blob: fc1532e6a762ae9b858e7d3abe90bb7f5f7a533f [file] [log] [blame]
[email protected]76411f412012-02-22 18:56:061// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]112158af2013-06-07 23:46:185#include "base/strings/utf_string_conversions.h"
[email protected]76411f412012-02-22 18:56:066#include "chrome/browser/extensions/extension_apitest.h"
[email protected]76411f412012-02-22 18:56:067#include "chrome/browser/extensions/extension_service.h"
[email protected]76411f412012-02-22 18:56:068#include "chrome/browser/profiles/profile.h"
9#include "chrome/browser/profiles/profile_manager.h"
10#include "chrome/browser/ui/browser.h"
[email protected]ee496952013-01-10 23:17:3311#include "chrome/browser/ui/tabs/tab_strip_model.h"
[email protected]76411f412012-02-22 18:56:0612#include "chrome/common/url_constants.h"
13#include "chrome/test/base/ui_test_utils.h"
[email protected]76411f412012-02-22 18:56:0614#include "content/public/browser/render_process_host.h"
[email protected]9c1662b2012-03-06 15:44:3315#include "content/public/browser/render_view_host.h"
[email protected]76411f412012-02-22 18:56:0616#include "content/public/browser/site_instance.h"
17#include "content/public/browser/web_contents.h"
[email protected]22401dc2014-03-21 01:38:5718#include "extensions/browser/extension_host.h"
[email protected]98b6d942013-11-10 00:34:0719#include "extensions/browser/process_manager.h"
[email protected]c8d02992013-07-31 22:16:5120#include "extensions/common/switches.h"
[email protected]f2cb3cf2013-03-21 01:40:5321#include "net/dns/mock_host_resolver.h"
[email protected]c1dffe82013-06-26 20:59:0522#include "net/test/embedded_test_server/embedded_test_server.h"
[email protected]76411f412012-02-22 18:56:0623
24using content::NavigationController;
25using content::WebContents;
26
27namespace {
28
29class ProcessManagementTest : public ExtensionBrowserTest {
30 private:
31 // This is needed for testing isolated apps, which are still experimental.
avi3ef9ec9e2014-12-22 22:50:1732 void SetUpCommandLine(base::CommandLine* command_line) override {
[email protected]76411f412012-02-22 18:56:0633 ExtensionBrowserTest::SetUpCommandLine(command_line);
[email protected]c8d02992013-07-31 22:16:5134 command_line->AppendSwitch(
35 extensions::switches::kEnableExperimentalExtensionApis);
[email protected]76411f412012-02-22 18:56:0636 }
37};
38
39} // namespace
40
[email protected]bb4162a2013-02-03 01:35:1241
[email protected]1c6a3f22013-03-19 09:52:3042// TODO(nasko): crbug.com/173137
43#if defined(OS_WIN)
[email protected]bb4162a2013-02-03 01:35:1244#define MAYBE_ProcessOverflow DISABLED_ProcessOverflow
45#else
46#define MAYBE_ProcessOverflow ProcessOverflow
47#endif
48
[email protected]76411f412012-02-22 18:56:0649// Ensure that an isolated app never shares a process with WebUIs, non-isolated
50// extensions, and normal webpages. None of these should ever comingle
51// RenderProcessHosts even if we hit the process limit.
[email protected]bb4162a2013-02-03 01:35:1252IN_PROC_BROWSER_TEST_F(ProcessManagementTest, MAYBE_ProcessOverflow) {
[email protected]76411f412012-02-22 18:56:0653 // Set max renderers to 1 to force running out of processes.
54 content::RenderProcessHost::SetMaxRendererProcessCount(1);
55
56 host_resolver()->AddRule("*", "127.0.0.1");
[email protected]c1dffe82013-06-26 20:59:0557 ASSERT_TRUE(embedded_test_server()->InitializeAndWaitUntilReady());
[email protected]76411f412012-02-22 18:56:0658
59 ASSERT_TRUE(LoadExtension(test_data_dir_.AppendASCII("isolated_apps/app1")));
60 ASSERT_TRUE(LoadExtension(test_data_dir_.AppendASCII("isolated_apps/app2")));
61 ASSERT_TRUE(LoadExtension(test_data_dir_.AppendASCII("hosted_app")));
62 ASSERT_TRUE(
63 LoadExtension(test_data_dir_.AppendASCII("api_test/app_process")));
64
65 // The app under test acts on URLs whose host is "localhost",
66 // so the URLs we navigate to must have host "localhost".
[email protected]c1dffe82013-06-26 20:59:0567 GURL base_url = embedded_test_server()->GetURL(
68 "/extensions/");
[email protected]76411f412012-02-22 18:56:0669 GURL::Replacements replace_host;
70 std::string host_str("localhost"); // Must stay in scope with replace_host.
71 replace_host.SetHostStr(host_str);
72 base_url = base_url.ReplaceComponents(replace_host);
73
74 // Load an extension before adding tabs.
[email protected]1c321ee52012-05-21 03:02:3475 const extensions::Extension* extension1 = LoadExtension(
[email protected]76411f412012-02-22 18:56:0676 test_data_dir_.AppendASCII("api_test/browser_action/basics"));
77 ASSERT_TRUE(extension1);
78 GURL extension1_url = extension1->url();
79
80 // Create multiple tabs for each type of renderer that might exist.
thestig53986dc2014-12-16 06:09:1881 ui_test_utils::NavigateToURL(
82 browser(), base_url.Resolve("isolated_apps/app1/main.html"));
[email protected]76411f412012-02-22 18:56:0683 ui_test_utils::NavigateToURLWithDisposition(
84 browser(), GURL(chrome::kChromeUINewTabURL),
85 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
86 ui_test_utils::NavigateToURLWithDisposition(
87 browser(), base_url.Resolve("hosted_app/main.html"),
88 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
89 ui_test_utils::NavigateToURLWithDisposition(
90 browser(), base_url.Resolve("test_file.html"),
91 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
92
93 ui_test_utils::NavigateToURLWithDisposition(
94 browser(), base_url.Resolve("isolated_apps/app2/main.html"),
95 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
96 ui_test_utils::NavigateToURLWithDisposition(
97 browser(), GURL(chrome::kChromeUINewTabURL),
98 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
99 ui_test_utils::NavigateToURLWithDisposition(
100 browser(), base_url.Resolve("api_test/app_process/path1/empty.html"),
101 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
102 ui_test_utils::NavigateToURLWithDisposition(
103 browser(), base_url.Resolve("test_file_with_body.html"),
104 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
105
106 // Load another copy of isolated app 1.
107 ui_test_utils::NavigateToURLWithDisposition(
108 browser(), base_url.Resolve("isolated_apps/app1/main.html"),
109 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
110
111 // Load another extension.
[email protected]1c321ee52012-05-21 03:02:34112 const extensions::Extension* extension2 = LoadExtension(
[email protected]76411f412012-02-22 18:56:06113 test_data_dir_.AppendASCII("api_test/browser_action/close_background"));
114 ASSERT_TRUE(extension2);
115 GURL extension2_url = extension2->url();
116
117 // Get tab processes.
[email protected]ee496952013-01-10 23:17:33118 ASSERT_EQ(9, browser()->tab_strip_model()->count());
[email protected]76411f412012-02-22 18:56:06119 content::RenderProcessHost* isolated1_host =
[email protected]ee496952013-01-10 23:17:33120 browser()->tab_strip_model()->GetWebContentsAt(0)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06121 content::RenderProcessHost* ntp1_host =
[email protected]ee496952013-01-10 23:17:33122 browser()->tab_strip_model()->GetWebContentsAt(1)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06123 content::RenderProcessHost* hosted1_host =
[email protected]ee496952013-01-10 23:17:33124 browser()->tab_strip_model()->GetWebContentsAt(2)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06125 content::RenderProcessHost* web1_host =
[email protected]ee496952013-01-10 23:17:33126 browser()->tab_strip_model()->GetWebContentsAt(3)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06127
128 content::RenderProcessHost* isolated2_host =
[email protected]ee496952013-01-10 23:17:33129 browser()->tab_strip_model()->GetWebContentsAt(4)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06130 content::RenderProcessHost* ntp2_host =
[email protected]ee496952013-01-10 23:17:33131 browser()->tab_strip_model()->GetWebContentsAt(5)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06132 content::RenderProcessHost* hosted2_host =
[email protected]ee496952013-01-10 23:17:33133 browser()->tab_strip_model()->GetWebContentsAt(6)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06134 content::RenderProcessHost* web2_host =
[email protected]ee496952013-01-10 23:17:33135 browser()->tab_strip_model()->GetWebContentsAt(7)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06136
137 content::RenderProcessHost* second_isolated1_host =
[email protected]ee496952013-01-10 23:17:33138 browser()->tab_strip_model()->GetWebContentsAt(8)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06139
140 // Get extension processes.
[email protected]98b6d942013-11-10 00:34:07141 extensions::ProcessManager* process_manager =
reillyg0ea3fa902014-10-28 15:30:23142 extensions::ProcessManager::Get(browser()->profile());
[email protected]76411f412012-02-22 18:56:06143 content::RenderProcessHost* extension1_host =
144 process_manager->GetSiteInstanceForURL(extension1_url)->GetProcess();
145 content::RenderProcessHost* extension2_host =
146 process_manager->GetSiteInstanceForURL(extension2_url)->GetProcess();
147
148 // An isolated app only shares with other instances of itself, not other
149 // isolated apps or anything else.
150 EXPECT_EQ(isolated1_host, second_isolated1_host);
151 EXPECT_NE(isolated1_host, isolated2_host);
152 EXPECT_NE(isolated1_host, ntp1_host);
153 EXPECT_NE(isolated1_host, hosted1_host);
154 EXPECT_NE(isolated1_host, web1_host);
155 EXPECT_NE(isolated1_host, extension1_host);
156 EXPECT_NE(isolated2_host, ntp1_host);
157 EXPECT_NE(isolated2_host, hosted1_host);
158 EXPECT_NE(isolated2_host, web1_host);
159 EXPECT_NE(isolated2_host, extension1_host);
160
161 // Everything else is clannish. WebUI only shares with other WebUI.
162 EXPECT_EQ(ntp1_host, ntp2_host);
163 EXPECT_NE(ntp1_host, hosted1_host);
164 EXPECT_NE(ntp1_host, web1_host);
165 EXPECT_NE(ntp1_host, extension1_host);
166
167 // Hosted apps only share with each other.
[email protected]41fb79a52012-06-29 16:34:33168 // Note that hosted2_host's app has the background permission and will use
169 // process-per-site mode, but it should still share with hosted1_host's app.
[email protected]76411f412012-02-22 18:56:06170 EXPECT_EQ(hosted1_host, hosted2_host);
171 EXPECT_NE(hosted1_host, web1_host);
172 EXPECT_NE(hosted1_host, extension1_host);
173
174 // Web pages only share with each other.
175 EXPECT_EQ(web1_host, web2_host);
176 EXPECT_NE(web1_host, extension1_host);
177
178 // Extensions only share with each other.
179 EXPECT_EQ(extension1_host, extension2_host);
180}
181
[email protected]58b6c6992013-06-11 17:29:50182// See
183#if defined(OS_WIN)
184#define MAYBE_ExtensionProcessBalancing DISABLED_ExtensionProcessBalancing
185#else
186#define MAYBE_ExtensionProcessBalancing ExtensionProcessBalancing
187#endif
[email protected]76411f412012-02-22 18:56:06188// Test to verify that the policy of maximum share of extension processes is
189// properly enforced.
[email protected]58b6c6992013-06-11 17:29:50190IN_PROC_BROWSER_TEST_F(ProcessManagementTest, MAYBE_ExtensionProcessBalancing) {
[email protected]76411f412012-02-22 18:56:06191 // Set max renderers to 6 so we can expect 2 extension processes to be
192 // allocated.
193 content::RenderProcessHost::SetMaxRendererProcessCount(6);
194
[email protected]c3f757f32012-03-30 22:34:58195 host_resolver()->AddRule("*", "127.0.0.1");
[email protected]c1dffe82013-06-26 20:59:05196 ASSERT_TRUE(embedded_test_server()->InitializeAndWaitUntilReady());
[email protected]c3f757f32012-03-30 22:34:58197
[email protected]76411f412012-02-22 18:56:06198 // The app under test acts on URLs whose host is "localhost",
199 // so the URLs we navigate to must have host "localhost".
[email protected]c1dffe82013-06-26 20:59:05200 GURL base_url = embedded_test_server()->GetURL(
201 "/extensions/");
[email protected]76411f412012-02-22 18:56:06202 GURL::Replacements replace_host;
203 std::string host_str("localhost"); // Must stay in scope with replace_host.
204 replace_host.SetHostStr(host_str);
205 base_url = base_url.ReplaceComponents(replace_host);
206
[email protected]76411f412012-02-22 18:56:06207 ASSERT_TRUE(LoadExtension(
208 test_data_dir_.AppendASCII("api_test/browser_action/none")));
209 ASSERT_TRUE(LoadExtension(
210 test_data_dir_.AppendASCII("api_test/browser_action/basics")));
211 ASSERT_TRUE(LoadExtension(
212 test_data_dir_.AppendASCII("api_test/browser_action/remove_popup")));
213 ASSERT_TRUE(LoadExtension(
214 test_data_dir_.AppendASCII("api_test/browser_action/add_popup")));
215 ASSERT_TRUE(LoadExtension(
216 test_data_dir_.AppendASCII("api_test/browser_action/no_icon")));
217 ASSERT_TRUE(LoadExtension(
218 test_data_dir_.AppendASCII("isolated_apps/app1")));
219 ASSERT_TRUE(LoadExtension(
220 test_data_dir_.AppendASCII("api_test/management/test")));
221
thestig53986dc2014-12-16 06:09:18222 ui_test_utils::NavigateToURL(
223 browser(), base_url.Resolve("isolated_apps/app1/main.html"));
[email protected]76411f412012-02-22 18:56:06224
thestig53986dc2014-12-16 06:09:18225 ui_test_utils::NavigateToURL(
226 browser(), base_url.Resolve("api_test/management/test/basics.html"));
[email protected]76411f412012-02-22 18:56:06227
228 std::set<int> process_ids;
[email protected]2fc15ae2012-05-06 00:01:37229 Profile* profile = browser()->profile();
reillyg0ea3fa902014-10-28 15:30:23230 extensions::ProcessManager* epm = extensions::ProcessManager::Get(profile);
[email protected]98b6d942013-11-10 00:34:07231 for (extensions::ProcessManager::const_iterator iter =
[email protected]d1fe1352012-04-26 00:47:32232 epm->background_hosts().begin();
233 iter != epm->background_hosts().end(); ++iter) {
234 process_ids.insert((*iter)->render_process_host()->GetID());
[email protected]76411f412012-02-22 18:56:06235 }
236
237 // We've loaded 5 extensions with background pages, 1 extension without
238 // background page, and one isolated app. We expect only 2 unique processes
239 // hosting those extensions.
[email protected]fafdc842014-01-17 18:09:08240 extensions::ProcessMap* process_map = extensions::ProcessMap::Get(profile);
[email protected]06bdd2b2012-11-30 18:47:13241
[email protected]fafdc842014-01-17 18:09:08242 EXPECT_GE((size_t) 6, process_map->size());
[email protected]c3f757f32012-03-30 22:34:58243 EXPECT_EQ((size_t) 2, process_ids.size());
[email protected]76411f412012-02-22 18:56:06244}