OLD | NEW |
---|---|
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file should not be build on Android but is currently getting built. | 5 // This file should not be build on Android but is currently getting built. |
6 // TODO(vakh): Fix that: http://crbug.com/621647 | 6 // TODO(vakh): Fix that: http://crbug.com/621647 |
7 | 7 |
8 #include "components/safe_browsing_db/v4_local_database_manager.h" | 8 #include "components/safe_browsing_db/v4_local_database_manager.h" |
9 | 9 |
10 #include <vector> | 10 #include <vector> |
(...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
67 ListInfo(kSyncAlways, "UrlUws.store", GetUrlUwsId(), | 67 ListInfo(kSyncAlways, "UrlUws.store", GetUrlUwsId(), |
68 SB_THREAT_TYPE_URL_UNWANTED), | 68 SB_THREAT_TYPE_URL_UNWANTED), |
69 ListInfo(kSyncAlways, "UrlMalBin.store", GetUrlMalBinId(), | 69 ListInfo(kSyncAlways, "UrlMalBin.store", GetUrlMalBinId(), |
70 SB_THREAT_TYPE_BINARY_MALWARE_URL), | 70 SB_THREAT_TYPE_BINARY_MALWARE_URL), |
71 ListInfo(kSyncAlways, "ChromeExtMalware.store", GetChromeExtMalwareId(), | 71 ListInfo(kSyncAlways, "ChromeExtMalware.store", GetChromeExtMalwareId(), |
72 SB_THREAT_TYPE_EXTENSION), | 72 SB_THREAT_TYPE_EXTENSION), |
73 ListInfo(kSyncOnlyOnChromeBuilds, "ChromeUrlClientIncident.store", | 73 ListInfo(kSyncOnlyOnChromeBuilds, "ChromeUrlClientIncident.store", |
74 GetChromeUrlClientIncidentId(), | 74 GetChromeUrlClientIncidentId(), |
75 SB_THREAT_TYPE_BLACKLISTED_RESOURCE), | 75 SB_THREAT_TYPE_BLACKLISTED_RESOURCE), |
76 ListInfo(kSyncNever, "", GetChromeUrlApiId(), SB_THREAT_TYPE_API_ABUSE), | 76 ListInfo(kSyncNever, "", GetChromeUrlApiId(), SB_THREAT_TYPE_API_ABUSE), |
77 ListInfo(kSyncOnlyOnChromeBuilds, "UrlSubresourceFilter.store", | 77 ListInfo(kSyncAlways, "UrlSubresourceFilter.store", |
melandory
2017/04/19 14:47:11
+nparker@
Before start debugging I want to check
| |
78 GetUrlSubresourceFilterId(), SB_THREAT_TYPE_SUBRESOURCE_FILTER), | 78 GetUrlSubresourceFilterId(), SB_THREAT_TYPE_SUBRESOURCE_FILTER), |
79 }); | 79 }); |
80 // NOTE(vakh): IMPORTANT: Please make sure that the server already supports | 80 // NOTE(vakh): IMPORTANT: Please make sure that the server already supports |
81 // any list before adding it to this list otherwise the prefix updates break | 81 // any list before adding it to this list otherwise the prefix updates break |
82 // for all Canary users. | 82 // for all Canary users. |
83 } | 83 } |
84 | 84 |
85 // Returns the severity information about a given SafeBrowsing list. The lowest | 85 // Returns the severity information about a given SafeBrowsing list. The lowest |
86 // value is 0, which represents the most severe list. | 86 // value is 0, which represents the most severe list. |
87 ThreatSeverity GetThreatSeverity(const ListIdentifier& list_id) { | 87 ThreatSeverity GetThreatSeverity(const ListIdentifier& list_id) { |
(...skipping 181 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
269 client, ClientCallbackType::CHECK_RESOURCE_URL, stores_to_check, | 269 client, ClientCallbackType::CHECK_RESOURCE_URL, stores_to_check, |
270 std::vector<GURL>(1, url)); | 270 std::vector<GURL>(1, url)); |
271 | 271 |
272 return HandleCheck(std::move(check)); | 272 return HandleCheck(std::move(check)); |
273 } | 273 } |
274 | 274 |
275 bool V4LocalDatabaseManager::CheckUrlForSubresourceFilter(const GURL& url, | 275 bool V4LocalDatabaseManager::CheckUrlForSubresourceFilter(const GURL& url, |
276 Client* client) { | 276 Client* client) { |
277 DCHECK_CURRENTLY_ON(BrowserThread::IO); | 277 DCHECK_CURRENTLY_ON(BrowserThread::IO); |
278 | 278 |
279 StoresToCheck stores_to_check({GetUrlSubresourceFilterId()}); | 279 StoresToCheck stores_to_check( |
280 {GetUrlSocEngId(), GetUrlSubresourceFilterId()}); | |
engedy
2017/04/20 11:16:10
Just to double check: does this cover both SOCIAL_
melandory
2017/04/25 13:48:13
Yes
| |
280 if (!AreStoresAvailableNow(stores_to_check) || !CanCheckUrl(url)) { | 281 if (!AreStoresAvailableNow(stores_to_check) || !CanCheckUrl(url)) { |
281 return true; | 282 return true; |
282 } | 283 } |
283 | 284 |
284 std::unique_ptr<PendingCheck> check = base::MakeUnique<PendingCheck>( | 285 std::unique_ptr<PendingCheck> check = base::MakeUnique<PendingCheck>( |
285 client, ClientCallbackType::CHECK_URL_FOR_SUBRESOURCE_FILTER, | 286 client, ClientCallbackType::CHECK_URL_FOR_SUBRESOURCE_FILTER, |
286 stores_to_check, std::vector<GURL>(1, url)); | 287 stores_to_check, std::vector<GURL>(1, url)); |
287 | 288 |
288 return HandleCheck(std::move(check)); | 289 return HandleCheck(std::move(check)); |
289 } | 290 } |
(...skipping 467 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
757 db_updated_callback_); | 758 db_updated_callback_); |
758 } | 759 } |
759 | 760 |
760 bool V4LocalDatabaseManager::AreStoresAvailableNow( | 761 bool V4LocalDatabaseManager::AreStoresAvailableNow( |
761 const StoresToCheck& stores_to_check) const { | 762 const StoresToCheck& stores_to_check) const { |
762 return enabled_ && v4_database_ && | 763 return enabled_ && v4_database_ && |
763 v4_database_->AreStoresAvailable(stores_to_check); | 764 v4_database_->AreStoresAvailable(stores_to_check); |
764 } | 765 } |
765 | 766 |
766 } // namespace safe_browsing | 767 } // namespace safe_browsing |
OLD | NEW |