Index: chrome/browser/safe_browsing/unverified_download_policy.cc |
diff --git a/chrome/browser/safe_browsing/unverified_download_policy.cc b/chrome/browser/safe_browsing/unverified_download_policy.cc |
index f13752b67ecca8ad92833840015ff697258246a0..a7ce65262241cd699bd605707a052ed654a1ef4f 100644 |
--- a/chrome/browser/safe_browsing/unverified_download_policy.cc |
+++ b/chrome/browser/safe_browsing/unverified_download_policy.cc |
@@ -60,23 +60,38 @@ void RespondWithPolicy( |
uma_file_type, requestor); |
} |
BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, |
- base::Bind(callback, policy)); |
+ base::Bind(callback, policy)); |
} |
void CheckFieldTrialOnAnyThread( |
const base::FilePath& file, |
+ const std::vector<base::FilePath::StringType>& alternate_extensions, |
const GURL& requestor, |
const UnverifiedDownloadCheckCompletionCallback& callback) { |
- bool is_allowed = IsUnverifiedDownloadAllowedByFieldTrial(file); |
- RespondWithPolicy(file, callback, requestor, is_allowed |
- ? UnverifiedDownloadPolicy::ALLOWED |
- : UnverifiedDownloadPolicy::DISALLOWED); |
+ if (!IsUnverifiedDownloadAllowedByFieldTrial(file)) { |
+ RespondWithPolicy(file, callback, requestor, |
+ UnverifiedDownloadPolicy::DISALLOWED); |
+ return; |
+ } |
+ |
+ for (const auto& extension : alternate_extensions) { |
+ base::FilePath alternate_filename = file.AddExtension(extension); |
+ if (!IsUnverifiedDownloadAllowedByFieldTrial(alternate_filename)) { |
+ RespondWithPolicy(alternate_filename, callback, requestor, |
+ UnverifiedDownloadPolicy::DISALLOWED); |
+ return; |
+ } |
+ } |
+ |
+ RespondWithPolicy(file, callback, requestor, |
+ UnverifiedDownloadPolicy::ALLOWED); |
} |
void CheckWhitelistOnIOThread( |
scoped_refptr<SafeBrowsingService> service, |
const GURL& requestor, |
const base::FilePath& file, |
+ const std::vector<base::FilePath::StringType>& alternate_extensions, |
const UnverifiedDownloadCheckCompletionCallback& callback) { |
DCHECK_CURRENTLY_ON(BrowserThread::IO); |
int uma_file_type = |
@@ -104,7 +119,7 @@ void CheckWhitelistOnIOThread( |
return; |
} |
- CheckFieldTrialOnAnyThread(file, requestor, callback); |
+ CheckFieldTrialOnAnyThread(file, alternate_extensions, requestor, callback); |
} |
} // namespace |
@@ -112,18 +127,22 @@ void CheckWhitelistOnIOThread( |
void CheckUnverifiedDownloadPolicy( |
const GURL& requestor, |
const base::FilePath& file, |
+ const std::vector<base::FilePath::StringType>& alternate_extensions, |
const UnverifiedDownloadCheckCompletionCallback& callback) { |
+ UMA_HISTOGRAM_SPARSE_SLOWLY( |
+ "SafeBrowsing.UnverifiedDownloads.AlternateExtensionCount", |
+ alternate_extensions.size()); |
Steven Holte
2016/01/25 18:57:29
Is there a hard limit somewhere on how large this
asanka
2016/01/25 19:53:42
Done. I added a limit of 16.
|
if (requestor.is_valid()) { |
scoped_refptr<SafeBrowsingService> service = |
g_browser_process->safe_browsing_service(); |
BrowserThread::PostTask( |
BrowserThread::IO, FROM_HERE, |
base::Bind(&CheckWhitelistOnIOThread, service, requestor, file, |
- callback)); |
+ alternate_extensions, callback)); |
return; |
} |
- CheckFieldTrialOnAnyThread(file, GURL(), callback); |
+ CheckFieldTrialOnAnyThread(file, alternate_extensions, GURL(), callback); |
} |
} // namespace safe_browsing |