| Index: chrome/browser/safe_browsing/incident_reporting/module_load_analyzer_win_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/incident_reporting/module_load_analyzer_win_unittest.cc b/chrome/browser/safe_browsing/incident_reporting/module_load_analyzer_win_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..fe90d2841e4a8bbe3092d51d41c4f144df6d2417
|
| --- /dev/null
|
| +++ b/chrome/browser/safe_browsing/incident_reporting/module_load_analyzer_win_unittest.cc
|
| @@ -0,0 +1,123 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chrome/browser/safe_browsing/incident_reporting/module_load_analyzer.h"
|
| +
|
| +#include <vector>
|
| +
|
| +#include "base/files/file_path.h"
|
| +#include "base/path_service.h"
|
| +#include "base/run_loop.h"
|
| +#include "base/scoped_native_library.h"
|
| +#include "base/strings/string_util.h"
|
| +#include "chrome/browser/safe_browsing/incident_reporting/incident.h"
|
| +#include "chrome/browser/safe_browsing/incident_reporting/incident_receiver.h"
|
| +#include "chrome/browser/safe_browsing/incident_reporting/mock_incident_receiver.h"
|
| +#include "chrome/common/safe_browsing/csd.pb.h"
|
| +#include "components/safe_browsing_db/database_manager.h"
|
| +#include "components/safe_browsing_db/test_database_manager.h"
|
| +#include "content/public/test/test_browser_thread_bundle.h"
|
| +#include "content/public/test/test_utils.h"
|
| +#include "testing/gmock/include/gmock/gmock.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +using ::testing::IsNull;
|
| +using ::testing::Return;
|
| +using ::testing::StrictMock;
|
| +using ::testing::_;
|
| +
|
| +namespace safe_browsing {
|
| +
|
| +namespace {
|
| +const char kWhitelistedModuleName[] = "USER32.dll";
|
| +const char kLowerWhitelistedModuleName[] = "user32.dll";
|
| +
|
| +const char kNonWhitelistedModuleName[] = "blacklist_test_dll_1.dll";
|
| +
|
| +class MockSafeBrowsingDatabaseManager : public TestSafeBrowsingDatabaseManager {
|
| + public:
|
| + MockSafeBrowsingDatabaseManager() {}
|
| +
|
| + MOCK_METHOD1(MatchModuleWhitelistString, bool(const std::string&));
|
| +
|
| + private:
|
| + virtual ~MockSafeBrowsingDatabaseManager() {}
|
| + DISALLOW_COPY_AND_ASSIGN(MockSafeBrowsingDatabaseManager);
|
| +};
|
| +
|
| +class ModuleLoadAnalayzerTest : public testing::Test {
|
| + protected:
|
| + ModuleLoadAnalayzerTest()
|
| + : mock_incident_receiver_(
|
| + new StrictMock<safe_browsing::MockIncidentReceiver>()),
|
| + mock_safe_browsing_database_manager_(
|
| + new MockSafeBrowsingDatabaseManager()),
|
| + module_load_analyzer_(mock_safe_browsing_database_manager_) {
|
| + // Accept all dlls except kNonWhitelistedModuleName.
|
| + EXPECT_CALL(*mock_safe_browsing_database_manager_,
|
| + MatchModuleWhitelistString(_))
|
| + .WillRepeatedly(Return(true));
|
| + EXPECT_CALL(*mock_safe_browsing_database_manager_,
|
| + MatchModuleWhitelistString(kNonWhitelistedModuleName))
|
| + .WillRepeatedly(Return(false));
|
| + }
|
| +
|
| + void ExpectIncident(const std::string& module_to_load) {
|
| + base::FilePath current_dir;
|
| + ASSERT_TRUE(PathService::Get(base::DIR_EXE, ¤t_dir));
|
| + base::ScopedNativeLibrary dll1(current_dir.AppendASCII(module_to_load));
|
| +
|
| + scoped_ptr<Incident> incident;
|
| + EXPECT_CALL(*mock_incident_receiver_, DoAddIncidentForProcess(_))
|
| + .WillOnce(TakeIncident(&incident));
|
| +
|
| + module_load_analyzer_.VerifyModuleLoadState(
|
| + make_scoped_ptr(mock_incident_receiver_));
|
| +
|
| + base::RunLoop().RunUntilIdle();
|
| + content::RunAllBlockingPoolTasksUntilIdle();
|
| +
|
| + ASSERT_TRUE(incident);
|
| + scoped_ptr<ClientIncidentReport_IncidentData> incident_data =
|
| + incident->TakePayload();
|
| + ASSERT_TRUE(incident_data->has_suspicious_module());
|
| + const ClientIncidentReport_IncidentData_SuspiciousModuleIncident&
|
| + suspicious_module_incident = incident_data->suspicious_module();
|
| + EXPECT_TRUE(suspicious_module_incident.has_digest());
|
| + EXPECT_TRUE(base::StartsWith(suspicious_module_incident.path(),
|
| + module_to_load, base::CompareCase::SENSITIVE));
|
| + }
|
| +
|
| + void ExpectNoIncident(const std::string& module_to_load) {
|
| + base::FilePath current_dir;
|
| + ASSERT_TRUE(PathService::Get(base::DIR_EXE, ¤t_dir));
|
| + base::ScopedNativeLibrary dll1(current_dir.AppendASCII(module_to_load));
|
| +
|
| + EXPECT_CALL(*mock_incident_receiver_, DoAddIncidentForProcess(_)).Times(0);
|
| +
|
| + module_load_analyzer_.VerifyModuleLoadState(
|
| + make_scoped_ptr(mock_incident_receiver_));
|
| +
|
| + base::RunLoop().RunUntilIdle();
|
| + content::RunAllBlockingPoolTasksUntilIdle();
|
| + }
|
| +
|
| + content::TestBrowserThreadBundle browser_thread_bundle_;
|
| + StrictMock<safe_browsing::MockIncidentReceiver>* mock_incident_receiver_;
|
| + scoped_refptr<MockSafeBrowsingDatabaseManager>
|
| + mock_safe_browsing_database_manager_;
|
| + ModuleLoadAnalyzer module_load_analyzer_;
|
| +};
|
| +
|
| +} // namespace
|
| +
|
| +TEST_F(ModuleLoadAnalayzerTest, TestWhitelistedDLLs) {
|
| + ExpectNoIncident(kWhitelistedModuleName);
|
| +}
|
| +
|
| +TEST_F(ModuleLoadAnalayzerTest, TestNonWhitelistedDLLs) {
|
| + ExpectIncident(kNonWhitelistedModuleName);
|
| +}
|
| +
|
| +} // namespace safe_browsing
|
|
|