Chromium Code Reviews| Index: components/certificate_transparency/pref_names.h |
| diff --git a/components/certificate_transparency/pref_names.h b/components/certificate_transparency/pref_names.h |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..f27716d15b650a0daf31f6f630a1ffca2d7e8c17 |
| --- /dev/null |
| +++ b/components/certificate_transparency/pref_names.h |
| @@ -0,0 +1,23 @@ |
| +// Copyright 2016 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#ifndef COMPONENTS_CERTIFICATE_TRANSPARENCY_PREF_NAMES_H_ |
| +#define COMPONENTS_CERTIFICATE_TRANSPARENCY_PREF_NAMES_H_ |
| + |
| +namespace certificate_transparency { |
| +namespace prefs { |
| + |
| +// The set of hosts (as URLBlacklist-syntax filters) for which Certificate |
| +// Transparency is required to be present. |
| +extern const char kCTRequiredHosts[]; |
|
battre
2016/06/28 08:33:13
Why do you add this if it is not controllable by p
Ryan Sleevi
2016/06/28 16:41:27
Honestly? Mostly for testing purposes (it was easi
battre
2016/06/29 09:14:43
Acknowledged.
|
| + |
| +// The set of hosts (as URLBlacklist-syntax filters) for which Certificate |
| +// Transparency information is allowed to be absent, even if it would |
| +// otherwise be required (e.g. as part of security policy). |
| +extern const char kCTExcludedHosts[]; |
|
battre
2016/06/28 08:33:13
Do you want to add a comment which one wins in cas
Ryan Sleevi
2016/06/28 16:41:27
Should that be with the Pref? I felt like the pref
battre
2016/06/29 09:14:43
Hm. It's just the place I would look for this info
|
| + |
| +} // namespace prefs |
| +} // namespace certificate_transparency |
| + |
| +#endif // COMPONENTS_CERTIFICATE_TRANSPARENCY_PREF_NAMES_H_ |