Index: telemetry/telemetry/internal/util/webpagereplay_unittest.py |
diff --git a/telemetry/telemetry/internal/util/webpagereplay_unittest.py b/telemetry/telemetry/internal/util/webpagereplay_unittest.py |
deleted file mode 100644 |
index 518e0d23baff42b69be6b35baf5b56951ba6e8ec..0000000000000000000000000000000000000000 |
--- a/telemetry/telemetry/internal/util/webpagereplay_unittest.py |
+++ /dev/null |
@@ -1,68 +0,0 @@ |
-# Copyright 2012 The Chromium Authors. All rights reserved. |
-# Use of this source code is governed by a BSD-style license that can be |
-# found in the LICENSE file. |
- |
-import sys |
-import unittest |
- |
-from telemetry.internal.util import webpagereplay |
- |
- |
-# pylint: disable=protected-access |
-class CreateCommandTest(unittest.TestCase): |
- def testHasDnsGivesDnsPort(self): |
- expected_cmd_line = [ |
- sys.executable, 'replay.py', '--host=127.0.0.1', |
- '--port=2', '--ssl_port=1', '--dns_port=0', |
- '--use_closest_match', '--log_level=warning', '--extra_arg', 'foo.wpr'] |
- cmd_line = webpagereplay.ReplayServer._GetCommandLine( |
- 'replay.py', '127.0.0.1', 2, 1, 0, ['--extra_arg'], 'foo.wpr') |
- self.assertEqual(expected_cmd_line, cmd_line) |
- |
- def testNoDnsGivesNoDnsForwarding(self): |
- expected_cmd_line = [ |
- sys.executable, 'replay.py', '--host=127.0.0.1', |
- '--port=8080', '--ssl_port=8443', '--no-dns_forwarding', |
- '--use_closest_match', '--log_level=warning', 'bar.wpr'] |
- cmd_line = webpagereplay.ReplayServer._GetCommandLine( |
- 'replay.py', '127.0.0.1', 8080, 8443, None, [], 'bar.wpr') |
- self.assertEqual(expected_cmd_line, cmd_line) |
- |
- |
-# pylint: disable=protected-access |
-class ParseLogFilePortsTest(unittest.TestCase): |
- def testEmptyLinesGivesEmptyDict(self): |
- log_lines = iter([]) |
- self.assertEqual( |
- {}, |
- webpagereplay.ReplayServer._ParseLogFilePorts(log_lines)) |
- |
- def testSingleMatchGivesSingleElementDict(self): |
- log_lines = iter([ |
- 'extra stuff', |
- '2014-09-27 17:04:27,11 WARNING HTTP server started on 127.0.0.1:5167', |
- 'extra stuff', |
- ]) |
- self.assertEqual( |
- {'http': 5167}, |
- webpagereplay.ReplayServer._ParseLogFilePorts(log_lines)) |
- |
- def testUnknownProtocolSkipped(self): |
- log_lines = iter([ |
- '2014-09-27 17:04:27,11 WARNING FOO server started on 127.0.0.1:1111', |
- '2014-09-27 17:04:27,12 WARNING HTTP server started on 127.0.0.1:5167', |
- ]) |
- self.assertEqual( |
- {'http': 5167}, |
- webpagereplay.ReplayServer._ParseLogFilePorts(log_lines)) |
- |
- def testTypicalLogLinesGiveFullDict(self): |
- log_lines = iter([ |
- 'extra', |
- '2014-09-27 17:04:27,11 WARNING DNS server started on 127.0.0.1:2345', |
- '2014-09-27 17:04:27,12 WARNING HTTP server started on 127.0.0.1:3456', |
- '2014-09-27 17:04:27,13 WARNING HTTPS server started on 127.0.0.1:4567', |
- ]) |
- self.assertEqual( |
- {'dns': 2345, 'http': 3456, 'https': 4567}, |
- webpagereplay.ReplayServer._ParseLogFilePorts(log_lines)) |