blob: f8b3777fe5e0d84c2411c6e6675b682b8a41a053 [file] [log] [blame]
[email protected]76411f412012-02-22 18:56:061// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
avia2f4804a2015-12-24 23:11:135#include <stddef.h>
6
[email protected]112158af2013-06-07 23:46:187#include "base/strings/utf_string_conversions.h"
avia2f4804a2015-12-24 23:11:138#include "build/build_config.h"
[email protected]76411f412012-02-22 18:56:069#include "chrome/browser/extensions/extension_apitest.h"
[email protected]76411f412012-02-22 18:56:0610#include "chrome/browser/extensions/extension_service.h"
[email protected]76411f412012-02-22 18:56:0611#include "chrome/browser/profiles/profile.h"
12#include "chrome/browser/profiles/profile_manager.h"
13#include "chrome/browser/ui/browser.h"
[email protected]ee496952013-01-10 23:17:3314#include "chrome/browser/ui/tabs/tab_strip_model.h"
[email protected]76411f412012-02-22 18:56:0615#include "chrome/common/url_constants.h"
16#include "chrome/test/base/ui_test_utils.h"
[email protected]76411f412012-02-22 18:56:0617#include "content/public/browser/render_process_host.h"
[email protected]9c1662b2012-03-06 15:44:3318#include "content/public/browser/render_view_host.h"
[email protected]76411f412012-02-22 18:56:0619#include "content/public/browser/site_instance.h"
20#include "content/public/browser/web_contents.h"
[email protected]22401dc2014-03-21 01:38:5721#include "extensions/browser/extension_host.h"
[email protected]98b6d942013-11-10 00:34:0722#include "extensions/browser/process_manager.h"
[email protected]c8d02992013-07-31 22:16:5123#include "extensions/common/switches.h"
[email protected]f2cb3cf2013-03-21 01:40:5324#include "net/dns/mock_host_resolver.h"
[email protected]c1dffe82013-06-26 20:59:0525#include "net/test/embedded_test_server/embedded_test_server.h"
[email protected]76411f412012-02-22 18:56:0626
27using content::NavigationController;
28using content::WebContents;
29
30namespace {
31
32class ProcessManagementTest : public ExtensionBrowserTest {
33 private:
34 // This is needed for testing isolated apps, which are still experimental.
avi3ef9ec9e2014-12-22 22:50:1735 void SetUpCommandLine(base::CommandLine* command_line) override {
[email protected]76411f412012-02-22 18:56:0636 ExtensionBrowserTest::SetUpCommandLine(command_line);
[email protected]c8d02992013-07-31 22:16:5137 command_line->AppendSwitch(
38 extensions::switches::kEnableExperimentalExtensionApis);
[email protected]76411f412012-02-22 18:56:0639 }
40};
41
42} // namespace
43
[email protected]bb4162a2013-02-03 01:35:1244
[email protected]1c6a3f22013-03-19 09:52:3045// TODO(nasko): crbug.com/173137
46#if defined(OS_WIN)
[email protected]bb4162a2013-02-03 01:35:1247#define MAYBE_ProcessOverflow DISABLED_ProcessOverflow
48#else
49#define MAYBE_ProcessOverflow ProcessOverflow
50#endif
51
[email protected]76411f412012-02-22 18:56:0652// Ensure that an isolated app never shares a process with WebUIs, non-isolated
53// extensions, and normal webpages. None of these should ever comingle
54// RenderProcessHosts even if we hit the process limit.
[email protected]bb4162a2013-02-03 01:35:1255IN_PROC_BROWSER_TEST_F(ProcessManagementTest, MAYBE_ProcessOverflow) {
[email protected]76411f412012-02-22 18:56:0656 // Set max renderers to 1 to force running out of processes.
57 content::RenderProcessHost::SetMaxRendererProcessCount(1);
58
59 host_resolver()->AddRule("*", "127.0.0.1");
svaldeza01f7d92015-11-18 17:47:5660 ASSERT_TRUE(embedded_test_server()->Start());
[email protected]76411f412012-02-22 18:56:0661
62 ASSERT_TRUE(LoadExtension(test_data_dir_.AppendASCII("isolated_apps/app1")));
63 ASSERT_TRUE(LoadExtension(test_data_dir_.AppendASCII("isolated_apps/app2")));
64 ASSERT_TRUE(LoadExtension(test_data_dir_.AppendASCII("hosted_app")));
65 ASSERT_TRUE(
66 LoadExtension(test_data_dir_.AppendASCII("api_test/app_process")));
67
68 // The app under test acts on URLs whose host is "localhost",
69 // so the URLs we navigate to must have host "localhost".
[email protected]c1dffe82013-06-26 20:59:0570 GURL base_url = embedded_test_server()->GetURL(
71 "/extensions/");
[email protected]76411f412012-02-22 18:56:0672 GURL::Replacements replace_host;
mgiuca77752c32015-02-05 07:31:1873 replace_host.SetHostStr("localhost");
[email protected]76411f412012-02-22 18:56:0674 base_url = base_url.ReplaceComponents(replace_host);
75
76 // Load an extension before adding tabs.
[email protected]1c321ee52012-05-21 03:02:3477 const extensions::Extension* extension1 = LoadExtension(
[email protected]76411f412012-02-22 18:56:0678 test_data_dir_.AppendASCII("api_test/browser_action/basics"));
79 ASSERT_TRUE(extension1);
80 GURL extension1_url = extension1->url();
81
82 // Create multiple tabs for each type of renderer that might exist.
thestig53986dc2014-12-16 06:09:1883 ui_test_utils::NavigateToURL(
84 browser(), base_url.Resolve("isolated_apps/app1/main.html"));
[email protected]76411f412012-02-22 18:56:0685 ui_test_utils::NavigateToURLWithDisposition(
86 browser(), GURL(chrome::kChromeUINewTabURL),
87 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
88 ui_test_utils::NavigateToURLWithDisposition(
89 browser(), base_url.Resolve("hosted_app/main.html"),
90 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
91 ui_test_utils::NavigateToURLWithDisposition(
92 browser(), base_url.Resolve("test_file.html"),
93 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
94
95 ui_test_utils::NavigateToURLWithDisposition(
96 browser(), base_url.Resolve("isolated_apps/app2/main.html"),
97 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
98 ui_test_utils::NavigateToURLWithDisposition(
99 browser(), GURL(chrome::kChromeUINewTabURL),
100 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
101 ui_test_utils::NavigateToURLWithDisposition(
102 browser(), base_url.Resolve("api_test/app_process/path1/empty.html"),
103 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
104 ui_test_utils::NavigateToURLWithDisposition(
105 browser(), base_url.Resolve("test_file_with_body.html"),
106 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
107
108 // Load another copy of isolated app 1.
109 ui_test_utils::NavigateToURLWithDisposition(
110 browser(), base_url.Resolve("isolated_apps/app1/main.html"),
111 NEW_FOREGROUND_TAB, ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
112
113 // Load another extension.
[email protected]1c321ee52012-05-21 03:02:34114 const extensions::Extension* extension2 = LoadExtension(
[email protected]76411f412012-02-22 18:56:06115 test_data_dir_.AppendASCII("api_test/browser_action/close_background"));
116 ASSERT_TRUE(extension2);
117 GURL extension2_url = extension2->url();
118
119 // Get tab processes.
[email protected]ee496952013-01-10 23:17:33120 ASSERT_EQ(9, browser()->tab_strip_model()->count());
[email protected]76411f412012-02-22 18:56:06121 content::RenderProcessHost* isolated1_host =
[email protected]ee496952013-01-10 23:17:33122 browser()->tab_strip_model()->GetWebContentsAt(0)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06123 content::RenderProcessHost* ntp1_host =
[email protected]ee496952013-01-10 23:17:33124 browser()->tab_strip_model()->GetWebContentsAt(1)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06125 content::RenderProcessHost* hosted1_host =
[email protected]ee496952013-01-10 23:17:33126 browser()->tab_strip_model()->GetWebContentsAt(2)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06127 content::RenderProcessHost* web1_host =
[email protected]ee496952013-01-10 23:17:33128 browser()->tab_strip_model()->GetWebContentsAt(3)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06129
130 content::RenderProcessHost* isolated2_host =
[email protected]ee496952013-01-10 23:17:33131 browser()->tab_strip_model()->GetWebContentsAt(4)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06132 content::RenderProcessHost* ntp2_host =
[email protected]ee496952013-01-10 23:17:33133 browser()->tab_strip_model()->GetWebContentsAt(5)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06134 content::RenderProcessHost* hosted2_host =
[email protected]ee496952013-01-10 23:17:33135 browser()->tab_strip_model()->GetWebContentsAt(6)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06136 content::RenderProcessHost* web2_host =
[email protected]ee496952013-01-10 23:17:33137 browser()->tab_strip_model()->GetWebContentsAt(7)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06138
139 content::RenderProcessHost* second_isolated1_host =
[email protected]ee496952013-01-10 23:17:33140 browser()->tab_strip_model()->GetWebContentsAt(8)->GetRenderProcessHost();
[email protected]76411f412012-02-22 18:56:06141
142 // Get extension processes.
[email protected]98b6d942013-11-10 00:34:07143 extensions::ProcessManager* process_manager =
reillyg0ea3fa902014-10-28 15:30:23144 extensions::ProcessManager::Get(browser()->profile());
[email protected]76411f412012-02-22 18:56:06145 content::RenderProcessHost* extension1_host =
146 process_manager->GetSiteInstanceForURL(extension1_url)->GetProcess();
147 content::RenderProcessHost* extension2_host =
148 process_manager->GetSiteInstanceForURL(extension2_url)->GetProcess();
149
150 // An isolated app only shares with other instances of itself, not other
151 // isolated apps or anything else.
152 EXPECT_EQ(isolated1_host, second_isolated1_host);
153 EXPECT_NE(isolated1_host, isolated2_host);
154 EXPECT_NE(isolated1_host, ntp1_host);
155 EXPECT_NE(isolated1_host, hosted1_host);
156 EXPECT_NE(isolated1_host, web1_host);
157 EXPECT_NE(isolated1_host, extension1_host);
158 EXPECT_NE(isolated2_host, ntp1_host);
159 EXPECT_NE(isolated2_host, hosted1_host);
160 EXPECT_NE(isolated2_host, web1_host);
161 EXPECT_NE(isolated2_host, extension1_host);
162
163 // Everything else is clannish. WebUI only shares with other WebUI.
164 EXPECT_EQ(ntp1_host, ntp2_host);
165 EXPECT_NE(ntp1_host, hosted1_host);
166 EXPECT_NE(ntp1_host, web1_host);
167 EXPECT_NE(ntp1_host, extension1_host);
168
169 // Hosted apps only share with each other.
[email protected]41fb79a52012-06-29 16:34:33170 // Note that hosted2_host's app has the background permission and will use
171 // process-per-site mode, but it should still share with hosted1_host's app.
[email protected]76411f412012-02-22 18:56:06172 EXPECT_EQ(hosted1_host, hosted2_host);
173 EXPECT_NE(hosted1_host, web1_host);
174 EXPECT_NE(hosted1_host, extension1_host);
175
176 // Web pages only share with each other.
177 EXPECT_EQ(web1_host, web2_host);
178 EXPECT_NE(web1_host, extension1_host);
179
180 // Extensions only share with each other.
181 EXPECT_EQ(extension1_host, extension2_host);
182}
183
[email protected]58b6c6992013-06-11 17:29:50184// See
185#if defined(OS_WIN)
186#define MAYBE_ExtensionProcessBalancing DISABLED_ExtensionProcessBalancing
187#else
188#define MAYBE_ExtensionProcessBalancing ExtensionProcessBalancing
189#endif
[email protected]76411f412012-02-22 18:56:06190// Test to verify that the policy of maximum share of extension processes is
191// properly enforced.
[email protected]58b6c6992013-06-11 17:29:50192IN_PROC_BROWSER_TEST_F(ProcessManagementTest, MAYBE_ExtensionProcessBalancing) {
[email protected]76411f412012-02-22 18:56:06193 // Set max renderers to 6 so we can expect 2 extension processes to be
194 // allocated.
195 content::RenderProcessHost::SetMaxRendererProcessCount(6);
196
[email protected]c3f757f32012-03-30 22:34:58197 host_resolver()->AddRule("*", "127.0.0.1");
svaldeza01f7d92015-11-18 17:47:56198 ASSERT_TRUE(embedded_test_server()->Start());
[email protected]c3f757f32012-03-30 22:34:58199
[email protected]76411f412012-02-22 18:56:06200 // The app under test acts on URLs whose host is "localhost",
201 // so the URLs we navigate to must have host "localhost".
[email protected]c1dffe82013-06-26 20:59:05202 GURL base_url = embedded_test_server()->GetURL(
203 "/extensions/");
[email protected]76411f412012-02-22 18:56:06204 GURL::Replacements replace_host;
mgiuca77752c32015-02-05 07:31:18205 replace_host.SetHostStr("localhost");
[email protected]76411f412012-02-22 18:56:06206 base_url = base_url.ReplaceComponents(replace_host);
207
[email protected]76411f412012-02-22 18:56:06208 ASSERT_TRUE(LoadExtension(
209 test_data_dir_.AppendASCII("api_test/browser_action/none")));
210 ASSERT_TRUE(LoadExtension(
211 test_data_dir_.AppendASCII("api_test/browser_action/basics")));
212 ASSERT_TRUE(LoadExtension(
213 test_data_dir_.AppendASCII("api_test/browser_action/remove_popup")));
214 ASSERT_TRUE(LoadExtension(
215 test_data_dir_.AppendASCII("api_test/browser_action/add_popup")));
216 ASSERT_TRUE(LoadExtension(
217 test_data_dir_.AppendASCII("api_test/browser_action/no_icon")));
218 ASSERT_TRUE(LoadExtension(
219 test_data_dir_.AppendASCII("isolated_apps/app1")));
220 ASSERT_TRUE(LoadExtension(
221 test_data_dir_.AppendASCII("api_test/management/test")));
222
thestig53986dc2014-12-16 06:09:18223 ui_test_utils::NavigateToURL(
224 browser(), base_url.Resolve("isolated_apps/app1/main.html"));
[email protected]76411f412012-02-22 18:56:06225
thestig53986dc2014-12-16 06:09:18226 ui_test_utils::NavigateToURL(
227 browser(), base_url.Resolve("api_test/management/test/basics.html"));
[email protected]76411f412012-02-22 18:56:06228
229 std::set<int> process_ids;
[email protected]2fc15ae2012-05-06 00:01:37230 Profile* profile = browser()->profile();
reillyg0ea3fa902014-10-28 15:30:23231 extensions::ProcessManager* epm = extensions::ProcessManager::Get(profile);
rdevlin.cronin6ae04a012015-04-03 20:19:40232 for (extensions::ExtensionHost* host : epm->background_hosts())
233 process_ids.insert(host->render_process_host()->GetID());
[email protected]76411f412012-02-22 18:56:06234
235 // We've loaded 5 extensions with background pages, 1 extension without
236 // background page, and one isolated app. We expect only 2 unique processes
237 // hosting those extensions.
[email protected]fafdc842014-01-17 18:09:08238 extensions::ProcessMap* process_map = extensions::ProcessMap::Get(profile);
[email protected]06bdd2b2012-11-30 18:47:13239
[email protected]fafdc842014-01-17 18:09:08240 EXPECT_GE((size_t) 6, process_map->size());
[email protected]c3f757f32012-03-30 22:34:58241 EXPECT_EQ((size_t) 2, process_ids.size());
[email protected]76411f412012-02-22 18:56:06242}