| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/common/content_settings_pattern.h" | 5 #include "chrome/common/content_settings_pattern.h" |
| 6 | 6 |
| 7 #include "googleurl/src/gurl.h" | 7 #include "googleurl/src/gurl.h" |
| 8 #include "testing/gtest/include/gtest/gtest.h" | 8 #include "testing/gtest/include/gtest/gtest.h" |
| 9 | 9 |
| 10 namespace { | 10 namespace { |
| (...skipping 154 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 165 EXPECT_TRUE(Pattern("https://www.example.com:443").IsValid()); | 165 EXPECT_TRUE(Pattern("https://www.example.com:443").IsValid()); |
| 166 EXPECT_STREQ("https://www.example.com:443", | 166 EXPECT_STREQ("https://www.example.com:443", |
| 167 Pattern("https://www.example.com:443").ToString().c_str()); | 167 Pattern("https://www.example.com:443").ToString().c_str()); |
| 168 // HTTPS patterns with none default port. | 168 // HTTPS patterns with none default port. |
| 169 EXPECT_TRUE(Pattern("https://www.example.com:8080").IsValid()); | 169 EXPECT_TRUE(Pattern("https://www.example.com:8080").IsValid()); |
| 170 EXPECT_STREQ("https://www.example.com:8080", | 170 EXPECT_STREQ("https://www.example.com:8080", |
| 171 Pattern("https://www.example.com:8080").ToString().c_str()); | 171 Pattern("https://www.example.com:8080").ToString().c_str()); |
| 172 } | 172 } |
| 173 | 173 |
| 174 TEST(ContentSettingsPatternTest, FromString_FilePatterns) { | 174 TEST(ContentSettingsPatternTest, FromString_FilePatterns) { |
| 175 EXPECT_TRUE(Pattern("file:///").IsValid()); | 175 EXPECT_FALSE(Pattern("file:///").IsValid()); |
| 176 EXPECT_STREQ("file:///", | 176 |
| 177 Pattern("file:///").ToString().c_str()); | 177 // Non-empty domains aren't allowed in file patterns. |
| 178 EXPECT_TRUE(Pattern("file:///").Matches( | 178 EXPECT_FALSE(Pattern("file://foo/").IsValid()); |
| 179 GURL("file:///"))); | 179 |
| 180 EXPECT_FALSE(Pattern("file:///").Matches( | 180 // Domain wildcards aren't allowed in file patterns. |
| 181 GURL("file:///tmp/test.html"))); | 181 EXPECT_FALSE(Pattern("file://*/").IsValid()); |
| 182 EXPECT_FALSE(Pattern("file://[*.]/").IsValid()); |
| 183 |
| 184 // These specify a path that contains '*', which isn't allowed to avoid |
| 185 // user confusion. |
| 186 EXPECT_FALSE(Pattern("file:///*").IsValid()); |
| 187 EXPECT_FALSE(Pattern("file:///foo/bar/*").IsValid()); |
| 182 | 188 |
| 183 EXPECT_TRUE(Pattern("file:///tmp/test.html").IsValid()); | 189 EXPECT_TRUE(Pattern("file:///tmp/test.html").IsValid()); |
| 184 EXPECT_STREQ("file:///tmp/file.html", | 190 EXPECT_STREQ("file:///tmp/file.html", |
| 185 Pattern("file:///tmp/file.html").ToString().c_str()); | 191 Pattern("file:///tmp/file.html").ToString().c_str()); |
| 186 EXPECT_TRUE(Pattern("file:///tmp/test.html").Matches( | 192 EXPECT_TRUE(Pattern("file:///tmp/test.html").Matches( |
| 187 GURL("file:///tmp/test.html"))); | 193 GURL("file:///tmp/test.html"))); |
| 188 EXPECT_FALSE(Pattern("file:///tmp/test.html").Matches( | 194 EXPECT_FALSE(Pattern("file:///tmp/test.html").Matches( |
| 189 GURL("file:///tmp/other.html"))); | 195 GURL("file:///tmp/other.html"))); |
| 190 EXPECT_FALSE(Pattern("file:///tmp/test.html").Matches( | 196 EXPECT_FALSE(Pattern("file:///tmp/test.html").Matches( |
| 191 GURL("http://example.org/"))); | 197 GURL("http://example.org/"))); |
| 192 } | 198 } |
| 193 | 199 |
| 194 TEST(ContentSettingsPatternTest, FromString_ExtensionPatterns) { | 200 TEST(ContentSettingsPatternTest, FromString_ExtensionPatterns) { |
| 195 EXPECT_TRUE(Pattern("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/") | 201 EXPECT_TRUE(Pattern("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/") |
| 196 .IsValid()); | 202 .IsValid()); |
| 197 EXPECT_STREQ("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/", | 203 EXPECT_STREQ("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/", |
| 198 Pattern("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/") | 204 Pattern("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/") |
| 199 .ToString().c_str()); | 205 .ToString().c_str()); |
| 200 EXPECT_TRUE(Pattern("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/") | 206 EXPECT_TRUE(Pattern("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/") |
| 201 .Matches(GURL("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/"))); | 207 .Matches(GURL("chrome-extension://peoadpeiejnhkmpaakpnompolbglelel/"))); |
| 202 } | 208 } |
| 203 | 209 |
| 204 TEST(ContentSettingsPatternTest, FromString_WithIPAdresses) { | 210 TEST(ContentSettingsPatternTest, FromString_WithIPAdresses) { |
| 205 // IPv4 | 211 // IPv4 |
| 206 EXPECT_TRUE(Pattern("192.168.0.1").IsValid()); | 212 EXPECT_TRUE(Pattern("192.168.0.1").IsValid()); |
| 207 EXPECT_STREQ("192.168.1.1", Pattern("192.168.1.1").ToString().c_str()); | 213 EXPECT_STREQ("192.168.1.1", Pattern("192.168.1.1").ToString().c_str()); |
| 208 EXPECT_TRUE(Pattern("https://192.168.0.1:8080").IsValid()); | 214 EXPECT_TRUE(Pattern("https://192.168.0.1:8080").IsValid()); |
| 209 EXPECT_STREQ("https://192.168.0.1:8080", | 215 EXPECT_STREQ("https://192.168.0.1:8080", |
| 210 Pattern("https://192.168.0.1:8080").ToString().c_str()); | 216 Pattern("https://192.168.0.1:8080").ToString().c_str()); |
| 217 |
| 218 // Subdomain wildcards should be only valid for hosts, not for IP addresses. |
| 219 EXPECT_FALSE(Pattern("[*.]127.0.0.1").IsValid()); |
| 220 |
| 211 // IPv6 | 221 // IPv6 |
| 212 EXPECT_TRUE(Pattern("[::1]").IsValid()); | 222 EXPECT_TRUE(Pattern("[::1]").IsValid()); |
| 213 EXPECT_STREQ("[::1]", Pattern("[::1]").ToString().c_str()); | 223 EXPECT_STREQ("[::1]", Pattern("[::1]").ToString().c_str()); |
| 214 EXPECT_TRUE(Pattern("https://[::1]:8080").IsValid()); | 224 EXPECT_TRUE(Pattern("https://[::1]:8080").IsValid()); |
| 215 EXPECT_STREQ("https://[::1]:8080", | 225 EXPECT_STREQ("https://[::1]:8080", |
| 216 Pattern("https://[::1]:8080").ToString().c_str()); | 226 Pattern("https://[::1]:8080").ToString().c_str()); |
| 217 } | 227 } |
| 218 | 228 |
| 219 TEST(ContentSettingsPatternTest, FromString_WithWildcards) { | 229 TEST(ContentSettingsPatternTest, FromString_WithWildcards) { |
| 220 // Creating content settings patterns from strings completes pattern parts | 230 // Creating content settings patterns from strings completes pattern parts |
| (...skipping 74 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 295 GURL("https://www.google.com"))); | 305 GURL("https://www.google.com"))); |
| 296 | 306 |
| 297 EXPECT_TRUE(Pattern("[*.]google.com:4321").Matches( | 307 EXPECT_TRUE(Pattern("[*.]google.com:4321").Matches( |
| 298 GURL("https://mail.google.com:4321"))); | 308 GURL("https://mail.google.com:4321"))); |
| 299 EXPECT_TRUE(Pattern("[*.]example.com").Matches( | 309 EXPECT_TRUE(Pattern("[*.]example.com").Matches( |
| 300 GURL("http://example.com/"))); | 310 GURL("http://example.com/"))); |
| 301 EXPECT_TRUE(Pattern("[*.]example.com").Matches( | 311 EXPECT_TRUE(Pattern("[*.]example.com").Matches( |
| 302 GURL("http://www.example.com/"))); | 312 GURL("http://www.example.com/"))); |
| 303 | 313 |
| 304 // Patterns with host wildcard | 314 // Patterns with host wildcard |
| 305 // TODO(markusheintz): Should these patterns be allowed? | 315 EXPECT_TRUE(Pattern("[*.]").IsValid()); |
| 306 // EXPECT_TRUE(Pattern("http://*").IsValid()); | 316 EXPECT_TRUE(Pattern("http://*").IsValid()); |
| 307 // EXPECT_TRUE(Pattern("http://*:8080").IsValid()); | 317 EXPECT_TRUE(Pattern("http://[*.]").IsValid()); |
| 318 EXPECT_EQ(std::string("http://*"), Pattern("http://[*.]").ToString()); |
| 319 EXPECT_TRUE(Pattern("http://*:8080").IsValid()); |
| 308 EXPECT_TRUE(Pattern("*://*").IsValid()); | 320 EXPECT_TRUE(Pattern("*://*").IsValid()); |
| 309 EXPECT_STREQ("*", Pattern("*://*").ToString().c_str()); | 321 EXPECT_STREQ("*", Pattern("*://*").ToString().c_str()); |
| 310 } | 322 } |
| 311 | 323 |
| 312 TEST(ContentSettingsPatternTest, FromString_Canonicalized) { | 324 TEST(ContentSettingsPatternTest, FromString_Canonicalized) { |
| 313 // UTF-8 patterns. | 325 // UTF-8 patterns. |
| 314 EXPECT_TRUE(Pattern("[*.]\xC4\x87ira.com").IsValid()); | 326 EXPECT_TRUE(Pattern("[*.]\xC4\x87ira.com").IsValid()); |
| 315 EXPECT_STREQ("[*.]xn--ira-ppa.com", | 327 EXPECT_STREQ("[*.]xn--ira-ppa.com", |
| 316 Pattern("[*.]\xC4\x87ira.com").ToString().c_str()); | 328 Pattern("[*.]\xC4\x87ira.com").ToString().c_str()); |
| 317 EXPECT_TRUE(Pattern("\xC4\x87ira.com").IsValid()); | 329 EXPECT_TRUE(Pattern("\xC4\x87ira.com").IsValid()); |
| (...skipping 255 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 573 // file:/// normalization. | 585 // file:/// normalization. |
| 574 EXPECT_STREQ("file:///tmp/test.html", | 586 EXPECT_STREQ("file:///tmp/test.html", |
| 575 Pattern("file:///tmp/bar/../test.html").ToString().c_str()); | 587 Pattern("file:///tmp/bar/../test.html").ToString().c_str()); |
| 576 | 588 |
| 577 // Invalid patterns. | 589 // Invalid patterns. |
| 578 EXPECT_STREQ("", Pattern("*example.com").ToString().c_str()); | 590 EXPECT_STREQ("", Pattern("*example.com").ToString().c_str()); |
| 579 EXPECT_STREQ("", Pattern("example.*").ToString().c_str()); | 591 EXPECT_STREQ("", Pattern("example.*").ToString().c_str()); |
| 580 EXPECT_STREQ("", Pattern("*\xC4\x87ira.com").ToString().c_str()); | 592 EXPECT_STREQ("", Pattern("*\xC4\x87ira.com").ToString().c_str()); |
| 581 EXPECT_STREQ("", Pattern("\xC4\x87ira.*").ToString().c_str()); | 593 EXPECT_STREQ("", Pattern("\xC4\x87ira.*").ToString().c_str()); |
| 582 } | 594 } |
| OLD | NEW |