commit | 78e9f6eeeda616cf8ee8ad2b65bce864c3455b33 | [log] [tgz] |
---|---|---|
author | Matt Menke <[email protected]> | Fri May 29 21:31:01 2020 |
committer | Commit Bot <[email protected]> | Fri May 29 21:31:01 2020 |
tree | 553a72722909df20a0551e1c2a148982ae4d50ca | |
parent | 02b94c59050a56de7fb243b23c1c17881b37c941 [diff] [blame] |
Make TransportSecurityState::MaybeNotifyExpectCTFailed take a NIK. It then passes the NetworkIsolationKey on to the ExpectCTReporter. Also plumb NIK through the other TransportSecurityState methods that call it. Only one caller of TransportSecurityState is updated to pass in a non-empty NIK. The other 3 callers will be addressed in followup CLs. Bug: 969893, 1082280 Change-Id: I2982c06288e6ff9ec2dd863b0ecbcf01f46b2791 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2217871 Reviewed-by: Emily Stark <[email protected]> Commit-Queue: Matt Menke <[email protected]> Cr-Commit-Position: refs/heads/master@{#773345}
diff --git a/net/url_request/url_request_http_job.cc b/net/url_request/url_request_http_job.cc index ed277207..80130a8 100644 --- a/net/url_request/url_request_http_job.cc +++ b/net/url_request/url_request_http_job.cc
@@ -807,7 +807,8 @@ std::string value; if (headers->GetNormalizedHeader("Expect-CT", &value)) { security_state->ProcessExpectCTHeader( - value, HostPortPair::FromURL(request_info_.url), ssl_info); + value, HostPortPair::FromURL(request_info_.url), ssl_info, + request_->isolation_info().network_isolation_key()); } }