blob: 1323a87b0df153762c14c01d779f72b2a9b46037 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/page_info/page_info.h"
#include <stddef.h>
#include <stdint.h>
#include <memory>
#include <string>
#include <utility>
#include <vector>
#include "base/i18n/time_formatting.h"
#include "base/metrics/field_trial.h"
#include "base/metrics/histogram_functions.h"
#include "base/metrics/histogram_macros.h"
#include "base/metrics/user_metrics.h"
#include "base/stl_util.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/utf_string_conversions.h"
#include "base/values.h"
#include "build/build_config.h"
#include "components/browser_ui/util/android/url_constants.h"
#include "components/browsing_data/content/local_storage_helper.h"
#include "components/content_settings/browser/page_specific_content_settings.h"
#include "components/content_settings/core/browser/content_settings_registry.h"
#include "components/content_settings/core/browser/content_settings_utils.h"
#include "components/content_settings/core/browser/host_content_settings_map.h"
#include "components/content_settings/core/common/content_settings.h"
#include "components/content_settings/core/common/content_settings_pattern.h"
#include "components/content_settings/core/common/content_settings_utils.h"
#include "components/page_info/page_info_delegate.h"
#include "components/page_info/page_info_ui.h"
#include "components/password_manager/core/browser/password_manager_metrics_util.h"
#include "components/permissions/chooser_context_base.h"
#include "components/permissions/permission_decision_auto_blocker.h"
#include "components/permissions/permission_manager.h"
#include "components/permissions/permission_result.h"
#include "components/permissions/permission_uma_util.h"
#include "components/permissions/permission_util.h"
#if defined(OS_ANDROID)
#include "components/resources/android/theme_resources.h"
#endif
#include "build/chromeos_buildflags.h"
#include "components/safe_browsing/buildflags.h"
#include "components/safe_browsing/content/password_protection/password_protection_service.h"
#include "components/safe_browsing/core/password_protection/metrics_util.h"
#include "components/safe_browsing/core/proto/csd.pb.h"
#include "components/security_interstitials/content/stateful_ssl_host_state_delegate.h"
#include "components/signin/public/identity_manager/account_info.h"
#include "components/ssl_errors/error_info.h"
#include "components/strings/grit/components_chromium_strings.h"
#include "components/strings/grit/components_strings.h"
#include "components/subresource_filter/core/browser/subresource_filter_features.h"
#include "components/ukm/content/source_url_recorder.h"
#include "components/url_formatter/elide_url.h"
#include "content/public/browser/browser_context.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/web_contents.h"
#include "content/public/common/content_features.h"
#include "content/public/common/url_constants.h"
#include "net/cert/cert_status_flags.h"
#include "net/cert/x509_certificate.h"
#include "net/ssl/ssl_cipher_suite_names.h"
#include "net/ssl/ssl_connection_status_flags.h"
#include "services/metrics/public/cpp/ukm_builders.h"
#include "services/metrics/public/cpp/ukm_recorder.h"
#include "third_party/boringssl/src/include/openssl/ssl.h"
#include "ui/base/l10n/l10n_util.h"
#include "url/origin.h"
using base::ASCIIToUTF16;
using base::UTF16ToUTF8;
using base::UTF8ToUTF16;
using content::BrowserThread;
using safe_browsing::LoginReputationClientResponse;
using safe_browsing::RequestOutcome;
namespace {
// The list of content settings types to display on the Page Info UI. THE
// ORDER OF THESE ITEMS IS IMPORTANT and comes from https://crbug.com/610358. To
// propose changing it, email security-dev@chromium.org.
ContentSettingsType kPermissionType[] = {
ContentSettingsType::GEOLOCATION,
ContentSettingsType::MEDIASTREAM_CAMERA,
ContentSettingsType::CAMERA_PAN_TILT_ZOOM,
ContentSettingsType::MEDIASTREAM_MIC,
ContentSettingsType::SENSORS,
ContentSettingsType::NOTIFICATIONS,
ContentSettingsType::JAVASCRIPT,
#if !defined(OS_ANDROID)
ContentSettingsType::IMAGES,
#endif
ContentSettingsType::POPUPS,
ContentSettingsType::WINDOW_PLACEMENT,
ContentSettingsType::ADS,
ContentSettingsType::BACKGROUND_SYNC,
ContentSettingsType::SOUND,
ContentSettingsType::AUTOMATIC_DOWNLOADS,
#if defined(OS_ANDROID) || BUILDFLAG(IS_CHROMEOS_ASH)
ContentSettingsType::PROTECTED_MEDIA_IDENTIFIER,
#endif
ContentSettingsType::MIDI_SYSEX,
ContentSettingsType::CLIPBOARD_READ_WRITE,
#if defined(OS_ANDROID)
ContentSettingsType::NFC,
#endif
ContentSettingsType::USB_GUARD,
#if !defined(OS_ANDROID)
ContentSettingsType::HID_GUARD,
ContentSettingsType::SERIAL_GUARD,
ContentSettingsType::FILE_SYSTEM_WRITE_GUARD,
ContentSettingsType::FONT_ACCESS,
ContentSettingsType::FILE_HANDLING,
#endif
ContentSettingsType::BLUETOOTH_GUARD,
ContentSettingsType::BLUETOOTH_SCANNING,
ContentSettingsType::VR,
ContentSettingsType::AR,
ContentSettingsType::IDLE_DETECTION,
};
// Determines whether to show permission |type| in the Page Info UI. Only
// applies to permissions listed in |kPermissionType|.
bool ShouldShowPermission(const PageInfo::PermissionInfo& info,
const GURL& site_url,
HostContentSettingsMap* content_settings,
content::WebContents* web_contents,
bool changed_since_last_page_load,
bool is_subresource_filter_activated) {
// Note |ContentSettingsType::ADS| will show up regardless of its default
// value when it has been activated on the current origin.
if (info.type == ContentSettingsType::ADS) {
if (!base::FeatureList::IsEnabled(
subresource_filter::kSafeBrowsingSubresourceFilter)) {
return false;
}
return is_subresource_filter_activated;
}
if (info.type == ContentSettingsType::SOUND) {
// The sound content setting should always show up when the tab has played
// audio.
if (web_contents && web_contents->WasEverAudible())
return true;
}
const bool is_incognito = web_contents->GetBrowserContext()->IsOffTheRecord();
#if defined(OS_ANDROID)
// Special geolocation DSE settings apply only on Android, so make sure it
// gets checked there regardless of default setting on Desktop.
// DSE settings don't apply to incognito mode.
if (info.type == ContentSettingsType::GEOLOCATION && !is_incognito)
return true;
// The File System write permission is desktop only at the moment.
if (info.type == ContentSettingsType::FILE_SYSTEM_WRITE_GUARD)
return false;
#else
// NFC is Android-only at the moment.
if (info.type == ContentSettingsType::NFC)
return false;
// Display the File System Access write permission if the File System Access
// API is currently being used.
if (info.type == ContentSettingsType::FILE_SYSTEM_WRITE_GUARD &&
web_contents->HasFileSystemAccessHandles()) {
return true;
}
// Hide camera if camera PTZ is granted or blocked.
if (info.type == ContentSettingsType::MEDIASTREAM_CAMERA) {
std::unique_ptr<base::Value> value = content_settings->GetWebsiteSetting(
site_url, site_url, ContentSettingsType::CAMERA_PAN_TILT_ZOOM, nullptr);
DCHECK(value.get());
ContentSetting camera_ptz_setting =
content_settings::ValueToContentSetting(value.get());
if (camera_ptz_setting == CONTENT_SETTING_ALLOW ||
camera_ptz_setting == CONTENT_SETTING_BLOCK) {
return false;
}
}
#endif
// Show the content setting if it has been changed by the user since the last
// page load.
if (changed_since_last_page_load) {
return true;
}
// Show the Bluetooth guard permission if the new permissions backend is
// enabled.
if (info.type == ContentSettingsType::BLUETOOTH_GUARD &&
base::FeatureList::IsEnabled(
features::kWebBluetoothNewPermissionsBackend) &&
!PageInfo::IsPermissionFactoryDefault(info, is_incognito)) {
return true;
}
// Show the content setting when it has a non-default value.
if (!PageInfo::IsPermissionFactoryDefault(info, is_incognito))
return true;
return false;
}
// If the |visible_security_state| indicates that mixed content or certificate
// errors were present, update |connection_status| and |connection_details|.
void ReportAnyInsecureContent(
const security_state::VisibleSecurityState& visible_security_state,
PageInfo::SiteConnectionStatus* connection_status,
std::u16string* connection_details) {
bool displayed_insecure_content =
visible_security_state.displayed_mixed_content;
bool ran_insecure_content = visible_security_state.ran_mixed_content;
// Only note subresources with certificate errors if the main resource was
// loaded without major certificate errors. If the main resource had a
// certificate error, then it would not be that useful (and could
// potentially be confusing) to warn about subresources that had certificate
// errors too.
if (!net::IsCertStatusError(visible_security_state.cert_status)) {
displayed_insecure_content =
displayed_insecure_content ||
visible_security_state.displayed_content_with_cert_errors;
ran_insecure_content = ran_insecure_content ||
visible_security_state.ran_content_with_cert_errors;
}
// Only one insecure content warning is displayed; show the most severe.
if (ran_insecure_content) {
*connection_status =
PageInfo::SITE_CONNECTION_STATUS_INSECURE_ACTIVE_SUBRESOURCE;
connection_details->assign(l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_SENTENCE_LINK, *connection_details,
l10n_util::GetStringUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_INSECURE_CONTENT_ERROR)));
return;
}
if (visible_security_state.contained_mixed_form) {
*connection_status = PageInfo::SITE_CONNECTION_STATUS_INSECURE_FORM_ACTION;
connection_details->assign(l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_SENTENCE_LINK, *connection_details,
l10n_util::GetStringUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_INSECURE_FORM_WARNING)));
return;
}
if (displayed_insecure_content) {
*connection_status =
PageInfo::SITE_CONNECTION_STATUS_INSECURE_PASSIVE_SUBRESOURCE;
connection_details->assign(l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_SENTENCE_LINK, *connection_details,
l10n_util::GetStringUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_INSECURE_CONTENT_WARNING)));
}
}
std::u16string GetSimpleSiteName(const GURL& url) {
return url_formatter::FormatUrlForSecurityDisplay(
url, url_formatter::SchemeDisplay::OMIT_HTTP_AND_HTTPS);
}
// The list of chooser types that need to display entries in the Website
// Settings UI. THE ORDER OF THESE ITEMS IS IMPORTANT. To propose changing it,
// email security-dev@chromium.org.
const PageInfo::ChooserUIInfo kChooserUIInfo[] = {
{ContentSettingsType::USB_CHOOSER_DATA,
IDS_PAGE_INFO_USB_DEVICE_SECONDARY_LABEL,
IDS_PAGE_INFO_USB_DEVICE_ALLOWED_BY_POLICY_LABEL,
IDS_PAGE_INFO_DELETE_USB_DEVICE},
#if !defined(OS_ANDROID)
{ContentSettingsType::HID_CHOOSER_DATA,
IDS_PAGE_INFO_HID_DEVICE_SECONDARY_LABEL,
/*allowed_by_policy_description_string_id=*/-1,
IDS_PAGE_INFO_DELETE_HID_DEVICE},
{ContentSettingsType::SERIAL_CHOOSER_DATA,
IDS_PAGE_INFO_SERIAL_PORT_SECONDARY_LABEL,
/*allowed_by_policy_description_string_id=*/-1,
IDS_PAGE_INFO_DELETE_SERIAL_PORT},
#endif
{ContentSettingsType::BLUETOOTH_CHOOSER_DATA,
IDS_PAGE_INFO_BLUETOOTH_DEVICE_SECONDARY_LABEL,
/*allowed_by_policy_description_string_id=*/-1,
IDS_PAGE_INFO_DELETE_BLUETOOTH_DEVICE},
};
// Time open histogram prefixes.
const char kPageInfoTimePrefix[] = "Security.PageInfo.TimeOpen";
const char kPageInfoTimeActionPrefix[] = "Security.PageInfo.TimeOpen.Action";
const char kPageInfoTimeNoActionPrefix[] =
"Security.PageInfo.TimeOpen.NoAction";
} // namespace
PageInfo::PageInfo(std::unique_ptr<PageInfoDelegate> delegate,
content::WebContents* web_contents,
const GURL& url)
: content::WebContentsObserver(web_contents),
delegate_(std::move(delegate)),
show_info_bar_(false),
site_url_(url),
site_identity_status_(SITE_IDENTITY_STATUS_UNKNOWN),
safe_browsing_status_(SAFE_BROWSING_STATUS_NONE),
safety_tip_info_({security_state::SafetyTipStatus::kUnknown, GURL()}),
site_connection_status_(SITE_CONNECTION_STATUS_UNKNOWN),
show_ssl_decision_revoke_button_(false),
did_revoke_user_ssl_decisions_(false),
show_change_password_buttons_(false),
did_perform_action_(false) {
DCHECK(delegate_);
security_level_ = delegate_->GetSecurityLevel();
visible_security_state_for_metrics_ = delegate_->GetVisibleSecurityState();
}
PageInfo::~PageInfo() {
// Check if Re-enable warnings button was visible, if so, log on UMA whether
// it was clicked or not.
SSLCertificateDecisionsDidRevoke user_decision =
did_revoke_user_ssl_decisions_ ? USER_CERT_DECISIONS_REVOKED
: USER_CERT_DECISIONS_NOT_REVOKED;
if (show_ssl_decision_revoke_button_) {
UMA_HISTOGRAM_ENUMERATION("interstitial.ssl.did_user_revoke_decisions2",
user_decision,
END_OF_SSL_CERTIFICATE_DECISIONS_DID_REVOKE_ENUM);
}
// Record the total time the Page Info UI was open for all opens as well as
// split between whether any action was taken.
base::UmaHistogramCustomTimes(security_state::GetSecurityLevelHistogramName(
kPageInfoTimePrefix, security_level_),
base::TimeTicks::Now() - start_time_,
base::TimeDelta::FromMilliseconds(1),
base::TimeDelta::FromHours(1), 100);
base::UmaHistogramCustomTimes(
security_state::GetSafetyTipHistogramName(kPageInfoTimePrefix,
safety_tip_info_.status),
base::TimeTicks::Now() - start_time_,
base::TimeDelta::FromMilliseconds(1), base::TimeDelta::FromHours(1), 100);
if (did_perform_action_) {
base::UmaHistogramCustomTimes(
security_state::GetSecurityLevelHistogramName(kPageInfoTimeActionPrefix,
security_level_),
base::TimeTicks::Now() - start_time_,
base::TimeDelta::FromMilliseconds(1), base::TimeDelta::FromHours(1),
100);
base::UmaHistogramCustomTimes(
security_state::GetSafetyTipHistogramName(kPageInfoTimeActionPrefix,
safety_tip_info_.status),
base::TimeTicks::Now() - start_time_,
base::TimeDelta::FromMilliseconds(1), base::TimeDelta::FromHours(1),
100);
} else {
base::UmaHistogramCustomTimes(
security_state::GetSecurityLevelHistogramName(
kPageInfoTimeNoActionPrefix, security_level_),
base::TimeTicks::Now() - start_time_,
base::TimeDelta::FromMilliseconds(1), base::TimeDelta::FromHours(1),
100);
base::UmaHistogramCustomTimes(
security_state::GetSafetyTipHistogramName(kPageInfoTimeNoActionPrefix,
safety_tip_info_.status),
base::TimeTicks::Now() - start_time_,
base::TimeDelta::FromMilliseconds(1), base::TimeDelta::FromHours(1),
100);
}
}
// static
bool PageInfo::IsPermissionFactoryDefault(const PermissionInfo& info,
bool is_incognito) {
const ContentSetting factory_default_setting =
content_settings::ContentSettingsRegistry::GetInstance()
->Get(info.type)
->GetInitialDefaultSetting();
// Settings that are granted in regular mode get reduced to ASK in incognito
// mode. These settings should not be displayed either.
const bool is_incognito_default =
is_incognito && info.setting == CONTENT_SETTING_ASK &&
factory_default_setting == CONTENT_SETTING_ASK;
return info.source == content_settings::SETTING_SOURCE_USER &&
factory_default_setting == info.default_setting &&
(info.setting == CONTENT_SETTING_DEFAULT || is_incognito_default);
}
// static
bool PageInfo::IsFileOrInternalPage(const GURL& url) {
return url.SchemeIs(content::kChromeUIScheme) ||
url.SchemeIs(content::kChromeDevToolsScheme) ||
url.SchemeIs(content::kViewSourceScheme) ||
url.SchemeIs(url::kFileScheme);
}
void PageInfo::InitializeUiState(PageInfoUI* ui) {
ui_ = ui;
DCHECK(ui_);
// TabSpecificContentSetting needs to be created before page load.
DCHECK(GetPageSpecificContentSettings());
ComputeUIInputs(site_url_);
PresentSitePermissions();
PresentSiteIdentity();
PresentSiteData();
PresentPageFeatureInfo();
// Every time the Page Info UI is opened, this method is called.
// So this counts how often the Page Info UI is opened.
RecordPageInfoAction(PAGE_INFO_OPENED);
// Record the time when the Page Info UI is opened so the total time it is
// open can be measured.
start_time_ = base::TimeTicks::Now();
}
void PageInfo::UpdateSecurityState() {
ComputeUIInputs(site_url_);
PresentSiteIdentity();
}
void PageInfo::RecordPageInfoAction(PageInfoAction action) {
if (action != PAGE_INFO_OPENED)
did_perform_action_ = true;
UMA_HISTOGRAM_ENUMERATION("WebsiteSettings.Action", action, PAGE_INFO_COUNT);
if (web_contents()) {
ukm::builders::PageInfoBubble(
ukm::GetSourceIdForWebContentsDocument(web_contents()))
.SetActionTaken(action)
.Record(ukm::UkmRecorder::Get());
}
base::UmaHistogramEnumeration(
security_state::GetSafetyTipHistogramName(
"Security.SafetyTips.PageInfo.Action", safety_tip_info_.status),
action, PAGE_INFO_COUNT);
std::string histogram_name;
if (site_url_.SchemeIsCryptographic()) {
if (security_level_ == security_state::SECURE) {
if (visible_security_state_for_metrics_.cert_status &
net::CERT_STATUS_IS_EV) {
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.ValidEV",
action, PAGE_INFO_COUNT);
} else {
UMA_HISTOGRAM_ENUMERATION(
"Security.PageInfo.Action.HttpsUrl.ValidNonEV", action,
PAGE_INFO_COUNT);
}
} else if (security_level_ == security_state::NONE) {
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Downgraded",
action, PAGE_INFO_COUNT);
} else if (security_level_ == security_state::DANGEROUS) {
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Dangerous",
action, PAGE_INFO_COUNT);
}
return;
}
if (security_level_ == security_state::WARNING) {
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Warning",
action, PAGE_INFO_COUNT);
} else if (security_level_ == security_state::DANGEROUS) {
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Dangerous",
action, PAGE_INFO_COUNT);
} else {
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Neutral",
action, PAGE_INFO_COUNT);
}
}
void PageInfo::UpdatePermissions() {
// Refresh the UI to reflect the new setting.
PresentSitePermissions();
}
void PageInfo::OnSitePermissionChanged(ContentSettingsType type,
ContentSetting setting,
bool is_one_time) {
ContentSettingChangedViaPageInfo(type);
// Count how often a permission for a specific content type is changed using
// the Page Info UI.
size_t num_values;
int histogram_value = ContentSettingTypeToHistogramValue(type, &num_values);
UMA_HISTOGRAM_EXACT_LINEAR("WebsiteSettings.OriginInfo.PermissionChanged",
histogram_value, num_values);
if (setting == ContentSetting::CONTENT_SETTING_ALLOW) {
UMA_HISTOGRAM_EXACT_LINEAR(
"WebsiteSettings.OriginInfo.PermissionChanged.Allowed", histogram_value,
num_values);
} else if (setting == ContentSetting::CONTENT_SETTING_BLOCK) {
UMA_HISTOGRAM_EXACT_LINEAR(
"WebsiteSettings.OriginInfo.PermissionChanged.Blocked", histogram_value,
num_values);
}
// This is technically redundant given the histogram above, but putting the
// total count of permission changes in another histogram makes it easier to
// compare it against other kinds of actions in Page Info.
RecordPageInfoAction(PAGE_INFO_CHANGED_PERMISSION);
HostContentSettingsMap* content_settings = GetContentSettings();
if (type == ContentSettingsType::SOUND) {
ContentSetting default_setting = content_settings->GetDefaultContentSetting(
ContentSettingsType::SOUND, nullptr);
bool mute = (setting == CONTENT_SETTING_BLOCK) ||
(setting == CONTENT_SETTING_DEFAULT &&
default_setting == CONTENT_SETTING_BLOCK);
if (mute) {
base::RecordAction(
base::UserMetricsAction("SoundContentSetting.MuteBy.PageInfo"));
} else {
base::RecordAction(
base::UserMetricsAction("SoundContentSetting.UnmuteBy.PageInfo"));
}
}
permissions::PermissionUmaUtil::ScopedRevocationReporter
scoped_revocation_reporter(web_contents()->GetBrowserContext(), site_url_,
site_url_, type,
permissions::PermissionSourceUI::OIB);
// The permission may have been blocked due to being under embargo, so if it
// was changed away from BLOCK, clear embargo status if it exists.
if (setting != CONTENT_SETTING_BLOCK) {
delegate_->GetPermissionDecisionAutoblocker()->RemoveEmbargoAndResetCounts(
site_url_, type);
}
using Constraints = content_settings::ContentSettingConstraints;
content_settings->SetNarrowestContentSetting(
site_url_, site_url_, type, setting,
is_one_time
? Constraints{base::Time(), content_settings::SessionModel::OneTime}
: Constraints{});
// When the sound setting is changed, no reload is necessary.
if (type != ContentSettingsType::SOUND)
show_info_bar_ = true;
// Refresh the UI to reflect the new setting.
PresentSitePermissions();
}
void PageInfo::OnSiteChosenObjectDeleted(const ChooserUIInfo& ui_info,
const base::Value& object) {
// TODO(reillyg): Create metrics for revocations. crbug.com/556845
permissions::ChooserContextBase* context =
delegate_->GetChooserContext(ui_info.content_settings_type);
const auto origin = url::Origin::Create(site_url_);
context->RevokeObjectPermission(origin, object);
show_info_bar_ = true;
// Refresh the UI to reflect the changed settings.
PresentSitePermissions();
}
void PageInfo::OnUIClosing(bool* reload_prompt) {
if (reload_prompt)
*reload_prompt = false;
#if defined(OS_ANDROID)
NOTREACHED();
#else
if (show_info_bar_ && web_contents() && !web_contents()->IsBeingDestroyed()) {
if (delegate_->CreateInfoBarDelegate() && reload_prompt)
*reload_prompt = true;
}
#endif
}
void PageInfo::OnRevokeSSLErrorBypassButtonPressed() {
auto* stateful_ssl_host_state_delegate =
delegate_->GetStatefulSSLHostStateDelegate();
DCHECK(stateful_ssl_host_state_delegate);
stateful_ssl_host_state_delegate->RevokeUserAllowExceptionsHard(
site_url().host());
did_revoke_user_ssl_decisions_ = true;
}
void PageInfo::OpenSiteSettingsView() {
#if defined(OS_ANDROID)
NOTREACHED();
#else
delegate_->ShowSiteSettings(site_url());
RecordPageInfoAction(PAGE_INFO_SITE_SETTINGS_OPENED);
#endif
}
void PageInfo::OpenCookiesDialog() {
#if defined(OS_ANDROID)
NOTREACHED();
#else
if (!web_contents() || web_contents()->IsBeingDestroyed())
return;
delegate_->OpenCookiesDialog();
RecordPageInfoAction(PAGE_INFO_COOKIES_DIALOG_OPENED);
#endif
}
void PageInfo::OpenCertificateDialog(net::X509Certificate* certificate) {
#if defined(OS_ANDROID)
NOTREACHED();
#else
if (!web_contents() || web_contents()->IsBeingDestroyed())
return;
gfx::NativeWindow top_window = web_contents()->GetTopLevelNativeWindow();
if (certificate && top_window) {
delegate_->OpenCertificateDialog(certificate);
RecordPageInfoAction(PAGE_INFO_CERTIFICATE_DIALOG_OPENED);
}
#endif
}
void PageInfo::OpenSafetyTipHelpCenterPage() {
#if defined(OS_ANDROID)
NOTREACHED();
#else
delegate_->OpenSafetyTipHelpCenterPage();
#endif
}
void PageInfo::OpenConnectionHelpCenterPage(const ui::Event& event) {
#if defined(OS_ANDROID)
NOTREACHED();
#else
delegate_->OpenConnectionHelpCenterPage(event);
RecordPageInfoAction(PAGE_INFO_CONNECTION_HELP_OPENED);
#endif
}
void PageInfo::OnChangePasswordButtonPressed() {
#if BUILDFLAG(FULL_SAFE_BROWSING)
delegate_->OnUserActionOnPasswordUi(
safe_browsing::WarningAction::CHANGE_PASSWORD);
#endif
}
void PageInfo::OnAllowlistPasswordReuseButtonPressed() {
#if BUILDFLAG(FULL_SAFE_BROWSING)
delegate_->OnUserActionOnPasswordUi(
safe_browsing::WarningAction::MARK_AS_LEGITIMATE);
#endif
}
permissions::ChooserContextBase* PageInfo::GetChooserContextFromUIInfo(
const ChooserUIInfo& ui_info) const {
return delegate_->GetChooserContext(ui_info.content_settings_type);
}
void PageInfo::ComputeUIInputs(const GURL& url) {
auto security_level = delegate_->GetSecurityLevel();
auto visible_security_state = delegate_->GetVisibleSecurityState();
#if !defined(OS_ANDROID)
// On desktop, internal URLs aren't handled by this class. Instead, a
// custom and simpler bubble is shown.
DCHECK(!url.SchemeIs(content::kChromeUIScheme) &&
!url.SchemeIs(content::kChromeDevToolsScheme) &&
!url.SchemeIs(content::kViewSourceScheme) &&
!url.SchemeIs(content_settings::kExtensionScheme));
#endif
bool is_chrome_ui_native_scheme = false;
#if defined(OS_ANDROID)
is_chrome_ui_native_scheme = url.SchemeIs(browser_ui::kChromeUINativeScheme);
#endif
if (url.SchemeIs(url::kAboutScheme)) {
// All about: URLs except about:blank are redirected.
DCHECK_EQ(url::kAboutBlankURL, url.spec());
site_identity_status_ = SITE_IDENTITY_STATUS_NO_CERT;
#if defined(OS_ANDROID)
identity_status_description_android_ =
l10n_util::GetStringUTF16(IDS_PAGE_INFO_SECURITY_TAB_INSECURE_IDENTITY);
#endif
site_connection_status_ = SITE_CONNECTION_STATUS_UNENCRYPTED;
site_connection_details_ = l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT,
UTF8ToUTF16(url.spec()));
return;
}
if (url.SchemeIs(content::kChromeUIScheme) || is_chrome_ui_native_scheme) {
site_identity_status_ = SITE_IDENTITY_STATUS_INTERNAL_PAGE;
#if defined(OS_ANDROID)
identity_status_description_android_ =
l10n_util::GetStringUTF16(IDS_PAGE_INFO_INTERNAL_PAGE);
#endif
site_connection_status_ = SITE_CONNECTION_STATUS_INTERNAL_PAGE;
return;
}
// Identity section.
certificate_ = visible_security_state.certificate;
// TODO(crbug.com/1044747): This conditional special-cases
// CERT_STATUS_LEGACY_TLS to avoid marking the certificate as "Invalid" in
// Page Info, but once we clean up the overloading of CertStatus for Legacy
// TLS we can remove this.
if (certificate_ &&
(!net::IsCertStatusError(visible_security_state.cert_status &
~net::CERT_STATUS_LEGACY_TLS))) {
// HTTPS with no or minor errors.
if (security_level == security_state::SECURE_WITH_POLICY_INSTALLED_CERT) {
#if BUILDFLAG(IS_CHROMEOS_ASH)
site_identity_status_ = SITE_IDENTITY_STATUS_ADMIN_PROVIDED_CERT;
#else
DCHECK(false) << "Policy certificates exist only on ChromeOS";
#endif
} else {
// No major or minor errors.
if (visible_security_state.cert_status & net::CERT_STATUS_IS_EV) {
// EV HTTPS page.
site_identity_status_ = SITE_IDENTITY_STATUS_EV_CERT;
} else {
// Non-EV OK HTTPS page.
site_identity_status_ = SITE_IDENTITY_STATUS_CERT;
std::u16string issuer_name(
UTF8ToUTF16(certificate_->issuer().GetDisplayName()));
if (issuer_name.empty()) {
issuer_name.assign(l10n_util::GetStringUTF16(
IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY));
}
#if defined(OS_ANDROID)
// This string is shown on all non-error HTTPS sites on Android when
// the user taps "Details" link on page info.
identity_status_description_android_.assign(l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURE_IDENTITY_VERIFIED,
delegate_->GetClientApplicationName(), issuer_name));
#endif
}
if (security_state::IsSHA1InChain(visible_security_state)) {
site_identity_status_ =
SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM;
#if defined(OS_ANDROID)
identity_status_description_android_ +=
UTF8ToUTF16("\n\n") +
l10n_util::GetStringUTF16(
IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM);
#endif
}
}
} else {
// HTTP or HTTPS with errors (not warnings).
if (!security_state::IsSchemeCryptographic(visible_security_state.url) ||
!visible_security_state.certificate) {
site_identity_status_ = SITE_IDENTITY_STATUS_NO_CERT;
} else {
site_identity_status_ = SITE_IDENTITY_STATUS_ERROR;
}
#if defined(OS_ANDROID)
const std::u16string bullet = UTF8ToUTF16("\n • ");
std::vector<ssl_errors::ErrorInfo> errors;
ssl_errors::ErrorInfo::GetErrorsForCertStatus(
certificate_, visible_security_state.cert_status, url, &errors);
identity_status_description_android_.assign(l10n_util::GetStringUTF16(
IDS_PAGE_INFO_SECURITY_TAB_INSECURE_IDENTITY));
for (const ssl_errors::ErrorInfo& error : errors) {
identity_status_description_android_ += bullet;
identity_status_description_android_ += error.short_description();
}
if (visible_security_state.cert_status & net::CERT_STATUS_NON_UNIQUE_NAME) {
identity_status_description_android_ += u"\n\n";
identity_status_description_android_ +=
l10n_util::GetStringUTF16(IDS_PAGE_INFO_SECURITY_TAB_NON_UNIQUE_NAME);
}
#endif
}
if (visible_security_state.malicious_content_status !=
security_state::MALICIOUS_CONTENT_STATUS_NONE) {
// The site has been flagged by Safe Browsing. Takes precedence over TLS.
GetSafeBrowsingStatusByMaliciousContentStatus(
visible_security_state.malicious_content_status, &safe_browsing_status_,
&safe_browsing_details_);
#if defined(OS_ANDROID)
identity_status_description_android_ = safe_browsing_details_;
#endif
#if BUILDFLAG(FULL_SAFE_BROWSING)
bool old_show_change_pw_buttons = show_change_password_buttons_;
#endif
show_change_password_buttons_ =
(visible_security_state.malicious_content_status ==
security_state::
MALICIOUS_CONTENT_STATUS_SIGNED_IN_SYNC_PASSWORD_REUSE ||
visible_security_state.malicious_content_status ==
security_state::
MALICIOUS_CONTENT_STATUS_SIGNED_IN_NON_SYNC_PASSWORD_REUSE ||
visible_security_state.malicious_content_status ==
security_state::
MALICIOUS_CONTENT_STATUS_ENTERPRISE_PASSWORD_REUSE ||
visible_security_state.malicious_content_status ==
security_state::MALICIOUS_CONTENT_STATUS_SAVED_PASSWORD_REUSE);
#if BUILDFLAG(FULL_SAFE_BROWSING)
// Only record password reuse when adding the button, not on updates.
if (show_change_password_buttons_ && !old_show_change_pw_buttons) {
RecordPasswordReuseEvent();
}
#endif
}
safety_tip_info_ = visible_security_state.safety_tip_info;
#if defined(OS_ANDROID)
if (security_state::IsSafetyTipUIFeatureEnabled()) {
// identity_status_description_android_ is only displayed on Android when
// the user taps "Details" link on the page info. Reuse the description from
// page info UI.
std::unique_ptr<PageInfoUI::SecurityDescription> security_description =
PageInfoUI::CreateSafetyTipSecurityDescription(safety_tip_info_);
if (security_description) {
identity_status_description_android_ = security_description->details;
}
}
#endif
// Site Connection
// We consider anything less than 80 bits encryption to be weak encryption.
// TODO(wtc): Bug 1198735: report mixed/unsafe content for unencrypted and
// weakly encrypted connections.
site_connection_status_ = SITE_CONNECTION_STATUS_UNKNOWN;
std::u16string subject_name(GetSimpleSiteName(url));
if (subject_name.empty()) {
subject_name.assign(
l10n_util::GetStringUTF16(IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY));
}
if (!visible_security_state.certificate ||
!security_state::IsSchemeCryptographic(visible_security_state.url)) {
// Page is still loading (so SSL status is not yet available) or
// loaded over HTTP or loaded over HTTPS with no cert.
site_connection_status_ = SITE_CONNECTION_STATUS_UNENCRYPTED;
site_connection_details_.assign(l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT,
subject_name));
} else if (!visible_security_state.connection_info_initialized) {
DCHECK_NE(security_level, security_state::NONE);
site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR;
} else {
site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED;
if (net::ObsoleteSSLStatus(
visible_security_state.connection_status,
visible_security_state.peer_signature_algorithm) ==
net::OBSOLETE_SSL_NONE) {
site_connection_details_.assign(l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_CONNECTION_TEXT, subject_name));
} else {
site_connection_details_.assign(l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_WEAK_ENCRYPTION_CONNECTION_TEXT,
subject_name));
}
if (visible_security_state.cert_status & net::CERT_STATUS_LEGACY_TLS) {
site_connection_status_ = SITE_CONNECTION_STATUS_LEGACY_TLS;
}
ReportAnyInsecureContent(visible_security_state, &site_connection_status_,
&site_connection_details_);
}
uint16_t cipher_suite = net::SSLConnectionStatusToCipherSuite(
visible_security_state.connection_status);
if (visible_security_state.connection_info_initialized && cipher_suite) {
int ssl_version = net::SSLConnectionStatusToVersion(
visible_security_state.connection_status);
const char* ssl_version_str;
net::SSLVersionToString(&ssl_version_str, ssl_version);
site_connection_details_ += u"\n\n";
site_connection_details_ += l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_SSL_VERSION, ASCIIToUTF16(ssl_version_str));
const char *key_exchange, *cipher, *mac;
bool is_aead, is_tls13;
net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead,
&is_tls13, cipher_suite);
site_connection_details_ += u"\n\n";
if (is_aead) {
if (is_tls13) {
// For TLS 1.3 ciphers, report the group (historically, curve) as the
// key exchange.
key_exchange =
SSL_get_curve_name(visible_security_state.key_exchange_group);
if (!key_exchange) {
NOTREACHED();
key_exchange = "";
}
}
site_connection_details_ += l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTION_DETAILS_AEAD,
ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange));
} else {
site_connection_details_ += l10n_util::GetStringFUTF16(
IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTION_DETAILS, ASCIIToUTF16(cipher),
ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
}
}
// Check if a user decision has been made to allow or deny certificates with
// errors on this site.
StatefulSSLHostStateDelegate* delegate =
delegate_->GetStatefulSSLHostStateDelegate();
DCHECK(delegate);
// Only show an SSL decision revoke button if the user has chosen to bypass
// SSL host errors for this host in the past, and we're not presently on a
// Safe Browsing error (since otherwise it's confusing which warning you're
// re-enabling).
show_ssl_decision_revoke_button_ =
delegate->HasAllowException(url.host(), web_contents()) &&
visible_security_state.malicious_content_status ==
security_state::MALICIOUS_CONTENT_STATUS_NONE;
}
void PageInfo::PresentSitePermissions() {
PermissionInfoList permission_info_list;
ChosenObjectInfoList chosen_object_info_list;
PermissionInfo permission_info;
HostContentSettingsMap* content_settings = GetContentSettings();
for (const ContentSettingsType type : kPermissionType) {
permission_info.type = type;
content_settings::SettingInfo info;
// TODO(crbug.com/1030245) Investigate why the value is queried from the low
// level routine GetWebsiteSettings.
std::unique_ptr<base::Value> value = content_settings->GetWebsiteSetting(
site_url_, site_url_, permission_info.type, &info);
DCHECK(value.get());
if (value->type() == base::Value::Type::INTEGER) {
permission_info.setting =
content_settings::ValueToContentSetting(value.get());
} else {
NOTREACHED();
}
permission_info.source = info.source;
permission_info.is_one_time =
(info.session_model == content_settings::SessionModel::OneTime);
if (info.primary_pattern == ContentSettingsPattern::Wildcard() &&
info.secondary_pattern == ContentSettingsPattern::Wildcard()) {
permission_info.default_setting = permission_info.setting;
permission_info.setting = CONTENT_SETTING_DEFAULT;
} else {
permission_info.default_setting =
content_settings->GetDefaultContentSetting(permission_info.type,
nullptr);
}
// For permissions that are still prompting the user and haven't been
// explicitly set by another source, check its embargo status.
if (permissions::PermissionUtil::IsPermission(permission_info.type) &&
permission_info.setting == CONTENT_SETTING_DEFAULT &&
permission_info.source ==
content_settings::SettingSource::SETTING_SOURCE_USER) {
permissions::PermissionResult permission_result =
delegate_->GetPermissionStatus(permission_info.type, site_url_);
// If under embargo, update |permission_info| to reflect that.
if (permission_result.content_setting == CONTENT_SETTING_BLOCK &&
(permission_result.source ==
permissions::PermissionStatusSource::MULTIPLE_DISMISSALS ||
permission_result.source ==
permissions::PermissionStatusSource::MULTIPLE_IGNORES)) {
permission_info.setting = permission_result.content_setting;
}
}
if (ShouldShowPermission(
permission_info, site_url_, content_settings, web_contents(),
HasContentSettingChangedViaPageInfo(permission_info.type),
delegate_->IsSubresourceFilterActivated(site_url_))) {
permission_info_list.push_back(permission_info);
}
}
const auto origin = url::Origin::Create(site_url_);
for (const ChooserUIInfo& ui_info : kChooserUIInfo) {
permissions::ChooserContextBase* context =
delegate_->GetChooserContext(ui_info.content_settings_type);
if (!context)
continue;
auto chosen_objects = context->GetGrantedObjects(origin);
for (std::unique_ptr<permissions::ChooserContextBase::Object>& object :
chosen_objects) {
chosen_object_info_list.push_back(
std::make_unique<PageInfoUI::ChosenObjectInfo>(ui_info,
std::move(object)));
}
}
ui_->SetPermissionInfo(permission_info_list,
std::move(chosen_object_info_list));
}
void PageInfo::PresentSiteData() {
CookieInfoList cookie_info_list;
// Add first party cookie and site data counts.
// TODO(crbug.com/1058597): Remove the calls to the |delegate_| once
// PageSpecificContentSettings has been componentized.
PageInfoUI::CookieInfo cookie_info;
cookie_info.allowed = GetFirstPartyAllowedCookiesCount(site_url_);
cookie_info.blocked = GetFirstPartyBlockedCookiesCount(site_url_);
cookie_info.is_first_party = true;
cookie_info_list.push_back(cookie_info);
// Add third party cookie counts.
cookie_info.allowed = GetThirdPartyAllowedCookiesCount(site_url_);
cookie_info.blocked = GetThirdPartyBlockedCookiesCount(site_url_);
cookie_info.is_first_party = false;
cookie_info_list.push_back(cookie_info);
ui_->SetCookieInfo(cookie_info_list);
}
void PageInfo::PresentSiteIdentity() {
// After initialization the status about the site's connection and its
// identity must be available.
DCHECK_NE(site_identity_status_, SITE_IDENTITY_STATUS_UNKNOWN);
DCHECK_NE(site_connection_status_, SITE_CONNECTION_STATUS_UNKNOWN);
PageInfoUI::IdentityInfo info;
info.site_identity = UTF16ToUTF8(GetSimpleSiteName(site_url_));
info.connection_status = site_connection_status_;
info.connection_status_description = UTF16ToUTF8(site_connection_details_);
info.identity_status = site_identity_status_;
info.safe_browsing_status = safe_browsing_status_;
info.safe_browsing_details = safe_browsing_details_;
if (security_state::IsSafetyTipUIFeatureEnabled()) {
info.safety_tip_info = safety_tip_info_;
}
#if defined(OS_ANDROID)
info.identity_status_description_android =
UTF16ToUTF8(identity_status_description_android_);
#endif
info.certificate = certificate_;
info.show_ssl_decision_revoke_button = show_ssl_decision_revoke_button_;
info.show_change_password_buttons = show_change_password_buttons_;
ui_->SetIdentityInfo(info);
}
void PageInfo::PresentPageFeatureInfo() {
PageInfoUI::PageFeatureInfo info;
info.is_vr_presentation_in_headset =
delegate_->IsContentDisplayedInVrHeadset();
ui_->SetPageFeatureInfo(info);
}
#if BUILDFLAG(FULL_SAFE_BROWSING)
void PageInfo::RecordPasswordReuseEvent() {
auto* password_protection_service = delegate_->GetPasswordProtectionService();
if (!password_protection_service) {
return;
}
safe_browsing::LogWarningAction(
safe_browsing::WarningUIType::PAGE_INFO,
safe_browsing::WarningAction::SHOWN,
password_protection_service
->reused_password_account_type_for_last_shown_warning());
}
#endif
HostContentSettingsMap* PageInfo::GetContentSettings() const {
return delegate_->GetContentSettings();
}
std::vector<ContentSettingsType> PageInfo::GetAllPermissionsForTesting() {
std::vector<ContentSettingsType> permission_list;
for (const ContentSettingsType type : kPermissionType)
permission_list.push_back(type);
return permission_list;
}
void PageInfo::GetSafeBrowsingStatusByMaliciousContentStatus(
security_state::MaliciousContentStatus malicious_content_status,
PageInfo::SafeBrowsingStatus* status,
std::u16string* details) {
switch (malicious_content_status) {
case security_state::MALICIOUS_CONTENT_STATUS_NONE:
NOTREACHED();
break;
case security_state::MALICIOUS_CONTENT_STATUS_MALWARE:
*status = PageInfo::SAFE_BROWSING_STATUS_MALWARE;
*details = l10n_util::GetStringUTF16(IDS_PAGE_INFO_MALWARE_DETAILS);
break;
case security_state::MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING:
*status = PageInfo::SAFE_BROWSING_STATUS_SOCIAL_ENGINEERING;
*details =
l10n_util::GetStringUTF16(IDS_PAGE_INFO_SOCIAL_ENGINEERING_DETAILS);
break;
case security_state::MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE:
*status = PageInfo::SAFE_BROWSING_STATUS_UNWANTED_SOFTWARE;
*details =
l10n_util::GetStringUTF16(IDS_PAGE_INFO_UNWANTED_SOFTWARE_DETAILS);
break;
case security_state::MALICIOUS_CONTENT_STATUS_SAVED_PASSWORD_REUSE:
#if BUILDFLAG(FULL_SAFE_BROWSING)
*status = PageInfo::SAFE_BROWSING_STATUS_SAVED_PASSWORD_REUSE;
*details = delegate_->GetWarningDetailText();
#endif
break;
case security_state::MALICIOUS_CONTENT_STATUS_SIGNED_IN_SYNC_PASSWORD_REUSE:
#if BUILDFLAG(FULL_SAFE_BROWSING)
*status = PageInfo::SAFE_BROWSING_STATUS_SIGNED_IN_SYNC_PASSWORD_REUSE;
*details = delegate_->GetWarningDetailText();
#endif
break;
case security_state::
MALICIOUS_CONTENT_STATUS_SIGNED_IN_NON_SYNC_PASSWORD_REUSE:
#if BUILDFLAG(FULL_SAFE_BROWSING)
*status =
PageInfo::SAFE_BROWSING_STATUS_SIGNED_IN_NON_SYNC_PASSWORD_REUSE;
*details = delegate_->GetWarningDetailText();
#endif
break;
case security_state::MALICIOUS_CONTENT_STATUS_ENTERPRISE_PASSWORD_REUSE:
#if BUILDFLAG(FULL_SAFE_BROWSING)
*status = PageInfo::SAFE_BROWSING_STATUS_ENTERPRISE_PASSWORD_REUSE;
*details = delegate_->GetWarningDetailText();
#endif
break;
case security_state::MALICIOUS_CONTENT_STATUS_BILLING:
*status = PageInfo::SAFE_BROWSING_STATUS_BILLING;
*details = l10n_util::GetStringUTF16(IDS_PAGE_INFO_BILLING_DETAILS);
break;
}
}
content_settings::PageSpecificContentSettings*
PageInfo::GetPageSpecificContentSettings() const {
// TODO(https://crbug.com/1103176): PageInfo should be per page. Why is it
// a WebContentsObserver if it is not observing anything?
return content_settings::PageSpecificContentSettings::GetForFrame(
web_contents()->GetMainFrame());
}
bool PageInfo::HasContentSettingChangedViaPageInfo(ContentSettingsType type) {
auto* settings = GetPageSpecificContentSettings();
if (!settings)
return false;
return settings->HasContentSettingChangedViaPageInfo(type);
}
void PageInfo::ContentSettingChangedViaPageInfo(ContentSettingsType type) {
auto* settings = GetPageSpecificContentSettings();
if (!settings)
return;
return settings->ContentSettingChangedViaPageInfo(type);
}
int PageInfo::GetFirstPartyAllowedCookiesCount(const GURL& site_url) {
auto* settings = GetPageSpecificContentSettings();
if (!settings)
return 0;
return settings->allowed_local_shared_objects().GetObjectCountForDomain(
site_url);
}
int PageInfo::GetFirstPartyBlockedCookiesCount(const GURL& site_url) {
auto* settings = GetPageSpecificContentSettings();
if (!settings)
return 0;
return settings->blocked_local_shared_objects().GetObjectCountForDomain(
site_url);
}
int PageInfo::GetThirdPartyAllowedCookiesCount(const GURL& site_url) {
auto* settings = GetPageSpecificContentSettings();
if (!settings)
return 0;
return settings->allowed_local_shared_objects().GetObjectCount() -
GetFirstPartyAllowedCookiesCount(site_url);
}
int PageInfo::GetThirdPartyBlockedCookiesCount(const GURL& site_url) {
auto* settings = GetPageSpecificContentSettings();
if (!settings)
return 0;
return settings->blocked_local_shared_objects().GetObjectCount() -
GetFirstPartyBlockedCookiesCount(site_url);
}