blob: 1cbf2e29aeb5b346947defe629fac685782b1c97 [file] [log] [blame]
// Copyright 2025 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/enterprise/signals/profile_signals_collector.h"
#include <array>
#include <utility>
#include "base/memory/raw_ptr.h"
#include "base/test/task_environment.h"
#include "base/values.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/enterprise/identifiers/profile_id_service_factory.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/common/pref_names.h"
#include "chrome/test/base/chrome_test_utils.h"
#include "chrome/test/base/platform_browser_test.h"
#include "components/device_signals/core/browser/signals_types.h"
#include "components/device_signals/core/browser/user_permission_service.h"
#include "components/device_signals/core/common/signals_constants.h"
#include "components/enterprise/browser/identifiers/profile_id_service.h"
#include "components/policy/core/common/cloud/cloud_policy_manager.h"
#include "components/policy/core/common/cloud/cloud_policy_util.h"
#include "components/policy/proto/device_management_backend.pb.h"
#include "components/prefs/pref_service.h"
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
#include "content/public/test/browser_test.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace {
constexpr char kFakeUserEnrollmentDomain[] = "fake.domain.google.com";
constexpr char kFakeProfileId[] = "SomeProfileId";
std::unique_ptr<KeyedService> CreateProfileIdService(
content::BrowserContext* context) {
return std::make_unique<enterprise::ProfileIdService>(kFakeProfileId);
}
} // namespace
namespace device_signals {
class ProfileSignalsCollectorTest : public PlatformBrowserTest {
protected:
void SetUpBrowserContextKeyedServices(
content::BrowserContext* context) override {
enterprise::ProfileIdServiceFactory::GetInstance()->SetTestingFactory(
context, base::BindRepeating(&CreateProfileIdService));
PlatformBrowserTest::SetUpBrowserContextKeyedServices(context);
}
std::unique_ptr<ProfileSignalsCollector> CreateProfileSignalsCollector() {
return std::make_unique<ProfileSignalsCollector>(profile());
}
void SetFakePolicyAndPrefData() {
auto policy_data = std::make_unique<enterprise_management::PolicyData>();
policy_data->set_managed_by(kFakeUserEnrollmentDomain);
profile()
->GetCloudPolicyManager()
->core()
->store()
->set_policy_data_for_testing(std::move(policy_data));
g_browser_process->local_state()->SetBoolean(
prefs::kBuiltInDnsClientEnabled, true);
// Give the testing profile a safe browsing level of "STANDARD_PROTECTION"
profile()->GetPrefs()->SetBoolean(prefs::kSafeBrowsingEnabled, true);
profile()->GetPrefs()->SetBoolean(prefs::kSafeBrowsingEnhanced, false);
}
// Helper function to check the profile level signals are collected correctly.
void CheckSignalsCollected(ProfileSignalsResponse& response) {
EXPECT_EQ(response.profile_enrollment_domain, kFakeUserEnrollmentDomain);
EXPECT_EQ(response.safe_browsing_protection_level,
safe_browsing::SafeBrowsingState::STANDARD_PROTECTION);
EXPECT_TRUE(response.built_in_dns_client_enabled);
}
Profile* profile() { return chrome_test_utils::GetProfile(this); }
std::unique_ptr<ProfileSignalsCollector> signal_collector_ = nullptr;
};
// Test that runs a sanity check on the set of signals supported by this
// collector. Will need to be updated if new signals become supported.
IN_PROC_BROWSER_TEST_F(ProfileSignalsCollectorTest,
SupportedBrowserContextSignalNames) {
auto signals_collector = CreateProfileSignalsCollector();
const std::array<SignalName, 1> supported_signals{
{SignalName::kBrowserContextSignals}};
const auto names_set = signals_collector->GetSupportedSignalNames();
EXPECT_EQ(names_set.size(), supported_signals.size());
for (const auto& signal_name : supported_signals) {
EXPECT_TRUE(names_set.find(signal_name) != names_set.end());
}
}
// Happy path test case for OS signals collection with full permission.
IN_PROC_BROWSER_TEST_F(ProfileSignalsCollectorTest, GetSignal_Success) {
auto signals_collector = CreateProfileSignalsCollector();
SetFakePolicyAndPrefData();
SignalName signal_name = SignalName::kBrowserContextSignals;
SignalsAggregationRequest empty_request;
SignalsAggregationResponse response;
signals_collector->GetSignal(signal_name, UserPermission::kGranted,
empty_request, response, base::DoNothing());
ASSERT_FALSE(response.top_level_error.has_value());
ASSERT_TRUE(response.profile_signals_response);
CheckSignalsCollected(response.profile_signals_response.value());
}
// Tests that an unsupported signal is marked as unsupported.
IN_PROC_BROWSER_TEST_F(ProfileSignalsCollectorTest,
GetBrowserContextSignal_Unsupported) {
auto signals_collector = CreateProfileSignalsCollector();
SignalName signal_name = SignalName::kAntiVirus;
SignalsAggregationRequest empty_request;
SignalsAggregationResponse response;
signals_collector->GetSignal(signal_name, UserPermission::kGranted,
empty_request, response, base::DoNothing());
ASSERT_TRUE(response.top_level_error.has_value());
EXPECT_EQ(response.top_level_error.value(),
SignalCollectionError::kUnsupported);
}
// Tests that signal collection is halted if permission is not sufficient.
IN_PROC_BROWSER_TEST_F(ProfileSignalsCollectorTest, GetSignal_MissingUser) {
auto signals_collector = CreateProfileSignalsCollector();
SignalName signal_name = SignalName::kBrowserContextSignals;
SignalsAggregationRequest empty_request;
SignalsAggregationResponse response;
signals_collector->GetSignal(signal_name, UserPermission::kMissingUser,
empty_request, response, base::DoNothing());
ASSERT_FALSE(response.top_level_error.has_value());
ASSERT_FALSE(response.profile_signals_response);
}
} // namespace device_signals