| OLD | NEW |
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // Note: this test uses RenderViewFakeResourcesTest in order to set up a | 5 // Note: this test uses RenderViewFakeResourcesTest in order to set up a |
| 6 // real RenderThread to hold the phishing Scorer object. | 6 // real RenderThread to hold the phishing Scorer object. |
| 7 | 7 |
| 8 #include "chrome/renderer/safe_browsing/phishing_classifier_delegate.h" | 8 #include "chrome/renderer/safe_browsing/phishing_classifier_delegate.h" |
| 9 | 9 |
| 10 #include "base/scoped_ptr.h" | 10 #include "base/scoped_ptr.h" |
| (...skipping 71 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 82 bool is_phishy, double phishy_score) { | 82 bool is_phishy, double phishy_score) { |
| 83 // Clear out any previous state. | 83 // Clear out any previous state. |
| 84 detected_phishing_site_ = false; | 84 detected_phishing_site_ = false; |
| 85 detected_url_ = GURL(); | 85 detected_url_ = GURL(); |
| 86 detected_score_ = -1.0; | 86 detected_score_ = -1.0; |
| 87 | 87 |
| 88 delegate->ClassificationDone(is_phishy, phishy_score); | 88 delegate->ClassificationDone(is_phishy, phishy_score); |
| 89 message_loop_.Run(); | 89 message_loop_.Run(); |
| 90 } | 90 } |
| 91 | 91 |
| 92 void OnStartPhishingDetection(PhishingClassifierDelegate* delegate, |
| 93 const GURL& url) { |
| 94 delegate->OnStartPhishingDetection(url); |
| 95 } |
| 96 |
| 92 bool detected_phishing_site_; | 97 bool detected_phishing_site_; |
| 93 GURL detected_url_; | 98 GURL detected_url_; |
| 94 double detected_score_; | 99 double detected_score_; |
| 95 }; | 100 }; |
| 96 | 101 |
| 97 TEST_F(PhishingClassifierDelegateTest, Navigation) { | 102 TEST_F(PhishingClassifierDelegateTest, Navigation) { |
| 98 MockPhishingClassifier* classifier = | 103 MockPhishingClassifier* classifier = |
| 99 new StrictMock<MockPhishingClassifier>(view_); | 104 new StrictMock<MockPhishingClassifier>(view_); |
| 100 PhishingClassifierDelegate* delegate = | 105 PhishingClassifierDelegate* delegate = |
| 101 new PhishingClassifierDelegate(view_, classifier); | 106 new PhishingClassifierDelegate(view_, classifier); |
| 102 MockScorer scorer; | 107 MockScorer scorer; |
| 103 delegate->SetPhishingScorer(&scorer); | 108 delegate->SetPhishingScorer(&scorer); |
| 104 ASSERT_TRUE(classifier->is_ready()); | 109 ASSERT_TRUE(classifier->is_ready()); |
| 105 | 110 |
| 106 // Test an initial load. We expect classification to happen normally. | 111 // Test an initial load. We expect classification to happen normally. |
| 107 EXPECT_CALL(*classifier, CancelPendingClassification()).Times(2); | 112 EXPECT_CALL(*classifier, CancelPendingClassification()).Times(2); |
| 108 responses_["http://host.com/"] = | 113 responses_["http://host.com/"] = |
| 109 "<html><body><iframe src=\"http://sub1.com/\"></iframe></body></html>"; | 114 "<html><body><iframe src=\"http://sub1.com/\"></iframe></body></html>"; |
| 110 LoadURL("http://host.com/"); | 115 LoadURL("http://host.com/"); |
| 111 Mock::VerifyAndClearExpectations(classifier); | 116 Mock::VerifyAndClearExpectations(classifier); |
| 117 OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
| 112 string16 page_text = ASCIIToUTF16("dummy"); | 118 string16 page_text = ASCIIToUTF16("dummy"); |
| 113 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). | 119 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). |
| 114 WillOnce(DeleteArg<1>()); | 120 WillOnce(DeleteArg<1>()); |
| 115 delegate->PageCaptured(page_text); | 121 delegate->PageCaptured(page_text); |
| 116 Mock::VerifyAndClearExpectations(classifier); | 122 Mock::VerifyAndClearExpectations(classifier); |
| 117 | 123 |
| 118 // Reloading the same page should not trigger a reclassification. | 124 // Reloading the same page should not trigger a reclassification. |
| 119 // However, it will cancel any pending classification since the | 125 // However, it will cancel any pending classification since the |
| 120 // content is being replaced. | 126 // content is being replaced. |
| 121 EXPECT_CALL(*classifier, CancelPendingClassification()).Times(2); | 127 EXPECT_CALL(*classifier, CancelPendingClassification()).Times(2); |
| 122 GetMainFrame()->reload(); | 128 GetMainFrame()->reload(); |
| 123 message_loop_.Run(); | 129 message_loop_.Run(); |
| 124 Mock::VerifyAndClearExpectations(classifier); | 130 Mock::VerifyAndClearExpectations(classifier); |
| 131 OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
| 125 delegate->PageCaptured(page_text); | 132 delegate->PageCaptured(page_text); |
| 126 | 133 |
| 127 // Navigating in a subframe will increment the page id, but not change | 134 // Navigating in a subframe will increment the page id, but not change |
| 128 // the toplevel URL. This should cancel pending classification since the | 135 // the toplevel URL. This should cancel pending classification since the |
| 129 // page content is changing, and not begin a new classification. | 136 // page content is changing, and not begin a new classification. |
| 130 EXPECT_CALL(*classifier, CancelPendingClassification()); | 137 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 131 GetMainFrame()->firstChild()->loadRequest( | 138 GetMainFrame()->firstChild()->loadRequest( |
| 132 WebKit::WebURLRequest(GURL("http://sub2.com/"))); | 139 WebKit::WebURLRequest(GURL("http://sub2.com/"))); |
| 133 message_loop_.Run(); | 140 message_loop_.Run(); |
| 134 Mock::VerifyAndClearExpectations(classifier); | 141 Mock::VerifyAndClearExpectations(classifier); |
| 142 OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
| 135 delegate->PageCaptured(page_text); | 143 delegate->PageCaptured(page_text); |
| 136 | 144 |
| 137 // Scrolling to an anchor will increment the page id, but should not | 145 // Scrolling to an anchor will increment the page id, but should not |
| 138 // not trigger a reclassification. A pending classification should not | 146 // not trigger a reclassification. A pending classification should not |
| 139 // be cancelled, since the content is not changing. | 147 // be cancelled, since the content is not changing. |
| 140 LoadURL("http://host.com/#foo"); | 148 LoadURL("http://host.com/#foo"); |
| 149 OnStartPhishingDetection(delegate, GURL("http://host.com/#foo")); |
| 141 delegate->PageCaptured(page_text); | 150 delegate->PageCaptured(page_text); |
| 142 | 151 |
| 143 // Now load a new toplevel page, which should trigger another classification. | 152 // Now load a new toplevel page, which should trigger another classification. |
| 144 EXPECT_CALL(*classifier, CancelPendingClassification()); | 153 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 145 LoadURL("http://host2.com/"); | 154 LoadURL("http://host2.com/"); |
| 146 Mock::VerifyAndClearExpectations(classifier); | 155 Mock::VerifyAndClearExpectations(classifier); |
| 147 page_text = ASCIIToUTF16("dummy2"); | 156 page_text = ASCIIToUTF16("dummy2"); |
| 148 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). | 157 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). |
| 149 WillOnce(DeleteArg<1>()); | 158 WillOnce(DeleteArg<1>()); |
| 159 OnStartPhishingDetection(delegate, GURL("http://host2.com/")); |
| 150 delegate->PageCaptured(page_text); | 160 delegate->PageCaptured(page_text); |
| 151 Mock::VerifyAndClearExpectations(classifier); | 161 Mock::VerifyAndClearExpectations(classifier); |
| 152 | 162 |
| 163 // No classification should happen on back/forward navigation. |
| 164 // Note: in practice, the browser will not send a StartPhishingDetection IPC |
| 165 // in this case. However, we want to make sure that the delegate behaves |
| 166 // correctly regardless. |
| 167 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 168 GoBack(); |
| 169 Mock::VerifyAndClearExpectations(classifier); |
| 170 page_text = ASCIIToUTF16("dummy"); |
| 171 OnStartPhishingDetection(delegate, GURL("http://host.com/#foo")); |
| 172 delegate->PageCaptured(page_text); |
| 173 |
| 153 // The delegate will cancel pending classification on destruction. | 174 // The delegate will cancel pending classification on destruction. |
| 154 EXPECT_CALL(*classifier, CancelPendingClassification()); | 175 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 155 } | 176 } |
| 156 | 177 |
| 157 TEST_F(PhishingClassifierDelegateTest, PendingClassification) { | 178 TEST_F(PhishingClassifierDelegateTest, NoScorer) { |
| 158 // For this test, we'll create the delegate with no scorer available yet. | 179 // For this test, we'll create the delegate with no scorer available yet. |
| 159 MockPhishingClassifier* classifier = | 180 MockPhishingClassifier* classifier = |
| 160 new StrictMock<MockPhishingClassifier>(view_); | 181 new StrictMock<MockPhishingClassifier>(view_); |
| 161 PhishingClassifierDelegate* delegate = | 182 PhishingClassifierDelegate* delegate = |
| 162 new PhishingClassifierDelegate(view_, classifier); | 183 new PhishingClassifierDelegate(view_, classifier); |
| 163 ASSERT_FALSE(classifier->is_ready()); | 184 ASSERT_FALSE(classifier->is_ready()); |
| 164 | 185 |
| 165 // Queue up a pending classification, cancel it, then queue up another one. | 186 // Queue up a pending classification, cancel it, then queue up another one. |
| 166 LoadURL("http://host.com/"); | 187 LoadURL("http://host.com/"); |
| 167 string16 page_text = ASCIIToUTF16("dummy"); | 188 string16 page_text = ASCIIToUTF16("dummy"); |
| 189 OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
| 168 delegate->PageCaptured(page_text); | 190 delegate->PageCaptured(page_text); |
| 169 | 191 |
| 170 LoadURL("http://host2.com/"); | 192 LoadURL("http://host2.com/"); |
| 171 page_text = ASCIIToUTF16("dummy2"); | 193 page_text = ASCIIToUTF16("dummy2"); |
| 194 OnStartPhishingDetection(delegate, GURL("http://host2.com/")); |
| 172 delegate->PageCaptured(page_text); | 195 delegate->PageCaptured(page_text); |
| 173 | 196 |
| 174 // Now set a scorer, which should cause a classifier to be created and | 197 // Now set a scorer, which should cause a classifier to be created and |
| 175 // the classification to proceed. Note that we need to reset |page_text| | 198 // the classification to proceed. Note that we need to reset |page_text| |
| 176 // since it is modified by the call to PageCaptured(). | 199 // since it is modified by the call to PageCaptured(). |
| 177 page_text = ASCIIToUTF16("dummy2"); | 200 page_text = ASCIIToUTF16("dummy2"); |
| 178 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). | 201 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). |
| 179 WillOnce(DeleteArg<1>()); | 202 WillOnce(DeleteArg<1>()); |
| 180 MockScorer scorer; | 203 MockScorer scorer; |
| 181 delegate->SetPhishingScorer(&scorer); | 204 delegate->SetPhishingScorer(&scorer); |
| 182 Mock::VerifyAndClearExpectations(classifier); | 205 Mock::VerifyAndClearExpectations(classifier); |
| 183 | 206 |
| 184 // The delegate will cancel pending classification on destruction. | 207 // The delegate will cancel pending classification on destruction. |
| 185 EXPECT_CALL(*classifier, CancelPendingClassification()); | 208 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 186 } | 209 } |
| 187 | 210 |
| 188 TEST_F(PhishingClassifierDelegateTest, PendingClassification_Ref) { | 211 TEST_F(PhishingClassifierDelegateTest, NoScorer_Ref) { |
| 189 // Similar to the last test, but navigates within the page before | 212 // Similar to the last test, but navigates within the page before |
| 190 // setting the scorer. | 213 // setting the scorer. |
| 191 MockPhishingClassifier* classifier = | 214 MockPhishingClassifier* classifier = |
| 192 new StrictMock<MockPhishingClassifier>(view_); | 215 new StrictMock<MockPhishingClassifier>(view_); |
| 193 PhishingClassifierDelegate* delegate = | 216 PhishingClassifierDelegate* delegate = |
| 194 new PhishingClassifierDelegate(view_, classifier); | 217 new PhishingClassifierDelegate(view_, classifier); |
| 195 ASSERT_FALSE(classifier->is_ready()); | 218 ASSERT_FALSE(classifier->is_ready()); |
| 196 | 219 |
| 197 // Queue up a pending classification, cancel it, then queue up another one. | 220 // Queue up a pending classification, cancel it, then queue up another one. |
| 198 LoadURL("http://host.com/"); | 221 LoadURL("http://host.com/"); |
| 199 string16 orig_page_text = ASCIIToUTF16("dummy"); | 222 string16 page_text = ASCIIToUTF16("dummy"); |
| 200 string16 page_text = orig_page_text; | 223 OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
| 201 delegate->PageCaptured(page_text); | 224 delegate->PageCaptured(page_text); |
| 202 | 225 |
| 203 LoadURL("http://host.com/#foo"); | 226 LoadURL("http://host.com/#foo"); |
| 204 page_text = orig_page_text; | 227 OnStartPhishingDetection(delegate, GURL("http://host.com/#foo")); |
| 205 delegate->PageCaptured(page_text); | 228 delegate->PageCaptured(page_text); |
| 206 | 229 |
| 207 // Now set a scorer, which should cause a classifier to be created and | 230 // Now set a scorer, which should cause a classifier to be created and |
| 208 // the classification to proceed. | 231 // the classification to proceed. |
| 209 EXPECT_CALL(*classifier, BeginClassification(Pointee(orig_page_text), _)). | 232 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). |
| 210 WillOnce(DeleteArg<1>()); | 233 WillOnce(DeleteArg<1>()); |
| 211 MockScorer scorer; | 234 MockScorer scorer; |
| 212 delegate->SetPhishingScorer(&scorer); | 235 delegate->SetPhishingScorer(&scorer); |
| 213 Mock::VerifyAndClearExpectations(classifier); | 236 Mock::VerifyAndClearExpectations(classifier); |
| 214 | 237 |
| 215 // The delegate will cancel pending classification on destruction. | 238 // The delegate will cancel pending classification on destruction. |
| 216 EXPECT_CALL(*classifier, CancelPendingClassification()); | 239 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 217 } | 240 } |
| 218 | 241 |
| 242 TEST_F(PhishingClassifierDelegateTest, NoStartPhishingDetection) { |
| 243 // Tests the behavior when OnStartPhishingDetection has not yet been called |
| 244 // when the page load finishes. |
| 245 MockPhishingClassifier* classifier = |
| 246 new StrictMock<MockPhishingClassifier>(view_); |
| 247 PhishingClassifierDelegate* delegate = |
| 248 new PhishingClassifierDelegate(view_, classifier); |
| 249 MockScorer scorer; |
| 250 delegate->SetPhishingScorer(&scorer); |
| 251 ASSERT_TRUE(classifier->is_ready()); |
| 252 |
| 253 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 254 responses_["http://host.com/"] = "<html><body>phish</body></html>"; |
| 255 LoadURL("http://host.com/"); |
| 256 Mock::VerifyAndClearExpectations(classifier); |
| 257 string16 page_text = ASCIIToUTF16("phish"); |
| 258 delegate->PageCaptured(page_text); |
| 259 // Now simulate the StartPhishingDetection IPC. We expect classification |
| 260 // to begin. |
| 261 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). |
| 262 WillOnce(DeleteArg<1>()); |
| 263 OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
| 264 Mock::VerifyAndClearExpectations(classifier); |
| 265 |
| 266 // Now try again, but this time we will navigate the page away before |
| 267 // the IPC is sent. |
| 268 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 269 responses_["http://host2.com/"] = "<html><body>phish</body></html>"; |
| 270 LoadURL("http://host2.com/"); |
| 271 delegate->PageCaptured(page_text); |
| 272 |
| 273 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 274 responses_["http://host3.com/"] = "<html><body>phish</body></html>"; |
| 275 LoadURL("http://host3.com/"); |
| 276 Mock::VerifyAndClearExpectations(classifier); |
| 277 OnStartPhishingDetection(delegate, GURL("http://host2.com/")); |
| 278 |
| 279 // The delegate will cancel pending classification on destruction. |
| 280 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 281 } |
| 282 |
| 219 TEST_F(PhishingClassifierDelegateTest, DetectedPhishingSite) { | 283 TEST_F(PhishingClassifierDelegateTest, DetectedPhishingSite) { |
| 220 // Tests that a DetectedPhishingSite IPC is sent to the browser | 284 // Tests that a DetectedPhishingSite IPC is sent to the browser |
| 221 // if a site comes back as phishy. | 285 // if a site comes back as phishy. |
| 222 MockPhishingClassifier* classifier = | 286 MockPhishingClassifier* classifier = |
| 223 new StrictMock<MockPhishingClassifier>(view_); | 287 new StrictMock<MockPhishingClassifier>(view_); |
| 224 PhishingClassifierDelegate* delegate = | 288 PhishingClassifierDelegate* delegate = |
| 225 new PhishingClassifierDelegate(view_, classifier); | 289 new PhishingClassifierDelegate(view_, classifier); |
| 226 MockScorer scorer; | 290 MockScorer scorer; |
| 227 delegate->SetPhishingScorer(&scorer); | 291 delegate->SetPhishingScorer(&scorer); |
| 228 ASSERT_TRUE(classifier->is_ready()); | 292 ASSERT_TRUE(classifier->is_ready()); |
| 229 | 293 |
| 230 // Start by loading a page to populate the delegate's state. | 294 // Start by loading a page to populate the delegate's state. |
| 231 responses_["http://host.com/"] = "<html><body>phish</body></html>"; | 295 responses_["http://host.com/"] = "<html><body>phish</body></html>"; |
| 232 EXPECT_CALL(*classifier, CancelPendingClassification()); | 296 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 233 LoadURL("http://host.com/"); | 297 LoadURL("http://host.com/"); |
| 234 Mock::VerifyAndClearExpectations(classifier); | 298 Mock::VerifyAndClearExpectations(classifier); |
| 235 string16 page_text = ASCIIToUTF16("phish"); | 299 string16 page_text = ASCIIToUTF16("phish"); |
| 236 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). | 300 EXPECT_CALL(*classifier, BeginClassification(Pointee(page_text), _)). |
| 237 WillOnce(DeleteArg<1>()); | 301 WillOnce(DeleteArg<1>()); |
| 302 OnStartPhishingDetection(delegate, GURL("http://host.com/")); |
| 238 delegate->PageCaptured(page_text); | 303 delegate->PageCaptured(page_text); |
| 239 Mock::VerifyAndClearExpectations(classifier); | 304 Mock::VerifyAndClearExpectations(classifier); |
| 240 | 305 |
| 241 // Now run the callback to simulate the classifier finishing. | 306 // Now run the callback to simulate the classifier finishing. |
| 242 RunClassificationDone(delegate, true, 0.8); | 307 RunClassificationDone(delegate, true, 0.8); |
| 243 EXPECT_TRUE(detected_phishing_site_); | 308 EXPECT_TRUE(detected_phishing_site_); |
| 244 EXPECT_EQ(GURL("http://host.com/"), detected_url_); | 309 EXPECT_EQ(GURL("http://host.com/"), detected_url_); |
| 245 EXPECT_EQ(0.8, detected_score_); | 310 EXPECT_EQ(0.8, detected_score_); |
| 246 | 311 |
| 247 // The delegate will cancel pending classification on destruction. | 312 // The delegate will cancel pending classification on destruction. |
| 248 EXPECT_CALL(*classifier, CancelPendingClassification()); | 313 EXPECT_CALL(*classifier, CancelPendingClassification()); |
| 249 } | 314 } |
| 250 | 315 |
| 251 } // namespace safe_browsing | 316 } // namespace safe_browsing |
| OLD | NEW |