Roll src/third_party/WebKit 8b42d1d:744641d (svn 186770:186771)
[chromium-blink-merge.git] / chrome / browser / prerender / prerender_browsertest.cc
blobb01676aa0cae5b22a12af93a9af67b7d71d52c86
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include <deque>
6 #include <vector>
8 #include "base/bind.h"
9 #include "base/command_line.h"
10 #include "base/files/file_path.h"
11 #include "base/memory/ref_counted_memory.h"
12 #include "base/memory/scoped_vector.h"
13 #include "base/memory/weak_ptr.h"
14 #include "base/path_service.h"
15 #include "base/prefs/pref_service.h"
16 #include "base/run_loop.h"
17 #include "base/strings/string_util.h"
18 #include "base/strings/stringprintf.h"
19 #include "base/strings/utf_string_conversions.h"
20 #include "base/test/histogram_tester.h"
21 #include "base/test/test_timeouts.h"
22 #include "base/values.h"
23 #include "chrome/browser/browsing_data/browsing_data_helper.h"
24 #include "chrome/browser/browsing_data/browsing_data_remover.h"
25 #include "chrome/browser/browsing_data/browsing_data_remover_test_util.h"
26 #include "chrome/browser/chrome_content_browser_client.h"
27 #include "chrome/browser/chrome_notification_types.h"
28 #include "chrome/browser/extensions/api/web_navigation/web_navigation_api.h"
29 #include "chrome/browser/extensions/extension_apitest.h"
30 #include "chrome/browser/external_protocol/external_protocol_handler.h"
31 #include "chrome/browser/favicon/favicon_tab_helper.h"
32 #include "chrome/browser/net/prediction_options.h"
33 #include "chrome/browser/predictors/autocomplete_action_predictor.h"
34 #include "chrome/browser/predictors/autocomplete_action_predictor_factory.h"
35 #include "chrome/browser/prerender/prerender_contents.h"
36 #include "chrome/browser/prerender/prerender_field_trial.h"
37 #include "chrome/browser/prerender/prerender_handle.h"
38 #include "chrome/browser/prerender/prerender_link_manager.h"
39 #include "chrome/browser/prerender/prerender_link_manager_factory.h"
40 #include "chrome/browser/prerender/prerender_manager.h"
41 #include "chrome/browser/prerender/prerender_manager_factory.h"
42 #include "chrome/browser/profiles/profile.h"
43 #include "chrome/browser/profiles/profile_io_data.h"
44 #include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
45 #include "chrome/browser/safe_browsing/database_manager.h"
46 #include "chrome/browser/safe_browsing/safe_browsing_service.h"
47 #include "chrome/browser/safe_browsing/safe_browsing_util.h"
48 #include "chrome/browser/task_manager/task_manager.h"
49 #include "chrome/browser/task_manager/task_manager_browsertest_util.h"
50 #include "chrome/browser/ui/browser.h"
51 #include "chrome/browser/ui/browser_commands.h"
52 #include "chrome/browser/ui/browser_finder.h"
53 #include "chrome/browser/ui/browser_navigator.h"
54 #include "chrome/browser/ui/browser_window.h"
55 #include "chrome/browser/ui/location_bar/location_bar.h"
56 #include "chrome/browser/ui/omnibox/omnibox_edit_model.h"
57 #include "chrome/browser/ui/omnibox/omnibox_popup_model.h"
58 #include "chrome/browser/ui/omnibox/omnibox_view.h"
59 #include "chrome/browser/ui/tabs/tab_strip_model.h"
60 #include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
61 #include "chrome/common/chrome_paths.h"
62 #include "chrome/common/chrome_switches.h"
63 #include "chrome/common/extensions/extension_constants.h"
64 #include "chrome/common/extensions/manifest_handlers/mime_types_handler.h"
65 #include "chrome/common/pref_names.h"
66 #include "chrome/grit/generated_resources.h"
67 #include "chrome/test/base/in_process_browser_test.h"
68 #include "chrome/test/base/test_switches.h"
69 #include "chrome/test/base/ui_test_utils.h"
70 #include "components/content_settings/core/browser/host_content_settings_map.h"
71 #include "components/variations/entropy_provider.h"
72 #include "components/variations/variations_associated_data.h"
73 #include "content/public/browser/browser_message_filter.h"
74 #include "content/public/browser/devtools_agent_host.h"
75 #include "content/public/browser/navigation_controller.h"
76 #include "content/public/browser/navigation_entry.h"
77 #include "content/public/browser/notification_service.h"
78 #include "content/public/browser/render_frame_host.h"
79 #include "content/public/browser/render_process_host.h"
80 #include "content/public/browser/render_view_host.h"
81 #include "content/public/browser/site_instance.h"
82 #include "content/public/browser/web_contents.h"
83 #include "content/public/browser/web_contents_observer.h"
84 #include "content/public/common/url_constants.h"
85 #include "content/public/test/browser_test_utils.h"
86 #include "content/public/test/test_navigation_observer.h"
87 #include "content/public/test/test_utils.h"
88 #include "extensions/common/extension_urls.h"
89 #include "extensions/common/switches.h"
90 #include "extensions/test/result_catcher.h"
91 #include "net/base/escape.h"
92 #include "net/cert/x509_certificate.h"
93 #include "net/dns/mock_host_resolver.h"
94 #include "net/ssl/client_cert_store.h"
95 #include "net/ssl/ssl_cert_request_info.h"
96 #include "net/test/url_request/url_request_mock_http_job.h"
97 #include "net/url_request/url_request_context.h"
98 #include "net/url_request/url_request_context_getter.h"
99 #include "net/url_request/url_request_filter.h"
100 #include "net/url_request/url_request_interceptor.h"
101 #include "net/url_request/url_request_job.h"
102 #include "ui/base/l10n/l10n_util.h"
103 #include "url/gurl.h"
105 using chrome_browser_net::NetworkPredictionOptions;
106 using content::BrowserThread;
107 using content::DevToolsAgentHost;
108 using content::NavigationController;
109 using content::OpenURLParams;
110 using content::Referrer;
111 using content::RenderFrameHost;
112 using content::RenderViewHost;
113 using content::RenderWidgetHost;
114 using content::TestNavigationObserver;
115 using content::WebContents;
116 using content::WebContentsObserver;
117 using net::NetworkChangeNotifier;
118 using task_manager::browsertest_util::WaitForTaskManagerRows;
120 // Prerender tests work as follows:
122 // A page with a prefetch link to the test page is loaded. Once prerendered,
123 // its Javascript function DidPrerenderPass() is called, which returns true if
124 // the page behaves as expected when prerendered.
126 // The prerendered page is then displayed on a tab. The Javascript function
127 // DidDisplayPass() is called, and returns true if the page behaved as it
128 // should while being displayed.
130 namespace prerender {
132 namespace {
134 class MockNetworkChangeNotifierWIFI : public NetworkChangeNotifier {
135 public:
136 ConnectionType GetCurrentConnectionType() const override {
137 return NetworkChangeNotifier::CONNECTION_WIFI;
141 class MockNetworkChangeNotifier4G : public NetworkChangeNotifier {
142 public:
143 ConnectionType GetCurrentConnectionType() const override {
144 return NetworkChangeNotifier::CONNECTION_4G;
148 // Constants used in the test HTML files.
149 const char* kReadyTitle = "READY";
150 const char* kPassTitle = "PASS";
152 std::string CreateClientRedirect(const std::string& dest_url) {
153 const char* const kClientRedirectBase = "client-redirect?";
154 return kClientRedirectBase + net::EscapeQueryParamValue(dest_url, false);
157 std::string CreateServerRedirect(const std::string& dest_url) {
158 const char* const kServerRedirectBase = "server-redirect?";
159 return kServerRedirectBase + net::EscapeQueryParamValue(dest_url, false);
162 // Clears the specified data using BrowsingDataRemover.
163 void ClearBrowsingData(Browser* browser, int remove_mask) {
164 BrowsingDataRemover* remover =
165 BrowsingDataRemover::CreateForUnboundedRange(browser->profile());
166 BrowsingDataRemoverCompletionObserver observer(remover);
167 remover->Remove(remove_mask, BrowsingDataHelper::UNPROTECTED_WEB);
168 observer.BlockUntilCompletion();
169 // BrowsingDataRemover deletes itself.
172 // Returns true if the prerender is expected to abort on its own, before
173 // attempting to swap it.
174 bool ShouldAbortPrerenderBeforeSwap(FinalStatus status) {
175 switch (status) {
176 case FINAL_STATUS_USED:
177 case FINAL_STATUS_WINDOW_OPENER:
178 case FINAL_STATUS_APP_TERMINATING:
179 case FINAL_STATUS_PROFILE_DESTROYED:
180 case FINAL_STATUS_CACHE_OR_HISTORY_CLEARED:
181 // We'll crash the renderer after it's loaded.
182 case FINAL_STATUS_RENDERER_CRASHED:
183 case FINAL_STATUS_CANCELLED:
184 case FINAL_STATUS_DEVTOOLS_ATTACHED:
185 case FINAL_STATUS_PAGE_BEING_CAPTURED:
186 case FINAL_STATUS_NAVIGATION_UNCOMMITTED:
187 case FINAL_STATUS_WOULD_HAVE_BEEN_USED:
188 case FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE:
189 return false;
190 default:
191 return true;
195 // Convenience function to wait for a title. Handles the case when the
196 // WebContents already has the expected title.
197 void WaitForASCIITitle(WebContents* web_contents,
198 const char* expected_title_ascii) {
199 base::string16 expected_title = base::ASCIIToUTF16(expected_title_ascii);
200 if (web_contents->GetTitle() == expected_title)
201 return;
202 content::TitleWatcher title_watcher(web_contents, expected_title);
203 EXPECT_EQ(expected_title, title_watcher.WaitAndGetTitle());
206 // Waits for the destruction of a RenderProcessHost's IPC channel.
207 // Used to make sure the PrerenderLinkManager's OnChannelClosed function has
208 // been called, before checking its state.
209 class ChannelDestructionWatcher {
210 public:
211 ChannelDestructionWatcher() : channel_destroyed_(false) {
214 ~ChannelDestructionWatcher() {
217 void WatchChannel(content::RenderProcessHost* host) {
218 host->AddFilter(new DestructionMessageFilter(this));
221 void WaitForChannelClose() {
222 run_loop_.Run();
223 EXPECT_TRUE(channel_destroyed_);
226 private:
227 // When destroyed, calls ChannelDestructionWatcher::OnChannelDestroyed.
228 // Ignores all messages.
229 class DestructionMessageFilter : public content::BrowserMessageFilter {
230 public:
231 explicit DestructionMessageFilter(ChannelDestructionWatcher* watcher)
232 : BrowserMessageFilter(0),
233 watcher_(watcher) {
236 private:
237 ~DestructionMessageFilter() override {
238 content::BrowserThread::PostTask(
239 content::BrowserThread::UI, FROM_HERE,
240 base::Bind(&ChannelDestructionWatcher::OnChannelDestroyed,
241 base::Unretained(watcher_)));
244 bool OnMessageReceived(const IPC::Message& message) override {
245 return false;
248 ChannelDestructionWatcher* watcher_;
250 DISALLOW_COPY_AND_ASSIGN(DestructionMessageFilter);
253 void OnChannelDestroyed() {
254 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
256 EXPECT_FALSE(channel_destroyed_);
257 channel_destroyed_ = true;
258 run_loop_.Quit();
261 bool channel_destroyed_;
262 base::RunLoop run_loop_;
264 DISALLOW_COPY_AND_ASSIGN(ChannelDestructionWatcher);
267 // A navigation observer to wait on either a new load or a swap of a
268 // WebContents. On swap, if the new WebContents is still loading, wait for that
269 // load to complete as well. Note that the load must begin after the observer is
270 // attached.
271 class NavigationOrSwapObserver : public WebContentsObserver,
272 public TabStripModelObserver {
273 public:
274 // Waits for either a new load or a swap of |tab_strip_model|'s active
275 // WebContents.
276 NavigationOrSwapObserver(TabStripModel* tab_strip_model,
277 WebContents* web_contents)
278 : WebContentsObserver(web_contents),
279 tab_strip_model_(tab_strip_model),
280 did_start_loading_(false),
281 number_of_loads_(1) {
282 CHECK_NE(TabStripModel::kNoTab,
283 tab_strip_model->GetIndexOfWebContents(web_contents));
284 tab_strip_model_->AddObserver(this);
287 // Waits for either |number_of_loads| loads or a swap of |tab_strip_model|'s
288 // active WebContents.
289 NavigationOrSwapObserver(TabStripModel* tab_strip_model,
290 WebContents* web_contents,
291 int number_of_loads)
292 : WebContentsObserver(web_contents),
293 tab_strip_model_(tab_strip_model),
294 did_start_loading_(false),
295 number_of_loads_(number_of_loads) {
296 CHECK_NE(TabStripModel::kNoTab,
297 tab_strip_model->GetIndexOfWebContents(web_contents));
298 tab_strip_model_->AddObserver(this);
301 ~NavigationOrSwapObserver() override {
302 tab_strip_model_->RemoveObserver(this);
305 void set_did_start_loading() {
306 did_start_loading_ = true;
309 void Wait() {
310 loop_.Run();
313 // WebContentsObserver implementation:
314 void DidStartLoading(RenderViewHost* render_view_host) override {
315 did_start_loading_ = true;
317 void DidStopLoading(RenderViewHost* render_view_host) override {
318 if (!did_start_loading_)
319 return;
320 number_of_loads_--;
321 if (number_of_loads_ == 0)
322 loop_.Quit();
325 // TabStripModelObserver implementation:
326 void TabReplacedAt(TabStripModel* tab_strip_model,
327 WebContents* old_contents,
328 WebContents* new_contents,
329 int index) override {
330 if (old_contents != web_contents())
331 return;
332 // Switch to observing the new WebContents.
333 Observe(new_contents);
334 if (new_contents->IsLoading()) {
335 // If the new WebContents is still loading, wait for it to complete. Only
336 // one load post-swap is supported.
337 did_start_loading_ = true;
338 number_of_loads_ = 1;
339 } else {
340 loop_.Quit();
344 private:
345 TabStripModel* tab_strip_model_;
346 bool did_start_loading_;
347 int number_of_loads_;
348 base::RunLoop loop_;
351 // Waits for a new tab to open and a navigation or swap in it.
352 class NewTabNavigationOrSwapObserver {
353 public:
354 NewTabNavigationOrSwapObserver()
355 : new_tab_observer_(
356 chrome::NOTIFICATION_TAB_ADDED,
357 base::Bind(&NewTabNavigationOrSwapObserver::OnTabAdded,
358 base::Unretained(this))) {
359 // Watch for NOTIFICATION_TAB_ADDED. Add a callback so that the
360 // NavigationOrSwapObserver can be attached synchronously and no events are
361 // missed.
364 void Wait() {
365 new_tab_observer_.Wait();
366 swap_observer_->Wait();
369 bool OnTabAdded(const content::NotificationSource& source,
370 const content::NotificationDetails& details) {
371 if (swap_observer_)
372 return true;
373 WebContents* new_tab = content::Details<WebContents>(details).ptr();
374 // Get the TabStripModel. Assume this is attached to a Browser.
375 TabStripModel* tab_strip_model =
376 static_cast<Browser*>(new_tab->GetDelegate())->tab_strip_model();
377 swap_observer_.reset(new NavigationOrSwapObserver(tab_strip_model,
378 new_tab));
379 swap_observer_->set_did_start_loading();
380 return true;
383 private:
384 content::WindowedNotificationObserver new_tab_observer_;
385 scoped_ptr<NavigationOrSwapObserver> swap_observer_;
388 // PrerenderContents that stops the UI message loop on DidStopLoading().
389 class TestPrerenderContents : public PrerenderContents {
390 public:
391 TestPrerenderContents(
392 PrerenderManager* prerender_manager,
393 Profile* profile,
394 const GURL& url,
395 const content::Referrer& referrer,
396 Origin origin,
397 FinalStatus expected_final_status)
398 : PrerenderContents(prerender_manager, profile, url,
399 referrer, origin, PrerenderManager::kNoExperiment),
400 expected_final_status_(expected_final_status),
401 new_render_view_host_(NULL),
402 was_hidden_(false),
403 was_shown_(false),
404 should_be_shown_(expected_final_status == FINAL_STATUS_USED),
405 skip_final_checks_(false) {
408 ~TestPrerenderContents() override {
409 if (skip_final_checks_)
410 return;
412 if (expected_final_status_ == FINAL_STATUS_MAX) {
413 EXPECT_EQ(MATCH_COMPLETE_REPLACEMENT, match_complete_status());
414 } else {
415 EXPECT_EQ(expected_final_status_, final_status()) <<
416 " when testing URL " << prerender_url().path() <<
417 " (Expected: " << NameFromFinalStatus(expected_final_status_) <<
418 ", Actual: " << NameFromFinalStatus(final_status()) << ")";
420 // Prerendering RenderViewHosts should be hidden before the first
421 // navigation, so this should be happen for every PrerenderContents for
422 // which a RenderViewHost is created, regardless of whether or not it's
423 // used.
424 if (new_render_view_host_)
425 EXPECT_TRUE(was_hidden_);
427 // A used PrerenderContents will only be destroyed when we swap out
428 // WebContents, at the end of a navigation caused by a call to
429 // NavigateToURLImpl().
430 if (final_status() == FINAL_STATUS_USED)
431 EXPECT_TRUE(new_render_view_host_);
433 EXPECT_EQ(should_be_shown_, was_shown_);
436 void RenderProcessGone(base::TerminationStatus status) override {
437 // On quit, it's possible to end up here when render processes are closed
438 // before the PrerenderManager is destroyed. As a result, it's possible to
439 // get either FINAL_STATUS_APP_TERMINATING or FINAL_STATUS_RENDERER_CRASHED
440 // on quit.
442 // It's also possible for this to be called after we've been notified of
443 // app termination, but before we've been deleted, which is why the second
444 // check is needed.
445 if (expected_final_status_ == FINAL_STATUS_APP_TERMINATING &&
446 final_status() != expected_final_status_) {
447 expected_final_status_ = FINAL_STATUS_RENDERER_CRASHED;
450 PrerenderContents::RenderProcessGone(status);
453 bool CheckURL(const GURL& url) override {
454 // Prevent FINAL_STATUS_UNSUPPORTED_SCHEME when navigating to about:crash in
455 // the PrerenderRendererCrash test.
456 if (url.spec() != content::kChromeUICrashURL)
457 return PrerenderContents::CheckURL(url);
458 return true;
461 // For tests that open the prerender in a new background tab, the RenderView
462 // will not have been made visible when the PrerenderContents is destroyed
463 // even though it is used.
464 void set_should_be_shown(bool value) { should_be_shown_ = value; }
466 // For tests which do not know whether the prerender will be used.
467 void set_skip_final_checks(bool value) { skip_final_checks_ = value; }
469 FinalStatus expected_final_status() const { return expected_final_status_; }
471 private:
472 void OnRenderViewHostCreated(RenderViewHost* new_render_view_host) override {
473 // Used to make sure the RenderViewHost is hidden and, if used,
474 // subsequently shown.
475 notification_registrar().Add(
476 this,
477 content::NOTIFICATION_RENDER_WIDGET_VISIBILITY_CHANGED,
478 content::Source<RenderWidgetHost>(new_render_view_host));
480 new_render_view_host_ = new_render_view_host;
482 PrerenderContents::OnRenderViewHostCreated(new_render_view_host);
485 void Observe(int type,
486 const content::NotificationSource& source,
487 const content::NotificationDetails& details) override {
488 if (type ==
489 content::NOTIFICATION_RENDER_WIDGET_VISIBILITY_CHANGED) {
490 EXPECT_EQ(new_render_view_host_,
491 content::Source<RenderWidgetHost>(source).ptr());
492 bool is_visible = *content::Details<bool>(details).ptr();
494 if (!is_visible) {
495 was_hidden_ = true;
496 } else if (is_visible && was_hidden_) {
497 // Once hidden, a prerendered RenderViewHost should only be shown after
498 // being removed from the PrerenderContents for display.
499 EXPECT_FALSE(GetRenderViewHost());
500 was_shown_ = true;
502 return;
504 PrerenderContents::Observe(type, source, details);
507 FinalStatus expected_final_status_;
509 // The RenderViewHost created for the prerender, if any.
510 RenderViewHost* new_render_view_host_;
511 // Set to true when the prerendering RenderWidget is hidden.
512 bool was_hidden_;
513 // Set to true when the prerendering RenderWidget is shown, after having been
514 // hidden.
515 bool was_shown_;
516 // Expected final value of was_shown_. Defaults to true for
517 // FINAL_STATUS_USED, and false otherwise.
518 bool should_be_shown_;
519 // If true, |expected_final_status_| and other shutdown checks are skipped.
520 bool skip_final_checks_;
523 // A handle to a TestPrerenderContents whose lifetime is under the caller's
524 // control. A PrerenderContents may be destroyed at any point. This allows
525 // tracking the final status, etc.
526 class TestPrerender : public PrerenderContents::Observer,
527 public base::SupportsWeakPtr<TestPrerender> {
528 public:
529 TestPrerender()
530 : contents_(NULL),
531 number_of_loads_(0),
532 expected_number_of_loads_(0) {
534 ~TestPrerender() override {
535 if (contents_)
536 contents_->RemoveObserver(this);
539 TestPrerenderContents* contents() const { return contents_; }
540 int number_of_loads() const { return number_of_loads_; }
542 void WaitForCreate() { create_loop_.Run(); }
543 void WaitForStart() { start_loop_.Run(); }
544 void WaitForStop() { stop_loop_.Run(); }
546 // Waits for |number_of_loads()| to be at least |expected_number_of_loads| OR
547 // for the prerender to stop running (just to avoid a timeout if the prerender
548 // dies). Note: this does not assert equality on the number of loads; the
549 // caller must do it instead.
550 void WaitForLoads(int expected_number_of_loads) {
551 DCHECK(!load_waiter_);
552 DCHECK(!expected_number_of_loads_);
553 if (number_of_loads_ < expected_number_of_loads) {
554 load_waiter_.reset(new base::RunLoop);
555 expected_number_of_loads_ = expected_number_of_loads;
556 load_waiter_->Run();
557 load_waiter_.reset();
558 expected_number_of_loads_ = 0;
560 EXPECT_LE(expected_number_of_loads, number_of_loads_);
563 void OnPrerenderCreated(TestPrerenderContents* contents) {
564 DCHECK(!contents_);
565 contents_ = contents;
566 contents_->AddObserver(this);
567 create_loop_.Quit();
570 // PrerenderContents::Observer implementation:
571 void OnPrerenderStart(PrerenderContents* contents) override {
572 start_loop_.Quit();
575 void OnPrerenderStopLoading(PrerenderContents* contents) override {
576 number_of_loads_++;
577 if (load_waiter_ && number_of_loads_ >= expected_number_of_loads_)
578 load_waiter_->Quit();
581 void OnPrerenderStop(PrerenderContents* contents) override {
582 DCHECK(contents_);
583 contents_ = NULL;
584 stop_loop_.Quit();
585 // If there is a WaitForLoads call and it has yet to see the expected number
586 // of loads, stop the loop so the test fails instead of timing out.
587 if (load_waiter_)
588 load_waiter_->Quit();
591 void OnPrerenderCreatedMatchCompleteReplacement(
592 PrerenderContents* contents,
593 PrerenderContents* replacement) override {}
595 private:
596 TestPrerenderContents* contents_;
597 int number_of_loads_;
599 int expected_number_of_loads_;
600 scoped_ptr<base::RunLoop> load_waiter_;
602 base::RunLoop create_loop_;
603 base::RunLoop start_loop_;
604 base::RunLoop stop_loop_;
606 DISALLOW_COPY_AND_ASSIGN(TestPrerender);
609 // PrerenderManager that uses TestPrerenderContents.
610 class TestPrerenderContentsFactory : public PrerenderContents::Factory {
611 public:
612 TestPrerenderContentsFactory() {}
614 ~TestPrerenderContentsFactory() override {
615 EXPECT_TRUE(expected_contents_queue_.empty());
618 scoped_ptr<TestPrerender> ExpectPrerenderContents(FinalStatus final_status) {
619 scoped_ptr<TestPrerender> handle(new TestPrerender());
620 expected_contents_queue_.push_back(
621 ExpectedContents(final_status, handle->AsWeakPtr()));
622 return handle.Pass();
625 PrerenderContents* CreatePrerenderContents(
626 PrerenderManager* prerender_manager,
627 Profile* profile,
628 const GURL& url,
629 const content::Referrer& referrer,
630 Origin origin,
631 uint8 experiment_id) override {
632 ExpectedContents expected;
633 if (!expected_contents_queue_.empty()) {
634 expected = expected_contents_queue_.front();
635 expected_contents_queue_.pop_front();
637 VLOG(1) << "Creating prerender contents for " << url.path() <<
638 " with expected final status " << expected.final_status;
639 VLOG(1) << expected_contents_queue_.size() << " left in the queue.";
640 TestPrerenderContents* contents =
641 new TestPrerenderContents(prerender_manager,
642 profile, url, referrer, origin,
643 expected.final_status);
644 if (expected.handle)
645 expected.handle->OnPrerenderCreated(contents);
646 return contents;
649 private:
650 struct ExpectedContents {
651 ExpectedContents() : final_status(FINAL_STATUS_MAX) { }
652 ExpectedContents(FinalStatus final_status,
653 const base::WeakPtr<TestPrerender>& handle)
654 : final_status(final_status),
655 handle(handle) {
658 FinalStatus final_status;
659 base::WeakPtr<TestPrerender> handle;
662 std::deque<ExpectedContents> expected_contents_queue_;
665 #if defined(FULL_SAFE_BROWSING)
666 // A SafeBrowsingDatabaseManager implementation that returns a fixed result for
667 // a given URL.
668 class FakeSafeBrowsingDatabaseManager : public SafeBrowsingDatabaseManager {
669 public:
670 explicit FakeSafeBrowsingDatabaseManager(SafeBrowsingService* service)
671 : SafeBrowsingDatabaseManager(service),
672 threat_type_(SB_THREAT_TYPE_SAFE) { }
674 // Called on the IO thread to check if the given url is safe or not. If we
675 // can synchronously determine that the url is safe, CheckUrl returns true.
676 // Otherwise it returns false, and "client" is called asynchronously with the
677 // result when it is ready.
678 // Returns true, indicating a SAFE result, unless the URL is the fixed URL
679 // specified by the user, and the user-specified result is not SAFE
680 // (in which that result will be communicated back via a call into the
681 // client, and false will be returned).
682 // Overrides SafeBrowsingService::CheckBrowseUrl.
683 bool CheckBrowseUrl(const GURL& gurl, Client* client) override {
684 if (gurl != url_ || threat_type_ == SB_THREAT_TYPE_SAFE)
685 return true;
687 BrowserThread::PostTask(
688 BrowserThread::IO, FROM_HERE,
689 base::Bind(&FakeSafeBrowsingDatabaseManager::OnCheckBrowseURLDone,
690 this, gurl, client));
691 return false;
694 void SetThreatTypeForUrl(const GURL& url, SBThreatType threat_type) {
695 url_ = url;
696 threat_type_ = threat_type;
699 private:
700 ~FakeSafeBrowsingDatabaseManager() override {}
702 void OnCheckBrowseURLDone(const GURL& gurl, Client* client) {
703 std::vector<SBThreatType> expected_threats;
704 expected_threats.push_back(SB_THREAT_TYPE_URL_MALWARE);
705 expected_threats.push_back(SB_THREAT_TYPE_URL_PHISHING);
706 SafeBrowsingDatabaseManager::SafeBrowsingCheck sb_check(
707 std::vector<GURL>(1, gurl),
708 std::vector<SBFullHash>(),
709 client,
710 safe_browsing_util::MALWARE,
711 expected_threats);
712 sb_check.url_results[0] = threat_type_;
713 client->OnSafeBrowsingResult(sb_check);
716 GURL url_;
717 SBThreatType threat_type_;
718 DISALLOW_COPY_AND_ASSIGN(FakeSafeBrowsingDatabaseManager);
721 class FakeSafeBrowsingService : public SafeBrowsingService {
722 public:
723 FakeSafeBrowsingService() { }
725 // Returned pointer has the same lifespan as the database_manager_ refcounted
726 // object.
727 FakeSafeBrowsingDatabaseManager* fake_database_manager() {
728 return fake_database_manager_;
731 protected:
732 ~FakeSafeBrowsingService() override {}
734 SafeBrowsingDatabaseManager* CreateDatabaseManager() override {
735 fake_database_manager_ = new FakeSafeBrowsingDatabaseManager(this);
736 return fake_database_manager_;
739 private:
740 FakeSafeBrowsingDatabaseManager* fake_database_manager_;
742 DISALLOW_COPY_AND_ASSIGN(FakeSafeBrowsingService);
745 // Factory that creates FakeSafeBrowsingService instances.
746 class TestSafeBrowsingServiceFactory : public SafeBrowsingServiceFactory {
747 public:
748 TestSafeBrowsingServiceFactory() :
749 most_recent_service_(NULL) { }
750 ~TestSafeBrowsingServiceFactory() override {}
752 SafeBrowsingService* CreateSafeBrowsingService() override {
753 most_recent_service_ = new FakeSafeBrowsingService();
754 return most_recent_service_;
757 FakeSafeBrowsingService* most_recent_service() const {
758 return most_recent_service_;
761 private:
762 FakeSafeBrowsingService* most_recent_service_;
764 #endif
766 class FakeDevToolsClient : public content::DevToolsAgentHostClient {
767 public:
768 FakeDevToolsClient() {}
769 ~FakeDevToolsClient() override {}
770 void DispatchProtocolMessage(DevToolsAgentHost* agent_host,
771 const std::string& message) override {}
772 void AgentHostClosed(DevToolsAgentHost* agent_host, bool replaced) override {}
775 class RestorePrerenderMode {
776 public:
777 RestorePrerenderMode() : prev_mode_(PrerenderManager::GetMode()) {
780 ~RestorePrerenderMode() { PrerenderManager::SetMode(prev_mode_); }
781 private:
782 PrerenderManager::PrerenderManagerMode prev_mode_;
785 // URLRequestJob (and associated handler) which hangs.
786 class HangingURLRequestJob : public net::URLRequestJob {
787 public:
788 HangingURLRequestJob(net::URLRequest* request,
789 net::NetworkDelegate* network_delegate)
790 : net::URLRequestJob(request, network_delegate) {
793 void Start() override {}
795 private:
796 ~HangingURLRequestJob() override {}
799 class HangingFirstRequestInterceptor : public net::URLRequestInterceptor {
800 public:
801 HangingFirstRequestInterceptor(const base::FilePath& file,
802 base::Closure callback)
803 : file_(file),
804 callback_(callback),
805 first_run_(true) {
807 ~HangingFirstRequestInterceptor() override {}
809 net::URLRequestJob* MaybeInterceptRequest(
810 net::URLRequest* request,
811 net::NetworkDelegate* network_delegate) const override {
812 if (first_run_) {
813 first_run_ = false;
814 if (!callback_.is_null()) {
815 BrowserThread::PostTask(
816 BrowserThread::UI, FROM_HERE, callback_);
818 return new HangingURLRequestJob(request, network_delegate);
820 return new net::URLRequestMockHTTPJob(
821 request,
822 network_delegate,
823 file_,
824 BrowserThread::GetBlockingPool()->GetTaskRunnerWithShutdownBehavior(
825 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN));
828 private:
829 base::FilePath file_;
830 base::Closure callback_;
831 mutable bool first_run_;
834 // Makes |url| never respond on the first load, and then with the contents of
835 // |file| afterwards. When the first load has been scheduled, runs |callback| on
836 // the UI thread.
837 void CreateHangingFirstRequestInterceptorOnIO(
838 const GURL& url, const base::FilePath& file, base::Closure callback) {
839 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
840 scoped_ptr<net::URLRequestInterceptor> never_respond_handler(
841 new HangingFirstRequestInterceptor(file, callback));
842 net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
843 url, never_respond_handler.Pass());
846 // Wrapper over URLRequestMockHTTPJob that exposes extra callbacks.
847 class MockHTTPJob : public net::URLRequestMockHTTPJob {
848 public:
849 MockHTTPJob(net::URLRequest* request,
850 net::NetworkDelegate* delegate,
851 const base::FilePath& file)
852 : net::URLRequestMockHTTPJob(
853 request,
854 delegate,
855 file,
856 BrowserThread::GetBlockingPool()->GetTaskRunnerWithShutdownBehavior(
857 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN)) {}
859 void set_start_callback(const base::Closure& start_callback) {
860 start_callback_ = start_callback;
863 void Start() override {
864 if (!start_callback_.is_null())
865 start_callback_.Run();
866 net::URLRequestMockHTTPJob::Start();
869 private:
870 ~MockHTTPJob() override {}
872 base::Closure start_callback_;
875 // Dummy counter class to live on the UI thread for counting requests.
876 class RequestCounter : public base::SupportsWeakPtr<RequestCounter> {
877 public:
878 RequestCounter() : count_(0), expected_count_(-1) {}
879 int count() const { return count_; }
881 void RequestStarted() {
882 count_++;
883 if (loop_ && count_ == expected_count_)
884 loop_->Quit();
887 void WaitForCount(int expected_count) {
888 ASSERT_TRUE(!loop_);
889 ASSERT_EQ(-1, expected_count_);
890 if (count_ < expected_count) {
891 expected_count_ = expected_count;
892 loop_.reset(new base::RunLoop);
893 loop_->Run();
894 expected_count_ = -1;
895 loop_.reset();
898 EXPECT_EQ(expected_count, count_);
900 private:
901 int count_;
902 int expected_count_;
903 scoped_ptr<base::RunLoop> loop_;
906 // Protocol handler which counts the number of requests that start.
907 class CountingInterceptor : public net::URLRequestInterceptor {
908 public:
909 CountingInterceptor(const base::FilePath& file,
910 const base::WeakPtr<RequestCounter>& counter)
911 : file_(file),
912 counter_(counter),
913 weak_factory_(this) {
915 ~CountingInterceptor() override {}
917 net::URLRequestJob* MaybeInterceptRequest(
918 net::URLRequest* request,
919 net::NetworkDelegate* network_delegate) const override {
920 MockHTTPJob* job = new MockHTTPJob(request, network_delegate, file_);
921 job->set_start_callback(base::Bind(&CountingInterceptor::RequestStarted,
922 weak_factory_.GetWeakPtr()));
923 return job;
926 void RequestStarted() {
927 BrowserThread::PostTask(
928 BrowserThread::UI, FROM_HERE,
929 base::Bind(&RequestCounter::RequestStarted, counter_));
932 private:
933 base::FilePath file_;
934 base::WeakPtr<RequestCounter> counter_;
935 mutable base::WeakPtrFactory<CountingInterceptor> weak_factory_;
938 // Makes |url| respond to requests with the contents of |file|, counting the
939 // number that start in |counter|.
940 void CreateCountingInterceptorOnIO(
941 const GURL& url,
942 const base::FilePath& file,
943 const base::WeakPtr<RequestCounter>& counter) {
944 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
945 scoped_ptr<net::URLRequestInterceptor> request_interceptor(
946 new CountingInterceptor(file, counter));
947 net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
948 url, request_interceptor.Pass());
951 // Makes |url| respond to requests with the contents of |file|.
952 void CreateMockInterceptorOnIO(const GURL& url, const base::FilePath& file) {
953 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
954 net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
955 url,
956 net::URLRequestMockHTTPJob::CreateInterceptorForSingleFile(
957 file, BrowserThread::GetBlockingPool()));
960 // A ContentBrowserClient that cancels all prerenderers on OpenURL.
961 class TestContentBrowserClient : public chrome::ChromeContentBrowserClient {
962 public:
963 TestContentBrowserClient() {}
964 ~TestContentBrowserClient() override {}
966 // chrome::ChromeContentBrowserClient implementation.
967 bool ShouldAllowOpenURL(content::SiteInstance* site_instance,
968 const GURL& url) override {
969 PrerenderManagerFactory::GetForProfile(
970 Profile::FromBrowserContext(site_instance->GetBrowserContext()))
971 ->CancelAllPrerenders();
972 return chrome::ChromeContentBrowserClient::ShouldAllowOpenURL(site_instance,
973 url);
976 private:
977 DISALLOW_COPY_AND_ASSIGN(TestContentBrowserClient);
980 // A ContentBrowserClient that forces cross-process navigations.
981 class SwapProcessesContentBrowserClient
982 : public chrome::ChromeContentBrowserClient {
983 public:
984 SwapProcessesContentBrowserClient() {}
985 ~SwapProcessesContentBrowserClient() override {}
987 // chrome::ChromeContentBrowserClient implementation.
988 bool ShouldSwapProcessesForRedirect(
989 content::ResourceContext* resource_context,
990 const GURL& current_url,
991 const GURL& new_url) override {
992 return true;
995 private:
996 DISALLOW_COPY_AND_ASSIGN(SwapProcessesContentBrowserClient);
999 // An ExternalProtocolHandler that blocks everything and asserts it never is
1000 // called.
1001 class NeverRunsExternalProtocolHandlerDelegate
1002 : public ExternalProtocolHandler::Delegate {
1003 public:
1004 // ExternalProtocolHandler::Delegate implementation.
1005 ShellIntegration::DefaultProtocolClientWorker* CreateShellWorker(
1006 ShellIntegration::DefaultWebClientObserver* observer,
1007 const std::string& protocol) override {
1008 NOTREACHED();
1009 // This will crash, but it shouldn't get this far with BlockState::BLOCK
1010 // anyway.
1011 return NULL;
1013 ExternalProtocolHandler::BlockState GetBlockState(
1014 const std::string& scheme) override {
1015 // Block everything and fail the test.
1016 ADD_FAILURE();
1017 return ExternalProtocolHandler::BLOCK;
1019 void BlockRequest() override {}
1020 void RunExternalProtocolDialog(const GURL& url,
1021 int render_process_host_id,
1022 int routing_id) override {
1023 NOTREACHED();
1025 void LaunchUrlWithoutSecurityCheck(const GURL& url) override { NOTREACHED(); }
1026 void FinishedProcessingCheck() override { NOTREACHED(); }
1029 base::FilePath GetTestPath(const std::string& file_name) {
1030 return ui_test_utils::GetTestFilePath(
1031 base::FilePath(FILE_PATH_LITERAL("prerender")),
1032 base::FilePath().AppendASCII(file_name));
1035 } // namespace
1037 // Many of these tests are flaky. See http://crbug.com/249179
1038 class PrerenderBrowserTest : virtual public InProcessBrowserTest {
1039 public:
1040 PrerenderBrowserTest()
1041 : autostart_test_server_(true),
1042 prerender_contents_factory_(NULL),
1043 #if defined(FULL_SAFE_BROWSING)
1044 safe_browsing_factory_(new TestSafeBrowsingServiceFactory()),
1045 #endif
1046 call_javascript_(true),
1047 check_load_events_(true),
1048 loader_path_("files/prerender/prerender_loader.html"),
1049 explicitly_set_browser_(NULL) {}
1051 ~PrerenderBrowserTest() override {}
1053 content::SessionStorageNamespace* GetSessionStorageNamespace() const {
1054 WebContents* web_contents = GetActiveWebContents();
1055 if (!web_contents)
1056 return NULL;
1057 return web_contents->GetController().GetDefaultSessionStorageNamespace();
1060 void SetUpInProcessBrowserTestFixture() override {
1061 #if defined(FULL_SAFE_BROWSING)
1062 SafeBrowsingService::RegisterFactory(safe_browsing_factory_.get());
1063 #endif
1066 void TearDownInProcessBrowserTestFixture() override {
1067 #if defined(FULL_SAFE_BROWSING)
1068 SafeBrowsingService::RegisterFactory(NULL);
1069 #endif
1072 void SetUpCommandLine(CommandLine* command_line) override {
1073 command_line->AppendSwitchASCII(switches::kPrerenderMode,
1074 switches::kPrerenderModeSwitchValueEnabled);
1075 #if defined(OS_MACOSX)
1076 // The plugins directory isn't read by default on the Mac, so it needs to be
1077 // explicitly registered.
1078 base::FilePath app_dir;
1079 PathService::Get(chrome::DIR_APP, &app_dir);
1080 command_line->AppendSwitchPath(
1081 switches::kExtraPluginDir,
1082 app_dir.Append(FILE_PATH_LITERAL("plugins")));
1083 #endif
1084 command_line->AppendSwitch(switches::kAlwaysAuthorizePlugins);
1087 void SetPreference(NetworkPredictionOptions value) {
1088 browser()->profile()->GetPrefs()->SetInteger(
1089 prefs::kNetworkPredictionOptions, value);
1092 void CreateTestFieldTrial(const std::string& name,
1093 const std::string& group_name) {
1094 base::FieldTrial* trial = base::FieldTrialList::CreateFieldTrial(
1095 name, group_name);
1096 trial->group();
1099 // Verifies, for the current field trial, whether
1100 // ShouldDisableLocalPredictorDueToPreferencesAndNetwork produces the desired
1101 // output.
1102 void TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
1103 bool preference_wifi_network_wifi,
1104 bool preference_wifi_network_4g,
1105 bool preference_always_network_wifi,
1106 bool preference_always_network_4g,
1107 bool preference_never_network_wifi,
1108 bool preference_never_network_4g) {
1109 Profile* profile = browser()->profile();
1111 // Set real NetworkChangeNotifier singleton aside.
1112 scoped_ptr<NetworkChangeNotifier::DisableForTest> disable_for_test(
1113 new NetworkChangeNotifier::DisableForTest);
1115 // Set preference to WIFI_ONLY: prefetch when not on cellular.
1116 SetPreference(NetworkPredictionOptions::NETWORK_PREDICTION_WIFI_ONLY);
1118 scoped_ptr<NetworkChangeNotifier> mock(new MockNetworkChangeNotifierWIFI);
1119 EXPECT_EQ(
1120 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile),
1121 preference_wifi_network_wifi);
1124 scoped_ptr<NetworkChangeNotifier> mock(new MockNetworkChangeNotifier4G);
1125 EXPECT_EQ(
1126 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile),
1127 preference_wifi_network_4g);
1130 // Set preference to ALWAYS: always prefetch.
1131 SetPreference(NetworkPredictionOptions::NETWORK_PREDICTION_ALWAYS);
1133 scoped_ptr<NetworkChangeNotifier> mock(new MockNetworkChangeNotifierWIFI);
1134 EXPECT_EQ(
1135 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile),
1136 preference_always_network_wifi);
1139 scoped_ptr<NetworkChangeNotifier> mock(new MockNetworkChangeNotifier4G);
1140 EXPECT_EQ(
1141 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile),
1142 preference_always_network_4g);
1145 // Set preference to NEVER: never prefetch.
1146 SetPreference(NetworkPredictionOptions::NETWORK_PREDICTION_NEVER);
1148 scoped_ptr<NetworkChangeNotifier> mock(new MockNetworkChangeNotifierWIFI);
1149 EXPECT_EQ(
1150 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile),
1151 preference_never_network_wifi);
1154 scoped_ptr<NetworkChangeNotifier> mock(new MockNetworkChangeNotifier4G);
1155 EXPECT_EQ(
1156 ShouldDisableLocalPredictorDueToPreferencesAndNetwork(profile),
1157 preference_never_network_4g);
1161 void SetUpOnMainThread() override {
1162 current_browser()->profile()->GetPrefs()->SetBoolean(
1163 prefs::kPromptForDownload, false);
1164 IncreasePrerenderMemory();
1165 if (autostart_test_server_)
1166 ASSERT_TRUE(test_server()->Start());
1167 ChromeResourceDispatcherHostDelegate::
1168 SetExternalProtocolHandlerDelegateForTesting(
1169 &external_protocol_handler_delegate_);
1171 PrerenderManager* prerender_manager = GetPrerenderManager();
1172 ASSERT_TRUE(prerender_manager);
1173 prerender_manager->mutable_config().rate_limit_enabled = false;
1174 ASSERT_TRUE(prerender_contents_factory_ == NULL);
1175 prerender_contents_factory_ = new TestPrerenderContentsFactory;
1176 prerender_manager->SetPrerenderContentsFactory(prerender_contents_factory_);
1179 // Convenience function to get the currently active WebContents in
1180 // current_browser().
1181 WebContents* GetActiveWebContents() const {
1182 return current_browser()->tab_strip_model()->GetActiveWebContents();
1185 // Overload for a single expected final status
1186 scoped_ptr<TestPrerender> PrerenderTestURL(
1187 const std::string& html_file,
1188 FinalStatus expected_final_status,
1189 int expected_number_of_loads) {
1190 GURL url = test_server()->GetURL(html_file);
1191 return PrerenderTestURL(url,
1192 expected_final_status,
1193 expected_number_of_loads);
1196 ScopedVector<TestPrerender> PrerenderTestURL(
1197 const std::string& html_file,
1198 const std::vector<FinalStatus>& expected_final_status_queue,
1199 int expected_number_of_loads) {
1200 GURL url = test_server()->GetURL(html_file);
1201 return PrerenderTestURLImpl(url,
1202 expected_final_status_queue,
1203 expected_number_of_loads);
1206 scoped_ptr<TestPrerender> PrerenderTestURL(
1207 const GURL& url,
1208 FinalStatus expected_final_status,
1209 int expected_number_of_loads) {
1210 std::vector<FinalStatus> expected_final_status_queue(
1211 1, expected_final_status);
1212 std::vector<TestPrerender*> prerenders;
1213 PrerenderTestURLImpl(url,
1214 expected_final_status_queue,
1215 expected_number_of_loads).release(&prerenders);
1216 CHECK_EQ(1u, prerenders.size());
1217 return scoped_ptr<TestPrerender>(prerenders[0]);
1220 // Navigates to a URL, unrelated to prerendering
1221 void NavigateStraightToURL(const std::string dest_html_file) {
1222 ui_test_utils::NavigateToURL(current_browser(),
1223 test_server()->GetURL(dest_html_file));
1226 void NavigateToDestURL() const {
1227 NavigateToDestURLWithDisposition(CURRENT_TAB, true);
1230 // Opens the url in a new tab, with no opener.
1231 void NavigateToDestURLWithDisposition(
1232 WindowOpenDisposition disposition,
1233 bool expect_swap_to_succeed) const {
1234 NavigateToURLWithParams(
1235 content::OpenURLParams(dest_url_, Referrer(), disposition,
1236 ui::PAGE_TRANSITION_TYPED, false),
1237 expect_swap_to_succeed);
1240 void NavigateToURL(const std::string& dest_html_file) const {
1241 NavigateToURLWithDisposition(dest_html_file, CURRENT_TAB, true);
1244 void NavigateToURLWithDisposition(const std::string& dest_html_file,
1245 WindowOpenDisposition disposition,
1246 bool expect_swap_to_succeed) const {
1247 GURL dest_url = test_server()->GetURL(dest_html_file);
1248 NavigateToURLWithDisposition(dest_url, disposition, expect_swap_to_succeed);
1251 void NavigateToURLWithDisposition(const GURL& dest_url,
1252 WindowOpenDisposition disposition,
1253 bool expect_swap_to_succeed) const {
1254 NavigateToURLWithParams(
1255 content::OpenURLParams(dest_url, Referrer(), disposition,
1256 ui::PAGE_TRANSITION_TYPED, false),
1257 expect_swap_to_succeed);
1260 void NavigateToURLWithParams(const content::OpenURLParams& params,
1261 bool expect_swap_to_succeed) const {
1262 NavigateToURLImpl(params, expect_swap_to_succeed);
1265 void OpenDestURLViaClick() const {
1266 OpenURLViaClick(dest_url_);
1269 void OpenURLViaClick(const GURL& url) const {
1270 OpenURLWithJSImpl("Click", url, GURL(), false);
1273 void OpenDestURLViaClickTarget() const {
1274 OpenURLWithJSImpl("ClickTarget", dest_url_, GURL(), true);
1277 void OpenDestURLViaClickPing(const GURL& ping_url) const {
1278 OpenURLWithJSImpl("ClickPing", dest_url_, ping_url, false);
1281 void OpenDestURLViaClickNewWindow() const {
1282 OpenURLWithJSImpl("ShiftClick", dest_url_, GURL(), true);
1285 void OpenDestURLViaClickNewForegroundTab() const {
1286 #if defined(OS_MACOSX)
1287 OpenURLWithJSImpl("MetaShiftClick", dest_url_, GURL(), true);
1288 #else
1289 OpenURLWithJSImpl("CtrlShiftClick", dest_url_, GURL(), true);
1290 #endif
1293 void OpenDestURLViaWindowOpen() const {
1294 OpenURLViaWindowOpen(dest_url_);
1297 void OpenURLViaWindowOpen(const GURL& url) const {
1298 OpenURLWithJSImpl("WindowOpen", url, GURL(), true);
1301 void RemoveLinkElement(int i) const {
1302 GetActiveWebContents()->GetMainFrame()->ExecuteJavaScript(
1303 base::ASCIIToUTF16(base::StringPrintf("RemoveLinkElement(%d)", i)));
1306 void ClickToNextPageAfterPrerender() {
1307 TestNavigationObserver nav_observer(GetActiveWebContents());
1308 RenderFrameHost* render_frame_host = GetActiveWebContents()->GetMainFrame();
1309 render_frame_host->ExecuteJavaScript(base::ASCIIToUTF16("ClickOpenLink()"));
1310 nav_observer.Wait();
1313 void NavigateToNextPageAfterPrerender() const {
1314 ui_test_utils::NavigateToURL(
1315 current_browser(),
1316 test_server()->GetURL("files/prerender/prerender_page.html"));
1319 // Called after the prerendered page has been navigated to and then away from.
1320 // Navigates back through the history to the prerendered page.
1321 void GoBackToPrerender() {
1322 TestNavigationObserver back_nav_observer(GetActiveWebContents());
1323 chrome::GoBack(current_browser(), CURRENT_TAB);
1324 back_nav_observer.Wait();
1325 bool original_prerender_page = false;
1326 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
1327 GetActiveWebContents(),
1328 "window.domAutomationController.send(IsOriginalPrerenderPage())",
1329 &original_prerender_page));
1330 EXPECT_TRUE(original_prerender_page);
1333 // Goes back to the page that was active before the prerender was swapped
1334 // in. This must be called when the prerendered page is the current page
1335 // in the active tab.
1336 void GoBackToPageBeforePrerender() {
1337 WebContents* tab = GetActiveWebContents();
1338 ASSERT_TRUE(tab);
1339 EXPECT_FALSE(tab->IsLoading());
1340 TestNavigationObserver back_nav_observer(tab);
1341 chrome::GoBack(current_browser(), CURRENT_TAB);
1342 back_nav_observer.Wait();
1343 bool js_result;
1344 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
1345 tab,
1346 "window.domAutomationController.send(DidBackToOriginalPagePass())",
1347 &js_result));
1348 EXPECT_TRUE(js_result);
1351 bool UrlIsInPrerenderManager(const std::string& html_file) const {
1352 return UrlIsInPrerenderManager(test_server()->GetURL(html_file));
1355 bool UrlIsInPrerenderManager(const GURL& url) const {
1356 return GetPrerenderManager()->FindPrerenderData(
1357 url, GetSessionStorageNamespace()) != NULL;
1360 void UseHttpsSrcServer() {
1361 if (https_src_server_)
1362 return;
1363 https_src_server_.reset(
1364 new net::SpawnedTestServer(
1365 net::SpawnedTestServer::TYPE_HTTPS,
1366 net::SpawnedTestServer::kLocalhost,
1367 base::FilePath(FILE_PATH_LITERAL("chrome/test/data"))));
1368 CHECK(https_src_server_->Start());
1371 void DisableJavascriptCalls() {
1372 call_javascript_ = false;
1375 void DisableLoadEventCheck() {
1376 check_load_events_ = false;
1379 TaskManagerModel* GetModel() const {
1380 return TaskManager::GetInstance()->model();
1383 PrerenderManager* GetPrerenderManager() const {
1384 PrerenderManager* prerender_manager =
1385 PrerenderManagerFactory::GetForProfile(current_browser()->profile());
1386 return prerender_manager;
1389 const PrerenderLinkManager* GetPrerenderLinkManager() const {
1390 PrerenderLinkManager* prerender_link_manager =
1391 PrerenderLinkManagerFactory::GetForProfile(
1392 current_browser()->profile());
1393 return prerender_link_manager;
1396 int GetPrerenderEventCount(int index, const std::string& type) const {
1397 int event_count;
1398 std::string expression = base::StringPrintf(
1399 "window.domAutomationController.send("
1400 " GetPrerenderEventCount(%d, '%s'))", index, type.c_str());
1402 CHECK(content::ExecuteScriptAndExtractInt(
1403 GetActiveWebContents(), expression, &event_count));
1404 return event_count;
1407 bool DidReceivePrerenderStartEventForLinkNumber(int index) const {
1408 return GetPrerenderEventCount(index, "webkitprerenderstart") > 0;
1411 int GetPrerenderLoadEventCountForLinkNumber(int index) const {
1412 return GetPrerenderEventCount(index, "webkitprerenderload");
1415 int GetPrerenderDomContentLoadedEventCountForLinkNumber(int index) const {
1416 return GetPrerenderEventCount(index, "webkitprerenderdomcontentloaded");
1419 bool DidReceivePrerenderStopEventForLinkNumber(int index) const {
1420 return GetPrerenderEventCount(index, "webkitprerenderstop") > 0;
1423 void WaitForPrerenderEventCount(int index,
1424 const std::string& type,
1425 int count) const {
1426 int dummy;
1427 std::string expression = base::StringPrintf(
1428 "WaitForPrerenderEventCount(%d, '%s', %d,"
1429 " window.domAutomationController.send.bind("
1430 " window.domAutomationController, 0))",
1431 index, type.c_str(), count);
1433 CHECK(content::ExecuteScriptAndExtractInt(
1434 GetActiveWebContents(), expression, &dummy));
1435 CHECK_EQ(0, dummy);
1438 bool HadPrerenderEventErrors() const {
1439 bool had_prerender_event_errors;
1440 CHECK(content::ExecuteScriptAndExtractBool(
1441 GetActiveWebContents(),
1442 "window.domAutomationController.send(Boolean("
1443 " hadPrerenderEventErrors))",
1444 &had_prerender_event_errors));
1445 return had_prerender_event_errors;
1448 // Asserting on this can result in flaky tests. PrerenderHandles are
1449 // removed from the PrerenderLinkManager when the prerender is canceled from
1450 // the browser, when the prerenders are cancelled from the renderer process,
1451 // or the channel for the renderer process is closed on the IO thread. In the
1452 // last case, the code must be careful to wait for the channel to close, as it
1453 // is done asynchronously after swapping out the old process. See
1454 // ChannelDestructionWatcher.
1455 bool IsEmptyPrerenderLinkManager() const {
1456 return GetPrerenderLinkManager()->IsEmpty();
1459 size_t GetLinkPrerenderCount() const {
1460 return GetPrerenderLinkManager()->prerenders_.size();
1463 size_t GetRunningLinkPrerenderCount() const {
1464 return GetPrerenderLinkManager()->CountRunningPrerenders();
1467 // Returns length of |prerender_manager_|'s history, or -1 on failure.
1468 int GetHistoryLength() const {
1469 scoped_ptr<base::DictionaryValue> prerender_dict(
1470 static_cast<base::DictionaryValue*>(
1471 GetPrerenderManager()->GetAsValue()));
1472 if (!prerender_dict.get())
1473 return -1;
1474 base::ListValue* history_list;
1475 if (!prerender_dict->GetList("history", &history_list))
1476 return -1;
1477 return static_cast<int>(history_list->GetSize());
1480 #if defined(FULL_SAFE_BROWSING)
1481 FakeSafeBrowsingDatabaseManager* GetFakeSafeBrowsingDatabaseManager() {
1482 return safe_browsing_factory_->most_recent_service()->
1483 fake_database_manager();
1485 #endif
1487 TestPrerenderContents* GetPrerenderContentsFor(const GURL& url) const {
1488 PrerenderManager::PrerenderData* prerender_data =
1489 GetPrerenderManager()->FindPrerenderData(url, NULL);
1490 return static_cast<TestPrerenderContents*>(
1491 prerender_data ? prerender_data->contents() : NULL);
1494 void SetLoaderHostOverride(const std::string& host) {
1495 loader_host_override_ = host;
1496 host_resolver()->AddRule(host, "127.0.0.1");
1499 void set_loader_path(const std::string& path) {
1500 loader_path_ = path;
1503 void set_loader_query(const std::string& query) {
1504 loader_query_ = query;
1507 GURL GetCrossDomainTestUrl(const std::string& path) {
1508 static const std::string secondary_domain = "www.foo.com";
1509 host_resolver()->AddRule(secondary_domain, "127.0.0.1");
1510 std::string url_str(base::StringPrintf(
1511 "http://%s:%d/%s",
1512 secondary_domain.c_str(),
1513 test_server()->host_port_pair().port(),
1514 path.c_str()));
1515 return GURL(url_str);
1518 void set_browser(Browser* browser) {
1519 explicitly_set_browser_ = browser;
1522 Browser* current_browser() const {
1523 return explicitly_set_browser_ ? explicitly_set_browser_ : browser();
1526 const GURL& dest_url() const {
1527 return dest_url_;
1530 void IncreasePrerenderMemory() {
1531 // Increase the memory allowed in a prerendered page above normal settings.
1532 // Debug build bots occasionally run against the default limit, and tests
1533 // were failing because the prerender was canceled due to memory exhaustion.
1534 // http://crbug.com/93076
1535 GetPrerenderManager()->mutable_config().max_bytes = 1000 * 1024 * 1024;
1538 bool DidPrerenderPass(WebContents* web_contents) const {
1539 bool prerender_test_result = false;
1540 if (!content::ExecuteScriptAndExtractBool(
1541 web_contents,
1542 "window.domAutomationController.send(DidPrerenderPass())",
1543 &prerender_test_result))
1544 return false;
1545 return prerender_test_result;
1548 bool DidDisplayPass(WebContents* web_contents) const {
1549 bool display_test_result = false;
1550 if (!content::ExecuteScriptAndExtractBool(
1551 web_contents,
1552 "window.domAutomationController.send(DidDisplayPass())",
1553 &display_test_result))
1554 return false;
1555 return display_test_result;
1558 scoped_ptr<TestPrerender> ExpectPrerender(FinalStatus expected_final_status) {
1559 return prerender_contents_factory_->ExpectPrerenderContents(
1560 expected_final_status);
1563 void AddPrerender(const GURL& url, int index) {
1564 std::string javascript = base::StringPrintf(
1565 "AddPrerender('%s', %d)", url.spec().c_str(), index);
1566 RenderFrameHost* render_frame_host = GetActiveWebContents()->GetMainFrame();
1567 render_frame_host->ExecuteJavaScript(base::ASCIIToUTF16(javascript));
1570 // Returns a string for pattern-matching TaskManager tab entries.
1571 base::string16 MatchTaskManagerTab(const char* page_title) {
1572 return l10n_util::GetStringFUTF16(IDS_TASK_MANAGER_TAB_PREFIX,
1573 base::ASCIIToUTF16(page_title));
1576 // Returns a string for pattern-matching TaskManager prerender entries.
1577 base::string16 MatchTaskManagerPrerender(const char* page_title) {
1578 return l10n_util::GetStringFUTF16(IDS_TASK_MANAGER_PRERENDER_PREFIX,
1579 base::ASCIIToUTF16(page_title));
1582 void RunJSReturningString(const char* js, std::string* result) {
1583 ASSERT_TRUE(
1584 content::ExecuteScriptAndExtractString(
1585 GetActiveWebContents(),
1586 base::StringPrintf("window.domAutomationController.send(%s)",
1587 js).c_str(),
1588 result));
1591 void RunJS(const char* js) {
1592 ASSERT_TRUE(content::ExecuteScript(
1593 GetActiveWebContents(),
1594 base::StringPrintf("window.domAutomationController.send(%s)",
1595 js).c_str()));
1598 const base::HistogramTester& histogram_tester() { return histogram_tester_; }
1600 protected:
1601 bool autostart_test_server_;
1603 private:
1604 // TODO(davidben): Remove this altogether so the tests don't globally assume
1605 // only one prerender.
1606 TestPrerenderContents* GetPrerenderContents() const {
1607 return GetPrerenderContentsFor(dest_url_);
1610 ScopedVector<TestPrerender> PrerenderTestURLImpl(
1611 const GURL& prerender_url,
1612 const std::vector<FinalStatus>& expected_final_status_queue,
1613 int expected_number_of_loads) {
1614 dest_url_ = prerender_url;
1616 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
1617 replacement_text.push_back(
1618 make_pair("REPLACE_WITH_PRERENDER_URL", prerender_url.spec()));
1619 std::string replacement_path;
1620 CHECK(net::SpawnedTestServer::GetFilePathWithReplacements(
1621 loader_path_,
1622 replacement_text,
1623 &replacement_path));
1625 const net::SpawnedTestServer* src_server = test_server();
1626 if (https_src_server_)
1627 src_server = https_src_server_.get();
1628 GURL loader_url = src_server->GetURL(
1629 replacement_path + "&" + loader_query_);
1631 GURL::Replacements loader_replacements;
1632 if (!loader_host_override_.empty())
1633 loader_replacements.SetHostStr(loader_host_override_);
1634 loader_url = loader_url.ReplaceComponents(loader_replacements);
1636 VLOG(1) << "Running test with queue length " <<
1637 expected_final_status_queue.size();
1638 CHECK(!expected_final_status_queue.empty());
1639 ScopedVector<TestPrerender> prerenders;
1640 for (size_t i = 0; i < expected_final_status_queue.size(); i++) {
1641 prerenders.push_back(
1642 prerender_contents_factory_->ExpectPrerenderContents(
1643 expected_final_status_queue[i]).release());
1646 FinalStatus expected_final_status = expected_final_status_queue.front();
1648 // Navigate to the loader URL and then wait for the first prerender to be
1649 // created.
1650 ui_test_utils::NavigateToURL(current_browser(), loader_url);
1651 prerenders[0]->WaitForCreate();
1652 prerenders[0]->WaitForLoads(expected_number_of_loads);
1654 if (ShouldAbortPrerenderBeforeSwap(expected_final_status)) {
1655 // The prerender will abort on its own. Assert it does so correctly.
1656 prerenders[0]->WaitForStop();
1657 EXPECT_FALSE(prerenders[0]->contents());
1658 EXPECT_TRUE(DidReceivePrerenderStopEventForLinkNumber(0));
1659 } else {
1660 // Otherwise, check that it prerendered correctly.
1661 TestPrerenderContents* prerender_contents = prerenders[0]->contents();
1663 CHECK_NE(static_cast<PrerenderContents*>(NULL), prerender_contents);
1664 EXPECT_EQ(FINAL_STATUS_MAX, prerender_contents->final_status());
1665 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1667 if (call_javascript_) {
1668 // Check if page behaves as expected while in prerendered state.
1669 EXPECT_TRUE(DidPrerenderPass(prerender_contents->prerender_contents()));
1673 // Test that the referring page received the right start and load events.
1674 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1675 if (check_load_events_) {
1676 EXPECT_EQ(expected_number_of_loads, prerenders[0]->number_of_loads());
1677 EXPECT_EQ(expected_number_of_loads,
1678 GetPrerenderLoadEventCountForLinkNumber(0));
1680 EXPECT_FALSE(HadPrerenderEventErrors());
1682 return prerenders.Pass();
1685 void NavigateToURLImpl(const content::OpenURLParams& params,
1686 bool expect_swap_to_succeed) const {
1687 ASSERT_NE(static_cast<PrerenderManager*>(NULL), GetPrerenderManager());
1688 // Make sure in navigating we have a URL to use in the PrerenderManager.
1689 ASSERT_NE(static_cast<PrerenderContents*>(NULL), GetPrerenderContents());
1691 WebContents* web_contents = GetPrerenderContents()->prerender_contents();
1693 // Navigate and wait for either the load to finish normally or for a swap to
1694 // occur.
1695 // TODO(davidben): The only handles CURRENT_TAB navigations, which is the
1696 // only case tested or prerendered right now.
1697 CHECK_EQ(CURRENT_TAB, params.disposition);
1698 NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
1699 GetActiveWebContents());
1700 WebContents* target_web_contents = current_browser()->OpenURL(params);
1701 swap_observer.Wait();
1703 if (web_contents && expect_swap_to_succeed) {
1704 EXPECT_EQ(web_contents, target_web_contents);
1705 if (call_javascript_)
1706 EXPECT_TRUE(DidDisplayPass(web_contents));
1710 // Opens the prerendered page using javascript functions in the loader
1711 // page. |javascript_function_name| should be a 0 argument function which is
1712 // invoked. |new_web_contents| is true if the navigation is expected to
1713 // happen in a new WebContents via OpenURL.
1714 void OpenURLWithJSImpl(const std::string& javascript_function_name,
1715 const GURL& url,
1716 const GURL& ping_url,
1717 bool new_web_contents) const {
1718 WebContents* web_contents = GetActiveWebContents();
1719 RenderFrameHost* render_frame_host = web_contents->GetMainFrame();
1720 // Extra arguments in JS are ignored.
1721 std::string javascript = base::StringPrintf(
1722 "%s('%s', '%s')", javascript_function_name.c_str(),
1723 url.spec().c_str(), ping_url.spec().c_str());
1725 if (new_web_contents) {
1726 NewTabNavigationOrSwapObserver observer;
1727 render_frame_host->
1728 ExecuteJavaScriptForTests(base::ASCIIToUTF16(javascript));
1729 observer.Wait();
1730 } else {
1731 NavigationOrSwapObserver observer(current_browser()->tab_strip_model(),
1732 web_contents);
1733 render_frame_host->ExecuteJavaScript(base::ASCIIToUTF16(javascript));
1734 observer.Wait();
1738 TestPrerenderContentsFactory* prerender_contents_factory_;
1739 #if defined(FULL_SAFE_BROWSING)
1740 scoped_ptr<TestSafeBrowsingServiceFactory> safe_browsing_factory_;
1741 #endif
1742 NeverRunsExternalProtocolHandlerDelegate external_protocol_handler_delegate_;
1743 GURL dest_url_;
1744 scoped_ptr<net::SpawnedTestServer> https_src_server_;
1745 bool call_javascript_;
1746 bool check_load_events_;
1747 std::string loader_host_override_;
1748 std::string loader_path_;
1749 std::string loader_query_;
1750 Browser* explicitly_set_browser_;
1751 base::HistogramTester histogram_tester_;
1752 scoped_ptr<base::FieldTrialList> field_trial_list_;
1755 // Checks that a page is correctly prerendered in the case of a
1756 // <link rel=prerender> tag and then loaded into a tab in response to a
1757 // navigation.
1758 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPage) {
1759 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
1760 EXPECT_EQ(1, GetPrerenderDomContentLoadedEventCountForLinkNumber(0));
1761 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
1762 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
1763 histogram_tester().ExpectTotalCount(
1764 "Prerender.none_PerceivedPLTMatchedComplete", 0);
1765 histogram_tester().ExpectTotalCount(
1766 "Prerender.websame_PrerenderNotSwappedInPLT", 1);
1768 ChannelDestructionWatcher channel_close_watcher;
1769 channel_close_watcher.WatchChannel(
1770 GetActiveWebContents()->GetRenderProcessHost());
1771 NavigateToDestURL();
1772 channel_close_watcher.WaitForChannelClose();
1774 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
1775 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
1777 histogram_tester().ExpectTotalCount(
1778 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
1780 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
1783 // Checks that cross-domain prerenders emit the correct histograms.
1784 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageCrossDomain) {
1785 PrerenderTestURL(GetCrossDomainTestUrl("files/prerender/prerender_page.html"),
1786 FINAL_STATUS_USED, 1);
1787 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
1788 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
1789 histogram_tester().ExpectTotalCount(
1790 "Prerender.none_PerceivedPLTMatchedComplete", 0);
1791 histogram_tester().ExpectTotalCount(
1792 "Prerender.webcross_PrerenderNotSwappedInPLT", 1);
1794 NavigateToDestURL();
1795 histogram_tester().ExpectTotalCount("Prerender.webcross_PerceivedPLT", 1);
1796 histogram_tester().ExpectTotalCount("Prerender.webcross_PerceivedPLTMatched",
1798 histogram_tester().ExpectTotalCount(
1799 "Prerender.webcross_PerceivedPLTMatchedComplete", 1);
1802 // Checks that pending prerenders launch and receive proper event treatment.
1803 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPagePending) {
1804 scoped_ptr<TestPrerender> prerender =
1805 PrerenderTestURL("files/prerender/prerender_page_pending.html",
1806 FINAL_STATUS_USED, 1);
1808 // Navigate to the prerender.
1809 scoped_ptr<TestPrerender> prerender2 = ExpectPrerender(FINAL_STATUS_USED);
1810 NavigateToDestURL();
1811 // Abort early if the original prerender didn't swap, so as not to hang.
1812 ASSERT_FALSE(prerender->contents());
1814 // Wait for the new prerender to be ready.
1815 prerender2->WaitForStart();
1816 prerender2->WaitForLoads(1);
1818 const GURL prerender_page_url =
1819 test_server()->GetURL("files/prerender/prerender_page.html");
1820 EXPECT_FALSE(IsEmptyPrerenderLinkManager());
1821 EXPECT_NE(static_cast<TestPrerenderContents*>(NULL),
1822 GetPrerenderContentsFor(prerender_page_url));
1824 // Now navigate to our target page.
1825 NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
1826 GetActiveWebContents());
1827 ui_test_utils::NavigateToURLWithDisposition(
1828 current_browser(), prerender_page_url, CURRENT_TAB,
1829 ui_test_utils::BROWSER_TEST_NONE);
1830 swap_observer.Wait();
1832 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1835 // Checks that pending prerenders which are canceled before they are launched
1836 // never get started.
1837 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageRemovesPending) {
1838 PrerenderTestURL("files/prerender/prerender_page_removes_pending.html",
1839 FINAL_STATUS_USED, 1);
1841 ChannelDestructionWatcher channel_close_watcher;
1842 channel_close_watcher.WatchChannel(
1843 GetActiveWebContents()->GetRenderProcessHost());
1844 NavigateToDestURL();
1845 channel_close_watcher.WaitForChannelClose();
1847 EXPECT_FALSE(DidReceivePrerenderStartEventForLinkNumber(1));
1848 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1849 EXPECT_FALSE(HadPrerenderEventErrors());
1850 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1851 // calls did a thread/process hop to the renderer which insured pending
1852 // renderer events have arrived.
1853 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
1856 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageRemovingLink) {
1857 scoped_ptr<TestPrerender> prerender =
1858 PrerenderTestURL("files/prerender/prerender_page.html",
1859 FINAL_STATUS_CANCELLED, 1);
1861 // No ChannelDestructionWatcher is needed here, since prerenders in the
1862 // PrerenderLinkManager should be deleted by removing the links, rather than
1863 // shutting down the renderer process.
1864 RemoveLinkElement(0);
1865 prerender->WaitForStop();
1867 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1868 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1869 EXPECT_FALSE(HadPrerenderEventErrors());
1870 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1871 // calls did a thread/process hop to the renderer which insured pending
1872 // renderer events have arrived.
1873 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1876 IN_PROC_BROWSER_TEST_F(
1877 PrerenderBrowserTest, PrerenderPageRemovingLinkWithTwoLinks) {
1878 GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
1879 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
1881 set_loader_query("links_to_insert=2");
1882 scoped_ptr<TestPrerender> prerender =
1883 PrerenderTestURL("files/prerender/prerender_page.html",
1884 FINAL_STATUS_CANCELLED, 1);
1885 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1886 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1887 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1888 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1890 RemoveLinkElement(0);
1891 RemoveLinkElement(1);
1892 prerender->WaitForStop();
1894 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1895 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1896 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1897 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1898 EXPECT_FALSE(HadPrerenderEventErrors());
1899 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1900 // calls did a thread/process hop to the renderer which insured pending
1901 // renderer events have arrived.
1902 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1905 IN_PROC_BROWSER_TEST_F(
1906 PrerenderBrowserTest, PrerenderPageRemovingLinkWithTwoLinksOneLate) {
1907 GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
1908 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
1910 GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
1911 scoped_ptr<TestPrerender> prerender =
1912 PrerenderTestURL(url, FINAL_STATUS_CANCELLED, 1);
1914 // Add a second prerender for the same link. It reuses the prerender, so only
1915 // the start event fires here.
1916 AddPrerender(url, 1);
1917 WaitForPrerenderEventCount(1, "webkitprerenderstart", 1);
1918 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1919 EXPECT_EQ(0, GetPrerenderLoadEventCountForLinkNumber(1));
1920 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1922 RemoveLinkElement(0);
1923 RemoveLinkElement(1);
1924 prerender->WaitForStop();
1926 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1927 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1928 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1929 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1930 EXPECT_FALSE(HadPrerenderEventErrors());
1931 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1932 // calls did a thread/process hop to the renderer which insured pending
1933 // renderer events have arrived.
1934 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1937 IN_PROC_BROWSER_TEST_F(
1938 PrerenderBrowserTest,
1939 PrerenderPageRemovingLinkWithTwoLinksRemovingOne) {
1940 GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
1941 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
1942 set_loader_query("links_to_insert=2");
1943 PrerenderTestURL("files/prerender/prerender_page.html",
1944 FINAL_STATUS_USED, 1);
1945 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1946 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1947 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1948 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1950 RemoveLinkElement(0);
1951 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1952 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1953 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1954 EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1955 EXPECT_FALSE(HadPrerenderEventErrors());
1956 // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1957 // calls did a thread/process hop to the renderer which insured pending
1958 // renderer events have arrived.
1959 EXPECT_FALSE(IsEmptyPrerenderLinkManager());
1961 ChannelDestructionWatcher channel_close_watcher;
1962 channel_close_watcher.WatchChannel(
1963 GetActiveWebContents()->GetRenderProcessHost());
1964 NavigateToDestURL();
1965 channel_close_watcher.WaitForChannelClose();
1967 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1970 // Checks that the visibility API works.
1971 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderVisibility) {
1972 PrerenderTestURL("files/prerender/prerender_visibility.html",
1973 FINAL_STATUS_USED,
1975 NavigateToDestURL();
1978 // Checks that the prerendering of a page is canceled correctly if we try to
1979 // swap it in before it commits.
1980 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNoCommitNoSwap) {
1981 // Navigate to a page that triggers a prerender for a URL that never commits.
1982 const GURL kNoCommitUrl("http://never-respond.example.com");
1983 base::FilePath file(GetTestPath("prerender_page.html"));
1985 base::RunLoop prerender_start_loop;
1986 BrowserThread::PostTask(
1987 BrowserThread::IO, FROM_HERE,
1988 base::Bind(&CreateHangingFirstRequestInterceptorOnIO, kNoCommitUrl, file,
1989 prerender_start_loop.QuitClosure()));
1990 DisableJavascriptCalls();
1991 PrerenderTestURL(kNoCommitUrl,
1992 FINAL_STATUS_NAVIGATION_UNCOMMITTED,
1994 // Wait for the hanging request to be scheduled.
1995 prerender_start_loop.Run();
1997 // Navigate to the URL, but assume the contents won't be swapped in.
1998 NavigateToDestURLWithDisposition(CURRENT_TAB, false);
2001 // Checks that client redirects don't add alias URLs until after they commit.
2002 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNoCommitNoSwap2) {
2003 // Navigate to a page that then navigates to a URL that never commits.
2004 const GURL kNoCommitUrl("http://never-respond.example.com");
2005 base::FilePath file(GetTestPath("prerender_page.html"));
2007 base::RunLoop prerender_start_loop;
2008 BrowserThread::PostTask(
2009 BrowserThread::IO, FROM_HERE,
2010 base::Bind(&CreateHangingFirstRequestInterceptorOnIO, kNoCommitUrl, file,
2011 prerender_start_loop.QuitClosure()));
2012 DisableJavascriptCalls();
2013 PrerenderTestURL(CreateClientRedirect(kNoCommitUrl.spec()),
2014 FINAL_STATUS_APP_TERMINATING, 1);
2015 // Wait for the hanging request to be scheduled.
2016 prerender_start_loop.Run();
2018 // Navigating to the second URL should not swap.
2019 NavigateToURLWithDisposition(kNoCommitUrl, CURRENT_TAB, false);
2022 // Checks that the prerendering of a page is canceled correctly when a
2023 // Javascript alert is called.
2024 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderAlertBeforeOnload) {
2025 PrerenderTestURL("files/prerender/prerender_alert_before_onload.html",
2026 FINAL_STATUS_JAVASCRIPT_ALERT,
2030 // Checks that the prerendering of a page is canceled correctly when a
2031 // Javascript alert is called.
2032 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderAlertAfterOnload) {
2033 PrerenderTestURL("files/prerender/prerender_alert_after_onload.html",
2034 FINAL_STATUS_JAVASCRIPT_ALERT,
2038 // Checks that plugins are not loaded while a page is being preloaded, but
2039 // are loaded when the page is displayed.
2040 #if defined(USE_AURA) && !defined(OS_WIN)
2041 // http://crbug.com/103496
2042 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2043 #elif defined(OS_MACOSX)
2044 // http://crbug.com/100514
2045 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2046 #elif defined(OS_WIN) && defined(ARCH_CPU_X86_64)
2047 // TODO(jschuh): Failing plugin tests. crbug.com/244653
2048 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2049 #elif defined(OS_LINUX)
2050 // http://crbug.com/306715
2051 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
2052 #else
2053 #define MAYBE_PrerenderDelayLoadPlugin PrerenderDelayLoadPlugin
2054 #endif
2055 // http://crbug.com/306715
2056 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, MAYBE_PrerenderDelayLoadPlugin) {
2057 PrerenderTestURL("files/prerender/plugin_delay_load.html",
2058 FINAL_STATUS_USED,
2060 NavigateToDestURL();
2063 // Checks that plugins are not loaded on prerendering pages when click-to-play
2064 // is enabled.
2065 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickToPlay) {
2066 // Enable click-to-play.
2067 HostContentSettingsMap* content_settings_map =
2068 current_browser()->profile()->GetHostContentSettingsMap();
2069 content_settings_map->SetDefaultContentSetting(
2070 CONTENT_SETTINGS_TYPE_PLUGINS, CONTENT_SETTING_ASK);
2072 PrerenderTestURL("files/prerender/prerender_plugin_click_to_play.html",
2073 FINAL_STATUS_USED,
2075 NavigateToDestURL();
2078 // Checks that we don't load a NaCl plugin when NaCl is disabled.
2079 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNaClPluginDisabled) {
2080 PrerenderTestURL("files/prerender/prerender_plugin_nacl_disabled.html",
2081 FINAL_STATUS_USED,
2083 NavigateToDestURL();
2086 // Run this check again. When we try to load aa ppapi plugin, the
2087 // "loadstart" event is asynchronously posted to a message loop.
2088 // It's possible that earlier call could have been run before the
2089 // the "loadstart" event was posted.
2090 // TODO(mmenke): While this should reliably fail on regressions, the
2091 // reliability depends on the specifics of ppapi plugin
2092 // loading. It would be great if we could avoid that.
2093 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2096 // Checks that plugins in an iframe are not loaded while a page is
2097 // being preloaded, but are loaded when the page is displayed.
2098 #if defined(USE_AURA) && !defined(OS_WIN)
2099 // http://crbug.com/103496
2100 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2101 DISABLED_PrerenderIframeDelayLoadPlugin
2102 #elif defined(OS_MACOSX)
2103 // http://crbug.com/100514
2104 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2105 DISABLED_PrerenderIframeDelayLoadPlugin
2106 #elif defined(OS_WIN) && defined(ARCH_CPU_X86_64)
2107 // TODO(jschuh): Failing plugin tests. crbug.com/244653
2108 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2109 DISABLED_PrerenderIframeDelayLoadPlugin
2110 #else
2111 #define MAYBE_PrerenderIframeDelayLoadPlugin PrerenderIframeDelayLoadPlugin
2112 #endif
2113 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2114 MAYBE_PrerenderIframeDelayLoadPlugin) {
2115 PrerenderTestURL("files/prerender/prerender_iframe_plugin_delay_load.html",
2116 FINAL_STATUS_USED,
2118 NavigateToDestURL();
2121 // Renders a page that contains a prerender link to a page that contains an
2122 // iframe with a source that requires http authentication. This should not
2123 // prerender successfully.
2124 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHttpAuthentication) {
2125 PrerenderTestURL("files/prerender/prerender_http_auth_container.html",
2126 FINAL_STATUS_AUTH_NEEDED,
2130 // Checks that client-issued redirects work with prerendering.
2131 // This version navigates to the page which issues the redirection, rather
2132 // than the final destination page.
2133 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2134 PrerenderClientRedirectNavigateToFirst) {
2135 PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
2136 FINAL_STATUS_USED,
2138 NavigateToDestURL();
2141 // Checks that client-issued redirects work with prerendering.
2142 // This version navigates to the final destination page, rather than the
2143 // page which does the redirection.
2144 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2145 PrerenderClientRedirectNavigateToSecond) {
2146 PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
2147 FINAL_STATUS_USED,
2149 NavigateToURL("files/prerender/prerender_page.html");
2152 // Checks that redirects with location.replace do not cancel a prerender and
2153 // and swap when navigating to the first page.
2154 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2155 PrerenderLocationReplaceNavigateToFirst) {
2156 PrerenderTestURL("files/prerender/prerender_location_replace.html",
2157 FINAL_STATUS_USED,
2159 NavigateToDestURL();
2162 // Checks that redirects with location.replace do not cancel a prerender and
2163 // and swap when navigating to the second.
2164 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2165 PrerenderLocationReplaceNavigateToSecond) {
2166 PrerenderTestURL("files/prerender/prerender_location_replace.html",
2167 FINAL_STATUS_USED,
2169 NavigateToURL("files/prerender/prerender_page.html");
2172 // Checks that we get the right PPLT histograms for client redirect prerenders
2173 // and navigations when the referring page is Google.
2174 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2175 PrerenderLocationReplaceGWSHistograms) {
2176 DisableJavascriptCalls();
2178 // The loader page should look like Google.
2179 const std::string kGoogleDotCom("www.google.com");
2180 SetLoaderHostOverride(kGoogleDotCom);
2181 set_loader_path("files/prerender/prerender_loader_with_replace_state.html");
2183 GURL dest_url = GetCrossDomainTestUrl(
2184 "files/prerender/prerender_deferred_image.html");
2186 GURL prerender_url = test_server()->GetURL(
2187 "files/prerender/prerender_location_replace.html?" +
2188 net::EscapeQueryParamValue(dest_url.spec(), false) +
2189 "#prerender");
2190 GURL::Replacements replacements;
2191 replacements.SetHostStr(kGoogleDotCom);
2192 prerender_url = prerender_url.ReplaceComponents(replacements);
2194 // The prerender will not completely load until after the swap, so wait for a
2195 // title change before calling DidPrerenderPass.
2196 scoped_ptr<TestPrerender> prerender =
2197 PrerenderTestURL(prerender_url, FINAL_STATUS_USED, 1);
2198 WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
2199 EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
2200 EXPECT_EQ(1, prerender->number_of_loads());
2202 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
2203 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
2204 histogram_tester().ExpectTotalCount(
2205 "Prerender.none_PerceivedPLTMatchedComplete", 0);
2206 // Although there is a client redirect, it is dropped from histograms because
2207 // it is a Google URL. The target page itself does not load until after the
2208 // swap.
2209 histogram_tester().ExpectTotalCount("Prerender.gws_PrerenderNotSwappedInPLT",
2212 GURL navigate_url = test_server()->GetURL(
2213 "files/prerender/prerender_location_replace.html?" +
2214 net::EscapeQueryParamValue(dest_url.spec(), false) +
2215 "#navigate");
2216 navigate_url = navigate_url.ReplaceComponents(replacements);
2218 NavigationOrSwapObserver swap_observer(
2219 current_browser()->tab_strip_model(),
2220 GetActiveWebContents(), 2);
2221 current_browser()->OpenURL(OpenURLParams(
2222 navigate_url, Referrer(), CURRENT_TAB,
2223 ui::PAGE_TRANSITION_TYPED, false));
2224 swap_observer.Wait();
2226 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2228 histogram_tester().ExpectTotalCount("Prerender.gws_PrerenderNotSwappedInPLT",
2230 histogram_tester().ExpectTotalCount("Prerender.gws_PerceivedPLT", 1);
2231 histogram_tester().ExpectTotalCount("Prerender.gws_PerceivedPLTMatched", 1);
2232 histogram_tester().ExpectTotalCount(
2233 "Prerender.gws_PerceivedPLTMatchedComplete", 1);
2235 // The client redirect does /not/ count as a miss because it's a Google URL.
2236 histogram_tester().ExpectTotalCount("Prerender.PerceivedPLTFirstAfterMiss",
2240 // Checks that client-issued redirects work with prerendering.
2241 // This version navigates to the final destination page, rather than the
2242 // page which does the redirection via a mouse click.
2243 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2244 PrerenderClientRedirectNavigateToSecondViaClick) {
2245 GURL prerender_url = test_server()->GetURL(
2246 CreateClientRedirect("files/prerender/prerender_page.html"));
2247 GURL destination_url = test_server()->GetURL(
2248 "files/prerender/prerender_page.html");
2249 PrerenderTestURL(prerender_url, FINAL_STATUS_USED, 2);
2250 OpenURLViaClick(destination_url);
2253 // Checks that a page served over HTTPS is correctly prerendered.
2254 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHttps) {
2255 net::SpawnedTestServer https_server(
2256 net::SpawnedTestServer::TYPE_HTTPS, net::SpawnedTestServer::kLocalhost,
2257 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2258 ASSERT_TRUE(https_server.Start());
2259 GURL https_url = https_server.GetURL("files/prerender/prerender_page.html");
2260 PrerenderTestURL(https_url,
2261 FINAL_STATUS_USED,
2263 NavigateToDestURL();
2266 // Checks that client-issued redirects within an iframe in a prerendered
2267 // page will not count as an "alias" for the prerendered page.
2268 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2269 PrerenderClientRedirectInIframe) {
2270 std::string redirect_path = CreateClientRedirect(
2271 "/files/prerender/prerender_embedded_content.html");
2272 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2273 replacement_text.push_back(
2274 std::make_pair("REPLACE_WITH_URL", "/" + redirect_path));
2275 std::string replacement_path;
2276 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2277 "files/prerender/prerender_with_iframe.html",
2278 replacement_text,
2279 &replacement_path));
2280 PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 2);
2281 EXPECT_FALSE(UrlIsInPrerenderManager(
2282 "files/prerender/prerender_embedded_content.html"));
2283 NavigateToDestURL();
2286 // Checks that server-issued redirects work with prerendering.
2287 // This version navigates to the page which issues the redirection, rather
2288 // than the final destination page.
2289 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2290 PrerenderServerRedirectNavigateToFirst) {
2291 PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
2292 FINAL_STATUS_USED,
2294 NavigateToDestURL();
2297 // Checks that server-issued redirects work with prerendering.
2298 // This version navigates to the final destination page, rather than the
2299 // page which does the redirection.
2300 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2301 PrerenderServerRedirectNavigateToSecond) {
2302 PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
2303 FINAL_STATUS_USED,
2305 NavigateToURL("files/prerender/prerender_page.html");
2308 // Checks that server-issued redirects work with prerendering.
2309 // This version navigates to the final destination page, rather than the
2310 // page which does the redirection via a mouse click.
2311 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2312 PrerenderServerRedirectNavigateToSecondViaClick) {
2313 GURL prerender_url = test_server()->GetURL(
2314 CreateServerRedirect("files/prerender/prerender_page.html"));
2315 GURL destination_url = test_server()->GetURL(
2316 "files/prerender/prerender_page.html");
2317 PrerenderTestURL(prerender_url, FINAL_STATUS_USED, 1);
2318 OpenURLViaClick(destination_url);
2321 // Checks that server-issued redirects within an iframe in a prerendered
2322 // page will not count as an "alias" for the prerendered page.
2323 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderServerRedirectInIframe) {
2324 std::string redirect_path = CreateServerRedirect(
2325 "/files/prerender/prerender_embedded_content.html");
2326 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2327 replacement_text.push_back(
2328 std::make_pair("REPLACE_WITH_URL", "/" + redirect_path));
2329 std::string replacement_path;
2330 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2331 "files/prerender/prerender_with_iframe.html",
2332 replacement_text,
2333 &replacement_path));
2334 PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
2335 EXPECT_FALSE(UrlIsInPrerenderManager(
2336 "files/prerender/prerender_embedded_content.html"));
2337 NavigateToDestURL();
2340 // Prerenders a page that contains an automatic download triggered through an
2341 // iframe. This should not prerender successfully.
2342 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDownloadIframe) {
2343 PrerenderTestURL("files/prerender/prerender_download_iframe.html",
2344 FINAL_STATUS_DOWNLOAD,
2348 // Prerenders a page that contains an automatic download triggered through
2349 // Javascript changing the window.location. This should not prerender
2350 // successfully
2351 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDownloadLocation) {
2352 PrerenderTestURL(CreateClientRedirect("files/download-test1.lib"),
2353 FINAL_STATUS_DOWNLOAD,
2357 // Prerenders a page that contains an automatic download triggered through a
2358 // client-issued redirect. This should not prerender successfully.
2359 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDownloadClientRedirect) {
2360 PrerenderTestURL("files/prerender/prerender_download_refresh.html",
2361 FINAL_STATUS_DOWNLOAD,
2365 // Checks that the referrer is set when prerendering.
2366 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderReferrer) {
2367 PrerenderTestURL("files/prerender/prerender_referrer.html",
2368 FINAL_STATUS_USED,
2370 NavigateToDestURL();
2373 // Checks that the referrer is not set when prerendering and the source page is
2374 // HTTPS.
2375 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2376 PrerenderNoSSLReferrer) {
2377 UseHttpsSrcServer();
2378 PrerenderTestURL("files/prerender/prerender_no_referrer.html",
2379 FINAL_STATUS_USED,
2381 NavigateToDestURL();
2384 // Checks that the referrer is set when prerendering is cancelled.
2385 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCancelReferrer) {
2386 scoped_ptr<TestContentBrowserClient> test_content_browser_client(
2387 new TestContentBrowserClient);
2388 content::ContentBrowserClient* original_browser_client =
2389 content::SetBrowserClientForTesting(test_content_browser_client.get());
2391 PrerenderTestURL("files/prerender/prerender_referrer.html",
2392 FINAL_STATUS_CANCELLED,
2394 OpenDestURLViaClick();
2396 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2398 content::SetBrowserClientForTesting(original_browser_client);
2401 // Checks that popups on a prerendered page cause cancellation.
2402 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPopup) {
2403 PrerenderTestURL("files/prerender/prerender_popup.html",
2404 FINAL_STATUS_CREATE_NEW_WINDOW,
2408 // Checks that registering a protocol handler causes cancellation.
2409 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderRegisterProtocolHandler) {
2410 PrerenderTestURL("files/prerender/prerender_register_protocol_handler.html",
2411 FINAL_STATUS_REGISTER_PROTOCOL_HANDLER,
2415 // Checks that renderers using excessive memory will be terminated.
2416 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderExcessiveMemory) {
2417 ASSERT_TRUE(GetPrerenderManager());
2418 GetPrerenderManager()->mutable_config().max_bytes = 30 * 1024 * 1024;
2419 // The excessive memory kill may happen before or after the load event as it
2420 // happens asynchronously with IPC calls. Even if the test does not start
2421 // allocating until after load, the browser process might notice before the
2422 // message gets through. This happens on XP debug bots because they're so
2423 // slow. Instead, don't bother checking the load event count.
2424 DisableLoadEventCheck();
2425 PrerenderTestURL("files/prerender/prerender_excessive_memory.html",
2426 FINAL_STATUS_MEMORY_LIMIT_EXCEEDED, 0);
2429 // Checks shutdown code while a prerender is active.
2430 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderQuickQuit) {
2431 DisableJavascriptCalls();
2432 DisableLoadEventCheck();
2433 PrerenderTestURL("files/prerender/prerender_page.html",
2434 FINAL_STATUS_APP_TERMINATING,
2438 // Checks that we don't prerender in an infinite loop.
2439 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderInfiniteLoop) {
2440 const char* const kHtmlFileA = "files/prerender/prerender_infinite_a.html";
2441 const char* const kHtmlFileB = "files/prerender/prerender_infinite_b.html";
2443 std::vector<FinalStatus> expected_final_status_queue;
2444 expected_final_status_queue.push_back(FINAL_STATUS_USED);
2445 expected_final_status_queue.push_back(FINAL_STATUS_APP_TERMINATING);
2447 ScopedVector<TestPrerender> prerenders =
2448 PrerenderTestURL(kHtmlFileA, expected_final_status_queue, 1);
2449 ASSERT_TRUE(prerenders[0]->contents());
2450 // Assert that the pending prerender is in there already. This relies on the
2451 // fact that the renderer sends out the AddLinkRelPrerender IPC before sending
2452 // the page load one.
2453 EXPECT_EQ(2U, GetLinkPrerenderCount());
2454 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2456 // Next url should be in pending list but not an active entry.
2457 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB));
2459 NavigateToDestURL();
2461 // Make sure the PrerenderContents for the next url is now in the manager and
2462 // not pending. This relies on pending prerenders being resolved in the same
2463 // event loop iteration as OnPrerenderStop.
2464 EXPECT_TRUE(UrlIsInPrerenderManager(kHtmlFileB));
2465 EXPECT_EQ(1U, GetLinkPrerenderCount());
2466 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2469 // Checks that we don't prerender in an infinite loop and multiple links are
2470 // handled correctly.
2471 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2472 PrerenderInfiniteLoopMultiple) {
2473 const char* const kHtmlFileA =
2474 "files/prerender/prerender_infinite_a_multiple.html";
2475 const char* const kHtmlFileB =
2476 "files/prerender/prerender_infinite_b_multiple.html";
2477 const char* const kHtmlFileC =
2478 "files/prerender/prerender_infinite_c_multiple.html";
2480 // This test is conceptually simplest if concurrency is at two, since we
2481 // don't have to worry about which of kHtmlFileB or kHtmlFileC gets evicted.
2482 GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
2483 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
2485 std::vector<FinalStatus> expected_final_status_queue;
2486 expected_final_status_queue.push_back(FINAL_STATUS_USED);
2487 expected_final_status_queue.push_back(FINAL_STATUS_APP_TERMINATING);
2488 expected_final_status_queue.push_back(FINAL_STATUS_APP_TERMINATING);
2490 ScopedVector<TestPrerender> prerenders =
2491 PrerenderTestURL(kHtmlFileA, expected_final_status_queue, 1);
2492 ASSERT_TRUE(prerenders[0]->contents());
2494 // Next url should be in pending list but not an active entry. This relies on
2495 // the fact that the renderer sends out the AddLinkRelPrerender IPC before
2496 // sending the page load one.
2497 EXPECT_EQ(3U, GetLinkPrerenderCount());
2498 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2499 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB));
2500 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileC));
2502 NavigateToDestURL();
2504 // Make sure the PrerenderContents for the next urls are now in the manager
2505 // and not pending. One and only one of the URLs (the last seen) should be the
2506 // active entry. This relies on pending prerenders being resolved in the same
2507 // event loop iteration as OnPrerenderStop.
2508 bool url_b_is_active_prerender = UrlIsInPrerenderManager(kHtmlFileB);
2509 bool url_c_is_active_prerender = UrlIsInPrerenderManager(kHtmlFileC);
2510 EXPECT_TRUE(url_b_is_active_prerender && url_c_is_active_prerender);
2511 EXPECT_EQ(2U, GetLinkPrerenderCount());
2512 EXPECT_EQ(2U, GetRunningLinkPrerenderCount());
2515 // Checks that pending prerenders are aborted (and never launched) when launched
2516 // by a prerender that itself gets aborted.
2517 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderAbortPendingOnCancel) {
2518 const char* const kHtmlFileA = "files/prerender/prerender_infinite_a.html";
2519 const char* const kHtmlFileB = "files/prerender/prerender_infinite_b.html";
2521 scoped_ptr<TestPrerender> prerender =
2522 PrerenderTestURL(kHtmlFileA, FINAL_STATUS_CANCELLED, 1);
2523 ASSERT_TRUE(prerender->contents());
2524 // Assert that the pending prerender is in there already. This relies on the
2525 // fact that the renderer sends out the AddLinkRelPrerender IPC before sending
2526 // the page load one.
2527 EXPECT_EQ(2U, GetLinkPrerenderCount());
2528 EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2530 // Next url should be in pending list but not an active entry.
2531 EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB));
2533 // Cancel the prerender.
2534 GetPrerenderManager()->CancelAllPrerenders();
2535 prerender->WaitForStop();
2537 // All prerenders are now gone.
2538 EXPECT_TRUE(IsEmptyPrerenderLinkManager());
2541 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, OpenTaskManagerBeforePrerender) {
2542 const base::string16 any_prerender = MatchTaskManagerPrerender("*");
2543 const base::string16 any_tab = MatchTaskManagerTab("*");
2544 const base::string16 original = MatchTaskManagerTab("Preloader");
2545 const base::string16 prerender = MatchTaskManagerPrerender("Prerender Page");
2546 const base::string16 final = MatchTaskManagerTab("Prerender Page");
2548 // Show the task manager. This populates the model.
2549 chrome::OpenTaskManager(current_browser());
2550 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2551 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2553 // Prerender a page in addition to the original tab.
2554 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
2556 // A TaskManager entry should appear like "Prerender: Prerender Page"
2557 // alongside the original tab entry. There should be just these two entries.
2558 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, prerender));
2559 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, original));
2560 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, final));
2561 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_prerender));
2562 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2564 // Swap in the prerendered content.
2565 NavigateToDestURL();
2567 // The "Prerender: " TaskManager entry should disappear, being replaced by a
2568 // "Tab: Prerender Page" entry, and nothing else.
2569 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, prerender));
2570 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, original));
2571 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final));
2572 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2573 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2576 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, OpenTaskManagerAfterPrerender) {
2577 const base::string16 any_prerender = MatchTaskManagerPrerender("*");
2578 const base::string16 any_tab = MatchTaskManagerTab("*");
2579 const base::string16 original = MatchTaskManagerTab("Preloader");
2580 const base::string16 prerender = MatchTaskManagerPrerender("Prerender Page");
2581 const base::string16 final = MatchTaskManagerTab("Prerender Page");
2583 // Start with two resources.
2584 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
2586 // Show the task manager. This populates the model. Importantly, we're doing
2587 // this after the prerender WebContents already exists - the task manager
2588 // needs to find it, it can't just listen for creation.
2589 chrome::OpenTaskManager(current_browser());
2591 // A TaskManager entry should appear like "Prerender: Prerender Page"
2592 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, prerender));
2593 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, original));
2594 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, final));
2595 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_prerender));
2596 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2598 // Swap in the tab.
2599 NavigateToDestURL();
2601 // The "Prerender: Prerender Page" TaskManager row should disappear, being
2602 // replaced by "Tab: Prerender Page"
2603 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, prerender));
2604 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, original));
2605 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final));
2606 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2607 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2610 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, OpenTaskManagerAfterSwapIn) {
2611 const base::string16 any_prerender = MatchTaskManagerPrerender("*");
2612 const base::string16 any_tab = MatchTaskManagerTab("*");
2613 const base::string16 final = MatchTaskManagerTab("Prerender Page");
2615 // Prerender, and swap it in.
2616 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
2617 NavigateToDestURL();
2619 // Show the task manager. This populates the model. Importantly, we're doing
2620 // this after the prerender has been swapped in.
2621 chrome::OpenTaskManager(current_browser());
2623 // We should not see a prerender resource in the task manager, just a normal
2624 // page.
2625 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final));
2626 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2627 ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2630 // Checks that audio loads are deferred on prerendering.
2631 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5Audio) {
2632 PrerenderTestURL("files/prerender/prerender_html5_audio.html",
2633 FINAL_STATUS_USED,
2635 NavigateToDestURL();
2636 WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2639 // Checks that audio loads are deferred on prerendering and played back when
2640 // the prerender is swapped in if autoplay is set.
2641 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5AudioAutoplay) {
2642 PrerenderTestURL("files/prerender/prerender_html5_audio_autoplay.html",
2643 FINAL_STATUS_USED,
2645 NavigateToDestURL();
2646 WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2649 // Checks that audio loads are deferred on prerendering and played back when
2650 // the prerender is swapped in if js starts playing.
2651 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5AudioJsplay) {
2652 PrerenderTestURL("files/prerender/prerender_html5_audio_jsplay.html",
2653 FINAL_STATUS_USED,
2655 NavigateToDestURL();
2656 WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2659 // Checks that video loads are deferred on prerendering.
2660 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5Video) {
2661 PrerenderTestURL("files/prerender/prerender_html5_video.html",
2662 FINAL_STATUS_USED,
2664 NavigateToDestURL();
2665 WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2668 // Checks that video tags inserted by javascript are deferred and played
2669 // correctly on swap in.
2670 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5VideoJs) {
2671 PrerenderTestURL("files/prerender/prerender_html5_video_script.html",
2672 FINAL_STATUS_USED,
2674 NavigateToDestURL();
2675 WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2678 // Checks for correct network events by using a busy sleep the javascript.
2679 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5VideoNetwork) {
2680 DisableJavascriptCalls();
2681 scoped_ptr<TestPrerender> prerender =
2682 PrerenderTestURL("files/prerender/prerender_html5_video_network.html",
2683 FINAL_STATUS_USED,
2685 WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
2686 EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
2687 NavigateToDestURL();
2688 WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2691 // Checks that scripts can retrieve the correct window size while prerendering.
2692 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderWindowSize) {
2693 PrerenderTestURL("files/prerender/prerender_size.html",
2694 FINAL_STATUS_USED,
2696 NavigateToDestURL();
2699 // TODO(jam): http://crbug.com/350550
2700 #if !(defined(OS_CHROMEOS) && defined(ADDRESS_SANITIZER))
2702 // Checks that prerenderers will terminate when the RenderView crashes.
2703 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderRendererCrash) {
2704 scoped_ptr<TestPrerender> prerender =
2705 PrerenderTestURL("files/prerender/prerender_page.html",
2706 FINAL_STATUS_RENDERER_CRASHED,
2709 // Navigate to about:crash and then wait for the renderer to crash.
2710 ASSERT_TRUE(prerender->contents());
2711 ASSERT_TRUE(prerender->contents()->prerender_contents());
2712 prerender->contents()->prerender_contents()->GetController().
2713 LoadURL(
2714 GURL(content::kChromeUICrashURL),
2715 content::Referrer(),
2716 ui::PAGE_TRANSITION_TYPED,
2717 std::string());
2718 prerender->WaitForStop();
2720 #endif
2722 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2723 PrerenderPageWithFragment) {
2724 PrerenderTestURL("files/prerender/prerender_page.html#fragment",
2725 FINAL_STATUS_USED,
2728 ChannelDestructionWatcher channel_close_watcher;
2729 channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
2730 GetActiveWebContents()->GetRenderProcessHost());
2731 NavigateToDestURL();
2732 channel_close_watcher.WaitForChannelClose();
2734 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
2737 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2738 PrerenderPageWithRedirectedFragment) {
2739 PrerenderTestURL(
2740 CreateClientRedirect("files/prerender/prerender_page.html#fragment"),
2741 FINAL_STATUS_USED,
2744 ChannelDestructionWatcher channel_close_watcher;
2745 channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
2746 GetActiveWebContents()->GetRenderProcessHost());
2747 NavigateToDestURL();
2748 channel_close_watcher.WaitForChannelClose();
2750 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
2753 // Checks that we do not use a prerendered page when navigating from
2754 // the main page to a fragment.
2755 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2756 PrerenderPageNavigateFragment) {
2757 PrerenderTestURL("files/prerender/no_prerender_page.html",
2758 FINAL_STATUS_APP_TERMINATING,
2760 NavigateToURLWithDisposition(
2761 "files/prerender/no_prerender_page.html#fragment",
2762 CURRENT_TAB, false);
2765 // Checks that we do not use a prerendered page when we prerender a fragment
2766 // but navigate to the main page.
2767 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2768 PrerenderFragmentNavigatePage) {
2769 PrerenderTestURL("files/prerender/no_prerender_page.html#fragment",
2770 FINAL_STATUS_APP_TERMINATING,
2772 NavigateToURLWithDisposition(
2773 "files/prerender/no_prerender_page.html",
2774 CURRENT_TAB, false);
2777 // Checks that we do not use a prerendered page when we prerender a fragment
2778 // but navigate to a different fragment on the same page.
2779 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2780 PrerenderFragmentNavigateFragment) {
2781 PrerenderTestURL("files/prerender/no_prerender_page.html#other_fragment",
2782 FINAL_STATUS_APP_TERMINATING,
2784 NavigateToURLWithDisposition(
2785 "files/prerender/no_prerender_page.html#fragment",
2786 CURRENT_TAB, false);
2789 // Checks that we do not use a prerendered page when the page uses a client
2790 // redirect to refresh from a fragment on the same page.
2791 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2792 PrerenderClientRedirectFromFragment) {
2793 PrerenderTestURL(
2794 CreateClientRedirect("files/prerender/no_prerender_page.html#fragment"),
2795 FINAL_STATUS_APP_TERMINATING,
2797 NavigateToURLWithDisposition(
2798 "files/prerender/no_prerender_page.html",
2799 CURRENT_TAB, false);
2802 // Checks that we do not use a prerendered page when the page uses a client
2803 // redirect to refresh to a fragment on the same page.
2804 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2805 PrerenderClientRedirectToFragment) {
2806 PrerenderTestURL(
2807 CreateClientRedirect("files/prerender/no_prerender_page.html"),
2808 FINAL_STATUS_APP_TERMINATING,
2810 NavigateToURLWithDisposition(
2811 "files/prerender/no_prerender_page.html#fragment",
2812 CURRENT_TAB, false);
2815 // Checks that we correctly use a prerendered page when the page uses JS to set
2816 // the window.location.hash to a fragment on the same page.
2817 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2818 PrerenderPageChangeFragmentLocationHash) {
2819 PrerenderTestURL("files/prerender/prerender_fragment_location_hash.html",
2820 FINAL_STATUS_USED,
2822 NavigateToURL("files/prerender/prerender_fragment_location_hash.html");
2825 // Checks that prerendering a PNG works correctly.
2826 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderImagePng) {
2827 DisableJavascriptCalls();
2828 PrerenderTestURL("files/prerender/image.png", FINAL_STATUS_USED, 1);
2829 NavigateToDestURL();
2832 // Checks that prerendering a JPG works correctly.
2833 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderImageJpeg) {
2834 DisableJavascriptCalls();
2835 PrerenderTestURL("files/prerender/image.jpeg", FINAL_STATUS_USED, 1);
2836 NavigateToDestURL();
2839 // Checks that a prerender of a CRX will result in a cancellation due to
2840 // download.
2841 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCrx) {
2842 PrerenderTestURL("files/prerender/extension.crx", FINAL_STATUS_DOWNLOAD, 0);
2845 // Checks that xhr GET requests allow prerenders.
2846 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrGet) {
2847 PrerenderTestURL("files/prerender/prerender_xhr_get.html",
2848 FINAL_STATUS_USED,
2850 NavigateToDestURL();
2853 // Checks that xhr HEAD requests allow prerenders.
2854 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrHead) {
2855 PrerenderTestURL("files/prerender/prerender_xhr_head.html",
2856 FINAL_STATUS_USED,
2858 NavigateToDestURL();
2861 // Checks that xhr OPTIONS requests allow prerenders.
2862 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrOptions) {
2863 PrerenderTestURL("files/prerender/prerender_xhr_options.html",
2864 FINAL_STATUS_USED,
2866 NavigateToDestURL();
2869 // Checks that xhr TRACE requests allow prerenders.
2870 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrTrace) {
2871 PrerenderTestURL("files/prerender/prerender_xhr_trace.html",
2872 FINAL_STATUS_USED,
2874 NavigateToDestURL();
2877 // Checks that xhr POST requests allow prerenders.
2878 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrPost) {
2879 PrerenderTestURL("files/prerender/prerender_xhr_post.html",
2880 FINAL_STATUS_USED,
2882 NavigateToDestURL();
2885 // Checks that xhr PUT cancels prerenders.
2886 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrPut) {
2887 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
2888 FINAL_STATUS_INVALID_HTTP_METHOD,
2892 // Checks that xhr DELETE cancels prerenders.
2893 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrDelete) {
2894 PrerenderTestURL("files/prerender/prerender_xhr_delete.html",
2895 FINAL_STATUS_INVALID_HTTP_METHOD,
2899 // Checks that a top-level page which would trigger an SSL error is canceled.
2900 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLErrorTopLevel) {
2901 net::SpawnedTestServer::SSLOptions ssl_options;
2902 ssl_options.server_certificate =
2903 net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME;
2904 net::SpawnedTestServer https_server(
2905 net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2906 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2907 ASSERT_TRUE(https_server.Start());
2908 GURL https_url = https_server.GetURL("files/prerender/prerender_page.html");
2909 PrerenderTestURL(https_url,
2910 FINAL_STATUS_SSL_ERROR,
2914 // Checks that an SSL error that comes from a subresource does not cancel
2915 // the page. Non-main-frame requests are simply cancelled if they run into
2916 // an SSL problem.
2917 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLErrorSubresource) {
2918 net::SpawnedTestServer::SSLOptions ssl_options;
2919 ssl_options.server_certificate =
2920 net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME;
2921 net::SpawnedTestServer https_server(
2922 net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2923 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2924 ASSERT_TRUE(https_server.Start());
2925 GURL https_url = https_server.GetURL("files/prerender/image.jpeg");
2926 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2927 replacement_text.push_back(
2928 std::make_pair("REPLACE_WITH_IMAGE_URL", https_url.spec()));
2929 std::string replacement_path;
2930 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2931 "files/prerender/prerender_with_image.html",
2932 replacement_text,
2933 &replacement_path));
2934 PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
2935 NavigateToDestURL();
2938 // Checks that an SSL error that comes from an iframe does not cancel
2939 // the page. Non-main-frame requests are simply cancelled if they run into
2940 // an SSL problem.
2941 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLErrorIframe) {
2942 net::SpawnedTestServer::SSLOptions ssl_options;
2943 ssl_options.server_certificate =
2944 net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME;
2945 net::SpawnedTestServer https_server(
2946 net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2947 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2948 ASSERT_TRUE(https_server.Start());
2949 GURL https_url = https_server.GetURL(
2950 "files/prerender/prerender_embedded_content.html");
2951 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2952 replacement_text.push_back(
2953 std::make_pair("REPLACE_WITH_URL", https_url.spec()));
2954 std::string replacement_path;
2955 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2956 "files/prerender/prerender_with_iframe.html",
2957 replacement_text,
2958 &replacement_path));
2959 PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
2960 NavigateToDestURL();
2963 // Checks that we cancel correctly when window.print() is called.
2964 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPrint) {
2965 DisableLoadEventCheck();
2966 PrerenderTestURL("files/prerender/prerender_print.html",
2967 FINAL_STATUS_WINDOW_PRINT,
2971 // Checks that if a page is opened in a new window by javascript and both the
2972 // pages are in the same domain, the prerendered page is not used, due to
2973 // there being other tabs in the same browsing instance.
2974 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2975 PrerenderSameDomainWindowOpenerWindowOpen) {
2976 PrerenderTestURL("files/prerender/prerender_page.html",
2977 FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE,
2979 OpenDestURLViaWindowOpen();
2982 // Checks that if a page is opened due to click on a href with target="_blank"
2983 // and both pages are in the same domain the prerendered page is not used, due
2984 // there being other tabs in the same browsing instance.
2985 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2986 PrerenderSameDomainWindowOpenerClickTarget) {
2987 PrerenderTestURL("files/prerender/prerender_page.html",
2988 FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE,
2990 OpenDestURLViaClickTarget();
2993 // Checks that prerenders do not get swapped into target pages that have opened
2994 // a popup, even if the target page itself does not have an opener.
2995 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderTargetHasPopup) {
2996 PrerenderTestURL("files/prerender/prerender_page.html",
2997 FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE,
2999 OpenURLViaWindowOpen(GURL(url::kAboutBlankURL));
3000 NavigateToDestURLWithDisposition(CURRENT_TAB, false);
3003 class TestClientCertStore : public net::ClientCertStore {
3004 public:
3005 TestClientCertStore() {}
3006 ~TestClientCertStore() override {}
3008 // net::ClientCertStore:
3009 void GetClientCerts(const net::SSLCertRequestInfo& cert_request_info,
3010 net::CertificateList* selected_certs,
3011 const base::Closure& callback) override {
3012 *selected_certs = net::CertificateList(
3013 1, scoped_refptr<net::X509Certificate>(
3014 new net::X509Certificate("test", "test", base::Time(), base::Time())));
3015 callback.Run();
3019 scoped_ptr<net::ClientCertStore> CreateCertStore() {
3020 return scoped_ptr<net::ClientCertStore>(new TestClientCertStore);
3023 // Checks that a top-level page which would normally request an SSL client
3024 // certificate will never be seen since it's an https top-level resource.
3025 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3026 PrerenderSSLClientCertTopLevel) {
3027 ProfileIOData::FromResourceContext(
3028 current_browser()->profile()->GetResourceContext())->
3029 set_client_cert_store_factory_for_testing(
3030 base::Bind(&CreateCertStore));
3031 net::SpawnedTestServer::SSLOptions ssl_options;
3032 ssl_options.request_client_certificate = true;
3033 net::SpawnedTestServer https_server(
3034 net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
3035 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
3036 ASSERT_TRUE(https_server.Start());
3037 GURL https_url = https_server.GetURL("files/prerender/prerender_page.html");
3038 PrerenderTestURL(https_url, FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED, 0);
3041 // Checks that an SSL Client Certificate request that originates from a
3042 // subresource will cancel the prerendered page.
3043 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3044 PrerenderSSLClientCertSubresource) {
3045 ProfileIOData::FromResourceContext(
3046 current_browser()->profile()->GetResourceContext())->
3047 set_client_cert_store_factory_for_testing(
3048 base::Bind(&CreateCertStore));
3049 net::SpawnedTestServer::SSLOptions ssl_options;
3050 ssl_options.request_client_certificate = true;
3051 net::SpawnedTestServer https_server(
3052 net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
3053 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
3054 ASSERT_TRUE(https_server.Start());
3055 GURL https_url = https_server.GetURL("files/prerender/image.jpeg");
3056 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3057 replacement_text.push_back(
3058 std::make_pair("REPLACE_WITH_IMAGE_URL", https_url.spec()));
3059 std::string replacement_path;
3060 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3061 "files/prerender/prerender_with_image.html",
3062 replacement_text,
3063 &replacement_path));
3064 PrerenderTestURL(replacement_path,
3065 FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED,
3069 // Checks that an SSL Client Certificate request that originates from an
3070 // iframe will cancel the prerendered page.
3071 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLClientCertIframe) {
3072 ProfileIOData::FromResourceContext(
3073 current_browser()->profile()->GetResourceContext())->
3074 set_client_cert_store_factory_for_testing(
3075 base::Bind(&CreateCertStore));
3076 net::SpawnedTestServer::SSLOptions ssl_options;
3077 ssl_options.request_client_certificate = true;
3078 net::SpawnedTestServer https_server(
3079 net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
3080 base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
3081 ASSERT_TRUE(https_server.Start());
3082 GURL https_url = https_server.GetURL(
3083 "files/prerender/prerender_embedded_content.html");
3084 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3085 replacement_text.push_back(
3086 std::make_pair("REPLACE_WITH_URL", https_url.spec()));
3087 std::string replacement_path;
3088 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3089 "files/prerender/prerender_with_iframe.html",
3090 replacement_text,
3091 &replacement_path));
3092 PrerenderTestURL(replacement_path,
3093 FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED,
3097 #if defined(FULL_SAFE_BROWSING)
3098 // Ensures that we do not prerender pages with a safe browsing
3099 // interstitial.
3100 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSafeBrowsingTopLevel) {
3101 GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
3102 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3103 url, SB_THREAT_TYPE_URL_MALWARE);
3104 PrerenderTestURL("files/prerender/prerender_page.html",
3105 FINAL_STATUS_SAFE_BROWSING, 0);
3108 // Ensures that server redirects to a malware page will cancel prerenders.
3109 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3110 PrerenderSafeBrowsingServerRedirect) {
3111 GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
3112 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3113 url, SB_THREAT_TYPE_URL_MALWARE);
3114 PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
3115 FINAL_STATUS_SAFE_BROWSING,
3119 // Ensures that client redirects to a malware page will cancel prerenders.
3120 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3121 PrerenderSafeBrowsingClientRedirect) {
3122 GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
3123 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3124 url, SB_THREAT_TYPE_URL_MALWARE);
3125 PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
3126 FINAL_STATUS_SAFE_BROWSING,
3130 // Ensures that we do not prerender pages which have a malware subresource.
3131 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSafeBrowsingSubresource) {
3132 GURL image_url = test_server()->GetURL("files/prerender/image.jpeg");
3133 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3134 image_url, SB_THREAT_TYPE_URL_MALWARE);
3135 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3136 replacement_text.push_back(
3137 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3138 std::string replacement_path;
3139 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3140 "files/prerender/prerender_with_image.html",
3141 replacement_text,
3142 &replacement_path));
3143 PrerenderTestURL(replacement_path,
3144 FINAL_STATUS_SAFE_BROWSING,
3148 // Ensures that we do not prerender pages which have a malware iframe.
3149 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSafeBrowsingIframe) {
3150 GURL iframe_url = test_server()->GetURL(
3151 "files/prerender/prerender_embedded_content.html");
3152 GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3153 iframe_url, SB_THREAT_TYPE_URL_MALWARE);
3154 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3155 replacement_text.push_back(
3156 std::make_pair("REPLACE_WITH_URL", iframe_url.spec()));
3157 std::string replacement_path;
3158 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3159 "files/prerender/prerender_with_iframe.html",
3160 replacement_text,
3161 &replacement_path));
3162 PrerenderTestURL(replacement_path,
3163 FINAL_STATUS_SAFE_BROWSING,
3167 #endif
3169 // Checks that a local storage read will not cause prerender to fail.
3170 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderLocalStorageRead) {
3171 PrerenderTestURL("files/prerender/prerender_localstorage_read.html",
3172 FINAL_STATUS_USED,
3174 NavigateToDestURL();
3177 // Checks that a local storage write will not cause prerender to fail.
3178 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderLocalStorageWrite) {
3179 PrerenderTestURL("files/prerender/prerender_localstorage_write.html",
3180 FINAL_STATUS_USED,
3182 NavigateToDestURL();
3185 // Checks that the favicon is properly loaded on prerender.
3186 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderFavicon) {
3187 scoped_ptr<TestPrerender> prerender =
3188 PrerenderTestURL("files/prerender/prerender_favicon.html",
3189 FINAL_STATUS_USED,
3191 NavigateToDestURL();
3193 if (!FaviconTabHelper::FromWebContents(
3194 GetActiveWebContents())->FaviconIsValid()) {
3195 // If the favicon has not been set yet, wait for it to be.
3196 content::WindowedNotificationObserver favicon_update_watcher(
3197 chrome::NOTIFICATION_FAVICON_UPDATED,
3198 content::Source<WebContents>(GetActiveWebContents()));
3199 favicon_update_watcher.Wait();
3201 EXPECT_TRUE(FaviconTabHelper::FromWebContents(
3202 GetActiveWebContents())->FaviconIsValid());
3205 // Checks that when a prerendered page is swapped in to a referring page, the
3206 // unload handlers on the referring page are executed.
3207 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderUnload) {
3208 // Matches URL in prerender_loader_with_unload.html.
3209 const GURL unload_url("http://unload-url.test");
3210 base::FilePath empty_file = ui_test_utils::GetTestFilePath(
3211 base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
3212 RequestCounter unload_counter;
3213 BrowserThread::PostTask(
3214 BrowserThread::IO, FROM_HERE,
3215 base::Bind(&CreateCountingInterceptorOnIO,
3216 unload_url, empty_file, unload_counter.AsWeakPtr()));
3218 set_loader_path("files/prerender/prerender_loader_with_unload.html");
3219 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3220 NavigateToDestURL();
3221 unload_counter.WaitForCount(1);
3224 // Checks that a hanging unload on the referring page of a prerender swap does
3225 // not crash the browser on exit.
3226 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHangingUnload) {
3227 // Matches URL in prerender_loader_with_unload.html.
3228 const GURL hang_url("http://unload-url.test");
3229 base::FilePath empty_file = ui_test_utils::GetTestFilePath(
3230 base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
3231 BrowserThread::PostTask(
3232 BrowserThread::IO, FROM_HERE,
3233 base::Bind(&CreateHangingFirstRequestInterceptorOnIO,
3234 hang_url, empty_file,
3235 base::Closure()));
3237 set_loader_path("files/prerender/prerender_loader_with_unload.html");
3238 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3239 NavigateToDestURL();
3243 // Checks that when the history is cleared, prerendering is cancelled and
3244 // prerendering history is cleared.
3245 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClearHistory) {
3246 scoped_ptr<TestPrerender> prerender =
3247 PrerenderTestURL("files/prerender/prerender_page.html",
3248 FINAL_STATUS_CACHE_OR_HISTORY_CLEARED,
3251 ClearBrowsingData(current_browser(), BrowsingDataRemover::REMOVE_HISTORY);
3252 prerender->WaitForStop();
3254 // Make sure prerender history was cleared.
3255 EXPECT_EQ(0, GetHistoryLength());
3258 // Checks that when the cache is cleared, prerenders are cancelled but
3259 // prerendering history is not cleared.
3260 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClearCache) {
3261 scoped_ptr<TestPrerender> prerender =
3262 PrerenderTestURL("files/prerender/prerender_page.html",
3263 FINAL_STATUS_CACHE_OR_HISTORY_CLEARED,
3266 ClearBrowsingData(current_browser(), BrowsingDataRemover::REMOVE_CACHE);
3267 prerender->WaitForStop();
3269 // Make sure prerender history was not cleared. Not a vital behavior, but
3270 // used to compare with PrerenderClearHistory test.
3271 EXPECT_EQ(1, GetHistoryLength());
3274 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCancelAll) {
3275 scoped_ptr<TestPrerender> prerender =
3276 PrerenderTestURL("files/prerender/prerender_page.html",
3277 FINAL_STATUS_CANCELLED,
3280 GetPrerenderManager()->CancelAllPrerenders();
3281 prerender->WaitForStop();
3283 EXPECT_FALSE(prerender->contents());
3286 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderEvents) {
3287 scoped_ptr<TestPrerender> prerender =
3288 PrerenderTestURL("files/prerender/prerender_page.html",
3289 FINAL_STATUS_CANCELLED, 1);
3291 GetPrerenderManager()->CancelAllPrerenders();
3292 prerender->WaitForStop();
3294 EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
3295 EXPECT_TRUE(DidReceivePrerenderStopEventForLinkNumber(0));
3296 EXPECT_FALSE(HadPrerenderEventErrors());
3299 // Cancels the prerender of a page with its own prerender. The second prerender
3300 // should never be started.
3301 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3302 PrerenderCancelPrerenderWithPrerender) {
3303 scoped_ptr<TestPrerender> prerender =
3304 PrerenderTestURL("files/prerender/prerender_infinite_a.html",
3305 FINAL_STATUS_CANCELLED,
3308 GetPrerenderManager()->CancelAllPrerenders();
3309 prerender->WaitForStop();
3311 EXPECT_FALSE(prerender->contents());
3314 // Prerendering and history tests.
3315 // The prerendered page is navigated to in several ways [navigate via
3316 // omnibox, click on link, key-modified click to open in background tab, etc],
3317 // followed by a navigation to another page from the prerendered page, followed
3318 // by a back navigation.
3320 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNavigateClickGoBack) {
3321 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3322 FINAL_STATUS_USED,
3324 NavigateToDestURL();
3325 ClickToNextPageAfterPrerender();
3326 GoBackToPrerender();
3329 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNavigateNavigateGoBack) {
3330 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3331 FINAL_STATUS_USED,
3333 NavigateToDestURL();
3334 NavigateToNextPageAfterPrerender();
3335 GoBackToPrerender();
3338 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickClickGoBack) {
3339 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3340 FINAL_STATUS_USED,
3342 OpenDestURLViaClick();
3343 ClickToNextPageAfterPrerender();
3344 GoBackToPrerender();
3347 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickNavigateGoBack) {
3348 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3349 FINAL_STATUS_USED,
3351 OpenDestURLViaClick();
3352 NavigateToNextPageAfterPrerender();
3353 GoBackToPrerender();
3356 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickNewWindow) {
3357 // Prerender currently doesn't interpose on this navigation.
3358 // http://crbug.com/345474.
3359 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3360 FINAL_STATUS_USED,
3362 OpenDestURLViaClickNewWindow();
3365 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickNewForegroundTab) {
3366 // Prerender currently doesn't interpose on this navigation.
3367 // http://crbug.com/345474.
3368 PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3369 FINAL_STATUS_USED,
3371 OpenDestURLViaClickNewForegroundTab();
3374 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3375 NavigateToPrerenderedPageWhenDevToolsAttached) {
3376 DisableJavascriptCalls();
3377 WebContents* web_contents =
3378 current_browser()->tab_strip_model()->GetActiveWebContents();
3379 scoped_refptr<DevToolsAgentHost> agent(
3380 DevToolsAgentHost::GetOrCreateFor(web_contents));
3381 FakeDevToolsClient client;
3382 agent->AttachClient(&client);
3383 const char* url = "files/prerender/prerender_page.html";
3384 PrerenderTestURL(url, FINAL_STATUS_DEVTOOLS_ATTACHED, 1);
3385 NavigateToURLWithDisposition(url, CURRENT_TAB, false);
3386 agent->DetachClient();
3389 // Validate that the sessionStorage namespace remains the same when swapping
3390 // in a prerendered page.
3391 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSessionStorage) {
3392 set_loader_path("files/prerender/prerender_loader_with_session_storage.html");
3393 PrerenderTestURL(GetCrossDomainTestUrl("files/prerender/prerender_page.html"),
3394 FINAL_STATUS_USED,
3396 NavigateToDestURL();
3397 GoBackToPageBeforePrerender();
3400 // Checks that the control group works. An XHR PUT cannot be detected in the
3401 // control group.
3402 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, ControlGroup) {
3403 RestorePrerenderMode restore_prerender_mode;
3404 PrerenderManager::SetMode(
3405 PrerenderManager::PRERENDER_MODE_EXPERIMENT_CONTROL_GROUP);
3406 DisableJavascriptCalls();
3407 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3408 FINAL_STATUS_WOULD_HAVE_BEEN_USED, 0);
3409 NavigateToDestURL();
3412 // Checks that the control group correctly hits WOULD_HAVE_BEEN_USED
3413 // renderer-initiated navigations. (This verifies that the ShouldFork logic
3414 // behaves correctly.)
3415 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, ControlGroupRendererInitiated) {
3416 RestorePrerenderMode restore_prerender_mode;
3417 PrerenderManager::SetMode(
3418 PrerenderManager::PRERENDER_MODE_EXPERIMENT_CONTROL_GROUP);
3419 DisableJavascriptCalls();
3420 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3421 FINAL_STATUS_WOULD_HAVE_BEEN_USED, 0);
3422 OpenDestURLViaClick();
3425 // Make sure that the MatchComplete dummy works in the normal case. Once
3426 // a prerender is cancelled because of a script, a dummy must be created to
3427 // account for the MatchComplete case, and it must have a final status of
3428 // FINAL_STATUS_WOULD_HAVE_BEEN_USED.
3429 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, MatchCompleteDummy) {
3430 RestorePrerenderMode restore_prerender_mode;
3431 PrerenderManager::SetMode(
3432 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP);
3434 std::vector<FinalStatus> expected_final_status_queue;
3435 expected_final_status_queue.push_back(FINAL_STATUS_INVALID_HTTP_METHOD);
3436 expected_final_status_queue.push_back(FINAL_STATUS_WOULD_HAVE_BEEN_USED);
3437 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3438 expected_final_status_queue, 1);
3439 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3440 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3441 histogram_tester().ExpectTotalCount(
3442 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3443 histogram_tester().ExpectTotalCount(
3444 "Prerender.websame_PrerenderNotSwappedInPLT", 1);
3446 NavigateToDestURL();
3447 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3448 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
3450 histogram_tester().ExpectTotalCount(
3451 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3454 // Verify that a navigation that hits a MatchComplete dummy while another is in
3455 // progress does not also classify the previous navigation as a MatchComplete.
3456 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3457 MatchCompleteDummyCancelNavigation) {
3458 RestorePrerenderMode restore_prerender_mode;
3459 PrerenderManager::SetMode(
3460 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP);
3462 // Arrange for a URL to hang.
3463 const GURL kNoCommitUrl("http://never-respond.example.com");
3464 base::FilePath file(FILE_PATH_LITERAL(
3465 "chrome/test/data/prerender/prerender_page.html"));
3466 base::RunLoop hang_loop;
3467 BrowserThread::PostTask(
3468 BrowserThread::IO, FROM_HERE,
3469 base::Bind(&CreateHangingFirstRequestInterceptorOnIO, kNoCommitUrl,
3470 file, hang_loop.QuitClosure()));
3472 // First, fire a prerender that aborts after it completes its load.
3473 std::vector<FinalStatus> expected_final_status_queue;
3474 expected_final_status_queue.push_back(FINAL_STATUS_INVALID_HTTP_METHOD);
3475 expected_final_status_queue.push_back(FINAL_STATUS_WOULD_HAVE_BEEN_USED);
3476 PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3477 expected_final_status_queue, 1);
3478 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3479 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3480 histogram_tester().ExpectTotalCount(
3481 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3482 histogram_tester().ExpectTotalCount(
3483 "Prerender.websame_PrerenderNotSwappedInPLT", 1);
3485 // Open the hanging URL in a new tab. Wait for both the new tab to open and
3486 // the hanging request to be scheduled.
3487 ui_test_utils::NavigateToURLWithDisposition(
3488 current_browser(), kNoCommitUrl, NEW_FOREGROUND_TAB,
3489 ui_test_utils::BROWSER_TEST_WAIT_FOR_TAB);
3490 hang_loop.Run();
3492 // Now interrupt that navigation and navigate to the destination URL. This
3493 // should forcibly complete the previous navigation and also complete a
3494 // WOULD_HAVE_BEEN_PRERENDERED navigation.
3495 NavigateToDestURL();
3496 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 2);
3497 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3498 histogram_tester().ExpectTotalCount(
3499 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3500 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3501 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
3503 histogram_tester().ExpectTotalCount(
3504 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3507 class PrerenderBrowserTestWithNaCl : public PrerenderBrowserTest {
3508 public:
3509 PrerenderBrowserTestWithNaCl() {}
3510 ~PrerenderBrowserTestWithNaCl() override {}
3512 void SetUpCommandLine(CommandLine* command_line) override {
3513 PrerenderBrowserTest::SetUpCommandLine(command_line);
3514 command_line->AppendSwitch(switches::kEnableNaCl);
3518 // Check that NaCl plugins work when enabled, with prerendering.
3519 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithNaCl,
3520 PrerenderNaClPluginEnabled) {
3521 #if defined(OS_WIN) && defined(USE_ASH)
3522 // Disable this test in Metro+Ash for now (http://crbug.com/262796).
3523 if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kAshBrowserTests))
3524 return;
3525 #endif
3527 PrerenderTestURL("files/prerender/prerender_plugin_nacl_enabled.html",
3528 FINAL_STATUS_USED,
3530 NavigateToDestURL();
3532 // To avoid any chance of a race, we have to let the script send its response
3533 // asynchronously.
3534 WebContents* web_contents =
3535 browser()->tab_strip_model()->GetActiveWebContents();
3536 bool display_test_result = false;
3537 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(web_contents,
3538 "DidDisplayReallyPass()",
3539 &display_test_result));
3540 ASSERT_TRUE(display_test_result);
3543 // Checks that the referrer policy is used when prerendering.
3544 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderReferrerPolicy) {
3545 set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3546 PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3547 FINAL_STATUS_USED,
3549 NavigateToDestURL();
3552 // Checks that the referrer policy is used when prerendering on HTTPS.
3553 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3554 PrerenderSSLReferrerPolicy) {
3555 UseHttpsSrcServer();
3556 set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3557 PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3558 FINAL_STATUS_USED,
3560 NavigateToDestURL();
3563 // Checks that the referrer policy is used when prerendering is cancelled.
3564 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCancelReferrerPolicy) {
3565 scoped_ptr<TestContentBrowserClient> test_content_browser_client(
3566 new TestContentBrowserClient);
3567 content::ContentBrowserClient* original_browser_client =
3568 content::SetBrowserClientForTesting(test_content_browser_client.get());
3570 set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3571 PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3572 FINAL_STATUS_CANCELLED,
3574 OpenDestURLViaClick();
3576 bool display_test_result = false;
3577 WebContents* web_contents =
3578 browser()->tab_strip_model()->GetActiveWebContents();
3579 ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
3580 web_contents,
3581 "window.domAutomationController.send(DidDisplayPass())",
3582 &display_test_result));
3583 EXPECT_TRUE(display_test_result);
3585 content::SetBrowserClientForTesting(original_browser_client);
3588 // Test interaction of the webNavigation and tabs API with prerender.
3589 class PrerenderBrowserTestWithExtensions : public PrerenderBrowserTest,
3590 public ExtensionApiTest {
3591 public:
3592 PrerenderBrowserTestWithExtensions() {
3593 // The individual tests start the test server through ExtensionApiTest, so
3594 // the port number can be passed through to the extension.
3595 autostart_test_server_ = false;
3598 void SetUp() override { PrerenderBrowserTest::SetUp(); }
3600 void SetUpCommandLine(CommandLine* command_line) override {
3601 PrerenderBrowserTest::SetUpCommandLine(command_line);
3602 ExtensionApiTest::SetUpCommandLine(command_line);
3605 void SetUpInProcessBrowserTestFixture() override {
3606 PrerenderBrowserTest::SetUpInProcessBrowserTestFixture();
3607 ExtensionApiTest::SetUpInProcessBrowserTestFixture();
3610 void TearDownInProcessBrowserTestFixture() override {
3611 PrerenderBrowserTest::TearDownInProcessBrowserTestFixture();
3612 ExtensionApiTest::TearDownInProcessBrowserTestFixture();
3615 void SetUpOnMainThread() override {
3616 PrerenderBrowserTest::SetUpOnMainThread();
3620 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions, WebNavigation) {
3621 ASSERT_TRUE(StartSpawnedTestServer());
3622 extensions::FrameNavigationState::set_allow_extension_scheme(true);
3624 // Wait for the extension to set itself up and return control to us.
3625 ASSERT_TRUE(RunExtensionTest("webnavigation/prerender")) << message_;
3627 extensions::ResultCatcher catcher;
3629 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3631 ChannelDestructionWatcher channel_close_watcher;
3632 channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
3633 GetActiveWebContents()->GetRenderProcessHost());
3634 NavigateToDestURL();
3635 channel_close_watcher.WaitForChannelClose();
3637 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
3638 ASSERT_TRUE(catcher.GetNextResult()) << catcher.message();
3641 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions, TabsApi) {
3642 ASSERT_TRUE(StartSpawnedTestServer());
3643 extensions::FrameNavigationState::set_allow_extension_scheme(true);
3645 // Wait for the extension to set itself up and return control to us.
3646 ASSERT_TRUE(RunExtensionTest("tabs/on_replaced")) << message_;
3648 extensions::ResultCatcher catcher;
3650 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3652 ChannelDestructionWatcher channel_close_watcher;
3653 channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
3654 GetActiveWebContents()->GetRenderProcessHost());
3655 NavigateToDestURL();
3656 channel_close_watcher.WaitForChannelClose();
3658 ASSERT_TRUE(IsEmptyPrerenderLinkManager());
3659 ASSERT_TRUE(catcher.GetNextResult()) << catcher.message();
3662 // Test that prerenders abort when navigating to a stream.
3663 // See chrome/browser/extensions/api/streams_private/streams_private_apitest.cc
3664 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions, StreamsTest) {
3665 RestorePrerenderMode restore_prerender_mode;
3666 PrerenderManager::SetMode(
3667 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP);
3669 ASSERT_TRUE(StartSpawnedTestServer());
3671 const extensions::Extension* extension = LoadExtension(
3672 test_data_dir_.AppendASCII("streams_private/handle_mime_type"));
3673 ASSERT_TRUE(extension);
3674 EXPECT_EQ(std::string(extension_misc::kStreamsPrivateTestExtensionId),
3675 extension->id());
3676 MimeTypesHandler* handler = MimeTypesHandler::GetHandler(extension);
3677 ASSERT_TRUE(handler);
3678 EXPECT_TRUE(handler->CanHandleMIMEType("application/msword"));
3680 PrerenderTestURL("files/prerender/document.doc", FINAL_STATUS_DOWNLOAD, 0);
3682 // Sanity-check that the extension would have picked up the stream in a normal
3683 // navigation had prerender not intercepted it.
3684 // streams_private/handle_mime_type reports success if it has handled the
3685 // application/msword type.
3686 extensions::ResultCatcher catcher;
3687 NavigateToDestURL();
3688 EXPECT_TRUE(catcher.GetNextResult());
3691 // Checks that non-http/https/chrome-extension subresource cancels the
3692 // prerender.
3693 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3694 PrerenderCancelSubresourceUnsupportedScheme) {
3695 GURL image_url = GURL("invalidscheme://www.google.com/test.jpg");
3696 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3697 replacement_text.push_back(
3698 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3699 std::string replacement_path;
3700 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3701 "files/prerender/prerender_with_image.html",
3702 replacement_text,
3703 &replacement_path));
3704 PrerenderTestURL(replacement_path, FINAL_STATUS_UNSUPPORTED_SCHEME, 0);
3707 // Ensure that about:blank is permitted for any subresource.
3708 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3709 PrerenderAllowAboutBlankSubresource) {
3710 GURL image_url = GURL("about:blank");
3711 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3712 replacement_text.push_back(
3713 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3714 std::string replacement_path;
3715 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3716 "files/prerender/prerender_with_image.html",
3717 replacement_text,
3718 &replacement_path));
3719 PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
3720 NavigateToDestURL();
3723 // Checks that non-http/https/chrome-extension subresource cancels the prerender
3724 // on redirect.
3725 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3726 PrerenderCancelSubresourceRedirectUnsupportedScheme) {
3727 GURL image_url = test_server()->GetURL(
3728 CreateServerRedirect("invalidscheme://www.google.com/test.jpg"));
3729 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3730 replacement_text.push_back(
3731 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3732 std::string replacement_path;
3733 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3734 "files/prerender/prerender_with_image.html",
3735 replacement_text,
3736 &replacement_path));
3737 PrerenderTestURL(replacement_path, FINAL_STATUS_UNSUPPORTED_SCHEME, 0);
3740 // Checks that chrome-extension subresource does not cancel the prerender.
3741 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3742 PrerenderKeepSubresourceExtensionScheme) {
3743 GURL image_url = GURL("chrome-extension://abcdefg/test.jpg");
3744 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3745 replacement_text.push_back(
3746 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3747 std::string replacement_path;
3748 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3749 "files/prerender/prerender_with_image.html",
3750 replacement_text,
3751 &replacement_path));
3752 PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
3753 NavigateToDestURL();
3756 // Checks that redirect to chrome-extension subresource does not cancel the
3757 // prerender.
3758 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3759 PrerenderKeepSubresourceRedirectExtensionScheme) {
3760 GURL image_url = test_server()->GetURL(
3761 CreateServerRedirect("chrome-extension://abcdefg/test.jpg"));
3762 std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3763 replacement_text.push_back(
3764 std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3765 std::string replacement_path;
3766 ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3767 "files/prerender/prerender_with_image.html",
3768 replacement_text,
3769 &replacement_path));
3770 PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
3771 NavigateToDestURL();
3774 // Checks that non-http/https main page redirects cancel the prerender.
3775 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3776 PrerenderCancelMainFrameRedirectUnsupportedScheme) {
3777 GURL url = test_server()->GetURL(
3778 CreateServerRedirect("invalidscheme://www.google.com/test.html"));
3779 PrerenderTestURL(url, FINAL_STATUS_UNSUPPORTED_SCHEME, 0);
3782 // Checks that media source video loads are deferred on prerendering.
3783 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5MediaSourceVideo) {
3784 PrerenderTestURL("files/prerender/prerender_html5_video_media_source.html",
3785 FINAL_STATUS_USED,
3787 NavigateToDestURL();
3788 WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
3791 // Checks that a prerender that creates an audio stream (via a WebAudioDevice)
3792 // is cancelled.
3793 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderWebAudioDevice) {
3794 DisableLoadEventCheck();
3795 PrerenderTestURL("files/prerender/prerender_web_audio_device.html",
3796 FINAL_STATUS_CREATING_AUDIO_STREAM, 0);
3799 // Checks that prerenders do not swap in to WebContents being captured.
3800 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCapturedWebContents) {
3801 PrerenderTestURL("files/prerender/prerender_page.html",
3802 FINAL_STATUS_PAGE_BEING_CAPTURED, 1);
3803 WebContents* web_contents = GetActiveWebContents();
3804 web_contents->IncrementCapturerCount(gfx::Size());
3805 NavigateToDestURLWithDisposition(CURRENT_TAB, false);
3806 web_contents->DecrementCapturerCount();
3809 // Checks that prerenders are aborted on cross-process navigation from
3810 // a server redirect.
3811 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3812 PrerenderCrossProcessServerRedirect) {
3813 // Force everything to be a process swap.
3814 SwapProcessesContentBrowserClient test_browser_client;
3815 content::ContentBrowserClient* original_browser_client =
3816 content::SetBrowserClientForTesting(&test_browser_client);
3818 PrerenderTestURL(
3819 CreateServerRedirect("files/prerender/prerender_page.html"),
3820 FINAL_STATUS_OPEN_URL, 0);
3822 content::SetBrowserClientForTesting(original_browser_client);
3825 // Checks that URLRequests for prerenders being aborted on cross-process
3826 // navigation from a server redirect are cleaned up, so they don't keep cache
3827 // entries locked.
3828 // See http://crbug.com/341134
3829 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3830 PrerenderCrossProcessServerRedirectNoHang) {
3831 const char kDestPath[] = "files/prerender/prerender_page.html";
3832 // Force everything to be a process swap.
3833 SwapProcessesContentBrowserClient test_browser_client;
3834 content::ContentBrowserClient* original_browser_client =
3835 content::SetBrowserClientForTesting(&test_browser_client);
3837 PrerenderTestURL(CreateServerRedirect(kDestPath), FINAL_STATUS_OPEN_URL, 0);
3839 ui_test_utils::NavigateToURL(
3840 browser(),
3841 test_server()->GetURL(kDestPath));
3843 content::SetBrowserClientForTesting(original_browser_client);
3846 // Checks that prerenders are aborted on cross-process navigation from
3847 // a client redirect.
3848 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3849 PrerenderCrossProcessClientRedirect) {
3850 // Cross-process navigation logic for renderer-initiated navigations
3851 // is partially controlled by the renderer, namely
3852 // ChromeContentRendererClient. This test instead relies on the Web
3853 // Store triggering such navigations.
3854 std::string webstore_url = extension_urls::GetWebstoreLaunchURL();
3856 // Mock out requests to the Web Store.
3857 base::FilePath file(GetTestPath("prerender_page.html"));
3858 BrowserThread::PostTask(
3859 BrowserThread::IO, FROM_HERE,
3860 base::Bind(&CreateMockInterceptorOnIO, GURL(webstore_url), file));
3862 PrerenderTestURL(CreateClientRedirect(webstore_url),
3863 FINAL_STATUS_OPEN_URL, 1);
3866 // Checks that canceling a MatchComplete dummy doesn't result in two
3867 // stop events.
3868 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, CancelMatchCompleteDummy) {
3869 RestorePrerenderMode restore_prerender_mode;
3870 PrerenderManager::SetMode(
3871 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP);
3873 std::vector<FinalStatus> expected_final_status_queue;
3874 expected_final_status_queue.push_back(FINAL_STATUS_JAVASCRIPT_ALERT);
3875 expected_final_status_queue.push_back(FINAL_STATUS_CANCELLED);
3876 ScopedVector<TestPrerender> prerenders =
3877 PrerenderTestURL("files/prerender/prerender_alert_before_onload.html",
3878 expected_final_status_queue, 0);
3880 // Cancel the MatchComplete dummy.
3881 GetPrerenderManager()->CancelAllPrerenders();
3882 prerenders[1]->WaitForStop();
3884 // Check the referring page only got one copy of the event.
3885 EXPECT_FALSE(HadPrerenderEventErrors());
3888 // Checks that a deferred redirect to an image is not loaded until the page is
3889 // visible. Also test the right histogram events are emitted in this case.
3890 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDeferredImage) {
3891 DisableJavascriptCalls();
3893 // The prerender will not completely load until after the swap, so wait for a
3894 // title change before calling DidPrerenderPass.
3895 scoped_ptr<TestPrerender> prerender =
3896 PrerenderTestURL(
3897 "files/prerender/prerender_deferred_image.html",
3898 FINAL_STATUS_USED, 0);
3899 WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
3900 EXPECT_EQ(1, GetPrerenderDomContentLoadedEventCountForLinkNumber(0));
3901 EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
3902 EXPECT_EQ(0, prerender->number_of_loads());
3903 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3904 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3905 histogram_tester().ExpectTotalCount(
3906 "Prerender.none_PerceivedPLTMatchedComplete", 0);
3907 histogram_tester().ExpectTotalCount(
3908 "Prerender.websame_PrerenderNotSwappedInPLT", 0);
3910 // Swap.
3911 NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
3912 GetActiveWebContents());
3913 ui_test_utils::NavigateToURLWithDisposition(
3914 current_browser(), dest_url(), CURRENT_TAB,
3915 ui_test_utils::BROWSER_TEST_NONE);
3916 swap_observer.Wait();
3918 // The prerender never observes the final load.
3919 EXPECT_EQ(0, prerender->number_of_loads());
3921 // Now check DidDisplayPass.
3922 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
3924 histogram_tester().ExpectTotalCount(
3925 "Prerender.websame_PrerenderNotSwappedInPLT", 0);
3926 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3927 histogram_tester().ExpectTotalCount("Prerender.websame_PerceivedPLTMatched",
3929 histogram_tester().ExpectTotalCount(
3930 "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3933 // Checks that a deferred redirect to an image is not loaded until the
3934 // page is visible, even after another redirect.
3935 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3936 PrerenderDeferredImageAfterRedirect) {
3937 DisableJavascriptCalls();
3939 // The prerender will not completely load until after the swap, so wait for a
3940 // title change before calling DidPrerenderPass.
3941 scoped_ptr<TestPrerender> prerender =
3942 PrerenderTestURL(
3943 "files/prerender/prerender_deferred_image.html",
3944 FINAL_STATUS_USED, 0);
3945 WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
3946 EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
3947 EXPECT_EQ(0, prerender->number_of_loads());
3949 // Swap.
3950 NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
3951 GetActiveWebContents());
3952 ui_test_utils::NavigateToURLWithDisposition(
3953 current_browser(), dest_url(), CURRENT_TAB,
3954 ui_test_utils::BROWSER_TEST_NONE);
3955 swap_observer.Wait();
3957 // The prerender never observes the final load.
3958 EXPECT_EQ(0, prerender->number_of_loads());
3960 // Now check DidDisplayPass.
3961 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
3964 // Checks that deferred redirects in the main frame are followed.
3965 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDeferredMainFrame) {
3966 DisableJavascriptCalls();
3967 PrerenderTestURL(
3968 "files/prerender/image-deferred.png",
3969 FINAL_STATUS_USED, 1);
3970 NavigateToDestURL();
3973 // Checks that deferred redirects in the main frame are followed, even
3974 // with a double-redirect.
3975 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3976 PrerenderDeferredMainFrameAfterRedirect) {
3977 DisableJavascriptCalls();
3978 PrerenderTestURL(
3979 CreateServerRedirect("files/prerender/image-deferred.png"),
3980 FINAL_STATUS_USED, 1);
3981 NavigateToDestURL();
3984 // Checks that deferred redirects in a synchronous XHR abort the
3985 // prerender.
3986 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDeferredSynchronousXHR) {
3987 RestorePrerenderMode restore_prerender_mode;
3988 PrerenderManager::SetMode(
3989 PrerenderManager::PRERENDER_MODE_EXPERIMENT_MATCH_COMPLETE_GROUP);
3990 PrerenderTestURL("files/prerender/prerender_deferred_sync_xhr.html",
3991 FINAL_STATUS_BAD_DEFERRED_REDIRECT, 0);
3992 NavigateToDestURL();
3995 // Checks that prerenders are not swapped for navigations with extra headers.
3996 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderExtraHeadersNoSwap) {
3997 PrerenderTestURL("files/prerender/prerender_page.html",
3998 FINAL_STATUS_APP_TERMINATING, 1);
4000 content::OpenURLParams params(dest_url(), Referrer(), CURRENT_TAB,
4001 ui::PAGE_TRANSITION_TYPED, false);
4002 params.extra_headers = "X-Custom-Header: 42\r\n";
4003 NavigateToURLWithParams(params, false);
4006 // Checks that prerenders are not swapped for navigations with browser-initiated
4007 // POST data.
4008 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4009 PrerenderBrowserInitiatedPostNoSwap) {
4010 PrerenderTestURL("files/prerender/prerender_page.html",
4011 FINAL_STATUS_APP_TERMINATING, 1);
4013 std::string post_data = "DATA";
4014 content::OpenURLParams params(dest_url(), Referrer(), CURRENT_TAB,
4015 ui::PAGE_TRANSITION_TYPED, false);
4016 params.uses_post = true;
4017 params.browser_initiated_post_data =
4018 base::RefCountedString::TakeString(&post_data);
4019 NavigateToURLWithParams(params, false);
4022 // Checks that the prerendering of a page is canceled correctly when the
4023 // prerendered page tries to make a second navigation entry.
4024 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNewNavigationEntry) {
4025 PrerenderTestURL("files/prerender/prerender_new_entry.html",
4026 FINAL_STATUS_NEW_NAVIGATION_ENTRY,
4030 // Attempt a swap-in in a new tab, verifying that session storage namespace
4031 // merging works.
4032 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageNewTab) {
4033 // Mock out some URLs and count the number of requests to one of them. Both
4034 // prerender_session_storage.html and init_session_storage.html need to be
4035 // mocked so they are same-origin.
4036 const GURL kInitURL("http://prerender.test/init_session_storage.html");
4037 base::FilePath init_file = GetTestPath("init_session_storage.html");
4038 BrowserThread::PostTask(
4039 BrowserThread::IO, FROM_HERE,
4040 base::Bind(&CreateMockInterceptorOnIO, kInitURL, init_file));
4042 const GURL kTestURL("http://prerender.test/prerender_session_storage.html");
4043 base::FilePath test_file = GetTestPath("prerender_session_storage.html");
4044 RequestCounter counter;
4045 BrowserThread::PostTask(
4046 BrowserThread::IO, FROM_HERE,
4047 base::Bind(&CreateCountingInterceptorOnIO,
4048 kTestURL, test_file, counter.AsWeakPtr()));
4050 PrerenderTestURL(kTestURL, FINAL_STATUS_USED, 1);
4052 // Open a new tab to navigate in.
4053 ui_test_utils::NavigateToURLWithDisposition(
4054 current_browser(), kInitURL, NEW_FOREGROUND_TAB,
4055 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4057 // Now navigate in the new tab. Set expect_swap_to_succeed to false because
4058 // the swap does not occur synchronously.
4060 // TODO(davidben): When all swaps become asynchronous, remove the OpenURL
4061 // return value assertion and let this go through the usual successful-swap
4062 // codepath.
4063 NavigateToDestURLWithDisposition(CURRENT_TAB, false);
4065 // Verify DidDisplayPass manually since the previous call skipped it.
4066 EXPECT_TRUE(DidDisplayPass(
4067 current_browser()->tab_strip_model()->GetActiveWebContents()));
4069 // Only one request to the test URL started.
4071 // TODO(davidben): Re-enable this check when the races in attaching the
4072 // throttle are resolved. http://crbug.com/335835
4073 // EXPECT_EQ(1, counter.count());
4076 // Attempt a swap-in in a new tab, verifying that session storage namespace
4077 // merging works. Unlike the above test, the swap is for a navigation that would
4078 // normally be cross-process.
4079 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageNewTabCrossProcess) {
4080 base::FilePath test_data_dir;
4081 ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &test_data_dir));
4083 // Mock out some URLs and count the number of requests to one of them. Both
4084 // prerender_session_storage.html and init_session_storage.html need to be
4085 // mocked so they are same-origin.
4086 const GURL kInitURL("http://prerender.test/init_session_storage.html");
4087 base::FilePath init_file = GetTestPath("init_session_storage.html");
4088 BrowserThread::PostTask(
4089 BrowserThread::IO, FROM_HERE,
4090 base::Bind(&CreateMockInterceptorOnIO, kInitURL, init_file));
4092 const GURL kTestURL("http://prerender.test/prerender_session_storage.html");
4093 base::FilePath test_file = GetTestPath("prerender_session_storage.html");
4094 RequestCounter counter;
4095 BrowserThread::PostTask(
4096 BrowserThread::IO, FROM_HERE,
4097 base::Bind(&CreateCountingInterceptorOnIO,
4098 kTestURL, test_file, counter.AsWeakPtr()));
4100 PrerenderTestURL(kTestURL, FINAL_STATUS_USED, 1);
4102 // Open a new tab to navigate in.
4103 ui_test_utils::NavigateToURLWithDisposition(
4104 current_browser(), kInitURL, NEW_FOREGROUND_TAB,
4105 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4107 // Navigate to about:blank so the next navigation is cross-process.
4108 ui_test_utils::NavigateToURL(current_browser(), GURL(url::kAboutBlankURL));
4110 // Now navigate in the new tab. Set expect_swap_to_succeed to false because
4111 // the swap does not occur synchronously.
4113 // TODO(davidben): When all swaps become asynchronous, remove the OpenURL
4114 // return value assertion and let this go through the usual successful-swap
4115 // codepath.
4116 NavigateToDestURLWithDisposition(CURRENT_TAB, false);
4118 // Verify DidDisplayPass manually since the previous call skipped it.
4119 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
4121 // Only one request to the test URL started.
4123 // TODO(davidben): Re-enable this check when the races in attaching the
4124 // throttle are resolved. http://crbug.com/335835
4125 // EXPECT_EQ(1, counter.count());
4128 // Verify that session storage conflicts don't merge.
4129 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSessionStorageConflict) {
4130 PrerenderTestURL("files/prerender/prerender_session_storage_conflict.html",
4131 FINAL_STATUS_APP_TERMINATING, 1);
4133 // Open a new tab to navigate in.
4134 ui_test_utils::NavigateToURLWithDisposition(
4135 current_browser(),
4136 test_server()->GetURL("files/prerender/init_session_storage.html"),
4137 NEW_FOREGROUND_TAB,
4138 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4140 // Now navigate in the new tab.
4141 NavigateToDestURLWithDisposition(CURRENT_TAB, false);
4143 // Verify DidDisplayPass in the new tab.
4144 EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
4147 // Checks that prerenders honor |should_replace_current_entry|.
4148 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderReplaceCurrentEntry) {
4149 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
4151 content::OpenURLParams params(dest_url(), Referrer(), CURRENT_TAB,
4152 ui::PAGE_TRANSITION_TYPED, false);
4153 params.should_replace_current_entry = true;
4154 NavigateToURLWithParams(params, false);
4156 const NavigationController& controller =
4157 GetActiveWebContents()->GetController();
4158 // First entry is about:blank, second is prerender_page.html.
4159 EXPECT_TRUE(controller.GetPendingEntry() == NULL);
4160 EXPECT_EQ(2, controller.GetEntryCount());
4161 EXPECT_EQ(GURL(url::kAboutBlankURL), controller.GetEntryAtIndex(0)->GetURL());
4162 EXPECT_EQ(dest_url(), controller.GetEntryAtIndex(1)->GetURL());
4165 // Checks prerender does not hit DCHECKs and behaves properly if two pending
4166 // swaps occur in a row.
4167 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDoublePendingSwap) {
4168 GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
4169 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
4171 GURL url1 = test_server()->GetURL("files/prerender/prerender_page.html?1");
4172 scoped_ptr<TestPrerender> prerender1 =
4173 PrerenderTestURL(url1, FINAL_STATUS_APP_TERMINATING, 1);
4175 GURL url2 = test_server()->GetURL("files/prerender/prerender_page.html?2");
4176 scoped_ptr<TestPrerender> prerender2 = ExpectPrerender(FINAL_STATUS_USED);
4177 AddPrerender(url2, 1);
4178 prerender2->WaitForStart();
4179 prerender2->WaitForLoads(1);
4181 // There's no reason the second prerender can't be used, but the swap races
4182 // with didStartProvisionalLoad and didFailProvisionalLoad from the previous
4183 // navigation. The current logic will conservatively fail to swap under such
4184 // races. However, if the renderer is slow enough, it's possible for the
4185 // prerender to still be used, so don't program in either expectation.
4186 ASSERT_TRUE(prerender2->contents());
4187 prerender2->contents()->set_skip_final_checks(true);
4189 // Open a new tab to navigate in.
4190 ui_test_utils::NavigateToURLWithDisposition(
4191 current_browser(),
4192 GURL(url::kAboutBlankURL),
4193 NEW_FOREGROUND_TAB,
4194 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4196 // Fire off two navigations, without running the event loop between them.
4197 NavigationOrSwapObserver swap_observer(
4198 current_browser()->tab_strip_model(),
4199 GetActiveWebContents(), 2);
4200 current_browser()->OpenURL(OpenURLParams(
4201 url1, Referrer(), CURRENT_TAB, ui::PAGE_TRANSITION_TYPED, false));
4202 current_browser()->OpenURL(OpenURLParams(
4203 url2, Referrer(), CURRENT_TAB, ui::PAGE_TRANSITION_TYPED, false));
4204 swap_observer.Wait();
4206 // The WebContents should be on url2. There may be 2 or 3 entries, depending
4207 // on whether the first one managed to complete.
4209 // TODO(davidben): When http://crbug.com/335835 is fixed, the 3 entry case
4210 // shouldn't be possible because it's throttled by the pending swap that
4211 // cannot complete.
4212 const NavigationController& controller =
4213 GetActiveWebContents()->GetController();
4214 EXPECT_TRUE(controller.GetPendingEntry() == NULL);
4215 EXPECT_LE(2, controller.GetEntryCount());
4216 EXPECT_GE(3, controller.GetEntryCount());
4217 EXPECT_EQ(GURL(url::kAboutBlankURL), controller.GetEntryAtIndex(0)->GetURL());
4218 EXPECT_EQ(url2, controller.GetEntryAtIndex(
4219 controller.GetEntryCount() - 1)->GetURL());
4222 // Verify that pending swaps get aborted on new navigations.
4223 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4224 PrerenderPendingSwapNewNavigation) {
4225 PrerenderManager::HangSessionStorageMergesForTesting();
4227 PrerenderTestURL("files/prerender/prerender_page.html",
4228 FINAL_STATUS_APP_TERMINATING, 1);
4230 // Open a new tab to navigate in.
4231 ui_test_utils::NavigateToURLWithDisposition(
4232 current_browser(),
4233 GURL(url::kAboutBlankURL),
4234 NEW_FOREGROUND_TAB,
4235 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4237 // Navigate to the URL. Wait for DidStartLoading, just so it's definitely
4238 // progressed somewhere.
4239 content::WindowedNotificationObserver page_load_observer(
4240 content::NOTIFICATION_LOAD_START,
4241 content::Source<NavigationController>(
4242 &GetActiveWebContents()->GetController()));
4243 current_browser()->OpenURL(OpenURLParams(
4244 dest_url(), Referrer(), CURRENT_TAB,
4245 ui::PAGE_TRANSITION_TYPED, false));
4246 page_load_observer.Wait();
4248 // Navigate somewhere else. This should succeed and abort the pending swap.
4249 TestNavigationObserver nav_observer(GetActiveWebContents());
4250 current_browser()->OpenURL(OpenURLParams(GURL(url::kAboutBlankURL),
4251 Referrer(),
4252 CURRENT_TAB,
4253 ui::PAGE_TRANSITION_TYPED,
4254 false));
4255 nav_observer.Wait();
4258 // Checks that <a ping> requests are not dropped in prerender.
4259 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPing) {
4260 // Count hits to a certain URL.
4261 const GURL kPingURL("http://prerender.test/ping");
4262 base::FilePath empty_file = ui_test_utils::GetTestFilePath(
4263 base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
4264 RequestCounter ping_counter;
4265 BrowserThread::PostTask(
4266 BrowserThread::IO, FROM_HERE,
4267 base::Bind(&CreateCountingInterceptorOnIO,
4268 kPingURL, empty_file, ping_counter.AsWeakPtr()));
4270 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
4271 OpenDestURLViaClickPing(kPingURL);
4273 ping_counter.WaitForCount(1);
4276 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPPLTNormalNavigation) {
4277 GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
4278 ui_test_utils::NavigateToURL(current_browser(), url);
4279 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
4280 histogram_tester().ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
4281 histogram_tester().ExpectTotalCount(
4282 "Prerender.none_PerceivedPLTMatchedComplete", 0);
4285 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4286 PrerenderCookieChangeConflictTest) {
4287 NavigateStraightToURL(
4288 "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4290 GURL url = test_server()->GetURL(
4291 "files/prerender/prerender_cookie.html?set=1&key=c&value=2");
4293 scoped_ptr<TestPrerender> prerender =
4294 ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT);
4295 AddPrerender(url, 1);
4296 prerender->WaitForStart();
4297 prerender->WaitForLoads(1);
4298 // Ensure that in the prerendered page, querying the cookie again
4299 // via javascript yields the same value that was set during load.
4300 EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
4302 // The prerender has loaded. Ensure that the change is not visible
4303 // to visible tabs.
4304 std::string value;
4305 RunJSReturningString("GetCookie('c')", &value);
4306 ASSERT_EQ(value, "1");
4308 // Make a conflicting cookie change, which should cancel the prerender.
4309 RunJS("SetCookie('c', '3')");
4310 prerender->WaitForStop();
4313 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCookieChangeUseTest) {
4314 // Permit 2 concurrent prerenders.
4315 GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
4316 GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
4318 // Go to a first URL setting the cookie to value "1".
4319 NavigateStraightToURL(
4320 "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4322 // Prerender a URL setting the cookie to value "2".
4323 GURL url = test_server()->GetURL(
4324 "files/prerender/prerender_cookie.html?set=1&key=c&value=2");
4326 scoped_ptr<TestPrerender> prerender1 = ExpectPrerender(FINAL_STATUS_USED);
4327 AddPrerender(url, 1);
4328 prerender1->WaitForStart();
4329 prerender1->WaitForLoads(1);
4331 // Launch a second prerender, setting the cookie to value "3".
4332 scoped_ptr<TestPrerender> prerender2 =
4333 ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT);
4334 AddPrerender(test_server()->GetURL(
4335 "files/prerender/prerender_cookie.html?set=1&key=c&value=3"), 1);
4336 prerender2->WaitForStart();
4337 prerender2->WaitForLoads(1);
4339 // Both prerenders have loaded. Ensure that the visible tab is still
4340 // unchanged and cannot see their changes.
4341 // to visible tabs.
4342 std::string value;
4343 RunJSReturningString("GetCookie('c')", &value);
4344 ASSERT_EQ(value, "1");
4346 // Navigate to the prerendered URL. The first prerender should be swapped in,
4347 // and the changes should now be visible. The second prerender should
4348 // be cancelled due to the conflict.
4349 ui_test_utils::NavigateToURLWithDisposition(
4350 current_browser(),
4351 url,
4352 CURRENT_TAB,
4353 ui_test_utils::BROWSER_TEST_NONE);
4354 RunJSReturningString("GetCookie('c')", &value);
4355 ASSERT_EQ(value, "2");
4356 prerender2->WaitForStop();
4359 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4360 PrerenderCookieChangeConflictHTTPHeaderTest) {
4361 NavigateStraightToURL(
4362 "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4364 GURL url = test_server()->GetURL("set-cookie?c=2");
4365 scoped_ptr<TestPrerender> prerender =
4366 ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT);
4367 AddPrerender(url, 1);
4368 prerender->WaitForStart();
4369 prerender->WaitForLoads(1);
4371 // The prerender has loaded. Ensure that the change is not visible
4372 // to visible tabs.
4373 std::string value;
4374 RunJSReturningString("GetCookie('c')", &value);
4375 ASSERT_EQ(value, "1");
4377 // Make a conflicting cookie change, which should cancel the prerender.
4378 RunJS("SetCookie('c', '3')");
4379 prerender->WaitForStop();
4382 // Checks that a prerender which calls window.close() on itself is aborted.
4383 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderWindowClose) {
4384 DisableLoadEventCheck();
4385 PrerenderTestURL("files/prerender/prerender_window_close.html",
4386 FINAL_STATUS_CLOSED, 0);
4389 class PrerenderIncognitoBrowserTest : public PrerenderBrowserTest {
4390 public:
4391 void SetUpOnMainThread() override {
4392 Profile* normal_profile = current_browser()->profile();
4393 set_browser(ui_test_utils::OpenURLOffTheRecord(
4394 normal_profile, GURL("about:blank")));
4395 PrerenderBrowserTest::SetUpOnMainThread();
4399 // Checks that prerendering works in incognito mode.
4400 IN_PROC_BROWSER_TEST_F(PrerenderIncognitoBrowserTest, PrerenderIncognito) {
4401 PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
4402 NavigateToDestURL();
4405 // Checks that prerenders are aborted when an incognito profile is closed.
4406 IN_PROC_BROWSER_TEST_F(PrerenderIncognitoBrowserTest,
4407 PrerenderIncognitoClosed) {
4408 scoped_ptr<TestPrerender> prerender =
4409 PrerenderTestURL("files/prerender/prerender_page.html",
4410 FINAL_STATUS_PROFILE_DESTROYED, 1);
4411 current_browser()->window()->Close();
4412 prerender->WaitForStop();
4415 class PrerenderOmniboxBrowserTest : public PrerenderBrowserTest {
4416 public:
4417 LocationBar* GetLocationBar() {
4418 return current_browser()->window()->GetLocationBar();
4421 OmniboxView* GetOmniboxView() {
4422 return GetLocationBar()->GetOmniboxView();
4425 void WaitForAutocompleteDone(OmniboxView* omnibox_view) {
4426 AutocompleteController* controller =
4427 omnibox_view->model()->popup_model()->autocomplete_controller();
4428 while (!controller->done()) {
4429 content::WindowedNotificationObserver ready_observer(
4430 chrome::NOTIFICATION_AUTOCOMPLETE_CONTROLLER_RESULT_READY,
4431 content::Source<AutocompleteController>(controller));
4432 ready_observer.Wait();
4436 predictors::AutocompleteActionPredictor* GetAutocompleteActionPredictor() {
4437 Profile* profile = current_browser()->profile();
4438 return predictors::AutocompleteActionPredictorFactory::GetForProfile(
4439 profile);
4442 scoped_ptr<TestPrerender> StartOmniboxPrerender(
4443 const GURL& url,
4444 FinalStatus expected_final_status) {
4445 scoped_ptr<TestPrerender> prerender =
4446 ExpectPrerender(expected_final_status);
4447 WebContents* web_contents = GetActiveWebContents();
4448 GetAutocompleteActionPredictor()->StartPrerendering(
4449 url,
4450 web_contents->GetController().GetSessionStorageNamespaceMap(),
4451 gfx::Size(50, 50));
4452 prerender->WaitForStart();
4453 return prerender.Pass();
4457 // Checks that closing the omnibox popup cancels an omnibox prerender.
4458 // http://crbug.com/395152
4459 IN_PROC_BROWSER_TEST_F(PrerenderOmniboxBrowserTest,
4460 DISABLED_PrerenderOmniboxCancel) {
4461 // Ensure the cookie store has been loaded.
4462 if (!GetPrerenderManager()->cookie_store_loaded()) {
4463 base::RunLoop loop;
4464 GetPrerenderManager()->set_on_cookie_store_loaded_cb_for_testing(
4465 loop.QuitClosure());
4466 loop.Run();
4469 // Fake an omnibox prerender.
4470 scoped_ptr<TestPrerender> prerender = StartOmniboxPrerender(
4471 test_server()->GetURL("files/empty.html"),
4472 FINAL_STATUS_CANCELLED);
4474 // Revert the location bar. This should cancel the prerender.
4475 GetLocationBar()->Revert();
4476 prerender->WaitForStop();
4479 // Checks that accepting omnibox input abandons an omnibox prerender.
4480 // http://crbug.com/394592
4481 IN_PROC_BROWSER_TEST_F(PrerenderOmniboxBrowserTest,
4482 DISABLED_PrerenderOmniboxAbandon) {
4483 // Set the abandon timeout to something high so it does not introduce
4484 // flakiness if the prerender times out before the test completes.
4485 GetPrerenderManager()->mutable_config().abandon_time_to_live =
4486 base::TimeDelta::FromDays(999);
4488 // Ensure the cookie store has been loaded.
4489 if (!GetPrerenderManager()->cookie_store_loaded()) {
4490 base::RunLoop loop;
4491 GetPrerenderManager()->set_on_cookie_store_loaded_cb_for_testing(
4492 loop.QuitClosure());
4493 loop.Run();
4496 // Enter a URL into the Omnibox.
4497 OmniboxView* omnibox_view = GetOmniboxView();
4498 omnibox_view->OnBeforePossibleChange();
4499 omnibox_view->SetUserText(
4500 base::UTF8ToUTF16(test_server()->GetURL("files/empty.html?1").spec()));
4501 omnibox_view->OnAfterPossibleChange();
4502 WaitForAutocompleteDone(omnibox_view);
4504 // Fake an omnibox prerender for a different URL.
4505 scoped_ptr<TestPrerender> prerender = StartOmniboxPrerender(
4506 test_server()->GetURL("files/empty.html?2"),
4507 FINAL_STATUS_APP_TERMINATING);
4509 // The final status may be either FINAL_STATUS_APP_TERMINATING or
4510 // FINAL_STATUS_CANCELLED. Although closing the omnibox will not cancel an
4511 // abandoned prerender, the AutocompleteActionPredictor will cancel the
4512 // predictor on destruction.
4513 prerender->contents()->set_skip_final_checks(true);
4515 // Navigate to the URL entered.
4516 omnibox_view->model()->AcceptInput(CURRENT_TAB, false);
4518 // Prerender should be running, but abandoned.
4519 EXPECT_TRUE(
4520 GetAutocompleteActionPredictor()->IsPrerenderAbandonedForTesting());
4523 // Prefetch should be allowed depending on preference and network type.
4524 // This test is for the bsae case: no Finch overrides should never disable.
4525 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4526 LocalPredictorDisableWorksBaseCase) {
4527 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4528 false /*preference_wifi_network_wifi*/,
4529 false /*preference_wifi_network_4g*/,
4530 false /*preference_always_network_wifi*/,
4531 false /*preference_always_network_4g*/,
4532 false /*preference_never_network_wifi*/,
4533 false /*preference_never_network_4g*/);
4536 // Prefetch should be allowed depending on preference and network type.
4537 // LocalPredictorOnCellularOnly should disable all wifi cases.
4538 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4539 LocalPredictorDisableWorksCellularOnly) {
4540 CreateTestFieldTrial("PrerenderLocalPredictorSpec",
4541 "LocalPredictorOnCellularOnly=Enabled");
4542 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4543 true /*preference_wifi_network_wifi*/,
4544 false /*preference_wifi_network_4g*/,
4545 true /*preference_always_network_wifi*/,
4546 false /*preference_always_network_4g*/,
4547 true /*preference_never_network_wifi*/,
4548 false /*preference_never_network_4g*/);
4551 // Prefetch should be allowed depending on preference and network type.
4552 // LocalPredictorNetworkPredictionEnabledOnly should disable whenever
4553 // network predictions will not be exercised.
4554 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4555 LocalPredictorDisableWorksNetworkPredictionEnableOnly) {
4556 CreateTestFieldTrial("PrerenderLocalPredictorSpec",
4557 "LocalPredictorNetworkPredictionEnabledOnly=Enabled");
4558 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4559 false /*preference_wifi_network_wifi*/,
4560 true /*preference_wifi_network_4g*/,
4561 false /*preference_always_network_wifi*/,
4562 false /*preference_always_network_4g*/,
4563 true /*preference_never_network_wifi*/,
4564 true /*preference_never_network_4g*/);
4567 // Prefetch should be allowed depending on preference and network type.
4568 // If LocalPredictorNetworkPredictionEnabledOnly and
4569 // LocalPredictorOnCellularOnly are both selected, we must disable whenever
4570 // network predictions are not exercised, or when we are on wifi.
4571 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4572 LocalPredictorDisableWorksBothOptions) {
4573 CreateTestFieldTrial("PrerenderLocalPredictorSpec",
4574 "LocalPredictorOnCellularOnly=Enabled:"
4575 "LocalPredictorNetworkPredictionEnabledOnly=Enabled");
4576 TestShouldDisableLocalPredictorPreferenceNetworkMatrix(
4577 true /*preference_wifi_network_wifi*/,
4578 true /*preference_wifi_network_4g*/,
4579 true /*preference_always_network_wifi*/,
4580 false /*preference_always_network_4g*/,
4581 true /*preference_never_network_wifi*/,
4582 true /*preference_never_network_4g*/);
4585 } // namespace prerender