OLD | NEW |
1 // Copyright (c) 2017 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2017 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 | 5 |
6 #include "components/safe_browsing/base_ping_manager.h" | 6 #include "components/safe_browsing/base_ping_manager.h" |
7 #include "base/base64.h" | 7 #include "base/base64.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/run_loop.h" | 9 #include "base/run_loop.h" |
10 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
(...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
118 key_param_ + | 118 key_param_ + |
119 "&ext=2&evts=phishblhit&" | 119 "&ext=2&evts=phishblhit&" |
120 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" | 120 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" |
121 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." | 121 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." |
122 "url.com%2F&evtb=0&src=ds&m=1", | 122 "url.com%2F&evtb=0&src=ds&m=1", |
123 ping_manager()->SafeBrowsingHitUrl(hp).spec()); | 123 ping_manager()->SafeBrowsingHitUrl(hp).spec()); |
124 } | 124 } |
125 | 125 |
126 { | 126 { |
127 HitReport hp(base_hp); | 127 HitReport hp(base_hp); |
128 hp.threat_type = SB_THREAT_TYPE_BINARY_MALWARE_URL; | 128 hp.threat_type = SB_THREAT_TYPE_URL_BINARY_MALWARE; |
129 hp.threat_source = ThreatSource::REMOTE; | 129 hp.threat_source = ThreatSource::REMOTE; |
130 hp.extended_reporting_level = SBER_LEVEL_OFF; | 130 hp.extended_reporting_level = SBER_LEVEL_OFF; |
131 hp.is_metrics_reporting_active = true; | 131 hp.is_metrics_reporting_active = true; |
132 hp.is_subresource = false; | 132 hp.is_subresource = false; |
133 EXPECT_EQ( | 133 EXPECT_EQ( |
134 "https://prefix.com/foo/report?client=unittest&appver=1.0&" | 134 "https://prefix.com/foo/report?client=unittest&appver=1.0&" |
135 "pver=3.0" + | 135 "pver=3.0" + |
136 key_param_ + | 136 key_param_ + |
137 "&ext=0&evts=binurlhit&" | 137 "&ext=0&evts=binurlhit&" |
138 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" | 138 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" |
139 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." | 139 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." |
140 "url.com%2F&evtb=0&src=rem&m=1", | 140 "url.com%2F&evtb=0&src=rem&m=1", |
141 ping_manager()->SafeBrowsingHitUrl(hp).spec()); | 141 ping_manager()->SafeBrowsingHitUrl(hp).spec()); |
142 } | 142 } |
143 | 143 |
144 { | 144 { |
145 HitReport hp(base_hp); | 145 HitReport hp(base_hp); |
146 hp.threat_type = SB_THREAT_TYPE_CLIENT_SIDE_PHISHING_URL; | 146 hp.threat_type = SB_THREAT_TYPE_URL_CLIENT_SIDE_PHISHING; |
147 hp.threat_source = ThreatSource::LOCAL_PVER4; | 147 hp.threat_source = ThreatSource::LOCAL_PVER4; |
148 hp.extended_reporting_level = SBER_LEVEL_OFF; | 148 hp.extended_reporting_level = SBER_LEVEL_OFF; |
149 hp.is_metrics_reporting_active = false; | 149 hp.is_metrics_reporting_active = false; |
150 hp.is_subresource = false; | 150 hp.is_subresource = false; |
151 EXPECT_EQ( | 151 EXPECT_EQ( |
152 "https://prefix.com/foo/report?client=unittest&appver=1.0&" | 152 "https://prefix.com/foo/report?client=unittest&appver=1.0&" |
153 "pver=3.0" + | 153 "pver=3.0" + |
154 key_param_ + | 154 key_param_ + |
155 "&ext=0&evts=phishcsdhit&" | 155 "&ext=0&evts=phishcsdhit&" |
156 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" | 156 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" |
157 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." | 157 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." |
158 "url.com%2F&evtb=0&src=l4&m=0", | 158 "url.com%2F&evtb=0&src=l4&m=0", |
159 ping_manager()->SafeBrowsingHitUrl(hp).spec()); | 159 ping_manager()->SafeBrowsingHitUrl(hp).spec()); |
160 } | 160 } |
161 | 161 |
162 { | 162 { |
163 HitReport hp(base_hp); | 163 HitReport hp(base_hp); |
164 hp.threat_type = SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL; | 164 hp.threat_type = SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE; |
165 hp.threat_source = ThreatSource::LOCAL_PVER4; | 165 hp.threat_source = ThreatSource::LOCAL_PVER4; |
166 hp.extended_reporting_level = SBER_LEVEL_OFF; | 166 hp.extended_reporting_level = SBER_LEVEL_OFF; |
167 hp.is_metrics_reporting_active = false; | 167 hp.is_metrics_reporting_active = false; |
168 hp.is_subresource = true; | 168 hp.is_subresource = true; |
169 EXPECT_EQ( | 169 EXPECT_EQ( |
170 "https://prefix.com/foo/report?client=unittest&appver=1.0&" | 170 "https://prefix.com/foo/report?client=unittest&appver=1.0&" |
171 "pver=3.0" + | 171 "pver=3.0" + |
172 key_param_ + | 172 key_param_ + |
173 "&ext=0&evts=malcsdhit&" | 173 "&ext=0&evts=malcsdhit&" |
174 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" | 174 "evtd=http%3A%2F%2Fmalicious.url.com%2F&" |
175 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." | 175 "evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer." |
176 "url.com%2F&evtb=1&src=l4&m=0", | 176 "url.com%2F&evtb=1&src=l4&m=0", |
177 ping_manager()->SafeBrowsingHitUrl(hp).spec()); | 177 ping_manager()->SafeBrowsingHitUrl(hp).spec()); |
178 } | 178 } |
179 | 179 |
180 // Same as above, but add population_id | 180 // Same as above, but add population_id |
181 { | 181 { |
182 HitReport hp(base_hp); | 182 HitReport hp(base_hp); |
183 hp.threat_type = SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL; | 183 hp.threat_type = SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE; |
184 hp.threat_source = ThreatSource::LOCAL_PVER4; | 184 hp.threat_source = ThreatSource::LOCAL_PVER4; |
185 hp.extended_reporting_level = SBER_LEVEL_OFF; | 185 hp.extended_reporting_level = SBER_LEVEL_OFF; |
186 hp.is_metrics_reporting_active = false; | 186 hp.is_metrics_reporting_active = false; |
187 hp.is_subresource = true; | 187 hp.is_subresource = true; |
188 hp.population_id = "foo bar"; | 188 hp.population_id = "foo bar"; |
189 EXPECT_EQ( | 189 EXPECT_EQ( |
190 "https://prefix.com/foo/report?client=unittest&appver=1.0&" | 190 "https://prefix.com/foo/report?client=unittest&appver=1.0&" |
191 "pver=3.0" + | 191 "pver=3.0" + |
192 key_param_ + | 192 key_param_ + |
193 "&ext=0&evts=malcsdhit&" | 193 "&ext=0&evts=malcsdhit&" |
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
263 | 263 |
264 TEST_F(BasePingManagerTest, TestReportSafeBrowsingHit) { | 264 TEST_F(BasePingManagerTest, TestReportSafeBrowsingHit) { |
265 const std::string kHitReportPostData = "Hit Report POST Data"; | 265 const std::string kHitReportPostData = "Hit Report POST Data"; |
266 std::string encoded_post_data = ""; | 266 std::string encoded_post_data = ""; |
267 base::Base64Encode(kHitReportPostData, &encoded_post_data); | 267 base::Base64Encode(kHitReportPostData, &encoded_post_data); |
268 | 268 |
269 HitReport hp; | 269 HitReport hp; |
270 hp.malicious_url = GURL("http://malicious.url.com"); | 270 hp.malicious_url = GURL("http://malicious.url.com"); |
271 hp.page_url = GURL("http://page.url.com"); | 271 hp.page_url = GURL("http://page.url.com"); |
272 hp.referrer_url = GURL("http://referrer.url.com"); | 272 hp.referrer_url = GURL("http://referrer.url.com"); |
273 hp.threat_type = SB_THREAT_TYPE_CLIENT_SIDE_MALWARE_URL; | 273 hp.threat_type = SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE; |
274 hp.threat_source = ThreatSource::LOCAL_PVER4; | 274 hp.threat_source = ThreatSource::LOCAL_PVER4; |
275 hp.extended_reporting_level = SBER_LEVEL_OFF; | 275 hp.extended_reporting_level = SBER_LEVEL_OFF; |
276 hp.is_metrics_reporting_active = false; | 276 hp.is_metrics_reporting_active = false; |
277 hp.is_subresource = true; | 277 hp.is_subresource = true; |
278 hp.population_id = "foo bar"; | 278 hp.population_id = "foo bar"; |
279 hp.post_data = kHitReportPostData; | 279 hp.post_data = kHitReportPostData; |
280 std::string expected_hit_report_url = | 280 std::string expected_hit_report_url = |
281 ping_manager()->SafeBrowsingHitUrl(hp).spec(); | 281 ping_manager()->SafeBrowsingHitUrl(hp).spec(); |
282 const int kRequestErrorCode = -321; | 282 const int kRequestErrorCode = -321; |
283 | 283 |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
322 | 322 |
323 EXPECT_TRUE(end_entry.GetIntegerValue("error", &int_value)); | 323 EXPECT_TRUE(end_entry.GetIntegerValue("error", &int_value)); |
324 EXPECT_EQ(kRequestErrorCode, int_value); | 324 EXPECT_EQ(kRequestErrorCode, int_value); |
325 | 325 |
326 // We don't really care what the source_dependency value is, just making sure | 326 // We don't really care what the source_dependency value is, just making sure |
327 // it's there. | 327 // it's there. |
328 EXPECT_TRUE(end_entry.params->HasKey("source_dependency")); | 328 EXPECT_TRUE(end_entry.params->HasKey("source_dependency")); |
329 } | 329 } |
330 | 330 |
331 } // namespace safe_browsing | 331 } // namespace safe_browsing |
OLD | NEW |