| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/base/url_util.h" |
| |
| #include <ostream> |
| |
| #include "base/format_macros.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/strings/utf_string_conversions.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "url/gurl.h" |
| #include "url/url_util.h" |
| |
| using base::ASCIIToUTF16; |
| using base::WideToUTF16; |
| |
| namespace net { |
| namespace { |
| |
| TEST(UrlUtilTest, AppendQueryParameter) { |
| // Appending a name-value pair to a URL without a query component. |
| EXPECT_EQ("http://example.com/path?name=value", |
| AppendQueryParameter(GURL("http://example.com/path"), |
| "name", "value").spec()); |
| |
| // Appending a name-value pair to a URL with a query component. |
| // The original component should be preserved, and the new pair should be |
| // appended with '&'. |
| EXPECT_EQ("http://example.com/path?existing=one&name=value", |
| AppendQueryParameter(GURL("http://example.com/path?existing=one"), |
| "name", "value").spec()); |
| |
| // Appending a name-value pair with unsafe characters included. The |
| // unsafe characters should be escaped. |
| EXPECT_EQ("http://example.com/path?existing=one&na+me=v.alue%3D", |
| AppendQueryParameter(GURL("http://example.com/path?existing=one"), |
| "na me", "v.alue=").spec()); |
| |
| } |
| |
| TEST(UrlUtilTest, AppendOrReplaceQueryParameter) { |
| // Appending a name-value pair to a URL without a query component. |
| EXPECT_EQ("http://example.com/path?name=value", |
| AppendOrReplaceQueryParameter(GURL("http://example.com/path"), |
| "name", "value").spec()); |
| |
| // Appending a name-value pair to a URL with a query component. |
| // The original component should be preserved, and the new pair should be |
| // appended with '&'. |
| EXPECT_EQ("http://example.com/path?existing=one&name=value", |
| AppendOrReplaceQueryParameter( |
| GURL("http://example.com/path?existing=one"), |
| "name", "value").spec()); |
| |
| // Appending a name-value pair with unsafe characters included. The |
| // unsafe characters should be escaped. |
| EXPECT_EQ("http://example.com/path?existing=one&na+me=v.alue%3D", |
| AppendOrReplaceQueryParameter( |
| GURL("http://example.com/path?existing=one"), |
| "na me", "v.alue=").spec()); |
| |
| // Replace value of an existing paramater. |
| EXPECT_EQ("http://example.com/path?existing=one&name=new", |
| AppendOrReplaceQueryParameter( |
| GURL("http://example.com/path?existing=one&name=old"), |
| "name", "new").spec()); |
| |
| // Replace a name-value pair with unsafe characters included. The |
| // unsafe characters should be escaped. |
| EXPECT_EQ("http://example.com/path?na+me=n.ew%3D&existing=one", |
| AppendOrReplaceQueryParameter( |
| GURL("http://example.com/path?na+me=old&existing=one"), |
| "na me", "n.ew=").spec()); |
| |
| // Replace the value of first parameter with this name only. |
| EXPECT_EQ("http://example.com/path?name=new&existing=one&name=old", |
| AppendOrReplaceQueryParameter( |
| GURL("http://example.com/path?name=old&existing=one&name=old"), |
| "name", "new").spec()); |
| |
| // Preserve the content of the original params regarless of our failure to |
| // interpret them correctly. |
| EXPECT_EQ("http://example.com/path?bar&name=new&left=&" |
| "=right&=&&name=again", |
| AppendOrReplaceQueryParameter( |
| GURL("http://example.com/path?bar&name=old&left=&" |
| "=right&=&&name=again"), |
| "name", "new").spec()); |
| } |
| |
| TEST(UrlUtilTest, GetValueForKeyInQuery) { |
| GURL url("http://example.com/path?name=value&boolParam&" |
| "url=http://test.com/q?n1%3Dv1%26n2"); |
| std::string value; |
| |
| // False when getting a non-existent query param. |
| EXPECT_FALSE(GetValueForKeyInQuery(url, "non-exist", &value)); |
| |
| // True when query param exist. |
| EXPECT_TRUE(GetValueForKeyInQuery(url, "name", &value)); |
| EXPECT_EQ("value", value); |
| |
| EXPECT_TRUE(GetValueForKeyInQuery(url, "boolParam", &value)); |
| EXPECT_EQ("", value); |
| |
| EXPECT_TRUE(GetValueForKeyInQuery(url, "url", &value)); |
| EXPECT_EQ("http://test.com/q?n1=v1&n2", value); |
| } |
| |
| TEST(UrlUtilTest, GetValueForKeyInQueryInvalidURL) { |
| GURL url("http://%01/?test"); |
| std::string value; |
| |
| // Always false when parsing an invalid URL. |
| EXPECT_FALSE(GetValueForKeyInQuery(url, "test", &value)); |
| } |
| |
| TEST(UrlUtilTest, ParseQuery) { |
| const GURL url("http://example.com/path?name=value&boolParam&" |
| "url=http://test.com/q?n1%3Dv1%26n2&" |
| "multikey=value1&multikey=value2&multikey"); |
| QueryIterator it(url); |
| |
| ASSERT_FALSE(it.IsAtEnd()); |
| EXPECT_EQ("name", it.GetKey()); |
| EXPECT_EQ("value", it.GetValue()); |
| EXPECT_EQ("value", it.GetUnescapedValue()); |
| it.Advance(); |
| |
| ASSERT_FALSE(it.IsAtEnd()); |
| EXPECT_EQ("boolParam", it.GetKey()); |
| EXPECT_EQ("", it.GetValue()); |
| EXPECT_EQ("", it.GetUnescapedValue()); |
| it.Advance(); |
| |
| ASSERT_FALSE(it.IsAtEnd()); |
| EXPECT_EQ("url", it.GetKey()); |
| EXPECT_EQ("http://test.com/q?n1%3Dv1%26n2", it.GetValue()); |
| EXPECT_EQ("http://test.com/q?n1=v1&n2", it.GetUnescapedValue()); |
| it.Advance(); |
| |
| ASSERT_FALSE(it.IsAtEnd()); |
| EXPECT_EQ("multikey", it.GetKey()); |
| EXPECT_EQ("value1", it.GetValue()); |
| EXPECT_EQ("value1", it.GetUnescapedValue()); |
| it.Advance(); |
| |
| ASSERT_FALSE(it.IsAtEnd()); |
| EXPECT_EQ("multikey", it.GetKey()); |
| EXPECT_EQ("value2", it.GetValue()); |
| EXPECT_EQ("value2", it.GetUnescapedValue()); |
| it.Advance(); |
| |
| ASSERT_FALSE(it.IsAtEnd()); |
| EXPECT_EQ("multikey", it.GetKey()); |
| EXPECT_EQ("", it.GetValue()); |
| EXPECT_EQ("", it.GetUnescapedValue()); |
| it.Advance(); |
| |
| EXPECT_TRUE(it.IsAtEnd()); |
| } |
| |
| TEST(UrlUtilTest, ParseQueryInvalidURL) { |
| const GURL url("http://%01/?test"); |
| QueryIterator it(url); |
| EXPECT_TRUE(it.IsAtEnd()); |
| } |
| |
| TEST(UrlUtilTest, ParseHostAndPort) { |
| const struct { |
| const char* const input; |
| bool success; |
| const char* const expected_host; |
| int expected_port; |
| } tests[] = { |
| // Valid inputs: |
| {"foo:10", true, "foo", 10}, |
| {"foo", true, "foo", -1}, |
| { |
| "[1080:0:0:0:8:800:200C:4171]:11", |
| true, |
| "1080:0:0:0:8:800:200C:4171", |
| 11 |
| }, |
| { |
| "[1080:0:0:0:8:800:200C:4171]", |
| true, |
| "1080:0:0:0:8:800:200C:4171", |
| -1 |
| }, |
| |
| // Because no validation is done on the host, the following are accepted, |
| // even though they are invalid names. |
| {"]", true, "]", -1}, |
| {"::1", true, ":", 1}, |
| // Invalid inputs: |
| {"foo:bar", false, "", -1}, |
| {"foo:", false, "", -1}, |
| {":", false, "", -1}, |
| {":80", false, "", -1}, |
| {"", false, "", -1}, |
| {"porttoolong:300000", false, "", -1}, |
| {"usrname@host", false, "", -1}, |
| {"usrname:password@host", false, "", -1}, |
| {":password@host", false, "", -1}, |
| {":password@host:80", false, "", -1}, |
| {":password@host", false, "", -1}, |
| {"@host", false, "", -1}, |
| {"[", false, "", -1}, |
| {"[]", false, "", -1}, |
| }; |
| |
| for (const auto& test : tests) { |
| std::string host; |
| int port; |
| bool ok = ParseHostAndPort(test.input, &host, &port); |
| EXPECT_EQ(test.success, ok); |
| |
| if (test.success) { |
| EXPECT_EQ(test.expected_host, host); |
| EXPECT_EQ(test.expected_port, port); |
| } |
| } |
| } |
| TEST(UrlUtilTest, GetHostAndPort) { |
| const struct { |
| GURL url; |
| const char* const expected_host_and_port; |
| } tests[] = { |
| { GURL("http://www.foo.com/x"), "www.foo.com:80"}, |
| { GURL("http://www.foo.com:21/x"), "www.foo.com:21"}, |
| |
| // For IPv6 literals should always include the brackets. |
| { GURL("http://[1::2]/x"), "[1::2]:80"}, |
| { GURL("http://[::a]:33/x"), "[::a]:33"}, |
| }; |
| for (const auto& test : tests) { |
| std::string host_and_port = GetHostAndPort(test.url); |
| EXPECT_EQ(std::string(test.expected_host_and_port), host_and_port); |
| } |
| } |
| |
| TEST(UrlUtilTest, GetHostAndOptionalPort) { |
| const struct { |
| GURL url; |
| const char* const expected_host_and_port; |
| } tests[] = { |
| { GURL("http://www.foo.com/x"), "www.foo.com"}, |
| { GURL("http://www.foo.com:21/x"), "www.foo.com:21"}, |
| |
| // For IPv6 literals should always include the brackets. |
| { GURL("http://[1::2]/x"), "[1::2]"}, |
| { GURL("http://[::a]:33/x"), "[::a]:33"}, |
| }; |
| for (const auto& test : tests) { |
| std::string host_and_port = GetHostAndOptionalPort(test.url); |
| EXPECT_EQ(std::string(test.expected_host_and_port), host_and_port); |
| } |
| } |
| |
| TEST(UrlUtilTest, GetHostOrSpecFromURL) { |
| EXPECT_EQ("example.com", |
| GetHostOrSpecFromURL(GURL("http://example.com/test"))); |
| EXPECT_EQ("example.com", |
| GetHostOrSpecFromURL(GURL("http://example.com./test"))); |
| EXPECT_EQ("file:///tmp/test.html", |
| GetHostOrSpecFromURL(GURL("file:///tmp/test.html"))); |
| } |
| |
| TEST(UrlUtilTest, GetSuperdomain) { |
| struct { |
| const char* const domain; |
| const char* const expected_superdomain; |
| } tests[] = { |
| // Basic cases |
| {"foo.bar.example", "bar.example"}, |
| {"bar.example", "example"}, |
| {"example", ""}, |
| |
| // Returned value may be an eTLD. |
| {"google.com", "com"}, |
| {"google.co.uk", "co.uk"}, |
| |
| // Weird cases. |
| {"", ""}, |
| {"has.trailing.dot.", "trailing.dot."}, |
| {"dot.", ""}, |
| {".has.leading.dot", "has.leading.dot"}, |
| {".", ""}, |
| {"..", "."}, |
| {"127.0.0.1", "0.0.1"}, |
| }; |
| |
| for (const auto& test : tests) { |
| EXPECT_EQ(test.expected_superdomain, GetSuperdomain(test.domain)); |
| } |
| } |
| |
| TEST(UrlUtilTest, IsSubdomainOf) { |
| struct { |
| const char* subdomain; |
| const char* superdomain; |
| bool is_subdomain; |
| } tests[] = { |
| {"bar.foo.com", "foo.com", true}, |
| {"barfoo.com", "foo.com", false}, |
| {"bar.foo.com", "com", true}, |
| {"bar.foo.com", "other.com", false}, |
| {"bar.foo.com", "bar.foo.com", true}, |
| {"bar.foo.com", "baz.foo.com", false}, |
| {"bar.foo.com", "baz.bar.foo.com", false}, |
| {"bar.foo.com", "ar.foo.com", false}, |
| {"foo.com", "foo.com.", false}, |
| {"bar.foo.com", "foo.com.", false}, |
| {"", "", true}, |
| {"a", "", false}, |
| {"", "a", false}, |
| {"127.0.0.1", "0.0.1", true}, // Don't do this... |
| }; |
| |
| for (const auto& test : tests) { |
| EXPECT_EQ(test.is_subdomain, |
| IsSubdomainOf(test.subdomain, test.superdomain)); |
| } |
| } |
| |
| TEST(UrlUtilTest, CompliantHost) { |
| struct { |
| const char* const host; |
| bool expected_output; |
| } compliant_host_cases[] = { |
| {"", false}, |
| {"a", true}, |
| {"-", false}, |
| {"_", false}, |
| {".", false}, |
| {"9", true}, |
| {"9a", true}, |
| {"9_", true}, |
| {"a.", true}, |
| {"a.a", true}, |
| {"9.a", true}, |
| {"a.9", true}, |
| {"_9a", false}, |
| {"-9a", false}, |
| {"a.a9", true}, |
| {"_.9a", true}, |
| {"a.-a9", false}, |
| {"a+9a", false}, |
| {"-a.a9", true}, |
| {"a_.a9", true}, |
| {"1-.a-b", true}, |
| {"1_.a-b", true}, |
| {"1-2.a_b", true}, |
| {"a.b.c.d.e", true}, |
| {"1.2.3.4.5", true}, |
| {"1.2.3.4.5.", true}, |
| }; |
| |
| for (const auto& compliant_host : compliant_host_cases) { |
| EXPECT_EQ(compliant_host.expected_output, |
| IsCanonicalizedHostCompliant(compliant_host.host)); |
| } |
| } |
| |
| struct NonUniqueNameTestData { |
| bool is_unique; |
| const char* const hostname; |
| }; |
| |
| // Google Test pretty-printer. |
| void PrintTo(const NonUniqueNameTestData& data, std::ostream* os) { |
| ASSERT_TRUE(data.hostname); |
| *os << " hostname: " << testing::PrintToString(data.hostname) |
| << "; is_unique: " << testing::PrintToString(data.is_unique); |
| } |
| |
| const NonUniqueNameTestData kNonUniqueNameTestData[] = { |
| // Domains under ICANN-assigned domains. |
| { true, "google.com" }, |
| { true, "google.co.uk" }, |
| // Domains under private registries. |
| { true, "appspot.com" }, |
| { true, "test.appspot.com" }, |
| // Unreserved IPv4 addresses (in various forms). |
| { true, "8.8.8.8" }, |
| { true, "99.64.0.0" }, |
| { true, "212.15.0.0" }, |
| { true, "212.15" }, |
| { true, "212.15.0" }, |
| { true, "3557752832" }, |
| // Reserved IPv4 addresses (in various forms). |
| { false, "192.168.0.0" }, |
| { false, "192.168.0.6" }, |
| { false, "10.0.0.5" }, |
| { false, "10.0" }, |
| { false, "10.0.0" }, |
| { false, "3232235526" }, |
| // Unreserved IPv6 addresses. |
| { true, "FFC0:ba98:7654:3210:FEDC:BA98:7654:3210" }, |
| { true, "2000:ba98:7654:2301:EFCD:BA98:7654:3210" }, |
| // Reserved IPv6 addresses. |
| { false, "::192.9.5.5" }, |
| { false, "FEED::BEEF" }, |
| { false, "FEC0:ba98:7654:3210:FEDC:BA98:7654:3210" }, |
| // 'internal'/non-IANA assigned domains. |
| { false, "intranet" }, |
| { false, "intranet." }, |
| { false, "intranet.example" }, |
| { false, "host.intranet.example" }, |
| // gTLDs under discussion, but not yet assigned. |
| { false, "intranet.corp" }, |
| { false, "intranet.internal" }, |
| // Invalid host names are treated as unique - but expected to be |
| // filtered out before then. |
| { true, "junk)(£)$*!@~#" }, |
| { true, "w$w.example.com" }, |
| { true, "nocolonsallowed:example" }, |
| { true, "[::4.5.6.9]" }, |
| }; |
| |
| class UrlUtilNonUniqueNameTest |
| : public testing::TestWithParam<NonUniqueNameTestData> { |
| public: |
| virtual ~UrlUtilNonUniqueNameTest() = default; |
| |
| protected: |
| bool IsUnique(const std::string& hostname) { |
| return !IsHostnameNonUnique(hostname); |
| } |
| }; |
| |
| // Test that internal/non-unique names are properly identified as such, but |
| // that IP addresses and hosts beneath registry-controlled domains are flagged |
| // as unique names. |
| TEST_P(UrlUtilNonUniqueNameTest, IsHostnameNonUnique) { |
| const NonUniqueNameTestData& test_data = GetParam(); |
| |
| EXPECT_EQ(test_data.is_unique, IsUnique(test_data.hostname)); |
| } |
| |
| INSTANTIATE_TEST_SUITE_P(All, |
| UrlUtilNonUniqueNameTest, |
| testing::ValuesIn(kNonUniqueNameTestData)); |
| |
| TEST(UrlUtilTest, IsLocalhost) { |
| EXPECT_TRUE(HostStringIsLocalhost("localhost")); |
| EXPECT_TRUE(HostStringIsLocalhost("localHosT")); |
| EXPECT_TRUE(HostStringIsLocalhost("localhost.")); |
| EXPECT_TRUE(HostStringIsLocalhost("localHost.")); |
| EXPECT_TRUE(HostStringIsLocalhost("127.0.0.1")); |
| EXPECT_TRUE(HostStringIsLocalhost("127.0.1.0")); |
| EXPECT_TRUE(HostStringIsLocalhost("127.1.0.0")); |
| EXPECT_TRUE(HostStringIsLocalhost("127.0.0.255")); |
| EXPECT_TRUE(HostStringIsLocalhost("127.0.255.0")); |
| EXPECT_TRUE(HostStringIsLocalhost("127.255.0.0")); |
| EXPECT_TRUE(HostStringIsLocalhost("::1")); |
| EXPECT_TRUE(HostStringIsLocalhost("0:0:0:0:0:0:0:1")); |
| EXPECT_TRUE(HostStringIsLocalhost("foo.localhost")); |
| EXPECT_TRUE(HostStringIsLocalhost("foo.localhost.")); |
| EXPECT_TRUE(HostStringIsLocalhost("foo.localhoST")); |
| EXPECT_TRUE(HostStringIsLocalhost("foo.localhoST.")); |
| |
| EXPECT_FALSE(HostStringIsLocalhost("localhost.localdomain")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost.localDOMain")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost.localdomain.")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost6")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost6.")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost6.localdomain6")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost6.localdomain6.")); |
| |
| EXPECT_FALSE(HostStringIsLocalhost("localhostx")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost.x")); |
| EXPECT_FALSE(HostStringIsLocalhost("foo.localdomain")); |
| EXPECT_FALSE(HostStringIsLocalhost("foo.localdomain.x")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost6x")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost.localdomain6")); |
| EXPECT_FALSE(HostStringIsLocalhost("localhost6.localdomain")); |
| EXPECT_FALSE(HostStringIsLocalhost("127.0.0.1.1")); |
| EXPECT_FALSE(HostStringIsLocalhost(".127.0.0.255")); |
| EXPECT_FALSE(HostStringIsLocalhost("::2")); |
| EXPECT_FALSE(HostStringIsLocalhost("::1:1")); |
| EXPECT_FALSE(HostStringIsLocalhost("0:0:0:0:1:0:0:1")); |
| EXPECT_FALSE(HostStringIsLocalhost("::1:1")); |
| EXPECT_FALSE(HostStringIsLocalhost("0:0:0:0:0:0:0:0:1")); |
| EXPECT_FALSE(HostStringIsLocalhost("foo.localhost.com")); |
| EXPECT_FALSE(HostStringIsLocalhost("foo.localhoste")); |
| EXPECT_FALSE(HostStringIsLocalhost("foo.localhos")); |
| EXPECT_FALSE(HostStringIsLocalhost("[::1]")); |
| |
| GURL localhost6("http://[::1]/"); |
| EXPECT_TRUE(IsLocalhost(localhost6)); |
| } |
| |
| TEST(UrlUtilTest, SimplifyUrlForRequest) { |
| struct { |
| const char* const input_url; |
| const char* const expected_simplified_url; |
| } tests[] = { |
| { |
| // Reference section should be stripped. |
| "http://www.google.com:78/foobar?query=1#hash", |
| "http://www.google.com:78/foobar?query=1", |
| }, |
| { |
| // Reference section can itself contain #. |
| "http://192.168.0.1?query=1#hash#10#11#13#14", |
| "http://192.168.0.1?query=1", |
| }, |
| { // Strip username/password. |
| "http://user:[email protected]", |
| "http://google.com/", |
| }, |
| { // Strip both the reference and the username/password. |
| "http://user:[email protected]:80/sup?yo#X#X", |
| "http://google.com/sup?yo", |
| }, |
| { // Try an HTTPS URL -- strip both the reference and the username/password. |
| "https://user:[email protected]:80/sup?yo#X#X", |
| "https://google.com:80/sup?yo", |
| }, |
| { // Try an FTP URL -- strip both the reference and the username/password. |
| "ftp://user:[email protected]:80/sup?yo#X#X", |
| "ftp://google.com:80/sup?yo", |
| }, |
| { // Try a nonstandard URL |
| "foobar://user:[email protected]:80/sup?yo#X#X", |
| "foobar://user:[email protected]:80/sup?yo", |
| }, |
| }; |
| for (const auto& test : tests) { |
| SCOPED_TRACE(test.input_url); |
| GURL input_url(GURL(test.input_url)); |
| GURL expected_url(GURL(test.expected_simplified_url)); |
| EXPECT_EQ(expected_url, SimplifyUrlForRequest(input_url)); |
| } |
| } |
| |
| TEST(UrlUtilTest, ChangeWebSocketSchemeToHttpScheme) { |
| struct { |
| const char* const input_url; |
| const char* const expected_output_url; |
| } tests[] = { |
| {"ws://google.com:78/path?query=1", "http://google.com:78/path?query=1"}, |
| {"wss://google.com:441/path?q=1", "https://google.com:441/path?q=1"}}; |
| for (const auto& test : tests) { |
| GURL input_url(test.input_url); |
| GURL expected_output_url(test.expected_output_url); |
| EXPECT_EQ(expected_output_url, |
| ChangeWebSocketSchemeToHttpScheme(input_url)); |
| } |
| } |
| |
| TEST(UrlUtilTest, SchemeHasNetworkHost) { |
| const char kCustomSchemeWithHostPortAndUserInformation[] = "foo"; |
| const char kCustomSchemeWithHostAndPort[] = "bar"; |
| const char kCustomSchemeWithHost[] = "baz"; |
| const char kCustomSchemeWithoutAuthority[] = "qux"; |
| const char kNonStandardScheme[] = "not-registered"; |
| |
| url::ScopedSchemeRegistryForTests scheme_registry; |
| AddStandardScheme(kCustomSchemeWithHostPortAndUserInformation, |
| url::SCHEME_WITH_HOST_PORT_AND_USER_INFORMATION); |
| AddStandardScheme(kCustomSchemeWithHostAndPort, |
| url::SCHEME_WITH_HOST_AND_PORT); |
| AddStandardScheme(kCustomSchemeWithHost, url::SCHEME_WITH_HOST); |
| AddStandardScheme(kCustomSchemeWithoutAuthority, |
| url::SCHEME_WITHOUT_AUTHORITY); |
| |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kHttpScheme)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kHttpsScheme)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kWsScheme)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kWssScheme)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kQuicTransportScheme)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kFtpScheme)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kFileScheme)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost( |
| kCustomSchemeWithHostPortAndUserInformation)); |
| EXPECT_TRUE(IsStandardSchemeWithNetworkHost(kCustomSchemeWithHostAndPort)); |
| |
| EXPECT_FALSE(IsStandardSchemeWithNetworkHost(url::kFileSystemScheme)); |
| EXPECT_FALSE(IsStandardSchemeWithNetworkHost(kCustomSchemeWithHost)); |
| EXPECT_FALSE(IsStandardSchemeWithNetworkHost(kCustomSchemeWithoutAuthority)); |
| EXPECT_FALSE(IsStandardSchemeWithNetworkHost(kNonStandardScheme)); |
| } |
| |
| TEST(UrlUtilTest, GetIdentityFromURL) { |
| struct { |
| const char* const input_url; |
| const char* const expected_username; |
| const char* const expected_password; |
| } tests[] = { |
| { |
| "http://username:[email protected]", |
| "username", |
| "password", |
| }, |
| { |
| // Test for http://crbug.com/19200 |
| "http://username:p@[email protected]", |
| "username", |
| "p@ssword", |
| }, |
| { |
| // Special URL characters should be unescaped. |
| "http://username:p%3fa%26s%2fs%[email protected]", |
| "username", |
| "p?a&s/s#", |
| }, |
| { |
| // Username contains %20, password %25. |
| "http://use rname:password%[email protected]", |
| "use rname", |
| "password%", |
| }, |
| { |
| // Username and password contain forward / backward slashes. |
| "http://username%2F:password%[email protected]", |
| "username/", |
| "password\\", |
| }, |
| { |
| // Keep %00 and %01 as-is, and ignore other escaped characters when |
| // present. |
| "http://use%00rname%20:pass%01word%[email protected]", |
| "use%00rname%20", |
| "pass%01word%25", |
| }, |
| { |
| // Keep CR and LF as-is. |
| "http://use%0Arname:pass%[email protected]", |
| "use%0Arname", |
| "pass%0Dword", |
| }, |
| { |
| // Use a '+' in the username. |
| "http://use+rname:[email protected]", |
| "use+rname", |
| "password", |
| }, |
| { |
| // Use a '&' in the password. |
| "http://username:p&[email protected]", |
| "username", |
| "p&ssword", |
| }, |
| { |
| // These UTF-8 characters are considered unsafe to unescape by |
| // UnescapeURLComponent, but raise no special concerns as part of the |
| // identity portion of a URL. |
| "http://%F0%9F%94%92:%E2%80%[email protected]", |
| "\xF0\x9F\x94\x92", |
| "\xE2\x80\x82", |
| }, |
| { |
| // Leave invalid UTF-8 alone, and leave valid UTF-8 characters alone |
| // if there's also an invalid character in the string - strings should |
| // not be partially unescaped. |
| "http://%81:%E2%80%82%E2%[email protected]", |
| "%81", |
| "%E2%80%82%E2%80", |
| }, |
| }; |
| for (const auto& test : tests) { |
| SCOPED_TRACE(test.input_url); |
| GURL url(test.input_url); |
| |
| base::string16 username, password; |
| GetIdentityFromURL(url, &username, &password); |
| |
| EXPECT_EQ(base::UTF8ToUTF16(test.expected_username), username); |
| EXPECT_EQ(base::UTF8ToUTF16(test.expected_password), password); |
| } |
| } |
| |
| // Try extracting a username which was encoded with UTF8. |
| TEST(UrlUtilTest, GetIdentityFromURL_UTF8) { |
| GURL url(WideToUTF16(L"http://foo:\x4f60\[email protected]")); |
| |
| EXPECT_EQ("foo", url.username()); |
| EXPECT_EQ("%E4%BD%A0%E5%A5%BD", url.password()); |
| |
| // Extract the unescaped identity. |
| base::string16 username, password; |
| GetIdentityFromURL(url, &username, &password); |
| |
| // Verify that it was decoded as UTF8. |
| EXPECT_EQ(ASCIIToUTF16("foo"), username); |
| EXPECT_EQ(WideToUTF16(L"\x4f60\x597d"), password); |
| } |
| |
| TEST(UrlUtilTest, GoogleHost) { |
| struct { |
| GURL url; |
| bool expected_output; |
| } google_host_cases[] = { |
| {GURL("http://.google.com"), true}, |
| {GURL("http://.youtube.com"), true}, |
| {GURL("http://.gmail.com"), true}, |
| {GURL("http://.doubleclick.net"), true}, |
| {GURL("http://.gstatic.com"), true}, |
| {GURL("http://.googlevideo.com"), true}, |
| {GURL("http://.googleusercontent.com"), true}, |
| {GURL("http://.googlesyndication.com"), true}, |
| {GURL("http://.google-analytics.com"), true}, |
| {GURL("http://.googleadservices.com"), true}, |
| {GURL("http://.googleapis.com"), true}, |
| {GURL("http://a.google.com"), true}, |
| {GURL("http://b.youtube.com"), true}, |
| {GURL("http://c.gmail.com"), true}, |
| {GURL("http://google.com"), false}, |
| {GURL("http://youtube.com"), false}, |
| {GURL("http://gmail.com"), false}, |
| {GURL("http://google.coma"), false}, |
| {GURL("http://agoogle.com"), false}, |
| {GURL("http://oogle.com"), false}, |
| {GURL("http://google.co"), false}, |
| {GURL("http://oggole.com"), false}, |
| }; |
| |
| for (const auto& host : google_host_cases) { |
| EXPECT_EQ(host.expected_output, HasGoogleHost(host.url)); |
| } |
| } |
| |
| } // namespace |
| } // namespace net |