1
    2
    3
    4
    5
    6
    7
    8
    9
   10
   11
   12
   13
   14
   15
   16
   17
   18
   19
   20
   21
   22
   23
   24
   25
   26
   27
   28
   29
   30
   31
   32
   33
   34
   35
   36
   37
   38
   39
   40
   41
   42
   43
   44
   45
   46
   47
   48
   49
   50
   51
   52
   53
   54
   55
   56
   57
   58
   59
   60
   61
   62
   63
   64
   65
   66
   67
   68
   69
   70
   71
   72
   73
   74
   75
   76
   77
   78
   79
   80
   81
   82
   83
   84
   85
   86
   87
   88
   89
   90
   91
   92
   93
   94
   95
   96
   97
   98
   99
  100
  101
  102
  103
  104
  105
  106
  107
  108
  109
  110
  111
  112
  113
  114
  115

content / test / mock_ssl_host_state_delegate.cc [blame]

// Copyright 2015 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "content/test/mock_ssl_host_state_delegate.h"

#include "base/containers/contains.h"
#include "base/functional/callback.h"
#include "url/gurl.h"

namespace content {

MockSSLHostStateDelegate::MockSSLHostStateDelegate() {}

MockSSLHostStateDelegate::~MockSSLHostStateDelegate() {}

void MockSSLHostStateDelegate::AllowCert(const std::string& host,
                                         const net::X509Certificate& cert,
                                         int error,
                                         StoragePartition* storage_partition) {
  exceptions_.insert(host);
}

void MockSSLHostStateDelegate::Clear(
    base::RepeatingCallback<bool(const std::string&)> host_filter) {
  if (host_filter.is_null()) {
    exceptions_.clear();
  } else {
    for (auto it = exceptions_.begin(); it != exceptions_.end();) {
      auto next_it = std::next(it);

      if (host_filter.Run(*it))
        exceptions_.erase(it);

      it = next_it;
    }
  }
}

SSLHostStateDelegate::CertJudgment MockSSLHostStateDelegate::QueryPolicy(
    const std::string& host,
    const net::X509Certificate& cert,
    int error,
    StoragePartition* storage_partition) {
  if (!base::Contains(exceptions_, host)) {
    return SSLHostStateDelegate::DENIED;
  }

  return SSLHostStateDelegate::ALLOWED;
}

void MockSSLHostStateDelegate::HostRanInsecureContent(
    const std::string& host,
    int child_id,
    InsecureContentType content_type) {
  hosts_ran_insecure_content_.insert(host);
}

bool MockSSLHostStateDelegate::DidHostRunInsecureContent(
    const std::string& host,
    int child_id,
    InsecureContentType content_type) {
  return base::Contains(hosts_ran_insecure_content_, host);
}

void MockSSLHostStateDelegate::AllowHttpForHost(
    const std::string& host,
    StoragePartition* storage_partition) {
  allow_http_hosts_.insert(host);
}

bool MockSSLHostStateDelegate::IsHttpAllowedForHost(
    const std::string& host,
    StoragePartition* storage_partition) {
  return base::Contains(allow_http_hosts_, host);
}

void MockSSLHostStateDelegate::SetHttpsEnforcementForHost(
    const std::string& host,
    bool enforce,
    StoragePartition* storage_partition) {
  if (enforce) {
    enforce_https_hosts_.insert(host);
  } else {
    enforce_https_hosts_.erase(host);
  }
}

bool MockSSLHostStateDelegate::IsHttpsEnforcedForUrl(
    const GURL& url,
    StoragePartition* storage_partition) {
  // HTTPS-First Mode is never auto-enabled for URLs with non-default ports.
  if (!url.port().empty()) {
    return false;
  }
  return base::Contains(enforce_https_hosts_, url.host());
}

void MockSSLHostStateDelegate::RevokeUserAllowExceptions(
    const std::string& host) {
  exceptions_.erase(host);
}

bool MockSSLHostStateDelegate::HasAllowException(
    const std::string& host,
    StoragePartition* storage_partition) {
  return base::Contains(exceptions_, host);
}

bool MockSSLHostStateDelegate::HasAllowExceptionForAnyHost(
    StoragePartition* storage_partition) {
  return !exceptions_.empty();
}

}  // namespace content