| // Copyright 2014 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <stddef.h> |
| |
| #include <string> |
| #include <vector> |
| |
| #include "base/macros.h" |
| #include "content/browser/appcache/appcache_manifest_parser.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "url/gurl.h" |
| |
| namespace content { |
| |
| class AppCacheManifestParserTest : public testing::Test { |
| }; |
| |
| TEST(AppCacheManifestParserTest, NoData) { |
| GURL url; |
| AppCacheManifest manifest; |
| EXPECT_FALSE(ParseManifest( |
| url, "", 0, PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, manifest)); |
| EXPECT_FALSE(ParseManifest(url, "CACHE MANIFEST\r", 0, // Len is 0. |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| } |
| |
| TEST(AppCacheManifestParserTest, CheckSignature) { |
| GURL url; |
| AppCacheManifest manifest; |
| |
| const std::string kBadSignatures[] = { |
| "foo", |
| "CACHE MANIFEST;V2\r", // not followed by whitespace |
| "CACHE MANIFEST#bad\r", // no whitespace before comment |
| "cache manifest ", // wrong case |
| "#CACHE MANIFEST\r", // comment |
| "xCACHE MANIFEST\n", // bad first char |
| " CACHE MANIFEST\r", // begins with whitespace |
| "\xEF\xBE\xBF" "CACHE MANIFEST\r", // bad UTF-8 BOM value |
| }; |
| |
| for (size_t i = 0; i < arraysize(kBadSignatures); ++i) { |
| const std::string bad = kBadSignatures[i]; |
| EXPECT_FALSE(ParseManifest(url, bad.c_str(), bad.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| } |
| |
| const std::string kGoodSignatures[] = { |
| "CACHE MANIFEST", |
| "CACHE MANIFEST ", |
| "CACHE MANIFEST\r", |
| "CACHE MANIFEST\n", |
| "CACHE MANIFEST\r\n", |
| "CACHE MANIFEST\t# ignore me\r", |
| "CACHE MANIFEST ignore\r\n", |
| "CHROMIUM CACHE MANIFEST\r\n", |
| "\xEF\xBB\xBF" "CACHE MANIFEST \r\n", // BOM present |
| }; |
| |
| for (size_t i = 0; i < arraysize(kGoodSignatures); ++i) { |
| const std::string good = kGoodSignatures[i]; |
| EXPECT_TRUE(ParseManifest(url, good.c_str(), good.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| } |
| } |
| |
| TEST(AppCacheManifestParserTest, NoManifestUrl) { |
| AppCacheManifest manifest; |
| const std::string kData("CACHE MANIFEST\r" |
| "relative/tobase.com\r" |
| "http://absolute.com/addme.com"); |
| const GURL kUrl; |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.explicit_urls.empty()); |
| EXPECT_TRUE(manifest.fallback_namespaces.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| } |
| |
| TEST(AppCacheManifestParserTest, ExplicitUrls) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://www.foo.com"); |
| const std::string kData("CACHE MANIFEST\r" |
| "relative/one\r" |
| "# some comment\r" |
| "http://www.foo.com/two#strip\r\n" |
| "NETWORK:\r" |
| " \t CACHE:\r" |
| "HTTP://www.diff.com/three\r" |
| "FALLBACK:\r" |
| " \t # another comment with leading whitespace\n" |
| "IGNORE:\r" |
| "http://www.foo.com/ignore\r" |
| "CACHE: \r" |
| "garbage:#!@\r" |
| "https://www.foo.com/diffscheme \t \r" |
| " \t relative/four#stripme\n\r" |
| "*\r"); |
| |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.fallback_namespaces.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| |
| base::hash_set<std::string> urls = manifest.explicit_urls; |
| const size_t kExpected = 5; |
| ASSERT_EQ(kExpected, urls.size()); |
| EXPECT_TRUE(urls.find("http://www.foo.com/relative/one") != urls.end()); |
| EXPECT_TRUE(urls.find("http://www.foo.com/two") != urls.end()); |
| EXPECT_TRUE(urls.find("http://www.diff.com/three") != urls.end()); |
| EXPECT_TRUE(urls.find("http://www.foo.com/relative/four") != urls.end()); |
| |
| // Wildcard is treated as a relative URL in explicit section. |
| EXPECT_TRUE(urls.find("http://www.foo.com/*") != urls.end()); |
| |
| // We should get the same results with dangerous features disallowed. |
| manifest = AppCacheManifest(); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_PER_STANDARD, manifest)); |
| EXPECT_TRUE(manifest.fallback_namespaces.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| |
| urls = manifest.explicit_urls; |
| ASSERT_EQ(kExpected, urls.size()); |
| EXPECT_TRUE(urls.find("http://www.foo.com/relative/one") != urls.end()); |
| EXPECT_TRUE(urls.find("http://www.foo.com/two") != urls.end()); |
| EXPECT_TRUE(urls.find("http://www.diff.com/three") != urls.end()); |
| EXPECT_TRUE(urls.find("http://www.foo.com/relative/four") != urls.end()); |
| |
| // Wildcard is treated as a relative URL in explicit section. |
| EXPECT_TRUE(urls.find("http://www.foo.com/*") != urls.end()); |
| } |
| |
| TEST(AppCacheManifestParserTest, WhitelistUrls) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://www.bar.com"); |
| const std::string kData("CACHE MANIFEST\r" |
| "NETWORK:\r" |
| "relative/one\r" |
| "# a comment\r" |
| "http://www.bar.com/two\r" |
| "HTTP://www.diff.com/three#strip\n\r" |
| "FALLBACK:\r" |
| "garbage\r" |
| "UNKNOWN:\r" |
| "http://www.bar.com/ignore\r" |
| "CACHE:\r" |
| "NETWORK:\r" |
| "https://www.wrongscheme.com\n" |
| "relative/four#stripref \t \r" |
| "http://www.five.com\r\n" |
| "*foo\r"); |
| |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.explicit_urls.empty()); |
| EXPECT_TRUE(manifest.fallback_namespaces.empty()); |
| EXPECT_TRUE(manifest.intercept_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| |
| const std::vector<AppCacheNamespace>& online = |
| manifest.online_whitelist_namespaces; |
| const size_t kExpected = 6; |
| ASSERT_EQ(kExpected, online.size()); |
| EXPECT_EQ(APPCACHE_NETWORK_NAMESPACE, online[0].type); |
| EXPECT_FALSE(online[0].is_pattern); |
| EXPECT_TRUE(online[0].target_url.is_empty()); |
| EXPECT_EQ(GURL("http://www.bar.com/relative/one"), online[0].namespace_url); |
| EXPECT_EQ(GURL("http://www.bar.com/two"), online[1].namespace_url); |
| EXPECT_EQ(GURL("http://www.diff.com/three"), online[2].namespace_url); |
| EXPECT_EQ(GURL("http://www.bar.com/relative/four"), online[3].namespace_url); |
| EXPECT_EQ(GURL("http://www.five.com"), online[4].namespace_url); |
| EXPECT_EQ(GURL("http://www.bar.com/*foo"), online[5].namespace_url); |
| } |
| |
| TEST(AppCacheManifestParserTest, FallbackUrls) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://glorp.com"); |
| const std::string kData("CACHE MANIFEST\r" |
| "# a comment\r" |
| "CACHE:\r" |
| "NETWORK:\r" |
| "UNKNOWN:\r" |
| "FALLBACK:\r" |
| "relative/one \t \t http://glorp.com/onefb \t \r" |
| "*\r" |
| "https://glorp.com/wrong http://glorp.com/wrongfb\r" |
| "http://glorp.com/two#strip relative/twofb\r" |
| "HTTP://glorp.com/three relative/threefb#strip\n" |
| "http://glorp.com/three http://glorp.com/three-dup\r" |
| "http://glorp.com/solo \t \r\n" |
| "http://diff.com/ignore http://glorp.com/wronghost\r" |
| "http://glorp.com/wronghost http://diff.com/ohwell\r" |
| "relative/badscheme ftp://glorp.com/ignored\r" |
| "garbage\r\n" |
| "CACHE:\r" |
| "# only fallback urls in this test\r" |
| "FALLBACK:\n" |
| "relative/four#strip relative/fourfb#strip\r" |
| "http://www.glorp.com/notsame relative/skipped\r"); |
| |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.explicit_urls.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| |
| const std::vector<AppCacheNamespace>& fallbacks = |
| manifest.fallback_namespaces; |
| const size_t kExpected = 5; |
| ASSERT_EQ(kExpected, fallbacks.size()); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[0].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[1].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[2].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[3].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[4].type); |
| EXPECT_EQ(GURL("http://glorp.com/relative/one"), |
| fallbacks[0].namespace_url); |
| EXPECT_EQ(GURL("http://glorp.com/onefb"), |
| fallbacks[0].target_url); |
| EXPECT_EQ(GURL("http://glorp.com/two"), |
| fallbacks[1].namespace_url); |
| EXPECT_EQ(GURL("http://glorp.com/relative/twofb"), |
| fallbacks[1].target_url); |
| EXPECT_EQ(GURL("http://glorp.com/three"), |
| fallbacks[2].namespace_url); |
| EXPECT_EQ(GURL("http://glorp.com/relative/threefb"), |
| fallbacks[2].target_url); |
| EXPECT_EQ(GURL("http://glorp.com/three"), // duplicates are stored |
| fallbacks[3].namespace_url); |
| EXPECT_EQ(GURL("http://glorp.com/three-dup"), |
| fallbacks[3].target_url); |
| EXPECT_EQ(GURL("http://glorp.com/relative/four"), |
| fallbacks[4].namespace_url); |
| EXPECT_EQ(GURL("http://glorp.com/relative/fourfb"), |
| fallbacks[4].target_url); |
| EXPECT_TRUE(manifest.intercept_namespaces.empty()); |
| |
| // Nothing should be ignored since all namespaces are in scope. |
| manifest = AppCacheManifest(); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_PER_STANDARD, manifest)); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| } |
| |
| TEST(AppCacheManifestParserTest, FallbackUrlsWithPort) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://www.portme.com:1234"); |
| const std::string kData("CACHE MANIFEST\r" |
| "FALLBACK:\r" |
| "http://www.portme.com:1234/one relative/onefb\r" |
| "HTTP://www.portme.com:9876/wrong http://www.portme.com:1234/ignore\r" |
| "http://www.portme.com:1234/stillwrong http://www.portme.com:42/boo\r" |
| "relative/two relative/twofb\r" |
| "http://www.portme.com:1234/three HTTP://www.portme.com:1234/threefb\r" |
| "http://www.portme.com/noport http://www.portme.com:1234/skipped\r" |
| "http://www.portme.com:1234/skipme http://www.portme.com/noport\r"); |
| |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.explicit_urls.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| |
| const std::vector<AppCacheNamespace>& fallbacks = |
| manifest.fallback_namespaces; |
| const size_t kExpected = 3; |
| ASSERT_EQ(kExpected, fallbacks.size()); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[0].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[1].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[2].type); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/one"), |
| fallbacks[0].namespace_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/relative/onefb"), |
| fallbacks[0].target_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/relative/two"), |
| fallbacks[1].namespace_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/relative/twofb"), |
| fallbacks[1].target_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/three"), |
| fallbacks[2].namespace_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/threefb"), |
| fallbacks[2].target_url); |
| EXPECT_TRUE(manifest.intercept_namespaces.empty()); |
| |
| // Nothing should be ignored since all namespaces are in scope. |
| manifest = AppCacheManifest(); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_PER_STANDARD, manifest)); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| } |
| |
| TEST(AppCacheManifestParserTest, InterceptUrls) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://www.portme.com:1234"); |
| const std::string kData("CHROMIUM CACHE MANIFEST\r" |
| "CHROMIUM-INTERCEPT:\r" |
| "http://www.portme.com:1234/one return relative/int1\r" |
| "HTTP://www.portme.com:9/wrong return http://www.portme.com:1234/ignore\r" |
| "http://www.portme.com:1234/wrong return http://www.portme.com:9/boo\r" |
| "relative/two return relative/int2\r" |
| "relative/three wrong relative/threefb\r" |
| "http://www.portme.com:1234/three return HTTP://www.portme.com:1234/int3\r" |
| "http://www.portme.com/noport return http://www.portme.com:1234/skipped\r" |
| "http://www.portme.com:1234/skipme return http://www.portme.com/noport\r" |
| "relative/wrong/again missing/intercept_type\r"); |
| |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.fallback_namespaces.empty()); |
| EXPECT_TRUE(manifest.explicit_urls.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| |
| const std::vector<AppCacheNamespace>& intercepts = |
| manifest.intercept_namespaces; |
| const size_t kExpected = 3; |
| ASSERT_EQ(kExpected, intercepts.size()); |
| EXPECT_EQ(APPCACHE_INTERCEPT_NAMESPACE, intercepts[0].type); |
| EXPECT_EQ(APPCACHE_INTERCEPT_NAMESPACE, intercepts[1].type); |
| EXPECT_EQ(APPCACHE_INTERCEPT_NAMESPACE, intercepts[2].type); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/one"), |
| intercepts[0].namespace_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/relative/int1"), |
| intercepts[0].target_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/relative/two"), |
| intercepts[1].namespace_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/relative/int2"), |
| intercepts[1].target_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/three"), |
| intercepts[2].namespace_url); |
| EXPECT_EQ(GURL("http://www.portme.com:1234/int3"), |
| intercepts[2].target_url); |
| |
| // Disallow intercepts this time. |
| manifest = AppCacheManifest(); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_PER_STANDARD, manifest)); |
| EXPECT_TRUE(manifest.fallback_namespaces.empty()); |
| EXPECT_TRUE(manifest.explicit_urls.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| EXPECT_TRUE(manifest.intercept_namespaces.empty()); |
| EXPECT_FALSE(manifest.online_whitelist_all); |
| EXPECT_TRUE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| } |
| |
| TEST(AppCacheManifestParserTest, ComboUrls) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://combo.com:42"); |
| const std::string kData("CACHE MANIFEST\r" |
| "relative/explicit-1\r" |
| "# some comment\r" |
| "http://combo.com:99/explicit-2#strip\r" |
| "NETWORK:\r" |
| "http://combo.com/whitelist-1\r" |
| "HTTP://www.diff.com/whitelist-2#strip\r" |
| "*\r" |
| "CACHE:\n\r" |
| "http://www.diff.com/explicit-3\r" |
| "FALLBACK:\r" |
| "http://combo.com:42/fallback-1 http://combo.com:42/fallback-1b\r" |
| "relative/fallback-2 relative/fallback-2b\r" |
| "UNKNOWN:\r\n" |
| "http://combo.com/ignoreme\r" |
| "relative/still-ignored\r" |
| "NETWORK:\r\n" |
| "relative/whitelist-3#strip\r" |
| "http://combo.com:99/whitelist-4\r"); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.online_whitelist_all); |
| |
| base::hash_set<std::string> urls = manifest.explicit_urls; |
| size_t expected = 3; |
| ASSERT_EQ(expected, urls.size()); |
| EXPECT_TRUE(urls.find("http://combo.com:42/relative/explicit-1") != |
| urls.end()); |
| EXPECT_TRUE(urls.find("http://combo.com:99/explicit-2") != urls.end()); |
| EXPECT_TRUE(urls.find("http://www.diff.com/explicit-3") != urls.end()); |
| |
| const std::vector<AppCacheNamespace>& online = |
| manifest.online_whitelist_namespaces; |
| expected = 4; |
| ASSERT_EQ(expected, online.size()); |
| EXPECT_EQ(GURL("http://combo.com/whitelist-1"), |
| online[0].namespace_url); |
| EXPECT_EQ(GURL("http://www.diff.com/whitelist-2"), |
| online[1].namespace_url); |
| EXPECT_EQ(GURL("http://combo.com:42/relative/whitelist-3"), |
| online[2].namespace_url); |
| EXPECT_EQ(GURL("http://combo.com:99/whitelist-4"), |
| online[3].namespace_url); |
| |
| const std::vector<AppCacheNamespace>& fallbacks = |
| manifest.fallback_namespaces; |
| expected = 2; |
| ASSERT_EQ(expected, fallbacks.size()); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[0].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, fallbacks[1].type); |
| EXPECT_EQ(GURL("http://combo.com:42/fallback-1"), |
| fallbacks[0].namespace_url); |
| EXPECT_EQ(GURL("http://combo.com:42/fallback-1b"), |
| fallbacks[0].target_url); |
| EXPECT_EQ(GURL("http://combo.com:42/relative/fallback-2"), |
| fallbacks[1].namespace_url); |
| EXPECT_EQ(GURL("http://combo.com:42/relative/fallback-2b"), |
| fallbacks[1].target_url); |
| |
| EXPECT_TRUE(manifest.intercept_namespaces.empty()); |
| } |
| |
| TEST(AppCacheManifestParserTest, UnusualUtf8) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://bad.com"); |
| const std::string kData("CACHE MANIFEST\r" |
| "\xC0" "invalidutf8\r" |
| "nonbmp" "\xF1\x84\xAB\xBC\r"); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| base::hash_set<std::string> urls = manifest.explicit_urls; |
| EXPECT_TRUE(urls.find("http://bad.com/%EF%BF%BDinvalidutf8") != urls.end()) |
| << "manifest byte stream was passed through, not UTF-8-decoded"; |
| EXPECT_TRUE(urls.find("http://bad.com/nonbmp%F1%84%AB%BC") != urls.end()); |
| } |
| |
| TEST(AppCacheManifestParserTest, IgnoreAfterSpace) { |
| AppCacheManifest manifest; |
| const GURL kUrl("http://smorg.borg"); |
| const std::string kData( |
| "CACHE MANIFEST\r" |
| "resource.txt this stuff after the white space should be ignored\r"); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| |
| base::hash_set<std::string> urls = manifest.explicit_urls; |
| EXPECT_TRUE(urls.find("http://smorg.borg/resource.txt") != urls.end()); |
| } |
| |
| TEST(AppCacheManifestParserTest, DifferentOriginUrlWithSecureScheme) { |
| AppCacheManifest manifest; |
| const GURL kUrl("https://www.foo.com"); |
| const std::string kData("CACHE MANIFEST\r" |
| "CACHE: \r" |
| "relative/secureschemesameorigin\r" |
| "https://www.foo.com/secureschemesameorigin\r" |
| "http://www.xyz.com/secureschemedifforigin\r" |
| "https://www.xyz.com/secureschemedifforigin\r"); |
| |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.fallback_namespaces.empty()); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces.empty()); |
| |
| base::hash_set<std::string> urls = manifest.explicit_urls; |
| const size_t kExpected = 3; |
| ASSERT_EQ(kExpected, urls.size()); |
| EXPECT_TRUE(urls.find("https://www.foo.com/relative/secureschemesameorigin") |
| != urls.end()); |
| EXPECT_TRUE(urls.find("https://www.foo.com/secureschemesameorigin") != |
| urls.end()); |
| EXPECT_FALSE(urls.find("http://www.xyz.com/secureschemedifforigin") != |
| urls.end()); |
| EXPECT_TRUE(urls.find("https://www.xyz.com/secureschemedifforigin") != |
| urls.end()); |
| } |
| |
| TEST(AppCacheManifestParserTest, PatternMatching) { |
| const GURL kUrl("http://foo.com/manifest"); |
| const std::string kManifestBody( |
| "CACHE MANIFEST\r" |
| "CACHE: \r" |
| "http://foo.com/page.html\r" |
| "CHROMIUM-INTERCEPT:\r" |
| "http://foo.com/intercept_prefix return /prefix\r" |
| "http://foo.com/intercept_pattern return /pattern isPattern\r" |
| "http://foo.com/*/intercept_pattern?query return /pattern isPattern\r" |
| "FALLBACK:\r" |
| "http://foo.com/fallback_prefix /prefix wrongAnnotation\r" |
| "http://foo.com/fallback_pattern* /pattern\tisPattern \r" |
| "NETWORK:\r" |
| "*\r" |
| "isPattern\r" // should not be interpretted as a pattern |
| "http://foo.com/network_pattern* isPattern\r"); |
| |
| |
| AppCacheManifest manifest; |
| EXPECT_TRUE(ParseManifest(kUrl, kManifestBody.c_str(), kManifestBody.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_TRUE(manifest.online_whitelist_all); |
| EXPECT_FALSE(manifest.did_ignore_intercept_namespaces); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| EXPECT_EQ(1u, manifest.explicit_urls.size()); |
| EXPECT_EQ(3u, manifest.intercept_namespaces.size()); |
| EXPECT_EQ(2u, manifest.fallback_namespaces.size()); |
| EXPECT_EQ(2u, manifest.online_whitelist_namespaces.size()); |
| EXPECT_EQ(APPCACHE_INTERCEPT_NAMESPACE, |
| manifest.intercept_namespaces[0].type); |
| EXPECT_EQ(APPCACHE_FALLBACK_NAMESPACE, manifest.fallback_namespaces[0].type); |
| EXPECT_EQ(APPCACHE_NETWORK_NAMESPACE, |
| manifest.online_whitelist_namespaces[0].type); |
| EXPECT_FALSE(manifest.intercept_namespaces[0].is_pattern); |
| EXPECT_TRUE(manifest.intercept_namespaces[1].is_pattern); |
| EXPECT_TRUE(manifest.intercept_namespaces[2].is_pattern); |
| EXPECT_FALSE(manifest.fallback_namespaces[0].is_pattern); |
| EXPECT_TRUE(manifest.fallback_namespaces[1].is_pattern); |
| EXPECT_FALSE(manifest.online_whitelist_namespaces[0].is_pattern); |
| EXPECT_TRUE(manifest.online_whitelist_namespaces[1].is_pattern); |
| EXPECT_EQ( |
| GURL("http://foo.com/*/intercept_pattern?query"), |
| manifest.intercept_namespaces[2].namespace_url); |
| EXPECT_EQ( |
| GURL("http://foo.com/pattern"), |
| manifest.intercept_namespaces[2].target_url); |
| EXPECT_EQ( |
| GURL("http://foo.com/fallback_pattern*"), |
| manifest.fallback_namespaces[1].namespace_url); |
| EXPECT_EQ( |
| GURL("http://foo.com/pattern"), |
| manifest.fallback_namespaces[1].target_url); |
| EXPECT_EQ( |
| GURL("http://foo.com/isPattern"), |
| manifest.online_whitelist_namespaces[0].namespace_url); |
| EXPECT_EQ( |
| GURL(), |
| manifest.online_whitelist_namespaces[0].target_url); |
| EXPECT_EQ( |
| GURL("http://foo.com/network_pattern*"), |
| manifest.online_whitelist_namespaces[1].namespace_url); |
| EXPECT_EQ( |
| GURL(), |
| manifest.online_whitelist_namespaces[1].target_url); |
| } |
| |
| TEST(AppCacheManifestParserTest, IgnoreDangerousFallbacks) { |
| const GURL kUrl("http://foo.com/scope/manifest?with_query_args"); |
| const std::string kData( |
| "CACHE MANIFEST\r" |
| "FALLBACK:\r" |
| "http://foo.com/scope/ fallback_url\r" |
| "http://foo.com/out_of_scope/ fallback_url\r"); |
| |
| // Scope matching depends on resolving "." as a relative url. |
| EXPECT_EQ(kUrl.GetWithoutFilename().spec(), |
| std::string("http://foo.com/scope/")); |
| |
| AppCacheManifest manifest; |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_ALLOWING_DANGEROUS_FEATURES, |
| manifest)); |
| EXPECT_FALSE(manifest.did_ignore_fallback_namespaces); |
| EXPECT_EQ(2u, manifest.fallback_namespaces.size()); |
| |
| manifest = AppCacheManifest(); |
| EXPECT_TRUE(ParseManifest(kUrl, kData.c_str(), kData.length(), |
| PARSE_MANIFEST_PER_STANDARD, manifest)); |
| EXPECT_TRUE(manifest.did_ignore_fallback_namespaces); |
| EXPECT_EQ(1u, manifest.fallback_namespaces.size()); |
| EXPECT_EQ(GURL("http://foo.com/scope/"), |
| manifest.fallback_namespaces[0].namespace_url); |
| } |
| |
| } // namespace content |