| // Copyright 2017 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <cctype> |
| #include <memory> |
| |
| #include "base/base_switches.h" |
| #include "base/bind.h" |
| #include "base/command_line.h" |
| #include "base/containers/contains.h" |
| #include "base/metrics/field_trial_param_associator.h" |
| #include "base/run_loop.h" |
| #include "base/strings/strcat.h" |
| #include "base/strings/string_util.h" |
| #include "base/synchronization/lock.h" |
| #include "base/test/bind.h" |
| #include "base/test/metrics/histogram_tester.h" |
| #include "build/build_config.h" |
| #include "chrome/browser/content_settings/cookie_settings_factory.h" |
| #include "chrome/browser/content_settings/host_content_settings_map_factory.h" |
| #include "chrome/browser/devtools/protocol/devtools_protocol_test_support.h" |
| #include "chrome/browser/profiles/profile.h" |
| #include "chrome/browser/ui/browser.h" |
| #include "chrome/browser/ui/browser_commands.h" |
| #include "chrome/test/base/chrome_test_utils.h" |
| #include "chrome/test/base/in_process_browser_test.h" |
| #include "chrome/test/base/ui_test_utils.h" |
| #include "components/content_settings/browser/page_specific_content_settings.h" |
| #include "components/content_settings/core/browser/cookie_settings.h" |
| #include "components/content_settings/core/browser/host_content_settings_map.h" |
| #include "components/content_settings/core/common/pref_names.h" |
| #include "components/embedder_support/switches.h" |
| #include "components/embedder_support/user_agent_utils.h" |
| #include "components/metrics/content/subprocess_metrics_provider.h" |
| #include "components/page_load_metrics/browser/page_load_metrics_test_waiter.h" |
| #include "components/prefs/pref_service.h" |
| #include "content/public/browser/browser_thread.h" |
| #include "content/public/browser/navigation_entry.h" |
| #include "content/public/browser/navigation_handle.h" |
| #include "content/public/browser/render_view_host.h" |
| #include "content/public/browser/web_contents_observer.h" |
| #include "content/public/common/content_features.h" |
| #include "content/public/common/content_switches.h" |
| #include "content/public/test/browser_test.h" |
| #include "content/public/test/browser_test_utils.h" |
| #include "content/public/test/content_browser_test.h" |
| #include "content/public/test/content_browser_test_utils.h" |
| #include "content/public/test/test_utils.h" |
| #include "content/public/test/url_loader_interceptor.h" |
| #include "net/dns/mock_host_resolver.h" |
| #include "net/http/http_request_headers.h" |
| #include "net/nqe/effective_connection_type.h" |
| #include "net/test/embedded_test_server/embedded_test_server.h" |
| #include "net/test/embedded_test_server/http_request.h" |
| #include "net/test/embedded_test_server/http_response.h" |
| #include "services/network/public/cpp/client_hints.h" |
| #include "services/network/public/cpp/cors/cors.h" |
| #include "services/network/public/cpp/features.h" |
| #include "services/network/public/cpp/network_switches.h" |
| #include "services/network/public/cpp/resource_request.h" |
| #include "services/network/public/mojom/web_client_hints_types.mojom-shared.h" |
| #include "testing/gmock/include/gmock/gmock-matchers.h" |
| #include "testing/gmock/include/gmock/gmock.h" |
| #include "third_party/abseil-cpp/absl/types/optional.h" |
| #include "third_party/blink/public/common/client_hints/client_hints.h" |
| #include "third_party/blink/public/common/web_preferences/web_preferences.h" |
| #include "third_party/re2/src/re2/re2.h" |
| |
| namespace { |
| |
| using ::content::URLLoaderInterceptor; |
| using ::testing::Eq; |
| using ::testing::Optional; |
| |
| constexpr unsigned expected_client_hints_number = 13u; |
| constexpr int32_t uma_histogram_max_value = 1471228928; |
| |
| // An interceptor that records count of fetches and client hint headers for |
| // requests to https://foo.com/non-existing-image.jpg. |
| class ThirdPartyURLLoaderInterceptor { |
| public: |
| explicit ThirdPartyURLLoaderInterceptor(const GURL intercepted_url) |
| : intercepted_url_(intercepted_url), |
| interceptor_(base::BindRepeating( |
| &ThirdPartyURLLoaderInterceptor::InterceptURLRequest, |
| base::Unretained(this))) {} |
| |
| ~ThirdPartyURLLoaderInterceptor() = default; |
| |
| size_t request_count_seen() const { return request_count_seen_; } |
| |
| size_t client_hints_count_seen() const { return client_hints_count_seen_; } |
| |
| private: |
| bool InterceptURLRequest(URLLoaderInterceptor::RequestParams* params) { |
| if (params->url_request.url != intercepted_url_) |
| return false; |
| |
| request_count_seen_++; |
| for (const auto& elem : network::GetClientHintToNameMap()) { |
| const auto& header = elem.second; |
| if (params->url_request.headers.HasHeader(header)) |
| client_hints_count_seen_++; |
| } |
| return false; |
| } |
| |
| GURL intercepted_url_; |
| |
| size_t request_count_seen_ = 0u; |
| |
| size_t client_hints_count_seen_ = 0u; |
| |
| URLLoaderInterceptor interceptor_; |
| |
| DISALLOW_COPY_AND_ASSIGN(ThirdPartyURLLoaderInterceptor); |
| }; |
| |
| // Returns true only if |header_value| satisfies ABNF: 1*DIGIT [ "." 1*DIGIT ] |
| bool IsSimilarToDoubleABNF(const std::string& header_value) { |
| if (header_value.empty()) |
| return false; |
| char first_char = header_value.at(0); |
| if (!isdigit(first_char)) |
| return false; |
| |
| bool period_found = false; |
| bool digit_found_after_period = false; |
| for (char ch : header_value) { |
| if (isdigit(ch)) { |
| if (period_found) { |
| digit_found_after_period = true; |
| } |
| continue; |
| } |
| if (ch == '.') { |
| if (period_found) |
| return false; |
| period_found = true; |
| continue; |
| } |
| return false; |
| } |
| if (period_found) |
| return digit_found_after_period; |
| return true; |
| } |
| |
| // Returns true only if |header_value| satisfies ABNF: 1*DIGIT |
| bool IsSimilarToIntABNF(const std::string& header_value) { |
| if (header_value.empty()) |
| return false; |
| |
| for (char ch : header_value) { |
| if (!isdigit(ch)) |
| return false; |
| } |
| return true; |
| } |
| |
| } // namespace |
| |
| class ClientHintsBrowserTest : public InProcessBrowserTest, |
| public testing::WithParamInterface<bool> { |
| public: |
| ClientHintsBrowserTest() |
| : http_server_(net::EmbeddedTestServer::TYPE_HTTP), |
| https_server_(net::EmbeddedTestServer::TYPE_HTTPS), |
| https_cross_origin_server_(net::EmbeddedTestServer::TYPE_HTTPS), |
| expect_client_hints_on_main_frame_(false), |
| expect_client_hints_on_subresources_(false), |
| count_user_agent_hint_headers_seen_(0), |
| count_ua_mobile_client_hints_headers_seen_(0), |
| count_ua_platform_client_hints_headers_seen_(0), |
| count_client_hints_headers_seen_(0), |
| request_interceptor_(nullptr) { |
| http_server_.ServeFilesFromSourceDirectory("chrome/test/data/client_hints"); |
| https_server_.ServeFilesFromSourceDirectory( |
| "chrome/test/data/client_hints"); |
| https_cross_origin_server_.ServeFilesFromSourceDirectory( |
| "chrome/test/data/client_hints"); |
| |
| http_server_.RegisterRequestMonitor( |
| base::BindRepeating(&ClientHintsBrowserTest::MonitorResourceRequest, |
| base::Unretained(this))); |
| https_server_.RegisterRequestMonitor( |
| base::BindRepeating(&ClientHintsBrowserTest::MonitorResourceRequest, |
| base::Unretained(this))); |
| https_cross_origin_server_.RegisterRequestMonitor( |
| base::BindRepeating(&ClientHintsBrowserTest::MonitorResourceRequest, |
| base::Unretained(this))); |
| https_cross_origin_server_.RegisterRequestHandler( |
| base::BindRepeating(&ClientHintsBrowserTest::RequestHandlerToRedirect, |
| base::Unretained(this))); |
| https_server_.RegisterRequestHandler(base::BindRepeating( |
| &ClientHintsBrowserTest::RequestHandlerToFetchCrossOriginIframe, |
| base::Unretained(this))); |
| |
| EXPECT_TRUE(http_server_.Start()); |
| EXPECT_TRUE(https_server_.Start()); |
| EXPECT_TRUE(https_cross_origin_server_.Start()); |
| |
| EXPECT_NE(https_server_.base_url(), https_cross_origin_server_.base_url()); |
| |
| accept_ch_with_lifetime_http_local_url_ = |
| http_server_.GetURL("/accept_ch_with_lifetime.html"); |
| http_equiv_accept_ch_with_lifetime_http_local_url_ = |
| http_server_.GetURL("/http_equiv_accept_ch_with_lifetime.html"); |
| EXPECT_TRUE(accept_ch_with_lifetime_http_local_url_.SchemeIsHTTPOrHTTPS()); |
| EXPECT_FALSE( |
| accept_ch_with_lifetime_http_local_url_.SchemeIsCryptographic()); |
| |
| accept_ch_with_lifetime_url_ = |
| https_server_.GetURL("/accept_ch_with_lifetime.html"); |
| accept_ch_with_short_lifetime_url_ = |
| https_server_.GetURL("/accept_ch_with_short_lifetime.html"); |
| |
| accept_ch_without_lifetime_url_ = |
| https_server_.GetURL("/accept_ch_without_lifetime.html"); |
| EXPECT_TRUE(accept_ch_with_lifetime_url_.SchemeIsHTTPOrHTTPS()); |
| EXPECT_TRUE(accept_ch_with_lifetime_url_.SchemeIsCryptographic()); |
| http_equiv_accept_ch_without_lifetime_url_ = |
| https_server_.GetURL("/http_equiv_accept_ch_without_lifetime.html"); |
| |
| without_accept_ch_without_lifetime_url_ = |
| https_server_.GetURL("/without_accept_ch_without_lifetime.html"); |
| EXPECT_TRUE(without_accept_ch_without_lifetime_url_.SchemeIsHTTPOrHTTPS()); |
| EXPECT_TRUE( |
| without_accept_ch_without_lifetime_url_.SchemeIsCryptographic()); |
| |
| without_accept_ch_without_lifetime_local_url_ = |
| http_server_.GetURL("/without_accept_ch_without_lifetime.html"); |
| EXPECT_TRUE( |
| without_accept_ch_without_lifetime_local_url_.SchemeIsHTTPOrHTTPS()); |
| EXPECT_FALSE( |
| without_accept_ch_without_lifetime_local_url_.SchemeIsCryptographic()); |
| |
| without_accept_ch_without_lifetime_img_localhost_ = https_server_.GetURL( |
| "/without_accept_ch_without_lifetime_img_localhost.html"); |
| without_accept_ch_without_lifetime_img_foo_com_ = https_server_.GetURL( |
| "/without_accept_ch_without_lifetime_img_foo_com.html"); |
| accept_ch_without_lifetime_with_iframe_url_ = |
| https_server_.GetURL("/accept_ch_without_lifetime_with_iframe.html"); |
| http_equiv_accept_ch_without_lifetime_with_iframe_url_ = |
| https_server_.GetURL( |
| "/http_equiv_accept_ch_without_lifetime_with_iframe.html"); |
| accept_ch_without_lifetime_with_subresource_url_ = https_server_.GetURL( |
| "/accept_ch_without_lifetime_with_subresource.html"); |
| http_equiv_accept_ch_without_lifetime_with_subresource_url_ = |
| https_server_.GetURL( |
| "/http_equiv_accept_ch_without_lifetime_with_subresource.html"); |
| accept_ch_without_lifetime_with_subresource_iframe_url_ = |
| https_server_.GetURL( |
| "/accept_ch_without_lifetime_with_subresource_iframe.html"); |
| http_equiv_accept_ch_without_lifetime_with_subresource_iframe_url_ = |
| https_server_.GetURL( |
| "/http_equiv_accept_ch_without_lifetime_with_subresource_iframe." |
| "html"); |
| accept_ch_without_lifetime_img_localhost_ = |
| https_server_.GetURL("/accept_ch_without_lifetime_img_localhost.html"); |
| http_equiv_accept_ch_without_lifetime_img_localhost_ = https_server_.GetURL( |
| "/http_equiv_accept_ch_without_lifetime_img_localhost.html"); |
| http_equiv_accept_ch_with_lifetime_ = |
| https_server_.GetURL("/http_equiv_accept_ch_with_lifetime.html"); |
| |
| redirect_url_ = https_cross_origin_server_.GetURL("/redirect.html"); |
| |
| accept_ch_empty_ = https_server_.GetURL("/accept_ch_empty.html"); |
| http_equiv_accept_ch_merge_ = |
| https_server_.GetURL("/http_equiv_accept_ch_merge.html"); |
| } |
| |
| ~ClientHintsBrowserTest() override {} |
| |
| virtual std::unique_ptr<base::FeatureList> EnabledFeatures() { |
| std::unique_ptr<base::FeatureList> feature_list(new base::FeatureList); |
| feature_list->InitializeFromCommandLine( |
| "UserAgentClientHint,CriticalClientHint," |
| "AcceptCHFrame,PrefersColorSchemeClientHintHeader," |
| "ViewportHeightClientHintHeader", |
| ""); |
| return feature_list; |
| } |
| |
| void SetUp() override { |
| scoped_feature_list_.InitWithFeatureList(EnabledFeatures()); |
| InProcessBrowserTest::SetUp(); |
| } |
| |
| void SetUpOnMainThread() override { |
| host_resolver()->AddRule("*", "127.0.0.1"); |
| |
| request_interceptor_ = std::make_unique<ThirdPartyURLLoaderInterceptor>( |
| GURL("https://foo.com/non-existing-image.jpg")); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| void TearDownOnMainThread() override { request_interceptor_.reset(); } |
| |
| void SetUpCommandLine(base::CommandLine* cmd) override { |
| cmd->AppendSwitchASCII(network::switches::kForceEffectiveConnectionType, |
| net::kEffectiveConnectionType2G); |
| } |
| |
| void SetClientHintExpectationsOnMainFrame(bool expect_client_hints) { |
| expect_client_hints_on_main_frame_ = expect_client_hints; |
| } |
| |
| void SetClientHintExpectationsOnSubresources(bool expect_client_hints) { |
| base::AutoLock lock(expect_client_hints_on_subresources_lock_); |
| expect_client_hints_on_subresources_ = expect_client_hints; |
| } |
| |
| bool expect_client_hints_on_subresources() { |
| base::AutoLock lock(expect_client_hints_on_subresources_lock_); |
| return expect_client_hints_on_subresources_; |
| } |
| |
| // Verify that the user is not notified that cookies or JavaScript were |
| // blocked on the webpage due to the checks done by client hints. |
| void VerifyContentSettingsNotNotified() const { |
| auto* pscs = content_settings::PageSpecificContentSettings::GetForFrame( |
| browser()->tab_strip_model()->GetActiveWebContents()->GetMainFrame()); |
| EXPECT_FALSE(pscs->IsContentBlocked(ContentSettingsType::COOKIES)); |
| EXPECT_FALSE(pscs->IsContentBlocked(ContentSettingsType::JAVASCRIPT)); |
| } |
| |
| void SetExpectedEffectiveConnectionType( |
| net::EffectiveConnectionType effective_connection_type) { |
| expected_ect = effective_connection_type; |
| } |
| |
| void SetJsEnabledForActiveView(bool enabled) { |
| content::WebContents* web_contents = |
| browser()->tab_strip_model()->GetActiveWebContents(); |
| blink::web_pref::WebPreferences prefs = |
| web_contents->GetOrCreateWebPreferences(); |
| prefs.javascript_enabled = enabled; |
| web_contents->SetWebPreferences(prefs); |
| } |
| |
| void TestProfilesIndependent(Browser* browser_a, Browser* browser_b); |
| |
| const GURL& accept_ch_with_lifetime_http_local_url() const { |
| return accept_ch_with_lifetime_http_local_url_; |
| } |
| const GURL& http_equiv_accept_ch_with_lifetime_http_local_url() const { |
| return http_equiv_accept_ch_with_lifetime_http_local_url_; |
| } |
| |
| // A URL whose response headers include Accept-CH and Accept-CH-Lifetime |
| // headers. |
| const GURL& accept_ch_with_lifetime_url() const { |
| return accept_ch_with_lifetime_url_; |
| } |
| const GURL& http_equiv_accept_ch_with_lifetime() { |
| return http_equiv_accept_ch_with_lifetime_; |
| } |
| |
| // A URL whose response headers include Accept-CH and Accept-CH-Lifetime |
| // headers. The Accept-CH-Lifetime duration is set very short to 1 second. |
| const GURL& accept_ch_with_short_lifetime() const { |
| return accept_ch_with_short_lifetime_url_; |
| } |
| |
| // A URL whose response headers include only Accept-CH header. |
| const GURL& accept_ch_without_lifetime_url() const { |
| return accept_ch_without_lifetime_url_; |
| } |
| const GURL& http_equiv_accept_ch_without_lifetime_url() const { |
| return http_equiv_accept_ch_without_lifetime_url_; |
| } |
| |
| // A URL whose response headers do not include either Accept-CH or |
| // Accept-CH-Lifetime headers. Navigating to this URL also fetches an image. |
| const GURL& without_accept_ch_without_lifetime_url() const { |
| return without_accept_ch_without_lifetime_url_; |
| } |
| |
| // A URL whose response headers do not include either Accept-CH or |
| // Accept-CH-Lifetime headers. Navigating to this URL also fetches an image. |
| const GURL& without_accept_ch_without_lifetime_local_url() const { |
| return without_accept_ch_without_lifetime_local_url_; |
| } |
| |
| // A URL whose response headers do not include either Accept-CH or |
| // Accept-CH-Lifetime headers. Navigating to this URL also fetches an image |
| // from localhost. |
| const GURL& without_accept_ch_without_lifetime_img_localhost() const { |
| return without_accept_ch_without_lifetime_img_localhost_; |
| } |
| |
| // A URL whose response headers do not include either Accept-CH or |
| // Accept-CH-Lifetime headers. Navigating to this URL also fetches an image |
| // from foo.com. |
| const GURL& without_accept_ch_without_lifetime_img_foo_com() const { |
| return without_accept_ch_without_lifetime_img_foo_com_; |
| } |
| |
| // A URL whose response does not include Accept-CH or Accept-CH-Lifetime |
| // headers. The response loads accept_ch_with_lifetime_url() in an iframe. |
| const GURL& accept_ch_without_lifetime_with_iframe_url() const { |
| return accept_ch_without_lifetime_with_iframe_url_; |
| } |
| const GURL& http_equiv_accept_ch_without_lifetime_with_iframe_url() const { |
| return http_equiv_accept_ch_without_lifetime_with_iframe_url_; |
| } |
| |
| // A URL whose response does not include Accept-CH or Accept-CH-Lifetime |
| // headers. The response loads accept_ch_with_lifetime_url() as a subresource |
| // in the main frame. |
| const GURL& accept_ch_without_lifetime_with_subresource_url() const { |
| return accept_ch_without_lifetime_with_subresource_url_; |
| } |
| const GURL& http_equiv_accept_ch_without_lifetime_with_subresource_url() |
| const { |
| return http_equiv_accept_ch_without_lifetime_with_subresource_url_; |
| } |
| |
| // A URL whose response does not include Accept-CH or Accept-CH-Lifetime |
| // headers. The response loads accept_ch_with_lifetime_url() or |
| // http_equiv_accept_ch_with_lifetime_url() as a subresource in the iframe. |
| const GURL& accept_ch_without_lifetime_with_subresource_iframe_url() const { |
| return accept_ch_without_lifetime_with_subresource_iframe_url_; |
| } |
| const GURL& |
| http_equiv_accept_ch_without_lifetime_with_subresource_iframe_url() const { |
| return http_equiv_accept_ch_without_lifetime_with_subresource_iframe_url_; |
| } |
| |
| // A URL whose response includes only Accept-CH header. Navigating to |
| // this URL also fetches two images: One from the localhost, and one from |
| // foo.com. |
| const GURL& accept_ch_without_lifetime_img_localhost() const { |
| return accept_ch_without_lifetime_img_localhost_; |
| } |
| const GURL& http_equiv_accept_ch_without_lifetime_img_localhost() const { |
| return http_equiv_accept_ch_without_lifetime_img_localhost_; |
| } |
| |
| const GURL& redirect_url() const { return redirect_url_; } |
| |
| // A URL to a page with a response containing an empty accept_ch header. |
| const GURL& accept_ch_empty() const { return accept_ch_empty_; } |
| |
| // A page where some hints are in accept-ch header, some in http-equiv. |
| const GURL& http_equiv_accept_ch_merge() const { |
| return http_equiv_accept_ch_merge_; |
| } |
| |
| size_t count_user_agent_hint_headers_seen() const { |
| base::AutoLock lock(count_headers_lock_); |
| return count_user_agent_hint_headers_seen_; |
| } |
| |
| size_t count_ua_mobile_client_hints_headers_seen() const { |
| base::AutoLock lock(count_headers_lock_); |
| return count_ua_mobile_client_hints_headers_seen_; |
| } |
| |
| size_t count_ua_platform_client_hints_headers_seen() const { |
| base::AutoLock lock(count_headers_lock_); |
| return count_ua_platform_client_hints_headers_seen_; |
| } |
| |
| size_t count_client_hints_headers_seen() const { |
| base::AutoLock lock(count_headers_lock_); |
| return count_client_hints_headers_seen_; |
| } |
| |
| size_t third_party_request_count_seen() const { |
| return request_interceptor_->request_count_seen(); |
| } |
| |
| size_t third_party_client_hints_count_seen() const { |
| return request_interceptor_->client_hints_count_seen(); |
| } |
| |
| const std::string& main_frame_ua_observed() const { |
| return main_frame_ua_observed_; |
| } |
| |
| const std::string& main_frame_ua_full_version_observed() const { |
| return main_frame_ua_full_version_observed_; |
| } |
| |
| const std::string& main_frame_ua_mobile_observed() const { |
| return main_frame_ua_mobile_observed_; |
| } |
| |
| const std::string& main_frame_ua_platform_observed() const { |
| return main_frame_ua_platform_observed_; |
| } |
| |
| base::test::ScopedFeatureList scoped_feature_list_; |
| |
| std::string intercept_iframe_resource_; |
| bool intercept_to_http_equiv_iframe_ = false; |
| mutable base::Lock count_headers_lock_; |
| |
| private: |
| // Intercepts only the main frame requests that contain |
| // "redirect" in the resource path. The intercepted requests |
| // are served an HTML file that fetches an iframe from a cross-origin HTTPS |
| // server. |
| std::unique_ptr<net::test_server::HttpResponse> RequestHandlerToRedirect( |
| const net::test_server::HttpRequest& request) { |
| // Check if it's a main frame request. |
| if (request.relative_url.find(".html") == std::string::npos) |
| return nullptr; |
| |
| if (request.GetURL().spec().find("redirect") == std::string::npos) |
| return nullptr; |
| |
| auto response = std::make_unique<net::test_server::BasicHttpResponse>(); |
| response->set_code(net::HTTP_FOUND); |
| response->AddCustomHeader("Location", |
| without_accept_ch_without_lifetime_url().spec()); |
| return std::move(response); |
| } |
| |
| // Intercepts only the main frame requests that contain |
| // |intercept_iframe_resource_| in the resource path. The intercepted requests |
| // are served an HTML file that fetches an iframe from a cross-origin HTTPS |
| // server. |
| std::unique_ptr<net::test_server::HttpResponse> |
| RequestHandlerToFetchCrossOriginIframe( |
| const net::test_server::HttpRequest& request) { |
| if (intercept_iframe_resource_.empty()) |
| return nullptr; |
| |
| // Check if it's a main frame request. |
| if (request.relative_url.find(".html") == std::string::npos) |
| return nullptr; |
| |
| if (request.relative_url.find(intercept_iframe_resource_) == |
| std::string::npos) { |
| return nullptr; |
| } |
| |
| const std::string iframe_url = |
| intercept_to_http_equiv_iframe_ |
| ? https_cross_origin_server_ |
| .GetURL("/http_equiv_accept_ch_with_lifetime.html") |
| .spec() |
| : https_cross_origin_server_.GetURL("/accept_ch_with_lifetime.html") |
| .spec(); |
| |
| std::unique_ptr<net::test_server::BasicHttpResponse> http_response( |
| new net::test_server::BasicHttpResponse()); |
| http_response->set_code(net::HTTP_OK); |
| http_response->set_content_type("text/html"); |
| http_response->set_content( |
| "<html>" |
| "<link rel='icon' href='data:;base64,='><head></head>" |
| "Empty file which uses link-rel to disable favicon fetches. " |
| "<iframe src='" + |
| iframe_url + "'></iframe></html>"); |
| |
| return std::move(http_response); |
| } |
| |
| static std::string UpdateHeaderObservation( |
| const net::test_server::HttpRequest& request, |
| const std::string& header) { |
| if (request.headers.find(header) != request.headers.end()) |
| return request.headers.find(header)->second; |
| else |
| return ""; |
| } |
| |
| // Called by |https_server_|. |
| void MonitorResourceRequest(const net::test_server::HttpRequest& request) { |
| bool is_main_frame_navigation = |
| request.GetURL().spec().find(".html") != std::string::npos; |
| |
| if (is_main_frame_navigation && |
| request.GetURL().spec().find("redirect") != std::string::npos) { |
| return; |
| } |
| |
| if (is_main_frame_navigation) { |
| main_frame_ua_observed_ = UpdateHeaderObservation(request, "sec-ch-ua"); |
| main_frame_ua_full_version_observed_ = |
| UpdateHeaderObservation(request, "sec-ch-ua-full-version"); |
| main_frame_ua_mobile_observed_ = |
| UpdateHeaderObservation(request, "sec-ch-ua-mobile"); |
| main_frame_ua_platform_observed_ = |
| UpdateHeaderObservation(request, "sec-ch-ua-platform"); |
| |
| VerifyClientHintsReceived(expect_client_hints_on_main_frame_, request); |
| if (expect_client_hints_on_main_frame_) { |
| double value = 0.0; |
| EXPECT_TRUE(base::StringToDouble( |
| request.headers.find("device-memory")->second, &value)); |
| EXPECT_LT(0.0, value); |
| EXPECT_TRUE(IsSimilarToDoubleABNF( |
| request.headers.find("device-memory")->second)); |
| main_frame_device_memory_observed_ = value; |
| |
| EXPECT_TRUE( |
| base::StringToDouble(request.headers.find("dpr")->second, &value)); |
| EXPECT_LT(0.0, value); |
| EXPECT_TRUE(IsSimilarToDoubleABNF(request.headers.find("dpr")->second)); |
| main_frame_dpr_observed_ = value; |
| |
| EXPECT_TRUE(base::StringToDouble( |
| request.headers.find("viewport-width")->second, &value)); |
| EXPECT_TRUE( |
| IsSimilarToIntABNF(request.headers.find("viewport-width")->second)); |
| #if !defined(OS_ANDROID) |
| EXPECT_LT(0.0, value); |
| #else |
| EXPECT_EQ(980, value); |
| #endif |
| main_frame_viewport_width_observed_ = value; |
| |
| EXPECT_TRUE(base::StringToDouble( |
| request.headers.find("sec-ch-viewport-height")->second, &value)); |
| EXPECT_TRUE(IsSimilarToIntABNF( |
| request.headers.find("sec-ch-viewport-height")->second)); |
| EXPECT_LT(0.0, value); |
| |
| VerifyNetworkQualityClientHints(request); |
| } |
| } |
| |
| if (!is_main_frame_navigation) { |
| VerifyClientHintsReceived(expect_client_hints_on_subresources(), request); |
| |
| if (expect_client_hints_on_subresources()) { |
| double value = 0.0; |
| EXPECT_TRUE(base::StringToDouble( |
| request.headers.find("device-memory")->second, &value)); |
| EXPECT_LT(0.0, value); |
| EXPECT_TRUE(IsSimilarToDoubleABNF( |
| request.headers.find("device-memory")->second)); |
| if (main_frame_device_memory_observed_ > 0) { |
| EXPECT_EQ(main_frame_device_memory_observed_, value); |
| } |
| |
| EXPECT_TRUE( |
| base::StringToDouble(request.headers.find("dpr")->second, &value)); |
| EXPECT_LT(0.0, value); |
| EXPECT_TRUE(IsSimilarToDoubleABNF(request.headers.find("dpr")->second)); |
| if (main_frame_dpr_observed_ > 0) { |
| EXPECT_EQ(main_frame_dpr_observed_, value); |
| } |
| |
| EXPECT_TRUE(base::StringToDouble( |
| request.headers.find("viewport-width")->second, &value)); |
| EXPECT_TRUE( |
| IsSimilarToIntABNF(request.headers.find("viewport-width")->second)); |
| #if !defined(OS_ANDROID) |
| EXPECT_LT(0.0, value); |
| #else |
| EXPECT_EQ(980, value); |
| #endif |
| #if defined(OS_ANDROID) |
| // TODO(tbansal): https://crbug.com/825892: Viewport width on main |
| // frame requests may be incorrect when the Chrome window is not |
| // maximized. |
| if (main_frame_viewport_width_observed_ > 0) { |
| EXPECT_EQ(main_frame_viewport_width_observed_, value); |
| } |
| #endif |
| EXPECT_TRUE(base::StringToDouble( |
| request.headers.find("sec-ch-viewport-height")->second, &value)); |
| EXPECT_TRUE(IsSimilarToIntABNF( |
| request.headers.find("sec-ch-viewport-height")->second)); |
| EXPECT_LT(0.0, value); |
| |
| VerifyNetworkQualityClientHints(request); |
| } |
| } |
| |
| for (const auto& elem : network::GetClientHintToNameMap()) { |
| const auto& header = elem.second; |
| if (base::Contains(request.headers, header)) { |
| base::AutoLock lock(count_headers_lock_); |
| // The user agent hint is special: |
| if (header == "sec-ch-ua") { |
| count_user_agent_hint_headers_seen_++; |
| } else if (header == "sec-ch-ua-mobile") { |
| count_ua_mobile_client_hints_headers_seen_++; |
| } else if (header == "sec-ch-ua-platform") { |
| count_ua_platform_client_hints_headers_seen_++; |
| } else { |
| count_client_hints_headers_seen_++; |
| } |
| } |
| } |
| } |
| |
| void VerifyClientHintsReceived(bool expect_client_hints, |
| const net::test_server::HttpRequest& request) { |
| for (const auto& elem : network::GetClientHintToNameMap()) { |
| const auto& header = elem.second; |
| SCOPED_TRACE(testing::Message() << header); |
| // Resource width client hint is only attached on image subresources. |
| if (header == "width") { |
| continue; |
| } |
| |
| // `Sec-CH-UA`, `Sec-CH-UA-Mobile`, and `Sec-CH-UA-Platform` is attached |
| // on all requests. |
| if (header == "sec-ch-ua" || header == "sec-ch-ua-mobile" || |
| header == "sec-ch-ua-platform") { |
| continue; |
| } |
| |
| // Skip over the `Sec-CH-UA-Reduced` client hint because it is only added |
| // in the presence of a valid "UserAgentReduction" Origin Trial token. |
| // `Sec-CH-UA-Reduced` is tested via UaReducedOriginTrialBrowserTest |
| // below. |
| if (header == "sec-ch-ua-reduced") { |
| continue; |
| } |
| |
| EXPECT_EQ(expect_client_hints, base::Contains(request.headers, header)); |
| } |
| } |
| |
| void VerifyNetworkQualityClientHints( |
| const net::test_server::HttpRequest& request) const { |
| // Effective connection type is forced to 2G using command line in these |
| // tests. |
| int rtt_value = 0.0; |
| EXPECT_TRUE( |
| base::StringToInt(request.headers.find("rtt")->second, &rtt_value)); |
| EXPECT_LE(0, rtt_value); |
| EXPECT_TRUE(IsSimilarToIntABNF(request.headers.find("rtt")->second)); |
| // Verify that RTT value is a multiple of 50 milliseconds. |
| EXPECT_EQ(0, rtt_value % 50); |
| EXPECT_GE(expected_ect == net::EFFECTIVE_CONNECTION_TYPE_2G ? 3000 : 500, |
| rtt_value); |
| |
| double mbps_value = 0.0; |
| EXPECT_TRUE(base::StringToDouble(request.headers.find("downlink")->second, |
| &mbps_value)); |
| EXPECT_LE(0, mbps_value); |
| EXPECT_TRUE( |
| IsSimilarToDoubleABNF(request.headers.find("downlink")->second)); |
| // Verify that the mbps value is a multiple of 0.050 mbps. |
| // Allow for small amount of noise due to double to integer conversions. |
| EXPECT_NEAR(0, (static_cast<int>(mbps_value * 1000)) % 50, 1); |
| EXPECT_GE(10.0, mbps_value); |
| |
| EXPECT_FALSE(request.headers.find("ect")->second.empty()); |
| |
| // TODO(tbansal): https://crbug.com/819244: When network servicification is |
| // enabled, the renderer processes do not receive notifications on |
| // change in the network quality. Hence, the network quality client hints |
| // are not set to the correct value on subresources. |
| bool is_main_frame_navigation = |
| request.GetURL().spec().find(".html") != std::string::npos; |
| if (is_main_frame_navigation) { |
| // Effective connection type is forced to 2G using command line in these |
| // tests. RTT is expected to be 1800 msec but leave some gap to account |
| // for added noise and randomization. |
| if (expected_ect == net::EFFECTIVE_CONNECTION_TYPE_2G) { |
| EXPECT_NEAR(1800, rtt_value, 360); |
| } else if (expected_ect == net::EFFECTIVE_CONNECTION_TYPE_3G) { |
| EXPECT_NEAR(450, rtt_value, 90); |
| } else { |
| NOTREACHED(); |
| } |
| |
| // Effective connection type is forced to 2G using command line in these |
| // tests. downlink is expected to be 0.075 Mbps but leave some gap to |
| // account for added noise and randomization. |
| if (expected_ect == net::EFFECTIVE_CONNECTION_TYPE_2G) { |
| EXPECT_NEAR(0.075, mbps_value, 0.05); |
| } else if (expected_ect == net::EFFECTIVE_CONNECTION_TYPE_3G) { |
| EXPECT_NEAR(0.4, mbps_value, 0.1); |
| } else { |
| NOTREACHED(); |
| } |
| |
| EXPECT_EQ(expected_ect == net::EFFECTIVE_CONNECTION_TYPE_2G ? "2g" : "3g", |
| request.headers.find("ect")->second); |
| } |
| } |
| |
| net::EmbeddedTestServer http_server_; |
| net::EmbeddedTestServer https_server_; |
| net::EmbeddedTestServer https_cross_origin_server_; |
| GURL accept_ch_with_lifetime_http_local_url_; |
| GURL http_equiv_accept_ch_with_lifetime_http_local_url_; |
| GURL accept_ch_with_lifetime_url_; |
| GURL accept_ch_with_short_lifetime_url_; |
| GURL accept_ch_without_lifetime_url_; |
| GURL http_equiv_accept_ch_without_lifetime_url_; |
| GURL without_accept_ch_without_lifetime_url_; |
| GURL without_accept_ch_without_lifetime_local_url_; |
| GURL accept_ch_without_lifetime_with_iframe_url_; |
| GURL http_equiv_accept_ch_without_lifetime_with_iframe_url_; |
| GURL accept_ch_without_lifetime_with_subresource_url_; |
| GURL http_equiv_accept_ch_without_lifetime_with_subresource_url_; |
| GURL accept_ch_without_lifetime_with_subresource_iframe_url_; |
| GURL http_equiv_accept_ch_without_lifetime_with_subresource_iframe_url_; |
| GURL without_accept_ch_without_lifetime_img_foo_com_; |
| GURL without_accept_ch_without_lifetime_img_localhost_; |
| GURL accept_ch_without_lifetime_img_localhost_; |
| GURL http_equiv_accept_ch_without_lifetime_img_localhost_; |
| GURL http_equiv_accept_ch_with_lifetime_; |
| GURL redirect_url_; |
| GURL accept_ch_empty_; |
| GURL http_equiv_accept_ch_merge_; |
| |
| std::string main_frame_ua_observed_; |
| std::string main_frame_ua_full_version_observed_; |
| std::string main_frame_ua_mobile_observed_; |
| std::string main_frame_ua_platform_observed_; |
| |
| double main_frame_dpr_observed_ = -1; |
| double main_frame_viewport_width_observed_ = -1; |
| double main_frame_device_memory_observed_ = -1; |
| |
| // Expect client hints on all the main frame request. |
| bool expect_client_hints_on_main_frame_; |
| // Expect client hints on all the subresource requests. |
| bool expect_client_hints_on_subresources_ |
| GUARDED_BY(expect_client_hints_on_subresources_lock_); |
| |
| base::Lock expect_client_hints_on_subresources_lock_; |
| |
| size_t count_user_agent_hint_headers_seen_; |
| size_t count_ua_mobile_client_hints_headers_seen_; |
| size_t count_ua_platform_client_hints_headers_seen_; |
| size_t count_client_hints_headers_seen_; |
| |
| std::unique_ptr<ThirdPartyURLLoaderInterceptor> request_interceptor_; |
| |
| // Set to 2G in SetUpCommandLine(). |
| net::EffectiveConnectionType expected_ect = net::EFFECTIVE_CONNECTION_TYPE_2G; |
| |
| DISALLOW_COPY_AND_ASSIGN(ClientHintsBrowserTest); |
| }; |
| |
| // True if testing for http-equiv correctness. When set to true, the tests |
| // use webpages that may contain http-equiv Accept-CH and Accept-CH-Lifetime |
| // headers. When set to false, the tests use webpages that set the headers in |
| // the HTTP response headers. |
| INSTANTIATE_TEST_SUITE_P(All, |
| ClientHintsBrowserTest, |
| testing::Bool()); |
| |
| class ClientHintsAllowThirdPartyBrowserTest : public ClientHintsBrowserTest { |
| std::unique_ptr<base::FeatureList> EnabledFeatures() override { |
| std::unique_ptr<base::FeatureList> feature_list(new base::FeatureList); |
| feature_list->InitializeFromCommandLine( |
| "AllowClientHintsToThirdParty,UserAgentClientHint," |
| "PrefersColorSchemeClientHintHeader,ViewportHeightClientHintHeader", |
| ""); |
| return feature_list; |
| } |
| }; |
| |
| INSTANTIATE_TEST_SUITE_P(All, |
| ClientHintsAllowThirdPartyBrowserTest, |
| testing::Bool()); |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, CorsChecks) { |
| for (const auto& elem : network::GetClientHintToNameMap()) { |
| const auto& header = elem.second; |
| // Do not test for headers that have not been enabled on the blink "stable" |
| // yet. |
| if (header == "rtt" || header == "downlink" || header == "ect") { |
| continue; |
| } |
| EXPECT_TRUE( |
| network::cors::IsCorsSafelistedHeader(header, "42" /* value */)); |
| } |
| EXPECT_FALSE(network::cors::IsCorsSafelistedHeader("not-a-client-hint-header", |
| "" /* value */)); |
| EXPECT_TRUE( |
| network::cors::IsCorsSafelistedHeader("save-data", "on" /* value */)); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, HttpEquivWorks) { |
| const GURL gurl = http_equiv_accept_ch_without_lifetime_img_localhost(); |
| base::HistogramTester histogram_tester; |
| |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(true); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| } |
| |
| // Loads a webpage that requests persisting of client hints. Verifies that |
| // the browser receives the mojo notification from the renderer and persists the |
| // client hints to the disk --- unless it's using http-equiv which shouldn't |
| // persist. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, ClientHintsHttps) { |
| base::HistogramTester histogram_tester; |
| const GURL gurl = GetParam() ? http_equiv_accept_ch_with_lifetime() |
| : accept_ch_with_lifetime_url(); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| if (GetParam()) |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| else |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| if (GetParam()) { |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateSize", 0); |
| histogram_tester.ExpectTotalCount("ClientHints.PersistDuration", 0); |
| } else { |
| // client_hints_url() sets the expected number of client hints. |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // accept_ch_with_lifetime_url() sets client hints persist duration to 3600 |
| // seconds, but a maximum value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| } |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, PRE_ClientHintsClearSession) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Fetching |gurl| should persist the request for client hints iff using |
| // headers and not http-equiv. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| base::RunLoop().RunUntilIdle(); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // accept_ch_with_lifetime_url() sets client hints persist duration to 3600 |
| // seconds, but a maximum value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, ClientHintsClearSession) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(2u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(2u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(2u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(0u, count_client_hints_headers_seen()); |
| } |
| |
| // Test that client hints are attached to subresources only if they belong |
| // to the same host as document host. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsHttpsSubresourceDifferentOrigin) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| |
| // Add client hints for the embedded test server. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| // Verify that the client hints settings for localhost have been saved. |
| ContentSettingsForOneType client_hints_settings; |
| HostContentSettingsMap* host_content_settings_map = |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()); |
| host_content_settings_map->GetSettingsForOneType( |
| ContentSettingsType::CLIENT_HINTS, &client_hints_settings); |
| ASSERT_EQ(1U, client_hints_settings.size()); |
| |
| // Copy the client hints setting for localhost to foo.com. |
| host_content_settings_map->SetWebsiteSettingDefaultScope( |
| GURL("https://foo.com/"), GURL(), ContentSettingsType::CLIENT_HINTS, |
| |
| std::make_unique<base::Value>( |
| client_hints_settings.at(0).setting_value.Clone())); |
| |
| // Verify that client hints for the two hosts has been saved. |
| host_content_settings_map = |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()); |
| host_content_settings_map->GetSettingsForOneType( |
| ContentSettingsType::CLIENT_HINTS, &client_hints_settings); |
| ASSERT_EQ(2U, client_hints_settings.size()); |
| |
| // Navigating to without_accept_ch_without_lifetime_img_localhost() should |
| // attach client hints to the image subresouce contained in that page since |
| // the image is located on the same server as the document origin. |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_img_localhost())); |
| base::RunLoop().RunUntilIdle(); |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // The user agent hint is attached to all three requests, as is UA-mobile: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| |
| // Navigating to without_accept_ch_without_lifetime_img_foo_com() should not |
| // attach client hints to the image subresouce contained in that page since |
| // the image is located on a different server as the document origin. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_img_foo_com())); |
| base::RunLoop().RunUntilIdle(); |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // The device-memory and dprheader is attached to the main frame request. |
| #if defined(OS_ANDROID) |
| EXPECT_EQ(expected_client_hints_number, count_client_hints_headers_seen()); |
| #else |
| EXPECT_EQ(expected_client_hints_number * 3, |
| count_client_hints_headers_seen()); |
| #endif |
| |
| // Requests to third party servers should have three (3) client hints attached |
| // (`Sec-CH-UA`, `Sec-CH-UA-Mobile`, `Sec-CH-UA-Platform`). |
| EXPECT_EQ(1u, third_party_request_count_seen()); |
| EXPECT_EQ(3u, third_party_client_hints_count_seen()); |
| } |
| |
| // Test that client hints are attached to subresources checks the right setting |
| // for OTR profile. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsHttpsSubresourceOffTheRecord) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| |
| // Add client hints for the embedded test server. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| // Main profile should get hints for both page and subresources. |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_img_localhost())); |
| base::RunLoop().RunUntilIdle(); |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| |
| // OTR profile should get neither. |
| Browser* otr_browser = CreateIncognitoBrowser(browser()->profile()); |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| otr_browser, without_accept_ch_without_lifetime_img_localhost())); |
| } |
| |
| // Verify that we send only major version information in the `Sec-CH-UA` header |
| // by default, regardless of opt-in. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, UserAgentVersion) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| blink::UserAgentMetadata ua = embedder_support::GetUserAgentMetadata(); |
| |
| // Navigate to a page that opts-into the header: the value should end with |
| // the major version, and not contain the full version. |
| SetClientHintExpectationsOnMainFrame(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| std::string expected_ua = ua.SerializeBrandVersionList(); |
| EXPECT_EQ(main_frame_ua_observed(), expected_ua); |
| EXPECT_TRUE(main_frame_ua_full_version_observed().empty()); |
| |
| // Navigate again, after the opt-in: the value should stay the major |
| // version. |
| SetClientHintExpectationsOnMainFrame(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| std::string expected_full_version = "\"" + ua.full_version + "\""; |
| EXPECT_EQ(main_frame_ua_observed(), expected_ua); |
| EXPECT_EQ(main_frame_ua_full_version_observed(), expected_full_version); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, UAHintsTabletMode) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| blink::UserAgentMetadata ua = embedder_support::GetUserAgentMetadata(); |
| |
| // First request: only minimal hints, no tablet override. |
| SetClientHintExpectationsOnMainFrame(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| std::string expected_ua = ua.SerializeBrandVersionList(); |
| EXPECT_EQ(main_frame_ua_observed(), expected_ua); |
| EXPECT_EQ(main_frame_ua_full_version_observed(), ""); |
| EXPECT_EQ(main_frame_ua_mobile_observed(), "?0"); |
| EXPECT_EQ(main_frame_ua_platform_observed(), "\"" + ua.platform + "\""); |
| |
| // Second request: table override, all hints. |
| chrome::ToggleRequestTabletSite(browser()); |
| SetClientHintExpectationsOnMainFrame(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| EXPECT_EQ(main_frame_ua_observed(), expected_ua); |
| std::string expected_full_version = "\"" + ua.full_version + "\""; |
| EXPECT_EQ(main_frame_ua_full_version_observed(), expected_full_version); |
| EXPECT_EQ(main_frame_ua_mobile_observed(), "?1"); |
| EXPECT_EQ(main_frame_ua_platform_observed(), "\"Android\""); |
| } |
| |
| // TODO(morlovich): Move this into WebContentsImplBrowserTest once things are |
| // refactored enough that UA client hints actually work in content/ |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, UserAgentOverrideClientHints) { |
| content::WebContents* web_contents = |
| browser()->tab_strip_model()->GetActiveWebContents(); |
| |
| ASSERT_TRUE(embedded_test_server()->Start()); |
| const std::string kHeaderPath = std::string("/echoheader?") + |
| net::HttpRequestHeaders::kUserAgent + |
| "&sec-ch-ua&sec-ch-ua-mobile"; |
| const GURL kUrl(embedded_test_server()->GetURL(kHeaderPath)); |
| |
| web_contents->SetUserAgentOverride( |
| blink::UserAgentOverride::UserAgentOnly("foo"), false); |
| // Not enabled first. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), kUrl)); |
| std::string header_value; |
| EXPECT_TRUE(ExecuteScriptAndExtractString( |
| web_contents, |
| "window.domAutomationController.send(document.body.textContent);", |
| &header_value)); |
| EXPECT_EQ(std::string::npos, header_value.find("foo")) << header_value; |
| |
| // Actually turn it on. |
| web_contents->GetController() |
| .GetLastCommittedEntry() |
| ->SetIsOverridingUserAgent(true); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), kUrl)); |
| EXPECT_TRUE(ExecuteScriptAndExtractString( |
| web_contents, |
| "window.domAutomationController.send(document.body.textContent);", |
| &header_value)); |
| // Since no value was provided for client hints, they are not sent. |
| EXPECT_EQ("foo\nNone\nNone", header_value); |
| |
| // Now actually provide values for the hints. |
| blink::UserAgentOverride ua_override; |
| ua_override.ua_string_override = "foobar"; |
| ua_override.ua_metadata_override.emplace(); |
| ua_override.ua_metadata_override->mobile = true; |
| ua_override.ua_metadata_override->brand_version_list.emplace_back( |
| "Foobarnator", "3.14"); |
| web_contents->SetUserAgentOverride(ua_override, false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), kUrl)); |
| EXPECT_TRUE(ExecuteScriptAndExtractString( |
| web_contents, |
| "window.domAutomationController.send(document.body.textContent);", |
| &header_value)); |
| EXPECT_EQ("foobar\n\"Foobarnator\";v=\"3.14\"\n?1", header_value); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, EmptyAcceptCH) { |
| // First navigate to a page that enables hints. No CH for it yet, since |
| // nothing opted in. |
| GURL gurl = accept_ch_with_lifetime_url(); |
| SetClientHintExpectationsOnMainFrame(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| // Now go to a page with blank Accept-CH. Should get hints from previous |
| // visit. |
| gurl = accept_ch_empty(); |
| SetClientHintExpectationsOnMainFrame(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| // Visiting again should not expect them since we opted out again. |
| SetClientHintExpectationsOnMainFrame(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, MergeAcceptCH) { |
| // Go to page where some hints are enabled by headers, some by |
| // http-equiv. It shouldn't get hints itself (due to first visit), |
| // but subresources should get all the client hints. |
| GURL gurl = http_equiv_accept_ch_merge(); |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| EXPECT_EQ(expected_client_hints_number, count_client_hints_headers_seen()); |
| } |
| |
| void ClientHintsBrowserTest::TestProfilesIndependent(Browser* browser_a, |
| Browser* browser_b) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| blink::UserAgentMetadata ua = embedder_support::GetUserAgentMetadata(); |
| |
| // Navigate |browser_a| to a page that opts-into the header: the value should |
| // end with the major version, and not contain the full version. |
| SetClientHintExpectationsOnMainFrame(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser_a, gurl)); |
| std::string expected_ua = ua.SerializeBrandVersionList(); |
| EXPECT_EQ(main_frame_ua_observed(), expected_ua); |
| EXPECT_TRUE(main_frame_ua_full_version_observed().empty()); |
| |
| // Try again on |browser_a|, the header should have an effect there. |
| SetClientHintExpectationsOnMainFrame(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser_a, gurl)); |
| std::string expected_full_version = "\"" + ua.full_version + "\""; |
| EXPECT_EQ(main_frame_ua_observed(), expected_ua); |
| EXPECT_EQ(main_frame_ua_full_version_observed(), expected_full_version); |
| |
| // Navigate on |browser_b|. That should still only have the major |
| // version. |
| SetClientHintExpectationsOnMainFrame(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser_b, gurl)); |
| EXPECT_EQ(main_frame_ua_observed(), expected_ua); |
| EXPECT_TRUE(main_frame_ua_full_version_observed().empty()); |
| } |
| |
| // Check that client hints attached to navigation inside OTR profiles |
| // use the right settings, regular -> OTR direction. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, OffTheRecordIndependent) { |
| TestProfilesIndependent(browser(), |
| CreateIncognitoBrowser(browser()->profile())); |
| } |
| |
| // Check that client hints attached to navigation inside OTR profiles |
| // use the right settings, OTR -> regular direction. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, OffTheRecordIndependent2) { |
| TestProfilesIndependent(CreateIncognitoBrowser(browser()->profile()), |
| browser()); |
| } |
| |
| // Test that client hints are attached to third party subresources if |
| // AllowClientHintsToThirdParty feature is enabled. |
| IN_PROC_BROWSER_TEST_P(ClientHintsAllowThirdPartyBrowserTest, |
| ClientHintsThirdPartyAllowed) { |
| GURL gurl; |
| unsigned update_event_count = 0; |
| if (GetParam()) { |
| gurl = http_equiv_accept_ch_without_lifetime_img_localhost(); |
| } else { |
| gurl = accept_ch_without_lifetime_img_localhost(); |
| update_event_count = 1; |
| } |
| |
| base::HistogramTester histogram_tester; |
| |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(true); |
| |
| // Add client hints for the embedded test server. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", |
| update_event_count); |
| |
| EXPECT_EQ(expected_client_hints_number, count_client_hints_headers_seen()); |
| |
| // Requests to third party servers should not have client hints attached. |
| EXPECT_EQ(1u, third_party_request_count_seen()); |
| |
| // Device memory, viewport width, DRP, and UA client hints should be sent to |
| // the third-party when feature "AllowClientHintsToThirdParty" is enabled. |
| EXPECT_EQ(6u, third_party_client_hints_count_seen()); |
| } |
| |
| // Test that client hints are not attached to third party subresources if |
| // AllowClientHintsToThirdParty feature is not enabled. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| ClientHintsThirdPartyNotAllowed) { |
| GURL gurl; |
| unsigned update_event_count = 0; |
| if (GetParam()) { |
| gurl = http_equiv_accept_ch_without_lifetime_img_localhost(); |
| } else { |
| gurl = accept_ch_without_lifetime_img_localhost(); |
| update_event_count = 1; |
| } |
| |
| base::HistogramTester histogram_tester; |
| |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(true); |
| |
| // Add client hints for the embedded test server. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", |
| update_event_count); |
| |
| EXPECT_EQ(2u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(2u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(2u, count_ua_platform_client_hints_headers_seen()); |
| EXPECT_EQ(expected_client_hints_number, count_client_hints_headers_seen()); |
| |
| // Requests to third party servers should not have client hints attached. |
| EXPECT_EQ(1u, third_party_request_count_seen()); |
| |
| // Client hints should not be sent to the third-party when feature |
| // "AllowClientHintsToThirdParty" is not enabled, with the exception of the |
| // `Sec-CH-UA` hint, which is sent with every request. |
| EXPECT_EQ(3u, third_party_client_hints_count_seen()); |
| } |
| |
| // Loads a HTTPS webpage that does not request persisting of client hints. |
| // A same-origin iframe loaded by the webpage requests persistence of client |
| // hints. Since that's not a main frame, persistence should not happen. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| PersistenceRequestIframe_SameOrigin) { |
| const GURL gurl = accept_ch_without_lifetime_with_iframe_url(); |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // accept_ch_without_lifetime_with_iframe_url() loads |
| // accept_ch_with_lifetime() in an iframe. The request to persist client |
| // hints from accept_ch_with_lifetime() should not be persisted. |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateSize", 0); |
| histogram_tester.ExpectTotalCount("ClientHints.PersistDuration", 0); |
| } |
| |
| // Loads a HTTPS webpage that does not request persisting of client hints. |
| // An iframe loaded by the webpage from an cross origin server requests |
| // persistence of client hints. |
| // Verify that the request from the cross origin iframe is not honored, and |
| // client hints preference is not persisted. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| DisregardPersistenceRequestIframe_CrossOrigin) { |
| const GURL gurl = |
| GetParam() ? http_equiv_accept_ch_without_lifetime_with_iframe_url() |
| : accept_ch_without_lifetime_with_iframe_url(); |
| |
| intercept_iframe_resource_ = gurl.path(); |
| intercept_to_http_equiv_iframe_ = GetParam(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // accept_ch_without_lifetime_with_iframe_url() loads |
| // accept_ch_with_lifetime() in a cross origin iframe. The request to persist |
| // client hints from accept_ch_with_lifetime() should be disregarded. |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateSize", 0); |
| histogram_tester.ExpectTotalCount("ClientHints.PersistDuration", 0); |
| } |
| |
| // Loads a HTTPS webpage that does not request persisting of client hints. |
| // A subresource loaded by the webpage requests persistence of client hints. |
| // Verify that the request from the subresource is not honored, and client hints |
| // preference is not persisted. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| DisregardPersistenceRequestSubresource) { |
| const GURL gurl = |
| GetParam() ? http_equiv_accept_ch_without_lifetime_with_subresource_url() |
| : accept_ch_without_lifetime_with_subresource_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // accept_ch_without_lifetime_with_subresource_url() loads |
| // accept_ch_with_lifetime() as a subresource. The request to persist client |
| // hints from accept_ch_with_lifetime() should be disregarded. |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateSize", 0); |
| histogram_tester.ExpectTotalCount("ClientHints.PersistDuration", 0); |
| } |
| |
| // Loads a HTTPS webpage that does not request persisting of client hints. |
| // A subresource loaded by the webpage in an iframe requests persistence of |
| // client hints. Verify that the request from the subresource in the iframe |
| // is not honored, and client hints preference is not persisted. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| DisregardPersistenceRequestSubresourceIframe) { |
| const GURL gurl = |
| GetParam() |
| ? http_equiv_accept_ch_without_lifetime_with_subresource_iframe_url() |
| : accept_ch_without_lifetime_with_subresource_iframe_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // |gurl| loads accept_ch_with_lifetime() or |
| // http_equiv_accept_ch_with_lifetime() as a subresource in an iframe. The |
| // request to persist client hints from accept_ch_with_lifetime() or |
| // http_equiv_accept_ch_with_lifetime() should be disregarded. |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateSize", 0); |
| histogram_tester.ExpectTotalCount("ClientHints.PersistDuration", 0); |
| } |
| |
| // Loads a HTTP local webpage (which qualifies as a secure context) that |
| // requests persisting of client hints. Verifies that the browser receives the |
| // mojo notification from the renderer and persists the client hints to the |
| // disk. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsLifetimeFollowedByNoClientHintHttpLocal) { |
| const GURL gurl = accept_ch_with_lifetime_http_local_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // |gurl| sets client hints persist duration to 3600 seconds, but a maximum |
| // value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| |
| base::RunLoop().RunUntilIdle(); |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_local_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| } |
| |
| // Loads a webpage that does not request persisting of client hints. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, NoClientHintsHttps) { |
| base::HistogramTester histogram_tester; |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| // no_client_hints_url() does not sets the client hints. |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateSize", 0); |
| histogram_tester.ExpectTotalCount("ClientHints.PersistDuration", 0); |
| } |
| |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| ClientHintsLifetimeFollowedByNoClientHint) { |
| const GURL gurl = GetParam() ? http_equiv_accept_ch_with_lifetime() |
| : accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Fetching |gurl| should persist the request for client hints iff using |
| // headers and not http-equiv. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| if (GetParam()) |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 0); |
| else |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| base::RunLoop().RunUntilIdle(); |
| |
| if (GetParam()) { |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateSize", 0); |
| histogram_tester.ExpectTotalCount("ClientHints.PersistDuration", 0); |
| } else { |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // accept_ch_with_lifetime_url() sets client hints persist duration to 3600 |
| // seconds, but a maximum value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| } |
| |
| SetClientHintExpectationsOnMainFrame(!GetParam()); |
| SetClientHintExpectationsOnSubresources(!GetParam()); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(GetParam() ? 0 : expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| } |
| |
| // The test first fetches a page that sets Accept-CH-Lifetime. Next, it fetches |
| // a URL from a different origin. However, that URL response redirects to the |
| // same origin from where the first page was fetched. The test verifies that |
| // on receiving redirect to an origin for which the browser has persisted client |
| // hints prefs, the browser attaches the client hints headers when fetching the |
| // redirected URL. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsLifetimeFollowedByRedirectToNoClientHint) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Fetching |gurl| should persist the request for client hints. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // accept_ch_with_lifetime_url() sets client hints persist duration to 3600 |
| // seconds, but a maximum value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| base::RunLoop().RunUntilIdle(); |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), redirect_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| } |
| |
| // Ensure that even when cookies are blocked, client hint preferences are |
| // persisted. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsLifetimePersistedCookiesBlocked) { |
| const GURL gurl_with = accept_ch_with_lifetime_url(); |
| |
| scoped_refptr<content_settings::CookieSettings> cookie_settings_ = |
| CookieSettingsFactory::GetForProfile(browser()->profile()); |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| // Block cookies. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope(gurl_with, GURL(), |
| ContentSettingsType::COOKIES, |
| CONTENT_SETTING_BLOCK); |
| |
| // Fetching |gurl_with| should persist the request for client hints. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl_with)); |
| histogram_tester.ExpectTotalCount("ClientHints.UpdateEventCount", 1); |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| VerifyContentSettingsNotNotified(); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsLifetimeAttachedCookiesBlocked) { |
| const GURL gurl_with = accept_ch_with_lifetime_url(); |
| const GURL gurl_without = accept_ch_without_lifetime_url(); |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Fetching |gurl_with| should persist the request for client hints. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl_with)); |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| base::RunLoop().RunUntilIdle(); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // |gurl_with| tries to set client hints persist duration to 3600 seconds, but |
| // a maximum value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| |
| // Block the cookies: Client hints should be attached. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope(gurl_without, GURL(), |
| ContentSettingsType::COOKIES, |
| CONTENT_SETTING_BLOCK); |
| |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| |
| // Clear settings. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->ClearSettingsForOneType(ContentSettingsType::COOKIES); |
| } |
| |
| // Ensure that when the JavaScript is blocked, client hint preferences are not |
| // persisted. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| ClientHintsLifetimeNotPersistedJavaScriptBlocked) { |
| ContentSettingsForOneType host_settings; |
| |
| // Start a navigation. This navigation makes it possible to block JavaScript |
| // later. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| const GURL gurl = |
| GetParam() ? http_equiv_accept_ch_without_lifetime_with_iframe_url() |
| : accept_ch_with_lifetime_url(); |
| |
| // Block the JavaScript: Client hint preferences should not be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope( |
| gurl, GURL(), ContentSettingsType::JAVASCRIPT, CONTENT_SETTING_BLOCK); |
| ASSERT_TRUE( |
| ui_test_utils::NavigateToURL(browser(), accept_ch_with_lifetime_url())); |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| VerifyContentSettingsNotNotified(); |
| |
| // Allow the JavaScript: Client hint preferences should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope( |
| gurl, GURL(), ContentSettingsType::JAVASCRIPT, CONTENT_SETTING_ALLOW); |
| ASSERT_TRUE( |
| ui_test_utils::NavigateToURL(browser(), accept_ch_with_lifetime_url())); |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| |
| // Clear settings. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->ClearSettingsForOneType(ContentSettingsType::JAVASCRIPT); |
| } |
| |
| // Ensure that when the JavaScript is blocked, persisted client hints are not |
| // attached to the request headers. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsLifetimeNotAttachedJavaScriptBlocked) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Fetching accept_ch_with_lifetime_url() should persist the request for |
| // client hints. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| EXPECT_EQ(1u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(1u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(1u, count_ua_platform_client_hints_headers_seen()); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // accept_ch_with_lifetime_url() tries to set client hints persist duration to |
| // 3600 seconds, but a maximum value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| base::RunLoop().RunUntilIdle(); |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| |
| // Block JavaScript via WebPreferences: Client hints should not be attached. |
| SetJsEnabledForActiveView(false); |
| |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| EXPECT_EQ(0u, count_client_hints_headers_seen()); |
| VerifyContentSettingsNotNotified(); |
| EXPECT_EQ(1u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(1u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(1u, count_ua_platform_client_hints_headers_seen()); |
| |
| SetJsEnabledForActiveView(true); |
| |
| // Block JavaScript via ContentSetting: Client hints should not be attached. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope(without_accept_ch_without_lifetime_url(), |
| GURL(), ContentSettingsType::JAVASCRIPT, |
| CONTENT_SETTING_BLOCK); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| EXPECT_EQ(0u, count_client_hints_headers_seen()); |
| VerifyContentSettingsNotNotified(); |
| EXPECT_EQ(1u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(1u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(1u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Allow JavaScript: Client hints should now be attached. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope(without_accept_ch_without_lifetime_url(), |
| GURL(), ContentSettingsType::JAVASCRIPT, |
| CONTENT_SETTING_ALLOW); |
| |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| |
| // Clear settings. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->ClearSettingsForOneType(ContentSettingsType::JAVASCRIPT); |
| } |
| |
| // Test that if the content settings are malformed, then the browser does not |
| // crash. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| ClientHintsMalformedContentSettings) { |
| ContentSettingsForOneType client_hints_settings; |
| HostContentSettingsMap* host_content_settings_map = |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()); |
| |
| // Add setting for the host. |
| std::unique_ptr<base::ListValue> expiration_times_list = |
| std::make_unique<base::ListValue>(); |
| expiration_times_list->Append(42 /* client hint value */); |
| auto expiration_times_dictionary = std::make_unique<base::DictionaryValue>(); |
| expiration_times_dictionary->SetList("client_hints", |
| std::move(expiration_times_list)); |
| expiration_times_dictionary->SetDoubleKey( |
| "expiration_time", |
| (base::Time::Now() + base::TimeDelta::FromDays(1)).ToDoubleT()); |
| host_content_settings_map->SetWebsiteSettingDefaultScope( |
| without_accept_ch_without_lifetime_url(), GURL(), |
| ContentSettingsType::CLIENT_HINTS, |
| std::make_unique<base::Value>(expiration_times_dictionary->Clone())); |
| |
| // Reading the settings should now return one setting. |
| host_content_settings_map->GetSettingsForOneType( |
| ContentSettingsType::CLIENT_HINTS, &client_hints_settings); |
| EXPECT_EQ(1U, client_hints_settings.size()); |
| |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| } |
| |
| // Ensure that when the JavaScript is blocked, client hints requested using |
| // Accept-CH are not attached to the request headers for subresources. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| ClientHintsNoLifetimeScriptNotAllowed) { |
| const GURL gurl = GetParam() ? http_equiv_accept_ch_with_lifetime() |
| : accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Block the Javascript: Client hints should not be attached. |
| SetClientHintExpectationsOnSubresources(false); |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope( |
| accept_ch_without_lifetime_img_localhost(), GURL(), |
| ContentSettingsType::JAVASCRIPT, CONTENT_SETTING_BLOCK); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), accept_ch_without_lifetime_img_localhost())); |
| EXPECT_EQ(0u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(0u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(0u, count_ua_platform_client_hints_headers_seen()); |
| EXPECT_EQ(0u, count_client_hints_headers_seen()); |
| EXPECT_EQ(1u, third_party_request_count_seen()); |
| EXPECT_EQ(0u, third_party_client_hints_count_seen()); |
| |
| // Allow the Javascript: Client hints should now be attached. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope( |
| accept_ch_without_lifetime_img_localhost(), GURL(), |
| ContentSettingsType::JAVASCRIPT, CONTENT_SETTING_ALLOW); |
| |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), accept_ch_without_lifetime_img_localhost())); |
| |
| EXPECT_EQ(2u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(2u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(2u, count_ua_platform_client_hints_headers_seen()); |
| EXPECT_EQ(expected_client_hints_number, count_client_hints_headers_seen()); |
| EXPECT_EQ(2u, third_party_request_count_seen()); |
| EXPECT_EQ(3u, third_party_client_hints_count_seen()); |
| VerifyContentSettingsNotNotified(); |
| |
| // Clear settings. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->ClearSettingsForOneType(ContentSettingsType::JAVASCRIPT); |
| |
| // Block the Javascript again: Client hints should not be attached. |
| SetClientHintExpectationsOnSubresources(false); |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope( |
| accept_ch_without_lifetime_img_localhost(), GURL(), |
| ContentSettingsType::JAVASCRIPT, CONTENT_SETTING_BLOCK); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), accept_ch_without_lifetime_img_localhost())); |
| EXPECT_EQ(2u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(2u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(2u, count_ua_platform_client_hints_headers_seen()); |
| EXPECT_EQ(expected_client_hints_number, count_client_hints_headers_seen()); |
| EXPECT_EQ(3u, third_party_request_count_seen()); |
| EXPECT_EQ(3u, third_party_client_hints_count_seen()); |
| |
| // Clear settings. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->ClearSettingsForOneType(ContentSettingsType::JAVASCRIPT); |
| } |
| |
| // Ensure that when the cookies is blocked, client hints are attached to the |
| // request headers. |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, |
| ClientHintsLifetimeCookiesNotAllowed) { |
| const GURL gurl = GetParam() |
| ? http_equiv_accept_ch_without_lifetime_img_localhost() |
| : accept_ch_without_lifetime_img_localhost(); |
| |
| base::HistogramTester histogram_tester; |
| ContentSettingsForOneType host_settings; |
| scoped_refptr<content_settings::CookieSettings> cookie_settings_ = |
| CookieSettingsFactory::GetForProfile(browser()->profile()); |
| |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Block cookies. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->SetContentSettingDefaultScope( |
| gurl, GURL(), ContentSettingsType::COOKIES, CONTENT_SETTING_BLOCK); |
| base::RunLoop().RunUntilIdle(); |
| |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| EXPECT_EQ(2u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(2u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(2u, count_ua_platform_client_hints_headers_seen()); |
| EXPECT_EQ(expected_client_hints_number, count_client_hints_headers_seen()); |
| EXPECT_EQ(1u, third_party_request_count_seen()); |
| EXPECT_EQ(3u, third_party_client_hints_count_seen()); |
| |
| // Clear settings. |
| HostContentSettingsMapFactory::GetForProfile(browser()->profile()) |
| ->ClearSettingsForOneType(ContentSettingsType::COOKIES); |
| } |
| |
| // Verify that client hints are sent in the incognito profiles, and server |
| // client hint opt-ins are honored within the incognito profile. |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTest, |
| ClientHintsLifetimeFollowedByNoClientHintIncognito) { |
| const GURL gurl = accept_ch_with_lifetime_url(); |
| |
| base::HistogramTester histogram_tester; |
| Browser* incognito = CreateIncognitoBrowser(); |
| ContentSettingsForOneType host_settings; |
| |
| HostContentSettingsMapFactory::GetForProfile(incognito->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(0u, host_settings.size()); |
| |
| // Fetching |gurl| should persist the request for client hints. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(incognito, gurl)); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateEventCount", 1, 1); |
| |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| histogram_tester.ExpectUniqueSample("ClientHints.UpdateSize", |
| expected_client_hints_number, 1); |
| // accept_ch_with_lifetime_url() sets client hints persist duration to 3600 |
| // seconds, but a maximum value is registered instead. |
| histogram_tester.ExpectUniqueSample("ClientHints.PersistDuration", |
| uma_histogram_max_value, 1); |
| base::RunLoop().RunUntilIdle(); |
| |
| // Clients hints preferences for one origin should be persisted. |
| HostContentSettingsMapFactory::GetForProfile(incognito->profile()) |
| ->GetSettingsForOneType(ContentSettingsType::CLIENT_HINTS, |
| &host_settings); |
| EXPECT_EQ(1u, host_settings.size()); |
| |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| incognito, without_accept_ch_without_lifetime_url())); |
| |
| // The user agent hint is attached to all three requests: |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| |
| // Expected number of hints attached to the image request, and the same number |
| // to the main frame request. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| |
| // Navigate using regular profile. Client hints should not be send. |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), without_accept_ch_without_lifetime_url())); |
| |
| // The user agent hint is attached to the two new requests. |
| EXPECT_EQ(5u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(5u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(5u, count_ua_platform_client_hints_headers_seen()); |
| |
| // No additional hints are sent. |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| } |
| |
| class ClientHintsWebHoldbackBrowserTest : public ClientHintsBrowserTest { |
| public: |
| ClientHintsWebHoldbackBrowserTest() : ClientHintsBrowserTest() { |
| ConfigureHoldbackExperiment(); |
| } |
| |
| net::EffectiveConnectionType web_effective_connection_type_override() const { |
| return web_effective_connection_type_override_; |
| } |
| |
| std::unique_ptr<base::FeatureList> EnabledFeatures() override { |
| base::FieldTrialParamAssociator::GetInstance()->ClearAllParamsForTesting(); |
| const std::string kTrialName = "TrialFoo"; |
| const std::string kGroupName = "GroupFoo"; // Value not used |
| |
| scoped_refptr<base::FieldTrial> trial = |
| base::FieldTrialList::CreateFieldTrial(kTrialName, kGroupName); |
| |
| std::map<std::string, std::string> params; |
| |
| params["web_effective_connection_type_override"] = |
| net::GetNameForEffectiveConnectionType( |
| web_effective_connection_type_override_); |
| EXPECT_TRUE( |
| base::FieldTrialParamAssociator::GetInstance() |
| ->AssociateFieldTrialParams(kTrialName, kGroupName, params)); |
| |
| std::unique_ptr<base::FeatureList> feature_list(new base::FeatureList); |
| feature_list->InitializeFromCommandLine( |
| "UserAgentClientHint,PrefersColorSchemeClientHintHeader," |
| "ViewportHeightClientHintHeader", |
| ""); |
| feature_list->RegisterFieldTrialOverride( |
| features::kNetworkQualityEstimatorWebHoldback.name, |
| base::FeatureList::OVERRIDE_ENABLE_FEATURE, trial.get()); |
| return feature_list; |
| } |
| |
| private: |
| void ConfigureHoldbackExperiment() {} |
| |
| const net::EffectiveConnectionType web_effective_connection_type_override_ = |
| net::EFFECTIVE_CONNECTION_TYPE_3G; |
| }; |
| |
| // Make sure that when NetInfo holdback experiment is enabled, the NetInfo APIs |
| // and client hints return the overridden values. Verify that the client hints |
| // are overridden on both main frame and subresource requests. |
| IN_PROC_BROWSER_TEST_F(ClientHintsWebHoldbackBrowserTest, |
| EffectiveConnectionTypeChangeNotified) { |
| SetExpectedEffectiveConnectionType(web_effective_connection_type_override()); |
| |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(true); |
| |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_TRUE(embedded_test_server()->Start()); |
| ASSERT_TRUE( |
| ui_test_utils::NavigateToURL(browser(), accept_ch_with_lifetime_url())); |
| EXPECT_EQ(0u, count_client_hints_headers_seen()); |
| EXPECT_EQ(0u, third_party_request_count_seen()); |
| EXPECT_EQ(0u, third_party_client_hints_count_seen()); |
| |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(true); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), accept_ch_without_lifetime_with_subresource_url())); |
| base::RunLoop().RunUntilIdle(); |
| content::FetchHistogramsFromChildProcesses(); |
| metrics::SubprocessMetricsProvider::MergeHistogramDeltasForTesting(); |
| |
| EXPECT_EQ(3u, count_user_agent_hint_headers_seen()); |
| EXPECT_EQ(3u, count_ua_mobile_client_hints_headers_seen()); |
| EXPECT_EQ(3u, count_ua_platform_client_hints_headers_seen()); |
| EXPECT_EQ(expected_client_hints_number * 2, |
| count_client_hints_headers_seen()); |
| EXPECT_EQ(0u, third_party_request_count_seen()); |
| EXPECT_EQ(0u, third_party_client_hints_count_seen()); |
| } |
| |
| class AcceptCHFrameObserverInterceptor { |
| public: |
| AcceptCHFrameObserverInterceptor() |
| : interceptor_(base::BindRepeating( |
| &AcceptCHFrameObserverInterceptor::InterceptURLRequest, |
| base::Unretained(this))) {} |
| |
| void set_accept_ch_frame( |
| std::vector<network::mojom::WebClientHintsType> frame) { |
| accept_ch_frame_ = frame; |
| } |
| |
| private: |
| bool InterceptURLRequest(URLLoaderInterceptor::RequestParams* params) { |
| if (!accept_ch_frame_ || !params->url_request.trusted_params || |
| !params->url_request.trusted_params->accept_ch_frame_observer) { |
| return false; |
| } |
| |
| std::vector<network::mojom::WebClientHintsType> hints; |
| for (auto hint : accept_ch_frame_.value()) { |
| std::string header = network::GetClientHintToNameMap().at(hint); |
| if (!params->url_request.headers.HasHeader(header)) |
| hints.push_back(hint); |
| } |
| |
| if (hints.empty()) |
| return false; |
| |
| mojo::Remote<network::mojom::AcceptCHFrameObserver> remote(std::move( |
| params->url_request.trusted_params->accept_ch_frame_observer)); |
| remote->OnAcceptCHFrameReceived(params->url_request.url, hints, |
| base::DoNothing::Once<int>()); |
| // At this point it's expected that either the remote's callback will be |
| // called or the URLLoader will be destroyed to make way for a new one. |
| // As this is essentially unobservable, RunUntilIdle must be used. |
| base::RunLoop().RunUntilIdle(); |
| return false; |
| } |
| |
| URLLoaderInterceptor interceptor_; |
| absl::optional<std::vector<network::mojom::WebClientHintsType>> |
| accept_ch_frame_; |
| }; |
| |
| // Replace the request interceptor with an AcceptCHFrameObserverInterceptor. |
| class ClientHintsAcceptCHFrameObserverBrowserTest |
| : public ClientHintsBrowserTest { |
| public: |
| void SetUpOnMainThread() override { |
| host_resolver()->AddRule("*", "127.0.0.1"); |
| accept_ch_frame_observer_interceptor_ = |
| std::make_unique<AcceptCHFrameObserverInterceptor>(); |
| } |
| |
| void TearDownOnMainThread() override { |
| accept_ch_frame_observer_interceptor_.reset(); |
| } |
| |
| void set_accept_ch_frame( |
| std::vector<network::mojom::WebClientHintsType> frame) { |
| accept_ch_frame_observer_interceptor_->set_accept_ch_frame(frame); |
| } |
| |
| std::vector<network::mojom::WebClientHintsType> all_client_hints_types() { |
| std::vector<network::mojom::WebClientHintsType> hints; |
| for (const auto& elem : network::GetClientHintToNameMap()) { |
| const auto& type = elem.first; |
| hints.push_back(type); |
| } |
| return hints; |
| } |
| |
| private: |
| std::unique_ptr<AcceptCHFrameObserverInterceptor> |
| accept_ch_frame_observer_interceptor_; |
| }; |
| |
| #if defined(OS_CHROMEOS) |
| // Flaky: https://crbug.com/1195790 |
| #define MAYBE_AcceptCHFrame DISABLED_AcceptCHFrame |
| #else |
| #define MAYBE_AcceptCHFrame AcceptCHFrame |
| #endif |
| |
| // Ensure that client hints are sent when the ACCEPT_CH frame observer is |
| // notified. |
| IN_PROC_BROWSER_TEST_F(ClientHintsAcceptCHFrameObserverBrowserTest, |
| MAYBE_AcceptCHFrame) { |
| const GURL gurl = without_accept_ch_without_lifetime_url(); |
| set_accept_ch_frame(all_client_hints_types()); |
| SetClientHintExpectationsOnMainFrame(true); |
| SetClientHintExpectationsOnSubresources(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| } |
| |
| // Ensure that client hints are *not* sent when the observer is notified but |
| // client hints would normally not be sent (e.g. when JS is disabled for the |
| // frame). |
| IN_PROC_BROWSER_TEST_F(ClientHintsAcceptCHFrameObserverBrowserTest, |
| AcceptCHFrameJSDisabled) { |
| const GURL gurl = without_accept_ch_without_lifetime_url(); |
| set_accept_ch_frame(all_client_hints_types()); |
| SetJsEnabledForActiveView(false); |
| SetClientHintExpectationsOnMainFrame(false); |
| SetClientHintExpectationsOnSubresources(false); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| } |
| |
| IN_PROC_BROWSER_TEST_P(ClientHintsBrowserTest, UseCounter) { |
| auto web_feature_waiter = |
| std::make_unique<page_load_metrics::PageLoadMetricsTestWaiter>( |
| chrome_test_utils::GetActiveWebContents(this)); |
| |
| web_feature_waiter->AddWebFeatureExpectation( |
| blink::mojom::WebFeature::kClientHintsUAFullVersion); |
| const GURL gurl = GetParam() ? http_equiv_accept_ch_with_lifetime() |
| : accept_ch_with_lifetime_url(); |
| |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), gurl)); |
| |
| web_feature_waiter->Wait(); |
| } |
| |
| class CriticalClientHintsBrowserTest : public InProcessBrowserTest { |
| public: |
| CriticalClientHintsBrowserTest() |
| : https_server_(net::EmbeddedTestServer::TYPE_HTTPS) { |
| https_server_.ServeFilesFromSourceDirectory( |
| "chrome/test/data/client_hints"); |
| https_server_.RegisterRequestMonitor(base::BindRepeating( |
| &CriticalClientHintsBrowserTest::MonitorResourceRequest, |
| base::Unretained(this))); |
| EXPECT_TRUE(https_server_.Start()); |
| } |
| |
| void SetUp() override { |
| std::unique_ptr<base::FeatureList> feature_list = |
| std::make_unique<base::FeatureList>(); |
| // Don't include PrefersColorSchemeClientHintHeader in the enabled |
| // features; we will verify that PrefersColorScheme is not included. |
| feature_list->InitializeFromCommandLine( |
| "UserAgentClientHint,CriticalClientHint,AcceptCHFrame", ""); |
| scoped_feature_list_.InitWithFeatureList(std::move(feature_list)); |
| |
| InProcessBrowserTest::SetUp(); |
| } |
| |
| void SetUpOnMainThread() override { |
| host_resolver()->AddRule("*", "127.0.0.1"); |
| |
| InProcessBrowserTest::SetUpOnMainThread(); |
| } |
| |
| GURL critical_ch_ua_full_version_url() const { |
| return https_server_.GetURL("/critical_ch_ua_full_version.html"); |
| } |
| |
| GURL critical_ch_prefers_color_scheme_url() const { |
| return https_server_.GetURL("/critical_ch_prefers-color-scheme.html"); |
| } |
| |
| const absl::optional<std::string>& observed_ch_ua_full_version() { |
| base::AutoLock lock(ch_ua_full_version_lock_); |
| return ch_ua_full_version_; |
| } |
| |
| const absl::optional<std::string>& observed_ch_prefers_color_scheme() { |
| base::AutoLock lock(ch_prefers_color_scheme_lock_); |
| return ch_prefers_color_scheme_; |
| } |
| |
| void MonitorResourceRequest(const net::test_server::HttpRequest& request) { |
| if (request.headers.find("sec-ch-ua-full-version") != |
| request.headers.end()) { |
| SetChUaFullVersion(request.headers.at("sec-ch-ua-full-version")); |
| } |
| if (request.headers.find("prefers-color-scheme") != request.headers.end()) { |
| SetChPrefersColorScheme(request.headers.at("prefers-color-scheme")); |
| } |
| } |
| |
| private: |
| void SetChUaFullVersion(const std::string& ch_ua_full_version) { |
| base::AutoLock lock(ch_ua_full_version_lock_); |
| ch_ua_full_version_ = ch_ua_full_version; |
| } |
| |
| void SetChPrefersColorScheme(const std::string& ch_prefers_color_scheme) { |
| base::AutoLock lock(ch_prefers_color_scheme_lock_); |
| ch_prefers_color_scheme_ = ch_prefers_color_scheme; |
| } |
| |
| base::test::ScopedFeatureList scoped_feature_list_; |
| net::EmbeddedTestServer https_server_; |
| base::Lock ch_ua_full_version_lock_; |
| absl::optional<std::string> ch_ua_full_version_ |
| GUARDED_BY(ch_ua_full_version_lock_); |
| base::Lock ch_prefers_color_scheme_lock_; |
| absl::optional<std::string> ch_prefers_color_scheme_ |
| GUARDED_BY(ch_prefers_color_scheme_lock_); |
| }; |
| |
| // Verify that setting Critical-CH in the response header causes the request to |
| // be resent with the client hint included. |
| IN_PROC_BROWSER_TEST_F(CriticalClientHintsBrowserTest, |
| CriticalClientHintInRequestHeader) { |
| blink::UserAgentMetadata ua = embedder_support::GetUserAgentMetadata(); |
| // On the first navigation request, the client hints in the Critical-CH |
| // should be set on the request header. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), |
| critical_ch_ua_full_version_url())); |
| const std::string expected_ch_ua_full_version = "\"" + ua.full_version + "\""; |
| EXPECT_THAT(observed_ch_ua_full_version(), |
| Optional(Eq(expected_ch_ua_full_version))); |
| EXPECT_EQ(observed_ch_prefers_color_scheme(), absl::nullopt); |
| } |
| |
| // Verify that setting Critical-CH in the response header with a client hint |
| // that is filtered out of Accept-CH causes the request to *not* be resent and |
| // the critical client hint is not included. |
| IN_PROC_BROWSER_TEST_F( |
| CriticalClientHintsBrowserTest, |
| CriticalClientHintFilteredOutOfAcceptChNotInRequestHeader) { |
| // On the first navigation request, the client hints in the Critical-CH |
| // should be set on the request header, but in this case, the |
| // kPrefersColorSchemeClientHintHeader is not enabled, so the critical client |
| // hint won't be set in the request header. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL( |
| browser(), critical_ch_prefers_color_scheme_url())); |
| EXPECT_EQ(observed_ch_prefers_color_scheme(), absl::nullopt); |
| // The request should not have been resent, so ch-ua-full-version should also |
| // not be present. |
| EXPECT_EQ(observed_ch_ua_full_version(), absl::nullopt); |
| } |
| |
| class ClientHintsBrowserTestWithEmulatedMedia |
| : public DevToolsProtocolTestBase { |
| public: |
| ClientHintsBrowserTestWithEmulatedMedia() |
| : https_server_(net::EmbeddedTestServer::TYPE_HTTPS) { |
| scoped_feature_list_.InitFromCommandLine( |
| "UserAgentClientHint,AcceptCHFrame,PrefersColorSchemeClientHintHeader", |
| ""); |
| |
| https_server_.ServeFilesFromSourceDirectory( |
| "chrome/test/data/client_hints"); |
| https_server_.RegisterRequestMonitor(base::BindRepeating( |
| &ClientHintsBrowserTestWithEmulatedMedia::MonitorResourceRequest, |
| base::Unretained(this))); |
| EXPECT_TRUE(https_server_.Start()); |
| |
| test_url_ = https_server_.GetURL("/accept_ch_without_lifetime.html"); |
| } |
| |
| ~ClientHintsBrowserTestWithEmulatedMedia() override = default; |
| |
| void MonitorResourceRequest(const net::test_server::HttpRequest& request) { |
| if (request.headers.find("sec-ch-prefers-color-scheme") != |
| request.headers.end()) { |
| prefers_color_scheme_observed_ = |
| request.headers.at("sec-ch-prefers-color-scheme"); |
| } |
| } |
| |
| const GURL& test_url() const { return test_url_; } |
| |
| const std::string& prefers_color_scheme_observed() const { |
| return prefers_color_scheme_observed_; |
| } |
| |
| void EmulatePrefersColorScheme(std::string value) { |
| base::Value feature(base::Value::Type::DICTIONARY); |
| feature.SetKey("name", base::Value("prefers-color-scheme")); |
| feature.SetKey("value", base::Value(value)); |
| base::Value features(base::Value::Type::LIST); |
| features.Append(std::move(feature)); |
| base::Value params(base::Value::Type::DICTIONARY); |
| params.SetKey("features", std::move(features)); |
| SendCommandSync("Emulation.setEmulatedMedia", std::move(params)); |
| } |
| |
| private: |
| base::test::ScopedFeatureList scoped_feature_list_; |
| net::EmbeddedTestServer https_server_; |
| GURL test_url_; |
| std::string prefers_color_scheme_observed_; |
| |
| DISALLOW_COPY_AND_ASSIGN(ClientHintsBrowserTestWithEmulatedMedia); |
| }; |
| |
| IN_PROC_BROWSER_TEST_F(ClientHintsBrowserTestWithEmulatedMedia, |
| PrefersColorScheme) { |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), test_url())); |
| EXPECT_EQ(prefers_color_scheme_observed(), ""); |
| Attach(); |
| |
| EmulatePrefersColorScheme("light"); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), test_url())); |
| EXPECT_EQ(prefers_color_scheme_observed(), "light"); |
| |
| EmulatePrefersColorScheme("dark"); |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), test_url())); |
| EXPECT_EQ(prefers_color_scheme_observed(), "dark"); |
| } |
| |
| // Base class for the User-Agent reduction Origin Trial browser tests. Common |
| // functionality shared between the various UA reduction browser tests should |
| // go in this class. |
| class UaReducedOriginTrialBrowserTest : public InProcessBrowserTest { |
| public: |
| void SetUpCommandLine(base::CommandLine* command_line) override { |
| // The public key for the default privatey key used by the |
| // tools/origin_trials/generate_token.py tool. |
| static constexpr char kOriginTrialTestPublicKey[] = |
| "dRCs+TocuKkocNKa0AtZ4awrt9XKH2SQCI6o4FY6BNA="; |
| command_line->AppendSwitchASCII(embedder_support::kOriginTrialPublicKey, |
| kOriginTrialTestPublicKey); |
| } |
| |
| void SetUp() override { |
| std::unique_ptr<base::FeatureList> feature_list = |
| std::make_unique<base::FeatureList>(); |
| feature_list->InitializeFromCommandLine("CriticalClientHint", ""); |
| scoped_feature_list_.InitWithFeatureList(std::move(feature_list)); |
| |
| InProcessBrowserTest::SetUp(); |
| } |
| |
| void SetUserAgentOverride(const std::string& ua_override) { |
| content::WebContents* web_contents = |
| browser()->tab_strip_model()->GetActiveWebContents(); |
| web_contents->SetUserAgentOverride( |
| blink::UserAgentOverride::UserAgentOnly(ua_override), false); |
| web_contents->GetController() |
| .GetLastCommittedEntry() |
| ->SetIsOverridingUserAgent(true); |
| } |
| |
| void CheckUaReducedClientHint(const bool ch_ua_reduced_expected) { |
| const absl::optional<std::string>& ua_reduced_client_hint = |
| GetLastUaReducedClientHintValue(); |
| |
| if (ch_ua_reduced_expected) { |
| EXPECT_THAT(ua_reduced_client_hint, Optional(Eq("?1"))); |
| } else { |
| EXPECT_THAT(ua_reduced_client_hint, Eq(absl::nullopt)); |
| } |
| } |
| |
| void CheckUserAgentString(const std::string& expected_ua_header_value) { |
| EXPECT_THAT(GetLastUserAgentHeaderValue(), |
| Optional(expected_ua_header_value)); |
| } |
| |
| void CheckUserAgentReduced(const std::string& user_agent_value, |
| const bool expected_user_agent_reduced) { |
| // A regular expression that matches Chrome/{major_version}.{minor_version} |
| // in the User-Agent string, where the {minor_version} is captured. |
| static constexpr char kChromeVersionRegex[] = |
| "Chrome/[0-9]+\\.([0-9]+\\.[0-9]+\\.[0-9]+)"; |
| // The minor version in the reduced UA string is always "0.0.0". |
| static constexpr char kReducedMinorVersion[] = "0.0.0"; |
| |
| std::string minor_version; |
| EXPECT_TRUE(re2::RE2::PartialMatch(user_agent_value, kChromeVersionRegex, |
| &minor_version)); |
| if (expected_user_agent_reduced) { |
| EXPECT_EQ(minor_version, kReducedMinorVersion); |
| } else { |
| EXPECT_NE(minor_version, kReducedMinorVersion); |
| } |
| } |
| |
| void CheckUserAgentReduced(const bool expected_user_agent_reduced) { |
| const absl::optional<std::string>& user_agent_header_value = |
| GetLastUserAgentHeaderValue(); |
| EXPECT_TRUE(user_agent_header_value.has_value()); |
| CheckUserAgentReduced(*user_agent_header_value, |
| expected_user_agent_reduced); |
| } |
| |
| void NavigateAndCheckHeaders(const GURL& url, |
| const bool ch_ua_reduced_expected) { |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), url)); |
| |
| CheckUaReducedClientHint(ch_ua_reduced_expected); |
| CheckUserAgentReduced(ch_ua_reduced_expected); |
| } |
| |
| protected: |
| // Returns the value of the User-Agent request header from the last sent |
| // request, or nullopt if the header could not be read. |
| virtual const absl::optional<std::string>& GetLastUserAgentHeaderValue() = 0; |
| // Returns the value of the Sec-CH-UA-Reduced request header from the last |
| // sent request, or nullopt if the header could not be read. |
| virtual const absl::optional<std::string>& |
| GetLastUaReducedClientHintValue() = 0; |
| |
| private: |
| base::test::ScopedFeatureList scoped_feature_list_; |
| }; |
| |
| // Tests that the Sec-CH-UA-Reduced client hint is sent if and only if the |
| // UserAgentReduction Origin Trial token is present and valid in the response |
| // headers. |
| // |
| // The test Origin Trial token found in the test files was generated by running |
| // (in tools/origin_trials): |
| // generate_token.py https://127.0.0.1:44444 UserAgentReduction |
| // --expire-timestamp=2000000000 |
| // |
| // The Origin Trial token expires in 2033. Generate a new token by then, or |
| // find a better way to re-generate a test trial token. |
| class SameOriginUaReducedOriginTrialBrowserTest |
| : public UaReducedOriginTrialBrowserTest { |
| public: |
| SameOriginUaReducedOriginTrialBrowserTest() = default; |
| |
| // The URL that was used to register the Origin Trial token. |
| static constexpr const char kOriginUrl[] = "https://127.0.0.1:44444"; |
| |
| void SetUpOnMainThread() override { |
| // We use a URLLoaderInterceptor, rather than the EmbeddedTestServer, since |
| // the origin trial token in the response is associated with a fixed |
| // origin, whereas EmbeddedTestServer serves content on a random port. |
| url_loader_interceptor_ = |
| URLLoaderInterceptor::ServeFilesFromDirectoryAtOrigin( |
| "chrome/test/data/client_hints", GURL(kOriginUrl)); |
| |
| InProcessBrowserTest::SetUpOnMainThread(); |
| } |
| |
| void TearDownOnMainThread() override { |
| url_loader_interceptor_.reset(); |
| InProcessBrowserTest::TearDownOnMainThread(); |
| } |
| |
| const absl::optional<std::string>& GetLastUserAgentHeaderValue() override { |
| std::string user_agent; |
| CHECK(url_loader_interceptor_->GetLastRequestHeaders().GetHeader( |
| "user-agent", &user_agent)); |
| last_user_agent_ = user_agent; |
| return last_user_agent_; |
| } |
| |
| const absl::optional<std::string>& GetLastUaReducedClientHintValue() |
| override { |
| std::string ch_ua_reduced_header_value; |
| if (url_loader_interceptor_->GetLastRequestHeaders().GetHeader( |
| "sec-ch-ua-reduced", &ch_ua_reduced_header_value)) { |
| last_ua_reduced_ch_ = ch_ua_reduced_header_value; |
| } else { |
| last_ua_reduced_ch_ = absl::nullopt; |
| } |
| return last_ua_reduced_ch_; |
| } |
| |
| GURL ua_reduced_with_valid_origin_trial_token_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/accept_ch_ua_reduced_with_valid_origin_trial.html"})); |
| } |
| |
| GURL ua_reduced_with_invalid_origin_trial_token_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/accept_ch_ua_reduced_with_invalid_origin_trial.html"})); |
| } |
| |
| GURL ua_reduced_with_no_origin_trial_token_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/accept_ch_ua_reduced_with_no_origin_trial.html"})); |
| } |
| |
| GURL ua_reduced_missing_with_valid_origin_trial_token_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/accept_ch_ua_reduced_missing_valid_origin_trial.html"})); |
| } |
| |
| GURL critical_ch_ua_reduced_with_valid_origin_trial_token_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/critical_ch_ua_reduced_with_valid_origin_trial.html"})); |
| } |
| |
| GURL critical_ch_ua_reduced_with_invalid_origin_trial_token_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, |
| "/critical_ch_ua_reduced_with_invalid_origin_trial.html"})); |
| } |
| |
| GURL accept_ch_ua_reduced_subresource_request_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/accept_ch_ua_reduced_subresource_request.html"})); |
| } |
| |
| GURL accept_ch_ua_reduced_iframe_request_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/accept_ch_ua_reduced_iframe_request.html"})); |
| } |
| |
| GURL critical_ch_ua_reduced_subresource_request_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/critical_ch_ua_reduced_subresource_request.html"})); |
| } |
| |
| GURL critical_ch_ua_reduced_iframe_request_url() const { |
| return GURL(base::StrCat( |
| {kOriginUrl, "/critical_ch_ua_reduced_iframe_request.html"})); |
| } |
| |
| GURL simple_request_url() const { |
| return GURL(base::StrCat({kOriginUrl, "/simple.html"})); |
| } |
| |
| GURL last_request_url() const { |
| return url_loader_interceptor_->GetLastRequestURL(); |
| } |
| |
| void NavigateTwiceAndCheckHeader(const GURL& url, |
| const bool ch_ua_reduced_expected, |
| const bool critical_ch_ua_reduced_expected) { |
| base::HistogramTester histograms; |
| int reduced_count = 0; |
| int full_count = 0; |
| |
| // If Critical-CH is set, we expect Sec-CH-UA-Reduced in the first |
| // navigation request header. If Critical-CH is not set, we don't expect |
| // Sec-CH-UA-Reduced in the first navigation request. |
| const bool first_navigation_reduced_ua = |
| critical_ch_ua_reduced_expected && ch_ua_reduced_expected; |
| NavigateAndCheckHeaders(url, first_navigation_reduced_ua); |
| if (first_navigation_reduced_ua) { |
| ++reduced_count; |
| if (critical_ch_ua_reduced_expected) { |
| // If Critical-CH was set, there will also be the initial navigation |
| // that does not send the reduced UA string. |
| ++full_count; |
| } |
| } else { |
| ++full_count; |
| } |
| // The UserAgentStringType enum is not accessible in //chrome/browser, so |
| // we just use the enum's integer value. |
| histograms.ExpectBucketCount("Navigation.UserAgentStringType", |
| /*NavigationRequest::kFullVersion*/ 0, |
| full_count); |
| histograms.ExpectBucketCount("Navigation.UserAgentStringType", |
| /*NavigationRequest::kReducedVersion*/ 1, |
| reduced_count); |
| |
| // Regardless of the Critical-CH setting, we expect the Sec-CH-UA-Reduced |
| // client hint sent on the second request, if Sec-CH-UA-Reduced is set and |
| // the Origin Trial token is valid. |
| NavigateAndCheckHeaders(url, ch_ua_reduced_expected); |
| if (ch_ua_reduced_expected) { |
| ++reduced_count; |
| } else { |
| ++full_count; |
| } |
| histograms.ExpectBucketCount("Navigation.UserAgentStringType", |
| /*NavigationRequest::kFullVersion*/ 0, |
| full_count); |
| histograms.ExpectBucketCount("Navigation.UserAgentStringType", |
| /*NavigationRequest::kReducedVersion*/ 1, |
| reduced_count); |
| } |
| |
| private: |
| std::unique_ptr<URLLoaderInterceptor> url_loader_interceptor_; |
| absl::optional<std::string> last_user_agent_; |
| absl::optional<std::string> last_ua_reduced_ch_; |
| }; |
| |
| constexpr const char SameOriginUaReducedOriginTrialBrowserTest::kOriginUrl[]; |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| AcceptChUaReducedWithValidOriginTrialToken) { |
| NavigateTwiceAndCheckHeader(ua_reduced_with_valid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/true, |
| /*critical_ch_ua_reduced_expected=*/false); |
| |
| // The Origin Trial token is valid, so we expect the reduced UA values in the |
| // Javascript getters as well. |
| content::WebContents* web_contents = |
| browser()->tab_strip_model()->GetActiveWebContents(); |
| CheckUserAgentReduced( |
| content::EvalJs(web_contents, "navigator.userAgent").ExtractString(), |
| /*expected_user_agent_reduced=*/true); |
| CheckUserAgentReduced( |
| content::EvalJs(web_contents, "navigator.appVersion").ExtractString(), |
| /*expected_user_agent_reduced=*/true); |
| // Instead of checking all platform types, just check one that has a |
| // difference between the full and reduced versions. |
| #if defined(OS_ANDROID) |
| EXPECT_EQ("Linux x86_64", |
| content::EvalJs(web_contents, "navigator.platform")); |
| #endif |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| AcceptChUaReducedWithInvalidOriginTrialToken) { |
| // The response contained Sec-CH-UA-Reduced in the Accept-CH header, but the |
| // origin trial token is invalid. |
| NavigateTwiceAndCheckHeader(ua_reduced_with_invalid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/false, |
| /*critical_ch_ua_reduced_expected=*/false); |
| |
| // The Origin Trial token is invalid, so we expect the full UA values in the |
| // Javascript getters. |
| content::WebContents* web_contents = |
| browser()->tab_strip_model()->GetActiveWebContents(); |
| CheckUserAgentReduced( |
| content::EvalJs(web_contents, "navigator.userAgent").ExtractString(), |
| /*expected_user_agent_reduced=*/false); |
| CheckUserAgentReduced( |
| content::EvalJs(web_contents, "navigator.appVersion").ExtractString(), |
| /*expected_user_agent_reduced=*/false); |
| // Instead of checking all platform types, just check one that has a |
| // difference between the full and reduced versions. |
| #if defined(OS_ANDROID) |
| EXPECT_NE("Linux x86_64", |
| content::EvalJs(web_contents, "navigator.platform")); |
| #endif |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| AcceptChUaReducedWithNoOriginTrialToken) { |
| // The response contained Sec-CH-UA-Reduced in the Accept-CH header, but the |
| // origin trial token is not present. |
| NavigateTwiceAndCheckHeader(ua_reduced_with_no_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/false, |
| /*critical_ch_ua_reduced_expected=*/false); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| NoAcceptChUaReducedWithValidOriginTrialToken) { |
| // The response contained a valid Origin Trial token, but no Sec-CH-UA-Reduced |
| // in the Accept-CH header. |
| NavigateTwiceAndCheckHeader( |
| ua_reduced_missing_with_valid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/false, |
| /*critical_ch_ua_reduced_expected=*/false); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| CriticalChUaReducedWithValidOriginTrialToken) { |
| // The initial navigation also contains the Critical-CH header, so the |
| // Sec-CH-UA-Reduced header should be set after the first navigation. |
| NavigateTwiceAndCheckHeader( |
| critical_ch_ua_reduced_with_valid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/true, |
| /*critical_ch_ua_reduced_expected=*/true); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| CriticalChUaReducedWithInvalidOriginTrialToken) { |
| // The Origin Trial token is invalid, so the Critical-CH should not have |
| // resulted in the Sec-CH-UA-Reduced header being sent. |
| NavigateTwiceAndCheckHeader( |
| critical_ch_ua_reduced_with_invalid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/false, |
| /*critical_ch_ua_reduced_expected=*/false); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| IframeRequestUaReducedWithValidOriginTrialToken) { |
| // The last resource request processed for this navigation will be an embedded |
| // iframe request. Since Accept-CH has Sec-CH-UA-Reduced set on the top-level |
| // level frame's response header, along with a valid origin trial token, the |
| // iframe request should send Sec-CH-UA-Reduced and the reduced UA string in |
| // the request header. |
| NavigateAndCheckHeaders(accept_ch_ua_reduced_iframe_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(last_request_url().path(), "/simple.html"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F( |
| SameOriginUaReducedOriginTrialBrowserTest, |
| IframeRequestUaReducedWithValidOriginTrialTokenAndCriticalCH) { |
| // The last resource request processed for this navigation will be an embedded |
| // iframe request. Since Accept-CH has Sec-CH-UA-Reduced set on the top-level |
| // level frame's response header, along with a valid origin trial token, the |
| // iframe request should send Sec-CH-UA-Reduced and the reduced UA string in |
| // the request header. |
| NavigateAndCheckHeaders(critical_ch_ua_reduced_iframe_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(last_request_url().path(), "/simple.html"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| SubresourceRequestUaReducedWithValidOriginTrialToken) { |
| // The last resource request processed for this navigation will be a |
| // subresource request for the stylesheet. Since Accept-CH has |
| // Sec-CH-UA-Reduced set on the top-level level frame's response header, along |
| // with a valid origin trial token, the subresource request should send |
| // Sec-CH-UA-Reduced and the reduced UA string in the request header. |
| NavigateAndCheckHeaders(accept_ch_ua_reduced_subresource_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| // Make sure the last intercepted URL was the subresource request for the |
| // embedded stylesheet. |
| EXPECT_EQ(last_request_url().path(), "/style.css"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F( |
| SameOriginUaReducedOriginTrialBrowserTest, |
| SubresourceRequestUaReducedWithValidOriginTrialTokenAndCriticalCH) { |
| // The last resource request processed for this navigation will be a |
| // subresource request for the stylesheet. Since Accept-CH has |
| // Sec-CH-UA-Reduced set on the top-level level frame's response header, along |
| // with a valid origin trial token, the subresource request should send |
| // Sec-CH-UA-Reduced and the reduced UA string in the request header. |
| NavigateAndCheckHeaders(critical_ch_ua_reduced_subresource_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| // Make sure the last intercepted URL was the subresource request for the |
| // embedded stylesheet. |
| EXPECT_EQ(last_request_url().path(), "/style.css"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| UserAgentOverrideAcceptChUaReduced) { |
| base::HistogramTester histograms; |
| const std::string user_agent_override = "foo"; |
| SetUserAgentOverride(user_agent_override); |
| |
| const GURL url = ua_reduced_with_valid_origin_trial_token_url(); |
| // First navigation to set the client hints in the response. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), url)); |
| // Second navigation has the Sec-CH-UA-Reduced client hint stored from the |
| // first navigation's response. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), url)); |
| |
| // Since the UA override was set, the UA client hints are *not* added to the |
| // request. |
| CheckUaReducedClientHint(/*ch_ua_reduced_expected=*/false); |
| // Make sure the overridden UA string is the one sent. |
| CheckUserAgentString(user_agent_override); |
| |
| // The UserAgentStringType enum is not accessible in //chrome/browser, so |
| // we just use the enum's integer value. |
| histograms.ExpectBucketCount("Navigation.UserAgentStringType", |
| /*NavigationRequest::kOverridden*/ 2, 2); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| UserAgentOverrideSubresourceRequest) { |
| const std::string user_agent_override = "foo"; |
| SetUserAgentOverride(user_agent_override); |
| |
| const GURL url = accept_ch_ua_reduced_subresource_request_url(); |
| // First navigation to set the client hints in the response. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), url)); |
| // Second navigation has the Sec-CH-UA-Reduced client hint stored from the |
| // first navigation's response. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), url)); |
| |
| // Since the UA override was set, the UA client hints are *not* added to the |
| // request. |
| CheckUaReducedClientHint(/*ch_ua_reduced_expected=*/false); |
| // Make sure the overridden UA string is the one sent. |
| CheckUserAgentString(user_agent_override); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| UserAgentOverrideIframeRequest) { |
| const std::string user_agent_override = "foo"; |
| SetUserAgentOverride(user_agent_override); |
| |
| const GURL url = accept_ch_ua_reduced_iframe_request_url(); |
| // First navigation to set the client hints in the response. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), url)); |
| // Second navigation has the Sec-CH-UA-Reduced client hint stored from the |
| // first navigation's response. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), url)); |
| |
| // Since the UA override was set, the UA client hints are *not* added to the |
| // request. |
| CheckUaReducedClientHint(/*ch_ua_reduced_expected=*/false); |
| // Make sure the overridden UA string is the one sent. |
| CheckUserAgentString(user_agent_override); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SameOriginUaReducedOriginTrialBrowserTest, |
| NoAcceptCHRemovesSecChUaReducedFromStorage) { |
| // The first navigation sets Sec-CH-UA-Reduced in the client hints storage for |
| // the origin. |
| NavigateAndCheckHeaders(ua_reduced_with_valid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/false); |
| // The second navigation doesn't contain an Accept-CH header in the response, |
| // so Sec-CH-UA-Reduced is removed from the storage. |
| NavigateAndCheckHeaders(simple_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| // The third navigation doesn't contain a Sec-CH-UA-Reduced in the request |
| // header because the second navigation caused it to get removed. |
| NavigateAndCheckHeaders(ua_reduced_with_valid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/false); |
| } |
| |
| IN_PROC_BROWSER_TEST_F( |
| SameOriginUaReducedOriginTrialBrowserTest, |
| MissingAcceptCHInIframeResponseHeaderDoesNotRemoveChUaReduced) { |
| // The first navigation sets Sec-CH-UA-Reduced in the client hints storage for |
| // the origin. The iframe subresource request does not contain Accept-CH in |
| // the response, but because it's not a top-level navigation, it should not |
| // remove Sec-CH-UA-Reduced from the Accept-CH cache. |
| NavigateAndCheckHeaders(accept_ch_ua_reduced_iframe_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| // The second navigation still finds Sec-CH-UA-Reduced in the Accept-CH cache. |
| NavigateAndCheckHeaders(ua_reduced_with_valid_origin_trial_token_url(), |
| /*ch_ua_reduced_expected=*/true); |
| } |
| |
| // Tests that the Sec-CH-UA-Reduced client hint and the reduced User-Agent |
| // string are sent on request headers for third-party embedded resources if the |
| // Origin Trial token from the top-level frame is valid and the permissions |
| // policy allows it. |
| class ThirdPartyUaReducedOriginTrialBrowserTest |
| : public UaReducedOriginTrialBrowserTest { |
| public: |
| ThirdPartyUaReducedOriginTrialBrowserTest() |
| : https_server_(net::EmbeddedTestServer::TYPE_HTTPS) { |
| https_server_.ServeFilesFromSourceDirectory( |
| "chrome/test/data/client_hints"); |
| https_server_.RegisterRequestMonitor(base::BindRepeating( |
| &ThirdPartyUaReducedOriginTrialBrowserTest::MonitorResourceRequest, |
| base::Unretained(this))); |
| EXPECT_TRUE(https_server_.Start()); |
| } |
| |
| // The URL that was used to register the Origin Trial token. |
| static constexpr char kFirstPartyOriginUrl[] = "https://my-site.com:44444"; |
| |
| void SetUpOnMainThread() override { |
| InProcessBrowserTest::SetUpOnMainThread(); |
| |
| // We use a URLLoaderInterceptor, rather than the EmbeddedTestServer, since |
| // the origin trial token in the response is associated with a fixed |
| // origin, whereas EmbeddedTestServer serves content on a random port. |
| url_loader_interceptor_ = |
| std::make_unique<URLLoaderInterceptor>(base::BindRepeating( |
| &ThirdPartyUaReducedOriginTrialBrowserTest::InterceptRequest, |
| base::Unretained(this))); |
| } |
| |
| void TearDownOnMainThread() override { |
| url_loader_interceptor_.reset(); |
| InProcessBrowserTest::TearDownOnMainThread(); |
| } |
| |
| GURL accept_ch_ua_reduced_cross_origin_iframe_request_url() const { |
| return GURL(base::StrCat( |
| {kFirstPartyOriginUrl, |
| "/accept_ch_ua_reduced_cross_origin_iframe_request.html"})); |
| } |
| |
| GURL accept_ch_ua_reduced_cross_origin_subresource_request_url() const { |
| return GURL(base::StrCat( |
| {kFirstPartyOriginUrl, |
| "/accept_ch_ua_reduced_cross_origin_subresource_request.html"})); |
| } |
| |
| protected: |
| const absl::optional<std::string>& GetLastUserAgentHeaderValue() override { |
| base::AutoLock lock(last_request_lock_); |
| return last_user_agent_; |
| } |
| |
| const absl::optional<std::string>& GetLastUaReducedClientHintValue() |
| override { |
| base::AutoLock lock(last_request_lock_); |
| return last_sec_ch_ua_reduced_; |
| } |
| |
| const absl::optional<GURL>& GetLastRequestedURL() { |
| base::AutoLock lock(last_request_lock_); |
| return last_requested_url_; |
| } |
| |
| void SetUaReducedPermissionsPolicy(const std::string& value) { |
| ua_reduced_permissions_policy_header_value_ = value; |
| } |
| |
| void SetValidOTToken(const bool valid_ot_token) { |
| valid_ot_token_ = valid_ot_token; |
| } |
| |
| GURL GetServerOrigin() const { return https_server_.GetOrigin().GetURL(); } |
| |
| private: |
| // URLLoaderInterceptor callback |
| bool InterceptRequest(URLLoaderInterceptor::RequestParams* params) { |
| if (params->url_request.url.GetOrigin() != GURL(kFirstPartyOriginUrl)) { |
| return false; |
| } |
| if (params->url_request.url.path() != |
| "/accept_ch_ua_reduced_cross_origin_iframe_request.html" && |
| params->url_request.url.path() != |
| "/accept_ch_ua_reduced_cross_origin_subresource_request.html") { |
| return false; |
| } |
| |
| // Generated by running (in tools/origin_trials): |
| // generate_token.py https://my-site.com:44444 UserAgentReduction |
| // --expire-timestamp=2000000000 |
| // |
| // The Origin Trial token expires in 2033. Generate a new token by then, or |
| // find a better way to re-generate a test trial token. |
| static constexpr const char kOriginTrialToken[] = |
| "AziP2Iyo74PHkJAVVXJ1NBAyZd+" |
| "GZFmTqpFtug4Wazsj5rQPFeCFjjZpiEYb086vZzi48lF1ydynMj/" |
| "oLqqLXgEAAABeeyJvcmlnaW4iOiAiaHR0cHM6Ly9teS1zaXRlLmNvbTo0NDQ0NCIsICJmZ" |
| "WF0dXJlIjogIlVzZXJBZ2VudFJlZHVjdGlvbiIsICJleHBpcnkiOiAyMDAwMDAwMDAwfQ=" |
| "="; |
| |
| // Construct and send the response. |
| std::string headers = |
| "HTTP/1.1 200 OK\nContent-Type: text/html; charset=utf-8\n"; |
| base::StrAppend(&headers, {"Accept-CH: Sec-CH-UA-Reduced\n"}); |
| base::StrAppend(&headers, |
| {"Permissions-Policy: ch-ua-reduced=", |
| ua_reduced_permissions_policy_header_value_, "\n"}); |
| base::StrAppend(&headers, {"Origin-Trial: ", |
| valid_ot_token_ ? kOriginTrialToken |
| : "invalid-origin-trial-token", |
| "\n\n"}); |
| std::string body = "<html><head>"; |
| if (params->url_request.url.path() == |
| "/accept_ch_ua_reduced_cross_origin_subresource_request.html") { |
| base::StrAppend(&body, {BuildSubresourceHTML()}); |
| } |
| base::StrAppend(&body, {"</head><body>"}); |
| if (params->url_request.url.path() == |
| "/accept_ch_ua_reduced_cross_origin_iframe_request.html") { |
| base::StrAppend(&body, {BuildIframeHTML()}); |
| } |
| base::StrAppend(&body, {"</body></html>"}); |
| URLLoaderInterceptor::WriteResponse(headers, body, params->client.get()); |
| return true; |
| } |
| |
| void SetLastUserAgent(const std::string* value) { |
| base::AutoLock lock(last_request_lock_); |
| if (value != nullptr) { |
| last_user_agent_ = *value; |
| } else { |
| NOTREACHED(); |
| } |
| } |
| |
| void SetLastSecChUaReduced(const std::string* value) { |
| base::AutoLock lock(last_request_lock_); |
| if (value != nullptr) { |
| last_sec_ch_ua_reduced_ = *value; |
| } else { |
| last_sec_ch_ua_reduced_ = absl::nullopt; |
| } |
| } |
| |
| void SetLastRequestedURL(const GURL& url) { |
| base::AutoLock lock(last_request_lock_); |
| last_requested_url_ = url; |
| } |
| |
| // Called by |https_server_|. |
| void MonitorResourceRequest(const net::test_server::HttpRequest& request) { |
| SetLastRequestedURL(request.GetURL()); |
| auto it = request.headers.find("user-agent"); |
| SetLastUserAgent(it != request.headers.end() ? &it->second : nullptr); |
| it = request.headers.find("sec-ch-ua-reduced"); |
| SetLastSecChUaReduced(it != request.headers.end() ? &it->second : nullptr); |
| } |
| |
| std::string BuildIframeHTML() { |
| std::string html = "<iframe src=\""; |
| base::StrAppend( |
| &html, {https_server_.GetURL("/simple.html").spec(), "\"></iframe>"}); |
| return html; |
| } |
| |
| std::string BuildSubresourceHTML() { |
| std::string html = "<link rel=\"stylesheet\" href=\""; |
| base::StrAppend(&html, |
| {https_server_.GetURL("/style.css").spec(), "\"></link>"}); |
| return html; |
| } |
| |
| std::unique_ptr<URLLoaderInterceptor> url_loader_interceptor_; |
| net::EmbeddedTestServer https_server_; |
| std::string ua_reduced_permissions_policy_header_value_; |
| bool valid_ot_token_ = true; |
| base::Lock last_request_lock_; |
| absl::optional<std::string> last_user_agent_ GUARDED_BY(last_request_lock_); |
| absl::optional<std::string> last_sec_ch_ua_reduced_ |
| GUARDED_BY(last_request_lock_); |
| absl::optional<GURL> last_requested_url_ GUARDED_BY(last_request_lock_); |
| }; |
| |
| constexpr const char |
| ThirdPartyUaReducedOriginTrialBrowserTest::kFirstPartyOriginUrl[]; |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartyIframeUaReducedWildcardPolicy) { |
| SetUaReducedPermissionsPolicy("*"); // Allow all third-party sites. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_iframe_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/simple.html"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartySubresourceUaReducedWithWildcardPolicy) { |
| SetUaReducedPermissionsPolicy("*"); // Allow all third-party sites. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_subresource_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/style.css"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartyIframeUaReducedSpecificPolicy) { |
| std::string policy = "(self \""; |
| base::StrAppend(&policy, {GetServerOrigin().spec(), "\")"}); |
| SetUaReducedPermissionsPolicy(policy); // Allow our third-party site only. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_iframe_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/simple.html"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartySubresourceUaReducedSpecificPolicy) { |
| std::string policy = "(self \""; |
| base::StrAppend(&policy, {GetServerOrigin().spec(), "\")"}); |
| SetUaReducedPermissionsPolicy(policy); // Allow our third-party site only. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_subresource_request_url(), |
| /*ch_ua_reduced_expected=*/true); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/style.css"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartyIframeUaReducedPolicyNotAllowed) { |
| SetUaReducedPermissionsPolicy( |
| "(self)"); // Only allow self, no third-party sites. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_iframe_request_url(), |
| /*ch_ua_reduced_expected=*/false); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/simple.html"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartySubresourceUaReducedPolicyNotAllowed) { |
| SetUaReducedPermissionsPolicy( |
| "(self)"); // Only allow self, no third-party sites. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_subresource_request_url(), |
| /*ch_ua_reduced_expected=*/false); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/style.css"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartyIframeUaReducedInvalidOriginTrialToken) { |
| SetUaReducedPermissionsPolicy("*"); // Allow all third-party sites. |
| SetValidOTToken(false); // Origin Trial Token is invalid. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_iframe_request_url(), |
| /*ch_ua_reduced_expected=*/false); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/simple.html"); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(ThirdPartyUaReducedOriginTrialBrowserTest, |
| ThirdPartySubresourceUaReducedInvalidOriginTrialToken) { |
| SetUaReducedPermissionsPolicy("*"); // Allow all third-party sites. |
| SetValidOTToken(false); // Origin Trial Token is invalid. |
| |
| NavigateAndCheckHeaders( |
| accept_ch_ua_reduced_cross_origin_subresource_request_url(), |
| /*ch_ua_reduced_expected=*/false); |
| |
| // Make sure the last intercepted URL was the request for the embedded iframe. |
| EXPECT_EQ(GetLastRequestedURL()->path(), "/style.css"); |
| } |