diff options
author | initial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-07-26 22:42:52 +0000 |
---|---|---|
committer | initial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-07-26 22:42:52 +0000 |
commit | 586acc5fe142f498261f52c66862fa417c3d52d2 (patch) | |
tree | c98b3417a883f2477029c8cd5888f4078681e24e /net/base/cookie_monster_unittest.cc | |
parent | a814a8d55429605fe6d7045045cd25b6bf624580 (diff) | |
download | chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.zip chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.tar.gz chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.tar.bz2 |
Add net to the repository.
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@14 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/cookie_monster_unittest.cc')
-rw-r--r-- | net/base/cookie_monster_unittest.cc | 849 |
1 files changed, 849 insertions, 0 deletions
diff --git a/net/base/cookie_monster_unittest.cc b/net/base/cookie_monster_unittest.cc new file mode 100644 index 0000000..fbe1019 --- /dev/null +++ b/net/base/cookie_monster_unittest.cc @@ -0,0 +1,849 @@ +// Copyright 2008, Google Inc. +// All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are +// met: +// +// * Redistributions of source code must retain the above copyright +// notice, this list of conditions and the following disclaimer. +// * Redistributions in binary form must reproduce the above +// copyright notice, this list of conditions and the following disclaimer +// in the documentation and/or other materials provided with the +// distribution. +// * Neither the name of Google Inc. nor the names of its +// contributors may be used to endorse or promote products derived from +// this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +#include <windows.h> +#include <time.h> + +#include <string> + +#include "base/string_util.h" +#include "base/time.h" +#include "base/basictypes.h" +#include "googleurl/src/gurl.h" +#include "net/base/cookie_monster.h" +#include "testing/gtest/include/gtest/gtest.h" + +namespace { + class ParsedCookieTest : public testing::Test { }; + class CookieMonsterTest : public testing::Test { }; +} + + +TEST(ParsedCookieTest, TestBasic) { + CookieMonster::ParsedCookie pc("a=b"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_FALSE(pc.IsSecure()); + EXPECT_EQ(pc.Name(), "a"); + EXPECT_EQ(pc.Value(), "b"); +} + +TEST(ParsedCookieTest, TestQuoted) { + CookieMonster::ParsedCookie pc("a=\"b=;\"; path=\"/\""); + EXPECT_TRUE(pc.IsValid()); + EXPECT_FALSE(pc.IsSecure()); + EXPECT_TRUE(pc.HasPath()); + EXPECT_EQ(pc.Name(), "a"); + EXPECT_EQ(pc.Value(), "\"b=;\""); + // If a path was quoted, the path attribute keeps the quotes. This will + // make the cookie effectively useless, but path parameters aren't supposed + // to be quoted. Bug 1261605. + EXPECT_EQ(pc.Path(), "\"/\""); +} + +TEST(ParsedCookieTest, TestNameless) { + CookieMonster::ParsedCookie pc("BLAHHH; path=/; secure;"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_TRUE(pc.IsSecure()); + EXPECT_TRUE(pc.HasPath()); + EXPECT_EQ(pc.Path(), "/"); + EXPECT_EQ(pc.Name(), ""); + EXPECT_EQ(pc.Value(), "BLAHHH"); +} + +TEST(ParsedCookieTest, TestAttributeCase) { + CookieMonster::ParsedCookie pc("BLAHHH; Path=/; sECuRe; httpONLY"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_TRUE(pc.IsSecure()); + EXPECT_TRUE(pc.IsHttpOnly()); + EXPECT_TRUE(pc.HasPath()); + EXPECT_EQ(pc.Path(), "/"); + EXPECT_EQ(pc.Name(), ""); + EXPECT_EQ(pc.Value(), "BLAHHH"); +} + +TEST(ParsedCookieTest, TestDoubleQuotedNameless) { + CookieMonster::ParsedCookie pc("\"BLA\\\"HHH\"; path=/; secure;"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_TRUE(pc.IsSecure()); + EXPECT_TRUE(pc.HasPath()); + EXPECT_EQ(pc.Path(), "/"); + EXPECT_EQ(pc.Name(), ""); + EXPECT_EQ(pc.Value(), "\"BLA\\\"HHH\""); +} + +TEST(ParsedCookieTest, QuoteOffTheEnd) { + CookieMonster::ParsedCookie pc("a=\"B"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_EQ(pc.Name(), "a"); + EXPECT_EQ(pc.Value(), "\"B"); +} + +TEST(ParsedCookieTest, MissingName) { + CookieMonster::ParsedCookie pc("=ABC"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_EQ(pc.Name(), ""); + EXPECT_EQ(pc.Value(), "ABC"); +} + +TEST(ParsedCookieTest, MissingValue) { + CookieMonster::ParsedCookie pc("ABC=; path = /wee"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_EQ(pc.Name(), "ABC"); + EXPECT_EQ(pc.Value(), ""); + EXPECT_TRUE(pc.HasPath()); + EXPECT_EQ(pc.Path(), "/wee"); +} + +TEST(ParsedCookieTest, Whitespace) { + CookieMonster::ParsedCookie pc(" A = BC ;secure;;; httponly"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_EQ(pc.Name(), "A"); + EXPECT_EQ(pc.Value(), "BC"); + EXPECT_FALSE(pc.HasPath()); + EXPECT_FALSE(pc.HasDomain()); + EXPECT_TRUE(pc.IsSecure()); + EXPECT_TRUE(pc.IsHttpOnly()); +} +TEST(ParsedCookieTest, MultipleEquals) { + CookieMonster::ParsedCookie pc(" A=== BC ;secure;;; httponly"); + EXPECT_TRUE(pc.IsValid()); + EXPECT_EQ(pc.Name(), "A"); + EXPECT_EQ(pc.Value(), "== BC"); + EXPECT_FALSE(pc.HasPath()); + EXPECT_FALSE(pc.HasDomain()); + EXPECT_TRUE(pc.IsSecure()); + EXPECT_TRUE(pc.IsHttpOnly()); +} + +TEST(ParsedCookieTest, TrailingWhitespace) { + CookieMonster::ParsedCookie pc("ANCUUID=zohNumRKgI0oxyhSsV3Z7D; " + "expires=Sun, 18-Apr-2027 21:06:29 GMT; " + "path=/ ; "); + EXPECT_TRUE(pc.IsValid()); + EXPECT_EQ(pc.Name(), "ANCUUID"); + EXPECT_TRUE(pc.HasExpires()); + EXPECT_TRUE(pc.HasPath()); + EXPECT_EQ(pc.Path(), "/"); + // TODO should export like NumAttributes() and make sure that the + // trailing whitespace doesn't end up as an empty attribute or something. +} + +TEST(ParsedCookieTest, TooManyPairs) { + std::string blankpairs; + blankpairs.resize(CookieMonster::ParsedCookie::kMaxPairs - 1, ';'); + + CookieMonster::ParsedCookie pc1(blankpairs + "secure"); + EXPECT_TRUE(pc1.IsValid()); + EXPECT_TRUE(pc1.IsSecure()); + + CookieMonster::ParsedCookie pc2(blankpairs + ";secure"); + EXPECT_TRUE(pc2.IsValid()); + EXPECT_FALSE(pc2.IsSecure()); +} + +// TODO some better test cases for invalid cookies. +TEST(ParsedCookieTest, InvalidWhitespace) { + CookieMonster::ParsedCookie pc(" "); + EXPECT_FALSE(pc.IsValid()); +} + +TEST(ParsedCookieTest, InvalidTooLong) { + std::string maxstr; + maxstr.resize(CookieMonster::ParsedCookie::kMaxCookieSize, 'a'); + + CookieMonster::ParsedCookie pc1(maxstr); + EXPECT_TRUE(pc1.IsValid()); + + CookieMonster::ParsedCookie pc2(maxstr + "A"); + EXPECT_FALSE(pc2.IsValid()); +} + +TEST(ParsedCookieTest, InvalidEmpty) { + CookieMonster::ParsedCookie pc(""); + EXPECT_FALSE(pc.IsValid()); +} + +TEST(ParsedCookieTest, EmbeddedTerminator) { + CookieMonster::ParsedCookie pc1("AAA=BB\0ZYX"); + CookieMonster::ParsedCookie pc2("AAA=BB\rZYX"); + CookieMonster::ParsedCookie pc3("AAA=BB\nZYX"); + EXPECT_TRUE(pc1.IsValid()); + EXPECT_EQ(pc1.Name(), "AAA"); + EXPECT_EQ(pc1.Value(), "BB"); + EXPECT_TRUE(pc2.IsValid()); + EXPECT_EQ(pc2.Name(), "AAA"); + EXPECT_EQ(pc2.Value(), "BB"); + EXPECT_TRUE(pc3.IsValid()); + EXPECT_EQ(pc3.Name(), "AAA"); + EXPECT_EQ(pc3.Value(), "BB"); +} + +static const char kUrlGoogle[] = "http://www.google.izzle"; +static const char kUrlGoogleSecure[] = "https://www.google.izzle"; +static const char kUrlFtp[] = "ftp://ftp.google.izzle/"; +static const char kValidCookieLine[] = "A=B; path=/"; +static const char kValidDomainCookieLine[] = "A=B; path=/; domain=google.izzle"; + +TEST(CookieMonsterTest, DomainTest) { + GURL url_google(kUrlGoogle); + + CookieMonster cm; + EXPECT_TRUE(cm.SetCookie(url_google, "A=B")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + EXPECT_TRUE(cm.SetCookie(url_google, "C=D; domain=.google.izzle")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D"); + + // Verify that A=B was set as a host cookie rather than a domain + // cookie -- should not be accessible from a sub sub-domain. + EXPECT_EQ(cm.GetCookies(GURL("http://foo.www.google.izzle")), "C=D"); + + // Test and make sure we find domain cookies on the same domain. + EXPECT_TRUE(cm.SetCookie(url_google, "E=F; domain=.www.google.izzle")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D; E=F"); + + // Test setting a domain= that doesn't start w/ a dot, should + // treat it as a domain cookie, as if there was a pre-pended dot. + EXPECT_TRUE(cm.SetCookie(url_google, "G=H; domain=www.google.izzle")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D; E=F; G=H"); + + // Test domain enforcement, should fail on a sub-domain or something too deep. + EXPECT_FALSE(cm.SetCookie(url_google, "I=J; domain=.izzle")); + EXPECT_EQ(cm.GetCookies(GURL("http://a.izzle")), ""); + EXPECT_FALSE(cm.SetCookie(url_google, "K=L; domain=.bla.www.google.izzle")); + EXPECT_EQ(cm.GetCookies(GURL("http://bla.www.google.izzle")), + "C=D; E=F; G=H"); + EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D; E=F; G=H"); +} + +// FireFox recognizes domains containing trailing periods as valid. +// IE and Safari do not. Assert the expected policy here. +TEST(CookieMonsterTest, DomainWithTrailingDotTest) { + CookieMonster cm; + GURL url_google("http://www.google.com"); + + EXPECT_FALSE(cm.SetCookie(url_google, "a=1; domain=.www.google.com.")); + EXPECT_FALSE(cm.SetCookie(url_google, "b=2; domain=.www.google.com..")); + EXPECT_EQ(cm.GetCookies(url_google), ""); +} + +// Test that cookies can bet set on higher level domains. +// http://b/issue?id=896491 +TEST(CookieMonsterTest, ValidSubdomainTest) { + CookieMonster cm; + GURL url_abcd("http://a.b.c.d.com"); + GURL url_bcd("http://b.c.d.com"); + GURL url_cd("http://c.d.com"); + GURL url_d("http://d.com"); + + EXPECT_TRUE(cm.SetCookie(url_abcd, "a=1; domain=.a.b.c.d.com")); + EXPECT_TRUE(cm.SetCookie(url_abcd, "b=2; domain=.b.c.d.com")); + EXPECT_TRUE(cm.SetCookie(url_abcd, "c=3; domain=.c.d.com")); + EXPECT_TRUE(cm.SetCookie(url_abcd, "d=4; domain=.d.com")); + + EXPECT_EQ(cm.GetCookies(url_abcd), "a=1; b=2; c=3; d=4"); + EXPECT_EQ(cm.GetCookies(url_bcd), "b=2; c=3; d=4"); + EXPECT_EQ(cm.GetCookies(url_cd), "c=3; d=4"); + EXPECT_EQ(cm.GetCookies(url_d), "d=4"); + + // Check that the same cookie can exist on different sub-domains. + EXPECT_TRUE(cm.SetCookie(url_bcd, "X=bcd; domain=.b.c.d.com")); + EXPECT_TRUE(cm.SetCookie(url_bcd, "X=cd; domain=.c.d.com")); + EXPECT_EQ(cm.GetCookies(url_bcd), "b=2; c=3; d=4; X=bcd; X=cd"); + EXPECT_EQ(cm.GetCookies(url_cd), "c=3; d=4; X=cd"); +} + +// Test that setting a cookie which specifies an invalid domain has +// no side-effect. An invalid domain in this context is one which does +// not match the originating domain. +// http://b/issue?id=896472 +TEST(CookieMonsterTest, InvalidDomainTest) { + { + CookieMonster cm; + GURL url_foobar("http://foo.bar.com"); + + // More specific sub-domain than allowed. + EXPECT_FALSE(cm.SetCookie(url_foobar, "a=1; domain=.yo.foo.bar.com")); + + EXPECT_FALSE(cm.SetCookie(url_foobar, "b=2; domain=.foo.com")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "c=3; domain=.bar.foo.com")); + + // Different TLD, but the rest is a substring. + EXPECT_FALSE(cm.SetCookie(url_foobar, "d=4; domain=.foo.bar.com.net")); + + // A substring that isn't really a parent domain. + EXPECT_FALSE(cm.SetCookie(url_foobar, "e=5; domain=ar.com")); + + // Completely invalid domains: + EXPECT_FALSE(cm.SetCookie(url_foobar, "f=6; domain=.")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "g=7; domain=/")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "h=8; domain=http://foo.bar.com")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "i=9; domain=..foo.bar.com")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "j=10; domain=..bar.com")); + + // Make sure there isn't something quirky in the domain canonicalization + // that supports full URL semantics. + EXPECT_FALSE(cm.SetCookie(url_foobar, "k=11; domain=.foo.bar.com?blah")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "l=12; domain=.foo.bar.com/blah")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "m=13; domain=.foo.bar.com:80")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "n=14; domain=.foo.bar.com:")); + EXPECT_FALSE(cm.SetCookie(url_foobar, "o=15; domain=.foo.bar.com#sup")); + + EXPECT_EQ(cm.GetCookies(url_foobar), ""); + } + + { + // Make sure the cookie code hasn't gotten its subdomain string handling + // reversed, missed a suffix check, etc. It's important here that the two + // hosts below have the same domain + registry. + CookieMonster cm; + GURL url_foocom("http://foo.com.com"); + EXPECT_FALSE(cm.SetCookie(url_foocom, "a=1; domain=.foo.com.com.com")); + EXPECT_EQ(cm.GetCookies(url_foocom), ""); + } +} + +// Test the behavior of omitting dot prefix from domain, should +// function the same as FireFox. +// http://b/issue?id=889898 +TEST(CookieMonsterTest, DomainWithoutLeadingDotTest) { + { // The omission of dot results in setting a domain cookie. + CookieMonster cm; + GURL url_hosted("http://manage.hosted.filefront.com"); + GURL url_filefront("http://www.filefront.com"); + EXPECT_TRUE(cm.SetCookie(url_hosted, "sawAd=1; domain=filefront.com")); + EXPECT_EQ(cm.GetCookies(url_hosted), "sawAd=1"); + EXPECT_EQ(cm.GetCookies(url_filefront), "sawAd=1"); + } + + { // Even when the domains match exactly, don't consider it host cookie. + CookieMonster cm; + GURL url("http://www.google.com"); + EXPECT_TRUE(cm.SetCookie(url, "a=1; domain=www.google.com")); + EXPECT_EQ(cm.GetCookies(url), "a=1"); + EXPECT_EQ(cm.GetCookies(GURL("http://sub.www.google.com")), "a=1"); + EXPECT_EQ(cm.GetCookies(GURL("http://something-else.com")), ""); + } +} + +// Test that the domain specified in cookie string is treated case-insensitive +// http://b/issue?id=896475. +TEST(CookieMonsterTest, CaseInsensitiveDomainTest) { + CookieMonster cm; + GURL url_google("http://www.google.com"); + EXPECT_TRUE(cm.SetCookie(url_google, "a=1; domain=.GOOGLE.COM")); + EXPECT_TRUE(cm.SetCookie(url_google, "b=2; domain=.wWw.gOOgLE.coM")); + EXPECT_EQ(cm.GetCookies(url_google), "a=1; b=2"); +} + +TEST(CookieMonsterTest, TestIpAddress) { + GURL url_ip("http://1.2.3.4/weee"); + { + CookieMonster cm; + EXPECT_TRUE(cm.SetCookie(url_ip, kValidCookieLine)); + EXPECT_EQ(cm.GetCookies(url_ip), "A=B"); + } + + { // IP addresses should not be able to set domain cookies. + CookieMonster cm; + EXPECT_FALSE(cm.SetCookie(url_ip, "b=2; domain=.1.2.3.4")); + EXPECT_FALSE(cm.SetCookie(url_ip, "c=3; domain=.3.4")); + EXPECT_EQ(cm.GetCookies(url_ip), ""); + } +} + +// Test host cookies, and setting of cookies on TLD. +TEST(CookieMonsterTest, TestNonDottedAndTLD) { + { + CookieMonster cm; + GURL url("http://com/"); + // Allow setting on "com", (but only as a host cookie). + EXPECT_TRUE(cm.SetCookie(url, "a=1")); + EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.com")); + EXPECT_FALSE(cm.SetCookie(url, "c=3; domain=com")); + EXPECT_EQ(cm.GetCookies(url), "a=1"); + // Make sure it doesn't show up for a normal .com, it should be a host + // not a domain cookie. + EXPECT_EQ(cm.GetCookies(GURL("http://hopefully-no-cookies.com/")), ""); + EXPECT_EQ(cm.GetCookies(GURL("http://.com/")), ""); + } + + { // http://com. should be treated the same as http://com. + CookieMonster cm; + GURL url("http://com./index.html"); + EXPECT_TRUE(cm.SetCookie(url, "a=1")); + EXPECT_EQ(cm.GetCookies(url), "a=1"); + EXPECT_EQ(cm.GetCookies(GURL("http://hopefully-no-cookies.com./")), ""); + } + + { // Should not be able to set host cookie from a subdomain. + CookieMonster cm; + GURL url("http://a.b"); + EXPECT_FALSE(cm.SetCookie(url, "a=1; domain=.b")); + EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=b")); + EXPECT_EQ(cm.GetCookies(url), ""); + } + + { // Same test as above, but explicitly on a known TLD (com). + CookieMonster cm; + GURL url("http://google.com"); + EXPECT_FALSE(cm.SetCookie(url, "a=1; domain=.com")); + EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=com")); + EXPECT_EQ(cm.GetCookies(url), ""); + } + + { // Make sure can't set cookie on TLD which is dotted. + CookieMonster cm; + GURL url("http://google.co.uk"); + EXPECT_FALSE(cm.SetCookie(url, "a=1; domain=.co.uk")); + EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.uk")); + EXPECT_EQ(cm.GetCookies(url), ""); + EXPECT_EQ(cm.GetCookies(GURL("http://something-else.co.uk")), ""); + EXPECT_EQ(cm.GetCookies(GURL("http://something-else.uk")), ""); + } + + { // Intranet URLs should only be able to set host cookies. + CookieMonster cm; + GURL url("http://b"); + EXPECT_TRUE(cm.SetCookie(url, "a=1")); + EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.b")); + EXPECT_FALSE(cm.SetCookie(url, "c=3; domain=b")); + EXPECT_EQ(cm.GetCookies(url), "a=1"); + } +} + +// Test reading/writing cookies when the domain ends with a period, +// as in "www.google.com." +TEST(CookieMonsterTest, TestHostEndsWithDot) { + CookieMonster cm; + GURL url("http://www.google.com"); + GURL url_with_dot("http://www.google.com."); + EXPECT_TRUE(cm.SetCookie(url, "a=1")); + EXPECT_EQ(cm.GetCookies(url), "a=1"); + + // Do not share cookie space with the dot version of domain. + // Note: this is not what FireFox does, but it _is_ what IE+Safari do. + EXPECT_FALSE(cm.SetCookie(url, "b=2; domain=.www.google.com.")); + EXPECT_EQ(cm.GetCookies(url), "a=1"); + + EXPECT_TRUE(cm.SetCookie(url_with_dot, "b=2; domain=.google.com.")); + EXPECT_EQ(cm.GetCookies(url_with_dot), "b=2"); + + // Make sure there weren't any side effects. + EXPECT_EQ(cm.GetCookies(GURL("http://hopefully-no-cookies.com/")), ""); + EXPECT_EQ(cm.GetCookies(GURL("http://.com/")), ""); +} + +TEST(CookieMonsterTest, InvalidScheme) { + CookieMonster cm; + EXPECT_FALSE(cm.SetCookie(GURL(kUrlFtp), kValidCookieLine)); +} + +TEST(CookieMonsterTest, InvalidScheme_Read) { + CookieMonster cm; + EXPECT_TRUE(cm.SetCookie(GURL(kUrlGoogle), kValidDomainCookieLine)); + EXPECT_EQ(cm.GetCookies(GURL(kUrlFtp)), ""); +} + +TEST(CookieMonsterTest, PathTest) { + std::string url("http://www.google.izzle"); + CookieMonster cm; + EXPECT_TRUE(cm.SetCookie(GURL(url), "A=B; path=/wee")); + EXPECT_EQ(cm.GetCookies(GURL(url + "/wee")), "A=B"); + EXPECT_EQ(cm.GetCookies(GURL(url + "/wee/")), "A=B"); + EXPECT_EQ(cm.GetCookies(GURL(url + "/wee/war")), "A=B"); + EXPECT_EQ(cm.GetCookies(GURL(url + "/wee/war/more/more")), "A=B"); + EXPECT_EQ(cm.GetCookies(GURL(url + "/weehee")), ""); + EXPECT_EQ(cm.GetCookies(GURL(url + "/")), ""); + + // If we add a 0 length path, it should default to / + EXPECT_TRUE(cm.SetCookie(GURL(url), "A=C; path=")); + EXPECT_EQ(cm.GetCookies(GURL(url + "/wee")), "A=B; A=C"); + EXPECT_EQ(cm.GetCookies(GURL(url + "/")), "A=C"); +} + +TEST(CookieMonsterTest, HttpOnlyTest) { + GURL url_google(kUrlGoogle); + CookieMonster cm; + EXPECT_TRUE(cm.SetCookie(url_google, "A=B; httponly")); + EXPECT_EQ(cm.GetCookies(url_google), ""); + EXPECT_EQ(cm.GetCookiesWithOptions(url_google, + CookieMonster::INCLUDE_HTTPONLY), "A=B"); +} + +// From: http://support.microsoft.com/kb/167296. +static void UnixTimeToFileTime(time_t t, LPFILETIME pft) { + uint64 ll; + + ll = Int32x32To64(t, 10000000) + 116444736000000000; + pft->dwLowDateTime = (DWORD)ll; + pft->dwHighDateTime = (DWORD)(ll >> 32); +} + +static uint64 UnixTimeToUTC(time_t t) { + FILETIME ftime; + LARGE_INTEGER li; + UnixTimeToFileTime(t, &ftime); + li.LowPart = ftime.dwLowDateTime; + li.HighPart = ftime.dwHighDateTime; + return li.QuadPart; +} + +TEST(CookieMonsterTest, TestCookieDateParsing) { + const struct { + const char* str; + const bool valid; + const time_t epoch; + } tests[] = { + { "Sat, 15-Apr-17 21:01:22 GMT", true, 1492290082 }, + { "Thu, 19-Apr-2007 16:00:00 GMT", true, 1176998400 }, + { "Wed, 25 Apr 2007 21:02:13 GMT", true, 1177534933 }, + { "Thu, 19/Apr\\2007 16:00:00 GMT", true, 1176998400 }, + { "Fri, 1 Jan 2010 01:01:50 GMT", true, 1262307710 }, + { "Wednesday, 1-Jan-2003 00:00:00 GMT", true, 1041379200 }, + { ", 1-Jan-2003 00:00:00 GMT", true, 1041379200 }, + { " 1-Jan-2003 00:00:00 GMT", true, 1041379200 }, + { "1-Jan-2003 00:00:00 GMT", true, 1041379200 }, + { "Wed,18-Apr-07 22:50:12 GMT", true, 1176936612 }, + { "WillyWonka , 18-Apr-07 22:50:12 GMT", true, 1176936612 }, + { "WillyWonka , 18-Apr-07 22:50:12", true, 1176936612 }, + { "WillyWonka , 18-apr-07 22:50:12", true, 1176936612 }, + { "Mon, 18-Apr-1977 22:50:13 GMT", true, 230251813 }, + { "Mon, 18-Apr-77 22:50:13 GMT", true, 230251813 }, + // If the cookie came in with the expiration quoted (which in terms of + // the RFC you shouldn't do), we will get string quoted. Bug 1261605. + { "\"Sat, 15-Apr-17\\\"21:01:22\\\"GMT\"", true, 1492290082 }, + // Test with full month names and partial names. + { "Partyday, 18- April-07 22:50:12", true, 1176936612 }, + { "Partyday, 18 - Apri-07 22:50:12", true, 1176936612 }, + { "Wednes, 1-Januar-2003 00:00:00 GMT", true, 1041379200 }, + // Test that we always take GMT even with other time zones or bogus + // values. The RFC says everything should be GMT, and in the worst case + // we are 24 hours off because of zone issues. + { "Sat, 15-Apr-17 21:01:22", true, 1492290082 }, + { "Sat, 15-Apr-17 21:01:22 GMT-2", true, 1492290082 }, + { "Sat, 15-Apr-17 21:01:22 GMT BLAH", true, 1492290082 }, + { "Sat, 15-Apr-17 21:01:22 GMT-0400", true, 1492290082 }, + { "Sat, 15-Apr-17 21:01:22 GMT-0400 (EDT)",true, 1492290082 }, + { "Sat, 15-Apr-17 21:01:22 DST", true, 1492290082 }, + { "Sat, 15-Apr-17 21:01:22 -0400", true, 1492290082 }, + { "Sat, 15-Apr-17 21:01:22 (hello there)", true, 1492290082 }, + // Test that if we encounter multiple : fields, that we take the first + // that correctly parses. + { "Sat, 15-Apr-17 21:01:22 11:22:33", true, 1492290082 }, + { "Sat, 15-Apr-17 ::00 21:01:22", true, 1492290082 }, + { "Sat, 15-Apr-17 boink:z 21:01:22", true, 1492290082 }, + // We take the first, which in this case is invalid. + { "Sat, 15-Apr-17 91:22:33 21:01:22", false, 0 }, + // amazon.com formats their cookie expiration like this. + { "Thu Apr 18 22:50:12 2007 GMT", true, 1176936612 }, + // Test that hh:mm:ss can occur anywhere. + { "22:50:12 Thu Apr 18 2007 GMT", true, 1176936612 }, + { "Thu 22:50:12 Apr 18 2007 GMT", true, 1176936612 }, + { "Thu Apr 22:50:12 18 2007 GMT", true, 1176936612 }, + { "Thu Apr 18 22:50:12 2007 GMT", true, 1176936612 }, + { "Thu Apr 18 2007 22:50:12 GMT", true, 1176936612 }, + { "Thu Apr 18 2007 GMT 22:50:12", true, 1176936612 }, + // Test that the day and year can be anywhere if they are unambigious. + { "Sat, 15-Apr-17 21:01:22 GMT", true, 1492290082 }, + { "15-Sat, Apr-17 21:01:22 GMT", true, 1492290082 }, + { "15-Sat, Apr 21:01:22 GMT 17", true, 1492290082 }, + { "15-Sat, Apr 21:01:22 GMT 2017", true, 1492290082 }, + { "15 Apr 21:01:22 2017", true, 1492290082 }, + { "15 17 Apr 21:01:22", true, 1492290082 }, + { "Apr 15 17 21:01:22", true, 1492290082 }, + { "Apr 15 21:01:22 17", true, 1492290082 }, + { "2017 April 15 21:01:22", true, 1492290082 }, + { "15 April 2017 21:01:22", true, 1492290082 }, + // Some invalid dates + { "98 April 17 21:01:22", false, 0 }, + { "Thu, 012-Aug-2008 20:49:07 GMT", false, 0 }, + { "Thu, 12-Aug-31841 20:49:07 GMT", false, 0 }, + { "Thu, 12-Aug-9999999999 20:49:07 GMT", false, 0 }, + { "Thu, 999999999999-Aug-2007 20:49:07 GMT", false, 0 }, + { "Thu, 12-Aug-2007 20:61:99999999999 GMT", false, 0 }, + { "IAintNoDateFool", false, 0 }, + }; + + Time parsed_time; + for (int i = 0; i < arraysize(tests); ++i) { + parsed_time = CookieMonster::ParseCookieTime(tests[i].str); + if (!tests[i].valid) { + EXPECT_FALSE(!parsed_time.is_null()) << tests[i].str; + continue; + } + EXPECT_TRUE(!parsed_time.is_null()) << tests[i].str; + EXPECT_EQ(parsed_time.ToTimeT(), tests[i].epoch) << tests[i].str; + } +} + +TEST(CookieMonsterTest, TestCookieDeletion) { + GURL url_google(kUrlGoogle); + CookieMonster cm; + + // Create a session cookie. + EXPECT_TRUE(cm.SetCookie(url_google, kValidCookieLine)); + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + // Delete it via Max-Age. + EXPECT_TRUE(cm.SetCookie(url_google, + std::string(kValidCookieLine) + "; max-age=0")); + EXPECT_EQ(cm.GetCookies(url_google), ""); + + // Create a session cookie. + EXPECT_TRUE(cm.SetCookie(url_google, kValidCookieLine)); + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + // Delete it via Expires. + EXPECT_TRUE(cm.SetCookie(url_google, + std::string(kValidCookieLine) + + "; expires=Mon, 18-Apr-1977 22:50:13 GMT")); + EXPECT_EQ(cm.GetCookies(url_google), ""); + + // Create a persistent cookie. + EXPECT_TRUE(cm.SetCookie(url_google, + std::string(kValidCookieLine) + + "; expires=Mon, 18-Apr-22 22:50:13 GMT")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + // Delete it via Max-Age. + EXPECT_TRUE(cm.SetCookie(url_google, + std::string(kValidCookieLine) + "; max-age=0")); + EXPECT_EQ(cm.GetCookies(url_google), ""); + + // Create a persistent cookie. + EXPECT_TRUE(cm.SetCookie(url_google, + std::string(kValidCookieLine) + + "; expires=Mon, 18-Apr-22 22:50:13 GMT")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + // Delete it via Expires. + EXPECT_TRUE(cm.SetCookie(url_google, + std::string(kValidCookieLine) + + "; expires=Mon, 18-Apr-1977 22:50:13 GMT")); + EXPECT_EQ(cm.GetCookies(url_google), ""); +} + +TEST(CookieMonsterTest, TestCookieDeleteAll) { + GURL url_google(kUrlGoogle); + CookieMonster cm; + + EXPECT_TRUE(cm.SetCookie(url_google, kValidCookieLine)); + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + + EXPECT_TRUE(cm.SetCookie(url_google, "C=D")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B; C=D"); + + EXPECT_EQ(cm.DeleteAll(false), 2); + EXPECT_EQ(cm.GetCookies(url_google), ""); +} + +TEST(CookieMonsterTest, TestCookieDeleteAllCreatedAfterTimestamp) { + GURL url_google(kUrlGoogle); + CookieMonster cm; + Time now = Time::Now(); + + // Nothing has been added so nothing should be deleted. + EXPECT_EQ(0, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false)); + + // Create 3 cookies with creation date of today, yesterday and the day before. + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-0=Now", now)); + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-1=Yesterday", + now - TimeDelta::FromDays(1))); + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-2=DayBefore", + now - TimeDelta::FromDays(2))); + + // Try to delete everything from now onwards. + EXPECT_EQ(1, cm.DeleteAllCreatedAfter(now, false)); + // Now delete the one cookie created in the last day. + EXPECT_EQ(1, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(1), false)); + // Now effectively delete all cookies just created (1 is remaining). + EXPECT_EQ(1, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false)); + + // Make sure everything is gone. + EXPECT_EQ(0, cm.DeleteAllCreatedAfter(Time(), false)); + // Really make sure everything is gone. + EXPECT_EQ(0, cm.DeleteAll(false)); +} + +TEST(CookieMonsterTest, TestCookieDeleteAllCreatedBetweenTimestamps) { + GURL url_google(kUrlGoogle); + CookieMonster cm; + Time now = Time::Now(); + + // Nothing has been added so nothing should be deleted. + EXPECT_EQ(0, cm.DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false)); + + // Create 3 cookies with creation date of today, yesterday and the day before. + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-0=Now", now)); + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-1=Yesterday", + now - TimeDelta::FromDays(1))); + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-2=DayBefore", + now - TimeDelta::FromDays(2))); + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-3=ThreeDays", + now - TimeDelta::FromDays(3))); + EXPECT_TRUE(cm.SetCookieWithCreationTime(url_google, "T-7=LastWeek", + now - TimeDelta::FromDays(7))); + + // Try to delete threedays and the daybefore. + EXPECT_EQ(2, cm.DeleteAllCreatedBetween(now - TimeDelta::FromDays(3), + now - TimeDelta::FromDays(1), + false)); + + // Try to delete yesterday, also make sure that delete_end is not + // inclusive. + EXPECT_EQ(1, cm.DeleteAllCreatedBetween(now - TimeDelta::FromDays(2), + now, + false)); + + // Make sure the delete_begin is inclusive. + EXPECT_EQ(1, cm.DeleteAllCreatedBetween(now - TimeDelta::FromDays(7), + now, + false)); + + // Delete the last (now) item. + EXPECT_EQ(1, cm.DeleteAllCreatedAfter(Time(), false)); + + // Really make sure everything is gone. + EXPECT_EQ(0, cm.DeleteAll(false)); +} + +TEST(CookieMonsterTest, TestSecure) { + GURL url_google(kUrlGoogle); + GURL url_google_secure(kUrlGoogleSecure); + CookieMonster cm; + + EXPECT_TRUE(cm.SetCookie(url_google, "A=B")); + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + EXPECT_EQ(cm.GetCookies(url_google_secure), "A=B"); + + EXPECT_TRUE(cm.SetCookie(url_google_secure, "A=B; secure")); + // The secure should overwrite the non-secure. + EXPECT_EQ(cm.GetCookies(url_google), ""); + EXPECT_EQ(cm.GetCookies(url_google_secure), "A=B"); + + EXPECT_TRUE(cm.SetCookie(url_google_secure, "D=E; secure")); + EXPECT_EQ(cm.GetCookies(url_google), ""); + EXPECT_EQ(cm.GetCookies(url_google_secure), "A=B; D=E"); + + EXPECT_TRUE(cm.SetCookie(url_google_secure, "A=B")); + // The non-secure should overwrite the secure. + EXPECT_EQ(cm.GetCookies(url_google), "A=B"); + EXPECT_EQ(cm.GetCookies(url_google_secure), "D=E; A=B"); +} + +static int CountInString(const std::string& str, char c) { + int count = 0; + for (std::string::const_iterator it = str.begin(); + it != str.end(); ++it) { + if (*it == c) + ++count; + } + return count; +} + +TEST(CookieMonsterTest, TestHostGarbageCollection) { + GURL url_google(kUrlGoogle); + CookieMonster cm; + // Add a bunch of cookies on a single host, should purge them. + for (int i = 0; i < 101; i++) { + std::string cookie = StringPrintf("a%03d=b", i); + EXPECT_TRUE(cm.SetCookie(url_google, cookie)); + std::string cookies = cm.GetCookies(url_google); + // Make sure we find it in the cookies. + EXPECT_TRUE(cookies.find(cookie) != std::string::npos); + // Count the number of cookies. + EXPECT_LE(CountInString(cookies, '='), 70); + } +} + +TEST(CookieMonsterTest, TestTotalGarbageCollection) { + CookieMonster cm; + // Add a bunch of cookies on a bunch of host, some should get purged. + for (int i = 0; i < 2000; ++i) { + GURL url(StringPrintf("http://a%04d.izzle", i)); + EXPECT_TRUE(cm.SetCookie(url, "a=b")); + EXPECT_EQ(cm.GetCookies(url), "a=b"); + } + + // Check that cookies that still exist. + for (int i = 0; i < 2000; ++i) { + GURL url(StringPrintf("http://a%04d.izzle", i)); + if (i < 900) { + // Cookies should have gotten purged. + EXPECT_TRUE(cm.GetCookies(url).empty()); + } else if (i > 1100) { + // Cookies should still be around. + EXPECT_FALSE(cm.GetCookies(url).empty()); + } + } +} + +// Formerly NetUtilTest.CookieTest back when we used wininet's cookie handling. +TEST(CookieMonsterTest, NetUtilCookieTest) { + const GURL test_url(L"http://mojo.jojo.google.izzle/"); + + CookieMonster cm; + + EXPECT_TRUE(cm.SetCookie(test_url, "foo=bar")); + std::string value = cm.GetCookies(test_url); + EXPECT_EQ("foo=bar", value); + + // test that we can retrieve all cookies: + EXPECT_TRUE(cm.SetCookie(test_url, "x=1")); + EXPECT_TRUE(cm.SetCookie(test_url, "y=2")); + + std::string result = cm.GetCookies(test_url); + EXPECT_FALSE(result.empty()); + EXPECT_TRUE(result.find("x=1") != std::string::npos) << result; + EXPECT_TRUE(result.find("y=2") != std::string::npos) << result; +} + +static bool FindAndDeleteCookie(CookieMonster& cm, const std::string& domain, + const std::string& name) { + CookieMonster::CookieList cookies = cm.GetAllCookies(); + for (CookieMonster::CookieList::iterator it = cookies.begin(); + it != cookies.end(); ++it) + if (it->first == domain && it->second.Name() == name) + return cm.DeleteCookie(domain, it->second, false); + return false; +} + +TEST(CookieMonsterTest, TestDeleteSingleCookie) { + GURL url_google(kUrlGoogle); + + CookieMonster cm; + EXPECT_TRUE(cm.SetCookie(url_google, "A=B")); + EXPECT_TRUE(cm.SetCookie(url_google, "C=D")); + EXPECT_TRUE(cm.SetCookie(url_google, "E=F")); + EXPECT_EQ("A=B; C=D; E=F", cm.GetCookies(url_google)); + + EXPECT_TRUE(FindAndDeleteCookie(cm, url_google.host(), "C")); + EXPECT_EQ("A=B; E=F", cm.GetCookies(url_google)); + + EXPECT_FALSE(FindAndDeleteCookie(cm, "random.host", "E")); + EXPECT_EQ("A=B; E=F", cm.GetCookies(url_google)); +} + +// TODO test overwrite cookie |