blob: 28a9f54eeb7d543680345e4921e3ec2705e973a3 [file] [log] [blame]
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/safe_browsing/chrome_client_side_detection_host_delegate.h"
#include "base/run_loop.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/safe_browsing/chrome_safe_browsing_blocking_page_factory.h"
#include "chrome/browser/safe_browsing/chrome_ui_manager_delegate.h"
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/common/url_constants.h"
#include "chrome/test/base/in_process_browser_test.h"
#include "chrome/test/base/ui_test_utils.h"
#include "components/prefs/pref_service.h"
#include "components/safe_browsing/buildflags.h"
#include "components/safe_browsing/content/browser/client_side_detection_service.h"
#include "components/safe_browsing/content/browser/ui_manager.h"
#include "components/safe_browsing/core/common/proto/client_model.pb.h"
#include "content/public/test/browser_test.h"
#include "content/public/test/mock_navigation_handle.h"
#include "content/public/test/prerender_test_util.h"
#include "net/dns/mock_host_resolver.h"
#include "net/test/embedded_test_server/embedded_test_server.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "url/gurl.h"
namespace safe_browsing {
namespace {
using ::testing::_;
using ::testing::StrictMock;
class FakeClientSideDetectionService : public ClientSideDetectionService {
public:
FakeClientSideDetectionService() : ClientSideDetectionService(nullptr) {}
void SendClientReportPhishingRequest(
std::unique_ptr<ClientPhishingRequest> verdict,
ClientReportPhishingRequestCallback callback,
const std::string& access_token) override {
saved_request_ = *verdict;
saved_callback_ = std::move(callback);
access_token_ = access_token;
request_callback_.Run();
}
const ClientPhishingRequest& saved_request() { return saved_request_; }
bool saved_callback_is_null() { return saved_callback_.is_null(); }
ClientReportPhishingRequestCallback saved_callback() {
return std::move(saved_callback_);
}
void SetModel(const ClientSideModel& model) { model_ = model; }
CSDModelType GetModelType() override { return CSDModelType::kProtobuf; }
const std::string& GetModelStr() override {
client_side_model_ = model_.SerializeAsString();
return client_side_model_;
}
void SetRequestCallback(const base::RepeatingClosure& closure) {
request_callback_ = closure;
}
base::WeakPtr<ClientSideDetectionService> GetWeakPtr() {
return weak_factory_.GetWeakPtr();
}
private:
ClientPhishingRequest saved_request_;
ClientReportPhishingRequestCallback saved_callback_;
ClientSideModel model_;
std::string access_token_;
std::string client_side_model_;
base::RepeatingClosure request_callback_;
base::WeakPtrFactory<ClientSideDetectionService> weak_factory_{this};
};
class MockSafeBrowsingUIManager : public SafeBrowsingUIManager {
public:
MockSafeBrowsingUIManager()
: SafeBrowsingUIManager(
std::make_unique<ChromeSafeBrowsingUIManagerDelegate>(),
std::make_unique<ChromeSafeBrowsingBlockingPageFactory>(),
GURL(chrome::kChromeUINewTabURL)) {}
MockSafeBrowsingUIManager(const MockSafeBrowsingUIManager&) = delete;
MockSafeBrowsingUIManager& operator=(const MockSafeBrowsingUIManager&) =
delete;
MOCK_METHOD1(DisplayBlockingPage, void(const UnsafeResource& resource));
protected:
~MockSafeBrowsingUIManager() override = default;
};
} // namespace
class ClientSideDetectionHostPrerenderBrowserTest
: public InProcessBrowserTest {
public:
ClientSideDetectionHostPrerenderBrowserTest()
: prerender_helper_(base::BindRepeating(
&ClientSideDetectionHostPrerenderBrowserTest::GetWebContents,
base::Unretained(this))) {}
~ClientSideDetectionHostPrerenderBrowserTest() override = default;
ClientSideDetectionHostPrerenderBrowserTest(
const ClientSideDetectionHostPrerenderBrowserTest&) = delete;
ClientSideDetectionHostPrerenderBrowserTest& operator=(
const ClientSideDetectionHostPrerenderBrowserTest&) = delete;
void SetUp() override {
prerender_helper_.SetUp(embedded_test_server());
InProcessBrowserTest::SetUp();
}
void SetUpOnMainThread() override {
model_.set_version(123);
model_.set_max_words_per_term(1);
// This model will always trigger.
model_.set_threshold_probability(-1);
host_resolver()->AddRule("*", "127.0.0.1");
ASSERT_TRUE(embedded_test_server()->Start());
}
content::test::PrerenderTestHelper& prerender_helper() {
return prerender_helper_;
}
content::WebContents* GetWebContents() {
return browser()->tab_strip_model()->GetActiveWebContents();
}
ClientSideModel& client_side_model() { return model_; }
private:
ClientSideModel model_;
content::test::PrerenderTestHelper prerender_helper_;
};
IN_PROC_BROWSER_TEST_F(ClientSideDetectionHostPrerenderBrowserTest,
DISABLED_PrerenderShouldNotAffectClientSideDetection) {
FakeClientSideDetectionService fake_csd_service;
fake_csd_service.SetModel(client_side_model());
scoped_refptr<StrictMock<MockSafeBrowsingUIManager>> mock_ui_manager =
new StrictMock<MockSafeBrowsingUIManager>();
std::unique_ptr<ClientSideDetectionHost> csd_host =
ChromeClientSideDetectionHostDelegate::CreateHost(
browser()->tab_strip_model()->GetActiveWebContents());
csd_host->set_client_side_detection_service(fake_csd_service.GetWeakPtr());
csd_host->set_ui_manager(mock_ui_manager.get());
fake_csd_service.SendModelToRenderers();
GURL page_url(embedded_test_server()->GetURL("/safe_browsing/malware.html"));
ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), page_url));
base::RunLoop run_loop;
fake_csd_service.SetRequestCallback(run_loop.QuitClosure());
// Bypass the pre-classification checks.
csd_host->OnPhishingPreClassificationDone(/*should_classify=*/true);
// A prerendered navigation committing should not cancel classification.
// We simulate the commit of a prerendered navigation to avoid races
// between the completion of phishing detection in the primary
// main frame's renderer and the commit of a real prerendered navigation.
// TODO(mcnee): Use a real prerendered navigation here and make sure the
// navigation doesn't race with the classification.
content::MockNavigationHandle prerendered_navigation_handle;
prerendered_navigation_handle.set_has_committed(true);
prerendered_navigation_handle.set_is_in_primary_main_frame(false);
csd_host->DidFinishNavigation(&prerendered_navigation_handle);
run_loop.Run();
ASSERT_FALSE(fake_csd_service.saved_callback_is_null());
EXPECT_EQ(fake_csd_service.saved_request().model_version(), 123);
// Expect an interstitial to be shown.
EXPECT_CALL(*mock_ui_manager, DisplayBlockingPage(_));
std::move(fake_csd_service.saved_callback()).Run(page_url, true);
}
IN_PROC_BROWSER_TEST_F(ClientSideDetectionHostPrerenderBrowserTest,
DISABLED_ClassifyPrerenderedPageAfterActivation) {
FakeClientSideDetectionService fake_csd_service;
fake_csd_service.SetModel(client_side_model());
scoped_refptr<StrictMock<MockSafeBrowsingUIManager>> mock_ui_manager =
new StrictMock<MockSafeBrowsingUIManager>();
std::unique_ptr<ClientSideDetectionHost> csd_host =
ChromeClientSideDetectionHostDelegate::CreateHost(
browser()->tab_strip_model()->GetActiveWebContents());
csd_host->set_client_side_detection_service(fake_csd_service.GetWeakPtr());
csd_host->set_ui_manager(mock_ui_manager.get());
fake_csd_service.SendModelToRenderers();
base::RunLoop run_loop;
fake_csd_service.SetRequestCallback(run_loop.QuitClosure());
const GURL initial_url(embedded_test_server()->GetURL("/title1.html"));
ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), initial_url));
// Prerender then activate a phishing page.
const GURL prerender_url =
embedded_test_server()->GetURL("/safe_browsing/malware.html");
prerender_helper().AddPrerender(prerender_url);
prerender_helper().NavigatePrimaryPage(prerender_url);
// Bypass the pre-classification checks.
csd_host->OnPhishingPreClassificationDone(/*should_classify=*/true);
run_loop.Run();
ASSERT_FALSE(fake_csd_service.saved_callback_is_null());
EXPECT_EQ(fake_csd_service.saved_request().model_version(), 123);
// Expect an interstitial to be shown.
EXPECT_CALL(*mock_ui_manager, DisplayBlockingPage(_));
std::move(fake_csd_service.saved_callback()).Run(prerender_url, true);
}
} // namespace safe_browsing