websocket 1.2.4 → 1.2.5
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.codeclimate.yml +16 -0
- data/.rubocop.yml +18 -3
- data/.travis.yml +6 -8
- data/CHANGELOG.md +4 -0
- data/Gemfile +10 -0
- data/README.md +2 -2
- data/Rakefile +1 -1
- data/lib/websocket.rb +1 -0
- data/lib/websocket/frame/base.rb +1 -7
- data/lib/websocket/frame/handler/base.rb +2 -2
- data/lib/websocket/frame/handler/handler03.rb +2 -1
- data/lib/websocket/frame/handler/handler75.rb +1 -1
- data/lib/websocket/handshake/base.rb +1 -7
- data/lib/websocket/handshake/handler/client.rb +9 -0
- data/lib/websocket/handshake/handler/client04.rb +6 -7
- data/lib/websocket/handshake/handler/client75.rb +6 -7
- data/lib/websocket/handshake/handler/client76.rb +2 -7
- data/lib/websocket/handshake/handler/server75.rb +13 -5
- data/lib/websocket/handshake/handler/server76.rb +9 -17
- data/lib/websocket/handshake/server.rb +1 -1
- data/lib/websocket/nice_inspect.rb +10 -0
- data/lib/websocket/version.rb +1 -1
- data/spec/frame/incoming_03_spec.rb +3 -2
- data/spec/frame/incoming_04_spec.rb +3 -2
- data/spec/frame/incoming_05_spec.rb +3 -2
- data/spec/frame/incoming_07_spec.rb +3 -2
- data/spec/frame/incoming_75_spec.rb +3 -2
- data/spec/frame/incoming_common_spec.rb +17 -8
- data/spec/frame/masking_spec.rb +2 -1
- data/spec/frame/outgoing_03_spec.rb +2 -1
- data/spec/frame/outgoing_04_spec.rb +2 -1
- data/spec/frame/outgoing_05_spec.rb +2 -1
- data/spec/frame/outgoing_07_spec.rb +2 -1
- data/spec/frame/outgoing_75_spec.rb +2 -1
- data/spec/frame/outgoing_common_spec.rb +10 -4
- data/spec/handshake/client_04_spec.rb +3 -3
- data/spec/handshake/client_11_spec.rb +2 -2
- data/spec/handshake/client_75_spec.rb +1 -1
- data/spec/handshake/client_76_spec.rb +3 -3
- data/spec/handshake/server_04_spec.rb +2 -2
- data/spec/handshake/server_76_spec.rb +8 -8
- data/spec/spec_helper.rb +0 -2
- data/spec/support/all_client_drafts.rb +21 -21
- data/spec/support/all_server_drafts.rb +19 -16
- data/spec/support/incoming_frames.rb +29 -12
- data/spec/support/outgoing_frames.rb +28 -8
- data/websocket.gemspec +2 -4
- metadata +7 -61
@@ -1,14 +1,15 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Incoming frame draft 04' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 4 }
|
6
8
|
let(:frame) { WebSocket::Frame::Incoming.new(version: version, data: encoded_text) }
|
7
9
|
let(:encoded_text) { nil }
|
8
10
|
let(:decoded_text) { nil }
|
9
11
|
let(:frame_type) { nil }
|
10
12
|
let(:error) { nil }
|
11
|
-
subject { frame }
|
12
13
|
|
13
14
|
it_should_behave_like 'valid_incoming_frame'
|
14
15
|
|
@@ -54,7 +55,7 @@ RSpec.describe 'Incoming frame draft 04' do
|
|
54
55
|
|
55
56
|
context 'should properly decode text frame in between of continuation' do
|
56
57
|
let(:encoded_text) { "\x04\x03Hel\x83\x03abc\x80\x02lo" }
|
57
|
-
let(:frame_type) {
|
58
|
+
let(:frame_type) { %i(pong text) }
|
58
59
|
let(:decoded_text) { %w(abc Hello) }
|
59
60
|
|
60
61
|
it_should_behave_like 'valid_incoming_frame'
|
@@ -1,14 +1,15 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Incoming frame draft 05' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 5 }
|
6
8
|
let(:frame) { WebSocket::Frame::Incoming.new(version: version, data: encoded_text) }
|
7
9
|
let(:encoded_text) { nil }
|
8
10
|
let(:decoded_text) { nil }
|
9
11
|
let(:frame_type) { nil }
|
10
12
|
let(:error) { nil }
|
11
|
-
subject { frame }
|
12
13
|
|
13
14
|
it_should_behave_like 'valid_incoming_frame'
|
14
15
|
|
@@ -70,7 +71,7 @@ RSpec.describe 'Incoming frame draft 05' do
|
|
70
71
|
|
71
72
|
context 'should properly decode text frame in between of continuation' do
|
72
73
|
let(:encoded_text) { "\x04\x03Hel\x83\x03abc\x80\x02lo" }
|
73
|
-
let(:frame_type) {
|
74
|
+
let(:frame_type) { %i(pong text) }
|
74
75
|
let(:decoded_text) { %w(abc Hello) }
|
75
76
|
|
76
77
|
it_should_behave_like 'valid_incoming_frame'
|
@@ -1,14 +1,15 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Incoming frame draft 07' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 7 }
|
6
8
|
let(:frame) { WebSocket::Frame::Incoming.new(version: version, data: encoded_text) }
|
7
9
|
let(:encoded_text) { nil }
|
8
10
|
let(:decoded_text) { nil }
|
9
11
|
let(:frame_type) { nil }
|
10
12
|
let(:error) { nil }
|
11
|
-
subject { frame }
|
12
13
|
|
13
14
|
it_should_behave_like 'valid_incoming_frame'
|
14
15
|
|
@@ -87,7 +88,7 @@ RSpec.describe 'Incoming frame draft 07' do
|
|
87
88
|
|
88
89
|
context 'should properly decode text frame in between of continuation' do
|
89
90
|
let(:encoded_text) { "\x01\x03Hel\x8a\x03abc\x80\x02lo" }
|
90
|
-
let(:frame_type) {
|
91
|
+
let(:frame_type) { %i(pong text) }
|
91
92
|
let(:decoded_text) { %w(abc Hello) }
|
92
93
|
|
93
94
|
it_should_behave_like 'valid_incoming_frame'
|
@@ -1,14 +1,15 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Incoming frame draft 75' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 75 }
|
6
8
|
let(:frame) { WebSocket::Frame::Incoming.new(version: version, data: encoded_text) }
|
7
9
|
let(:encoded_text) { nil }
|
8
10
|
let(:decoded_text) { nil }
|
9
11
|
let(:frame_type) { nil }
|
10
12
|
let(:error) { nil }
|
11
|
-
subject { frame }
|
12
13
|
|
13
14
|
it_should_behave_like 'valid_incoming_frame'
|
14
15
|
|
@@ -23,7 +24,7 @@ RSpec.describe 'Incoming frame draft 75' do
|
|
23
24
|
context 'with two frames' do
|
24
25
|
let(:encoded_text) { "\x00abc\xFF\x00def\xFF" }
|
25
26
|
let(:decoded_text) { %w(abc def) }
|
26
|
-
let(:frame_type) {
|
27
|
+
let(:frame_type) { %i(text text) }
|
27
28
|
|
28
29
|
it_should_behave_like 'valid_incoming_frame'
|
29
30
|
end
|
@@ -1,22 +1,31 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Incoming common frame' do
|
5
6
|
subject { WebSocket::Frame::Incoming.new }
|
6
7
|
|
7
|
-
|
8
|
-
|
9
|
-
|
8
|
+
it 'is version 13' do
|
9
|
+
expect(subject.version).to be 13
|
10
|
+
end
|
11
|
+
|
12
|
+
it 'is not decoded' do
|
13
|
+
expect(subject.decoded?).to be false
|
14
|
+
end
|
15
|
+
|
16
|
+
it 'has no errors' do
|
17
|
+
expect(subject.error?).to be false
|
18
|
+
end
|
10
19
|
|
11
|
-
it '
|
12
|
-
expect(subject.data).to eql
|
20
|
+
it 'allows adding data via <<' do
|
21
|
+
expect(subject.data).to eql ''
|
13
22
|
subject << 'test'
|
14
|
-
expect(subject.data).to eql
|
23
|
+
expect(subject.data).to eql 'test'
|
15
24
|
end
|
16
25
|
|
17
|
-
it '
|
26
|
+
it 'raises error on invalid version' do
|
18
27
|
subject = WebSocket::Frame::Incoming.new(version: 70)
|
19
28
|
expect(subject.error?).to be true
|
20
|
-
expect(subject.error).to
|
29
|
+
expect(subject.error).to be :unknown_protocol_version
|
21
30
|
end
|
22
31
|
end
|
data/spec/frame/masking_spec.rb
CHANGED
@@ -1,8 +1,9 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Masking frame draft 07' do
|
5
|
-
it '
|
6
|
+
it 'encodes and decode masked frame correctly' do
|
6
7
|
outgoing_frame = WebSocket::Frame::Outgoing::Client.new(data: 'Hello World', type: 'text')
|
7
8
|
outgoing_frame.to_s
|
8
9
|
expect(outgoing_frame.error).to be_nil
|
@@ -1,7 +1,9 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Outgoing frame draft 03' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 3 }
|
6
8
|
let(:frame) { WebSocket::Frame::Outgoing.new(version: version, data: decoded_text, type: frame_type) }
|
7
9
|
let(:decoded_text) { '' }
|
@@ -9,7 +11,6 @@ RSpec.describe 'Outgoing frame draft 03' do
|
|
9
11
|
let(:frame_type) { :text }
|
10
12
|
let(:require_sending) { true }
|
11
13
|
let(:error) { nil }
|
12
|
-
subject { frame }
|
13
14
|
|
14
15
|
it_should_behave_like 'valid_outgoing_frame'
|
15
16
|
|
@@ -1,7 +1,9 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Outgoing frame draft 04' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 4 }
|
6
8
|
let(:frame) { WebSocket::Frame::Outgoing.new(version: version, data: decoded_text, type: frame_type) }
|
7
9
|
let(:decoded_text) { '' }
|
@@ -9,7 +11,6 @@ RSpec.describe 'Outgoing frame draft 04' do
|
|
9
11
|
let(:frame_type) { :text }
|
10
12
|
let(:require_sending) { true }
|
11
13
|
let(:error) { nil }
|
12
|
-
subject { frame }
|
13
14
|
|
14
15
|
it_should_behave_like 'valid_outgoing_frame'
|
15
16
|
|
@@ -1,7 +1,9 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Outgoing frame draft 05' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 5 }
|
6
8
|
let(:frame) { WebSocket::Frame::Outgoing.new(version: version, data: decoded_text, type: frame_type) }
|
7
9
|
let(:decoded_text) { '' }
|
@@ -9,7 +11,6 @@ RSpec.describe 'Outgoing frame draft 05' do
|
|
9
11
|
let(:frame_type) { :text }
|
10
12
|
let(:require_sending) { true }
|
11
13
|
let(:error) { nil }
|
12
|
-
subject { frame }
|
13
14
|
|
14
15
|
it_should_behave_like 'valid_outgoing_frame'
|
15
16
|
|
@@ -1,7 +1,9 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Outgoing frame draft 07' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 7 }
|
6
8
|
let(:frame) { WebSocket::Frame::Outgoing.new(version: version, data: decoded_text, type: frame_type, code: close_code) }
|
7
9
|
let(:decoded_text) { '' }
|
@@ -10,7 +12,6 @@ RSpec.describe 'Outgoing frame draft 07' do
|
|
10
12
|
let(:frame_type) { :text }
|
11
13
|
let(:require_sending) { true }
|
12
14
|
let(:error) { nil }
|
13
|
-
subject { frame }
|
14
15
|
|
15
16
|
it_should_behave_like 'valid_outgoing_frame'
|
16
17
|
|
@@ -1,7 +1,9 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Outgoing frame draft 75' do
|
6
|
+
subject { frame }
|
5
7
|
let(:version) { 75 }
|
6
8
|
let(:frame) { WebSocket::Frame::Outgoing.new(version: version, data: decoded_text, type: frame_type) }
|
7
9
|
let(:decoded_text) { '' }
|
@@ -9,7 +11,6 @@ RSpec.describe 'Outgoing frame draft 75' do
|
|
9
11
|
let(:frame_type) { :text }
|
10
12
|
let(:require_sending) { true }
|
11
13
|
let(:error) { nil }
|
12
|
-
subject { frame }
|
13
14
|
|
14
15
|
it_should_behave_like 'valid_outgoing_frame'
|
15
16
|
|
@@ -1,15 +1,21 @@
|
|
1
1
|
# encoding: binary
|
2
|
+
|
2
3
|
require 'spec_helper'
|
3
4
|
|
4
5
|
RSpec.describe 'Outgoing common frame' do
|
5
6
|
subject { WebSocket::Frame::Outgoing.new }
|
6
7
|
|
7
|
-
|
8
|
-
|
8
|
+
it 'is version 13' do
|
9
|
+
expect(subject.version).to be 13
|
10
|
+
end
|
11
|
+
|
12
|
+
it 'has no errors' do
|
13
|
+
expect(subject.error?).to be false
|
14
|
+
end
|
9
15
|
|
10
|
-
it '
|
16
|
+
it 'raises error on invalid version' do
|
11
17
|
subject = WebSocket::Frame::Incoming.new(version: 70)
|
12
18
|
expect(subject.error?).to be true
|
13
|
-
expect(subject.error).to
|
19
|
+
expect(subject.error).to be :unknown_protocol_version
|
14
20
|
end
|
15
21
|
end
|
@@ -9,13 +9,13 @@ RSpec.describe 'Client draft 4 handshake' do
|
|
9
9
|
|
10
10
|
it_should_behave_like 'all client drafts'
|
11
11
|
|
12
|
-
it '
|
12
|
+
it 'disallows client with invalid challenge' do
|
13
13
|
@request_params = { accept: 'invalid' }
|
14
14
|
handshake << server_response
|
15
15
|
|
16
16
|
expect(handshake).to be_finished
|
17
17
|
expect(handshake).not_to be_valid
|
18
|
-
expect(handshake.error).to
|
18
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
19
19
|
end
|
20
20
|
|
21
21
|
context 'protocol header specified' do
|
@@ -54,7 +54,7 @@ RSpec.describe 'Client draft 4 handshake' do
|
|
54
54
|
|
55
55
|
expect(handshake).to be_finished
|
56
56
|
expect(handshake).not_to be_valid
|
57
|
-
expect(handshake.error).to
|
57
|
+
expect(handshake.error).to be(:unsupported_protocol)
|
58
58
|
end
|
59
59
|
end
|
60
60
|
end
|
@@ -9,12 +9,12 @@ RSpec.describe 'Client draft 11 handshake' do
|
|
9
9
|
|
10
10
|
it_should_behave_like 'all client drafts'
|
11
11
|
|
12
|
-
it '
|
12
|
+
it 'disallows client with invalid challenge' do
|
13
13
|
@request_params = { accept: 'invalid' }
|
14
14
|
handshake << server_response
|
15
15
|
|
16
16
|
expect(handshake).to be_finished
|
17
17
|
expect(handshake).not_to be_valid
|
18
|
-
expect(handshake.error).to
|
18
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
19
19
|
end
|
20
20
|
end
|
@@ -9,13 +9,13 @@ RSpec.describe 'Client draft 76 handshake' do
|
|
9
9
|
|
10
10
|
it_should_behave_like 'all client drafts'
|
11
11
|
|
12
|
-
it '
|
12
|
+
it 'disallows client with invalid challenge' do
|
13
13
|
@request_params = { challenge: 'invalid' }
|
14
14
|
handshake << server_response
|
15
15
|
|
16
16
|
expect(handshake).to be_finished
|
17
17
|
expect(handshake).not_to be_valid
|
18
|
-
expect(handshake.error).to
|
18
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
19
19
|
end
|
20
20
|
|
21
21
|
context 'protocol header specified' do
|
@@ -38,7 +38,7 @@ RSpec.describe 'Client draft 76 handshake' do
|
|
38
38
|
|
39
39
|
expect(handshake).to be_finished
|
40
40
|
expect(handshake).not_to be_valid
|
41
|
-
expect(handshake.error).to
|
41
|
+
expect(handshake.error).to be(:unsupported_protocol)
|
42
42
|
end
|
43
43
|
end
|
44
44
|
end
|
@@ -8,12 +8,12 @@ RSpec.describe 'Server draft 04 handshake' do
|
|
8
8
|
|
9
9
|
it_should_behave_like 'all server drafts'
|
10
10
|
|
11
|
-
it '
|
11
|
+
it 'disallows request without Sec-WebSocket-Key' do
|
12
12
|
handshake << client_request.gsub(/^Sec-WebSocket-Key:.*\n/, '')
|
13
13
|
|
14
14
|
expect(handshake).to be_finished
|
15
15
|
expect(handshake).not_to be_valid
|
16
|
-
expect(handshake.error).to
|
16
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
17
17
|
end
|
18
18
|
|
19
19
|
context 'protocol header specified' do
|
@@ -8,40 +8,40 @@ RSpec.describe 'Server draft 76 handshake' do
|
|
8
8
|
|
9
9
|
it_should_behave_like 'all server drafts'
|
10
10
|
|
11
|
-
it '
|
11
|
+
it 'disallows request without spaces in key 1' do
|
12
12
|
@request_params = { key1: '4@146546xW%0l15' }
|
13
13
|
handshake << client_request
|
14
14
|
|
15
15
|
expect(handshake).to be_finished
|
16
16
|
expect(handshake).not_to be_valid
|
17
|
-
expect(handshake.error).to
|
17
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
18
18
|
end
|
19
19
|
|
20
|
-
it '
|
20
|
+
it 'disallows request without spaces in key 2' do
|
21
21
|
@request_params = { key2: '129985Y31.P00' }
|
22
22
|
handshake << client_request
|
23
23
|
|
24
24
|
expect(handshake).to be_finished
|
25
25
|
expect(handshake).not_to be_valid
|
26
|
-
expect(handshake.error).to
|
26
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
27
27
|
end
|
28
28
|
|
29
|
-
it '
|
29
|
+
it 'disallows request with invalid number of spaces or numbers in key 1' do
|
30
30
|
@request_params = { key1: '4 @1 46546xW%0l 1 5' }
|
31
31
|
handshake << client_request
|
32
32
|
|
33
33
|
expect(handshake).to be_finished
|
34
34
|
expect(handshake).not_to be_valid
|
35
|
-
expect(handshake.error).to
|
35
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
36
36
|
end
|
37
37
|
|
38
|
-
it '
|
38
|
+
it 'disallows request with invalid number of spaces or numbers in key 2' do
|
39
39
|
@request_params = { key2: '12998 5 Y3 1 .P00' }
|
40
40
|
handshake << client_request
|
41
41
|
|
42
42
|
expect(handshake).to be_finished
|
43
43
|
expect(handshake).not_to be_valid
|
44
|
-
expect(handshake.error).to
|
44
|
+
expect(handshake.error).to be(:invalid_handshake_authentication)
|
45
45
|
end
|
46
46
|
|
47
47
|
context 'protocol header specified' do
|
data/spec/spec_helper.rb
CHANGED
@@ -9,7 +9,7 @@ RSpec.shared_examples_for 'all client drafts' do
|
|
9
9
|
expect(handshake).to be_valid
|
10
10
|
end
|
11
11
|
|
12
|
-
it '
|
12
|
+
it 'is valid' do
|
13
13
|
handshake << server_response
|
14
14
|
|
15
15
|
expect(handshake.error).to be_nil
|
@@ -17,92 +17,92 @@ RSpec.shared_examples_for 'all client drafts' do
|
|
17
17
|
expect(handshake).to be_valid
|
18
18
|
end
|
19
19
|
|
20
|
-
it '
|
20
|
+
it 'returns valid version' do
|
21
21
|
expect(handshake.version).to eql(version)
|
22
22
|
end
|
23
23
|
|
24
|
-
it '
|
24
|
+
it 'returns valid host' do
|
25
25
|
@request_params = { host: 'www.test.cc' }
|
26
26
|
expect(handshake.host).to eql('www.test.cc')
|
27
27
|
end
|
28
28
|
|
29
|
-
it '
|
29
|
+
it 'returns valid path' do
|
30
30
|
@request_params = { path: '/custom' }
|
31
31
|
expect(handshake.path).to eql('/custom')
|
32
32
|
end
|
33
33
|
|
34
|
-
it '
|
34
|
+
it 'returns valid query' do
|
35
35
|
@request_params = { query: 'aaa=bbb' }
|
36
36
|
expect(handshake.query).to eql('aaa=bbb')
|
37
37
|
end
|
38
38
|
|
39
|
-
it '
|
39
|
+
it 'returns valid port' do
|
40
40
|
@request_params = { port: 123 }
|
41
|
-
expect(handshake.port).to
|
41
|
+
expect(handshake.port).to be(123)
|
42
42
|
end
|
43
43
|
|
44
|
-
it '
|
44
|
+
it 'returns valid headers' do
|
45
45
|
@request_params = { headers: { 'aaa' => 'bbb' } }
|
46
46
|
expect(handshake.headers).to eql('aaa' => 'bbb')
|
47
47
|
end
|
48
48
|
|
49
|
-
it '
|
49
|
+
it 'parses uri' do
|
50
50
|
@request_params = { uri: 'ws://test.example.org:301/test_path?query=true' }
|
51
51
|
expect(handshake.host).to eql('test.example.org')
|
52
|
-
expect(handshake.port).to
|
52
|
+
expect(handshake.port).to be(301)
|
53
53
|
expect(handshake.path).to eql('/test_path')
|
54
54
|
expect(handshake.query).to eql('query=true')
|
55
55
|
end
|
56
56
|
|
57
|
-
it '
|
57
|
+
it 'parses url' do
|
58
58
|
@request_params = { url: 'ws://test.example.org:301/test_path?query=true' }
|
59
59
|
expect(handshake.host).to eql('test.example.org')
|
60
|
-
expect(handshake.port).to
|
60
|
+
expect(handshake.port).to be(301)
|
61
61
|
expect(handshake.path).to eql('/test_path')
|
62
62
|
expect(handshake.query).to eql('query=true')
|
63
63
|
end
|
64
64
|
|
65
|
-
it '
|
65
|
+
it 'resolves correct path with root server provided' do
|
66
66
|
@request_params = { url: 'ws://test.example.org' }
|
67
67
|
expect(handshake.path).to eql('/')
|
68
68
|
end
|
69
69
|
|
70
|
-
it '
|
70
|
+
it 'returns valid response' do
|
71
71
|
validate_request
|
72
72
|
end
|
73
73
|
|
74
|
-
it '
|
74
|
+
it 'allows custom path' do
|
75
75
|
@request_params = { path: '/custom' }
|
76
76
|
validate_request
|
77
77
|
end
|
78
78
|
|
79
|
-
it '
|
79
|
+
it 'allows query in path' do
|
80
80
|
@request_params = { query: 'test=true' }
|
81
81
|
validate_request
|
82
82
|
end
|
83
83
|
|
84
|
-
it '
|
84
|
+
it 'allows custom port' do
|
85
85
|
@request_params = { port: 123 }
|
86
86
|
validate_request
|
87
87
|
end
|
88
88
|
|
89
|
-
it '
|
89
|
+
it 'allows custom headers' do
|
90
90
|
@request_params = { headers: { 'aaa' => 'bbb' } }
|
91
91
|
validate_request
|
92
92
|
end
|
93
93
|
|
94
|
-
it '
|
94
|
+
it 'recognizes unfinished requests' do
|
95
95
|
handshake << server_response[0..-20]
|
96
96
|
|
97
97
|
expect(handshake).not_to be_finished
|
98
98
|
expect(handshake).not_to be_valid
|
99
99
|
end
|
100
100
|
|
101
|
-
it '
|
101
|
+
it 'disallows requests with invalid request method' do
|
102
102
|
handshake << server_response.gsub('101', '404')
|
103
103
|
|
104
104
|
expect(handshake).to be_finished
|
105
105
|
expect(handshake).not_to be_valid
|
106
|
-
expect(handshake.error).to
|
106
|
+
expect(handshake.error).to be(:invalid_status_code)
|
107
107
|
end
|
108
108
|
end
|