| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/safe_browsing/client_side_detection_host.h" | 5 #include "chrome/browser/safe_browsing/client_side_detection_host.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 #include <tuple> | 8 #include <tuple> |
| 9 #include <utility> | 9 #include <utility> |
| 10 | 10 |
| (...skipping 543 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 554 UnsafeResource resource; | 554 UnsafeResource resource; |
| 555 EXPECT_CALL(*ui_manager_.get(), DisplayBlockingPage(_)) | 555 EXPECT_CALL(*ui_manager_.get(), DisplayBlockingPage(_)) |
| 556 .WillOnce(SaveArg<0>(&resource)); | 556 .WillOnce(SaveArg<0>(&resource)); |
| 557 cb.Run(phishing_url, true); | 557 cb.Run(phishing_url, true); |
| 558 | 558 |
| 559 base::RunLoop().RunUntilIdle(); | 559 base::RunLoop().RunUntilIdle(); |
| 560 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); | 560 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); |
| 561 EXPECT_EQ(phishing_url, resource.url); | 561 EXPECT_EQ(phishing_url, resource.url); |
| 562 EXPECT_EQ(phishing_url, resource.original_url); | 562 EXPECT_EQ(phishing_url, resource.original_url); |
| 563 EXPECT_FALSE(resource.is_subresource); | 563 EXPECT_FALSE(resource.is_subresource); |
| 564 EXPECT_EQ(SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL, resource.threat_type); | 564 EXPECT_EQ(SB_THREAT_TYPE_URL_CLIENT_SIDE_PHISHING, resource.threat_type); |
| 565 EXPECT_EQ(ThreatSource::CLIENT_SIDE_DETECTION, resource.threat_source); | 565 EXPECT_EQ(ThreatSource::CLIENT_SIDE_DETECTION, resource.threat_source); |
| 566 EXPECT_EQ(web_contents(), resource.web_contents_getter.Run()); | 566 EXPECT_EQ(web_contents(), resource.web_contents_getter.Run()); |
| 567 | 567 |
| 568 // Make sure the client object will be deleted. | 568 // Make sure the client object will be deleted. |
| 569 BrowserThread::PostTask( | 569 BrowserThread::PostTask( |
| 570 BrowserThread::IO, FROM_HERE, | 570 BrowserThread::IO, FROM_HERE, |
| 571 base::BindOnce(&MockSafeBrowsingUIManager::InvokeOnBlockingPageComplete, | 571 base::BindOnce(&MockSafeBrowsingUIManager::InvokeOnBlockingPageComplete, |
| 572 ui_manager_, resource.callback)); | 572 ui_manager_, resource.callback)); |
| 573 } | 573 } |
| 574 | 574 |
| (...skipping 65 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 640 .WillOnce(SaveArg<0>(&resource)); | 640 .WillOnce(SaveArg<0>(&resource)); |
| 641 | 641 |
| 642 cb.Run(phishing_url, true); // Should have no effect. | 642 cb.Run(phishing_url, true); // Should have no effect. |
| 643 cb_other.Run(other_phishing_url, true); // Should show interstitial. | 643 cb_other.Run(other_phishing_url, true); // Should show interstitial. |
| 644 | 644 |
| 645 base::RunLoop().RunUntilIdle(); | 645 base::RunLoop().RunUntilIdle(); |
| 646 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); | 646 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); |
| 647 EXPECT_EQ(other_phishing_url, resource.url); | 647 EXPECT_EQ(other_phishing_url, resource.url); |
| 648 EXPECT_EQ(other_phishing_url, resource.original_url); | 648 EXPECT_EQ(other_phishing_url, resource.original_url); |
| 649 EXPECT_FALSE(resource.is_subresource); | 649 EXPECT_FALSE(resource.is_subresource); |
| 650 EXPECT_EQ(SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL, resource.threat_type); | 650 EXPECT_EQ(SB_THREAT_TYPE_URL_CLIENT_SIDE_PHISHING, resource.threat_type); |
| 651 EXPECT_EQ(ThreatSource::CLIENT_SIDE_DETECTION, resource.threat_source); | 651 EXPECT_EQ(ThreatSource::CLIENT_SIDE_DETECTION, resource.threat_source); |
| 652 EXPECT_EQ(web_contents(), resource.web_contents_getter.Run()); | 652 EXPECT_EQ(web_contents(), resource.web_contents_getter.Run()); |
| 653 | 653 |
| 654 // Make sure the client object will be deleted. | 654 // Make sure the client object will be deleted. |
| 655 BrowserThread::PostTask( | 655 BrowserThread::PostTask( |
| 656 BrowserThread::IO, FROM_HERE, | 656 BrowserThread::IO, FROM_HERE, |
| 657 base::BindOnce(&MockSafeBrowsingUIManager::InvokeOnBlockingPageComplete, | 657 base::BindOnce(&MockSafeBrowsingUIManager::InvokeOnBlockingPageComplete, |
| 658 ui_manager_, resource.callback)); | 658 ui_manager_, resource.callback)); |
| 659 } | 659 } |
| 660 | 660 |
| (...skipping 192 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 853 UnsafeResource resource; | 853 UnsafeResource resource; |
| 854 EXPECT_CALL(*ui_manager_.get(), DisplayBlockingPage(_)) | 854 EXPECT_CALL(*ui_manager_.get(), DisplayBlockingPage(_)) |
| 855 .WillOnce(SaveArg<0>(&resource)); | 855 .WillOnce(SaveArg<0>(&resource)); |
| 856 cb.Run(malware_landing_url, malware_ip_url, true); | 856 cb.Run(malware_landing_url, malware_ip_url, true); |
| 857 | 857 |
| 858 base::RunLoop().RunUntilIdle(); | 858 base::RunLoop().RunUntilIdle(); |
| 859 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); | 859 EXPECT_TRUE(Mock::VerifyAndClear(ui_manager_.get())); |
| 860 EXPECT_EQ(malware_ip_url, resource.url); | 860 EXPECT_EQ(malware_ip_url, resource.url); |
| 861 EXPECT_EQ(malware_landing_url, resource.original_url); | 861 EXPECT_EQ(malware_landing_url, resource.original_url); |
| 862 EXPECT_TRUE(resource.is_subresource); | 862 EXPECT_TRUE(resource.is_subresource); |
| 863 EXPECT_EQ(SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL, resource.threat_type); | 863 EXPECT_EQ(SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE, resource.threat_type); |
| 864 EXPECT_EQ(ThreatSource::CLIENT_SIDE_DETECTION, resource.threat_source); | 864 EXPECT_EQ(ThreatSource::CLIENT_SIDE_DETECTION, resource.threat_source); |
| 865 EXPECT_EQ(web_contents(), resource.web_contents_getter.Run()); | 865 EXPECT_EQ(web_contents(), resource.web_contents_getter.Run()); |
| 866 | 866 |
| 867 // Make sure the client object will be deleted. | 867 // Make sure the client object will be deleted. |
| 868 BrowserThread::PostTask( | 868 BrowserThread::PostTask( |
| 869 BrowserThread::IO, FROM_HERE, | 869 BrowserThread::IO, FROM_HERE, |
| 870 base::BindOnce(&MockSafeBrowsingUIManager::InvokeOnBlockingPageComplete, | 870 base::BindOnce(&MockSafeBrowsingUIManager::InvokeOnBlockingPageComplete, |
| 871 ui_manager_, resource.callback)); | 871 ui_manager_, resource.callback)); |
| 872 } | 872 } |
| 873 | 873 |
| (...skipping 318 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1192 EXPECT_EQ(url, resource.url); | 1192 EXPECT_EQ(url, resource.url); |
| 1193 EXPECT_EQ(url, resource.original_url); | 1193 EXPECT_EQ(url, resource.original_url); |
| 1194 | 1194 |
| 1195 ExpectStartPhishingDetection(NULL); | 1195 ExpectStartPhishingDetection(NULL); |
| 1196 | 1196 |
| 1197 // Showing a phishing warning will invalidate all the weak pointers which | 1197 // Showing a phishing warning will invalidate all the weak pointers which |
| 1198 // means we will not extract malware features. | 1198 // means we will not extract malware features. |
| 1199 ExpectShouldClassifyForMalwareResult(false); | 1199 ExpectShouldClassifyForMalwareResult(false); |
| 1200 } | 1200 } |
| 1201 } // namespace safe_browsing | 1201 } // namespace safe_browsing |
| OLD | NEW |