Simply put web apps are sites that the user installs onto their machine mimicking a native app installed on their respective operating system.
Sites that meet our install promotion requirements will have an install prompt appear in the omnibox on the right. Users can also install any site they like via Menu > More tools > Create shortcut
....
Users can see all of their web apps on chrome://apps (viewable on non-ChromeOS).
Sites customize how their installed site integrates at the OS level using a web app manifest. See developer guides for in depth overviews:
See https://tinyurl.com/dpwa-architecture-public for presentation slides.
See Web Apps - Concepts.
Use chrome://web-app-internals to inspect internal web app state. For Chromium versions prior to M93 use chrome://internals/web-app.
The task of turning websites into “apps” in the user's OS environment has many parts to it. Before going into the parts, here is where they live:
See source here.
WebAppProvider
core system lives on the Profile
object.WebAppUiManagerImpl
also lives on the Profile
object (to avoid deps issues).AppBrowserController
(typically WebAppBrowserController
for our interests) lives on the Browser
object.WebAppTabHelper
lives on the WebContents
object.While most on-disk storage is done in the WebAppSyncBridge
, the system also sometimes uses the PrefService
. Most of these prefs live on the Profile
(profile->GetPrefs()
), but some prefs are in the global browser prefs (g_browser_process->local_state()
).
Presentation: https://tinyurl.com/dpwa-architecture-public
Older presentation: https://tinyurl.com/bmo-public
There are a lot of great guidelines within Chromium
Other than general guidance of minimal complexity and having single-responsibility classes, some goals of our system:
This public interface should (and will) be improved, however this is the basic state as of 2022/11/09:
WebAppCommandScheduler
. Internally this schedules WebAppCommand
s to do safe operations on the system.AppRegistrarObserver
or WebAppInstallManagerObserver
. However, users of these MUST NOT modify the web app system in the observation call - this can cause race conditions and weird re-entry bugs.WebAppRegistrar
ScopedRegistryUpdate
and the WebAppSyncBridge
.WebAppIconManager
supports icon fetch for a given web app. This isn't yet normally protected in a command / lock, and due to performance needs with things like right-click menus this integration might happen last.Some parts of the system that are used within commands:
WebAppUrlLoader
& WebAppDataRetriever
are used in commands, but this interface could be improved & does not have a formal factory yet.WebAppInstallFinalizer
is used in commands and could be improved.The goal is to have all of these behind an abstraction that has a fake to allow easy unit testing of our system. Some of these dependencies are behind a nice fake-able interface, and some are not (yet).
PreinstalledWebAppManager
.content::WebContents
WebAppUrlLoader
- load a given url in a WebContents
. Faked by FakeWebAppUrlLoader
.WebAppDataRetriever
- retrieve installability information, the manifest, or icons from a WebContents
. Faked by FakeWebAppDataRetriever
.OsIntegrationManger
manages this, which has a fake version.FakeWebAppProvider
.WebAppUiManager
, and faked by the FakeWebAppUiManager
.These store data for our system. Some of it is per-web-app, and some of it is global.
WebAppRegistrar
: This attempts to unify the reading of much of this data, and also holds an in-memory copy of the database data (in WebApp objects).WebAppDatabase
/ WebAppSyncBridge
: This stores the web_app.proto object in a database, which is the preferred place to store information about a web app.WebAppIconManager
and stored on disk in the user's profile.PrefService
is used to store information that is either global, or needs to persist after a web app is uninstalled. Most of these prefs live on the Profile
(profile->GetPrefs()
), but some prefs are in the global browser prefs (g_browser_process->local_state()
). Some users of prefs:url_handler_prefs
None of this information should be accessed without an applicable ‘lock’ on the system.
These are used to encapsulate common responsibilities or in-memory state that needs to be stored.
Commands are used to encapsulate operations in the system, and use Locks to ensure that your operation has isolation from other operations.
ToDebugValue()
method that is logged on completion and exposed in the chrome://web-app-internals. This can be very helpful for debugging and bug reports.Note: There are DVLOGs in the WebAppCommandManager
that can be helpful.
WebAppLockManager
Locks allow operations to receive appropriate protections for what they are doing. For example, an AppLock
will guarantee that no one is modifying (or uninstalling) an app while it is granted.
Locks contain assessors that allow the user to access parts of the web app system. This is the safest way to read from the system.
Note: There are DVLOGs in the WebAppLockManager
that can be helpful.
Anything that involves talking to the operating system. Usually has to do with adding, modifying, or removing the os entity that we register for the web app.
See the public interface section about which areas are generally “publicly available”.
The system is generally unit-test-compabible through the FakeWebAppProvider
, which is created by default in the TestingProfile
. Sometimes tests require using the AwaitStartWebAppProviderAndSubsystems
function in the setup function of the test to actually start the web app system & wait for it to complete startup.
There is a long-term goal of having the system be easily fake-able for customers using it. The best current ‘public interface’ distinction of the system is the WebAppCommandScheduler
, but this hopefully will get more clear in the future.
To access or change information about a web app:
WebAppLockManager
, or (preferably) create a command with the relevant lock description.WebAppRegistrar
to get the data you need. This unifies many of our data sources into one place.ScopedRegistryUpdate
.WebAppSyncBridge
, but can be pulled out.Other guides:
This page allows you to see all of the internal information about the WebAppProvider system, including a truncated log of the debug information of the last run commands.
It is often very useful to ask users to attach a copy of this page in bug reports.
The integration tests will print out the contents of this page if a test fails, which can help debug that failure as well.
The codebase has a number of useful DVLOGs:
Please read Testing In Chromium for general guidance on writing tests in chromium.
The following tests are expected for writing code in this system:
Unit tests have the following benefits:
Unit tests are the fastest tests to execute and are expected to be used to test most cases, especially error cases. They are usually built on the WebAppTest
base class, and use the FakeWebAppProvider
to customize (or not) the dependencies of the WebAppProvider
system.
Notes
WebAppTest
base class to help ensure things are set up well for you.With improved web app test support, most of the components should using unittests to cover the detailed test cases.
Creating an integration test (using the integration framework) should satisfy the need for end-to-end tests for major use-cases of your feature. However, you may need to create one due to:
Browser tests are much more expensive to run, as they basically run a fully functional browser with it's own profile directory. These tests are usually only created to test functionality that requires multiple parts of the system to be running or dependencies like the Sync service to be fully running and functional. It is good practice to have browsertests be as true-to-user-action as possible, to make sure that as much of our stack is exercised.
An example set of browser tests are in web_app_browsertest.cc
. Please use the WebAppControllerBrowserTest
base class to help ensure the system is set up correctly.
We have a custom integration testing framework that we use due to the complexity of our use-cases. See integration-testing-framework.md for more information.
It is a good idea to think about your integration tests early & figure out your CUJs with the team. Having your CUJs and integration tests working early greatly speeds up development & launch time.
Fake*
or Test*
classesA class that starts with Fake
or Test
is meant to completely replace a component of the system. They should be inheriting from a base class (often pure virtual) and then implement a version of that component that will seem to be working correctly to other system components, but not actually do anything.
An example is fake_os_integration_manager.h, which pretends to successfully do install, update, and uninstall operations, but actually just does nothing.
Mock*
classesA class that start with Mock
is a gmock version of the class. This allows the user to have complete control of exactly what that class does, verify it is called exactly as expected, etc. These tend to be much more powerful to use than a Fake
, as you can easily specify every possible case you might want to check, like which arguments are called and the exact calling order of multiple functions, even across multiple mocks. The downsides are
These are generally not preferred to a “Fake”.
FakeWebAppProvider
The FakeWebAppProvider
is basically a fake version of the WebAppProvider system, that uses the WebAppProvider
root class to set up subsystems and can be used to selectively set fake subsystems or shut them down on a per-demand basis to test system shutdown use-cases.
Sometimes classes use a dependency that either doesn‘t work or isn’t fake-able in our system.
KeyedService
, and the authors have a fake version you can use, then use that. See how it is used elsewhere.WebAppProvider
, and create a fake for it so that you can test with it faked.WebAppProvider
This is a per-profile object housing all the various web app subsystems. This is the “main()” of the web app implementation where everything starts.
WebApp
This is the representation of an installed web app in RAM. Its member fields largely reflect all the ways a site can configure their web app manifest plus miscellaneous internal bookkeeping and user settings.
WebAppRegistrar
This is where all the WebApps
live in memory, and what many other subsystems query to look up any given web app's fields. Mutations to the registry have to go via ScopedRegistryUpdate or WebAppSyncBridge.
Accessing the registrar should happen through a Lock. If you access it through the WebAppProvider
, then know that you are reading uncommitted (and thus unsafe) data.
Why is it full of GetAppXYZ()
getters for every field instead of just returning a WebApp
reference? This is primarily done because the value may depend on multiple sources of truth. For example, whether the app should be run on OS login depends on both the user preference (stored in our database) and the administrator's policy (stored separately & given to us in-memory using prefs) Historically this was originally done because WebApps used be stored both in our database and extensions, and this served to unify the two.
WebAppSyncBridge
This is “bridge” between the WebAppProvider system‘s in-memory representation of web apps and the sync system’s database representation (along with sync system functionality like add/remove/modify operations). This integration is a little complex and deserves it's own document, but it basically: Stores all WebApps into a database and updates the database if any fields change. Updates the system when there are changes from the sync system. Installs new apps, uninstalls apps the user uninstalled elsewhere, updates metadata like user display mode preference, etc. Tells the sync system if there are local changes (installs, uninstalls, etc).
There is also a slide in a presentation here which illustrates how this system works, but it may be out of date.
Note: This only stores per-web-app data, and that data will be deleted if the web app is uninstalled. To store data that persists after uninstall, or applies to a more general scope than a single web app, then the PrefService
can be used, either on the Profile
object (per-profile data, profile->GetPrefs()
) or on the browser process (
g_browser_process->local_state()``). Example of needing prefs: Storing if an app was previously installed as a preinstalled app in the past. Information is needed during chrome startup before profiles are loaded. A feature needs to store global data - e.g. “When was the last time we showed the in-product-help banner for any webapp?”
ExternallyManagedAppManager
This is for all installs that are not initiated by the user. This includes preinstalled apps, policy installed apps and system web apps.
These all specify a set of install URLs which the ExternallyManagedAppManager
synchronises the set of currently installed web apps with.
WebAppInstallFinalizer
This is the tail end of the installation process where we write all our web app metadata to disk and deploy OS integrations (like desktop shortcuts and file handlers using the OsIntegrationManager
.
This also manages the uninstallation process.
WebAppUiManager
Sometimes we need to query window state from chrome/browser/ui land even though our BUILD.gn targets disallow this as it would be a circular dependency. This abstract class + impl injects the dependency at link time (see [WebAppUiManager::Create()
's][32]
declaration and definition locations`).
AppShimRegistry
On Mac OS we sometimes need to reason about the state of installed PWAs in all profiles without loading those profiles into memory. For this purpose, AppShimRegistry
stores the needed information in Chrome's “Local State” (global preferences). The information stored here includes:
This information is used when launching a web app (to determine what profile or profiles to open the web app in), as well as when updating an App Shim (to make sure all file and protocol handlers for the app are accounted for).