1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
|
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/bind.h"
#include "base/run_loop.h"
#include "chrome/browser/extensions/blacklist_state_fetcher.h"
#include "chrome/browser/extensions/test_blacklist_state_fetcher.h"
#include "chrome/common/safe_browsing/crx_info.pb.h"
#include "content/public/test/test_browser_thread_bundle.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace extensions {
namespace {
void Assign(BlacklistState* to, BlacklistState from) {
*to = from;
}
} // namespace
class BlacklistStateFetcherTest : public testing::Test {
private:
content::TestBrowserThreadBundle browser_thread_bundle_;
};
TEST_F(BlacklistStateFetcherTest, RequestBlacklistState) {
BlacklistStateFetcher fetcher;
TestBlacklistStateFetcher tester(&fetcher);
tester.SetBlacklistVerdict(
"a", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
BlacklistState result;
fetcher.Request("a", base::Bind(&Assign, &result));
EXPECT_TRUE(tester.HandleFetcher("a"));
EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result);
}
TEST_F(BlacklistStateFetcherTest, RequestMultipleBlacklistStates) {
BlacklistStateFetcher fetcher;
TestBlacklistStateFetcher tester(&fetcher);
tester.SetBlacklistVerdict(
"a", ClientCRXListInfoResponse_Verdict_NOT_IN_BLACKLIST);
tester.SetBlacklistVerdict(
"b", ClientCRXListInfoResponse_Verdict_MALWARE);
tester.SetBlacklistVerdict(
"c", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
tester.SetBlacklistVerdict(
"d", ClientCRXListInfoResponse_Verdict_CWS_POLICY_VIOLATION);
tester.SetBlacklistVerdict(
"e", ClientCRXListInfoResponse_Verdict_POTENTIALLY_UNWANTED);
BlacklistState result[9];
fetcher.Request("a", base::Bind(&Assign, &result[0]));
fetcher.Request("a", base::Bind(&Assign, &result[1]));
fetcher.Request("b", base::Bind(&Assign, &result[2]));
fetcher.Request("b", base::Bind(&Assign, &result[3]));
fetcher.Request("c", base::Bind(&Assign, &result[4]));
fetcher.Request("d", base::Bind(&Assign, &result[5]));
fetcher.Request("e", base::Bind(&Assign, &result[6]));
fetcher.Request("f", base::Bind(&Assign, &result[7]));
fetcher.Request("f", base::Bind(&Assign, &result[8]));
// 6 fetchers should be created. Sending responses in shuffled order.
EXPECT_TRUE(tester.HandleFetcher("e"));
EXPECT_TRUE(tester.HandleFetcher("c"));
EXPECT_TRUE(tester.HandleFetcher("f"));
EXPECT_TRUE(tester.HandleFetcher("b"));
EXPECT_TRUE(tester.HandleFetcher("a"));
EXPECT_TRUE(tester.HandleFetcher("d"));
EXPECT_EQ(NOT_BLACKLISTED, result[0]);
EXPECT_EQ(NOT_BLACKLISTED, result[1]);
EXPECT_EQ(BLACKLISTED_MALWARE, result[2]);
EXPECT_EQ(BLACKLISTED_MALWARE, result[3]);
EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result[4]);
EXPECT_EQ(BLACKLISTED_CWS_POLICY_VIOLATION, result[5]);
EXPECT_EQ(BLACKLISTED_POTENTIALLY_UNWANTED, result[6]);
EXPECT_EQ(NOT_BLACKLISTED, result[7]);
EXPECT_EQ(NOT_BLACKLISTED, result[8]);
}
} // namespace extensions
|