blob: 9dee8185fc80069ad12785fbcb5ca7f61fc1ada3 [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <stdint.h>
#include "base/bind.h"
#include "base/bind_helpers.h"
#include "base/json/json_reader.h"
#include "base/macros.h"
#include "base/run_loop.h"
#include "base/strings/stringprintf.h"
#include "base/strings/utf_string_conversions.h"
#include "base/threading/thread_restrictions.h"
#include "build/build_config.h"
#include "chrome/browser/extensions/extension_apitest.h"
#include "chrome/browser/extensions/extension_service.h"
#include "chrome/browser/extensions/lazy_background_page_test_util.h"
#include "chrome/browser/gcm/gcm_profile_service_factory.h"
#include "chrome/browser/notifications/notification_display_service_factory.h"
#include "chrome/browser/notifications/notification_permission_context.h"
#include "chrome/browser/notifications/stub_notification_display_service.h"
#include "chrome/browser/permissions/permission_manager.h"
#include "chrome/browser/permissions/permission_result.h"
#include "chrome/browser/push_messaging/push_messaging_app_identifier.h"
#include "chrome/browser/push_messaging/push_messaging_service_factory.h"
#include "chrome/browser/push_messaging/push_messaging_service_impl.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/common/chrome_switches.h"
#include "chrome/common/extensions/api/web_navigation.h"
#include "chrome/test/base/ui_test_utils.h"
#include "components/content_settings/core/common/content_settings_types.h"
#include "components/gcm_driver/fake_gcm_profile_service.h"
#include "components/gcm_driver/instance_id/fake_gcm_driver_for_instance_id.h"
#include "components/version_info/version_info.h"
#include "content/public/browser/navigation_controller.h"
#include "content/public/browser/navigation_entry.h"
#include "content/public/browser/service_worker_context.h"
#include "content/public/browser/storage_partition.h"
#include "content/public/browser/web_contents.h"
#include "content/public/common/content_switches.h"
#include "content/public/common/origin_util.h"
#include "content/public/common/page_type.h"
#include "content/public/test/background_sync_test_util.h"
#include "content/public/test/browser_test_utils.h"
#include "content/public/test/service_worker_test_helpers.h"
#include "extensions/browser/event_router.h"
#include "extensions/browser/extension_host.h"
#include "extensions/browser/extension_registry.h"
#include "extensions/browser/process_manager.h"
#include "extensions/browser/service_worker_task_queue.h"
#include "extensions/common/api/test.h"
#include "extensions/common/extension_features.h"
#include "extensions/common/value_builder.h"
#include "extensions/test/background_page_watcher.h"
#include "extensions/test/extension_test_message_listener.h"
#include "extensions/test/result_catcher.h"
#include "net/dns/mock_host_resolver.h"
#include "net/test/embedded_test_server/embedded_test_server.h"
#include "url/url_constants.h"
namespace extensions {
namespace {
// Returns the newly added WebContents.
content::WebContents* AddTab(Browser* browser, const GURL& url) {
int starting_tab_count = browser->tab_strip_model()->count();
ui_test_utils::NavigateToURLWithDisposition(
browser, url, WindowOpenDisposition::NEW_FOREGROUND_TAB,
ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
int tab_count = browser->tab_strip_model()->count();
EXPECT_EQ(starting_tab_count + 1, tab_count);
return browser->tab_strip_model()->GetActiveWebContents();
}
enum BindingsType { NATIVE_BINDINGS, JAVASCRIPT_BINDINGS };
class WebContentsLoadStopObserver : content::WebContentsObserver {
public:
explicit WebContentsLoadStopObserver(content::WebContents* web_contents)
: content::WebContentsObserver(web_contents),
load_stop_observed_(false) {}
void WaitForLoadStop() {
if (load_stop_observed_)
return;
message_loop_runner_ = new content::MessageLoopRunner;
message_loop_runner_->Run();
}
private:
void DidStopLoading() override {
load_stop_observed_ = true;
if (message_loop_runner_)
message_loop_runner_->Quit();
}
bool load_stop_observed_;
scoped_refptr<content::MessageLoopRunner> message_loop_runner_;
DISALLOW_COPY_AND_ASSIGN(WebContentsLoadStopObserver);
};
} // namespace
class ServiceWorkerTest : public ExtensionApiTest,
public ::testing::WithParamInterface<BindingsType> {
public:
ServiceWorkerTest() : current_channel_(version_info::Channel::STABLE) {}
explicit ServiceWorkerTest(version_info::Channel channel)
: current_channel_(channel) {}
~ServiceWorkerTest() override {}
void SetUp() override {
if (GetParam() == NATIVE_BINDINGS) {
scoped_feature_list_.InitAndEnableFeature(
extensions_features::kNativeCrxBindings);
} else {
DCHECK_EQ(JAVASCRIPT_BINDINGS, GetParam());
scoped_feature_list_.InitAndDisableFeature(
extensions_features::kNativeCrxBindings);
}
ExtensionApiTest::SetUp();
}
void SetUpOnMainThread() override {
ExtensionApiTest::SetUpOnMainThread();
host_resolver()->AddRule("a.com", "127.0.0.1");
}
protected:
// Returns the ProcessManager for the test's profile.
ProcessManager* process_manager() { return ProcessManager::Get(profile()); }
// Starts running a test from the background page test extension.
//
// This registers a service worker with |script_name|, and fetches the
// registration result.
const Extension* StartTestFromBackgroundPage(const char* script_name) {
ExtensionTestMessageListener ready_listener("ready", false);
const Extension* extension =
LoadExtension(test_data_dir_.AppendASCII("service_worker/background"));
CHECK(extension);
CHECK(ready_listener.WaitUntilSatisfied());
ExtensionHost* background_host =
process_manager()->GetBackgroundHostForExtension(extension->id());
CHECK(background_host);
std::string error;
CHECK(content::ExecuteScriptAndExtractString(
background_host->host_contents(),
base::StringPrintf("test.registerServiceWorker('%s')", script_name),
&error));
if (!error.empty())
ADD_FAILURE() << "Got unexpected error " << error;
return extension;
}
// Navigates the browser to a new tab at |url|, waits for it to load, then
// returns it.
content::WebContents* Navigate(const GURL& url) {
ui_test_utils::NavigateToURLWithDisposition(
browser(), url, WindowOpenDisposition::NEW_FOREGROUND_TAB,
ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
content::WaitForLoadStop(web_contents);
return web_contents;
}
// Navigates the browser to |url| and returns the new tab's page type.
content::PageType NavigateAndGetPageType(const GURL& url) {
return Navigate(url)
->GetController()
.GetLastCommittedEntry()
->GetPageType();
}
// Extracts the innerText from |contents|.
std::string ExtractInnerText(content::WebContents* contents) {
std::string inner_text;
if (!content::ExecuteScriptAndExtractString(
contents,
"window.domAutomationController.send(document.body.innerText)",
&inner_text)) {
ADD_FAILURE() << "Failed to get inner text for "
<< contents->GetVisibleURL();
}
return inner_text;
}
// Navigates the browser to |url|, then returns the innerText of the new
// tab's WebContents' main frame.
std::string NavigateAndExtractInnerText(const GURL& url) {
return ExtractInnerText(Navigate(url));
}
size_t GetWorkerRefCount(const GURL& origin) {
content::ServiceWorkerContext* sw_context =
content::BrowserContext::GetDefaultStoragePartition(
browser()->profile())
->GetServiceWorkerContext();
base::RunLoop run_loop;
size_t ref_count = 0;
auto set_ref_count = [](size_t* ref_count, base::RunLoop* run_loop,
size_t external_request_count) {
*ref_count = external_request_count;
run_loop->Quit();
};
sw_context->CountExternalRequestsForTest(
origin, base::BindOnce(set_ref_count, &ref_count, &run_loop));
run_loop.Run();
return ref_count;
}
private:
// Sets the channel to "stable".
// Not useful after we've opened extension Service Workers to stable
// channel.
// TODO(lazyboy): Remove this when ExtensionServiceWorkersEnabled() is
// removed.
ScopedCurrentChannel current_channel_;
base::test::ScopedFeatureList scoped_feature_list_;
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerTest);
};
class ServiceWorkerBasedBackgroundTest : public ServiceWorkerTest {
public:
ServiceWorkerBasedBackgroundTest()
: ServiceWorkerTest(
// Extensions APIs from SW are only enabled on trunk.
// It is important to set the channel early so that this change is
// visible in renderers running with service workers (and no
// extension).
version_info::Channel::UNKNOWN) {}
~ServiceWorkerBasedBackgroundTest() override {}
void SetUpOnMainThread() override {
host_resolver()->AddRule("*", "127.0.0.1");
ASSERT_TRUE(embedded_test_server()->Start());
ServiceWorkerTest::SetUpOnMainThread();
}
private:
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerBasedBackgroundTest);
};
// Tests that Service Worker based background pages can be loaded and they can
// receive extension events.
// The extension is installed and loaded during this step and it registers
// an event listener for tabs.onCreated event. The step also verifies that tab
// creation correctly fires the listener.
IN_PROC_BROWSER_TEST_P(ServiceWorkerBasedBackgroundTest, PRE_Basic) {
ExtensionTestMessageListener newtab_listener("CREATED", false);
newtab_listener.set_failure_message("CREATE_FAILED");
ExtensionTestMessageListener worker_listener("WORKER_RUNNING", false);
worker_listener.set_failure_message("NON_WORKER_SCOPE");
const Extension* extension = LoadExtension(test_data_dir_.AppendASCII(
"service_worker/worker_based_background/basic"));
ASSERT_TRUE(extension);
const ExtensionId extension_id = extension->id();
EXPECT_TRUE(worker_listener.WaitUntilSatisfied());
const GURL url = embedded_test_server()->GetURL("/extensions/test_file.html");
content::WebContents* new_web_contents = AddTab(browser(), url);
EXPECT_TRUE(new_web_contents);
EXPECT_TRUE(newtab_listener.WaitUntilSatisfied());
// Service Worker extension does not have ExtensionHost.
EXPECT_FALSE(process_manager()->GetBackgroundHostForExtension(extension_id));
}
// After browser restarts, this test step ensures that opening a tab fires
// tabs.onCreated event listener to the extension without explicitly loading the
// extension. This is because the extension registered a listener before browser
// restarted in PRE_Basic.
IN_PROC_BROWSER_TEST_P(ServiceWorkerBasedBackgroundTest, Basic) {
ExtensionTestMessageListener newtab_listener("CREATED", false);
newtab_listener.set_failure_message("CREATE_FAILED");
const GURL url = embedded_test_server()->GetURL("/extensions/test_file.html");
content::WebContents* new_web_contents = AddTab(browser(), url);
EXPECT_TRUE(new_web_contents);
EXPECT_TRUE(newtab_listener.WaitUntilSatisfied());
}
// Tests chrome.runtime.onInstalled fires for extension service workers.
IN_PROC_BROWSER_TEST_P(ServiceWorkerBasedBackgroundTest, OnInstalledEvent) {
ASSERT_TRUE(RunExtensionTest(
"service_worker/worker_based_background/events_on_installed"))
<< message_;
}
// Tests chrome.storage APIs.
IN_PROC_BROWSER_TEST_P(ServiceWorkerBasedBackgroundTest, StorageSetAndGet) {
ASSERT_TRUE(
RunExtensionTest("service_worker/worker_based_background/storage"))
<< message_;
}
// Tests chrome.storage.local and chrome.storage.local APIs.
IN_PROC_BROWSER_TEST_P(ServiceWorkerBasedBackgroundTest, StorageNoPermissions) {
ASSERT_TRUE(RunExtensionTest(
"service_worker/worker_based_background/storage_no_permissions"))
<< message_;
}
// Listens for |message| from extension Service Worker early so that tests can
// wait for the message on startup (and not miss it).
class ServiceWorkerWithEarlyMessageListenerTest
: public ServiceWorkerBasedBackgroundTest {
public:
explicit ServiceWorkerWithEarlyMessageListenerTest(
const std::string& test_message)
: test_message_(test_message) {}
~ServiceWorkerWithEarlyMessageListenerTest() override = default;
bool WaitForMessage() { return listener_->WaitUntilSatisfied(); }
void CreatedBrowserMainParts(content::BrowserMainParts* main_parts) override {
// At this point, the notification service is initialized but the profile
// and extensions have not.
listener_ =
std::make_unique<ExtensionTestMessageListener>(test_message_, false);
ServiceWorkerBasedBackgroundTest::CreatedBrowserMainParts(main_parts);
}
private:
const std::string test_message_;
std::unique_ptr<ExtensionTestMessageListener> listener_;
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerWithEarlyMessageListenerTest);
};
class ServiceWorkerOnStartupEventTest
: public ServiceWorkerWithEarlyMessageListenerTest {
public:
ServiceWorkerOnStartupEventTest()
: ServiceWorkerWithEarlyMessageListenerTest("onStartup event") {}
~ServiceWorkerOnStartupEventTest() override = default;
private:
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerOnStartupEventTest);
};
// Tests "runtime.onStartup" for extension SW.
IN_PROC_BROWSER_TEST_P(ServiceWorkerOnStartupEventTest, PRE_Event) {
ASSERT_TRUE(RunExtensionTest(
"service_worker/worker_based_background/on_startup_event"))
<< message_;
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerOnStartupEventTest, Event) {
EXPECT_TRUE(WaitForMessage());
}
class ServiceWorkerRegistrationAtStartupTest
: public ServiceWorkerWithEarlyMessageListenerTest,
public ServiceWorkerTaskQueue::TestObserver {
public:
ServiceWorkerRegistrationAtStartupTest()
: ServiceWorkerWithEarlyMessageListenerTest("WORKER_RUNNING") {
ServiceWorkerTaskQueue::SetObserverForTest(this);
}
~ServiceWorkerRegistrationAtStartupTest() override {
ServiceWorkerTaskQueue::SetObserverForTest(nullptr);
}
// ServiceWorkerTaskQueue::TestObserver:
void OnActivateExtension(const ExtensionId& extension_id,
bool will_register_service_worker) override {
if (extension_id != kExtensionId)
return;
will_register_service_worker_ = will_register_service_worker;
extension_activated_ = true;
if (run_loop_)
run_loop_->Quit();
}
void WaitForOnActivateExtension() {
if (extension_activated_)
return;
run_loop_ = std::make_unique<base::RunLoop>();
run_loop_->Run();
}
bool WillRegisterServiceWorker() {
return will_register_service_worker_.value();
}
protected:
static const char kExtensionId[];
private:
bool extension_activated_ = false;
base::Optional<bool> will_register_service_worker_;
std::unique_ptr<base::RunLoop> run_loop_;
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerRegistrationAtStartupTest);
};
// Test extension id at
// api_test/service_worker/worker_based_background/registration_at_startup/.
const char ServiceWorkerRegistrationAtStartupTest::kExtensionId[] =
"gnchfmandajfaiajniicagenfmhdjila";
// Tests that Service Worker registration for existing extension isn't issued
// upon browser restart.
// Regression test for https://crbug.com/889687.
IN_PROC_BROWSER_TEST_P(ServiceWorkerRegistrationAtStartupTest,
PRE_ExtensionActivationDoesNotReregister) {
const Extension* extension = LoadExtension(test_data_dir_.AppendASCII(
"service_worker/worker_based_background/registration_at_startup"));
ASSERT_TRUE(extension);
EXPECT_EQ(kExtensionId, extension->id());
// Wait for "WORKER_RUNNING" message from the Service Worker.
EXPECT_TRUE(WaitForMessage());
EXPECT_TRUE(WillRegisterServiceWorker());
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerRegistrationAtStartupTest,
ExtensionActivationDoesNotReregister) {
// Since the extension has onStartup listener, the Service Worker will run on
// browser start and we'll see "WORKER_RUNNING" message from the worker.
EXPECT_TRUE(WaitForMessage());
// As the extension activated during first run on PRE_ step, it shouldn't
// re-register the Service Worker upon browser restart.
EXPECT_FALSE(WillRegisterServiceWorker());
}
// Class that dispatches an event to |extension_id| right after a
// non-lazy listener to the event is added from the extension's Service Worker.
class EarlyWorkerMessageSender : public EventRouter::Observer {
public:
EarlyWorkerMessageSender(content::BrowserContext* browser_context,
const ExtensionId& extension_id,
std::unique_ptr<Event> event)
: browser_context_(browser_context),
event_router_(EventRouter::EventRouter::Get(browser_context_)),
extension_id_(extension_id),
event_(std::move(event)),
listener_("PASS", false) {
DCHECK(browser_context_);
listener_.set_failure_message("FAIL");
event_router_->RegisterObserver(this, event_->event_name);
}
~EarlyWorkerMessageSender() override {
event_router_->UnregisterObserver(this);
}
// EventRouter::Observer:
void OnListenerAdded(const EventListenerInfo& details) override {
if (!event_ || extension_id_ != details.extension_id ||
event_->event_name != details.event_name) {
return;
}
const bool is_lazy_listener = details.browser_context == nullptr;
if (is_lazy_listener) {
// Wait for the non-lazy listener as we want to exercise the code to
// dispatch the event right after the Service Worker registration is
// completing.
return;
}
DispatchEvent(std::move(event_));
}
bool SendAndWait() { return listener_.WaitUntilSatisfied(); }
private:
static constexpr const char* const kTestOnMessageEventName = "test.onMessage";
void DispatchEvent(std::unique_ptr<Event> event) {
EventRouter::Get(browser_context_)
->DispatchEventToExtension(extension_id_, std::move(event));
}
content::BrowserContext* const browser_context_ = nullptr;
EventRouter* const event_router_ = nullptr;
const ExtensionId extension_id_;
std::unique_ptr<Event> event_;
ExtensionTestMessageListener listener_;
DISALLOW_COPY_AND_ASSIGN(EarlyWorkerMessageSender);
};
// Tests that extension event dispatch works correctly right after extension
// installation registers its Service Worker.
// Regression test for: https://crbug.com/850792.
IN_PROC_BROWSER_TEST_P(ServiceWorkerBasedBackgroundTest, EarlyEventDispatch) {
const ExtensionId kId("pkplfbidichfdicaijlchgnapepdginl");
// Build "test.onMessage" event for dispatch.
auto event = std::make_unique<Event>(
events::FOR_TEST, extensions::api::test::OnMessage::kEventName,
base::ListValue::From(base::JSONReader::ReadDeprecated(
R"([{"data": "hello", "lastMessage": true}])")),
profile());
EarlyWorkerMessageSender sender(profile(), kId, std::move(event));
// pkplfbidichfdicaijlchgnapepdginl
const Extension* extension = LoadExtension(test_data_dir_.AppendASCII(
"service_worker/worker_based_background/early_event_dispatch"));
CHECK(extension);
EXPECT_EQ(kId, extension->id());
EXPECT_TRUE(sender.SendAndWait());
}
// Tests that filtered events dispatches correctly right after a non-lazy
// listener is registered for that event (and before the corresponding lazy
// listener is registered).
IN_PROC_BROWSER_TEST_P(ServiceWorkerBasedBackgroundTest,
EarlyFilteredEventDispatch) {
const ExtensionId kId("pkplfbidichfdicaijlchgnapepdginl");
// Add minimal details required to dispatch webNavigation.onCommitted event:
extensions::api::web_navigation::OnCommitted::Details details;
details.transition_type =
extensions::api::web_navigation::TRANSITION_TYPE_TYPED;
// Build a dummy onCommited event to dispatch.
auto on_committed_event = std::make_unique<Event>(
events::WEB_NAVIGATION_ON_COMMITTED, "webNavigation.onCommitted",
api::web_navigation::OnCommitted::Create(details), profile());
// The filter will match the listener filter registered from the extension.
EventFilteringInfo info;
info.url = GURL("http://foo.com/a.html");
on_committed_event->filter_info = info;
EarlyWorkerMessageSender sender(profile(), kId,
std::move(on_committed_event));
// pkplfbidichfdicaijlchgnapepdginl
const Extension* extension = LoadExtension(test_data_dir_.AppendASCII(
"service_worker/worker_based_background/early_filtered_event_dispatch"));
ASSERT_TRUE(extension);
EXPECT_EQ(kId, extension->id());
EXPECT_TRUE(sender.SendAndWait());
}
class ServiceWorkerBackgroundSyncTest : public ServiceWorkerTest {
public:
ServiceWorkerBackgroundSyncTest() {}
~ServiceWorkerBackgroundSyncTest() override {}
void SetUpCommandLine(base::CommandLine* command_line) override {
// ServiceWorkerRegistration.sync requires experimental flag.
command_line->AppendSwitch(
::switches::kEnableExperimentalWebPlatformFeatures);
ServiceWorkerTest::SetUpCommandLine(command_line);
}
void SetUp() override {
content::background_sync_test_util::SetIgnoreNetworkChanges(true);
ServiceWorkerTest::SetUp();
}
private:
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerBackgroundSyncTest);
};
class ServiceWorkerPushMessagingTest : public ServiceWorkerTest {
public:
ServiceWorkerPushMessagingTest()
: scoped_testing_factory_installer_(
base::BindRepeating(&gcm::FakeGCMProfileService::Build)),
gcm_driver_(nullptr),
push_service_(nullptr) {}
~ServiceWorkerPushMessagingTest() override {}
void GrantNotificationPermissionForTest(const GURL& url) {
NotificationPermissionContext::UpdatePermission(profile(), url.GetOrigin(),
CONTENT_SETTING_ALLOW);
}
PushMessagingAppIdentifier GetAppIdentifierForServiceWorkerRegistration(
int64_t service_worker_registration_id,
const GURL& origin) {
PushMessagingAppIdentifier app_identifier =
PushMessagingAppIdentifier::FindByServiceWorker(
profile(), origin, service_worker_registration_id);
EXPECT_FALSE(app_identifier.is_null());
return app_identifier;
}
// ExtensionApiTest overrides.
void SetUpCommandLine(base::CommandLine* command_line) override {
command_line->AppendSwitch(
::switches::kEnableExperimentalWebPlatformFeatures);
ServiceWorkerTest::SetUpCommandLine(command_line);
}
void SetUpOnMainThread() override {
NotificationDisplayServiceFactory::GetInstance()->SetTestingFactory(
profile(),
base::BindRepeating(&StubNotificationDisplayService::FactoryForTests));
gcm::FakeGCMProfileService* gcm_service =
static_cast<gcm::FakeGCMProfileService*>(
gcm::GCMProfileServiceFactory::GetForProfile(profile()));
gcm_driver_ = static_cast<instance_id::FakeGCMDriverForInstanceID*>(
gcm_service->driver());
push_service_ = PushMessagingServiceFactory::GetForProfile(profile());
ServiceWorkerTest::SetUpOnMainThread();
}
instance_id::FakeGCMDriverForInstanceID* gcm_driver() const {
return gcm_driver_;
}
PushMessagingServiceImpl* push_service() const { return push_service_; }
private:
gcm::GCMProfileServiceFactory::ScopedTestingFactoryInstaller
scoped_testing_factory_installer_;
instance_id::FakeGCMDriverForInstanceID* gcm_driver_;
PushMessagingServiceImpl* push_service_;
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerPushMessagingTest);
};
class ServiceWorkerLazyBackgroundTest : public ServiceWorkerTest {
public:
ServiceWorkerLazyBackgroundTest()
: ServiceWorkerTest(
// Extensions APIs from SW are only enabled on trunk.
// It is important to set the channel early so that this change is
// visible in renderers running with service workers (and no
// extension).
version_info::Channel::UNKNOWN) {}
~ServiceWorkerLazyBackgroundTest() override {}
void SetUpCommandLine(base::CommandLine* command_line) override {
ServiceWorkerTest::SetUpCommandLine(command_line);
// Disable background network activity as it can suddenly bring the Lazy
// Background Page alive.
command_line->AppendSwitch(::switches::kDisableBackgroundNetworking);
command_line->AppendSwitch(::switches::kNoProxyServer);
}
void SetUpInProcessBrowserTestFixture() override {
ServiceWorkerTest::SetUpInProcessBrowserTestFixture();
// Set shorter delays to prevent test timeouts.
ProcessManager::SetEventPageIdleTimeForTesting(1);
ProcessManager::SetEventPageSuspendingTimeForTesting(1);
}
private:
DISALLOW_COPY_AND_ASSIGN(ServiceWorkerLazyBackgroundTest);
};
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, RegisterSucceeds) {
StartTestFromBackgroundPage("register.js");
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, UpdateRefreshesServiceWorker) {
base::ScopedAllowBlockingForTesting allow_blocking;
base::ScopedTempDir scoped_temp_dir;
ASSERT_TRUE(scoped_temp_dir.CreateUniqueTempDir());
base::FilePath pem_path = test_data_dir_.AppendASCII("service_worker")
.AppendASCII("update")
.AppendASCII("service_worker.pem");
base::FilePath path_v1 =
PackExtensionWithOptions(test_data_dir_.AppendASCII("service_worker")
.AppendASCII("update")
.AppendASCII("v1"),
scoped_temp_dir.GetPath().AppendASCII("v1.crx"),
pem_path, base::FilePath());
base::FilePath path_v2 =
PackExtensionWithOptions(test_data_dir_.AppendASCII("service_worker")
.AppendASCII("update")
.AppendASCII("v2"),
scoped_temp_dir.GetPath().AppendASCII("v2.crx"),
pem_path, base::FilePath());
const char* kId = "hfaanndiiilofhfokeanhddpkfffchdi";
ExtensionTestMessageListener listener_v1("Pong from version 1", false);
listener_v1.set_failure_message("FAILURE_V1");
// Install version 1.0 of the extension.
ASSERT_TRUE(InstallExtension(path_v1, 1));
EXPECT_TRUE(extensions::ExtensionRegistry::Get(profile())
->enabled_extensions()
.GetByID(kId));
EXPECT_TRUE(listener_v1.WaitUntilSatisfied());
ExtensionTestMessageListener listener_v2("Pong from version 2", false);
listener_v2.set_failure_message("FAILURE_V2");
// Update to version 2.0.
EXPECT_TRUE(UpdateExtension(kId, path_v2, 0));
EXPECT_TRUE(extensions::ExtensionRegistry::Get(profile())
->enabled_extensions()
.GetByID(kId));
EXPECT_TRUE(listener_v2.WaitUntilSatisfied());
}
// TODO(crbug.com/765736) Fix the test.
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, DISABLED_UpdateWithoutSkipWaiting) {
base::ScopedAllowBlockingForTesting allow_blocking;
base::ScopedTempDir scoped_temp_dir;
ASSERT_TRUE(scoped_temp_dir.CreateUniqueTempDir());
base::FilePath pem_path = test_data_dir_.AppendASCII("service_worker")
.AppendASCII("update_without_skip_waiting")
.AppendASCII("update_without_skip_waiting.pem");
base::FilePath path_v1 =
PackExtensionWithOptions(test_data_dir_.AppendASCII("service_worker")
.AppendASCII("update_without_skip_waiting")
.AppendASCII("v1"),
scoped_temp_dir.GetPath().AppendASCII("v1.crx"),
pem_path, base::FilePath());
base::FilePath path_v2 =
PackExtensionWithOptions(test_data_dir_.AppendASCII("service_worker")
.AppendASCII("update_without_skip_waiting")
.AppendASCII("v2"),
scoped_temp_dir.GetPath().AppendASCII("v2.crx"),
pem_path, base::FilePath());
const char* kId = "mhnnnflgagdakldgjpfcofkiocpdmogl";
// Install version 1.0 of the extension.
ASSERT_TRUE(InstallExtension(path_v1, 1));
EXPECT_TRUE(extensions::ExtensionRegistry::Get(profile())
->enabled_extensions()
.GetByID(kId));
const Extension* extension = extensions::ExtensionRegistry::Get(profile())
->enabled_extensions()
.GetByID(kId);
ExtensionTestMessageListener listener1("Pong from version 1", false);
listener1.set_failure_message("FAILURE");
content::WebContents* web_contents =
AddTab(browser(), extension->GetResourceURL("page.html"));
EXPECT_TRUE(listener1.WaitUntilSatisfied());
// Update to version 2.0.
EXPECT_TRUE(UpdateExtension(kId, path_v2, 0));
EXPECT_TRUE(extensions::ExtensionRegistry::Get(profile())
->enabled_extensions()
.GetByID(kId));
const Extension* extension_after_update =
extensions::ExtensionRegistry::Get(profile())
->enabled_extensions()
.GetByID(kId);
// Service worker version 2 would be installed but it won't be controlling
// the extension page yet.
ExtensionTestMessageListener listener2("Pong from version 1", false);
listener2.set_failure_message("FAILURE");
web_contents =
AddTab(browser(), extension_after_update->GetResourceURL("page.html"));
EXPECT_TRUE(listener2.WaitUntilSatisfied());
// Navigate the tab away from the extension page so that no clients are
// using the service worker.
// Note that just closing the tab with WebContentsDestroyedWatcher doesn't
// seem to be enough because it returns too early.
WebContentsLoadStopObserver navigate_away_observer(web_contents);
web_contents->GetController().LoadURL(
GURL(url::kAboutBlankURL), content::Referrer(), ui::PAGE_TRANSITION_TYPED,
std::string());
navigate_away_observer.WaitForLoadStop();
// Now expect service worker version 2 to control the extension page.
ExtensionTestMessageListener listener3("Pong from version 2", false);
listener3.set_failure_message("FAILURE");
web_contents =
AddTab(browser(), extension_after_update->GetResourceURL("page.html"));
EXPECT_TRUE(listener3.WaitUntilSatisfied());
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, FetchArbitraryPaths) {
const Extension* extension = StartTestFromBackgroundPage("fetch.js");
// Open some arbirary paths. Their contents should be what the service worker
// responds with, which in this case is the path of the fetch.
EXPECT_EQ(
"Caught a fetch for /index.html",
NavigateAndExtractInnerText(extension->GetResourceURL("index.html")));
EXPECT_EQ("Caught a fetch for /path/to/other.html",
NavigateAndExtractInnerText(
extension->GetResourceURL("path/to/other.html")));
EXPECT_EQ("Caught a fetch for /some/text/file.txt",
NavigateAndExtractInnerText(
extension->GetResourceURL("some/text/file.txt")));
EXPECT_EQ("Caught a fetch for /no/file/extension",
NavigateAndExtractInnerText(
extension->GetResourceURL("no/file/extension")));
EXPECT_EQ("Caught a fetch for /",
NavigateAndExtractInnerText(extension->GetResourceURL("")));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest,
FetchExtensionResourceFromServiceWorker) {
const Extension* extension = StartTestFromBackgroundPage("fetch_from_sw.js");
ASSERT_TRUE(extension);
// The service worker in this test tries to load 'hello.txt' via fetch()
// and sends back the content of the file, which should be 'hello'.
const char* kScript = R"(
let channel = new MessageChannel();
test.waitForMessage(channel.port1).then(message => {
window.domAutomationController.send(message);
});
test.registeredServiceWorker.postMessage(
{port: channel.port2}, [channel.port2]);
)";
EXPECT_EQ("hello", ExecuteScriptInBackgroundPage(extension->id(), kScript));
}
// Tests that fetch() from service worker and network fallback
// go through webRequest.onBeforeRequest API.
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, OnBeforeRequest) {
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/webrequest"), kFlagNone);
ASSERT_TRUE(extension);
ASSERT_TRUE(StartEmbeddedTestServer());
// Start a service worker and make it control the page.
GURL page_url = embedded_test_server()->GetURL(
"/extensions/api_test/service_worker/"
"webrequest/webpage.html");
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
ui_test_utils::NavigateToURL(browser(), page_url);
content::WaitForLoadStop(web_contents);
std::string result;
ASSERT_TRUE(content::ExecuteScriptAndExtractString(web_contents,
"register();", &result));
EXPECT_EQ("ready", result);
// Initiate a fetch that the service worker doesn't intercept
// (network fallback).
result.clear();
ASSERT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "doFetch('hello.txt?fallthrough');", &result));
EXPECT_EQ("hello", result);
EXPECT_EQ(
"/extensions/api_test/service_worker/webrequest/hello.txt?fallthrough",
ExecuteScriptInBackgroundPage(extension->id(), "getLastHookedPath()"));
// Initiate a fetch that results in calling fetch() in the service worker.
result.clear();
ASSERT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "doFetch('hello.txt?respondWithFetch');", &result));
EXPECT_EQ("hello", result);
EXPECT_EQ(
"/extensions/api_test/service_worker/webrequest/"
"hello.txt?respondWithFetch",
ExecuteScriptInBackgroundPage(extension->id(), "getLastHookedPath()"));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, SWServedBackgroundPageReceivesEvent) {
const Extension* extension =
StartTestFromBackgroundPage("replace_background.js");
ExtensionHost* background_page =
process_manager()->GetBackgroundHostForExtension(extension->id());
ASSERT_TRUE(background_page);
// Close the background page and start it again so that the service worker
// will start controlling pages.
background_page->Close();
BackgroundPageWatcher(process_manager(), extension).WaitForClose();
background_page = nullptr;
process_manager()->WakeEventPage(extension->id(), base::DoNothing());
BackgroundPageWatcher(process_manager(), extension).WaitForOpen();
// Since the SW is now controlling the extension, the SW serves the background
// script. page.html sends a message to the background script and we verify
// that the SW served background script correctly receives the message/event.
ExtensionTestMessageListener listener("onMessage/SW BG.", false);
listener.set_failure_message("onMessage/original BG.");
content::WebContents* web_contents =
AddTab(browser(), extension->GetResourceURL("page.html"));
ASSERT_TRUE(web_contents);
EXPECT_TRUE(listener.WaitUntilSatisfied());
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, SWServedBackgroundPage) {
const Extension* extension = StartTestFromBackgroundPage("fetch.js");
std::string kExpectedInnerText = "background.html contents for testing.";
// Sanity check that the background page has the expected content.
ExtensionHost* background_page =
process_manager()->GetBackgroundHostForExtension(extension->id());
ASSERT_TRUE(background_page);
EXPECT_EQ(kExpectedInnerText,
ExtractInnerText(background_page->host_contents()));
// Close the background page.
background_page->Close();
BackgroundPageWatcher(process_manager(), extension).WaitForClose();
background_page = nullptr;
// Start it again.
process_manager()->WakeEventPage(extension->id(), base::DoNothing());
BackgroundPageWatcher(process_manager(), extension).WaitForOpen();
// The service worker should get a fetch event for the background page.
background_page =
process_manager()->GetBackgroundHostForExtension(extension->id());
ASSERT_TRUE(background_page);
content::WaitForLoadStop(background_page->host_contents());
EXPECT_EQ("Caught a fetch for /background.html",
ExtractInnerText(background_page->host_contents()));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest,
ServiceWorkerPostsMessageToBackgroundClient) {
const Extension* extension =
StartTestFromBackgroundPage("post_message_to_background_client.js");
// The service worker in this test simply posts a message to the background
// client it receives from getBackgroundClient().
const char* kScript =
"var messagePromise = null;\n"
"if (test.lastMessageFromServiceWorker) {\n"
" messagePromise = Promise.resolve(test.lastMessageFromServiceWorker);\n"
"} else {\n"
" messagePromise = test.waitForMessage(navigator.serviceWorker);\n"
"}\n"
"messagePromise.then(function(message) {\n"
" window.domAutomationController.send(String(message == 'success'));\n"
"})\n";
EXPECT_EQ("true", ExecuteScriptInBackgroundPage(extension->id(), kScript));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest,
BackgroundPagePostsMessageToServiceWorker) {
const Extension* extension =
StartTestFromBackgroundPage("post_message_to_sw.js");
// The service worker in this test waits for a message, then echoes it back
// by posting a message to the background page via getBackgroundClient().
const char* kScript =
"var mc = new MessageChannel();\n"
"test.waitForMessage(mc.port1).then(function(message) {\n"
" window.domAutomationController.send(String(message == 'hello'));\n"
"});\n"
"test.registeredServiceWorker.postMessage(\n"
" {message: 'hello', port: mc.port2}, [mc.port2])\n";
EXPECT_EQ("true", ExecuteScriptInBackgroundPage(extension->id(), kScript));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest,
ServiceWorkerSuspensionOnExtensionUnload) {
// For this test, only hold onto the extension's ID and URL + a function to
// get a resource URL, because we're going to be disabling and uninstalling
// it, which will invalidate the pointer.
std::string extension_id;
GURL extension_url;
{
const Extension* extension = StartTestFromBackgroundPage("fetch.js");
extension_id = extension->id();
extension_url = extension->url();
}
auto get_resource_url = [&extension_url](const std::string& path) {
return Extension::GetResourceURL(extension_url, path);
};
// Fetch should route to the service worker.
EXPECT_EQ("Caught a fetch for /index.html",
NavigateAndExtractInnerText(get_resource_url("index.html")));
// Disable the extension. Opening the page should fail.
extension_service()->DisableExtension(extension_id,
disable_reason::DISABLE_USER_ACTION);
base::RunLoop().RunUntilIdle();
EXPECT_EQ(content::PAGE_TYPE_ERROR,
NavigateAndGetPageType(get_resource_url("index.html")));
EXPECT_EQ(content::PAGE_TYPE_ERROR,
NavigateAndGetPageType(get_resource_url("other.html")));
// Re-enable the extension. Opening pages should immediately start to succeed
// again.
extension_service()->EnableExtension(extension_id);
base::RunLoop().RunUntilIdle();
EXPECT_EQ("Caught a fetch for /index.html",
NavigateAndExtractInnerText(get_resource_url("index.html")));
EXPECT_EQ("Caught a fetch for /other.html",
NavigateAndExtractInnerText(get_resource_url("other.html")));
EXPECT_EQ("Caught a fetch for /another.html",
NavigateAndExtractInnerText(get_resource_url("another.html")));
// Uninstall the extension. Opening pages should fail again.
base::string16 error;
extension_service()->UninstallExtension(
extension_id, UninstallReason::UNINSTALL_REASON_FOR_TESTING, &error);
base::RunLoop().RunUntilIdle();
EXPECT_EQ(content::PAGE_TYPE_ERROR,
NavigateAndGetPageType(get_resource_url("index.html")));
EXPECT_EQ(content::PAGE_TYPE_ERROR,
NavigateAndGetPageType(get_resource_url("other.html")));
EXPECT_EQ(content::PAGE_TYPE_ERROR,
NavigateAndGetPageType(get_resource_url("anotherother.html")));
EXPECT_EQ(content::PAGE_TYPE_ERROR,
NavigateAndGetPageType(get_resource_url("final.html")));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, BackgroundPageIsWokenIfAsleep) {
const Extension* extension = StartTestFromBackgroundPage("wake_on_fetch.js");
// Navigate to special URLs that this test's service worker recognises, each
// making a check then populating the response with either "true" or "false".
EXPECT_EQ("true", NavigateAndExtractInnerText(extension->GetResourceURL(
"background-client-is-awake")));
EXPECT_EQ("true", NavigateAndExtractInnerText(
extension->GetResourceURL("ping-background-client")));
// Ping more than once for good measure.
EXPECT_EQ("true", NavigateAndExtractInnerText(
extension->GetResourceURL("ping-background-client")));
// Shut down the event page. The SW should detect that it's closed, but still
// be able to ping it.
ExtensionHost* background_page =
process_manager()->GetBackgroundHostForExtension(extension->id());
ASSERT_TRUE(background_page);
background_page->Close();
BackgroundPageWatcher(process_manager(), extension).WaitForClose();
EXPECT_EQ("false", NavigateAndExtractInnerText(extension->GetResourceURL(
"background-client-is-awake")));
EXPECT_EQ("true", NavigateAndExtractInnerText(
extension->GetResourceURL("ping-background-client")));
EXPECT_EQ("true", NavigateAndExtractInnerText(
extension->GetResourceURL("ping-background-client")));
EXPECT_EQ("true", NavigateAndExtractInnerText(extension->GetResourceURL(
"background-client-is-awake")));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest,
GetBackgroundClientFailsWithNoBackgroundPage) {
// This extension doesn't have a background page, only a tab at page.html.
// The service worker it registers tries to call getBackgroundClient() and
// should fail.
// Note that this also tests that service workers can be registered from tabs.
EXPECT_TRUE(RunExtensionSubtest("service_worker/no_background", "page.html"));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, NotificationAPI) {
EXPECT_TRUE(RunExtensionSubtest("service_worker/notifications/has_permission",
"page.html"));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, WebAccessibleResourcesFetch) {
EXPECT_TRUE(RunExtensionSubtest(
"service_worker/web_accessible_resources/fetch/", "page.html"));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, TabsCreate) {
// Extensions APIs from SW are only enabled on trunk.
ScopedCurrentChannel current_channel_override(version_info::Channel::UNKNOWN);
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/tabs_create"), kFlagNone);
ASSERT_TRUE(extension);
ui_test_utils::NavigateToURL(browser(),
extension->GetResourceURL("page.html"));
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
int starting_tab_count = browser()->tab_strip_model()->count();
std::string result;
ASSERT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "window.runServiceWorker()", &result));
ASSERT_EQ("chrome.tabs.create callback", result);
EXPECT_EQ(starting_tab_count + 1, browser()->tab_strip_model()->count());
// Check extension shutdown path.
UnloadExtension(extension->id());
EXPECT_EQ(starting_tab_count, browser()->tab_strip_model()->count());
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, Events) {
// Extensions APIs from SW are only enabled on trunk.
ScopedCurrentChannel current_channel_override(version_info::Channel::UNKNOWN);
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/events"), kFlagNone);
ASSERT_TRUE(extension);
ui_test_utils::NavigateToURL(browser(),
extension->GetResourceURL("page.html"));
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
std::string result;
ASSERT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "window.runEventTest()", &result));
ASSERT_EQ("chrome.tabs.onUpdated callback", result);
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, EventsToStoppedWorker) {
// Extensions APIs from SW are only enabled on trunk.
ScopedCurrentChannel current_channel_override(version_info::Channel::UNKNOWN);
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/events_to_stopped_worker"),
kFlagNone);
ASSERT_TRUE(extension);
ui_test_utils::NavigateToURL(browser(),
extension->GetResourceURL("page.html"));
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
{
std::string result;
ASSERT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "window.runServiceWorker()", &result));
ASSERT_EQ("ready", result);
base::RunLoop run_loop;
content::StoragePartition* storage_partition =
content::BrowserContext::GetDefaultStoragePartition(
browser()->profile());
content::StopServiceWorkerForScope(
storage_partition->GetServiceWorkerContext(),
// The service worker is registered at the top level scope.
extension->url(), run_loop.QuitClosure());
run_loop.Run();
}
std::string result;
ASSERT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "window.createTabThenUpdate()", &result));
ASSERT_EQ("chrome.tabs.onUpdated callback", result);
}
// Tests that events to service worker arrives correctly event if the owner
// extension of the worker is not running.
IN_PROC_BROWSER_TEST_P(ServiceWorkerLazyBackgroundTest,
EventsToStoppedExtension) {
LazyBackgroundObserver lazy_observer;
ResultCatcher catcher;
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/events_to_stopped_extension"),
kFlagNone);
ASSERT_TRUE(extension);
EXPECT_TRUE(catcher.GetNextResult()) << catcher.message();
ProcessManager* pm = ProcessManager::Get(browser()->profile());
EXPECT_GT(pm->GetLazyKeepaliveCount(extension), 0);
EXPECT_FALSE(pm->GetLazyKeepaliveActivities(extension).empty());
// |extension|'s background page opens a tab to its resource.
content::WebContents* extension_web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
EXPECT_TRUE(content::WaitForLoadStop(extension_web_contents));
EXPECT_EQ(extension->GetResourceURL("page.html").spec(),
extension_web_contents->GetURL().spec());
{
// Let the service worker start and register a listener to
// chrome.tabs.onCreated event.
ExtensionTestMessageListener add_listener_done("listener-added", false);
content::ExecuteScriptAsync(extension_web_contents,
"window.runServiceWorkerAsync()");
EXPECT_TRUE(add_listener_done.WaitUntilSatisfied());
base::RunLoop run_loop;
content::StoragePartition* storage_partition =
content::BrowserContext::GetDefaultStoragePartition(
browser()->profile());
content::StopServiceWorkerForScope(
storage_partition->GetServiceWorkerContext(),
// The service worker is registered at the top level scope.
extension->url(), run_loop.QuitClosure());
run_loop.Run();
}
// Close the tab to |extension|'s resource. This will also close the
// extension's event page.
browser()->tab_strip_model()->CloseWebContentsAt(
browser()->tab_strip_model()->active_index(), TabStripModel::CLOSE_NONE);
lazy_observer.Wait();
// At this point both the extension worker and extension event page is not
// running. Since the worker registered a listener for tabs.onCreated, it
// will be started to dispatch the event once we create a tab.
ExtensionTestMessageListener newtab_listener("hello-newtab", false);
newtab_listener.set_failure_message("WRONG_NEWTAB");
content::WebContents* new_web_contents =
AddTab(browser(), GURL(url::kAboutBlankURL));
EXPECT_TRUE(new_web_contents);
EXPECT_TRUE(newtab_listener.WaitUntilSatisfied());
}
// Tests that events to service worker correctly after browser restart.
// This test is similar to EventsToStoppedExtension, except that the event
// delivery is verified after a browser restart.
IN_PROC_BROWSER_TEST_P(ServiceWorkerLazyBackgroundTest,
PRE_EventsAfterRestart) {
LazyBackgroundObserver lazy_observer;
ResultCatcher catcher;
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/events_to_stopped_extension"),
kFlagNone);
ASSERT_TRUE(extension);
EXPECT_TRUE(catcher.GetNextResult()) << catcher.message();
ProcessManager* pm = ProcessManager::Get(browser()->profile());
EXPECT_GT(pm->GetLazyKeepaliveCount(extension), 0);
EXPECT_FALSE(pm->GetLazyKeepaliveActivities(extension).empty());
// |extension|'s background page opens a tab to its resource.
content::WebContents* extension_web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
EXPECT_TRUE(content::WaitForLoadStop(extension_web_contents));
EXPECT_EQ(extension->GetResourceURL("page.html").spec(),
extension_web_contents->GetURL().spec());
{
// Let the service worker start and register a listener to
// chrome.tabs.onCreated event.
ExtensionTestMessageListener add_listener_done("listener-added", false);
content::ExecuteScriptAsync(extension_web_contents,
"window.runServiceWorkerAsync()");
EXPECT_TRUE(add_listener_done.WaitUntilSatisfied());
base::RunLoop run_loop;
content::StoragePartition* storage_partition =
content::BrowserContext::GetDefaultStoragePartition(
browser()->profile());
content::StopServiceWorkerForScope(
storage_partition->GetServiceWorkerContext(),
// The service worker is registered at the top level scope.
extension->url(), run_loop.QuitClosure());
run_loop.Run();
}
// Close the tab to |extension|'s resource. This will also close the
// extension's event page.
browser()->tab_strip_model()->CloseWebContentsAt(
browser()->tab_strip_model()->active_index(), TabStripModel::CLOSE_NONE);
lazy_observer.Wait();
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerLazyBackgroundTest, EventsAfterRestart) {
ExtensionTestMessageListener newtab_listener("hello-newtab", false);
content::WebContents* new_web_contents =
AddTab(browser(), GURL(url::kAboutBlankURL));
EXPECT_TRUE(new_web_contents);
EXPECT_TRUE(newtab_listener.WaitUntilSatisfied());
}
// Tests that worker ref count increments while extension API function is
// active.
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, WorkerRefCount) {
// Extensions APIs from SW are only enabled on trunk.
ScopedCurrentChannel current_channel_override(version_info::Channel::UNKNOWN);
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/api_worker_ref_count"),
kFlagNone);
ASSERT_TRUE(extension);
ui_test_utils::NavigateToURL(browser(),
extension->GetResourceURL("page.html"));
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
ExtensionTestMessageListener worker_start_listener("WORKER STARTED", false);
worker_start_listener.set_failure_message("FAILURE");
ASSERT_TRUE(
content::ExecuteScript(web_contents, "window.runServiceWorker()"));
ASSERT_TRUE(worker_start_listener.WaitUntilSatisfied());
// Service worker should have no pending requests because it hasn't peformed
// any extension API request yet.
EXPECT_EQ(0u, GetWorkerRefCount(extension->url()));
ExtensionTestMessageListener worker_listener("CHECK_REF_COUNT", true);
worker_listener.set_failure_message("FAILURE");
ASSERT_TRUE(content::ExecuteScript(web_contents, "window.testSendMessage()"));
ASSERT_TRUE(worker_listener.WaitUntilSatisfied());
// Service worker should have exactly one pending request because
// chrome.test.sendMessage() API call is in-flight.
EXPECT_EQ(1u, GetWorkerRefCount(extension->url()));
// Peform another extension API request while one is ongoing.
{
ExtensionTestMessageListener listener("CHECK_REF_COUNT", true);
listener.set_failure_message("FAILURE");
ASSERT_TRUE(
content::ExecuteScript(web_contents, "window.testSendMessage()"));
ASSERT_TRUE(listener.WaitUntilSatisfied());
// Service worker currently has two extension API requests in-flight.
EXPECT_EQ(2u, GetWorkerRefCount(extension->url()));
// Finish executing the nested chrome.test.sendMessage() first.
listener.Reply("Hello world");
}
ExtensionTestMessageListener worker_completion_listener("SUCCESS_FROM_WORKER",
false);
// Finish executing chrome.test.sendMessage().
worker_listener.Reply("Hello world");
EXPECT_TRUE(worker_completion_listener.WaitUntilSatisfied());
// The following block makes sure we have received all the IPCs related to
// ref-count from the worker.
{
// The following roundtrip:
// browser->extension->worker->extension->browser
// will ensure that the worker sent the relevant ref count IPCs.
std::string result;
EXPECT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "window.roundtripToWorker();", &result));
EXPECT_EQ("roundtrip-succeeded", result);
// Ensure IO thread IPCs run.
content::RunAllTasksUntilIdle();
}
// The ref count should drop to 0.
EXPECT_EQ(0u, GetWorkerRefCount(extension->url()));
}
// This test loads a web page that has an iframe pointing to a
// chrome-extension:// URL. The URL is listed in the extension's
// web_accessible_resources. Initially the iframe is served from the extension's
// resource file. After verifying that, we register a Service Worker that
// controls the extension. Further requests to the same resource as before
// should now be served by the Service Worker.
// This test also verifies that if the requested resource exists in the manifest
// but is not present in the extension directory, the Service Worker can still
// serve the resource file.
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, WebAccessibleResourcesIframeSrc) {
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII(
"service_worker/web_accessible_resources/iframe_src"),
kFlagNone);
ASSERT_TRUE(extension);
ASSERT_TRUE(StartEmbeddedTestServer());
// Service workers can only control secure contexts
// (https://w3c.github.io/webappsec-secure-contexts/). For documents, this
// typically means the document must have a secure origin AND all its ancestor
// frames must have documents with secure origins. However, extension pages
// are considered secure, even if they have an ancestor document that is an
// insecure context (see GetSchemesBypassingSecureContextCheckWhitelist). So
// extension service workers must be able to control an extension page
// embedded in an insecure context. To test this, set up an insecure
// (non-localhost, non-https) URL for the web page. This page will create
// iframes that load extension pages that must be controllable by service
// worker.
GURL page_url =
embedded_test_server()->GetURL("a.com",
"/extensions/api_test/service_worker/"
"web_accessible_resources/webpage.html");
EXPECT_FALSE(content::IsOriginSecure(page_url));
content::WebContents* web_contents = AddTab(browser(), page_url);
std::string result;
// webpage.html will create an iframe pointing to a resource from |extension|.
// Expect the resource to be served by the extension.
EXPECT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, base::StringPrintf("window.testIframe('%s', 'iframe.html')",
extension->id().c_str()),
&result));
EXPECT_EQ("FROM_EXTENSION_RESOURCE", result);
ExtensionTestMessageListener service_worker_ready_listener("SW_READY", false);
EXPECT_TRUE(ExecuteScriptInBackgroundPageNoWait(
extension->id(), "window.registerServiceWorker()"));
EXPECT_TRUE(service_worker_ready_listener.WaitUntilSatisfied());
result.clear();
// webpage.html will create another iframe pointing to a resource from
// |extension| as before. But this time, the resource should be be served
// from the Service Worker.
EXPECT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, base::StringPrintf("window.testIframe('%s', 'iframe.html')",
extension->id().c_str()),
&result));
EXPECT_EQ("FROM_SW_RESOURCE", result);
result.clear();
// webpage.html will create yet another iframe pointing to a resource that
// exists in the extension manifest's web_accessible_resources, but is not
// present in the extension directory. Expect the resources of the iframe to
// be served by the Service Worker.
EXPECT_TRUE(content::ExecuteScriptAndExtractString(
web_contents,
base::StringPrintf("window.testIframe('%s', 'iframe_non_existent.html')",
extension->id().c_str()),
&result));
EXPECT_EQ("FROM_SW_RESOURCE", result);
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerBackgroundSyncTest, Sync) {
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/sync"), kFlagNone);
ASSERT_TRUE(extension);
ui_test_utils::NavigateToURL(browser(),
extension->GetResourceURL("page.html"));
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
// Prevent firing by going offline.
content::background_sync_test_util::SetOnline(web_contents, false);
ExtensionTestMessageListener sync_listener("SYNC: send-chats", false);
sync_listener.set_failure_message("FAIL");
std::string result;
ASSERT_TRUE(content::ExecuteScriptAndExtractString(
web_contents, "window.runServiceWorker()", &result));
ASSERT_EQ("SERVICE_WORKER_READY", result);
EXPECT_FALSE(sync_listener.was_satisfied());
// Resume firing by going online.
content::background_sync_test_util::SetOnline(web_contents, true);
EXPECT_TRUE(sync_listener.WaitUntilSatisfied());
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest,
FetchFromContentScriptShouldNotGoToServiceWorkerOfPage) {
ASSERT_TRUE(StartEmbeddedTestServer());
GURL page_url = embedded_test_server()->GetURL(
"/extensions/api_test/service_worker/content_script_fetch/"
"controlled_page/index.html");
content::WebContents* tab =
browser()->tab_strip_model()->GetActiveWebContents();
ui_test_utils::NavigateToURL(browser(), page_url);
content::WaitForLoadStop(tab);
std::string value;
ASSERT_TRUE(
content::ExecuteScriptAndExtractString(tab, "register();", &value));
EXPECT_EQ("SW controlled", value);
ASSERT_TRUE(RunExtensionTest("service_worker/content_script_fetch"))
<< message_;
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerPushMessagingTest, OnPush) {
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII("service_worker/push_messaging"), kFlagNone);
ASSERT_TRUE(extension);
GURL extension_url = extension->url();
GrantNotificationPermissionForTest(extension_url);
GURL url = extension->GetResourceURL("page.html");
ui_test_utils::NavigateToURL(browser(), url);
content::WebContents* web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
// Start the ServiceWorker.
ExtensionTestMessageListener ready_listener("SERVICE_WORKER_READY", false);
ready_listener.set_failure_message("SERVICE_WORKER_FAILURE");
const char* kScript = "window.runServiceWorker()";
EXPECT_TRUE(content::ExecuteScript(web_contents->GetMainFrame(), kScript));
EXPECT_TRUE(ready_listener.WaitUntilSatisfied());
PushMessagingAppIdentifier app_identifier =
GetAppIdentifierForServiceWorkerRegistration(0LL, extension_url);
ASSERT_EQ(app_identifier.app_id(), gcm_driver()->last_gettoken_app_id());
EXPECT_EQ("1234567890", gcm_driver()->last_gettoken_authorized_entity());
base::RunLoop run_loop;
// Send a push message via gcm and expect the ServiceWorker to receive it.
ExtensionTestMessageListener push_message_listener("OK", false);
push_message_listener.set_failure_message("FAIL");
gcm::IncomingMessage message;
message.sender_id = "1234567890";
message.raw_data = "testdata";
message.decrypted = true;
push_service()->SetMessageCallbackForTesting(run_loop.QuitClosure());
push_service()->OnMessage(app_identifier.app_id(), message);
EXPECT_TRUE(push_message_listener.WaitUntilSatisfied());
run_loop.Run(); // Wait until the message is handled by push service.
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, FilteredEvents) {
// Extensions APIs from SW are only enabled on trunk.
ScopedCurrentChannel current_channel_override(version_info::Channel::UNKNOWN);
ASSERT_TRUE(RunExtensionTest("service_worker/filtered_events"));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerTest, MimeHandlerView) {
ASSERT_TRUE(RunExtensionTest("service_worker/mime_handler_view"));
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerLazyBackgroundTest,
PRE_FilteredEventsAfterRestart) {
LazyBackgroundObserver lazy_observer;
ResultCatcher catcher;
const Extension* extension = LoadExtensionWithFlags(
test_data_dir_.AppendASCII(
"service_worker/filtered_events_after_restart"),
kFlagNone);
ASSERT_TRUE(extension);
EXPECT_TRUE(catcher.GetNextResult()) << catcher.message();
// |extension|'s background page opens a tab to its resource.
content::WebContents* extension_web_contents =
browser()->tab_strip_model()->GetActiveWebContents();
EXPECT_TRUE(content::WaitForLoadStop(extension_web_contents));
EXPECT_EQ(extension->GetResourceURL("page.html").spec(),
extension_web_contents->GetURL().spec());
{
// Let the service worker start and register a filtered listener to
// chrome.webNavigation.onCommitted event.
ExtensionTestMessageListener add_listener_done("listener-added", false);
add_listener_done.set_failure_message("FAILURE");
content::ExecuteScriptAsync(extension_web_contents,
"window.runServiceWorkerAsync()");
EXPECT_TRUE(add_listener_done.WaitUntilSatisfied());
base::RunLoop run_loop;
content::StoragePartition* storage_partition =
content::BrowserContext::GetDefaultStoragePartition(
browser()->profile());
content::StopServiceWorkerForScope(
storage_partition->GetServiceWorkerContext(),
// The service worker is registered at the top level scope.
extension->url(), run_loop.QuitClosure());
run_loop.Run();
}
// Close the tab to |extension|'s resource. This will also close the
// extension's event page.
browser()->tab_strip_model()->CloseWebContentsAt(
browser()->tab_strip_model()->active_index(), TabStripModel::CLOSE_NONE);
lazy_observer.Wait();
}
IN_PROC_BROWSER_TEST_P(ServiceWorkerLazyBackgroundTest,
FilteredEventsAfterRestart) {
// Create a tab to a.html, expect it to navigate to b.html. The service worker
// will see two webNavigation.onCommitted events.
ASSERT_TRUE(StartEmbeddedTestServer());
GURL page_url = embedded_test_server()->GetURL(
"/extensions/api_test/service_worker/filtered_events_after_restart/"
"a.html");
ExtensionTestMessageListener worker_filtered_event_listener(
"PASS_FROM_WORKER", false);
worker_filtered_event_listener.set_failure_message("FAIL_FROM_WORKER");
content::WebContents* web_contents = AddTab(browser(), page_url);
EXPECT_TRUE(web_contents);
EXPECT_TRUE(worker_filtered_event_listener.WaitUntilSatisfied());
}
// Run with both native and JS-based bindings. This ensures that both stable
// (JS) and experimental (native) phases work correctly with worker scripts
// while we launch native bindings to stable.
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithNativeBindings,
ServiceWorkerTest,
::testing::Values(NATIVE_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithJSBindings,
ServiceWorkerTest,
::testing::Values(JAVASCRIPT_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerBackgroundSyncTestWithNativeBindings,
ServiceWorkerBackgroundSyncTest,
::testing::Values(NATIVE_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerBackgroundSyncTestWithJSBindings,
ServiceWorkerBackgroundSyncTest,
::testing::Values(JAVASCRIPT_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerPushMessagingTestWithNativeBindings,
ServiceWorkerPushMessagingTest,
::testing::Values(NATIVE_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerPushMessagingTestWithJSBindings,
ServiceWorkerPushMessagingTest,
::testing::Values(JAVASCRIPT_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerLazyBackgroundTestWithNativeBindings,
ServiceWorkerLazyBackgroundTest,
::testing::Values(NATIVE_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerLazyBackgroundTestWithJSBindings,
ServiceWorkerLazyBackgroundTest,
::testing::Values(JAVASCRIPT_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithNativeBindings,
ServiceWorkerBasedBackgroundTest,
::testing::Values(NATIVE_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithJSBindings,
ServiceWorkerBasedBackgroundTest,
::testing::Values(JAVASCRIPT_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithNativeBindings,
ServiceWorkerOnStartupEventTest,
::testing::Values(NATIVE_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithJSBindings,
ServiceWorkerOnStartupEventTest,
::testing::Values(JAVASCRIPT_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithNativeBindings,
ServiceWorkerRegistrationAtStartupTest,
::testing::Values(NATIVE_BINDINGS));
INSTANTIATE_TEST_SUITE_P(ServiceWorkerTestWithJSBindings,
ServiceWorkerRegistrationAtStartupTest,
::testing::Values(JAVASCRIPT_BINDINGS));
} // namespace extensions