| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "base/strings/stringprintf.h" | |
| 6 #include "chrome/common/safe_browsing/safebrowsing_messages.h" | |
| 7 #include "chrome/renderer/safe_browsing/malware_dom_details.h" | |
| 8 #include "chrome/test/base/chrome_render_view_test.h" | |
| 9 #include "net/base/escape.h" | |
| 10 | |
| 11 typedef ChromeRenderViewTest MalwareDOMDetailsTest; | |
| 12 | |
| 13 | |
| 14 TEST_F(MalwareDOMDetailsTest, Everything) { | |
| 15 scoped_ptr<safe_browsing::MalwareDOMDetails> details( | |
| 16 safe_browsing::MalwareDOMDetails::Create(view_)); | |
| 17 // Lower kMaxNodes for the test. Loading 500 subframes in a | |
| 18 // debug build takes a while. | |
| 19 details->kMaxNodes = 50; | |
| 20 | |
| 21 const char urlprefix[] = "data:text/html;charset=utf-8,"; | |
| 22 | |
| 23 { // An page with an internal script | |
| 24 std::string html = "<html><head><script></script></head></html>"; | |
| 25 LoadHTML(html.c_str()); | |
| 26 std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; | |
| 27 details->ExtractResources(¶ms); | |
| 28 ASSERT_EQ(1u, params.size()); | |
| 29 EXPECT_EQ(GURL(urlprefix + html), params[0].url); | |
| 30 } | |
| 31 | |
| 32 { // A page with 2 external scripts. | |
| 33 // Note: This part of the test causes 2 leaks: LEAK: 5 WebCoreNode | |
| 34 // LEAK: 2 CachedResource. | |
| 35 GURL script1_url("data:text/javascript;charset=utf-8,var a=1;"); | |
| 36 GURL script2_url("data:text/javascript;charset=utf-8,var b=2;"); | |
| 37 std::string html = "<html><head><script src=\"" + script1_url.spec() + | |
| 38 "\"></script><script src=\"" + script2_url.spec() + | |
| 39 "\"></script></head></html>"; | |
| 40 GURL url(urlprefix + html); | |
| 41 | |
| 42 LoadHTML(html.c_str()); | |
| 43 std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; | |
| 44 details->ExtractResources(¶ms); | |
| 45 ASSERT_EQ(3u, params.size()); | |
| 46 EXPECT_EQ(script1_url, params[0].url); | |
| 47 EXPECT_EQ("SCRIPT", params[0].tag_name); | |
| 48 EXPECT_EQ(script2_url, params[1].url); | |
| 49 EXPECT_EQ("SCRIPT", params[0].tag_name); | |
| 50 EXPECT_EQ(url, params[2].url); | |
| 51 } | |
| 52 | |
| 53 { // A page with an iframe which in turn contains an iframe. | |
| 54 // html | |
| 55 // \ iframe1 | |
| 56 // \ iframe2 | |
| 57 std::string iframe2_html = "<html><body>iframe2</body></html>"; | |
| 58 GURL iframe2_url(urlprefix + iframe2_html); | |
| 59 std::string iframe1_html = "<iframe src=\"" + net::EscapeForHTML( | |
| 60 iframe2_url.spec()) + "\"></iframe>"; | |
| 61 GURL iframe1_url(urlprefix + iframe1_html); | |
| 62 std::string html = "<html><head><iframe src=\"" + net::EscapeForHTML( | |
| 63 iframe1_url.spec()) + "\"></iframe></head></html>"; | |
| 64 GURL url(urlprefix + html); | |
| 65 | |
| 66 LoadHTML(html.c_str()); | |
| 67 std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; | |
| 68 details->ExtractResources(¶ms); | |
| 69 ASSERT_EQ(5u, params.size()); | |
| 70 | |
| 71 EXPECT_EQ(iframe1_url, params[0].url); | |
| 72 EXPECT_EQ(url, params[0].parent); | |
| 73 EXPECT_EQ(0u, params[0].children.size()); | |
| 74 EXPECT_EQ("IFRAME", params[0].tag_name); | |
| 75 | |
| 76 EXPECT_EQ(url, params[1].url); | |
| 77 EXPECT_EQ(GURL(), params[1].parent); | |
| 78 EXPECT_EQ(1u, params[1].children.size()); | |
| 79 EXPECT_EQ(iframe1_url, params[1].children[0]); | |
| 80 | |
| 81 EXPECT_EQ(iframe2_url, params[2].url); | |
| 82 EXPECT_EQ(iframe1_url, params[2].parent); | |
| 83 EXPECT_EQ(0u, params[2].children.size()); | |
| 84 EXPECT_EQ("IFRAME", params[2].tag_name); | |
| 85 | |
| 86 // The frames are added twice, once with the correct parent and tagname | |
| 87 // and once with the correct children. The caller in the browser | |
| 88 // is responsible for merging. | |
| 89 EXPECT_EQ(iframe1_url, params[3].url); | |
| 90 EXPECT_EQ(GURL(), params[3].parent); | |
| 91 EXPECT_EQ(1u, params[3].children.size()); | |
| 92 EXPECT_EQ(iframe2_url, params[3].children[0]); | |
| 93 | |
| 94 EXPECT_EQ(iframe2_url, params[4].url); | |
| 95 EXPECT_EQ(GURL(), params[4].parent); | |
| 96 EXPECT_EQ(0u, params[4].children.size()); | |
| 97 } | |
| 98 | |
| 99 { // >50 subframes, to verify kMaxNodes. | |
| 100 std::string html; | |
| 101 for (int i = 0; i < 55; ++i) { | |
| 102 // The iframe contents is just a number. | |
| 103 GURL iframe_url(base::StringPrintf("%s%d", urlprefix, i)); | |
| 104 html += "<iframe src=\"" + net::EscapeForHTML(iframe_url.spec()) + | |
| 105 "\"></iframe>"; | |
| 106 } | |
| 107 GURL url(urlprefix + html); | |
| 108 | |
| 109 LoadHTML(html.c_str()); | |
| 110 std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; | |
| 111 details->ExtractResources(¶ms); | |
| 112 ASSERT_EQ(51u, params.size()); | |
| 113 } | |
| 114 | |
| 115 { // A page with >50 scripts, to verify kMaxNodes. | |
| 116 std::string html; | |
| 117 for (int i = 0; i < 55; ++i) { | |
| 118 // The iframe contents is just a number. | |
| 119 GURL script_url(base::StringPrintf("%s%d", urlprefix, i)); | |
| 120 html += "<script src=\"" + net::EscapeForHTML(script_url.spec()) + | |
| 121 "\"></script>"; | |
| 122 } | |
| 123 GURL url(urlprefix + html); | |
| 124 | |
| 125 LoadHTML(html.c_str()); | |
| 126 std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; | |
| 127 details->ExtractResources(¶ms); | |
| 128 ASSERT_EQ(51u, params.size()); | |
| 129 } | |
| 130 } | |
| OLD | NEW |