Index: chrome/browser/safe_browsing/download_protection_service_unittest.cc |
diff --git a/chrome/browser/safe_browsing/download_protection_service_unittest.cc b/chrome/browser/safe_browsing/download_protection_service_unittest.cc |
index cd27712f50375a0af74f718dea7ce5121f8fb9a9..fb2172616508b94c58d08efe951412a78f114118 100644 |
--- a/chrome/browser/safe_browsing/download_protection_service_unittest.cc |
+++ b/chrome/browser/safe_browsing/download_protection_service_unittest.cc |
@@ -532,7 +532,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadWhitelistedUrl) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -549,7 +549,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadWhitelistedUrl) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -566,7 +566,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadWhitelistedUrl) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -678,12 +678,13 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
#else |
- // On !(OS_WIN || OS_MACOSX), no file types are currently supported. Hence all |
+ // On !(OS_WIN || OS_MACOSX) || defined(OS_CHROMEOS), |
+ // no file types are currently supported. Hence all |
// requests to CheckClientDownload() result in a verdict of UNKNOWN. |
EXPECT_TRUE(IsResult(DownloadProtectionService::UNKNOWN)); |
EXPECT_FALSE(HasClientDownloadRequest()); |
@@ -702,7 +703,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
EXPECT_TRUE(IsResult(DownloadProtectionService::UNKNOWN)); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
#else |
@@ -728,7 +729,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) { |
EXPECT_FALSE(DownloadFeedbackService::GetPingsForDownloadForTesting( |
item, &feedback_ping, &feedback_response)); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -749,7 +750,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) { |
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::UNCOMMON)); |
EXPECT_TRUE(DownloadFeedbackService::GetPingsForDownloadForTesting( |
item, &feedback_ping, &feedback_response)); |
@@ -776,7 +777,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) { |
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS_HOST)); |
EXPECT_TRUE(DownloadFeedbackService::GetPingsForDownloadForTesting( |
item, &feedback_ping, &feedback_response)); |
@@ -801,7 +802,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadSuccess) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::POTENTIALLY_UNWANTED)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -856,7 +857,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadHTTPS) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -910,7 +911,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadBlob) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -968,7 +969,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadData) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
ASSERT_TRUE(HasClientDownloadRequest()); |
const ClientDownloadRequest& request = *GetClientDownloadRequest(); |
@@ -1070,7 +1071,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::SAFE)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
const ClientDownloadRequest& request = *GetClientDownloadRequest(); |
@@ -1087,7 +1088,8 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) { |
archived_binary->length()); |
ClearClientDownloadRequest(); |
#else |
- // For !(OS_WIN || OS_MACOSX), no file types are currently supported. Hence |
+ // For !(OS_WIN || OS_MACOSX) || defined(OS_CHROMEOS), |
+ // no file types are currently supported. Hence |
// the resulting verdict is UNKNOWN. |
EXPECT_TRUE(IsResult(DownloadProtectionService::UNKNOWN)); |
EXPECT_FALSE(HasClientDownloadRequest()); |
@@ -1108,7 +1110,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(IsResult(DownloadProtectionService::DANGEROUS)); |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
@@ -1131,7 +1133,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
ASSERT_TRUE(HasClientDownloadRequest()); |
EXPECT_EQ(1, GetClientDownloadRequest()->archived_binary_size()); |
EXPECT_TRUE(GetClientDownloadRequest()->has_download_type()); |
@@ -1139,7 +1141,8 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) { |
GetClientDownloadRequest()->download_type()); |
ClearClientDownloadRequest(); |
#else |
- // For !(OS_WIN || OS_MACOSX), no file types are currently supported. Hence |
+ // For !(OS_WIN || OS_MACOSX) || defined(OS_CHROMEOS), |
+ // no file types are currently supported. Hence |
// the resulting verdict is UNKNOWN. |
EXPECT_TRUE(IsResult(DownloadProtectionService::UNKNOWN)); |
EXPECT_FALSE(HasClientDownloadRequest()); |
@@ -1156,7 +1159,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) { |
base::Unretained(this))); |
MessageLoop::current()->Run(); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
ASSERT_TRUE(HasClientDownloadRequest()); |
EXPECT_EQ(0, GetClientDownloadRequest()->archived_binary_size()); |
EXPECT_TRUE(GetClientDownloadRequest()->has_download_type()); |
@@ -1164,7 +1167,8 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadZip) { |
GetClientDownloadRequest()->download_type()); |
ClearClientDownloadRequest(); |
#else |
- // For !(OS_WIN || OS_MACOSX), no file types are currently supported. Hence |
+ // For !(OS_WIN || OS_MACOSX) || defined(OS_CHROMEOS), |
+ // no file types are currently supported. Hence |
// the resulting verdict is UNKNOWN. |
EXPECT_TRUE(IsResult(DownloadProtectionService::UNKNOWN)); |
EXPECT_FALSE(HasClientDownloadRequest()); |
@@ -1303,7 +1307,7 @@ TEST_F(DownloadProtectionServiceTest, CheckClientDownloadValidateRequest) { |
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
base::Unretained(this))); |
-#if !defined(OS_WIN) && !defined(OS_MACOSX) |
+#if !defined(OS_WIN) && !defined(OS_MACOSX) && !defined(OS_CHROMEOS) |
// SendRequest is not called. Wait for FinishRequest to call our callback. |
MessageLoop::current()->Run(); |
net::TestURLFetcher* fetcher = factory.GetFetcherByID(0); |
@@ -1393,7 +1397,7 @@ TEST_F(DownloadProtectionServiceTest, |
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
base::Unretained(this))); |
-#if !defined(OS_WIN) && !defined(OS_MACOSX) |
+#if !defined(OS_WIN) && !defined(OS_MACOSX) && !defined(OS_CHROMEOS) |
// SendRequest is not called. Wait for FinishRequest to call our callback. |
MessageLoop::current()->Run(); |
net::TestURLFetcher* fetcher = factory.GetFetcherByID(0); |
@@ -1486,7 +1490,7 @@ TEST_F(DownloadProtectionServiceTest, |
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
base::Unretained(this))); |
-#if !defined(OS_WIN) && !defined(OS_MACOSX) |
+#if !defined(OS_WIN) && !defined(OS_MACOSX) && !defined(OS_CHROMEOS) |
// SendRequest is not called. Wait for FinishRequest to call our callback. |
MessageLoop::current()->Run(); |
net::TestURLFetcher* fetcher = factory.GetFetcherByID(0); |
@@ -1565,7 +1569,7 @@ TEST_F(DownloadProtectionServiceTest, |
&item, |
base::Bind(&DownloadProtectionServiceTest::CheckDoneCallback, |
base::Unretained(this))); |
-#if !defined(OS_WIN) && !defined(OS_MACOSX) |
+#if !defined(OS_WIN) && !defined(OS_MACOSX) && !defined(OS_CHROMEOS) |
// SendRequest is not called. Wait for FinishRequest to call our callback. |
MessageLoop::current()->Run(); |
net::TestURLFetcher* fetcher = factory.GetFetcherByID(0); |
@@ -1731,7 +1735,7 @@ TEST_F(DownloadProtectionServiceTest, TestDownloadRequestTimeout) { |
// anything yet. |
MessageLoop::current()->Run(); |
EXPECT_TRUE(IsResult(DownloadProtectionService::UNKNOWN)); |
-#if defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_CHROMEOS) |
EXPECT_TRUE(HasClientDownloadRequest()); |
ClearClientDownloadRequest(); |
#else |