blob: 098ce73e99aa48a85c42311b3876228ac37567f3 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <algorithm>
#include <limits>
#include "base/basictypes.h"
#include "base/memory/scoped_ptr.h"
#include "base/pickle.h"
#include "base/time/time.h"
#include "base/values.h"
#include "net/http/http_byte_range.h"
#include "net/http/http_response_headers.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace {
struct TestData {
const char* raw_headers;
const char* expected_headers;
int expected_response_code;
net::HttpVersion expected_parsed_version;
net::HttpVersion expected_version;
};
class HttpResponseHeadersTest : public testing::Test {
};
// Transform "normal"-looking headers (\n-separated) to the appropriate
// input format for ParseRawHeaders (\0-separated).
void HeadersToRaw(std::string* headers) {
std::replace(headers->begin(), headers->end(), '\n', '\0');
if (!headers->empty())
*headers += '\0';
}
class HttpResponseHeadersCacheControlTest : public HttpResponseHeadersTest {
protected:
// Make tests less verbose.
typedef base::TimeDelta TimeDelta;
// Initilise the headers() value with a Cache-Control header set to
// |cache_control|. |cache_control| is copied and so can safely be a
// temporary.
void InitializeHeadersWithCacheControl(const char* cache_control) {
std::string raw_headers("HTTP/1.1 200 OK\n");
raw_headers += "Cache-Control: ";
raw_headers += cache_control;
raw_headers += "\n";
HeadersToRaw(&raw_headers);
headers_ = new net::HttpResponseHeaders(raw_headers);
}
const scoped_refptr<net::HttpResponseHeaders>& headers() { return headers_; }
// Return a pointer to a TimeDelta object. For use when the value doesn't
// matter.
TimeDelta* TimeDeltaPointer() { return &delta_; }
// Get the max-age value. This should only be used in tests where a valid
// max-age parameter is expected to be present.
TimeDelta GetMaxAgeValue() {
DCHECK(headers_.get()) << "Call InitializeHeadersWithCacheControl() first";
TimeDelta max_age_value;
EXPECT_TRUE(headers()->GetMaxAgeValue(&max_age_value));
return max_age_value;
}
// Get the stale-while-revalidate value. This should only be used in tests
// where a valid max-age parameter is expected to be present.
TimeDelta GetStaleWhileRevalidateValue() {
DCHECK(headers_.get()) << "Call InitializeHeadersWithCacheControl() first";
TimeDelta stale_while_revalidate_value;
EXPECT_TRUE(
headers()->GetStaleWhileRevalidateValue(&stale_while_revalidate_value));
return stale_while_revalidate_value;
}
private:
scoped_refptr<net::HttpResponseHeaders> headers_;
TimeDelta delta_;
};
class CommonHttpResponseHeadersTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<TestData> {
};
TEST_P(CommonHttpResponseHeadersTest, TestCommon) {
const TestData test = GetParam();
std::string raw_headers(test.raw_headers);
HeadersToRaw(&raw_headers);
std::string expected_headers(test.expected_headers);
std::string headers;
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(raw_headers));
parsed->GetNormalizedHeaders(&headers);
// Transform to readable output format (so it's easier to see diffs).
std::replace(headers.begin(), headers.end(), ' ', '_');
std::replace(headers.begin(), headers.end(), '\n', '\\');
std::replace(expected_headers.begin(), expected_headers.end(), ' ', '_');
std::replace(expected_headers.begin(), expected_headers.end(), '\n', '\\');
EXPECT_EQ(expected_headers, headers);
EXPECT_EQ(test.expected_response_code, parsed->response_code());
EXPECT_TRUE(test.expected_parsed_version == parsed->GetParsedHttpVersion());
EXPECT_TRUE(test.expected_version == parsed->GetHttpVersion());
}
TestData response_headers_tests[] = {
{
// Normalise whitespace.
"HTTP/1.1 202 Accepted \n"
"Content-TYPE : text/html; charset=utf-8 \n"
"Set-Cookie: a \n"
"Set-Cookie: b \n",
"HTTP/1.1 202 Accepted\n"
"Content-TYPE: text/html; charset=utf-8\n"
"Set-Cookie: a, b\n",
202,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
{
// Normalize leading whitespace.
"HTTP/1.1 202 Accepted \n"
// Starts with space -- will be skipped as invalid.
" Content-TYPE : text/html; charset=utf-8 \n"
"Set-Cookie: a \n"
"Set-Cookie: b \n",
"HTTP/1.1 202 Accepted\n"
"Set-Cookie: a, b\n",
202,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
{
// Normalize blank headers.
"HTTP/1.1 200 OK\n"
"Header1 : \n"
"Header2: \n"
"Header3:\n"
"Header4\n"
"Header5 :\n",
"HTTP/1.1 200 OK\n"
"Header1: \n"
"Header2: \n"
"Header3: \n"
"Header5: \n",
200,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
{
// Don't believe the http/0.9 version if there are headers!
"hTtP/0.9 201\n"
"Content-TYPE: text/html; charset=utf-8\n",
"HTTP/1.0 201 OK\n"
"Content-TYPE: text/html; charset=utf-8\n",
201,
net::HttpVersion(0,9),
net::HttpVersion(1,0)
},
{
// Accept the HTTP/0.9 version number if there are no headers.
// This is how HTTP/0.9 responses get constructed from
// HttpNetworkTransaction.
"hTtP/0.9 200 OK\n",
"HTTP/0.9 200 OK\n",
200,
net::HttpVersion(0,9),
net::HttpVersion(0,9)
},
{
// Add missing OK.
"HTTP/1.1 201\n"
"Content-TYPE: text/html; charset=utf-8\n",
"HTTP/1.1 201 OK\n"
"Content-TYPE: text/html; charset=utf-8\n",
201,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
{
// Normalize bad status line.
"SCREWED_UP_STATUS_LINE\n"
"Content-TYPE: text/html; charset=utf-8\n",
"HTTP/1.0 200 OK\n"
"Content-TYPE: text/html; charset=utf-8\n",
200,
net::HttpVersion(0,0), // Parse error.
net::HttpVersion(1,0)
},
{
// Normalize invalid status code.
"HTTP/1.1 -1 Unknown\n",
"HTTP/1.1 200 OK\n",
200,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
{
// Normalize empty header.
"",
"HTTP/1.0 200 OK\n",
200,
net::HttpVersion(0,0), // Parse Error.
net::HttpVersion(1,0)
},
{
// Normalize headers that start with a colon.
"HTTP/1.1 202 Accepted \n"
"foo: bar\n"
": a \n"
" : b\n"
"baz: blat \n",
"HTTP/1.1 202 Accepted\n"
"foo: bar\n"
"baz: blat\n",
202,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
{
// Normalize headers that end with a colon.
"HTTP/1.1 202 Accepted \n"
"foo: \n"
"bar:\n"
"baz: blat \n"
"zip:\n",
"HTTP/1.1 202 Accepted\n"
"foo: \n"
"bar: \n"
"baz: blat\n"
"zip: \n",
202,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
{
// Normalize whitespace headers.
"\n \n",
"HTTP/1.0 200 OK\n",
200,
net::HttpVersion(0,0), // Parse error.
net::HttpVersion(1,0)
},
{
// Consolidate Set-Cookie headers.
"HTTP/1.1 200 OK\n"
"Set-Cookie: x=1\n"
"Set-Cookie: y=2\n",
"HTTP/1.1 200 OK\n"
"Set-Cookie: x=1, y=2\n",
200,
net::HttpVersion(1,1),
net::HttpVersion(1,1)
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
CommonHttpResponseHeadersTest,
testing::ValuesIn(response_headers_tests));
TEST(HttpResponseHeadersTest, GetNormalizedHeader) {
std::string headers =
"HTTP/1.1 200 OK\n"
"Cache-control: private\n"
"cache-Control: no-store\n";
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
std::string value;
EXPECT_TRUE(parsed->GetNormalizedHeader("cache-control", &value));
EXPECT_EQ("private, no-store", value);
}
struct PersistData {
net::HttpResponseHeaders::PersistOptions options;
const char* raw_headers;
const char* expected_headers;
};
class PersistenceTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<PersistData> {
};
TEST_P(PersistenceTest, Persist) {
const PersistData test = GetParam();
std::string headers = test.raw_headers;
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed1(
new net::HttpResponseHeaders(headers));
Pickle pickle;
parsed1->Persist(&pickle, test.options);
PickleIterator iter(pickle);
scoped_refptr<net::HttpResponseHeaders> parsed2(
new net::HttpResponseHeaders(pickle, &iter));
std::string h2;
parsed2->GetNormalizedHeaders(&h2);
EXPECT_EQ(std::string(test.expected_headers), h2);
}
const struct PersistData persistence_tests[] = {
{ net::HttpResponseHeaders::PERSIST_ALL,
"HTTP/1.1 200 OK\n"
"Cache-control:private\n"
"cache-Control:no-store\n",
"HTTP/1.1 200 OK\n"
"Cache-control: private, no-store\n"
},
{ net::HttpResponseHeaders::PERSIST_SANS_HOP_BY_HOP,
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"server: blah\n",
"HTTP/1.1 200 OK\n"
"server: blah\n"
},
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE |
net::HttpResponseHeaders::PERSIST_SANS_HOP_BY_HOP,
"HTTP/1.1 200 OK\n"
"fOo: 1\n"
"Foo: 2\n"
"Transfer-Encoding: chunked\n"
"CoNnection: keep-alive\n"
"cache-control: private, no-cache=\"foo\"\n",
"HTTP/1.1 200 OK\n"
"cache-control: private, no-cache=\"foo\"\n"
},
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE,
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private,no-cache=\"foo, bar\"\n"
"bar",
"HTTP/1.1 200 OK\n"
"Cache-Control: private,no-cache=\"foo, bar\"\n"
},
// Ignore bogus no-cache value.
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE,
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private,no-cache=foo\n",
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private,no-cache=foo\n"
},
// Ignore bogus no-cache value.
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE,
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\n",
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\n"
},
// Ignore empty no-cache value.
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE,
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\"\"\n",
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\"\"\n"
},
// Ignore wrong quotes no-cache value.
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE,
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\'foo\'\n",
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\'foo\'\n"
},
// Ignore unterminated quotes no-cache value.
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE,
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\"foo\n",
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\"foo\n"
},
// Accept sloppy LWS.
{ net::HttpResponseHeaders::PERSIST_SANS_NON_CACHEABLE,
"HTTP/1.1 200 OK\n"
"Foo: 2\n"
"Cache-Control: private, no-cache=\" foo\t, bar\"\n",
"HTTP/1.1 200 OK\n"
"Cache-Control: private, no-cache=\" foo\t, bar\"\n"
},
// Header name appears twice, separated by another header.
{ net::HttpResponseHeaders::PERSIST_ALL,
"HTTP/1.1 200 OK\n"
"Foo: 1\n"
"Bar: 2\n"
"Foo: 3\n",
"HTTP/1.1 200 OK\n"
"Foo: 1, 3\n"
"Bar: 2\n"
},
// Header name appears twice, separated by another header (type 2).
{ net::HttpResponseHeaders::PERSIST_ALL,
"HTTP/1.1 200 OK\n"
"Foo: 1, 3\n"
"Bar: 2\n"
"Foo: 4\n",
"HTTP/1.1 200 OK\n"
"Foo: 1, 3, 4\n"
"Bar: 2\n"
},
// Test filtering of cookie headers.
{ net::HttpResponseHeaders::PERSIST_SANS_COOKIES,
"HTTP/1.1 200 OK\n"
"Set-Cookie: foo=bar; httponly\n"
"Set-Cookie: bar=foo\n"
"Bar: 1\n"
"Set-Cookie2: bar2=foo2\n",
"HTTP/1.1 200 OK\n"
"Bar: 1\n"
},
// Test LWS at the end of a header.
{ net::HttpResponseHeaders::PERSIST_ALL,
"HTTP/1.1 200 OK\n"
"Content-Length: 450 \n"
"Content-Encoding: gzip\n",
"HTTP/1.1 200 OK\n"
"Content-Length: 450\n"
"Content-Encoding: gzip\n"
},
// Test LWS at the end of a header.
{ net::HttpResponseHeaders::PERSIST_RAW,
"HTTP/1.1 200 OK\n"
"Content-Length: 450 \n"
"Content-Encoding: gzip\n",
"HTTP/1.1 200 OK\n"
"Content-Length: 450\n"
"Content-Encoding: gzip\n"
},
// Test filtering of transport security state headers.
{ net::HttpResponseHeaders::PERSIST_SANS_SECURITY_STATE,
"HTTP/1.1 200 OK\n"
"Strict-Transport-Security: max-age=1576800\n"
"Bar: 1\n"
"Public-Key-Pins: max-age=100000; "
"pin-sha1=\"ObT42aoSpAqWdY9WfRfL7i0HsVk=\";"
"pin-sha1=\"7kW49EVwZG0hSNx41ZO/fUPN0ek=\"",
"HTTP/1.1 200 OK\n"
"Bar: 1\n"
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
PersistenceTest,
testing::ValuesIn(persistence_tests));
TEST(HttpResponseHeadersTest, EnumerateHeader_Coalesced) {
// Ensure that commas in quoted strings are not regarded as value separators.
// Ensure that whitespace following a value is trimmed properly.
std::string headers =
"HTTP/1.1 200 OK\n"
"Cache-control:private , no-cache=\"set-cookie,server\" \n"
"cache-Control: no-store\n";
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
void* iter = NULL;
std::string value;
EXPECT_TRUE(parsed->EnumerateHeader(&iter, "cache-control", &value));
EXPECT_EQ("private", value);
EXPECT_TRUE(parsed->EnumerateHeader(&iter, "cache-control", &value));
EXPECT_EQ("no-cache=\"set-cookie,server\"", value);
EXPECT_TRUE(parsed->EnumerateHeader(&iter, "cache-control", &value));
EXPECT_EQ("no-store", value);
EXPECT_FALSE(parsed->EnumerateHeader(&iter, "cache-control", &value));
}
TEST(HttpResponseHeadersTest, EnumerateHeader_Challenge) {
// Even though WWW-Authenticate has commas, it should not be treated as
// coalesced values.
std::string headers =
"HTTP/1.1 401 OK\n"
"WWW-Authenticate:Digest realm=foobar, nonce=x, domain=y\n"
"WWW-Authenticate:Basic realm=quatar\n";
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
void* iter = NULL;
std::string value;
EXPECT_TRUE(parsed->EnumerateHeader(&iter, "WWW-Authenticate", &value));
EXPECT_EQ("Digest realm=foobar, nonce=x, domain=y", value);
EXPECT_TRUE(parsed->EnumerateHeader(&iter, "WWW-Authenticate", &value));
EXPECT_EQ("Basic realm=quatar", value);
EXPECT_FALSE(parsed->EnumerateHeader(&iter, "WWW-Authenticate", &value));
}
TEST(HttpResponseHeadersTest, EnumerateHeader_DateValued) {
// The comma in a date valued header should not be treated as a
// field-value separator.
std::string headers =
"HTTP/1.1 200 OK\n"
"Date: Tue, 07 Aug 2007 23:10:55 GMT\n"
"Last-Modified: Wed, 01 Aug 2007 23:23:45 GMT\n";
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
std::string value;
EXPECT_TRUE(parsed->EnumerateHeader(NULL, "date", &value));
EXPECT_EQ("Tue, 07 Aug 2007 23:10:55 GMT", value);
EXPECT_TRUE(parsed->EnumerateHeader(NULL, "last-modified", &value));
EXPECT_EQ("Wed, 01 Aug 2007 23:23:45 GMT", value);
}
TEST(HttpResponseHeadersTest, DefaultDateToGMT) {
// Verify we make the best interpretation when parsing dates that incorrectly
// do not end in "GMT" as RFC2616 requires.
std::string headers =
"HTTP/1.1 200 OK\n"
"Date: Tue, 07 Aug 2007 23:10:55\n"
"Last-Modified: Tue, 07 Aug 2007 19:10:55 EDT\n"
"Expires: Tue, 07 Aug 2007 23:10:55 UTC\n";
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
base::Time expected_value;
ASSERT_TRUE(base::Time::FromString("Tue, 07 Aug 2007 23:10:55 GMT",
&expected_value));
base::Time value;
// When the timezone is missing, GMT is a good guess as its what RFC2616
// requires.
EXPECT_TRUE(parsed->GetDateValue(&value));
EXPECT_EQ(expected_value, value);
// If GMT is missing but an RFC822-conforming one is present, use that.
EXPECT_TRUE(parsed->GetLastModifiedValue(&value));
EXPECT_EQ(expected_value, value);
// If an unknown timezone is present, treat like a missing timezone and
// default to GMT. The only example of a web server not specifying "GMT"
// used "UTC" which is equivalent to GMT.
if (parsed->GetExpiresValue(&value))
EXPECT_EQ(expected_value, value);
}
struct ContentTypeTestData {
const std::string raw_headers;
const std::string mime_type;
const bool has_mimetype;
const std::string charset;
const bool has_charset;
const std::string all_content_type;
};
class ContentTypeTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<ContentTypeTestData> {
};
TEST_P(ContentTypeTest, GetMimeType) {
const ContentTypeTestData test = GetParam();
std::string headers(test.raw_headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
std::string value;
EXPECT_EQ(test.has_mimetype, parsed->GetMimeType(&value));
EXPECT_EQ(test.mime_type, value);
value.clear();
EXPECT_EQ(test.has_charset, parsed->GetCharset(&value));
EXPECT_EQ(test.charset, value);
EXPECT_TRUE(parsed->GetNormalizedHeader("content-type", &value));
EXPECT_EQ(test.all_content_type, value);
}
const ContentTypeTestData mimetype_tests[] = {
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html\n",
"text/html", true,
"", false,
"text/html" },
// Multiple content-type headers should give us the last one.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html\n"
"Content-type: text/html\n",
"text/html", true,
"", false,
"text/html, text/html" },
{ "HTTP/1.1 200 OK\n"
"Content-type: text/plain\n"
"Content-type: text/html\n"
"Content-type: text/plain\n"
"Content-type: text/html\n",
"text/html", true,
"", false,
"text/plain, text/html, text/plain, text/html" },
// Test charset parsing.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html\n"
"Content-type: text/html; charset=ISO-8859-1\n",
"text/html", true,
"iso-8859-1", true,
"text/html, text/html; charset=ISO-8859-1" },
// Test charset in double quotes.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html\n"
"Content-type: text/html; charset=\"ISO-8859-1\"\n",
"text/html", true,
"iso-8859-1", true,
"text/html, text/html; charset=\"ISO-8859-1\"" },
// If there are multiple matching content-type headers, we carry
// over the charset value.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html;charset=utf-8\n"
"Content-type: text/html\n",
"text/html", true,
"utf-8", true,
"text/html;charset=utf-8, text/html" },
// Test single quotes.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html;charset='utf-8'\n"
"Content-type: text/html\n",
"text/html", true,
"utf-8", true,
"text/html;charset='utf-8', text/html" },
// Last charset wins if matching content-type.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html;charset=utf-8\n"
"Content-type: text/html;charset=iso-8859-1\n",
"text/html", true,
"iso-8859-1", true,
"text/html;charset=utf-8, text/html;charset=iso-8859-1" },
// Charset is ignored if the content types change.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/plain;charset=utf-8\n"
"Content-type: text/html\n",
"text/html", true,
"", false,
"text/plain;charset=utf-8, text/html" },
// Empty content-type.
{ "HTTP/1.1 200 OK\n"
"Content-type: \n",
"", false,
"", false,
"" },
// Emtpy charset.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html;charset=\n",
"text/html", true,
"", false,
"text/html;charset=" },
// Multiple charsets, last one wins.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html;charset=utf-8; charset=iso-8859-1\n",
"text/html", true,
"iso-8859-1", true,
"text/html;charset=utf-8; charset=iso-8859-1" },
// Multiple params.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html; foo=utf-8; charset=iso-8859-1\n",
"text/html", true,
"iso-8859-1", true,
"text/html; foo=utf-8; charset=iso-8859-1" },
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html ; charset=utf-8 ; bar=iso-8859-1\n",
"text/html", true,
"utf-8", true,
"text/html ; charset=utf-8 ; bar=iso-8859-1" },
// Comma embeded in quotes.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html ; charset='utf-8,text/plain' ;\n",
"text/html", true,
"utf-8,text/plain", true,
"text/html ; charset='utf-8,text/plain' ;" },
// Charset with leading spaces.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html ; charset= 'utf-8' ;\n",
"text/html", true,
"utf-8", true,
"text/html ; charset= 'utf-8' ;" },
// Media type comments in mime-type.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html (html)\n",
"text/html", true,
"", false,
"text/html (html)" },
// Incomplete charset= param.
{ "HTTP/1.1 200 OK\n"
"Content-type: text/html; char=\n",
"text/html", true,
"", false,
"text/html; char=" },
// Invalid media type: no slash.
{ "HTTP/1.1 200 OK\n"
"Content-type: texthtml\n",
"", false,
"", false,
"texthtml" },
// Invalid media type: "*/*".
{ "HTTP/1.1 200 OK\n"
"Content-type: */*\n",
"", false,
"", false,
"*/*" },
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
ContentTypeTest,
testing::ValuesIn(mimetype_tests));
struct RequiresValidationTestData {
const char* headers;
bool requires_validation;
};
class RequiresValidationTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<RequiresValidationTestData> {
};
TEST_P(RequiresValidationTest, RequiresValidation) {
const RequiresValidationTestData test = GetParam();
base::Time request_time, response_time, current_time;
base::Time::FromString("Wed, 28 Nov 2007 00:40:09 GMT", &request_time);
base::Time::FromString("Wed, 28 Nov 2007 00:40:12 GMT", &response_time);
base::Time::FromString("Wed, 28 Nov 2007 00:45:20 GMT", &current_time);
std::string headers(test.headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
bool requires_validation =
parsed->RequiresValidation(request_time, response_time, current_time);
EXPECT_EQ(test.requires_validation, requires_validation);
}
const struct RequiresValidationTestData requires_validation_tests[] = {
// No expiry info: expires immediately.
{ "HTTP/1.1 200 OK\n"
"\n",
true
},
// No expiry info: expires immediately.
{ "HTTP/1.1 200 OK\n"
"\n",
true
},
// Valid for a little while.
{ "HTTP/1.1 200 OK\n"
"cache-control: max-age=10000\n"
"\n",
false
},
// Expires in the future.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"expires: Wed, 28 Nov 2007 01:00:00 GMT\n"
"\n",
false
},
// Already expired.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"expires: Wed, 28 Nov 2007 00:00:00 GMT\n"
"\n",
true
},
// Max-age trumps expires.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"expires: Wed, 28 Nov 2007 00:00:00 GMT\n"
"cache-control: max-age=10000\n"
"\n",
false
},
// Last-modified heuristic: modified a while ago.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"last-modified: Wed, 27 Nov 2007 08:00:00 GMT\n"
"\n",
false
},
{ "HTTP/1.1 203 Non-Authoritative Information\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"last-modified: Wed, 27 Nov 2007 08:00:00 GMT\n"
"\n",
false
},
{ "HTTP/1.1 206 Partial Content\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"last-modified: Wed, 27 Nov 2007 08:00:00 GMT\n"
"\n",
false
},
// Last-modified heuristic: modified recently.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"last-modified: Wed, 28 Nov 2007 00:40:10 GMT\n"
"\n",
true
},
{ "HTTP/1.1 203 Non-Authoritative Information\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"last-modified: Wed, 28 Nov 2007 00:40:10 GMT\n"
"\n",
true
},
{ "HTTP/1.1 206 Partial Content\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"last-modified: Wed, 28 Nov 2007 00:40:10 GMT\n"
"\n",
true
},
// Cached permanent redirect.
{ "HTTP/1.1 301 Moved Permanently\n"
"\n",
false
},
// Another cached permanent redirect.
{ "HTTP/1.1 308 Permanent Redirect\n"
"\n",
false
},
// Cached redirect: not reusable even though by default it would be.
{ "HTTP/1.1 300 Multiple Choices\n"
"Cache-Control: no-cache\n"
"\n",
true
},
// Cached forever by default.
{ "HTTP/1.1 410 Gone\n"
"\n",
false
},
// Cached temporary redirect: not reusable.
{ "HTTP/1.1 302 Found\n"
"\n",
true
},
// Cached temporary redirect: reusable.
{ "HTTP/1.1 302 Found\n"
"cache-control: max-age=10000\n"
"\n",
false
},
// Cache-control: max-age=N overrides expires: date in the past.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"expires: Wed, 28 Nov 2007 00:20:11 GMT\n"
"cache-control: max-age=10000\n"
"\n",
false
},
// Cache-control: no-store overrides expires: in the future.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"expires: Wed, 29 Nov 2007 00:40:11 GMT\n"
"cache-control: no-store,private,no-cache=\"foo\"\n"
"\n",
true
},
// Pragma: no-cache overrides last-modified heuristic.
{ "HTTP/1.1 200 OK\n"
"date: Wed, 28 Nov 2007 00:40:11 GMT\n"
"last-modified: Wed, 27 Nov 2007 08:00:00 GMT\n"
"pragma: no-cache\n"
"\n",
true
},
// TODO(darin): Add many many more tests here.
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
RequiresValidationTest,
testing::ValuesIn(requires_validation_tests));
struct UpdateTestData {
const char* orig_headers;
const char* new_headers;
const char* expected_headers;
};
class UpdateTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<UpdateTestData> {
};
TEST_P(UpdateTest, Update) {
const UpdateTestData test = GetParam();
std::string orig_headers(test.orig_headers);
HeadersToRaw(&orig_headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(orig_headers));
std::string new_headers(test.new_headers);
HeadersToRaw(&new_headers);
scoped_refptr<net::HttpResponseHeaders> new_parsed(
new net::HttpResponseHeaders(new_headers));
parsed->Update(*new_parsed.get());
std::string resulting_headers;
parsed->GetNormalizedHeaders(&resulting_headers);
EXPECT_EQ(std::string(test.expected_headers), resulting_headers);
}
const UpdateTestData update_tests[] = {
{ "HTTP/1.1 200 OK\n",
"HTTP/1/1 304 Not Modified\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n",
"HTTP/1.1 200 OK\n"
"Cache-control: max-age=10000\n"
},
{ "HTTP/1.1 200 OK\n"
"Foo: 1\n"
"Cache-control: private\n",
"HTTP/1/1 304 Not Modified\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n",
"HTTP/1.1 200 OK\n"
"Cache-control: max-age=10000\n"
"Foo: 1\n"
},
{ "HTTP/1.1 200 OK\n"
"Foo: 1\n"
"Cache-control: private\n",
"HTTP/1/1 304 Not Modified\n"
"connection: keep-alive\n"
"Cache-CONTROL: max-age=10000\n",
"HTTP/1.1 200 OK\n"
"Cache-CONTROL: max-age=10000\n"
"Foo: 1\n"
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 450\n",
"HTTP/1/1 304 Not Modified\n"
"connection: keep-alive\n"
"Cache-control: max-age=10001 \n",
"HTTP/1.1 200 OK\n"
"Cache-control: max-age=10001\n"
"Content-Length: 450\n"
},
{ "HTTP/1.1 200 OK\n"
"X-Frame-Options: DENY\n",
"HTTP/1/1 304 Not Modified\n"
"X-Frame-Options: ALLOW\n",
"HTTP/1.1 200 OK\n"
"X-Frame-Options: DENY\n",
},
{ "HTTP/1.1 200 OK\n"
"X-WebKit-CSP: default-src 'none'\n",
"HTTP/1/1 304 Not Modified\n"
"X-WebKit-CSP: default-src *\n",
"HTTP/1.1 200 OK\n"
"X-WebKit-CSP: default-src 'none'\n",
},
{ "HTTP/1.1 200 OK\n"
"X-XSS-Protection: 1\n",
"HTTP/1/1 304 Not Modified\n"
"X-XSS-Protection: 0\n",
"HTTP/1.1 200 OK\n"
"X-XSS-Protection: 1\n",
},
{ "HTTP/1.1 200 OK\n",
"HTTP/1/1 304 Not Modified\n"
"X-Content-Type-Options: nosniff\n",
"HTTP/1.1 200 OK\n"
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
UpdateTest,
testing::ValuesIn(update_tests));
struct EnumerateHeaderTestData {
const char* headers;
const char* expected_lines;
};
class EnumerateHeaderLinesTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<EnumerateHeaderTestData> {
};
TEST_P(EnumerateHeaderLinesTest, EnumerateHeaderLines) {
const EnumerateHeaderTestData test = GetParam();
std::string headers(test.headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
std::string name, value, lines;
void* iter = NULL;
while (parsed->EnumerateHeaderLines(&iter, &name, &value)) {
lines.append(name);
lines.append(": ");
lines.append(value);
lines.append("\n");
}
EXPECT_EQ(std::string(test.expected_lines), lines);
}
const EnumerateHeaderTestData enumerate_header_tests[] = {
{ "HTTP/1.1 200 OK\n",
""
},
{ "HTTP/1.1 200 OK\n"
"Foo: 1\n",
"Foo: 1\n"
},
{ "HTTP/1.1 200 OK\n"
"Foo: 1\n"
"Bar: 2\n"
"Foo: 3\n",
"Foo: 1\nBar: 2\nFoo: 3\n"
},
{ "HTTP/1.1 200 OK\n"
"Foo: 1, 2, 3\n",
"Foo: 1, 2, 3\n"
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
EnumerateHeaderLinesTest,
testing::ValuesIn(enumerate_header_tests));
struct IsRedirectTestData {
const char* headers;
const char* location;
bool is_redirect;
};
class IsRedirectTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<IsRedirectTestData> {
};
TEST_P(IsRedirectTest, IsRedirect) {
const IsRedirectTestData test = GetParam();
std::string headers(test.headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
std::string location;
EXPECT_EQ(parsed->IsRedirect(&location), test.is_redirect);
EXPECT_EQ(location, test.location);
}
const IsRedirectTestData is_redirect_tests[] = {
{ "HTTP/1.1 200 OK\n",
"",
false
},
{ "HTTP/1.1 301 Moved\n"
"Location: http://foopy/\n",
"http://foopy/",
true
},
{ "HTTP/1.1 301 Moved\n"
"Location: \t \n",
"",
false
},
// We use the first location header as the target of the redirect.
{ "HTTP/1.1 301 Moved\n"
"Location: http://foo/\n"
"Location: http://bar/\n",
"http://foo/",
true
},
// We use the first _valid_ location header as the target of the redirect.
{ "HTTP/1.1 301 Moved\n"
"Location: \n"
"Location: http://bar/\n",
"http://bar/",
true
},
// Bug 1050541 (location header with an unescaped comma).
{ "HTTP/1.1 301 Moved\n"
"Location: http://foo/bar,baz.html\n",
"http://foo/bar,baz.html",
true
},
// Bug 1224617 (location header with non-ASCII bytes).
{ "HTTP/1.1 301 Moved\n"
"Location: http://foo/bar?key=\xE4\xF6\xFC\n",
"http://foo/bar?key=%E4%F6%FC",
true
},
// Shift_JIS, Big5, and GBK contain multibyte characters with the trailing
// byte falling in the ASCII range.
{ "HTTP/1.1 301 Moved\n"
"Location: http://foo/bar?key=\x81\x5E\xD8\xBF\n",
"http://foo/bar?key=%81^%D8%BF",
true
},
{ "HTTP/1.1 301 Moved\n"
"Location: http://foo/bar?key=\x82\x40\xBD\xC4\n",
"http://foo/bar?key=%82@%BD%C4",
true
},
{ "HTTP/1.1 301 Moved\n"
"Location: http://foo/bar?key=\x83\x5C\x82\x5D\xCB\xD7\n",
"http://foo/bar?key=%83\\%82]%CB%D7",
true
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
IsRedirectTest,
testing::ValuesIn(is_redirect_tests));
struct ContentLengthTestData {
const char* headers;
int64 expected_len;
};
class GetContentLengthTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<ContentLengthTestData> {
};
TEST_P(GetContentLengthTest, GetContentLength) {
const ContentLengthTestData test = GetParam();
std::string headers(test.headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
EXPECT_EQ(test.expected_len, parsed->GetContentLength());
}
const ContentLengthTestData content_length_tests[] = {
{ "HTTP/1.1 200 OK\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 10\n",
10
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: \n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: abc\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: -10\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: +10\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 23xb5\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 0xA\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 010\n",
10
},
// Content-Length too big, will overflow an int64.
{ "HTTP/1.1 200 OK\n"
"Content-Length: 40000000000000000000\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 10\n",
10
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 10 \n",
10
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: \t10\n",
10
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: \v10\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: \f10\n",
-1
},
{ "HTTP/1.1 200 OK\n"
"cOnTeNt-LENgth: 33\n",
33
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 34\r\n",
-1
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
GetContentLengthTest,
testing::ValuesIn(content_length_tests));
struct ContentRangeTestData {
const char* headers;
bool expected_return_value;
int64 expected_first_byte_position;
int64 expected_last_byte_position;
int64 expected_instance_size;
};
class ContentRangeTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<ContentRangeTestData> {
};
TEST_P(ContentRangeTest, GetContentRange) {
const ContentRangeTestData test = GetParam();
std::string headers(test.headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
int64 first_byte_position;
int64 last_byte_position;
int64 instance_size;
bool return_value = parsed->GetContentRange(&first_byte_position,
&last_byte_position,
&instance_size);
EXPECT_EQ(test.expected_return_value, return_value);
EXPECT_EQ(test.expected_first_byte_position, first_byte_position);
EXPECT_EQ(test.expected_last_byte_position, last_byte_position);
EXPECT_EQ(test.expected_instance_size, instance_size);
}
const ContentRangeTestData content_range_tests[] = {
{ "HTTP/1.1 206 Partial Content",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range:",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: megabytes 0-10/50",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: 0-10/50",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: Bytes 0-50/51",
true,
0,
50,
51
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-50/51",
true,
0,
50,
51
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes\t0-50/51",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-50/51",
true,
0,
50,
51
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0 - 50 \t / \t51",
true,
0,
50,
51
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0\t-\t50\t/\t51\t",
true,
0,
50,
51
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: \tbytes\t\t\t 0\t-\t50\t/\t51\t",
true,
0,
50,
51
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: \t bytes \t 0 - 50 / 5 1",
false,
0,
50,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: \t bytes \t 0 - 5 0 / 51",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 50-0/51",
false,
50,
0,
-1
},
{ "HTTP/1.1 416 Requested range not satisfiable\n"
"Content-Range: bytes * /*",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 416 Requested range not satisfiable\n"
"Content-Range: bytes * / * ",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-50/*",
false,
0,
50,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-50 / * ",
false,
0,
50,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-10000000000/10000000001",
true,
0,
10000000000ll,
10000000001ll
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-10000000000/10000000000",
false,
0,
10000000000ll,
10000000000ll
},
// 64 bit wraparound.
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0 - 9223372036854775807 / 100",
false,
0,
kint64max,
100
},
// 64 bit wraparound.
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0 - 100 / -9223372036854775808",
false,
0,
100,
kint64min
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes */50",
false,
-1,
-1,
50
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-50/10",
false,
0,
50,
10
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 40-50/45",
false,
40,
50,
45
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-50/-10",
false,
0,
50,
-10
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-0/1",
true,
0,
0,
1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-40000000000000000000/40000000000000000001",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 1-/100",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes -/100",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes -1/100",
false,
-1,
-1,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 0-1233/*",
false,
0,
1233,
-1
},
{ "HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes -123 - -1/100",
false,
-1,
-1,
-1
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
ContentRangeTest,
testing::ValuesIn(content_range_tests));
struct KeepAliveTestData {
const char* headers;
bool expected_keep_alive;
};
class IsKeepAliveTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<KeepAliveTestData> {
};
TEST_P(IsKeepAliveTest, IsKeepAlive) {
const KeepAliveTestData test = GetParam();
std::string headers(test.headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
EXPECT_EQ(test.expected_keep_alive, parsed->IsKeepAlive());
}
const KeepAliveTestData keepalive_tests[] = {
// The status line fabricated by HttpNetworkTransaction for a 0.9 response.
// Treated as 0.9.
{ "HTTP/0.9 200 OK",
false
},
// This could come from a broken server. Treated as 1.0 because it has a
// header.
{ "HTTP/0.9 200 OK\n"
"connection: keep-alive\n",
true
},
{ "HTTP/1.1 200 OK\n",
true
},
{ "HTTP/1.0 200 OK\n",
false
},
{ "HTTP/1.0 200 OK\n"
"connection: close\n",
false
},
{ "HTTP/1.0 200 OK\n"
"connection: keep-alive\n",
true
},
{ "HTTP/1.0 200 OK\n"
"connection: kEeP-AliVe\n",
true
},
{ "HTTP/1.0 200 OK\n"
"connection: keep-aliveX\n",
false
},
{ "HTTP/1.1 200 OK\n"
"connection: close\n",
false
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive\n",
true
},
{ "HTTP/1.0 200 OK\n"
"proxy-connection: close\n",
false
},
{ "HTTP/1.0 200 OK\n"
"proxy-connection: keep-alive\n",
true
},
{ "HTTP/1.1 200 OK\n"
"proxy-connection: close\n",
false
},
{ "HTTP/1.1 200 OK\n"
"proxy-connection: keep-alive\n",
true
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
IsKeepAliveTest,
testing::ValuesIn(keepalive_tests));
struct HasStrongValidatorsTestData {
const char* headers;
bool expected_result;
};
class HasStrongValidatorsTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<HasStrongValidatorsTestData> {
};
TEST_P(HasStrongValidatorsTest, HasStrongValidators) {
const HasStrongValidatorsTestData test = GetParam();
std::string headers(test.headers);
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
EXPECT_EQ(test.expected_result, parsed->HasStrongValidators());
}
const HasStrongValidatorsTestData strong_validators_tests[] = {
{ "HTTP/0.9 200 OK",
false
},
{ "HTTP/1.0 200 OK\n"
"Date: Wed, 28 Nov 2007 01:40:10 GMT\n"
"Last-Modified: Wed, 28 Nov 2007 00:40:10 GMT\n"
"ETag: \"foo\"\n",
false
},
{ "HTTP/1.1 200 OK\n"
"Date: Wed, 28 Nov 2007 01:40:10 GMT\n"
"Last-Modified: Wed, 28 Nov 2007 00:40:10 GMT\n"
"ETag: \"foo\"\n",
true
},
{ "HTTP/1.1 200 OK\n"
"Date: Wed, 28 Nov 2007 00:41:10 GMT\n"
"Last-Modified: Wed, 28 Nov 2007 00:40:10 GMT\n",
true
},
{ "HTTP/1.1 200 OK\n"
"Date: Wed, 28 Nov 2007 00:41:09 GMT\n"
"Last-Modified: Wed, 28 Nov 2007 00:40:10 GMT\n",
false
},
{ "HTTP/1.1 200 OK\n"
"ETag: \"foo\"\n",
true
},
// This is not really a weak etag:
{ "HTTP/1.1 200 OK\n"
"etag: \"w/foo\"\n",
true
},
// This is a weak etag:
{ "HTTP/1.1 200 OK\n"
"etag: w/\"foo\"\n",
false
},
{ "HTTP/1.1 200 OK\n"
"etag: W / \"foo\"\n",
false
}
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
HasStrongValidatorsTest,
testing::ValuesIn(strong_validators_tests));
TEST(HttpResponseHeadersTest, GetStatusText) {
std::string headers("HTTP/1.1 404 Not Found");
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
EXPECT_EQ(std::string("Not Found"), parsed->GetStatusText());
}
TEST(HttpResponseHeadersTest, GetStatusTextMissing) {
std::string headers("HTTP/1.1 404");
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
// Since the status line gets normalized, we have OK.
EXPECT_EQ(std::string("OK"), parsed->GetStatusText());
}
TEST(HttpResponseHeadersTest, GetStatusTextMultiSpace) {
std::string headers("HTTP/1.0 404 Not Found");
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
EXPECT_EQ(std::string("Not Found"), parsed->GetStatusText());
}
TEST(HttpResponseHeadersTest, GetStatusBadStatusLine) {
std::string headers("Foo bar.");
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
// The bad status line would have gotten rewritten as
// HTTP/1.0 200 OK.
EXPECT_EQ(std::string("OK"), parsed->GetStatusText());
}
struct AddHeaderTestData {
const char* orig_headers;
const char* new_header;
const char* expected_headers;
};
class AddHeaderTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<AddHeaderTestData> {
};
TEST_P(AddHeaderTest, AddHeader) {
const AddHeaderTestData test = GetParam();
std::string orig_headers(test.orig_headers);
HeadersToRaw(&orig_headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(orig_headers));
std::string new_header(test.new_header);
parsed->AddHeader(new_header);
std::string resulting_headers;
parsed->GetNormalizedHeaders(&resulting_headers);
EXPECT_EQ(std::string(test.expected_headers), resulting_headers);
}
const AddHeaderTestData add_header_tests[] = {
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n",
"Content-Length: 450",
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
"Content-Length: 450\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000 \n",
"Content-Length: 450 ",
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
"Content-Length: 450\n"
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
AddHeaderTest,
testing::ValuesIn(add_header_tests));
struct RemoveHeaderTestData {
const char* orig_headers;
const char* to_remove;
const char* expected_headers;
};
class RemoveHeaderTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<RemoveHeaderTestData> {
};
TEST_P(RemoveHeaderTest, RemoveHeader) {
const RemoveHeaderTestData test = GetParam();
std::string orig_headers(test.orig_headers);
HeadersToRaw(&orig_headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(orig_headers));
std::string name(test.to_remove);
parsed->RemoveHeader(name);
std::string resulting_headers;
parsed->GetNormalizedHeaders(&resulting_headers);
EXPECT_EQ(std::string(test.expected_headers), resulting_headers);
}
const RemoveHeaderTestData remove_header_tests[] = {
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
"Content-Length: 450\n",
"Content-Length",
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive \n"
"Content-Length : 450 \n"
"Cache-control: max-age=10000\n",
"Content-Length",
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
RemoveHeaderTest,
testing::ValuesIn(remove_header_tests));
struct RemoveIndividualHeaderTestData {
const char* orig_headers;
const char* to_remove_name;
const char* to_remove_value;
const char* expected_headers;
};
class RemoveIndividualHeaderTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<RemoveIndividualHeaderTestData> {
};
TEST_P(RemoveIndividualHeaderTest, RemoveIndividualHeader) {
const RemoveIndividualHeaderTestData test = GetParam();
std::string orig_headers(test.orig_headers);
HeadersToRaw(&orig_headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(orig_headers));
std::string name(test.to_remove_name);
std::string value(test.to_remove_value);
parsed->RemoveHeaderLine(name, value);
std::string resulting_headers;
parsed->GetNormalizedHeaders(&resulting_headers);
EXPECT_EQ(std::string(test.expected_headers), resulting_headers);
}
const RemoveIndividualHeaderTestData remove_individual_header_tests[] = {
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
"Content-Length: 450\n",
"Content-Length",
"450",
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive \n"
"Content-Length : 450 \n"
"Cache-control: max-age=10000\n",
"Content-Length",
"450",
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive \n"
"Content-Length: 450\n"
"Cache-control: max-age=10000\n",
"Content-Length", // Matching name.
"999", // Mismatching value.
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Content-Length: 450\n"
"Cache-control: max-age=10000\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive \n"
"Foo: bar, baz\n"
"Foo: bar\n"
"Cache-control: max-age=10000\n",
"Foo",
"bar, baz", // Space in value.
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Foo: bar\n"
"Cache-control: max-age=10000\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive \n"
"Foo: bar, baz\n"
"Cache-control: max-age=10000\n",
"Foo",
"baz", // Only partial match -> ignored.
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Foo: bar, baz\n"
"Cache-control: max-age=10000\n"
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
RemoveIndividualHeaderTest,
testing::ValuesIn(remove_individual_header_tests));
struct ReplaceStatusTestData {
const char* orig_headers;
const char* new_status;
const char* expected_headers;
};
class ReplaceStatusTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<ReplaceStatusTestData> {
};
TEST_P(ReplaceStatusTest, ReplaceStatus) {
const ReplaceStatusTestData test = GetParam();
std::string orig_headers(test.orig_headers);
HeadersToRaw(&orig_headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(orig_headers));
std::string name(test.new_status);
parsed->ReplaceStatusLine(name);
std::string resulting_headers;
parsed->GetNormalizedHeaders(&resulting_headers);
EXPECT_EQ(std::string(test.expected_headers), resulting_headers);
}
const ReplaceStatusTestData replace_status_tests[] = {
{ "HTTP/1.1 206 Partial Content\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
"Content-Length: 450\n",
"HTTP/1.1 200 OK",
"HTTP/1.1 200 OK\n"
"connection: keep-alive\n"
"Cache-control: max-age=10000\n"
"Content-Length: 450\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive\n",
"HTTP/1.1 304 Not Modified",
"HTTP/1.1 304 Not Modified\n"
"connection: keep-alive\n"
},
{ "HTTP/1.1 200 OK\n"
"connection: keep-alive \n"
"Content-Length : 450 \n"
"Cache-control: max-age=10000\n",
"HTTP/1//1 304 Not Modified",
"HTTP/1.0 304 Not Modified\n"
"connection: keep-alive\n"
"Content-Length: 450\n"
"Cache-control: max-age=10000\n"
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
ReplaceStatusTest,
testing::ValuesIn(replace_status_tests));
struct UpdateWithNewRangeTestData {
const char* orig_headers;
const char* expected_headers;
const char* expected_headers_with_replaced_status;
};
class UpdateWithNewRangeTest
: public HttpResponseHeadersTest,
public ::testing::WithParamInterface<UpdateWithNewRangeTestData> {
};
TEST_P(UpdateWithNewRangeTest, UpdateWithNewRange) {
const UpdateWithNewRangeTestData test = GetParam();
const net::HttpByteRange range = net::HttpByteRange::Bounded(3, 5);
std::string orig_headers(test.orig_headers);
std::replace(orig_headers.begin(), orig_headers.end(), '\n', '\0');
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(orig_headers + '\0'));
int64 content_size = parsed->GetContentLength();
std::string resulting_headers;
// Update headers without replacing status line.
parsed->UpdateWithNewRange(range, content_size, false);
parsed->GetNormalizedHeaders(&resulting_headers);
EXPECT_EQ(std::string(test.expected_headers), resulting_headers);
// Replace status line too.
parsed->UpdateWithNewRange(range, content_size, true);
parsed->GetNormalizedHeaders(&resulting_headers);
EXPECT_EQ(std::string(test.expected_headers_with_replaced_status),
resulting_headers);
}
const UpdateWithNewRangeTestData update_range_tests[] = {
{ "HTTP/1.1 200 OK\n"
"Content-Length: 450\n",
"HTTP/1.1 200 OK\n"
"Content-Range: bytes 3-5/450\n"
"Content-Length: 3\n",
"HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 3-5/450\n"
"Content-Length: 3\n",
},
{ "HTTP/1.1 200 OK\n"
"Content-Length: 5\n",
"HTTP/1.1 200 OK\n"
"Content-Range: bytes 3-5/5\n"
"Content-Length: 3\n",
"HTTP/1.1 206 Partial Content\n"
"Content-Range: bytes 3-5/5\n"
"Content-Length: 3\n",
},
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeaders,
UpdateWithNewRangeTest,
testing::ValuesIn(update_range_tests));
TEST(HttpResponseHeadersTest, ToNetLogParamAndBackAgain) {
std::string headers("HTTP/1.1 404\n"
"Content-Length: 450\n"
"Connection: keep-alive\n");
HeadersToRaw(&headers);
scoped_refptr<net::HttpResponseHeaders> parsed(
new net::HttpResponseHeaders(headers));
scoped_ptr<base::Value> event_param(
parsed->NetLogCallback(net::NetLog::LOG_ALL_BUT_BYTES));
scoped_refptr<net::HttpResponseHeaders> recreated;
ASSERT_TRUE(net::HttpResponseHeaders::FromNetLogParam(event_param.get(),
&recreated));
ASSERT_TRUE(recreated.get());
EXPECT_EQ(parsed->GetHttpVersion(), recreated->GetHttpVersion());
EXPECT_EQ(parsed->response_code(), recreated->response_code());
EXPECT_EQ(parsed->GetContentLength(), recreated->GetContentLength());
EXPECT_EQ(parsed->IsKeepAlive(), recreated->IsKeepAlive());
std::string normalized_parsed;
parsed->GetNormalizedHeaders(&normalized_parsed);
std::string normalized_recreated;
parsed->GetNormalizedHeaders(&normalized_recreated);
EXPECT_EQ(normalized_parsed, normalized_recreated);
}
TEST_F(HttpResponseHeadersCacheControlTest, AbsentMaxAgeReturnsFalse) {
InitializeHeadersWithCacheControl("nocache");
EXPECT_FALSE(headers()->GetMaxAgeValue(TimeDeltaPointer()));
}
TEST_F(HttpResponseHeadersCacheControlTest, MaxAgeWithNoParameterRejected) {
InitializeHeadersWithCacheControl("max-age=,private");
EXPECT_FALSE(headers()->GetMaxAgeValue(TimeDeltaPointer()));
}
TEST_F(HttpResponseHeadersCacheControlTest, MaxAgeWithSpaceParameterRejected) {
InitializeHeadersWithCacheControl("max-age= ,private");
EXPECT_FALSE(headers()->GetMaxAgeValue(TimeDeltaPointer()));
}
TEST_F(HttpResponseHeadersCacheControlTest,
MaxAgeWithSpaceBeforeEqualsIsRejected) {
InitializeHeadersWithCacheControl("max-age = 7");
EXPECT_FALSE(headers()->GetMaxAgeValue(TimeDeltaPointer()));
}
TEST_F(HttpResponseHeadersCacheControlTest, MaxAgeFirstMatchUsed) {
InitializeHeadersWithCacheControl("max-age=10, max-age=20");
EXPECT_EQ(TimeDelta::FromSeconds(10), GetMaxAgeValue());
}
TEST_F(HttpResponseHeadersCacheControlTest, MaxAgeBogusFirstMatchUsed) {
// "max-age10" isn't parsed as "max-age"; "max-age=now" is parsed as
// "max-age=0" and so "max-age=20" is not used.
InitializeHeadersWithCacheControl("max-age10, max-age=now, max-age=20");
EXPECT_EQ(TimeDelta::FromSeconds(0), GetMaxAgeValue());
}
TEST_F(HttpResponseHeadersCacheControlTest, MaxAgeCaseInsensitive) {
InitializeHeadersWithCacheControl("Max-aGe=15");
EXPECT_EQ(TimeDelta::FromSeconds(15), GetMaxAgeValue());
}
struct MaxAgeTestData {
const char* max_age_string;
const int64 expected_seconds;
};
class MaxAgeEdgeCasesTest
: public HttpResponseHeadersCacheControlTest,
public ::testing::WithParamInterface<MaxAgeTestData> {
};
TEST_P(MaxAgeEdgeCasesTest, MaxAgeEdgeCases) {
const MaxAgeTestData test = GetParam();
std::string max_age = "max-age=";
InitializeHeadersWithCacheControl(
(max_age + test.max_age_string).c_str());
EXPECT_EQ(test.expected_seconds, GetMaxAgeValue().InSeconds())
<< " for max-age=" << test.max_age_string;
}
const MaxAgeTestData max_age_tests[] = {
{" 1 ", 1}, // Spaces are ignored.
{"-1", -1}, // Negative numbers are passed through.
{"--1", 0}, // Leading junk gives 0.
{"2s", 2}, // Trailing junk is ignored.
{"3 days", 3},
{"'4'", 0}, // Single quotes don't work.
{"\"5\"", 0}, // Double quotes don't work.
{"0x6", 0}, // Hex not parsed as hex.
{"7F", 7}, // Hex without 0x still not parsed as hex.
{"010", 10}, // Octal not parsed as octal.
{"9223372036854", 9223372036854},
// {"9223372036855", -9223372036854}, // Undefined behaviour.
// {"9223372036854775806", -2}, // Undefined behaviour.
{"9223372036854775807", 9223372036854775807},
{"20000000000000000000",
std::numeric_limits<int64>::max()}, // Overflow int64.
};
INSTANTIATE_TEST_CASE_P(HttpResponseHeadersCacheControl,
MaxAgeEdgeCasesTest,
testing::ValuesIn(max_age_tests));
TEST_F(HttpResponseHeadersCacheControlTest,
AbsentStaleWhileRevalidateReturnsFalse) {
InitializeHeadersWithCacheControl("max-age=3600");
EXPECT_FALSE(headers()->GetStaleWhileRevalidateValue(TimeDeltaPointer()));
}
TEST_F(HttpResponseHeadersCacheControlTest,
StaleWhileRevalidateWithoutValueRejected) {
InitializeHeadersWithCacheControl("max-age=3600,stale-while-revalidate=");
EXPECT_FALSE(headers()->GetStaleWhileRevalidateValue(TimeDeltaPointer()));
}
TEST_F(HttpResponseHeadersCacheControlTest,
StaleWhileRevalidateWithInvalidValueTreatedAsZero) {
InitializeHeadersWithCacheControl("max-age=3600,stale-while-revalidate=true");
EXPECT_EQ(TimeDelta(), GetStaleWhileRevalidateValue());
}
TEST_F(HttpResponseHeadersCacheControlTest, StaleWhileRevalidateValueReturned) {
InitializeHeadersWithCacheControl("max-age=3600,stale-while-revalidate=7200");
EXPECT_EQ(TimeDelta::FromSeconds(7200), GetStaleWhileRevalidateValue());
}
TEST_F(HttpResponseHeadersCacheControlTest,
FirstStaleWhileRevalidateValueUsed) {
InitializeHeadersWithCacheControl(
"stale-while-revalidate=1,stale-while-revalidate=7200");
EXPECT_EQ(TimeDelta::FromSeconds(1), GetStaleWhileRevalidateValue());
}
} // end namespace