Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(402)

Side by Side Diff: components/password_manager/content/browser/credential_manager_dispatcher.cc

Issue 886793002: Credential Manager: Introduce PendingRequestTask. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@notifysignedout
Patch Set: Feedback. Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « components/password_manager/content/browser/credential_manager_dispatcher.h ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "components/password_manager/content/browser/credential_manager_dispatc her.h" 5 #include "components/password_manager/content/browser/credential_manager_dispatc her.h"
6 6
7 #include "base/bind.h" 7 #include "base/bind.h"
8 #include "base/memory/scoped_vector.h" 8 #include "base/memory/scoped_vector.h"
9 #include "base/strings/string16.h" 9 #include "base/strings/string16.h"
10 #include "base/strings/utf_string_conversions.h" 10 #include "base/strings/utf_string_conversions.h"
11 #include "components/autofill/core/common/password_form.h" 11 #include "components/autofill/core/common/password_form.h"
12 #include "components/password_manager/content/browser/content_password_manager_d river.h" 12 #include "components/password_manager/content/browser/content_password_manager_d river.h"
13 #include "components/password_manager/content/browser/content_password_manager_d river_factory.h" 13 #include "components/password_manager/content/browser/content_password_manager_d river_factory.h"
14 #include "components/password_manager/content/browser/credential_manager_passwor d_form_manager.h" 14 #include "components/password_manager/content/browser/credential_manager_passwor d_form_manager.h"
15 #include "components/password_manager/content/common/credential_manager_messages .h" 15 #include "components/password_manager/content/common/credential_manager_messages .h"
16 #include "components/password_manager/content/common/credential_manager_types.h" 16 #include "components/password_manager/content/common/credential_manager_types.h"
17 #include "components/password_manager/core/browser/password_manager_client.h" 17 #include "components/password_manager/core/browser/password_manager_client.h"
18 #include "components/password_manager/core/browser/password_store.h" 18 #include "components/password_manager/core/browser/password_store.h"
19 #include "content/public/browser/render_view_host.h" 19 #include "content/public/browser/render_view_host.h"
20 #include "content/public/browser/web_contents.h" 20 #include "content/public/browser/web_contents.h"
21 #include "ipc/ipc_message_macros.h" 21 #include "ipc/ipc_message_macros.h"
22 22
23 namespace password_manager { 23 namespace password_manager {
24 24
25 struct CredentialManagerDispatcher::PendingRequestParameters { 25 class CredentialManagerDispatcher::PendingRequestTask
26 PendingRequestParameters(int request_id, 26 : public PasswordStoreConsumer {
27 bool request_zero_click_only, 27 public:
28 GURL request_origin, 28 PendingRequestTask(CredentialManagerDispatcher* const dispatcher,
29 const std::vector<GURL>& request_federations) 29 int request_id,
30 : id(request_id), 30 bool request_zero_click_only,
31 zero_click_only(request_zero_click_only), 31 const GURL& request_origin,
32 origin(request_origin), 32 const std::vector<GURL>& request_federations)
33 federations(request_federations) {} 33 : dispatcher_(dispatcher),
34 id_(request_id),
35 zero_click_only_(request_zero_click_only),
36 origin_(request_origin) {
37 for (const GURL& origin : request_federations)
vabr (Chromium) 2015/01/30 12:54:19 If this is possible in the IPC framework we have,
38 federations_.insert(origin.spec());
39 }
34 40
35 int id; 41 int id() const { return id_; }
36 bool zero_click_only; 42
37 GURL origin; 43 // PasswordStoreConsumer implementation.
38 std::vector<GURL> federations; 44 void OnGetPasswordStoreResults(
45 const std::vector<autofill::PasswordForm*>& results) override {
46 // We own the PasswordForm instances, so we're responsible for cleaning
47 // up the instances we don't add to |local_results| or |federated_results|.
48 std::vector<autofill::PasswordForm*> local_results;
vabr (Chromium) 2015/01/30 12:54:19 Consider using ScopedVector for both these vectors
49 std::vector<autofill::PasswordForm*> federated_results;
50 for (autofill::PasswordForm* form : results) {
51 if (form->origin == origin_)
52 local_results.push_back(form);
53 else if (federations_.count(form->origin.spec()))
54 federated_results.push_back(form);
55 else
56 delete form;
57 }
58
59 if ((local_results.empty() && federated_results.empty()) ||
60 dispatcher_->web_contents()->GetLastCommittedURL().GetOrigin() !=
61 origin_) {
62 dispatcher_->SendCredential(id_, CredentialInfo());
63 return;
64 }
65 if (local_results.size() == 1 && dispatcher_->IsZeroClickAllowed()) {
66 // TODO(mkwst): Use the `one_time_disable_zero_click` flag on the result
67 // to prevent auto-sign-in, once that flag is implemented.
68 CredentialInfo info(*local_results[0],
69 local_results[0]->federation_url.is_empty()
70 ? CredentialType::CREDENTIAL_TYPE_LOCAL
71 : CredentialType::CREDENTIAL_TYPE_FEDERATED);
72 STLDeleteElements(&local_results);
73 STLDeleteElements(&federated_results);
74 dispatcher_->SendCredential(id_, info);
75 return;
76 }
77
78 if (zero_click_only_ ||
79 !dispatcher_->client()->PromptUserToChooseCredentials(
80 local_results, federated_results,
81 base::Bind(&CredentialManagerDispatcher::SendCredential,
82 base::Unretained(dispatcher_), id_))) {
83 STLDeleteElements(&local_results);
84 STLDeleteElements(&federated_results);
85 dispatcher_->SendCredential(id_, CredentialInfo());
86 }
87 }
88
89 private:
90 // Backlink to the CredentialManagerDispatcher that owns this object.
91 CredentialManagerDispatcher* const dispatcher_;
92
93 const int id_;
94 const bool zero_click_only_;
95 const GURL origin_;
96 std::set<std::string> federations_;
97
98 DISALLOW_COPY_AND_ASSIGN(PendingRequestTask);
39 }; 99 };
40 100
41 CredentialManagerDispatcher::CredentialManagerDispatcher( 101 CredentialManagerDispatcher::CredentialManagerDispatcher(
42 content::WebContents* web_contents, 102 content::WebContents* web_contents,
43 PasswordManagerClient* client) 103 PasswordManagerClient* client)
44 : WebContentsObserver(web_contents), client_(client) { 104 : WebContentsObserver(web_contents), client_(client) {
45 DCHECK(web_contents); 105 DCHECK(web_contents);
46 } 106 }
47 107
48 CredentialManagerDispatcher::~CredentialManagerDispatcher() { 108 CredentialManagerDispatcher::~CredentialManagerDispatcher() {
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after
126 } 186 }
127 187
128 if (zero_click_only && !IsZeroClickAllowed()) { 188 if (zero_click_only && !IsZeroClickAllowed()) {
129 web_contents()->GetRenderViewHost()->Send( 189 web_contents()->GetRenderViewHost()->Send(
130 new CredentialManagerMsg_SendCredential( 190 new CredentialManagerMsg_SendCredential(
131 web_contents()->GetRenderViewHost()->GetRoutingID(), request_id, 191 web_contents()->GetRenderViewHost()->GetRoutingID(), request_id,
132 CredentialInfo())); 192 CredentialInfo()));
133 return; 193 return;
134 } 194 }
135 195
136 pending_request_.reset(new PendingRequestParameters( 196 pending_request_.reset(new PendingRequestTask(
137 request_id, zero_click_only, 197 this, request_id, zero_click_only,
138 web_contents()->GetLastCommittedURL().GetOrigin(), federations)); 198 web_contents()->GetLastCommittedURL().GetOrigin(), federations));
139 199
140 // This will result in a callback to ::OnGetPasswordStoreResults(). 200 // This will result in a callback to
141 store->GetAutofillableLogins(this); 201 // PendingRequestTask::OnGetPasswordStoreResults().
142 } 202 store->GetAutofillableLogins(pending_request_.get());
143
144 void CredentialManagerDispatcher::OnGetPasswordStoreResults(
145 const std::vector<autofill::PasswordForm*>& results) {
146 DCHECK(pending_request_);
147
148 std::set<std::string> federations;
149 for (const GURL& origin : pending_request_->federations)
150 federations.insert(origin.spec());
151
152 // We own the PasswordForm instances, so we're responsible for cleaning
153 // up the instances we don't add to |local_results| or |federated_results|.
154 std::vector<autofill::PasswordForm*> local_results;
155 std::vector<autofill::PasswordForm*> federated_results;
156 for (autofill::PasswordForm* form : results) {
157 if (form->origin == pending_request_->origin)
158 local_results.push_back(form);
159 else if (federations.count(form->origin.spec()) != 0)
160 federated_results.push_back(form);
161 else
162 delete form;
163 }
164
165 if ((local_results.empty() && federated_results.empty()) ||
166 web_contents()->GetLastCommittedURL().GetOrigin() !=
167 pending_request_->origin) {
168 SendCredential(pending_request_->id, CredentialInfo());
169 return;
170 }
171
172 if (local_results.size() == 1 && IsZeroClickAllowed()) {
173 // TODO(mkwst): Use the `one_time_disable_zero_click` flag on the result
174 // to prevent auto-sign-in, once that flag is implemented.
175 CredentialInfo info(*local_results[0],
176 local_results[0]->federation_url.is_empty()
177 ? CredentialType::CREDENTIAL_TYPE_LOCAL
178 : CredentialType::CREDENTIAL_TYPE_FEDERATED);
179 STLDeleteElements(&local_results);
180 STLDeleteElements(&federated_results);
181 SendCredential(pending_request_->id, info);
182 return;
183 }
184
185 if (pending_request_->zero_click_only ||
186 !client_->PromptUserToChooseCredentials(
187 local_results, federated_results,
188 base::Bind(&CredentialManagerDispatcher::SendCredential,
189 base::Unretained(this), pending_request_->id))) {
190 STLDeleteElements(&local_results);
191 STLDeleteElements(&federated_results);
192 SendCredential(pending_request_->id, CredentialInfo());
193 }
194 } 203 }
195 204
196 PasswordStore* CredentialManagerDispatcher::GetPasswordStore() { 205 PasswordStore* CredentialManagerDispatcher::GetPasswordStore() {
197 return client_ ? client_->GetPasswordStore() : nullptr; 206 return client_ ? client_->GetPasswordStore() : nullptr;
198 } 207 }
199 208
200 bool CredentialManagerDispatcher::IsSavingEnabledForCurrentPage() const { 209 bool CredentialManagerDispatcher::IsSavingEnabledForCurrentPage() const {
201 // TODO(vasilii): add more, see http://crbug.com/450583. 210 // TODO(vasilii): add more, see http://crbug.com/450583.
202 return !client_->IsOffTheRecord(); 211 return !client_->IsOffTheRecord();
203 } 212 }
204 213
205 bool CredentialManagerDispatcher::IsZeroClickAllowed() const { 214 bool CredentialManagerDispatcher::IsZeroClickAllowed() const {
206 return !client_->IsOffTheRecord() && client_->IsZeroClickEnabled(); 215 return !client_->IsOffTheRecord() && client_->IsZeroClickEnabled();
207 } 216 }
208 217
209 base::WeakPtr<PasswordManagerDriver> CredentialManagerDispatcher::GetDriver() { 218 base::WeakPtr<PasswordManagerDriver> CredentialManagerDispatcher::GetDriver() {
210 ContentPasswordManagerDriverFactory* driver_factory = 219 ContentPasswordManagerDriverFactory* driver_factory =
211 ContentPasswordManagerDriverFactory::FromWebContents(web_contents()); 220 ContentPasswordManagerDriverFactory::FromWebContents(web_contents());
212 DCHECK(driver_factory); 221 DCHECK(driver_factory);
213 PasswordManagerDriver* driver = 222 PasswordManagerDriver* driver =
214 driver_factory->GetDriverForFrame(web_contents()->GetMainFrame()); 223 driver_factory->GetDriverForFrame(web_contents()->GetMainFrame());
215 return driver->AsWeakPtr(); 224 return driver->AsWeakPtr();
216 } 225 }
217 226
218 void CredentialManagerDispatcher::SendCredential(int request_id, 227 void CredentialManagerDispatcher::SendCredential(int request_id,
219 const CredentialInfo& info) { 228 const CredentialInfo& info) {
220 DCHECK(pending_request_); 229 DCHECK(pending_request_);
221 DCHECK_EQ(pending_request_->id, request_id); 230 DCHECK_EQ(pending_request_->id(), request_id);
222 web_contents()->GetRenderViewHost()->Send( 231 web_contents()->GetRenderViewHost()->Send(
223 new CredentialManagerMsg_SendCredential( 232 new CredentialManagerMsg_SendCredential(
224 web_contents()->GetRenderViewHost()->GetRoutingID(), 233 web_contents()->GetRenderViewHost()->GetRoutingID(),
225 pending_request_->id, info)); 234 pending_request_->id(), info));
226 pending_request_.reset(); 235 pending_request_.reset();
227 } 236 }
228 237
229 } // namespace password_manager 238 } // namespace password_manager
OLDNEW
« no previous file with comments | « components/password_manager/content/browser/credential_manager_dispatcher.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698