am 8f666c2d: Merge "Test that we don\'t leak sensitive information when logging cookies." into gingerbread
Merge commit '8f666c2db1811b2f1797a692d6547362f3cd9954' into gingerbread-plus-aosp * commit '8f666c2db1811b2f1797a692d6547362f3cd9954': Test that we don't leak sensitive information when logging cookies.
This commit is contained in:
69
core/tests/coretests/src/android/net/http/CookiesTest.java
Normal file
69
core/tests/coretests/src/android/net/http/CookiesTest.java
Normal file
@@ -0,0 +1,69 @@
|
||||
/*
|
||||
* Copyright (C) 2010 The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package android.net.http;
|
||||
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.net.URISyntaxException;
|
||||
import java.util.logging.Logger;
|
||||
import java.util.logging.SimpleFormatter;
|
||||
import java.util.logging.StreamHandler;
|
||||
import junit.framework.TestCase;
|
||||
import org.apache.http.client.HttpClient;
|
||||
import org.apache.http.client.methods.HttpGet;
|
||||
import org.apache.http.impl.client.DefaultHttpClient;
|
||||
import tests.http.MockResponse;
|
||||
import tests.http.MockWebServer;
|
||||
|
||||
public final class CookiesTest extends TestCase {
|
||||
|
||||
private MockWebServer server = new MockWebServer();
|
||||
|
||||
@Override protected void tearDown() throws Exception {
|
||||
server.shutdown();
|
||||
super.tearDown();
|
||||
}
|
||||
|
||||
/**
|
||||
* Test that we don't log potentially sensitive cookie values.
|
||||
* http://b/3095990
|
||||
*/
|
||||
public void testCookiesAreNotLogged() throws IOException, URISyntaxException {
|
||||
// enqueue an HTTP response with a cookie that will be rejected
|
||||
server.enqueue(new MockResponse()
|
||||
.addHeader("Set-Cookie: password=secret; Domain=fake.domain"));
|
||||
server.play();
|
||||
|
||||
ByteArrayOutputStream out = new ByteArrayOutputStream();
|
||||
Logger logger = Logger.getLogger("org.apache.http");
|
||||
StreamHandler handler = new StreamHandler(out, new SimpleFormatter());
|
||||
logger.addHandler(handler);
|
||||
try {
|
||||
HttpClient client = new DefaultHttpClient();
|
||||
client.execute(new HttpGet(server.getUrl("/").toURI()));
|
||||
handler.close();
|
||||
|
||||
String log = out.toString("UTF-8");
|
||||
assertTrue(log, log.contains("password"));
|
||||
assertTrue(log, log.contains("fake.domain"));
|
||||
assertFalse(log, log.contains("secret"));
|
||||
|
||||
} finally {
|
||||
logger.removeHandler(handler);
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user