1// Copyright 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "base/bind.h"
6#include "base/run_loop.h"
7#include "chrome/browser/extensions/blacklist_state_fetcher.h"
8#include "chrome/browser/extensions/test_blacklist_state_fetcher.h"
9#include "chrome/common/safe_browsing/crx_info.pb.h"
10#include "content/public/test/test_browser_thread_bundle.h"
11#include "testing/gtest/include/gtest/gtest.h"
12
13namespace extensions {
14namespace {
15
16void Assign(BlacklistState* to, BlacklistState from) {
17  *to = from;
18}
19
20}  // namespace
21
22class BlacklistStateFetcherTest : public testing::Test {
23 private:
24  content::TestBrowserThreadBundle browser_thread_bundle_;
25};
26
27TEST_F(BlacklistStateFetcherTest, RequestBlacklistState) {
28  BlacklistStateFetcher fetcher;
29  TestBlacklistStateFetcher tester(&fetcher);
30
31  tester.SetBlacklistVerdict(
32      "a", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
33
34  BlacklistState result;
35  fetcher.Request("a", base::Bind(&Assign, &result));
36
37  EXPECT_TRUE(tester.HandleFetcher(0));
38  EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result);
39}
40
41TEST_F(BlacklistStateFetcherTest, RequestMultipleBlacklistStates) {
42  BlacklistStateFetcher fetcher;
43  TestBlacklistStateFetcher tester(&fetcher);
44
45  tester.SetBlacklistVerdict(
46      "a", ClientCRXListInfoResponse_Verdict_NOT_IN_BLACKLIST);
47  tester.SetBlacklistVerdict(
48      "b", ClientCRXListInfoResponse_Verdict_MALWARE);
49  tester.SetBlacklistVerdict(
50      "c", ClientCRXListInfoResponse_Verdict_SECURITY_VULNERABILITY);
51  tester.SetBlacklistVerdict(
52      "d", ClientCRXListInfoResponse_Verdict_CWS_POLICY_VIOLATION);
53  tester.SetBlacklistVerdict(
54      "e", ClientCRXListInfoResponse_Verdict_POTENTIALLY_UNWANTED);
55
56  BlacklistState result[9];
57  fetcher.Request("a", base::Bind(&Assign, &result[0]));
58  fetcher.Request("a", base::Bind(&Assign, &result[1]));
59  fetcher.Request("b", base::Bind(&Assign, &result[2]));
60  fetcher.Request("b", base::Bind(&Assign, &result[3]));
61  fetcher.Request("c", base::Bind(&Assign, &result[4]));
62  fetcher.Request("d", base::Bind(&Assign, &result[5]));
63  fetcher.Request("e", base::Bind(&Assign, &result[6]));
64  fetcher.Request("f", base::Bind(&Assign, &result[7]));
65  fetcher.Request("f", base::Bind(&Assign, &result[8]));
66
67  // 6 fetchers should be created. Sending responses in shuffled order.
68  EXPECT_TRUE(tester.HandleFetcher(4));
69  EXPECT_TRUE(tester.HandleFetcher(2));
70  EXPECT_TRUE(tester.HandleFetcher(5));
71  EXPECT_TRUE(tester.HandleFetcher(1));
72  EXPECT_TRUE(tester.HandleFetcher(0));
73  EXPECT_TRUE(tester.HandleFetcher(3));
74
75  EXPECT_EQ(NOT_BLACKLISTED, result[0]);
76  EXPECT_EQ(NOT_BLACKLISTED, result[1]);
77  EXPECT_EQ(BLACKLISTED_MALWARE, result[2]);
78  EXPECT_EQ(BLACKLISTED_MALWARE, result[3]);
79  EXPECT_EQ(BLACKLISTED_SECURITY_VULNERABILITY, result[4]);
80  EXPECT_EQ(BLACKLISTED_CWS_POLICY_VIOLATION, result[5]);
81  EXPECT_EQ(BLACKLISTED_POTENTIALLY_UNWANTED, result[6]);
82  EXPECT_EQ(NOT_BLACKLISTED, result[7]);
83  EXPECT_EQ(NOT_BLACKLISTED, result[8]);
84}
85
86}  // namespace extensions
87