garb-authsub 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/README.md +250 -0
- data/Rakefile +56 -0
- data/lib/garb.rb +38 -0
- data/lib/garb/account.rb +29 -0
- data/lib/garb/authentication_request.rb +53 -0
- data/lib/garb/data_request.rb +51 -0
- data/lib/garb/filter_parameters.rb +37 -0
- data/lib/garb/profile.rb +57 -0
- data/lib/garb/profile_reports.rb +15 -0
- data/lib/garb/report.rb +26 -0
- data/lib/garb/report_parameter.rb +25 -0
- data/lib/garb/report_response.rb +62 -0
- data/lib/garb/reports.rb +5 -0
- data/lib/garb/reports/bounces.rb +5 -0
- data/lib/garb/reports/exits.rb +5 -0
- data/lib/garb/reports/pageviews.rb +5 -0
- data/lib/garb/reports/unique_pageviews.rb +5 -0
- data/lib/garb/reports/visits.rb +5 -0
- data/lib/garb/resource.rb +92 -0
- data/lib/garb/session.rb +29 -0
- data/lib/garb/version.rb +13 -0
- data/lib/support.rb +39 -0
- data/test/fixtures/cacert.pem +67 -0
- data/test/fixtures/profile_feed.xml +40 -0
- data/test/fixtures/report_feed.xml +46 -0
- data/test/test_helper.rb +18 -0
- data/test/unit/garb/account_test.rb +53 -0
- data/test/unit/garb/authentication_request_test.rb +121 -0
- data/test/unit/garb/data_request_test.rb +106 -0
- data/test/unit/garb/filter_parameters_test.rb +57 -0
- data/test/unit/garb/oauth_session_test.rb +11 -0
- data/test/unit/garb/profile_reports_test.rb +29 -0
- data/test/unit/garb/profile_test.rb +87 -0
- data/test/unit/garb/report_parameter_test.rb +43 -0
- data/test/unit/garb/report_response_test.rb +29 -0
- data/test/unit/garb/report_test.rb +91 -0
- data/test/unit/garb/resource_test.rb +38 -0
- data/test/unit/garb/session_test.rb +84 -0
- data/test/unit/garb_test.rb +14 -0
- data/test/unit/symbol_operator_test.rb +37 -0
- metadata +131 -0
@@ -0,0 +1,67 @@
|
|
1
|
+
##
|
2
|
+
## cacert.pem-foo -- Bundle of CA Root Certificates
|
3
|
+
##
|
4
|
+
## Converted at: Thu Mar 26 21:23:06 2009 UTC
|
5
|
+
##
|
6
|
+
## This is a bundle of X.509 certificates of public Certificate Authorities
|
7
|
+
## (CA). These were automatically extracted from Mozilla's root certificates
|
8
|
+
## file (certdata.txt). This file can be found in the mozilla source tree:
|
9
|
+
## '/mozilla/security/nss/lib/ckfw/builtins/certdata.txt'
|
10
|
+
##
|
11
|
+
## It contains the certificates in PEM format and therefore
|
12
|
+
## can be directly used with curl / libcurl / php_curl, or with
|
13
|
+
## an Apache+mod_ssl webserver for SSL client authentication.
|
14
|
+
## Just configure this file as the SSLCACertificateFile.
|
15
|
+
##
|
16
|
+
|
17
|
+
# ***** BEGIN LICENSE BLOCK *****
|
18
|
+
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
19
|
+
#
|
20
|
+
# The contents of this file are subject to the Mozilla Public License Version
|
21
|
+
# 1.1 (the "License"); you may not use this file except in compliance with
|
22
|
+
# the License. You may obtain a copy of the License at
|
23
|
+
# http://www.mozilla.org/MPL/
|
24
|
+
#
|
25
|
+
# Software distributed under the License is distributed on an "AS IS" basis,
|
26
|
+
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
27
|
+
# for the specific language governing rights and limitations under the
|
28
|
+
# License.
|
29
|
+
#
|
30
|
+
# The Original Code is the Netscape security libraries.
|
31
|
+
#
|
32
|
+
# The Initial Developer of the Original Code is
|
33
|
+
# Netscape Communications Corporation.
|
34
|
+
# Portions created by the Initial Developer are Copyright (C) 1994-2000
|
35
|
+
# the Initial Developer. All Rights Reserved.
|
36
|
+
#
|
37
|
+
# Contributor(s):
|
38
|
+
#
|
39
|
+
# Alternatively, the contents of this file may be used under the terms of
|
40
|
+
# either the GNU General Public License Version 2 or later (the "GPL"), or
|
41
|
+
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
42
|
+
# in which case the provisions of the GPL or the LGPL are applicable instead
|
43
|
+
# of those above. If you wish to allow use of your version of this file only
|
44
|
+
# under the terms of either the GPL or the LGPL, and not to allow others to
|
45
|
+
# use your version of this file under the terms of the MPL, indicate your
|
46
|
+
# decision by deleting the provisions above and replace them with the notice
|
47
|
+
# and other provisions required by the GPL or the LGPL. If you do not delete
|
48
|
+
# the provisions above, a recipient may use your version of this file under
|
49
|
+
# the terms of any one of the MPL, the GPL or the LGPL.
|
50
|
+
#
|
51
|
+
# ***** END LICENSE BLOCK *****
|
52
|
+
# @(#) $RCSfile: certdata.txt,v $ $Revision: 1.51 $ $Date: 2009/01/15 22:35:15 $
|
53
|
+
|
54
|
+
Verisign/RSA Secure Server CA
|
55
|
+
=============================
|
56
|
+
-----BEGIN CERTIFICATE-----
|
57
|
+
MIICNDCCAaECEAKtZn5ORf5eV288mBle3cAwDQYJKoZIhvcNAQECBQAwXzELMAkGA1UEBhMCVVMx
|
58
|
+
IDAeBgNVBAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYDVQQLEyVTZWN1cmUgU2VydmVy
|
59
|
+
IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk0MTEwOTAwMDAwMFoXDTEwMDEwNzIzNTk1OVow
|
60
|
+
XzELMAkGA1UEBhMCVVMxIDAeBgNVBAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYDVQQL
|
61
|
+
EyVTZWN1cmUgU2VydmVyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIGbMA0GCSqGSIb3DQEBAQUA
|
62
|
+
A4GJADCBhQJ+AJLOesGugz5aqomDV6wlAXYMra6OLDfO6zV4ZFQD5YRAUcm/jwjiioII0haGN1Xp
|
63
|
+
sSECrXZogZoFokvJSyVmIlZsiAeP94FZbYQHZXATcXY+m3dM41CJVphIuR2nKRoTLkoRWZweFdVJ
|
64
|
+
VCxzOmmCsZc5nG1wZ0jl3S3WyB57AgMBAAEwDQYJKoZIhvcNAQECBQADfgBl3X7hsuyw4jrg7HFG
|
65
|
+
mhkRuNPHoLQDQCYCPgmc4RKz0Vr2N6W3YQO2WxZpO8ZECAyIUwxrl0nHPjXcbLm7qt9cuzovk2C2
|
66
|
+
qUtN8iD3zV9/ZHuO3ABc1/p3yjkWWW8O6tO1g39NTUJWdrTJXwT4OPjr0l91X817/OWOgHz8UA==
|
67
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,40 @@
|
|
1
|
+
<?xml version='1.0' encoding='UTF-8'?>
|
2
|
+
<feed xmlns='http://www.w3.org/2005/Atom' xmlns:dxp='http://schemas.google.com/analytics/2009' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/'>
|
3
|
+
<id>http://www.google.com/analytics/feeds/accounts/tpitale@gmail.com</id>
|
4
|
+
<updated>2009-10-02T07:47:35.000-07:00</updated>
|
5
|
+
<title type='text'>Profile list for tpitale@gmail.com</title><link rel='self' type='application/atom+xml' href='http://www.google.com/analytics/feeds/accounts/default'/>
|
6
|
+
<author>
|
7
|
+
<name>Google Analytics</name>
|
8
|
+
</author>
|
9
|
+
<generator version='1.0'>Google Analytics</generator>
|
10
|
+
<openSearch:totalResults>2</openSearch:totalResults>
|
11
|
+
<openSearch:startIndex>1</openSearch:startIndex>
|
12
|
+
<openSearch:itemsPerPage>2</openSearch:itemsPerPage>
|
13
|
+
<entry>
|
14
|
+
<id>http://www.google.com/analytics/feeds/accounts/ga:12345</id>
|
15
|
+
<updated>2008-07-21T14:05:57.000-07:00</updated>
|
16
|
+
<title type='text'>Historical</title>
|
17
|
+
<link rel='alternate' type='text/html' href='http://www.google.com/analytics'/>
|
18
|
+
<dxp:property name='ga:accountId' value='1111'/>
|
19
|
+
<dxp:property name='ga:accountName' value='Blog Beta'/>
|
20
|
+
<dxp:property name='ga:profileId' value='1212'/>
|
21
|
+
<dxp:property name='ga:webPropertyId' value='UA-1111-1'/>
|
22
|
+
<dxp:property name='ga:currency' value='USD'/>
|
23
|
+
<dxp:property name='ga:timezone' value='America/New_York'/>
|
24
|
+
<dxp:tableId>ga:12345</dxp:tableId>
|
25
|
+
</entry>
|
26
|
+
<entry>
|
27
|
+
<id>http://www.google.com/analytics/feeds/accounts/ga:12346</id>
|
28
|
+
<updated>2008-11-24T11:51:07.000-08:00</updated>
|
29
|
+
<title type='text'>Presently</title>
|
30
|
+
<link rel='alternate' type='text/html' href='http://www.google.com/analytics'/>
|
31
|
+
<dxp:property name='ga:accountId' value='1111'/>
|
32
|
+
<dxp:property name='ga:accountName' value='Blog Beta'/>
|
33
|
+
<dxp:property name='ga:profileId' value='1213'/>
|
34
|
+
<dxp:property name='ga:webPropertyId' value='UA-1111-2'/>
|
35
|
+
<dxp:property name='ga:currency' value='USD'/>
|
36
|
+
<dxp:property name='ga:timezone' value='America/New_York'/>
|
37
|
+
<dxp:tableId>ga:12346</dxp:tableId>
|
38
|
+
</entry>
|
39
|
+
</feed>
|
40
|
+
|
@@ -0,0 +1,46 @@
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<feed xmlns='http://www.w3.org/2005/Atom'
|
3
|
+
xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/'
|
4
|
+
xmlns:dxp='http://schemas.google.com/analytics/2009'
|
5
|
+
xmlns:ga='http://schemas.google.com/analytics/2008'>
|
6
|
+
<id>http://www.google.com/analytics/feeds/data?ids=ga:983247&dimensions=ga:country,ga:city&metrics=ga:pageViews&start-date=2008-01-01&end-date=2008-01-02</id>
|
7
|
+
<updated>2008-01-02T15:59:59.999-08:00 </updated>
|
8
|
+
<title type="text">Google Analytics Data for Profile 983247</title>
|
9
|
+
<link href="http://www.google.com/analytics/feeds/data" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/>
|
10
|
+
<link href="http://www.google.com/analytics/feeds/data?end-date=2008-01-02&start-date=2008-01-01&metrics=ga%3ApageViews&ids=ga%3A983247&dimensions=ga%3Acountry%2Cga%3Acity" rel="self" type="application/atom+xml"/>
|
11
|
+
<link href="http://www.google.com/analytics/feeds/data?start-index=1001&max-results=1000&end-date=2008-01-02&start-date=2008-01-01&metrics=ga%3ApageViews&ids=ga%3A983247&dimensions=ga%3Acountry%2Cga%3Acity" rel="next" type="application/atom+xml"/>
|
12
|
+
<author>
|
13
|
+
<name>Google Analytics</name>
|
14
|
+
</author>
|
15
|
+
<openSearch:startIndex>3</openSearch:startIndex>
|
16
|
+
<openSearch:itemsPerPage>4</openSearch:itemsPerPage>
|
17
|
+
<ga:webPropertyID>UA-983247-67</ga:webPropertyID>
|
18
|
+
<ga:start-date>2008-01-01</ga:start-date>
|
19
|
+
<ga:end-date>2008-01-02</ga:end-date>
|
20
|
+
|
21
|
+
<entry>
|
22
|
+
<id> http://www.google.com/analytics/feeds/data?ids=ga:1174&ga:country=%28not%20set%29&ga:city=%28not%20set%29&start-date=2008-01-01&end-date=2008-01-02 </id>
|
23
|
+
<updated> 2008-01-01T16:00:00.001-08:00 </updated>
|
24
|
+
<title type="text"> ga:country=(not set) | ga:city=(not set) </title>
|
25
|
+
<link href="http://www.google.com/analytics/feeds/data" rel="self" type="application/atom+xml"/>
|
26
|
+
<dxp:dimension name="ga:country" value="(not set)" />
|
27
|
+
<dxp:dimension name="ga:city" value="(not set)" />
|
28
|
+
<dxp:metric name="ga:pageviews" value="33" />
|
29
|
+
</entry>
|
30
|
+
<entry>
|
31
|
+
<id> http://www.google.com/analytics/feeds/data?ids=ga:1174&ga:country=Afghanistan&ga:city=Kabul&start-date=2008-01-01&end-date=2008-01-02 </id>
|
32
|
+
<updated> 2008-01-01T16:00:00.001-08:00 </updated>
|
33
|
+
<title type="text"> ga:country=Afghanistan | ga:city=Kabul </title>
|
34
|
+
<dxp:dimension name="ga:country" value="Afghanistan" />
|
35
|
+
<dxp:dimension name="ga:city" value="Kabul" />
|
36
|
+
<dxp:metric name="ga:pageviews" value="2" />
|
37
|
+
</entry>
|
38
|
+
<entry>
|
39
|
+
<id> http://www.google.com/analytics/feeds/data?ids=ga:1174&ga:country=Albania&ga:city=Tirana&start-date=2008-01-01&end-date=2008-01-02 </id>
|
40
|
+
<updated> 2008-01-01T16:00:00.001-08:00 </updated>
|
41
|
+
<title type="text"> ga:country=Albania | ga:city=Tirana </title>
|
42
|
+
<dxp:dimension name="ga:country" value="Albania" />
|
43
|
+
<dxp:dimension name="ga:city" value="Tirana" />
|
44
|
+
<dxp:metric name="ga:pageviews" value="1" />
|
45
|
+
</entry>
|
46
|
+
</feed>
|
data/test/test_helper.rb
ADDED
@@ -0,0 +1,18 @@
|
|
1
|
+
$:.reject! { |e| e.include? 'TextMate' }
|
2
|
+
|
3
|
+
require 'rubygems'
|
4
|
+
require 'minitest/unit'
|
5
|
+
require 'shoulda'
|
6
|
+
require 'mocha'
|
7
|
+
|
8
|
+
require File.dirname(__FILE__) + '/../lib/garb'
|
9
|
+
|
10
|
+
class MiniTest::Unit::TestCase
|
11
|
+
|
12
|
+
def read_fixture(filename)
|
13
|
+
File.read(File.dirname(__FILE__) + "/fixtures/#{filename}")
|
14
|
+
end
|
15
|
+
|
16
|
+
end
|
17
|
+
|
18
|
+
MiniTest::Unit.autorun
|
@@ -0,0 +1,53 @@
|
|
1
|
+
require File.join(File.dirname(__FILE__), '..', '..', '/test_helper')
|
2
|
+
|
3
|
+
module Garb
|
4
|
+
class AccountTest < MiniTest::Unit::TestCase
|
5
|
+
context "The Account class" do
|
6
|
+
should "have an array of accounts with all profiles" do
|
7
|
+
p1 = stub(:account_id => '1111', :account_name => 'Blog 1')
|
8
|
+
p2 = stub(:account_id => '1112', :account_name => 'Blog 2')
|
9
|
+
|
10
|
+
Profile.stubs(:all).returns([p1,p2,p1,p2])
|
11
|
+
Account.stubs(:new).returns('account1', 'account2')
|
12
|
+
|
13
|
+
assert_equal ['account1','account2'], Account.all
|
14
|
+
assert_received(Profile, :all)
|
15
|
+
assert_received(Account, :new) {|e| e.with([p1,p1])}
|
16
|
+
assert_received(Account, :new) {|e| e.with([p2,p2])}
|
17
|
+
end
|
18
|
+
end
|
19
|
+
|
20
|
+
context "An instance of the Account class" do
|
21
|
+
setup do
|
22
|
+
profile = stub(:account_id => '1111', :account_name => 'Blog 1')
|
23
|
+
@profiles = [profile,profile]
|
24
|
+
@account = Account.new(@profiles)
|
25
|
+
end
|
26
|
+
|
27
|
+
context "all" do
|
28
|
+
should "use an optional user session" do
|
29
|
+
session = Session.new
|
30
|
+
Garb::Profile.expects(:all).with(session).returns(@profiles)
|
31
|
+
|
32
|
+
accounts = Account.all(session)
|
33
|
+
assert_equal 1, accounts.size
|
34
|
+
assert_equal @profiles, accounts.first.profiles
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
context "when creating a new account from an array of profiles" do
|
39
|
+
should "take the account id from the first profile" do
|
40
|
+
assert_equal @profiles.first.account_id, @account.id
|
41
|
+
end
|
42
|
+
|
43
|
+
should "take the account name from the first profile" do
|
44
|
+
assert_equal @profiles.first.account_name, @account.name
|
45
|
+
end
|
46
|
+
|
47
|
+
should "store the array of profiles" do
|
48
|
+
assert_equal @profiles, @account.profiles
|
49
|
+
end
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
@@ -0,0 +1,121 @@
|
|
1
|
+
require File.join(File.dirname(__FILE__), '..', '..', '/test_helper')
|
2
|
+
|
3
|
+
CA_CERT_FILE = File.join(File.dirname(__FILE__), '..', '/cacert.pem')
|
4
|
+
|
5
|
+
module Garb
|
6
|
+
class AuthenticationRequestTest < MiniTest::Unit::TestCase
|
7
|
+
|
8
|
+
context "An instance of the AuthenticationRequest class" do
|
9
|
+
|
10
|
+
setup { @request = AuthenticationRequest.new('email', 'password') }
|
11
|
+
|
12
|
+
should "have a collection of parameters that include the email and password" do
|
13
|
+
expected =
|
14
|
+
{
|
15
|
+
'Email' => 'user@example.com',
|
16
|
+
'Passwd' => 'fuzzybunnies',
|
17
|
+
'accountType' => 'HOSTED_OR_GOOGLE',
|
18
|
+
'service' => 'analytics',
|
19
|
+
'source' => 'vigetLabs-garb-001'
|
20
|
+
}
|
21
|
+
|
22
|
+
request = AuthenticationRequest.new('user@example.com', 'fuzzybunnies')
|
23
|
+
assert_equal expected, request.parameters
|
24
|
+
end
|
25
|
+
|
26
|
+
should "have a URI" do
|
27
|
+
assert_equal URI.parse('https://www.google.com/accounts/ClientLogin'), @request.uri
|
28
|
+
end
|
29
|
+
|
30
|
+
should "be able to send a request to the GAAPI service with proper ssl" do
|
31
|
+
@request.expects(:build_request).returns('post')
|
32
|
+
|
33
|
+
response = mock {|m| m.expects(:is_a?).with(Net::HTTPOK).returns(true) }
|
34
|
+
|
35
|
+
http = mock do |m|
|
36
|
+
m.expects(:use_ssl=).with(true)
|
37
|
+
m.expects(:verify_mode=).with(OpenSSL::SSL::VERIFY_PEER)
|
38
|
+
m.expects(:ca_file=).with(CA_CERT_FILE)
|
39
|
+
m.expects(:request).with('post').yields(response)
|
40
|
+
end
|
41
|
+
|
42
|
+
Net::HTTP.expects(:new).with('www.google.com', 443).returns(http)
|
43
|
+
|
44
|
+
@request.send_request(OpenSSL::SSL::VERIFY_PEER)
|
45
|
+
end
|
46
|
+
|
47
|
+
should "be able to send a request to the GAAPI service with ignoring ssl" do
|
48
|
+
@request.expects(:build_request).returns('post')
|
49
|
+
|
50
|
+
response = mock {|m| m.expects(:is_a?).with(Net::HTTPOK).returns(true) }
|
51
|
+
|
52
|
+
http = mock do |m|
|
53
|
+
m.expects(:use_ssl=).with(true)
|
54
|
+
m.expects(:verify_mode=).with(OpenSSL::SSL::VERIFY_NONE)
|
55
|
+
m.expects(:request).with('post').yields(response)
|
56
|
+
end
|
57
|
+
|
58
|
+
Net::HTTP.expects(:new).with('www.google.com', 443).returns(http)
|
59
|
+
|
60
|
+
@request.send_request(OpenSSL::SSL::VERIFY_NONE)
|
61
|
+
end
|
62
|
+
|
63
|
+
should "be able to build a request for the GAAPI service" do
|
64
|
+
params = "param"
|
65
|
+
@request.expects(:parameters).with().returns(params)
|
66
|
+
|
67
|
+
post = mock
|
68
|
+
post.expects(:set_form_data).with(params)
|
69
|
+
|
70
|
+
Net::HTTP::Post.expects(:new).with('/accounts/ClientLogin').returns(post)
|
71
|
+
|
72
|
+
@request.build_request
|
73
|
+
end
|
74
|
+
|
75
|
+
should "be able to retrieve an auth_token from the body" do
|
76
|
+
response_data =
|
77
|
+
"SID=mysid\n" +
|
78
|
+
"LSID=mylsid\n" +
|
79
|
+
"Auth=auth_token\n"
|
80
|
+
|
81
|
+
@request.expects(:send_request).with(OpenSSL::SSL::VERIFY_NONE).returns(stub(:body => response_data))
|
82
|
+
|
83
|
+
assert_equal 'auth_token', @request.auth_token
|
84
|
+
end
|
85
|
+
|
86
|
+
should "use VERIFY_PEER if auth_token needs to be secure" do
|
87
|
+
response_data =
|
88
|
+
"SID=mysid\n" +
|
89
|
+
"LSID=mylsid\n" +
|
90
|
+
"Auth=auth_token\n"
|
91
|
+
|
92
|
+
@request.expects(:send_request).with(OpenSSL::SSL::VERIFY_PEER).returns(stub(:body => response_data))
|
93
|
+
|
94
|
+
assert_equal 'auth_token', @request.auth_token(:secure => true)
|
95
|
+
end
|
96
|
+
|
97
|
+
should "raise an exception when requesting an auth_token when the authorization fails" do
|
98
|
+
@request.stubs(:build_request)
|
99
|
+
response = mock do |m|
|
100
|
+
m.expects(:is_a?).with(Net::HTTPOK).returns(false)
|
101
|
+
end
|
102
|
+
|
103
|
+
http = stub do |s|
|
104
|
+
s.stubs(:use_ssl=)
|
105
|
+
s.stubs(:verify_mode=)
|
106
|
+
s.stubs(:request).yields(response)
|
107
|
+
end
|
108
|
+
|
109
|
+
Net::HTTP.stubs(:new).with('www.google.com', 443).returns(http)
|
110
|
+
|
111
|
+
assert_raises(Garb::AuthenticationRequest::AuthError) do
|
112
|
+
@request.send_request(OpenSSL::SSL::VERIFY_NONE)
|
113
|
+
end
|
114
|
+
end
|
115
|
+
|
116
|
+
end
|
117
|
+
|
118
|
+
|
119
|
+
|
120
|
+
end
|
121
|
+
end
|
@@ -0,0 +1,106 @@
|
|
1
|
+
require File.join(File.dirname(__FILE__), '..', '..', '/test_helper')
|
2
|
+
|
3
|
+
module Garb
|
4
|
+
class DataRequestTest < MiniTest::Unit::TestCase
|
5
|
+
|
6
|
+
context "An instance of the DataRequest class" do
|
7
|
+
setup do
|
8
|
+
@session = Session.new
|
9
|
+
@session.auth_token = 'abcdefg123456'
|
10
|
+
end
|
11
|
+
|
12
|
+
should "be able to build the query string from parameters" do
|
13
|
+
parameters = {'ids' => '12345', 'metrics' => 'country'}
|
14
|
+
data_request = DataRequest.new(@session, "", parameters)
|
15
|
+
|
16
|
+
query_string = data_request.query_string
|
17
|
+
|
18
|
+
assert_match(/^\?/, query_string)
|
19
|
+
|
20
|
+
query_string.sub!(/^\?/, '')
|
21
|
+
|
22
|
+
assert_equal ["ids=12345", "metrics=country"], query_string.split('&').sort
|
23
|
+
end
|
24
|
+
|
25
|
+
should "return an empty query string if parameters are empty" do
|
26
|
+
data_request = DataRequest.new(@session, "")
|
27
|
+
assert_equal "", data_request.query_string
|
28
|
+
end
|
29
|
+
|
30
|
+
should "be able to build a uri" do
|
31
|
+
url = 'http://example.com'
|
32
|
+
expected = URI.parse('http://example.com')
|
33
|
+
|
34
|
+
assert_equal expected, DataRequest.new(@session, url).uri
|
35
|
+
end
|
36
|
+
|
37
|
+
should "be able to send a request for a single user" do
|
38
|
+
@session.stubs(:single_user?).returns(true)
|
39
|
+
response = mock('Net::HTTPOK') do |m|
|
40
|
+
m.expects(:kind_of?).with(Net::HTTPSuccess).returns(true)
|
41
|
+
end
|
42
|
+
|
43
|
+
data_request = DataRequest.new(@session, 'https://example.com/data', 'key' => 'value')
|
44
|
+
data_request.stubs(:single_user_request).returns(response)
|
45
|
+
data_request.send_request
|
46
|
+
|
47
|
+
assert_received(data_request, :single_user_request)
|
48
|
+
end
|
49
|
+
|
50
|
+
should "be able to send a request for an oauth user" do
|
51
|
+
@session.stubs(:single_user?).returns(false)
|
52
|
+
@session.stubs(:oauth_user?).returns(true)
|
53
|
+
response = mock('Net::HTTPOK') do |m|
|
54
|
+
m.expects(:kind_of?).with(Net::HTTPSuccess).returns(true)
|
55
|
+
end
|
56
|
+
|
57
|
+
data_request = DataRequest.new(@session, 'https://example.com/data', 'key' => 'value')
|
58
|
+
data_request.stubs(:oauth_user_request).returns(response)
|
59
|
+
data_request.send_request
|
60
|
+
|
61
|
+
assert_received(data_request, :oauth_user_request)
|
62
|
+
end
|
63
|
+
|
64
|
+
should "raise if the request is unauthorized" do
|
65
|
+
@session.stubs(:single_user?).returns(false)
|
66
|
+
@session.stubs(:oauth_user?).returns(true)
|
67
|
+
response = mock('Net::HTTPUnauthorized', :body => 'Error')
|
68
|
+
|
69
|
+
data_request = DataRequest.new(@session, 'https://example.com/data', 'key' => 'value')
|
70
|
+
data_request.stubs(:oauth_user_request).returns(response)
|
71
|
+
|
72
|
+
assert_raises(Garb::DataRequest::ClientError) do
|
73
|
+
data_request.send_request
|
74
|
+
end
|
75
|
+
end
|
76
|
+
|
77
|
+
should "be able to request via the ouath access token" do
|
78
|
+
access_token = stub(:get => "responseobject")
|
79
|
+
@session.stubs(:access_token).returns(access_token)
|
80
|
+
|
81
|
+
data_request = DataRequest.new(@session, 'https://example.com/data', 'key' => 'value')
|
82
|
+
assert_equal 'responseobject', data_request.oauth_user_request
|
83
|
+
|
84
|
+
assert_received(@session, :access_token)
|
85
|
+
assert_received(access_token, :get) {|e| e.with('https://example.com/data?key=value')}
|
86
|
+
end
|
87
|
+
|
88
|
+
should "be able to request via http with an auth token" do
|
89
|
+
@session.expects(:auth_token).with().returns('toke')
|
90
|
+
response = mock
|
91
|
+
|
92
|
+
http = mock do |m|
|
93
|
+
m.expects(:use_ssl=).with(true)
|
94
|
+
m.expects(:verify_mode=).with(OpenSSL::SSL::VERIFY_NONE)
|
95
|
+
m.expects(:get).with('/data?key=value', 'Authorization' => 'GoogleLogin auth=toke').returns(response)
|
96
|
+
end
|
97
|
+
|
98
|
+
Net::HTTP.expects(:new).with('example.com', 443).returns(http)
|
99
|
+
|
100
|
+
data_request = DataRequest.new(@session, 'https://example.com/data', 'key' => 'value')
|
101
|
+
assert_equal response, data_request.single_user_request
|
102
|
+
end
|
103
|
+
end
|
104
|
+
|
105
|
+
end
|
106
|
+
end
|