Home | History | Annotate | Download | only in extensions
      1 // Copyright 2013 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "base/bind.h"
      6 #include "base/run_loop.h"
      7 #include "chrome/browser/extensions/blacklist_state_fetcher.h"
      8 #include "chrome/browser/extensions/test_blacklist_state_fetcher.h"
      9 #include "chrome/common/safe_browsing/crx_info.pb.h"
     10 #include "content/public/test/test_browser_thread_bundle.h"
     11 #include "testing/gtest/include/gtest/gtest.h"
     12 
     13 namespace extensions {
     14 namespace {
     15 
     16 void Assign(BlacklistState* to, BlacklistState from) {
     17   *to = from;
     18 }
     19 
     20 }  // namespace
     21 
     22 class BlacklistStateFetcherTest : public testing::Test {
     23  private:
     24   content::TestBrowserThreadBundle browser_thread_bundle_;
     25 };
     26 
     27 TEST_F(BlacklistStateFetcherTest, RequestBlacklistState) {
     28   BlacklistStateFetcher fetcher;
     29   TestBlacklistStateFetcher tester(&fetcher);
     30 
     31   tester.SetBlacklistVerdict(
     32       "a", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
     33 
     34   BlacklistState result;
     35   fetcher.Request("a", base::Bind(&Assign, &result));
     36 
     37   EXPECT_TRUE(tester.HandleFetcher(0));
     38   EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result);
     39 }
     40 
     41 TEST_F(BlacklistStateFetcherTest, RequestMultipleBlacklistStates) {
     42   BlacklistStateFetcher fetcher;
     43   TestBlacklistStateFetcher tester(&fetcher);
     44 
     45   tester.SetBlacklistVerdict(
     46       "a", ClientCRXListInfoResponse_Verdict_NOT_IN_BLACKLIST);
     47   tester.SetBlacklistVerdict(
     48       "b", ClientCRXListInfoResponse_Verdict_MALWARE);
     49   tester.SetBlacklistVerdict(
     50       "c", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
     51   tester.SetBlacklistVerdict(
     52       "d", ClientCRXListInfoResponse_Verdict_CWS_POLICY_VIOLATION);
     53   tester.SetBlacklistVerdict(
     54       "e", ClientCRXListInfoResponse_Verdict_POTENTIALLY_UNWANTED);
     55 
     56   BlacklistState result[9];
     57   fetcher.Request("a", base::Bind(&Assign, &result[0]));
     58   fetcher.Request("a", base::Bind(&Assign, &result[1]));
     59   fetcher.Request("b", base::Bind(&Assign, &result[2]));
     60   fetcher.Request("b", base::Bind(&Assign, &result[3]));
     61   fetcher.Request("c", base::Bind(&Assign, &result[4]));
     62   fetcher.Request("d", base::Bind(&Assign, &result[5]));
     63   fetcher.Request("e", base::Bind(&Assign, &result[6]));
     64   fetcher.Request("f", base::Bind(&Assign, &result[7]));
     65   fetcher.Request("f", base::Bind(&Assign, &result[8]));
     66 
     67   // 6 fetchers should be created. Sending responses in shuffled order.
     68   EXPECT_TRUE(tester.HandleFetcher(4));
     69   EXPECT_TRUE(tester.HandleFetcher(2));
     70   EXPECT_TRUE(tester.HandleFetcher(5));
     71   EXPECT_TRUE(tester.HandleFetcher(1));
     72   EXPECT_TRUE(tester.HandleFetcher(0));
     73   EXPECT_TRUE(tester.HandleFetcher(3));
     74 
     75   EXPECT_EQ(NOT_BLACKLISTED, result[0]);
     76   EXPECT_EQ(NOT_BLACKLISTED, result[1]);
     77   EXPECT_EQ(BLACKLISTED_MALWARE, result[2]);
     78   EXPECT_EQ(BLACKLISTED_MALWARE, result[3]);
     79   EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result[4]);
     80   EXPECT_EQ(BLACKLISTED_CWS_POLICY_VIOLATION, result[5]);
     81   EXPECT_EQ(BLACKLISTED_POTENTIALLY_UNWANTED, result[6]);
     82   EXPECT_EQ(NOT_BLACKLISTED, result[7]);
     83   EXPECT_EQ(NOT_BLACKLISTED, result[8]);
     84 }
     85 
     86 }  // namespace extensions
     87