1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
9 #include "base/command_line.h"
10 #include "base/files/file_path.h"
11 #include "base/memory/ref_counted_memory.h"
12 #include "base/memory/scoped_vector.h"
13 #include "base/memory/weak_ptr.h"
14 #include "base/path_service.h"
15 #include "base/prefs/pref_service.h"
16 #include "base/run_loop.h"
17 #include "base/strings/string_util.h"
18 #include "base/strings/stringprintf.h"
19 #include "base/strings/utf_string_conversions.h"
20 #include "base/test/histogram_tester.h"
21 #include "base/test/test_timeouts.h"
22 #include "base/values.h"
23 #include "chrome/browser/browsing_data/browsing_data_helper.h"
24 #include "chrome/browser/browsing_data/browsing_data_remover.h"
25 #include "chrome/browser/browsing_data/browsing_data_remover_test_util.h"
26 #include "chrome/browser/chrome_content_browser_client.h"
27 #include "chrome/browser/chrome_notification_types.h"
28 #include "chrome/browser/content_settings/host_content_settings_map.h"
29 #include "chrome/browser/extensions/api/web_navigation/web_navigation_api.h"
30 #include "chrome/browser/extensions/extension_apitest.h"
31 #include "chrome/browser/external_protocol/external_protocol_handler.h"
32 #include "chrome/browser/favicon/favicon_tab_helper.h"
33 #include "chrome/browser/net/prediction_options.h"
34 #include "chrome/browser/predictors/autocomplete_action_predictor.h"
35 #include "chrome/browser/predictors/autocomplete_action_predictor_factory.h"
36 #include "chrome/browser/prerender/prerender_contents.h"
37 #include "chrome/browser/prerender/prerender_field_trial.h"
38 #include "chrome/browser/prerender/prerender_handle.h"
39 #include "chrome/browser/prerender/prerender_link_manager.h"
40 #include "chrome/browser/prerender/prerender_link_manager_factory.h"
41 #include "chrome/browser/prerender/prerender_manager.h"
42 #include "chrome/browser/prerender/prerender_manager_factory.h"
43 #include "chrome/browser/profiles/profile.h"
44 #include "chrome/browser/profiles/profile_io_data.h"
45 #include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
46 #include "chrome/browser/safe_browsing/database_manager.h"
47 #include "chrome/browser/safe_browsing/safe_browsing_service.h"
48 #include "chrome/browser/safe_browsing/safe_browsing_util.h"
49 #include "chrome/browser/task_manager/task_manager.h"
50 #include "chrome/browser/task_manager/task_manager_browsertest_util.h"
51 #include "chrome/browser/ui/browser.h"
52 #include "chrome/browser/ui/browser_commands.h"
53 #include "chrome/browser/ui/browser_finder.h"
54 #include "chrome/browser/ui/browser_navigator.h"
55 #include "chrome/browser/ui/browser_window.h"
56 #include "chrome/browser/ui/location_bar/location_bar.h"
57 #include "chrome/browser/ui/omnibox/omnibox_edit_model.h"
58 #include "chrome/browser/ui/omnibox/omnibox_popup_model.h"
59 #include "chrome/browser/ui/omnibox/omnibox_view.h"
60 #include "chrome/browser/ui/tabs/tab_strip_model.h"
61 #include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
62 #include "chrome/common/chrome_paths.h"
63 #include "chrome/common/chrome_switches.h"
64 #include "chrome/common/extensions/extension_constants.h"
65 #include "chrome/common/extensions/manifest_handlers/mime_types_handler.h"
66 #include "chrome/common/pref_names.h"
67 #include "chrome/grit/generated_resources.h"
68 #include "chrome/test/base/in_process_browser_test.h"
69 #include "chrome/test/base/test_switches.h"
70 #include "chrome/test/base/ui_test_utils.h"
71 #include "components/variations/entropy_provider.h"
72 #include "components/variations/variations_associated_data.h"
73 #include "content/public/browser/browser_message_filter.h"
74 #include "content/public/browser/devtools_agent_host.h"
75 #include "content/public/browser/navigation_controller.h"
76 #include "content/public/browser/navigation_entry.h"
77 #include "content/public/browser/notification_service.h"
78 #include "content/public/browser/render_frame_host.h"
79 #include "content/public/browser/render_process_host.h"
80 #include "content/public/browser/render_view_host.h"
81 #include "content/public/browser/site_instance.h"
82 #include "content/public/browser/web_contents.h"
83 #include "content/public/browser/web_contents_observer.h"
84 #include "content/public/common/url_constants.h"
85 #include "content/public/test/browser_test_utils.h"
86 #include "content/public/test/test_navigation_observer.h"
87 #include "content/public/test/test_utils.h"
88 #include "extensions/common/extension_urls.h"
89 #include "extensions/common/switches.h"
90 #include "extensions/test/result_catcher.h"
91 #include "net/base/escape.h"
92 #include "net/cert/x509_certificate.h"
93 #include "net/dns/mock_host_resolver.h"
94 #include "net/ssl/client_cert_store.h"
95 #include "net/ssl/ssl_cert_request_info.h"
96 #include "net/test/url_request/url_request_mock_http_job.h"
97 #include "net/url_request/url_request_context.h"
98 #include "net/url_request/url_request_context_getter.h"
99 #include "net/url_request/url_request_filter.h"
100 #include "net/url_request/url_request_interceptor.h"
101 #include "net/url_request/url_request_job.h"
102 #include "ui/base/l10n/l10n_util.h"
103 #include "url/gurl.h"
105 using chrome_browser_net::NetworkPredictionOptions
;
106 using content::BrowserThread
;
107 using content::DevToolsAgentHost
;
108 using content::NavigationController
;
109 using content::OpenURLParams
;
110 using content::Referrer
;
111 using content::RenderFrameHost
;
112 using content::RenderViewHost
;
113 using content::RenderWidgetHost
;
114 using content::TestNavigationObserver
;
115 using content::WebContents
;
116 using content::WebContentsObserver
;
117 using net::NetworkChangeNotifier
;
118 using task_manager::browsertest_util::WaitForTaskManagerRows
;
120 // Prerender tests work as follows:
122 // A page with a prefetch link to the test page is loaded. Once prerendered,
123 // its Javascript function DidPrerenderPass() is called, which returns true if
124 // the page behaves as expected when prerendered.
126 // The prerendered page is then displayed on a tab. The Javascript function
127 // DidDisplayPass() is called, and returns true if the page behaved as it
128 // should while being displayed.
130 namespace prerender
{
134 class MockNetworkChangeNotifierWIFI
: public NetworkChangeNotifier
{
136 virtual ConnectionType
GetCurrentConnectionType() const override
{
137 return NetworkChangeNotifier::CONNECTION_WIFI
;
141 class MockNetworkChangeNotifier4G
: public NetworkChangeNotifier
{
143 virtual ConnectionType
GetCurrentConnectionType() const override
{
144 return NetworkChangeNotifier::CONNECTION_4G
;
148 // Constants used in the test HTML files.
149 const char* kReadyTitle
= "READY";
150 const char* kPassTitle
= "PASS";
152 std::string
CreateClientRedirect(const std::string
& dest_url
) {
153 const char* const kClientRedirectBase
= "client-redirect?";
154 return kClientRedirectBase
+ net::EscapeQueryParamValue(dest_url
, false);
157 std::string
CreateServerRedirect(const std::string
& dest_url
) {
158 const char* const kServerRedirectBase
= "server-redirect?";
159 return kServerRedirectBase
+ net::EscapeQueryParamValue(dest_url
, false);
162 // Clears the specified data using BrowsingDataRemover.
163 void ClearBrowsingData(Browser
* browser
, int remove_mask
) {
164 BrowsingDataRemover
* remover
=
165 BrowsingDataRemover::CreateForUnboundedRange(browser
->profile());
166 BrowsingDataRemoverCompletionObserver
observer(remover
);
167 remover
->Remove(remove_mask
, BrowsingDataHelper::UNPROTECTED_WEB
);
168 observer
.BlockUntilCompletion();
169 // BrowsingDataRemover deletes itself.
172 // Returns true if the prerender is expected to abort on its own, before
173 // attempting to swap it.
174 bool ShouldAbortPrerenderBeforeSwap(FinalStatus status
) {
176 case FINAL_STATUS_USED
:
177 case FINAL_STATUS_WINDOW_OPENER
:
178 case FINAL_STATUS_APP_TERMINATING
:
179 case FINAL_STATUS_PROFILE_DESTROYED
:
180 case FINAL_STATUS_CACHE_OR_HISTORY_CLEARED
:
181 // We'll crash the renderer after it's loaded.
182 case FINAL_STATUS_RENDERER_CRASHED
:
183 case FINAL_STATUS_CANCELLED
:
184 case FINAL_STATUS_DEVTOOLS_ATTACHED
:
185 case FINAL_STATUS_PAGE_BEING_CAPTURED
:
186 case FINAL_STATUS_NAVIGATION_UNCOMMITTED
:
187 case FINAL_STATUS_WOULD_HAVE_BEEN_USED
:
188 case FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE
:
195 // Convenience function to wait for a title. Handles the case when the
196 // WebContents already has the expected title.
197 void WaitForASCIITitle(WebContents
* web_contents
,
198 const char* expected_title_ascii
) {
199 base::string16 expected_title
= base::ASCIIToUTF16(expected_title_ascii
);
200 if (web_contents
->GetTitle() == expected_title
)
202 content::TitleWatcher
title_watcher(web_contents
, expected_title
);
203 EXPECT_EQ(expected_title
, title_watcher
.WaitAndGetTitle());
206 // Waits for the destruction of a RenderProcessHost's IPC channel.
207 // Used to make sure the PrerenderLinkManager's OnChannelClosed function has
208 // been called, before checking its state.
209 class ChannelDestructionWatcher
{
211 ChannelDestructionWatcher() : channel_destroyed_(false) {
214 ~ChannelDestructionWatcher() {
217 void WatchChannel(content::RenderProcessHost
* host
) {
218 host
->AddFilter(new DestructionMessageFilter(this));
221 void WaitForChannelClose() {
223 EXPECT_TRUE(channel_destroyed_
);
227 // When destroyed, calls ChannelDestructionWatcher::OnChannelDestroyed.
228 // Ignores all messages.
229 class DestructionMessageFilter
: public content::BrowserMessageFilter
{
231 explicit DestructionMessageFilter(ChannelDestructionWatcher
* watcher
)
232 : BrowserMessageFilter(0),
237 virtual ~DestructionMessageFilter() {
238 content::BrowserThread::PostTask(
239 content::BrowserThread::UI
, FROM_HERE
,
240 base::Bind(&ChannelDestructionWatcher::OnChannelDestroyed
,
241 base::Unretained(watcher_
)));
244 virtual bool OnMessageReceived(const IPC::Message
& message
) override
{
248 ChannelDestructionWatcher
* watcher_
;
250 DISALLOW_COPY_AND_ASSIGN(DestructionMessageFilter
);
253 void OnChannelDestroyed() {
254 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI
));
256 EXPECT_FALSE(channel_destroyed_
);
257 channel_destroyed_
= true;
261 bool channel_destroyed_
;
262 base::RunLoop run_loop_
;
264 DISALLOW_COPY_AND_ASSIGN(ChannelDestructionWatcher
);
267 // A navigation observer to wait on either a new load or a swap of a
268 // WebContents. On swap, if the new WebContents is still loading, wait for that
269 // load to complete as well. Note that the load must begin after the observer is
271 class NavigationOrSwapObserver
: public WebContentsObserver
,
272 public TabStripModelObserver
{
274 // Waits for either a new load or a swap of |tab_strip_model|'s active
276 NavigationOrSwapObserver(TabStripModel
* tab_strip_model
,
277 WebContents
* web_contents
)
278 : WebContentsObserver(web_contents
),
279 tab_strip_model_(tab_strip_model
),
280 did_start_loading_(false),
281 number_of_loads_(1) {
282 CHECK_NE(TabStripModel::kNoTab
,
283 tab_strip_model
->GetIndexOfWebContents(web_contents
));
284 tab_strip_model_
->AddObserver(this);
287 // Waits for either |number_of_loads| loads or a swap of |tab_strip_model|'s
288 // active WebContents.
289 NavigationOrSwapObserver(TabStripModel
* tab_strip_model
,
290 WebContents
* web_contents
,
292 : WebContentsObserver(web_contents
),
293 tab_strip_model_(tab_strip_model
),
294 did_start_loading_(false),
295 number_of_loads_(number_of_loads
) {
296 CHECK_NE(TabStripModel::kNoTab
,
297 tab_strip_model
->GetIndexOfWebContents(web_contents
));
298 tab_strip_model_
->AddObserver(this);
301 virtual ~NavigationOrSwapObserver() {
302 tab_strip_model_
->RemoveObserver(this);
305 void set_did_start_loading() {
306 did_start_loading_
= true;
313 // WebContentsObserver implementation:
314 virtual void DidStartLoading(RenderViewHost
* render_view_host
) override
{
315 did_start_loading_
= true;
317 virtual void DidStopLoading(RenderViewHost
* render_view_host
) override
{
318 if (!did_start_loading_
)
321 if (number_of_loads_
== 0)
325 // TabStripModelObserver implementation:
326 virtual void TabReplacedAt(TabStripModel
* tab_strip_model
,
327 WebContents
* old_contents
,
328 WebContents
* new_contents
,
329 int index
) override
{
330 if (old_contents
!= web_contents())
332 // Switch to observing the new WebContents.
333 Observe(new_contents
);
334 if (new_contents
->IsLoading()) {
335 // If the new WebContents is still loading, wait for it to complete. Only
336 // one load post-swap is supported.
337 did_start_loading_
= true;
338 number_of_loads_
= 1;
345 TabStripModel
* tab_strip_model_
;
346 bool did_start_loading_
;
347 int number_of_loads_
;
351 // Waits for a new tab to open and a navigation or swap in it.
352 class NewTabNavigationOrSwapObserver
{
354 NewTabNavigationOrSwapObserver()
356 chrome::NOTIFICATION_TAB_ADDED
,
357 base::Bind(&NewTabNavigationOrSwapObserver::OnTabAdded
,
358 base::Unretained(this))) {
359 // Watch for NOTIFICATION_TAB_ADDED. Add a callback so that the
360 // NavigationOrSwapObserver can be attached synchronously and no events are
365 new_tab_observer_
.Wait();
366 swap_observer_
->Wait();
369 bool OnTabAdded(const content::NotificationSource
& source
,
370 const content::NotificationDetails
& details
) {
373 WebContents
* new_tab
= content::Details
<WebContents
>(details
).ptr();
374 // Get the TabStripModel. Assume this is attached to a Browser.
375 TabStripModel
* tab_strip_model
=
376 static_cast<Browser
*>(new_tab
->GetDelegate())->tab_strip_model();
377 swap_observer_
.reset(new NavigationOrSwapObserver(tab_strip_model
,
379 swap_observer_
->set_did_start_loading();
384 content::WindowedNotificationObserver new_tab_observer_
;
385 scoped_ptr
<NavigationOrSwapObserver
> swap_observer_
;
388 // PrerenderContents that stops the UI message loop on DidStopLoading().
389 class TestPrerenderContents
: public PrerenderContents
{
391 TestPrerenderContents(
392 PrerenderManager
* prerender_manager
,
395 const content::Referrer
& referrer
,
397 FinalStatus expected_final_status
)
398 : PrerenderContents(prerender_manager
, profile
, url
,
399 referrer
, origin
, PrerenderManager::kNoExperiment
),
400 expected_final_status_(expected_final_status
),
401 new_render_view_host_(NULL
),
404 should_be_shown_(expected_final_status
== FINAL_STATUS_USED
),
405 skip_final_checks_(false) {
408 virtual ~TestPrerenderContents() {
409 if (skip_final_checks_
)
412 if (expected_final_status_
== FINAL_STATUS_MAX
) {
413 EXPECT_EQ(MATCH_COMPLETE_REPLACEMENT
, match_complete_status());
415 EXPECT_EQ(expected_final_status_
, final_status()) <<
416 " when testing URL " << prerender_url().path() <<
417 " (Expected: " << NameFromFinalStatus(expected_final_status_
) <<
418 ", Actual: " << NameFromFinalStatus(final_status()) << ")";
420 // Prerendering RenderViewHosts should be hidden before the first
421 // navigation, so this should be happen for every PrerenderContents for
422 // which a RenderViewHost is created, regardless of whether or not it's
424 if (new_render_view_host_
)
425 EXPECT_TRUE(was_hidden_
);
427 // A used PrerenderContents will only be destroyed when we swap out
428 // WebContents, at the end of a navigation caused by a call to
429 // NavigateToURLImpl().
430 if (final_status() == FINAL_STATUS_USED
)
431 EXPECT_TRUE(new_render_view_host_
);
433 EXPECT_EQ(should_be_shown_
, was_shown_
);
436 virtual void RenderProcessGone(base::TerminationStatus status
) override
{
437 // On quit, it's possible to end up here when render processes are closed
438 // before the PrerenderManager is destroyed. As a result, it's possible to
439 // get either FINAL_STATUS_APP_TERMINATING or FINAL_STATUS_RENDERER_CRASHED
442 // It's also possible for this to be called after we've been notified of
443 // app termination, but before we've been deleted, which is why the second
445 if (expected_final_status_
== FINAL_STATUS_APP_TERMINATING
&&
446 final_status() != expected_final_status_
) {
447 expected_final_status_
= FINAL_STATUS_RENDERER_CRASHED
;
450 PrerenderContents::RenderProcessGone(status
);
453 virtual bool CheckURL(const GURL
& url
) override
{
454 // Prevent FINAL_STATUS_UNSUPPORTED_SCHEME when navigating to about:crash in
455 // the PrerenderRendererCrash test.
456 if (url
.spec() != content::kChromeUICrashURL
)
457 return PrerenderContents::CheckURL(url
);
461 // For tests that open the prerender in a new background tab, the RenderView
462 // will not have been made visible when the PrerenderContents is destroyed
463 // even though it is used.
464 void set_should_be_shown(bool value
) { should_be_shown_
= value
; }
466 // For tests which do not know whether the prerender will be used.
467 void set_skip_final_checks(bool value
) { skip_final_checks_
= value
; }
469 FinalStatus
expected_final_status() const { return expected_final_status_
; }
472 virtual void OnRenderViewHostCreated(
473 RenderViewHost
* new_render_view_host
) override
{
474 // Used to make sure the RenderViewHost is hidden and, if used,
475 // subsequently shown.
476 notification_registrar().Add(
478 content::NOTIFICATION_RENDER_WIDGET_VISIBILITY_CHANGED
,
479 content::Source
<RenderWidgetHost
>(new_render_view_host
));
481 new_render_view_host_
= new_render_view_host
;
483 PrerenderContents::OnRenderViewHostCreated(new_render_view_host
);
486 virtual void Observe(int type
,
487 const content::NotificationSource
& source
,
488 const content::NotificationDetails
& details
) override
{
490 content::NOTIFICATION_RENDER_WIDGET_VISIBILITY_CHANGED
) {
491 EXPECT_EQ(new_render_view_host_
,
492 content::Source
<RenderWidgetHost
>(source
).ptr());
493 bool is_visible
= *content::Details
<bool>(details
).ptr();
497 } else if (is_visible
&& was_hidden_
) {
498 // Once hidden, a prerendered RenderViewHost should only be shown after
499 // being removed from the PrerenderContents for display.
500 EXPECT_FALSE(GetRenderViewHost());
505 PrerenderContents::Observe(type
, source
, details
);
508 FinalStatus expected_final_status_
;
510 // The RenderViewHost created for the prerender, if any.
511 RenderViewHost
* new_render_view_host_
;
512 // Set to true when the prerendering RenderWidget is hidden.
514 // Set to true when the prerendering RenderWidget is shown, after having been
517 // Expected final value of was_shown_. Defaults to true for
518 // FINAL_STATUS_USED, and false otherwise.
519 bool should_be_shown_
;
520 // If true, |expected_final_status_| and other shutdown checks are skipped.
521 bool skip_final_checks_
;
524 // A handle to a TestPrerenderContents whose lifetime is under the caller's
525 // control. A PrerenderContents may be destroyed at any point. This allows
526 // tracking the final status, etc.
527 class TestPrerender
: public PrerenderContents::Observer
,
528 public base::SupportsWeakPtr
<TestPrerender
> {
533 expected_number_of_loads_(0) {
535 virtual ~TestPrerender() {
537 contents_
->RemoveObserver(this);
540 TestPrerenderContents
* contents() const { return contents_
; }
541 int number_of_loads() const { return number_of_loads_
; }
543 void WaitForCreate() { create_loop_
.Run(); }
544 void WaitForStart() { start_loop_
.Run(); }
545 void WaitForStop() { stop_loop_
.Run(); }
547 // Waits for |number_of_loads()| to be at least |expected_number_of_loads| OR
548 // for the prerender to stop running (just to avoid a timeout if the prerender
549 // dies). Note: this does not assert equality on the number of loads; the
550 // caller must do it instead.
551 void WaitForLoads(int expected_number_of_loads
) {
552 DCHECK(!load_waiter_
);
553 DCHECK(!expected_number_of_loads_
);
554 if (number_of_loads_
< expected_number_of_loads
) {
555 load_waiter_
.reset(new base::RunLoop
);
556 expected_number_of_loads_
= expected_number_of_loads
;
558 load_waiter_
.reset();
559 expected_number_of_loads_
= 0;
561 EXPECT_LE(expected_number_of_loads
, number_of_loads_
);
564 void OnPrerenderCreated(TestPrerenderContents
* contents
) {
566 contents_
= contents
;
567 contents_
->AddObserver(this);
571 // PrerenderContents::Observer implementation:
572 virtual void OnPrerenderStart(PrerenderContents
* contents
) override
{
576 virtual void OnPrerenderStopLoading(PrerenderContents
* contents
) override
{
578 if (load_waiter_
&& number_of_loads_
>= expected_number_of_loads_
)
579 load_waiter_
->Quit();
582 virtual void OnPrerenderStop(PrerenderContents
* contents
) override
{
586 // If there is a WaitForLoads call and it has yet to see the expected number
587 // of loads, stop the loop so the test fails instead of timing out.
589 load_waiter_
->Quit();
592 virtual void OnPrerenderCreatedMatchCompleteReplacement(
593 PrerenderContents
* contents
, PrerenderContents
* replacement
) override
{
597 TestPrerenderContents
* contents_
;
598 int number_of_loads_
;
600 int expected_number_of_loads_
;
601 scoped_ptr
<base::RunLoop
> load_waiter_
;
603 base::RunLoop create_loop_
;
604 base::RunLoop start_loop_
;
605 base::RunLoop stop_loop_
;
607 DISALLOW_COPY_AND_ASSIGN(TestPrerender
);
610 // PrerenderManager that uses TestPrerenderContents.
611 class TestPrerenderContentsFactory
: public PrerenderContents::Factory
{
613 TestPrerenderContentsFactory() {}
615 virtual ~TestPrerenderContentsFactory() {
616 EXPECT_TRUE(expected_contents_queue_
.empty());
619 scoped_ptr
<TestPrerender
> ExpectPrerenderContents(FinalStatus final_status
) {
620 scoped_ptr
<TestPrerender
> handle(new TestPrerender());
621 expected_contents_queue_
.push_back(
622 ExpectedContents(final_status
, handle
->AsWeakPtr()));
623 return handle
.Pass();
626 virtual PrerenderContents
* CreatePrerenderContents(
627 PrerenderManager
* prerender_manager
,
630 const content::Referrer
& referrer
,
632 uint8 experiment_id
) override
{
633 ExpectedContents expected
;
634 if (!expected_contents_queue_
.empty()) {
635 expected
= expected_contents_queue_
.front();
636 expected_contents_queue_
.pop_front();
638 VLOG(1) << "Creating prerender contents for " << url
.path() <<
639 " with expected final status " << expected
.final_status
;
640 VLOG(1) << expected_contents_queue_
.size() << " left in the queue.";
641 TestPrerenderContents
* contents
=
642 new TestPrerenderContents(prerender_manager
,
643 profile
, url
, referrer
, origin
,
644 expected
.final_status
);
646 expected
.handle
->OnPrerenderCreated(contents
);
651 struct ExpectedContents
{
652 ExpectedContents() : final_status(FINAL_STATUS_MAX
) { }
653 ExpectedContents(FinalStatus final_status
,
654 const base::WeakPtr
<TestPrerender
>& handle
)
655 : final_status(final_status
),
659 FinalStatus final_status
;
660 base::WeakPtr
<TestPrerender
> handle
;
663 std::deque
<ExpectedContents
> expected_contents_queue_
;
666 #if defined(FULL_SAFE_BROWSING)
667 // A SafeBrowsingDatabaseManager implementation that returns a fixed result for
669 class FakeSafeBrowsingDatabaseManager
: public SafeBrowsingDatabaseManager
{
671 explicit FakeSafeBrowsingDatabaseManager(SafeBrowsingService
* service
)
672 : SafeBrowsingDatabaseManager(service
),
673 threat_type_(SB_THREAT_TYPE_SAFE
) { }
675 // Called on the IO thread to check if the given url is safe or not. If we
676 // can synchronously determine that the url is safe, CheckUrl returns true.
677 // Otherwise it returns false, and "client" is called asynchronously with the
678 // result when it is ready.
679 // Returns true, indicating a SAFE result, unless the URL is the fixed URL
680 // specified by the user, and the user-specified result is not SAFE
681 // (in which that result will be communicated back via a call into the
682 // client, and false will be returned).
683 // Overrides SafeBrowsingService::CheckBrowseUrl.
684 virtual bool CheckBrowseUrl(const GURL
& gurl
, Client
* client
) override
{
685 if (gurl
!= url_
|| threat_type_
== SB_THREAT_TYPE_SAFE
)
688 BrowserThread::PostTask(
689 BrowserThread::IO
, FROM_HERE
,
690 base::Bind(&FakeSafeBrowsingDatabaseManager::OnCheckBrowseURLDone
,
691 this, gurl
, client
));
695 void SetThreatTypeForUrl(const GURL
& url
, SBThreatType threat_type
) {
697 threat_type_
= threat_type
;
701 virtual ~FakeSafeBrowsingDatabaseManager() {}
703 void OnCheckBrowseURLDone(const GURL
& gurl
, Client
* client
) {
704 std::vector
<SBThreatType
> expected_threats
;
705 expected_threats
.push_back(SB_THREAT_TYPE_URL_MALWARE
);
706 expected_threats
.push_back(SB_THREAT_TYPE_URL_PHISHING
);
707 SafeBrowsingDatabaseManager::SafeBrowsingCheck
sb_check(
708 std::vector
<GURL
>(1, gurl
),
709 std::vector
<SBFullHash
>(),
711 safe_browsing_util::MALWARE
,
713 sb_check
.url_results
[0] = threat_type_
;
714 client
->OnSafeBrowsingResult(sb_check
);
718 SBThreatType threat_type_
;
719 DISALLOW_COPY_AND_ASSIGN(FakeSafeBrowsingDatabaseManager
);
722 class FakeSafeBrowsingService
: public SafeBrowsingService
{
724 FakeSafeBrowsingService() { }
726 // Returned pointer has the same lifespan as the database_manager_ refcounted
728 FakeSafeBrowsingDatabaseManager
* fake_database_manager() {
729 return fake_database_manager_
;
733 virtual ~FakeSafeBrowsingService() { }
735 virtual SafeBrowsingDatabaseManager
* CreateDatabaseManager() override
{
736 fake_database_manager_
= new FakeSafeBrowsingDatabaseManager(this);
737 return fake_database_manager_
;
741 FakeSafeBrowsingDatabaseManager
* fake_database_manager_
;
743 DISALLOW_COPY_AND_ASSIGN(FakeSafeBrowsingService
);
746 // Factory that creates FakeSafeBrowsingService instances.
747 class TestSafeBrowsingServiceFactory
: public SafeBrowsingServiceFactory
{
749 TestSafeBrowsingServiceFactory() :
750 most_recent_service_(NULL
) { }
751 virtual ~TestSafeBrowsingServiceFactory() { }
753 virtual SafeBrowsingService
* CreateSafeBrowsingService() override
{
754 most_recent_service_
= new FakeSafeBrowsingService();
755 return most_recent_service_
;
758 FakeSafeBrowsingService
* most_recent_service() const {
759 return most_recent_service_
;
763 FakeSafeBrowsingService
* most_recent_service_
;
767 class FakeDevToolsClient
: public content::DevToolsAgentHostClient
{
769 FakeDevToolsClient() {}
770 virtual ~FakeDevToolsClient() {}
771 virtual void DispatchProtocolMessage(
772 DevToolsAgentHost
* agent_host
, const std::string
& message
) override
{}
773 virtual void AgentHostClosed(
774 DevToolsAgentHost
* agent_host
, bool replaced
) override
{}
777 class RestorePrerenderMode
{
779 RestorePrerenderMode() : prev_mode_(PrerenderManager::GetMode()) {
782 ~RestorePrerenderMode() { PrerenderManager::SetMode(prev_mode_
); }
784 PrerenderManager::PrerenderManagerMode prev_mode_
;
787 // URLRequestJob (and associated handler) which hangs.
788 class HangingURLRequestJob
: public net::URLRequestJob
{
790 HangingURLRequestJob(net::URLRequest
* request
,
791 net::NetworkDelegate
* network_delegate
)
792 : net::URLRequestJob(request
, network_delegate
) {
795 virtual void Start() override
{}
798 virtual ~HangingURLRequestJob() {}
801 class HangingFirstRequestInterceptor
: public net::URLRequestInterceptor
{
803 HangingFirstRequestInterceptor(const base::FilePath
& file
,
804 base::Closure callback
)
809 virtual ~HangingFirstRequestInterceptor() {}
811 virtual net::URLRequestJob
* MaybeInterceptRequest(
812 net::URLRequest
* request
,
813 net::NetworkDelegate
* network_delegate
) const override
{
816 if (!callback_
.is_null()) {
817 BrowserThread::PostTask(
818 BrowserThread::UI
, FROM_HERE
, callback_
);
820 return new HangingURLRequestJob(request
, network_delegate
);
822 return new net::URLRequestMockHTTPJob(
826 BrowserThread::GetBlockingPool()->GetTaskRunnerWithShutdownBehavior(
827 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN
));
831 base::FilePath file_
;
832 base::Closure callback_
;
833 mutable bool first_run_
;
836 // Makes |url| never respond on the first load, and then with the contents of
837 // |file| afterwards. When the first load has been scheduled, runs |callback| on
839 void CreateHangingFirstRequestInterceptorOnIO(
840 const GURL
& url
, const base::FilePath
& file
, base::Closure callback
) {
841 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
842 scoped_ptr
<net::URLRequestInterceptor
> never_respond_handler(
843 new HangingFirstRequestInterceptor(file
, callback
));
844 net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
845 url
, never_respond_handler
.Pass());
848 // Wrapper over URLRequestMockHTTPJob that exposes extra callbacks.
849 class MockHTTPJob
: public net::URLRequestMockHTTPJob
{
851 MockHTTPJob(net::URLRequest
* request
,
852 net::NetworkDelegate
* delegate
,
853 const base::FilePath
& file
)
854 : net::URLRequestMockHTTPJob(
858 BrowserThread::GetBlockingPool()->GetTaskRunnerWithShutdownBehavior(
859 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN
)) {}
861 void set_start_callback(const base::Closure
& start_callback
) {
862 start_callback_
= start_callback
;
865 virtual void Start() override
{
866 if (!start_callback_
.is_null())
867 start_callback_
.Run();
868 net::URLRequestMockHTTPJob::Start();
872 virtual ~MockHTTPJob() {}
874 base::Closure start_callback_
;
877 // Dummy counter class to live on the UI thread for counting requests.
878 class RequestCounter
: public base::SupportsWeakPtr
<RequestCounter
> {
880 RequestCounter() : count_(0), expected_count_(-1) {}
881 int count() const { return count_
; }
883 void RequestStarted() {
885 if (loop_
&& count_
== expected_count_
)
889 void WaitForCount(int expected_count
) {
891 ASSERT_EQ(-1, expected_count_
);
892 if (count_
< expected_count
) {
893 expected_count_
= expected_count
;
894 loop_
.reset(new base::RunLoop
);
896 expected_count_
= -1;
900 EXPECT_EQ(expected_count
, count_
);
905 scoped_ptr
<base::RunLoop
> loop_
;
908 // Protocol handler which counts the number of requests that start.
909 class CountingInterceptor
: public net::URLRequestInterceptor
{
911 CountingInterceptor(const base::FilePath
& file
,
912 const base::WeakPtr
<RequestCounter
>& counter
)
915 weak_factory_(this) {
917 virtual ~CountingInterceptor() {}
919 virtual net::URLRequestJob
* MaybeInterceptRequest(
920 net::URLRequest
* request
,
921 net::NetworkDelegate
* network_delegate
) const override
{
922 MockHTTPJob
* job
= new MockHTTPJob(request
, network_delegate
, file_
);
923 job
->set_start_callback(base::Bind(&CountingInterceptor::RequestStarted
,
924 weak_factory_
.GetWeakPtr()));
928 void RequestStarted() {
929 BrowserThread::PostTask(
930 BrowserThread::UI
, FROM_HERE
,
931 base::Bind(&RequestCounter::RequestStarted
, counter_
));
935 base::FilePath file_
;
936 base::WeakPtr
<RequestCounter
> counter_
;
937 mutable base::WeakPtrFactory
<CountingInterceptor
> weak_factory_
;
940 // Makes |url| respond to requests with the contents of |file|, counting the
941 // number that start in |counter|.
942 void CreateCountingInterceptorOnIO(
944 const base::FilePath
& file
,
945 const base::WeakPtr
<RequestCounter
>& counter
) {
946 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
947 scoped_ptr
<net::URLRequestInterceptor
> request_interceptor(
948 new CountingInterceptor(file
, counter
));
949 net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
950 url
, request_interceptor
.Pass());
953 // Makes |url| respond to requests with the contents of |file|.
954 void CreateMockInterceptorOnIO(const GURL
& url
, const base::FilePath
& file
) {
955 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
956 net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
958 net::URLRequestMockHTTPJob::CreateInterceptorForSingleFile(
959 file
, BrowserThread::GetBlockingPool()));
962 // A ContentBrowserClient that cancels all prerenderers on OpenURL.
963 class TestContentBrowserClient
: public chrome::ChromeContentBrowserClient
{
965 TestContentBrowserClient() {}
966 virtual ~TestContentBrowserClient() {}
968 // chrome::ChromeContentBrowserClient implementation.
969 virtual bool ShouldAllowOpenURL(content::SiteInstance
* site_instance
,
970 const GURL
& url
) override
{
971 PrerenderManagerFactory::GetForProfile(
972 Profile::FromBrowserContext(site_instance
->GetBrowserContext()))
973 ->CancelAllPrerenders();
974 return chrome::ChromeContentBrowserClient::ShouldAllowOpenURL(site_instance
,
979 DISALLOW_COPY_AND_ASSIGN(TestContentBrowserClient
);
982 // A ContentBrowserClient that forces cross-process navigations.
983 class SwapProcessesContentBrowserClient
984 : public chrome::ChromeContentBrowserClient
{
986 SwapProcessesContentBrowserClient() {}
987 virtual ~SwapProcessesContentBrowserClient() {}
989 // chrome::ChromeContentBrowserClient implementation.
990 virtual bool ShouldSwapProcessesForRedirect(
991 content::ResourceContext
* resource_context
,
992 const GURL
& current_url
,
993 const GURL
& new_url
) override
{
998 DISALLOW_COPY_AND_ASSIGN(SwapProcessesContentBrowserClient
);
1001 // An ExternalProtocolHandler that blocks everything and asserts it never is
1003 class NeverRunsExternalProtocolHandlerDelegate
1004 : public ExternalProtocolHandler::Delegate
{
1006 // ExternalProtocolHandler::Delegate implementation.
1007 virtual ShellIntegration::DefaultProtocolClientWorker
* CreateShellWorker(
1008 ShellIntegration::DefaultWebClientObserver
* observer
,
1009 const std::string
& protocol
) override
{
1011 // This will crash, but it shouldn't get this far with BlockState::BLOCK
1015 virtual ExternalProtocolHandler::BlockState
GetBlockState(
1016 const std::string
& scheme
) override
{
1017 // Block everything and fail the test.
1019 return ExternalProtocolHandler::BLOCK
;
1021 virtual void BlockRequest() override
{ }
1022 virtual void RunExternalProtocolDialog(const GURL
& url
,
1023 int render_process_host_id
,
1024 int routing_id
) override
{
1027 virtual void LaunchUrlWithoutSecurityCheck(const GURL
& url
) override
{
1030 virtual void FinishedProcessingCheck() override
{
1035 base::FilePath
GetTestPath(const std::string
& file_name
) {
1036 return ui_test_utils::GetTestFilePath(
1037 base::FilePath(FILE_PATH_LITERAL("prerender")),
1038 base::FilePath().AppendASCII(file_name
));
1043 // Many of these tests are flaky. See http://crbug.com/249179
1044 class PrerenderBrowserTest
: virtual public InProcessBrowserTest
{
1046 PrerenderBrowserTest()
1047 : autostart_test_server_(true),
1048 prerender_contents_factory_(NULL
),
1049 #if defined(FULL_SAFE_BROWSING)
1050 safe_browsing_factory_(new TestSafeBrowsingServiceFactory()),
1052 call_javascript_(true),
1053 check_load_events_(true),
1054 loader_path_("files/prerender/prerender_loader.html"),
1055 explicitly_set_browser_(NULL
) {}
1057 virtual ~PrerenderBrowserTest() {}
1059 content::SessionStorageNamespace
* GetSessionStorageNamespace() const {
1060 WebContents
* web_contents
= GetActiveWebContents();
1063 return web_contents
->GetController().GetDefaultSessionStorageNamespace();
1066 virtual void SetUpInProcessBrowserTestFixture() override
{
1067 #if defined(FULL_SAFE_BROWSING)
1068 SafeBrowsingService::RegisterFactory(safe_browsing_factory_
.get());
1072 virtual void TearDownInProcessBrowserTestFixture() override
{
1073 #if defined(FULL_SAFE_BROWSING)
1074 SafeBrowsingService::RegisterFactory(NULL
);
1078 virtual void SetUpCommandLine(CommandLine
* command_line
) override
{
1079 command_line
->AppendSwitchASCII(switches::kPrerenderMode
,
1080 switches::kPrerenderModeSwitchValueEnabled
);
1081 #if defined(OS_MACOSX)
1082 // The plugins directory isn't read by default on the Mac, so it needs to be
1083 // explicitly registered.
1084 base::FilePath app_dir
;
1085 PathService::Get(chrome::DIR_APP
, &app_dir
);
1086 command_line
->AppendSwitchPath(
1087 switches::kExtraPluginDir
,
1088 app_dir
.Append(FILE_PATH_LITERAL("plugins")));
1090 command_line
->AppendSwitch(switches::kAlwaysAuthorizePlugins
);
1093 void SetPreference(NetworkPredictionOptions value
) {
1094 browser()->profile()->GetPrefs()->SetInteger(
1095 prefs::kNetworkPredictionOptions
, value
);
1098 void CreateTestFieldTrial(const std::string
& name
,
1099 const std::string
& group_name
) {
1100 base::FieldTrial
* trial
= base::FieldTrialList::CreateFieldTrial(
1105 // Verifies, for the current field trial, whether
1106 // ShouldDisableLocalPredictorDueToPreferencesAndNetwork produces the desired
1108 void TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
1109 bool preference_wifi_network_wifi
,
1110 bool preference_wifi_network_4g
,
1111 bool preference_always_network_wifi
,
1112 bool preference_always_network_4g
,
1113 bool preference_never_network_wifi
,
1114 bool preference_never_network_4g
) {
1115 Profile
* profile
= browser()->profile();
1117 // Set real NetworkChangeNotifier singleton aside.
1118 scoped_ptr
<NetworkChangeNotifier::DisableForTest
> disable_for_test(
1119 new NetworkChangeNotifier::DisableForTest
);
1121 // Set preference to WIFI_ONLY: prefetch when not on cellular.
1122 SetPreference(NetworkPredictionOptions::NETWORK_PREDICTION_WIFI_ONLY
);
1124 scoped_ptr
<NetworkChangeNotifier
> mock(new MockNetworkChangeNotifierWIFI
);
1126 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile
),
1127 preference_wifi_network_wifi
);
1130 scoped_ptr
<NetworkChangeNotifier
> mock(new MockNetworkChangeNotifier4G
);
1132 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile
),
1133 preference_wifi_network_4g
);
1136 // Set preference to ALWAYS: always prefetch.
1137 SetPreference(NetworkPredictionOptions::NETWORK_PREDICTION_ALWAYS
);
1139 scoped_ptr
<NetworkChangeNotifier
> mock(new MockNetworkChangeNotifierWIFI
);
1141 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile
),
1142 preference_always_network_wifi
);
1145 scoped_ptr
<NetworkChangeNotifier
> mock(new MockNetworkChangeNotifier4G
);
1147 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile
),
1148 preference_always_network_4g
);
1151 // Set preference to NEVER: never prefetch.
1152 SetPreference(NetworkPredictionOptions::NETWORK_PREDICTION_NEVER
);
1154 scoped_ptr
<NetworkChangeNotifier
> mock(new MockNetworkChangeNotifierWIFI
);
1156 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile
),
1157 preference_never_network_wifi
);
1160 scoped_ptr
<NetworkChangeNotifier
> mock(new MockNetworkChangeNotifier4G
);
1162 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile
),
1163 preference_never_network_4g
);
1167 virtual void SetUpOnMainThread() override
{
1168 current_browser()->profile()->GetPrefs()->SetBoolean(
1169 prefs::kPromptForDownload
, false);
1170 IncreasePrerenderMemory();
1171 if (autostart_test_server_
)
1172 ASSERT_TRUE(test_server()->Start());
1173 ChromeResourceDispatcherHostDelegate::
1174 SetExternalProtocolHandlerDelegateForTesting(
1175 &external_protocol_handler_delegate_
);
1177 PrerenderManager
* prerender_manager
= GetPrerenderManager();
1178 ASSERT_TRUE(prerender_manager
);
1179 prerender_manager
->mutable_config().rate_limit_enabled
= false;
1180 ASSERT_TRUE(prerender_contents_factory_
== NULL
);
1181 prerender_contents_factory_
= new TestPrerenderContentsFactory
;
1182 prerender_manager
->SetPrerenderContentsFactory(prerender_contents_factory_
);
1185 // Convenience function to get the currently active WebContents in
1186 // current_browser().
1187 WebContents
* GetActiveWebContents() const {
1188 return current_browser()->tab_strip_model()->GetActiveWebContents();
1191 // Overload for a single expected final status
1192 scoped_ptr
<TestPrerender
> PrerenderTestURL(
1193 const std::string
& html_file
,
1194 FinalStatus expected_final_status
,
1195 int expected_number_of_loads
) {
1196 GURL url
= test_server()->GetURL(html_file
);
1197 return PrerenderTestURL(url
,
1198 expected_final_status
,
1199 expected_number_of_loads
);
1202 ScopedVector
<TestPrerender
> PrerenderTestURL(
1203 const std::string
& html_file
,
1204 const std::vector
<FinalStatus
>& expected_final_status_queue
,
1205 int expected_number_of_loads
) {
1206 GURL url
= test_server()->GetURL(html_file
);
1207 return PrerenderTestURLImpl(url
,
1208 expected_final_status_queue
,
1209 expected_number_of_loads
);
1212 scoped_ptr
<TestPrerender
> PrerenderTestURL(
1214 FinalStatus expected_final_status
,
1215 int expected_number_of_loads
) {
1216 std::vector
<FinalStatus
> expected_final_status_queue(
1217 1, expected_final_status
);
1218 std::vector
<TestPrerender
*> prerenders
;
1219 PrerenderTestURLImpl(url
,
1220 expected_final_status_queue
,
1221 expected_number_of_loads
).release(&prerenders
);
1222 CHECK_EQ(1u, prerenders
.size());
1223 return scoped_ptr
<TestPrerender
>(prerenders
[0]);
1226 // Navigates to a URL, unrelated to prerendering
1227 void NavigateStraightToURL(const std::string dest_html_file
) {
1228 ui_test_utils::NavigateToURL(current_browser(),
1229 test_server()->GetURL(dest_html_file
));
1232 void NavigateToDestURL() const {
1233 NavigateToDestURLWithDisposition(CURRENT_TAB
, true);
1236 // Opens the url in a new tab, with no opener.
1237 void NavigateToDestURLWithDisposition(
1238 WindowOpenDisposition disposition
,
1239 bool expect_swap_to_succeed
) const {
1240 NavigateToURLWithParams(
1241 content::OpenURLParams(dest_url_
, Referrer(), disposition
,
1242 ui::PAGE_TRANSITION_TYPED
, false),
1243 expect_swap_to_succeed
);
1246 void NavigateToURL(const std::string
& dest_html_file
) const {
1247 NavigateToURLWithDisposition(dest_html_file
, CURRENT_TAB
, true);
1250 void NavigateToURLWithDisposition(const std::string
& dest_html_file
,
1251 WindowOpenDisposition disposition
,
1252 bool expect_swap_to_succeed
) const {
1253 GURL dest_url
= test_server()->GetURL(dest_html_file
);
1254 NavigateToURLWithDisposition(dest_url
, disposition
, expect_swap_to_succeed
);
1257 void NavigateToURLWithDisposition(const GURL
& dest_url
,
1258 WindowOpenDisposition disposition
,
1259 bool expect_swap_to_succeed
) const {
1260 NavigateToURLWithParams(
1261 content::OpenURLParams(dest_url
, Referrer(), disposition
,
1262 ui::PAGE_TRANSITION_TYPED
, false),
1263 expect_swap_to_succeed
);
1266 void NavigateToURLWithParams(const content::OpenURLParams
& params
,
1267 bool expect_swap_to_succeed
) const {
1268 NavigateToURLImpl(params
, expect_swap_to_succeed
);
1271 void OpenDestURLViaClick() const {
1272 OpenURLViaClick(dest_url_
);
1275 void OpenURLViaClick(const GURL
& url
) const {
1276 OpenURLWithJSImpl("Click", url
, GURL(), false);
1279 void OpenDestURLViaClickTarget() const {
1280 OpenURLWithJSImpl("ClickTarget", dest_url_
, GURL(), true);
1283 void OpenDestURLViaClickPing(const GURL
& ping_url
) const {
1284 OpenURLWithJSImpl("ClickPing", dest_url_
, ping_url
, false);
1287 void OpenDestURLViaClickNewWindow() const {
1288 OpenURLWithJSImpl("ShiftClick", dest_url_
, GURL(), true);
1291 void OpenDestURLViaClickNewForegroundTab() const {
1292 #if defined(OS_MACOSX)
1293 OpenURLWithJSImpl("MetaShiftClick", dest_url_
, GURL(), true);
1295 OpenURLWithJSImpl("CtrlShiftClick", dest_url_
, GURL(), true);
1299 void OpenDestURLViaClickNewBackgroundTab() const {
1300 #if defined(OS_MACOSX)
1301 OpenURLWithJSImpl("MetaClick", dest_url_
, GURL(), true);
1303 OpenURLWithJSImpl("CtrlClick", dest_url_
, GURL(), true);
1307 void OpenDestURLViaWindowOpen() const {
1308 OpenURLViaWindowOpen(dest_url_
);
1311 void OpenURLViaWindowOpen(const GURL
& url
) const {
1312 OpenURLWithJSImpl("WindowOpen", url
, GURL(), true);
1315 void RemoveLinkElement(int i
) const {
1316 GetActiveWebContents()->GetMainFrame()->ExecuteJavaScript(
1317 base::ASCIIToUTF16(base::StringPrintf("RemoveLinkElement(%d)", i
)));
1320 void ClickToNextPageAfterPrerender() {
1321 TestNavigationObserver
nav_observer(GetActiveWebContents());
1322 RenderFrameHost
* render_frame_host
= GetActiveWebContents()->GetMainFrame();
1323 render_frame_host
->ExecuteJavaScript(base::ASCIIToUTF16("ClickOpenLink()"));
1324 nav_observer
.Wait();
1327 void NavigateToNextPageAfterPrerender() const {
1328 ui_test_utils::NavigateToURL(
1330 test_server()->GetURL("files/prerender/prerender_page.html"));
1333 // Called after the prerendered page has been navigated to and then away from.
1334 // Navigates back through the history to the prerendered page.
1335 void GoBackToPrerender() {
1336 TestNavigationObserver
back_nav_observer(GetActiveWebContents());
1337 chrome::GoBack(current_browser(), CURRENT_TAB
);
1338 back_nav_observer
.Wait();
1339 bool original_prerender_page
= false;
1340 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
1341 GetActiveWebContents(),
1342 "window.domAutomationController.send(IsOriginalPrerenderPage())",
1343 &original_prerender_page
));
1344 EXPECT_TRUE(original_prerender_page
);
1347 // Goes back to the page that was active before the prerender was swapped
1348 // in. This must be called when the prerendered page is the current page
1349 // in the active tab.
1350 void GoBackToPageBeforePrerender() {
1351 WebContents
* tab
= GetActiveWebContents();
1353 EXPECT_FALSE(tab
->IsLoading());
1354 TestNavigationObserver
back_nav_observer(tab
);
1355 chrome::GoBack(current_browser(), CURRENT_TAB
);
1356 back_nav_observer
.Wait();
1358 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
1360 "window.domAutomationController.send(DidBackToOriginalPagePass())",
1362 EXPECT_TRUE(js_result
);
1365 bool UrlIsInPrerenderManager(const std::string
& html_file
) const {
1366 return UrlIsInPrerenderManager(test_server()->GetURL(html_file
));
1369 bool UrlIsInPrerenderManager(const GURL
& url
) const {
1370 return GetPrerenderManager()->FindPrerenderData(
1371 url
, GetSessionStorageNamespace()) != NULL
;
1374 void UseHttpsSrcServer() {
1375 if (https_src_server_
)
1377 https_src_server_
.reset(
1378 new net::SpawnedTestServer(
1379 net::SpawnedTestServer::TYPE_HTTPS
,
1380 net::SpawnedTestServer::kLocalhost
,
1381 base::FilePath(FILE_PATH_LITERAL("chrome/test/data"))));
1382 CHECK(https_src_server_
->Start());
1385 void DisableJavascriptCalls() {
1386 call_javascript_
= false;
1389 void DisableLoadEventCheck() {
1390 check_load_events_
= false;
1393 TaskManagerModel
* GetModel() const {
1394 return TaskManager::GetInstance()->model();
1397 PrerenderManager
* GetPrerenderManager() const {
1398 PrerenderManager
* prerender_manager
=
1399 PrerenderManagerFactory::GetForProfile(current_browser()->profile());
1400 return prerender_manager
;
1403 const PrerenderLinkManager
* GetPrerenderLinkManager() const {
1404 PrerenderLinkManager
* prerender_link_manager
=
1405 PrerenderLinkManagerFactory::GetForProfile(
1406 current_browser()->profile());
1407 return prerender_link_manager
;
1410 int GetPrerenderEventCount(int index
, const std::string
& type
) const {
1412 std::string expression
= base::StringPrintf(
1413 "window.domAutomationController.send("
1414 " GetPrerenderEventCount(%d, '%s'))", index
, type
.c_str());
1416 CHECK(content::ExecuteScriptAndExtractInt(
1417 GetActiveWebContents(), expression
, &event_count
));
1421 bool DidReceivePrerenderStartEventForLinkNumber(int index
) const {
1422 return GetPrerenderEventCount(index
, "webkitprerenderstart") > 0;
1425 int GetPrerenderLoadEventCountForLinkNumber(int index
) const {
1426 return GetPrerenderEventCount(index
, "webkitprerenderload");
1429 int GetPrerenderDomContentLoadedEventCountForLinkNumber(int index
) const {
1430 return GetPrerenderEventCount(index
, "webkitprerenderdomcontentloaded");
1433 bool DidReceivePrerenderStopEventForLinkNumber(int index
) const {
1434 return GetPrerenderEventCount(index
, "webkitprerenderstop") > 0;
1437 void WaitForPrerenderEventCount(int index
,
1438 const std::string
& type
,
1441 std::string expression
= base::StringPrintf(
1442 "WaitForPrerenderEventCount(%d, '%s', %d,"
1443 " window.domAutomationController.send.bind("
1444 " window.domAutomationController, 0))",
1445 index
, type
.c_str(), count
);
1447 CHECK(content::ExecuteScriptAndExtractInt(
1448 GetActiveWebContents(), expression
, &dummy
));
1452 bool HadPrerenderEventErrors() const {
1453 bool had_prerender_event_errors
;
1454 CHECK(content::ExecuteScriptAndExtractBool(
1455 GetActiveWebContents(),
1456 "window.domAutomationController.send(Boolean("
1457 " hadPrerenderEventErrors))",
1458 &had_prerender_event_errors
));
1459 return had_prerender_event_errors
;
1462 // Asserting on this can result in flaky tests. PrerenderHandles are
1463 // removed from the PrerenderLinkManager when the prerender is canceled from
1464 // the browser, when the prerenders are cancelled from the renderer process,
1465 // or the channel for the renderer process is closed on the IO thread. In the
1466 // last case, the code must be careful to wait for the channel to close, as it
1467 // is done asynchronously after swapping out the old process. See
1468 // ChannelDestructionWatcher.
1469 bool IsEmptyPrerenderLinkManager() const {
1470 return GetPrerenderLinkManager()->IsEmpty();
1473 size_t GetLinkPrerenderCount() const {
1474 return GetPrerenderLinkManager()->prerenders_
.size();
1477 size_t GetRunningLinkPrerenderCount() const {
1478 return GetPrerenderLinkManager()->CountRunningPrerenders();
1481 // Returns length of |prerender_manager_|'s history, or -1 on failure.
1482 int GetHistoryLength() const {
1483 scoped_ptr
<base::DictionaryValue
> prerender_dict(
1484 static_cast<base::DictionaryValue
*>(
1485 GetPrerenderManager()->GetAsValue()));
1486 if (!prerender_dict
.get())
1488 base::ListValue
* history_list
;
1489 if (!prerender_dict
->GetList("history", &history_list
))
1491 return static_cast<int>(history_list
->GetSize());
1494 #if defined(FULL_SAFE_BROWSING)
1495 FakeSafeBrowsingDatabaseManager
* GetFakeSafeBrowsingDatabaseManager() {
1496 return safe_browsing_factory_
->most_recent_service()->
1497 fake_database_manager();
1501 TestPrerenderContents
* GetPrerenderContentsFor(const GURL
& url
) const {
1502 PrerenderManager::PrerenderData
* prerender_data
=
1503 GetPrerenderManager()->FindPrerenderData(url
, NULL
);
1504 return static_cast<TestPrerenderContents
*>(
1505 prerender_data
? prerender_data
->contents() : NULL
);
1508 void SetLoaderHostOverride(const std::string
& host
) {
1509 loader_host_override_
= host
;
1510 host_resolver()->AddRule(host
, "127.0.0.1");
1513 void set_loader_path(const std::string
& path
) {
1514 loader_path_
= path
;
1517 void set_loader_query(const std::string
& query
) {
1518 loader_query_
= query
;
1521 GURL
GetCrossDomainTestUrl(const std::string
& path
) {
1522 static const std::string secondary_domain
= "www.foo.com";
1523 host_resolver()->AddRule(secondary_domain
, "127.0.0.1");
1524 std::string
url_str(base::StringPrintf(
1526 secondary_domain
.c_str(),
1527 test_server()->host_port_pair().port(),
1529 return GURL(url_str
);
1532 void set_browser(Browser
* browser
) {
1533 explicitly_set_browser_
= browser
;
1536 Browser
* current_browser() const {
1537 return explicitly_set_browser_
? explicitly_set_browser_
: browser();
1540 const GURL
& dest_url() const {
1544 void IncreasePrerenderMemory() {
1545 // Increase the memory allowed in a prerendered page above normal settings.
1546 // Debug build bots occasionally run against the default limit, and tests
1547 // were failing because the prerender was canceled due to memory exhaustion.
1548 // http://crbug.com/93076
1549 GetPrerenderManager()->mutable_config().max_bytes
= 1000 * 1024 * 1024;
1552 bool DidPrerenderPass(WebContents
* web_contents
) const {
1553 bool prerender_test_result
= false;
1554 if (!content::ExecuteScriptAndExtractBool(
1556 "window.domAutomationController.send(DidPrerenderPass())",
1557 &prerender_test_result
))
1559 return prerender_test_result
;
1562 bool DidDisplayPass(WebContents
* web_contents
) const {
1563 bool display_test_result
= false;
1564 if (!content::ExecuteScriptAndExtractBool(
1566 "window.domAutomationController.send(DidDisplayPass())",
1567 &display_test_result
))
1569 return display_test_result
;
1572 scoped_ptr
<TestPrerender
> ExpectPrerender(FinalStatus expected_final_status
) {
1573 return prerender_contents_factory_
->ExpectPrerenderContents(
1574 expected_final_status
);
1577 void AddPrerender(const GURL
& url
, int index
) {
1578 std::string javascript
= base::StringPrintf(
1579 "AddPrerender('%s', %d)", url
.spec().c_str(), index
);
1580 RenderFrameHost
* render_frame_host
= GetActiveWebContents()->GetMainFrame();
1581 render_frame_host
->ExecuteJavaScript(base::ASCIIToUTF16(javascript
));
1584 // Returns a string for pattern-matching TaskManager tab entries.
1585 base::string16
MatchTaskManagerTab(const char* page_title
) {
1586 return l10n_util::GetStringFUTF16(IDS_TASK_MANAGER_TAB_PREFIX
,
1587 base::ASCIIToUTF16(page_title
));
1590 // Returns a string for pattern-matching TaskManager prerender entries.
1591 base::string16
MatchTaskManagerPrerender(const char* page_title
) {
1592 return l10n_util::GetStringFUTF16(IDS_TASK_MANAGER_PRERENDER_PREFIX
,
1593 base::ASCIIToUTF16(page_title
));
1596 void RunJSReturningString(const char* js
, std::string
* result
) {
1598 content::ExecuteScriptAndExtractString(
1599 GetActiveWebContents(),
1600 base::StringPrintf("window.domAutomationController.send(%s)",
1605 void RunJS(const char* js
) {
1606 ASSERT_TRUE(content::ExecuteScript(
1607 GetActiveWebContents(),
1608 base::StringPrintf("window.domAutomationController.send(%s)",
1612 const base::HistogramTester
& histogram_tester() { return histogram_tester_
; }
1615 bool autostart_test_server_
;
1618 // TODO(davidben): Remove this altogether so the tests don't globally assume
1619 // only one prerender.
1620 TestPrerenderContents
* GetPrerenderContents() const {
1621 return GetPrerenderContentsFor(dest_url_
);
1624 ScopedVector
<TestPrerender
> PrerenderTestURLImpl(
1625 const GURL
& prerender_url
,
1626 const std::vector
<FinalStatus
>& expected_final_status_queue
,
1627 int expected_number_of_loads
) {
1628 dest_url_
= prerender_url
;
1630 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
1631 replacement_text
.push_back(
1632 make_pair("REPLACE_WITH_PRERENDER_URL", prerender_url
.spec()));
1633 std::string replacement_path
;
1634 CHECK(net::SpawnedTestServer::GetFilePathWithReplacements(
1637 &replacement_path
));
1639 const net::SpawnedTestServer
* src_server
= test_server();
1640 if (https_src_server_
)
1641 src_server
= https_src_server_
.get();
1642 GURL loader_url
= src_server
->GetURL(
1643 replacement_path
+ "&" + loader_query_
);
1645 GURL::Replacements loader_replacements
;
1646 if (!loader_host_override_
.empty())
1647 loader_replacements
.SetHostStr(loader_host_override_
);
1648 loader_url
= loader_url
.ReplaceComponents(loader_replacements
);
1650 VLOG(1) << "Running test with queue length " <<
1651 expected_final_status_queue
.size();
1652 CHECK(!expected_final_status_queue
.empty());
1653 ScopedVector
<TestPrerender
> prerenders
;
1654 for (size_t i
= 0; i
< expected_final_status_queue
.size(); i
++) {
1655 prerenders
.push_back(
1656 prerender_contents_factory_
->ExpectPrerenderContents(
1657 expected_final_status_queue
[i
]).release());
1660 FinalStatus expected_final_status
= expected_final_status_queue
.front();
1662 // Navigate to the loader URL and then wait for the first prerender to be
1664 ui_test_utils::NavigateToURL(current_browser(), loader_url
);
1665 prerenders
[0]->WaitForCreate();
1666 prerenders
[0]->WaitForLoads(expected_number_of_loads
);
1668 if (ShouldAbortPrerenderBeforeSwap(expected_final_status
)) {
1669 // The prerender will abort on its own. Assert it does so correctly.
1670 prerenders
[0]->WaitForStop();
1671 EXPECT_FALSE(prerenders
[0]->contents());
1672 EXPECT_TRUE(DidReceivePrerenderStopEventForLinkNumber(0));
1674 // Otherwise, check that it prerendered correctly.
1675 TestPrerenderContents
* prerender_contents
= prerenders
[0]->contents();
1677 CHECK_NE(static_cast<PrerenderContents
*>(NULL
), prerender_contents
);
1678 EXPECT_EQ(FINAL_STATUS_MAX
, prerender_contents
->final_status());
1679 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1681 if (call_javascript_
) {
1682 // Check if page behaves as expected while in prerendered state.
1683 EXPECT_TRUE(DidPrerenderPass(prerender_contents
->prerender_contents()));
1687 // Test that the referring page received the right start and load events.
1688 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1689 if (check_load_events_
) {
1690 EXPECT_EQ(expected_number_of_loads
, prerenders
[0]->number_of_loads());
1691 EXPECT_EQ(expected_number_of_loads
,
1692 GetPrerenderLoadEventCountForLinkNumber(0));
1694 EXPECT_FALSE(HadPrerenderEventErrors());
1696 return prerenders
.Pass();
1699 void NavigateToURLImpl(const content::OpenURLParams
& params
,
1700 bool expect_swap_to_succeed
) const {
1701 ASSERT_NE(static_cast<PrerenderManager
*>(NULL
), GetPrerenderManager());
1702 // Make sure in navigating we have a URL to use in the PrerenderManager.
1703 ASSERT_NE(static_cast<PrerenderContents
*>(NULL
), GetPrerenderContents());
1705 WebContents
* web_contents
= GetPrerenderContents()->prerender_contents();
1707 // Navigate and wait for either the load to finish normally or for a swap to
1709 // TODO(davidben): The only handles CURRENT_TAB navigations, which is the
1710 // only case tested or prerendered right now.
1711 CHECK_EQ(CURRENT_TAB
, params
.disposition
);
1712 NavigationOrSwapObserver
swap_observer(current_browser()->tab_strip_model(),
1713 GetActiveWebContents());
1714 WebContents
* target_web_contents
= current_browser()->OpenURL(params
);
1715 swap_observer
.Wait();
1717 if (web_contents
&& expect_swap_to_succeed
) {
1718 EXPECT_EQ(web_contents
, target_web_contents
);
1719 if (call_javascript_
)
1720 EXPECT_TRUE(DidDisplayPass(web_contents
));
1724 // Opens the prerendered page using javascript functions in the loader
1725 // page. |javascript_function_name| should be a 0 argument function which is
1726 // invoked. |new_web_contents| is true if the navigation is expected to
1727 // happen in a new WebContents via OpenURL.
1728 void OpenURLWithJSImpl(const std::string
& javascript_function_name
,
1730 const GURL
& ping_url
,
1731 bool new_web_contents
) const {
1732 WebContents
* web_contents
= GetActiveWebContents();
1733 RenderFrameHost
* render_frame_host
= web_contents
->GetMainFrame();
1734 // Extra arguments in JS are ignored.
1735 std::string javascript
= base::StringPrintf(
1736 "%s('%s', '%s')", javascript_function_name
.c_str(),
1737 url
.spec().c_str(), ping_url
.spec().c_str());
1739 if (new_web_contents
) {
1740 NewTabNavigationOrSwapObserver observer
;
1742 ExecuteJavaScriptForTests(base::ASCIIToUTF16(javascript
));
1745 NavigationOrSwapObserver
observer(current_browser()->tab_strip_model(),
1747 render_frame_host
->ExecuteJavaScript(base::ASCIIToUTF16(javascript
));
1752 TestPrerenderContentsFactory
* prerender_contents_factory_
;
1753 #if defined(FULL_SAFE_BROWSING)
1754 scoped_ptr
<TestSafeBrowsingServiceFactory
> safe_browsing_factory_
;
1756 NeverRunsExternalProtocolHandlerDelegate external_protocol_handler_delegate_
;
1758 scoped_ptr
<net::SpawnedTestServer
> https_src_server_
;
1759 bool call_javascript_
;
1760 bool check_load_events_
;
1761 std::string loader_host_override_
;
1762 std::string loader_path_
;
1763 std::string loader_query_
;
1764 Browser
* explicitly_set_browser_
;
1765 base::HistogramTester histogram_tester_
;
1766 scoped_ptr
<base::FieldTrialList
> field_trial_list_
;
1769 // Checks that a page is correctly prerendered in the case of a
1770 // <link rel=prerender> tag and then loaded into a tab in response to a
1772 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPage
) {
1773 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
1774 EXPECT_EQ(1, GetPrerenderDomContentLoadedEventCountForLinkNumber(0));
1775 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
1776 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
1777 histogram_tester().ExpectTotalCount(
1778 "Prerender.none_PerceivedPLTMatchedComplete", 0);
1779 histogram_tester().ExpectTotalCount(
1780 "Prerender.websame_PrerenderNotSwappedInPLT", 1);
1782 ChannelDestructionWatcher channel_close_watcher
;
1783 channel_close_watcher
.WatchChannel(
1784 GetActiveWebContents()->GetRenderProcessHost());
1785 NavigateToDestURL();
1786 channel_close_watcher
.WaitForChannelClose();
1788 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
1789 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
1791 histogram_tester().ExpectTotalCount(
1792 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
1794 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
1797 // Checks that cross-domain prerenders emit the correct histograms.
1798 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPageCrossDomain
) {
1799 PrerenderTestURL(GetCrossDomainTestUrl("files/prerender/prerender_page.html"),
1800 FINAL_STATUS_USED
, 1);
1801 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
1802 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
1803 histogram_tester().ExpectTotalCount(
1804 "Prerender.none_PerceivedPLTMatchedComplete", 0);
1805 histogram_tester().ExpectTotalCount(
1806 "Prerender.webcross_PrerenderNotSwappedInPLT", 1);
1808 NavigateToDestURL();
1809 histogram_tester().ExpectTotalCount("Prerender.webcross_PerceivedPLT", 1);
1810 histogram_tester().ExpectTotalCount("Prerender.webcross_PerceivedPLTMatched",
1812 histogram_tester().ExpectTotalCount(
1813 "Prerender.webcross_PerceivedPLTMatchedComplete", 1);
1816 // Checks that pending prerenders launch and receive proper event treatment.
1817 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPagePending
) {
1818 scoped_ptr
<TestPrerender
> prerender
=
1819 PrerenderTestURL("files/prerender/prerender_page_pending.html",
1820 FINAL_STATUS_USED
, 1);
1822 // Navigate to the prerender.
1823 scoped_ptr
<TestPrerender
> prerender2
= ExpectPrerender(FINAL_STATUS_USED
);
1824 NavigateToDestURL();
1825 // Abort early if the original prerender didn't swap, so as not to hang.
1826 ASSERT_FALSE(prerender
->contents());
1828 // Wait for the new prerender to be ready.
1829 prerender2
->WaitForStart();
1830 prerender2
->WaitForLoads(1);
1832 const GURL prerender_page_url
=
1833 test_server()->GetURL("files/prerender/prerender_page.html");
1834 EXPECT_FALSE(IsEmptyPrerenderLinkManager());
1835 EXPECT_NE(static_cast<TestPrerenderContents
*>(NULL
),
1836 GetPrerenderContentsFor(prerender_page_url
));
1838 // Now navigate to our target page.
1839 NavigationOrSwapObserver
swap_observer(current_browser()->tab_strip_model(),
1840 GetActiveWebContents());
1841 ui_test_utils::NavigateToURLWithDisposition(
1842 current_browser(), prerender_page_url
, CURRENT_TAB
,
1843 ui_test_utils::BROWSER_TEST_NONE
);
1844 swap_observer
.Wait();
1846 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1849 // Checks that pending prerenders which are canceled before they are launched
1850 // never get started.
1851 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPageRemovesPending
) {
1852 PrerenderTestURL("files/prerender/prerender_page_removes_pending.html",
1853 FINAL_STATUS_USED
, 1);
1855 ChannelDestructionWatcher channel_close_watcher
;
1856 channel_close_watcher
.WatchChannel(
1857 GetActiveWebContents()->GetRenderProcessHost());
1858 NavigateToDestURL();
1859 channel_close_watcher
.WaitForChannelClose();
1861 EXPECT_FALSE(DidReceivePrerenderStartEventForLinkNumber(1));
1862 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1863 EXPECT_FALSE(HadPrerenderEventErrors());
1864 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1865 // calls did a thread/process hop to the renderer which insured pending
1866 // renderer events have arrived.
1867 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
1870 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPageRemovingLink
) {
1871 scoped_ptr
<TestPrerender
> prerender
=
1872 PrerenderTestURL("files/prerender/prerender_page.html",
1873 FINAL_STATUS_CANCELLED
, 1);
1875 // No ChannelDestructionWatcher is needed here, since prerenders in the
1876 // PrerenderLinkManager should be deleted by removing the links, rather than
1877 // shutting down the renderer process.
1878 RemoveLinkElement(0);
1879 prerender
->WaitForStop();
1881 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1882 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1883 EXPECT_FALSE(HadPrerenderEventErrors());
1884 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1885 // calls did a thread/process hop to the renderer which insured pending
1886 // renderer events have arrived.
1887 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1890 IN_PROC_BROWSER_TEST_F(
1891 PrerenderBrowserTest
, PrerenderPageRemovingLinkWithTwoLinks
) {
1892 GetPrerenderManager()->mutable_config().max_link_concurrency
= 2;
1893 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher
= 2;
1895 set_loader_query("links_to_insert=2");
1896 scoped_ptr
<TestPrerender
> prerender
=
1897 PrerenderTestURL("files/prerender/prerender_page.html",
1898 FINAL_STATUS_CANCELLED
, 1);
1899 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1900 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1901 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1902 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1904 RemoveLinkElement(0);
1905 RemoveLinkElement(1);
1906 prerender
->WaitForStop();
1908 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1909 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1910 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1911 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1912 EXPECT_FALSE(HadPrerenderEventErrors());
1913 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1914 // calls did a thread/process hop to the renderer which insured pending
1915 // renderer events have arrived.
1916 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1919 IN_PROC_BROWSER_TEST_F(
1920 PrerenderBrowserTest
, PrerenderPageRemovingLinkWithTwoLinksOneLate
) {
1921 GetPrerenderManager()->mutable_config().max_link_concurrency
= 2;
1922 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher
= 2;
1924 GURL url
= test_server()->GetURL("files/prerender/prerender_page.html");
1925 scoped_ptr
<TestPrerender
> prerender
=
1926 PrerenderTestURL(url
, FINAL_STATUS_CANCELLED
, 1);
1928 // Add a second prerender for the same link. It reuses the prerender, so only
1929 // the start event fires here.
1930 AddPrerender(url
, 1);
1931 WaitForPrerenderEventCount(1, "webkitprerenderstart", 1);
1932 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1933 EXPECT_EQ(0, GetPrerenderLoadEventCountForLinkNumber(1));
1934 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1936 RemoveLinkElement(0);
1937 RemoveLinkElement(1);
1938 prerender
->WaitForStop();
1940 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1941 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1942 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1943 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1944 EXPECT_FALSE(HadPrerenderEventErrors());
1945 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1946 // calls did a thread/process hop to the renderer which insured pending
1947 // renderer events have arrived.
1948 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1951 IN_PROC_BROWSER_TEST_F(
1952 PrerenderBrowserTest
,
1953 PrerenderPageRemovingLinkWithTwoLinksRemovingOne
) {
1954 GetPrerenderManager()->mutable_config().max_link_concurrency
= 2;
1955 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher
= 2;
1956 set_loader_query("links_to_insert=2");
1957 PrerenderTestURL("files/prerender/prerender_page.html",
1958 FINAL_STATUS_USED
, 1);
1959 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1960 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1961 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1962 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1964 RemoveLinkElement(0);
1965 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1966 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1967 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1968 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1969 EXPECT_FALSE(HadPrerenderEventErrors());
1970 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1971 // calls did a thread/process hop to the renderer which insured pending
1972 // renderer events have arrived.
1973 EXPECT_FALSE(IsEmptyPrerenderLinkManager());
1975 ChannelDestructionWatcher channel_close_watcher
;
1976 channel_close_watcher
.WatchChannel(
1977 GetActiveWebContents()->GetRenderProcessHost());
1978 NavigateToDestURL();
1979 channel_close_watcher
.WaitForChannelClose();
1981 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1984 // Checks that the visibility API works.
1985 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderVisibility
) {
1986 PrerenderTestURL("files/prerender/prerender_visibility.html",
1989 NavigateToDestURL();
1992 // Checks that the prerendering of a page is canceled correctly if we try to
1993 // swap it in before it commits.
1994 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderNoCommitNoSwap
) {
1995 // Navigate to a page that triggers a prerender for a URL that never commits.
1996 const GURL
kNoCommitUrl("http://never-respond.example.com");
1997 base::FilePath
file(GetTestPath("prerender_page.html"));
1999 base::RunLoop prerender_start_loop
;
2000 BrowserThread::PostTask(
2001 BrowserThread::IO
, FROM_HERE
,
2002 base::Bind(&CreateHangingFirstRequestInterceptorOnIO
, kNoCommitUrl
, file
,
2003 prerender_start_loop
.QuitClosure()));
2004 DisableJavascriptCalls();
2005 PrerenderTestURL(kNoCommitUrl
,
2006 FINAL_STATUS_NAVIGATION_UNCOMMITTED
,
2008 // Wait for the hanging request to be scheduled.
2009 prerender_start_loop
.Run();
2011 // Navigate to the URL, but assume the contents won't be swapped in.
2012 NavigateToDestURLWithDisposition(CURRENT_TAB
, false);
2015 // Checks that client redirects don't add alias URLs until after they commit.
2016 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderNoCommitNoSwap2
) {
2017 // Navigate to a page that then navigates to a URL that never commits.
2018 const GURL
kNoCommitUrl("http://never-respond.example.com");
2019 base::FilePath
file(GetTestPath("prerender_page.html"));
2021 base::RunLoop prerender_start_loop
;
2022 BrowserThread::PostTask(
2023 BrowserThread::IO
, FROM_HERE
,
2024 base::Bind(&CreateHangingFirstRequestInterceptorOnIO
, kNoCommitUrl
, file
,
2025 prerender_start_loop
.QuitClosure()));
2026 DisableJavascriptCalls();
2027 PrerenderTestURL(CreateClientRedirect(kNoCommitUrl
.spec()),
2028 FINAL_STATUS_APP_TERMINATING
, 1);
2029 // Wait for the hanging request to be scheduled.
2030 prerender_start_loop
.Run();
2032 // Navigating to the second URL should not swap.
2033 NavigateToURLWithDisposition(kNoCommitUrl
, CURRENT_TAB
, false);
2036 // Checks that the prerendering of a page is canceled correctly when a
2037 // Javascript alert is called.
2038 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderAlertBeforeOnload
) {
2039 PrerenderTestURL("files/prerender/prerender_alert_before_onload.html",
2040 FINAL_STATUS_JAVASCRIPT_ALERT
,
2044 // Checks that the prerendering of a page is canceled correctly when a
2045 // Javascript alert is called.
2046 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderAlertAfterOnload
) {
2047 PrerenderTestURL("files/prerender/prerender_alert_after_onload.html",
2048 FINAL_STATUS_JAVASCRIPT_ALERT
,
2052 // Checks that plugins are not loaded while a page is being preloaded, but
2053 // are loaded when the page is displayed.
2054 #if defined(USE_AURA) && !defined(OS_WIN)
2055 // http://crbug.com/103496
2056 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2057 #elif defined(OS_MACOSX)
2058 // http://crbug.com/100514
2059 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2060 #elif defined(OS_WIN) && defined(ARCH_CPU_X86_64)
2061 // TODO(jschuh): Failing plugin tests. crbug.com/244653
2062 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2063 #elif defined(OS_LINUX)
2064 // http://crbug.com/306715
2065 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2067 #define MAYBE_PrerenderDelayLoadPlugin PrerenderDelayLoadPlugin
2069 // http://crbug.com/306715
2070 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, MAYBE_PrerenderDelayLoadPlugin
) {
2071 PrerenderTestURL("files/prerender/plugin_delay_load.html",
2074 NavigateToDestURL();
2077 // Checks that plugins are not loaded on prerendering pages when click-to-play
2079 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClickToPlay
) {
2080 // Enable click-to-play.
2081 HostContentSettingsMap
* content_settings_map
=
2082 current_browser()->profile()->GetHostContentSettingsMap();
2083 content_settings_map
->SetDefaultContentSetting(
2084 CONTENT_SETTINGS_TYPE_PLUGINS
, CONTENT_SETTING_ASK
);
2086 PrerenderTestURL("files/prerender/prerender_plugin_click_to_play.html",
2089 NavigateToDestURL();
2092 // Checks that we don't load a NaCl plugin when NaCl is disabled.
2093 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderNaClPluginDisabled
) {
2094 PrerenderTestURL("files/prerender/prerender_plugin_nacl_disabled.html",
2097 NavigateToDestURL();
2100 // Run this check again. When we try to load aa ppapi plugin, the
2101 // "loadstart" event is asynchronously posted to a message loop.
2102 // It's possible that earlier call could have been run before the
2103 // the "loadstart" event was posted.
2104 // TODO(mmenke): While this should reliably fail on regressions, the
2105 // reliability depends on the specifics of ppapi plugin
2106 // loading. It would be great if we could avoid that.
2107 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2110 // Checks that plugins in an iframe are not loaded while a page is
2111 // being preloaded, but are loaded when the page is displayed.
2112 #if defined(USE_AURA) && !defined(OS_WIN)
2113 // http://crbug.com/103496
2114 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2115 DISABLED_PrerenderIframeDelayLoadPlugin
2116 #elif defined(OS_MACOSX)
2117 // http://crbug.com/100514
2118 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2119 DISABLED_PrerenderIframeDelayLoadPlugin
2120 #elif defined(OS_WIN) && defined(ARCH_CPU_X86_64)
2121 // TODO(jschuh): Failing plugin tests. crbug.com/244653
2122 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2123 DISABLED_PrerenderIframeDelayLoadPlugin
2125 #define MAYBE_PrerenderIframeDelayLoadPlugin PrerenderIframeDelayLoadPlugin
2127 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2128 MAYBE_PrerenderIframeDelayLoadPlugin
) {
2129 PrerenderTestURL("files/prerender/prerender_iframe_plugin_delay_load.html",
2132 NavigateToDestURL();
2135 // Renders a page that contains a prerender link to a page that contains an
2136 // iframe with a source that requires http authentication. This should not
2137 // prerender successfully.
2138 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHttpAuthentication
) {
2139 PrerenderTestURL("files/prerender/prerender_http_auth_container.html",
2140 FINAL_STATUS_AUTH_NEEDED
,
2144 // Checks that client-issued redirects work with prerendering.
2145 // This version navigates to the page which issues the redirection, rather
2146 // than the final destination page.
2147 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2148 PrerenderClientRedirectNavigateToFirst
) {
2149 PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
2152 NavigateToDestURL();
2155 // Checks that client-issued redirects work with prerendering.
2156 // This version navigates to the final destination page, rather than the
2157 // page which does the redirection.
2158 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2159 PrerenderClientRedirectNavigateToSecond
) {
2160 PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
2163 NavigateToURL("files/prerender/prerender_page.html");
2166 // Checks that redirects with location.replace do not cancel a prerender and
2167 // and swap when navigating to the first page.
2168 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2169 PrerenderLocationReplaceNavigateToFirst
) {
2170 PrerenderTestURL("files/prerender/prerender_location_replace.html",
2173 NavigateToDestURL();
2176 // Checks that redirects with location.replace do not cancel a prerender and
2177 // and swap when navigating to the second.
2178 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2179 PrerenderLocationReplaceNavigateToSecond
) {
2180 PrerenderTestURL("files/prerender/prerender_location_replace.html",
2183 NavigateToURL("files/prerender/prerender_page.html");
2186 // Checks that we get the right PPLT histograms for client redirect prerenders
2187 // and navigations when the referring page is Google.
2188 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2189 PrerenderLocationReplaceGWSHistograms
) {
2190 DisableJavascriptCalls();
2192 // The loader page should look like Google.
2193 const std::string
kGoogleDotCom("www.google.com");
2194 SetLoaderHostOverride(kGoogleDotCom
);
2195 set_loader_path("files/prerender/prerender_loader_with_replace_state.html");
2197 GURL dest_url
= GetCrossDomainTestUrl(
2198 "files/prerender/prerender_deferred_image.html");
2200 GURL prerender_url
= test_server()->GetURL(
2201 "files/prerender/prerender_location_replace.html?" +
2202 net::EscapeQueryParamValue(dest_url
.spec(), false) +
2204 GURL::Replacements replacements
;
2205 replacements
.SetHostStr(kGoogleDotCom
);
2206 prerender_url
= prerender_url
.ReplaceComponents(replacements
);
2208 // The prerender will not completely load until after the swap, so wait for a
2209 // title change before calling DidPrerenderPass.
2210 scoped_ptr
<TestPrerender
> prerender
=
2211 PrerenderTestURL(prerender_url
, FINAL_STATUS_USED
, 1);
2212 WaitForASCIITitle(prerender
->contents()->prerender_contents(), kReadyTitle
);
2213 EXPECT_TRUE(DidPrerenderPass(prerender
->contents()->prerender_contents()));
2214 EXPECT_EQ(1, prerender
->number_of_loads());
2216 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
2217 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
2218 histogram_tester().ExpectTotalCount(
2219 "Prerender.none_PerceivedPLTMatchedComplete", 0);
2220 // Although there is a client redirect, it is dropped from histograms because
2221 // it is a Google URL. The target page itself does not load until after the
2223 histogram_tester().ExpectTotalCount("Prerender.gws_PrerenderNotSwappedInPLT",
2226 GURL navigate_url
= test_server()->GetURL(
2227 "files/prerender/prerender_location_replace.html?" +
2228 net::EscapeQueryParamValue(dest_url
.spec(), false) +
2230 navigate_url
= navigate_url
.ReplaceComponents(replacements
);
2232 NavigationOrSwapObserver
swap_observer(
2233 current_browser()->tab_strip_model(),
2234 GetActiveWebContents(), 2);
2235 current_browser()->OpenURL(OpenURLParams(
2236 navigate_url
, Referrer(), CURRENT_TAB
,
2237 ui::PAGE_TRANSITION_TYPED
, false));
2238 swap_observer
.Wait();
2240 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2242 histogram_tester().ExpectTotalCount("Prerender.gws_PrerenderNotSwappedInPLT",
2244 histogram_tester().ExpectTotalCount("Prerender.gws_PerceivedPLT", 1);
2245 histogram_tester().ExpectTotalCount("Prerender.gws_PerceivedPLTMatched", 1);
2246 histogram_tester().ExpectTotalCount(
2247 "Prerender.gws_PerceivedPLTMatchedComplete", 1);
2249 // The client redirect does /not/ count as a miss because it's a Google URL.
2250 histogram_tester().ExpectTotalCount("Prerender.PerceivedPLTFirstAfterMiss",
2254 // Checks that client-issued redirects work with prerendering.
2255 // This version navigates to the final destination page, rather than the
2256 // page which does the redirection via a mouse click.
2257 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2258 PrerenderClientRedirectNavigateToSecondViaClick
) {
2259 GURL prerender_url
= test_server()->GetURL(
2260 CreateClientRedirect("files/prerender/prerender_page.html"));
2261 GURL destination_url
= test_server()->GetURL(
2262 "files/prerender/prerender_page.html");
2263 PrerenderTestURL(prerender_url
, FINAL_STATUS_USED
, 2);
2264 OpenURLViaClick(destination_url
);
2267 // Checks that a page served over HTTPS is correctly prerendered.
2268 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHttps
) {
2269 net::SpawnedTestServer
https_server(
2270 net::SpawnedTestServer::TYPE_HTTPS
, net::SpawnedTestServer::kLocalhost
,
2271 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2272 ASSERT_TRUE(https_server
.Start());
2273 GURL https_url
= https_server
.GetURL("files/prerender/prerender_page.html");
2274 PrerenderTestURL(https_url
,
2277 NavigateToDestURL();
2280 // Checks that client-issued redirects within an iframe in a prerendered
2281 // page will not count as an "alias" for the prerendered page.
2282 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2283 PrerenderClientRedirectInIframe
) {
2284 std::string redirect_path
= CreateClientRedirect(
2285 "/files/prerender/prerender_embedded_content.html");
2286 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
2287 replacement_text
.push_back(
2288 std::make_pair("REPLACE_WITH_URL", "/" + redirect_path
));
2289 std::string replacement_path
;
2290 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2291 "files/prerender/prerender_with_iframe.html",
2293 &replacement_path
));
2294 PrerenderTestURL(replacement_path
, FINAL_STATUS_USED
, 2);
2295 EXPECT_FALSE(UrlIsInPrerenderManager(
2296 "files/prerender/prerender_embedded_content.html"));
2297 NavigateToDestURL();
2300 // Checks that server-issued redirects work with prerendering.
2301 // This version navigates to the page which issues the redirection, rather
2302 // than the final destination page.
2303 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2304 PrerenderServerRedirectNavigateToFirst
) {
2305 PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
2308 NavigateToDestURL();
2311 // Checks that server-issued redirects work with prerendering.
2312 // This version navigates to the final destination page, rather than the
2313 // page which does the redirection.
2314 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2315 PrerenderServerRedirectNavigateToSecond
) {
2316 PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
2319 NavigateToURL("files/prerender/prerender_page.html");
2322 // Checks that server-issued redirects work with prerendering.
2323 // This version navigates to the final destination page, rather than the
2324 // page which does the redirection via a mouse click.
2325 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2326 PrerenderServerRedirectNavigateToSecondViaClick
) {
2327 GURL prerender_url
= test_server()->GetURL(
2328 CreateServerRedirect("files/prerender/prerender_page.html"));
2329 GURL destination_url
= test_server()->GetURL(
2330 "files/prerender/prerender_page.html");
2331 PrerenderTestURL(prerender_url
, FINAL_STATUS_USED
, 1);
2332 OpenURLViaClick(destination_url
);
2335 // Checks that server-issued redirects within an iframe in a prerendered
2336 // page will not count as an "alias" for the prerendered page.
2337 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderServerRedirectInIframe
) {
2338 std::string redirect_path
= CreateServerRedirect(
2339 "/files/prerender/prerender_embedded_content.html");
2340 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
2341 replacement_text
.push_back(
2342 std::make_pair("REPLACE_WITH_URL", "/" + redirect_path
));
2343 std::string replacement_path
;
2344 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2345 "files/prerender/prerender_with_iframe.html",
2347 &replacement_path
));
2348 PrerenderTestURL(replacement_path
, FINAL_STATUS_USED
, 1);
2349 EXPECT_FALSE(UrlIsInPrerenderManager(
2350 "files/prerender/prerender_embedded_content.html"));
2351 NavigateToDestURL();
2354 // Prerenders a page that contains an automatic download triggered through an
2355 // iframe. This should not prerender successfully.
2356 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderDownloadIframe
) {
2357 PrerenderTestURL("files/prerender/prerender_download_iframe.html",
2358 FINAL_STATUS_DOWNLOAD
,
2362 // Prerenders a page that contains an automatic download triggered through
2363 // Javascript changing the window.location. This should not prerender
2365 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderDownloadLocation
) {
2366 PrerenderTestURL(CreateClientRedirect("files/download-test1.lib"),
2367 FINAL_STATUS_DOWNLOAD
,
2371 // Prerenders a page that contains an automatic download triggered through a
2372 // client-issued redirect. This should not prerender successfully.
2373 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderDownloadClientRedirect
) {
2374 PrerenderTestURL("files/prerender/prerender_download_refresh.html",
2375 FINAL_STATUS_DOWNLOAD
,
2379 // Checks that the referrer is set when prerendering.
2380 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderReferrer
) {
2381 PrerenderTestURL("files/prerender/prerender_referrer.html",
2384 NavigateToDestURL();
2387 // Checks that the referrer is not set when prerendering and the source page is
2389 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2390 PrerenderNoSSLReferrer
) {
2391 UseHttpsSrcServer();
2392 PrerenderTestURL("files/prerender/prerender_no_referrer.html",
2395 NavigateToDestURL();
2398 // Checks that the referrer is set when prerendering is cancelled.
2399 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderCancelReferrer
) {
2400 scoped_ptr
<TestContentBrowserClient
> test_content_browser_client(
2401 new TestContentBrowserClient
);
2402 content::ContentBrowserClient
* original_browser_client
=
2403 content::SetBrowserClientForTesting(test_content_browser_client
.get());
2405 PrerenderTestURL("files/prerender/prerender_referrer.html",
2406 FINAL_STATUS_CANCELLED
,
2408 OpenDestURLViaClick();
2410 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2412 content::SetBrowserClientForTesting(original_browser_client
);
2415 // Checks that popups on a prerendered page cause cancellation.
2416 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPopup
) {
2417 PrerenderTestURL("files/prerender/prerender_popup.html",
2418 FINAL_STATUS_CREATE_NEW_WINDOW
,
2422 // Checks that registering a protocol handler causes cancellation.
2423 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderRegisterProtocolHandler
) {
2424 PrerenderTestURL("files/prerender/prerender_register_protocol_handler.html",
2425 FINAL_STATUS_REGISTER_PROTOCOL_HANDLER
,
2429 // Checks that renderers using excessive memory will be terminated.
2430 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderExcessiveMemory
) {
2431 ASSERT_TRUE(GetPrerenderManager());
2432 GetPrerenderManager()->mutable_config().max_bytes
= 30 * 1024 * 1024;
2433 // The excessive memory kill may happen before or after the load event as it
2434 // happens asynchronously with IPC calls. Even if the test does not start
2435 // allocating until after load, the browser process might notice before the
2436 // message gets through. This happens on XP debug bots because they're so
2437 // slow. Instead, don't bother checking the load event count.
2438 DisableLoadEventCheck();
2439 PrerenderTestURL("files/prerender/prerender_excessive_memory.html",
2440 FINAL_STATUS_MEMORY_LIMIT_EXCEEDED
, 0);
2443 // Checks shutdown code while a prerender is active.
2444 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderQuickQuit
) {
2445 DisableJavascriptCalls();
2446 DisableLoadEventCheck();
2447 PrerenderTestURL("files/prerender/prerender_page.html",
2448 FINAL_STATUS_APP_TERMINATING
,
2452 // Checks that we don't prerender in an infinite loop.
2453 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderInfiniteLoop
) {
2454 const char* const kHtmlFileA
= "files/prerender/prerender_infinite_a.html";
2455 const char* const kHtmlFileB
= "files/prerender/prerender_infinite_b.html";
2457 std::vector
<FinalStatus
> expected_final_status_queue
;
2458 expected_final_status_queue
.push_back(FINAL_STATUS_USED
);
2459 expected_final_status_queue
.push_back(FINAL_STATUS_APP_TERMINATING
);
2461 ScopedVector
<TestPrerender
> prerenders
=
2462 PrerenderTestURL(kHtmlFileA
, expected_final_status_queue
, 1);
2463 ASSERT_TRUE(prerenders
[0]->contents());
2464 // Assert that the pending prerender is in there already. This relies on the
2465 // fact that the renderer sends out the AddLinkRelPrerender IPC before sending
2466 // the page load one.
2467 EXPECT_EQ(2U, GetLinkPrerenderCount());
2468 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2470 // Next url should be in pending list but not an active entry.
2471 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB
));
2473 NavigateToDestURL();
2475 // Make sure the PrerenderContents for the next url is now in the manager and
2476 // not pending. This relies on pending prerenders being resolved in the same
2477 // event loop iteration as OnPrerenderStop.
2478 EXPECT_TRUE(UrlIsInPrerenderManager(kHtmlFileB
));
2479 EXPECT_EQ(1U, GetLinkPrerenderCount());
2480 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2483 // Checks that we don't prerender in an infinite loop and multiple links are
2484 // handled correctly.
2485 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2486 PrerenderInfiniteLoopMultiple
) {
2487 const char* const kHtmlFileA
=
2488 "files/prerender/prerender_infinite_a_multiple.html";
2489 const char* const kHtmlFileB
=
2490 "files/prerender/prerender_infinite_b_multiple.html";
2491 const char* const kHtmlFileC
=
2492 "files/prerender/prerender_infinite_c_multiple.html";
2494 // This test is conceptually simplest if concurrency is at two, since we
2495 // don't have to worry about which of kHtmlFileB or kHtmlFileC gets evicted.
2496 GetPrerenderManager()->mutable_config().max_link_concurrency
= 2;
2497 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher
= 2;
2499 std::vector
<FinalStatus
> expected_final_status_queue
;
2500 expected_final_status_queue
.push_back(FINAL_STATUS_USED
);
2501 expected_final_status_queue
.push_back(FINAL_STATUS_APP_TERMINATING
);
2502 expected_final_status_queue
.push_back(FINAL_STATUS_APP_TERMINATING
);
2504 ScopedVector
<TestPrerender
> prerenders
=
2505 PrerenderTestURL(kHtmlFileA
, expected_final_status_queue
, 1);
2506 ASSERT_TRUE(prerenders
[0]->contents());
2508 // Next url should be in pending list but not an active entry. This relies on
2509 // the fact that the renderer sends out the AddLinkRelPrerender IPC before
2510 // sending the page load one.
2511 EXPECT_EQ(3U, GetLinkPrerenderCount());
2512 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2513 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB
));
2514 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileC
));
2516 NavigateToDestURL();
2518 // Make sure the PrerenderContents for the next urls are now in the manager
2519 // and not pending. One and only one of the URLs (the last seen) should be the
2520 // active entry. This relies on pending prerenders being resolved in the same
2521 // event loop iteration as OnPrerenderStop.
2522 bool url_b_is_active_prerender
= UrlIsInPrerenderManager(kHtmlFileB
);
2523 bool url_c_is_active_prerender
= UrlIsInPrerenderManager(kHtmlFileC
);
2524 EXPECT_TRUE(url_b_is_active_prerender
&& url_c_is_active_prerender
);
2525 EXPECT_EQ(2U, GetLinkPrerenderCount());
2526 EXPECT_EQ(2U, GetRunningLinkPrerenderCount());
2529 // Checks that pending prerenders are aborted (and never launched) when launched
2530 // by a prerender that itself gets aborted.
2531 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderAbortPendingOnCancel
) {
2532 const char* const kHtmlFileA
= "files/prerender/prerender_infinite_a.html";
2533 const char* const kHtmlFileB
= "files/prerender/prerender_infinite_b.html";
2535 scoped_ptr
<TestPrerender
> prerender
=
2536 PrerenderTestURL(kHtmlFileA
, FINAL_STATUS_CANCELLED
, 1);
2537 ASSERT_TRUE(prerender
->contents());
2538 // Assert that the pending prerender is in there already. This relies on the
2539 // fact that the renderer sends out the AddLinkRelPrerender IPC before sending
2540 // the page load one.
2541 EXPECT_EQ(2U, GetLinkPrerenderCount());
2542 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2544 // Next url should be in pending list but not an active entry.
2545 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB
));
2547 // Cancel the prerender.
2548 GetPrerenderManager()->CancelAllPrerenders();
2549 prerender
->WaitForStop();
2551 // All prerenders are now gone.
2552 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
2555 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, OpenTaskManagerBeforePrerender
) {
2556 const base::string16 any_prerender
= MatchTaskManagerPrerender("*");
2557 const base::string16 any_tab
= MatchTaskManagerTab("*");
2558 const base::string16 original
= MatchTaskManagerTab("Preloader");
2559 const base::string16 prerender
= MatchTaskManagerPrerender("Prerender Page");
2560 const base::string16 final
= MatchTaskManagerTab("Prerender Page");
2562 // Show the task manager. This populates the model.
2563 chrome::OpenTaskManager(current_browser());
2564 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab
));
2565 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender
));
2567 // Prerender a page in addition to the original tab.
2568 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
2570 // A TaskManager entry should appear like "Prerender: Prerender Page"
2571 // alongside the original tab entry. There should be just these two entries.
2572 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, prerender
));
2573 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, original
));
2574 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, final
));
2575 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_prerender
));
2576 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab
));
2578 // Swap in the prerendered content.
2579 NavigateToDestURL();
2581 // The "Prerender: " TaskManager entry should disappear, being replaced by a
2582 // "Tab: Prerender Page" entry, and nothing else.
2583 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, prerender
));
2584 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, original
));
2585 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final
));
2586 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab
));
2587 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender
));
2590 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, OpenTaskManagerAfterPrerender
) {
2591 const base::string16 any_prerender
= MatchTaskManagerPrerender("*");
2592 const base::string16 any_tab
= MatchTaskManagerTab("*");
2593 const base::string16 original
= MatchTaskManagerTab("Preloader");
2594 const base::string16 prerender
= MatchTaskManagerPrerender("Prerender Page");
2595 const base::string16 final
= MatchTaskManagerTab("Prerender Page");
2597 // Start with two resources.
2598 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
2600 // Show the task manager. This populates the model. Importantly, we're doing
2601 // this after the prerender WebContents already exists - the task manager
2602 // needs to find it, it can't just listen for creation.
2603 chrome::OpenTaskManager(current_browser());
2605 // A TaskManager entry should appear like "Prerender: Prerender Page"
2606 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, prerender
));
2607 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, original
));
2608 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, final
));
2609 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_prerender
));
2610 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab
));
2613 NavigateToDestURL();
2615 // The "Prerender: Prerender Page" TaskManager row should disappear, being
2616 // replaced by "Tab: Prerender Page"
2617 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, prerender
));
2618 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, original
));
2619 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final
));
2620 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab
));
2621 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender
));
2624 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, OpenTaskManagerAfterSwapIn
) {
2625 const base::string16 any_prerender
= MatchTaskManagerPrerender("*");
2626 const base::string16 any_tab
= MatchTaskManagerTab("*");
2627 const base::string16 final
= MatchTaskManagerTab("Prerender Page");
2629 // Prerender, and swap it in.
2630 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
2631 NavigateToDestURL();
2633 // Show the task manager. This populates the model. Importantly, we're doing
2634 // this after the prerender has been swapped in.
2635 chrome::OpenTaskManager(current_browser());
2637 // We should not see a prerender resource in the task manager, just a normal
2639 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final
));
2640 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab
));
2641 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender
));
2644 // Checks that audio loads are deferred on prerendering.
2645 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHTML5Audio
) {
2646 PrerenderTestURL("files/prerender/prerender_html5_audio.html",
2649 NavigateToDestURL();
2650 WaitForASCIITitle(GetActiveWebContents(), kPassTitle
);
2653 // Checks that audio loads are deferred on prerendering and played back when
2654 // the prerender is swapped in if autoplay is set.
2655 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHTML5AudioAutoplay
) {
2656 PrerenderTestURL("files/prerender/prerender_html5_audio_autoplay.html",
2659 NavigateToDestURL();
2660 WaitForASCIITitle(GetActiveWebContents(), kPassTitle
);
2663 // Checks that audio loads are deferred on prerendering and played back when
2664 // the prerender is swapped in if js starts playing.
2665 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHTML5AudioJsplay
) {
2666 PrerenderTestURL("files/prerender/prerender_html5_audio_jsplay.html",
2669 NavigateToDestURL();
2670 WaitForASCIITitle(GetActiveWebContents(), kPassTitle
);
2673 // Checks that video loads are deferred on prerendering.
2674 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHTML5Video
) {
2675 PrerenderTestURL("files/prerender/prerender_html5_video.html",
2678 NavigateToDestURL();
2679 WaitForASCIITitle(GetActiveWebContents(), kPassTitle
);
2682 // Checks that video tags inserted by javascript are deferred and played
2683 // correctly on swap in.
2684 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHTML5VideoJs
) {
2685 PrerenderTestURL("files/prerender/prerender_html5_video_script.html",
2688 NavigateToDestURL();
2689 WaitForASCIITitle(GetActiveWebContents(), kPassTitle
);
2692 // Checks for correct network events by using a busy sleep the javascript.
2693 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHTML5VideoNetwork
) {
2694 DisableJavascriptCalls();
2695 scoped_ptr
<TestPrerender
> prerender
=
2696 PrerenderTestURL("files/prerender/prerender_html5_video_network.html",
2699 WaitForASCIITitle(prerender
->contents()->prerender_contents(), kReadyTitle
);
2700 EXPECT_TRUE(DidPrerenderPass(prerender
->contents()->prerender_contents()));
2701 NavigateToDestURL();
2702 WaitForASCIITitle(GetActiveWebContents(), kPassTitle
);
2705 // Checks that scripts can retrieve the correct window size while prerendering.
2706 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderWindowSize
) {
2707 PrerenderTestURL("files/prerender/prerender_size.html",
2710 NavigateToDestURL();
2713 // TODO(jam): http://crbug.com/350550
2714 #if !(defined(OS_CHROMEOS) && defined(ADDRESS_SANITIZER))
2716 // Checks that prerenderers will terminate when the RenderView crashes.
2717 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderRendererCrash
) {
2718 scoped_ptr
<TestPrerender
> prerender
=
2719 PrerenderTestURL("files/prerender/prerender_page.html",
2720 FINAL_STATUS_RENDERER_CRASHED
,
2723 // Navigate to about:crash and then wait for the renderer to crash.
2724 ASSERT_TRUE(prerender
->contents());
2725 ASSERT_TRUE(prerender
->contents()->prerender_contents());
2726 prerender
->contents()->prerender_contents()->GetController().
2728 GURL(content::kChromeUICrashURL
),
2729 content::Referrer(),
2730 ui::PAGE_TRANSITION_TYPED
,
2732 prerender
->WaitForStop();
2736 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2737 PrerenderPageWithFragment
) {
2738 PrerenderTestURL("files/prerender/prerender_page.html#fragment",
2742 ChannelDestructionWatcher channel_close_watcher
;
2743 channel_close_watcher
.WatchChannel(browser()->tab_strip_model()->
2744 GetActiveWebContents()->GetRenderProcessHost());
2745 NavigateToDestURL();
2746 channel_close_watcher
.WaitForChannelClose();
2748 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
2751 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2752 PrerenderPageWithRedirectedFragment
) {
2754 CreateClientRedirect("files/prerender/prerender_page.html#fragment"),
2758 ChannelDestructionWatcher channel_close_watcher
;
2759 channel_close_watcher
.WatchChannel(browser()->tab_strip_model()->
2760 GetActiveWebContents()->GetRenderProcessHost());
2761 NavigateToDestURL();
2762 channel_close_watcher
.WaitForChannelClose();
2764 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
2767 // Checks that we do not use a prerendered page when navigating from
2768 // the main page to a fragment.
2769 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2770 PrerenderPageNavigateFragment
) {
2771 PrerenderTestURL("files/prerender/no_prerender_page.html",
2772 FINAL_STATUS_APP_TERMINATING
,
2774 NavigateToURLWithDisposition(
2775 "files/prerender/no_prerender_page.html#fragment",
2776 CURRENT_TAB
, false);
2779 // Checks that we do not use a prerendered page when we prerender a fragment
2780 // but navigate to the main page.
2781 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2782 PrerenderFragmentNavigatePage
) {
2783 PrerenderTestURL("files/prerender/no_prerender_page.html#fragment",
2784 FINAL_STATUS_APP_TERMINATING
,
2786 NavigateToURLWithDisposition(
2787 "files/prerender/no_prerender_page.html",
2788 CURRENT_TAB
, false);
2791 // Checks that we do not use a prerendered page when we prerender a fragment
2792 // but navigate to a different fragment on the same page.
2793 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2794 PrerenderFragmentNavigateFragment
) {
2795 PrerenderTestURL("files/prerender/no_prerender_page.html#other_fragment",
2796 FINAL_STATUS_APP_TERMINATING
,
2798 NavigateToURLWithDisposition(
2799 "files/prerender/no_prerender_page.html#fragment",
2800 CURRENT_TAB
, false);
2803 // Checks that we do not use a prerendered page when the page uses a client
2804 // redirect to refresh from a fragment on the same page.
2805 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2806 PrerenderClientRedirectFromFragment
) {
2808 CreateClientRedirect("files/prerender/no_prerender_page.html#fragment"),
2809 FINAL_STATUS_APP_TERMINATING
,
2811 NavigateToURLWithDisposition(
2812 "files/prerender/no_prerender_page.html",
2813 CURRENT_TAB
, false);
2816 // Checks that we do not use a prerendered page when the page uses a client
2817 // redirect to refresh to a fragment on the same page.
2818 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2819 PrerenderClientRedirectToFragment
) {
2821 CreateClientRedirect("files/prerender/no_prerender_page.html"),
2822 FINAL_STATUS_APP_TERMINATING
,
2824 NavigateToURLWithDisposition(
2825 "files/prerender/no_prerender_page.html#fragment",
2826 CURRENT_TAB
, false);
2829 // Checks that we correctly use a prerendered page when the page uses JS to set
2830 // the window.location.hash to a fragment on the same page.
2831 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2832 PrerenderPageChangeFragmentLocationHash
) {
2833 PrerenderTestURL("files/prerender/prerender_fragment_location_hash.html",
2836 NavigateToURL("files/prerender/prerender_fragment_location_hash.html");
2839 // Checks that prerendering a PNG works correctly.
2840 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderImagePng
) {
2841 DisableJavascriptCalls();
2842 PrerenderTestURL("files/prerender/image.png", FINAL_STATUS_USED
, 1);
2843 NavigateToDestURL();
2846 // Checks that prerendering a JPG works correctly.
2847 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderImageJpeg
) {
2848 DisableJavascriptCalls();
2849 PrerenderTestURL("files/prerender/image.jpeg", FINAL_STATUS_USED
, 1);
2850 NavigateToDestURL();
2853 // Checks that a prerender of a CRX will result in a cancellation due to
2855 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderCrx
) {
2856 PrerenderTestURL("files/prerender/extension.crx", FINAL_STATUS_DOWNLOAD
, 0);
2859 // Checks that xhr GET requests allow prerenders.
2860 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderXhrGet
) {
2861 PrerenderTestURL("files/prerender/prerender_xhr_get.html",
2864 NavigateToDestURL();
2867 // Checks that xhr HEAD requests allow prerenders.
2868 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderXhrHead
) {
2869 PrerenderTestURL("files/prerender/prerender_xhr_head.html",
2872 NavigateToDestURL();
2875 // Checks that xhr OPTIONS requests allow prerenders.
2876 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderXhrOptions
) {
2877 PrerenderTestURL("files/prerender/prerender_xhr_options.html",
2880 NavigateToDestURL();
2883 // Checks that xhr TRACE requests allow prerenders.
2884 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderXhrTrace
) {
2885 PrerenderTestURL("files/prerender/prerender_xhr_trace.html",
2888 NavigateToDestURL();
2891 // Checks that xhr POST requests allow prerenders.
2892 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderXhrPost
) {
2893 PrerenderTestURL("files/prerender/prerender_xhr_post.html",
2896 NavigateToDestURL();
2899 // Checks that xhr PUT cancels prerenders.
2900 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderXhrPut
) {
2901 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
2902 FINAL_STATUS_INVALID_HTTP_METHOD
,
2906 // Checks that xhr DELETE cancels prerenders.
2907 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderXhrDelete
) {
2908 PrerenderTestURL("files/prerender/prerender_xhr_delete.html",
2909 FINAL_STATUS_INVALID_HTTP_METHOD
,
2913 // Checks that a top-level page which would trigger an SSL error is canceled.
2914 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSSLErrorTopLevel
) {
2915 net::SpawnedTestServer::SSLOptions ssl_options
;
2916 ssl_options
.server_certificate
=
2917 net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME
;
2918 net::SpawnedTestServer
https_server(
2919 net::SpawnedTestServer::TYPE_HTTPS
, ssl_options
,
2920 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2921 ASSERT_TRUE(https_server
.Start());
2922 GURL https_url
= https_server
.GetURL("files/prerender/prerender_page.html");
2923 PrerenderTestURL(https_url
,
2924 FINAL_STATUS_SSL_ERROR
,
2928 // Checks that an SSL error that comes from a subresource does not cancel
2929 // the page. Non-main-frame requests are simply cancelled if they run into
2931 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSSLErrorSubresource
) {
2932 net::SpawnedTestServer::SSLOptions ssl_options
;
2933 ssl_options
.server_certificate
=
2934 net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME
;
2935 net::SpawnedTestServer
https_server(
2936 net::SpawnedTestServer::TYPE_HTTPS
, ssl_options
,
2937 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2938 ASSERT_TRUE(https_server
.Start());
2939 GURL https_url
= https_server
.GetURL("files/prerender/image.jpeg");
2940 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
2941 replacement_text
.push_back(
2942 std::make_pair("REPLACE_WITH_IMAGE_URL", https_url
.spec()));
2943 std::string replacement_path
;
2944 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2945 "files/prerender/prerender_with_image.html",
2947 &replacement_path
));
2948 PrerenderTestURL(replacement_path
, FINAL_STATUS_USED
, 1);
2949 NavigateToDestURL();
2952 // Checks that an SSL error that comes from an iframe does not cancel
2953 // the page. Non-main-frame requests are simply cancelled if they run into
2955 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSSLErrorIframe
) {
2956 net::SpawnedTestServer::SSLOptions ssl_options
;
2957 ssl_options
.server_certificate
=
2958 net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME
;
2959 net::SpawnedTestServer
https_server(
2960 net::SpawnedTestServer::TYPE_HTTPS
, ssl_options
,
2961 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2962 ASSERT_TRUE(https_server
.Start());
2963 GURL https_url
= https_server
.GetURL(
2964 "files/prerender/prerender_embedded_content.html");
2965 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
2966 replacement_text
.push_back(
2967 std::make_pair("REPLACE_WITH_URL", https_url
.spec()));
2968 std::string replacement_path
;
2969 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2970 "files/prerender/prerender_with_iframe.html",
2972 &replacement_path
));
2973 PrerenderTestURL(replacement_path
, FINAL_STATUS_USED
, 1);
2974 NavigateToDestURL();
2977 // Checks that we cancel correctly when window.print() is called.
2978 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPrint
) {
2979 DisableLoadEventCheck();
2980 PrerenderTestURL("files/prerender/prerender_print.html",
2981 FINAL_STATUS_WINDOW_PRINT
,
2985 // Checks that if a page is opened in a new window by javascript and both the
2986 // pages are in the same domain, the prerendered page is not used, due to
2987 // there being other tabs in the same browsing instance.
2988 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
2989 PrerenderSameDomainWindowOpenerWindowOpen
) {
2990 PrerenderTestURL("files/prerender/prerender_page.html",
2991 FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE
,
2993 OpenDestURLViaWindowOpen();
2996 // Checks that if a page is opened due to click on a href with target="_blank"
2997 // and both pages are in the same domain the prerendered page is not used, due
2998 // there being other tabs in the same browsing instance.
2999 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3000 PrerenderSameDomainWindowOpenerClickTarget
) {
3001 PrerenderTestURL("files/prerender/prerender_page.html",
3002 FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE
,
3004 OpenDestURLViaClickTarget();
3007 // Checks that prerenders do not get swapped into target pages that have opened
3008 // a popup, even if the target page itself does not have an opener.
3009 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderTargetHasPopup
) {
3010 PrerenderTestURL("files/prerender/prerender_page.html",
3011 FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE
,
3013 OpenURLViaWindowOpen(GURL(url::kAboutBlankURL
));
3014 NavigateToDestURLWithDisposition(CURRENT_TAB
, false);
3017 class TestClientCertStore
: public net::ClientCertStore
{
3019 TestClientCertStore() {}
3020 virtual ~TestClientCertStore() {}
3022 // net::ClientCertStore:
3023 virtual void GetClientCerts(const net::SSLCertRequestInfo
& cert_request_info
,
3024 net::CertificateList
* selected_certs
,
3025 const base::Closure
& callback
) override
{
3026 *selected_certs
= net::CertificateList(
3027 1, scoped_refptr
<net::X509Certificate
>(
3028 new net::X509Certificate("test", "test", base::Time(), base::Time())));
3033 scoped_ptr
<net::ClientCertStore
> CreateCertStore() {
3034 return scoped_ptr
<net::ClientCertStore
>(new TestClientCertStore
);
3037 // Checks that a top-level page which would normally request an SSL client
3038 // certificate will never be seen since it's an https top-level resource.
3039 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3040 PrerenderSSLClientCertTopLevel
) {
3041 ProfileIOData::FromResourceContext(
3042 current_browser()->profile()->GetResourceContext())->
3043 set_client_cert_store_factory_for_testing(
3044 base::Bind(&CreateCertStore
));
3045 net::SpawnedTestServer::SSLOptions ssl_options
;
3046 ssl_options
.request_client_certificate
= true;
3047 net::SpawnedTestServer
https_server(
3048 net::SpawnedTestServer::TYPE_HTTPS
, ssl_options
,
3049 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
3050 ASSERT_TRUE(https_server
.Start());
3051 GURL https_url
= https_server
.GetURL("files/prerender/prerender_page.html");
3052 PrerenderTestURL(https_url
, FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED
, 0);
3055 // Checks that an SSL Client Certificate request that originates from a
3056 // subresource will cancel the prerendered page.
3057 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3058 PrerenderSSLClientCertSubresource
) {
3059 ProfileIOData::FromResourceContext(
3060 current_browser()->profile()->GetResourceContext())->
3061 set_client_cert_store_factory_for_testing(
3062 base::Bind(&CreateCertStore
));
3063 net::SpawnedTestServer::SSLOptions ssl_options
;
3064 ssl_options
.request_client_certificate
= true;
3065 net::SpawnedTestServer
https_server(
3066 net::SpawnedTestServer::TYPE_HTTPS
, ssl_options
,
3067 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
3068 ASSERT_TRUE(https_server
.Start());
3069 GURL https_url
= https_server
.GetURL("files/prerender/image.jpeg");
3070 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3071 replacement_text
.push_back(
3072 std::make_pair("REPLACE_WITH_IMAGE_URL", https_url
.spec()));
3073 std::string replacement_path
;
3074 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3075 "files/prerender/prerender_with_image.html",
3077 &replacement_path
));
3078 PrerenderTestURL(replacement_path
,
3079 FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED
,
3083 // Checks that an SSL Client Certificate request that originates from an
3084 // iframe will cancel the prerendered page.
3085 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSSLClientCertIframe
) {
3086 ProfileIOData::FromResourceContext(
3087 current_browser()->profile()->GetResourceContext())->
3088 set_client_cert_store_factory_for_testing(
3089 base::Bind(&CreateCertStore
));
3090 net::SpawnedTestServer::SSLOptions ssl_options
;
3091 ssl_options
.request_client_certificate
= true;
3092 net::SpawnedTestServer
https_server(
3093 net::SpawnedTestServer::TYPE_HTTPS
, ssl_options
,
3094 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
3095 ASSERT_TRUE(https_server
.Start());
3096 GURL https_url
= https_server
.GetURL(
3097 "files/prerender/prerender_embedded_content.html");
3098 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3099 replacement_text
.push_back(
3100 std::make_pair("REPLACE_WITH_URL", https_url
.spec()));
3101 std::string replacement_path
;
3102 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3103 "files/prerender/prerender_with_iframe.html",
3105 &replacement_path
));
3106 PrerenderTestURL(replacement_path
,
3107 FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED
,
3111 #if defined(FULL_SAFE_BROWSING)
3112 // Ensures that we do not prerender pages with a safe browsing
3114 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSafeBrowsingTopLevel
) {
3115 GURL url
= test_server()->GetURL("files/prerender/prerender_page.html");
3116 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3117 url
, SB_THREAT_TYPE_URL_MALWARE
);
3118 PrerenderTestURL("files/prerender/prerender_page.html",
3119 FINAL_STATUS_SAFE_BROWSING
, 0);
3122 // Ensures that server redirects to a malware page will cancel prerenders.
3123 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3124 PrerenderSafeBrowsingServerRedirect
) {
3125 GURL url
= test_server()->GetURL("files/prerender/prerender_page.html");
3126 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3127 url
, SB_THREAT_TYPE_URL_MALWARE
);
3128 PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
3129 FINAL_STATUS_SAFE_BROWSING
,
3133 // Ensures that client redirects to a malware page will cancel prerenders.
3134 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3135 PrerenderSafeBrowsingClientRedirect
) {
3136 GURL url
= test_server()->GetURL("files/prerender/prerender_page.html");
3137 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3138 url
, SB_THREAT_TYPE_URL_MALWARE
);
3139 PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
3140 FINAL_STATUS_SAFE_BROWSING
,
3144 // Ensures that we do not prerender pages which have a malware subresource.
3145 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSafeBrowsingSubresource
) {
3146 GURL image_url
= test_server()->GetURL("files/prerender/image.jpeg");
3147 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3148 image_url
, SB_THREAT_TYPE_URL_MALWARE
);
3149 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3150 replacement_text
.push_back(
3151 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url
.spec()));
3152 std::string replacement_path
;
3153 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3154 "files/prerender/prerender_with_image.html",
3156 &replacement_path
));
3157 PrerenderTestURL(replacement_path
,
3158 FINAL_STATUS_SAFE_BROWSING
,
3162 // Ensures that we do not prerender pages which have a malware iframe.
3163 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSafeBrowsingIframe
) {
3164 GURL iframe_url
= test_server()->GetURL(
3165 "files/prerender/prerender_embedded_content.html");
3166 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3167 iframe_url
, SB_THREAT_TYPE_URL_MALWARE
);
3168 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3169 replacement_text
.push_back(
3170 std::make_pair("REPLACE_WITH_URL", iframe_url
.spec()));
3171 std::string replacement_path
;
3172 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3173 "files/prerender/prerender_with_iframe.html",
3175 &replacement_path
));
3176 PrerenderTestURL(replacement_path
,
3177 FINAL_STATUS_SAFE_BROWSING
,
3183 // Checks that a local storage read will not cause prerender to fail.
3184 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderLocalStorageRead
) {
3185 PrerenderTestURL("files/prerender/prerender_localstorage_read.html",
3188 NavigateToDestURL();
3191 // Checks that a local storage write will not cause prerender to fail.
3192 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderLocalStorageWrite
) {
3193 PrerenderTestURL("files/prerender/prerender_localstorage_write.html",
3196 NavigateToDestURL();
3199 // Checks that the favicon is properly loaded on prerender.
3200 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderFavicon
) {
3201 scoped_ptr
<TestPrerender
> prerender
=
3202 PrerenderTestURL("files/prerender/prerender_favicon.html",
3205 NavigateToDestURL();
3207 if (!FaviconTabHelper::FromWebContents(
3208 GetActiveWebContents())->FaviconIsValid()) {
3209 // If the favicon has not been set yet, wait for it to be.
3210 content::WindowedNotificationObserver
favicon_update_watcher(
3211 chrome::NOTIFICATION_FAVICON_UPDATED
,
3212 content::Source
<WebContents
>(GetActiveWebContents()));
3213 favicon_update_watcher
.Wait();
3215 EXPECT_TRUE(FaviconTabHelper::FromWebContents(
3216 GetActiveWebContents())->FaviconIsValid());
3219 // Checks that when a prerendered page is swapped in to a referring page, the
3220 // unload handlers on the referring page are executed.
3221 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderUnload
) {
3222 // Matches URL in prerender_loader_with_unload.html.
3223 const GURL
unload_url("http://unload-url.test");
3224 base::FilePath empty_file
= ui_test_utils::GetTestFilePath(
3225 base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
3226 RequestCounter unload_counter
;
3227 BrowserThread::PostTask(
3228 BrowserThread::IO
, FROM_HERE
,
3229 base::Bind(&CreateCountingInterceptorOnIO
,
3230 unload_url
, empty_file
, unload_counter
.AsWeakPtr()));
3232 set_loader_path("files/prerender/prerender_loader_with_unload.html");
3233 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
3234 NavigateToDestURL();
3235 unload_counter
.WaitForCount(1);
3238 // Checks that a hanging unload on the referring page of a prerender swap does
3239 // not crash the browser on exit.
3240 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHangingUnload
) {
3241 // Matches URL in prerender_loader_with_unload.html.
3242 const GURL
hang_url("http://unload-url.test");
3243 base::FilePath empty_file
= ui_test_utils::GetTestFilePath(
3244 base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
3245 BrowserThread::PostTask(
3246 BrowserThread::IO
, FROM_HERE
,
3247 base::Bind(&CreateHangingFirstRequestInterceptorOnIO
,
3248 hang_url
, empty_file
,
3251 set_loader_path("files/prerender/prerender_loader_with_unload.html");
3252 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
3253 NavigateToDestURL();
3257 // Checks that when the history is cleared, prerendering is cancelled and
3258 // prerendering history is cleared.
3259 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClearHistory
) {
3260 scoped_ptr
<TestPrerender
> prerender
=
3261 PrerenderTestURL("files/prerender/prerender_page.html",
3262 FINAL_STATUS_CACHE_OR_HISTORY_CLEARED
,
3265 ClearBrowsingData(current_browser(), BrowsingDataRemover::REMOVE_HISTORY
);
3266 prerender
->WaitForStop();
3268 // Make sure prerender history was cleared.
3269 EXPECT_EQ(0, GetHistoryLength());
3272 // Checks that when the cache is cleared, prerenders are cancelled but
3273 // prerendering history is not cleared.
3274 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClearCache
) {
3275 scoped_ptr
<TestPrerender
> prerender
=
3276 PrerenderTestURL("files/prerender/prerender_page.html",
3277 FINAL_STATUS_CACHE_OR_HISTORY_CLEARED
,
3280 ClearBrowsingData(current_browser(), BrowsingDataRemover::REMOVE_CACHE
);
3281 prerender
->WaitForStop();
3283 // Make sure prerender history was not cleared. Not a vital behavior, but
3284 // used to compare with PrerenderClearHistory test.
3285 EXPECT_EQ(1, GetHistoryLength());
3288 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderCancelAll
) {
3289 scoped_ptr
<TestPrerender
> prerender
=
3290 PrerenderTestURL("files/prerender/prerender_page.html",
3291 FINAL_STATUS_CANCELLED
,
3294 GetPrerenderManager()->CancelAllPrerenders();
3295 prerender
->WaitForStop();
3297 EXPECT_FALSE(prerender
->contents());
3300 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderEvents
) {
3301 scoped_ptr
<TestPrerender
> prerender
=
3302 PrerenderTestURL("files/prerender/prerender_page.html",
3303 FINAL_STATUS_CANCELLED
, 1);
3305 GetPrerenderManager()->CancelAllPrerenders();
3306 prerender
->WaitForStop();
3308 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
3309 EXPECT_TRUE(DidReceivePrerenderStopEventForLinkNumber(0));
3310 EXPECT_FALSE(HadPrerenderEventErrors());
3313 // Cancels the prerender of a page with its own prerender. The second prerender
3314 // should never be started.
3315 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3316 PrerenderCancelPrerenderWithPrerender
) {
3317 scoped_ptr
<TestPrerender
> prerender
=
3318 PrerenderTestURL("files/prerender/prerender_infinite_a.html",
3319 FINAL_STATUS_CANCELLED
,
3322 GetPrerenderManager()->CancelAllPrerenders();
3323 prerender
->WaitForStop();
3325 EXPECT_FALSE(prerender
->contents());
3328 // Prerendering and history tests.
3329 // The prerendered page is navigated to in several ways [navigate via
3330 // omnibox, click on link, key-modified click to open in background tab, etc],
3331 // followed by a navigation to another page from the prerendered page, followed
3332 // by a back navigation.
3334 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderNavigateClickGoBack
) {
3335 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3338 NavigateToDestURL();
3339 ClickToNextPageAfterPrerender();
3340 GoBackToPrerender();
3343 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderNavigateNavigateGoBack
) {
3344 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3347 NavigateToDestURL();
3348 NavigateToNextPageAfterPrerender();
3349 GoBackToPrerender();
3352 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClickClickGoBack
) {
3353 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3356 OpenDestURLViaClick();
3357 ClickToNextPageAfterPrerender();
3358 GoBackToPrerender();
3361 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClickNavigateGoBack
) {
3362 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3365 OpenDestURLViaClick();
3366 NavigateToNextPageAfterPrerender();
3367 GoBackToPrerender();
3370 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClickNewWindow
) {
3371 // Prerender currently doesn't interpose on this navigation.
3372 // http://crbug.com/345474.
3373 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3376 OpenDestURLViaClickNewWindow();
3379 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClickNewForegroundTab
) {
3380 // Prerender currently doesn't interpose on this navigation.
3381 // http://crbug.com/345474.
3382 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3385 OpenDestURLViaClickNewForegroundTab();
3388 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderClickNewBackgroundTab
) {
3389 // Prerender currently doesn't interpose on this navigation.
3390 // http://crbug.com/345474.
3391 scoped_ptr
<TestPrerender
> prerender
=
3392 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3395 ASSERT_TRUE(prerender
->contents());
3396 prerender
->contents()->set_should_be_shown(false);
3397 OpenDestURLViaClickNewBackgroundTab();
3400 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3401 NavigateToPrerenderedPageWhenDevToolsAttached
) {
3402 DisableJavascriptCalls();
3403 WebContents
* web_contents
=
3404 current_browser()->tab_strip_model()->GetActiveWebContents();
3405 scoped_refptr
<DevToolsAgentHost
> agent(
3406 DevToolsAgentHost::GetOrCreateFor(web_contents
));
3407 FakeDevToolsClient client
;
3408 agent
->AttachClient(&client
);
3409 const char* url
= "files/prerender/prerender_page.html";
3410 PrerenderTestURL(url
, FINAL_STATUS_DEVTOOLS_ATTACHED
, 1);
3411 NavigateToURLWithDisposition(url
, CURRENT_TAB
, false);
3412 agent
->DetachClient();
3415 // Validate that the sessionStorage namespace remains the same when swapping
3416 // in a prerendered page.
3417 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSessionStorage
) {
3418 set_loader_path("files/prerender/prerender_loader_with_session_storage.html");
3419 PrerenderTestURL(GetCrossDomainTestUrl("files/prerender/prerender_page.html"),
3422 NavigateToDestURL();
3423 GoBackToPageBeforePrerender();
3426 // Checks that the control group works. An XHR PUT cannot be detected in the
3428 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, ControlGroup
) {
3429 RestorePrerenderMode restore_prerender_mode
;
3430 PrerenderManager::SetMode(
3431 PrerenderManager::PRERENDER_MODE_EXPERIMENT_CONTROL_GROUP
);
3432 DisableJavascriptCalls();
3433 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3434 FINAL_STATUS_WOULD_HAVE_BEEN_USED
, 0);
3435 NavigateToDestURL();
3438 // Checks that the control group correctly hits WOULD_HAVE_BEEN_USED
3439 // renderer-initiated navigations. (This verifies that the ShouldFork logic
3440 // behaves correctly.)
3441 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, ControlGroupRendererInitiated
) {
3442 RestorePrerenderMode restore_prerender_mode
;
3443 PrerenderManager::SetMode(
3444 PrerenderManager::PRERENDER_MODE_EXPERIMENT_CONTROL_GROUP
);
3445 DisableJavascriptCalls();
3446 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3447 FINAL_STATUS_WOULD_HAVE_BEEN_USED
, 0);
3448 OpenDestURLViaClick();
3451 // Make sure that the MatchComplete dummy works in the normal case. Once
3452 // a prerender is cancelled because of a script, a dummy must be created to
3453 // account for the MatchComplete case, and it must have a final status of
3454 // FINAL_STATUS_WOULD_HAVE_BEEN_USED.
3455 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, MatchCompleteDummy
) {
3456 RestorePrerenderMode restore_prerender_mode
;
3457 PrerenderManager::SetMode(
3458 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP
);
3460 std::vector
<FinalStatus
> expected_final_status_queue
;
3461 expected_final_status_queue
.push_back(FINAL_STATUS_INVALID_HTTP_METHOD
);
3462 expected_final_status_queue
.push_back(FINAL_STATUS_WOULD_HAVE_BEEN_USED
);
3463 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3464 expected_final_status_queue
, 1);
3465 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3466 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3467 histogram_tester().ExpectTotalCount(
3468 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3469 histogram_tester().ExpectTotalCount(
3470 "Prerender.websame_PrerenderNotSwappedInPLT", 1);
3472 NavigateToDestURL();
3473 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3474 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
3476 histogram_tester().ExpectTotalCount(
3477 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3480 // Verify that a navigation that hits a MatchComplete dummy while another is in
3481 // progress does not also classify the previous navigation as a MatchComplete.
3482 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3483 MatchCompleteDummyCancelNavigation
) {
3484 RestorePrerenderMode restore_prerender_mode
;
3485 PrerenderManager::SetMode(
3486 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP
);
3488 // Arrange for a URL to hang.
3489 const GURL
kNoCommitUrl("http://never-respond.example.com");
3490 base::FilePath
file(FILE_PATH_LITERAL(
3491 "chrome/test/data/prerender/prerender_page.html"));
3492 base::RunLoop hang_loop
;
3493 BrowserThread::PostTask(
3494 BrowserThread::IO
, FROM_HERE
,
3495 base::Bind(&CreateHangingFirstRequestInterceptorOnIO
, kNoCommitUrl
,
3496 file
, hang_loop
.QuitClosure()));
3498 // First, fire a prerender that aborts after it completes its load.
3499 std::vector
<FinalStatus
> expected_final_status_queue
;
3500 expected_final_status_queue
.push_back(FINAL_STATUS_INVALID_HTTP_METHOD
);
3501 expected_final_status_queue
.push_back(FINAL_STATUS_WOULD_HAVE_BEEN_USED
);
3502 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3503 expected_final_status_queue
, 1);
3504 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3505 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3506 histogram_tester().ExpectTotalCount(
3507 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3508 histogram_tester().ExpectTotalCount(
3509 "Prerender.websame_PrerenderNotSwappedInPLT", 1);
3511 // Open the hanging URL in a new tab. Wait for both the new tab to open and
3512 // the hanging request to be scheduled.
3513 ui_test_utils::NavigateToURLWithDisposition(
3514 current_browser(), kNoCommitUrl
, NEW_FOREGROUND_TAB
,
3515 ui_test_utils::BROWSER_TEST_WAIT_FOR_TAB
);
3518 // Now interrupt that navigation and navigate to the destination URL. This
3519 // should forcibly complete the previous navigation and also complete a
3520 // WOULD_HAVE_BEEN_PRERENDERED navigation.
3521 NavigateToDestURL();
3522 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 2);
3523 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3524 histogram_tester().ExpectTotalCount(
3525 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3526 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3527 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
3529 histogram_tester().ExpectTotalCount(
3530 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3533 class PrerenderBrowserTestWithNaCl
: public PrerenderBrowserTest
{
3535 PrerenderBrowserTestWithNaCl() {}
3536 virtual ~PrerenderBrowserTestWithNaCl() {}
3538 virtual void SetUpCommandLine(CommandLine
* command_line
) override
{
3539 PrerenderBrowserTest::SetUpCommandLine(command_line
);
3540 command_line
->AppendSwitch(switches::kEnableNaCl
);
3544 // Check that NaCl plugins work when enabled, with prerendering.
3545 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithNaCl
,
3546 PrerenderNaClPluginEnabled
) {
3547 #if defined(OS_WIN) && defined(USE_ASH)
3548 // Disable this test in Metro+Ash for now (http://crbug.com/262796).
3549 if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kAshBrowserTests
))
3553 PrerenderTestURL("files/prerender/prerender_plugin_nacl_enabled.html",
3556 NavigateToDestURL();
3558 // To avoid any chance of a race, we have to let the script send its response
3560 WebContents
* web_contents
=
3561 browser()->tab_strip_model()->GetActiveWebContents();
3562 bool display_test_result
= false;
3563 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(web_contents
,
3564 "DidDisplayReallyPass()",
3565 &display_test_result
));
3566 ASSERT_TRUE(display_test_result
);
3569 // Checks that the referrer policy is used when prerendering.
3570 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderReferrerPolicy
) {
3571 set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3572 PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3575 NavigateToDestURL();
3578 // Checks that the referrer policy is used when prerendering on HTTPS.
3579 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3580 PrerenderSSLReferrerPolicy
) {
3581 UseHttpsSrcServer();
3582 set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3583 PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3586 NavigateToDestURL();
3589 // Checks that the referrer policy is used when prerendering is cancelled.
3590 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderCancelReferrerPolicy
) {
3591 scoped_ptr
<TestContentBrowserClient
> test_content_browser_client(
3592 new TestContentBrowserClient
);
3593 content::ContentBrowserClient
* original_browser_client
=
3594 content::SetBrowserClientForTesting(test_content_browser_client
.get());
3596 set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3597 PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3598 FINAL_STATUS_CANCELLED
,
3600 OpenDestURLViaClick();
3602 bool display_test_result
= false;
3603 WebContents
* web_contents
=
3604 browser()->tab_strip_model()->GetActiveWebContents();
3605 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
3607 "window.domAutomationController.send(DidDisplayPass())",
3608 &display_test_result
));
3609 EXPECT_TRUE(display_test_result
);
3611 content::SetBrowserClientForTesting(original_browser_client
);
3614 // Test interaction of the webNavigation and tabs API with prerender.
3615 class PrerenderBrowserTestWithExtensions
: public PrerenderBrowserTest
,
3616 public ExtensionApiTest
{
3618 PrerenderBrowserTestWithExtensions() {
3619 // The individual tests start the test server through ExtensionApiTest, so
3620 // the port number can be passed through to the extension.
3621 autostart_test_server_
= false;
3624 virtual void SetUp() override
{
3625 PrerenderBrowserTest::SetUp();
3628 virtual void SetUpCommandLine(CommandLine
* command_line
) override
{
3629 PrerenderBrowserTest::SetUpCommandLine(command_line
);
3630 ExtensionApiTest::SetUpCommandLine(command_line
);
3633 virtual void SetUpInProcessBrowserTestFixture() override
{
3634 PrerenderBrowserTest::SetUpInProcessBrowserTestFixture();
3635 ExtensionApiTest::SetUpInProcessBrowserTestFixture();
3638 virtual void TearDownInProcessBrowserTestFixture() override
{
3639 PrerenderBrowserTest::TearDownInProcessBrowserTestFixture();
3640 ExtensionApiTest::TearDownInProcessBrowserTestFixture();
3643 virtual void SetUpOnMainThread() override
{
3644 PrerenderBrowserTest::SetUpOnMainThread();
3648 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions
, WebNavigation
) {
3649 ASSERT_TRUE(StartSpawnedTestServer());
3650 extensions::FrameNavigationState::set_allow_extension_scheme(true);
3652 // Wait for the extension to set itself up and return control to us.
3653 ASSERT_TRUE(RunExtensionTest("webnavigation/prerender")) << message_
;
3655 extensions::ResultCatcher catcher
;
3657 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
3659 ChannelDestructionWatcher channel_close_watcher
;
3660 channel_close_watcher
.WatchChannel(browser()->tab_strip_model()->
3661 GetActiveWebContents()->GetRenderProcessHost());
3662 NavigateToDestURL();
3663 channel_close_watcher
.WaitForChannelClose();
3665 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
3666 ASSERT_TRUE(catcher
.GetNextResult()) << catcher
.message();
3669 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions
, TabsApi
) {
3670 ASSERT_TRUE(StartSpawnedTestServer());
3671 extensions::FrameNavigationState::set_allow_extension_scheme(true);
3673 // Wait for the extension to set itself up and return control to us.
3674 ASSERT_TRUE(RunExtensionTest("tabs/on_replaced")) << message_
;
3676 extensions::ResultCatcher catcher
;
3678 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
3680 ChannelDestructionWatcher channel_close_watcher
;
3681 channel_close_watcher
.WatchChannel(browser()->tab_strip_model()->
3682 GetActiveWebContents()->GetRenderProcessHost());
3683 NavigateToDestURL();
3684 channel_close_watcher
.WaitForChannelClose();
3686 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
3687 ASSERT_TRUE(catcher
.GetNextResult()) << catcher
.message();
3690 // Test that prerenders abort when navigating to a stream.
3691 // See chrome/browser/extensions/api/streams_private/streams_private_apitest.cc
3692 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions
, StreamsTest
) {
3693 RestorePrerenderMode restore_prerender_mode
;
3694 PrerenderManager::SetMode(
3695 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP
);
3697 ASSERT_TRUE(StartSpawnedTestServer());
3699 const extensions::Extension
* extension
= LoadExtension(
3700 test_data_dir_
.AppendASCII("streams_private/handle_mime_type"));
3701 ASSERT_TRUE(extension
);
3702 EXPECT_EQ(std::string(extension_misc::kStreamsPrivateTestExtensionId
),
3704 MimeTypesHandler
* handler
= MimeTypesHandler::GetHandler(extension
);
3705 ASSERT_TRUE(handler
);
3706 EXPECT_TRUE(handler
->CanHandleMIMEType("application/msword"));
3708 PrerenderTestURL("files/prerender/document.doc", FINAL_STATUS_DOWNLOAD
, 0);
3710 // Sanity-check that the extension would have picked up the stream in a normal
3711 // navigation had prerender not intercepted it.
3712 // streams_private/handle_mime_type reports success if it has handled the
3713 // application/msword type.
3714 extensions::ResultCatcher catcher
;
3715 NavigateToDestURL();
3716 EXPECT_TRUE(catcher
.GetNextResult());
3719 // Checks that non-http/https/chrome-extension subresource cancels the
3721 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3722 PrerenderCancelSubresourceUnsupportedScheme
) {
3723 GURL image_url
= GURL("invalidscheme://www.google.com/test.jpg");
3724 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3725 replacement_text
.push_back(
3726 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url
.spec()));
3727 std::string replacement_path
;
3728 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3729 "files/prerender/prerender_with_image.html",
3731 &replacement_path
));
3732 PrerenderTestURL(replacement_path
, FINAL_STATUS_UNSUPPORTED_SCHEME
, 0);
3735 // Ensure that about:blank is permitted for any subresource.
3736 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3737 PrerenderAllowAboutBlankSubresource
) {
3738 GURL image_url
= GURL("about:blank");
3739 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3740 replacement_text
.push_back(
3741 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url
.spec()));
3742 std::string replacement_path
;
3743 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3744 "files/prerender/prerender_with_image.html",
3746 &replacement_path
));
3747 PrerenderTestURL(replacement_path
, FINAL_STATUS_USED
, 1);
3748 NavigateToDestURL();
3751 // Checks that non-http/https/chrome-extension subresource cancels the prerender
3753 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3754 PrerenderCancelSubresourceRedirectUnsupportedScheme
) {
3755 GURL image_url
= test_server()->GetURL(
3756 CreateServerRedirect("invalidscheme://www.google.com/test.jpg"));
3757 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3758 replacement_text
.push_back(
3759 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url
.spec()));
3760 std::string replacement_path
;
3761 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3762 "files/prerender/prerender_with_image.html",
3764 &replacement_path
));
3765 PrerenderTestURL(replacement_path
, FINAL_STATUS_UNSUPPORTED_SCHEME
, 0);
3768 // Checks that chrome-extension subresource does not cancel the prerender.
3769 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3770 PrerenderKeepSubresourceExtensionScheme
) {
3771 GURL image_url
= GURL("chrome-extension://abcdefg/test.jpg");
3772 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3773 replacement_text
.push_back(
3774 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url
.spec()));
3775 std::string replacement_path
;
3776 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3777 "files/prerender/prerender_with_image.html",
3779 &replacement_path
));
3780 PrerenderTestURL(replacement_path
, FINAL_STATUS_USED
, 1);
3781 NavigateToDestURL();
3784 // Checks that redirect to chrome-extension subresource does not cancel the
3786 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3787 PrerenderKeepSubresourceRedirectExtensionScheme
) {
3788 GURL image_url
= test_server()->GetURL(
3789 CreateServerRedirect("chrome-extension://abcdefg/test.jpg"));
3790 std::vector
<net::SpawnedTestServer::StringPair
> replacement_text
;
3791 replacement_text
.push_back(
3792 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url
.spec()));
3793 std::string replacement_path
;
3794 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3795 "files/prerender/prerender_with_image.html",
3797 &replacement_path
));
3798 PrerenderTestURL(replacement_path
, FINAL_STATUS_USED
, 1);
3799 NavigateToDestURL();
3802 // Checks that non-http/https main page redirects cancel the prerender.
3803 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3804 PrerenderCancelMainFrameRedirectUnsupportedScheme
) {
3805 GURL url
= test_server()->GetURL(
3806 CreateServerRedirect("invalidscheme://www.google.com/test.html"));
3807 PrerenderTestURL(url
, FINAL_STATUS_UNSUPPORTED_SCHEME
, 0);
3810 // Checks that media source video loads are deferred on prerendering.
3811 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderHTML5MediaSourceVideo
) {
3812 PrerenderTestURL("files/prerender/prerender_html5_video_media_source.html",
3815 NavigateToDestURL();
3816 WaitForASCIITitle(GetActiveWebContents(), kPassTitle
);
3819 // Checks that a prerender that creates an audio stream (via a WebAudioDevice)
3821 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderWebAudioDevice
) {
3822 DisableLoadEventCheck();
3823 PrerenderTestURL("files/prerender/prerender_web_audio_device.html",
3824 FINAL_STATUS_CREATING_AUDIO_STREAM
, 0);
3827 // Checks that prerenders do not swap in to WebContents being captured.
3828 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderCapturedWebContents
) {
3829 PrerenderTestURL("files/prerender/prerender_page.html",
3830 FINAL_STATUS_PAGE_BEING_CAPTURED
, 1);
3831 WebContents
* web_contents
= GetActiveWebContents();
3832 web_contents
->IncrementCapturerCount(gfx::Size());
3833 NavigateToDestURLWithDisposition(CURRENT_TAB
, false);
3834 web_contents
->DecrementCapturerCount();
3837 // Checks that prerenders are aborted on cross-process navigation from
3838 // a server redirect.
3839 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3840 PrerenderCrossProcessServerRedirect
) {
3841 // Force everything to be a process swap.
3842 SwapProcessesContentBrowserClient test_browser_client
;
3843 content::ContentBrowserClient
* original_browser_client
=
3844 content::SetBrowserClientForTesting(&test_browser_client
);
3847 CreateServerRedirect("files/prerender/prerender_page.html"),
3848 FINAL_STATUS_OPEN_URL
, 0);
3850 content::SetBrowserClientForTesting(original_browser_client
);
3853 // Checks that URLRequests for prerenders being aborted on cross-process
3854 // navigation from a server redirect are cleaned up, so they don't keep cache
3856 // See http://crbug.com/341134
3857 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3858 PrerenderCrossProcessServerRedirectNoHang
) {
3859 const char kDestPath
[] = "files/prerender/prerender_page.html";
3860 // Force everything to be a process swap.
3861 SwapProcessesContentBrowserClient test_browser_client
;
3862 content::ContentBrowserClient
* original_browser_client
=
3863 content::SetBrowserClientForTesting(&test_browser_client
);
3865 PrerenderTestURL(CreateServerRedirect(kDestPath
), FINAL_STATUS_OPEN_URL
, 0);
3867 ui_test_utils::NavigateToURL(
3869 test_server()->GetURL(kDestPath
));
3871 content::SetBrowserClientForTesting(original_browser_client
);
3874 // Checks that prerenders are aborted on cross-process navigation from
3875 // a client redirect.
3876 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3877 PrerenderCrossProcessClientRedirect
) {
3878 // Cross-process navigation logic for renderer-initiated navigations
3879 // is partially controlled by the renderer, namely
3880 // ChromeContentRendererClient. This test instead relies on the Web
3881 // Store triggering such navigations.
3882 std::string webstore_url
= extension_urls::GetWebstoreLaunchURL();
3884 // Mock out requests to the Web Store.
3885 base::FilePath
file(GetTestPath("prerender_page.html"));
3886 BrowserThread::PostTask(
3887 BrowserThread::IO
, FROM_HERE
,
3888 base::Bind(&CreateMockInterceptorOnIO
, GURL(webstore_url
), file
));
3890 PrerenderTestURL(CreateClientRedirect(webstore_url
),
3891 FINAL_STATUS_OPEN_URL
, 1);
3894 // Checks that canceling a MatchComplete dummy doesn't result in two
3896 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, CancelMatchCompleteDummy
) {
3897 RestorePrerenderMode restore_prerender_mode
;
3898 PrerenderManager::SetMode(
3899 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP
);
3901 std::vector
<FinalStatus
> expected_final_status_queue
;
3902 expected_final_status_queue
.push_back(FINAL_STATUS_JAVASCRIPT_ALERT
);
3903 expected_final_status_queue
.push_back(FINAL_STATUS_CANCELLED
);
3904 ScopedVector
<TestPrerender
> prerenders
=
3905 PrerenderTestURL("files/prerender/prerender_alert_before_onload.html",
3906 expected_final_status_queue
, 0);
3908 // Cancel the MatchComplete dummy.
3909 GetPrerenderManager()->CancelAllPrerenders();
3910 prerenders
[1]->WaitForStop();
3912 // Check the referring page only got one copy of the event.
3913 EXPECT_FALSE(HadPrerenderEventErrors());
3916 // Checks that a deferred redirect to an image is not loaded until the page is
3917 // visible. Also test the right histogram events are emitted in this case.
3918 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderDeferredImage
) {
3919 DisableJavascriptCalls();
3921 // The prerender will not completely load until after the swap, so wait for a
3922 // title change before calling DidPrerenderPass.
3923 scoped_ptr
<TestPrerender
> prerender
=
3925 "files/prerender/prerender_deferred_image.html",
3926 FINAL_STATUS_USED
, 0);
3927 WaitForASCIITitle(prerender
->contents()->prerender_contents(), kReadyTitle
);
3928 EXPECT_EQ(1, GetPrerenderDomContentLoadedEventCountForLinkNumber(0));
3929 EXPECT_TRUE(DidPrerenderPass(prerender
->contents()->prerender_contents()));
3930 EXPECT_EQ(0, prerender
->number_of_loads());
3931 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3932 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3933 histogram_tester().ExpectTotalCount(
3934 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3935 histogram_tester().ExpectTotalCount(
3936 "Prerender.websame_PrerenderNotSwappedInPLT", 0);
3939 NavigationOrSwapObserver
swap_observer(current_browser()->tab_strip_model(),
3940 GetActiveWebContents());
3941 ui_test_utils::NavigateToURLWithDisposition(
3942 current_browser(), dest_url(), CURRENT_TAB
,
3943 ui_test_utils::BROWSER_TEST_NONE
);
3944 swap_observer
.Wait();
3946 // The prerender never observes the final load.
3947 EXPECT_EQ(0, prerender
->number_of_loads());
3949 // Now check DidDisplayPass.
3950 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
3952 histogram_tester().ExpectTotalCount(
3953 "Prerender.websame_PrerenderNotSwappedInPLT", 0);
3954 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3955 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
3957 histogram_tester().ExpectTotalCount(
3958 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3961 // Checks that a deferred redirect to an image is not loaded until the
3962 // page is visible, even after another redirect.
3963 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
3964 PrerenderDeferredImageAfterRedirect
) {
3965 DisableJavascriptCalls();
3967 // The prerender will not completely load until after the swap, so wait for a
3968 // title change before calling DidPrerenderPass.
3969 scoped_ptr
<TestPrerender
> prerender
=
3971 "files/prerender/prerender_deferred_image.html",
3972 FINAL_STATUS_USED
, 0);
3973 WaitForASCIITitle(prerender
->contents()->prerender_contents(), kReadyTitle
);
3974 EXPECT_TRUE(DidPrerenderPass(prerender
->contents()->prerender_contents()));
3975 EXPECT_EQ(0, prerender
->number_of_loads());
3978 NavigationOrSwapObserver
swap_observer(current_browser()->tab_strip_model(),
3979 GetActiveWebContents());
3980 ui_test_utils::NavigateToURLWithDisposition(
3981 current_browser(), dest_url(), CURRENT_TAB
,
3982 ui_test_utils::BROWSER_TEST_NONE
);
3983 swap_observer
.Wait();
3985 // The prerender never observes the final load.
3986 EXPECT_EQ(0, prerender
->number_of_loads());
3988 // Now check DidDisplayPass.
3989 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
3992 // Checks that deferred redirects in the main frame are followed.
3993 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderDeferredMainFrame
) {
3994 DisableJavascriptCalls();
3996 "files/prerender/image-deferred.png",
3997 FINAL_STATUS_USED
, 1);
3998 NavigateToDestURL();
4001 // Checks that deferred redirects in the main frame are followed, even
4002 // with a double-redirect.
4003 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4004 PrerenderDeferredMainFrameAfterRedirect
) {
4005 DisableJavascriptCalls();
4007 CreateServerRedirect("files/prerender/image-deferred.png"),
4008 FINAL_STATUS_USED
, 1);
4009 NavigateToDestURL();
4012 // Checks that deferred redirects in a synchronous XHR abort the
4014 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderDeferredSynchronousXHR
) {
4015 RestorePrerenderMode restore_prerender_mode
;
4016 PrerenderManager::SetMode(
4017 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP
);
4018 PrerenderTestURL("files/prerender/prerender_deferred_sync_xhr.html",
4019 FINAL_STATUS_BAD_DEFERRED_REDIRECT
, 0);
4020 NavigateToDestURL();
4023 // Checks that prerenders are not swapped for navigations with extra headers.
4024 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderExtraHeadersNoSwap
) {
4025 PrerenderTestURL("files/prerender/prerender_page.html",
4026 FINAL_STATUS_APP_TERMINATING
, 1);
4028 content::OpenURLParams
params(dest_url(), Referrer(), CURRENT_TAB
,
4029 ui::PAGE_TRANSITION_TYPED
, false);
4030 params
.extra_headers
= "X-Custom-Header: 42\r\n";
4031 NavigateToURLWithParams(params
, false);
4034 // Checks that prerenders are not swapped for navigations with browser-initiated
4036 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4037 PrerenderBrowserInitiatedPostNoSwap
) {
4038 PrerenderTestURL("files/prerender/prerender_page.html",
4039 FINAL_STATUS_APP_TERMINATING
, 1);
4041 std::string post_data
= "DATA";
4042 content::OpenURLParams
params(dest_url(), Referrer(), CURRENT_TAB
,
4043 ui::PAGE_TRANSITION_TYPED
, false);
4044 params
.uses_post
= true;
4045 params
.browser_initiated_post_data
=
4046 base::RefCountedString::TakeString(&post_data
);
4047 NavigateToURLWithParams(params
, false);
4050 // Checks that the prerendering of a page is canceled correctly when the
4051 // prerendered page tries to make a second navigation entry.
4052 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderNewNavigationEntry
) {
4053 PrerenderTestURL("files/prerender/prerender_new_entry.html",
4054 FINAL_STATUS_NEW_NAVIGATION_ENTRY
,
4058 // Attempt a swap-in in a new tab, verifying that session storage namespace
4060 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPageNewTab
) {
4061 // Mock out some URLs and count the number of requests to one of them. Both
4062 // prerender_session_storage.html and init_session_storage.html need to be
4063 // mocked so they are same-origin.
4064 const GURL
kInitURL("http://prerender.test/init_session_storage.html");
4065 base::FilePath init_file
= GetTestPath("init_session_storage.html");
4066 BrowserThread::PostTask(
4067 BrowserThread::IO
, FROM_HERE
,
4068 base::Bind(&CreateMockInterceptorOnIO
, kInitURL
, init_file
));
4070 const GURL
kTestURL("http://prerender.test/prerender_session_storage.html");
4071 base::FilePath test_file
= GetTestPath("prerender_session_storage.html");
4072 RequestCounter counter
;
4073 BrowserThread::PostTask(
4074 BrowserThread::IO
, FROM_HERE
,
4075 base::Bind(&CreateCountingInterceptorOnIO
,
4076 kTestURL
, test_file
, counter
.AsWeakPtr()));
4078 PrerenderTestURL(kTestURL
, FINAL_STATUS_USED
, 1);
4080 // Open a new tab to navigate in.
4081 ui_test_utils::NavigateToURLWithDisposition(
4082 current_browser(), kInitURL
, NEW_FOREGROUND_TAB
,
4083 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION
);
4085 // Now navigate in the new tab. Set expect_swap_to_succeed to false because
4086 // the swap does not occur synchronously.
4088 // TODO(davidben): When all swaps become asynchronous, remove the OpenURL
4089 // return value assertion and let this go through the usual successful-swap
4091 NavigateToDestURLWithDisposition(CURRENT_TAB
, false);
4093 // Verify DidDisplayPass manually since the previous call skipped it.
4094 EXPECT_TRUE(DidDisplayPass(
4095 current_browser()->tab_strip_model()->GetActiveWebContents()));
4097 // Only one request to the test URL started.
4099 // TODO(davidben): Re-enable this check when the races in attaching the
4100 // throttle are resolved. http://crbug.com/335835
4101 // EXPECT_EQ(1, counter.count());
4104 // Attempt a swap-in in a new tab, verifying that session storage namespace
4105 // merging works. Unlike the above test, the swap is for a navigation that would
4106 // normally be cross-process.
4107 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPageNewTabCrossProcess
) {
4108 base::FilePath test_data_dir
;
4109 ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA
, &test_data_dir
));
4111 // Mock out some URLs and count the number of requests to one of them. Both
4112 // prerender_session_storage.html and init_session_storage.html need to be
4113 // mocked so they are same-origin.
4114 const GURL
kInitURL("http://prerender.test/init_session_storage.html");
4115 base::FilePath init_file
= GetTestPath("init_session_storage.html");
4116 BrowserThread::PostTask(
4117 BrowserThread::IO
, FROM_HERE
,
4118 base::Bind(&CreateMockInterceptorOnIO
, kInitURL
, init_file
));
4120 const GURL
kTestURL("http://prerender.test/prerender_session_storage.html");
4121 base::FilePath test_file
= GetTestPath("prerender_session_storage.html");
4122 RequestCounter counter
;
4123 BrowserThread::PostTask(
4124 BrowserThread::IO
, FROM_HERE
,
4125 base::Bind(&CreateCountingInterceptorOnIO
,
4126 kTestURL
, test_file
, counter
.AsWeakPtr()));
4128 PrerenderTestURL(kTestURL
, FINAL_STATUS_USED
, 1);
4130 // Open a new tab to navigate in.
4131 ui_test_utils::NavigateToURLWithDisposition(
4132 current_browser(), kInitURL
, NEW_FOREGROUND_TAB
,
4133 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION
);
4135 // Navigate to about:blank so the next navigation is cross-process.
4136 ui_test_utils::NavigateToURL(current_browser(), GURL(url::kAboutBlankURL
));
4138 // Now navigate in the new tab. Set expect_swap_to_succeed to false because
4139 // the swap does not occur synchronously.
4141 // TODO(davidben): When all swaps become asynchronous, remove the OpenURL
4142 // return value assertion and let this go through the usual successful-swap
4144 NavigateToDestURLWithDisposition(CURRENT_TAB
, false);
4146 // Verify DidDisplayPass manually since the previous call skipped it.
4147 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
4149 // Only one request to the test URL started.
4151 // TODO(davidben): Re-enable this check when the races in attaching the
4152 // throttle are resolved. http://crbug.com/335835
4153 // EXPECT_EQ(1, counter.count());
4156 // Verify that session storage conflicts don't merge.
4157 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderSessionStorageConflict
) {
4158 PrerenderTestURL("files/prerender/prerender_session_storage_conflict.html",
4159 FINAL_STATUS_APP_TERMINATING
, 1);
4161 // Open a new tab to navigate in.
4162 ui_test_utils::NavigateToURLWithDisposition(
4164 test_server()->GetURL("files/prerender/init_session_storage.html"),
4166 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION
);
4168 // Now navigate in the new tab.
4169 NavigateToDestURLWithDisposition(CURRENT_TAB
, false);
4171 // Verify DidDisplayPass in the new tab.
4172 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
4175 // Checks that prerenders honor |should_replace_current_entry|.
4176 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderReplaceCurrentEntry
) {
4177 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
4179 content::OpenURLParams
params(dest_url(), Referrer(), CURRENT_TAB
,
4180 ui::PAGE_TRANSITION_TYPED
, false);
4181 params
.should_replace_current_entry
= true;
4182 NavigateToURLWithParams(params
, false);
4184 const NavigationController
& controller
=
4185 GetActiveWebContents()->GetController();
4186 // First entry is about:blank, second is prerender_page.html.
4187 EXPECT_TRUE(controller
.GetPendingEntry() == NULL
);
4188 EXPECT_EQ(2, controller
.GetEntryCount());
4189 EXPECT_EQ(GURL(url::kAboutBlankURL
), controller
.GetEntryAtIndex(0)->GetURL());
4190 EXPECT_EQ(dest_url(), controller
.GetEntryAtIndex(1)->GetURL());
4193 // Checks prerender does not hit DCHECKs and behaves properly if two pending
4194 // swaps occur in a row.
4195 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderDoublePendingSwap
) {
4196 GetPrerenderManager()->mutable_config().max_link_concurrency
= 2;
4197 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher
= 2;
4199 GURL url1
= test_server()->GetURL("files/prerender/prerender_page.html?1");
4200 scoped_ptr
<TestPrerender
> prerender1
=
4201 PrerenderTestURL(url1
, FINAL_STATUS_APP_TERMINATING
, 1);
4203 GURL url2
= test_server()->GetURL("files/prerender/prerender_page.html?2");
4204 scoped_ptr
<TestPrerender
> prerender2
= ExpectPrerender(FINAL_STATUS_USED
);
4205 AddPrerender(url2
, 1);
4206 prerender2
->WaitForStart();
4207 prerender2
->WaitForLoads(1);
4209 // There's no reason the second prerender can't be used, but the swap races
4210 // with didStartProvisionalLoad and didFailProvisionalLoad from the previous
4211 // navigation. The current logic will conservatively fail to swap under such
4212 // races. However, if the renderer is slow enough, it's possible for the
4213 // prerender to still be used, so don't program in either expectation.
4214 ASSERT_TRUE(prerender2
->contents());
4215 prerender2
->contents()->set_skip_final_checks(true);
4217 // Open a new tab to navigate in.
4218 ui_test_utils::NavigateToURLWithDisposition(
4220 GURL(url::kAboutBlankURL
),
4222 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION
);
4224 // Fire off two navigations, without running the event loop between them.
4225 NavigationOrSwapObserver
swap_observer(
4226 current_browser()->tab_strip_model(),
4227 GetActiveWebContents(), 2);
4228 current_browser()->OpenURL(OpenURLParams(
4229 url1
, Referrer(), CURRENT_TAB
, ui::PAGE_TRANSITION_TYPED
, false));
4230 current_browser()->OpenURL(OpenURLParams(
4231 url2
, Referrer(), CURRENT_TAB
, ui::PAGE_TRANSITION_TYPED
, false));
4232 swap_observer
.Wait();
4234 // The WebContents should be on url2. There may be 2 or 3 entries, depending
4235 // on whether the first one managed to complete.
4237 // TODO(davidben): When http://crbug.com/335835 is fixed, the 3 entry case
4238 // shouldn't be possible because it's throttled by the pending swap that
4240 const NavigationController
& controller
=
4241 GetActiveWebContents()->GetController();
4242 EXPECT_TRUE(controller
.GetPendingEntry() == NULL
);
4243 EXPECT_LE(2, controller
.GetEntryCount());
4244 EXPECT_GE(3, controller
.GetEntryCount());
4245 EXPECT_EQ(GURL(url::kAboutBlankURL
), controller
.GetEntryAtIndex(0)->GetURL());
4246 EXPECT_EQ(url2
, controller
.GetEntryAtIndex(
4247 controller
.GetEntryCount() - 1)->GetURL());
4250 // Verify that pending swaps get aborted on new navigations.
4251 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4252 PrerenderPendingSwapNewNavigation
) {
4253 PrerenderManager::HangSessionStorageMergesForTesting();
4255 PrerenderTestURL("files/prerender/prerender_page.html",
4256 FINAL_STATUS_APP_TERMINATING
, 1);
4258 // Open a new tab to navigate in.
4259 ui_test_utils::NavigateToURLWithDisposition(
4261 GURL(url::kAboutBlankURL
),
4263 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION
);
4265 // Navigate to the URL. Wait for DidStartLoading, just so it's definitely
4266 // progressed somewhere.
4267 content::WindowedNotificationObserver
page_load_observer(
4268 content::NOTIFICATION_LOAD_START
,
4269 content::Source
<NavigationController
>(
4270 &GetActiveWebContents()->GetController()));
4271 current_browser()->OpenURL(OpenURLParams(
4272 dest_url(), Referrer(), CURRENT_TAB
,
4273 ui::PAGE_TRANSITION_TYPED
, false));
4274 page_load_observer
.Wait();
4276 // Navigate somewhere else. This should succeed and abort the pending swap.
4277 TestNavigationObserver
nav_observer(GetActiveWebContents());
4278 current_browser()->OpenURL(OpenURLParams(GURL(url::kAboutBlankURL
),
4281 ui::PAGE_TRANSITION_TYPED
,
4283 nav_observer
.Wait();
4286 // Checks that <a ping> requests are not dropped in prerender.
4287 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPing
) {
4288 // Count hits to a certain URL.
4289 const GURL
kPingURL("http://prerender.test/ping");
4290 base::FilePath empty_file
= ui_test_utils::GetTestFilePath(
4291 base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
4292 RequestCounter ping_counter
;
4293 BrowserThread::PostTask(
4294 BrowserThread::IO
, FROM_HERE
,
4295 base::Bind(&CreateCountingInterceptorOnIO
,
4296 kPingURL
, empty_file
, ping_counter
.AsWeakPtr()));
4298 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
4299 OpenDestURLViaClickPing(kPingURL
);
4301 ping_counter
.WaitForCount(1);
4304 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderPPLTNormalNavigation
) {
4305 GURL url
= test_server()->GetURL("files/prerender/prerender_page.html");
4306 ui_test_utils::NavigateToURL(current_browser(), url
);
4307 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
4308 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
4309 histogram_tester().ExpectTotalCount(
4310 "Prerender.none_PerceivedPLTMatchedComplete", 0);
4313 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4314 PrerenderCookieChangeConflictTest
) {
4315 NavigateStraightToURL(
4316 "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4318 GURL url
= test_server()->GetURL(
4319 "files/prerender/prerender_cookie.html?set=1&key=c&value=2");
4321 scoped_ptr
<TestPrerender
> prerender
=
4322 ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT
);
4323 AddPrerender(url
, 1);
4324 prerender
->WaitForStart();
4325 prerender
->WaitForLoads(1);
4326 // Ensure that in the prerendered page, querying the cookie again
4327 // via javascript yields the same value that was set during load.
4328 EXPECT_TRUE(DidPrerenderPass(prerender
->contents()->prerender_contents()));
4330 // The prerender has loaded. Ensure that the change is not visible
4333 RunJSReturningString("GetCookie('c')", &value
);
4334 ASSERT_EQ(value
, "1");
4336 // Make a conflicting cookie change, which should cancel the prerender.
4337 RunJS("SetCookie('c', '3')");
4338 prerender
->WaitForStop();
4341 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderCookieChangeUseTest
) {
4342 // Permit 2 concurrent prerenders.
4343 GetPrerenderManager()->mutable_config().max_link_concurrency
= 2;
4344 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher
= 2;
4346 // Go to a first URL setting the cookie to value "1".
4347 NavigateStraightToURL(
4348 "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4350 // Prerender a URL setting the cookie to value "2".
4351 GURL url
= test_server()->GetURL(
4352 "files/prerender/prerender_cookie.html?set=1&key=c&value=2");
4354 scoped_ptr
<TestPrerender
> prerender1
= ExpectPrerender(FINAL_STATUS_USED
);
4355 AddPrerender(url
, 1);
4356 prerender1
->WaitForStart();
4357 prerender1
->WaitForLoads(1);
4359 // Launch a second prerender, setting the cookie to value "3".
4360 scoped_ptr
<TestPrerender
> prerender2
=
4361 ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT
);
4362 AddPrerender(test_server()->GetURL(
4363 "files/prerender/prerender_cookie.html?set=1&key=c&value=3"), 1);
4364 prerender2
->WaitForStart();
4365 prerender2
->WaitForLoads(1);
4367 // Both prerenders have loaded. Ensure that the visible tab is still
4368 // unchanged and cannot see their changes.
4371 RunJSReturningString("GetCookie('c')", &value
);
4372 ASSERT_EQ(value
, "1");
4374 // Navigate to the prerendered URL. The first prerender should be swapped in,
4375 // and the changes should now be visible. The second prerender should
4376 // be cancelled due to the conflict.
4377 ui_test_utils::NavigateToURLWithDisposition(
4381 ui_test_utils::BROWSER_TEST_NONE
);
4382 RunJSReturningString("GetCookie('c')", &value
);
4383 ASSERT_EQ(value
, "2");
4384 prerender2
->WaitForStop();
4387 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4388 PrerenderCookieChangeConflictHTTPHeaderTest
) {
4389 NavigateStraightToURL(
4390 "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4392 GURL url
= test_server()->GetURL("set-cookie?c=2");
4393 scoped_ptr
<TestPrerender
> prerender
=
4394 ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT
);
4395 AddPrerender(url
, 1);
4396 prerender
->WaitForStart();
4397 prerender
->WaitForLoads(1);
4399 // The prerender has loaded. Ensure that the change is not visible
4402 RunJSReturningString("GetCookie('c')", &value
);
4403 ASSERT_EQ(value
, "1");
4405 // Make a conflicting cookie change, which should cancel the prerender.
4406 RunJS("SetCookie('c', '3')");
4407 prerender
->WaitForStop();
4410 // Checks that a prerender which calls window.close() on itself is aborted.
4411 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
, PrerenderWindowClose
) {
4412 DisableLoadEventCheck();
4413 PrerenderTestURL("files/prerender/prerender_window_close.html",
4414 FINAL_STATUS_CLOSED
, 0);
4417 class PrerenderIncognitoBrowserTest
: public PrerenderBrowserTest
{
4419 virtual void SetUpOnMainThread() override
{
4420 Profile
* normal_profile
= current_browser()->profile();
4421 set_browser(ui_test_utils::OpenURLOffTheRecord(
4422 normal_profile
, GURL("about:blank")));
4423 PrerenderBrowserTest::SetUpOnMainThread();
4427 // Checks that prerendering works in incognito mode.
4428 IN_PROC_BROWSER_TEST_F(PrerenderIncognitoBrowserTest
, PrerenderIncognito
) {
4429 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED
, 1);
4430 NavigateToDestURL();
4433 // Checks that prerenders are aborted when an incognito profile is closed.
4434 IN_PROC_BROWSER_TEST_F(PrerenderIncognitoBrowserTest
,
4435 PrerenderIncognitoClosed
) {
4436 scoped_ptr
<TestPrerender
> prerender
=
4437 PrerenderTestURL("files/prerender/prerender_page.html",
4438 FINAL_STATUS_PROFILE_DESTROYED
, 1);
4439 current_browser()->window()->Close();
4440 prerender
->WaitForStop();
4443 class PrerenderOmniboxBrowserTest
: public PrerenderBrowserTest
{
4445 LocationBar
* GetLocationBar() {
4446 return current_browser()->window()->GetLocationBar();
4449 OmniboxView
* GetOmniboxView() {
4450 return GetLocationBar()->GetOmniboxView();
4453 void WaitForAutocompleteDone(OmniboxView
* omnibox_view
) {
4454 AutocompleteController
* controller
=
4455 omnibox_view
->model()->popup_model()->autocomplete_controller();
4456 while (!controller
->done()) {
4457 content::WindowedNotificationObserver
ready_observer(
4458 chrome::NOTIFICATION_AUTOCOMPLETE_CONTROLLER_RESULT_READY
,
4459 content::Source
<AutocompleteController
>(controller
));
4460 ready_observer
.Wait();
4464 predictors::AutocompleteActionPredictor
* GetAutocompleteActionPredictor() {
4465 Profile
* profile
= current_browser()->profile();
4466 return predictors::AutocompleteActionPredictorFactory::GetForProfile(
4470 scoped_ptr
<TestPrerender
> StartOmniboxPrerender(
4472 FinalStatus expected_final_status
) {
4473 scoped_ptr
<TestPrerender
> prerender
=
4474 ExpectPrerender(expected_final_status
);
4475 WebContents
* web_contents
= GetActiveWebContents();
4476 GetAutocompleteActionPredictor()->StartPrerendering(
4478 web_contents
->GetController().GetSessionStorageNamespaceMap(),
4480 prerender
->WaitForStart();
4481 return prerender
.Pass();
4485 // Checks that closing the omnibox popup cancels an omnibox prerender.
4486 // http://crbug.com/395152
4487 IN_PROC_BROWSER_TEST_F(PrerenderOmniboxBrowserTest
,
4488 DISABLED_PrerenderOmniboxCancel
) {
4489 // Ensure the cookie store has been loaded.
4490 if (!GetPrerenderManager()->cookie_store_loaded()) {
4492 GetPrerenderManager()->set_on_cookie_store_loaded_cb_for_testing(
4493 loop
.QuitClosure());
4497 // Fake an omnibox prerender.
4498 scoped_ptr
<TestPrerender
> prerender
= StartOmniboxPrerender(
4499 test_server()->GetURL("files/empty.html"),
4500 FINAL_STATUS_CANCELLED
);
4502 // Revert the location bar. This should cancel the prerender.
4503 GetLocationBar()->Revert();
4504 prerender
->WaitForStop();
4507 // Checks that accepting omnibox input abandons an omnibox prerender.
4508 // http://crbug.com/394592
4509 IN_PROC_BROWSER_TEST_F(PrerenderOmniboxBrowserTest
,
4510 DISABLED_PrerenderOmniboxAbandon
) {
4511 // Set the abandon timeout to something high so it does not introduce
4512 // flakiness if the prerender times out before the test completes.
4513 GetPrerenderManager()->mutable_config().abandon_time_to_live
=
4514 base::TimeDelta::FromDays(999);
4516 // Ensure the cookie store has been loaded.
4517 if (!GetPrerenderManager()->cookie_store_loaded()) {
4519 GetPrerenderManager()->set_on_cookie_store_loaded_cb_for_testing(
4520 loop
.QuitClosure());
4524 // Enter a URL into the Omnibox.
4525 OmniboxView
* omnibox_view
= GetOmniboxView();
4526 omnibox_view
->OnBeforePossibleChange();
4527 omnibox_view
->SetUserText(
4528 base::UTF8ToUTF16(test_server()->GetURL("files/empty.html?1").spec()));
4529 omnibox_view
->OnAfterPossibleChange();
4530 WaitForAutocompleteDone(omnibox_view
);
4532 // Fake an omnibox prerender for a different URL.
4533 scoped_ptr
<TestPrerender
> prerender
= StartOmniboxPrerender(
4534 test_server()->GetURL("files/empty.html?2"),
4535 FINAL_STATUS_APP_TERMINATING
);
4537 // The final status may be either FINAL_STATUS_APP_TERMINATING or
4538 // FINAL_STATUS_CANCELLED. Although closing the omnibox will not cancel an
4539 // abandoned prerender, the AutocompleteActionPredictor will cancel the
4540 // predictor on destruction.
4541 prerender
->contents()->set_skip_final_checks(true);
4543 // Navigate to the URL entered.
4544 omnibox_view
->model()->AcceptInput(CURRENT_TAB
, false);
4546 // Prerender should be running, but abandoned.
4548 GetAutocompleteActionPredictor()->IsPrerenderAbandonedForTesting());
4551 // Prefetch should be allowed depending on preference and network type.
4552 // This test is for the bsae case: no Finch overrides should never disable.
4553 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4554 LocalPredictorDisableWorksBaseCase
) {
4555 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4556 false /*preference_wifi_network_wifi*/,
4557 false /*preference_wifi_network_4g*/,
4558 false /*preference_always_network_wifi*/,
4559 false /*preference_always_network_4g*/,
4560 false /*preference_never_network_wifi*/,
4561 false /*preference_never_network_4g*/);
4564 // Prefetch should be allowed depending on preference and network type.
4565 // LocalPredictorOnCellularOnly should disable all wifi cases.
4566 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4567 LocalPredictorDisableWorksCellularOnly
) {
4568 CreateTestFieldTrial("PrerenderLocalPredictorSpec",
4569 "LocalPredictorOnCellularOnly=Enabled");
4570 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4571 true /*preference_wifi_network_wifi*/,
4572 false /*preference_wifi_network_4g*/,
4573 true /*preference_always_network_wifi*/,
4574 false /*preference_always_network_4g*/,
4575 true /*preference_never_network_wifi*/,
4576 false /*preference_never_network_4g*/);
4579 // Prefetch should be allowed depending on preference and network type.
4580 // LocalPredictorNetworkPredictionEnabledOnly should disable whenever
4581 // network predictions will not be exercised.
4582 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4583 LocalPredictorDisableWorksNetworkPredictionEnableOnly
) {
4584 CreateTestFieldTrial("PrerenderLocalPredictorSpec",
4585 "LocalPredictorNetworkPredictionEnabledOnly=Enabled");
4586 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4587 false /*preference_wifi_network_wifi*/,
4588 true /*preference_wifi_network_4g*/,
4589 false /*preference_always_network_wifi*/,
4590 false /*preference_always_network_4g*/,
4591 true /*preference_never_network_wifi*/,
4592 true /*preference_never_network_4g*/);
4595 // Prefetch should be allowed depending on preference and network type.
4596 // If LocalPredictorNetworkPredictionEnabledOnly and
4597 // LocalPredictorOnCellularOnly are both selected, we must disable whenever
4598 // network predictions are not exercised, or when we are on wifi.
4599 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest
,
4600 LocalPredictorDisableWorksBothOptions
) {
4601 CreateTestFieldTrial("PrerenderLocalPredictorSpec",
4602 "LocalPredictorOnCellularOnly=Enabled:"
4603 "LocalPredictorNetworkPredictionEnabledOnly=Enabled");
4604 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4605 true /*preference_wifi_network_wifi*/,
4606 true /*preference_wifi_network_4g*/,
4607 true /*preference_always_network_wifi*/,
4608 false /*preference_always_network_4g*/,
4609 true /*preference_never_network_wifi*/,
4610 true /*preference_never_network_4g*/);
4613 } // namespace prerender