Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2017 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/password_manager/password_manager_util.h" | |
| 6 | |
| 7 #include <initializer_list> | |
| 8 #include <memory> | |
| 9 | |
| 10 #include "base/memory/ptr_util.h" | |
| 11 #include "base/run_loop.h" | |
| 12 #include "base/threading/thread_task_runner_handle.h" | |
| 13 #include "chrome/browser/password_manager/password_store_factory.h" | |
| 14 #include "chrome/test/base/testing_profile.h" | |
| 15 #include "components/password_manager/core/browser/mock_password_store.h" | |
| 16 #include "components/password_manager/core/browser/password_manager_test_utils.h " | |
| 17 #include "components/password_manager/core/common/password_manager_pref_names.h" | |
| 18 #include "components/prefs/pref_service.h" | |
| 19 #include "content/public/test/test_browser_thread_bundle.h" | |
| 20 #include "net/http/transport_security_state.h" | |
| 21 #include "testing/gmock/include/gmock/gmock.h" | |
| 22 #include "testing/gtest/include/gtest/gtest.h" | |
| 23 #include "url/gurl.h" | |
| 24 | |
| 25 using autofill::PasswordForm; | |
| 26 using password_manager::InteractionsStats; | |
| 27 using testing::Invoke; | |
| 28 using testing::Mock; | |
| 29 using testing::NiceMock; | |
| 30 using testing::_; | |
| 31 | |
| 32 namespace password_manager_util { | |
| 33 | |
| 34 namespace { | |
| 35 | |
| 36 constexpr char kTestHttpURL[] = "http://example.org/"; | |
| 37 constexpr char kTestHttpsURL[] = "https://example.org/"; | |
| 38 | |
| 39 PasswordForm CreateTestHTTPForm() { | |
| 40 PasswordForm form; | |
| 41 form.origin = GURL(kTestHttpURL); | |
| 42 form.signon_realm = form.origin.spec(); | |
| 43 form.action = form.origin; | |
| 44 form.username_value = base::ASCIIToUTF16("user"); | |
| 45 form.password_value = base::ASCIIToUTF16("password"); | |
| 46 return form; | |
| 47 } | |
| 48 | |
| 49 PasswordForm CreateTestHTTPSForm() { | |
| 50 PasswordForm form; | |
| 51 form.origin = GURL(kTestHttpsURL); | |
| 52 form.signon_realm = form.origin.spec(); | |
| 53 form.action = form.origin; | |
| 54 form.username_value = base::ASCIIToUTF16("user"); | |
| 55 form.password_value = base::ASCIIToUTF16("password"); | |
| 56 return form; | |
| 57 } | |
| 58 | |
| 59 InteractionsStats CreateTestHTTPStats() { | |
| 60 InteractionsStats stats; | |
| 61 stats.origin_domain = GURL(kTestHttpURL); | |
| 62 stats.username_value = base::ASCIIToUTF16("user"); | |
| 63 return stats; | |
| 64 } | |
| 65 | |
| 66 InteractionsStats CreateTestHTTPSStats() { | |
| 67 InteractionsStats stats; | |
| 68 stats.origin_domain = GURL(kTestHttpsURL); | |
| 69 stats.username_value = base::ASCIIToUTF16("user"); | |
| 70 return stats; | |
| 71 } | |
| 72 | |
| 73 std::vector<std::unique_ptr<PasswordForm>> MakeResults( | |
| 74 const std::vector<PasswordForm>& forms) { | |
| 75 std::vector<std::unique_ptr<PasswordForm>> results; | |
| 76 results.reserve(forms.size()); | |
| 77 for (const auto& form : forms) | |
| 78 results.push_back(base::MakeUnique<PasswordForm>(form)); | |
| 79 return results; | |
| 80 } | |
| 81 | |
| 82 // Auxiliary class to automatically set and reset the HSTS state for a given | |
| 83 // host. | |
| 84 class HSTSStateManager { | |
| 85 public: | |
| 86 HSTSStateManager(net::TransportSecurityState* state, | |
| 87 bool is_hsts, | |
| 88 const std::string& host); | |
| 89 ~HSTSStateManager(); | |
| 90 | |
| 91 private: | |
| 92 net::TransportSecurityState* state_; | |
| 93 const bool is_hsts_; | |
| 94 const std::string host_; | |
| 95 }; | |
| 96 | |
| 97 HSTSStateManager::HSTSStateManager(net::TransportSecurityState* state, | |
| 98 bool is_hsts, | |
| 99 const std::string& host) | |
| 100 : state_(state), is_hsts_(is_hsts), host_(host) { | |
| 101 if (is_hsts_) { | |
| 102 base::Time expiry = base::Time::Max(); | |
| 103 bool include_subdomains = false; | |
| 104 state_->AddHSTS(host_, expiry, include_subdomains); | |
| 105 } | |
| 106 } | |
| 107 | |
| 108 HSTSStateManager::~HSTSStateManager() { | |
| 109 if (is_hsts_) | |
| 110 state_->DeleteDynamicDataForHost(host_); | |
| 111 } | |
| 112 | |
| 113 } // namespace | |
| 114 | |
| 115 class PasswordManagerUtilTest : public testing::Test { | |
| 116 public: | |
| 117 PasswordManagerUtilTest(); | |
| 118 | |
| 119 TestingProfile& profile() { return profile_; } | |
| 120 password_manager::MockPasswordStore* store() { return store_; } | |
| 121 net::TransportSecurityState* GetTransportSecurityState(); | |
| 122 | |
| 123 private: | |
| 124 content::TestBrowserThreadBundle thread_bundle_; | |
| 125 TestingProfile profile_; | |
| 126 password_manager::MockPasswordStore* store_; | |
| 127 }; | |
| 128 | |
| 129 PasswordManagerUtilTest::PasswordManagerUtilTest() { | |
| 130 PasswordStoreFactory::GetInstance()->SetTestingFactory( | |
| 131 &profile_, password_manager::BuildPasswordStore< | |
| 132 content::BrowserContext, | |
| 133 NiceMock<password_manager::MockPasswordStore>>); | |
| 134 | |
| 135 store_ = static_cast<password_manager::MockPasswordStore*>( | |
| 136 PasswordStoreFactory::GetForProfile(&profile_, | |
| 137 ServiceAccessType::EXPLICIT_ACCESS) | |
|
vasilii
2017/03/23 17:39:26
Implicit access here
jdoerrie
2017/03/24 14:08:32
Done.
| |
| 138 .get()); | |
| 139 } | |
| 140 | |
| 141 net::TransportSecurityState* | |
| 142 PasswordManagerUtilTest::GetTransportSecurityState() { | |
| 143 return profile() | |
| 144 .GetRequestContext() | |
| 145 ->GetURLRequestContext() | |
| 146 ->transport_security_state(); | |
| 147 } | |
| 148 | |
| 149 TEST_F(PasswordManagerUtilTest, TestPostHSTSQueryForHostAndProfile) { | |
| 150 const GURL test_origin(kTestHttpsURL); | |
| 151 for (bool is_hsts : {false, true}) { | |
| 152 SCOPED_TRACE(testing::Message() | |
| 153 << std::boolalpha << "is_hsts: " << is_hsts); | |
| 154 | |
| 155 HSTSStateManager manager(GetTransportSecurityState(), is_hsts, | |
| 156 test_origin.host()); | |
| 157 // Post query and ensure callback gets run. | |
|
vasilii
2017/03/23 17:39:26
Would ba cool to verify that the callback was exec
jdoerrie
2017/03/24 14:08:31
Done.
| |
| 158 PostHSTSQueryForHostAndProfile( | |
| 159 test_origin, &profile(), | |
| 160 base::Bind([](bool expectation, | |
| 161 bool result) { EXPECT_EQ(expectation, result); }, | |
| 162 is_hsts)); | |
| 163 base::RunLoop().RunUntilIdle(); | |
| 164 } | |
| 165 } | |
| 166 | |
| 167 TEST_F(PasswordManagerUtilTest, TestBlacklistDeletion) { | |
| 168 for (bool is_http : {false, true}) { | |
| 169 for (bool is_blacklisted : {false, true}) { | |
|
vasilii
2017/03/23 17:39:26
I didn't get the value of the test for is_blacklis
jdoerrie
2017/03/24 14:08:31
Done.
| |
| 170 for (bool is_hsts : {false, true}) { | |
| 171 SCOPED_TRACE(testing::Message() | |
| 172 << std::boolalpha | |
| 173 << "(is_http, is_blacklisted, is_hsts): (" << is_http | |
| 174 << ", " << is_blacklisted << ", " << is_hsts << ")"); | |
| 175 | |
| 176 const bool should_be_deleted = is_http && is_blacklisted && is_hsts; | |
| 177 | |
| 178 PasswordForm form = | |
| 179 is_http ? CreateTestHTTPForm() : CreateTestHTTPSForm(); | |
| 180 form.blacklisted_by_user = is_blacklisted; | |
| 181 | |
| 182 HSTSStateManager manager(GetTransportSecurityState(), is_hsts, | |
| 183 form.origin.host()); | |
| 184 | |
| 185 EXPECT_CALL(*store(), FillBlacklistLogins(_)) | |
| 186 .WillOnce(Invoke( | |
| 187 [&form](std::vector<std::unique_ptr<autofill::PasswordForm>>* | |
| 188 forms) { | |
| 189 *forms = MakeResults({form}); | |
| 190 return true; | |
| 191 })); | |
| 192 | |
| 193 EXPECT_CALL(*store(), RemoveLogin(form)).Times(should_be_deleted); | |
| 194 | |
| 195 // Initiate clean up and make sure all aync tasks are run until | |
| 196 // completion. | |
| 197 DelayCleanObsoleteHttpDataForProfile(&profile(), 0); | |
| 198 base::RunLoop().RunUntilIdle(); | |
| 199 | |
| 200 // Verify and clear all expectations as well as the preference. | |
| 201 Mock::VerifyAndClearExpectations(store()); | |
| 202 profile().GetPrefs()->SetBoolean( | |
| 203 password_manager::prefs::kWasObsoleteHttpDataCleaned, false); | |
|
vasilii
2017/03/23 17:39:26
Do you want to check the value of the pref? Same b
jdoerrie
2017/03/24 14:08:31
Done.
| |
| 204 } | |
| 205 } | |
| 206 } | |
| 207 } | |
| 208 | |
| 209 TEST_F(PasswordManagerUtilTest, TestAutofillableDeletion) { | |
| 210 for (bool is_hsts : {false, true}) { | |
| 211 for (bool same_host : {false, true}) { | |
| 212 for (bool same_user : {false, true}) { | |
| 213 for (bool same_pass : {false, true}) { | |
| 214 SCOPED_TRACE(testing::Message() | |
| 215 << std::boolalpha | |
| 216 << "(is_hsts, same_host, same_user, same_pass): (" | |
| 217 << is_hsts << ", " << same_host << ", " << same_user | |
| 218 << ", " << same_pass); | |
| 219 | |
| 220 const bool should_be_deleted = | |
| 221 is_hsts && same_host && same_user && same_pass; | |
| 222 | |
| 223 PasswordForm http_form = CreateTestHTTPForm(); | |
| 224 PasswordForm https_form = CreateTestHTTPSForm(); | |
| 225 | |
| 226 if (!same_host) { | |
| 227 GURL::Replacements rep; | |
| 228 rep.SetHostStr("a-totally-different-host"); | |
| 229 http_form.origin = http_form.origin.ReplaceComponents(rep); | |
| 230 } | |
| 231 | |
| 232 if (!same_user) { | |
| 233 http_form.username_value = | |
| 234 https_form.username_value + base::ASCIIToUTF16("-different"); | |
|
vasilii
2017/03/23 17:39:26
Optional: simple assignment would be more readable
jdoerrie
2017/03/24 14:08:31
Done.
| |
| 235 } | |
| 236 | |
| 237 if (!same_pass) { | |
| 238 http_form.password_value = | |
| 239 https_form.password_value + base::ASCIIToUTF16("-different"); | |
| 240 } | |
| 241 | |
| 242 HSTSStateManager manager(GetTransportSecurityState(), is_hsts, | |
| 243 https_form.origin.host()); | |
| 244 | |
| 245 EXPECT_CALL(*store(), FillAutofillableLogins(_)) | |
| 246 .WillOnce(Invoke( | |
| 247 [&http_form, &https_form]( | |
| 248 std::vector<std::unique_ptr<autofill::PasswordForm>>* | |
| 249 forms) { | |
| 250 *forms = MakeResults({http_form, https_form}); | |
| 251 return true; | |
| 252 })); | |
| 253 | |
| 254 EXPECT_CALL(*store(), RemoveLogin(http_form)) | |
| 255 .Times(should_be_deleted); | |
| 256 | |
| 257 // Initiate clean up and make sure all aync tasks are run until | |
| 258 // completion. | |
| 259 DelayCleanObsoleteHttpDataForProfile(&profile(), 0); | |
| 260 base::RunLoop().RunUntilIdle(); | |
| 261 | |
| 262 // Verify and clear all expectations as well as the preference. | |
| 263 Mock::VerifyAndClearExpectations(store()); | |
| 264 profile().GetPrefs()->SetBoolean( | |
| 265 password_manager::prefs::kWasObsoleteHttpDataCleaned, false); | |
| 266 } | |
| 267 } | |
| 268 } | |
| 269 } | |
| 270 } | |
| 271 | |
| 272 TEST_F(PasswordManagerUtilTest, TestSiteStatsDeletion) { | |
| 273 for (bool is_http : {false, true}) { | |
| 274 for (bool is_hsts : {false, true}) { | |
| 275 SCOPED_TRACE(testing::Message() | |
| 276 << std::boolalpha << "(is_http, is_hsts): (" << is_http | |
| 277 << ", " << is_hsts); | |
| 278 | |
| 279 const bool should_be_deleted = is_http && is_hsts; | |
| 280 | |
| 281 InteractionsStats stats = | |
| 282 is_http ? CreateTestHTTPStats() : CreateTestHTTPSStats(); | |
| 283 | |
| 284 HSTSStateManager manager(GetTransportSecurityState(), is_hsts, | |
| 285 stats.origin_domain.host()); | |
| 286 | |
| 287 EXPECT_CALL(*store(), GetAllSiteStatsImpl()).WillOnce(Invoke([&stats]() { | |
| 288 return std::vector<InteractionsStats>({stats}); | |
| 289 })); | |
| 290 EXPECT_CALL(*store(), RemoveSiteStatsImpl(stats.origin_domain)) | |
| 291 .Times(should_be_deleted); | |
| 292 | |
| 293 // Initiate clean up and make sure all aync tasks are run until | |
| 294 // completion. | |
| 295 DelayCleanObsoleteHttpDataForProfile(&profile(), 0); | |
| 296 base::RunLoop().RunUntilIdle(); | |
| 297 | |
| 298 // Verify and clear all expectations as well as the preference. | |
| 299 Mock::VerifyAndClearExpectations(store()); | |
| 300 profile().GetPrefs()->SetBoolean( | |
| 301 password_manager::prefs::kWasObsoleteHttpDataCleaned, false); | |
| 302 } | |
| 303 } | |
| 304 } | |
| 305 | |
| 306 } // namespace password_manager_util | |
| OLD | NEW |