Chromium Code Reviews| Index: components/certificate_transparency/log_proof_fetcher.cc | 
| diff --git a/components/certificate_transparency/log_proof_fetcher.cc b/components/certificate_transparency/log_proof_fetcher.cc | 
| index 7e51858708b0acb5d60dbd550cba646ff6ac5ab6..c201989dadd79e4d78acf393dfb3c7295ac1ab14 100644 | 
| --- a/components/certificate_transparency/log_proof_fetcher.cc | 
| +++ b/components/certificate_transparency/log_proof_fetcher.cc | 
| @@ -9,6 +9,7 @@ | 
| #include "base/logging.h" | 
| #include "base/memory/ref_counted.h" | 
| #include "base/stl_util.h" | 
| +#include "base/strings/stringprintf.h" | 
| #include "base/values.h" | 
| #include "components/safe_json/safe_json_parser.h" | 
| #include "net/base/io_buffer.h" | 
| @@ -40,16 +41,22 @@ int GetNetErrorFromURLRequestStatus(const net::URLRequestStatus& status) { | 
| } | 
| } | 
| +enum LogRequestType { SIGNED_TREE_HEAD, CONSISTENCY_PROOF }; | 
| + | 
| } // namespace | 
| struct LogProofFetcher::FetchState { | 
| FetchState(const std::string& log_id, | 
| - const SignedTreeHeadFetchedCallback& fetched_callback, | 
| + LogRequestType request_type, | 
| + const SignedTreeHeadFetchedCallback& sth_fetch_callback, | 
| + const ConsistencyProofFetchedCallback& proof_fetch_callback, | 
| const FetchFailedCallback& failed_callback); | 
| ~FetchState(); | 
| std::string log_id; | 
| - SignedTreeHeadFetchedCallback fetched_callback; | 
| + LogRequestType request_type; | 
| + SignedTreeHeadFetchedCallback sth_fetch_callback; | 
| + ConsistencyProofFetchedCallback proof_fetch_callback; | 
| FetchFailedCallback failed_callback; | 
| scoped_refptr<net::IOBufferWithSize> response_buffer; | 
| std::string assembled_response; | 
| @@ -57,12 +64,18 @@ struct LogProofFetcher::FetchState { | 
| LogProofFetcher::FetchState::FetchState( | 
| const std::string& log_id, | 
| - const SignedTreeHeadFetchedCallback& fetched_callback, | 
| + LogRequestType request_type, | 
| + const SignedTreeHeadFetchedCallback& sth_fetch_callback, | 
| + const ConsistencyProofFetchedCallback& proof_fetch_callback, | 
| const FetchFailedCallback& failed_callback) | 
| : log_id(log_id), | 
| - fetched_callback(fetched_callback), | 
| + request_type(request_type), | 
| + sth_fetch_callback(sth_fetch_callback), | 
| + proof_fetch_callback(proof_fetch_callback), | 
| failed_callback(failed_callback), | 
| - response_buffer(new net::IOBufferWithSize(kMaxLogResponseSizeInBytes)) {} | 
| + response_buffer(new net::IOBufferWithSize(kMaxLogResponseSizeInBytes)) { | 
| + DCHECK(!(sth_fetch_callback.is_null() && proof_fetch_callback.is_null())); | 
| +} | 
| LogProofFetcher::FetchState::~FetchState() {} | 
| @@ -83,16 +96,37 @@ void LogProofFetcher::FetchSignedTreeHead( | 
| const FetchFailedCallback& failed_callback) { | 
| 
 
mmenke
2015/11/18 19:25:15
Suggest putting everything in this method except t
 
Eran Messeri
2015/11/24 22:53:38
Done. I note that the use of two callbacks is a sm
 
mmenke
2015/11/25 17:40:28
Could also make a single callback that takes a val
 
Eran Messeri
2015/11/26 22:07:12
Should be fixed now that I've switched to using a
 
 | 
| DCHECK(base_log_url.SchemeIsHTTPOrHTTPS()); | 
| GURL fetch_url(base_log_url.Resolve("ct/v1/get-sth")); | 
| - scoped_ptr<net::URLRequest> request = | 
| - request_context_->CreateRequest(fetch_url, net::DEFAULT_PRIORITY, this); | 
| - request->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES | | 
| - net::LOAD_DO_NOT_SAVE_COOKIES | | 
| - net::LOAD_DO_NOT_SEND_AUTH_DATA); | 
| + net::URLRequest* request = CreateRequest(fetch_url); | 
| FetchState* fetch_state = | 
| - new FetchState(log_id, fetched_callback, failed_callback); | 
| + new FetchState(log_id, LogRequestType::SIGNED_TREE_HEAD, fetched_callback, | 
| + ConsistencyProofFetchedCallback(), failed_callback); | 
| request->Start(); | 
| - inflight_requests_.insert(std::make_pair(request.release(), fetch_state)); | 
| + inflight_requests_.insert(std::make_pair(request, fetch_state)); | 
| +} | 
| + | 
| +void LogProofFetcher::FetchConsistencyProof( | 
| + const GURL& base_log_url, | 
| + const std::string& log_id, | 
| + size_t old_tree_size, | 
| + size_t new_tree_size, | 
| + const ConsistencyProofFetchedCallback& fetched_callback, | 
| + const FetchFailedCallback& failed_callback) { | 
| + DCHECK(base_log_url.SchemeIsHTTPOrHTTPS()); | 
| + | 
| + std::string relative = | 
| + base::StringPrintf("ct/v1/get-sth-consistency?first=%lu&second=%lu", | 
| + static_cast<unsigned long>(old_tree_size), | 
| + static_cast<unsigned long>(new_tree_size)); | 
| 
 
mmenke
2015/11/18 19:25:15
include format_macros.h and use PRIuS to use print
 
Eran Messeri
2015/11/24 22:53:38
Done. These are size_t - they indicate size of a M
 
 | 
| + GURL fetch_url = base_log_url.Resolve(relative); | 
| + | 
| + net::URLRequest* request = CreateRequest(fetch_url); | 
| + | 
| + FetchState* fetch_state = new FetchState( | 
| + log_id, LogRequestType::CONSISTENCY_PROOF, | 
| + SignedTreeHeadFetchedCallback(), fetched_callback, failed_callback); | 
| + request->Start(); | 
| + inflight_requests_.insert(std::make_pair(request, fetch_state)); | 
| } | 
| void LogProofFetcher::OnResponseStarted(net::URLRequest* request) { | 
| @@ -185,12 +219,23 @@ void LogProofFetcher::RequestComplete(net::URLRequest* request) { | 
| // Get rid of the buffer as it really isn't necessary. | 
| fetch_state->response_buffer = nullptr; | 
| - safe_json::SafeJsonParser::Parse( | 
| - fetch_state->assembled_response, | 
| - base::Bind(&LogProofFetcher::OnSTHJsonParseSuccess, | 
| - weak_factory_.GetWeakPtr(), request), | 
| - base::Bind(&LogProofFetcher::OnSTHJsonParseError, | 
| - weak_factory_.GetWeakPtr(), request)); | 
| + if (fetch_state->request_type == LogRequestType::SIGNED_TREE_HEAD) { | 
| + safe_json::SafeJsonParser::Parse( | 
| + fetch_state->assembled_response, | 
| + base::Bind(&LogProofFetcher::OnSTHJsonParseSuccess, | 
| + weak_factory_.GetWeakPtr(), request), | 
| + base::Bind(&LogProofFetcher::OnSTHJsonParseError, | 
| + weak_factory_.GetWeakPtr(), request)); | 
| + } else if (fetch_state->request_type == LogRequestType::CONSISTENCY_PROOF) { | 
| + safe_json::SafeJsonParser::Parse( | 
| + fetch_state->assembled_response, | 
| + base::Bind(&LogProofFetcher::OnConsistencyProofJsonParseSuccess, | 
| + weak_factory_.GetWeakPtr(), request), | 
| + base::Bind(&LogProofFetcher::OnConsistencyProofJsonParseError, | 
| + weak_factory_.GetWeakPtr(), request)); | 
| + } else { | 
| + NOTREACHED(); | 
| + } | 
| } | 
| void LogProofFetcher::CleanupRequest(net::URLRequest* request) { | 
| @@ -225,7 +270,8 @@ void LogProofFetcher::OnSTHJsonParseSuccess( | 
| FetchState* fetch_state = inflight_requests_.find(request)->second; | 
| net::ct::SignedTreeHead signed_tree_head; | 
| if (net::ct::FillSignedTreeHead(*parsed_json.get(), &signed_tree_head)) { | 
| 
 
mmenke
2015/11/18 19:25:15
nit:  While you're here, .get() isn't needed.
 
Eran Messeri
2015/11/24 22:53:38
Done.
 
 | 
| - fetch_state->fetched_callback.Run(fetch_state->log_id, signed_tree_head); | 
| + DCHECK(!(fetch_state->sth_fetch_callback.is_null())); | 
| 
 
mmenke
2015/11/18 19:25:15
This DCHECK makes much more sense in FetchSignedTr
 
Eran Messeri
2015/11/24 22:53:38
Good point - DCHECK made much earlier on, removed
 
 | 
| + fetch_state->sth_fetch_callback.Run(fetch_state->log_id, signed_tree_head); | 
| } else { | 
| fetch_state->failed_callback.Run(fetch_state->log_id, | 
| net::ERR_CT_STH_INCOMPLETE, net::HTTP_OK); | 
| @@ -239,4 +285,39 @@ void LogProofFetcher::OnSTHJsonParseError(net::URLRequest* request, | 
| InvokeFailureCallback(request, net::ERR_CT_STH_PARSING_FAILED, net::HTTP_OK); | 
| } | 
| +void LogProofFetcher::OnConsistencyProofJsonParseSuccess( | 
| + net::URLRequest* request, | 
| + scoped_ptr<base::Value> parsed_json) { | 
| + DCHECK(inflight_requests_.count(request)); | 
| + FetchState* fetch_state = inflight_requests_.find(request)->second; | 
| + std::vector<std::string> consistency_proof; | 
| + if (net::ct::FillConsistencyProof(*parsed_json.get(), &consistency_proof)) { | 
| 
 
mmenke
2015/11/18 19:25:15
See comment in OnSTHJsonParseSuccess.
 
Eran Messeri
2015/11/24 22:53:38
Done.
 
 | 
| + DCHECK(!(fetch_state->proof_fetch_callback.is_null())); | 
| 
 
mmenke
2015/11/18 19:25:15
See comment in OnSTHJsonParseSuccess.
 
Eran Messeri
2015/11/24 22:53:38
Done (removed unnecessary DCHECKs here as they are
 
 | 
| + fetch_state->proof_fetch_callback.Run(fetch_state->log_id, | 
| + consistency_proof); | 
| + } else { | 
| + fetch_state->failed_callback.Run( | 
| + fetch_state->log_id, net::ERR_CT_CONSISTENCY_PROOF_PARSING_FAILED, | 
| + net::HTTP_OK); | 
| + } | 
| + | 
| + CleanupRequest(request); | 
| +} | 
| + | 
| +void LogProofFetcher::OnConsistencyProofJsonParseError( | 
| + net::URLRequest* request, | 
| + const std::string& error) { | 
| + InvokeFailureCallback(request, net::ERR_CT_CONSISTENCY_PROOF_PARSING_FAILED, | 
| + net::HTTP_OK); | 
| +} | 
| + | 
| +net::URLRequest* LogProofFetcher::CreateRequest(const GURL& url) { | 
| + scoped_ptr<net::URLRequest> request = | 
| + request_context_->CreateRequest(url, net::DEFAULT_PRIORITY, this); | 
| + request->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES | | 
| + net::LOAD_DO_NOT_SAVE_COOKIES | | 
| + net::LOAD_DO_NOT_SEND_AUTH_DATA); | 
| + return request.release(); | 
| +} | 
| + | 
| } // namespace certificate_transparency |