blob: 7fd1c2abdd0e010e7dc6bbbec9db28e7996f0d3d [file] [log] [blame]
Avi Drissman64595482022-09-14 20:52:291// Copyright 2010 The Chromium Authors
[email protected]b6a50182010-05-12 22:47:142// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/base/host_mapping_rules.h"
6
Eric Orth2f01fb22021-06-17 00:52:277#include <string.h>
8
[email protected]b6a50182010-05-12 22:47:149#include "net/base/host_port_pair.h"
10#include "testing/gtest/include/gtest/gtest.h"
Eric Orth2f01fb22021-06-17 00:52:2711#include "url/gurl.h"
12#include "url/third_party/mozilla/url_parse.h"
13#include "url/url_canon.h"
14#include "url/url_util.h"
[email protected]b6a50182010-05-12 22:47:1415
16namespace net {
17
18namespace {
19
20TEST(HostMappingRulesTest, SetRulesFromString) {
21 HostMappingRules rules;
22 rules.SetRulesFromString(
23 "map *.com baz , map *.net bar:60, EXCLUDE *.foo.com");
24
25 HostPortPair host_port("test", 1234);
26 EXPECT_FALSE(rules.RewriteHost(&host_port));
[email protected]2fbaecf22010-07-22 22:20:3527 EXPECT_EQ("test", host_port.host());
28 EXPECT_EQ(1234u, host_port.port());
[email protected]b6a50182010-05-12 22:47:1429
30 host_port = HostPortPair("chrome.net", 80);
31 EXPECT_TRUE(rules.RewriteHost(&host_port));
[email protected]2fbaecf22010-07-22 22:20:3532 EXPECT_EQ("bar", host_port.host());
33 EXPECT_EQ(60u, host_port.port());
[email protected]b6a50182010-05-12 22:47:1434
35 host_port = HostPortPair("crack.com", 80);
36 EXPECT_TRUE(rules.RewriteHost(&host_port));
[email protected]2fbaecf22010-07-22 22:20:3537 EXPECT_EQ("baz", host_port.host());
38 EXPECT_EQ(80u, host_port.port());
[email protected]b6a50182010-05-12 22:47:1439
40 host_port = HostPortPair("wtf.foo.com", 666);
41 EXPECT_FALSE(rules.RewriteHost(&host_port));
[email protected]2fbaecf22010-07-22 22:20:3542 EXPECT_EQ("wtf.foo.com", host_port.host());
43 EXPECT_EQ(666u, host_port.port());
[email protected]b6a50182010-05-12 22:47:1444}
45
[email protected]518ef5cc2010-08-21 02:12:4246TEST(HostMappingRulesTest, PortSpecificMatching) {
47 HostMappingRules rules;
48 rules.SetRulesFromString(
49 "map *.com:80 baz:111 , map *.com:443 blat:333, EXCLUDE *.foo.com");
50
51 // No match
52 HostPortPair host_port("test.com", 1234);
53 EXPECT_FALSE(rules.RewriteHost(&host_port));
54 EXPECT_EQ("test.com", host_port.host());
55 EXPECT_EQ(1234u, host_port.port());
56
57 // Match port 80
58 host_port = HostPortPair("crack.com", 80);
59 EXPECT_TRUE(rules.RewriteHost(&host_port));
60 EXPECT_EQ("baz", host_port.host());
61 EXPECT_EQ(111u, host_port.port());
62
63 // Match port 443
64 host_port = HostPortPair("wtf.com", 443);
65 EXPECT_TRUE(rules.RewriteHost(&host_port));
66 EXPECT_EQ("blat", host_port.host());
67 EXPECT_EQ(333u, host_port.port());
68
69 // Match port 443, but excluded.
70 host_port = HostPortPair("wtf.foo.com", 443);
71 EXPECT_FALSE(rules.RewriteHost(&host_port));
72 EXPECT_EQ("wtf.foo.com", host_port.host());
73 EXPECT_EQ(443u, host_port.port());
74}
75
[email protected]b6a50182010-05-12 22:47:1476// Parsing bad rules should silently discard the rule (and never crash).
77TEST(HostMappingRulesTest, ParseInvalidRules) {
78 HostMappingRules rules;
79
80 EXPECT_FALSE(rules.AddRuleFromString("xyz"));
[email protected]007b3f82013-04-09 08:46:4581 EXPECT_FALSE(rules.AddRuleFromString(std::string()));
[email protected]b6a50182010-05-12 22:47:1482 EXPECT_FALSE(rules.AddRuleFromString(" "));
83 EXPECT_FALSE(rules.AddRuleFromString("EXCLUDE"));
84 EXPECT_FALSE(rules.AddRuleFromString("EXCLUDE foo bar"));
85 EXPECT_FALSE(rules.AddRuleFromString("INCLUDE"));
86 EXPECT_FALSE(rules.AddRuleFromString("INCLUDE x"));
87 EXPECT_FALSE(rules.AddRuleFromString("INCLUDE x :10"));
88}
89
Eric Orth2f01fb22021-06-17 00:52:2790TEST(HostMappingRulesTest, RewritesUrl) {
91 HostMappingRules rules;
92 rules.AddRuleFromString("MAP initial.test replacement.test:1000");
93
94 GURL url("http://initial.test:111");
Eric Orthc4cca5d2021-07-02 19:59:0195 EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
Eric Orth2f01fb22021-06-17 00:52:2796 EXPECT_EQ(url, GURL("http://replacement.test:1000"));
97}
98
Eric Orthc4cca5d2021-07-02 19:59:0199TEST(HostMappingRulesTest, RewritesUrlToIpv6Literal) {
100 HostMappingRules rules;
101 rules.AddRuleFromString("MAP initial.test [2345:6789::0abc]:1112");
102
103 GURL url("http://initial.test:111");
104 EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
105 EXPECT_EQ(url, GURL("http://[2345:6789::0abc]:1112"));
106}
107
Eric Orth2f01fb22021-06-17 00:52:27108TEST(HostMappingRulesTest, RewritesUrlPreservingScheme) {
109 HostMappingRules rules;
110 rules.AddRuleFromString("MAP initial.test replacement.test:1000");
111
112 GURL url("wss://initial.test:222");
Eric Orthc4cca5d2021-07-02 19:59:01113 EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
Eric Orth2f01fb22021-06-17 00:52:27114 EXPECT_EQ(url, GURL("wss://replacement.test:1000"));
115}
116
117TEST(HostMappingRulesTest, RewritesFileUrl) {
118 HostMappingRules rules;
119 rules.AddRuleFromString("MAP initial.test replacement.test:1000");
120
121 // Expect replacement port to be ignored because file URLs do not use port.
122 GURL url("file://initial.test/file.txt");
123 ASSERT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
Eric Orthc4cca5d2021-07-02 19:59:01124 EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
Eric Orth2f01fb22021-06-17 00:52:27125 EXPECT_EQ(url, GURL("file://replacement.test/file.txt"));
126 EXPECT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
127}
128
129TEST(HostMappingRulesTest, RewritesAnyStandardUrlWithPort) {
130 const char kScheme[] = "foo";
131 url::ScopedSchemeRegistryForTests scoped_registry;
132 AddStandardScheme(kScheme, url::SCHEME_WITH_HOST_AND_PORT);
133 ASSERT_TRUE(url::IsStandard(kScheme, url::Component(0, strlen(kScheme))));
134
135 HostMappingRules rules;
136 rules.AddRuleFromString("MAP initial.test replacement.test:1000");
137
138 GURL url("foo://initial.test:100");
Eric Orthc4cca5d2021-07-02 19:59:01139 EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
Eric Orth2f01fb22021-06-17 00:52:27140 EXPECT_EQ(url, GURL("foo://replacement.test:1000"));
141}
142
143TEST(HostMappingRulesTest, RewritesAnyStandardUrlWithoutPort) {
144 const char kScheme[] = "foo";
145 url::ScopedSchemeRegistryForTests scoped_registry;
146 AddStandardScheme(kScheme, url::SCHEME_WITH_HOST);
147 ASSERT_TRUE(url::IsStandard(kScheme, url::Component(0, strlen(kScheme))));
148
149 HostMappingRules rules;
150 rules.AddRuleFromString("MAP initial.test replacement.test:1000");
151
152 // Expect replacement port to be ignored.
153 GURL url("foo://initial.test");
154 ASSERT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
Eric Orthc4cca5d2021-07-02 19:59:01155 EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
Eric Orth2f01fb22021-06-17 00:52:27156 EXPECT_EQ(url, GURL("foo://replacement.test"));
157 EXPECT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
158}
159
160TEST(HostMappingRulesTest, IgnoresUnmappedUrls) {
161 HostMappingRules rules;
162 rules.AddRuleFromString("MAP initial.test replacement.test:1000");
163
164 GURL url("http://different.test:111");
Eric Orthc4cca5d2021-07-02 19:59:01165 EXPECT_EQ(rules.RewriteUrl(url),
166 HostMappingRules::RewriteResult::kNoMatchingRule);
Eric Orth2f01fb22021-06-17 00:52:27167 EXPECT_EQ(url, GURL("http://different.test:111"));
168}
169
170TEST(HostMappingRulesTest, IgnoresInvalidReplacementUrls) {
171 HostMappingRules rules;
172 rules.AddRuleFromString("MAP initial.test invalid/url");
173
174 GURL url("http://initial.test");
Eric Orthc4cca5d2021-07-02 19:59:01175 EXPECT_EQ(rules.RewriteUrl(url),
176 HostMappingRules::RewriteResult::kInvalidRewrite);
177 EXPECT_EQ(url, GURL("http://initial.test"));
178}
179
180// Remapping to "~NOTFOUND" is documented as a special case for
181// MappedHostResolver usage. Ensure that it is handled as invalid as expected.
182TEST(HostMappingRulesTest, NotFoundIgnoredAsInvalidUrl) {
183 HostMappingRules rules;
184 rules.AddRuleFromString("MAP initial.test ~NOTFOUND");
185
186 GURL url("http://initial.test");
187 EXPECT_EQ(rules.RewriteUrl(url),
188 HostMappingRules::RewriteResult::kInvalidRewrite);
Eric Orth2f01fb22021-06-17 00:52:27189 EXPECT_EQ(url, GURL("http://initial.test"));
190}
191
[email protected]b6a50182010-05-12 22:47:14192} // namespace
193
194} // namespace net