Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(161)

Unified Diff: chrome/browser/safe_browsing/client_side_detection_host_unittest.cc

Issue 7189074: Send the referral URL with the client-side phishing detection request. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Address Brian's comments. Created 9 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/browser/safe_browsing/client_side_detection_host.cc ('k') | chrome/common/safe_browsing/csd.proto » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/safe_browsing/client_side_detection_host_unittest.cc
diff --git a/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc b/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc
index a1c26049c02dd53e9ae4019260c7839ec22b49c1..2c68efd99d3b29180c760712dc32fa075bd51246 100644
--- a/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc
+++ b/chrome/browser/safe_browsing/client_side_detection_host_unittest.cc
@@ -45,8 +45,15 @@ const bool kTrue = true;
namespace safe_browsing {
namespace {
-MATCHER_P(EqualsProto, other, "") {
- return other.SerializeAsString() == arg.SerializeAsString();
+// This matcher verifies that the client computed verdict
+// (ClientPhishingRequest) which is passed to SendClientReportPhishingRequest
+// has the expected fields set. Note: we can't simply compare the protocol
+// buffer strings because the BrowserFeatureExtractor might add features to the
+// verdict object before calling SendClientReportPhishingRequest.
+MATCHER_P(PartiallyEqualVerdict, other, "") {
+ return (other.url() == arg.url() &&
+ other.client_score() == arg.client_score() &&
+ other.is_phishing() == arg.is_phishing());
}
ACTION(QuitUIMessageLoop) {
@@ -107,7 +114,8 @@ class MockBrowserFeatureExtractor : public BrowserFeatureExtractor {
: BrowserFeatureExtractor(tab) {}
virtual ~MockBrowserFeatureExtractor() {}
- MOCK_METHOD2(ExtractFeatures, void(ClientPhishingRequest*,
+ MOCK_METHOD3(ExtractFeatures, void(const BrowseInfo& info,
+ ClientPhishingRequest*,
BrowserFeatureExtractor::DoneCallback*));
};
@@ -151,6 +159,9 @@ class ClientSideDetectionHostTest : public TabContentsWrapperTestHarness {
}
void OnDetectedPhishingSite(const std::string& verdict_str) {
+ // Make sure we have a valid BrowseInfo object set before we call this
+ // method.
+ csd_host_->browse_info_.reset(new BrowseInfo);
csd_host_->OnDetectedPhishingSite(verdict_str);
}
@@ -228,7 +239,7 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteInvalidVerdict) {
MockBrowserFeatureExtractor* mock_extractor = new MockBrowserFeatureExtractor(
contents());
SetFeatureExtractor(mock_extractor); // The host class takes ownership.
- EXPECT_CALL(*mock_extractor, ExtractFeatures(_, _)).Times(0);
+ EXPECT_CALL(*mock_extractor, ExtractFeatures(_, _, _)).Times(0);
OnDetectedPhishingSite("Invalid Protocol Buffer");
EXPECT_TRUE(Mock::VerifyAndClear(mock_extractor));
}
@@ -243,7 +254,8 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteNotPhishing) {
verdict.set_is_phishing(true);
EXPECT_CALL(*csd_service_,
- SendClientReportPhishingRequest(Pointee(EqualsProto(verdict)), _))
+ SendClientReportPhishingRequest(
+ Pointee(PartiallyEqualVerdict(verdict)), _))
.WillOnce(DoAll(DeleteArg<0>(), SaveArg<1>(&cb), QuitUIMessageLoop()));
OnDetectedPhishingSite(verdict.SerializeAsString());
MessageLoop::current()->Run();
@@ -268,7 +280,8 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteDisabled) {
verdict.set_is_phishing(true);
EXPECT_CALL(*csd_service_,
- SendClientReportPhishingRequest(Pointee(EqualsProto(verdict)), _))
+ SendClientReportPhishingRequest(
+ Pointee(PartiallyEqualVerdict(verdict)), _))
.WillOnce(DoAll(DeleteArg<0>(), SaveArg<1>(&cb), QuitUIMessageLoop()));
OnDetectedPhishingSite(verdict.SerializeAsString());
MessageLoop::current()->Run();
@@ -294,7 +307,8 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteShowInterstitial) {
verdict.set_is_phishing(true);
EXPECT_CALL(*csd_service_,
- SendClientReportPhishingRequest(Pointee(EqualsProto(verdict)), _))
+ SendClientReportPhishingRequest(
+ Pointee(PartiallyEqualVerdict(verdict)), _))
.WillOnce(DoAll(DeleteArg<0>(), SaveArg<1>(&cb), QuitUIMessageLoop()));
OnDetectedPhishingSite(verdict.SerializeAsString());
MessageLoop::current()->Run();
@@ -347,7 +361,8 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteMultiplePings) {
verdict.set_is_phishing(true);
EXPECT_CALL(*csd_service_,
- SendClientReportPhishingRequest(Pointee(EqualsProto(verdict)), _))
+ SendClientReportPhishingRequest(
+ Pointee(PartiallyEqualVerdict(verdict)), _))
.WillOnce(DoAll(DeleteArg<0>(), SaveArg<1>(&cb), QuitUIMessageLoop()));
OnDetectedPhishingSite(verdict.SerializeAsString());
MessageLoop::current()->Run();
@@ -365,7 +380,8 @@ TEST_F(ClientSideDetectionHostTest, OnDetectedPhishingSiteMultiplePings) {
verdict.set_url(other_phishing_url.spec());
verdict.set_client_score(0.8f);
EXPECT_CALL(*csd_service_,
- SendClientReportPhishingRequest(Pointee(EqualsProto(verdict)), _))
+ SendClientReportPhishingRequest(
+ Pointee(PartiallyEqualVerdict(verdict)), _))
.WillOnce(DoAll(DeleteArg<0>(),
SaveArg<1>(&cb_other),
QuitUIMessageLoop()));
« no previous file with comments | « chrome/browser/safe_browsing/client_side_detection_host.cc ('k') | chrome/common/safe_browsing/csd.proto » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698