1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe 'Client draft 76 handshake' do
let(:handshake) { WebSocket::Handshake::Client.new({ uri: 'ws://example.com/demo', origin: 'http://example.com', version: version }.merge(@request_params || {})) }
let(:version) { 76 }
let(:client_request) { client_handshake_76({ key1: handshake.handler.send(:key1), key2: handshake.handler.send(:key2), key3: handshake.handler.send(:key3) }.merge(@request_params || {})) }
let(:server_response) { server_handshake_76({ challenge: handshake.handler.send(:challenge) }.merge(@request_params || {})) }
it_behaves_like 'all client drafts'
it 'disallows client with invalid challenge' do
@request_params = { challenge: 'invalid' }
handshake << server_response
expect(handshake).to be_finished
expect(handshake).not_to be_valid
expect(handshake.error).to be(:invalid_handshake_authentication)
end
context 'protocol header specified' do
let(:handshake) { WebSocket::Handshake::Client.new(uri: 'ws://example.com/demo', origin: 'http://example.com', version: version, protocols: %w[binary]) }
context 'supported' do
it 'returns a valid handshake' do
@request_params = { headers: { 'Sec-WebSocket-Protocol' => 'binary' } }
handshake << server_response
expect(handshake).to be_finished
expect(handshake).to be_valid
end
end
context 'unsupported' do
it 'fails with an unsupported protocol error' do
@request_params = { headers: { 'Sec-WebSocket-Protocol' => 'xmpp' } }
handshake << server_response
expect(handshake).to be_finished
expect(handshake).not_to be_valid
expect(handshake.error).to be(:unsupported_protocol)
end
end
end
end
|