Index: components/safe_browsing_db/v4_update_protocol_manager.cc |
diff --git a/components/safe_browsing_db/v4_update_protocol_manager.cc b/components/safe_browsing_db/v4_update_protocol_manager.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..49d5483e2471bdd9e4a62f552704b3e2df204ead |
--- /dev/null |
+++ b/components/safe_browsing_db/v4_update_protocol_manager.cc |
@@ -0,0 +1,255 @@ |
+// Copyright 2016 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "components/safe_browsing_db/v4_update_protocol_manager.h" |
+ |
+#include <utility> |
+ |
+#include "base/base64.h" |
+#include "base/macros.h" |
+#include "base/metrics/histogram_macros.h" |
+#include "base/timer/timer.h" |
+#include "components/safe_browsing_db/safebrowsing.pb.h" |
+#include "net/base/load_flags.h" |
+#include "net/http/http_response_headers.h" |
+#include "net/http/http_status_code.h" |
+#include "net/url_request/url_fetcher.h" |
+#include "net/url_request/url_request_context_getter.h" |
+ |
+using base::Time; |
+using base::TimeDelta; |
+ |
+namespace { |
+ |
+// Enumerate parsing failures for histogramming purposes. DO NOT CHANGE |
+// THE ORDERING OF THESE VALUES. |
+enum ParseResultType { |
+ // Error parsing the protocol buffer from a string. |
+ PARSE_FROM_STRING_ERROR = 0, |
+ |
+ // Memory space for histograms is determined by the max. ALWAYS |
+ // ADD NEW VALUES BEFORE THIS ONE. |
+ PARSE_RESULT_TYPE_MAX = 1 |
+}; |
+ |
+// Record parsing errors of an update result. |
+void RecordParseUpdateResult(ParseResultType result_type) { |
+ UMA_HISTOGRAM_ENUMERATION("SafeBrowsing.ParseV4UpdateResult", result_type, |
+ PARSE_RESULT_TYPE_MAX); |
+} |
+ |
+} // namespace |
+ |
+namespace safe_browsing { |
+ |
+const char kUmaV4UpdateResponseMetricName[] = |
+ "SafeBrowsing.V4UpdateHttpResponseOrErrorCode"; |
+ |
+// The default V4UpdateProtocolManagerFactory. |
+class V4UpdateProtocolManagerFactoryImpl |
+ : public V4UpdateProtocolManagerFactory { |
+ public: |
+ V4UpdateProtocolManagerFactoryImpl() {} |
+ ~V4UpdateProtocolManagerFactoryImpl() override {} |
+ V4UpdateProtocolManager* CreateProtocolManager( |
+ net::URLRequestContextGetter* request_context_getter, |
+ const V4ProtocolConfig& config) override { |
+ return new V4UpdateProtocolManager(request_context_getter, config); |
+ } |
+ |
+ private: |
+ DISALLOW_COPY_AND_ASSIGN(V4UpdateProtocolManagerFactoryImpl); |
+}; |
+ |
+// V4UpdateProtocolManager implementation -------------------------------- |
+ |
+// static |
+V4UpdateProtocolManagerFactory* V4UpdateProtocolManager::factory_ = NULL; |
+ |
+// static |
+V4UpdateProtocolManager* V4UpdateProtocolManager::Create( |
+ net::URLRequestContextGetter* request_context_getter, |
+ const V4ProtocolConfig& config) { |
+ if (!factory_) |
+ factory_ = new V4UpdateProtocolManagerFactoryImpl(); |
+ return factory_->CreateProtocolManager(request_context_getter, config); |
+} |
+ |
+void V4UpdateProtocolManager::ResetUpdateErrors() { |
+ update_error_count_ = 0; |
+ update_back_off_mult_ = 1; |
+} |
+ |
+V4UpdateProtocolManager::V4UpdateProtocolManager( |
+ net::URLRequestContextGetter* request_context_getter, |
+ const V4ProtocolConfig& config) |
+ : update_error_count_(0), |
+ update_back_off_mult_(1), |
+ next_update_time_(Time::FromDoubleT(0)), |
+ config_(config), |
+ request_context_getter_(request_context_getter), |
+ url_fetcher_id_(0) { |
+} |
+ |
+// static |
+void V4UpdateProtocolManager::RecordUpdateResult( |
+ OperationResultType result_type) { |
+ UMA_HISTOGRAM_ENUMERATION("SafeBrowsing.V4UpdateResult", result_type, |
+ OPERATION_RESULT_TYPE_MAX); |
+} |
+ |
+V4UpdateProtocolManager::~V4UpdateProtocolManager() { |
+ // Delete in-progress SafeBrowsing requests. |
+ STLDeleteContainerPairFirstPointers(update_requests_.begin(), |
+ update_requests_.end()); |
+ update_requests_.clear(); |
+} |
+ |
+std::string V4UpdateProtocolManager::GetUpdateRequest( |
+ const base::hash_set<UpdateListIdentifier>& lists_to_update) { |
+ // Build the request. Client info and client states are not added to the |
+ // request protocol buffer. Client info is passed as params in the url. |
+ FetchThreatListUpdatesRequest request; |
+ for (const UpdateListIdentifier& list_to_update : lists_to_update) { |
+ ListUpdateRequest* list_update_request = request.add_list_update_requests(); |
+ list_update_request->set_platform_type(list_to_update.platform_type); |
+ list_update_request->set_threat_entry_type( |
+ list_to_update.threat_entry_type); |
+ list_update_request->set_threat_type(list_to_update.threat_type); |
+ } |
+ |
+ // Serialize and Base64 encode. |
+ std::string req_data, req_base64; |
+ request.SerializeToString(&req_data); |
+ base::Base64Encode(req_data, &req_base64); |
+ |
+ return req_base64; |
+} |
+ |
+bool V4UpdateProtocolManager::ParseUpdateResponse( |
+ const std::string& data, |
+ std::vector<ListUpdateResponse>* list_update_responses) { |
+ FetchThreatListUpdatesResponse response; |
+ |
+ if (!response.ParseFromString(data)) { |
+ RecordParseUpdateResult(PARSE_FROM_STRING_ERROR); |
+ return false; |
+ } |
+ |
+ if (response.has_minimum_wait_duration()) { |
+ // Seconds resolution is good enough so we ignore the nanos field. |
+ next_update_time_ = |
+ Time::Now() + base::TimeDelta::FromSeconds( |
+ response.minimum_wait_duration().seconds()); |
+ } |
+ |
+ // TODO(vakh): Do something useful with this response. |
+ // TODO(vakh): Update the list_states_ map correctly. |
Nathan Parker
2016/02/23 18:47:06
I wonder if the client state should be passed into
vakh (use Gerrit instead)
2016/02/23 23:58:20
Done.
|
+ for (const ListUpdateResponse& list_update_response : |
+ response.list_update_responses()) { |
+ list_update_responses->push_back(list_update_response); |
+ } |
+ return true; |
+} |
+ |
+void V4UpdateProtocolManager::GetUpdates( |
+ const base::hash_set<UpdateListIdentifier>& lists_to_update, |
+ UpdateCallback callback) { |
+ DCHECK(CalledOnValidThread()); |
+ // We need to wait the minimum waiting duration, and if we are in backoff, |
+ // we need to check if we're past the next allowed time. If we are, we can |
+ // proceed with the request. If not, we are required to return empty results |
+ // (i.e. treat the page as safe). |
+ if (Time::Now() <= next_update_time_) { |
+ if (update_error_count_) { |
+ RecordUpdateResult(ORT_BACKOFF_ERROR); |
+ } else { |
+ RecordUpdateResult(ORT_MIN_WAIT_DURATION_ERROR); |
+ } |
+ std::vector<ListUpdateResponse> list_update_responses; |
+ callback.Run(list_update_responses); |
+ return; |
+ } |
+ |
+ std::string req_base64 = GetUpdateRequest(lists_to_update); |
+ GURL update_url = GetUpdateUrl(req_base64); |
+ |
+ net::URLFetcher* fetcher = |
+ net::URLFetcher::Create(url_fetcher_id_++, update_url, |
+ net::URLFetcher::GET, this) |
+ .release(); |
+ update_requests_[fetcher] = callback; |
+ |
+ fetcher->SetLoadFlags(net::LOAD_DISABLE_CACHE); |
+ fetcher->SetRequestContext(request_context_getter_.get()); |
+ fetcher->Start(); |
+} |
+ |
+// net::URLFetcherDelegate implementation ---------------------------------- |
+ |
+// SafeBrowsing request responses are handled here. |
+void V4UpdateProtocolManager::OnURLFetchComplete( |
+ const net::URLFetcher* source) { |
+ DCHECK(CalledOnValidThread()); |
+ |
+ UpdateRequests::iterator it = update_requests_.find(source); |
+ DCHECK(it != update_requests_.end()) << "Request not found"; |
+ |
+ // FetchThreatListUpdatesResponse response. |
+ // Reset the scoped pointer so the fetcher gets destroyed properly. |
+ scoped_ptr<const net::URLFetcher> fetcher(it->first); |
+ |
+ int response_code = source->GetResponseCode(); |
+ net::URLRequestStatus status = source->GetStatus(); |
+ V4ProtocolManagerUtil::RecordHttpResponseOrErrorCode( |
+ kUmaV4UpdateResponseMetricName, status, response_code); |
+ |
+ const UpdateCallback& callback = it->second; |
+ std::vector<FetchThreatListUpdatesResponse::ListUpdateResponse> |
+ list_update_responses; |
+ if (status.is_success() && response_code == net::HTTP_OK) { |
+ RecordUpdateResult(ORT_STATUS_200); |
+ ResetUpdateErrors(); |
+ std::string data; |
+ source->GetResponseAsString(&data); |
+ if (!ParseUpdateResponse(data, &list_update_responses)) { |
+ list_update_responses.clear(); |
+ RecordUpdateResult(ORT_PARSE_ERROR); |
+ } |
+ } else { |
+ HandleUpdateError(Time::Now()); |
+ |
+ DVLOG(1) << "SafeBrowsing GetEncodedUpdates request for: " |
+ << source->GetURL() << " failed with error: " << status.error() |
+ << " and response code: " << response_code; |
+ |
+ if (status.status() == net::URLRequestStatus::FAILED) { |
+ RecordUpdateResult(ORT_NETWORK_ERROR); |
+ } else { |
+ RecordUpdateResult(ORT_HTTP_ERROR); |
+ } |
+ } |
+ |
+ // Invoke the callback with list_update_responses, even if there was a parse |
+ // error or an error response code (in which case list_update_responses will |
+ // be empty). The caller can't be blocked indefinitely. |
+ callback.Run(list_update_responses); |
+ |
+ update_requests_.erase(it); |
+} |
+ |
+void V4UpdateProtocolManager::HandleUpdateError(const Time& now) { |
+ DCHECK(CalledOnValidThread()); |
+ base::TimeDelta next = V4ProtocolManagerUtil::GetNextBackOffInterval( |
+ &update_error_count_, &update_back_off_mult_); |
+ next_update_time_ = now + next; |
+} |
+ |
+GURL V4UpdateProtocolManager::GetUpdateUrl( |
+ const std::string& req_base64) const { |
+ return V4ProtocolManagerUtil::GetRequestUrl(req_base64, "encodedUpdates", |
+ config_); |
+} |
+ |
+} // namespace safe_browsing |