| Index: components/safe_browsing/base_ui_manager.cc
|
| diff --git a/components/safe_browsing/base_ui_manager.cc b/components/safe_browsing/base_ui_manager.cc
|
| index 3bdd8db4fe145e87347c3aab63f6697b97c9e27d..6e4886e0e087b003d7346276cea65b16abb70495 100644
|
| --- a/components/safe_browsing/base_ui_manager.cc
|
| +++ b/components/safe_browsing/base_ui_manager.cc
|
| @@ -6,7 +6,10 @@
|
|
|
| #include "base/bind.h"
|
| #include "base/callback.h"
|
| -#include "base/macros.h"
|
| +#include "base/i18n/rtl.h"
|
| +#include "base/metrics/histogram_macros.h"
|
| +#include "base/supports_user_data.h"
|
| +#include "components/safe_browsing/base_blocking_page.h"
|
| #include "content/public/browser/browser_thread.h"
|
| #include "content/public/browser/navigation_entry.h"
|
| #include "content/public/browser/web_contents.h"
|
| @@ -92,17 +95,17 @@ WhitelistUrlSet* GetOrCreateWhitelist(WebContents* web_contents) {
|
|
|
| namespace safe_browsing {
|
|
|
| -BaseSafeBrowsingUIManager::BaseSafeBrowsingUIManager() {}
|
| +BaseUIManager::BaseUIManager() {}
|
|
|
| -void BaseSafeBrowsingUIManager::StopOnIOThread(bool shutdown) {
|
| +void BaseUIManager::StopOnIOThread(bool shutdown) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
| // TODO(ntfschr): implement this once SafeBrowsingService is componentized
|
| return;
|
| }
|
|
|
| -BaseSafeBrowsingUIManager::~BaseSafeBrowsingUIManager() {}
|
| +BaseUIManager::~BaseUIManager() {}
|
|
|
| -bool BaseSafeBrowsingUIManager::IsWhitelisted(const UnsafeResource& resource) {
|
| +bool BaseUIManager::IsWhitelisted(const UnsafeResource& resource) {
|
| NavigationEntry* entry = nullptr;
|
| if (resource.is_subresource) {
|
| entry = resource.GetNavigationEntryForResource();
|
| @@ -115,7 +118,7 @@ bool BaseSafeBrowsingUIManager::IsWhitelisted(const UnsafeResource& resource) {
|
|
|
| // Check if the user has already seen and/or ignored a SB warning for this
|
| // WebContents and top-level domain.
|
| -bool BaseSafeBrowsingUIManager::IsUrlWhitelistedOrPendingForWebContents(
|
| +bool BaseUIManager::IsUrlWhitelistedOrPendingForWebContents(
|
| const GURL& url,
|
| bool is_subresource,
|
| NavigationEntry* entry,
|
| @@ -141,7 +144,7 @@ bool BaseSafeBrowsingUIManager::IsUrlWhitelistedOrPendingForWebContents(
|
| }
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::OnBlockingPageDone(
|
| +void BaseUIManager::OnBlockingPageDone(
|
| const std::vector<UnsafeResource>& resources,
|
| bool proceed,
|
| WebContents* web_contents,
|
| @@ -168,34 +171,81 @@ void BaseSafeBrowsingUIManager::OnBlockingPageDone(
|
| }
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::DisplayBlockingPage(
|
| +void BaseUIManager::DisplayBlockingPage(
|
| const UnsafeResource& resource) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
| - // TODO(ntfschr): implement this once SafeBrowsingBlockingPage is
|
| - // componentized
|
| - return;
|
| + if (resource.is_subresource && !resource.is_subframe) {
|
| + // Sites tagged as serving Unwanted Software should only show a warning for
|
| + // main-frame or sub-frame resource. Similar warning restrictions should be
|
| + // applied to malware sites tagged as "landing sites" (see "Types of
|
| + // Malware sites" under
|
| + // https://developers.google.com/safe-browsing/developers_guide_v3#UserWarnings).
|
| + if (resource.threat_type == SB_THREAT_TYPE_URL_UNWANTED ||
|
| + (resource.threat_type == SB_THREAT_TYPE_URL_MALWARE &&
|
| + resource.threat_metadata.threat_pattern_type ==
|
| + ThreatPatternType::MALWARE_LANDING)) {
|
| + if (!resource.callback.is_null()) {
|
| + DCHECK(resource.callback_thread);
|
| + resource.callback_thread->PostTask(FROM_HERE,
|
| + base::Bind(resource.callback, true));
|
| + }
|
| +
|
| + return;
|
| + }
|
| + }
|
| +
|
| + // The tab might have been closed. If it was closed, just act as if "Don't
|
| + // Proceed" had been chosen.
|
| + WebContents* web_contents = resource.web_contents_getter.Run();
|
| + if (!web_contents) {
|
| + OnBlockingPageDone(std::vector<UnsafeResource>{resource},
|
| + false /* proceed */,
|
| + web_contents,
|
| + GetMainFrameWhitelistUrlForResource(resource));
|
| + return;
|
| + }
|
| +
|
| + // Check if the user has already ignored a SB warning for the same WebContents
|
| + // and top-level domain.
|
| + if (IsWhitelisted(resource)) {
|
| + if (!resource.callback.is_null()) {
|
| + DCHECK(resource.callback_thread);
|
| + resource.callback_thread->PostTask(FROM_HERE,
|
| + base::Bind(resource.callback, true));
|
| + }
|
| + return;
|
| + }
|
| +
|
| + // BaseUIManager does not send SafeBrowsingHitReport. Subclasses should
|
| + // implement the reporting logic themselves if needed.
|
| + AddToWhitelistUrlSet(GetMainFrameWhitelistUrlForResource(resource),
|
| + resource.web_contents_getter.Run(),
|
| + true /* A decision is now pending */,
|
| + resource.threat_type);
|
| + BaseBlockingPage::ShowBlockingPage(this, resource);
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::EnsureWhitelistCreated(
|
| +void BaseUIManager::EnsureWhitelistCreated(
|
| WebContents* web_contents) {
|
| GetOrCreateWhitelist(web_contents);
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::LogPauseDelay(base::TimeDelta time) {
|
| +void BaseUIManager::LogPauseDelay(base::TimeDelta time) {
|
| + UMA_HISTOGRAM_LONG_TIMES("SB2.Delay", time);
|
| return;
|
| }
|
|
|
| // A safebrowsing hit is sent after a blocking page for malware/phishing
|
| // or after the warning dialog for download urls, only for
|
| // UMA || extended_reporting users.
|
| -void BaseSafeBrowsingUIManager::MaybeReportSafeBrowsingHit(
|
| +void BaseUIManager::MaybeReportSafeBrowsingHit(
|
| const HitReport& hit_report) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
| // TODO(ntfschr): implement this once we support reporting in WebView
|
| return;
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::ReportSafeBrowsingHitOnIOThread(
|
| +void BaseUIManager::ReportSafeBrowsingHitOnIOThread(
|
| const HitReport& hit_report) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
| // TODO(ntfschr): implement this once we support reporting in WebView
|
| @@ -204,7 +254,7 @@ void BaseSafeBrowsingUIManager::ReportSafeBrowsingHitOnIOThread(
|
|
|
| // If the user had opted-in to send ThreatDetails, this gets called
|
| // when the report is ready.
|
| -void BaseSafeBrowsingUIManager::SendSerializedThreatDetails(
|
| +void BaseUIManager::SendSerializedThreatDetails(
|
| const std::string& serialized) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
| // TODO(ntfschr): implement this once we support reporting in WebView
|
| @@ -214,10 +264,10 @@ void BaseSafeBrowsingUIManager::SendSerializedThreatDetails(
|
| // Record this domain in the given WebContents as either whitelisted or
|
| // pending whitelisting (if an interstitial is currently displayed). If an
|
| // existing WhitelistUrlSet does not yet exist, create a new WhitelistUrlSet.
|
| -void BaseSafeBrowsingUIManager::AddToWhitelistUrlSet(const GURL& whitelist_url,
|
| - WebContents* web_contents,
|
| - bool pending,
|
| - SBThreatType threat_type) {
|
| +void BaseUIManager::AddToWhitelistUrlSet(const GURL& whitelist_url,
|
| + WebContents* web_contents,
|
| + bool pending,
|
| + SBThreatType threat_type) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
|
|
| // A WebContents might not exist if the tab has been closed.
|
| @@ -239,17 +289,21 @@ void BaseSafeBrowsingUIManager::AddToWhitelistUrlSet(const GURL& whitelist_url,
|
| web_contents->DidChangeVisibleSecurityState();
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::AddObserver(Observer* observer) {
|
| - DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
| - observer_list_.AddObserver(observer);
|
| +const std::string BaseUIManager::app_locale() const {
|
| + return base::i18n::GetConfiguredLocale();
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::RemoveObserver(Observer* observer) {
|
| - DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
| - observer_list_.RemoveObserver(observer);
|
| +history::HistoryService* BaseUIManager::history_service(
|
| + content::WebContents* web_contents) {
|
| + // TODO(jialiul): figure out how to get HistoryService from webview.
|
| + return nullptr;
|
| }
|
|
|
| -void BaseSafeBrowsingUIManager::RemoveFromPendingWhitelistUrlSet(
|
| +const GURL BaseUIManager::default_safe_page() const {
|
| + return GURL(url::kAboutBlankURL);
|
| +}
|
| +
|
| +void BaseUIManager::RemoveFromPendingWhitelistUrlSet(
|
| const GURL& whitelist_url,
|
| WebContents* web_contents) {
|
| DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
| @@ -286,4 +340,16 @@ void BaseSafeBrowsingUIManager::RemoveFromPendingWhitelistUrlSet(
|
| web_contents->DidChangeVisibleSecurityState();
|
| }
|
|
|
| +// static
|
| +GURL BaseUIManager::GetMainFrameWhitelistUrlForResource(
|
| + const security_interstitials::UnsafeResource& resource) {
|
| + if (resource.is_subresource) {
|
| + NavigationEntry* entry = resource.GetNavigationEntryForResource();
|
| + if (!entry)
|
| + return GURL();
|
| + return entry->GetURL().GetWithEmptyPath();
|
| + }
|
| + return resource.url.GetWithEmptyPath();
|
| +}
|
| +
|
| } // namespace safe_browsing
|
|
|