OLD | NEW |
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/ssl/ssl_policy.h" | 5 #include "chrome/browser/ssl/ssl_policy.h" |
6 | 6 |
7 #include "app/l10n_util.h" | 7 #include "app/l10n_util.h" |
8 #include "app/resource_bundle.h" | 8 #include "app/resource_bundle.h" |
9 #include "base/base_switches.h" | 9 #include "base/base_switches.h" |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
126 backend_->ShowMessageWithLink( | 126 backend_->ShowMessageWithLink( |
127 l10n_util::GetString(IDS_SSL_INFO_BAR_FILTERED_CONTENT), | 127 l10n_util::GetString(IDS_SSL_INFO_BAR_FILTERED_CONTENT), |
128 l10n_util::GetString(IDS_SSL_INFO_BAR_SHOW_CONTENT), | 128 l10n_util::GetString(IDS_SSL_INFO_BAR_SHOW_CONTENT), |
129 new ShowMixedContentTask(this, handler)); | 129 new ShowMixedContentTask(this, handler)); |
130 } | 130 } |
131 | 131 |
132 handler->StartRequest(filter_policy); | 132 handler->StartRequest(filter_policy); |
133 AddMixedContentWarningToConsole(handler); | 133 AddMixedContentWarningToConsole(handler); |
134 } | 134 } |
135 | 135 |
| 136 void SSLPolicy::DidDisplayInsecureContent(NavigationEntry* entry) { |
| 137 if (!entry) |
| 138 return; |
| 139 |
| 140 // TODO(abarth): We don't actually need to break the whole origin here, |
| 141 // but we can handle that in a later patch. |
| 142 AllowMixedContentForOrigin(entry->url().spec()); |
| 143 } |
| 144 |
| 145 void SSLPolicy::DidRunInsecureContent(const std::string& security_origin) { |
| 146 AllowMixedContentForOrigin(security_origin); |
| 147 } |
| 148 |
136 void SSLPolicy::OnRequestStarted(SSLRequestInfo* info) { | 149 void SSLPolicy::OnRequestStarted(SSLRequestInfo* info) { |
137 if (net::IsCertStatusError(info->ssl_cert_status())) | 150 if (net::IsCertStatusError(info->ssl_cert_status())) |
138 UpdateStateForUnsafeContent(info); | 151 UpdateStateForUnsafeContent(info); |
139 | 152 |
140 if (IsMixedContent(info->url(), | 153 if (IsMixedContent(info->url(), |
141 info->resource_type(), | 154 info->resource_type(), |
142 info->filter_policy(), | 155 info->filter_policy(), |
143 info->frame_origin())) | 156 info->frame_origin())) |
144 UpdateStateForMixedContent(info); | 157 UpdateStateForMixedContent(info); |
145 } | 158 } |
(...skipping 213 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
359 // mark the main frame's origin as broken too. | 372 // mark the main frame's origin as broken too. |
360 MarkOriginAsBroken(info->main_frame_origin(), info->child_id()); | 373 MarkOriginAsBroken(info->main_frame_origin(), info->child_id()); |
361 } | 374 } |
362 } | 375 } |
363 | 376 |
364 void SSLPolicy::UpdateStateForUnsafeContent(SSLRequestInfo* info) { | 377 void SSLPolicy::UpdateStateForUnsafeContent(SSLRequestInfo* info) { |
365 // This request as a broken cert, which means its host is broken. | 378 // This request as a broken cert, which means its host is broken. |
366 backend_->MarkHostAsBroken(info->url().host(), info->child_id()); | 379 backend_->MarkHostAsBroken(info->url().host(), info->child_id()); |
367 UpdateStateForMixedContent(info); | 380 UpdateStateForMixedContent(info); |
368 } | 381 } |
OLD | NEW |