| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/password_manager/chrome_password_manager_client.h" | 5 #include "chrome/browser/password_manager/chrome_password_manager_client.h" |
| 6 | 6 |
| 7 #include "base/bind_helpers.h" | 7 #include "base/bind_helpers.h" |
| 8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
| 9 #include "base/memory/singleton.h" | 9 #include "base/memory/singleton.h" |
| 10 #include "base/metrics/histogram.h" | 10 #include "base/metrics/histogram.h" |
| (...skipping 240 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 251 void ChromePasswordManagerClient::HidePasswordGenerationPopup() { | 251 void ChromePasswordManagerClient::HidePasswordGenerationPopup() { |
| 252 if (popup_controller_) | 252 if (popup_controller_) |
| 253 popup_controller_->HideAndDestroy(); | 253 popup_controller_->HideAndDestroy(); |
| 254 } | 254 } |
| 255 | 255 |
| 256 PrefService* ChromePasswordManagerClient::GetPrefs() { | 256 PrefService* ChromePasswordManagerClient::GetPrefs() { |
| 257 return profile_->GetPrefs(); | 257 return profile_->GetPrefs(); |
| 258 } | 258 } |
| 259 | 259 |
| 260 password_manager::PasswordStore* | 260 password_manager::PasswordStore* |
| 261 ChromePasswordManagerClient::GetPasswordStore() { | 261 ChromePasswordManagerClient::GetPasswordStore() const { |
| 262 // Always use EXPLICIT_ACCESS as the password manager checks IsOffTheRecord | 262 // Always use EXPLICIT_ACCESS as the password manager checks IsOffTheRecord |
| 263 // itself when it shouldn't access the PasswordStore. | 263 // itself when it shouldn't access the PasswordStore. |
| 264 // TODO(gcasto): Is is safe to change this to | 264 // TODO(gcasto): Is is safe to change this to |
| 265 // ServiceAccessType::IMPLICIT_ACCESS? | 265 // ServiceAccessType::IMPLICIT_ACCESS? |
| 266 return PasswordStoreFactory::GetForProfile( | 266 return PasswordStoreFactory::GetForProfile( |
| 267 profile_, ServiceAccessType::EXPLICIT_ACCESS).get(); | 267 profile_, ServiceAccessType::EXPLICIT_ACCESS).get(); |
| 268 } | 268 } |
| 269 | 269 |
| 270 base::FieldTrial::Probability | 270 base::FieldTrial::Probability |
| 271 ChromePasswordManagerClient::GetProbabilityForExperiment( | 271 ChromePasswordManagerClient::GetProbabilityForExperiment( |
| 272 const std::string& experiment_name) { | 272 const std::string& experiment_name) const { |
| 273 base::FieldTrial::Probability enabled_probability = 0; | 273 base::FieldTrial::Probability enabled_probability = 0; |
| 274 if (experiment_name == | 274 if (experiment_name == |
| 275 password_manager::PasswordManager::kOtherPossibleUsernamesExperiment) { | 275 password_manager::PasswordManager::kOtherPossibleUsernamesExperiment) { |
| 276 switch (chrome::VersionInfo::GetChannel()) { | 276 switch (chrome::VersionInfo::GetChannel()) { |
| 277 case chrome::VersionInfo::CHANNEL_DEV: | 277 case chrome::VersionInfo::CHANNEL_DEV: |
| 278 case chrome::VersionInfo::CHANNEL_BETA: | 278 case chrome::VersionInfo::CHANNEL_BETA: |
| 279 enabled_probability = 50; | 279 enabled_probability = 50; |
| 280 break; | 280 break; |
| 281 default: | 281 default: |
| 282 break; | 282 break; |
| 283 } | 283 } |
| 284 } | 284 } |
| 285 return enabled_probability; | 285 return enabled_probability; |
| 286 } | 286 } |
| 287 | 287 |
| 288 bool ChromePasswordManagerClient::IsPasswordSyncEnabled( | 288 bool ChromePasswordManagerClient::IsPasswordSyncEnabled( |
| 289 password_manager::CustomPassphraseState state) { | 289 password_manager::CustomPassphraseState state) const { |
| 290 ProfileSyncService* sync_service = | 290 ProfileSyncService* sync_service = |
| 291 ProfileSyncServiceFactory::GetForProfile(profile_); | 291 ProfileSyncServiceFactory::GetForProfile(profile_); |
| 292 if (sync_service && sync_service->HasSyncSetupCompleted() && | 292 if (sync_service && sync_service->HasSyncSetupCompleted() && |
| 293 sync_service->SyncActive() && | 293 sync_service->SyncActive() && |
| 294 sync_service->GetActiveDataTypes().Has(syncer::PASSWORDS)) { | 294 sync_service->GetActiveDataTypes().Has(syncer::PASSWORDS)) { |
| 295 if (sync_service->IsUsingSecondaryPassphrase()) { | 295 if (sync_service->IsUsingSecondaryPassphrase()) { |
| 296 return state == password_manager::ONLY_CUSTOM_PASSPHRASE; | 296 return state == password_manager::ONLY_CUSTOM_PASSPHRASE; |
| 297 } else { | 297 } else { |
| 298 return state == password_manager::WITHOUT_CUSTOM_PASSPHRASE; | 298 return state == password_manager::WITHOUT_CUSTOM_PASSPHRASE; |
| 299 } | 299 } |
| (...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 343 int http_status_code = entry->GetHttpStatusCode(); | 343 int http_status_code = entry->GetHttpStatusCode(); |
| 344 | 344 |
| 345 if (logger) | 345 if (logger) |
| 346 logger->LogNumber(Logger::STRING_HTTP_STATUS_CODE, http_status_code); | 346 logger->LogNumber(Logger::STRING_HTTP_STATUS_CODE, http_status_code); |
| 347 | 347 |
| 348 if (http_status_code >= 400 && http_status_code < 600) | 348 if (http_status_code >= 400 && http_status_code < 600) |
| 349 return true; | 349 return true; |
| 350 return false; | 350 return false; |
| 351 } | 351 } |
| 352 | 352 |
| 353 bool ChromePasswordManagerClient::DidLastPageLoadEncounterSSLErrors() { | 353 bool ChromePasswordManagerClient::DidLastPageLoadEncounterSSLErrors() const { |
| 354 content::NavigationEntry* entry = | 354 content::NavigationEntry* entry = |
| 355 web_contents()->GetController().GetLastCommittedEntry(); | 355 web_contents()->GetController().GetLastCommittedEntry(); |
| 356 if (!entry) | 356 if (!entry) |
| 357 return false; | 357 return false; |
| 358 | 358 |
| 359 return net::IsCertStatusError(entry->GetSSL().cert_status); | 359 return net::IsCertStatusError(entry->GetSSL().cert_status); |
| 360 } | 360 } |
| 361 | 361 |
| 362 bool ChromePasswordManagerClient::IsOffTheRecord() { | 362 bool ChromePasswordManagerClient::IsOffTheRecord() const { |
| 363 return web_contents()->GetBrowserContext()->IsOffTheRecord(); | 363 return web_contents()->GetBrowserContext()->IsOffTheRecord(); |
| 364 } | 364 } |
| 365 | 365 |
| 366 password_manager::PasswordManager* | 366 password_manager::PasswordManager* |
| 367 ChromePasswordManagerClient::GetPasswordManager() { | 367 ChromePasswordManagerClient::GetPasswordManager() { |
| 368 return &password_manager_; | 368 return &password_manager_; |
| 369 } | 369 } |
| 370 | 370 |
| 371 autofill::AutofillManager* | 371 autofill::AutofillManager* |
| 372 ChromePasswordManagerClient::GetAutofillManagerForMainFrame() { | 372 ChromePasswordManagerClient::GetAutofillManagerForMainFrame() { |
| (...skipping 183 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 556 if (group_name == "DisallowSyncCredentialsForReauth") { | 556 if (group_name == "DisallowSyncCredentialsForReauth") { |
| 557 autofill_sync_state_ = DISALLOW_SYNC_CREDENTIALS_FOR_REAUTH; | 557 autofill_sync_state_ = DISALLOW_SYNC_CREDENTIALS_FOR_REAUTH; |
| 558 } else if (group_name == "DisallowSyncCredentials") { | 558 } else if (group_name == "DisallowSyncCredentials") { |
| 559 autofill_sync_state_ = DISALLOW_SYNC_CREDENTIALS; | 559 autofill_sync_state_ = DISALLOW_SYNC_CREDENTIALS; |
| 560 } else { | 560 } else { |
| 561 // Allow by default. | 561 // Allow by default. |
| 562 autofill_sync_state_ = ALLOW_SYNC_CREDENTIALS; | 562 autofill_sync_state_ = ALLOW_SYNC_CREDENTIALS; |
| 563 } | 563 } |
| 564 } | 564 } |
| 565 | 565 |
| 566 const GURL& ChromePasswordManagerClient::GetMainFrameURL() { | 566 const GURL& ChromePasswordManagerClient::GetMainFrameURL() const { |
| 567 return web_contents()->GetVisibleURL(); | 567 return web_contents()->GetVisibleURL(); |
| 568 } | 568 } |
| OLD | NEW |