| Index: chrome/browser/ui/website_settings/website_settings.cc
|
| diff --git a/chrome/browser/ui/website_settings/website_settings.cc b/chrome/browser/ui/website_settings/website_settings.cc
|
| index 2e6df2ff648b8ffca58c62ce228a813f1916572f..3c7d371c3650d918988443567b61cccb35a01c2e 100644
|
| --- a/chrome/browser/ui/website_settings/website_settings.cc
|
| +++ b/chrome/browser/ui/website_settings/website_settings.cc
|
| @@ -82,7 +82,6 @@ using base::ASCIIToUTF16;
|
| using base::UTF8ToUTF16;
|
| using base::UTF16ToUTF8;
|
| using content::BrowserThread;
|
| -using security_state::SecurityStateModel;
|
|
|
| namespace {
|
|
|
| @@ -137,28 +136,28 @@ bool ShouldShowPermission(ContentSettingsType type) {
|
| return true;
|
| }
|
|
|
| -void CheckContentStatus(SecurityStateModel::ContentStatus content_status,
|
| +void CheckContentStatus(security_state::ContentStatus content_status,
|
| bool* displayed,
|
| bool* ran) {
|
| switch (content_status) {
|
| - case SecurityStateModel::CONTENT_STATUS_DISPLAYED:
|
| + case security_state::CONTENT_STATUS_DISPLAYED:
|
| *displayed = true;
|
| break;
|
| - case SecurityStateModel::CONTENT_STATUS_RAN:
|
| + case security_state::CONTENT_STATUS_RAN:
|
| *ran = true;
|
| break;
|
| - case SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN:
|
| + case security_state::CONTENT_STATUS_DISPLAYED_AND_RAN:
|
| *displayed = true;
|
| *ran = true;
|
| break;
|
| - case SecurityStateModel::CONTENT_STATUS_UNKNOWN:
|
| - case SecurityStateModel::CONTENT_STATUS_NONE:
|
| + case security_state::CONTENT_STATUS_UNKNOWN:
|
| + case security_state::CONTENT_STATUS_NONE:
|
| break;
|
| }
|
| }
|
|
|
| void CheckForInsecureContent(
|
| - const SecurityStateModel::SecurityInfo& security_info,
|
| + const security_state::SecurityInfo& security_info,
|
| bool* displayed,
|
| bool* ran) {
|
| CheckContentStatus(security_info.mixed_content_status, displayed, ran);
|
| @@ -255,7 +254,7 @@ WebsiteSettings::WebsiteSettings(
|
| TabSpecificContentSettings* tab_specific_content_settings,
|
| content::WebContents* web_contents,
|
| const GURL& url,
|
| - const SecurityStateModel::SecurityInfo& security_info)
|
| + const security_state::SecurityInfo& security_info)
|
| : TabSpecificContentSettings::SiteDataObserver(
|
| tab_specific_content_settings),
|
| content::WebContentsObserver(web_contents),
|
| @@ -270,7 +269,7 @@ WebsiteSettings::WebsiteSettings(
|
| ChromeSSLHostStateDelegateFactory::GetForProfile(profile)),
|
| did_revoke_user_ssl_decisions_(false),
|
| profile_(profile),
|
| - security_level_(security_state::SecurityStateModel::NONE) {
|
| + security_level_(security_state::NONE) {
|
| Init(url, security_info);
|
|
|
| PresentSitePermissions();
|
| @@ -294,26 +293,24 @@ void WebsiteSettings::RecordWebsiteSettingsAction(
|
| std::string histogram_name;
|
|
|
| if (site_url_.SchemeIsCryptographic()) {
|
| - if (security_level_ == security_state::SecurityStateModel::SECURE ||
|
| - security_level_ == security_state::SecurityStateModel::EV_SECURE) {
|
| + if (security_level_ == security_state::SECURE ||
|
| + security_level_ == security_state::EV_SECURE) {
|
| UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Valid",
|
| action, WEBSITE_SETTINGS_COUNT);
|
| - } else if (security_level_ == security_state::SecurityStateModel::NONE) {
|
| + } else if (security_level_ == security_state::NONE) {
|
| UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Downgraded",
|
| action, WEBSITE_SETTINGS_COUNT);
|
| - } else if (security_level_ ==
|
| - security_state::SecurityStateModel::DANGEROUS) {
|
| + } else if (security_level_ == security_state::DANGEROUS) {
|
| UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Dangerous",
|
| action, WEBSITE_SETTINGS_COUNT);
|
| }
|
| return;
|
| }
|
|
|
| - if (security_level_ ==
|
| - security_state::SecurityStateModel::HTTP_SHOW_WARNING) {
|
| + if (security_level_ == security_state::HTTP_SHOW_WARNING) {
|
| UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Warning",
|
| action, WEBSITE_SETTINGS_COUNT);
|
| - } else if (security_level_ == security_state::SecurityStateModel::DANGEROUS) {
|
| + } else if (security_level_ == security_state::DANGEROUS) {
|
| UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Dangerous",
|
| action, WEBSITE_SETTINGS_COUNT);
|
| } else {
|
| @@ -411,9 +408,8 @@ void WebsiteSettings::OnRevokeSSLErrorBypassButtonPressed() {
|
| did_revoke_user_ssl_decisions_ = true;
|
| }
|
|
|
| -void WebsiteSettings::Init(
|
| - const GURL& url,
|
| - const SecurityStateModel::SecurityInfo& security_info) {
|
| +void WebsiteSettings::Init(const GURL& url,
|
| + const security_state::SecurityInfo& security_info) {
|
| #if !defined(OS_ANDROID) && !defined(OS_IOS)
|
| // On desktop, internal URLs aren't handled by this class. Instead, a
|
| // custom and simpler popup is shown.
|
| @@ -460,7 +456,7 @@ void WebsiteSettings::Init(
|
| net::IsCertStatusMinorError(security_info.cert_status))) {
|
| // There are no major errors. Check for minor errors.
|
| if (security_info.security_level ==
|
| - SecurityStateModel::SECURE_WITH_POLICY_INSTALLED_CERT) {
|
| + security_state::SECURE_WITH_POLICY_INSTALLED_CERT) {
|
| site_identity_status_ = SITE_IDENTITY_STATUS_ADMIN_PROVIDED_CERT;
|
| site_identity_details_ = l10n_util::GetStringFUTF16(
|
| IDS_CERT_POLICY_PROVIDED_CERT_MESSAGE, UTF8ToUTF16(url.host()));
|
| @@ -539,7 +535,7 @@ void WebsiteSettings::Init(
|
| issuer_name));
|
| }
|
| switch (security_info.sha1_deprecation_status) {
|
| - case SecurityStateModel::DEPRECATED_SHA1_MINOR:
|
| + case security_state::DEPRECATED_SHA1_MINOR:
|
| site_identity_status_ =
|
| SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MINOR;
|
| site_identity_details_ +=
|
| @@ -547,7 +543,7 @@ void WebsiteSettings::Init(
|
| l10n_util::GetStringUTF16(
|
| IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MINOR);
|
| break;
|
| - case SecurityStateModel::DEPRECATED_SHA1_MAJOR:
|
| + case security_state::DEPRECATED_SHA1_MAJOR:
|
| site_identity_status_ =
|
| SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR;
|
| site_identity_details_ +=
|
| @@ -555,10 +551,10 @@ void WebsiteSettings::Init(
|
| l10n_util::GetStringUTF16(
|
| IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR);
|
| break;
|
| - case SecurityStateModel::NO_DEPRECATED_SHA1:
|
| + case security_state::NO_DEPRECATED_SHA1:
|
| // Nothing to do.
|
| break;
|
| - case SecurityStateModel::UNKNOWN_SHA1:
|
| + case security_state::UNKNOWN_SHA1:
|
| // UNKNOWN_SHA1 should only appear when certificate info has not been
|
| // initialized, in which case this if-statement should not be running
|
| // because there is no other cert info.
|
| @@ -614,7 +610,7 @@ void WebsiteSettings::Init(
|
| // Security strength is unknown. Say nothing.
|
| site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR;
|
| } else if (security_info.security_bits == 0) {
|
| - DCHECK_NE(security_info.security_level, SecurityStateModel::NONE);
|
| + DCHECK_NE(security_info.security_level, security_state::NONE);
|
| site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR;
|
| site_connection_details_.assign(l10n_util::GetStringFUTF16(
|
| IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT,
|
|
|