| Index: components/security_interstitials/content/unsafe_resource.cc
|
| diff --git a/components/security_interstitials/content/unsafe_resource.cc b/components/security_interstitials/content/unsafe_resource.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..c6204cb9652b7d30a783c483da2a2a146b2aa25a
|
| --- /dev/null
|
| +++ b/components/security_interstitials/content/unsafe_resource.cc
|
| @@ -0,0 +1,79 @@
|
| +// Copyright 2016 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "components/security_interstitials/content/unsafe_resource.h"
|
| +
|
| +#include "base/bind.h"
|
| +#include "content/public/browser/navigation_entry.h"
|
| +#include "content/public/browser/render_frame_host.h"
|
| +#include "content/public/browser/web_contents.h"
|
| +
|
| +namespace security_interstitials {
|
| +
|
| +namespace {
|
| +
|
| +content::WebContents* GetWebContentsByFrameID(int render_process_id,
|
| + int render_frame_id) {
|
| + content::RenderFrameHost* render_frame_host =
|
| + content::RenderFrameHost::FromID(render_process_id, render_frame_id);
|
| + if (!render_frame_host)
|
| + return NULL;
|
| + return content::WebContents::FromRenderFrameHost(render_frame_host);
|
| +}
|
| +
|
| +}; // namespace
|
| +
|
| +UnsafeResource::UnsafeResource()
|
| + : is_subresource(false),
|
| + is_subframe(false),
|
| + threat_type(safe_browsing::SB_THREAT_TYPE_SAFE),
|
| + threat_source(safe_browsing::ThreatSource::UNKNOWN) {}
|
| +
|
| +UnsafeResource::UnsafeResource(
|
| + const UnsafeResource& other) = default;
|
| +
|
| +UnsafeResource::~UnsafeResource() {}
|
| +
|
| +bool UnsafeResource::IsMainPageLoadBlocked() const {
|
| + // Subresource hits cannot happen until after main page load is committed.
|
| + if (is_subresource)
|
| + return false;
|
| +
|
| + // Client-side phishing detection interstitials never block the main frame
|
| + // load, since they happen after the page is finished loading.
|
| + if (threat_type == safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL ||
|
| + threat_type == safe_browsing::SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL) {
|
| + return false;
|
| + }
|
| +
|
| + return true;
|
| +}
|
| +
|
| +content::NavigationEntry*
|
| +UnsafeResource::GetNavigationEntryForResource() const {
|
| + content::WebContents* web_contents = web_contents_getter.Run();
|
| + if (!web_contents)
|
| + return nullptr;
|
| + // If a safebrowsing hit occurs during main frame navigation, the navigation
|
| + // will not be committed, and the pending navigation entry refers to the hit.
|
| + if (IsMainPageLoadBlocked())
|
| + return web_contents->GetController().GetPendingEntry();
|
| + // If a safebrowsing hit occurs on a subresource load, or on a main frame
|
| + // after the navigation is committed, the last committed navigation entry
|
| + // refers to the page with the hit. Note that there may concurrently be an
|
| + // unrelated pending navigation to another site, so GetActiveEntry() would be
|
| + // wrong.
|
| + return web_contents->GetController().GetLastCommittedEntry();
|
| +}
|
| +
|
| +// static
|
| +base::Callback<content::WebContents*(void)>
|
| +UnsafeResource::GetWebContentsGetter(
|
| + int render_process_host_id,
|
| + int render_frame_id) {
|
| + return base::Bind(&GetWebContentsByFrameID, render_process_host_id,
|
| + render_frame_id);
|
| +}
|
| +
|
| +} // security_interstitials
|
|
|