2023-06-08 19:51:32 +02:00
|
|
|
mod common;
|
2023-07-21 15:35:31 +02:00
|
|
|
|
2023-11-22 16:34:43 +01:00
|
|
|
use chorus::errors::GatewayError;
|
2023-11-19 19:12:29 +01:00
|
|
|
use chorus::gateway::*;
|
2024-01-22 14:56:23 +01:00
|
|
|
use chorus::types::{self, ChannelModifySchema, IntoShared, RoleCreateModifySchema, RoleObject};
|
2023-11-20 14:03:06 +01:00
|
|
|
#[cfg(target_arch = "wasm32")]
|
|
|
|
use wasm_bindgen_test::*;
|
|
|
|
#[cfg(target_arch = "wasm32")]
|
|
|
|
wasm_bindgen_test_configure!(run_in_browser);
|
|
|
|
|
2023-11-22 14:39:32 +01:00
|
|
|
#[cfg_attr(target_arch = "wasm32", wasm_bindgen_test::wasm_bindgen_test)]
|
|
|
|
#[cfg_attr(not(target_arch = "wasm32"), tokio::test)]
|
2023-06-08 19:51:32 +02:00
|
|
|
/// Tests establishing a connection (hello and heartbeats) on the local gateway;
|
|
|
|
async fn test_gateway_establish() {
|
|
|
|
let bundle = common::setup().await;
|
|
|
|
|
2023-11-19 19:12:29 +01:00
|
|
|
let _: GatewayHandle = Gateway::spawn(bundle.urls.wss.clone()).await.unwrap();
|
2023-07-22 14:38:55 +02:00
|
|
|
common::teardown(bundle).await
|
2023-06-08 19:51:32 +02:00
|
|
|
}
|
|
|
|
|
2023-11-22 14:39:32 +01:00
|
|
|
#[cfg_attr(target_arch = "wasm32", wasm_bindgen_test::wasm_bindgen_test)]
|
|
|
|
#[cfg_attr(not(target_arch = "wasm32"), tokio::test)]
|
2023-06-08 19:51:32 +02:00
|
|
|
/// Tests establishing a connection and authenticating
|
|
|
|
async fn test_gateway_authenticate() {
|
|
|
|
let bundle = common::setup().await;
|
|
|
|
|
2023-11-19 19:12:29 +01:00
|
|
|
let gateway: GatewayHandle = Gateway::spawn(bundle.urls.wss.clone()).await.unwrap();
|
2023-06-08 19:51:32 +02:00
|
|
|
|
|
|
|
let mut identify = types::GatewayIdentifyPayload::common();
|
2023-07-22 14:38:55 +02:00
|
|
|
identify.token = bundle.user.token.clone();
|
2023-06-08 19:51:32 +02:00
|
|
|
|
|
|
|
gateway.send_identify(identify).await;
|
2023-07-22 14:38:55 +02:00
|
|
|
common::teardown(bundle).await
|
2023-06-08 19:51:32 +02:00
|
|
|
}
|
2023-07-21 15:35:31 +02:00
|
|
|
|
2023-11-22 14:39:32 +01:00
|
|
|
#[cfg_attr(target_arch = "wasm32", wasm_bindgen_test::wasm_bindgen_test)]
|
|
|
|
#[cfg_attr(not(target_arch = "wasm32"), tokio::test)]
|
2023-07-21 15:35:31 +02:00
|
|
|
async fn test_self_updating_structs() {
|
|
|
|
let mut bundle = common::setup().await;
|
2023-08-16 01:11:32 +02:00
|
|
|
let received_channel = bundle
|
|
|
|
.user
|
|
|
|
.gateway
|
|
|
|
.observe_and_into_inner(bundle.channel.clone())
|
|
|
|
.await;
|
2023-08-15 20:20:58 +02:00
|
|
|
|
2023-08-13 15:52:16 +02:00
|
|
|
assert_eq!(received_channel, bundle.channel.read().unwrap().clone());
|
|
|
|
|
|
|
|
let modify_schema = ChannelModifySchema {
|
|
|
|
name: Some("selfupdating".to_string()),
|
2023-07-21 15:35:31 +02:00
|
|
|
..Default::default()
|
|
|
|
};
|
2023-08-16 01:11:32 +02:00
|
|
|
received_channel
|
2023-08-25 00:02:26 +02:00
|
|
|
.modify(modify_schema, None, &mut bundle.user)
|
2023-08-13 15:52:16 +02:00
|
|
|
.await
|
|
|
|
.unwrap();
|
2023-08-12 22:40:40 +02:00
|
|
|
assert_eq!(
|
2023-08-16 01:11:32 +02:00
|
|
|
bundle
|
|
|
|
.user
|
|
|
|
.gateway
|
|
|
|
.observe_and_into_inner(bundle.channel.clone())
|
|
|
|
.await
|
|
|
|
.name
|
|
|
|
.unwrap(),
|
2023-08-13 15:52:16 +02:00
|
|
|
"selfupdating".to_string()
|
2023-08-12 22:40:40 +02:00
|
|
|
);
|
2023-08-13 15:52:16 +02:00
|
|
|
|
2023-07-22 14:38:55 +02:00
|
|
|
common::teardown(bundle).await
|
2023-07-21 15:35:31 +02:00
|
|
|
}
|
2023-08-16 14:06:04 +02:00
|
|
|
|
2023-11-22 14:39:32 +01:00
|
|
|
#[cfg_attr(target_arch = "wasm32", wasm_bindgen_test::wasm_bindgen_test)]
|
|
|
|
#[cfg_attr(not(target_arch = "wasm32"), tokio::test)]
|
2023-08-16 14:06:04 +02:00
|
|
|
async fn test_recursive_self_updating_structs() {
|
2023-08-16 21:26:19 +02:00
|
|
|
// Setup
|
2023-08-16 22:04:24 +02:00
|
|
|
let mut bundle = common::setup().await;
|
|
|
|
let guild = bundle.guild.clone();
|
|
|
|
// Observe Guild, make sure it has no channels
|
|
|
|
let guild = bundle.user.gateway.observe(guild.clone()).await;
|
|
|
|
let inner_guild = guild.read().unwrap().clone();
|
|
|
|
assert!(inner_guild.roles.is_none());
|
|
|
|
// Create Role
|
|
|
|
let permissions = types::PermissionFlags::CONNECT | types::PermissionFlags::MANAGE_EVENTS;
|
|
|
|
let permissions = Some(permissions.to_string());
|
|
|
|
let mut role_create_schema: types::RoleCreateModifySchema = RoleCreateModifySchema {
|
|
|
|
name: Some("cool person".to_string()),
|
|
|
|
permissions,
|
|
|
|
hoist: Some(true),
|
|
|
|
icon: None,
|
|
|
|
unicode_emoji: Some("".to_string()),
|
|
|
|
mentionable: Some(true),
|
|
|
|
position: None,
|
|
|
|
color: None,
|
|
|
|
};
|
|
|
|
let guild_id = inner_guild.id;
|
|
|
|
let role = RoleObject::create(&mut bundle.user, guild_id, role_create_schema.clone())
|
|
|
|
.await
|
|
|
|
.unwrap();
|
|
|
|
// Watch role;
|
2024-01-22 14:56:23 +01:00
|
|
|
bundle
|
|
|
|
.user
|
|
|
|
.gateway
|
|
|
|
.observe(role.clone().into_shared())
|
|
|
|
.await;
|
2023-08-16 22:04:24 +02:00
|
|
|
// Update Guild and check for Guild
|
|
|
|
let inner_guild = guild.read().unwrap().clone();
|
|
|
|
assert!(inner_guild.roles.is_some());
|
|
|
|
// Update the Role
|
|
|
|
role_create_schema.name = Some("yippieee".to_string());
|
|
|
|
RoleObject::modify(&mut bundle.user, guild_id, role.id, role_create_schema)
|
|
|
|
.await
|
|
|
|
.unwrap();
|
2023-08-17 18:23:57 +02:00
|
|
|
let role_inner = bundle
|
|
|
|
.user
|
|
|
|
.gateway
|
2024-01-22 14:56:23 +01:00
|
|
|
.observe_and_into_inner(role.clone().into_shared())
|
2023-08-17 18:23:57 +02:00
|
|
|
.await;
|
|
|
|
assert_eq!(role_inner.name, "yippieee");
|
2023-08-16 22:04:24 +02:00
|
|
|
// Check if the change propagated
|
2023-08-17 18:23:57 +02:00
|
|
|
let guild = bundle.user.gateway.observe(bundle.guild.clone()).await;
|
|
|
|
let inner_guild = guild.read().unwrap().clone();
|
|
|
|
let guild_roles = inner_guild.roles;
|
2023-08-16 22:04:24 +02:00
|
|
|
let guild_role = guild_roles.unwrap();
|
|
|
|
let guild_role_inner = guild_role.get(0).unwrap().read().unwrap().clone();
|
|
|
|
assert_eq!(guild_role_inner.name, "yippieee".to_string());
|
2023-08-16 14:06:04 +02:00
|
|
|
common::teardown(bundle).await;
|
|
|
|
}
|
2023-11-22 16:34:43 +01:00
|
|
|
|
|
|
|
#[cfg_attr(target_arch = "wasm32", wasm_bindgen_test::wasm_bindgen_test)]
|
|
|
|
#[cfg_attr(not(target_arch = "wasm32"), test)]
|
|
|
|
fn test_error() {
|
|
|
|
let error = GatewayMessage("4000".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::Unknown);
|
|
|
|
let error = GatewayMessage("4001".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::UnknownOpcode);
|
|
|
|
let error = GatewayMessage("4002".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::Decode);
|
|
|
|
let error = GatewayMessage("4003".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::NotAuthenticated);
|
|
|
|
let error = GatewayMessage("4004".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::AuthenticationFailed);
|
|
|
|
let error = GatewayMessage("4005".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::AlreadyAuthenticated);
|
|
|
|
let error = GatewayMessage("4007".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidSequenceNumber);
|
|
|
|
let error = GatewayMessage("4008".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::RateLimited);
|
|
|
|
let error = GatewayMessage("4009".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::SessionTimedOut);
|
|
|
|
let error = GatewayMessage("4010".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidShard);
|
|
|
|
let error = GatewayMessage("4011".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::ShardingRequired);
|
|
|
|
let error = GatewayMessage("4012".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidAPIVersion);
|
|
|
|
let error = GatewayMessage("4013".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidIntents);
|
|
|
|
let error = GatewayMessage("4014".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::DisallowedIntents);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg_attr(target_arch = "wasm32", wasm_bindgen_test::wasm_bindgen_test)]
|
|
|
|
#[cfg_attr(not(target_arch = "wasm32"), test)]
|
|
|
|
fn test_error_message() {
|
|
|
|
let error = GatewayMessage("Unknown Error".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::Unknown);
|
|
|
|
let error = GatewayMessage("Unknown Opcode".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::UnknownOpcode);
|
|
|
|
let error = GatewayMessage("Decode Error".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::Decode);
|
|
|
|
let error = GatewayMessage("Not Authenticated".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::NotAuthenticated);
|
|
|
|
let error = GatewayMessage("Authentication Failed".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::AuthenticationFailed);
|
|
|
|
let error = GatewayMessage("Already Authenticated".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::AlreadyAuthenticated);
|
|
|
|
let error = GatewayMessage("Invalid Seq".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidSequenceNumber);
|
|
|
|
let error = GatewayMessage("Rate Limited".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::RateLimited);
|
|
|
|
let error = GatewayMessage("Session Timed Out".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::SessionTimedOut);
|
|
|
|
let error = GatewayMessage("Invalid Shard".to_string()).error().unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidShard);
|
|
|
|
let error = GatewayMessage("Sharding Required".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::ShardingRequired);
|
|
|
|
let error = GatewayMessage("Invalid API Version".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidAPIVersion);
|
|
|
|
let error = GatewayMessage("Invalid Intent(s)".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidIntents);
|
|
|
|
let error = GatewayMessage("Disallowed Intent(s)".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::DisallowedIntents);
|
|
|
|
// Also test the dot thing
|
|
|
|
let error = GatewayMessage("Invalid Intent(s).".to_string())
|
|
|
|
.error()
|
|
|
|
.unwrap();
|
|
|
|
assert_eq!(error, GatewayError::InvalidIntents);
|
|
|
|
}
|