| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // This test creates a safebrowsing service using test safebrowsing database | 5 // This test creates a safebrowsing service using test safebrowsing database |
| 6 // and a test protocol manager. It is used to test logics in safebrowsing | 6 // and a test protocol manager. It is used to test logics in safebrowsing |
| 7 // service. | 7 // service. |
| 8 | 8 |
| 9 #include "chrome/browser/safe_browsing/safe_browsing_service.h" | 9 #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
| 10 | 10 |
| (...skipping 133 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 144 config.url_prefix = url_prefix; | 144 config.url_prefix = url_prefix; |
| 145 // Makes sure the auto update is not triggered. The tests will force the | 145 // Makes sure the auto update is not triggered. The tests will force the |
| 146 // update when needed. | 146 // update when needed. |
| 147 config.disable_auto_update = true; | 147 config.disable_auto_update = true; |
| 148 config.client_name = "browser_tests"; | 148 config.client_name = "browser_tests"; |
| 149 factory->SetTestProtocolConfig(config); | 149 factory->SetTestProtocolConfig(config); |
| 150 } | 150 } |
| 151 | 151 |
| 152 class FakeSafeBrowsingUIManager : public TestSafeBrowsingUIManager { | 152 class FakeSafeBrowsingUIManager : public TestSafeBrowsingUIManager { |
| 153 public: | 153 public: |
| 154 void MaybeReportSafeBrowsingHit( | 154 void MaybeReportSafeBrowsingHit(const safe_browsing::HitReport& hit_report, |
| 155 const safe_browsing::HitReport& hit_report) override { | 155 content::WebContents* web_contents) override { |
| 156 EXPECT_FALSE(got_hit_report_); | 156 EXPECT_FALSE(got_hit_report_); |
| 157 got_hit_report_ = true; | 157 got_hit_report_ = true; |
| 158 hit_report_ = hit_report; | 158 hit_report_ = hit_report; |
| 159 SafeBrowsingUIManager::MaybeReportSafeBrowsingHit(hit_report); | 159 SafeBrowsingUIManager::MaybeReportSafeBrowsingHit(hit_report, web_contents); |
| 160 } | 160 } |
| 161 | 161 |
| 162 bool got_hit_report_ = false; | 162 bool got_hit_report_ = false; |
| 163 safe_browsing::HitReport hit_report_; | 163 safe_browsing::HitReport hit_report_; |
| 164 | 164 |
| 165 private: | 165 private: |
| 166 ~FakeSafeBrowsingUIManager() override {} | 166 ~FakeSafeBrowsingUIManager() override {} |
| 167 }; | 167 }; |
| 168 | 168 |
| 169 // A SafeBrowingDatabase class that allows us to inject the malicious URLs. | 169 // A SafeBrowingDatabase class that allows us to inject the malicious URLs. |
| (...skipping 2176 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2346 } | 2346 } |
| 2347 | 2347 |
| 2348 INSTANTIATE_TEST_CASE_P( | 2348 INSTANTIATE_TEST_CASE_P( |
| 2349 MaybeSetMetadata, | 2349 MaybeSetMetadata, |
| 2350 V4SafeBrowsingServiceMetadataTest, | 2350 V4SafeBrowsingServiceMetadataTest, |
| 2351 testing::Values(ThreatPatternType::NONE, | 2351 testing::Values(ThreatPatternType::NONE, |
| 2352 ThreatPatternType::MALWARE_LANDING, | 2352 ThreatPatternType::MALWARE_LANDING, |
| 2353 ThreatPatternType::MALWARE_DISTRIBUTION)); | 2353 ThreatPatternType::MALWARE_DISTRIBUTION)); |
| 2354 | 2354 |
| 2355 } // namespace safe_browsing | 2355 } // namespace safe_browsing |
| OLD | NEW |