Add custom interstitial for captive portals.
This CL adds a new type of interstitial for SSL pages
broken by captive portals. When captive portal detection
is enabled, the new SSLErrorHandler class triggers a captive
portal check and fires a short lived (2 second) one shot timer.
If a captive portal is detected in this window, a custom
captive portal interstitial with "Connect" button is shown. If
a captive portal isn't detected, an SSL interstitial is shown.
Any captive portal result that arrives after the timer expires
is ignored.
Screenshot of the new interstitial: https://goo.gl/cnLIXQ
BUG=384667
TEST=ssl_error_handler_unittest.cc, CaptivePortalBrowserTest.*
Review URL: https://codereview.chromium.org/318213002
Cr-Commit-Position: refs/heads/master@{#310697}
diff --git a/chrome/browser/ssl/ssl_error_handler.cc b/chrome/browser/ssl/ssl_error_handler.cc
new file mode 100644
index 0000000..552902cb
--- /dev/null
+++ b/chrome/browser/ssl/ssl_error_handler.cc
@@ -0,0 +1,217 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "chrome/browser/ssl/ssl_error_handler.h"
+
+#include "base/metrics/field_trial.h"
+#include "base/metrics/histogram.h"
+#include "base/time/time.h"
+#include "chrome/browser/profiles/profile.h"
+#include "chrome/browser/ssl/ssl_blocking_page.h"
+#include "content/public/browser/notification_service.h"
+#include "content/public/browser/notification_source.h"
+#include "content/public/browser/web_contents.h"
+
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+#include "chrome/browser/captive_portal/captive_portal_service.h"
+#include "chrome/browser/captive_portal/captive_portal_service_factory.h"
+#include "chrome/browser/captive_portal/captive_portal_tab_helper.h"
+#include "chrome/browser/ssl/captive_portal_blocking_page.h"
+#endif
+
+namespace {
+
+// The type of the delay before displaying the SSL interstitial. This can be
+// changed in tests.
+SSLErrorHandler::InterstitialDelayType g_interstitial_delay_type =
+ SSLErrorHandler::NORMAL;
+
+// Callback to call when the interstitial timer is started. Used for testing.
+SSLErrorHandler::TimerStartedCallback* g_timer_started_callback = nullptr;
+
+// Events for UMA.
+enum SSLErrorHandlerEvent {
+ HANDLE_ALL,
+ SHOW_CAPTIVE_PORTAL_INTERSTITIAL_NONOVERRIDABLE,
+ SHOW_CAPTIVE_PORTAL_INTERSTITIAL_OVERRIDABLE,
+ SHOW_SSL_INTERSTITIAL_NONOVERRIDABLE,
+ SHOW_SSL_INTERSTITIAL_OVERRIDABLE,
+ SSL_ERROR_HANDLER_EVENT_COUNT
+};
+
+void RecordUMA(SSLErrorHandlerEvent event) {
+ UMA_HISTOGRAM_ENUMERATION("interstitial.ssl_error_handler",
+ event,
+ SSL_ERROR_HANDLER_EVENT_COUNT);
+}
+
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+// The delay before displaying the SSL interstitial for cert errors.
+// - If a "captive portal detected" result arrives in this many seconds,
+// a captive portal interstitial is displayed.
+// - Otherwise, an SSL interstitial is displayed.
+const int kDefaultInterstitialDisplayDelayInSeconds = 2;
+
+base::TimeDelta GetInterstitialDisplayDelay(
+ SSLErrorHandler::InterstitialDelayType delay) {
+ switch (delay) {
+ case SSLErrorHandler::LONG:
+ return base::TimeDelta::FromHours(1);
+
+ case SSLErrorHandler::NONE:
+ return base::TimeDelta();
+
+ case SSLErrorHandler::NORMAL:
+ return base::TimeDelta::FromSeconds(
+ kDefaultInterstitialDisplayDelayInSeconds);
+
+ default:
+ NOTREACHED();
+ }
+ return base::TimeDelta();
+}
+#endif
+
+} // namespace
+
+DEFINE_WEB_CONTENTS_USER_DATA_KEY(SSLErrorHandler);
+
+void SSLErrorHandler::HandleSSLError(
+ content::WebContents* web_contents,
+ int cert_error,
+ const net::SSLInfo& ssl_info,
+ const GURL& request_url,
+ int options_mask,
+ const base::Callback<void(bool)>& callback) {
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+ CaptivePortalTabHelper* captive_portal_tab_helper =
+ CaptivePortalTabHelper::FromWebContents(web_contents);
+ if (captive_portal_tab_helper) {
+ captive_portal_tab_helper->OnSSLCertError(ssl_info);
+ }
+#endif
+ DCHECK(!FromWebContents(web_contents));
+ web_contents->SetUserData(UserDataKey(),
+ new SSLErrorHandler(web_contents, cert_error,
+ ssl_info, request_url,
+ options_mask, callback));
+
+ SSLErrorHandler* error_handler =
+ SSLErrorHandler::FromWebContents(web_contents);
+ error_handler->StartHandlingError();
+}
+
+// static
+void SSLErrorHandler::SetInterstitialDelayTypeForTest(
+ SSLErrorHandler::InterstitialDelayType delay) {
+ g_interstitial_delay_type = delay;
+}
+
+// static
+void SSLErrorHandler::SetInterstitialTimerStartedCallbackForTest(
+ TimerStartedCallback* callback) {
+ DCHECK(!callback || !callback->is_null());
+ g_timer_started_callback = callback;
+}
+
+SSLErrorHandler::SSLErrorHandler(content::WebContents* web_contents,
+ int cert_error,
+ const net::SSLInfo& ssl_info,
+ const GURL& request_url,
+ int options_mask,
+ const base::Callback<void(bool)>& callback)
+ : web_contents_(web_contents),
+ cert_error_(cert_error),
+ ssl_info_(ssl_info),
+ request_url_(request_url),
+ options_mask_(options_mask),
+ callback_(callback) {
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+ Profile* profile = Profile::FromBrowserContext(
+ web_contents->GetBrowserContext());
+ registrar_.Add(this,
+ chrome::NOTIFICATION_CAPTIVE_PORTAL_CHECK_RESULT,
+ content::Source<Profile>(profile));
+#endif
+}
+
+SSLErrorHandler::~SSLErrorHandler() {
+}
+
+void SSLErrorHandler::StartHandlingError() {
+ RecordUMA(HANDLE_ALL);
+
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+ CheckForCaptivePortal();
+ timer_.Start(FROM_HERE,
+ GetInterstitialDisplayDelay(g_interstitial_delay_type),
+ this, &SSLErrorHandler::OnTimerExpired);
+ if (g_timer_started_callback)
+ g_timer_started_callback->Run(web_contents_);
+#else
+ // Display an SSL interstitial.
+ ShowSSLInterstitial();
+#endif
+}
+
+void SSLErrorHandler::OnTimerExpired() {
+ ShowSSLInterstitial();
+}
+
+void SSLErrorHandler::CheckForCaptivePortal() {
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+ Profile* profile = Profile::FromBrowserContext(
+ web_contents_->GetBrowserContext());
+ CaptivePortalService* captive_portal_service =
+ CaptivePortalServiceFactory::GetForProfile(profile);
+ captive_portal_service->DetectCaptivePortal();
+#else
+ NOTREACHED();
+#endif
+}
+
+void SSLErrorHandler::ShowCaptivePortalInterstitial() {
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+ // Show captive portal blocking page. The interstitial owns the blocking page.
+ RecordUMA(SSLBlockingPage::IsOptionsOverridable(options_mask_) ?
+ SHOW_CAPTIVE_PORTAL_INTERSTITIAL_OVERRIDABLE :
+ SHOW_CAPTIVE_PORTAL_INTERSTITIAL_NONOVERRIDABLE);
+ (new CaptivePortalBlockingPage(web_contents_, request_url_,
+ callback_))->Show();
+ // Once an interstitial is displayed, no need to keep the handler around.
+ // This is the equivalent of "delete this".
+ web_contents_->RemoveUserData(UserDataKey());
+#else
+ NOTREACHED();
+#endif
+}
+
+void SSLErrorHandler::ShowSSLInterstitial() {
+ // Show SSL blocking page. The interstitial owns the blocking page.
+ RecordUMA(SSLBlockingPage::IsOptionsOverridable(options_mask_) ?
+ SHOW_SSL_INTERSTITIAL_OVERRIDABLE :
+ SHOW_SSL_INTERSTITIAL_NONOVERRIDABLE);
+ (new SSLBlockingPage(web_contents_, cert_error_, ssl_info_, request_url_,
+ options_mask_, callback_))->Show();
+ // Once an interstitial is displayed, no need to keep the handler around.
+ // This is the equivalent of "delete this".
+ web_contents_->RemoveUserData(UserDataKey());
+}
+
+void SSLErrorHandler::Observe(
+ int type,
+ const content::NotificationSource& source,
+ const content::NotificationDetails& details) {
+#if defined(ENABLE_CAPTIVE_PORTAL_DETECTION)
+ if (type == chrome::NOTIFICATION_CAPTIVE_PORTAL_CHECK_RESULT) {
+ timer_.Stop();
+ CaptivePortalService::Results* results =
+ content::Details<CaptivePortalService::Results>(details).ptr();
+ if (results->result == captive_portal::RESULT_BEHIND_CAPTIVE_PORTAL)
+ ShowCaptivePortalInterstitial();
+ else
+ ShowSSLInterstitial();
+ }
+#endif
+}