OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 // |
| 5 |
| 6 #include "chrome/browser/safe_browsing/android_safe_browsing_api_handler.h" |
| 7 |
| 8 #include <string> |
| 9 |
| 10 #include "base/android/jni_android.h" |
| 11 #include "base/memory/scoped_ptr.h" |
| 12 #include "chrome/browser/safe_browsing/safe_browsing_util.h" |
| 13 #include "content/public/browser/browser_thread.h" |
| 14 // TODO(nparker): Include JNI-generated file |
| 15 |
| 16 using content::BrowserThread; |
| 17 |
| 18 AndroidSafeBrowsingAPIHandler::AndroidSafeBrowsingAPIHandler() { |
| 19 j_context_ = base::android::GetApplicationContext(); |
| 20 DCHECK(j_context_); |
| 21 |
| 22 // TODO(nparker): Fetch API key pertaining to Chrome. |
| 23 api_key_ = "<todo-get-appropriate-api-key>"; |
| 24 } |
| 25 |
| 26 bool AndroidSafeBrowsingAPIHandler::StartURLCheck( |
| 27 const URLCheckCallback& callback, |
| 28 const GURL& url, |
| 29 const std::vector<SBThreatType>& threat_types) { |
| 30 DCHECK_CURRENTLY_ON(BrowserThread::IO); |
| 31 |
| 32 // Make copy of the callback to add a ref to it. OnURLCheckDone() |
| 33 // will delete this ptr, thus releasing the internal ref. |
| 34 URLCheckCallback* callback_ptr = new URLCheckCallback(callback); |
| 35 intptr_t callback_id_int = reinterpret_cast<intptr_t>(callback_ptr); |
| 36 jlong callback_id = static_cast<jlong>(callback_id_int); |
| 37 |
| 38 // TODO(nparker): Reduce logging before launch of this feature. |
| 39 VLOG(1) << "Starting check " << callback_id << " for URL " << url; |
| 40 |
| 41 // TODO(nparker): Implement this. |
| 42 // Convert threat types to API's enums. |
| 43 // Call JNI method. |
| 44 |
| 45 // Until we have the Java implementation, just invoke the callback in 500ms |
| 46 // for testing. |
| 47 return BrowserThread::PostDelayedTask( |
| 48 BrowserThread::IO, FROM_HERE, |
| 49 base::Bind(&OnURLCheckDone, callback_id, true, jstring()), |
| 50 base::TimeDelta::FromMilliseconds(500)); |
| 51 } |
| 52 |
| 53 // Static. |
| 54 void AndroidSafeBrowsingAPIHandler::OnURLCheckDone(jlong callback_id, |
| 55 jboolean isSuccessful, |
| 56 jstring metadata) { |
| 57 DCHECK_CURRENTLY_ON(BrowserThread::IO); |
| 58 if (!callback_id) { |
| 59 DCHECK(false) << "Bad callback_id"; |
| 60 return; |
| 61 } |
| 62 VLOG(1) << "URLCheckDone invoked for check " << callback_id; |
| 63 |
| 64 // Convert java long long int to c++ pointer, take ownership. |
| 65 scoped_ptr<URLCheckCallback> callback( |
| 66 reinterpret_cast<URLCheckCallback*>(callback_id)); |
| 67 |
| 68 // TODO(nparker): |
| 69 // 1) Convert metadata to binary proto of MalwarePatternType so |
| 70 // SafeBrowsingUIManager::DisplayBlockingPage() can unmarshal it. |
| 71 // 2) Pick the "worst" threat type from metadata and map to SBThreatType. |
| 72 |
| 73 callback->Run(SB_THREAT_TYPE_SAFE, std::string()); |
| 74 VLOG(1) << "Done with check " << callback_id; |
| 75 } |
OLD | NEW |