1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105
|
// Copyright 2025 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/security/dip/document_isolation_policy_reporter.h"
#include <string_view>
#include "base/values.h"
#include "content/public/browser/storage_partition.h"
#include "services/network/public/cpp/request_destination.h"
#include "services/network/public/mojom/network_context.mojom.h"
namespace content {
namespace {
constexpr char kType[] = "dip";
GURL StripUsernameAndPassword(const GURL& url) {
GURL::Replacements replacements;
replacements.ClearUsername();
replacements.ClearPassword();
return url.ReplaceComponents(replacements);
}
} // namespace
DocumentIsolationPolicyReporter::DocumentIsolationPolicyReporter(
base::WeakPtr<StoragePartition> storage_partition,
const GURL& context_url,
const std::optional<std::string>& endpoint,
const std::optional<std::string>& report_only_endpoint,
const base::UnguessableToken& reporting_source,
const net::NetworkAnonymizationKey& network_anonymization_key)
: storage_partition_(std::move(storage_partition)),
context_url_(context_url),
endpoint_(endpoint),
report_only_endpoint_(report_only_endpoint),
reporting_source_(reporting_source),
network_anonymization_key_(network_anonymization_key) {
DCHECK(storage_partition_);
DCHECK(!reporting_source_.is_empty());
}
DocumentIsolationPolicyReporter::~DocumentIsolationPolicyReporter() = default;
void DocumentIsolationPolicyReporter::QueueCorpViolationReport(
const GURL& blocked_url,
network::mojom::RequestDestination destination,
bool report_only) {
GURL url_to_pass = StripUsernameAndPassword(blocked_url);
QueueAndNotify(
{{"type", "corp"},
{"blockedURL", url_to_pass.spec()},
{"destination", network::RequestDestinationToString(destination)}},
report_only);
}
void DocumentIsolationPolicyReporter::BindObserver(
mojo::PendingRemote<blink::mojom::ReportingObserver> observer) {
observer_.Bind(std::move(observer));
}
void DocumentIsolationPolicyReporter::Clone(
mojo::PendingReceiver<network::mojom::DocumentIsolationPolicyReporter>
receiver) {
receiver_set_.Add(this, std::move(receiver));
}
void DocumentIsolationPolicyReporter::QueueAndNotify(
std::initializer_list<std::pair<std::string_view, std::string_view>> body,
bool report_only) {
const std::optional<std::string>& endpoint =
report_only ? report_only_endpoint_ : endpoint_;
const char* const disposition = report_only ? "reporting" : "enforce";
if (observer_) {
std::vector<blink::mojom::ReportBodyElementPtr> list;
for (const auto& pair : body) {
list.push_back(blink::mojom::ReportBodyElement::New(
std::string(pair.first), std::string(pair.second)));
}
list.push_back(
blink::mojom::ReportBodyElement::New("disposition", disposition));
observer_->Notify(blink::mojom::Report::New(
kType, context_url_, blink::mojom::ReportBody::New(std::move(list))));
}
if (endpoint) {
base::Value::Dict body_to_pass;
for (const auto& pair : body) {
body_to_pass.Set(pair.first, pair.second);
}
body_to_pass.Set("disposition", disposition);
if (auto* storage_partition = storage_partition_.get()) {
storage_partition->GetNetworkContext()->QueueReport(
kType, *endpoint, context_url_, reporting_source_,
network_anonymization_key_, std::move(body_to_pass));
}
}
}
} // namespace content
|