Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(586)

Unified Diff: chrome/browser/ssl/security_state_tab_helper.cc

Issue 2448943002: Refactor SecurityStateModel/Clients for simplicity and reusability. (Closed)
Patch Set: sync. Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/ssl/security_state_tab_helper.cc
diff --git a/chrome/browser/ssl/security_state_tab_helper.cc b/chrome/browser/ssl/security_state_tab_helper.cc
new file mode 100644
index 0000000000000000000000000000000000000000..c987b69c35d35eb4af9d4746874356856e2f8764
--- /dev/null
+++ b/chrome/browser/ssl/security_state_tab_helper.cc
@@ -0,0 +1,166 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "chrome/browser/ssl/security_state_tab_helper.h"
+
+#include "base/bind.h"
+#include "base/metrics/histogram_macros.h"
+#include "build/build_config.h"
+#include "chrome/browser/browser_process.h"
+#include "chrome/browser/chromeos/policy/policy_cert_service.h"
+#include "chrome/browser/chromeos/policy/policy_cert_service_factory.h"
+#include "chrome/browser/profiles/profile.h"
+#include "chrome/browser/safe_browsing/safe_browsing_service.h"
+#include "chrome/browser/safe_browsing/ui_manager.h"
+#include "components/security_state/content/content_utils.h"
+#include "content/public/browser/navigation_entry.h"
+#include "content/public/browser/navigation_handle.h"
+#include "content/public/browser/render_frame_host.h"
+#include "content/public/browser/web_contents.h"
+#include "content/public/common/origin_util.h"
+#include "net/base/net_errors.h"
+#include "net/cert/x509_certificate.h"
+#include "net/ssl/ssl_cipher_suite_names.h"
+#include "net/ssl/ssl_connection_status_flags.h"
+#include "third_party/boringssl/src/include/openssl/ssl.h"
+#include "ui/base/l10n/l10n_util.h"
+
+DEFINE_WEB_CONTENTS_USER_DATA_KEY(SecurityStateTabHelper);
+
+using safe_browsing::SafeBrowsingUIManager;
+
+SecurityStateTabHelper::SecurityStateTabHelper(
+ content::WebContents* web_contents)
+ : content::WebContentsObserver(web_contents),
+ logged_http_warning_on_current_navigation_(false) {}
+
+SecurityStateTabHelper::~SecurityStateTabHelper() {}
+
+void SecurityStateTabHelper::GetSecurityInfo(
+ security_state::SecurityInfo* result) const {
+ security_state::GetSecurityInfo(GetVisibleSecurityState(),
+ UsedPolicyInstalledCertificate(),
+ base::Bind(&content::IsOriginSecure), result);
+}
+
+void SecurityStateTabHelper::VisibleSecurityStateChanged() {
+ if (logged_http_warning_on_current_navigation_)
+ return;
+
+ security_state::SecurityInfo security_info;
+ GetSecurityInfo(&security_info);
+ if (!security_info.displayed_password_field_on_http &&
+ !security_info.displayed_credit_card_field_on_http) {
+ return;
+ }
+
+ std::string warning;
+ bool warning_is_user_visible = false;
+ switch (security_info.security_level) {
+ case security_state::HTTP_SHOW_WARNING:
+ warning =
+ "This page includes a password or credit card input in a non-secure "
+ "context. A warning has been added to the URL bar. For more "
+ "information, see https://goo.gl/zmWq3m.";
+ warning_is_user_visible = true;
+ break;
+ case security_state::NONE:
+ case security_state::DANGEROUS:
+ warning =
+ "This page includes a password or credit card input in a non-secure "
+ "context. A warning will be added to the URL bar in Chrome 56 (Jan "
+ "2017). For more information, see https://goo.gl/zmWq3m.";
+ break;
+ default:
+ return;
+ }
+
+ logged_http_warning_on_current_navigation_ = true;
+ web_contents()->GetMainFrame()->AddMessageToConsole(
+ content::CONSOLE_MESSAGE_LEVEL_WARNING, warning);
+
+ if (security_info.displayed_credit_card_field_on_http) {
+ UMA_HISTOGRAM_BOOLEAN(
+ "Security.HTTPBad.UserWarnedAboutSensitiveInput.CreditCard",
+ warning_is_user_visible);
+ }
+ if (security_info.displayed_password_field_on_http) {
+ UMA_HISTOGRAM_BOOLEAN(
+ "Security.HTTPBad.UserWarnedAboutSensitiveInput.Password",
+ warning_is_user_visible);
+ }
+}
+
+void SecurityStateTabHelper::DidFinishNavigation(
+ content::NavigationHandle* navigation_handle) {
+ if (navigation_handle->IsInMainFrame() && !navigation_handle->IsSamePage()) {
+ // Only reset the console message flag for main-frame navigations,
+ // and not for same-page navigations like reference fragments and pushState.
+ logged_http_warning_on_current_navigation_ = false;
+ }
+}
+
+bool SecurityStateTabHelper::UsedPolicyInstalledCertificate() const {
+#if defined(OS_CHROMEOS)
+ policy::PolicyCertService* service =
+ policy::PolicyCertServiceFactory::GetForProfile(
+ Profile::FromBrowserContext(web_contents()->GetBrowserContext()));
+ if (service && service->UsedPolicyCertificates())
+ return true;
+#endif
+ return false;
+}
+
+security_state::MaliciousContentStatus
+SecurityStateTabHelper::GetMaliciousContentStatus() const {
+ content::NavigationEntry* entry =
+ web_contents()->GetController().GetVisibleEntry();
+ if (!entry)
+ return security_state::MALICIOUS_CONTENT_STATUS_NONE;
+ safe_browsing::SafeBrowsingService* sb_service =
+ g_browser_process->safe_browsing_service();
+ if (!sb_service)
+ return security_state::MALICIOUS_CONTENT_STATUS_NONE;
+ scoped_refptr<SafeBrowsingUIManager> sb_ui_manager = sb_service->ui_manager();
+ safe_browsing::SBThreatType threat_type;
+ if (sb_ui_manager->IsUrlWhitelistedOrPendingForWebContents(
+ entry->GetURL(), false, entry, web_contents(), false, &threat_type)) {
+ switch (threat_type) {
+ case safe_browsing::SB_THREAT_TYPE_SAFE:
+ break;
+ case safe_browsing::SB_THREAT_TYPE_URL_PHISHING:
+ case safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL:
+ return security_state::MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING;
+ break;
+ case safe_browsing::SB_THREAT_TYPE_URL_MALWARE:
+ case safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL:
+ return security_state::MALICIOUS_CONTENT_STATUS_MALWARE;
+ break;
+ case safe_browsing::SB_THREAT_TYPE_URL_UNWANTED:
+ return security_state::MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE;
+ break;
+ case safe_browsing::SB_THREAT_TYPE_BINARY_MALWARE_URL:
+ case safe_browsing::SB_THREAT_TYPE_EXTENSION:
+ case safe_browsing::SB_THREAT_TYPE_BLACKLISTED_RESOURCE:
+ case safe_browsing::SB_THREAT_TYPE_API_ABUSE:
+ // These threat types are not currently associated with
+ // interstitials, and thus resources with these threat types are
+ // not ever whitelisted or pending whitelisting.
+ NOTREACHED();
+ break;
+ }
+ }
+ return security_state::MALICIOUS_CONTENT_STATUS_NONE;
+}
+
+std::unique_ptr<security_state::VisibleSecurityState>
+SecurityStateTabHelper::GetVisibleSecurityState() const {
+ auto state = security_state::GetVisibleSecurityState(web_contents());
+
+ // Malware status might already be known even if connection security
+ // information is still being initialized, thus no need to check for that.
+ state->malicious_content_status = GetMaliciousContentStatus();
+
+ return state;
+}
« no previous file with comments | « chrome/browser/ssl/security_state_tab_helper.h ('k') | chrome/browser/ssl/security_state_tab_helper_browser_tests.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698