File: ip_protection_status.cc

package info (click to toggle)
chromium 139.0.7258.127-2
  • links: PTS, VCS
  • area: main
  • in suites: forky
  • size: 6,122,156 kB
  • sloc: cpp: 35,100,771; ansic: 7,163,530; javascript: 4,103,002; python: 1,436,920; asm: 946,517; xml: 746,709; pascal: 187,653; perl: 88,691; sh: 88,436; objc: 79,953; sql: 51,488; cs: 44,583; fortran: 24,137; makefile: 22,147; tcl: 15,277; php: 13,980; yacc: 8,984; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (71 lines) | stat: -rw-r--r-- 2,590 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
// Copyright 2025 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "components/ip_protection/common/ip_protection_status.h"

#include "base/feature_list.h"
#include "components/ip_protection/common/ip_protection_status_observer.h"
#include "content/public/browser/global_request_id.h"
#include "content/public/browser/render_frame_host.h"
#include "content/public/browser/web_contents.h"
#include "content/public/browser/web_contents_observer.h"
#include "content/public/browser/web_contents_user_data.h"
#include "net/base/features.h"
#include "net/base/proxy_chain.h"
#include "third_party/blink/public/mojom/loader/resource_load_info.mojom.h"

namespace ip_protection {

// static
void IpProtectionStatus::CreateForWebContents(
    content::WebContents* web_contents) {
  CHECK(base::FeatureList::IsEnabled(net::features::kEnableIpProtectionProxy));

  content::WebContentsUserData<IpProtectionStatus>::CreateForWebContents(
      web_contents);
}

IpProtectionStatus::IpProtectionStatus(content::WebContents* web_contents)
    : content::WebContentsUserData<IpProtectionStatus>(*web_contents),
      content::WebContentsObserver(web_contents) {}

IpProtectionStatus::~IpProtectionStatus() = default;

void IpProtectionStatus::AddObserver(IpProtectionStatusObserver* observer) {
  observer_list_.AddObserver(observer);
}

void IpProtectionStatus::RemoveObserver(IpProtectionStatusObserver* observer) {
  observer_list_.RemoveObserver(observer);
}

// content::WebContentsObserver:
void IpProtectionStatus::PrimaryPageChanged(content::Page& page) {
  is_subresource_proxied_on_current_primary_page_ = false;
}

void IpProtectionStatus::ResourceLoadComplete(
    content::RenderFrameHost* render_frame_host,
    const content::GlobalRequestID& request_id,
    const blink::mojom::ResourceLoadInfo& resource_load_info) {
  // If the subresource was already proxied on this page, return early.
  if (is_subresource_proxied_on_current_primary_page_) {
    return;
  }
  const net::ProxyChain& proxy_chain = resource_load_info.proxy_chain;

  if (proxy_chain.is_for_ip_protection() && !proxy_chain.is_direct()) {
    is_subresource_proxied_on_current_primary_page_ = true;

    // Notify observers that a subresource was proxied on the current page.
    for (const auto& observer : observer_list_) {
      observer.OnFirstSubresourceProxiedOnCurrentPrimaryPage();
    }
  }
}

// Data key required for WebContentsUserData.
WEB_CONTENTS_USER_DATA_KEY_IMPL(IpProtectionStatus);

}  // namespace ip_protection