Added affiliation IDs, that in future will be used to determine user affiliation...
[chromium-blink-merge.git] / chrome / browser / safe_browsing / ping_manager.h
blob7a62b23a26c9806b7b3e486f1a109bc9a986ab5b
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef CHROME_BROWSER_SAFE_BROWSING_PING_MANAGER_H_
6 #define CHROME_BROWSER_SAFE_BROWSING_PING_MANAGER_H_
8 // A class that reports safebrowsing statistics to Google's SafeBrowsing
9 // servers.
10 #include <set>
11 #include <string>
12 #include <vector>
14 #include "base/gtest_prod_util.h"
15 #include "base/memory/scoped_ptr.h"
16 #include "chrome/browser/safe_browsing/protocol_manager_helper.h"
17 #include "chrome/browser/safe_browsing/safe_browsing_util.h"
18 #include "net/url_request/url_fetcher_delegate.h"
19 #include "url/gurl.h"
21 namespace chrome_browser_net {
22 class CertificateErrorReporter;
25 namespace net {
26 class SSLInfo;
27 class URLRequestContextGetter;
28 } // namespace net
31 class SafeBrowsingPingManager : public net::URLFetcherDelegate {
32 public:
33 ~SafeBrowsingPingManager() override;
35 // Create an instance of the safe browsing ping manager.
36 static SafeBrowsingPingManager* Create(
37 net::URLRequestContextGetter* request_context_getter,
38 const SafeBrowsingProtocolConfig& config);
40 // net::URLFetcherDelegate interface.
41 void OnURLFetchComplete(const net::URLFetcher* source) override;
43 // For UMA users we report to Google when a SafeBrowsing interstitial is shown
44 // to the user. |threat_type| should be one of the types known by
45 // SafeBrowsingHitUrl.
46 void ReportSafeBrowsingHit(const GURL& malicious_url,
47 const GURL& page_url,
48 const GURL& referrer_url,
49 bool is_subresource,
50 SBThreatType threat_type,
51 const std::string& post_data);
53 // Users can opt-in on the SafeBrowsing interstitial to send detailed
54 // malware reports. |report| is the serialized report.
55 void ReportMalwareDetails(const std::string& report);
57 // Users can opt-in on the SSL interstitial to send reports of invalid
58 // certificate chains.
59 void ReportInvalidCertificateChain(const std::string& serialized_report);
61 void SetCertificateErrorReporterForTesting(scoped_ptr<
62 chrome_browser_net::CertificateErrorReporter> certificate_error_reporter);
64 private:
65 FRIEND_TEST_ALL_PREFIXES(SafeBrowsingPingManagerTest,
66 TestSafeBrowsingHitUrl);
67 FRIEND_TEST_ALL_PREFIXES(SafeBrowsingPingManagerTest,
68 TestMalwareDetailsUrl);
70 typedef std::set<const net::URLFetcher*> Reports;
72 // Constructs a SafeBrowsingPingManager that issues network requests
73 // using |request_context_getter|.
74 SafeBrowsingPingManager(
75 net::URLRequestContextGetter* request_context_getter,
76 const SafeBrowsingProtocolConfig& config);
78 // Generates URL for reporting safe browsing hits for UMA users.
79 GURL SafeBrowsingHitUrl(
80 const GURL& malicious_url, const GURL& page_url, const GURL& referrer_url,
81 bool is_subresource,
82 SBThreatType threat_type) const;
83 // Generates URL for reporting malware details for users who opt-in.
84 GURL MalwareDetailsUrl() const;
86 // Current product version sent in each request.
87 std::string version_;
89 // The safe browsing client name sent in each request.
90 std::string client_name_;
92 // The context we use to issue network requests.
93 scoped_refptr<net::URLRequestContextGetter> request_context_getter_;
95 // URL prefix where browser reports hits to the safebrowsing list and
96 // sends detaild malware reports for UMA users.
97 std::string url_prefix_;
99 // Track outstanding SafeBrowsing report fetchers for clean up.
100 // We add both "hit" and "detail" fetchers in this set.
101 Reports safebrowsing_reports_;
103 // Sends reports of invalid SSL certificate chains.
104 scoped_ptr<chrome_browser_net::CertificateErrorReporter>
105 certificate_error_reporter_;
107 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingPingManager);
110 #endif // CHROME_BROWSER_SAFE_BROWSING_PING_MANAGER_H_