| Index: remoting/webapp/crd/js/dns_blackhole_checker_unittest.js
|
| diff --git a/remoting/webapp/crd/js/dns_blackhole_checker_unittest.js b/remoting/webapp/crd/js/dns_blackhole_checker_unittest.js
|
| deleted file mode 100644
|
| index 46abdd4f964b8ff1f0794a24949b7ebd6339cba6..0000000000000000000000000000000000000000
|
| --- a/remoting/webapp/crd/js/dns_blackhole_checker_unittest.js
|
| +++ /dev/null
|
| @@ -1,197 +0,0 @@
|
| -// Copyright 2015 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -/**
|
| - * @fileoverview
|
| - * TODO(garykac): Create interface for SignalStrategy.
|
| - * @suppress {checkTypes|checkVars|reportUnknownTypes|visibility}
|
| - */
|
| -
|
| -(function() {
|
| -
|
| -'use strict';
|
| -
|
| -/** @type {(sinon.Spy|function(remoting.SignalStrategy.State))} */
|
| -var onStateChange = null;
|
| -
|
| -/** @type {(sinon.Spy|function(Element):void)} */
|
| -var onIncomingStanzaCallback = null;
|
| -
|
| -/** @type {remoting.DnsBlackholeChecker} */
|
| -var checker = null;
|
| -
|
| -/** @type {remoting.MockSignalStrategy} */
|
| -var signalStrategy = null;
|
| -
|
| -/** @type {sinon.FakeXhr} */
|
| -var fakeXhr = null;
|
| -
|
| -QUnit.module('dns_blackhole_checker', {
|
| - beforeEach: function(assert) {
|
| - sinon.useFakeXMLHttpRequest().onCreate = function(xhr) {
|
| - QUnit.equal(fakeXhr, null, 'exactly one XHR is issued');
|
| - fakeXhr = xhr;
|
| - };
|
| -
|
| - onStateChange = sinon.spy();
|
| - onIncomingStanzaCallback = sinon.spy();
|
| - signalStrategy = new remoting.MockSignalStrategy();
|
| - sinon.stub(signalStrategy, 'connect', base.doNothing);
|
| - checker = new remoting.DnsBlackholeChecker(signalStrategy);
|
| -
|
| - checker.setStateChangedCallback(onStateChange);
|
| - checker.setIncomingStanzaCallback(onIncomingStanzaCallback);
|
| -
|
| - sinon.assert.notCalled(onStateChange);
|
| - sinon.assert.notCalled(signalStrategy.connect);
|
| - checker.connect('server', 'username', 'authToken');
|
| - sinon.assert.calledWith(signalStrategy.connect, 'server', 'username',
|
| - 'authToken');
|
| -
|
| - assert.equal(
|
| - fakeXhr.url, remoting.DnsBlackholeChecker.URL_TO_REQUEST_,
|
| - 'the correct URL is requested');
|
| - },
|
| - afterEach: function() {
|
| - base.dispose(checker);
|
| - sinon.assert.calledWith(onStateChange,
|
| - remoting.SignalStrategy.State.CLOSED);
|
| -
|
| - onStateChange = null;
|
| - onIncomingStanzaCallback = null;
|
| - checker = null;
|
| - fakeXhr = null;
|
| - }
|
| -});
|
| -
|
| -QUnit.test('success',
|
| - function(assert) {
|
| - function checkState(state) {
|
| - signalStrategy.setStateForTesting(state);
|
| - sinon.assert.calledWith(onStateChange, state);
|
| - assert.equal(checker.getState(), state);
|
| - }
|
| -
|
| - return base.SpyPromise.run(function() {
|
| - fakeXhr.respond(200);
|
| - }).then(function() {
|
| - sinon.assert.notCalled(onStateChange);
|
| - checkState(remoting.SignalStrategy.State.CONNECTING);
|
| - checkState(remoting.SignalStrategy.State.HANDSHAKE);
|
| - checkState(remoting.SignalStrategy.State.CONNECTED);
|
| - });
|
| - });
|
| -
|
| -QUnit.test('http response after connected',
|
| - function(assert) {
|
| - function checkState(state) {
|
| - signalStrategy.setStateForTesting(state);
|
| - sinon.assert.calledWith(onStateChange, state);
|
| - assert.equal(checker.getState(), state);
|
| - }
|
| -
|
| - checkState(remoting.SignalStrategy.State.CONNECTING);
|
| - checkState(remoting.SignalStrategy.State.HANDSHAKE);
|
| - onStateChange.reset();
|
| -
|
| - // Verify that DnsBlackholeChecker stays in HANDSHAKE state even if the
|
| - // signal strategy has connected.
|
| - return base.SpyPromise.run(function() {
|
| - signalStrategy.setStateForTesting(
|
| - remoting.SignalStrategy.State.CONNECTED);
|
| - }).then(function() {
|
| - sinon.assert.notCalled(onStateChange);
|
| - assert.equal(checker.getState(), remoting.SignalStrategy.State.HANDSHAKE);
|
| -
|
| - // Verify that DnsBlackholeChecker goes to CONNECTED state after the
|
| - // the HTTP request has succeeded.
|
| - return base.SpyPromise.run(function() {
|
| - fakeXhr.respond(200);
|
| - });
|
| - }).then(function() {
|
| - sinon.assert.calledWith(onStateChange,
|
| - remoting.SignalStrategy.State.CONNECTED);
|
| - });
|
| - });
|
| -
|
| -QUnit.test('connect failed',
|
| - function(assert) {
|
| - function checkState(state) {
|
| - signalStrategy.setStateForTesting(state);
|
| - sinon.assert.calledWith(onStateChange, state);
|
| - };
|
| -
|
| - return base.SpyPromise.run(function() {
|
| - fakeXhr.respond(200);
|
| - }).then(function() {
|
| - sinon.assert.notCalled(onStateChange);
|
| - checkState(remoting.SignalStrategy.State.CONNECTING);
|
| - checkState(remoting.SignalStrategy.State.FAILED);
|
| - });
|
| - });
|
| -
|
| -QUnit.test('blocked',
|
| - function(assert) {
|
| - function checkState(state) {
|
| - assert.equal(checker.getError().getTag(),
|
| - remoting.Error.Tag.NOT_AUTHORIZED);
|
| - onStateChange.reset();
|
| - signalStrategy.setStateForTesting(state);
|
| - sinon.assert.notCalled(onStateChange);
|
| - assert.equal(checker.getState(),
|
| - checker.getState(),
|
| - remoting.SignalStrategy.State.FAILED,
|
| - 'checker state is still FAILED');
|
| - };
|
| -
|
| - return base.SpyPromise.run(function() {
|
| - fakeXhr.respond(400);
|
| - }).then(function() {
|
| - sinon.assert.calledWith(
|
| - onStateChange, remoting.SignalStrategy.State.FAILED);
|
| - assert.equal(
|
| - checker.getError().getTag(),
|
| - remoting.Error.Tag.NOT_AUTHORIZED,
|
| - 'checker error is NOT_AUTHORIZED');
|
| - checkState(remoting.SignalStrategy.State.CONNECTING);
|
| - checkState(remoting.SignalStrategy.State.HANDSHAKE);
|
| - checkState(remoting.SignalStrategy.State.FAILED);
|
| - });
|
| - });
|
| -
|
| -QUnit.test('blocked after connected',
|
| - function(assert) {
|
| - function checkState(state) {
|
| - signalStrategy.setStateForTesting(state);
|
| - sinon.assert.calledWith(onStateChange, state);
|
| - assert.equal(checker.getState(), state);
|
| - };
|
| -
|
| - checkState(remoting.SignalStrategy.State.CONNECTING);
|
| - checkState(remoting.SignalStrategy.State.HANDSHAKE);
|
| - onStateChange.reset();
|
| -
|
| - // Verify that DnsBlackholeChecker stays in HANDSHAKE state even
|
| - // if the signal strategy has connected.
|
| - return base.SpyPromise.run(function() {
|
| - signalStrategy.setStateForTesting(
|
| - remoting.SignalStrategy.State.CONNECTED);
|
| - }).then(function() {
|
| - sinon.assert.notCalled(onStateChange);
|
| - assert.equal(checker.getState(), remoting.SignalStrategy.State.HANDSHAKE);
|
| -
|
| - // Verify that DnsBlackholeChecker goes to FAILED state after it
|
| - // gets the blocked HTTP response.
|
| - return base.SpyPromise.run(function() {
|
| - fakeXhr.respond(400);
|
| - });
|
| - }).then(function() {
|
| - sinon.assert.calledWith(onStateChange,
|
| - remoting.SignalStrategy.State.FAILED);
|
| - assert.ok(checker.getError().hasTag(remoting.Error.Tag.NOT_AUTHORIZED));
|
| - });
|
| - }
|
| -);
|
| -
|
| -})();
|
|
|