Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6770)

Unified Diff: chrome/browser/safe_browsing/download_protection_service_unittest.cc

Issue 11615011: Small modifications to safebrowsing code to make it simpler to add the extension (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: fix compiler Created 7 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/safe_browsing/download_protection_service_unittest.cc
diff --git a/chrome/browser/safe_browsing/download_protection_service_unittest.cc b/chrome/browser/safe_browsing/download_protection_service_unittest.cc
index 6b4a41cc40dfd400ee41ef183ce2dd10ec288b28..24a8d813f17c26188f717170605d37658d168b2b 100644
--- a/chrome/browser/safe_browsing/download_protection_service_unittest.cc
+++ b/chrome/browser/safe_browsing/download_protection_service_unittest.cc
@@ -128,10 +128,13 @@ void OnSafeBrowsingResult(
ACTION_P(CheckDownloadUrlDone, threat_type) {
SafeBrowsingDatabaseManager::SafeBrowsingCheck* check =
- new SafeBrowsingDatabaseManager::SafeBrowsingCheck();
+ new SafeBrowsingDatabaseManager::SafeBrowsingCheck(
+ safe_browsing_util::BINURL);
check->urls = arg0;
- check->is_download = true;
- check->threat_type = threat_type;
+ for (std::vector<GURL>::iterator it = check->urls.begin();
+ it != check->urls.end(); ++it) {
+ check->url_threats[*it] = threat_type;
+ }
check->client = arg1;
BrowserThread::PostTask(BrowserThread::IO,
FROM_HERE,
@@ -281,9 +284,17 @@ class DownloadProtectionServiceTest : public testing::Test {
fetcher->delegate()->OnURLFetchComplete(fetcher);
}
- void ExpectResult(DownloadProtectionService::DownloadCheckResult expected) {
- ASSERT_TRUE(result_.get());
- EXPECT_EQ(expected, *result_);
+ testing::AssertionResult IsResult(
+ DownloadProtectionService::DownloadCheckResult expected) {
+ scoped_ptr<DownloadProtectionService::DownloadCheckResult> saved_result =
+ result_.Pass();
Scott Hess - ex-Googler 2013/01/11 23:44:05 I think this is like 57% too elaborate, given that
not at google - send to devlin 2013/01/14 23:00:55 I'll make it use a bool flag.
+ if (!saved_result)
+ return testing::AssertionFailure() << "No result";
+ if (expected != *saved_result) {
+ return testing::AssertionFailure() <<
+ "Expected " << expected << ", got " << *saved_result;
+ }
+ return testing::AssertionSuccess();
}
protected:
@@ -304,7 +315,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadInvalidUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
info.local_file = FilePath(FILE_PATH_LITERAL("a.tmp"));
info.target_file = FilePath(FILE_PATH_LITERAL("a.exe"));
@@ -314,7 +325,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadInvalidUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
}
TEST_F(DownloadProtectionServiceTest, CheckClientDownloadWhitelistedUrl) {
@@ -338,7 +349,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadWhitelistedUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
// Check that the referrer is matched against the whitelist.
info.download_url_chain.pop_back();
@@ -348,7 +359,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadWhitelistedUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
}
TEST_F(DownloadProtectionServiceTest, CheckClientDownloadFetchFailed) {
@@ -373,7 +384,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadFetchFailed) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
}
TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) {
@@ -402,7 +413,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
// Invalid response should be safe too.
response.Clear();
@@ -416,7 +427,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
// If the response is dangerous the result should also be marked as dangerous.
response.set_verdict(ClientDownloadResponse::DANGEROUS);
@@ -431,9 +442,9 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) {
base::Unretained(this)));
msg_loop_.Run();
#if defined(OS_WIN)
- ExpectResult(DownloadProtectionService::DANGEROUS);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS));
#else
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
#endif
// If the response is uncommon the result should also be marked as uncommon.
@@ -449,9 +460,9 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) {
base::Unretained(this)));
msg_loop_.Run();
#if defined(OS_WIN)
- ExpectResult(DownloadProtectionService::UNCOMMON);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::UNCOMMON));
#else
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
#endif
}
@@ -481,9 +492,9 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadHTTPS) {
base::Unretained(this)));
msg_loop_.Run();
#if defined(OS_WIN)
- ExpectResult(DownloadProtectionService::DANGEROUS);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS));
#else
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
#endif
}
@@ -521,7 +532,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
Mock::VerifyAndClearExpectations(sb_service_);
Mock::VerifyAndClearExpectations(signature_util_);
@@ -540,7 +551,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
Mock::VerifyAndClearExpectations(signature_util_);
// If the response is dangerous the result should also be marked as
@@ -557,9 +568,9 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) {
base::Unretained(this)));
msg_loop_.Run();
#if defined(OS_WIN)
- ExpectResult(DownloadProtectionService::DANGEROUS);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS));
#else
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
#endif
Mock::VerifyAndClearExpectations(signature_util_);
}
@@ -584,7 +595,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadCorruptZip) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
Mock::VerifyAndClearExpectations(sb_service_);
Mock::VerifyAndClearExpectations(signature_util_);
}
@@ -619,7 +630,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientCrxDownloadSuccess) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
}
TEST_F(DownloadProtectionServiceTest, CheckClientDownloadValidateRequest) {
@@ -765,7 +776,7 @@ TEST_F(DownloadProtectionServiceTest, TestCheckDownloadUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
Mock::VerifyAndClearExpectations(sb_service_);
EXPECT_CALL(*sb_service_->mock_database_manager(),
@@ -778,7 +789,7 @@ TEST_F(DownloadProtectionServiceTest, TestCheckDownloadUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
Mock::VerifyAndClearExpectations(sb_service_);
EXPECT_CALL(*sb_service_->mock_database_manager(),
@@ -792,7 +803,7 @@ TEST_F(DownloadProtectionServiceTest, TestCheckDownloadUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
Mock::VerifyAndClearExpectations(sb_service_);
EXPECT_CALL(*sb_service_->mock_database_manager(),
@@ -806,7 +817,7 @@ TEST_F(DownloadProtectionServiceTest, TestCheckDownloadUrl) {
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback,
base::Unretained(this)));
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::DANGEROUS);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS));
}
TEST_F(DownloadProtectionServiceTest, TestDownloadRequestTimeout) {
@@ -832,7 +843,7 @@ TEST_F(DownloadProtectionServiceTest, TestDownloadRequestTimeout) {
// The request should time out because the HTTP request hasn't returned
// anything yet.
msg_loop_.Run();
- ExpectResult(DownloadProtectionService::SAFE);
+ EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE));
}
TEST_F(DownloadProtectionServiceTest, GetCertificateWhitelistStrings) {

Powered by Google App Engine
This is Rietveld 408576698