Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3423)

Unified Diff: chrome/browser/chrome_site_per_process_browsertest.cc

Issue 789273006: Make ContentSettingsObserver security checks work with OOPIF. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebase Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | chrome/chrome_tests.gypi » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/chrome_site_per_process_browsertest.cc
diff --git a/chrome/browser/chrome_site_per_process_browsertest.cc b/chrome/browser/chrome_site_per_process_browsertest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..2f212aa70b0826e0ff0de2f4c743c8b117d001ce
--- /dev/null
+++ b/chrome/browser/chrome_site_per_process_browsertest.cc
@@ -0,0 +1,91 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "base/command_line.h"
+#include "base/strings/stringprintf.h"
+#include "chrome/browser/ui/browser.h"
+#include "chrome/browser/ui/tabs/tab_strip_model.h"
+#include "chrome/test/base/in_process_browser_test.h"
+#include "chrome/test/base/ui_test_utils.h"
+#include "content/public/browser/notification_observer.h"
+#include "content/public/browser/notification_service.h"
+#include "content/public/browser/notification_types.h"
+#include "content/public/browser/render_frame_host.h"
+#include "content/public/browser/web_contents.h"
+#include "content/public/browser/web_contents_observer.h"
+#include "content/public/common/content_switches.h"
+#include "content/public/test/browser_test_utils.h"
+#include "content/public/test/content_browser_test_utils.h"
+#include "content/public/test/test_utils.h"
+#include "net/dns/mock_host_resolver.h"
+#include "net/test/embedded_test_server/embedded_test_server.h"
+#include "url/gurl.h"
+
+class ChromeSitePerProcessTest : public InProcessBrowserTest {
+ public:
+ ChromeSitePerProcessTest() {}
+ ~ChromeSitePerProcessTest() override {}
+
+ void SetUpCommandLine(base::CommandLine* command_line) override {
+ command_line->AppendSwitch(switches::kSitePerProcess);
+ }
+
+ void SetUpOnMainThread() override {
+ host_resolver()->AddRule("*", "127.0.0.1");
+ ASSERT_TRUE(embedded_test_server()->InitializeAndWaitUntilReady());
+ content::SetupCrossSiteRedirector(embedded_test_server());
+ }
+
+ private:
+ DISALLOW_COPY_AND_ASSIGN(ChromeSitePerProcessTest);
+};
+
+// Verify that origin replication allows JS access to localStorage, database,
+// and FileSystem APIs. These features involve a check on the
+// WebSecurityOrigin of the topmost WebFrame in ContentSettingsObserver, and
+// this test ensures this check works when the top frame is remote.
+IN_PROC_BROWSER_TEST_F(ChromeSitePerProcessTest,
+ OriginReplicationAllowsAccessToStorage) {
+ // Navigate to a page with a same-site iframe.
+ GURL main_url(embedded_test_server()->GetURL("a.com", "/iframe.html"));
+ ui_test_utils::NavigateToURL(browser(), main_url);
+
+ // Navigate subframe cross-site.
+ content::WebContents* active_web_contents =
+ browser()->tab_strip_model()->GetActiveWebContents();
+ GURL cross_site_url(embedded_test_server()->GetURL("b.com", "/title2.html"));
+ EXPECT_TRUE(NavigateIframeToURL(active_web_contents, "test", cross_site_url));
+
+ // Find the subframe's RenderFrameHost.
+ content::RenderFrameHost* frame_host = FrameMatchingPredicate(
+ active_web_contents,
+ base::Bind(&content::FrameHasSourceUrl, cross_site_url));
+ ASSERT_TRUE(frame_host);
+ EXPECT_TRUE(frame_host->IsCrossProcessSubframe());
+
+ // Check that JS storage APIs can be accessed successfully.
+ EXPECT_TRUE(
+ content::ExecuteScript(frame_host, "localStorage['foo'] = 'bar'"));
+ std::string result;
+ EXPECT_TRUE(ExecuteScriptAndExtractString(
+ frame_host, "window.domAutomationController.send(localStorage['foo']);",
+ &result));
+ EXPECT_EQ(result, "bar");
+ bool is_object_created = false;
+ EXPECT_TRUE(ExecuteScriptAndExtractBool(
+ frame_host,
+ "window.domAutomationController.send(!!indexedDB.open('testdb', 2));",
+ &is_object_created));
+ EXPECT_TRUE(is_object_created);
+ is_object_created = false;
+ EXPECT_TRUE(ExecuteScriptAndExtractBool(
+ frame_host,
+ "window.domAutomationController.send(!!openDatabase("
+ "'foodb', '1.0', 'Test DB', 1024));",
+ &is_object_created));
+ EXPECT_TRUE(is_object_created);
+ EXPECT_TRUE(ExecuteScript(frame_host,
+ "window.webkitRequestFileSystem("
+ "window.TEMPORARY, 1024, function() {});"));
+}
« no previous file with comments | « no previous file | chrome/chrome_tests.gypi » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698