OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/site_per_process_browsertest.h" | 5 #include "content/browser/site_per_process_browsertest.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/strings/stringprintf.h" | 8 #include "base/strings/stringprintf.h" |
9 #include "base/strings/utf_string_conversions.h" | 9 #include "base/strings/utf_string_conversions.h" |
10 #include "content/browser/frame_host/cross_process_frame_connector.h" | 10 #include "content/browser/frame_host/cross_process_frame_connector.h" |
11 #include "content/browser/frame_host/frame_tree.h" | 11 #include "content/browser/frame_host/frame_tree.h" |
12 #include "content/browser/frame_host/navigator.h" | 12 #include "content/browser/frame_host/navigator.h" |
13 #include "content/browser/frame_host/render_frame_proxy_host.h" | 13 #include "content/browser/frame_host/render_frame_proxy_host.h" |
14 #include "content/browser/frame_host/render_widget_host_view_child_frame.h" | 14 #include "content/browser/frame_host/render_widget_host_view_child_frame.h" |
15 #include "content/browser/renderer_host/render_view_host_impl.h" | 15 #include "content/browser/renderer_host/render_view_host_impl.h" |
16 #include "content/browser/web_contents/web_contents_impl.h" | 16 #include "content/browser/web_contents/web_contents_impl.h" |
17 #include "content/common/frame_messages.h" | |
17 #include "content/public/browser/notification_observer.h" | 18 #include "content/public/browser/notification_observer.h" |
18 #include "content/public/browser/notification_service.h" | 19 #include "content/public/browser/notification_service.h" |
19 #include "content/public/browser/notification_types.h" | 20 #include "content/public/browser/notification_types.h" |
20 #include "content/public/common/content_switches.h" | 21 #include "content/public/common/content_switches.h" |
21 #include "content/public/test/browser_test_utils.h" | 22 #include "content/public/test/browser_test_utils.h" |
22 #include "content/public/test/content_browser_test_utils.h" | 23 #include "content/public/test/content_browser_test_utils.h" |
23 #include "content/public/test/test_navigation_observer.h" | 24 #include "content/public/test/test_navigation_observer.h" |
24 #include "content/public/test/test_utils.h" | 25 #include "content/public/test/test_utils.h" |
25 #include "content/shell/browser/shell.h" | 26 #include "content/shell/browser/shell.h" |
26 #include "content/test/content_browser_test_utils_internal.h" | 27 #include "content/test/content_browser_test_utils_internal.h" |
27 #include "content/test/test_frame_navigation_observer.h" | 28 #include "content/test/test_frame_navigation_observer.h" |
29 #include "ipc/ipc_security_test_util.h" | |
28 #include "net/dns/mock_host_resolver.h" | 30 #include "net/dns/mock_host_resolver.h" |
29 #include "net/test/embedded_test_server/embedded_test_server.h" | 31 #include "net/test/embedded_test_server/embedded_test_server.h" |
30 | 32 |
31 namespace content { | 33 namespace content { |
32 | 34 |
33 class RedirectNotificationObserver : public NotificationObserver { | 35 class RedirectNotificationObserver : public NotificationObserver { |
34 public: | 36 public: |
35 // Register to listen for notifications of the given type from either a | 37 // Register to listen for notifications of the given type from either a |
36 // specific source, or from all sources if |source| is | 38 // specific source, or from all sources if |source| is |
37 // NotificationService::AllSources(). | 39 // NotificationService::AllSources(). |
(...skipping 276 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
314 // TODO(lazyboy): Find a better way to avoid sleeping like this. See | 316 // TODO(lazyboy): Find a better way to avoid sleeping like this. See |
315 // http://crbug.com/405282 for details. | 317 // http://crbug.com/405282 for details. |
316 base::RunLoop run_loop; | 318 base::RunLoop run_loop; |
317 base::MessageLoop::current()->PostDelayedTask( | 319 base::MessageLoop::current()->PostDelayedTask( |
318 FROM_HERE, run_loop.QuitClosure(), | 320 FROM_HERE, run_loop.QuitClosure(), |
319 base::TimeDelta::FromMilliseconds(10)); | 321 base::TimeDelta::FromMilliseconds(10)); |
320 run_loop.Run(); | 322 run_loop.Run(); |
321 } | 323 } |
322 } | 324 } |
323 | 325 |
326 // Ensure that OOPIFs are deleted after navigating to a new main frame. | |
327 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, CleanupCrossSiteIframe) { | |
328 GURL main_url(embedded_test_server()->GetURL("/site_per_process_main.html")); | |
329 NavigateToURL(shell(), main_url); | |
330 | |
331 // It is safe to obtain the root frame tree node here, as it doesn't change. | |
332 FrameTreeNode* root = | |
333 static_cast<WebContentsImpl*>(shell()->web_contents())-> | |
334 GetFrameTree()->root(); | |
335 | |
336 TestNavigationObserver observer(shell()->web_contents()); | |
337 | |
338 // Load a cross-site page into both iframes. | |
339 GURL foo_url = embedded_test_server()->GetURL("foo.com", "/title2.html"); | |
340 NavigateFrameToURL(root->child_at(0), foo_url); | |
341 EXPECT_TRUE(observer.last_navigation_succeeded()); | |
342 EXPECT_EQ(foo_url, observer.last_navigation_url()); | |
343 NavigateFrameToURL(root->child_at(1), foo_url); | |
344 EXPECT_TRUE(observer.last_navigation_succeeded()); | |
345 EXPECT_EQ(foo_url, observer.last_navigation_url()); | |
ncarter (slow)
2015/04/06 21:13:38
These tests are looking so compact and tidy :)
| |
346 | |
347 // Ensure that we have created a new process for the subframes. | |
348 ASSERT_EQ(2U, root->child_count()); | |
349 EXPECT_NE(shell()->web_contents()->GetSiteInstance(), | |
350 root->child_at(0)->current_frame_host()->GetSiteInstance()); | |
351 EXPECT_EQ(root->child_at(0)->current_frame_host()->GetSiteInstance(), | |
352 root->child_at(1)->current_frame_host()->GetSiteInstance()); | |
353 | |
354 // Use Javascript in the parent to remove one of the frames and ensure that | |
355 // the subframe goes away. | |
356 EXPECT_TRUE(ExecuteScript(shell()->web_contents(), | |
357 "document.body.removeChild(" | |
358 "document.querySelectorAll('iframe')[0])")); | |
359 ASSERT_EQ(1U, root->child_count()); | |
360 | |
361 // Load a new same-site page in the top-level frame and ensure the other | |
362 // subframe goes away. | |
363 GURL new_url(embedded_test_server()->GetURL("/title1.html")); | |
364 NavigateToURL(shell(), new_url); | |
365 ASSERT_EQ(0U, root->child_count()); | |
366 } | |
367 | |
368 // Ensure that root frames cannot be detached. | |
369 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, RestrictFrameDetach) { | |
370 GURL main_url(embedded_test_server()->GetURL("/site_per_process_main.html")); | |
371 NavigateToURL(shell(), main_url); | |
372 | |
373 // It is safe to obtain the root frame tree node here, as it doesn't change. | |
374 FrameTreeNode* root = | |
375 static_cast<WebContentsImpl*>(shell()->web_contents())-> | |
376 GetFrameTree()->root(); | |
377 | |
378 TestNavigationObserver observer(shell()->web_contents()); | |
379 | |
380 // Load cross-site pages into both iframes. | |
381 GURL foo_url = embedded_test_server()->GetURL("foo.com", "/title2.html"); | |
382 NavigateFrameToURL(root->child_at(0), foo_url); | |
383 EXPECT_TRUE(observer.last_navigation_succeeded()); | |
384 EXPECT_EQ(foo_url, observer.last_navigation_url()); | |
385 GURL bar_url = embedded_test_server()->GetURL("bar.com", "/title2.html"); | |
386 NavigateFrameToURL(root->child_at(1), bar_url); | |
387 EXPECT_TRUE(observer.last_navigation_succeeded()); | |
388 EXPECT_EQ(bar_url, observer.last_navigation_url()); | |
389 | |
390 // Ensure that we have created new processes for the subframes. | |
391 ASSERT_EQ(2U, root->child_count()); | |
392 FrameTreeNode* foo_child = root->child_at(0); | |
393 SiteInstance* foo_site_instance = | |
394 foo_child->current_frame_host()->GetSiteInstance(); | |
395 EXPECT_NE(shell()->web_contents()->GetSiteInstance(), foo_site_instance); | |
396 FrameTreeNode* bar_child = root->child_at(1); | |
397 SiteInstance* bar_site_instance = | |
398 bar_child->current_frame_host()->GetSiteInstance(); | |
399 EXPECT_NE(shell()->web_contents()->GetSiteInstance(), bar_site_instance); | |
400 | |
401 // Simulate an attempt to detach the root frame from foo_site_instance. This | |
402 // should kill foo_site_instance's process. | |
403 RenderFrameProxyHost* foo_mainframe_rfph = | |
404 root->render_manager()->GetRenderFrameProxyHost(foo_site_instance); | |
405 content::RenderProcessHostWatcher foo_terminated( | |
406 foo_mainframe_rfph->GetProcess(), | |
407 content::RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); | |
408 FrameHostMsg_Detach evil_msg2(foo_mainframe_rfph->GetRoutingID()); | |
409 IPC::IpcSecurityTestUtil::PwnMessageReceived( | |
ncarter (slow)
2015/04/06 21:13:38
:)
| |
410 foo_mainframe_rfph->GetProcess()->GetChannel(), evil_msg2); | |
411 foo_terminated.Wait(); | |
412 } | |
413 | |
324 // Disabled for flaky crashing: crbug.com/446575 | 414 // Disabled for flaky crashing: crbug.com/446575 |
325 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, | 415 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, |
326 NavigateRemoteFrame) { | 416 NavigateRemoteFrame) { |
327 GURL main_url(embedded_test_server()->GetURL("/site_per_process_main.html")); | 417 GURL main_url(embedded_test_server()->GetURL("/site_per_process_main.html")); |
328 NavigateToURL(shell(), main_url); | 418 NavigateToURL(shell(), main_url); |
329 | 419 |
330 // It is safe to obtain the root frame tree node here, as it doesn't change. | 420 // It is safe to obtain the root frame tree node here, as it doesn't change. |
331 FrameTreeNode* root = | 421 FrameTreeNode* root = |
332 static_cast<WebContentsImpl*>(shell()->web_contents())-> | 422 static_cast<WebContentsImpl*>(shell()->web_contents())-> |
333 GetFrameTree()->root(); | 423 GetFrameTree()->root(); |
(...skipping 1391 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1725 TitleWatcher title_watcher(shell()->web_contents(), expected_title); | 1815 TitleWatcher title_watcher(shell()->web_contents(), expected_title); |
1726 TestNavigationObserver observer(shell()->web_contents()); | 1816 TestNavigationObserver observer(shell()->web_contents()); |
1727 NavigateFrameToURL(root->child_at(0), foo_url); | 1817 NavigateFrameToURL(root->child_at(0), foo_url); |
1728 EXPECT_TRUE(observer.last_navigation_succeeded()); | 1818 EXPECT_TRUE(observer.last_navigation_succeeded()); |
1729 EXPECT_EQ(foo_url, observer.last_navigation_url()); | 1819 EXPECT_EQ(foo_url, observer.last_navigation_url()); |
1730 EXPECT_EQ(title_watcher.WaitAndGetTitle(), expected_title); | 1820 EXPECT_EQ(title_watcher.WaitAndGetTitle(), expected_title); |
1731 } | 1821 } |
1732 } | 1822 } |
1733 | 1823 |
1734 } // namespace content | 1824 } // namespace content |
OLD | NEW |