OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/command_line.h" | 5 #include "base/command_line.h" |
6 #include "base/strings/stringprintf.h" | 6 #include "base/strings/stringprintf.h" |
7 #include "content/browser/frame_host/cross_process_frame_connector.h" | 7 #include "content/browser/frame_host/cross_process_frame_connector.h" |
8 #include "content/browser/frame_host/frame_tree.h" | 8 #include "content/browser/frame_host/frame_tree.h" |
9 #include "content/browser/frame_host/render_frame_proxy_host.h" | 9 #include "content/browser/frame_host/render_frame_proxy_host.h" |
10 #include "content/browser/frame_host/render_widget_host_view_child_frame.h" | 10 #include "content/browser/frame_host/render_widget_host_view_child_frame.h" |
(...skipping 174 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
185 load_observer.Wait(); | 185 load_observer.Wait(); |
186 return result; | 186 return result; |
187 } | 187 } |
188 | 188 |
189 virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE { | 189 virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE { |
190 command_line->AppendSwitch(switches::kSitePerProcess); | 190 command_line->AppendSwitch(switches::kSitePerProcess); |
191 } | 191 } |
192 }; | 192 }; |
193 | 193 |
194 // Ensure that we can complete a cross-process subframe navigation. | 194 // Ensure that we can complete a cross-process subframe navigation. |
195 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, CrossSiteIframe) { | 195 // Crashes ChromeOS bot, but the bug is probably present on other platforms |
| 196 // also. http://crbug.com/399775 |
| 197 IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, DISABLED_CrossSiteIframe) { |
196 host_resolver()->AddRule("*", "127.0.0.1"); | 198 host_resolver()->AddRule("*", "127.0.0.1"); |
197 ASSERT_TRUE(test_server()->Start()); | 199 ASSERT_TRUE(test_server()->Start()); |
198 GURL main_url(test_server()->GetURL("files/site_per_process_main.html")); | 200 GURL main_url(test_server()->GetURL("files/site_per_process_main.html")); |
199 NavigateToURL(shell(), main_url); | 201 NavigateToURL(shell(), main_url); |
200 | 202 |
201 // It is safe to obtain the root frame tree node here, as it doesn't change. | 203 // It is safe to obtain the root frame tree node here, as it doesn't change. |
202 FrameTreeNode* root = | 204 FrameTreeNode* root = |
203 static_cast<WebContentsImpl*>(shell()->web_contents())-> | 205 static_cast<WebContentsImpl*>(shell()->web_contents())-> |
204 GetFrameTree()->root(); | 206 GetFrameTree()->root(); |
205 | 207 |
(...skipping 356 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
562 "server-redirect?" + client_redirect_http_url.spec())); | 564 "server-redirect?" + client_redirect_http_url.spec())); |
563 EXPECT_TRUE(NavigateIframeToURL(shell(), server_redirect_http_url, "test")); | 565 EXPECT_TRUE(NavigateIframeToURL(shell(), server_redirect_http_url, "test")); |
564 | 566 |
565 // DidFailProvisionalLoad when navigating to client_redirect_http_url. | 567 // DidFailProvisionalLoad when navigating to client_redirect_http_url. |
566 EXPECT_EQ(observer.navigation_url(), client_redirect_http_url); | 568 EXPECT_EQ(observer.navigation_url(), client_redirect_http_url); |
567 EXPECT_FALSE(observer.navigation_succeeded()); | 569 EXPECT_FALSE(observer.navigation_succeeded()); |
568 } | 570 } |
569 } | 571 } |
570 | 572 |
571 } // namespace content | 573 } // namespace content |
OLD | NEW |