Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(276)

Side by Side Diff: chrome/browser/profiles/off_the_record_profile_io_data.cc

Issue 422063004: Certificate Transparency: Require SCTs for EV certificates. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixing pointer type and tests Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/profiles/off_the_record_profile_io_data.h" 5 #include "chrome/browser/profiles/off_the_record_profile_io_data.h"
6 6
7 #include "base/bind.h" 7 #include "base/bind.h"
8 #include "base/command_line.h" 8 #include "base/command_line.h"
9 #include "base/logging.h" 9 #include "base/logging.h"
10 #include "base/prefs/pref_service.h" 10 #include "base/prefs/pref_service.h"
(...skipping 208 matching lines...) Expand 10 before | Expand all | Expand 10 after
219 main_context->set_fraudulent_certificate_reporter( 219 main_context->set_fraudulent_certificate_reporter(
220 fraudulent_certificate_reporter()); 220 fraudulent_certificate_reporter());
221 main_context->set_proxy_service(proxy_service()); 221 main_context->set_proxy_service(proxy_service());
222 222
223 main_context->set_throttler_manager( 223 main_context->set_throttler_manager(
224 io_thread_globals->throttler_manager.get()); 224 io_thread_globals->throttler_manager.get());
225 225
226 main_context->set_cert_transparency_verifier( 226 main_context->set_cert_transparency_verifier(
227 io_thread_globals->cert_transparency_verifier.get()); 227 io_thread_globals->cert_transparency_verifier.get());
228 228
229 main_context->set_cert_policy_enforcer(
230 io_thread_globals->cert_policy_enforcer.get());
231
229 // For incognito, we use the default non-persistent HttpServerPropertiesImpl. 232 // For incognito, we use the default non-persistent HttpServerPropertiesImpl.
230 set_http_server_properties( 233 set_http_server_properties(
231 scoped_ptr<net::HttpServerProperties>( 234 scoped_ptr<net::HttpServerProperties>(
232 new net::HttpServerPropertiesImpl())); 235 new net::HttpServerPropertiesImpl()));
233 main_context->set_http_server_properties(http_server_properties()); 236 main_context->set_http_server_properties(http_server_properties());
234 237
235 // For incognito, we use a non-persistent channel ID store. 238 // For incognito, we use a non-persistent channel ID store.
236 net::ChannelIDService* channel_id_service = 239 net::ChannelIDService* channel_id_service =
237 new net::ChannelIDService( 240 new net::ChannelIDService(
238 new net::DefaultChannelIDStore(NULL), 241 new net::DefaultChannelIDStore(NULL),
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after
294 extensions_context->set_transport_security_state(transport_security_state()); 297 extensions_context->set_transport_security_state(transport_security_state());
295 298
296 extensions_context->set_net_log(io_thread->net_log()); 299 extensions_context->set_net_log(io_thread->net_log());
297 300
298 extensions_context->set_throttler_manager( 301 extensions_context->set_throttler_manager(
299 io_thread_globals->throttler_manager.get()); 302 io_thread_globals->throttler_manager.get());
300 303
301 extensions_context->set_cert_transparency_verifier( 304 extensions_context->set_cert_transparency_verifier(
302 io_thread_globals->cert_transparency_verifier.get()); 305 io_thread_globals->cert_transparency_verifier.get());
303 306
307 extensions_context->set_cert_policy_enforcer(
308 io_thread_globals->cert_policy_enforcer.get());
309
304 // All we care about for extensions is the cookie store. For incognito, we 310 // All we care about for extensions is the cookie store. For incognito, we
305 // use a non-persistent cookie store. 311 // use a non-persistent cookie store.
306 net::CookieMonster* extensions_cookie_store = 312 net::CookieMonster* extensions_cookie_store =
307 content::CreateCookieStore(content::CookieStoreConfig())-> 313 content::CreateCookieStore(content::CookieStoreConfig())->
308 GetCookieMonster(); 314 GetCookieMonster();
309 // Enable cookies for devtools and extension URLs. 315 // Enable cookies for devtools and extension URLs.
310 const char* const schemes[] = { 316 const char* const schemes[] = {
311 content::kChromeDevToolsScheme, 317 content::kChromeDevToolsScheme,
312 extensions::kExtensionScheme 318 extensions::kExtensionScheme
313 }; 319 };
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after
405 return app_request_context; 411 return app_request_context;
406 } 412 }
407 413
408 net::URLRequestContext* 414 net::URLRequestContext*
409 OffTheRecordProfileIOData::AcquireIsolatedMediaRequestContext( 415 OffTheRecordProfileIOData::AcquireIsolatedMediaRequestContext(
410 net::URLRequestContext* app_context, 416 net::URLRequestContext* app_context,
411 const StoragePartitionDescriptor& partition_descriptor) const { 417 const StoragePartitionDescriptor& partition_descriptor) const {
412 NOTREACHED(); 418 NOTREACHED();
413 return NULL; 419 return NULL;
414 } 420 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698