Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <stddef.h> | 5 #include <stddef.h> |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 #include <utility> | 8 #include <utility> |
| 9 | 9 |
| 10 #include "base/callback.h" | 10 #include "base/callback.h" |
| 11 #include "base/macros.h" | 11 #include "base/macros.h" |
| 12 #include "base/run_loop.h" | 12 #include "base/run_loop.h" |
| 13 #include "chrome/browser/extensions/browser_action_test_util.h" | 13 #include "chrome/browser/extensions/browser_action_test_util.h" |
| 14 #include "chrome/browser/extensions/extension_browsertest.h" | 14 #include "chrome/browser/extensions/extension_browsertest.h" |
| 15 #include "chrome/browser/extensions/extension_service.h" | 15 #include "chrome/browser/extensions/extension_service.h" |
| 16 #include "chrome/browser/extensions/test_extension_dir.h" | 16 #include "chrome/browser/extensions/test_extension_dir.h" |
| 17 #include "chrome/browser/ui/tabs/tab_strip_model.h" | 17 #include "chrome/browser/ui/tabs/tab_strip_model.h" |
| 18 #include "chrome/common/extensions/extension_process_policy.h" | 18 #include "chrome/common/extensions/extension_process_policy.h" |
| 19 #include "chrome/common/pref_names.h" | |
| 19 #include "chrome/test/base/in_process_browser_test.h" | 20 #include "chrome/test/base/in_process_browser_test.h" |
| 20 #include "chrome/test/base/ui_test_utils.h" | 21 #include "chrome/test/base/ui_test_utils.h" |
| 21 #include "content/public/browser/notification_service.h" | 22 #include "content/public/browser/notification_service.h" |
| 22 #include "content/public/browser/render_frame_host.h" | 23 #include "content/public/browser/render_frame_host.h" |
| 23 #include "content/public/browser/render_process_host.h" | 24 #include "content/public/browser/render_process_host.h" |
| 24 #include "content/public/browser/web_contents.h" | 25 #include "content/public/browser/web_contents.h" |
| 25 #include "content/public/test/browser_test_utils.h" | 26 #include "content/public/test/browser_test_utils.h" |
| 27 #include "content/public/test/test_navigation_observer.h" | |
| 26 #include "content/public/test/test_utils.h" | 28 #include "content/public/test/test_utils.h" |
| 27 #include "extensions/browser/process_manager.h" | 29 #include "extensions/browser/process_manager.h" |
| 28 #include "extensions/common/value_builder.h" | 30 #include "extensions/common/value_builder.h" |
| 29 #include "extensions/test/background_page_watcher.h" | 31 #include "extensions/test/background_page_watcher.h" |
| 30 #include "net/dns/mock_host_resolver.h" | 32 #include "net/dns/mock_host_resolver.h" |
| 31 #include "net/test/embedded_test_server/embedded_test_server.h" | 33 #include "net/test/embedded_test_server/embedded_test_server.h" |
| 32 | 34 |
| 33 namespace extensions { | 35 namespace extensions { |
| 34 | 36 |
| 35 namespace { | 37 namespace { |
| 36 | 38 |
| 37 void AddFrameToSet(std::set<content::RenderFrameHost*>* frames, | 39 void AddFrameToSet(std::set<content::RenderFrameHost*>* frames, |
| 38 content::RenderFrameHost* rfh) { | 40 content::RenderFrameHost* rfh) { |
| 39 if (rfh->IsRenderFrameLive()) | 41 if (rfh->IsRenderFrameLive()) |
| 40 frames->insert(rfh); | 42 frames->insert(rfh); |
| 41 } | 43 } |
| 42 | 44 |
| 45 GURL CreateBlobURL(content::RenderFrameHost* frame, | |
| 46 const std::string& content) { | |
| 47 std::string blob_url_string; | |
| 48 EXPECT_TRUE(ExecuteScriptAndExtractString( | |
| 49 frame, | |
| 50 "var blob = new Blob(['<html><body>" + content + "</body></html>']," | |
|
Devlin
2016/09/15 21:05:10
nit: \n at the end (everywhere like this)
alexmos
2016/09/15 21:45:59
Done.
| |
| 51 " {type: 'text/html'});" | |
| 52 "domAutomationController.send(URL.createObjectURL(blob));", | |
| 53 &blob_url_string)); | |
| 54 GURL blob_url(blob_url_string); | |
| 55 EXPECT_TRUE(blob_url.is_valid()); | |
| 56 EXPECT_TRUE(blob_url.SchemeIsBlob()); | |
| 57 return blob_url; | |
| 58 } | |
| 59 | |
| 60 GURL CreateFileSystemURL(content::RenderFrameHost* frame, | |
| 61 const std::string& content) { | |
| 62 std::string filesystem_url_string; | |
| 63 EXPECT_TRUE(ExecuteScriptAndExtractString( | |
| 64 frame, | |
| 65 "var blob = new Blob(['<html><body>" + content + "</body></html>']," | |
| 66 " {type: 'text/html'});" | |
| 67 "window.webkitRequestFileSystem(TEMPORARY, blob.size, fs => {" | |
| 68 " fs.root.getFile('foo.html', {create: true}, file => {" | |
| 69 " file.createWriter(writer => {" | |
| 70 " writer.write(blob);" | |
| 71 " writer.onwriteend = () => {" | |
| 72 " domAutomationController.send(file.toURL());" | |
| 73 " }" | |
| 74 " });" | |
| 75 " });" | |
| 76 "});", | |
| 77 &filesystem_url_string)); | |
| 78 GURL filesystem_url(filesystem_url_string); | |
| 79 EXPECT_TRUE(filesystem_url.is_valid()); | |
| 80 EXPECT_TRUE(filesystem_url.SchemeIsFileSystem()); | |
| 81 return filesystem_url; | |
| 82 } | |
| 83 | |
| 84 std::string GetTextContent(content::RenderFrameHost* frame) { | |
| 85 std::string result; | |
| 86 EXPECT_TRUE(ExecuteScriptAndExtractString( | |
| 87 frame, "domAutomationController.send(document.body.innerText)", &result)); | |
| 88 return result; | |
| 89 } | |
| 90 | |
| 43 } // namespace | 91 } // namespace |
| 44 | 92 |
| 45 // Takes a snapshot of all frames upon construction. When Wait() is called, a | 93 // Takes a snapshot of all frames upon construction. When Wait() is called, a |
| 46 // MessageLoop is created and Quit when all previously recorded frames are | 94 // MessageLoop is created and Quit when all previously recorded frames are |
| 47 // either present in the tab, or deleted. If a navigation happens between the | 95 // either present in the tab, or deleted. If a navigation happens between the |
| 48 // construction and the Wait() call, then this logic ensures that all obsolete | 96 // construction and the Wait() call, then this logic ensures that all obsolete |
| 49 // RenderFrameHosts have been destructed when Wait() returns. | 97 // RenderFrameHosts have been destructed when Wait() returns. |
| 50 // See also the comment at ProcessManagerBrowserTest::NavigateToURL. | 98 // See also the comment at ProcessManagerBrowserTest::NavigateToURL. |
| 51 class NavigationCompletedObserver : public content::WebContentsObserver { | 99 class NavigationCompletedObserver : public content::WebContentsObserver { |
| 52 public: | 100 public: |
| (...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 157 observer.Wait(); | 205 observer.Wait(); |
| 158 } | 206 } |
| 159 | 207 |
| 160 size_t IfExtensionsIsolated(size_t if_enabled, size_t if_disabled) { | 208 size_t IfExtensionsIsolated(size_t if_enabled, size_t if_disabled) { |
| 161 return content::AreAllSitesIsolatedForTesting() || | 209 return content::AreAllSitesIsolatedForTesting() || |
| 162 IsIsolateExtensionsEnabled() | 210 IsIsolateExtensionsEnabled() |
| 163 ? if_enabled | 211 ? if_enabled |
| 164 : if_disabled; | 212 : if_disabled; |
| 165 } | 213 } |
| 166 | 214 |
| 215 content::WebContents* OpenPopup(content::RenderFrameHost* opener, | |
| 216 const GURL& url) { | |
| 217 content::WindowedNotificationObserver popup_observer( | |
| 218 chrome::NOTIFICATION_TAB_ADDED, | |
| 219 content::NotificationService::AllSources()); | |
| 220 EXPECT_TRUE(ExecuteScript(opener, "window.open('" + url.spec() + "')")); | |
| 221 popup_observer.Wait(); | |
| 222 content::WebContents* popup = | |
| 223 browser()->tab_strip_model()->GetActiveWebContents(); | |
| 224 WaitForLoadStop(popup); | |
| 225 EXPECT_EQ(url, popup->GetMainFrame()->GetLastCommittedURL()); | |
| 226 return popup; | |
| 227 } | |
| 228 | |
| 167 private: | 229 private: |
| 168 std::vector<std::unique_ptr<TestExtensionDir>> temp_dirs_; | 230 std::vector<std::unique_ptr<TestExtensionDir>> temp_dirs_; |
| 169 }; | 231 }; |
| 170 | 232 |
| 171 // Test that basic extension loading creates the appropriate ExtensionHosts | 233 // Test that basic extension loading creates the appropriate ExtensionHosts |
| 172 // and background pages. | 234 // and background pages. |
| 173 IN_PROC_BROWSER_TEST_F(ProcessManagerBrowserTest, | 235 IN_PROC_BROWSER_TEST_F(ProcessManagerBrowserTest, |
| 174 ExtensionHostCreation) { | 236 ExtensionHostCreation) { |
| 175 ProcessManager* pm = ProcessManager::Get(profile()); | 237 ProcessManager* pm = ProcessManager::Get(profile()); |
| 176 | 238 |
| (...skipping 391 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 568 ExecuteScriptInBackgroundPageNoWait( | 630 ExecuteScriptInBackgroundPageNoWait( |
| 569 extension->id(), | 631 extension->id(), |
| 570 "document.cookie = 'extension_cookie';" | 632 "document.cookie = 'extension_cookie';" |
| 571 "window.domAutomationController.send(document.cookie);"); | 633 "window.domAutomationController.send(document.cookie);"); |
| 572 std::string message; | 634 std::string message; |
| 573 ASSERT_TRUE(queue.WaitForMessage(&message)); | 635 ASSERT_TRUE(queue.WaitForMessage(&message)); |
| 574 EXPECT_EQ(message, "\"extension_cookie\""); | 636 EXPECT_EQ(message, "\"extension_cookie\""); |
| 575 } | 637 } |
| 576 } | 638 } |
| 577 | 639 |
| 640 // Test that navigations to blob: and filesystem: URLs with extension origins | |
| 641 // are disallowed when initiated from non-extension processes. See | |
| 642 // https://crbug.com/645028 and https://crbug.com/644426. | |
| 643 IN_PROC_BROWSER_TEST_F(ProcessManagerBrowserTest, | |
| 644 NestedURLNavigationsToExtensionBlocked) { | |
| 645 // Disabling web security is necessary to test the browser enforcement; | |
| 646 // without it, the loads in this test would be blocked by | |
| 647 // SecurityOrigin::canDisplay() as invalid local resource loads. | |
| 648 PrefService* prefs = browser()->profile()->GetPrefs(); | |
| 649 prefs->SetBoolean(prefs::kWebKitWebSecurityEnabled, false); | |
| 650 | |
| 651 // Create a simple extension without a background page. | |
| 652 const Extension* extension = CreateExtension("Extension", false); | |
| 653 embedded_test_server()->ServeFilesFromDirectory(extension->path()); | |
| 654 ASSERT_TRUE(embedded_test_server()->Start()); | |
| 655 | |
| 656 // Navigate main tab to a web page with two web iframes. There should be no | |
| 657 // extension frames yet. | |
| 658 NavigateToURL(embedded_test_server()->GetURL("/two_iframes.html")); | |
| 659 ProcessManager* pm = ProcessManager::Get(profile()); | |
| 660 EXPECT_EQ(0u, pm->GetAllFrames().size()); | |
| 661 EXPECT_EQ(0u, pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 662 | |
| 663 content::WebContents* tab = | |
| 664 browser()->tab_strip_model()->GetActiveWebContents(); | |
| 665 | |
| 666 // Navigate first subframe to an extension URL. With --isolate-extensions, | |
| 667 // this will go into a new extension process. | |
| 668 const GURL extension_url(extension->url().Resolve("empty.html")); | |
| 669 EXPECT_TRUE(content::NavigateIframeToURL(tab, "frame1", extension_url)); | |
| 670 EXPECT_EQ(IfExtensionsIsolated(1, 0), | |
| 671 pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 672 EXPECT_EQ(IfExtensionsIsolated(1, 0), pm->GetAllFrames().size()); | |
|
nasko
2016/09/15 18:36:01
What about testing for not --isolate-extensions ca
alexmos
2016/09/15 18:40:12
Oh yeah, I should've mentioned this. Up until upl
nasko
2016/09/15 18:50:03
I don't think you need to turn of --isolate-extens
alexmos
2016/09/15 20:51:42
Agreed, let's plan on doing that.
| |
| 673 | |
| 674 content::RenderFrameHost* main_frame = tab->GetMainFrame(); | |
| 675 content::RenderFrameHost* extension_frame = ChildFrameAt(main_frame, 0); | |
| 676 | |
| 677 // Open a new about:blank popup from main frame. This should stay in the web | |
| 678 // process. | |
| 679 content::WebContents* popup = | |
| 680 OpenPopup(main_frame, GURL(url::kAboutBlankURL)); | |
| 681 EXPECT_NE(popup, tab); | |
| 682 ASSERT_EQ(2, browser()->tab_strip_model()->count()); | |
| 683 EXPECT_EQ(IfExtensionsIsolated(1, 0), | |
| 684 pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 685 EXPECT_EQ(IfExtensionsIsolated(1, 0), pm->GetAllFrames().size()); | |
| 686 | |
| 687 // Create valid blob and filesystem URLs in the extension's origin. | |
| 688 url::Origin extension_origin(extension_frame->GetLastCommittedOrigin()); | |
| 689 GURL blob_url(CreateBlobURL(extension_frame, "foo")); | |
| 690 EXPECT_EQ(extension_origin, url::Origin(blob_url)); | |
| 691 GURL filesystem_url(CreateFileSystemURL(extension_frame, "foo")); | |
| 692 EXPECT_EQ(extension_origin, url::Origin(filesystem_url)); | |
| 693 | |
| 694 // Navigate the popup to each nested URL with extension origin. | |
| 695 GURL nested_urls[] = {blob_url, filesystem_url}; | |
| 696 for (size_t i = 0; i < arraysize(nested_urls); i++) { | |
| 697 content::TestNavigationObserver observer(popup); | |
| 698 EXPECT_TRUE(ExecuteScript( | |
| 699 popup, "location.href = '" + nested_urls[i].spec() + "';")); | |
| 700 observer.Wait(); | |
| 701 | |
| 702 // This is a top-level navigation that should be blocked since it | |
| 703 // originates from a non-extension process. Ensure that the error page | |
| 704 // doesn't commit an extension URL or origin. | |
| 705 EXPECT_NE(nested_urls[i], popup->GetLastCommittedURL()); | |
| 706 EXPECT_FALSE(extension_origin.IsSameOriginWith( | |
| 707 popup->GetMainFrame()->GetLastCommittedOrigin())); | |
| 708 EXPECT_NE("foo", GetTextContent(popup->GetMainFrame())); | |
| 709 | |
| 710 EXPECT_EQ(IfExtensionsIsolated(1, 0), | |
| 711 pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 712 EXPECT_EQ(IfExtensionsIsolated(1, 0), pm->GetAllFrames().size()); | |
| 713 } | |
| 714 | |
| 715 // Navigate second subframe to each nested URL from the main frame (i.e., | |
| 716 // from non-extension process). | |
| 717 // | |
| 718 // TODO(alexmos): Currently, this is still allowed due to unblessed extension | |
| 719 // contexts, but in the future such subframe navigations from non-extension | |
| 720 // processes should be blocked when unblessed contexts go away with | |
| 721 // --isolate-extensions. | |
| 722 for (size_t i = 0; i < arraysize(nested_urls); i++) { | |
| 723 EXPECT_TRUE(content::NavigateIframeToURL(tab, "frame2", nested_urls[i])); | |
| 724 content::RenderFrameHost* second_frame = ChildFrameAt(main_frame, 1); | |
| 725 EXPECT_EQ(nested_urls[i], second_frame->GetLastCommittedURL()); | |
| 726 EXPECT_EQ(extension_origin, second_frame->GetLastCommittedOrigin()); | |
| 727 EXPECT_EQ("foo", GetTextContent(second_frame)); | |
| 728 EXPECT_EQ(IfExtensionsIsolated(2, 0), | |
| 729 pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 730 EXPECT_EQ(IfExtensionsIsolated(2, 0), pm->GetAllFrames().size()); | |
| 731 } | |
| 732 } | |
| 733 | |
| 734 // Test that navigations to blob: and filesystem: URLs with extension origins | |
| 735 // are allowed when initiated from extension processes. See | |
| 736 // https://crbug.com/645028 and https://crbug.com/644426. | |
| 737 IN_PROC_BROWSER_TEST_F(ProcessManagerBrowserTest, | |
| 738 NestedURLNavigationsToExtensionAllowed) { | |
| 739 // Create a simple extension without a background page. | |
| 740 const Extension* extension = CreateExtension("Extension", false); | |
| 741 embedded_test_server()->ServeFilesFromDirectory(extension->path()); | |
| 742 ASSERT_TRUE(embedded_test_server()->Start()); | |
| 743 | |
| 744 // Navigate main tab to an extension URL with a blank subframe. | |
| 745 const GURL extension_url(extension->url().Resolve("blank_iframe.html")); | |
| 746 NavigateToURL(extension_url); | |
| 747 ProcessManager* pm = ProcessManager::Get(profile()); | |
| 748 EXPECT_EQ(2u, pm->GetAllFrames().size()); | |
| 749 EXPECT_EQ(2u, pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 750 | |
| 751 content::WebContents* tab = | |
| 752 browser()->tab_strip_model()->GetActiveWebContents(); | |
| 753 content::RenderFrameHost* main_frame = tab->GetMainFrame(); | |
| 754 | |
| 755 // Create blob and filesystem URLs in the extension's origin. | |
| 756 url::Origin extension_origin(main_frame->GetLastCommittedOrigin()); | |
| 757 GURL blob_url(CreateBlobURL(main_frame, "foo")); | |
| 758 EXPECT_EQ(extension_origin, url::Origin(blob_url)); | |
| 759 GURL filesystem_url(CreateFileSystemURL(main_frame, "foo")); | |
| 760 EXPECT_EQ(extension_origin, url::Origin(filesystem_url)); | |
| 761 | |
| 762 // From the main frame, navigate its subframe to each nested URL. This | |
| 763 // should be allowed and should stay in the extension process. | |
| 764 GURL nested_urls[] = {blob_url, filesystem_url}; | |
| 765 for (size_t i = 0; i < arraysize(nested_urls); i++) { | |
| 766 EXPECT_TRUE(content::NavigateIframeToURL(tab, "frame0", nested_urls[i])); | |
| 767 content::RenderFrameHost* child = ChildFrameAt(main_frame, 0); | |
| 768 EXPECT_EQ(nested_urls[i], child->GetLastCommittedURL()); | |
| 769 EXPECT_EQ(extension_origin, child->GetLastCommittedOrigin()); | |
| 770 EXPECT_EQ("foo", GetTextContent(child)); | |
| 771 EXPECT_EQ(2u, pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 772 EXPECT_EQ(2u, pm->GetAllFrames().size()); | |
| 773 } | |
| 774 | |
| 775 // From the main frame, create a blank popup and navigate it to each nested | |
| 776 // URL. This should also be allowed, since the navigation originated from an | |
| 777 // extension process. | |
| 778 for (size_t i = 0; i < arraysize(nested_urls); i++) { | |
| 779 content::WebContents* popup = | |
| 780 OpenPopup(main_frame, GURL(url::kAboutBlankURL)); | |
|
alexmos
2016/09/15 17:43:02
Unfortunately, I couldn't just pass the nested URL
| |
| 781 EXPECT_NE(popup, tab); | |
| 782 | |
| 783 content::TestNavigationObserver observer(popup); | |
| 784 EXPECT_TRUE(ExecuteScript( | |
| 785 popup, "location.href = '" + nested_urls[i].spec() + "';")); | |
| 786 observer.Wait(); | |
| 787 | |
| 788 EXPECT_EQ(nested_urls[i], popup->GetLastCommittedURL()); | |
| 789 EXPECT_EQ(extension_origin, | |
| 790 popup->GetMainFrame()->GetLastCommittedOrigin()); | |
| 791 EXPECT_EQ("foo", GetTextContent(popup->GetMainFrame())); | |
| 792 | |
| 793 EXPECT_EQ(3 + i, | |
| 794 pm->GetRenderFrameHostsForExtension(extension->id()).size()); | |
| 795 EXPECT_EQ(3 + i, pm->GetAllFrames().size()); | |
| 796 } | |
| 797 } | |
| 798 | |
| 578 } // namespace extensions | 799 } // namespace extensions |
| OLD | NEW |