Index: chrome/browser/safe_browsing/safe_browsing_blocking_page.cc |
=================================================================== |
--- chrome/browser/safe_browsing/safe_browsing_blocking_page.cc (revision 63911) |
+++ chrome/browser/safe_browsing/safe_browsing_blocking_page.cc (working copy) |
@@ -44,7 +44,7 @@ |
static const char* const kSbReportPhishingUrl = |
"http://www.google.com/safebrowsing/report_error/"; |
-// URL for the "Learn more" link on the malware blocking page. |
+// URL for the "Learn more" link on the multi threat malware blocking page. |
static const char* const kLearnMoreMalwareUrl = |
"http://www.google.com/support/bin/answer.py?answer=45449&topic=360" |
"&sa=X&oi=malwarewarninglink&resnum=1&ct=help"; |
@@ -54,9 +54,13 @@ |
"http://www.google.com/support/bin/answer.py?answer=106318"; |
static const wchar_t* const kSbDiagnosticHtml = |
- L"<a href=\"\" onClick=\"sendCommand('showDiagnostic'); return false;\" " |
- L"onMouseDown=\"return false;\">%ls</a>"; |
+ L"<a href=\"\" onclick=\"sendCommand('showDiagnostic'); return false;\" " |
+ L"onmousedown=\"return false;\">%ls</a>"; |
+static const wchar_t* const kPLinkHtml = |
+ L"<a href=\"\" onclick=\"sendCommand('proceed'); return false;\" " |
+ L"onmousedown=\"return false;\">%ls</a>"; |
+ |
// The commands returned by the page when the user performs an action. |
static const char* const kShowDiagnosticCommand = "showDiagnostic"; |
static const char* const kReportErrorCommand = "reportError"; |
@@ -209,7 +213,7 @@ |
l10n_util::GetStringF(IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION1, |
UTF8ToWide(tab()->GetURL().host())), |
l10n_util::GetString(IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION2), |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3)); |
+ l10n_util::GetString(IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION3)); |
} else { |
// Just phishing. |
PopulateStringDictionary( |
@@ -222,9 +226,11 @@ |
} |
strings->SetString("confirm_text", |
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)); |
+ l10n_util::GetStringUTF16( |
+ IDS_SAFE_BROWSING_MULTI_MALWARE_DESCRIPTION_AGREE)); |
strings->SetString("continue_button", |
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)); |
+ l10n_util::GetStringUTF16( |
+ IDS_SAFE_BROWSING_MULTI_MALWARE_PROCEED_BUTTON)); |
strings->SetString("back_button", |
l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)); |
strings->SetString("textdirection", base::i18n::IsRTL() ? "rtl" : "ltr"); |
@@ -232,41 +238,50 @@ |
void SafeBrowsingBlockingPage::PopulateMalwareStringDictionary( |
DictionaryValue* strings) { |
- std::wstring link = StringPrintf(kSbDiagnosticHtml, |
+ std::wstring diagnostic_link = StringPrintf(kSbDiagnosticHtml, |
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DIAGNOSTIC_PAGE).c_str()); |
strings->SetString("badURL", url().host()); |
// Check to see if we're blocking the main page, or a sub-resource on the |
// main page. |
- std::wstring description1, description2; |
+ std::wstring description1, description3, description5; |
if (is_main_frame_) { |
description1 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION1, |
UTF8ToWide(url().host())); |
- description2 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION2, |
- link, |
- UTF8ToWide(url().host())); |
} else { |
description1 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION4, |
UTF8ToWide(tab()->GetURL().host()), |
UTF8ToWide(url().host())); |
- description2 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION5, |
- link, |
- UTF8ToWide(url().host())); |
} |
+ std::wstring proceed_link = StringPrintf(kPLinkHtml, |
+ l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_PROCEED_LINK).c_str()); |
+ description3 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3, |
+ proceed_link); |
+ |
PopulateStringDictionary( |
strings, |
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_TITLE), |
l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_HEADLINE), |
- description1, description2, |
- l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION3)); |
+ description1, |
+ l10n_util::GetString(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION2), |
+ description3); |
- strings->SetString("confirm_text", |
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION_AGREE)); |
- strings->SetString("continue_button", |
- l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_BUTTON)); |
+ description5 = l10n_util::GetStringF(IDS_SAFE_BROWSING_MALWARE_DESCRIPTION5, |
+ UTF8ToWide(url().host()), |
+ UTF8ToWide(url().host()), |
+ diagnostic_link); |
+ |
+ strings->SetString("description5", WideToUTF16Hack(description5)); |
+ |
strings->SetString("back_button", |
l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_BACK_BUTTON)); |
+ strings->SetString("more_info_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_MORE_INFO_BUTTON)); |
+ strings->SetString("less_info_button", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_LESS_INFO_BUTTON)); |
+ strings->SetString("proceed_link", |
+ l10n_util::GetStringUTF16(IDS_SAFE_BROWSING_MALWARE_PROCEED_LINK)); |
strings->SetString("textdirection", base::i18n::IsRTL() ? "rtl" : "ltr"); |
} |