1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118
|
// Copyright 2017 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef COMPONENTS_SAFE_BROWSING_CORE_BROWSER_URL_CHECKER_DELEGATE_H_
#define COMPONENTS_SAFE_BROWSING_CORE_BROWSER_URL_CHECKER_DELEGATE_H_
#include <string>
#include "base/functional/callback.h"
#include "base/memory/ref_counted.h"
#include "base/types/optional_ref.h"
#include "base/unguessable_token.h"
#include "components/safe_browsing/core/browser/db/v4_protocol_manager_util.h"
#include "components/safe_browsing/core/common/proto/csd.pb.h"
namespace content {
class WebContents;
}
namespace net {
class HttpRequestHeaders;
}
namespace security_interstitials {
struct UnsafeResource;
}
namespace safe_browsing {
class BaseUIManager;
class SafeBrowsingDatabaseManager;
// Delegate interface for SafeBrowsingUrlCheckerImpl and SafeBrowsing's
// content::ResourceThrottle subclasses. They delegate to this interface those
// operations that different embedders (Chrome and Android WebView) handle
// differently.
//
// All methods should only be called from the IO thread.
class UrlCheckerDelegate
: public base::RefCountedThreadSafe<UrlCheckerDelegate> {
public:
// Destroys NoStatePrefetch contents if necessary. The parameter is a
// WebContents::OnceGetter, but that type is not visible from here.
virtual void MaybeDestroyNoStatePrefetchContents(
base::OnceCallback<content::WebContents*()> web_contents_getter) = 0;
// Starts displaying the SafeBrowsing interstitial page.
virtual void StartDisplayingBlockingPageHelper(
const security_interstitials::UnsafeResource& resource,
const std::string& method,
const net::HttpRequestHeaders& headers,
bool has_user_gesture) = 0;
// Starts observing user input events to display a SafeBrowsing interstitial
// page when an event is received.
virtual void StartObservingInteractionsForDelayedBlockingPageHelper(
const security_interstitials::UnsafeResource& resource) = 0;
// An allowlisted URL is considered safe and therefore won't be checked with
// the SafeBrowsing database.
virtual bool IsUrlAllowlisted(const GURL& url) = 0;
// Set the Safe Browsing allowlist domains. If the url being checked matches
// one of the domains in |allowlist_domains|, it is considered safe and
// therefore won't be checked with the SafeBrowsing database. If the current
// platform doesn't support the allowlist policy, this function will be no-op.
virtual void SetPolicyAllowlistDomains(
const std::vector<std::string>& allowlist_domains) = 0;
// If the method returns true, the entire request won't be checked, including
// the original URL and redirects.
// If neither of |render_process_id| and |render_frame_token| is a sentinel
// value, they will be used to identify the frame making the request;
// otherwise |frame_tree_node_id| will be used. Please note that
// |frame_tree_node_id| could also be a sentinel value, if a request is not
// associated with a frame. Also note that these ids are content/ specific.
// See comments in content::RenderFrameHost for the meaning of these ids and
// their sentinel values.
virtual bool ShouldSkipRequestCheck(
const GURL& original_url,
int frame_tree_node_id,
int render_process_id,
base::optional_ref<const base::UnguessableToken> render_frame_token,
bool originated_from_service_worker) = 0;
// Notifies the SafeBrowsing Trigger Manager that a suspicious site has been
// detected. |web_contents_getter| is used to determine which tab the site
// was detected on.
virtual void NotifySuspiciousSiteDetected(
const base::RepeatingCallback<content::WebContents*()>&
web_contents_getter) = 0;
// Send a CSBRR through UI manager to report the discrepancy info from URL
// real-time and hash real-time lookups.
virtual void SendUrlRealTimeAndHashRealTimeDiscrepancyReport(
std::unique_ptr<ClientSafeBrowsingReportRequest> report,
const base::RepeatingCallback<content::WebContents*()>&
web_contents_getter) = 0;
// Returns if the user has enhanced protection enabled to help determine if
// the background HPRT lookups can be sent.
virtual bool AreBackgroundHashRealTimeSampleLookupsAllowed(
const base::RepeatingCallback<content::WebContents*()>&
web_contents_getter) = 0;
virtual const SBThreatTypeSet& GetThreatTypes() = 0;
virtual SafeBrowsingDatabaseManager* GetDatabaseManager() = 0;
virtual BaseUIManager* GetUIManager() = 0;
protected:
friend class base::RefCountedThreadSafe<UrlCheckerDelegate>;
virtual ~UrlCheckerDelegate() = default;
};
} // namespace safe_browsing
#endif // COMPONENTS_SAFE_BROWSING_CORE_BROWSER_URL_CHECKER_DELEGATE_H_
|