Chromium Code Reviews| Index: content/browser/frame_host/render_frame_host_manager_unittest.cc |
| diff --git a/content/browser/frame_host/render_frame_host_manager_unittest.cc b/content/browser/frame_host/render_frame_host_manager_unittest.cc |
| index 8c157958e09a419cd9cc30454cbc74fee1cfe436..209f2b12c75c0469dff7df557e7bd756b2940ec8 100644 |
| --- a/content/browser/frame_host/render_frame_host_manager_unittest.cc |
| +++ b/content/browser/frame_host/render_frame_host_manager_unittest.cc |
| @@ -3143,4 +3143,82 @@ TEST_F(RenderFrameHostManagerTestWithBrowserSideNavigation, |
| EXPECT_FALSE(manager->GetNavigatingWebUI()); |
| } |
| +namespace { |
| + |
| +// Helper function for strict mixed content checking tests. |
| +void CheckMixedContentIPC(TestRenderFrameHost* rfh, bool expected_param) { |
|
alexmos
2015/12/11 02:52:27
nit: maybe put this on top in the existing anonymo
estark
2015/12/12 01:35:43
Done.
|
| + const IPC::Message* message = |
| + rfh->GetProcess()->sink().GetUniqueMessageMatching( |
| + FrameMsg_DidUpdateShouldEnforceStrictMixedContentChecking::ID); |
| + ASSERT_TRUE(message); |
|
alexmos
2015/12/11 02:52:27
Could we also verify that the message's routing ID
estark
2015/12/12 01:35:43
Done.
|
| + FrameMsg_DidUpdateShouldEnforceStrictMixedContentChecking::Param params; |
| + EXPECT_TRUE(FrameMsg_DidUpdateShouldEnforceStrictMixedContentChecking::Read( |
| + message, ¶ms)); |
| + EXPECT_EQ(expected_param, base::get<0>(params)); |
| + rfh->GetProcess()->sink().ClearMessages(); |
| +} |
| + |
| +} // namespace |
| + |
| +// Tests that frame proxies receive updates when a frame's enforcement |
| +// of strict mixed content checking changes. |
| +TEST_F(RenderFrameHostManagerTestWithSiteIsolation, |
| + ProxiesReceiveShouldEnforceStrictMixedContentChecking) { |
| + const GURL kUrl1("http://www.google.test"); |
| + const GURL kUrl2("http://www.google2.test"); |
| + const GURL kUrl3("http://www.google2.test/foo"); |
| + |
| + contents()->NavigateAndCommit(kUrl1); |
| + |
| + // Create a child frame and navigate it cross-site. |
| + main_test_rfh()->OnCreateChildFrame( |
| + main_test_rfh()->GetProcess()->GetNextRoutingID(), |
| + blink::WebTreeScopeType::Document, "frame1", blink::WebSandboxFlags::None, |
| + blink::WebFrameOwnerProperties()); |
| + |
| + FrameTreeNode* root = contents()->GetFrameTree()->root(); |
| + RenderFrameHostManager* child = root->child_at(0)->render_manager(); |
| + |
| + // Navigate subframe to kUrl2. |
| + NavigationEntryImpl entry1(nullptr /* instance */, -1 /* page_id */, kUrl2, |
| + Referrer(kUrl1, blink::WebReferrerPolicyDefault), |
| + base::string16() /* title */, |
| + ui::PAGE_TRANSITION_LINK, |
| + false /* is_renderer_init */); |
| + TestRenderFrameHost* child_host = |
| + static_cast<TestRenderFrameHost*>(NavigateToEntry(child, entry1)); |
| + child->DidNavigateFrame(child_host, true); |
| + |
| + // Verify that parent and child are in different processes. |
| + EXPECT_NE(child_host->GetProcess(), main_test_rfh()->GetProcess()); |
| + |
| + // Change the parent's enforcement of strict mixed content checking, |
| + // and check that the correct IPC is sent to the child frame's |
| + // process. |
| + main_test_rfh()->OnDidEnforceStrictMixedContentChecking(); |
|
alexmos
2015/12/11 02:52:27
Can we also check that the bit in the correspondin
estark
2015/12/12 01:35:43
Done.
|
| + ASSERT_NO_FATAL_FAILURE(CheckMixedContentIPC(child_host, true)); |
| + |
| + // Do the same for the child's enforcement. |
| + child_host->OnDidEnforceStrictMixedContentChecking(); |
| + ASSERT_NO_FATAL_FAILURE(CheckMixedContentIPC(main_test_rfh(), true)); |
|
alexmos
2015/12/11 02:52:27
It might be good to document somewhere (here?) why
estark
2015/12/12 01:35:43
Yeah, that sounds right. Added a comment here.
|
| + |
| + // Check that the flag for the parent's proxy to the child is reset |
| + // when the child navigates within the same process. |
| + main_test_rfh()->GetProcess()->sink().ClearMessages(); |
|
alexmos
2015/12/11 02:52:27
nit: CheckMixedContentIPC also clears messages in
estark
2015/12/12 01:35:43
Done.
|
| + FrameHostMsg_DidCommitProvisionalLoad_Params commit_params; |
| + commit_params.page_id = 0; |
| + commit_params.nav_entry_id = 0; |
| + commit_params.did_create_new_entry = false; |
| + commit_params.url = kUrl3; |
| + commit_params.transition = ui::PAGE_TRANSITION_AUTO_SUBFRAME; |
| + commit_params.should_update_history = false; |
| + commit_params.gesture = NavigationGestureAuto; |
| + commit_params.was_within_same_page = false; |
| + commit_params.is_post = false; |
| + commit_params.page_state = PageState::CreateFromURL(kUrl3); |
| + commit_params.should_enforce_strict_mixed_content_checking = false; |
| + child_host->SendNavigateWithParams(&commit_params); |
|
alexmos
2015/12/11 02:52:27
Similarly, can we check that the replication state
estark
2015/12/12 01:35:43
Done.
|
| + ASSERT_NO_FATAL_FAILURE(CheckMixedContentIPC(main_test_rfh(), false)); |
| +} |
| + |
| } // namespace content |