blob: d1d78e9e4c35263d552fdd402849f0551c37f788 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/utf_string_conversions.h"
#include "chrome/browser/automation/automation_util.h"
#include "chrome/browser/extensions/extension_test_message_listener.h"
#include "chrome/browser/extensions/platform_app_browsertest_util.h"
#include "chrome/browser/prerender/prerender_link_manager.h"
#include "chrome/browser/prerender/prerender_link_manager_factory.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/test/base/ui_test_utils.h"
#include "chrome/test/base/test_launcher_utils.h"
#include "content/public/browser/notification_service.h"
#include "content/public/browser/render_process_host.h"
#include "content/public/test/browser_test_utils.h"
#include "content/public/test/fake_speech_recognition_manager.h"
#include "ui/compositor/compositor_setup.h"
#include "ui/gl/gl_switches.h"
using prerender::PrerenderLinkManager;
using prerender::PrerenderLinkManagerFactory;
class WebViewTest : public extensions::PlatformAppBrowserTest {
protected:
virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE {
extensions::PlatformAppBrowserTest::SetUpCommandLine(command_line);
#if !defined(OS_MACOSX)
CHECK(test_launcher_utils::OverrideGLImplementation(
command_line, gfx::kGLImplementationOSMesaName)) <<
"kUseGL must not be set by test framework code!";
#endif
}
virtual void SetUp() OVERRIDE {
const testing::TestInfo* const test_info =
testing::UnitTest::GetInstance()->current_test_info();
// SpeechRecognition test specific SetUp.
if (!strcmp(test_info->name(), "SpeechRecognition")) {
fake_speech_recognition_manager_.reset(
new content::FakeSpeechRecognitionManager());
fake_speech_recognition_manager_->set_should_send_fake_response(true);
// Inject the fake manager factory so that the test result is returned to
// the web page.
content::SpeechRecognitionManager::SetManagerForTests(
fake_speech_recognition_manager_.get());
}
extensions::PlatformAppBrowserTest::SetUp();
}
virtual void TearDown() OVERRIDE {
// SpeechRecognition test specific TearDown.
const testing::TestInfo* const test_info =
testing::UnitTest::GetInstance()->current_test_info();
if (!strcmp(test_info->name(), "SpeechRecognition"))
content::SpeechRecognitionManager::SetManagerForTests(NULL);
extensions::PlatformAppBrowserTest::TearDown();
}
// This method is responsible for initializing a packaged app, which contains
// multiple webview tags. The tags have different partition identifiers and
// their WebContent objects are returned as output. The method also verifies
// the expected process allocation and storage partition assignment.
// The |navigate_to_url| parameter is used to navigate the main browser
// window.
//
// TODO(ajwong): This function is getting to be too large. Either refactor it
// so the test can specify a configuration of WebView tags that we will
// dynamically inject JS to generate, or move this test wholesale into
// something that RunPlatformAppTest() can execute purely in Javascript. This
// won't let us do a white-box examination of the StoragePartition equivalence
// directly, but we will be able to view the black box effects which is good
// enough. http://crbug.com/160361
void NavigateAndOpenAppForIsolation(
GURL navigate_to_url,
content::WebContents** default_tag_contents1,
content::WebContents** default_tag_contents2,
content::WebContents** named_partition_contents1,
content::WebContents** named_partition_contents2,
content::WebContents** persistent_partition_contents1,
content::WebContents** persistent_partition_contents2,
content::WebContents** persistent_partition_contents3) {
GURL::Replacements replace_host;
std::string host_str("localhost"); // Must stay in scope with replace_host.
replace_host.SetHostStr(host_str);
navigate_to_url = navigate_to_url.ReplaceComponents(replace_host);
GURL tag_url1 = test_server()->GetURL(
"files/extensions/platform_apps/web_view/isolation/cookie.html");
tag_url1 = tag_url1.ReplaceComponents(replace_host);
GURL tag_url2 = test_server()->GetURL(
"files/extensions/platform_apps/web_view/isolation/cookie2.html");
tag_url2 = tag_url2.ReplaceComponents(replace_host);
GURL tag_url3 = test_server()->GetURL(
"files/extensions/platform_apps/web_view/isolation/storage1.html");
tag_url3 = tag_url3.ReplaceComponents(replace_host);
GURL tag_url4 = test_server()->GetURL(
"files/extensions/platform_apps/web_view/isolation/storage2.html");
tag_url4 = tag_url4.ReplaceComponents(replace_host);
GURL tag_url5 = test_server()->GetURL(
"files/extensions/platform_apps/web_view/isolation/storage1.html#p1");
tag_url5 = tag_url5.ReplaceComponents(replace_host);
GURL tag_url6 = test_server()->GetURL(
"files/extensions/platform_apps/web_view/isolation/storage1.html#p2");
tag_url6 = tag_url6.ReplaceComponents(replace_host);
GURL tag_url7 = test_server()->GetURL(
"files/extensions/platform_apps/web_view/isolation/storage1.html#p3");
tag_url7 = tag_url7.ReplaceComponents(replace_host);
ui_test_utils::NavigateToURLWithDisposition(
browser(), navigate_to_url, CURRENT_TAB,
ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
ui_test_utils::UrlLoadObserver observer1(
tag_url1, content::NotificationService::AllSources());
ui_test_utils::UrlLoadObserver observer2(
tag_url2, content::NotificationService::AllSources());
ui_test_utils::UrlLoadObserver observer3(
tag_url3, content::NotificationService::AllSources());
ui_test_utils::UrlLoadObserver observer4(
tag_url4, content::NotificationService::AllSources());
ui_test_utils::UrlLoadObserver observer5(
tag_url5, content::NotificationService::AllSources());
ui_test_utils::UrlLoadObserver observer6(
tag_url6, content::NotificationService::AllSources());
ui_test_utils::UrlLoadObserver observer7(
tag_url7, content::NotificationService::AllSources());
LoadAndLaunchPlatformApp("web_view/isolation");
observer1.Wait();
observer2.Wait();
observer3.Wait();
observer4.Wait();
observer5.Wait();
observer6.Wait();
observer7.Wait();
content::Source<content::NavigationController> source1 = observer1.source();
EXPECT_TRUE(source1->GetWebContents()->GetRenderProcessHost()->IsGuest());
content::Source<content::NavigationController> source2 = observer2.source();
EXPECT_TRUE(source2->GetWebContents()->GetRenderProcessHost()->IsGuest());
content::Source<content::NavigationController> source3 = observer3.source();
EXPECT_TRUE(source3->GetWebContents()->GetRenderProcessHost()->IsGuest());
content::Source<content::NavigationController> source4 = observer4.source();
EXPECT_TRUE(source4->GetWebContents()->GetRenderProcessHost()->IsGuest());
content::Source<content::NavigationController> source5 = observer5.source();
EXPECT_TRUE(source5->GetWebContents()->GetRenderProcessHost()->IsGuest());
content::Source<content::NavigationController> source6 = observer6.source();
EXPECT_TRUE(source6->GetWebContents()->GetRenderProcessHost()->IsGuest());
content::Source<content::NavigationController> source7 = observer7.source();
EXPECT_TRUE(source7->GetWebContents()->GetRenderProcessHost()->IsGuest());
// Check that the first two tags use the same process and it is different
// than the process used by the other two.
EXPECT_EQ(source1->GetWebContents()->GetRenderProcessHost()->GetID(),
source2->GetWebContents()->GetRenderProcessHost()->GetID());
EXPECT_EQ(source3->GetWebContents()->GetRenderProcessHost()->GetID(),
source4->GetWebContents()->GetRenderProcessHost()->GetID());
EXPECT_NE(source1->GetWebContents()->GetRenderProcessHost()->GetID(),
source3->GetWebContents()->GetRenderProcessHost()->GetID());
// The two sets of tags should also be isolated from the main browser.
EXPECT_NE(source1->GetWebContents()->GetRenderProcessHost()->GetID(),
browser()->tab_strip_model()->GetWebContentsAt(0)->
GetRenderProcessHost()->GetID());
EXPECT_NE(source3->GetWebContents()->GetRenderProcessHost()->GetID(),
browser()->tab_strip_model()->GetWebContentsAt(0)->
GetRenderProcessHost()->GetID());
// Check that the storage partitions of the first two tags match and are
// different than the other two.
EXPECT_EQ(
source1->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition(),
source2->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition());
EXPECT_EQ(
source3->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition(),
source4->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition());
EXPECT_NE(
source1->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition(),
source3->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition());
// Ensure the persistent storage partitions are different.
EXPECT_EQ(
source5->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition(),
source6->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition());
EXPECT_NE(
source5->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition(),
source7->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition());
EXPECT_NE(
source1->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition(),
source5->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition());
EXPECT_NE(
source1->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition(),
source7->GetWebContents()->GetRenderProcessHost()->
GetStoragePartition());
*default_tag_contents1 = source1->GetWebContents();
*default_tag_contents2 = source2->GetWebContents();
*named_partition_contents1 = source3->GetWebContents();
*named_partition_contents2 = source4->GetWebContents();
if (persistent_partition_contents1) {
*persistent_partition_contents1 = source5->GetWebContents();
}
if (persistent_partition_contents2) {
*persistent_partition_contents2 = source6->GetWebContents();
}
if (persistent_partition_contents3) {
*persistent_partition_contents3 = source7->GetWebContents();
}
}
void ExecuteScriptWaitForTitle(content::WebContents* web_contents,
const char* script,
const char* title) {
string16 expected_title(ASCIIToUTF16(title));
string16 error_title(ASCIIToUTF16("error"));
content::TitleWatcher title_watcher(web_contents, expected_title);
title_watcher.AlsoWaitForTitle(error_title);
EXPECT_TRUE(content::ExecuteScript(web_contents, script));
EXPECT_EQ(expected_title, title_watcher.WaitAndGetTitle());
}
scoped_ptr<content::FakeSpeechRecognitionManager>
fake_speech_recognition_manager_;
};
// http://crbug.com/176122: This test is flaky on Windows.
#if defined(OS_WIN)
#define MAYBE_Shim DISABLED_Shim
#else
#define MAYBE_Shim Shim
#endif
IN_PROC_BROWSER_TEST_F(WebViewTest, MAYBE_Shim) {
ASSERT_TRUE(RunPlatformAppTest("platform_apps/web_view/shim")) << message_;
}
IN_PROC_BROWSER_TEST_F(WebViewTest, ShimSrcAttribute) {
ASSERT_TRUE(RunPlatformAppTest("platform_apps/web_view/src_attribute"))
<< message_;
}
// This test verifies that prerendering has been disabled inside <webview>.
// This test is here rather than in PrerenderBrowserTest for testing convenience
// only. If it breaks then this is a bug in the prerenderer.
IN_PROC_BROWSER_TEST_F(WebViewTest, NoPrerenderer) {
ASSERT_TRUE(StartTestServer());
std::string host_str("localhost"); // Must stay in scope with replace_host.
GURL::Replacements replace_host;
replace_host.SetHostStr(host_str);
GURL guest_url = test_server()->GetURL(
"files/extensions/platform_apps/web_view/noprerenderer/guest.html");
guest_url = guest_url.ReplaceComponents(replace_host);
ui_test_utils::UrlLoadObserver guest_observer(
guest_url, content::NotificationService::AllSources());
ExtensionTestMessageListener guest_loaded_listener("guest-loaded", false);
LoadAndLaunchPlatformApp("web_view/noprerenderer");
guest_observer.Wait();
content::Source<content::NavigationController> source =
guest_observer.source();
EXPECT_TRUE(source->GetWebContents()->GetRenderProcessHost()->IsGuest());
ASSERT_TRUE(guest_loaded_listener.WaitUntilSatisfied());
content::WebContents* guest_web_contents = source->GetWebContents();
ASSERT_TRUE(guest_web_contents != NULL);
PrerenderLinkManager* prerender_link_manager =
PrerenderLinkManagerFactory::GetForProfile(
Profile::FromBrowserContext(guest_web_contents->GetBrowserContext()));
ASSERT_TRUE(prerender_link_manager != NULL);
EXPECT_TRUE(prerender_link_manager->IsEmpty());
}
// This tests cookie isolation for packaged apps with webview tags. It navigates
// the main browser window to a page that sets a cookie and loads an app with
// multiple webview tags. Each tag sets a cookie and the test checks the proper
// storage isolation is enforced.
IN_PROC_BROWSER_TEST_F(WebViewTest, CookieIsolation) {
ASSERT_TRUE(StartTestServer());
const std::string kExpire =
"var expire = new Date(Date.now() + 24 * 60 * 60 * 1000);";
std::string cookie_script1(kExpire);
cookie_script1.append(
"document.cookie = 'guest1=true; path=/; expires=' + expire + ';';");
std::string cookie_script2(kExpire);
cookie_script2.append(
"document.cookie = 'guest2=true; path=/; expires=' + expire + ';';");
GURL::Replacements replace_host;
std::string host_str("localhost"); // Must stay in scope with replace_host.
replace_host.SetHostStr(host_str);
GURL set_cookie_url = test_server()->GetURL(
"files/extensions/platform_apps/isolation/set_cookie.html");
set_cookie_url = set_cookie_url.ReplaceComponents(replace_host);
// The first two partitions will be used to set cookies and ensure they are
// shared. The named partition is used to ensure that cookies are isolated
// between partitions within the same app.
content::WebContents* cookie_contents1;
content::WebContents* cookie_contents2;
content::WebContents* named_partition_contents1;
content::WebContents* named_partition_contents2;
NavigateAndOpenAppForIsolation(set_cookie_url, &cookie_contents1,
&cookie_contents2, &named_partition_contents1,
&named_partition_contents2, NULL, NULL, NULL);
EXPECT_TRUE(content::ExecuteScript(cookie_contents1, cookie_script1));
EXPECT_TRUE(content::ExecuteScript(cookie_contents2, cookie_script2));
int cookie_size;
std::string cookie_value;
// Test the regular browser context to ensure we have only one cookie.
automation_util::GetCookies(GURL("http://localhost"),
browser()->tab_strip_model()->GetWebContentsAt(0),
&cookie_size, &cookie_value);
EXPECT_EQ("testCookie=1", cookie_value);
// The default behavior is to combine webview tags with no explicit partition
// declaration into the same in-memory partition. Test the webview tags to
// ensure we have properly set the cookies and we have both cookies in both
// tags.
automation_util::GetCookies(GURL("http://localhost"),
cookie_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("guest1=true; guest2=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
cookie_contents2,
&cookie_size, &cookie_value);
EXPECT_EQ("guest1=true; guest2=true", cookie_value);
// The third tag should not have any cookies as it is in a separate partition.
automation_util::GetCookies(GURL("http://localhost"),
named_partition_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("", cookie_value);
}
// This tests that in-memory storage partitions are reset on browser restart,
// but persistent ones maintain state for cookies and HTML5 storage.
IN_PROC_BROWSER_TEST_F(WebViewTest, PRE_StoragePersistence) {
ASSERT_TRUE(StartTestServer());
const std::string kExpire =
"var expire = new Date(Date.now() + 24 * 60 * 60 * 1000);";
std::string cookie_script1(kExpire);
cookie_script1.append(
"document.cookie = 'inmemory=true; path=/; expires=' + expire + ';';");
std::string cookie_script2(kExpire);
cookie_script2.append(
"document.cookie = 'persist1=true; path=/; expires=' + expire + ';';");
std::string cookie_script3(kExpire);
cookie_script3.append(
"document.cookie = 'persist2=true; path=/; expires=' + expire + ';';");
// We don't care where the main browser is on this test.
GURL blank_url("about:blank");
// The first two partitions will be used to set cookies and ensure they are
// shared. The named partition is used to ensure that cookies are isolated
// between partitions within the same app.
content::WebContents* cookie_contents1;
content::WebContents* cookie_contents2;
content::WebContents* named_partition_contents1;
content::WebContents* named_partition_contents2;
content::WebContents* persistent_partition_contents1;
content::WebContents* persistent_partition_contents2;
content::WebContents* persistent_partition_contents3;
NavigateAndOpenAppForIsolation(blank_url, &cookie_contents1,
&cookie_contents2, &named_partition_contents1,
&named_partition_contents2,
&persistent_partition_contents1,
&persistent_partition_contents2,
&persistent_partition_contents3);
// Set the inmemory=true cookie for tags with inmemory partitions.
EXPECT_TRUE(content::ExecuteScript(cookie_contents1, cookie_script1));
EXPECT_TRUE(content::ExecuteScript(named_partition_contents1,
cookie_script1));
// For the two different persistent storage partitions, set the
// two different cookies so we can check that they aren't comingled below.
EXPECT_TRUE(content::ExecuteScript(persistent_partition_contents1,
cookie_script2));
EXPECT_TRUE(content::ExecuteScript(persistent_partition_contents3,
cookie_script3));
int cookie_size;
std::string cookie_value;
// Check that all in-memory partitions have a cookie set.
automation_util::GetCookies(GURL("http://localhost"),
cookie_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("inmemory=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
cookie_contents2,
&cookie_size, &cookie_value);
EXPECT_EQ("inmemory=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
named_partition_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("inmemory=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
named_partition_contents2,
&cookie_size, &cookie_value);
EXPECT_EQ("inmemory=true", cookie_value);
// Check that all persistent partitions kept their state.
automation_util::GetCookies(GURL("http://localhost"),
persistent_partition_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("persist1=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
persistent_partition_contents2,
&cookie_size, &cookie_value);
EXPECT_EQ("persist1=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
persistent_partition_contents3,
&cookie_size, &cookie_value);
EXPECT_EQ("persist2=true", cookie_value);
}
// This is the post-reset portion of the StoragePersistence test. See
// PRE_StoragePersistence for main comment.
IN_PROC_BROWSER_TEST_F(WebViewTest, StoragePersistence) {
ASSERT_TRUE(StartTestServer());
// We don't care where the main browser is on this test.
GURL blank_url("about:blank");
// The first two partitions will be used to set cookies and ensure they are
// shared. The named partition is used to ensure that cookies are isolated
// between partitions within the same app.
content::WebContents* cookie_contents1;
content::WebContents* cookie_contents2;
content::WebContents* named_partition_contents1;
content::WebContents* named_partition_contents2;
content::WebContents* persistent_partition_contents1;
content::WebContents* persistent_partition_contents2;
content::WebContents* persistent_partition_contents3;
NavigateAndOpenAppForIsolation(blank_url, &cookie_contents1,
&cookie_contents2, &named_partition_contents1,
&named_partition_contents2,
&persistent_partition_contents1,
&persistent_partition_contents2,
&persistent_partition_contents3);
int cookie_size;
std::string cookie_value;
// Check that all in-memory partitions lost their state.
automation_util::GetCookies(GURL("http://localhost"),
cookie_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
cookie_contents2,
&cookie_size, &cookie_value);
EXPECT_EQ("", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
named_partition_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
named_partition_contents2,
&cookie_size, &cookie_value);
EXPECT_EQ("", cookie_value);
// Check that all persistent partitions kept their state.
automation_util::GetCookies(GURL("http://localhost"),
persistent_partition_contents1,
&cookie_size, &cookie_value);
EXPECT_EQ("persist1=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
persistent_partition_contents2,
&cookie_size, &cookie_value);
EXPECT_EQ("persist1=true", cookie_value);
automation_util::GetCookies(GURL("http://localhost"),
persistent_partition_contents3,
&cookie_size, &cookie_value);
EXPECT_EQ("persist2=true", cookie_value);
}
// This tests DOM storage isolation for packaged apps with webview tags. It
// loads an app with multiple webview tags and each tag sets DOM storage
// entries, which the test checks to ensure proper storage isolation is
// enforced.
IN_PROC_BROWSER_TEST_F(WebViewTest, DOMStorageIsolation) {
ASSERT_TRUE(StartTestServer());
GURL regular_url = test_server()->GetURL("files/title1.html");
std::string output;
std::string get_local_storage("window.domAutomationController.send("
"window.localStorage.getItem('foo') || 'badval')");
std::string get_session_storage("window.domAutomationController.send("
"window.sessionStorage.getItem('bar') || 'badval')");
content::WebContents* default_tag_contents1;
content::WebContents* default_tag_contents2;
content::WebContents* storage_contents1;
content::WebContents* storage_contents2;
NavigateAndOpenAppForIsolation(regular_url, &default_tag_contents1,
&default_tag_contents2, &storage_contents1,
&storage_contents2, NULL, NULL, NULL);
// Initialize the storage for the first of the two tags that share a storage
// partition.
EXPECT_TRUE(content::ExecuteScript(storage_contents1,
"initDomStorage('page1')"));
// Let's test that the expected values are present in the first tag, as they
// will be overwritten once we call the initDomStorage on the second tag.
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents1,
get_local_storage.c_str(),
&output));
EXPECT_STREQ("local-page1", output.c_str());
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents1,
get_session_storage.c_str(),
&output));
EXPECT_STREQ("session-page1", output.c_str());
// Now, init the storage in the second tag in the same storage partition,
// which will overwrite the shared localStorage.
EXPECT_TRUE(content::ExecuteScript(storage_contents2,
"initDomStorage('page2')"));
// The localStorage value now should reflect the one written through the
// second tag.
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents1,
get_local_storage.c_str(),
&output));
EXPECT_STREQ("local-page2", output.c_str());
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents2,
get_local_storage.c_str(),
&output));
EXPECT_STREQ("local-page2", output.c_str());
// Session storage is not shared though, as each webview tag has separate
// instance, even if they are in the same storage partition.
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents1,
get_session_storage.c_str(),
&output));
EXPECT_STREQ("session-page1", output.c_str());
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents2,
get_session_storage.c_str(),
&output));
EXPECT_STREQ("session-page2", output.c_str());
// Also, let's check that the main browser and another tag that doesn't share
// the same partition don't have those values stored.
EXPECT_TRUE(ExecuteScriptAndExtractString(
browser()->tab_strip_model()->GetWebContentsAt(0),
get_local_storage.c_str(),
&output));
EXPECT_STREQ("badval", output.c_str());
EXPECT_TRUE(ExecuteScriptAndExtractString(
browser()->tab_strip_model()->GetWebContentsAt(0),
get_session_storage.c_str(),
&output));
EXPECT_STREQ("badval", output.c_str());
EXPECT_TRUE(ExecuteScriptAndExtractString(default_tag_contents1,
get_local_storage.c_str(),
&output));
EXPECT_STREQ("badval", output.c_str());
EXPECT_TRUE(ExecuteScriptAndExtractString(default_tag_contents1,
get_session_storage.c_str(),
&output));
EXPECT_STREQ("badval", output.c_str());
}
// This tests IndexedDB isolation for packaged apps with webview tags. It loads
// an app with multiple webview tags and each tag creates an IndexedDB record,
// which the test checks to ensure proper storage isolation is enforced.
IN_PROC_BROWSER_TEST_F(WebViewTest, IndexedDBIsolation) {
ASSERT_TRUE(StartTestServer());
GURL regular_url = test_server()->GetURL("files/title1.html");
content::WebContents* default_tag_contents1;
content::WebContents* default_tag_contents2;
content::WebContents* storage_contents1;
content::WebContents* storage_contents2;
NavigateAndOpenAppForIsolation(regular_url, &default_tag_contents1,
&default_tag_contents2, &storage_contents1,
&storage_contents2, NULL, NULL, NULL);
// Initialize the storage for the first of the two tags that share a storage
// partition.
ExecuteScriptWaitForTitle(storage_contents1, "initIDB()", "idb created");
ExecuteScriptWaitForTitle(storage_contents1, "addItemIDB(7, 'page1')",
"addItemIDB complete");
ExecuteScriptWaitForTitle(storage_contents1, "readItemIDB(7)",
"readItemIDB complete");
std::string output;
std::string get_value(
"window.domAutomationController.send(getValueIDB() || 'badval')");
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents1,
get_value.c_str(), &output));
EXPECT_STREQ("page1", output.c_str());
// Initialize the db in the second tag.
ExecuteScriptWaitForTitle(storage_contents2, "initIDB()", "idb open");
// Since we share a partition, reading the value should return the existing
// one.
ExecuteScriptWaitForTitle(storage_contents2, "readItemIDB(7)",
"readItemIDB complete");
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents2,
get_value.c_str(), &output));
EXPECT_STREQ("page1", output.c_str());
// Now write through the second tag and read it back.
ExecuteScriptWaitForTitle(storage_contents2, "addItemIDB(7, 'page2')",
"addItemIDB complete");
ExecuteScriptWaitForTitle(storage_contents2, "readItemIDB(7)",
"readItemIDB complete");
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents2,
get_value.c_str(), &output));
EXPECT_STREQ("page2", output.c_str());
// Reset the document title, otherwise the next call will not see a change and
// will hang waiting for it.
EXPECT_TRUE(content::ExecuteScript(storage_contents1,
"document.title = 'foo'"));
// Read through the first tag to ensure we have the second value.
ExecuteScriptWaitForTitle(storage_contents1, "readItemIDB(7)",
"readItemIDB complete");
EXPECT_TRUE(ExecuteScriptAndExtractString(storage_contents1,
get_value.c_str(), &output));
EXPECT_STREQ("page2", output.c_str());
// Now, let's confirm there is no database in the main browser and another
// tag that doesn't share the same partition. Due to the IndexedDB API design,
// open will succeed, but the version will be 1, since it creates the database
// if it is not found. The two tags use database version 3, so we avoid
// ambiguity.
const char* script =
"indexedDB.open('isolation').onsuccess = function(e) {"
" if (e.target.result.version == 1)"
" document.title = 'db not found';"
" else "
" document.title = 'error';"
"}";
ExecuteScriptWaitForTitle(browser()->tab_strip_model()->GetWebContentsAt(0),
script, "db not found");
ExecuteScriptWaitForTitle(default_tag_contents1, script, "db not found");
}
IN_PROC_BROWSER_TEST_F(WebViewTest, SpeechRecognition) {
ASSERT_TRUE(StartTestServer());
std::string host_str("localhost"); // Must stay in scope with replace_host.
GURL::Replacements replace_host;
replace_host.SetHostStr(host_str);
GURL guest_url = test_server()->GetURL(
"files/extensions/platform_apps/web_view/speech/guest.html");
guest_url = guest_url.ReplaceComponents(replace_host);
ui_test_utils::UrlLoadObserver guest_observer(
guest_url, content::NotificationService::AllSources());
ExtensionTestMessageListener guest_loaded_listener("guest-loaded", false);
LoadAndLaunchPlatformApp("web_view/speech");
guest_observer.Wait();
content::Source<content::NavigationController> source =
guest_observer.source();
EXPECT_TRUE(source->GetWebContents()->GetRenderProcessHost()->IsGuest());
ASSERT_TRUE(guest_loaded_listener.WaitUntilSatisfied());
content::WebContents* guest_web_contents = source->GetWebContents();
// Click on the guest (center of the WebContents), the guest is rendered in a
// way that this will trigger clicking on speech recognition input mic.
SimulateMouseClick(guest_web_contents, 0, WebKit::WebMouseEvent::ButtonLeft);
string16 expected_title(ASCIIToUTF16("PASSED"));
string16 error_title(ASCIIToUTF16("FAILED"));
content::TitleWatcher title_watcher(guest_web_contents, expected_title);
title_watcher.AlsoWaitForTitle(error_title);
EXPECT_EQ(expected_title, title_watcher.WaitAndGetTitle());
}