mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-23 21:01:08 +00:00
d87184a011
Differential Revision: https://phabricator.services.mozilla.com/D202975
281 lines
7.0 KiB
JavaScript
281 lines
7.0 KiB
JavaScript
// This file tests authentication prompt depending on pref
|
|
// network.auth.subresource-http-auth-allow:
|
|
// 0 - don't allow sub-resources to open HTTP authentication credentials
|
|
// dialogs
|
|
// 1 - allow sub-resources to open HTTP authentication credentials dialogs,
|
|
// but don't allow it for cross-origin sub-resources
|
|
// 2 - allow the cross-origin authentication as well.
|
|
|
|
"use strict";
|
|
|
|
const { HttpServer } = ChromeUtils.importESModule(
|
|
"resource://testing-common/httpd.sys.mjs"
|
|
);
|
|
|
|
var prefs = Services.prefs;
|
|
|
|
// Since this test creates a TYPE_DOCUMENT channel via javascript, it will
|
|
// end up using the wrong LoadInfo constructor. Setting this pref will disable
|
|
// the ContentPolicyType assertion in the constructor.
|
|
prefs.setBoolPref("network.loadinfo.skip_type_assertion", true);
|
|
|
|
function authHandler(metadata, response) {
|
|
// btoa("guest:guest"), but that function is not available here
|
|
var expectedHeader = "Basic Z3Vlc3Q6Z3Vlc3Q=";
|
|
|
|
var body;
|
|
if (
|
|
metadata.hasHeader("Authorization") &&
|
|
metadata.getHeader("Authorization") == expectedHeader
|
|
) {
|
|
response.setStatusLine(metadata.httpVersion, 200, "OK, authorized");
|
|
response.setHeader("WWW-Authenticate", 'Basic realm="secret"', false);
|
|
response.setHeader("Content-Type", "text/javascript", false);
|
|
|
|
body = "success";
|
|
} else {
|
|
// didn't know guest:guest, failure
|
|
response.setStatusLine(metadata.httpVersion, 401, "Unauthorized");
|
|
response.setHeader("WWW-Authenticate", 'Basic realm="secret"', false);
|
|
response.setHeader("Content-Type", "text/javascript", false);
|
|
|
|
body = "failed";
|
|
}
|
|
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
var httpserv = new HttpServer();
|
|
httpserv.registerPathHandler("/auth", authHandler);
|
|
httpserv.start(-1);
|
|
|
|
ChromeUtils.defineLazyGetter(this, "URL", function () {
|
|
return "http://localhost:" + httpserv.identity.primaryPort;
|
|
});
|
|
|
|
function AuthPrompt(promptExpected) {
|
|
this.promptExpected = promptExpected;
|
|
}
|
|
|
|
AuthPrompt.prototype = {
|
|
user: "guest",
|
|
pass: "guest",
|
|
|
|
QueryInterface: ChromeUtils.generateQI(["nsIAuthPrompt"]),
|
|
|
|
prompt() {
|
|
do_throw("unexpected prompt call");
|
|
},
|
|
|
|
promptUsernameAndPassword(title, text, realm, savePW, user, pw) {
|
|
Assert.ok(this.promptExpected, "Not expected the authentication prompt.");
|
|
|
|
user.value = this.user;
|
|
pw.value = this.pass;
|
|
return true;
|
|
},
|
|
|
|
promptPassword() {
|
|
do_throw("unexpected promptPassword call");
|
|
},
|
|
};
|
|
|
|
function Requestor(promptExpected) {
|
|
this.promptExpected = promptExpected;
|
|
}
|
|
|
|
Requestor.prototype = {
|
|
QueryInterface: ChromeUtils.generateQI(["nsIInterfaceRequestor"]),
|
|
|
|
getInterface(iid) {
|
|
if (iid.equals(Ci.nsIAuthPrompt)) {
|
|
this.prompter = new AuthPrompt(this.promptExpected);
|
|
return this.prompter;
|
|
}
|
|
|
|
throw Components.Exception("", Cr.NS_ERROR_NO_INTERFACE);
|
|
},
|
|
|
|
prompter: null,
|
|
};
|
|
|
|
function make_uri(url) {
|
|
return Services.io.newURI(url);
|
|
}
|
|
|
|
function makeChan(loadingUrl, url, contentPolicy) {
|
|
var uri = make_uri(loadingUrl);
|
|
var principal = Services.scriptSecurityManager.createContentPrincipal(
|
|
uri,
|
|
{}
|
|
);
|
|
|
|
return NetUtil.newChannel({
|
|
uri: url,
|
|
loadingPrincipal: principal,
|
|
securityFlags: Ci.nsILoadInfo.SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT,
|
|
contentPolicyType: contentPolicy,
|
|
}).QueryInterface(Ci.nsIHttpChannel);
|
|
}
|
|
|
|
function Test(
|
|
subresource_http_auth_allow_pref,
|
|
loadingUri,
|
|
uri,
|
|
contentPolicy,
|
|
expectedCode
|
|
) {
|
|
this._subresource_http_auth_allow_pref = subresource_http_auth_allow_pref;
|
|
this._loadingUri = loadingUri;
|
|
this._uri = uri;
|
|
this._contentPolicy = contentPolicy;
|
|
this._expectedCode = expectedCode;
|
|
}
|
|
|
|
Test.prototype = {
|
|
_subresource_http_auth_allow_pref: 1,
|
|
_loadingUri: null,
|
|
_uri: null,
|
|
_contentPolicy: Ci.nsIContentPolicy.TYPE_OTHER,
|
|
_expectedCode: 200,
|
|
|
|
onStartRequest(request) {
|
|
try {
|
|
if (!Components.isSuccessCode(request.status)) {
|
|
do_throw("Channel should have a success code!");
|
|
}
|
|
|
|
if (!(request instanceof Ci.nsIHttpChannel)) {
|
|
do_throw("Expecting an HTTP channel");
|
|
}
|
|
|
|
Assert.equal(request.responseStatus, this._expectedCode);
|
|
// The request should be succeeded iff we expect 200
|
|
Assert.equal(request.requestSucceeded, this._expectedCode == 200);
|
|
} catch (e) {
|
|
do_throw("Unexpected exception: " + e);
|
|
}
|
|
|
|
throw Components.Exception("", Cr.NS_ERROR_ABORT);
|
|
},
|
|
|
|
onDataAvailable() {
|
|
do_throw("Should not get any data!");
|
|
},
|
|
|
|
onStopRequest(request, status) {
|
|
Assert.equal(status, Cr.NS_ERROR_ABORT);
|
|
|
|
// Clear the auth cache.
|
|
Cc["@mozilla.org/network/http-auth-manager;1"]
|
|
.getService(Ci.nsIHttpAuthManager)
|
|
.clearAll();
|
|
|
|
do_timeout(0, run_next_test);
|
|
},
|
|
|
|
run() {
|
|
dump(
|
|
"Run test: " +
|
|
this._subresource_http_auth_allow_pref +
|
|
this._loadingUri +
|
|
this._uri +
|
|
this._contentPolicy +
|
|
this._expectedCode +
|
|
" \n"
|
|
);
|
|
|
|
prefs.setIntPref(
|
|
"network.auth.subresource-http-auth-allow",
|
|
this._subresource_http_auth_allow_pref
|
|
);
|
|
let chan = makeChan(this._loadingUri, this._uri, this._contentPolicy);
|
|
chan.notificationCallbacks = new Requestor(this._expectedCode == 200);
|
|
chan.asyncOpen(this);
|
|
},
|
|
};
|
|
|
|
var tests = [
|
|
// For the next 3 tests the preference is set to 2 - allow the cross-origin
|
|
// authentication as well.
|
|
|
|
// A cross-origin request.
|
|
new Test(
|
|
2,
|
|
"http://example.com",
|
|
URL + "/auth",
|
|
Ci.nsIContentPolicy.TYPE_OTHER,
|
|
200
|
|
),
|
|
// A non cross-origin sub-resource request.
|
|
new Test(2, URL + "/", URL + "/auth", Ci.nsIContentPolicy.TYPE_OTHER, 200),
|
|
// A top level document.
|
|
new Test(
|
|
2,
|
|
URL + "/auth",
|
|
URL + "/auth",
|
|
Ci.nsIContentPolicy.TYPE_DOCUMENT,
|
|
200
|
|
),
|
|
|
|
// For the next 3 tests the preference is set to 1 - allow sub-resources to
|
|
// open HTTP authentication credentials dialogs, but don't allow it for
|
|
// cross-origin sub-resources
|
|
|
|
// A cross-origin request.
|
|
new Test(
|
|
1,
|
|
"http://example.com",
|
|
URL + "/auth",
|
|
Ci.nsIContentPolicy.TYPE_OTHER,
|
|
401
|
|
),
|
|
// A non cross-origin sub-resource request.
|
|
new Test(1, URL + "/", URL + "/auth", Ci.nsIContentPolicy.TYPE_OTHER, 200),
|
|
// A top level document.
|
|
new Test(
|
|
1,
|
|
URL + "/auth",
|
|
URL + "/auth",
|
|
Ci.nsIContentPolicy.TYPE_DOCUMENT,
|
|
200
|
|
),
|
|
|
|
// For the next 3 tests the preference is set to 0 - don't allow sub-resources
|
|
// to open HTTP authentication credentials dialogs.
|
|
|
|
// A cross-origin request.
|
|
new Test(
|
|
0,
|
|
"http://example.com",
|
|
URL + "/auth",
|
|
Ci.nsIContentPolicy.TYPE_OTHER,
|
|
401
|
|
),
|
|
// A sub-resource request.
|
|
new Test(0, URL + "/", URL + "/auth", Ci.nsIContentPolicy.TYPE_OTHER, 401),
|
|
// A top level request.
|
|
new Test(
|
|
0,
|
|
URL + "/auth",
|
|
URL + "/auth",
|
|
Ci.nsIContentPolicy.TYPE_DOCUMENT,
|
|
200
|
|
),
|
|
];
|
|
|
|
function run_next_test() {
|
|
var nextTest = tests.shift();
|
|
if (!nextTest) {
|
|
httpserv.stop(do_test_finished);
|
|
return;
|
|
}
|
|
|
|
nextTest.run();
|
|
}
|
|
|
|
function run_test() {
|
|
do_test_pending();
|
|
run_next_test();
|
|
}
|