gecko/browser/components/loop/test/xpcshell/test_loopservice_token_validation.js

50 lines
1.5 KiB
JavaScript

/* Any copyright is dedicated to the Public Domain.
http://creativecommons.org/publicdomain/zero/1.0/ */
// XXX should report error if Hawk-Session-Token is lexically invalid
// (not a string of 64 hex digits) to help resist other possible injection
// attacks. For now, however, we're just checking if it's the right length.
add_test(function test_registration_handles_bogus_hawk_token() {
var wrongSizeToken = "jdkasjkasjdlaksj";
Services.prefs.clearUserPref("loop.hawk-session-token");
loopServer.registerPathHandler("/registration", (request, response) => {
response.setStatusLine(null, 200, "OK");
response.setHeader("Hawk-Session-Token", wrongSizeToken, false);
response.processAsync();
response.finish();
});
MozLoopService.promiseRegisteredWithServers().then(() => {
do_throw("should not succeed with a bogus token");
}, err => {
Assert.equal(err.message, "session-token-wrong-size", "Should cause an error to be" +
" called back if the session-token is not 64 characters long");
// for some reason, Assert.throw is misbehaving, so....
var ex;
try {
Services.prefs.getCharPref("loop.hawk-session-token");
} catch (e) {
ex = e;
}
Assert.notEqual(ex, undefined, "Should not set a loop.hawk-session-token pref");
run_next_test();
});
});
function run_test() {
setupFakeLoopServer();
mockPushHandler.registrationPushURL = kEndPointUrl;
do_register_cleanup(function() {
Services.prefs.clearUserPref("loop.hawk-session-token");
});
run_next_test();
}