| Index: content/browser/site_per_process_browsertest.cc
|
| diff --git a/content/browser/site_per_process_browsertest.cc b/content/browser/site_per_process_browsertest.cc
|
| index d2a47e26367d1374eb1dd877672f54b30a87fef4..69bc8e72a511bdb594684598515068458351d1c4 100644
|
| --- a/content/browser/site_per_process_browsertest.cc
|
| +++ b/content/browser/site_per_process_browsertest.cc
|
| @@ -77,8 +77,6 @@ namespace content {
|
|
|
| namespace {
|
|
|
| -const GURL kBlockedURL("data:,");
|
| -
|
| // Helper function to send a postMessage and wait for a reply message. The
|
| // |post_message_script| is executed on the |sender_ftn| frame, and the sender
|
| // frame is expected to post |reply_status| from the DOMAutomationController
|
| @@ -6166,10 +6164,10 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| ASSERT_EQ(1U, root->child_count());
|
| FrameTreeNode* mixed_child = root->child_at(0)->child_at(0);
|
| ASSERT_TRUE(mixed_child);
|
| - // The child iframe attempted to create a mixed iframe; this will commit
|
| - // a load to 'data:,' (so that it ends up in a unique origin).
|
| - EXPECT_TRUE(mixed_child->has_committed_real_load());
|
| - EXPECT_EQ(kBlockedURL, mixed_child->current_url());
|
| + // The child iframe attempted to create a mixed iframe; this should
|
| + // have been blocked, so the mixed iframe should not have committed a
|
| + // load.
|
| + EXPECT_FALSE(mixed_child->has_committed_real_load());
|
| }
|
|
|
| // Test that subresources with certificate errors that are redundant
|
| @@ -6378,14 +6376,15 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest,
|
| load_observer.Wait();
|
| }
|
|
|
| - // The blocked frame should commit to |kBlockedURL|
|
| - EXPECT_EQ(kBlockedURL, root->child_at(0)->current_url());
|
| + // The blocked frame should stay at the old location.
|
| + EXPECT_EQ(old_subframe_url, root->child_at(0)->current_url());
|
|
|
| + // The blocked frame should keep the old title.
|
| std::string frame_title;
|
| EXPECT_TRUE(ExecuteScriptAndExtractString(
|
| root->child_at(0), "domAutomationController.send(document.title)",
|
| &frame_title));
|
| - EXPECT_EQ("", frame_title);
|
| + EXPECT_EQ("Title Of Awesomeness", frame_title);
|
|
|
| // Navigate to a URL without CSP.
|
| EXPECT_TRUE(NavigateToURL(
|
| @@ -6452,14 +6451,15 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest,
|
| load_observer2.Wait();
|
| }
|
|
|
| - // The blocked frame should commit to |kBlockedURL|
|
| - EXPECT_EQ(kBlockedURL, root->child_at(0)->current_url());
|
| + // The blocked frame should stay at the old location.
|
| + EXPECT_EQ(old_subframe_url, root->child_at(0)->current_url());
|
|
|
| + // The blocked frame should keep the old title.
|
| std::string frame_title;
|
| EXPECT_TRUE(ExecuteScriptAndExtractString(
|
| root->child_at(0), "domAutomationController.send(document.title)",
|
| &frame_title));
|
| - EXPECT_EQ("", frame_title);
|
| + EXPECT_EQ("Title Of Awesomeness", frame_title);
|
| }
|
|
|
| // Test that a cross-origin frame's navigation can be blocked by CSP frame-src.
|
| @@ -6520,14 +6520,15 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest,
|
| load_observer2.Wait();
|
| }
|
|
|
| - // The blocked frame should commit to |kBlockedURL|
|
| - EXPECT_EQ(kBlockedURL, navigating_frame->current_url());
|
| + // The blocked frame should stay at the old location.
|
| + EXPECT_EQ(old_subframe_url, navigating_frame->current_url());
|
|
|
| + // The blocked frame should keep the old title.
|
| std::string frame_title;
|
| EXPECT_TRUE(ExecuteScriptAndExtractString(
|
| navigating_frame, "domAutomationController.send(document.title)",
|
| &frame_title));
|
| - EXPECT_EQ("", frame_title);
|
| + EXPECT_EQ("Title Of Awesomeness", frame_title);
|
|
|
| // Navigate the subframe to a URL without CSP.
|
| NavigateFrameToURL(srcdoc_frame,
|
|
|