| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CHROME_BROWSER_SAFE_BROWSING_PERMISSION_REPORTER_H_ | 5 #ifndef CHROME_BROWSER_SAFE_BROWSING_PERMISSION_REPORTER_H_ |
| 6 #define CHROME_BROWSER_SAFE_BROWSING_PERMISSION_REPORTER_H_ | 6 #define CHROME_BROWSER_SAFE_BROWSING_PERMISSION_REPORTER_H_ |
| 7 | 7 |
| 8 #include <queue> | 8 #include <queue> |
| 9 #include <string> | 9 #include <string> |
| 10 #include <unordered_map> | 10 #include <unordered_map> |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 45 // the SafeBrowsing permission action server, using |request_context| as the | 45 // the SafeBrowsing permission action server, using |request_context| as the |
| 46 // context for the reports. | 46 // context for the reports. |
| 47 explicit PermissionReporter(net::URLRequestContext* request_context); | 47 explicit PermissionReporter(net::URLRequestContext* request_context); |
| 48 | 48 |
| 49 ~PermissionReporter(); | 49 ~PermissionReporter(); |
| 50 | 50 |
| 51 // Sends a serialized permission report to the report collection server. | 51 // Sends a serialized permission report to the report collection server. |
| 52 // The permission report includes |origin| as the origin of | 52 // The permission report includes |origin| as the origin of |
| 53 // the site requesting permission, |permission| as the type of permission | 53 // the site requesting permission, |permission| as the type of permission |
| 54 // requested, |action| as the action taken, and |gesture_type| as to whether | 54 // requested, |action| as the action taken, and |gesture_type| as to whether |
| 55 // the action occurred after a user gesture. The report will be serialized | 55 // the action occurred after a user gesture. It also includes |
| 56 // using protobuf defined in | 56 // |num_prior_dismissals| and |num_prior_ignores| the number of dismissals |
| 57 // and ignores for this permission and origin that occurred prior to this |
| 58 // report. The report will be serialized using protobuf defined in |
| 57 // //src/chrome/common/safe_browsing/permission_report.proto | 59 // //src/chrome/common/safe_browsing/permission_report.proto |
| 60 // |
| 61 // TODO(kcarattini): Move these params to a PermissionReportInfo struct. |
| 58 void SendReport(const GURL& origin, | 62 void SendReport(const GURL& origin, |
| 59 content::PermissionType permission, | 63 content::PermissionType permission, |
| 60 PermissionAction action, | 64 PermissionAction action, |
| 61 PermissionSourceUI source_ui, | 65 PermissionSourceUI source_ui, |
| 62 PermissionRequestGestureType gesture_type); | 66 PermissionRequestGestureType gesture_type, |
| 67 int num_prior_dismissals, |
| 68 int num_prior_ignores); |
| 63 | 69 |
| 64 private: | 70 private: |
| 65 friend class PermissionReporterBrowserTest; | 71 friend class PermissionReporterBrowserTest; |
| 66 friend class PermissionReporterTest; | 72 friend class PermissionReporterTest; |
| 67 | 73 |
| 68 // Used by tests. This constructor allows tests to have access to the | 74 // Used by tests. This constructor allows tests to have access to the |
| 69 // ReportSender and use a test Clock. | 75 // ReportSender and use a test Clock. |
| 70 PermissionReporter(std::unique_ptr<net::ReportSender> report_sender, | 76 PermissionReporter(std::unique_ptr<net::ReportSender> report_sender, |
| 71 std::unique_ptr<base::Clock> clock); | 77 std::unique_ptr<base::Clock> clock); |
| 72 | 78 |
| 73 // Builds and serializes a permission report with |origin| as the origin of | 79 // Builds and serializes a permission report with |origin| as the origin of |
| 74 // the site requesting permission, |permission| as the type of permission | 80 // the site requesting permission, |permission| as the type of permission |
| 75 // requested, and |action| as the action taken. The serialized report is | 81 // requested, and |action| as the action taken. The serialized report is |
| 76 // written into |output|. Returns true if the serialization was successful and | 82 // written into |output|. Returns true if the serialization was successful and |
| 77 // false otherwise. | 83 // false otherwise. |
| 78 static bool BuildReport(const GURL& origin, | 84 static bool BuildReport(const GURL& origin, |
| 79 content::PermissionType permission, | 85 content::PermissionType permission, |
| 80 PermissionAction action, | 86 PermissionAction action, |
| 81 PermissionSourceUI source_ui, | 87 PermissionSourceUI source_ui, |
| 82 PermissionRequestGestureType gesture_type, | 88 PermissionRequestGestureType gesture_type, |
| 89 int num_prior_dismissals, |
| 90 int num_prior_ignores, |
| 83 std::string* output); | 91 std::string* output); |
| 84 | 92 |
| 85 // Returns false if the number of reports sent in the last one minute per | 93 // Returns false if the number of reports sent in the last one minute per |
| 86 // origin per permission is under a threshold, otherwise true. | 94 // origin per permission is under a threshold, otherwise true. |
| 87 bool IsReportThresholdExceeded(content::PermissionType permission, | 95 bool IsReportThresholdExceeded(content::PermissionType permission, |
| 88 const GURL& origin); | 96 const GURL& origin); |
| 89 | 97 |
| 90 std::unique_ptr<net::ReportSender> permission_report_sender_; | 98 std::unique_ptr<net::ReportSender> permission_report_sender_; |
| 91 | 99 |
| 92 // TODO(stefanocs): This might introduce a memory issue since older entries | 100 // TODO(stefanocs): This might introduce a memory issue since older entries |
| 93 // are not removed until a new report with the corresponding key is added. We | 101 // are not removed until a new report with the corresponding key is added. We |
| 94 // should address this issue if that becomes a problem in the future. | 102 // should address this issue if that becomes a problem in the future. |
| 95 std::unordered_map<PermissionAndOrigin, | 103 std::unordered_map<PermissionAndOrigin, |
| 96 std::queue<base::Time>, | 104 std::queue<base::Time>, |
| 97 PermissionAndOriginHash> | 105 PermissionAndOriginHash> |
| 98 report_logs_; | 106 report_logs_; |
| 99 | 107 |
| 100 std::unique_ptr<base::Clock> clock_; | 108 std::unique_ptr<base::Clock> clock_; |
| 101 | 109 |
| 102 DISALLOW_COPY_AND_ASSIGN(PermissionReporter); | 110 DISALLOW_COPY_AND_ASSIGN(PermissionReporter); |
| 103 }; | 111 }; |
| 104 | 112 |
| 105 } // namespace safe_browsing | 113 } // namespace safe_browsing |
| 106 | 114 |
| 107 #endif // CHROME_BROWSER_SAFE_BROWSING_PERMISSION_REPORTER_H_ | 115 #endif // CHROME_BROWSER_SAFE_BROWSING_PERMISSION_REPORTER_H_ |
| OLD | NEW |