// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include <time.h> #include <string> #include "base/basictypes.h" #include "base/platform_thread.h" #include "base/ref_counted.h" #include "base/string_util.h" #include "base/time.h" #include "googleurl/src/gurl.h" #include "net/base/cookie_monster.h" #include "testing/gtest/include/gtest/gtest.h" using base::Time; using base::TimeDelta; namespace { class ParsedCookieTest : public testing::Test { }; class CookieMonsterTest : public testing::Test { }; } TEST(ParsedCookieTest, TestBasic) { net::CookieMonster::ParsedCookie pc("a=b"); EXPECT_TRUE(pc.IsValid()); EXPECT_FALSE(pc.IsSecure()); EXPECT_EQ("a", pc.Name()); EXPECT_EQ("b", pc.Value()); } TEST(ParsedCookieTest, TestQuoted) { // These are some quoting cases which the major browsers all // handle differently. I've tested Internet Explorer 6, Opera 9.6, // Firefox 3, and Safari Windows 3.2.1. We originally tried to match // Firefox closely, however we now match Internet Explorer and Safari. const char* values[] = { // Trailing whitespace after a quoted value. The whitespace after // the quote is stripped in all browsers. "\"zzz \" ", "\"zzz \"", // Handling a quoted value with a ';', like FOO="zz;pp" ; // IE and Safari: "zz; // Firefox and Opera: "zz;pp" "\"zz;pp\" ;", "\"zz", // Handling a value with multiple quoted parts, like FOO="zzz " "ppp" ; // IE and Safari: "zzz " "ppp"; // Firefox: "zzz "; // Opera: <rejects cookie> "\"zzz \" \"ppp\" ", "\"zzz \" \"ppp\"", // A quote in a value that didn't start quoted. like FOO=A"B ; // IE, Safari, and Firefox: A"B; // Opera: <rejects cookie> "A\"B", "A\"B", }; for (size_t i = 0; i < arraysize(values); i += 2) { std::string input(values[i]); std::string expected(values[i + 1]); net::CookieMonster::ParsedCookie pc( "aBc=" + input + " ; path=\"/\" ; httponly "); EXPECT_TRUE(pc.IsValid()); EXPECT_FALSE(pc.IsSecure()); EXPECT_TRUE(pc.IsHttpOnly()); EXPECT_TRUE(pc.HasPath()); EXPECT_EQ("aBc", pc.Name()); EXPECT_EQ(expected, pc.Value()); // If a path was quoted, the path attribute keeps the quotes. This will // make the cookie effectively useless, but path parameters aren't supposed // to be quoted. Bug 1261605. EXPECT_EQ("\"/\"", pc.Path()); } } TEST(ParsedCookieTest, TestNameless) { net::CookieMonster::ParsedCookie pc("BLAHHH; path=/; secure;"); EXPECT_TRUE(pc.IsValid()); EXPECT_TRUE(pc.IsSecure()); EXPECT_TRUE(pc.HasPath()); EXPECT_EQ("/", pc.Path()); EXPECT_EQ("", pc.Name()); EXPECT_EQ("BLAHHH", pc.Value()); } TEST(ParsedCookieTest, TestAttributeCase) { net::CookieMonster::ParsedCookie pc("BLAHHH; Path=/; sECuRe; httpONLY"); EXPECT_TRUE(pc.IsValid()); EXPECT_TRUE(pc.IsSecure()); EXPECT_TRUE(pc.IsHttpOnly()); EXPECT_TRUE(pc.HasPath()); EXPECT_EQ("/", pc.Path()); EXPECT_EQ("", pc.Name()); EXPECT_EQ("BLAHHH", pc.Value()); EXPECT_EQ(3U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, TestDoubleQuotedNameless) { net::CookieMonster::ParsedCookie pc("\"BLA\\\"HHH\"; path=/; secure;"); EXPECT_TRUE(pc.IsValid()); EXPECT_TRUE(pc.IsSecure()); EXPECT_TRUE(pc.HasPath()); EXPECT_EQ("/", pc.Path()); EXPECT_EQ("", pc.Name()); EXPECT_EQ("\"BLA\\\"HHH\"", pc.Value()); EXPECT_EQ(2U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, QuoteOffTheEnd) { net::CookieMonster::ParsedCookie pc("a=\"B"); EXPECT_TRUE(pc.IsValid()); EXPECT_EQ("a", pc.Name()); EXPECT_EQ("\"B", pc.Value()); EXPECT_EQ(0U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, MissingName) { net::CookieMonster::ParsedCookie pc("=ABC"); EXPECT_TRUE(pc.IsValid()); EXPECT_EQ("", pc.Name()); EXPECT_EQ("ABC", pc.Value()); EXPECT_EQ(0U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, MissingValue) { net::CookieMonster::ParsedCookie pc("ABC=; path = /wee"); EXPECT_TRUE(pc.IsValid()); EXPECT_EQ("ABC", pc.Name()); EXPECT_EQ("", pc.Value()); EXPECT_TRUE(pc.HasPath()); EXPECT_EQ("/wee", pc.Path()); EXPECT_EQ(1U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, Whitespace) { net::CookieMonster::ParsedCookie pc(" A = BC ;secure;;; httponly"); EXPECT_TRUE(pc.IsValid()); EXPECT_EQ("A", pc.Name()); EXPECT_EQ("BC", pc.Value()); EXPECT_FALSE(pc.HasPath()); EXPECT_FALSE(pc.HasDomain()); EXPECT_TRUE(pc.IsSecure()); EXPECT_TRUE(pc.IsHttpOnly()); // We parse anything between ; as attributes, so we end up with two // attributes with an empty string name and value. EXPECT_EQ(4U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, MultipleEquals) { net::CookieMonster::ParsedCookie pc(" A=== BC ;secure;;; httponly"); EXPECT_TRUE(pc.IsValid()); EXPECT_EQ("A", pc.Name()); EXPECT_EQ("== BC", pc.Value()); EXPECT_FALSE(pc.HasPath()); EXPECT_FALSE(pc.HasDomain()); EXPECT_TRUE(pc.IsSecure()); EXPECT_TRUE(pc.IsHttpOnly()); EXPECT_EQ(4U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, QuotedTrailingWhitespace) { net::CookieMonster::ParsedCookie pc("ANCUUID=\"zohNumRKgI0oxyhSsV3Z7D\" ; " "expires=Sun, 18-Apr-2027 21:06:29 GMT ; " "path=/ ; "); EXPECT_TRUE(pc.IsValid()); EXPECT_EQ("ANCUUID", pc.Name()); // Stripping whitespace after the quotes matches all other major browsers. EXPECT_EQ("\"zohNumRKgI0oxyhSsV3Z7D\"", pc.Value()); EXPECT_TRUE(pc.HasExpires()); EXPECT_TRUE(pc.HasPath()); EXPECT_EQ("/", pc.Path()); EXPECT_EQ(2U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, TrailingWhitespace) { net::CookieMonster::ParsedCookie pc("ANCUUID=zohNumRKgI0oxyhSsV3Z7D ; " "expires=Sun, 18-Apr-2027 21:06:29 GMT ; " "path=/ ; "); EXPECT_TRUE(pc.IsValid()); EXPECT_EQ("ANCUUID", pc.Name()); EXPECT_EQ("zohNumRKgI0oxyhSsV3Z7D", pc.Value()); EXPECT_TRUE(pc.HasExpires()); EXPECT_TRUE(pc.HasPath()); EXPECT_EQ("/", pc.Path()); EXPECT_EQ(2U, pc.NumberOfAttributes()); } TEST(ParsedCookieTest, TooManyPairs) { std::string blankpairs; blankpairs.resize(net::CookieMonster::ParsedCookie::kMaxPairs - 1, ';'); net::CookieMonster::ParsedCookie pc1(blankpairs + "secure"); EXPECT_TRUE(pc1.IsValid()); EXPECT_TRUE(pc1.IsSecure()); net::CookieMonster::ParsedCookie pc2(blankpairs + ";secure"); EXPECT_TRUE(pc2.IsValid()); EXPECT_FALSE(pc2.IsSecure()); } // TODO some better test cases for invalid cookies. TEST(ParsedCookieTest, InvalidWhitespace) { net::CookieMonster::ParsedCookie pc(" "); EXPECT_FALSE(pc.IsValid()); } TEST(ParsedCookieTest, InvalidTooLong) { std::string maxstr; maxstr.resize(net::CookieMonster::ParsedCookie::kMaxCookieSize, 'a'); net::CookieMonster::ParsedCookie pc1(maxstr); EXPECT_TRUE(pc1.IsValid()); net::CookieMonster::ParsedCookie pc2(maxstr + "A"); EXPECT_FALSE(pc2.IsValid()); } TEST(ParsedCookieTest, InvalidEmpty) { net::CookieMonster::ParsedCookie pc(""); EXPECT_FALSE(pc.IsValid()); } TEST(ParsedCookieTest, EmbeddedTerminator) { net::CookieMonster::ParsedCookie pc1("AAA=BB\0ZYX"); net::CookieMonster::ParsedCookie pc2("AAA=BB\rZYX"); net::CookieMonster::ParsedCookie pc3("AAA=BB\nZYX"); EXPECT_TRUE(pc1.IsValid()); EXPECT_EQ("AAA", pc1.Name()); EXPECT_EQ("BB", pc1.Value()); EXPECT_TRUE(pc2.IsValid()); EXPECT_EQ("AAA", pc2.Name()); EXPECT_EQ("BB", pc2.Value()); EXPECT_TRUE(pc3.IsValid()); EXPECT_EQ("AAA", pc3.Name()); EXPECT_EQ("BB", pc3.Value()); } static const char kUrlGoogle[] = "http://www.google.izzle"; static const char kUrlGoogleSecure[] = "https://www.google.izzle"; static const char kUrlFtp[] = "ftp://ftp.google.izzle/"; static const char kValidCookieLine[] = "A=B; path=/"; static const char kValidDomainCookieLine[] = "A=B; path=/; domain=google.izzle"; TEST(CookieMonsterTest, DomainTest) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_TRUE(cm->SetCookie(url_google, "A=B")); EXPECT_EQ("A=B", cm->GetCookies(url_google)); EXPECT_TRUE(cm->SetCookie(url_google, "C=D; domain=.google.izzle")); EXPECT_EQ("A=B; C=D", cm->GetCookies(url_google)); // Verify that A=B was set as a host cookie rather than a domain // cookie -- should not be accessible from a sub sub-domain. EXPECT_EQ("C=D", cm->GetCookies(GURL("http://foo.www.google.izzle"))); // Test and make sure we find domain cookies on the same domain. EXPECT_TRUE(cm->SetCookie(url_google, "E=F; domain=.www.google.izzle")); EXPECT_EQ("A=B; C=D; E=F", cm->GetCookies(url_google)); // Test setting a domain= that doesn't start w/ a dot, should // treat it as a domain cookie, as if there was a pre-pended dot. EXPECT_TRUE(cm->SetCookie(url_google, "G=H; domain=www.google.izzle")); EXPECT_EQ("A=B; C=D; E=F; G=H", cm->GetCookies(url_google)); // Test domain enforcement, should fail on a sub-domain or something too deep. EXPECT_FALSE(cm->SetCookie(url_google, "I=J; domain=.izzle")); EXPECT_EQ("", cm->GetCookies(GURL("http://a.izzle"))); EXPECT_FALSE(cm->SetCookie(url_google, "K=L; domain=.bla.www.google.izzle")); EXPECT_EQ("C=D; E=F; G=H", cm->GetCookies(GURL("http://bla.www.google.izzle"))); EXPECT_EQ("A=B; C=D; E=F; G=H", cm->GetCookies(url_google)); } // FireFox recognizes domains containing trailing periods as valid. // IE and Safari do not. Assert the expected policy here. TEST(CookieMonsterTest, DomainWithTrailingDotTest) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url_google("http://www.google.com"); EXPECT_FALSE(cm->SetCookie(url_google, "a=1; domain=.www.google.com.")); EXPECT_FALSE(cm->SetCookie(url_google, "b=2; domain=.www.google.com..")); EXPECT_EQ("", cm->GetCookies(url_google)); } // Test that cookies can bet set on higher level domains. // http://b/issue?id=896491 TEST(CookieMonsterTest, ValidSubdomainTest) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url_abcd("http://a.b.c.d.com"); GURL url_bcd("http://b.c.d.com"); GURL url_cd("http://c.d.com"); GURL url_d("http://d.com"); EXPECT_TRUE(cm->SetCookie(url_abcd, "a=1; domain=.a.b.c.d.com")); EXPECT_TRUE(cm->SetCookie(url_abcd, "b=2; domain=.b.c.d.com")); EXPECT_TRUE(cm->SetCookie(url_abcd, "c=3; domain=.c.d.com")); EXPECT_TRUE(cm->SetCookie(url_abcd, "d=4; domain=.d.com")); EXPECT_EQ("a=1; b=2; c=3; d=4", cm->GetCookies(url_abcd)); EXPECT_EQ("b=2; c=3; d=4", cm->GetCookies(url_bcd)); EXPECT_EQ("c=3; d=4", cm->GetCookies(url_cd)); EXPECT_EQ("d=4", cm->GetCookies(url_d)); // Check that the same cookie can exist on different sub-domains. EXPECT_TRUE(cm->SetCookie(url_bcd, "X=bcd; domain=.b.c.d.com")); EXPECT_TRUE(cm->SetCookie(url_bcd, "X=cd; domain=.c.d.com")); EXPECT_EQ("b=2; c=3; d=4; X=bcd; X=cd", cm->GetCookies(url_bcd)); EXPECT_EQ("c=3; d=4; X=cd", cm->GetCookies(url_cd)); } // Test that setting a cookie which specifies an invalid domain has // no side-effect. An invalid domain in this context is one which does // not match the originating domain. // http://b/issue?id=896472 TEST(CookieMonsterTest, InvalidDomainTest) { { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url_foobar("http://foo.bar.com"); // More specific sub-domain than allowed. EXPECT_FALSE(cm->SetCookie(url_foobar, "a=1; domain=.yo.foo.bar.com")); EXPECT_FALSE(cm->SetCookie(url_foobar, "b=2; domain=.foo.com")); EXPECT_FALSE(cm->SetCookie(url_foobar, "c=3; domain=.bar.foo.com")); // Different TLD, but the rest is a substring. EXPECT_FALSE(cm->SetCookie(url_foobar, "d=4; domain=.foo.bar.com.net")); // A substring that isn't really a parent domain. EXPECT_FALSE(cm->SetCookie(url_foobar, "e=5; domain=ar.com")); // Completely invalid domains: EXPECT_FALSE(cm->SetCookie(url_foobar, "f=6; domain=.")); EXPECT_FALSE(cm->SetCookie(url_foobar, "g=7; domain=/")); EXPECT_FALSE(cm->SetCookie(url_foobar, "h=8; domain=http://foo.bar.com")); EXPECT_FALSE(cm->SetCookie(url_foobar, "i=9; domain=..foo.bar.com")); EXPECT_FALSE(cm->SetCookie(url_foobar, "j=10; domain=..bar.com")); // Make sure there isn't something quirky in the domain canonicalization // that supports full URL semantics. EXPECT_FALSE(cm->SetCookie(url_foobar, "k=11; domain=.foo.bar.com?blah")); EXPECT_FALSE(cm->SetCookie(url_foobar, "l=12; domain=.foo.bar.com/blah")); EXPECT_FALSE(cm->SetCookie(url_foobar, "m=13; domain=.foo.bar.com:80")); EXPECT_FALSE(cm->SetCookie(url_foobar, "n=14; domain=.foo.bar.com:")); EXPECT_FALSE(cm->SetCookie(url_foobar, "o=15; domain=.foo.bar.com#sup")); EXPECT_EQ("", cm->GetCookies(url_foobar)); } { // Make sure the cookie code hasn't gotten its subdomain string handling // reversed, missed a suffix check, etc. It's important here that the two // hosts below have the same domain + registry. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url_foocom("http://foo.com.com"); EXPECT_FALSE(cm->SetCookie(url_foocom, "a=1; domain=.foo.com.com.com")); EXPECT_EQ("", cm->GetCookies(url_foocom)); } } // Test the behavior of omitting dot prefix from domain, should // function the same as FireFox. // http://b/issue?id=889898 TEST(CookieMonsterTest, DomainWithoutLeadingDotTest) { { // The omission of dot results in setting a domain cookie. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url_hosted("http://manage.hosted.filefront.com"); GURL url_filefront("http://www.filefront.com"); EXPECT_TRUE(cm->SetCookie(url_hosted, "sawAd=1; domain=filefront.com")); EXPECT_EQ("sawAd=1", cm->GetCookies(url_hosted)); EXPECT_EQ("sawAd=1", cm->GetCookies(url_filefront)); } { // Even when the domains match exactly, don't consider it host cookie. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://www.google.com"); EXPECT_TRUE(cm->SetCookie(url, "a=1; domain=www.google.com")); EXPECT_EQ("a=1", cm->GetCookies(url)); EXPECT_EQ("a=1", cm->GetCookies(GURL("http://sub.www.google.com"))); EXPECT_EQ("", cm->GetCookies(GURL("http://something-else.com"))); } } // Test that the domain specified in cookie string is treated case-insensitive // http://b/issue?id=896475. TEST(CookieMonsterTest, CaseInsensitiveDomainTest) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url_google("http://www.google.com"); EXPECT_TRUE(cm->SetCookie(url_google, "a=1; domain=.GOOGLE.COM")); EXPECT_TRUE(cm->SetCookie(url_google, "b=2; domain=.wWw.gOOgLE.coM")); EXPECT_EQ("a=1; b=2", cm->GetCookies(url_google)); } TEST(CookieMonsterTest, TestIpAddress) { GURL url_ip("http://1.2.3.4/weee"); { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_TRUE(cm->SetCookie(url_ip, kValidCookieLine)); EXPECT_EQ("A=B", cm->GetCookies(url_ip)); } { // IP addresses should not be able to set domain cookies. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_FALSE(cm->SetCookie(url_ip, "b=2; domain=.1.2.3.4")); EXPECT_FALSE(cm->SetCookie(url_ip, "c=3; domain=.3.4")); EXPECT_EQ("", cm->GetCookies(url_ip)); // It should be allowed to set a cookie if domain= matches the IP address // exactly. This matches IE/Firefox, even though it seems a bit wrong. EXPECT_FALSE(cm->SetCookie(url_ip, "b=2; domain=1.2.3.3")); EXPECT_EQ("", cm->GetCookies(url_ip)); EXPECT_TRUE(cm->SetCookie(url_ip, "b=2; domain=1.2.3.4")); EXPECT_EQ("b=2", cm->GetCookies(url_ip)); } } // Test host cookies, and setting of cookies on TLD. TEST(CookieMonsterTest, TestNonDottedAndTLD) { { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://com/"); // Allow setting on "com", (but only as a host cookie). EXPECT_TRUE(cm->SetCookie(url, "a=1")); EXPECT_FALSE(cm->SetCookie(url, "b=2; domain=.com")); EXPECT_FALSE(cm->SetCookie(url, "c=3; domain=com")); EXPECT_EQ("a=1", cm->GetCookies(url)); // Make sure it doesn't show up for a normal .com, it should be a host // not a domain cookie. EXPECT_EQ("", cm->GetCookies(GURL("http://hopefully-no-cookies.com/"))); EXPECT_EQ("", cm->GetCookies(GURL("http://.com/"))); } { // http://com. should be treated the same as http://com. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://com./index.html"); EXPECT_TRUE(cm->SetCookie(url, "a=1")); EXPECT_EQ("a=1", cm->GetCookies(url)); EXPECT_EQ("", cm->GetCookies(GURL("http://hopefully-no-cookies.com./"))); } { // Should not be able to set host cookie from a subdomain. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://a.b"); EXPECT_FALSE(cm->SetCookie(url, "a=1; domain=.b")); EXPECT_FALSE(cm->SetCookie(url, "b=2; domain=b")); EXPECT_EQ("", cm->GetCookies(url)); } { // Same test as above, but explicitly on a known TLD (com). scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://google.com"); EXPECT_FALSE(cm->SetCookie(url, "a=1; domain=.com")); EXPECT_FALSE(cm->SetCookie(url, "b=2; domain=com")); EXPECT_EQ("", cm->GetCookies(url)); } { // Make sure can't set cookie on TLD which is dotted. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://google.co.uk"); EXPECT_FALSE(cm->SetCookie(url, "a=1; domain=.co.uk")); EXPECT_FALSE(cm->SetCookie(url, "b=2; domain=.uk")); EXPECT_EQ("", cm->GetCookies(url)); EXPECT_EQ("", cm->GetCookies(GURL("http://something-else.co.uk"))); EXPECT_EQ("", cm->GetCookies(GURL("http://something-else.uk"))); } { // Intranet URLs should only be able to set host cookies. scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://b"); EXPECT_TRUE(cm->SetCookie(url, "a=1")); EXPECT_FALSE(cm->SetCookie(url, "b=2; domain=.b")); EXPECT_FALSE(cm->SetCookie(url, "c=3; domain=b")); EXPECT_EQ("a=1", cm->GetCookies(url)); } } // Test reading/writing cookies when the domain ends with a period, // as in "www.google.com." TEST(CookieMonsterTest, TestHostEndsWithDot) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url("http://www.google.com"); GURL url_with_dot("http://www.google.com."); EXPECT_TRUE(cm->SetCookie(url, "a=1")); EXPECT_EQ("a=1", cm->GetCookies(url)); // Do not share cookie space with the dot version of domain. // Note: this is not what FireFox does, but it _is_ what IE+Safari do. EXPECT_FALSE(cm->SetCookie(url, "b=2; domain=.www.google.com.")); EXPECT_EQ("a=1", cm->GetCookies(url)); EXPECT_TRUE(cm->SetCookie(url_with_dot, "b=2; domain=.google.com.")); EXPECT_EQ("b=2", cm->GetCookies(url_with_dot)); // Make sure there weren't any side effects. EXPECT_EQ(cm->GetCookies(GURL("http://hopefully-no-cookies.com/")), ""); EXPECT_EQ("", cm->GetCookies(GURL("http://.com/"))); } TEST(CookieMonsterTest, InvalidScheme) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_FALSE(cm->SetCookie(GURL(kUrlFtp), kValidCookieLine)); } TEST(CookieMonsterTest, InvalidScheme_Read) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_TRUE(cm->SetCookie(GURL(kUrlGoogle), kValidDomainCookieLine)); EXPECT_EQ("", cm->GetCookies(GURL(kUrlFtp))); } TEST(CookieMonsterTest, PathTest) { std::string url("http://www.google.izzle"); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_TRUE(cm->SetCookie(GURL(url), "A=B; path=/wee")); EXPECT_EQ("A=B", cm->GetCookies(GURL(url + "/wee"))); EXPECT_EQ("A=B", cm->GetCookies(GURL(url + "/wee/"))); EXPECT_EQ("A=B", cm->GetCookies(GURL(url + "/wee/war"))); EXPECT_EQ("A=B", cm->GetCookies(GURL(url + "/wee/war/more/more"))); EXPECT_EQ("", cm->GetCookies(GURL(url + "/weehee"))); EXPECT_EQ("", cm->GetCookies(GURL(url + "/"))); // If we add a 0 length path, it should default to / EXPECT_TRUE(cm->SetCookie(GURL(url), "A=C; path=")); EXPECT_EQ("A=B; A=C", cm->GetCookies(GURL(url + "/wee"))); EXPECT_EQ("A=C", cm->GetCookies(GURL(url + "/"))); } TEST(CookieMonsterTest, HttpOnlyTest) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); net::CookieOptions options; options.set_include_httponly(); // Create a httponly cookie. EXPECT_TRUE(cm->SetCookieWithOptions(url_google, "A=B; httponly", options)); // Check httponly read protection. EXPECT_EQ("", cm->GetCookies(url_google)); EXPECT_EQ("A=B", cm->GetCookiesWithOptions(url_google, options)); // Check httponly overwrite protection. EXPECT_FALSE(cm->SetCookie(url_google, "A=C")); EXPECT_EQ("", cm->GetCookies(url_google)); EXPECT_EQ("A=B", cm->GetCookiesWithOptions(url_google, options)); EXPECT_TRUE(cm->SetCookieWithOptions(url_google, "A=C", options)); EXPECT_EQ("A=C", cm->GetCookies(url_google)); // Check httponly create protection. EXPECT_FALSE(cm->SetCookie(url_google, "B=A; httponly")); EXPECT_EQ("A=C", cm->GetCookiesWithOptions(url_google, options)); EXPECT_TRUE(cm->SetCookieWithOptions(url_google, "B=A; httponly", options)); EXPECT_EQ("A=C; B=A", cm->GetCookiesWithOptions(url_google, options)); EXPECT_EQ("A=C", cm->GetCookies(url_google)); } namespace { struct CookieDateParsingCase { const char* str; const bool valid; const time_t epoch; }; } // namespace TEST(CookieMonsterTest, TestCookieDateParsing) { const CookieDateParsingCase tests[] = { { "Sat, 15-Apr-17 21:01:22 GMT", true, 1492290082 }, { "Thu, 19-Apr-2007 16:00:00 GMT", true, 1176998400 }, { "Wed, 25 Apr 2007 21:02:13 GMT", true, 1177534933 }, { "Thu, 19/Apr\\2007 16:00:00 GMT", true, 1176998400 }, { "Fri, 1 Jan 2010 01:01:50 GMT", true, 1262307710 }, { "Wednesday, 1-Jan-2003 00:00:00 GMT", true, 1041379200 }, { ", 1-Jan-2003 00:00:00 GMT", true, 1041379200 }, { " 1-Jan-2003 00:00:00 GMT", true, 1041379200 }, { "1-Jan-2003 00:00:00 GMT", true, 1041379200 }, { "Wed,18-Apr-07 22:50:12 GMT", true, 1176936612 }, { "WillyWonka , 18-Apr-07 22:50:12 GMT", true, 1176936612 }, { "WillyWonka , 18-Apr-07 22:50:12", true, 1176936612 }, { "WillyWonka , 18-apr-07 22:50:12", true, 1176936612 }, { "Mon, 18-Apr-1977 22:50:13 GMT", true, 230251813 }, { "Mon, 18-Apr-77 22:50:13 GMT", true, 230251813 }, // If the cookie came in with the expiration quoted (which in terms of // the RFC you shouldn't do), we will get string quoted. Bug 1261605. { "\"Sat, 15-Apr-17\\\"21:01:22\\\"GMT\"", true, 1492290082 }, // Test with full month names and partial names. { "Partyday, 18- April-07 22:50:12", true, 1176936612 }, { "Partyday, 18 - Apri-07 22:50:12", true, 1176936612 }, { "Wednes, 1-Januar-2003 00:00:00 GMT", true, 1041379200 }, // Test that we always take GMT even with other time zones or bogus // values. The RFC says everything should be GMT, and in the worst case // we are 24 hours off because of zone issues. { "Sat, 15-Apr-17 21:01:22", true, 1492290082 }, { "Sat, 15-Apr-17 21:01:22 GMT-2", true, 1492290082 }, { "Sat, 15-Apr-17 21:01:22 GMT BLAH", true, 1492290082 }, { "Sat, 15-Apr-17 21:01:22 GMT-0400", true, 1492290082 }, { "Sat, 15-Apr-17 21:01:22 GMT-0400 (EDT)",true, 1492290082 }, { "Sat, 15-Apr-17 21:01:22 DST", true, 1492290082 }, { "Sat, 15-Apr-17 21:01:22 -0400", true, 1492290082 }, { "Sat, 15-Apr-17 21:01:22 (hello there)", true, 1492290082 }, // Test that if we encounter multiple : fields, that we take the first // that correctly parses. { "Sat, 15-Apr-17 21:01:22 11:22:33", true, 1492290082 }, { "Sat, 15-Apr-17 ::00 21:01:22", true, 1492290082 }, { "Sat, 15-Apr-17 boink:z 21:01:22", true, 1492290082 }, // We take the first, which in this case is invalid. { "Sat, 15-Apr-17 91:22:33 21:01:22", false, 0 }, // amazon.com formats their cookie expiration like this. { "Thu Apr 18 22:50:12 2007 GMT", true, 1176936612 }, // Test that hh:mm:ss can occur anywhere. { "22:50:12 Thu Apr 18 2007 GMT", true, 1176936612 }, { "Thu 22:50:12 Apr 18 2007 GMT", true, 1176936612 }, { "Thu Apr 22:50:12 18 2007 GMT", true, 1176936612 }, { "Thu Apr 18 22:50:12 2007 GMT", true, 1176936612 }, { "Thu Apr 18 2007 22:50:12 GMT", true, 1176936612 }, { "Thu Apr 18 2007 GMT 22:50:12", true, 1176936612 }, // Test that the day and year can be anywhere if they are unambigious. { "Sat, 15-Apr-17 21:01:22 GMT", true, 1492290082 }, { "15-Sat, Apr-17 21:01:22 GMT", true, 1492290082 }, { "15-Sat, Apr 21:01:22 GMT 17", true, 1492290082 }, { "15-Sat, Apr 21:01:22 GMT 2017", true, 1492290082 }, { "15 Apr 21:01:22 2017", true, 1492290082 }, { "15 17 Apr 21:01:22", true, 1492290082 }, { "Apr 15 17 21:01:22", true, 1492290082 }, { "Apr 15 21:01:22 17", true, 1492290082 }, { "2017 April 15 21:01:22", true, 1492290082 }, { "15 April 2017 21:01:22", true, 1492290082 }, // Some invalid dates { "98 April 17 21:01:22", false, 0 }, { "Thu, 012-Aug-2008 20:49:07 GMT", false, 0 }, { "Thu, 12-Aug-31841 20:49:07 GMT", false, 0 }, { "Thu, 12-Aug-9999999999 20:49:07 GMT", false, 0 }, { "Thu, 999999999999-Aug-2007 20:49:07 GMT", false, 0 }, { "Thu, 12-Aug-2007 20:61:99999999999 GMT", false, 0 }, { "IAintNoDateFool", false, 0 }, }; Time parsed_time; for (size_t i = 0; i < arraysize(tests); ++i) { parsed_time = net::CookieMonster::ParseCookieTime(tests[i].str); if (!tests[i].valid) { EXPECT_FALSE(!parsed_time.is_null()) << tests[i].str; continue; } EXPECT_TRUE(!parsed_time.is_null()) << tests[i].str; EXPECT_EQ(tests[i].epoch, parsed_time.ToTimeT()) << tests[i].str; } } TEST(CookieMonsterTest, TestCookieDeletion) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); // Create a session cookie. EXPECT_TRUE(cm->SetCookie(url_google, kValidCookieLine)); EXPECT_EQ("A=B", cm->GetCookies(url_google)); // Delete it via Max-Age. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; max-age=0")); EXPECT_EQ("", cm->GetCookies(url_google)); // Create a session cookie. EXPECT_TRUE(cm->SetCookie(url_google, kValidCookieLine)); EXPECT_EQ("A=B", cm->GetCookies(url_google)); // Delete it via Expires. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; expires=Mon, 18-Apr-1977 22:50:13 GMT")); EXPECT_EQ("", cm->GetCookies(url_google)); // Create a persistent cookie. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; expires=Mon, 18-Apr-22 22:50:13 GMT")); EXPECT_EQ("A=B", cm->GetCookies(url_google)); // Delete it via Max-Age. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; max-age=0")); EXPECT_EQ("", cm->GetCookies(url_google)); // Create a persistent cookie. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; expires=Mon, 18-Apr-22 22:50:13 GMT")); EXPECT_EQ("A=B", cm->GetCookies(url_google)); // Delete it via Expires. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; expires=Mon, 18-Apr-1977 22:50:13 GMT")); EXPECT_EQ("", cm->GetCookies(url_google)); // Create a persistent cookie. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; expires=Mon, 18-Apr-22 22:50:13 GMT")); EXPECT_EQ("A=B", cm->GetCookies(url_google)); // Delete it via Expires, with a unix epoch of 0. EXPECT_TRUE(cm->SetCookie(url_google, std::string(kValidCookieLine) + "; expires=Thu, 1-Jan-1970 00:00:00 GMT")); EXPECT_EQ("", cm->GetCookies(url_google)); } TEST(CookieMonsterTest, TestCookieDeleteAll) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); net::CookieOptions options; options.set_include_httponly(); EXPECT_TRUE(cm->SetCookie(url_google, kValidCookieLine)); EXPECT_EQ("A=B", cm->GetCookies(url_google)); EXPECT_TRUE(cm->SetCookieWithOptions(url_google, "C=D; httponly", options)); EXPECT_EQ("A=B; C=D", cm->GetCookiesWithOptions(url_google, options)); EXPECT_EQ(2, cm->DeleteAll(false)); EXPECT_EQ("", cm->GetCookiesWithOptions(url_google, options)); } TEST(CookieMonsterTest, TestCookieDeleteAllCreatedAfterTimestamp) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); Time now = Time::Now(); // Nothing has been added so nothing should be deleted. EXPECT_EQ(0, cm->DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false)); // Create 3 cookies with creation date of today, yesterday and the day before. EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-0=Now", now)); EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-1=Yesterday", now - TimeDelta::FromDays(1))); EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-2=DayBefore", now - TimeDelta::FromDays(2))); // Try to delete everything from now onwards. EXPECT_EQ(1, cm->DeleteAllCreatedAfter(now, false)); // Now delete the one cookie created in the last day. EXPECT_EQ(1, cm->DeleteAllCreatedAfter(now - TimeDelta::FromDays(1), false)); // Now effectively delete all cookies just created (1 is remaining). EXPECT_EQ(1, cm->DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false)); // Make sure everything is gone. EXPECT_EQ(0, cm->DeleteAllCreatedAfter(Time(), false)); // Really make sure everything is gone. EXPECT_EQ(0, cm->DeleteAll(false)); } TEST(CookieMonsterTest, TestCookieDeleteAllCreatedBetweenTimestamps) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); Time now = Time::Now(); // Nothing has been added so nothing should be deleted. EXPECT_EQ(0, cm->DeleteAllCreatedAfter(now - TimeDelta::FromDays(99), false)); // Create 3 cookies with creation date of today, yesterday and the day before. EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-0=Now", now)); EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-1=Yesterday", now - TimeDelta::FromDays(1))); EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-2=DayBefore", now - TimeDelta::FromDays(2))); EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-3=ThreeDays", now - TimeDelta::FromDays(3))); EXPECT_TRUE(cm->SetCookieWithCreationTime(url_google, "T-7=LastWeek", now - TimeDelta::FromDays(7))); // Try to delete threedays and the daybefore. EXPECT_EQ(2, cm->DeleteAllCreatedBetween(now - TimeDelta::FromDays(3), now - TimeDelta::FromDays(1), false)); // Try to delete yesterday, also make sure that delete_end is not // inclusive. EXPECT_EQ(1, cm->DeleteAllCreatedBetween(now - TimeDelta::FromDays(2), now, false)); // Make sure the delete_begin is inclusive. EXPECT_EQ(1, cm->DeleteAllCreatedBetween(now - TimeDelta::FromDays(7), now, false)); // Delete the last (now) item. EXPECT_EQ(1, cm->DeleteAllCreatedAfter(Time(), false)); // Really make sure everything is gone. EXPECT_EQ(0, cm->DeleteAll(false)); } TEST(CookieMonsterTest, TestSecure) { GURL url_google(kUrlGoogle); GURL url_google_secure(kUrlGoogleSecure); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_TRUE(cm->SetCookie(url_google, "A=B")); EXPECT_EQ("A=B", cm->GetCookies(url_google)); EXPECT_EQ("A=B", cm->GetCookies(url_google_secure)); EXPECT_TRUE(cm->SetCookie(url_google_secure, "A=B; secure")); // The secure should overwrite the non-secure. EXPECT_EQ("", cm->GetCookies(url_google)); EXPECT_EQ("A=B", cm->GetCookies(url_google_secure)); EXPECT_TRUE(cm->SetCookie(url_google_secure, "D=E; secure")); EXPECT_EQ("", cm->GetCookies(url_google)); EXPECT_EQ("A=B; D=E", cm->GetCookies(url_google_secure)); EXPECT_TRUE(cm->SetCookie(url_google_secure, "A=B")); // The non-secure should overwrite the secure. EXPECT_EQ("A=B", cm->GetCookies(url_google)); EXPECT_EQ("D=E; A=B", cm->GetCookies(url_google_secure)); } static Time GetFirstCookieAccessDate(net::CookieMonster* cm) { const net::CookieMonster::CookieList all_cookies(cm->GetAllCookies()); return all_cookies.front().second.LastAccessDate(); } static const int kLastAccessThresholdMilliseconds = 200; TEST(CookieMonsterTest, TestLastAccess) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm( new net::CookieMonster(kLastAccessThresholdMilliseconds)); EXPECT_TRUE(cm->SetCookie(url_google, "A=B")); const Time last_access_date(GetFirstCookieAccessDate(cm)); // Reading the cookie again immediately shouldn't update the access date, // since we're inside the threshold. EXPECT_EQ("A=B", cm->GetCookies(url_google)); EXPECT_TRUE(last_access_date == GetFirstCookieAccessDate(cm)); // Reading after a short wait should update the access date. PlatformThread::Sleep(kLastAccessThresholdMilliseconds + 20); EXPECT_EQ("A=B", cm->GetCookies(url_google)); EXPECT_FALSE(last_access_date == GetFirstCookieAccessDate(cm)); } static int CountInString(const std::string& str, char c) { int count = 0; for (std::string::const_iterator it = str.begin(); it != str.end(); ++it) { if (*it == c) ++count; } return count; } TEST(CookieMonsterTest, TestHostGarbageCollection) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); // Add a bunch of cookies on a single host, should purge them. for (int i = 0; i < 101; i++) { std::string cookie = StringPrintf("a%03d=b", i); EXPECT_TRUE(cm->SetCookie(url_google, cookie)); std::string cookies = cm->GetCookies(url_google); // Make sure we find it in the cookies. EXPECT_TRUE(cookies.find(cookie) != std::string::npos); // Count the number of cookies. EXPECT_LE(CountInString(cookies, '='), 70); } } TEST(CookieMonsterTest, TestTotalGarbageCollection) { scoped_refptr<net::CookieMonster> cm( new net::CookieMonster(kLastAccessThresholdMilliseconds)); // Add a bunch of cookies on a bunch of host, some should get purged. const GURL sticky_cookie("http://a0000.izzle"); for (int i = 0; i < 4000; ++i) { GURL url(StringPrintf("http://a%04d.izzle", i)); EXPECT_TRUE(cm->SetCookie(url, "a=b")); EXPECT_EQ("a=b", cm->GetCookies(url)); // Keep touching the first cookie to ensure it's not purged (since it will // always have the most recent access time). if (!(i % 500)) { // Ensure the timestamps will be different enough to update. PlatformThread::Sleep(kLastAccessThresholdMilliseconds + 20); EXPECT_EQ("a=b", cm->GetCookies(sticky_cookie)); } } // Check that cookies that still exist. for (int i = 0; i < 4000; ++i) { GURL url(StringPrintf("http://a%04d.izzle", i)); if ((i == 0) || (i > 1001)) { // Cookies should still be around. EXPECT_FALSE(cm->GetCookies(url).empty()); } else if (i < 701) { // Cookies should have gotten purged. EXPECT_TRUE(cm->GetCookies(url).empty()); } } } // Formerly NetUtilTest.CookieTest back when we used wininet's cookie handling. TEST(CookieMonsterTest, NetUtilCookieTest) { const GURL test_url("http://mojo.jojo.google.izzle/"); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_TRUE(cm->SetCookie(test_url, "foo=bar")); std::string value = cm->GetCookies(test_url); EXPECT_EQ("foo=bar", value); // test that we can retrieve all cookies: EXPECT_TRUE(cm->SetCookie(test_url, "x=1")); EXPECT_TRUE(cm->SetCookie(test_url, "y=2")); std::string result = cm->GetCookies(test_url); EXPECT_FALSE(result.empty()); EXPECT_NE(result.find("x=1"), std::string::npos) << result; EXPECT_NE(result.find("y=2"), std::string::npos) << result; } static bool FindAndDeleteCookie(net::CookieMonster* cm, const std::string& domain, const std::string& name) { net::CookieMonster::CookieList cookies = cm->GetAllCookies(); for (net::CookieMonster::CookieList::iterator it = cookies.begin(); it != cookies.end(); ++it) if (it->first == domain && it->second.Name() == name) return cm->DeleteCookie(domain, it->second, false); return false; } TEST(CookieMonsterTest, TestDeleteSingleCookie) { GURL url_google(kUrlGoogle); scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); EXPECT_TRUE(cm->SetCookie(url_google, "A=B")); EXPECT_TRUE(cm->SetCookie(url_google, "C=D")); EXPECT_TRUE(cm->SetCookie(url_google, "E=F")); EXPECT_EQ("A=B; C=D; E=F", cm->GetCookies(url_google)); EXPECT_TRUE(FindAndDeleteCookie(cm, url_google.host(), "C")); EXPECT_EQ("A=B; E=F", cm->GetCookies(url_google)); EXPECT_FALSE(FindAndDeleteCookie(cm, "random.host", "E")); EXPECT_EQ("A=B; E=F", cm->GetCookies(url_google)); } TEST(CookieMonsterTest, SetCookieableSchemes) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); scoped_refptr<net::CookieMonster> cm_foo(new net::CookieMonster); // Only cm_foo should allow foo:// cookies. const char* kSchemes[] = {"foo"}; cm_foo->SetCookieableSchemes(kSchemes, 1); GURL foo_url("foo://host/path"); GURL http_url("http://host/path"); EXPECT_TRUE(cm->SetCookie(http_url, "x=1")); EXPECT_FALSE(cm->SetCookie(foo_url, "x=1")); EXPECT_TRUE(cm_foo->SetCookie(foo_url, "x=1")); EXPECT_FALSE(cm_foo->SetCookie(http_url, "x=1")); } TEST(CookieMonsterTest, GetAllCookiesForURL) { GURL url_google(kUrlGoogle); GURL url_google_secure(kUrlGoogleSecure); scoped_refptr<net::CookieMonster> cm( new net::CookieMonster(kLastAccessThresholdMilliseconds)); // Create an httponly cookie. net::CookieOptions options; options.set_include_httponly(); EXPECT_TRUE(cm->SetCookieWithOptions(url_google, "A=B; httponly", options)); EXPECT_TRUE(cm->SetCookieWithOptions(url_google, "C=D; domain=.google.izzle", options)); EXPECT_TRUE(cm->SetCookieWithOptions(url_google_secure, "E=F; domain=.google.izzle; secure", options)); const Time last_access_date(GetFirstCookieAccessDate(cm)); PlatformThread::Sleep(kLastAccessThresholdMilliseconds + 20); // Check raw cookies. net::CookieMonster::CookieList raw_cookies = cm->GetAllCookiesForURL(url_google); net::CookieMonster::CookieList::iterator it = raw_cookies.begin(); ASSERT_TRUE(it != raw_cookies.end()); EXPECT_EQ("www.google.izzle", it->first); EXPECT_EQ("A", it->second.Name()); ASSERT_TRUE(++it != raw_cookies.end()); EXPECT_EQ(".google.izzle", it->first); EXPECT_EQ("C", it->second.Name()); ASSERT_TRUE(++it == raw_cookies.end()); // Test secure cookies. raw_cookies = cm->GetAllCookiesForURL(url_google_secure); it = raw_cookies.begin(); ASSERT_TRUE(it != raw_cookies.end()); EXPECT_EQ("www.google.izzle", it->first); EXPECT_EQ("A", it->second.Name()); ASSERT_TRUE(++it != raw_cookies.end()); EXPECT_EQ(".google.izzle", it->first); EXPECT_EQ("C", it->second.Name()); ASSERT_TRUE(++it != raw_cookies.end()); EXPECT_EQ(".google.izzle", it->first); EXPECT_EQ("E", it->second.Name()); ASSERT_TRUE(++it == raw_cookies.end()); // Reading after a short wait should not update the access date. EXPECT_TRUE (last_access_date == GetFirstCookieAccessDate(cm)); } TEST(CookieMonsterTest, DeleteCookieByName) { scoped_refptr<net::CookieMonster> cm(new net::CookieMonster); GURL url_google(kUrlGoogle); EXPECT_TRUE(cm->SetCookie(url_google, "A=A1; path=/")); EXPECT_TRUE(cm->SetCookie(url_google, "A=A2; path=/foo")); EXPECT_TRUE(cm->SetCookie(url_google, "A=A3; path=/bar")); EXPECT_TRUE(cm->SetCookie(url_google, "B=B1; path=/")); EXPECT_TRUE(cm->SetCookie(url_google, "B=B2; path=/foo")); EXPECT_TRUE(cm->SetCookie(url_google, "B=B3; path=/bar")); cm->DeleteCookie(GURL(std::string(kUrlGoogle) + "/foo/bar"), "A"); net::CookieMonster::CookieList cookies = cm->GetAllCookies(); size_t expected_size = 4; EXPECT_EQ(expected_size, cookies.size()); for (net::CookieMonster::CookieList::iterator it = cookies.begin(); it != cookies.end(); ++it) { EXPECT_NE("A1", it->second.Value()); EXPECT_NE("A2", it->second.Value()); } } // TODO test overwrite cookie