| Index: net/reporting/reporting_delegate_impl_unittest.cc
|
| diff --git a/net/reporting/reporting_delegate_impl_unittest.cc b/net/reporting/reporting_delegate_impl_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..d57273eca033d3f0bab7dbebd467c02895e5eaf2
|
| --- /dev/null
|
| +++ b/net/reporting/reporting_delegate_impl_unittest.cc
|
| @@ -0,0 +1,149 @@
|
| +// Copyright 2017 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "net/reporting/reporting_delegate_impl.h"
|
| +
|
| +#include <string>
|
| +#include <vector>
|
| +
|
| +#include "base/memory/ptr_util.h"
|
| +#include "base/test/simple_test_tick_clock.h"
|
| +#include "base/time/time.h"
|
| +#include "base/values.h"
|
| +#include "net/reporting/reporting_cache.h"
|
| +#include "net/reporting/reporting_test_util.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +#include "url/gurl.h"
|
| +#include "url/origin.h"
|
| +
|
| +namespace net {
|
| +namespace {
|
| +
|
| +using Client = ReportingCache::Client;
|
| +using Report = ReportingCache::Report;
|
| +
|
| +const GURL kUrl("https://origin/path");
|
| +const GURL kSensitiveUrl("https://username:password@origin/path#ref");
|
| +const url::Origin kOrigin(GURL("https://origin/"));
|
| +const GURL kEndpoint("https://endpoint/");
|
| +const std::string kGroup1("group1");
|
| +const std::string kGroup2("group2");
|
| +const std::string kType("type");
|
| +
|
| +class ReportingDelegateImplTest : public ::testing::Test {
|
| + protected:
|
| + ReportingDelegateImplTest() : delegate_(&clock_, &cache_) {}
|
| +
|
| + base::SimpleTestTickClock clock_;
|
| + ReportingCache cache_;
|
| + ReportingDelegateImpl delegate_;
|
| +};
|
| +
|
| +TEST_F(ReportingDelegateImplTest, OnReportGenerated) {
|
| + delegate_.OnReportGenerated(kUrl, kGroup1, kType,
|
| + base::MakeUnique<base::DictionaryValue>());
|
| +
|
| + std::vector<const Report*> reports;
|
| + cache_.GetReports(&reports);
|
| + ASSERT_EQ(1u, reports.size());
|
| + const Report* report = reports[0];
|
| + ASSERT_TRUE(report);
|
| + EXPECT_EQ(kUrl, report->url);
|
| + EXPECT_EQ(kGroup1, report->group);
|
| + EXPECT_EQ(kType, report->type);
|
| + EXPECT_EQ(clock_.NowTicks(), report->queued);
|
| + EXPECT_EQ(0, report->attempts);
|
| + EXPECT_FALSE(report->pending);
|
| + EXPECT_FALSE(report->doomed);
|
| +}
|
| +
|
| +TEST_F(ReportingDelegateImplTest, SanitizeUrl) {
|
| + ASSERT_TRUE(kSensitiveUrl.has_username());
|
| + ASSERT_TRUE(kSensitiveUrl.has_password());
|
| + ASSERT_TRUE(kSensitiveUrl.has_ref());
|
| +
|
| + delegate_.OnReportGenerated(kSensitiveUrl, kGroup1, kType,
|
| + base::MakeUnique<base::DictionaryValue>());
|
| +
|
| + std::vector<const Report*> reports;
|
| + cache_.GetReports(&reports);
|
| + ASSERT_EQ(1u, reports.size());
|
| + const Report* report = reports[0];
|
| + ASSERT_TRUE(report);
|
| + EXPECT_FALSE(report->url.has_username());
|
| + EXPECT_FALSE(report->url.has_password());
|
| + EXPECT_FALSE(report->url.has_ref());
|
| +}
|
| +
|
| +TEST_F(ReportingDelegateImplTest, OnHeaderReceivedInvalid) {
|
| + static const struct {
|
| + const char* header_value;
|
| + const char* description;
|
| + } kInvalidHeaderTestCases[] = {
|
| + {"{\"max-age\":1}", "missing url"},
|
| + {"{\"url\":0,\"max-age\":1}", "non-string url"},
|
| + {"{\"url\":\"http://insecure/\",\"max-age\":1}", "insecure url"},
|
| +
|
| + {"{\"url\":\"https://endpoint/\"}", "missing max-age"},
|
| + {"{\"url\":\"https://endpoint/\",\"max-age\":\"\"}",
|
| + "non-integer max-age"},
|
| + {"{\"url\":\"https://endpoint/\",\"max-age\":-1}", "negative max-age"},
|
| +
|
| + {"{\"url\":\"https://endpoint/\",\"max-age\":1,\"group\":0}",
|
| + "non-string group"},
|
| +
|
| + {"{\"url\":\"https://endpoint/\",\"max-age\":1,\"includeSubdomains\":0}",
|
| + "non-boolean includeSubdomains"},
|
| + };
|
| +
|
| + for (size_t i = 0; i < arraysize(kInvalidHeaderTestCases); ++i) {
|
| + auto& test_case = kInvalidHeaderTestCases[i];
|
| + delegate_.OnHeaderReceived(kUrl, test_case.header_value);
|
| +
|
| + std::vector<const Client*> clients;
|
| + cache_.GetClients(&clients);
|
| + EXPECT_TRUE(clients.empty())
|
| + << "Invalid Report-To header (" << test_case.description << ": \""
|
| + << test_case.header_value << "\") parsed as valid.";
|
| + }
|
| +}
|
| +
|
| +TEST_F(ReportingDelegateImplTest, OnHeaderReceivedValid) {
|
| + delegate_.OnHeaderReceived(
|
| + kUrl, "{\"url\":\"" + kEndpoint.spec() + "\",\"max-age\":86400}");
|
| +
|
| + const Client* client = FindClientInCache(&cache_, kOrigin, kEndpoint);
|
| + ASSERT_TRUE(client);
|
| + EXPECT_EQ(kOrigin, client->origin);
|
| + EXPECT_EQ(kEndpoint, client->endpoint);
|
| + EXPECT_FALSE(client->subdomains);
|
| + EXPECT_EQ(86400, (client->expires - clock_.NowTicks()).InSeconds());
|
| +}
|
| +
|
| +TEST_F(ReportingDelegateImplTest, OnHeaderReceivedValidSubdomains) {
|
| + delegate_.OnHeaderReceived(
|
| + kUrl, "{\"url\":\"" + kEndpoint.spec() +
|
| + "\",\"max-age\":86400,\"includeSubdomains\":true}");
|
| +
|
| + const Client* client = FindClientInCache(&cache_, kOrigin, kEndpoint);
|
| + ASSERT_TRUE(client);
|
| + EXPECT_TRUE(client->subdomains);
|
| +}
|
| +
|
| +TEST_F(ReportingDelegateImplTest, OnHeaderReceivedValidZeroMaxAge) {
|
| + delegate_.OnHeaderReceived(
|
| + kUrl, "{\"url\":\"" + kEndpoint.spec() + "\",\"max-age\":86400}");
|
| +
|
| + const Client* client = FindClientInCache(&cache_, kOrigin, kEndpoint);
|
| + ASSERT_TRUE(client);
|
| +
|
| + delegate_.OnHeaderReceived(
|
| + kUrl, "{\"url\":\"" + kEndpoint.spec() + "\",\"max-age\":0}");
|
| +
|
| + client = FindClientInCache(&cache_, kOrigin, kEndpoint);
|
| + EXPECT_FALSE(client);
|
| +}
|
| +
|
| +} // namespace
|
| +} // namespace net
|
|
|