| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| // |
| // The Safe Browsing service is responsible for downloading anti-phishing and |
| // anti-malware tables and checking urls against them. |
| |
| #ifndef CHROME_BROWSER_SAFE_BROWSING_UI_MANAGER_H_ |
| #define CHROME_BROWSER_SAFE_BROWSING_UI_MANAGER_H_ |
| |
| #include <string> |
| #include <vector> |
| |
| #include "base/callback.h" |
| #include "base/macros.h" |
| #include "base/observer_list.h" |
| #include "base/time/time.h" |
| #include "chrome/browser/permissions/permission_uma_util.h" |
| #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
| #include "components/safe_browsing/base_ui_manager.h" |
| |
| class GURL; |
| |
| namespace content { |
| class WebContents; |
| struct PermissionReportInfo; |
| } // namespace content |
| |
| namespace history { |
| class HistoryService; |
| } // namespace history |
| |
| namespace safe_browsing { |
| |
| struct HitReport; |
| |
| // Construction needs to happen on the main thread. |
| class SafeBrowsingUIManager : public BaseUIManager { |
| public: |
| // Observer class can be used to get notified when a SafeBrowsing hit |
| // is found. |
| class Observer { |
| public: |
| // Called when |resource| is classified as unsafe by SafeBrowsing, and is |
| // not whitelisted. |
| // The |resource| must not be accessed after OnSafeBrowsingHit returns. |
| // This method will be called on the UI thread. |
| virtual void OnSafeBrowsingHit(const UnsafeResource& resource) = 0; |
| |
| protected: |
| Observer() {} |
| virtual ~Observer() {} |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(Observer); |
| }; |
| |
| explicit SafeBrowsingUIManager( |
| const scoped_refptr<SafeBrowsingService>& service); |
| |
| // Called to stop or shutdown operations on the io_thread. This may be called |
| // multiple times during the life of the UIManager. Should be called |
| // on IO thread. If shutdown is true, the manager is disabled permanently. |
| void StopOnIOThread(bool shutdown) override; |
| |
| // Called on the IO thread by the ThreatDetails with the serialized |
| // protocol buffer, so the service can send it over. |
| void SendSerializedThreatDetails(const std::string& serialized) override; |
| |
| // Report hits to unsafe contents (malware, phishing, unsafe download URL) |
| // to the server. Can only be called on UI thread. The hit report will |
| // only be sent if the user has enabled SBER and is not in incognito mode. |
| void MaybeReportSafeBrowsingHit( |
| const safe_browsing::HitReport& hit_report, |
| const content::WebContents* web_contents) override; |
| |
| // Report permission action to SafeBrowsing servers. Can only be called on UI |
| // thread. |
| void ReportPermissionAction(const PermissionReportInfo& report_info); |
| |
| // Creates the whitelist URL set for tests that create a blocking page |
| // themselves and then simulate OnBlockingPageDone(). OnBlockingPageDone() |
| // expects the whitelist to exist, but the tests don't necessarily call |
| // DisplayBlockingPage(), which creates it. |
| static void CreateWhitelistForTesting(content::WebContents* web_contents); |
| |
| // Add and remove observers. These methods must be invoked on the UI thread. |
| void AddObserver(Observer* observer); |
| void RemoveObserver(Observer* remove); |
| |
| const std::string app_locale() const override; |
| history::HistoryService* history_service( |
| content::WebContents* web_contents) override; |
| const GURL default_safe_page() const override; |
| |
| protected: |
| ~SafeBrowsingUIManager() override; |
| |
| // Call protocol manager on IO thread to report hits of unsafe contents. |
| void ReportSafeBrowsingHitOnIOThread( |
| const safe_browsing::HitReport& hit_report) override; |
| |
| // Creates a hit report for the given resource and calls |
| // MaybeReportSafeBrowsingHit. This also notifies all observers in |
| // |observer_list_|. |
| void CreateAndSendHitReport(const UnsafeResource& resource) override; |
| |
| // Calls SafeBrowsingBlockingPage::ShowBlockingPage(). |
| void ShowBlockingPageForResource(const UnsafeResource& resource) override; |
| |
| // Helper method to ensure hit reports are only sent when the user has |
| // opted in to extended reporting and is not currently in incognito mode. |
| static bool ShouldSendHitReport(const HitReport& hit_report, |
| const content::WebContents* web_contents); |
| |
| private: |
| friend class SafeBrowsingUIManagerTest; |
| friend class TestSafeBrowsingUIManager; |
| |
| // Report permission action to SafeBrowsing servers. |
| void ReportPermissionActionOnIOThread( |
| const PermissionReportInfo& report_info); |
| |
| static GURL GetMainFrameWhitelistUrlForResourceForTesting( |
| const safe_browsing::SafeBrowsingUIManager::UnsafeResource& resource); |
| |
| // Safebrowsing service. |
| scoped_refptr<SafeBrowsingService> sb_service_; |
| |
| base::ObserverList<Observer> observer_list_; |
| |
| DISALLOW_COPY_AND_ASSIGN(SafeBrowsingUIManager); |
| }; |
| |
| } // namespace safe_browsing |
| |
| #endif // CHROME_BROWSER_SAFE_BROWSING_UI_MANAGER_H_ |