| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <vector> |
| |
| #include "base/base64.h" |
| #include "base/memory/scoped_ptr.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/test/test_simple_task_runner.h" |
| #include "base/thread_task_runner_handle.h" |
| #include "base/time/time.h" |
| #include "chrome/browser/safe_browsing/chunk.pb.h" |
| #include "chrome/browser/safe_browsing/protocol_manager.h" |
| #include "chrome/browser/safe_browsing/safe_browsing_util.h" |
| #include "components/safe_browsing_db/safebrowsing.pb.h" |
| #include "google_apis/google_api_keys.h" |
| #include "net/base/escape.h" |
| #include "net/base/load_flags.h" |
| #include "net/base/net_errors.h" |
| #include "net/url_request/test_url_fetcher_factory.h" |
| #include "testing/gmock/include/gmock/gmock.h" |
| #include "testing/gmock_mutant.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| |
| using base::Time; |
| using base::TimeDelta; |
| using testing::_; |
| using testing::Invoke; |
| |
| namespace { |
| |
| const char kUrlPrefix[] = "https://prefix.com/foo"; |
| const char kBackupConnectUrlPrefix[] = "https://alt1-prefix.com/foo"; |
| const char kBackupHttpUrlPrefix[] = "https://alt2-prefix.com/foo"; |
| const char kBackupNetworkUrlPrefix[] = "https://alt3-prefix.com/foo"; |
| const char kClient[] = "unittest"; |
| const char kAppVer[] = "1.0"; |
| const char kAdditionalQuery[] = "additional_query"; |
| const char kUrlSuffix[] = "&ext=0"; |
| |
| const char kDefaultPhishList[] = "goog-phish-shavar"; |
| const char kDefaultMalwareList[] = "goog-malware-shavar"; |
| |
| // Add-prefix chunk with single prefix. |
| const char kRawChunkPayload1[] = { |
| '\0', '\0', '\0', '\x08', // 32-bit payload length in network byte order. |
| '\x08', // field 1, wire format varint |
| '\x03', // chunk_number varint 3 |
| '\x22', // field 4, wire format length-delimited |
| '\x04', // varint 4 length |
| 'a', 'b', 'c', 'd' // 4-byte prefix |
| }; |
| const std::string kChunkPayload1(kRawChunkPayload1, sizeof(kRawChunkPayload1)); |
| |
| // Add-prefix chunk_number 5 with single prefix. |
| const char kRawChunkPayload2[] = { |
| '\0', '\0', '\0', '\x08', // 32-bit payload length in network byte order. |
| '\x08', // field 1, wire format varint |
| '\x05', // chunk_number varint 5 |
| '\x22', // field 4, wire format length-delimited |
| '\x04', // varint length 4 |
| 'e', 'f', 'g', 'h' // 4-byte prefix |
| }; |
| const std::string kChunkPayload2(kRawChunkPayload2, sizeof(kRawChunkPayload2)); |
| |
| } // namespace |
| |
| namespace safe_browsing { |
| |
| class SafeBrowsingProtocolManagerTest : public testing::Test { |
| protected: |
| std::string key_param_; |
| |
| void SetUp() override { |
| std::string key = google_apis::GetAPIKey(); |
| if (!key.empty()) { |
| key_param_ = base::StringPrintf( |
| "&key=%s", |
| net::EscapeQueryParamValue(key, true).c_str()); |
| } |
| } |
| |
| scoped_ptr<SafeBrowsingProtocolManager> CreateProtocolManager( |
| SafeBrowsingProtocolManagerDelegate* delegate) { |
| SafeBrowsingProtocolConfig config; |
| config.client_name = kClient; |
| config.url_prefix = kUrlPrefix; |
| config.backup_connect_error_url_prefix = kBackupConnectUrlPrefix; |
| config.backup_http_error_url_prefix = kBackupHttpUrlPrefix; |
| config.backup_network_error_url_prefix = kBackupNetworkUrlPrefix; |
| config.version = kAppVer; |
| return scoped_ptr<SafeBrowsingProtocolManager>( |
| SafeBrowsingProtocolManager::Create(delegate, NULL, config)); |
| } |
| |
| void ValidateUpdateFetcherRequest(const net::TestURLFetcher* url_fetcher, |
| const std::string& expected_prefix, |
| const std::string& expected_suffix) { |
| ASSERT_TRUE(url_fetcher); |
| EXPECT_EQ(net::LOAD_DISABLE_CACHE, url_fetcher->GetLoadFlags()); |
| |
| std::string expected_lists(base::StringPrintf("%s;\n%s;\n", |
| kDefaultPhishList, |
| kDefaultMalwareList)); |
| EXPECT_EQ(expected_lists, url_fetcher->upload_data()); |
| EXPECT_EQ(GURL(expected_prefix + "/downloads?client=unittest&appver=1.0" |
| "&pver=3.0" + |
| key_param_ + expected_suffix), |
| url_fetcher->GetOriginalURL()); |
| } |
| |
| void ValidateUpdateFetcherRequest(const net::TestURLFetcher* url_fetcher) { |
| ValidateUpdateFetcherRequest(url_fetcher, kUrlPrefix, kUrlSuffix); |
| } |
| |
| void ValidateRedirectFetcherRequest(const net::TestURLFetcher* url_fetcher, |
| const std::string& expected_url) { |
| ASSERT_TRUE(url_fetcher); |
| EXPECT_EQ(net::LOAD_DISABLE_CACHE, url_fetcher->GetLoadFlags()); |
| EXPECT_EQ("", url_fetcher->upload_data()); |
| EXPECT_EQ(GURL(expected_url), url_fetcher->GetOriginalURL()); |
| } |
| |
| std::string GetStockV4HashResponse() { |
| FindFullHashesResponse res; |
| res.mutable_negative_cache_duration()->set_seconds(600); |
| ThreatMatch* m = res.add_matches(); |
| m->set_threat_type(API_ABUSE); |
| m->set_platform_type(CHROME_PLATFORM); |
| m->set_threat_entry_type(URL_EXPRESSION); |
| m->mutable_cache_duration()->set_seconds(300); |
| m->mutable_threat()->set_hash(SBFullHashToString( |
| SBFullHashForString("Everything's shiny, Cap'n."))); |
| ThreatEntryMetadata::MetadataEntry* e = |
| m->mutable_threat_entry_metadata()->add_entries(); |
| e->set_key("permission"); |
| e->set_value("NOTIFICATIONS"); |
| |
| // Serialize. |
| std::string res_data; |
| res.SerializeToString(&res_data); |
| |
| return res_data; |
| } |
| }; |
| |
| void ValidateGetV4HashResults( |
| const std::vector<SBFullHashResult>& expected_full_hashes, |
| const base::TimeDelta& expected_cache_duration, |
| const std::vector<SBFullHashResult>& full_hashes, |
| const base::TimeDelta& cache_duration) { |
| EXPECT_EQ(expected_cache_duration, cache_duration); |
| ASSERT_EQ(expected_full_hashes.size(), full_hashes.size()); |
| |
| for (unsigned int i = 0; i < expected_full_hashes.size(); ++i) { |
| const SBFullHashResult& expected = expected_full_hashes[i]; |
| const SBFullHashResult& actual = full_hashes[i]; |
| EXPECT_TRUE(SBFullHashEqual(expected.hash, actual.hash)); |
| EXPECT_EQ(expected.metadata, actual.metadata); |
| EXPECT_EQ(expected.cache_duration, actual.cache_duration); |
| } |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestGetV4HashErrorHandlingNetwork) { |
| net::TestURLFetcherFactory factory; |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| std::vector<SBPrefix> prefixes; |
| std::vector<SBFullHashResult> expected_full_hashes; |
| base::TimeDelta expected_cache_duration; |
| |
| pm->GetFullHashesWithApis(prefixes, |
| base::Bind(&ValidateGetV4HashResults, |
| expected_full_hashes, expected_cache_duration)); |
| |
| net::TestURLFetcher* fetcher = factory.GetFetcherByID(0); |
| DCHECK(fetcher); |
| // Failed request status should result in error. |
| fetcher->set_status(net::URLRequestStatus(net::URLRequestStatus::FAILED, |
| net::ERR_CONNECTION_RESET)); |
| fetcher->set_response_code(200); |
| fetcher->SetResponseString(GetStockV4HashResponse()); |
| fetcher->delegate()->OnURLFetchComplete(fetcher); |
| |
| // Should have recorded one error, but back off multiplier is unchanged. |
| EXPECT_EQ(1ul, pm->gethash_v4_error_count_); |
| EXPECT_EQ(1ul, pm->gethash_v4_back_off_mult_); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| TestGetV4HashErrorHandlingResponseCode) { |
| net::TestURLFetcherFactory factory; |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| std::vector<SBPrefix> prefixes; |
| std::vector<SBFullHashResult> expected_full_hashes; |
| base::TimeDelta expected_cache_duration; |
| |
| pm->GetFullHashesWithApis(prefixes, |
| base::Bind(&ValidateGetV4HashResults, |
| expected_full_hashes, expected_cache_duration)); |
| |
| net::TestURLFetcher* fetcher = factory.GetFetcherByID(0); |
| DCHECK(fetcher); |
| fetcher->set_status(net::URLRequestStatus()); |
| // Response code of anything other than 200 should result in error. |
| fetcher->set_response_code(204); |
| fetcher->SetResponseString(GetStockV4HashResponse()); |
| fetcher->delegate()->OnURLFetchComplete(fetcher); |
| |
| // Should have recorded one error, but back off multiplier is unchanged. |
| EXPECT_EQ(1ul, pm->gethash_v4_error_count_); |
| EXPECT_EQ(1ul, pm->gethash_v4_back_off_mult_); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestGetV4HashErrorHandlingOK) { |
| net::TestURLFetcherFactory factory; |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| std::vector<SBPrefix> prefixes; |
| std::vector<SBFullHashResult> expected_full_hashes; |
| SBFullHashResult hash_result; |
| hash_result.hash = SBFullHashForString("Everything's shiny, Cap'n."); |
| hash_result.metadata = "NOTIFICATIONS,"; |
| hash_result.cache_duration = base::TimeDelta::FromSeconds(300); |
| expected_full_hashes.push_back(hash_result); |
| base::TimeDelta expected_cache_duration = base::TimeDelta::FromSeconds(600); |
| |
| pm->GetFullHashesWithApis(prefixes, |
| base::Bind(&ValidateGetV4HashResults, |
| expected_full_hashes, expected_cache_duration)); |
| |
| net::TestURLFetcher* fetcher = factory.GetFetcherByID(0); |
| DCHECK(fetcher); |
| fetcher->set_status(net::URLRequestStatus()); |
| fetcher->set_response_code(200); |
| fetcher->SetResponseString(GetStockV4HashResponse()); |
| fetcher->delegate()->OnURLFetchComplete(fetcher); |
| |
| // No error, back off multiplier is unchanged. |
| EXPECT_EQ(0ul, pm->gethash_v4_error_count_); |
| EXPECT_EQ(1ul, pm->gethash_v4_back_off_mult_); |
| } |
| |
| // Ensure that we respect section 5 of the SafeBrowsing protocol specification. |
| TEST_F(SafeBrowsingProtocolManagerTest, TestBackOffTimes) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| pm->next_update_interval_ = TimeDelta::FromSeconds(1800); |
| ASSERT_TRUE(pm->back_off_fuzz_ >= 0.0 && pm->back_off_fuzz_ <= 1.0); |
| |
| TimeDelta next; |
| |
| // No errors received so far. |
| next = pm->GetNextUpdateInterval(false); |
| EXPECT_EQ(next, TimeDelta::FromSeconds(1800)); |
| |
| // 1 error. |
| next = pm->GetNextUpdateInterval(true); |
| EXPECT_EQ(next, TimeDelta::FromSeconds(60)); |
| |
| // 2 errors. |
| next = pm->GetNextUpdateInterval(true); |
| EXPECT_TRUE(next >= TimeDelta::FromMinutes(30) && |
| next <= TimeDelta::FromMinutes(60)); |
| |
| // 3 errors. |
| next = pm->GetNextUpdateInterval(true); |
| EXPECT_TRUE(next >= TimeDelta::FromMinutes(60) && |
| next <= TimeDelta::FromMinutes(120)); |
| |
| // 4 errors. |
| next = pm->GetNextUpdateInterval(true); |
| EXPECT_TRUE(next >= TimeDelta::FromMinutes(120) && |
| next <= TimeDelta::FromMinutes(240)); |
| |
| // 5 errors. |
| next = pm->GetNextUpdateInterval(true); |
| EXPECT_TRUE(next >= TimeDelta::FromMinutes(240) && |
| next <= TimeDelta::FromMinutes(480)); |
| |
| // 6 errors, reached max backoff. |
| next = pm->GetNextUpdateInterval(true); |
| EXPECT_EQ(next, TimeDelta::FromMinutes(480)); |
| |
| // 7 errors. |
| next = pm->GetNextUpdateInterval(true); |
| EXPECT_EQ(next, TimeDelta::FromMinutes(480)); |
| |
| // Received a successful response. |
| next = pm->GetNextUpdateInterval(false); |
| EXPECT_EQ(next, TimeDelta::FromSeconds(1800)); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestChunkStrings) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| // Add and Sub chunks. |
| SBListChunkRanges phish(kDefaultPhishList); |
| phish.adds = "1,4,6,8-20,99"; |
| phish.subs = "16,32,64-96"; |
| EXPECT_EQ(base::StringPrintf("%s;a:1,4,6,8-20,99:s:16,32,64-96\n", |
| kDefaultPhishList), |
| FormatList(phish)); |
| |
| // Add chunks only. |
| phish.subs = ""; |
| EXPECT_EQ(base::StringPrintf("%s;a:1,4,6,8-20,99\n", kDefaultPhishList), |
| FormatList(phish)); |
| |
| // Sub chunks only. |
| phish.adds = ""; |
| phish.subs = "16,32,64-96"; |
| EXPECT_EQ(base::StringPrintf("%s;s:16,32,64-96\n", kDefaultPhishList), |
| FormatList(phish)); |
| |
| // No chunks of either type. |
| phish.adds = ""; |
| phish.subs = ""; |
| EXPECT_EQ(base::StringPrintf("%s;\n", kDefaultPhishList), FormatList(phish)); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestGetHashBackOffTimes) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| // No errors or back off time yet. |
| EXPECT_EQ(0U, pm->gethash_error_count_); |
| EXPECT_TRUE(pm->next_gethash_time_.is_null()); |
| |
| Time now = Time::Now(); |
| |
| // 1 error. |
| pm->HandleGetHashError(now); |
| EXPECT_EQ(1U, pm->gethash_error_count_); |
| TimeDelta margin = TimeDelta::FromSeconds(5); // Fudge factor. |
| Time future = now + TimeDelta::FromMinutes(1); |
| EXPECT_TRUE(pm->next_gethash_time_ >= future - margin && |
| pm->next_gethash_time_ <= future + margin); |
| |
| // 2 errors. |
| pm->HandleGetHashError(now); |
| EXPECT_EQ(2U, pm->gethash_error_count_); |
| EXPECT_TRUE(pm->next_gethash_time_ >= now + TimeDelta::FromMinutes(30)); |
| EXPECT_TRUE(pm->next_gethash_time_ <= now + TimeDelta::FromMinutes(60)); |
| |
| // 3 errors. |
| pm->HandleGetHashError(now); |
| EXPECT_EQ(3U, pm->gethash_error_count_); |
| EXPECT_TRUE(pm->next_gethash_time_ >= now + TimeDelta::FromMinutes(60)); |
| EXPECT_TRUE(pm->next_gethash_time_ <= now + TimeDelta::FromMinutes(120)); |
| |
| // 4 errors. |
| pm->HandleGetHashError(now); |
| EXPECT_EQ(4U, pm->gethash_error_count_); |
| EXPECT_TRUE(pm->next_gethash_time_ >= now + TimeDelta::FromMinutes(120)); |
| EXPECT_TRUE(pm->next_gethash_time_ <= now + TimeDelta::FromMinutes(240)); |
| |
| // 5 errors. |
| pm->HandleGetHashError(now); |
| EXPECT_EQ(5U, pm->gethash_error_count_); |
| EXPECT_TRUE(pm->next_gethash_time_ >= now + TimeDelta::FromMinutes(240)); |
| EXPECT_TRUE(pm->next_gethash_time_ <= now + TimeDelta::FromMinutes(480)); |
| |
| // 6 errors, reached max backoff. |
| pm->HandleGetHashError(now); |
| EXPECT_EQ(6U, pm->gethash_error_count_); |
| EXPECT_TRUE(pm->next_gethash_time_ == now + TimeDelta::FromMinutes(480)); |
| |
| // 7 errors. |
| pm->HandleGetHashError(now); |
| EXPECT_EQ(7U, pm->gethash_error_count_); |
| EXPECT_TRUE(pm->next_gethash_time_== now + TimeDelta::FromMinutes(480)); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestGetV4HashBackOffTimes) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| // No errors or back off time yet. |
| EXPECT_EQ(0U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(1U, pm->gethash_v4_back_off_mult_); |
| Time now = Time::Now(); |
| EXPECT_TRUE(pm->next_gethash_v4_time_ < now); |
| |
| // 1 error. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(1U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(1U, pm->gethash_v4_back_off_mult_); |
| EXPECT_LE(now + TimeDelta::FromMinutes(15), pm->next_gethash_v4_time_); |
| EXPECT_GE(now + TimeDelta::FromMinutes(30), pm->next_gethash_v4_time_); |
| |
| // 2 errors. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(2U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(2U, pm->gethash_v4_back_off_mult_); |
| EXPECT_LE(now + TimeDelta::FromMinutes(30), pm->next_gethash_v4_time_); |
| EXPECT_GE(now + TimeDelta::FromMinutes(60), pm->next_gethash_v4_time_); |
| |
| // 3 errors. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(3U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(4U, pm->gethash_v4_back_off_mult_); |
| EXPECT_LE(now + TimeDelta::FromMinutes(60), pm->next_gethash_v4_time_); |
| EXPECT_GE(now + TimeDelta::FromMinutes(120), pm->next_gethash_v4_time_); |
| |
| // 4 errors. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(4U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(8U, pm->gethash_v4_back_off_mult_); |
| EXPECT_LE(now + TimeDelta::FromMinutes(120), pm->next_gethash_v4_time_); |
| EXPECT_GE(now + TimeDelta::FromMinutes(240), pm->next_gethash_v4_time_); |
| |
| // 5 errors. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(5U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(16U, pm->gethash_v4_back_off_mult_); |
| EXPECT_LE(now + TimeDelta::FromMinutes(240), pm->next_gethash_v4_time_); |
| EXPECT_GE(now + TimeDelta::FromMinutes(480), pm->next_gethash_v4_time_); |
| |
| // 6 errors. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(6U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(32U, pm->gethash_v4_back_off_mult_); |
| EXPECT_LE(now + TimeDelta::FromMinutes(480), pm->next_gethash_v4_time_); |
| EXPECT_GE(now + TimeDelta::FromMinutes(960), pm->next_gethash_v4_time_); |
| |
| // 7 errors. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(7U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(64U, pm->gethash_v4_back_off_mult_); |
| EXPECT_LE(now + TimeDelta::FromMinutes(960), pm->next_gethash_v4_time_); |
| EXPECT_GE(now + TimeDelta::FromMinutes(1920), pm->next_gethash_v4_time_); |
| |
| // 8 errors, reached max backoff. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(8U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(128U, pm->gethash_v4_back_off_mult_); |
| EXPECT_EQ(now + TimeDelta::FromHours(24), pm->next_gethash_v4_time_); |
| |
| // 9 errors, reached max backoff and multiplier capped. |
| pm->HandleGetHashV4Error(now); |
| EXPECT_EQ(9U, pm->gethash_v4_error_count_); |
| EXPECT_EQ(128U, pm->gethash_v4_back_off_mult_); |
| EXPECT_EQ(now + TimeDelta::FromHours(24), pm->next_gethash_v4_time_); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestGetHashUrl) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| EXPECT_EQ( |
| "https://prefix.com/foo/gethash?client=unittest&appver=1.0&" |
| "pver=3.0" + |
| key_param_ + "&ext=0", |
| pm->GetHashUrl(false).spec()); |
| |
| pm->set_additional_query(kAdditionalQuery); |
| EXPECT_EQ( |
| "https://prefix.com/foo/gethash?client=unittest&appver=1.0&" |
| "pver=3.0" + |
| key_param_ + "&additional_query&ext=1", |
| pm->GetHashUrl(true).spec()); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestGetV4HashUrl) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| EXPECT_EQ( |
| "https://safebrowsing.googleapis.com/v4/encodedFullHashes/request_base64?" |
| "alt=proto&client_id=unittest&client_version=1.0" + key_param_, |
| pm->GetV4HashUrl("request_base64").spec()); |
| |
| // Additional query has no effect. |
| pm->set_additional_query(kAdditionalQuery); |
| EXPECT_EQ( |
| "https://safebrowsing.googleapis.com/v4/encodedFullHashes/request_base64?" |
| "alt=proto&client_id=unittest&client_version=1.0" + key_param_, |
| pm->GetV4HashUrl("request_base64").spec()); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestGetV4HashRequest) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| FindFullHashesRequest req; |
| ThreatInfo* info = req.mutable_threat_info(); |
| info->add_threat_types(API_ABUSE); |
| info->add_platform_types(CHROME_PLATFORM); |
| info->add_threat_entry_types(URL_EXPRESSION); |
| |
| SBPrefix one = 1u; |
| SBPrefix two = 2u; |
| SBPrefix three = 3u; |
| std::string hash(reinterpret_cast<const char*>(&one), sizeof(SBPrefix)); |
| info->add_threat_entries()->set_hash(hash); |
| hash.clear(); |
| hash.append(reinterpret_cast<const char*>(&two), sizeof(SBPrefix)); |
| info->add_threat_entries()->set_hash(hash); |
| hash.clear(); |
| hash.append(reinterpret_cast<const char*>(&three), sizeof(SBPrefix)); |
| info->add_threat_entries()->set_hash(hash); |
| |
| // Serialize and Base64 encode. |
| std::string req_data, req_base64; |
| req.SerializeToString(&req_data); |
| base::Base64Encode(req_data, &req_base64); |
| |
| std::vector<PlatformType> platform; |
| platform.push_back(CHROME_PLATFORM); |
| std::vector<SBPrefix> prefixes; |
| prefixes.push_back(one); |
| prefixes.push_back(two); |
| prefixes.push_back(three); |
| EXPECT_EQ( |
| req_base64, |
| pm->GetV4HashRequest(prefixes, platform, API_ABUSE)); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestParseV4HashResponse) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| FindFullHashesResponse res; |
| res.mutable_negative_cache_duration()->set_seconds(600); |
| res.mutable_minimum_wait_duration()->set_seconds(400); |
| ThreatMatch* m = res.add_matches(); |
| m->set_threat_type(API_ABUSE); |
| m->set_platform_type(CHROME_PLATFORM); |
| m->set_threat_entry_type(URL_EXPRESSION); |
| m->mutable_cache_duration()->set_seconds(300); |
| m->mutable_threat()->set_hash(SBFullHashToString( |
| SBFullHashForString("Everything's shiny, Cap'n."))); |
| ThreatEntryMetadata::MetadataEntry* e = |
| m->mutable_threat_entry_metadata()->add_entries(); |
| e->set_key("permission"); |
| e->set_value("NOTIFICATIONS"); |
| |
| // Serialize. |
| std::string res_data; |
| res.SerializeToString(&res_data); |
| |
| Time now = Time::Now(); |
| std::vector<SBFullHashResult> full_hashes; |
| base::TimeDelta cache_lifetime; |
| EXPECT_TRUE( |
| pm->ParseV4HashResponse(res_data, &full_hashes, &cache_lifetime)); |
| |
| EXPECT_EQ(base::TimeDelta::FromSeconds(600), cache_lifetime); |
| EXPECT_EQ(1ul, full_hashes.size()); |
| EXPECT_TRUE(SBFullHashEqual( |
| SBFullHashForString("Everything's shiny, Cap'n."), full_hashes[0].hash)); |
| EXPECT_EQ("NOTIFICATIONS,", full_hashes[0].metadata); |
| EXPECT_EQ(base::TimeDelta::FromSeconds(300), full_hashes[0].cache_duration); |
| EXPECT_LE(now + base::TimeDelta::FromSeconds(400), pm->next_gethash_v4_time_); |
| } |
| |
| // Adds an entry with an ignored ThreatEntryType. |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| TestParseV4HashResponseWrongThreatEntryType) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| FindFullHashesResponse res; |
| res.mutable_negative_cache_duration()->set_seconds(600); |
| res.add_matches()->set_threat_entry_type(BINARY_DIGEST); |
| |
| // Serialize. |
| std::string res_data; |
| res.SerializeToString(&res_data); |
| |
| std::vector<SBFullHashResult> full_hashes; |
| base::TimeDelta cache_lifetime; |
| EXPECT_FALSE( |
| pm->ParseV4HashResponse(res_data, &full_hashes, &cache_lifetime)); |
| |
| EXPECT_EQ(base::TimeDelta::FromSeconds(600), cache_lifetime); |
| // There should be no hash results. |
| EXPECT_EQ(0ul, full_hashes.size()); |
| } |
| |
| // Adds an entry with a SOCIAL_ENGINEERING threat type. |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| TestParseV4HashResponseSocialEngineeringThreatType) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| FindFullHashesResponse res; |
| res.mutable_negative_cache_duration()->set_seconds(600); |
| ThreatMatch* m = res.add_matches(); |
| m->set_threat_type(SOCIAL_ENGINEERING); |
| m->set_platform_type(CHROME_PLATFORM); |
| m->set_threat_entry_type(URL_EXPRESSION); |
| m->mutable_threat()->set_hash( |
| SBFullHashToString(SBFullHashForString("Not to fret."))); |
| ThreatEntryMetadata::MetadataEntry* e = |
| m->mutable_threat_entry_metadata()->add_entries(); |
| e->set_key("permission"); |
| e->set_value("IGNORED"); |
| |
| // Serialize. |
| std::string res_data; |
| res.SerializeToString(&res_data); |
| |
| std::vector<SBFullHashResult> full_hashes; |
| base::TimeDelta cache_lifetime; |
| EXPECT_FALSE( |
| pm->ParseV4HashResponse(res_data, &full_hashes, &cache_lifetime)); |
| |
| EXPECT_EQ(base::TimeDelta::FromSeconds(600), cache_lifetime); |
| EXPECT_EQ(0ul, full_hashes.size()); |
| } |
| |
| // Adds metadata with a key value that is not "permission". |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| TestParseV4HashResponseNonPermissionMetadata) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| FindFullHashesResponse res; |
| res.mutable_negative_cache_duration()->set_seconds(600); |
| ThreatMatch* m = res.add_matches(); |
| m->set_threat_type(API_ABUSE); |
| m->set_platform_type(CHROME_PLATFORM); |
| m->set_threat_entry_type(URL_EXPRESSION); |
| m->mutable_threat()->set_hash( |
| SBFullHashToString(SBFullHashForString("Not to fret."))); |
| ThreatEntryMetadata::MetadataEntry* e = |
| m->mutable_threat_entry_metadata()->add_entries(); |
| e->set_key("notpermission"); |
| e->set_value("NOTGEOLOCATION"); |
| |
| // Serialize. |
| std::string res_data; |
| res.SerializeToString(&res_data); |
| |
| std::vector<SBFullHashResult> full_hashes; |
| base::TimeDelta cache_lifetime; |
| EXPECT_TRUE( |
| pm->ParseV4HashResponse(res_data, &full_hashes, &cache_lifetime)); |
| |
| EXPECT_EQ(base::TimeDelta::FromSeconds(600), cache_lifetime); |
| EXPECT_EQ(1ul, full_hashes.size()); |
| |
| EXPECT_TRUE(SBFullHashEqual( |
| SBFullHashForString("Not to fret."), full_hashes[0].hash)); |
| // Metadata should be empty. |
| EXPECT_EQ("", full_hashes[0].metadata); |
| EXPECT_EQ(base::TimeDelta::FromSeconds(0), full_hashes[0].cache_duration); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| TestParseV4HashResponseInconsistentThreatTypes) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| FindFullHashesResponse res; |
| ThreatMatch* m1 = res.add_matches(); |
| m1->set_threat_type(API_ABUSE); |
| m1->set_platform_type(CHROME_PLATFORM); |
| m1->set_threat_entry_type(URL_EXPRESSION); |
| m1->mutable_threat()->set_hash(SBFullHashToString( |
| SBFullHashForString("Everything's shiny, Cap'n."))); |
| m1->mutable_threat_entry_metadata()->add_entries(); |
| ThreatMatch* m2 = res.add_matches(); |
| m2->set_threat_type(MALWARE_THREAT); |
| m2->set_threat_entry_type(URL_EXPRESSION); |
| m2->mutable_threat()->set_hash(SBFullHashToString( |
| SBFullHashForString("Not to fret."))); |
| |
| // Serialize. |
| std::string res_data; |
| res.SerializeToString(&res_data); |
| |
| std::vector<SBFullHashResult> full_hashes; |
| base::TimeDelta cache_lifetime; |
| EXPECT_FALSE( |
| pm->ParseV4HashResponse(res_data, &full_hashes, &cache_lifetime)); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestUpdateUrl) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| EXPECT_EQ( |
| "https://prefix.com/foo/downloads?client=unittest&appver=1.0&" |
| "pver=3.0" + |
| key_param_ + "&ext=1", |
| pm->UpdateUrl(true).spec()); |
| |
| pm->set_additional_query(kAdditionalQuery); |
| EXPECT_EQ( |
| "https://prefix.com/foo/downloads?client=unittest&appver=1.0&" |
| "pver=3.0" + |
| key_param_ + "&additional_query&ext=0", |
| pm->UpdateUrl(false).spec()); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, TestNextChunkUrl) { |
| scoped_ptr<SafeBrowsingProtocolManager> pm(CreateProtocolManager(NULL)); |
| |
| std::string url_partial = "localhost:1234/foo/bar?foo"; |
| std::string url_http_full = "http://localhost:1234/foo/bar?foo"; |
| std::string url_https_full = "https://localhost:1234/foo/bar?foo"; |
| std::string url_https_no_query = "https://localhost:1234/foo/bar"; |
| |
| EXPECT_EQ("https://localhost:1234/foo/bar?foo", |
| pm->NextChunkUrl(url_partial).spec()); |
| EXPECT_EQ("http://localhost:1234/foo/bar?foo", |
| pm->NextChunkUrl(url_http_full).spec()); |
| EXPECT_EQ("https://localhost:1234/foo/bar?foo", |
| pm->NextChunkUrl(url_https_full).spec()); |
| EXPECT_EQ("https://localhost:1234/foo/bar", |
| pm->NextChunkUrl(url_https_no_query).spec()); |
| |
| pm->set_additional_query(kAdditionalQuery); |
| EXPECT_EQ("https://localhost:1234/foo/bar?foo&additional_query", |
| pm->NextChunkUrl(url_partial).spec()); |
| EXPECT_EQ("http://localhost:1234/foo/bar?foo&additional_query", |
| pm->NextChunkUrl(url_http_full).spec()); |
| EXPECT_EQ("https://localhost:1234/foo/bar?foo&additional_query", |
| pm->NextChunkUrl(url_https_full).spec()); |
| EXPECT_EQ("https://localhost:1234/foo/bar?additional_query", |
| pm->NextChunkUrl(url_https_no_query).spec()); |
| } |
| |
| namespace { |
| |
| class MockProtocolDelegate : public SafeBrowsingProtocolManagerDelegate { |
| public: |
| MockProtocolDelegate() {} |
| ~MockProtocolDelegate() override {} |
| |
| MOCK_METHOD0(UpdateStarted, void()); |
| MOCK_METHOD1(UpdateFinished, void(bool)); |
| MOCK_METHOD0(ResetDatabase, void()); |
| MOCK_METHOD1(GetChunks, void(GetChunksCallback)); |
| |
| // gmock does not work with scoped_ptr<> at this time. Add a local method to |
| // mock, then call that from an override. Beware of object ownership when |
| // making changes here. |
| MOCK_METHOD3(AddChunksRaw, |
| void(const std::string& lists, |
| const std::vector<scoped_ptr<SBChunkData>>& chunks, |
| AddChunksCallback)); |
| void AddChunks(const std::string& list, |
| scoped_ptr<std::vector<scoped_ptr<SBChunkData>>> chunks, |
| AddChunksCallback callback) override { |
| AddChunksRaw(list, *chunks, callback); |
| } |
| |
| // TODO(shess): Actually test this case somewhere. |
| MOCK_METHOD1(DeleteChunksRaw, |
| void(const std::vector<SBChunkDelete>& chunk_deletes)); |
| void DeleteChunks( |
| scoped_ptr<std::vector<SBChunkDelete>> chunk_deletes) override { |
| DeleteChunksRaw(*chunk_deletes); |
| } |
| }; |
| |
| // |InvokeGetChunksCallback| is required because GMock's InvokeArgument action |
| // expects to use operator(), and a Callback only provides Run(). |
| // TODO(cbentzel): Use ACTION or ACTION_TEMPLATE instead? |
| void InvokeGetChunksCallback( |
| const std::vector<SBListChunkRanges>& ranges, |
| bool database_error, |
| SafeBrowsingProtocolManagerDelegate::GetChunksCallback callback) { |
| callback.Run(ranges, database_error, false); |
| } |
| |
| // |HandleAddChunks| deletes the chunks and asynchronously invokes |
| // |callback| since SafeBrowsingProtocolManager is not re-entrant at the time |
| // this is called. This guarantee is part of the |
| // SafeBrowsingProtocolManagerDelegate contract. |
| void HandleAddChunks( |
| const std::string& unused_list, |
| const std::vector<scoped_ptr<SBChunkData>>& chunks, |
| SafeBrowsingProtocolManagerDelegate::AddChunksCallback callback) { |
| scoped_refptr<base::SingleThreadTaskRunner> task_runner( |
| base::ThreadTaskRunnerHandle::Get()); |
| if (!task_runner.get()) |
| return; |
| task_runner->PostTask(FROM_HERE, callback); |
| } |
| |
| } // namespace |
| |
| // Tests that the Update protocol will be skipped if there are problems |
| // accessing the database. |
| TEST_F(SafeBrowsingProtocolManagerTest, ProblemAccessingDatabase) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| true))); |
| EXPECT_CALL(test_delegate, UpdateFinished(false)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests the contents of the POST body when there are contents in the |
| // local database. This is not exhaustive, as the actual list formatting |
| // is covered by SafeBrowsingProtocolManagerTest.TestChunkStrings. |
| TEST_F(SafeBrowsingProtocolManagerTest, ExistingDatabase) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| std::vector<SBListChunkRanges> ranges; |
| SBListChunkRanges range_phish(kPhishingList); |
| range_phish.adds = "adds_phish"; |
| range_phish.subs = "subs_phish"; |
| ranges.push_back(range_phish); |
| |
| SBListChunkRanges range_unknown("unknown_list"); |
| range_unknown.adds = "adds_unknown"; |
| range_unknown.subs = "subs_unknown"; |
| ranges.push_back(range_unknown); |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| ranges, |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ASSERT_TRUE(url_fetcher); |
| EXPECT_EQ(net::LOAD_DISABLE_CACHE, url_fetcher->GetLoadFlags()); |
| EXPECT_EQ(base::StringPrintf("%s;a:adds_phish:s:subs_phish\n" |
| "unknown_list;a:adds_unknown:s:subs_unknown\n" |
| "%s;\n", |
| kDefaultPhishList, kDefaultMalwareList), |
| url_fetcher->upload_data()); |
| EXPECT_EQ(GURL("https://prefix.com/foo/downloads?client=unittest&appver=1.0" |
| "&pver=3.0" + |
| key_param_ + "&ext=0"), |
| url_fetcher->GetOriginalURL()); |
| |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(200); |
| url_fetcher->SetResponseString(std::string()); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| TEST_F(SafeBrowsingProtocolManagerTest, UpdateResponseBadBodyBackupSuccess) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // The update response is successful, but an invalid body. |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(200); |
| url_fetcher->SetResponseString("THIS_IS_A_BAD_RESPONSE"); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should now be a backup request. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupHttpUrlPrefix, ""); |
| |
| // Respond to the backup successfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(200); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is an HTTP error response to the update |
| // request, as well as an error response to the backup update request. |
| TEST_F(SafeBrowsingProtocolManagerTest, UpdateResponseHttpErrorBackupError) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(false)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // Go ahead and respond to it. |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(404); |
| url_fetcher->SetResponseString(std::string()); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should now be a backup request. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupHttpUrlPrefix, ""); |
| |
| // Respond to the backup unsuccessfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(404); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is an HTTP error response to the update |
| // request, followed by a successful response to the backup update request. |
| TEST_F(SafeBrowsingProtocolManagerTest, UpdateResponseHttpErrorBackupSuccess) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // Go ahead and respond to it. |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(404); |
| url_fetcher->SetResponseString(std::string()); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should now be a backup request. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupHttpUrlPrefix, ""); |
| |
| // Respond to the backup successfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(200); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is an HTTP error response to the update |
| // request, and a timeout on the backup update request. |
| TEST_F(SafeBrowsingProtocolManagerTest, UpdateResponseHttpErrorBackupTimeout) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(false)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // Go ahead and respond to it. |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(404); |
| url_fetcher->SetResponseString(std::string()); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should now be a backup request. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupHttpUrlPrefix, ""); |
| |
| // Either one or two calls to RunPendingTasks are needed here. The first run |
| // of RunPendingTasks will run the canceled timeout task associated with |
| // the first Update request. Depending on timing, this will either directly |
| // call the timeout task from the backup request, or schedule another task |
| // to run that in the future. |
| // TODO(cbentzel): Less fragile approach. |
| runner->RunPendingTasks(); |
| if (!pm->IsUpdateScheduled()) |
| runner->RunPendingTasks(); |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is a connection error when issuing the update |
| // request, and an error with the backup update request. |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| UpdateResponseConnectionErrorBackupError) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(false)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // Go ahead and respond to it. |
| url_fetcher->set_status(net::URLRequestStatus(net::URLRequestStatus::FAILED, |
| net::ERR_CONNECTION_RESET)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should be a backup URLFetcher now. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupConnectUrlPrefix, ""); |
| |
| // Respond to the backup unsuccessfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(404); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is a connection error when issuing the update |
| // request, and a successful response to the backup update request. |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| UpdateResponseConnectionErrorBackupSuccess) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // Go ahead and respond to it. |
| url_fetcher->set_status(net::URLRequestStatus(net::URLRequestStatus::FAILED, |
| net::ERR_CONNECTION_RESET)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should be a backup URLFetcher now. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupConnectUrlPrefix, ""); |
| |
| // Respond to the backup unsuccessfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(200); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| // Tests what happens when there is a network state error when issuing the |
| // update request, and an error with the backup update request. |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| UpdateResponseNetworkErrorBackupError) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(false)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // Go ahead and respond to it. |
| url_fetcher->set_status( |
| net::URLRequestStatus(net::URLRequestStatus::FAILED, |
| net::ERR_INTERNET_DISCONNECTED)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should be a backup URLFetcher now. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupNetworkUrlPrefix, ""); |
| |
| // Respond to the backup unsuccessfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(404); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is a network state error when issuing the |
| // update request, and a successful response to the backup update request. |
| TEST_F(SafeBrowsingProtocolManagerTest, |
| UpdateResponseNetworkErrorBackupSuccess) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // Go ahead and respond to it. |
| url_fetcher->set_status( |
| net::URLRequestStatus(net::URLRequestStatus::FAILED, |
| net::ERR_INTERNET_DISCONNECTED)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // There should be a backup URLFetcher now. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupNetworkUrlPrefix, ""); |
| |
| // Respond to the backup unsuccessfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(200); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is a timeout before an update response. |
| TEST_F(SafeBrowsingProtocolManagerTest, UpdateResponseTimeoutBackupSuccess) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // We should have an URLFetcher at this point in time. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // The first time RunPendingTasks is called above, the update timeout timer is |
| // not handled. This call of RunPendingTasks will handle the update. |
| runner->RunPendingTasks(); |
| |
| // There should be a backup URLFetcher now. |
| net::TestURLFetcher* backup_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateUpdateFetcherRequest(backup_url_fetcher, kBackupConnectUrlPrefix, ""); |
| |
| // Respond to the backup unsuccessfully. |
| backup_url_fetcher->set_status(net::URLRequestStatus()); |
| backup_url_fetcher->set_response_code(200); |
| backup_url_fetcher->SetResponseString(std::string()); |
| backup_url_fetcher->delegate()->OnURLFetchComplete(backup_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests what happens when there is a reset command in the response. |
| TEST_F(SafeBrowsingProtocolManagerTest, UpdateResponseReset) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, ResetDatabase()).Times(1); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| |
| // The update response is successful, and has a reset command. |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(200); |
| url_fetcher->SetResponseString("r:pleasereset\n"); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests a single valid update response, followed by a single redirect response |
| // that has an valid, but empty body. |
| TEST_F(SafeBrowsingProtocolManagerTest, EmptyRedirectResponse) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // The update response contains a single redirect command. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(200); |
| url_fetcher->SetResponseString( |
| base::StringPrintf("i:%s\n" |
| "u:redirect-server.example.com/path\n", |
| kDefaultPhishList)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // The redirect response contains an empty body. |
| net::TestURLFetcher* chunk_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateRedirectFetcherRequest( |
| chunk_url_fetcher, "https://redirect-server.example.com/path"); |
| chunk_url_fetcher->set_status(net::URLRequestStatus()); |
| chunk_url_fetcher->set_response_code(200); |
| chunk_url_fetcher->SetResponseString(std::string()); |
| chunk_url_fetcher->delegate()->OnURLFetchComplete(chunk_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests a single valid update response, followed by a single redirect response |
| // that has an invalid body. |
| TEST_F(SafeBrowsingProtocolManagerTest, InvalidRedirectResponse) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, UpdateFinished(false)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // The update response contains a single redirect command. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(200); |
| url_fetcher->SetResponseString( |
| base::StringPrintf("i:%s\n" |
| "u:redirect-server.example.com/path\n", |
| kDefaultPhishList)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // The redirect response contains an invalid body. |
| net::TestURLFetcher* chunk_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateRedirectFetcherRequest( |
| chunk_url_fetcher, "https://redirect-server.example.com/path"); |
| chunk_url_fetcher->set_status(net::URLRequestStatus()); |
| chunk_url_fetcher->set_response_code(200); |
| chunk_url_fetcher->SetResponseString("THIS IS AN INVALID RESPONSE"); |
| chunk_url_fetcher->delegate()->OnURLFetchComplete(chunk_url_fetcher); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests a single valid update response, followed by a single redirect response |
| // containing chunks. |
| TEST_F(SafeBrowsingProtocolManagerTest, SingleRedirectResponseWithChunks) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, AddChunksRaw(kDefaultPhishList, _, _)).WillOnce( |
| Invoke(HandleAddChunks)); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // The update response contains a single redirect command. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(200); |
| url_fetcher->SetResponseString( |
| base::StringPrintf("i:%s\n" |
| "u:redirect-server.example.com/path\n", |
| kDefaultPhishList)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // The redirect response contains a single chunk. |
| net::TestURLFetcher* chunk_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateRedirectFetcherRequest( |
| chunk_url_fetcher, "https://redirect-server.example.com/path"); |
| chunk_url_fetcher->set_status(net::URLRequestStatus()); |
| chunk_url_fetcher->set_response_code(200); |
| chunk_url_fetcher->SetResponseString(kChunkPayload1); |
| chunk_url_fetcher->delegate()->OnURLFetchComplete(chunk_url_fetcher); |
| |
| EXPECT_FALSE(pm->IsUpdateScheduled()); |
| |
| // The AddChunksCallback needs to be invoked. |
| runner->RunPendingTasks(); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| // Tests a single valid update response, followed by multiple redirect responses |
| // containing chunks. |
| TEST_F(SafeBrowsingProtocolManagerTest, MultipleRedirectResponsesWithChunks) { |
| scoped_refptr<base::TestSimpleTaskRunner> runner( |
| new base::TestSimpleTaskRunner()); |
| base::ThreadTaskRunnerHandle runner_handler(runner); |
| net::TestURLFetcherFactory url_fetcher_factory; |
| |
| testing::StrictMock<MockProtocolDelegate> test_delegate; |
| EXPECT_CALL(test_delegate, UpdateStarted()).Times(1); |
| EXPECT_CALL(test_delegate, GetChunks(_)).WillOnce( |
| Invoke(testing::CreateFunctor(InvokeGetChunksCallback, |
| std::vector<SBListChunkRanges>(), |
| false))); |
| EXPECT_CALL(test_delegate, AddChunksRaw(kDefaultPhishList, _, _)). |
| WillRepeatedly(Invoke(HandleAddChunks)); |
| EXPECT_CALL(test_delegate, UpdateFinished(true)).Times(1); |
| |
| scoped_ptr<SafeBrowsingProtocolManager> pm( |
| CreateProtocolManager(&test_delegate)); |
| |
| // Kick off initialization. This returns chunks from the DB synchronously. |
| pm->ForceScheduleNextUpdate(TimeDelta()); |
| runner->RunPendingTasks(); |
| |
| // The update response contains multiple redirect commands. |
| net::TestURLFetcher* url_fetcher = url_fetcher_factory.GetFetcherByID(0); |
| ValidateUpdateFetcherRequest(url_fetcher); |
| url_fetcher->set_status(net::URLRequestStatus()); |
| url_fetcher->set_response_code(200); |
| url_fetcher->SetResponseString( |
| base::StringPrintf("i:%s\n" |
| "u:redirect-server.example.com/one\n" |
| "u:redirect-server.example.com/two\n", |
| kDefaultPhishList)); |
| url_fetcher->delegate()->OnURLFetchComplete(url_fetcher); |
| |
| // The first redirect response contains a single chunk. |
| net::TestURLFetcher* first_chunk_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(1); |
| ValidateRedirectFetcherRequest( |
| first_chunk_url_fetcher, "https://redirect-server.example.com/one"); |
| first_chunk_url_fetcher->set_status(net::URLRequestStatus()); |
| first_chunk_url_fetcher->set_response_code(200); |
| first_chunk_url_fetcher->SetResponseString(kChunkPayload1); |
| first_chunk_url_fetcher->delegate()->OnURLFetchComplete( |
| first_chunk_url_fetcher); |
| |
| // Invoke the AddChunksCallback to trigger the second request. |
| runner->RunPendingTasks(); |
| |
| EXPECT_FALSE(pm->IsUpdateScheduled()); |
| |
| // The second redirect response contains a single chunk. |
| net::TestURLFetcher* second_chunk_url_fetcher = |
| url_fetcher_factory.GetFetcherByID(2); |
| ValidateRedirectFetcherRequest( |
| second_chunk_url_fetcher, "https://redirect-server.example.com/two"); |
| second_chunk_url_fetcher->set_status(net::URLRequestStatus()); |
| second_chunk_url_fetcher->set_response_code(200); |
| second_chunk_url_fetcher->SetResponseString(kChunkPayload2); |
| second_chunk_url_fetcher->delegate()->OnURLFetchComplete( |
| second_chunk_url_fetcher); |
| |
| EXPECT_FALSE(pm->IsUpdateScheduled()); |
| |
| // Invoke the AddChunksCallback to finish the update. |
| runner->RunPendingTasks(); |
| |
| EXPECT_TRUE(pm->IsUpdateScheduled()); |
| } |
| |
| } // namespace safe_browsing |