blob: 7666fffe76a887caea449faeb0380d75ad4a7326 [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ui/passwords/manage_passwords_view_utils.h"
#include <stddef.h>
#include <algorithm>
#include "base/feature_list.h"
#include "base/metrics/histogram_macros.h"
#include "base/strings/utf_string_conversions.h"
#include "build/build_config.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/sync/profile_sync_service_factory.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_navigator.h"
#include "chrome/browser/ui/browser_navigator_params.h"
#include "chrome/browser/ui/chrome_pages.h"
#include "chrome/common/url_constants.h"
#include "chrome/common/webui_url_constants.h"
#include "chrome/grit/chromium_strings.h"
#include "chrome/grit/generated_resources.h"
#include "components/autofill/core/common/password_form.h"
#include "components/browser_sync/profile_sync_service.h"
#include "components/password_manager/core/browser/android_affiliation/affiliation_utils.h"
#include "components/password_manager/core/browser/password_manager_client.h"
#include "components/password_manager/core/browser/password_manager_util.h"
#include "components/password_manager/core/common/password_manager_features.h"
#include "components/strings/grit/components_strings.h"
#include "components/url_formatter/elide_url.h"
#include "net/base/registry_controlled_domains/registry_controlled_domain.h"
#include "net/base/url_util.h"
#include "ui/base/l10n/l10n_util.h"
#include "ui/base/page_transition_types.h"
#include "ui/base/window_open_disposition.h"
#include "ui/gfx/geometry/rect.h"
#include "ui/gfx/geometry/size.h"
#include "ui/gfx/image/image_skia.h"
#include "ui/gfx/image/image_skia_operations.h"
#include "url/gurl.h"
#include "url/origin.h"
namespace {
using password_manager::ManagePasswordsReferrer;
// Checks whether two URLs are from the same domain or host.
bool SameDomainOrHost(const GURL& gurl1, const GURL& gurl2) {
return net::registry_controlled_domains::SameDomainOrHost(
gurl1, gurl2,
net::registry_controlled_domains::INCLUDE_PRIVATE_REGISTRIES);
}
} // namespace
gfx::ImageSkia ScaleImageForAccountAvatar(gfx::ImageSkia skia_image) {
gfx::Size size = skia_image.size();
if (size.height() != size.width()) {
gfx::Rect target(size);
int side = std::min(size.height(), size.width());
target.ClampToCenteredSize(gfx::Size(side, side));
skia_image = gfx::ImageSkiaOperations::ExtractSubset(skia_image, target);
}
return gfx::ImageSkiaOperations::CreateResizedImage(
skia_image,
skia::ImageOperations::RESIZE_BEST,
gfx::Size(kAvatarImageSize, kAvatarImageSize));
}
std::pair<base::string16, base::string16> GetCredentialLabelsForAccountChooser(
const autofill::PasswordForm& form) {
base::string16 federation;
if (!form.federation_origin.opaque())
federation = base::UTF8ToUTF16(form.federation_origin.host());
if (form.display_name.empty())
return std::make_pair(form.username_value, std::move(federation));
// Display name isn't empty.
if (federation.empty())
return std::make_pair(form.display_name, form.username_value);
return std::make_pair(
form.display_name,
form.username_value + base::ASCIIToUTF16("\n") + federation);
}
void GetSavePasswordDialogTitleTextAndLinkRange(const GURL& user_visible_url,
const GURL& form_origin_url,
PasswordTitleType dialog_type,
base::string16* title) {
DCHECK(!password_manager::IsValidAndroidFacetURI(form_origin_url.spec()));
std::vector<size_t> offsets;
std::vector<base::string16> replacements;
int title_id = 0;
switch (dialog_type) {
case PasswordTitleType::SAVE_PASSWORD:
title_id = IDS_SAVE_PASSWORD;
break;
case PasswordTitleType::SAVE_ACCOUNT:
title_id = IDS_SAVE_ACCOUNT;
break;
case PasswordTitleType::UPDATE_PASSWORD:
title_id = IDS_UPDATE_PASSWORD;
break;
}
// Check whether the registry controlled domains for user-visible URL (i.e.
// the one seen in the omnibox) and the password form post-submit navigation
// URL differs or not.
if (!SameDomainOrHost(user_visible_url, form_origin_url)) {
DCHECK_NE(PasswordTitleType::SAVE_ACCOUNT, dialog_type)
<< "Calls to save account should always happen on the same domain.";
title_id = dialog_type == PasswordTitleType::UPDATE_PASSWORD
? IDS_UPDATE_PASSWORD_DIFFERENT_DOMAINS_TITLE
: IDS_SAVE_PASSWORD_DIFFERENT_DOMAINS_TITLE;
replacements.push_back(url_formatter::FormatUrlForSecurityDisplay(
form_origin_url, url_formatter::SchemeDisplay::OMIT_HTTP_AND_HTTPS));
}
*title = l10n_util::GetStringFUTF16(title_id, replacements, &offsets);
}
void GetManagePasswordsDialogTitleText(const GURL& user_visible_url,
const GURL& password_origin_url,
bool has_credentials,
base::string16* title) {
DCHECK(!password_manager::IsValidAndroidFacetURI(password_origin_url.spec()));
// Check whether the registry controlled domains for user-visible URL
// (i.e. the one seen in the omnibox) and the managed password origin URL
// differ or not.
if (!SameDomainOrHost(user_visible_url, password_origin_url)) {
base::string16 formatted_url =
url_formatter::FormatUrlForSecurityDisplay(password_origin_url);
*title = l10n_util::GetStringFUTF16(
has_credentials
? IDS_MANAGE_PASSWORDS_DIFFERENT_DOMAIN_TITLE
: IDS_MANAGE_PASSWORDS_DIFFERENT_DOMAIN_NO_PASSWORDS_TITLE,
formatted_url);
} else {
*title = l10n_util::GetStringUTF16(
has_credentials ? IDS_MANAGE_PASSWORDS_TITLE
: IDS_MANAGE_PASSWORDS_NO_PASSWORDS_TITLE);
}
}
base::string16 GetDisplayUsername(const autofill::PasswordForm& form) {
return form.username_value.empty()
? l10n_util::GetStringUTF16(IDS_PASSWORD_MANAGER_EMPTY_LOGIN)
: form.username_value;
}
bool IsSyncingAutosignSetting(Profile* profile) {
const browser_sync::ProfileSyncService* sync_service =
ProfileSyncServiceFactory::GetForProfile(profile);
return (sync_service && sync_service->IsFirstSetupComplete() &&
sync_service->IsSyncFeatureActive() &&
sync_service->GetActiveDataTypes().Has(syncer::PRIORITY_PREFERENCES));
}
GURL GetGooglePasswordManagerURL(ManagePasswordsReferrer referrer) {
GURL url(chrome::kGooglePasswordManagerURL);
url = net::AppendQueryParameter(url, "utm_source", "chrome");
#if defined(OS_ANDROID)
url = net::AppendQueryParameter(url, "utm_medium", "android");
#else
url = net::AppendQueryParameter(url, "utm_medium", "desktop");
#endif
std::string campaign = [referrer] {
switch (referrer) {
case ManagePasswordsReferrer::kChromeSettings:
return "chrome_settings";
case ManagePasswordsReferrer::kManagePasswordsBubble:
return "manage_passwords_bubble";
case ManagePasswordsReferrer::kPasswordContextMenu:
return "password_context_menu";
case ManagePasswordsReferrer::kPasswordDropdown:
return "password_dropdown";
case ManagePasswordsReferrer::kPasswordGenerationConfirmation:
return "password_generation_confirmation";
case ManagePasswordsReferrer::kProfileChooser:
return "profile_chooser";
case ManagePasswordsReferrer::kPasswordsAccessorySheet:
NOTREACHED();
}
NOTREACHED();
return "";
}();
return net::AppendQueryParameter(url, "utm_campaign", campaign);
}
bool ShouldManagePasswordsinGooglePasswordManager(Profile* profile) {
return base::FeatureList::IsEnabled(
password_manager::features::kGooglePasswordManager) &&
password_manager_util::GetPasswordSyncState(
ProfileSyncServiceFactory::GetForProfile(profile)) ==
password_manager::SYNCING_NORMAL_ENCRYPTION;
}
// Navigation is handled differently on Android.
#if !defined(OS_ANDROID)
void NavigateToGooglePasswordManager(Profile* profile,
ManagePasswordsReferrer referrer) {
NavigateParams params(profile, GetGooglePasswordManagerURL(referrer),
ui::PAGE_TRANSITION_LINK);
params.disposition = WindowOpenDisposition::NEW_FOREGROUND_TAB;
Navigate(&params);
}
void NavigateToManagePasswordsPage(Browser* browser,
ManagePasswordsReferrer referrer) {
UMA_HISTOGRAM_ENUMERATION("PasswordManager.ManagePasswordsReferrer",
referrer);
if (ShouldManagePasswordsinGooglePasswordManager(browser->profile())) {
NavigateToGooglePasswordManager(browser->profile(), referrer);
} else {
chrome::ShowPasswordManager(browser);
}
}
#endif // !defined(OS_ANDROID)