OLD | NEW |
(Empty) | |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "base/bind.h" |
| 6 #include "base/run_loop.h" |
| 7 #include "chrome/browser/extensions/blacklist_state_fetcher.h" |
| 8 #include "chrome/browser/extensions/test_blacklist_state_fetcher.h" |
| 9 #include "chrome/common/safe_browsing/crx_info.pb.h" |
| 10 #include "content/public/test/test_browser_thread_bundle.h" |
| 11 #include "testing/gtest/include/gtest/gtest.h" |
| 12 |
| 13 namespace extensions { |
| 14 namespace { |
| 15 |
| 16 void Assign(BlacklistState* to, BlacklistState from) { |
| 17 *to = from; |
| 18 } |
| 19 |
| 20 } // namespace |
| 21 |
| 22 class BlacklistStateFetcherTest : public testing::Test { |
| 23 private: |
| 24 content::TestBrowserThreadBundle browser_thread_bundle_; |
| 25 }; |
| 26 |
| 27 TEST_F(BlacklistStateFetcherTest, RequestBlacklistState) { |
| 28 BlacklistStateFetcher fetcher; |
| 29 TestBlacklistStateFetcher tester(&fetcher); |
| 30 |
| 31 tester.SetBlacklistVerdict( |
| 32 "a", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY); |
| 33 |
| 34 BlacklistState result; |
| 35 fetcher.Request("a", base::Bind(&Assign, &result)); |
| 36 |
| 37 EXPECT_TRUE(tester.HandleFetcher(0)); |
| 38 EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result); |
| 39 } |
| 40 |
| 41 TEST_F(BlacklistStateFetcherTest, RequestMultipleBlacklistStates) { |
| 42 BlacklistStateFetcher fetcher; |
| 43 TestBlacklistStateFetcher tester(&fetcher); |
| 44 |
| 45 tester.SetBlacklistVerdict( |
| 46 "a", ClientCRXListInfoResponse_Verdict_NOT_IN_BLACKLIST); |
| 47 tester.SetBlacklistVerdict( |
| 48 "b", ClientCRXListInfoResponse_Verdict_MALWARE); |
| 49 tester.SetBlacklistVerdict( |
| 50 "c", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY); |
| 51 tester.SetBlacklistVerdict( |
| 52 "d", ClientCRXListInfoResponse_Verdict_CWS_POLICY_VIOLATION); |
| 53 tester.SetBlacklistVerdict( |
| 54 "e", ClientCRXListInfoResponse_Verdict_POTENTIALLY_UNWANTED); |
| 55 |
| 56 BlacklistState result[9]; |
| 57 fetcher.Request("a", base::Bind(&Assign, &result[0])); |
| 58 fetcher.Request("a", base::Bind(&Assign, &result[1])); |
| 59 fetcher.Request("b", base::Bind(&Assign, &result[2])); |
| 60 fetcher.Request("b", base::Bind(&Assign, &result[3])); |
| 61 fetcher.Request("c", base::Bind(&Assign, &result[4])); |
| 62 fetcher.Request("d", base::Bind(&Assign, &result[5])); |
| 63 fetcher.Request("e", base::Bind(&Assign, &result[6])); |
| 64 fetcher.Request("f", base::Bind(&Assign, &result[7])); |
| 65 fetcher.Request("f", base::Bind(&Assign, &result[8])); |
| 66 |
| 67 // 6 fetchers should be created. Sending responses in shuffled order. |
| 68 EXPECT_TRUE(tester.HandleFetcher(4)); |
| 69 EXPECT_TRUE(tester.HandleFetcher(2)); |
| 70 EXPECT_TRUE(tester.HandleFetcher(5)); |
| 71 EXPECT_TRUE(tester.HandleFetcher(1)); |
| 72 EXPECT_TRUE(tester.HandleFetcher(0)); |
| 73 EXPECT_TRUE(tester.HandleFetcher(3)); |
| 74 |
| 75 EXPECT_EQ(NOT_BLACKLISTED, result[0]); |
| 76 EXPECT_EQ(NOT_BLACKLISTED, result[1]); |
| 77 EXPECT_EQ(BLACKLISTED_MALWARE, result[2]); |
| 78 EXPECT_EQ(BLACKLISTED_MALWARE, result[3]); |
| 79 EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result[4]); |
| 80 EXPECT_EQ(BLACKLISTED_CWS_POLICY_VIOLATION, result[5]); |
| 81 EXPECT_EQ(BLACKLISTED_POTENTIALLY_UNWANTED, result[6]); |
| 82 EXPECT_EQ(NOT_BLACKLISTED, result[7]); |
| 83 EXPECT_EQ(NOT_BLACKLISTED, result[8]); |
| 84 } |
| 85 |
| 86 } // namespace extensions |
OLD | NEW |