3_db_path));
327 ASSERT_TRUE(db.Execute(
328 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY,"
329 "value LONGVARCHAR);"
330 "INSERT INTO \"meta\" VALUES('version','3');"
331 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');"
332 "CREATE TABLE origin_bound_certs ("
333 "origin TEXT NOT NULL UNIQUE PRIMARY KEY,"
334 "private_key BLOB NOT NULL,"
335 "cert BLOB NOT NULL,"
336 "cert_type INTEGER,"
337 "expiration_time INTEGER);"
340 sql::Statement add_smt(db.GetUniqueStatement(
341 "INSERT INTO origin_bound_certs (origin, private_key, cert, cert_type, "
342 "expiration_time) VALUES (?,?,?,?,?)"));
343 add_smt.BindString(0, "google.com");
344 add_smt.BindBlob(1, key_data.data(), key_data.size());
345 add_smt.BindBlob(2, cert_data.data(), cert_data.size());
346 add_smt.BindInt64(3, 64);
347 add_smt.BindInt64(4, 1000);
348 ASSERT_TRUE(add_smt.Run());
350 ASSERT_TRUE(db.Execute(
351 "INSERT INTO \"origin_bound_certs\" VALUES("
352 "'foo.com',X'AA',X'BB',64,2000);"
356 // Load and test the DB contents twice. First time ensures that we can use
357 // the updated values immediately. Second time ensures that the updated
358 // values are saved and read correctly on next load.
359 for (int i = 0; i < 2; ++i) {
360 SCOPED_TRACE(i);
362 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs;
363 store_ = new SQLiteServerBoundCertStore(
364 v3_db_path, base::MessageLoopProxy::current(), NULL);
366 // Load the database and ensure the certs can be read.
367 Load(&certs);
368 ASSERT_EQ(2U, certs.size());
370 ASSERT_EQ("google.com", certs[0]->server_identifier());
371 ASSERT_EQ(1000, certs[0]->expiration_time().ToInternalValue());
372 ASSERT_EQ(GetTestCertCreationTime(),
373 certs[0]->creation_time());
374 ASSERT_EQ(key_data, certs[0]->private_key());
375 ASSERT_EQ(cert_data, certs[0]->cert());
377 ASSERT_EQ("foo.com", certs[1]->server_identifier());
378 ASSERT_EQ(2000, certs[1]->expiration_time().ToInternalValue());
379 // Undecodable cert, creation time will be uninitialized.
380 ASSERT_EQ(base::Time(), certs[1]->creation_time());
381 ASSERT_STREQ("\xaa", certs[1]->private_key().c_str());
382 ASSERT_STREQ("\xbb", certs[1]->cert().c_str());
384 store_ = NULL;
385 // Make sure we wait until the destructor has run.
386 base::RunLoop().RunUntilIdle();
388 // Verify the database version is updated.
390 sql::Connection db;
391 ASSERT_TRUE(db.Open(v3_db_path));
392 sql::Statement smt(db.GetUniqueStatement(
393 "SELECT value FROM meta WHERE key = \"version\""));
394 ASSERT_TRUE(smt.Step());
395 EXPECT_EQ(4, smt.ColumnInt(0));
396 EXPECT_FALSE(smt.Step());
401 TEST_F(SQLiteServerBoundCertStoreTest, TestRSADiscarded) {
402 // Reset the store. We'll be using a different database for this test.
403 store_ = NULL;
405 base::FilePath v4_db_path(temp_dir_.path().AppendASCII("v4dbrsa"));
407 std::string key_data;
408 std::string cert_data;
409 ReadTestKeyAndCert(&key_data, &cert_data);
411 // Create a version 4 database with a mix of RSA and ECDSA certs.
413 sql::Connection db;
414 ASSERT_TRUE(db.Open(v4_db_path));
415 ASSERT_TRUE(db.Execute(
416 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY,"
417 "value LONGVARCHAR);"
418 "INSERT INTO \"meta\" VALUES('version','4');"
419 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');"
420 "CREATE TABLE origin_bound_certs ("
421 "origin TEXT NOT NULL UNIQUE PRIMARY KEY,"
422 "private_key BLOB NOT NULL,"
423 "cert BLOB NOT NULL,"
424 "cert_type INTEGER,"
425 "expiration_time INTEGER,"
426 "creation_time INTEGER);"
429 sql::Statement add_smt(db.GetUniqueStatement(
430 "INSERT INTO origin_bound_certs "
431 "(origin, private_key, cert, cert_type, expiration_time, creation_time)"
432 " VALUES (?,?,?,?,?,?)"));
433 add_smt.BindString(0, "google.com");
434 add_smt.BindBlob(1, key_data.data(), key_data.size());
435 add_smt.BindBlob(2, cert_data.data(), cert_data.size());
436 add_smt.BindInt64(3, 64);
437 add_smt.BindInt64(4, GetTestCertExpirationTime().ToInternalValue());
438 add_smt.BindInt64(5, base::Time::Now().ToInternalValue());
439 ASSERT_TRUE(add_smt.Run());
441 add_smt.Clear();
442 add_smt.Assign(db.GetUniqueStatement(
443 "INSERT INTO origin_bound_certs "
444 "(origin, private_key, cert, cert_type, expiration_time, creation_time)"
445 " VALUES (?,?,?,?,?,?)"));
446 add_smt.BindString(0, "foo.com");
447 add_smt.BindBlob(1, key_data.data(), key_data.size());
448 add_smt.BindBlob(2, cert_data.data(), cert_data.size());
449 add_smt.BindInt64(3, 1);
450 add_smt.BindInt64(4, GetTestCertExpirationTime().ToInternalValue());
451 add_smt.BindInt64(5, base::Time::Now().ToInternalValue());
452 ASSERT_TRUE(add_smt.Run());
455 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs;
456 store_ = new SQLiteServerBoundCertStore(
457 v4_db_path, base::MessageLoopProxy::current(), NULL);
459 // Load the database and ensure the certs can be read.
460 Load(&certs);
461 // Only the ECDSA cert (for google.com) is read, the RSA one is discarded.
462 ASSERT_EQ(1U, certs.size());
464 ASSERT_EQ("google.com", certs[0]->server_identifier());
465 ASSERT_EQ(GetTestCertExpirationTime(),
466 certs[0]->expiration_time());
467 ASSERT_EQ(key_data, certs[0]->private_key());
468 ASSERT_EQ(cert_data, certs[0]->cert());
470 store_ = NULL;
471 // Make sure we wait until the destructor has run.
472 base::RunLoop().RunUntilIdle();