1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/command_line.h"
6 #include "base/strings/stringprintf.h"
7 #include "chrome/browser/ui/browser.h"
8 #include "chrome/browser/ui/tabs/tab_strip_model.h"
9 #include "chrome/test/base/in_process_browser_test.h"
10 #include "chrome/test/base/ui_test_utils.h"
11 #include "content/public/browser/notification_observer.h"
12 #include "content/public/browser/notification_service.h"
13 #include "content/public/browser/notification_types.h"
14 #include "content/public/browser/render_frame_host.h"
15 #include "content/public/browser/web_contents.h"
16 #include "content/public/browser/web_contents_observer.h"
17 #include "content/public/test/browser_test_utils.h"
18 #include "content/public/test/content_browser_test_utils.h"
19 #include "content/public/test/test_utils.h"
20 #include "net/dns/mock_host_resolver.h"
21 #include "net/test/embedded_test_server/embedded_test_server.h"
24 class ChromeSitePerProcessTest
: public InProcessBrowserTest
{
26 ChromeSitePerProcessTest() {}
27 ~ChromeSitePerProcessTest() override
{}
29 void SetUpCommandLine(base::CommandLine
* command_line
) override
{
30 content::IsolateAllSitesForTesting(command_line
);
33 void SetUpOnMainThread() override
{
34 host_resolver()->AddRule("*", "127.0.0.1");
35 ASSERT_TRUE(embedded_test_server()->InitializeAndWaitUntilReady());
36 content::SetupCrossSiteRedirector(embedded_test_server());
40 DISALLOW_COPY_AND_ASSIGN(ChromeSitePerProcessTest
);
43 // Verify that browser shutdown path works correctly when there's a
44 // RenderFrameProxyHost for a child frame.
45 IN_PROC_BROWSER_TEST_F(ChromeSitePerProcessTest
, RenderFrameProxyHostShutdown
) {
46 GURL
main_url(embedded_test_server()->GetURL(
48 "/frame_tree/page_with_two_frames_remote_and_local.html"));
49 ui_test_utils::NavigateToURL(browser(), main_url
);
52 // Verify that origin replication allows JS access to localStorage, database,
53 // and FileSystem APIs. These features involve a check on the
54 // WebSecurityOrigin of the topmost WebFrame in ContentSettingsObserver, and
55 // this test ensures this check works when the top frame is remote.
56 IN_PROC_BROWSER_TEST_F(ChromeSitePerProcessTest
,
57 OriginReplicationAllowsAccessToStorage
) {
58 // Navigate to a page with a same-site iframe.
59 GURL
main_url(embedded_test_server()->GetURL("a.com", "/iframe.html"));
60 ui_test_utils::NavigateToURL(browser(), main_url
);
62 // Navigate subframe cross-site.
63 content::WebContents
* active_web_contents
=
64 browser()->tab_strip_model()->GetActiveWebContents();
65 GURL
cross_site_url(embedded_test_server()->GetURL("b.com", "/title2.html"));
66 EXPECT_TRUE(NavigateIframeToURL(active_web_contents
, "test", cross_site_url
));
68 // Find the subframe's RenderFrameHost.
69 content::RenderFrameHost
* frame_host
= FrameMatchingPredicate(
71 base::Bind(&content::FrameHasSourceUrl
, cross_site_url
));
72 ASSERT_TRUE(frame_host
);
73 EXPECT_TRUE(frame_host
->IsCrossProcessSubframe());
75 // Check that JS storage APIs can be accessed successfully.
77 content::ExecuteScript(frame_host
, "localStorage['foo'] = 'bar'"));
79 EXPECT_TRUE(ExecuteScriptAndExtractString(
80 frame_host
, "window.domAutomationController.send(localStorage['foo']);",
82 EXPECT_EQ(result
, "bar");
83 bool is_object_created
= false;
84 EXPECT_TRUE(ExecuteScriptAndExtractBool(
86 "window.domAutomationController.send(!!indexedDB.open('testdb', 2));",
88 EXPECT_TRUE(is_object_created
);
89 is_object_created
= false;
90 EXPECT_TRUE(ExecuteScriptAndExtractBool(
92 "window.domAutomationController.send(!!openDatabase("
93 "'foodb', '1.0', 'Test DB', 1024));",
95 EXPECT_TRUE(is_object_created
);
96 EXPECT_TRUE(ExecuteScript(frame_host
,
97 "window.webkitRequestFileSystem("
98 "window.TEMPORARY, 1024, function() {});"));