mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
106 lines
3.3 KiB
JavaScript
106 lines
3.3 KiB
JavaScript
Cu.import("resource://weave/log4moz.js");
|
|
Cu.import("resource://weave/util.js");
|
|
Cu.import("resource://weave/async.js");
|
|
Cu.import("resource://weave/resource.js");
|
|
Cu.import("resource://weave/auth.js");
|
|
Cu.import("resource://weave/identity.js");
|
|
|
|
Function.prototype.async = Async.sugar;
|
|
|
|
let logger;
|
|
let Httpd = {};
|
|
Cu.import("resource://tests/lib/httpd.js", Httpd);
|
|
|
|
function server_open(metadata, response) {
|
|
let body = "This path exists";
|
|
response.setStatusLine(metadata.httpVersion, 200, "OK");
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
function server_protected(metadata, response) {
|
|
let body;
|
|
|
|
// no btoa() in xpcshell. it's guest:guest
|
|
if (metadata.hasHeader("Authorization") &&
|
|
metadata.getHeader("Authorization") == "Basic Z3Vlc3Q6Z3Vlc3Q=") {
|
|
body = "This path exists and is protected";
|
|
response.setStatusLine(metadata.httpVersion, 200, "OK, authorized");
|
|
response.setHeader("WWW-Authenticate", 'Basic realm="secret"', false);
|
|
|
|
} else {
|
|
body = "This path exists and is protected - failed";
|
|
response.setStatusLine(metadata.httpVersion, 401, "Unauthorized");
|
|
response.setHeader("WWW-Authenticate", 'Basic realm="secret"', false);
|
|
}
|
|
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
function server_404(metadata, response) {
|
|
let body = "File not found";
|
|
response.setStatusLine(metadata.httpVersion, 404, "Not Found");
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
function async_test() {
|
|
let self = yield;
|
|
|
|
logger = Log4Moz.repository.getLogger('Test');
|
|
Log4Moz.repository.rootLogger.addAppender(new Log4Moz.DumpAppender());
|
|
|
|
let server = new Httpd.nsHttpServer();
|
|
server.registerPathHandler("/open", server_open);
|
|
server.registerPathHandler("/protected", server_protected);
|
|
server.registerPathHandler("/404", server_404);
|
|
server.start(8080);
|
|
|
|
Utils.prefs.setIntPref("network.numRetries", 1); // speed up test
|
|
|
|
// 1. A regular non-password-protected resource
|
|
|
|
let res = new Resource("http://localhost:8080/open");
|
|
let content = yield res.get(self.cb);
|
|
do_check_eq(content, "This path exists");
|
|
do_check_eq(res.lastChannel.responseStatus, 200);
|
|
|
|
// 2. A password protected resource (test that it'll fail w/o pass)
|
|
let res2 = new Resource("http://localhost:8080/protected");
|
|
try {
|
|
content = yield res2.get(self.cb);
|
|
do_check_true(false); // unreachable, get() above must fail
|
|
} catch (e) {}
|
|
|
|
// 3. A password protected resource
|
|
|
|
let auth = new BasicAuthenticator(new Identity("secret", "guest", "guest"));
|
|
let res3 = new Resource("http://localhost:8080/protected");
|
|
res3.authenticator = auth;
|
|
content = yield res3.get(self.cb);
|
|
do_check_eq(content, "This path exists and is protected");
|
|
do_check_eq(res3.lastChannel.responseStatus, 200);
|
|
|
|
// 4. A non-existent resource (test that it'll fail)
|
|
|
|
let res4 = new Resource("http://localhost:8080/404");
|
|
try {
|
|
let content = yield res4.get(self.cb);
|
|
do_check_true(false); // unreachable, get() above must fail
|
|
} catch (e) {}
|
|
do_check_eq(res4.lastChannel.responseStatusText, "Not Found");
|
|
do_check_eq(res4.lastChannel.responseStatus, 404);
|
|
|
|
// FIXME: additional coverage needed:
|
|
// * PUT requests
|
|
// * DELETE requests
|
|
// * JsonFilter
|
|
|
|
do_test_finished();
|
|
server.stop();
|
|
self.done();
|
|
}
|
|
|
|
function run_test() {
|
|
async_test.async(this);
|
|
do_test_pending();
|
|
}
|