blob: 02b209680350ba162af51b643292112ad930f464 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <algorithm>
#include <limits>
#include "base/strings/string_util.h"
#include "net/http/http_util.h"
#include "starboard/common/string.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace net {
namespace {
class HttpUtilTest : public testing::Test {};
}
TEST(HttpUtilTest, IsSafeHeader) {
static const char* const unsafe_headers[] = {
"sec-",
"sEc-",
"sec-foo",
"sEc-FoO",
"proxy-",
"pRoXy-",
"proxy-foo",
"pRoXy-FoO",
"accept-charset",
"accept-encoding",
"access-control-request-headers",
"access-control-request-method",
"connection",
"content-length",
"cookie",
"cookie2",
"content-transfer-encoding",
"date",
"expect",
"host",
"keep-alive",
"origin",
"referer",
"te",
"trailer",
"transfer-encoding",
"upgrade",
"user-agent",
"via",
};
for (size_t i = 0; i < arraysize(unsafe_headers); ++i) {
EXPECT_FALSE(HttpUtil::IsSafeHeader(unsafe_headers[i]))
<< unsafe_headers[i];
EXPECT_FALSE(HttpUtil::IsSafeHeader(base::ToUpperASCII(unsafe_headers[i])))
<< unsafe_headers[i];
}
static const char* const safe_headers[] = {
"foo",
"x-",
"x-foo",
"content-disposition",
"update",
"accept-charseta",
"accept_charset",
"accept-encodinga",
"accept_encoding",
"access-control-request-headersa",
"access-control-request-header",
"access_control_request_header",
"access-control-request-methoda",
"access_control_request_method",
"connectiona",
"content-lengtha",
"content_length",
"cookiea",
"cookie2a",
"cookie3",
"content-transfer-encodinga",
"content_transfer_encoding",
"datea",
"expecta",
"hosta",
"keep-alivea",
"keep_alive",
"origina",
"referera",
"referrer",
"tea",
"trailera",
"transfer-encodinga",
"transfer_encoding",
"upgradea",
"user-agenta",
"user_agent",
"viaa",
};
for (size_t i = 0; i < arraysize(safe_headers); ++i) {
EXPECT_TRUE(HttpUtil::IsSafeHeader(safe_headers[i])) << safe_headers[i];
EXPECT_TRUE(HttpUtil::IsSafeHeader(base::ToUpperASCII(safe_headers[i])))
<< safe_headers[i];
}
}
TEST(HttpUtilTest, HeadersIterator) {
std::string headers = "foo: 1\t\r\nbar: hello world\r\nbaz: 3 \r\n";
HttpUtil::HeadersIterator it(headers.begin(), headers.end(), "\r\n");
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("foo"), it.name());
EXPECT_EQ(std::string("1"), it.values());
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("bar"), it.name());
EXPECT_EQ(std::string("hello world"), it.values());
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("baz"), it.name());
EXPECT_EQ(std::string("3"), it.values());
EXPECT_FALSE(it.GetNext());
}
TEST(HttpUtilTest, HeadersIterator_MalformedLine) {
std::string headers = "foo: 1\n: 2\n3\nbar: 4";
HttpUtil::HeadersIterator it(headers.begin(), headers.end(), "\n");
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("foo"), it.name());
EXPECT_EQ(std::string("1"), it.values());
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("bar"), it.name());
EXPECT_EQ(std::string("4"), it.values());
EXPECT_FALSE(it.GetNext());
}
TEST(HttpUtilTest, HeadersIterator_MalformedName) {
std::string headers = "[ignore me] /: 3\r\n";
HttpUtil::HeadersIterator it(headers.begin(), headers.end(), "\r\n");
EXPECT_FALSE(it.GetNext());
}
TEST(HttpUtilTest, HeadersIterator_MalformedNameFollowedByValidLine) {
std::string headers = "[ignore me] /: 3\r\nbar: 4\n";
HttpUtil::HeadersIterator it(headers.begin(), headers.end(), "\r\n");
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("bar"), it.name());
EXPECT_EQ(std::string("4"), it.values());
EXPECT_FALSE(it.GetNext());
}
TEST(HttpUtilTest, HeadersIterator_AdvanceTo) {
std::string headers = "foo: 1\r\n: 2\r\n3\r\nbar: 4";
HttpUtil::HeadersIterator it(headers.begin(), headers.end(), "\r\n");
EXPECT_TRUE(it.AdvanceTo("foo"));
EXPECT_EQ("foo", it.name());
EXPECT_TRUE(it.AdvanceTo("bar"));
EXPECT_EQ("bar", it.name());
EXPECT_FALSE(it.AdvanceTo("blat"));
EXPECT_FALSE(it.GetNext()); // should be at end of headers
}
TEST(HttpUtilTest, HeadersIterator_Reset) {
std::string headers = "foo: 1\r\n: 2\r\n3\r\nbar: 4";
HttpUtil::HeadersIterator it(headers.begin(), headers.end(), "\r\n");
// Search past "foo".
EXPECT_TRUE(it.AdvanceTo("bar"));
// Now try advancing to "foo". This time it should fail since the iterator
// position is past it.
EXPECT_FALSE(it.AdvanceTo("foo"));
it.Reset();
// Now that we reset the iterator position, we should find 'foo'
EXPECT_TRUE(it.AdvanceTo("foo"));
}
TEST(HttpUtilTest, ValuesIterator) {
std::string values = " must-revalidate, no-cache=\"foo, bar\"\t, private ";
HttpUtil::ValuesIterator it(values.begin(), values.end(), ',');
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("must-revalidate"), it.value());
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("no-cache=\"foo, bar\""), it.value());
ASSERT_TRUE(it.GetNext());
EXPECT_EQ(std::string("private"), it.value());
EXPECT_FALSE(it.GetNext());
}
TEST(HttpUtilTest, ValuesIterator_Blanks) {
std::string values = " \t ";
HttpUtil::ValuesIterator it(values.begin(), values.end(), ',');
EXPECT_FALSE(it.GetNext());
}
TEST(HttpUtilTest, Unquote) {
// Replace <backslash> " with ".
EXPECT_STREQ("xyz\"abc", HttpUtil::Unquote("\"xyz\\\"abc\"").c_str());
// Replace <backslash> <backslash> with <backslash>
EXPECT_STREQ("xyz\\abc", HttpUtil::Unquote("\"xyz\\\\abc\"").c_str());
EXPECT_STREQ("xyz\\\\\\abc",
HttpUtil::Unquote("\"xyz\\\\\\\\\\\\abc\"").c_str());
// Replace <backslash> X with X
EXPECT_STREQ("xyzXabc", HttpUtil::Unquote("\"xyz\\Xabc\"").c_str());
// Act as identity function on unquoted inputs.
EXPECT_STREQ("X", HttpUtil::Unquote("X").c_str());
EXPECT_STREQ("\"", HttpUtil::Unquote("\"").c_str());
// Allow single quotes to act as quote marks.
// Not part of RFC 2616.
EXPECT_STREQ("x\"", HttpUtil::Unquote("'x\"'").c_str());
// Allow quotes in the middle of the input.
EXPECT_STREQ("foo\"bar", HttpUtil::Unquote("\"foo\"bar\"").c_str());
// Allow the final quote to be escaped.
EXPECT_STREQ("foo", HttpUtil::Unquote("\"foo\\\"").c_str());
}
TEST(HttpUtilTest, StrictUnquote) {
std::string out;
// Replace <backslash> " with ".
EXPECT_TRUE(HttpUtil::StrictUnquote("\"xyz\\\"abc\"", &out));
EXPECT_STREQ("xyz\"abc", out.c_str());
// Replace <backslash> <backslash> with <backslash>.
EXPECT_TRUE(HttpUtil::StrictUnquote("\"xyz\\\\abc\"", &out));
EXPECT_STREQ("xyz\\abc", out.c_str());
EXPECT_TRUE(HttpUtil::StrictUnquote("\"xyz\\\\\\\\\\\\abc\"", &out));
EXPECT_STREQ("xyz\\\\\\abc", out.c_str());
// Replace <backslash> X with X.
EXPECT_TRUE(HttpUtil::StrictUnquote("\"xyz\\Xabc\"", &out));
EXPECT_STREQ("xyzXabc", out.c_str());
// Empty quoted string.
EXPECT_TRUE(HttpUtil::StrictUnquote("\"\"", &out));
EXPECT_STREQ("", out.c_str());
// Return false on unquoted inputs.
EXPECT_FALSE(HttpUtil::StrictUnquote("X", &out));
EXPECT_FALSE(HttpUtil::StrictUnquote("", &out));
// Return false on mismatched quotes.
EXPECT_FALSE(HttpUtil::StrictUnquote("\"", &out));
EXPECT_FALSE(HttpUtil::StrictUnquote("\"xyz", &out));
EXPECT_FALSE(HttpUtil::StrictUnquote("\"abc'", &out));
// Return false on escaped terminal quote.
EXPECT_FALSE(HttpUtil::StrictUnquote("\"abc\\\"", &out));
EXPECT_FALSE(HttpUtil::StrictUnquote("\"\\\"", &out));
// Allow escaped backslash before terminal quote.
EXPECT_TRUE(HttpUtil::StrictUnquote("\"\\\\\"", &out));
EXPECT_STREQ("\\", out.c_str());
// Don't allow single quotes to act as quote marks.
EXPECT_FALSE(HttpUtil::StrictUnquote("'x\"'", &out));
EXPECT_TRUE(HttpUtil::StrictUnquote("\"x'\"", &out));
EXPECT_STREQ("x'", out.c_str());
EXPECT_FALSE(HttpUtil::StrictUnquote("''", &out));
}
TEST(HttpUtilTest, Quote) {
EXPECT_STREQ("\"xyz\\\"abc\"", HttpUtil::Quote("xyz\"abc").c_str());
// Replace <backslash> <backslash> with <backslash>
EXPECT_STREQ("\"xyz\\\\abc\"", HttpUtil::Quote("xyz\\abc").c_str());
// Replace <backslash> X with X
EXPECT_STREQ("\"xyzXabc\"", HttpUtil::Quote("xyzXabc").c_str());
}
TEST(HttpUtilTest, LocateEndOfHeaders) {
struct {
const char* const input;
int expected_result;
} tests[] = {
{"\r\n", -1},
{"\n", -1},
{"\r", -1},
{"foo", -1},
{"\r\n\r\n", 4},
{"foo\r\nbar\r\n\r\n", 12},
{"foo\nbar\n\n", 9},
{"foo\r\nbar\r\n\r\njunk", 12},
{"foo\nbar\n\njunk", 9},
{"foo\nbar\n\r\njunk", 10},
{"foo\nbar\r\n\njunk", 10},
};
for (size_t i = 0; i < arraysize(tests); ++i) {
int input_len = static_cast<int>(SbStringGetLength(tests[i].input));
int eoh = HttpUtil::LocateEndOfHeaders(tests[i].input, input_len);
EXPECT_EQ(tests[i].expected_result, eoh);
}
}
TEST(HttpUtilTest, LocateEndOfAdditionalHeaders) {
struct {
const char* const input;
int expected_result;
} tests[] = {
{"\r\n", 2},
{"\n", 1},
{"\r", -1},
{"foo", -1},
{"\r\n\r\n", 2},
{"foo\r\nbar\r\n\r\n", 12},
{"foo\nbar\n\n", 9},
{"foo\r\nbar\r\n\r\njunk", 12},
{"foo\nbar\n\njunk", 9},
{"foo\nbar\n\r\njunk", 10},
{"foo\nbar\r\n\njunk", 10},
};
for (size_t i = 0; i < arraysize(tests); ++i) {
int input_len = static_cast<int>(SbStringGetLength(tests[i].input));
int eoh = HttpUtil::LocateEndOfAdditionalHeaders(tests[i].input, input_len);
EXPECT_EQ(tests[i].expected_result, eoh);
}
}
TEST(HttpUtilTest, AssembleRawHeaders) {
// clang-format off
struct {
const char* const input; // with '|' representing '\0'
const char* const expected_result; // with '\0' changed to '|'
} tests[] = {
{ "HTTP/1.0 200 OK\r\nFoo: 1\r\nBar: 2\r\n\r\n",
"HTTP/1.0 200 OK|Foo: 1|Bar: 2||" },
{ "HTTP/1.0 200 OK\nFoo: 1\nBar: 2\n\n",
"HTTP/1.0 200 OK|Foo: 1|Bar: 2||" },
// Valid line continuation (single SP).
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
" continuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1 continuation|"
"Bar: 2||"
},
// Valid line continuation (single HT).
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"\tcontinuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1 continuation|"
"Bar: 2||"
},
// Valid line continuation (multiple SP).
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
" continuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1 continuation|"
"Bar: 2||"
},
// Valid line continuation (multiple HT).
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"\t\t\tcontinuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1 continuation|"
"Bar: 2||"
},
// Valid line continuation (mixed HT, SP).
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
" \t \t continuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1 continuation|"
"Bar: 2||"
},
// Valid multi-line continuation
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
" continuation1\n"
"\tcontinuation2\n"
" continuation3\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1 continuation1 continuation2 continuation3|"
"Bar: 2||"
},
// Continuation of quoted value.
// This is different from what Firefox does, since it
// will preserve the LWS.
{
"HTTP/1.0 200 OK\n"
"Etag: \"34534-d3\n"
" 134q\"\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Etag: \"34534-d3 134q\"|"
"Bar: 2||"
},
// Valid multi-line continuation, full LWS lines
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
" \n"
"\t\t\t\t\n"
"\t continuation\n"
"Bar: 2\n\n",
// One SP per continued line = 3.
"HTTP/1.0 200 OK|"
"Foo: 1 continuation|"
"Bar: 2||"
},
// Valid multi-line continuation, all LWS
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
" \n"
"\t\t\t\t\n"
"\t \n"
"Bar: 2\n\n",
// One SP per continued line = 3.
"HTTP/1.0 200 OK|"
"Foo: 1 |"
"Bar: 2||"
},
// Valid line continuation (No value bytes in first line).
{
"HTTP/1.0 200 OK\n"
"Foo:\n"
" value\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: value|"
"Bar: 2||"
},
// Not a line continuation (can't continue status line).
{
"HTTP/1.0 200 OK\n"
" Foo: 1\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
" Foo: 1|"
"Bar: 2||"
},
// Not a line continuation (can't continue status line).
{
"HTTP/1.0\n"
" 200 OK\n"
"Foo: 1\n"
"Bar: 2\n\n",
"HTTP/1.0|"
" 200 OK|"
"Foo: 1|"
"Bar: 2||"
},
// Not a line continuation (can't continue status line).
{
"HTTP/1.0 404\n"
" Not Found\n"
"Foo: 1\n"
"Bar: 2\n\n",
"HTTP/1.0 404|"
" Not Found|"
"Foo: 1|"
"Bar: 2||"
},
// Unterminated status line.
{
"HTTP/1.0 200 OK",
"HTTP/1.0 200 OK||"
},
// Single terminated, with headers
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"Bar: 2\n",
"HTTP/1.0 200 OK|"
"Foo: 1|"
"Bar: 2||"
},
// Not terminated, with headers
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"Bar: 2",
"HTTP/1.0 200 OK|"
"Foo: 1|"
"Bar: 2||"
},
// Not a line continuation (VT)
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"\vInvalidContinuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1|"
"\vInvalidContinuation|"
"Bar: 2||"
},
// Not a line continuation (formfeed)
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"\fInvalidContinuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1|"
"\fInvalidContinuation|"
"Bar: 2||"
},
// Not a line continuation -- can't continue header names.
{
"HTTP/1.0 200 OK\n"
"Serv\n"
" er: Apache\n"
"\tInvalidContinuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Serv|"
" er: Apache|"
"\tInvalidContinuation|"
"Bar: 2||"
},
// Not a line continuation -- no value to continue.
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"garbage\n"
" not-a-continuation\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
"Foo: 1|"
"garbage|"
" not-a-continuation|"
"Bar: 2||",
},
// Not a line continuation -- no valid name.
{
"HTTP/1.0 200 OK\n"
": 1\n"
" garbage\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
": 1|"
" garbage|"
"Bar: 2||",
},
// Not a line continuation -- no valid name (whitespace)
{
"HTTP/1.0 200 OK\n"
" : 1\n"
" garbage\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|"
" : 1|"
" garbage|"
"Bar: 2||",
},
// Embed NULLs in the status line. They should not be understood
// as line separators.
{
"HTTP/1.0 200 OK|Bar2:0|Baz2:1\r\nFoo: 1\r\nBar: 2\r\n\r\n",
"HTTP/1.0 200 OKBar2:0Baz2:1|Foo: 1|Bar: 2||"
},
// Embed NULLs in a header line. They should not be understood as
// line separators.
{
"HTTP/1.0 200 OK\nFoo: 1|Foo2: 3\nBar: 2\n\n",
"HTTP/1.0 200 OK|Foo: 1Foo2: 3|Bar: 2||"
},
// The embedded NUL at the start of the line (before "Blah:") should not be
// interpreted as LWS (as that would mistake it for a header line
// continuation).
{
"HTTP/1.0 200 OK\n"
"Foo: 1\n"
"|Blah: 3\n"
"Bar: 2\n\n",
"HTTP/1.0 200 OK|Foo: 1|Blah: 3|Bar: 2||"
},
};
// clang-format on
for (size_t i = 0; i < arraysize(tests); ++i) {
std::string input = tests[i].input;
std::replace(input.begin(), input.end(), '|', '\0');
std::string raw = HttpUtil::AssembleRawHeaders(input.data(), input.size());
std::replace(raw.begin(), raw.end(), '\0', '|');
EXPECT_EQ(tests[i].expected_result, raw);
}
}
// Test SpecForRequest().
TEST(HttpUtilTest, RequestUrlSanitize) {
struct {
const char* const url;
const char* const expected_spec;
} tests[] = {
{ // Check that #hash is removed.
"http://www.google.com:78/foobar?query=1#hash",
"http://www.google.com:78/foobar?query=1",
},
{ // The reference may itself contain # -- strip all of it.
"http://192.168.0.1?query=1#hash#10#11#13#14",
"http://192.168.0.1/?query=1",
},
{ // Strip username/password.
"http://user:pass@google.com",
"http://google.com/",
},
{ // https scheme
"https://www.google.com:78/foobar?query=1#hash",
"https://www.google.com:78/foobar?query=1",
},
{ // WebSocket's ws scheme
"ws://www.google.com:78/foobar?query=1#hash",
"ws://www.google.com:78/foobar?query=1",
},
{ // WebSocket's wss scheme
"wss://www.google.com:78/foobar?query=1#hash",
"wss://www.google.com:78/foobar?query=1",
}
};
for (size_t i = 0; i < arraysize(tests); ++i) {
SCOPED_TRACE(i);
GURL url(GURL(tests[i].url));
std::string expected_spec(tests[i].expected_spec);
EXPECT_EQ(expected_spec, HttpUtil::SpecForRequest(url));
}
}
// Test SpecForRequest() for "ftp" scheme.
TEST(HttpUtilTest, SpecForRequestForUrlWithFtpScheme) {
GURL ftp_url("ftp://user:pass@google.com/pub/chromium/");
EXPECT_EQ("ftp://google.com/pub/chromium/",
HttpUtil::SpecForRequest(ftp_url));
}
TEST(HttpUtilTest, GenerateAcceptLanguageHeader) {
std::string header = HttpUtil::GenerateAcceptLanguageHeader("");
EXPECT_TRUE(header.empty());
header = HttpUtil::GenerateAcceptLanguageHeader("es");
EXPECT_EQ(std::string("es"), header);
header = HttpUtil::GenerateAcceptLanguageHeader("en-US,fr,de");
EXPECT_EQ(std::string("en-US,fr;q=0.9,de;q=0.8"), header);
header = HttpUtil::GenerateAcceptLanguageHeader("en-US,fr,de,ko,zh-CN,ja");
EXPECT_EQ(
std::string("en-US,fr;q=0.9,de;q=0.8,ko;q=0.7,zh-CN;q=0.6,ja;q=0.5"),
header);
}
// HttpResponseHeadersTest.GetMimeType also tests ParseContentType.
TEST(HttpUtilTest, ParseContentType) {
// clang-format off
const struct {
const char* const content_type;
const char* const expected_mime_type;
const char* const expected_charset;
const bool expected_had_charset;
const char* const expected_boundary;
} tests[] = {
{ "text/html",
"text/html",
"",
false,
""
},
{ "text/html;",
"text/html",
"",
false,
""
},
{ "text/html; charset=utf-8",
"text/html",
"utf-8",
true,
""
},
// Parameter name is "charset ", not "charset". See https://crbug.com/772834.
{ "text/html; charset =utf-8",
"text/html",
"",
false,
""
},
{ "text/html; charset= utf-8",
"text/html",
"utf-8",
true,
""
},
{ "text/html; charset=utf-8 ",
"text/html",
"utf-8",
true,
""
},
{ "text/html; boundary=\"WebKit-ada-df-dsf-adsfadsfs\"",
"text/html",
"",
false,
"WebKit-ada-df-dsf-adsfadsfs"
},
// Parameter name is "boundary ", not "boundary".
// See https://crbug.com/772834.
{ "text/html; boundary =\"WebKit-ada-df-dsf-adsfadsfs\"",
"text/html",
"",
false,
""
},
// Parameter value includes leading space. See https://crbug.com/772834.
{ "text/html; boundary= \"WebKit-ada-df-dsf-adsfadsfs\"",
"text/html",
"",
false,
"WebKit-ada-df-dsf-adsfadsfs"
},
// Parameter value includes leading space. See https://crbug.com/772834.
{ "text/html; boundary= \"WebKit-ada-df-dsf-adsfadsfs\" ",
"text/html",
"",
false,
"WebKit-ada-df-dsf-adsfadsfs"
},
{ "text/html; boundary=\"WebKit-ada-df-dsf-adsfadsfs \"",
"text/html",
"",
false,
"WebKit-ada-df-dsf-adsfadsfs"
},
{ "text/html; boundary=WebKit-ada-df-dsf-adsfadsfs",
"text/html",
"",
false,
"WebKit-ada-df-dsf-adsfadsfs"
},
{ "text/html; charset",
"text/html",
"",
false,
""
},
{ "text/html; charset=",
"text/html",
"",
false,
""
},
{ "text/html; charset= ",
"text/html",
"",
false,
""
},
{ "text/html; charset= ;",
"text/html",
"",
false,
""
},
// Empty quoted strings are allowed.
{ "text/html; charset=\"\"",
"text/html",
"",
true,
""
},
// Leading and trailing whitespace in quotes is trimmed.
{ "text/html; charset=\" \"",
"text/html",
"",
true,
""
},
{ "text/html; charset=\" foo \"",
"text/html",
"foo",
true,
""
},
// With multiple values, should use the first one.
{ "text/html; charset=foo; charset=utf-8",
"text/html",
"foo",
true,
""
},
{ "text/html; charset; charset=; charset=utf-8",
"text/html",
"utf-8",
true,
""
},
{ "text/html; charset=utf-8; charset=; charset",
"text/html",
"utf-8",
true,
""
},
{ "text/html; boundary=foo; boundary=bar",
"text/html",
"",
false,
"foo"
},
// Stray quotes ignored.
{ "text/html; \"; \"\"; charset=utf-8",
"text/html",
"utf-8",
true,
""
},
// Non-leading quotes kept as-is.
{ "text/html; charset=u\"tf-8\"",
"text/html",
"u\"tf-8\"",
true,
""
},
{ "text/html; charset=\"utf-8\"",
"text/html",
"utf-8",
true,
""
},
// No closing quote.
{ "text/html; charset=\"utf-8",
"text/html",
"utf-8",
true,
""
},
// Check that \ is treated as an escape character.
{ "text/html; charset=\"\\utf\\-\\8\"",
"text/html",
"utf-8",
true,
""
},
// More interseting escape character test - test escaped backslash, escaped
// quote, and backslash at end of input in unterminated quoted string.
{ "text/html; charset=\"\\\\\\\"\\",
"text/html",
"\\\"\\",
true,
""
},
// Check quoted semicolon.
{ "text/html; charset=\";charset=utf-8;\"",
"text/html",
";charset=utf-8;",
true,
""
},
// Unclear if this one should just return utf-8 or not.
{ "text/html; charset= \"utf-8\"",
"text/html",
"utf-8",
true,
""
},
// Regression test for https://crbug.com/772350:
// Single quotes are not delimiters but must be treated as part of charset.
{ "text/html; charset='utf-8'",
"text/html",
"'utf-8'",
true,
""
},
// TODO(abarth): Add more interesting test cases.
};
// clang-format on
for (size_t i = 0; i < arraysize(tests); ++i) {
std::string mime_type;
std::string charset;
bool had_charset = false;
std::string boundary;
HttpUtil::ParseContentType(tests[i].content_type, &mime_type, &charset,
&had_charset, &boundary);
EXPECT_EQ(tests[i].expected_mime_type, mime_type)
<< "content_type=" << tests[i].content_type;
EXPECT_EQ(tests[i].expected_charset, charset)
<< "content_type=" << tests[i].content_type;
EXPECT_EQ(tests[i].expected_had_charset, had_charset)
<< "content_type=" << tests[i].content_type;
EXPECT_EQ(tests[i].expected_boundary, boundary)
<< "content_type=" << tests[i].content_type;
}
}
TEST(HttpUtilTest, ParseContentRangeHeader) {
const struct {
const char* const content_range_header_spec;
bool expected_return_value;
int64_t expected_first_byte_position;
int64_t expected_last_byte_position;
int64_t expected_instance_length;
} tests[] = {
{"", false, -1, -1, -1},
{"megabytes 0-10/50", false, -1, -1, -1},
{"0-10/50", false, -1, -1, -1},
{"Bytes 0-50/51", true, 0, 50, 51},
{"bytes 0-50/51", true, 0, 50, 51},
{"bytes\t0-50/51", false, -1, -1, -1},
{" bytes 0-50/51", true, 0, 50, 51},
{" bytes 0 - 50 \t / \t51", true, 0, 50, 51},
{"bytes 0\t-\t50\t/\t51\t", true, 0, 50, 51},
{" \tbytes\t\t\t 0\t-\t50\t/\t51\t", true, 0, 50, 51},
{"\t bytes \t 0 - 50 / 5 1", false, -1, -1, -1},
{"\t bytes \t 0 - 5 0 / 51", false, -1, -1, -1},
{"bytes 50-0/51", false, -1, -1, -1},
{"bytes * /*", false, -1, -1, -1},
{"bytes * / * ", false, -1, -1, -1},
{"bytes 0-50/*", false, -1, -1, -1},
{"bytes 0-50 / * ", false, -1, -1, -1},
{"bytes 0-10000000000/10000000001", true, 0, 10000000000ll,
10000000001ll},
{"bytes 0-10000000000/10000000000", false, -1, -1, -1},
// 64 bit wraparound.
{"bytes 0 - 9223372036854775807 / 100", false, -1, -1, -1},
// 64 bit wraparound.
{"bytes 0 - 100 / -9223372036854775808", false, -1, -1, -1},
{"bytes */50", false, -1, -1, -1},
{"bytes 0-50/10", false, -1, -1, -1},
{"bytes 40-50/45", false, -1, -1, -1},
{"bytes 0-50/-10", false, -1, -1, -1},
{"bytes 0-0/1", true, 0, 0, 1},
{"bytes 0-40000000000000000000/40000000000000000001", false, -1, -1, -1},
{"bytes 1-/100", false, -1, -1, -1},
{"bytes -/100", false, -1, -1, -1},
{"bytes -1/100", false, -1, -1, -1},
{"bytes 0-1233/*", false, -1, -1, -1},
{"bytes -123 - -1/100", false, -1, -1, -1},
};
for (const auto& test : tests) {
int64_t first_byte_position, last_byte_position, instance_length;
EXPECT_EQ(test.expected_return_value,
HttpUtil::ParseContentRangeHeaderFor206(
test.content_range_header_spec, &first_byte_position,
&last_byte_position, &instance_length))
<< test.content_range_header_spec;
EXPECT_EQ(test.expected_first_byte_position, first_byte_position)
<< test.content_range_header_spec;
EXPECT_EQ(test.expected_last_byte_position, last_byte_position)
<< test.content_range_header_spec;
EXPECT_EQ(test.expected_instance_length, instance_length)
<< test.content_range_header_spec;
}
}
TEST(HttpUtilTest, ParseRetryAfterHeader) {
base::Time::Exploded now_exploded = {2014, 11, 4, 5, 22, 39, 30, 0};
base::Time now;
EXPECT_TRUE(base::Time::FromUTCExploded(now_exploded, &now));
base::Time::Exploded later_exploded = {2015, 1, 5, 1, 12, 34, 56, 0};
base::Time later;
EXPECT_TRUE(base::Time::FromUTCExploded(later_exploded, &later));
const struct {
const char* retry_after_string;
bool expected_return_value;
base::TimeDelta expected_retry_after;
} tests[] = {
{ "", false, base::TimeDelta() },
{ "-3", false, base::TimeDelta() },
{ "-2", false, base::TimeDelta() },
{ "-1", false, base::TimeDelta() },
{ "0", true, base::TimeDelta::FromSeconds(0) },
{ "1", true, base::TimeDelta::FromSeconds(1) },
{ "2", true, base::TimeDelta::FromSeconds(2) },
{ "3", true, base::TimeDelta::FromSeconds(3) },
{ "60", true, base::TimeDelta::FromSeconds(60) },
{ "3600", true, base::TimeDelta::FromSeconds(3600) },
{ "86400", true, base::TimeDelta::FromSeconds(86400) },
{ "Thu, 1 Jan 2015 12:34:56 GMT", true, later - now },
{ "Mon, 1 Jan 1900 12:34:56 GMT", false, base::TimeDelta() }
};
for (size_t i = 0; i < arraysize(tests); ++i) {
base::TimeDelta retry_after;
bool return_value = HttpUtil::ParseRetryAfterHeader(
tests[i].retry_after_string, now, &retry_after);
EXPECT_EQ(tests[i].expected_return_value, return_value)
<< "Test case " << i << ": expected " << tests[i].expected_return_value
<< " but got " << return_value << ".";
if (tests[i].expected_return_value && return_value) {
EXPECT_EQ(tests[i].expected_retry_after, retry_after)
<< "Test case " << i << ": expected "
<< tests[i].expected_retry_after.InSeconds() << "s but got "
<< retry_after.InSeconds() << "s.";
}
}
}
namespace {
void CheckCurrentNameValuePair(HttpUtil::NameValuePairsIterator* parser,
bool expect_valid,
std::string expected_name,
std::string expected_value) {
ASSERT_EQ(expect_valid, parser->valid());
if (!expect_valid) {
return;
}
// Let's make sure that these never change (i.e., when a quoted value is
// unquoted, it should be cached on the first calls and not regenerated
// later).
std::string::const_iterator first_value_begin = parser->value_begin();
std::string::const_iterator first_value_end = parser->value_end();
ASSERT_EQ(expected_name, std::string(parser->name_begin(),
parser->name_end()));
ASSERT_EQ(expected_name, parser->name());
ASSERT_EQ(expected_value, std::string(parser->value_begin(),
parser->value_end()));
ASSERT_EQ(expected_value, parser->value());
// Make sure they didn't/don't change.
ASSERT_TRUE(first_value_begin == parser->value_begin());
ASSERT_TRUE(first_value_end == parser->value_end());
}
void CheckNextNameValuePair(HttpUtil::NameValuePairsIterator* parser,
bool expect_next,
bool expect_valid,
std::string expected_name,
std::string expected_value) {
ASSERT_EQ(expect_next, parser->GetNext());
ASSERT_EQ(expect_valid, parser->valid());
if (!expect_next || !expect_valid) {
return;
}
CheckCurrentNameValuePair(parser,
expect_valid,
expected_name,
expected_value);
}
void CheckInvalidNameValuePair(std::string valid_part,
std::string invalid_part) {
std::string whole_string = valid_part + invalid_part;
HttpUtil::NameValuePairsIterator valid_parser(valid_part.begin(),
valid_part.end(),
';');
HttpUtil::NameValuePairsIterator invalid_parser(whole_string.begin(),
whole_string.end(),
';');
ASSERT_TRUE(valid_parser.valid());
ASSERT_TRUE(invalid_parser.valid());
// Both parsers should return all the same values until "valid_parser" is
// exhausted.
while (valid_parser.GetNext()) {
ASSERT_TRUE(invalid_parser.GetNext());
ASSERT_TRUE(valid_parser.valid());
ASSERT_TRUE(invalid_parser.valid());
ASSERT_EQ(valid_parser.name(), invalid_parser.name());
ASSERT_EQ(valid_parser.value(), invalid_parser.value());
}
// valid_parser is exhausted and remains 'valid'
ASSERT_TRUE(valid_parser.valid());
// invalid_parser's corresponding call to GetNext also returns false...
ASSERT_FALSE(invalid_parser.GetNext());
// ...but the parser is in an invalid state.
ASSERT_FALSE(invalid_parser.valid());
}
} // namespace
TEST(HttpUtilTest, NameValuePairsIteratorCopyAndAssign) {
std::string data = "alpha='\\'a\\''; beta=\" b \"; cappa='c;'; delta=\"d\"";
HttpUtil::NameValuePairsIterator parser_a(data.begin(), data.end(), ';');
EXPECT_TRUE(parser_a.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser_a, true, true, "alpha", "'a'"));
HttpUtil::NameValuePairsIterator parser_b(parser_a);
// a and b now point to same location
ASSERT_NO_FATAL_FAILURE(
CheckCurrentNameValuePair(&parser_b, true, "alpha", "'a'"));
ASSERT_NO_FATAL_FAILURE(
CheckCurrentNameValuePair(&parser_a, true, "alpha", "'a'"));
// advance a, no effect on b
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser_a, true, true, "beta", " b "));
ASSERT_NO_FATAL_FAILURE(
CheckCurrentNameValuePair(&parser_b, true, "alpha", "'a'"));
// assign b the current state of a, no effect on a
parser_b = parser_a;
ASSERT_NO_FATAL_FAILURE(
CheckCurrentNameValuePair(&parser_b, true, "beta", " b "));
ASSERT_NO_FATAL_FAILURE(
CheckCurrentNameValuePair(&parser_a, true, "beta", " b "));
// advance b, no effect on a
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser_b, true, true, "cappa", "c;"));
ASSERT_NO_FATAL_FAILURE(
CheckCurrentNameValuePair(&parser_a, true, "beta", " b "));
}
TEST(HttpUtilTest, NameValuePairsIteratorEmptyInput) {
std::string data;
HttpUtil::NameValuePairsIterator parser(data.begin(), data.end(), ';');
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(
&parser, false, true, std::string(), std::string()));
}
TEST(HttpUtilTest, NameValuePairsIterator) {
std::string data = "alpha=1; beta= 2 ;cappa =' 3; ';"
"delta= \" \\\"4\\\" \"; e= \" '5'\"; e=6;"
"f='\\'\\h\\e\\l\\l\\o\\ \\w\\o\\r\\l\\d\\'';"
"g=''; h='hello'";
HttpUtil::NameValuePairsIterator parser(data.begin(), data.end(), ';');
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "alpha", "1"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "beta", "2"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "cappa", " 3; "));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "delta", " \"4\" "));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "e", " '5'"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "e", "6"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "f", "'hello world'"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "g", std::string()));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "h", "hello"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(
&parser, false, true, std::string(), std::string()));
}
TEST(HttpUtilTest, NameValuePairsIteratorOptionalValues) {
std::string data = "alpha=1; beta;cappa ; delta; e ; f=1";
// Test that the default parser requires values.
HttpUtil::NameValuePairsIterator default_parser(data.begin(), data.end(),
';');
EXPECT_TRUE(default_parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&default_parser, true, true, "alpha", "1"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(&default_parser, false, false,
std::string(), std::string()));
HttpUtil::NameValuePairsIterator values_required_parser(
data.begin(), data.end(), ';',
HttpUtil::NameValuePairsIterator::Values::REQUIRED,
HttpUtil::NameValuePairsIterator::Quotes::NOT_STRICT);
EXPECT_TRUE(values_required_parser.valid());
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(&values_required_parser, true,
true, "alpha", "1"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(
&values_required_parser, false, false, std::string(), std::string()));
HttpUtil::NameValuePairsIterator parser(
data.begin(), data.end(), ';',
HttpUtil::NameValuePairsIterator::Values::NOT_REQUIRED,
HttpUtil::NameValuePairsIterator::Quotes::NOT_STRICT);
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "alpha", "1"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "beta", std::string()));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "cappa", std::string()));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "delta", std::string()));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "e", std::string()));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "f", "1"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(&parser, false, true,
std::string(), std::string()));
EXPECT_TRUE(parser.valid());
}
TEST(HttpUtilTest, NameValuePairsIteratorIllegalInputs) {
ASSERT_NO_FATAL_FAILURE(CheckInvalidNameValuePair("alpha=1", "; beta"));
ASSERT_NO_FATAL_FAILURE(CheckInvalidNameValuePair(std::string(), "beta"));
ASSERT_NO_FATAL_FAILURE(CheckInvalidNameValuePair("alpha=1", "; 'beta'=2"));
ASSERT_NO_FATAL_FAILURE(CheckInvalidNameValuePair(std::string(), "'beta'=2"));
ASSERT_NO_FATAL_FAILURE(CheckInvalidNameValuePair("alpha=1", ";beta="));
ASSERT_NO_FATAL_FAILURE(CheckInvalidNameValuePair("alpha=1",
";beta=;cappa=2"));
// According to the spec this is an error, but it doesn't seem appropriate to
// change our behaviour to be less permissive at this time.
// See NameValuePairsIteratorExtraSeparators test
// ASSERT_NO_FATAL_FAILURE(CheckInvalidNameValuePair("alpha=1", ";; beta=2"));
}
// If we are going to support extra separators against the spec, let's just make
// sure they work rationally.
TEST(HttpUtilTest, NameValuePairsIteratorExtraSeparators) {
std::string data = " ; ;;alpha=1; ;; ; beta= 2;cappa=3;;; ; ";
HttpUtil::NameValuePairsIterator parser(data.begin(), data.end(), ';');
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "alpha", "1"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "beta", "2"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "cappa", "3"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(
&parser, false, true, std::string(), std::string()));
}
// See comments on the implementation of NameValuePairsIterator::GetNext
// regarding this derogation from the spec.
TEST(HttpUtilTest, NameValuePairsIteratorMissingEndQuote) {
std::string data = "name='value";
HttpUtil::NameValuePairsIterator parser(data.begin(), data.end(), ';');
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "name", "value"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(
&parser, false, true, std::string(), std::string()));
}
TEST(HttpUtilTest, NameValuePairsIteratorStrictQuotesEscapedEndQuote) {
std::string data = "foo=bar; name=\"value\\\"";
HttpUtil::NameValuePairsIterator parser(
data.begin(), data.end(), ';',
HttpUtil::NameValuePairsIterator::Values::REQUIRED,
HttpUtil::NameValuePairsIterator::Quotes::STRICT_QUOTES);
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "foo", "bar"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(&parser, false, false,
std::string(), std::string()));
}
TEST(HttpUtilTest, NameValuePairsIteratorStrictQuotesQuoteInValue) {
std::string data = "foo=\"bar\"; name=\"va\"lue\"";
HttpUtil::NameValuePairsIterator parser(
data.begin(), data.end(), ';',
HttpUtil::NameValuePairsIterator::Values::REQUIRED,
HttpUtil::NameValuePairsIterator::Quotes::STRICT_QUOTES);
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "foo", "bar"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(&parser, false, false,
std::string(), std::string()));
}
TEST(HttpUtilTest, NameValuePairsIteratorStrictQuotesMissingEndQuote) {
std::string data = "foo=\"bar\"; name=\"value";
HttpUtil::NameValuePairsIterator parser(
data.begin(), data.end(), ';',
HttpUtil::NameValuePairsIterator::Values::REQUIRED,
HttpUtil::NameValuePairsIterator::Quotes::STRICT_QUOTES);
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "foo", "bar"));
ASSERT_NO_FATAL_FAILURE(CheckNextNameValuePair(&parser, false, false,
std::string(), std::string()));
}
TEST(HttpUtilTest, NameValuePairsIteratorStrictQuotesSingleQuotes) {
std::string data = "foo=\"bar\"; name='value; ok=it'";
HttpUtil::NameValuePairsIterator parser(
data.begin(), data.end(), ';',
HttpUtil::NameValuePairsIterator::Values::REQUIRED,
HttpUtil::NameValuePairsIterator::Quotes::STRICT_QUOTES);
EXPECT_TRUE(parser.valid());
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "foo", "bar"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "name", "'value"));
ASSERT_NO_FATAL_FAILURE(
CheckNextNameValuePair(&parser, true, true, "ok", "it'"));
}
TEST(HttpUtilTest, HasValidators) {
const char* const kMissing = "";
const char* const kEtagEmpty = "\"\"";
const char* const kEtagStrong = "\"strong\"";
const char* const kEtagWeak = "W/\"weak\"";
const char* const kLastModified = "Tue, 15 Nov 1994 12:45:26 GMT";
const char* const kLastModifiedInvalid = "invalid";
const HttpVersion v0_9 = HttpVersion(0, 9);
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kMissing, kMissing));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagStrong, kMissing));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagWeak, kMissing));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagEmpty, kMissing));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kMissing, kLastModified));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagStrong, kLastModified));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagWeak, kLastModified));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagEmpty, kLastModified));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kMissing, kLastModifiedInvalid));
EXPECT_FALSE(
HttpUtil::HasValidators(v0_9, kEtagStrong, kLastModifiedInvalid));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagWeak, kLastModifiedInvalid));
EXPECT_FALSE(HttpUtil::HasValidators(v0_9, kEtagEmpty, kLastModifiedInvalid));
const HttpVersion v1_0 = HttpVersion(1, 0);
EXPECT_FALSE(HttpUtil::HasValidators(v1_0, kMissing, kMissing));
EXPECT_FALSE(HttpUtil::HasValidators(v1_0, kEtagStrong, kMissing));
EXPECT_FALSE(HttpUtil::HasValidators(v1_0, kEtagWeak, kMissing));
EXPECT_FALSE(HttpUtil::HasValidators(v1_0, kEtagEmpty, kMissing));
EXPECT_TRUE(HttpUtil::HasValidators(v1_0, kMissing, kLastModified));
EXPECT_TRUE(HttpUtil::HasValidators(v1_0, kEtagStrong, kLastModified));
EXPECT_TRUE(HttpUtil::HasValidators(v1_0, kEtagWeak, kLastModified));
EXPECT_TRUE(HttpUtil::HasValidators(v1_0, kEtagEmpty, kLastModified));
EXPECT_FALSE(HttpUtil::HasValidators(v1_0, kMissing, kLastModifiedInvalid));
EXPECT_FALSE(
HttpUtil::HasValidators(v1_0, kEtagStrong, kLastModifiedInvalid));
EXPECT_FALSE(HttpUtil::HasValidators(v1_0, kEtagWeak, kLastModifiedInvalid));
EXPECT_FALSE(HttpUtil::HasValidators(v1_0, kEtagEmpty, kLastModifiedInvalid));
const HttpVersion v1_1 = HttpVersion(1, 1);
EXPECT_FALSE(HttpUtil::HasValidators(v1_1, kMissing, kMissing));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagStrong, kMissing));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagWeak, kMissing));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagEmpty, kMissing));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kMissing, kLastModified));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagStrong, kLastModified));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagWeak, kLastModified));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagEmpty, kLastModified));
EXPECT_FALSE(HttpUtil::HasValidators(v1_1, kMissing, kLastModifiedInvalid));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagStrong, kLastModifiedInvalid));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagWeak, kLastModifiedInvalid));
EXPECT_TRUE(HttpUtil::HasValidators(v1_1, kEtagEmpty, kLastModifiedInvalid));
}
TEST(HttpUtilTest, IsValidHeaderValue) {
const char* const invalid_values[] = {
"X-Requested-With: chrome${NUL}Sec-Unsafe: injected",
"X-Requested-With: chrome\r\nSec-Unsafe: injected",
"X-Requested-With: chrome\nSec-Unsafe: injected",
"X-Requested-With: chrome\rSec-Unsafe: injected",
};
for (const std::string& value : invalid_values) {
std::string replaced = value;
base::ReplaceSubstringsAfterOffset(&replaced, 0, "${NUL}",
std::string(1, '\0'));
EXPECT_FALSE(HttpUtil::IsValidHeaderValue(replaced)) << replaced;
}
// Check that all characters permitted by RFC7230 3.2.6 are allowed.
std::string allowed = "\t";
for (char c = '\x20'; c < '\x7F'; ++c) {
allowed.append(1, c);
}
for (int c = 0x80; c <= 0xFF; ++c) {
allowed.append(1, static_cast<char>(c));
}
EXPECT_TRUE(HttpUtil::IsValidHeaderValue(allowed));
}
TEST(HttpUtilTest, IsToken) {
EXPECT_TRUE(HttpUtil::IsToken("valid"));
EXPECT_TRUE(HttpUtil::IsToken("!"));
EXPECT_TRUE(HttpUtil::IsToken("~"));
EXPECT_FALSE(HttpUtil::IsToken(""));
EXPECT_FALSE(HttpUtil::IsToken(base::StringPiece()));
EXPECT_FALSE(HttpUtil::IsToken("hello, world"));
EXPECT_FALSE(HttpUtil::IsToken(" "));
EXPECT_FALSE(HttpUtil::IsToken(base::StringPiece("\0", 1)));
EXPECT_FALSE(HttpUtil::IsToken("\x01"));
EXPECT_FALSE(HttpUtil::IsToken("\x7F"));
EXPECT_FALSE(HttpUtil::IsToken("\x80"));
EXPECT_FALSE(HttpUtil::IsToken("\xff"));
}
TEST(HttpUtilTest, IsLWS) {
EXPECT_FALSE(HttpUtil::IsLWS('\v'));
EXPECT_FALSE(HttpUtil::IsLWS('\0'));
EXPECT_FALSE(HttpUtil::IsLWS('1'));
EXPECT_FALSE(HttpUtil::IsLWS('a'));
EXPECT_FALSE(HttpUtil::IsLWS('.'));
EXPECT_FALSE(HttpUtil::IsLWS('\n'));
EXPECT_FALSE(HttpUtil::IsLWS('\r'));
EXPECT_TRUE(HttpUtil::IsLWS('\t'));
EXPECT_TRUE(HttpUtil::IsLWS(' '));
}
TEST(HttpUtilTest, ParseAcceptEncoding) {
const struct {
const char* const value;
const char* const expected;
} tests[] = {
{"", "*"},
{"identity;q=1, *;q=0", "identity"},
{"identity", "identity"},
{"FOO, Bar", "bar|foo|identity"},
{"foo; q=1", "foo|identity"},
{"abc, foo; Q=1.0", "abc|foo|identity"},
{"abc, foo;q= 1.00 , bar", "abc|bar|foo|identity"},
{"abc, foo; q=1.000, bar", "abc|bar|foo|identity"},
{"abc, foo ; q = 0 , bar", "abc|bar|identity"},
{"abc, foo; q=0.0, bar", "abc|bar|identity"},
{"abc, foo; q=0.00, bar", "abc|bar|identity"},
{"abc, foo; q=0.000, bar", "abc|bar|identity"},
{"abc, foo; q=0.001, bar", "abc|bar|foo|identity"},
{"gzip", "gzip|identity|x-gzip"},
{"x-gzip", "gzip|identity|x-gzip"},
{"compress", "compress|identity|x-compress"},
{"x-compress", "compress|identity|x-compress"},
{"x-compress", "compress|identity|x-compress"},
{"foo bar", "INVALID"},
{"foo;", "INVALID"},
{"foo;w=1", "INVALID"},
{"foo;q+1", "INVALID"},
{"foo;q=2", "INVALID"},
{"foo;q=1.001", "INVALID"},
{"foo;q=0.", "INVALID"},
{"foo,\"bar\"", "INVALID"},
};
for (size_t i = 0; i < arraysize(tests); ++i) {
std::string value(tests[i].value);
std::string reformatted;
std::set<std::string> allowed_encodings;
if (!HttpUtil::ParseAcceptEncoding(value, &allowed_encodings)) {
reformatted = "INVALID";
} else {
std::vector<std::string> encodings_list;
for (auto const& encoding : allowed_encodings)
encodings_list.push_back(encoding);
reformatted = base::JoinString(encodings_list, "|");
}
EXPECT_STREQ(tests[i].expected, reformatted.c_str())
<< "value=\"" << value << "\"";
}
}
TEST(HttpUtilTest, ParseContentEncoding) {
const struct {
const char* const value;
const char* const expected;
} tests[] = {
{"", ""},
{"identity;q=1, *;q=0", "INVALID"},
{"identity", "identity"},
{"FOO, zergli , Bar", "bar|foo|zergli"},
{"foo, *", "INVALID"},
{"foo,\"bar\"", "INVALID"},
};
for (size_t i = 0; i < arraysize(tests); ++i) {
std::string value(tests[i].value);
std::string reformatted;
std::set<std::string> used_encodings;
if (!HttpUtil::ParseContentEncoding(value, &used_encodings)) {
reformatted = "INVALID";
} else {
std::vector<std::string> encodings_list;
for (auto const& encoding : used_encodings)
encodings_list.push_back(encoding);
reformatted = base::JoinString(encodings_list, "|");
}
EXPECT_STREQ(tests[i].expected, reformatted.c_str())
<< "value=\"" << value << "\"";
}
}
} // namespace net