| 1 | /* |
| 2 | * Copyright (C) 2011 Igalia S.L. |
| 3 | * |
| 4 | * This library is free software; you can redistribute it and/or |
| 5 | * modify it under the terms of the GNU Lesser General Public |
| 6 | * License as published by the Free Software Foundation; either |
| 7 | * version 2,1 of the License, or (at your option) any later version. |
| 8 | * |
| 9 | * This library is distributed in the hope that it will be useful, |
| 10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 12 | * Library General Public License for more details. |
| 13 | * |
| 14 | * You should have received a copy of the GNU Library General Public License |
| 15 | * along with this library; see the file COPYING.LIB. If not, write to |
| 16 | * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, |
| 17 | * Boston, MA 02110-1301, USA. |
| 18 | */ |
| 19 | |
| 20 | #include "config.h" |
| 21 | |
| 22 | #include "LoadTrackingTest.h" |
| 23 | #include "WebKitTestServer.h" |
| 24 | #include <limits.h> |
| 25 | #include <stdlib.h> |
| 26 | #include <wtf/HashMap.h> |
| 27 | #include <wtf/glib/GRefPtr.h> |
| 28 | #include <wtf/glib/GUniquePtr.h> |
| 29 | #include <wtf/text/StringBuilder.h> |
| 30 | #include <wtf/text/StringHash.h> |
| 31 | |
| 32 | static WebKitTestServer* kServer; |
| 33 | |
| 34 | static void testWebContextDefault(Test* test, gconstpointer) |
| 35 | { |
| 36 | // Check there's a single instance of the default web context. |
| 37 | g_assert_true(webkit_web_context_get_default() == webkit_web_context_get_default()); |
| 38 | g_assert_true(webkit_web_context_get_default() != test->m_webContext.get()); |
| 39 | } |
| 40 | |
| 41 | static void testWebContextEphemeral(Test* test, gconstpointer) |
| 42 | { |
| 43 | // By default web contexts are not ephemeral. |
| 44 | g_assert_false(webkit_web_context_is_ephemeral(webkit_web_context_get_default())); |
| 45 | g_assert_false(webkit_web_context_is_ephemeral(test->m_webContext.get())); |
| 46 | |
| 47 | WebKitWebsiteDataManager* manager = webkit_web_context_get_website_data_manager(webkit_web_context_get_default()); |
| 48 | g_assert_true(WEBKIT_IS_WEBSITE_DATA_MANAGER(manager)); |
| 49 | g_assert_false(webkit_website_data_manager_is_ephemeral(manager)); |
| 50 | manager = webkit_web_context_get_website_data_manager(test->m_webContext.get()); |
| 51 | g_assert_true(WEBKIT_IS_WEBSITE_DATA_MANAGER(manager)); |
| 52 | g_assert_false(webkit_website_data_manager_is_ephemeral(manager)); |
| 53 | |
| 54 | auto webView = Test::adoptView(Test::createWebView()); |
| 55 | g_assert_false(webkit_web_view_is_ephemeral(webView.get())); |
| 56 | g_assert_true(webkit_web_view_get_website_data_manager(webView.get()) == webkit_web_context_get_website_data_manager(webkit_web_context_get_default())); |
| 57 | |
| 58 | webView = Test::adoptView(Test::createWebView(test->m_webContext.get())); |
| 59 | g_assert_false(webkit_web_view_is_ephemeral(webView.get())); |
| 60 | g_assert_true(webkit_web_view_get_website_data_manager(webView.get()) == manager); |
| 61 | |
| 62 | GRefPtr<WebKitWebContext> context = adoptGRef(webkit_web_context_new_ephemeral()); |
| 63 | g_assert_true(webkit_web_context_is_ephemeral(context.get())); |
| 64 | manager = webkit_web_context_get_website_data_manager(context.get()); |
| 65 | g_assert_true(WEBKIT_IS_WEBSITE_DATA_MANAGER(manager)); |
| 66 | g_assert_true(webkit_website_data_manager_is_ephemeral(manager)); |
| 67 | g_assert_true(webkit_web_view_get_website_data_manager(webView.get()) != manager); |
| 68 | |
| 69 | webView = Test::adoptView(Test::createWebView(context.get())); |
| 70 | g_assert_true(webkit_web_view_is_ephemeral(webView.get())); |
| 71 | g_assert_true(webkit_web_view_get_website_data_manager(webView.get()) == manager); |
| 72 | |
| 73 | GRefPtr<WebKitWebsiteDataManager> ephemeralManager = adoptGRef(webkit_website_data_manager_new_ephemeral()); |
| 74 | g_assert_true(webkit_website_data_manager_is_ephemeral(ephemeralManager.get())); |
| 75 | context = adoptGRef(webkit_web_context_new_with_website_data_manager(ephemeralManager.get())); |
| 76 | g_assert_true(webkit_web_context_is_ephemeral(context.get())); |
| 77 | } |
| 78 | |
| 79 | #if ENABLE(NETSCAPE_PLUGIN_API) |
| 80 | class PluginsTest: public Test { |
| 81 | public: |
| 82 | MAKE_GLIB_TEST_FIXTURE(PluginsTest); |
| 83 | |
| 84 | PluginsTest() |
| 85 | : m_mainLoop(g_main_loop_new(nullptr, TRUE)) |
| 86 | , m_plugins(nullptr) |
| 87 | { |
| 88 | webkit_web_context_set_additional_plugins_directory(m_webContext.get(), WEBKIT_TEST_PLUGIN_DIR); |
| 89 | } |
| 90 | |
| 91 | ~PluginsTest() |
| 92 | { |
| 93 | g_main_loop_unref(m_mainLoop); |
| 94 | g_list_free_full(m_plugins, g_object_unref); |
| 95 | } |
| 96 | |
| 97 | static void getPluginsAsyncReadyCallback(GObject*, GAsyncResult* result, PluginsTest* test) |
| 98 | { |
| 99 | test->m_plugins = webkit_web_context_get_plugins_finish(test->m_webContext.get(), result, nullptr); |
| 100 | g_main_loop_quit(test->m_mainLoop); |
| 101 | } |
| 102 | |
| 103 | GList* getPlugins() |
| 104 | { |
| 105 | g_list_free_full(m_plugins, g_object_unref); |
| 106 | webkit_web_context_get_plugins(m_webContext.get(), nullptr, reinterpret_cast<GAsyncReadyCallback>(getPluginsAsyncReadyCallback), this); |
| 107 | g_main_loop_run(m_mainLoop); |
| 108 | return m_plugins; |
| 109 | } |
| 110 | |
| 111 | GMainLoop* m_mainLoop; |
| 112 | GList* m_plugins; |
| 113 | }; |
| 114 | |
| 115 | static void testWebContextGetPlugins(PluginsTest* test, gconstpointer) |
| 116 | { |
| 117 | GList* plugins = test->getPlugins(); |
| 118 | g_assert_nonnull(plugins); |
| 119 | |
| 120 | GRefPtr<WebKitPlugin> testPlugin; |
| 121 | for (GList* item = plugins; item; item = g_list_next(item)) { |
| 122 | WebKitPlugin* plugin = WEBKIT_PLUGIN(item->data); |
| 123 | test->assertObjectIsDeletedWhenTestFinishes(G_OBJECT(plugin)); |
| 124 | if (!g_strcmp0(webkit_plugin_get_name(plugin), "WebKit Test PlugIn" )) { |
| 125 | testPlugin = plugin; |
| 126 | break; |
| 127 | } |
| 128 | } |
| 129 | g_assert_true(WEBKIT_IS_PLUGIN(testPlugin.get())); |
| 130 | |
| 131 | char normalizedPath[PATH_MAX]; |
| 132 | g_assert_nonnull(realpath(WEBKIT_TEST_PLUGIN_DIR, normalizedPath)); |
| 133 | GUniquePtr<char> pluginPath(g_build_filename(normalizedPath, "libTestNetscapePlugIn.so" , nullptr)); |
| 134 | g_assert_cmpstr(webkit_plugin_get_path(testPlugin.get()), ==, pluginPath.get()); |
| 135 | g_assert_cmpstr(webkit_plugin_get_description(testPlugin.get()), ==, "Simple Netscape® plug-in that handles test content for WebKit" ); |
| 136 | GList* mimeInfoList = webkit_plugin_get_mime_info_list(testPlugin.get()); |
| 137 | g_assert_nonnull(mimeInfoList); |
| 138 | g_assert_cmpuint(g_list_length(mimeInfoList), ==, 2); |
| 139 | |
| 140 | WebKitMimeInfo* mimeInfo = static_cast<WebKitMimeInfo*>(mimeInfoList->data); |
| 141 | g_assert_cmpstr(webkit_mime_info_get_mime_type(mimeInfo), ==, "image/png" ); |
| 142 | g_assert_cmpstr(webkit_mime_info_get_description(mimeInfo), ==, "png image" ); |
| 143 | const gchar* const* extensions = webkit_mime_info_get_extensions(mimeInfo); |
| 144 | g_assert_nonnull(extensions); |
| 145 | g_assert_cmpstr(extensions[0], ==, "png" ); |
| 146 | |
| 147 | mimeInfoList = g_list_next(mimeInfoList); |
| 148 | mimeInfo = static_cast<WebKitMimeInfo*>(mimeInfoList->data); |
| 149 | g_assert_cmpstr(webkit_mime_info_get_mime_type(mimeInfo), ==, "application/x-webkit-test-netscape" ); |
| 150 | g_assert_cmpstr(webkit_mime_info_get_description(mimeInfo), ==, "test netscape content" ); |
| 151 | extensions = webkit_mime_info_get_extensions(mimeInfo); |
| 152 | g_assert_nonnull(extensions); |
| 153 | g_assert_cmpstr(extensions[0], ==, "testnetscape" ); |
| 154 | } |
| 155 | #endif // ENABLE(NETSCAPE_PLUGIN_API) |
| 156 | |
| 157 | static const char* kBarHTML = "<html><body>Bar</body></html>" ; |
| 158 | static const char* kEchoHTMLFormat = "<html><body>%s</body></html>" ; |
| 159 | static const char* errorDomain = "test" ; |
| 160 | static const int errorCode = 10; |
| 161 | |
| 162 | static const char* genericErrorMessage = "Error message." ; |
| 163 | static const char* beforeReceiveResponseErrorMessage = "Error before didReceiveResponse." ; |
| 164 | static const char* afterInitialChunkErrorMessage = "Error after reading the initial chunk." ; |
| 165 | |
| 166 | class URISchemeTest: public LoadTrackingTest { |
| 167 | public: |
| 168 | MAKE_GLIB_TEST_FIXTURE(URISchemeTest); |
| 169 | |
| 170 | struct URISchemeHandler { |
| 171 | URISchemeHandler() |
| 172 | : replyLength(0) |
| 173 | { |
| 174 | } |
| 175 | |
| 176 | URISchemeHandler(const char* reply, int replyLength, const char* mimeType) |
| 177 | : reply(reply) |
| 178 | , replyLength(replyLength) |
| 179 | , mimeType(mimeType) |
| 180 | { |
| 181 | } |
| 182 | |
| 183 | CString reply; |
| 184 | int replyLength; |
| 185 | CString mimeType; |
| 186 | }; |
| 187 | |
| 188 | static void uriSchemeRequestCallback(WebKitURISchemeRequest* request, gpointer userData) |
| 189 | { |
| 190 | URISchemeTest* test = static_cast<URISchemeTest*>(userData); |
| 191 | test->m_uriSchemeRequest = request; |
| 192 | test->assertObjectIsDeletedWhenTestFinishes(G_OBJECT(request)); |
| 193 | |
| 194 | g_assert_true(webkit_uri_scheme_request_get_web_view(request) == test->m_webView); |
| 195 | |
| 196 | const char* scheme = webkit_uri_scheme_request_get_scheme(request); |
| 197 | g_assert_nonnull(scheme); |
| 198 | g_assert_true(test->m_handlersMap.contains(String::fromUTF8(scheme))); |
| 199 | |
| 200 | const URISchemeHandler& handler = test->m_handlersMap.get(String::fromUTF8(scheme)); |
| 201 | |
| 202 | GRefPtr<GInputStream> inputStream = adoptGRef(g_memory_input_stream_new()); |
| 203 | test->assertObjectIsDeletedWhenTestFinishes(G_OBJECT(inputStream.get())); |
| 204 | |
| 205 | const gchar* requestPath = webkit_uri_scheme_request_get_path(request); |
| 206 | |
| 207 | if (!g_strcmp0(scheme, "error" )) { |
| 208 | if (!g_strcmp0(requestPath, "before-response" )) { |
| 209 | GUniquePtr<GError> error(g_error_new_literal(g_quark_from_string(errorDomain), errorCode, beforeReceiveResponseErrorMessage)); |
| 210 | // We call finish() and then finish_error() to make sure that not even |
| 211 | // the didReceiveResponse message is processed at the time of failing. |
| 212 | webkit_uri_scheme_request_finish(request, G_INPUT_STREAM(inputStream.get()), handler.replyLength, handler.mimeType.data()); |
| 213 | webkit_uri_scheme_request_finish_error(request, error.get()); |
| 214 | } else if (!g_strcmp0(requestPath, "after-first-chunk" )) { |
| 215 | g_memory_input_stream_add_data(G_MEMORY_INPUT_STREAM(inputStream.get()), handler.reply.data(), handler.reply.length(), 0); |
| 216 | webkit_uri_scheme_request_finish(request, inputStream.get(), handler.replyLength, handler.mimeType.data()); |
| 217 | // We need to wait until we reach the load-committed state before calling webkit_uri_scheme_request_finish_error(), |
| 218 | // so we rely on the test using finishOnCommittedAndWaitUntilLoadFinished() to actually call it from loadCommitted(). |
| 219 | } else { |
| 220 | GUniquePtr<GError> error(g_error_new_literal(g_quark_from_string(errorDomain), errorCode, genericErrorMessage)); |
| 221 | webkit_uri_scheme_request_finish_error(request, error.get()); |
| 222 | } |
| 223 | return; |
| 224 | } |
| 225 | |
| 226 | if (!g_strcmp0(scheme, "echo" )) { |
| 227 | char* replyHTML = g_strdup_printf(handler.reply.data(), requestPath); |
| 228 | g_memory_input_stream_add_data(G_MEMORY_INPUT_STREAM(inputStream.get()), replyHTML, strlen(replyHTML), g_free); |
| 229 | } else if (!g_strcmp0(scheme, "closed" )) |
| 230 | g_input_stream_close(inputStream.get(), 0, 0); |
| 231 | else if (!handler.reply.isNull()) |
| 232 | g_memory_input_stream_add_data(G_MEMORY_INPUT_STREAM(inputStream.get()), handler.reply.data(), handler.reply.length(), 0); |
| 233 | |
| 234 | webkit_uri_scheme_request_finish(request, inputStream.get(), handler.replyLength, handler.mimeType.data()); |
| 235 | } |
| 236 | |
| 237 | void registerURISchemeHandler(const char* scheme, const char* reply, int replyLength, const char* mimeType) |
| 238 | { |
| 239 | m_handlersMap.set(String::fromUTF8(scheme), URISchemeHandler(reply, replyLength, mimeType)); |
| 240 | webkit_web_context_register_uri_scheme(m_webContext.get(), scheme, uriSchemeRequestCallback, this, 0); |
| 241 | } |
| 242 | |
| 243 | void loadCommitted() override |
| 244 | { |
| 245 | if (m_finishOnCommitted) { |
| 246 | GUniquePtr<GError> error(g_error_new_literal(g_quark_from_string(errorDomain), errorCode, afterInitialChunkErrorMessage)); |
| 247 | webkit_uri_scheme_request_finish_error(m_uriSchemeRequest.get(), error.get()); |
| 248 | } |
| 249 | |
| 250 | LoadTrackingTest::loadCommitted(); |
| 251 | } |
| 252 | |
| 253 | void finishOnCommittedAndWaitUntilLoadFinished() |
| 254 | { |
| 255 | m_finishOnCommitted = true; |
| 256 | waitUntilLoadFinished(); |
| 257 | m_finishOnCommitted = false; |
| 258 | } |
| 259 | |
| 260 | GRefPtr<WebKitURISchemeRequest> m_uriSchemeRequest; |
| 261 | HashMap<String, URISchemeHandler> m_handlersMap; |
| 262 | bool m_finishOnCommitted { false }; |
| 263 | }; |
| 264 | |
| 265 | String generateHTMLContent(unsigned contentLength) |
| 266 | { |
| 267 | String baseString("abcdefghijklmnopqrstuvwxyz0123457890" ); |
| 268 | unsigned baseLength = baseString.length(); |
| 269 | |
| 270 | StringBuilder builder; |
| 271 | builder.append("<html><body>" ); |
| 272 | |
| 273 | if (contentLength <= baseLength) |
| 274 | builder.append(baseString, 0, contentLength); |
| 275 | else { |
| 276 | unsigned currentLength = 0; |
| 277 | while (currentLength < contentLength) { |
| 278 | if ((currentLength + baseLength) <= contentLength) |
| 279 | builder.append(baseString); |
| 280 | else |
| 281 | builder.append(baseString, 0, contentLength - currentLength); |
| 282 | |
| 283 | // Account for the 12 characters of the '<html><body>' prefix. |
| 284 | currentLength = builder.length() - 12; |
| 285 | } |
| 286 | } |
| 287 | builder.append("</body></html>" ); |
| 288 | |
| 289 | return builder.toString(); |
| 290 | } |
| 291 | |
| 292 | static void testWebContextURIScheme(URISchemeTest* test, gconstpointer) |
| 293 | { |
| 294 | test->registerURISchemeHandler("foo" , kBarHTML, strlen(kBarHTML), "text/html" ); |
| 295 | test->loadURI("foo:blank" ); |
| 296 | test->waitUntilLoadFinished(); |
| 297 | size_t mainResourceDataSize = 0; |
| 298 | const char* mainResourceData = test->mainResourceData(mainResourceDataSize); |
| 299 | g_assert_cmpint(mainResourceDataSize, ==, strlen(kBarHTML)); |
| 300 | g_assert_cmpint(strncmp(mainResourceData, kBarHTML, mainResourceDataSize), ==, 0); |
| 301 | |
| 302 | test->registerURISchemeHandler("echo" , kEchoHTMLFormat, -1, "text/html" ); |
| 303 | test->loadURI("echo:hello-world" ); |
| 304 | test->waitUntilLoadFinished(); |
| 305 | GUniquePtr<char> echoHTML(g_strdup_printf(kEchoHTMLFormat, webkit_uri_scheme_request_get_path(test->m_uriSchemeRequest.get()))); |
| 306 | mainResourceDataSize = 0; |
| 307 | mainResourceData = test->mainResourceData(mainResourceDataSize); |
| 308 | g_assert_cmpint(mainResourceDataSize, ==, strlen(echoHTML.get())); |
| 309 | g_assert_cmpint(strncmp(mainResourceData, echoHTML.get(), mainResourceDataSize), ==, 0); |
| 310 | |
| 311 | test->loadURI("echo:with#fragment" ); |
| 312 | test->waitUntilLoadFinished(); |
| 313 | g_assert_cmpstr(webkit_uri_scheme_request_get_path(test->m_uriSchemeRequest.get()), ==, "with" ); |
| 314 | g_assert_cmpstr(webkit_uri_scheme_request_get_uri(test->m_uriSchemeRequest.get()), ==, "echo:with#fragment" ); |
| 315 | echoHTML.reset(g_strdup_printf(kEchoHTMLFormat, webkit_uri_scheme_request_get_path(test->m_uriSchemeRequest.get()))); |
| 316 | mainResourceDataSize = 0; |
| 317 | mainResourceData = test->mainResourceData(mainResourceDataSize); |
| 318 | g_assert_cmpint(mainResourceDataSize, ==, strlen(echoHTML.get())); |
| 319 | g_assert_cmpint(strncmp(mainResourceData, echoHTML.get(), mainResourceDataSize), ==, 0); |
| 320 | |
| 321 | test->registerURISchemeHandler("nomime" , kBarHTML, -1, 0); |
| 322 | test->m_loadEvents.clear(); |
| 323 | test->loadURI("nomime:foo-bar" ); |
| 324 | test->waitUntilLoadFinished(); |
| 325 | g_assert_true(test->m_loadEvents.contains(LoadTrackingTest::ProvisionalLoadFailed)); |
| 326 | |
| 327 | test->registerURISchemeHandler("empty" , 0, 0, "text/html" ); |
| 328 | test->m_loadEvents.clear(); |
| 329 | test->loadURI("empty:nothing" ); |
| 330 | test->waitUntilLoadFinished(); |
| 331 | g_assert_false(test->m_loadEvents.contains(LoadTrackingTest::ProvisionalLoadFailed)); |
| 332 | g_assert_false(test->m_loadEvents.contains(LoadTrackingTest::LoadFailed)); |
| 333 | |
| 334 | // Anything over 8192 bytes will get multiple calls to g_input_stream_read_async in |
| 335 | // WebKitURISchemeRequest when reading data, but we still need way more than that to |
| 336 | // ensure that we reach the load-committed state before failing, so we use an 8MB HTML. |
| 337 | String longHTMLContent = generateHTMLContent(8 * 1024 * 1024); |
| 338 | test->registerURISchemeHandler("error" , longHTMLContent.utf8().data(), -1, "text/html" ); |
| 339 | test->m_loadEvents.clear(); |
| 340 | test->loadURI("error:error" ); |
| 341 | test->waitUntilLoadFinished(); |
| 342 | g_assert_true(test->m_loadEvents.contains(LoadTrackingTest::ProvisionalLoadFailed)); |
| 343 | g_assert_true(test->m_loadFailed); |
| 344 | g_assert_error(test->m_error.get(), g_quark_from_string(errorDomain), errorCode); |
| 345 | g_assert_cmpstr(test->m_error->message, ==, genericErrorMessage); |
| 346 | |
| 347 | test->m_loadEvents.clear(); |
| 348 | test->loadURI("error:before-response" ); |
| 349 | test->waitUntilLoadFinished(); |
| 350 | g_assert_true(test->m_loadEvents.contains(LoadTrackingTest::ProvisionalLoadFailed)); |
| 351 | g_assert_true(test->m_loadFailed); |
| 352 | g_assert_error(test->m_error.get(), g_quark_from_string(errorDomain), errorCode); |
| 353 | g_assert_cmpstr(test->m_error->message, ==, beforeReceiveResponseErrorMessage); |
| 354 | |
| 355 | test->m_loadEvents.clear(); |
| 356 | test->loadURI("error:after-first-chunk" ); |
| 357 | test->finishOnCommittedAndWaitUntilLoadFinished(); |
| 358 | g_assert_false(test->m_loadEvents.contains(LoadTrackingTest::ProvisionalLoadFailed)); |
| 359 | g_assert_true(test->m_loadEvents.contains(LoadTrackingTest::LoadFailed)); |
| 360 | g_assert_true(test->m_loadFailed); |
| 361 | g_assert_error(test->m_error.get(), g_quark_from_string(errorDomain), errorCode); |
| 362 | g_assert_cmpstr(test->m_error->message, ==, afterInitialChunkErrorMessage); |
| 363 | |
| 364 | test->registerURISchemeHandler("closed" , 0, 0, 0); |
| 365 | test->m_loadEvents.clear(); |
| 366 | test->loadURI("closed:input-stream" ); |
| 367 | test->waitUntilLoadFinished(); |
| 368 | g_assert_true(test->m_loadEvents.contains(LoadTrackingTest::ProvisionalLoadFailed)); |
| 369 | g_assert_true(test->m_loadFailed); |
| 370 | g_assert_error(test->m_error.get(), G_IO_ERROR, G_IO_ERROR_CLOSED); |
| 371 | } |
| 372 | |
| 373 | #if PLATFORM(GTK) |
| 374 | static void testWebContextSpellChecker(Test* test, gconstpointer) |
| 375 | { |
| 376 | WebKitWebContext* webContext = test->m_webContext.get(); |
| 377 | |
| 378 | // Check what happens if no spell checking language has been set. |
| 379 | const gchar* const* currentLanguage = webkit_web_context_get_spell_checking_languages(webContext); |
| 380 | g_assert_null(currentLanguage); |
| 381 | |
| 382 | // Set the language to a specific one. |
| 383 | GRefPtr<GPtrArray> languages = adoptGRef(g_ptr_array_new()); |
| 384 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("en_US" ))); |
| 385 | g_ptr_array_add(languages.get(), 0); |
| 386 | webkit_web_context_set_spell_checking_languages(webContext, reinterpret_cast<const char* const*>(languages->pdata)); |
| 387 | currentLanguage = webkit_web_context_get_spell_checking_languages(webContext); |
| 388 | g_assert_cmpuint(g_strv_length(const_cast<char**>(currentLanguage)), ==, 1); |
| 389 | g_assert_cmpstr(currentLanguage[0], ==, "en_US" ); |
| 390 | |
| 391 | // Set the language string to list of valid languages. |
| 392 | g_ptr_array_remove_index_fast(languages.get(), languages->len - 1); |
| 393 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("en_GB" ))); |
| 394 | g_ptr_array_add(languages.get(), 0); |
| 395 | webkit_web_context_set_spell_checking_languages(webContext, reinterpret_cast<const char* const*>(languages->pdata)); |
| 396 | currentLanguage = webkit_web_context_get_spell_checking_languages(webContext); |
| 397 | g_assert_cmpuint(g_strv_length(const_cast<char**>(currentLanguage)), ==, 2); |
| 398 | g_assert_cmpstr(currentLanguage[0], ==, "en_US" ); |
| 399 | g_assert_cmpstr(currentLanguage[1], ==, "en_GB" ); |
| 400 | |
| 401 | // Try passing a wrong language along with good ones. |
| 402 | g_ptr_array_remove_index_fast(languages.get(), languages->len - 1); |
| 403 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("bd_WR" ))); |
| 404 | g_ptr_array_add(languages.get(), 0); |
| 405 | webkit_web_context_set_spell_checking_languages(webContext, reinterpret_cast<const char* const*>(languages->pdata)); |
| 406 | currentLanguage = webkit_web_context_get_spell_checking_languages(webContext); |
| 407 | g_assert_cmpuint(g_strv_length(const_cast<char**>(currentLanguage)), ==, 2); |
| 408 | g_assert_cmpstr(currentLanguage[0], ==, "en_US" ); |
| 409 | g_assert_cmpstr(currentLanguage[1], ==, "en_GB" ); |
| 410 | |
| 411 | // Try passing a list with only wrong languages. |
| 412 | languages = adoptGRef(g_ptr_array_new()); |
| 413 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("bd_WR" ))); |
| 414 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("wr_BD" ))); |
| 415 | g_ptr_array_add(languages.get(), 0); |
| 416 | webkit_web_context_set_spell_checking_languages(webContext, reinterpret_cast<const char* const*>(languages->pdata)); |
| 417 | currentLanguage = webkit_web_context_get_spell_checking_languages(webContext); |
| 418 | g_assert_null(currentLanguage); |
| 419 | |
| 420 | // Check disabling and re-enabling spell checking. |
| 421 | webkit_web_context_set_spell_checking_enabled(webContext, FALSE); |
| 422 | g_assert_false(webkit_web_context_get_spell_checking_enabled(webContext)); |
| 423 | webkit_web_context_set_spell_checking_enabled(webContext, TRUE); |
| 424 | g_assert_true(webkit_web_context_get_spell_checking_enabled(webContext)); |
| 425 | } |
| 426 | #endif // PLATFORM(GTK) |
| 427 | |
| 428 | static void testWebContextLanguages(WebViewTest* test, gconstpointer) |
| 429 | { |
| 430 | static const char* expectedDefaultLanguage = "en-US" ; |
| 431 | test->loadURI(kServer->getURIForPath("/" ).data()); |
| 432 | test->waitUntilLoadFinished(); |
| 433 | size_t mainResourceDataSize = 0; |
| 434 | const char* mainResourceData = test->mainResourceData(mainResourceDataSize); |
| 435 | g_assert_cmpuint(mainResourceDataSize, ==, strlen(expectedDefaultLanguage)); |
| 436 | g_assert_cmpint(strncmp(mainResourceData, expectedDefaultLanguage, mainResourceDataSize), ==, 0); |
| 437 | |
| 438 | GRefPtr<GPtrArray> languages = adoptGRef(g_ptr_array_new()); |
| 439 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("en" ))); |
| 440 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("ES_es" ))); |
| 441 | g_ptr_array_add(languages.get(), const_cast<gpointer>(static_cast<const void*>("dE" ))); |
| 442 | g_ptr_array_add(languages.get(), 0); |
| 443 | webkit_web_context_set_preferred_languages(test->m_webContext.get(), reinterpret_cast<const char* const*>(languages->pdata)); |
| 444 | |
| 445 | static const char* expectedLanguages = "en, es-es;q=0.90, de;q=0.80" ; |
| 446 | test->loadURI(kServer->getURIForPath("/" ).data()); |
| 447 | test->waitUntilLoadFinished(); |
| 448 | mainResourceDataSize = 0; |
| 449 | mainResourceData = test->mainResourceData(mainResourceDataSize); |
| 450 | g_assert_cmpuint(mainResourceDataSize, ==, strlen(expectedLanguages)); |
| 451 | g_assert_cmpint(strncmp(mainResourceData, expectedLanguages, mainResourceDataSize), ==, 0); |
| 452 | |
| 453 | // When using the C locale, en-US should be used as default. |
| 454 | const char* cLanguage[] = { "C" , nullptr }; |
| 455 | webkit_web_context_set_preferred_languages(test->m_webContext.get(), cLanguage); |
| 456 | GUniqueOutPtr<GError> error; |
| 457 | WebKitJavascriptResult* javascriptResult = test->runJavaScriptAndWaitUntilFinished("Intl.DateTimeFormat().resolvedOptions().locale" , &error.outPtr()); |
| 458 | g_assert_nonnull(javascriptResult); |
| 459 | g_assert_no_error(error.get()); |
| 460 | GUniquePtr<char> locale(WebViewTest::javascriptResultToCString(javascriptResult)); |
| 461 | g_assert_cmpstr(locale.get(), ==, expectedDefaultLanguage); |
| 462 | |
| 463 | // When using the POSIX locale, en-US should be used as default. |
| 464 | const char* posixLanguage[] = { "POSIX" , nullptr }; |
| 465 | webkit_web_context_set_preferred_languages(test->m_webContext.get(), posixLanguage); |
| 466 | javascriptResult = test->runJavaScriptAndWaitUntilFinished("Intl.DateTimeFormat().resolvedOptions().locale" , &error.outPtr()); |
| 467 | g_assert_nonnull(javascriptResult); |
| 468 | g_assert_no_error(error.get()); |
| 469 | locale.reset(WebViewTest::javascriptResultToCString(javascriptResult)); |
| 470 | g_assert_cmpstr(locale.get(), ==, expectedDefaultLanguage); |
| 471 | |
| 472 | // An invalid locale should throw an exception. |
| 473 | const char* invalidLanguage[] = { "A" , nullptr }; |
| 474 | webkit_web_context_set_preferred_languages(test->m_webContext.get(), invalidLanguage); |
| 475 | javascriptResult = test->runJavaScriptAndWaitUntilFinished("Intl.DateTimeFormat().resolvedOptions().locale" , &error.outPtr()); |
| 476 | g_assert_nonnull(javascriptResult); |
| 477 | g_assert_error(error.get(), WEBKIT_JAVASCRIPT_ERROR, WEBKIT_JAVASCRIPT_ERROR_SCRIPT_FAILED); |
| 478 | } |
| 479 | |
| 480 | static void serverCallback(SoupServer* server, SoupMessage* message, const char* path, GHashTable*, SoupClientContext*, gpointer) |
| 481 | { |
| 482 | if (message->method != SOUP_METHOD_GET) { |
| 483 | soup_message_set_status(message, SOUP_STATUS_NOT_IMPLEMENTED); |
| 484 | return; |
| 485 | } |
| 486 | |
| 487 | if (g_str_equal(path, "/" )) { |
| 488 | const char* acceptLanguage = soup_message_headers_get_one(message->request_headers, "Accept-Language" ); |
| 489 | soup_message_set_status(message, SOUP_STATUS_OK); |
| 490 | soup_message_body_append(message->response_body, SOUP_MEMORY_COPY, acceptLanguage, strlen(acceptLanguage)); |
| 491 | soup_message_body_complete(message->response_body); |
| 492 | } else if (g_str_equal(path, "/empty" )) { |
| 493 | const char* emptyHTML = "<html><body></body></html>" ; |
| 494 | soup_message_body_append(message->response_body, SOUP_MEMORY_STATIC, emptyHTML, strlen(emptyHTML)); |
| 495 | soup_message_body_complete(message->response_body); |
| 496 | soup_message_set_status(message, SOUP_STATUS_OK); |
| 497 | } else if (g_str_equal(path, "/echoPort" )) { |
| 498 | char* port = g_strdup_printf("%u" , soup_server_get_port(server)); |
| 499 | soup_message_body_append(message->response_body, SOUP_MEMORY_TAKE, port, strlen(port)); |
| 500 | soup_message_body_complete(message->response_body); |
| 501 | soup_message_set_status(message, SOUP_STATUS_OK); |
| 502 | } else |
| 503 | soup_message_set_status(message, SOUP_STATUS_NOT_FOUND); |
| 504 | } |
| 505 | |
| 506 | class SecurityPolicyTest: public Test { |
| 507 | public: |
| 508 | MAKE_GLIB_TEST_FIXTURE(SecurityPolicyTest); |
| 509 | |
| 510 | enum SecurityPolicy { |
| 511 | Local = 1 << 1, |
| 512 | NoAccess = 1 << 2, |
| 513 | DisplayIsolated = 1 << 3, |
| 514 | Secure = 1 << 4, |
| 515 | CORSEnabled = 1 << 5, |
| 516 | EmptyDocument = 1 << 6 |
| 517 | }; |
| 518 | |
| 519 | SecurityPolicyTest() |
| 520 | : m_manager(webkit_web_context_get_security_manager(m_webContext.get())) |
| 521 | { |
| 522 | } |
| 523 | |
| 524 | void verifyThatSchemeMatchesPolicy(const char* scheme, unsigned policy) |
| 525 | { |
| 526 | if (policy & Local) |
| 527 | g_assert_true(webkit_security_manager_uri_scheme_is_local(m_manager, scheme)); |
| 528 | else |
| 529 | g_assert_false(webkit_security_manager_uri_scheme_is_local(m_manager, scheme)); |
| 530 | if (policy & NoAccess) |
| 531 | g_assert_true(webkit_security_manager_uri_scheme_is_no_access(m_manager, scheme)); |
| 532 | else |
| 533 | g_assert_false(webkit_security_manager_uri_scheme_is_no_access(m_manager, scheme)); |
| 534 | if (policy & DisplayIsolated) |
| 535 | g_assert_true(webkit_security_manager_uri_scheme_is_display_isolated(m_manager, scheme)); |
| 536 | else |
| 537 | g_assert_false(webkit_security_manager_uri_scheme_is_display_isolated(m_manager, scheme)); |
| 538 | if (policy & Secure) |
| 539 | g_assert_true(webkit_security_manager_uri_scheme_is_secure(m_manager, scheme)); |
| 540 | else |
| 541 | g_assert_false(webkit_security_manager_uri_scheme_is_secure(m_manager, scheme)); |
| 542 | if (policy & CORSEnabled) |
| 543 | g_assert_true(webkit_security_manager_uri_scheme_is_cors_enabled(m_manager, scheme)); |
| 544 | else |
| 545 | g_assert_false(webkit_security_manager_uri_scheme_is_cors_enabled(m_manager, scheme)); |
| 546 | if (policy & EmptyDocument) |
| 547 | g_assert_true(webkit_security_manager_uri_scheme_is_empty_document(m_manager, scheme)); |
| 548 | else |
| 549 | g_assert_false(webkit_security_manager_uri_scheme_is_empty_document(m_manager, scheme)); |
| 550 | } |
| 551 | |
| 552 | WebKitSecurityManager* m_manager; |
| 553 | }; |
| 554 | |
| 555 | static void testWebContextSecurityPolicy(SecurityPolicyTest* test, gconstpointer) |
| 556 | { |
| 557 | // VerifyThatSchemeMatchesPolicy default policy for well known schemes. |
| 558 | test->verifyThatSchemeMatchesPolicy("http" , SecurityPolicyTest::CORSEnabled); |
| 559 | test->verifyThatSchemeMatchesPolicy("https" , SecurityPolicyTest::CORSEnabled | SecurityPolicyTest::Secure); |
| 560 | test->verifyThatSchemeMatchesPolicy("file" , SecurityPolicyTest::Local); |
| 561 | test->verifyThatSchemeMatchesPolicy("data" , SecurityPolicyTest::NoAccess | SecurityPolicyTest::Secure); |
| 562 | test->verifyThatSchemeMatchesPolicy("about" , SecurityPolicyTest::NoAccess | SecurityPolicyTest::Secure | SecurityPolicyTest::EmptyDocument); |
| 563 | |
| 564 | // Custom scheme. |
| 565 | test->verifyThatSchemeMatchesPolicy("foo" , 0); |
| 566 | |
| 567 | webkit_security_manager_register_uri_scheme_as_local(test->m_manager, "foo" ); |
| 568 | test->verifyThatSchemeMatchesPolicy("foo" , SecurityPolicyTest::Local); |
| 569 | webkit_security_manager_register_uri_scheme_as_no_access(test->m_manager, "foo" ); |
| 570 | test->verifyThatSchemeMatchesPolicy("foo" , SecurityPolicyTest::Local | SecurityPolicyTest::NoAccess); |
| 571 | webkit_security_manager_register_uri_scheme_as_display_isolated(test->m_manager, "foo" ); |
| 572 | test->verifyThatSchemeMatchesPolicy("foo" , SecurityPolicyTest::Local | SecurityPolicyTest::NoAccess | SecurityPolicyTest::DisplayIsolated); |
| 573 | webkit_security_manager_register_uri_scheme_as_secure(test->m_manager, "foo" ); |
| 574 | test->verifyThatSchemeMatchesPolicy("foo" , SecurityPolicyTest::Local | SecurityPolicyTest::NoAccess | SecurityPolicyTest::DisplayIsolated | SecurityPolicyTest::Secure); |
| 575 | webkit_security_manager_register_uri_scheme_as_cors_enabled(test->m_manager, "foo" ); |
| 576 | test->verifyThatSchemeMatchesPolicy("foo" , SecurityPolicyTest::Local | SecurityPolicyTest::NoAccess | SecurityPolicyTest::DisplayIsolated | SecurityPolicyTest::Secure |
| 577 | | SecurityPolicyTest::CORSEnabled); |
| 578 | webkit_security_manager_register_uri_scheme_as_empty_document(test->m_manager, "foo" ); |
| 579 | test->verifyThatSchemeMatchesPolicy("foo" , SecurityPolicyTest::Local | SecurityPolicyTest::NoAccess | SecurityPolicyTest::DisplayIsolated | SecurityPolicyTest::Secure |
| 580 | | SecurityPolicyTest::CORSEnabled | SecurityPolicyTest::EmptyDocument); |
| 581 | } |
| 582 | |
| 583 | static void consoleMessageReceivedCallback(WebKitUserContentManager*, WebKitJavascriptResult* message, Vector<WebKitJavascriptResult*>* result) |
| 584 | { |
| 585 | g_assert_nonnull(message); |
| 586 | g_assert_nonnull(result); |
| 587 | result->append(webkit_javascript_result_ref(message)); |
| 588 | } |
| 589 | |
| 590 | static void testWebContextSecurityFileXHR(WebViewTest* test, gconstpointer) |
| 591 | { |
| 592 | GUniquePtr<char> fileURL(g_strdup_printf("file://%s/simple.html" , Test::getResourcesDir(Test::WebKit2Resources).data())); |
| 593 | test->loadURI(fileURL.get()); |
| 594 | test->waitUntilLoadFinished(); |
| 595 | |
| 596 | GUniquePtr<char> jsonURL(g_strdup_printf("file://%s/simple.json" , Test::getResourcesDir().data())); |
| 597 | GUniquePtr<char> xhr(g_strdup_printf("var xhr = new XMLHttpRequest; xhr.open(\"GET\", \"%s\"); xhr.send();" , jsonURL.get())); |
| 598 | |
| 599 | Vector<WebKitJavascriptResult*> consoleMessages; |
| 600 | webkit_user_content_manager_register_script_message_handler(test->m_userContentManager.get(), "console" ); |
| 601 | g_signal_connect(test->m_userContentManager.get(), "script-message-received::console" , G_CALLBACK(consoleMessageReceivedCallback), &consoleMessages); |
| 602 | |
| 603 | // By default file access is not allowed, this will show a console message with a cross-origin error. |
| 604 | GUniqueOutPtr<GError> error; |
| 605 | WebKitJavascriptResult* javascriptResult = test->runJavaScriptAndWaitUntilFinished(xhr.get(), &error.outPtr()); |
| 606 | g_assert_nonnull(javascriptResult); |
| 607 | g_assert_no_error(error.get()); |
| 608 | g_assert_cmpuint(consoleMessages.size(), ==, 2); |
| 609 | Vector<GUniquePtr<char>, 2> expectedMessages; |
| 610 | expectedMessages.append(g_strdup("Cross origin requests are only supported for HTTP." )); |
| 611 | expectedMessages.append(g_strdup_printf("XMLHttpRequest cannot load %s due to access control checks." , jsonURL.get())); |
| 612 | unsigned i = 0; |
| 613 | for (auto* consoleMessage : consoleMessages) { |
| 614 | g_assert_nonnull(consoleMessage); |
| 615 | GUniquePtr<char> messageString(WebViewTest::javascriptResultToCString(consoleMessage)); |
| 616 | GRefPtr<GVariant> variant = g_variant_parse(G_VARIANT_TYPE("(uusus)" ), messageString.get(), nullptr, nullptr, nullptr); |
| 617 | g_assert_nonnull(variant.get()); |
| 618 | unsigned level; |
| 619 | const char* messageText; |
| 620 | g_variant_get(variant.get(), "(uu&su&s)" , nullptr, &level, &messageText, nullptr, nullptr); |
| 621 | g_assert_cmpuint(level, ==, 3); // Console error message. |
| 622 | g_assert_cmpstr(messageText, ==, expectedMessages[i++].get()); |
| 623 | webkit_javascript_result_unref(consoleMessage); |
| 624 | } |
| 625 | consoleMessages.clear(); |
| 626 | |
| 627 | // Allow file access from file URLs. |
| 628 | webkit_settings_set_allow_file_access_from_file_urls(webkit_web_view_get_settings(test->m_webView), TRUE); |
| 629 | test->loadURI(fileURL.get()); |
| 630 | test->waitUntilLoadFinished(); |
| 631 | javascriptResult = test->runJavaScriptAndWaitUntilFinished(xhr.get(), &error.outPtr()); |
| 632 | g_assert_nonnull(javascriptResult); |
| 633 | g_assert_no_error(error.get()); |
| 634 | |
| 635 | // It isn't still possible to load file from an HTTP URL. |
| 636 | test->loadURI(kServer->getURIForPath("/" ).data()); |
| 637 | test->waitUntilLoadFinished(); |
| 638 | javascriptResult = test->runJavaScriptAndWaitUntilFinished(xhr.get(), &error.outPtr()); |
| 639 | g_assert_nonnull(javascriptResult); |
| 640 | g_assert_no_error(error.get()); |
| 641 | i = 0; |
| 642 | for (auto* consoleMessage : consoleMessages) { |
| 643 | g_assert_nonnull(consoleMessage); |
| 644 | GUniquePtr<char> messageString(WebViewTest::javascriptResultToCString(consoleMessage)); |
| 645 | GRefPtr<GVariant> variant = g_variant_parse(G_VARIANT_TYPE("(uusus)" ), messageString.get(), nullptr, nullptr, nullptr); |
| 646 | g_assert_nonnull(variant.get()); |
| 647 | unsigned level; |
| 648 | const char* messageText; |
| 649 | g_variant_get(variant.get(), "(uu&su&s)" , nullptr, &level, &messageText, nullptr, nullptr); |
| 650 | g_assert_cmpuint(level, ==, 3); // Console error message. |
| 651 | g_assert_cmpstr(messageText, ==, expectedMessages[i++].get()); |
| 652 | webkit_javascript_result_unref(consoleMessage); |
| 653 | } |
| 654 | consoleMessages.clear(); |
| 655 | |
| 656 | g_signal_handlers_disconnect_matched(test->m_userContentManager.get(), G_SIGNAL_MATCH_DATA, 0, 0, nullptr, nullptr, &consoleMessages); |
| 657 | webkit_user_content_manager_unregister_script_message_handler(test->m_userContentManager.get(), "console" ); |
| 658 | |
| 659 | webkit_settings_set_allow_file_access_from_file_urls(webkit_web_view_get_settings(test->m_webView), FALSE); |
| 660 | } |
| 661 | |
| 662 | class ProxyTest : public WebViewTest { |
| 663 | public: |
| 664 | MAKE_GLIB_TEST_FIXTURE(ProxyTest); |
| 665 | |
| 666 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 667 | enum class WebSocketServerType { |
| 668 | Unknown, |
| 669 | NoProxy, |
| 670 | Proxy |
| 671 | }; |
| 672 | |
| 673 | static void webSocketProxyServerCallback(SoupServer*, SoupWebsocketConnection*, const char* path, SoupClientContext*, gpointer userData) |
| 674 | { |
| 675 | static_cast<ProxyTest*>(userData)->webSocketConnected(ProxyTest::WebSocketServerType::Proxy); |
| 676 | } |
| 677 | #endif |
| 678 | |
| 679 | ProxyTest() |
| 680 | { |
| 681 | // This "proxy server" is actually just a different instance of the main |
| 682 | // test server (kServer), listening on a different port. Requests |
| 683 | // will not actually be proxied to kServer because proxyServer is not |
| 684 | // actually a proxy server. We're testing whether the proxy settings |
| 685 | // work, not whether we can write a soup proxy server. |
| 686 | m_proxyServer.run(serverCallback); |
| 687 | g_assert_nonnull(m_proxyServer.baseURI()); |
| 688 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 689 | m_proxyServer.addWebSocketHandler(webSocketProxyServerCallback, this); |
| 690 | g_assert_nonnull(m_proxyServer.baseWebSocketURI()); |
| 691 | #endif |
| 692 | } |
| 693 | |
| 694 | CString loadURIAndGetMainResourceData(const char* uri) |
| 695 | { |
| 696 | loadURI(uri); |
| 697 | waitUntilLoadFinished(); |
| 698 | size_t dataSize = 0; |
| 699 | const char* data = mainResourceData(dataSize); |
| 700 | return CString(data, dataSize); |
| 701 | } |
| 702 | |
| 703 | GUniquePtr<char> proxyServerPortAsString() |
| 704 | { |
| 705 | GUniquePtr<char> port(g_strdup_printf("%u" , soup_uri_get_port(m_proxyServer.baseURI()))); |
| 706 | return port; |
| 707 | } |
| 708 | |
| 709 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 710 | void webSocketConnected(WebSocketServerType serverType) |
| 711 | { |
| 712 | m_webSocketRequestReceived = serverType; |
| 713 | quitMainLoop(); |
| 714 | } |
| 715 | |
| 716 | WebSocketServerType createWebSocketAndWaitUntilConnected() |
| 717 | { |
| 718 | m_webSocketRequestReceived = WebSocketServerType::Unknown; |
| 719 | GUniquePtr<char> createWebSocket(g_strdup_printf("var ws = new WebSocket('%s');" , kServer->getWebSocketURIForPath("/foo" ).data())); |
| 720 | webkit_web_view_run_javascript(m_webView, createWebSocket.get(), nullptr, nullptr, nullptr); |
| 721 | g_main_loop_run(m_mainLoop); |
| 722 | return m_webSocketRequestReceived; |
| 723 | } |
| 724 | #endif |
| 725 | |
| 726 | WebKitTestServer m_proxyServer; |
| 727 | |
| 728 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 729 | WebSocketServerType m_webSocketRequestReceived { WebSocketServerType::Unknown }; |
| 730 | #endif |
| 731 | }; |
| 732 | |
| 733 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 734 | static void webSocketServerCallback(SoupServer*, SoupWebsocketConnection*, const char*, SoupClientContext*, gpointer userData) |
| 735 | { |
| 736 | static_cast<ProxyTest*>(userData)->webSocketConnected(ProxyTest::WebSocketServerType::NoProxy); |
| 737 | } |
| 738 | #endif |
| 739 | |
| 740 | static void ephemeralViewloadChanged(WebKitWebView* webView, WebKitLoadEvent loadEvent, WebViewTest* test) |
| 741 | { |
| 742 | if (loadEvent != WEBKIT_LOAD_FINISHED) |
| 743 | return; |
| 744 | g_signal_handlers_disconnect_by_func(webView, reinterpret_cast<void*>(ephemeralViewloadChanged), test); |
| 745 | test->quitMainLoop(); |
| 746 | } |
| 747 | |
| 748 | static void testWebContextProxySettings(ProxyTest* test, gconstpointer) |
| 749 | { |
| 750 | // Proxy URI is unset by default. Requests to kServer should be received by kServer. |
| 751 | GUniquePtr<char> serverPortAsString(g_strdup_printf("%u" , soup_uri_get_port(kServer->baseURI()))); |
| 752 | auto mainResourceData = test->loadURIAndGetMainResourceData(kServer->getURIForPath("/echoPort" ).data()); |
| 753 | ASSERT_CMP_CSTRING(mainResourceData, ==, serverPortAsString.get()); |
| 754 | |
| 755 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 756 | // WebSocket requests should also be received by kServer. |
| 757 | kServer->addWebSocketHandler(webSocketServerCallback, test); |
| 758 | auto serverType = test->createWebSocketAndWaitUntilConnected(); |
| 759 | g_assert_true(serverType == ProxyTest::WebSocketServerType::NoProxy); |
| 760 | #endif |
| 761 | |
| 762 | // Set default proxy URI to point to proxyServer. Requests to kServer should be received by proxyServer instead. |
| 763 | GUniquePtr<char> proxyURI(soup_uri_to_string(test->m_proxyServer.baseURI(), FALSE)); |
| 764 | WebKitNetworkProxySettings* settings = webkit_network_proxy_settings_new(proxyURI.get(), nullptr); |
| 765 | webkit_web_context_set_network_proxy_settings(test->m_webContext.get(), WEBKIT_NETWORK_PROXY_MODE_CUSTOM, settings); |
| 766 | GUniquePtr<char> proxyServerPortAsString = test->proxyServerPortAsString(); |
| 767 | mainResourceData = test->loadURIAndGetMainResourceData(kServer->getURIForPath("/echoPort" ).data()); |
| 768 | ASSERT_CMP_CSTRING(mainResourceData, ==, proxyServerPortAsString.get()); |
| 769 | webkit_network_proxy_settings_free(settings); |
| 770 | |
| 771 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 772 | // WebSocket requests should also be received by proxyServer. |
| 773 | serverType = test->createWebSocketAndWaitUntilConnected(); |
| 774 | g_assert_true(serverType == ProxyTest::WebSocketServerType::Proxy); |
| 775 | #endif |
| 776 | |
| 777 | // Proxy settings also affect ephemeral web views. |
| 778 | auto webView = Test::adoptView(g_object_new(WEBKIT_TYPE_WEB_VIEW, |
| 779 | #if PLATFORM(WPE) |
| 780 | "backend" , Test::createWebViewBackend(), |
| 781 | #endif |
| 782 | "web-context" , test->m_webContext.get(), |
| 783 | "is-ephemeral" , TRUE, |
| 784 | nullptr)); |
| 785 | g_assert_true(webkit_web_view_is_ephemeral(webView.get())); |
| 786 | g_assert_false(webkit_web_context_is_ephemeral(webkit_web_view_get_context(webView.get()))); |
| 787 | |
| 788 | g_signal_connect(webView.get(), "load-changed" , G_CALLBACK(ephemeralViewloadChanged), test); |
| 789 | webkit_web_view_load_uri(webView.get(), kServer->getURIForPath("/echoPort" ).data()); |
| 790 | g_main_loop_run(test->m_mainLoop); |
| 791 | WebKitWebResource* resource = webkit_web_view_get_main_resource(webView.get()); |
| 792 | g_assert_true(WEBKIT_IS_WEB_RESOURCE(resource)); |
| 793 | webkit_web_resource_get_data(resource, nullptr, [](GObject* object, GAsyncResult* result, gpointer userData) { |
| 794 | size_t dataSize; |
| 795 | GUniquePtr<char> data(reinterpret_cast<char*>(webkit_web_resource_get_data_finish(WEBKIT_WEB_RESOURCE(object), result, &dataSize, nullptr))); |
| 796 | g_assert_nonnull(data); |
| 797 | auto* test = static_cast<ProxyTest*>(userData); |
| 798 | GUniquePtr<char> proxyServerPortAsString = test->proxyServerPortAsString(); |
| 799 | ASSERT_CMP_CSTRING(CString(data.get(), dataSize), ==, proxyServerPortAsString.get()); |
| 800 | test->quitMainLoop(); |
| 801 | }, test); |
| 802 | g_main_loop_run(test->m_mainLoop); |
| 803 | |
| 804 | // Remove the proxy. Requests to kServer should be received by kServer again. |
| 805 | webkit_web_context_set_network_proxy_settings(test->m_webContext.get(), WEBKIT_NETWORK_PROXY_MODE_NO_PROXY, nullptr); |
| 806 | mainResourceData = test->loadURIAndGetMainResourceData(kServer->getURIForPath("/echoPort" ).data()); |
| 807 | ASSERT_CMP_CSTRING(mainResourceData, ==, serverPortAsString.get()); |
| 808 | |
| 809 | // Use a default proxy uri, but ignoring requests to localhost. |
| 810 | static const char* ignoreHosts[] = { "localhost" , nullptr }; |
| 811 | settings = webkit_network_proxy_settings_new(proxyURI.get(), ignoreHosts); |
| 812 | webkit_web_context_set_network_proxy_settings(test->m_webContext.get(), WEBKIT_NETWORK_PROXY_MODE_CUSTOM, settings); |
| 813 | mainResourceData = test->loadURIAndGetMainResourceData(kServer->getURIForPath("/echoPort" ).data()); |
| 814 | ASSERT_CMP_CSTRING(mainResourceData, ==, proxyServerPortAsString.get()); |
| 815 | GUniquePtr<char> localhostEchoPortURI(g_strdup_printf("http://localhost:%s/echoPort" , serverPortAsString.get())); |
| 816 | mainResourceData = test->loadURIAndGetMainResourceData(localhostEchoPortURI.get()); |
| 817 | ASSERT_CMP_CSTRING(mainResourceData, ==, serverPortAsString.get()); |
| 818 | webkit_network_proxy_settings_free(settings); |
| 819 | |
| 820 | // Remove the proxy again to ensure next test is not using any previous values. |
| 821 | webkit_web_context_set_network_proxy_settings(test->m_webContext.get(), WEBKIT_NETWORK_PROXY_MODE_NO_PROXY, nullptr); |
| 822 | mainResourceData = test->loadURIAndGetMainResourceData(kServer->getURIForPath("/echoPort" ).data()); |
| 823 | ASSERT_CMP_CSTRING(mainResourceData, ==, serverPortAsString.get()); |
| 824 | |
| 825 | // Use scheme specific proxy instead of the default. |
| 826 | settings = webkit_network_proxy_settings_new(nullptr, nullptr); |
| 827 | webkit_network_proxy_settings_add_proxy_for_scheme(settings, "http" , proxyURI.get()); |
| 828 | webkit_web_context_set_network_proxy_settings(test->m_webContext.get(), WEBKIT_NETWORK_PROXY_MODE_CUSTOM, settings); |
| 829 | mainResourceData = test->loadURIAndGetMainResourceData(kServer->getURIForPath("/echoPort" ).data()); |
| 830 | ASSERT_CMP_CSTRING(mainResourceData, ==, proxyServerPortAsString.get()); |
| 831 | webkit_network_proxy_settings_free(settings); |
| 832 | |
| 833 | // Reset to use the default resolver. |
| 834 | webkit_web_context_set_network_proxy_settings(test->m_webContext.get(), WEBKIT_NETWORK_PROXY_MODE_DEFAULT, nullptr); |
| 835 | mainResourceData = test->loadURIAndGetMainResourceData(kServer->getURIForPath("/echoPort" ).data()); |
| 836 | ASSERT_CMP_CSTRING(mainResourceData, ==, serverPortAsString.get()); |
| 837 | |
| 838 | #if SOUP_CHECK_VERSION(2, 61, 90) |
| 839 | kServer->removeWebSocketHandler(); |
| 840 | #endif |
| 841 | } |
| 842 | |
| 843 | void beforeAll() |
| 844 | { |
| 845 | kServer = new WebKitTestServer(); |
| 846 | kServer->run(serverCallback); |
| 847 | |
| 848 | Test::add("WebKitWebContext" , "default-context" , testWebContextDefault); |
| 849 | Test::add("WebKitWebContext" , "ephemeral" , testWebContextEphemeral); |
| 850 | #if ENABLE(NETSCAPE_PLUGIN_API) |
| 851 | PluginsTest::add("WebKitWebContext" , "get-plugins" , testWebContextGetPlugins); |
| 852 | #endif |
| 853 | URISchemeTest::add("WebKitWebContext" , "uri-scheme" , testWebContextURIScheme); |
| 854 | // FIXME: implement spellchecker in WPE. |
| 855 | #if PLATFORM(GTK) |
| 856 | Test::add("WebKitWebContext" , "spell-checker" , testWebContextSpellChecker); |
| 857 | #endif |
| 858 | WebViewTest::add("WebKitWebContext" , "languages" , testWebContextLanguages); |
| 859 | SecurityPolicyTest::add("WebKitSecurityManager" , "security-policy" , testWebContextSecurityPolicy); |
| 860 | WebViewTest::add("WebKitSecurityManager" , "file-xhr" , testWebContextSecurityFileXHR); |
| 861 | ProxyTest::add("WebKitWebContext" , "proxy" , testWebContextProxySettings); |
| 862 | } |
| 863 | |
| 864 | void afterAll() |
| 865 | { |
| 866 | delete kServer; |
| 867 | } |
| 868 | |