/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ use cookie_rs::Cookie as CookiePair; use devtools_traits::HttpRequest as DevtoolsHttpRequest; use devtools_traits::HttpResponse as DevtoolsHttpResponse; use devtools_traits::{ChromeToDevtoolsControlMsg, DevtoolsControlMsg, NetworkEvent}; use flate2::Compression; use flate2::write::{GzEncoder, DeflateEncoder}; use hyper::header::{Accept, AcceptEncoding, ContentEncoding, ContentLength, Cookie as CookieHeader}; use hyper::header::{Authorization, Basic}; use hyper::header::{Encoding, Headers, Host, Location, Quality, QualityItem, qitem, SetCookie}; use hyper::header::{StrictTransportSecurity, UserAgent}; use hyper::http::RawStatus; use hyper::method::Method; use hyper::mime::{Mime, SubLevel, TopLevel}; use hyper::status::StatusCode; use msg::constellation_msg::PipelineId; use net::cookie::Cookie; use net::cookie_storage::CookieStorage; use net::hsts::{HSTSList, HSTSEntry}; use net::http_loader::{load, LoadError, HttpRequestFactory, HttpRequest, HttpResponse}; use net::resource_thread::{AuthCacheEntry, CancellationListener}; use net_traits::{LoadData, CookieSource, LoadContext, IncludeSubdomains}; use std::borrow::Cow; use std::collections::HashMap; use std::io::{self, Write, Read, Cursor}; use std::sync::mpsc::Receiver; use std::sync::{Arc, mpsc, RwLock}; use url::Url; const DEFAULT_USER_AGENT: &'static str = "Test-agent"; fn respond_with(body: Vec) -> MockResponse { let headers = Headers::new(); respond_with_headers(body, headers) } fn respond_with_headers(body: Vec, mut headers: Headers) -> MockResponse { headers.set(ContentLength(body.len() as u64)); MockResponse::new( headers, StatusCode::Ok, RawStatus(200, Cow::Borrowed("Ok")), body ) } fn read_response(reader: &mut Read) -> String { let mut buf = vec![0; 1024]; match reader.read(&mut buf) { Ok(len) if len > 0 => { unsafe { buf.set_len(len); } String::from_utf8(buf).unwrap() }, Ok(_) => "".to_owned(), Err(e) => panic!("problem reading response {}", e) } } struct MockResponse { h: Headers, sc: StatusCode, sr: RawStatus, msg: Cursor> } impl MockResponse { fn new(h: Headers, sc: StatusCode, sr: RawStatus, msg: Vec) -> MockResponse { MockResponse { h: h, sc: sc, sr: sr, msg: Cursor::new(msg) } } } impl Read for MockResponse { fn read(&mut self, buf: &mut [u8]) -> io::Result { self.msg.read(buf) } } impl HttpResponse for MockResponse { fn headers(&self) -> &Headers { &self.h } fn status(&self) -> StatusCode { self.sc } fn status_raw(&self) -> &RawStatus { &self.sr } } fn redirect_to(host: String) -> MockResponse { let mut headers = Headers::new(); headers.set(Location(host.to_owned())); MockResponse::new( headers, StatusCode::MovedPermanently, RawStatus(301, Cow::Borrowed("Moved Permanently")), b"".to_vec() ) } fn redirect_with_headers(host: String, mut headers: Headers) -> MockResponse { headers.set(Location(host.to_string())); MockResponse::new( headers, StatusCode::MovedPermanently, RawStatus(301, Cow::Borrowed("Moved Permanently")), b"".to_vec() ) } enum ResponseType { Redirect(String), RedirectWithHeaders(String, Headers), Text(Vec), WithHeaders(Vec, Headers) } struct MockRequest { headers: Headers, t: ResponseType } impl MockRequest { fn new(t: ResponseType) -> MockRequest { MockRequest { headers: Headers::new(), t: t } } } fn response_for_request_type(t: ResponseType) -> Result { match t { ResponseType::Redirect(location) => { Ok(redirect_to(location)) }, ResponseType::RedirectWithHeaders(location, headers) => { Ok(redirect_with_headers(location, headers)) } ResponseType::Text(b) => { Ok(respond_with(b)) }, ResponseType::WithHeaders(b, h) => { Ok(respond_with_headers(b, h)) } } } impl HttpRequest for MockRequest { type R = MockResponse; fn headers_mut(&mut self) -> &mut Headers { &mut self.headers } fn send(self, _: &Option>) -> Result { response_for_request_type(self.t) } } struct AssertRequestMustHaveHeaders { expected_headers: Headers, request_headers: Headers, t: ResponseType } impl AssertRequestMustHaveHeaders { fn new(t: ResponseType, expected_headers: Headers) -> Self { AssertRequestMustHaveHeaders { expected_headers: expected_headers, request_headers: Headers::new(), t: t } } } impl HttpRequest for AssertRequestMustHaveHeaders { type R = MockResponse; fn headers_mut(&mut self) -> &mut Headers { &mut self.request_headers } fn send(self, _: &Option>) -> Result { assert_eq!(self.request_headers, self.expected_headers); response_for_request_type(self.t) } } struct AssertRequestMustIncludeHeaders { expected_headers: Headers, request_headers: Headers, t: ResponseType } impl AssertRequestMustIncludeHeaders { fn new(t: ResponseType, expected_headers_op: Option) -> Self { match expected_headers_op { Some(expected_headers) => { assert!(expected_headers.len() != 0); AssertRequestMustIncludeHeaders { expected_headers: expected_headers, request_headers: Headers::new(), t: t } } None => AssertRequestMustIncludeHeaders { expected_headers: Headers::new(), request_headers: Headers::new(), t: t } } } } impl HttpRequest for AssertRequestMustIncludeHeaders { type R = MockResponse; fn headers_mut(&mut self) -> &mut Headers { &mut self.request_headers } fn send(self, _: &Option>) -> Result { for header in self.expected_headers.iter() { assert!(self.request_headers.get_raw(header.name()).is_some()); assert_eq!( self.request_headers.get_raw(header.name()).unwrap(), self.expected_headers.get_raw(header.name()).unwrap() ) } response_for_request_type(self.t) } } struct AssertMustHaveHeadersRequestFactory { expected_headers: Headers, body: Vec } impl HttpRequestFactory for AssertMustHaveHeadersRequestFactory { type R = AssertRequestMustHaveHeaders; fn create(&self, _: Url, _: Method) -> Result { Ok( AssertRequestMustHaveHeaders::new( ResponseType::Text(self.body.clone()), self.expected_headers.clone() ) ) } } struct AssertMustIncludeHeadersRequestFactory { expected_headers: Headers, body: Vec } impl HttpRequestFactory for AssertMustIncludeHeadersRequestFactory { type R = AssertRequestMustIncludeHeaders; fn create(&self, _: Url, _: Method) -> Result { Ok( AssertRequestMustIncludeHeaders::new( ResponseType::Text(self.body.clone()), Some(self.expected_headers.clone()) ) ) } } fn assert_cookie_for_domain(cookie_jar: Arc>, domain: &str, cookie: &str) { let mut cookie_jar = cookie_jar.write().unwrap(); let url = Url::parse(&*domain).unwrap(); let cookies = cookie_jar.cookies_for_url(&url, CookieSource::HTTP); if let Some(cookie_list) = cookies { assert_eq!(cookie.to_owned(), cookie_list); } else { assert_eq!(cookie.len(), 0); } } struct AssertRequestMustNotIncludeHeaders { headers_not_expected: Vec, request_headers: Headers, t: ResponseType } impl AssertRequestMustNotIncludeHeaders { fn new(t: ResponseType, headers_not_expected: Vec) -> Self { assert!(headers_not_expected.len() != 0); AssertRequestMustNotIncludeHeaders { headers_not_expected: headers_not_expected, request_headers: Headers::new(), t: t } } } impl HttpRequest for AssertRequestMustNotIncludeHeaders { type R = MockResponse; fn headers_mut(&mut self) -> &mut Headers { &mut self.request_headers } fn send(self, _: &Option>) -> Result { for header in &self.headers_not_expected { assert!(self.request_headers.get_raw(header).is_none()); } response_for_request_type(self.t) } } struct AssertMustNotIncludeHeadersRequestFactory { headers_not_expected: Vec, body: Vec } impl HttpRequestFactory for AssertMustNotIncludeHeadersRequestFactory { type R = AssertRequestMustNotIncludeHeaders; fn create(&self, _: Url, _: Method) -> Result { Ok( AssertRequestMustNotIncludeHeaders::new( ResponseType::Text(self.body.clone()), self.headers_not_expected.clone() ) ) } } struct AssertMustHaveBodyRequest { expected_body: Option>, headers: Headers, t: ResponseType } impl AssertMustHaveBodyRequest { fn new(t: ResponseType, expected_body: Option>) -> Self { AssertMustHaveBodyRequest { expected_body: expected_body, headers: Headers::new(), t: t } } } impl HttpRequest for AssertMustHaveBodyRequest { type R = MockResponse; fn headers_mut(&mut self) -> &mut Headers { &mut self.headers } fn send(self, body: &Option>) -> Result { assert_eq!(self.expected_body, *body); response_for_request_type(self.t) } } fn expect_devtools_http_request(devtools_port: &Receiver) -> DevtoolsHttpRequest { match devtools_port.recv().unwrap() { DevtoolsControlMsg::FromChrome( ChromeToDevtoolsControlMsg::NetworkEvent(_, net_event)) => { match net_event { NetworkEvent::HttpRequest(httprequest) => { httprequest }, _ => panic!("No HttpRequest Received"), } }, _ => panic!("No HttpRequest Received"), } } fn expect_devtools_http_response(devtools_port: &Receiver) -> DevtoolsHttpResponse { match devtools_port.recv().unwrap() { DevtoolsControlMsg::FromChrome( ChromeToDevtoolsControlMsg::NetworkEvent(_, net_event_response)) => { match net_event_response { NetworkEvent::HttpResponse(httpresponse) => { httpresponse }, _ => panic!("No HttpResponse Received"), } }, _ => panic!("No HttpResponse Received"), } } #[test] fn test_check_default_headers_loaded_in_every_request() { let url = url!("http://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = None; load_data.method = Method::Get; let mut headers = Headers::new(); headers.set(AcceptEncoding(vec![qitem(Encoding::Gzip), qitem(Encoding::Deflate), qitem(Encoding::EncodingExt("br".to_owned()))])); headers.set(Host { hostname: "mozilla.com".to_owned() , port: None }); let accept = Accept(vec![ qitem(Mime(TopLevel::Text, SubLevel::Html, vec![])), qitem(Mime(TopLevel::Application, SubLevel::Ext("xhtml+xml".to_owned()), vec![])), QualityItem::new(Mime(TopLevel::Application, SubLevel::Xml, vec![]), Quality(900u16)), QualityItem::new(Mime(TopLevel::Star, SubLevel::Star, vec![]), Quality(800u16)), ]); headers.set(accept); headers.set(UserAgent(DEFAULT_USER_AGENT.to_owned())); // Testing for method.GET let _ = load::(load_data.clone(), hsts_list.clone(), cookie_jar.clone(), auth_cache.clone(), None, &AssertMustHaveHeadersRequestFactory { expected_headers: headers.clone(), body: <[_]>::to_vec(&[]) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); // Testing for method.POST load_data.method = Method::Post; headers.set(ContentLength(0 as u64)); let _ = load::(load_data.clone(), hsts_list, cookie_jar, auth_cache.clone(), None, &AssertMustHaveHeadersRequestFactory { expected_headers: headers, body: <[_]>::to_vec(&[]) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_when_request_is_not_get_or_head_and_there_is_no_body_content_length_should_be_set_to_0() { let url = url!("http://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = None; load_data.method = Method::Post; let mut content_length = Headers::new(); content_length.set(ContentLength(0)); let _ = load::( load_data.clone(), hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: content_length, body: <[_]>::to_vec(&[]) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_request_and_response_data_with_network_messages() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let mut headers = Headers::new(); headers.set(Host { hostname: "foo.bar".to_owned(), port: None }); Ok(MockRequest::new( ResponseType::WithHeaders(<[_]>::to_vec("Yay!".as_bytes()), headers)) ) } } let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let url = url!("https://mozilla.com"); let (devtools_chan, devtools_port) = mpsc::channel::(); // This will probably have to be changed as it uses fake_root_pipeline_id which is marked for removal. let pipeline_id = PipelineId::fake_root_pipeline_id(); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), Some(pipeline_id)); let mut request_headers = Headers::new(); request_headers.set(Host { hostname: "bar.foo".to_owned(), port: None }); load_data.headers = request_headers.clone(); let _ = load::(load_data, hsts_list, cookie_jar, auth_cache, Some(devtools_chan), &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); // notification received from devtools let devhttprequest = expect_devtools_http_request(&devtools_port); let devhttpresponse = expect_devtools_http_response(&devtools_port); //Creating default headers for request let mut headers = Headers::new(); headers.set(AcceptEncoding(vec![ qitem(Encoding::Gzip), qitem(Encoding::Deflate), qitem(Encoding::EncodingExt("br".to_owned())) ])); headers.set(Host { hostname: "mozilla.com".to_owned() , port: None }); let accept = Accept(vec![ qitem(Mime(TopLevel::Text, SubLevel::Html, vec![])), qitem(Mime(TopLevel::Application, SubLevel::Ext("xhtml+xml".to_owned()), vec![])), QualityItem::new(Mime(TopLevel::Application, SubLevel::Xml, vec![]), Quality(900u16)), QualityItem::new(Mime(TopLevel::Star, SubLevel::Star, vec![]), Quality(800u16)), ]); headers.set(accept); headers.set(UserAgent(DEFAULT_USER_AGENT.to_owned())); let httprequest = DevtoolsHttpRequest { url: url, method: Method::Get, headers: headers, body: None, pipeline_id: pipeline_id, startedDateTime: devhttprequest.startedDateTime }; let content = "Yay!"; let mut response_headers = Headers::new(); response_headers.set(ContentLength(content.len() as u64)); response_headers.set(Host { hostname: "foo.bar".to_owned(), port: None }); let httpresponse = DevtoolsHttpResponse { headers: Some(response_headers), status: Some(RawStatus(200, Cow::Borrowed("Ok"))), body: None, pipeline_id: pipeline_id, }; assert_eq!(devhttprequest, httprequest); assert_eq!(devhttpresponse, httpresponse); } #[test] fn test_request_and_response_message_from_devtool_without_pipeline_id() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let mut headers = Headers::new(); headers.set(Host { hostname: "foo.bar".to_owned(), port: None }); Ok(MockRequest::new( ResponseType::WithHeaders(<[_]>::to_vec("Yay!".as_bytes()), headers)) ) } } let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let url = url!("https://mozilla.com"); let (devtools_chan, devtools_port) = mpsc::channel::(); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let _ = load::(load_data, hsts_list, cookie_jar, auth_cache, Some(devtools_chan), &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); // notification received from devtools assert!(devtools_port.try_recv().is_err()); } #[test] fn test_load_when_redirecting_from_a_post_should_rewrite_next_request_as_get() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, url: Url, method: Method) -> Result { if url.domain().unwrap() == "mozilla.com" { assert_eq!(Method::Post, method); Ok(MockRequest::new(ResponseType::Redirect("http://mozilla.org".to_owned()))) } else { assert_eq!(Method::Get, method); Ok(MockRequest::new(ResponseType::Text(<[_]>::to_vec("Yay!".as_bytes())))) } } } let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.method = Method::Post; let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_should_decode_the_response_as_deflate_when_response_headers_have_content_encoding_deflate() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let mut e = DeflateEncoder::new(Vec::new(), Compression::Default); e.write(b"Yay!").unwrap(); let encoded_content = e.finish().unwrap(); let mut headers = Headers::new(); headers.set(ContentEncoding(vec![Encoding::Deflate])); Ok(MockRequest::new(ResponseType::WithHeaders(encoded_content, headers))) } } let url = url!("http://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let mut response = load::( load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) .unwrap(); assert_eq!(read_response(&mut response), "Yay!"); } #[test] fn test_load_should_decode_the_response_as_gzip_when_response_headers_have_content_encoding_gzip() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let mut e = GzEncoder::new(Vec::new(), Compression::Default); e.write(b"Yay!").unwrap(); let encoded_content = e.finish().unwrap(); let mut headers = Headers::new(); headers.set(ContentEncoding(vec![Encoding::Gzip])); Ok(MockRequest::new(ResponseType::WithHeaders(encoded_content, headers))) } } let url = url!("http://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let mut response = load::( load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) .unwrap(); assert_eq!(read_response(&mut response), "Yay!"); } #[test] fn test_load_doesnt_send_request_body_on_any_redirect() { struct Factory; impl HttpRequestFactory for Factory { type R = AssertMustHaveBodyRequest; fn create(&self, url: Url, _: Method) -> Result { if url.domain().unwrap() == "mozilla.com" { Ok( AssertMustHaveBodyRequest::new( ResponseType::Redirect("http://mozilla.org".to_owned()), Some(<[_]>::to_vec("Body on POST!".as_bytes())) ) ) } else { Ok( AssertMustHaveBodyRequest::new( ResponseType::Text(<[_]>::to_vec("Yay!".as_bytes())), None ) ) } } } let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = Some(<[_]>::to_vec("Body on POST!".as_bytes())); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::( load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_doesnt_add_host_to_sts_list_when_url_is_http_even_if_sts_headers_are_present() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let content = <[_]>::to_vec("Yay!".as_bytes()); let mut headers = Headers::new(); headers.set(StrictTransportSecurity::excluding_subdomains(31536000)); Ok(MockRequest::new(ResponseType::WithHeaders(content, headers))) } } let url = url!("http://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data, hsts_list.clone(), cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); assert_eq!(hsts_list.read().unwrap().is_host_secure("mozilla.com"), false); } #[test] fn test_load_adds_host_to_sts_list_when_url_is_https_and_sts_headers_are_present() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let content = <[_]>::to_vec("Yay!".as_bytes()); let mut headers = Headers::new(); headers.set(StrictTransportSecurity::excluding_subdomains(31536000)); Ok(MockRequest::new(ResponseType::WithHeaders(content, headers))) } } let url = url!("https://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data, hsts_list.clone(), cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); assert!(hsts_list.read().unwrap().is_host_secure("mozilla.com")); } #[test] fn test_load_sets_cookies_in_the_resource_manager_when_it_get_set_cookie_header_in_response() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let content = <[_]>::to_vec("Yay!".as_bytes()); let mut headers = Headers::new(); headers.set(SetCookie(vec![CookiePair::new("mozillaIs".to_owned(), "theBest".to_owned())])); Ok(MockRequest::new(ResponseType::WithHeaders(content, headers))) } } let url = url!("http://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); assert_cookie_for_domain(cookie_jar.clone(), "http://mozilla.com", ""); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let _ = load::(load_data, hsts_list, cookie_jar.clone(), auth_cache.clone(), None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); assert_cookie_for_domain(cookie_jar.clone(), "http://mozilla.com", "mozillaIs=theBest"); } #[test] fn test_load_sets_requests_cookies_header_for_url_by_getting_cookies_from_the_resource_manager() { let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); { let mut cookie_jar = cookie_jar.write().unwrap(); let cookie_url = url.clone(); let cookie = Cookie::new_wrapped( CookiePair::new("mozillaIs".to_owned(), "theBest".to_owned()), &cookie_url, CookieSource::HTTP ).unwrap(); cookie_jar.push(cookie, CookieSource::HTTP); } let mut cookie = Headers::new(); cookie.set(CookieHeader(vec![CookiePair::new("mozillaIs".to_owned(), "theBest".to_owned())])); let _ = load::(load_data.clone(), hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: cookie, body: <[_]>::to_vec(&*load_data.data.unwrap()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_sends_secure_cookie_if_http_changed_to_https_due_to_entry_in_hsts_store() { let url = url!("http://mozilla.com"); let secured_url = url!("https://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); { let mut hsts_list = hsts_list.write().unwrap(); let entry = HSTSEntry::new( "mozilla.com".to_owned(), IncludeSubdomains::Included, Some(1000000) ).unwrap(); hsts_list.push(entry); } { let mut cookie_jar = cookie_jar.write().unwrap(); let cookie_url = secured_url.clone(); let mut cookie_pair = CookiePair::new("mozillaIs".to_owned(), "theBest".to_owned()); cookie_pair.secure = true; let cookie = Cookie::new_wrapped( cookie_pair, &cookie_url, CookieSource::HTTP ).unwrap(); cookie_jar.push(cookie, CookieSource::HTTP); } let mut load_data = LoadData::new(LoadContext::Browsing, url, None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); let mut headers = Headers::new(); headers.set_raw("Cookie".to_owned(), vec![<[_]>::to_vec("mozillaIs=theBest".as_bytes())]); let _ = load::( load_data.clone(), hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: headers, body: <[_]>::to_vec(&*load_data.data.unwrap()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_sends_cookie_if_nonhttp() { let url = url!("http://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); { let mut cookie_jar = cookie_jar.write().unwrap(); let cookie_url = url.clone(); let cookie = Cookie::new_wrapped( CookiePair::new("mozillaIs".to_owned(), "theBest".to_owned()), &cookie_url, CookieSource::NonHTTP ).unwrap(); cookie_jar.push(cookie, CookieSource::HTTP); } let mut load_data = LoadData::new(LoadContext::Browsing, url, None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); let mut headers = Headers::new(); headers.set_raw("Cookie".to_owned(), vec![<[_]>::to_vec("mozillaIs=theBest".as_bytes())]); let _ = load::( load_data.clone(), hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: headers, body: <[_]>::to_vec(&*load_data.data.unwrap()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_cookie_set_with_httponly_should_not_be_available_using_getcookiesforurl() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let content = <[_]>::to_vec("Yay!".as_bytes()); let mut headers = Headers::new(); headers.set_raw("set-cookie", vec![b"mozillaIs=theBest; HttpOnly;".to_vec()]); Ok(MockRequest::new(ResponseType::WithHeaders(content, headers))) } } let url = url!("http://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let _ = load::(load_data, hsts_list, cookie_jar.clone(), auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); let mut cookie_jar = cookie_jar.write().unwrap(); assert!(cookie_jar.cookies_for_url(&url, CookieSource::NonHTTP).is_none()); } #[test] fn test_when_cookie_received_marked_secure_is_ignored_for_http() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let content = <[_]>::to_vec("Yay!".as_bytes()); let mut headers = Headers::new(); headers.set_raw("set-cookie", vec![b"mozillaIs=theBest; Secure;".to_vec()]); Ok(MockRequest::new(ResponseType::WithHeaders(content, headers))) } } let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let load_data = LoadData::new(LoadContext::Browsing, url!("http://mozilla.com"), None); let _ = load::(load_data, hsts_list, cookie_jar.clone(), auth_cache.clone(), None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); assert_cookie_for_domain(cookie_jar, "http://mozilla.com", ""); } #[test] fn test_when_cookie_set_marked_httpsonly_secure_isnt_sent_on_http_request() { let sec_url = url!("https://mozilla.com"); let url = url!("http://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); { let mut cookie_jar = cookie_jar.write().unwrap(); let cookie_url = sec_url.clone(); let cookie = Cookie::new_wrapped( CookiePair::parse("mozillaIs=theBest; Secure;").unwrap(), &cookie_url, CookieSource::HTTP ).unwrap(); cookie_jar.push(cookie, CookieSource::HTTP); } let mut load_data = LoadData::new(LoadContext::Browsing, url, None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); assert_cookie_for_domain(cookie_jar.clone(), "https://mozilla.com", "mozillaIs=theBest"); let _ = load::( load_data.clone(), hsts_list, cookie_jar, auth_cache, None, &AssertMustNotIncludeHeadersRequestFactory { headers_not_expected: vec!["Cookie".to_owned()], body: <[_]>::to_vec(&*load_data.data.unwrap()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_sets_content_length_to_length_of_request_body() { let content = "This is a request body"; let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = Some(<[_]>::to_vec(content.as_bytes())); let mut content_len_headers = Headers::new(); content_len_headers.set(ContentLength(content.as_bytes().len() as u64)); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data.clone(), hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: content_len_headers, body: <[_]>::to_vec(&*load_data.data.unwrap()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_uses_explicit_accept_from_headers_in_load_data() { let text_html = qitem(Mime(TopLevel::Text, SubLevel::Html, vec![])); let mut accept_headers = Headers::new(); accept_headers.set(Accept(vec![text_html.clone()])); let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); load_data.headers.set(Accept(vec![text_html.clone()])); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data, hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: accept_headers, body: <[_]>::to_vec("Yay!".as_bytes()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_sets_default_accept_to_html_xhtml_xml_and_then_anything_else() { let mut accept_headers = Headers::new(); accept_headers.set(Accept(vec![ qitem(Mime(TopLevel::Text, SubLevel::Html, vec![])), qitem(Mime(TopLevel::Application, SubLevel::Ext("xhtml+xml".to_owned()), vec![])), QualityItem::new(Mime(TopLevel::Application, SubLevel::Xml, vec![]), Quality(900)), QualityItem::new(Mime(TopLevel::Star, SubLevel::Star, vec![]), Quality(800)), ])); let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data, hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: accept_headers, body: <[_]>::to_vec("Yay!".as_bytes()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_uses_explicit_accept_encoding_from_load_data_headers() { let mut accept_encoding_headers = Headers::new(); accept_encoding_headers.set(AcceptEncoding(vec![qitem(Encoding::Chunked)])); let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); load_data.headers.set(AcceptEncoding(vec![qitem(Encoding::Chunked)])); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data, hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: accept_encoding_headers, body: <[_]>::to_vec("Yay!".as_bytes()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_sets_default_accept_encoding_to_gzip_and_deflate() { let mut accept_encoding_headers = Headers::new(); accept_encoding_headers.set(AcceptEncoding(vec![qitem(Encoding::Gzip), qitem(Encoding::Deflate), qitem(Encoding::EncodingExt("br".to_owned()))])); let url = url!("http://mozilla.com"); let mut load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); load_data.data = Some(<[_]>::to_vec("Yay!".as_bytes())); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let _ = load::(load_data, hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: accept_encoding_headers, body: <[_]>::to_vec("Yay!".as_bytes()) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); } #[test] fn test_load_errors_when_there_a_redirect_loop() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, url: Url, _: Method) -> Result { if url.domain().unwrap() == "mozilla.com" { Ok(MockRequest::new(ResponseType::Redirect("http://mozilla.org".to_owned()))) } else if url.domain().unwrap() == "mozilla.org" { Ok(MockRequest::new(ResponseType::Redirect("http://mozilla.com".to_owned()))) } else { panic!("unexpected host {:?}", url) } } } let url = url!("http://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) { Err(LoadError::InvalidRedirect(_, msg)) => { assert_eq!(msg, "redirect loop"); }, _ => panic!("expected max redirects to fail") } } #[test] fn test_load_errors_when_there_is_too_many_redirects() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, url: Url, _: Method) -> Result { if url.domain().unwrap() == "mozilla.com" { Ok(MockRequest::new(ResponseType::Redirect(format!("{}/1", url.serialize())))) } else { panic!("unexpected host {:?}", url) } } } let url = url!("http://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) { Err(LoadError::MaxRedirects(url)) => { assert_eq!(url.domain().unwrap(), "mozilla.com") }, _ => panic!("expected max redirects to fail") } } #[test] fn test_load_follows_a_redirect() { struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, url: Url, _: Method) -> Result { if url.domain().unwrap() == "mozilla.com" { Ok(MockRequest::new(ResponseType::Redirect("http://mozilla.org".to_owned()))) } else if url.domain().unwrap() == "mozilla.org" { Ok( MockRequest::new( ResponseType::Text( <[_]>::to_vec("Yay!".as_bytes()) ) ) ) } else { panic!("unexpected host {:?}", url) } } } let url = url!("http://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) { Err(e) => panic!("expected to follow a redirect {:?}", e), Ok(mut lr) => { let response = read_response(&mut lr); assert_eq!(response, "Yay!".to_owned()); } } } struct DontConnectFactory; impl HttpRequestFactory for DontConnectFactory { type R = MockRequest; fn create(&self, url: Url, _: Method) -> Result { Err(LoadError::Connection(url, "should not have connected".to_owned())) } } #[test] fn test_load_errors_when_scheme_is_not_http_or_https() { let url = url!("ftp://not-supported"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &DontConnectFactory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) { Err(LoadError::UnsupportedScheme(_)) => {} _ => panic!("expected ftp scheme to be unsupported") } } #[test] fn test_load_errors_when_viewing_source_and_inner_url_scheme_is_not_http_or_https() { let url = url!("view-source:ftp://not-supported"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &DontConnectFactory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) { Err(LoadError::UnsupportedScheme(_)) => {} _ => panic!("expected ftp scheme to be unsupported") } } #[test] fn test_load_errors_when_cancelled() { use ipc_channel::ipc; use net::resource_thread::CancellableResource; use net_traits::ResourceId; struct Factory; impl HttpRequestFactory for Factory { type R = MockRequest; fn create(&self, _: Url, _: Method) -> Result { let mut headers = Headers::new(); headers.set(Host { hostname: "Kaboom!".to_owned(), port: None }); Ok(MockRequest::new( ResponseType::WithHeaders(<[_]>::to_vec("BOOM!".as_bytes()), headers)) ) } } let (id_sender, _id_receiver) = ipc::channel().unwrap(); let (cancel_sender, cancel_receiver) = mpsc::channel(); let cancel_resource = CancellableResource::new(cancel_receiver, ResourceId(0), id_sender); let cancel_listener = CancellationListener::new(Some(cancel_resource)); cancel_sender.send(()).unwrap(); let url = url!("https://mozilla.com"); let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &cancel_listener) { Err(LoadError::Cancelled(_, _)) => (), _ => panic!("expected load cancelled error!") } } #[test] fn test_redirect_from_x_to_y_provides_y_cookies_from_y() { let url_x = url!("http://mozilla.com"); let url_y = url!("http://mozilla.org"); struct Factory; impl HttpRequestFactory for Factory { type R = AssertRequestMustIncludeHeaders; fn create(&self, url: Url, _: Method) -> Result { if url.domain().unwrap() == "mozilla.com" { let mut expected_headers_x = Headers::new(); expected_headers_x.set_raw("Cookie".to_owned(), vec![<[_]>::to_vec("mozillaIsNot=dotCom".as_bytes())]); Ok(AssertRequestMustIncludeHeaders::new( ResponseType::Redirect("http://mozilla.org".to_owned()), Some(expected_headers_x))) } else if url.domain().unwrap() == "mozilla.org" { let mut expected_headers_y = Headers::new(); expected_headers_y.set_raw( "Cookie".to_owned(), vec![<[_]>::to_vec("mozillaIs=theBest".as_bytes())]); Ok(AssertRequestMustIncludeHeaders::new( ResponseType::Text(<[_]>::to_vec("Yay!".as_bytes())), Some(expected_headers_y))) } else { panic!("unexpected host {:?}", url) } } } let load_data = LoadData::new(LoadContext::Browsing, url_x.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); { let mut cookie_jar = cookie_jar.write().unwrap(); let cookie_x_url = url_x.clone(); let cookie_x = Cookie::new_wrapped( CookiePair::new("mozillaIsNot".to_owned(), "dotCom".to_owned()), &cookie_x_url, CookieSource::HTTP ).unwrap(); cookie_jar.push(cookie_x, CookieSource::HTTP); let cookie_y_url = url_y.clone(); let cookie_y = Cookie::new_wrapped( CookiePair::new("mozillaIs".to_owned(), "theBest".to_owned()), &cookie_y_url, CookieSource::HTTP ).unwrap(); cookie_jar.push(cookie_y, CookieSource::HTTP); } match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) { Err(e) => panic!("expected to follow a redirect {:?}", e), Ok(mut lr) => { let response = read_response(&mut lr); assert_eq!(response, "Yay!".to_owned()); } } } #[test] fn test_redirect_from_x_to_x_provides_x_with_cookie_from_first_response() { let url = url!("http://mozilla.org/initial/"); struct Factory; impl HttpRequestFactory for Factory { type R = AssertRequestMustIncludeHeaders; fn create(&self, url: Url, _: Method) -> Result { if url.path().unwrap()[0] == "initial" { let mut initial_answer_headers = Headers::new(); initial_answer_headers.set_raw("set-cookie", vec![b"mozillaIs=theBest; path=/;".to_vec()]); Ok(AssertRequestMustIncludeHeaders::new( ResponseType::RedirectWithHeaders("http://mozilla.org/subsequent/".to_owned(), initial_answer_headers), None)) } else if url.path().unwrap()[0] == "subsequent" { let mut expected_subsequent_headers = Headers::new(); expected_subsequent_headers.set_raw("Cookie", vec![b"mozillaIs=theBest".to_vec()]); Ok(AssertRequestMustIncludeHeaders::new( ResponseType::Text(b"Yay!".to_vec()), Some(expected_subsequent_headers))) } else { panic!("unexpected host {:?}", url) } } } let load_data = LoadData::new(LoadContext::Browsing, url.clone(), None); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); match load::(load_data, hsts_list, cookie_jar, auth_cache, None, &Factory, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)) { Err(e) => panic!("expected to follow a redirect {:?}", e), Ok(mut lr) => { let response = read_response(&mut lr); assert_eq!(response, "Yay!".to_owned()); } } } #[test] fn test_if_auth_creds_not_in_url_but_in_cache_it_sets_it() { let url = url!("http://mozilla.com"); let hsts_list = Arc::new(RwLock::new(HSTSList::new())); let cookie_jar = Arc::new(RwLock::new(CookieStorage::new())); let auth_cache = Arc::new(RwLock::new(HashMap::new())); let auth_entry = AuthCacheEntry { user_name: "username".to_owned(), password: "test".to_owned(), }; auth_cache.write().unwrap().insert(url.clone(), auth_entry); let mut load_data = LoadData::new(LoadContext::Browsing, url, None); load_data.credentials_flag = true; let mut auth_header = Headers::new(); auth_header.set( Authorization( Basic { username: "username".to_owned(), password: Some("test".to_owned()) } ) ); let _ = load::( load_data.clone(), hsts_list, cookie_jar, auth_cache, None, &AssertMustIncludeHeadersRequestFactory { expected_headers: auth_header, body: <[_]>::to_vec(&[]) }, DEFAULT_USER_AGENT.to_owned(), &CancellationListener::new(None)); }