host_mapping_rules_unittest.cc 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. // Copyright (c) 2010 The Chromium Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style license that can be
  3. // found in the LICENSE file.
  4. #include "net/base/host_mapping_rules.h"
  5. #include <string.h>
  6. #include "net/base/host_port_pair.h"
  7. #include "testing/gtest/include/gtest/gtest.h"
  8. #include "url/gurl.h"
  9. #include "url/third_party/mozilla/url_parse.h"
  10. #include "url/url_canon.h"
  11. #include "url/url_util.h"
  12. namespace net {
  13. namespace {
  14. TEST(HostMappingRulesTest, SetRulesFromString) {
  15. HostMappingRules rules;
  16. rules.SetRulesFromString(
  17. "map *.com baz , map *.net bar:60, EXCLUDE *.foo.com");
  18. HostPortPair host_port("test", 1234);
  19. EXPECT_FALSE(rules.RewriteHost(&host_port));
  20. EXPECT_EQ("test", host_port.host());
  21. EXPECT_EQ(1234u, host_port.port());
  22. host_port = HostPortPair("chrome.net", 80);
  23. EXPECT_TRUE(rules.RewriteHost(&host_port));
  24. EXPECT_EQ("bar", host_port.host());
  25. EXPECT_EQ(60u, host_port.port());
  26. host_port = HostPortPair("crack.com", 80);
  27. EXPECT_TRUE(rules.RewriteHost(&host_port));
  28. EXPECT_EQ("baz", host_port.host());
  29. EXPECT_EQ(80u, host_port.port());
  30. host_port = HostPortPair("wtf.foo.com", 666);
  31. EXPECT_FALSE(rules.RewriteHost(&host_port));
  32. EXPECT_EQ("wtf.foo.com", host_port.host());
  33. EXPECT_EQ(666u, host_port.port());
  34. }
  35. TEST(HostMappingRulesTest, PortSpecificMatching) {
  36. HostMappingRules rules;
  37. rules.SetRulesFromString(
  38. "map *.com:80 baz:111 , map *.com:443 blat:333, EXCLUDE *.foo.com");
  39. // No match
  40. HostPortPair host_port("test.com", 1234);
  41. EXPECT_FALSE(rules.RewriteHost(&host_port));
  42. EXPECT_EQ("test.com", host_port.host());
  43. EXPECT_EQ(1234u, host_port.port());
  44. // Match port 80
  45. host_port = HostPortPair("crack.com", 80);
  46. EXPECT_TRUE(rules.RewriteHost(&host_port));
  47. EXPECT_EQ("baz", host_port.host());
  48. EXPECT_EQ(111u, host_port.port());
  49. // Match port 443
  50. host_port = HostPortPair("wtf.com", 443);
  51. EXPECT_TRUE(rules.RewriteHost(&host_port));
  52. EXPECT_EQ("blat", host_port.host());
  53. EXPECT_EQ(333u, host_port.port());
  54. // Match port 443, but excluded.
  55. host_port = HostPortPair("wtf.foo.com", 443);
  56. EXPECT_FALSE(rules.RewriteHost(&host_port));
  57. EXPECT_EQ("wtf.foo.com", host_port.host());
  58. EXPECT_EQ(443u, host_port.port());
  59. }
  60. // Parsing bad rules should silently discard the rule (and never crash).
  61. TEST(HostMappingRulesTest, ParseInvalidRules) {
  62. HostMappingRules rules;
  63. EXPECT_FALSE(rules.AddRuleFromString("xyz"));
  64. EXPECT_FALSE(rules.AddRuleFromString(std::string()));
  65. EXPECT_FALSE(rules.AddRuleFromString(" "));
  66. EXPECT_FALSE(rules.AddRuleFromString("EXCLUDE"));
  67. EXPECT_FALSE(rules.AddRuleFromString("EXCLUDE foo bar"));
  68. EXPECT_FALSE(rules.AddRuleFromString("INCLUDE"));
  69. EXPECT_FALSE(rules.AddRuleFromString("INCLUDE x"));
  70. EXPECT_FALSE(rules.AddRuleFromString("INCLUDE x :10"));
  71. }
  72. TEST(HostMappingRulesTest, RewritesUrl) {
  73. HostMappingRules rules;
  74. rules.AddRuleFromString("MAP initial.test replacement.test:1000");
  75. GURL url("http://initial.test:111");
  76. EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
  77. EXPECT_EQ(url, GURL("http://replacement.test:1000"));
  78. }
  79. TEST(HostMappingRulesTest, RewritesUrlToIpv6Literal) {
  80. HostMappingRules rules;
  81. rules.AddRuleFromString("MAP initial.test [2345:6789::0abc]:1112");
  82. GURL url("http://initial.test:111");
  83. EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
  84. EXPECT_EQ(url, GURL("http://[2345:6789::0abc]:1112"));
  85. }
  86. TEST(HostMappingRulesTest, RewritesUrlPreservingScheme) {
  87. HostMappingRules rules;
  88. rules.AddRuleFromString("MAP initial.test replacement.test:1000");
  89. GURL url("wss://initial.test:222");
  90. EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
  91. EXPECT_EQ(url, GURL("wss://replacement.test:1000"));
  92. }
  93. TEST(HostMappingRulesTest, RewritesFileUrl) {
  94. HostMappingRules rules;
  95. rules.AddRuleFromString("MAP initial.test replacement.test:1000");
  96. // Expect replacement port to be ignored because file URLs do not use port.
  97. GURL url("file://initial.test/file.txt");
  98. ASSERT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
  99. EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
  100. EXPECT_EQ(url, GURL("file://replacement.test/file.txt"));
  101. EXPECT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
  102. }
  103. TEST(HostMappingRulesTest, RewritesAnyStandardUrlWithPort) {
  104. const char kScheme[] = "foo";
  105. url::ScopedSchemeRegistryForTests scoped_registry;
  106. AddStandardScheme(kScheme, url::SCHEME_WITH_HOST_AND_PORT);
  107. ASSERT_TRUE(url::IsStandard(kScheme, url::Component(0, strlen(kScheme))));
  108. HostMappingRules rules;
  109. rules.AddRuleFromString("MAP initial.test replacement.test:1000");
  110. GURL url("foo://initial.test:100");
  111. EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
  112. EXPECT_EQ(url, GURL("foo://replacement.test:1000"));
  113. }
  114. TEST(HostMappingRulesTest, RewritesAnyStandardUrlWithoutPort) {
  115. const char kScheme[] = "foo";
  116. url::ScopedSchemeRegistryForTests scoped_registry;
  117. AddStandardScheme(kScheme, url::SCHEME_WITH_HOST);
  118. ASSERT_TRUE(url::IsStandard(kScheme, url::Component(0, strlen(kScheme))));
  119. HostMappingRules rules;
  120. rules.AddRuleFromString("MAP initial.test replacement.test:1000");
  121. // Expect replacement port to be ignored.
  122. GURL url("foo://initial.test");
  123. ASSERT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
  124. EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
  125. EXPECT_EQ(url, GURL("foo://replacement.test"));
  126. EXPECT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
  127. }
  128. TEST(HostMappingRulesTest, IgnoresUnmappedUrls) {
  129. HostMappingRules rules;
  130. rules.AddRuleFromString("MAP initial.test replacement.test:1000");
  131. GURL url("http://different.test:111");
  132. EXPECT_EQ(rules.RewriteUrl(url),
  133. HostMappingRules::RewriteResult::kNoMatchingRule);
  134. EXPECT_EQ(url, GURL("http://different.test:111"));
  135. }
  136. TEST(HostMappingRulesTest, IgnoresInvalidReplacementUrls) {
  137. HostMappingRules rules;
  138. rules.AddRuleFromString("MAP initial.test invalid/url");
  139. GURL url("http://initial.test");
  140. EXPECT_EQ(rules.RewriteUrl(url),
  141. HostMappingRules::RewriteResult::kInvalidRewrite);
  142. EXPECT_EQ(url, GURL("http://initial.test"));
  143. }
  144. // Remapping to "~NOTFOUND" is documented as a special case for
  145. // MappedHostResolver usage. Ensure that it is handled as invalid as expected.
  146. TEST(HostMappingRulesTest, NotFoundIgnoredAsInvalidUrl) {
  147. HostMappingRules rules;
  148. rules.AddRuleFromString("MAP initial.test ~NOTFOUND");
  149. GURL url("http://initial.test");
  150. EXPECT_EQ(rules.RewriteUrl(url),
  151. HostMappingRules::RewriteResult::kInvalidRewrite);
  152. EXPECT_EQ(url, GURL("http://initial.test"));
  153. }
  154. } // namespace
  155. } // namespace net