| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // This test creates a safebrowsing service using test safebrowsing database | 5 // This test creates a safebrowsing service using test safebrowsing database |
| 6 // and a test protocol manager. It is used to test logics in safebrowsing | 6 // and a test protocol manager. It is used to test logics in safebrowsing |
| 7 // service. | 7 // service. |
| 8 | 8 |
| 9 #include "chrome/browser/safe_browsing/safe_browsing_service.h" | 9 #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
| 10 | 10 |
| (...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 53 #include "components/prefs/pref_service.h" | 53 #include "components/prefs/pref_service.h" |
| 54 #include "components/safe_browsing/common/safebrowsing_switches.h" | 54 #include "components/safe_browsing/common/safebrowsing_switches.h" |
| 55 #include "components/safe_browsing_db/database_manager.h" | 55 #include "components/safe_browsing_db/database_manager.h" |
| 56 #include "components/safe_browsing_db/metadata.pb.h" | 56 #include "components/safe_browsing_db/metadata.pb.h" |
| 57 #include "components/safe_browsing_db/test_database_manager.h" | 57 #include "components/safe_browsing_db/test_database_manager.h" |
| 58 #include "components/safe_browsing_db/util.h" | 58 #include "components/safe_browsing_db/util.h" |
| 59 #include "components/safe_browsing_db/v4_database.h" | 59 #include "components/safe_browsing_db/v4_database.h" |
| 60 #include "components/safe_browsing_db/v4_feature_list.h" | 60 #include "components/safe_browsing_db/v4_feature_list.h" |
| 61 #include "components/safe_browsing_db/v4_get_hash_protocol_manager.h" | 61 #include "components/safe_browsing_db/v4_get_hash_protocol_manager.h" |
| 62 #include "components/safe_browsing_db/v4_protocol_manager_util.h" | 62 #include "components/safe_browsing_db/v4_protocol_manager_util.h" |
| 63 #include "components/subresource_filter/content/browser/content_subresource_filt
er_driver_factory.h" | |
| 64 #include "components/subresource_filter/core/browser/subresource_filter_features
.h" | 63 #include "components/subresource_filter/core/browser/subresource_filter_features
.h" |
| 65 #include "components/subresource_filter/core/browser/subresource_filter_features
_test_support.h" | 64 #include "components/subresource_filter/core/browser/subresource_filter_features
_test_support.h" |
| 66 #include "components/subresource_filter/core/common/test_ruleset_creator.h" | 65 #include "components/subresource_filter/core/common/test_ruleset_creator.h" |
| 67 #include "content/public/browser/interstitial_page.h" | 66 #include "content/public/browser/interstitial_page.h" |
| 68 #include "content/public/browser/navigation_entry.h" | 67 #include "content/public/browser/navigation_entry.h" |
| 69 #include "content/public/browser/render_frame_host.h" | 68 #include "content/public/browser/render_frame_host.h" |
| 70 #include "content/public/browser/web_contents.h" | 69 #include "content/public/browser/web_contents.h" |
| 71 #include "content/public/common/content_switches.h" | 70 #include "content/public/common/content_switches.h" |
| 72 #include "content/public/test/browser_test_utils.h" | 71 #include "content/public/test/browser_test_utils.h" |
| 73 #include "crypto/sha2.h" | 72 #include "crypto/sha2.h" |
| (...skipping 849 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 923 GURL phishing_url = embedded_test_server()->GetURL( | 922 GURL phishing_url = embedded_test_server()->GetURL( |
| 924 "/subresource_filter/frame_with_included_script.html"); | 923 "/subresource_filter/frame_with_included_script.html"); |
| 925 SBFullHashResult malware_full_hash; | 924 SBFullHashResult malware_full_hash; |
| 926 GenUrlFullHashResultWithMetadata(phishing_url, PHISH, | 925 GenUrlFullHashResultWithMetadata(phishing_url, PHISH, |
| 927 ThreatPatternType::SOCIAL_ENGINEERING_ADS, | 926 ThreatPatternType::SOCIAL_ENGINEERING_ADS, |
| 928 &malware_full_hash); | 927 &malware_full_hash); |
| 929 SetupResponseForUrl(phishing_url, malware_full_hash); | 928 SetupResponseForUrl(phishing_url, malware_full_hash); |
| 930 | 929 |
| 931 WebContents* web_contents = | 930 WebContents* web_contents = |
| 932 browser()->tab_strip_model()->GetActiveWebContents(); | 931 browser()->tab_strip_model()->GetActiveWebContents(); |
| 933 auto* driver_factory = subresource_filter:: | |
| 934 ContentSubresourceFilterDriverFactory::FromWebContents(web_contents); | |
| 935 driver_factory->set_configuration_for_testing( | |
| 936 subresource_filter::GetActiveConfiguration()); | |
| 937 | 932 |
| 938 // Navigation to a phishing page should trigger an interstitial. If the user | 933 // Navigation to a phishing page should trigger an interstitial. If the user |
| 939 // clicks through it, the page load should proceed, but with subresource | 934 // clicks through it, the page load should proceed, but with subresource |
| 940 // filtering activated. This is verified by probing whether `included_script` | 935 // filtering activated. This is verified by probing whether `included_script` |
| 941 // that is disallowed above indeed fails to load. | 936 // that is disallowed above indeed fails to load. |
| 942 EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(phishing_url))); | 937 EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(phishing_url))); |
| 943 ui_test_utils::NavigateToURL(browser(), phishing_url); | 938 ui_test_utils::NavigateToURL(browser(), phishing_url); |
| 944 ASSERT_TRUE(Mock::VerifyAndClearExpectations(&observer_)); | 939 ASSERT_TRUE(Mock::VerifyAndClearExpectations(&observer_)); |
| 945 ASSERT_TRUE(got_hit_report()); | 940 ASSERT_TRUE(got_hit_report()); |
| 946 content::WaitForInterstitialAttach(web_contents); | 941 content::WaitForInterstitialAttach(web_contents); |
| (...skipping 1050 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1997 ASSERT_NO_FATAL_FAILURE( | 1992 ASSERT_NO_FATAL_FAILURE( |
| 1998 test_ruleset_publisher.SetRuleset(test_ruleset_pair.unindexed)); | 1993 test_ruleset_publisher.SetRuleset(test_ruleset_pair.unindexed)); |
| 1999 | 1994 |
| 2000 GURL phishing_url = embedded_test_server()->GetURL( | 1995 GURL phishing_url = embedded_test_server()->GetURL( |
| 2001 "/subresource_filter/frame_with_included_script.html"); | 1996 "/subresource_filter/frame_with_included_script.html"); |
| 2002 MarkUrlForPhishingUnexpired(phishing_url, | 1997 MarkUrlForPhishingUnexpired(phishing_url, |
| 2003 ThreatPatternType::SOCIAL_ENGINEERING_ADS); | 1998 ThreatPatternType::SOCIAL_ENGINEERING_ADS); |
| 2004 | 1999 |
| 2005 WebContents* web_contents = | 2000 WebContents* web_contents = |
| 2006 browser()->tab_strip_model()->GetActiveWebContents(); | 2001 browser()->tab_strip_model()->GetActiveWebContents(); |
| 2007 auto* driver_factory = subresource_filter:: | |
| 2008 ContentSubresourceFilterDriverFactory::FromWebContents(web_contents); | |
| 2009 driver_factory->set_configuration_for_testing( | |
| 2010 subresource_filter::GetActiveConfiguration()); | |
| 2011 | 2002 |
| 2012 // Navigation to a phishing page should trigger an interstitial. If the user | 2003 // Navigation to a phishing page should trigger an interstitial. If the user |
| 2013 // clicks through it, the page load should proceed, but with subresource | 2004 // clicks through it, the page load should proceed, but with subresource |
| 2014 // filtering activated. This is verified by probing whether `included_script` | 2005 // filtering activated. This is verified by probing whether `included_script` |
| 2015 // that is disallowed above indeed fails to load. | 2006 // that is disallowed above indeed fails to load. |
| 2016 EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(phishing_url))); | 2007 EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(phishing_url))); |
| 2017 ui_test_utils::NavigateToURL(browser(), phishing_url); | 2008 ui_test_utils::NavigateToURL(browser(), phishing_url); |
| 2018 ASSERT_TRUE(Mock::VerifyAndClearExpectations(&observer_)); | 2009 ASSERT_TRUE(Mock::VerifyAndClearExpectations(&observer_)); |
| 2019 ASSERT_TRUE(got_hit_report()); | 2010 ASSERT_TRUE(got_hit_report()); |
| 2020 content::WaitForInterstitialAttach(web_contents); | 2011 content::WaitForInterstitialAttach(web_contents); |
| (...skipping 477 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2498 } | 2489 } |
| 2499 | 2490 |
| 2500 INSTANTIATE_TEST_CASE_P( | 2491 INSTANTIATE_TEST_CASE_P( |
| 2501 MaybeSetMetadata, | 2492 MaybeSetMetadata, |
| 2502 V4SafeBrowsingServiceMetadataTest, | 2493 V4SafeBrowsingServiceMetadataTest, |
| 2503 testing::Values(ThreatPatternType::NONE, | 2494 testing::Values(ThreatPatternType::NONE, |
| 2504 ThreatPatternType::MALWARE_LANDING, | 2495 ThreatPatternType::MALWARE_LANDING, |
| 2505 ThreatPatternType::MALWARE_DISTRIBUTION)); | 2496 ThreatPatternType::MALWARE_DISTRIBUTION)); |
| 2506 | 2497 |
| 2507 } // namespace safe_browsing | 2498 } // namespace safe_browsing |
| OLD | NEW |