OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/renderer_host/safe_browsing_resource_throttle.h" | 5 #include "chrome/browser/renderer_host/safe_browsing_resource_throttle.h" |
6 | 6 |
7 #include "base/logging.h" | 7 #include "base/logging.h" |
8 #include "chrome/browser/browser_process.h" | 8 #include "chrome/browser/browser_process.h" |
9 #include "chrome/browser/prerender/prerender_contents.h" | 9 #include "chrome/browser/prerender/prerender_contents.h" |
10 #include "chrome/browser/safe_browsing/safe_browsing_service.h" | 10 #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
(...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
84 // the URL has been classified. | 84 // the URL has been classified. |
85 void SafeBrowsingResourceThrottle::OnCheckBrowseUrlResult( | 85 void SafeBrowsingResourceThrottle::OnCheckBrowseUrlResult( |
86 const GURL& url, | 86 const GURL& url, |
87 SBThreatType threat_type, | 87 SBThreatType threat_type, |
88 const std::string& metadata) { | 88 const std::string& metadata) { |
89 CHECK(state_ == STATE_CHECKING_URL); | 89 CHECK(state_ == STATE_CHECKING_URL); |
90 CHECK(defer_state_ != DEFERRED_NONE); | 90 CHECK(defer_state_ != DEFERRED_NONE); |
91 CHECK(url == url_being_checked_) << "Was expecting: " << url_being_checked_ | 91 CHECK(url == url_being_checked_) << "Was expecting: " << url_being_checked_ |
92 << " but got: " << url; | 92 << " but got: " << url; |
93 | 93 |
94 #if defined(OS_ANDROID) | |
95 // Temporarily disable SB interstitial during Finch experiment. | |
96 // The database check is still exercised, but the interstitial never shown. | |
97 threat_type = SB_THREAT_TYPE_SAFE; | |
98 #endif | |
Nico
2015/05/13 00:07:23
Same question
Nathan Parker
2015/05/13 00:11:23
Acknowledged.
| |
99 | |
100 timer_.Stop(); // Cancel the timeout timer. | 94 timer_.Stop(); // Cancel the timeout timer. |
101 threat_type_ = threat_type; | 95 threat_type_ = threat_type; |
102 state_ = STATE_NONE; | 96 state_ = STATE_NONE; |
103 | 97 |
104 if (threat_type == SB_THREAT_TYPE_SAFE) { | 98 if (threat_type == SB_THREAT_TYPE_SAFE) { |
105 // Log how much time the safe browsing check cost us. | 99 // Log how much time the safe browsing check cost us. |
106 ui_manager_->LogPauseDelay(base::TimeTicks::Now() - url_check_start_time_); | 100 ui_manager_->LogPauseDelay(base::TimeTicks::Now() - url_check_start_time_); |
107 | 101 |
108 // Continue the request. | 102 // Continue the request. |
109 ResumeRequest(); | 103 ResumeRequest(); |
(...skipping 114 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
224 url_being_checked_, SB_THREAT_TYPE_SAFE, std::string()); | 218 url_being_checked_, SB_THREAT_TYPE_SAFE, std::string()); |
225 } | 219 } |
226 | 220 |
227 void SafeBrowsingResourceThrottle::ResumeRequest() { | 221 void SafeBrowsingResourceThrottle::ResumeRequest() { |
228 CHECK(state_ == STATE_NONE); | 222 CHECK(state_ == STATE_NONE); |
229 CHECK(defer_state_ != DEFERRED_NONE); | 223 CHECK(defer_state_ != DEFERRED_NONE); |
230 | 224 |
231 defer_state_ = DEFERRED_NONE; | 225 defer_state_ = DEFERRED_NONE; |
232 controller()->Resume(); | 226 controller()->Resume(); |
233 } | 227 } |
OLD | NEW |