Index: chrome/renderer/safe_browsing/threat_dom_details_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/malware_dom_details_browsertest.cc b/chrome/renderer/safe_browsing/threat_dom_details_browsertest.cc |
similarity index 72% |
rename from chrome/renderer/safe_browsing/malware_dom_details_browsertest.cc |
rename to chrome/renderer/safe_browsing/threat_dom_details_browsertest.cc |
index e4ef1e649a1f3435715c1438ee384af09b3cb70b..becab0dabfc589f680e7f33d1608d5b11c174c94 100644 |
--- a/chrome/renderer/safe_browsing/malware_dom_details_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/threat_dom_details_browsertest.cc |
@@ -4,43 +4,42 @@ |
#include "base/strings/stringprintf.h" |
#include "chrome/common/safe_browsing/safebrowsing_messages.h" |
-#include "chrome/renderer/safe_browsing/malware_dom_details.h" |
+#include "chrome/renderer/safe_browsing/threat_dom_details.h" |
#include "chrome/test/base/chrome_render_view_test.h" |
#include "net/base/escape.h" |
-typedef ChromeRenderViewTest MalwareDOMDetailsTest; |
+typedef ChromeRenderViewTest ThreatDOMDetailsTest; |
- |
-TEST_F(MalwareDOMDetailsTest, Everything) { |
- scoped_ptr<safe_browsing::MalwareDOMDetails> details( |
- safe_browsing::MalwareDOMDetails::Create(view_)); |
+TEST_F(ThreatDOMDetailsTest, Everything) { |
+ scoped_ptr<safe_browsing::ThreatDOMDetails> details( |
+ safe_browsing::ThreatDOMDetails::Create(view_)); |
// Lower kMaxNodes for the test. Loading 500 subframes in a |
// debug build takes a while. |
details->kMaxNodes = 50; |
const char urlprefix[] = "data:text/html;charset=utf-8,"; |
- { // An page with an internal script |
+ { // An page with an internal script |
std::string html = "<html><head><script></script></head></html>"; |
LoadHTML(html.c_str()); |
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; |
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params; |
details->ExtractResources(¶ms); |
ASSERT_EQ(1u, params.size()); |
EXPECT_EQ(GURL(urlprefix + html), params[0].url); |
} |
- { // A page with 2 external scripts. |
+ { // A page with 2 external scripts. |
// Note: This part of the test causes 2 leaks: LEAK: 5 WebCoreNode |
// LEAK: 2 CachedResource. |
GURL script1_url("data:text/javascript;charset=utf-8,var a=1;"); |
GURL script2_url("data:text/javascript;charset=utf-8,var b=2;"); |
std::string html = "<html><head><script src=\"" + script1_url.spec() + |
- "\"></script><script src=\"" + script2_url.spec() + |
- "\"></script></head></html>"; |
+ "\"></script><script src=\"" + script2_url.spec() + |
+ "\"></script></head></html>"; |
GURL url(urlprefix + html); |
LoadHTML(html.c_str()); |
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; |
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params; |
details->ExtractResources(¶ms); |
ASSERT_EQ(3u, params.size()); |
EXPECT_EQ(script1_url, params[0].url); |
@@ -50,21 +49,23 @@ TEST_F(MalwareDOMDetailsTest, Everything) { |
EXPECT_EQ(url, params[2].url); |
} |
- { // A page with an iframe which in turn contains an iframe. |
+ { // A page with an iframe which in turn contains an iframe. |
// html |
// \ iframe1 |
// \ iframe2 |
std::string iframe2_html = "<html><body>iframe2</body></html>"; |
GURL iframe2_url(urlprefix + iframe2_html); |
- std::string iframe1_html = "<iframe src=\"" + net::EscapeForHTML( |
- iframe2_url.spec()) + "\"></iframe>"; |
+ std::string iframe1_html = "<iframe src=\"" + |
+ net::EscapeForHTML(iframe2_url.spec()) + |
+ "\"></iframe>"; |
GURL iframe1_url(urlprefix + iframe1_html); |
- std::string html = "<html><head><iframe src=\"" + net::EscapeForHTML( |
- iframe1_url.spec()) + "\"></iframe></head></html>"; |
+ std::string html = "<html><head><iframe src=\"" + |
+ net::EscapeForHTML(iframe1_url.spec()) + |
+ "\"></iframe></head></html>"; |
GURL url(urlprefix + html); |
LoadHTML(html.c_str()); |
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; |
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params; |
details->ExtractResources(¶ms); |
ASSERT_EQ(5u, params.size()); |
@@ -96,34 +97,34 @@ TEST_F(MalwareDOMDetailsTest, Everything) { |
EXPECT_EQ(0u, params[4].children.size()); |
} |
- { // >50 subframes, to verify kMaxNodes. |
+ { // >50 subframes, to verify kMaxNodes. |
std::string html; |
for (int i = 0; i < 55; ++i) { |
// The iframe contents is just a number. |
GURL iframe_url(base::StringPrintf("%s%d", urlprefix, i)); |
html += "<iframe src=\"" + net::EscapeForHTML(iframe_url.spec()) + |
- "\"></iframe>"; |
+ "\"></iframe>"; |
} |
GURL url(urlprefix + html); |
LoadHTML(html.c_str()); |
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; |
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params; |
details->ExtractResources(¶ms); |
ASSERT_EQ(51u, params.size()); |
} |
- { // A page with >50 scripts, to verify kMaxNodes. |
+ { // A page with >50 scripts, to verify kMaxNodes. |
std::string html; |
for (int i = 0; i < 55; ++i) { |
// The iframe contents is just a number. |
GURL script_url(base::StringPrintf("%s%d", urlprefix, i)); |
html += "<script src=\"" + net::EscapeForHTML(script_url.spec()) + |
- "\"></script>"; |
+ "\"></script>"; |
} |
GURL url(urlprefix + html); |
LoadHTML(html.c_str()); |
- std::vector<SafeBrowsingHostMsg_MalwareDOMDetails_Node> params; |
+ std::vector<SafeBrowsingHostMsg_ThreatDOMDetails_Node> params; |
details->ExtractResources(¶ms); |
ASSERT_EQ(51u, params.size()); |
} |