Chromium Code Reviews| Index: chrome/browser/safe_browsing/download_protection_service.cc |
| diff --git a/chrome/browser/safe_browsing/download_protection_service.cc b/chrome/browser/safe_browsing/download_protection_service.cc |
| index 2381394d23b89fff2dd471b930f8ddf92471a992..2f2414bdd3a17d82b23dde44241f6d5392e48bcc 100644 |
| --- a/chrome/browser/safe_browsing/download_protection_service.cc |
| +++ b/chrome/browser/safe_browsing/download_protection_service.cc |
| @@ -471,37 +471,44 @@ class DownloadProtectionService::CheckClientDownloadRequest |
| // Ignore the verdict because we were just reporting a sampled file. |
| reason = REASON_SAMPLED_UNSUPPORTED_FILE; |
| result = UNKNOWN; |
| - } else if (response.verdict() == ClientDownloadResponse::SAFE) { |
| - reason = REASON_DOWNLOAD_SAFE; |
| - result = SAFE; |
| - } else if (service_ && !service_->IsSupportedDownload( |
| - *item_, item_->GetTargetFilePath())) { |
| - // TODO(nparker): Remove this check since it should be impossible. |
| - reason = REASON_DOWNLOAD_NOT_SUPPORTED; |
| - result = UNKNOWN; |
| - } else if (response.verdict() == ClientDownloadResponse::DANGEROUS) { |
| - reason = REASON_DOWNLOAD_DANGEROUS; |
| - result = DANGEROUS; |
| - token = response.token(); |
| - } else if (response.verdict() == ClientDownloadResponse::UNCOMMON) { |
| - reason = REASON_DOWNLOAD_UNCOMMON; |
| - result = UNCOMMON; |
| - token = response.token(); |
| - } else if (response.verdict() == ClientDownloadResponse::DANGEROUS_HOST) { |
| - reason = REASON_DOWNLOAD_DANGEROUS_HOST; |
| - result = DANGEROUS_HOST; |
| - token = response.token(); |
| - } else if ( |
| - response.verdict() == ClientDownloadResponse::POTENTIALLY_UNWANTED) { |
| - reason = REASON_DOWNLOAD_POTENTIALLY_UNWANTED; |
| - result = POTENTIALLY_UNWANTED; |
| - token = response.token(); |
| } else { |
| - LOG(DFATAL) << "Unknown download response verdict: " |
| - << response.verdict(); |
| - reason = REASON_INVALID_RESPONSE_VERDICT; |
| - result = UNKNOWN; |
| + switch (response.verdict()) { |
| + case ClientDownloadResponse::SAFE: |
| + reason = REASON_DOWNLOAD_SAFE; |
| + result = SAFE; |
| + break; |
| + case ClientDownloadResponse::DANGEROUS: |
| + reason = REASON_DOWNLOAD_DANGEROUS; |
| + result = DANGEROUS; |
| + token = response.token(); |
| + break; |
| + case ClientDownloadResponse::UNCOMMON: |
| + reason = REASON_DOWNLOAD_UNCOMMON; |
| + result = UNCOMMON; |
| + token = response.token(); |
| + break; |
| + case ClientDownloadResponse::DANGEROUS_HOST: |
| + reason = REASON_DOWNLOAD_DANGEROUS_HOST; |
| + result = DANGEROUS_HOST; |
| + token = response.token(); |
| + break; |
| + case ClientDownloadResponse::POTENTIALLY_UNWANTED: |
| + reason = REASON_DOWNLOAD_POTENTIALLY_UNWANTED; |
| + result = POTENTIALLY_UNWANTED; |
| + token = response.token(); |
| + break; |
| + case ClientDownloadResponse::UNKNOWN: |
| + reason = REASON_VERDICT_UNKNOWN; |
| + result = UNKNOWN; |
| + break; |
| + default: |
|
asanka
2016/07/07 20:46:59
Nit: Shall we go the route of eliminating the defa
Nathan Parker
2016/07/07 21:02:55
I don't think it'd fail to parse... hence I'm catc
asanka
2016/07/07 21:15:11
Ah. TIL. Acknowledged.
Nathan Parker
2016/07/11 20:26:22
Apparently I was wrong. The old code apparently c
|
| + LOG(DFATAL) << "Unknown download response verdict: " |
| + << response.verdict(); |
| + reason = REASON_INVALID_RESPONSE_VERDICT; |
| + result = UNKNOWN; |
| + } |
| } |
| + |
| if (!token.empty()) |
| SetDownloadPingToken(item_, token); |
| @@ -1394,6 +1401,8 @@ class DownloadProtectionService::PPAPIDownloadRequest |
| return DANGEROUS; |
| case ClientDownloadResponse::DANGEROUS_HOST: |
| return DANGEROUS_HOST; |
| + case ClientDownloadResponse::UNKNOWN: |
| + return UNKNOWN; |
| } |
| return UNKNOWN; |
| } |