| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "content/browser/frame_host/frame_tree.h" |
| |
| #include <stddef.h> |
| |
| #include "base/macros.h" |
| #include "base/run_loop.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "content/browser/frame_host/navigator_impl.h" |
| #include "content/browser/frame_host/render_frame_host_factory.h" |
| #include "content/browser/frame_host/render_frame_host_impl.h" |
| #include "content/browser/renderer_host/render_view_host_impl.h" |
| #include "content/browser/web_contents/web_contents_impl.h" |
| #include "content/common/frame_messages.h" |
| #include "content/common/frame_owner_properties.h" |
| #include "content/public/browser/web_contents_observer.h" |
| #include "content/public/test/mock_render_process_host.h" |
| #include "content/public/test/test_browser_context.h" |
| #include "content/public/test/test_browser_thread_bundle.h" |
| #include "content/test/test_render_frame_host.h" |
| #include "content/test/test_render_view_host.h" |
| #include "content/test/test_web_contents.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "third_party/WebKit/public/web/WebSandboxFlags.h" |
| |
| namespace content { |
| |
| namespace { |
| |
| // Appends a description of the structure of the frame tree to |result|. |
| void AppendTreeNodeState(FrameTreeNode* node, std::string* result) { |
| result->append( |
| base::Int64ToString(node->current_frame_host()->GetRoutingID())); |
| if (!node->current_frame_host()->IsRenderFrameLive()) |
| result->append("*"); // Asterisk next to dead frames. |
| |
| if (!node->frame_name().empty()) { |
| result->append(" '"); |
| result->append(node->frame_name()); |
| result->append("'"); |
| } |
| result->append(": ["); |
| const char* separator = ""; |
| for (size_t i = 0; i < node->child_count(); i++) { |
| result->append(separator); |
| AppendTreeNodeState(node->child_at(i), result); |
| separator = ", "; |
| } |
| result->append("]"); |
| } |
| |
| // Logs calls to WebContentsObserver along with the state of the frame tree, |
| // for later use in EXPECT_EQ(). |
| class TreeWalkingWebContentsLogger : public WebContentsObserver { |
| public: |
| explicit TreeWalkingWebContentsLogger(WebContents* web_contents) |
| : WebContentsObserver(web_contents) {} |
| |
| ~TreeWalkingWebContentsLogger() override { |
| EXPECT_EQ("", log_) << "Activity logged that was not expected"; |
| } |
| |
| // Gets and resets the log, which is a string of what happened. |
| std::string GetLog() { |
| std::string result = log_; |
| log_.clear(); |
| return result; |
| } |
| |
| // content::WebContentsObserver implementation. |
| void RenderFrameCreated(RenderFrameHost* render_frame_host) override { |
| LogWhatHappened("RenderFrameCreated", render_frame_host); |
| } |
| |
| void RenderFrameHostChanged(RenderFrameHost* old_host, |
| RenderFrameHost* new_host) override { |
| if (old_host) |
| LogWhatHappened("RenderFrameHostChanged(old)", old_host); |
| LogWhatHappened("RenderFrameHostChanged(new)", new_host); |
| } |
| |
| void RenderFrameDeleted(RenderFrameHost* render_frame_host) override { |
| LogWhatHappened("RenderFrameDeleted", render_frame_host); |
| } |
| |
| void RenderProcessGone(base::TerminationStatus status) override { |
| LogWhatHappened("RenderProcessGone"); |
| } |
| |
| private: |
| void LogWhatHappened(const std::string& event_name) { |
| if (!log_.empty()) { |
| log_.append("\n"); |
| } |
| log_.append(event_name + " -> "); |
| AppendTreeNodeState( |
| static_cast<WebContentsImpl*>(web_contents())->GetFrameTree()->root(), |
| &log_); |
| } |
| |
| void LogWhatHappened(const std::string& event_name, RenderFrameHost* rfh) { |
| LogWhatHappened( |
| base::StringPrintf("%s(%d)", event_name.c_str(), rfh->GetRoutingID())); |
| } |
| |
| std::string log_; |
| |
| DISALLOW_COPY_AND_ASSIGN(TreeWalkingWebContentsLogger); |
| }; |
| |
| } // namespace |
| |
| class FrameTreeTest : public RenderViewHostImplTestHarness { |
| protected: |
| // Prints a FrameTree, for easy assertions of the tree hierarchy. |
| std::string GetTreeState(FrameTree* frame_tree) { |
| std::string result; |
| AppendTreeNodeState(frame_tree->root(), &result); |
| return result; |
| } |
| |
| std::string GetTraversalOrder(FrameTree* frame_tree, |
| FrameTreeNode* subtree_to_skip) { |
| std::string result; |
| for (FrameTreeNode* node : |
| frame_tree->NodesExceptSubtree(subtree_to_skip)) { |
| if (!result.empty()) |
| result += " "; |
| result += base::Int64ToString(node->current_frame_host()->GetRoutingID()); |
| } |
| return result; |
| } |
| }; |
| |
| // Exercise tree manipulation routines. |
| // - Add a series of nodes and verify tree structure. |
| // - Remove a series of nodes and verify tree structure. |
| TEST_F(FrameTreeTest, Shape) { |
| main_test_rfh()->InitializeRenderFrameIfNeeded(); |
| |
| // Use the FrameTree of the WebContents so that it has all the delegates it |
| // needs. We may want to consider a test version of this. |
| FrameTree* frame_tree = contents()->GetFrameTree(); |
| FrameTreeNode* root = frame_tree->root(); |
| |
| std::string no_children_node("no children node"); |
| std::string deep_subtree("node with deep subtree"); |
| int process_id = root->current_frame_host()->GetProcess()->GetID(); |
| |
| // Do not navigate each frame separately, since that will clutter the test |
| // itself. Instead, leave them in "not live" state, which is indicated by the |
| // * after the frame id, since this test cares about the shape, not the |
| // frame liveness. |
| EXPECT_EQ("2: []", GetTreeState(frame_tree)); |
| |
| // Simulate attaching a series of frames to build the frame tree. |
| frame_tree->AddFrame(root, process_id, 14, blink::WebTreeScopeType::kDocument, |
| std::string(), "uniqueName0", |
| blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(root, process_id, 15, blink::WebTreeScopeType::kDocument, |
| std::string(), "uniqueName1", |
| blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(root, process_id, 16, blink::WebTreeScopeType::kDocument, |
| std::string(), "uniqueName2", |
| blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(root->child_at(0), process_id, 244, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName3", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(root->child_at(1), process_id, 255, |
| blink::WebTreeScopeType::kDocument, no_children_node, |
| "uniqueName4", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(root->child_at(0), process_id, 245, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName5", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| |
| EXPECT_EQ( |
| "2: [14: [244: [], 245: []], " |
| "15: [255 'no children node': []], " |
| "16: []]", |
| GetTreeState(frame_tree)); |
| |
| FrameTreeNode* child_16 = root->child_at(2); |
| frame_tree->AddFrame(child_16, process_id, 264, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName6", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(child_16, process_id, 265, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName7", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(child_16, process_id, 266, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName8", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(child_16, process_id, 267, |
| blink::WebTreeScopeType::kDocument, deep_subtree, |
| "uniqueName9", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(child_16, process_id, 268, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName10", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| |
| FrameTreeNode* child_267 = child_16->child_at(3); |
| frame_tree->AddFrame(child_267, process_id, 365, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName11", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(child_267->child_at(0), process_id, 455, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName12", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(child_267->child_at(0)->child_at(0), process_id, 555, |
| blink::WebTreeScopeType::kDocument, std::string(), |
| "uniqueName13", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| frame_tree->AddFrame(child_267->child_at(0)->child_at(0)->child_at(0), |
| process_id, 655, blink::WebTreeScopeType::kDocument, |
| std::string(), "uniqueName14", |
| blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties()); |
| |
| // Now that's it's fully built, verify the tree structure is as expected. |
| EXPECT_EQ( |
| "2: [14: [244: [], 245: []], " |
| "15: [255 'no children node': []], " |
| "16: [264: [], 265: [], 266: [], " |
| "267 'node with deep subtree': " |
| "[365: [455: [555: [655: []]]]], 268: []]]", |
| GetTreeState(frame_tree)); |
| |
| // Verify that traversal order is breadth first, even if we skip a subtree. |
| FrameTreeNode* child_14 = root->child_at(0); |
| FrameTreeNode* child_15 = root->child_at(1); |
| FrameTreeNode* child_244 = child_14->child_at(0); |
| FrameTreeNode* child_245 = child_14->child_at(1); |
| FrameTreeNode* child_555 = child_267->child_at(0)->child_at(0)->child_at(0); |
| FrameTreeNode* child_655 = child_555->child_at(0); |
| EXPECT_EQ("2 14 15 16 244 245 255 264 265 266 267 268 365 455 555 655", |
| GetTraversalOrder(frame_tree, nullptr)); |
| EXPECT_EQ("2", GetTraversalOrder(frame_tree, root)); |
| EXPECT_EQ("2 14 15 16 255 264 265 266 267 268 365 455 555 655", |
| GetTraversalOrder(frame_tree, child_14)); |
| EXPECT_EQ("2 14 15 16 244 245 255 264 265 266 267 268 365 455 555 655", |
| GetTraversalOrder(frame_tree, child_244)); |
| EXPECT_EQ("2 14 15 16 244 245 255 264 265 266 267 268 365 455 555 655", |
| GetTraversalOrder(frame_tree, child_245)); |
| EXPECT_EQ("2 14 15 16 244 245 264 265 266 267 268 365 455 555 655", |
| GetTraversalOrder(frame_tree, child_15)); |
| EXPECT_EQ("2 14 15 16 244 245 255 264 265 266 267 268", |
| GetTraversalOrder(frame_tree, child_267)); |
| EXPECT_EQ("2 14 15 16 244 245 255 264 265 266 267 268 365 455 555", |
| GetTraversalOrder(frame_tree, child_555)); |
| EXPECT_EQ("2 14 15 16 244 245 255 264 265 266 267 268 365 455 555 655", |
| GetTraversalOrder(frame_tree, child_655)); |
| |
| frame_tree->RemoveFrame(child_555); |
| EXPECT_EQ( |
| "2: [14: [244: [], 245: []], " |
| "15: [255 'no children node': []], " |
| "16: [264: [], 265: [], 266: [], " |
| "267 'node with deep subtree': " |
| "[365: [455: []]], 268: []]]", |
| GetTreeState(frame_tree)); |
| |
| frame_tree->RemoveFrame(child_16->child_at(1)); |
| EXPECT_EQ( |
| "2: [14: [244: [], 245: []], " |
| "15: [255 'no children node': []], " |
| "16: [264: [], 266: [], " |
| "267 'node with deep subtree': " |
| "[365: [455: []]], 268: []]]", |
| GetTreeState(frame_tree)); |
| |
| frame_tree->RemoveFrame(root->child_at(1)); |
| EXPECT_EQ( |
| "2: [14: [244: [], 245: []], " |
| "16: [264: [], 266: [], " |
| "267 'node with deep subtree': " |
| "[365: [455: []]], 268: []]]", |
| GetTreeState(frame_tree)); |
| } |
| |
| // Ensure frames can be found by frame_tree_node_id, routing ID, or name. |
| TEST_F(FrameTreeTest, FindFrames) { |
| main_test_rfh()->InitializeRenderFrameIfNeeded(); |
| |
| // Add a few child frames to the main frame. |
| FrameTree* frame_tree = contents()->GetFrameTree(); |
| FrameTreeNode* root = frame_tree->root(); |
| |
| main_test_rfh()->OnCreateChildFrame( |
| 22, blink::WebTreeScopeType::kDocument, "child0", "uniqueName0", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| main_test_rfh()->OnCreateChildFrame( |
| 23, blink::WebTreeScopeType::kDocument, "child1", "uniqueName1", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| main_test_rfh()->OnCreateChildFrame( |
| 24, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName2", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| FrameTreeNode* child0 = root->child_at(0); |
| FrameTreeNode* child1 = root->child_at(1); |
| |
| FrameTreeNode* child2 = root->child_at(2); |
| |
| // Add one grandchild frame. |
| child1->current_frame_host()->OnCreateChildFrame( |
| 33, blink::WebTreeScopeType::kDocument, "grandchild", "uniqueName3", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| FrameTreeNode* grandchild = child1->child_at(0); |
| |
| // Ensure they can be found by FTN id. |
| EXPECT_EQ(root, frame_tree->FindByID(root->frame_tree_node_id())); |
| EXPECT_EQ(child0, frame_tree->FindByID(child0->frame_tree_node_id())); |
| EXPECT_EQ(child1, frame_tree->FindByID(child1->frame_tree_node_id())); |
| EXPECT_EQ(child2, frame_tree->FindByID(child2->frame_tree_node_id())); |
| EXPECT_EQ(grandchild, frame_tree->FindByID(grandchild->frame_tree_node_id())); |
| EXPECT_EQ(nullptr, frame_tree->FindByID(-1)); |
| |
| // Ensure they can be found by routing id. |
| int process_id = main_test_rfh()->GetProcess()->GetID(); |
| EXPECT_EQ(root, frame_tree->FindByRoutingID(process_id, |
| main_test_rfh()->GetRoutingID())); |
| EXPECT_EQ(child0, frame_tree->FindByRoutingID(process_id, 22)); |
| EXPECT_EQ(child1, frame_tree->FindByRoutingID(process_id, 23)); |
| EXPECT_EQ(child2, frame_tree->FindByRoutingID(process_id, 24)); |
| EXPECT_EQ(grandchild, frame_tree->FindByRoutingID(process_id, 33)); |
| EXPECT_EQ(nullptr, frame_tree->FindByRoutingID(process_id, 37)); |
| |
| // Ensure they can be found by name, if they have one. |
| EXPECT_EQ(root, frame_tree->FindByName(std::string())); |
| EXPECT_EQ(child0, frame_tree->FindByName("child0")); |
| EXPECT_EQ(child1, frame_tree->FindByName("child1")); |
| EXPECT_EQ(grandchild, frame_tree->FindByName("grandchild")); |
| EXPECT_EQ(nullptr, frame_tree->FindByName("no such frame")); |
| } |
| |
| // Check that PreviousSibling() and NextSibling() are retrieved correctly. |
| TEST_F(FrameTreeTest, GetSibling) { |
| main_test_rfh()->InitializeRenderFrameIfNeeded(); |
| |
| // Add a few child frames to the main frame. |
| FrameTree* frame_tree = contents()->GetFrameTree(); |
| FrameTreeNode* root = frame_tree->root(); |
| main_test_rfh()->OnCreateChildFrame( |
| 22, blink::WebTreeScopeType::kDocument, "child0", "uniqueName0", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| main_test_rfh()->OnCreateChildFrame( |
| 23, blink::WebTreeScopeType::kDocument, "child1", "uniqueName1", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| main_test_rfh()->OnCreateChildFrame( |
| 24, blink::WebTreeScopeType::kDocument, "child2", "uniqueName2", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| FrameTreeNode* child0 = root->child_at(0); |
| FrameTreeNode* child1 = root->child_at(1); |
| FrameTreeNode* child2 = root->child_at(2); |
| |
| // Add one grandchild frame. |
| child1->current_frame_host()->OnCreateChildFrame( |
| 33, blink::WebTreeScopeType::kDocument, "grandchild", "uniqueName3", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| FrameTreeNode* grandchild = child1->child_at(0); |
| |
| // Test PreviousSibling(). |
| EXPECT_EQ(nullptr, root->PreviousSibling()); |
| EXPECT_EQ(nullptr, child0->PreviousSibling()); |
| EXPECT_EQ(child0, child1->PreviousSibling()); |
| EXPECT_EQ(child1, child2->PreviousSibling()); |
| EXPECT_EQ(nullptr, grandchild->PreviousSibling()); |
| |
| // Test NextSibling(). |
| EXPECT_EQ(nullptr, root->NextSibling()); |
| EXPECT_EQ(child1, child0->NextSibling()); |
| EXPECT_EQ(child2, child1->NextSibling()); |
| EXPECT_EQ(nullptr, child2->NextSibling()); |
| EXPECT_EQ(nullptr, grandchild->NextSibling()); |
| } |
| |
| // Do some simple manipulations of the frame tree, making sure that |
| // WebContentsObservers see a consistent view of the tree as we go. |
| TEST_F(FrameTreeTest, ObserverWalksTreeDuringFrameCreation) { |
| TreeWalkingWebContentsLogger activity(contents()); |
| contents()->NavigateAndCommit(GURL("http://www.google.com")); |
| EXPECT_EQ("RenderFrameCreated(2) -> 2: []", activity.GetLog()); |
| |
| FrameTree* frame_tree = contents()->GetFrameTree(); |
| FrameTreeNode* root = frame_tree->root(); |
| |
| // Simulate attaching a series of frames to build the frame tree. |
| main_test_rfh()->OnCreateChildFrame( |
| 14, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName0", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| EXPECT_EQ( |
| "RenderFrameHostChanged(new)(14) -> 2: []\n" |
| "RenderFrameCreated(14) -> 2: [14: []]", |
| activity.GetLog()); |
| main_test_rfh()->OnCreateChildFrame( |
| 18, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName1", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| EXPECT_EQ( |
| "RenderFrameHostChanged(new)(18) -> 2: [14: []]\n" |
| "RenderFrameCreated(18) -> 2: [14: [], 18: []]", |
| activity.GetLog()); |
| frame_tree->RemoveFrame(root->child_at(0)); |
| EXPECT_EQ("RenderFrameDeleted(14) -> 2: [18: []]", activity.GetLog()); |
| frame_tree->RemoveFrame(root->child_at(0)); |
| EXPECT_EQ("RenderFrameDeleted(18) -> 2: []", activity.GetLog()); |
| } |
| |
| // Make sure that WebContentsObservers see a consistent view of the tree after |
| // recovery from a render process crash. |
| TEST_F(FrameTreeTest, ObserverWalksTreeAfterCrash) { |
| TreeWalkingWebContentsLogger activity(contents()); |
| contents()->NavigateAndCommit(GURL("http://www.google.com")); |
| EXPECT_EQ("RenderFrameCreated(2) -> 2: []", activity.GetLog()); |
| |
| main_test_rfh()->OnCreateChildFrame( |
| 22, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName0", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| EXPECT_EQ( |
| "RenderFrameHostChanged(new)(22) -> 2: []\n" |
| "RenderFrameCreated(22) -> 2: [22: []]", |
| activity.GetLog()); |
| main_test_rfh()->OnCreateChildFrame( |
| 23, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName1", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| EXPECT_EQ( |
| "RenderFrameHostChanged(new)(23) -> 2: [22: []]\n" |
| "RenderFrameCreated(23) -> 2: [22: [], 23: []]", |
| activity.GetLog()); |
| |
| // Crash the renderer |
| main_test_rfh()->GetProcess()->SimulateCrash(); |
| EXPECT_EQ( |
| "RenderProcessGone -> 2*: [22*: [], 23*: []]\n" |
| "RenderFrameDeleted(23) -> 2*: [22*: [], 23*: []]\n" |
| "RenderFrameDeleted(22) -> 2*: [22*: [], 23*: []]\n" |
| "RenderFrameDeleted(2) -> 2*: []", |
| activity.GetLog()); |
| } |
| |
| // Ensure that frames are not added to the tree, if the process passed in |
| // is different than the process of the parent node. |
| TEST_F(FrameTreeTest, FailAddFrameWithWrongProcessId) { |
| contents()->NavigateAndCommit(GURL("http://www.google.com")); |
| FrameTree* frame_tree = contents()->GetFrameTree(); |
| FrameTreeNode* root = frame_tree->root(); |
| int process_id = root->current_frame_host()->GetProcess()->GetID(); |
| |
| ASSERT_EQ("2: []", GetTreeState(frame_tree)); |
| |
| // Simulate attaching a frame from mismatched process id. |
| ASSERT_FALSE(frame_tree->AddFrame( |
| root, process_id + 1, 1, blink::WebTreeScopeType::kDocument, |
| std::string(), "uniqueName0", blink::WebSandboxFlags::kNone, |
| ParsedFeaturePolicyHeader(), FrameOwnerProperties())); |
| ASSERT_EQ("2: []", GetTreeState(frame_tree)); |
| } |
| |
| // Ensure that frames removed while a process has crashed are not preserved in |
| // the global map of id->frame. |
| TEST_F(FrameTreeTest, ProcessCrashClearsGlobalMap) { |
| main_test_rfh()->InitializeRenderFrameIfNeeded(); |
| |
| // Add a couple child frames to the main frame. |
| FrameTreeNode* root = contents()->GetFrameTree()->root(); |
| |
| main_test_rfh()->OnCreateChildFrame( |
| 22, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName0", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| main_test_rfh()->OnCreateChildFrame( |
| 23, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName1", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| |
| // Add one grandchild frame. |
| RenderFrameHostImpl* child1_rfh = root->child_at(0)->current_frame_host(); |
| child1_rfh->OnCreateChildFrame( |
| 33, blink::WebTreeScopeType::kDocument, std::string(), "uniqueName2", |
| blink::WebSandboxFlags::kNone, ParsedFeaturePolicyHeader(), |
| FrameOwnerProperties()); |
| |
| // Ensure they can be found by id. |
| int id1 = root->child_at(0)->frame_tree_node_id(); |
| int id2 = root->child_at(1)->frame_tree_node_id(); |
| int id3 = root->child_at(0)->child_at(0)->frame_tree_node_id(); |
| EXPECT_TRUE(FrameTreeNode::GloballyFindByID(id1)); |
| EXPECT_TRUE(FrameTreeNode::GloballyFindByID(id2)); |
| EXPECT_TRUE(FrameTreeNode::GloballyFindByID(id3)); |
| |
| // Crash the renderer. |
| main_test_rfh()->GetProcess()->SimulateCrash(); |
| |
| // Ensure they cannot be found by id after the process has crashed. |
| EXPECT_FALSE(FrameTreeNode::GloballyFindByID(id1)); |
| EXPECT_FALSE(FrameTreeNode::GloballyFindByID(id2)); |
| EXPECT_FALSE(FrameTreeNode::GloballyFindByID(id3)); |
| } |
| |
| } // namespace content |