aboutsummaryrefslogtreecommitdiffhomepage
path: root/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake
diff options
context:
space:
mode:
authormarvin-borner@live.com2018-04-10 21:50:16 +0200
committermarvin-borner@live.com2018-04-10 21:54:48 +0200
commitfc9401f04a3aca5abb22f87ebc210de8afe11d32 (patch)
treeb0b310f3581764ec3955f4e496a05137a32951c3 /assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake
parent286d643180672f20526f3dc3bd19d7b751e2fa97 (diff)
Initial Commit
Diffstat (limited to 'assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake')
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php177
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php34
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php175
3 files changed, 386 insertions, 0 deletions
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php
new file mode 100644
index 0000000..239de33
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php
@@ -0,0 +1,177 @@
+<?php
+namespace Ratchet\RFC6455\Test\Unit\Handshake;
+use Ratchet\RFC6455\Handshake\RequestVerifier;
+
+/**
+ * @covers Ratchet\RFC6455\Handshake\RequestVerifier
+ */
+class RequestVerifierTest extends \PHPUnit_Framework_TestCase {
+ /**
+ * @var RequestVerifier
+ */
+ protected $_v;
+
+ public function setUp() {
+ $this->_v = new RequestVerifier();
+ }
+
+ public static function methodProvider() {
+ return array(
+ array(true, 'GET'),
+ array(true, 'get'),
+ array(true, 'Get'),
+ array(false, 'POST'),
+ array(false, 'DELETE'),
+ array(false, 'PUT'),
+ array(false, 'PATCH')
+ );
+ }
+ /**
+ * @dataProvider methodProvider
+ */
+ public function testMethodMustBeGet($result, $in) {
+ $this->assertEquals($result, $this->_v->verifyMethod($in));
+ }
+
+ public static function httpVersionProvider() {
+ return array(
+ array(true, 1.1),
+ array(true, '1.1'),
+ array(true, 1.2),
+ array(true, '1.2'),
+ array(true, 2),
+ array(true, '2'),
+ array(true, '2.0'),
+ array(false, '1.0'),
+ array(false, 1),
+ array(false, '0.9'),
+ array(false, ''),
+ array(false, 'hello')
+ );
+ }
+
+ /**
+ * @dataProvider httpVersionProvider
+ */
+ public function testHttpVersionIsAtLeast1Point1($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyHTTPVersion($in));
+ }
+
+ public static function uRIProvider() {
+ return array(
+ array(true, '/chat'),
+ array(true, '/hello/world?key=val'),
+ array(false, '/chat#bad'),
+ array(false, 'nope'),
+ array(false, '/ ಠ_ಠ '),
+ array(false, '/✖')
+ );
+ }
+
+ /**
+ * @dataProvider URIProvider
+ */
+ public function testRequestUri($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyRequestURI($in));
+ }
+
+ public static function hostProvider() {
+ return array(
+ array(true, ['server.example.com']),
+ array(false, [])
+ );
+ }
+
+ /**
+ * @dataProvider HostProvider
+ */
+ public function testVerifyHostIsSet($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyHost($in));
+ }
+
+ public static function upgradeProvider() {
+ return array(
+ array(true, ['websocket']),
+ array(true, ['Websocket']),
+ array(true, ['webSocket']),
+ array(false, []),
+ array(false, [''])
+ );
+ }
+
+ /**
+ * @dataProvider upgradeProvider
+ */
+ public function testVerifyUpgradeIsWebSocket($expected, $val) {
+ $this->assertEquals($expected, $this->_v->verifyUpgradeRequest($val));
+ }
+
+ public static function connectionProvider() {
+ return array(
+ array(true, ['Upgrade']),
+ array(true, ['upgrade']),
+ array(true, ['keep-alive', 'Upgrade']),
+ array(true, ['Upgrade', 'keep-alive']),
+ array(true, ['keep-alive', 'Upgrade', 'something']),
+ // as seen in Firefox 47.0.1 - see https://github.com/ratchetphp/RFC6455/issues/14
+ array(true, ['keep-alive, Upgrade']),
+ array(true, ['Upgrade, keep-alive']),
+ array(true, ['keep-alive, Upgrade, something']),
+ array(true, ['keep-alive, Upgrade', 'something']),
+ array(false, ['']),
+ array(false, [])
+ );
+ }
+
+ /**
+ * @dataProvider connectionProvider
+ */
+ public function testConnectionHeaderVerification($expected, $val) {
+ $this->assertEquals($expected, $this->_v->verifyConnection($val));
+ }
+
+ public static function keyProvider() {
+ return array(
+ array(true, ['hkfa1L7uwN6DCo4IS3iWAw==']),
+ array(true, ['765vVoQpKSGJwPzJIMM2GA==']),
+ array(true, ['AQIDBAUGBwgJCgsMDQ4PEC==']),
+ array(true, ['axa2B/Yz2CdpfQAY2Q5P7w==']),
+ array(false, [0]),
+ array(false, ['Hello World']),
+ array(false, ['1234567890123456']),
+ array(false, ['123456789012345678901234']),
+ array(true, [base64_encode('UTF8allthngs+✓')]),
+ array(true, ['dGhlIHNhbXBsZSBub25jZQ==']),
+ array(false, []),
+ array(false, ['dGhlIHNhbXBsZSBub25jZQ==', 'Some other value']),
+ array(false, ['Some other value', 'dGhlIHNhbXBsZSBub25jZQ=='])
+ );
+ }
+
+ /**
+ * @dataProvider keyProvider
+ */
+ public function testKeyIsBase64Encoded16BitNonce($expected, $val) {
+ $this->assertEquals($expected, $this->_v->verifyKey($val));
+ }
+
+ public static function versionProvider() {
+ return array(
+ array(true, [13]),
+ array(true, ['13']),
+ array(false, [12]),
+ array(false, [14]),
+ array(false, ['14']),
+ array(false, ['hi']),
+ array(false, ['']),
+ array(false, [])
+ );
+ }
+
+ /**
+ * @dataProvider versionProvider
+ */
+ public function testVersionEquals13($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyVersion($in));
+ }
+} \ No newline at end of file
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php
new file mode 100644
index 0000000..312930e
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php
@@ -0,0 +1,34 @@
+<?php
+namespace Ratchet\RFC6455\Test\Unit\Handshake;
+use Ratchet\RFC6455\Handshake\ResponseVerifier;
+
+/**
+ * @covers Ratchet\RFC6455\Handshake\ResponseVerifier
+ */
+class ResponseVerifierTest extends \PHPUnit_Framework_TestCase {
+ /**
+ * @var ResponseVerifier
+ */
+ protected $_v;
+
+ public function setUp() {
+ $this->_v = new ResponseVerifier;
+ }
+
+ public static function subProtocolsProvider() {
+ return [
+ [true, ['a'], ['a']]
+ , [true, ['b', 'a'], ['c', 'd', 'a']]
+ , [false, ['a', 'b', 'c'], ['d']]
+ , [true, [], []]
+ , [true, ['a', 'b'], []]
+ ];
+ }
+
+ /**
+ * @dataProvider subProtocolsProvider
+ */
+ public function testVerifySubProtocol($expected, $response, $request) {
+ $this->assertEquals($expected, $this->_v->verifySubProtocol($response, $request));
+ }
+}
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php
new file mode 100644
index 0000000..9c9aa8d
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php
@@ -0,0 +1,175 @@
+<?php
+
+namespace Ratchet\RFC6455\Test\Unit\Handshake;
+
+use Ratchet\RFC6455\Handshake\RequestVerifier;
+use Ratchet\RFC6455\Handshake\ServerNegotiator;
+
+class ServerNegotiatorTest extends \PHPUnit_Framework_TestCase
+{
+ public function testNoUpgradeRequested() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: keep-alive
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(426, $response->getStatusCode());
+ $this->assertEquals('Upgrade header MUST be provided', $response->getReasonPhrase());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertEquals('13', $response->getHeaderLine('Sec-WebSocket-Version'));
+ }
+
+ public function testNoConnectionUpgradeRequested() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: keep-alive
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(400, $response->getStatusCode());
+ $this->assertEquals('Connection Upgrade MUST be requested', $response->getReasonPhrase());
+ }
+
+ public function testInvalidSecWebsocketKey() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: 12345
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(400, $response->getStatusCode());
+ $this->assertEquals('Invalid Sec-WebSocket-Key', $response->getReasonPhrase());
+ }
+
+ public function testInvalidSecWebsocketVersion() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(426, $response->getStatusCode());
+ $this->assertEquals('Upgrade Required', $response->getReasonPhrase());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertEquals('13', $response->getHeaderLine('Sec-WebSocket-Version'));
+ }
+
+ public function testBadSubprotocolResponse() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+ $negotiator->setStrictSubProtocolCheck(true);
+ $negotiator->setSupportedSubProtocols([]);
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
+Sec-WebSocket-Version: 13
+Sec-WebSocket-Protocol: someprotocol
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(426, $response->getStatusCode());
+ $this->assertEquals('No Sec-WebSocket-Protocols requested supported', $response->getReasonPhrase());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertEquals('13', $response->getHeaderLine('Sec-WebSocket-Version'));
+ }
+
+ public function testNonStrictSubprotocolDoesNotIncludeHeaderWhenNoneAgreedOn() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+ $negotiator->setStrictSubProtocolCheck(false);
+ $negotiator->setSupportedSubProtocols(['someproto']);
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
+Sec-WebSocket-Version: 13
+Sec-WebSocket-Protocol: someotherproto
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(101, $response->getStatusCode());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertFalse($response->hasHeader('Sec-WebSocket-Protocol'));
+ }
+} \ No newline at end of file