blob: 9cd703444ea2c0db80dc79580002b9f021162ed4 [file] [log] [blame]
// Copyright (c) 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
//
#include "components/safe_browsing/ping_manager.h"
#include "base/base64.h"
#include "base/logging.h"
#include "base/run_loop.h"
#include "base/strings/stringprintf.h"
#include "base/time/time.h"
#include "base/values.h"
#include "components/safe_browsing/db/v4_test_util.h"
#include "google_apis/google_api_keys.h"
#include "net/base/escape.h"
#include "testing/gtest/include/gtest/gtest.h"
using base::Time;
using base::TimeDelta;
using safe_browsing::HitReport;
using safe_browsing::ThreatSource;
namespace safe_browsing {
class PingManagerTest : public testing::Test {
public:
PingManagerTest() {}
protected:
void SetUp() override {
std::string key = google_apis::GetAPIKey();
if (!key.empty()) {
key_param_ = base::StringPrintf(
"&key=%s", net::EscapeQueryParamValue(key, true).c_str());
}
ping_manager_.reset(
new PingManager(nullptr, safe_browsing::GetTestV4ProtocolConfig()));
}
PingManager* ping_manager() { return ping_manager_.get(); }
std::string key_param_;
std::unique_ptr<PingManager> ping_manager_;
};
TEST_F(PingManagerTest, TestSafeBrowsingHitUrl) {
HitReport base_hp;
base_hp.malicious_url = GURL("http://malicious.url.com");
base_hp.page_url = GURL("http://page.url.com");
base_hp.referrer_url = GURL("http://referrer.url.com");
{
HitReport hp(base_hp);
hp.threat_type = SB_THREAT_TYPE_URL_MALWARE;
hp.threat_source = ThreatSource::LOCAL_PVER3;
hp.is_subresource = true;
hp.extended_reporting_level = SBER_LEVEL_LEGACY;
hp.is_metrics_reporting_active = true;
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/report?client=unittest&"
"appver=1.0&pver=4.0" +
key_param_ +
"&ext=1&evts=malblhit&evtd=http%3A%2F%2Fmalicious.url.com%2F&"
"evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
"url.com%2F&evtb=1&src=l3&m=1",
ping_manager()->SafeBrowsingHitUrl(hp).spec());
}
{
HitReport hp(base_hp);
hp.threat_type = SB_THREAT_TYPE_URL_PHISHING;
hp.threat_source = ThreatSource::DATA_SAVER;
hp.is_subresource = false;
hp.extended_reporting_level = SBER_LEVEL_LEGACY;
hp.is_metrics_reporting_active = true;
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/report?client=unittest&"
"appver=1.0&pver=4.0" +
key_param_ +
"&ext=1&evts=phishblhit&"
"evtd=http%3A%2F%2Fmalicious.url.com%2F&"
"evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
"url.com%2F&evtb=0&src=ds&m=1",
ping_manager()->SafeBrowsingHitUrl(hp).spec());
}
{
HitReport hp(base_hp);
hp.threat_type = SB_THREAT_TYPE_URL_PHISHING;
hp.threat_source = ThreatSource::DATA_SAVER;
hp.is_subresource = false;
hp.extended_reporting_level = SBER_LEVEL_SCOUT;
hp.is_metrics_reporting_active = true;
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/report?client=unittest&"
"appver=1.0&pver=4.0" +
key_param_ +
"&ext=2&evts=phishblhit&"
"evtd=http%3A%2F%2Fmalicious.url.com%2F&"
"evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
"url.com%2F&evtb=0&src=ds&m=1",
ping_manager()->SafeBrowsingHitUrl(hp).spec());
}
{
HitReport hp(base_hp);
hp.threat_type = SB_THREAT_TYPE_URL_BINARY_MALWARE;
hp.threat_source = ThreatSource::REMOTE;
hp.extended_reporting_level = SBER_LEVEL_OFF;
hp.is_metrics_reporting_active = true;
hp.is_subresource = false;
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/report?client=unittest&"
"appver=1.0&pver=4.0" +
key_param_ +
"&ext=0&evts=binurlhit&"
"evtd=http%3A%2F%2Fmalicious.url.com%2F&"
"evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
"url.com%2F&evtb=0&src=rem&m=1",
ping_manager()->SafeBrowsingHitUrl(hp).spec());
}
{
HitReport hp(base_hp);
hp.threat_type = SB_THREAT_TYPE_URL_CLIENT_SIDE_PHISHING;
hp.threat_source = ThreatSource::LOCAL_PVER4;
hp.extended_reporting_level = SBER_LEVEL_OFF;
hp.is_metrics_reporting_active = false;
hp.is_subresource = false;
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/report?client=unittest&"
"appver=1.0&pver=4.0" +
key_param_ +
"&ext=0&evts=phishcsdhit&"
"evtd=http%3A%2F%2Fmalicious.url.com%2F&"
"evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
"url.com%2F&evtb=0&src=l4&m=0",
ping_manager()->SafeBrowsingHitUrl(hp).spec());
}
{
HitReport hp(base_hp);
hp.threat_type = SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE;
hp.threat_source = ThreatSource::LOCAL_PVER4;
hp.extended_reporting_level = SBER_LEVEL_OFF;
hp.is_metrics_reporting_active = false;
hp.is_subresource = true;
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/report?client=unittest&"
"appver=1.0&pver=4.0" +
key_param_ +
"&ext=0&evts=malcsdhit&"
"evtd=http%3A%2F%2Fmalicious.url.com%2F&"
"evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
"url.com%2F&evtb=1&src=l4&m=0",
ping_manager()->SafeBrowsingHitUrl(hp).spec());
}
// Same as above, but add population_id
{
HitReport hp(base_hp);
hp.threat_type = SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE;
hp.threat_source = ThreatSource::LOCAL_PVER4;
hp.extended_reporting_level = SBER_LEVEL_OFF;
hp.is_metrics_reporting_active = false;
hp.is_subresource = true;
hp.population_id = "foo bar";
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/report?client=unittest&"
"appver=1.0&pver=4.0" +
key_param_ +
"&ext=0&evts=malcsdhit&"
"evtd=http%3A%2F%2Fmalicious.url.com%2F&"
"evtr=http%3A%2F%2Fpage.url.com%2F&evhr=http%3A%2F%2Freferrer."
"url.com%2F&evtb=1&src=l4&m=0&up=foo+bar",
ping_manager()->SafeBrowsingHitUrl(hp).spec());
}
}
TEST_F(PingManagerTest, TestThreatDetailsUrl) {
EXPECT_EQ(
"https://safebrowsing.google.com/safebrowsing/clientreport/malware?"
"client=unittest&appver=1.0&pver=4.0" +
key_param_,
ping_manager()->ThreatDetailsUrl().spec());
}
} // namespace safe_browsing