1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112
|
// Copyright 2019 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/engagement/important_sites_util.h"
#include "chrome/browser/android/search_permissions/search_permissions_service.h"
#include "chrome/browser/content_settings/host_content_settings_map_factory.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/search_engines/template_url_service_factory.h"
#include "chrome/test/base/android/android_browser_test.h"
#include "chrome/test/base/chrome_test_utils.h"
#include "components/content_settings/core/browser/host_content_settings_map.h"
#include "components/content_settings/core/common/content_settings_types.h"
#include "components/permissions/features.h"
#include "components/search_engines/template_url.h"
#include "components/search_engines/template_url_service.h"
#include "content/public/browser/web_contents.h"
#include "content/public/test/browser_test.h"
#include "testing/gmock/include/gmock/gmock.h"
namespace site_engagement {
class ImportantSitesUtilBrowserTest : public AndroidBrowserTest {
public:
ImportantSitesUtilBrowserTest() = default;
ImportantSitesUtilBrowserTest(const ImportantSitesUtilBrowserTest&) = delete;
ImportantSitesUtilBrowserTest& operator=(
const ImportantSitesUtilBrowserTest&) = delete;
~ImportantSitesUtilBrowserTest() override = default;
protected:
const GURL& default_search_url() const { return default_search_url_; }
Profile* profile() {
auto* web_contents = chrome_test_utils::GetActiveWebContents(this);
return Profile::FromBrowserContext(web_contents->GetBrowserContext());
}
void GetDefaultSearchURL() {
auto* template_url_service =
TemplateURLServiceFactory::GetForProfile(profile());
ASSERT_TRUE(template_url_service);
const auto* template_url = template_url_service->GetDefaultSearchProvider();
ASSERT_TRUE(template_url);
default_search_url_ = template_url->GenerateSearchURL(
template_url_service->search_terms_data());
ASSERT_FALSE(default_search_url_.is_empty());
}
void GrantNotificationPermissionForOrigin(const url::Origin& origin) {
auto* host_content_settings_map =
HostContentSettingsMapFactory::GetForProfile(profile());
ASSERT_TRUE(host_content_settings_map);
host_content_settings_map->SetContentSettingDefaultScope(
origin.GetURL(), GURL(), ContentSettingsType::NOTIFICATIONS,
CONTENT_SETTING_ALLOW);
}
std::vector<std::string> GetImportantDomains(Profile* profile) {
std::vector<std::string> important_domains;
for (const ImportantSitesUtil::ImportantDomainInfo& info :
ImportantSitesUtil::GetImportantRegisterableDomains(profile, 10)) {
important_domains.push_back(info.registerable_domain);
}
return important_domains;
}
// AndroidBrowserTest:
void SetUpOnMainThread() override {
ASSERT_NO_FATAL_FAILURE(GetDefaultSearchURL());
}
private:
GURL default_search_url_;
};
// An origin with notification permission should be considered important, even
// if it's the default search engine origin. Because the DSE does not have any
// special permissions anymore.
IN_PROC_BROWSER_TEST_F(ImportantSitesUtilBrowserTest,
DSEConsideredImportantInRegularMode) {
const char kTestURL[] = "https://a.com/";
const url::Origin kDSEOrigin = url::Origin::Create(default_search_url());
const std::string kDSERegistrableDomain("google.com");
const url::Origin kNonDSEOrigin = url::Origin::Create(GURL(kTestURL));
GrantNotificationPermissionForOrigin(kDSEOrigin);
GrantNotificationPermissionForOrigin(kNonDSEOrigin);
EXPECT_THAT(
GetImportantDomains(profile()),
::testing::ElementsAre(kNonDSEOrigin.host(), kDSERegistrableDomain));
// Important site calculation in incognito mode used to crash in Android
// pre-O where notification channels are not yet used, see crbug.com/989890.
//
// It also used to produce wrong results, since notification permission
// information got inherited incorrectly.
// See crbug.com/993021, crbug.com/1052406
auto* incognito_profile =
profile()->GetPrimaryOTRProfile(/*create_if_needed=*/true);
ASSERT_TRUE(incognito_profile);
ASSERT_TRUE(incognito_profile->IsOffTheRecord());
EXPECT_THAT(
GetImportantDomains(profile()),
::testing::ElementsAre(kNonDSEOrigin.host(), kDSERegistrableDomain));
}
} // namespace site_engagement
|