Skip to content

Commit 3b81bc6

Browse files
committed
[refactor] perf(tests): reduce CancellationToken timeout from 1000ms to 50ms in PolicyFactoryTests, perf(tests): reduce CancellationToken timeout from 1000ms to 50ms in PolicyFactoryTests
1 parent b5216ad commit 3b81bc6

2 files changed

Lines changed: 14 additions & 14 deletions

File tree

tests/ByteSync.Client.UnitTests/Services/Misc/Factories/PolicyFactoryTests.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ public async Task BuildFileUploadPolicy_ShouldRetry_On_HttpRequestException_Stat
3333
var policy = _factory.BuildFileUploadPolicy();
3434

3535
using var cts = new CancellationTokenSource();
36-
cts.CancelAfter(1000);
36+
cts.CancelAfter(50);
3737

3838
Func<Task> act = async () =>
3939
{
@@ -62,7 +62,7 @@ public async Task BuildFileUploadPolicy_ShouldRetry_On_ApiException_StatusCodes(
6262
var policy = _factory.BuildFileUploadPolicy();
6363

6464
using var cts = new CancellationTokenSource();
65-
cts.CancelAfter(1000);
65+
cts.CancelAfter(50);
6666

6767
Func<Task> act = async () => { await policy.ExecuteAsync(async _ => { throw new ApiException("api error", status); }, cts.Token); };
6868

tests/ByteSync.Client.UnitTests/TestUtilities/Mine/TestRsa.cs

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ public void Test1_DifferentMessages()
1414
var publicKeys = new List<byte[]>();
1515
var encryptedMessages = new List<byte[]>();
1616

17-
for (int i = 0; i < 100; i++)
17+
for (int i = 0; i < 10; i++)
1818
{
1919
var rsaBob = RSA.Create(); // Alice can encrypt, Bob can decrypt
2020

@@ -41,12 +41,12 @@ public void Test1_DifferentMessages()
4141
decryptedMessage.Should().Be(aliceMessage);
4242
}
4343

44-
publicKeys.Count.Should().Be(100);
45-
encryptedMessages.Count.Should().Be(100);
44+
publicKeys.Count.Should().Be(10);
45+
encryptedMessages.Count.Should().Be(10);
4646

4747
// We verify that the control we were applying works correctly
48-
publicKeys.Any(pk => pk.SequenceEqual(publicKeys[50])).Should().BeTrue();
49-
encryptedMessages.Any(em => em.SequenceEqual(encryptedMessages[50])).Should().BeTrue();
48+
publicKeys.Any(pk => pk.SequenceEqual(publicKeys[5])).Should().BeTrue();
49+
encryptedMessages.Any(em => em.SequenceEqual(encryptedMessages[5])).Should().BeTrue();
5050
}
5151

5252
[Test]
@@ -55,7 +55,7 @@ public void Test1_SameMessages()
5555
var publicKeys = new List<byte[]>();
5656
var encryptedMessages = new List<byte[]>();
5757

58-
for (int i = 0; i < 100; i++)
58+
for (int i = 0; i < 10; i++)
5959
{
6060
var rsaBob = RSA.Create(); // Alice can encrypt, Bob can decrypt
6161

@@ -82,18 +82,18 @@ public void Test1_SameMessages()
8282
decryptedMessage.Should().Be(aliceMessage);
8383
}
8484

85-
publicKeys.Count.Should().Be(100);
86-
encryptedMessages.Count.Should().Be(100);
85+
publicKeys.Count.Should().Be(10);
86+
encryptedMessages.Count.Should().Be(10);
8787

8888
// We verify that the control we were applying works correctly
89-
publicKeys.Any(pk => pk.SequenceEqual(publicKeys[50])).Should().BeTrue();
90-
encryptedMessages.Any(em => em.SequenceEqual(encryptedMessages[50])).Should().BeTrue();
89+
publicKeys.Any(pk => pk.SequenceEqual(publicKeys[5])).Should().BeTrue();
90+
encryptedMessages.Any(em => em.SequenceEqual(encryptedMessages[5])).Should().BeTrue();
9191
}
9292

9393
[Test]
9494
public void Test1_PublicKeyUnicity()
9595
{
96-
for (int i = 0; i < 100; i++)
96+
for (int i = 0; i < 10; i++)
9797
{
9898
var rsaBob = RSA.Create(); // Alice can encrypt, Bob can decrypt
9999

@@ -107,7 +107,7 @@ public void Test1_PublicKeyUnicity()
107107
[Test]
108108
public void Test1_EncryptedMessageNonUnicity()
109109
{
110-
for (int i = 0; i < 100; i++)
110+
for (int i = 0; i < 10; i++)
111111
{
112112
var rsaBob = RSA.Create(); // Alice can encrypt, Bob can decrypt
113113

0 commit comments

Comments
 (0)