| Index: chrome/browser/safe_browsing/threat_details_cache.cc
|
| diff --git a/chrome/browser/safe_browsing/threat_details_cache.cc b/chrome/browser/safe_browsing/threat_details_cache.cc
|
| index 05a78e01b6b52e78d06ad48a8d6b09486cb371ce..73c1b23f20f8434d37f310d1419ebf8336b25c14 100644
|
| --- a/chrome/browser/safe_browsing/threat_details_cache.cc
|
| +++ b/chrome/browser/safe_browsing/threat_details_cache.cc
|
| @@ -10,9 +10,9 @@
|
| #include "base/lazy_instance.h"
|
| #include "base/md5.h"
|
| #include "base/strings/string_util.h"
|
| -#include "chrome/browser/safe_browsing/report.pb.h"
|
| #include "chrome/browser/safe_browsing/safe_browsing_service.h"
|
| #include "chrome/browser/safe_browsing/threat_details_cache.h"
|
| +#include "chrome/common/safe_browsing/csd.pb.h"
|
| #include "content/public/browser/browser_thread.h"
|
| #include "net/base/host_port_pair.h"
|
| #include "net/base/load_flags.h"
|
| @@ -23,7 +23,7 @@
|
| #include "net/url_request/url_request_status.h"
|
|
|
| using content::BrowserThread;
|
| -using safe_browsing::ClientMalwareReportRequest;
|
| +using safe_browsing::ClientSafeBrowsingReportRequest;
|
|
|
| // Only send small files for now, a better strategy would use the size
|
| // of the whole report and the user's bandwidth.
|
| @@ -87,8 +87,8 @@ void ThreatDetailsCacheCollector::OpenEntry() {
|
| current_fetch_->Start(); // OnURLFetchComplete will be called when done.
|
| }
|
|
|
| -ClientMalwareReportRequest::Resource* ThreatDetailsCacheCollector::GetResource(
|
| - const GURL& url) {
|
| +ClientSafeBrowsingReportRequest::Resource*
|
| +ThreatDetailsCacheCollector::GetResource(const GURL& url) {
|
| safe_browsing::ResourceMap::iterator it = resources_->find(url.spec());
|
| if (it != resources_->end()) {
|
| return it->second.get();
|
| @@ -119,7 +119,7 @@ void ThreatDetailsCacheCollector::OnURLFetchComplete(
|
| // Set the response headers and body to the right resource, which
|
| // might not be the same as the one we asked for.
|
| // For redirects, resources_it_->first != url.spec().
|
| - ClientMalwareReportRequest::Resource* resource =
|
| + ClientSafeBrowsingReportRequest::Resource* resource =
|
| GetResource(source->GetURL());
|
| if (!resource) {
|
| DVLOG(1) << "Cannot find resource for url:" << source->GetURL();
|
| @@ -135,7 +135,7 @@ void ThreatDetailsCacheCollector::OnURLFetchComplete(
|
| }
|
|
|
| void ThreatDetailsCacheCollector::ReadResponse(
|
| - ClientMalwareReportRequest::Resource* pb_resource,
|
| + ClientSafeBrowsingReportRequest::Resource* pb_resource,
|
| const net::URLFetcher* source) {
|
| DVLOG(1) << "ReadResponse";
|
| DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
| @@ -145,13 +145,13 @@ void ThreatDetailsCacheCollector::ReadResponse(
|
| return;
|
| }
|
|
|
| - ClientMalwareReportRequest::HTTPResponse* pb_response =
|
| + ClientSafeBrowsingReportRequest::HTTPResponse* pb_response =
|
| pb_resource->mutable_response();
|
| pb_response->mutable_firstline()->set_code(headers->response_code());
|
| void* iter = NULL;
|
| std::string name, value;
|
| while (headers->EnumerateHeaderLines(&iter, &name, &value)) {
|
| - ClientMalwareReportRequest::HTTPHeader* pb_header =
|
| + ClientSafeBrowsingReportRequest::HTTPHeader* pb_header =
|
| pb_response->add_headers();
|
| pb_header->set_name(name);
|
| // Strip any Set-Cookie headers.
|
| @@ -168,11 +168,11 @@ void ThreatDetailsCacheCollector::ReadResponse(
|
| }
|
|
|
| void ThreatDetailsCacheCollector::ReadData(
|
| - ClientMalwareReportRequest::Resource* pb_resource,
|
| + ClientSafeBrowsingReportRequest::Resource* pb_resource,
|
| const std::string& data) {
|
| DVLOG(1) << "ReadData";
|
| DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
| - ClientMalwareReportRequest::HTTPResponse* pb_response =
|
| + ClientSafeBrowsingReportRequest::HTTPResponse* pb_response =
|
| pb_resource->mutable_response();
|
| if (data.size() <= kMaxBodySizeBytes) { // Only send small bodies for now.
|
| pb_response->set_body(data);
|
|
|