Index: net/http/transport_security_state.cc |
diff --git a/net/http/transport_security_state.cc b/net/http/transport_security_state.cc |
index 3971eb387429ebc1ed99e8f8a885732e6dcb176e..b2f5cc234409df20f36df7cf2f13d7efdbb64dae 100644 |
--- a/net/http/transport_security_state.cc |
+++ b/net/http/transport_security_state.cc |
@@ -749,7 +749,7 @@ TransportSecurityState::TransportSecurityState() |
enable_static_pins_ = false; |
enable_static_expect_ct_ = false; |
#endif |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
} |
// Both HSTS and HPKP cause fatal SSL errors, so return true if a |
@@ -811,7 +811,7 @@ void TransportSecurityState::CheckExpectStaple( |
const HostPortPair& host_port_pair, |
const SSLInfo& ssl_info, |
base::StringPiece ocsp_response) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
if (!enable_static_expect_staple_ || !report_sender_ || |
!ssl_info.is_issued_by_known_root) { |
return; |
@@ -974,24 +974,24 @@ TransportSecurityState::CheckCTRequirements( |
void TransportSecurityState::SetDelegate( |
TransportSecurityState::Delegate* delegate) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
delegate_ = delegate; |
} |
void TransportSecurityState::SetReportSender( |
TransportSecurityState::ReportSenderInterface* report_sender) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
report_sender_ = report_sender; |
} |
void TransportSecurityState::SetExpectCTReporter( |
ExpectCTReporter* expect_ct_reporter) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
expect_ct_reporter_ = expect_ct_reporter; |
} |
void TransportSecurityState::SetRequireCTDelegate(RequireCTDelegate* delegate) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
require_ct_delegate_ = delegate; |
} |
@@ -1000,7 +1000,7 @@ void TransportSecurityState::AddHSTSInternal( |
TransportSecurityState::STSState::UpgradeMode upgrade_mode, |
const base::Time& expiry, |
bool include_subdomains) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
STSState sts_state; |
sts_state.last_observed = base::Time::Now(); |
@@ -1017,7 +1017,7 @@ void TransportSecurityState::AddHPKPInternal(const std::string& host, |
bool include_subdomains, |
const HashValueVector& hashes, |
const GURL& report_uri) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
PKPState pkp_state; |
pkp_state.last_observed = last_observed; |
@@ -1035,7 +1035,7 @@ void TransportSecurityState::AddExpectCTInternal( |
const base::Time& expiry, |
bool enforce, |
const GURL& report_uri) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
ExpectCTState expect_ct_state; |
expect_ct_state.last_observed = last_observed; |
@@ -1053,7 +1053,7 @@ void TransportSecurityState:: |
void TransportSecurityState::EnableSTSHost(const std::string& host, |
const STSState& state) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
const std::string canonicalized_host = CanonicalizeHost(host); |
if (canonicalized_host.empty()) |
@@ -1078,7 +1078,7 @@ void TransportSecurityState::EnableSTSHost(const std::string& host, |
void TransportSecurityState::EnablePKPHost(const std::string& host, |
const PKPState& state) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
const std::string canonicalized_host = CanonicalizeHost(host); |
if (canonicalized_host.empty()) |
@@ -1103,7 +1103,7 @@ void TransportSecurityState::EnablePKPHost(const std::string& host, |
void TransportSecurityState::EnableExpectCTHost(const std::string& host, |
const ExpectCTState& state) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
if (!IsDynamicExpectCTEnabled()) |
return; |
@@ -1186,7 +1186,7 @@ TransportSecurityState::CheckPinsAndMaybeSendReport( |
bool TransportSecurityState::GetStaticExpectCTState( |
const std::string& host, |
ExpectCTState* expect_ct_state) const { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
if (!IsBuildTimely()) |
return false; |
@@ -1207,7 +1207,7 @@ bool TransportSecurityState::GetStaticExpectCTState( |
bool TransportSecurityState::GetStaticExpectStapleState( |
const std::string& host, |
ExpectStapleState* expect_staple_state) const { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
if (!IsBuildTimely()) |
return false; |
@@ -1229,7 +1229,7 @@ bool TransportSecurityState::GetStaticExpectStapleState( |
} |
bool TransportSecurityState::DeleteDynamicDataForHost(const std::string& host) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
const std::string canonicalized_host = CanonicalizeHost(host); |
if (canonicalized_host.empty()) |
@@ -1262,14 +1262,14 @@ bool TransportSecurityState::DeleteDynamicDataForHost(const std::string& host) { |
} |
void TransportSecurityState::ClearDynamicData() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
enabled_sts_hosts_.clear(); |
enabled_pkp_hosts_.clear(); |
enabled_expect_ct_hosts_.clear(); |
} |
void TransportSecurityState::DeleteAllDynamicDataSince(const base::Time& time) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
bool dirtied = false; |
STSStateMap::iterator sts_iterator = enabled_sts_hosts_.begin(); |
@@ -1311,11 +1311,11 @@ void TransportSecurityState::DeleteAllDynamicDataSince(const base::Time& time) { |
} |
TransportSecurityState::~TransportSecurityState() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
} |
void TransportSecurityState::DirtyNotify() { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
if (delegate_) |
delegate_->StateIsDirty(this); |
@@ -1323,7 +1323,7 @@ void TransportSecurityState::DirtyNotify() { |
bool TransportSecurityState::AddHSTSHeader(const std::string& host, |
const std::string& value) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
base::Time now = base::Time::Now(); |
base::TimeDelta max_age; |
@@ -1347,7 +1347,7 @@ bool TransportSecurityState::AddHSTSHeader(const std::string& host, |
bool TransportSecurityState::AddHPKPHeader(const std::string& host, |
const std::string& value, |
const SSLInfo& ssl_info) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
base::Time now = base::Time::Now(); |
base::TimeDelta max_age; |
@@ -1370,7 +1370,7 @@ bool TransportSecurityState::AddHPKPHeader(const std::string& host, |
void TransportSecurityState::AddHSTS(const std::string& host, |
const base::Time& expiry, |
bool include_subdomains) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
AddHSTSInternal(host, STSState::MODE_FORCE_HTTPS, expiry, include_subdomains); |
} |
@@ -1379,7 +1379,7 @@ void TransportSecurityState::AddHPKP(const std::string& host, |
bool include_subdomains, |
const HashValueVector& hashes, |
const GURL& report_uri) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
AddHPKPInternal(host, base::Time::Now(), expiry, include_subdomains, hashes, |
report_uri); |
} |
@@ -1388,7 +1388,7 @@ void TransportSecurityState::AddExpectCT(const std::string& host, |
const base::Time& expiry, |
bool enforce, |
const GURL& report_uri) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
AddExpectCTInternal(host, base::Time::Now(), expiry, enforce, report_uri); |
} |
@@ -1396,7 +1396,7 @@ bool TransportSecurityState::ProcessHPKPReportOnlyHeader( |
const std::string& value, |
const HostPortPair& host_port_pair, |
const SSLInfo& ssl_info) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
base::Time now = base::Time::Now(); |
bool include_subdomains; |
@@ -1429,7 +1429,7 @@ void TransportSecurityState::ProcessExpectCTHeader( |
const std::string& value, |
const HostPortPair& host_port_pair, |
const SSLInfo& ssl_info) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
// If a site sends `Expect-CT: preload` and appears on the preload list, they |
// are in the experimental preload-list-only, report-only version of |
@@ -1539,7 +1539,7 @@ TransportSecurityState::CheckPublicKeyPinsImpl( |
bool TransportSecurityState::GetStaticDomainState(const std::string& host, |
STSState* sts_state, |
PKPState* pkp_state) const { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
sts_state->upgrade_mode = STSState::MODE_FORCE_HTTPS; |
sts_state->include_subdomains = false; |
@@ -1593,7 +1593,7 @@ bool TransportSecurityState::GetStaticDomainState(const std::string& host, |
} |
bool TransportSecurityState::IsGooglePinnedHost(const std::string& host) const { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
if (!IsBuildTimely()) |
return false; |
@@ -1613,7 +1613,7 @@ bool TransportSecurityState::IsGooglePinnedHost(const std::string& host) const { |
bool TransportSecurityState::GetDynamicSTSState(const std::string& host, |
STSState* result) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
const std::string canonicalized_host = CanonicalizeHost(host); |
if (canonicalized_host.empty()) |
@@ -1654,7 +1654,7 @@ bool TransportSecurityState::GetDynamicSTSState(const std::string& host, |
bool TransportSecurityState::GetDynamicPKPState(const std::string& host, |
PKPState* result) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
const std::string canonicalized_host = CanonicalizeHost(host); |
if (canonicalized_host.empty()) |
@@ -1695,7 +1695,7 @@ bool TransportSecurityState::GetDynamicPKPState(const std::string& host, |
bool TransportSecurityState::GetDynamicExpectCTState(const std::string& host, |
ExpectCTState* result) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
const std::string canonicalized_host = CanonicalizeHost(host); |
if (canonicalized_host.empty()) |
@@ -1720,7 +1720,7 @@ bool TransportSecurityState::GetDynamicExpectCTState(const std::string& host, |
void TransportSecurityState::AddOrUpdateEnabledSTSHosts( |
const std::string& hashed_host, |
const STSState& state) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
DCHECK(state.ShouldUpgradeToSSL()); |
enabled_sts_hosts_[hashed_host] = state; |
} |
@@ -1728,7 +1728,7 @@ void TransportSecurityState::AddOrUpdateEnabledSTSHosts( |
void TransportSecurityState::AddOrUpdateEnabledPKPHosts( |
const std::string& hashed_host, |
const PKPState& state) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
DCHECK(state.HasPublicKeyPins()); |
enabled_pkp_hosts_[hashed_host] = state; |
} |
@@ -1736,7 +1736,7 @@ void TransportSecurityState::AddOrUpdateEnabledPKPHosts( |
void TransportSecurityState::AddOrUpdateEnabledExpectCTHosts( |
const std::string& hashed_host, |
const ExpectCTState& state) { |
- DCHECK(CalledOnValidThread()); |
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); |
DCHECK(state.enforce || !state.report_uri.is_empty()); |
enabled_expect_ct_hosts_[hashed_host] = state; |
} |
@@ -1777,7 +1777,7 @@ TransportSecurityState::ExpectCTStateIterator::ExpectCTStateIterator( |
const TransportSecurityState& state) |
: iterator_(state.enabled_expect_ct_hosts_.begin()), |
end_(state.enabled_expect_ct_hosts_.end()) { |
- DCHECK(state.CalledOnValidThread()); |
+ state.AssertCalledOnValidSequence(); |
} |
TransportSecurityState::ExpectCTStateIterator::~ExpectCTStateIterator() {} |