Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(534)

Unified Diff: components/certificate_transparency/log_proof_fetcher.cc

Issue 1222953002: Certificate Transparency: Add STH Fetching capability. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Removing explicit base dep Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/certificate_transparency/log_proof_fetcher.cc
diff --git a/components/certificate_transparency/log_proof_fetcher.cc b/components/certificate_transparency/log_proof_fetcher.cc
new file mode 100644
index 0000000000000000000000000000000000000000..7e51858708b0acb5d60dbd550cba646ff6ac5ab6
--- /dev/null
+++ b/components/certificate_transparency/log_proof_fetcher.cc
@@ -0,0 +1,242 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "components/certificate_transparency/log_proof_fetcher.h"
+
+#include <iterator>
+
+#include "base/logging.h"
+#include "base/memory/ref_counted.h"
+#include "base/stl_util.h"
+#include "base/values.h"
+#include "components/safe_json/safe_json_parser.h"
+#include "net/base/io_buffer.h"
+#include "net/base/load_flags.h"
+#include "net/base/net_errors.h"
+#include "net/base/request_priority.h"
+#include "net/cert/ct_log_response_parser.h"
+#include "net/cert/signed_tree_head.h"
+#include "net/http/http_status_code.h"
+#include "net/url_request/url_request_context.h"
+#include "url/gurl.h"
+
+namespace certificate_transparency {
+
+namespace {
+
+// Shamelessly copied from domain_reliability/util.cc
+int GetNetErrorFromURLRequestStatus(const net::URLRequestStatus& status) {
+ switch (status.status()) {
+ case net::URLRequestStatus::SUCCESS:
+ return net::OK;
+ case net::URLRequestStatus::CANCELED:
+ return net::ERR_ABORTED;
+ case net::URLRequestStatus::FAILED:
+ return status.error();
+ default:
+ NOTREACHED();
+ return net::ERR_FAILED;
+ }
+}
+
+} // namespace
+
+struct LogProofFetcher::FetchState {
+ FetchState(const std::string& log_id,
+ const SignedTreeHeadFetchedCallback& fetched_callback,
+ const FetchFailedCallback& failed_callback);
+ ~FetchState();
+
+ std::string log_id;
+ SignedTreeHeadFetchedCallback fetched_callback;
+ FetchFailedCallback failed_callback;
+ scoped_refptr<net::IOBufferWithSize> response_buffer;
+ std::string assembled_response;
+};
+
+LogProofFetcher::FetchState::FetchState(
+ const std::string& log_id,
+ const SignedTreeHeadFetchedCallback& fetched_callback,
+ const FetchFailedCallback& failed_callback)
+ : log_id(log_id),
+ fetched_callback(fetched_callback),
+ failed_callback(failed_callback),
+ response_buffer(new net::IOBufferWithSize(kMaxLogResponseSizeInBytes)) {}
+
+LogProofFetcher::FetchState::~FetchState() {}
+
+LogProofFetcher::LogProofFetcher(net::URLRequestContext* request_context)
+ : request_context_(request_context), weak_factory_(this) {
+ DCHECK(request_context);
+}
+
+LogProofFetcher::~LogProofFetcher() {
+ STLDeleteContainerPairPointers(inflight_requests_.begin(),
+ inflight_requests_.end());
+}
+
+void LogProofFetcher::FetchSignedTreeHead(
+ const GURL& base_log_url,
+ const std::string& log_id,
+ const SignedTreeHeadFetchedCallback& fetched_callback,
+ const FetchFailedCallback& failed_callback) {
+ DCHECK(base_log_url.SchemeIsHTTPOrHTTPS());
+ GURL fetch_url(base_log_url.Resolve("ct/v1/get-sth"));
+ scoped_ptr<net::URLRequest> request =
+ request_context_->CreateRequest(fetch_url, net::DEFAULT_PRIORITY, this);
+ request->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES |
+ net::LOAD_DO_NOT_SAVE_COOKIES |
+ net::LOAD_DO_NOT_SEND_AUTH_DATA);
+
+ FetchState* fetch_state =
+ new FetchState(log_id, fetched_callback, failed_callback);
+ request->Start();
+ inflight_requests_.insert(std::make_pair(request.release(), fetch_state));
+}
+
+void LogProofFetcher::OnResponseStarted(net::URLRequest* request) {
+ net::URLRequestStatus status(request->status());
+ DCHECK(inflight_requests_.count(request));
+ FetchState* fetch_state = inflight_requests_.find(request)->second;
+
+ if (!status.is_success() || request->GetResponseCode() != net::HTTP_OK) {
+ int net_error = net::OK;
+ int http_response_code = request->GetResponseCode();
+
+ DVLOG(1) << "Fetching STH from " << request->original_url()
+ << " failed. status:" << status.status()
+ << " error:" << status.error()
+ << " http response code: " << http_response_code;
+ if (!status.is_success())
+ net_error = GetNetErrorFromURLRequestStatus(status);
+
+ InvokeFailureCallback(request, net_error, http_response_code);
+ return;
+ }
+
+ StartNextRead(request, fetch_state);
+}
+
+void LogProofFetcher::OnReadCompleted(net::URLRequest* request,
+ int bytes_read) {
+ DCHECK(inflight_requests_.count(request));
+ FetchState* fetch_state = inflight_requests_.find(request)->second;
+
+ if (HandleReadResult(request, fetch_state, bytes_read))
+ StartNextRead(request, fetch_state);
+}
+
+bool LogProofFetcher::HandleReadResult(net::URLRequest* request,
+ FetchState* fetch_state,
+ int bytes_read) {
+ // Start by checking for an error condition.
+ // If there are errors, invoke the failure callback and clean up the
+ // request.
+ if (bytes_read == -1 || !request->status().is_success()) {
+ net::URLRequestStatus status(request->status());
+ DVLOG(1) << "Read error: " << status.status() << " " << status.error();
+ InvokeFailureCallback(request, GetNetErrorFromURLRequestStatus(status),
+ net::OK);
+
+ return false;
+ }
+
+ // Not an error, but no data available, so wait for OnReadCompleted
+ // callback.
+ if (request->status().is_io_pending())
+ return false;
+
+ // Nothing more to read from the stream - finish handling the response.
+ if (bytes_read == 0) {
+ RequestComplete(request);
+ return false;
+ }
+
+ // We have data, collect it and indicate another read is needed.
+ DVLOG(1) << "Have " << bytes_read << " bytes to assemble.";
+ DCHECK_GE(bytes_read, 0);
+ fetch_state->assembled_response.append(fetch_state->response_buffer->data(),
+ bytes_read);
+ if (fetch_state->assembled_response.size() > kMaxLogResponseSizeInBytes) {
+ // Log response is too big, invoke the failure callback.
+ InvokeFailureCallback(request, net::ERR_FILE_TOO_BIG, net::HTTP_OK);
+ return false;
+ }
+
+ return true;
+}
+
+void LogProofFetcher::StartNextRead(net::URLRequest* request,
+ FetchState* fetch_state) {
+ bool continue_reading = true;
+ while (continue_reading) {
+ int read_bytes = 0;
+ request->Read(fetch_state->response_buffer.get(),
+ fetch_state->response_buffer->size(), &read_bytes);
+ continue_reading = HandleReadResult(request, fetch_state, read_bytes);
+ }
+}
+
+void LogProofFetcher::RequestComplete(net::URLRequest* request) {
+ DCHECK(inflight_requests_.count(request));
+
+ FetchState* fetch_state = inflight_requests_.find(request)->second;
+
+ // Get rid of the buffer as it really isn't necessary.
+ fetch_state->response_buffer = nullptr;
+ safe_json::SafeJsonParser::Parse(
+ fetch_state->assembled_response,
+ base::Bind(&LogProofFetcher::OnSTHJsonParseSuccess,
+ weak_factory_.GetWeakPtr(), request),
+ base::Bind(&LogProofFetcher::OnSTHJsonParseError,
+ weak_factory_.GetWeakPtr(), request));
+}
+
+void LogProofFetcher::CleanupRequest(net::URLRequest* request) {
+ DVLOG(1) << "Cleaning up request to " << request->original_url();
+ auto it = inflight_requests_.find(request);
+ DCHECK(it != inflight_requests_.end());
+ auto next_it = it;
+ std::advance(next_it, 1);
+
+ // Delete FetchState and URLRequest, then the entry from inflight_requests_.
+ STLDeleteContainerPairPointers(it, next_it);
+ inflight_requests_.erase(it);
+}
+
+void LogProofFetcher::InvokeFailureCallback(net::URLRequest* request,
+ int net_error,
+ int http_response_code) {
+ DCHECK(inflight_requests_.count(request));
+ auto it = inflight_requests_.find(request);
+ FetchState* fetch_state = it->second;
+
+ fetch_state->failed_callback.Run(fetch_state->log_id, net_error,
+ http_response_code);
+ CleanupRequest(request);
+}
+
+void LogProofFetcher::OnSTHJsonParseSuccess(
+ net::URLRequest* request,
+ scoped_ptr<base::Value> parsed_json) {
+ DCHECK(inflight_requests_.count(request));
+
+ FetchState* fetch_state = inflight_requests_.find(request)->second;
+ net::ct::SignedTreeHead signed_tree_head;
+ if (net::ct::FillSignedTreeHead(*parsed_json.get(), &signed_tree_head)) {
+ fetch_state->fetched_callback.Run(fetch_state->log_id, signed_tree_head);
+ } else {
+ fetch_state->failed_callback.Run(fetch_state->log_id,
+ net::ERR_CT_STH_INCOMPLETE, net::HTTP_OK);
+ }
+
+ CleanupRequest(request);
+}
+
+void LogProofFetcher::OnSTHJsonParseError(net::URLRequest* request,
+ const std::string& error) {
+ InvokeFailureCallback(request, net::ERR_CT_STH_PARSING_FAILED, net::HTTP_OK);
+}
+
+} // namespace certificate_transparency

Powered by Google App Engine
This is Rietveld 408576698