OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include <algorithm> |
| 6 #include "chrome/browser/renderer_host/test/test_render_view_host.h" |
| 7 |
| 8 #include "chrome/browser/browser_thread.h" |
| 9 #include "chrome/browser/safe_browsing/malware_report.h" |
| 10 #include "chrome/browser/safe_browsing/report.pb.h" |
| 11 #include "chrome/browser/tab_contents/navigation_entry.h" |
| 12 #include "chrome/browser/tab_contents/test_tab_contents.h" |
| 13 #include "chrome/common/render_messages.h" |
| 14 #include "chrome/common/render_messages_params.h" |
| 15 |
| 16 static const char* kOriginalLandingURL = "http://www.originallandingpage.com/"; |
| 17 static const char* kLandingURL = "http://www.landingpage.com/"; |
| 18 static const char* kMalwareURL = "http://www.malware.com/"; |
| 19 static const char* kHttpsURL = "https://www.url.com/"; |
| 20 |
| 21 class SafeBrowsingMalwareReportTest : public RenderViewHostTestHarness { |
| 22 public: |
| 23 SafeBrowsingMalwareReportTest() |
| 24 : ui_thread_(BrowserThread::UI, MessageLoop::current()), |
| 25 io_thread_(BrowserThread::IO, MessageLoop::current()) { |
| 26 } |
| 27 |
| 28 virtual void SetUp() { |
| 29 RenderViewHostTestHarness::SetUp(); |
| 30 } |
| 31 |
| 32 static bool ResourceLessThan( |
| 33 const safe_browsing::ClientMalwareReportRequest::Resource* lhs, |
| 34 const safe_browsing::ClientMalwareReportRequest::Resource* rhs) { |
| 35 return lhs->url() < rhs->url(); |
| 36 } |
| 37 |
| 38 protected: |
| 39 void InitResource(SafeBrowsingService::UnsafeResource* resource, |
| 40 ResourceType::Type resource_type, |
| 41 const GURL& url) { |
| 42 resource->client = NULL; |
| 43 resource->url = url; |
| 44 resource->resource_type = resource_type; |
| 45 resource->threat_type = SafeBrowsingService::URL_MALWARE; |
| 46 resource->render_process_host_id = contents_->GetRenderProcessHost()->id(); |
| 47 resource->render_view_id = contents_->render_view_host()->routing_id(); |
| 48 } |
| 49 |
| 50 void VerifyResults( |
| 51 const safe_browsing::ClientMalwareReportRequest& report_pb, |
| 52 const safe_browsing::ClientMalwareReportRequest& expected_pb) { |
| 53 EXPECT_EQ(expected_pb.malware_url(), report_pb.malware_url()); |
| 54 EXPECT_EQ(expected_pb.page_url(), report_pb.page_url()); |
| 55 EXPECT_EQ(expected_pb.referrer_url(), report_pb.referrer_url()); |
| 56 |
| 57 ASSERT_EQ(expected_pb.nodes_size(), report_pb.nodes_size()); |
| 58 // Sort the nodes, to make the test deterministic |
| 59 std::vector<const safe_browsing::ClientMalwareReportRequest::Resource*> |
| 60 nodes; |
| 61 for (int i = 0; i < report_pb.nodes_size(); ++i) { |
| 62 const safe_browsing::ClientMalwareReportRequest::Resource& resource = |
| 63 report_pb.nodes(i); |
| 64 nodes.push_back(&resource); |
| 65 } |
| 66 std::sort(nodes.begin(), nodes.end(), |
| 67 &SafeBrowsingMalwareReportTest::ResourceLessThan); |
| 68 |
| 69 std::vector<const safe_browsing::ClientMalwareReportRequest::Resource*> |
| 70 expected; |
| 71 for (int i = 0; i < report_pb.nodes_size(); ++i) { |
| 72 const safe_browsing::ClientMalwareReportRequest::Resource& resource = |
| 73 expected_pb.nodes(i); |
| 74 expected.push_back(&resource); |
| 75 } |
| 76 std::sort(expected.begin(), expected.end(), |
| 77 &SafeBrowsingMalwareReportTest::ResourceLessThan); |
| 78 |
| 79 for (uint32 i = 0; i < expected.size(); ++i) { |
| 80 EXPECT_EQ(expected[i]->url(), nodes[i]->url()); |
| 81 EXPECT_EQ(expected[i]->parent(), nodes[i]->parent()); |
| 82 } |
| 83 } |
| 84 |
| 85 BrowserThread ui_thread_; |
| 86 BrowserThread io_thread_; |
| 87 }; |
| 88 |
| 89 // Tests creating a simple malware report. |
| 90 TEST_F(SafeBrowsingMalwareReportTest, MalwareSubResource) { |
| 91 // Start a load. |
| 92 controller().LoadURL(GURL(kLandingURL), GURL(), PageTransition::TYPED); |
| 93 |
| 94 SafeBrowsingService::UnsafeResource resource; |
| 95 InitResource(&resource, ResourceType::SUB_RESOURCE, GURL(kMalwareURL)); |
| 96 |
| 97 SafeBrowsingMalwareReport* report = new SafeBrowsingMalwareReport( |
| 98 contents(), resource); |
| 99 |
| 100 scoped_ptr<const std::string> serialized(report->GetSerializedReport()); |
| 101 safe_browsing::ClientMalwareReportRequest actual; |
| 102 actual.ParseFromString(*serialized); |
| 103 |
| 104 safe_browsing::ClientMalwareReportRequest expected; |
| 105 expected.set_malware_url(kMalwareURL); |
| 106 expected.set_page_url(kLandingURL); |
| 107 expected.set_referrer_url(""); |
| 108 |
| 109 safe_browsing::ClientMalwareReportRequest::Resource* node = |
| 110 expected.add_nodes(); |
| 111 node->set_url(kLandingURL); |
| 112 node = expected.add_nodes(); |
| 113 node->set_url(kMalwareURL); |
| 114 |
| 115 VerifyResults(actual, expected); |
| 116 } |
| 117 |
| 118 // Tests creating a simple malware report where the subresource has a |
| 119 // different original_url. |
| 120 TEST_F(SafeBrowsingMalwareReportTest, MalwareSubResourceWithOriginalUrl) { |
| 121 controller().LoadURL(GURL(kLandingURL), GURL(), PageTransition::TYPED); |
| 122 |
| 123 SafeBrowsingService::UnsafeResource resource; |
| 124 InitResource(&resource, ResourceType::SUB_RESOURCE, GURL(kMalwareURL)); |
| 125 resource.original_url = GURL(kOriginalLandingURL); |
| 126 |
| 127 SafeBrowsingMalwareReport* report = new SafeBrowsingMalwareReport( |
| 128 contents(), resource); |
| 129 |
| 130 scoped_ptr<const std::string> serialized(report->GetSerializedReport()); |
| 131 safe_browsing::ClientMalwareReportRequest actual; |
| 132 actual.ParseFromString(*serialized); |
| 133 |
| 134 safe_browsing::ClientMalwareReportRequest expected; |
| 135 expected.set_malware_url(kMalwareURL); |
| 136 expected.set_page_url(kLandingURL); |
| 137 expected.set_referrer_url(""); |
| 138 |
| 139 safe_browsing::ClientMalwareReportRequest::Resource* node = |
| 140 expected.add_nodes(); |
| 141 node->set_url(kLandingURL); |
| 142 |
| 143 // Malware url should have originalurl as parent. |
| 144 node = expected.add_nodes(); |
| 145 node->set_url(kMalwareURL); |
| 146 node->set_parent(kOriginalLandingURL); |
| 147 |
| 148 node = expected.add_nodes(); |
| 149 node->set_url(kOriginalLandingURL); |
| 150 |
| 151 VerifyResults(actual, expected); |
| 152 } |
| 153 |
| 154 // Verify that https:// urls are dropped. |
| 155 TEST_F(SafeBrowsingMalwareReportTest, NotPublicUrl) { |
| 156 controller().LoadURL(GURL(kHttpsURL), GURL(), PageTransition::TYPED); |
| 157 SafeBrowsingService::UnsafeResource resource; |
| 158 InitResource(&resource, ResourceType::SUB_RESOURCE, GURL(kMalwareURL)); |
| 159 SafeBrowsingMalwareReport* report = new SafeBrowsingMalwareReport( |
| 160 contents(), resource); |
| 161 |
| 162 scoped_ptr<const std::string> serialized(report->GetSerializedReport()); |
| 163 safe_browsing::ClientMalwareReportRequest actual; |
| 164 actual.ParseFromString(*serialized); |
| 165 |
| 166 safe_browsing::ClientMalwareReportRequest expected; |
| 167 expected.set_malware_url(kMalwareURL); // No page_url |
| 168 expected.set_referrer_url(""); |
| 169 |
| 170 safe_browsing::ClientMalwareReportRequest::Resource* node = |
| 171 expected.add_nodes(); |
| 172 node->set_url(kMalwareURL); // Only one node |
| 173 |
| 174 VerifyResults(actual, expected); |
| 175 } |
OLD | NEW |