Commit 3ff6466b authored by Bettina's avatar Bettina Committed by Commit Bot

Enable by default the SavedPasswords and SignedIn experiments.

Enable by default the SafeBrowsingPasswordProtectionForSavedPasswords
and SafeBrowsingPasswordProtectionForSignedInUsers experiments on
desktop only.

Bug: 1026006,914410
Change-Id: If0052bf62af127e94adc24cfdab701559c2293e5
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2017675
Commit-Queue: Bettina Dea <bdea@chromium.org>
Reviewed-by: default avatarDaniel Rubery <drubery@chromium.org>
Reviewed-by: default avatarAlexei Svitkine <asvitkine@chromium.org>
Reviewed-by: default avatarXinghui Lu <xinghuilu@chromium.org>
Cr-Commit-Position: refs/heads/master@{#735091}
parent 389cc6e9
...@@ -421,10 +421,9 @@ TEST_F(ChromePasswordProtectionServiceTest, ...@@ -421,10 +421,9 @@ TEST_F(ChromePasswordProtectionServiceTest,
RequestOutcome reason; RequestOutcome reason;
service_->ConfigService(false /*incognito*/, false /*SBER*/); service_->ConfigService(false /*incognito*/, false /*SBER*/);
EXPECT_FALSE(service_->IsPingingEnabled( EXPECT_TRUE(service_->IsPingingEnabled(
LoginReputationClientRequest::PASSWORD_REUSE_EVENT, reused_password_type, LoginReputationClientRequest::PASSWORD_REUSE_EVENT, reused_password_type,
&reason)); &reason));
EXPECT_EQ(RequestOutcome::DISABLED_DUE_TO_USER_POPULATION, reason);
service_->ConfigService(false /*incognito*/, true /*SBER*/); service_->ConfigService(false /*incognito*/, true /*SBER*/);
EXPECT_TRUE(service_->IsPingingEnabled( EXPECT_TRUE(service_->IsPingingEnabled(
...@@ -432,7 +431,7 @@ TEST_F(ChromePasswordProtectionServiceTest, ...@@ -432,7 +431,7 @@ TEST_F(ChromePasswordProtectionServiceTest,
&reason)); &reason));
service_->ConfigService(true /*incognito*/, false /*SBER*/); service_->ConfigService(true /*incognito*/, false /*SBER*/);
EXPECT_FALSE(service_->IsPingingEnabled( EXPECT_TRUE(service_->IsPingingEnabled(
LoginReputationClientRequest::PASSWORD_REUSE_EVENT, reused_password_type, LoginReputationClientRequest::PASSWORD_REUSE_EVENT, reused_password_type,
&reason)); &reason));
......
...@@ -1136,29 +1136,15 @@ TEST_P(PasswordProtectionServiceTest, VerifyShouldShowModalWarning) { ...@@ -1136,29 +1136,15 @@ TEST_P(PasswordProtectionServiceTest, VerifyShouldShowModalWarning) {
LoginReputationClientRequest::UNFAMILIAR_LOGIN_PAGE, LoginReputationClientRequest::UNFAMILIAR_LOGIN_PAGE,
reused_password_account_type, LoginReputationClientResponse::PHISHING)); reused_password_account_type, LoginReputationClientResponse::PHISHING));
// Don't show modal warning if it is a saved password reuse and the experiment
// isn't on.
base::test::ScopedFeatureList feature_list;
feature_list.InitAndDisableFeature(
safe_browsing::kPasswordProtectionForSignedInUsers);
reused_password_account_type.set_account_type( reused_password_account_type.set_account_type(
ReusedPasswordAccountType::SAVED_PASSWORD); ReusedPasswordAccountType::SAVED_PASSWORD);
EXPECT_FALSE(password_protection_service_->ShouldShowModalWarning( EXPECT_TRUE(password_protection_service_->ShouldShowModalWarning(
LoginReputationClientRequest::PASSWORD_REUSE_EVENT, LoginReputationClientRequest::PASSWORD_REUSE_EVENT,
reused_password_account_type, LoginReputationClientResponse::PHISHING)); reused_password_account_type, LoginReputationClientResponse::PHISHING));
EXPECT_TRUE(password_protection_service_->ShouldShowModalWarning(
{ LoginReputationClientRequest::PASSWORD_REUSE_EVENT,
base::test::ScopedFeatureList feature_list; reused_password_account_type,
feature_list.InitAndEnableFeature( LoginReputationClientResponse::LOW_REPUTATION));
safe_browsing::kPasswordProtectionForSavedPasswords);
EXPECT_TRUE(password_protection_service_->ShouldShowModalWarning(
LoginReputationClientRequest::PASSWORD_REUSE_EVENT,
reused_password_account_type, LoginReputationClientResponse::PHISHING));
EXPECT_TRUE(password_protection_service_->ShouldShowModalWarning(
LoginReputationClientRequest::PASSWORD_REUSE_EVENT,
reused_password_account_type,
LoginReputationClientResponse::LOW_REPUTATION));
}
{ {
base::test::ScopedFeatureList feature_list; base::test::ScopedFeatureList feature_list;
...@@ -1289,7 +1275,7 @@ TEST_P(PasswordProtectionServiceTest, VerifyIsSupportedPasswordTypeForPinging) { ...@@ -1289,7 +1275,7 @@ TEST_P(PasswordProtectionServiceTest, VerifyIsSupportedPasswordTypeForPinging) {
PasswordType::SAVED_PASSWORD)); PasswordType::SAVED_PASSWORD));
EXPECT_TRUE(password_protection_service_->IsSupportedPasswordTypeForPinging( EXPECT_TRUE(password_protection_service_->IsSupportedPasswordTypeForPinging(
PasswordType::PRIMARY_ACCOUNT_PASSWORD)); PasswordType::PRIMARY_ACCOUNT_PASSWORD));
EXPECT_FALSE(password_protection_service_->IsSupportedPasswordTypeForPinging( EXPECT_TRUE(password_protection_service_->IsSupportedPasswordTypeForPinging(
PasswordType::OTHER_GAIA_PASSWORD)); PasswordType::OTHER_GAIA_PASSWORD));
EXPECT_TRUE(password_protection_service_->IsSupportedPasswordTypeForPinging( EXPECT_TRUE(password_protection_service_->IsSupportedPasswordTypeForPinging(
PasswordType::ENTERPRISE_PASSWORD)); PasswordType::ENTERPRISE_PASSWORD));
......
...@@ -10,6 +10,7 @@ ...@@ -10,6 +10,7 @@
#include <vector> #include <vector>
#include "base/feature_list.h" #include "base/feature_list.h"
#include "base/metrics/field_trial_params.h" #include "base/metrics/field_trial_params.h"
#include "components/safe_browsing/buildflags.h"
#include "base/macros.h" #include "base/macros.h"
#include "base/values.h" #include "base/values.h"
...@@ -43,17 +44,30 @@ const base::Feature kContentComplianceEnabled{ ...@@ -43,17 +44,30 @@ const base::Feature kContentComplianceEnabled{
const base::Feature kMalwareScanEnabled{"SafeBrowsingMalwareScanEnabled", const base::Feature kMalwareScanEnabled{"SafeBrowsingMalwareScanEnabled",
base::FEATURE_DISABLED_BY_DEFAULT}; base::FEATURE_DISABLED_BY_DEFAULT};
// Enable saved password protection by default only on desktop.
#if BUILDFLAG(FULL_SAFE_BROWSING)
const base::Feature kPasswordProtectionForSavedPasswords{
"SafeBrowsingPasswordProtectionForSavedPasswords",
base::FEATURE_ENABLED_BY_DEFAULT};
#else
const base::Feature kPasswordProtectionForSavedPasswords{ const base::Feature kPasswordProtectionForSavedPasswords{
"SafeBrowsingPasswordProtectionForSavedPasswords", "SafeBrowsingPasswordProtectionForSavedPasswords",
base::FEATURE_DISABLED_BY_DEFAULT}; base::FEATURE_DISABLED_BY_DEFAULT};
#endif
const base::Feature kPasswordProtectionShowDomainsForSavedPasswords{ const base::Feature kPasswordProtectionShowDomainsForSavedPasswords{
"SafeBrowsingPasswordProtectionShowDomainsForSavedPasswords", "SafeBrowsingPasswordProtectionShowDomainsForSavedPasswords",
base::FEATURE_DISABLED_BY_DEFAULT}; base::FEATURE_DISABLED_BY_DEFAULT};
#if BUILDFLAG(FULL_SAFE_BROWSING)
const base::Feature kPasswordProtectionForSignedInUsers{
"SafeBrowsingPasswordProtectionForSignedInUsers",
base::FEATURE_ENABLED_BY_DEFAULT};
#else
const base::Feature kPasswordProtectionForSignedInUsers{ const base::Feature kPasswordProtectionForSignedInUsers{
"SafeBrowsingPasswordProtectionForSignedInUsers", "SafeBrowsingPasswordProtectionForSignedInUsers",
base::FEATURE_DISABLED_BY_DEFAULT}; base::FEATURE_DISABLED_BY_DEFAULT};
#endif
const base::Feature kPromptAppForDeepScanning{ const base::Feature kPromptAppForDeepScanning{
"SafeBrowsingPromptAppForDeepScanning", base::FEATURE_DISABLED_BY_DEFAULT}; "SafeBrowsingPromptAppForDeepScanning", base::FEATURE_DISABLED_BY_DEFAULT};
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment