xref: /aosp_15_r20/external/cronet/net/base/host_mapping_rules_unittest.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1 // Copyright 2010 The Chromium Authors
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "net/base/host_mapping_rules.h"
6 
7 #include <string.h>
8 
9 #include "net/base/host_port_pair.h"
10 #include "testing/gtest/include/gtest/gtest.h"
11 #include "url/gurl.h"
12 #include "url/third_party/mozilla/url_parse.h"
13 #include "url/url_canon.h"
14 #include "url/url_util.h"
15 
16 namespace net {
17 
18 namespace {
19 
TEST(HostMappingRulesTest,SetRulesFromString)20 TEST(HostMappingRulesTest, SetRulesFromString) {
21   HostMappingRules rules;
22   rules.SetRulesFromString(
23       "map *.com baz , map *.net bar:60, EXCLUDE *.foo.com");
24 
25   HostPortPair host_port("test", 1234);
26   EXPECT_FALSE(rules.RewriteHost(&host_port));
27   EXPECT_EQ("test", host_port.host());
28   EXPECT_EQ(1234u, host_port.port());
29 
30   host_port = HostPortPair("chrome.net", 80);
31   EXPECT_TRUE(rules.RewriteHost(&host_port));
32   EXPECT_EQ("bar", host_port.host());
33   EXPECT_EQ(60u, host_port.port());
34 
35   host_port = HostPortPair("crack.com", 80);
36   EXPECT_TRUE(rules.RewriteHost(&host_port));
37   EXPECT_EQ("baz", host_port.host());
38   EXPECT_EQ(80u, host_port.port());
39 
40   host_port = HostPortPair("wtf.foo.com", 666);
41   EXPECT_FALSE(rules.RewriteHost(&host_port));
42   EXPECT_EQ("wtf.foo.com", host_port.host());
43   EXPECT_EQ(666u, host_port.port());
44 }
45 
TEST(HostMappingRulesTest,PortSpecificMatching)46 TEST(HostMappingRulesTest, PortSpecificMatching) {
47   HostMappingRules rules;
48   rules.SetRulesFromString(
49       "map *.com:80 baz:111 , map *.com:443 blat:333, EXCLUDE *.foo.com");
50 
51   // No match
52   HostPortPair host_port("test.com", 1234);
53   EXPECT_FALSE(rules.RewriteHost(&host_port));
54   EXPECT_EQ("test.com", host_port.host());
55   EXPECT_EQ(1234u, host_port.port());
56 
57   // Match port 80
58   host_port = HostPortPair("crack.com", 80);
59   EXPECT_TRUE(rules.RewriteHost(&host_port));
60   EXPECT_EQ("baz", host_port.host());
61   EXPECT_EQ(111u, host_port.port());
62 
63   // Match port 443
64   host_port = HostPortPair("wtf.com", 443);
65   EXPECT_TRUE(rules.RewriteHost(&host_port));
66   EXPECT_EQ("blat", host_port.host());
67   EXPECT_EQ(333u, host_port.port());
68 
69   // Match port 443, but excluded.
70   host_port = HostPortPair("wtf.foo.com", 443);
71   EXPECT_FALSE(rules.RewriteHost(&host_port));
72   EXPECT_EQ("wtf.foo.com", host_port.host());
73   EXPECT_EQ(443u, host_port.port());
74 }
75 
76 // Parsing bad rules should silently discard the rule (and never crash).
TEST(HostMappingRulesTest,ParseInvalidRules)77 TEST(HostMappingRulesTest, ParseInvalidRules) {
78   HostMappingRules rules;
79 
80   EXPECT_FALSE(rules.AddRuleFromString("xyz"));
81   EXPECT_FALSE(rules.AddRuleFromString(std::string()));
82   EXPECT_FALSE(rules.AddRuleFromString(" "));
83   EXPECT_FALSE(rules.AddRuleFromString("EXCLUDE"));
84   EXPECT_FALSE(rules.AddRuleFromString("EXCLUDE foo bar"));
85   EXPECT_FALSE(rules.AddRuleFromString("INCLUDE"));
86   EXPECT_FALSE(rules.AddRuleFromString("INCLUDE x"));
87   EXPECT_FALSE(rules.AddRuleFromString("INCLUDE x :10"));
88 }
89 
TEST(HostMappingRulesTest,RewritesUrl)90 TEST(HostMappingRulesTest, RewritesUrl) {
91   HostMappingRules rules;
92   rules.AddRuleFromString("MAP initial.test replacement.test:1000");
93 
94   GURL url("http://initial.test:111");
95   EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
96   EXPECT_EQ(url, GURL("http://replacement.test:1000"));
97 }
98 
TEST(HostMappingRulesTest,RewritesUrlToIpv6Literal)99 TEST(HostMappingRulesTest, RewritesUrlToIpv6Literal) {
100   HostMappingRules rules;
101   rules.AddRuleFromString("MAP initial.test [2345:6789::0abc]:1112");
102 
103   GURL url("http://initial.test:111");
104   EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
105   EXPECT_EQ(url, GURL("http://[2345:6789::0abc]:1112"));
106 }
107 
TEST(HostMappingRulesTest,RewritesUrlPreservingScheme)108 TEST(HostMappingRulesTest, RewritesUrlPreservingScheme) {
109   HostMappingRules rules;
110   rules.AddRuleFromString("MAP initial.test replacement.test:1000");
111 
112   GURL url("wss://initial.test:222");
113   EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
114   EXPECT_EQ(url, GURL("wss://replacement.test:1000"));
115 }
116 
TEST(HostMappingRulesTest,RewritesFileUrl)117 TEST(HostMappingRulesTest, RewritesFileUrl) {
118   HostMappingRules rules;
119   rules.AddRuleFromString("MAP initial.test replacement.test:1000");
120 
121   // Expect replacement port to be ignored because file URLs do not use port.
122   GURL url("file://initial.test/file.txt");
123   ASSERT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
124   EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
125   EXPECT_EQ(url, GURL("file://replacement.test/file.txt"));
126   EXPECT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
127 }
128 
TEST(HostMappingRulesTest,RewritesAnyStandardUrlWithPort)129 TEST(HostMappingRulesTest, RewritesAnyStandardUrlWithPort) {
130   const char kScheme[] = "foo";
131   url::ScopedSchemeRegistryForTests scoped_registry;
132   AddStandardScheme(kScheme, url::SCHEME_WITH_HOST_AND_PORT);
133   ASSERT_TRUE(url::IsStandard(kScheme, url::Component(0, strlen(kScheme))));
134 
135   HostMappingRules rules;
136   rules.AddRuleFromString("MAP initial.test replacement.test:1000");
137 
138   GURL url("foo://initial.test:100");
139   EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
140   EXPECT_EQ(url, GURL("foo://replacement.test:1000"));
141 }
142 
TEST(HostMappingRulesTest,RewritesAnyStandardUrlWithoutPort)143 TEST(HostMappingRulesTest, RewritesAnyStandardUrlWithoutPort) {
144   const char kScheme[] = "foo";
145   url::ScopedSchemeRegistryForTests scoped_registry;
146   AddStandardScheme(kScheme, url::SCHEME_WITH_HOST);
147   ASSERT_TRUE(url::IsStandard(kScheme, url::Component(0, strlen(kScheme))));
148 
149   HostMappingRules rules;
150   rules.AddRuleFromString("MAP initial.test replacement.test:1000");
151 
152   // Expect replacement port to be ignored.
153   GURL url("foo://initial.test");
154   ASSERT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
155   EXPECT_EQ(rules.RewriteUrl(url), HostMappingRules::RewriteResult::kRewritten);
156   EXPECT_EQ(url, GURL("foo://replacement.test"));
157   EXPECT_EQ(url.EffectiveIntPort(), url::PORT_UNSPECIFIED);
158 }
159 
TEST(HostMappingRulesTest,IgnoresUnmappedUrls)160 TEST(HostMappingRulesTest, IgnoresUnmappedUrls) {
161   HostMappingRules rules;
162   rules.AddRuleFromString("MAP initial.test replacement.test:1000");
163 
164   GURL url("http://different.test:111");
165   EXPECT_EQ(rules.RewriteUrl(url),
166             HostMappingRules::RewriteResult::kNoMatchingRule);
167   EXPECT_EQ(url, GURL("http://different.test:111"));
168 }
169 
TEST(HostMappingRulesTest,IgnoresInvalidReplacementUrls)170 TEST(HostMappingRulesTest, IgnoresInvalidReplacementUrls) {
171   HostMappingRules rules;
172   rules.AddRuleFromString("MAP initial.test invalid/url");
173 
174   GURL url("http://initial.test");
175   EXPECT_EQ(rules.RewriteUrl(url),
176             HostMappingRules::RewriteResult::kInvalidRewrite);
177   EXPECT_EQ(url, GURL("http://initial.test"));
178 }
179 
180 // Remapping to "^NOTFOUND" is documented as a special case for
181 // MappedHostResolver usage. Ensure that it is handled as invalid as expected.
TEST(HostMappingRulesTest,NotFoundIgnoredAsInvalidUrl)182 TEST(HostMappingRulesTest, NotFoundIgnoredAsInvalidUrl) {
183   HostMappingRules rules;
184   rules.AddRuleFromString("MAP initial.test ^NOTFOUND");
185 
186   GURL url("http://initial.test");
187   EXPECT_EQ(rules.RewriteUrl(url),
188             HostMappingRules::RewriteResult::kInvalidRewrite);
189   EXPECT_EQ(url, GURL("http://initial.test"));
190 }
191 
192 }  // namespace
193 
194 }  // namespace net
195