| /* |
| * Copyright (C) 2020 Apple Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' |
| * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, |
| * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS |
| * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF |
| * THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #import "config.h" |
| |
| #import "ASN1Utilities.h" |
| #import "DaemonTestUtilities.h" |
| #import "HTTPServer.h" |
| #import "PlatformUtilities.h" |
| #import "Test.h" |
| #import "TestNavigationDelegate.h" |
| #import "TestUIDelegate.h" |
| #import "TestWKWebView.h" |
| #import "Utilities.h" |
| #import "WKWebViewConfigurationExtras.h" |
| #import <WebKit/WKMain.h> |
| #import <WebKit/WKPage.h> |
| #import <WebKit/WKPageInjectedBundleClient.h> |
| #import <WebKit/WKPreferencesPrivate.h> |
| #import <WebKit/WKString.h> |
| #import <WebKit/WKWebViewPrivate.h> |
| #import <WebKit/WKWebViewPrivateForTesting.h> |
| #import <WebKit/WKWebsiteDataStorePrivate.h> |
| #import <WebKit/_WKInspector.h> |
| #import <WebKit/_WKWebsiteDataStoreConfiguration.h> |
| #import <wtf/spi/darwin/XPCSPI.h> |
| #import <wtf/text/StringConcatenateNumbers.h> |
| |
| #if HAVE(RSA_BSSA) |
| |
| #include "CoreCryptoSPI.h" |
| |
| #include <WebCore/PrivateClickMeasurement.h> |
| #include <wtf/spi/cocoa/SecuritySPI.h> |
| |
| #endif // HAVE(RSA_BSSA) |
| |
| @interface WKWebView () |
| - (WKPageRef)_pageForTesting; |
| @end |
| |
| @interface MockEventAttribution : NSObject |
| |
| @property (nonatomic, assign, readonly) uint8_t sourceIdentifier; |
| @property (nonatomic, copy, readonly) NSURL *destinationURL; |
| @property (nonatomic, copy, readonly) NSURL *reportEndpoint; |
| @property (nonatomic, copy, readonly) NSString *sourceDescription; |
| @property (nonatomic, copy, readonly) NSString *purchaser; |
| - (instancetype)initWithReportEndpoint:(NSURL *)reportEndpoint destinationURL:(NSURL *)destinationURL; |
| |
| @end |
| |
| @implementation MockEventAttribution |
| |
| - (instancetype)initWithReportEndpoint:(NSURL *)reportEndpoint destinationURL:(NSURL *)destinationURL |
| { |
| if (!(self = [super init])) |
| return nil; |
| |
| _sourceIdentifier = 42; |
| _destinationURL = destinationURL; |
| _reportEndpoint = reportEndpoint; |
| _sourceDescription = @"test source description"; |
| _purchaser = @"test purchaser"; |
| |
| return self; |
| } |
| |
| @end |
| |
| namespace TestWebKitAPI { |
| |
| static RetainPtr<SecTrustRef> secTrustFromCertificateChain(NSArray *chain) |
| { |
| SecTrustRef trustRef = nullptr; |
| if (SecTrustCreateWithCertificates((__bridge CFArrayRef)chain, nullptr, &trustRef) != noErr) |
| return nullptr; |
| return adoptCF(trustRef); |
| } |
| |
| static TestNavigationDelegate *delegateAllowingAllTLS() |
| { |
| static RetainPtr<TestNavigationDelegate> delegate = [] { |
| auto delegate = adoptNS([TestNavigationDelegate new]); |
| delegate.get().didReceiveAuthenticationChallenge = ^(WKWebView *, NSURLAuthenticationChallenge *challenge, void (^completionHandler)(NSURLSessionAuthChallengeDisposition, NSURLCredential *)) { |
| completionHandler(NSURLSessionAuthChallengeUseCredential, [NSURLCredential credentialForTrust:challenge.protectionSpace.serverTrust]); |
| }; |
| return delegate; |
| }(); |
| return delegate.get(); |
| } |
| |
| static NSURL *exampleURL() |
| { |
| return [NSURL URLWithString:@"https://example.com/"]; |
| } |
| |
| static void clearState() |
| { |
| [[NSFileManager defaultManager] removeItemAtURL:adoptNS([[_WKWebsiteDataStoreConfiguration alloc] init]).get()._resourceLoadStatisticsDirectory error:nil]; |
| } |
| |
| static RetainPtr<WKWebViewConfiguration> configurationWithoutUsingDaemon() |
| { |
| auto dataStoreConfiguration = adoptNS([_WKWebsiteDataStoreConfiguration new]); |
| dataStoreConfiguration.get().pcmMachServiceName = nil; |
| auto configuration = adoptNS([WKWebViewConfiguration new]); |
| configuration.get().websiteDataStore = adoptNS([[WKWebsiteDataStore alloc] _initWithConfiguration:dataStoreConfiguration.get()]).get(); |
| return configuration; |
| } |
| |
| static RetainPtr<WKWebView> webViewWithoutUsingDaemon() |
| { |
| return adoptNS([[WKWebView alloc] initWithFrame:CGRectZero configuration:configurationWithoutUsingDaemon().get()]); |
| } |
| |
| void runBasicPCMTest(WKWebViewConfiguration *configuration, Function<void(WKWebView *, const HTTPServer&)>&& addAttributionToWebView, bool setTestAppBundleID = true) |
| { |
| clearState(); |
| [WKWebsiteDataStore _setNetworkProcessSuspensionAllowedForTesting:NO]; |
| bool done = false; |
| HTTPServer server([&done, connectionCount = 0] (Connection connection) mutable { |
| switch (++connectionCount) { |
| case 1: |
| connection.receiveHTTPRequest([connection] (Vector<char>&& request1) { |
| EXPECT_TRUE(strnstr(request1.data(), "GET /conversionRequestBeforeRedirect HTTP/1.1\r\n", request1.size())); |
| const char* redirect = "HTTP/1.1 302 Found\r\n" |
| "Location: /.well-known/private-click-measurement/trigger-attribution/12\r\n" |
| "Content-Length: 0\r\n\r\n"; |
| connection.send(redirect, [connection] { |
| connection.receiveHTTPRequest([connection] (Vector<char>&& request2) { |
| EXPECT_TRUE(strnstr(request2.data(), "GET /.well-known/private-click-measurement/trigger-attribution/12 HTTP/1.1\r\n", request2.size())); |
| const char* response = "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 0\r\n\r\n"; |
| connection.send(response); |
| }); |
| }); |
| }); |
| break; |
| case 2: |
| connection.receiveHTTPRequest([&done] (Vector<char>&& request3) { |
| request3.append('\0'); |
| EXPECT_TRUE(strnstr(request3.data(), "POST / HTTP/1.1\r\n", request3.size())); |
| const char* bodyBegin = strnstr(request3.data(), "\r\n\r\n", request3.size()) + strlen("\r\n\r\n"); |
| EXPECT_STREQ(bodyBegin, "{\"source_engagement_type\":\"click\",\"source_site\":\"127.0.0.1\",\"source_id\":42,\"attributed_on_site\":\"example.com\",\"trigger_data\":12,\"version\":3}"); |
| done = true; |
| }); |
| break; |
| } |
| }, HTTPServer::Protocol::Https); |
| NSURL *serverURL = server.request().URL; |
| |
| auto webView = configuration ? adoptNS([[WKWebView alloc] initWithFrame:CGRectZero configuration:configuration]) : webViewWithoutUsingDaemon(); |
| webView.get().navigationDelegate = delegateAllowingAllTLS(); |
| addAttributionToWebView(webView.get(), server); |
| [[webView configuration].websiteDataStore _setResourceLoadStatisticsEnabled:YES]; |
| [[webView configuration].websiteDataStore _trustServerForLocalPCMTesting:secTrustFromCertificateChain(@[(id)testCertificate().get()]).get()]; |
| [webView _setPrivateClickMeasurementAttributionReportURLsForTesting:serverURL destinationURL:exampleURL() completionHandler:^{ |
| [webView _setPrivateClickMeasurementOverrideTimerForTesting:YES completionHandler:^{ |
| NSString *html = [NSString stringWithFormat:@"<script>fetch('%@conversionRequestBeforeRedirect',{mode:'no-cors'})</script>", serverURL]; |
| if (setTestAppBundleID) { |
| [webView _setPrivateClickMeasurementAppBundleIDForTesting:@"test.bundle.id" completionHandler:^{ |
| [webView loadHTMLString:html baseURL:exampleURL()]; |
| }]; |
| } else |
| [webView loadHTMLString:html baseURL:exampleURL()]; |
| }]; |
| }]; |
| Util::run(&done); |
| } |
| |
| #if HAVE(RSA_BSSA) |
| |
| enum class TokenSigningParty : bool { Source, Destination }; |
| |
| static void triggerAttributionWithSubresourceRedirect(Connection& connection, const String& attributionDestinationNonce) |
| { |
| auto optionalQueryString = attributionDestinationNonce.isEmpty() ? attributionDestinationNonce : makeString("?attributionDestinationNonce=", attributionDestinationNonce); |
| auto location = makeString("/.well-known/private-click-measurement/trigger-attribution/12", optionalQueryString); |
| connection.receiveHTTPRequest([connection, location] (Vector<char>&& request1) { |
| EXPECT_TRUE(strnstr(request1.data(), "GET /conversionRequestBeforeRedirect HTTP/1.1\r\n", request1.size())); |
| auto redirect = makeString("HTTP/1.1 302 Found\r\nLocation: ", location, "\r\nContent-Length: 0\r\n\r\n").utf8().data(); |
| connection.send(redirect, [connection, location] { |
| connection.receiveHTTPRequest([connection, location] (Vector<char>&& request2) { |
| auto expectedHttpGetString = makeString("GET ", location, " HTTP/1.1\r\n").utf8().data(); |
| EXPECT_TRUE(strnstr(request2.data(), expectedHttpGetString, request2.size())); |
| const char* response = "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 0\r\n\r\n"; |
| connection.send(response); |
| }); |
| }); |
| }); |
| } |
| |
| static void runDestinationWebView(RetainPtr<WKWebView> webView, NSURL *serverURL) |
| { |
| [webView _setPrivateClickMeasurementAttributionReportURLsForTesting:serverURL destinationURL:exampleURL() completionHandler:^{ |
| [webView _setPrivateClickMeasurementOverrideTimerForTesting:YES completionHandler:^{ |
| [webView _setPrivateClickMeasurementAttributionTokenPublicKeyURLForTesting:serverURL completionHandler:^{ |
| [webView _setPrivateClickMeasurementAttributionTokenSignatureURLForTesting:serverURL completionHandler:^{ |
| [webView _setPrivateClickMeasurementAppBundleIDForTesting:@"test.bundle.id" completionHandler:^{ |
| NSString *html = [NSString stringWithFormat:@"<script>setTimeout(function(){ fetch('%@conversionRequestBeforeRedirect',{mode:'no-cors'}); }, 100);</script>", serverURL]; |
| [webView loadHTMLString:html baseURL:exampleURL()]; |
| }]; |
| }]; |
| }]; |
| }]; |
| }]; |
| } |
| |
| static void signUnlinkableTokenAndSendSecretToken(TokenSigningParty signingParty) |
| { |
| [WKWebsiteDataStore _setNetworkProcessSuspensionAllowedForTesting:NO]; |
| bool done = false; |
| |
| // Generate the server key pair. |
| size_t modulusNBits = 4096; |
| int error = 0; |
| |
| struct ccrng_state* rng = ccrng(&error); |
| |
| const uint8_t e[] = { 0x1, 0x00, 0x01 }; |
| ccrsa_full_ctx_decl(ccn_sizeof(modulusNBits), rsaPrivateKey); |
| error = ccrsa_generate_key(modulusNBits, rsaPrivateKey, sizeof(e), e, rng); |
| |
| ccrsa_pub_ctx_t rsaPublicKey = ccrsa_ctx_public(rsaPrivateKey); |
| size_t modulusNBytes = cc_ceiling(ccrsa_pubkeylength(rsaPublicKey), 8); |
| |
| size_t exportSize = ccder_encode_rsa_pub_size(rsaPublicKey); |
| auto publicKey = adoptNS([[NSMutableData alloc] initWithLength:exportSize]); |
| ccder_encode_rsa_pub(rsaPublicKey, static_cast<uint8_t*>([publicKey mutableBytes]), static_cast<uint8_t*>([publicKey mutableBytes]) + [publicKey length]); |
| |
| auto secKey = adoptCF(SecKeyCreateWithData((__bridge CFDataRef)publicKey.get(), (__bridge CFDictionaryRef)@{ |
| (__bridge id)kSecAttrKeyType: (__bridge id)kSecAttrKeyTypeRSA, |
| (__bridge id)kSecAttrKeyClass: (__bridge id)kSecAttrKeyClassPublic |
| }, nil)); |
| Vector<uint8_t> rawKeyBytes(static_cast<const uint8_t*>(publicKey.get().bytes), publicKey.get().length); |
| auto wrappedKeyBytes = wrapPublicKeyWithRSAPSSOID(WTFMove(rawKeyBytes)); |
| |
| auto keyData = base64URLEncodeToString(wrappedKeyBytes.data(), wrappedKeyBytes.size()); |
| // The server. |
| HTTPServer server([signingParty, &done, connectionCount = signingParty == TokenSigningParty::Source ? 1 : 0, &rsaPrivateKey, &modulusNBytes, &rng, &keyData, &secKey] (Connection connection) mutable { |
| switch (++connectionCount) { |
| case 1: |
| EXPECT_TRUE(signingParty == TokenSigningParty::Destination); |
| triggerAttributionWithSubresourceRedirect(connection, "ABCDEFabcdef0123456789"); |
| break; |
| case 2: |
| connection.receiveHTTPRequest([signingParty, connection, &rsaPrivateKey, &modulusNBytes, &rng, &keyData, &done, &secKey] (Vector<char>&& request1) { |
| EXPECT_TRUE(strnstr(request1.data(), "GET / HTTP/1.1\r\n", request1.size())); |
| |
| // Example response: { "token_public_key": "ABCD" }. "ABCD" should be Base64URL encoded. |
| auto response = makeString("HTTP/1.1 200 OK\r\n" |
| "Content-Type: application/json\r\n" |
| "Content-Length: ", 24 + keyData.length(), "\r\n\r\n" |
| "{\"token_public_key\": \"", keyData, "\"}"); |
| connection.send(WTFMove(response), [signingParty, connection, &rsaPrivateKey, &modulusNBytes, &rng, &keyData, &done, &secKey] { |
| connection.receiveHTTPRequest([signingParty, connection, &rsaPrivateKey, &modulusNBytes, &rng, &keyData, &done, &secKey] (Vector<char>&& request2) { |
| EXPECT_TRUE(strnstr(request2.data(), "POST / HTTP/1.1\r\n", request2.size())); |
| |
| auto request2String = String(request2.data(), request2.size()); |
| auto key = signingParty == TokenSigningParty::Source ? String("source_unlinkable_token") : String("destination_unlinkable_token"); |
| auto start = request2String.find(key); |
| start += key.length() + 3; |
| auto end = request2String.find('"', start); |
| auto token = request2String.substring(start, end - start); |
| |
| auto blindedMessage = base64URLDecode(token); |
| |
| const struct ccrsabssa_ciphersuite *ciphersuite = &ccrsabssa_ciphersuite_rsa4096_sha384; |
| auto blindedSignature = adoptNS([[NSMutableData alloc] initWithLength:modulusNBytes]); |
| ccrsabssa_sign_blinded_message(ciphersuite, rsaPrivateKey, blindedMessage->data(), blindedMessage->size(), static_cast<uint8_t *>([blindedSignature mutableBytes]), [blindedSignature length], rng); |
| auto unlinkableToken = base64URLEncodeToString([blindedSignature bytes], [blindedSignature length]); |
| |
| // Example response: { "unlinkable_token": "ABCD" }. "ABCD" should be Base64URL encoded. |
| auto response = makeString("HTTP/1.1 200 OK\r\n" |
| "Content-Type: application/json\r\n" |
| "Content-Length: ", 24 + unlinkableToken.length(), "\r\n\r\n" |
| "{\"unlinkable_token\": \"", unlinkableToken, "\"}"); |
| connection.send(WTFMove(response), [signingParty, connection, &keyData, &done, unlinkableToken, token, &secKey] { |
| connection.receiveHTTPRequest([signingParty, connection, &keyData, &done, unlinkableToken, token, &secKey] (Vector<char>&& request3) { |
| EXPECT_TRUE(strnstr(request3.data(), "GET / HTTP/1.1\r\n", request3.size())); |
| |
| // Example response: { "token_public_key": "ABCD" }. "ABCD" should be Base64URL encoded. |
| auto response = makeString("HTTP/1.1 200 OK\r\n" |
| "Content-Type: application/json\r\n" |
| "Content-Length: ", 24 + keyData.length(), "\r\n\r\n" |
| "{\"token_public_key\": \"", keyData, "\"}"); |
| connection.send(WTFMove(response), [signingParty, connection, &done, unlinkableToken, token, &secKey] { |
| connection.receiveHTTPRequest([signingParty, connection, &done, unlinkableToken, token, &secKey] (Vector<char>&& request4) { |
| EXPECT_TRUE(strnstr(request4.data(), "POST / HTTP/1.1\r\n", request4.size())); |
| EXPECT_TRUE(strnstr(request4.data(), "{\"source_engagement_type\":\"click\",\"source_site\":\"127.0.0.1\",\"source_id\":42,\"attributed_on_site\":\"example.com\",\"trigger_data\":12,\"version\":3,", |
| request4.size())); |
| |
| EXPECT_FALSE(strnstr(request4.data(), token.utf8().data(), request4.size())); |
| EXPECT_FALSE(strnstr(request4.data(), unlinkableToken.utf8().data(), request4.size())); |
| |
| auto request4String = String(request4.data(), request4.size()); |
| |
| auto key = signingParty == TokenSigningParty::Source ? String("source_secret_token") : String("destination_secret_token"); |
| auto start = request4String.find(key); |
| start += key.length() + 3; |
| auto end = request4String.find('"', start); |
| auto token = request4String.substring(start, end - start); |
| auto tokenVector = base64URLDecode(token); |
| auto tokenData = adoptNS([[NSData alloc] initWithBytes:tokenVector->data() length:tokenVector->size()]); |
| |
| key = signingParty == TokenSigningParty::Source ? String("source_secret_token_signature") : String("destination_secret_token_signature"); |
| start = request4String.find(key); |
| start += key.length() + 3; |
| end = request4String.find('"', start); |
| auto signature = request4String.substring(start, end - start); |
| auto signatureVector = base64URLDecode(signature); |
| auto signatureData = adoptNS([[NSData alloc] initWithBytes:signatureVector->data() length:signatureVector->size()]); |
| |
| EXPECT_TRUE(SecKeyVerifySignature(secKey.get(), kSecKeyAlgorithmRSASignatureMessagePSSSHA384, (__bridge CFDataRef)tokenData.get(), (__bridge CFDataRef)signatureData.get(), NULL)); |
| |
| done = true; |
| }); |
| }); |
| }); |
| }); |
| }); |
| }); |
| }); |
| break; |
| case 3: |
| EXPECT_TRUE(signingParty == TokenSigningParty::Source); |
| triggerAttributionWithSubresourceRedirect(connection, emptyString()); |
| break; |
| } |
| }, HTTPServer::Protocol::Https); |
| NSURL *serverURL = server.request().URL; |
| |
| auto webView = webViewWithoutUsingDaemon(); |
| webView.get().navigationDelegate = delegateAllowingAllTLS(); |
| auto clickNonce = signingParty == TokenSigningParty::Source ? @"ABCDEFabcdef0123456789" : nil; |
| [webView _addEventAttributionWithSourceID:42 destinationURL:exampleURL() sourceDescription:@"test source description" purchaser:@"test purchaser" reportEndpoint:serverURL optionalNonce:clickNonce applicationBundleID:@"test.bundle.id" ephemeral:NO]; |
| [[webView configuration].websiteDataStore _setResourceLoadStatisticsEnabled:YES]; |
| [[webView configuration].websiteDataStore _trustServerForLocalPCMTesting:secTrustFromCertificateChain(@[(id)testCertificate().get()]).get()]; |
| |
| runDestinationWebView(webView, serverURL); |
| Util::run(&done); |
| } |
| |
| TEST(PrivateClickMeasurement, SourceClickFraudPrevention) |
| { |
| signUnlinkableTokenAndSendSecretToken(TokenSigningParty::Source); |
| } |
| |
| TEST(PrivateClickMeasurement, DestinationClickFraudPrevention) |
| { |
| signUnlinkableTokenAndSendSecretToken(TokenSigningParty::Destination); |
| } |
| #endif |
| |
| TEST(PrivateClickMeasurement, Basic) |
| { |
| runBasicPCMTest(nil, [](WKWebView *webView, const HTTPServer& server) { |
| [webView _addEventAttributionWithSourceID:42 destinationURL:exampleURL() sourceDescription:@"test source description" purchaser:@"test purchaser" reportEndpoint:server.request().URL optionalNonce:nil applicationBundleID:@"test.bundle.id" ephemeral:NO]; |
| }); |
| } |
| |
| TEST(PrivateClickMeasurement, EphemeralWithAttributedBundleIdentifier) |
| { |
| auto configuration = configurationWithoutUsingDaemon(); |
| configuration.get()._attributedBundleIdentifier = @"other.test.bundle.id"; |
| runBasicPCMTest(configuration.get(), [](WKWebView *webView, const HTTPServer& server) { |
| [webView _addEventAttributionWithSourceID:42 destinationURL:exampleURL() sourceDescription:@"test source description" purchaser:@"test purchaser" reportEndpoint:server.request().URL optionalNonce:nil applicationBundleID:@"other.test.bundle.id" ephemeral:YES]; |
| }, false); |
| } |
| |
| TEST(PrivateClickMeasurement, DatabaseLocation) |
| { |
| NSFileManager *fileManager = [NSFileManager defaultManager]; |
| NSURL *tempDir = [NSURL fileURLWithPath:[NSTemporaryDirectory() stringByAppendingPathComponent:@"EventAttributionDatabaseLocationTest"] isDirectory:YES]; |
| if ([fileManager fileExistsAtPath:tempDir.path]) |
| [fileManager removeItemAtURL:tempDir error:nil]; |
| |
| auto webViewToKeepNetworkProcessAlive = adoptNS([TestWKWebView new]); |
| [webViewToKeepNetworkProcessAlive synchronouslyLoadHTMLString:@"start network process"]; |
| |
| pid_t originalNetworkProcessPid = 0; |
| @autoreleasepool { |
| auto dataStoreConfiguration = adoptNS([_WKWebsiteDataStoreConfiguration new]); |
| dataStoreConfiguration.get().privateClickMeasurementStorageDirectory = tempDir; |
| dataStoreConfiguration.get().pcmMachServiceName = nil; |
| auto viewConfiguration = configurationWithoutUsingDaemon(); |
| auto dataStore = adoptNS([[WKWebsiteDataStore alloc] _initWithConfiguration:dataStoreConfiguration.get()]); |
| viewConfiguration.get().websiteDataStore = dataStore.get(); |
| runBasicPCMTest(viewConfiguration.get(), [](WKWebView *webView, const HTTPServer& server) { |
| [webView _addEventAttributionWithSourceID:42 destinationURL:exampleURL() sourceDescription:@"test source description" purchaser:@"test purchaser" reportEndpoint:server.request().URL optionalNonce:nil applicationBundleID:@"test.bundle.id" ephemeral:NO]; |
| }); |
| originalNetworkProcessPid = [dataStore _networkProcessIdentifier]; |
| EXPECT_GT(originalNetworkProcessPid, 0); |
| |
| __block bool suspended = false; |
| [WKWebsiteDataStore _setNetworkProcessSuspensionAllowedForTesting:YES]; |
| [dataStore _sendNetworkProcessPrepareToSuspend:^{ |
| suspended = true; |
| [dataStore _sendNetworkProcessDidResume]; |
| }]; |
| Util::run(&suspended); |
| Util::spinRunLoop(10); |
| } |
| Util::spinRunLoop(10); |
| usleep(100000); |
| Util::spinRunLoop(10); |
| |
| EXPECT_TRUE([fileManager fileExistsAtPath:tempDir.path]); |
| EXPECT_TRUE([fileManager fileExistsAtPath:[tempDir.path stringByAppendingPathComponent:@"pcm.db"]]); |
| |
| [webViewToKeepNetworkProcessAlive synchronouslyLoadHTMLString:@"start network process again if it crashed during teardown"]; |
| EXPECT_EQ(webViewToKeepNetworkProcessAlive.get().configuration.websiteDataStore._networkProcessIdentifier, originalNetworkProcessPid); |
| } |
| |
| #if PLATFORM(MAC) || PLATFORM(IOS) |
| |
| static RetainPtr<NSURL> testPCMDaemonLocation() |
| { |
| return [currentExecutableDirectory() URLByAppendingPathComponent:@"adattributiond" isDirectory:NO]; |
| } |
| |
| static NSDictionary<NSString *, id> *testDaemonPList(NSURL *storageLocation) |
| { |
| return @{ |
| @"Label" : @"org.webkit.pcmtestdaemon", |
| @"LaunchOnlyOnce" : @YES, |
| @"StandardErrorPath" : [storageLocation URLByAppendingPathComponent:@"daemon_stderr"].path, |
| @"EnvironmentVariables" : @{ @"DYLD_FRAMEWORK_PATH" : currentExecutableDirectory().get().path }, |
| @"MachServices" : @{ @"org.webkit.pcmtestdaemon.service" : @YES }, |
| @"ProgramArguments" : @[ |
| testPCMDaemonLocation().get().path, |
| @"--machServiceName", |
| @"org.webkit.pcmtestdaemon.service", |
| @"--storageLocation", |
| storageLocation.path |
| ] |
| }; |
| } |
| |
| static std::pair<NSURL *, WKWebViewConfiguration *> setUpDaemon(WKWebViewConfiguration *viewConfiguration) |
| { |
| NSFileManager *fileManager = [NSFileManager defaultManager]; |
| NSURL *tempDir = [NSURL fileURLWithPath:[NSTemporaryDirectory() stringByAppendingPathComponent:@"EventAttributionDaemonTest"] isDirectory:YES]; |
| NSError *error = nil; |
| if ([fileManager fileExistsAtPath:tempDir.path]) |
| [fileManager removeItemAtURL:tempDir error:&error]; |
| EXPECT_NULL(error); |
| |
| killFirstInstanceOfDaemon(@"adattributiond"); |
| |
| registerPlistWithLaunchD(testDaemonPList(tempDir), tempDir); |
| |
| auto dataStoreConfiguration = adoptNS([_WKWebsiteDataStoreConfiguration new]); |
| dataStoreConfiguration.get().pcmMachServiceName = @"org.webkit.pcmtestdaemon.service"; |
| viewConfiguration.websiteDataStore = adoptNS([[WKWebsiteDataStore alloc] _initWithConfiguration:dataStoreConfiguration.get()]).get(); |
| |
| return std::make_pair(tempDir, viewConfiguration); |
| } |
| |
| static void cleanUpDaemon(NSURL *tempDir) |
| { |
| killFirstInstanceOfDaemon(@"adattributiond"); |
| |
| EXPECT_TRUE([[NSFileManager defaultManager] fileExistsAtPath:tempDir.path]); |
| NSError *error = nil; |
| [[NSFileManager defaultManager] removeItemAtURL:tempDir error:&error]; |
| EXPECT_NULL(error); |
| } |
| |
| static void attemptConnectionInProcessWithoutEntitlement() |
| { |
| #if USE(APPLE_INTERNAL_SDK) |
| __block bool done = false; |
| auto connection = adoptNS(xpc_connection_create_mach_service("org.webkit.pcmtestdaemon.service", dispatch_get_main_queue(), 0)); |
| xpc_connection_set_event_handler(connection.get(), ^(xpc_object_t event) { |
| EXPECT_EQ(event, XPC_ERROR_CONNECTION_INTERRUPTED); |
| done = true; |
| }); |
| xpc_connection_activate(connection.get()); |
| auto dictionary = adoptNS(xpc_dictionary_create(nullptr, nullptr, 0)); |
| xpc_connection_send_message(connection.get(), dictionary.get()); |
| TestWebKitAPI::Util::run(&done); |
| #endif |
| } |
| |
| TEST(PrivateClickMeasurement, DaemonBasicFunctionality) |
| { |
| auto [tempDir, configuration] = setUpDaemon(configurationWithoutUsingDaemon().autorelease()); |
| attemptConnectionInProcessWithoutEntitlement(); |
| runBasicPCMTest(configuration, [](WKWebView *webView, const HTTPServer& server) { |
| [webView _addEventAttributionWithSourceID:42 destinationURL:exampleURL() sourceDescription:@"test source description" purchaser:@"test purchaser" reportEndpoint:server.request().URL optionalNonce:nil applicationBundleID:@"test.bundle.id" ephemeral:NO]; |
| }); |
| cleanUpDaemon(tempDir); |
| } |
| |
| #if PLATFORM(MAC) |
| static void setInjectedBundleClient(WKWebView *webView, Vector<String>& consoleMessages) |
| { |
| WKPageInjectedBundleClientV0 injectedBundleClient = { |
| { 0, &consoleMessages }, |
| [] (WKPageRef, WKStringRef messageName, WKTypeRef message, const void* clientInfo) { |
| auto& consoleMessages = *reinterpret_cast<Vector<String>*>(const_cast<void*>(clientInfo)); |
| if (WKStringIsEqualToUTF8CString(messageName, "ConsoleMessage")) |
| consoleMessages.append(Util::toNS((WKStringRef)message)); |
| }, |
| nullptr, |
| }; |
| WKPageSetPageInjectedBundleClient(webView._pageForTesting, &injectedBundleClient.base); |
| }; |
| |
| static RetainPtr<TestWKWebView> webViewWithOpenInspector(WKWebViewConfiguration *configuration) |
| { |
| configuration.preferences._developerExtrasEnabled = YES; |
| auto webView = adoptNS([[TestWKWebView alloc] initWithFrame:NSZeroRect configuration:configuration]); |
| [webView synchronouslyLoadHTMLString:@"start processes"]; |
| [[webView _inspector] show]; |
| [webView _test_waitForInspectorToShow]; |
| return webView; |
| } |
| |
| TEST(PrivateClickMeasurement, DaemonDebugMode) |
| { |
| auto [tempDir, configuration] = setUpDaemon([WKWebViewConfiguration _test_configurationWithTestPlugInClassName:@"BundlePageConsoleMessage"]); |
| Vector<String> consoleMessages; |
| auto webView = webViewWithOpenInspector(configuration); |
| setInjectedBundleClient(webView.get(), consoleMessages); |
| [configuration.websiteDataStore _setPrivateClickMeasurementDebugModeEnabledForTesting:YES]; |
| while (consoleMessages.isEmpty()) |
| Util::spinRunLoop(); |
| EXPECT_WK_STREQ(consoleMessages[0], "[Private Click Measurement] Turned Debug Mode on."); |
| [configuration.websiteDataStore _setPrivateClickMeasurementDebugModeEnabledForTesting:NO]; |
| while (consoleMessages.size() < 2) |
| Util::spinRunLoop(); |
| EXPECT_WK_STREQ(consoleMessages[1], "[Private Click Measurement] Turned Debug Mode off."); |
| cleanUpDaemon(tempDir); |
| } |
| |
| TEST(PrivateClickMeasurement, NetworkProcessDebugMode) |
| { |
| auto configuration = [WKWebViewConfiguration _test_configurationWithTestPlugInClassName:@"BundlePageConsoleMessage"]; |
| Vector<String> consoleMessages; |
| auto webView = webViewWithOpenInspector(configuration); |
| setInjectedBundleClient(webView.get(), consoleMessages); |
| [configuration.websiteDataStore _setPrivateClickMeasurementDebugModeEnabledForTesting:YES]; |
| while (consoleMessages.isEmpty()) |
| Util::spinRunLoop(); |
| EXPECT_WK_STREQ(consoleMessages[0], "[Private Click Measurement] Turned Debug Mode on."); |
| [configuration.websiteDataStore _setPrivateClickMeasurementDebugModeEnabledForTesting:NO]; |
| while (consoleMessages.size() < 2) |
| Util::spinRunLoop(); |
| EXPECT_WK_STREQ(consoleMessages[1], "[Private Click Measurement] Turned Debug Mode off."); |
| } |
| #endif // PLATFORM(MAC) |
| |
| #endif // PLATFORM(MAC) || PLATFORM(IOS) |
| |
| #if HAVE(UI_EVENT_ATTRIBUTION) |
| |
| TEST(PrivateClickMeasurement, BasicWithIOSSPI) |
| { |
| runBasicPCMTest(nil, [](WKWebView *webView, const HTTPServer& server) { |
| auto attribution = adoptNS([[MockEventAttribution alloc] initWithReportEndpoint:server.request().URL destinationURL:exampleURL()]); |
| webView._uiEventAttribution = (UIEventAttribution *)attribution.get(); |
| EXPECT_WK_STREQ(webView._uiEventAttribution.sourceDescription, "test source description"); |
| EXPECT_WK_STREQ(webView._uiEventAttribution.purchaser, "test purchaser"); |
| }); |
| } |
| |
| TEST(PrivateClickMeasurement, BasicWithEphemeralIOSSPI) |
| { |
| runBasicPCMTest(nil, [](WKWebView *webView, const HTTPServer& server) { |
| auto attribution = adoptNS([[MockEventAttribution alloc] initWithReportEndpoint:server.request().URL destinationURL:exampleURL()]); |
| webView._ephemeralUIEventAttribution = (UIEventAttribution *)attribution.get(); |
| }); |
| } |
| |
| #endif // HAVE(UI_EVENT_ATTRIBUTION) |
| |
| } // namespace TestWebKitAPI |