Index: chrome/browser/extensions/blacklist_check_unittest.cc |
diff --git a/chrome/browser/extensions/blacklist_check_unittest.cc b/chrome/browser/extensions/blacklist_check_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..8f243c5332f951f28c45b9458fbdc1fa6363c477 |
--- /dev/null |
+++ b/chrome/browser/extensions/blacklist_check_unittest.cc |
@@ -0,0 +1,99 @@ |
+// Copyright 2017 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/extensions/blacklist_check.h" |
+#include "base/bind.h" |
+#include "base/threading/thread_task_runner_handle.h" |
+#include "chrome/browser/extensions/blacklist.h" |
+#include "chrome/browser/extensions/test_blacklist.h" |
+#include "chrome/browser/extensions/test_extension_prefs.h" |
+#include "content/public/test/test_browser_thread_bundle.h" |
+#include "extensions/browser/extension_prefs.h" |
+#include "extensions/browser/preload_check.h" |
+#include "extensions/browser/preload_check_test_util.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace extensions { |
+namespace { |
+ |
+class BlacklistCheckTest : public testing::Test { |
+ public: |
+ BlacklistCheckTest() |
+ : test_prefs_(base::ThreadTaskRunnerHandle::Get()), |
+ blacklist_(test_prefs_.prefs()) {} |
+ |
+ protected: |
+ void SetUp() override { |
+ test_blacklist_.Attach(&blacklist_); |
+ extension_ = test_prefs_.AddExtension("foo"); |
+ } |
+ |
+ void SetBlacklistState(BlacklistState state) { |
+ test_blacklist_.SetBlacklistState(extension_->id(), state, true); |
+ } |
+ |
+ void StartBlacklistCheck(PreloadCheckObserver* observer) { |
+ blacklist_check_ = |
+ base::MakeUnique<BlacklistCheck>(&blacklist_, extension_.get()); |
+ blacklist_check_->Start(base::Bind(&PreloadCheckObserver::OnCheckComplete, |
+ base::Unretained(observer))); |
+ } |
+ |
+ void StopBlacklistCheck() { blacklist_check_.reset(); } |
+ |
+ BlacklistCheck* blacklist_check() { return blacklist_check_.get(); } |
+ |
+ private: |
+ content::TestBrowserThreadBundle browser_thread_bundle_; |
+ TestExtensionPrefs test_prefs_; |
+ Blacklist blacklist_; |
+ TestBlacklist test_blacklist_; |
+ scoped_refptr<Extension> extension_; |
+ std::unique_ptr<BlacklistCheck> blacklist_check_; |
+}; |
+ |
+} // namespace |
+ |
+// Tests that the blacklist check identifies a blacklisted extension. |
+TEST_F(BlacklistCheckTest, BlacklistedMalware) { |
+ SetBlacklistState(BLACKLISTED_MALWARE); |
+ |
+ PreloadCheckObserver observer; |
+ StartBlacklistCheck(&observer); |
+ observer.Wait(); |
+ |
+ EXPECT_EQ(1, observer.call_count()); |
+ EXPECT_EQ(1u, observer.errors().size()); |
+ EXPECT_EQ(1u, observer.errors().count(PreloadCheck::BLACKLISTED_ID)); |
+ base::string16 message; |
+ EXPECT_FALSE(blacklist_check()->GetErrorMessage(&message)); |
+} |
+ |
+// Tests that the blacklist check ignores a non-blacklisted extension. |
+TEST_F(BlacklistCheckTest, Pass) { |
+ SetBlacklistState(NOT_BLACKLISTED); |
+ |
+ PreloadCheckObserver observer; |
+ StartBlacklistCheck(&observer); |
+ observer.Wait(); |
+ |
+ EXPECT_EQ(1, observer.call_count()); |
+ EXPECT_EQ(0u, observer.errors().size()); |
+ base::string16 message; |
+ EXPECT_FALSE(blacklist_check()->GetErrorMessage(&message)); |
+} |
+ |
+// Tests that destroying the check after starting it does not cause errors. |
+TEST_F(BlacklistCheckTest, StopCheck) { |
+ SetBlacklistState(BLACKLISTED_MALWARE); |
+ |
+ PreloadCheckObserver observer; |
+ StartBlacklistCheck(&observer); |
+ StopBlacklistCheck(); |
+ observer.Wait(); |
+ |
+ EXPECT_EQ(0, observer.call_count()); |
+} |
+ |
+} // namespace extensions |