Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(10)

Unified Diff: third_party/grpc/src/ruby/spec/server_spec.rb

Issue 1932353002: Initial checkin of gRPC to third_party/ Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/grpc/src/ruby/spec/server_spec.rb
diff --git a/third_party/grpc/src/ruby/spec/server_spec.rb b/third_party/grpc/src/ruby/spec/server_spec.rb
new file mode 100644
index 0000000000000000000000000000000000000000..439b19fb8dbc1f0d189ab41ad35a1a8a7604f244
--- /dev/null
+++ b/third_party/grpc/src/ruby/spec/server_spec.rb
@@ -0,0 +1,209 @@
+# Copyright 2015, Google Inc.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions are
+# met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above
+# copyright notice, this list of conditions and the following disclaimer
+# in the documentation and/or other materials provided with the
+# distribution.
+# * Neither the name of Google Inc. nor the names of its
+# contributors may be used to endorse or promote products derived from
+# this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+require 'grpc'
+
+def load_test_certs
+ test_root = File.join(File.dirname(__FILE__), 'testdata')
+ files = ['ca.pem', 'server1.key', 'server1.pem']
+ contents = files.map { |f| File.open(File.join(test_root, f)).read }
+ [contents[0], [{ private_key: contents[1], cert_chain: contents[2] }], false]
+end
+
+Server = GRPC::Core::Server
+
+describe Server do
+ def create_test_cert
+ GRPC::Core::ServerCredentials.new(*load_test_certs)
+ end
+
+ before(:each) do
+ @cq = GRPC::Core::CompletionQueue.new
+ end
+
+ describe '#start' do
+ it 'runs without failing' do
+ blk = proc { Server.new(@cq, nil).start }
+ expect(&blk).to_not raise_error
+ end
+
+ it 'fails if the server is closed' do
+ s = Server.new(@cq, nil)
+ s.close(@cq)
+ expect { s.start }.to raise_error(RuntimeError)
+ end
+ end
+
+ describe '#destroy' do
+ it 'destroys a server ok' do
+ s = start_a_server
+ blk = proc { s.destroy(@cq) }
+ expect(&blk).to_not raise_error
+ end
+
+ it 'can be called more than once without error' do
+ s = start_a_server
+ begin
+ blk = proc { s.destroy(@cq) }
+ expect(&blk).to_not raise_error
+ blk.call
+ expect(&blk).to_not raise_error
+ ensure
+ s.close(@cq)
+ end
+ end
+ end
+
+ describe '#close' do
+ it 'closes a server ok' do
+ s = start_a_server
+ begin
+ blk = proc { s.close(@cq) }
+ expect(&blk).to_not raise_error
+ ensure
+ s.close(@cq)
+ end
+ end
+
+ it 'can be called more than once without error' do
+ s = start_a_server
+ blk = proc { s.close(@cq) }
+ expect(&blk).to_not raise_error
+ blk.call
+ expect(&blk).to_not raise_error
+ end
+ end
+
+ describe '#add_http_port' do
+ describe 'for insecure servers' do
+ it 'runs without failing' do
+ blk = proc do
+ s = Server.new(@cq, nil)
+ s.add_http2_port('localhost:0', :this_port_is_insecure)
+ s.close(@cq)
+ end
+ expect(&blk).to_not raise_error
+ end
+
+ it 'fails if the server is closed' do
+ s = Server.new(@cq, nil)
+ s.close(@cq)
+ blk = proc do
+ s.add_http2_port('localhost:0', :this_port_is_insecure)
+ end
+ expect(&blk).to raise_error(RuntimeError)
+ end
+ end
+
+ describe 'for secure servers' do
+ let(:cert) { create_test_cert }
+ it 'runs without failing' do
+ blk = proc do
+ s = Server.new(@cq, nil)
+ s.add_http2_port('localhost:0', cert)
+ s.close(@cq)
+ end
+ expect(&blk).to_not raise_error
+ end
+
+ it 'fails if the server is closed' do
+ s = Server.new(@cq, nil)
+ s.close(@cq)
+ blk = proc { s.add_http2_port('localhost:0', cert) }
+ expect(&blk).to raise_error(RuntimeError)
+ end
+ end
+ end
+
+ shared_examples '#new' do
+ it 'takes a completion queue with nil channel args' do
+ expect { Server.new(@cq, nil) }.to_not raise_error
+ end
+
+ it 'does not take a hash with bad keys as channel args' do
+ blk = construct_with_args(Object.new => 1)
+ expect(&blk).to raise_error TypeError
+ blk = construct_with_args(1 => 1)
+ expect(&blk).to raise_error TypeError
+ end
+
+ it 'does not take a hash with bad values as channel args' do
+ blk = construct_with_args(symbol: Object.new)
+ expect(&blk).to raise_error TypeError
+ blk = construct_with_args('1' => {})
+ expect(&blk).to raise_error TypeError
+ end
+
+ it 'can take a hash with a symbol key as channel args' do
+ blk = construct_with_args(a_symbol: 1)
+ expect(&blk).to_not raise_error
+ end
+
+ it 'can take a hash with a string key as channel args' do
+ blk = construct_with_args('a_symbol' => 1)
+ expect(&blk).to_not raise_error
+ end
+
+ it 'can take a hash with a string value as channel args' do
+ blk = construct_with_args(a_symbol: '1')
+ expect(&blk).to_not raise_error
+ end
+
+ it 'can take a hash with a symbol value as channel args' do
+ blk = construct_with_args(a_symbol: :another_symbol)
+ expect(&blk).to_not raise_error
+ end
+
+ it 'can take a hash with a numeric value as channel args' do
+ blk = construct_with_args(a_symbol: 1)
+ expect(&blk).to_not raise_error
+ end
+
+ it 'can take a hash with many args as channel args' do
+ args = Hash[127.times.collect { |x| [x.to_s, x] }]
+ blk = construct_with_args(args)
+ expect(&blk).to_not raise_error
+ end
+ end
+
+ describe '#new with an insecure channel' do
+ def construct_with_args(a)
+ proc { Server.new(@cq, a) }
+ end
+
+ it_behaves_like '#new'
+ end
+
+ def start_a_server
+ s = Server.new(@cq, nil)
+ s.add_http2_port('0.0.0.0:0', :this_port_is_insecure)
+ s.start
+ s
+ end
+end
« no previous file with comments | « third_party/grpc/src/ruby/spec/server_credentials_spec.rb ('k') | third_party/grpc/src/ruby/spec/spec_helper.rb » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698