blob: c5986925655c495ce14568681a46695e53a3f80d [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/autofill/content/renderer/password_autofill_agent.h"
#include "base/bind.h"
#include "base/memory/scoped_ptr.h"
#include "base/message_loop/message_loop.h"
#include "base/metrics/histogram.h"
#include "base/strings/utf_string_conversions.h"
#include "components/autofill/content/common/autofill_messages.h"
#include "components/autofill/content/renderer/form_autofill_util.h"
#include "components/autofill/content/renderer/password_form_conversion_utils.h"
#include "components/autofill/content/renderer/renderer_save_password_progress_logger.h"
#include "components/autofill/core/common/form_field_data.h"
#include "components/autofill/core/common/password_autofill_util.h"
#include "components/autofill/core/common/password_form.h"
#include "components/autofill/core/common/password_form_fill_data.h"
#include "content/public/renderer/document_state.h"
#include "content/public/renderer/navigation_state.h"
#include "content/public/renderer/render_view.h"
#include "third_party/WebKit/public/platform/WebVector.h"
#include "third_party/WebKit/public/web/WebAutofillClient.h"
#include "third_party/WebKit/public/web/WebDocument.h"
#include "third_party/WebKit/public/web/WebElement.h"
#include "third_party/WebKit/public/web/WebFormElement.h"
#include "third_party/WebKit/public/web/WebInputEvent.h"
#include "third_party/WebKit/public/web/WebLocalFrame.h"
#include "third_party/WebKit/public/web/WebNode.h"
#include "third_party/WebKit/public/web/WebNodeList.h"
#include "third_party/WebKit/public/web/WebSecurityOrigin.h"
#include "third_party/WebKit/public/web/WebUserGestureIndicator.h"
#include "third_party/WebKit/public/web/WebView.h"
#include "ui/base/page_transition_types.h"
#include "ui/events/keycodes/keyboard_codes.h"
#include "url/gurl.h"
namespace autofill {
namespace {
// The size above which we stop triggering autocomplete.
static const size_t kMaximumTextSizeForAutocomplete = 1000;
// Maps element names to the actual elements to simplify form filling.
typedef std::map<base::string16, blink::WebInputElement> FormInputElementMap;
// Use the shorter name when referencing SavePasswordProgressLogger::StringID
// values to spare line breaks. The code provides enough context for that
// already.
typedef SavePasswordProgressLogger Logger;
// Utility struct for form lookup and autofill. When we parse the DOM to look up
// a form, in addition to action and origin URL's we have to compare all
// necessary form elements. To avoid having to look these up again when we want
// to fill the form, the FindFormElements function stores the pointers
// in a FormElements* result, referenced to ensure they are safe to use.
struct FormElements {
blink::WebFormElement form_element;
FormInputElementMap input_elements;
};
typedef std::vector<FormElements*> FormElementsList;
// Helper to search the given form element for the specified input elements
// in |data|, and add results to |result|.
static bool FindFormInputElements(blink::WebFormElement* fe,
const FormData& data,
FormElements* result) {
const bool username_is_present = !data.fields[0].name.empty();
// Loop through the list of elements we need to find on the form in order to
// autofill it. If we don't find any one of them, abort processing this
// form; it can't be the right one.
// First field is the username, skip it if not present.
for (size_t j = (username_is_present ? 0 : 1); j < data.fields.size(); ++j) {
blink::WebVector<blink::WebNode> temp_elements;
fe->getNamedElements(data.fields[j].name, temp_elements);
// Match the first input element, if any.
// |getNamedElements| may return non-input elements where the names match,
// so the results are filtered for input elements.
// If more than one match is made, then we have ambiguity (due to misuse
// of "name" attribute) so is it considered not found.
bool found_input = false;
for (size_t i = 0; i < temp_elements.size(); ++i) {
if (temp_elements[i].to<blink::WebElement>().hasHTMLTagName("input")) {
// Check for a non-unique match.
if (found_input) {
found_input = false;
break;
}
// Only fill saved passwords into password fields and usernames into
// text fields.
blink::WebInputElement input_element =
temp_elements[i].to<blink::WebInputElement>();
if (input_element.isPasswordField() !=
(data.fields[j].form_control_type == "password"))
continue;
// This element matched, add it to our temporary result. It's possible
// there are multiple matches, but for purposes of identifying the form
// one suffices and if some function needs to deal with multiple
// matching elements it can get at them through the FormElement*.
// Note: This assignment adds a reference to the InputElement.
result->input_elements[data.fields[j].name] = input_element;
found_input = true;
}
}
// A required element was not found. This is not the right form.
// Make sure no input elements from a partially matched form in this
// iteration remain in the result set.
// Note: clear will remove a reference from each InputElement.
if (!found_input) {
result->input_elements.clear();
return false;
}
}
return true;
}
// Helper to locate form elements identified by |data|.
void FindFormElements(blink::WebView* view,
const FormData& data,
FormElementsList* results) {
DCHECK(view);
DCHECK(results);
blink::WebFrame* main_frame = view->mainFrame();
if (!main_frame)
return;
GURL::Replacements rep;
rep.ClearQuery();
rep.ClearRef();
// Loop through each frame.
for (blink::WebFrame* f = main_frame; f; f = f->traverseNext(false)) {
blink::WebDocument doc = f->document();
if (!doc.isHTMLDocument())
continue;
GURL full_origin(doc.url());
if (data.origin != full_origin.ReplaceComponents(rep))
continue;
blink::WebVector<blink::WebFormElement> forms;
doc.forms(forms);
for (size_t i = 0; i < forms.size(); ++i) {
blink::WebFormElement fe = forms[i];
GURL full_action(f->document().completeURL(fe.action()));
if (full_action.is_empty()) {
// The default action URL is the form's origin.
full_action = full_origin;
}
// Action URL must match.
if (data.action != full_action.ReplaceComponents(rep))
continue;
scoped_ptr<FormElements> curr_elements(new FormElements);
if (!FindFormInputElements(&fe, data, curr_elements.get()))
continue;
// We found the right element.
// Note: this assignment adds a reference to |fe|.
curr_elements->form_element = fe;
results->push_back(curr_elements.release());
}
}
}
bool IsElementEditable(const blink::WebInputElement& element) {
return element.isEnabled() && !element.isReadOnly();
}
bool DoUsernamesMatch(const base::string16& username1,
const base::string16& username2,
bool exact_match) {
if (exact_match)
return username1 == username2;
return StartsWith(username1, username2, true);
}
// Returns |true| if the given element is both editable and has permission to be
// autocompleted. The latter can be either because there is no
// autocomplete='off' set for the element, or because the flag is set to ignore
// autocomplete='off'. Otherwise, returns |false|.
bool IsElementAutocompletable(const blink::WebInputElement& element) {
return IsElementEditable(element) &&
(ShouldIgnoreAutocompleteOffForPasswordFields() ||
element.autoComplete());
}
// Returns true if the password specified in |form| is a default value.
bool PasswordValueIsDefault(const base::string16& password_element,
const base::string16& password_value,
blink::WebFormElement form_element) {
blink::WebVector<blink::WebNode> temp_elements;
form_element.getNamedElements(password_element, temp_elements);
// We are loose in our definition here and will return true if any of the
// appropriately named elements match the element to be saved. Currently
// we ignore filling passwords where naming is ambigious anyway.
for (size_t i = 0; i < temp_elements.size(); ++i) {
if (temp_elements[i].to<blink::WebElement>().getAttribute("value") ==
password_value)
return true;
}
return false;
}
// Return true if either password_value or new_password_value is not empty and
// not default.
bool FormContainsNonDefaultPasswordValue(const PasswordForm& password_form,
blink::WebFormElement form_element) {
return (!password_form.password_value.empty() &&
!PasswordValueIsDefault(password_form.password_element,
password_form.password_value,
form_element)) ||
(!password_form.new_password_value.empty() &&
!PasswordValueIsDefault(password_form.new_password_element,
password_form.new_password_value,
form_element));
}
// Log a message including the name, method and action of |form|.
void LogHTMLForm(SavePasswordProgressLogger* logger,
SavePasswordProgressLogger::StringID message_id,
const blink::WebFormElement& form) {
logger->LogHTMLForm(message_id,
form.name().utf8(),
GURL(form.action().utf8()));
}
bool FillDataContainsUsername(const PasswordFormFillData& fill_data) {
return !fill_data.basic_data.fields[0].name.empty();
}
// This function attempts to fill |suggestions| and |realms| form |fill_data|
// based on |current_username|. Returns true when |suggestions| gets filled
// from |fill_data.other_possible_usernames|, else returns false.
bool GetSuggestions(const PasswordFormFillData& fill_data,
const base::string16& current_username,
std::vector<base::string16>* suggestions,
std::vector<base::string16>* realms,
bool show_all) {
bool other_possible_username_shown = false;
if (show_all ||
StartsWith(
fill_data.basic_data.fields[0].value, current_username, false)) {
suggestions->push_back(fill_data.basic_data.fields[0].value);
realms->push_back(base::UTF8ToUTF16(fill_data.preferred_realm));
}
for (PasswordFormFillData::LoginCollection::const_iterator iter =
fill_data.additional_logins.begin();
iter != fill_data.additional_logins.end();
++iter) {
if (show_all || StartsWith(iter->first, current_username, false)) {
suggestions->push_back(iter->first);
realms->push_back(base::UTF8ToUTF16(iter->second.realm));
}
}
for (PasswordFormFillData::UsernamesCollection::const_iterator iter =
fill_data.other_possible_usernames.begin();
iter != fill_data.other_possible_usernames.end();
++iter) {
for (size_t i = 0; i < iter->second.size(); ++i) {
if (show_all || StartsWith(iter->second[i], current_username, false)) {
other_possible_username_shown = true;
suggestions->push_back(iter->second[i]);
realms->push_back(base::UTF8ToUTF16(iter->first.realm));
}
}
}
return other_possible_username_shown;
}
// This function attempts to fill |username_element| and |password_element|
// with values from |fill_data|. The |password_element| will only have the
// |suggestedValue| set, and will be registered for copying that to the real
// value through |registration_callback|. The function returns true when
// selected username comes from |fill_data.other_possible_usernames|.
bool FillUserNameAndPassword(
blink::WebInputElement* username_element,
blink::WebInputElement* password_element,
const PasswordFormFillData& fill_data,
bool exact_username_match,
bool set_selection,
base::Callback<void(blink::WebInputElement*)> registration_callback) {
bool other_possible_username_selected = false;
// Don't fill username if password can't be set.
if (!IsElementAutocompletable(*password_element))
return false;
base::string16 current_username;
if (!username_element->isNull()) {
current_username = username_element->value();
}
// username and password will contain the match found if any.
base::string16 username;
base::string16 password;
// Look for any suitable matches to current field text.
if (DoUsernamesMatch(fill_data.basic_data.fields[0].value,
current_username,
exact_username_match)) {
username = fill_data.basic_data.fields[0].value;
password = fill_data.basic_data.fields[1].value;
} else {
// Scan additional logins for a match.
PasswordFormFillData::LoginCollection::const_iterator iter;
for (iter = fill_data.additional_logins.begin();
iter != fill_data.additional_logins.end();
++iter) {
if (DoUsernamesMatch(
iter->first, current_username, exact_username_match)) {
username = iter->first;
password = iter->second.password;
break;
}
}
// Check possible usernames.
if (username.empty() && password.empty()) {
for (PasswordFormFillData::UsernamesCollection::const_iterator iter =
fill_data.other_possible_usernames.begin();
iter != fill_data.other_possible_usernames.end();
++iter) {
for (size_t i = 0; i < iter->second.size(); ++i) {
if (DoUsernamesMatch(
iter->second[i], current_username, exact_username_match)) {
other_possible_username_selected = true;
username = iter->second[i];
password = iter->first.password;
break;
}
}
if (!username.empty() && !password.empty())
break;
}
}
}
if (password.empty())
return other_possible_username_selected; // No match was found.
// TODO(tkent): Check maxlength and pattern for both username and password
// fields.
// Input matches the username, fill in required values.
if (!username_element->isNull() &&
IsElementAutocompletable(*username_element)) {
username_element->setValue(username, true);
username_element->setAutofilled(true);
if (set_selection) {
username_element->setSelectionRange(current_username.length(),
username.length());
}
} else if (current_username != username) {
// If the username can't be filled and it doesn't match a saved password
// as is, don't autofill a password.
return other_possible_username_selected;
}
// Wait to fill in the password until a user gesture occurs. This is to make
// sure that we do not fill in the DOM with a password until we believe the
// user is intentionally interacting with the page.
password_element->setSuggestedValue(password);
registration_callback.Run(password_element);
password_element->setAutofilled(true);
return other_possible_username_selected;
}
// Attempts to fill |username_element| and |password_element| with the
// |fill_data|. Will use the data corresponding to the preferred username,
// unless the |username_element| already has a value set. In that case,
// attempts to fill the password matching the already filled username, if
// such a password exists. The |password_element| will have the
// |suggestedValue| set, and |suggestedValue| will be registered for copying to
// the real value through |registration_callback|. Returns true when the
// username gets selected from |other_possible_usernames|, else returns false.
bool FillFormOnPasswordRecieved(
const PasswordFormFillData& fill_data,
blink::WebInputElement username_element,
blink::WebInputElement password_element,
base::Callback<void(blink::WebInputElement*)> registration_callback) {
// Do not fill if the password field is in an iframe.
DCHECK(password_element.document().frame());
if (password_element.document().frame()->parent())
return false;
bool form_contains_username_field = FillDataContainsUsername(fill_data);
if (!ShouldIgnoreAutocompleteOffForPasswordFields() &&
form_contains_username_field && !username_element.form().autoComplete())
return false;
// If we can't modify the password, don't try to set the username
if (!IsElementAutocompletable(password_element))
return false;
// Try to set the username to the preferred name, but only if the field
// can be set and isn't prefilled.
if (form_contains_username_field &&
IsElementAutocompletable(username_element) &&
username_element.value().isEmpty()) {
// TODO(tkent): Check maxlength and pattern.
username_element.setValue(fill_data.basic_data.fields[0].value, true);
}
// Fill if we have an exact match for the username. Note that this sets
// username to autofilled.
return FillUserNameAndPassword(&username_element,
&password_element,
fill_data,
true /* exact_username_match */,
false /* set_selection */,
registration_callback);
}
// Takes a |map| with pointers as keys and linked_ptr as values, and returns
// true if |key| is not NULL and |map| contains a non-NULL entry for |key|.
// Makes sure not to create an entry as a side effect of using the operator [].
template <class Key, class Value>
bool ContainsNonNullEntryForNonNullKey(
const std::map<Key*, linked_ptr<Value>>& map,
Key* key) {
if (!key)
return false;
auto it = map.find(key);
return it != map.end() && it->second.get();
}
} // namespace
////////////////////////////////////////////////////////////////////////////////
// PasswordAutofillAgent, public:
PasswordAutofillAgent::PasswordAutofillAgent(content::RenderView* render_view)
: content::RenderViewObserver(render_view),
usernames_usage_(NOTHING_TO_AUTOFILL),
web_view_(render_view->GetWebView()),
logging_state_active_(false),
was_username_autofilled_(false),
was_password_autofilled_(false),
username_selection_start_(0),
did_stop_loading_(false),
weak_ptr_factory_(this) {
Send(new AutofillHostMsg_PasswordAutofillAgentConstructed(routing_id()));
}
PasswordAutofillAgent::~PasswordAutofillAgent() {
}
PasswordAutofillAgent::PasswordValueGatekeeper::PasswordValueGatekeeper()
: was_user_gesture_seen_(false) {
}
PasswordAutofillAgent::PasswordValueGatekeeper::~PasswordValueGatekeeper() {
}
void PasswordAutofillAgent::PasswordValueGatekeeper::RegisterElement(
blink::WebInputElement* element) {
if (was_user_gesture_seen_)
ShowValue(element);
else
elements_.push_back(*element);
}
void PasswordAutofillAgent::PasswordValueGatekeeper::OnUserGesture() {
was_user_gesture_seen_ = true;
for (std::vector<blink::WebInputElement>::iterator it = elements_.begin();
it != elements_.end();
++it) {
ShowValue(&(*it));
}
elements_.clear();
}
void PasswordAutofillAgent::PasswordValueGatekeeper::Reset() {
was_user_gesture_seen_ = false;
elements_.clear();
}
void PasswordAutofillAgent::PasswordValueGatekeeper::ShowValue(
blink::WebInputElement* element) {
if (!element->isNull() && !element->suggestedValue().isEmpty())
element->setValue(element->suggestedValue(), true);
}
bool PasswordAutofillAgent::TextFieldDidEndEditing(
const blink::WebInputElement& element) {
LoginToPasswordInfoMap::const_iterator iter =
login_to_password_info_.find(element);
if (iter == login_to_password_info_.end())
return false;
const PasswordInfo& password_info = iter->second;
// Don't let autofill overwrite an explicit change made by the user.
if (password_info.password_was_edited_last)
return false;
const PasswordFormFillData& fill_data = password_info.fill_data;
// If wait_for_username is false, we should have filled when the text changed.
if (!fill_data.wait_for_username)
return false;
blink::WebInputElement password = password_info.password_field;
if (!IsElementEditable(password))
return false;
blink::WebInputElement username = element; // We need a non-const.
// Do not set selection when ending an editing session, otherwise it can
// mess with focus.
if (FillUserNameAndPassword(
&username,
&password,
fill_data,
true /* exact_username_match */,
false /* set_selection */,
base::Bind(&PasswordValueGatekeeper::RegisterElement,
base::Unretained(&gatekeeper_)))) {
usernames_usage_ = OTHER_POSSIBLE_USERNAME_SELECTED;
}
return true;
}
bool PasswordAutofillAgent::TextDidChangeInTextField(
const blink::WebInputElement& element) {
// TODO(vabr): Get a mutable argument instead. http://crbug.com/397083
blink::WebInputElement mutable_element = element; // We need a non-const.
if (element.isPasswordField()) {
// Some login forms have event handlers that put a hash of the password into
// a hidden field and then clear the password (http://crbug.com/28910,
// http://crbug.com/391693). This method gets called before any of those
// handlers run, so save away a copy of the password in case it gets lost.
// To honor the user having explicitly cleared the password, even an empty
// password will be saved here.
if (blink::WebLocalFrame* element_frame = element.document().frame()) {
ProvisionallySavePassword(
element_frame, element.form(), RESTRICTION_NONE);
}
PasswordToLoginMap::iterator iter = password_to_username_.find(element);
if (iter != password_to_username_.end()) {
login_to_password_info_[iter->second].password_was_edited_last = true;
// Note that the suggested value of |mutable_element| was reset when its
// value changed.
mutable_element.setAutofilled(false);
}
return false;
}
LoginToPasswordInfoMap::iterator iter = login_to_password_info_.find(element);
if (iter == login_to_password_info_.end())
return false;
// The input text is being changed, so any autofilled password is now
// outdated.
mutable_element.setAutofilled(false);
iter->second.password_was_edited_last = false;
blink::WebInputElement password = iter->second.password_field;
if (password.isAutofilled()) {
password.setValue(base::string16(), true);
password.setAutofilled(false);
}
// If wait_for_username is true we will fill when the username loses focus.
if (iter->second.fill_data.wait_for_username)
return false;
if (!element.isText() || !IsElementAutocompletable(element) ||
!IsElementAutocompletable(password)) {
return false;
}
// Don't inline autocomplete if the user is deleting, that would be confusing.
// But refresh the popup. Note, since this is ours, return true to signal
// no further processing is required.
if (iter->second.backspace_pressed_last) {
ShowSuggestionPopup(iter->second.fill_data, element, false);
return true;
}
blink::WebString name = element.nameForAutofill();
if (name.isEmpty())
return false; // If the field has no name, then we won't have values.
// Don't attempt to autofill with values that are too large.
if (element.value().length() > kMaximumTextSizeForAutocomplete)
return false;
// The caret position should have already been updated.
PerformInlineAutocomplete(element, password, iter->second.fill_data);
return true;
}
bool PasswordAutofillAgent::TextFieldHandlingKeyDown(
const blink::WebInputElement& element,
const blink::WebKeyboardEvent& event) {
// If using the new Autofill UI that lives in the browser, it will handle
// keypresses before this function. This is not currently an issue but if
// the keys handled there or here change, this issue may appear.
LoginToPasswordInfoMap::iterator iter = login_to_password_info_.find(element);
if (iter == login_to_password_info_.end())
return false;
int win_key_code = event.windowsKeyCode;
iter->second.backspace_pressed_last =
(win_key_code == ui::VKEY_BACK || win_key_code == ui::VKEY_DELETE);
return true;
}
bool PasswordAutofillAgent::FillSuggestion(
const blink::WebNode& node,
const blink::WebString& username,
const blink::WebString& password) {
blink::WebInputElement username_element;
PasswordInfo* password_info;
if (!FindLoginInfo(node, &username_element, &password_info) ||
!IsElementAutocompletable(username_element) ||
!IsElementAutocompletable(password_info->password_field)) {
return false;
}
password_info->password_was_edited_last = false;
username_element.setValue(username, true);
username_element.setAutofilled(true);
username_element.setSelectionRange(username.length(), username.length());
password_info->password_field.setValue(password, true);
password_info->password_field.setAutofilled(true);
return true;
}
bool PasswordAutofillAgent::PreviewSuggestion(
const blink::WebNode& node,
const blink::WebString& username,
const blink::WebString& password) {
blink::WebInputElement username_element;
PasswordInfo* password_info;
if (!FindLoginInfo(node, &username_element, &password_info) ||
!IsElementAutocompletable(username_element) ||
!IsElementAutocompletable(password_info->password_field)) {
return false;
}
was_username_autofilled_ = username_element.isAutofilled();
username_selection_start_ = username_element.selectionStart();
username_element.setSuggestedValue(username);
username_element.setAutofilled(true);
username_element.setSelectionRange(
username_selection_start_,
username_element.suggestedValue().length());
was_password_autofilled_ = password_info->password_field.isAutofilled();
password_info->password_field.setSuggestedValue(password);
password_info->password_field.setAutofilled(true);
return true;
}
bool PasswordAutofillAgent::DidClearAutofillSelection(
const blink::WebNode& node) {
blink::WebInputElement username_element;
PasswordInfo* password_info;
if (!FindLoginInfo(node, &username_element, &password_info))
return false;
ClearPreview(&username_element, &password_info->password_field);
return true;
}
bool PasswordAutofillAgent::ShowSuggestions(
const blink::WebInputElement& element,
bool show_all) {
LoginToPasswordInfoMap::const_iterator iter =
login_to_password_info_.find(element);
if (iter == login_to_password_info_.end())
return false;
// If autocomplete='off' is set on the form elements, no suggestion dialog
// should be shown. However, return |true| to indicate that this is a known
// password form and that the request to show suggestions has been handled (as
// a no-op).
if (!IsElementAutocompletable(element) ||
!IsElementAutocompletable(iter->second.password_field))
return true;
return ShowSuggestionPopup(iter->second.fill_data, element, show_all);
}
bool PasswordAutofillAgent::OriginCanAccessPasswordManager(
const blink::WebSecurityOrigin& origin) {
return origin.canAccessPasswordManager();
}
void PasswordAutofillAgent::OnDynamicFormsSeen(blink::WebFrame* frame) {
SendPasswordForms(frame, false /* only_visible */);
}
void PasswordAutofillAgent::FirstUserGestureObserved() {
gatekeeper_.OnUserGesture();
}
void PasswordAutofillAgent::SendPasswordForms(blink::WebFrame* frame,
bool only_visible) {
scoped_ptr<RendererSavePasswordProgressLogger> logger;
if (logging_state_active_) {
logger.reset(new RendererSavePasswordProgressLogger(this, routing_id()));
logger->LogMessage(Logger::STRING_SEND_PASSWORD_FORMS_METHOD);
logger->LogBoolean(Logger::STRING_ONLY_VISIBLE, only_visible);
}
// Make sure that this security origin is allowed to use password manager.
blink::WebSecurityOrigin origin = frame->document().securityOrigin();
if (logger) {
logger->LogURL(Logger::STRING_SECURITY_ORIGIN,
GURL(origin.toString().utf8()));
}
if (!OriginCanAccessPasswordManager(origin)) {
if (logger) {
logger->LogMessage(Logger::STRING_SECURITY_ORIGIN_FAILURE);
logger->LogMessage(Logger::STRING_DECISION_DROP);
}
return;
}
// Checks whether the webpage is a redirect page or an empty page.
if (IsWebpageEmpty(frame)) {
if (logger) {
logger->LogMessage(Logger::STRING_WEBPAGE_EMPTY);
logger->LogMessage(Logger::STRING_DECISION_DROP);
}
return;
}
blink::WebVector<blink::WebFormElement> forms;
frame->document().forms(forms);
if (logger)
logger->LogNumber(Logger::STRING_NUMBER_OF_ALL_FORMS, forms.size());
std::vector<PasswordForm> password_forms;
for (size_t i = 0; i < forms.size(); ++i) {
const blink::WebFormElement& form = forms[i];
bool is_form_visible = IsWebNodeVisible(form);
if (logger) {
LogHTMLForm(logger.get(), Logger::STRING_FORM_FOUND_ON_PAGE, form);
logger->LogBoolean(Logger::STRING_FORM_IS_VISIBLE, is_form_visible);
}
// If requested, ignore non-rendered forms, e.g. those styled with
// display:none.
if (only_visible && !is_form_visible)
continue;
scoped_ptr<PasswordForm> password_form(CreatePasswordForm(form));
if (password_form.get()) {
if (logger) {
logger->LogPasswordForm(Logger::STRING_FORM_IS_PASSWORD,
*password_form);
}
password_forms.push_back(*password_form);
}
}
if (password_forms.empty() && !only_visible) {
// We need to send the PasswordFormsRendered message regardless of whether
// there are any forms visible, as this is also the code path that triggers
// showing the infobar.
return;
}
if (only_visible) {
Send(new AutofillHostMsg_PasswordFormsRendered(routing_id(),
password_forms,
did_stop_loading_));
} else {
Send(new AutofillHostMsg_PasswordFormsParsed(routing_id(), password_forms));
}
}
bool PasswordAutofillAgent::OnMessageReceived(const IPC::Message& message) {
bool handled = true;
IPC_BEGIN_MESSAGE_MAP(PasswordAutofillAgent, message)
IPC_MESSAGE_HANDLER(AutofillMsg_FillPasswordForm, OnFillPasswordForm)
IPC_MESSAGE_HANDLER(AutofillMsg_SetLoggingState, OnSetLoggingState)
IPC_MESSAGE_UNHANDLED(handled = false)
IPC_END_MESSAGE_MAP()
return handled;
}
void PasswordAutofillAgent::DidStartLoading() {
did_stop_loading_ = false;
if (usernames_usage_ != NOTHING_TO_AUTOFILL) {
UMA_HISTOGRAM_ENUMERATION("PasswordManager.OtherPossibleUsernamesUsage",
usernames_usage_,
OTHER_POSSIBLE_USERNAMES_MAX);
usernames_usage_ = NOTHING_TO_AUTOFILL;
}
}
void PasswordAutofillAgent::DidFinishDocumentLoad(blink::WebLocalFrame* frame) {
// The |frame| contents have been parsed, but not yet rendered. Let the
// PasswordManager know that forms are loaded, even though we can't yet tell
// whether they're visible.
SendPasswordForms(frame, false);
}
void PasswordAutofillAgent::DidFinishLoad(blink::WebLocalFrame* frame) {
// The |frame| contents have been rendered. Let the PasswordManager know
// which of the loaded frames are actually visible to the user. This also
// triggers the "Save password?" infobar if the user just submitted a password
// form.
SendPasswordForms(frame, true);
}
void PasswordAutofillAgent::DidStopLoading() {
did_stop_loading_ = true;
}
void PasswordAutofillAgent::FrameDetached(blink::WebFrame* frame) {
FrameClosing(frame);
}
void PasswordAutofillAgent::FrameWillClose(blink::WebFrame* frame) {
FrameClosing(frame);
}
void PasswordAutofillAgent::WillSendSubmitEvent(
blink::WebLocalFrame* frame,
const blink::WebFormElement& form) {
// Forms submitted via XHR are not seen by WillSubmitForm if the default
// onsubmit handler is overridden. Such submission first gets detected in
// DidStartProvisionalLoad, which no longer knows about the particular form,
// and uses the candidate stored in |provisionally_saved_forms_|.
//
// User-typed password will get stored to |provisionally_saved_forms_| in
// TextDidChangeInTextField. Autofilled or JavaScript-copied passwords need to
// be saved here.
//
// Only non-empty passwords are saved here. Empty passwords were likely
// cleared by some scripts (http://crbug.com/28910, http://crbug.com/391693).
// Had the user cleared the password, |provisionally_saved_forms_| would
// already have been updated in TextDidChangeInTextField.
ProvisionallySavePassword(frame, form, RESTRICTION_NON_EMPTY_PASSWORD);
}
void PasswordAutofillAgent::WillSubmitForm(blink::WebLocalFrame* frame,
const blink::WebFormElement& form) {
DCHECK(frame);
scoped_ptr<RendererSavePasswordProgressLogger> logger;
if (logging_state_active_) {
logger.reset(new RendererSavePasswordProgressLogger(this, routing_id()));
logger->LogMessage(Logger::STRING_WILL_SUBMIT_FORM_METHOD);
LogHTMLForm(logger.get(), Logger::STRING_HTML_FORM_FOR_SUBMIT, form);
}
scoped_ptr<PasswordForm> submitted_form = CreatePasswordForm(form);
// If there is a provisionally saved password, copy over the previous
// password value so we get the user's typed password, not the value that
// may have been transformed for submit.
// TODO(gcasto): Do we need to have this action equality check? Is it trying
// to prevent accidentally copying over passwords from a different form?
if (submitted_form) {
if (logger) {
logger->LogPasswordForm(Logger::STRING_CREATED_PASSWORD_FORM,
*submitted_form);
}
if (ContainsNonNullEntryForNonNullKey(
provisionally_saved_forms_, static_cast<blink::WebFrame*>(frame)) &&
submitted_form->action == provisionally_saved_forms_[frame]->action) {
if (logger)
logger->LogMessage(Logger::STRING_SUBMITTED_PASSWORD_REPLACED);
submitted_form->password_value =
provisionally_saved_forms_[frame]->password_value;
submitted_form->new_password_value =
provisionally_saved_forms_[frame]->new_password_value;
}
// Some observers depend on sending this information now instead of when
// the frame starts loading. If there are redirects that cause a new
// RenderView to be instantiated (such as redirects to the WebStore)
// we will never get to finish the load.
Send(new AutofillHostMsg_PasswordFormSubmitted(routing_id(),
*submitted_form));
// Remove reference since we have already submitted this form.
provisionally_saved_forms_.erase(frame);
} else if (logger) {
logger->LogMessage(Logger::STRING_DECISION_DROP);
}
}
blink::WebFrame* PasswordAutofillAgent::CurrentOrChildFrameWithSavedForms(
const blink::WebFrame* current_frame) {
for (FrameToPasswordFormMap::const_iterator it =
provisionally_saved_forms_.begin();
it != provisionally_saved_forms_.end();
++it) {
blink::WebFrame* form_frame = it->first;
// The check that the returned frame is related to |current_frame| is mainly
// for double-checking. There should not be any unrelated frames in
// |provisionally_saved_forms_|, because the map is cleared after
// navigation. If there are reasons to remove this check in the future and
// keep just the first frame found, it might be a good idea to add a UMA
// statistic or a similar check on how many frames are here to choose from.
if (current_frame == form_frame ||
current_frame->findChildByName(form_frame->assignedName())) {
return form_frame;
}
}
return NULL;
}
void PasswordAutofillAgent::DidStartProvisionalLoad(
blink::WebLocalFrame* frame) {
scoped_ptr<RendererSavePasswordProgressLogger> logger;
if (logging_state_active_) {
logger.reset(new RendererSavePasswordProgressLogger(this, routing_id()));
logger->LogMessage(Logger::STRING_DID_START_PROVISIONAL_LOAD_METHOD);
}
if (!frame->parent()) {
// If the navigation is not triggered by a user gesture, e.g. by some ajax
// callback, then inherit the submitted password form from the previous
// state. This fixes the no password save issue for ajax login, tracked in
// [http://crbug/43219]. Note that this still fails for sites that use
// synchonous XHR as isProcessingUserGesture() will return true.
blink::WebFrame* form_frame = CurrentOrChildFrameWithSavedForms(frame);
if (logger) {
logger->LogBoolean(Logger::STRING_FORM_FRAME_EQ_FRAME,
form_frame == frame);
}
// Bug fix for crbug.com/368690. isProcessingUserGesture() is false when
// the user is performing actions outside the page (e.g. typed url,
// history navigation). We don't want to trigger saving in these cases.
content::DocumentState* document_state =
content::DocumentState::FromDataSource(
frame->provisionalDataSource());
content::NavigationState* navigation_state =
document_state->navigation_state();
if (ui::PageTransitionIsWebTriggerable(
navigation_state->transition_type()) &&
!blink::WebUserGestureIndicator::isProcessingUserGesture()) {
// If onsubmit has been called, try and save that form.
if (ContainsNonNullEntryForNonNullKey(provisionally_saved_forms_,
form_frame)) {
if (logger) {
logger->LogPasswordForm(
Logger::STRING_PROVISIONALLY_SAVED_FORM_FOR_FRAME,
*provisionally_saved_forms_[form_frame]);
}
Send(new AutofillHostMsg_PasswordFormSubmitted(
routing_id(), *provisionally_saved_forms_[form_frame]));
provisionally_saved_forms_.erase(form_frame);
} else {
// Loop through the forms on the page looking for one that has been
// filled out. If one exists, try and save the credentials.
blink::WebVector<blink::WebFormElement> forms;
frame->document().forms(forms);
bool password_forms_found = false;
for (size_t i = 0; i < forms.size(); ++i) {
blink::WebFormElement form_element = forms[i];
if (logger) {
LogHTMLForm(
logger.get(), Logger::STRING_FORM_FOUND_ON_PAGE, form_element);
}
scoped_ptr<PasswordForm> password_form(
CreatePasswordForm(form_element));
if (password_form.get() && !password_form->username_value.empty() &&
FormContainsNonDefaultPasswordValue(
*password_form, form_element)) {
password_forms_found = true;
if (logger) {
logger->LogPasswordForm(
Logger::STRING_PASSWORD_FORM_FOUND_ON_PAGE, *password_form);
}
Send(new AutofillHostMsg_PasswordFormSubmitted(routing_id(),
*password_form));
}
}
if (!password_forms_found && logger) {
logger->LogMessage(Logger::STRING_DECISION_DROP);
}
}
}
// Clear the whole map during main frame navigation.
provisionally_saved_forms_.clear();
// This is a new navigation, so require a new user gesture before filling in
// passwords.
gatekeeper_.Reset();
} else {
if (logger)
logger->LogMessage(Logger::STRING_DECISION_DROP);
}
}
void PasswordAutofillAgent::OnFillPasswordForm(
const PasswordFormFillData& form_data) {
if (usernames_usage_ == NOTHING_TO_AUTOFILL) {
if (form_data.other_possible_usernames.size())
usernames_usage_ = OTHER_POSSIBLE_USERNAMES_PRESENT;
else if (usernames_usage_ == NOTHING_TO_AUTOFILL)
usernames_usage_ = OTHER_POSSIBLE_USERNAMES_ABSENT;
}
FormElementsList forms;
// We own the FormElements* in forms.
FindFormElements(render_view()->GetWebView(), form_data.basic_data, &forms);
FormElementsList::iterator iter;
for (iter = forms.begin(); iter != forms.end(); ++iter) {
scoped_ptr<FormElements> form_elements(*iter);
// Attach autocomplete listener to enable selecting alternate logins.
blink::WebInputElement username_element, password_element;
// Check whether the password form has a username input field.
bool form_contains_username_field = FillDataContainsUsername(form_data);
if (form_contains_username_field) {
username_element =
form_elements->input_elements[form_data.basic_data.fields[0].name];
}
// No password field, bail out.
if (form_data.basic_data.fields[1].name.empty())
break;
// Get pointer to password element. (We currently only support single
// password forms).
password_element =
form_elements->input_elements[form_data.basic_data.fields[1].name];
// If wait_for_username is true, we don't want to initially fill the form
// until the user types in a valid username.
if (!form_data.wait_for_username &&
FillFormOnPasswordRecieved(
form_data,
username_element,
password_element,
base::Bind(&PasswordValueGatekeeper::RegisterElement,
base::Unretained(&gatekeeper_)))) {
usernames_usage_ = OTHER_POSSIBLE_USERNAME_SELECTED;
}
// We might have already filled this form if there are two <form> elements
// with identical markup.
if (login_to_password_info_.find(username_element) !=
login_to_password_info_.end())
continue;
PasswordInfo password_info;
password_info.fill_data = form_data;
password_info.password_field = password_element;
login_to_password_info_[username_element] = password_info;
password_to_username_[password_element] = username_element;
FormData form;
FormFieldData field;
if (form_contains_username_field) {
FindFormAndFieldForFormControlElement(
username_element, &form, &field, REQUIRE_NONE);
}
Send(new AutofillHostMsg_AddPasswordFormMapping(
routing_id(), field, form_data));
}
}
void PasswordAutofillAgent::OnSetLoggingState(bool active) {
logging_state_active_ = active;
}
////////////////////////////////////////////////////////////////////////////////
// PasswordAutofillAgent, private:
PasswordAutofillAgent::PasswordInfo::PasswordInfo()
: backspace_pressed_last(false), password_was_edited_last(false) {
}
bool PasswordAutofillAgent::ShowSuggestionPopup(
const PasswordFormFillData& fill_data,
const blink::WebInputElement& user_input,
bool show_all) {
blink::WebFrame* frame = user_input.document().frame();
if (!frame)
return false;
blink::WebView* webview = frame->view();
if (!webview)
return false;
std::vector<base::string16> suggestions;
std::vector<base::string16> realms;
if (GetSuggestions(
fill_data, user_input.value(), &suggestions, &realms, show_all)) {
usernames_usage_ = OTHER_POSSIBLE_USERNAME_SHOWN;
}
DCHECK_EQ(suggestions.size(), realms.size());
FormData form;
FormFieldData field;
FindFormAndFieldForFormControlElement(
user_input, &form, &field, REQUIRE_NONE);
blink::WebInputElement selected_element = user_input;
gfx::Rect bounding_box(selected_element.boundsInViewportSpace());
float scale = web_view_->pageScaleFactor();
gfx::RectF bounding_box_scaled(bounding_box.x() * scale,
bounding_box.y() * scale,
bounding_box.width() * scale,
bounding_box.height() * scale);
Send(new AutofillHostMsg_ShowPasswordSuggestions(
routing_id(), field, bounding_box_scaled, suggestions, realms));
return !suggestions.empty();
}
void PasswordAutofillAgent::PerformInlineAutocomplete(
const blink::WebInputElement& username_input,
const blink::WebInputElement& password_input,
const PasswordFormFillData& fill_data) {
DCHECK(!fill_data.wait_for_username);
// We need non-const versions of the username and password inputs.
blink::WebInputElement username = username_input;
blink::WebInputElement password = password_input;
// Don't inline autocomplete if the caret is not at the end.
// TODO(jcivelli): is there a better way to test the caret location?
if (username.selectionStart() != username.selectionEnd() ||
username.selectionEnd() != static_cast<int>(username.value().length())) {
return;
}
// Show the popup with the list of available usernames.
ShowSuggestionPopup(fill_data, username, false);
#if !defined(OS_ANDROID)
// Fill the user and password field with the most relevant match. Android
// only fills in the fields after the user clicks on the suggestion popup.
if (FillUserNameAndPassword(
&username,
&password,
fill_data,
false /* exact_username_match */,
true /* set_selection */,
base::Bind(&PasswordValueGatekeeper::RegisterElement,
base::Unretained(&gatekeeper_)))) {
usernames_usage_ = OTHER_POSSIBLE_USERNAME_SELECTED;
}
#endif
}
void PasswordAutofillAgent::FrameClosing(const blink::WebFrame* frame) {
for (LoginToPasswordInfoMap::iterator iter = login_to_password_info_.begin();
iter != login_to_password_info_.end();) {
// There may not be a username field, so get the frame from the password
// field.
if (iter->second.password_field.document().frame() == frame) {
password_to_username_.erase(iter->second.password_field);
login_to_password_info_.erase(iter++);
} else {
++iter;
}
}
for (FrameToPasswordFormMap::iterator iter =
provisionally_saved_forms_.begin();
iter != provisionally_saved_forms_.end();) {
if (iter->first == frame)
provisionally_saved_forms_.erase(iter++);
else
++iter;
}
}
bool PasswordAutofillAgent::FindLoginInfo(const blink::WebNode& node,
blink::WebInputElement* found_input,
PasswordInfo** found_password) {
if (!node.isElementNode())
return false;
blink::WebElement element = node.toConst<blink::WebElement>();
if (!element.hasHTMLTagName("input"))
return false;
blink::WebInputElement input = element.to<blink::WebInputElement>();
LoginToPasswordInfoMap::iterator iter = login_to_password_info_.find(input);
if (iter == login_to_password_info_.end())
return false;
*found_input = input;
*found_password = &iter->second;
return true;
}
void PasswordAutofillAgent::ClearPreview(
blink::WebInputElement* username,
blink::WebInputElement* password) {
if (!username->suggestedValue().isEmpty()) {
username->setSuggestedValue(blink::WebString());
username->setAutofilled(was_username_autofilled_);
username->setSelectionRange(username_selection_start_,
username->value().length());
}
if (!password->suggestedValue().isEmpty()) {
password->setSuggestedValue(blink::WebString());
password->setAutofilled(was_password_autofilled_);
}
}
void PasswordAutofillAgent::ProvisionallySavePassword(
blink::WebLocalFrame* frame,
const blink::WebFormElement& form,
ProvisionallySaveRestriction restriction) {
// TODO(vabr): This is just to stop getting a NULL frame in
// |provisionally_saved_forms_|. Cases where we try to save password for a
// form in a NULL frame should not happen, and it's currently unclear how they
// happen (http://crbug.com/420519). This thing will be hopefully solved by
// migrating the PasswordAutofillAgent to observe frames directly
// (http://crbug.com/400186).
if (!frame)
return;
scoped_ptr<PasswordForm> password_form(CreatePasswordForm(form));
if (!password_form || (restriction == RESTRICTION_NON_EMPTY_PASSWORD &&
password_form->password_value.empty() &&
password_form->new_password_value.empty())) {
return;
}
provisionally_saved_forms_[frame].reset(password_form.release());
}
} // namespace autofill