Index: chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc b/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
index 222cb7b9d30d3f2220a20e1a3f821c0679e748b8..33c75ac6a7e1498539c8fc47fab212f39ffdc12e 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
@@ -70,6 +70,8 @@ using ::testing::_; |
using ::testing::Mock; |
using ::testing::StrictMock; |
+namespace safe_browsing { |
+ |
namespace { |
void InvokeFullHashCallback( |
@@ -116,7 +118,7 @@ class TestSafeBrowsingServiceFactory : public SafeBrowsingServiceFactory { |
}; |
// A SafeBrowingDatabase class that allows us to inject the malicious URLs. |
-class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
+class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
public: |
TestSafeBrowsingDatabase() {} |
@@ -138,27 +140,20 @@ class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
std::vector<SBPrefix>* prefix_hits, |
std::vector<SBFullHashResult>* cache_hits) override { |
cache_hits->clear(); |
- return ContainsUrl(safe_browsing::MALWARE, |
- safe_browsing::PHISH, |
- std::vector<GURL>(1, url), |
- prefix_hits); |
+ return ContainsUrl(MALWARE, PHISH, std::vector<GURL>(1, url), prefix_hits); |
} |
bool ContainsUnwantedSoftwareUrl( |
const GURL& url, |
std::vector<SBPrefix>* prefix_hits, |
std::vector<SBFullHashResult>* cache_hits) override { |
cache_hits->clear(); |
- return ContainsUrl(safe_browsing::UNWANTEDURL, |
- safe_browsing::UNWANTEDURL, |
- std::vector<GURL>(1, url), |
+ return ContainsUrl(UNWANTEDURL, UNWANTEDURL, std::vector<GURL>(1, url), |
prefix_hits); |
} |
bool ContainsDownloadUrlPrefixes( |
const std::vector<SBPrefix>& prefixes, |
std::vector<SBPrefix>* prefix_hits) override { |
- bool found = |
- ContainsUrlPrefixes(safe_browsing::BINURL, |
- safe_browsing::BINURL, prefixes, prefix_hits); |
+ bool found = ContainsUrlPrefixes(BINURL, BINURL, prefixes, prefix_hits); |
if (!found) |
return false; |
DCHECK_LE(1U, prefix_hits->size()); |
@@ -208,8 +203,7 @@ class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
Hits* hits_for_url = &badurls_[url.spec()]; |
hits_for_url->list_ids.push_back(full_hash.list_id); |
hits_for_url->prefix_hits.insert(hits_for_url->prefix_hits.end(), |
- prefix_hits.begin(), |
- prefix_hits.end()); |
+ prefix_hits.begin(), prefix_hits.end()); |
bad_prefixes_.insert( |
std::make_pair(full_hash.list_id, full_hash.hash.prefix)); |
} |
@@ -227,8 +221,8 @@ class TestSafeBrowsingDatabase : public SafeBrowsingDatabase { |
std::vector<SBPrefix>* prefix_hits) { |
bool hit = false; |
for (const GURL& url : urls) { |
- base::hash_map<std::string, Hits>::const_iterator |
- badurls_it = badurls_.find(url.spec()); |
+ base::hash_map<std::string, Hits>::const_iterator badurls_it = |
+ badurls_.find(url.spec()); |
if (badurls_it == badurls_.end()) |
continue; |
@@ -287,9 +281,8 @@ class TestSafeBrowsingDatabaseFactory : public SafeBrowsingDatabaseFactory { |
db_ = new TestSafeBrowsingDatabase(); |
return db_; |
} |
- TestSafeBrowsingDatabase* GetDb() { |
- return db_; |
- } |
+ TestSafeBrowsingDatabase* GetDb() { return db_; } |
+ |
private: |
// Owned by the SafebrowsingService. |
TestSafeBrowsingDatabase* db_; |
@@ -297,7 +290,7 @@ class TestSafeBrowsingDatabaseFactory : public SafeBrowsingDatabaseFactory { |
// A TestProtocolManager that could return fixed responses from |
// safebrowsing server for testing purpose. |
-class TestProtocolManager : public SafeBrowsingProtocolManager { |
+class TestProtocolManager : public SafeBrowsingProtocolManager { |
public: |
TestProtocolManager(SafeBrowsingProtocolManagerDelegate* delegate, |
net::URLRequestContextGetter* request_context_getter, |
@@ -319,8 +312,7 @@ class TestProtocolManager : public SafeBrowsingProtocolManager { |
bool is_extended_reporting) override { |
BrowserThread::PostDelayedTask( |
BrowserThread::IO, FROM_HERE, |
- base::Bind(InvokeFullHashCallback, callback, full_hashes_), |
- delay_); |
+ base::Bind(InvokeFullHashCallback, callback, full_hashes_), delay_); |
} |
// Prepare the GetFullHash results for the next request. |
@@ -328,17 +320,11 @@ class TestProtocolManager : public SafeBrowsingProtocolManager { |
full_hashes_.push_back(full_hash_result); |
} |
- void IntroduceDelay(const base::TimeDelta& delay) { |
- delay_ = delay; |
- } |
+ void IntroduceDelay(const base::TimeDelta& delay) { delay_ = delay; } |
- static int create_count() { |
- return create_count_; |
- } |
+ static int create_count() { return create_count_; } |
- static int delete_count() { |
- return delete_count_; |
- } |
+ static int delete_count() { return delete_count_; } |
private: |
std::vector<SBFullHashResult> full_hashes_; |
@@ -366,9 +352,7 @@ class TestSBProtocolManagerFactory : public SBProtocolManagerFactory { |
return pm_; |
} |
- TestProtocolManager* GetProtocolManager() { |
- return pm_; |
- } |
+ TestProtocolManager* GetProtocolManager() { return pm_; } |
private: |
// Owned by the SafebrowsingService. |
@@ -416,16 +400,15 @@ class ServiceEnabledHelper : public base::ThreadTestHelper { |
// Tests the safe browsing blocking page in a browser. |
class SafeBrowsingServiceTest : public InProcessBrowserTest { |
public: |
- SafeBrowsingServiceTest() { |
- } |
+ SafeBrowsingServiceTest() {} |
static void GenUrlFullhashResult(const GURL& url, |
int list_id, |
SBFullHashResult* full_hash) { |
std::string host; |
std::string path; |
- safe_browsing::CanonicalizeUrl(url, &host, &path, NULL); |
- full_hash->hash = safe_browsing::SBFullHashForString(host + path); |
+ CanonicalizeUrl(url, &host, &path, NULL); |
+ full_hash->hash = SBFullHashForString(host + path); |
full_hash->list_id = list_id; |
} |
@@ -527,8 +510,8 @@ class SafeBrowsingServiceTest : public InProcessBrowserTest { |
void CreateCSDService() { |
#if defined(SAFE_BROWSING_CSD) |
- safe_browsing::ClientSideDetectionService* csd_service = |
- safe_browsing::ClientSideDetectionService::Create(NULL); |
+ ClientSideDetectionService* csd_service = |
+ ClientSideDetectionService::Create(NULL); |
SafeBrowsingService* sb_service = |
g_browser_process->safe_browsing_service(); |
@@ -601,19 +584,19 @@ class SafeBrowsingServiceMetadataTest |
void GenUrlFullhashResultWithMetadata(const GURL& url, |
SBFullHashResult* full_hash) { |
- GenUrlFullhashResult(url, safe_browsing::MALWARE, full_hash); |
+ GenUrlFullhashResult(url, MALWARE, full_hash); |
- safe_browsing::MalwarePatternType proto; |
+ MalwarePatternType proto; |
switch (GetParam()) { |
case METADATA_NONE: |
full_hash->metadata = std::string(); |
break; |
case METADATA_LANDING: |
- proto.set_pattern_type(safe_browsing::MalwarePatternType::LANDING); |
+ proto.set_pattern_type(MalwarePatternType::LANDING); |
full_hash->metadata = proto.SerializeAsString(); |
break; |
case METADATA_DISTRIBUTION: |
- proto.set_pattern_type(safe_browsing::MalwarePatternType::DISTRIBUTION); |
+ proto.set_pattern_type(MalwarePatternType::DISTRIBUTION); |
full_hash->metadata = proto.SerializeAsString(); |
break; |
} |
@@ -655,10 +638,10 @@ IN_PROC_BROWSER_TEST_P(SafeBrowsingServiceMetadataTest, MalwareIFrame) { |
// Add the iframe url as malware and then load the parent page. |
SBFullHashResult malware_full_hash; |
GenUrlFullhashResultWithMetadata(iframe_url, &malware_full_hash); |
- EXPECT_CALL(observer_, OnSafeBrowsingMatch(IsUnsafeResourceFor(iframe_url))) |
- .Times(1); |
- EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(iframe_url))) |
- .Times(1); |
+ EXPECT_CALL(observer_, |
+ OnSafeBrowsingMatch(IsUnsafeResourceFor(iframe_url))).Times(1); |
+ EXPECT_CALL(observer_, |
+ OnSafeBrowsingHit(IsUnsafeResourceFor(iframe_url))).Times(1); |
SetupResponseForUrl(iframe_url, malware_full_hash); |
ui_test_utils::NavigateToURL(browser(), main_url); |
// All types should show the interstitial. |
@@ -712,8 +695,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, UnwantedImgIgnored) { |
// Add the img url as coming from a site serving UwS and then load the parent |
// page. |
SBFullHashResult uws_full_hash; |
- GenUrlFullhashResult(img_url, safe_browsing::UNWANTEDURL, |
- &uws_full_hash); |
+ GenUrlFullhashResult(img_url, UNWANTEDURL, &uws_full_hash); |
SetupResponseForUrl(img_url, uws_full_hash); |
ui_test_utils::NavigateToURL(browser(), main_url); |
@@ -727,10 +709,11 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, DISABLED_MalwareWithWhitelist) { |
// After adding the url to safebrowsing database and getfullhash result, |
// we should see the interstitial page. |
SBFullHashResult malware_full_hash; |
- GenUrlFullhashResult(url, safe_browsing::MALWARE, &malware_full_hash); |
+ GenUrlFullhashResult(url, MALWARE, &malware_full_hash); |
EXPECT_CALL(observer_, |
OnSafeBrowsingMatch(IsUnsafeResourceFor(url))).Times(1); |
- EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(url))).Times(1) |
+ EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(url))) |
+ .Times(1) |
.WillOnce(testing::Invoke( |
this, &SafeBrowsingServiceTest::ProceedAndWhitelist)); |
SetupResponseForUrl(url, malware_full_hash); |
@@ -781,8 +764,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, Prefetch) { |
// getfullhash result, we should not see the interstitial page since the |
// only malware was a prefetch target. |
SBFullHashResult malware_full_hash; |
- GenUrlFullhashResult(malware_url, safe_browsing::MALWARE, |
- &malware_full_hash); |
+ GenUrlFullhashResult(malware_url, MALWARE, &malware_full_hash); |
SetupResponseForUrl(malware_url, malware_full_hash); |
ui_test_utils::NavigateToURL(browser(), url); |
EXPECT_FALSE(ShowingInterstitialPage()); |
@@ -801,24 +783,19 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, Prefetch) { |
} // namespace |
-class TestSBClient |
- : public base::RefCountedThreadSafe<TestSBClient>, |
- public SafeBrowsingDatabaseManager::Client { |
+class TestSBClient : public base::RefCountedThreadSafe<TestSBClient>, |
+ public SafeBrowsingDatabaseManager::Client { |
public: |
TestSBClient() |
- : threat_type_(SB_THREAT_TYPE_SAFE), |
- safe_browsing_service_(g_browser_process->safe_browsing_service()) { |
- } |
+ : threat_type_(SB_THREAT_TYPE_SAFE), |
+ safe_browsing_service_(g_browser_process->safe_browsing_service()) {} |
- SBThreatType GetThreatType() const { |
- return threat_type_; |
- } |
+ SBThreatType GetThreatType() const { return threat_type_; } |
void CheckDownloadUrl(const std::vector<GURL>& url_chain) { |
BrowserThread::PostTask( |
BrowserThread::IO, FROM_HERE, |
- base::Bind(&TestSBClient::CheckDownloadUrlOnIOThread, |
- this, url_chain)); |
+ base::Bind(&TestSBClient::CheckDownloadUrlOnIOThread, this, url_chain)); |
content::RunMessageLoop(); // Will stop in OnCheckDownloadUrlResult. |
} |
@@ -896,8 +873,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckDownloadUrl) { |
EXPECT_EQ(SB_THREAT_TYPE_SAFE, client->GetThreatType()); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult(badbin_url, safe_browsing::BINURL, |
- &full_hash_result); |
+ GenUrlFullhashResult(badbin_url, BINURL, &full_hash_result); |
SetupResponseForUrl(badbin_url, full_hash_result); |
client->CheckDownloadUrl(badbin_urls); |
@@ -917,8 +893,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckUnwantedSoftwareUrl) { |
EXPECT_EQ(SB_THREAT_TYPE_SAFE, client->GetThreatType()); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult( |
- bad_url, safe_browsing::UNWANTEDURL, &full_hash_result); |
+ GenUrlFullhashResult(bad_url, UNWANTEDURL, &full_hash_result); |
SetupResponseForUrl(bad_url, full_hash_result); |
// Now, the bad_url is not safe since it is added to download |
@@ -939,8 +914,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckUnwantedSoftwareUrl) { |
scoped_refptr<TestSBClient> client(new TestSBClient); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult( |
- bad_url, safe_browsing::MALWARE, &full_hash_result); |
+ GenUrlFullhashResult(bad_url, MALWARE, &full_hash_result); |
SetupResponseForUrl(bad_url, full_hash_result); |
client->CheckBrowseUrl(bad_url); |
@@ -959,8 +933,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckBrowseUrl) { |
EXPECT_EQ(SB_THREAT_TYPE_SAFE, client->GetThreatType()); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult( |
- bad_url, safe_browsing::MALWARE, &full_hash_result); |
+ GenUrlFullhashResult(bad_url, MALWARE, &full_hash_result); |
SetupResponseForUrl(bad_url, full_hash_result); |
// Now, the bad_url is not safe since it is added to download |
@@ -982,8 +955,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckBrowseUrl) { |
scoped_refptr<TestSBClient> client(new TestSBClient); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult( |
- bad_url, safe_browsing::UNWANTEDURL, &full_hash_result); |
+ GenUrlFullhashResult(bad_url, UNWANTEDURL, &full_hash_result); |
SetupResponseForUrl(bad_url, full_hash_result); |
client->CheckBrowseUrl(bad_url); |
@@ -1007,8 +979,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, CheckDownloadUrlRedirects) { |
EXPECT_EQ(SB_THREAT_TYPE_SAFE, client->GetThreatType()); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult(badbin_url, safe_browsing::BINURL, |
- &full_hash_result); |
+ GenUrlFullhashResult(badbin_url, BINURL, &full_hash_result); |
SetupResponseForUrl(badbin_url, full_hash_result); |
client->CheckDownloadUrl(badbin_urls); |
@@ -1030,8 +1001,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, |
scoped_refptr<TestSBClient> client(new TestSBClient); |
SBFullHashResult full_hash_result; |
- GenUrlFullhashResult(badbin_url, safe_browsing::BINURL, |
- &full_hash_result); |
+ GenUrlFullhashResult(badbin_url, BINURL, &full_hash_result); |
SetupResponseForUrl(badbin_url, full_hash_result); |
client->CheckDownloadUrl(badbin_urls); |
@@ -1057,7 +1027,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, |
IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, StartAndStop) { |
CreateCSDService(); |
SafeBrowsingService* sb_service = g_browser_process->safe_browsing_service(); |
- safe_browsing::ClientSideDetectionService* csd_service = |
+ ClientSideDetectionService* csd_service = |
sb_service->safe_browsing_detection_service(); |
PrefService* pref_service = browser()->profile()->GetPrefs(); |
@@ -1078,7 +1048,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, StartAndStop) { |
temp_profile_dir_.path(), NULL, Profile::CREATE_MODE_SYNCHRONOUS)); |
ASSERT_TRUE(profile2.get() != NULL); |
StartupTaskRunnerServiceFactory::GetForProfile(profile2.get())-> |
- StartDeferredTaskRunners(); |
+ StartDeferredTaskRunners(); |
PrefService* pref_service2 = profile2->GetPrefs(); |
EXPECT_TRUE(pref_service2->GetBoolean(prefs::kSafeBrowsingEnabled)); |
// We don't expect the state to have changed, but if it did, wait for it. |
@@ -1156,7 +1126,7 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceShutdownTest, |
DontStartAfterShutdown) { |
CreateCSDService(); |
SafeBrowsingService* sb_service = g_browser_process->safe_browsing_service(); |
- safe_browsing::ClientSideDetectionService* csd_service = |
+ ClientSideDetectionService* csd_service = |
sb_service->safe_browsing_detection_service(); |
PrefService* pref_service = browser()->profile()->GetPrefs(); |
@@ -1250,8 +1220,8 @@ class SafeBrowsingDatabaseManagerCookieTest : public InProcessBrowserTest { |
} |
// Ensure the host value in the cookie file matches the test server we will |
// be connecting to. |
- sql::Statement smt(db.GetUniqueStatement( |
- "UPDATE cookies SET host_key = ?")); |
+ sql::Statement smt( |
+ db.GetUniqueStatement("UPDATE cookies SET host_key = ?")); |
if (!smt.is_valid()) { |
EXPECT_TRUE(false); |
return false; |
@@ -1276,8 +1246,8 @@ class SafeBrowsingDatabaseManagerCookieTest : public InProcessBrowserTest { |
SafeBrowsingService::GetCookieFilePathForTesting()); |
ASSERT_TRUE(db.Open(cookie_path)); |
- sql::Statement smt(db.GetUniqueStatement( |
- "SELECT name, value FROM cookies ORDER BY name")); |
+ sql::Statement smt( |
+ db.GetUniqueStatement("SELECT name, value FROM cookies ORDER BY name")); |
ASSERT_TRUE(smt.is_valid()); |
ASSERT_TRUE(smt.Step()); |
@@ -1355,8 +1325,9 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingDatabaseManagerCookieTest, |
content::Source<SafeBrowsingDatabaseManager>( |
sb_service_->database_manager().get())); |
BrowserThread::PostTask( |
- BrowserThread::IO, |
- FROM_HERE, |
+ BrowserThread::IO, FROM_HERE, |
base::Bind(&SafeBrowsingDatabaseManagerCookieTest::ForceUpdate, this)); |
observer.Wait(); |
} |
+ |
+} // namespace safe_browsing |