Chromium Code Reviews| OLD | NEW | 
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be | 
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. | 
| 4 | 4 | 
| 5 #include "chrome/browser/ui/webui/net_internals/net_internals_ui.h" | 5 #include "chrome/browser/ui/webui/net_internals/net_internals_ui.h" | 
| 6 | 6 | 
| 7 #include <list> | 7 #include <list> | 
| 8 #include <string> | 8 #include <string> | 
| 9 #include <utility> | 9 #include <utility> | 
| 10 #include <vector> | 10 #include <vector> | 
| (...skipping 88 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 99 // encounters a new version. This should be incremented when significant | 99 // encounters a new version. This should be incremented when significant | 
| 100 // changes are made that will invalidate the old loading code. | 100 // changes are made that will invalidate the old loading code. | 
| 101 const int kLogFormatVersion = 1; | 101 const int kLogFormatVersion = 1; | 
| 102 | 102 | 
| 103 // Returns the HostCache for |context|'s primary HostResolver, or NULL if | 103 // Returns the HostCache for |context|'s primary HostResolver, or NULL if | 
| 104 // there is none. | 104 // there is none. | 
| 105 net::HostCache* GetHostResolverCache(net::URLRequestContext* context) { | 105 net::HostCache* GetHostResolverCache(net::URLRequestContext* context) { | 
| 106 return context->host_resolver()->GetHostCache(); | 106 return context->host_resolver()->GetHostCache(); | 
| 107 } | 107 } | 
| 108 | 108 | 
| 109 std::string HashesToBase64String(const net::HashValueVector& hashes) { | |
| 110 std::string str; | |
| 111 for (size_t i = 0; i != hashes.size(); ++i) { | |
| 112 if (i != 0) | |
| 113 str += ","; | |
| 114 str += hashes[i].ToString(); | |
| 115 } | |
| 116 return str; | |
| 117 } | |
| 118 | |
| 119 bool Base64StringToHashes(const std::string& hashes_str, | |
| 120 net::HashValueVector* hashes) { | |
| 121 hashes->clear(); | |
| 122 std::vector<std::string> vector_hash_str; | |
| 123 base::SplitString(hashes_str, ',', &vector_hash_str); | |
| 124 | |
| 125 for (size_t i = 0; i != vector_hash_str.size(); ++i) { | |
| 126 std::string hash_str; | |
| 127 RemoveChars(vector_hash_str[i], " \t\r\n", &hash_str); | |
| 128 net::HashValue hash; | |
| 129 // Skip past unrecognized hash algos | |
| 130 // But return false on malformatted input | |
| 131 if (hash_str.empty()) /* pair of commas with no content between them */ | |
| 
 
Ryan Sleevi
2012/12/20 23:44:13
nit: Drop this end-of-line comment.
 
unsafe
2012/12/21 02:56:49
Done.
 
 | |
| 132 return false; | |
| 133 /* hash_str.substr() will not throw, as hash_str is non-empty */ | |
| 
 
Ryan Sleevi
2012/12/20 23:44:13
nit: Drop this comment. Because you're using a |0|
 
unsafe
2012/12/21 02:56:49
Done.
 
 | |
| 134 if (hash_str.substr(0, 5) != "sha1/" && hash_str.substr(0, 7) != "sha256/") | |
| 
 
Ryan Sleevi
2012/12/20 23:44:13
(pedantic) nit:
if (hash_str.compare(0, 5, "sha1/
 
unsafe
2012/12/21 02:56:49
Done.
 
 | |
| 135 continue; | |
| 136 if (!hash.FromString(hash_str)) | |
| 137 return false; | |
| 138 hashes->push_back(hash); | |
| 139 } | |
| 140 return true; | |
| 141 } | |
| 142 | |
| 109 // Returns the disk cache backend for |context| if there is one, or NULL. | 143 // Returns the disk cache backend for |context| if there is one, or NULL. | 
| 110 disk_cache::Backend* GetDiskCacheBackend(net::URLRequestContext* context) { | 144 disk_cache::Backend* GetDiskCacheBackend(net::URLRequestContext* context) { | 
| 111 if (!context->http_transaction_factory()) | 145 if (!context->http_transaction_factory()) | 
| 112 return NULL; | 146 return NULL; | 
| 113 | 147 | 
| 114 net::HttpCache* http_cache = context->http_transaction_factory()->GetCache(); | 148 net::HttpCache* http_cache = context->http_transaction_factory()->GetCache(); | 
| 115 if (!http_cache) | 149 if (!http_cache) | 
| 116 return NULL; | 150 return NULL; | 
| 117 | 151 | 
| 118 return http_cache->GetCurrentBackend(); | 152 return http_cache->GetCurrentBackend(); | 
| (...skipping 974 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1093 // For example, turn "www.google.com" into "http://www.google.com". | 1127 // For example, turn "www.google.com" into "http://www.google.com". | 
| 1094 GURL url(URLFixerUpper::FixupURL(UTF16ToUTF8(url_str), std::string())); | 1128 GURL url(URLFixerUpper::FixupURL(UTF16ToUTF8(url_str), std::string())); | 
| 1095 | 1129 | 
| 1096 connection_tester_.reset(new ConnectionTester( | 1130 connection_tester_.reset(new ConnectionTester( | 
| 1097 this, | 1131 this, | 
| 1098 io_thread_->globals()->proxy_script_fetcher_context.get(), | 1132 io_thread_->globals()->proxy_script_fetcher_context.get(), | 
| 1099 net_log())); | 1133 net_log())); | 
| 1100 connection_tester_->RunAllTests(url); | 1134 connection_tester_->RunAllTests(url); | 
| 1101 } | 1135 } | 
| 1102 | 1136 | 
| 1103 void SPKIHashesToString(const net::HashValueVector& hashes, | |
| 1104 std::string* string) { | |
| 1105 for (net::HashValueVector::const_iterator | |
| 1106 i = hashes.begin(); i != hashes.end(); ++i) { | |
| 1107 base::StringPiece hash_str(reinterpret_cast<const char*>(i->data()), | |
| 1108 i->size()); | |
| 1109 std::string encoded; | |
| 1110 base::Base64Encode(hash_str, &encoded); | |
| 1111 | |
| 1112 if (i != hashes.begin()) | |
| 1113 *string += ","; | |
| 1114 *string += net::TransportSecurityState::HashValueLabel(*i) + encoded; | |
| 1115 } | |
| 1116 } | |
| 1117 | |
| 1118 void NetInternalsMessageHandler::IOThreadImpl::OnHSTSQuery( | 1137 void NetInternalsMessageHandler::IOThreadImpl::OnHSTSQuery( | 
| 1119 const ListValue* list) { | 1138 const ListValue* list) { | 
| 1120 // |list| should be: [<domain to query>]. | 1139 // |list| should be: [<domain to query>]. | 
| 1121 std::string domain; | 1140 std::string domain; | 
| 1122 CHECK(list->GetString(0, &domain)); | 1141 CHECK(list->GetString(0, &domain)); | 
| 1123 DictionaryValue* result = new DictionaryValue(); | 1142 DictionaryValue* result = new DictionaryValue(); | 
| 1124 | 1143 | 
| 1125 if (!IsStringASCII(domain)) { | 1144 if (!IsStringASCII(domain)) { | 
| 1126 result->SetString("error", "non-ASCII domain name"); | 1145 result->SetString("error", "non-ASCII domain name"); | 
| 1127 } else { | 1146 } else { | 
| 1128 net::TransportSecurityState* transport_security_state = | 1147 net::TransportSecurityState* transport_security_state = | 
| 1129 context_getter_->GetURLRequestContext()->transport_security_state(); | 1148 context_getter_->GetURLRequestContext()->transport_security_state(); | 
| 1130 if (!transport_security_state) { | 1149 if (!transport_security_state) { | 
| 1131 result->SetString("error", "no TransportSecurityState active"); | 1150 result->SetString("error", "no TransportSecurityState active"); | 
| 1132 } else { | 1151 } else { | 
| 1133 net::TransportSecurityState::DomainState state; | 1152 net::TransportSecurityState::DomainState state; | 
| 1134 const bool found = transport_security_state->GetDomainState( | 1153 const bool found = transport_security_state->GetDomainState( | 
| 1135 domain, true, &state); | 1154 domain, true, &state); | 
| 1136 | 1155 | 
| 1137 result->SetBoolean("result", found); | 1156 result->SetBoolean("result", found); | 
| 1138 if (found) { | 1157 if (found) { | 
| 1139 result->SetInteger("mode", static_cast<int>(state.upgrade_mode)); | 1158 result->SetInteger("mode", static_cast<int>(state.upgrade_mode)); | 
| 1140 result->SetBoolean("subdomains", state.include_subdomains); | 1159 result->SetBoolean("subdomains", state.include_subdomains); | 
| 1141 result->SetString("domain", state.domain); | 1160 result->SetString("domain", state.domain); | 
| 1142 result->SetDouble("expiry", state.upgrade_expiry.ToDoubleT()); | 1161 result->SetDouble("expiry", state.upgrade_expiry.ToDoubleT()); | 
| 1143 result->SetDouble("dynamic_spki_hashes_expiry", | 1162 result->SetDouble("dynamic_spki_hashes_expiry", | 
| 1144 state.dynamic_spki_hashes_expiry.ToDoubleT()); | 1163 state.dynamic_spki_hashes_expiry.ToDoubleT()); | 
| 1145 | 1164 | 
| 1146 std::string hashes; | 1165 result->SetString("static_spki_hashes", | 
| 1147 SPKIHashesToString(state.static_spki_hashes, &hashes); | 1166 HashesToBase64String(state.static_spki_hashes)); | 
| 1148 result->SetString("static_spki_hashes", hashes); | 1167 result->SetString("dynamic_spki_hashes", | 
| 1149 | 1168 HashesToBase64String(state.dynamic_spki_hashes)); | 
| 1150 hashes.clear(); | |
| 1151 SPKIHashesToString(state.dynamic_spki_hashes, &hashes); | |
| 1152 result->SetString("dynamic_spki_hashes", hashes); | |
| 1153 } | 1169 } | 
| 1154 } | 1170 } | 
| 1155 } | 1171 } | 
| 1156 | 1172 | 
| 1157 SendJavascriptCommand("receivedHSTSResult", result); | 1173 SendJavascriptCommand("receivedHSTSResult", result); | 
| 1158 } | 1174 } | 
| 1159 | 1175 | 
| 1160 void NetInternalsMessageHandler::IOThreadImpl::OnHSTSAdd( | 1176 void NetInternalsMessageHandler::IOThreadImpl::OnHSTSAdd( | 
| 1161 const ListValue* list) { | 1177 const ListValue* list) { | 
| 1162 // |list| should be: [<domain to query>, <include subdomains>, <cert pins>]. | 1178 // |list| should be: [<domain to query>, <include subdomains>, <cert pins>]. | 
| (...skipping 11 matching lines...) Expand all Loading... | |
| 1174 | 1190 | 
| 1175 net::TransportSecurityState* transport_security_state = | 1191 net::TransportSecurityState* transport_security_state = | 
| 1176 context_getter_->GetURLRequestContext()->transport_security_state(); | 1192 context_getter_->GetURLRequestContext()->transport_security_state(); | 
| 1177 if (!transport_security_state) | 1193 if (!transport_security_state) | 
| 1178 return; | 1194 return; | 
| 1179 | 1195 | 
| 1180 net::TransportSecurityState::DomainState state; | 1196 net::TransportSecurityState::DomainState state; | 
| 1181 state.upgrade_expiry = state.created + base::TimeDelta::FromDays(1000); | 1197 state.upgrade_expiry = state.created + base::TimeDelta::FromDays(1000); | 
| 1182 state.include_subdomains = include_subdomains; | 1198 state.include_subdomains = include_subdomains; | 
| 1183 if (!hashes_str.empty()) { | 1199 if (!hashes_str.empty()) { | 
| 1184 std::vector<std::string> type_and_b64s; | 1200 if (!Base64StringToHashes(hashes_str, &state.dynamic_spki_hashes)) | 
| 1185 base::SplitString(hashes_str, ',', &type_and_b64s); | 1201 return; | 
| 1186 for (std::vector<std::string>::const_iterator | |
| 1187 i = type_and_b64s.begin(); i != type_and_b64s.end(); ++i) { | |
| 1188 std::string type_and_b64; | |
| 1189 RemoveChars(*i, " \t\r\n", &type_and_b64); | |
| 1190 net::HashValue hash; | |
| 1191 if (!net::TransportSecurityState::ParsePin(type_and_b64, &hash)) | |
| 1192 continue; | |
| 1193 | |
| 1194 state.dynamic_spki_hashes.push_back(hash); | |
| 1195 } | |
| 1196 } | 1202 } | 
| 1197 | |
| 1198 transport_security_state->EnableHost(domain, state); | 1203 transport_security_state->EnableHost(domain, state); | 
| 1199 } | 1204 } | 
| 1200 | 1205 | 
| 1201 void NetInternalsMessageHandler::IOThreadImpl::OnHSTSDelete( | 1206 void NetInternalsMessageHandler::IOThreadImpl::OnHSTSDelete( | 
| 1202 const ListValue* list) { | 1207 const ListValue* list) { | 
| 1203 // |list| should be: [<domain to query>]. | 1208 // |list| should be: [<domain to query>]. | 
| 1204 std::string domain; | 1209 std::string domain; | 
| 1205 CHECK(list->GetString(0, &domain)); | 1210 CHECK(list->GetString(0, &domain)); | 
| 1206 if (!IsStringASCII(domain)) { | 1211 if (!IsStringASCII(domain)) { | 
| 1207 // There cannot be a unicode entry in the HSTS set. | 1212 // There cannot be a unicode entry in the HSTS set. | 
| (...skipping 567 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1775 } | 1780 } | 
| 1776 | 1781 | 
| 1777 NetInternalsUI::NetInternalsUI(content::WebUI* web_ui) | 1782 NetInternalsUI::NetInternalsUI(content::WebUI* web_ui) | 
| 1778 : WebUIController(web_ui) { | 1783 : WebUIController(web_ui) { | 
| 1779 web_ui->AddMessageHandler(new NetInternalsMessageHandler()); | 1784 web_ui->AddMessageHandler(new NetInternalsMessageHandler()); | 
| 1780 | 1785 | 
| 1781 // Set up the chrome://net-internals/ source. | 1786 // Set up the chrome://net-internals/ source. | 
| 1782 Profile* profile = Profile::FromWebUI(web_ui); | 1787 Profile* profile = Profile::FromWebUI(web_ui); | 
| 1783 ChromeURLDataManager::AddDataSource(profile, CreateNetInternalsHTMLSource()); | 1788 ChromeURLDataManager::AddDataSource(profile, CreateNetInternalsHTMLSource()); | 
| 1784 } | 1789 } | 
| OLD | NEW |