Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1210)

Side by Side Diff: net/cookies/cookie_monster_unittest.cc

Issue 1705753002: Evict non-secure cookies less agressively. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Compiling is fun. Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/cookies/cookie_monster.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cookies/cookie_store_unittest.h" 5 #include "net/cookies/cookie_store_unittest.h"
6 6
7 #include <algorithm> 7 #include <algorithm>
8 #include <string> 8 #include <string>
9 #include <vector> 9 #include <vector>
10 10
(...skipping 335 matching lines...) Expand 10 before | Expand all | Expand 10 after
346 case 'H': 346 case 'H':
347 return COOKIE_PRIORITY_HIGH; 347 return COOKIE_PRIORITY_HIGH;
348 } 348 }
349 NOTREACHED(); 349 NOTREACHED();
350 return COOKIE_PRIORITY_DEFAULT; 350 return COOKIE_PRIORITY_DEFAULT;
351 } 351 }
352 352
353 // Instantiates a CookieMonster, adds multiple cookies (to http_www_google_) 353 // Instantiates a CookieMonster, adds multiple cookies (to http_www_google_)
354 // with priorities specified by |coded_priority_str|, and tests priority-aware 354 // with priorities specified by |coded_priority_str|, and tests priority-aware
355 // domain cookie eviction. 355 // domain cookie eviction.
356 // |coded_priority_str| specifies a run-length-encoded string of priorities. 356 //
357 // Example: "2M 3L M 4H" means "MMLLLMHHHH", and speicifies sequential (i.e., 357 // Example: |coded_priority_string| of "2MN 3LS MN 4HN" specifies sequential
358 // from least- to most-recently accessed) insertion of 2 medium-priority 358 // (i.e., from least- to most-recently accessed) insertion of 2
359 // cookies, 3 low-priority cookies, 1 medium-priority cookie, and 4 359 // medium-priority non-secure cookies, 3 low-priority secure cookies, 1
360 // high-priority cookies. 360 // medium-priority non-secure cookie, and 4 high-priority non-secure cookies.
361 //
361 // Within each priority, only the least-accessed cookies should be evicted. 362 // Within each priority, only the least-accessed cookies should be evicted.
362 // Thus, to describe expected suriving cookies, it suffices to specify the 363 // Thus, to describe expected suriving cookies, it suffices to specify the
363 // expected population of surviving cookies per priority, i.e., 364 // expected population of surviving cookies per priority, i.e.,
364 // |expected_low_count|, |expected_medium_count|, and |expected_high_count|. 365 // |expected_low_count|, |expected_medium_count|, and |expected_high_count|.
365 void TestPriorityCookieCase(CookieMonster* cm, 366 void TestPriorityCookieCase(CookieMonster* cm,
366 const std::string& coded_priority_str, 367 const std::string& coded_priority_str,
367 size_t expected_low_count, 368 size_t expected_low_count,
368 size_t expected_medium_count, 369 size_t expected_medium_count,
369 size_t expected_high_count) { 370 size_t expected_high_count,
371 size_t expected_nonsecure,
372 size_t expected_secure) {
373 SCOPED_TRACE(coded_priority_str.c_str());
370 this->DeleteAll(cm); 374 this->DeleteAll(cm);
371 int next_cookie_id = 0; 375 int next_cookie_id = 0;
372 std::vector<CookiePriority> priority_list; 376 // A list of cookie IDs, indexed by secure status, then by priority.
373 std::vector<int> id_list[3]; // Indexed by CookiePriority. 377 std::vector<int> id_list[2][3];
378 // A list of all the cookies stored, along with their properties.
379 std::vector<std::pair<bool, CookiePriority>> cookie_data;
374 380
375 // Parse |coded_priority_str| and add cookies. 381 // Parse |coded_priority_str| and add cookies.
376 for (const std::string& token : 382 for (const std::string& token :
377 base::SplitString(coded_priority_str, " ", base::TRIM_WHITESPACE, 383 base::SplitString(coded_priority_str, " ", base::TRIM_WHITESPACE,
378 base::SPLIT_WANT_ALL)) { 384 base::SPLIT_WANT_ALL)) {
379 DCHECK(!token.empty()); 385 DCHECK(!token.empty());
380 // Take last character as priority. 386
381 CookiePriority priority = CharToPriority(token.back()); 387 // Take last character as security status, then discard it.
382 std::string priority_str = CookiePriorityToString(priority); 388 bool is_secure = token[token.size() - 1] == 'S';
389
390 // The second-to-last character is the priority. Grab and discard it.
391 CookiePriority priority = CharToPriority(token[token.size() - 2]);
392
383 // The rest of the string (possibly empty) specifies repetition. 393 // The rest of the string (possibly empty) specifies repetition.
384 int rep = 1; 394 int rep = 1;
385 if (!token.empty()) { 395 if (!token.empty()) {
386 bool result = base::StringToInt( 396 bool result = base::StringToInt(
387 base::StringPiece(token.begin(), token.end() - 1), &rep); 397 base::StringPiece(token.begin(), token.end() - 2), &rep);
388 DCHECK(result); 398 DCHECK(result);
389 } 399 }
390 for (; rep > 0; --rep, ++next_cookie_id) { 400 for (; rep > 0; --rep, ++next_cookie_id) {
391 std::string cookie = base::StringPrintf( 401 std::string cookie =
392 "a%d=b;priority=%s", next_cookie_id, priority_str.c_str()); 402 base::StringPrintf("a%d=b;priority=%s;%s", next_cookie_id,
393 EXPECT_TRUE(SetCookie(cm, http_www_google_.url(), cookie)); 403 CookiePriorityToString(priority).c_str(),
394 priority_list.push_back(priority); 404 is_secure ? "secure" : "");
395 id_list[priority].push_back(next_cookie_id); 405 EXPECT_TRUE(SetCookie(cm, https_www_google_.url(), cookie));
406 cookie_data.push_back(std::make_pair(is_secure, priority));
407 id_list[is_secure][priority].push_back(next_cookie_id);
396 } 408 }
397 } 409 }
398 410
399 int num_cookies = static_cast<int>(priority_list.size()); 411 int num_cookies = static_cast<int>(cookie_data.size());
400 std::vector<int> surviving_id_list[3]; // Indexed by CookiePriority. 412 // A list of cookie IDs, indexed by secure status, then by priority.
413 std::vector<int> surviving_id_list[2][3];
401 414
402 // Parse the list of cookies 415 // Parse the list of cookies
403 std::string cookie_str = this->GetCookies(cm, http_www_google_.url()); 416 std::string cookie_str = this->GetCookies(cm, https_www_google_.url());
417 size_t num_nonsecure = 0;
418 size_t num_secure = 0;
404 for (const std::string& token : base::SplitString( 419 for (const std::string& token : base::SplitString(
405 cookie_str, ";", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL)) { 420 cookie_str, ";", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL)) {
406 // Assuming *it is "a#=b", so extract and parse "#" portion. 421 // Assuming *it is "a#=b", so extract and parse "#" portion.
407 int id = -1; 422 int id = -1;
408 bool result = base::StringToInt( 423 bool result = base::StringToInt(
409 base::StringPiece(token.begin() + 1, token.end() - 2), &id); 424 base::StringPiece(token.begin() + 1, token.end() - 2), &id);
410 DCHECK(result); 425 DCHECK(result);
411 DCHECK_GE(id, 0); 426 DCHECK_GE(id, 0);
412 DCHECK_LT(id, num_cookies); 427 DCHECK_LT(id, num_cookies);
413 surviving_id_list[priority_list[id]].push_back(id); 428 surviving_id_list[cookie_data[id].first][cookie_data[id].second]
429 .push_back(id);
430 if (cookie_data[id].first)
431 num_secure += 1;
432 else
433 num_nonsecure += 1;
414 } 434 }
415 435
436 EXPECT_EQ(expected_nonsecure, num_nonsecure);
437 EXPECT_EQ(expected_secure, num_secure);
438
416 // Validate each priority. 439 // Validate each priority.
417 size_t expected_count[3] = { 440 size_t expected_count[3] = {
418 expected_low_count, expected_medium_count, expected_high_count}; 441 expected_low_count, expected_medium_count, expected_high_count};
419 for (int i = 0; i < 3; ++i) { 442 for (int i = 0; i < 3; ++i) {
420 DCHECK_LE(surviving_id_list[i].size(), id_list[i].size()); 443 size_t num_for_priority =
421 EXPECT_EQ(expected_count[i], surviving_id_list[i].size()); 444 surviving_id_list[0][i].size() + surviving_id_list[1][i].size();
445 EXPECT_EQ(expected_count[i], num_for_priority);
422 // Verify that the remaining cookies are the most recent among those 446 // Verify that the remaining cookies are the most recent among those
423 // with the same priorities. 447 // with the same priorities.
424 if (expected_count[i] == surviving_id_list[i].size()) { 448 if (expected_count[i] == num_for_priority) {
425 std::sort(surviving_id_list[i].begin(), surviving_id_list[i].end()); 449 // Non-secure:
426 EXPECT_TRUE(std::equal(surviving_id_list[i].begin(), 450 std::sort(surviving_id_list[0][i].begin(),
427 surviving_id_list[i].end(), 451 surviving_id_list[0][i].end());
428 id_list[i].end() - expected_count[i])); 452 EXPECT_TRUE(std::equal(
453 surviving_id_list[0][i].begin(), surviving_id_list[0][i].end(),
454 id_list[0][i].end() - surviving_id_list[0][i].size()));
455
456 // Secure:
457 std::sort(surviving_id_list[1][i].begin(),
458 surviving_id_list[1][i].end());
459 EXPECT_TRUE(std::equal(
460 surviving_id_list[1][i].begin(), surviving_id_list[1][i].end(),
461 id_list[1][i].end() - surviving_id_list[1][i].size()));
429 } 462 }
430 } 463 }
431 } 464 }
432 465
433 // Represents a number of cookies to create, if they are Secure cookies, and 466 // Represents a number of cookies to create, if they are Secure cookies, and
434 // a url to add them to. 467 // a url to add them to.
435 struct CookiesEntry { 468 struct CookiesEntry {
436 size_t num_cookies; 469 size_t num_cookies;
437 bool is_secure; 470 bool is_secure;
438 }; 471 };
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after
485 if (cookie.IsSecure()) 518 if (cookie.IsSecure())
486 ++total_secure_cookies; 519 ++total_secure_cookies;
487 else 520 else
488 ++total_non_secure_cookies; 521 ++total_non_secure_cookies;
489 } 522 }
490 523
491 EXPECT_EQ(expected_secure_cookies, total_secure_cookies); 524 EXPECT_EQ(expected_secure_cookies, total_secure_cookies);
492 EXPECT_EQ(expected_non_secure_cookies, total_non_secure_cookies); 525 EXPECT_EQ(expected_non_secure_cookies, total_non_secure_cookies);
493 } 526 }
494 527
495 void TestPriorityAwareGarbageCollectHelper() { 528 void TestPriorityAwareGarbageCollectHelperNonSecure() {
496 // Hard-coding limits in the test, but use DCHECK_EQ to enforce constraint. 529 // Hard-coding limits in the test, but use DCHECK_EQ to enforce constraint.
497 DCHECK_EQ(180U, CookieMonster::kDomainMaxCookies); 530 DCHECK_EQ(180U, CookieMonster::kDomainMaxCookies);
498 DCHECK_EQ(150U, CookieMonster::kDomainMaxCookies - 531 DCHECK_EQ(150U, CookieMonster::kDomainMaxCookies -
499 CookieMonster::kDomainPurgeCookies); 532 CookieMonster::kDomainPurgeCookies);
500 DCHECK_EQ(30U, CookieMonster::kDomainCookiesQuotaLow);
501 DCHECK_EQ(50U, CookieMonster::kDomainCookiesQuotaMedium);
502 DCHECK_EQ(70U, CookieMonster::kDomainCookiesQuotaHigh);
503 533
504 scoped_refptr<CookieMonster> cm(new CookieMonster(NULL, NULL)); 534 scoped_refptr<CookieMonster> cm(new CookieMonster(NULL, NULL));
505 535
506 // Each test case adds 181 cookies, so 31 cookies are evicted. 536 // Each test case adds 181 cookies, so 31 cookies are evicted.
507 // Cookie same priority, repeated for each priority. 537 // Cookie same priority, repeated for each priority.
508 TestPriorityCookieCase(cm.get(), "181L", 150U, 0U, 0U); 538 TestPriorityCookieCase(cm.get(), "181LN", 150U, 0U, 0U, 150U, 0U);
509 TestPriorityCookieCase(cm.get(), "181M", 0U, 150U, 0U); 539 TestPriorityCookieCase(cm.get(), "181MN", 0U, 150U, 0U, 150U, 0U);
510 TestPriorityCookieCase(cm.get(), "181H", 0U, 0U, 150U); 540 TestPriorityCookieCase(cm.get(), "181HN", 0U, 0U, 150U, 150U, 0U);
511 541
512 // Pairwise scenarios. 542 // Pairwise scenarios.
513 // Round 1 => none; round2 => 31M; round 3 => none. 543 // Round 1 => none; round2 => 31M; round 3 => none.
514 TestPriorityCookieCase(cm.get(), "10H 171M", 0U, 140U, 10U); 544 TestPriorityCookieCase(cm.get(), "10HN 171MN", 0U, 140U, 10U, 150U, 0U);
515 // Round 1 => 10L; round2 => 21M; round 3 => none. 545 // Round 1 => 10L; round2 => 21M; round 3 => none.
516 TestPriorityCookieCase(cm.get(), "141M 40L", 30U, 120U, 0U); 546 TestPriorityCookieCase(cm.get(), "141MN 40LN", 30U, 120U, 0U, 150U, 0U);
517 // Round 1 => none; round2 => none; round 3 => 31H. 547 // Round 1 => none; round2 => none; round 3 => 31H.
518 TestPriorityCookieCase(cm.get(), "101H 80M", 0U, 80U, 70U); 548 TestPriorityCookieCase(cm.get(), "101HN 80MN", 0U, 80U, 70U, 150U, 0U);
519 549
520 // For {low, medium} priorities right on quota, different orders. 550 // For {low, medium} priorities right on quota, different orders.
521 // Round 1 => 1L; round 2 => none, round3 => 30L. 551 // Round 1 => 1L; round 2 => none, round3 => 30L.
522 TestPriorityCookieCase(cm.get(), "31L 50M 100H", 0U, 50U, 100U); 552 TestPriorityCookieCase(cm.get(), "31LN 50MN 100HN", 0U, 50U, 100U, 150U,
553 0U);
523 // Round 1 => none; round 2 => 1M, round3 => 30M. 554 // Round 1 => none; round 2 => 1M, round3 => 30M.
524 TestPriorityCookieCase(cm.get(), "51M 100H 30L", 30U, 20U, 100U); 555 TestPriorityCookieCase(cm.get(), "51MN 100HN 30LN", 30U, 20U, 100U, 150U,
556 0U);
525 // Round 1 => none; round 2 => none; round3 => 31H. 557 // Round 1 => none; round 2 => none; round3 => 31H.
526 TestPriorityCookieCase(cm.get(), "101H 50M 30L", 30U, 50U, 70U); 558 TestPriorityCookieCase(cm.get(), "101HN 50MN 30LN", 30U, 50U, 70U, 150U,
559 0U);
527 560
528 // Round 1 => 10L; round 2 => 10M; round3 => 11H. 561 // Round 1 => 10L; round 2 => 10M; round3 => 11H.
529 TestPriorityCookieCase(cm.get(), "81H 60M 40L", 30U, 50U, 70U); 562 TestPriorityCookieCase(cm.get(), "81HN 60MN 40LN", 30U, 50U, 70U, 150U, 0U);
530 563
531 // More complex scenarios. 564 // More complex scenarios.
532 // Round 1 => 10L; round 2 => 10M; round 3 => 11H. 565 // Round 1 => 10L; round 2 => 10M; round 3 => 11H.
533 TestPriorityCookieCase(cm.get(), "21H 60M 40L 60H", 30U, 50U, 70U); 566 TestPriorityCookieCase(cm.get(), "21HN 60MN 40LN 60HN", 30U, 50U, 70U, 150U,
567 0U);
534 // Round 1 => 10L; round 2 => 11M, 10L; round 3 => none. 568 // Round 1 => 10L; round 2 => 11M, 10L; round 3 => none.
535 TestPriorityCookieCase(cm.get(), "11H 10M 20L 110M 20L 10H", 20U, 109U, 569 TestPriorityCookieCase(cm.get(), "11HN 10MN 20LN 110MN 20LN 10HN", 20U,
536 21U); 570 109U, 21U, 150U, 0U);
537 // Round 1 => none; round 2 => none; round 3 => 11L, 10M, 10H. 571 // Round 1 => none; round 2 => none; round 3 => 11L, 10M, 10H.
538 TestPriorityCookieCase(cm.get(), "11L 10M 140H 10M 10L", 10U, 10U, 130U); 572 TestPriorityCookieCase(cm.get(), "11LN 10MN 140HN 10MN 10LN", 10U, 10U,
573 130U, 150U, 0U);
539 // Round 1 => none; round 2 => 1M; round 3 => 10L, 10M, 10H. 574 // Round 1 => none; round 2 => 1M; round 3 => 10L, 10M, 10H.
540 TestPriorityCookieCase(cm.get(), "11M 10H 10L 60M 90H", 0U, 60U, 90U); 575 TestPriorityCookieCase(cm.get(), "11MN 10HN 10LN 60MN 90HN", 0U, 60U, 90U,
576 150U, 0U);
541 // Round 1 => none; round 2 => 10L, 21M; round 3 => none. 577 // Round 1 => none; round 2 => 10L, 21M; round 3 => none.
542 TestPriorityCookieCase(cm.get(), "11M 10H 10L 90M 60H", 0U, 80U, 70U); 578 TestPriorityCookieCase(cm.get(), "11MN 10HN 10LN 90MN 60HN", 0U, 80U, 70U,
579 150U, 0U);
580 }
581
582 void TestPriorityAwareGarbageCollectHelperSecure() {
583 // Hard-coding limits in the test, but use DCHECK_EQ to enforce constraint.
584 DCHECK_EQ(180U, CookieMonster::kDomainMaxCookies);
585 DCHECK_EQ(150U, CookieMonster::kDomainMaxCookies -
586 CookieMonster::kDomainPurgeCookies);
587
588 scoped_refptr<CookieMonster> cm(new CookieMonster(NULL, NULL));
589
590 // Each test case adds 181 cookies, so 31 cookies are evicted.
591 // Cookie same priority, repeated for each priority.
592 TestPriorityCookieCase(cm.get(), "181LS", 150U, 0U, 0U, 0U, 150U);
593 TestPriorityCookieCase(cm.get(), "181MS", 0U, 150U, 0U, 0U, 150U);
594 TestPriorityCookieCase(cm.get(), "181HS", 0U, 0U, 150U, 0U, 150U);
595
596 // Pairwise scenarios.
597 // Round 1 => none; round2 => 31M; round 3 => none.
598 TestPriorityCookieCase(cm.get(), "10HS 171MS", 0U, 140U, 10U, 0U, 150U);
599 // Round 1 => 10L; round2 => 21M; round 3 => none.
600 TestPriorityCookieCase(cm.get(), "141MS 40LS", 30U, 120U, 0U, 0U, 150U);
601 // Round 1 => none; round2 => none; round 3 => 31H.
602 TestPriorityCookieCase(cm.get(), "101HS 80MS", 0U, 80U, 70U, 0U, 150U);
603
604 // For {low, medium} priorities right on quota, different orders.
605 // Round 1 => 1L; round 2 => none, round3 => 30L.
606 TestPriorityCookieCase(cm.get(), "31LS 50MS 100HS", 0U, 50U, 100U, 0U,
607 150U);
608 // Round 1 => none; round 2 => 1M, round3 => 30M.
609 TestPriorityCookieCase(cm.get(), "51MS 100HS 30LS", 30U, 20U, 100U, 0U,
610 150U);
611 // Round 1 => none; round 2 => none; round3 => 31H.
612 TestPriorityCookieCase(cm.get(), "101HS 50MS 30LS", 30U, 50U, 70U, 0U,
613 150U);
614
615 // Round 1 => 10L; round 2 => 10M; round3 => 11H.
616 TestPriorityCookieCase(cm.get(), "81HS 60MS 40LS", 30U, 50U, 70U, 0U, 150U);
617
618 // More complex scenarios.
619 // Round 1 => 10L; round 2 => 10M; round 3 => 11H.
620 TestPriorityCookieCase(cm.get(), "21HS 60MS 40LS 60HS", 30U, 50U, 70U, 0U,
621 150U);
622 // Round 1 => 10L; round 2 => 11M, 10L; round 3 => none.
623 TestPriorityCookieCase(cm.get(), "11HS 10MS 20LS 110MS 20LS 10HS", 20U,
624 109U, 21U, 0U, 150U);
625 // Round 1 => none; round 2 => none; round 3 => 11L, 10M, 10H.
626 TestPriorityCookieCase(cm.get(), "11LS 10MS 140HS 10MS 10LS", 10U, 10U,
627 130U, 0U, 150U);
628 // Round 1 => none; round 2 => 1M; round 3 => 10L, 10M, 10H.
629 TestPriorityCookieCase(cm.get(), "11MS 10HS 10LS 60MS 90HS", 0U, 60U, 90U,
630 0U, 150U);
631 // Round 1 => none; round 2 => 10L, 21M; round 3 => none.
632 TestPriorityCookieCase(cm.get(), "11MS 10HS 10LS 90MS 60HS", 0U, 80U, 70U,
633 0U, 150U);
634 }
635
636 void TestPriorityAwareGarbageCollectHelperMixed() {
637 // Hard-coding limits in the test, but use DCHECK_EQ to enforce constraint.
638 DCHECK_EQ(180U, CookieMonster::kDomainMaxCookies);
639 DCHECK_EQ(150U, CookieMonster::kDomainMaxCookies -
640 CookieMonster::kDomainPurgeCookies);
641
642 scoped_refptr<CookieMonster> cm(new CookieMonster(NULL, NULL));
643
644 // Each test case adds 180 secure cookies, and some non-secure cookie. The
645 // secure cookies take priority, so the non-secure cookie is removed, along
646 // with 30 secure cookies. Repeated for each priority, and with the
647 // non-secure cookie as older and newer.
648 TestPriorityCookieCase(cm.get(), "1LN 180LS", 150U, 0U, 0U, 0U, 150U);
649 TestPriorityCookieCase(cm.get(), "1MN 180MS", 0U, 150U, 0U, 0U, 150U);
650 TestPriorityCookieCase(cm.get(), "1HN 180HS", 0U, 0U, 150U, 0U, 150U);
651 TestPriorityCookieCase(cm.get(), "180LS 1LN", 150U, 0U, 0U, 0U, 150U);
652 TestPriorityCookieCase(cm.get(), "180MS 1MN", 0U, 150U, 0U, 0U, 150U);
653 TestPriorityCookieCase(cm.get(), "180HS 1HN", 0U, 0U, 150U, 0U, 150U);
654
655 // Higher-priority non-secure cookies are removed before any secure cookie.
656 TestPriorityCookieCase(cm.get(), "180LS 1MN", 150U, 0U, 0U, 0U, 150U);
657 TestPriorityCookieCase(cm.get(), "180LS 1HN", 150U, 0U, 0U, 0U, 150U);
658 TestPriorityCookieCase(cm.get(), "180MS 1HN", 0U, 150U, 0U, 0U, 150U);
659 TestPriorityCookieCase(cm.get(), "1MN 180LS", 150U, 0U, 0U, 0U, 150U);
660 TestPriorityCookieCase(cm.get(), "1HN 180LS", 150U, 0U, 0U, 0U, 150U);
661 TestPriorityCookieCase(cm.get(), "1HN 180MS", 0U, 150U, 0U, 0U, 150U);
662
663 // Pairwise:
664 TestPriorityCookieCase(cm.get(), "1LS 180LN", 150U, 0U, 0U, 149U, 1U);
665 TestPriorityCookieCase(cm.get(), "100LS 81LN", 150U, 0U, 0U, 50U, 100U);
666 TestPriorityCookieCase(cm.get(), "150LS 31LN", 150U, 0U, 0U, 0U, 150U);
667 TestPriorityCookieCase(cm.get(), "1LS 180HN", 1U, 0U, 149U, 149U, 1U);
668 TestPriorityCookieCase(cm.get(), "100LS 81HN", 100U, 0U, 50U, 50U, 100U);
669 TestPriorityCookieCase(cm.get(), "150LS 31HN", 150U, 0U, 0U, 0U, 150U);
670
671 // Quota calculations inside non-secure/secure blocks remain in place:
672 TestPriorityCookieCase(cm.get(), "50HN 50LS 81HS", 50U, 0U, 100U, 19U,
673 131U);
674 TestPriorityCookieCase(cm.get(), "11MS 10HN 10LS 90MN 60HN", 10U, 79U, 61U,
675 129U, 21U);
676
677 // Multiple GC rounds end up with consistent behavior:
678 TestPriorityCookieCase(cm.get(), "100HS 100LN 100MN", 0, 76U, 100U, 76U,
679 100U);
543 } 680 }
544 681
545 // Function for creating a CM with a number of cookies in it, 682 // Function for creating a CM with a number of cookies in it,
546 // no store (and hence no ability to affect access time). 683 // no store (and hence no ability to affect access time).
547 CookieMonster* CreateMonsterForGC(int num_cookies) { 684 CookieMonster* CreateMonsterForGC(int num_cookies) {
548 CookieMonster* cm(new CookieMonster(NULL, NULL)); 685 CookieMonster* cm(new CookieMonster(NULL, NULL));
549 for (int i = 0; i < num_cookies; i++) { 686 for (int i = 0; i < num_cookies; i++) {
550 SetCookie(cm, GURL(base::StringPrintf("http://h%05d.izzle", i)), "a=1"); 687 SetCookie(cm, GURL(base::StringPrintf("http://h%05d.izzle", i)), "a=1");
551 } 688 }
552 return cm; 689 return cm;
(...skipping 688 matching lines...) Expand 10 before | Expand all | Expand 10 after
1241 base::PlatformThread::Sleep( 1378 base::PlatformThread::Sleep(
1242 base::TimeDelta::FromMilliseconds(kAccessDelayMs)); 1379 base::TimeDelta::FromMilliseconds(kAccessDelayMs));
1243 EXPECT_EQ("A=B", GetCookies(cm.get(), http_www_google_.url())); 1380 EXPECT_EQ("A=B", GetCookies(cm.get(), http_www_google_.url()));
1244 EXPECT_FALSE(last_access_date == GetFirstCookieAccessDate(cm.get())); 1381 EXPECT_FALSE(last_access_date == GetFirstCookieAccessDate(cm.get()));
1245 } 1382 }
1246 1383
1247 TEST_F(CookieMonsterTest, TestHostGarbageCollection) { 1384 TEST_F(CookieMonsterTest, TestHostGarbageCollection) {
1248 TestHostGarbageCollectHelper(); 1385 TestHostGarbageCollectHelper();
1249 } 1386 }
1250 1387
1251 TEST_F(CookieMonsterTest, TestPriorityAwareGarbageCollection) { 1388 TEST_F(CookieMonsterTest, TestPriorityAwareGarbageCollectionNonSecure) {
1252 TestPriorityAwareGarbageCollectHelper(); 1389 TestPriorityAwareGarbageCollectHelperNonSecure();
1390 }
1391
1392 TEST_F(CookieMonsterTest, TestPriorityAwareGarbageCollectionSecure) {
1393 TestPriorityAwareGarbageCollectHelperSecure();
1394 }
1395
1396 TEST_F(CookieMonsterTest, TestPriorityAwareGarbageCollectionMixed) {
1397 TestPriorityAwareGarbageCollectHelperMixed();
1253 } 1398 }
1254 1399
1255 TEST_F(CookieMonsterTest, SetCookieableSchemes) { 1400 TEST_F(CookieMonsterTest, SetCookieableSchemes) {
1256 scoped_refptr<CookieMonster> cm(new CookieMonster(NULL, NULL)); 1401 scoped_refptr<CookieMonster> cm(new CookieMonster(NULL, NULL));
1257 scoped_refptr<CookieMonster> cm_foo(new CookieMonster(NULL, NULL)); 1402 scoped_refptr<CookieMonster> cm_foo(new CookieMonster(NULL, NULL));
1258 1403
1259 // Only cm_foo should allow foo:// cookies. 1404 // Only cm_foo should allow foo:// cookies.
1260 std::vector<std::string> schemes; 1405 std::vector<std::string> schemes;
1261 schemes.push_back("foo"); 1406 schemes.push_back("foo");
1262 cm_foo->SetCookieableSchemes(schemes); 1407 cm_foo->SetCookieableSchemes(schemes);
(...skipping 1692 matching lines...) Expand 10 before | Expand all | Expand 10 after
2955 DCHECK_EQ(180U, CookieMonster::kDomainMaxCookies); 3100 DCHECK_EQ(180U, CookieMonster::kDomainMaxCookies);
2956 DCHECK_EQ(150U, CookieMonster::kDomainMaxCookies - 3101 DCHECK_EQ(150U, CookieMonster::kDomainMaxCookies -
2957 CookieMonster::kDomainPurgeCookies); 3102 CookieMonster::kDomainPurgeCookies);
2958 DCHECK_EQ(3300U, CookieMonster::kMaxCookies); 3103 DCHECK_EQ(3300U, CookieMonster::kMaxCookies);
2959 DCHECK_EQ(30, CookieMonster::kSafeFromGlobalPurgeDays); 3104 DCHECK_EQ(30, CookieMonster::kSafeFromGlobalPurgeDays);
2960 3105
2961 // If secure cookies for one domain hit the per domain limit (180), a 3106 // If secure cookies for one domain hit the per domain limit (180), a
2962 // non-secure cookie will not evict them (and, in fact, the non-secure cookie 3107 // non-secure cookie will not evict them (and, in fact, the non-secure cookie
2963 // will be removed right after creation). 3108 // will be removed right after creation).
2964 const CookiesEntry test1[] = {{180U, true}, {1U, false}}; 3109 const CookiesEntry test1[] = {{180U, true}, {1U, false}};
2965 TestSecureCookieEviction(test1, arraysize(test1), 180U, 0U, nullptr); 3110 TestSecureCookieEviction(test1, arraysize(test1), 150U, 0U, nullptr);
2966 3111
2967 // If non-secure cookies for one domain hit the per domain limit (180), the 3112 // If non-secure cookies for one domain hit the per domain limit (180), the
2968 // creation of secure cookies will evict all of the non-secure cookies, and 3113 // creation of secure cookies will evict the non-secure cookies first, making
2969 // the secure cookies will still be created. 3114 // room for the secure cookies.
2970 const CookiesEntry test2[] = {{180U, false}, {20U, true}}; 3115 const CookiesEntry test2[] = {{180U, false}, {20U, true}};
2971 TestSecureCookieEviction(test2, arraysize(test2), 20U, 0U, nullptr); 3116 TestSecureCookieEviction(test2, arraysize(test2), 20U, 149U, nullptr);
2972 3117
2973 // If secure cookies for one domain go past the per domain limit (180), they 3118 // If secure cookies for one domain go past the per domain limit (180), they
2974 // will be evicted as normal by the per domain purge amount (30) down to a 3119 // will be evicted as normal by the per domain purge amount (30) down to a
2975 // lower amount (150), and then will continue to create the remaining cookies 3120 // lower amount (150), and then will continue to create the remaining cookies
2976 // (19 more to 169). 3121 // (19 more to 169).
2977 const CookiesEntry test3[] = {{200U, true}}; 3122 const CookiesEntry test3[] = {{200U, true}};
2978 TestSecureCookieEviction(test3, arraysize(test3), 169U, 0U, nullptr); 3123 TestSecureCookieEviction(test3, arraysize(test3), 169U, 0U, nullptr);
2979 3124
2980 // If a non-secure cookie is created, and a number of secure cookies exceeds 3125 // If a non-secure cookie is created, and a number of secure cookies exceeds
2981 // the per domain limit (18), the total cookies will be evicted down to a 3126 // the per domain limit (18), the total cookies will be evicted down to a
2982 // lower amount (150), enforcing the eviction of the non-secure cookie, and 3127 // lower amount (150), enforcing the eviction of the non-secure cookie, and
2983 // the remaining secure cookies will be created (another 18 to 168). 3128 // the remaining secure cookies will be created (another 19 to 169).
2984 const CookiesEntry test4[] = {{1U, false}, {199U, true}}; 3129 const CookiesEntry test4[] = {{1U, false}, {199U, true}};
2985 TestSecureCookieEviction(test4, arraysize(test4), 168U, 0U, nullptr); 3130 TestSecureCookieEviction(test4, arraysize(test4), 169U, 0U, nullptr);
2986 3131
2987 // If an even number of non-secure and secure cookies are created below the 3132 // If an even number of non-secure and secure cookies are created below the
2988 // per-domain limit (180), all will be created and none evicted. 3133 // per-domain limit (180), all will be created and none evicted.
2989 const CookiesEntry test5[] = {{75U, false}, {75U, true}}; 3134 const CookiesEntry test5[] = {{75U, false}, {75U, true}};
2990 TestSecureCookieEviction(test5, arraysize(test5), 75U, 75U, nullptr); 3135 TestSecureCookieEviction(test5, arraysize(test5), 75U, 75U, nullptr);
2991 3136
2992 // If the same number of secure and non-secure cookies are created (50 each) 3137 // If the same number of secure and non-secure cookies are created (50 each)
2993 // below the per domain limit (180), and then another set of secure cookies 3138 // below the per domain limit (180), and then another set of secure cookies
2994 // are created to bring the total above the per-domain limit, all of the 3139 // are created to bring the total above the per-domain limit, all secure
2995 // non-secure cookies will be evicted but none of the secure ones will be 3140 // cookies will be retained, and the non-secure cookies will be culled down
2996 // evicted. 3141 // to the limit.
2997 const CookiesEntry test6[] = {{50U, true}, {50U, false}, {81U, true}}; 3142 const CookiesEntry test6[] = {{50U, true}, {50U, false}, {81U, true}};
2998 TestSecureCookieEviction(test6, arraysize(test6), 131U, 0U, nullptr); 3143 TestSecureCookieEviction(test6, arraysize(test6), 131U, 19U, nullptr);
2999 3144
3000 // If the same number of non-secure and secure cookies are created (50 each) 3145 // If the same number of non-secure and secure cookies are created (50 each)
3001 // below the per domain limit (180), and then another set of non-secure 3146 // below the per domain limit (180), and then another set of non-secure
3002 // cookies are created to bring the total above the per-domain limit, all of 3147 // cookies are created to bring the total above the per-domain limit, all
3003 // the non-secure cookies will be evicted but none of the secure ones will be 3148 // secure cookies will be retained, and the non-secure cookies will be culled
3004 // evicted. 3149 // down to the limit.
3005 const CookiesEntry test7[] = {{50U, false}, {50U, true}, {81U, false}}; 3150 const CookiesEntry test7[] = {{50U, false}, {50U, true}, {81U, false}};
3006 TestSecureCookieEviction(test7, arraysize(test7), 50U, 0U, nullptr); 3151 TestSecureCookieEviction(test7, arraysize(test7), 50U, 100U, nullptr);
3007 3152
3008 // If the same number of non-secure and secure cookies are created (50 each) 3153 // If the same number of non-secure and secure cookies are created (50 each)
3009 // below the per domain limit (180), and then another set of non-secure 3154 // below the per domain limit (180), and then another set of non-secure
3010 // cookies are created to bring the total above the per-domain limit, all of 3155 // cookies are created to bring the total above the per-domain limit, all
3011 // the non-secure cookies will be evicted but none of the secure ones will be 3156 // secure cookies will be retained, and the non-secure cookies will be culled
3012 // evicted, and then the remaining non-secure cookies will be created (9). 3157 // down to the limit, then the remaining non-secure cookies will be created
3158 // (9).
3013 const CookiesEntry test8[] = {{50U, false}, {50U, true}, {90U, false}}; 3159 const CookiesEntry test8[] = {{50U, false}, {50U, true}, {90U, false}};
3014 TestSecureCookieEviction(test8, arraysize(test8), 50U, 9U, nullptr); 3160 TestSecureCookieEviction(test8, arraysize(test8), 50U, 109U, nullptr);
3015 3161
3016 // If a number of non-secure cookies are created on other hosts (20) and are 3162 // If a number of non-secure cookies are created on other hosts (20) and are
3017 // past the global 'safe' date, and then the number of non-secure cookies for 3163 // past the global 'safe' date, and then the number of non-secure cookies for
3018 // a single domain are brought to the per-domain limit (180), followed by 3164 // a single domain are brought to the per-domain limit (180), followed by
3019 // another set of secure cookies on that same domain (20), all of the 3165 // another set of secure cookies on that same domain (20), all the secure
3020 // non-secure cookies for that domain should be evicted, but the non-secure 3166 // cookies for that domain should be retained, while the non-secure should be
3021 // cookies for other domains should remain, as should the secure cookies for 3167 // culled down to the per-domain limit. The non-secure cookies for other
3022 // that domain. 3168 // domains should remain untouched.
3023 const CookiesEntry test9[] = {{180U, false}, {20U, true}}; 3169 const CookiesEntry test9[] = {{180U, false}, {20U, true}};
3024 const AltHosts test9_alt_hosts(0, 20); 3170 const AltHosts test9_alt_hosts(0, 20);
3025 TestSecureCookieEviction(test9, arraysize(test9), 20U, 20U, &test9_alt_hosts); 3171 TestSecureCookieEviction(test9, arraysize(test9), 20U, 169U,
3172 &test9_alt_hosts);
3026 3173
3027 // If a number of secure cookies are created on other hosts and hit the global 3174 // If a number of secure cookies are created on other hosts and hit the global
3028 // cookie limit (3300) and are past the global 'safe' date, and then a single 3175 // cookie limit (3300) and are past the global 'safe' date, and then a single
3029 // non-secure cookie is created now, the secure cookies are removed so that 3176 // non-secure cookie is created now, the secure cookies are removed so that
3030 // the global total number of cookies is at the global purge goal (3000), but 3177 // the global total number of cookies is at the global purge goal (3000), but
3031 // the non-secure cookie is not evicted since it is too young. 3178 // the non-secure cookie is not evicted since it is too young.
3032 const CookiesEntry test10[] = {{1U, false}}; 3179 const CookiesEntry test10[] = {{1U, false}};
3033 const AltHosts test10_alt_hosts(3300, 0); 3180 const AltHosts test10_alt_hosts(3300, 0);
3034 TestSecureCookieEviction(test10, arraysize(test10), 2999U, 1U, 3181 TestSecureCookieEviction(test10, arraysize(test10), 2999U, 1U,
3035 &test10_alt_hosts); 3182 &test10_alt_hosts);
(...skipping 287 matching lines...) Expand 10 before | Expand all | Expand 10 after
3323 monster()->AddCallbackForCookie( 3470 monster()->AddCallbackForCookie(
3324 test_url_, "abc", 3471 test_url_, "abc",
3325 base::Bind(&RecordCookieChanges, &cookies1, nullptr))); 3472 base::Bind(&RecordCookieChanges, &cookies1, nullptr)));
3326 SetCookie(monster(), test_url_, "abc=def"); 3473 SetCookie(monster(), test_url_, "abc=def");
3327 base::MessageLoop::current()->RunUntilIdle(); 3474 base::MessageLoop::current()->RunUntilIdle();
3328 EXPECT_EQ(1U, cookies0.size()); 3475 EXPECT_EQ(1U, cookies0.size());
3329 EXPECT_EQ(1U, cookies0.size()); 3476 EXPECT_EQ(1U, cookies0.size());
3330 } 3477 }
3331 3478
3332 } // namespace net 3479 } // namespace net
OLDNEW
« no previous file with comments | « net/cookies/cookie_monster.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698