blob: a818e87bbbb895908ec0f6daccdc98c9bb5202b6 [file] [log] [blame]
// Copyright (c) 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/stl_util.h"
#include "build/build_config.h"
#include "chrome/browser/chrome_content_browser_client.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/common/chrome_features.h"
#include "chrome/common/pref_names.h"
#include "chrome/test/base/in_process_browser_test.h"
#include "chrome/test/base/ui_test_utils.h"
#include "components/policy/core/browser/browser_policy_connector.h"
#include "components/policy/core/common/mock_configuration_policy_provider.h"
#include "components/policy/policy_constants.h"
#include "components/prefs/pref_service.h"
#include "content/public/browser/browser_context.h"
#include "content/public/browser/child_process_security_policy.h"
#include "content/public/browser/site_instance.h"
#include "content/public/browser/site_isolation_policy.h"
#include "content/public/common/content_client.h"
#include "content/public/common/content_switches.h"
#include "content/public/test/browser_test_utils.h"
#include "url/gurl.h"
class SiteIsolationPolicyBrowserTest : public InProcessBrowserTest {
protected:
SiteIsolationPolicyBrowserTest() {}
struct Expectations {
const char* url;
bool isolated;
};
void CheckExpectations(Expectations* expectations, size_t count) {
content::BrowserContext* context = browser()->profile();
for (size_t i = 0; i < count; ++i) {
const GURL url(expectations[i].url);
auto instance = content::SiteInstance::CreateForURL(context, url);
EXPECT_EQ(expectations[i].isolated, instance->RequiresDedicatedProcess())
<< "; url = " << url;
}
}
void CheckIsolatedOriginExpectations(Expectations* expectations,
size_t count) {
if (!content::AreAllSitesIsolatedForTesting())
CheckExpectations(expectations, count);
auto* policy = content::ChildProcessSecurityPolicy::GetInstance();
for (size_t i = 0; i < count; ++i) {
const GURL url(expectations[i].url);
const url::Origin origin = url::Origin::Create(url);
EXPECT_EQ(expectations[i].isolated,
policy->IsGloballyIsolatedOriginForTesting(origin))
<< "; origin = " << origin;
}
}
policy::MockConfigurationPolicyProvider provider_;
private:
DISALLOW_COPY_AND_ASSIGN(SiteIsolationPolicyBrowserTest);
};
template <bool policy_value>
class SitePerProcessPolicyBrowserTest : public SiteIsolationPolicyBrowserTest {
protected:
SitePerProcessPolicyBrowserTest() {}
void SetUpInProcessBrowserTestFixture() override {
// We setup the policy here, because the policy must be 'live' before
// the renderer is created, since the value for this policy is passed
// to the renderer via a command-line. Setting the policy in the test
// itself or in SetUpOnMainThread works for update-able policies, but
// is too late for this one.
EXPECT_CALL(provider_, IsInitializationComplete(testing::_))
.WillRepeatedly(testing::Return(true));
policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_);
policy::PolicyMap values;
values.Set(policy::key::kSitePerProcess, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(policy_value), nullptr);
provider_.UpdateChromePolicy(values);
// Append the automation switch which should disable Site Isolation when the
// "WebDriverOverridesIncompatiblePolicies" is set. This is tested in the
// WebDriverSitePerProcessPolicyBrowserTest class below.
// NOTE: This flag is on for some tests per default but we still force it
// it here to make sure to avoid possible regressions being missed
base::CommandLine::ForCurrentProcess()->AppendSwitch(
switches::kEnableAutomation);
}
private:
DISALLOW_COPY_AND_ASSIGN(SitePerProcessPolicyBrowserTest);
};
typedef SitePerProcessPolicyBrowserTest<true>
SitePerProcessPolicyBrowserTestEnabled;
typedef SitePerProcessPolicyBrowserTest<false>
SitePerProcessPolicyBrowserTestDisabled;
class IsolateOriginsPolicyBrowserTest : public SiteIsolationPolicyBrowserTest {
protected:
IsolateOriginsPolicyBrowserTest() {}
void SetUpInProcessBrowserTestFixture() override {
// We setup the policy here, because the policy must be 'live' before
// the renderer is created, since the value for this policy is passed
// to the renderer via a command-line. Setting the policy in the test
// itself or in SetUpOnMainThread works for update-able policies, but
// is too late for this one.
EXPECT_CALL(provider_, IsInitializationComplete(testing::_))
.WillRepeatedly(testing::Return(true));
policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_);
policy::PolicyMap values;
values.Set(policy::key::kIsolateOrigins, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(
"https://policy1.example.org/,http://policy2.example.com"),
nullptr);
provider_.UpdateChromePolicy(values);
}
private:
DISALLOW_COPY_AND_ASSIGN(IsolateOriginsPolicyBrowserTest);
};
class WebDriverSitePerProcessPolicyBrowserTest
: public SitePerProcessPolicyBrowserTestEnabled {
protected:
WebDriverSitePerProcessPolicyBrowserTest() = default;
void SetUpInProcessBrowserTestFixture() override {
// We setup the policy here, because the policy must be 'live' before the
// renderer is created, since the value for this policy is passed to the
// renderer via a command-line. Setting the policy in the test itself or in
// SetUpOnMainThread works for update-able policies, but is too late for
// this one.
SitePerProcessPolicyBrowserTest::SetUpInProcessBrowserTestFixture();
policy::PolicyMap values;
values.Set(policy::key::kWebDriverOverridesIncompatiblePolicies,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD, std::make_unique<base::Value>(true),
nullptr);
provider_.UpdateChromePolicy(values);
}
private:
DISALLOW_COPY_AND_ASSIGN(WebDriverSitePerProcessPolicyBrowserTest);
};
// Ensure that --disable-site-isolation-trials and/or
// --disable-site-isolation-for-enterprise-policy do not override policies.
class NoOverrideSitePerProcessPolicyBrowserTest
: public SitePerProcessPolicyBrowserTestEnabled {
protected:
NoOverrideSitePerProcessPolicyBrowserTest() {}
void SetUpCommandLine(base::CommandLine* command_line) override {
command_line->AppendSwitch(switches::kDisableSiteIsolation);
command_line->AppendSwitch(switches::kDisableSiteIsolationForPolicy);
}
private:
DISALLOW_COPY_AND_ASSIGN(NoOverrideSitePerProcessPolicyBrowserTest);
};
IN_PROC_BROWSER_TEST_F(SitePerProcessPolicyBrowserTestEnabled, Simple) {
Expectations expectations[] = {
{"https://foo.com/noodles.html", true},
{"http://foo.com/", true},
{"http://example.org/pumpkins.html", true},
};
CheckExpectations(expectations, base::size(expectations));
}
IN_PROC_BROWSER_TEST_F(IsolateOriginsPolicyBrowserTest, Simple) {
// Verify that the policy present at browser startup is correctly applied.
Expectations expectations[] = {
{"https://foo.com/noodles.html", false},
{"http://foo.com/", false},
{"https://policy1.example.org/pumpkins.html", true},
{"http://policy2.example.com/index.php", true},
};
CheckIsolatedOriginExpectations(expectations, base::size(expectations));
// Simulate updating the policy at "browser runtime".
policy::PolicyMap values;
values.Set(policy::key::kIsolateOrigins, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(
"https://policy3.example.org/,http://policy4.example.com"),
nullptr);
provider_.UpdateChromePolicy(values);
// Verify that the policy update above has taken effect:
// - policy3 and policy4 origins should become isolated
// - policy1 and policy2 origins will remain isolated, even though they were
// removed from the policy (this is an artifact caused by limitations of
// the current implementation, not something that is a hard requirement).
Expectations expectations2[] = {
{"https://foo.com/noodles.html", false},
{"http://foo.com/", false},
{"https://policy1.example.org/pumpkins.html", true},
{"http://policy2.example.com/index.php", true},
{"https://policy3.example.org/pumpkins.html", true},
{"http://policy4.example.com/index.php", true},
};
CheckIsolatedOriginExpectations(expectations2, base::size(expectations2));
}
IN_PROC_BROWSER_TEST_F(WebDriverSitePerProcessPolicyBrowserTest, Simple) {
Expectations expectations[] = {
{"https://foo.com/noodles.html", true},
{"http://example.org/pumpkins.html", true},
};
CheckExpectations(expectations, base::size(expectations));
}
IN_PROC_BROWSER_TEST_F(NoOverrideSitePerProcessPolicyBrowserTest, Simple) {
Expectations expectations[] = {
{"https://foo.com/noodles.html", true},
{"http://example.org/pumpkins.html", true},
};
CheckExpectations(expectations, base::size(expectations));
}
class SitePerProcessPolicyBrowserTestFieldTrialTest
: public SitePerProcessPolicyBrowserTestDisabled {
public:
SitePerProcessPolicyBrowserTestFieldTrialTest() {
scoped_feature_list_.InitAndEnableFeature(features::kSitePerProcess);
}
~SitePerProcessPolicyBrowserTestFieldTrialTest() override {}
private:
base::test::ScopedFeatureList scoped_feature_list_;
DISALLOW_COPY_AND_ASSIGN(SitePerProcessPolicyBrowserTestFieldTrialTest);
};
IN_PROC_BROWSER_TEST_F(SitePerProcessPolicyBrowserTestFieldTrialTest, Simple) {
// Skip this test if all sites are isolated.
if (content::AreAllSitesIsolatedForTesting())
return;
// Policy should inject kDisableSiteIsolationForPolicy rather than
// kDisableSiteIsolation switch.
EXPECT_FALSE(base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kDisableSiteIsolation));
ASSERT_TRUE(base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kDisableSiteIsolationForPolicy));
EXPECT_FALSE(
content::SiteIsolationPolicy::UseDedicatedProcessesForAllSites());
Expectations expectations[] = {
{"https://foo.com/noodles.html", false},
{"http://example.org/pumpkins.html", false},
};
CheckExpectations(expectations, base::size(expectations));
}
IN_PROC_BROWSER_TEST_F(SiteIsolationPolicyBrowserTest, NoPolicyNoTrialsFlags) {
// The switch to disable Site Isolation should be missing by default (i.e.
// without an explicit enterprise policy).
EXPECT_FALSE(base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kDisableSiteIsolation));
EXPECT_FALSE(base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kDisableSiteIsolationForPolicy));
EXPECT_TRUE(content::SiteIsolationPolicy::UseDedicatedProcessesForAllSites());
}