forked from chromium/chromium
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathimportant_sites_util_browsertest.cc
97 lines (82 loc) · 3.99 KB
/
important_sites_util_browsertest.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
// Copyright 2019 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/engagement/important_sites_util.h"
#include "chrome/browser/android/search_permissions/search_permissions_service.h"
#include "chrome/browser/content_settings/host_content_settings_map_factory.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/search_engines/template_url_service_factory.h"
#include "chrome/test/base/android/android_browser_test.h"
#include "chrome/test/base/chrome_test_utils.h"
#include "components/content_settings/core/browser/host_content_settings_map.h"
#include "components/content_settings/core/common/content_settings_types.h"
#include "components/search_engines/template_url.h"
#include "components/search_engines/template_url_service.h"
#include "testing/gmock/include/gmock/gmock.h"
class ImportantSitesUtilBrowserTest : public AndroidBrowserTest {
public:
ImportantSitesUtilBrowserTest() = default;
~ImportantSitesUtilBrowserTest() override = default;
protected:
const GURL& default_search_url() const { return default_search_url_; }
Profile* profile() {
auto* web_contents = chrome_test_utils::GetActiveWebContents(this);
return Profile::FromBrowserContext(web_contents->GetBrowserContext());
}
void GetDefaultSearchURL() {
auto* template_url_service =
TemplateURLServiceFactory::GetForProfile(profile());
ASSERT_TRUE(template_url_service);
const auto* template_url = template_url_service->GetDefaultSearchProvider();
ASSERT_TRUE(template_url);
default_search_url_ = template_url->GenerateSearchURL(
template_url_service->search_terms_data());
ASSERT_FALSE(default_search_url_.is_empty());
}
void GrantNotificationPermissionForOrigin(const url::Origin& origin) {
auto* host_content_settings_map =
HostContentSettingsMapFactory::GetForProfile(profile());
ASSERT_TRUE(host_content_settings_map);
host_content_settings_map->SetContentSettingDefaultScope(
origin.GetURL(), GURL(), ContentSettingsType::NOTIFICATIONS,
std::string() /* resource_identifier */, CONTENT_SETTING_ALLOW);
}
std::vector<std::string> GetImportantDomains(Profile* profile) {
std::vector<std::string> important_domains;
for (const ImportantSitesUtil::ImportantDomainInfo& info :
ImportantSitesUtil::GetImportantRegisterableDomains(profile, 10)) {
important_domains.push_back(info.registerable_domain);
}
return important_domains;
}
// AndroidBrowserTest:
void SetUpOnMainThread() override {
ASSERT_NO_FATAL_FAILURE(GetDefaultSearchURL());
}
private:
GURL default_search_url_;
DISALLOW_COPY_AND_ASSIGN(ImportantSitesUtilBrowserTest);
};
// An origin with notification permission should be considered important, unless
// it is the default search engine, which gets the permission auto-granted.
IN_PROC_BROWSER_TEST_F(ImportantSitesUtilBrowserTest,
DSENotConsideredImportantInRegularMode) {
const char kTestURL[] = "https://a.com/";
const url::Origin kDSEOrigin = url::Origin::Create(default_search_url());
const url::Origin kNonDSEOrigin = url::Origin::Create(GURL(kTestURL));
GrantNotificationPermissionForOrigin(kDSEOrigin);
GrantNotificationPermissionForOrigin(kNonDSEOrigin);
EXPECT_THAT(GetImportantDomains(profile()),
::testing::ElementsAre(kNonDSEOrigin.host()));
// Important site calculation in incognito mode used to crash in Android
// pre-O where notification channels are not yet used, see crbug.com/989890.
//
// It also used to produce wrong results, since notification permission
// information got inherited incorrectly.
// See crbug.com/993021, crbug.com/1052406
auto* incognito_profile = profile()->GetOffTheRecordProfile();
ASSERT_TRUE(incognito_profile);
ASSERT_TRUE(incognito_profile->IsOffTheRecord());
EXPECT_THAT(GetImportantDomains(profile()),
::testing::ElementsAre(kNonDSEOrigin.host()));
}