1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
|
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef COMPONENTS_SAFE_BROWSING_PASSWORD_PROTECTION_MOCK_PASSWORD_PROTECTION_SERVICE_H_
#define COMPONENTS_SAFE_BROWSING_PASSWORD_PROTECTION_MOCK_PASSWORD_PROTECTION_SERVICE_H_
#include "base/macros.h"
#include "components/safe_browsing/password_protection/password_protection_service.h"
#include "testing/gmock/include/gmock/gmock.h"
namespace safe_browsing {
class MockPasswordProtectionService : public PasswordProtectionService {
public:
MockPasswordProtectionService();
MockPasswordProtectionService(
const scoped_refptr<SafeBrowsingDatabaseManager>& database_manager,
scoped_refptr<network::SharedURLLoaderFactory> url_loader_factory,
scoped_refptr<HostContentSettingsMap> content_setting_map);
~MockPasswordProtectionService() override;
// safe_browsing::PasswordProtectionService
MOCK_CONST_METHOD0(GetSyncAccountType,
safe_browsing::LoginReputationClientRequest::
PasswordReuseEvent::SyncAccountType());
MOCK_CONST_METHOD0(GetBrowserPolicyConnector,
const policy::BrowserPolicyConnector*());
MOCK_CONST_METHOD0(GetPasswordProtectionWarningTriggerPref,
safe_browsing::PasswordProtectionTrigger());
MOCK_CONST_METHOD2(IsURLWhitelistedForPasswordEntry,
bool(const GURL&, RequestOutcome*));
MOCK_METHOD0(IsExtendedReporting, bool());
MOCK_METHOD0(IsIncognito, bool());
MOCK_METHOD0(IsHistorySyncEnabled, bool());
MOCK_METHOD0(OnPolicySpecifiedPasswordChanged, void());
MOCK_METHOD1(MaybeLogPasswordReuseDetectedEvent, void(content::WebContents*));
MOCK_METHOD1(UserClickedThroughSBInterstitial, bool(content::WebContents*));
MOCK_METHOD1(ShowInterstitial, void(content::WebContents*));
MOCK_METHOD2(IsPingingEnabled,
bool(safe_browsing::LoginReputationClientRequest::TriggerType,
RequestOutcome*));
MOCK_METHOD2(ShowModalWarning,
void(content::WebContents*, const std::string&));
MOCK_METHOD2(UpdateSecurityState,
void(safe_browsing::SBThreatType, content::WebContents*));
MOCK_METHOD2(RemoveUnhandledSyncPasswordReuseOnURLsDeleted,
void(bool, const history::URLRows&));
MOCK_METHOD2(OnPolicySpecifiedPasswordReuseDetected, void(const GURL&, bool));
MOCK_METHOD3(FillReferrerChain,
void(const GURL&,
SessionID,
safe_browsing::LoginReputationClientRequest::Frame*));
MOCK_METHOD3(MaybeLogPasswordReuseLookupEvent,
void(content::WebContents*,
PasswordProtectionService::RequestOutcome,
const safe_browsing::LoginReputationClientResponse*));
MOCK_METHOD3(OnUserAction,
void(content::WebContents*, WarningUIType, WarningAction));
MOCK_METHOD4(
MaybeStartPasswordFieldOnFocusRequest,
void(content::WebContents*, const GURL&, const GURL&, const GURL&));
MOCK_METHOD5(MaybeStartProtectedPasswordEntryRequest,
void(content::WebContents*,
const GURL&,
bool,
const std::vector<std::string>&,
bool));
private:
DISALLOW_COPY_AND_ASSIGN(MockPasswordProtectionService);
};
} // namespace safe_browsing
#endif // COMPONENTS_SAFE_BROWSING_PASSWORD_PROTECTION_MOCK_PASSWORD_PROTECTION_SERVICE_H_
|