Index: remoting/host/dns_blackhole_checker.cc |
diff --git a/remoting/host/dns_blackhole_checker.cc b/remoting/host/dns_blackhole_checker.cc |
index 1f71ad5200b1265440409b7cb427f6faa543821b..d01558c3df56282237035ed23efa876b2a425dcd 100644 |
--- a/remoting/host/dns_blackhole_checker.cc |
+++ b/remoting/host/dns_blackhole_checker.cc |
@@ -5,6 +5,7 @@ |
#include "remoting/host/dns_blackhole_checker.h" |
#include "base/callback_helpers.h" |
+#include "net/traffic_annotation/network_traffic_annotation.h" |
#include "net/url_request/url_fetcher.h" |
#include "net/url_request/url_request_context_getter.h" |
#include "remoting/base/logging.h" |
@@ -58,8 +59,29 @@ void DnsBlackholeChecker::CheckForDnsBlackhole( |
} |
talkgadget_url += kTalkGadgetUrl; |
HOST_LOG << "Verifying connection to " << talkgadget_url; |
- url_fetcher_ = net::URLFetcher::Create(GURL(talkgadget_url), |
- net::URLFetcher::GET, this); |
+ net::NetworkTrafficAnnotationTag traffic_annotation = |
+ net::DefineNetworkTrafficAnnotation("...", R"( |
+ semantics { |
+ sender: "..." |
+ description: "..." |
+ trigger: "..." |
+ data: "..." |
+ destination: WEBSITE/GOOGLE_OWNED_SERVICE/OTHER |
+ } |
+ policy { |
+ cookies_allowed: false/true |
+ cookies_store: "..." |
+ setting: "..." |
+ policy { |
+ [POLICY_NAME] { |
+ policy_options {mode: MANDATORY/RECOMMENDED/UNSET} |
+ [POLICY_NAME]: ... //(value to disable it) |
+ } |
+ } |
+ policy_exception_justification: "..." |
+ })"); |
+ url_fetcher_ = net::URLFetcher::Create( |
+ GURL(talkgadget_url), net::URLFetcher::GET, this, traffic_annotation); |
url_fetcher_->SetRequestContext(url_request_context_getter_.get()); |
url_fetcher_->Start(); |
} else { |