| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "extensions/browser/process_manager.h" | 5 #include "extensions/browser/process_manager.h" |
| 6 | 6 |
| 7 #include "chrome/browser/chrome_notification_types.h" | 7 #include "chrome/browser/chrome_notification_types.h" |
| 8 #include "components/keyed_service/content/browser_context_dependency_manager.h" | |
| 9 #include "content/public/browser/content_browser_client.h" | 8 #include "content/public/browser/content_browser_client.h" |
| 10 #include "content/public/browser/notification_service.h" | 9 #include "content/public/browser/notification_service.h" |
| 11 #include "content/public/browser/site_instance.h" | 10 #include "content/public/browser/site_instance.h" |
| 12 #include "content/public/test/test_browser_context.h" | 11 #include "content/public/test/test_browser_context.h" |
| 13 #include "extensions/browser/process_manager_delegate.h" | |
| 14 #include "extensions/browser/test_extensions_browser_client.h" | 12 #include "extensions/browser/test_extensions_browser_client.h" |
| 15 #include "testing/gtest/include/gtest/gtest.h" | 13 #include "testing/gtest/include/gtest/gtest.h" |
| 16 | 14 |
| 17 using content::BrowserContext; | 15 using content::BrowserContext; |
| 18 using content::SiteInstance; | 16 using content::SiteInstance; |
| 19 using content::TestBrowserContext; | 17 using content::TestBrowserContext; |
| 20 | 18 |
| 21 namespace extensions { | 19 namespace extensions { |
| 22 | 20 |
| 23 namespace { | 21 namespace { |
| 24 | 22 |
| 25 // An incognito version of a TestBrowserContext. | 23 // An incognito version of a TestBrowserContext. |
| 26 class TestBrowserContextIncognito : public TestBrowserContext { | 24 class TestBrowserContextIncognito : public TestBrowserContext { |
| 27 public: | 25 public: |
| 28 TestBrowserContextIncognito() {} | 26 TestBrowserContextIncognito() {} |
| 29 virtual ~TestBrowserContextIncognito() {} | 27 virtual ~TestBrowserContextIncognito() {} |
| 30 | 28 |
| 31 // TestBrowserContext implementation. | 29 // TestBrowserContext implementation. |
| 32 virtual bool IsOffTheRecord() const OVERRIDE { return true; } | 30 virtual bool IsOffTheRecord() const OVERRIDE { return true; } |
| 33 | 31 |
| 34 private: | 32 private: |
| 35 DISALLOW_COPY_AND_ASSIGN(TestBrowserContextIncognito); | 33 DISALLOW_COPY_AND_ASSIGN(TestBrowserContextIncognito); |
| 36 }; | 34 }; |
| 37 | 35 |
| 38 // A trivial ProcessManagerDelegate. | |
| 39 class TestProcessManagerDelegate : public ProcessManagerDelegate { | |
| 40 public: | |
| 41 TestProcessManagerDelegate() | |
| 42 : is_background_page_allowed_(true), | |
| 43 defer_creating_startup_background_hosts_(false) {} | |
| 44 virtual ~TestProcessManagerDelegate() {} | |
| 45 | |
| 46 // ProcessManagerDelegate implementation. | |
| 47 virtual bool IsBackgroundPageAllowed(BrowserContext* context) const OVERRIDE { | |
| 48 return is_background_page_allowed_; | |
| 49 } | |
| 50 virtual bool DeferCreatingStartupBackgroundHosts( | |
| 51 BrowserContext* context) const OVERRIDE { | |
| 52 return defer_creating_startup_background_hosts_; | |
| 53 } | |
| 54 | |
| 55 bool is_background_page_allowed_; | |
| 56 bool defer_creating_startup_background_hosts_; | |
| 57 }; | |
| 58 | |
| 59 } // namespace | 36 } // namespace |
| 60 | 37 |
| 61 class ProcessManagerTest : public testing::Test { | 38 class ProcessManagerTest : public testing::Test { |
| 62 public: | 39 public: |
| 63 ProcessManagerTest() : extensions_browser_client_(&original_context_) { | 40 ProcessManagerTest() : extensions_browser_client_(&original_context_) { |
| 64 extensions_browser_client_.SetIncognitoContext(&incognito_context_); | 41 extensions_browser_client_.SetIncognitoContext(&incognito_context_); |
| 65 extensions_browser_client_.set_process_manager_delegate( | |
| 66 &process_manager_delegate_); | |
| 67 ExtensionsBrowserClient::Set(&extensions_browser_client_); | 42 ExtensionsBrowserClient::Set(&extensions_browser_client_); |
| 68 } | 43 } |
| 69 | 44 |
| 70 virtual ~ProcessManagerTest() { | 45 virtual ~ProcessManagerTest() { |
| 71 ExtensionsBrowserClient::Set(NULL); | 46 ExtensionsBrowserClient::Set(NULL); |
| 72 } | 47 } |
| 73 | 48 |
| 74 BrowserContext* original_context() { return &original_context_; } | 49 BrowserContext* original_context() { return &original_context_; } |
| 75 BrowserContext* incognito_context() { return &incognito_context_; } | 50 BrowserContext* incognito_context() { return &incognito_context_; } |
| 76 | 51 |
| 77 // testing::Test implementation. | |
| 78 virtual void SetUp() OVERRIDE { | |
| 79 // Needed for ExtensionRegistry. | |
| 80 BrowserContextDependencyManager::GetInstance() | |
| 81 ->CreateBrowserContextServicesForTest(&original_context_); | |
| 82 BrowserContextDependencyManager::GetInstance() | |
| 83 ->CreateBrowserContextServicesForTest(&incognito_context_); | |
| 84 } | |
| 85 | |
| 86 virtual void TearDown() OVERRIDE { | |
| 87 // Needed to clean up ExtensionRegistry. | |
| 88 BrowserContextDependencyManager::GetInstance() | |
| 89 ->DestroyBrowserContextServices(&incognito_context_); | |
| 90 BrowserContextDependencyManager::GetInstance() | |
| 91 ->DestroyBrowserContextServices(&original_context_); | |
| 92 } | |
| 93 | |
| 94 // Returns true if the notification |type| is registered for |manager| with | 52 // Returns true if the notification |type| is registered for |manager| with |
| 95 // source |context|. Pass NULL for |context| for all sources. | 53 // source |context|. Pass NULL for |context| for all sources. |
| 96 static bool IsRegistered(ProcessManager* manager, | 54 static bool IsRegistered(ProcessManager* manager, |
| 97 int type, | 55 int type, |
| 98 BrowserContext* context) { | 56 BrowserContext* context) { |
| 99 return manager->registrar_.IsRegistered( | 57 return manager->registrar_.IsRegistered( |
| 100 manager, type, content::Source<BrowserContext>(context)); | 58 manager, type, content::Source<BrowserContext>(context)); |
| 101 } | 59 } |
| 102 | 60 |
| 103 protected: | 61 private: |
| 104 TestBrowserContext original_context_; | 62 TestBrowserContext original_context_; |
| 105 TestBrowserContextIncognito incognito_context_; | 63 TestBrowserContextIncognito incognito_context_; |
| 106 TestProcessManagerDelegate process_manager_delegate_; | |
| 107 TestExtensionsBrowserClient extensions_browser_client_; | 64 TestExtensionsBrowserClient extensions_browser_client_; |
| 108 | 65 |
| 109 DISALLOW_COPY_AND_ASSIGN(ProcessManagerTest); | 66 DISALLOW_COPY_AND_ASSIGN(ProcessManagerTest); |
| 110 }; | 67 }; |
| 111 | 68 |
| 112 // Test that notification registration works properly. | 69 // Test that notification registration works properly. |
| 113 TEST_F(ProcessManagerTest, ExtensionNotificationRegistration) { | 70 TEST_F(ProcessManagerTest, ExtensionNotificationRegistration) { |
| 114 // Test for a normal context ProcessManager. | 71 // Test for a normal context ProcessManager. |
| 115 scoped_ptr<ProcessManager> manager1( | 72 scoped_ptr<ProcessManager> manager1( |
| 116 ProcessManager::Create(original_context())); | 73 ProcessManager::Create(original_context())); |
| (...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 161 EXPECT_FALSE(IsRegistered(manager2.get(), | 118 EXPECT_FALSE(IsRegistered(manager2.get(), |
| 162 chrome::NOTIFICATION_EXTENSIONS_READY, | 119 chrome::NOTIFICATION_EXTENSIONS_READY, |
| 163 original_context())); | 120 original_context())); |
| 164 | 121 |
| 165 // This notification is observed for incognito contexts only. | 122 // This notification is observed for incognito contexts only. |
| 166 EXPECT_TRUE(IsRegistered(manager2.get(), | 123 EXPECT_TRUE(IsRegistered(manager2.get(), |
| 167 chrome::NOTIFICATION_PROFILE_DESTROYED, | 124 chrome::NOTIFICATION_PROFILE_DESTROYED, |
| 168 incognito_context())); | 125 incognito_context())); |
| 169 } | 126 } |
| 170 | 127 |
| 171 // Test that startup background hosts are created when the extension system | |
| 172 // becomes ready. | |
| 173 // | |
| 174 // NOTE: This test and those that follow do not try to create ExtensionsHosts | |
| 175 // because ExtensionHost is tightly coupled to WebContents and can't be | |
| 176 // constructed in unit tests. | |
| 177 TEST_F(ProcessManagerTest, CreateBackgroundHostsOnExtensionsReady) { | |
| 178 scoped_ptr<ProcessManager> manager( | |
| 179 ProcessManager::Create(original_context())); | |
| 180 ASSERT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 181 | |
| 182 // Simulate the extension system becoming ready. | |
| 183 content::NotificationService::current()->Notify( | |
| 184 chrome::NOTIFICATION_EXTENSIONS_READY, | |
| 185 content::Source<BrowserContext>(original_context()), | |
| 186 content::NotificationService::NoDetails()); | |
| 187 EXPECT_TRUE(manager->startup_background_hosts_created_for_test()); | |
| 188 } | |
| 189 | |
| 190 // Test that startup background hosts can be created explicitly before the | |
| 191 // extension system is ready (this is the normal pattern in Chrome). | |
| 192 TEST_F(ProcessManagerTest, CreateBackgroundHostsExplicitly) { | |
| 193 scoped_ptr<ProcessManager> manager( | |
| 194 ProcessManager::Create(original_context())); | |
| 195 ASSERT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 196 | |
| 197 // Embedder explicitly asks for hosts to be created. Chrome does this on | |
| 198 // normal startup. | |
| 199 manager->MaybeCreateStartupBackgroundHosts(); | |
| 200 EXPECT_TRUE(manager->startup_background_hosts_created_for_test()); | |
| 201 } | |
| 202 | |
| 203 // Test that the embedder can defer background host creation. Chrome does this | |
| 204 // when the profile is created asynchronously, which may take a while. | |
| 205 TEST_F(ProcessManagerTest, CreateBackgroundHostsDeferred) { | |
| 206 scoped_ptr<ProcessManager> manager( | |
| 207 ProcessManager::Create(original_context())); | |
| 208 ASSERT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 209 | |
| 210 // Don't create background hosts if the delegate says to defer them. | |
| 211 process_manager_delegate_.defer_creating_startup_background_hosts_ = true; | |
| 212 manager->MaybeCreateStartupBackgroundHosts(); | |
| 213 EXPECT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 214 | |
| 215 // The extension system becoming ready still doesn't create the hosts. | |
| 216 content::NotificationService::current()->Notify( | |
| 217 chrome::NOTIFICATION_EXTENSIONS_READY, | |
| 218 content::Source<BrowserContext>(original_context()), | |
| 219 content::NotificationService::NoDetails()); | |
| 220 EXPECT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 221 | |
| 222 // Once the embedder is ready the background hosts can be created. | |
| 223 process_manager_delegate_.defer_creating_startup_background_hosts_ = false; | |
| 224 manager->MaybeCreateStartupBackgroundHosts(); | |
| 225 EXPECT_TRUE(manager->startup_background_hosts_created_for_test()); | |
| 226 } | |
| 227 | |
| 228 // Test that the embedder can disallow background host creation. | |
| 229 // Chrome OS does this in guest mode. | |
| 230 TEST_F(ProcessManagerTest, IsBackgroundHostAllowed) { | |
| 231 scoped_ptr<ProcessManager> manager( | |
| 232 ProcessManager::Create(original_context())); | |
| 233 ASSERT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 234 | |
| 235 // Don't create background hosts if the delegate disallows them. | |
| 236 process_manager_delegate_.is_background_page_allowed_ = false; | |
| 237 manager->MaybeCreateStartupBackgroundHosts(); | |
| 238 EXPECT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 239 | |
| 240 // The extension system becoming ready still doesn't create the hosts. | |
| 241 content::NotificationService::current()->Notify( | |
| 242 chrome::NOTIFICATION_EXTENSIONS_READY, | |
| 243 content::Source<BrowserContext>(original_context()), | |
| 244 content::NotificationService::NoDetails()); | |
| 245 EXPECT_FALSE(manager->startup_background_hosts_created_for_test()); | |
| 246 } | |
| 247 | |
| 248 // Test that extensions get grouped in the right SiteInstance (and therefore | 128 // Test that extensions get grouped in the right SiteInstance (and therefore |
| 249 // process) based on their URLs. | 129 // process) based on their URLs. |
| 250 TEST_F(ProcessManagerTest, ProcessGrouping) { | 130 TEST_F(ProcessManagerTest, ProcessGrouping) { |
| 251 content::ContentBrowserClient content_browser_client; | 131 content::ContentBrowserClient content_browser_client; |
| 252 content::SetBrowserClientForTesting(&content_browser_client); | 132 content::SetBrowserClientForTesting(&content_browser_client); |
| 253 | 133 |
| 254 // Extensions in different browser contexts should always be different | 134 // Extensions in different browser contexts should always be different |
| 255 // SiteInstances. | 135 // SiteInstances. |
| 256 scoped_ptr<ProcessManager> manager1( | 136 scoped_ptr<ProcessManager> manager1( |
| 257 ProcessManager::Create(original_context())); | 137 ProcessManager::Create(original_context())); |
| (...skipping 17 matching lines...) Expand all Loading... |
| 275 scoped_refptr<SiteInstance> site21 = | 155 scoped_refptr<SiteInstance> site21 = |
| 276 manager1->GetSiteInstanceForURL(ext2_url1); | 156 manager1->GetSiteInstanceForURL(ext2_url1); |
| 277 EXPECT_NE(site11, site21); | 157 EXPECT_NE(site11, site21); |
| 278 | 158 |
| 279 scoped_refptr<SiteInstance> other_profile_site = | 159 scoped_refptr<SiteInstance> other_profile_site = |
| 280 manager2->GetSiteInstanceForURL(ext1_url1); | 160 manager2->GetSiteInstanceForURL(ext1_url1); |
| 281 EXPECT_NE(site11, other_profile_site); | 161 EXPECT_NE(site11, other_profile_site); |
| 282 } | 162 } |
| 283 | 163 |
| 284 } // namespace extensions | 164 } // namespace extensions |
| OLD | NEW |