blob: 3c81c69789b8f8c9d75262c02ba12f6e58a6dc71 [file] [log] [blame]
// Copyright (c) 2009 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/base/transport_security_state.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace net {
class TransportSecurityStateTest : public testing::Test {
};
TEST_F(TransportSecurityStateTest, BogusHeaders) {
int max_age = 42;
bool include_subdomains = false;
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" ", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"abc", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" abc", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" abc ", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age ", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age=", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age =", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age= ", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age = ", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age = xy", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
" max-age = 3488a923", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488a923 ", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-ag=3488923", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-aged=3488923", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age==3488923", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"amax-age=3488923", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=-3488923", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923;", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923 e", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923 includesubdomain", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923includesubdomains", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923=includesubdomains", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923 includesubdomainx", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923 includesubdomain=", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923 includesubdomain=true", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923 includesubdomainsx", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=3488923 includesubdomains x", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=34889.23 includesubdomains", &max_age, &include_subdomains));
EXPECT_FALSE(TransportSecurityState::ParseHeader(
"max-age=34889 includesubdomains", &max_age, &include_subdomains));
EXPECT_EQ(max_age, 42);
EXPECT_FALSE(include_subdomains);
}
TEST_F(TransportSecurityStateTest, ValidHeaders) {
int max_age = 42;
bool include_subdomains = true;
EXPECT_TRUE(TransportSecurityState::ParseHeader(
"max-age=243", &max_age, &include_subdomains));
EXPECT_EQ(max_age, 243);
EXPECT_FALSE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
" Max-agE = 567", &max_age, &include_subdomains));
EXPECT_EQ(max_age, 567);
EXPECT_FALSE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
" mAx-aGe = 890 ", &max_age, &include_subdomains));
EXPECT_EQ(max_age, 890);
EXPECT_FALSE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
"max-age=123;incLudesUbdOmains", &max_age, &include_subdomains));
EXPECT_EQ(max_age, 123);
EXPECT_TRUE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
"max-age=394082; incLudesUbdOmains", &max_age, &include_subdomains));
EXPECT_EQ(max_age, 394082);
EXPECT_TRUE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
"max-age=39408299 ;incLudesUbdOmains", &max_age, &include_subdomains));
EXPECT_EQ(max_age,
std::min(TransportSecurityState::kMaxHSTSAgeSecs, 39408299l));
EXPECT_TRUE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
"max-age=394082038 ; incLudesUbdOmains", &max_age, &include_subdomains));
EXPECT_EQ(max_age,
std::min(TransportSecurityState::kMaxHSTSAgeSecs, 394082038l));
EXPECT_TRUE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
" max-age=0 ; incLudesUbdOmains ", &max_age, &include_subdomains));
EXPECT_EQ(max_age, 0);
EXPECT_TRUE(include_subdomains);
EXPECT_TRUE(TransportSecurityState::ParseHeader(
" max-age=999999999999999999999999999999999999999999999 ;"
" incLudesUbdOmains ",
&max_age, &include_subdomains));
EXPECT_EQ(max_age, TransportSecurityState::kMaxHSTSAgeSecs);
EXPECT_TRUE(include_subdomains);
}
TEST_F(TransportSecurityStateTest, SimpleMatches) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
const base::Time current_time(base::Time::Now());
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "google.com"));
domain_state.expiry = expiry;
state->EnableHost("google.com", domain_state);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "google.com"));
}
TEST_F(TransportSecurityStateTest, MatchesCase1) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
const base::Time current_time(base::Time::Now());
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "google.com"));
domain_state.expiry = expiry;
state->EnableHost("GOOgle.coM", domain_state);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "google.com"));
}
TEST_F(TransportSecurityStateTest, MatchesCase2) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
const base::Time current_time(base::Time::Now());
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "GOOgle.coM"));
domain_state.expiry = expiry;
state->EnableHost("google.com", domain_state);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "GOOgle.coM"));
}
TEST_F(TransportSecurityStateTest, SubdomainMatches) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
const base::Time current_time(base::Time::Now());
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "google.com"));
domain_state.expiry = expiry;
domain_state.include_subdomains = true;
state->EnableHost("google.com", domain_state);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "google.com"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "foo.google.com"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "foo.bar.google.com"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state,
"foo.bar.baz.google.com"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "com"));
}
TEST_F(TransportSecurityStateTest, Serialise1) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
std::string output;
bool dirty;
state->Serialise(&output);
EXPECT_TRUE(state->Deserialise(output, &dirty));
EXPECT_FALSE(dirty);
}
TEST_F(TransportSecurityStateTest, Serialise2) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
const base::Time current_time(base::Time::Now());
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "google.com"));
domain_state.mode = TransportSecurityState::DomainState::MODE_STRICT;
domain_state.expiry = expiry;
domain_state.include_subdomains = true;
state->EnableHost("google.com", domain_state);
std::string output;
bool dirty;
state->Serialise(&output);
EXPECT_TRUE(state->Deserialise(output, &dirty));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "google.com"));
EXPECT_EQ(domain_state.mode, TransportSecurityState::DomainState::MODE_STRICT);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "foo.google.com"));
EXPECT_EQ(domain_state.mode, TransportSecurityState::DomainState::MODE_STRICT);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "foo.bar.google.com"));
EXPECT_EQ(domain_state.mode, TransportSecurityState::DomainState::MODE_STRICT);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state,
"foo.bar.baz.google.com"));
EXPECT_EQ(domain_state.mode, TransportSecurityState::DomainState::MODE_STRICT);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "com"));
}
TEST_F(TransportSecurityStateTest, Serialise3) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
const base::Time current_time(base::Time::Now());
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "google.com"));
domain_state.mode = TransportSecurityState::DomainState::MODE_OPPORTUNISTIC;
domain_state.expiry = expiry;
state->EnableHost("google.com", domain_state);
std::string output;
bool dirty;
state->Serialise(&output);
EXPECT_TRUE(state->Deserialise(output, &dirty));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "google.com"));
EXPECT_EQ(domain_state.mode,
TransportSecurityState::DomainState::MODE_OPPORTUNISTIC);
}
TEST_F(TransportSecurityStateTest, DeleteSince) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
const base::Time current_time(base::Time::Now());
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000);
const base::Time older = current_time - base::TimeDelta::FromSeconds(1000);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "google.com"));
domain_state.mode = TransportSecurityState::DomainState::MODE_STRICT;
domain_state.expiry = expiry;
state->EnableHost("google.com", domain_state);
state->DeleteSince(expiry);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "google.com"));
state->DeleteSince(older);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "google.com"));
}
TEST_F(TransportSecurityStateTest, SerialiseOld) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
// This is an old-style piece of transport state JSON, which has no creation
// date.
std::string output =
"{ "
"\"NiyD+3J1r6z1wjl2n1ALBu94Zj9OsEAMo0kCN8js0Uk=\": {"
"\"expiry\": 1266815027.983453, "
"\"include_subdomains\": false, "
"\"mode\": \"strict\" "
"}"
"}";
bool dirty;
EXPECT_TRUE(state->Deserialise(output, &dirty));
EXPECT_TRUE(dirty);
}
TEST_F(TransportSecurityStateTest, IsPreloaded) {
const std::string paypal =
TransportSecurityState::CanonicaliseHost("paypal.com");
const std::string www_paypal =
TransportSecurityState::CanonicaliseHost("www.paypal.com");
const std::string a_www_paypal =
TransportSecurityState::CanonicaliseHost("a.www.paypal.com");
const std::string abc_paypal =
TransportSecurityState::CanonicaliseHost("a.b.c.paypal.com");
const std::string example =
TransportSecurityState::CanonicaliseHost("example.com");
const std::string aypal =
TransportSecurityState::CanonicaliseHost("aypal.com");
bool b;
EXPECT_FALSE(TransportSecurityState::IsPreloadedSTS(paypal, &b));
EXPECT_TRUE(TransportSecurityState::IsPreloadedSTS(www_paypal, &b));
EXPECT_FALSE(b);
EXPECT_FALSE(TransportSecurityState::IsPreloadedSTS(a_www_paypal, &b));
EXPECT_FALSE(TransportSecurityState::IsPreloadedSTS(abc_paypal, &b));
EXPECT_FALSE(TransportSecurityState::IsPreloadedSTS(example, &b));
EXPECT_FALSE(TransportSecurityState::IsPreloadedSTS(aypal, &b));
}
TEST_F(TransportSecurityStateTest, Preloaded) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
TransportSecurityState::DomainState domain_state;
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "paypal.com"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "www.paypal.com"));
EXPECT_EQ(domain_state.mode,
TransportSecurityState::DomainState::MODE_STRICT);
EXPECT_FALSE(domain_state.include_subdomains);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "www2.paypal.com"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "a.www.paypal.com"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "elanex.biz"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "www.elanex.biz"));
EXPECT_EQ(domain_state.mode,
TransportSecurityState::DomainState::MODE_STRICT);
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "foo.elanex.biz"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "a.foo.elanex.biz"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "sunshinepress.org"));
EXPECT_EQ(domain_state.mode,
TransportSecurityState::DomainState::MODE_STRICT);
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "www.sunshinepress.org"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "a.b.sunshinepress.org"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "www.noisebridge.net"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "noisebridge.net"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "foo.noisebridge.net"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "neg9.org"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "www.neg9.org"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "riseup.net"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "foo.riseup.net"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "factor.cc"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "www.factor.cc"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "members.mayfirst.org"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "support.mayfirst.org"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "id.mayfirst.org"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "lists.mayfirst.org"));
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, "www.mayfirst.org"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "splendidbacon.com"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "www.splendidbacon.com"));
EXPECT_TRUE(state->IsEnabledForHost(&domain_state, "foo.splendidbacon.com"));
}
TEST_F(TransportSecurityStateTest, LongNames) {
scoped_refptr<TransportSecurityState> state(
new TransportSecurityState);
const char kLongName[] =
"lookupByWaveIdHashAndWaveIdIdAndWaveIdDomainAndWaveletIdIdAnd"
"WaveletIdDomainAndBlipBlipid";
TransportSecurityState::DomainState domain_state;
// Just checks that we don't hit a NOTREACHED.
EXPECT_FALSE(state->IsEnabledForHost(&domain_state, kLongName));
}
} // namespace net