OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/download/chrome_download_manager_delegate.h" | 5 #include "chrome/browser/download/chrome_download_manager_delegate.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/basictypes.h" | 9 #include "base/basictypes.h" |
10 #include "base/bind.h" | 10 #include "base/bind.h" |
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
71 | 71 |
72 #if defined(FULL_SAFE_BROWSING) | 72 #if defined(FULL_SAFE_BROWSING) |
73 | 73 |
74 // String pointer used for identifying safebrowing data associated with | 74 // String pointer used for identifying safebrowing data associated with |
75 // a download item. | 75 // a download item. |
76 const char kSafeBrowsingUserDataKey[] = "Safe Browsing ID"; | 76 const char kSafeBrowsingUserDataKey[] = "Safe Browsing ID"; |
77 | 77 |
78 // The state of a safebrowsing check. | 78 // The state of a safebrowsing check. |
79 class SafeBrowsingState : public DownloadCompletionBlocker { | 79 class SafeBrowsingState : public DownloadCompletionBlocker { |
80 public: | 80 public: |
81 SafeBrowsingState() | 81 SafeBrowsingState() {} |
82 : verdict_(DownloadProtectionService::SAFE) { | |
83 } | |
84 | |
85 virtual ~SafeBrowsingState(); | 82 virtual ~SafeBrowsingState(); |
86 | 83 |
87 // The verdict that we got from calling CheckClientDownload. Only valid to | |
88 // call if |is_complete()|. | |
89 DownloadProtectionService::DownloadCheckResult verdict() const { | |
90 return verdict_; | |
91 } | |
92 | |
93 void SetVerdict(DownloadProtectionService::DownloadCheckResult result) { | |
94 verdict_ = result; | |
95 CompleteDownload(); | |
96 } | |
97 | |
98 private: | 84 private: |
99 DownloadProtectionService::DownloadCheckResult verdict_; | |
100 | |
101 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingState); | 85 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingState); |
102 }; | 86 }; |
103 | 87 |
104 SafeBrowsingState::~SafeBrowsingState() {} | 88 SafeBrowsingState::~SafeBrowsingState() {} |
105 | 89 |
106 #endif // FULL_SAFE_BROWSING | 90 #endif // FULL_SAFE_BROWSING |
107 | 91 |
108 // Used with GetPlatformDownloadPath() to indicate which platform path to | 92 // Used with GetPlatformDownloadPath() to indicate which platform path to |
109 // return. | 93 // return. |
110 enum PlatformDownloadPathType { | 94 enum PlatformDownloadPathType { |
(...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
152 // Danger type is (in order of preference): | 136 // Danger type is (in order of preference): |
153 // * DANGEROUS_URL, if the URL is a known malware site. | 137 // * DANGEROUS_URL, if the URL is a known malware site. |
154 // * MAYBE_DANGEROUS_CONTENT, if the content will be scanned for | 138 // * MAYBE_DANGEROUS_CONTENT, if the content will be scanned for |
155 // malware. I.e. |is_content_check_supported| is true. | 139 // malware. I.e. |is_content_check_supported| is true. |
156 // * NOT_DANGEROUS. | 140 // * NOT_DANGEROUS. |
157 void CheckDownloadUrlDone( | 141 void CheckDownloadUrlDone( |
158 const DownloadTargetDeterminerDelegate::CheckDownloadUrlCallback& callback, | 142 const DownloadTargetDeterminerDelegate::CheckDownloadUrlCallback& callback, |
159 bool is_content_check_supported, | 143 bool is_content_check_supported, |
160 DownloadProtectionService::DownloadCheckResult result) { | 144 DownloadProtectionService::DownloadCheckResult result) { |
161 content::DownloadDangerType danger_type; | 145 content::DownloadDangerType danger_type; |
162 if (result == DownloadProtectionService::SAFE) { | 146 if (result == DownloadProtectionService::SAFE || |
| 147 result == DownloadProtectionService::UNKNOWN) { |
163 // If this type of files is handled by the enhanced SafeBrowsing download | 148 // If this type of files is handled by the enhanced SafeBrowsing download |
164 // protection, mark it as potentially dangerous content until we are done | 149 // protection, mark it as potentially dangerous content until we are done |
165 // with scanning it. | 150 // with scanning it. |
166 if (is_content_check_supported) | 151 if (is_content_check_supported) |
167 danger_type = content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT; | 152 danger_type = content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT; |
168 else | 153 else |
169 danger_type = content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS; | 154 danger_type = content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS; |
170 } else { | 155 } else { |
171 // If the URL is malicious, we'll use that as the danger type. The results | 156 // If the URL is malicious, we'll use that as the danger type. The results |
172 // of the content check, if one is performed, will be ignored. | 157 // of the content check, if one is performed, will be ignored. |
(...skipping 113 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
286 // static | 271 // static |
287 void ChromeDownloadManagerDelegate::DisableSafeBrowsing(DownloadItem* item) { | 272 void ChromeDownloadManagerDelegate::DisableSafeBrowsing(DownloadItem* item) { |
288 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 273 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
289 #if defined(FULL_SAFE_BROWSING) | 274 #if defined(FULL_SAFE_BROWSING) |
290 SafeBrowsingState* state = static_cast<SafeBrowsingState*>( | 275 SafeBrowsingState* state = static_cast<SafeBrowsingState*>( |
291 item->GetUserData(&kSafeBrowsingUserDataKey)); | 276 item->GetUserData(&kSafeBrowsingUserDataKey)); |
292 if (!state) { | 277 if (!state) { |
293 state = new SafeBrowsingState(); | 278 state = new SafeBrowsingState(); |
294 item->SetUserData(&kSafeBrowsingUserDataKey, state); | 279 item->SetUserData(&kSafeBrowsingUserDataKey, state); |
295 } | 280 } |
296 state->SetVerdict(DownloadProtectionService::SAFE); | 281 state->CompleteDownload(); |
297 #endif | 282 #endif |
298 } | 283 } |
299 | 284 |
300 bool ChromeDownloadManagerDelegate::IsDownloadReadyForCompletion( | 285 bool ChromeDownloadManagerDelegate::IsDownloadReadyForCompletion( |
301 DownloadItem* item, | 286 DownloadItem* item, |
302 const base::Closure& internal_complete_callback) { | 287 const base::Closure& internal_complete_callback) { |
303 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 288 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
304 #if defined(FULL_SAFE_BROWSING) | 289 #if defined(FULL_SAFE_BROWSING) |
305 SafeBrowsingState* state = static_cast<SafeBrowsingState*>( | 290 SafeBrowsingState* state = static_cast<SafeBrowsingState*>( |
306 item->GetUserData(&kSafeBrowsingUserDataKey)); | 291 item->GetUserData(&kSafeBrowsingUserDataKey)); |
307 if (!state) { | 292 if (!state) { |
308 // Begin the safe browsing download protection check. | 293 // Begin the safe browsing download protection check. |
309 DownloadProtectionService* service = GetDownloadProtectionService(); | 294 DownloadProtectionService* service = GetDownloadProtectionService(); |
310 if (service) { | 295 if (service) { |
311 VLOG(2) << __FUNCTION__ << "() Start SB download check for download = " | 296 VLOG(2) << __FUNCTION__ << "() Start SB download check for download = " |
312 << item->DebugString(false); | 297 << item->DebugString(false); |
313 state = new SafeBrowsingState(); | 298 state = new SafeBrowsingState(); |
314 state->set_callback(internal_complete_callback); | 299 state->set_callback(internal_complete_callback); |
315 item->SetUserData(&kSafeBrowsingUserDataKey, state); | 300 item->SetUserData(&kSafeBrowsingUserDataKey, state); |
316 service->CheckClientDownload( | 301 service->CheckClientDownload( |
317 item, | 302 item, |
318 base::Bind( | 303 base::Bind(&ChromeDownloadManagerDelegate::CheckClientDownloadDone, |
319 &ChromeDownloadManagerDelegate::CheckClientDownloadDone, | 304 weak_ptr_factory_.GetWeakPtr(), |
320 weak_ptr_factory_.GetWeakPtr(), | 305 item->GetId())); |
321 item->GetId())); | 306 return false; |
| 307 } |
| 308 |
| 309 // In case the service was disabled between the download starting and now, |
| 310 // we need to restore the danger state. |
| 311 content::DownloadDangerType danger_type = item->GetDangerType(); |
| 312 if (DownloadItemModel(item).IsDangerousFileBasedOnType() && |
| 313 (danger_type == content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS || |
| 314 danger_type == |
| 315 content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT)) { |
| 316 DVLOG(2) << __FUNCTION__ |
| 317 << "() SB service disabled. Marking download as DANGEROUS FILE"; |
| 318 item->OnContentCheckCompleted( |
| 319 content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE); |
| 320 content::BrowserThread::PostTask( |
| 321 content::BrowserThread::UI, FROM_HERE, internal_complete_callback); |
322 return false; | 322 return false; |
323 } | 323 } |
324 } else if (!state->is_complete()) { | 324 } else if (!state->is_complete()) { |
325 // Don't complete the download until we have an answer. | 325 // Don't complete the download until we have an answer. |
326 state->set_callback(internal_complete_callback); | 326 state->set_callback(internal_complete_callback); |
327 return false; | 327 return false; |
328 } | 328 } |
| 329 |
329 #endif | 330 #endif |
330 return true; | 331 return true; |
331 } | 332 } |
332 | 333 |
333 void ChromeDownloadManagerDelegate::ShouldCompleteDownloadInternal( | 334 void ChromeDownloadManagerDelegate::ShouldCompleteDownloadInternal( |
334 uint32 download_id, | 335 uint32 download_id, |
335 const base::Closure& user_complete_callback) { | 336 const base::Closure& user_complete_callback) { |
336 DownloadItem* item = download_manager_->GetDownload(download_id); | 337 DownloadItem* item = download_manager_->GetDownload(download_id); |
337 if (!item) | 338 if (!item) |
338 return; | 339 return; |
(...skipping 290 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
629 VLOG(2) << __FUNCTION__ << "() download = " << item->DebugString(false) | 630 VLOG(2) << __FUNCTION__ << "() download = " << item->DebugString(false) |
630 << " verdict = " << result; | 631 << " verdict = " << result; |
631 // We only mark the content as being dangerous if the download's safety state | 632 // We only mark the content as being dangerous if the download's safety state |
632 // has not been set to DANGEROUS yet. We don't want to show two warnings. | 633 // has not been set to DANGEROUS yet. We don't want to show two warnings. |
633 if (item->GetDangerType() == content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS || | 634 if (item->GetDangerType() == content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS || |
634 item->GetDangerType() == | 635 item->GetDangerType() == |
635 content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT) { | 636 content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT) { |
636 content::DownloadDangerType danger_type = | 637 content::DownloadDangerType danger_type = |
637 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS; | 638 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS; |
638 switch (result) { | 639 switch (result) { |
| 640 case DownloadProtectionService::UNKNOWN: |
| 641 // The check failed or was inconclusive. |
| 642 if (DownloadItemModel(item).IsDangerousFileBasedOnType()) |
| 643 danger_type = content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE; |
| 644 break; |
639 case DownloadProtectionService::SAFE: | 645 case DownloadProtectionService::SAFE: |
640 // Do nothing. | 646 // Do nothing. |
641 break; | 647 break; |
642 case DownloadProtectionService::DANGEROUS: | 648 case DownloadProtectionService::DANGEROUS: |
643 danger_type = content::DOWNLOAD_DANGER_TYPE_DANGEROUS_CONTENT; | 649 danger_type = content::DOWNLOAD_DANGER_TYPE_DANGEROUS_CONTENT; |
644 break; | 650 break; |
645 case DownloadProtectionService::UNCOMMON: | 651 case DownloadProtectionService::UNCOMMON: |
646 danger_type = content::DOWNLOAD_DANGER_TYPE_UNCOMMON_CONTENT; | 652 danger_type = content::DOWNLOAD_DANGER_TYPE_UNCOMMON_CONTENT; |
647 break; | 653 break; |
648 case DownloadProtectionService::DANGEROUS_HOST: | 654 case DownloadProtectionService::DANGEROUS_HOST: |
649 danger_type = content::DOWNLOAD_DANGER_TYPE_DANGEROUS_HOST; | 655 danger_type = content::DOWNLOAD_DANGER_TYPE_DANGEROUS_HOST; |
650 break; | 656 break; |
651 case DownloadProtectionService::POTENTIALLY_UNWANTED: | 657 case DownloadProtectionService::POTENTIALLY_UNWANTED: |
652 danger_type = content::DOWNLOAD_DANGER_TYPE_POTENTIALLY_UNWANTED; | 658 danger_type = content::DOWNLOAD_DANGER_TYPE_POTENTIALLY_UNWANTED; |
653 break; | 659 break; |
654 } | 660 } |
655 | 661 |
656 if (danger_type != content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS) | 662 if (danger_type != content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS) |
657 item->OnContentCheckCompleted(danger_type); | 663 item->OnContentCheckCompleted(danger_type); |
658 } | 664 } |
659 | 665 |
660 SafeBrowsingState* state = static_cast<SafeBrowsingState*>( | 666 SafeBrowsingState* state = static_cast<SafeBrowsingState*>( |
661 item->GetUserData(&kSafeBrowsingUserDataKey)); | 667 item->GetUserData(&kSafeBrowsingUserDataKey)); |
662 state->SetVerdict(result); | 668 state->CompleteDownload(); |
663 } | 669 } |
664 #endif // FULL_SAFE_BROWSING | 670 #endif // FULL_SAFE_BROWSING |
665 | 671 |
666 // content::NotificationObserver implementation. | 672 // content::NotificationObserver implementation. |
667 void ChromeDownloadManagerDelegate::Observe( | 673 void ChromeDownloadManagerDelegate::Observe( |
668 int type, | 674 int type, |
669 const content::NotificationSource& source, | 675 const content::NotificationSource& source, |
670 const content::NotificationDetails& details) { | 676 const content::NotificationDetails& details) { |
671 #if defined(ENABLE_EXTENSIONS) | 677 #if defined(ENABLE_EXTENSIONS) |
672 DCHECK(type == extensions::NOTIFICATION_CRX_INSTALLER_DONE); | 678 DCHECK(type == extensions::NOTIFICATION_CRX_INSTALLER_DONE); |
673 | 679 |
674 registrar_.Remove(this, extensions::NOTIFICATION_CRX_INSTALLER_DONE, source); | 680 registrar_.Remove(this, extensions::NOTIFICATION_CRX_INSTALLER_DONE, source); |
675 | 681 |
676 scoped_refptr<extensions::CrxInstaller> installer = | 682 scoped_refptr<extensions::CrxInstaller> installer = |
677 content::Source<extensions::CrxInstaller>(source).ptr(); | 683 content::Source<extensions::CrxInstaller>(source).ptr(); |
678 content::DownloadOpenDelayedCallback callback = | 684 content::DownloadOpenDelayedCallback callback = |
679 crx_installers_[installer.get()]; | 685 crx_installers_[installer.get()]; |
680 crx_installers_.erase(installer.get()); | 686 crx_installers_.erase(installer.get()); |
681 callback.Run(installer->did_handle_successfully()); | 687 callback.Run(installer->did_handle_successfully()); |
682 #endif | 688 #endif |
683 } | 689 } |
684 | 690 |
685 void ChromeDownloadManagerDelegate::OnDownloadTargetDetermined( | 691 void ChromeDownloadManagerDelegate::OnDownloadTargetDetermined( |
686 int32 download_id, | 692 int32 download_id, |
687 const content::DownloadTargetCallback& callback, | 693 const content::DownloadTargetCallback& callback, |
688 scoped_ptr<DownloadTargetInfo> target_info) { | 694 scoped_ptr<DownloadTargetInfo> target_info) { |
689 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 695 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
690 DownloadItem* item = download_manager_->GetDownload(download_id); | 696 DownloadItem* item = download_manager_->GetDownload(download_id); |
691 if (!target_info->target_path.empty() && item && | 697 if (item) { |
692 IsOpenInBrowserPreferreredForFile(target_info->target_path) && | 698 if (!target_info->target_path.empty() && |
693 target_info->is_filetype_handled_safely) | 699 IsOpenInBrowserPreferreredForFile(target_info->target_path) && |
694 DownloadItemModel(item).SetShouldPreferOpeningInBrowser(true); | 700 target_info->is_filetype_handled_safely) |
| 701 DownloadItemModel(item).SetShouldPreferOpeningInBrowser(true); |
| 702 |
| 703 if (target_info->is_dangerous_file) |
| 704 DownloadItemModel(item).SetIsDangerousFileBasedOnType(true); |
| 705 } |
695 callback.Run(target_info->target_path, | 706 callback.Run(target_info->target_path, |
696 target_info->target_disposition, | 707 target_info->target_disposition, |
697 target_info->danger_type, | 708 target_info->danger_type, |
698 target_info->intermediate_path); | 709 target_info->intermediate_path); |
699 } | 710 } |
700 | 711 |
701 bool ChromeDownloadManagerDelegate::IsOpenInBrowserPreferreredForFile( | 712 bool ChromeDownloadManagerDelegate::IsOpenInBrowserPreferreredForFile( |
702 const base::FilePath& path) { | 713 const base::FilePath& path) { |
703 // On Windows, PDFs should open in Acrobat Reader if the user chooses. | 714 // On Windows, PDFs should open in Acrobat Reader if the user chooses. |
704 #if defined(OS_WIN) | 715 #if defined(OS_WIN) |
(...skipping 17 matching lines...) Expand all Loading... |
722 path.MatchesExtension(FILE_PATH_LITERAL(".xht")) || | 733 path.MatchesExtension(FILE_PATH_LITERAL(".xht")) || |
723 path.MatchesExtension(FILE_PATH_LITERAL(".xhtm")) || | 734 path.MatchesExtension(FILE_PATH_LITERAL(".xhtm")) || |
724 path.MatchesExtension(FILE_PATH_LITERAL(".xhtml")) || | 735 path.MatchesExtension(FILE_PATH_LITERAL(".xhtml")) || |
725 path.MatchesExtension(FILE_PATH_LITERAL(".xsl")) || | 736 path.MatchesExtension(FILE_PATH_LITERAL(".xsl")) || |
726 path.MatchesExtension(FILE_PATH_LITERAL(".xslt"))) { | 737 path.MatchesExtension(FILE_PATH_LITERAL(".xslt"))) { |
727 return true; | 738 return true; |
728 } | 739 } |
729 #endif | 740 #endif |
730 return false; | 741 return false; |
731 } | 742 } |
OLD | NEW |