| Index: chrome/browser/safe_browsing/certificate_reporting_service_browsertest.cc
|
| diff --git a/chrome/browser/safe_browsing/certificate_reporting_service_browsertest.cc b/chrome/browser/safe_browsing/certificate_reporting_service_browsertest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..89efeca0311f3df3995ac4ff74dc9bebd0059ffb
|
| --- /dev/null
|
| +++ b/chrome/browser/safe_browsing/certificate_reporting_service_browsertest.cc
|
| @@ -0,0 +1,676 @@
|
| +// Copyright 2016 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chrome/browser/safe_browsing/certificate_reporting_service.h"
|
| +
|
| +#include "base/base_switches.h"
|
| +#include "base/command_line.h"
|
| +#include "base/macros.h"
|
| +#include "base/test/histogram_tester.h"
|
| +#include "base/test/simple_test_clock.h"
|
| +#include "base/test/thread_test_helper.h"
|
| +#include "base/time/clock.h"
|
| +#include "base/time/time.h"
|
| +#include "chrome/browser/profiles/profile.h"
|
| +#include "chrome/browser/safe_browsing/certificate_reporting_service_factory.h"
|
| +#include "chrome/browser/safe_browsing/certificate_reporting_service_test_utils.h"
|
| +#include "chrome/browser/ssl/certificate_reporting_test_utils.h"
|
| +#include "chrome/browser/ui/browser.h"
|
| +#include "chrome/browser/ui/tabs/tab_strip_model.h"
|
| +#include "chrome/common/pref_names.h"
|
| +#include "chrome/test/base/in_process_browser_test.h"
|
| +#include "chrome/test/base/ui_test_utils.h"
|
| +#include "components/certificate_reporting/error_report.h"
|
| +#include "components/prefs/pref_service.h"
|
| +#include "components/variations/variations_switches.h"
|
| +#include "content/public/browser/web_contents.h"
|
| +#include "content/public/test/browser_test_utils.h"
|
| +#include "content/public/test/test_utils.h"
|
| +#include "net/dns/mock_host_resolver.h"
|
| +#include "net/test/embedded_test_server/embedded_test_server.h"
|
| +#include "net/url_request/report_sender.h"
|
| +#include "net/url_request/url_request_context_getter.h"
|
| +#include "net/url_request/url_request_filter.h"
|
| +#include "net/url_request/url_request_test_util.h"
|
| +#include "url/scheme_host_port.h"
|
| +
|
| +using certificate_reporting_test_utils::CertificateReportingServiceTestHelper;
|
| +using certificate_reporting_test_utils::ReportExpectation;
|
| +
|
| +namespace {
|
| +
|
| +const char* kFailedReportHistogram = "SSL.CertificateErrorReportFailure";
|
| +
|
| +void CleanUpOnIOThread() {
|
| + DCHECK_CURRENTLY_ON(content::BrowserThread::IO);
|
| + net::URLRequestFilter::GetInstance()->ClearHandlers();
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +namespace safe_browsing {
|
| +
|
| +// These tests check the whole mechanism to send and queue invalid certificate
|
| +// reports. Each test triggers reports by visiting broken SSL pages. The reports
|
| +// succeed, fail or hang indefinitely. The test waits for the URL requests
|
| +// corresponding to the reports to to be created via the URL request
|
| +// interceptor. When reports are expected to succeed or fail, test teardown
|
| +// checks that there are no in-flight or pending reports in the
|
| +// CertificateReportingService queue. When a report is to be delayed, a single
|
| +// in-flight report is expected in CertificateReportingService. Since the actual
|
| +// URL requests for reports are sent from the IO thread, the tests wait for the
|
| +// IO thread to finish before checking the expected report counts.
|
| +//
|
| +// Note that these browser tests differ from the unit tests in how they check
|
| +// expected reports: Unit tests create a network delegate and observe the
|
| +// destruction of the URL requests, whereas browser tests wait for the URL
|
| +// requests to be created instead.
|
| +class CertificateReportingServiceBrowserTest : public InProcessBrowserTest {
|
| + public:
|
| + CertificateReportingServiceBrowserTest()
|
| + : https_server_(net::EmbeddedTestServer::TYPE_HTTPS),
|
| + expect_delayed_report_on_teardown_(false) {}
|
| +
|
| + void SetUpOnMainThread() override {
|
| + DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
| + host_resolver()->AddRule("*", "127.0.0.1");
|
| +
|
| + https_server_.SetSSLConfig(net::EmbeddedTestServer::CERT_MISMATCHED_NAME);
|
| + https_server_.ServeFilesFromSourceDirectory("chrome/test/data");
|
| + ASSERT_TRUE(https_server_.Start());
|
| +
|
| + test_helper_.SetUpInterceptor();
|
| +
|
| + CertificateReportingServiceFactory::GetInstance()
|
| + ->SetReportEncryptionParamsForTesting(
|
| + test_helper_.server_public_key(),
|
| + test_helper_.server_public_key_version());
|
| + InProcessBrowserTest::SetUpOnMainThread();
|
| + }
|
| +
|
| + void TearDownOnMainThread() override {
|
| + CheckExpectedReportCounts(expect_delayed_report_on_teardown_);
|
| + content::BrowserThread::PostTask(content::BrowserThread::IO, FROM_HERE,
|
| + base::Bind(&CleanUpOnIOThread));
|
| + // Check the histogram as the last thing. This makes sure no in-flight
|
| + // report is missed.
|
| + if (num_expected_failed_report_ != 0) {
|
| + histogram_tester_.ExpectUniqueSample(kFailedReportHistogram,
|
| + -net::ERR_SSL_PROTOCOL_ERROR,
|
| + num_expected_failed_report_);
|
| + } else {
|
| + histogram_tester_.ExpectTotalCount(kFailedReportHistogram, 0);
|
| + }
|
| + }
|
| +
|
| + void SetUpCommandLine(base::CommandLine* command_line) override {
|
| + command_line->AppendSwitchASCII(
|
| + switches::kForceFieldTrials,
|
| + "ReportCertificateErrors/ShowAndPossiblySend/");
|
| + // Setting the sending threshold to 1.0 ensures reporting is enabled.
|
| + command_line->AppendSwitchASCII(
|
| + variations::switches::kForceFieldTrialParams,
|
| + "ReportCertificateErrors.ShowAndPossiblySend:sendingThreshold/1.0");
|
| + }
|
| +
|
| + CertificateReportingServiceTestHelper* test_helper() { return &test_helper_; }
|
| +
|
| + protected:
|
| + CertificateReportingServiceFactory* factory() {
|
| + return CertificateReportingServiceFactory::GetInstance();
|
| + }
|
| +
|
| + // Sends a report using the provided hostname. Navigates to an interstitial
|
| + // page on this hostname and away from it to trigger a report.
|
| + void SendReport(const std::string& hostname) {
|
| + // Create an HTTPS URL from the hostname. This will resolve to the HTTPS
|
| + // server and cause an SSL error.
|
| + const GURL kCertErrorURL(
|
| + url::SchemeHostPort("https", hostname, https_server_.port()).GetURL());
|
| +
|
| + // Navigate to the page with SSL error.
|
| + TabStripModel* tab_strip_model = browser()->tab_strip_model();
|
| + content::WebContents* contents = tab_strip_model->GetActiveWebContents();
|
| + ui_test_utils::NavigateToURL(browser(), kCertErrorURL);
|
| + content::WaitForInterstitialAttach(contents);
|
| +
|
| + // Navigate away from the interstitial to trigger report upload.
|
| + ui_test_utils::NavigateToURL(browser(), GURL("about:blank"));
|
| + content::WaitForInterstitialDetach(contents);
|
| + WaitForIOThread();
|
| + }
|
| +
|
| + void SendPendingReports() { service()->SendPending(); }
|
| +
|
| + // Checks that there are no outstanding reports.
|
| + // If |expect_delayed_report_on_teardown| is true, expects a single delayed
|
| + // report.
|
| + void CheckNoReports() { CheckExpectedReportCounts(false); }
|
| +
|
| + // Changes opt-in status and waits for the cert reporting service to reset.
|
| + // Can only be used after the service is initialized. When changing the
|
| + // value at the beginning of a test,
|
| + // certificate_reporting_test_utils::SetCertReportingOptIn should be used
|
| + // instead since the service is only created upon first SSL error.
|
| + // Changing the opt-in status synchronously fires
|
| + // CertificateReportingService::PreferenceObserver::OnPreferenceChanged which
|
| + // will call CertificateReportingService::SetEnabled() which in turn posts
|
| + // a task to the IO thread to reset the service. Waiting for the IO thread
|
| + // ensures that the service is reset before returning from this method.
|
| + void ChangeOptInAndWait(certificate_reporting_test_utils::OptIn opt_in) {
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(browser(), opt_in);
|
| + WaitForIOThread();
|
| + }
|
| +
|
| + // Same as ChangeOptInAndWait, but enables/disables SafeBrowsing instead.
|
| + void ToggleSafeBrowsingAndWaitForServiceReset(bool safebrowsing_enabled) {
|
| + browser()->profile()->GetPrefs()->SetBoolean(prefs::kSafeBrowsingEnabled,
|
| + safebrowsing_enabled);
|
| + WaitForIOThread();
|
| + }
|
| +
|
| + void ShutdownServiceAndWait() {
|
| + service()->Shutdown();
|
| + WaitForIOThread();
|
| + }
|
| +
|
| + // Waits for a number of URL requests to be created for the reports in
|
| + // |expectation| and checks that the reports in |expectation| matches the
|
| + // reports observed by URL request interceptor.
|
| + void WaitForReports(const ReportExpectation& expectation) {
|
| + test_helper_.interceptor()->WaitForReports(expectation.num_reports());
|
| + std::set<std::string> expected_hostnames;
|
| + CheckReports(expectation.successful_reports,
|
| + test_helper_.interceptor()->successful_reports());
|
| + CheckReports(expectation.failed_reports,
|
| + test_helper_.interceptor()->failed_reports());
|
| + CheckReports(expectation.delayed_reports,
|
| + test_helper_.interceptor()->delayed_reports());
|
| + test_helper_.interceptor()->ClearObservedReports();
|
| + }
|
| +
|
| + // Resumes the delayed request and waits for the resume task to complete which
|
| + // in turn means the response starts.
|
| + void ResumeDelayedRequestAndWait() {
|
| + base::RunLoop run_loop;
|
| + test_helper_.ResumeDelayedRequest(run_loop.QuitClosure());
|
| + run_loop.Run();
|
| + }
|
| +
|
| + // Tells the test to expect a delayed report during test teardown. If not set,
|
| + // the tests expect no in-flight reports during teardown.
|
| + void SetExpectDelayedReportOnTeardown() {
|
| + expect_delayed_report_on_teardown_ = true;
|
| + }
|
| +
|
| + void SetExpectedHistogramCountOnTeardown(
|
| + unsigned int num_expected_failed_report) {
|
| + num_expected_failed_report_ = num_expected_failed_report;
|
| + }
|
| +
|
| + private:
|
| + CertificateReportingService* service() const {
|
| + return CertificateReportingServiceFactory::GetForBrowserContext(
|
| + browser()->profile());
|
| + }
|
| +
|
| + // Waits for pending tasks on the IO thread to complete.
|
| + void WaitForIOThread() {
|
| + scoped_refptr<base::ThreadTestHelper> io_helper(new base::ThreadTestHelper(
|
| + content::BrowserThread::GetTaskRunnerForThread(
|
| + content::BrowserThread::IO)
|
| + .get()));
|
| + ASSERT_TRUE(io_helper->Run());
|
| + }
|
| +
|
| + // Checks that the serialized reports in |received_reports| have the same
|
| + // hostnames as |expected_hostnames|.
|
| + void CheckReports(const std::set<std::string>& expected_hostnames,
|
| + const std::set<std::string>& received_reports) {
|
| + std::set<std::string> received_hostnames;
|
| + for (const std::string& serialized_report : received_reports) {
|
| + certificate_reporting::ErrorReport report;
|
| + ASSERT_TRUE(report.InitializeFromString(serialized_report));
|
| + received_hostnames.insert(report.hostname());
|
| + }
|
| + EXPECT_EQ(expected_hostnames, received_hostnames);
|
| + }
|
| +
|
| + // Checks that there are no remaining successful and failed reports observed
|
| + // by the interceptor. If |expect_delayed_report| is true, expects a single
|
| + // delayed report. Otherwise, expects no delayed reports.
|
| + void CheckExpectedReportCounts(bool expect_delayed_report) {
|
| + DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
| + // Wait for the IO thread to ensure that any report-sending tasks previously
|
| + // posted to the IO thread hav run (and thus been observed by the
|
| + // interceptor).
|
| + WaitForIOThread();
|
| + EXPECT_TRUE(test_helper_.interceptor()->successful_reports().empty());
|
| + EXPECT_TRUE(test_helper_.interceptor()->failed_reports().empty());
|
| +
|
| + if (expect_delayed_report)
|
| + EXPECT_EQ(1u, test_helper_.interceptor()->delayed_reports().size());
|
| + else
|
| + EXPECT_TRUE(test_helper_.interceptor()->delayed_reports().empty());
|
| +
|
| + if (service()->GetReporterForTesting()) {
|
| + // Reporter can be null if reporting is disabled.
|
| + size_t num_inflight_reports = expect_delayed_report ? 1u : 0u;
|
| + EXPECT_EQ(num_inflight_reports,
|
| + service()
|
| + ->GetReporterForTesting()
|
| + ->inflight_report_count_for_testing());
|
| + }
|
| + }
|
| +
|
| + net::EmbeddedTestServer https_server_;
|
| + // If true, the test will expect to see a delayed report during test teardown.
|
| + bool expect_delayed_report_on_teardown_ = false;
|
| +
|
| + unsigned int num_expected_failed_report_ = 0;
|
| +
|
| + CertificateReportingServiceTestHelper test_helper_;
|
| +
|
| + base::HistogramTester histogram_tester_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(CertificateReportingServiceBrowserTest);
|
| +};
|
| +
|
| +// Tests that report send attempt should be cancelled when extended
|
| +// reporting is not opted in.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + NotOptedIn_ShouldNotSendReports) {
|
| + SetExpectedHistogramCountOnTeardown(0);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(),
|
| + certificate_reporting_test_utils::EXTENDED_REPORTING_DO_NOT_OPT_IN);
|
| + // Send a report. Test teardown checks for created and in-flight requests. If
|
| + // a report was incorrectly sent, the test will fail.
|
| + SendReport("no-report");
|
| +}
|
| +
|
| +// Tests that report send attempts are not cancelled when extended reporting is
|
| +// opted in. Goes to an interstitial page and navigates away to force a report
|
| +// send event.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + OptedIn_ShouldSendSuccessfulReport) {
|
| + SetExpectedHistogramCountOnTeardown(0);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| +
|
| + // Let reports uploads successfully complete.
|
| + test_helper()->SetFailureMode(certificate_reporting_test_utils::
|
| + ReportSendingResult::REPORTS_SUCCESSFUL);
|
| +
|
| + // Reporting is opted in, so the report should succeed.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Successful({"report0"}));
|
| +}
|
| +
|
| +// Tests that report send attempts are not cancelled when extended reporting is
|
| +// opted in. Goes to an interstitial page and navigate away to force a report
|
| +// send event. Repeats this three times and checks expected number of reports.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + OptedIn_ShouldQueueFailedReport) {
|
| + SetExpectedHistogramCountOnTeardown(2);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_FAIL);
|
| +
|
| + // Send a failed report.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Failed({"report0"}));
|
| +
|
| + // Send another failed report.
|
| + SendReport("report1");
|
| + WaitForReports(ReportExpectation::Failed({"report1"}));
|
| +
|
| + // Let all report uploads complete successfully now.
|
| + test_helper()->SetFailureMode(certificate_reporting_test_utils::
|
| + ReportSendingResult::REPORTS_SUCCESSFUL);
|
| +
|
| + // Send another report. This time the report should be successfully sent.
|
| + SendReport("report2");
|
| + WaitForReports(ReportExpectation::Successful({"report2"}));
|
| +
|
| + // Send all pending reports. The two previously failed reports should have
|
| + // been queued, and now be sent successfully.
|
| + SendPendingReports();
|
| + WaitForReports(ReportExpectation::Successful({"report0", "report1"}));
|
| +
|
| + // Try sending pending reports again. Since there is no pending report,
|
| + // nothing should be sent this time. If any report is sent, test teardown
|
| + // will catch it.
|
| + SendPendingReports();
|
| +}
|
| +
|
| +// Opting in then opting out of extended reporting should clear the pending
|
| +// report queue.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + OptedIn_ThenOptedOut) {
|
| + SetExpectedHistogramCountOnTeardown(1);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_FAIL);
|
| +
|
| + // Send a failed report.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Failed({"report0"}));
|
| +
|
| + // Disable reporting. This should clear all pending reports.
|
| + ChangeOptInAndWait(
|
| + certificate_reporting_test_utils::EXTENDED_REPORTING_DO_NOT_OPT_IN);
|
| +
|
| + // Send pending reports. No reports should be observed during test teardown.
|
| + SendPendingReports();
|
| +}
|
| +
|
| +// Opting out, then in, then out of extended reporting should work as expected.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + OptedOut_ThenOptedIn_ThenOptedOut) {
|
| + SetExpectedHistogramCountOnTeardown(1);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(),
|
| + certificate_reporting_test_utils::EXTENDED_REPORTING_DO_NOT_OPT_IN);
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_FAIL);
|
| +
|
| + // Send attempt should be cancelled since reporting is opted out.
|
| + SendReport("no-report");
|
| + CheckNoReports();
|
| +
|
| + // Enable reporting.
|
| + ChangeOptInAndWait(
|
| + certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| +
|
| + // A failed report should be observed.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Failed({"report0"}));
|
| +
|
| + // Disable reporting. This should reset the reporting service and
|
| + // clear all pending reports.
|
| + ChangeOptInAndWait(
|
| + certificate_reporting_test_utils::EXTENDED_REPORTING_DO_NOT_OPT_IN);
|
| +
|
| + // Report should be cancelled since reporting is opted out.
|
| + SendReport("report1");
|
| + CheckNoReports();
|
| +
|
| + // Send pending reports. Nothing should be sent since there aren't any
|
| + // pending reports. If any report is sent, test teardown will catch it.
|
| + SendPendingReports();
|
| +}
|
| +
|
| +// Disabling SafeBrowsing should clear pending reports queue in
|
| +// CertificateReportingService.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + DisableSafebrowsing) {
|
| + SetExpectedHistogramCountOnTeardown(2);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_FAIL);
|
| +
|
| + // Send a failed report.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Failed({"report0"}));
|
| +
|
| + // Disable SafeBrowsing. This should clear all pending reports.
|
| + ToggleSafeBrowsingAndWaitForServiceReset(false);
|
| +
|
| + // Send pending reports. No reports should be observed.
|
| + SendPendingReports();
|
| + CheckNoReports();
|
| +
|
| + // Re-enable SafeBrowsing and trigger another report which will be queued.
|
| + ToggleSafeBrowsingAndWaitForServiceReset(true);
|
| + SendReport("report1");
|
| + WaitForReports(ReportExpectation::Failed({"report1"}));
|
| +
|
| + // Queued report should now be successfully sent.
|
| + test_helper()->SetFailureMode(certificate_reporting_test_utils::
|
| + ReportSendingResult::REPORTS_SUCCESSFUL);
|
| + SendPendingReports();
|
| + WaitForReports(ReportExpectation::Successful({"report1"}));
|
| +}
|
| +
|
| +// CertificateReportingService should ignore reports older than the report TTL.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + DontSendOldReports) {
|
| + SetExpectedHistogramCountOnTeardown(5);
|
| +
|
| + base::SimpleTestClock* clock = new base::SimpleTestClock();
|
| + base::Time reference_time = base::Time::Now();
|
| + clock->SetNow(reference_time);
|
| + factory()->SetClockForTesting(std::unique_ptr<base::Clock>(clock));
|
| +
|
| + // The service should ignore reports older than 24 hours.
|
| + factory()->SetQueuedReportTTLForTesting(base::TimeDelta::FromHours(24));
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| +
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_FAIL);
|
| +
|
| + // Send a failed report.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Failed({"report0"}));
|
| +
|
| + // Advance the clock a bit and trigger another failed report.
|
| + clock->Advance(base::TimeDelta::FromHours(5));
|
| + SendReport("report1");
|
| + WaitForReports(ReportExpectation::Failed({"report1"}));
|
| +
|
| + // Advance the clock to 20 hours, putting it 25 hours ahead of the reference
|
| + // time. This makes report0 older than 24 hours. report1 is now 20 hours.
|
| + clock->Advance(base::TimeDelta::FromHours(20));
|
| +
|
| + // Send pending reports. report0 should be discarded since it's too old.
|
| + // report1 should be queued again.
|
| + SendPendingReports();
|
| + WaitForReports(ReportExpectation::Failed({"report1"}));
|
| +
|
| + // Trigger another failed report.
|
| + SendReport("report2");
|
| + WaitForReports(ReportExpectation::Failed({"report2"}));
|
| +
|
| + // Advance the clock 5 hours. report1 will now be 25 hours old.
|
| + clock->Advance(base::TimeDelta::FromHours(5));
|
| +
|
| + // Send pending reports. report1 should be discarded since it's too old.
|
| + // report2 should be queued again.
|
| + SendPendingReports();
|
| + WaitForReports(ReportExpectation::Failed({"report2"}));
|
| +
|
| + // Advance the clock 20 hours again so that report2 is 25 hours old and is
|
| + // older than max age (24 hours).
|
| + clock->Advance(base::TimeDelta::FromHours(20));
|
| +
|
| + // Send pending reports. report2 should be discarded since it's too old. No
|
| + // other reports remain. If any report is sent, test teardown will catch it.
|
| + SendPendingReports();
|
| +}
|
| +
|
| +// CertificateReportingService should drop old reports from its pending report
|
| +// queue, if the queue is full.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + DropOldReportsFromQueue) {
|
| + SetExpectedHistogramCountOnTeardown(7);
|
| +
|
| + base::SimpleTestClock* clock = new base::SimpleTestClock();
|
| + base::Time reference_time = base::Time::Now();
|
| + clock->SetNow(reference_time);
|
| + factory()->SetClockForTesting(std::unique_ptr<base::Clock>(clock));
|
| +
|
| + // The service should queue a maximum of 3 reports and ignore reports older
|
| + // than 24 hours.
|
| + factory()->SetQueuedReportTTLForTesting(base::TimeDelta::FromHours(24));
|
| + factory()->SetMaxQueuedReportCountForTesting(3);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| +
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_FAIL);
|
| +
|
| + // Trigger a failed report.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Failed({"report0"}));
|
| +
|
| + // Trigger three more reports within five hours of each other. After this:
|
| + // report0 is 0 hours after reference time (15 hours old).
|
| + // report1 is 5 hours after reference time (10 hours old).
|
| + // report2 is 10 hours after reference time (5 hours old).
|
| + // report3 is 15 hours after reference time (0 hours old).
|
| + clock->Advance(base::TimeDelta::FromHours(5));
|
| + SendReport("report1");
|
| +
|
| + clock->Advance(base::TimeDelta::FromHours(5));
|
| + SendReport("report2");
|
| +
|
| + clock->Advance(base::TimeDelta::FromHours(5));
|
| + SendReport("report3");
|
| +
|
| + WaitForReports(ReportExpectation::Failed({"report1", "report2", "report3"}));
|
| +
|
| + // Send pending reports. Four reports were generated above, but the service
|
| + // only queues three reports, so report0 should be dropped since it's the
|
| + // oldest.
|
| + SendPendingReports();
|
| + WaitForReports(ReportExpectation::Failed({"report1", "report2", "report3"}));
|
| +
|
| + // Let all reports succeed.
|
| + test_helper()->SetFailureMode(certificate_reporting_test_utils::
|
| + ReportSendingResult::REPORTS_SUCCESSFUL);
|
| +
|
| + // Advance the clock 15 hours. Current time is now 30 hours after reference
|
| + // time, and the ages of reports are now as follows:
|
| + // report1 is 25 hours old.
|
| + // report2 is 20 hours old.
|
| + // report3 is 15 hours old.
|
| + clock->Advance(base::TimeDelta::FromHours(15));
|
| +
|
| + // Send pending reports. Only reports 2 and 3 should be sent, report 1
|
| + // should be ignored because it's too old.
|
| + SendPendingReports();
|
| + WaitForReports(ReportExpectation::Successful({"report2", "report3"}));
|
| +}
|
| +
|
| +// Resume a delayed report after CertificateReportingService shuts down. Should
|
| +// not crash.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + Delayed_NotResumed_ShouldNotCrash) {
|
| + SetExpectedHistogramCountOnTeardown(0);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| + // Let reports hang.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_DELAY);
|
| +
|
| + // Navigate to and away from an interstitial to trigger a report. The report
|
| + // is triggered but hangs, so no error or success callbacks should be called.
|
| + SendReport("no-report");
|
| +
|
| + SetExpectDelayedReportOnTeardown();
|
| +}
|
| +
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + Delayed_Resumed) {
|
| + SetExpectedHistogramCountOnTeardown(0);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_DELAY);
|
| +
|
| + // Trigger a report that hangs.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Delayed({"report0"}));
|
| +
|
| + // Resume the report upload. The report upload should successfully complete.
|
| + // The interceptor only observes request creations and not response
|
| + // completions, so there is nothing to observe.
|
| + ResumeDelayedRequestAndWait();
|
| +}
|
| +
|
| +// Same as above, but the service is shut down before resuming the delayed
|
| +// request. Should not crash.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest,
|
| + Delayed_Resumed_ServiceShutdown) {
|
| + SetExpectedHistogramCountOnTeardown(0);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_DELAY);
|
| +
|
| + // Trigger a report that hangs.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Delayed({"report0"}));
|
| +
|
| + // Shutdown the service. Resuming the delayed request shouldn't crash.
|
| + ShutdownServiceAndWait();
|
| +
|
| + // Resume the report upload. The report upload should successfully complete.
|
| + // The interceptor only observes request creations and not response
|
| + // completions, so there is nothing to observe.
|
| + ResumeDelayedRequestAndWait();
|
| +}
|
| +
|
| +// Trigger a delayed report, then disable Safebrowsing. Certificate reporting
|
| +// service should clear its in-flight reports list.
|
| +IN_PROC_BROWSER_TEST_F(CertificateReportingServiceBrowserTest, Delayed_Reset) {
|
| + SetExpectedHistogramCountOnTeardown(0);
|
| +
|
| + certificate_reporting_test_utils::SetCertReportingOptIn(
|
| + browser(), certificate_reporting_test_utils::EXTENDED_REPORTING_OPT_IN);
|
| + // Let all reports fail.
|
| + test_helper()->SetFailureMode(
|
| + certificate_reporting_test_utils::ReportSendingResult::REPORTS_DELAY);
|
| +
|
| + // Trigger a report that hangs.
|
| + SendReport("report0");
|
| + WaitForReports(ReportExpectation::Delayed({"report0"}));
|
| +
|
| + // Disable SafeBrowsing. This should clear all pending reports.
|
| + ToggleSafeBrowsingAndWaitForServiceReset(false);
|
| +
|
| + // Resume delayed report. No response should be observed since all pending
|
| + // reports should be cleared.
|
| + ResumeDelayedRequestAndWait();
|
| + CheckNoReports();
|
| +
|
| + // Re-enable SafeBrowsing.
|
| + ToggleSafeBrowsingAndWaitForServiceReset(true);
|
| +
|
| + // Trigger a report that hangs.
|
| + SendReport("report1");
|
| + WaitForReports(ReportExpectation::Delayed({"report1"}));
|
| +
|
| + // Resume delayed report. By the time the runloop is finished, the response
|
| + // will be complete and CertificateReportingService will process the
|
| + // error/success callback for the report. There will be no inflight reports
|
| + // remaining.
|
| + ResumeDelayedRequestAndWait();
|
| +}
|
| +
|
| +} // namespace safe_browsing
|
|
|