| Index: chrome/browser/profiles/profile_io_data.cc
|
| diff --git a/chrome/browser/profiles/profile_io_data.cc b/chrome/browser/profiles/profile_io_data.cc
|
| index a47242db697abe6b8cba0328ca32e3683c6fce56..b211e0d36b7fff0c3636ae44456fb70ac495d84a 100644
|
| --- a/chrome/browser/profiles/profile_io_data.cc
|
| +++ b/chrome/browser/profiles/profile_io_data.cc
|
| @@ -1063,45 +1063,6 @@ void ProfileIOData::Init(
|
| {base::MayBlock(), base::TaskPriority::BACKGROUND,
|
| base::TaskShutdownBehavior::BLOCK_SHUTDOWN}),
|
| IsOffTheRecord()));
|
| -
|
| - net::NetworkTrafficAnnotationTag traffic_annotation =
|
| - net::DefineNetworkTrafficAnnotation("domain_security_policy", R"(
|
| - semantics {
|
| - sender: "Domain Security Policy"
|
| - description:
|
| - "Websites can opt in to have Chrome send reports to them when "
|
| - "Chrome observes connections to that website that do not meet "
|
| - "stricter security policies, such as with HTTP Public Key Pinning. "
|
| - "Websites can use this feature to discover misconfigurations that "
|
| - "prevent them from complying with stricter security policies that "
|
| - "they've opted in to."
|
| - trigger:
|
| - "Chrome observes that a user is loading a resource from a website "
|
| - "that has opted in for security policy reports, and the connection "
|
| - "does not meet the required security policies."
|
| - data:
|
| - "The time of the request, the hostname and port being requested, "
|
| - "the certificate chain, and sometimes certificate revocation "
|
| - "information included on the connection."
|
| - destination: OTHER
|
| - }
|
| - policy {
|
| - cookies_allowed: false
|
| - setting: "This feature cannot be disabled by settings."
|
| - policy_exception_justification:
|
| - "Not implemented, this is a feature that websites can opt into and "
|
| - "thus there is no Chrome-wide policy to disable it."
|
| - })");
|
| - certificate_report_sender_.reset(
|
| - new net::ReportSender(main_request_context_.get(), traffic_annotation));
|
| - transport_security_state->SetReportSender(certificate_report_sender_.get());
|
| -
|
| - expect_ct_reporter_.reset(
|
| - new ChromeExpectCTReporter(main_request_context_.get()));
|
| - transport_security_state->SetExpectCTReporter(expect_ct_reporter_.get());
|
| -
|
| - transport_security_state->SetRequireCTDelegate(
|
| - ct_policy_manager_->GetDelegate());
|
| main_request_context_storage_->set_transport_security_state(
|
| std::move(transport_security_state));
|
|
|
| @@ -1182,6 +1143,47 @@ void ProfileIOData::Init(
|
| InitializeInternal(profile_params_.get(), protocol_handlers,
|
| std::move(request_interceptors));
|
|
|
| + net::NetworkTrafficAnnotationTag traffic_annotation =
|
| + net::DefineNetworkTrafficAnnotation("domain_security_policy", R"(
|
| + semantics {
|
| + sender: "Domain Security Policy"
|
| + description:
|
| + "Websites can opt in to have Chrome send reports to them when "
|
| + "Chrome observes connections to that website that do not meet "
|
| + "stricter security policies, such as with HTTP Public Key Pinning. "
|
| + "Websites can use this feature to discover misconfigurations that "
|
| + "prevent them from complying with stricter security policies that "
|
| + "they've opted in to."
|
| + trigger:
|
| + "Chrome observes that a user is loading a resource from a website "
|
| + "that has opted in for security policy reports, and the connection "
|
| + "does not meet the required security policies."
|
| + data:
|
| + "The time of the request, the hostname and port being requested, "
|
| + "the certificate chain, and sometimes certificate revocation "
|
| + "information included on the connection."
|
| + destination: OTHER
|
| + }
|
| + policy {
|
| + cookies_allowed: false
|
| + setting: "This feature cannot be disabled by settings."
|
| + policy_exception_justification:
|
| + "Not implemented, this is a feature that websites can opt into and "
|
| + "thus there is no Chrome-wide policy to disable it."
|
| + })");
|
| + certificate_report_sender_.reset(
|
| + new net::ReportSender(main_request_context_.get(), traffic_annotation));
|
| + main_request_context_->transport_security_state()->SetReportSender(
|
| + certificate_report_sender_.get());
|
| +
|
| + expect_ct_reporter_.reset(
|
| + new ChromeExpectCTReporter(main_request_context_.get()));
|
| + main_request_context_->transport_security_state()->SetExpectCTReporter(
|
| + expect_ct_reporter_.get());
|
| +
|
| + main_request_context_->transport_security_state()->SetRequireCTDelegate(
|
| + ct_policy_manager_->GetDelegate());
|
| +
|
| profile_params_.reset();
|
| initialized_ = true;
|
| }
|
|
|