| Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_unittest.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_unittest.cc
|
| index da750ebcc8d4e26b8551e704cea128725388ade4..5a5bc65226e40cd25de87ef9b846a7868956d18d 100644
|
| --- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_unittest.cc
|
| @@ -7,7 +7,7 @@
|
| #include "base/run_loop.h"
|
| #include "chrome/browser/profiles/profile.h"
|
| #include "chrome/browser/safe_browsing/safe_browsing_blocking_page.h"
|
| -#include "chrome/browser/safe_browsing/safe_browsing_service.h"
|
| +#include "chrome/browser/safe_browsing/test_safe_browsing_service.h"
|
| #include "chrome/browser/safe_browsing/threat_details.h"
|
| #include "chrome/browser/safe_browsing/ui_manager.h"
|
| #include "chrome/common/pref_names.h"
|
| @@ -53,26 +53,6 @@ class TestSafeBrowsingBlockingPage : public SafeBrowsingBlockingPage {
|
| }
|
| };
|
|
|
| -class TestSafeBrowsingUIManager: public SafeBrowsingUIManager {
|
| - public:
|
| - explicit TestSafeBrowsingUIManager(SafeBrowsingService* service)
|
| - : SafeBrowsingUIManager(service) {
|
| - }
|
| -
|
| - void SendSerializedThreatDetails(const std::string& serialized) override {
|
| - details_.push_back(serialized);
|
| - }
|
| -
|
| - std::list<std::string>* GetDetails() {
|
| - return &details_;
|
| - }
|
| -
|
| - private:
|
| - ~TestSafeBrowsingUIManager() override {}
|
| -
|
| - std::list<std::string> details_;
|
| -};
|
| -
|
| class TestSafeBrowsingBlockingPageFactory
|
| : public SafeBrowsingBlockingPageFactory {
|
| public:
|
| @@ -280,8 +260,8 @@ TEST_F(SafeBrowsingBlockingPageTest, MalwarePageDontProceed) {
|
| EXPECT_FALSE(controller().GetPendingEntry());
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page for a malware page and then proceeding.
|
| @@ -313,8 +293,8 @@ TEST_F(SafeBrowsingBlockingPageTest, MalwarePageProceed) {
|
| ASSERT_FALSE(InterstitialPage::GetInterstitialPage(web_contents()));
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page for a page that contains malware subresources
|
| @@ -349,8 +329,8 @@ TEST_F(SafeBrowsingBlockingPageTest, PageWithMalwareResourceDontProceed) {
|
| EXPECT_EQ(kGoogleURL, controller().GetActiveEntry()->GetURL().spec());
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page for a page that contains malware subresources
|
| @@ -381,8 +361,8 @@ TEST_F(SafeBrowsingBlockingPageTest, PageWithMalwareResourceProceed) {
|
| EXPECT_EQ(kGoodURL, controller().GetActiveEntry()->GetURL().spec());
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page for a page that contains multiple malware
|
| @@ -424,8 +404,8 @@ TEST_F(SafeBrowsingBlockingPageTest,
|
| EXPECT_EQ(kGoogleURL, controller().GetActiveEntry()->GetURL().spec());
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page for a page that contains multiple malware
|
| @@ -460,8 +440,8 @@ TEST_F(SafeBrowsingBlockingPageTest,
|
| EXPECT_EQ(OK, user_response());
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
|
|
| ResetUserResponse();
|
|
|
| @@ -482,8 +462,8 @@ TEST_F(SafeBrowsingBlockingPageTest,
|
|
|
| // No report should have been sent -- we don't create a report the
|
| // second time.
|
| - EXPECT_EQ(0u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(0u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page for a page that contains multiple malware
|
| @@ -514,8 +494,8 @@ TEST_F(SafeBrowsingBlockingPageTest, PageWithMultipleMalwareResourceProceed) {
|
| EXPECT_EQ(OK, user_response());
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
|
|
| ResetUserResponse();
|
|
|
| @@ -534,8 +514,8 @@ TEST_F(SafeBrowsingBlockingPageTest, PageWithMultipleMalwareResourceProceed) {
|
|
|
| // No report should have been sent -- we don't create a report the
|
| // second time.
|
| - EXPECT_EQ(0u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(0u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page then navigating back and forth to make sure the
|
| @@ -586,8 +566,8 @@ TEST_F(SafeBrowsingBlockingPageTest, NavigatingBackAndForth) {
|
| EXPECT_EQ(kBadURL, controller().GetActiveEntry()->GetURL().spec());
|
|
|
| // Two reports should have been sent.
|
| - EXPECT_EQ(2u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(2u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests that calling "don't proceed" after "proceed" has been called doesn't
|
| @@ -623,8 +603,8 @@ TEST_F(SafeBrowsingBlockingPageTest, ProceedThenDontProceed) {
|
| EXPECT_FALSE(GetSafeBrowsingBlockingPage());
|
|
|
| // Only one report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Tests showing a blocking page for a malware page with reports disabled.
|
| @@ -658,8 +638,8 @@ TEST_F(SafeBrowsingBlockingPageTest, MalwareReportsDisabled) {
|
| EXPECT_FALSE(controller().GetPendingEntry());
|
|
|
| // No report should have been sent.
|
| - EXPECT_EQ(0u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(0u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Test that toggling the checkbox has the anticipated effects.
|
| @@ -727,8 +707,8 @@ TEST_F(SafeBrowsingBlockingPageTest, ExtendedReportingNotShownOnSecurePage) {
|
| EXPECT_FALSE(GetSafeBrowsingBlockingPage());
|
|
|
| // No report should have been sent.
|
| - EXPECT_EQ(0u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(0u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Test that extended reporting option is not shown on blocking an HTTPS
|
| @@ -762,8 +742,8 @@ TEST_F(SafeBrowsingBlockingPageTest,
|
| EXPECT_FALSE(GetSafeBrowsingBlockingPage());
|
|
|
| // No report should have been sent.
|
| - EXPECT_EQ(0u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(0u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Test that extended reporting option is not shown on blocking an HTTP
|
| @@ -797,8 +777,8 @@ TEST_F(SafeBrowsingBlockingPageTest,
|
| EXPECT_FALSE(GetSafeBrowsingBlockingPage());
|
|
|
| // No report should have been sent.
|
| - EXPECT_EQ(0u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(0u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Test that extended reporting option is shown on blocking an HTTPS
|
| @@ -832,8 +812,8 @@ TEST_F(SafeBrowsingBlockingPageTest,
|
| EXPECT_FALSE(GetSafeBrowsingBlockingPage());
|
|
|
| // A report should have been sent.
|
| - EXPECT_EQ(1u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(1u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // Test that extended reporting option is not shown on blocking an HTTPS
|
| @@ -875,8 +855,8 @@ TEST_F(SafeBrowsingBlockingPageTest,
|
| EXPECT_FALSE(GetSafeBrowsingBlockingPage());
|
|
|
| // No report should have been sent.
|
| - EXPECT_EQ(0u, ui_manager_->GetDetails()->size());
|
| - ui_manager_->GetDetails()->clear();
|
| + EXPECT_EQ(0u, ui_manager_->GetThreatDetails()->size());
|
| + ui_manager_->GetThreatDetails()->clear();
|
| }
|
|
|
| // TODO(mattm): Add test for extended reporting not shown or sent in incognito
|
|
|