OLD | NEW |
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 | 5 |
6 #include "base/logging.h" | 6 #include "base/logging.h" |
7 #include "base/time.h" | 7 #include "base/time.h" |
8 #include "testing/gtest/include/gtest/gtest.h" | 8 #include "testing/gtest/include/gtest/gtest.h" |
9 #include "chrome/browser/safe_browsing/protocol_manager.h" | 9 #include "chrome/browser/safe_browsing/protocol_manager.h" |
10 | 10 |
(...skipping 175 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
186 | 186 |
187 pm.set_additional_query(kAdditionalQuery); | 187 pm.set_additional_query(kAdditionalQuery); |
188 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&" | 188 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&" |
189 "pver=2.2&additional_query", pm.UpdateUrl(false).spec()); | 189 "pver=2.2&additional_query", pm.UpdateUrl(false).spec()); |
190 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&" | 190 EXPECT_EQ("http://info.prefix.com/foo/downloads?client=unittest&appver=1.0&" |
191 "pver=2.2&additional_query&wrkey=AKEgNisjLl7iRYrjWHmpd_XwCiilxrw8" | 191 "pver=2.2&additional_query&wrkey=AKEgNisjLl7iRYrjWHmpd_XwCiilxrw8" |
192 "nNaYH47tiQ7pDe9cEErjVHGZaPPUau5h61tbXSDqABiJZnDFByc_g8B5vTwxkhBf" | 192 "nNaYH47tiQ7pDe9cEErjVHGZaPPUau5h61tbXSDqABiJZnDFByc_g8B5vTwxkhBf" |
193 "9g==", pm.UpdateUrl(true).spec()); | 193 "9g==", pm.UpdateUrl(true).spec()); |
194 } | 194 } |
195 | 195 |
196 TEST_F(SafeBrowsingProtocolManagerTest, TestSafeBrowsingReportUrl) { | 196 TEST_F(SafeBrowsingProtocolManagerTest, TestSafeBrowsingHitUrl) { |
197 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, | 197 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, |
198 kInfoUrlPrefix, kMacKeyUrlPrefix, false); | 198 kInfoUrlPrefix, kMacKeyUrlPrefix, false); |
199 pm.version_ = kAppVer; | 199 pm.version_ = kAppVer; |
200 | 200 |
201 GURL malicious_url("http://malicious.url.com"); | 201 GURL malicious_url("http://malicious.url.com"); |
202 GURL page_url("http://page.url.com"); | 202 GURL page_url("http://page.url.com"); |
203 GURL referrer_url("http://referrer.url.com"); | 203 GURL referrer_url("http://referrer.url.com"); |
204 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" | 204 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" |
205 "pver=2.2&evts=malblhit&evtd=http%3A%2F%2Fmalicious.url.com%2F&" | 205 "pver=2.2&evts=malblhit&evtd=http%3A%2F%2Fmalicious.url.com%2F&" |
206 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." | 206 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." |
207 "url.com%2F&evtb=1", | 207 "url.com%2F&evtb=1", |
208 pm.SafeBrowsingReportUrl( | 208 pm.SafeBrowsingHitUrl( |
209 malicious_url, page_url, referrer_url, | 209 malicious_url, page_url, referrer_url, |
210 true, SafeBrowsingService::URL_MALWARE).spec()); | 210 true, SafeBrowsingService::URL_MALWARE).spec()); |
211 | 211 |
212 pm.set_additional_query(kAdditionalQuery); | 212 pm.set_additional_query(kAdditionalQuery); |
213 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" | 213 EXPECT_EQ("http://info.prefix.com/foo/report?client=unittest&appver=1.0&" |
214 "pver=2.2&additional_query&evts=phishblhit&" | 214 "pver=2.2&additional_query&evts=phishblhit&" |
215 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" | 215 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" |
216 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." | 216 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." |
217 "url.com%2F&evtb=0", | 217 "url.com%2F&evtb=0", |
218 pm.SafeBrowsingReportUrl( | 218 pm.SafeBrowsingHitUrl( |
219 malicious_url, page_url, referrer_url, | 219 malicious_url, page_url, referrer_url, |
220 false, SafeBrowsingService::URL_PHISHING).spec()); | 220 false, SafeBrowsingService::URL_PHISHING).spec()); |
221 } | 221 } |
222 | 222 |
| 223 TEST_F(SafeBrowsingProtocolManagerTest, TestMalwareDetailsUrl) { |
| 224 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, |
| 225 kInfoUrlPrefix, kMacKeyUrlPrefix, false); |
| 226 |
| 227 pm.version_ = kAppVer; |
| 228 pm.set_additional_query(kAdditionalQuery); // AdditionalQuery is not used. |
| 229 EXPECT_EQ("https://key.prefix.com/bar/clientreport/malware?" |
| 230 "client=unittest&appver=1.0&pver=1.0", |
| 231 pm.MalwareDetailsUrl().spec()); |
| 232 } |
| 233 |
223 TEST_F(SafeBrowsingProtocolManagerTest, TestMacKeyUrl) { | 234 TEST_F(SafeBrowsingProtocolManagerTest, TestMacKeyUrl) { |
224 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, | 235 SafeBrowsingProtocolManager pm(NULL, kClient, kClientKey, kWrappedKey, NULL, |
225 kInfoUrlPrefix, kMacKeyUrlPrefix, false); | 236 kInfoUrlPrefix, kMacKeyUrlPrefix, false); |
226 pm.version_ = kAppVer; | 237 pm.version_ = kAppVer; |
227 | 238 |
228 EXPECT_EQ("https://key.prefix.com/bar/newkey?client=unittest&appver=1.0&" | 239 EXPECT_EQ("https://key.prefix.com/bar/newkey?client=unittest&appver=1.0&" |
229 "pver=2.2", pm.MacKeyUrl().spec()); | 240 "pver=2.2", pm.MacKeyUrl().spec()); |
230 | 241 |
231 pm.set_additional_query(kAdditionalQuery); | 242 pm.set_additional_query(kAdditionalQuery); |
232 EXPECT_EQ("https://key.prefix.com/bar/newkey?client=unittest&appver=1.0&" | 243 EXPECT_EQ("https://key.prefix.com/bar/newkey?client=unittest&appver=1.0&" |
(...skipping 22 matching lines...) Expand all Loading... |
255 pm.set_additional_query(kAdditionalQuery); | 266 pm.set_additional_query(kAdditionalQuery); |
256 EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query", | 267 EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query", |
257 pm.NextChunkUrl(url_partial).spec()); | 268 pm.NextChunkUrl(url_partial).spec()); |
258 EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query", | 269 EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query", |
259 pm.NextChunkUrl(url_http_full).spec()); | 270 pm.NextChunkUrl(url_http_full).spec()); |
260 EXPECT_EQ("https://localhost:1234/foo/bar?foo&additional_query", | 271 EXPECT_EQ("https://localhost:1234/foo/bar?foo&additional_query", |
261 pm.NextChunkUrl(url_https_full).spec()); | 272 pm.NextChunkUrl(url_https_full).spec()); |
262 EXPECT_EQ("https://localhost:1234/foo/bar?additional_query", | 273 EXPECT_EQ("https://localhost:1234/foo/bar?additional_query", |
263 pm.NextChunkUrl(url_https_no_query).spec()); | 274 pm.NextChunkUrl(url_https_no_query).spec()); |
264 } | 275 } |
OLD | NEW |