|
|
25dba45 |
diff --git a/Release/tests/functional/http/client/CMakeLists.txt b/Release/tests/functional/http/client/CMakeLists.txt
|
|
|
4baefae |
index 45f0d9af..0a379c2b 100644
|
|
|
25dba45 |
--- a/Release/tests/functional/http/client/CMakeLists.txt
|
|
|
25dba45 |
+++ b/Release/tests/functional/http/client/CMakeLists.txt
|
|
|
4baefae |
@@ -12,7 +12,6 @@ set(SOURCES
|
|
|
25dba45 |
multiple_requests.cpp
|
|
|
25dba45 |
oauth1_tests.cpp
|
|
|
25dba45 |
oauth2_tests.cpp
|
|
|
25dba45 |
- outside_tests.cpp
|
|
|
25dba45 |
pipeline_stage_tests.cpp
|
|
|
25dba45 |
progress_handler_tests.cpp
|
|
|
25dba45 |
proxy_tests.cpp
|
|
|
25dba45 |
diff --git a/Release/tests/functional/http/client/authentication_tests.cpp b/Release/tests/functional/http/client/authentication_tests.cpp
|
|
|
4baefae |
index c0440fed..afa4a666 100644
|
|
|
25dba45 |
--- a/Release/tests/functional/http/client/authentication_tests.cpp
|
|
|
25dba45 |
+++ b/Release/tests/functional/http/client/authentication_tests.cpp
|
|
|
4baefae |
@@ -675,9 +675,13 @@ SUITE(authentication_tests)
|
|
|
4baefae |
VERIFY_ARE_EQUAL(return_code, response.status_code());
|
|
|
4baefae |
}
|
|
|
25dba45 |
|
|
|
25dba45 |
+/*
|
|
|
4baefae |
TEST(auth_no_data) { auth_test_impl(false); }
|
|
|
25dba45 |
+*/
|
|
|
25dba45 |
|
|
|
25dba45 |
+/*
|
|
|
4baefae |
TEST(unsuccessful_auth_with_basic_cred) { auth_test_impl(true); }
|
|
|
25dba45 |
+*/
|
|
|
25dba45 |
|
|
|
4baefae |
TEST_FIXTURE(uri_address, set_user_options_asio_http)
|
|
|
4baefae |
{
|
|
|
4baefae |
@@ -695,6 +699,7 @@ SUITE(authentication_tests)
|
|
|
4baefae |
VERIFY_ARE_EQUAL(200, response.status_code());
|
|
|
4baefae |
}
|
|
|
25dba45 |
|
|
|
25dba45 |
+/*
|
|
|
4baefae |
TEST_FIXTURE(uri_address, set_user_options_asio_https)
|
|
|
4baefae |
{
|
|
|
4baefae |
handle_timeout([] {
|
|
|
4baefae |
@@ -714,6 +719,7 @@ SUITE(authentication_tests)
|
|
|
4baefae |
VERIFY_IS_FALSE(v.empty());
|
|
|
4baefae |
});
|
|
|
4baefae |
}
|
|
|
25dba45 |
+*/
|
|
|
25dba45 |
|
|
|
25dba45 |
#endif
|
|
|
25dba45 |
|
|
|
2f76c2f |
diff --git a/Release/tests/functional/http/client/client_construction.cpp b/Release/tests/functional/http/client/client_construction.cpp
|
|
|
4baefae |
index 1229b2cf..84d1b636 100644
|
|
|
2f76c2f |
--- a/Release/tests/functional/http/client/client_construction.cpp
|
|
|
2f76c2f |
+++ b/Release/tests/functional/http/client/client_construction.cpp
|
|
|
4baefae |
@@ -40,6 +40,7 @@ SUITE(client_construction)
|
|
|
4baefae |
http_client c3(utility::string_t(U("http://localhost:4567/")));
|
|
|
4baefae |
}
|
|
|
2f76c2f |
|
|
|
2f76c2f |
+/*
|
|
|
4baefae |
// Tests different variations on specifying the URI in http_client constructor.
|
|
|
4baefae |
TEST_FIXTURE(uri_address, different_uris)
|
|
|
4baefae |
{
|
|
|
4baefae |
@@ -54,6 +55,7 @@ SUITE(client_construction)
|
|
|
4baefae |
test_connection(scoped.server(), &client, expected_paths[i]);
|
|
|
4baefae |
}
|
|
|
2f76c2f |
}
|
|
|
2f76c2f |
+*/
|
|
|
2f76c2f |
|
|
|
4baefae |
// Helper function verifies that when constructing an http_client with given
|
|
|
4baefae |
// URI std::invalid_argument is thrown.
|
|
|
25dba45 |
diff --git a/Release/tests/functional/http/client/connections_and_errors.cpp b/Release/tests/functional/http/client/connections_and_errors.cpp
|
|
|
4baefae |
index 22e0fc82..f2a848e5 100644
|
|
|
25dba45 |
--- a/Release/tests/functional/http/client/connections_and_errors.cpp
|
|
|
25dba45 |
+++ b/Release/tests/functional/http/client/connections_and_errors.cpp
|
|
|
4baefae |
@@ -343,6 +343,7 @@ SUITE(connections_and_errors)
|
|
|
4baefae |
response.content_ready().wait();
|
|
|
4baefae |
}
|
|
|
2f76c2f |
|
|
|
2f76c2f |
+/*
|
|
|
4baefae |
TEST_FIXTURE(uri_address, cancel_with_error)
|
|
|
4baefae |
{
|
|
|
4baefae |
http_client c(m_uri);
|
|
|
4baefae |
@@ -358,6 +359,7 @@ SUITE(connections_and_errors)
|
|
|
4baefae |
// All errors after cancellation are ignored.
|
|
|
4baefae |
VERIFY_THROWS_HTTP_ERROR_CODE(responseTask.get(), std::errc::operation_canceled);
|
|
|
4baefae |
}
|
|
|
2f76c2f |
+*/
|
|
|
2f76c2f |
|
|
|
4baefae |
TEST_FIXTURE(uri_address, cancel_while_uploading_data)
|
|
|
4baefae |
{
|
|
|
4baefae |
@@ -416,6 +418,7 @@ SUITE(connections_and_errors)
|
|
|
4baefae |
}
|
|
|
25dba45 |
#endif
|
|
|
25dba45 |
|
|
|
25dba45 |
+/*
|
|
|
4baefae |
// Try to connect to a server on a closed port and cancel the operation.
|
|
|
4baefae |
TEST_FIXTURE(uri_address, cancel_bad_port)
|
|
|
4baefae |
{
|
|
|
4baefae |
@@ -447,6 +450,7 @@ SUITE(connections_and_errors)
|
|
|
25dba45 |
|
|
|
4baefae |
VERIFY_THROWS_HTTP_ERROR_CODE(t.get(), std::errc::operation_canceled);
|
|
|
4baefae |
}
|
|
|
25dba45 |
+*/
|
|
|
25dba45 |
|
|
|
25dba45 |
} // SUITE(connections_and_errors)
|
|
|
25dba45 |
|
|
|
2f76c2f |
diff --git a/Release/tests/functional/http/client/progress_handler_tests.cpp b/Release/tests/functional/http/client/progress_handler_tests.cpp
|
|
|
4baefae |
index 320bcc5c..f52931e0 100644
|
|
|
2f76c2f |
--- a/Release/tests/functional/http/client/progress_handler_tests.cpp
|
|
|
2f76c2f |
+++ b/Release/tests/functional/http/client/progress_handler_tests.cpp
|
|
|
4baefae |
@@ -338,6 +338,7 @@ SUITE(progress_handler_tests)
|
|
|
4baefae |
VERIFY_THROWS(client.request(msg).get().content_ready().get(), std::invalid_argument);
|
|
|
4baefae |
}
|
|
|
2f76c2f |
|
|
|
2f76c2f |
+#if 0
|
|
|
4baefae |
TEST_FIXTURE(uri_address, data_upload_exception)
|
|
|
4baefae |
{
|
|
|
4baefae |
http_client client(m_uri);
|
|
|
4baefae |
@@ -361,6 +362,7 @@ SUITE(progress_handler_tests)
|
|
|
4baefae |
{ /* It is ok if the request does not complete before the server is shutdown */
|
|
|
4baefae |
}
|
|
|
4baefae |
}
|
|
|
2f76c2f |
+#endif
|
|
|
2f76c2f |
|
|
|
4baefae |
TEST_FIXTURE(uri_address, data_download_exception, "Ignore:Windows", "395")
|
|
|
4baefae |
{
|
|
|
2f76c2f |
diff --git a/Release/tests/functional/http/client/to_string_tests.cpp b/Release/tests/functional/http/client/to_string_tests.cpp
|
|
|
4baefae |
index 8ae964f7..9d2466b5 100644
|
|
|
2f76c2f |
--- a/Release/tests/functional/http/client/to_string_tests.cpp
|
|
|
2f76c2f |
+++ b/Release/tests/functional/http/client/to_string_tests.cpp
|
|
|
4baefae |
@@ -68,6 +68,7 @@ SUITE(to_string_tests)
|
|
|
4baefae |
msg.to_string(), mtd, U("/path%20baby/"), U("HTTP/1.1"), expected_headers, body);
|
|
|
4baefae |
}
|
|
|
2f76c2f |
|
|
|
2f76c2f |
+/*
|
|
|
4baefae |
TEST_FIXTURE(uri_address, response_to_string_without_body)
|
|
|
4baefae |
{
|
|
|
4baefae |
test_http_server::scoped_server scoped(m_uri);
|
|
|
4baefae |
@@ -98,6 +99,7 @@ SUITE(to_string_tests)
|
|
|
4baefae |
}
|
|
|
2f76c2f |
#endif
|
|
|
4baefae |
}
|
|
|
2f76c2f |
+*/
|
|
|
2f76c2f |
|
|
|
4baefae |
TEST_FIXTURE(uri_address, response_to_string_with_body)
|
|
|
4baefae |
{
|
|
|
25dba45 |
diff --git a/Release/tests/functional/websockets/client/authentication_tests.cpp b/Release/tests/functional/websockets/client/authentication_tests.cpp
|
|
|
4baefae |
index 29536860..5ed0725a 100644
|
|
|
25dba45 |
--- a/Release/tests/functional/websockets/client/authentication_tests.cpp
|
|
|
25dba45 |
+++ b/Release/tests/functional/websockets/client/authentication_tests.cpp
|
|
|
4baefae |
@@ -93,6 +93,7 @@ SUITE(authentication_tests)
|
|
|
4baefae |
return false;
|
|
|
4baefae |
}
|
|
|
25dba45 |
|
|
|
25dba45 |
+/*
|
|
|
4baefae |
TEST(ssl_test)
|
|
|
4baefae |
{
|
|
|
4baefae |
websocket_client client;
|
|
|
4baefae |
@@ -127,6 +128,7 @@ SUITE(authentication_tests)
|
|
|
4baefae |
throw;
|
|
|
4baefae |
}
|
|
|
25dba45 |
}
|
|
|
25dba45 |
+*/
|
|
|
25dba45 |
|
|
|
25dba45 |
// These tests are specific to our websocketpp based implementation.
|
|
|
25dba45 |
#if !defined(__cplusplus_winrt)
|
|
|
4baefae |
@@ -159,12 +161,14 @@ SUITE(authentication_tests)
|
|
|
4baefae |
}
|
|
|
25dba45 |
}
|
|
|
25dba45 |
|
|
|
25dba45 |
+/*
|
|
|
4baefae |
// Test specifically for server SignalR team hit interesting cases with.
|
|
|
4baefae |
TEST(sni_with_older_server_test)
|
|
|
4baefae |
{
|
|
|
4baefae |
websocket_client client;
|
|
|
4baefae |
sni_test_impl(client);
|
|
|
4baefae |
}
|
|
|
25dba45 |
+*/
|
|
|
25dba45 |
|
|
|
4baefae |
// WinRT doesn't expose option for disabling.
|
|
|
4baefae |
// No stable server is available to reliably test this.
|
|
|
4baefae |
@@ -194,6 +198,7 @@ SUITE(authentication_tests)
|
|
|
4baefae |
}
|
|
|
25dba45 |
}
|
|
|
25dba45 |
|
|
|
25dba45 |
+/*
|
|
|
4baefae |
// Winrt doesn't allow explicitly setting server host for SNI.
|
|
|
4baefae |
TEST(sni_explicit_hostname)
|
|
|
4baefae |
{
|
|
|
4baefae |
@@ -204,6 +209,7 @@ SUITE(authentication_tests)
|
|
|
4baefae |
websocket_client client(config);
|
|
|
4baefae |
sni_test_impl(client);
|
|
|
4baefae |
}
|
|
|
25dba45 |
+*/
|
|
|
25dba45 |
|
|
|
4baefae |
void handshake_error_test_impl(const ::utility::string_t& host)
|
|
|
4baefae |
{
|
|
|
4baefae |
@@ -225,11 +231,17 @@ SUITE(authentication_tests)
|
|
|
4baefae |
}
|
|
|
2f76c2f |
}
|
|
|
2f76c2f |
|
|
|
2f76c2f |
+/*
|
|
|
4baefae |
TEST(self_signed_cert) { handshake_error_test_impl(U("wss://self-signed.badssl.com/")); }
|
|
|
2f76c2f |
+*/
|
|
|
2f76c2f |
|
|
|
2f76c2f |
+/*
|
|
|
4baefae |
TEST(hostname_mismatch) { handshake_error_test_impl(U("wss://wrong.host.badssl.com/")); }
|
|
|
2f76c2f |
+*/
|
|
|
2f76c2f |
|
|
|
2f76c2f |
+/*
|
|
|
4baefae |
TEST(cert_expired) { handshake_error_test_impl(U("wss://expired.badssl.com/")); }
|
|
|
2f76c2f |
+*/
|
|
|
2f76c2f |
|
|
|
2f76c2f |
#endif
|
|
|
2f76c2f |
|