| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <sstream> | 5 #include <sstream> |
| 6 #include <string> | 6 #include <string> |
| 7 | 7 |
| 8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
| 9 #include "base/file_path.h" | 9 #include "base/file_path.h" |
| 10 #include "base/path_service.h" | 10 #include "base/path_service.h" |
| 11 #include "base/string_util.h" | 11 #include "base/string_util.h" |
| 12 #include "base/test/test_timeouts.h" | 12 #include "base/test/test_timeouts.h" |
| 13 #include "base/utf_string_conversions.h" |
| 13 #include "chrome/browser/net/url_request_failed_dns_job.h" | 14 #include "chrome/browser/net/url_request_failed_dns_job.h" |
| 14 #include "chrome/browser/net/url_request_mock_http_job.h" | 15 #include "chrome/browser/net/url_request_mock_http_job.h" |
| 15 #include "chrome/common/url_constants.h" | 16 #include "chrome/common/url_constants.h" |
| 16 #include "chrome/test/automation/browser_proxy.h" | 17 #include "chrome/test/automation/browser_proxy.h" |
| 17 #include "chrome/test/automation/tab_proxy.h" | 18 #include "chrome/test/automation/tab_proxy.h" |
| 18 #include "chrome/test/ui/ui_test.h" | 19 #include "chrome/test/ui/ui_test.h" |
| 19 #include "net/base/net_util.h" | 20 #include "net/base/net_util.h" |
| 20 #include "net/test/test_server.h" | 21 #include "net/test/test_server.h" |
| 21 | 22 |
| 22 namespace { | 23 namespace { |
| (...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 86 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 87 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 87 ASSERT_TRUE(browser_proxy.get()); | 88 ASSERT_TRUE(browser_proxy.get()); |
| 88 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); | 89 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); |
| 89 ASSERT_TRUE(tab.get()); | 90 ASSERT_TRUE(tab.get()); |
| 90 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, | 91 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, |
| 91 tab->NavigateToURL(test_server.GetURL( | 92 tab->NavigateToURL(test_server.GetURL( |
| 92 "files/sync_xmlhttprequest.html"))); | 93 "files/sync_xmlhttprequest.html"))); |
| 93 | 94 |
| 94 // Let's check the XMLHttpRequest ran successfully. | 95 // Let's check the XMLHttpRequest ran successfully. |
| 95 bool success = false; | 96 bool success = false; |
| 96 EXPECT_TRUE(tab->ExecuteAndExtractBool(L"", | 97 EXPECT_TRUE(tab->ExecuteAndExtractBool( |
| 97 L"window.domAutomationController.send(DidSyncRequestSucceed());", | 98 string16(), |
| 99 ASCIIToUTF16("window.domAutomationController.send(" |
| 100 "DidSyncRequestSucceed());"), |
| 98 &success)); | 101 &success)); |
| 99 EXPECT_TRUE(success); | 102 EXPECT_TRUE(success); |
| 100 } | 103 } |
| 101 | 104 |
| 102 // http://code.google.com/p/chromium/issues/detail?id=62776 | 105 // http://code.google.com/p/chromium/issues/detail?id=62776 |
| 103 TEST_F(ResourceDispatcherTest, FLAKY_SyncXMLHttpRequest_Disallowed) { | 106 TEST_F(ResourceDispatcherTest, FLAKY_SyncXMLHttpRequest_Disallowed) { |
| 104 net::TestServer test_server(net::TestServer::TYPE_HTTP, | 107 net::TestServer test_server(net::TestServer::TYPE_HTTP, |
| 105 FilePath(FILE_PATH_LITERAL("chrome/test/data"))); | 108 FilePath(FILE_PATH_LITERAL("chrome/test/data"))); |
| 106 ASSERT_TRUE(test_server.Start()); | 109 ASSERT_TRUE(test_server.Start()); |
| 107 | 110 |
| 108 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 111 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 109 ASSERT_TRUE(browser_proxy.get()); | 112 ASSERT_TRUE(browser_proxy.get()); |
| 110 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); | 113 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); |
| 111 ASSERT_TRUE(tab.get()); | 114 ASSERT_TRUE(tab.get()); |
| 112 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, | 115 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, |
| 113 tab->NavigateToURL(test_server.GetURL( | 116 tab->NavigateToURL(test_server.GetURL( |
| 114 "files/sync_xmlhttprequest_disallowed.html"))); | 117 "files/sync_xmlhttprequest_disallowed.html"))); |
| 115 | 118 |
| 116 // Let's check the XMLHttpRequest ran successfully. | 119 // Let's check the XMLHttpRequest ran successfully. |
| 117 bool success = false; | 120 bool success = false; |
| 118 EXPECT_TRUE(tab->ExecuteAndExtractBool(L"", | 121 EXPECT_TRUE(tab->ExecuteAndExtractBool( |
| 119 L"window.domAutomationController.send(DidSucceed());", | 122 string16(), |
| 123 ASCIIToUTF16("window.domAutomationController.send(DidSucceed());"), |
| 120 &success)); | 124 &success)); |
| 121 EXPECT_TRUE(success); | 125 EXPECT_TRUE(success); |
| 122 } | 126 } |
| 123 | 127 |
| 124 // Test for bug #1159553 -- A synchronous xhr (whose content-type is | 128 // Test for bug #1159553 -- A synchronous xhr (whose content-type is |
| 125 // downloadable) would trigger download and hang the renderer process, | 129 // downloadable) would trigger download and hang the renderer process, |
| 126 // if executed while navigating to a new page. | 130 // if executed while navigating to a new page. |
| 127 // Disabled -- http://code.google.com/p/chromium/issues/detail?id=56264 | 131 // Disabled -- http://code.google.com/p/chromium/issues/detail?id=56264 |
| 128 TEST_F(ResourceDispatcherTest, DISABLED_SyncXMLHttpRequest_DuringUnload) { | 132 TEST_F(ResourceDispatcherTest, DISABLED_SyncXMLHttpRequest_DuringUnload) { |
| 129 net::TestServer test_server(net::TestServer::TYPE_HTTP, | 133 net::TestServer test_server(net::TestServer::TYPE_HTTP, |
| 130 FilePath(FILE_PATH_LITERAL("chrome/test/data"))); | 134 FilePath(FILE_PATH_LITERAL("chrome/test/data"))); |
| 131 ASSERT_TRUE(test_server.Start()); | 135 ASSERT_TRUE(test_server.Start()); |
| 132 | 136 |
| 133 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 137 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 134 ASSERT_TRUE(browser_proxy.get()); | 138 ASSERT_TRUE(browser_proxy.get()); |
| 135 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); | 139 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); |
| 136 ASSERT_TRUE(tab.get()); | 140 ASSERT_TRUE(tab.get()); |
| 137 | 141 |
| 138 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, | 142 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, |
| 139 tab->NavigateToURL(test_server.GetURL( | 143 tab->NavigateToURL(test_server.GetURL( |
| 140 "files/sync_xmlhttprequest_during_unload.html"))); | 144 "files/sync_xmlhttprequest_during_unload.html"))); |
| 141 | 145 |
| 142 // Confirm that the page has loaded (since it changes its title during load). | 146 // Confirm that the page has loaded (since it changes its title during load). |
| 143 std::wstring tab_title; | 147 string16 tab_title; |
| 144 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); | 148 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); |
| 145 EXPECT_EQ(L"sync xhr on unload", tab_title); | 149 EXPECT_EQ(ASCIIToUTF16("sync xhr on unload"), tab_title); |
| 146 | 150 |
| 147 // Navigate to a new page, to dispatch unload event and trigger xhr. | 151 // Navigate to a new page, to dispatch unload event and trigger xhr. |
| 148 // (the bug would make this step hang the renderer). | 152 // (the bug would make this step hang the renderer). |
| 149 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, | 153 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, |
| 150 tab->NavigateToURL(test_server.GetURL("files/title2.html"))); | 154 tab->NavigateToURL(test_server.GetURL("files/title2.html"))); |
| 151 | 155 |
| 152 // Check that the new page got loaded, and that no download was triggered. | 156 // Check that the new page got loaded, and that no download was triggered. |
| 153 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); | 157 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); |
| 154 EXPECT_EQ(L"Title Of Awesomeness", tab_title); | 158 EXPECT_EQ(ASCIIToUTF16("Title Of Awesomeness"), tab_title); |
| 155 | 159 |
| 156 bool shelf_is_visible = false; | 160 bool shelf_is_visible = false; |
| 157 scoped_refptr<BrowserProxy> browser(automation()->GetBrowserWindow(0)); | 161 scoped_refptr<BrowserProxy> browser(automation()->GetBrowserWindow(0)); |
| 158 ASSERT_TRUE(browser.get()); | 162 ASSERT_TRUE(browser.get()); |
| 159 EXPECT_TRUE(browser->IsShelfVisible(&shelf_is_visible)); | 163 EXPECT_TRUE(browser->IsShelfVisible(&shelf_is_visible)); |
| 160 EXPECT_FALSE(shelf_is_visible); | 164 EXPECT_FALSE(shelf_is_visible); |
| 161 } | 165 } |
| 162 | 166 |
| 163 // Tests that onunload is run for cross-site requests. (Bug 1114994) | 167 // Tests that onunload is run for cross-site requests. (Bug 1114994) |
| 164 TEST_F(ResourceDispatcherTest, CrossSiteOnunloadCookie) { | 168 TEST_F(ResourceDispatcherTest, CrossSiteOnunloadCookie) { |
| 165 net::TestServer test_server(net::TestServer::TYPE_HTTP, | 169 net::TestServer test_server(net::TestServer::TYPE_HTTP, |
| 166 FilePath(FILE_PATH_LITERAL("chrome/test/data"))); | 170 FilePath(FILE_PATH_LITERAL("chrome/test/data"))); |
| 167 ASSERT_TRUE(test_server.Start()); | 171 ASSERT_TRUE(test_server.Start()); |
| 168 | 172 |
| 169 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 173 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 170 ASSERT_TRUE(browser_proxy.get()); | 174 ASSERT_TRUE(browser_proxy.get()); |
| 171 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); | 175 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); |
| 172 ASSERT_TRUE(tab.get()); | 176 ASSERT_TRUE(tab.get()); |
| 173 | 177 |
| 174 GURL url(test_server.GetURL("files/onunload_cookie.html")); | 178 GURL url(test_server.GetURL("files/onunload_cookie.html")); |
| 175 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(url)); | 179 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(url)); |
| 176 | 180 |
| 177 // Confirm that the page has loaded (since it changes its title during load). | 181 // Confirm that the page has loaded (since it changes its title during load). |
| 178 std::wstring tab_title; | 182 string16 tab_title; |
| 179 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); | 183 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); |
| 180 EXPECT_EQ(L"set cookie on unload", tab_title); | 184 EXPECT_EQ(ASCIIToUTF16("set cookie on unload"), tab_title); |
| 181 | 185 |
| 182 // Navigate to a new cross-site page, to dispatch unload event and set the | 186 // Navigate to a new cross-site page, to dispatch unload event and set the |
| 183 // cookie. | 187 // cookie. |
| 184 CheckTitleTest(L"content-sniffer-test0.html", | 188 CheckTitleTest(L"content-sniffer-test0.html", |
| 185 L"Content Sniffer Test 0", 1); | 189 L"Content Sniffer Test 0", 1); |
| 186 | 190 |
| 187 // Check that the cookie was set. | 191 // Check that the cookie was set. |
| 188 std::string value_result; | 192 std::string value_result; |
| 189 ASSERT_TRUE(tab->GetCookieByName(url, "onunloadCookie", &value_result)); | 193 ASSERT_TRUE(tab->GetCookieByName(url, "onunloadCookie", &value_result)); |
| 190 ASSERT_FALSE(value_result.empty()); | 194 ASSERT_FALSE(value_result.empty()); |
| (...skipping 65 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 256 | 260 |
| 257 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 261 scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 258 ASSERT_TRUE(browser_proxy.get()); | 262 ASSERT_TRUE(browser_proxy.get()); |
| 259 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); | 263 scoped_refptr<TabProxy> tab(browser_proxy->GetActiveTab()); |
| 260 ASSERT_TRUE(tab.get()); | 264 ASSERT_TRUE(tab.get()); |
| 261 | 265 |
| 262 GURL url(test_server.GetURL("files/onunload_cookie.html")); | 266 GURL url(test_server.GetURL("files/onunload_cookie.html")); |
| 263 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(url)); | 267 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(url)); |
| 264 | 268 |
| 265 // Confirm that the page has loaded (since it changes its title during load). | 269 // Confirm that the page has loaded (since it changes its title during load). |
| 266 std::wstring tab_title; | 270 string16 tab_title; |
| 267 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); | 271 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); |
| 268 EXPECT_EQ(L"set cookie on unload", tab_title); | 272 EXPECT_EQ(ASCIIToUTF16("set cookie on unload"), tab_title); |
| 269 | 273 |
| 270 // Navigate to a new cross-site URL that results in an error page. | 274 // Navigate to a new cross-site URL that results in an error page. |
| 271 // TODO(creis): If this causes crashes or hangs, it might be for the same | 275 // TODO(creis): If this causes crashes or hangs, it might be for the same |
| 272 // reason as ErrorPageTest::DNSError. See bug 1199491 and | 276 // reason as ErrorPageTest::DNSError. See bug 1199491 and |
| 273 // http://crbug.com/22877. | 277 // http://crbug.com/22877. |
| 274 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, | 278 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, |
| 275 tab->NavigateToURLBlockUntilNavigationsComplete( | 279 tab->NavigateToURLBlockUntilNavigationsComplete( |
| 276 GURL(URLRequestFailedDnsJob::kTestUrl), 2)); | 280 GURL(URLRequestFailedDnsJob::kTestUrl), 2)); |
| 277 EXPECT_NE(L"set cookie on unload", GetActiveTabTitle()); | 281 EXPECT_NE(L"set cookie on unload", GetActiveTabTitle()); |
| 278 | 282 |
| 279 // Check that the cookie was set, meaning that the onunload handler ran. | 283 // Check that the cookie was set, meaning that the onunload handler ran. |
| 280 std::string value_result; | 284 std::string value_result; |
| 281 EXPECT_TRUE(tab->GetCookieByName(url, "onunloadCookie", &value_result)); | 285 EXPECT_TRUE(tab->GetCookieByName(url, "onunloadCookie", &value_result)); |
| 282 EXPECT_FALSE(value_result.empty()); | 286 EXPECT_FALSE(value_result.empty()); |
| 283 EXPECT_STREQ("foo", value_result.c_str()); | 287 EXPECT_STREQ("foo", value_result.c_str()); |
| 284 | 288 |
| 285 // Check that renderer-initiated navigations still work. In a previous bug, | 289 // Check that renderer-initiated navigations still work. In a previous bug, |
| 286 // the ResourceDispatcherHost would think that such navigations were | 290 // the ResourceDispatcherHost would think that such navigations were |
| 287 // cross-site, because we didn't clean up from the previous request. Since | 291 // cross-site, because we didn't clean up from the previous request. Since |
| 288 // TabContents was in the NORMAL state, it would ignore the attempt to run | 292 // TabContents was in the NORMAL state, it would ignore the attempt to run |
| 289 // the onunload handler, and the navigation would fail. | 293 // the onunload handler, and the navigation would fail. |
| 290 // (Test by redirecting to javascript:window.location='someURL'.) | 294 // (Test by redirecting to javascript:window.location='someURL'.) |
| 291 GURL test_url(test_server.GetURL("files/title2.html")); | 295 GURL test_url(test_server.GetURL("files/title2.html")); |
| 292 std::string redirect_url = "javascript:window.location='" + | 296 std::string redirect_url = "javascript:window.location='" + |
| 293 test_url.possibly_invalid_spec() + "'"; | 297 test_url.possibly_invalid_spec() + "'"; |
| 294 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, | 298 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, |
| 295 tab->NavigateToURL(GURL(redirect_url))); | 299 tab->NavigateToURL(GURL(redirect_url))); |
| 296 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); | 300 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); |
| 297 EXPECT_EQ(L"Title Of Awesomeness", tab_title); | 301 EXPECT_EQ(ASCIIToUTF16("Title Of Awesomeness"), tab_title); |
| 298 } | 302 } |
| 299 | 303 |
| 300 TEST_F(ResourceDispatcherTest, CrossOriginRedirectBlocked) { | 304 TEST_F(ResourceDispatcherTest, CrossOriginRedirectBlocked) { |
| 301 // We expect the following URL requests from this test: | 305 // We expect the following URL requests from this test: |
| 302 // 1- http://mock.http/cross-origin-redirect-blocked.html | 306 // 1- http://mock.http/cross-origin-redirect-blocked.html |
| 303 // 2- http://mock.http/redirect-to-title2.html | 307 // 2- http://mock.http/redirect-to-title2.html |
| 304 // 3- http://mock.http/title2.html | 308 // 3- http://mock.http/title2.html |
| 305 // | 309 // |
| 306 // If the redirect in #2 were not blocked, we'd also see a request | 310 // If the redirect in #2 were not blocked, we'd also see a request |
| 307 // for http://mock.http:4000/title2.html, and the title would be different. | 311 // for http://mock.http:4000/title2.html, and the title would be different. |
| (...skipping 12 matching lines...) Expand all Loading... |
| 320 | 324 |
| 321 // Visit another URL first to trigger a cross-site navigation. | 325 // Visit another URL first to trigger a cross-site navigation. |
| 322 GURL url(chrome::kChromeUINewTabURL); | 326 GURL url(chrome::kChromeUINewTabURL); |
| 323 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(url)); | 327 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(url)); |
| 324 | 328 |
| 325 // Visit a URL that fails without calling ResourceDispatcherHost::Read. | 329 // Visit a URL that fails without calling ResourceDispatcherHost::Read. |
| 326 GURL broken_url("chrome://theme"); | 330 GURL broken_url("chrome://theme"); |
| 327 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(broken_url)); | 331 ASSERT_EQ(AUTOMATION_MSG_NAVIGATION_SUCCESS, tab->NavigateToURL(broken_url)); |
| 328 | 332 |
| 329 // Make sure the navigation finishes. | 333 // Make sure the navigation finishes. |
| 330 std::wstring tab_title; | 334 string16 tab_title; |
| 331 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); | 335 EXPECT_TRUE(tab->GetTabTitle(&tab_title)); |
| 332 EXPECT_EQ(L"chrome://theme/ is not available", tab_title); | 336 EXPECT_EQ(ASCIIToUTF16("chrome://theme/ is not available"), tab_title); |
| 333 } | 337 } |
| 334 | 338 |
| 335 } // namespace | 339 } // namespace |
| OLD | NEW |