148 lines
4.8 KiB
C++
148 lines
4.8 KiB
C++
// Copyright 2012 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "net/cert/cert_database.h"
|
|
|
|
#include <Security/Security.h>
|
|
|
|
#include "base/check.h"
|
|
#include "base/functional/bind.h"
|
|
#include "base/location.h"
|
|
#include "base/mac/mac_logging.h"
|
|
#include "base/memory/raw_ptr.h"
|
|
#include "base/notreached.h"
|
|
#include "base/process/process_handle.h"
|
|
#include "base/synchronization/lock.h"
|
|
#include "base/task/current_thread.h"
|
|
#include "base/task/single_thread_task_runner.h"
|
|
#include "crypto/mac_security_services_lock.h"
|
|
#include "net/base/net_errors.h"
|
|
#include "net/cert/x509_certificate.h"
|
|
|
|
namespace net {
|
|
|
|
// Helper that observes events from the Keychain and forwards them to the
|
|
// given CertDatabase.
|
|
class CertDatabase::Notifier {
|
|
public:
|
|
// Creates a new Notifier that will forward Keychain events to |cert_db|.
|
|
// |message_loop| must refer to a thread with an associated CFRunLoop - a
|
|
// TYPE_UI thread. Events will be dispatched from this message loop.
|
|
Notifier(CertDatabase* cert_db,
|
|
scoped_refptr<base::SingleThreadTaskRunner> task_runner)
|
|
: cert_db_(cert_db), task_runner_(std::move(task_runner)) {
|
|
// Ensure an associated CFRunLoop.
|
|
DCHECK(base::CurrentUIThread::IsSet());
|
|
DCHECK(task_runner_->BelongsToCurrentThread());
|
|
task_runner_->PostTask(
|
|
FROM_HERE, base::BindOnce(&Notifier::Init, base::Unretained(this)));
|
|
}
|
|
|
|
// Much of the Keychain API was marked deprecated as of the macOS 13 SDK.
|
|
// Removal of its use is tracked in https://crbug.com/1348251 but deprecation
|
|
// warnings are disabled in the meanwhile.
|
|
#pragma clang diagnostic push
|
|
#pragma clang diagnostic ignored "-Wdeprecated-declarations"
|
|
|
|
// Should be called from the |task_runner_|'s sequence. Use Shutdown()
|
|
// to shutdown on arbitrary sequence.
|
|
~Notifier() {
|
|
DCHECK(called_shutdown_);
|
|
// Only unregister from the same sequence where registration was performed.
|
|
if (registered_ && task_runner_->RunsTasksInCurrentSequence())
|
|
SecKeychainRemoveCallback(&Notifier::KeychainCallback);
|
|
}
|
|
|
|
#pragma clang diagnostic pop
|
|
|
|
void Shutdown() {
|
|
called_shutdown_ = true;
|
|
if (!task_runner_->DeleteSoon(FROM_HERE, this)) {
|
|
// If the task runner is no longer running, it's safe to just delete
|
|
// the object, since no further events will or can be delivered by
|
|
// Keychain Services.
|
|
delete this;
|
|
}
|
|
}
|
|
|
|
// Much of the Keychain API was marked deprecated as of the macOS 13 SDK.
|
|
// Removal of its use is tracked in https://crbug.com/1348251 but deprecation
|
|
// warnings are disabled in the meanwhile.
|
|
#pragma clang diagnostic push
|
|
#pragma clang diagnostic ignored "-Wdeprecated-declarations"
|
|
|
|
private:
|
|
void Init() {
|
|
SecKeychainEventMask event_mask =
|
|
kSecKeychainListChangedMask | kSecTrustSettingsChangedEventMask;
|
|
OSStatus status = SecKeychainAddCallback(&Notifier::KeychainCallback,
|
|
event_mask, this);
|
|
if (status == noErr)
|
|
registered_ = true;
|
|
}
|
|
|
|
#pragma clang diagnostic pop
|
|
|
|
// SecKeychainCallback function that receives notifications from securityd
|
|
// and forwards them to the |cert_db_|.
|
|
static OSStatus KeychainCallback(SecKeychainEvent keychain_event,
|
|
SecKeychainCallbackInfo* info,
|
|
void* context);
|
|
|
|
const raw_ptr<CertDatabase> cert_db_;
|
|
scoped_refptr<base::SingleThreadTaskRunner> task_runner_;
|
|
bool registered_ = false;
|
|
bool called_shutdown_ = false;
|
|
};
|
|
|
|
// static
|
|
OSStatus CertDatabase::Notifier::KeychainCallback(
|
|
SecKeychainEvent keychain_event,
|
|
SecKeychainCallbackInfo* info,
|
|
void* context) {
|
|
Notifier* that = reinterpret_cast<Notifier*>(context);
|
|
|
|
if (info->version > SEC_KEYCHAIN_SETTINGS_VERS1) {
|
|
NOTREACHED();
|
|
return errSecWrongSecVersion;
|
|
}
|
|
|
|
if (info->pid == base::GetCurrentProcId()) {
|
|
// Ignore events generated by the current process, as the assumption is
|
|
// that they have already been handled. This may miss events that
|
|
// originated as a result of spawning native dialogs that allow the user
|
|
// to modify Keychain settings. However, err on the side of missing
|
|
// events rather than sending too many events.
|
|
return errSecSuccess;
|
|
}
|
|
|
|
switch (keychain_event) {
|
|
case kSecKeychainListChangedEvent:
|
|
case kSecTrustSettingsChangedEvent:
|
|
that->cert_db_->NotifyObserversCertDBChanged();
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return errSecSuccess;
|
|
}
|
|
|
|
void CertDatabase::StartListeningForKeychainEvents() {
|
|
ReleaseNotifier();
|
|
notifier_ =
|
|
new Notifier(this, base::SingleThreadTaskRunner::GetCurrentDefault());
|
|
}
|
|
|
|
void CertDatabase::ReleaseNotifier() {
|
|
// Shutdown will take care to delete the notifier on the right thread.
|
|
if (notifier_) {
|
|
notifier_->Shutdown();
|
|
notifier_ = nullptr;
|
|
}
|
|
}
|
|
|
|
} // namespace net
|