diff options
Diffstat (limited to 'netwerk/test/unit/test_redirect_baduri.js')
-rw-r--r-- | netwerk/test/unit/test_redirect_baduri.js | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/netwerk/test/unit/test_redirect_baduri.js b/netwerk/test/unit/test_redirect_baduri.js new file mode 100644 index 000000000..aa1ce7dc4 --- /dev/null +++ b/netwerk/test/unit/test_redirect_baduri.js @@ -0,0 +1,42 @@ +Cu.import("resource://testing-common/httpd.js"); +Cu.import("resource://gre/modules/NetUtil.jsm"); + +/* + * Test whether we fail bad URIs in HTTP redirect as CORRUPTED_CONTENT. + */ + +var httpServer = null; + +var BadRedirectPath = "/BadRedirect"; +XPCOMUtils.defineLazyGetter(this, "BadRedirectURI", function() { + return "http://localhost:" + httpServer.identity.primaryPort + BadRedirectPath; +}); + +function make_channel(url, callback, ctx) { + return NetUtil.newChannel({uri: url, loadUsingSystemPrincipal: true}); +} + +function BadRedirectHandler(metadata, response) +{ + response.setStatusLine(metadata.httpVersion, 301, "Moved"); + // '>' in URI will fail to parse: we should not render response + response.setHeader("Location", 'http://localhost:4444>BadRedirect', false); +} + +function checkFailed(request, buffer) +{ + do_check_eq(request.status, Components.results.NS_ERROR_CORRUPTED_CONTENT); + + httpServer.stop(do_test_finished); +} + +function run_test() +{ + httpServer = new HttpServer(); + httpServer.registerPathHandler(BadRedirectPath, BadRedirectHandler); + httpServer.start(-1); + + var chan = make_channel(BadRedirectURI); + chan.asyncOpen2(new ChannelListener(checkFailed, null, CL_EXPECT_FAILURE)); + do_test_pending(); +} |