зеркало из https://github.com/mozilla/gecko-dev.git
123 строки
4.6 KiB
JavaScript
123 строки
4.6 KiB
JavaScript
/* Any copyright is dedicated to the Public Domain.
|
|
http://creativecommons.org/publicdomain/zero/1.0/ */
|
|
|
|
Cu.import("resource://gre/modules/Log.jsm");
|
|
Cu.import("resource://services-sync/constants.js");
|
|
Cu.import("resource://services-sync/service.js");
|
|
Cu.import("resource://services-sync/util.js");
|
|
Cu.import("resource://testing-common/services/sync/utils.js");
|
|
|
|
function login_handling(handler) {
|
|
return function (request, response) {
|
|
if (basic_auth_matches(request, "johndoe", "ilovejane")) {
|
|
handler(request, response);
|
|
} else {
|
|
let body = "Unauthorized";
|
|
response.setStatusLine(request.httpVersion, 401, "Unauthorized");
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
};
|
|
}
|
|
|
|
function service_unavailable(request, response) {
|
|
let body = "Service Unavailable";
|
|
response.setStatusLine(request.httpVersion, 503, "Service Unavailable");
|
|
response.setHeader("Retry-After", "42");
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
function run_test() {
|
|
let logger = Log.repository.rootLogger;
|
|
Log.repository.rootLogger.addAppender(new Log.DumpAppender());
|
|
|
|
ensureLegacyIdentityManager();
|
|
// This test expects a clean slate -- no saved passphrase.
|
|
Services.logins.removeAllLogins();
|
|
let johnHelper = track_collections_helper();
|
|
let johnU = johnHelper.with_updated_collection;
|
|
let johnColls = johnHelper.collections;
|
|
|
|
do_test_pending();
|
|
|
|
let server;
|
|
function weaveHandler (request, response) {
|
|
response.setStatusLine(request.httpVersion, 200, "OK");
|
|
let body = server.baseURI + "/api/";
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
server = httpd_setup({
|
|
"/api/1.1/johndoe/info/collections": login_handling(johnHelper.handler),
|
|
"/api/1.1/janedoe/info/collections": service_unavailable,
|
|
|
|
"/api/1.1/johndoe/storage/crypto/keys": johnU("crypto", new ServerWBO("keys").handler()),
|
|
"/api/1.1/johndoe/storage/meta/global": johnU("meta", new ServerWBO("global").handler()),
|
|
"/user/1.0/johndoe/node/weave": weaveHandler,
|
|
});
|
|
|
|
try {
|
|
Service.serverURL = server.baseURI;
|
|
|
|
_("Force the initial state.");
|
|
Service.status.service = STATUS_OK;
|
|
do_check_eq(Service.status.service, STATUS_OK);
|
|
|
|
_("Credentials won't check out because we're not configured yet.");
|
|
Service.status.resetSync();
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Service.status.service, CLIENT_NOT_CONFIGURED);
|
|
do_check_eq(Service.status.login, LOGIN_FAILED_NO_USERNAME);
|
|
|
|
_("Try again with username and password set.");
|
|
Service.status.resetSync();
|
|
setBasicCredentials("johndoe", "ilovejane", null);
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Service.status.service, CLIENT_NOT_CONFIGURED);
|
|
do_check_eq(Service.status.login, LOGIN_FAILED_NO_PASSPHRASE);
|
|
|
|
_("verifyLogin() has found out the user's cluster URL, though.");
|
|
do_check_eq(Service.clusterURL, server.baseURI + "/api/");
|
|
|
|
_("Success if passphrase is set.");
|
|
Service.status.resetSync();
|
|
Service.identity.syncKey = "foo";
|
|
do_check_true(Service.verifyLogin());
|
|
do_check_eq(Service.status.service, STATUS_OK);
|
|
do_check_eq(Service.status.login, LOGIN_SUCCEEDED);
|
|
|
|
_("If verifyLogin() encounters a server error, it flips on the backoff flag and notifies observers on a 503 with Retry-After.");
|
|
Service.status.resetSync();
|
|
Service.identity.account = "janedoe";
|
|
Service._updateCachedURLs();
|
|
do_check_false(Service.status.enforceBackoff);
|
|
let backoffInterval;
|
|
Svc.Obs.add("weave:service:backoff:interval", function observe(subject, data) {
|
|
Svc.Obs.remove("weave:service:backoff:interval", observe);
|
|
backoffInterval = subject;
|
|
});
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_true(Service.status.enforceBackoff);
|
|
do_check_eq(backoffInterval, 42);
|
|
do_check_eq(Service.status.service, LOGIN_FAILED);
|
|
do_check_eq(Service.status.login, SERVER_MAINTENANCE);
|
|
|
|
_("Ensure a network error when finding the cluster sets the right Status bits.");
|
|
Service.status.resetSync();
|
|
Service.serverURL = "http://localhost:12345/";
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Service.status.service, LOGIN_FAILED);
|
|
do_check_eq(Service.status.login, LOGIN_FAILED_NETWORK_ERROR);
|
|
|
|
_("Ensure a network error when getting the collection info sets the right Status bits.");
|
|
Service.status.resetSync();
|
|
Service.clusterURL = "http://localhost:12345/";
|
|
do_check_false(Service.verifyLogin());
|
|
do_check_eq(Service.status.service, LOGIN_FAILED);
|
|
do_check_eq(Service.status.login, LOGIN_FAILED_NETWORK_ERROR);
|
|
|
|
} finally {
|
|
Svc.Prefs.resetBranch("");
|
|
server.stop(do_test_finished);
|
|
}
|
|
}
|