Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(324)

Side by Side Diff: chrome/browser/ui/webui/interstitials/interstitial_ui.cc

Issue 1420053005: Move code in components/safe_browsing_db and chrome/browser/s_b/ under the safe_browsing namespace. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@02_components_move
Patch Set: Remove '// namespace safe_browsing' for a small fwd decl block. Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ui/webui/interstitials/interstitial_ui.h" 5 #include "chrome/browser/ui/webui/interstitials/interstitial_ui.h"
6 6
7 #include "base/strings/string_number_conversions.h" 7 #include "base/strings/string_number_conversions.h"
8 #include "base/strings/string_util.h" 8 #include "base/strings/string_util.h"
9 #include "chrome/browser/browser_process.h" 9 #include "chrome/browser/browser_process.h"
10 #include "chrome/browser/profiles/profile.h" 10 #include "chrome/browser/profiles/profile.h"
(...skipping 156 matching lines...) Expand 10 before | Expand all | Expand 10 after
167 int options_mask = 0; 167 int options_mask = 0;
168 if (overridable) 168 if (overridable)
169 options_mask |= SSLBlockingPage::OVERRIDABLE; 169 options_mask |= SSLBlockingPage::OVERRIDABLE;
170 if (strict_enforcement) 170 if (strict_enforcement)
171 options_mask |= SSLBlockingPage::STRICT_ENFORCEMENT; 171 options_mask |= SSLBlockingPage::STRICT_ENFORCEMENT;
172 return new BadClockBlockingPage(web_contents, cert_error, ssl_info, 172 return new BadClockBlockingPage(web_contents, cert_error, ssl_info,
173 request_url, time_triggered_, nullptr, 173 request_url, time_triggered_, nullptr,
174 base::Callback<void(bool)>()); 174 base::Callback<void(bool)>());
175 } 175 }
176 176
177 SafeBrowsingBlockingPage* CreateSafeBrowsingBlockingPage( 177 safe_browsing::SafeBrowsingBlockingPage* CreateSafeBrowsingBlockingPage(
178 content::WebContents* web_contents) { 178 content::WebContents* web_contents) {
179 SBThreatType threat_type = SB_THREAT_TYPE_URL_MALWARE; 179 safe_browsing::SBThreatType threat_type =
180 safe_browsing::SB_THREAT_TYPE_URL_MALWARE;
180 GURL request_url("http://example.com"); 181 GURL request_url("http://example.com");
181 std::string url_param; 182 std::string url_param;
182 if (net::GetValueForKeyInQuery(web_contents->GetURL(), 183 if (net::GetValueForKeyInQuery(web_contents->GetURL(),
183 "url", 184 "url",
184 &url_param)) { 185 &url_param)) {
185 if (GURL(url_param).is_valid()) 186 if (GURL(url_param).is_valid())
186 request_url = GURL(url_param); 187 request_url = GURL(url_param);
187 } 188 }
188 std::string type_param; 189 std::string type_param;
189 if (net::GetValueForKeyInQuery(web_contents->GetURL(), 190 if (net::GetValueForKeyInQuery(web_contents->GetURL(),
190 "type", 191 "type",
191 &type_param)) { 192 &type_param)) {
192 if (type_param == "malware") { 193 if (type_param == "malware") {
193 threat_type = SB_THREAT_TYPE_URL_MALWARE; 194 threat_type = safe_browsing::SB_THREAT_TYPE_URL_MALWARE;
194 } else if (type_param == "phishing") { 195 } else if (type_param == "phishing") {
195 threat_type = SB_THREAT_TYPE_URL_PHISHING; 196 threat_type = safe_browsing::SB_THREAT_TYPE_URL_PHISHING;
196 } else if (type_param == "clientside_malware") { 197 } else if (type_param == "clientside_malware") {
197 threat_type = SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL; 198 threat_type = safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL;
198 } else if (type_param == "clientside_phishing") { 199 } else if (type_param == "clientside_phishing") {
199 threat_type = SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL; 200 threat_type = safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL;
200 // Interstitials for client side phishing urls load after the page loads 201 // Interstitials for client side phishing urls load after the page loads
201 // (see SafeBrowsingBlockingPage::IsMainPageLoadBlocked), so there should 202 // (see SafeBrowsingBlockingPage::IsMainPageLoadBlocked), so there should
202 // either be a new navigation entry, or there shouldn't be any pending 203 // either be a new navigation entry, or there shouldn't be any pending
203 // entries. Clear any pending navigation entries. 204 // entries. Clear any pending navigation entries.
204 content::NavigationController* controller = 205 content::NavigationController* controller =
205 &web_contents->GetController(); 206 &web_contents->GetController();
206 controller->DiscardNonCommittedEntries(); 207 controller->DiscardNonCommittedEntries();
207 } 208 }
208 } 209 }
209 SafeBrowsingBlockingPage::UnsafeResource resource; 210 safe_browsing::SafeBrowsingBlockingPage::UnsafeResource resource;
210 resource.url = request_url; 211 resource.url = request_url;
211 resource.threat_type = threat_type; 212 resource.threat_type = threat_type;
212 // Create a blocking page without showing the interstitial. 213 // Create a blocking page without showing the interstitial.
213 return SafeBrowsingBlockingPage::CreateBlockingPage( 214 return safe_browsing::SafeBrowsingBlockingPage::CreateBlockingPage(
214 g_browser_process->safe_browsing_service()->ui_manager().get(), 215 g_browser_process->safe_browsing_service()->ui_manager().get(),
215 web_contents, 216 web_contents,
216 resource); 217 resource);
217 } 218 }
218 219
219 #if defined(ENABLE_CAPTIVE_PORTAL_DETECTION) 220 #if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
220 CaptivePortalBlockingPage* CreateCaptivePortalBlockingPage( 221 CaptivePortalBlockingPage* CreateCaptivePortalBlockingPage(
221 content::WebContents* web_contents) { 222 content::WebContents* web_contents) {
222 bool is_wifi_connection = false; 223 bool is_wifi_connection = false;
223 GURL landing_url("https://captive.portal/login"); 224 GURL landing_url("https://captive.portal/login");
(...skipping 98 matching lines...) Expand 10 before | Expand all | Expand 10 after
322 html = interstitial_delegate.get()->GetHTMLContents(); 323 html = interstitial_delegate.get()->GetHTMLContents();
323 } else { 324 } else {
324 html = ResourceBundle::GetSharedInstance() 325 html = ResourceBundle::GetSharedInstance()
325 .GetRawDataResource(IDR_SECURITY_INTERSTITIAL_UI_HTML) 326 .GetRawDataResource(IDR_SECURITY_INTERSTITIAL_UI_HTML)
326 .as_string(); 327 .as_string();
327 } 328 }
328 scoped_refptr<base::RefCountedString> html_bytes = new base::RefCountedString; 329 scoped_refptr<base::RefCountedString> html_bytes = new base::RefCountedString;
329 html_bytes->data().assign(html.begin(), html.end()); 330 html_bytes->data().assign(html.begin(), html.end());
330 callback.Run(html_bytes.get()); 331 callback.Run(html_bytes.get());
331 } 332 }
OLDNEW
« no previous file with comments | « chrome/browser/ui/views/download/download_item_view_md.cc ('k') | chrome/test/base/testing_browser_process.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698