1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105
|
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ui/safety_hub/safety_hub_hats_service.h"
#include "base/test/scoped_feature_list.h"
#include "chrome/browser/password_manager/password_manager_test_util.h"
#include "chrome/browser/ui/safety_hub/safety_hub_constants.h"
#include "chrome/browser/ui/safety_hub/safety_hub_hats_service_factory.h"
#include "chrome/browser/ui/safety_hub/safety_hub_test_util.h"
#include "chrome/common/chrome_features.h"
#include "chrome/test/base/testing_profile.h"
#include "components/password_manager/core/browser/password_store/test_password_store.h"
#include "content/public/test/browser_task_environment.h"
#include "testing/gtest/include/gtest/gtest.h"
class SafetyHubHatsServiceTest : public testing::Test {
public:
SafetyHubHatsServiceTest() = default;
void SetUp() override {
// A profile password store is required to launch the password status check
// service, which is used to get the password card data, which is part of
// the retrieved PSD.
CreateAndUseTestPasswordStore(profile());
safety_hub_test_util::CreateAndUsePasswordStatusService(profile());
safety_hub_test_util::CreateRevokedPermissionsService(profile());
safety_hub_test_util::CreateNotificationPermissionsReviewService(profile());
}
protected:
TestingProfile* profile() { return &profile_; }
SafetyHubHatsService* service() {
return SafetyHubHatsServiceFactory::GetForProfile(profile());
}
private:
content::BrowserTaskEnvironment task_environment_;
TestingProfile profile_;
};
TEST_F(SafetyHubHatsServiceTest, SafetyHubInteractionState) {
EXPECT_FALSE(service()
->GetSafetyHubProductSpecificData()
.find("User visited Safety Hub page")
->second);
EXPECT_FALSE(service()
->GetSafetyHubProductSpecificData()
.find("User clicked Safety Hub notification")
->second);
EXPECT_FALSE(service()
->GetSafetyHubProductSpecificData()
.find("User interacted with Safety Hub")
->second);
service()->SafetyHubVisited();
EXPECT_TRUE(service()
->GetSafetyHubProductSpecificData()
.find("User visited Safety Hub page")
->second);
EXPECT_FALSE(service()
->GetSafetyHubProductSpecificData()
.find("User clicked Safety Hub notification")
->second);
EXPECT_FALSE(service()
->GetSafetyHubProductSpecificData()
.find("User interacted with Safety Hub")
->second);
service()->SafetyHubNotificationClicked(
safety_hub::SafetyHubModuleType::UNUSED_SITE_PERMISSIONS);
EXPECT_TRUE(service()
->GetSafetyHubProductSpecificData()
.find("User visited Safety Hub page")
->second);
EXPECT_TRUE(service()
->GetSafetyHubProductSpecificData()
.find("User clicked Safety Hub notification")
->second);
EXPECT_TRUE(service()
->GetSafetyHubProductSpecificData()
.find("Is notification module revoked permissions")
->second);
EXPECT_FALSE(service()
->GetSafetyHubProductSpecificData()
.find("User interacted with Safety Hub")
->second);
service()->SafetyHubModuleInteracted();
EXPECT_TRUE(service()
->GetSafetyHubProductSpecificData()
.find("User visited Safety Hub page")
->second);
EXPECT_TRUE(service()
->GetSafetyHubProductSpecificData()
.find("User clicked Safety Hub notification")
->second);
EXPECT_TRUE(service()
->GetSafetyHubProductSpecificData()
.find("User interacted with Safety Hub")
->second);
}
|