| Left: | ||
| Right: |
| LEFT | RIGHT |
|---|---|
| 1 /* | 1 /* |
| 2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
| 3 * Copyright (C) 2006-2017 eyeo GmbH | 3 * Copyright (C) 2006-2017 eyeo GmbH |
| 4 * | 4 * |
| 5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
| 6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
| 7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
| 8 * | 8 * |
| 9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
| 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| (...skipping 12 matching lines...) Expand all Loading... | |
| 23 | 23 |
| 24 using namespace AdblockPlus; | 24 using namespace AdblockPlus; |
| 25 | 25 |
| 26 namespace | 26 namespace |
| 27 { | 27 { |
| 28 class MockWebRequest : public AdblockPlus::WebRequest | 28 class MockWebRequest : public AdblockPlus::WebRequest |
| 29 { | 29 { |
| 30 public: | 30 public: |
| 31 AdblockPlus::ServerResponse GET(const std::string& url, const AdblockPlus::H eaderList& requestHeaders) const | 31 AdblockPlus::ServerResponse GET(const std::string& url, const AdblockPlus::H eaderList& requestHeaders) const |
| 32 { | 32 { |
| 33 std::set<std::string> r; | 33 std::set<std::string> headerNames; |
|
sergei
2017/04/19 10:38:31
what about renaming here?
r -> headerNames
hub
2017/04/19 13:12:04
Done.
| |
| 34 for (auto header : requestHeaders) | 34 for (auto header : requestHeaders) |
| 35 { | 35 { |
| 36 r.insert(header.first); | 36 headerNames.insert(header.first); |
| 37 } | 37 } |
| 38 { | 38 { |
| 39 std::lock_guard<std::mutex> lock(lastRequestHeadersMutex); | 39 std::lock_guard<std::mutex> lock(requestHeaderNamesMutex); |
| 40 // XXX we currently ignore the result. We should check it actually gets inserted. | 40 // we currently ignore the result. We should check it actually gets inse rted. |
|
sergei
2017/04/19 10:38:31
It would be better to remove XXX.
hub
2017/04/19 13:12:04
Acknowledged.
| |
| 41 lastRequestHeaders.insert(std::make_pair(url, std::move(r))); | 41 requestHeaderNames.insert(std::make_pair(url, std::move(headerNames))); |
| 42 } | 42 } |
| 43 | 43 |
| 44 AdblockPlus::Sleep(50); | 44 AdblockPlus::Sleep(50); |
| 45 | 45 |
| 46 AdblockPlus::ServerResponse result; | 46 AdblockPlus::ServerResponse result; |
| 47 result.status = NS_OK; | 47 result.status = NS_OK; |
| 48 result.responseStatus = 123; | 48 result.responseStatus = 123; |
| 49 result.responseHeaders.push_back(std::pair<std::string, std::string>("Foo" , "Bar")); | 49 result.responseHeaders.push_back(std::pair<std::string, std::string>("Foo" , "Bar")); |
| 50 result.responseText = url + "\n"; | 50 result.responseText = url + "\n"; |
| 51 if (!requestHeaders.empty()) | 51 if (!requestHeaders.empty()) |
| 52 { | 52 { |
| 53 result.responseText += requestHeaders[0].first + "\n" + requestHeaders[0 ].second; | 53 result.responseText += requestHeaders[0].first + "\n" + requestHeaders[0 ].second; |
| 54 } | 54 } |
| 55 return result; | 55 return result; |
| 56 } | 56 } |
| 57 | 57 |
| 58 // Testing method | |
| 59 // Get the headers for the request. Return a pair of a bool (found | |
| 60 // or not) and the actual header names | |
| 61 std::pair<bool, std::set<std::string>> headersForRequest(const std::string& url) | |
| 62 { | |
| 63 std::lock_guard<std::mutex> lock(requestHeaderNamesMutex); | |
| 64 auto iter = requestHeaderNames.find(url); | |
| 65 if (iter != requestHeaderNames.end()) | |
| 66 { | |
| 67 auto result = std::make_pair(true, iter->second); | |
| 68 requestHeaderNames.erase(iter); | |
| 69 return result; | |
| 70 } | |
| 71 return std::make_pair(false, std::set<std::string>()); | |
| 72 } | |
| 73 | |
| 58 // mutable. Very Ugly. But we are testing and need to change this in GET whi ch is const. | 74 // mutable. Very Ugly. But we are testing and need to change this in GET whi ch is const. |
| 59 mutable std::mutex lastRequestHeadersMutex; | 75 mutable std::mutex requestHeaderNamesMutex; |
| 60 mutable std::map<std::string, std::set<std::string>> lastRequestHeaders; | 76 mutable std::map<std::string, std::set<std::string>> requestHeaderNames; |
|
sergei
2017/04/19 10:38:31
because now it's not only for last requests
lastR
hub
2017/04/19 13:12:04
Done.
| |
| 61 }; | 77 }; |
| 62 | 78 |
| 63 template<class T> | 79 template<class T> |
| 64 class WebRequestTest : public BaseJsTest | 80 class WebRequestTest : public BaseJsTest |
| 65 { | 81 { |
| 66 protected: | 82 protected: |
| 67 void SetUp() | 83 void SetUp() |
| 68 { | 84 { |
| 69 BaseJsTest::SetUp(); | 85 BaseJsTest::SetUp(); |
| 70 jsEngine->SetWebRequest(AdblockPlus::WebRequestPtr(new T())); | 86 webRequest = std::make_shared<T>(); |
| 87 jsEngine->SetWebRequest(webRequest); | |
| 71 jsEngine->SetFileSystem(AdblockPlus::FileSystemPtr(new LazyFileSystem())); | 88 jsEngine->SetFileSystem(AdblockPlus::FileSystemPtr(new LazyFileSystem())); |
| 72 } | 89 } |
| 90 | |
| 91 std::shared_ptr<T> webRequest; | |
| 73 }; | 92 }; |
| 74 | 93 |
| 75 typedef WebRequestTest<MockWebRequest> MockWebRequestTest; | 94 typedef WebRequestTest<MockWebRequest> MockWebRequestTest; |
| 76 typedef WebRequestTest<AdblockPlus::DefaultWebRequest> DefaultWebRequestTest; | 95 typedef WebRequestTest<AdblockPlus::DefaultWebRequest> DefaultWebRequestTest; |
| 77 typedef WebRequestTest<MockWebRequest> XMLHttpRequestTest; | 96 typedef WebRequestTest<MockWebRequest> XMLHttpRequestTest; |
| 78 | 97 |
| 79 // we return the url of the XHR. | 98 // we return the url of the XHR. |
| 80 std::string ResetTestXHR(const AdblockPlus::JsEnginePtr& jsEngine, const std:: string& defaultUrl = "") | 99 std::string ResetTestXHR(const AdblockPlus::JsEnginePtr& jsEngine, const std:: string& defaultUrl = "") |
| 81 { | 100 { |
| 82 std::string url = defaultUrl; | 101 std::string url = defaultUrl; |
| (...skipping 141 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 224 | 243 |
| 225 typedef std::shared_ptr<CatchLogSystem> CatchLogSystemPtr; | 244 typedef std::shared_ptr<CatchLogSystem> CatchLogSystemPtr; |
| 226 } | 245 } |
| 227 | 246 |
| 228 TEST_F(XMLHttpRequestTest, RequestHeaderValidation) | 247 TEST_F(XMLHttpRequestTest, RequestHeaderValidation) |
| 229 { | 248 { |
| 230 auto catchLogSystem = CatchLogSystemPtr(new CatchLogSystem()); | 249 auto catchLogSystem = CatchLogSystemPtr(new CatchLogSystem()); |
| 231 jsEngine->SetLogSystem(catchLogSystem); | 250 jsEngine->SetLogSystem(catchLogSystem); |
| 232 | 251 |
| 233 auto filterEngine = AdblockPlus::FilterEngine::Create(jsEngine); | 252 auto filterEngine = AdblockPlus::FilterEngine::Create(jsEngine); |
| 234 auto webRequest = | |
| 235 std::static_pointer_cast<MockWebRequest>(jsEngine->GetWebRequest()); | |
| 236 | |
| 237 ASSERT_TRUE(webRequest); | |
| 238 | 253 |
| 239 const std::string msg = "Attempt to set a forbidden header was denied: "; | 254 const std::string msg = "Attempt to set a forbidden header was denied: "; |
| 240 | 255 |
| 241 // The test will check that console.warn has been called when the | 256 // The test will check that console.warn has been called when the |
| 242 // header is rejected. While this is an implementation detail, we | 257 // header is rejected. While this is an implementation detail, we |
| 243 // have no other way to check this | 258 // have no other way to check this |
| 244 | 259 |
| 245 // test 'Accept-Encoding' is rejected | 260 // test 'Accept-Encoding' is rejected |
| 246 catchLogSystem->clear(); | 261 catchLogSystem->clear(); |
| 247 std::string url = ResetTestXHR(jsEngine); | 262 std::string url = ResetTestXHR(jsEngine); |
| 248 jsEngine->Evaluate("\ | 263 jsEngine->Evaluate("\ |
| 249 request.setRequestHeader('Accept-Encoding', 'gzip');\nrequest.send();"); | 264 request.setRequestHeader('Accept-Encoding', 'gzip');\nrequest.send();"); |
| 250 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); | 265 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); |
| 251 EXPECT_EQ(msg + "Accept-Encoding", catchLogSystem->lastMessage); | 266 EXPECT_EQ(msg + "Accept-Encoding", catchLogSystem->lastMessage); |
| 252 WaitForVariable("result", jsEngine); | 267 WaitForVariable("result", jsEngine); |
| 253 { | 268 { |
| 254 std::lock_guard<std::mutex> lock(webRequest->lastRequestHeadersMutex); | 269 auto headersRequest = webRequest->headersForRequest(url); |
|
sergei
2017/04/19 10:38:31
any work with the mutex of webRequest should be mo
hub
2017/04/19 13:12:04
Done.
| |
| 255 const auto& iter = webRequest->lastRequestHeaders.find(url); | 270 EXPECT_TRUE(headersRequest.first); |
| 256 EXPECT_TRUE(iter != webRequest->lastRequestHeaders.end()); | 271 const auto& headers = headersRequest.second; |
| 257 const auto& headers = iter->second; | |
| 258 EXPECT_TRUE(headers.cend() == headers.find("Accept-Encoding")); | 272 EXPECT_TRUE(headers.cend() == headers.find("Accept-Encoding")); |
| 259 webRequest->lastRequestHeaders.erase(iter); | |
| 260 } | 273 } |
| 261 | 274 |
| 262 // test 'DNT' is rejected | 275 // test 'DNT' is rejected |
| 263 catchLogSystem->clear(); | 276 catchLogSystem->clear(); |
| 264 url = ResetTestXHR(jsEngine); | 277 url = ResetTestXHR(jsEngine); |
| 265 jsEngine->Evaluate("\ | 278 jsEngine->Evaluate("\ |
| 266 request.setRequestHeader('DNT', '1');\nrequest.send();"); | 279 request.setRequestHeader('DNT', '1');\nrequest.send();"); |
| 267 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); | 280 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); |
| 268 EXPECT_EQ(msg + "DNT", catchLogSystem->lastMessage); | 281 EXPECT_EQ(msg + "DNT", catchLogSystem->lastMessage); |
| 269 WaitForVariable("result", jsEngine); | 282 WaitForVariable("result", jsEngine); |
| 270 { | 283 { |
| 271 std::lock_guard<std::mutex> lock(webRequest->lastRequestHeadersMutex); | 284 auto headersRequest = webRequest->headersForRequest(url); |
| 272 const auto& iter = webRequest->lastRequestHeaders.find(url); | 285 EXPECT_TRUE(headersRequest.first); |
| 273 EXPECT_TRUE(iter != webRequest->lastRequestHeaders.end()); | 286 const auto& headers = headersRequest.second; |
| 274 const auto& headers = iter->second; | |
| 275 EXPECT_TRUE(headers.cend() == headers.find("DNT")); | 287 EXPECT_TRUE(headers.cend() == headers.find("DNT")); |
| 276 webRequest->lastRequestHeaders.erase(iter); | |
| 277 } | 288 } |
| 278 | 289 |
| 279 // test random 'X' header is accepted | 290 // test random 'X' header is accepted |
| 280 catchLogSystem->clear(); | 291 catchLogSystem->clear(); |
| 281 url = ResetTestXHR(jsEngine); | 292 url = ResetTestXHR(jsEngine); |
| 282 jsEngine->Evaluate("\ | 293 jsEngine->Evaluate("\ |
| 283 request.setRequestHeader('X', 'y');\nrequest.send();"); | 294 request.setRequestHeader('X', 'y');\nrequest.send();"); |
| 284 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_TRACE, catchLogSystem->lastLogLeve l); | 295 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_TRACE, catchLogSystem->lastLogLeve l); |
| 285 EXPECT_EQ("", catchLogSystem->lastMessage); | 296 EXPECT_EQ("", catchLogSystem->lastMessage); |
| 286 WaitForVariable("result", jsEngine); | 297 WaitForVariable("result", jsEngine); |
| 287 { | 298 { |
| 288 std::lock_guard<std::mutex> lock(webRequest->lastRequestHeadersMutex); | 299 auto headersRequest = webRequest->headersForRequest(url); |
| 289 const auto& iter = webRequest->lastRequestHeaders.find(url); | 300 EXPECT_TRUE(headersRequest.first); |
| 290 EXPECT_TRUE(iter != webRequest->lastRequestHeaders.end()); | 301 const auto& headers = headersRequest.second; |
| 291 const auto& headers = iter->second; | |
| 292 EXPECT_FALSE(headers.cend() == headers.find("X")); | 302 EXPECT_FALSE(headers.cend() == headers.find("X")); |
| 293 webRequest->lastRequestHeaders.erase(iter); | |
| 294 } | 303 } |
| 295 | 304 |
| 296 // test /^Proxy-/ is rejected. | 305 // test /^Proxy-/ is rejected. |
| 297 catchLogSystem->clear(); | 306 catchLogSystem->clear(); |
| 298 url = ResetTestXHR(jsEngine); | 307 url = ResetTestXHR(jsEngine); |
| 299 jsEngine->Evaluate("\ | 308 jsEngine->Evaluate("\ |
| 300 request.setRequestHeader('Proxy-foo', 'bar');\nrequest.send();"); | 309 request.setRequestHeader('Proxy-foo', 'bar');\nrequest.send();"); |
| 301 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); | 310 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); |
| 302 EXPECT_EQ(msg + "Proxy-foo", catchLogSystem->lastMessage); | 311 EXPECT_EQ(msg + "Proxy-foo", catchLogSystem->lastMessage); |
| 303 WaitForVariable("result", jsEngine); | 312 WaitForVariable("result", jsEngine); |
| 304 { | 313 { |
| 305 std::lock_guard<std::mutex> lock(webRequest->lastRequestHeadersMutex); | 314 auto headersRequest = webRequest->headersForRequest(url); |
| 306 const auto& iter = webRequest->lastRequestHeaders.find(url); | 315 EXPECT_TRUE(headersRequest.first); |
| 307 EXPECT_TRUE(iter != webRequest->lastRequestHeaders.end()); | 316 const auto& headers = headersRequest.second; |
| 308 const auto& headers = iter->second; | |
| 309 EXPECT_TRUE(headers.cend() == headers.find("Proxy-foo")); | 317 EXPECT_TRUE(headers.cend() == headers.find("Proxy-foo")); |
| 310 webRequest->lastRequestHeaders.erase(iter); | |
| 311 } | 318 } |
| 312 | 319 |
| 313 // test /^Sec-/ is rejected. | 320 // test /^Sec-/ is rejected. |
| 314 catchLogSystem->clear(); | 321 catchLogSystem->clear(); |
| 315 url = ResetTestXHR(jsEngine); | 322 url = ResetTestXHR(jsEngine); |
| 316 jsEngine->Evaluate("\ | 323 jsEngine->Evaluate("\ |
| 317 request.setRequestHeader('Sec-foo', 'bar');\nrequest.send();"); | 324 request.setRequestHeader('Sec-foo', 'bar');\nrequest.send();"); |
| 318 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); | 325 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_WARN, catchLogSystem->lastLogLevel ); |
| 319 EXPECT_EQ(msg + "Sec-foo", catchLogSystem->lastMessage); | 326 EXPECT_EQ(msg + "Sec-foo", catchLogSystem->lastMessage); |
| 320 WaitForVariable("result", jsEngine); | 327 WaitForVariable("result", jsEngine); |
| 321 { | 328 { |
| 322 std::lock_guard<std::mutex> lock(webRequest->lastRequestHeadersMutex); | 329 auto headersRequest = webRequest->headersForRequest(url); |
| 323 const auto& iter = webRequest->lastRequestHeaders.find(url); | 330 EXPECT_TRUE(headersRequest.first); |
| 324 EXPECT_TRUE(iter != webRequest->lastRequestHeaders.end()); | 331 const auto& headers = headersRequest.second; |
| 325 const auto& headers = iter->second; | |
| 326 EXPECT_TRUE(headers.cend() == headers.find("Sec-foo")); | 332 EXPECT_TRUE(headers.cend() == headers.find("Sec-foo")); |
| 327 webRequest->lastRequestHeaders.erase(iter); | |
| 328 } | 333 } |
| 329 | 334 |
| 330 // test 'Security' is accepted. | 335 // test 'Security' is accepted. |
| 331 catchLogSystem->clear(); | 336 catchLogSystem->clear(); |
| 332 url = ResetTestXHR(jsEngine); | 337 url = ResetTestXHR(jsEngine); |
| 333 jsEngine->Evaluate("\ | 338 jsEngine->Evaluate("\ |
| 334 request.setRequestHeader('Security', 'theater');\nrequest.send();"); | 339 request.setRequestHeader('Security', 'theater');\nrequest.send();"); |
| 335 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_TRACE, catchLogSystem->lastLogLeve l); | 340 EXPECT_EQ(AdblockPlus::LogSystem::LOG_LEVEL_TRACE, catchLogSystem->lastLogLeve l); |
| 336 EXPECT_EQ("", catchLogSystem->lastMessage); | 341 EXPECT_EQ("", catchLogSystem->lastMessage); |
| 337 WaitForVariable("result", jsEngine); | 342 WaitForVariable("result", jsEngine); |
| 338 { | 343 { |
| 339 std::lock_guard<std::mutex> lock(webRequest->lastRequestHeadersMutex); | 344 auto headersRequest = webRequest->headersForRequest(url); |
| 340 const auto& iter = webRequest->lastRequestHeaders.find(url); | 345 EXPECT_TRUE(headersRequest.first); |
| 341 EXPECT_TRUE(iter != webRequest->lastRequestHeaders.end()); | 346 const auto& headers = headersRequest.second; |
| 342 const auto& headers = iter->second; | |
| 343 EXPECT_FALSE(headers.cend() == headers.find("Security")); | 347 EXPECT_FALSE(headers.cend() == headers.find("Security")); |
| 344 webRequest->lastRequestHeaders.erase(iter); | 348 } |
| 345 } | 349 } |
| 346 } | |
| LEFT | RIGHT |