var checkUrls = []; var checkExpect; var chunk1Urls = [ "test.com/aba", "test.com/foo/bar", "foo.bar.com/a/b/c" ]; var chunk1 = chunk1Urls.join("\n"); var chunk2Urls = [ "blah.com/a", "baz.com/", "255.255.0.1/", "www.foo.com/test2?param=1" ]; var chunk2 = chunk2Urls.join("\n"); var chunk3Urls = [ "test.com/a", "foo.bar.com/a", "blah.com/a", ]; var chunk3 = chunk3Urls.join("\n"); var chunk3SubUrls = [ "1:test.com/a", "1:foo.bar.com/a", "2:blah.com/a" ]; var chunk3Sub = chunk3SubUrls.join("\n"); var chunk4Urls = [ "a.com/b", "b.com/c", ]; var chunk4 = chunk3Urls.join("\n"); var chunk5Urls = [ "d.com/e", "f.com/g", ]; var chunk5 = chunk3Urls.join("\n"); var chunk6Urls = [ "h.com/i", "j.com/k", ]; var chunk6 = chunk3Urls.join("\n"); // we are going to add chunks 1, 2, 4, 5, and 6 to phish-simple, and // chunk 2 to malware-simple. Then we'll remove the urls in chunk3 // from phish-simple, then expire chunk 1 and chunks 4-5 from // phish-simple. var phishExpected = {}; var phishUnexpected = {}; var malwareExpected = {}; for (var i = 0; i < chunk2Urls.length; i++) { phishExpected[chunk2Urls[i]] = true; malwareExpected[chunk2Urls[i]] = true; } for (var i = 0; i < chunk3Urls.length; i++) { delete phishExpected[chunk3Urls[i]]; phishUnexpected[chunk3Urls[i]] = true; } for (var i = 0; i < chunk1Urls.length; i++) { // chunk1 urls are expired phishUnexpected[chunk1Urls[i]] = true; } for (var i = 0; i < chunk4Urls.length; i++) { // chunk4 urls are expired phishUnexpected[chunk4Urls[i]] = true; } for (var i = 0; i < chunk5Urls.length; i++) { // chunk5 urls are expired phishUnexpected[chunk5Urls[i]] = true; } for (var i = 0; i < chunk6Urls.length; i++) { // chunk6 urls are expired phishUnexpected[chunk6Urls[i]] = true; } // Check that the entries hit based on sub-parts phishExpected["baz.com/foo/bar"] = true; phishExpected["foo.bar.baz.com/foo"] = true; phishExpected["bar.baz.com/"] = true; var numExpecting; function testFailure(arg) { do_throw(arg); } function checkNoHost() { // Looking up a no-host uri such as a data: uri should throw an exception. var exception; try { dbservice.lookup("data:text/html,test"); exception = false; } catch(e) { exception = true; } do_check_true(exception); do_test_finished(); } function tablesCallbackWithoutSub(tables) { var parts = tables.split("\n"); parts.sort(); // there's a leading \n here because splitting left an empty string // after the trailing newline, which will sort first do_check_eq(parts.join("\n"), "\ntesting-malware-simple;a:1\ntesting-phish-simple;a:2"); checkNoHost(); } function expireSubSuccess(result) { dbservice.getTables(tablesCallbackWithoutSub); } function tablesCallbackWithSub(tables) { var parts = tables.split("\n"); parts.sort(); // there's a leading \n here because splitting left an empty string // after the trailing newline, which will sort first do_check_eq(parts.join("\n"), "\ntesting-malware-simple;a:1\ntesting-phish-simple;a:2:s:3"); // verify that expiring a sub chunk removes its name from the list var data = "n:1000\n" + "i:testing-phish-simple\n" + "sd:3\n"; doSimpleUpdate(data, expireSubSuccess, testFailure); } function checkChunksWithSub() { dbservice.getTables(tablesCallbackWithSub); } function checkDone() { if (--numExpecting == 0) checkChunksWithSub(); } function phishExists(result) { dumpn("phishExists: " + result); try { do_check_true(result.indexOf("testing-phish-simple") != -1); } finally { checkDone(); } } function phishDoesntExist(result) { dumpn("phishDoesntExist: " + result); try { do_check_true(result.indexOf("testing-phish-simple") == -1); } finally { checkDone(); } } function malwareExists(result) { dumpn("malwareExists: " + result); try { do_check_true(result.indexOf("testing-malware-simple") != -1); } finally { checkDone(); } } function checkState() { numExpecting = 0; for (var key in phishExpected) { dbservice.lookup("http://" + key, phishExists, true); numExpecting++; } for (var key in phishUnexpected) { dbservice.lookup("http://" + key, phishDoesntExist, true); numExpecting++; } for (var key in malwareExpected) { dbservice.lookup("http://" + key, malwareExists, true); numExpecting++; } } function testSubSuccess(result) { do_check_eq(result, "1000"); checkState(); } function do_subs() { var data = "n:1000\n" + "i:testing-phish-simple\n" + "s:3:32:" + chunk3Sub.length + "\n" + chunk3Sub + "\n" + "ad:1\n" + "ad:4-6\n"; doSimpleUpdate(data, testSubSuccess, testFailure); } function testAddSuccess(arg) { do_check_eq(arg, "1000"); do_subs(); } function do_adds() { // This test relies on the fact that only -regexp tables are ungzipped, // and only -hash tables are assumed to be pre-md5'd. So we use // a 'simple' table type to get simple hostname-per-line semantics. var data = "n:1000\n" + "i:testing-phish-simple\n" + "a:1:32:" + chunk1.length + "\n" + chunk1 + "\n" + "a:2:32:" + chunk2.length + "\n" + chunk2 + "\n" + "a:4:32:" + chunk4.length + "\n" + chunk4 + "\n" + "a:5:32:" + chunk5.length + "\n" + chunk5 + "\n" + "a:6:32:" + chunk6.length + "\n" + chunk6 + "\n" + "i:testing-malware-simple\n" + "a:1:32:" + chunk2.length + "\n" + chunk2 + "\n"; doSimpleUpdate(data, testAddSuccess, testFailure); } function run_test() { do_adds(); do_test_pending(); }