blob: 89dac92e82659a3229f479585c99517eee086440 [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "extensions/browser/process_manager.h"
#include "base/macros.h"
#include "content/public/browser/content_browser_client.h"
#include "content/public/browser/notification_service.h"
#include "content/public/browser/site_instance.h"
#include "content/public/common/content_client.h"
#include "content/public/test/test_browser_context.h"
#include "extensions/browser/extension_registry.h"
#include "extensions/browser/extensions_test.h"
#include "extensions/browser/notification_types.h"
#include "extensions/browser/process_manager_delegate.h"
#include "extensions/browser/test_extensions_browser_client.h"
using content::BrowserContext;
using content::SiteInstance;
using content::TestBrowserContext;
namespace extensions {
namespace {
// A trivial ProcessManagerDelegate.
class TestProcessManagerDelegate : public ProcessManagerDelegate {
public:
TestProcessManagerDelegate()
: is_background_page_allowed_(true),
defer_creating_startup_background_hosts_(false) {}
~TestProcessManagerDelegate() override {}
// ProcessManagerDelegate implementation.
bool AreBackgroundPagesAllowedForContext(
BrowserContext* context) const override {
return is_background_page_allowed_;
}
bool IsExtensionBackgroundPageAllowed(
BrowserContext* context,
const Extension& extension) const override {
return is_background_page_allowed_;
}
bool DeferCreatingStartupBackgroundHosts(
BrowserContext* context) const override {
return defer_creating_startup_background_hosts_;
}
bool is_background_page_allowed_;
bool defer_creating_startup_background_hosts_;
};
} // namespace
class ProcessManagerTest : public ExtensionsTest {
public:
ProcessManagerTest() {}
~ProcessManagerTest() override {}
void SetUp() override {
ExtensionsTest::SetUp();
extension_registry_ =
std::make_unique<ExtensionRegistry>(browser_context());
extensions_browser_client()->set_process_manager_delegate(
&process_manager_delegate_);
}
// Use original_context() to make it clear it is a non-incognito context.
BrowserContext* original_context() { return browser_context(); }
ExtensionRegistry* extension_registry() { return extension_registry_.get(); }
TestProcessManagerDelegate* process_manager_delegate() {
return &process_manager_delegate_;
}
// Returns true if the notification |type| is registered for |manager| with
// source |context|. Pass NULL for |context| for all sources.
static bool IsRegistered(ProcessManager* manager,
int type,
BrowserContext* context) {
return manager->registrar_.IsRegistered(
manager, type, content::Source<BrowserContext>(context));
}
private:
std::unique_ptr<ExtensionRegistry>
extension_registry_; // Shared between BrowserContexts.
TestProcessManagerDelegate process_manager_delegate_;
DISALLOW_COPY_AND_ASSIGN(ProcessManagerTest);
};
// Test that notification registration works properly.
TEST_F(ProcessManagerTest, ExtensionNotificationRegistration) {
// Test for a normal context ProcessManager.
std::unique_ptr<ProcessManager> manager1(ProcessManager::CreateForTesting(
original_context(), extension_registry()));
EXPECT_EQ(original_context(), manager1->browser_context());
EXPECT_EQ(0u, manager1->background_hosts().size());
// It observes other notifications from this context.
EXPECT_TRUE(IsRegistered(manager1.get(),
extensions::NOTIFICATION_EXTENSIONS_READY_DEPRECATED,
original_context()));
EXPECT_TRUE(IsRegistered(manager1.get(),
extensions::NOTIFICATION_EXTENSION_HOST_DESTROYED,
original_context()));
// Test for an incognito context ProcessManager.
std::unique_ptr<ProcessManager> manager2(
ProcessManager::CreateIncognitoForTesting(
incognito_context(), original_context(), extension_registry()));
EXPECT_EQ(incognito_context(), manager2->browser_context());
EXPECT_EQ(0u, manager2->background_hosts().size());
// Some notifications are observed for the incognito context.
EXPECT_TRUE(IsRegistered(manager2.get(),
extensions::NOTIFICATION_EXTENSION_HOST_DESTROYED,
incognito_context()));
// Some are not observed at all.
EXPECT_FALSE(
IsRegistered(manager2.get(),
extensions::NOTIFICATION_EXTENSIONS_READY_DEPRECATED,
original_context()));
}
// Test that startup background hosts are created when the extension system
// becomes ready.
//
// NOTE: This test and those that follow do not try to create ExtensionsHosts
// because ExtensionHost is tightly coupled to WebContents and can't be
// constructed in unit tests.
TEST_F(ProcessManagerTest, CreateBackgroundHostsOnExtensionsReady) {
std::unique_ptr<ProcessManager> manager(ProcessManager::CreateForTesting(
original_context(), extension_registry()));
ASSERT_FALSE(manager->startup_background_hosts_created_for_test());
// Simulate the extension system becoming ready.
content::NotificationService::current()->Notify(
extensions::NOTIFICATION_EXTENSIONS_READY_DEPRECATED,
content::Source<BrowserContext>(original_context()),
content::NotificationService::NoDetails());
EXPECT_TRUE(manager->startup_background_hosts_created_for_test());
}
// Test that startup background hosts can be created explicitly before the
// extension system is ready (this is the normal pattern in Chrome).
TEST_F(ProcessManagerTest, CreateBackgroundHostsExplicitly) {
std::unique_ptr<ProcessManager> manager(ProcessManager::CreateForTesting(
original_context(), extension_registry()));
ASSERT_FALSE(manager->startup_background_hosts_created_for_test());
// Embedder explicitly asks for hosts to be created. Chrome does this on
// normal startup.
manager->MaybeCreateStartupBackgroundHosts();
EXPECT_TRUE(manager->startup_background_hosts_created_for_test());
}
// Test that the embedder can defer background host creation. Chrome does this
// when the profile is created asynchronously, which may take a while.
TEST_F(ProcessManagerTest, CreateBackgroundHostsDeferred) {
std::unique_ptr<ProcessManager> manager(ProcessManager::CreateForTesting(
original_context(), extension_registry()));
ASSERT_FALSE(manager->startup_background_hosts_created_for_test());
// Don't create background hosts if the delegate says to defer them.
process_manager_delegate()->defer_creating_startup_background_hosts_ = true;
manager->MaybeCreateStartupBackgroundHosts();
EXPECT_FALSE(manager->startup_background_hosts_created_for_test());
// The extension system becoming ready still doesn't create the hosts.
content::NotificationService::current()->Notify(
extensions::NOTIFICATION_EXTENSIONS_READY_DEPRECATED,
content::Source<BrowserContext>(original_context()),
content::NotificationService::NoDetails());
EXPECT_FALSE(manager->startup_background_hosts_created_for_test());
// Once the embedder is ready the background hosts can be created.
process_manager_delegate()->defer_creating_startup_background_hosts_ = false;
manager->MaybeCreateStartupBackgroundHosts();
EXPECT_TRUE(manager->startup_background_hosts_created_for_test());
}
// Test that the embedder can disallow background host creation.
// Chrome OS does this in guest mode.
TEST_F(ProcessManagerTest, IsBackgroundHostAllowed) {
std::unique_ptr<ProcessManager> manager(ProcessManager::CreateForTesting(
original_context(), extension_registry()));
ASSERT_FALSE(manager->startup_background_hosts_created_for_test());
// Don't create background hosts if the delegate disallows them.
process_manager_delegate()->is_background_page_allowed_ = false;
manager->MaybeCreateStartupBackgroundHosts();
EXPECT_FALSE(manager->startup_background_hosts_created_for_test());
// The extension system becoming ready still doesn't create the hosts.
content::NotificationService::current()->Notify(
extensions::NOTIFICATION_EXTENSIONS_READY_DEPRECATED,
content::Source<BrowserContext>(original_context()),
content::NotificationService::NoDetails());
EXPECT_FALSE(manager->startup_background_hosts_created_for_test());
}
// Test that extensions get grouped in the right SiteInstance (and therefore
// process) based on their URLs.
TEST_F(ProcessManagerTest, ProcessGrouping) {
// Extensions in different browser contexts should always be different
// SiteInstances.
std::unique_ptr<ProcessManager> manager1(ProcessManager::CreateForTesting(
original_context(), extension_registry()));
// NOTE: This context is not associated with the TestExtensionsBrowserClient.
// That's OK because we're not testing regular vs. incognito behavior.
TestBrowserContext another_context;
ExtensionRegistry another_registry(&another_context);
std::unique_ptr<ProcessManager> manager2(
ProcessManager::CreateForTesting(&another_context, &another_registry));
// Extensions with common origins ("scheme://id/") should be grouped in the
// same SiteInstance.
GURL ext1_url1("chrome-extension://ext1_id/index.html");
GURL ext1_url2("chrome-extension://ext1_id/monkey/monkey.html");
GURL ext2_url1("chrome-extension://ext2_id/index.html");
scoped_refptr<SiteInstance> site11 =
manager1->GetSiteInstanceForURL(ext1_url1);
scoped_refptr<SiteInstance> site12 =
manager1->GetSiteInstanceForURL(ext1_url2);
EXPECT_EQ(site11, site12);
scoped_refptr<SiteInstance> site21 =
manager1->GetSiteInstanceForURL(ext2_url1);
EXPECT_NE(site11, site21);
scoped_refptr<SiteInstance> other_profile_site =
manager2->GetSiteInstanceForURL(ext1_url1);
EXPECT_NE(site11, other_profile_site);
}
} // namespace extensions