2015-04-15 18:37:29 -04:00
|
|
|
require_relative '_lib'
|
|
|
|
require 'json'
|
|
|
|
|
|
|
|
describe RestClient::Request do
|
|
|
|
before(:all) do
|
|
|
|
WebMock.disable!
|
|
|
|
end
|
|
|
|
|
|
|
|
after(:all) do
|
|
|
|
WebMock.enable!
|
|
|
|
end
|
|
|
|
|
2015-06-09 21:00:32 -04:00
|
|
|
def default_httpbin_url
|
|
|
|
# add a hack to work around java/jruby bug
|
|
|
|
# java.lang.RuntimeException: Could not generate DH keypair with backtrace
|
2017-02-18 22:47:19 -05:00
|
|
|
if ['jruby-19mode', 'jruby-9.0.5.0'].include?(ENV['TRAVIS_RUBY_VERSION'])
|
2015-06-09 21:00:32 -04:00
|
|
|
'http://httpbin.org/'
|
|
|
|
else
|
|
|
|
'https://httpbin.org/'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-04-15 18:37:29 -04:00
|
|
|
def httpbin(suffix='')
|
2015-06-09 21:00:32 -04:00
|
|
|
url = ENV.fetch('HTTPBIN_URL', default_httpbin_url)
|
2015-04-15 18:37:29 -04:00
|
|
|
unless url.end_with?('/')
|
|
|
|
url += '/'
|
|
|
|
end
|
|
|
|
|
|
|
|
url + suffix
|
|
|
|
end
|
|
|
|
|
|
|
|
def execute_httpbin(suffix, opts={})
|
|
|
|
opts = {url: httpbin(suffix)}.merge(opts)
|
|
|
|
RestClient::Request.execute(opts)
|
|
|
|
end
|
|
|
|
|
|
|
|
def execute_httpbin_json(suffix, opts={})
|
|
|
|
JSON.parse(execute_httpbin(suffix, opts))
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '.execute' do
|
|
|
|
it 'sends a user agent' do
|
|
|
|
data = execute_httpbin_json('user-agent', method: :get)
|
2016-06-05 19:52:16 -04:00
|
|
|
expect(data['user-agent']).to match(/rest-client/)
|
2015-04-15 18:37:29 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'receives cookies on 302' do
|
|
|
|
expect {
|
|
|
|
execute_httpbin('cookies/set?foo=bar', method: :get, max_redirects: 0)
|
|
|
|
}.to raise_error(RestClient::Found) { |ex|
|
2016-06-05 19:52:16 -04:00
|
|
|
expect(ex.http_code).to eq 302
|
|
|
|
expect(ex.response.cookies['foo']).to eq 'bar'
|
2015-04-15 18:37:29 -04:00
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'passes along cookies through 302' do
|
|
|
|
data = execute_httpbin_json('cookies/set?foo=bar', method: :get)
|
2016-06-05 19:52:16 -04:00
|
|
|
expect(data).to have_key('cookies')
|
|
|
|
expect(data['cookies']['foo']).to eq 'bar'
|
2015-04-15 18:37:29 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'handles quote wrapped cookies' do
|
|
|
|
expect {
|
|
|
|
execute_httpbin('cookies/set?foo=' + CGI.escape('"bar:baz"'),
|
|
|
|
method: :get, max_redirects: 0)
|
|
|
|
}.to raise_error(RestClient::Found) { |ex|
|
2016-06-05 19:52:16 -04:00
|
|
|
expect(ex.http_code).to eq 302
|
|
|
|
expect(ex.response.cookies['foo']).to eq '"bar:baz"'
|
2015-04-15 18:37:29 -04:00
|
|
|
}
|
|
|
|
end
|
2016-06-10 02:15:08 -04:00
|
|
|
|
|
|
|
it 'sends basic auth' do
|
|
|
|
user = 'user'
|
|
|
|
pass = 'pass'
|
|
|
|
|
|
|
|
data = execute_httpbin_json("basic-auth/#{user}/#{pass}", method: :get, user: user, password: pass)
|
|
|
|
expect(data).to eq({'authenticated' => true, 'user' => user})
|
|
|
|
|
|
|
|
expect {
|
|
|
|
execute_httpbin_json("basic-auth/#{user}/#{pass}", method: :get, user: user, password: 'badpass')
|
|
|
|
}.to raise_error(RestClient::Unauthorized) { |ex|
|
|
|
|
expect(ex.http_code).to eq 401
|
|
|
|
}
|
|
|
|
end
|
2015-04-15 18:37:29 -04:00
|
|
|
end
|
|
|
|
end
|