[email protected] | 51bcc5d | 2013-04-24 01:41:37 | [diff] [blame] | 1 | // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 4 | |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 5 | #include "testing/gtest/include/gtest/gtest.h" |
[email protected] | 318076b | 2013-04-18 21:19:45 | [diff] [blame] | 6 | #include "url/url_canon.h" |
| 7 | #include "url/url_canon_stdstring.h" |
| 8 | #include "url/url_parse.h" |
| 9 | #include "url/url_test_utils.h" |
| 10 | #include "url/url_util.h" |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 11 | |
| 12 | TEST(URLUtilTest, FindAndCompareScheme) { |
| 13 | url_parse::Component found_scheme; |
| 14 | |
| 15 | // Simple case where the scheme is found and matches. |
| 16 | const char kStr1[] = "http://www.com/"; |
| 17 | EXPECT_TRUE(url_util::FindAndCompareScheme( |
| 18 | kStr1, static_cast<int>(strlen(kStr1)), "http", NULL)); |
| 19 | EXPECT_TRUE(url_util::FindAndCompareScheme( |
| 20 | kStr1, static_cast<int>(strlen(kStr1)), "http", &found_scheme)); |
| 21 | EXPECT_TRUE(found_scheme == url_parse::Component(0, 4)); |
| 22 | |
| 23 | // A case where the scheme is found and doesn't match. |
| 24 | EXPECT_FALSE(url_util::FindAndCompareScheme( |
| 25 | kStr1, static_cast<int>(strlen(kStr1)), "https", &found_scheme)); |
| 26 | EXPECT_TRUE(found_scheme == url_parse::Component(0, 4)); |
| 27 | |
| 28 | // A case where there is no scheme. |
| 29 | const char kStr2[] = "httpfoobar"; |
| 30 | EXPECT_FALSE(url_util::FindAndCompareScheme( |
| 31 | kStr2, static_cast<int>(strlen(kStr2)), "http", &found_scheme)); |
| 32 | EXPECT_TRUE(found_scheme == url_parse::Component()); |
| 33 | |
| 34 | // When there is an empty scheme, it should match the empty scheme. |
| 35 | const char kStr3[] = ":foo.com/"; |
| 36 | EXPECT_TRUE(url_util::FindAndCompareScheme( |
| 37 | kStr3, static_cast<int>(strlen(kStr3)), "", &found_scheme)); |
| 38 | EXPECT_TRUE(found_scheme == url_parse::Component(0, 0)); |
| 39 | |
| 40 | // But when there is no scheme, it should fail. |
| 41 | EXPECT_FALSE(url_util::FindAndCompareScheme("", 0, "", &found_scheme)); |
| 42 | EXPECT_TRUE(found_scheme == url_parse::Component()); |
| 43 | |
| 44 | // When there is a whitespace char in scheme, it should canonicalize the url |
| 45 | // before comparison. |
| 46 | const char whtspc_str[] = " \r\n\tjav\ra\nscri\tpt:alert(1)"; |
| 47 | EXPECT_TRUE(url_util::FindAndCompareScheme( |
| 48 | whtspc_str, static_cast<int>(strlen(whtspc_str)), "javascript", |
| 49 | &found_scheme)); |
| 50 | EXPECT_TRUE(found_scheme == url_parse::Component(1, 10)); |
| 51 | |
| 52 | // Control characters should be stripped out on the ends, and kept in the |
| 53 | // middle. |
| 54 | const char ctrl_str[] = "\02jav\02scr\03ipt:alert(1)"; |
| 55 | EXPECT_FALSE(url_util::FindAndCompareScheme( |
| 56 | ctrl_str, static_cast<int>(strlen(ctrl_str)), "javascript", |
| 57 | &found_scheme)); |
| 58 | EXPECT_TRUE(found_scheme == url_parse::Component(1, 11)); |
| 59 | } |
| 60 | |
| 61 | TEST(URLUtilTest, ReplaceComponents) { |
| 62 | url_parse::Parsed parsed; |
| 63 | url_canon::RawCanonOutputT<char> output; |
| 64 | url_parse::Parsed new_parsed; |
| 65 | |
| 66 | // Check that the following calls do not cause crash |
| 67 | url_canon::Replacements<char> replacements; |
| 68 | replacements.SetRef("test", url_parse::Component(0, 4)); |
| 69 | url_util::ReplaceComponents(NULL, 0, parsed, replacements, NULL, &output, |
| 70 | &new_parsed); |
| 71 | url_util::ReplaceComponents("", 0, parsed, replacements, NULL, &output, |
| 72 | &new_parsed); |
| 73 | replacements.ClearRef(); |
| 74 | replacements.SetHost("test", url_parse::Component(0, 4)); |
| 75 | url_util::ReplaceComponents(NULL, 0, parsed, replacements, NULL, &output, |
| 76 | &new_parsed); |
| 77 | url_util::ReplaceComponents("", 0, parsed, replacements, NULL, &output, |
| 78 | &new_parsed); |
| 79 | |
| 80 | replacements.ClearHost(); |
| 81 | url_util::ReplaceComponents(NULL, 0, parsed, replacements, NULL, &output, |
| 82 | &new_parsed); |
| 83 | url_util::ReplaceComponents("", 0, parsed, replacements, NULL, &output, |
| 84 | &new_parsed); |
| 85 | url_util::ReplaceComponents(NULL, 0, parsed, replacements, NULL, &output, |
| 86 | &new_parsed); |
| 87 | url_util::ReplaceComponents("", 0, parsed, replacements, NULL, &output, |
| 88 | &new_parsed); |
| 89 | } |
| 90 | |
| 91 | static std::string CheckReplaceScheme(const char* base_url, |
| 92 | const char* scheme) { |
| 93 | // Make sure the input is canonicalized. |
| 94 | url_canon::RawCanonOutput<32> original; |
| 95 | url_parse::Parsed original_parsed; |
[email protected] | 369e84f7 | 2013-11-23 01:53:52 | [diff] [blame] | 96 | url_util::Canonicalize(base_url, strlen(base_url), true, NULL, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 97 | &original, &original_parsed); |
| 98 | |
| 99 | url_canon::Replacements<char> replacements; |
| 100 | replacements.SetScheme(scheme, url_parse::Component(0, strlen(scheme))); |
| 101 | |
| 102 | std::string output_string; |
| 103 | url_canon::StdStringCanonOutput output(&output_string); |
| 104 | url_parse::Parsed output_parsed; |
| 105 | url_util::ReplaceComponents(original.data(), original.length(), |
| 106 | original_parsed, replacements, NULL, |
| 107 | &output, &output_parsed); |
| 108 | |
| 109 | output.Complete(); |
| 110 | return output_string; |
| 111 | } |
| 112 | |
| 113 | TEST(URLUtilTest, ReplaceScheme) { |
| 114 | EXPECT_EQ("https://google.com/", |
| 115 | CheckReplaceScheme("http://google.com/", "https")); |
| 116 | EXPECT_EQ("file://google.com/", |
| 117 | CheckReplaceScheme("http://google.com/", "file")); |
| 118 | EXPECT_EQ("http://home/Build", |
| 119 | CheckReplaceScheme("file:///Home/Build", "http")); |
| 120 | EXPECT_EQ("javascript:foo", |
| 121 | CheckReplaceScheme("about:foo", "javascript")); |
| 122 | EXPECT_EQ("://google.com/", |
| 123 | CheckReplaceScheme("http://google.com/", "")); |
| 124 | EXPECT_EQ("http://google.com/", |
| 125 | CheckReplaceScheme("about:google.com", "http")); |
| 126 | EXPECT_EQ("http:", CheckReplaceScheme("", "http")); |
| 127 | |
| 128 | #ifdef WIN32 |
| 129 | // Magic Windows drive letter behavior when converting to a file URL. |
| 130 | EXPECT_EQ("file:///E:/foo/", |
| 131 | CheckReplaceScheme("http://localhost/e:foo/", "file")); |
| 132 | #endif |
| 133 | |
| 134 | // This will probably change to "about://google.com/" when we fix |
| 135 | // http://crbug.com/160 which should also be an acceptable result. |
| 136 | EXPECT_EQ("about://google.com/", |
| 137 | CheckReplaceScheme("http://google.com/", "about")); |
[email protected] | 369e84f7 | 2013-11-23 01:53:52 | [diff] [blame] | 138 | |
| 139 | EXPECT_EQ("http://example.com/%20hello%20# world", |
| 140 | CheckReplaceScheme("myscheme:example.com/ hello # world ", "http")); |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 141 | } |
| 142 | |
| 143 | TEST(URLUtilTest, DecodeURLEscapeSequences) { |
| 144 | struct DecodeCase { |
| 145 | const char* input; |
| 146 | const char* output; |
| 147 | } decode_cases[] = { |
| 148 | {"hello, world", "hello, world"}, |
| 149 | {"%01%02%03%04%05%06%07%08%09%0a%0B%0C%0D%0e%0f/", |
| 150 | "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0B\x0C\x0D\x0e\x0f/"}, |
| 151 | {"%10%11%12%13%14%15%16%17%18%19%1a%1B%1C%1D%1e%1f/", |
| 152 | "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1B\x1C\x1D\x1e\x1f/"}, |
| 153 | {"%20%21%22%23%24%25%26%27%28%29%2a%2B%2C%2D%2e%2f/", |
| 154 | " !\"#$%&'()*+,-.//"}, |
| 155 | {"%30%31%32%33%34%35%36%37%38%39%3a%3B%3C%3D%3e%3f/", |
| 156 | "0123456789:;<=>?/"}, |
| 157 | {"%40%41%42%43%44%45%46%47%48%49%4a%4B%4C%4D%4e%4f/", |
| 158 | "@ABCDEFGHIJKLMNO/"}, |
| 159 | {"%50%51%52%53%54%55%56%57%58%59%5a%5B%5C%5D%5e%5f/", |
| 160 | "PQRSTUVWXYZ[\\]^_/"}, |
| 161 | {"%60%61%62%63%64%65%66%67%68%69%6a%6B%6C%6D%6e%6f/", |
| 162 | "`abcdefghijklmno/"}, |
| 163 | {"%70%71%72%73%74%75%76%77%78%79%7a%7B%7C%7D%7e%7f/", |
| 164 | "pqrstuvwxyz{|}~\x7f/"}, |
| 165 | // Test un-UTF-8-ization. |
| 166 | {"%e4%bd%a0%e5%a5%bd", "\xe4\xbd\xa0\xe5\xa5\xbd"}, |
| 167 | }; |
| 168 | |
| 169 | for (size_t i = 0; i < ARRAYSIZE_UNSAFE(decode_cases); i++) { |
| 170 | const char* input = decode_cases[i].input; |
[email protected] | 3774f83 | 2013-06-11 21:21:57 | [diff] [blame] | 171 | url_canon::RawCanonOutputT<base::char16> output; |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 172 | url_util::DecodeURLEscapeSequences(input, strlen(input), &output); |
| 173 | EXPECT_EQ(decode_cases[i].output, |
| 174 | url_test_utils::ConvertUTF16ToUTF8( |
[email protected] | 3774f83 | 2013-06-11 21:21:57 | [diff] [blame] | 175 | base::string16(output.data(), output.length()))); |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 176 | } |
| 177 | |
| 178 | // Our decode should decode %00 |
| 179 | const char zero_input[] = "%00"; |
[email protected] | 3774f83 | 2013-06-11 21:21:57 | [diff] [blame] | 180 | url_canon::RawCanonOutputT<base::char16> zero_output; |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 181 | url_util::DecodeURLEscapeSequences(zero_input, strlen(zero_input), |
| 182 | &zero_output); |
| 183 | EXPECT_NE("%00", |
| 184 | url_test_utils::ConvertUTF16ToUTF8( |
[email protected] | 3774f83 | 2013-06-11 21:21:57 | [diff] [blame] | 185 | base::string16(zero_output.data(), zero_output.length()))); |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 186 | |
| 187 | // Test the error behavior for invalid UTF-8. |
| 188 | const char invalid_input[] = "%e4%a0%e5%a5%bd"; |
[email protected] | 3774f83 | 2013-06-11 21:21:57 | [diff] [blame] | 189 | const base::char16 invalid_expected[4] = {0x00e4, 0x00a0, 0x597d, 0}; |
| 190 | url_canon::RawCanonOutputT<base::char16> invalid_output; |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 191 | url_util::DecodeURLEscapeSequences(invalid_input, strlen(invalid_input), |
| 192 | &invalid_output); |
[email protected] | 3774f83 | 2013-06-11 21:21:57 | [diff] [blame] | 193 | EXPECT_EQ(base::string16(invalid_expected), |
| 194 | base::string16(invalid_output.data(), invalid_output.length())); |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 195 | } |
| 196 | |
| 197 | TEST(URLUtilTest, TestEncodeURIComponent) { |
| 198 | struct EncodeCase { |
| 199 | const char* input; |
| 200 | const char* output; |
| 201 | } encode_cases[] = { |
| 202 | {"hello, world", "hello%2C%20world"}, |
| 203 | {"\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", |
| 204 | "%01%02%03%04%05%06%07%08%09%0A%0B%0C%0D%0E%0F"}, |
| 205 | {"\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F", |
| 206 | "%10%11%12%13%14%15%16%17%18%19%1A%1B%1C%1D%1E%1F"}, |
| 207 | {" !\"#$%&'()*+,-./", |
[email protected] | e60479fb | 2013-09-24 03:18:40 | [diff] [blame] | 208 | "%20!%22%23%24%25%26%27()*%2B%2C-.%2F"}, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 209 | {"0123456789:;<=>?", |
| 210 | "0123456789%3A%3B%3C%3D%3E%3F"}, |
| 211 | {"@ABCDEFGHIJKLMNO", |
| 212 | "%40ABCDEFGHIJKLMNO"}, |
| 213 | {"PQRSTUVWXYZ[\\]^_", |
| 214 | "PQRSTUVWXYZ%5B%5C%5D%5E_"}, |
| 215 | {"`abcdefghijklmno", |
| 216 | "%60abcdefghijklmno"}, |
| 217 | {"pqrstuvwxyz{|}~\x7f", |
| 218 | "pqrstuvwxyz%7B%7C%7D~%7F"}, |
| 219 | }; |
| 220 | |
| 221 | for (size_t i = 0; i < ARRAYSIZE_UNSAFE(encode_cases); i++) { |
| 222 | const char* input = encode_cases[i].input; |
| 223 | url_canon::RawCanonOutputT<char> buffer; |
| 224 | url_util::EncodeURIComponent(input, strlen(input), &buffer); |
| 225 | std::string output(buffer.data(), buffer.length()); |
| 226 | EXPECT_EQ(encode_cases[i].output, output); |
| 227 | } |
| 228 | } |
| 229 | |
| 230 | TEST(URLUtilTest, TestResolveRelativeWithNonStandardBase) { |
| 231 | // This tests non-standard (in the sense that GURL::IsStandard() == false) |
| 232 | // hierarchical schemes. |
| 233 | struct ResolveRelativeCase { |
| 234 | const char* base; |
| 235 | const char* rel; |
| 236 | bool is_valid; |
| 237 | const char* out; |
| 238 | } resolve_non_standard_cases[] = { |
| 239 | // Resolving a relative path against a non-hierarchical URL should fail. |
| 240 | {"scheme:opaque_data", "/path", false, ""}, |
| 241 | // Resolving a relative path against a non-standard authority-based base |
| 242 | // URL doesn't alter the authority section. |
| 243 | {"scheme://Authority/", "../path", true, "scheme://Authority/path"}, |
| 244 | // A non-standard hierarchical base is resolved with path URL |
| 245 | // canoncialization rules. |
| 246 | {"data:/Blah:Blah/", "file.html", true, "data:/Blah:Blah/file.html"}, |
[email protected] | f3e8433 | 2013-08-16 11:55:54 | [diff] [blame] | 247 | {"data:/Path/../part/part2", "file.html", true, |
| 248 | "data:/Path/../part/file.html"}, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 249 | // Path URL canonicalization rules also apply to non-standard authority- |
| 250 | // based URLs. |
[email protected] | f3e8433 | 2013-08-16 11:55:54 | [diff] [blame] | 251 | {"custom://Authority/", "file.html", true, |
| 252 | "custom://Authority/file.html"}, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 253 | {"custom://Authority/", "other://Auth/", true, "other://Auth/"}, |
[email protected] | f3e8433 | 2013-08-16 11:55:54 | [diff] [blame] | 254 | {"custom://Authority/", "../../file.html", true, |
| 255 | "custom://Authority/file.html"}, |
| 256 | {"custom://Authority/path/", "file.html", true, |
| 257 | "custom://Authority/path/file.html"}, |
| 258 | {"custom://Authority:NoCanon/path/", "file.html", true, |
| 259 | "custom://Authority:NoCanon/path/file.html"}, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 260 | // It's still possible to get an invalid path URL. |
| 261 | {"custom://Invalid:!#Auth/", "file.html", false, ""}, |
| 262 | // A path with an authority section gets canonicalized under standard URL |
| 263 | // rules, even though the base was non-standard. |
[email protected] | f3e8433 | 2013-08-16 11:55:54 | [diff] [blame] | 264 | {"content://content.Provider/", "//other.Provider", true, |
| 265 | "content://other.provider/"}, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 266 | // Resolving an absolute URL doesn't cause canonicalization of the |
| 267 | // result. |
| 268 | {"about:blank", "custom://Authority", true, "custom://Authority"}, |
[email protected] | f3e8433 | 2013-08-16 11:55:54 | [diff] [blame] | 269 | // Fragment URLs can be resolved against a non-standard base. |
| 270 | {"scheme://Authority/path", "#fragment", true, |
| 271 | "scheme://Authority/path#fragment"}, |
| 272 | {"scheme://Authority/", "#fragment", true, "scheme://Authority/#fragment"}, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 273 | // Resolving should fail if the base URL is authority-based but is |
| 274 | // missing a path component (the '/' at the end). |
| 275 | {"scheme://Authority", "path", false, ""}, |
[email protected] | 369e84f7 | 2013-11-23 01:53:52 | [diff] [blame] | 276 | // Test resolving a fragment (only) against any kind of base-URL. |
| 277 | {"about:blank", "#id42", true, "about:blank#id42" }, |
| 278 | {"about:blank", " #id42", true, "about:blank#id42" }, |
| 279 | {"about:blank#oldfrag", "#newfrag", true, "about:blank#newfrag" }, |
| 280 | // A surprising side effect of allowing fragments to resolve against |
| 281 | // any URL scheme is we might break javascript: URLs by doing so... |
| 282 | {"javascript:alert('foo#bar')", "#badfrag", true, |
| 283 | "javascript:alert('foo#badfrag" }, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 284 | }; |
| 285 | |
| 286 | for (size_t i = 0; i < ARRAYSIZE_UNSAFE(resolve_non_standard_cases); i++) { |
| 287 | const ResolveRelativeCase& test_data = resolve_non_standard_cases[i]; |
| 288 | url_parse::Parsed base_parsed; |
[email protected] | 369e84f7 | 2013-11-23 01:53:52 | [diff] [blame] | 289 | url_parse::ParsePathURL(test_data.base, strlen(test_data.base), false, |
[email protected] | e7bba5f8 | 2013-04-10 20:10:52 | [diff] [blame] | 290 | &base_parsed); |
| 291 | |
| 292 | std::string resolved; |
| 293 | url_canon::StdStringCanonOutput output(&resolved); |
| 294 | url_parse::Parsed resolved_parsed; |
| 295 | bool valid = |
| 296 | url_util::ResolveRelative(test_data.base, strlen(test_data.base), |
| 297 | base_parsed, |
| 298 | test_data.rel, strlen(test_data.rel), |
| 299 | NULL, &output, &resolved_parsed); |
| 300 | output.Complete(); |
| 301 | |
| 302 | EXPECT_EQ(test_data.is_valid, valid) << i; |
| 303 | if (test_data.is_valid && valid) |
| 304 | EXPECT_EQ(test_data.out, resolved) << i; |
| 305 | } |
| 306 | } |