[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include <string> |
| 6 | |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 7 | #include "net/cookies/cookie_constants.h" |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 8 | #include "net/cookies/parsed_cookie.h" |
| 9 | #include "testing/gtest/include/gtest/gtest.h" |
| 10 | |
| 11 | namespace net { |
| 12 | |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 13 | TEST(ParsedCookieTest, TestBasic) { |
| 14 | ParsedCookie pc("a=b"); |
| 15 | EXPECT_TRUE(pc.IsValid()); |
| 16 | EXPECT_FALSE(pc.IsSecure()); |
| 17 | EXPECT_EQ("a", pc.Name()); |
| 18 | EXPECT_EQ("b", pc.Value()); |
| 19 | } |
| 20 | |
[email protected] | 8fbe41041 | 2014-07-28 17:17:41 | [diff] [blame] | 21 | TEST(ParsedCookieTest, TestEmpty) { |
Mike West | aa30315 | 2020-01-08 18:26:32 | [diff] [blame^] | 22 | const char* kTestCookieLines[]{"", " ", "=", "=;", " =;", |
| 23 | "= ;", " = ;", ";", " ;", " ; ", |
| 24 | "\t", "\t;", "\t=\t", "\t=", "=\t"}; |
jww | 03e6ff8c | 2016-08-17 19:19:58 | [diff] [blame] | 25 | |
Mike West | aa30315 | 2020-01-08 18:26:32 | [diff] [blame^] | 26 | for (const char* test : kTestCookieLines) { |
| 27 | ParsedCookie pc(test); |
| 28 | EXPECT_FALSE(pc.IsValid()); |
jww | 03e6ff8c | 2016-08-17 19:19:58 | [diff] [blame] | 29 | } |
[email protected] | 8fbe41041 | 2014-07-28 17:17:41 | [diff] [blame] | 30 | } |
| 31 | |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 32 | TEST(ParsedCookieTest, TestQuoted) { |
| 33 | // These are some quoting cases which the major browsers all |
| 34 | // handle differently. I've tested Internet Explorer 6, Opera 9.6, |
| 35 | // Firefox 3, and Safari Windows 3.2.1. We originally tried to match |
| 36 | // Firefox closely, however we now match Internet Explorer and Safari. |
Ryan Sleevi | 435a3a2 | 2018-05-15 02:16:07 | [diff] [blame] | 37 | const struct { |
| 38 | const char* input; |
| 39 | const char* expected; |
| 40 | } kTests[] = { |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 41 | // Trailing whitespace after a quoted value. The whitespace after |
| 42 | // the quote is stripped in all browsers. |
Ryan Sleevi | 435a3a2 | 2018-05-15 02:16:07 | [diff] [blame] | 43 | {"\"zzz \" ", "\"zzz \""}, |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 44 | // Handling a quoted value with a ';', like FOO="zz;pp" ; |
| 45 | // IE and Safari: "zz; |
| 46 | // Firefox and Opera: "zz;pp" |
Ryan Sleevi | 435a3a2 | 2018-05-15 02:16:07 | [diff] [blame] | 47 | {"\"zz;pp\" ;", "\"zz"}, |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 48 | // Handling a value with multiple quoted parts, like FOO="zzz " "ppp" ; |
| 49 | // IE and Safari: "zzz " "ppp"; |
| 50 | // Firefox: "zzz "; |
| 51 | // Opera: <rejects cookie> |
Ryan Sleevi | 435a3a2 | 2018-05-15 02:16:07 | [diff] [blame] | 52 | { |
| 53 | "\"zzz \" \"ppp\" ", "\"zzz \" \"ppp\"", |
| 54 | }, |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 55 | // A quote in a value that didn't start quoted. like FOO=A"B ; |
| 56 | // IE, Safari, and Firefox: A"B; |
| 57 | // Opera: <rejects cookie> |
Ryan Sleevi | 435a3a2 | 2018-05-15 02:16:07 | [diff] [blame] | 58 | { |
| 59 | "A\"B", "A\"B", |
| 60 | }}; |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 61 | |
Ryan Sleevi | 435a3a2 | 2018-05-15 02:16:07 | [diff] [blame] | 62 | for (const auto& test : kTests) { |
| 63 | ParsedCookie pc(std::string("aBc=") + test.input + |
| 64 | " ; path=\"/\" ; httponly "); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 65 | EXPECT_TRUE(pc.IsValid()); |
| 66 | EXPECT_FALSE(pc.IsSecure()); |
| 67 | EXPECT_TRUE(pc.IsHttpOnly()); |
| 68 | EXPECT_TRUE(pc.HasPath()); |
| 69 | EXPECT_EQ("aBc", pc.Name()); |
Ryan Sleevi | 435a3a2 | 2018-05-15 02:16:07 | [diff] [blame] | 70 | EXPECT_EQ(test.expected, pc.Value()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 71 | |
| 72 | // If a path was quoted, the path attribute keeps the quotes. This will |
| 73 | // make the cookie effectively useless, but path parameters aren't supposed |
| 74 | // to be quoted. Bug 1261605. |
| 75 | EXPECT_EQ("\"/\"", pc.Path()); |
| 76 | } |
| 77 | } |
| 78 | |
| 79 | TEST(ParsedCookieTest, TestNameless) { |
| 80 | ParsedCookie pc("BLAHHH; path=/; secure;"); |
| 81 | EXPECT_TRUE(pc.IsValid()); |
| 82 | EXPECT_TRUE(pc.IsSecure()); |
| 83 | EXPECT_TRUE(pc.HasPath()); |
| 84 | EXPECT_EQ("/", pc.Path()); |
| 85 | EXPECT_EQ("", pc.Name()); |
| 86 | EXPECT_EQ("BLAHHH", pc.Value()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 87 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 88 | } |
| 89 | |
| 90 | TEST(ParsedCookieTest, TestAttributeCase) { |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 91 | ParsedCookie pc( |
| 92 | "BLAHHH; Path=/; sECuRe; httpONLY; sAmESitE=StrIct; pRIoRitY=hIgH"); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 93 | EXPECT_TRUE(pc.IsValid()); |
| 94 | EXPECT_TRUE(pc.IsSecure()); |
| 95 | EXPECT_TRUE(pc.IsHttpOnly()); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 96 | EXPECT_EQ(CookieSameSite::STRICT_MODE, pc.SameSite()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 97 | EXPECT_TRUE(pc.HasPath()); |
| 98 | EXPECT_EQ("/", pc.Path()); |
| 99 | EXPECT_EQ("", pc.Name()); |
| 100 | EXPECT_EQ("BLAHHH", pc.Value()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 101 | EXPECT_EQ(COOKIE_PRIORITY_HIGH, pc.Priority()); |
mkwst | ae819bb | 2015-02-23 05:10:31 | [diff] [blame] | 102 | EXPECT_EQ(5U, pc.NumberOfAttributes()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 103 | } |
| 104 | |
| 105 | TEST(ParsedCookieTest, TestDoubleQuotedNameless) { |
| 106 | ParsedCookie pc("\"BLA\\\"HHH\"; path=/; secure;"); |
| 107 | EXPECT_TRUE(pc.IsValid()); |
| 108 | EXPECT_TRUE(pc.IsSecure()); |
| 109 | EXPECT_TRUE(pc.HasPath()); |
| 110 | EXPECT_EQ("/", pc.Path()); |
| 111 | EXPECT_EQ("", pc.Name()); |
| 112 | EXPECT_EQ("\"BLA\\\"HHH\"", pc.Value()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 113 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 114 | EXPECT_EQ(2U, pc.NumberOfAttributes()); |
| 115 | } |
| 116 | |
| 117 | TEST(ParsedCookieTest, QuoteOffTheEnd) { |
| 118 | ParsedCookie pc("a=\"B"); |
| 119 | EXPECT_TRUE(pc.IsValid()); |
| 120 | EXPECT_EQ("a", pc.Name()); |
| 121 | EXPECT_EQ("\"B", pc.Value()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 122 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 123 | EXPECT_EQ(0U, pc.NumberOfAttributes()); |
| 124 | } |
| 125 | |
| 126 | TEST(ParsedCookieTest, MissingName) { |
| 127 | ParsedCookie pc("=ABC"); |
| 128 | EXPECT_TRUE(pc.IsValid()); |
| 129 | EXPECT_EQ("", pc.Name()); |
| 130 | EXPECT_EQ("ABC", pc.Value()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 131 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 132 | EXPECT_EQ(0U, pc.NumberOfAttributes()); |
| 133 | } |
| 134 | |
| 135 | TEST(ParsedCookieTest, MissingValue) { |
| 136 | ParsedCookie pc("ABC=; path = /wee"); |
| 137 | EXPECT_TRUE(pc.IsValid()); |
| 138 | EXPECT_EQ("ABC", pc.Name()); |
| 139 | EXPECT_EQ("", pc.Value()); |
| 140 | EXPECT_TRUE(pc.HasPath()); |
| 141 | EXPECT_EQ("/wee", pc.Path()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 142 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 143 | EXPECT_EQ(1U, pc.NumberOfAttributes()); |
| 144 | } |
| 145 | |
| 146 | TEST(ParsedCookieTest, Whitespace) { |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 147 | ParsedCookie pc(" A = BC ;secure;;; samesite = lax "); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 148 | EXPECT_TRUE(pc.IsValid()); |
| 149 | EXPECT_EQ("A", pc.Name()); |
| 150 | EXPECT_EQ("BC", pc.Value()); |
| 151 | EXPECT_FALSE(pc.HasPath()); |
| 152 | EXPECT_FALSE(pc.HasDomain()); |
| 153 | EXPECT_TRUE(pc.IsSecure()); |
mkwst | ae819bb | 2015-02-23 05:10:31 | [diff] [blame] | 154 | EXPECT_FALSE(pc.IsHttpOnly()); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 155 | EXPECT_EQ(CookieSameSite::LAX_MODE, pc.SameSite()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 156 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 157 | // We parse anything between ; as attributes, so we end up with two |
| 158 | // attributes with an empty string name and value. |
| 159 | EXPECT_EQ(4U, pc.NumberOfAttributes()); |
| 160 | } |
| 161 | TEST(ParsedCookieTest, MultipleEquals) { |
| 162 | ParsedCookie pc(" A=== BC ;secure;;; httponly"); |
| 163 | EXPECT_TRUE(pc.IsValid()); |
| 164 | EXPECT_EQ("A", pc.Name()); |
| 165 | EXPECT_EQ("== BC", pc.Value()); |
| 166 | EXPECT_FALSE(pc.HasPath()); |
| 167 | EXPECT_FALSE(pc.HasDomain()); |
| 168 | EXPECT_TRUE(pc.IsSecure()); |
| 169 | EXPECT_TRUE(pc.IsHttpOnly()); |
Lily Chen | 324657c | 2019-04-19 14:09:44 | [diff] [blame] | 170 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 171 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 172 | EXPECT_EQ(4U, pc.NumberOfAttributes()); |
| 173 | } |
| 174 | |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 175 | TEST(ParsedCookieTest, QuotedTrailingWhitespace) { |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 176 | ParsedCookie pc( |
| 177 | "ANCUUID=\"zohNumRKgI0oxyhSsV3Z7D\" ; " |
| 178 | "expires=Sun, 18-Apr-2027 21:06:29 GMT ; " |
| 179 | "path=/ ; "); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 180 | EXPECT_TRUE(pc.IsValid()); |
| 181 | EXPECT_EQ("ANCUUID", pc.Name()); |
| 182 | // Stripping whitespace after the quotes matches all other major browsers. |
| 183 | EXPECT_EQ("\"zohNumRKgI0oxyhSsV3Z7D\"", pc.Value()); |
| 184 | EXPECT_TRUE(pc.HasExpires()); |
| 185 | EXPECT_TRUE(pc.HasPath()); |
| 186 | EXPECT_EQ("/", pc.Path()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 187 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 188 | EXPECT_EQ(2U, pc.NumberOfAttributes()); |
| 189 | } |
| 190 | |
| 191 | TEST(ParsedCookieTest, TrailingWhitespace) { |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 192 | ParsedCookie pc( |
| 193 | "ANCUUID=zohNumRKgI0oxyhSsV3Z7D ; " |
| 194 | "expires=Sun, 18-Apr-2027 21:06:29 GMT ; " |
| 195 | "path=/ ; "); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 196 | EXPECT_TRUE(pc.IsValid()); |
| 197 | EXPECT_EQ("ANCUUID", pc.Name()); |
| 198 | EXPECT_EQ("zohNumRKgI0oxyhSsV3Z7D", pc.Value()); |
| 199 | EXPECT_TRUE(pc.HasExpires()); |
| 200 | EXPECT_TRUE(pc.HasPath()); |
| 201 | EXPECT_EQ("/", pc.Path()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 202 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 203 | EXPECT_EQ(2U, pc.NumberOfAttributes()); |
| 204 | } |
| 205 | |
mkwst | badf4bf | 2017-05-15 10:49:13 | [diff] [blame] | 206 | TEST(ParsedCookieTest, LotsOfPairs) { |
| 207 | for (int i = 1; i < 100; i++) { |
| 208 | std::string blankpairs; |
| 209 | blankpairs.resize(i, ';'); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 210 | |
mkwst | badf4bf | 2017-05-15 10:49:13 | [diff] [blame] | 211 | ParsedCookie c("a=b;" + blankpairs + "secure"); |
| 212 | EXPECT_EQ("a", c.Name()); |
| 213 | EXPECT_EQ("b", c.Value()); |
| 214 | EXPECT_TRUE(c.IsValid()); |
| 215 | EXPECT_TRUE(c.IsSecure()); |
| 216 | } |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 217 | } |
| 218 | |
| 219 | // TODO(erikwright): some better test cases for invalid cookies. |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 220 | TEST(ParsedCookieTest, InvalidTooLong) { |
| 221 | std::string maxstr; |
| 222 | maxstr.resize(ParsedCookie::kMaxCookieSize, 'a'); |
| 223 | |
| 224 | ParsedCookie pc1(maxstr); |
| 225 | EXPECT_TRUE(pc1.IsValid()); |
| 226 | |
| 227 | ParsedCookie pc2(maxstr + "A"); |
| 228 | EXPECT_FALSE(pc2.IsValid()); |
| 229 | } |
| 230 | |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 231 | TEST(ParsedCookieTest, EmbeddedTerminator) { |
| 232 | ParsedCookie pc1("AAA=BB\0ZYX"); |
| 233 | ParsedCookie pc2("AAA=BB\rZYX"); |
| 234 | ParsedCookie pc3("AAA=BB\nZYX"); |
| 235 | EXPECT_TRUE(pc1.IsValid()); |
| 236 | EXPECT_EQ("AAA", pc1.Name()); |
| 237 | EXPECT_EQ("BB", pc1.Value()); |
| 238 | EXPECT_TRUE(pc2.IsValid()); |
| 239 | EXPECT_EQ("AAA", pc2.Name()); |
| 240 | EXPECT_EQ("BB", pc2.Value()); |
| 241 | EXPECT_TRUE(pc3.IsValid()); |
| 242 | EXPECT_EQ("AAA", pc3.Name()); |
| 243 | EXPECT_EQ("BB", pc3.Value()); |
| 244 | } |
| 245 | |
| 246 | TEST(ParsedCookieTest, ParseTokensAndValues) { |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 247 | EXPECT_EQ("hello", ParsedCookie::ParseTokenString("hello\nworld")); |
| 248 | EXPECT_EQ("fs!!@", ParsedCookie::ParseTokenString("fs!!@;helloworld")); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 249 | EXPECT_EQ("hello world\tgood", |
| 250 | ParsedCookie::ParseTokenString("hello world\tgood\rbye")); |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 251 | EXPECT_EQ("A", ParsedCookie::ParseTokenString("A=B=C;D=E")); |
| 252 | EXPECT_EQ("hello", ParsedCookie::ParseValueString("hello\nworld")); |
| 253 | EXPECT_EQ("fs!!@", ParsedCookie::ParseValueString("fs!!@;helloworld")); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 254 | EXPECT_EQ("hello world\tgood", |
| 255 | ParsedCookie::ParseValueString("hello world\tgood\rbye")); |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 256 | EXPECT_EQ("A=B=C", ParsedCookie::ParseValueString("A=B=C;D=E")); |
[email protected] | ebfe317 | 2012-07-12 12:21:41 | [diff] [blame] | 257 | } |
| 258 | |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 259 | TEST(ParsedCookieTest, SerializeCookieLine) { |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 260 | const char input[] = |
| 261 | "ANCUUID=zohNumRKgI0oxyhSsV3Z7D ; " |
| 262 | "expires=Sun, 18-Apr-2027 21:06:29 GMT ; " |
| 263 | "path=/ ; priority=low ; "; |
| 264 | const char output[] = |
| 265 | "ANCUUID=zohNumRKgI0oxyhSsV3Z7D; " |
| 266 | "expires=Sun, 18-Apr-2027 21:06:29 GMT; " |
| 267 | "path=/; priority=low"; |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 268 | ParsedCookie pc(input); |
| 269 | EXPECT_EQ(output, pc.ToCookieLine()); |
| 270 | } |
| 271 | |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 272 | TEST(ParsedCookieTest, SetNameAndValue) { |
Mike West | aa30315 | 2020-01-08 18:26:32 | [diff] [blame^] | 273 | ParsedCookie cookie("a=b"); |
| 274 | EXPECT_TRUE(cookie.IsValid()); |
| 275 | EXPECT_TRUE(cookie.SetDomain("foobar.com")); |
| 276 | EXPECT_TRUE(cookie.SetName("name")); |
| 277 | EXPECT_TRUE(cookie.SetValue("value")); |
| 278 | EXPECT_EQ("name=value; domain=foobar.com", cookie.ToCookieLine()); |
| 279 | EXPECT_TRUE(cookie.IsValid()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 280 | |
| 281 | // We don't test |
| 282 | // ParsedCookie invalid("@foo=bar"); |
| 283 | // EXPECT_FALSE(invalid.IsValid()); |
| 284 | // here because we are slightly more tolerant to invalid cookie names and |
| 285 | // values that are set by webservers. We only enforce a correct name and |
| 286 | // value if set via SetName() and SetValue(). |
| 287 | |
| 288 | ParsedCookie pc("name=value"); |
| 289 | EXPECT_TRUE(pc.IsValid()); |
| 290 | |
| 291 | // Set invalid name / value. |
| 292 | EXPECT_FALSE(pc.SetName("@foobar")); |
| 293 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
| 294 | EXPECT_TRUE(pc.IsValid()); |
| 295 | |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 296 | EXPECT_FALSE(pc.SetValue("foo bar")); |
| 297 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
| 298 | EXPECT_TRUE(pc.IsValid()); |
| 299 | |
| 300 | EXPECT_FALSE(pc.SetValue("\"foobar")); |
| 301 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
| 302 | EXPECT_TRUE(pc.IsValid()); |
| 303 | |
| 304 | // Set valid name / value |
jww | 03e6ff8c | 2016-08-17 19:19:58 | [diff] [blame] | 305 | EXPECT_TRUE(pc.SetName(std::string())); |
| 306 | EXPECT_EQ("=value", pc.ToCookieLine()); |
| 307 | EXPECT_TRUE(pc.IsValid()); |
| 308 | |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 309 | EXPECT_TRUE(pc.SetName("test")); |
| 310 | EXPECT_EQ("test=value", pc.ToCookieLine()); |
| 311 | EXPECT_TRUE(pc.IsValid()); |
| 312 | |
| 313 | EXPECT_TRUE(pc.SetValue("\"foobar\"")); |
| 314 | EXPECT_EQ("test=\"foobar\"", pc.ToCookieLine()); |
| 315 | EXPECT_TRUE(pc.IsValid()); |
| 316 | |
[email protected] | 007b3f8 | 2013-04-09 08:46:45 | [diff] [blame] | 317 | EXPECT_TRUE(pc.SetValue(std::string())); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 318 | EXPECT_EQ("test=", pc.ToCookieLine()); |
| 319 | EXPECT_TRUE(pc.IsValid()); |
| 320 | } |
| 321 | |
| 322 | TEST(ParsedCookieTest, SetAttributes) { |
| 323 | ParsedCookie pc("name=value"); |
| 324 | EXPECT_TRUE(pc.IsValid()); |
| 325 | |
| 326 | // Clear an unset attribute. |
[email protected] | 007b3f8 | 2013-04-09 08:46:45 | [diff] [blame] | 327 | EXPECT_TRUE(pc.SetDomain(std::string())); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 328 | EXPECT_FALSE(pc.HasDomain()); |
| 329 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
| 330 | EXPECT_TRUE(pc.IsValid()); |
| 331 | |
| 332 | // Set a string containing an invalid character |
| 333 | EXPECT_FALSE(pc.SetDomain("foo;bar")); |
| 334 | EXPECT_FALSE(pc.HasDomain()); |
| 335 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
| 336 | EXPECT_TRUE(pc.IsValid()); |
| 337 | |
| 338 | // Set all other attributes and check that they are appended in order. |
| 339 | EXPECT_TRUE(pc.SetDomain("domain.com")); |
| 340 | EXPECT_TRUE(pc.SetPath("/")); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 341 | EXPECT_TRUE(pc.SetExpires("Sun, 18-Apr-2027 21:06:29 GMT")); |
| 342 | EXPECT_TRUE(pc.SetMaxAge("12345")); |
| 343 | EXPECT_TRUE(pc.SetIsSecure(true)); |
| 344 | EXPECT_TRUE(pc.SetIsHttpOnly(true)); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 345 | EXPECT_TRUE(pc.SetIsHttpOnly(true)); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 346 | EXPECT_TRUE(pc.SetSameSite("LAX")); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 347 | EXPECT_TRUE(pc.SetPriority("HIGH")); |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 348 | EXPECT_EQ( |
| 349 | "name=value; domain=domain.com; path=/; " |
| 350 | "expires=Sun, 18-Apr-2027 21:06:29 GMT; max-age=12345; secure; " |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 351 | "httponly; samesite=LAX; priority=HIGH", |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 352 | pc.ToCookieLine()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 353 | EXPECT_TRUE(pc.HasDomain()); |
| 354 | EXPECT_TRUE(pc.HasPath()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 355 | EXPECT_TRUE(pc.HasExpires()); |
| 356 | EXPECT_TRUE(pc.HasMaxAge()); |
| 357 | EXPECT_TRUE(pc.IsSecure()); |
| 358 | EXPECT_TRUE(pc.IsHttpOnly()); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 359 | EXPECT_EQ(CookieSameSite::LAX_MODE, pc.SameSite()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 360 | EXPECT_EQ(COOKIE_PRIORITY_HIGH, pc.Priority()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 361 | |
| 362 | // Clear one attribute from the middle. |
[email protected] | dedec0b | 2013-02-28 04:50:10 | [diff] [blame] | 363 | EXPECT_TRUE(pc.SetPath("/foo")); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 364 | EXPECT_TRUE(pc.HasDomain()); |
| 365 | EXPECT_TRUE(pc.HasPath()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 366 | EXPECT_TRUE(pc.HasExpires()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 367 | EXPECT_TRUE(pc.IsSecure()); |
| 368 | EXPECT_TRUE(pc.IsHttpOnly()); |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 369 | EXPECT_EQ( |
| 370 | "name=value; domain=domain.com; path=/foo; " |
| 371 | "expires=Sun, 18-Apr-2027 21:06:29 GMT; max-age=12345; secure; " |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 372 | "httponly; samesite=LAX; priority=HIGH", |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 373 | pc.ToCookieLine()); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 374 | |
| 375 | // Set priority to medium. |
| 376 | EXPECT_TRUE(pc.SetPriority("medium")); |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 377 | EXPECT_EQ( |
| 378 | "name=value; domain=domain.com; path=/foo; " |
| 379 | "expires=Sun, 18-Apr-2027 21:06:29 GMT; max-age=12345; secure; " |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 380 | "httponly; samesite=LAX; priority=medium", |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 381 | pc.ToCookieLine()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 382 | |
| 383 | // Clear the rest and change the name and value. |
[email protected] | 007b3f8 | 2013-04-09 08:46:45 | [diff] [blame] | 384 | EXPECT_TRUE(pc.SetDomain(std::string())); |
| 385 | EXPECT_TRUE(pc.SetPath(std::string())); |
| 386 | EXPECT_TRUE(pc.SetExpires(std::string())); |
| 387 | EXPECT_TRUE(pc.SetMaxAge(std::string())); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 388 | EXPECT_TRUE(pc.SetIsSecure(false)); |
| 389 | EXPECT_TRUE(pc.SetIsHttpOnly(false)); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 390 | EXPECT_TRUE(pc.SetSameSite(std::string())); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 391 | EXPECT_TRUE(pc.SetName("name2")); |
| 392 | EXPECT_TRUE(pc.SetValue("value2")); |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 393 | EXPECT_TRUE(pc.SetPriority(std::string())); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 394 | EXPECT_FALSE(pc.HasDomain()); |
| 395 | EXPECT_FALSE(pc.HasPath()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 396 | EXPECT_FALSE(pc.HasExpires()); |
| 397 | EXPECT_FALSE(pc.HasMaxAge()); |
| 398 | EXPECT_FALSE(pc.IsSecure()); |
| 399 | EXPECT_FALSE(pc.IsHttpOnly()); |
Lily Chen | 324657c | 2019-04-19 14:09:44 | [diff] [blame] | 400 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite()); |
[email protected] | 64527a5 | 2012-08-02 13:37:41 | [diff] [blame] | 401 | EXPECT_EQ("name2=value2", pc.ToCookieLine()); |
| 402 | } |
| 403 | |
jww | 03e6ff8c | 2016-08-17 19:19:58 | [diff] [blame] | 404 | // Set the domain attribute twice in a cookie line. If the second attribute's |
| 405 | // value is empty, it shoud be ignored. |
| 406 | // |
| 407 | // This is de facto standard behavior, per https://crbug.com/601786. |
| 408 | TEST(ParsedCookieTest, MultipleDomainAttributes) { |
| 409 | ParsedCookie pc1("name=value; domain=foo.com; domain=bar.com"); |
| 410 | EXPECT_EQ("bar.com", pc1.Domain()); |
| 411 | ParsedCookie pc2("name=value; domain=foo.com; domain="); |
| 412 | EXPECT_EQ("foo.com", pc2.Domain()); |
| 413 | } |
| 414 | |
[email protected] | ab2d75c8 | 2013-04-19 18:39:04 | [diff] [blame] | 415 | TEST(ParsedCookieTest, SetPriority) { |
| 416 | ParsedCookie pc("name=value"); |
| 417 | EXPECT_TRUE(pc.IsValid()); |
| 418 | |
| 419 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
| 420 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
| 421 | |
| 422 | // Test each priority, expect case-insensitive compare. |
| 423 | EXPECT_TRUE(pc.SetPriority("high")); |
| 424 | EXPECT_EQ("name=value; priority=high", pc.ToCookieLine()); |
| 425 | EXPECT_EQ(COOKIE_PRIORITY_HIGH, pc.Priority()); |
| 426 | |
| 427 | EXPECT_TRUE(pc.SetPriority("mEDium")); |
| 428 | EXPECT_EQ("name=value; priority=mEDium", pc.ToCookieLine()); |
| 429 | EXPECT_EQ(COOKIE_PRIORITY_MEDIUM, pc.Priority()); |
| 430 | |
| 431 | EXPECT_TRUE(pc.SetPriority("LOW")); |
| 432 | EXPECT_EQ("name=value; priority=LOW", pc.ToCookieLine()); |
| 433 | EXPECT_EQ(COOKIE_PRIORITY_LOW, pc.Priority()); |
| 434 | |
| 435 | // Interpret invalid priority values as COOKIE_PRIORITY_DEFAULT. |
| 436 | EXPECT_TRUE(pc.SetPriority("Blah")); |
| 437 | EXPECT_EQ("name=value; priority=Blah", pc.ToCookieLine()); |
| 438 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
| 439 | |
| 440 | EXPECT_TRUE(pc.SetPriority("lowerest")); |
| 441 | EXPECT_EQ("name=value; priority=lowerest", pc.ToCookieLine()); |
| 442 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
| 443 | |
| 444 | EXPECT_TRUE(pc.SetPriority("")); |
| 445 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
| 446 | EXPECT_EQ(COOKIE_PRIORITY_DEFAULT, pc.Priority()); |
| 447 | } |
| 448 | |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 449 | TEST(ParsedCookieTest, SetSameSite) { |
| 450 | ParsedCookie pc("name=value"); |
| 451 | EXPECT_TRUE(pc.IsValid()); |
| 452 | |
| 453 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
Lily Chen | 324657c | 2019-04-19 14:09:44 | [diff] [blame] | 454 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite()); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 455 | |
Eric Lawrence | 5fbb75e9 | 2018-04-12 20:39:53 | [diff] [blame] | 456 | // Test each samesite directive, expect case-insensitive compare. |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 457 | EXPECT_TRUE(pc.SetSameSite("strict")); |
| 458 | EXPECT_EQ("name=value; samesite=strict", pc.ToCookieLine()); |
| 459 | EXPECT_EQ(CookieSameSite::STRICT_MODE, pc.SameSite()); |
mkwst | 1a9ce0d | 2016-04-06 19:44:21 | [diff] [blame] | 460 | EXPECT_TRUE(pc.IsValid()); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 461 | |
| 462 | EXPECT_TRUE(pc.SetSameSite("lAx")); |
| 463 | EXPECT_EQ("name=value; samesite=lAx", pc.ToCookieLine()); |
| 464 | EXPECT_EQ(CookieSameSite::LAX_MODE, pc.SameSite()); |
mkwst | 1a9ce0d | 2016-04-06 19:44:21 | [diff] [blame] | 465 | EXPECT_TRUE(pc.IsValid()); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 466 | |
| 467 | EXPECT_TRUE(pc.SetSameSite("LAX")); |
| 468 | EXPECT_EQ("name=value; samesite=LAX", pc.ToCookieLine()); |
| 469 | EXPECT_EQ(CookieSameSite::LAX_MODE, pc.SameSite()); |
mkwst | 1a9ce0d | 2016-04-06 19:44:21 | [diff] [blame] | 470 | EXPECT_TRUE(pc.IsValid()); |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 471 | |
Lily Chen | 324657c | 2019-04-19 14:09:44 | [diff] [blame] | 472 | EXPECT_TRUE(pc.SetSameSite("None")); |
| 473 | EXPECT_EQ("name=value; samesite=None", pc.ToCookieLine()); |
| 474 | EXPECT_EQ(CookieSameSite::NO_RESTRICTION, pc.SameSite()); |
| 475 | EXPECT_TRUE(pc.IsValid()); |
| 476 | |
| 477 | EXPECT_TRUE(pc.SetSameSite("NONE")); |
| 478 | EXPECT_EQ("name=value; samesite=NONE", pc.ToCookieLine()); |
| 479 | EXPECT_EQ(CookieSameSite::NO_RESTRICTION, pc.SameSite()); |
| 480 | EXPECT_TRUE(pc.IsValid()); |
| 481 | |
Eric Lawrence | 5fbb75e9 | 2018-04-12 20:39:53 | [diff] [blame] | 482 | // Remove the SameSite attribute. |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 483 | EXPECT_TRUE(pc.SetSameSite("")); |
| 484 | EXPECT_EQ("name=value", pc.ToCookieLine()); |
Lily Chen | 324657c | 2019-04-19 14:09:44 | [diff] [blame] | 485 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite()); |
mkwst | 1a9ce0d | 2016-04-06 19:44:21 | [diff] [blame] | 486 | EXPECT_TRUE(pc.IsValid()); |
| 487 | |
| 488 | EXPECT_TRUE(pc.SetSameSite("Blah")); |
Eric Lawrence | 5fbb75e9 | 2018-04-12 20:39:53 | [diff] [blame] | 489 | EXPECT_EQ("name=value; samesite=Blah", pc.ToCookieLine()); |
Lily Chen | 324657c | 2019-04-19 14:09:44 | [diff] [blame] | 490 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite()); |
Eric Lawrence | 5fbb75e9 | 2018-04-12 20:39:53 | [diff] [blame] | 491 | EXPECT_TRUE(pc.IsValid()); |
mkwst | 1a9ce0d | 2016-04-06 19:44:21 | [diff] [blame] | 492 | } |
| 493 | |
Lily Chen | 9a9c08a9 | 2019-09-18 00:18:16 | [diff] [blame] | 494 | // Test that the correct enum value is returned for the SameSite attribute |
| 495 | // string. |
| 496 | TEST(ParsedCookieTest, CookieSameSiteStringEnum) { |
| 497 | ParsedCookie pc("name=value; SameSite"); |
| 498 | CookieSameSiteString actual = CookieSameSiteString::kLax; |
| 499 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite(&actual)); |
| 500 | EXPECT_EQ(CookieSameSiteString::kEmptyString, actual); |
| 501 | |
| 502 | pc.SetSameSite("Strict"); |
| 503 | EXPECT_EQ(CookieSameSite::STRICT_MODE, pc.SameSite(&actual)); |
| 504 | EXPECT_EQ(CookieSameSiteString::kStrict, actual); |
| 505 | |
| 506 | pc.SetSameSite("Lax"); |
| 507 | EXPECT_EQ(CookieSameSite::LAX_MODE, pc.SameSite(&actual)); |
| 508 | EXPECT_EQ(CookieSameSiteString::kLax, actual); |
| 509 | |
| 510 | pc.SetSameSite("None"); |
| 511 | EXPECT_EQ(CookieSameSite::NO_RESTRICTION, pc.SameSite(&actual)); |
| 512 | EXPECT_EQ(CookieSameSiteString::kNone, actual); |
| 513 | |
| 514 | pc.SetSameSite("Extended"); |
Caleb Raitto | f1af4b3 | 2019-10-28 20:02:31 | [diff] [blame] | 515 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite(&actual)); |
Lily Chen | 9a9c08a9 | 2019-09-18 00:18:16 | [diff] [blame] | 516 | EXPECT_EQ(CookieSameSiteString::kExtended, actual); |
| 517 | |
| 518 | pc.SetSameSite("Bananas"); |
| 519 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc.SameSite(&actual)); |
| 520 | EXPECT_EQ(CookieSameSiteString::kUnrecognized, actual); |
| 521 | |
| 522 | ParsedCookie pc2("no_samesite=1"); |
| 523 | EXPECT_EQ(CookieSameSite::UNSPECIFIED, pc2.SameSite(&actual)); |
| 524 | EXPECT_EQ(CookieSameSiteString::kUnspecified, actual); |
| 525 | } |
| 526 | |
Daniel McArdle | 7c8bd14d | 2019-06-18 22:57:33 | [diff] [blame] | 527 | TEST(ParsedCookieTest, SettersInputValidation) { |
| 528 | ParsedCookie pc("name=foobar"); |
| 529 | EXPECT_TRUE(pc.SetPath("baz")); |
| 530 | EXPECT_EQ(pc.ToCookieLine(), "name=foobar; path=baz"); |
| 531 | |
| 532 | EXPECT_TRUE(pc.SetPath(" baz ")); |
| 533 | EXPECT_EQ(pc.ToCookieLine(), "name=foobar; path=baz"); |
| 534 | |
| 535 | EXPECT_TRUE(pc.SetPath(" ")); |
| 536 | EXPECT_EQ(pc.ToCookieLine(), "name=foobar"); |
| 537 | |
| 538 | EXPECT_TRUE(pc.SetDomain(" baz ")); |
| 539 | EXPECT_EQ(pc.ToCookieLine(), "name=foobar; domain=baz"); |
| 540 | |
| 541 | // Invalid characters |
| 542 | EXPECT_FALSE(pc.SetPath(" baz\n ")); |
| 543 | EXPECT_FALSE(pc.SetPath("f;oo")); |
| 544 | EXPECT_FALSE(pc.SetPath("\r")); |
| 545 | EXPECT_FALSE(pc.SetPath("\a")); |
| 546 | EXPECT_FALSE(pc.SetPath("\t")); |
| 547 | EXPECT_FALSE(pc.SetSameSite("\r")); |
| 548 | } |
| 549 | |
Daniel McArdle | ef61425 | 2019-06-24 21:56:38 | [diff] [blame] | 550 | TEST(ParsedCookieTest, ToCookieLineSpecialTokens) { |
| 551 | // Special tokens "secure" and "httponly" should be treated as any other name |
| 552 | // when they are in the first position. |
| 553 | { |
| 554 | ParsedCookie pc(""); |
| 555 | pc.SetName("secure"); |
| 556 | EXPECT_EQ(pc.ToCookieLine(), "secure="); |
| 557 | } |
| 558 | { |
| 559 | ParsedCookie pc("secure"); |
| 560 | EXPECT_EQ(pc.ToCookieLine(), "=secure"); |
| 561 | } |
| 562 | { |
| 563 | ParsedCookie pc("secure=foo"); |
| 564 | EXPECT_EQ(pc.ToCookieLine(), "secure=foo"); |
| 565 | } |
| 566 | { |
| 567 | ParsedCookie pc("foo=secure"); |
| 568 | EXPECT_EQ(pc.ToCookieLine(), "foo=secure"); |
| 569 | } |
| 570 | { |
| 571 | ParsedCookie pc("httponly=foo"); |
| 572 | EXPECT_EQ(pc.ToCookieLine(), "httponly=foo"); |
| 573 | } |
| 574 | { |
| 575 | ParsedCookie pc("foo"); |
| 576 | pc.SetName("secure"); |
| 577 | EXPECT_EQ(pc.ToCookieLine(), "secure=foo"); |
| 578 | } |
| 579 | { |
| 580 | ParsedCookie pc("bar"); |
| 581 | pc.SetName("httponly"); |
| 582 | EXPECT_EQ(pc.ToCookieLine(), "httponly=bar"); |
| 583 | } |
| 584 | { |
| 585 | ParsedCookie pc("foo=bar; baz=bob"); |
| 586 | EXPECT_EQ(pc.ToCookieLine(), "foo=bar; baz=bob"); |
| 587 | } |
| 588 | // Outside of the first position, the value associated with a special name |
| 589 | // should not be printed. |
| 590 | { |
| 591 | ParsedCookie pc("name=foo; secure"); |
| 592 | EXPECT_EQ(pc.ToCookieLine(), "name=foo; secure"); |
| 593 | } |
| 594 | { |
| 595 | ParsedCookie pc("name=foo; secure=bar"); |
| 596 | EXPECT_EQ(pc.ToCookieLine(), "name=foo; secure"); |
| 597 | } |
| 598 | { |
| 599 | ParsedCookie pc("name=foo; httponly=baz"); |
| 600 | EXPECT_EQ(pc.ToCookieLine(), "name=foo; httponly"); |
| 601 | } |
| 602 | { |
| 603 | ParsedCookie pc("name=foo; bar=secure"); |
| 604 | EXPECT_EQ(pc.ToCookieLine(), "name=foo; bar=secure"); |
| 605 | } |
| 606 | } |
| 607 | |
Eric Lawrence | 5fbb75e9 | 2018-04-12 20:39:53 | [diff] [blame] | 608 | TEST(ParsedCookieTest, SameSiteValues) { |
mkwst | 1a9ce0d | 2016-04-06 19:44:21 | [diff] [blame] | 609 | struct TestCase { |
| 610 | const char* cookie; |
| 611 | bool valid; |
| 612 | CookieSameSite mode; |
| 613 | } cases[]{{"n=v; samesite=strict", true, CookieSameSite::STRICT_MODE}, |
| 614 | {"n=v; samesite=lax", true, CookieSameSite::LAX_MODE}, |
Lily Chen | 324657c | 2019-04-19 14:09:44 | [diff] [blame] | 615 | {"n=v; samesite=none", true, CookieSameSite::NO_RESTRICTION}, |
| 616 | {"n=v; samesite=boo", true, CookieSameSite::UNSPECIFIED}, |
| 617 | {"n=v; samesite", true, CookieSameSite::UNSPECIFIED}, |
| 618 | {"n=v", true, CookieSameSite::UNSPECIFIED}}; |
mkwst | 1a9ce0d | 2016-04-06 19:44:21 | [diff] [blame] | 619 | |
| 620 | for (const auto& test : cases) { |
| 621 | SCOPED_TRACE(test.cookie); |
| 622 | ParsedCookie pc(test.cookie); |
| 623 | EXPECT_EQ(test.valid, pc.IsValid()); |
| 624 | EXPECT_EQ(test.mode, pc.SameSite()); |
| 625 | } |
mkwst | e1a2958 | 2016-03-15 10:07:52 | [diff] [blame] | 626 | } |
| 627 | |
[email protected] | 6210ce5 | 2013-09-20 03:33:14 | [diff] [blame] | 628 | TEST(ParsedCookieTest, InvalidNonAlphanumericChars) { |
| 629 | ParsedCookie pc1("name=\x05"); |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 630 | ParsedCookie pc2( |
| 631 | "name=foo" |
| 632 | "\x1c" |
| 633 | "bar"); |
| 634 | ParsedCookie pc3( |
| 635 | "name=foobar" |
| 636 | "\x11"); |
| 637 | ParsedCookie pc4( |
| 638 | "name=\x02" |
| 639 | "foobar"); |
[email protected] | 6210ce5 | 2013-09-20 03:33:14 | [diff] [blame] | 640 | |
| 641 | ParsedCookie pc5("\x05=value"); |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 642 | ParsedCookie pc6( |
| 643 | "foo" |
| 644 | "\x05" |
| 645 | "bar=value"); |
| 646 | ParsedCookie pc7( |
| 647 | "foobar" |
| 648 | "\x05" |
| 649 | "=value"); |
| 650 | ParsedCookie pc8( |
| 651 | "\x05" |
| 652 | "foobar" |
| 653 | "=value"); |
[email protected] | 6210ce5 | 2013-09-20 03:33:14 | [diff] [blame] | 654 | |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 655 | ParsedCookie pc9( |
| 656 | "foo" |
| 657 | "\x05" |
| 658 | "bar" |
| 659 | "=foo" |
| 660 | "\x05" |
| 661 | "bar"); |
[email protected] | 6210ce5 | 2013-09-20 03:33:14 | [diff] [blame] | 662 | |
mkwst | be84af31 | 2015-02-20 08:52:45 | [diff] [blame] | 663 | ParsedCookie pc10( |
| 664 | "foo=bar;ba" |
| 665 | "\x05" |
| 666 | "z=boo"); |
| 667 | ParsedCookie pc11( |
| 668 | "foo=bar;baz=bo" |
| 669 | "\x05" |
| 670 | "o"); |
| 671 | ParsedCookie pc12( |
| 672 | "foo=bar;ba" |
| 673 | "\05" |
| 674 | "z=bo" |
| 675 | "\x05" |
| 676 | "o"); |
[email protected] | 6210ce5 | 2013-09-20 03:33:14 | [diff] [blame] | 677 | |
| 678 | EXPECT_FALSE(pc1.IsValid()); |
| 679 | EXPECT_FALSE(pc2.IsValid()); |
| 680 | EXPECT_FALSE(pc3.IsValid()); |
| 681 | EXPECT_FALSE(pc4.IsValid()); |
| 682 | EXPECT_FALSE(pc5.IsValid()); |
| 683 | EXPECT_FALSE(pc6.IsValid()); |
| 684 | EXPECT_FALSE(pc7.IsValid()); |
| 685 | EXPECT_FALSE(pc8.IsValid()); |
| 686 | EXPECT_FALSE(pc9.IsValid()); |
| 687 | EXPECT_FALSE(pc10.IsValid()); |
| 688 | EXPECT_FALSE(pc11.IsValid()); |
| 689 | EXPECT_FALSE(pc12.IsValid()); |
| 690 | } |
| 691 | |
| 692 | TEST(ParsedCookieTest, ValidNonAlphanumericChars) { |
| 693 | // Note that some of these words are pasted backwords thanks to poor vim bidi |
| 694 | // support. This should not affect the tests, however. |
thestig | 9d3bb0c | 2015-01-24 00:49:51 | [diff] [blame] | 695 | const char pc1_literal[] = "name=العربية"; |
| 696 | const char pc2_literal[] = "name=普通話"; |
| 697 | const char pc3_literal[] = "name=ภาษาไทย"; |
| 698 | const char pc4_literal[] = "name=עִבְרִית"; |
| 699 | const char pc5_literal[] = "العربية=value"; |
| 700 | const char pc6_literal[] = "普通話=value"; |
| 701 | const char pc7_literal[] = "ภาษาไทย=value"; |
| 702 | const char pc8_literal[] = "עִבְרִית=value"; |
[email protected] | 6210ce5 | 2013-09-20 03:33:14 | [diff] [blame] | 703 | ParsedCookie pc1(pc1_literal); |
| 704 | ParsedCookie pc2(pc2_literal); |
| 705 | ParsedCookie pc3(pc3_literal); |
| 706 | ParsedCookie pc4(pc4_literal); |
| 707 | ParsedCookie pc5(pc5_literal); |
| 708 | ParsedCookie pc6(pc6_literal); |
| 709 | ParsedCookie pc7(pc7_literal); |
| 710 | ParsedCookie pc8(pc8_literal); |
| 711 | |
| 712 | EXPECT_TRUE(pc1.IsValid()); |
| 713 | EXPECT_EQ(pc1_literal, pc1.ToCookieLine()); |
| 714 | EXPECT_TRUE(pc2.IsValid()); |
| 715 | EXPECT_EQ(pc2_literal, pc2.ToCookieLine()); |
| 716 | EXPECT_TRUE(pc3.IsValid()); |
| 717 | EXPECT_EQ(pc3_literal, pc3.ToCookieLine()); |
| 718 | EXPECT_TRUE(pc4.IsValid()); |
| 719 | EXPECT_EQ(pc4_literal, pc4.ToCookieLine()); |
| 720 | EXPECT_TRUE(pc5.IsValid()); |
| 721 | EXPECT_EQ(pc5_literal, pc5.ToCookieLine()); |
| 722 | EXPECT_TRUE(pc6.IsValid()); |
| 723 | EXPECT_EQ(pc6_literal, pc6.ToCookieLine()); |
| 724 | EXPECT_TRUE(pc7.IsValid()); |
| 725 | EXPECT_EQ(pc7_literal, pc7.ToCookieLine()); |
| 726 | EXPECT_TRUE(pc8.IsValid()); |
| 727 | EXPECT_EQ(pc8_literal, pc8.ToCookieLine()); |
| 728 | } |
bnc | d479b3c | 2017-05-24 18:54:53 | [diff] [blame] | 729 | |
| 730 | } // namespace net |