Index: chrome/browser/ssl/chrome_fraudulent_certificate_reporter.cc |
diff --git a/chrome/browser/ssl/chrome_fraudulent_certificate_reporter.cc b/chrome/browser/ssl/chrome_fraudulent_certificate_reporter.cc |
deleted file mode 100644 |
index 0447b0e8dbcfaccf488490a2bd5db3dee6f8df6a..0000000000000000000000000000000000000000 |
--- a/chrome/browser/ssl/chrome_fraudulent_certificate_reporter.cc |
+++ /dev/null |
@@ -1,56 +0,0 @@ |
-// Copyright 2015 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/ssl/chrome_fraudulent_certificate_reporter.h" |
- |
-#include "base/profiler/scoped_tracker.h" |
-#include "chrome/browser/net/certificate_error_reporter.h" |
-#include "chrome/browser/ssl/certificate_error_report.h" |
-#include "net/ssl/ssl_info.h" |
-#include "net/url_request/certificate_report_sender.h" |
-#include "net/url_request/url_request_context.h" |
-#include "url/gurl.h" |
- |
-namespace { |
- |
-// TODO(palmer): Switch to HTTPS when the error handling delegate is more |
-// sophisticated. Ultimately we plan to attempt the report on many transports. |
-const char kFraudulentCertificateUploadEndpoint[] = |
- "http://clients3.google.com/log_cert_error"; |
- |
-} // namespace |
- |
-ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( |
- net::URLRequestContext* request_context) |
- : certificate_reporter_(new chrome_browser_net::CertificateErrorReporter( |
- request_context, |
- GURL(kFraudulentCertificateUploadEndpoint), |
- net::CertificateReportSender::DO_NOT_SEND_COOKIES)) {} |
- |
-ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( |
- scoped_ptr<chrome_browser_net::CertificateErrorReporter> |
- certificate_reporter) |
- : certificate_reporter_(certificate_reporter.Pass()) { |
-} |
- |
-ChromeFraudulentCertificateReporter::~ChromeFraudulentCertificateReporter() { |
-} |
- |
-void ChromeFraudulentCertificateReporter::SendReport( |
- const std::string& hostname, |
- const net::SSLInfo& ssl_info) { |
- // Do silent/automatic reporting ONLY for Google properties. For other |
- // domains (when that is supported), Chrome will ask for user permission. |
- if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname)) |
- return; |
- |
- CertificateErrorReport report(hostname, ssl_info); |
- std::string serialized_report; |
- if (!report.Serialize(&serialized_report)) { |
- LOG(ERROR) << "Failed to serialize pinning violation report."; |
- return; |
- } |
- |
- certificate_reporter_->SendPinningViolationReport(serialized_report); |
-} |