Mypal/netwerk/test/unit/test_redirect_baduri.js
2019-03-11 13:26:37 +03:00

43 lines
1.2 KiB
JavaScript

Cu.import("resource://testing-common/httpd.js");
Cu.import("resource://gre/modules/NetUtil.jsm");
/*
* Test whether we fail bad URIs in HTTP redirect as CORRUPTED_CONTENT.
*/
var httpServer = null;
var BadRedirectPath = "/BadRedirect";
XPCOMUtils.defineLazyGetter(this, "BadRedirectURI", function() {
return "http://localhost:" + httpServer.identity.primaryPort + BadRedirectPath;
});
function make_channel(url, callback, ctx) {
return NetUtil.newChannel({uri: url, loadUsingSystemPrincipal: true});
}
function BadRedirectHandler(metadata, response)
{
response.setStatusLine(metadata.httpVersion, 301, "Moved");
// '>' in URI will fail to parse: we should not render response
response.setHeader("Location", 'http://localhost:4444>BadRedirect', false);
}
function checkFailed(request, buffer)
{
do_check_eq(request.status, Components.results.NS_ERROR_CORRUPTED_CONTENT);
httpServer.stop(do_test_finished);
}
function run_test()
{
httpServer = new HttpServer();
httpServer.registerPathHandler(BadRedirectPath, BadRedirectHandler);
httpServer.start(-1);
var chan = make_channel(BadRedirectURI);
chan.asyncOpen2(new ChannelListener(checkFailed, null, CL_EXPECT_FAILURE));
do_test_pending();
}