Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(322)

Side by Side Diff: chrome/browser/safe_browsing/malware_details.cc

Issue 6208003: Add a Node message in the malware details protocol buffer. This allows us to ... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: '' Created 9 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 // Implementation of the MalwareDetails class. 5 // Implementation of the MalwareDetails class.
6 6
7 #include "chrome/browser/safe_browsing/malware_details.h" 7 #include "chrome/browser/safe_browsing/malware_details.h"
8 8
9 #include "chrome/browser/safe_browsing/safe_browsing_service.h" 9 #include "chrome/browser/safe_browsing/safe_browsing_service.h"
10 #include "chrome/browser/tab_contents/navigation_entry.h" 10 #include "chrome/browser/tab_contents/navigation_entry.h"
11 #include "chrome/browser/tab_contents/tab_contents.h" 11 #include "chrome/browser/tab_contents/tab_contents.h"
12 #include "chrome/browser/safe_browsing/report.pb.h" 12 #include "chrome/browser/safe_browsing/report.pb.h"
13 13
14 using safe_browsing::ClientMalwareReportRequest;
15
14 // Create a MalwareDetails for the given tab. Runs in the UI thread. 16 // Create a MalwareDetails for the given tab. Runs in the UI thread.
15 MalwareDetails::MalwareDetails( 17 MalwareDetails::MalwareDetails(
16 TabContents* tab_contents, 18 TabContents* tab_contents,
17 const SafeBrowsingService::UnsafeResource resource) 19 const SafeBrowsingService::UnsafeResource resource)
18 : tab_contents_(tab_contents), 20 : tab_contents_(tab_contents),
19 resource_(resource) { 21 resource_(resource) {
20 StartCollection(); 22 StartCollection();
21 } 23 }
22 24
23 MalwareDetails::~MalwareDetails() {} 25 MalwareDetails::~MalwareDetails() {}
24 26
25 bool MalwareDetails::IsPublicUrl(const GURL& url) const { 27 bool MalwareDetails::IsPublicUrl(const GURL& url) const {
26 return url.SchemeIs("http"); // TODO(panayiotis): also skip internal urls. 28 return url.SchemeIs("http"); // TODO(panayiotis): also skip internal urls.
27 } 29 }
28 30
29 void MalwareDetails::AddNode(const std::string& url, 31 // Looks for a Resource for the given url in resources_. If found, it
32 // updates |resource|. Otherwise, it creates a new message, adds it to
33 // resources_ and updates |resource| to point to it.
34 ClientMalwareReportRequest::Resource* MalwareDetails::FindOrCreateResource(
35 const std::string& url) {
36 ResourceMap::iterator it = resources_.find(url);
37 if (it != resources_.end()) {
38 return it->second.get();
39 }
40
41 // Create the resource for |url|.
42 int id = resources_.size();
43 linked_ptr<ClientMalwareReportRequest::Resource> new_resource(
44 new ClientMalwareReportRequest::Resource());
45 new_resource->set_url(url);
46 new_resource->set_id(id);
47 resources_[url] = new_resource;
48 return new_resource.get();
49 }
50
51 void MalwareDetails::AddUrl(const std::string& url,
30 const std::string& parent) { 52 const std::string& parent) {
31 if (!IsPublicUrl(GURL(url))) 53 if (!IsPublicUrl(GURL(url)))
32 return; 54 return;
33 linked_ptr<safe_browsing::ClientMalwareReportRequest::Resource> resource( 55
34 new safe_browsing::ClientMalwareReportRequest::Resource()); 56 // Find (or create) the resource for the url.
35 resource->set_url(url); 57 ClientMalwareReportRequest::Resource* url_resource =
36 if (!parent.empty() && IsPublicUrl(GURL(parent))) 58 FindOrCreateResource(url);
37 resource->set_parent(parent); 59 CHECK(url_resource != NULL);
lzheng 2011/01/13 20:18:33 nit: Do you still feel the CHECK here and below is
38 urls_[url] = resource; 60
61 if (!parent.empty() && IsPublicUrl(GURL(parent))) {
62 // Add the resource for the parent.
63 ClientMalwareReportRequest::Resource* parent_resource =
64 FindOrCreateResource(parent);
65 CHECK(parent_resource != NULL);
66
67 // Update the parent-child relation
68 url_resource->set_parent_id(parent_resource->id());
69 }
39 } 70 }
40 71
41 void MalwareDetails::StartCollection() { 72 void MalwareDetails::StartCollection() {
42 DVLOG(1) << "Starting to compute malware details."; 73 DVLOG(1) << "Starting to compute malware details.";
43 report_.reset(new safe_browsing::ClientMalwareReportRequest()); 74 report_.reset(new ClientMalwareReportRequest());
44 75
45 if (IsPublicUrl(resource_.url)) { 76 if (IsPublicUrl(resource_.url)) {
46 report_->set_malware_url(resource_.url.spec()); 77 report_->set_malware_url(resource_.url.spec());
47 } 78 }
48 79
49 GURL page_url = tab_contents_->GetURL(); 80 GURL page_url = tab_contents_->GetURL();
50 if (IsPublicUrl(page_url)) { 81 if (IsPublicUrl(page_url)) {
51 report_->set_page_url(page_url.spec()); 82 report_->set_page_url(page_url.spec());
52 } 83 }
53 84
54 GURL referrer_url; 85 GURL referrer_url;
55 NavigationEntry* nav_entry = tab_contents_->controller().GetActiveEntry(); 86 NavigationEntry* nav_entry = tab_contents_->controller().GetActiveEntry();
56 if (nav_entry) { 87 if (nav_entry) {
57 referrer_url = nav_entry->referrer(); 88 referrer_url = nav_entry->referrer();
58 if (IsPublicUrl(referrer_url)) { 89 if (IsPublicUrl(referrer_url)) {
59 report_->set_referrer_url(referrer_url.spec()); 90 report_->set_referrer_url(referrer_url.spec());
60 } 91 }
61 } 92 }
62 93
63 // Add the nodes, starting from the page url. 94 // Add the nodes, starting from the page url.
64 AddNode(page_url.spec(), ""); 95 AddUrl(page_url.spec(), "");
65 96
66 // Add the resource_url and its original url, if non-empty and different. 97 // Add the resource_url and its original url, if non-empty and different.
67 if (!resource_.original_url.spec().empty() && 98 if (!resource_.original_url.spec().empty() &&
68 resource_.url != resource_.original_url) { 99 resource_.url != resource_.original_url) {
69 // Add original_url, as the parent of resource_url. 100 // Add original_url, as the parent of resource_url.
70 AddNode(resource_.original_url.spec(), ""); 101 AddUrl(resource_.original_url.spec(), "");
71 AddNode(resource_.url.spec(), resource_.original_url.spec()); 102 AddUrl(resource_.url.spec(), resource_.original_url.spec());
72 } else { 103 } else {
73 AddNode(resource_.url.spec(), ""); 104 AddUrl(resource_.url.spec(), "");
74 } 105 }
75 106
76 // Add the referrer url. 107 // Add the referrer url.
77 if (nav_entry && !referrer_url.spec().empty()) { 108 if (nav_entry && !referrer_url.spec().empty()) {
78 AddNode(referrer_url.spec(), ""); 109 AddUrl(referrer_url.spec(), "");
79 } 110 }
80 111
81 // Add all the urls in our |urls_| map to the |report_| protobuf. 112 // The |report_| protocol buffer is now generated: We add all the
82 for (ResourceMap::const_iterator it = urls_.begin(); 113 // urls in our |resources_| maps.
83 it != urls_.end(); it++) { 114 for (ResourceMap::const_iterator it = resources_.begin();
84 safe_browsing::ClientMalwareReportRequest::Resource* pb_resource = 115 it != resources_.end(); it++) {
85 report_->add_nodes(); 116 ClientMalwareReportRequest::Resource* pb_resource =
117 report_->add_resources();
86 pb_resource->CopyFrom(*(it->second)); 118 pb_resource->CopyFrom(*(it->second));
87 } 119 }
88 } 120 }
89 121
90 // Called from the SB Service on the IO thread. 122 // Called from the SB Service on the IO thread.
91 const std::string* MalwareDetails::GetSerializedReport() { 123 const std::string* MalwareDetails::GetSerializedReport() {
92 scoped_ptr<std::string> request_data(new std::string()); 124 scoped_ptr<std::string> request_data(new std::string());
93 if (!report_->SerializeToString(request_data.get())) { 125 if (!report_->SerializeToString(request_data.get())) {
94 DLOG(ERROR) << "Unable to serialize the malware report."; 126 DLOG(ERROR) << "Unable to serialize the malware report.";
95 } 127 }
96 128
97 return request_data.release(); 129 return request_data.release();
98 } 130 }
OLDNEW
« no previous file with comments | « chrome/browser/safe_browsing/malware_details.h ('k') | chrome/browser/safe_browsing/malware_details_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698