Implement SSLKEYLOGFILE for OpenSSL.
[chromium-blink-merge.git] / content / browser / site_instance_impl_unittest.cc
blobce02db9331c134ea56272f1921fc2768d6360aa6
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/command_line.h"
6 #include "base/compiler_specific.h"
7 #include "base/memory/scoped_vector.h"
8 #include "base/strings/string16.h"
9 #include "content/browser/browser_thread_impl.h"
10 #include "content/browser/browsing_instance.h"
11 #include "content/browser/child_process_security_policy_impl.h"
12 #include "content/browser/frame_host/navigation_entry_impl.h"
13 #include "content/browser/renderer_host/render_process_host_impl.h"
14 #include "content/browser/renderer_host/render_view_host_impl.h"
15 #include "content/browser/site_instance_impl.h"
16 #include "content/browser/web_contents/web_contents_impl.h"
17 #include "content/browser/webui/web_ui_controller_factory_registry.h"
18 #include "content/public/common/content_client.h"
19 #include "content/public/common/content_constants.h"
20 #include "content/public/common/content_switches.h"
21 #include "content/public/common/url_constants.h"
22 #include "content/public/common/url_utils.h"
23 #include "content/public/test/mock_render_process_host.h"
24 #include "content/public/test/test_browser_context.h"
25 #include "content/public/test/test_browser_thread.h"
26 #include "content/test/test_content_browser_client.h"
27 #include "content/test/test_content_client.h"
28 #include "content/test/test_render_view_host.h"
29 #include "testing/gtest/include/gtest/gtest.h"
30 #include "url/url_util.h"
32 namespace content {
33 namespace {
35 const char kPrivilegedScheme[] = "privileged";
37 class SiteInstanceTestWebUIControllerFactory : public WebUIControllerFactory {
38 public:
39 virtual WebUIController* CreateWebUIControllerForURL(
40 WebUI* web_ui, const GURL& url) const OVERRIDE {
41 return NULL;
43 virtual WebUI::TypeID GetWebUIType(BrowserContext* browser_context,
44 const GURL& url) const OVERRIDE {
45 return WebUI::kNoWebUI;
47 virtual bool UseWebUIForURL(BrowserContext* browser_context,
48 const GURL& url) const OVERRIDE {
49 return HasWebUIScheme(url);
51 virtual bool UseWebUIBindingsForURL(BrowserContext* browser_context,
52 const GURL& url) const OVERRIDE {
53 return HasWebUIScheme(url);
57 class SiteInstanceTestBrowserClient : public TestContentBrowserClient {
58 public:
59 SiteInstanceTestBrowserClient()
60 : privileged_process_id_(-1) {
61 WebUIControllerFactory::RegisterFactory(&factory_);
64 virtual ~SiteInstanceTestBrowserClient() {
65 WebUIControllerFactory::UnregisterFactoryForTesting(&factory_);
68 virtual bool IsSuitableHost(RenderProcessHost* process_host,
69 const GURL& site_url) OVERRIDE {
70 return (privileged_process_id_ == process_host->GetID()) ==
71 site_url.SchemeIs(kPrivilegedScheme);
74 void set_privileged_process_id(int process_id) {
75 privileged_process_id_ = process_id;
78 private:
79 SiteInstanceTestWebUIControllerFactory factory_;
80 int privileged_process_id_;
83 class SiteInstanceTest : public testing::Test {
84 public:
85 SiteInstanceTest()
86 : ui_thread_(BrowserThread::UI, &message_loop_),
87 file_user_blocking_thread_(BrowserThread::FILE_USER_BLOCKING,
88 &message_loop_),
89 io_thread_(BrowserThread::IO, &message_loop_),
90 old_browser_client_(NULL) {
93 virtual void SetUp() {
94 old_browser_client_ = SetBrowserClientForTesting(&browser_client_);
95 url::AddStandardScheme(kPrivilegedScheme);
96 url::AddStandardScheme(kChromeUIScheme);
98 SiteInstanceImpl::set_render_process_host_factory(&rph_factory_);
101 virtual void TearDown() {
102 // Ensure that no RenderProcessHosts are left over after the tests.
103 EXPECT_TRUE(RenderProcessHost::AllHostsIterator().IsAtEnd());
105 SetBrowserClientForTesting(old_browser_client_);
106 SiteInstanceImpl::set_render_process_host_factory(NULL);
108 // http://crbug.com/143565 found SiteInstanceTest leaking an
109 // AppCacheDatabase. This happens because some part of the test indirectly
110 // calls StoragePartitionImplMap::PostCreateInitialization(), which posts
111 // a task to the IO thread to create the AppCacheDatabase. Since the
112 // message loop is not running, the AppCacheDatabase ends up getting
113 // created when DrainMessageLoops() gets called at the end of a test case.
114 // Immediately after, the test case ends and the AppCacheDatabase gets
115 // scheduled for deletion. Here, call DrainMessageLoops() again so the
116 // AppCacheDatabase actually gets deleted.
117 DrainMessageLoops();
120 void set_privileged_process_id(int process_id) {
121 browser_client_.set_privileged_process_id(process_id);
124 void DrainMessageLoops() {
125 // We don't just do this in TearDown() because we create TestBrowserContext
126 // objects in each test, which will be destructed before
127 // TearDown() is called.
128 base::MessageLoop::current()->RunUntilIdle();
129 message_loop_.RunUntilIdle();
132 private:
133 base::MessageLoopForUI message_loop_;
134 TestBrowserThread ui_thread_;
135 TestBrowserThread file_user_blocking_thread_;
136 TestBrowserThread io_thread_;
138 SiteInstanceTestBrowserClient browser_client_;
139 ContentBrowserClient* old_browser_client_;
140 MockRenderProcessHostFactory rph_factory_;
143 // Subclass of BrowsingInstance that updates a counter when deleted and
144 // returns TestSiteInstances from GetSiteInstanceForURL.
145 class TestBrowsingInstance : public BrowsingInstance {
146 public:
147 TestBrowsingInstance(BrowserContext* browser_context, int* delete_counter)
148 : BrowsingInstance(browser_context),
149 delete_counter_(delete_counter) {
152 // Make a few methods public for tests.
153 using BrowsingInstance::browser_context;
154 using BrowsingInstance::HasSiteInstance;
155 using BrowsingInstance::GetSiteInstanceForURL;
156 using BrowsingInstance::RegisterSiteInstance;
157 using BrowsingInstance::UnregisterSiteInstance;
159 private:
160 virtual ~TestBrowsingInstance() {
161 (*delete_counter_)++;
164 int* delete_counter_;
167 // Subclass of SiteInstanceImpl that updates a counter when deleted.
168 class TestSiteInstance : public SiteInstanceImpl {
169 public:
170 static TestSiteInstance* CreateTestSiteInstance(
171 BrowserContext* browser_context,
172 int* site_delete_counter,
173 int* browsing_delete_counter) {
174 TestBrowsingInstance* browsing_instance =
175 new TestBrowsingInstance(browser_context, browsing_delete_counter);
176 return new TestSiteInstance(browsing_instance, site_delete_counter);
179 private:
180 TestSiteInstance(BrowsingInstance* browsing_instance, int* delete_counter)
181 : SiteInstanceImpl(browsing_instance), delete_counter_(delete_counter) {}
182 virtual ~TestSiteInstance() {
183 (*delete_counter_)++;
186 int* delete_counter_;
189 } // namespace
191 // Test to ensure no memory leaks for SiteInstance objects.
192 TEST_F(SiteInstanceTest, SiteInstanceDestructor) {
193 // The existence of this object will cause WebContentsImpl to create our
194 // test one instead of the real one.
195 RenderViewHostTestEnabler rvh_test_enabler;
196 int site_delete_counter = 0;
197 int browsing_delete_counter = 0;
198 const GURL url("test:foo");
200 // Ensure that instances are deleted when their NavigationEntries are gone.
201 TestSiteInstance* instance =
202 TestSiteInstance::CreateTestSiteInstance(NULL, &site_delete_counter,
203 &browsing_delete_counter);
204 EXPECT_EQ(0, site_delete_counter);
206 NavigationEntryImpl* e1 = new NavigationEntryImpl(
207 instance, 0, url, Referrer(), base::string16(), PAGE_TRANSITION_LINK,
208 false);
210 // Redundantly setting e1's SiteInstance shouldn't affect the ref count.
211 e1->set_site_instance(instance);
212 EXPECT_EQ(0, site_delete_counter);
214 // Add a second reference
215 NavigationEntryImpl* e2 = new NavigationEntryImpl(
216 instance, 0, url, Referrer(), base::string16(), PAGE_TRANSITION_LINK,
217 false);
219 // Now delete both entries and be sure the SiteInstance goes away.
220 delete e1;
221 EXPECT_EQ(0, site_delete_counter);
222 EXPECT_EQ(0, browsing_delete_counter);
223 delete e2;
224 EXPECT_EQ(1, site_delete_counter);
225 // instance is now deleted
226 EXPECT_EQ(1, browsing_delete_counter);
227 // browsing_instance is now deleted
229 // Ensure that instances are deleted when their RenderViewHosts are gone.
230 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
231 instance =
232 TestSiteInstance::CreateTestSiteInstance(browser_context.get(),
233 &site_delete_counter,
234 &browsing_delete_counter);
236 scoped_ptr<WebContentsImpl> web_contents(static_cast<WebContentsImpl*>(
237 WebContents::Create(WebContents::CreateParams(
238 browser_context.get(), instance))));
239 EXPECT_EQ(1, site_delete_counter);
240 EXPECT_EQ(1, browsing_delete_counter);
243 // Make sure that we flush any messages related to the above WebContentsImpl
244 // destruction.
245 DrainMessageLoops();
247 EXPECT_EQ(2, site_delete_counter);
248 EXPECT_EQ(2, browsing_delete_counter);
249 // contents is now deleted, along with instance and browsing_instance
252 // Test that NavigationEntries with SiteInstances can be cloned, but that their
253 // SiteInstances can be changed afterwards. Also tests that the ref counts are
254 // updated properly after the change.
255 TEST_F(SiteInstanceTest, CloneNavigationEntry) {
256 int site_delete_counter1 = 0;
257 int site_delete_counter2 = 0;
258 int browsing_delete_counter = 0;
259 const GURL url("test:foo");
261 SiteInstanceImpl* instance1 =
262 TestSiteInstance::CreateTestSiteInstance(NULL, &site_delete_counter1,
263 &browsing_delete_counter);
264 SiteInstanceImpl* instance2 =
265 TestSiteInstance::CreateTestSiteInstance(NULL, &site_delete_counter2,
266 &browsing_delete_counter);
268 NavigationEntryImpl* e1 = new NavigationEntryImpl(
269 instance1, 0, url, Referrer(), base::string16(), PAGE_TRANSITION_LINK,
270 false);
271 // Clone the entry
272 NavigationEntryImpl* e2 = new NavigationEntryImpl(*e1);
274 // Should be able to change the SiteInstance of the cloned entry.
275 e2->set_site_instance(instance2);
277 // The first SiteInstance should go away after deleting e1, since e2 should
278 // no longer be referencing it.
279 delete e1;
280 EXPECT_EQ(1, site_delete_counter1);
281 EXPECT_EQ(0, site_delete_counter2);
283 // The second SiteInstance should go away after deleting e2.
284 delete e2;
285 EXPECT_EQ(1, site_delete_counter1);
286 EXPECT_EQ(1, site_delete_counter2);
288 // Both BrowsingInstances are also now deleted
289 EXPECT_EQ(2, browsing_delete_counter);
291 DrainMessageLoops();
294 // Test to ensure GetProcess returns and creates processes correctly.
295 TEST_F(SiteInstanceTest, GetProcess) {
296 // Ensure that GetProcess returns a process.
297 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
298 scoped_ptr<RenderProcessHost> host1;
299 scoped_refptr<SiteInstanceImpl> instance(static_cast<SiteInstanceImpl*>(
300 SiteInstance::Create(browser_context.get())));
301 host1.reset(instance->GetProcess());
302 EXPECT_TRUE(host1.get() != NULL);
304 // Ensure that GetProcess creates a new process.
305 scoped_refptr<SiteInstanceImpl> instance2(static_cast<SiteInstanceImpl*>(
306 SiteInstance::Create(browser_context.get())));
307 scoped_ptr<RenderProcessHost> host2(instance2->GetProcess());
308 EXPECT_TRUE(host2.get() != NULL);
309 EXPECT_NE(host1.get(), host2.get());
311 DrainMessageLoops();
314 // Test to ensure SetSite and site() work properly.
315 TEST_F(SiteInstanceTest, SetSite) {
316 scoped_refptr<SiteInstanceImpl> instance(static_cast<SiteInstanceImpl*>(
317 SiteInstance::Create(NULL)));
318 EXPECT_FALSE(instance->HasSite());
319 EXPECT_TRUE(instance->GetSiteURL().is_empty());
321 instance->SetSite(GURL("http://www.google.com/index.html"));
322 EXPECT_EQ(GURL("http://google.com"), instance->GetSiteURL());
324 EXPECT_TRUE(instance->HasSite());
326 DrainMessageLoops();
329 // Test to ensure GetSiteForURL properly returns sites for URLs.
330 TEST_F(SiteInstanceTest, GetSiteForURL) {
331 // Pages are irrelevant.
332 GURL test_url = GURL("http://www.google.com/index.html");
333 EXPECT_EQ(GURL("http://google.com"),
334 SiteInstanceImpl::GetSiteForURL(NULL, test_url));
336 // Ports are irrlevant.
337 test_url = GURL("https://www.google.com:8080");
338 EXPECT_EQ(GURL("https://google.com"),
339 SiteInstanceImpl::GetSiteForURL(NULL, test_url));
341 // Javascript URLs have no site.
342 test_url = GURL("javascript:foo();");
343 EXPECT_EQ(GURL(), SiteInstanceImpl::GetSiteForURL(NULL, test_url));
345 test_url = GURL("http://foo/a.html");
346 EXPECT_EQ(GURL("http://foo"), SiteInstanceImpl::GetSiteForURL(
347 NULL, test_url));
349 test_url = GURL("file:///C:/Downloads/");
350 EXPECT_EQ(GURL(), SiteInstanceImpl::GetSiteForURL(NULL, test_url));
352 std::string guest_url(kGuestScheme);
353 guest_url.append("://abc123");
354 test_url = GURL(guest_url);
355 EXPECT_EQ(test_url, SiteInstanceImpl::GetSiteForURL(NULL, test_url));
357 // TODO(creis): Do we want to special case file URLs to ensure they have
358 // either no site or a special "file://" site? We currently return
359 // "file://home/" as the site, which seems broken.
360 // test_url = GURL("file://home/");
361 // EXPECT_EQ(GURL(), SiteInstanceImpl::GetSiteForURL(NULL, test_url));
363 DrainMessageLoops();
366 // Test of distinguishing URLs from different sites. Most of this logic is
367 // tested in RegistryControlledDomainTest. This test focuses on URLs with
368 // different schemes or ports.
369 TEST_F(SiteInstanceTest, IsSameWebSite) {
370 GURL url_foo = GURL("http://foo/a.html");
371 GURL url_foo2 = GURL("http://foo/b.html");
372 GURL url_foo_https = GURL("https://foo/a.html");
373 GURL url_foo_port = GURL("http://foo:8080/a.html");
374 GURL url_javascript = GURL("javascript:alert(1);");
375 GURL url_blank = GURL(url::kAboutBlankURL);
377 // Same scheme and port -> same site.
378 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_foo, url_foo2));
380 // Different scheme -> different site.
381 EXPECT_FALSE(SiteInstance::IsSameWebSite(NULL, url_foo, url_foo_https));
383 // Different port -> same site.
384 // (Changes to document.domain make renderer ignore the port.)
385 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_foo, url_foo_port));
387 // JavaScript links should be considered same site for anything.
388 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_javascript, url_foo));
389 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_javascript, url_foo_https));
390 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_javascript, url_foo_port));
392 // Navigating to a blank page is considered the same site.
393 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_foo, url_blank));
394 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_foo_https, url_blank));
395 EXPECT_TRUE(SiteInstance::IsSameWebSite(NULL, url_foo_port, url_blank));
397 // Navigating from a blank site is not considered to be the same site.
398 EXPECT_FALSE(SiteInstance::IsSameWebSite(NULL, url_blank, url_foo));
399 EXPECT_FALSE(SiteInstance::IsSameWebSite(NULL, url_blank, url_foo_https));
400 EXPECT_FALSE(SiteInstance::IsSameWebSite(NULL, url_blank, url_foo_port));
402 DrainMessageLoops();
405 // Test to ensure that there is only one SiteInstance per site in a given
406 // BrowsingInstance, when process-per-site is not in use.
407 TEST_F(SiteInstanceTest, OneSiteInstancePerSite) {
408 ASSERT_FALSE(base::CommandLine::ForCurrentProcess()->HasSwitch(
409 switches::kProcessPerSite));
410 int delete_counter = 0;
411 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
412 TestBrowsingInstance* browsing_instance =
413 new TestBrowsingInstance(browser_context.get(), &delete_counter);
415 const GURL url_a1("http://www.google.com/1.html");
416 scoped_refptr<SiteInstanceImpl> site_instance_a1(
417 static_cast<SiteInstanceImpl*>(
418 browsing_instance->GetSiteInstanceForURL(url_a1)));
419 EXPECT_TRUE(site_instance_a1.get() != NULL);
421 // A separate site should create a separate SiteInstance.
422 const GURL url_b1("http://www.yahoo.com/");
423 scoped_refptr<SiteInstanceImpl> site_instance_b1(
424 static_cast<SiteInstanceImpl*>(
425 browsing_instance->GetSiteInstanceForURL(url_b1)));
426 EXPECT_NE(site_instance_a1.get(), site_instance_b1.get());
427 EXPECT_TRUE(site_instance_a1->IsRelatedSiteInstance(site_instance_b1.get()));
429 // Getting the new SiteInstance from the BrowsingInstance and from another
430 // SiteInstance in the BrowsingInstance should give the same result.
431 EXPECT_EQ(site_instance_b1.get(),
432 site_instance_a1->GetRelatedSiteInstance(url_b1));
434 // A second visit to the original site should return the same SiteInstance.
435 const GURL url_a2("http://www.google.com/2.html");
436 EXPECT_EQ(site_instance_a1.get(),
437 browsing_instance->GetSiteInstanceForURL(url_a2));
438 EXPECT_EQ(site_instance_a1.get(),
439 site_instance_a1->GetRelatedSiteInstance(url_a2));
441 // A visit to the original site in a new BrowsingInstance (same or different
442 // browser context) should return a different SiteInstance.
443 TestBrowsingInstance* browsing_instance2 =
444 new TestBrowsingInstance(browser_context.get(), &delete_counter);
445 // Ensure the new SiteInstance is ref counted so that it gets deleted.
446 scoped_refptr<SiteInstanceImpl> site_instance_a2_2(
447 static_cast<SiteInstanceImpl*>(
448 browsing_instance2->GetSiteInstanceForURL(url_a2)));
449 EXPECT_NE(site_instance_a1.get(), site_instance_a2_2.get());
450 EXPECT_FALSE(
451 site_instance_a1->IsRelatedSiteInstance(site_instance_a2_2.get()));
453 // The two SiteInstances for http://google.com should not use the same process
454 // if process-per-site is not enabled.
455 scoped_ptr<RenderProcessHost> process_a1(site_instance_a1->GetProcess());
456 scoped_ptr<RenderProcessHost> process_a2_2(site_instance_a2_2->GetProcess());
457 EXPECT_NE(process_a1.get(), process_a2_2.get());
459 // Should be able to see that we do have SiteInstances.
460 EXPECT_TRUE(browsing_instance->HasSiteInstance(
461 GURL("http://mail.google.com")));
462 EXPECT_TRUE(browsing_instance2->HasSiteInstance(
463 GURL("http://mail.google.com")));
464 EXPECT_TRUE(browsing_instance->HasSiteInstance(
465 GURL("http://mail.yahoo.com")));
467 // Should be able to see that we don't have SiteInstances.
468 EXPECT_FALSE(browsing_instance->HasSiteInstance(
469 GURL("https://www.google.com")));
470 EXPECT_FALSE(browsing_instance2->HasSiteInstance(
471 GURL("http://www.yahoo.com")));
473 // browsing_instances will be deleted when their SiteInstances are deleted.
474 // The processes will be unregistered when the RPH scoped_ptrs go away.
476 DrainMessageLoops();
479 // Test to ensure that there is only one RenderProcessHost per site for an
480 // entire BrowserContext, if process-per-site is in use.
481 TEST_F(SiteInstanceTest, OneSiteInstancePerSiteInBrowserContext) {
482 base::CommandLine::ForCurrentProcess()->AppendSwitch(
483 switches::kProcessPerSite);
484 int delete_counter = 0;
485 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
486 TestBrowsingInstance* browsing_instance =
487 new TestBrowsingInstance(browser_context.get(), &delete_counter);
489 const GURL url_a1("http://www.google.com/1.html");
490 scoped_refptr<SiteInstanceImpl> site_instance_a1(
491 static_cast<SiteInstanceImpl*>(
492 browsing_instance->GetSiteInstanceForURL(url_a1)));
493 EXPECT_TRUE(site_instance_a1.get() != NULL);
494 scoped_ptr<RenderProcessHost> process_a1(site_instance_a1->GetProcess());
496 // A separate site should create a separate SiteInstance.
497 const GURL url_b1("http://www.yahoo.com/");
498 scoped_refptr<SiteInstanceImpl> site_instance_b1(
499 static_cast<SiteInstanceImpl*>(
500 browsing_instance->GetSiteInstanceForURL(url_b1)));
501 EXPECT_NE(site_instance_a1.get(), site_instance_b1.get());
502 EXPECT_TRUE(site_instance_a1->IsRelatedSiteInstance(site_instance_b1.get()));
504 // Getting the new SiteInstance from the BrowsingInstance and from another
505 // SiteInstance in the BrowsingInstance should give the same result.
506 EXPECT_EQ(site_instance_b1.get(),
507 site_instance_a1->GetRelatedSiteInstance(url_b1));
509 // A second visit to the original site should return the same SiteInstance.
510 const GURL url_a2("http://www.google.com/2.html");
511 EXPECT_EQ(site_instance_a1.get(),
512 browsing_instance->GetSiteInstanceForURL(url_a2));
513 EXPECT_EQ(site_instance_a1.get(),
514 site_instance_a1->GetRelatedSiteInstance(url_a2));
516 // A visit to the original site in a new BrowsingInstance (same browser
517 // context) should return a different SiteInstance with the same process.
518 TestBrowsingInstance* browsing_instance2 =
519 new TestBrowsingInstance(browser_context.get(), &delete_counter);
520 scoped_refptr<SiteInstanceImpl> site_instance_a1_2(
521 static_cast<SiteInstanceImpl*>(
522 browsing_instance2->GetSiteInstanceForURL(url_a1)));
523 EXPECT_TRUE(site_instance_a1.get() != NULL);
524 EXPECT_NE(site_instance_a1.get(), site_instance_a1_2.get());
525 EXPECT_EQ(process_a1.get(), site_instance_a1_2->GetProcess());
527 // A visit to the original site in a new BrowsingInstance (different browser
528 // context) should return a different SiteInstance with a different process.
529 scoped_ptr<TestBrowserContext> browser_context2(new TestBrowserContext());
530 TestBrowsingInstance* browsing_instance3 =
531 new TestBrowsingInstance(browser_context2.get(), &delete_counter);
532 scoped_refptr<SiteInstanceImpl> site_instance_a2_3(
533 static_cast<SiteInstanceImpl*>(
534 browsing_instance3->GetSiteInstanceForURL(url_a2)));
535 EXPECT_TRUE(site_instance_a2_3.get() != NULL);
536 scoped_ptr<RenderProcessHost> process_a2_3(site_instance_a2_3->GetProcess());
537 EXPECT_NE(site_instance_a1.get(), site_instance_a2_3.get());
538 EXPECT_NE(process_a1.get(), process_a2_3.get());
540 // Should be able to see that we do have SiteInstances.
541 EXPECT_TRUE(browsing_instance->HasSiteInstance(
542 GURL("http://mail.google.com"))); // visited before
543 EXPECT_TRUE(browsing_instance2->HasSiteInstance(
544 GURL("http://mail.google.com"))); // visited before
545 EXPECT_TRUE(browsing_instance->HasSiteInstance(
546 GURL("http://mail.yahoo.com"))); // visited before
548 // Should be able to see that we don't have SiteInstances.
549 EXPECT_FALSE(browsing_instance2->HasSiteInstance(
550 GURL("http://www.yahoo.com"))); // different BI, same browser context
551 EXPECT_FALSE(browsing_instance->HasSiteInstance(
552 GURL("https://www.google.com"))); // not visited before
553 EXPECT_FALSE(browsing_instance3->HasSiteInstance(
554 GURL("http://www.yahoo.com"))); // different BI, different context
556 // browsing_instances will be deleted when their SiteInstances are deleted.
557 // The processes will be unregistered when the RPH scoped_ptrs go away.
559 DrainMessageLoops();
562 static SiteInstanceImpl* CreateSiteInstance(BrowserContext* browser_context,
563 const GURL& url) {
564 return static_cast<SiteInstanceImpl*>(
565 SiteInstance::CreateForURL(browser_context, url));
568 // Test to ensure that pages that require certain privileges are grouped
569 // in processes with similar pages.
570 TEST_F(SiteInstanceTest, ProcessSharingByType) {
571 // This test shouldn't run with --site-per-process mode, since it doesn't
572 // allow render process reuse, which this test explicitly exercises.
573 if (base::CommandLine::ForCurrentProcess()->HasSwitch(
574 switches::kSitePerProcess))
575 return;
577 // On Android by default the number of renderer hosts is unlimited and process
578 // sharing doesn't happen. We set the override so that the test can run
579 // everywhere.
580 RenderProcessHost::SetMaxRendererProcessCount(kMaxRendererProcessCount);
582 ChildProcessSecurityPolicyImpl* policy =
583 ChildProcessSecurityPolicyImpl::GetInstance();
585 // Make a bunch of mock renderers so that we hit the limit.
586 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
587 ScopedVector<MockRenderProcessHost> hosts;
588 for (size_t i = 0; i < kMaxRendererProcessCount; ++i)
589 hosts.push_back(new MockRenderProcessHost(browser_context.get()));
591 // Create some extension instances and make sure they share a process.
592 scoped_refptr<SiteInstanceImpl> extension1_instance(
593 CreateSiteInstance(browser_context.get(),
594 GURL(kPrivilegedScheme + std::string("://foo/bar"))));
595 set_privileged_process_id(extension1_instance->GetProcess()->GetID());
597 scoped_refptr<SiteInstanceImpl> extension2_instance(
598 CreateSiteInstance(browser_context.get(),
599 GURL(kPrivilegedScheme + std::string("://baz/bar"))));
601 scoped_ptr<RenderProcessHost> extension_host(
602 extension1_instance->GetProcess());
603 EXPECT_EQ(extension1_instance->GetProcess(),
604 extension2_instance->GetProcess());
606 // Create some WebUI instances and make sure they share a process.
607 scoped_refptr<SiteInstanceImpl> webui1_instance(CreateSiteInstance(
608 browser_context.get(), GURL(kChromeUIScheme + std::string("://newtab"))));
609 policy->GrantWebUIBindings(webui1_instance->GetProcess()->GetID());
611 scoped_refptr<SiteInstanceImpl> webui2_instance(
612 CreateSiteInstance(browser_context.get(),
613 GURL(kChromeUIScheme + std::string("://history"))));
615 scoped_ptr<RenderProcessHost> dom_host(webui1_instance->GetProcess());
616 EXPECT_EQ(webui1_instance->GetProcess(), webui2_instance->GetProcess());
618 // Make sure none of differing privilege processes are mixed.
619 EXPECT_NE(extension1_instance->GetProcess(), webui1_instance->GetProcess());
621 for (size_t i = 0; i < kMaxRendererProcessCount; ++i) {
622 EXPECT_NE(extension1_instance->GetProcess(), hosts[i]);
623 EXPECT_NE(webui1_instance->GetProcess(), hosts[i]);
626 DrainMessageLoops();
628 // Disable the process limit override.
629 RenderProcessHost::SetMaxRendererProcessCount(0u);
632 // Test to ensure that HasWrongProcessForURL behaves properly for different
633 // types of URLs.
634 TEST_F(SiteInstanceTest, HasWrongProcessForURL) {
635 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
636 scoped_ptr<RenderProcessHost> host;
637 scoped_refptr<SiteInstanceImpl> instance(static_cast<SiteInstanceImpl*>(
638 SiteInstance::Create(browser_context.get())));
640 EXPECT_FALSE(instance->HasSite());
641 EXPECT_TRUE(instance->GetSiteURL().is_empty());
643 instance->SetSite(GURL("http://evernote.com/"));
644 EXPECT_TRUE(instance->HasSite());
646 // Check prior to "assigning" a process to the instance, which is expected
647 // to return false due to not being attached to any process yet.
648 EXPECT_FALSE(instance->HasWrongProcessForURL(GURL("http://google.com")));
650 // The call to GetProcess actually creates a new real process, which works
651 // fine, but might be a cause for problems in different contexts.
652 host.reset(instance->GetProcess());
653 EXPECT_TRUE(host.get() != NULL);
654 EXPECT_TRUE(instance->HasProcess());
656 EXPECT_FALSE(instance->HasWrongProcessForURL(GURL("http://evernote.com")));
657 EXPECT_FALSE(instance->HasWrongProcessForURL(
658 GURL("javascript:alert(document.location.href);")));
660 EXPECT_TRUE(instance->HasWrongProcessForURL(GURL("chrome://settings")));
662 // Test that WebUI SiteInstances reject normal web URLs.
663 const GURL webui_url("chrome://settings");
664 scoped_refptr<SiteInstanceImpl> webui_instance(static_cast<SiteInstanceImpl*>(
665 SiteInstance::Create(browser_context.get())));
666 webui_instance->SetSite(webui_url);
667 scoped_ptr<RenderProcessHost> webui_host(webui_instance->GetProcess());
669 // Simulate granting WebUI bindings for the process.
670 ChildProcessSecurityPolicyImpl::GetInstance()->GrantWebUIBindings(
671 webui_host->GetID());
673 EXPECT_TRUE(webui_instance->HasProcess());
674 EXPECT_FALSE(webui_instance->HasWrongProcessForURL(webui_url));
675 EXPECT_TRUE(webui_instance->HasWrongProcessForURL(GURL("http://google.com")));
677 // WebUI uses process-per-site, so another instance will use the same process
678 // even if we haven't called GetProcess yet. Make sure HasWrongProcessForURL
679 // doesn't crash (http://crbug.com/137070).
680 scoped_refptr<SiteInstanceImpl> webui_instance2(
681 static_cast<SiteInstanceImpl*>(
682 SiteInstance::Create(browser_context.get())));
683 webui_instance2->SetSite(webui_url);
684 EXPECT_FALSE(webui_instance2->HasWrongProcessForURL(webui_url));
685 EXPECT_TRUE(
686 webui_instance2->HasWrongProcessForURL(GURL("http://google.com")));
688 DrainMessageLoops();
691 // Test to ensure that HasWrongProcessForURL behaves properly even when
692 // --site-per-process is used (http://crbug.com/160671).
693 TEST_F(SiteInstanceTest, HasWrongProcessForURLInSitePerProcess) {
694 base::CommandLine::ForCurrentProcess()->AppendSwitch(
695 switches::kSitePerProcess);
697 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
698 scoped_ptr<RenderProcessHost> host;
699 scoped_refptr<SiteInstanceImpl> instance(static_cast<SiteInstanceImpl*>(
700 SiteInstance::Create(browser_context.get())));
702 instance->SetSite(GURL("http://evernote.com/"));
703 EXPECT_TRUE(instance->HasSite());
705 // Check prior to "assigning" a process to the instance, which is expected
706 // to return false due to not being attached to any process yet.
707 EXPECT_FALSE(instance->HasWrongProcessForURL(GURL("http://google.com")));
709 // The call to GetProcess actually creates a new real process, which works
710 // fine, but might be a cause for problems in different contexts.
711 host.reset(instance->GetProcess());
712 EXPECT_TRUE(host.get() != NULL);
713 EXPECT_TRUE(instance->HasProcess());
715 EXPECT_FALSE(instance->HasWrongProcessForURL(GURL("http://evernote.com")));
716 EXPECT_FALSE(instance->HasWrongProcessForURL(
717 GURL("javascript:alert(document.location.href);")));
719 EXPECT_TRUE(instance->HasWrongProcessForURL(GURL("chrome://settings")));
721 DrainMessageLoops();
724 // Test that we do not reuse a process in process-per-site mode if it has the
725 // wrong bindings for its URL. http://crbug.com/174059.
726 TEST_F(SiteInstanceTest, ProcessPerSiteWithWrongBindings) {
727 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
728 scoped_ptr<RenderProcessHost> host;
729 scoped_ptr<RenderProcessHost> host2;
730 scoped_refptr<SiteInstanceImpl> instance(static_cast<SiteInstanceImpl*>(
731 SiteInstance::Create(browser_context.get())));
733 EXPECT_FALSE(instance->HasSite());
734 EXPECT_TRUE(instance->GetSiteURL().is_empty());
736 // Simulate navigating to a WebUI URL in a process that does not have WebUI
737 // bindings. This already requires bypassing security checks.
738 const GURL webui_url("chrome://settings");
739 instance->SetSite(webui_url);
740 EXPECT_TRUE(instance->HasSite());
742 // The call to GetProcess actually creates a new real process.
743 host.reset(instance->GetProcess());
744 EXPECT_TRUE(host.get() != NULL);
745 EXPECT_TRUE(instance->HasProcess());
747 // Without bindings, this should look like the wrong process.
748 EXPECT_TRUE(instance->HasWrongProcessForURL(webui_url));
750 // WebUI uses process-per-site, so another instance would normally use the
751 // same process. Make sure it doesn't use the same process if the bindings
752 // are missing.
753 scoped_refptr<SiteInstanceImpl> instance2(
754 static_cast<SiteInstanceImpl*>(
755 SiteInstance::Create(browser_context.get())));
756 instance2->SetSite(webui_url);
757 host2.reset(instance2->GetProcess());
758 EXPECT_TRUE(host2.get() != NULL);
759 EXPECT_TRUE(instance2->HasProcess());
760 EXPECT_NE(host.get(), host2.get());
762 DrainMessageLoops();
765 // Test that we do not register processes with empty sites for process-per-site
766 // mode.
767 TEST_F(SiteInstanceTest, NoProcessPerSiteForEmptySite) {
768 base::CommandLine::ForCurrentProcess()->AppendSwitch(
769 switches::kProcessPerSite);
770 scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
771 scoped_ptr<RenderProcessHost> host;
772 scoped_refptr<SiteInstanceImpl> instance(static_cast<SiteInstanceImpl*>(
773 SiteInstance::Create(browser_context.get())));
775 instance->SetSite(GURL());
776 EXPECT_TRUE(instance->HasSite());
777 EXPECT_TRUE(instance->GetSiteURL().is_empty());
778 host.reset(instance->GetProcess());
780 EXPECT_FALSE(RenderProcessHostImpl::GetProcessHostForSite(
781 browser_context.get(), GURL()));
783 DrainMessageLoops();
786 } // namespace content