1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
content / test / mock_ssl_host_state_delegate.cc [blame]
// Copyright 2015 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/test/mock_ssl_host_state_delegate.h"
#include "base/containers/contains.h"
#include "base/functional/callback.h"
#include "url/gurl.h"
namespace content {
MockSSLHostStateDelegate::MockSSLHostStateDelegate() {}
MockSSLHostStateDelegate::~MockSSLHostStateDelegate() {}
void MockSSLHostStateDelegate::AllowCert(const std::string& host,
const net::X509Certificate& cert,
int error,
StoragePartition* storage_partition) {
exceptions_.insert(host);
}
void MockSSLHostStateDelegate::Clear(
base::RepeatingCallback<bool(const std::string&)> host_filter) {
if (host_filter.is_null()) {
exceptions_.clear();
} else {
for (auto it = exceptions_.begin(); it != exceptions_.end();) {
auto next_it = std::next(it);
if (host_filter.Run(*it))
exceptions_.erase(it);
it = next_it;
}
}
}
SSLHostStateDelegate::CertJudgment MockSSLHostStateDelegate::QueryPolicy(
const std::string& host,
const net::X509Certificate& cert,
int error,
StoragePartition* storage_partition) {
if (!base::Contains(exceptions_, host)) {
return SSLHostStateDelegate::DENIED;
}
return SSLHostStateDelegate::ALLOWED;
}
void MockSSLHostStateDelegate::HostRanInsecureContent(
const std::string& host,
int child_id,
InsecureContentType content_type) {
hosts_ran_insecure_content_.insert(host);
}
bool MockSSLHostStateDelegate::DidHostRunInsecureContent(
const std::string& host,
int child_id,
InsecureContentType content_type) {
return base::Contains(hosts_ran_insecure_content_, host);
}
void MockSSLHostStateDelegate::AllowHttpForHost(
const std::string& host,
StoragePartition* storage_partition) {
allow_http_hosts_.insert(host);
}
bool MockSSLHostStateDelegate::IsHttpAllowedForHost(
const std::string& host,
StoragePartition* storage_partition) {
return base::Contains(allow_http_hosts_, host);
}
void MockSSLHostStateDelegate::SetHttpsEnforcementForHost(
const std::string& host,
bool enforce,
StoragePartition* storage_partition) {
if (enforce) {
enforce_https_hosts_.insert(host);
} else {
enforce_https_hosts_.erase(host);
}
}
bool MockSSLHostStateDelegate::IsHttpsEnforcedForUrl(
const GURL& url,
StoragePartition* storage_partition) {
// HTTPS-First Mode is never auto-enabled for URLs with non-default ports.
if (!url.port().empty()) {
return false;
}
return base::Contains(enforce_https_hosts_, url.host());
}
void MockSSLHostStateDelegate::RevokeUserAllowExceptions(
const std::string& host) {
exceptions_.erase(host);
}
bool MockSSLHostStateDelegate::HasAllowException(
const std::string& host,
StoragePartition* storage_partition) {
return base::Contains(exceptions_, host);
}
bool MockSSLHostStateDelegate::HasAllowExceptionForAnyHost(
StoragePartition* storage_partition) {
return !exceptions_.empty();
}
} // namespace content