1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149
|
// Copyright 2023 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/test/scoped_feature_list.h"
#include "content/browser/renderer_host/render_frame_host_impl.h"
#include "content/browser/web_contents/web_contents_impl.h"
#include "content/public/browser/site_isolation_policy.h"
#include "content/public/common/content_switches.h"
#include "content/public/test/back_forward_cache_util.h"
#include "content/public/test/browser_test.h"
#include "content/public/test/browser_test_utils.h"
#include "content/public/test/content_browser_test.h"
#include "content/public/test/content_browser_test_utils.h"
#include "content/shell/browser/shell.h"
#include "content/test/content_browser_test_utils_internal.h"
#include "net/dns/mock_host_resolver.h"
namespace content {
class MessagePortCloseEventBrowserTest : public ContentBrowserTest {
public:
MessagePortCloseEventBrowserTest() {
InitBackForwardCacheFeature(&feature_list_for_back_forward_cache_,
/*enable_back_forward_cache=*/true);
}
~MessagePortCloseEventBrowserTest() override = default;
void SetUpOnMainThread() override {
// Setup the server to allow serving separate sites, so we can perform
// cross-process navigation.
host_resolver()->AddRule("*", "127.0.0.1");
}
protected:
void SetUpCommandLine(base::CommandLine* command_line) override {
command_line->AppendSwitchASCII(switches::kEnableBlinkFeatures,
"MessagePortCloseEvent");
}
RenderFrameHost* GetPrimaryMainFrame() {
return shell()->web_contents()->GetPrimaryMainFrame();
}
base::test::ScopedFeatureList feature_list_for_back_forward_cache_;
};
// Confirm the close event is fired when the page crashes.
IN_PROC_BROWSER_TEST_F(MessagePortCloseEventBrowserTest,
CloseEventHappensIfProcessCrashes) {
// If site isolation is turned off, A and B shares the same SiteInstance.
// So, when A crashes, B also crashes.
if (!SiteIsolationPolicy::UseDedicatedProcessesForAllSites()) {
GTEST_SKIP() << "test requires site isolation";
}
ASSERT_TRUE(embedded_test_server()->Start());
GURL url_a(embedded_test_server()->GetURL("a.com", "/title1.html"));
GURL url_b(embedded_test_server()->GetURL("b.com", "/title1.html"));
// 1) Navigate to A and open a popup.
ASSERT_TRUE(NavigateToURL(shell(), url_a));
WebContents* contents_a = shell()->web_contents();
RenderFrameHostImplWrapper rfh_a(GetPrimaryMainFrame());
Shell* popup = OpenPopup(rfh_a.get(), url_b, "");
WebContents* contents_b = popup->web_contents();
ASSERT_EQ(2u, rfh_a->GetSiteInstance()->GetRelatedActiveContentsCount());
// 2) Set up a MessageChannel between page A and page B. The message channel
// is created in page B and one of the ports is passed to page A.
ASSERT_TRUE(ExecJs(contents_a, R"(
window.onmessage = (e) => {
const port = e.ports[0];
port.start();
}
)"));
ASSERT_TRUE(ExecJs(contents_b, R"(
const {port1, port2} = new MessageChannel();
port1.start();
var closeEventPromise = new Promise(resolve => port1.onclose = resolve);
window.opener.postMessage('', '*', [port2]);
)"));
// 3) Crash the renderer A.
CrashTab(contents_a);
// 4) Confirm the close event is fired on the port in page B.
EXPECT_TRUE(ExecJs(contents_b, "closeEventPromise"));
}
// Confirm the close event is fired when the document stored in the BFCache
// is destroyed.
IN_PROC_BROWSER_TEST_F(MessagePortCloseEventBrowserTest,
CloseEventHappensIfPageEvictedFromBackForwardCache) {
ASSERT_TRUE(embedded_test_server()->Start());
// 1) Load a page that registers a service worker.
ASSERT_TRUE(NavigateToURL(shell(),
embedded_test_server()->GetURL(
"/service_worker/create_service_worker.html")));
ASSERT_EQ("DONE",
EvalJs(shell(), "register('message_port_close_event.js');"));
// 2) Load the page again so we are controlled.
ASSERT_TRUE(NavigateToURL(shell(),
embedded_test_server()->GetURL(
"/service_worker/create_service_worker.html")));
ASSERT_EQ(true, EvalJs(shell(), "!!navigator.serviceWorker.controller"));
// 3) Establish message port connection with the service worker.
ASSERT_TRUE(ExecJs(shell(), R"(
const {port1, port2} = new MessageChannel();
port1.start();
const ctrl = navigator.serviceWorker.controller;
ctrl.postMessage("init", [port2]);
)"));
RenderFrameHostImplWrapper rfh_1(GetPrimaryMainFrame());
WebContents* web_contents = shell()->web_contents();
// 4) Navigate to the empty page in the service worker's scope and confirm the
// previous page is in BackForwardCache.
ASSERT_TRUE(NavigateToURL(
shell(), embedded_test_server()->GetURL("/service_worker/empty.html")));
ASSERT_TRUE(rfh_1->IsInBackForwardCache());
RenderFrameHostImplWrapper rfh_2(GetPrimaryMainFrame());
// 5) Ask the service worker to create the promise that resolves when
// it receives a close event from the BFCached page when that page gets
// evicted.
ASSERT_TRUE(ExecJs(rfh_2.get(), R"(
navigator.serviceWorker.controller.postMessage("wait for close event");
var closeEventPromise = new Promise(resolve => {
navigator.serviceWorker.addEventListener('message', (event) => {
resolve(event.data);
})});
)"));
// 6) Flush the cache and evict the previously BFCached page.
web_contents->GetController().GetBackForwardCache().Flush();
// 7) Confirm the previous page is evicted.
ASSERT_TRUE(rfh_1.WaitUntilRenderFrameDeleted());
// 8) Confirm the close event is fired on the port in the service worker.
EXPECT_EQ("close event is fired", EvalJs(rfh_2.get(), "closeEventPromise"));
}
} // namespace content
|