Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(701)

Unified Diff: chrome/browser/safe_browsing/threat_details_unittest.cc

Issue 1414343007: Collect threat details for phishing and UwS (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: nit Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/safe_browsing/threat_details_unittest.cc
diff --git a/chrome/browser/safe_browsing/threat_details_unittest.cc b/chrome/browser/safe_browsing/threat_details_unittest.cc
index f537c5c9948b2c84924703605f9f9b1e1a8ee99d..a6b3cc9f205f8a72452f6a8718e18d65dbc12899 100644
--- a/chrome/browser/safe_browsing/threat_details_unittest.cc
+++ b/chrome/browser/safe_browsing/threat_details_unittest.cc
@@ -10,11 +10,11 @@
#include "base/time/time.h"
#include "chrome/browser/history/history_service_factory.h"
#include "chrome/browser/profiles/profile.h"
-#include "chrome/browser/safe_browsing/report.pb.h"
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
#include "chrome/browser/safe_browsing/threat_details.h"
#include "chrome/browser/safe_browsing/threat_details_history.h"
#include "chrome/browser/safe_browsing/ui_manager.h"
+#include "chrome/common/safe_browsing/csd.pb.h"
#include "chrome/common/safe_browsing/safebrowsing_messages.h"
#include "chrome/test/base/chrome_render_view_host_test_harness.h"
#include "chrome/test/base/testing_profile.h"
@@ -42,11 +42,11 @@ static const char* kFirstRedirectURL = "http://redirectone.com/with/path";
static const char* kSecondRedirectURL = "https://redirecttwo.com/with/path";
static const char* kReferrerURL = "http://www.referrer.com/with/path";
-static const char* kMalwareURL = "http://www.malware.com/with/path";
-static const char* kMalwareHeaders =
+static const char* kThreatURL = "http://www.threat.com/with/path";
+static const char* kThreatHeaders =
"HTTP/1.1 200 OK\n"
"Content-Type: image/jpeg\n";
-static const char* kMalwareData = "exploit();";
+static const char* kThreatData = "exploit();";
static const char* kLandingURL = "http://www.landingpage.com/with/path";
static const char* kLandingHeaders =
@@ -55,11 +55,11 @@ static const char* kLandingHeaders =
"Content-Length: 1024\n"
"Set-Cookie: tastycookie\n"; // This header is stripped.
static const char* kLandingData =
- "<iframe src='http://www.malware.com/with/path'>";
+ "<iframe src='http://www.threat.com/with/path'>";
using content::BrowserThread;
using content::WebContents;
-using safe_browsing::ClientMalwareReportRequest;
+using safe_browsing::ClientSafeBrowsingReportRequest;
namespace {
@@ -122,7 +122,7 @@ void FillCache(net::URLRequestContextGetter* context_getter) {
->GetBackend(&cache, cb.callback());
ASSERT_EQ(net::OK, cb.GetResult(rv));
- WriteToEntry(cache, kMalwareURL, kMalwareHeaders, kMalwareData);
+ WriteToEntry(cache, kThreatURL, kThreatHeaders, kThreatData);
WriteToEntry(cache, kLandingURL, kLandingHeaders, kLandingData);
}
@@ -195,8 +195,8 @@ class ThreatDetailsTest : public ChromeRenderViewHostTestHarness {
}
static bool ResourceLessThan(
- const ClientMalwareReportRequest::Resource* lhs,
- const ClientMalwareReportRequest::Resource* rhs) {
+ const ClientSafeBrowsingReportRequest::Resource* lhs,
+ const ClientSafeBrowsingReportRequest::Resource* rhs) {
return lhs->id() < rhs->id();
}
@@ -221,20 +221,22 @@ class ThreatDetailsTest : public ChromeRenderViewHostTestHarness {
protected:
void InitResource(UnsafeResource* resource,
+ SBThreatType threat_type,
bool is_subresource,
const GURL& url) {
resource->url = url;
resource->is_subresource = is_subresource;
- resource->threat_type = SB_THREAT_TYPE_URL_MALWARE;
+ resource->threat_type = threat_type;
resource->render_process_host_id =
web_contents()->GetRenderProcessHost()->GetID();
resource->render_view_id =
web_contents()->GetRenderViewHost()->GetRoutingID();
}
- void VerifyResults(const ClientMalwareReportRequest& report_pb,
- const ClientMalwareReportRequest& expected_pb) {
- EXPECT_EQ(expected_pb.malware_url(), report_pb.malware_url());
+ void VerifyResults(const ClientSafeBrowsingReportRequest& report_pb,
+ const ClientSafeBrowsingReportRequest& expected_pb) {
+ EXPECT_EQ(expected_pb.type(), report_pb.type());
+ EXPECT_EQ(expected_pb.url(), report_pb.url());
EXPECT_EQ(expected_pb.page_url(), report_pb.page_url());
EXPECT_EQ(expected_pb.referrer_url(), report_pb.referrer_url());
EXPECT_EQ(expected_pb.did_proceed(), report_pb.did_proceed());
@@ -245,18 +247,18 @@ class ThreatDetailsTest : public ChromeRenderViewHostTestHarness {
ASSERT_EQ(expected_pb.resources_size(), report_pb.resources_size());
// Sort the resources, to make the test deterministic
- std::vector<const ClientMalwareReportRequest::Resource*> resources;
+ std::vector<const ClientSafeBrowsingReportRequest::Resource*> resources;
for (int i = 0; i < report_pb.resources_size(); ++i) {
- const ClientMalwareReportRequest::Resource& resource =
+ const ClientSafeBrowsingReportRequest::Resource& resource =
report_pb.resources(i);
resources.push_back(&resource);
}
std::sort(resources.begin(), resources.end(),
&ThreatDetailsTest::ResourceLessThan);
- std::vector<const ClientMalwareReportRequest::Resource*> expected;
+ std::vector<const ClientSafeBrowsingReportRequest::Resource*> expected;
for (int i = 0; i < report_pb.resources_size(); ++i) {
- const ClientMalwareReportRequest::Resource& resource =
+ const ClientSafeBrowsingReportRequest::Resource& resource =
expected_pb.resources(i);
expected.push_back(&resource);
}
@@ -270,8 +272,9 @@ class ThreatDetailsTest : public ChromeRenderViewHostTestHarness {
EXPECT_EQ(expected_pb.complete(), report_pb.complete());
}
- void VerifyResource(const ClientMalwareReportRequest::Resource* resource,
- const ClientMalwareReportRequest::Resource* expected) {
+ void VerifyResource(
+ const ClientSafeBrowsingReportRequest::Resource* resource,
+ const ClientSafeBrowsingReportRequest::Resource* expected) {
EXPECT_EQ(expected->id(), resource->id());
EXPECT_EQ(expected->url(), resource->url());
EXPECT_EQ(expected->parent_id(), resource->parent_id());
@@ -322,8 +325,8 @@ class ThreatDetailsTest : public ChromeRenderViewHostTestHarness {
scoped_refptr<MockSafeBrowsingUIManager> ui_manager_;
};
-// Tests creating a simple malware report.
-TEST_F(ThreatDetailsTest, MalwareSubResource) {
+// Tests creating a simple threat report of a malware URL.
+TEST_F(ThreatDetailsTest, ThreatSubResource) {
// Start a load.
controller().LoadURL(
GURL(kLandingURL),
@@ -331,7 +334,7 @@ TEST_F(ThreatDetailsTest, MalwareSubResource) {
ui::PAGE_TRANSITION_TYPED, std::string());
UnsafeResource resource;
- InitResource(&resource, true, GURL(kMalwareURL));
+ InitResource(&resource, SB_THREAT_TYPE_URL_MALWARE, true, GURL(kThreatURL));
scoped_refptr<ThreatDetailsWrap> report =
new ThreatDetailsWrap(ui_manager_.get(), web_contents(), resource, NULL);
@@ -339,11 +342,12 @@ TEST_F(ThreatDetailsTest, MalwareSubResource) {
std::string serialized = WaitForSerializedReport(
report.get(), true /* did_proceed*/, 1 /* num_visit */);
- ClientMalwareReportRequest actual;
+ ClientSafeBrowsingReportRequest actual;
actual.ParseFromString(serialized);
- ClientMalwareReportRequest expected;
- expected.set_malware_url(kMalwareURL);
+ ClientSafeBrowsingReportRequest expected;
+ expected.set_type(ClientSafeBrowsingReportRequest::URL_MALWARE);
+ expected.set_url(kThreatURL);
expected.set_page_url(kLandingURL);
// Note that the referrer policy is not actually enacted here, since that's
// done in Blink.
@@ -351,12 +355,13 @@ TEST_F(ThreatDetailsTest, MalwareSubResource) {
expected.set_did_proceed(true);
expected.set_repeat_visit(true);
- ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources();
+ ClientSafeBrowsingReportRequest::Resource* pb_resource =
+ expected.add_resources();
pb_resource->set_id(0);
pb_resource->set_url(kLandingURL);
pb_resource = expected.add_resources();
pb_resource->set_id(1);
- pb_resource->set_url(kMalwareURL);
+ pb_resource->set_url(kThreatURL);
pb_resource = expected.add_resources();
pb_resource->set_id(2);
pb_resource->set_url(kReferrerURL);
@@ -364,14 +369,14 @@ TEST_F(ThreatDetailsTest, MalwareSubResource) {
VerifyResults(actual, expected);
}
-// Tests creating a simple malware report where the subresource has a
-// different original_url.
-TEST_F(ThreatDetailsTest, MalwareSubResourceWithOriginalUrl) {
+// Tests creating a simple threat report of a phishing page where the
+// subresource has a different original_url.
+TEST_F(ThreatDetailsTest, ThreatSubResourceWithOriginalUrl) {
controller().LoadURL(GURL(kLandingURL), content::Referrer(),
ui::PAGE_TRANSITION_TYPED, std::string());
UnsafeResource resource;
- InitResource(&resource, true, GURL(kMalwareURL));
+ InitResource(&resource, SB_THREAT_TYPE_URL_PHISHING, true, GURL(kThreatURL));
resource.original_url = GURL(kOriginalLandingURL);
scoped_refptr<ThreatDetailsWrap> report =
@@ -380,17 +385,19 @@ TEST_F(ThreatDetailsTest, MalwareSubResourceWithOriginalUrl) {
std::string serialized = WaitForSerializedReport(
report.get(), false /* did_proceed*/, 1 /* num_visit */);
- ClientMalwareReportRequest actual;
+ ClientSafeBrowsingReportRequest actual;
actual.ParseFromString(serialized);
- ClientMalwareReportRequest expected;
- expected.set_malware_url(kMalwareURL);
+ ClientSafeBrowsingReportRequest expected;
+ expected.set_type(ClientSafeBrowsingReportRequest::URL_PHISHING);
+ expected.set_url(kThreatURL);
expected.set_page_url(kLandingURL);
expected.set_referrer_url("");
expected.set_did_proceed(false);
expected.set_repeat_visit(true);
- ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources();
+ ClientSafeBrowsingReportRequest::Resource* pb_resource =
+ expected.add_resources();
pb_resource->set_id(0);
pb_resource->set_url(kLandingURL);
@@ -400,33 +407,33 @@ TEST_F(ThreatDetailsTest, MalwareSubResourceWithOriginalUrl) {
pb_resource = expected.add_resources();
pb_resource->set_id(2);
- pb_resource->set_url(kMalwareURL);
- // The Resource for kMalwareUrl should have the Resource for
+ pb_resource->set_url(kThreatURL);
+ // The Resource for kThreatURL should have the Resource for
// kOriginalLandingURL (with id 1) as parent.
pb_resource->set_parent_id(1);
VerifyResults(actual, expected);
}
-// Tests creating a malware report with data from the renderer.
-TEST_F(ThreatDetailsTest, MalwareDOMDetails) {
+// Tests creating a threat report of a UwS page with data from the renderer.
+TEST_F(ThreatDetailsTest, ThreatDOMDetails) {
controller().LoadURL(GURL(kLandingURL), content::Referrer(),
ui::PAGE_TRANSITION_TYPED, std::string());
UnsafeResource resource;
- InitResource(&resource, true, GURL(kMalwareURL));
+ InitResource(&resource, SB_THREAT_TYPE_URL_UNWANTED, true, GURL(kThreatURL));
scoped_refptr<ThreatDetailsWrap> report =
new ThreatDetailsWrap(ui_manager_.get(), web_contents(), resource, NULL);
// Send a message from the DOM, with 2 nodes, a parent and a child.
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params;
- SafeBrowsingHostMsg_MalwareDOMDetails_Node child_node;
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params;
+ SafeBrowsingHostMsg_ThreatDOMDetails_Node child_node;
child_node.url = GURL(kDOMChildURL);
child_node.tag_name = "iframe";
child_node.parent = GURL(kDOMParentURL);
params.push_back(child_node);
- SafeBrowsingHostMsg_MalwareDOMDetails_Node parent_node;
+ SafeBrowsingHostMsg_ThreatDOMDetails_Node parent_node;
parent_node.url = GURL(kDOMParentURL);
parent_node.children.push_back(GURL(kDOMChildURL));
params.push_back(parent_node);
@@ -434,23 +441,25 @@ TEST_F(ThreatDetailsTest, MalwareDOMDetails) {
std::string serialized = WaitForSerializedReport(
report.get(), false /* did_proceed*/, 0 /* num_visit */);
- ClientMalwareReportRequest actual;
+ ClientSafeBrowsingReportRequest actual;
actual.ParseFromString(serialized);
- ClientMalwareReportRequest expected;
- expected.set_malware_url(kMalwareURL);
+ ClientSafeBrowsingReportRequest expected;
+ expected.set_type(ClientSafeBrowsingReportRequest::URL_UNWANTED);
+ expected.set_url(kThreatURL);
expected.set_page_url(kLandingURL);
expected.set_referrer_url("");
expected.set_did_proceed(false);
expected.set_repeat_visit(false);
- ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources();
+ ClientSafeBrowsingReportRequest::Resource* pb_resource =
+ expected.add_resources();
pb_resource->set_id(0);
pb_resource->set_url(kLandingURL);
pb_resource = expected.add_resources();
pb_resource->set_id(1);
- pb_resource->set_url(kMalwareURL);
+ pb_resource->set_url(kThreatURL);
pb_resource = expected.add_resources();
pb_resource->set_id(2);
@@ -466,37 +475,39 @@ TEST_F(ThreatDetailsTest, MalwareDOMDetails) {
VerifyResults(actual, expected);
}
-// Tests creating a malware report where there are redirect urls to an unsafe
-// resource url
-TEST_F(ThreatDetailsTest, MalwareWithRedirectUrl) {
+// Tests creating a threat report of a malware page where there are redirect
+// urls to an unsafe resource url.
+TEST_F(ThreatDetailsTest, ThreatWithRedirectUrl) {
controller().LoadURL(GURL(kLandingURL), content::Referrer(),
ui::PAGE_TRANSITION_TYPED, std::string());
UnsafeResource resource;
- InitResource(&resource, true, GURL(kMalwareURL));
+ InitResource(&resource, SB_THREAT_TYPE_URL_MALWARE, true, GURL(kThreatURL));
resource.original_url = GURL(kOriginalLandingURL);
// add some redirect urls
resource.redirect_urls.push_back(GURL(kFirstRedirectURL));
resource.redirect_urls.push_back(GURL(kSecondRedirectURL));
- resource.redirect_urls.push_back(GURL(kMalwareURL));
+ resource.redirect_urls.push_back(GURL(kThreatURL));
scoped_refptr<ThreatDetailsWrap> report =
new ThreatDetailsWrap(ui_manager_.get(), web_contents(), resource, NULL);
std::string serialized = WaitForSerializedReport(
report.get(), true /* did_proceed*/, 0 /* num_visit */);
- ClientMalwareReportRequest actual;
+ ClientSafeBrowsingReportRequest actual;
actual.ParseFromString(serialized);
- ClientMalwareReportRequest expected;
- expected.set_malware_url(kMalwareURL);
+ ClientSafeBrowsingReportRequest expected;
+ expected.set_type(ClientSafeBrowsingReportRequest::URL_MALWARE);
+ expected.set_url(kThreatURL);
expected.set_page_url(kLandingURL);
expected.set_referrer_url("");
expected.set_did_proceed(true);
expected.set_repeat_visit(false);
- ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources();
+ ClientSafeBrowsingReportRequest::Resource* pb_resource =
+ expected.add_resources();
pb_resource->set_id(0);
pb_resource->set_url(kLandingURL);
@@ -506,7 +517,7 @@ TEST_F(ThreatDetailsTest, MalwareWithRedirectUrl) {
pb_resource = expected.add_resources();
pb_resource->set_id(2);
- pb_resource->set_url(kMalwareURL);
+ pb_resource->set_url(kThreatURL);
pb_resource->set_parent_id(4);
pb_resource = expected.add_resources();
@@ -528,7 +539,8 @@ TEST_F(ThreatDetailsTest, HTTPCache) {
ui::PAGE_TRANSITION_TYPED, std::string());
UnsafeResource resource;
- InitResource(&resource, true, GURL(kMalwareURL));
+ InitResource(&resource, SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL, true,
+ GURL(kThreatURL));
scoped_refptr<ThreatDetailsWrap> report =
new ThreatDetailsWrap(ui_manager_.get(), web_contents(), resource,
@@ -540,7 +552,7 @@ TEST_F(ThreatDetailsTest, HTTPCache) {
make_scoped_refptr(profile()->GetRequestContext())));
// The cache collection starts after the IPC from the DOM is fired.
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params;
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params;
report->OnReceivedThreatDOMDetails(params);
// Let the cache callbacks complete.
@@ -549,22 +561,24 @@ TEST_F(ThreatDetailsTest, HTTPCache) {
DVLOG(1) << "Getting serialized report";
std::string serialized = WaitForSerializedReport(
report.get(), true /* did_proceed*/, -1 /* num_visit */);
- ClientMalwareReportRequest actual;
+ ClientSafeBrowsingReportRequest actual;
actual.ParseFromString(serialized);
- ClientMalwareReportRequest expected;
- expected.set_malware_url(kMalwareURL);
+ ClientSafeBrowsingReportRequest expected;
+ expected.set_type(ClientSafeBrowsingReportRequest::CLIENT_SIDE_PHISHING_URL);
+ expected.set_url(kThreatURL);
expected.set_page_url(kLandingURL);
expected.set_referrer_url("");
expected.set_did_proceed(true);
- ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources();
+ ClientSafeBrowsingReportRequest::Resource* pb_resource =
+ expected.add_resources();
pb_resource->set_id(0);
pb_resource->set_url(kLandingURL);
- safe_browsing::ClientMalwareReportRequest::HTTPResponse* pb_response =
+ safe_browsing::ClientSafeBrowsingReportRequest::HTTPResponse* pb_response =
pb_resource->mutable_response();
pb_response->mutable_firstline()->set_code(200);
- safe_browsing::ClientMalwareReportRequest::HTTPHeader* pb_header =
+ safe_browsing::ClientSafeBrowsingReportRequest::HTTPHeader* pb_header =
pb_response->add_headers();
pb_header->set_name("Content-Type");
pb_header->set_value("text/html");
@@ -575,21 +589,23 @@ TEST_F(ThreatDetailsTest, HTTPCache) {
pb_header->set_name("Set-Cookie");
pb_header->set_value(""); // The cookie is dropped.
pb_response->set_body(kLandingData);
- pb_response->set_bodylength(47);
- pb_response->set_bodydigest("5abb4e63d806ec2c16a40b2699700554");
+ std::string landing_data(kLandingData);
+ pb_response->set_bodylength(landing_data.size());
+ pb_response->set_bodydigest(base::MD5String(landing_data));
pb_response->set_remote_ip("1.2.3.4:80");
pb_resource = expected.add_resources();
pb_resource->set_id(1);
- pb_resource->set_url(kMalwareURL);
+ pb_resource->set_url(kThreatURL);
pb_response = pb_resource->mutable_response();
pb_response->mutable_firstline()->set_code(200);
pb_header = pb_response->add_headers();
pb_header->set_name("Content-Type");
pb_header->set_value("image/jpeg");
- pb_response->set_body(kMalwareData);
- pb_response->set_bodylength(10);
- pb_response->set_bodydigest("581373551c43d4cf33bfb3b26838ff95");
+ pb_response->set_body(kThreatData);
+ std::string threat_data(kThreatData);
+ pb_response->set_bodylength(threat_data.size());
+ pb_response->set_bodydigest(base::MD5String(threat_data));
pb_response->set_remote_ip("1.2.3.4:80");
expected.set_complete(true);
@@ -602,7 +618,8 @@ TEST_F(ThreatDetailsTest, HTTPCacheNoEntries) {
ui::PAGE_TRANSITION_TYPED, std::string());
UnsafeResource resource;
- InitResource(&resource, true, GURL(kMalwareURL));
+ InitResource(&resource, SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL, true,
+ GURL(kThreatURL));
scoped_refptr<ThreatDetailsWrap> report =
new ThreatDetailsWrap(ui_manager_.get(), web_contents(), resource,
@@ -611,7 +628,7 @@ TEST_F(ThreatDetailsTest, HTTPCacheNoEntries) {
// No call to FillCache
// The cache collection starts after the IPC from the DOM is fired.
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params;
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params;
report->OnReceivedThreatDOMDetails(params);
// Let the cache callbacks complete.
@@ -620,21 +637,23 @@ TEST_F(ThreatDetailsTest, HTTPCacheNoEntries) {
DVLOG(1) << "Getting serialized report";
std::string serialized = WaitForSerializedReport(
report.get(), false /* did_proceed*/, -1 /* num_visit */);
- ClientMalwareReportRequest actual;
+ ClientSafeBrowsingReportRequest actual;
actual.ParseFromString(serialized);
- ClientMalwareReportRequest expected;
- expected.set_malware_url(kMalwareURL);
+ ClientSafeBrowsingReportRequest expected;
+ expected.set_type(ClientSafeBrowsingReportRequest::CLIENT_SIDE_MALWARE_URL);
+ expected.set_url(kThreatURL);
expected.set_page_url(kLandingURL);
expected.set_referrer_url("");
expected.set_did_proceed(false);
- ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources();
+ ClientSafeBrowsingReportRequest::Resource* pb_resource =
+ expected.add_resources();
pb_resource->set_id(0);
pb_resource->set_url(kLandingURL);
pb_resource = expected.add_resources();
pb_resource->set_id(1);
- pb_resource->set_url(kMalwareURL);
+ pb_resource->set_url(kThreatURL);
expected.set_complete(true);
VerifyResults(actual, expected);
@@ -644,8 +663,8 @@ TEST_F(ThreatDetailsTest, HTTPCacheNoEntries) {
TEST_F(ThreatDetailsTest, HistoryServiceUrls) {
// Add content to history service.
// There are two redirect urls before reacing malware url:
- // kFirstRedirectURL -> kSecondRedirectURL -> kMalwareURL
- GURL baseurl(kMalwareURL);
+ // kFirstRedirectURL -> kSecondRedirectURL -> kThreatURL
+ GURL baseurl(kThreatURL);
history::RedirectList redirects;
redirects.push_back(GURL(kFirstRedirectURL));
redirects.push_back(GURL(kSecondRedirectURL));
@@ -657,12 +676,12 @@ TEST_F(ThreatDetailsTest, HistoryServiceUrls) {
ui::PAGE_TRANSITION_TYPED, std::string());
UnsafeResource resource;
- InitResource(&resource, true, GURL(kMalwareURL));
+ InitResource(&resource, SB_THREAT_TYPE_URL_MALWARE, true, GURL(kThreatURL));
scoped_refptr<ThreatDetailsWrap> report =
new ThreatDetailsWrap(ui_manager_.get(), web_contents(), resource, NULL);
// The redirects collection starts after the IPC from the DOM is fired.
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params;
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params;
report->OnReceivedThreatDOMDetails(params);
// Let the redirects callbacks complete.
@@ -670,23 +689,25 @@ TEST_F(ThreatDetailsTest, HistoryServiceUrls) {
std::string serialized = WaitForSerializedReport(
report.get(), true /* did_proceed*/, 1 /* num_visit */);
- ClientMalwareReportRequest actual;
+ ClientSafeBrowsingReportRequest actual;
actual.ParseFromString(serialized);
- ClientMalwareReportRequest expected;
- expected.set_malware_url(kMalwareURL);
+ ClientSafeBrowsingReportRequest expected;
+ expected.set_type(ClientSafeBrowsingReportRequest::URL_MALWARE);
+ expected.set_url(kThreatURL);
expected.set_page_url(kLandingURL);
expected.set_referrer_url("");
expected.set_did_proceed(true);
expected.set_repeat_visit(true);
- ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources();
+ ClientSafeBrowsingReportRequest::Resource* pb_resource =
+ expected.add_resources();
pb_resource->set_id(0);
pb_resource->set_url(kLandingURL);
pb_resource = expected.add_resources();
pb_resource->set_id(1);
pb_resource->set_parent_id(2);
- pb_resource->set_url(kMalwareURL);
+ pb_resource->set_url(kThreatURL);
pb_resource = expected.add_resources();
pb_resource->set_id(2);
pb_resource->set_parent_id(3);

Powered by Google App Engine
This is Rietveld 408576698