You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
215 lines
8.1 KiB
Kotlin
215 lines
8.1 KiB
Kotlin
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
package org.mozilla.fenix
|
|
|
|
import android.net.ConnectivityManager
|
|
import androidx.core.content.getSystemService
|
|
import androidx.navigation.NavController
|
|
import io.mockk.every
|
|
import io.mockk.mockk
|
|
import io.mockk.mockkStatic
|
|
import io.mockk.verify
|
|
import mozilla.components.browser.errorpages.ErrorPages
|
|
import mozilla.components.browser.errorpages.ErrorType
|
|
import mozilla.components.concept.engine.request.RequestInterceptor
|
|
import mozilla.components.support.test.robolectric.testContext
|
|
import org.junit.Assert.assertEquals
|
|
import org.junit.Assert.assertNull
|
|
import org.junit.Before
|
|
import org.junit.Test
|
|
import org.junit.runner.RunWith
|
|
import org.mozilla.fenix.AppRequestInterceptor.Companion.HIGH_RISK_ERROR_PAGES
|
|
import org.mozilla.fenix.AppRequestInterceptor.Companion.LOW_AND_MEDIUM_RISK_ERROR_PAGES
|
|
import org.mozilla.fenix.ext.isOnline
|
|
import org.mozilla.fenix.helpers.FenixRobolectricTestRunner
|
|
|
|
@RunWith(FenixRobolectricTestRunner::class)
|
|
class AppRequestInterceptorTest {
|
|
|
|
private lateinit var interceptor: RequestInterceptor
|
|
private lateinit var navigationController: NavController
|
|
|
|
@Before
|
|
fun setUp() {
|
|
|
|
mockkStatic("org.mozilla.fenix.ext.ConnectivityManagerKt")
|
|
|
|
every { testContext.getSystemService<ConnectivityManager>()!!.isOnline() } returns true
|
|
|
|
navigationController = mockk(relaxed = true)
|
|
interceptor = AppRequestInterceptor(testContext).also {
|
|
it.setNavigationController(navigationController)
|
|
}
|
|
}
|
|
|
|
@Test
|
|
fun `GIVEN request to install add-on WHEN on same domain and triggered by user THEN start add-on installation`() {
|
|
val addonId = "12345678"
|
|
val result = interceptor.onLoadRequest(
|
|
engineSession = mockk(),
|
|
uri = "https://addons.mozilla.org/android/downloads/file/$addonId/test.xpi",
|
|
lastUri = "https://addons.mozilla.org/en-US/firefox/",
|
|
hasUserGesture = true,
|
|
isSameDomain = true,
|
|
isDirectNavigation = false,
|
|
isRedirect = false,
|
|
isSubframeRequest = false
|
|
)
|
|
|
|
verify { navigationController.navigate(NavGraphDirections.actionGlobalAddonsManagementFragment(addonId)) }
|
|
assertEquals(RequestInterceptor.InterceptionResponse.Deny, result)
|
|
}
|
|
|
|
@Test
|
|
fun `GIVEN request to install add-on WHEN on a different domain THEN no add-on installation is started`() {
|
|
val result = interceptor.onLoadRequest(
|
|
engineSession = mockk(),
|
|
uri = "https://addons.mozilla.org/android/downloads/file/12345678/test.xpi",
|
|
lastUri = "https://getpocket.com",
|
|
hasUserGesture = true,
|
|
isSameDomain = false,
|
|
isDirectNavigation = false,
|
|
isRedirect = false,
|
|
isSubframeRequest = false
|
|
)
|
|
|
|
verify(exactly = 0) { navigationController.navigate(NavGraphDirections.actionGlobalAddonsManagementFragment()) }
|
|
assertNull(result)
|
|
}
|
|
|
|
@Test
|
|
fun `GIVEN invalid request to install add-on WHEN on same domain and triggered by user THEN no add-on installation is started`() {
|
|
val result = interceptor.onLoadRequest(
|
|
engineSession = mockk(),
|
|
uri = "https://addons.mozilla.org/android/downloads/file/12345678/test.invalid",
|
|
lastUri = "https://addons.mozilla.org/en-US/firefox/",
|
|
hasUserGesture = true,
|
|
isSameDomain = true,
|
|
isDirectNavigation = false,
|
|
isRedirect = false,
|
|
isSubframeRequest = false
|
|
)
|
|
|
|
verify(exactly = 0) { navigationController.navigate(NavGraphDirections.actionGlobalAddonsManagementFragment()) }
|
|
assertNull(result)
|
|
}
|
|
|
|
@Test
|
|
fun `GIVEN request to install add-on WHEN not triggered by user THEN no add-on installation is started`() {
|
|
val result = interceptor.onLoadRequest(
|
|
engineSession = mockk(),
|
|
uri = "https://addons.mozilla.org/android/downloads/file/12345678/test.xpi",
|
|
lastUri = "https://addons.mozilla.org/en-US/firefox/",
|
|
hasUserGesture = false,
|
|
isSameDomain = true,
|
|
isDirectNavigation = false,
|
|
isRedirect = false,
|
|
isSubframeRequest = false
|
|
)
|
|
|
|
verify(exactly = 0) { navigationController.navigate(NavGraphDirections.actionGlobalAddonsManagementFragment()) }
|
|
assertNull(result)
|
|
}
|
|
|
|
@Test
|
|
fun `GIVEN any request WHEN on same domain and triggered by user THEN no add-on installation is started`() {
|
|
val result = interceptor.onLoadRequest(
|
|
engineSession = mockk(),
|
|
uri = "https://blog.mozilla.org/blog/2020/10/20/mozilla-reaction-to-u-s-v-google/",
|
|
lastUri = "https://blog.mozilla.org",
|
|
hasUserGesture = true,
|
|
isSameDomain = true,
|
|
isDirectNavigation = false,
|
|
isRedirect = false,
|
|
isSubframeRequest = false
|
|
)
|
|
|
|
verify(exactly = 0) { navigationController.navigate(NavGraphDirections.actionGlobalAddonsManagementFragment()) }
|
|
assertNull(result)
|
|
}
|
|
|
|
@Test
|
|
fun `onErrorRequest results in correct error page for low risk level error`() {
|
|
setOf(
|
|
ErrorType.UNKNOWN,
|
|
ErrorType.ERROR_NET_INTERRUPT,
|
|
ErrorType.ERROR_NET_TIMEOUT,
|
|
ErrorType.ERROR_CONNECTION_REFUSED,
|
|
ErrorType.ERROR_UNKNOWN_SOCKET_TYPE,
|
|
ErrorType.ERROR_REDIRECT_LOOP,
|
|
ErrorType.ERROR_OFFLINE,
|
|
ErrorType.ERROR_NET_RESET,
|
|
ErrorType.ERROR_UNSAFE_CONTENT_TYPE,
|
|
ErrorType.ERROR_CORRUPTED_CONTENT,
|
|
ErrorType.ERROR_CONTENT_CRASHED,
|
|
ErrorType.ERROR_INVALID_CONTENT_ENCODING,
|
|
ErrorType.ERROR_UNKNOWN_HOST,
|
|
ErrorType.ERROR_MALFORMED_URI,
|
|
ErrorType.ERROR_FILE_NOT_FOUND,
|
|
ErrorType.ERROR_FILE_ACCESS_DENIED,
|
|
ErrorType.ERROR_PROXY_CONNECTION_REFUSED,
|
|
ErrorType.ERROR_UNKNOWN_PROXY_HOST,
|
|
ErrorType.ERROR_UNKNOWN_PROTOCOL
|
|
).forEach { error ->
|
|
val actualPage = createActualErrorPage(error)
|
|
val expectedPage = createExpectedErrorPage(
|
|
error = error,
|
|
html = LOW_AND_MEDIUM_RISK_ERROR_PAGES
|
|
)
|
|
|
|
assertEquals(expectedPage, actualPage)
|
|
}
|
|
}
|
|
|
|
@Test
|
|
fun `onErrorRequest results in correct error page for medium risk level error`() {
|
|
setOf(
|
|
ErrorType.ERROR_SECURITY_BAD_CERT,
|
|
ErrorType.ERROR_SECURITY_SSL,
|
|
ErrorType.ERROR_PORT_BLOCKED
|
|
).forEach { error ->
|
|
val actualPage = createActualErrorPage(error)
|
|
val expectedPage = createExpectedErrorPage(
|
|
error = error,
|
|
html = LOW_AND_MEDIUM_RISK_ERROR_PAGES
|
|
)
|
|
|
|
assertEquals(expectedPage, actualPage)
|
|
}
|
|
}
|
|
|
|
@Test
|
|
fun `onErrorRequest results in correct error page for high risk level error`() {
|
|
setOf(
|
|
ErrorType.ERROR_SAFEBROWSING_HARMFUL_URI,
|
|
ErrorType.ERROR_SAFEBROWSING_MALWARE_URI,
|
|
ErrorType.ERROR_SAFEBROWSING_PHISHING_URI,
|
|
ErrorType.ERROR_SAFEBROWSING_UNWANTED_URI
|
|
).forEach { error ->
|
|
val actualPage = createActualErrorPage(error)
|
|
val expectedPage = createExpectedErrorPage(
|
|
error = error,
|
|
html = HIGH_RISK_ERROR_PAGES
|
|
)
|
|
|
|
assertEquals(expectedPage, actualPage)
|
|
}
|
|
}
|
|
|
|
private fun createActualErrorPage(error: ErrorType): String {
|
|
val errorPage = interceptor.onErrorRequest(session = mockk(), errorType = error, uri = null)
|
|
as RequestInterceptor.ErrorResponse
|
|
return errorPage.uri
|
|
}
|
|
|
|
private fun createExpectedErrorPage(error: ErrorType, html: String): String {
|
|
return ErrorPages.createUrlEncodedErrorPage(
|
|
context = testContext,
|
|
errorType = error,
|
|
htmlResource = html
|
|
)
|
|
}
|
|
}
|