1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/browser/net/chrome_network_delegate.h"
7 #include "base/memory/ref_counted.h"
8 #include "base/memory/scoped_ptr.h"
9 #include "base/message_loop/message_loop.h"
10 #include "base/prefs/pref_member.h"
11 #include "chrome/browser/content_settings/cookie_settings.h"
12 #include "chrome/common/pref_names.h"
13 #include "chrome/common/url_constants.h"
14 #include "chrome/test/base/testing_pref_service_syncable.h"
15 #include "chrome/test/base/testing_profile.h"
16 #include "content/public/test/test_browser_thread_bundle.h"
17 #include "net/base/completion_callback.h"
18 #include "net/base/request_priority.h"
19 #include "net/url_request/url_request.h"
20 #include "net/url_request/url_request_test_util.h"
21 #include "testing/gtest/include/gtest/gtest.h"
23 #if defined(ENABLE_EXTENSIONS)
24 #include "chrome/browser/extensions/event_router_forwarder.h"
27 #if defined(ENABLE_EXTENSIONS)
28 class ChromeNetworkDelegateTest
: public testing::Test
{
30 ChromeNetworkDelegateTest()
31 : forwarder_(new extensions::EventRouterForwarder()) {
34 void SetUp() override
{
35 never_throttle_requests_original_value_
=
36 ChromeNetworkDelegate::g_never_throttle_requests_
;
37 ChromeNetworkDelegate::g_never_throttle_requests_
= false;
40 void TearDown() override
{
41 ChromeNetworkDelegate::g_never_throttle_requests_
=
42 never_throttle_requests_original_value_
;
45 scoped_ptr
<ChromeNetworkDelegate
> CreateNetworkDelegate() {
46 return make_scoped_ptr(
47 new ChromeNetworkDelegate(forwarder_
.get(), &pref_member_
));
50 // Implementation moved here for access to private bits.
51 void NeverThrottleLogicImpl() {
52 scoped_ptr
<ChromeNetworkDelegate
> delegate(CreateNetworkDelegate());
54 net::TestURLRequestContext context
;
55 scoped_ptr
<net::URLRequest
> extension_request(context
.CreateRequest(
56 GURL("http://example.com/"), net::DEFAULT_PRIORITY
, NULL
, NULL
));
57 extension_request
->set_first_party_for_cookies(
58 GURL("chrome-extension://abcdef/bingo.html"));
59 scoped_ptr
<net::URLRequest
> web_page_request(context
.CreateRequest(
60 GURL("http://example.com/"), net::DEFAULT_PRIORITY
, NULL
, NULL
));
61 web_page_request
->set_first_party_for_cookies(
62 GURL("http://example.com/helloworld.html"));
64 ASSERT_TRUE(delegate
->OnCanThrottleRequest(*extension_request
));
65 ASSERT_FALSE(delegate
->OnCanThrottleRequest(*web_page_request
));
67 delegate
->NeverThrottleRequests();
68 ASSERT_TRUE(ChromeNetworkDelegate::g_never_throttle_requests_
);
69 ASSERT_FALSE(delegate
->OnCanThrottleRequest(*extension_request
));
70 ASSERT_FALSE(delegate
->OnCanThrottleRequest(*web_page_request
));
72 // Verify that the flag applies to later instances of the
73 // ChromeNetworkDelegate.
75 // We test the side effects of the flag rather than just the flag
76 // itself (which we did above) to help ensure that a changed
77 // implementation would show the same behavior, i.e. all instances
78 // of ChromeNetworkDelegate after the flag is set obey the flag.
79 scoped_ptr
<ChromeNetworkDelegate
> second_delegate(CreateNetworkDelegate());
80 ASSERT_FALSE(delegate
->OnCanThrottleRequest(*extension_request
));
81 ASSERT_FALSE(delegate
->OnCanThrottleRequest(*web_page_request
));
85 bool never_throttle_requests_original_value_
;
86 base::MessageLoopForIO message_loop_
;
88 scoped_refptr
<extensions::EventRouterForwarder
> forwarder_
;
89 BooleanPrefMember pref_member_
;
92 TEST_F(ChromeNetworkDelegateTest
, NeverThrottleLogic
) {
93 NeverThrottleLogicImpl();
95 #endif // defined(ENABLE_EXTENSIONS)
97 class ChromeNetworkDelegateSafeSearchTest
: public testing::Test
{
99 ChromeNetworkDelegateSafeSearchTest()
100 : thread_bundle_(content::TestBrowserThreadBundle::IO_MAINLOOP
) {
101 #if defined(ENABLE_EXTENSIONS)
102 forwarder_
= new extensions::EventRouterForwarder();
106 void SetUp() override
{
107 ChromeNetworkDelegate::InitializePrefsOnUIThread(
108 &enable_referrers_
, NULL
, &force_google_safe_search_
,
109 profile_
.GetTestingPrefService());
113 scoped_ptr
<net::NetworkDelegate
> CreateNetworkDelegate() {
114 scoped_ptr
<ChromeNetworkDelegate
> network_delegate(
115 new ChromeNetworkDelegate(forwarder(), &enable_referrers_
));
116 network_delegate
->set_force_google_safe_search(&force_google_safe_search_
);
117 return network_delegate
.Pass();
120 void SetSafeSearch(bool value
) {
121 force_google_safe_search_
.SetValue(value
);
124 void SetDelegate(net::NetworkDelegate
* delegate
) {
125 network_delegate_
= delegate
;
126 context_
.set_network_delegate(network_delegate_
);
129 // Does a request using the |url_string| URL and verifies that the expected
130 // string is equal to the query part (between ? and #) of the final url of
132 void CheckAddedParameters(const std::string
& url_string
,
133 const std::string
& expected_query_parameters
) {
134 // Show the URL in the trace so we know where we failed.
135 SCOPED_TRACE(url_string
);
137 scoped_ptr
<net::URLRequest
> request(context_
.CreateRequest(
138 GURL(url_string
), net::DEFAULT_PRIORITY
, &delegate_
, NULL
));
141 base::MessageLoop::current()->RunUntilIdle();
143 EXPECT_EQ(expected_query_parameters
, request
->url().query());
147 extensions::EventRouterForwarder
* forwarder() {
148 #if defined(ENABLE_EXTENSIONS)
149 return forwarder_
.get();
155 content::TestBrowserThreadBundle thread_bundle_
;
156 #if defined(ENABLE_EXTENSIONS)
157 scoped_refptr
<extensions::EventRouterForwarder
> forwarder_
;
159 TestingProfile profile_
;
160 BooleanPrefMember enable_referrers_
;
161 BooleanPrefMember force_google_safe_search_
;
162 scoped_ptr
<net::URLRequest
> request_
;
163 net::TestURLRequestContext context_
;
164 net::NetworkDelegate
* network_delegate_
;
165 net::TestDelegate delegate_
;
168 TEST_F(ChromeNetworkDelegateSafeSearchTest
, SafeSearchOn
) {
169 // Tests with SafeSearch on, request parameters should be rewritten.
170 const std::string kSafeParameter
= chrome::kSafeSearchSafeParameter
;
171 const std::string kSsuiParameter
= chrome::kSafeSearchSsuiParameter
;
172 const std::string kBothParameters
= kSafeParameter
+ "&" + kSsuiParameter
;
174 scoped_ptr
<net::NetworkDelegate
> delegate(CreateNetworkDelegate());
175 SetDelegate(delegate
.get());
177 // Test the home page.
178 CheckAddedParameters("http://google.com/", kBothParameters
);
180 // Test the search home page.
181 CheckAddedParameters("http://google.com/webhp",
184 // Test different valid search pages with parameters.
185 CheckAddedParameters("http://google.com/search?q=google",
186 "q=google&" + kBothParameters
);
188 CheckAddedParameters("http://google.com/?q=google",
189 "q=google&" + kBothParameters
);
191 CheckAddedParameters("http://google.com/webhp?q=google",
192 "q=google&" + kBothParameters
);
194 // Test the valid pages with safe set to off.
195 CheckAddedParameters("http://google.com/search?q=google&safe=off",
196 "q=google&" + kBothParameters
);
198 CheckAddedParameters("http://google.com/?q=google&safe=off",
199 "q=google&" + kBothParameters
);
201 CheckAddedParameters("http://google.com/webhp?q=google&safe=off",
202 "q=google&" + kBothParameters
);
204 CheckAddedParameters("http://google.com/webhp?q=google&%73afe=off",
205 "q=google&%73afe=off&" + kBothParameters
);
207 // Test the home page, different TLDs.
208 CheckAddedParameters("http://google.de/", kBothParameters
);
209 CheckAddedParameters("http://google.ro/", kBothParameters
);
210 CheckAddedParameters("http://google.nl/", kBothParameters
);
212 // Test the search home page, different TLD.
213 CheckAddedParameters("http://google.de/webhp", kBothParameters
);
215 // Test the search page with parameters, different TLD.
216 CheckAddedParameters("http://google.de/search?q=google",
217 "q=google&" + kBothParameters
);
219 // Test the home page with parameters, different TLD.
220 CheckAddedParameters("http://google.de/?q=google",
221 "q=google&" + kBothParameters
);
223 // Test the search page with the parameters set.
224 CheckAddedParameters("http://google.de/?q=google&" + kBothParameters
,
225 "q=google&" + kBothParameters
);
227 // Test some possibly tricky combinations.
228 CheckAddedParameters("http://google.com/?q=goog&" + kSafeParameter
+
230 "q=goog&" + kBothParameters
);
232 CheckAddedParameters("http://google.de/?q=goog&unsafe=active&" +
234 "q=goog&unsafe=active&" + kBothParameters
);
236 CheckAddedParameters("http://google.de/?q=goog&safe=off&ssui=off",
237 "q=goog&" + kBothParameters
);
239 // Test various combinations where we should not add anything.
240 CheckAddedParameters("http://google.com/?q=goog&" + kSsuiParameter
+ "&" +
242 "q=goog&" + kBothParameters
);
244 CheckAddedParameters("http://google.com/?" + kSsuiParameter
+ "&q=goog&" +
246 "q=goog&" + kBothParameters
);
248 CheckAddedParameters("http://google.com/?" + kSsuiParameter
+ "&" +
249 kSafeParameter
+ "&q=goog",
250 "q=goog&" + kBothParameters
);
252 // Test that another website is not affected, without parameters.
253 CheckAddedParameters("http://google.com/finance", std::string());
255 // Test that another website is not affected, with parameters.
256 CheckAddedParameters("http://google.com/finance?q=goog", "q=goog");
258 // Test that another website is not affected with redirects, with parameters.
259 CheckAddedParameters("http://finance.google.com/?q=goog", "q=goog");
261 // Test with percent-encoded data (%26 is &)
262 CheckAddedParameters("http://google.com/?q=%26%26%26&" + kSsuiParameter
+
263 "&" + kSafeParameter
+ "¶m=%26%26%26",
264 "q=%26%26%26¶m=%26%26%26&" + kBothParameters
);
267 TEST_F(ChromeNetworkDelegateSafeSearchTest
, SafeSearchOff
) {
268 // Tests with SafeSearch settings off, delegate should not alter requests.
269 SetSafeSearch(false);
270 scoped_ptr
<net::NetworkDelegate
> delegate(CreateNetworkDelegate());
271 SetDelegate(delegate
.get());
273 // Test the home page.
274 CheckAddedParameters("http://google.com/", std::string());
276 // Test the search home page.
277 CheckAddedParameters("http://google.com/webhp", std::string());
279 // Test the home page with parameters.
280 CheckAddedParameters("http://google.com/search?q=google",
283 // Test the search page with parameters.
284 CheckAddedParameters("http://google.com/?q=google",
287 // Test the search webhp page with parameters.
288 CheckAddedParameters("http://google.com/webhp?q=google",
291 // Test the home page with parameters and safe set to off.
292 CheckAddedParameters("http://google.com/search?q=google&safe=off",
293 "q=google&safe=off");
295 // Test the home page with parameters and safe set to active.
296 CheckAddedParameters("http://google.com/search?q=google&safe=active",
297 "q=google&safe=active");
300 // Privacy Mode disables Channel Id if cookies are blocked (cr223191)
301 class ChromeNetworkDelegatePrivacyModeTest
: public testing::Test
{
303 ChromeNetworkDelegatePrivacyModeTest()
304 : thread_bundle_(content::TestBrowserThreadBundle::IO_MAINLOOP
),
305 #if defined(ENABLE_EXTENSIONS)
306 forwarder_(new extensions::EventRouterForwarder()),
308 cookie_settings_(CookieSettings::Factory::GetForProfile(&profile_
)
310 kBlockedSite("http://ads.thirdparty.com"),
311 kAllowedSite("http://good.allays.com"),
312 kFirstPartySite("http://cool.things.com"),
313 kBlockedFirstPartySite("http://no.thirdparties.com") {}
315 void SetUp() override
{
316 ChromeNetworkDelegate::InitializePrefsOnUIThread(
317 &enable_referrers_
, NULL
, NULL
,
318 profile_
.GetTestingPrefService());
322 scoped_ptr
<ChromeNetworkDelegate
> CreateNetworkDelegate() {
323 scoped_ptr
<ChromeNetworkDelegate
> network_delegate(
324 new ChromeNetworkDelegate(forwarder(), &enable_referrers_
));
325 network_delegate
->set_cookie_settings(cookie_settings_
);
326 return network_delegate
.Pass();
329 void SetDelegate(net::NetworkDelegate
* delegate
) {
330 network_delegate_
= delegate
;
331 context_
.set_network_delegate(network_delegate_
);
335 extensions::EventRouterForwarder
* forwarder() {
336 #if defined(ENABLE_EXTENSIONS)
337 return forwarder_
.get();
343 content::TestBrowserThreadBundle thread_bundle_
;
344 #if defined(ENABLE_EXTENSIONS)
345 scoped_refptr
<extensions::EventRouterForwarder
> forwarder_
;
347 TestingProfile profile_
;
348 CookieSettings
* cookie_settings_
;
349 BooleanPrefMember enable_referrers_
;
350 scoped_ptr
<net::URLRequest
> request_
;
351 net::TestURLRequestContext context_
;
352 net::NetworkDelegate
* network_delegate_
;
354 const GURL kBlockedSite
;
355 const GURL kAllowedSite
;
356 const GURL kEmptyFirstPartySite
;
357 const GURL kFirstPartySite
;
358 const GURL kBlockedFirstPartySite
;
361 TEST_F(ChromeNetworkDelegatePrivacyModeTest
, DisablePrivacyIfCookiesAllowed
) {
362 scoped_ptr
<ChromeNetworkDelegate
> delegate(CreateNetworkDelegate());
363 SetDelegate(delegate
.get());
365 EXPECT_FALSE(network_delegate_
->CanEnablePrivacyMode(kAllowedSite
,
366 kEmptyFirstPartySite
));
370 TEST_F(ChromeNetworkDelegatePrivacyModeTest
, EnablePrivacyIfCookiesBlocked
) {
371 scoped_ptr
<ChromeNetworkDelegate
> delegate(CreateNetworkDelegate());
372 SetDelegate(delegate
.get());
374 EXPECT_FALSE(network_delegate_
->CanEnablePrivacyMode(kBlockedSite
,
375 kEmptyFirstPartySite
));
377 cookie_settings_
->SetCookieSetting(
378 ContentSettingsPattern::FromURL(kBlockedSite
),
379 ContentSettingsPattern::Wildcard(),
380 CONTENT_SETTING_BLOCK
);
381 EXPECT_TRUE(network_delegate_
->CanEnablePrivacyMode(kBlockedSite
,
382 kEmptyFirstPartySite
));
385 TEST_F(ChromeNetworkDelegatePrivacyModeTest
, EnablePrivacyIfThirdPartyBlocked
) {
386 scoped_ptr
<ChromeNetworkDelegate
> delegate(CreateNetworkDelegate());
387 SetDelegate(delegate
.get());
389 EXPECT_FALSE(network_delegate_
->CanEnablePrivacyMode(kAllowedSite
,
392 profile_
.GetPrefs()->SetBoolean(prefs::kBlockThirdPartyCookies
, true);
393 EXPECT_TRUE(network_delegate_
->CanEnablePrivacyMode(kAllowedSite
,
395 profile_
.GetPrefs()->SetBoolean(prefs::kBlockThirdPartyCookies
, false);
396 EXPECT_FALSE(network_delegate_
->CanEnablePrivacyMode(kAllowedSite
,
400 TEST_F(ChromeNetworkDelegatePrivacyModeTest
,
401 DisablePrivacyIfOnlyFirstPartyBlocked
) {
402 scoped_ptr
<ChromeNetworkDelegate
> delegate(CreateNetworkDelegate());
403 SetDelegate(delegate
.get());
405 EXPECT_FALSE(network_delegate_
->CanEnablePrivacyMode(kAllowedSite
,
406 kBlockedFirstPartySite
));
408 cookie_settings_
->SetCookieSetting(
409 ContentSettingsPattern::FromURL(kBlockedFirstPartySite
),
410 ContentSettingsPattern::Wildcard(),
411 CONTENT_SETTING_BLOCK
);
412 // Privacy mode is disabled as kAllowedSite is still getting cookies
413 EXPECT_FALSE(network_delegate_
->CanEnablePrivacyMode(kAllowedSite
,
414 kBlockedFirstPartySite
));