aboutsummaryrefslogtreecommitdiffhomepage
path: root/assets/php/vendor/ratchet/rfc6455/tests
diff options
context:
space:
mode:
Diffstat (limited to 'assets/php/vendor/ratchet/rfc6455/tests')
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/AbResultsTest.php30
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/ab/clientRunner.php228
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingclient.json14
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingserver.json10
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/ab/run_ab_tests.sh11
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/ab/startServer.php55
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/bootstrap.php19
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php177
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php34
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php175
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/FrameTest.php501
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageBufferTest.php39
-rw-r--r--assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageTest.php58
13 files changed, 1351 insertions, 0 deletions
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/AbResultsTest.php b/assets/php/vendor/ratchet/rfc6455/tests/AbResultsTest.php
new file mode 100644
index 0000000..9bc502d
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/AbResultsTest.php
@@ -0,0 +1,30 @@
+<?php
+namespace Ratchet\RFC6455\Test;
+
+class AbResultsTest extends \PHPUnit_Framework_TestCase {
+ private function verifyAutobahnResults($fileName) {
+ if (!file_exists($fileName)) {
+ return $this->markTestSkipped('Autobahn TestSuite results not found');
+ }
+
+ $resultsJson = file_get_contents($fileName);
+ $results = json_decode($resultsJson);
+ $agentName = array_keys(get_object_vars($results))[0];
+
+ foreach ($results->$agentName as $name => $result) {
+ if ($result->behavior === "INFORMATIONAL") {
+ continue;
+ }
+
+ $this->assertTrue(in_array($result->behavior, ["OK", "NON-STRICT"]), "Autobahn test case " . $name . " in " . $fileName);
+ }
+ }
+
+ public function testAutobahnClientResults() {
+ $this->verifyAutobahnResults(__DIR__ . '/ab/reports/clients/index.json');
+ }
+
+ public function testAutobahnServerResults() {
+ $this->verifyAutobahnResults(__DIR__ . '/ab/reports/servers/index.json');
+ }
+}
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/ab/clientRunner.php b/assets/php/vendor/ratchet/rfc6455/tests/ab/clientRunner.php
new file mode 100644
index 0000000..0c5578a
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/ab/clientRunner.php
@@ -0,0 +1,228 @@
+<?php
+use GuzzleHttp\Psr7\Uri;
+use React\Promise\Deferred;
+use Ratchet\RFC6455\Messaging\Frame;
+
+require __DIR__ . '/../bootstrap.php';
+
+define('AGENT', 'RatchetRFC/0.0.0');
+
+$testServer = "127.0.0.1";
+
+$loop = React\EventLoop\Factory::create();
+
+$dnsResolverFactory = new React\Dns\Resolver\Factory();
+$dnsResolver = $dnsResolverFactory->createCached('8.8.8.8', $loop);
+
+$factory = new \React\SocketClient\Connector($loop, $dnsResolver);
+
+function echoStreamerFactory($conn)
+{
+ return new \Ratchet\RFC6455\Messaging\MessageBuffer(
+ new \Ratchet\RFC6455\Messaging\CloseFrameChecker,
+ function (\Ratchet\RFC6455\Messaging\MessageInterface $msg) use ($conn) {
+ /** @var Frame $frame */
+ foreach ($msg as $frame) {
+ $frame->maskPayload();
+ }
+ $conn->write($msg->getContents());
+ },
+ function (\Ratchet\RFC6455\Messaging\FrameInterface $frame) use ($conn) {
+ switch ($frame->getOpcode()) {
+ case Frame::OP_PING:
+ return $conn->write((new Frame($frame->getPayload(), true, Frame::OP_PONG))->maskPayload()->getContents());
+ break;
+ case Frame::OP_CLOSE:
+ return $conn->end((new Frame($frame->getPayload(), true, Frame::OP_CLOSE))->maskPayload()->getContents());
+ break;
+ }
+ },
+ false
+ );
+}
+
+function getTestCases() {
+ global $factory;
+ global $testServer;
+
+ $deferred = new Deferred();
+
+ $factory->create($testServer, 9001)->then(function (\React\Stream\Stream $stream) use ($deferred) {
+ $cn = new \Ratchet\RFC6455\Handshake\ClientNegotiator();
+ $cnRequest = $cn->generateRequest(new Uri('ws://127.0.0.1:9001/getCaseCount'));
+
+ $rawResponse = "";
+ $response = null;
+
+ /** @var \Ratchet\RFC6455\Messaging\Streaming\MessageBuffer $ms */
+ $ms = null;
+
+ $stream->on('data', function ($data) use ($stream, &$rawResponse, &$response, &$ms, $cn, $deferred, &$context, $cnRequest) {
+ if ($response === null) {
+ $rawResponse .= $data;
+ $pos = strpos($rawResponse, "\r\n\r\n");
+ if ($pos) {
+ $data = substr($rawResponse, $pos + 4);
+ $rawResponse = substr($rawResponse, 0, $pos + 4);
+ $response = \GuzzleHttp\Psr7\parse_response($rawResponse);
+
+ if (!$cn->validateResponse($cnRequest, $response)) {
+ $stream->end();
+ $deferred->reject();
+ } else {
+ $ms = new \Ratchet\RFC6455\Messaging\MessageBuffer(
+ new \Ratchet\RFC6455\Messaging\CloseFrameChecker,
+ function (\Ratchet\RFC6455\Messaging\MessageInterface $msg) use ($deferred, $stream) {
+ $deferred->resolve($msg->getPayload());
+ $stream->close();
+ },
+ null,
+ false
+ );
+ }
+ }
+ }
+
+ // feed the message streamer
+ if ($ms) {
+ $ms->onData($data);
+ }
+ });
+
+ $stream->write(\GuzzleHttp\Psr7\str($cnRequest));
+ });
+
+ return $deferred->promise();
+}
+
+function runTest($case)
+{
+ global $factory;
+ global $testServer;
+
+ $casePath = "/runCase?case={$case}&agent=" . AGENT;
+
+ $deferred = new Deferred();
+
+ $factory->create($testServer, 9001)->then(function (\React\Stream\Stream $stream) use ($deferred, $casePath, $case) {
+ $cn = new \Ratchet\RFC6455\Handshake\ClientNegotiator();
+ $cnRequest = $cn->generateRequest(new Uri('ws://127.0.0.1:9001' . $casePath));
+
+ $rawResponse = "";
+ $response = null;
+
+ $ms = null;
+
+ $stream->on('data', function ($data) use ($stream, &$rawResponse, &$response, &$ms, $cn, $deferred, &$context, $cnRequest) {
+ if ($response === null) {
+ $rawResponse .= $data;
+ $pos = strpos($rawResponse, "\r\n\r\n");
+ if ($pos) {
+ $data = substr($rawResponse, $pos + 4);
+ $rawResponse = substr($rawResponse, 0, $pos + 4);
+ $response = \GuzzleHttp\Psr7\parse_response($rawResponse);
+
+ if (!$cn->validateResponse($cnRequest, $response)) {
+ $stream->end();
+ $deferred->reject();
+ } else {
+ $ms = echoStreamerFactory($stream);
+ }
+ }
+ }
+
+ // feed the message streamer
+ if ($ms) {
+ $ms->onData($data);
+ }
+ });
+
+ $stream->on('close', function () use ($deferred) {
+ $deferred->resolve();
+ });
+
+ $stream->write(\GuzzleHttp\Psr7\str($cnRequest));
+ });
+
+ return $deferred->promise();
+}
+
+function createReport() {
+ global $factory;
+ global $testServer;
+
+ $deferred = new Deferred();
+
+ $factory->create($testServer, 9001)->then(function (\React\Stream\Stream $stream) use ($deferred) {
+ $reportPath = "/updateReports?agent=" . AGENT . "&shutdownOnComplete=true";
+ $cn = new \Ratchet\RFC6455\Handshake\ClientNegotiator();
+ $cnRequest = $cn->generateRequest(new Uri('ws://127.0.0.1:9001' . $reportPath));
+
+ $rawResponse = "";
+ $response = null;
+
+ /** @var \Ratchet\RFC6455\Messaging\MessageBuffer $ms */
+ $ms = null;
+
+ $stream->on('data', function ($data) use ($stream, &$rawResponse, &$response, &$ms, $cn, $deferred, &$context, $cnRequest) {
+ if ($response === null) {
+ $rawResponse .= $data;
+ $pos = strpos($rawResponse, "\r\n\r\n");
+ if ($pos) {
+ $data = substr($rawResponse, $pos + 4);
+ $rawResponse = substr($rawResponse, 0, $pos + 4);
+ $response = \GuzzleHttp\Psr7\parse_response($rawResponse);
+
+ if (!$cn->validateResponse($cnRequest, $response)) {
+ $stream->end();
+ $deferred->reject();
+ } else {
+ $ms = new \Ratchet\RFC6455\Messaging\MessageBuffer(
+ new \Ratchet\RFC6455\Messaging\CloseFrameChecker,
+ function (\Ratchet\RFC6455\Messaging\MessageInterface $msg) use ($deferred, $stream) {
+ $deferred->resolve($msg->getPayload());
+ $stream->close();
+ },
+ null,
+ false
+ );
+ }
+ }
+ }
+
+ // feed the message streamer
+ if ($ms) {
+ $ms->onData($data);
+ }
+ });
+
+ $stream->write(\GuzzleHttp\Psr7\str($cnRequest));
+ });
+
+ return $deferred->promise();
+}
+
+
+$testPromises = [];
+
+getTestCases()->then(function ($count) use ($loop) {
+ $allDeferred = new Deferred();
+
+ $runNextCase = function () use (&$i, &$runNextCase, $count, $allDeferred) {
+ $i++;
+ if ($i > $count) {
+ $allDeferred->resolve();
+ return;
+ }
+ runTest($i)->then($runNextCase);
+ };
+
+ $i = 0;
+ $runNextCase();
+
+ $allDeferred->promise()->then(function () {
+ createReport();
+ });
+});
+
+$loop->run();
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingclient.json b/assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingclient.json
new file mode 100644
index 0000000..d2fd0d0
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingclient.json
@@ -0,0 +1,14 @@
+{
+ "options": {
+ "failByDrop": false
+ }
+ , "outdir": "./reports/servers"
+ , "servers": [{
+ "agent": "RatchetRFC/0.1.0"
+ , "url": "ws://localhost:9001"
+ , "options": {"version": 18}
+ }]
+ , "cases": ["*"]
+ , "exclude-cases": ["6.4.*", "12.*","13.*"]
+ , "exclude-agent-cases": {}
+}
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingserver.json b/assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingserver.json
new file mode 100644
index 0000000..0422560
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/ab/fuzzingserver.json
@@ -0,0 +1,10 @@
+{
+ "url": "ws://127.0.0.1:9001"
+ , "options": {
+ "failByDrop": false
+ }
+ , "outdir": "./reports/clients"
+ , "cases": ["*"]
+ , "exclude-cases": ["6.4.*", "12.*", "13.*"]
+ , "exclude-agent-cases": {}
+}
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/ab/run_ab_tests.sh b/assets/php/vendor/ratchet/rfc6455/tests/ab/run_ab_tests.sh
new file mode 100644
index 0000000..8fa9ced
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/ab/run_ab_tests.sh
@@ -0,0 +1,11 @@
+cd tests/ab
+
+wstest -m fuzzingserver -s fuzzingserver.json &
+sleep 5
+php clientRunner.php
+
+sleep 2
+
+php startServer.php &
+sleep 3
+wstest -m fuzzingclient -s fuzzingclient.json
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/ab/startServer.php b/assets/php/vendor/ratchet/rfc6455/tests/ab/startServer.php
new file mode 100644
index 0000000..b256ec2
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/ab/startServer.php
@@ -0,0 +1,55 @@
+<?php
+use Ratchet\RFC6455\Messaging\MessageInterface;
+use Ratchet\RFC6455\Messaging\FrameInterface;
+use Ratchet\RFC6455\Messaging\Frame;
+
+require_once __DIR__ . "/../bootstrap.php";
+
+$loop = \React\EventLoop\Factory::create();
+
+$socket = new \React\Socket\Server($loop);
+$server = new \React\Http\Server($socket);
+
+$closeFrameChecker = new \Ratchet\RFC6455\Messaging\CloseFrameChecker;
+$negotiator = new \Ratchet\RFC6455\Handshake\ServerNegotiator(new \Ratchet\RFC6455\Handshake\RequestVerifier);
+
+$uException = new \UnderflowException;
+
+$server->on('request', function (\React\Http\Request $request, \React\Http\Response $response) use ($negotiator, $closeFrameChecker, $uException) {
+ $psrRequest = new \GuzzleHttp\Psr7\Request($request->getMethod(), $request->getPath(), $request->getHeaders());
+
+ $negotiatorResponse = $negotiator->handshake($psrRequest);
+
+ $response->writeHead(
+ $negotiatorResponse->getStatusCode(),
+ array_merge(
+ $negotiatorResponse->getHeaders(),
+ ["Content-Length" => "0"]
+ )
+ );
+
+ if ($negotiatorResponse->getStatusCode() !== 101) {
+ $response->end();
+ return;
+ }
+
+ $parser = new \Ratchet\RFC6455\Messaging\MessageBuffer($closeFrameChecker, function(MessageInterface $message) use ($response) {
+ $response->write($message->getContents());
+ }, function(FrameInterface $frame) use ($response, &$parser) {
+ switch ($frame->getOpCode()) {
+ case Frame::OP_CLOSE:
+ $response->end($frame->getContents());
+ break;
+ case Frame::OP_PING:
+ $response->write($parser->newFrame($frame->getPayload(), true, Frame::OP_PONG)->getContents());
+ break;
+ }
+ }, true, function() use ($uException) {
+ return $uException;
+ });
+
+ $request->on('data', [$parser, 'onData']);
+});
+
+$socket->listen(9001, '0.0.0.0');
+$loop->run();
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/bootstrap.php b/assets/php/vendor/ratchet/rfc6455/tests/bootstrap.php
new file mode 100644
index 0000000..511b041
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/bootstrap.php
@@ -0,0 +1,19 @@
+<?php
+
+/**
+ * Find the auto loader file
+ */
+$files = [
+ __DIR__ . '/../vendor/autoload.php',
+ __DIR__ . '/../../vendor/autoload.php',
+ __DIR__ . '/../../../vendor/autoload.php',
+ __DIR__ . '/../../../../vendor/autoload.php',
+];
+
+foreach ($files as $file) {
+ if (file_exists($file)) {
+ $loader = require $file;
+ $loader->addPsr4('Ratchet\\RFC6455\\Test\\', __DIR__);
+ break;
+ }
+}
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php
new file mode 100644
index 0000000..239de33
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/RequestVerifierTest.php
@@ -0,0 +1,177 @@
+<?php
+namespace Ratchet\RFC6455\Test\Unit\Handshake;
+use Ratchet\RFC6455\Handshake\RequestVerifier;
+
+/**
+ * @covers Ratchet\RFC6455\Handshake\RequestVerifier
+ */
+class RequestVerifierTest extends \PHPUnit_Framework_TestCase {
+ /**
+ * @var RequestVerifier
+ */
+ protected $_v;
+
+ public function setUp() {
+ $this->_v = new RequestVerifier();
+ }
+
+ public static function methodProvider() {
+ return array(
+ array(true, 'GET'),
+ array(true, 'get'),
+ array(true, 'Get'),
+ array(false, 'POST'),
+ array(false, 'DELETE'),
+ array(false, 'PUT'),
+ array(false, 'PATCH')
+ );
+ }
+ /**
+ * @dataProvider methodProvider
+ */
+ public function testMethodMustBeGet($result, $in) {
+ $this->assertEquals($result, $this->_v->verifyMethod($in));
+ }
+
+ public static function httpVersionProvider() {
+ return array(
+ array(true, 1.1),
+ array(true, '1.1'),
+ array(true, 1.2),
+ array(true, '1.2'),
+ array(true, 2),
+ array(true, '2'),
+ array(true, '2.0'),
+ array(false, '1.0'),
+ array(false, 1),
+ array(false, '0.9'),
+ array(false, ''),
+ array(false, 'hello')
+ );
+ }
+
+ /**
+ * @dataProvider httpVersionProvider
+ */
+ public function testHttpVersionIsAtLeast1Point1($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyHTTPVersion($in));
+ }
+
+ public static function uRIProvider() {
+ return array(
+ array(true, '/chat'),
+ array(true, '/hello/world?key=val'),
+ array(false, '/chat#bad'),
+ array(false, 'nope'),
+ array(false, '/ ಠ_ಠ '),
+ array(false, '/✖')
+ );
+ }
+
+ /**
+ * @dataProvider URIProvider
+ */
+ public function testRequestUri($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyRequestURI($in));
+ }
+
+ public static function hostProvider() {
+ return array(
+ array(true, ['server.example.com']),
+ array(false, [])
+ );
+ }
+
+ /**
+ * @dataProvider HostProvider
+ */
+ public function testVerifyHostIsSet($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyHost($in));
+ }
+
+ public static function upgradeProvider() {
+ return array(
+ array(true, ['websocket']),
+ array(true, ['Websocket']),
+ array(true, ['webSocket']),
+ array(false, []),
+ array(false, [''])
+ );
+ }
+
+ /**
+ * @dataProvider upgradeProvider
+ */
+ public function testVerifyUpgradeIsWebSocket($expected, $val) {
+ $this->assertEquals($expected, $this->_v->verifyUpgradeRequest($val));
+ }
+
+ public static function connectionProvider() {
+ return array(
+ array(true, ['Upgrade']),
+ array(true, ['upgrade']),
+ array(true, ['keep-alive', 'Upgrade']),
+ array(true, ['Upgrade', 'keep-alive']),
+ array(true, ['keep-alive', 'Upgrade', 'something']),
+ // as seen in Firefox 47.0.1 - see https://github.com/ratchetphp/RFC6455/issues/14
+ array(true, ['keep-alive, Upgrade']),
+ array(true, ['Upgrade, keep-alive']),
+ array(true, ['keep-alive, Upgrade, something']),
+ array(true, ['keep-alive, Upgrade', 'something']),
+ array(false, ['']),
+ array(false, [])
+ );
+ }
+
+ /**
+ * @dataProvider connectionProvider
+ */
+ public function testConnectionHeaderVerification($expected, $val) {
+ $this->assertEquals($expected, $this->_v->verifyConnection($val));
+ }
+
+ public static function keyProvider() {
+ return array(
+ array(true, ['hkfa1L7uwN6DCo4IS3iWAw==']),
+ array(true, ['765vVoQpKSGJwPzJIMM2GA==']),
+ array(true, ['AQIDBAUGBwgJCgsMDQ4PEC==']),
+ array(true, ['axa2B/Yz2CdpfQAY2Q5P7w==']),
+ array(false, [0]),
+ array(false, ['Hello World']),
+ array(false, ['1234567890123456']),
+ array(false, ['123456789012345678901234']),
+ array(true, [base64_encode('UTF8allthngs+✓')]),
+ array(true, ['dGhlIHNhbXBsZSBub25jZQ==']),
+ array(false, []),
+ array(false, ['dGhlIHNhbXBsZSBub25jZQ==', 'Some other value']),
+ array(false, ['Some other value', 'dGhlIHNhbXBsZSBub25jZQ=='])
+ );
+ }
+
+ /**
+ * @dataProvider keyProvider
+ */
+ public function testKeyIsBase64Encoded16BitNonce($expected, $val) {
+ $this->assertEquals($expected, $this->_v->verifyKey($val));
+ }
+
+ public static function versionProvider() {
+ return array(
+ array(true, [13]),
+ array(true, ['13']),
+ array(false, [12]),
+ array(false, [14]),
+ array(false, ['14']),
+ array(false, ['hi']),
+ array(false, ['']),
+ array(false, [])
+ );
+ }
+
+ /**
+ * @dataProvider versionProvider
+ */
+ public function testVersionEquals13($expected, $in) {
+ $this->assertEquals($expected, $this->_v->verifyVersion($in));
+ }
+} \ No newline at end of file
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php
new file mode 100644
index 0000000..312930e
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ResponseVerifierTest.php
@@ -0,0 +1,34 @@
+<?php
+namespace Ratchet\RFC6455\Test\Unit\Handshake;
+use Ratchet\RFC6455\Handshake\ResponseVerifier;
+
+/**
+ * @covers Ratchet\RFC6455\Handshake\ResponseVerifier
+ */
+class ResponseVerifierTest extends \PHPUnit_Framework_TestCase {
+ /**
+ * @var ResponseVerifier
+ */
+ protected $_v;
+
+ public function setUp() {
+ $this->_v = new ResponseVerifier;
+ }
+
+ public static function subProtocolsProvider() {
+ return [
+ [true, ['a'], ['a']]
+ , [true, ['b', 'a'], ['c', 'd', 'a']]
+ , [false, ['a', 'b', 'c'], ['d']]
+ , [true, [], []]
+ , [true, ['a', 'b'], []]
+ ];
+ }
+
+ /**
+ * @dataProvider subProtocolsProvider
+ */
+ public function testVerifySubProtocol($expected, $response, $request) {
+ $this->assertEquals($expected, $this->_v->verifySubProtocol($response, $request));
+ }
+}
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php
new file mode 100644
index 0000000..9c9aa8d
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Handshake/ServerNegotiatorTest.php
@@ -0,0 +1,175 @@
+<?php
+
+namespace Ratchet\RFC6455\Test\Unit\Handshake;
+
+use Ratchet\RFC6455\Handshake\RequestVerifier;
+use Ratchet\RFC6455\Handshake\ServerNegotiator;
+
+class ServerNegotiatorTest extends \PHPUnit_Framework_TestCase
+{
+ public function testNoUpgradeRequested() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: keep-alive
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(426, $response->getStatusCode());
+ $this->assertEquals('Upgrade header MUST be provided', $response->getReasonPhrase());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertEquals('13', $response->getHeaderLine('Sec-WebSocket-Version'));
+ }
+
+ public function testNoConnectionUpgradeRequested() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: keep-alive
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(400, $response->getStatusCode());
+ $this->assertEquals('Connection Upgrade MUST be requested', $response->getReasonPhrase());
+ }
+
+ public function testInvalidSecWebsocketKey() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: 12345
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(400, $response->getStatusCode());
+ $this->assertEquals('Invalid Sec-WebSocket-Key', $response->getReasonPhrase());
+ }
+
+ public function testInvalidSecWebsocketVersion() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(426, $response->getStatusCode());
+ $this->assertEquals('Upgrade Required', $response->getReasonPhrase());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertEquals('13', $response->getHeaderLine('Sec-WebSocket-Version'));
+ }
+
+ public function testBadSubprotocolResponse() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+ $negotiator->setStrictSubProtocolCheck(true);
+ $negotiator->setSupportedSubProtocols([]);
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
+Sec-WebSocket-Version: 13
+Sec-WebSocket-Protocol: someprotocol
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(426, $response->getStatusCode());
+ $this->assertEquals('No Sec-WebSocket-Protocols requested supported', $response->getReasonPhrase());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertEquals('13', $response->getHeaderLine('Sec-WebSocket-Version'));
+ }
+
+ public function testNonStrictSubprotocolDoesNotIncludeHeaderWhenNoneAgreedOn() {
+ $negotiator = new ServerNegotiator(new RequestVerifier());
+ $negotiator->setStrictSubProtocolCheck(false);
+ $negotiator->setSupportedSubProtocols(['someproto']);
+
+ $requestText = 'GET / HTTP/1.1
+Host: 127.0.0.1:6789
+Connection: Upgrade
+Pragma: no-cache
+Cache-Control: no-cache
+Upgrade: websocket
+Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
+Sec-WebSocket-Version: 13
+Sec-WebSocket-Protocol: someotherproto
+Upgrade-Insecure-Requests: 1
+User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+Accept-Encoding: gzip, deflate, sdch, br
+Accept-Language: en-US,en;q=0.8';
+
+ $request = \GuzzleHttp\Psr7\parse_request($requestText);
+
+ $response = $negotiator->handshake($request);
+
+ $this->assertEquals('1.1', $response->getProtocolVersion());
+ $this->assertEquals(101, $response->getStatusCode());
+ $this->assertEquals('Upgrade', $response->getHeaderLine('Connection'));
+ $this->assertEquals('websocket', $response->getHeaderLine('Upgrade'));
+ $this->assertFalse($response->hasHeader('Sec-WebSocket-Protocol'));
+ }
+} \ No newline at end of file
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/FrameTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/FrameTest.php
new file mode 100644
index 0000000..b73f600
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/FrameTest.php
@@ -0,0 +1,501 @@
+<?php
+namespace Ratchet\RFC6455\Test\Unit\Messaging;
+use Ratchet\RFC6455\Messaging\Frame;
+
+/**
+ * @covers Ratchet\RFC6455\Messaging\Frame
+ * @todo getMaskingKey, getPayloadStartingByte don't have tests yet
+ * @todo Could use some clean up in general, I had to rush to fix a bug for a deadline, sorry.
+ */
+class FrameTest extends \PHPUnit_Framework_TestCase {
+ protected $_firstByteFinText = '10000001';
+
+ protected $_secondByteMaskedSPL = '11111101';
+
+ /** @var Frame */
+ protected $_frame;
+
+ protected $_packer;
+
+ public function setUp() {
+ $this->_frame = new Frame;
+ }
+
+ /**
+ * Encode the fake binary string to send over the wire
+ * @param string of 1's and 0's
+ * @return string
+ */
+ public static function encode($in) {
+ if (strlen($in) > 8) {
+ $out = '';
+ while (strlen($in) >= 8) {
+ $out .= static::encode(substr($in, 0, 8));
+ $in = substr($in, 8);
+ }
+ return $out;
+ }
+ return chr(bindec($in));
+ }
+
+ /**
+ * This is a data provider
+ * param string The UTF8 message
+ * param string The WebSocket framed message, then base64_encoded
+ */
+ public static function UnframeMessageProvider() {
+ return array(
+ array('Hello World!', 'gYydAIfa1WXrtvIg0LXvbOP7'),
+ array('!@#$%^&*()-=_+[]{}\|/.,<>`~', 'gZv+h96r38f9j9vZ+IHWrvOWoayF9oX6gtfRqfKXwOeg'),
+ array('ಠ_ಠ', 'gYfnSpu5B/g75gf4Ow=='),
+ array(
+ "The quick brown fox jumps over the lazy dog. All work and no play makes Chris a dull boy. I'm trying to get past 128 characters for a unit test here...",
+ 'gf4Amahb14P8M7Kj2S6+4MN7tfHHLLmjzjSvo8IuuvPbe7j1zSn398A+9+/JIa6jzDSwrYh7lu/Ee6Ds2jD34sY/9+3He6fvySL37skwsvCIGL/xwSj34og/ou/Ee7Xs0XX3o+F8uqPcKa7qxjz398d7sObce6fi2y/3sppj9+DAOqXiyy+y8dt7sezae7aj3TW+94gvsvDce7/m2j75rYY='
+ )
+ );
+ }
+
+ public static function underflowProvider() {
+ return array(
+ array('isFinal', ''),
+ array('getRsv1', ''),
+ array('getRsv2', ''),
+ array('getRsv3', ''),
+ array('getOpcode', ''),
+ array('isMasked', '10000001'),
+ array('getPayloadLength', '10000001'),
+ array('getPayloadLength', '1000000111111110'),
+ array('getMaskingKey', '1000000110000111'),
+ array('getPayload', '100000011000000100011100101010101001100111110100')
+ );
+ }
+
+ /**
+ * @dataProvider underflowProvider
+ *
+ * @covers Ratchet\RFC6455\Messaging\Frame::isFinal
+ * @covers Ratchet\RFC6455\Messaging\Frame::getRsv1
+ * @covers Ratchet\RFC6455\Messaging\Frame::getRsv2
+ * @covers Ratchet\RFC6455\Messaging\Frame::getRsv3
+ * @covers Ratchet\RFC6455\Messaging\Frame::getOpcode
+ * @covers Ratchet\RFC6455\Messaging\Frame::isMasked
+ * @covers Ratchet\RFC6455\Messaging\Frame::getPayloadLength
+ * @covers Ratchet\RFC6455\Messaging\Frame::getMaskingKey
+ * @covers Ratchet\RFC6455\Messaging\Frame::getPayload
+ */
+ public function testUnderflowExceptionFromAllTheMethodsMimickingBuffering($method, $bin) {
+ $this->setExpectedException('\UnderflowException');
+ if (!empty($bin)) {
+ $this->_frame->addBuffer(static::encode($bin));
+ }
+ call_user_func(array($this->_frame, $method));
+ }
+
+ /**
+ * A data provider for testing the first byte of a WebSocket frame
+ * param bool Given, is the byte indicate this is the final frame
+ * param int Given, what is the expected opcode
+ * param string of 0|1 Each character represents a bit in the byte
+ */
+ public static function firstByteProvider() {
+ return array(
+ array(false, false, false, true, 8, '00011000'),
+ array(true, false, true, false, 10, '10101010'),
+ array(false, false, false, false, 15, '00001111'),
+ array(true, false, false, false, 1, '10000001'),
+ array(true, true, true, true, 15, '11111111'),
+ array(true, true, false, false, 7, '11000111')
+ );
+ }
+
+ /**
+ * @dataProvider firstByteProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::isFinal
+ */
+ public function testFinCodeFromBits($fin, $rsv1, $rsv2, $rsv3, $opcode, $bin) {
+ $this->_frame->addBuffer(static::encode($bin));
+ $this->assertEquals($fin, $this->_frame->isFinal());
+ }
+
+ /**
+ * @dataProvider firstByteProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getRsv1
+ * covers Ratchet\RFC6455\Messaging\Frame::getRsv2
+ * covers Ratchet\RFC6455\Messaging\Frame::getRsv3
+ */
+ public function testGetRsvFromBits($fin, $rsv1, $rsv2, $rsv3, $opcode, $bin) {
+ $this->_frame->addBuffer(static::encode($bin));
+ $this->assertEquals($rsv1, $this->_frame->getRsv1());
+ $this->assertEquals($rsv2, $this->_frame->getRsv2());
+ $this->assertEquals($rsv3, $this->_frame->getRsv3());
+ }
+
+ /**
+ * @dataProvider firstByteProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getOpcode
+ */
+ public function testOpcodeFromBits($fin, $rsv1, $rsv2, $rsv3, $opcode, $bin) {
+ $this->_frame->addBuffer(static::encode($bin));
+ $this->assertEquals($opcode, $this->_frame->getOpcode());
+ }
+
+ /**
+ * @dataProvider UnframeMessageProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::isFinal
+ */
+ public function testFinCodeFromFullMessage($msg, $encoded) {
+ $this->_frame->addBuffer(base64_decode($encoded));
+ $this->assertTrue($this->_frame->isFinal());
+ }
+
+ /**
+ * @dataProvider UnframeMessageProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getOpcode
+ */
+ public function testOpcodeFromFullMessage($msg, $encoded) {
+ $this->_frame->addBuffer(base64_decode($encoded));
+ $this->assertEquals(1, $this->_frame->getOpcode());
+ }
+
+ public static function payloadLengthDescriptionProvider() {
+ return array(
+ array(7, '01110101'),
+ array(7, '01111101'),
+ array(23, '01111110'),
+ array(71, '01111111'),
+ array(7, '00000000'), // Should this throw an exception? Can a payload be empty?
+ array(7, '00000001')
+ );
+ }
+
+ /**
+ * @dataProvider payloadLengthDescriptionProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::addBuffer
+ * covers Ratchet\RFC6455\Messaging\Frame::getFirstPayloadVal
+ */
+ public function testFirstPayloadDesignationValue($bits, $bin) {
+ $this->_frame->addBuffer(static::encode($this->_firstByteFinText));
+ $this->_frame->addBuffer(static::encode($bin));
+ $ref = new \ReflectionClass($this->_frame);
+ $cb = $ref->getMethod('getFirstPayloadVal');
+ $cb->setAccessible(true);
+ $this->assertEquals(bindec($bin), $cb->invoke($this->_frame));
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::getFirstPayloadVal
+ */
+ public function testFirstPayloadValUnderflow() {
+ $ref = new \ReflectionClass($this->_frame);
+ $cb = $ref->getMethod('getFirstPayloadVal');
+ $cb->setAccessible(true);
+ $this->setExpectedException('UnderflowException');
+ $cb->invoke($this->_frame);
+ }
+
+ /**
+ * @dataProvider payloadLengthDescriptionProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getNumPayloadBits
+ */
+ public function testDetermineHowManyBitsAreUsedToDescribePayload($expected_bits, $bin) {
+ $this->_frame->addBuffer(static::encode($this->_firstByteFinText));
+ $this->_frame->addBuffer(static::encode($bin));
+ $ref = new \ReflectionClass($this->_frame);
+ $cb = $ref->getMethod('getNumPayloadBits');
+ $cb->setAccessible(true);
+ $this->assertEquals($expected_bits, $cb->invoke($this->_frame));
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::getNumPayloadBits
+ */
+ public function testgetNumPayloadBitsUnderflow() {
+ $ref = new \ReflectionClass($this->_frame);
+ $cb = $ref->getMethod('getNumPayloadBits');
+ $cb->setAccessible(true);
+ $this->setExpectedException('UnderflowException');
+ $cb->invoke($this->_frame);
+ }
+
+ public function secondByteProvider() {
+ return array(
+ array(true, 1, '10000001'),
+ array(false, 1, '00000001'),
+ array(true, 125, $this->_secondByteMaskedSPL)
+ );
+ }
+ /**
+ * @dataProvider secondByteProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::isMasked
+ */
+ public function testIsMaskedReturnsExpectedValue($masked, $payload_length, $bin) {
+ $this->_frame->addBuffer(static::encode($this->_firstByteFinText));
+ $this->_frame->addBuffer(static::encode($bin));
+ $this->assertEquals($masked, $this->_frame->isMasked());
+ }
+
+ /**
+ * @dataProvider UnframeMessageProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::isMasked
+ */
+ public function testIsMaskedFromFullMessage($msg, $encoded) {
+ $this->_frame->addBuffer(base64_decode($encoded));
+ $this->assertTrue($this->_frame->isMasked());
+ }
+
+ /**
+ * @dataProvider secondByteProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayloadLength
+ */
+ public function testGetPayloadLengthWhenOnlyFirstFrameIsUsed($masked, $payload_length, $bin) {
+ $this->_frame->addBuffer(static::encode($this->_firstByteFinText));
+ $this->_frame->addBuffer(static::encode($bin));
+ $this->assertEquals($payload_length, $this->_frame->getPayloadLength());
+ }
+
+ /**
+ * @dataProvider UnframeMessageProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayloadLength
+ * @todo Not yet testing when second additional payload length descriptor
+ */
+ public function testGetPayloadLengthFromFullMessage($msg, $encoded) {
+ $this->_frame->addBuffer(base64_decode($encoded));
+ $this->assertEquals(strlen($msg), $this->_frame->getPayloadLength());
+ }
+
+ public function maskingKeyProvider() {
+ $frame = new Frame;
+ return array(
+ array($frame->generateMaskingKey()),
+ array($frame->generateMaskingKey()),
+ array($frame->generateMaskingKey())
+ );
+ }
+
+ /**
+ * @dataProvider maskingKeyProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getMaskingKey
+ * @todo I I wrote the dataProvider incorrectly, skipping for now
+ */
+ public function testGetMaskingKey($mask) {
+ $this->_frame->addBuffer(static::encode($this->_firstByteFinText));
+ $this->_frame->addBuffer(static::encode($this->_secondByteMaskedSPL));
+ $this->_frame->addBuffer($mask);
+ $this->assertEquals($mask, $this->_frame->getMaskingKey());
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::getMaskingKey
+ */
+ public function testGetMaskingKeyOnUnmaskedPayload() {
+ $frame = new Frame('Hello World!');
+ $this->assertEquals('', $frame->getMaskingKey());
+ }
+
+ /**
+ * @dataProvider UnframeMessageProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayload
+ * @todo Move this test to bottom as it requires all methods of the class
+ */
+ public function testUnframeFullMessage($unframed, $base_framed) {
+ $this->_frame->addBuffer(base64_decode($base_framed));
+ $this->assertEquals($unframed, $this->_frame->getPayload());
+ }
+
+ public static function messageFragmentProvider() {
+ return array(
+ array(false, '', '', '', '', '')
+ );
+ }
+
+ /**
+ * @dataProvider UnframeMessageProvider
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayload
+ */
+ public function testCheckPiecingTogetherMessage($msg, $encoded) {
+ $framed = base64_decode($encoded);
+ for ($i = 0, $len = strlen($framed);$i < $len; $i++) {
+ $this->_frame->addBuffer(substr($framed, $i, 1));
+ }
+ $this->assertEquals($msg, $this->_frame->getPayload());
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::__construct
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayloadLength
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayload
+ */
+ public function testLongCreate() {
+ $len = 65525;
+ $pl = $this->generateRandomString($len);
+ $frame = new Frame($pl, true, Frame::OP_PING);
+ $this->assertTrue($frame->isFinal());
+ $this->assertEquals(Frame::OP_PING, $frame->getOpcode());
+ $this->assertFalse($frame->isMasked());
+ $this->assertEquals($len, $frame->getPayloadLength());
+ $this->assertEquals($pl, $frame->getPayload());
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::__construct
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayloadLength
+ */
+ public function testReallyLongCreate() {
+ $len = 65575;
+ $frame = new Frame($this->generateRandomString($len));
+ $this->assertEquals($len, $frame->getPayloadLength());
+ }
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::__construct
+ * covers Ratchet\RFC6455\Messaging\Frame::extractOverflow
+ */
+ public function testExtractOverflow() {
+ $string1 = $this->generateRandomString();
+ $frame1 = new Frame($string1);
+ $string2 = $this->generateRandomString();
+ $frame2 = new Frame($string2);
+ $cat = new Frame;
+ $cat->addBuffer($frame1->getContents() . $frame2->getContents());
+ $this->assertEquals($frame1->getContents(), $cat->getContents());
+ $this->assertEquals($string1, $cat->getPayload());
+ $uncat = new Frame;
+ $uncat->addBuffer($cat->extractOverflow());
+ $this->assertEquals($string1, $cat->getPayload());
+ $this->assertEquals($string2, $uncat->getPayload());
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::extractOverflow
+ */
+ public function testEmptyExtractOverflow() {
+ $string = $this->generateRandomString();
+ $frame = new Frame($string);
+ $this->assertEquals($string, $frame->getPayload());
+ $this->assertEquals('', $frame->extractOverflow());
+ $this->assertEquals($string, $frame->getPayload());
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::getContents
+ */
+ public function testGetContents() {
+ $msg = 'The quick brown fox jumps over the lazy dog.';
+ $frame1 = new Frame($msg);
+ $frame2 = new Frame($msg);
+ $frame2->maskPayload();
+ $this->assertNotEquals($frame1->getContents(), $frame2->getContents());
+ $this->assertEquals(strlen($frame1->getContents()) + 4, strlen($frame2->getContents()));
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::maskPayload
+ */
+ public function testMasking() {
+ $msg = 'The quick brown fox jumps over the lazy dog.';
+ $frame = new Frame($msg);
+ $frame->maskPayload();
+ $this->assertTrue($frame->isMasked());
+ $this->assertEquals($msg, $frame->getPayload());
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::unMaskPayload
+ */
+ public function testUnMaskPayload() {
+ $string = $this->generateRandomString();
+ $frame = new Frame($string);
+ $frame->maskPayload()->unMaskPayload();
+ $this->assertFalse($frame->isMasked());
+ $this->assertEquals($string, $frame->getPayload());
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::generateMaskingKey
+ */
+ public function testGenerateMaskingKey() {
+ $dupe = false;
+ $done = array();
+ for ($i = 0; $i < 10; $i++) {
+ $new = $this->_frame->generateMaskingKey();
+ if (in_array($new, $done)) {
+ $dupe = true;
+ }
+ $done[] = $new;
+ }
+ $this->assertEquals(4, strlen($new));
+ $this->assertFalse($dupe);
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::maskPayload
+ */
+ public function testGivenMaskIsValid() {
+ $this->setExpectedException('InvalidArgumentException');
+ $this->_frame->maskPayload('hello world');
+ }
+
+ /**
+ * covers Ratchet\RFC6455\Messaging\Frame::maskPayload
+ */
+ public function testGivenMaskIsValidAscii() {
+ if (!extension_loaded('mbstring')) {
+ $this->markTestSkipped("mbstring required for this test");
+ return;
+ }
+ $this->setExpectedException('OutOfBoundsException');
+ $this->_frame->maskPayload('x✖');
+ }
+
+ protected function generateRandomString($length = 10, $addSpaces = true, $addNumbers = true) {
+ $characters = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!"$%&/()=[]{}'; // ยง
+ $useChars = array();
+ for($i = 0; $i < $length; $i++) {
+ $useChars[] = $characters[mt_rand(0, strlen($characters) - 1)];
+ }
+ if($addSpaces === true) {
+ array_push($useChars, ' ', ' ', ' ', ' ', ' ', ' ');
+ }
+ if($addNumbers === true) {
+ array_push($useChars, rand(0, 9), rand(0, 9), rand(0, 9));
+ }
+ shuffle($useChars);
+ $randomString = trim(implode('', $useChars));
+ $randomString = substr($randomString, 0, $length);
+ return $randomString;
+ }
+
+ /**
+ * There was a frame boundary issue when the first 3 bytes of a frame with a payload greater than
+ * 126 was added to the frame buffer and then Frame::getPayloadLength was called. It would cause the frame
+ * to set the payload length to 126 and then not recalculate it once the full length information was available.
+ *
+ * This is fixed by setting the defPayLen back to -1 before the underflow exception is thrown.
+ *
+ * covers Ratchet\RFC6455\Messaging\Frame::getPayloadLength
+ * covers Ratchet\RFC6455\Messaging\Frame::extractOverflow
+ */
+ public function testFrameDeliveredOneByteAtATime() {
+ $startHeader = "\x01\x7e\x01\x00"; // header for a text frame of 256 - non-final
+ $framePayload = str_repeat("*", 256);
+ $rawOverflow = "xyz";
+ $rawFrame = $startHeader . $framePayload . $rawOverflow;
+ $frame = new Frame();
+ $payloadLen = 256;
+ for ($i = 0; $i < strlen($rawFrame); $i++) {
+ $frame->addBuffer($rawFrame[$i]);
+ try {
+ // payloadLen will
+ $payloadLen = $frame->getPayloadLength();
+ } catch (\UnderflowException $e) {
+ if ($i > 2) { // we should get an underflow on 0,1,2
+ $this->fail("Underflow exception when the frame length should be available");
+ }
+ }
+ if ($payloadLen !== 256) {
+ $this->fail("Payload length of " . $payloadLen . " should have been 256.");
+ }
+ }
+ // make sure the overflow is good
+ $this->assertEquals($rawOverflow, $frame->extractOverflow());
+ }
+}
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageBufferTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageBufferTest.php
new file mode 100644
index 0000000..c33ff0c
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageBufferTest.php
@@ -0,0 +1,39 @@
+<?php
+
+namespace Ratchet\RFC6455\Test\Unit\Messaging;
+
+use Ratchet\RFC6455\Messaging\CloseFrameChecker;
+use Ratchet\RFC6455\Messaging\Frame;
+use Ratchet\RFC6455\Messaging\Message;
+use Ratchet\RFC6455\Messaging\MessageBuffer;
+
+class MessageBufferTest extends \PHPUnit_Framework_TestCase
+{
+ /**
+ * This is to test that MessageBuffer can handle a large receive
+ * buffer with many many frames without blowing the stack (pre-v0.4 issue)
+ */
+ public function testProcessingLotsOfFramesInASingleChunk() {
+ $frame = new Frame('a', true, Frame::OP_TEXT);
+
+ $frameRaw = $frame->getContents();
+
+ $data = str_repeat($frameRaw, 1000);
+
+ $messageCount = 0;
+
+ $messageBuffer = new MessageBuffer(
+ new CloseFrameChecker(),
+ function (Message $message) use (&$messageCount) {
+ $messageCount++;
+ $this->assertEquals('a', $message->getPayload());
+ },
+ null,
+ false
+ );
+
+ $messageBuffer->onData($data);
+
+ $this->assertEquals(1000, $messageCount);
+ }
+} \ No newline at end of file
diff --git a/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageTest.php b/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageTest.php
new file mode 100644
index 0000000..1f7eab5
--- /dev/null
+++ b/assets/php/vendor/ratchet/rfc6455/tests/unit/Messaging/MessageTest.php
@@ -0,0 +1,58 @@
+<?php
+namespace Ratchet\RFC6455\Test\Unit\Messaging;
+use Ratchet\RFC6455\Messaging\Frame;
+use Ratchet\RFC6455\Messaging\Message;
+
+/**
+ * @covers Ratchet\RFC6455\Messaging\Message
+ */
+class MessageTest extends \PHPUnit_Framework_TestCase {
+ /** @var Message */
+ protected $message;
+
+ public function setUp() {
+ $this->message = new Message;
+ }
+
+ public function testNoFrames() {
+ $this->assertFalse($this->message->isCoalesced());
+ }
+
+ public function testNoFramesOpCode() {
+ $this->setExpectedException('UnderflowException');
+ $this->message->getOpCode();
+ }
+
+ public function testFragmentationPayload() {
+ $a = 'Hello ';
+ $b = 'World!';
+ $f1 = new Frame($a, false);
+ $f2 = new Frame($b, true, Frame::OP_CONTINUE);
+ $this->message->addFrame($f1)->addFrame($f2);
+ $this->assertEquals(strlen($a . $b), $this->message->getPayloadLength());
+ $this->assertEquals($a . $b, $this->message->getPayload());
+ }
+
+ public function testUnbufferedFragment() {
+ $this->message->addFrame(new Frame('The quick brow', false));
+ $this->setExpectedException('UnderflowException');
+ $this->message->getPayload();
+ }
+
+ public function testGetOpCode() {
+ $this->message
+ ->addFrame(new Frame('The quick brow', false, Frame::OP_TEXT))
+ ->addFrame(new Frame('n fox jumps ov', false, Frame::OP_CONTINUE))
+ ->addFrame(new Frame('er the lazy dog', true, Frame::OP_CONTINUE))
+ ;
+ $this->assertEquals(Frame::OP_TEXT, $this->message->getOpCode());
+ }
+
+ public function testGetUnBufferedPayloadLength() {
+ $this->message
+ ->addFrame(new Frame('The quick brow', false, Frame::OP_TEXT))
+ ->addFrame(new Frame('n fox jumps ov', false, Frame::OP_CONTINUE))
+ ;
+ $this->assertEquals(28, $this->message->getPayloadLength());
+ }
+} \ No newline at end of file