Index: content/browser/ssl/ssl_host_state.cc |
diff --git a/content/browser/ssl/ssl_host_state.cc b/content/browser/ssl/ssl_host_state.cc |
index 06c600205fa8b1277b5252e91cbbf56580320c21..6820a7d30da6d52c9866a974753abd6d0ca08123 100644 |
--- a/content/browser/ssl/ssl_host_state.cc |
+++ b/content/browser/ssl/ssl_host_state.cc |
@@ -7,6 +7,10 @@ |
#include "base/logging.h" |
#include "base/lazy_instance.h" |
#include "content/public/browser/browser_context.h" |
+#include "content/public/browser/ssl_host_state_delegate.h" |
+#include "net/http/http_transaction_factory.h" |
+#include "net/url_request/url_request_context.h" |
+#include "net/url_request/url_request_context_getter.h" |
const char kKeyName[] = "content_ssl_host_state"; |
@@ -16,7 +20,10 @@ SSLHostState* SSLHostState::GetFor(BrowserContext* context) { |
SSLHostState* rv = static_cast<SSLHostState*>(context->GetUserData(kKeyName)); |
if (!rv) { |
rv = new SSLHostState(); |
- context->SetUserData(kKeyName, rv); |
+ rv->delegate_ = context->GetSSLHostStateDelegate(); |
+ // |context| may be NULL, implementing the default storage strategy. |
+ if (context) |
benm (inactive)
2014/12/10 15:01:42
should this check go up above? If context might be
jww
2014/12/10 23:20:06
Good catch, although this code was significantly r
|
+ context->SetUserData(kKeyName, rv); |
} |
return rv; |
} |
@@ -43,7 +50,10 @@ void SSLHostState::DenyCertForHost(net::X509Certificate* cert, |
net::CertStatus error) { |
DCHECK(CalledOnValidThread()); |
- cert_policy_for_host_[host].Deny(cert, error); |
+ if (!delegate_) |
+ return; |
+ |
+ delegate_->DenyCert(host, cert, error); |
} |
void SSLHostState::AllowCertForHost(net::X509Certificate* cert, |
@@ -51,13 +61,47 @@ void SSLHostState::AllowCertForHost(net::X509Certificate* cert, |
net::CertStatus error) { |
DCHECK(CalledOnValidThread()); |
- cert_policy_for_host_[host].Allow(cert, error); |
+ if (!delegate_) |
+ return; |
+ |
+ delegate_->AllowCert(host, cert, error); |
} |
-void SSLHostState::Clear() { |
+void SSLHostState::RevokeAllowAndDenyPreferences(const std::string& host) { |
DCHECK(CalledOnValidThread()); |
- cert_policy_for_host_.clear(); |
+ if (!delegate_) |
+ return; |
+ |
+ // TODO(jww): This will revoke all of the decisions in the browser context. |
+ // However, the networking stack actually keeps track of its own list of |
+ // exceptions per-HttpNetworkTransaction in the SSLConfig structure (see the |
+ // allowed_bad_certs Vector in net/ssl/ssl_config.h). This dual-tracking of |
+ // exceptions introduces a problem where the browser context can revoke a |
+ // certificate, but if a transaction reuses a cached version of the SSLConfig |
+ // (probably from a pooled socket), it may bypass the intestitial layer. |
+ // |
+ // Over time, the cached versions should expire and it should converge on |
+ // showing the interstitial. We probably need to |
+ // introduce into the networking stack a way revoke SSLConfig's |
+ // allowed_bad_certs lists per socket. |
+ delegate_->RevokeAllowAndDenyPreferences(host); |
+} |
+ |
+bool SSLHostState::HasAllowedOrDeniedCert(const std::string& host) { |
+ DCHECK(CalledOnValidThread()); |
+ |
+ if (!delegate_) |
+ return false; |
+ |
+ return delegate_->HasAllowedOrDeniedCert(host); |
+} |
+ |
+void SSLHostState::Clear() { |
+ if (!delegate_) |
+ return; |
+ |
+ delegate_->Clear(); |
} |
net::CertPolicy::Judgment SSLHostState::QueryPolicy(net::X509Certificate* cert, |
@@ -65,7 +109,10 @@ net::CertPolicy::Judgment SSLHostState::QueryPolicy(net::X509Certificate* cert, |
net::CertStatus error) { |
DCHECK(CalledOnValidThread()); |
- return cert_policy_for_host_[host].Check(cert, error); |
+ if (!delegate_) |
+ return net::CertPolicy::Judgment::UNKNOWN; |
+ |
+ return delegate_->QueryPolicy(host, cert, error); |
} |
} // namespace content |