eric-mechanize 0.9.3.20090623142847
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG.rdoc +504 -0
- data/EXAMPLES.rdoc +171 -0
- data/FAQ.rdoc +11 -0
- data/GUIDE.rdoc +122 -0
- data/LICENSE.rdoc +340 -0
- data/Manifest.txt +169 -0
- data/README.rdoc +60 -0
- data/Rakefile +43 -0
- data/examples/flickr_upload.rb +23 -0
- data/examples/mech-dump.rb +7 -0
- data/examples/proxy_req.rb +9 -0
- data/examples/rubyforge.rb +21 -0
- data/examples/spider.rb +11 -0
- data/lib/mechanize.rb +7 -0
- data/lib/www/mechanize.rb +619 -0
- data/lib/www/mechanize/chain.rb +34 -0
- data/lib/www/mechanize/chain/auth_headers.rb +80 -0
- data/lib/www/mechanize/chain/body_decoding_handler.rb +48 -0
- data/lib/www/mechanize/chain/connection_resolver.rb +78 -0
- data/lib/www/mechanize/chain/custom_headers.rb +23 -0
- data/lib/www/mechanize/chain/handler.rb +9 -0
- data/lib/www/mechanize/chain/header_resolver.rb +53 -0
- data/lib/www/mechanize/chain/parameter_resolver.rb +24 -0
- data/lib/www/mechanize/chain/post_connect_hook.rb +0 -0
- data/lib/www/mechanize/chain/pre_connect_hook.rb +22 -0
- data/lib/www/mechanize/chain/request_resolver.rb +32 -0
- data/lib/www/mechanize/chain/response_body_parser.rb +40 -0
- data/lib/www/mechanize/chain/response_header_handler.rb +50 -0
- data/lib/www/mechanize/chain/response_reader.rb +41 -0
- data/lib/www/mechanize/chain/ssl_resolver.rb +42 -0
- data/lib/www/mechanize/chain/uri_resolver.rb +77 -0
- data/lib/www/mechanize/content_type_error.rb +16 -0
- data/lib/www/mechanize/cookie.rb +72 -0
- data/lib/www/mechanize/cookie_jar.rb +191 -0
- data/lib/www/mechanize/file.rb +73 -0
- data/lib/www/mechanize/file_response.rb +62 -0
- data/lib/www/mechanize/file_saver.rb +39 -0
- data/lib/www/mechanize/form.rb +360 -0
- data/lib/www/mechanize/form/button.rb +8 -0
- data/lib/www/mechanize/form/check_box.rb +13 -0
- data/lib/www/mechanize/form/field.rb +28 -0
- data/lib/www/mechanize/form/file_upload.rb +24 -0
- data/lib/www/mechanize/form/image_button.rb +23 -0
- data/lib/www/mechanize/form/multi_select_list.rb +69 -0
- data/lib/www/mechanize/form/option.rb +51 -0
- data/lib/www/mechanize/form/radio_button.rb +38 -0
- data/lib/www/mechanize/form/select_list.rb +45 -0
- data/lib/www/mechanize/headers.rb +12 -0
- data/lib/www/mechanize/history.rb +67 -0
- data/lib/www/mechanize/inspect.rb +90 -0
- data/lib/www/mechanize/monkey_patch.rb +37 -0
- data/lib/www/mechanize/page.rb +181 -0
- data/lib/www/mechanize/page/base.rb +10 -0
- data/lib/www/mechanize/page/frame.rb +22 -0
- data/lib/www/mechanize/page/link.rb +50 -0
- data/lib/www/mechanize/page/meta.rb +51 -0
- data/lib/www/mechanize/pluggable_parsers.rb +103 -0
- data/lib/www/mechanize/redirect_limit_reached_error.rb +18 -0
- data/lib/www/mechanize/redirect_not_get_or_head_error.rb +20 -0
- data/lib/www/mechanize/response_code_error.rb +25 -0
- data/lib/www/mechanize/unsupported_scheme_error.rb +10 -0
- data/lib/www/mechanize/util.rb +76 -0
- data/mechanize.gemspec +41 -0
- data/test/chain/test_argument_validator.rb +14 -0
- data/test/chain/test_auth_headers.rb +25 -0
- data/test/chain/test_custom_headers.rb +18 -0
- data/test/chain/test_header_resolver.rb +28 -0
- data/test/chain/test_parameter_resolver.rb +35 -0
- data/test/chain/test_request_resolver.rb +29 -0
- data/test/chain/test_response_reader.rb +24 -0
- data/test/data/htpasswd +1 -0
- data/test/data/server.crt +16 -0
- data/test/data/server.csr +12 -0
- data/test/data/server.key +15 -0
- data/test/data/server.pem +15 -0
- data/test/helper.rb +129 -0
- data/test/htdocs/alt_text.html +10 -0
- data/test/htdocs/bad_form_test.html +9 -0
- data/test/htdocs/button.jpg +0 -0
- data/test/htdocs/empty_form.html +6 -0
- data/test/htdocs/file_upload.html +26 -0
- data/test/htdocs/find_link.html +41 -0
- data/test/htdocs/form_multi_select.html +16 -0
- data/test/htdocs/form_multival.html +37 -0
- data/test/htdocs/form_no_action.html +18 -0
- data/test/htdocs/form_no_input_name.html +16 -0
- data/test/htdocs/form_select.html +16 -0
- data/test/htdocs/form_select_all.html +16 -0
- data/test/htdocs/form_select_none.html +17 -0
- data/test/htdocs/form_select_noopts.html +10 -0
- data/test/htdocs/form_set_fields.html +14 -0
- data/test/htdocs/form_test.html +188 -0
- data/test/htdocs/frame_test.html +30 -0
- data/test/htdocs/google.html +13 -0
- data/test/htdocs/iframe_test.html +16 -0
- data/test/htdocs/index.html +6 -0
- data/test/htdocs/link with space.html +5 -0
- data/test/htdocs/meta_cookie.html +11 -0
- data/test/htdocs/no_title_test.html +6 -0
- data/test/htdocs/relative/tc_relative_links.html +21 -0
- data/test/htdocs/tc_bad_links.html +5 -0
- data/test/htdocs/tc_base_link.html +8 -0
- data/test/htdocs/tc_blank_form.html +11 -0
- data/test/htdocs/tc_checkboxes.html +19 -0
- data/test/htdocs/tc_encoded_links.html +5 -0
- data/test/htdocs/tc_follow_meta.html +8 -0
- data/test/htdocs/tc_form_action.html +48 -0
- data/test/htdocs/tc_links.html +18 -0
- data/test/htdocs/tc_no_attributes.html +16 -0
- data/test/htdocs/tc_pretty_print.html +17 -0
- data/test/htdocs/tc_radiobuttons.html +17 -0
- data/test/htdocs/tc_referer.html +10 -0
- data/test/htdocs/tc_relative_links.html +19 -0
- data/test/htdocs/tc_textarea.html +23 -0
- data/test/htdocs/unusual______.html +5 -0
- data/test/servlets.rb +365 -0
- data/test/ssl_server.rb +48 -0
- data/test/test_authenticate.rb +71 -0
- data/test/test_bad_links.rb +25 -0
- data/test/test_blank_form.rb +16 -0
- data/test/test_checkboxes.rb +61 -0
- data/test/test_content_type.rb +13 -0
- data/test/test_cookie_class.rb +338 -0
- data/test/test_cookie_jar.rb +362 -0
- data/test/test_cookies.rb +123 -0
- data/test/test_encoded_links.rb +20 -0
- data/test/test_errors.rb +49 -0
- data/test/test_follow_meta.rb +108 -0
- data/test/test_form_action.rb +52 -0
- data/test/test_form_as_hash.rb +61 -0
- data/test/test_form_button.rb +38 -0
- data/test/test_form_no_inputname.rb +15 -0
- data/test/test_forms.rb +564 -0
- data/test/test_frames.rb +25 -0
- data/test/test_get_headers.rb +52 -0
- data/test/test_gzipping.rb +22 -0
- data/test/test_hash_api.rb +45 -0
- data/test/test_history.rb +142 -0
- data/test/test_history_added.rb +16 -0
- data/test/test_html_unscape_forms.rb +39 -0
- data/test/test_if_modified_since.rb +20 -0
- data/test/test_keep_alive.rb +31 -0
- data/test/test_links.rb +120 -0
- data/test/test_mech.rb +268 -0
- data/test/test_mechanize_file.rb +47 -0
- data/test/test_meta.rb +65 -0
- data/test/test_multi_select.rb +106 -0
- data/test/test_no_attributes.rb +13 -0
- data/test/test_option.rb +18 -0
- data/test/test_page.rb +124 -0
- data/test/test_pluggable_parser.rb +145 -0
- data/test/test_post_form.rb +34 -0
- data/test/test_pretty_print.rb +22 -0
- data/test/test_radiobutton.rb +75 -0
- data/test/test_redirect_limit_reached.rb +41 -0
- data/test/test_redirect_verb_handling.rb +45 -0
- data/test/test_referer.rb +39 -0
- data/test/test_relative_links.rb +40 -0
- data/test/test_request.rb +13 -0
- data/test/test_response_code.rb +52 -0
- data/test/test_save_file.rb +48 -0
- data/test/test_scheme.rb +48 -0
- data/test/test_select.rb +106 -0
- data/test/test_select_all.rb +15 -0
- data/test/test_select_none.rb +15 -0
- data/test/test_select_noopts.rb +16 -0
- data/test/test_set_fields.rb +44 -0
- data/test/test_ssl_server.rb +20 -0
- data/test/test_subclass.rb +14 -0
- data/test/test_textarea.rb +45 -0
- data/test/test_upload.rb +109 -0
- data/test/test_verbs.rb +25 -0
- metadata +314 -0
data/test/ssl_server.rb
ADDED
@@ -0,0 +1,48 @@
|
|
1
|
+
require 'webrick'
|
2
|
+
require 'webrick/https'
|
3
|
+
require 'servlets'
|
4
|
+
require 'logger'
|
5
|
+
|
6
|
+
base_dir = FileTest.exists?(Dir::pwd + '/test') ? Dir::pwd + '/test' : Dir::pwd
|
7
|
+
|
8
|
+
s = WEBrick::HTTPServer.new(
|
9
|
+
:Port => 2002,
|
10
|
+
:DocumentRoot => base_dir + "/htdocs",
|
11
|
+
:SSLEnable => true,
|
12
|
+
:SSLVerifyClient => OpenSSL::SSL::VERIFY_NONE,
|
13
|
+
:SSLCertificate => OpenSSL::X509::Certificate.new(
|
14
|
+
File.read("data/server.crt")
|
15
|
+
),
|
16
|
+
:SSLPrivateKey => OpenSSL::PKey::RSA.new(
|
17
|
+
File.read("data/server.pem")
|
18
|
+
),
|
19
|
+
:Logger => Logger.new(nil),
|
20
|
+
:AccessLog => Logger.new(nil)
|
21
|
+
)
|
22
|
+
s.mount("/one_cookie", OneCookieTest)
|
23
|
+
s.mount("/one_cookie_no_space", OneCookieNoSpacesTest)
|
24
|
+
s.mount("/many_cookies", ManyCookiesTest)
|
25
|
+
s.mount("/many_cookies_as_string", ManyCookiesAsStringTest)
|
26
|
+
s.mount("/send_cookies", SendCookiesTest)
|
27
|
+
s.mount("/form_post", FormTest)
|
28
|
+
s.mount("/form post", FormTest)
|
29
|
+
s.mount("/response_code", ResponseCodeTest)
|
30
|
+
s.mount("/file_upload", FileUploadTest)
|
31
|
+
s.mount("/bad_content_type", BadContentTypeTest)
|
32
|
+
s.mount("/content_type_test", ContentTypeTest)
|
33
|
+
|
34
|
+
htpasswd = WEBrick::HTTPAuth::Htpasswd.new(base_dir + '/data/htpasswd')
|
35
|
+
auth = WEBrick::HTTPAuth::BasicAuth.new(
|
36
|
+
:UserDB => htpasswd,
|
37
|
+
:Realm => 'mechanize',
|
38
|
+
:Logger => Logger.new(nil),
|
39
|
+
:AccessLog => Logger.new(nil)
|
40
|
+
)
|
41
|
+
s.mount_proc('/htpasswd_auth') { |req, res|
|
42
|
+
auth.authenticate(req, res)
|
43
|
+
res.body = "You are authenticated"
|
44
|
+
}
|
45
|
+
|
46
|
+
trap("INT") { s.stop }
|
47
|
+
|
48
|
+
s.start
|
@@ -0,0 +1,71 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "helper"))
|
2
|
+
require 'pp'
|
3
|
+
|
4
|
+
class BasicAuthTest < Test::Unit::TestCase
|
5
|
+
def setup
|
6
|
+
@agent = WWW::Mechanize.new
|
7
|
+
end
|
8
|
+
|
9
|
+
def test_auth_success
|
10
|
+
@agent.basic_auth('user', 'pass')
|
11
|
+
page = @agent.get("http://localhost/basic_auth")
|
12
|
+
assert_equal('You are authenticated', page.body)
|
13
|
+
end
|
14
|
+
|
15
|
+
def test_digest_auth_success
|
16
|
+
@agent.basic_auth('user', 'pass')
|
17
|
+
page = @agent.get("http://localhost/digest_auth")
|
18
|
+
assert_equal('You are authenticated', page.body)
|
19
|
+
end
|
20
|
+
|
21
|
+
def test_no_duplicate_headers
|
22
|
+
block_called = false
|
23
|
+
@agent.pre_connect_hooks << lambda { |params|
|
24
|
+
block_called = true
|
25
|
+
params[:request].to_hash.each do |k,v|
|
26
|
+
assert_equal(1, v.length)
|
27
|
+
end
|
28
|
+
}
|
29
|
+
@agent.basic_auth('user', 'pass')
|
30
|
+
page = @agent.get("http://localhost/digest_auth")
|
31
|
+
assert block_called
|
32
|
+
end
|
33
|
+
|
34
|
+
def test_post_auth_success
|
35
|
+
class << @agent
|
36
|
+
alias :old_fetch_page :fetch_page
|
37
|
+
attr_accessor :requests
|
38
|
+
def fetch_page(args)
|
39
|
+
@requests ||= []
|
40
|
+
x = old_fetch_page(args)
|
41
|
+
@requests << args[:verb]
|
42
|
+
x
|
43
|
+
end
|
44
|
+
end
|
45
|
+
@agent.basic_auth('user', 'pass')
|
46
|
+
page = @agent.post("http://localhost/basic_auth")
|
47
|
+
assert_equal('You are authenticated', page.body)
|
48
|
+
assert_equal(2, @agent.requests.length)
|
49
|
+
r1 = @agent.requests[0]
|
50
|
+
r2 = @agent.requests[1]
|
51
|
+
assert_equal(r1, r2)
|
52
|
+
end
|
53
|
+
|
54
|
+
def test_auth_bad_user_pass
|
55
|
+
@agent.basic_auth('aaron', 'aaron')
|
56
|
+
begin
|
57
|
+
page = @agent.get("http://localhost/basic_auth")
|
58
|
+
rescue WWW::Mechanize::ResponseCodeError => e
|
59
|
+
assert_equal("401", e.response_code)
|
60
|
+
end
|
61
|
+
end
|
62
|
+
|
63
|
+
def test_auth_failure
|
64
|
+
begin
|
65
|
+
page = @agent.get("http://localhost/basic_auth")
|
66
|
+
rescue WWW::Mechanize::ResponseCodeError => e
|
67
|
+
assert_equal("401", e.response_code)
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
71
|
+
end
|
@@ -0,0 +1,25 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "helper"))
|
2
|
+
|
3
|
+
class TestBadLinks < Test::Unit::TestCase
|
4
|
+
def setup
|
5
|
+
@agent = WWW::Mechanize.new
|
6
|
+
@page = @agent.get("http://localhost/tc_bad_links.html")
|
7
|
+
end
|
8
|
+
|
9
|
+
def test_space_in_link
|
10
|
+
assert_nothing_raised do
|
11
|
+
@agent.click @page.links.first
|
12
|
+
end
|
13
|
+
assert_match(/alt_text.html$/, @agent.history.last.uri.to_s)
|
14
|
+
assert_equal(2, @agent.history.length)
|
15
|
+
end
|
16
|
+
|
17
|
+
def test_space_in_url
|
18
|
+
page = nil
|
19
|
+
assert_nothing_raised do
|
20
|
+
page = @agent.get("http://localhost/tc_bad_links.html ")
|
21
|
+
end
|
22
|
+
assert_match(/tc_bad_links.html$/, @agent.history.last.uri.to_s)
|
23
|
+
assert_equal(2, @agent.history.length)
|
24
|
+
end
|
25
|
+
end
|
@@ -0,0 +1,16 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "helper"))
|
2
|
+
|
3
|
+
class BlankFormTest < Test::Unit::TestCase
|
4
|
+
def setup
|
5
|
+
@agent = WWW::Mechanize.new
|
6
|
+
end
|
7
|
+
|
8
|
+
def test_blank_form_query_string
|
9
|
+
page = @agent.get('http://localhost/tc_blank_form.html')
|
10
|
+
form = page.forms.first
|
11
|
+
query = form.build_query
|
12
|
+
assert(query.length > 0)
|
13
|
+
assert query.all? { |x| x[1] == '' }
|
14
|
+
end
|
15
|
+
end
|
16
|
+
|
@@ -0,0 +1,61 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "helper"))
|
2
|
+
|
3
|
+
class TestCheckBoxes < Test::Unit::TestCase
|
4
|
+
def setup
|
5
|
+
@agent = WWW::Mechanize.new
|
6
|
+
@page = @agent.get('http://localhost/tc_checkboxes.html')
|
7
|
+
end
|
8
|
+
|
9
|
+
def test_select_one
|
10
|
+
form = @page.forms.first
|
11
|
+
form.checkbox_with(:name => 'green').check
|
12
|
+
assert(form.checkbox_with(:name => 'green').checked)
|
13
|
+
%w{ red blue yellow brown }.each do |color|
|
14
|
+
assert_equal(false, form.checkbox_with(:name => color).checked)
|
15
|
+
end
|
16
|
+
end
|
17
|
+
|
18
|
+
def test_select_all
|
19
|
+
form = @page.forms.first
|
20
|
+
form.checkboxes.each do |b|
|
21
|
+
b.check
|
22
|
+
end
|
23
|
+
form.checkboxes.each do |b|
|
24
|
+
assert_equal(true, b.checked)
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
def test_select_none
|
29
|
+
form = @page.forms.first
|
30
|
+
form.checkboxes.each do |b|
|
31
|
+
b.uncheck
|
32
|
+
end
|
33
|
+
form.checkboxes.each do |b|
|
34
|
+
assert_equal(false, b.checked)
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
def test_check_one
|
39
|
+
form = @page.forms.first
|
40
|
+
assert_equal(2, form.checkboxes_with(:name => 'green').length)
|
41
|
+
form.checkboxes_with(:name => 'green')[1].check
|
42
|
+
assert_equal(false, form.checkboxes_with(:name => 'green')[0].checked)
|
43
|
+
assert_equal(true, form.checkboxes_with(:name => 'green')[1].checked)
|
44
|
+
page = @agent.submit(form)
|
45
|
+
assert_equal(1, page.links.length)
|
46
|
+
assert_equal('green:on', page.links.first.text)
|
47
|
+
end
|
48
|
+
|
49
|
+
def test_check_two
|
50
|
+
form = @page.forms.first
|
51
|
+
assert_equal(2, form.checkboxes_with(:name => 'green').length)
|
52
|
+
form.checkboxes_with(:name => 'green')[0].check
|
53
|
+
form.checkboxes_with(:name => 'green')[1].check
|
54
|
+
assert_equal(true, form.checkboxes_with(:name => 'green')[0].checked)
|
55
|
+
assert_equal(true, form.checkboxes_with(:name => 'green')[1].checked)
|
56
|
+
page = @agent.submit(form)
|
57
|
+
assert_equal(2, page.links.length)
|
58
|
+
assert_equal('green:on', page.links.first.text)
|
59
|
+
assert_equal('green:on', page.links[1].text)
|
60
|
+
end
|
61
|
+
end
|
@@ -0,0 +1,13 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "helper"))
|
2
|
+
|
3
|
+
class TestContentType < Test::Unit::TestCase
|
4
|
+
def setup
|
5
|
+
@agent = WWW::Mechanize.new
|
6
|
+
end
|
7
|
+
|
8
|
+
def test_application_xhtml_xml
|
9
|
+
url = 'http://localhost/content_type_test?ct=application/xhtml%2Bxml'
|
10
|
+
page = @agent.get url
|
11
|
+
assert_equal WWW::Mechanize::Page, page.class, "xhtml docs should return a Page"
|
12
|
+
end
|
13
|
+
end
|
@@ -0,0 +1,338 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "helper"))
|
2
|
+
|
3
|
+
module Enumerable
|
4
|
+
def combine
|
5
|
+
masks = inject([[], 1]){|(ar, m), e| [ar << m, m << 1 ] }[0]
|
6
|
+
all = masks.inject(0){ |al, m| al|m }
|
7
|
+
|
8
|
+
result = []
|
9
|
+
for i in 1..all do
|
10
|
+
tmp = []
|
11
|
+
each_with_index do |e, idx|
|
12
|
+
tmp << e unless (masks[idx] & i) == 0
|
13
|
+
end
|
14
|
+
result << tmp
|
15
|
+
end
|
16
|
+
result
|
17
|
+
end
|
18
|
+
end
|
19
|
+
|
20
|
+
class CookieClassTest < Test::Unit::TestCase
|
21
|
+
def silently
|
22
|
+
warn_level = $VERBOSE
|
23
|
+
$VERBOSE = false
|
24
|
+
res = yield
|
25
|
+
$VERBOSE = warn_level
|
26
|
+
res
|
27
|
+
end
|
28
|
+
|
29
|
+
def test_parse_dates
|
30
|
+
url = URI.parse('http://localhost/')
|
31
|
+
|
32
|
+
yesterday = Time.now - 86400
|
33
|
+
|
34
|
+
dates = [ "14 Apr 89 03:20:12",
|
35
|
+
"14 Apr 89 03:20 GMT",
|
36
|
+
"Fri, 17 Mar 89 4:01:33",
|
37
|
+
"Fri, 17 Mar 89 4:01 GMT",
|
38
|
+
"Mon Jan 16 16:12 PDT 1989",
|
39
|
+
"Mon Jan 16 16:12 +0130 1989",
|
40
|
+
"6 May 1992 16:41-JST (Wednesday)",
|
41
|
+
#"22-AUG-1993 10:59:12.82",
|
42
|
+
"22-AUG-1993 10:59pm",
|
43
|
+
"22-AUG-1993 12:59am",
|
44
|
+
"22-AUG-1993 12:59 PM",
|
45
|
+
#"Friday, August 04, 1995 3:54 PM",
|
46
|
+
#"06/21/95 04:24:34 PM",
|
47
|
+
#"20/06/95 21:07",
|
48
|
+
"95-06-08 19:32:48 EDT",
|
49
|
+
]
|
50
|
+
|
51
|
+
dates.each do |date|
|
52
|
+
cookie = "PREF=1; expires=#{date}"
|
53
|
+
silently do
|
54
|
+
WWW::Mechanize::Cookie.parse(url, cookie) { |c|
|
55
|
+
assert c.expires, "Tried parsing: #{date}"
|
56
|
+
assert_equal(true, c.expires < yesterday)
|
57
|
+
}
|
58
|
+
end
|
59
|
+
end
|
60
|
+
end
|
61
|
+
|
62
|
+
def test_parse_weird_cookie
|
63
|
+
cookie = 'n/a, ASPSESSIONIDCSRRQDQR=FBLDGHPBNDJCPCGNCPAENELB; path=/'
|
64
|
+
url = URI.parse('http://www.searchinnovation.com/')
|
65
|
+
WWW::Mechanize::Cookie.parse(url, cookie) { |c|
|
66
|
+
assert_equal('ASPSESSIONIDCSRRQDQR', c.name)
|
67
|
+
assert_equal('FBLDGHPBNDJCPCGNCPAENELB', c.value)
|
68
|
+
}
|
69
|
+
end
|
70
|
+
|
71
|
+
def test_double_semicolon
|
72
|
+
double_semi = 'WSIDC=WEST;; domain=.williams-sonoma.com; path=/'
|
73
|
+
url = URI.parse('http://williams-sonoma.com/')
|
74
|
+
WWW::Mechanize::Cookie.parse(url, double_semi) { |cookie|
|
75
|
+
assert_equal('WSIDC', cookie.name)
|
76
|
+
assert_equal('WEST', cookie.value)
|
77
|
+
}
|
78
|
+
end
|
79
|
+
|
80
|
+
def test_parse_bad_version
|
81
|
+
bad_cookie = 'PRETANET=TGIAqbFXtt; Name=/PRETANET; Path=/; Version=1.2; Content-type=text/html; Domain=192.168.6.196; expires=Friday, 13-November-2026 23:01:46 GMT;'
|
82
|
+
url = URI.parse('http://localhost/')
|
83
|
+
WWW::Mechanize::Cookie.parse(url, bad_cookie) { |cookie|
|
84
|
+
assert_nil(cookie.version)
|
85
|
+
}
|
86
|
+
end
|
87
|
+
|
88
|
+
def test_parse_bad_max_age
|
89
|
+
bad_cookie = 'PRETANET=TGIAqbFXtt; Name=/PRETANET; Path=/; Max-Age=1.2; Content-type=text/html; Domain=192.168.6.196; expires=Friday, 13-November-2026 23:01:46 GMT;'
|
90
|
+
url = URI.parse('http://localhost/')
|
91
|
+
WWW::Mechanize::Cookie.parse(url, bad_cookie) { |cookie|
|
92
|
+
assert_nil(cookie.max_age)
|
93
|
+
}
|
94
|
+
end
|
95
|
+
|
96
|
+
def test_parse_date_fail
|
97
|
+
url = URI.parse('http://localhost/')
|
98
|
+
|
99
|
+
dates = [
|
100
|
+
"20/06/95 21:07",
|
101
|
+
]
|
102
|
+
|
103
|
+
silently do
|
104
|
+
dates.each do |date|
|
105
|
+
cookie = "PREF=1; expires=#{date}"
|
106
|
+
WWW::Mechanize::Cookie.parse(url, cookie) { |c|
|
107
|
+
assert_equal(true, c.expires.nil?)
|
108
|
+
}
|
109
|
+
end
|
110
|
+
end
|
111
|
+
end
|
112
|
+
|
113
|
+
def test_parse_valid_cookie
|
114
|
+
url = URI.parse('http://rubyforge.org/')
|
115
|
+
cookie_params = {}
|
116
|
+
cookie_params['expires'] = 'expires=Sun, 27-Sep-2037 00:00:00 GMT'
|
117
|
+
cookie_params['path'] = 'path=/'
|
118
|
+
cookie_params['domain'] = 'domain=.rubyforge.org'
|
119
|
+
cookie_params['httponly'] = 'HttpOnly'
|
120
|
+
cookie_value = '12345%7D=ASDFWEE345%3DASda'
|
121
|
+
|
122
|
+
expires = Time.parse('Sun, 27-Sep-2037 00:00:00 GMT')
|
123
|
+
|
124
|
+
cookie_params.keys.combine.each do |c|
|
125
|
+
cookie_text = "#{cookie_value}; "
|
126
|
+
c.each_with_index do |key, idx|
|
127
|
+
if idx == (c.length - 1)
|
128
|
+
cookie_text << "#{cookie_params[key]}"
|
129
|
+
else
|
130
|
+
cookie_text << "#{cookie_params[key]}; "
|
131
|
+
end
|
132
|
+
end
|
133
|
+
cookie = nil
|
134
|
+
WWW::Mechanize::Cookie.parse(url, cookie_text) { |p_cookie| cookie = p_cookie }
|
135
|
+
assert_not_nil(cookie)
|
136
|
+
assert_equal('12345%7D=ASDFWEE345%3DASda', cookie.to_s)
|
137
|
+
assert_equal('/', cookie.path)
|
138
|
+
assert_equal('rubyforge.org', cookie.domain)
|
139
|
+
|
140
|
+
# if expires was set, make sure we parsed it
|
141
|
+
if c.find { |k| k == 'expires' }
|
142
|
+
assert_equal(expires, cookie.expires)
|
143
|
+
else
|
144
|
+
assert_nil(cookie.expires)
|
145
|
+
end
|
146
|
+
end
|
147
|
+
end
|
148
|
+
|
149
|
+
def test_parse_valid_cookie_empty_value
|
150
|
+
url = URI.parse('http://rubyforge.org/')
|
151
|
+
cookie_params = {}
|
152
|
+
cookie_params['expires'] = 'expires=Sun, 27-Sep-2037 00:00:00 GMT'
|
153
|
+
cookie_params['path'] = 'path=/'
|
154
|
+
cookie_params['domain'] = 'domain=.rubyforge.org'
|
155
|
+
cookie_params['httponly'] = 'HttpOnly'
|
156
|
+
cookie_value = '12345%7D='
|
157
|
+
|
158
|
+
expires = Time.parse('Sun, 27-Sep-2037 00:00:00 GMT')
|
159
|
+
|
160
|
+
cookie_params.keys.combine.each do |c|
|
161
|
+
cookie_text = "#{cookie_value}; "
|
162
|
+
c.each_with_index do |key, idx|
|
163
|
+
if idx == (c.length - 1)
|
164
|
+
cookie_text << "#{cookie_params[key]}"
|
165
|
+
else
|
166
|
+
cookie_text << "#{cookie_params[key]}; "
|
167
|
+
end
|
168
|
+
end
|
169
|
+
cookie = nil
|
170
|
+
WWW::Mechanize::Cookie.parse(url, cookie_text) { |p_cookie| cookie = p_cookie }
|
171
|
+
assert_not_nil(cookie)
|
172
|
+
assert_equal('12345%7D=', cookie.to_s)
|
173
|
+
assert_equal('', cookie.value)
|
174
|
+
assert_equal('/', cookie.path)
|
175
|
+
assert_equal('rubyforge.org', cookie.domain)
|
176
|
+
|
177
|
+
# if expires was set, make sure we parsed it
|
178
|
+
if c.find { |k| k == 'expires' }
|
179
|
+
assert_equal(expires, cookie.expires)
|
180
|
+
else
|
181
|
+
assert_nil(cookie.expires)
|
182
|
+
end
|
183
|
+
end
|
184
|
+
end
|
185
|
+
|
186
|
+
# If no path was given, use the one from the URL
|
187
|
+
def test_cookie_using_url_path
|
188
|
+
url = URI.parse('http://rubyforge.org/login.php')
|
189
|
+
cookie_params = {}
|
190
|
+
cookie_params['expires'] = 'expires=Sun, 27-Sep-2037 00:00:00 GMT'
|
191
|
+
cookie_params['path'] = 'path=/'
|
192
|
+
cookie_params['domain'] = 'domain=.rubyforge.org'
|
193
|
+
cookie_params['httponly'] = 'HttpOnly'
|
194
|
+
cookie_value = '12345%7D=ASDFWEE345%3DASda'
|
195
|
+
|
196
|
+
expires = Time.parse('Sun, 27-Sep-2037 00:00:00 GMT')
|
197
|
+
|
198
|
+
cookie_params.keys.combine.each do |c|
|
199
|
+
next if c.find { |k| k == 'path' }
|
200
|
+
cookie_text = "#{cookie_value}; "
|
201
|
+
c.each_with_index do |key, idx|
|
202
|
+
if idx == (c.length - 1)
|
203
|
+
cookie_text << "#{cookie_params[key]}"
|
204
|
+
else
|
205
|
+
cookie_text << "#{cookie_params[key]}; "
|
206
|
+
end
|
207
|
+
end
|
208
|
+
cookie = nil
|
209
|
+
WWW::Mechanize::Cookie.parse(url, cookie_text) { |p_cookie| cookie = p_cookie }
|
210
|
+
assert_not_nil(cookie)
|
211
|
+
assert_equal('12345%7D=ASDFWEE345%3DASda', cookie.to_s)
|
212
|
+
assert_equal('rubyforge.org', cookie.domain)
|
213
|
+
assert_equal('/', cookie.path)
|
214
|
+
|
215
|
+
# if expires was set, make sure we parsed it
|
216
|
+
if c.find { |k| k == 'expires' }
|
217
|
+
assert_equal(expires, cookie.expires)
|
218
|
+
else
|
219
|
+
assert_nil(cookie.expires)
|
220
|
+
end
|
221
|
+
end
|
222
|
+
end
|
223
|
+
|
224
|
+
# Test using secure cookies
|
225
|
+
def test_cookie_with_secure
|
226
|
+
url = URI.parse('http://rubyforge.org/')
|
227
|
+
cookie_params = {}
|
228
|
+
cookie_params['expires'] = 'expires=Sun, 27-Sep-2037 00:00:00 GMT'
|
229
|
+
cookie_params['path'] = 'path=/'
|
230
|
+
cookie_params['domain'] = 'domain=.rubyforge.org'
|
231
|
+
cookie_params['secure'] = 'secure'
|
232
|
+
cookie_value = '12345%7D=ASDFWEE345%3DASda'
|
233
|
+
|
234
|
+
expires = Time.parse('Sun, 27-Sep-2037 00:00:00 GMT')
|
235
|
+
|
236
|
+
cookie_params.keys.combine.each do |c|
|
237
|
+
next unless c.find { |k| k == 'secure' }
|
238
|
+
cookie_text = "#{cookie_value}; "
|
239
|
+
c.each_with_index do |key, idx|
|
240
|
+
if idx == (c.length - 1)
|
241
|
+
cookie_text << "#{cookie_params[key]}"
|
242
|
+
else
|
243
|
+
cookie_text << "#{cookie_params[key]}; "
|
244
|
+
end
|
245
|
+
end
|
246
|
+
cookie = nil
|
247
|
+
WWW::Mechanize::Cookie.parse(url, cookie_text) { |p_cookie| cookie = p_cookie }
|
248
|
+
assert_not_nil(cookie)
|
249
|
+
assert_equal('12345%7D=ASDFWEE345%3DASda', cookie.to_s)
|
250
|
+
assert_equal('rubyforge.org', cookie.domain)
|
251
|
+
assert_equal('/', cookie.path)
|
252
|
+
assert_equal(true, cookie.secure)
|
253
|
+
|
254
|
+
# if expires was set, make sure we parsed it
|
255
|
+
if c.find { |k| k == 'expires' }
|
256
|
+
assert_equal(expires, cookie.expires)
|
257
|
+
else
|
258
|
+
assert_nil(cookie.expires)
|
259
|
+
end
|
260
|
+
end
|
261
|
+
end
|
262
|
+
|
263
|
+
# If no domain was given, we must use the one from the URL
|
264
|
+
def test_cookie_with_url_domain
|
265
|
+
url = URI.parse('http://login.rubyforge.org/')
|
266
|
+
cookie_params = {}
|
267
|
+
cookie_params['expires'] = 'expires=Sun, 27-Sep-2037 00:00:00 GMT'
|
268
|
+
cookie_params['path'] = 'path=/'
|
269
|
+
cookie_params['domain'] = 'domain=.rubyforge.org'
|
270
|
+
cookie_params['httponly'] = 'HttpOnly'
|
271
|
+
cookie_value = '12345%7D=ASDFWEE345%3DASda'
|
272
|
+
|
273
|
+
expires = Time.parse('Sun, 27-Sep-2037 00:00:00 GMT')
|
274
|
+
|
275
|
+
cookie_params.keys.combine.each do |c|
|
276
|
+
next if c.find { |k| k == 'domain' }
|
277
|
+
cookie_text = "#{cookie_value}; "
|
278
|
+
c.each_with_index do |key, idx|
|
279
|
+
if idx == (c.length - 1)
|
280
|
+
cookie_text << "#{cookie_params[key]}"
|
281
|
+
else
|
282
|
+
cookie_text << "#{cookie_params[key]}; "
|
283
|
+
end
|
284
|
+
end
|
285
|
+
cookie = nil
|
286
|
+
WWW::Mechanize::Cookie.parse(url, cookie_text) { |p_cookie| cookie = p_cookie }
|
287
|
+
assert_not_nil(cookie)
|
288
|
+
assert_equal('12345%7D=ASDFWEE345%3DASda', cookie.to_s)
|
289
|
+
assert_equal('/', cookie.path)
|
290
|
+
|
291
|
+
assert_equal('login.rubyforge.org', cookie.domain)
|
292
|
+
|
293
|
+
# if expires was set, make sure we parsed it
|
294
|
+
if c.find { |k| k == 'expires' }
|
295
|
+
assert_equal(expires, cookie.expires)
|
296
|
+
else
|
297
|
+
assert_nil(cookie.expires)
|
298
|
+
end
|
299
|
+
end
|
300
|
+
end
|
301
|
+
|
302
|
+
def test_parse_cookie_no_spaces
|
303
|
+
url = URI.parse('http://rubyforge.org/')
|
304
|
+
cookie_params = {}
|
305
|
+
cookie_params['expires'] = 'expires=Sun, 27-Sep-2037 00:00:00 GMT'
|
306
|
+
cookie_params['path'] = 'path=/'
|
307
|
+
cookie_params['domain'] = 'domain=.rubyforge.org'
|
308
|
+
cookie_params['httponly'] = 'HttpOnly'
|
309
|
+
cookie_value = '12345%7D=ASDFWEE345%3DASda'
|
310
|
+
|
311
|
+
expires = Time.parse('Sun, 27-Sep-2037 00:00:00 GMT')
|
312
|
+
|
313
|
+
cookie_params.keys.combine.each do |c|
|
314
|
+
cookie_text = "#{cookie_value};"
|
315
|
+
c.each_with_index do |key, idx|
|
316
|
+
if idx == (c.length - 1)
|
317
|
+
cookie_text << "#{cookie_params[key]}"
|
318
|
+
else
|
319
|
+
cookie_text << "#{cookie_params[key]};"
|
320
|
+
end
|
321
|
+
end
|
322
|
+
cookie = nil
|
323
|
+
WWW::Mechanize::Cookie.parse(url, cookie_text) { |p_cookie| cookie = p_cookie }
|
324
|
+
assert_not_nil(cookie)
|
325
|
+
assert_equal('12345%7D=ASDFWEE345%3DASda', cookie.to_s)
|
326
|
+
assert_equal('/', cookie.path)
|
327
|
+
assert_equal('rubyforge.org', cookie.domain)
|
328
|
+
|
329
|
+
# if expires was set, make sure we parsed it
|
330
|
+
if c.find { |k| k == 'expires' }
|
331
|
+
assert_equal(expires, cookie.expires)
|
332
|
+
else
|
333
|
+
assert_nil(cookie.expires)
|
334
|
+
end
|
335
|
+
end
|
336
|
+
end
|
337
|
+
end
|
338
|
+
|