blob: 958b7a1db9fa6a8a5162ae87a187859a67b264bc [file] [log] [blame]
// Copyright 2016 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef COMPONENTS_SECURITY_INTERSTITIALS_CORE_UNSAFE_RESOURCE_H_
#define COMPONENTS_SECURITY_INTERSTITIALS_CORE_UNSAFE_RESOURCE_H_
#include <optional>
#include <vector>
#include "base/functional/callback.h"
#include "base/memory/scoped_refptr.h"
#include "base/task/sequenced_task_runner.h"
#include "base/unguessable_token.h"
#include "components/safe_browsing/core/browser/db/hit_report.h"
#include "components/safe_browsing/core/browser/db/util.h"
#include "components/safe_browsing/core/common/proto/realtimeapi.pb.h"
#include "components/security_interstitials/core/unsafe_resource_locator.h"
#include "url/gurl.h"
namespace web {
class WebState;
} // namespace web
namespace security_interstitials {
// Structure that passes parameters between the IO and UI thread when
// interacting with the safe browsing blocking page.
struct UnsafeResource {
// Helper structure returned through UrlCheckCallback.
struct UrlCheckResult {
UrlCheckResult(bool proceed,
bool showed_interstitial,
bool has_post_commit_interstitial_skipped);
// Indicates whether or not it is OK to proceed with loading an URL.
bool proceed;
// Should only be set to true if the interstitial was shown as a direct
// result of the navigation to the URL. (e.g. it should be set to true if
// the interstitial will be shown from a navigation throttle triggered by
// this navigation, but to false if it will be shown using
// LoadPostCommitErrorPage). Only used to control the error code returned in
// BrowserUrlLoaderThrottle.
bool showed_interstitial;
// Should only be set to true if LoadPostCommitErrorPage should be called
// but skipped because the main page load is pending. Only consumed by
// AsyncCheckTracker.
bool has_post_commit_interstitial_skipped;
};
using UrlCheckCallback = base::RepeatingCallback<void(UrlCheckResult)>;
using RenderProcessId = UnsafeResourceLocator::RenderProcessId;
using RenderFrameToken = UnsafeResourceLocator::RenderFrameToken;
using FrameTreeNodeId = UnsafeResourceLocator::FrameTreeNodeId;
static constexpr RenderProcessId kNoRenderProcessId =
UnsafeResourceLocator::kNoRenderProcessId;
static constexpr FrameTreeNodeId kNoFrameTreeNodeId =
UnsafeResourceLocator::kNoFrameTreeNodeId;
UnsafeResource();
UnsafeResource(const UnsafeResource& other);
~UnsafeResource();
// Returns true if this UnsafeResource is a main frame load while the
// navigation is still pending. Note that a main frame hit may not be
// blocking, eg. client side detection happens after the load is committed.
// Note: If async check is enabled, please call
// AsyncCheckTracker::IsMainPageLoadPending instead.
static bool IsMainPageLoadPendingWithSyncCheck(
safe_browsing::SBThreatType threat_type);
// Checks if |callback| is not null and posts it to |callback_sequence|.
void DispatchCallback(const base::Location& from_here,
bool proceed,
bool showed_interstitial,
bool has_post_commit_interstitial_skipped) const;
GURL url;
GURL original_url;
GURL navigation_url;
GURL referrer_url;
std::vector<GURL> redirect_urls;
safe_browsing::SBThreatType threat_type;
safe_browsing::ThreatSubtype threat_subtype =
safe_browsing::ThreatSubtype::UNKNOWN;
safe_browsing::ThreatMetadata threat_metadata;
safe_browsing::RTLookupResponse rt_lookup_response;
// A callback to deliver the |UrlCheckResult| back to the creator of the
// object. Setting this field is optional to the creator, depending on whether
// it is interested in knowing the result.
// This is called back on |callback_sequence|.
UrlCheckCallback callback;
scoped_refptr<base::SequencedTaskRunner> callback_sequence;
// TODO(crbug.com/40686246): `weak_web_state` is only used on iOS, and
// `rfh_locator` is used on all other platforms. This struct should be
// refactored to use only the common functionality that can be shared across
// platforms.
UnsafeResourceLocator rfh_locator;
std::optional<int64_t> navigation_id;
base::WeakPtr<web::WebState> weak_web_state;
safe_browsing::ThreatSource threat_source =
safe_browsing::ThreatSource::UNKNOWN;
// |token| field is only set if |threat_type| is
// SB_THREAT_TYPE_*_PASSWORD_REUSE.
std::string token;
// If true, this UnsafeResource is created because of the Delayed Warnings
// experiment.
bool is_delayed_warning;
// If true, this UnsafeResource is created by a check that doesn't delay
// navigation to complete. If false, it can either be the UnsafeResource is
// not for navigation or it delays navigation. Default to false.
bool is_async_check;
};
} // namespace security_interstitials
#endif // COMPONENTS_SECURITY_INTERSTITIALS_CORE_UNSAFE_RESOURCE_H_