| Index: chrome/browser/download/download_util.cc
|
| diff --git a/chrome/browser/download/download_util.cc b/chrome/browser/download/download_util.cc
|
| index 8010f97301aaa887eaec16263d701d85170f2102..ed1a0591d070877b05926f01813bd13b4a4c7f3e 100644
|
| --- a/chrome/browser/download/download_util.cc
|
| +++ b/chrome/browser/download/download_util.cc
|
| @@ -269,4 +269,64 @@ void RecordDownloadSource(ChromeDownloadSource source) {
|
| "Download.SourcesChrome", source, CHROME_DOWNLOAD_SOURCE_LAST_ENTRY);
|
| }
|
|
|
| +// Finch trial -----------------------------------------------------------------
|
| +
|
| +const char kFinchTrialName[] = "MalwareDownloadWarning";
|
| +const char kCondition1Control[] = "Condition1Control";
|
| +const char kCondition2Control[] = "Condition2Control";
|
| +const char kCondition3Malicious[] = "Condition3Malicious";
|
| +const char kCondition4Unsafe[] = "Condition4Unsafe";
|
| +const char kCondition5Dangerous[] = "Condition5Dangerous";
|
| +const char kCondition6Harmful[] = "Condition6Harmful";
|
| +const char kCondition7DiscardSecond[] = "Condition7DiscardSecond";
|
| +const char kCondition8DiscardFirst[] = "Condition8DiscardFirst";
|
| +const char kCondition9SafeDiscard[] = "Condition9SafeDiscard";
|
| +const char kCondition10SafeDontRun[] = "Condition10SafeDontRun";
|
| +
|
| +base::string16 AssembleMalwareFinchString(
|
| + const std::string& trial_condition, const base::string16& elided_filename) {
|
| + // Sanity check to make sure we have a filename.
|
| + base::string16 filename;
|
| + if (elided_filename.empty()) {
|
| + filename = ASCIIToUTF16("This file");
|
| + } else {
|
| + filename = ReplaceStringPlaceholders(ASCIIToUTF16("File '$1'"),
|
| + elided_filename,
|
| + NULL);
|
| + }
|
| +
|
| + // Set the message text according to the condition.
|
| + if (trial_condition == kCondition1Control) {
|
| + return ASCIIToUTF16("This file appears malicious.");
|
| + }
|
| + base::string16 message_text;
|
| + if (trial_condition == kCondition2Control) {
|
| + message_text = ASCIIToUTF16("$1 appears malicious.");
|
| + } else if (trial_condition == kCondition3Malicious) {
|
| + message_text = ASCIIToUTF16("$1 is malicious.");
|
| + } else if (trial_condition == kCondition4Unsafe) {
|
| + message_text = ASCIIToUTF16("$1 is unsafe.");
|
| + } else if (trial_condition == kCondition5Dangerous) {
|
| + message_text = ASCIIToUTF16("$1 is dangerous.");
|
| + } else if (trial_condition == kCondition6Harmful) {
|
| + message_text = ASCIIToUTF16("$1 is harmful.");
|
| + } else if (trial_condition == kCondition7DiscardSecond) {
|
| + message_text = ASCIIToUTF16(
|
| + "$1 is malicious. Discard this file to stay safe.");
|
| + } else if (trial_condition == kCondition8DiscardFirst) {
|
| + message_text = ASCIIToUTF16(
|
| + "Discard this file to stay safe. $1 is malicious.");
|
| + } else if (trial_condition == kCondition9SafeDiscard) {
|
| + message_text = ASCIIToUTF16("$1 is malicious. To stay safe, discard it.");
|
| + } else if (trial_condition == kCondition10SafeDontRun) {
|
| + message_text = ASCIIToUTF16("$1 is malicious. To stay safe, don't run it.");
|
| + } else {
|
| + // We use the second control as a default for other conditions that don't
|
| + // change the warning string.
|
| + message_text = ASCIIToUTF16("$1 appears malicious.");
|
| + }
|
| +
|
| + return ReplaceStringPlaceholders(message_text, filename, NULL);
|
| +}
|
| +
|
| } // namespace download_util
|
|
|