| Index: chrome/browser/safe_browsing/ping_manager.cc
|
| diff --git a/chrome/browser/safe_browsing/ping_manager.cc b/chrome/browser/safe_browsing/ping_manager.cc
|
| index b223a15f2e44da561bb03974ddb00866de5dd54f..b0d27cc294d42af5a821278dd3df61632bdf5410 100644
|
| --- a/chrome/browser/safe_browsing/ping_manager.cc
|
| +++ b/chrome/browser/safe_browsing/ping_manager.cc
|
| @@ -4,64 +4,15 @@
|
|
|
| #include "chrome/browser/safe_browsing/ping_manager.h"
|
|
|
| -#include <utility>
|
| -
|
| -#include "base/base64.h"
|
| -#include "base/logging.h"
|
| #include "base/memory/ptr_util.h"
|
| -#include "base/strings/string_util.h"
|
| -#include "base/strings/stringprintf.h"
|
| -#include "base/values.h"
|
| #include "chrome/browser/safe_browsing/notification_image_reporter.h"
|
| #include "chrome/browser/safe_browsing/permission_reporter.h"
|
| -#include "components/data_use_measurement/core/data_use_user_data.h"
|
| #include "content/public/browser/browser_thread.h"
|
| -#include "google_apis/google_api_keys.h"
|
| -#include "net/base/escape.h"
|
| -#include "net/base/load_flags.h"
|
| -#include "net/log/net_log_source_type.h"
|
| -#include "net/ssl/ssl_info.h"
|
| -#include "net/url_request/url_fetcher.h"
|
| -#include "net/url_request/url_request_context.h"
|
| #include "net/url_request/url_request_context_getter.h"
|
| -#include "net/url_request/url_request_status.h"
|
| #include "third_party/skia/include/core/SkBitmap.h"
|
| -#include "url/gurl.h"
|
|
|
| using content::BrowserThread;
|
|
|
| -namespace {
|
| -// Returns a dictionary with "url"=|url-spec| and "data"=|payload| for
|
| -// netlogging the start phase of a ping.
|
| -std::unique_ptr<base::Value> NetLogPingStartCallback(
|
| - const net::NetLogWithSource& net_log,
|
| - const GURL& url,
|
| - const std::string& payload,
|
| - net::NetLogCaptureMode) {
|
| - std::unique_ptr<base::DictionaryValue> event_params(
|
| - new base::DictionaryValue());
|
| - event_params->SetString("url", url.spec());
|
| - event_params->SetString("payload", payload);
|
| - net_log.source().AddToEventParameters(event_params.get());
|
| - return std::move(event_params);
|
| -}
|
| -
|
| -// Returns a dictionary with "url"=|url-spec|, "status"=|status| and
|
| -// "error"=|error| for netlogging the end phase of a ping.
|
| -std::unique_ptr<base::Value> NetLogPingEndCallback(
|
| - const net::NetLogWithSource& net_log,
|
| - const net::URLRequestStatus& status,
|
| - net::NetLogCaptureMode) {
|
| - std::unique_ptr<base::DictionaryValue> event_params(
|
| - new base::DictionaryValue());
|
| - event_params->SetInteger("status", status.status());
|
| - event_params->SetInteger("error", status.error());
|
| - net_log.source().AddToEventParameters(event_params.get());
|
| - return std::move(event_params);
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| namespace safe_browsing {
|
|
|
| // SafeBrowsingPingManager implementation ----------------------------------
|
| @@ -78,97 +29,18 @@ std::unique_ptr<SafeBrowsingPingManager> SafeBrowsingPingManager::Create(
|
| SafeBrowsingPingManager::SafeBrowsingPingManager(
|
| net::URLRequestContextGetter* request_context_getter,
|
| const SafeBrowsingProtocolConfig& config)
|
| - : client_name_(config.client_name),
|
| - request_context_getter_(request_context_getter),
|
| - url_prefix_(config.url_prefix) {
|
| - DCHECK(!url_prefix_.empty());
|
| -
|
| + : BasePingManager(request_context_getter, config) {
|
| if (request_context_getter) {
|
| permission_reporter_ = base::MakeUnique<PermissionReporter>(
|
| request_context_getter->GetURLRequestContext());
|
| notification_image_reporter_ = base::MakeUnique<NotificationImageReporter>(
|
| request_context_getter->GetURLRequestContext());
|
| -
|
| - net_log_ = net::NetLogWithSource::Make(
|
| - request_context_getter->GetURLRequestContext()->net_log(),
|
| - net::NetLogSourceType::SAFE_BROWSING);
|
| }
|
| -
|
| - version_ = SafeBrowsingProtocolManagerHelper::Version();
|
| }
|
|
|
| SafeBrowsingPingManager::~SafeBrowsingPingManager() {
|
| }
|
|
|
| -// net::URLFetcherDelegate implementation ----------------------------------
|
| -
|
| -// All SafeBrowsing request responses are handled here.
|
| -void SafeBrowsingPingManager::OnURLFetchComplete(
|
| - const net::URLFetcher* source) {
|
| - net_log_.EndEvent(
|
| - net::NetLogEventType::SAFE_BROWSING_PING,
|
| - base::Bind(&NetLogPingEndCallback, net_log_, source->GetStatus()));
|
| - auto it =
|
| - std::find_if(safebrowsing_reports_.begin(), safebrowsing_reports_.end(),
|
| - [source](const std::unique_ptr<net::URLFetcher>& ptr) {
|
| - return ptr.get() == source;
|
| - });
|
| - DCHECK(it != safebrowsing_reports_.end());
|
| - safebrowsing_reports_.erase(it);
|
| -}
|
| -
|
| -// Sends a SafeBrowsing "hit" report.
|
| -void SafeBrowsingPingManager::ReportSafeBrowsingHit(
|
| - const safe_browsing::HitReport& hit_report) {
|
| - GURL report_url = SafeBrowsingHitUrl(hit_report);
|
| - std::unique_ptr<net::URLFetcher> report_ptr = net::URLFetcher::Create(
|
| - report_url, hit_report.post_data.empty() ? net::URLFetcher::GET
|
| - : net::URLFetcher::POST,
|
| - this);
|
| - net::URLFetcher* report = report_ptr.get();
|
| - data_use_measurement::DataUseUserData::AttachToFetcher(
|
| - report, data_use_measurement::DataUseUserData::SAFE_BROWSING);
|
| - report_ptr->SetLoadFlags(net::LOAD_DISABLE_CACHE);
|
| - report_ptr->SetRequestContext(request_context_getter_.get());
|
| - std::string post_data_base64;
|
| - if (!hit_report.post_data.empty()) {
|
| - report_ptr->SetUploadData("text/plain", hit_report.post_data);
|
| - base::Base64Encode(hit_report.post_data, &post_data_base64);
|
| - }
|
| -
|
| - net_log_.BeginEvent(
|
| - net::NetLogEventType::SAFE_BROWSING_PING,
|
| - base::Bind(&NetLogPingStartCallback, net_log_,
|
| - report_ptr->GetOriginalURL(), post_data_base64));
|
| -
|
| - report->Start();
|
| - safebrowsing_reports_.insert(std::move(report_ptr));
|
| -}
|
| -
|
| -// Sends threat details for users who opt-in.
|
| -void SafeBrowsingPingManager::ReportThreatDetails(const std::string& report) {
|
| - GURL report_url = ThreatDetailsUrl();
|
| - std::unique_ptr<net::URLFetcher> fetcher =
|
| - net::URLFetcher::Create(report_url, net::URLFetcher::POST, this);
|
| - data_use_measurement::DataUseUserData::AttachToFetcher(
|
| - fetcher.get(), data_use_measurement::DataUseUserData::SAFE_BROWSING);
|
| - fetcher->SetLoadFlags(net::LOAD_DISABLE_CACHE);
|
| - fetcher->SetRequestContext(request_context_getter_.get());
|
| - fetcher->SetUploadData("application/octet-stream", report);
|
| - // Don't try too hard to send reports on failures.
|
| - fetcher->SetAutomaticallyRetryOn5xx(false);
|
| -
|
| - std::string report_base64;
|
| - base::Base64Encode(report, &report_base64);
|
| - net_log_.BeginEvent(
|
| - net::NetLogEventType::SAFE_BROWSING_PING,
|
| - base::Bind(&NetLogPingStartCallback, net_log_, fetcher->GetOriginalURL(),
|
| - report_base64));
|
| -
|
| - fetcher->Start();
|
| - safebrowsing_reports_.insert(std::move(fetcher));
|
| -}
|
| -
|
| void SafeBrowsingPingManager::ReportPermissionAction(
|
| const PermissionReportInfo& report_info) {
|
| permission_reporter_->SendReport(report_info);
|
| @@ -183,100 +55,4 @@ void SafeBrowsingPingManager::ReportNotificationImage(
|
| profile, database_manager, origin, image);
|
| }
|
|
|
| -GURL SafeBrowsingPingManager::SafeBrowsingHitUrl(
|
| - const safe_browsing::HitReport& hit_report) const {
|
| - DCHECK(hit_report.threat_type == SB_THREAT_TYPE_URL_MALWARE ||
|
| - hit_report.threat_type == SB_THREAT_TYPE_URL_PHISHING ||
|
| - hit_report.threat_type == SB_THREAT_TYPE_URL_UNWANTED ||
|
| - hit_report.threat_type == SB_THREAT_TYPE_BINARY_MALWARE_URL ||
|
| - hit_report.threat_type == SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL ||
|
| - hit_report.threat_type == SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL);
|
| - std::string url = SafeBrowsingProtocolManagerHelper::ComposeUrl(
|
| - url_prefix_, "report", client_name_, version_, std::string(),
|
| - hit_report.extended_reporting_level);
|
| -
|
| - std::string threat_list = "none";
|
| - switch (hit_report.threat_type) {
|
| - case SB_THREAT_TYPE_URL_MALWARE:
|
| - threat_list = "malblhit";
|
| - break;
|
| - case SB_THREAT_TYPE_URL_PHISHING:
|
| - threat_list = "phishblhit";
|
| - break;
|
| - case SB_THREAT_TYPE_URL_UNWANTED:
|
| - threat_list = "uwsblhit";
|
| - break;
|
| - case SB_THREAT_TYPE_BINARY_MALWARE_URL:
|
| - threat_list = "binurlhit";
|
| - break;
|
| - case SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL:
|
| - threat_list = "phishcsdhit";
|
| - break;
|
| - case SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL:
|
| - threat_list = "malcsdhit";
|
| - break;
|
| - default:
|
| - NOTREACHED();
|
| - }
|
| -
|
| - std::string threat_source = "none";
|
| - switch (hit_report.threat_source) {
|
| - case safe_browsing::ThreatSource::DATA_SAVER:
|
| - threat_source = "ds";
|
| - break;
|
| - case safe_browsing::ThreatSource::REMOTE:
|
| - threat_source = "rem";
|
| - break;
|
| - case safe_browsing::ThreatSource::LOCAL_PVER3:
|
| - threat_source = "l3";
|
| - break;
|
| - case safe_browsing::ThreatSource::LOCAL_PVER4:
|
| - threat_source = "l4";
|
| - break;
|
| - case safe_browsing::ThreatSource::CLIENT_SIDE_DETECTION:
|
| - threat_source = "csd";
|
| - break;
|
| - case safe_browsing::ThreatSource::UNKNOWN:
|
| - NOTREACHED();
|
| - }
|
| -
|
| - // Add user_population component only if it's not empty.
|
| - std::string user_population_comp;
|
| - if (!hit_report.population_id.empty()) {
|
| - // Population_id should be URL-safe, but escape it and size-limit it
|
| - // anyway since it came from outside Chrome.
|
| - std::string up_str =
|
| - net::EscapeQueryParamValue(hit_report.population_id, true);
|
| - if (up_str.size() > 512) {
|
| - DCHECK(false) << "population_id is too long: " << up_str;
|
| - up_str = "UP_STRING_TOO_LONG";
|
| - }
|
| -
|
| - user_population_comp = "&up=" + up_str;
|
| - }
|
| -
|
| - return GURL(base::StringPrintf(
|
| - "%s&evts=%s&evtd=%s&evtr=%s&evhr=%s&evtb=%d&src=%s&m=%d%s", url.c_str(),
|
| - threat_list.c_str(),
|
| - net::EscapeQueryParamValue(hit_report.malicious_url.spec(), true).c_str(),
|
| - net::EscapeQueryParamValue(hit_report.page_url.spec(), true).c_str(),
|
| - net::EscapeQueryParamValue(hit_report.referrer_url.spec(), true).c_str(),
|
| - hit_report.is_subresource, threat_source.c_str(),
|
| - hit_report.is_metrics_reporting_active, user_population_comp.c_str()));
|
| -}
|
| -
|
| -GURL SafeBrowsingPingManager::ThreatDetailsUrl() const {
|
| - std::string url = base::StringPrintf(
|
| - "%s/clientreport/malware?client=%s&appver=%s&pver=1.0",
|
| - url_prefix_.c_str(),
|
| - client_name_.c_str(),
|
| - version_.c_str());
|
| - std::string api_key = google_apis::GetAPIKey();
|
| - if (!api_key.empty()) {
|
| - base::StringAppendF(&url, "&key=%s",
|
| - net::EscapeQueryParamValue(api_key, true).c_str());
|
| - }
|
| - return GURL(url);
|
| -}
|
| -
|
| } // namespace safe_browsing
|
|
|