/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
* You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "gtest/gtest.h"
#include "mozilla/NullPrincipal.h"
#include "mozilla/dom/LocalStorageCommon.h"
#include "mozilla/dom/StorageUtils.h"
#include "mozilla/ipc/BackgroundUtils.h"
#include "mozilla/ipc/PBackgroundSharedTypes.h"
#include "nsCOMPtr.h"
#include "nsContentUtils.h"
#include "nsIURI.h"
#include "nsNetUtil.h"
using namespace mozilla;
using namespace mozilla::dom;
using namespace mozilla::dom::StorageUtils;
using namespace mozilla::ipc;
namespace {
struct OriginKeyTest {
const char* mSpec;
const char* mOriginKey;
const char* mQuotaKey;
};
already_AddRefed<nsIPrincipal> GetContentPrincipal(
const char* aSpec) {
nsCOMPtr<nsIURI> uri;
nsresult rv = NS_NewURI(getter_AddRefs(uri), nsDependentCString(aSpec));
if (NS_WARN_IF(NS_FAILED(rv))) {
return nullptr;
}
OriginAttributes attrs;
nsCOMPtr<nsIPrincipal> principal =
BasePrincipal::CreateContentPrincipal(uri, attrs);
return principal.forget();
}
void CheckGeneratedOriginKey(nsIPrincipal* aPrincipal,
const char* aOriginKey,
const char* aQuotaKey) {
nsCString originAttrSuffix;
nsCString originKey;
nsCString quotaKey;
aPrincipal->OriginAttributesRef().CreateSuffix(originAttrSuffix);
nsresult rv = aPrincipal->GetStorageOriginKey(originKey);
if (aOriginKey) {
ASSERT_EQ(rv, NS_OK) <<
"GetStorageOriginKey should not fail";
EXPECT_TRUE(originKey == nsDependentCString(aOriginKey));
}
else {
ASSERT_NE(rv, NS_OK) <<
"GetStorageOriginKey should fail";
}
rv = aPrincipal->GetLocalStorageQuotaKey(quotaKey);
if (aQuotaKey) {
ASSERT_EQ(rv, NS_OK) <<
"GetLocalStorageQuotaKey should not fail";
EXPECT_TRUE(quotaKey == nsDependentCString(aQuotaKey));
}
else {
ASSERT_NE(rv, NS_OK) <<
"GetLocalStorageQuotaKey should fail";
}
PrincipalInfo principalInfo;
rv = PrincipalToPrincipalInfo(aPrincipal, &principalInfo);
ASSERT_EQ(rv, NS_OK) <<
"PrincipalToPrincipalInfo should not fail";
const auto res = GenerateOriginKey2(principalInfo);
if (aOriginKey) {
ASSERT_TRUE(res.isOk())
<<
"GenerateOriginKey2 should not fail";
EXPECT_TRUE(res.inspect().second == nsDependentCString(aOriginKey));
}
else {
ASSERT_TRUE(res.isErr())
<<
"GenerateOriginKey2 should fail";
}
}
}
// namespace
TEST(LocalStorage, OriginKey)
{
// Check the system principal.
nsCOMPtr<nsIScriptSecurityManager> secMan =
nsContentUtils::GetSecurityManager();
ASSERT_TRUE(secMan)
<<
"GetSecurityManager() should not fail";
nsCOMPtr<nsIPrincipal> principal;
secMan->GetSystemPrincipal(getter_AddRefs(principal));
ASSERT_TRUE(principal)
<<
"GetSystemPrincipal() should not fail";
CheckGeneratedOriginKey(principal, nullptr, nullptr);
// Check the null principal.
principal = NullPrincipal::CreateWithoutOriginAttributes();
ASSERT_TRUE(principal)
<<
"CreateWithoutOriginAttributes() should not fail";
CheckGeneratedOriginKey(principal, nullptr, nullptr);
// Check content principals.
static const OriginKeyTest tests[] = {
{
"http://localhost", "tsohlacol.:http:80", ":tsohlacol."},
{
"http://www.mozilla.org", "gro.allizom.www.:http:80", ":gro.allizom."},
{
"https://www.mozilla.org", "gro.allizom.www.:https:443",
":gro.allizom."},
{
"http://www.mozilla.org:32400", "gro.allizom.www.:http:32400",
":gro.allizom."},
{
"file:///Users/Joe/Sites/", "/setiS/eoJ/sresU/.:file",
":/setiS/eoJ/sresU/."},
{
"file:///Users/Joe/Sites/#foo", "/setiS/eoJ/sresU/.:file",
":/setiS/eoJ/sresU/."},
{
"file:///Users/Joe/Sites/?foo", "/setiS/eoJ/sresU/.:file",
":/setiS/eoJ/sresU/."},
{
"file:///Users/Joe/Sites", "/eoJ/sresU/.:file", ":/eoJ/sresU/."},
{
"file:///Users/Joe/Sites#foo", "/eoJ/sresU/.:file", ":/eoJ/sresU/."},
{
"file:///Users/Joe/Sites?foo", "/eoJ/sresU/.:file", ":/eoJ/sresU/."},
{
"moz-extension://53711a8f-65ed-e742-9671-1f02e267c0bc/"
"_generated_background_page.html",
"cb0c762e20f1-1769-247e-de56-f8a11735.:moz-extension",
":cb0c762e20f1-1769-247e-de56-f8a11735."},
{
"http://[::1]:8/test.html", "1::.:http:8", ":1::."},
};
for (
const auto& test : tests) {
principal = GetContentPrincipal(test.mSpec);
ASSERT_TRUE(principal)
<<
"GetContentPrincipal() should not fail";
CheckGeneratedOriginKey(principal, test.mOriginKey, test.mQuotaKey);
}
}