Chromium Code Reviews| Index: components/security_interstitials/content/unsafe_resource.cc |
| diff --git a/components/security_interstitials/content/unsafe_resource.cc b/components/security_interstitials/content/unsafe_resource.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..cf9c3730fd272e8f2b3ba0df6748542f3deed562 |
| --- /dev/null |
| +++ b/components/security_interstitials/content/unsafe_resource.cc |
| @@ -0,0 +1,79 @@ |
| +// Copyright 2016 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "components/security_interstitials/content/unsafe_resource.h" |
| + |
| +#include "base/bind.h" |
| +#include "content/public/browser/navigation_entry.h" |
| +#include "content/public/browser/render_frame_host.h" |
| +#include "content/public/browser/web_contents.h" |
| + |
| +namespace security_interstitials { |
| + |
| +namespace { |
| + |
| +content::WebContents* GetWebContentsByFrameID(int render_process_id, |
| + int render_frame_id) { |
| + content::RenderFrameHost* render_frame_host = |
| + content::RenderFrameHost::FromID(render_process_id, render_frame_id); |
| + if (!render_frame_host) |
| + return NULL; |
| + return content::WebContents::FromRenderFrameHost(render_frame_host); |
| +} |
| + |
| +}; // namespace |
| + |
| +UnsafeResource::UnsafeResource() |
| + : is_subresource(false), |
| + is_subframe(false), |
| + threat_type(safe_browsing::SB_THREAT_TYPE_SAFE), |
| + threat_source(safe_browsing::ThreatSource::UNKNOWN) {} |
| + |
| +UnsafeResource::UnsafeResource( |
| + const UnsafeResource& other) = default; |
| + |
| +UnsafeResource::~UnsafeResource() { } |
|
meacer
2016/12/01 00:55:08
nit: extra space between braces
Jialiu Lin
2016/12/01 01:04:38
Nice catch!
|
| + |
| +bool UnsafeResource::IsMainPageLoadBlocked() const { |
| + // Subresource hits cannot happen until after main page load is committed. |
| + if (is_subresource) |
| + return false; |
| + |
| + // Client-side phishing detection interstitials never block the main frame |
| + // load, since they happen after the page is finished loading. |
| + if (threat_type == safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL || |
| + threat_type == safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL) { |
| + return false; |
| + } |
| + |
| + return true; |
| +} |
| + |
| +content::NavigationEntry* |
| +UnsafeResource::GetNavigationEntryForResource() const { |
| + content::WebContents* web_contents = web_contents_getter.Run(); |
| + if (!web_contents) |
| + return nullptr; |
| + // If a safebrowsing hit occurs during main frame navigation, the navigation |
| + // will not be committed, and the pending navigation entry refers to the hit. |
| + if (IsMainPageLoadBlocked()) |
| + return web_contents->GetController().GetPendingEntry(); |
| + // If a safebrowsing hit occurs on a subresource load, or on a main frame |
| + // after the navigation is committed, the last committed navigation entry |
| + // refers to the page with the hit. Note that there may concurrently be an |
| + // unrelated pending navigation to another site, so GetActiveEntry() would be |
| + // wrong. |
| + return web_contents->GetController().GetLastCommittedEntry(); |
| +} |
| + |
| +// static |
| +base::Callback<content::WebContents*(void)> |
| +UnsafeResource::GetWebContentsGetter( |
| + int render_process_host_id, |
| + int render_frame_id) { |
| + return base::Bind(&GetWebContentsByFrameID, render_process_host_id, |
| + render_frame_id); |
| +} |
| + |
| +} // security_interstitials |