OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file should not be build on Android but is currently getting built. | 5 // This file should not be build on Android but is currently getting built. |
6 // TODO(vakh): Fix that: http://crbug.com/621647 | 6 // TODO(vakh): Fix that: http://crbug.com/621647 |
7 | 7 |
8 #include "components/safe_browsing_db/v4_local_database_manager.h" | 8 #include "components/safe_browsing_db/v4_local_database_manager.h" |
9 | 9 |
10 #include <vector> | 10 #include <vector> |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
62 GetUrlCsdWhitelistId(), SB_THREAT_TYPE_CSD_WHITELIST), | 62 GetUrlCsdWhitelistId(), SB_THREAT_TYPE_CSD_WHITELIST), |
63 ListInfo(kSyncAlways, "UrlSoceng.store", GetUrlSocEngId(), | 63 ListInfo(kSyncAlways, "UrlSoceng.store", GetUrlSocEngId(), |
64 SB_THREAT_TYPE_URL_PHISHING), | 64 SB_THREAT_TYPE_URL_PHISHING), |
65 ListInfo(kSyncAlways, "UrlMalware.store", GetUrlMalwareId(), | 65 ListInfo(kSyncAlways, "UrlMalware.store", GetUrlMalwareId(), |
66 SB_THREAT_TYPE_URL_MALWARE), | 66 SB_THREAT_TYPE_URL_MALWARE), |
67 ListInfo(kSyncAlways, "UrlUws.store", GetUrlUwsId(), | 67 ListInfo(kSyncAlways, "UrlUws.store", GetUrlUwsId(), |
68 SB_THREAT_TYPE_URL_UNWANTED), | 68 SB_THREAT_TYPE_URL_UNWANTED), |
69 // The GetUrlMalBinId list is not working for non-GoogleChrome builds | 69 // The GetUrlMalBinId list is not working for non-GoogleChrome builds |
70 // currently so making it Chrome-only. See: http://crbug.com/728757 | 70 // currently so making it Chrome-only. See: http://crbug.com/728757 |
71 ListInfo(kSyncOnlyOnChromeBuilds, "UrlMalBin.store", GetUrlMalBinId(), | 71 ListInfo(kSyncOnlyOnChromeBuilds, "UrlMalBin.store", GetUrlMalBinId(), |
72 SB_THREAT_TYPE_BINARY_MALWARE_URL), | 72 SB_THREAT_TYPE_URL_BINARY_MALWARE), |
73 ListInfo(kSyncAlways, "ChromeExtMalware.store", GetChromeExtMalwareId(), | 73 ListInfo(kSyncAlways, "ChromeExtMalware.store", GetChromeExtMalwareId(), |
74 SB_THREAT_TYPE_EXTENSION), | 74 SB_THREAT_TYPE_EXTENSION), |
75 ListInfo(kSyncOnlyOnChromeBuilds, "ChromeUrlClientIncident.store", | 75 ListInfo(kSyncOnlyOnChromeBuilds, "ChromeUrlClientIncident.store", |
76 GetChromeUrlClientIncidentId(), | 76 GetChromeUrlClientIncidentId(), |
77 SB_THREAT_TYPE_BLACKLISTED_RESOURCE), | 77 SB_THREAT_TYPE_BLACKLISTED_RESOURCE), |
78 ListInfo(kSyncNever, "", GetChromeUrlApiId(), SB_THREAT_TYPE_API_ABUSE), | 78 ListInfo(kSyncNever, "", GetChromeUrlApiId(), SB_THREAT_TYPE_API_ABUSE), |
79 ListInfo(kSyncOnlyOnChromeBuilds, "UrlSubresourceFilter.store", | 79 ListInfo(kSyncOnlyOnChromeBuilds, "UrlSubresourceFilter.store", |
80 GetUrlSubresourceFilterId(), SB_THREAT_TYPE_SUBRESOURCE_FILTER), | 80 GetUrlSubresourceFilterId(), SB_THREAT_TYPE_SUBRESOURCE_FILTER), |
81 }); | 81 }); |
82 // NOTE(vakh): IMPORTANT: Please make sure that the server already supports | 82 // NOTE(vakh): IMPORTANT: Please make sure that the server already supports |
(...skipping 748 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
831 v4_database_->AreAllStoresAvailable(stores_to_check); | 831 v4_database_->AreAllStoresAvailable(stores_to_check); |
832 } | 832 } |
833 | 833 |
834 bool V4LocalDatabaseManager::AreAnyStoresAvailableNow( | 834 bool V4LocalDatabaseManager::AreAnyStoresAvailableNow( |
835 const StoresToCheck& stores_to_check) const { | 835 const StoresToCheck& stores_to_check) const { |
836 return enabled_ && v4_database_ && | 836 return enabled_ && v4_database_ && |
837 v4_database_->AreAnyStoresAvailable(stores_to_check); | 837 v4_database_->AreAnyStoresAvailable(stores_to_check); |
838 } | 838 } |
839 | 839 |
840 } // namespace safe_browsing | 840 } // namespace safe_browsing |
OLD | NEW |