Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(40)

Side by Side Diff: chrome/browser/ssl/chrome_ssl_host_state_delegate.h

Issue 450833002: Add additional UMA stats for remembering certificate decisions. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase on ToT Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CHROME_BROWSER_SSL_CHROME_SSL_HOST_STATE_DELEGATE_H_ 5 #ifndef CHROME_BROWSER_SSL_CHROME_SSL_HOST_STATE_DELEGATE_H_
6 #define CHROME_BROWSER_SSL_CHROME_SSL_HOST_STATE_DELEGATE_H_ 6 #define CHROME_BROWSER_SSL_CHROME_SSL_HOST_STATE_DELEGATE_H_
7 7
8 #include "base/gtest_prod_util.h" 8 #include "base/gtest_prod_util.h"
9 #include "base/memory/scoped_ptr.h" 9 #include "base/memory/scoped_ptr.h"
10 #include "base/time/time.h" 10 #include "base/time/time.h"
(...skipping 17 matching lines...) Expand all
28 virtual ~ChromeSSLHostStateDelegate(); 28 virtual ~ChromeSSLHostStateDelegate();
29 29
30 // SSLHostStateDelegate: 30 // SSLHostStateDelegate:
31 virtual void DenyCert(const std::string& host, 31 virtual void DenyCert(const std::string& host,
32 net::X509Certificate* cert, 32 net::X509Certificate* cert,
33 net::CertStatus error) OVERRIDE; 33 net::CertStatus error) OVERRIDE;
34 virtual void AllowCert(const std::string& host, 34 virtual void AllowCert(const std::string& host,
35 net::X509Certificate* cert, 35 net::X509Certificate* cert,
36 net::CertStatus error) OVERRIDE; 36 net::CertStatus error) OVERRIDE;
37 virtual void Clear() OVERRIDE; 37 virtual void Clear() OVERRIDE;
38 virtual net::CertPolicy::Judgment QueryPolicy(const std::string& host, 38 virtual net::CertPolicy::Judgment QueryPolicy(
39 net::X509Certificate* cert, 39 const std::string& host,
40 net::CertStatus error) OVERRIDE; 40 net::X509Certificate* cert,
41 net::CertStatus error,
42 bool* expired_previous_decision) OVERRIDE;
41 virtual void HostRanInsecureContent(const std::string& host, 43 virtual void HostRanInsecureContent(const std::string& host,
42 int pid) OVERRIDE; 44 int pid) OVERRIDE;
43 virtual bool DidHostRunInsecureContent(const std::string& host, 45 virtual bool DidHostRunInsecureContent(const std::string& host,
44 int pid) const OVERRIDE; 46 int pid) const OVERRIDE;
45 47
46 // ChromeSSLHostStateDelegate implementation: 48 // ChromeSSLHostStateDelegate implementation:
47 // Revoke all user decisions for |host| in the given Profile. The 49 // Revoke all user decisions for |host| in the given Profile. The
48 // RevokeUserDecisionsHard version may close idle connections in the process. 50 // RevokeUserDecisionsHard version may close idle connections in the process.
49 // This version should be used *only* for rare events, such as a user 51 // This version should be used *only* for rare events, such as a user
50 // controlled button, as it may be very disruptive to the networking stack. 52 // controlled button, as it may be very disruptive to the networking stack.
51 virtual void RevokeUserDecisions(const std::string& host); 53 virtual void RevokeUserDecisions(const std::string& host);
52 virtual void RevokeUserDecisionsHard(const std::string& host); 54 virtual void RevokeUserDecisionsHard(const std::string& host);
53 55
54 // Returns true if any decisions has been recorded for |host| for the given 56 // Returns true if any decisions has been recorded for |host| for the given
55 // Profile, otherwise false. 57 // Profile, otherwise false.
56 virtual bool HasUserDecision(const std::string& host); 58 virtual bool HasUserDecision(const std::string& host);
57 59
58 // Called on the UI thread when the profile is about to be destroyed. 60 // Called on the UI thread when the profile is about to be destroyed.
59 void ShutdownOnUIThread() {} 61 void ShutdownOnUIThread() {}
60 62
61 protected: 63 protected:
62 // SetClock takes ownership of the passed in clock. 64 // SetClock takes ownership of the passed in clock.
63 void SetClock(scoped_ptr<base::Clock> clock); 65 void SetClock(scoped_ptr<base::Clock> clock);
64 66
65 private: 67 private:
66 FRIEND_TEST_ALL_PREFIXES(ForgetInstantlySSLHostStateDelegateTest, 68 FRIEND_TEST_ALL_PREFIXES(ForgetInstantlySSLHostStateDelegateTest,
67 MakeAndForgetException); 69 MakeAndForgetException);
68 FRIEND_TEST_ALL_PREFIXES(RememberSSLHostStateDelegateTest, AfterRestart); 70 FRIEND_TEST_ALL_PREFIXES(RememberSSLHostStateDelegateTest, AfterRestart);
71 FRIEND_TEST_ALL_PREFIXES(RememberSSLHostStateDelegateTest,
72 QueryPolicyExpired);
69 73
70 // Used to specify whether new content setting entries should be created if 74 // Used to specify whether new content setting entries should be created if
71 // they don't already exist when querying the user's settings. 75 // they don't already exist when querying the user's settings.
72 enum CreateDictionaryEntriesDisposition { 76 enum CreateDictionaryEntriesDisposition {
73 CreateDictionaryEntries, 77 CreateDictionaryEntries,
74 DoNotCreateDictionaryEntries 78 DoNotCreateDictionaryEntries
75 }; 79 };
76 80
77 // Specifies whether user SSL error decisions should be forgetten at the end 81 // Specifies whether user SSL error decisions should be forgetten at the end
78 // of this current session (the old style of remembering decisions), or 82 // of this current session (the old style of remembering decisions), or
(...skipping 19 matching lines...) Expand all
98 // ChangeCertPolicy. Returns NULL on a failure. 102 // ChangeCertPolicy. Returns NULL on a failure.
99 // 103 //
100 // |dict| specifies the user's full exceptions dictionary for a specific site 104 // |dict| specifies the user's full exceptions dictionary for a specific site
101 // in their content settings. Must be retrieved directly from a website 105 // in their content settings. Must be retrieved directly from a website
102 // setting in the the profile's HostContentSettingsMap. 106 // setting in the the profile's HostContentSettingsMap.
103 // 107 //
104 // If |create_entries| specifies CreateDictionaryEntries, then 108 // If |create_entries| specifies CreateDictionaryEntries, then
105 // GetValidCertDecisionsDict will create a new set of entries within the 109 // GetValidCertDecisionsDict will create a new set of entries within the
106 // dictionary if they do not already exist. Otherwise will fail and return if 110 // dictionary if they do not already exist. Otherwise will fail and return if
107 // NULL if they do not exist. 111 // NULL if they do not exist.
112 //
113 // |expired_previous_decision| is set to true if there had been a previous
114 // decision made by the user but it has expired. Otherwise it is set to false.
108 base::DictionaryValue* GetValidCertDecisionsDict( 115 base::DictionaryValue* GetValidCertDecisionsDict(
109 base::DictionaryValue* dict, 116 base::DictionaryValue* dict,
110 CreateDictionaryEntriesDisposition create_entries); 117 CreateDictionaryEntriesDisposition create_entries,
118 bool* expired_previous_decision);
111 119
112 scoped_ptr<base::Clock> clock_; 120 scoped_ptr<base::Clock> clock_;
113 RememberSSLExceptionDecisionsDisposition should_remember_ssl_decisions_; 121 RememberSSLExceptionDecisionsDisposition should_remember_ssl_decisions_;
114 base::TimeDelta default_ssl_cert_decision_expiration_delta_; 122 base::TimeDelta default_ssl_cert_decision_expiration_delta_;
115 Profile* profile_; 123 Profile* profile_;
116 124
117 // A BrokenHostEntry is a pair of (host, process_id) that indicates the host 125 // A BrokenHostEntry is a pair of (host, process_id) that indicates the host
118 // contains insecure content in that renderer process. 126 // contains insecure content in that renderer process.
119 typedef std::pair<std::string, int> BrokenHostEntry; 127 typedef std::pair<std::string, int> BrokenHostEntry;
120 128
121 // Hosts which have been contaminated with insecure content in the 129 // Hosts which have been contaminated with insecure content in the
122 // specified process. Note that insecure content can travel between 130 // specified process. Note that insecure content can travel between
123 // same-origin frames in one processs but cannot jump between processes. 131 // same-origin frames in one processs but cannot jump between processes.
124 std::set<BrokenHostEntry> ran_insecure_content_hosts_; 132 std::set<BrokenHostEntry> ran_insecure_content_hosts_;
125 133
126 DISALLOW_COPY_AND_ASSIGN(ChromeSSLHostStateDelegate); 134 DISALLOW_COPY_AND_ASSIGN(ChromeSSLHostStateDelegate);
127 }; 135 };
128 136
129 #endif // CHROME_BROWSER_SSL_CHROME_SSL_HOST_STATE_DELEGATE_H_ 137 #endif // CHROME_BROWSER_SSL_CHROME_SSL_HOST_STATE_DELEGATE_H_
OLDNEW
« no previous file with comments | « chrome/browser/chrome_content_browser_client.cc ('k') | chrome/browser/ssl/chrome_ssl_host_state_delegate.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698