Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(120)

Side by Side Diff: chrome/browser/safe_browsing/ping_manager_unittest.cc

Issue 172393005: [safe browsing] Remove stale BINHASH code. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Update histogram info in comment. Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 5
6 #include "base/logging.h" 6 #include "base/logging.h"
7 #include "base/strings/stringprintf.h" 7 #include "base/strings/stringprintf.h"
8 #include "base/time/time.h" 8 #include "base/time/time.h"
9 #include "chrome/browser/safe_browsing/ping_manager.h" 9 #include "chrome/browser/safe_browsing/ping_manager.h"
10 #include "google_apis/google_api_keys.h" 10 #include "google_apis/google_api_keys.h"
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after
64 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&" 64 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
65 "pver=2.2" + key_param_ + "&evts=binurlhit&" 65 "pver=2.2" + key_param_ + "&evts=binurlhit&"
66 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" 66 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
67 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 67 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
68 "url.com%2F&evtb=0", 68 "url.com%2F&evtb=0",
69 pm.SafeBrowsingHitUrl( 69 pm.SafeBrowsingHitUrl(
70 malicious_url, page_url, referrer_url, 70 malicious_url, page_url, referrer_url,
71 false, SB_THREAT_TYPE_BINARY_MALWARE_URL).spec()); 71 false, SB_THREAT_TYPE_BINARY_MALWARE_URL).spec());
72 72
73 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&" 73 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
74 "pver=2.2" + key_param_ + "&evts=binhashhit&"
75 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
76 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
77 "url.com%2F&evtb=0",
78 pm.SafeBrowsingHitUrl(
79 malicious_url, page_url, referrer_url,
80 false, SB_THREAT_TYPE_BINARY_MALWARE_HASH).spec());
81
82 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
83 "pver=2.2" + key_param_ + "&evts=phishcsdhit&" 74 "pver=2.2" + key_param_ + "&evts=phishcsdhit&"
84 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" 75 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
85 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 76 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
86 "url.com%2F&evtb=0", 77 "url.com%2F&evtb=0",
87 pm.SafeBrowsingHitUrl( 78 pm.SafeBrowsingHitUrl(
88 malicious_url, page_url, referrer_url, 79 malicious_url, page_url, referrer_url,
89 false, SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL).spec()); 80 false, SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL).spec());
90 81
91 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&" 82 EXPECT_EQ("https://prefix.com/foo/report?client=unittest&appver=1.0&"
92 "pver=2.2" + key_param_ + "&evts=malcsdhit&" 83 "pver=2.2" + key_param_ + "&evts=malcsdhit&"
93 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" 84 "evtd=http%3A%2F%2Fmalicious.url.com%2F&"
94 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." 85 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
95 "url.com%2F&evtb=1", 86 "url.com%2F&evtb=1",
96 pm.SafeBrowsingHitUrl( 87 pm.SafeBrowsingHitUrl(
97 malicious_url, page_url, referrer_url, 88 malicious_url, page_url, referrer_url,
98 true, SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL).spec()); 89 true, SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL).spec());
99 } 90 }
100 91
101 TEST_F(SafeBrowsingPingManagerTest, TestMalwareDetailsUrl) { 92 TEST_F(SafeBrowsingPingManagerTest, TestMalwareDetailsUrl) {
102 SafeBrowsingProtocolConfig config; 93 SafeBrowsingProtocolConfig config;
103 config.client_name = kClient; 94 config.client_name = kClient;
104 config.url_prefix = kUrlPrefix; 95 config.url_prefix = kUrlPrefix;
105 SafeBrowsingPingManager pm(NULL, config); 96 SafeBrowsingPingManager pm(NULL, config);
106 97
107 pm.version_ = kAppVer; 98 pm.version_ = kAppVer;
108 EXPECT_EQ("https://prefix.com/foo/clientreport/malware?" 99 EXPECT_EQ("https://prefix.com/foo/clientreport/malware?"
109 "client=unittest&appver=1.0&pver=1.0" + key_param_, 100 "client=unittest&appver=1.0&pver=1.0" + key_param_,
110 pm.MalwareDetailsUrl().spec()); 101 pm.MalwareDetailsUrl().spec());
111 } 102 }
OLDNEW
« no previous file with comments | « chrome/browser/safe_browsing/ping_manager.cc ('k') | chrome/browser/safe_browsing/protocol_parser.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698