1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113
|
// Copyright 2015 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/test/mock_ssl_host_state_delegate.h"
#include "base/containers/contains.h"
#include "base/functional/callback.h"
#include "url/gurl.h"
namespace content {
MockSSLHostStateDelegate::MockSSLHostStateDelegate() {}
MockSSLHostStateDelegate::~MockSSLHostStateDelegate() {}
void MockSSLHostStateDelegate::AllowCert(const std::string& host,
const net::X509Certificate& cert,
int error,
StoragePartition* storage_partition) {
exceptions_.insert(host);
}
void MockSSLHostStateDelegate::Clear(
base::RepeatingCallback<bool(const std::string&)> host_filter) {
if (host_filter.is_null()) {
exceptions_.clear();
} else {
for (auto it = exceptions_.begin(); it != exceptions_.end();) {
auto next_it = std::next(it);
if (host_filter.Run(*it))
exceptions_.erase(it);
it = next_it;
}
}
}
SSLHostStateDelegate::CertJudgment MockSSLHostStateDelegate::QueryPolicy(
const std::string& host,
const net::X509Certificate& cert,
int error,
StoragePartition* storage_partition) {
if (!base::Contains(exceptions_, host)) {
return SSLHostStateDelegate::DENIED;
}
return SSLHostStateDelegate::ALLOWED;
}
void MockSSLHostStateDelegate::HostRanInsecureContent(
const std::string& host,
InsecureContentType content_type) {
hosts_ran_insecure_content_.insert(host);
}
bool MockSSLHostStateDelegate::DidHostRunInsecureContent(
const std::string& host,
InsecureContentType content_type) {
return base::Contains(hosts_ran_insecure_content_, host);
}
void MockSSLHostStateDelegate::AllowHttpForHost(
const std::string& host,
StoragePartition* storage_partition) {
allow_http_hosts_.insert(host);
}
bool MockSSLHostStateDelegate::IsHttpAllowedForHost(
const std::string& host,
StoragePartition* storage_partition) {
return base::Contains(allow_http_hosts_, host);
}
void MockSSLHostStateDelegate::SetHttpsEnforcementForHost(
const std::string& host,
bool enforce,
StoragePartition* storage_partition) {
if (enforce) {
enforce_https_hosts_.insert(host);
} else {
enforce_https_hosts_.erase(host);
}
}
bool MockSSLHostStateDelegate::IsHttpsEnforcedForUrl(
const GURL& url,
StoragePartition* storage_partition) {
// HTTPS-First Mode is never auto-enabled for URLs with non-default ports.
if (!url.port().empty()) {
return false;
}
return base::Contains(enforce_https_hosts_, url.host());
}
void MockSSLHostStateDelegate::RevokeUserAllowExceptions(
const std::string& host) {
exceptions_.erase(host);
}
bool MockSSLHostStateDelegate::HasAllowException(
const std::string& host,
StoragePartition* storage_partition) {
return base::Contains(exceptions_, host);
}
bool MockSSLHostStateDelegate::HasAllowExceptionForAnyHost(
StoragePartition* storage_partition) {
return !exceptions_.empty();
}
} // namespace content
|