| OLD | NEW |
| 1 // Copyright 2017 The Chromium Authors. All rights reserved. | 1 // Copyright 2017 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/subresource_filter/content/browser/fake_safe_browsing_datab
ase_manager.h" | 5 #include "components/subresource_filter/content/browser/fake_safe_browsing_datab
ase_manager.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
| 9 #include "base/logging.h" |
| 9 #include "content/public/browser/browser_thread.h" | 10 #include "content/public/browser/browser_thread.h" |
| 10 #include "url/gurl.h" | 11 #include "url/gurl.h" |
| 11 | 12 |
| 12 FakeSafeBrowsingDatabaseManager::FakeSafeBrowsingDatabaseManager() | 13 FakeSafeBrowsingDatabaseManager::FakeSafeBrowsingDatabaseManager() |
| 13 : simulate_timeout_(false) {} | 14 : simulate_timeout_(false) {} |
| 14 | 15 |
| 15 void FakeSafeBrowsingDatabaseManager::AddBlacklistedUrl( | 16 void FakeSafeBrowsingDatabaseManager::AddBlacklistedUrl( |
| 16 const GURL& url, | 17 const GURL& url, |
| 17 safe_browsing::SBThreatType threat_type) { | 18 safe_browsing::SBThreatType threat_type) { |
| 18 url_to_threat_type_[url] = threat_type; | 19 url_to_threat_type_[url] = threat_type; |
| 19 } | 20 } |
| 20 | 21 |
| 21 void FakeSafeBrowsingDatabaseManager::SimulateTimeout() { | 22 void FakeSafeBrowsingDatabaseManager::SimulateTimeout() { |
| 22 simulate_timeout_ = true; | 23 simulate_timeout_ = true; |
| 23 } | 24 } |
| 24 | 25 |
| 25 FakeSafeBrowsingDatabaseManager::~FakeSafeBrowsingDatabaseManager() {} | 26 FakeSafeBrowsingDatabaseManager::~FakeSafeBrowsingDatabaseManager() {} |
| 26 | 27 |
| 27 bool FakeSafeBrowsingDatabaseManager::CheckUrlForSubresourceFilter( | 28 bool FakeSafeBrowsingDatabaseManager::CheckUrlForSubresourceFilter( |
| 28 const GURL& url, | 29 const GURL& url, |
| 29 Client* client) { | 30 Client* client) { |
| 30 if (simulate_timeout_) | 31 if (simulate_timeout_) |
| 31 return false; | 32 return false; |
| 32 if (!url_to_threat_type_.count(url)) | 33 if (!url_to_threat_type_.count(url)) |
| 33 return true; | 34 return true; |
| 34 | 35 |
| 36 // Enforce the invariant that a client will not send multiple requests, with |
| 37 // the subresource filter client implementation. |
| 38 DCHECK(checks_.find(client) == checks_.end()); |
| 39 checks_.insert(client); |
| 35 content::BrowserThread::PostTask( | 40 content::BrowserThread::PostTask( |
| 36 content::BrowserThread::IO, FROM_HERE, | 41 content::BrowserThread::IO, FROM_HERE, |
| 37 base::Bind(&Client::OnCheckBrowseUrlResult, base::Unretained(client), url, | 42 base::Bind(&FakeSafeBrowsingDatabaseManager:: |
| 38 url_to_threat_type_[url], safe_browsing::ThreatMetadata())); | 43 OnCheckUrlForSubresourceFilterComplete, |
| 44 base::Unretained(this), base::Unretained(client), url)); |
| 39 return false; | 45 return false; |
| 40 } | 46 } |
| 41 | 47 |
| 48 void FakeSafeBrowsingDatabaseManager::OnCheckUrlForSubresourceFilterComplete( |
| 49 Client* client, |
| 50 const GURL& url) { |
| 51 // Check to see if the request was cancelled to avoid use-after-free. |
| 52 if (checks_.find(client) == checks_.end()) |
| 53 return; |
| 54 client->OnCheckBrowseUrlResult(url, url_to_threat_type_[url], |
| 55 safe_browsing::ThreatMetadata()); |
| 56 } |
| 57 |
| 42 bool FakeSafeBrowsingDatabaseManager::CheckResourceUrl(const GURL& url, | 58 bool FakeSafeBrowsingDatabaseManager::CheckResourceUrl(const GURL& url, |
| 43 Client* client) { | 59 Client* client) { |
| 44 return true; | 60 return true; |
| 45 } | 61 } |
| 46 | 62 |
| 47 bool FakeSafeBrowsingDatabaseManager::IsSupported() const { | 63 bool FakeSafeBrowsingDatabaseManager::IsSupported() const { |
| 48 return true; | 64 return true; |
| 49 } | 65 } |
| 50 bool FakeSafeBrowsingDatabaseManager::ChecksAreAlwaysAsync() const { | 66 bool FakeSafeBrowsingDatabaseManager::ChecksAreAlwaysAsync() const { |
| 51 return false; | 67 return false; |
| 52 } | 68 } |
| 53 void FakeSafeBrowsingDatabaseManager::CancelCheck(Client* client) {} | 69 void FakeSafeBrowsingDatabaseManager::CancelCheck(Client* client) { |
| 70 checks_.erase(client); |
| 71 } |
| 54 bool FakeSafeBrowsingDatabaseManager::CanCheckResourceType( | 72 bool FakeSafeBrowsingDatabaseManager::CanCheckResourceType( |
| 55 content::ResourceType /* resource_type */) const { | 73 content::ResourceType /* resource_type */) const { |
| 56 return true; | 74 return true; |
| 57 } | 75 } |
| 58 | 76 |
| 59 safe_browsing::ThreatSource FakeSafeBrowsingDatabaseManager::GetThreatSource() | 77 safe_browsing::ThreatSource FakeSafeBrowsingDatabaseManager::GetThreatSource() |
| 60 const { | 78 const { |
| 61 return safe_browsing::ThreatSource::LOCAL_PVER4; | 79 return safe_browsing::ThreatSource::LOCAL_PVER4; |
| 62 } | 80 } |
| 63 | 81 |
| 64 bool FakeSafeBrowsingDatabaseManager::CheckExtensionIDs( | 82 bool FakeSafeBrowsingDatabaseManager::CheckExtensionIDs( |
| 65 const std::set<std::string>& extension_ids, | 83 const std::set<std::string>& extension_ids, |
| 66 Client* client) { | 84 Client* client) { |
| 67 return true; | 85 return true; |
| 68 } | 86 } |
| OLD | NEW |