blob: a53c0176256ba9143486b550151c8d7a351948a4 [file] [log] [blame]
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/bind.h"
#include "base/callback.h"
#include "base/files/file_util.h"
#include "base/run_loop.h"
#include "base/scoped_environment_variable_override.h"
#include "base/strings/strcat.h"
#include "base/strings/stringprintf.h"
#include "base/strings/utf_string_conversions.h"
#include "base/synchronization/lock.h"
#include "base/test/bind.h"
#include "base/test/metrics/histogram_tester.h"
#include "base/test/scoped_command_line.h"
#include "base/test/scoped_feature_list.h"
#include "base/test/test_timeouts.h"
#include "base/thread_annotations.h"
#include "base/threading/thread_restrictions.h"
#include "build/build_config.h"
#include "content/browser/network_service_instance_impl.h"
#include "content/browser/renderer_host/render_frame_host_impl.h"
#include "content/browser/renderer_host/render_process_host_impl.h"
#include "content/browser/service_worker/embedded_worker_instance.h"
#include "content/browser/service_worker/embedded_worker_status.h"
#include "content/browser/service_worker/service_worker_context_core_observer.h"
#include "content/browser/storage_partition_impl.h"
#include "content/browser/url_loader_factory_getter.h"
#include "content/browser/worker_host/test_shared_worker_service_impl.h"
#include "content/public/browser/browser_context.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/network_service_instance.h"
#include "content/public/browser/web_contents.h"
#include "content/public/common/content_switches.h"
#include "content/public/common/network_service_util.h"
#include "content/public/test/browser_test.h"
#include "content/public/test/browser_test_utils.h"
#include "content/public/test/commit_message_delayer.h"
#include "content/public/test/content_browser_test.h"
#include "content/public/test/content_browser_test_utils.h"
#include "content/public/test/frame_test_utils.h"
#include "content/public/test/simple_url_loader_test_helper.h"
#include "content/public/test/test_utils.h"
#include "content/shell/browser/shell.h"
#include "content/shell/browser/shell_browser_context.h"
#include "content/test/io_thread_shared_url_loader_factory_owner.h"
#include "content/test/storage_partition_test_helpers.h"
#include "mojo/public/cpp/bindings/pending_remote.h"
#include "mojo/public/cpp/bindings/remote.h"
#include "mojo/public/cpp/bindings/sync_call_restrictions.h"
#include "net/cookies/canonical_cookie_test_helpers.h"
#include "net/dns/mock_host_resolver.h"
#include "net/test/embedded_test_server/http_request.h"
#include "net/traffic_annotation/network_traffic_annotation_test_helper.h"
#include "services/cert_verifier/public/mojom/cert_verifier_service_factory.mojom.h"
#include "services/network/public/cpp/network_switches.h"
#include "services/network/public/cpp/simple_url_loader.h"
#include "services/network/public/mojom/network_service.mojom.h"
#include "services/network/public/mojom/network_service_test.mojom.h"
#include "testing/gmock/include/gmock/gmock-matchers.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "third_party/blink/public/common/features.h"
namespace content {
namespace {
const char kHostA[] = "a.test";
const char kSamePartyCookieName[] = "SamePartyCookie";
using SharedURLLoaderFactoryGetterCallback =
base::OnceCallback<scoped_refptr<network::SharedURLLoaderFactory>()>;
mojo::PendingRemote<network::mojom::NetworkContext> CreateNetworkContext() {
mojo::PendingRemote<network::mojom::NetworkContext> network_context;
network::mojom::NetworkContextParamsPtr context_params =
network::mojom::NetworkContextParams::New();
context_params->cert_verifier_params = GetCertVerifierParams(
cert_verifier::mojom::CertVerifierCreationParams::New());
GetNetworkService()->CreateNetworkContext(
network_context.InitWithNewPipeAndPassReceiver(),
std::move(context_params));
return network_context;
}
int LoadBasicRequestOnUIThread(
network::mojom::URLLoaderFactory* url_loader_factory,
const GURL& url) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
auto request = std::make_unique<network::ResourceRequest>();
request->url = url;
SimpleURLLoaderTestHelper simple_loader_helper;
std::unique_ptr<network::SimpleURLLoader> simple_loader =
network::SimpleURLLoader::Create(std::move(request),
TRAFFIC_ANNOTATION_FOR_TESTS);
simple_loader->DownloadToStringOfUnboundedSizeUntilCrashAndDie(
url_loader_factory, simple_loader_helper.GetCallback());
simple_loader_helper.WaitForCallback();
return simple_loader->NetError();
}
class ServiceWorkerStatusObserver : public ServiceWorkerContextCoreObserver {
public:
void WaitForStopped() {
if (stopped_)
return;
base::RunLoop loop;
callback_ = loop.QuitClosure();
loop.Run();
}
private:
void OnStopped(int64_t version_id) override {
stopped_ = true;
if (callback_)
std::move(callback_).Run();
}
bool stopped_ = false;
base::OnceClosure callback_;
};
} // namespace
class NetworkServiceRestartBrowserTest : public ContentBrowserTest {
public:
NetworkServiceRestartBrowserTest() {}
NetworkServiceRestartBrowserTest(const NetworkServiceRestartBrowserTest&) =
delete;
NetworkServiceRestartBrowserTest& operator=(
const NetworkServiceRestartBrowserTest&) = delete;
void SetUpCommandLine(base::CommandLine* command_line) override {
ContentBrowserTest::SetUpCommandLine(command_line);
}
void SetUpOnMainThread() override {
embedded_test_server()->RegisterRequestMonitor(
base::BindRepeating(&NetworkServiceRestartBrowserTest::MonitorRequest,
base::Unretained(this)));
host_resolver()->AddRule("*", "127.0.0.1");
EXPECT_TRUE(embedded_test_server()->Start());
ContentBrowserTest::SetUpOnMainThread();
}
GURL GetTestURL() const {
// Use '/echoheader' instead of '/echo' to avoid a disk_cache bug.
// See https://crbug.com/792255.
return embedded_test_server()->GetURL("/echoheader");
}
BrowserContext* browser_context() {
return shell()->web_contents()->GetBrowserContext();
}
RenderFrameHostImpl* main_frame() {
return static_cast<RenderFrameHostImpl*>(
shell()->web_contents()->GetMainFrame());
}
bool CheckCanLoadHttp(Shell* shell, const std::string& relative_url) {
GURL test_url = embedded_test_server()->GetURL(relative_url);
std::string script(
"var xhr = new XMLHttpRequest();"
"xhr.open('GET', '");
script += test_url.spec() +
"', true);"
"xhr.onload = function (e) {"
" if (xhr.readyState === 4) {"
" window.domAutomationController.send(xhr.status === 200);"
" }"
"};"
"xhr.onerror = function () {"
" window.domAutomationController.send(false);"
"};"
"xhr.send(null)";
// The JS call will fail if disallowed because the process will be killed.
return EvalJs(shell, script, EXECUTE_SCRIPT_USE_MANUAL_REPLY).ExtractBool();
}
// Will reuse the single opened windows through the test case.
bool CheckCanLoadHttpInWindowOpen(const std::string& relative_url) {
GURL test_url = embedded_test_server()->GetURL(relative_url);
std::string inject_script = base::StringPrintf(
"var xhr = new XMLHttpRequest();"
"xhr.open('GET', '%s', true);"
"xhr.onload = function (e) {"
" if (xhr.readyState === 4) {"
" window.opener.domAutomationController.send(xhr.status === 200);"
" }"
"};"
"xhr.onerror = function () {"
" window.opener.domAutomationController.send(false);"
"};"
"xhr.send(null)",
test_url.spec().c_str());
std::string window_open_script = base::StringPrintf(
"var new_window = new_window || window.open('');"
"var inject_script = document.createElement('script');"
"inject_script.innerHTML = \"%s\";"
"new_window.document.body.appendChild(inject_script);",
inject_script.c_str());
// The JS call will fail if disallowed because the process will be killed.
return EvalJs(shell(), window_open_script, EXECUTE_SCRIPT_USE_MANUAL_REPLY)
.ExtractBool();
}
// Workers will live throughout the test case unless terminated.
bool CheckCanWorkerFetch(const std::string& worker_name,
const std::string& relative_url) {
GURL worker_url =
embedded_test_server()->GetURL("/workers/worker_common.js");
GURL fetch_url = embedded_test_server()->GetURL(relative_url);
std::string script = base::StringPrintf(
"var workers = workers || {};"
"var worker_name = '%s';"
"workers[worker_name] = workers[worker_name] || new Worker('%s');"
"workers[worker_name].onmessage = evt => {"
" if (evt.data != 'wait')"
" window.domAutomationController.send(evt.data === 200);"
"};"
"workers[worker_name].postMessage(\"eval "
" fetch(new Request('%s'))"
" .then(res => postMessage(res.status))"
" .catch(error => postMessage(error.toString()));"
" 'wait'"
"\");",
worker_name.c_str(), worker_url.spec().c_str(),
fetch_url.spec().c_str());
// The JS call will fail if disallowed because the process will be killed.
return EvalJs(shell(), script, EXECUTE_SCRIPT_USE_MANUAL_REPLY)
.ExtractBool();
}
// Terminate and delete the worker.
bool TerminateWorker(const std::string& worker_name) {
std::string script = base::StringPrintf(
"var workers = workers || {};"
"var worker_name = '%s';"
"if (workers[worker_name]) {"
" workers[worker_name].terminate();"
" delete workers[worker_name];"
" window.domAutomationController.send(true);"
"} else {"
" window.domAutomationController.send(false);"
"}",
worker_name.c_str());
// The JS call will fail if disallowed because the process will be killed.
return EvalJs(shell(), script, EXECUTE_SCRIPT_USE_MANUAL_REPLY)
.ExtractBool();
}
// Called by |embedded_test_server()|.
void MonitorRequest(const net::test_server::HttpRequest& request) {
base::AutoLock lock(last_request_lock_);
last_request_relative_url_ = request.relative_url;
}
std::string last_request_relative_url() const {
base::AutoLock lock(last_request_lock_);
return last_request_relative_url_;
}
private:
mutable base::Lock last_request_lock_;
std::string last_request_relative_url_ GUARDED_BY(last_request_lock_);
};
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
NetworkServiceProcessRecovery) {
if (IsInProcessNetworkService())
return;
mojo::Remote<network::mojom::NetworkContext> network_context(
CreateNetworkContext());
EXPECT_EQ(net::OK, LoadBasicRequest(network_context.get(), GetTestURL()));
EXPECT_TRUE(network_context.is_bound());
EXPECT_TRUE(network_context.is_connected());
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// |network_context| will receive an error notification, but it's not
// guaranteed to have arrived at this point. Flush the remote to make sure
// the notification has been received.
network_context.FlushForTesting();
EXPECT_TRUE(network_context.is_bound());
EXPECT_FALSE(network_context.is_connected());
// Make sure we could get |net::ERR_FAILED| with an invalid |network_context|.
EXPECT_EQ(net::ERR_FAILED,
LoadBasicRequest(network_context.get(), GetTestURL()));
// NetworkService should restart automatically and return valid interface.
mojo::Remote<network::mojom::NetworkContext> network_context2(
CreateNetworkContext());
EXPECT_EQ(net::OK, LoadBasicRequest(network_context2.get(), GetTestURL()));
EXPECT_TRUE(network_context2.is_bound());
EXPECT_TRUE(network_context2.is_connected());
}
void IncrementInt(int* i) {
*i = *i + 1;
}
// This test verifies basic functionality of RegisterNetworkServiceCrashHandler
// and UnregisterNetworkServiceCrashHandler.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, CrashHandlers) {
if (IsInProcessNetworkService())
return;
mojo::Remote<network::mojom::NetworkContext> network_context(
CreateNetworkContext());
EXPECT_TRUE(network_context.is_bound());
// Register 2 crash handlers.
int counter1 = 0;
int counter2 = 0;
base::CallbackListSubscription subscription1 =
RegisterNetworkServiceCrashHandler(
base::BindRepeating(&IncrementInt, base::Unretained(&counter1)));
base::CallbackListSubscription subscription2 =
RegisterNetworkServiceCrashHandler(
base::BindRepeating(&IncrementInt, base::Unretained(&counter2)));
// Crash the NetworkService process.
SimulateNetworkServiceCrash();
// |network_context| will receive an error notification, but it's not
// guaranteed to have arrived at this point. Flush the remote to make sure
// the notification has been received.
network_context.FlushForTesting();
EXPECT_TRUE(network_context.is_bound());
EXPECT_FALSE(network_context.is_connected());
// Verify the crash handlers executed.
EXPECT_EQ(1, counter1);
EXPECT_EQ(1, counter2);
// Revive the NetworkService process.
network_context.reset();
network_context.Bind(CreateNetworkContext());
EXPECT_TRUE(network_context.is_bound());
// Unregister one of the handlers.
subscription2 = {};
// Crash the NetworkService process.
SimulateNetworkServiceCrash();
// |network_context| will receive an error notification, but it's not
// guaranteed to have arrived at this point. Flush the remote to make sure
// the notification has been received.
network_context.FlushForTesting();
EXPECT_TRUE(network_context.is_bound());
EXPECT_FALSE(network_context.is_connected());
// Verify only the first crash handler executed.
EXPECT_EQ(2, counter1);
EXPECT_EQ(1, counter2);
}
// Make sure |StoragePartitionImpl::GetNetworkContext()| returns valid interface
// after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
StoragePartitionImplGetNetworkContext) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
network::mojom::NetworkContext* old_network_context =
partition->GetNetworkContext();
EXPECT_EQ(net::OK, LoadBasicRequest(old_network_context, GetTestURL()));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// |partition->GetNetworkContext()| should return a valid new pointer after
// crash.
EXPECT_NE(old_network_context, partition->GetNetworkContext());
EXPECT_EQ(net::OK,
LoadBasicRequest(partition->GetNetworkContext(), GetTestURL()));
}
// Make sure |URLLoaderFactoryGetter| returns valid interface after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
URLLoaderFactoryGetterGetNetworkFactory) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
scoped_refptr<URLLoaderFactoryGetter> url_loader_factory_getter =
partition->url_loader_factory_getter();
auto factory_owner = IOThreadSharedURLLoaderFactoryOwner::Create(
url_loader_factory_getter.get());
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
url_loader_factory_getter->FlushNetworkInterfaceOnIOThreadForTesting();
// |url_loader_factory_getter| should be able to get a valid new pointer after
// crash.
factory_owner = IOThreadSharedURLLoaderFactoryOwner::Create(
url_loader_factory_getter.get());
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
}
// Make sure the factory returned from
// |URLLoaderFactoryGetter::GetNetworkFactory()| continues to work after
// crashes.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
BrowserIOSharedURLLoaderFactory) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
auto factory_owner = IOThreadSharedURLLoaderFactoryOwner::Create(
partition->url_loader_factory_getter().get());
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
partition->url_loader_factory_getter()
->FlushNetworkInterfaceOnIOThreadForTesting();
// |shared_factory| should continue to work.
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
}
// Make sure the factory returned from
// |URLLoaderFactoryGetter::GetNetworkFactory()| doesn't crash if
// it's called after the StoragePartition is deleted.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
BrowserIOSharedFactoryAfterStoragePartitionGone) {
if (IsInProcessNetworkService())
return;
base::ScopedAllowBlockingForTesting allow_blocking;
std::unique_ptr<ShellBrowserContext> browser_context =
std::make_unique<ShellBrowserContext>(true);
auto* partition = static_cast<StoragePartitionImpl*>(
browser_context->GetDefaultStoragePartition());
auto factory_owner = IOThreadSharedURLLoaderFactoryOwner::Create(
partition->url_loader_factory_getter().get());
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
browser_context.reset();
EXPECT_EQ(net::ERR_FAILED,
factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
}
// Make sure basic navigation works after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
NavigationURLLoaderBasic) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
EXPECT_TRUE(
NavigateToURL(shell(), embedded_test_server()->GetURL("/title1.html")));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
partition->url_loader_factory_getter()
->FlushNetworkInterfaceOnIOThreadForTesting();
EXPECT_TRUE(
NavigateToURL(shell(), embedded_test_server()->GetURL("/title2.html")));
}
// Make sure basic XHR works after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, BasicXHR) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
EXPECT_TRUE(NavigateToURL(shell(), embedded_test_server()->GetURL("/echo")));
EXPECT_TRUE(CheckCanLoadHttp(shell(), "/title1.html"));
EXPECT_EQ(last_request_relative_url(), "/title1.html");
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Flush the interface to make sure the frame host has received error
// notification and the new URLLoaderFactoryBundle has been received by the
// frame.
main_frame()->FlushNetworkAndNavigationInterfacesForTesting();
EXPECT_TRUE(CheckCanLoadHttp(shell(), "/title2.html"));
EXPECT_EQ(last_request_relative_url(), "/title2.html");
}
// Make sure the factory returned from
// |StoragePartition::GetURLLoaderFactoryForBrowserProcess()| continues to work
// after crashes.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, BrowserUIFactory) {
if (IsInProcessNetworkService())
return;
auto* partition = browser_context()->GetDefaultStoragePartition();
auto* factory = partition->GetURLLoaderFactoryForBrowserProcess().get();
EXPECT_EQ(net::OK, LoadBasicRequestOnUIThread(factory, GetTestURL()));
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
EXPECT_EQ(net::OK, LoadBasicRequestOnUIThread(factory, GetTestURL()));
}
// Make sure the factory returned from
// |StoragePartition::GetURLLoaderFactoryForBrowserProcess()| doesn't crash if
// it's called after the StoragePartition is deleted.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
BrowserUIFactoryAfterStoragePartitionGone) {
if (IsInProcessNetworkService())
return;
base::ScopedAllowBlockingForTesting allow_blocking;
std::unique_ptr<ShellBrowserContext> browser_context =
std::make_unique<ShellBrowserContext>(true);
auto* partition = browser_context->GetDefaultStoragePartition();
scoped_refptr<network::SharedURLLoaderFactory> factory(
partition->GetURLLoaderFactoryForBrowserProcess());
EXPECT_EQ(net::OK, LoadBasicRequestOnUIThread(factory.get(), GetTestURL()));
browser_context.reset();
EXPECT_EQ(net::ERR_FAILED,
LoadBasicRequestOnUIThread(factory.get(), GetTestURL()));
}
// Make sure the factory pending factory returned from
// |StoragePartition::GetURLLoaderFactoryForBrowserProcessIOThread()| can be
// used after crashes.
// Flaky on Windows. https://crbug.com/840127
#if BUILDFLAG(IS_WIN)
#define MAYBE_BrowserIOPendingFactory DISABLED_BrowserIOPendingFactory
#else
#define MAYBE_BrowserIOPendingFactory BrowserIOPendingFactory
#endif
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
MAYBE_BrowserIOPendingFactory) {
if (IsInProcessNetworkService())
return;
auto* partition = browser_context()->GetDefaultStoragePartition();
auto pending_shared_url_loader_factory =
partition->GetURLLoaderFactoryForBrowserProcessIOThread();
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
static_cast<StoragePartitionImpl*>(partition)
->url_loader_factory_getter()
->FlushNetworkInterfaceOnIOThreadForTesting();
auto factory_owner = IOThreadSharedURLLoaderFactoryOwner::Create(
std::move(pending_shared_url_loader_factory));
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
}
// Make sure the factory constructed from
// |StoragePartition::GetURLLoaderFactoryForBrowserProcessIOThread()| continues
// to work after crashes.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, BrowserIOFactory) {
if (IsInProcessNetworkService())
return;
auto* partition = browser_context()->GetDefaultStoragePartition();
auto factory_owner = IOThreadSharedURLLoaderFactoryOwner::Create(
partition->GetURLLoaderFactoryForBrowserProcessIOThread());
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
static_cast<StoragePartitionImpl*>(partition)
->url_loader_factory_getter()
->FlushNetworkInterfaceOnIOThreadForTesting();
EXPECT_EQ(net::OK, factory_owner->LoadBasicRequestOnIOThread(GetTestURL()));
}
// Make sure the window from |window.open()| can load XHR after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, WindowOpenXHR) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
EXPECT_TRUE(NavigateToURL(shell(), embedded_test_server()->GetURL("/echo")));
EXPECT_TRUE(CheckCanLoadHttpInWindowOpen("/title1.html"));
EXPECT_EQ(last_request_relative_url(), "/title1.html");
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Flush the interface to make sure the frame host has received error
// notification and the new URLLoaderFactoryBundle has been received by the
// frame.
main_frame()->FlushNetworkAndNavigationInterfacesForTesting();
EXPECT_TRUE(CheckCanLoadHttpInWindowOpen("/title2.html"));
EXPECT_EQ(last_request_relative_url(), "/title2.html");
}
// Run tests with PlzDedicatedWorker.
// TODO(https://crbug.com/906991): Merge this test fixture into
// NetworkServiceRestartBrowserTest once PlzDedicatedWorker is enabled by
// default.
class NetworkServiceRestartForWorkerBrowserTest
: public NetworkServiceRestartBrowserTest,
public ::testing::WithParamInterface<bool> {
public:
NetworkServiceRestartForWorkerBrowserTest() {
if (GetParam()) {
scoped_feature_list_.InitAndEnableFeature(
blink::features::kPlzDedicatedWorker);
} else {
scoped_feature_list_.InitAndDisableFeature(
blink::features::kPlzDedicatedWorker);
}
}
private:
base::test::ScopedFeatureList scoped_feature_list_;
};
INSTANTIATE_TEST_SUITE_P(All,
NetworkServiceRestartForWorkerBrowserTest,
::testing::Values(false, true));
// Make sure worker fetch works after crash.
IN_PROC_BROWSER_TEST_P(NetworkServiceRestartForWorkerBrowserTest, WorkerFetch) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
EXPECT_TRUE(NavigateToURL(shell(), embedded_test_server()->GetURL("/echo")));
EXPECT_TRUE(CheckCanWorkerFetch("worker1", "/title1.html"));
EXPECT_EQ(last_request_relative_url(), "/title1.html");
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Flush the interface to make sure the frame host has received error
// notification and the new URLLoaderFactoryBundle has been received by the
// frame.
main_frame()->FlushNetworkAndNavigationInterfacesForTesting();
EXPECT_TRUE(CheckCanWorkerFetch("worker1", "/title2.html"));
EXPECT_EQ(last_request_relative_url(), "/title2.html");
}
// Make sure multiple workers are tracked correctly and work after crash.
IN_PROC_BROWSER_TEST_P(NetworkServiceRestartForWorkerBrowserTest,
MultipleWorkerFetch) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
EXPECT_TRUE(NavigateToURL(shell(), embedded_test_server()->GetURL("/echo")));
EXPECT_TRUE(CheckCanWorkerFetch("worker1", "/title1.html"));
EXPECT_TRUE(CheckCanWorkerFetch("worker2", "/title1.html"));
EXPECT_EQ(last_request_relative_url(), "/title1.html");
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Flush the interface to make sure the frame host has received error
// notification and the new URLLoaderFactoryBundle has been received by the
// frame.
main_frame()->FlushNetworkAndNavigationInterfacesForTesting();
// Both workers should work after crash.
EXPECT_TRUE(CheckCanWorkerFetch("worker1", "/title2.html"));
EXPECT_TRUE(CheckCanWorkerFetch("worker2", "/title2.html"));
EXPECT_EQ(last_request_relative_url(), "/title2.html");
// Terminate "worker1". "worker2" shouldn't be affected.
EXPECT_TRUE(TerminateWorker("worker1"));
EXPECT_TRUE(CheckCanWorkerFetch("worker2", "/title1.html"));
EXPECT_EQ(last_request_relative_url(), "/title1.html");
// Crash the NetworkService process again. "worker2" should still work.
SimulateNetworkServiceCrash();
partition->FlushNetworkInterfaceForTesting();
main_frame()->FlushNetworkAndNavigationInterfacesForTesting();
EXPECT_TRUE(CheckCanWorkerFetch("worker2", "/title2.html"));
EXPECT_EQ(last_request_relative_url(), "/title2.html");
}
// Make sure fetch from a page controlled by a service worker which doesn't have
// a fetch handler works after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
FetchFromServiceWorkerControlledPage_NoFetchHandler) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
ServiceWorkerStatusObserver observer;
ServiceWorkerContextWrapper* service_worker_context =
partition->GetServiceWorkerContext();
service_worker_context->AddObserver(&observer);
// Register a service worker which controls /service_worker/.
EXPECT_TRUE(NavigateToURL(shell(),
embedded_test_server()->GetURL(
"/service_worker/create_service_worker.html")));
EXPECT_EQ("DONE", EvalJs(shell(), "register('empty.js')"));
// Navigate to a controlled page.
EXPECT_TRUE(NavigateToURL(
shell(),
embedded_test_server()->GetURL("/service_worker/fetch_from_page.html")));
// Fetch from the controlled page.
const std::string script = "fetch_from_page('/echo');";
EXPECT_EQ("Echo", EvalJs(shell(), script));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Service worker should be stopped when network service crashes.
observer.WaitForStopped();
// Fetch from the controlled page again.
EXPECT_EQ("Echo", EvalJs(shell(), script));
service_worker_context->RemoveObserver(&observer);
}
// Make sure fetch from a page controlled by a service worker which has a fetch
// handler but falls back to the network works after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
FetchFromServiceWorkerControlledPage_PassThrough) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
ServiceWorkerStatusObserver observer;
ServiceWorkerContextWrapper* service_worker_context =
partition->GetServiceWorkerContext();
service_worker_context->AddObserver(&observer);
// Register a service worker which controls /service_worker/.
EXPECT_TRUE(NavigateToURL(shell(),
embedded_test_server()->GetURL(
"/service_worker/create_service_worker.html")));
EXPECT_EQ("DONE", EvalJs(shell(), "register('fetch_event_pass_through.js')"));
// Navigate to a controlled page.
EXPECT_TRUE(NavigateToURL(
shell(),
embedded_test_server()->GetURL("/service_worker/fetch_from_page.html")));
// Fetch from the controlled page.
const std::string script = "fetch_from_page('/echo');";
EXPECT_EQ("Echo", EvalJs(shell(), script));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Service worker should be stopped when network service crashes.
observer.WaitForStopped();
// Fetch from the controlled page again.
EXPECT_EQ("Echo", EvalJs(shell(), script));
service_worker_context->RemoveObserver(&observer);
}
// Make sure fetch from a page controlled by a service worker which has a fetch
// handler and responds with fetch() works after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
FetchFromServiceWorkerControlledPage_RespondWithFetch) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
ServiceWorkerStatusObserver observer;
ServiceWorkerContextWrapper* service_worker_context =
partition->GetServiceWorkerContext();
service_worker_context->AddObserver(&observer);
// Register a service worker which controls /service_worker/.
EXPECT_TRUE(NavigateToURL(shell(),
embedded_test_server()->GetURL(
"/service_worker/create_service_worker.html")));
EXPECT_EQ("DONE",
EvalJs(shell(), "register('fetch_event_respond_with_fetch.js')"));
// Navigate to a controlled page.
EXPECT_TRUE(NavigateToURL(
shell(),
embedded_test_server()->GetURL("/service_worker/fetch_from_page.html")));
// Fetch from the controlled page.
const std::string script = "fetch_from_page('/echo');";
EXPECT_EQ("Echo", EvalJs(shell(), script));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Service worker should be stopped when network service crashes.
observer.WaitForStopped();
// Fetch from the controlled page again.
EXPECT_EQ("Echo", EvalJs(shell(), script));
service_worker_context->RemoveObserver(&observer);
}
// Make sure fetch from service worker context works after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, ServiceWorkerFetch) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
ServiceWorkerStatusObserver observer;
ServiceWorkerContextWrapper* service_worker_context =
partition->GetServiceWorkerContext();
service_worker_context->AddObserver(&observer);
const GURL page_url = embedded_test_server()->GetURL(
"/service_worker/fetch_from_service_worker.html");
const GURL fetch_url = embedded_test_server()->GetURL("/echo");
// Navigate to the page and register a service worker.
EXPECT_TRUE(NavigateToURL(shell(), page_url));
EXPECT_EQ("ready", EvalJs(shell(), "setup();"));
// Fetch from the service worker.
const std::string script =
"fetch_from_service_worker('" + fetch_url.spec() + "');";
EXPECT_EQ("Echo", EvalJs(shell(), script));
// Crash the NetworkService process. Existing interfaces should receive error
// notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
partition->FlushNetworkInterfaceForTesting();
// Service worker should be stopped when network service crashes.
observer.WaitForStopped();
// Fetch from the service worker again.
EXPECT_EQ("Echo", EvalJs(shell(), script));
service_worker_context->RemoveObserver(&observer);
}
// TODO(crbug.com/154571): Shared workers are not available on Android.
#if BUILDFLAG(IS_ANDROID)
#define MAYBE_SharedWorker DISABLED_SharedWorker
#else
#define MAYBE_SharedWorker SharedWorker
#endif
// Make sure shared workers terminate after crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, MAYBE_SharedWorker) {
if (IsInProcessNetworkService())
return;
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
InjectTestSharedWorkerService(partition);
const GURL page_url =
embedded_test_server()->GetURL("/workers/fetch_from_shared_worker.html");
const GURL fetch_url = embedded_test_server()->GetURL("/echo");
// Navigate to the page and prepare a shared worker.
EXPECT_TRUE(NavigateToURL(shell(), page_url));
// Fetch from the shared worker to ensure it has started.
const std::string script =
"fetch_from_shared_worker('" + fetch_url.spec() + "');";
EXPECT_EQ("Echo", EvalJs(shell(), script));
// There should be one worker host. We will later wait for it to terminate.
TestSharedWorkerServiceImpl* service =
static_cast<TestSharedWorkerServiceImpl*>(
partition->GetSharedWorkerService());
EXPECT_EQ(1u, service->worker_hosts_.size());
base::RunLoop loop;
service->SetWorkerTerminationCallback(loop.QuitClosure());
// Crash the NetworkService process.
SimulateNetworkServiceCrash();
// Wait for the worker to detect the crash and self-terminate.
loop.Run();
EXPECT_TRUE(service->worker_hosts_.empty());
}
// Make sure that kSSLKeyLogFileHistogram is correctly recorded when the
// network service instance is started and the SSLKEYLOGFILE env var is set or
// the "--ssl-key-log-file" arg is set.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, SSLKeyLogFileMetrics) {
if (IsInProcessNetworkService())
return;
// Actions on temporary files are blocking.
base::ScopedAllowBlockingForTesting scoped_allow_blocking;
base::FilePath log_file_path;
base::CreateTemporaryFile(&log_file_path);
#if BUILDFLAG(IS_WIN)
// On Windows, FilePath::value() returns std::wstring, so convert.
std::string log_file_path_str = base::WideToUTF8(log_file_path.value());
#else
std::string log_file_path_str = log_file_path.value();
#endif
// Test that env var causes the histogram to be recorded.
{
base::ScopedEnvironmentVariableOverride scoped_env("SSLKEYLOGFILE",
log_file_path_str);
base::HistogramTester histograms;
// Restart network service to cause SSLKeyLogger to be re-initialized.
SimulateNetworkServiceCrash();
histograms.ExpectBucketCount(kSSLKeyLogFileHistogram,
SSLKeyLogFileAction::kLogFileEnabled, 1);
histograms.ExpectBucketCount(kSSLKeyLogFileHistogram,
SSLKeyLogFileAction::kEnvVarFound, 1);
}
// Test that the command-line switch causes the histogram to be recorded.
{
base::test::ScopedCommandLine scoped_command_line;
scoped_command_line.GetProcessCommandLine()->AppendSwitchPath(
"ssl-key-log-file", log_file_path);
base::HistogramTester histograms;
// Restart network service to cause SSLKeyLogger to be re-initialized.
SimulateNetworkServiceCrash();
histograms.ExpectBucketCount(kSSLKeyLogFileHistogram,
SSLKeyLogFileAction::kLogFileEnabled, 1);
histograms.ExpectBucketCount(kSSLKeyLogFileHistogram,
SSLKeyLogFileAction::kSwitchFound, 1);
}
}
// Make sure cookie access doesn't hang or fail after a network process crash.
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest, Cookies) {
if (IsInProcessNetworkService())
return;
auto* web_contents = shell()->web_contents();
ASSERT_TRUE(
NavigateToURL(shell(), embedded_test_server()->GetURL("/title1.html")));
EXPECT_TRUE(ExecJs(web_contents, "document.cookie = 'foo=bar';"));
EXPECT_EQ("foo=bar", EvalJs(web_contents, "document.cookie;"));
SimulateNetworkServiceCrash();
// content_shell uses in-memory cookie database, so the value saved earlier
// won't persist across crashes. What matters is that new access works.
EXPECT_TRUE(ExecJs(web_contents, "document.cookie = 'foo=bar';"));
// This will hang without the fix.
EXPECT_EQ("foo=bar", EvalJs(web_contents, "document.cookie;"));
}
// TODO(crbug.com/901026): Fix deadlock on process startup on Android.
#if BUILDFLAG(IS_ANDROID)
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
DISABLED_SyncCallDuringRestart) {
if (IsInProcessNetworkService())
return;
base::RunLoop run_loop;
mojo::Remote<network::mojom::NetworkServiceTest> network_service_test;
content::GetNetworkService()->BindTestInterface(
network_service_test.BindNewPipeAndPassReceiver());
// Crash the network service, but do not wait for full startup.
IgnoreNetworkServiceCrashes();
network_service_test.set_disconnect_handler(run_loop.QuitClosure());
network_service_test->SimulateCrash();
run_loop.Run();
network_service_test.reset();
content::GetNetworkService()->BindTestInterface(
network_service_test.BindNewPipeAndPassReceiver());
// Sync call should be fine, even though network process is still starting up.
mojo::ScopedAllowSyncCallForTesting allow_sync_call;
network_service_test->AddRules({});
}
#endif
// Tests handling of a NetworkService crash that happens after a navigation
// triggers sending a Commit IPC to the renderer process, but before a DidCommit
// IPC from the renderer process is handled. See also
// https://crbug.com/1056949#c75.
//
// TODO(lukasza): https://crbug.com/1129592: Flaky on Android and Mac. No
// flakiness observed whatsoever on Windows, Linux or CrOS.
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_MAC)
#define MAYBE_BetweenCommitNavigationAndDidCommit \
DISABLED_BetweenCommitNavigationAndDidCommit
#else
#define MAYBE_BetweenCommitNavigationAndDidCommit \
BetweenCommitNavigationAndDidCommit
#endif
IN_PROC_BROWSER_TEST_F(NetworkServiceRestartBrowserTest,
MAYBE_BetweenCommitNavigationAndDidCommit) {
if (IsInProcessNetworkService())
return;
GURL initial_url(embedded_test_server()->GetURL("foo.com", "/title1.html"));
EXPECT_TRUE(NavigateToURL(shell(), initial_url));
// Crash the NetworkService while CommitNavigation IPC is in-flight and before
// DidCommit IPC is handled. This tests how RenderFrameHostImpl recreates the
// URLLoaderFactory after NetworkService crash. In particular,
// RenderFrameHostImpl::UpdateSubresourceLoaderFactories needs to use the
// |request_initiator_origin_lock| associated with the in-flight IPC (because
// the |RFHI::last_committed_origin_| won't be updated until DidCommit IPC is
// handled).
auto pre_did_commit_lambda = [&](RenderFrameHost* frame) {
// Crash the NetworkService process. Existing interfaces should receive
// error notifications at some point.
SimulateNetworkServiceCrash();
// Flush the interface to make sure the error notification was received.
StoragePartitionImpl* partition = static_cast<StoragePartitionImpl*>(
browser_context()->GetDefaultStoragePartition());
partition->FlushNetworkInterfaceForTesting();
};
CommitMessageDelayer::DidCommitCallback pre_did_commit_callback =
base::BindLambdaForTesting(std::move(pre_did_commit_lambda));
GURL final_page_url(
embedded_test_server()->GetURL("bar.com", "/title2.html"));
CommitMessageDelayer did_commit_delayer(shell()->web_contents(),
final_page_url,
std::move(pre_did_commit_callback));
ASSERT_TRUE(ExecJs(shell(), JsReplace("location = $1", final_page_url)));
did_commit_delayer.Wait();
// Test if subresources requests work fine (e.g. if |request_initiator|
// matches |request_initiator_origin_lock|).
GURL final_resource_url(
embedded_test_server()->GetURL("bar.com", "/site_isolation/json.txt"));
EXPECT_EQ(
"{ \"name\" : \"chromium\" }\n",
EvalJs(shell(), JsReplace("fetch($1).then(response => response.text())",
final_resource_url)));
}
class NetworkServiceRestartWithFirstPartySetBrowserTest
: public NetworkServiceRestartBrowserTest,
public testing::WithParamInterface<bool> {
public:
NetworkServiceRestartWithFirstPartySetBrowserTest()
: https_server_(net::EmbeddedTestServer::TYPE_HTTPS) {
if (IsFirstPartySetsEnabled()) {
scoped_feature_list_.InitAndEnableFeature(features::kFirstPartySets);
} else {
scoped_feature_list_.InitAndDisableFeature(features::kFirstPartySets);
}
}
void SetUpCommandLine(base::CommandLine* command_line) override {
NetworkServiceRestartBrowserTest::SetUpCommandLine(command_line);
if (IsFirstPartySetsEnabled()) {
command_line->AppendSwitchASCII(
network::switches::kUseFirstPartySet,
"https://a.test,https://b.test,https://c.test");
}
}
void SetUpOnMainThread() override {
NetworkServiceRestartBrowserTest::SetUpOnMainThread();
host_resolver()->AddRule("*", "127.0.0.1");
https_server()->SetSSLConfig(net::EmbeddedTestServer::CERT_TEST_NAMES);
https_server()->AddDefaultHandlers(GetTestDataFilePath());
ASSERT_TRUE(https_server()->Start());
}
GURL EchoCookiesUrl(const std::string& host) {
return https_server_.GetURL(host, "/echoheader?Cookie");
}
GURL HostURL(const std::string& host) {
return https_server()->GetURL(host, "/");
}
std::vector<std::string> ExpectedSamePartyCookieNames() const {
// This function assumes that it is used with a cross-site context which may
// or may not be same-party, depending on whether First-Party Sets is
// enabled or not.
if (IsFirstPartySetsEnabled())
return {kSamePartyCookieName};
return {};
}
void SetSamePartyCookie(const std::string& host) {
ASSERT_TRUE(content::SetCookie(
web_contents()->GetBrowserContext(), HostURL(host),
base::StrCat(
{kSamePartyCookieName, "=1; samesite=lax; secure; sameparty"})));
}
std::string EmbedFrameAndGetCookieString() {
return ArrangeFramesAndGetContentFromLeaf(web_contents(), https_server(),
"b.test(%s)", {0},
EchoCookiesUrl(kHostA));
}
net::EmbeddedTestServer* https_server() { return &https_server_; }
WebContents* web_contents() { return shell()->web_contents(); }
bool IsFirstPartySetsEnabled() const { return GetParam(); }
private:
base::test::ScopedFeatureList scoped_feature_list_;
net::test_server::EmbeddedTestServer https_server_;
};
IN_PROC_BROWSER_TEST_P(NetworkServiceRestartWithFirstPartySetBrowserTest,
GetsUseFirstPartySetSwitch) {
// Network service is not running out of process, so cannot be crashed.
if (!content::IsOutOfProcessNetworkService())
return;
SetSamePartyCookie(kHostA);
EXPECT_THAT(EmbedFrameAndGetCookieString(),
net::CookieStringIs(testing::UnorderedPointwise(
net::NameIs(), ExpectedSamePartyCookieNames())));
SimulateNetworkServiceCrash();
// content_shell uses an in-memory cookie store, so cookies are not persisted,
// but that's ok. What matters is that the command-line set is re-plumbed to
// the network service upon restart.
SetSamePartyCookie(kHostA);
EXPECT_THAT(EmbedFrameAndGetCookieString(),
net::CookieStringIs(testing::UnorderedPointwise(
net::NameIs(), ExpectedSamePartyCookieNames())));
}
INSTANTIATE_TEST_SUITE_P(/* no prefix */,
NetworkServiceRestartWithFirstPartySetBrowserTest,
testing::Bool());
} // namespace content