mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
49412510e0
--HG-- rename : services/sync/modules/async.js => services/common/async.js rename : services/sync/modules/log4moz.js => services/common/log4moz.js rename : services/sync/modules/ext/Observers.js => services/common/observers.js rename : services/sync/modules/ext/Preferences.js => services/common/preferences.js rename : services/sync/modules/ext/StringBundle.js => services/common/stringbundle.js rename : services/sync/tests/unit/test_async_chain.js => services/common/tests/unit/test_async_chain.js rename : services/sync/tests/unit/test_async_querySpinningly.js => services/common/tests/unit/test_async_querySpinningly.js rename : services/sync/tests/unit/test_log4moz.js => services/common/tests/unit/test_log4moz.js rename : services/sync/tests/unit/test_Observers.js => services/common/tests/unit/test_observers.js rename : services/sync/tests/unit/test_Preferences.js => services/common/tests/unit/test_preferences.js rename : services/sync/tests/unit/test_restrequest.js => services/common/tests/unit/test_restrequest.js rename : services/sync/tests/unit/test_utils_makeURI.js => services/common/tests/unit/test_utils_makeURI.js rename : services/sync/tests/unit/test_utils_namedTimer.js => services/common/tests/unit/test_utils_namedTimer.js rename : services/sync/tests/unit/test_utils_stackTrace.js => services/common/tests/unit/test_utils_stackTrace.js
111 lines
4.1 KiB
JavaScript
111 lines
4.1 KiB
JavaScript
Cu.import("resource://services-sync/constants.js");
|
|
Cu.import("resource://services-common/log4moz.js");
|
|
Cu.import("resource://services-sync/service.js");
|
|
Cu.import("resource://services-sync/status.js");
|
|
Cu.import("resource://services-sync/util.js");
|
|
|
|
function login_handling(handler) {
|
|
return function (request, response) {
|
|
if (basic_auth_matches(request, "johndoe", "ilovejane")) {
|
|
handler(request, response);
|
|
} else {
|
|
let body = "Unauthorized";
|
|
response.setStatusLine(request.httpVersion, 401, "Unauthorized");
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
};
|
|
}
|
|
|
|
function service_unavailable(request, response) {
|
|
let body = "Service Unavailable";
|
|
response.setStatusLine(request.httpVersion, 503, "Service Unavailable");
|
|
response.setHeader("Retry-After", "42");
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
function run_test() {
|
|
let logger = Log4Moz.repository.rootLogger;
|
|
Log4Moz.repository.rootLogger.addAppender(new Log4Moz.DumpAppender());
|
|
|
|
// This test expects a clean slate -- no saved passphrase.
|
|
Services.logins.removeAllLogins();
|
|
let johnHelper = track_collections_helper();
|
|
let johnU = johnHelper.with_updated_collection;
|
|
let johnColls = johnHelper.collections;
|
|
|
|
do_test_pending();
|
|
let server = httpd_setup({
|
|
"/api/1.1/johndoe/info/collections": login_handling(johnHelper.handler),
|
|
"/api/1.1/janedoe/info/collections": service_unavailable,
|
|
|
|
"/api/1.1/johndoe/storage/crypto/keys": johnU("crypto", new ServerWBO("keys").handler()),
|
|
"/api/1.1/johndoe/storage/meta/global": johnU("meta", new ServerWBO("global").handler()),
|
|
"/user/1.0/johndoe/node/weave": httpd_handler(200, "OK", "http://localhost:8080/api/")
|
|
});
|
|
|
|
try {
|
|
Service.serverURL = TEST_SERVER_URL;
|
|
|
|
_("Force the initial state.");
|
|
Status.service = STATUS_OK;
|
|
do_check_eq(Status.service, STATUS_OK);
|
|
|
|
_("Credentials won't check out because we're not configured yet.");
|
|
Status.resetSync();
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Status.service, CLIENT_NOT_CONFIGURED);
|
|
do_check_eq(Status.login, LOGIN_FAILED_NO_USERNAME);
|
|
|
|
_("Try again with username and password set.");
|
|
Status.resetSync();
|
|
setBasicCredentials("johndoe", "ilovejane", null);
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Status.service, CLIENT_NOT_CONFIGURED);
|
|
do_check_eq(Status.login, LOGIN_FAILED_NO_PASSPHRASE);
|
|
|
|
_("verifyLogin() has found out the user's cluster URL, though.");
|
|
do_check_eq(Service.clusterURL, "http://localhost:8080/api/");
|
|
|
|
_("Success if passphrase is set.");
|
|
Status.resetSync();
|
|
Identity.syncKey = "foo";
|
|
do_check_true(Service.verifyLogin());
|
|
do_check_eq(Status.service, STATUS_OK);
|
|
do_check_eq(Status.login, LOGIN_SUCCEEDED);
|
|
|
|
_("If verifyLogin() encounters a server error, it flips on the backoff flag and notifies observers on a 503 with Retry-After.");
|
|
Status.resetSync();
|
|
Identity.account = "janedoe";
|
|
Service._updateCachedURLs();
|
|
do_check_false(Status.enforceBackoff);
|
|
let backoffInterval;
|
|
Svc.Obs.add("weave:service:backoff:interval", function observe(subject, data) {
|
|
Svc.Obs.remove("weave:service:backoff:interval", observe);
|
|
backoffInterval = subject;
|
|
});
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_true(Status.enforceBackoff);
|
|
do_check_eq(backoffInterval, 42);
|
|
do_check_eq(Status.service, LOGIN_FAILED);
|
|
do_check_eq(Status.login, SERVER_MAINTENANCE);
|
|
|
|
_("Ensure a network error when finding the cluster sets the right Status bits.");
|
|
Status.resetSync();
|
|
Service.serverURL = "http://localhost:12345/";
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Status.service, LOGIN_FAILED);
|
|
do_check_eq(Status.login, LOGIN_FAILED_NETWORK_ERROR);
|
|
|
|
_("Ensure a network error when getting the collection info sets the right Status bits.");
|
|
Status.resetSync();
|
|
Service.clusterURL = "http://localhost:12345/";
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Status.service, LOGIN_FAILED);
|
|
do_check_eq(Status.login, LOGIN_FAILED_NETWORK_ERROR);
|
|
|
|
} finally {
|
|
Svc.Prefs.resetBranch("");
|
|
server.stop(do_test_finished);
|
|
}
|
|
}
|