1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/browser/net/chrome_fraudulent_certificate_reporter.h"
7 #include "base/profiler/scoped_tracker.h"
8 #include "chrome/browser/net/certificate_error_reporter.h"
9 #include "net/ssl/ssl_info.h"
10 #include "net/url_request/url_request_context.h"
15 // TODO(palmer): Switch to HTTPS when the error handling delegate is more
16 // sophisticated. Ultimately we plan to attempt the report on many transports.
17 const char kFraudulentCertificateUploadEndpoint
[] =
18 "http://clients3.google.com/log_cert_error";
22 namespace chrome_browser_net
{
24 ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter(
25 net::URLRequestContext
* request_context
)
26 : certificate_reporter_(new CertificateErrorReporter(
28 GURL(kFraudulentCertificateUploadEndpoint
),
29 CertificateErrorReporter::DO_NOT_SEND_COOKIES
)) {
32 ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter(
33 scoped_ptr
<CertificateErrorReporter
> certificate_reporter
)
34 : certificate_reporter_(certificate_reporter
.Pass()) {
37 ChromeFraudulentCertificateReporter::~ChromeFraudulentCertificateReporter() {
40 void ChromeFraudulentCertificateReporter::SendReport(
41 const std::string
& hostname
,
42 const net::SSLInfo
& ssl_info
) {
43 // Do silent/automatic reporting ONLY for Google properties. For other
44 // domains (when that is supported), Chrome will ask for user permission.
45 if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname
))
48 certificate_reporter_
->SendReport(
49 CertificateErrorReporter::REPORT_TYPE_PINNING_VIOLATION
, hostname
,
53 } // namespace chrome_browser_net