7eb2a38d68cbad2171debb425f9954eb5e5ee7b8
[platform/framework/web/crosswalk.git] / src / chrome / browser / prerender / prerender_browsertest.cc
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include <deque>
6 #include <vector>
7
8 #include "base/bind.h"
9 #include "base/command_line.h"
10 #include "base/files/file_path.h"
11 #include "base/memory/ref_counted_memory.h"
12 #include "base/memory/scoped_vector.h"
13 #include "base/memory/weak_ptr.h"
14 #include "base/path_service.h"
15 #include "base/prefs/pref_service.h"
16 #include "base/run_loop.h"
17 #include "base/strings/string_util.h"
18 #include "base/strings/stringprintf.h"
19 #include "base/strings/utf_string_conversions.h"
20 #include "base/test/test_timeouts.h"
21 #include "base/values.h"
22 #include "chrome/browser/browsing_data/browsing_data_helper.h"
23 #include "chrome/browser/browsing_data/browsing_data_remover.h"
24 #include "chrome/browser/browsing_data/browsing_data_remover_test_util.h"
25 #include "chrome/browser/chrome_content_browser_client.h"
26 #include "chrome/browser/chrome_notification_types.h"
27 #include "chrome/browser/content_settings/host_content_settings_map.h"
28 #include "chrome/browser/extensions/api/web_navigation/web_navigation_api.h"
29 #include "chrome/browser/extensions/extension_apitest.h"
30 #include "chrome/browser/external_protocol/external_protocol_handler.h"
31 #include "chrome/browser/favicon/favicon_tab_helper.h"
32 #include "chrome/browser/predictors/autocomplete_action_predictor.h"
33 #include "chrome/browser/predictors/autocomplete_action_predictor_factory.h"
34 #include "chrome/browser/prerender/prerender_contents.h"
35 #include "chrome/browser/prerender/prerender_handle.h"
36 #include "chrome/browser/prerender/prerender_link_manager.h"
37 #include "chrome/browser/prerender/prerender_link_manager_factory.h"
38 #include "chrome/browser/prerender/prerender_manager.h"
39 #include "chrome/browser/prerender/prerender_manager_factory.h"
40 #include "chrome/browser/profiles/profile.h"
41 #include "chrome/browser/profiles/profile_io_data.h"
42 #include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
43 #include "chrome/browser/safe_browsing/database_manager.h"
44 #include "chrome/browser/safe_browsing/safe_browsing_service.h"
45 #include "chrome/browser/safe_browsing/safe_browsing_util.h"
46 #include "chrome/browser/task_manager/task_manager.h"
47 #include "chrome/browser/task_manager/task_manager_browsertest_util.h"
48 #include "chrome/browser/ui/browser.h"
49 #include "chrome/browser/ui/browser_commands.h"
50 #include "chrome/browser/ui/browser_finder.h"
51 #include "chrome/browser/ui/browser_navigator.h"
52 #include "chrome/browser/ui/browser_window.h"
53 #include "chrome/browser/ui/omnibox/location_bar.h"
54 #include "chrome/browser/ui/omnibox/omnibox_edit_model.h"
55 #include "chrome/browser/ui/omnibox/omnibox_popup_model.h"
56 #include "chrome/browser/ui/omnibox/omnibox_view.h"
57 #include "chrome/browser/ui/tabs/tab_strip_model.h"
58 #include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
59 #include "chrome/common/chrome_paths.h"
60 #include "chrome/common/chrome_switches.h"
61 #include "chrome/common/extensions/extension_constants.h"
62 #include "chrome/common/extensions/manifest_handlers/mime_types_handler.h"
63 #include "chrome/common/pref_names.h"
64 #include "chrome/test/base/in_process_browser_test.h"
65 #include "chrome/test/base/test_switches.h"
66 #include "chrome/test/base/ui_test_utils.h"
67 #include "chrome/test/base/uma_histogram_helper.h"
68 #include "content/public/browser/browser_message_filter.h"
69 #include "content/public/browser/devtools_agent_host.h"
70 #include "content/public/browser/devtools_client_host.h"
71 #include "content/public/browser/devtools_manager.h"
72 #include "content/public/browser/navigation_controller.h"
73 #include "content/public/browser/navigation_entry.h"
74 #include "content/public/browser/notification_service.h"
75 #include "content/public/browser/render_frame_host.h"
76 #include "content/public/browser/render_process_host.h"
77 #include "content/public/browser/render_view_host.h"
78 #include "content/public/browser/site_instance.h"
79 #include "content/public/browser/web_contents.h"
80 #include "content/public/browser/web_contents_observer.h"
81 #include "content/public/common/url_constants.h"
82 #include "content/public/test/browser_test_utils.h"
83 #include "content/public/test/test_navigation_observer.h"
84 #include "content/public/test/test_utils.h"
85 #include "content/test/net/url_request_mock_http_job.h"
86 #include "extensions/common/switches.h"
87 #include "grit/generated_resources.h"
88 #include "net/base/escape.h"
89 #include "net/cert/x509_certificate.h"
90 #include "net/dns/mock_host_resolver.h"
91 #include "net/ssl/client_cert_store.h"
92 #include "net/ssl/ssl_cert_request_info.h"
93 #include "net/url_request/url_request_context.h"
94 #include "net/url_request/url_request_context_getter.h"
95 #include "net/url_request/url_request_filter.h"
96 #include "net/url_request/url_request_interceptor.h"
97 #include "net/url_request/url_request_job.h"
98 #include "ui/base/l10n/l10n_util.h"
99 #include "url/gurl.h"
100
101 using content::BrowserThread;
102 using content::DevToolsAgentHost;
103 using content::DevToolsClientHost;
104 using content::DevToolsManager;
105 using content::NavigationController;
106 using content::OpenURLParams;
107 using content::Referrer;
108 using content::RenderFrameHost;
109 using content::RenderViewHost;
110 using content::RenderWidgetHost;
111 using content::TestNavigationObserver;
112 using content::WebContents;
113 using content::WebContentsObserver;
114 using task_manager::browsertest_util::WaitForTaskManagerRows;
115
116 // Prerender tests work as follows:
117 //
118 // A page with a prefetch link to the test page is loaded.  Once prerendered,
119 // its Javascript function DidPrerenderPass() is called, which returns true if
120 // the page behaves as expected when prerendered.
121 //
122 // The prerendered page is then displayed on a tab.  The Javascript function
123 // DidDisplayPass() is called, and returns true if the page behaved as it
124 // should while being displayed.
125
126 namespace prerender {
127
128 namespace {
129
130 // Constants used in the test HTML files.
131 const char* kReadyTitle = "READY";
132 const char* kPassTitle = "PASS";
133
134 std::string CreateClientRedirect(const std::string& dest_url) {
135   const char* const kClientRedirectBase = "client-redirect?";
136   return kClientRedirectBase + net::EscapeQueryParamValue(dest_url, false);
137 }
138
139 std::string CreateServerRedirect(const std::string& dest_url) {
140   const char* const kServerRedirectBase = "server-redirect?";
141   return kServerRedirectBase + net::EscapeQueryParamValue(dest_url, false);
142 }
143
144 // Clears the specified data using BrowsingDataRemover.
145 void ClearBrowsingData(Browser* browser, int remove_mask) {
146   BrowsingDataRemover* remover =
147       BrowsingDataRemover::CreateForUnboundedRange(browser->profile());
148   BrowsingDataRemoverCompletionObserver observer(remover);
149   remover->Remove(remove_mask, BrowsingDataHelper::UNPROTECTED_WEB);
150   observer.BlockUntilCompletion();
151   // BrowsingDataRemover deletes itself.
152 }
153
154 // Returns true if the prerender is expected to abort on its own, before
155 // attempting to swap it.
156 bool ShouldAbortPrerenderBeforeSwap(FinalStatus status) {
157   switch (status) {
158     case FINAL_STATUS_USED:
159     case FINAL_STATUS_WINDOW_OPENER:
160     case FINAL_STATUS_APP_TERMINATING:
161     case FINAL_STATUS_PROFILE_DESTROYED:
162     case FINAL_STATUS_CACHE_OR_HISTORY_CLEARED:
163     // We'll crash the renderer after it's loaded.
164     case FINAL_STATUS_RENDERER_CRASHED:
165     case FINAL_STATUS_CANCELLED:
166     case FINAL_STATUS_DEVTOOLS_ATTACHED:
167     case FINAL_STATUS_PAGE_BEING_CAPTURED:
168     case FINAL_STATUS_NAVIGATION_UNCOMMITTED:
169     case FINAL_STATUS_WOULD_HAVE_BEEN_USED:
170     case FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE:
171       return false;
172     default:
173       return true;
174   }
175 }
176
177 // Convenience function to wait for a title. Handles the case when the
178 // WebContents already has the expected title.
179 void WaitForASCIITitle(WebContents* web_contents,
180                        const char* expected_title_ascii) {
181   base::string16 expected_title = base::ASCIIToUTF16(expected_title_ascii);
182   if (web_contents->GetTitle() == expected_title)
183     return;
184   content::TitleWatcher title_watcher(web_contents, expected_title);
185   EXPECT_EQ(expected_title, title_watcher.WaitAndGetTitle());
186 }
187
188 // Waits for the destruction of a RenderProcessHost's IPC channel.
189 // Used to make sure the PrerenderLinkManager's OnChannelClosed function has
190 // been called, before checking its state.
191 class ChannelDestructionWatcher {
192  public:
193   ChannelDestructionWatcher() : channel_destroyed_(false) {
194   }
195
196   ~ChannelDestructionWatcher() {
197   }
198
199   void WatchChannel(content::RenderProcessHost* host) {
200     host->AddFilter(new DestructionMessageFilter(this));
201   }
202
203   void WaitForChannelClose() {
204     run_loop_.Run();
205     EXPECT_TRUE(channel_destroyed_);
206   }
207
208  private:
209   // When destroyed, calls ChannelDestructionWatcher::OnChannelDestroyed.
210   // Ignores all messages.
211   class DestructionMessageFilter : public content::BrowserMessageFilter {
212    public:
213      explicit DestructionMessageFilter(ChannelDestructionWatcher* watcher)
214          : BrowserMessageFilter(0),
215            watcher_(watcher) {
216     }
217
218    private:
219     virtual ~DestructionMessageFilter() {
220       content::BrowserThread::PostTask(
221           content::BrowserThread::UI, FROM_HERE,
222           base::Bind(&ChannelDestructionWatcher::OnChannelDestroyed,
223                      base::Unretained(watcher_)));
224     }
225
226     virtual bool OnMessageReceived(const IPC::Message& message) OVERRIDE {
227       return false;
228     }
229
230     ChannelDestructionWatcher* watcher_;
231
232     DISALLOW_COPY_AND_ASSIGN(DestructionMessageFilter);
233   };
234
235   void OnChannelDestroyed() {
236     DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
237
238     EXPECT_FALSE(channel_destroyed_);
239     channel_destroyed_ = true;
240     run_loop_.Quit();
241   }
242
243   bool channel_destroyed_;
244   base::RunLoop run_loop_;
245
246   DISALLOW_COPY_AND_ASSIGN(ChannelDestructionWatcher);
247 };
248
249 // A navigation observer to wait on either a new load or a swap of a
250 // WebContents. On swap, if the new WebContents is still loading, wait for that
251 // load to complete as well. Note that the load must begin after the observer is
252 // attached.
253 class NavigationOrSwapObserver : public WebContentsObserver,
254                                  public TabStripModelObserver {
255  public:
256   // Waits for either a new load or a swap of |tab_strip_model|'s active
257   // WebContents.
258   NavigationOrSwapObserver(TabStripModel* tab_strip_model,
259                            WebContents* web_contents)
260       : WebContentsObserver(web_contents),
261         tab_strip_model_(tab_strip_model),
262         did_start_loading_(false),
263         number_of_loads_(1) {
264     CHECK_NE(TabStripModel::kNoTab,
265              tab_strip_model->GetIndexOfWebContents(web_contents));
266     tab_strip_model_->AddObserver(this);
267   }
268
269   // Waits for either |number_of_loads| loads or a swap of |tab_strip_model|'s
270   // active WebContents.
271   NavigationOrSwapObserver(TabStripModel* tab_strip_model,
272                            WebContents* web_contents,
273                            int number_of_loads)
274       : WebContentsObserver(web_contents),
275         tab_strip_model_(tab_strip_model),
276         did_start_loading_(false),
277         number_of_loads_(number_of_loads) {
278     CHECK_NE(TabStripModel::kNoTab,
279              tab_strip_model->GetIndexOfWebContents(web_contents));
280     tab_strip_model_->AddObserver(this);
281   }
282
283   virtual ~NavigationOrSwapObserver() {
284     tab_strip_model_->RemoveObserver(this);
285   }
286
287   void set_did_start_loading() {
288     did_start_loading_ = true;
289   }
290
291   void Wait() {
292     loop_.Run();
293   }
294
295   // WebContentsObserver implementation:
296   virtual void DidStartLoading(RenderViewHost* render_view_host) OVERRIDE {
297     did_start_loading_ = true;
298   }
299   virtual void DidStopLoading(RenderViewHost* render_view_host) OVERRIDE {
300     if (!did_start_loading_)
301       return;
302     number_of_loads_--;
303     if (number_of_loads_ == 0)
304       loop_.Quit();
305   }
306
307   // TabStripModelObserver implementation:
308   virtual void TabReplacedAt(TabStripModel* tab_strip_model,
309                              WebContents* old_contents,
310                              WebContents* new_contents,
311                              int index) OVERRIDE {
312     if (old_contents != web_contents())
313       return;
314     // Switch to observing the new WebContents.
315     Observe(new_contents);
316     if (new_contents->IsLoading()) {
317       // If the new WebContents is still loading, wait for it to complete. Only
318       // one load post-swap is supported.
319       did_start_loading_ = true;
320       number_of_loads_ = 1;
321     } else {
322       loop_.Quit();
323     }
324   }
325
326  private:
327   TabStripModel* tab_strip_model_;
328   bool did_start_loading_;
329   int number_of_loads_;
330   base::RunLoop loop_;
331 };
332
333 // Waits for a new tab to open and a navigation or swap in it.
334 class NewTabNavigationOrSwapObserver {
335  public:
336   NewTabNavigationOrSwapObserver()
337       : new_tab_observer_(
338             chrome::NOTIFICATION_TAB_ADDED,
339             base::Bind(&NewTabNavigationOrSwapObserver::OnTabAdded,
340                        base::Unretained(this))) {
341     // Watch for NOTIFICATION_TAB_ADDED. Add a callback so that the
342     // NavigationOrSwapObserver can be attached synchronously and no events are
343     // missed.
344   }
345
346   void Wait() {
347     new_tab_observer_.Wait();
348     swap_observer_->Wait();
349   }
350
351   bool OnTabAdded(const content::NotificationSource& source,
352                   const content::NotificationDetails& details) {
353     if (swap_observer_)
354       return true;
355     WebContents* new_tab = content::Details<WebContents>(details).ptr();
356     // Get the TabStripModel. Assume this is attached to a Browser.
357     TabStripModel* tab_strip_model =
358         static_cast<Browser*>(new_tab->GetDelegate())->tab_strip_model();
359     swap_observer_.reset(new NavigationOrSwapObserver(tab_strip_model,
360                                                       new_tab));
361     swap_observer_->set_did_start_loading();
362     return true;
363   }
364
365  private:
366   content::WindowedNotificationObserver new_tab_observer_;
367   scoped_ptr<NavigationOrSwapObserver> swap_observer_;
368 };
369
370 // PrerenderContents that stops the UI message loop on DidStopLoading().
371 class TestPrerenderContents : public PrerenderContents {
372  public:
373   TestPrerenderContents(
374       PrerenderManager* prerender_manager,
375       Profile* profile,
376       const GURL& url,
377       const content::Referrer& referrer,
378       Origin origin,
379       FinalStatus expected_final_status)
380       : PrerenderContents(prerender_manager, profile, url,
381                           referrer, origin, PrerenderManager::kNoExperiment),
382         expected_final_status_(expected_final_status),
383         new_render_view_host_(NULL),
384         was_hidden_(false),
385         was_shown_(false),
386         should_be_shown_(expected_final_status == FINAL_STATUS_USED),
387         skip_final_checks_(false) {
388   }
389
390   virtual ~TestPrerenderContents() {
391     if (skip_final_checks_)
392       return;
393
394     if (expected_final_status_ == FINAL_STATUS_MAX) {
395       EXPECT_EQ(MATCH_COMPLETE_REPLACEMENT, match_complete_status());
396     } else {
397       EXPECT_EQ(expected_final_status_, final_status()) <<
398           " when testing URL " << prerender_url().path() <<
399           " (Expected: " << NameFromFinalStatus(expected_final_status_) <<
400           ", Actual: " << NameFromFinalStatus(final_status()) << ")";
401     }
402     // Prerendering RenderViewHosts should be hidden before the first
403     // navigation, so this should be happen for every PrerenderContents for
404     // which a RenderViewHost is created, regardless of whether or not it's
405     // used.
406     if (new_render_view_host_)
407       EXPECT_TRUE(was_hidden_);
408
409     // A used PrerenderContents will only be destroyed when we swap out
410     // WebContents, at the end of a navigation caused by a call to
411     // NavigateToURLImpl().
412     if (final_status() == FINAL_STATUS_USED)
413       EXPECT_TRUE(new_render_view_host_);
414
415     EXPECT_EQ(should_be_shown_, was_shown_);
416   }
417
418   virtual void RenderProcessGone(base::TerminationStatus status) OVERRIDE {
419     // On quit, it's possible to end up here when render processes are closed
420     // before the PrerenderManager is destroyed.  As a result, it's possible to
421     // get either FINAL_STATUS_APP_TERMINATING or FINAL_STATUS_RENDERER_CRASHED
422     // on quit.
423     //
424     // It's also possible for this to be called after we've been notified of
425     // app termination, but before we've been deleted, which is why the second
426     // check is needed.
427     if (expected_final_status_ == FINAL_STATUS_APP_TERMINATING &&
428         final_status() != expected_final_status_) {
429       expected_final_status_ = FINAL_STATUS_RENDERER_CRASHED;
430     }
431
432     PrerenderContents::RenderProcessGone(status);
433   }
434
435   virtual bool CheckURL(const GURL& url) OVERRIDE {
436     // Prevent FINAL_STATUS_UNSUPPORTED_SCHEME when navigating to about:crash in
437     // the PrerenderRendererCrash test.
438     if (url.spec() != content::kChromeUICrashURL)
439       return PrerenderContents::CheckURL(url);
440     return true;
441   }
442
443   // For tests that open the prerender in a new background tab, the RenderView
444   // will not have been made visible when the PrerenderContents is destroyed
445   // even though it is used.
446   void set_should_be_shown(bool value) { should_be_shown_ = value; }
447
448   // For tests which do not know whether the prerender will be used.
449   void set_skip_final_checks(bool value) { skip_final_checks_ = value; }
450
451   FinalStatus expected_final_status() const { return expected_final_status_; }
452
453  private:
454   virtual void OnRenderViewHostCreated(
455       RenderViewHost* new_render_view_host) OVERRIDE {
456     // Used to make sure the RenderViewHost is hidden and, if used,
457     // subsequently shown.
458     notification_registrar().Add(
459         this,
460         content::NOTIFICATION_RENDER_WIDGET_VISIBILITY_CHANGED,
461         content::Source<RenderWidgetHost>(new_render_view_host));
462
463     new_render_view_host_ = new_render_view_host;
464
465     PrerenderContents::OnRenderViewHostCreated(new_render_view_host);
466   }
467
468   virtual void Observe(int type,
469                        const content::NotificationSource& source,
470                        const content::NotificationDetails& details) OVERRIDE {
471     if (type ==
472         content::NOTIFICATION_RENDER_WIDGET_VISIBILITY_CHANGED) {
473       EXPECT_EQ(new_render_view_host_,
474                 content::Source<RenderWidgetHost>(source).ptr());
475       bool is_visible = *content::Details<bool>(details).ptr();
476
477       if (!is_visible) {
478         was_hidden_ = true;
479       } else if (is_visible && was_hidden_) {
480         // Once hidden, a prerendered RenderViewHost should only be shown after
481         // being removed from the PrerenderContents for display.
482         EXPECT_FALSE(GetRenderViewHost());
483         was_shown_ = true;
484       }
485       return;
486     }
487     PrerenderContents::Observe(type, source, details);
488   }
489
490   FinalStatus expected_final_status_;
491
492   // The RenderViewHost created for the prerender, if any.
493   RenderViewHost* new_render_view_host_;
494   // Set to true when the prerendering RenderWidget is hidden.
495   bool was_hidden_;
496   // Set to true when the prerendering RenderWidget is shown, after having been
497   // hidden.
498   bool was_shown_;
499   // Expected final value of was_shown_.  Defaults to true for
500   // FINAL_STATUS_USED, and false otherwise.
501   bool should_be_shown_;
502   // If true, |expected_final_status_| and other shutdown checks are skipped.
503   bool skip_final_checks_;
504 };
505
506 // A handle to a TestPrerenderContents whose lifetime is under the caller's
507 // control. A PrerenderContents may be destroyed at any point. This allows
508 // tracking the final status, etc.
509 class TestPrerender : public PrerenderContents::Observer,
510                       public base::SupportsWeakPtr<TestPrerender> {
511  public:
512   TestPrerender()
513       : contents_(NULL),
514         number_of_loads_(0),
515         expected_number_of_loads_(0) {
516   }
517   virtual ~TestPrerender() {
518     if (contents_)
519       contents_->RemoveObserver(this);
520   }
521
522   TestPrerenderContents* contents() const { return contents_; }
523   int number_of_loads() const { return number_of_loads_; }
524
525   void WaitForCreate() { create_loop_.Run(); }
526   void WaitForStart() { start_loop_.Run(); }
527   void WaitForStop() { stop_loop_.Run(); }
528
529   // Waits for |number_of_loads()| to be at least |expected_number_of_loads| OR
530   // for the prerender to stop running (just to avoid a timeout if the prerender
531   // dies). Note: this does not assert equality on the number of loads; the
532   // caller must do it instead.
533   void WaitForLoads(int expected_number_of_loads) {
534     DCHECK(!load_waiter_);
535     DCHECK(!expected_number_of_loads_);
536     if (number_of_loads_ < expected_number_of_loads) {
537       load_waiter_.reset(new base::RunLoop);
538       expected_number_of_loads_ = expected_number_of_loads;
539       load_waiter_->Run();
540       load_waiter_.reset();
541       expected_number_of_loads_ = 0;
542     }
543     EXPECT_LE(expected_number_of_loads, number_of_loads_);
544   }
545
546   void OnPrerenderCreated(TestPrerenderContents* contents) {
547     DCHECK(!contents_);
548     contents_ = contents;
549     contents_->AddObserver(this);
550     create_loop_.Quit();
551   }
552
553   // PrerenderContents::Observer implementation:
554   virtual void OnPrerenderStart(PrerenderContents* contents) OVERRIDE {
555     start_loop_.Quit();
556   }
557
558   virtual void OnPrerenderStopLoading(PrerenderContents* contents) OVERRIDE {
559     number_of_loads_++;
560     if (load_waiter_ && number_of_loads_ >= expected_number_of_loads_)
561       load_waiter_->Quit();
562   }
563
564   virtual void OnPrerenderStop(PrerenderContents* contents) OVERRIDE {
565     DCHECK(contents_);
566     contents_ = NULL;
567     stop_loop_.Quit();
568     // If there is a WaitForLoads call and it has yet to see the expected number
569     // of loads, stop the loop so the test fails instead of timing out.
570     if (load_waiter_)
571       load_waiter_->Quit();
572   }
573
574   virtual void OnPrerenderCreatedMatchCompleteReplacement(
575       PrerenderContents* contents, PrerenderContents* replacement) OVERRIDE {
576   }
577
578  private:
579   TestPrerenderContents* contents_;
580   int number_of_loads_;
581
582   int expected_number_of_loads_;
583   scoped_ptr<base::RunLoop> load_waiter_;
584
585   base::RunLoop create_loop_;
586   base::RunLoop start_loop_;
587   base::RunLoop stop_loop_;
588
589   DISALLOW_COPY_AND_ASSIGN(TestPrerender);
590 };
591
592 // PrerenderManager that uses TestPrerenderContents.
593 class TestPrerenderContentsFactory : public PrerenderContents::Factory {
594  public:
595   TestPrerenderContentsFactory() {}
596
597   virtual ~TestPrerenderContentsFactory() {
598     EXPECT_TRUE(expected_contents_queue_.empty());
599   }
600
601   scoped_ptr<TestPrerender> ExpectPrerenderContents(FinalStatus final_status) {
602     scoped_ptr<TestPrerender> handle(new TestPrerender());
603     expected_contents_queue_.push_back(
604         ExpectedContents(final_status, handle->AsWeakPtr()));
605     return handle.Pass();
606   }
607
608   virtual PrerenderContents* CreatePrerenderContents(
609       PrerenderManager* prerender_manager,
610       Profile* profile,
611       const GURL& url,
612       const content::Referrer& referrer,
613       Origin origin,
614       uint8 experiment_id) OVERRIDE {
615     ExpectedContents expected;
616     if (!expected_contents_queue_.empty()) {
617       expected = expected_contents_queue_.front();
618       expected_contents_queue_.pop_front();
619     }
620     VLOG(1) << "Creating prerender contents for " << url.path() <<
621                " with expected final status " << expected.final_status;
622     VLOG(1) << expected_contents_queue_.size() << " left in the queue.";
623     TestPrerenderContents* contents =
624         new TestPrerenderContents(prerender_manager,
625                                   profile, url, referrer, origin,
626                                   expected.final_status);
627     if (expected.handle)
628       expected.handle->OnPrerenderCreated(contents);
629     return contents;
630   }
631
632  private:
633   struct ExpectedContents {
634     ExpectedContents() : final_status(FINAL_STATUS_MAX) { }
635     ExpectedContents(FinalStatus final_status,
636                      const base::WeakPtr<TestPrerender>& handle)
637         : final_status(final_status),
638           handle(handle) {
639     }
640
641     FinalStatus final_status;
642     base::WeakPtr<TestPrerender> handle;
643   };
644
645   std::deque<ExpectedContents> expected_contents_queue_;
646 };
647
648 #if defined(FULL_SAFE_BROWSING)
649 // A SafeBrowsingDatabaseManager implementation that returns a fixed result for
650 // a given URL.
651 class FakeSafeBrowsingDatabaseManager :  public SafeBrowsingDatabaseManager {
652  public:
653   explicit FakeSafeBrowsingDatabaseManager(SafeBrowsingService* service)
654       : SafeBrowsingDatabaseManager(service),
655         threat_type_(SB_THREAT_TYPE_SAFE) { }
656
657   // Called on the IO thread to check if the given url is safe or not.  If we
658   // can synchronously determine that the url is safe, CheckUrl returns true.
659   // Otherwise it returns false, and "client" is called asynchronously with the
660   // result when it is ready.
661   // Returns true, indicating a SAFE result, unless the URL is the fixed URL
662   // specified by the user, and the user-specified result is not SAFE
663   // (in which that result will be communicated back via a call into the
664   // client, and false will be returned).
665   // Overrides SafeBrowsingService::CheckBrowseUrl.
666   virtual bool CheckBrowseUrl(const GURL& gurl, Client* client) OVERRIDE {
667     if (gurl != url_ || threat_type_ == SB_THREAT_TYPE_SAFE)
668       return true;
669
670     BrowserThread::PostTask(
671         BrowserThread::IO, FROM_HERE,
672         base::Bind(&FakeSafeBrowsingDatabaseManager::OnCheckBrowseURLDone,
673                    this, gurl, client));
674     return false;
675   }
676
677   void SetThreatTypeForUrl(const GURL& url, SBThreatType threat_type) {
678     url_ = url;
679     threat_type_ = threat_type;
680   }
681
682  private:
683   virtual ~FakeSafeBrowsingDatabaseManager() {}
684
685   void OnCheckBrowseURLDone(const GURL& gurl, Client* client) {
686     std::vector<SBThreatType> expected_threats;
687     expected_threats.push_back(SB_THREAT_TYPE_URL_MALWARE);
688     expected_threats.push_back(SB_THREAT_TYPE_URL_PHISHING);
689     SafeBrowsingDatabaseManager::SafeBrowsingCheck sb_check(
690         std::vector<GURL>(1, gurl),
691         std::vector<SBFullHash>(),
692         client,
693         safe_browsing_util::MALWARE,
694         expected_threats);
695     sb_check.url_results[0] = threat_type_;
696     client->OnSafeBrowsingResult(sb_check);
697   }
698
699   GURL url_;
700   SBThreatType threat_type_;
701   DISALLOW_COPY_AND_ASSIGN(FakeSafeBrowsingDatabaseManager);
702 };
703
704 class FakeSafeBrowsingService : public SafeBrowsingService {
705  public:
706   FakeSafeBrowsingService() { }
707
708   // Returned pointer has the same lifespan as the database_manager_ refcounted
709   // object.
710   FakeSafeBrowsingDatabaseManager* fake_database_manager() {
711     return fake_database_manager_;
712   }
713
714  protected:
715   virtual ~FakeSafeBrowsingService() { }
716
717   virtual SafeBrowsingDatabaseManager* CreateDatabaseManager() OVERRIDE {
718     fake_database_manager_ = new FakeSafeBrowsingDatabaseManager(this);
719     return fake_database_manager_;
720   }
721
722  private:
723   FakeSafeBrowsingDatabaseManager* fake_database_manager_;
724
725   DISALLOW_COPY_AND_ASSIGN(FakeSafeBrowsingService);
726 };
727
728 // Factory that creates FakeSafeBrowsingService instances.
729 class TestSafeBrowsingServiceFactory : public SafeBrowsingServiceFactory {
730  public:
731   TestSafeBrowsingServiceFactory() :
732       most_recent_service_(NULL) { }
733   virtual ~TestSafeBrowsingServiceFactory() { }
734
735   virtual SafeBrowsingService* CreateSafeBrowsingService() OVERRIDE {
736     most_recent_service_ =  new FakeSafeBrowsingService();
737     return most_recent_service_;
738   }
739
740   FakeSafeBrowsingService* most_recent_service() const {
741     return most_recent_service_;
742   }
743
744  private:
745   FakeSafeBrowsingService* most_recent_service_;
746 };
747 #endif
748
749 class FakeDevToolsClientHost : public DevToolsClientHost {
750  public:
751   FakeDevToolsClientHost() {}
752   virtual ~FakeDevToolsClientHost() {}
753   virtual void InspectedContentsClosing() OVERRIDE {}
754   virtual void DispatchOnInspectorFrontend(const std::string& msg) OVERRIDE {}
755   virtual void ReplacedWithAnotherClient() OVERRIDE {}
756 };
757
758 class RestorePrerenderMode {
759  public:
760   RestorePrerenderMode() : prev_mode_(PrerenderManager::GetMode()) {
761   }
762
763   ~RestorePrerenderMode() { PrerenderManager::SetMode(prev_mode_); }
764  private:
765   PrerenderManager::PrerenderManagerMode prev_mode_;
766 };
767
768 // URLRequestJob (and associated handler) which hangs.
769 class HangingURLRequestJob : public net::URLRequestJob {
770  public:
771   HangingURLRequestJob(net::URLRequest* request,
772                           net::NetworkDelegate* network_delegate)
773       : net::URLRequestJob(request, network_delegate) {
774   }
775
776   virtual void Start() OVERRIDE {}
777
778  private:
779   virtual ~HangingURLRequestJob() {}
780 };
781
782 class HangingFirstRequestInterceptor : public net::URLRequestInterceptor {
783  public:
784   HangingFirstRequestInterceptor(const base::FilePath& file,
785                                  base::Closure callback)
786       : file_(file),
787         callback_(callback),
788         first_run_(true) {
789   }
790   virtual ~HangingFirstRequestInterceptor() {}
791
792   virtual net::URLRequestJob* MaybeInterceptRequest(
793       net::URLRequest* request,
794       net::NetworkDelegate* network_delegate) const OVERRIDE {
795     if (first_run_) {
796       first_run_ = false;
797       if (!callback_.is_null()) {
798         BrowserThread::PostTask(
799             BrowserThread::UI, FROM_HERE, callback_);
800       }
801       return new HangingURLRequestJob(request, network_delegate);
802     }
803     return new content::URLRequestMockHTTPJob(request, network_delegate, file_);
804   }
805
806  private:
807   base::FilePath file_;
808   base::Closure callback_;
809   mutable bool first_run_;
810 };
811
812 // Makes |url| never respond on the first load, and then with the contents of
813 // |file| afterwards. When the first load has been scheduled, runs |callback| on
814 // the UI thread.
815 void CreateHangingFirstRequestInterceptorOnIO(
816     const GURL& url, const base::FilePath& file, base::Closure callback) {
817   CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
818   scoped_ptr<net::URLRequestInterceptor> never_respond_handler(
819       new HangingFirstRequestInterceptor(file, callback));
820   net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
821       url, never_respond_handler.Pass());
822 }
823
824 // Wrapper over URLRequestMockHTTPJob that exposes extra callbacks.
825 class MockHTTPJob : public content::URLRequestMockHTTPJob {
826  public:
827   MockHTTPJob(net::URLRequest* request,
828               net::NetworkDelegate* delegate,
829               const base::FilePath& file)
830       : content::URLRequestMockHTTPJob(request, delegate, file) {
831   }
832
833   void set_start_callback(const base::Closure& start_callback) {
834     start_callback_ = start_callback;
835   }
836
837   virtual void Start() OVERRIDE {
838     if (!start_callback_.is_null())
839       start_callback_.Run();
840     content::URLRequestMockHTTPJob::Start();
841   }
842
843  private:
844   virtual ~MockHTTPJob() {}
845
846   base::Closure start_callback_;
847 };
848
849 // Dummy counter class to live on the UI thread for counting requests.
850 class RequestCounter : public base::SupportsWeakPtr<RequestCounter> {
851  public:
852   RequestCounter() : count_(0), expected_count_(-1) {}
853   int count() const { return count_; }
854
855   void RequestStarted() {
856     count_++;
857     if (loop_ && count_ == expected_count_)
858       loop_->Quit();
859   }
860
861   void WaitForCount(int expected_count) {
862     ASSERT_TRUE(!loop_);
863     ASSERT_EQ(-1, expected_count_);
864     if (count_ < expected_count) {
865       expected_count_ = expected_count;
866       loop_.reset(new base::RunLoop);
867       loop_->Run();
868       expected_count_ = -1;
869       loop_.reset();
870     }
871
872     EXPECT_EQ(expected_count, count_);
873   }
874  private:
875   int count_;
876   int expected_count_;
877   scoped_ptr<base::RunLoop> loop_;
878 };
879
880 // Protocol handler which counts the number of requests that start.
881 class CountingInterceptor : public net::URLRequestInterceptor {
882  public:
883   CountingInterceptor(const base::FilePath& file,
884                       const base::WeakPtr<RequestCounter>& counter)
885       : file_(file),
886         counter_(counter),
887         weak_factory_(this) {
888   }
889   virtual ~CountingInterceptor() {}
890
891   virtual net::URLRequestJob* MaybeInterceptRequest(
892       net::URLRequest* request,
893       net::NetworkDelegate* network_delegate) const OVERRIDE {
894     MockHTTPJob* job = new MockHTTPJob(request, network_delegate, file_);
895     job->set_start_callback(base::Bind(&CountingInterceptor::RequestStarted,
896                                        weak_factory_.GetWeakPtr()));
897     return job;
898   }
899
900   void RequestStarted() {
901     BrowserThread::PostTask(
902         BrowserThread::UI, FROM_HERE,
903         base::Bind(&RequestCounter::RequestStarted, counter_));
904   }
905
906  private:
907   base::FilePath file_;
908   base::WeakPtr<RequestCounter> counter_;
909   mutable base::WeakPtrFactory<CountingInterceptor> weak_factory_;
910 };
911
912 // Makes |url| respond to requests with the contents of |file|, counting the
913 // number that start in |counter|.
914 void CreateCountingInterceptorOnIO(
915     const GURL& url,
916     const base::FilePath& file,
917     const base::WeakPtr<RequestCounter>& counter) {
918   CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
919   scoped_ptr<net::URLRequestInterceptor> request_interceptor(
920       new CountingInterceptor(file, counter));
921   net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
922       url, request_interceptor.Pass());
923 }
924
925 // Makes |url| respond to requests with the contents of |file|.
926 void CreateMockInterceptorOnIO(const GURL& url, const base::FilePath& file) {
927   CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
928   net::URLRequestFilter::GetInstance()->AddUrlInterceptor(
929       url,
930       content::URLRequestMockHTTPJob::CreateInterceptorForSingleFile(file));
931 }
932
933 // A ContentBrowserClient that cancels all prerenderers on OpenURL.
934 class TestContentBrowserClient : public chrome::ChromeContentBrowserClient {
935  public:
936   TestContentBrowserClient() {}
937   virtual ~TestContentBrowserClient() {}
938
939   // chrome::ChromeContentBrowserClient implementation.
940   virtual bool ShouldAllowOpenURL(content::SiteInstance* site_instance,
941                                   const GURL& url) OVERRIDE {
942     PrerenderManagerFactory::GetForProfile(
943         Profile::FromBrowserContext(site_instance->GetBrowserContext()))
944         ->CancelAllPrerenders();
945     return chrome::ChromeContentBrowserClient::ShouldAllowOpenURL(site_instance,
946                                                                   url);
947   }
948
949  private:
950   DISALLOW_COPY_AND_ASSIGN(TestContentBrowserClient);
951 };
952
953 // A ContentBrowserClient that forces cross-process navigations.
954 class SwapProcessesContentBrowserClient
955     : public chrome::ChromeContentBrowserClient {
956  public:
957   SwapProcessesContentBrowserClient() {}
958   virtual ~SwapProcessesContentBrowserClient() {}
959
960   // chrome::ChromeContentBrowserClient implementation.
961   virtual bool ShouldSwapProcessesForRedirect(
962       content::ResourceContext* resource_context,
963       const GURL& current_url,
964       const GURL& new_url) OVERRIDE {
965     return true;
966   }
967
968  private:
969   DISALLOW_COPY_AND_ASSIGN(SwapProcessesContentBrowserClient);
970 };
971
972 // An ExternalProtocolHandler that blocks everything and asserts it never is
973 // called.
974 class NeverRunsExternalProtocolHandlerDelegate
975     : public ExternalProtocolHandler::Delegate {
976  public:
977   // ExternalProtocolHandler::Delegate implementation.
978   virtual ShellIntegration::DefaultProtocolClientWorker* CreateShellWorker(
979       ShellIntegration::DefaultWebClientObserver* observer,
980       const std::string& protocol) OVERRIDE {
981     NOTREACHED();
982     // This will crash, but it shouldn't get this far with BlockState::BLOCK
983     // anyway.
984     return NULL;
985   }
986   virtual ExternalProtocolHandler::BlockState GetBlockState(
987       const std::string& scheme,
988       bool initiated_by_user_gesture) OVERRIDE {
989     // Block everything and fail the test.
990     ADD_FAILURE();
991     return ExternalProtocolHandler::BLOCK;
992   }
993   virtual void BlockRequest() OVERRIDE { }
994   virtual void RunExternalProtocolDialog(const GURL& url,
995                                          int render_process_host_id,
996                                          int routing_id) OVERRIDE {
997     NOTREACHED();
998   }
999   virtual void LaunchUrlWithoutSecurityCheck(const GURL& url) OVERRIDE {
1000     NOTREACHED();
1001   }
1002   virtual void FinishedProcessingCheck() OVERRIDE {
1003     NOTREACHED();
1004   }
1005 };
1006
1007 base::FilePath GetTestPath(const std::string& file_name) {
1008   return ui_test_utils::GetTestFilePath(
1009       base::FilePath(FILE_PATH_LITERAL("prerender")),
1010       base::FilePath().AppendASCII(file_name));
1011 }
1012
1013 }  // namespace
1014
1015 // Many of these tests are flaky. See http://crbug.com/249179
1016 class PrerenderBrowserTest : virtual public InProcessBrowserTest {
1017  public:
1018   PrerenderBrowserTest()
1019       : autostart_test_server_(true),
1020         prerender_contents_factory_(NULL),
1021 #if defined(FULL_SAFE_BROWSING)
1022         safe_browsing_factory_(new TestSafeBrowsingServiceFactory()),
1023 #endif
1024         call_javascript_(true),
1025         check_load_events_(true),
1026         loader_path_("files/prerender/prerender_loader.html"),
1027         explicitly_set_browser_(NULL) {}
1028
1029   virtual ~PrerenderBrowserTest() {}
1030
1031   content::SessionStorageNamespace* GetSessionStorageNamespace() const {
1032     WebContents* web_contents = GetActiveWebContents();
1033     if (!web_contents)
1034       return NULL;
1035     return web_contents->GetController().GetDefaultSessionStorageNamespace();
1036   }
1037
1038   virtual void SetUpInProcessBrowserTestFixture() OVERRIDE {
1039 #if defined(FULL_SAFE_BROWSING)
1040     SafeBrowsingService::RegisterFactory(safe_browsing_factory_.get());
1041 #endif
1042   }
1043
1044   virtual void TearDownInProcessBrowserTestFixture() OVERRIDE {
1045 #if defined(FULL_SAFE_BROWSING)
1046     SafeBrowsingService::RegisterFactory(NULL);
1047 #endif
1048   }
1049
1050   virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE {
1051     command_line->AppendSwitchASCII(switches::kPrerenderMode,
1052                                     switches::kPrerenderModeSwitchValueEnabled);
1053 #if defined(OS_MACOSX)
1054     // The plugins directory isn't read by default on the Mac, so it needs to be
1055     // explicitly registered.
1056     base::FilePath app_dir;
1057     PathService::Get(chrome::DIR_APP, &app_dir);
1058     command_line->AppendSwitchPath(
1059         switches::kExtraPluginDir,
1060         app_dir.Append(FILE_PATH_LITERAL("plugins")));
1061 #endif
1062     command_line->AppendSwitch(switches::kAlwaysAuthorizePlugins);
1063   }
1064
1065   virtual void SetUpOnMainThread() OVERRIDE {
1066     current_browser()->profile()->GetPrefs()->SetBoolean(
1067         prefs::kPromptForDownload, false);
1068     IncreasePrerenderMemory();
1069     if (autostart_test_server_)
1070       ASSERT_TRUE(test_server()->Start());
1071     ChromeResourceDispatcherHostDelegate::
1072         SetExternalProtocolHandlerDelegateForTesting(
1073             &external_protocol_handler_delegate_);
1074
1075     PrerenderManager* prerender_manager = GetPrerenderManager();
1076     ASSERT_TRUE(prerender_manager);
1077     prerender_manager->mutable_config().rate_limit_enabled = false;
1078     ASSERT_TRUE(prerender_contents_factory_ == NULL);
1079     prerender_contents_factory_ = new TestPrerenderContentsFactory;
1080     prerender_manager->SetPrerenderContentsFactory(prerender_contents_factory_);
1081   }
1082
1083   // Convenience function to get the currently active WebContents in
1084   // current_browser().
1085   WebContents* GetActiveWebContents() const {
1086     return current_browser()->tab_strip_model()->GetActiveWebContents();
1087   }
1088
1089   // Overload for a single expected final status
1090   scoped_ptr<TestPrerender> PrerenderTestURL(
1091       const std::string& html_file,
1092       FinalStatus expected_final_status,
1093       int expected_number_of_loads) {
1094     GURL url = test_server()->GetURL(html_file);
1095     return PrerenderTestURL(url,
1096                             expected_final_status,
1097                             expected_number_of_loads);
1098   }
1099
1100   ScopedVector<TestPrerender> PrerenderTestURL(
1101       const std::string& html_file,
1102       const std::vector<FinalStatus>& expected_final_status_queue,
1103       int expected_number_of_loads) {
1104     GURL url = test_server()->GetURL(html_file);
1105     return PrerenderTestURLImpl(url,
1106                                 expected_final_status_queue,
1107                                 expected_number_of_loads);
1108   }
1109
1110   scoped_ptr<TestPrerender> PrerenderTestURL(
1111       const GURL& url,
1112       FinalStatus expected_final_status,
1113       int expected_number_of_loads) {
1114     std::vector<FinalStatus> expected_final_status_queue(
1115         1, expected_final_status);
1116     std::vector<TestPrerender*> prerenders;
1117     PrerenderTestURLImpl(url,
1118                          expected_final_status_queue,
1119                          expected_number_of_loads).release(&prerenders);
1120     CHECK_EQ(1u, prerenders.size());
1121     return scoped_ptr<TestPrerender>(prerenders[0]);
1122   }
1123
1124   // Navigates to a URL, unrelated to prerendering
1125   void NavigateStraightToURL(const std::string dest_html_file) {
1126     ui_test_utils::NavigateToURL(current_browser(),
1127                                  test_server()->GetURL(dest_html_file));
1128   }
1129
1130   void NavigateToDestURL() const {
1131     NavigateToDestURLWithDisposition(CURRENT_TAB, true);
1132   }
1133
1134   // Opens the url in a new tab, with no opener.
1135   void NavigateToDestURLWithDisposition(
1136       WindowOpenDisposition disposition,
1137       bool expect_swap_to_succeed) const {
1138     NavigateToURLWithParams(
1139         content::OpenURLParams(dest_url_, Referrer(), disposition,
1140                                content::PAGE_TRANSITION_TYPED, false),
1141         expect_swap_to_succeed);
1142   }
1143
1144   void NavigateToURL(const std::string& dest_html_file) const {
1145     NavigateToURLWithDisposition(dest_html_file, CURRENT_TAB, true);
1146   }
1147
1148   void NavigateToURLWithDisposition(const std::string& dest_html_file,
1149                                     WindowOpenDisposition disposition,
1150                                     bool expect_swap_to_succeed) const {
1151     GURL dest_url = test_server()->GetURL(dest_html_file);
1152     NavigateToURLWithDisposition(dest_url, disposition, expect_swap_to_succeed);
1153   }
1154
1155   void NavigateToURLWithDisposition(const GURL& dest_url,
1156                                     WindowOpenDisposition disposition,
1157                                     bool expect_swap_to_succeed) const {
1158     NavigateToURLWithParams(
1159         content::OpenURLParams(dest_url, Referrer(), disposition,
1160                                content::PAGE_TRANSITION_TYPED, false),
1161         expect_swap_to_succeed);
1162   }
1163
1164   void NavigateToURLWithParams(const content::OpenURLParams& params,
1165                                bool expect_swap_to_succeed) const {
1166     NavigateToURLImpl(params, expect_swap_to_succeed);
1167   }
1168
1169   void OpenDestURLViaClick() const {
1170     OpenURLViaClick(dest_url_);
1171   }
1172
1173   void OpenURLViaClick(const GURL& url) const {
1174     OpenURLWithJSImpl("Click", url, GURL(), false);
1175   }
1176
1177   void OpenDestURLViaClickTarget() const {
1178     OpenURLWithJSImpl("ClickTarget", dest_url_, GURL(), true);
1179   }
1180
1181   void OpenDestURLViaClickPing(const GURL& ping_url) const {
1182     OpenURLWithJSImpl("ClickPing", dest_url_, ping_url, false);
1183   }
1184
1185   void OpenDestURLViaClickNewWindow() const {
1186     OpenURLWithJSImpl("ShiftClick", dest_url_, GURL(), true);
1187   }
1188
1189   void OpenDestURLViaClickNewForegroundTab() const {
1190 #if defined(OS_MACOSX)
1191     OpenURLWithJSImpl("MetaShiftClick", dest_url_, GURL(), true);
1192 #else
1193     OpenURLWithJSImpl("CtrlShiftClick", dest_url_, GURL(), true);
1194 #endif
1195   }
1196
1197   void OpenDestURLViaClickNewBackgroundTab() const {
1198 #if defined(OS_MACOSX)
1199     OpenURLWithJSImpl("MetaClick", dest_url_, GURL(), true);
1200 #else
1201     OpenURLWithJSImpl("CtrlClick", dest_url_, GURL(), true);
1202 #endif
1203   }
1204
1205   void OpenDestURLViaWindowOpen() const {
1206     OpenURLViaWindowOpen(dest_url_);
1207   }
1208
1209   void OpenURLViaWindowOpen(const GURL& url) const {
1210     OpenURLWithJSImpl("WindowOpen", url, GURL(), true);
1211   }
1212
1213   void RemoveLinkElement(int i) const {
1214     GetActiveWebContents()->GetMainFrame()->ExecuteJavaScript(
1215         base::ASCIIToUTF16(base::StringPrintf("RemoveLinkElement(%d)", i)));
1216   }
1217
1218   void ClickToNextPageAfterPrerender() {
1219     TestNavigationObserver nav_observer(GetActiveWebContents());
1220     RenderFrameHost* render_frame_host = GetActiveWebContents()->GetMainFrame();
1221     render_frame_host->ExecuteJavaScript(base::ASCIIToUTF16("ClickOpenLink()"));
1222     nav_observer.Wait();
1223   }
1224
1225   void NavigateToNextPageAfterPrerender() const {
1226     ui_test_utils::NavigateToURL(
1227         current_browser(),
1228         test_server()->GetURL("files/prerender/prerender_page.html"));
1229   }
1230
1231   // Called after the prerendered page has been navigated to and then away from.
1232   // Navigates back through the history to the prerendered page.
1233   void GoBackToPrerender() {
1234     TestNavigationObserver back_nav_observer(GetActiveWebContents());
1235     chrome::GoBack(current_browser(), CURRENT_TAB);
1236     back_nav_observer.Wait();
1237     bool original_prerender_page = false;
1238     ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
1239         GetActiveWebContents(),
1240         "window.domAutomationController.send(IsOriginalPrerenderPage())",
1241         &original_prerender_page));
1242     EXPECT_TRUE(original_prerender_page);
1243   }
1244
1245   // Goes back to the page that was active before the prerender was swapped
1246   // in. This must be called when the prerendered page is the current page
1247   // in the active tab.
1248   void GoBackToPageBeforePrerender() {
1249     WebContents* tab = GetActiveWebContents();
1250     ASSERT_TRUE(tab);
1251     EXPECT_FALSE(tab->IsLoading());
1252     TestNavigationObserver back_nav_observer(tab);
1253     chrome::GoBack(current_browser(), CURRENT_TAB);
1254     back_nav_observer.Wait();
1255     bool js_result;
1256     ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
1257         tab,
1258         "window.domAutomationController.send(DidBackToOriginalPagePass())",
1259         &js_result));
1260     EXPECT_TRUE(js_result);
1261   }
1262
1263   bool UrlIsInPrerenderManager(const std::string& html_file) const {
1264     return UrlIsInPrerenderManager(test_server()->GetURL(html_file));
1265   }
1266
1267   bool UrlIsInPrerenderManager(const GURL& url) const {
1268     return GetPrerenderManager()->FindPrerenderData(
1269         url, GetSessionStorageNamespace()) != NULL;
1270   }
1271
1272   void UseHttpsSrcServer() {
1273     if (https_src_server_)
1274       return;
1275     https_src_server_.reset(
1276         new net::SpawnedTestServer(
1277             net::SpawnedTestServer::TYPE_HTTPS,
1278             net::SpawnedTestServer::kLocalhost,
1279             base::FilePath(FILE_PATH_LITERAL("chrome/test/data"))));
1280     CHECK(https_src_server_->Start());
1281   }
1282
1283   void DisableJavascriptCalls() {
1284     call_javascript_ = false;
1285   }
1286
1287   void DisableLoadEventCheck() {
1288     check_load_events_ = false;
1289   }
1290
1291   TaskManagerModel* GetModel() const {
1292     return TaskManager::GetInstance()->model();
1293   }
1294
1295   PrerenderManager* GetPrerenderManager() const {
1296     PrerenderManager* prerender_manager =
1297         PrerenderManagerFactory::GetForProfile(current_browser()->profile());
1298     return prerender_manager;
1299   }
1300
1301   const PrerenderLinkManager* GetPrerenderLinkManager() const {
1302     PrerenderLinkManager* prerender_link_manager =
1303         PrerenderLinkManagerFactory::GetForProfile(
1304             current_browser()->profile());
1305     return prerender_link_manager;
1306   }
1307
1308   int GetPrerenderEventCount(int index, const std::string& type) const {
1309     int event_count;
1310     std::string expression = base::StringPrintf(
1311         "window.domAutomationController.send("
1312         "    GetPrerenderEventCount(%d, '%s'))", index, type.c_str());
1313
1314     CHECK(content::ExecuteScriptAndExtractInt(
1315         GetActiveWebContents(), expression, &event_count));
1316     return event_count;
1317   }
1318
1319   bool DidReceivePrerenderStartEventForLinkNumber(int index) const {
1320     return GetPrerenderEventCount(index, "webkitprerenderstart") > 0;
1321   }
1322
1323   int GetPrerenderLoadEventCountForLinkNumber(int index) const {
1324     return GetPrerenderEventCount(index, "webkitprerenderload");
1325   }
1326
1327   int GetPrerenderDomContentLoadedEventCountForLinkNumber(int index) const {
1328     return GetPrerenderEventCount(index, "webkitprerenderdomcontentloaded");
1329   }
1330
1331   bool DidReceivePrerenderStopEventForLinkNumber(int index) const {
1332     return GetPrerenderEventCount(index, "webkitprerenderstop") > 0;
1333   }
1334
1335   void WaitForPrerenderEventCount(int index,
1336                                   const std::string& type,
1337                                   int count) const {
1338     int dummy;
1339     std::string expression = base::StringPrintf(
1340         "WaitForPrerenderEventCount(%d, '%s', %d,"
1341         "    window.domAutomationController.send.bind("
1342         "        window.domAutomationController, 0))",
1343         index, type.c_str(), count);
1344
1345     CHECK(content::ExecuteScriptAndExtractInt(
1346         GetActiveWebContents(), expression, &dummy));
1347     CHECK_EQ(0, dummy);
1348   }
1349
1350   bool HadPrerenderEventErrors() const {
1351     bool had_prerender_event_errors;
1352     CHECK(content::ExecuteScriptAndExtractBool(
1353         GetActiveWebContents(),
1354         "window.domAutomationController.send(Boolean("
1355         "    hadPrerenderEventErrors))",
1356         &had_prerender_event_errors));
1357     return had_prerender_event_errors;
1358   }
1359
1360   // Asserting on this can result in flaky tests.  PrerenderHandles are
1361   // removed from the PrerenderLinkManager when the prerender is canceled from
1362   // the browser, when the prerenders are cancelled from the renderer process,
1363   // or the channel for the renderer process is closed on the IO thread.  In the
1364   // last case, the code must be careful to wait for the channel to close, as it
1365   // is done asynchronously after swapping out the old process.  See
1366   // ChannelDestructionWatcher.
1367   bool IsEmptyPrerenderLinkManager() const {
1368     return GetPrerenderLinkManager()->IsEmpty();
1369   }
1370
1371   size_t GetLinkPrerenderCount() const {
1372     return GetPrerenderLinkManager()->prerenders_.size();
1373   }
1374
1375   size_t GetRunningLinkPrerenderCount() const {
1376     return GetPrerenderLinkManager()->CountRunningPrerenders();
1377   }
1378
1379   // Returns length of |prerender_manager_|'s history, or -1 on failure.
1380   int GetHistoryLength() const {
1381     scoped_ptr<base::DictionaryValue> prerender_dict(
1382         static_cast<base::DictionaryValue*>(
1383             GetPrerenderManager()->GetAsValue()));
1384     if (!prerender_dict.get())
1385       return -1;
1386     base::ListValue* history_list;
1387     if (!prerender_dict->GetList("history", &history_list))
1388       return -1;
1389     return static_cast<int>(history_list->GetSize());
1390   }
1391
1392 #if defined(FULL_SAFE_BROWSING)
1393   FakeSafeBrowsingDatabaseManager* GetFakeSafeBrowsingDatabaseManager() {
1394     return safe_browsing_factory_->most_recent_service()->
1395         fake_database_manager();
1396   }
1397 #endif
1398
1399   TestPrerenderContents* GetPrerenderContentsFor(const GURL& url) const {
1400     PrerenderManager::PrerenderData* prerender_data =
1401         GetPrerenderManager()->FindPrerenderData(url, NULL);
1402     return static_cast<TestPrerenderContents*>(
1403         prerender_data ? prerender_data->contents() : NULL);
1404   }
1405
1406   void SetLoaderHostOverride(const std::string& host) {
1407     loader_host_override_ = host;
1408     host_resolver()->AddRule(host, "127.0.0.1");
1409   }
1410
1411   void set_loader_path(const std::string& path) {
1412     loader_path_ = path;
1413   }
1414
1415   void set_loader_query(const std::string& query) {
1416     loader_query_ = query;
1417   }
1418
1419   GURL GetCrossDomainTestUrl(const std::string& path) {
1420     static const std::string secondary_domain = "www.foo.com";
1421     host_resolver()->AddRule(secondary_domain, "127.0.0.1");
1422     std::string url_str(base::StringPrintf(
1423         "http://%s:%d/%s",
1424         secondary_domain.c_str(),
1425         test_server()->host_port_pair().port(),
1426         path.c_str()));
1427     return GURL(url_str);
1428   }
1429
1430   void set_browser(Browser* browser) {
1431     explicitly_set_browser_ = browser;
1432   }
1433
1434   Browser* current_browser() const {
1435     return explicitly_set_browser_ ? explicitly_set_browser_ : browser();
1436   }
1437
1438   const GURL& dest_url() const {
1439     return dest_url_;
1440   }
1441
1442   void IncreasePrerenderMemory() {
1443     // Increase the memory allowed in a prerendered page above normal settings.
1444     // Debug build bots occasionally run against the default limit, and tests
1445     // were failing because the prerender was canceled due to memory exhaustion.
1446     // http://crbug.com/93076
1447     GetPrerenderManager()->mutable_config().max_bytes = 1000 * 1024 * 1024;
1448   }
1449
1450   bool DidPrerenderPass(WebContents* web_contents) const {
1451     bool prerender_test_result = false;
1452     if (!content::ExecuteScriptAndExtractBool(
1453             web_contents,
1454             "window.domAutomationController.send(DidPrerenderPass())",
1455             &prerender_test_result))
1456       return false;
1457     return prerender_test_result;
1458   }
1459
1460   bool DidDisplayPass(WebContents* web_contents) const {
1461     bool display_test_result = false;
1462     if (!content::ExecuteScriptAndExtractBool(
1463             web_contents,
1464             "window.domAutomationController.send(DidDisplayPass())",
1465             &display_test_result))
1466       return false;
1467     return display_test_result;
1468   }
1469
1470   scoped_ptr<TestPrerender> ExpectPrerender(FinalStatus expected_final_status) {
1471     return prerender_contents_factory_->ExpectPrerenderContents(
1472         expected_final_status);
1473   }
1474
1475   void AddPrerender(const GURL& url, int index) {
1476     std::string javascript = base::StringPrintf(
1477         "AddPrerender('%s', %d)", url.spec().c_str(), index);
1478     RenderFrameHost* render_frame_host = GetActiveWebContents()->GetMainFrame();
1479     render_frame_host->ExecuteJavaScript(base::ASCIIToUTF16(javascript));
1480   }
1481
1482   // Returns a string for pattern-matching TaskManager tab entries.
1483   base::string16 MatchTaskManagerTab(const char* page_title) {
1484     return l10n_util::GetStringFUTF16(IDS_TASK_MANAGER_TAB_PREFIX,
1485                                       base::ASCIIToUTF16(page_title));
1486   }
1487
1488   // Returns a string for pattern-matching TaskManager prerender entries.
1489   base::string16 MatchTaskManagerPrerender(const char* page_title) {
1490     return l10n_util::GetStringFUTF16(IDS_TASK_MANAGER_PRERENDER_PREFIX,
1491                                       base::ASCIIToUTF16(page_title));
1492   }
1493
1494   void RunJSReturningString(const char* js, std::string* result) {
1495     ASSERT_TRUE(
1496         content::ExecuteScriptAndExtractString(
1497             GetActiveWebContents(),
1498             base::StringPrintf("window.domAutomationController.send(%s)",
1499                                js).c_str(),
1500             result));
1501   }
1502
1503   void RunJS(const char* js) {
1504     ASSERT_TRUE(content::ExecuteScript(
1505         GetActiveWebContents(),
1506         base::StringPrintf("window.domAutomationController.send(%s)",
1507                            js).c_str()));
1508   }
1509
1510  protected:
1511   bool autostart_test_server_;
1512
1513  private:
1514   // TODO(davidben): Remove this altogether so the tests don't globally assume
1515   // only one prerender.
1516   TestPrerenderContents* GetPrerenderContents() const {
1517     return GetPrerenderContentsFor(dest_url_);
1518   }
1519
1520   ScopedVector<TestPrerender> PrerenderTestURLImpl(
1521       const GURL& prerender_url,
1522       const std::vector<FinalStatus>& expected_final_status_queue,
1523       int expected_number_of_loads) {
1524     dest_url_ = prerender_url;
1525
1526     std::vector<net::SpawnedTestServer::StringPair> replacement_text;
1527     replacement_text.push_back(
1528         make_pair("REPLACE_WITH_PRERENDER_URL", prerender_url.spec()));
1529     std::string replacement_path;
1530     CHECK(net::SpawnedTestServer::GetFilePathWithReplacements(
1531         loader_path_,
1532         replacement_text,
1533         &replacement_path));
1534
1535     const net::SpawnedTestServer* src_server = test_server();
1536     if (https_src_server_)
1537       src_server = https_src_server_.get();
1538     GURL loader_url = src_server->GetURL(
1539         replacement_path + "&" + loader_query_);
1540
1541     GURL::Replacements loader_replacements;
1542     if (!loader_host_override_.empty())
1543       loader_replacements.SetHostStr(loader_host_override_);
1544     loader_url = loader_url.ReplaceComponents(loader_replacements);
1545
1546     VLOG(1) << "Running test with queue length " <<
1547                expected_final_status_queue.size();
1548     CHECK(!expected_final_status_queue.empty());
1549     ScopedVector<TestPrerender> prerenders;
1550     for (size_t i = 0; i < expected_final_status_queue.size(); i++) {
1551       prerenders.push_back(
1552           prerender_contents_factory_->ExpectPrerenderContents(
1553               expected_final_status_queue[i]).release());
1554     }
1555
1556     FinalStatus expected_final_status = expected_final_status_queue.front();
1557
1558     // Navigate to the loader URL and then wait for the first prerender to be
1559     // created.
1560     ui_test_utils::NavigateToURL(current_browser(), loader_url);
1561     prerenders[0]->WaitForCreate();
1562     prerenders[0]->WaitForLoads(expected_number_of_loads);
1563
1564     if (ShouldAbortPrerenderBeforeSwap(expected_final_status)) {
1565       // The prerender will abort on its own. Assert it does so correctly.
1566       prerenders[0]->WaitForStop();
1567       EXPECT_FALSE(prerenders[0]->contents());
1568       EXPECT_TRUE(DidReceivePrerenderStopEventForLinkNumber(0));
1569     } else {
1570       // Otherwise, check that it prerendered correctly.
1571       TestPrerenderContents* prerender_contents = prerenders[0]->contents();
1572
1573       CHECK_NE(static_cast<PrerenderContents*>(NULL), prerender_contents);
1574       EXPECT_EQ(FINAL_STATUS_MAX, prerender_contents->final_status());
1575       EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1576
1577       if (call_javascript_) {
1578         // Check if page behaves as expected while in prerendered state.
1579         EXPECT_TRUE(DidPrerenderPass(prerender_contents->prerender_contents()));
1580       }
1581     }
1582
1583     // Test that the referring page received the right start and load events.
1584     EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1585     if (check_load_events_) {
1586       EXPECT_EQ(expected_number_of_loads, prerenders[0]->number_of_loads());
1587       EXPECT_EQ(expected_number_of_loads,
1588                 GetPrerenderLoadEventCountForLinkNumber(0));
1589     }
1590     EXPECT_FALSE(HadPrerenderEventErrors());
1591
1592     return prerenders.Pass();
1593   }
1594
1595   void NavigateToURLImpl(const content::OpenURLParams& params,
1596                          bool expect_swap_to_succeed) const {
1597     ASSERT_NE(static_cast<PrerenderManager*>(NULL), GetPrerenderManager());
1598     // Make sure in navigating we have a URL to use in the PrerenderManager.
1599     ASSERT_NE(static_cast<PrerenderContents*>(NULL), GetPrerenderContents());
1600
1601     WebContents* web_contents = GetPrerenderContents()->prerender_contents();
1602
1603     // Navigate and wait for either the load to finish normally or for a swap to
1604     // occur.
1605     // TODO(davidben): The only handles CURRENT_TAB navigations, which is the
1606     // only case tested or prerendered right now.
1607     CHECK_EQ(CURRENT_TAB, params.disposition);
1608     NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
1609                                            GetActiveWebContents());
1610     WebContents* target_web_contents = current_browser()->OpenURL(params);
1611     swap_observer.Wait();
1612
1613     if (web_contents && expect_swap_to_succeed) {
1614       EXPECT_EQ(web_contents, target_web_contents);
1615       if (call_javascript_)
1616         EXPECT_TRUE(DidDisplayPass(web_contents));
1617     }
1618   }
1619
1620   // Opens the prerendered page using javascript functions in the loader
1621   // page. |javascript_function_name| should be a 0 argument function which is
1622   // invoked. |new_web_contents| is true if the navigation is expected to
1623   // happen in a new WebContents via OpenURL.
1624   void OpenURLWithJSImpl(const std::string& javascript_function_name,
1625                          const GURL& url,
1626                          const GURL& ping_url,
1627                          bool new_web_contents) const {
1628     WebContents* web_contents = GetActiveWebContents();
1629     RenderFrameHost* render_frame_host = web_contents->GetMainFrame();
1630     // Extra arguments in JS are ignored.
1631     std::string javascript = base::StringPrintf(
1632         "%s('%s', '%s')", javascript_function_name.c_str(),
1633         url.spec().c_str(), ping_url.spec().c_str());
1634
1635     if (new_web_contents) {
1636       NewTabNavigationOrSwapObserver observer;
1637       render_frame_host->ExecuteJavaScript(base::ASCIIToUTF16(javascript));
1638       observer.Wait();
1639     } else {
1640       NavigationOrSwapObserver observer(current_browser()->tab_strip_model(),
1641                                         web_contents);
1642       render_frame_host->ExecuteJavaScript(base::ASCIIToUTF16(javascript));
1643       observer.Wait();
1644     }
1645   }
1646
1647   TestPrerenderContentsFactory* prerender_contents_factory_;
1648 #if defined(FULL_SAFE_BROWSING)
1649   scoped_ptr<TestSafeBrowsingServiceFactory> safe_browsing_factory_;
1650 #endif
1651   NeverRunsExternalProtocolHandlerDelegate external_protocol_handler_delegate_;
1652   GURL dest_url_;
1653   scoped_ptr<net::SpawnedTestServer> https_src_server_;
1654   bool call_javascript_;
1655   bool check_load_events_;
1656   std::string loader_host_override_;
1657   std::string loader_path_;
1658   std::string loader_query_;
1659   Browser* explicitly_set_browser_;
1660 };
1661
1662 // Checks that a page is correctly prerendered in the case of a
1663 // <link rel=prerender> tag and then loaded into a tab in response to a
1664 // navigation.
1665 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPage) {
1666   UMAHistogramHelper histograms;
1667
1668   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
1669   EXPECT_EQ(1, GetPrerenderDomContentLoadedEventCountForLinkNumber(0));
1670   histograms.Fetch();
1671   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
1672   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
1673   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
1674   histograms.ExpectTotalCount("Prerender.websame_PrerenderNotSwappedInPLT", 1);
1675
1676   ChannelDestructionWatcher channel_close_watcher;
1677   channel_close_watcher.WatchChannel(
1678       GetActiveWebContents()->GetRenderProcessHost());
1679   NavigateToDestURL();
1680   channel_close_watcher.WaitForChannelClose();
1681
1682   histograms.Fetch();
1683   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
1684   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLTMatched", 1);
1685   histograms.ExpectTotalCount(
1686       "Prerender.websame_PerceivedPLTMatchedComplete", 1);
1687
1688   ASSERT_TRUE(IsEmptyPrerenderLinkManager());
1689 }
1690
1691 // Checks that cross-domain prerenders emit the correct histograms.
1692 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageCrossDomain) {
1693   UMAHistogramHelper histograms;
1694
1695   PrerenderTestURL(GetCrossDomainTestUrl("files/prerender/prerender_page.html"),
1696                    FINAL_STATUS_USED, 1);
1697   histograms.Fetch();
1698   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
1699   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
1700   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
1701   histograms.ExpectTotalCount("Prerender.webcross_PrerenderNotSwappedInPLT", 1);
1702
1703   NavigateToDestURL();
1704   histograms.Fetch();
1705   histograms.ExpectTotalCount("Prerender.webcross_PerceivedPLT", 1);
1706   histograms.ExpectTotalCount("Prerender.webcross_PerceivedPLTMatched", 1);
1707   histograms.ExpectTotalCount(
1708       "Prerender.webcross_PerceivedPLTMatchedComplete", 1);
1709 }
1710
1711 // Checks that pending prerenders launch and receive proper event treatment.
1712 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPagePending) {
1713   scoped_ptr<TestPrerender> prerender =
1714       PrerenderTestURL("files/prerender/prerender_page_pending.html",
1715                        FINAL_STATUS_USED, 1);
1716
1717   // Navigate to the prerender.
1718   scoped_ptr<TestPrerender> prerender2 = ExpectPrerender(FINAL_STATUS_USED);
1719   NavigateToDestURL();
1720   // Abort early if the original prerender didn't swap, so as not to hang.
1721   ASSERT_FALSE(prerender->contents());
1722
1723   // Wait for the new prerender to be ready.
1724   prerender2->WaitForStart();
1725   prerender2->WaitForLoads(1);
1726
1727   const GURL prerender_page_url =
1728       test_server()->GetURL("files/prerender/prerender_page.html");
1729   EXPECT_FALSE(IsEmptyPrerenderLinkManager());
1730   EXPECT_NE(static_cast<TestPrerenderContents*>(NULL),
1731             GetPrerenderContentsFor(prerender_page_url));
1732
1733   // Now navigate to our target page.
1734   NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
1735                                          GetActiveWebContents());
1736   ui_test_utils::NavigateToURLWithDisposition(
1737       current_browser(), prerender_page_url, CURRENT_TAB,
1738       ui_test_utils::BROWSER_TEST_NONE);
1739   swap_observer.Wait();
1740
1741   EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1742 }
1743
1744 // Checks that pending prerenders which are canceled before they are launched
1745 // never get started.
1746 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageRemovesPending) {
1747   PrerenderTestURL("files/prerender/prerender_page_removes_pending.html",
1748                    FINAL_STATUS_USED, 1);
1749
1750   ChannelDestructionWatcher channel_close_watcher;
1751   channel_close_watcher.WatchChannel(
1752       GetActiveWebContents()->GetRenderProcessHost());
1753   NavigateToDestURL();
1754   channel_close_watcher.WaitForChannelClose();
1755
1756   EXPECT_FALSE(DidReceivePrerenderStartEventForLinkNumber(1));
1757   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1758   EXPECT_FALSE(HadPrerenderEventErrors());
1759   // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1760   // calls did a thread/process hop to the renderer which insured pending
1761   // renderer events have arrived.
1762   ASSERT_TRUE(IsEmptyPrerenderLinkManager());
1763 }
1764
1765 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageRemovingLink) {
1766   scoped_ptr<TestPrerender> prerender =
1767       PrerenderTestURL("files/prerender/prerender_page.html",
1768                        FINAL_STATUS_CANCELLED, 1);
1769
1770   // No ChannelDestructionWatcher is needed here, since prerenders in the
1771   // PrerenderLinkManager should be deleted by removing the links, rather than
1772   // shutting down the renderer process.
1773   RemoveLinkElement(0);
1774   prerender->WaitForStop();
1775
1776   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1777   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1778   EXPECT_FALSE(HadPrerenderEventErrors());
1779   // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1780   // calls did a thread/process hop to the renderer which insured pending
1781   // renderer events have arrived.
1782   EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1783 }
1784
1785 IN_PROC_BROWSER_TEST_F(
1786     PrerenderBrowserTest, PrerenderPageRemovingLinkWithTwoLinks) {
1787   GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
1788   GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
1789
1790   set_loader_query("links_to_insert=2");
1791   scoped_ptr<TestPrerender> prerender =
1792       PrerenderTestURL("files/prerender/prerender_page.html",
1793                        FINAL_STATUS_CANCELLED, 1);
1794   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1795   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1796   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1797   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1798
1799   RemoveLinkElement(0);
1800   RemoveLinkElement(1);
1801   prerender->WaitForStop();
1802
1803   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1804   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1805   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1806   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1807   EXPECT_FALSE(HadPrerenderEventErrors());
1808   // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1809   // calls did a thread/process hop to the renderer which insured pending
1810   // renderer events have arrived.
1811   EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1812 }
1813
1814 IN_PROC_BROWSER_TEST_F(
1815     PrerenderBrowserTest, PrerenderPageRemovingLinkWithTwoLinksOneLate) {
1816   GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
1817   GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
1818
1819   GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
1820   scoped_ptr<TestPrerender> prerender =
1821       PrerenderTestURL(url, FINAL_STATUS_CANCELLED, 1);
1822
1823   // Add a second prerender for the same link. It reuses the prerender, so only
1824   // the start event fires here.
1825   AddPrerender(url, 1);
1826   WaitForPrerenderEventCount(1, "webkitprerenderstart", 1);
1827   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1828   EXPECT_EQ(0, GetPrerenderLoadEventCountForLinkNumber(1));
1829   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1830
1831   RemoveLinkElement(0);
1832   RemoveLinkElement(1);
1833   prerender->WaitForStop();
1834
1835   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1836   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1837   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1838   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1839   EXPECT_FALSE(HadPrerenderEventErrors());
1840   // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1841   // calls did a thread/process hop to the renderer which insured pending
1842   // renderer events have arrived.
1843   EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1844 }
1845
1846 IN_PROC_BROWSER_TEST_F(
1847     PrerenderBrowserTest,
1848     PrerenderPageRemovingLinkWithTwoLinksRemovingOne) {
1849   GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
1850   GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
1851   set_loader_query("links_to_insert=2");
1852   PrerenderTestURL("files/prerender/prerender_page.html",
1853                    FINAL_STATUS_USED, 1);
1854   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1855   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1856   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1857   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1858
1859   RemoveLinkElement(0);
1860   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
1861   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(0));
1862   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(1));
1863   EXPECT_FALSE(DidReceivePrerenderStopEventForLinkNumber(1));
1864   EXPECT_FALSE(HadPrerenderEventErrors());
1865   // IsEmptyPrerenderLinkManager() is not racy because the earlier DidReceive*
1866   // calls did a thread/process hop to the renderer which insured pending
1867   // renderer events have arrived.
1868   EXPECT_FALSE(IsEmptyPrerenderLinkManager());
1869
1870   ChannelDestructionWatcher channel_close_watcher;
1871   channel_close_watcher.WatchChannel(
1872       GetActiveWebContents()->GetRenderProcessHost());
1873   NavigateToDestURL();
1874   channel_close_watcher.WaitForChannelClose();
1875
1876   EXPECT_TRUE(IsEmptyPrerenderLinkManager());
1877 }
1878
1879 // Checks that the visibility API works.
1880 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderVisibility) {
1881   PrerenderTestURL("files/prerender/prerender_visibility.html",
1882                    FINAL_STATUS_USED,
1883                    1);
1884   NavigateToDestURL();
1885 }
1886
1887 // Checks that the prerendering of a page is canceled correctly if we try to
1888 // swap it in before it commits.
1889 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNoCommitNoSwap) {
1890   // Navigate to a page that triggers a prerender for a URL that never commits.
1891   const GURL kNoCommitUrl("http://never-respond.example.com");
1892   base::FilePath file(GetTestPath("prerender_page.html"));
1893
1894   base::RunLoop prerender_start_loop;
1895   BrowserThread::PostTask(
1896       BrowserThread::IO, FROM_HERE,
1897       base::Bind(&CreateHangingFirstRequestInterceptorOnIO, kNoCommitUrl, file,
1898                  prerender_start_loop.QuitClosure()));
1899   DisableJavascriptCalls();
1900   PrerenderTestURL(kNoCommitUrl,
1901                    FINAL_STATUS_NAVIGATION_UNCOMMITTED,
1902                    0);
1903   // Wait for the hanging request to be scheduled.
1904   prerender_start_loop.Run();
1905
1906   // Navigate to the URL, but assume the contents won't be swapped in.
1907   NavigateToDestURLWithDisposition(CURRENT_TAB, false);
1908 }
1909
1910 // Checks that client redirects don't add alias URLs until after they commit.
1911 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNoCommitNoSwap2) {
1912   // Navigate to a page that then navigates to a URL that never commits.
1913   const GURL kNoCommitUrl("http://never-respond.example.com");
1914   base::FilePath file(GetTestPath("prerender_page.html"));
1915
1916   base::RunLoop prerender_start_loop;
1917   BrowserThread::PostTask(
1918       BrowserThread::IO, FROM_HERE,
1919       base::Bind(&CreateHangingFirstRequestInterceptorOnIO, kNoCommitUrl, file,
1920                  prerender_start_loop.QuitClosure()));
1921   DisableJavascriptCalls();
1922   PrerenderTestURL(CreateClientRedirect(kNoCommitUrl.spec()),
1923                    FINAL_STATUS_APP_TERMINATING, 1);
1924   // Wait for the hanging request to be scheduled.
1925   prerender_start_loop.Run();
1926
1927   // Navigating to the second URL should not swap.
1928   NavigateToURLWithDisposition(kNoCommitUrl, CURRENT_TAB, false);
1929 }
1930
1931 // Checks that the prerendering of a page is canceled correctly when a
1932 // Javascript alert is called.
1933 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderAlertBeforeOnload) {
1934   PrerenderTestURL("files/prerender/prerender_alert_before_onload.html",
1935                    FINAL_STATUS_JAVASCRIPT_ALERT,
1936                    0);
1937 }
1938
1939 // Checks that the prerendering of a page is canceled correctly when a
1940 // Javascript alert is called.
1941 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderAlertAfterOnload) {
1942   PrerenderTestURL("files/prerender/prerender_alert_after_onload.html",
1943                    FINAL_STATUS_JAVASCRIPT_ALERT,
1944                    1);
1945 }
1946
1947 // Checks that plugins are not loaded while a page is being preloaded, but
1948 // are loaded when the page is displayed.
1949 #if defined(USE_AURA) && !defined(OS_WIN)
1950 // http://crbug.com/103496
1951 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
1952 #elif defined(OS_MACOSX)
1953 // http://crbug.com/100514
1954 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
1955 #elif defined(OS_WIN) && defined(ARCH_CPU_X86_64)
1956 // TODO(jschuh): Failing plugin tests. crbug.com/244653
1957 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
1958 #elif defined(OS_LINUX)
1959 // http://crbug.com/306715
1960 #define MAYBE_PrerenderDelayLoadPlugin DISABLED_PrerenderDelayLoadPlugin
1961 #else
1962 #define MAYBE_PrerenderDelayLoadPlugin PrerenderDelayLoadPlugin
1963 #endif
1964 // http://crbug.com/306715
1965 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, MAYBE_PrerenderDelayLoadPlugin) {
1966   PrerenderTestURL("files/prerender/plugin_delay_load.html",
1967                    FINAL_STATUS_USED,
1968                    1);
1969   NavigateToDestURL();
1970 }
1971
1972 // Checks that plugins are not loaded on prerendering pages when click-to-play
1973 // is enabled.
1974 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickToPlay) {
1975   // Enable click-to-play.
1976   HostContentSettingsMap* content_settings_map =
1977       current_browser()->profile()->GetHostContentSettingsMap();
1978   content_settings_map->SetDefaultContentSetting(
1979       CONTENT_SETTINGS_TYPE_PLUGINS, CONTENT_SETTING_ASK);
1980
1981   PrerenderTestURL("files/prerender/prerender_plugin_click_to_play.html",
1982                    FINAL_STATUS_USED,
1983                    1);
1984   NavigateToDestURL();
1985 }
1986
1987 // Checks that we don't load a NaCl plugin when NaCl is disabled.
1988 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNaClPluginDisabled) {
1989   PrerenderTestURL("files/prerender/prerender_plugin_nacl_disabled.html",
1990                    FINAL_STATUS_USED,
1991                    1);
1992   NavigateToDestURL();
1993
1994
1995   // Run this check again.  When we try to load aa ppapi plugin, the
1996   // "loadstart" event is asynchronously posted to a message loop.
1997   // It's possible that earlier call could have been run before the
1998   // the "loadstart" event was posted.
1999   // TODO(mmenke):  While this should reliably fail on regressions, the
2000   //                reliability depends on the specifics of ppapi plugin
2001   //                loading.  It would be great if we could avoid that.
2002   EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2003 }
2004
2005 // Checks that plugins in an iframe are not loaded while a page is
2006 // being preloaded, but are loaded when the page is displayed.
2007 #if defined(USE_AURA) && !defined(OS_WIN)
2008 // http://crbug.com/103496
2009 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2010         DISABLED_PrerenderIframeDelayLoadPlugin
2011 #elif defined(OS_MACOSX)
2012 // http://crbug.com/100514
2013 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2014         DISABLED_PrerenderIframeDelayLoadPlugin
2015 #elif defined(OS_WIN) && defined(ARCH_CPU_X86_64)
2016 // TODO(jschuh): Failing plugin tests. crbug.com/244653
2017 #define MAYBE_PrerenderIframeDelayLoadPlugin \
2018         DISABLED_PrerenderIframeDelayLoadPlugin
2019 #else
2020 #define MAYBE_PrerenderIframeDelayLoadPlugin PrerenderIframeDelayLoadPlugin
2021 #endif
2022 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2023                        MAYBE_PrerenderIframeDelayLoadPlugin) {
2024   PrerenderTestURL("files/prerender/prerender_iframe_plugin_delay_load.html",
2025                    FINAL_STATUS_USED,
2026                    1);
2027   NavigateToDestURL();
2028 }
2029
2030 // Renders a page that contains a prerender link to a page that contains an
2031 // iframe with a source that requires http authentication. This should not
2032 // prerender successfully.
2033 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHttpAuthentication) {
2034   PrerenderTestURL("files/prerender/prerender_http_auth_container.html",
2035                    FINAL_STATUS_AUTH_NEEDED,
2036                    0);
2037 }
2038
2039 // Checks that client-issued redirects work with prerendering.
2040 // This version navigates to the page which issues the redirection, rather
2041 // than the final destination page.
2042 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2043                        PrerenderClientRedirectNavigateToFirst) {
2044   PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
2045                    FINAL_STATUS_USED,
2046                    2);
2047   NavigateToDestURL();
2048 }
2049
2050 // Checks that client-issued redirects work with prerendering.
2051 // This version navigates to the final destination page, rather than the
2052 // page which does the redirection.
2053 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2054                        PrerenderClientRedirectNavigateToSecond) {
2055   PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
2056                    FINAL_STATUS_USED,
2057                    2);
2058   NavigateToURL("files/prerender/prerender_page.html");
2059 }
2060
2061 // Checks that redirects with location.replace do not cancel a prerender and
2062 // and swap when navigating to the first page.
2063 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2064                        PrerenderLocationReplaceNavigateToFirst) {
2065   PrerenderTestURL("files/prerender/prerender_location_replace.html",
2066                    FINAL_STATUS_USED,
2067                    2);
2068   NavigateToDestURL();
2069 }
2070
2071 // Checks that redirects with location.replace do not cancel a prerender and
2072 // and swap when navigating to the second.
2073 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2074                        PrerenderLocationReplaceNavigateToSecond) {
2075   PrerenderTestURL("files/prerender/prerender_location_replace.html",
2076                    FINAL_STATUS_USED,
2077                    2);
2078   NavigateToURL("files/prerender/prerender_page.html");
2079 }
2080
2081 // Checks that we get the right PPLT histograms for client redirect prerenders
2082 // and navigations when the referring page is Google.
2083 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2084                        PrerenderLocationReplaceGWSHistograms) {
2085   DisableJavascriptCalls();
2086   UMAHistogramHelper histograms;
2087
2088   // The loader page should look like Google.
2089   const std::string kGoogleDotCom("www.google.com");
2090   SetLoaderHostOverride(kGoogleDotCom);
2091   set_loader_path("files/prerender/prerender_loader_with_replace_state.html");
2092
2093   GURL dest_url = GetCrossDomainTestUrl(
2094       "files/prerender/prerender_deferred_image.html");
2095
2096   GURL prerender_url = test_server()->GetURL(
2097       "files/prerender/prerender_location_replace.html?" +
2098       net::EscapeQueryParamValue(dest_url.spec(), false) +
2099       "#prerender");
2100   GURL::Replacements replacements;
2101   replacements.SetHostStr(kGoogleDotCom);
2102   prerender_url = prerender_url.ReplaceComponents(replacements);
2103
2104   // The prerender will not completely load until after the swap, so wait for a
2105   // title change before calling DidPrerenderPass.
2106   scoped_ptr<TestPrerender> prerender =
2107       PrerenderTestURL(prerender_url, FINAL_STATUS_USED, 1);
2108   WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
2109   EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
2110   EXPECT_EQ(1, prerender->number_of_loads());
2111
2112   histograms.Fetch();
2113   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
2114   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
2115   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
2116   // Although there is a client redirect, it is dropped from histograms because
2117   // it is a Google URL. The target page itself does not load until after the
2118   // swap.
2119   histograms.ExpectTotalCount("Prerender.gws_PrerenderNotSwappedInPLT", 0);
2120
2121   GURL navigate_url = test_server()->GetURL(
2122       "files/prerender/prerender_location_replace.html?" +
2123       net::EscapeQueryParamValue(dest_url.spec(), false) +
2124       "#navigate");
2125   navigate_url = navigate_url.ReplaceComponents(replacements);
2126
2127   NavigationOrSwapObserver swap_observer(
2128       current_browser()->tab_strip_model(),
2129       GetActiveWebContents(), 2);
2130   current_browser()->OpenURL(OpenURLParams(
2131       navigate_url, Referrer(), CURRENT_TAB,
2132       content::PAGE_TRANSITION_TYPED, false));
2133   swap_observer.Wait();
2134
2135   EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2136
2137   histograms.Fetch();
2138   histograms.ExpectTotalCount("Prerender.gws_PrerenderNotSwappedInPLT", 0);
2139   histograms.ExpectTotalCount("Prerender.gws_PerceivedPLT", 1);
2140   histograms.ExpectTotalCount("Prerender.gws_PerceivedPLTMatched", 1);
2141   histograms.ExpectTotalCount(
2142       "Prerender.gws_PerceivedPLTMatchedComplete", 1);
2143
2144   // The client redirect does /not/ count as a miss because it's a Google URL.
2145   histograms.ExpectTotalCount("Prerender.PerceivedPLTFirstAfterMiss", 0);
2146 }
2147
2148 // Checks that client-issued redirects work with prerendering.
2149 // This version navigates to the final destination page, rather than the
2150 // page which does the redirection via a mouse click.
2151 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2152                        PrerenderClientRedirectNavigateToSecondViaClick) {
2153   GURL prerender_url = test_server()->GetURL(
2154       CreateClientRedirect("files/prerender/prerender_page.html"));
2155   GURL destination_url = test_server()->GetURL(
2156       "files/prerender/prerender_page.html");
2157   PrerenderTestURL(prerender_url, FINAL_STATUS_USED, 2);
2158   OpenURLViaClick(destination_url);
2159 }
2160
2161 // Checks that a page served over HTTPS is correctly prerendered.
2162 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHttps) {
2163   net::SpawnedTestServer https_server(
2164       net::SpawnedTestServer::TYPE_HTTPS, net::SpawnedTestServer::kLocalhost,
2165       base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2166   ASSERT_TRUE(https_server.Start());
2167   GURL https_url = https_server.GetURL("files/prerender/prerender_page.html");
2168   PrerenderTestURL(https_url,
2169                    FINAL_STATUS_USED,
2170                    1);
2171   NavigateToDestURL();
2172 }
2173
2174 // Checks that client-issued redirects within an iframe in a prerendered
2175 // page will not count as an "alias" for the prerendered page.
2176 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2177                        PrerenderClientRedirectInIframe) {
2178   std::string redirect_path = CreateClientRedirect(
2179       "/files/prerender/prerender_embedded_content.html");
2180   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2181   replacement_text.push_back(
2182       std::make_pair("REPLACE_WITH_URL", "/" + redirect_path));
2183   std::string replacement_path;
2184   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2185       "files/prerender/prerender_with_iframe.html",
2186       replacement_text,
2187       &replacement_path));
2188   PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 2);
2189   EXPECT_FALSE(UrlIsInPrerenderManager(
2190       "files/prerender/prerender_embedded_content.html"));
2191   NavigateToDestURL();
2192 }
2193
2194 // Checks that server-issued redirects work with prerendering.
2195 // This version navigates to the page which issues the redirection, rather
2196 // than the final destination page.
2197 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2198                        PrerenderServerRedirectNavigateToFirst) {
2199   PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
2200                    FINAL_STATUS_USED,
2201                    1);
2202   NavigateToDestURL();
2203 }
2204
2205 // Checks that server-issued redirects work with prerendering.
2206 // This version navigates to the final destination page, rather than the
2207 // page which does the redirection.
2208 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2209                        PrerenderServerRedirectNavigateToSecond) {
2210   PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
2211                    FINAL_STATUS_USED,
2212                    1);
2213   NavigateToURL("files/prerender/prerender_page.html");
2214 }
2215
2216 // Checks that server-issued redirects work with prerendering.
2217 // This version navigates to the final destination page, rather than the
2218 // page which does the redirection via a mouse click.
2219 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2220                        PrerenderServerRedirectNavigateToSecondViaClick) {
2221   GURL prerender_url = test_server()->GetURL(
2222       CreateServerRedirect("files/prerender/prerender_page.html"));
2223   GURL destination_url = test_server()->GetURL(
2224       "files/prerender/prerender_page.html");
2225   PrerenderTestURL(prerender_url, FINAL_STATUS_USED, 1);
2226   OpenURLViaClick(destination_url);
2227 }
2228
2229 // Checks that server-issued redirects within an iframe in a prerendered
2230 // page will not count as an "alias" for the prerendered page.
2231 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderServerRedirectInIframe) {
2232   std::string redirect_path = CreateServerRedirect(
2233       "/files/prerender/prerender_embedded_content.html");
2234   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2235   replacement_text.push_back(
2236       std::make_pair("REPLACE_WITH_URL", "/" + redirect_path));
2237   std::string replacement_path;
2238   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2239       "files/prerender/prerender_with_iframe.html",
2240       replacement_text,
2241       &replacement_path));
2242   PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
2243   EXPECT_FALSE(UrlIsInPrerenderManager(
2244       "files/prerender/prerender_embedded_content.html"));
2245   NavigateToDestURL();
2246 }
2247
2248 // Prerenders a page that contains an automatic download triggered through an
2249 // iframe. This should not prerender successfully.
2250 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDownloadIframe) {
2251   PrerenderTestURL("files/prerender/prerender_download_iframe.html",
2252                    FINAL_STATUS_DOWNLOAD,
2253                    0);
2254 }
2255
2256 // Prerenders a page that contains an automatic download triggered through
2257 // Javascript changing the window.location. This should not prerender
2258 // successfully
2259 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDownloadLocation) {
2260   PrerenderTestURL(CreateClientRedirect("files/download-test1.lib"),
2261                    FINAL_STATUS_DOWNLOAD,
2262                    1);
2263 }
2264
2265 // Prerenders a page that contains an automatic download triggered through a
2266 // client-issued redirect. This should not prerender successfully.
2267 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDownloadClientRedirect) {
2268   PrerenderTestURL("files/prerender/prerender_download_refresh.html",
2269                    FINAL_STATUS_DOWNLOAD,
2270                    1);
2271 }
2272
2273 // Checks that the referrer is set when prerendering.
2274 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderReferrer) {
2275   PrerenderTestURL("files/prerender/prerender_referrer.html",
2276                    FINAL_STATUS_USED,
2277                    1);
2278   NavigateToDestURL();
2279 }
2280
2281 // Checks that the referrer is not set when prerendering and the source page is
2282 // HTTPS.
2283 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2284                        PrerenderNoSSLReferrer) {
2285   UseHttpsSrcServer();
2286   PrerenderTestURL("files/prerender/prerender_no_referrer.html",
2287                    FINAL_STATUS_USED,
2288                    1);
2289   NavigateToDestURL();
2290 }
2291
2292 // Checks that the referrer is set when prerendering is cancelled.
2293 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCancelReferrer) {
2294   scoped_ptr<TestContentBrowserClient> test_content_browser_client(
2295       new TestContentBrowserClient);
2296   content::ContentBrowserClient* original_browser_client =
2297       content::SetBrowserClientForTesting(test_content_browser_client.get());
2298
2299   PrerenderTestURL("files/prerender/prerender_referrer.html",
2300                    FINAL_STATUS_CANCELLED,
2301                    1);
2302   OpenDestURLViaClick();
2303
2304   EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
2305
2306   content::SetBrowserClientForTesting(original_browser_client);
2307 }
2308
2309 // Checks that popups on a prerendered page cause cancellation.
2310 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPopup) {
2311   PrerenderTestURL("files/prerender/prerender_popup.html",
2312                    FINAL_STATUS_CREATE_NEW_WINDOW,
2313                    0);
2314 }
2315
2316 // Checks that registering a protocol handler causes cancellation.
2317 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderRegisterProtocolHandler) {
2318   PrerenderTestURL("files/prerender/prerender_register_protocol_handler.html",
2319                    FINAL_STATUS_REGISTER_PROTOCOL_HANDLER,
2320                    0);
2321 }
2322
2323 // Checks that renderers using excessive memory will be terminated.
2324 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderExcessiveMemory) {
2325   ASSERT_TRUE(GetPrerenderManager());
2326   GetPrerenderManager()->mutable_config().max_bytes = 30 * 1024 * 1024;
2327   // The excessive memory kill may happen before or after the load event as it
2328   // happens asynchronously with IPC calls. Even if the test does not start
2329   // allocating until after load, the browser process might notice before the
2330   // message gets through. This happens on XP debug bots because they're so
2331   // slow. Instead, don't bother checking the load event count.
2332   DisableLoadEventCheck();
2333   PrerenderTestURL("files/prerender/prerender_excessive_memory.html",
2334                    FINAL_STATUS_MEMORY_LIMIT_EXCEEDED, 0);
2335 }
2336
2337 // Checks shutdown code while a prerender is active.
2338 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderQuickQuit) {
2339   DisableJavascriptCalls();
2340   DisableLoadEventCheck();
2341   PrerenderTestURL("files/prerender/prerender_page.html",
2342                    FINAL_STATUS_APP_TERMINATING,
2343                    0);
2344 }
2345
2346 // Checks that we don't prerender in an infinite loop.
2347 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderInfiniteLoop) {
2348   const char* const kHtmlFileA = "files/prerender/prerender_infinite_a.html";
2349   const char* const kHtmlFileB = "files/prerender/prerender_infinite_b.html";
2350
2351   std::vector<FinalStatus> expected_final_status_queue;
2352   expected_final_status_queue.push_back(FINAL_STATUS_USED);
2353   expected_final_status_queue.push_back(FINAL_STATUS_APP_TERMINATING);
2354
2355   ScopedVector<TestPrerender> prerenders =
2356       PrerenderTestURL(kHtmlFileA, expected_final_status_queue, 1);
2357   ASSERT_TRUE(prerenders[0]->contents());
2358   // Assert that the pending prerender is in there already. This relies on the
2359   // fact that the renderer sends out the AddLinkRelPrerender IPC before sending
2360   // the page load one.
2361   EXPECT_EQ(2U, GetLinkPrerenderCount());
2362   EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2363
2364   // Next url should be in pending list but not an active entry.
2365   EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB));
2366
2367   NavigateToDestURL();
2368
2369   // Make sure the PrerenderContents for the next url is now in the manager and
2370   // not pending. This relies on pending prerenders being resolved in the same
2371   // event loop iteration as OnPrerenderStop.
2372   EXPECT_TRUE(UrlIsInPrerenderManager(kHtmlFileB));
2373   EXPECT_EQ(1U, GetLinkPrerenderCount());
2374   EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2375 }
2376
2377 // Checks that we don't prerender in an infinite loop and multiple links are
2378 // handled correctly.
2379 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2380                        PrerenderInfiniteLoopMultiple) {
2381   const char* const kHtmlFileA =
2382       "files/prerender/prerender_infinite_a_multiple.html";
2383   const char* const kHtmlFileB =
2384       "files/prerender/prerender_infinite_b_multiple.html";
2385   const char* const kHtmlFileC =
2386       "files/prerender/prerender_infinite_c_multiple.html";
2387
2388   // This test is conceptually simplest if concurrency is at two, since we
2389   // don't have to worry about which of kHtmlFileB or kHtmlFileC gets evicted.
2390   GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
2391   GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
2392
2393   std::vector<FinalStatus> expected_final_status_queue;
2394   expected_final_status_queue.push_back(FINAL_STATUS_USED);
2395   expected_final_status_queue.push_back(FINAL_STATUS_APP_TERMINATING);
2396   expected_final_status_queue.push_back(FINAL_STATUS_APP_TERMINATING);
2397
2398   ScopedVector<TestPrerender> prerenders =
2399       PrerenderTestURL(kHtmlFileA, expected_final_status_queue, 1);
2400   ASSERT_TRUE(prerenders[0]->contents());
2401
2402   // Next url should be in pending list but not an active entry. This relies on
2403   // the fact that the renderer sends out the AddLinkRelPrerender IPC before
2404   // sending the page load one.
2405   EXPECT_EQ(3U, GetLinkPrerenderCount());
2406   EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2407   EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB));
2408   EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileC));
2409
2410   NavigateToDestURL();
2411
2412   // Make sure the PrerenderContents for the next urls are now in the manager
2413   // and not pending. One and only one of the URLs (the last seen) should be the
2414   // active entry. This relies on pending prerenders being resolved in the same
2415   // event loop iteration as OnPrerenderStop.
2416   bool url_b_is_active_prerender = UrlIsInPrerenderManager(kHtmlFileB);
2417   bool url_c_is_active_prerender = UrlIsInPrerenderManager(kHtmlFileC);
2418   EXPECT_TRUE(url_b_is_active_prerender && url_c_is_active_prerender);
2419   EXPECT_EQ(2U, GetLinkPrerenderCount());
2420   EXPECT_EQ(2U, GetRunningLinkPrerenderCount());
2421 }
2422
2423 // Checks that pending prerenders are aborted (and never launched) when launched
2424 // by a prerender that itself gets aborted.
2425 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderAbortPendingOnCancel) {
2426   const char* const kHtmlFileA = "files/prerender/prerender_infinite_a.html";
2427   const char* const kHtmlFileB = "files/prerender/prerender_infinite_b.html";
2428
2429   scoped_ptr<TestPrerender> prerender =
2430       PrerenderTestURL(kHtmlFileA, FINAL_STATUS_CANCELLED, 1);
2431   ASSERT_TRUE(prerender->contents());
2432   // Assert that the pending prerender is in there already. This relies on the
2433   // fact that the renderer sends out the AddLinkRelPrerender IPC before sending
2434   // the page load one.
2435   EXPECT_EQ(2U, GetLinkPrerenderCount());
2436   EXPECT_EQ(1U, GetRunningLinkPrerenderCount());
2437
2438   // Next url should be in pending list but not an active entry.
2439   EXPECT_FALSE(UrlIsInPrerenderManager(kHtmlFileB));
2440
2441   // Cancel the prerender.
2442   GetPrerenderManager()->CancelAllPrerenders();
2443   prerender->WaitForStop();
2444
2445   // All prerenders are now gone.
2446   EXPECT_TRUE(IsEmptyPrerenderLinkManager());
2447 }
2448
2449 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, OpenTaskManagerBeforePrerender) {
2450   const base::string16 any_prerender = MatchTaskManagerPrerender("*");
2451   const base::string16 any_tab = MatchTaskManagerTab("*");
2452   const base::string16 original = MatchTaskManagerTab("Preloader");
2453   const base::string16 prerender = MatchTaskManagerPrerender("Prerender Page");
2454   const base::string16 final = MatchTaskManagerTab("Prerender Page");
2455
2456   // Show the task manager. This populates the model.
2457   chrome::OpenTaskManager(current_browser());
2458   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2459   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2460
2461   // Prerender a page in addition to the original tab.
2462   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
2463
2464   // A TaskManager entry should appear like "Prerender: Prerender Page"
2465   // alongside the original tab entry. There should be just these two entries.
2466   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, prerender));
2467   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, original));
2468   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, final));
2469   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_prerender));
2470   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2471
2472   // Swap in the prerendered content.
2473   NavigateToDestURL();
2474
2475   // The "Prerender: " TaskManager entry should disappear, being replaced by a
2476   // "Tab: Prerender Page" entry, and nothing else.
2477   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, prerender));
2478   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, original));
2479   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final));
2480   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2481   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2482 }
2483
2484 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, OpenTaskManagerAfterPrerender) {
2485   const base::string16 any_prerender = MatchTaskManagerPrerender("*");
2486   const base::string16 any_tab = MatchTaskManagerTab("*");
2487   const base::string16 original = MatchTaskManagerTab("Preloader");
2488   const base::string16 prerender = MatchTaskManagerPrerender("Prerender Page");
2489   const base::string16 final = MatchTaskManagerTab("Prerender Page");
2490
2491   // Start with two resources.
2492   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
2493
2494   // Show the task manager. This populates the model. Importantly, we're doing
2495   // this after the prerender WebContents already exists - the task manager
2496   // needs to find it, it can't just listen for creation.
2497   chrome::OpenTaskManager(current_browser());
2498
2499   // A TaskManager entry should appear like "Prerender: Prerender Page"
2500   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, prerender));
2501   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, original));
2502   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, final));
2503   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_prerender));
2504   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2505
2506   // Swap in the tab.
2507   NavigateToDestURL();
2508
2509   // The "Prerender: Prerender Page" TaskManager row should disappear, being
2510   // replaced by "Tab: Prerender Page"
2511   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, prerender));
2512   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, original));
2513   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final));
2514   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2515   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2516 }
2517
2518 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, OpenTaskManagerAfterSwapIn) {
2519   const base::string16 any_prerender = MatchTaskManagerPrerender("*");
2520   const base::string16 any_tab = MatchTaskManagerTab("*");
2521   const base::string16 final = MatchTaskManagerTab("Prerender Page");
2522
2523   // Prerender, and swap it in.
2524   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
2525   NavigateToDestURL();
2526
2527   // Show the task manager. This populates the model. Importantly, we're doing
2528   // this after the prerender has been swapped in.
2529   chrome::OpenTaskManager(current_browser());
2530
2531   // We should not see a prerender resource in the task manager, just a normal
2532   // page.
2533   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, final));
2534   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(1, any_tab));
2535   ASSERT_NO_FATAL_FAILURE(WaitForTaskManagerRows(0, any_prerender));
2536 }
2537
2538 // Checks that audio loads are deferred on prerendering.
2539 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5Audio) {
2540   PrerenderTestURL("files/prerender/prerender_html5_audio.html",
2541                    FINAL_STATUS_USED,
2542                    1);
2543   NavigateToDestURL();
2544   WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2545 }
2546
2547 // Checks that audio loads are deferred on prerendering and played back when
2548 // the prerender is swapped in if autoplay is set.
2549 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5AudioAutoplay) {
2550   PrerenderTestURL("files/prerender/prerender_html5_audio_autoplay.html",
2551                    FINAL_STATUS_USED,
2552                    1);
2553   NavigateToDestURL();
2554   WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2555 }
2556
2557 // Checks that audio loads are deferred on prerendering and played back when
2558 // the prerender is swapped in if js starts playing.
2559 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5AudioJsplay) {
2560   PrerenderTestURL("files/prerender/prerender_html5_audio_jsplay.html",
2561                    FINAL_STATUS_USED,
2562                    1);
2563   NavigateToDestURL();
2564   WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2565 }
2566
2567 // Checks that video loads are deferred on prerendering.
2568 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5Video) {
2569   PrerenderTestURL("files/prerender/prerender_html5_video.html",
2570                    FINAL_STATUS_USED,
2571                    1);
2572   NavigateToDestURL();
2573   WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2574 }
2575
2576 // Checks that video tags inserted by javascript are deferred and played
2577 // correctly on swap in.
2578 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5VideoJs) {
2579   PrerenderTestURL("files/prerender/prerender_html5_video_script.html",
2580                    FINAL_STATUS_USED,
2581                    1);
2582   NavigateToDestURL();
2583   WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2584 }
2585
2586 // Checks for correct network events by using a busy sleep the javascript.
2587 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5VideoNetwork) {
2588   DisableJavascriptCalls();
2589   scoped_ptr<TestPrerender> prerender =
2590       PrerenderTestURL("files/prerender/prerender_html5_video_network.html",
2591                        FINAL_STATUS_USED,
2592                        1);
2593   WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
2594   EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
2595   NavigateToDestURL();
2596   WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
2597 }
2598
2599 // Checks that scripts can retrieve the correct window size while prerendering.
2600 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderWindowSize) {
2601   PrerenderTestURL("files/prerender/prerender_size.html",
2602                    FINAL_STATUS_USED,
2603                    1);
2604   NavigateToDestURL();
2605 }
2606
2607 // TODO(jam): http://crbug.com/350550
2608 #if !(defined(OS_CHROMEOS) && defined(ADDRESS_SANITIZER))
2609
2610 // Checks that prerenderers will terminate when the RenderView crashes.
2611 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderRendererCrash) {
2612   scoped_ptr<TestPrerender> prerender =
2613       PrerenderTestURL("files/prerender/prerender_page.html",
2614                        FINAL_STATUS_RENDERER_CRASHED,
2615                        1);
2616
2617   // Navigate to about:crash and then wait for the renderer to crash.
2618   ASSERT_TRUE(prerender->contents());
2619   ASSERT_TRUE(prerender->contents()->prerender_contents());
2620   prerender->contents()->prerender_contents()->GetController().
2621       LoadURL(
2622           GURL(content::kChromeUICrashURL),
2623           content::Referrer(),
2624           content::PAGE_TRANSITION_TYPED,
2625           std::string());
2626   prerender->WaitForStop();
2627 }
2628 #endif
2629
2630 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2631                        PrerenderPageWithFragment) {
2632   PrerenderTestURL("files/prerender/prerender_page.html#fragment",
2633                    FINAL_STATUS_USED,
2634                    1);
2635
2636   ChannelDestructionWatcher channel_close_watcher;
2637   channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
2638       GetActiveWebContents()->GetRenderProcessHost());
2639   NavigateToDestURL();
2640   channel_close_watcher.WaitForChannelClose();
2641
2642   ASSERT_TRUE(IsEmptyPrerenderLinkManager());
2643 }
2644
2645 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2646                        PrerenderPageWithRedirectedFragment) {
2647   PrerenderTestURL(
2648       CreateClientRedirect("files/prerender/prerender_page.html#fragment"),
2649       FINAL_STATUS_USED,
2650       2);
2651
2652   ChannelDestructionWatcher channel_close_watcher;
2653   channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
2654       GetActiveWebContents()->GetRenderProcessHost());
2655   NavigateToDestURL();
2656   channel_close_watcher.WaitForChannelClose();
2657
2658   ASSERT_TRUE(IsEmptyPrerenderLinkManager());
2659 }
2660
2661 // Checks that we do not use a prerendered page when navigating from
2662 // the main page to a fragment.
2663 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2664                        PrerenderPageNavigateFragment) {
2665   PrerenderTestURL("files/prerender/no_prerender_page.html",
2666                    FINAL_STATUS_APP_TERMINATING,
2667                    1);
2668   NavigateToURLWithDisposition(
2669       "files/prerender/no_prerender_page.html#fragment",
2670       CURRENT_TAB, false);
2671 }
2672
2673 // Checks that we do not use a prerendered page when we prerender a fragment
2674 // but navigate to the main page.
2675 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2676                        PrerenderFragmentNavigatePage) {
2677   PrerenderTestURL("files/prerender/no_prerender_page.html#fragment",
2678                    FINAL_STATUS_APP_TERMINATING,
2679                    1);
2680   NavigateToURLWithDisposition(
2681       "files/prerender/no_prerender_page.html",
2682       CURRENT_TAB, false);
2683 }
2684
2685 // Checks that we do not use a prerendered page when we prerender a fragment
2686 // but navigate to a different fragment on the same page.
2687 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2688                        PrerenderFragmentNavigateFragment) {
2689   PrerenderTestURL("files/prerender/no_prerender_page.html#other_fragment",
2690                    FINAL_STATUS_APP_TERMINATING,
2691                    1);
2692   NavigateToURLWithDisposition(
2693       "files/prerender/no_prerender_page.html#fragment",
2694       CURRENT_TAB, false);
2695 }
2696
2697 // Checks that we do not use a prerendered page when the page uses a client
2698 // redirect to refresh from a fragment on the same page.
2699 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2700                        PrerenderClientRedirectFromFragment) {
2701   PrerenderTestURL(
2702       CreateClientRedirect("files/prerender/no_prerender_page.html#fragment"),
2703       FINAL_STATUS_APP_TERMINATING,
2704       2);
2705   NavigateToURLWithDisposition(
2706       "files/prerender/no_prerender_page.html",
2707       CURRENT_TAB, false);
2708 }
2709
2710 // Checks that we do not use a prerendered page when the page uses a client
2711 // redirect to refresh to a fragment on the same page.
2712 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2713                        PrerenderClientRedirectToFragment) {
2714   PrerenderTestURL(
2715       CreateClientRedirect("files/prerender/no_prerender_page.html"),
2716       FINAL_STATUS_APP_TERMINATING,
2717       2);
2718   NavigateToURLWithDisposition(
2719       "files/prerender/no_prerender_page.html#fragment",
2720       CURRENT_TAB, false);
2721 }
2722
2723 // Checks that we correctly use a prerendered page when the page uses JS to set
2724 // the window.location.hash to a fragment on the same page.
2725 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2726                        PrerenderPageChangeFragmentLocationHash) {
2727   PrerenderTestURL("files/prerender/prerender_fragment_location_hash.html",
2728                    FINAL_STATUS_USED,
2729                    1);
2730   NavigateToURL("files/prerender/prerender_fragment_location_hash.html");
2731 }
2732
2733 // Checks that prerendering a PNG works correctly.
2734 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderImagePng) {
2735   DisableJavascriptCalls();
2736   PrerenderTestURL("files/prerender/image.png", FINAL_STATUS_USED, 1);
2737   NavigateToDestURL();
2738 }
2739
2740 // Checks that prerendering a JPG works correctly.
2741 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderImageJpeg) {
2742   DisableJavascriptCalls();
2743   PrerenderTestURL("files/prerender/image.jpeg", FINAL_STATUS_USED, 1);
2744   NavigateToDestURL();
2745 }
2746
2747 // Checks that a prerender of a CRX will result in a cancellation due to
2748 // download.
2749 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCrx) {
2750   PrerenderTestURL("files/prerender/extension.crx", FINAL_STATUS_DOWNLOAD, 0);
2751 }
2752
2753 // Checks that xhr GET requests allow prerenders.
2754 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrGet) {
2755   PrerenderTestURL("files/prerender/prerender_xhr_get.html",
2756                    FINAL_STATUS_USED,
2757                    1);
2758   NavigateToDestURL();
2759 }
2760
2761 // Checks that xhr HEAD requests allow prerenders.
2762 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrHead) {
2763   PrerenderTestURL("files/prerender/prerender_xhr_head.html",
2764                    FINAL_STATUS_USED,
2765                    1);
2766   NavigateToDestURL();
2767 }
2768
2769 // Checks that xhr OPTIONS requests allow prerenders.
2770 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrOptions) {
2771   PrerenderTestURL("files/prerender/prerender_xhr_options.html",
2772                    FINAL_STATUS_USED,
2773                    1);
2774   NavigateToDestURL();
2775 }
2776
2777 // Checks that xhr TRACE requests allow prerenders.
2778 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrTrace) {
2779   PrerenderTestURL("files/prerender/prerender_xhr_trace.html",
2780                    FINAL_STATUS_USED,
2781                    1);
2782   NavigateToDestURL();
2783 }
2784
2785 // Checks that xhr POST requests allow prerenders.
2786 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrPost) {
2787   PrerenderTestURL("files/prerender/prerender_xhr_post.html",
2788                    FINAL_STATUS_USED,
2789                    1);
2790   NavigateToDestURL();
2791 }
2792
2793 // Checks that xhr PUT cancels prerenders.
2794 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrPut) {
2795   PrerenderTestURL("files/prerender/prerender_xhr_put.html",
2796                    FINAL_STATUS_INVALID_HTTP_METHOD,
2797                    1);
2798 }
2799
2800 // Checks that xhr DELETE cancels prerenders.
2801 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderXhrDelete) {
2802   PrerenderTestURL("files/prerender/prerender_xhr_delete.html",
2803                    FINAL_STATUS_INVALID_HTTP_METHOD,
2804                    1);
2805 }
2806
2807 // Checks that a top-level page which would trigger an SSL error is canceled.
2808 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLErrorTopLevel) {
2809   net::SpawnedTestServer::SSLOptions ssl_options;
2810   ssl_options.server_certificate =
2811       net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME;
2812   net::SpawnedTestServer https_server(
2813       net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2814       base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2815   ASSERT_TRUE(https_server.Start());
2816   GURL https_url = https_server.GetURL("files/prerender/prerender_page.html");
2817   PrerenderTestURL(https_url,
2818                    FINAL_STATUS_SSL_ERROR,
2819                    0);
2820 }
2821
2822 // Checks that an SSL error that comes from a subresource does not cancel
2823 // the page. Non-main-frame requests are simply cancelled if they run into
2824 // an SSL problem.
2825 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLErrorSubresource) {
2826   net::SpawnedTestServer::SSLOptions ssl_options;
2827   ssl_options.server_certificate =
2828       net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME;
2829   net::SpawnedTestServer https_server(
2830       net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2831       base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2832   ASSERT_TRUE(https_server.Start());
2833   GURL https_url = https_server.GetURL("files/prerender/image.jpeg");
2834   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2835   replacement_text.push_back(
2836       std::make_pair("REPLACE_WITH_IMAGE_URL", https_url.spec()));
2837   std::string replacement_path;
2838   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2839       "files/prerender/prerender_with_image.html",
2840       replacement_text,
2841       &replacement_path));
2842   PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
2843   NavigateToDestURL();
2844 }
2845
2846 // Checks that an SSL error that comes from an iframe does not cancel
2847 // the page. Non-main-frame requests are simply cancelled if they run into
2848 // an SSL problem.
2849 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLErrorIframe) {
2850   net::SpawnedTestServer::SSLOptions ssl_options;
2851   ssl_options.server_certificate =
2852       net::SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME;
2853   net::SpawnedTestServer https_server(
2854       net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2855       base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2856   ASSERT_TRUE(https_server.Start());
2857   GURL https_url = https_server.GetURL(
2858       "files/prerender/prerender_embedded_content.html");
2859   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2860   replacement_text.push_back(
2861       std::make_pair("REPLACE_WITH_URL", https_url.spec()));
2862   std::string replacement_path;
2863   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2864       "files/prerender/prerender_with_iframe.html",
2865       replacement_text,
2866       &replacement_path));
2867   PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
2868   NavigateToDestURL();
2869 }
2870
2871 // Checks that we cancel correctly when window.print() is called.
2872 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPrint) {
2873   DisableLoadEventCheck();
2874   PrerenderTestURL("files/prerender/prerender_print.html",
2875                    FINAL_STATUS_WINDOW_PRINT,
2876                    0);
2877 }
2878
2879 // Checks that if a page is opened in a new window by javascript and both the
2880 // pages are in the same domain, the prerendered page is not used, due to
2881 // there being other tabs in the same browsing instance.
2882 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2883                        PrerenderSameDomainWindowOpenerWindowOpen) {
2884   PrerenderTestURL("files/prerender/prerender_page.html",
2885                    FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE,
2886                    1);
2887   OpenDestURLViaWindowOpen();
2888 }
2889
2890 // Checks that if a page is opened due to click on a href with target="_blank"
2891 // and both pages are in the same domain the prerendered page is not used, due
2892 // there being other tabs in the same browsing instance.
2893 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2894                        PrerenderSameDomainWindowOpenerClickTarget) {
2895   PrerenderTestURL("files/prerender/prerender_page.html",
2896                    FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE,
2897                    1);
2898   OpenDestURLViaClickTarget();
2899 }
2900
2901 // Checks that prerenders do not get swapped into target pages that have opened
2902 // a popup, even if the target page itself does not have an opener.
2903 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderTargetHasPopup) {
2904   PrerenderTestURL("files/prerender/prerender_page.html",
2905                    FINAL_STATUS_NON_EMPTY_BROWSING_INSTANCE,
2906                    1);
2907   OpenURLViaWindowOpen(GURL(url::kAboutBlankURL));
2908   NavigateToDestURLWithDisposition(CURRENT_TAB, false);
2909 }
2910
2911 class TestClientCertStore : public net::ClientCertStore {
2912  public:
2913   TestClientCertStore() {}
2914   virtual ~TestClientCertStore() {}
2915
2916   // net::ClientCertStore:
2917   virtual void GetClientCerts(const net::SSLCertRequestInfo& cert_request_info,
2918                               net::CertificateList* selected_certs,
2919                               const base::Closure& callback) OVERRIDE {
2920     *selected_certs = net::CertificateList(
2921         1, scoped_refptr<net::X509Certificate>(
2922         new net::X509Certificate("test", "test", base::Time(), base::Time())));
2923     callback.Run();
2924   }
2925 };
2926
2927 scoped_ptr<net::ClientCertStore> CreateCertStore() {
2928   return scoped_ptr<net::ClientCertStore>(new TestClientCertStore);
2929 }
2930
2931 // Checks that a top-level page which would normally request an SSL client
2932 // certificate will never be seen since it's an https top-level resource.
2933 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2934                        PrerenderSSLClientCertTopLevel) {
2935   ProfileIOData::FromResourceContext(
2936       current_browser()->profile()->GetResourceContext())->
2937           set_client_cert_store_factory_for_testing(
2938               base::Bind(&CreateCertStore));
2939   net::SpawnedTestServer::SSLOptions ssl_options;
2940   ssl_options.request_client_certificate = true;
2941   net::SpawnedTestServer https_server(
2942       net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2943       base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2944   ASSERT_TRUE(https_server.Start());
2945   GURL https_url = https_server.GetURL("files/prerender/prerender_page.html");
2946   PrerenderTestURL(https_url, FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED, 0);
2947 }
2948
2949 // Checks that an SSL Client Certificate request that originates from a
2950 // subresource will cancel the prerendered page.
2951 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
2952                        PrerenderSSLClientCertSubresource) {
2953   ProfileIOData::FromResourceContext(
2954       current_browser()->profile()->GetResourceContext())->
2955           set_client_cert_store_factory_for_testing(
2956               base::Bind(&CreateCertStore));
2957   net::SpawnedTestServer::SSLOptions ssl_options;
2958   ssl_options.request_client_certificate = true;
2959   net::SpawnedTestServer https_server(
2960       net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2961       base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2962   ASSERT_TRUE(https_server.Start());
2963   GURL https_url = https_server.GetURL("files/prerender/image.jpeg");
2964   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2965   replacement_text.push_back(
2966       std::make_pair("REPLACE_WITH_IMAGE_URL", https_url.spec()));
2967   std::string replacement_path;
2968   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2969       "files/prerender/prerender_with_image.html",
2970       replacement_text,
2971       &replacement_path));
2972   PrerenderTestURL(replacement_path,
2973                    FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED,
2974                    0);
2975 }
2976
2977 // Checks that an SSL Client Certificate request that originates from an
2978 // iframe will cancel the prerendered page.
2979 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSSLClientCertIframe) {
2980   ProfileIOData::FromResourceContext(
2981       current_browser()->profile()->GetResourceContext())->
2982           set_client_cert_store_factory_for_testing(
2983               base::Bind(&CreateCertStore));
2984   net::SpawnedTestServer::SSLOptions ssl_options;
2985   ssl_options.request_client_certificate = true;
2986   net::SpawnedTestServer https_server(
2987       net::SpawnedTestServer::TYPE_HTTPS, ssl_options,
2988       base::FilePath(FILE_PATH_LITERAL("chrome/test/data")));
2989   ASSERT_TRUE(https_server.Start());
2990   GURL https_url = https_server.GetURL(
2991       "files/prerender/prerender_embedded_content.html");
2992   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
2993   replacement_text.push_back(
2994       std::make_pair("REPLACE_WITH_URL", https_url.spec()));
2995   std::string replacement_path;
2996   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
2997       "files/prerender/prerender_with_iframe.html",
2998       replacement_text,
2999       &replacement_path));
3000   PrerenderTestURL(replacement_path,
3001                    FINAL_STATUS_SSL_CLIENT_CERTIFICATE_REQUESTED,
3002                    0);
3003 }
3004
3005 #if defined(FULL_SAFE_BROWSING)
3006 // Ensures that we do not prerender pages with a safe browsing
3007 // interstitial.
3008 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSafeBrowsingTopLevel) {
3009   GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
3010   GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3011       url, SB_THREAT_TYPE_URL_MALWARE);
3012   PrerenderTestURL("files/prerender/prerender_page.html",
3013                    FINAL_STATUS_SAFE_BROWSING, 0);
3014 }
3015
3016 // Ensures that server redirects to a malware page will cancel prerenders.
3017 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3018                        PrerenderSafeBrowsingServerRedirect) {
3019   GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
3020   GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3021       url, SB_THREAT_TYPE_URL_MALWARE);
3022   PrerenderTestURL(CreateServerRedirect("files/prerender/prerender_page.html"),
3023                    FINAL_STATUS_SAFE_BROWSING,
3024                    0);
3025 }
3026
3027 // Ensures that client redirects to a malware page will cancel prerenders.
3028 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3029                        PrerenderSafeBrowsingClientRedirect) {
3030   GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
3031   GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3032       url, SB_THREAT_TYPE_URL_MALWARE);
3033   PrerenderTestURL(CreateClientRedirect("files/prerender/prerender_page.html"),
3034                    FINAL_STATUS_SAFE_BROWSING,
3035                    1);
3036 }
3037
3038 // Ensures that we do not prerender pages which have a malware subresource.
3039 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSafeBrowsingSubresource) {
3040   GURL image_url = test_server()->GetURL("files/prerender/image.jpeg");
3041   GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3042       image_url, SB_THREAT_TYPE_URL_MALWARE);
3043   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3044   replacement_text.push_back(
3045       std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3046   std::string replacement_path;
3047   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3048       "files/prerender/prerender_with_image.html",
3049       replacement_text,
3050       &replacement_path));
3051   PrerenderTestURL(replacement_path,
3052                    FINAL_STATUS_SAFE_BROWSING,
3053                    0);
3054 }
3055
3056 // Ensures that we do not prerender pages which have a malware iframe.
3057 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSafeBrowsingIframe) {
3058   GURL iframe_url = test_server()->GetURL(
3059       "files/prerender/prerender_embedded_content.html");
3060   GetFakeSafeBrowsingDatabaseManager()->SetThreatTypeForUrl(
3061       iframe_url, SB_THREAT_TYPE_URL_MALWARE);
3062   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3063   replacement_text.push_back(
3064       std::make_pair("REPLACE_WITH_URL", iframe_url.spec()));
3065   std::string replacement_path;
3066   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3067       "files/prerender/prerender_with_iframe.html",
3068       replacement_text,
3069       &replacement_path));
3070   PrerenderTestURL(replacement_path,
3071                    FINAL_STATUS_SAFE_BROWSING,
3072                    0);
3073 }
3074
3075 #endif
3076
3077 // Checks that a local storage read will not cause prerender to fail.
3078 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderLocalStorageRead) {
3079   PrerenderTestURL("files/prerender/prerender_localstorage_read.html",
3080                    FINAL_STATUS_USED,
3081                    1);
3082   NavigateToDestURL();
3083 }
3084
3085 // Checks that a local storage write will not cause prerender to fail.
3086 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderLocalStorageWrite) {
3087   PrerenderTestURL("files/prerender/prerender_localstorage_write.html",
3088                    FINAL_STATUS_USED,
3089                    1);
3090   NavigateToDestURL();
3091 }
3092
3093 // Checks that the favicon is properly loaded on prerender.
3094 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderFavicon) {
3095   scoped_ptr<TestPrerender> prerender =
3096       PrerenderTestURL("files/prerender/prerender_favicon.html",
3097                        FINAL_STATUS_USED,
3098                        1);
3099   NavigateToDestURL();
3100
3101   if (!FaviconTabHelper::FromWebContents(
3102           GetActiveWebContents())->FaviconIsValid()) {
3103     // If the favicon has not been set yet, wait for it to be.
3104     content::WindowedNotificationObserver favicon_update_watcher(
3105         chrome::NOTIFICATION_FAVICON_UPDATED,
3106         content::Source<WebContents>(GetActiveWebContents()));
3107     favicon_update_watcher.Wait();
3108   }
3109   EXPECT_TRUE(FaviconTabHelper::FromWebContents(
3110       GetActiveWebContents())->FaviconIsValid());
3111 }
3112
3113 // Checks that when a prerendered page is swapped in to a referring page, the
3114 // unload handlers on the referring page are executed.
3115 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderUnload) {
3116   // Matches URL in prerender_loader_with_unload.html.
3117   const GURL unload_url("http://unload-url.test");
3118   base::FilePath empty_file = ui_test_utils::GetTestFilePath(
3119       base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
3120   RequestCounter unload_counter;
3121   BrowserThread::PostTask(
3122       BrowserThread::IO, FROM_HERE,
3123       base::Bind(&CreateCountingInterceptorOnIO,
3124                  unload_url, empty_file, unload_counter.AsWeakPtr()));
3125
3126   set_loader_path("files/prerender/prerender_loader_with_unload.html");
3127   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3128   NavigateToDestURL();
3129   unload_counter.WaitForCount(1);
3130 }
3131
3132 // Checks that a hanging unload on the referring page of a prerender swap does
3133 // not crash the browser on exit.
3134 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHangingUnload) {
3135   // Matches URL in prerender_loader_with_unload.html.
3136   const GURL hang_url("http://unload-url.test");
3137   base::FilePath empty_file = ui_test_utils::GetTestFilePath(
3138       base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
3139   BrowserThread::PostTask(
3140       BrowserThread::IO, FROM_HERE,
3141       base::Bind(&CreateHangingFirstRequestInterceptorOnIO,
3142                  hang_url, empty_file,
3143                  base::Closure()));
3144
3145   set_loader_path("files/prerender/prerender_loader_with_unload.html");
3146   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3147   NavigateToDestURL();
3148 }
3149
3150
3151 // Checks that when the history is cleared, prerendering is cancelled and
3152 // prerendering history is cleared.
3153 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClearHistory) {
3154   scoped_ptr<TestPrerender> prerender =
3155       PrerenderTestURL("files/prerender/prerender_page.html",
3156                        FINAL_STATUS_CACHE_OR_HISTORY_CLEARED,
3157                        1);
3158
3159   ClearBrowsingData(current_browser(), BrowsingDataRemover::REMOVE_HISTORY);
3160   prerender->WaitForStop();
3161
3162   // Make sure prerender history was cleared.
3163   EXPECT_EQ(0, GetHistoryLength());
3164 }
3165
3166 // Checks that when the cache is cleared, prerenders are cancelled but
3167 // prerendering history is not cleared.
3168 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClearCache) {
3169   scoped_ptr<TestPrerender> prerender =
3170       PrerenderTestURL("files/prerender/prerender_page.html",
3171                        FINAL_STATUS_CACHE_OR_HISTORY_CLEARED,
3172                        1);
3173
3174   ClearBrowsingData(current_browser(), BrowsingDataRemover::REMOVE_CACHE);
3175   prerender->WaitForStop();
3176
3177   // Make sure prerender history was not cleared.  Not a vital behavior, but
3178   // used to compare with PrerenderClearHistory test.
3179   EXPECT_EQ(1, GetHistoryLength());
3180 }
3181
3182 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCancelAll) {
3183   scoped_ptr<TestPrerender> prerender =
3184       PrerenderTestURL("files/prerender/prerender_page.html",
3185                        FINAL_STATUS_CANCELLED,
3186                        1);
3187
3188   GetPrerenderManager()->CancelAllPrerenders();
3189   prerender->WaitForStop();
3190
3191   EXPECT_FALSE(prerender->contents());
3192 }
3193
3194 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderEvents) {
3195   scoped_ptr<TestPrerender> prerender =
3196       PrerenderTestURL("files/prerender/prerender_page.html",
3197                        FINAL_STATUS_CANCELLED, 1);
3198
3199   GetPrerenderManager()->CancelAllPrerenders();
3200   prerender->WaitForStop();
3201
3202   EXPECT_TRUE(DidReceivePrerenderStartEventForLinkNumber(0));
3203   EXPECT_TRUE(DidReceivePrerenderStopEventForLinkNumber(0));
3204   EXPECT_FALSE(HadPrerenderEventErrors());
3205 }
3206
3207 // Cancels the prerender of a page with its own prerender.  The second prerender
3208 // should never be started.
3209 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3210                        PrerenderCancelPrerenderWithPrerender) {
3211   scoped_ptr<TestPrerender> prerender =
3212       PrerenderTestURL("files/prerender/prerender_infinite_a.html",
3213                        FINAL_STATUS_CANCELLED,
3214                        1);
3215
3216   GetPrerenderManager()->CancelAllPrerenders();
3217   prerender->WaitForStop();
3218
3219   EXPECT_FALSE(prerender->contents());
3220 }
3221
3222 // Prerendering and history tests.
3223 // The prerendered page is navigated to in several ways [navigate via
3224 // omnibox, click on link, key-modified click to open in background tab, etc],
3225 // followed by a navigation to another page from the prerendered page, followed
3226 // by a back navigation.
3227
3228 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNavigateClickGoBack) {
3229   PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3230                    FINAL_STATUS_USED,
3231                    1);
3232   NavigateToDestURL();
3233   ClickToNextPageAfterPrerender();
3234   GoBackToPrerender();
3235 }
3236
3237 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNavigateNavigateGoBack) {
3238   PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3239                    FINAL_STATUS_USED,
3240                    1);
3241   NavigateToDestURL();
3242   NavigateToNextPageAfterPrerender();
3243   GoBackToPrerender();
3244 }
3245
3246 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickClickGoBack) {
3247   PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3248                    FINAL_STATUS_USED,
3249                    1);
3250   OpenDestURLViaClick();
3251   ClickToNextPageAfterPrerender();
3252   GoBackToPrerender();
3253 }
3254
3255 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickNavigateGoBack) {
3256   PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3257                    FINAL_STATUS_USED,
3258                    1);
3259   OpenDestURLViaClick();
3260   NavigateToNextPageAfterPrerender();
3261   GoBackToPrerender();
3262 }
3263
3264 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickNewWindow) {
3265   // Prerender currently doesn't interpose on this navigation.
3266   // http://crbug.com/345474.
3267   PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3268                    FINAL_STATUS_USED,
3269                    1);
3270   OpenDestURLViaClickNewWindow();
3271 }
3272
3273 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickNewForegroundTab) {
3274   // Prerender currently doesn't interpose on this navigation.
3275   // http://crbug.com/345474.
3276   PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3277                    FINAL_STATUS_USED,
3278                    1);
3279   OpenDestURLViaClickNewForegroundTab();
3280 }
3281
3282 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderClickNewBackgroundTab) {
3283   // Prerender currently doesn't interpose on this navigation.
3284   // http://crbug.com/345474.
3285   scoped_ptr<TestPrerender> prerender =
3286       PrerenderTestURL("files/prerender/prerender_page_with_link.html",
3287                        FINAL_STATUS_USED,
3288                        1);
3289   ASSERT_TRUE(prerender->contents());
3290   prerender->contents()->set_should_be_shown(false);
3291   OpenDestURLViaClickNewBackgroundTab();
3292 }
3293
3294 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3295                        NavigateToPrerenderedPageWhenDevToolsAttached) {
3296   DisableJavascriptCalls();
3297   WebContents* web_contents =
3298       current_browser()->tab_strip_model()->GetActiveWebContents();
3299   scoped_refptr<DevToolsAgentHost> agent(DevToolsAgentHost::GetOrCreateFor(
3300       web_contents->GetRenderViewHost()));
3301   DevToolsManager* manager = DevToolsManager::GetInstance();
3302   FakeDevToolsClientHost client_host;
3303   manager->RegisterDevToolsClientHostFor(agent.get(), &client_host);
3304   const char* url = "files/prerender/prerender_page.html";
3305   PrerenderTestURL(url, FINAL_STATUS_DEVTOOLS_ATTACHED, 1);
3306   NavigateToURLWithDisposition(url, CURRENT_TAB, false);
3307   manager->ClientHostClosing(&client_host);
3308 }
3309
3310 // Validate that the sessionStorage namespace remains the same when swapping
3311 // in a prerendered page.
3312 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSessionStorage) {
3313   set_loader_path("files/prerender/prerender_loader_with_session_storage.html");
3314   PrerenderTestURL(GetCrossDomainTestUrl("files/prerender/prerender_page.html"),
3315                    FINAL_STATUS_USED,
3316                    1);
3317   NavigateToDestURL();
3318   GoBackToPageBeforePrerender();
3319 }
3320
3321 // Checks that the control group works.  An XHR PUT cannot be detected in the
3322 // control group.
3323 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, ControlGroup) {
3324   RestorePrerenderMode restore_prerender_mode;
3325   PrerenderManager::SetMode(
3326       PrerenderManager::PRERENDER_MODE_EXPERIMENT_CONTROL_GROUP);
3327   DisableJavascriptCalls();
3328   PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3329                    FINAL_STATUS_WOULD_HAVE_BEEN_USED, 0);
3330   NavigateToDestURL();
3331 }
3332
3333 // Checks that the control group correctly hits WOULD_HAVE_BEEN_USED
3334 // renderer-initiated navigations. (This verifies that the ShouldFork logic
3335 // behaves correctly.)
3336 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, ControlGroupRendererInitiated) {
3337   RestorePrerenderMode restore_prerender_mode;
3338   PrerenderManager::SetMode(
3339       PrerenderManager::PRERENDER_MODE_EXPERIMENT_CONTROL_GROUP);
3340   DisableJavascriptCalls();
3341   PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3342                    FINAL_STATUS_WOULD_HAVE_BEEN_USED, 0);
3343   OpenDestURLViaClick();
3344 }
3345
3346 // Make sure that the MatchComplete dummy works in the normal case.  Once
3347 // a prerender is cancelled because of a script, a dummy must be created to
3348 // account for the MatchComplete case, and it must have a final status of
3349 // FINAL_STATUS_WOULD_HAVE_BEEN_USED.
3350 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, MatchCompleteDummy) {
3351   UMAHistogramHelper histograms;
3352
3353   std::vector<FinalStatus> expected_final_status_queue;
3354   expected_final_status_queue.push_back(FINAL_STATUS_INVALID_HTTP_METHOD);
3355   expected_final_status_queue.push_back(FINAL_STATUS_WOULD_HAVE_BEEN_USED);
3356   PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3357                    expected_final_status_queue, 1);
3358   histograms.Fetch();
3359   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3360   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3361   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
3362   histograms.ExpectTotalCount("Prerender.websame_PrerenderNotSwappedInPLT", 1);
3363
3364   NavigateToDestURL();
3365   histograms.Fetch();
3366   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3367   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLTMatched", 0);
3368   histograms.ExpectTotalCount(
3369       "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3370 }
3371
3372 // Verify that a navigation that hits a MatchComplete dummy while another is in
3373 // progress does not also classify the previous navigation as a MatchComplete.
3374 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3375                        MatchCompleteDummyCancelNavigation) {
3376   UMAHistogramHelper histograms;
3377
3378   // Arrange for a URL to hang.
3379   const GURL kNoCommitUrl("http://never-respond.example.com");
3380   base::FilePath file(FILE_PATH_LITERAL(
3381       "chrome/test/data/prerender/prerender_page.html"));
3382   base::RunLoop hang_loop;
3383   BrowserThread::PostTask(
3384       BrowserThread::IO, FROM_HERE,
3385       base::Bind(&CreateHangingFirstRequestInterceptorOnIO, kNoCommitUrl,
3386                  file, hang_loop.QuitClosure()));
3387
3388   // First, fire a prerender that aborts after it completes its load.
3389   std::vector<FinalStatus> expected_final_status_queue;
3390   expected_final_status_queue.push_back(FINAL_STATUS_INVALID_HTTP_METHOD);
3391   expected_final_status_queue.push_back(FINAL_STATUS_WOULD_HAVE_BEEN_USED);
3392   PrerenderTestURL("files/prerender/prerender_xhr_put.html",
3393                    expected_final_status_queue, 1);
3394   histograms.Fetch();
3395   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3396   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3397   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
3398   histograms.ExpectTotalCount("Prerender.websame_PrerenderNotSwappedInPLT", 1);
3399
3400   // Open the hanging URL in a new tab. Wait for both the new tab to open and
3401   // the hanging request to be scheduled.
3402   ui_test_utils::NavigateToURLWithDisposition(
3403       current_browser(), kNoCommitUrl, NEW_FOREGROUND_TAB,
3404       ui_test_utils::BROWSER_TEST_WAIT_FOR_TAB);
3405   hang_loop.Run();
3406
3407   // Now interrupt that navigation and navigate to the destination URL. This
3408   // should forcibly complete the previous navigation and also complete a
3409   // WOULD_HAVE_BEEN_PRERENDERED navigation.
3410   NavigateToDestURL();
3411   histograms.Fetch();
3412   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 2);
3413   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3414   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
3415   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3416   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLTMatched", 0);
3417   histograms.ExpectTotalCount(
3418       "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3419 }
3420
3421 class PrerenderBrowserTestWithNaCl : public PrerenderBrowserTest {
3422  public:
3423   PrerenderBrowserTestWithNaCl() {}
3424   virtual ~PrerenderBrowserTestWithNaCl() {}
3425
3426   virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE {
3427     PrerenderBrowserTest::SetUpCommandLine(command_line);
3428     command_line->AppendSwitch(switches::kEnableNaCl);
3429   }
3430 };
3431
3432 // Check that NaCl plugins work when enabled, with prerendering.
3433 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithNaCl,
3434                        PrerenderNaClPluginEnabled) {
3435 #if defined(OS_WIN) && defined(USE_ASH)
3436   // Disable this test in Metro+Ash for now (http://crbug.com/262796).
3437   if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kAshBrowserTests))
3438     return;
3439 #endif
3440
3441   PrerenderTestURL("files/prerender/prerender_plugin_nacl_enabled.html",
3442                    FINAL_STATUS_USED,
3443                    1);
3444   NavigateToDestURL();
3445
3446   // To avoid any chance of a race, we have to let the script send its response
3447   // asynchronously.
3448   WebContents* web_contents =
3449       browser()->tab_strip_model()->GetActiveWebContents();
3450   bool display_test_result = false;
3451   ASSERT_TRUE(content::ExecuteScriptAndExtractBool(web_contents,
3452                                                    "DidDisplayReallyPass()",
3453                                                    &display_test_result));
3454   ASSERT_TRUE(display_test_result);
3455 }
3456
3457 // Checks that the referrer policy is used when prerendering.
3458 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderReferrerPolicy) {
3459   set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3460   PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3461                    FINAL_STATUS_USED,
3462                    1);
3463   NavigateToDestURL();
3464 }
3465
3466 // Checks that the referrer policy is used when prerendering on HTTPS.
3467 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3468                        PrerenderSSLReferrerPolicy) {
3469   UseHttpsSrcServer();
3470   set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3471   PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3472                    FINAL_STATUS_USED,
3473                    1);
3474   NavigateToDestURL();
3475 }
3476
3477 // Checks that the referrer policy is used when prerendering is cancelled.
3478 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCancelReferrerPolicy) {
3479   scoped_ptr<TestContentBrowserClient> test_content_browser_client(
3480       new TestContentBrowserClient);
3481   content::ContentBrowserClient* original_browser_client =
3482       content::SetBrowserClientForTesting(test_content_browser_client.get());
3483
3484   set_loader_path("files/prerender/prerender_loader_with_referrer_policy.html");
3485   PrerenderTestURL("files/prerender/prerender_referrer_policy.html",
3486                    FINAL_STATUS_CANCELLED,
3487                    1);
3488   OpenDestURLViaClick();
3489
3490   bool display_test_result = false;
3491   WebContents* web_contents =
3492       browser()->tab_strip_model()->GetActiveWebContents();
3493   ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
3494       web_contents,
3495       "window.domAutomationController.send(DidDisplayPass())",
3496       &display_test_result));
3497   EXPECT_TRUE(display_test_result);
3498
3499   content::SetBrowserClientForTesting(original_browser_client);
3500 }
3501
3502 // Test interaction of the webNavigation and tabs API with prerender.
3503 class PrerenderBrowserTestWithExtensions : public PrerenderBrowserTest,
3504                                            public ExtensionApiTest {
3505  public:
3506   PrerenderBrowserTestWithExtensions() {
3507     // The individual tests start the test server through ExtensionApiTest, so
3508     // the port number can be passed through to the extension.
3509     autostart_test_server_ = false;
3510   }
3511
3512   virtual void SetUp() OVERRIDE {
3513     PrerenderBrowserTest::SetUp();
3514   }
3515
3516   virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE {
3517     PrerenderBrowserTest::SetUpCommandLine(command_line);
3518     ExtensionApiTest::SetUpCommandLine(command_line);
3519   }
3520
3521   virtual void SetUpInProcessBrowserTestFixture() OVERRIDE {
3522     PrerenderBrowserTest::SetUpInProcessBrowserTestFixture();
3523     ExtensionApiTest::SetUpInProcessBrowserTestFixture();
3524   }
3525
3526   virtual void TearDownInProcessBrowserTestFixture() OVERRIDE {
3527     PrerenderBrowserTest::TearDownInProcessBrowserTestFixture();
3528     ExtensionApiTest::TearDownInProcessBrowserTestFixture();
3529   }
3530
3531   virtual void SetUpOnMainThread() OVERRIDE {
3532     PrerenderBrowserTest::SetUpOnMainThread();
3533   }
3534 };
3535
3536 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions, WebNavigation) {
3537   ASSERT_TRUE(StartSpawnedTestServer());
3538   extensions::FrameNavigationState::set_allow_extension_scheme(true);
3539
3540   // Wait for the extension to set itself up and return control to us.
3541   ASSERT_TRUE(RunExtensionTest("webnavigation/prerender")) << message_;
3542
3543   ResultCatcher catcher;
3544
3545   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3546
3547   ChannelDestructionWatcher channel_close_watcher;
3548   channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
3549       GetActiveWebContents()->GetRenderProcessHost());
3550   NavigateToDestURL();
3551   channel_close_watcher.WaitForChannelClose();
3552
3553   ASSERT_TRUE(IsEmptyPrerenderLinkManager());
3554   ASSERT_TRUE(catcher.GetNextResult()) << catcher.message();
3555 }
3556
3557 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions, TabsApi) {
3558   ASSERT_TRUE(StartSpawnedTestServer());
3559   extensions::FrameNavigationState::set_allow_extension_scheme(true);
3560
3561   // Wait for the extension to set itself up and return control to us.
3562   ASSERT_TRUE(RunExtensionTest("tabs/on_replaced")) << message_;
3563
3564   ResultCatcher catcher;
3565
3566   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
3567
3568   ChannelDestructionWatcher channel_close_watcher;
3569   channel_close_watcher.WatchChannel(browser()->tab_strip_model()->
3570       GetActiveWebContents()->GetRenderProcessHost());
3571   NavigateToDestURL();
3572   channel_close_watcher.WaitForChannelClose();
3573
3574   ASSERT_TRUE(IsEmptyPrerenderLinkManager());
3575   ASSERT_TRUE(catcher.GetNextResult()) << catcher.message();
3576 }
3577
3578 // Test that prerenders abort when navigating to a stream.
3579 // See chrome/browser/extensions/api/streams_private/streams_private_apitest.cc
3580 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTestWithExtensions, StreamsTest) {
3581   ASSERT_TRUE(StartSpawnedTestServer());
3582
3583   const extensions::Extension* extension = LoadExtension(
3584       test_data_dir_.AppendASCII("streams_private/handle_mime_type"));
3585   ASSERT_TRUE(extension);
3586   EXPECT_EQ(std::string(extension_misc::kStreamsPrivateTestExtensionId),
3587             extension->id());
3588   MimeTypesHandler* handler = MimeTypesHandler::GetHandler(extension);
3589   ASSERT_TRUE(handler);
3590   EXPECT_TRUE(handler->CanHandleMIMEType("application/msword"));
3591
3592   PrerenderTestURL("files/prerender/document.doc", FINAL_STATUS_DOWNLOAD, 0);
3593
3594   // Sanity-check that the extension would have picked up the stream in a normal
3595   // navigation had prerender not intercepted it.
3596   // streams_private/handle_mime_type reports success if it has handled the
3597   // application/msword type.
3598   ResultCatcher catcher;
3599   NavigateToDestURL();
3600   EXPECT_TRUE(catcher.GetNextResult());
3601 }
3602
3603 // Checks that non-http/https/chrome-extension subresource cancels the
3604 // prerender.
3605 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3606                        PrerenderCancelSubresourceUnsupportedScheme) {
3607   GURL image_url = GURL("invalidscheme://www.google.com/test.jpg");
3608   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3609   replacement_text.push_back(
3610       std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3611   std::string replacement_path;
3612   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3613       "files/prerender/prerender_with_image.html",
3614       replacement_text,
3615       &replacement_path));
3616   PrerenderTestURL(replacement_path, FINAL_STATUS_UNSUPPORTED_SCHEME, 0);
3617 }
3618
3619 // Ensure that about:blank is permitted for any subresource.
3620 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3621                        PrerenderAllowAboutBlankSubresource) {
3622   GURL image_url = GURL("about:blank");
3623   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3624   replacement_text.push_back(
3625       std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3626   std::string replacement_path;
3627   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3628       "files/prerender/prerender_with_image.html",
3629       replacement_text,
3630       &replacement_path));
3631   PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
3632   NavigateToDestURL();
3633 }
3634
3635 // Checks that non-http/https/chrome-extension subresource cancels the prerender
3636 // on redirect.
3637 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3638                        PrerenderCancelSubresourceRedirectUnsupportedScheme) {
3639   GURL image_url = test_server()->GetURL(
3640       CreateServerRedirect("invalidscheme://www.google.com/test.jpg"));
3641   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3642   replacement_text.push_back(
3643       std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3644   std::string replacement_path;
3645   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3646       "files/prerender/prerender_with_image.html",
3647       replacement_text,
3648       &replacement_path));
3649   PrerenderTestURL(replacement_path, FINAL_STATUS_UNSUPPORTED_SCHEME, 0);
3650 }
3651
3652 // Checks that chrome-extension subresource does not cancel the prerender.
3653 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3654                        PrerenderKeepSubresourceExtensionScheme) {
3655   GURL image_url = GURL("chrome-extension://abcdefg/test.jpg");
3656   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3657   replacement_text.push_back(
3658       std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3659   std::string replacement_path;
3660   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3661       "files/prerender/prerender_with_image.html",
3662       replacement_text,
3663       &replacement_path));
3664   PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
3665   NavigateToDestURL();
3666 }
3667
3668 // Checks that redirect to chrome-extension subresource does not cancel the
3669 // prerender.
3670 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3671                        PrerenderKeepSubresourceRedirectExtensionScheme) {
3672   GURL image_url = test_server()->GetURL(
3673       CreateServerRedirect("chrome-extension://abcdefg/test.jpg"));
3674   std::vector<net::SpawnedTestServer::StringPair> replacement_text;
3675   replacement_text.push_back(
3676       std::make_pair("REPLACE_WITH_IMAGE_URL", image_url.spec()));
3677   std::string replacement_path;
3678   ASSERT_TRUE(net::SpawnedTestServer::GetFilePathWithReplacements(
3679       "files/prerender/prerender_with_image.html",
3680       replacement_text,
3681       &replacement_path));
3682   PrerenderTestURL(replacement_path, FINAL_STATUS_USED, 1);
3683   NavigateToDestURL();
3684 }
3685
3686 // Checks that non-http/https main page redirects cancel the prerender.
3687 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3688                        PrerenderCancelMainFrameRedirectUnsupportedScheme) {
3689   GURL url = test_server()->GetURL(
3690       CreateServerRedirect("invalidscheme://www.google.com/test.html"));
3691   PrerenderTestURL(url, FINAL_STATUS_UNSUPPORTED_SCHEME, 0);
3692 }
3693
3694 // Checks that media source video loads are deferred on prerendering.
3695 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderHTML5MediaSourceVideo) {
3696   PrerenderTestURL("files/prerender/prerender_html5_video_media_source.html",
3697                    FINAL_STATUS_USED,
3698                    1);
3699   NavigateToDestURL();
3700   WaitForASCIITitle(GetActiveWebContents(), kPassTitle);
3701 }
3702
3703 // Checks that a prerender that creates an audio stream (via a WebAudioDevice)
3704 // is cancelled.
3705 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderWebAudioDevice) {
3706   DisableLoadEventCheck();
3707   PrerenderTestURL("files/prerender/prerender_web_audio_device.html",
3708                    FINAL_STATUS_CREATING_AUDIO_STREAM, 0);
3709 }
3710
3711 // Checks that prerenders do not swap in to WebContents being captured.
3712 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCapturedWebContents) {
3713   PrerenderTestURL("files/prerender/prerender_page.html",
3714                    FINAL_STATUS_PAGE_BEING_CAPTURED, 1);
3715   WebContents* web_contents = GetActiveWebContents();
3716   web_contents->IncrementCapturerCount(gfx::Size());
3717   NavigateToDestURLWithDisposition(CURRENT_TAB, false);
3718   web_contents->DecrementCapturerCount();
3719 }
3720
3721 // Checks that prerenders are aborted on cross-process navigation from
3722 // a server redirect.
3723 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3724                        PrerenderCrossProcessServerRedirect) {
3725   // Force everything to be a process swap.
3726   SwapProcessesContentBrowserClient test_browser_client;
3727   content::ContentBrowserClient* original_browser_client =
3728       content::SetBrowserClientForTesting(&test_browser_client);
3729
3730   PrerenderTestURL(
3731       CreateServerRedirect("files/prerender/prerender_page.html"),
3732       FINAL_STATUS_OPEN_URL, 0);
3733
3734   content::SetBrowserClientForTesting(original_browser_client);
3735 }
3736
3737 // Checks that URLRequests for prerenders being aborted on cross-process
3738 // navigation from a server redirect are cleaned up, so they don't keep cache
3739 // entries locked.
3740 // See http://crbug.com/341134
3741 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3742                        PrerenderCrossProcessServerRedirectNoHang) {
3743   const char kDestPath[] = "files/prerender/prerender_page.html";
3744   // Force everything to be a process swap.
3745   SwapProcessesContentBrowserClient test_browser_client;
3746   content::ContentBrowserClient* original_browser_client =
3747       content::SetBrowserClientForTesting(&test_browser_client);
3748
3749   PrerenderTestURL(CreateServerRedirect(kDestPath), FINAL_STATUS_OPEN_URL, 0);
3750
3751   ui_test_utils::NavigateToURL(
3752       browser(),
3753       test_server()->GetURL(kDestPath));
3754
3755   content::SetBrowserClientForTesting(original_browser_client);
3756 }
3757
3758 // Checks that prerenders are aborted on cross-process navigation from
3759 // a client redirect.
3760 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3761                        PrerenderCrossProcessClientRedirect) {
3762   // Cross-process navigation logic for renderer-initiated navigations
3763   // is partially controlled by the renderer, namely
3764   // ChromeContentRendererClient. This test instead relies on the Web
3765   // Store triggering such navigations.
3766   std::string webstore_url = extension_urls::GetWebstoreLaunchURL();
3767
3768   // Mock out requests to the Web Store.
3769   base::FilePath file(GetTestPath("prerender_page.html"));
3770   BrowserThread::PostTask(
3771       BrowserThread::IO, FROM_HERE,
3772       base::Bind(&CreateMockInterceptorOnIO, GURL(webstore_url), file));
3773
3774   PrerenderTestURL(CreateClientRedirect(webstore_url),
3775                    FINAL_STATUS_OPEN_URL, 1);
3776 }
3777
3778 // Checks that canceling a MatchComplete dummy doesn't result in two
3779 // stop events.
3780 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, CancelMatchCompleteDummy) {
3781   std::vector<FinalStatus> expected_final_status_queue;
3782   expected_final_status_queue.push_back(FINAL_STATUS_JAVASCRIPT_ALERT);
3783   expected_final_status_queue.push_back(FINAL_STATUS_CANCELLED);
3784   ScopedVector<TestPrerender> prerenders =
3785       PrerenderTestURL("files/prerender/prerender_alert_before_onload.html",
3786                        expected_final_status_queue, 0);
3787
3788   // Cancel the MatchComplete dummy.
3789   GetPrerenderManager()->CancelAllPrerenders();
3790   prerenders[1]->WaitForStop();
3791
3792   // Check the referring page only got one copy of the event.
3793   EXPECT_FALSE(HadPrerenderEventErrors());
3794 }
3795
3796 // Checks that a deferred redirect to an image is not loaded until the page is
3797 // visible. Also test the right histogram events are emitted in this case.
3798 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDeferredImage) {
3799   DisableJavascriptCalls();
3800   UMAHistogramHelper histograms;
3801
3802   // The prerender will not completely load until after the swap, so wait for a
3803   // title change before calling DidPrerenderPass.
3804   scoped_ptr<TestPrerender> prerender =
3805       PrerenderTestURL(
3806           "files/prerender/prerender_deferred_image.html",
3807           FINAL_STATUS_USED, 0);
3808   WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
3809   EXPECT_EQ(1, GetPrerenderDomContentLoadedEventCountForLinkNumber(0));
3810   EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
3811   EXPECT_EQ(0, prerender->number_of_loads());
3812   histograms.Fetch();
3813   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
3814   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
3815   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
3816   histograms.ExpectTotalCount("Prerender.websame_PrerenderNotSwappedInPLT", 0);
3817
3818   // Swap.
3819   NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
3820                                          GetActiveWebContents());
3821   ui_test_utils::NavigateToURLWithDisposition(
3822       current_browser(), dest_url(), CURRENT_TAB,
3823       ui_test_utils::BROWSER_TEST_NONE);
3824   swap_observer.Wait();
3825
3826   // The prerender never observes the final load.
3827   EXPECT_EQ(0, prerender->number_of_loads());
3828
3829   // Now check DidDisplayPass.
3830   EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
3831
3832   histograms.Fetch();
3833   histograms.ExpectTotalCount("Prerender.websame_PrerenderNotSwappedInPLT", 0);
3834   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLT", 1);
3835   histograms.ExpectTotalCount("Prerender.websame_PerceivedPLTMatched", 1);
3836   histograms.ExpectTotalCount(
3837       "Prerender.websame_PerceivedPLTMatchedComplete", 1);
3838 }
3839
3840 // Checks that a deferred redirect to an image is not loaded until the
3841 // page is visible, even after another redirect.
3842 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3843                        PrerenderDeferredImageAfterRedirect) {
3844   DisableJavascriptCalls();
3845
3846   // The prerender will not completely load until after the swap, so wait for a
3847   // title change before calling DidPrerenderPass.
3848   scoped_ptr<TestPrerender> prerender =
3849       PrerenderTestURL(
3850           "files/prerender/prerender_deferred_image.html",
3851           FINAL_STATUS_USED, 0);
3852   WaitForASCIITitle(prerender->contents()->prerender_contents(), kReadyTitle);
3853   EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
3854   EXPECT_EQ(0, prerender->number_of_loads());
3855
3856   // Swap.
3857   NavigationOrSwapObserver swap_observer(current_browser()->tab_strip_model(),
3858                                          GetActiveWebContents());
3859   ui_test_utils::NavigateToURLWithDisposition(
3860       current_browser(), dest_url(), CURRENT_TAB,
3861       ui_test_utils::BROWSER_TEST_NONE);
3862   swap_observer.Wait();
3863
3864   // The prerender never observes the final load.
3865   EXPECT_EQ(0, prerender->number_of_loads());
3866
3867   // Now check DidDisplayPass.
3868   EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
3869 }
3870
3871 // Checks that deferred redirects in the main frame are followed.
3872 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDeferredMainFrame) {
3873   DisableJavascriptCalls();
3874   PrerenderTestURL(
3875       "files/prerender/image-deferred.png",
3876       FINAL_STATUS_USED, 1);
3877   NavigateToDestURL();
3878 }
3879
3880 // Checks that deferred redirects in the main frame are followed, even
3881 // with a double-redirect.
3882 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3883                        PrerenderDeferredMainFrameAfterRedirect) {
3884   DisableJavascriptCalls();
3885   PrerenderTestURL(
3886       CreateServerRedirect("files/prerender/image-deferred.png"),
3887       FINAL_STATUS_USED, 1);
3888   NavigateToDestURL();
3889 }
3890
3891 // Checks that deferred redirects in a synchronous XHR abort the
3892 // prerender.
3893 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDeferredSynchronousXHR) {
3894   PrerenderTestURL("files/prerender/prerender_deferred_sync_xhr.html",
3895                    FINAL_STATUS_BAD_DEFERRED_REDIRECT, 0);
3896   NavigateToDestURL();
3897 }
3898
3899 // Checks that prerenders are not swapped for navigations with extra headers.
3900 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderExtraHeadersNoSwap) {
3901   PrerenderTestURL("files/prerender/prerender_page.html",
3902                    FINAL_STATUS_APP_TERMINATING, 1);
3903
3904   content::OpenURLParams params(dest_url(), Referrer(), CURRENT_TAB,
3905                                 content::PAGE_TRANSITION_TYPED, false);
3906   params.extra_headers = "X-Custom-Header: 42\r\n";
3907   NavigateToURLWithParams(params, false);
3908 }
3909
3910 // Checks that prerenders are not swapped for navigations with browser-initiated
3911 // POST data.
3912 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
3913                        PrerenderBrowserInitiatedPostNoSwap) {
3914   PrerenderTestURL("files/prerender/prerender_page.html",
3915                    FINAL_STATUS_APP_TERMINATING, 1);
3916
3917   std::string post_data = "DATA";
3918   content::OpenURLParams params(dest_url(), Referrer(), CURRENT_TAB,
3919                                 content::PAGE_TRANSITION_TYPED, false);
3920   params.uses_post = true;
3921   params.browser_initiated_post_data =
3922       base::RefCountedString::TakeString(&post_data);
3923   NavigateToURLWithParams(params, false);
3924 }
3925
3926 // Checks that the prerendering of a page is canceled correctly when the
3927 // prerendered page tries to make a second navigation entry.
3928 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderNewNavigationEntry) {
3929   PrerenderTestURL("files/prerender/prerender_new_entry.html",
3930                    FINAL_STATUS_NEW_NAVIGATION_ENTRY,
3931                    1);
3932 }
3933
3934 // Attempt a swap-in in a new tab, verifying that session storage namespace
3935 // merging works.
3936 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageNewTab) {
3937   // Mock out some URLs and count the number of requests to one of them. Both
3938   // prerender_session_storage.html and init_session_storage.html need to be
3939   // mocked so they are same-origin.
3940   const GURL kInitURL("http://prerender.test/init_session_storage.html");
3941   base::FilePath init_file = GetTestPath("init_session_storage.html");
3942   BrowserThread::PostTask(
3943       BrowserThread::IO, FROM_HERE,
3944       base::Bind(&CreateMockInterceptorOnIO, kInitURL, init_file));
3945
3946   const GURL kTestURL("http://prerender.test/prerender_session_storage.html");
3947   base::FilePath test_file = GetTestPath("prerender_session_storage.html");
3948   RequestCounter counter;
3949   BrowserThread::PostTask(
3950       BrowserThread::IO, FROM_HERE,
3951       base::Bind(&CreateCountingInterceptorOnIO,
3952                  kTestURL, test_file, counter.AsWeakPtr()));
3953
3954   PrerenderTestURL(kTestURL, FINAL_STATUS_USED, 1);
3955
3956   // Open a new tab to navigate in.
3957   ui_test_utils::NavigateToURLWithDisposition(
3958       current_browser(), kInitURL, NEW_FOREGROUND_TAB,
3959       ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
3960
3961   // Now navigate in the new tab. Set expect_swap_to_succeed to false because
3962   // the swap does not occur synchronously.
3963   //
3964   // TODO(davidben): When all swaps become asynchronous, remove the OpenURL
3965   // return value assertion and let this go through the usual successful-swap
3966   // codepath.
3967   NavigateToDestURLWithDisposition(CURRENT_TAB, false);
3968
3969   // Verify DidDisplayPass manually since the previous call skipped it.
3970   EXPECT_TRUE(DidDisplayPass(
3971       current_browser()->tab_strip_model()->GetActiveWebContents()));
3972
3973   // Only one request to the test URL started.
3974   //
3975   // TODO(davidben): Re-enable this check when the races in attaching the
3976   // throttle are resolved. http://crbug.com/335835
3977   // EXPECT_EQ(1, counter.count());
3978 }
3979
3980 // Attempt a swap-in in a new tab, verifying that session storage namespace
3981 // merging works. Unlike the above test, the swap is for a navigation that would
3982 // normally be cross-process.
3983 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPageNewTabCrossProcess) {
3984   base::FilePath test_data_dir;
3985   ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &test_data_dir));
3986
3987   // Mock out some URLs and count the number of requests to one of them. Both
3988   // prerender_session_storage.html and init_session_storage.html need to be
3989   // mocked so they are same-origin.
3990   const GURL kInitURL("http://prerender.test/init_session_storage.html");
3991   base::FilePath init_file = GetTestPath("init_session_storage.html");
3992   BrowserThread::PostTask(
3993       BrowserThread::IO, FROM_HERE,
3994       base::Bind(&CreateMockInterceptorOnIO, kInitURL, init_file));
3995
3996   const GURL kTestURL("http://prerender.test/prerender_session_storage.html");
3997   base::FilePath test_file = GetTestPath("prerender_session_storage.html");
3998   RequestCounter counter;
3999   BrowserThread::PostTask(
4000       BrowserThread::IO, FROM_HERE,
4001       base::Bind(&CreateCountingInterceptorOnIO,
4002                  kTestURL, test_file, counter.AsWeakPtr()));
4003
4004   PrerenderTestURL(kTestURL, FINAL_STATUS_USED, 1);
4005
4006   // Open a new tab to navigate in.
4007   ui_test_utils::NavigateToURLWithDisposition(
4008       current_browser(), kInitURL, NEW_FOREGROUND_TAB,
4009       ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4010
4011   // Navigate to about:blank so the next navigation is cross-process.
4012   ui_test_utils::NavigateToURL(current_browser(), GURL(url::kAboutBlankURL));
4013
4014   // Now navigate in the new tab. Set expect_swap_to_succeed to false because
4015   // the swap does not occur synchronously.
4016   //
4017   // TODO(davidben): When all swaps become asynchronous, remove the OpenURL
4018   // return value assertion and let this go through the usual successful-swap
4019   // codepath.
4020   NavigateToDestURLWithDisposition(CURRENT_TAB, false);
4021
4022   // Verify DidDisplayPass manually since the previous call skipped it.
4023   EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
4024
4025   // Only one request to the test URL started.
4026   //
4027   // TODO(davidben): Re-enable this check when the races in attaching the
4028   // throttle are resolved. http://crbug.com/335835
4029   // EXPECT_EQ(1, counter.count());
4030 }
4031
4032 // Verify that session storage conflicts don't merge.
4033 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderSessionStorageConflict) {
4034   PrerenderTestURL("files/prerender/prerender_session_storage_conflict.html",
4035                    FINAL_STATUS_APP_TERMINATING, 1);
4036
4037   // Open a new tab to navigate in.
4038   ui_test_utils::NavigateToURLWithDisposition(
4039       current_browser(),
4040       test_server()->GetURL("files/prerender/init_session_storage.html"),
4041       NEW_FOREGROUND_TAB,
4042       ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4043
4044   // Now navigate in the new tab.
4045   NavigateToDestURLWithDisposition(CURRENT_TAB, false);
4046
4047   // Verify DidDisplayPass in the new tab.
4048   EXPECT_TRUE(DidDisplayPass(GetActiveWebContents()));
4049 }
4050
4051 // Checks that prerenders honor |should_replace_current_entry|.
4052 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderReplaceCurrentEntry) {
4053   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
4054
4055   content::OpenURLParams params(dest_url(), Referrer(), CURRENT_TAB,
4056                                 content::PAGE_TRANSITION_TYPED, false);
4057   params.should_replace_current_entry = true;
4058   NavigateToURLWithParams(params, false);
4059
4060   const NavigationController& controller =
4061       GetActiveWebContents()->GetController();
4062   // First entry is about:blank, second is prerender_page.html.
4063   EXPECT_TRUE(controller.GetPendingEntry() == NULL);
4064   EXPECT_EQ(2, controller.GetEntryCount());
4065   EXPECT_EQ(GURL(url::kAboutBlankURL), controller.GetEntryAtIndex(0)->GetURL());
4066   EXPECT_EQ(dest_url(), controller.GetEntryAtIndex(1)->GetURL());
4067 }
4068
4069 // Checks prerender does not hit DCHECKs and behaves properly if two pending
4070 // swaps occur in a row.
4071 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderDoublePendingSwap) {
4072   GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
4073   GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
4074
4075   GURL url1 = test_server()->GetURL("files/prerender/prerender_page.html?1");
4076   scoped_ptr<TestPrerender> prerender1 =
4077       PrerenderTestURL(url1, FINAL_STATUS_APP_TERMINATING, 1);
4078
4079   GURL url2 = test_server()->GetURL("files/prerender/prerender_page.html?2");
4080   scoped_ptr<TestPrerender> prerender2 = ExpectPrerender(FINAL_STATUS_USED);
4081   AddPrerender(url2, 1);
4082   prerender2->WaitForStart();
4083   prerender2->WaitForLoads(1);
4084
4085   // There's no reason the second prerender can't be used, but the swap races
4086   // with didStartProvisionalLoad and didFailProvisionalLoad from the previous
4087   // navigation. The current logic will conservatively fail to swap under such
4088   // races. However, if the renderer is slow enough, it's possible for the
4089   // prerender to still be used, so don't program in either expectation.
4090   ASSERT_TRUE(prerender2->contents());
4091   prerender2->contents()->set_skip_final_checks(true);
4092
4093   // Open a new tab to navigate in.
4094   ui_test_utils::NavigateToURLWithDisposition(
4095       current_browser(),
4096       GURL(url::kAboutBlankURL),
4097       NEW_FOREGROUND_TAB,
4098       ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4099
4100   // Fire off two navigations, without running the event loop between them.
4101   NavigationOrSwapObserver swap_observer(
4102       current_browser()->tab_strip_model(),
4103       GetActiveWebContents(), 2);
4104   current_browser()->OpenURL(OpenURLParams(
4105       url1, Referrer(), CURRENT_TAB, content::PAGE_TRANSITION_TYPED, false));
4106   current_browser()->OpenURL(OpenURLParams(
4107       url2, Referrer(), CURRENT_TAB, content::PAGE_TRANSITION_TYPED, false));
4108   swap_observer.Wait();
4109
4110   // The WebContents should be on url2. There may be 2 or 3 entries, depending
4111   // on whether the first one managed to complete.
4112   //
4113   // TODO(davidben): When http://crbug.com/335835 is fixed, the 3 entry case
4114   // shouldn't be possible because it's throttled by the pending swap that
4115   // cannot complete.
4116   const NavigationController& controller =
4117       GetActiveWebContents()->GetController();
4118   EXPECT_TRUE(controller.GetPendingEntry() == NULL);
4119   EXPECT_LE(2, controller.GetEntryCount());
4120   EXPECT_GE(3, controller.GetEntryCount());
4121   EXPECT_EQ(GURL(url::kAboutBlankURL), controller.GetEntryAtIndex(0)->GetURL());
4122   EXPECT_EQ(url2, controller.GetEntryAtIndex(
4123       controller.GetEntryCount() - 1)->GetURL());
4124 }
4125
4126 // Verify that pending swaps get aborted on new navigations.
4127 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4128                        PrerenderPendingSwapNewNavigation) {
4129   PrerenderManager::HangSessionStorageMergesForTesting();
4130
4131   PrerenderTestURL("files/prerender/prerender_page.html",
4132                    FINAL_STATUS_APP_TERMINATING, 1);
4133
4134   // Open a new tab to navigate in.
4135   ui_test_utils::NavigateToURLWithDisposition(
4136       current_browser(),
4137       GURL(url::kAboutBlankURL),
4138       NEW_FOREGROUND_TAB,
4139       ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION);
4140
4141   // Navigate to the URL. Wait for DidStartLoading, just so it's definitely
4142   // progressed somewhere.
4143   content::WindowedNotificationObserver page_load_observer(
4144       content::NOTIFICATION_LOAD_START,
4145       content::Source<NavigationController>(
4146           &GetActiveWebContents()->GetController()));
4147   current_browser()->OpenURL(OpenURLParams(
4148       dest_url(), Referrer(), CURRENT_TAB,
4149       content::PAGE_TRANSITION_TYPED, false));
4150   page_load_observer.Wait();
4151
4152   // Navigate somewhere else. This should succeed and abort the pending swap.
4153   TestNavigationObserver nav_observer(GetActiveWebContents());
4154   current_browser()->OpenURL(OpenURLParams(GURL(url::kAboutBlankURL),
4155                                            Referrer(),
4156                                            CURRENT_TAB,
4157                                            content::PAGE_TRANSITION_TYPED,
4158                                            false));
4159   nav_observer.Wait();
4160 }
4161
4162 // Checks that <a ping> requests are not dropped in prerender.
4163 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPing) {
4164   // Count hits to a certain URL.
4165   const GURL kPingURL("http://prerender.test/ping");
4166   base::FilePath empty_file = ui_test_utils::GetTestFilePath(
4167       base::FilePath(), base::FilePath(FILE_PATH_LITERAL("empty.html")));
4168   RequestCounter ping_counter;
4169   BrowserThread::PostTask(
4170       BrowserThread::IO, FROM_HERE,
4171       base::Bind(&CreateCountingInterceptorOnIO,
4172                  kPingURL, empty_file, ping_counter.AsWeakPtr()));
4173
4174   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
4175   OpenDestURLViaClickPing(kPingURL);
4176
4177   ping_counter.WaitForCount(1);
4178 }
4179
4180 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderPPLTNormalNavigation) {
4181   UMAHistogramHelper histograms;
4182
4183   GURL url = test_server()->GetURL("files/prerender/prerender_page.html");
4184   ui_test_utils::NavigateToURL(current_browser(), url);
4185   histograms.Fetch();
4186   histograms.ExpectTotalCount("Prerender.none_PerceivedPLT", 1);
4187   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatched", 0);
4188   histograms.ExpectTotalCount("Prerender.none_PerceivedPLTMatchedComplete", 0);
4189 }
4190
4191 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4192                        PrerenderCookieChangeConflictTest) {
4193   NavigateStraightToURL(
4194       "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4195
4196   GURL url = test_server()->GetURL(
4197       "files/prerender/prerender_cookie.html?set=1&key=c&value=2");
4198
4199   scoped_ptr<TestPrerender> prerender =
4200       ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT);
4201   AddPrerender(url, 1);
4202   prerender->WaitForStart();
4203   prerender->WaitForLoads(1);
4204   // Ensure that in the prerendered page, querying the cookie again
4205   // via javascript yields the same value that was set during load.
4206   EXPECT_TRUE(DidPrerenderPass(prerender->contents()->prerender_contents()));
4207
4208   // The prerender has loaded. Ensure that the change is not visible
4209   // to visible tabs.
4210   std::string value;
4211   RunJSReturningString("GetCookie('c')", &value);
4212   ASSERT_EQ(value, "1");
4213
4214   // Make a conflicting cookie change, which should cancel the prerender.
4215   RunJS("SetCookie('c', '3')");
4216   prerender->WaitForStop();
4217 }
4218
4219 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderCookieChangeUseTest) {
4220   // Permit 2 concurrent prerenders.
4221   GetPrerenderManager()->mutable_config().max_link_concurrency = 2;
4222   GetPrerenderManager()->mutable_config().max_link_concurrency_per_launcher = 2;
4223
4224   // Go to a first URL setting the cookie to value "1".
4225   NavigateStraightToURL(
4226       "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4227
4228   // Prerender a URL setting the cookie to value "2".
4229   GURL url = test_server()->GetURL(
4230       "files/prerender/prerender_cookie.html?set=1&key=c&value=2");
4231
4232   scoped_ptr<TestPrerender> prerender1 = ExpectPrerender(FINAL_STATUS_USED);
4233   AddPrerender(url, 1);
4234   prerender1->WaitForStart();
4235   prerender1->WaitForLoads(1);
4236
4237   // Launch a second prerender, setting the cookie to value "3".
4238   scoped_ptr<TestPrerender> prerender2 =
4239       ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT);
4240   AddPrerender(test_server()->GetURL(
4241       "files/prerender/prerender_cookie.html?set=1&key=c&value=3"), 1);
4242   prerender2->WaitForStart();
4243   prerender2->WaitForLoads(1);
4244
4245   // Both prerenders have loaded. Ensure that the visible tab is still
4246   // unchanged and cannot see their changes.
4247   // to visible tabs.
4248   std::string value;
4249   RunJSReturningString("GetCookie('c')", &value);
4250   ASSERT_EQ(value, "1");
4251
4252   // Navigate to the prerendered URL. The first prerender should be swapped in,
4253   // and the changes should now be visible. The second prerender should
4254   // be cancelled due to the conflict.
4255   ui_test_utils::NavigateToURLWithDisposition(
4256       current_browser(),
4257       url,
4258       CURRENT_TAB,
4259       ui_test_utils::BROWSER_TEST_NONE);
4260   RunJSReturningString("GetCookie('c')", &value);
4261   ASSERT_EQ(value, "2");
4262   prerender2->WaitForStop();
4263 }
4264
4265 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest,
4266                        PrerenderCookieChangeConflictHTTPHeaderTest) {
4267   NavigateStraightToURL(
4268       "files/prerender/prerender_cookie.html?set=1&key=c&value=1");
4269
4270   GURL url = test_server()->GetURL("set-cookie?c=2");
4271   scoped_ptr<TestPrerender> prerender =
4272       ExpectPrerender(FINAL_STATUS_COOKIE_CONFLICT);
4273   AddPrerender(url, 1);
4274   prerender->WaitForStart();
4275   prerender->WaitForLoads(1);
4276
4277   // The prerender has loaded. Ensure that the change is not visible
4278   // to visible tabs.
4279   std::string value;
4280   RunJSReturningString("GetCookie('c')", &value);
4281   ASSERT_EQ(value, "1");
4282
4283   // Make a conflicting cookie change, which should cancel the prerender.
4284   RunJS("SetCookie('c', '3')");
4285   prerender->WaitForStop();
4286 }
4287
4288 // Checks that a prerender which calls window.close() on itself is aborted.
4289 IN_PROC_BROWSER_TEST_F(PrerenderBrowserTest, PrerenderWindowClose) {
4290   DisableLoadEventCheck();
4291   PrerenderTestURL("files/prerender/prerender_window_close.html",
4292                    FINAL_STATUS_CLOSED, 0);
4293 }
4294
4295 class PrerenderIncognitoBrowserTest : public PrerenderBrowserTest {
4296  public:
4297   virtual void SetUpOnMainThread() OVERRIDE {
4298     Profile* normal_profile = current_browser()->profile();
4299     set_browser(ui_test_utils::OpenURLOffTheRecord(
4300         normal_profile, GURL("about:blank")));
4301     PrerenderBrowserTest::SetUpOnMainThread();
4302   }
4303 };
4304
4305 // Checks that prerendering works in incognito mode.
4306 IN_PROC_BROWSER_TEST_F(PrerenderIncognitoBrowserTest, PrerenderIncognito) {
4307   PrerenderTestURL("files/prerender/prerender_page.html", FINAL_STATUS_USED, 1);
4308   NavigateToDestURL();
4309 }
4310
4311 // Checks that prerenders are aborted when an incognito profile is closed.
4312 IN_PROC_BROWSER_TEST_F(PrerenderIncognitoBrowserTest,
4313                        PrerenderIncognitoClosed) {
4314   scoped_ptr<TestPrerender> prerender =
4315       PrerenderTestURL("files/prerender/prerender_page.html",
4316                        FINAL_STATUS_PROFILE_DESTROYED, 1);
4317   current_browser()->window()->Close();
4318   prerender->WaitForStop();
4319 }
4320
4321 class PrerenderOmniboxBrowserTest : public PrerenderBrowserTest {
4322  public:
4323   LocationBar* GetLocationBar() {
4324     return current_browser()->window()->GetLocationBar();
4325   }
4326
4327   OmniboxView* GetOmniboxView() {
4328     return GetLocationBar()->GetOmniboxView();
4329   }
4330
4331   void WaitForAutocompleteDone(OmniboxView* omnibox_view) {
4332     AutocompleteController* controller =
4333         omnibox_view->model()->popup_model()->autocomplete_controller();
4334     while (!controller->done()) {
4335       content::WindowedNotificationObserver ready_observer(
4336           chrome::NOTIFICATION_AUTOCOMPLETE_CONTROLLER_RESULT_READY,
4337           content::Source<AutocompleteController>(controller));
4338       ready_observer.Wait();
4339     }
4340   }
4341
4342   predictors::AutocompleteActionPredictor* GetAutocompleteActionPredictor() {
4343     Profile* profile = current_browser()->profile();
4344     return predictors::AutocompleteActionPredictorFactory::GetForProfile(
4345         profile);
4346   }
4347
4348   scoped_ptr<TestPrerender> StartOmniboxPrerender(
4349       const GURL& url,
4350       FinalStatus expected_final_status) {
4351     scoped_ptr<TestPrerender> prerender =
4352         ExpectPrerender(expected_final_status);
4353     WebContents* web_contents = GetActiveWebContents();
4354     GetAutocompleteActionPredictor()->StartPrerendering(
4355         url,
4356         web_contents->GetController().GetSessionStorageNamespaceMap(),
4357         gfx::Size(50, 50));
4358     prerender->WaitForStart();
4359     return prerender.Pass();
4360   }
4361 };
4362
4363 // Checks that closing the omnibox popup cancels an omnibox prerender.
4364 IN_PROC_BROWSER_TEST_F(PrerenderOmniboxBrowserTest, PrerenderOmniboxCancel) {
4365   // Ensure the cookie store has been loaded.
4366   if (!GetPrerenderManager()->cookie_store_loaded()) {
4367     base::RunLoop loop;
4368     GetPrerenderManager()->set_on_cookie_store_loaded_cb_for_testing(
4369         loop.QuitClosure());
4370     loop.Run();
4371   }
4372
4373   // Fake an omnibox prerender.
4374   scoped_ptr<TestPrerender> prerender = StartOmniboxPrerender(
4375       test_server()->GetURL("files/empty.html"),
4376       FINAL_STATUS_CANCELLED);
4377
4378   // Revert the location bar. This should cancel the prerender.
4379   GetLocationBar()->Revert();
4380   prerender->WaitForStop();
4381 }
4382
4383 // Checks that accepting omnibox input abandons an omnibox prerender.
4384 IN_PROC_BROWSER_TEST_F(PrerenderOmniboxBrowserTest, PrerenderOmniboxAbandon) {
4385   // Set the abandon timeout to something high so it does not introduce
4386   // flakiness if the prerender times out before the test completes.
4387   GetPrerenderManager()->mutable_config().abandon_time_to_live =
4388       base::TimeDelta::FromDays(999);
4389
4390   // Ensure the cookie store has been loaded.
4391   if (!GetPrerenderManager()->cookie_store_loaded()) {
4392     base::RunLoop loop;
4393     GetPrerenderManager()->set_on_cookie_store_loaded_cb_for_testing(
4394         loop.QuitClosure());
4395     loop.Run();
4396   }
4397
4398   // Enter a URL into the Omnibox.
4399   OmniboxView* omnibox_view = GetOmniboxView();
4400   omnibox_view->OnBeforePossibleChange();
4401   omnibox_view->SetUserText(
4402       base::UTF8ToUTF16(test_server()->GetURL("files/empty.html?1").spec()));
4403   omnibox_view->OnAfterPossibleChange();
4404   WaitForAutocompleteDone(omnibox_view);
4405
4406   // Fake an omnibox prerender for a different URL.
4407   scoped_ptr<TestPrerender> prerender = StartOmniboxPrerender(
4408       test_server()->GetURL("files/empty.html?2"),
4409       FINAL_STATUS_APP_TERMINATING);
4410
4411   // The final status may be either FINAL_STATUS_APP_TERMINATING or
4412   // FINAL_STATUS_CANCELLED. Although closing the omnibox will not cancel an
4413   // abandoned prerender, the AutocompleteActionPredictor will cancel the
4414   // predictor on destruction.
4415   prerender->contents()->set_skip_final_checks(true);
4416
4417   // Navigate to the URL entered.
4418   omnibox_view->model()->AcceptInput(CURRENT_TAB, false);
4419
4420   // Prerender should be running, but abandoned.
4421   EXPECT_TRUE(
4422       GetAutocompleteActionPredictor()->IsPrerenderAbandonedForTesting());
4423 }
4424
4425 }  // namespace prerender