OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/site_per_process_browsertest.h" | 5 #include "content/browser/site_per_process_browsertest.h" |
6 | 6 |
7 #include <stddef.h> | 7 #include <stddef.h> |
8 #include <stdint.h> | 8 #include <stdint.h> |
9 | 9 |
10 #include <algorithm> | 10 #include <algorithm> |
(...skipping 3441 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3452 " 'csp', '%s');", | 3452 " 'csp', '%s');", |
3453 csp_values[i].c_str()))); | 3453 csp_values[i].c_str()))); |
3454 | 3454 |
3455 NavigateFrameToURL(child, urls[i]); | 3455 NavigateFrameToURL(child, urls[i]); |
3456 EXPECT_EQ(csp_values[i], child->frame_owner_properties().required_csp); | 3456 EXPECT_EQ(csp_values[i], child->frame_owner_properties().required_csp); |
3457 // TODO(amalika): add checks that the CSP replication takes effect | 3457 // TODO(amalika): add checks that the CSP replication takes effect |
3458 } | 3458 } |
3459 } | 3459 } |
3460 | 3460 |
3461 // Verify origin replication with an A-embed-B-embed-C-embed-A hierarchy. | 3461 // Verify origin replication with an A-embed-B-embed-C-embed-A hierarchy. |
3462 // Disabled due to flake on multiple platforms: https://crbug.com/692864. | 3462 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, OriginReplication) { |
3463 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, DISABLED_OriginReplication) { | |
3464 GURL main_url(embedded_test_server()->GetURL( | 3463 GURL main_url(embedded_test_server()->GetURL( |
3465 "a.com", "/cross_site_iframe_factory.html?a(b(c(a),b), a)")); | 3464 "a.com", "/cross_site_iframe_factory.html?a(b(c(a),b), a)")); |
3466 EXPECT_TRUE(NavigateToURL(shell(), main_url)); | 3465 EXPECT_TRUE(NavigateToURL(shell(), main_url)); |
3467 | 3466 |
3468 // It is safe to obtain the root frame tree node here, as it doesn't change. | 3467 // It is safe to obtain the root frame tree node here, as it doesn't change. |
3469 FrameTreeNode* root = web_contents()->GetFrameTree()->root(); | 3468 FrameTreeNode* root = web_contents()->GetFrameTree()->root(); |
3470 | 3469 |
3471 EXPECT_EQ( | 3470 EXPECT_EQ( |
3472 " Site A ------------ proxies for B C\n" | 3471 " Site A ------------ proxies for B C\n" |
3473 " |--Site B ------- proxies for A C\n" // tiptop_child | 3472 " |--Site B ------- proxies for A C\n" // tiptop_child |
(...skipping 6519 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
9993 names.insert(root->children[0]->frame_entry->frame_unique_name()); | 9992 names.insert(root->children[0]->frame_entry->frame_unique_name()); |
9994 } | 9993 } |
9995 | 9994 |
9996 // More than one entry in the set means that the subframe frame navigation | 9995 // More than one entry in the set means that the subframe frame navigation |
9997 // entries didn't have a consistent unique name. This will break history | 9996 // entries didn't have a consistent unique name. This will break history |
9998 // navigations =( | 9997 // navigations =( |
9999 EXPECT_THAT(names, SizeIs(1)) << "Mismatched names for subframe!"; | 9998 EXPECT_THAT(names, SizeIs(1)) << "Mismatched names for subframe!"; |
10000 } | 9999 } |
10001 | 10000 |
10002 } // namespace content | 10001 } // namespace content |
OLD | NEW |