mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-24 02:35:41 +00:00
3e783d5156
These changes fix #6919. Source-Repo: https://github.com/servo/servo Source-Revision: f3fd8238ce1f7b2eb74d4fccbe76cfac8aa2335a --HG-- rename : servo/components/net_traits/hosts.rs => servo/components/net/hosts.rs extra : subtree_source : https%3A//hg.mozilla.org/projects/converted-servo-linear extra : subtree_revision : e60490550b246691c170ea0b0c856db33b7dbf61
295 lines
9.4 KiB
Rust
295 lines
9.4 KiB
Rust
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
use net::hsts::{HstsEntry, HstsList};
|
|
use net_traits::IncludeSubdomains;
|
|
use std::collections::HashMap;
|
|
use time;
|
|
|
|
#[test]
|
|
fn test_hsts_entry_is_not_expired_when_it_has_no_timestamp() {
|
|
let entry = HstsEntry {
|
|
host: "mozilla.org".to_owned(),
|
|
include_subdomains: false,
|
|
max_age: Some(20),
|
|
timestamp: None
|
|
};
|
|
|
|
assert!(!entry.is_expired());
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_entry_is_not_expired_when_it_has_no_max_age() {
|
|
let entry = HstsEntry {
|
|
host: "mozilla.org".to_owned(),
|
|
include_subdomains: false,
|
|
max_age: None,
|
|
timestamp: Some(time::get_time().sec as u64)
|
|
};
|
|
|
|
assert!(!entry.is_expired());
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_entry_is_expired_when_it_has_reached_its_max_age() {
|
|
let entry = HstsEntry {
|
|
host: "mozilla.org".to_owned(),
|
|
include_subdomains: false,
|
|
max_age: Some(10),
|
|
timestamp: Some(time::get_time().sec as u64 - 20u64)
|
|
};
|
|
|
|
assert!(entry.is_expired());
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_entry_cant_be_created_with_ipv6_address_as_host() {
|
|
let entry = HstsEntry::new(
|
|
"2001:0db8:0000:0000:0000:ff00:0042:8329".to_owned(), IncludeSubdomains::NotIncluded, None
|
|
);
|
|
|
|
assert!(entry.is_none(), "able to create HstsEntry with IPv6 host");
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_entry_cant_be_created_with_ipv4_address_as_host() {
|
|
let entry = HstsEntry::new(
|
|
"4.4.4.4".to_owned(), IncludeSubdomains::NotIncluded, None
|
|
);
|
|
|
|
assert!(entry.is_none(), "able to create HstsEntry with IPv4 host");
|
|
}
|
|
|
|
#[test]
|
|
fn test_base_domain_in_entries_map() {
|
|
let entries_map = HashMap::new();
|
|
|
|
let mut list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
list.push(HstsEntry::new("servo.mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap());
|
|
list.push(HstsEntry::new("firefox.mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap());
|
|
list.push(HstsEntry::new("bugzilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap());
|
|
|
|
assert_eq!(list.entries_map.len(), 2);
|
|
assert_eq!(list.entries_map.get("mozilla.org").unwrap().len(), 2);
|
|
}
|
|
|
|
#[test]
|
|
fn test_push_entry_with_0_max_age_evicts_entry_from_list() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec!(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, Some(500000u64)).unwrap()));
|
|
let mut list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
list.push(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, Some(0)).unwrap());
|
|
|
|
assert!(list.is_host_secure("mozilla.org") == false)
|
|
}
|
|
|
|
#[test]
|
|
fn test_push_entry_to_hsts_list_should_not_add_subdomains_whose_superdomain_is_already_matched() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec!(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap()));
|
|
let mut list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
list.push(HstsEntry::new("servo.mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap());
|
|
|
|
assert!(list.entries_map.get("mozilla.org").unwrap().len() == 1)
|
|
}
|
|
|
|
#[test]
|
|
fn test_push_entry_to_hsts_list_should_update_existing_domain_entrys_include_subdomains() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec!(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap()));
|
|
let mut list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
assert!(list.is_host_secure("servo.mozilla.org"));
|
|
|
|
list.push(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap());
|
|
|
|
assert!(!list.is_host_secure("servo.mozilla.org"))
|
|
}
|
|
|
|
#[test]
|
|
fn test_push_entry_to_hsts_list_should_not_create_duplicate_entry() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec!(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap()));
|
|
let mut list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
list.push(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap());
|
|
|
|
assert!(list.entries_map.get("mozilla.org").unwrap().len() == 1)
|
|
}
|
|
|
|
#[test]
|
|
fn test_push_multiple_entrie_to_hsts_list_should_add_them_all() {
|
|
let mut list = HstsList {
|
|
entries_map: HashMap::new()
|
|
};
|
|
|
|
assert!(!list.is_host_secure("mozilla.org"));
|
|
assert!(!list.is_host_secure("bugzilla.org"));
|
|
|
|
list.push(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap());
|
|
list.push(HstsEntry::new("bugzilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap());
|
|
|
|
assert!(list.is_host_secure("mozilla.org"));
|
|
assert!(list.is_host_secure("bugzilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_push_entry_to_hsts_list_should_add_an_entry() {
|
|
let mut list = HstsList {
|
|
entries_map: HashMap::new()
|
|
};
|
|
|
|
assert!(!list.is_host_secure("mozilla.org"));
|
|
|
|
list.push(HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap());
|
|
|
|
assert!(list.is_host_secure("mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_parse_hsts_preload_should_return_none_when_json_invalid() {
|
|
let mock_preload_content = b"derp";
|
|
assert!(HstsList::from_preload(mock_preload_content).is_none(), "invalid preload list should not have parsed")
|
|
}
|
|
|
|
#[test]
|
|
fn test_parse_hsts_preload_should_return_none_when_json_contains_no_entries_map_key() {
|
|
let mock_preload_content = b"{\"nothing\": \"to see here\"}";
|
|
assert!(HstsList::from_preload(mock_preload_content).is_none(), "invalid preload list should not have parsed")
|
|
}
|
|
|
|
#[test]
|
|
fn test_parse_hsts_preload_should_decode_host_and_includes_subdomains() {
|
|
let mock_preload_content = b"{\
|
|
\"entries\": [\
|
|
{\"host\": \"mozilla.org\",\
|
|
\"include_subdomains\": false}\
|
|
]\
|
|
}";
|
|
let hsts_list = HstsList::from_preload(mock_preload_content);
|
|
let entries_map = hsts_list.unwrap().entries_map;
|
|
|
|
assert_eq!(entries_map.get("mozilla.org").unwrap()[0].host, "mozilla.org");
|
|
assert!(!entries_map.get("mozilla.org").unwrap()[0].include_subdomains);
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_list_with_no_entries_map_does_not_is_host_secure() {
|
|
let hsts_list = HstsList {
|
|
entries_map: HashMap::new()
|
|
};
|
|
|
|
assert!(!hsts_list.is_host_secure("mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_list_with_exact_domain_entry_is_is_host_secure() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec![HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap()]);
|
|
|
|
let hsts_list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
assert!(hsts_list.is_host_secure("mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_list_with_subdomain_when_include_subdomains_is_true_is_is_host_secure() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec![HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap()]);
|
|
let hsts_list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
assert!(hsts_list.is_host_secure("servo.mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_list_with_subdomain_when_include_subdomains_is_false_is_not_is_host_secure() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec![HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::NotIncluded, None).unwrap()]);
|
|
let hsts_list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
assert!(!hsts_list.is_host_secure("servo.mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_list_with_subdomain_when_host_is_not_a_subdomain_is_not_is_host_secure() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec![HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap()]);
|
|
let hsts_list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
assert!(!hsts_list.is_host_secure("servo-mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_list_with_subdomain_when_host_is_exact_match_is_is_host_secure() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec![HstsEntry::new("mozilla.org".to_owned(),
|
|
IncludeSubdomains::Included, None).unwrap()]);
|
|
let hsts_list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
assert!(hsts_list.is_host_secure("mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_hsts_list_with_expired_entry_is_not_is_host_secure() {
|
|
let mut entries_map = HashMap::new();
|
|
entries_map.insert("mozilla.org".to_owned(), vec![HstsEntry {
|
|
host: "mozilla.org".to_owned(),
|
|
include_subdomains: false,
|
|
max_age: Some(20),
|
|
timestamp: Some(time::get_time().sec as u64 - 100u64)
|
|
}]);
|
|
let hsts_list = HstsList {
|
|
entries_map: entries_map
|
|
};
|
|
|
|
assert!(!hsts_list.is_host_secure("mozilla.org"));
|
|
}
|
|
|
|
#[test]
|
|
fn test_preload_hsts_domains_well_formed() {
|
|
let hsts_list = HstsList::from_servo_preload();
|
|
assert!(!hsts_list.entries_map.is_empty());
|
|
}
|