OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/bind.h" | 5 #include "base/bind.h" |
6 #include "base/compiler_specific.h" | |
7 #include "base/path_service.h" | |
8 #include "base/prefs/pref_service.h" | 6 #include "base/prefs/pref_service.h" |
9 #include "base/strings/stringprintf.h" | 7 #include "base/strings/stringprintf.h" |
10 #include "base/strings/utf_string_conversions.h" | 8 #include "base/strings/utf_string_conversions.h" |
11 #include "chrome/browser/browsing_data/browsing_data_helper.h" | 9 #include "chrome/browser/browsing_data/browsing_data_helper.h" |
12 #include "chrome/browser/browsing_data/browsing_data_remover.h" | 10 #include "chrome/browser/browsing_data/browsing_data_remover.h" |
13 #include "chrome/browser/google/google_util.h" | 11 #include "chrome/browser/google/google_util.h" |
14 #include "chrome/browser/net/url_request_mock_util.h" | 12 #include "chrome/browser/net/url_request_mock_util.h" |
15 #include "chrome/browser/profiles/profile.h" | 13 #include "chrome/browser/profiles/profile.h" |
16 #include "chrome/browser/ui/browser.h" | 14 #include "chrome/browser/ui/browser.h" |
17 #include "chrome/browser/ui/browser_commands.h" | 15 #include "chrome/browser/ui/browser_commands.h" |
18 #include "chrome/browser/ui/tabs/tab_strip_model.h" | 16 #include "chrome/browser/ui/tabs/tab_strip_model.h" |
19 #include "chrome/common/chrome_paths.h" | |
20 #include "chrome/common/pref_names.h" | 17 #include "chrome/common/pref_names.h" |
21 #include "chrome/test/base/in_process_browser_test.h" | 18 #include "chrome/test/base/in_process_browser_test.h" |
22 #include "chrome/test/base/ui_test_utils.h" | 19 #include "chrome/test/base/ui_test_utils.h" |
23 #include "content/public/browser/notification_service.h" | 20 #include "content/public/browser/notification_service.h" |
24 #include "content/public/browser/render_view_host.h" | 21 #include "content/public/browser/render_view_host.h" |
25 #include "content/public/browser/web_contents.h" | 22 #include "content/public/browser/web_contents.h" |
26 #include "content/public/browser/web_contents_observer.h" | 23 #include "content/public/browser/web_contents_observer.h" |
27 #include "content/public/test/browser_test_utils.h" | 24 #include "content/public/test/browser_test_utils.h" |
28 #include "content/public/test/test_navigation_observer.h" | 25 #include "content/public/test/test_navigation_observer.h" |
29 #include "content/test/net/url_request_failed_job.h" | 26 #include "content/test/net/url_request_failed_job.h" |
30 #include "content/test/net/url_request_mock_http_job.h" | 27 #include "content/test/net/url_request_mock_http_job.h" |
31 #include "net/base/net_errors.h" | 28 #include "net/base/net_errors.h" |
32 #include "net/base/net_util.h" | 29 #include "net/base/net_util.h" |
33 #include "net/http/failing_http_transaction_factory.h" | 30 #include "net/http/failing_http_transaction_factory.h" |
34 #include "net/http/http_cache.h" | 31 #include "net/http/http_cache.h" |
35 #include "net/test/spawned_test_server/spawned_test_server.h" | 32 #include "net/test/spawned_test_server/spawned_test_server.h" |
36 #include "net/url_request/url_request_context.h" | 33 #include "net/url_request/url_request_context.h" |
37 #include "net/url_request/url_request_context_getter.h" | 34 #include "net/url_request/url_request_context_getter.h" |
38 #include "net/url_request/url_request_filter.h" | 35 #include "net/url_request/url_request_filter.h" |
39 #include "net/url_request/url_request_job_factory.h" | 36 #include "net/url_request/url_request_job_factory.h" |
40 | 37 |
41 using content::BrowserThread; | 38 using content::BrowserThread; |
42 using content::NavigationController; | 39 using content::NavigationController; |
43 using content::URLRequestFailedJob; | 40 using content::URLRequestFailedJob; |
44 | 41 |
45 namespace { | 42 namespace { |
46 | 43 |
47 // Returns true if |text| is displayed on the page |browser| is currently | |
48 // displaying. Uses "innerText", so will miss hidden text, and whitespace | |
49 // space handling may be weird. | |
50 bool WARN_UNUSED_RESULT IsDisplayingText(Browser* browser, | |
51 const std::string& text) { | |
52 std::string command = base::StringPrintf( | |
53 "var textContent = document.body.innerText;" | |
54 "var hasText = textContent.indexOf('%s') >= 0;" | |
55 "domAutomationController.send(hasText);", | |
56 text.c_str()); | |
57 bool result = false; | |
58 EXPECT_TRUE(content::ExecuteScriptAndExtractBool( | |
59 browser->tab_strip_model()->GetActiveWebContents(), command, &result)); | |
60 return result; | |
61 } | |
62 | |
63 // Expands the more box on the currently displayed error page. | |
64 void ToggleHelpBox(Browser* browser) { | |
65 EXPECT_TRUE(content::ExecuteScript( | |
66 browser->tab_strip_model()->GetActiveWebContents(), | |
67 "document.getElementById('more-less-button').click();")); | |
68 } | |
69 | |
70 // Returns true if |browser| is displaying the text representation of | |
71 // |error_code| on the current page. | |
72 bool WARN_UNUSED_RESULT IsDisplayingNetError(Browser* browser, | |
73 net::Error error_code) { | |
74 // Get the error as a string, and remove the leading "net::", which is not | |
75 // included on error pages. | |
76 std::string error_string = net::ErrorToString(error_code); | |
77 base::RemoveChars(error_string, "net:", &error_string); | |
78 | |
79 return IsDisplayingText(browser, error_string); | |
80 } | |
81 | |
82 // Checks that the local error page is being displayed, without remotely | |
83 // retrieved navigation corrections, and with the specified error code. | |
84 void ExpectDisplayingLocalErrorPage(Browser* browser, net::Error error_code) { | |
85 // Expand the help box so innerText will include text below the fold. | |
86 ToggleHelpBox(browser); | |
87 | |
88 EXPECT_TRUE(IsDisplayingNetError(browser, error_code)); | |
89 | |
90 // Locally generated error pages should not have navigation corrections. | |
91 EXPECT_FALSE(IsDisplayingText(browser, "http://correction1/")); | |
92 EXPECT_FALSE(IsDisplayingText(browser, "http://correction2/")); | |
93 | |
94 // Locally generated error pages should not have a populated search box. | |
95 bool search_box_populated = false; | |
96 ASSERT_TRUE(content::ExecuteScriptAndExtractBool( | |
97 browser->tab_strip_model()->GetActiveWebContents(), | |
98 "var searchText = document.getElementById('search-box').value;" | |
99 "domAutomationController.send(searchText == 'search query');", | |
100 &search_box_populated)); | |
101 EXPECT_FALSE(search_box_populated); | |
102 } | |
103 | |
104 // Checks that an error page with information retrieved from the navigation | |
105 // correction service is being displayed, with the specified specified error | |
106 // code. | |
107 void ExpectDisplayingNavigationCorrections(Browser* browser, | |
108 net::Error error_code) { | |
109 // Expand the help box so innerText will include text below the fold. | |
110 ToggleHelpBox(browser); | |
111 | |
112 EXPECT_TRUE(IsDisplayingNetError(browser, error_code)); | |
113 | |
114 // Check that the mock navigation corrections are displayed. | |
115 EXPECT_TRUE(IsDisplayingText(browser, "http://correction1/")); | |
116 EXPECT_TRUE(IsDisplayingText(browser, "http://correction2/")); | |
117 | |
118 // Check that the search box is populated correctly. | |
119 bool search_box_populated = false; | |
120 ASSERT_TRUE(content::ExecuteScriptAndExtractBool( | |
121 browser->tab_strip_model()->GetActiveWebContents(), | |
122 "var searchText = document.getElementById('search-box').value;" | |
123 "domAutomationController.send(searchText == 'search query');", | |
124 &search_box_populated)); | |
125 EXPECT_TRUE(search_box_populated); | |
126 } | |
127 | |
128 class ErrorPageTest : public InProcessBrowserTest { | 44 class ErrorPageTest : public InProcessBrowserTest { |
129 public: | 45 public: |
130 enum HistoryNavigationDirection { | 46 enum HistoryNavigationDirection { |
131 HISTORY_NAVIGATE_BACK, | 47 HISTORY_NAVIGATE_BACK, |
132 HISTORY_NAVIGATE_FORWARD, | 48 HISTORY_NAVIGATE_FORWARD, |
133 }; | 49 }; |
134 | 50 |
135 // Navigates the active tab to a mock url created for the file at |file_path|. | 51 // Navigates the active tab to a mock url created for the file at |file_path|. |
136 void NavigateToFileURL(const base::FilePath::StringType& file_path) { | 52 void NavigateToFileURL(const base::FilePath::StringType& file_path) { |
137 ui_test_utils::NavigateToURL( | 53 ui_test_utils::NavigateToURL( |
(...skipping 28 matching lines...) Expand all Loading... |
166 | 82 |
167 // Navigates forward in the history and waits for |num_navigations| to occur, | 83 // Navigates forward in the history and waits for |num_navigations| to occur, |
168 // and the title to change to |expected_title|. | 84 // and the title to change to |expected_title|. |
169 void GoForwardAndWaitForTitle(const std::string& expected_title, | 85 void GoForwardAndWaitForTitle(const std::string& expected_title, |
170 int num_navigations) { | 86 int num_navigations) { |
171 NavigateHistoryAndWaitForTitle(expected_title, | 87 NavigateHistoryAndWaitForTitle(expected_title, |
172 num_navigations, | 88 num_navigations, |
173 HISTORY_NAVIGATE_FORWARD); | 89 HISTORY_NAVIGATE_FORWARD); |
174 } | 90 } |
175 | 91 |
176 void GoBackAndWaitForNavigations(int num_navigations) { | |
177 NavigateHistory(num_navigations, HISTORY_NAVIGATE_BACK); | |
178 } | |
179 | |
180 void GoForwardAndWaitForNavigations(int num_navigations) { | |
181 NavigateHistory(num_navigations, HISTORY_NAVIGATE_FORWARD); | |
182 } | |
183 | |
184 // Confirms that the javascript variable indicating whether or not we have | 92 // Confirms that the javascript variable indicating whether or not we have |
185 // a stale copy in the cache has been set to |expected|. | 93 // a stale copy in the cache has been set to |expected|. |
186 bool ProbeStaleCopyValue(bool expected) { | 94 bool ProbeStaleCopyValue(bool expected) { |
187 const char* js_cache_probe = | 95 const char* js_cache_probe = |
188 "(function () {\n" | 96 "(function () {\n" |
189 " if ('staleCopyInCache' in templateData) {\n" | 97 " if ('staleCopyInCache' in templateData) {\n" |
190 " domAutomationController.send(\n" | 98 " domAutomationController.send(\n" |
191 " templateData.staleCopyInCache ? 'yes' : 'no');\n" | 99 " templateData.staleCopyInCache ? 'yes' : 'no');\n" |
192 " } else {\n" | 100 " } else {\n" |
193 " domAutomationController.send('absent');\n" | 101 " domAutomationController.send('absent');\n" |
194 " }\n" | 102 " }\n" |
195 "})();"; | 103 "})();"; |
196 | 104 |
197 std::string result; | 105 std::string result; |
198 bool ret = | 106 bool ret = |
199 content::ExecuteScriptAndExtractString( | 107 content::ExecuteScriptAndExtractString( |
200 browser()->tab_strip_model()->GetActiveWebContents(), | 108 browser()->tab_strip_model()->GetActiveWebContents(), |
201 js_cache_probe, | 109 js_cache_probe, |
202 &result); | 110 &result); |
203 EXPECT_TRUE(ret); | 111 EXPECT_TRUE(ret); |
204 if (!ret) | 112 if (!ret) |
205 return false; | 113 return false; |
206 EXPECT_EQ(expected ? "yes" : "no", result); | 114 EXPECT_EQ(expected ? "yes" : "no", result); |
207 return ((expected ? "yes" : "no") == result); | 115 return ((expected ? "yes" : "no") == result); |
208 } | 116 } |
209 | 117 |
210 protected: | 118 protected: |
211 static void EnableMocks(const GURL& search_url) { | |
212 chrome_browser_net::SetUrlRequestMocksEnabled(true); | |
213 | |
214 // Add a mock for the search engine the error page will use. | |
215 base::FilePath root_http; | |
216 PathService::Get(chrome::DIR_TEST_DATA, &root_http); | |
217 content::URLRequestMockHTTPJob::AddHostnameToFileHandler( | |
218 search_url.host(), root_http.AppendASCII("title3.html")); | |
219 } | |
220 | |
221 virtual void SetUpOnMainThread() OVERRIDE { | 119 virtual void SetUpOnMainThread() OVERRIDE { |
222 BrowserThread::PostTask( | 120 BrowserThread::PostTask( |
223 BrowserThread::IO, FROM_HERE, | 121 BrowserThread::IO, FROM_HERE, |
224 base::Bind(&ErrorPageTest::EnableMocks, | 122 base::Bind(&chrome_browser_net::SetUrlRequestMocksEnabled, true)); |
225 google_util::GetGoogleSearchURL(browser()->profile()))); | |
226 } | 123 } |
227 | 124 |
228 // Returns a GURL that results in a DNS error. | 125 // Returns a GURL that results in a DNS error. |
229 GURL GetDnsErrorURL() const { | 126 GURL GetDnsErrorURL() const { |
230 return URLRequestFailedJob::GetMockHttpUrl(net::ERR_NAME_NOT_RESOLVED); | 127 return URLRequestFailedJob::GetMockHttpUrl(net::ERR_NAME_NOT_RESOLVED); |
231 } | 128 } |
232 | 129 |
233 private: | 130 private: |
234 // Navigates the browser the indicated direction in the history and waits for | 131 // Navigates the browser the indicated direction in the history and waits for |
235 // |num_navigations| to occur and the title to change to |expected_title|. | 132 // |num_navigations| to occur and the title to change to |expected_title|. |
236 void NavigateHistoryAndWaitForTitle(const std::string& expected_title, | 133 void NavigateHistoryAndWaitForTitle(const std::string& expected_title, |
237 int num_navigations, | 134 int num_navigations, |
238 HistoryNavigationDirection direction) { | 135 HistoryNavigationDirection direction) { |
239 content::TitleWatcher title_watcher( | 136 content::TitleWatcher title_watcher( |
240 browser()->tab_strip_model()->GetActiveWebContents(), | 137 browser()->tab_strip_model()->GetActiveWebContents(), |
241 base::ASCIIToUTF16(expected_title)); | 138 base::ASCIIToUTF16(expected_title)); |
242 | 139 |
243 NavigateHistory(num_navigations, direction); | |
244 | |
245 EXPECT_EQ(title_watcher.WaitAndGetTitle(), | |
246 base::ASCIIToUTF16(expected_title)); | |
247 } | |
248 | |
249 void NavigateHistory(int num_navigations, | |
250 HistoryNavigationDirection direction) { | |
251 content::TestNavigationObserver test_navigation_observer( | 140 content::TestNavigationObserver test_navigation_observer( |
252 browser()->tab_strip_model()->GetActiveWebContents(), | 141 browser()->tab_strip_model()->GetActiveWebContents(), |
253 num_navigations); | 142 num_navigations); |
254 if (direction == HISTORY_NAVIGATE_BACK) { | 143 if (direction == HISTORY_NAVIGATE_BACK) { |
255 chrome::GoBack(browser(), CURRENT_TAB); | 144 chrome::GoBack(browser(), CURRENT_TAB); |
256 } else if (direction == HISTORY_NAVIGATE_FORWARD) { | 145 } else if (direction == HISTORY_NAVIGATE_FORWARD) { |
257 chrome::GoForward(browser(), CURRENT_TAB); | 146 chrome::GoForward(browser(), CURRENT_TAB); |
258 } else { | 147 } else { |
259 FAIL(); | 148 FAIL(); |
260 } | 149 } |
261 test_navigation_observer.Wait(); | 150 test_navigation_observer.Wait(); |
| 151 |
| 152 EXPECT_EQ(title_watcher.WaitAndGetTitle(), |
| 153 base::ASCIIToUTF16(expected_title)); |
262 } | 154 } |
263 }; | 155 }; |
264 | 156 |
265 class TestFailProvisionalLoadObserver : public content::WebContentsObserver { | 157 class TestFailProvisionalLoadObserver : public content::WebContentsObserver { |
266 public: | 158 public: |
267 explicit TestFailProvisionalLoadObserver(content::WebContents* contents) | 159 explicit TestFailProvisionalLoadObserver(content::WebContents* contents) |
268 : content::WebContentsObserver(contents) {} | 160 : content::WebContentsObserver(contents) {} |
269 virtual ~TestFailProvisionalLoadObserver() {} | 161 virtual ~TestFailProvisionalLoadObserver() {} |
270 | 162 |
271 // This method is invoked when the provisional load failed. | 163 // This method is invoked when the provisional load failed. |
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
304 // See crbug.com/109669 | 196 // See crbug.com/109669 |
305 #if defined(USE_AURA) || defined(OS_WIN) | 197 #if defined(USE_AURA) || defined(OS_WIN) |
306 #define MAYBE_DNSError_Basic DISABLED_DNSError_Basic | 198 #define MAYBE_DNSError_Basic DISABLED_DNSError_Basic |
307 #else | 199 #else |
308 #define MAYBE_DNSError_Basic DNSError_Basic | 200 #define MAYBE_DNSError_Basic DNSError_Basic |
309 #endif | 201 #endif |
310 // Test that a DNS error occuring in the main frame redirects to an error page. | 202 // Test that a DNS error occuring in the main frame redirects to an error page. |
311 IN_PROC_BROWSER_TEST_F(ErrorPageTest, MAYBE_DNSError_Basic) { | 203 IN_PROC_BROWSER_TEST_F(ErrorPageTest, MAYBE_DNSError_Basic) { |
312 // The first navigation should fail, and the second one should be the error | 204 // The first navigation should fail, and the second one should be the error |
313 // page. | 205 // page. |
314 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 206 NavigateToURLAndWaitForTitle(GetDnsErrorURL(), "Mock Link Doctor", 2); |
315 browser(), GetDnsErrorURL(), 2); | |
316 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
317 } | 207 } |
318 | 208 |
319 // See crbug.com/109669 | 209 // See crbug.com/109669 |
320 #if defined(USE_AURA) | 210 #if defined(USE_AURA) |
321 #define MAYBE_DNSError_GoBack1 DISABLED_DNSError_GoBack1 | 211 #define MAYBE_DNSError_GoBack1 DISABLED_DNSError_GoBack1 |
322 #else | 212 #else |
323 #define MAYBE_DNSError_GoBack1 DNSError_GoBack1 | 213 #define MAYBE_DNSError_GoBack1 DNSError_GoBack1 |
324 #endif | 214 #endif |
325 | 215 |
326 // Test that a DNS error occuring in the main frame does not result in an | 216 // Test that a DNS error occuring in the main frame does not result in an |
327 // additional session history entry. | 217 // additional session history entry. |
328 IN_PROC_BROWSER_TEST_F(ErrorPageTest, MAYBE_DNSError_GoBack1) { | 218 IN_PROC_BROWSER_TEST_F(ErrorPageTest, MAYBE_DNSError_GoBack1) { |
329 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); | 219 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); |
330 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 220 NavigateToURLAndWaitForTitle(GetDnsErrorURL(), "Mock Link Doctor", 2); |
331 browser(), GetDnsErrorURL(), 2); | |
332 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
333 GoBackAndWaitForTitle("Title Of Awesomeness", 1); | 221 GoBackAndWaitForTitle("Title Of Awesomeness", 1); |
334 } | 222 } |
335 | 223 |
336 // See crbug.com/109669 | 224 // See crbug.com/109669 |
337 #if defined(USE_AURA) | 225 #if defined(USE_AURA) |
338 #define MAYBE_DNSError_GoBack2 DISABLED_DNSError_GoBack2 | 226 #define MAYBE_DNSError_GoBack2 DISABLED_DNSError_GoBack2 |
339 #else | 227 #else |
340 #define MAYBE_DNSError_GoBack2 DNSError_GoBack2 | 228 #define MAYBE_DNSError_GoBack2 DNSError_GoBack2 |
341 #endif | 229 #endif |
342 // Test that a DNS error occuring in the main frame does not result in an | 230 // Test that a DNS error occuring in the main frame does not result in an |
343 // additional session history entry. | 231 // additional session history entry. |
344 IN_PROC_BROWSER_TEST_F(ErrorPageTest, DNSError_GoBack2) { | 232 IN_PROC_BROWSER_TEST_F(ErrorPageTest, DNSError_GoBack2) { |
345 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); | 233 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); |
346 | 234 |
347 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 235 NavigateToURLAndWaitForTitle(GetDnsErrorURL(), "Mock Link Doctor", 2); |
348 browser(), GetDnsErrorURL(), 2); | |
349 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
350 | |
351 NavigateToFileURL(FILE_PATH_LITERAL("title3.html")); | 236 NavigateToFileURL(FILE_PATH_LITERAL("title3.html")); |
352 | 237 |
353 GoBackAndWaitForNavigations(2); | 238 GoBackAndWaitForTitle("Mock Link Doctor", 2); |
354 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
355 | |
356 GoBackAndWaitForTitle("Title Of Awesomeness", 1); | 239 GoBackAndWaitForTitle("Title Of Awesomeness", 1); |
357 } | 240 } |
358 | 241 |
359 // See crbug.com/109669 | 242 // See crbug.com/109669 |
360 #if defined(USE_AURA) | 243 #if defined(USE_AURA) |
361 #define MAYBE_DNSError_GoBack2AndForward DISABLED_DNSError_GoBack2AndForward | 244 #define MAYBE_DNSError_GoBack2AndForward DISABLED_DNSError_GoBack2AndForward |
362 #else | 245 #else |
363 #define MAYBE_DNSError_GoBack2AndForward DNSError_GoBack2AndForward | 246 #define MAYBE_DNSError_GoBack2AndForward DNSError_GoBack2AndForward |
364 #endif | 247 #endif |
365 // Test that a DNS error occuring in the main frame does not result in an | 248 // Test that a DNS error occuring in the main frame does not result in an |
366 // additional session history entry. | 249 // additional session history entry. |
367 IN_PROC_BROWSER_TEST_F(ErrorPageTest, DNSError_GoBack2AndForward) { | 250 IN_PROC_BROWSER_TEST_F(ErrorPageTest, DNSError_GoBack2AndForward) { |
368 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); | 251 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); |
369 | 252 |
370 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 253 NavigateToURLAndWaitForTitle(GetDnsErrorURL(), "Mock Link Doctor", 2); |
371 browser(), GetDnsErrorURL(), 2); | |
372 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
373 | |
374 NavigateToFileURL(FILE_PATH_LITERAL("title3.html")); | 254 NavigateToFileURL(FILE_PATH_LITERAL("title3.html")); |
375 | 255 |
376 GoBackAndWaitForNavigations(2); | 256 GoBackAndWaitForTitle("Mock Link Doctor", 2); |
377 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
378 | |
379 GoBackAndWaitForTitle("Title Of Awesomeness", 1); | 257 GoBackAndWaitForTitle("Title Of Awesomeness", 1); |
380 | 258 |
381 GoForwardAndWaitForNavigations(2); | 259 GoForwardAndWaitForTitle("Mock Link Doctor", 2); |
382 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
383 } | 260 } |
384 | 261 |
385 // See crbug.com/109669 | 262 // See crbug.com/109669 |
386 #if defined(USE_AURA) | 263 #if defined(USE_AURA) |
387 #define MAYBE_DNSError_GoBack2Forward2 DISABLED_DNSError_GoBack2Forward2 | 264 #define MAYBE_DNSError_GoBack2Forward2 DISABLED_DNSError_GoBack2Forward2 |
388 #else | 265 #else |
389 #define MAYBE_DNSError_GoBack2Forward2 DNSError_GoBack2Forward2 | 266 #define MAYBE_DNSError_GoBack2Forward2 DNSError_GoBack2Forward2 |
390 #endif | 267 #endif |
391 // Test that a DNS error occuring in the main frame does not result in an | 268 // Test that a DNS error occuring in the main frame does not result in an |
392 // additional session history entry. | 269 // additional session history entry. |
393 IN_PROC_BROWSER_TEST_F(ErrorPageTest, DNSError_GoBack2Forward2) { | 270 IN_PROC_BROWSER_TEST_F(ErrorPageTest, DNSError_GoBack2Forward2) { |
394 NavigateToFileURL(FILE_PATH_LITERAL("title3.html")); | 271 NavigateToFileURL(FILE_PATH_LITERAL("title3.html")); |
395 | 272 |
396 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 273 NavigateToURLAndWaitForTitle(GetDnsErrorURL(), "Mock Link Doctor", 2); |
397 browser(), GetDnsErrorURL(), 2); | |
398 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
399 | |
400 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); | 274 NavigateToFileURL(FILE_PATH_LITERAL("title2.html")); |
401 | 275 |
402 GoBackAndWaitForNavigations(2); | 276 GoBackAndWaitForTitle("Mock Link Doctor", 2); |
403 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
404 | |
405 GoBackAndWaitForTitle("Title Of More Awesomeness", 1); | 277 GoBackAndWaitForTitle("Title Of More Awesomeness", 1); |
406 | 278 |
407 GoForwardAndWaitForNavigations(2); | 279 GoForwardAndWaitForTitle("Mock Link Doctor", 2); |
408 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
409 | |
410 GoForwardAndWaitForTitle("Title Of Awesomeness", 1); | 280 GoForwardAndWaitForTitle("Title Of Awesomeness", 1); |
411 } | 281 } |
412 | 282 |
413 // See crbug.com/109669 | 283 // Test that a DNS error occuring in an iframe. |
414 #if defined(USE_AURA) | |
415 #define MAYBE_DNSError_DoSearch DNSError_DoSearch | |
416 #else | |
417 #define MAYBE_DNSError_DoSearch DNSError_DoSearch | |
418 #endif | |
419 // Test that the search button on a DNS error page works. | |
420 IN_PROC_BROWSER_TEST_F(ErrorPageTest, MAYBE_DNSError_DoSearch) { | |
421 // The first navigation should fail, and the second one should be the error | |
422 // page. | |
423 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | |
424 browser(), GetDnsErrorURL(), 2); | |
425 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
426 | |
427 // Do a search and make sure the browser ends up at the right page. | |
428 content::TestNavigationObserver nav_observer( | |
429 browser()->tab_strip_model()->GetActiveWebContents(), | |
430 1); | |
431 content::TitleWatcher title_watcher( | |
432 browser()->tab_strip_model()->GetActiveWebContents(), | |
433 base::ASCIIToUTF16("Title Of More Awesomeness")); | |
434 ASSERT_TRUE(content::ExecuteScript( | |
435 browser()->tab_strip_model()->GetActiveWebContents(), | |
436 "document.getElementById('search-button').click();")); | |
437 nav_observer.Wait(); | |
438 EXPECT_EQ(base::ASCIIToUTF16("Title Of More Awesomeness"), | |
439 title_watcher.WaitAndGetTitle()); | |
440 | |
441 // Check the path and query string. | |
442 std::string url; | |
443 ASSERT_TRUE(content::ExecuteScriptAndExtractString( | |
444 browser()->tab_strip_model()->GetActiveWebContents(), | |
445 "domAutomationController.send(window.location.href);", | |
446 &url)); | |
447 EXPECT_EQ("/search", GURL(url).path()); | |
448 EXPECT_EQ("q=search%20query", GURL(url).query()); | |
449 | |
450 // Go back to the error page, to make sure the history is correct. | |
451 GoBackAndWaitForNavigations(2); | |
452 ExpectDisplayingNavigationCorrections(browser(), net::ERR_NAME_NOT_RESOLVED); | |
453 } | |
454 | |
455 // Test that a DNS error occuring in an iframe does not result in showing | |
456 // navigation corrections. | |
457 IN_PROC_BROWSER_TEST_F(ErrorPageTest, IFrameDNSError_Basic) { | 284 IN_PROC_BROWSER_TEST_F(ErrorPageTest, IFrameDNSError_Basic) { |
458 NavigateToURLAndWaitForTitle( | 285 NavigateToURLAndWaitForTitle( |
459 content::URLRequestMockHTTPJob::GetMockUrl( | 286 content::URLRequestMockHTTPJob::GetMockUrl( |
460 base::FilePath(FILE_PATH_LITERAL("iframe_dns_error.html"))), | 287 base::FilePath(FILE_PATH_LITERAL("iframe_dns_error.html"))), |
461 "Blah", | 288 "Blah", |
462 1); | 289 1); |
463 // We expect to have two history entries, since we started off with navigation | 290 // We expect to have two history entries, since we started off with navigation |
464 // to "about:blank" and then navigated to "iframe_dns_error.html". | 291 // to "about:blank" and then navigated to "iframe_dns_error.html". |
465 EXPECT_EQ(2, | 292 EXPECT_EQ(2, |
466 browser()->tab_strip_model()->GetActiveWebContents()-> | 293 browser()->tab_strip_model()->GetActiveWebContents()-> |
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
558 content::Source<NavigationController>(&wc->GetController())); | 385 content::Source<NavigationController>(&wc->GetController())); |
559 wc->GetRenderViewHost()->ExecuteJavascriptInWebFrame( | 386 wc->GetRenderViewHost()->ExecuteJavascriptInWebFrame( |
560 base::string16(), base::ASCIIToUTF16(script)); | 387 base::string16(), base::ASCIIToUTF16(script)); |
561 load_observer.Wait(); | 388 load_observer.Wait(); |
562 | 389 |
563 EXPECT_EQ(fail_url, fail_observer.fail_url()); | 390 EXPECT_EQ(fail_url, fail_observer.fail_url()); |
564 EXPECT_EQ(2, wc->GetController().GetEntryCount()); | 391 EXPECT_EQ(2, wc->GetController().GetEntryCount()); |
565 } | 392 } |
566 } | 393 } |
567 | 394 |
568 // Checks that navigation corrections are not loaded when we receive an actual | 395 // Checks that the Link Doctor is not loaded when we receive an actual 404 page. |
569 // 404 page. | |
570 IN_PROC_BROWSER_TEST_F(ErrorPageTest, Page404) { | 396 IN_PROC_BROWSER_TEST_F(ErrorPageTest, Page404) { |
571 NavigateToURLAndWaitForTitle( | 397 NavigateToURLAndWaitForTitle( |
572 content::URLRequestMockHTTPJob::GetMockUrl( | 398 content::URLRequestMockHTTPJob::GetMockUrl( |
573 base::FilePath(FILE_PATH_LITERAL("page404.html"))), | 399 base::FilePath(FILE_PATH_LITERAL("page404.html"))), |
574 "SUCCESS", | 400 "SUCCESS", |
575 1); | 401 1); |
576 } | 402 } |
577 | 403 |
578 // Checks that when an error occurs, the stale cache status of the page | 404 // Checks that when an error occurs, the stale cache status of the page |
579 // is correctly transferred. | 405 // is correctly transferred. |
580 IN_PROC_BROWSER_TEST_F(ErrorPageTest, StaleCacheStatus) { | 406 IN_PROC_BROWSER_TEST_F(ErrorPageTest, StaleCacheStatus) { |
581 ASSERT_TRUE(test_server()->Start()); | 407 ASSERT_TRUE(test_server()->Start()); |
582 // Load cache with entry with "nocache" set, to create stale | 408 // Load cache with entry with "nocache" set, to create stale |
583 // cache. | 409 // cache. |
584 GURL test_url(test_server()->GetURL("files/nocache.html")); | 410 GURL test_url(test_server()->GetURL("files/nocache.html")); |
585 NavigateToURLAndWaitForTitle(test_url, "Nocache Test Page", 1); | 411 NavigateToURLAndWaitForTitle(test_url, "Nocache Test Page", 1); |
586 | 412 |
587 // Reload same URL after forcing an error from the the network layer; | 413 // Reload same URL after forcing an error from the the network layer; |
588 // confirm that the error page is told the cached copy exists. | 414 // confirm that the error page is told the cached copy exists. |
589 scoped_refptr<net::URLRequestContextGetter> url_request_context_getter = | 415 scoped_refptr<net::URLRequestContextGetter> url_request_context_getter = |
590 browser()->profile()->GetRequestContext(); | 416 browser()->profile()->GetRequestContext(); |
591 BrowserThread::PostTask( | 417 BrowserThread::PostTask( |
592 BrowserThread::IO, FROM_HERE, | 418 BrowserThread::IO, FROM_HERE, |
593 base::Bind(&InterceptNetworkTransactions, url_request_context_getter, | 419 base::Bind(&InterceptNetworkTransactions, url_request_context_getter, |
| 420 // Note that we can't use an error that'll invoke the link |
| 421 // doctor. In normal network error conditions that would |
| 422 // work (because the link doctor fetch would also fail, |
| 423 // putting us back in the main offline path), but |
| 424 // SetUrlRequestMocksEnabled() has also specfied a link |
| 425 // doctor mock, which will be accessible because it |
| 426 // won't go through the network cache. |
594 net::ERR_FAILED)); | 427 net::ERR_FAILED)); |
595 | 428 |
596 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 429 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( |
597 // With no navigation corrections to load, there's only one navigation. | 430 // With no link doctor load, there's only one navigation. |
598 browser(), test_url, 1); | 431 browser(), test_url, 1); |
599 EXPECT_TRUE(ProbeStaleCopyValue(true)); | 432 EXPECT_TRUE(ProbeStaleCopyValue(true)); |
600 | 433 |
601 // Clear the cache and reload the same URL; confirm the error page is told | 434 // Clear the cache and reload the same URL; confirm the error page is told |
602 // that there is no cached copy. | 435 // that there is no cached copy. |
603 BrowsingDataRemover* remover = | 436 BrowsingDataRemover* remover = |
604 BrowsingDataRemover::CreateForUnboundedRange(browser()->profile()); | 437 BrowsingDataRemover::CreateForUnboundedRange(browser()->profile()); |
605 remover->Remove(BrowsingDataRemover::REMOVE_CACHE, | 438 remover->Remove(BrowsingDataRemover::REMOVE_CACHE, |
606 BrowsingDataHelper::UNPROTECTED_WEB); | 439 BrowsingDataHelper::UNPROTECTED_WEB); |
607 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 440 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( |
608 browser(), test_url, 1); | 441 browser(), test_url, 1); |
609 EXPECT_TRUE(ProbeStaleCopyValue(false)); | 442 EXPECT_TRUE(ProbeStaleCopyValue(false)); |
610 } | 443 } |
611 | 444 |
| 445 // Returns Javascript code that executes plain text search for the page. |
| 446 // Pass into content::ExecuteScriptAndExtractBool as |script| parameter. |
| 447 std::string GetTextContentContainsStringScript( |
| 448 const std::string& value_to_search) { |
| 449 return base::StringPrintf( |
| 450 "var textContent = document.body.textContent;" |
| 451 "var hasError = textContent.indexOf('%s') >= 0;" |
| 452 "domAutomationController.send(hasError);", |
| 453 value_to_search.c_str()); |
| 454 } |
| 455 |
612 // Protocol handler that fails all requests with net::ERR_ADDRESS_UNREACHABLE. | 456 // Protocol handler that fails all requests with net::ERR_ADDRESS_UNREACHABLE. |
613 class AddressUnreachableProtocolHandler | 457 class AddressUnreachableProtocolHandler |
614 : public net::URLRequestJobFactory::ProtocolHandler { | 458 : public net::URLRequestJobFactory::ProtocolHandler { |
615 public: | 459 public: |
616 AddressUnreachableProtocolHandler() {} | 460 AddressUnreachableProtocolHandler() {} |
617 virtual ~AddressUnreachableProtocolHandler() {} | 461 virtual ~AddressUnreachableProtocolHandler() {} |
618 | 462 |
619 // net::URLRequestJobFactory::ProtocolHandler: | 463 // net::URLRequestJobFactory::ProtocolHandler: |
620 virtual net::URLRequestJob* MaybeCreateJob( | 464 virtual net::URLRequestJob* MaybeCreateJob( |
621 net::URLRequest* request, | 465 net::URLRequest* request, |
622 net::NetworkDelegate* network_delegate) const OVERRIDE { | 466 net::NetworkDelegate* network_delegate) const OVERRIDE { |
623 return new URLRequestFailedJob(request, | 467 return new URLRequestFailedJob(request, |
624 network_delegate, | 468 network_delegate, |
625 net::ERR_ADDRESS_UNREACHABLE); | 469 net::ERR_ADDRESS_UNREACHABLE); |
626 } | 470 } |
627 | 471 |
628 private: | 472 private: |
629 DISALLOW_COPY_AND_ASSIGN(AddressUnreachableProtocolHandler); | 473 DISALLOW_COPY_AND_ASSIGN(AddressUnreachableProtocolHandler); |
630 }; | 474 }; |
631 | 475 |
632 // A test fixture that returns ERR_ADDRESS_UNREACHABLE for all navigation | 476 // A test fixture that returns ERR_ADDRESS_UNREACHABLE for all Link Doctor |
633 // correction requests. ERR_NAME_NOT_RESOLVED is more typical, but need to use | 477 // requests. ERR_NAME_NOT_RESOLVED is more typical, but need to use a different |
634 // a different error for the correction service and the original page to | 478 // error for the Link Doctor and the original page to validate the right page |
635 // validate the right page is being displayed. | 479 // is being displayed. |
636 class ErrorPageNavigationCorrectionsFailTest : public ErrorPageTest { | 480 class ErrorPageLinkDoctorFailTest : public ErrorPageTest { |
637 public: | 481 public: |
638 // InProcessBrowserTest: | 482 // InProcessBrowserTest: |
639 virtual void SetUpOnMainThread() OVERRIDE { | 483 virtual void SetUpOnMainThread() OVERRIDE { |
640 BrowserThread::PostTask( | 484 BrowserThread::PostTask( |
641 BrowserThread::IO, FROM_HERE, | 485 BrowserThread::IO, FROM_HERE, |
642 base::Bind(&ErrorPageNavigationCorrectionsFailTest::AddFilters)); | 486 base::Bind(&ErrorPageLinkDoctorFailTest::AddFilters)); |
643 } | 487 } |
644 | 488 |
645 virtual void CleanUpOnMainThread() OVERRIDE { | 489 virtual void CleanUpOnMainThread() OVERRIDE { |
646 BrowserThread::PostTask( | 490 BrowserThread::PostTask( |
647 BrowserThread::IO, FROM_HERE, | 491 BrowserThread::IO, FROM_HERE, |
648 base::Bind(&ErrorPageNavigationCorrectionsFailTest::RemoveFilters)); | 492 base::Bind(&ErrorPageLinkDoctorFailTest::RemoveFilters)); |
649 } | 493 } |
650 | 494 |
651 private: | 495 private: |
652 // Adds a filter that causes all correction service requests to fail with | 496 // Adds a filter that causes all requests for the Link Doctor's scheme and |
653 // ERR_ADDRESS_UNREACHABLE. | 497 // host to fail with ERR_ADDRESS_UNREACHABLE. Since the Link Doctor adds |
| 498 // query strings, it's not enough to just fail exact matches. |
654 // | 499 // |
655 // Also adds the content::URLRequestFailedJob filter. | 500 // Also adds the content::URLRequestFailedJob filter. |
656 static void AddFilters() { | 501 static void AddFilters() { |
657 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | 502 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); |
658 content::URLRequestFailedJob::AddUrlHandler(); | 503 content::URLRequestFailedJob::AddUrlHandler(); |
659 | 504 |
660 net::URLRequestFilter::GetInstance()->AddUrlProtocolHandler( | 505 net::URLRequestFilter::GetInstance()->AddHostnameProtocolHandler( |
661 google_util::LinkDoctorBaseURL(), | 506 google_util::LinkDoctorBaseURL().scheme(), |
| 507 google_util::LinkDoctorBaseURL().host(), |
662 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>( | 508 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler>( |
663 new AddressUnreachableProtocolHandler())); | 509 new AddressUnreachableProtocolHandler())); |
664 } | 510 } |
665 | 511 |
666 static void RemoveFilters() { | 512 static void RemoveFilters() { |
667 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | 513 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); |
668 net::URLRequestFilter::GetInstance()->ClearHandlers(); | 514 net::URLRequestFilter::GetInstance()->ClearHandlers(); |
669 } | 515 } |
670 }; | 516 }; |
671 | 517 |
672 // Make sure that when corrections fail to load, the network error page is | 518 // Make sure that when the Link Doctor fails to load, the network error page is |
673 // successfully loaded. | 519 // successfully loaded. |
674 IN_PROC_BROWSER_TEST_F(ErrorPageNavigationCorrectionsFailTest, | 520 IN_PROC_BROWSER_TEST_F(ErrorPageLinkDoctorFailTest, LinkDoctorFail) { |
675 FetchCorrectionsFails) { | |
676 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 521 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( |
677 browser(), | 522 browser(), |
678 URLRequestFailedJob::GetMockHttpUrl(net::ERR_NAME_NOT_RESOLVED), | 523 URLRequestFailedJob::GetMockHttpUrl(net::ERR_NAME_NOT_RESOLVED), |
679 2); | 524 2); |
680 | 525 |
681 // Verify that the expected error page is being displayed. | 526 // Verify that the expected error page is being displayed. Do this by making |
682 ExpectDisplayingLocalErrorPage(browser(), net::ERR_NAME_NOT_RESOLVED); | 527 // sure the original error code (ERR_NAME_NOT_RESOLVED) is displayed. |
| 528 bool result = false; |
| 529 EXPECT_TRUE(content::ExecuteScriptAndExtractBool( |
| 530 browser()->tab_strip_model()->GetActiveWebContents(), |
| 531 GetTextContentContainsStringScript("ERR_NAME_NOT_RESOLVED"), |
| 532 &result)); |
| 533 EXPECT_TRUE(result); |
683 } | 534 } |
684 | 535 |
685 // Checks that when an error occurs and a corrections fail to load, the stale | 536 // Checks that when an error occurs and a link doctor load fails, the stale |
686 // cache status of the page is correctly transferred. Most logic copied | 537 // cache status of the page is correctly transferred. Most logic copied |
687 // from StaleCacheStatus above. | 538 // from StaleCacheStatus above. |
688 IN_PROC_BROWSER_TEST_F(ErrorPageNavigationCorrectionsFailTest, | 539 IN_PROC_BROWSER_TEST_F(ErrorPageLinkDoctorFailTest, |
689 StaleCacheStatusFailedCorrections) { | 540 StaleCacheStatusFailedLinkDoctor) { |
690 ASSERT_TRUE(test_server()->Start()); | 541 ASSERT_TRUE(test_server()->Start()); |
691 // Load cache with entry with "nocache" set, to create stale | 542 // Load cache with entry with "nocache" set, to create stale |
692 // cache. | 543 // cache. |
693 GURL test_url(test_server()->GetURL("files/nocache.html")); | 544 GURL test_url(test_server()->GetURL("files/nocache.html")); |
694 NavigateToURLAndWaitForTitle(test_url, "Nocache Test Page", 1); | 545 NavigateToURLAndWaitForTitle(test_url, "Nocache Test Page", 1); |
695 | 546 |
696 // Reload same URL after forcing an error from the the network layer; | 547 // Reload same URL after forcing an error from the the network layer; |
697 // confirm that the error page is told the cached copy exists. | 548 // confirm that the error page is told the cached copy exists. |
698 scoped_refptr<net::URLRequestContextGetter> url_request_context_getter = | 549 scoped_refptr<net::URLRequestContextGetter> url_request_context_getter = |
699 browser()->profile()->GetRequestContext(); | 550 browser()->profile()->GetRequestContext(); |
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
753 }; | 604 }; |
754 | 605 |
755 const char ErrorPageForIDNTest::kHostname[] = | 606 const char ErrorPageForIDNTest::kHostname[] = |
756 "xn--d1abbgf6aiiy.xn--p1ai"; | 607 "xn--d1abbgf6aiiy.xn--p1ai"; |
757 const char ErrorPageForIDNTest::kHostnameJSUnicode[] = | 608 const char ErrorPageForIDNTest::kHostnameJSUnicode[] = |
758 "\\u043f\\u0440\\u0435\\u0437\\u0438\\u0434\\u0435\\u043d\\u0442." | 609 "\\u043f\\u0440\\u0435\\u0437\\u0438\\u0434\\u0435\\u043d\\u0442." |
759 "\\u0440\\u0444"; | 610 "\\u0440\\u0444"; |
760 | 611 |
761 // Make sure error page shows correct unicode for IDN. | 612 // Make sure error page shows correct unicode for IDN. |
762 IN_PROC_BROWSER_TEST_F(ErrorPageForIDNTest, IDN) { | 613 IN_PROC_BROWSER_TEST_F(ErrorPageForIDNTest, IDN) { |
763 // ERR_UNSAFE_PORT will not trigger navigation corrections. | 614 // ERR_UNSAFE_PORT will not trigger the link doctor. |
764 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( | 615 ui_test_utils::NavigateToURLBlockUntilNavigationsComplete( |
765 browser(), | 616 browser(), |
766 URLRequestFailedJob::GetMockHttpUrlForHostname(net::ERR_UNSAFE_PORT, | 617 URLRequestFailedJob::GetMockHttpUrlForHostname(net::ERR_UNSAFE_PORT, |
767 kHostname), | 618 kHostname), |
768 1); | 619 1); |
769 | 620 |
770 ToggleHelpBox(browser()); | 621 bool result = false; |
771 EXPECT_TRUE(IsDisplayingText(browser(), kHostnameJSUnicode)); | 622 EXPECT_TRUE(content::ExecuteScriptAndExtractBool( |
| 623 browser()->tab_strip_model()->GetActiveWebContents(), |
| 624 GetTextContentContainsStringScript(kHostnameJSUnicode), |
| 625 &result)); |
| 626 EXPECT_TRUE(result); |
772 } | 627 } |
773 | 628 |
774 } // namespace | 629 } // namespace |
OLD | NEW |