Index: components/security_state/content/content_utils.cc |
diff --git a/chrome/browser/ssl/chrome_security_state_model_client.cc b/components/security_state/content/content_utils.cc |
similarity index 58% |
rename from chrome/browser/ssl/chrome_security_state_model_client.cc |
rename to components/security_state/content/content_utils.cc |
index a5072e614f8558f91977d838cb5506b2e161eb7b..62b3a33d1a735f090ba261cb90fb55feb7eeb5dd 100644 |
--- a/chrome/browser/ssl/chrome_security_state_model_client.cc |
+++ b/components/security_state/content/content_utils.cc |
@@ -1,33 +1,25 @@ |
-// Copyright 2015 The Chromium Authors. All rights reserved. |
+// Copyright 2016 The Chromium Authors. All rights reserved. |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#include "chrome/browser/ssl/chrome_security_state_model_client.h" |
+#include "components/security_state/content/content_utils.h" |
+#include <string> |
#include <vector> |
-#include "base/command_line.h" |
-#include "base/metrics/field_trial.h" |
-#include "base/metrics/histogram_macros.h" |
+#include "base/memory/ptr_util.h" |
#include "base/strings/string16.h" |
+#include "base/strings/string_util.h" |
#include "base/strings/utf_string_conversions.h" |
-#include "build/build_config.h" |
-#include "chrome/browser/browser_process.h" |
-#include "chrome/browser/chromeos/policy/policy_cert_service.h" |
-#include "chrome/browser/chromeos/policy/policy_cert_service_factory.h" |
-#include "chrome/browser/profiles/profile.h" |
-#include "chrome/browser/safe_browsing/safe_browsing_service.h" |
-#include "chrome/browser/safe_browsing/ui_manager.h" |
-#include "chrome/grit/chromium_strings.h" |
-#include "chrome/grit/generated_resources.h" |
+#include "components/security_state/core/security_state.h" |
+#include "components/strings/grit/components_chromium_strings.h" |
+#include "components/strings/grit/components_strings.h" |
#include "content/public/browser/navigation_entry.h" |
-#include "content/public/browser/navigation_handle.h" |
-#include "content/public/browser/render_frame_host.h" |
#include "content/public/browser/security_style_explanation.h" |
#include "content/public/browser/security_style_explanations.h" |
#include "content/public/browser/ssl_status.h" |
#include "content/public/browser/web_contents.h" |
-#include "content/public/common/origin_util.h" |
+#include "content/public/common/content_client.h" |
#include "net/base/net_errors.h" |
#include "net/cert/x509_certificate.h" |
#include "net/ssl/ssl_cipher_suite_names.h" |
@@ -35,29 +27,25 @@ |
#include "third_party/boringssl/src/include/openssl/ssl.h" |
#include "ui/base/l10n/l10n_util.h" |
-DEFINE_WEB_CONTENTS_USER_DATA_KEY(ChromeSecurityStateModelClient); |
- |
-using safe_browsing::SafeBrowsingUIManager; |
-using security_state::SecurityStateModel; |
+namespace security_state { |
namespace { |
// Note: This is a lossy operation. Not all of the policies that can be |
-// expressed by a SecurityLevel (a //chrome concept) can be expressed by |
-// a blink::WebSecurityStyle. |
+// expressed by a SecurityLevel can be expressed by a blink::WebSecurityStyle. |
blink::WebSecurityStyle SecurityLevelToSecurityStyle( |
- SecurityStateModel::SecurityLevel security_level) { |
+ security_state::SecurityLevel security_level) { |
switch (security_level) { |
- case SecurityStateModel::NONE: |
- case SecurityStateModel::HTTP_SHOW_WARNING: |
+ case security_state::NONE: |
+ case security_state::HTTP_SHOW_WARNING: |
return blink::WebSecurityStyleUnauthenticated; |
- case SecurityStateModel::SECURITY_WARNING: |
- case SecurityStateModel::SECURE_WITH_POLICY_INSTALLED_CERT: |
+ case security_state::SECURITY_WARNING: |
+ case security_state::SECURE_WITH_POLICY_INSTALLED_CERT: |
return blink::WebSecurityStyleWarning; |
- case SecurityStateModel::EV_SECURE: |
- case SecurityStateModel::SECURE: |
+ case security_state::EV_SECURE: |
+ case security_state::SECURE: |
return blink::WebSecurityStyleAuthenticated; |
- case SecurityStateModel::DANGEROUS: |
+ case security_state::DANGEROUS: |
return blink::WebSecurityStyleAuthenticationBroken; |
} |
@@ -66,9 +54,8 @@ blink::WebSecurityStyle SecurityLevelToSecurityStyle( |
} |
void AddConnectionExplanation( |
- const security_state::SecurityStateModel::SecurityInfo& security_info, |
+ const security_state::SecurityInfo& security_info, |
content::SecurityStyleExplanations* security_style_explanations) { |
- |
// Avoid showing TLS details when we couldn't even establish a TLS connection |
// (e.g. for net errors) or if there was no real connection (some tests). We |
// check the |connection_status| to see if there was a connection. |
@@ -148,71 +135,56 @@ void AddConnectionExplanation( |
description_replacements, nullptr)))); |
} |
-// Check to see whether the security state should be downgraded to reflect |
-// a Safe Browsing verdict. |
-void CheckSafeBrowsingStatus(content::NavigationEntry* entry, |
- content::WebContents* web_contents, |
- SecurityStateModel::VisibleSecurityState* state) { |
- safe_browsing::SafeBrowsingService* sb_service = |
- g_browser_process->safe_browsing_service(); |
- if (!sb_service) |
- return; |
- scoped_refptr<SafeBrowsingUIManager> sb_ui_manager = sb_service->ui_manager(); |
- safe_browsing::SBThreatType threat_type; |
- if (sb_ui_manager->IsUrlWhitelistedOrPendingForWebContents( |
- entry->GetURL(), false, entry, web_contents, false, &threat_type)) { |
- switch (threat_type) { |
- case safe_browsing::SB_THREAT_TYPE_SAFE: |
- break; |
- case safe_browsing::SB_THREAT_TYPE_URL_PHISHING: |
- case safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL: |
- state->malicious_content_status = security_state::SecurityStateModel:: |
- MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING; |
- break; |
- case safe_browsing::SB_THREAT_TYPE_URL_MALWARE: |
- case safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL: |
- state->malicious_content_status = security_state::SecurityStateModel:: |
- MALICIOUS_CONTENT_STATUS_MALWARE; |
- break; |
- case safe_browsing::SB_THREAT_TYPE_URL_UNWANTED: |
- state->malicious_content_status = security_state::SecurityStateModel:: |
- MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE; |
- break; |
- case safe_browsing::SB_THREAT_TYPE_BINARY_MALWARE_URL: |
- case safe_browsing::SB_THREAT_TYPE_EXTENSION: |
- case safe_browsing::SB_THREAT_TYPE_BLACKLISTED_RESOURCE: |
- case safe_browsing::SB_THREAT_TYPE_API_ABUSE: |
- // These threat types are not currently associated with |
- // interstitials, and thus resources with these threat types are |
- // not ever whitelisted or pending whitelisting. |
- NOTREACHED(); |
- break; |
- } |
- } |
-} |
- |
} // namespace |
-ChromeSecurityStateModelClient::ChromeSecurityStateModelClient( |
- content::WebContents* web_contents) |
- : content::WebContentsObserver(web_contents), |
- web_contents_(web_contents), |
- security_state_model_(new SecurityStateModel()), |
- logged_http_warning_on_current_navigation_(false) { |
- security_state_model_->SetClient(this); |
-} |
+std::unique_ptr<security_state::VisibleSecurityState> GetVisibleSecurityState( |
+ content::WebContents* web_contents) { |
+ auto state = base::MakeUnique<security_state::VisibleSecurityState>(); |
+ |
+ content::NavigationEntry* entry = |
+ web_contents->GetController().GetVisibleEntry(); |
+ if (!entry || !entry->GetSSL().initialized) |
+ return state; |
+ |
+ state->connection_info_initialized = true; |
+ state->url = entry->GetURL(); |
+ const content::SSLStatus& ssl = entry->GetSSL(); |
+ state->certificate = ssl.certificate; |
+ state->cert_status = ssl.cert_status; |
+ state->connection_status = ssl.connection_status; |
+ state->key_exchange_group = ssl.key_exchange_group; |
+ state->security_bits = ssl.security_bits; |
+ state->pkp_bypassed = ssl.pkp_bypassed; |
+ state->sct_verify_statuses.clear(); |
+ state->sct_verify_statuses.insert(state->sct_verify_statuses.begin(), |
+ ssl.sct_statuses.begin(), |
+ ssl.sct_statuses.end()); |
+ state->displayed_mixed_content = |
+ !!(ssl.content_status & content::SSLStatus::DISPLAYED_INSECURE_CONTENT); |
+ state->ran_mixed_content = |
+ !!(ssl.content_status & content::SSLStatus::RAN_INSECURE_CONTENT); |
+ state->displayed_content_with_cert_errors = |
+ !!(ssl.content_status & |
+ content::SSLStatus::DISPLAYED_CONTENT_WITH_CERT_ERRORS); |
+ state->ran_content_with_cert_errors = |
+ !!(ssl.content_status & content::SSLStatus::RAN_CONTENT_WITH_CERT_ERRORS); |
+ state->displayed_password_field_on_http = |
+ !!(ssl.content_status & |
+ content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP); |
+ state->displayed_credit_card_field_on_http = |
+ !!(ssl.content_status & |
+ content::SSLStatus::DISPLAYED_CREDIT_CARD_FIELD_ON_HTTP); |
-ChromeSecurityStateModelClient::~ChromeSecurityStateModelClient() {} |
+ return state; |
+} |
-// static |
-blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
- const security_state::SecurityStateModel::SecurityInfo& security_info, |
+blink::WebSecurityStyle GetSecurityStyle( |
+ const security_state::SecurityInfo& security_info, |
content::SecurityStyleExplanations* security_style_explanations) { |
const blink::WebSecurityStyle security_style = |
SecurityLevelToSecurityStyle(security_info.security_level); |
- if (security_info.security_level == |
- security_state::SecurityStateModel::HTTP_SHOW_WARNING) { |
+ if (security_info.security_level == security_state::HTTP_SHOW_WARNING) { |
// If the HTTP_SHOW_WARNING field trial is in use, display an |
// unauthenticated explanation explaining why the omnibox warning is |
// present. |
@@ -220,8 +192,7 @@ blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
content::SecurityStyleExplanation( |
l10n_util::GetStringUTF8(IDS_PRIVATE_USER_DATA_INPUT), |
l10n_util::GetStringUTF8(IDS_PRIVATE_USER_DATA_INPUT_DESCRIPTION))); |
- } else if (security_info.security_level == |
- security_state::SecurityStateModel::NONE && |
+ } else if (security_info.security_level == security_state::NONE && |
(security_info.displayed_password_field_on_http || |
security_info.displayed_credit_card_field_on_http)) { |
// If the HTTP_SHOW_WARNING field trial isn't in use yet, display an |
@@ -235,11 +206,10 @@ blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
} |
security_style_explanations->ran_insecure_content_style = |
- SecurityLevelToSecurityStyle( |
- SecurityStateModel::kRanInsecureContentLevel); |
+ SecurityLevelToSecurityStyle(security_state::kRanInsecureContentLevel); |
security_style_explanations->displayed_insecure_content_style = |
SecurityLevelToSecurityStyle( |
- SecurityStateModel::kDisplayedInsecureContentLevel); |
+ security_state::kDisplayedInsecureContentLevel); |
// Check if the page is HTTP; if so, no more explanations are needed. Note |
// that SecurityStyleUnauthenticated does not necessarily mean that |
@@ -255,14 +225,14 @@ blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
} |
if (security_info.sha1_deprecation_status == |
- SecurityStateModel::DEPRECATED_SHA1_MAJOR) { |
+ security_state::DEPRECATED_SHA1_MAJOR) { |
security_style_explanations->broken_explanations.push_back( |
content::SecurityStyleExplanation( |
l10n_util::GetStringUTF8(IDS_MAJOR_SHA1), |
l10n_util::GetStringUTF8(IDS_MAJOR_SHA1_DESCRIPTION), |
!!security_info.certificate)); |
} else if (security_info.sha1_deprecation_status == |
- SecurityStateModel::DEPRECATED_SHA1_MINOR) { |
+ security_state::DEPRECATED_SHA1_MINOR) { |
security_style_explanations->unauthenticated_explanations.push_back( |
content::SecurityStyleExplanation( |
l10n_util::GetStringUTF8(IDS_MINOR_SHA1), |
@@ -274,14 +244,14 @@ blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
// page). |
security_style_explanations->ran_mixed_content = |
security_info.mixed_content_status == |
- SecurityStateModel::CONTENT_STATUS_RAN || |
+ security_state::CONTENT_STATUS_RAN || |
security_info.mixed_content_status == |
- SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN; |
+ security_state::CONTENT_STATUS_DISPLAYED_AND_RAN; |
security_style_explanations->displayed_mixed_content = |
security_info.mixed_content_status == |
- SecurityStateModel::CONTENT_STATUS_DISPLAYED || |
+ security_state::CONTENT_STATUS_DISPLAYED || |
security_info.mixed_content_status == |
- SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN; |
+ security_state::CONTENT_STATUS_DISPLAYED_AND_RAN; |
bool is_cert_status_error = net::IsCertStatusError(security_info.cert_status); |
bool is_cert_status_minor_error = |
@@ -296,14 +266,14 @@ blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
if (!is_cert_status_error || is_cert_status_minor_error) { |
security_style_explanations->ran_content_with_cert_errors = |
security_info.content_with_cert_errors_status == |
- SecurityStateModel::CONTENT_STATUS_RAN || |
+ security_state::CONTENT_STATUS_RAN || |
security_info.content_with_cert_errors_status == |
- SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN; |
+ security_state::CONTENT_STATUS_DISPLAYED_AND_RAN; |
security_style_explanations->displayed_content_with_cert_errors = |
security_info.content_with_cert_errors_status == |
- SecurityStateModel::CONTENT_STATUS_DISPLAYED || |
+ security_state::CONTENT_STATUS_DISPLAYED || |
security_info.content_with_cert_errors_status == |
- SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN; |
+ security_state::CONTENT_STATUS_DISPLAYED_AND_RAN; |
} |
if (is_cert_status_error) { |
@@ -327,7 +297,7 @@ blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
// deprecated SHA1, then add an explanation that the certificate is |
// valid. |
if (security_info.sha1_deprecation_status == |
- SecurityStateModel::NO_DEPRECATED_SHA1) { |
+ security_state::NO_DEPRECATED_SHA1) { |
security_style_explanations->secure_explanations.push_back( |
content::SecurityStyleExplanation( |
l10n_util::GetStringUTF8(IDS_VALID_SERVER_CERTIFICATE), |
@@ -350,128 +320,4 @@ blink::WebSecurityStyle ChromeSecurityStateModelClient::GetSecurityStyle( |
return security_style; |
} |
-void ChromeSecurityStateModelClient::GetSecurityInfo( |
- SecurityStateModel::SecurityInfo* result) const { |
- security_state_model_->GetSecurityInfo(result); |
-} |
- |
-void ChromeSecurityStateModelClient::VisibleSecurityStateChanged() { |
- if (logged_http_warning_on_current_navigation_) |
- return; |
- |
- security_state::SecurityStateModel::SecurityInfo security_info; |
- GetSecurityInfo(&security_info); |
- if (!security_info.displayed_password_field_on_http && |
- !security_info.displayed_credit_card_field_on_http) { |
- return; |
- } |
- |
- std::string warning; |
- bool warning_is_user_visible = false; |
- switch (security_info.security_level) { |
- case security_state::SecurityStateModel::HTTP_SHOW_WARNING: |
- warning = |
- "This page includes a password or credit card input in a non-secure " |
- "context. A warning has been added to the URL bar. For more " |
- "information, see https://goo.gl/zmWq3m."; |
- warning_is_user_visible = true; |
- break; |
- case security_state::SecurityStateModel::NONE: |
- case security_state::SecurityStateModel::DANGEROUS: |
- warning = |
- "This page includes a password or credit card input in a non-secure " |
- "context. A warning will be added to the URL bar in Chrome 56 (Jan " |
- "2017). For more information, see https://goo.gl/zmWq3m."; |
- break; |
- default: |
- return; |
- } |
- |
- logged_http_warning_on_current_navigation_ = true; |
- web_contents_->GetMainFrame()->AddMessageToConsole( |
- content::CONSOLE_MESSAGE_LEVEL_WARNING, warning); |
- |
- if (security_info.displayed_credit_card_field_on_http) { |
- UMA_HISTOGRAM_BOOLEAN( |
- "Security.HTTPBad.UserWarnedAboutSensitiveInput.CreditCard", |
- warning_is_user_visible); |
- } |
- if (security_info.displayed_password_field_on_http) { |
- UMA_HISTOGRAM_BOOLEAN( |
- "Security.HTTPBad.UserWarnedAboutSensitiveInput.Password", |
- warning_is_user_visible); |
- } |
-} |
- |
-void ChromeSecurityStateModelClient::DidFinishNavigation( |
- content::NavigationHandle* navigation_handle) { |
- if (navigation_handle->IsInMainFrame() && !navigation_handle->IsSamePage()) { |
- // Only reset the console message flag for main-frame navigations, |
- // and not for same-page navigations like reference fragments and pushState. |
- logged_http_warning_on_current_navigation_ = false; |
- } |
-} |
- |
-bool ChromeSecurityStateModelClient::UsedPolicyInstalledCertificate() { |
-#if defined(OS_CHROMEOS) |
- policy::PolicyCertService* service = |
- policy::PolicyCertServiceFactory::GetForProfile( |
- Profile::FromBrowserContext(web_contents_->GetBrowserContext())); |
- if (service && service->UsedPolicyCertificates()) |
- return true; |
-#endif |
- return false; |
-} |
- |
-bool ChromeSecurityStateModelClient::IsOriginSecure(const GURL& url) { |
- return content::IsOriginSecure(url); |
-} |
- |
-void ChromeSecurityStateModelClient::GetVisibleSecurityState( |
- SecurityStateModel::VisibleSecurityState* state) { |
- content::NavigationEntry* entry = |
- web_contents_->GetController().GetVisibleEntry(); |
- if (!entry) { |
- *state = SecurityStateModel::VisibleSecurityState(); |
- return; |
- } |
- |
- if (!entry->GetSSL().initialized) { |
- *state = SecurityStateModel::VisibleSecurityState(); |
- // Connection security information is still being initialized, but malware |
- // status might already be known. |
- CheckSafeBrowsingStatus(entry, web_contents_, state); |
- return; |
- } |
- |
- state->connection_info_initialized = true; |
- state->url = entry->GetURL(); |
- const content::SSLStatus& ssl = entry->GetSSL(); |
- state->certificate = ssl.certificate; |
- state->cert_status = ssl.cert_status; |
- state->connection_status = ssl.connection_status; |
- state->key_exchange_group = ssl.key_exchange_group; |
- state->security_bits = ssl.security_bits; |
- state->pkp_bypassed = ssl.pkp_bypassed; |
- state->sct_verify_statuses.clear(); |
- state->sct_verify_statuses.insert(state->sct_verify_statuses.begin(), |
- ssl.sct_statuses.begin(), |
- ssl.sct_statuses.end()); |
- state->displayed_mixed_content = |
- !!(ssl.content_status & content::SSLStatus::DISPLAYED_INSECURE_CONTENT); |
- state->ran_mixed_content = |
- !!(ssl.content_status & content::SSLStatus::RAN_INSECURE_CONTENT); |
- state->displayed_content_with_cert_errors = |
- !!(ssl.content_status & |
- content::SSLStatus::DISPLAYED_CONTENT_WITH_CERT_ERRORS); |
- state->ran_content_with_cert_errors = |
- !!(ssl.content_status & content::SSLStatus::RAN_CONTENT_WITH_CERT_ERRORS); |
- state->displayed_password_field_on_http = |
- !!(ssl.content_status & |
- content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP); |
- state->displayed_credit_card_field_on_http = |
- !!(ssl.content_status & |
- content::SSLStatus::DISPLAYED_CREDIT_CARD_FIELD_ON_HTTP); |
- |
- CheckSafeBrowsingStatus(entry, web_contents_, state); |
-} |
+} // namespace security_state |