summaryrefslogtreecommitdiffstats
path: root/net/base/cookie_monster_unittest.cc
diff options
context:
space:
mode:
authorinitial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98>2008-07-26 22:42:52 +0000
committerinitial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98>2008-07-26 22:42:52 +0000
commit586acc5fe142f498261f52c66862fa417c3d52d2 (patch)
treec98b3417a883f2477029c8cd5888f4078681e24e /net/base/cookie_monster_unittest.cc
parenta814a8d55429605fe6d7045045cd25b6bf624580 (diff)
downloadchromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.zip
chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.tar.gz
chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.tar.bz2
Add net to the repository.
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@14 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/cookie_monster_unittest.cc')
-rw-r--r--net/base/cookie_monster_unittest.cc849
1 files changed, 849 insertions, 0 deletions
diff --git a/net/base/cookie_monster_unittest.cc b/net/base/cookie_monster_unittest.cc
new file mode 100644
index 0000000..fbe1019
--- /dev/null
+++ b/net/base/cookie_monster_unittest.cc
@@ -0,0 +1,849 @@
+// Copyright 2008, Google Inc.
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are
+// met:
+//
+// * Redistributions of source code must retain the above copyright
+// notice, this list of conditions and the following disclaimer.
+// * Redistributions in binary form must reproduce the above
+// copyright notice, this list of conditions and the following disclaimer
+// in the documentation and/or other materials provided with the
+// distribution.
+// * Neither the name of Google Inc. nor the names of its
+// contributors may be used to endorse or promote products derived from
+// this software without specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+#include <windows.h>
+#include <time.h>
+
+#include <string>
+
+#include "base/string_util.h"
+#include "base/time.h"
+#include "base/basictypes.h"
+#include "googleurl/src/gurl.h"
+#include "net/base/cookie_monster.h"
+#include "testing/gtest/include/gtest/gtest.h"
+
+namespace {
+ class ParsedCookieTest : public testing::Test { };
+ class CookieMonsterTest : public testing::Test { };
+}
+
+
+TEST(ParsedCookieTest, TestBasic) {
+ CookieMonster::ParsedCookie pc("a=b");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_FALSE(pc.IsSecure());
+ EXPECT_EQ(pc.Name(), "a");
+ EXPECT_EQ(pc.Value(), "b");
+}
+
+TEST(ParsedCookieTest, TestQuoted) {
+ CookieMonster::ParsedCookie pc("a=\"b=;\"; path=\"/\"");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_FALSE(pc.IsSecure());
+ EXPECT_TRUE(pc.HasPath());
+ EXPECT_EQ(pc.Name(), "a");
+ EXPECT_EQ(pc.Value(), "\"b=;\"");
+ // If a path was quoted, the path attribute keeps the quotes. This will
+ // make the cookie effectively useless, but path parameters aren't supposed
+ // to be quoted. Bug 1261605.
+ EXPECT_EQ(pc.Path(), "\"/\"");
+}
+
+TEST(ParsedCookieTest, TestNameless) {
+ CookieMonster::ParsedCookie pc("BLAHHH; path=/; secure;");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_TRUE(pc.IsSecure());
+ EXPECT_TRUE(pc.HasPath());
+ EXPECT_EQ(pc.Path(), "/");
+ EXPECT_EQ(pc.Name(), "");
+ EXPECT_EQ(pc.Value(), "BLAHHH");
+}
+
+TEST(ParsedCookieTest, TestAttributeCase) {
+ CookieMonster::ParsedCookie pc("BLAHHH; Path=/; sECuRe; httpONLY");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_TRUE(pc.IsSecure());
+ EXPECT_TRUE(pc.IsHttpOnly());
+ EXPECT_TRUE(pc.HasPath());
+ EXPECT_EQ(pc.Path(), "/");
+ EXPECT_EQ(pc.Name(), "");
+ EXPECT_EQ(pc.Value(), "BLAHHH");
+}
+
+TEST(ParsedCookieTest, TestDoubleQuotedNameless) {
+ CookieMonster::ParsedCookie pc("\"BLA\\\"HHH\"; path=/; secure;");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_TRUE(pc.IsSecure());
+ EXPECT_TRUE(pc.HasPath());
+ EXPECT_EQ(pc.Path(), "/");
+ EXPECT_EQ(pc.Name(), "");
+ EXPECT_EQ(pc.Value(), "\"BLA\\\"HHH\"");
+}
+
+TEST(ParsedCookieTest, QuoteOffTheEnd) {
+ CookieMonster::ParsedCookie pc("a=\"B");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_EQ(pc.Name(), "a");
+ EXPECT_EQ(pc.Value(), "\"B");
+}
+
+TEST(ParsedCookieTest, MissingName) {
+ CookieMonster::ParsedCookie pc("=ABC");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_EQ(pc.Name(), "");
+ EXPECT_EQ(pc.Value(), "ABC");
+}
+
+TEST(ParsedCookieTest, MissingValue) {
+ CookieMonster::ParsedCookie pc("ABC=; path = /wee");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_EQ(pc.Name(), "ABC");
+ EXPECT_EQ(pc.Value(), "");
+ EXPECT_TRUE(pc.HasPath());
+ EXPECT_EQ(pc.Path(), "/wee");
+}
+
+TEST(ParsedCookieTest, Whitespace) {
+ CookieMonster::ParsedCookie pc(" A = BC ;secure;;; httponly");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_EQ(pc.Name(), "A");
+ EXPECT_EQ(pc.Value(), "BC");
+ EXPECT_FALSE(pc.HasPath());
+ EXPECT_FALSE(pc.HasDomain());
+ EXPECT_TRUE(pc.IsSecure());
+ EXPECT_TRUE(pc.IsHttpOnly());
+}
+TEST(ParsedCookieTest, MultipleEquals) {
+ CookieMonster::ParsedCookie pc(" A=== BC ;secure;;; httponly");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_EQ(pc.Name(), "A");
+ EXPECT_EQ(pc.Value(), "== BC");
+ EXPECT_FALSE(pc.HasPath());
+ EXPECT_FALSE(pc.HasDomain());
+ EXPECT_TRUE(pc.IsSecure());
+ EXPECT_TRUE(pc.IsHttpOnly());
+}
+
+TEST(ParsedCookieTest, TrailingWhitespace) {
+ CookieMonster::ParsedCookie pc("ANCUUID=zohNumRKgI0oxyhSsV3Z7D; "
+ "expires=Sun, 18-Apr-2027 21:06:29 GMT; "
+ "path=/ ; ");
+ EXPECT_TRUE(pc.IsValid());
+ EXPECT_EQ(pc.Name(), "ANCUUID");
+ EXPECT_TRUE(pc.HasExpires());
+ EXPECT_TRUE(pc.HasPath());
+ EXPECT_EQ(pc.Path(), "/");
+ // TODO should export like NumAttributes() and make sure that the
+ // trailing whitespace doesn't end up as an empty attribute or something.
+}
+
+TEST(ParsedCookieTest, TooManyPairs) {
+ std::string blankpairs;
+ blankpairs.resize(CookieMonster::ParsedCookie::kMaxPairs - 1, ';');
+
+ CookieMonster::ParsedCookie pc1(blankpairs + "secure");
+ EXPECT_TRUE(pc1.IsValid());
+ EXPECT_TRUE(pc1.IsSecure());
+
+ CookieMonster::ParsedCookie pc2(blankpairs + ";secure");
+ EXPECT_TRUE(pc2.IsValid());
+ EXPECT_FALSE(pc2.IsSecure());
+}
+
+// TODO some better test cases for invalid cookies.
+TEST(ParsedCookieTest, InvalidWhitespace) {
+ CookieMonster::ParsedCookie pc(" ");
+ EXPECT_FALSE(pc.IsValid());
+}
+
+TEST(ParsedCookieTest, InvalidTooLong) {
+ std::string maxstr;
+ maxstr.resize(CookieMonster::ParsedCookie::kMaxCookieSize, 'a');
+
+ CookieMonster::ParsedCookie pc1(maxstr);
+ EXPECT_TRUE(pc1.IsValid());
+
+ CookieMonster::ParsedCookie pc2(maxstr + "A");
+ EXPECT_FALSE(pc2.IsValid());
+}
+
+TEST(ParsedCookieTest, InvalidEmpty) {
+ CookieMonster::ParsedCookie pc("");
+ EXPECT_FALSE(pc.IsValid());
+}
+
+TEST(ParsedCookieTest, EmbeddedTerminator) {
+ CookieMonster::ParsedCookie pc1("AAA=BB\0ZYX");
+ CookieMonster::ParsedCookie pc2("AAA=BB\rZYX");
+ CookieMonster::ParsedCookie pc3("AAA=BB\nZYX");
+ EXPECT_TRUE(pc1.IsValid());
+ EXPECT_EQ(pc1.Name(), "AAA");
+ EXPECT_EQ(pc1.Value(), "BB");
+ EXPECT_TRUE(pc2.IsValid());
+ EXPECT_EQ(pc2.Name(), "AAA");
+ EXPECT_EQ(pc2.Value(), "BB");
+ EXPECT_TRUE(pc3.IsValid());
+ EXPECT_EQ(pc3.Name(), "AAA");
+ EXPECT_EQ(pc3.Value(), "BB");
+}
+
+static const char kUrlGoogle[] = "http://www.google.izzle";
+static const char kUrlGoogleSecure[] = "https://www.google.izzle";
+static const char kUrlFtp[] = "ftp://ftp.google.izzle/";
+static const char kValidCookieLine[] = "A=B; path=/";
+static const char kValidDomainCookieLine[] = "A=B; path=/; domain=google.izzle";
+
+TEST(CookieMonsterTest, DomainTest) {
+ GURL url_google(kUrlGoogle);
+
+ CookieMonster cm;
+ EXPECT_TRUE(cm.SetCookie(url_google, "A=B"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+ EXPECT_TRUE(cm.SetCookie(url_google, "C=D; domain=.google.izzle"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D");
+
+ // Verify that A=B was set as a host cookie rather than a domain
+ // cookie -- should not be accessible from a sub sub-domain.
+ EXPECT_EQ(cm.GetCookies(GURL("http://foo.www.google.izzle")), "C=D");
+
+ // Test and make sure we find domain cookies on the same domain.
+ EXPECT_TRUE(cm.SetCookie(url_google, "E=F; domain=.www.google.izzle"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D; E=F");
+
+ // Test setting a domain= that doesn't start w/ a dot, should
+ // treat it as a domain cookie, as if there was a pre-pended dot.
+ EXPECT_TRUE(cm.SetCookie(url_google, "G=H; domain=www.google.izzle"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D; E=F; G=H");
+
+ // Test domain enforcement, should fail on a sub-domain or something too deep.
+ EXPECT_FALSE(cm.SetCookie(url_google, "I=J; domain=.izzle"));
+ EXPECT_EQ(cm.GetCookies(GURL("http://a.izzle")), "");
+ EXPECT_FALSE(cm.SetCookie(url_google, "K=L; domain=.bla.www.google.izzle"));
+ EXPECT_EQ(cm.GetCookies(GURL("http://bla.www.google.izzle")),
+ "C=D; E=F; G=H");
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D; E=F; G=H");
+}
+
+// FireFox recognizes domains containing trailing periods as valid.
+// IE and Safari do not. Assert the expected policy here.
+TEST(CookieMonsterTest, DomainWithTrailingDotTest) {
+ CookieMonster cm;
+ GURL url_google("http://www.google.com");
+
+ EXPECT_FALSE(cm.SetCookie(url_google, "a=1; domain=.www.google.com."));
+ EXPECT_FALSE(cm.SetCookie(url_google, "b=2; domain=.www.google.com.."));
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+}
+
+// Test that cookies can bet set on higher level domains.
+// http://b/issue?id=896491
+TEST(CookieMonsterTest, ValidSubdomainTest) {
+ CookieMonster cm;
+ GURL url_abcd("http://a.b.c.d.com");
+ GURL url_bcd("http://b.c.d.com");
+ GURL url_cd("http://c.d.com");
+ GURL url_d("http://d.com");
+
+ EXPECT_TRUE(cm.SetCookie(url_abcd, "a=1; domain=.a.b.c.d.com"));
+ EXPECT_TRUE(cm.SetCookie(url_abcd, "b=2; domain=.b.c.d.com"));
+ EXPECT_TRUE(cm.SetCookie(url_abcd, "c=3; domain=.c.d.com"));
+ EXPECT_TRUE(cm.SetCookie(url_abcd, "d=4; domain=.d.com"));
+
+ EXPECT_EQ(cm.GetCookies(url_abcd), "a=1; b=2; c=3; d=4");
+ EXPECT_EQ(cm.GetCookies(url_bcd), "b=2; c=3; d=4");
+ EXPECT_EQ(cm.GetCookies(url_cd), "c=3; d=4");
+ EXPECT_EQ(cm.GetCookies(url_d), "d=4");
+
+ // Check that the same cookie can exist on different sub-domains.
+ EXPECT_TRUE(cm.SetCookie(url_bcd, "X=bcd; domain=.b.c.d.com"));
+ EXPECT_TRUE(cm.SetCookie(url_bcd, "X=cd; domain=.c.d.com"));
+ EXPECT_EQ(cm.GetCookies(url_bcd), "b=2; c=3; d=4; X=bcd; X=cd");
+ EXPECT_EQ(cm.GetCookies(url_cd), "c=3; d=4; X=cd");
+}
+
+// Test that setting a cookie which specifies an invalid domain has
+// no side-effect. An invalid domain in this context is one which does
+// not match the originating domain.
+// http://b/issue?id=896472
+TEST(CookieMonsterTest, InvalidDomainTest) {
+ {
+ CookieMonster cm;
+ GURL url_foobar("http://foo.bar.com");
+
+ // More specific sub-domain than allowed.
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "a=1; domain=.yo.foo.bar.com"));
+
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "b=2; domain=.foo.com"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "c=3; domain=.bar.foo.com"));
+
+ // Different TLD, but the rest is a substring.
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "d=4; domain=.foo.bar.com.net"));
+
+ // A substring that isn't really a parent domain.
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "e=5; domain=ar.com"));
+
+ // Completely invalid domains:
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "f=6; domain=."));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "g=7; domain=/"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "h=8; domain=http://foo.bar.com"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "i=9; domain=..foo.bar.com"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "j=10; domain=..bar.com"));
+
+ // Make sure there isn't something quirky in the domain canonicalization
+ // that supports full URL semantics.
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "k=11; domain=.foo.bar.com?blah"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "l=12; domain=.foo.bar.com/blah"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "m=13; domain=.foo.bar.com:80"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "n=14; domain=.foo.bar.com:"));
+ EXPECT_FALSE(cm.SetCookie(url_foobar, "o=15; domain=.foo.bar.com#sup"));
+
+ EXPECT_EQ(cm.GetCookies(url_foobar), "");
+ }
+
+ {
+ // Make sure the cookie code hasn't gotten its subdomain string handling
+ // reversed, missed a suffix check, etc. It's important here that the two
+ // hosts below have the same domain + registry.
+ CookieMonster cm;
+ GURL url_foocom("http://foo.com.com");
+ EXPECT_FALSE(cm.SetCookie(url_foocom, "a=1; domain=.foo.com.com.com"));
+ EXPECT_EQ(cm.GetCookies(url_foocom), "");
+ }
+}
+
+// Test the behavior of omitting dot prefix from domain, should
+// function the same as FireFox.
+// http://b/issue?id=889898
+TEST(CookieMonsterTest, DomainWithoutLeadingDotTest) {
+ { // The omission of dot results in setting a domain cookie.
+ CookieMonster cm;
+ GURL url_hosted("http://manage.hosted.filefront.com");
+ GURL url_filefront("http://www.filefront.com");
+ EXPECT_TRUE(cm.SetCookie(url_hosted, "sawAd=1; domain=filefront.com"));
+ EXPECT_EQ(cm.GetCookies(url_hosted), "sawAd=1");
+ EXPECT_EQ(cm.GetCookies(url_filefront), "sawAd=1");
+ }
+
+ { // Even when the domains match exactly, don't consider it host cookie.
+ CookieMonster cm;
+ GURL url("http://www.google.com");
+ EXPECT_TRUE(cm.SetCookie(url, "a=1; domain=www.google.com"));
+ EXPECT_EQ(cm.GetCookies(url), "a=1");
+ EXPECT_EQ(cm.GetCookies(GURL("http://sub.www.google.com")), "a=1");
+ EXPECT_EQ(cm.GetCookies(GURL("http://something-else.com")), "");
+ }
+}
+
+// Test that the domain specified in cookie string is treated case-insensitive
+// http://b/issue?id=896475.
+TEST(CookieMonsterTest, CaseInsensitiveDomainTest) {
+ CookieMonster cm;
+ GURL url_google("http://www.google.com");
+ EXPECT_TRUE(cm.SetCookie(url_google, "a=1; domain=.GOOGLE.COM"));
+ EXPECT_TRUE(cm.SetCookie(url_google, "b=2; domain=.wWw.gOOgLE.coM"));
+ EXPECT_EQ(cm.GetCookies(url_google), "a=1; b=2");
+}
+
+TEST(CookieMonsterTest, TestIpAddress) {
+ GURL url_ip("http://1.2.3.4/weee");
+ {
+ CookieMonster cm;
+ EXPECT_TRUE(cm.SetCookie(url_ip, kValidCookieLine));
+ EXPECT_EQ(cm.GetCookies(url_ip), "A=B");
+ }
+
+ { // IP addresses should not be able to set domain cookies.
+ CookieMonster cm;
+ EXPECT_FALSE(cm.SetCookie(url_ip, "b=2; domain=.1.2.3.4"));
+ EXPECT_FALSE(cm.SetCookie(url_ip, "c=3; domain=.3.4"));
+ EXPECT_EQ(cm.GetCookies(url_ip), "");
+ }
+}
+
+// Test host cookies, and setting of cookies on TLD.
+TEST(CookieMonsterTest, TestNonDottedAndTLD) {
+ {
+ CookieMonster cm;
+ GURL url("http://com/");
+ // Allow setting on "com", (but only as a host cookie).
+ EXPECT_TRUE(cm.SetCookie(url, "a=1"));
+ EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.com"));
+ EXPECT_FALSE(cm.SetCookie(url, "c=3; domain=com"));
+ EXPECT_EQ(cm.GetCookies(url), "a=1");
+ // Make sure it doesn't show up for a normal .com, it should be a host
+ // not a domain cookie.
+ EXPECT_EQ(cm.GetCookies(GURL("http://hopefully-no-cookies.com/")), "");
+ EXPECT_EQ(cm.GetCookies(GURL("http://.com/")), "");
+ }
+
+ { // http://com. should be treated the same as http://com.
+ CookieMonster cm;
+ GURL url("http://com./index.html");
+ EXPECT_TRUE(cm.SetCookie(url, "a=1"));
+ EXPECT_EQ(cm.GetCookies(url), "a=1");
+ EXPECT_EQ(cm.GetCookies(GURL("http://hopefully-no-cookies.com./")), "");
+ }
+
+ { // Should not be able to set host cookie from a subdomain.
+ CookieMonster cm;
+ GURL url("http://a.b");
+ EXPECT_FALSE(cm.SetCookie(url, "a=1; domain=.b"));
+ EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=b"));
+ EXPECT_EQ(cm.GetCookies(url), "");
+ }
+
+ { // Same test as above, but explicitly on a known TLD (com).
+ CookieMonster cm;
+ GURL url("http://google.com");
+ EXPECT_FALSE(cm.SetCookie(url, "a=1; domain=.com"));
+ EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=com"));
+ EXPECT_EQ(cm.GetCookies(url), "");
+ }
+
+ { // Make sure can't set cookie on TLD which is dotted.
+ CookieMonster cm;
+ GURL url("http://google.co.uk");
+ EXPECT_FALSE(cm.SetCookie(url, "a=1; domain=.co.uk"));
+ EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.uk"));
+ EXPECT_EQ(cm.GetCookies(url), "");
+ EXPECT_EQ(cm.GetCookies(GURL("http://something-else.co.uk")), "");
+ EXPECT_EQ(cm.GetCookies(GURL("http://something-else.uk")), "");
+ }
+
+ { // Intranet URLs should only be able to set host cookies.
+ CookieMonster cm;
+ GURL url("http://b");
+ EXPECT_TRUE(cm.SetCookie(url, "a=1"));
+ EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.b"));
+ EXPECT_FALSE(cm.SetCookie(url, "c=3; domain=b"));
+ EXPECT_EQ(cm.GetCookies(url), "a=1");
+ }
+}
+
+// Test reading/writing cookies when the domain ends with a period,
+// as in "www.google.com."
+TEST(CookieMonsterTest, TestHostEndsWithDot) {
+ CookieMonster cm;
+ GURL url("http://www.google.com");
+ GURL url_with_dot("http://www.google.com.");
+ EXPECT_TRUE(cm.SetCookie(url, "a=1"));
+ EXPECT_EQ(cm.GetCookies(url), "a=1");
+
+ // Do not share cookie space with the dot version of domain.
+ // Note: this is not what FireFox does, but it _is_ what IE+Safari do.
+ EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.www.google.com."));
+ EXPECT_EQ(cm.GetCookies(url), "a=1");
+
+ EXPECT_TRUE(cm.SetCookie(url_with_dot, "b=2; domain=.google.com."));
+ EXPECT_EQ(cm.GetCookies(url_with_dot), "b=2");
+
+ // Make sure there weren't any side effects.
+ EXPECT_EQ(cm.GetCookies(GURL("http://hopefully-no-cookies.com/")), "");
+ EXPECT_EQ(cm.GetCookies(GURL("http://.com/")), "");
+}
+
+TEST(CookieMonsterTest, InvalidScheme) {
+ CookieMonster cm;
+ EXPECT_FALSE(cm.SetCookie(GURL(kUrlFtp), kValidCookieLine));
+}
+
+TEST(CookieMonsterTest, InvalidScheme_Read) {
+ CookieMonster cm;
+ EXPECT_TRUE(cm.SetCookie(GURL(kUrlGoogle), kValidDomainCookieLine));
+ EXPECT_EQ(cm.GetCookies(GURL(kUrlFtp)), "");
+}
+
+TEST(CookieMonsterTest, PathTest) {
+ std::string url("http://www.google.izzle");
+ CookieMonster cm;
+ EXPECT_TRUE(cm.SetCookie(GURL(url), "A=B; path=/wee"));
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/wee")), "A=B");
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/wee/")), "A=B");
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/wee/war")), "A=B");
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/wee/war/more/more")), "A=B");
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/weehee")), "");
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/")), "");
+
+ // If we add a 0 length path, it should default to /
+ EXPECT_TRUE(cm.SetCookie(GURL(url), "A=C; path="));
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/wee")), "A=B; A=C");
+ EXPECT_EQ(cm.GetCookies(GURL(url + "/")), "A=C");
+}
+
+TEST(CookieMonsterTest, HttpOnlyTest) {
+ GURL url_google(kUrlGoogle);
+ CookieMonster cm;
+ EXPECT_TRUE(cm.SetCookie(url_google, "A=B; httponly"));
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+ EXPECT_EQ(cm.GetCookiesWithOptions(url_google,
+ CookieMonster::INCLUDE_HTTPONLY), "A=B");
+}
+
+// From: http://support.microsoft.com/kb/167296.
+static void UnixTimeToFileTime(time_t t, LPFILETIME pft) {
+ uint64 ll;
+
+ ll = Int32x32To64(t, 10000000) + 116444736000000000;
+ pft->dwLowDateTime = (DWORD)ll;
+ pft->dwHighDateTime = (DWORD)(ll >> 32);
+}
+
+static uint64 UnixTimeToUTC(time_t t) {
+ FILETIME ftime;
+ LARGE_INTEGER li;
+ UnixTimeToFileTime(t, &ftime);
+ li.LowPart = ftime.dwLowDateTime;
+ li.HighPart = ftime.dwHighDateTime;
+ return li.QuadPart;
+}
+
+TEST(CookieMonsterTest, TestCookieDateParsing) {
+ const struct {
+ const char* str;
+ const bool valid;
+ const time_t epoch;
+ } tests[] = {
+ { "Sat, 15-Apr-17 21:01:22 GMT", true, 1492290082 },
+ { "Thu, 19-Apr-2007 16:00:00 GMT", true, 1176998400 },
+ { "Wed, 25 Apr 2007 21:02:13 GMT", true, 1177534933 },
+ { "Thu, 19/Apr\\2007 16:00:00 GMT", true, 1176998400 },
+ { "Fri, 1 Jan 2010 01:01:50 GMT", true, 1262307710 },
+ { "Wednesday, 1-Jan-2003 00:00:00 GMT", true, 1041379200 },
+ { ", 1-Jan-2003 00:00:00 GMT", true, 1041379200 },
+ { " 1-Jan-2003 00:00:00 GMT", true, 1041379200 },
+ { "1-Jan-2003 00:00:00 GMT", true, 1041379200 },
+ { "Wed,18-Apr-07 22:50:12 GMT", true, 1176936612 },
+ { "WillyWonka , 18-Apr-07 22:50:12 GMT", true, 1176936612 },
+ { "WillyWonka , 18-Apr-07 22:50:12", true, 1176936612 },
+ { "WillyWonka , 18-apr-07 22:50:12", true, 1176936612 },
+ { "Mon, 18-Apr-1977 22:50:13 GMT", true, 230251813 },
+ { "Mon, 18-Apr-77 22:50:13 GMT", true, 230251813 },
+ // If the cookie came in with the expiration quoted (which in terms of
+ // the RFC you shouldn't do), we will get string quoted. Bug 1261605.
+ { "\"Sat, 15-Apr-17\\\"21:01:22\\\"GMT\"", true, 1492290082 },
+ // Test with full month names and partial names.
+ { "Partyday, 18- April-07 22:50:12", true, 1176936612 },
+ { "Partyday, 18 - Apri-07 22:50:12", true, 1176936612 },
+ { "Wednes, 1-Januar-2003 00:00:00 GMT", true, 1041379200 },
+ // Test that we always take GMT even with other time zones or bogus
+ // values. The RFC says everything should be GMT, and in the worst case
+ // we are 24 hours off because of zone issues.
+ { "Sat, 15-Apr-17 21:01:22", true, 1492290082 },
+ { "Sat, 15-Apr-17 21:01:22 GMT-2", true, 1492290082 },
+ { "Sat, 15-Apr-17 21:01:22 GMT BLAH", true, 1492290082 },
+ { "Sat, 15-Apr-17 21:01:22 GMT-0400", true, 1492290082 },
+ { "Sat, 15-Apr-17 21:01:22 GMT-0400 (EDT)",true, 1492290082 },
+ { "Sat, 15-Apr-17 21:01:22 DST", true, 1492290082 },
+ { "Sat, 15-Apr-17 21:01:22 -0400", true, 1492290082 },
+ { "Sat, 15-Apr-17 21:01:22 (hello there)", true, 1492290082 },
+ // Test that if we encounter multiple : fields, that we take the first
+ // that correctly parses.
+ { "Sat, 15-Apr-17 21:01:22 11:22:33", true, 1492290082 },
+ { "Sat, 15-Apr-17 ::00 21:01:22", true, 1492290082 },
+ { "Sat, 15-Apr-17 boink:z 21:01:22", true, 1492290082 },
+ // We take the first, which in this case is invalid.
+ { "Sat, 15-Apr-17 91:22:33 21:01:22", false, 0 },
+ // amazon.com formats their cookie expiration like this.
+ { "Thu Apr 18 22:50:12 2007 GMT", true, 1176936612 },
+ // Test that hh:mm:ss can occur anywhere.
+ { "22:50:12 Thu Apr 18 2007 GMT", true, 1176936612 },
+ { "Thu 22:50:12 Apr 18 2007 GMT", true, 1176936612 },
+ { "Thu Apr 22:50:12 18 2007 GMT", true, 1176936612 },
+ { "Thu Apr 18 22:50:12 2007 GMT", true, 1176936612 },
+ { "Thu Apr 18 2007 22:50:12 GMT", true, 1176936612 },
+ { "Thu Apr 18 2007 GMT 22:50:12", true, 1176936612 },
+ // Test that the day and year can be anywhere if they are unambigious.
+ { "Sat, 15-Apr-17 21:01:22 GMT", true, 1492290082 },
+ { "15-Sat, Apr-17 21:01:22 GMT", true, 1492290082 },
+ { "15-Sat, Apr 21:01:22 GMT 17", true, 1492290082 },
+ { "15-Sat, Apr 21:01:22 GMT 2017", true, 1492290082 },
+ { "15 Apr 21:01:22 2017", true, 1492290082 },
+ { "15 17 Apr 21:01:22", true, 1492290082 },
+ { "Apr 15 17 21:01:22", true, 1492290082 },
+ { "Apr 15 21:01:22 17", true, 1492290082 },
+ { "2017 April 15 21:01:22", true, 1492290082 },
+ { "15 April 2017 21:01:22", true, 1492290082 },
+ // Some invalid dates
+ { "98 April 17 21:01:22", false, 0 },
+ { "Thu, 012-Aug-2008 20:49:07 GMT", false, 0 },
+ { "Thu, 12-Aug-31841 20:49:07 GMT", false, 0 },
+ { "Thu, 12-Aug-9999999999 20:49:07 GMT", false, 0 },
+ { "Thu, 999999999999-Aug-2007 20:49:07 GMT", false, 0 },
+ { "Thu, 12-Aug-2007 20:61:99999999999 GMT", false, 0 },
+ { "IAintNoDateFool", false, 0 },
+ };
+
+ Time parsed_time;
+ for (int i = 0; i < arraysize(tests); ++i) {
+ parsed_time = CookieMonster::ParseCookieTime(tests[i].str);
+ if (!tests[i].valid) {
+ EXPECT_FALSE(!parsed_time.is_null()) << tests[i].str;
+ continue;
+ }
+ EXPECT_TRUE(!parsed_time.is_null()) << tests[i].str;
+ EXPECT_EQ(parsed_time.ToTimeT(), tests[i].epoch) << tests[i].str;
+ }
+}
+
+TEST(CookieMonsterTest, TestCookieDeletion) {
+ GURL url_google(kUrlGoogle);
+ CookieMonster cm;
+
+ // Create a session cookie.
+ EXPECT_TRUE(cm.SetCookie(url_google, kValidCookieLine));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+ // Delete it via Max-Age.
+ EXPECT_TRUE(cm.SetCookie(url_google,
+ std::string(kValidCookieLine) + "; max-age=0"));
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+
+ // Create a session cookie.
+ EXPECT_TRUE(cm.SetCookie(url_google, kValidCookieLine));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+ // Delete it via Expires.
+ EXPECT_TRUE(cm.SetCookie(url_google,
+ std::string(kValidCookieLine) +
+ "; expires=Mon, 18-Apr-1977 22:50:13 GMT"));
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+
+ // Create a persistent cookie.
+ EXPECT_TRUE(cm.SetCookie(url_google,
+ std::string(kValidCookieLine) +
+ "; expires=Mon, 18-Apr-22 22:50:13 GMT"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+ // Delete it via Max-Age.
+ EXPECT_TRUE(cm.SetCookie(url_google,
+ std::string(kValidCookieLine) + "; max-age=0"));
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+
+ // Create a persistent cookie.
+ EXPECT_TRUE(cm.SetCookie(url_google,
+ std::string(kValidCookieLine) +
+ "; expires=Mon, 18-Apr-22 22:50:13 GMT"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+ // Delete it via Expires.
+ EXPECT_TRUE(cm.SetCookie(url_google,
+ std::string(kValidCookieLine) +
+ "; expires=Mon, 18-Apr-1977 22:50:13 GMT"));
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+}
+
+TEST(CookieMonsterTest, TestCookieDeleteAll) {
+ GURL url_google(kUrlGoogle);
+ CookieMonster cm;
+
+ EXPECT_TRUE(cm.SetCookie(url_google, kValidCookieLine));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+
+ EXPECT_TRUE(cm.SetCookie(url_google, "C=D"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D");
+
+ EXPECT_EQ(cm.DeleteAll(false), 2);
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+}
+
+TEST(CookieMonsterTest, TestCookieDeleteAllCreatedAfterTimestamp) {
+ GURL url_google(kUrlGoogle);
+ CookieMonster cm;
+ Time now = Time::Now();
+
+ // Nothing has been added so nothing should be deleted.
+ EXPECT_EQ(0, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false));
+
+ // Create 3 cookies with creation date of today, yesterday and the day before.
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-0=Now", now));
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-1=Yesterday",
+ now - TimeDelta::FromDays(1)));
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-2=DayBefore",
+ now - TimeDelta::FromDays(2)));
+
+ // Try to delete everything from now onwards.
+ EXPECT_EQ(1, cm.DeleteAllCreatedAfter(now, false));
+ // Now delete the one cookie created in the last day.
+ EXPECT_EQ(1, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(1), false));
+ // Now effectively delete all cookies just created (1 is remaining).
+ EXPECT_EQ(1, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false));
+
+ // Make sure everything is gone.
+ EXPECT_EQ(0, cm.DeleteAllCreatedAfter(Time(), false));
+ // Really make sure everything is gone.
+ EXPECT_EQ(0, cm.DeleteAll(false));
+}
+
+TEST(CookieMonsterTest, TestCookieDeleteAllCreatedBetweenTimestamps) {
+ GURL url_google(kUrlGoogle);
+ CookieMonster cm;
+ Time now = Time::Now();
+
+ // Nothing has been added so nothing should be deleted.
+ EXPECT_EQ(0, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false));
+
+ // Create 3 cookies with creation date of today, yesterday and the day before.
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-0=Now", now));
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-1=Yesterday",
+ now - TimeDelta::FromDays(1)));
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-2=DayBefore",
+ now - TimeDelta::FromDays(2)));
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-3=ThreeDays",
+ now - TimeDelta::FromDays(3)));
+ EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-7=LastWeek",
+ now - TimeDelta::FromDays(7)));
+
+ // Try to delete threedays and the daybefore.
+ EXPECT_EQ(2, cm.DeleteAllCreatedBetween(now - TimeDelta::FromDays(3),
+ now - TimeDelta::FromDays(1),
+ false));
+
+ // Try to delete yesterday, also make sure that delete_end is not
+ // inclusive.
+ EXPECT_EQ(1, cm.DeleteAllCreatedBetween(now - TimeDelta::FromDays(2),
+ now,
+ false));
+
+ // Make sure the delete_begin is inclusive.
+ EXPECT_EQ(1, cm.DeleteAllCreatedBetween(now - TimeDelta::FromDays(7),
+ now,
+ false));
+
+ // Delete the last (now) item.
+ EXPECT_EQ(1, cm.DeleteAllCreatedAfter(Time(), false));
+
+ // Really make sure everything is gone.
+ EXPECT_EQ(0, cm.DeleteAll(false));
+}
+
+TEST(CookieMonsterTest, TestSecure) {
+ GURL url_google(kUrlGoogle);
+ GURL url_google_secure(kUrlGoogleSecure);
+ CookieMonster cm;
+
+ EXPECT_TRUE(cm.SetCookie(url_google, "A=B"));
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+ EXPECT_EQ(cm.GetCookies(url_google_secure), "A=B");
+
+ EXPECT_TRUE(cm.SetCookie(url_google_secure, "A=B; secure"));
+ // The secure should overwrite the non-secure.
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+ EXPECT_EQ(cm.GetCookies(url_google_secure), "A=B");
+
+ EXPECT_TRUE(cm.SetCookie(url_google_secure, "D=E; secure"));
+ EXPECT_EQ(cm.GetCookies(url_google), "");
+ EXPECT_EQ(cm.GetCookies(url_google_secure), "A=B; D=E");
+
+ EXPECT_TRUE(cm.SetCookie(url_google_secure, "A=B"));
+ // The non-secure should overwrite the secure.
+ EXPECT_EQ(cm.GetCookies(url_google), "A=B");
+ EXPECT_EQ(cm.GetCookies(url_google_secure), "D=E; A=B");
+}
+
+static int CountInString(const std::string& str, char c) {
+ int count = 0;
+ for (std::string::const_iterator it = str.begin();
+ it != str.end(); ++it) {
+ if (*it == c)
+ ++count;
+ }
+ return count;
+}
+
+TEST(CookieMonsterTest, TestHostGarbageCollection) {
+ GURL url_google(kUrlGoogle);
+ CookieMonster cm;
+ // Add a bunch of cookies on a single host, should purge them.
+ for (int i = 0; i < 101; i++) {
+ std::string cookie = StringPrintf("a%03d=b", i);
+ EXPECT_TRUE(cm.SetCookie(url_google, cookie));
+ std::string cookies = cm.GetCookies(url_google);
+ // Make sure we find it in the cookies.
+ EXPECT_TRUE(cookies.find(cookie) != std::string::npos);
+ // Count the number of cookies.
+ EXPECT_LE(CountInString(cookies, '='), 70);
+ }
+}
+
+TEST(CookieMonsterTest, TestTotalGarbageCollection) {
+ CookieMonster cm;
+ // Add a bunch of cookies on a bunch of host, some should get purged.
+ for (int i = 0; i < 2000; ++i) {
+ GURL url(StringPrintf("http://a%04d.izzle", i));
+ EXPECT_TRUE(cm.SetCookie(url, "a=b"));
+ EXPECT_EQ(cm.GetCookies(url), "a=b");
+ }
+
+ // Check that cookies that still exist.
+ for (int i = 0; i < 2000; ++i) {
+ GURL url(StringPrintf("http://a%04d.izzle", i));
+ if (i < 900) {
+ // Cookies should have gotten purged.
+ EXPECT_TRUE(cm.GetCookies(url).empty());
+ } else if (i > 1100) {
+ // Cookies should still be around.
+ EXPECT_FALSE(cm.GetCookies(url).empty());
+ }
+ }
+}
+
+// Formerly NetUtilTest.CookieTest back when we used wininet's cookie handling.
+TEST(CookieMonsterTest, NetUtilCookieTest) {
+ const GURL test_url(L"http://mojo.jojo.google.izzle/");
+
+ CookieMonster cm;
+
+ EXPECT_TRUE(cm.SetCookie(test_url, "foo=bar"));
+ std::string value = cm.GetCookies(test_url);
+ EXPECT_EQ("foo=bar", value);
+
+ // test that we can retrieve all cookies:
+ EXPECT_TRUE(cm.SetCookie(test_url, "x=1"));
+ EXPECT_TRUE(cm.SetCookie(test_url, "y=2"));
+
+ std::string result = cm.GetCookies(test_url);
+ EXPECT_FALSE(result.empty());
+ EXPECT_TRUE(result.find("x=1") != std::string::npos) << result;
+ EXPECT_TRUE(result.find("y=2") != std::string::npos) << result;
+}
+
+static bool FindAndDeleteCookie(CookieMonster& cm, const std::string& domain,
+ const std::string& name) {
+ CookieMonster::CookieList cookies = cm.GetAllCookies();
+ for (CookieMonster::CookieList::iterator it = cookies.begin();
+ it != cookies.end(); ++it)
+ if (it->first == domain && it->second.Name() == name)
+ return cm.DeleteCookie(domain, it->second, false);
+ return false;
+}
+
+TEST(CookieMonsterTest, TestDeleteSingleCookie) {
+ GURL url_google(kUrlGoogle);
+
+ CookieMonster cm;
+ EXPECT_TRUE(cm.SetCookie(url_google, "A=B"));
+ EXPECT_TRUE(cm.SetCookie(url_google, "C=D"));
+ EXPECT_TRUE(cm.SetCookie(url_google, "E=F"));
+ EXPECT_EQ("A=B; C=D; E=F", cm.GetCookies(url_google));
+
+ EXPECT_TRUE(FindAndDeleteCookie(cm, url_google.host(), "C"));
+ EXPECT_EQ("A=B; E=F", cm.GetCookies(url_google));
+
+ EXPECT_FALSE(FindAndDeleteCookie(cm, "random.host", "E"));
+ EXPECT_EQ("A=B; E=F", cm.GetCookies(url_google));
+}
+
+// TODO test overwrite cookie