Sha256: adc65d444c66dd8b0768f46bd4653af7a470f9e89ee4af22ac11af5585ec283f
Contents?: true
Size: 1.74 KB
Versions: 8
Compression:
Stored size: 1.74 KB
Contents
# frozen_string_literal: true require 'spec_helper' RSpec.describe 'Client draft 76 handshake' do let(:handshake) { WebSocket::Handshake::Client.new({ uri: 'ws://example.com/demo', origin: 'http://example.com', version: version }.merge(@request_params || {})) } let(:version) { 76 } let(:client_request) { client_handshake_76({ key1: handshake.handler.send(:key1), key2: handshake.handler.send(:key2), key3: handshake.handler.send(:key3) }.merge(@request_params || {})) } let(:server_response) { server_handshake_76({ challenge: handshake.handler.send(:challenge) }.merge(@request_params || {})) } it_behaves_like 'all client drafts' it 'disallows client with invalid challenge' do @request_params = { challenge: 'invalid' } handshake << server_response expect(handshake).to be_finished expect(handshake).not_to be_valid expect(handshake.error).to be(:invalid_handshake_authentication) end context 'protocol header specified' do let(:handshake) { WebSocket::Handshake::Client.new(uri: 'ws://example.com/demo', origin: 'http://example.com', version: version, protocols: %w[binary]) } context 'supported' do it 'returns a valid handshake' do @request_params = { headers: { 'Sec-WebSocket-Protocol' => 'binary' } } handshake << server_response expect(handshake).to be_finished expect(handshake).to be_valid end end context 'unsupported' do it 'fails with an unsupported protocol error' do @request_params = { headers: { 'Sec-WebSocket-Protocol' => 'xmpp' } } handshake << server_response expect(handshake).to be_finished expect(handshake).not_to be_valid expect(handshake.error).to be(:unsupported_protocol) end end end end
Version data entries
8 entries across 8 versions & 3 rubygems