Chromium Code Reviews| Index: chrome/browser/extensions/blacklist_fetcher_unittest.cc |
| diff --git a/chrome/browser/extensions/blacklist_fetcher_unittest.cc b/chrome/browser/extensions/blacklist_fetcher_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..3d8ef6dd48bce103f0ad896866190f7724e14a8e |
| --- /dev/null |
| +++ b/chrome/browser/extensions/blacklist_fetcher_unittest.cc |
| @@ -0,0 +1,86 @@ |
| +// Copyright 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "base/run_loop.h" |
| +#include "chrome/browser/extensions/blacklist_fetcher.h" |
| +#include "chrome/browser/extensions/test_blacklist_fetcher.h" |
| +#include "chrome/common/safe_browsing/crx_info.pb.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +namespace extensions { |
| +namespace { |
| + |
| +void Assign(Blacklist::BlacklistState* to, Blacklist::BlacklistState from) { |
| + *to = from; |
| +} |
| + |
| +} // namespace |
| + |
| +class BlacklistFetcherTest : public testing::Test { |
| + protected: |
| + virtual void SetUp() { |
| + } |
|
not at google - send to devlin
2013/11/18 17:03:49
doesn't seem much point in defining an empty SetUp
Oleg Eterevsky
2013/11/20 12:58:45
Done.
|
| +}; |
| + |
| +TEST_F(BlacklistFetcherTest, RequestBlacklistState) { |
| + BlacklistFetcher fetcher; |
| + TestBlacklistFetcher tester(&fetcher); |
| + |
| + tester.SetBlacklistVerdict( |
| + "a", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY); |
| + |
| + Blacklist::BlacklistState result; |
| + fetcher.Request("a", base::Bind(&Assign, &result)); |
| + |
| + EXPECT_TRUE(tester.HandleFetcher(0)); |
| + |
| + EXPECT_EQ(Blacklist::BLACKLISTED_SECURITY_VULNERABILITY, result); |
| +} |
| + |
| +TEST_F(BlacklistFetcherTest, RequestMultipleBlacklistStates) { |
| + BlacklistFetcher fetcher; |
| + TestBlacklistFetcher tester(&fetcher); |
| + |
| + tester.SetBlacklistVerdict( |
| + "a", ClientCRXListInfoResponse_Verdict_UNKNOWN); |
| + tester.SetBlacklistVerdict( |
| + "b", ClientCRXListInfoResponse_Verdict_MALWARE); |
| + tester.SetBlacklistVerdict( |
| + "c", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY); |
| + tester.SetBlacklistVerdict( |
| + "d", ClientCRXListInfoResponse_Verdict_CWS_POLICY_VIOLATION); |
| + tester.SetBlacklistVerdict( |
| + "e", ClientCRXListInfoResponse_Verdict_POTENTIALLY_UNWANTED); |
| + |
| + Blacklist::BlacklistState result[9]; |
| + fetcher.Request("a", base::Bind(&Assign, &result[0])); |
| + fetcher.Request("a", base::Bind(&Assign, &result[1])); |
| + fetcher.Request("b", base::Bind(&Assign, &result[2])); |
| + fetcher.Request("b", base::Bind(&Assign, &result[3])); |
| + fetcher.Request("c", base::Bind(&Assign, &result[4])); |
| + fetcher.Request("d", base::Bind(&Assign, &result[5])); |
| + fetcher.Request("e", base::Bind(&Assign, &result[6])); |
| + fetcher.Request("f", base::Bind(&Assign, &result[7])); |
| + fetcher.Request("f", base::Bind(&Assign, &result[8])); |
| + |
| + // 6 fetchers should be created. Sending responses in shuffled order. |
| + EXPECT_TRUE(tester.HandleFetcher(4)); |
| + EXPECT_TRUE(tester.HandleFetcher(2)); |
| + EXPECT_TRUE(tester.HandleFetcher(5)); |
| + EXPECT_TRUE(tester.HandleFetcher(1)); |
| + EXPECT_TRUE(tester.HandleFetcher(0)); |
| + EXPECT_TRUE(tester.HandleFetcher(3)); |
| + |
| + EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[0]); |
| + EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[1]); |
| + EXPECT_EQ(Blacklist::BLACKLISTED_MALWARE, result[2]); |
| + EXPECT_EQ(Blacklist::BLACKLISTED_MALWARE, result[3]); |
| + EXPECT_EQ(Blacklist::BLACKLISTED_SECURITY_VULNERABILITY, result[4]); |
| + EXPECT_EQ(Blacklist::BLACKLISTED_CWS_POLICY_VIOLATION, result[5]); |
| + EXPECT_EQ(Blacklist::BLACKLISTED_POTENTIALLY_UNWANTED, result[6]); |
| + EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[7]); |
| + EXPECT_EQ(Blacklist::NOT_BLACKLISTED, result[8]); |
| +} |
| + |
| +} // namespace extensions |