diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /netwerk/test/unit/test_bug412457.js | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'netwerk/test/unit/test_bug412457.js')
-rw-r--r-- | netwerk/test/unit/test_bug412457.js | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/netwerk/test/unit/test_bug412457.js b/netwerk/test/unit/test_bug412457.js new file mode 100644 index 000000000..dd4358413 --- /dev/null +++ b/netwerk/test/unit/test_bug412457.js @@ -0,0 +1,44 @@ +function run_test() { + var ios = Cc["@mozilla.org/network/io-service;1"]. + getService(Ci.nsIIOService); + + // check if hostname is unescaped before applying IDNA + var newURI = ios.newURI("http://\u5341%2ecom/", null, null); + do_check_eq(newURI.asciiHost, "xn--kkr.com"); + + // escaped UTF8 + newURI.spec = "http://%e5%8d%81.com"; + do_check_eq(newURI.asciiHost, "xn--kkr.com"); + + // There should be only allowed characters in hostname after + // unescaping and attempting to apply IDNA. "\x80" is illegal in + // UTF-8, so IDNA fails, and 0x80 is illegal in DNS too. + Assert.throws(() => { newURI.spec = "http://%80.com"; }, "illegal UTF character"); + + // test parsing URL with all possible host terminators + newURI.spec = "http://example.com?foo"; + do_check_eq(newURI.asciiHost, "example.com"); + + newURI.spec = "http://example.com#foo"; + do_check_eq(newURI.asciiHost, "example.com"); + + newURI.spec = "http://example.com:80"; + do_check_eq(newURI.asciiHost, "example.com"); + + newURI.spec = "http://example.com/foo"; + do_check_eq(newURI.asciiHost, "example.com"); + + // Characters that are invalid in the host, shouldn't be decoded. + newURI.spec = "http://example.com%3ffoo"; + do_check_eq(newURI.asciiHost, "example.com%3ffoo"); + newURI.spec = "http://example.com%23foo"; + do_check_eq(newURI.asciiHost, "example.com%23foo"); + newURI.spec = "http://example.com%3bfoo"; + do_check_eq(newURI.asciiHost, "example.com%3bfoo"); + newURI.spec = "http://example.com%3a80"; + do_check_eq(newURI.asciiHost, "example.com%3a80"); + newURI.spec = "http://example.com%2ffoo"; + do_check_eq(newURI.asciiHost, "example.com%2ffoo"); + newURI.spec = "http://example.com%00"; + do_check_eq(newURI.asciiHost, "example.com%00"); +}
\ No newline at end of file |