blob: b3a50313f123258450bb50e6630413d854385f51 [file] [log] [blame]
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "android_webview/browser/aw_url_checker_delegate_impl.h"
#include "android_webview/browser/aw_contents_client_bridge.h"
#include "android_webview/browser/aw_contents_io_thread_client.h"
#include "android_webview/browser/aw_safe_browsing_ui_manager.h"
#include "android_webview/browser/aw_safe_browsing_whitelist_manager.h"
#include "android_webview/browser/net/aw_web_resource_request.h"
#include "base/bind.h"
#include "base/feature_list.h"
#include "base/task/post_task.h"
#include "components/safe_browsing/db/database_manager.h"
#include "components/safe_browsing/db/v4_protocol_manager_util.h"
#include "components/safe_browsing/features.h"
#include "components/security_interstitials/content/unsafe_resource.h"
#include "components/security_interstitials/core/urls.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/navigation_entry.h"
#include "content/public/browser/web_contents.h"
namespace android_webview {
AwUrlCheckerDelegateImpl::AwUrlCheckerDelegateImpl(
scoped_refptr<safe_browsing::SafeBrowsingDatabaseManager> database_manager,
scoped_refptr<AwSafeBrowsingUIManager> ui_manager,
AwSafeBrowsingWhitelistManager* whitelist_manager)
: database_manager_(std::move(database_manager)),
ui_manager_(std::move(ui_manager)),
threat_types_(safe_browsing::CreateSBThreatTypeSet(
{safe_browsing::SB_THREAT_TYPE_URL_MALWARE,
safe_browsing::SB_THREAT_TYPE_URL_PHISHING,
safe_browsing::SB_THREAT_TYPE_URL_UNWANTED})),
whitelist_manager_(whitelist_manager) {
if (base::FeatureList::IsEnabled(safe_browsing::kBillingInterstitial)) {
threat_types_.insert(safe_browsing::SB_THREAT_TYPE_BILLING);
}
}
AwUrlCheckerDelegateImpl::~AwUrlCheckerDelegateImpl() = default;
void AwUrlCheckerDelegateImpl::MaybeDestroyPrerenderContents(
const base::Callback<content::WebContents*()>& web_contents_getter) {}
void AwUrlCheckerDelegateImpl::StartDisplayingBlockingPageHelper(
const security_interstitials::UnsafeResource& resource,
const std::string& method,
const net::HttpRequestHeaders& headers,
bool is_main_frame,
bool has_user_gesture) {
AwWebResourceRequest request(resource.url.spec(), method, is_main_frame,
has_user_gesture, headers);
base::PostTaskWithTraits(
FROM_HERE, {content::BrowserThread::UI},
base::BindOnce(&AwUrlCheckerDelegateImpl::StartApplicationResponse,
ui_manager_, resource, std::move(request)));
}
bool AwUrlCheckerDelegateImpl::IsUrlWhitelisted(const GURL& url) {
return whitelist_manager_->IsURLWhitelisted(url);
}
bool AwUrlCheckerDelegateImpl::ShouldSkipRequestCheck(
content::ResourceContext* resource_context,
const GURL& original_url,
int frame_tree_node_id,
int render_process_id,
int render_frame_id,
bool originated_from_service_worker) {
std::unique_ptr<AwContentsIoThreadClient> client;
if (originated_from_service_worker)
client = AwContentsIoThreadClient::GetServiceWorkerIoThreadClient();
else if (render_process_id == -1 || render_frame_id == -1) {
client = AwContentsIoThreadClient::FromID(frame_tree_node_id);
} else {
client =
AwContentsIoThreadClient::FromID(render_process_id, render_frame_id);
}
// Consider the request as whitelisted, if SafeBrowsing is not enabled.
return client && !client->GetSafeBrowsingEnabled();
}
void AwUrlCheckerDelegateImpl::NotifySuspiciousSiteDetected(
const base::RepeatingCallback<content::WebContents*()>&
web_contents_getter) {}
const safe_browsing::SBThreatTypeSet&
AwUrlCheckerDelegateImpl::GetThreatTypes() {
return threat_types_;
}
safe_browsing::SafeBrowsingDatabaseManager*
AwUrlCheckerDelegateImpl::GetDatabaseManager() {
return database_manager_.get();
}
safe_browsing::BaseUIManager* AwUrlCheckerDelegateImpl::GetUIManager() {
return ui_manager_.get();
}
// static
void AwUrlCheckerDelegateImpl::StartApplicationResponse(
scoped_refptr<AwSafeBrowsingUIManager> ui_manager,
const security_interstitials::UnsafeResource& resource,
const AwWebResourceRequest& request) {
content::WebContents* web_contents = resource.web_contents_getter.Run();
AwContentsClientBridge* client =
AwContentsClientBridge::FromWebContents(web_contents);
if (client) {
base::OnceCallback<void(SafeBrowsingAction, bool)> callback =
base::BindOnce(&AwUrlCheckerDelegateImpl::DoApplicationResponse,
ui_manager, resource);
client->OnSafeBrowsingHit(request, resource.threat_type,
std::move(callback));
}
}
// static
void AwUrlCheckerDelegateImpl::DoApplicationResponse(
scoped_refptr<AwSafeBrowsingUIManager> ui_manager,
const security_interstitials::UnsafeResource& resource,
SafeBrowsingAction action,
bool reporting) {
if (!reporting)
ui_manager->SetExtendedReportingAllowed(false);
// TODO(ntfschr): fully handle reporting once we add support (crbug/688629)
bool proceed;
switch (action) {
case SafeBrowsingAction::SHOW_INTERSTITIAL:
base::PostTaskWithTraits(
FROM_HERE, {content::BrowserThread::UI},
base::BindOnce(
&AwUrlCheckerDelegateImpl::StartDisplayingDefaultBlockingPage,
ui_manager, resource));
return;
case SafeBrowsingAction::PROCEED:
proceed = true;
break;
case SafeBrowsingAction::BACK_TO_SAFETY:
proceed = false;
break;
default:
NOTREACHED();
}
content::WebContents* web_contents = resource.web_contents_getter.Run();
content::NavigationEntry* entry = resource.GetNavigationEntryForResource();
GURL main_frame_url = entry ? entry->GetURL() : GURL();
// Navigate back for back-to-safety on subresources
if (!proceed && resource.is_subframe) {
if (web_contents->GetController().CanGoBack()) {
web_contents->GetController().GoBack();
} else {
web_contents->GetController().LoadURL(
ui_manager->default_safe_page(), content::Referrer(),
ui::PAGE_TRANSITION_AUTO_TOPLEVEL, std::string());
}
}
ui_manager->OnBlockingPageDone(
std::vector<security_interstitials::UnsafeResource>{resource}, proceed,
web_contents, main_frame_url);
}
// static
void AwUrlCheckerDelegateImpl::StartDisplayingDefaultBlockingPage(
scoped_refptr<AwSafeBrowsingUIManager> ui_manager,
const security_interstitials::UnsafeResource& resource) {
content::WebContents* web_contents = resource.web_contents_getter.Run();
if (web_contents) {
ui_manager->DisplayBlockingPage(resource);
return;
}
// Reporting back that it is not okay to proceed with loading the URL.
base::PostTaskWithTraits(FROM_HERE, {content::BrowserThread::IO},
base::BindOnce(resource.callback, false));
}
} // namespace android_webview