summaryrefslogtreecommitdiffstats
path: root/netwerk/test/unit/test_redirect_baduri.js
blob: e3f4754344ff17a3d7307bf3fd24fdc6112bdcd1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
"use strict";

const { HttpServer } = ChromeUtils.import("resource://testing-common/httpd.js");

/*
 * Test whether we fail bad URIs in HTTP redirect as CORRUPTED_CONTENT.
 */

var httpServer = null;

var BadRedirectPath = "/BadRedirect";
XPCOMUtils.defineLazyGetter(this, "BadRedirectURI", function () {
  return (
    "http://localhost:" + httpServer.identity.primaryPort + BadRedirectPath
  );
});

function make_channel(url, callback, ctx) {
  return NetUtil.newChannel({ uri: url, loadUsingSystemPrincipal: true });
}

function BadRedirectHandler(metadata, response) {
  response.setStatusLine(metadata.httpVersion, 301, "Moved");
  // '>' in URI will fail to parse: we should not render response
  response.setHeader("Location", "http://localhost:4444>BadRedirect", false);
}

function checkFailed(request, buffer) {
  Assert.equal(request.status, Cr.NS_ERROR_CORRUPTED_CONTENT);

  httpServer.stop(do_test_finished);
}

function run_test() {
  httpServer = new HttpServer();
  httpServer.registerPathHandler(BadRedirectPath, BadRedirectHandler);
  httpServer.start(-1);

  var chan = make_channel(BadRedirectURI);
  chan.asyncOpen(new ChannelListener(checkFailed, null, CL_EXPECT_FAILURE));
  do_test_pending();
}