Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(215)

Side by Side Diff: chrome/browser/extensions/blacklist_state_fetcher_unittest.cc

Issue 49253005: Fetch extension blacklist states from SafeBrowsing server (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "base/run_loop.h"
6 #include "chrome/browser/extensions/blacklist_state_fetcher.h"
7 #include "chrome/browser/extensions/test_blacklist_state_fetcher.h"
8 #include "chrome/common/safe_browsing/crx_info.pb.h"
9 #include "testing/gtest/include/gtest/gtest.h"
10
11 namespace extensions {
12 namespace {
13
14 void Assign(Blacklist::BlacklistState* to, Blacklist::BlacklistState from) {
15 *to = from;
16 }
17
18 } // namespace
19
20 class BlacklistStateFetcherTest : public testing::Test {
21 };
22
23 TEST_F(BlacklistStateFetcherTest, RequestBlacklistState) {
24 BlacklistStateFetcher fetcher;
25 TestBlacklistStateFetcher tester(&fetcher);
26
27 tester.SetBlacklistVerdict(
28 "a", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
29
30 Blacklist::BlacklistState result;
31 fetcher.Request("a", base::Bind(&Assign, &result));
32
33 EXPECT_TRUE(tester.HandleFetcher(0));
34
35 EXPECT_EQ(Blacklist::BLACKLISTED_SECURITY_VULNERABILITY, result);
36 }
37
38 TEST_F(BlacklistStateFetcherTest, RequestMultipleBlacklistStates) {
39 BlacklistStateFetcher fetcher;
40 TestBlacklistStateFetcher tester(&fetcher);
41
42 tester.SetBlacklistVerdict(
43 "a", ClientCRXListInfoResponse_Verdict_UNKNOWN);
44 tester.SetBlacklistVerdict(
45 "b", ClientCRXListInfoResponse_Verdict_MALWARE);
46 tester.SetBlacklistVerdict(
47 "c", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
48 tester.SetBlacklistVerdict(
49 "d", ClientCRXListInfoResponse_Verdict_CWS_POLICY_VIOLATION);
50 tester.SetBlacklistVerdict(
51 "e", ClientCRXListInfoResponse_Verdict_POTENTIALLY_UNWANTED);
52
53 Blacklist::BlacklistState result[9];
54 fetcher.Request("a", base::Bind(&Assign, &result[0]));
55 fetcher.Request("a", base::Bind(&Assign, &result[1]));
56 fetcher.Request("b", base::Bind(&Assign, &result[2]));
57 fetcher.Request("b", base::Bind(&Assign, &result[3]));
58 fetcher.Request("c", base::Bind(&Assign, &result[4]));
59 fetcher.Request("d", base::Bind(&Assign, &result[5]));
60 fetcher.Request("e", base::Bind(&Assign, &result[6]));
61 fetcher.Request("f", base::Bind(&Assign, &result[7]));
62 fetcher.Request("f", base::Bind(&Assign, &result[8]));
63
64 // 6 fetchers should be created. Sending responses in shuffled order.
65 EXPECT_TRUE(tester.HandleFetcher(4));
66 EXPECT_TRUE(tester.HandleFetcher(2));
67 EXPECT_TRUE(tester.HandleFetcher(5));
68 EXPECT_TRUE(tester.HandleFetcher(1));
69 EXPECT_TRUE(tester.HandleFetcher(0));
70 EXPECT_TRUE(tester.HandleFetcher(3));
71
72 EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[0]);
73 EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[1]);
74 EXPECT_EQ(Blacklist::BLACKLISTED_MALWARE, result[2]);
75 EXPECT_EQ(Blacklist::BLACKLISTED_MALWARE, result[3]);
76 EXPECT_EQ(Blacklist::BLACKLISTED_SECURITY_VULNERABILITY, result[4]);
77 EXPECT_EQ(Blacklist::BLACKLISTED_CWS_POLICY_VIOLATION, result[5]);
78 EXPECT_EQ(Blacklist::BLACKLISTED_POTENTIALLY_UNWANTED, result[6]);
79 EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[7]);
80 EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[8]);
81 }
82
83 } // namespace extensions
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698