Don't create unnecessary OOPIFs for subframe navigations that don't require a dedicated process.

Previously, if we had a.com embedding chrome-extension://foo, and the
subframe was navigated to b.com (with --isolate-extensions being on by
default but without any other OOPIF modes), the subframe stayed in an
OOPIF in a new process for b.com, even though technically the b.com
OOPIF is not necessary per --isolate-extensions security model.  This
CL fixes that.

BUG=711006
CQ_INCLUDE_TRYBOTS=master.tryserver.chromium.linux:linux_site_isolation

Review-Url: https://codereview.chromium.org/2809653008
Cr-Commit-Position: refs/heads/master@{#465055}
diff --git a/chrome/browser/extensions/process_manager_browsertest.cc b/chrome/browser/extensions/process_manager_browsertest.cc
index adaf411..e7022f0 100644
--- a/chrome/browser/extensions/process_manager_browsertest.cc
+++ b/chrome/browser/extensions/process_manager_browsertest.cc
@@ -1220,4 +1220,55 @@
   VerifyPostMessageToOpener(popup->GetMainFrame(), extension_frame);
 }
 
+// Test that when a web site has an extension iframe, navigating that iframe to
+// a different web site without --site-per-process will place it in the parent
+// frame's process.  See https://crbug.com/711006.
+IN_PROC_BROWSER_TEST_F(ProcessManagerBrowserTest,
+                       ExtensionFrameNavigatesToParentSiteInstance) {
+  // This test matters only *without* --site-per-process.
+  if (content::AreAllSitesIsolatedForTesting())
+    return;
+
+  host_resolver()->AddRule("*", "127.0.0.1");
+
+  // Create a simple extension without a background page.
+  const Extension* extension = CreateExtension("Extension", false);
+  embedded_test_server()->ServeFilesFromDirectory(extension->path());
+  ASSERT_TRUE(embedded_test_server()->Start());
+
+  // Navigate main tab to a web page with a blank iframe.  There should be no
+  // extension frames yet.
+  NavigateToURL(embedded_test_server()->GetURL("a.com", "/blank_iframe.html"));
+  ProcessManager* pm = ProcessManager::Get(profile());
+  EXPECT_EQ(0u, pm->GetAllFrames().size());
+  EXPECT_EQ(0u, pm->GetRenderFrameHostsForExtension(extension->id()).size());
+
+  content::WebContents* tab =
+      browser()->tab_strip_model()->GetActiveWebContents();
+
+  // Navigate subframe to an extension URL.  This should go into a new
+  // extension process.
+  const GURL extension_url(extension->url().Resolve("empty.html"));
+  EXPECT_TRUE(content::NavigateIframeToURL(tab, "frame0", extension_url));
+  EXPECT_EQ(1u, pm->GetRenderFrameHostsForExtension(extension->id()).size());
+  EXPECT_EQ(1u, pm->GetAllFrames().size());
+
+  content::RenderFrameHost* main_frame = tab->GetMainFrame();
+  {
+    content::RenderFrameHost* subframe = ChildFrameAt(main_frame, 0);
+    EXPECT_NE(subframe->GetProcess(), main_frame->GetProcess());
+    EXPECT_NE(subframe->GetSiteInstance(), main_frame->GetSiteInstance());
+  }
+
+  // Navigate subframe to b.com.  This should be brought back to the parent
+  // frame's (a.com) process.
+  GURL b_url(embedded_test_server()->GetURL("b.com", "/empty.html"));
+  EXPECT_TRUE(content::NavigateIframeToURL(tab, "frame0", b_url));
+  {
+    content::RenderFrameHost* subframe = ChildFrameAt(main_frame, 0);
+    EXPECT_EQ(subframe->GetProcess(), main_frame->GetProcess());
+    EXPECT_EQ(subframe->GetSiteInstance(), main_frame->GetSiteInstance());
+  }
+}
+
 }  // namespace extensions