Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(201)

Unified Diff: net/cookies/cookie_store_unittest.h

Issue 2882063002: Add a SetCanonicalCookie method for CookieMonster. (Closed)
Patch Set: Fix AW cookie store wrapper. Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/cookies/cookie_store_test_helpers.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cookies/cookie_store_unittest.h
diff --git a/net/cookies/cookie_store_unittest.h b/net/cookies/cookie_store_unittest.h
index 14aa3e9be567afa3c34ca22295ad6fc0444271ce..4aa2a3c554ea1def82114cbd83955e4da1ea0c61 100644
--- a/net/cookies/cookie_store_unittest.h
+++ b/net/cookies/cookie_store_unittest.h
@@ -181,6 +181,20 @@ class CookieStoreTest : public testing::Test {
return callback.result();
}
+ bool SetCanonicalCookie(CookieStore* cs,
+ std::unique_ptr<CanonicalCookie> cookie,
+ bool secure_source,
+ bool can_modify_httponly) {
+ DCHECK(cs);
+ ResultSavingCookieCallback<bool> callback;
+ cs->SetCanonicalCookieAsync(
+ std::move(cookie), secure_source, can_modify_httponly,
+ base::Bind(&ResultSavingCookieCallback<bool>::Run,
+ base::Unretained(&callback)));
+ callback.WaitUntilDone();
+ return callback.result();
+ }
+
bool SetCookieWithServerTime(CookieStore* cs,
const GURL& url,
const std::string& cookie_line,
@@ -465,6 +479,131 @@ TYPED_TEST_P(CookieStoreTest, SetCookieWithDetailsAsync) {
EXPECT_TRUE(++it == cookies.end());
}
+TYPED_TEST_P(CookieStoreTest, SetCanonicalCookieTest) {
+ CookieStore* cs = this->GetCookieStore();
+
+ base::Time two_hours_ago = base::Time::Now() - base::TimeDelta::FromHours(2);
+ base::Time one_hour_ago = base::Time::Now() - base::TimeDelta::FromHours(1);
+ base::Time one_hour_from_now =
+ base::Time::Now() + base::TimeDelta::FromHours(1);
+
+ std::string foo_foo_host(this->www_foo_foo_.url().host());
+ std::string foo_bar_domain(this->www_foo_bar_.domain());
+ std::string http_foo_host(this->http_www_foo_.url().host());
+ std::string https_foo_host(this->https_www_foo_.url().host());
+
+ EXPECT_TRUE(this->SetCanonicalCookie(
+ cs,
+ base::MakeUnique<CanonicalCookie>(
+ "A", "B", foo_foo_host, "/foo", one_hour_ago, one_hour_from_now,
+ base::Time(), false, false, CookieSameSite::DEFAULT_MODE,
+ COOKIE_PRIORITY_DEFAULT),
+ false, true));
+ // Note that for the creation time to be set exactly, without modification,
+ // it must be different from the one set by the line above.
+ EXPECT_TRUE(this->SetCanonicalCookie(
+ cs,
+ base::MakeUnique<CanonicalCookie>(
+ "C", "D", "." + foo_bar_domain, "/bar", two_hours_ago, base::Time(),
+ one_hour_ago, false, true, CookieSameSite::DEFAULT_MODE,
+ COOKIE_PRIORITY_DEFAULT),
+ false, true));
+
+ // A secure source is required for creating secure cookies.
+ EXPECT_FALSE(this->SetCanonicalCookie(
+ cs,
+ base::MakeUnique<CanonicalCookie>(
+ "E", "F", http_foo_host, "/", base::Time(), base::Time(),
+ base::Time(), true, false, CookieSameSite::DEFAULT_MODE,
+ COOKIE_PRIORITY_DEFAULT),
+ false, true));
+
+ // A secure source is also required for overwriting secure cookies. Writing
+ // a secure cookie then overwriting it from a non-secure source should fail.
+ EXPECT_TRUE(this->SetCanonicalCookie(
+ cs,
+ base::MakeUnique<CanonicalCookie>(
+ "E", "F", http_foo_host, "/", base::Time(), base::Time(),
+ base::Time(), true, false, CookieSameSite::DEFAULT_MODE,
+ COOKIE_PRIORITY_DEFAULT),
+ true, true));
+
+ EXPECT_FALSE(this->SetCanonicalCookie(
+ cs,
+ base::MakeUnique<CanonicalCookie>(
+ "E", "F", http_foo_host, "/", base::Time(), base::Time(),
+ base::Time(), true, false, CookieSameSite::DEFAULT_MODE,
+ COOKIE_PRIORITY_DEFAULT),
+ false, true));
+
+ // Get all the cookies for a given URL, regardless of properties. This 'get()'
+ // operation shouldn't update the access time, as the test checks that the
+ // access time is set properly upon creation. Updating the access time would
+ // make that difficult.
+ CookieOptions options;
+ options.set_include_httponly();
+ options.set_same_site_cookie_mode(
+ CookieOptions::SameSiteCookieMode::INCLUDE_STRICT_AND_LAX);
+ options.set_do_not_update_access_time();
+
+ CookieList cookies =
+ this->GetCookieListWithOptions(cs, this->www_foo_foo_.url(), options);
+ CookieList::iterator it = cookies.begin();
+
+ ASSERT_EQ(1u, cookies.size());
+ EXPECT_EQ("A", it->Name());
+ EXPECT_EQ("B", it->Value());
+ EXPECT_EQ(this->www_foo_foo_.host(), it->Domain());
+ EXPECT_EQ("/foo", it->Path());
+ EXPECT_EQ(one_hour_ago, it->CreationDate());
+ EXPECT_TRUE(it->IsPersistent());
+ // Expect expiration date is in the right range. Some cookie implementations
+ // may not record it with millisecond accuracy.
+ EXPECT_LE((one_hour_from_now - it->ExpiryDate()).magnitude().InSeconds(), 5);
+ // Some CookieStores don't store last access date.
+ if (!it->LastAccessDate().is_null())
+ EXPECT_EQ(one_hour_ago, it->LastAccessDate());
+ EXPECT_FALSE(it->IsSecure());
+ EXPECT_FALSE(it->IsHttpOnly());
+
+ // Get the cookie using the wide open |options|:
+ cookies =
+ this->GetCookieListWithOptions(cs, this->www_foo_bar_.url(), options);
+ ASSERT_EQ(1u, cookies.size());
+ it = cookies.begin();
+
+ EXPECT_EQ("C", it->Name());
+ EXPECT_EQ("D", it->Value());
+ EXPECT_EQ(this->www_foo_bar_.Format(".%D"), it->Domain());
+ EXPECT_EQ("/bar", it->Path());
+ EXPECT_EQ(two_hours_ago, it->CreationDate());
+ EXPECT_FALSE(it->IsPersistent());
+ // Some CookieStores don't store last access date.
+ if (!it->LastAccessDate().is_null())
+ EXPECT_EQ(one_hour_ago, it->LastAccessDate());
+ EXPECT_FALSE(it->IsSecure());
+ EXPECT_TRUE(it->IsHttpOnly());
+
+ cookies =
+ this->GetCookieListWithOptions(cs, this->https_www_foo_.url(), options);
+ ASSERT_EQ(1u, cookies.size());
+ it = cookies.begin();
+
+ EXPECT_EQ("E", it->Name());
+ EXPECT_EQ("F", it->Value());
+ EXPECT_EQ("/", it->Path());
+ EXPECT_EQ(this->https_www_foo_.host(), it->Domain());
+ // Cookie should have its creation time set, and be in a reasonable range.
+ EXPECT_LE((base::Time::Now() - it->CreationDate()).magnitude().InMinutes(),
+ 2);
+ EXPECT_FALSE(it->IsPersistent());
+ // Some CookieStores don't store last access date.
+ if (!it->LastAccessDate().is_null())
+ EXPECT_EQ(it->CreationDate(), it->LastAccessDate());
+ EXPECT_TRUE(it->IsSecure());
+ EXPECT_FALSE(it->IsHttpOnly());
+}
+
// Test enforcement around setting secure cookies.
TYPED_TEST_P(CookieStoreTest, SetCookieWithDetailsSecureEnforcement) {
CookieStore* cs = this->GetCookieStore();
@@ -1476,6 +1615,7 @@ TYPED_TEST_P(CookieStoreTest, DeleteSessionCookie) {
REGISTER_TYPED_TEST_CASE_P(CookieStoreTest,
SetCookieWithDetailsAsync,
+ SetCanonicalCookieTest,
SetCookieWithDetailsSecureEnforcement,
EmptyKeyTest,
DomainTest,
« no previous file with comments | « net/cookies/cookie_store_test_helpers.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698