| Index: components/safe_browsing_db/database_manager.h
|
| diff --git a/components/safe_browsing_db/database_manager.h b/components/safe_browsing_db/database_manager.h
|
| index 4924cacb32503fd883bdb906f0c620691e6205af..7d1e7163a85e41276847a4fd1127bbb075d77563 100644
|
| --- a/components/safe_browsing_db/database_manager.h
|
| +++ b/components/safe_browsing_db/database_manager.h
|
| @@ -49,6 +49,11 @@ class SafeBrowsingDatabaseManager
|
| // Called when the result of checking the API blacklist is known.
|
| virtual void OnCheckApiBlacklistUrlResult(const GURL& url,
|
| const std::string& metadata) {}
|
| +
|
| + // Called when the result of checking the resource blacklist is known.
|
| + virtual void OnCheckResourceUrlResult(const GURL& url,
|
| + SBThreatType threat_type,
|
| + const std::string& threat_hash) {}
|
| };
|
|
|
|
|
| @@ -90,6 +95,11 @@ class SafeBrowsingDatabaseManager
|
| virtual bool CheckExtensionIDs(const std::set<std::string>& extension_ids,
|
| Client* client) = 0;
|
|
|
| + // Check if |url| is in the resources blacklist. Returns true if not, false
|
| + // if further checks need to be made in which case the result will be passed
|
| + // to callback in |client|.
|
| + virtual bool CheckResourceUrl(const GURL& url, Client* client) = 0;
|
| +
|
| // Check if the |url| matches any of the full-length hashes from the client-
|
| // side phishing detection whitelist. Returns true if there was a match and
|
| // false otherwise. To make sure we are conservative we will return true if
|
|
|