| // Copyright 2020 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/ui/webui/settings/hats_handler.h" |
| |
| #include <memory> |
| #include <string> |
| |
| #include "base/memory/raw_ptr.h" |
| #include "base/values.h" |
| #include "chrome/browser/privacy_sandbox/privacy_sandbox_settings_factory.h" |
| #include "chrome/browser/ui/hats/hats_service.h" |
| #include "chrome/browser/ui/hats/hats_service_factory.h" |
| #include "chrome/browser/ui/hats/mock_hats_service.h" |
| #include "chrome/browser/ui/hats/mock_trust_safety_sentiment_service.h" |
| #include "chrome/browser/ui/hats/trust_safety_sentiment_service_factory.h" |
| #include "chrome/common/chrome_features.h" |
| #include "chrome/test/base/chrome_render_view_host_test_harness.h" |
| #include "components/content_settings/core/browser/cookie_settings.h" |
| #include "components/content_settings/core/common/pref_names.h" |
| #include "components/prefs/pref_service.h" |
| #include "components/privacy_sandbox/privacy_sandbox_prefs.h" |
| #include "components/privacy_sandbox/privacy_sandbox_settings.h" |
| #include "content/public/test/test_web_ui.h" |
| #include "testing/gmock/include/gmock/gmock.h" |
| |
| using ::testing::_; |
| |
| class Profile; |
| |
| namespace settings { |
| |
| class HatsHandlerTest : public ChromeRenderViewHostTestHarness { |
| public: |
| HatsHandlerTest() { |
| base::test::FeatureRefAndParams settings_privacy{ |
| features::kHappinessTrackingSurveysForDesktopSettingsPrivacy, |
| {{"settings-time", "15s"}}}; |
| base::test::FeatureRefAndParams privacy_sandbox{ |
| features::kHappinessTrackingSurveysForDesktopPrivacySandbox, |
| {{"settings-time", "10s"}}}; |
| base::test::FeatureRefAndParams privacy_guide{ |
| features::kHappinessTrackingSurveysForDesktopPrivacyGuide, |
| {{"settings-time", "15s"}}}; |
| scoped_feature_list_.InitWithFeaturesAndParameters( |
| {settings_privacy, privacy_sandbox, privacy_guide}, {}); |
| } |
| |
| void SetUp() override { |
| ChromeRenderViewHostTestHarness::SetUp(); |
| |
| web_ui_ = std::make_unique<content::TestWebUI>(); |
| web_ui_->set_web_contents(web_contents()); |
| handler_ = std::make_unique<HatsHandler>(); |
| handler_->set_web_ui(web_ui()); |
| handler_->AllowJavascript(); |
| web_ui_->ClearTrackedCalls(); |
| |
| mock_hats_service_ = static_cast<MockHatsService*>( |
| HatsServiceFactory::GetInstance()->SetTestingFactoryAndUse( |
| profile(), base::BindRepeating(&BuildMockHatsService))); |
| EXPECT_CALL(*mock_hats_service_, CanShowAnySurvey(_)) |
| .WillRepeatedly(testing::Return(true)); |
| |
| mock_sentiment_service_ = static_cast<MockTrustSafetySentimentService*>( |
| TrustSafetySentimentServiceFactory::GetInstance() |
| ->SetTestingFactoryAndUse( |
| profile(), |
| base::BindRepeating(&BuildMockTrustSafetySentimentService))); |
| } |
| |
| void TearDown() override { |
| handler_->set_web_ui(nullptr); |
| handler_.reset(); |
| web_ui_.reset(); |
| |
| ChromeRenderViewHostTestHarness::TearDown(); |
| } |
| |
| content::TestWebUI* web_ui() { return web_ui_.get(); } |
| HatsHandler* handler() { return handler_.get(); } |
| raw_ptr<MockHatsService> mock_hats_service_; |
| raw_ptr<MockTrustSafetySentimentService> mock_sentiment_service_; |
| |
| protected: |
| // This should only be accessed in the test constructor, to avoid race |
| // conditions with other threads. |
| base::test::ScopedFeatureList scoped_feature_list_; |
| |
| private: |
| std::unique_ptr<content::TestWebUI> web_ui_; |
| std::unique_ptr<HatsHandler> handler_; |
| }; |
| |
| TEST_F(HatsHandlerTest, PrivacySettingsHats) { |
| PrivacySandboxSettingsFactory::GetForProfile(profile()) |
| ->SetPrivacySandboxEnabled(false); |
| profile()->GetPrefs()->SetInteger( |
| prefs::kCookieControlsMode, |
| static_cast<int>(content_settings::CookieControlsMode::kBlockThirdParty)); |
| SurveyBitsData expected_product_specific_data = { |
| {"3P cookies blocked", true}, {"Privacy Sandbox enabled", false}}; |
| |
| // Check that both interacting with the privacy card, and running Safety Check |
| // result in a survey request with the appropriate product specific data. |
| EXPECT_CALL(*mock_hats_service_, |
| LaunchDelayedSurveyForWebContents( |
| kHatsSurveyTriggerSettingsPrivacy, web_contents(), 15000, |
| expected_product_specific_data, _, true)) |
| .Times(2); |
| base::Value::List args; |
| args.Append( |
| static_cast<int>(HatsHandler::TrustSafetyInteraction::USED_PRIVACY_CARD)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| task_environment()->RunUntilIdle(); |
| |
| args[0] = base::Value( |
| static_cast<int>(HatsHandler::TrustSafetyInteraction::RAN_SAFETY_CHECK)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| task_environment()->RunUntilIdle(); |
| } |
| |
| TEST_F(HatsHandlerTest, PrivacyGuideHats) { |
| // Check that completing a privacy guide triggers a privacy guide hats. |
| EXPECT_CALL(*mock_hats_service_, LaunchDelayedSurveyForWebContents( |
| kHatsSurveyTriggerPrivacyGuide, |
| web_contents(), 15000, _, _, true)) |
| .Times(1); |
| base::Value::List args; |
| args.Append(static_cast<int>( |
| HatsHandler::TrustSafetyInteraction::COMPLETED_PRIVACY_GUIDE)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| task_environment()->RunUntilIdle(); |
| } |
| |
| class HatsHandlerNoSandboxTest : public HatsHandlerTest { |
| public: |
| HatsHandlerNoSandboxTest() { |
| scoped_feature_list_.Reset(); |
| base::test::FeatureRefAndParams settings_privacy{ |
| features::kHappinessTrackingSurveysForDesktopSettingsPrivacy, |
| {{"no-sandbox", "true"}}}; |
| scoped_feature_list_.InitWithFeaturesAndParameters({settings_privacy}, {}); |
| } |
| }; |
| |
| TEST_F(HatsHandlerNoSandboxTest, PrivacySettings) { |
| PrivacySandboxSettingsFactory::GetForProfile(profile()) |
| ->SetPrivacySandboxEnabled(false); |
| profile()->GetPrefs()->SetInteger( |
| prefs::kCookieControlsMode, |
| static_cast<int>(content_settings::CookieControlsMode::kBlockThirdParty)); |
| SurveyBitsData expected_product_specific_data = { |
| {"3P cookies blocked", true}, {"Privacy Sandbox enabled", false}}; |
| // Enable targeting for users who have not seen the Privacy Sandbox page and |
| // ensure the handler does not attempt to launch the survey. |
| EXPECT_CALL(*mock_hats_service_, |
| LaunchDelayedSurveyForWebContents(_, _, _, _, _, _)) |
| .Times(0); |
| |
| profile()->GetPrefs()->SetBoolean(prefs::kPrivacySandboxPageViewed, true); |
| |
| base::Value::List args; |
| args.Append( |
| static_cast<int>(HatsHandler::TrustSafetyInteraction::USED_PRIVACY_CARD)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| task_environment()->RunUntilIdle(); |
| } |
| |
| TEST_F(HatsHandlerTest, PrivacySandboxHats) { |
| // Check that the handler correctly forwards the survey request to the |
| // HaTS service and also includes the appropriate product specific data. |
| PrivacySandboxSettingsFactory::GetForProfile(profile()) |
| ->SetPrivacySandboxEnabled(false); |
| profile()->GetPrefs()->SetInteger( |
| prefs::kCookieControlsMode, |
| static_cast<int>(content_settings::CookieControlsMode::kBlockThirdParty)); |
| SurveyBitsData expected_product_specific_data = { |
| {"3P cookies blocked", true}, {"Privacy Sandbox enabled", false}}; |
| EXPECT_CALL(*mock_hats_service_, |
| LaunchDelayedSurveyForWebContents( |
| kHatsSurveyTriggerPrivacySandbox, web_contents(), 10000, |
| expected_product_specific_data, _, true)); |
| base::Value::List args; |
| args.Append(static_cast<int>( |
| HatsHandler::TrustSafetyInteraction::OPENED_PRIVACY_SANDBOX)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| task_environment()->RunUntilIdle(); |
| } |
| |
| TEST_F(HatsHandlerTest, TrustSafetySentimentInteractions) { |
| // Check that interactions relevant to the T&S sentiment service are |
| // correctly reported. |
| EXPECT_CALL(*mock_sentiment_service_, |
| InteractedWithPrivacySettings(web_contents())) |
| .Times(1); |
| base::Value::List args; |
| args.Append( |
| static_cast<int>(HatsHandler::TrustSafetyInteraction::USED_PRIVACY_CARD)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| |
| EXPECT_CALL(*mock_sentiment_service_, RanSafetyCheck()).Times(1); |
| args[0] = base::Value( |
| static_cast<int>(HatsHandler::TrustSafetyInteraction::RAN_SAFETY_CHECK)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| } |
| |
| TEST_F(HatsHandlerNoSandboxTest, TrustSafetySentimentInteractions) { |
| // A profile & feature state that would exclude the user from receiving the |
| // Privacy Settings HaTS survey should not stop the sentiment service being |
| // informed that the interaction occurred. |
| // Check that interactions relevant to the T&S sentiment service are |
| // correctly reported. |
| EXPECT_CALL(*mock_sentiment_service_, RanSafetyCheck()).Times(1); |
| base::Value::List args; |
| args.Append( |
| static_cast<int>(HatsHandler::TrustSafetyInteraction::RAN_SAFETY_CHECK)); |
| profile()->GetPrefs()->SetBoolean(prefs::kPrivacySandboxPageViewed, true); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| |
| EXPECT_CALL(*mock_sentiment_service_, OpenedPasswordManager(web_contents())); |
| args[0] = base::Value(static_cast<int>( |
| HatsHandler::TrustSafetyInteraction::OPENED_PASSWORD_MANAGER)); |
| handler()->HandleTrustSafetyInteractionOccurred(args); |
| } |
| |
| } // namespace settings |