summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/tests/unit/test_sts_fqdn.js
blob: 3c136a9d99ce5ac40fd59609caee078823a0874f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/.
 */
"use strict";

function run_test() {
  let SSService = Cc["@mozilla.org/ssservice;1"].getService(
    Ci.nsISiteSecurityService
  );
  let uri = Services.io.newURI("https://example.com");
  let uri1 = Services.io.newURI("https://example.com.");
  let uri2 = Services.io.newURI("https://example.com..");
  ok(!SSService.isSecureURI(uri));
  ok(!SSService.isSecureURI(uri1));
  // These cases are only relevant as long as bug 1118522 hasn't been fixed.
  ok(!SSService.isSecureURI(uri2));

  SSService.processHeader(uri, "max-age=1000;includeSubdomains");
  ok(SSService.isSecureURI(uri));
  ok(SSService.isSecureURI(uri1));
  ok(SSService.isSecureURI(uri2));

  SSService.resetState(uri);
  ok(!SSService.isSecureURI(uri));
  ok(!SSService.isSecureURI(uri1));
  ok(!SSService.isSecureURI(uri2));

  // Somehow creating this malformed URI succeeds - we need to handle it
  // gracefully.
  uri = Services.io.newURI("https://../foo");
  equal(uri.host, "..");
  throws(
    () => {
      SSService.isSecureURI(uri);
    },
    /NS_ERROR_UNEXPECTED/,
    "Malformed URI should be rejected"
  );
}