| Index: Source/platform/weborigin/SecurityPolicyTest.cpp
|
| diff --git a/Source/platform/weborigin/SecurityPolicyTest.cpp b/Source/platform/weborigin/SecurityPolicyTest.cpp
|
| index 757e00522e6e542416898729d2c67e21e0580576..59ab716b19ba568dd3716745cdd9a09ecd232df6 100644
|
| --- a/Source/platform/weborigin/SecurityPolicyTest.cpp
|
| +++ b/Source/platform/weborigin/SecurityPolicyTest.cpp
|
| @@ -44,5 +44,89 @@ TEST(SecurityPolicyTest, ReferrerIsAlwaysAWebURL)
|
| EXPECT_TRUE(String() == SecurityPolicy::generateReferrer(blink::ReferrerPolicyAlways, KURL(blink::ParsedURLString, "http://example.com/"), String::fromUTF8("chrome://somepage/")).referrer);
|
| }
|
|
|
| +TEST(SecurityPolicyTest, GenerateReferrer)
|
| +{
|
| + struct TestCase {
|
| + blink::ReferrerPolicy policy;
|
| + const char* referrer;
|
| + const char* destination;
|
| + const char* expected;
|
| + };
|
| +
|
| + const char insecureURLA[] = "http://a.test/path/to/file.html";
|
| + const char insecureURLB[] = "http://b.test/path/to/file.html";
|
| + const char insecureOriginA[] = "http://a.test/";
|
| +
|
| + const char secureURLA[] = "https://a.test/path/to/file.html";
|
| + const char secureURLB[] = "https://b.test/path/to/file.html";
|
| + const char secureOriginA[] = "https://a.test/";
|
| +
|
| + TestCase inputs[] = {
|
| + // HTTP -> HTTP: Same Origin
|
| + { blink::ReferrerPolicyAlways, insecureURLA, insecureURLA, insecureURLA },
|
| + { blink::ReferrerPolicyDefault, insecureURLA, insecureURLA, insecureURLA },
|
| + { blink::ReferrerPolicyNoReferrerWhenDowngrade, insecureURLA, insecureURLA, insecureURLA },
|
| + { blink::ReferrerPolicyNever, insecureURLA, insecureURLA, 0 },
|
| + { blink::ReferrerPolicyOrigin, insecureURLA, insecureURLA, insecureOriginA },
|
| + { blink::ReferrerPolicyOriginWhenCrossOrigin, insecureURLA, insecureURLA, insecureURLA },
|
| +
|
| + // HTTP -> HTTP: Cross Origin
|
| + { blink::ReferrerPolicyAlways, insecureURLA, insecureURLB, insecureURLA },
|
| + { blink::ReferrerPolicyDefault, insecureURLA, insecureURLB, insecureURLA },
|
| + { blink::ReferrerPolicyNoReferrerWhenDowngrade, insecureURLA, insecureURLB, insecureURLA },
|
| + { blink::ReferrerPolicyNever, insecureURLA, insecureURLB, 0 },
|
| + { blink::ReferrerPolicyOrigin, insecureURLA, insecureURLB, insecureOriginA },
|
| + { blink::ReferrerPolicyOriginWhenCrossOrigin, insecureURLA, insecureURLB, insecureOriginA },
|
| +
|
| + // HTTPS -> HTTPS: Same Origin
|
| + { blink::ReferrerPolicyAlways, secureURLA, secureURLA, secureURLA },
|
| + { blink::ReferrerPolicyDefault, secureURLA, secureURLA, secureURLA },
|
| + { blink::ReferrerPolicyNoReferrerWhenDowngrade, secureURLA, secureURLA, secureURLA },
|
| + { blink::ReferrerPolicyNever, secureURLA, secureURLA, 0 },
|
| + { blink::ReferrerPolicyOrigin, secureURLA, secureURLA, secureOriginA },
|
| + { blink::ReferrerPolicyOriginWhenCrossOrigin, secureURLA, secureURLA, secureURLA },
|
| +
|
| + // HTTPS -> HTTPS: Cross Origin
|
| + { blink::ReferrerPolicyAlways, secureURLA, secureURLB, secureURLA },
|
| + { blink::ReferrerPolicyDefault, secureURLA, secureURLB, secureURLA },
|
| + { blink::ReferrerPolicyNoReferrerWhenDowngrade, secureURLA, secureURLB, secureURLA },
|
| + { blink::ReferrerPolicyNever, secureURLA, secureURLB, 0 },
|
| + { blink::ReferrerPolicyOrigin, secureURLA, secureURLB, secureOriginA },
|
| + { blink::ReferrerPolicyOriginWhenCrossOrigin, secureURLA, secureURLB, secureOriginA },
|
| +
|
| + // HTTP -> HTTPS
|
| + { blink::ReferrerPolicyAlways, insecureURLA, secureURLB, insecureURLA },
|
| + { blink::ReferrerPolicyDefault, insecureURLA, secureURLB, insecureURLA },
|
| + { blink::ReferrerPolicyNoReferrerWhenDowngrade, insecureURLA, secureURLB, insecureURLA },
|
| + { blink::ReferrerPolicyNever, insecureURLA, secureURLB, 0 },
|
| + { blink::ReferrerPolicyOrigin, insecureURLA, secureURLB, insecureOriginA },
|
| + { blink::ReferrerPolicyOriginWhenCrossOrigin, insecureURLA, secureURLB, insecureOriginA },
|
| +
|
| + // HTTPS -> HTTP
|
| + { blink::ReferrerPolicyAlways, secureURLA, insecureURLB, secureURLA },
|
| + { blink::ReferrerPolicyDefault, secureURLA, insecureURLB, 0 },
|
| + { blink::ReferrerPolicyNoReferrerWhenDowngrade, secureURLA, insecureURLB, 0 },
|
| + { blink::ReferrerPolicyNever, secureURLA, insecureURLB, 0 },
|
| + { blink::ReferrerPolicyOrigin, secureURLA, insecureURLB, secureOriginA },
|
| + { blink::ReferrerPolicyOriginWhenCrossOrigin, secureURLA, secureURLB, secureOriginA },
|
| + };
|
| +
|
| + for (TestCase test : inputs) {
|
| + KURL destination(blink::ParsedURLString, test.destination);
|
| + blink::Referrer result = SecurityPolicy::generateReferrer(test.policy, destination, String::fromUTF8(test.referrer));
|
| + if (test.expected) {
|
| + EXPECT_EQ(String::fromUTF8(test.expected), result.referrer)
|
| + << "'" << test.referrer << "' to '" << test.destination
|
| + << "' should have been '" << test.expected << "': was '"
|
| + << result.referrer.utf8().data() << "'.";
|
| + } else {
|
| + EXPECT_TRUE(result.referrer.isEmpty())
|
| + << "'" << test.referrer << "' to '" << test.destination
|
| + << "' should have been empty: was '" << result.referrer.utf8().data() << "'.";
|
| + }
|
| + EXPECT_EQ(test.policy, result.referrerPolicy);
|
| + }
|
| +}
|
| +
|
| } // namespace
|
|
|
|
|