| Index: components/safe_browsing_db/v4_update_protocol_manager_unittest.cc
|
| diff --git a/components/safe_browsing_db/v4_update_protocol_manager_unittest.cc b/components/safe_browsing_db/v4_update_protocol_manager_unittest.cc
|
| index 336c7e7db2a64c2d58ce9afdad545c74fab5f50a..92af5fa6404a902e27854f6589e45855431dd91c 100644
|
| --- a/components/safe_browsing_db/v4_update_protocol_manager_unittest.cc
|
| +++ b/components/safe_browsing_db/v4_update_protocol_manager_unittest.cc
|
| @@ -58,8 +58,6 @@ class V4UpdateProtocolManagerTest : public testing::Test {
|
| }
|
|
|
| std::unique_ptr<V4UpdateProtocolManager> CreateProtocolManager(
|
| - const base::hash_map<UpdateListIdentifier, std::string>
|
| - current_list_states,
|
| const std::vector<ListUpdateResponse>& expected_lurs) {
|
| V4ProtocolConfig config;
|
| config.client_name = kClient;
|
| @@ -67,28 +65,27 @@ class V4UpdateProtocolManagerTest : public testing::Test {
|
| config.key_param = kKeyParam;
|
| config.disable_auto_update = false;
|
| return V4UpdateProtocolManager::Create(
|
| - NULL, config, current_list_states,
|
| + NULL, config,
|
| base::Bind(&V4UpdateProtocolManagerTest::ValidateGetUpdatesResults,
|
| base::Unretained(this), expected_lurs));
|
| }
|
|
|
| - void SetupCurrentListStates(
|
| - base::hash_map<UpdateListIdentifier, std::string>* current_list_states) {
|
| + void SetupStoreStates(StoreStateMap* store_state_map) {
|
| UpdateListIdentifier list_identifier;
|
| list_identifier.platform_type = WINDOWS_PLATFORM;
|
| list_identifier.threat_entry_type = URL;
|
| list_identifier.threat_type = MALWARE_THREAT;
|
| - current_list_states->insert({list_identifier, "initial_state_1"});
|
| + store_state_map->insert({list_identifier, "initial_state_1"});
|
|
|
| list_identifier.platform_type = WINDOWS_PLATFORM;
|
| list_identifier.threat_entry_type = URL;
|
| list_identifier.threat_type = UNWANTED_SOFTWARE;
|
| - current_list_states->insert({list_identifier, "initial_state_2"});
|
| + store_state_map->insert({list_identifier, "initial_state_2"});
|
|
|
| list_identifier.platform_type = WINDOWS_PLATFORM;
|
| list_identifier.threat_entry_type = EXECUTABLE;
|
| list_identifier.threat_type = MALWARE_THREAT;
|
| - current_list_states->insert({list_identifier, "initial_state_3"});
|
| + store_state_map->insert({list_identifier, "initial_state_3"});
|
| }
|
|
|
| void SetupExpectedListUpdateResponse(
|
| @@ -145,16 +142,17 @@ TEST_F(V4UpdateProtocolManagerTest, TestGetUpdatesErrorHandlingNetwork) {
|
| new base::TestSimpleTaskRunner());
|
| base::ThreadTaskRunnerHandle runner_handler(runner);
|
| net::TestURLFetcherFactory factory;
|
| - const base::hash_map<UpdateListIdentifier, std::string> current_list_states;
|
| const std::vector<ListUpdateResponse> expected_lurs;
|
| std::unique_ptr<V4UpdateProtocolManager> pm(
|
| - CreateProtocolManager(current_list_states, expected_lurs));
|
| + CreateProtocolManager(expected_lurs));
|
| runner->ClearPendingTasks();
|
|
|
| // Initial state. No errors.
|
| EXPECT_EQ(0ul, pm->update_error_count_);
|
| EXPECT_EQ(1ul, pm->update_back_off_mult_);
|
| expect_callback_to_be_called_ = false;
|
| + StoreStateMap store_state_map;
|
| + pm->set_store_state_map(&store_state_map);
|
| pm->IssueUpdateRequest();
|
|
|
| EXPECT_FALSE(pm->IsUpdateScheduled());
|
| @@ -180,15 +178,16 @@ TEST_F(V4UpdateProtocolManagerTest, TestGetUpdatesErrorHandlingResponseCode) {
|
| base::ThreadTaskRunnerHandle runner_handler(runner);
|
| net::TestURLFetcherFactory factory;
|
| const std::vector<ListUpdateResponse> expected_lurs;
|
| - const base::hash_map<UpdateListIdentifier, std::string> current_list_states;
|
| std::unique_ptr<V4UpdateProtocolManager> pm(
|
| - CreateProtocolManager(current_list_states, expected_lurs));
|
| + CreateProtocolManager(expected_lurs));
|
| runner->ClearPendingTasks();
|
|
|
| // Initial state. No errors.
|
| EXPECT_EQ(0ul, pm->update_error_count_);
|
| EXPECT_EQ(1ul, pm->update_back_off_mult_);
|
| expect_callback_to_be_called_ = false;
|
| + StoreStateMap store_state_map;
|
| + pm->set_store_state_map(&store_state_map);
|
| pm->IssueUpdateRequest();
|
|
|
| EXPECT_FALSE(pm->IsUpdateScheduled());
|
| @@ -216,16 +215,17 @@ TEST_F(V4UpdateProtocolManagerTest, TestGetUpdatesNoError) {
|
| net::TestURLFetcherFactory factory;
|
| std::vector<ListUpdateResponse> expected_lurs;
|
| SetupExpectedListUpdateResponse(&expected_lurs);
|
| - base::hash_map<UpdateListIdentifier, std::string> current_list_states;
|
| - SetupCurrentListStates(¤t_list_states);
|
| std::unique_ptr<V4UpdateProtocolManager> pm(
|
| - CreateProtocolManager(current_list_states, expected_lurs));
|
| + CreateProtocolManager(expected_lurs));
|
| runner->ClearPendingTasks();
|
|
|
| // Initial state. No errors.
|
| EXPECT_EQ(0ul, pm->update_error_count_);
|
| EXPECT_EQ(1ul, pm->update_back_off_mult_);
|
| expect_callback_to_be_called_ = true;
|
| + StoreStateMap store_state_map;
|
| + SetupStoreStates(&store_state_map);
|
| + pm->set_store_state_map(&store_state_map);
|
| pm->IssueUpdateRequest();
|
|
|
| EXPECT_FALSE(pm->IsUpdateScheduled());
|
| @@ -252,16 +252,17 @@ TEST_F(V4UpdateProtocolManagerTest, TestGetUpdatesWithOneBackoff) {
|
| net::TestURLFetcherFactory factory;
|
| std::vector<ListUpdateResponse> expected_lurs;
|
| SetupExpectedListUpdateResponse(&expected_lurs);
|
| - base::hash_map<UpdateListIdentifier, std::string> current_list_states;
|
| - SetupCurrentListStates(¤t_list_states);
|
| std::unique_ptr<V4UpdateProtocolManager> pm(
|
| - CreateProtocolManager(current_list_states, expected_lurs));
|
| + CreateProtocolManager(expected_lurs));
|
| runner->ClearPendingTasks();
|
|
|
| // Initial state. No errors.
|
| EXPECT_EQ(0ul, pm->update_error_count_);
|
| EXPECT_EQ(1ul, pm->update_back_off_mult_);
|
| expect_callback_to_be_called_ = false;
|
| + StoreStateMap store_state_map;
|
| + SetupStoreStates(&store_state_map);
|
| + pm->set_store_state_map(&store_state_map);
|
| pm->IssueUpdateRequest();
|
|
|
| EXPECT_FALSE(pm->IsUpdateScheduled());
|
|
|