summaryrefslogtreecommitdiffstats
path: root/netwerk/test/unit/test_bug412457.js
blob: dd4358413e6c63d76003496577bbe8ec7b09c198 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
function run_test() {
  var ios = Cc["@mozilla.org/network/io-service;1"].
    getService(Ci.nsIIOService);

  // check if hostname is unescaped before applying IDNA
  var newURI = ios.newURI("http://\u5341%2ecom/", null, null);
  do_check_eq(newURI.asciiHost, "xn--kkr.com");

  // escaped UTF8
  newURI.spec = "http://%e5%8d%81.com";
  do_check_eq(newURI.asciiHost, "xn--kkr.com");

  // There should be only allowed characters in hostname after
  // unescaping and attempting to apply IDNA. "\x80" is illegal in
  // UTF-8, so IDNA fails, and 0x80 is illegal in DNS too.
  Assert.throws(() => { newURI.spec = "http://%80.com"; }, "illegal UTF character");

  // test parsing URL with all possible host terminators
  newURI.spec = "http://example.com?foo";
  do_check_eq(newURI.asciiHost, "example.com");

  newURI.spec = "http://example.com#foo";
  do_check_eq(newURI.asciiHost, "example.com");

  newURI.spec = "http://example.com:80";
  do_check_eq(newURI.asciiHost, "example.com");

  newURI.spec = "http://example.com/foo";
  do_check_eq(newURI.asciiHost, "example.com");

  // Characters that are invalid in the host, shouldn't be decoded.
  newURI.spec = "http://example.com%3ffoo";
  do_check_eq(newURI.asciiHost, "example.com%3ffoo");
  newURI.spec = "http://example.com%23foo";
  do_check_eq(newURI.asciiHost, "example.com%23foo");
  newURI.spec = "http://example.com%3bfoo";
  do_check_eq(newURI.asciiHost, "example.com%3bfoo");
  newURI.spec = "http://example.com%3a80";
  do_check_eq(newURI.asciiHost, "example.com%3a80");
  newURI.spec = "http://example.com%2ffoo";
  do_check_eq(newURI.asciiHost, "example.com%2ffoo");
  newURI.spec = "http://example.com%00";
  do_check_eq(newURI.asciiHost, "example.com%00");
}