// Copyright 2013 The Chromium Authors // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/base/url_util.h" #include #include "base/format_macros.h" #include "base/strings/utf_string_conversions.h" #include "testing/gtest/include/gtest/gtest.h" #include "third_party/abseil-cpp/absl/types/optional.h" #include "url/gurl.h" #include "url/scheme_host_port.h" #include "url/url_util.h" using base::ASCIIToUTF16; using base::WideToUTF16; namespace net { namespace { TEST(UrlUtilTest, AppendQueryParameter) { // Appending a name-value pair to a URL without a query component. EXPECT_EQ("http://example.com/path?name=value", AppendQueryParameter(GURL("http://example.com/path"), "name", "value").spec()); // Appending a name-value pair to a URL with a query component. // The original component should be preserved, and the new pair should be // appended with '&'. EXPECT_EQ("http://example.com/path?existing=one&name=value", AppendQueryParameter(GURL("http://example.com/path?existing=one"), "name", "value").spec()); // Appending a name-value pair with unsafe characters included. The // unsafe characters should be escaped. EXPECT_EQ("http://example.com/path?existing=one&na+me=v.alue%3D", AppendQueryParameter(GURL("http://example.com/path?existing=one"), "na me", "v.alue=").spec()); } TEST(UrlUtilTest, AppendOrReplaceQueryParameter) { // Appending a name-value pair to a URL without a query component. EXPECT_EQ("http://example.com/path?name=value", AppendOrReplaceQueryParameter(GURL("http://example.com/path"), "name", "value").spec()); // Appending a name-value pair to a URL with a query component. // The original component should be preserved, and the new pair should be // appended with '&'. EXPECT_EQ("http://example.com/path?existing=one&name=value", AppendOrReplaceQueryParameter( GURL("http://example.com/path?existing=one"), "name", "value").spec()); // Appending a name-value pair with unsafe characters included. The // unsafe characters should be escaped. EXPECT_EQ("http://example.com/path?existing=one&na+me=v.alue%3D", AppendOrReplaceQueryParameter( GURL("http://example.com/path?existing=one"), "na me", "v.alue=").spec()); // Replace value of an existing paramater. EXPECT_EQ("http://example.com/path?existing=one&name=new", AppendOrReplaceQueryParameter( GURL("http://example.com/path?existing=one&name=old"), "name", "new").spec()); // Replace a name-value pair with unsafe characters included. The // unsafe characters should be escaped. EXPECT_EQ("http://example.com/path?na+me=n.ew%3D&existing=one", AppendOrReplaceQueryParameter( GURL("http://example.com/path?na+me=old&existing=one"), "na me", "n.ew=").spec()); // Replace the value of first parameter with this name only. EXPECT_EQ("http://example.com/path?name=new&existing=one&name=old", AppendOrReplaceQueryParameter( GURL("http://example.com/path?name=old&existing=one&name=old"), "name", "new").spec()); // Preserve the content of the original params regardless of our failure to // interpret them correctly. EXPECT_EQ("http://example.com/path?bar&name=new&left=&" "=right&=&&name=again", AppendOrReplaceQueryParameter( GURL("http://example.com/path?bar&name=old&left=&" "=right&=&&name=again"), "name", "new").spec()); // ----- Removing the key using nullopt value ----- // Removes the name-value pair from the URL preserving other query parameters. EXPECT_EQ("http://example.com/path?abc=xyz", AppendOrReplaceQueryParameter( GURL("http://example.com/path?name=value&abc=xyz"), "name", absl::nullopt) .spec()); // Removes the name-value pair from the URL. EXPECT_EQ("http://example.com/path?", AppendOrReplaceQueryParameter( GURL("http://example.com/path?existing=one"), "existing", absl::nullopt) .spec()); // Removes the first name-value pair. EXPECT_EQ("http://example.com/path?c=d&e=f", AppendOrReplaceQueryParameter( GURL("http://example.com/path?a=b&c=d&e=f"), "a", absl::nullopt) .spec()); // Removes a name-value pair in between two query params. EXPECT_EQ( "http://example.com/path?existing=one&hello=world", AppendOrReplaceQueryParameter( GURL("http://example.com/path?existing=one&replace=sure&hello=world"), "replace", absl::nullopt) .spec()); // Removes the last name-value pair. EXPECT_EQ("http://example.com/path?existing=one", AppendOrReplaceQueryParameter( GURL("http://example.com/path?existing=one&replace=sure"), "replace", absl::nullopt) .spec()); // Removing a name-value pair with unsafe characters included. The // unsafe characters should be escaped. EXPECT_EQ("http://example.com/path?existing=one&hello=world", AppendOrReplaceQueryParameter( GURL("http://example.com/" "path?existing=one&na+me=v.alue%3D&hello=world"), "na me", absl::nullopt) .spec()); // Does nothing if the provided query param key does not exist. EXPECT_EQ("http://example.com/path?existing=one&name=old", AppendOrReplaceQueryParameter( GURL("http://example.com/path?existing=one&name=old"), "old", absl::nullopt) .spec()); // Remove the value of first parameter with this name only. EXPECT_EQ( "http://example.com/path?existing=one&name=old", AppendOrReplaceQueryParameter( GURL("http://example.com/path?name=something&existing=one&name=old"), "name", absl::nullopt) .spec()); // Preserve the content of the original params regardless of our failure to // interpret them correctly. EXPECT_EQ( "http://example.com/path?bar&left=&" "=right&=&&name=again", AppendOrReplaceQueryParameter( GURL("http://example.com/path?bar&name=old&left=&" "=right&=&&name=again"), "name", absl::nullopt) .spec()); } TEST(UrlUtilTest, GetValueForKeyInQuery) { GURL url("http://example.com/path?name=value&boolParam&" "url=http://test.com/q?n1%3Dv1%26n2"); std::string value; // False when getting a non-existent query param. EXPECT_FALSE(GetValueForKeyInQuery(url, "non-exist", &value)); // True when query param exist. EXPECT_TRUE(GetValueForKeyInQuery(url, "name", &value)); EXPECT_EQ("value", value); EXPECT_TRUE(GetValueForKeyInQuery(url, "boolParam", &value)); EXPECT_EQ("", value); EXPECT_TRUE(GetValueForKeyInQuery(url, "url", &value)); EXPECT_EQ("http://test.com/q?n1=v1&n2", value); } TEST(UrlUtilTest, GetValueForKeyInQueryInvalidURL) { GURL url("http://%01/?test"); std::string value; // Always false when parsing an invalid URL. EXPECT_FALSE(GetValueForKeyInQuery(url, "test", &value)); } TEST(UrlUtilTest, ParseQuery) { const GURL url("http://example.com/path?name=value&boolParam&" "url=http://test.com/q?n1%3Dv1%26n2&" "multikey=value1&multikey=value2&multikey"); QueryIterator it(url); ASSERT_FALSE(it.IsAtEnd()); EXPECT_EQ("name", it.GetKey()); EXPECT_EQ("value", it.GetValue()); EXPECT_EQ("value", it.GetUnescapedValue()); it.Advance(); ASSERT_FALSE(it.IsAtEnd()); EXPECT_EQ("boolParam", it.GetKey()); EXPECT_EQ("", it.GetValue()); EXPECT_EQ("", it.GetUnescapedValue()); it.Advance(); ASSERT_FALSE(it.IsAtEnd()); EXPECT_EQ("url", it.GetKey()); EXPECT_EQ("http://test.com/q?n1%3Dv1%26n2", it.GetValue()); EXPECT_EQ("http://test.com/q?n1=v1&n2", it.GetUnescapedValue()); it.Advance(); ASSERT_FALSE(it.IsAtEnd()); EXPECT_EQ("multikey", it.GetKey()); EXPECT_EQ("value1", it.GetValue()); EXPECT_EQ("value1", it.GetUnescapedValue()); it.Advance(); ASSERT_FALSE(it.IsAtEnd()); EXPECT_EQ("multikey", it.GetKey()); EXPECT_EQ("value2", it.GetValue()); EXPECT_EQ("value2", it.GetUnescapedValue()); it.Advance(); ASSERT_FALSE(it.IsAtEnd()); EXPECT_EQ("multikey", it.GetKey()); EXPECT_EQ("", it.GetValue()); EXPECT_EQ("", it.GetUnescapedValue()); it.Advance(); EXPECT_TRUE(it.IsAtEnd()); } TEST(UrlUtilTest, ParseQueryInvalidURL) { const GURL url("http://%01/?test"); QueryIterator it(url); EXPECT_TRUE(it.IsAtEnd()); } TEST(UrlUtilTest, ParseHostAndPort) { const struct { const char* const input; bool success; const char* const expected_host; int expected_port; } tests[] = { // Valid inputs: {"foo:10", true, "foo", 10}, {"foo", true, "foo", -1}, { "[1080:0:0:0:8:800:200C:4171]:11", true, "1080:0:0:0:8:800:200C:4171", 11 }, { "[1080:0:0:0:8:800:200C:4171]", true, "1080:0:0:0:8:800:200C:4171", -1 }, // Because no validation is done on the host, the following are accepted, // even though they are invalid names. {"]", true, "]", -1}, {"::1", true, ":", 1}, // Invalid inputs: {"foo:bar", false, "", -1}, {"foo:", false, "", -1}, {":", false, "", -1}, {":80", false, "", -1}, {"", false, "", -1}, {"porttoolong:300000", false, "", -1}, {"usrname@host", false, "", -1}, {"usrname:password@host", false, "", -1}, {":password@host", false, "", -1}, {":password@host:80", false, "", -1}, {":password@host", false, "", -1}, {"@host", false, "", -1}, {"[", false, "", -1}, {"[]", false, "", -1}, }; for (const auto& test : tests) { std::string host; int port; bool ok = ParseHostAndPort(test.input, &host, &port); EXPECT_EQ(test.success, ok); if (test.success) { EXPECT_EQ(test.expected_host, host); EXPECT_EQ(test.expected_port, port); } } } TEST(UrlUtilTest, GetHostAndPort) { const struct { GURL url; const char* const expected_host_and_port; } tests[] = { { GURL("http://www.foo.com/x"), "www.foo.com:80"}, { GURL("http://www.foo.com:21/x"), "www.foo.com:21"}, // For IPv6 literals should always include the brackets. { GURL("http://[1::2]/x"), "[1::2]:80"}, { GURL("http://[::a]:33/x"), "[::a]:33"}, }; for (const auto& test : tests) { std::string host_and_port = GetHostAndPort(test.url); EXPECT_EQ(std::string(test.expected_host_and_port), host_and_port); } } TEST(UrlUtilTest, GetHostAndOptionalPort) { const struct { GURL url; const char* const expected_host_and_port; } tests[] = { {GURL("http://www.foo.com/x"), "www.foo.com"}, {GURL("http://www.foo.com:21/x"), "www.foo.com:21"}, {GURL("http://www.foo.com:443/x"), "www.foo.com:443"}, {GURL("https://www.foo.com/x"), "www.foo.com"}, {GURL("https://www.foo.com:80/x"), "www.foo.com:80"}, // For IPv6 literals should always include the brackets. {GURL("http://[1::2]/x"), "[1::2]"}, {GURL("http://[::a]:33/x"), "[::a]:33"}, }; for (const auto& test : tests) { EXPECT_EQ(test.expected_host_and_port, GetHostAndOptionalPort(test.url)); // Also test the SchemeHostPort variant. EXPECT_EQ(test.expected_host_and_port, GetHostAndOptionalPort(url::SchemeHostPort(test.url))); } } TEST(UrlUtilTest, GetHostOrSpecFromURL) { EXPECT_EQ("example.com", GetHostOrSpecFromURL(GURL("http://example.com/test"))); EXPECT_EQ("example.com", GetHostOrSpecFromURL(GURL("http://example.com./test"))); EXPECT_EQ("file:///tmp/test.html", GetHostOrSpecFromURL(GURL("file:///tmp/test.html"))); } TEST(UrlUtilTest, GetSuperdomain) { struct { const char* const domain; const char* const expected_superdomain; } tests[] = { // Basic cases {"foo.bar.example", "bar.example"}, {"bar.example", "example"}, {"example", ""}, // Returned value may be an eTLD. {"google.com", "com"}, {"google.co.uk", "co.uk"}, // Weird cases. {"", ""}, {"has.trailing.dot.", "trailing.dot."}, {"dot.", ""}, {".has.leading.dot", "has.leading.dot"}, {".", ""}, {"..", "."}, {"127.0.0.1", "0.0.1"}, }; for (const auto& test : tests) { EXPECT_EQ(test.expected_superdomain, GetSuperdomain(test.domain)); } } TEST(UrlUtilTest, IsSubdomainOf) { struct { const char* subdomain; const char* superdomain; bool is_subdomain; } tests[] = { {"bar.foo.com", "foo.com", true}, {"barfoo.com", "foo.com", false}, {"bar.foo.com", "com", true}, {"bar.foo.com", "other.com", false}, {"bar.foo.com", "bar.foo.com", true}, {"bar.foo.com", "baz.foo.com", false}, {"bar.foo.com", "baz.bar.foo.com", false}, {"bar.foo.com", "ar.foo.com", false}, {"foo.com", "foo.com.", false}, {"bar.foo.com", "foo.com.", false}, {"", "", true}, {"a", "", false}, {"", "a", false}, {"127.0.0.1", "0.0.1", true}, // Don't do this... }; for (const auto& test : tests) { EXPECT_EQ(test.is_subdomain, IsSubdomainOf(test.subdomain, test.superdomain)); } } TEST(UrlUtilTest, CompliantHost) { struct { const char* const host; bool expected_output; } compliant_host_cases[] = { {"", false}, {"a", true}, {"-", false}, {"_", false}, {".", false}, {"9", true}, {"9a", true}, {"9_", true}, {"a.", true}, {"a.a", true}, {"9.a", true}, {"a.9", true}, {"_9a", false}, {"-9a", false}, {"a.a9", true}, {"_.9a", true}, {"a.-a9", false}, {"a+9a", false}, {"-a.a9", true}, {"a_.a9", true}, {"1-.a-b", true}, {"1_.a-b", true}, {"1-2.a_b", true}, {"a.b.c.d.e", true}, {"1.2.3.4.5", true}, {"1.2.3.4.5.", true}, }; for (const auto& compliant_host : compliant_host_cases) { EXPECT_EQ(compliant_host.expected_output, IsCanonicalizedHostCompliant(compliant_host.host)); } } struct NonUniqueNameTestData { bool is_unique; const char* const hostname; }; // Google Test pretty-printer. void PrintTo(const NonUniqueNameTestData& data, std::ostream* os) { ASSERT_TRUE(data.hostname); *os << " hostname: " << testing::PrintToString(data.hostname) << "; is_unique: " << testing::PrintToString(data.is_unique); } const NonUniqueNameTestData kNonUniqueNameTestData[] = { // Domains under ICANN-assigned domains. { true, "google.com" }, { true, "google.co.uk" }, // Domains under private registries. { true, "appspot.com" }, { true, "test.appspot.com" }, // Unreserved IPv4 addresses (in various forms). { true, "8.8.8.8" }, { true, "99.64.0.0" }, { true, "212.15.0.0" }, { true, "212.15" }, { true, "212.15.0" }, { true, "3557752832" }, // Reserved IPv4 addresses (in various forms). { false, "192.168.0.0" }, { false, "192.168.0.6" }, { false, "10.0.0.5" }, { false, "10.0" }, { false, "10.0.0" }, { false, "3232235526" }, // Unreserved IPv6 addresses. { true, "FFC0:ba98:7654:3210:FEDC:BA98:7654:3210" }, { true, "2000:ba98:7654:2301:EFCD:BA98:7654:3210" }, // Reserved IPv6 addresses. { false, "::192.9.5.5" }, { false, "FEED::BEEF" }, { false, "FEC0:ba98:7654:3210:FEDC:BA98:7654:3210" }, // 'internal'/non-IANA assigned domains. { false, "intranet" }, { false, "intranet." }, { false, "intranet.example" }, { false, "host.intranet.example" }, // gTLDs under discussion, but not yet assigned. { false, "intranet.corp" }, { false, "intranet.internal" }, // Invalid host names are treated as unique - but expected to be // filtered out before then. { true, "junk)(£)$*!@~#" }, { true, "w$w.example.com" }, { true, "nocolonsallowed:example" }, { true, "[::4.5.6.9]" }, }; class UrlUtilNonUniqueNameTest : public testing::TestWithParam { public: ~UrlUtilNonUniqueNameTest() override = default; protected: bool IsUnique(const std::string& hostname) { return !IsHostnameNonUnique(hostname); } }; // Test that internal/non-unique names are properly identified as such, but // that IP addresses and hosts beneath registry-controlled domains are flagged // as unique names. TEST_P(UrlUtilNonUniqueNameTest, IsHostnameNonUnique) { const NonUniqueNameTestData& test_data = GetParam(); EXPECT_EQ(test_data.is_unique, IsUnique(test_data.hostname)); } INSTANTIATE_TEST_SUITE_P(All, UrlUtilNonUniqueNameTest, testing::ValuesIn(kNonUniqueNameTestData)); TEST(UrlUtilTest, IsLocalhost) { EXPECT_TRUE(HostStringIsLocalhost("localhost")); EXPECT_TRUE(HostStringIsLocalhost("localHosT")); EXPECT_TRUE(HostStringIsLocalhost("localhost.")); EXPECT_TRUE(HostStringIsLocalhost("localHost.")); EXPECT_TRUE(HostStringIsLocalhost("127.0.0.1")); EXPECT_TRUE(HostStringIsLocalhost("127.0.1.0")); EXPECT_TRUE(HostStringIsLocalhost("127.1.0.0")); EXPECT_TRUE(HostStringIsLocalhost("127.0.0.255")); EXPECT_TRUE(HostStringIsLocalhost("127.0.255.0")); EXPECT_TRUE(HostStringIsLocalhost("127.255.0.0")); EXPECT_TRUE(HostStringIsLocalhost("::1")); EXPECT_TRUE(HostStringIsLocalhost("0:0:0:0:0:0:0:1")); EXPECT_TRUE(HostStringIsLocalhost("foo.localhost")); EXPECT_TRUE(HostStringIsLocalhost("foo.localhost.")); EXPECT_TRUE(HostStringIsLocalhost("foo.localhoST")); EXPECT_TRUE(HostStringIsLocalhost("foo.localhoST.")); EXPECT_FALSE(HostStringIsLocalhost("localhost.localdomain")); EXPECT_FALSE(HostStringIsLocalhost("localhost.localDOMain")); EXPECT_FALSE(HostStringIsLocalhost("localhost.localdomain.")); EXPECT_FALSE(HostStringIsLocalhost("localhost6")); EXPECT_FALSE(HostStringIsLocalhost("localhost6.")); EXPECT_FALSE(HostStringIsLocalhost("localhost6.localdomain6")); EXPECT_FALSE(HostStringIsLocalhost("localhost6.localdomain6.")); EXPECT_FALSE(HostStringIsLocalhost("localhostx")); EXPECT_FALSE(HostStringIsLocalhost("localhost.x")); EXPECT_FALSE(HostStringIsLocalhost("foo.localdomain")); EXPECT_FALSE(HostStringIsLocalhost("foo.localdomain.x")); EXPECT_FALSE(HostStringIsLocalhost("localhost6x")); EXPECT_FALSE(HostStringIsLocalhost("localhost.localdomain6")); EXPECT_FALSE(HostStringIsLocalhost("localhost6.localdomain")); EXPECT_FALSE(HostStringIsLocalhost("127.0.0.1.1")); EXPECT_FALSE(HostStringIsLocalhost(".127.0.0.255")); EXPECT_FALSE(HostStringIsLocalhost("::2")); EXPECT_FALSE(HostStringIsLocalhost("::1:1")); EXPECT_FALSE(HostStringIsLocalhost("0:0:0:0:1:0:0:1")); EXPECT_FALSE(HostStringIsLocalhost("::1:1")); EXPECT_FALSE(HostStringIsLocalhost("0:0:0:0:0:0:0:0:1")); EXPECT_FALSE(HostStringIsLocalhost("foo.localhost.com")); EXPECT_FALSE(HostStringIsLocalhost("foo.localhoste")); EXPECT_FALSE(HostStringIsLocalhost("foo.localhos")); EXPECT_FALSE(HostStringIsLocalhost("[::1]")); GURL localhost6("http://[::1]/"); EXPECT_TRUE(IsLocalhost(localhost6)); } TEST(UrlUtilTest, SimplifyUrlForRequest) { struct { const char* const input_url; const char* const expected_simplified_url; } tests[] = { { // Reference section should be stripped. "http://www.google.com:78/foobar?query=1#hash", "http://www.google.com:78/foobar?query=1", }, { // Reference section can itself contain #. "http://192.168.0.1?query=1#hash#10#11#13#14", "http://192.168.0.1?query=1", }, { // Strip username/password. "http://user:pass@google.com", "http://google.com/", }, { // Strip both the reference and the username/password. "http://user:pass@google.com:80/sup?yo#X#X", "http://google.com/sup?yo", }, { // Try an HTTPS URL -- strip both the reference and the username/password. "https://user:pass@google.com:80/sup?yo#X#X", "https://google.com:80/sup?yo", }, { // Try an FTP URL -- strip both the reference and the username/password. "ftp://user:pass@google.com:80/sup?yo#X#X", "ftp://google.com:80/sup?yo", }, { // Try a nonstandard URL "foobar://user:pass@google.com:80/sup?yo#X#X", "foobar://user:pass@google.com:80/sup?yo", }, }; for (const auto& test : tests) { SCOPED_TRACE(test.input_url); GURL input_url(GURL(test.input_url)); GURL expected_url(GURL(test.expected_simplified_url)); EXPECT_EQ(expected_url, SimplifyUrlForRequest(input_url)); } } TEST(UrlUtilTest, ChangeWebSocketSchemeToHttpScheme) { struct { const char* const input_url; const char* const expected_output_url; } tests[] = { {"ws://google.com:78/path?query=1", "http://google.com:78/path?query=1"}, {"wss://google.com:441/path?q=1", "https://google.com:441/path?q=1"}}; for (const auto& test : tests) { GURL input_url(test.input_url); GURL expected_output_url(test.expected_output_url); EXPECT_EQ(expected_output_url, ChangeWebSocketSchemeToHttpScheme(input_url)); } } TEST(UrlUtilTest, SchemeHasNetworkHost) { const char kCustomSchemeWithHostPortAndUserInformation[] = "foo"; const char kCustomSchemeWithHostAndPort[] = "bar"; const char kCustomSchemeWithHost[] = "baz"; const char kCustomSchemeWithoutAuthority[] = "qux"; const char kNonStandardScheme[] = "not-registered"; url::ScopedSchemeRegistryForTests scheme_registry; AddStandardScheme(kCustomSchemeWithHostPortAndUserInformation, url::SCHEME_WITH_HOST_PORT_AND_USER_INFORMATION); AddStandardScheme(kCustomSchemeWithHostAndPort, url::SCHEME_WITH_HOST_AND_PORT); AddStandardScheme(kCustomSchemeWithHost, url::SCHEME_WITH_HOST); AddStandardScheme(kCustomSchemeWithoutAuthority, url::SCHEME_WITHOUT_AUTHORITY); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kHttpScheme)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kHttpsScheme)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kWsScheme)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kWssScheme)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kQuicTransportScheme)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kFtpScheme)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(url::kFileScheme)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost( kCustomSchemeWithHostPortAndUserInformation)); EXPECT_TRUE(IsStandardSchemeWithNetworkHost(kCustomSchemeWithHostAndPort)); EXPECT_FALSE(IsStandardSchemeWithNetworkHost(url::kFileSystemScheme)); EXPECT_FALSE(IsStandardSchemeWithNetworkHost(kCustomSchemeWithHost)); EXPECT_FALSE(IsStandardSchemeWithNetworkHost(kCustomSchemeWithoutAuthority)); EXPECT_FALSE(IsStandardSchemeWithNetworkHost(kNonStandardScheme)); } TEST(UrlUtilTest, GetIdentityFromURL) { struct { const char* const input_url; const char* const expected_username; const char* const expected_password; } tests[] = { { "http://username:password@google.com", "username", "password", }, { // Test for http://crbug.com/19200 "http://username:p@ssword@google.com", "username", "p@ssword", }, { // Special URL characters should be unescaped. "http://username:p%3fa%26s%2fs%23@google.com", "username", "p?a&s/s#", }, { // Username contains %20, password %25. "http://use rname:password%25@google.com", "use rname", "password%", }, { // Username and password contain forward / backward slashes. "http://username%2F:password%5C@google.com", "username/", "password\\", }, { // Keep %00 and %01 as-is, and ignore other escaped characters when // present. "http://use%00rname%20:pass%01word%25@google.com", "use%00rname%20", "pass%01word%25", }, { // Keep CR and LF as-is. "http://use%0Arname:pass%0Dword@google.com", "use%0Arname", "pass%0Dword", }, { // Use a '+' in the username. "http://use+rname:password@google.com", "use+rname", "password", }, { // Use a '&' in the password. "http://username:p&ssword@google.com", "username", "p&ssword", }, { // These UTF-8 characters are considered unsafe to unescape by // UnescapeURLComponent, but raise no special concerns as part of the // identity portion of a URL. "http://%F0%9F%94%92:%E2%80%82@google.com", "\xF0\x9F\x94\x92", "\xE2\x80\x82", }, { // Leave invalid UTF-8 alone, and leave valid UTF-8 characters alone // if there's also an invalid character in the string - strings should // not be partially unescaped. "http://%81:%E2%80%82%E2%80@google.com", "%81", "%E2%80%82%E2%80", }, }; for (const auto& test : tests) { SCOPED_TRACE(test.input_url); GURL url(test.input_url); std::u16string username, password; GetIdentityFromURL(url, &username, &password); EXPECT_EQ(base::UTF8ToUTF16(test.expected_username), username); EXPECT_EQ(base::UTF8ToUTF16(test.expected_password), password); } } // Try extracting a username which was encoded with UTF8. TEST(UrlUtilTest, GetIdentityFromURL_UTF8) { GURL url(u"http://foo:\x4f60\x597d@blah.com"); EXPECT_EQ("foo", url.username()); EXPECT_EQ("%E4%BD%A0%E5%A5%BD", url.password()); // Extract the unescaped identity. std::u16string username, password; GetIdentityFromURL(url, &username, &password); // Verify that it was decoded as UTF8. EXPECT_EQ(u"foo", username); EXPECT_EQ(u"\x4f60\x597d", password); } TEST(UrlUtilTest, GoogleHost) { struct { GURL url; bool expected_output; } google_host_cases[] = { {GURL("http://.google.com"), true}, {GURL("http://.youtube.com"), true}, {GURL("http://.gmail.com"), true}, {GURL("http://.doubleclick.net"), true}, {GURL("http://.gstatic.com"), true}, {GURL("http://.googlevideo.com"), true}, {GURL("http://.googleusercontent.com"), true}, {GURL("http://.googlesyndication.com"), true}, {GURL("http://.google-analytics.com"), true}, {GURL("http://.googleadservices.com"), true}, {GURL("http://.googleapis.com"), true}, {GURL("http://a.google.com"), true}, {GURL("http://b.youtube.com"), true}, {GURL("http://c.gmail.com"), true}, {GURL("http://google.com"), false}, {GURL("http://youtube.com"), false}, {GURL("http://gmail.com"), false}, {GURL("http://google.coma"), false}, {GURL("http://agoogle.com"), false}, {GURL("http://oogle.com"), false}, {GURL("http://google.co"), false}, {GURL("http://oggole.com"), false}, }; for (const auto& host : google_host_cases) { EXPECT_EQ(host.expected_output, HasGoogleHost(host.url)); } } } // namespace } // namespace net