Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3088)

Unified Diff: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc

Issue 4175003: Re-design the malware interstitial page. The change is mostly about: make the... (Closed) Base URL: http://src.chromium.org/svn/trunk/src/
Patch Set: '' Created 10 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/browser/resources/safe_browsing_malware_block.html ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
===================================================================
--- chrome/browser/safe_browsing/safe_browsing_blocking_page.cc (revision 63911)
+++ chrome/browser/safe_browsing/safe_browsing_blocking_page.cc (working copy)
@@ -44,7 +44,7 @@
static const char* const kSbReportPhishingUrl =
"http://www.google.com/safebrowsing/report_error/";
-// URL for the "Learn more" link on the malware blocking page.
+// URL for the "Learn more" link on the multi threat malware blocking page.
static const char* const kLearnMoreMalwareUrl =
"http://www.google.com/support/bin/answer.py?answer=45449&topic=360"
"&sa=X&oi=malwarewarninglink&resnum=1&ct=help";
@@ -54,9 +54,13 @@
"http://www.google.com/support/bin/answer.py?answer=106318";
static const wchar_t* const kSbDiagnosticHtml =
- L"<a href=\"\" onClick=\"sendCommand('showDiagnostic'); return false;\" "
- L"onMouseDown=\"return false;\">%ls</a>";
+ L"<a href=\"\" onclick=\"sendCommand('showDiagnostic'); return false;\" "
+ L"onmousedown=\"return false;\">%ls</a>";
+static const wchar_t* const kPLinkHtml =
+ L"<a href=\"\" onclick=\"sendCommand('proceed'); return false;\" "
+ L"onmousedown=\"return false;\">%ls</a>";
+
// The commands returned by the page when the user performs an action.
static const char* const kShowDiagnosticCommand = "showDiagnostic";
static const char* const kReportErrorCommand = "reportError";
@@ -209,7 +213,7 @@
l10n_util::GetStringF(IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION1,
UTF8ToWide(tab()->GetURL().host())),
l10n_util::GetString(IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION2),
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3));
+ l10n_util::GetString(IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION3));
} else {
// Just phishing.
PopulateStringDictionary(
@@ -222,9 +226,11 @@
}
strings->SetString("confirm_text",
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE));
+ l10n_util::GetStringUTF16(
+ IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION_AGREE));
strings->SetString("continue_button",
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON));
+ l10n_util::GetStringUTF16(
+ IDS_SAFE_BROWSING_MULTI_MALWARE_PROCEED_BUTTON));
strings->SetString("back_button",
l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON));
strings->SetString("textdirection", base::i18n::IsRTL() ? "rtl" : "ltr");
@@ -232,41 +238,50 @@
void SafeBrowsingBlockingPage::PopulateMalwareStringDictionary(
DictionaryValue* strings) {
- std::wstring link = StringPrintf(kSbDiagnosticHtml,
+ std::wstring diagnostic_link = StringPrintf(kSbDiagnosticHtml,
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE).c_str());
strings->SetString("badURL", url().host());
// Check to see if we're blocking the main page, or a sub-resource on the
// main page.
- std::wstring description1, description2;
+ std::wstring description1, description3, description5;
if (is_main_frame_) {
description1 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION1,
UTF8ToWide(url().host()));
- description2 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION2,
- link,
- UTF8ToWide(url().host()));
} else {
description1 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION4,
UTF8ToWide(tab()->GetURL().host()),
UTF8ToWide(url().host()));
- description2 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION5,
- link,
- UTF8ToWide(url().host()));
}
+ std::wstring proceed_link = StringPrintf(kPLinkHtml,
+ l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_PROCEED_LINK).c_str());
+ description3 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3,
+ proceed_link);
+
PopulateStringDictionary(
strings,
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_TITLE),
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_HEADLINE),
- description1, description2,
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3));
+ description1,
+ l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION2),
+ description3);
- strings->SetString("confirm_text",
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE));
- strings->SetString("continue_button",
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON));
+ description5 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION5,
+ UTF8ToWide(url().host()),
+ UTF8ToWide(url().host()),
+ diagnostic_link);
+
+ strings->SetString("description5", WideToUTF16Hack(description5));
+
strings->SetString("back_button",
l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON));
+ strings->SetString("more_info_button",
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_MORE_INFO_BUTTON));
+ strings->SetString("less_info_button",
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_LESS_INFO_BUTTON));
+ strings->SetString("proceed_link",
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_LINK));
strings->SetString("textdirection", base::i18n::IsRTL() ? "rtl" : "ltr");
}
« no previous file with comments | « chrome/browser/resources/safe_browsing_malware_block.html ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698