OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/net/chrome_fraudulent_certificate_reporter.h" | 5 #include "chrome/browser/net/chrome_fraudulent_certificate_reporter.h" |
6 | 6 |
7 #include "base/profiler/scoped_tracker.h" | 7 #include "base/profiler/scoped_tracker.h" |
8 #include "chrome/browser/net/certificate_error_reporter.h" | 8 #include "chrome/browser/net/certificate_error_reporter.h" |
9 #include "net/ssl/ssl_info.h" | 9 #include "net/ssl/ssl_info.h" |
10 #include "net/url_request/url_request_context.h" | 10 #include "net/url_request/url_request_context.h" |
11 #include "url/gurl.h" | 11 #include "url/gurl.h" |
12 | 12 |
13 namespace { | 13 namespace { |
14 | 14 |
15 // TODO(palmer): Switch to HTTPS when the error handling delegate is more | 15 // TODO(palmer): Switch to HTTPS when the error handling delegate is more |
16 // sophisticated. Ultimately we plan to attempt the report on many transports. | 16 // sophisticated. Ultimately we plan to attempt the report on many transports. |
17 const char kFraudulentCertificateUploadEndpoint[] = | 17 const char kFraudulentCertificateUploadEndpoint[] = |
18 "http://clients3.google.com/log_cert_error"; | 18 "http://clients3.google.com/log_cert_error"; |
19 | 19 |
20 } // namespace | 20 } // namespace |
21 | 21 |
22 namespace chrome_browser_net { | 22 namespace chrome_browser_net { |
23 | 23 |
24 ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( | 24 ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( |
25 net::URLRequestContext* request_context) | 25 net::URLRequestContext* request_context) |
26 : certificate_reporter_(new CertificateErrorReporter( | 26 : certificate_reporter_(new CertificateErrorReporter( |
27 request_context, | 27 request_context, |
28 GURL(kFraudulentCertificateUploadEndpoint))) { | 28 GURL(kFraudulentCertificateUploadEndpoint), |
| 29 CertificateErrorReporter::DO_NOT_SEND_COOKIES)) { |
29 } | 30 } |
30 | 31 |
31 ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( | 32 ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( |
32 scoped_ptr<CertificateErrorReporter> certificate_reporter) | 33 scoped_ptr<CertificateErrorReporter> certificate_reporter) |
33 : certificate_reporter_(certificate_reporter.Pass()) { | 34 : certificate_reporter_(certificate_reporter.Pass()) { |
34 } | 35 } |
35 | 36 |
36 ChromeFraudulentCertificateReporter::~ChromeFraudulentCertificateReporter() { | 37 ChromeFraudulentCertificateReporter::~ChromeFraudulentCertificateReporter() { |
37 } | 38 } |
38 | 39 |
39 void ChromeFraudulentCertificateReporter::SendReport( | 40 void ChromeFraudulentCertificateReporter::SendReport( |
40 const std::string& hostname, | 41 const std::string& hostname, |
41 const net::SSLInfo& ssl_info) { | 42 const net::SSLInfo& ssl_info) { |
42 // Do silent/automatic reporting ONLY for Google properties. For other | 43 // Do silent/automatic reporting ONLY for Google properties. For other |
43 // domains (when that is supported), Chrome will ask for user permission. | 44 // domains (when that is supported), Chrome will ask for user permission. |
44 if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname)) | 45 if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname)) |
45 return; | 46 return; |
46 | 47 |
47 certificate_reporter_->SendReport( | 48 certificate_reporter_->SendReport( |
48 CertificateErrorReporter::REPORT_TYPE_PINNING_VIOLATION, hostname, | 49 CertificateErrorReporter::REPORT_TYPE_PINNING_VIOLATION, hostname, |
49 ssl_info); | 50 ssl_info); |
50 } | 51 } |
51 | 52 |
52 } // namespace chrome_browser_net | 53 } // namespace chrome_browser_net |
OLD | NEW |