From 9f9ee6af4299dbc95f5d7b814679714ba0ab5051 Mon Sep 17 00:00:00 2001 From: Richard Walters Date: Sun, 1 Jul 2018 14:48:14 -0700 Subject: Handle bad host names * Detect bad characters in host names. * Incorporate splitting host and port into the state machine that is parsing/decoding the host. NOTE: IPv6address is not checked for bad characters yet. More research is needed to learn exactly what are the various ways to write an IPv6 address. --- test/src/UriTests.cpp | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) (limited to 'test/src/UriTests.cpp') diff --git a/test/src/UriTests.cpp b/test/src/UriTests.cpp index 1724b89..d7ada25 100644 --- a/test/src/UriTests.cpp +++ b/test/src/UriTests.cpp @@ -311,6 +311,44 @@ TEST(UriTests, ParseFromStringUserInfoBarelyLegal) { } } +TEST(UriTests, ParseFromStringHostIllegalCharacters) { + const std::vector< std::string > testVectors{ + {"//%X@www.example.com/"}, + {"//@www:example.com/"}, + {"//[vX.:]/"}, + }; + size_t index = 0; + for (const auto& testVector : testVectors) { + Uri::Uri uri; + ASSERT_FALSE(uri.ParseFromString(testVector)) << index; + ++index; + } +} + +TEST(UriTests, ParseFromStringHostBarelyLegal) { + struct TestVector { + std::string uriString; + std::string host; + }; + const std::vector< TestVector > testVectors{ + {"//%41/", "A"}, + {"///", ""}, + {"//!/", "!"}, + {"//'/", "'"}, + {"//(/", "("}, + {"//;/", ";"}, + {"//1.2.3.4/", "1.2.3.4"}, + {"//[v7.:]/", "[v7.:]"}, + }; + size_t index = 0; + for (const auto& testVector : testVectors) { + Uri::Uri uri; + ASSERT_TRUE(uri.ParseFromString(testVector.uriString)) << index; + ASSERT_EQ(testVector.host, uri.GetHost()); + ++index; + } +} + TEST(UriTests, ParseFromStringDontMisinterpretColonInAuthorityAsSchemeDelimiter) { const std::vector< std::string > testVectors{ {"//foo:bar@www.example.com/"}, -- cgit v1.2.3