Chromium Code Reviews

Side by Side Diff: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc

Issue 4822002: Send malware reports when a user opts-in from the safe browsing interstitial ... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: '' Created 10 years ago
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
View unified diff | | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 // This test creates a fake safebrowsing service, where we can inject 5 // This test creates a fake safebrowsing service, where we can inject
6 // malware and phishing urls. It then uses a real browser to go to 6 // malware and phishing urls. It then uses a real browser to go to
7 // these urls, and sends "goback" or "proceed" commands and verifies 7 // these urls, and sends "goback" or "proceed" commands and verifies
8 // they work. 8 // they work.
9 9
10 #include "chrome/browser/browser_process.h" 10 #include "chrome/browser/browser_process.h"
11 #include "chrome/browser/browser_thread.h" 11 #include "chrome/browser/browser_thread.h"
12 #include "chrome/browser/prefs/pref_service.h"
13 #include "chrome/browser/profiles/profile.h"
12 #include "chrome/browser/renderer_host/render_process_host.h" 14 #include "chrome/browser/renderer_host/render_process_host.h"
13 #include "chrome/browser/renderer_host/resource_dispatcher_host.h" 15 #include "chrome/browser/renderer_host/resource_dispatcher_host.h"
16 #include "chrome/browser/safe_browsing/malware_details.h"
14 #include "chrome/browser/safe_browsing/safe_browsing_service.h" 17 #include "chrome/browser/safe_browsing/safe_browsing_service.h"
15 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" 18 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h"
16 #include "chrome/browser/tab_contents/tab_contents.h" 19 #include "chrome/browser/tab_contents/tab_contents.h"
17 #include "chrome/browser/tab_contents/tab_contents_view.h" 20 #include "chrome/browser/tab_contents/tab_contents_view.h"
18 #include "chrome/browser/ui/browser.h" 21 #include "chrome/browser/ui/browser.h"
22 #include "chrome/common/pref_names.h"
19 #include "chrome/common/url_constants.h" 23 #include "chrome/common/url_constants.h"
20 #include "chrome/test/in_process_browser_test.h" 24 #include "chrome/test/in_process_browser_test.h"
21 #include "chrome/test/ui_test_utils.h" 25 #include "chrome/test/ui_test_utils.h"
22 26
23 // A SafeBrowingService class that allows us to inject the malicious URLs. 27 // A SafeBrowingService class that allows us to inject the malicious URLs.
24 class FakeSafeBrowsingService : public SafeBrowsingService { 28 class FakeSafeBrowsingService : public SafeBrowsingService {
25 public: 29 public:
26 FakeSafeBrowsingService() {} 30 FakeSafeBrowsingService() {}
27 31
28 virtual ~FakeSafeBrowsingService() {} 32 virtual ~FakeSafeBrowsingService() {}
(...skipping 16 matching lines...)
45 } 49 }
46 50
47 void OnCheckDone(std::string url, Client* client) { 51 void OnCheckDone(std::string url, Client* client) {
48 client->OnUrlCheckResult(GURL(url), badurls[url]); 52 client->OnUrlCheckResult(GURL(url), badurls[url]);
49 } 53 }
50 54
51 void AddURLResult(const GURL& url, UrlCheckResult checkresult) { 55 void AddURLResult(const GURL& url, UrlCheckResult checkresult) {
52 badurls[url.spec()] = checkresult; 56 badurls[url.spec()] = checkresult;
53 } 57 }
54 58
59 virtual void ReportMalwareDetails(scoped_refptr<MalwareDetails> details) {
60 details_.push_back(details);
61 // Notify the UI thread, that we got a report.
62 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE,
63 NewRunnableMethod(this,
64 &FakeSafeBrowsingService::OnMalwareDetailsDone));
65 }
66
67 void OnMalwareDetailsDone() {
68 EXPECT_TRUE(BrowserThread::CurrentlyOn(BrowserThread::UI));
69 MessageLoopForUI::current()->Quit();
70 }
71
72 std::list<scoped_refptr<MalwareDetails> >* GetDetails() {
73 return &details_;
74 }
75
76 std::list<scoped_refptr<MalwareDetails> > details_;
77
78
55 private: 79 private:
56 base::hash_map<std::string, UrlCheckResult> badurls; 80 base::hash_map<std::string, UrlCheckResult> badurls;
57 }; 81 };
58 82
59 // Factory that creates FakeSafeBrowsingService instances. 83 // Factory that creates FakeSafeBrowsingService instances.
60 class TestSafeBrowsingServiceFactory : public SafeBrowsingServiceFactory { 84 class TestSafeBrowsingServiceFactory : public SafeBrowsingServiceFactory {
61 public: 85 public:
62 TestSafeBrowsingServiceFactory() { } 86 TestSafeBrowsingServiceFactory() { }
63 virtual ~TestSafeBrowsingServiceFactory() { } 87 virtual ~TestSafeBrowsingServiceFactory() { }
64 88
(...skipping 30 matching lines...)
95 virtual void OnBlockingPageComplete(bool proceed) { 119 virtual void OnBlockingPageComplete(bool proceed) {
96 } 120 }
97 121
98 void AddURLResult(const GURL& url, 122 void AddURLResult(const GURL& url,
99 SafeBrowsingService::UrlCheckResult checkresult) { 123 SafeBrowsingService::UrlCheckResult checkresult) {
100 FakeSafeBrowsingService* service = 124 FakeSafeBrowsingService* service =
101 static_cast<FakeSafeBrowsingService*>( 125 static_cast<FakeSafeBrowsingService*>(
102 g_browser_process->resource_dispatcher_host()-> 126 g_browser_process->resource_dispatcher_host()->
103 safe_browsing_service()); 127 safe_browsing_service());
104 128
105 ASSERT_TRUE(service != NULL); 129 ASSERT_TRUE(service);
106 service->AddURLResult(url, checkresult); 130 service->AddURLResult(url, checkresult);
107 } 131 }
108 132
109 void SendCommand(const std::string& command) { 133 void SendCommand(const std::string& command) {
110 TabContents* contents = browser()->GetSelectedTabContents(); 134 TabContents* contents = browser()->GetSelectedTabContents();
111 SafeBrowsingBlockingPage* interstitial_page = 135 SafeBrowsingBlockingPage* interstitial_page =
112 static_cast<SafeBrowsingBlockingPage*>( 136 static_cast<SafeBrowsingBlockingPage*>(
113 contents->interstitial_page()); 137 contents->interstitial_page());
114 ASSERT_TRUE(interstitial_page); 138 ASSERT_TRUE(interstitial_page);
115 interstitial_page->CommandReceived(command); 139 interstitial_page->CommandReceived(command);
(...skipping 18 matching lines...)
134 InterstitialPage* interstitial_page = contents->interstitial_page(); 158 InterstitialPage* interstitial_page = contents->interstitial_page();
135 ASSERT_FALSE(interstitial_page); 159 ASSERT_FALSE(interstitial_page);
136 } 160 }
137 161
138 void WaitForNavigation() { 162 void WaitForNavigation() {
139 NavigationController* controller = 163 NavigationController* controller =
140 &browser()->GetSelectedTabContents()->controller(); 164 &browser()->GetSelectedTabContents()->controller();
141 ui_test_utils::WaitForNavigation(controller); 165 ui_test_utils::WaitForNavigation(controller);
142 } 166 }
143 167
168 void AssertReportSent() {
169 // When a report is scheduled in the IO thread we should get notified.
170 ui_test_utils::RunMessageLoop();
171
172 FakeSafeBrowsingService* service =
173 static_cast<FakeSafeBrowsingService*>(
174 g_browser_process->resource_dispatcher_host()->
175 safe_browsing_service());
176 ASSERT_EQ(1u, service->GetDetails()->size());
177 }
178
144 private: 179 private:
145 TestSafeBrowsingServiceFactory factory; 180 TestSafeBrowsingServiceFactory factory;
146 181
147 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingBlockingPageTest); 182 DISALLOW_COPY_AND_ASSIGN(SafeBrowsingBlockingPageTest);
148 }; 183 };
149 184
150 namespace { 185 namespace {
151 186
152 const char kEmptyPage[] = "files/empty.html"; 187 const char kEmptyPage[] = "files/empty.html";
153 const char kMalwarePage[] = "files/safe_browsing/malware.html"; 188 const char kMalwarePage[] = "files/safe_browsing/malware.html";
(...skipping 97 matching lines...)
251 AddURLResult(iframe_url, SafeBrowsingService::URL_MALWARE); 286 AddURLResult(iframe_url, SafeBrowsingService::URL_MALWARE);
252 287
253 ui_test_utils::NavigateToURL(browser(), url); 288 ui_test_utils::NavigateToURL(browser(), url);
254 289
255 SendCommand("\"proceed\""); // Simulate the user clicking "proceed" 290 SendCommand("\"proceed\""); // Simulate the user clicking "proceed"
256 AssertNoInterstitial(); // Assert the interstitial is gone 291 AssertNoInterstitial(); // Assert the interstitial is gone
257 292
258 EXPECT_EQ(url, browser()->GetSelectedTabContents()->GetURL()); 293 EXPECT_EQ(url, browser()->GetSelectedTabContents()->GetURL());
259 } 294 }
260 295
296 IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageTest,
297 MalwareIframeReportDetails) {
298 // Enable reporting of malware details.
299 browser()->GetProfile()->GetPrefs()->SetBoolean(
300 prefs::kSafeBrowsingReportingEnabled, true);
301 EXPECT_TRUE(browser()->GetProfile()->GetPrefs()->GetBoolean(
302 prefs::kSafeBrowsingReportingEnabled));
303
304 GURL url = test_server()->GetURL(kMalwarePage);
305 GURL iframe_url = test_server()->GetURL(kMalwareIframe);
306 AddURLResult(iframe_url, SafeBrowsingService::URL_MALWARE);
307
308 ui_test_utils::NavigateToURL(browser(), url);
309
310 SendCommand("\"proceed\""); // Simulate the user clicking "back"
311 AssertNoInterstitial(); // Assert the interstitial is gone
312
313 EXPECT_EQ(url, browser()->GetSelectedTabContents()->GetURL());
314 AssertReportSent();
315 }
316
261 } // namespace 317 } // namespace
OLDNEW

Powered by Google App Engine