Index: chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc b/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
index 222cb7b9d30d3f2220a20e1a3f821c0679e748b8..f0f7b1192b89fabe6f2733c1e92b7c5322d8980a 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
@@ -70,6 +70,8 @@ using ::testing::_; |
using ::testing::Mock; |
using ::testing::StrictMock; |
+namespace safe_browsing { |
+ |
namespace { |
void InvokeFullHashCallback( |
@@ -138,8 +140,8 @@ class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
std::vector<SBPrefix>* prefix_hits, |
std::vector<SBFullHashResult>* cache_hits) override { |
cache_hits->clear(); |
- return ContainsUrl(safe_browsing::MALWARE, |
- safe_browsing::PHISH, |
+ return ContainsUrl(MALWARE, |
+ PHISH, |
std::vector<GURL>(1, url), |
prefix_hits); |
} |
@@ -148,8 +150,8 @@ class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
std::vector<SBPrefix>* prefix_hits, |
std::vector<SBFullHashResult>* cache_hits) override { |
cache_hits->clear(); |
- return ContainsUrl(safe_browsing::UNWANTEDURL, |
- safe_browsing::UNWANTEDURL, |
+ return ContainsUrl(UNWANTEDURL, |
+ UNWANTEDURL, |
std::vector<GURL>(1, url), |
prefix_hits); |
} |
@@ -157,8 +159,8 @@ class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
const std::vector<SBPrefix>& prefixes, |
std::vector<SBPrefix>* prefix_hits) override { |
bool found = |
- ContainsUrlPrefixes(safe_browsing::BINURL, |
- safe_browsing::BINURL, prefixes, prefix_hits); |
+ ContainsUrlPrefixes(BINURL, |
+ BINURL, prefixes, prefix_hits); |
if (!found) |
return false; |
DCHECK_LE(1U, prefix_hits->size()); |
@@ -424,8 +426,8 @@ class SafeBrowsingServiceTest : public InProcessBrowserTest { |
SBFullHashResult* full_hash) { |
std::string host; |
std::string path; |
- safe_browsing::CanonicalizeUrl(url, &host, &path, NULL); |
- full_hash->hash = safe_browsing::SBFullHashForString(host + path); |
+ CanonicalizeUrl(url, &host, &path, NULL); |
+ full_hash->hash = SBFullHashForString(host + path); |
full_hash->list_id = list_id; |
} |
@@ -527,8 +529,8 @@ class SafeBrowsingServiceTest : public InProcessBrowserTest { |
void CreateCSDService() { |
#if defined(SAFE_BROWSING_CSD) |
- safe_browsing::ClientSideDetectionService* csd_service = |
- safe_browsing::ClientSideDetectionService::Create(NULL); |
+ ClientSideDetectionService* csd_service = |
+ ClientSideDetectionService::Create(NULL); |
SafeBrowsingService* sb_service = |
g_browser_process->safe_browsing_service(); |
@@ -601,19 +603,19 @@ class SafeBrowsingServiceMetadataTest |
void GenUrlFullhashResultWithMetadata(const GURL& url, |
SBFullHashResult* full_hash) { |
- GenUrlFullhashResult(url, safe_browsing::MALWARE, full_hash); |
+ GenUrlFullhashResult(url, MALWARE, full_hash); |
- safe_browsing::MalwarePatternType proto; |
+ MalwarePatternType proto; |
switch (GetParam()) { |
case METADATA_NONE: |
full_hash->metadata = std::string(); |
break; |
case METADATA_LANDING: |
- proto.set_pattern_type(safe_browsing::MalwarePatternType::LANDING); |
+ proto.set_pattern_type(MalwarePatternType::LANDING); |
full_hash->metadata = proto.SerializeAsString(); |
break; |
case METADATA_DISTRIBUTION: |
- proto.set_pattern_type(safe_browsing::MalwarePatternType::DISTRIBUTION); |
+ proto.set_pattern_type(MalwarePatternType::DISTRIBUTION); |
full_hash->metadata = proto.SerializeAsString(); |
break; |
} |
@@ -712,7 +714,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, UnwantedImgIgnored) { |
// Add the img url as coming from a site serving UwS and then load the parent |
// page. |
SBFullHashResult uws_full_hash; |
- GenUrlFullhashResult(img_url, safe_browsing::UNWANTEDURL, |
+ GenUrlFullhashResult(img_url, UNWANTEDURL, |
&uws_full_hash); |
mattm
2015/11/12 00:36:05
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(img_url, uws_full_hash); |
@@ -727,7 +729,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, DISABLED_MalwareWithWhitelist) { |
// After adding the url to safebrowsing database and getfullhash result, |
// we should see the interstitial page. |
SBFullHashResult malware_full_hash; |
- GenUrlFullhashResult(url, safe_browsing::MALWARE, &malware_full_hash); |
+ GenUrlFullhashResult(url, MALWARE, &malware_full_hash); |
EXPECT_CALL(observer_, |
OnSafeBrowsingMatch(IsUnsafeResourceFor(url))).Times(1); |
EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(url))).Times(1) |
@@ -781,7 +783,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, Prefetch) { |
// getfullhash result, we should not see the interstitial page since the |
// only malware was a prefetch target. |
SBFullHashResult malware_full_hash; |
- GenUrlFullhashResult(malware_url, safe_browsing::MALWARE, |
+ GenUrlFullhashResult(malware_url, MALWARE, |
&malware_full_hash); |
mattm
2015/11/12 00:36:06
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(malware_url, malware_full_hash); |
ui_test_utils::NavigateToURL(browser(), url); |
@@ -896,7 +898,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckDownloadUrl) { |
EXPECT_EQ(SB_THREAT_TYPE_SAFE, client->GetThreatType()); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult(badbin_url, safe_browsing::BINURL, |
+ GenUrlFullhashResult(badbin_url, BINURL, |
&full_hash_result); |
mattm
2015/11/12 00:36:06
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(badbin_url, full_hash_result); |
@@ -918,7 +920,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckUnwantedSoftwareUrl) { |
SBFullHashResult full_hash_result; |
GenUrlFullhashResult( |
- bad_url, safe_browsing::UNWANTEDURL, &full_hash_result); |
+ bad_url, UNWANTEDURL, &full_hash_result); |
mattm
2015/11/12 00:36:05
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(bad_url, full_hash_result); |
// Now, the bad_url is not safe since it is added to download |
@@ -940,7 +942,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckUnwantedSoftwareUrl) { |
SBFullHashResult full_hash_result; |
GenUrlFullhashResult( |
- bad_url, safe_browsing::MALWARE, &full_hash_result); |
+ bad_url, MALWARE, &full_hash_result); |
mattm
2015/11/12 00:36:06
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(bad_url, full_hash_result); |
client->CheckBrowseUrl(bad_url); |
@@ -960,7 +962,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckBrowseUrl) { |
SBFullHashResult full_hash_result; |
GenUrlFullhashResult( |
- bad_url, safe_browsing::MALWARE, &full_hash_result); |
+ bad_url, MALWARE, &full_hash_result); |
mattm
2015/11/12 00:36:05
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(bad_url, full_hash_result); |
// Now, the bad_url is not safe since it is added to download |
@@ -983,7 +985,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckBrowseUrl) { |
SBFullHashResult full_hash_result; |
GenUrlFullhashResult( |
- bad_url, safe_browsing::UNWANTEDURL, &full_hash_result); |
+ bad_url, UNWANTEDURL, &full_hash_result); |
mattm
2015/11/12 00:36:06
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(bad_url, full_hash_result); |
client->CheckBrowseUrl(bad_url); |
@@ -1007,7 +1009,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckDownloadUrlRedirects) { |
EXPECT_EQ(SB_THREAT_TYPE_SAFE, client->GetThreatType()); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult(badbin_url, safe_browsing::BINURL, |
+ GenUrlFullhashResult(badbin_url, BINURL, |
&full_hash_result); |
mattm
2015/11/12 00:36:06
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(badbin_url, full_hash_result); |
@@ -1030,7 +1032,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, |
scoped_refptr<TestSBClient> client(new TestSBClient); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult(badbin_url, safe_browsing::BINURL, |
+ GenUrlFullhashResult(badbin_url, BINURL, |
&full_hash_result); |
mattm
2015/11/12 00:36:05
formatting
vakh (old account. dont use)
2015/11/12 09:27:43
Done.
|
SetupResponseForUrl(badbin_url, full_hash_result); |
client->CheckDownloadUrl(badbin_urls); |
@@ -1057,7 +1059,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, |
IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, StartAndStop) { |
CreateCSDService(); |
SafeBrowsingService* sb_service = g_browser_process->safe_browsing_service(); |
- safe_browsing::ClientSideDetectionService* csd_service = |
+ ClientSideDetectionService* csd_service = |
sb_service->safe_browsing_detection_service(); |
PrefService* pref_service = browser()->profile()->GetPrefs(); |
@@ -1156,7 +1158,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceShutdownTest, |
DontStartAfterShutdown) { |
CreateCSDService(); |
SafeBrowsingService* sb_service = g_browser_process->safe_browsing_service(); |
- safe_browsing::ClientSideDetectionService* csd_service = |
+ ClientSideDetectionService* csd_service = |
sb_service->safe_browsing_detection_service(); |
PrefService* pref_service = browser()->profile()->GetPrefs(); |
@@ -1360,3 +1362,5 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingDatabaseManagerCookieTest, |
base::Bind(&SafeBrowsingDatabaseManagerCookieTest::ForceUpdate, this)); |
observer.Wait(); |
} |
+ |
+} // namespace safe_browsing |