diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
commit | 26a029d407be480d791972afb5975cf62c9360a6 (patch) | |
tree | f435a8308119effd964b339f76abb83a57c29483 /netwerk/test/unit/test_redirect_failure.js | |
parent | Initial commit. (diff) | |
download | firefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz firefox-26a029d407be480d791972afb5975cf62c9360a6.zip |
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'netwerk/test/unit/test_redirect_failure.js')
-rw-r--r-- | netwerk/test/unit/test_redirect_failure.js | 59 |
1 files changed, 59 insertions, 0 deletions
diff --git a/netwerk/test/unit/test_redirect_failure.js b/netwerk/test/unit/test_redirect_failure.js new file mode 100644 index 0000000000..28b4668580 --- /dev/null +++ b/netwerk/test/unit/test_redirect_failure.js @@ -0,0 +1,59 @@ +"use strict"; + +const { HttpServer } = ChromeUtils.importESModule( + "resource://testing-common/httpd.sys.mjs" +); + +/* + * The test is checking async redirect code path that is loading a + * redirect. But creation of the target channel fails before we even try + * to do async open on it. We force the creation error by forbidding + * the port number the URI contains. + */ + +function inChildProcess() { + return Services.appinfo.processType != Ci.nsIXULRuntime.PROCESS_TYPE_DEFAULT; +} + +ChromeUtils.defineLazyGetter(this, "URL", function () { + return "http://localhost:" + httpServer.identity.primaryPort; +}); + +var httpServer = null; +// Need to randomize, because apparently no one clears our cache +var randomPath = "/redirect/" + Math.random(); + +ChromeUtils.defineLazyGetter(this, "randomURI", function () { + return URL + randomPath; +}); + +function make_channel(url, callback, ctx) { + return NetUtil.newChannel({ uri: url, loadUsingSystemPrincipal: true }); +} + +function redirectHandler(metadata, response) { + response.setStatusLine(metadata.httpVersion, 301, "Moved"); + response.setHeader("Location", "http://non-existent.tld:65400", false); + response.setHeader("Cache-Control", "no-cache", false); +} + +function finish_test(request, buffer) { + Assert.equal(request.status, Cr.NS_ERROR_PORT_ACCESS_NOT_ALLOWED); + + Assert.equal(buffer, ""); + httpServer.stop(do_test_finished); +} + +function run_test() { + httpServer = new HttpServer(); + httpServer.registerPathHandler(randomPath, redirectHandler); + httpServer.start(-1); + + if (!inChildProcess()) { + Services.prefs.setCharPref("network.security.ports.banned", "65400"); + } + + var chan = make_channel(randomURI); + chan.asyncOpen(new ChannelListener(finish_test, null, CL_EXPECT_FAILURE)); + do_test_pending(); +} |