OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // This test creates a fake safebrowsing service, where we can inject | 5 // This test creates a fake safebrowsing service, where we can inject |
6 // malware and phishing urls. It then uses a real browser to go to | 6 // malware and phishing urls. It then uses a real browser to go to |
7 // these urls, and sends "goback" or "proceed" commands and verifies | 7 // these urls, and sends "goback" or "proceed" commands and verifies |
8 // they work. | 8 // they work. |
9 | 9 |
10 #include "base/bind.h" | 10 #include "base/bind.h" |
11 #include "chrome/browser/browser_process.h" | 11 #include "chrome/browser/browser_process.h" |
12 #include "chrome/browser/prefs/pref_service.h" | 12 #include "chrome/browser/prefs/pref_service.h" |
13 #include "chrome/browser/profiles/profile.h" | 13 #include "chrome/browser/profiles/profile.h" |
14 #include "chrome/browser/safe_browsing/malware_details.h" | 14 #include "chrome/browser/safe_browsing/malware_details.h" |
15 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" | 15 #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h" |
16 #include "chrome/browser/safe_browsing/safe_browsing_service.h" | 16 #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
17 #include "chrome/browser/ui/browser.h" | 17 #include "chrome/browser/ui/browser.h" |
18 #include "chrome/browser/ui/tab_contents/tab_contents_wrapper.h" | 18 #include "chrome/browser/ui/tab_contents/tab_contents_wrapper.h" |
19 #include "chrome/common/pref_names.h" | 19 #include "chrome/common/pref_names.h" |
20 #include "chrome/common/url_constants.h" | 20 #include "chrome/common/url_constants.h" |
21 #include "chrome/test/base/in_process_browser_test.h" | 21 #include "chrome/test/base/in_process_browser_test.h" |
22 #include "chrome/test/base/ui_test_utils.h" | 22 #include "chrome/test/base/ui_test_utils.h" |
23 #include "content/browser/renderer_host/resource_dispatcher_host.h" | 23 #include "content/browser/renderer_host/resource_dispatcher_host.h" |
24 #include "content/browser/tab_contents/tab_contents.h" | 24 #include "content/browser/tab_contents/tab_contents.h" |
25 #include "content/browser/tab_contents/tab_contents_view.h" | 25 #include "content/browser/tab_contents/tab_contents_view.h" |
26 #include "content/test/test_browser_thread.h" | 26 #include "content/test/test_browser_thread.h" |
27 | 27 |
28 using content::BrowserThread; | 28 using content::BrowserThread; |
| 29 using content::WebContents; |
29 | 30 |
30 // A SafeBrowingService class that allows us to inject the malicious URLs. | 31 // A SafeBrowingService class that allows us to inject the malicious URLs. |
31 class FakeSafeBrowsingService : public SafeBrowsingService { | 32 class FakeSafeBrowsingService : public SafeBrowsingService { |
32 public: | 33 public: |
33 FakeSafeBrowsingService() {} | 34 FakeSafeBrowsingService() {} |
34 | 35 |
35 virtual ~FakeSafeBrowsingService() {} | 36 virtual ~FakeSafeBrowsingService() {} |
36 | 37 |
37 // Called on the IO thread to check if the given url is safe or not. If we | 38 // Called on the IO thread to check if the given url is safe or not. If we |
38 // can synchronously determine that the url is safe, CheckUrl returns true. | 39 // can synchronously determine that the url is safe, CheckUrl returns true. |
(...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
95 | 96 |
96 virtual SafeBrowsingService* CreateSafeBrowsingService() { | 97 virtual SafeBrowsingService* CreateSafeBrowsingService() { |
97 return new FakeSafeBrowsingService(); | 98 return new FakeSafeBrowsingService(); |
98 } | 99 } |
99 }; | 100 }; |
100 | 101 |
101 // A MalwareDetails class lets us intercept calls from the renderer. | 102 // A MalwareDetails class lets us intercept calls from the renderer. |
102 class FakeMalwareDetails : public MalwareDetails { | 103 class FakeMalwareDetails : public MalwareDetails { |
103 public: | 104 public: |
104 FakeMalwareDetails(SafeBrowsingService* sb_service, | 105 FakeMalwareDetails(SafeBrowsingService* sb_service, |
105 TabContents* tab_contents, | 106 WebContents* web_contents, |
106 const SafeBrowsingService::UnsafeResource& unsafe_resource) | 107 const SafeBrowsingService::UnsafeResource& unsafe_resource) |
107 : MalwareDetails(sb_service, tab_contents, unsafe_resource) { } | 108 : MalwareDetails(sb_service, web_contents, unsafe_resource) { } |
108 | 109 |
109 virtual ~FakeMalwareDetails() {} | 110 virtual ~FakeMalwareDetails() {} |
110 | 111 |
111 virtual void AddDOMDetails( | 112 virtual void AddDOMDetails( |
112 const std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node>& params) { | 113 const std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node>& params) { |
113 EXPECT_TRUE(BrowserThread::CurrentlyOn(BrowserThread::IO)); | 114 EXPECT_TRUE(BrowserThread::CurrentlyOn(BrowserThread::IO)); |
114 MalwareDetails::AddDOMDetails(params); | 115 MalwareDetails::AddDOMDetails(params); |
115 | 116 |
116 // Notify the UI thread that we got the dom details. | 117 // Notify the UI thread that we got the dom details. |
117 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, | 118 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
154 | 155 |
155 }; | 156 }; |
156 | 157 |
157 class TestMalwareDetailsFactory : public MalwareDetailsFactory { | 158 class TestMalwareDetailsFactory : public MalwareDetailsFactory { |
158 public: | 159 public: |
159 TestMalwareDetailsFactory() { } | 160 TestMalwareDetailsFactory() { } |
160 virtual ~TestMalwareDetailsFactory() { } | 161 virtual ~TestMalwareDetailsFactory() { } |
161 | 162 |
162 virtual MalwareDetails* CreateMalwareDetails( | 163 virtual MalwareDetails* CreateMalwareDetails( |
163 SafeBrowsingService* sb_service, | 164 SafeBrowsingService* sb_service, |
164 TabContents* tab_contents, | 165 WebContents* web_contents, |
165 const SafeBrowsingService::UnsafeResource& unsafe_resource) { | 166 const SafeBrowsingService::UnsafeResource& unsafe_resource) { |
166 details_ = new FakeMalwareDetails(sb_service, tab_contents, | 167 details_ = new FakeMalwareDetails(sb_service, web_contents, |
167 unsafe_resource); | 168 unsafe_resource); |
168 return details_; | 169 return details_; |
169 } | 170 } |
170 | 171 |
171 FakeMalwareDetails* get_details() { | 172 FakeMalwareDetails* get_details() { |
172 return details_; | 173 return details_; |
173 } | 174 } |
174 | 175 |
175 private: | 176 private: |
176 FakeMalwareDetails* details_; | 177 FakeMalwareDetails* details_; |
(...skipping 382 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
559 prefs::kSafeBrowsingReportingEnabled)); | 560 prefs::kSafeBrowsingReportingEnabled)); |
560 | 561 |
561 SendCommand("\"proceed\""); // Simulate the user clicking "back" | 562 SendCommand("\"proceed\""); // Simulate the user clicking "back" |
562 AssertNoInterstitial(true); // Assert the interstitial is gone | 563 AssertNoInterstitial(true); // Assert the interstitial is gone |
563 | 564 |
564 EXPECT_EQ(url, browser()->GetSelectedTabContents()->GetURL()); | 565 EXPECT_EQ(url, browser()->GetSelectedTabContents()->GetURL()); |
565 AssertReportSent(); | 566 AssertReportSent(); |
566 } | 567 } |
567 | 568 |
568 } // namespace | 569 } // namespace |
OLD | NEW |