Commit cd0b9717 authored by Joe DeBlasio's avatar Joe DeBlasio Committed by Commit Bot

Allow autofill on all non-dangerous pages.

This CL allows autofill on pages with valid TLS, but using legacy TLS
certs or other non-fatal certificate errors.

Bug: 1029906
Change-Id: I3676919fe7aa13c1aad82920f4cb74cb137af21b
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1946984Reviewed-by: default avatarEvan Stade <estade@chromium.org>
Commit-Queue: Joe DeBlasio <jdeblasio@chromium.org>
Cr-Commit-Position: refs/heads/master@{#720654}
parent cecd5e7a
...@@ -511,14 +511,15 @@ bool ChromeAutofillClient::IsContextSecure() { ...@@ -511,14 +511,15 @@ bool ChromeAutofillClient::IsContextSecure() {
return false; return false;
const auto security_level = helper->GetSecurityLevel(); const auto security_level = helper->GetSecurityLevel();
content::NavigationEntry* entry =
web_contents()->GetController().GetVisibleEntry();
// Cases with mixed passive content are safe enough to allow autofill, so // Only dangerous security states should prevent autofill.
// allow NONE in addition to the secure cases.
// //
// TODO(crbug.com/701018): Once passive mixed content is less common, just use // TODO(crbug.com/701018): Once passive mixed content and legacy TLS are less
// IsSslCertificateValid(). // common, just use IsSslCertificateValid().
return security_state::IsSslCertificateValid(security_level) || return entry->GetURL().SchemeIsCryptographic() &&
security_level == security_state::NONE; security_level != security_state::DANGEROUS;
} }
bool ChromeAutofillClient::ShouldShowSigninPromo() { bool ChromeAutofillClient::ShouldShowSigninPromo() {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment