1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
|
<?php
/**
* @group Broken
*/
class HttpTest extends MediaWikiTestCase {
/**
* @dataProvider cookieDomains
*/
function testValidateCookieDomain( $expected, $domain, $origin = null ) {
if ( $origin ) {
$ok = Cookie::validateCookieDomain( $domain, $origin );
$msg = "$domain against origin $origin";
} else {
$ok = Cookie::validateCookieDomain( $domain );
$msg = "$domain";
}
$this->assertEquals( $expected, $ok, $msg );
}
function cookieDomains() {
return array(
array( false, "org"),
array( false, ".org"),
array( true, "wikipedia.org"),
array( true, ".wikipedia.org"),
array( false, "co.uk" ),
array( false, ".co.uk" ),
array( false, "gov.uk" ),
array( false, ".gov.uk" ),
array( true, "supermarket.uk" ),
array( false, "uk" ),
array( false, ".uk" ),
array( false, "127.0.0." ),
array( false, "127." ),
array( false, "127.0.0.1." ),
array( true, "127.0.0.1" ),
array( false, "333.0.0.1" ),
array( true, "example.com" ),
array( false, "example.com." ),
array( true, ".example.com" ),
array( true, ".example.com", "www.example.com" ),
array( false, "example.com", "www.example.com" ),
array( true, "127.0.0.1", "127.0.0.1" ),
array( false, "127.0.0.1", "localhost" ),
);
}
/**
* Test Http::isValidURI()
* @bug 27854 : Http::isValidURI is too lax
* @dataProvider provideURI
*/
function testIsValidUri( $expect, $URI, $message = '' ) {
$this->assertEquals(
$expect,
(bool) Http::isValidURI( $URI ),
$message
);
}
/**
* Feeds URI to test a long regular expression in Http::isValidURI
*/
function provideURI() {
/** Format: 'boolean expectation', 'URI to test', 'Optional message' */
return array(
array( false, '¿non sens before!! http://a', 'Allow anything before URI' ),
# (http|https) - only two schemes allowed
array( true, 'http://www.example.org/' ),
array( true, 'https://www.example.org/' ),
array( true, 'http://www.example.org', 'URI without directory' ),
array( true, 'http://a', 'Short name' ),
array( true, 'http://étoile', 'Allow UTF-8 in hostname' ), # 'étoile' is french for 'star'
array( false, '\\host\directory', 'CIFS share' ),
array( false, 'gopher://host/dir', 'Reject gopher scheme' ),
array( false, 'telnet://host', 'Reject telnet scheme' ),
# :\/\/ - double slashes
array( false, 'http//example.org', 'Reject missing colon in protocol' ),
array( false, 'http:/example.org', 'Reject missing slash in protocol' ),
array( false, 'http:example.org', 'Must have two slashes' ),
# Following fail since hostname can be made of anything
array( false, 'http:///example.org', 'Must have exactly two slashes, not three' ),
# (\w+:{0,1}\w*@)? - optional user:pass
array( true, 'http://user@host', 'Username provided' ),
array( true, 'http://user:@host', 'Username provided, no password' ),
array( true, 'http://user:pass@host', 'Username and password provided' ),
# (\S+) - host part is made of anything not whitespaces
array( false, 'http://!"èèè¿¿¿~~\'', 'hostname is made of any non whitespace' ),
array( false, 'http://exam:ple.org/', 'hostname can not use colons!' ),
# (:[0-9]+)? - port number
array( true, 'http://example.org:80/' ),
array( true, 'https://example.org:80/' ),
array( true, 'http://example.org:443/' ),
array( true, 'https://example.org:443/' ),
# Part after the hostname is / or / with something else
array( true, 'http://example/#' ),
array( true, 'http://example/!' ),
array( true, 'http://example/:' ),
array( true, 'http://example/.' ),
array( true, 'http://example/?' ),
array( true, 'http://example/+' ),
array( true, 'http://example/=' ),
array( true, 'http://example/&' ),
array( true, 'http://example/%' ),
array( true, 'http://example/@' ),
array( true, 'http://example/-' ),
array( true, 'http://example//' ),
array( true, 'http://example/&' ),
# Fragment
array( true, 'http://exam#ple.org', ), # This one is valid, really!
array( true, 'http://example.org:80#anchor' ),
array( true, 'http://example.org/?id#anchor' ),
array( true, 'http://example.org/?#anchor' ),
array( false, 'http://a ¿non !!sens after', 'Allow anything after URI' ),
);
}
/**
* Warning:
*
* These tests are for code that makes use of an artifact of how CURL
* handles header reporting on redirect pages, and will need to be
* rewritten when bug 29232 is taken care of (high-level handling of
* HTTP redirects).
*/
function testRelativeRedirections() {
$h = new MWHttpRequestTester( 'http://oldsite/file.ext' );
# Forge a Location header
$h->setRespHeaders( 'location', array(
'http://newsite/file.ext',
'/newfile.ext',
)
);
# Verify we correctly fix the Location
$this->assertEquals(
'http://newsite/newfile.ext',
$h->getFinalUrl(),
"Relative file path Location: interpreted as full URL"
);
$h->setRespHeaders( 'location', array(
'https://oldsite/file.ext'
)
);
$this->assertEquals(
'https://oldsite/file.ext',
$h->getFinalUrl(),
"Location to the HTTPS version of the site"
);
$h->setRespHeaders( 'location', array(
'/anotherfile.ext',
'http://anotherfile/hoster.ext',
'https://anotherfile/hoster.ext'
)
);
$this->assertEquals(
'https://anotherfile/hoster.ext',
$h->getFinalUrl( "Relative file path Location: should keep the latest host and scheme!")
);
}
}
/**
* Class to let us overwrite MWHttpREquest respHeaders variable
*/
class MWHttpRequestTester extends MWHttpRequest {
function setRespHeaders( $name, $value ) {
$this->respHeaders[$name] = $value ;
}
}
|