rb-net_http-client 1.0.1 → 1.0.2

Sign up to get free protection for your applications and to get access to all the features.
@@ -1,342 +0,0 @@
1
- require_relative '../../../spec_helper'
2
- describe 'NetHTTP::Request::Ext.call_web_service' do
3
- it 'performs a GET request from http://eelslap.com/' do
4
- client_opts = {}
5
- client_opts[:uri] = 'http://eelslap.com/'
6
- client_opts[:use_ssl] = false
7
-
8
- client = NetHTTP.client(client_opts)
9
-
10
- request_opts = {}
11
- request_opts[:req_headers] = {}
12
- request_opts[:req_method] = 'get'
13
- request_opts[:req_path] = '/'
14
-
15
- resp = client.call_web_service(request_opts)
16
-
17
- expect(resp.code).to eq('200')
18
- expect(resp.resp_code).to eq('200')
19
- expect(resp.headers.empty?).to eq(false)
20
- expect(resp.resp_headers.empty?).to eq(false)
21
- expect(resp.headers_hash.empty?).to eq(false)
22
- expect(resp.headers_hash.class).to eq(Hash)
23
- expect(resp.resp_headers_hash.empty?).to eq(false)
24
- expect(resp.resp_headers_hash.class).to eq(Hash)
25
- expect(resp.valid_html?).to eq(true)
26
- expect(NetHTTP::Core.valid_html?(resp.body, nil)).to eq(true)
27
- expect(resp.body.empty?).to eq(false)
28
- expect(resp.resp_body.empty?).to eq(false)
29
- expect(resp.body_hash).to eq({})
30
- expect(resp.body_hash.class).to eq(Hash)
31
- expect(resp.resp_body_hash).to eq({})
32
- expect(resp.resp_body_hash.class).to eq(Hash)
33
- end
34
-
35
- it 'performs a GET request from http://eelslap.com/ with logger' do
36
- client_opts = {}
37
- client_opts[:uri] = 'http://eelslap.com/'
38
- client_opts[:use_ssl] = false
39
-
40
- logger = Logger.new(STDOUT)
41
- logger.level = Logger::DEBUG
42
- client_opts[:logger] = logger
43
-
44
- client = NetHTTP.client(client_opts)
45
-
46
- request_opts = {}
47
- request_opts[:logger] = client.logger
48
- request_opts[:req_headers] = {}
49
- request_opts[:req_method] = 'get'
50
- request_opts[:req_path] = '/'
51
-
52
- resp = client.call_web_service(request_opts)
53
-
54
- expect(resp.code).to eq('200')
55
- expect(resp.resp_code).to eq('200')
56
- expect(resp.headers.empty?).to eq(false)
57
- expect(resp.resp_headers.empty?).to eq(false)
58
- expect(resp.headers_hash.empty?).to eq(false)
59
- expect(resp.headers_hash.class).to eq(Hash)
60
- expect(resp.resp_headers_hash.empty?).to eq(false)
61
- expect(resp.resp_headers_hash.class).to eq(Hash)
62
- expect(resp.valid_html?).to eq(true)
63
- expect(resp.body.empty?).to eq(false)
64
- expect(resp.resp_body.empty?).to eq(false)
65
- expect(resp.body_hash).to eq({})
66
- expect(resp.body_hash.class).to eq(Hash)
67
- expect(resp.resp_body_hash).to eq({})
68
- expect(resp.resp_body_hash.class).to eq(Hash)
69
- end
70
-
71
- it 'performs a GET request from http://eelslap.com/ without uri' do
72
- client_opts = {}
73
- client_opts[:host] = 'eelslap.com'
74
- client_opts[:port] = 80
75
- client_opts[:path] = '/'
76
- client_opts[:use_ssl] = false
77
-
78
- logger = Logger.new(STDOUT)
79
- logger.level = Logger::INFO
80
- client_opts[:logger] = logger
81
-
82
- client = NetHTTP.client(client_opts)
83
-
84
- request_opts = {}
85
- request_opts[:logger] = client.logger
86
- request_opts[:req_headers] = {}
87
- request_opts[:req_method] = 'get'
88
- request_opts[:req_path] = '/'
89
-
90
- resp = client.call_web_service(request_opts)
91
-
92
- logger.debug('Response Code => ' + resp.code)
93
- logger.debug('Response Headers =>')
94
- logger.debug(resp.headers)
95
- logger.debug('')
96
- logger.debug('Response Body =>')
97
- logger.debug(resp.body)
98
- logger.debug('')
99
-
100
- expect(resp.code).to eq('200')
101
- expect(resp.resp_code).to eq('200')
102
- expect(resp.headers.empty?).to eq(false)
103
- expect(resp.resp_headers.empty?).to eq(false)
104
- expect(resp.headers_hash.empty?).to eq(false)
105
- expect(resp.headers_hash.class).to eq(Hash)
106
- expect(resp.resp_headers_hash.empty?).to eq(false)
107
- expect(resp.resp_headers_hash.class).to eq(Hash)
108
- expect(resp.valid_html?).to eq(true)
109
- expect(resp.body.empty?).to eq(false)
110
- expect(resp.resp_body.empty?).to eq(false)
111
- expect(resp.body_hash).to eq({})
112
- expect(resp.body_hash.class).to eq(Hash)
113
- expect(resp.resp_body_hash).to eq({})
114
- expect(resp.resp_body_hash.class).to eq(Hash)
115
- end
116
-
117
- it 'performs a POST request for a valid oAuth token from ESG' do
118
- client_opts = {}
119
- client_opts[:uri] = 'https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner'
120
- client_opts[:use_ssl] = true
121
-
122
- logger = Logger.new(STDOUT)
123
- logger.level = Logger::INFO
124
- client_opts[:logger] = logger
125
-
126
- client = NetHTTP.client(client_opts)
127
-
128
- request_opts = {}
129
- request_opts[:logger] = client.logger
130
- request_opts[:req_method] = 'post'
131
- request_opts[:req_headers] = {'Content-Type' => 'application/x-www-form-urlencoded; charset=UTF-8'}
132
-
133
- user_id = ENV['USER_ID']
134
- password = ENV['PASSWORD']
135
- client_id = 'd6bcd5e1-29d7-4ec0-9b96-215b3a317fd6'
136
- client_secret = 'e391e6aa-4d60-4470-b351-0f84f11495a8'
137
- grant_type = 'password'
138
- scope = 'AppIdClaimsTrust'
139
- request_opts[:req_body] = "username=#{user_id}&password=#{password}&client_id=#{client_id}&client_secret=#{client_secret}&grant_type=#{grant_type}&scope=#{scope}"
140
- request_opts[:req_path] = '/as/resourceOwner'
141
-
142
- resp = client.call_web_service(request_opts)
143
-
144
- expect(resp.code).to eq('200')
145
- expect(resp.resp_code).to eq('200')
146
- expect(resp.headers.empty?).to eq(false)
147
- expect(resp.resp_headers.empty?).to eq(false)
148
- expect(resp.headers_hash.empty?).to eq(false)
149
- expect(resp.headers_hash.class).to eq(Hash)
150
- expect(resp.resp_headers_hash.empty?).to eq(false)
151
- expect(resp.resp_headers_hash.class).to eq(Hash)
152
- expect(resp.valid_json?).to eq(true)
153
- expect(resp.body.empty?).to eq(false)
154
- expect(resp.resp_body.empty?).to eq(false)
155
- expect(resp.body_hash.empty?).to eq(false)
156
- expect(resp.body_hash.class).to eq(Hash)
157
- expect(resp.resp_body_hash.empty?).to eq(false)
158
- expect(resp.resp_body_hash.class).to eq(Hash)
159
- end
160
-
161
- it 'performs a POST request for a valid oAuth token from ESG with scheme without uri' do
162
- client_opts = {}
163
- client_opts[:use_ssl] = true
164
- client_opts[:scheme] = 'https'
165
- client_opts[:host] = 'esg-qa-oauth2-internal.fmr.com'
166
- client_opts[:path] = '/as/resourceOwner'
167
-
168
- logger = Logger.new(STDOUT)
169
- logger.level = Logger::INFO
170
- client_opts[:logger] = logger
171
-
172
- client = NetHTTP.client(client_opts)
173
-
174
- request_opts = {}
175
- request_opts[:logger] = client.logger
176
- request_opts[:req_method] = 'post'
177
- request_opts[:req_headers] = {'Content-Type' => 'application/x-www-form-urlencoded; charset=UTF-8'}
178
-
179
- user_id = ENV['USER_ID']
180
- password = ENV['PASSWORD']
181
- client_id = 'd6bcd5e1-29d7-4ec0-9b96-215b3a317fd6'
182
- client_secret = 'e391e6aa-4d60-4470-b351-0f84f11495a8'
183
- grant_type = 'password'
184
- scope = 'AppIdClaimsTrust'
185
- request_opts[:req_body] = "username=#{user_id}&password=#{password}&client_id=#{client_id}&client_secret=#{client_secret}&grant_type=#{grant_type}&scope=#{scope}"
186
- request_opts[:req_path] = '/as/resourceOwner'
187
-
188
- resp = client.call_web_service(request_opts)
189
-
190
- expect(resp.code).to eq('200')
191
- expect(resp.resp_code).to eq('200')
192
- expect(resp.headers.empty?).to eq(false)
193
- expect(resp.resp_headers.empty?).to eq(false)
194
- expect(resp.headers_hash.empty?).to eq(false)
195
- expect(resp.headers_hash.class).to eq(Hash)
196
- expect(resp.resp_headers_hash.empty?).to eq(false)
197
- expect(resp.resp_headers_hash.class).to eq(Hash)
198
- expect(resp.valid_json?).to eq(true)
199
- expect(resp.body.empty?).to eq(false)
200
- expect(resp.resp_body.empty?).to eq(false)
201
- expect(resp.body_hash.empty?).to eq(false)
202
- expect(resp.body_hash.class).to eq(Hash)
203
- expect(resp.resp_body_hash.empty?).to eq(false)
204
- expect(resp.resp_body_hash.class).to eq(Hash)
205
- end
206
-
207
- it 'performs a POST request for a valid oAuth token from ESG without scheme without uri' do
208
- client_opts = {}
209
- client_opts[:use_ssl] = true
210
- client_opts[:host] = 'esg-qa-oauth2-internal.fmr.com'
211
- client_opts[:port] = 443
212
- client_opts[:path] = '/as/resourceOwner'
213
-
214
- logger = Logger.new(STDOUT)
215
- logger.level = Logger::INFO
216
- client_opts[:logger] = logger
217
-
218
- client = NetHTTP.client(client_opts)
219
-
220
- request_opts = {}
221
- request_opts[:logger] = client.logger
222
- request_opts[:req_method] = 'post'
223
- request_opts[:req_headers] = {'Content-Type' => 'application/x-www-form-urlencoded; charset=UTF-8'}
224
-
225
- user_id = ENV['USER_ID']
226
- password = ENV['PASSWORD']
227
- client_id = 'd6bcd5e1-29d7-4ec0-9b96-215b3a317fd6'
228
- client_secret = 'e391e6aa-4d60-4470-b351-0f84f11495a8'
229
- grant_type = 'password'
230
- scope = 'AppIdClaimsTrust'
231
- request_opts[:req_body] = "username=#{user_id}&password=#{password}&client_id=#{client_id}&client_secret=#{client_secret}&grant_type=#{grant_type}&scope=#{scope}"
232
- request_opts[:req_path] = '/as/resourceOwner'
233
-
234
- resp = client.call_web_service(request_opts)
235
-
236
- expect(resp.code).to eq('200')
237
- expect(resp.resp_code).to eq('200')
238
- expect(resp.headers.empty?).to eq(false)
239
- expect(resp.resp_headers.empty?).to eq(false)
240
- expect(resp.headers_hash.empty?).to eq(false)
241
- expect(resp.headers_hash.class).to eq(Hash)
242
- expect(resp.resp_headers_hash.empty?).to eq(false)
243
- expect(resp.resp_headers_hash.class).to eq(Hash)
244
- expect(resp.valid_json?).to eq(true)
245
- expect(resp.body.empty?).to eq(false)
246
- expect(resp.resp_body.empty?).to eq(false)
247
- expect(resp.body_hash.empty?).to eq(false)
248
- expect(resp.body_hash.class).to eq(Hash)
249
- expect(resp.resp_body_hash.empty?).to eq(false)
250
- expect(resp.resp_body_hash.class).to eq(Hash)
251
- end
252
-
253
- it 'performs a POST request to MAUI to retrieve account users using ssl and cert' do
254
- client_opts = {}
255
- client_opts[:uri] = 'https://alpha-mmk.fmr.com:9980/XML_FEB_S_A'
256
- client_opts[:ssl_path] = '/apps/security'
257
- client_opts[:ca_file] = 'cacert.pem'
258
- client_opts[:pkcs12_file] = 'dev-b2b-fidcom.p12'
259
- client_opts[:pkcs12_passphrase] = ENV['PKCS12_PASSPHRASE']
260
- client_opts[:verify_mode] = OpenSSL::SSL::VERIFY_NONE
261
-
262
- # logger = Logger.new(STDOUT)
263
- # logger.level = Logger::DEBUG
264
- # client_opts[:logger] = logger
265
-
266
- client = NetHTTP.client(client_opts)
267
-
268
- req_opts = {}
269
- req_opts[:req_method] = 'post'
270
- req_opts[:req_headers] = {'Content-Type' => 'application/xml'}
271
- req_opts[:req_body] = '<?xml version="1.0" encoding="utf-16"?>
272
- <DCLCUST0_REQUEST>
273
- <PSL_VIEW>DCLCUST0.VIEW</PSL_VIEW>
274
- <REQUESTOR_ID>024300218</REQUESTOR_ID>
275
- <PRODUCT_ID>W</PRODUCT_ID>
276
- <MESSAGE_TYPE>F</MESSAGE_TYPE>
277
- <FUNCTION_INDICATOR>V</FUNCTION_INDICATOR>
278
- <PARTITION_ID>RETAIL</PARTITION_ID>
279
- <RELATIONSHIP_TYPE/>
280
- <INCLUDE_4P_REL>Y</INCLUDE_4P_REL>
281
- <PRM_KEY_TYPE>B</PRM_KEY_TYPE>
282
- <PRIMARY_KEY>X01000833</PRIMARY_KEY>
283
- <RETURN_PRODUCT_G_NBR_IND/>
284
- <INPUT_VIEW>
285
- <PAGING>
286
- <PAGING_MAX_COUNT>All</PAGING_MAX_COUNT>
287
- <PAGING_DIRECTION>F</PAGING_DIRECTION>
288
- <PAGING_CONTINUATION_KEY/>
289
- </PAGING>
290
- </INPUT_VIEW>
291
- </DCLCUST0_REQUEST>'
292
-
293
- resp = client.call_web_service(req_opts)
294
-
295
- expect(resp.code).to eq('200')
296
- expect(resp.resp_code).to eq('200')
297
- expect(resp.headers.empty?).to eq(false)
298
- expect(resp.resp_headers.empty?).to eq(false)
299
- expect(resp.headers_hash.empty?).to eq(false)
300
- expect(resp.headers_hash.class).to eq(Hash)
301
- expect(resp.resp_headers_hash.empty?).to eq(false)
302
- expect(resp.resp_headers_hash.class).to eq(Hash)
303
- expect(resp.valid_xml?).to eq(true)
304
- expect(resp.body.empty?).to eq(false)
305
- expect(resp.resp_body.empty?).to eq(false)
306
- expect(resp.body_hash.empty?).to eq(false)
307
- expect(resp.body_hash.class).to eq(Hash)
308
- expect(resp.resp_body_hash.empty?).to eq(false)
309
- expect(resp.resp_body_hash.class).to eq(Hash)
310
- end
311
- it 'performs a GET request from http://eelslap.com/ with query' do
312
- client_opts = {}
313
- client_opts[:uri] = 'http://eelslap.com/?req=aaaa'
314
- client_opts[:use_ssl] = false
315
-
316
- client = NetHTTP.client(client_opts)
317
-
318
- request_opts = {}
319
- request_opts[:req_headers] = {}
320
- request_opts[:req_method] = 'get'
321
- request_opts[:req_path] = '/?req=aaaa'
322
- resp = client.call_web_service(request_opts)
323
-
324
- expect(resp.code).to eq('200')
325
- expect(resp.resp_code).to eq('200')
326
- expect(resp.headers.empty?).to eq(false)
327
- expect(resp.resp_headers.empty?).to eq(false)
328
- expect(resp.headers_hash.empty?).to eq(false)
329
- expect(resp.headers_hash.class).to eq(Hash)
330
- expect(resp.resp_headers_hash.empty?).to eq(false)
331
- expect(resp.resp_headers_hash.class).to eq(Hash)
332
- expect(resp.valid_html?).to eq(true)
333
- expect(NetHTTP::Core.valid_html?(resp.body, nil)).to eq(true)
334
- expect(resp.body.empty?).to eq(false)
335
- expect(resp.resp_body.empty?).to eq(false)
336
- expect(resp.body_hash).to eq({})
337
- expect(resp.body_hash.class).to eq(Hash)
338
- expect(resp.resp_body_hash).to eq({})
339
- expect(resp.resp_body_hash.class).to eq(Hash)
340
- expect(resp.resp_body_hash.class).to eq(Hash)
341
- end
342
- end
@@ -1,7 +0,0 @@
1
- require_relative '../../../spec_helper'
2
-
3
- describe NetHTTP::Response::Ext do
4
- # it '' do
5
- #
6
- # end
7
- end
@@ -1,7 +0,0 @@
1
- require_relative '../../../spec_helper'
2
-
3
- describe NetHTTP::Client::Ext do
4
- # it '' do
5
- #
6
- # end
7
- end
@@ -1,8 +0,0 @@
1
- require_relative '../../../spec_helper'
2
-
3
- describe NetHTTP::Client::Schema do
4
- # TODO: Add unit tests around input validation.
5
- # it '' do
6
- #
7
- # end
8
- end
@@ -1,232 +0,0 @@
1
- require_relative '../../../spec_helper'
2
-
3
- describe 'NetHTTP.client' do
4
- it 'returns a valid Net::HTTP client instance' do
5
- client_opts = {}
6
- client_opts[:uri] = 'https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner'
7
-
8
- client = NetHTTP.client(client_opts)
9
-
10
- expect(client.class).to eq(Net::HTTP)
11
- expect(client.logger.class).to eq(Logger)
12
- expect(client.logger.level).to eq(Logger::INFO)
13
- expect(client.uri.to_s).to eq(client_opts[:uri])
14
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
15
- expect(client.port).to eq(443)
16
- expect(client.path).to eq('/as/resourceOwner')
17
- expect(client.proxy_uri.to_s).to eq('http://http.proxy.fmr.com:8000/')
18
- expect(client.use_proxy).to eq(true)
19
- expect(client.use_ssl).to eq(true)
20
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
21
- expect(client.open_timeout).to eq(60)
22
- expect(client.read_timeout).to eq(60)
23
- end
24
-
25
- it 'returns a valid Net::HTTP client instance' do
26
- client_opts = {}
27
- client_opts[:uri] = 'https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner'
28
- client_opts[:use_ssl] = true
29
- client_opts[:verify_mode] = OpenSSL::SSL::VERIFY_NONE
30
-
31
- client = NetHTTP.client(client_opts)
32
-
33
- expect(client.class).to eq(Net::HTTP)
34
- expect(client.logger.class).to eq(Logger)
35
- expect(client.logger.level).to eq(Logger::INFO)
36
- expect(client.uri.to_s).to eq(client_opts[:uri])
37
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
38
- expect(client.port).to eq(443)
39
- expect(client.path).to eq('/as/resourceOwner')
40
- expect(client.proxy_uri.to_s).to eq('http://http.proxy.fmr.com:8000/')
41
- expect(client.use_proxy).to eq(true)
42
- expect(client.use_ssl).to eq(true)
43
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
44
- expect(client.open_timeout).to eq(60)
45
- expect(client.read_timeout).to eq(60)
46
- end
47
-
48
- it 'returns a valid Net::HTTP client instance when uri is eelslap.com:80/' do
49
- client_opts = {}
50
- client_opts[:uri] = 'eelslap.com:80/'
51
-
52
- client = NetHTTP.client(client_opts)
53
-
54
- expect(client.class).to eq(Net::HTTP)
55
- expect(client.logger.class).to eq(Logger)
56
- expect(client.logger.level).to eq(Logger::INFO)
57
- expect(client.uri.to_s).to eq('http://eelslap.com/')
58
- expect(client.host).to eq('eelslap.com')
59
- expect(client.port).to eq(80)
60
- expect(client.path).to eq('/')
61
- expect(client.proxy_uri.to_s).to eq('http://http.proxy.fmr.com:8000/')
62
- expect(client.use_proxy).to eq(true)
63
- expect(client.use_ssl).to eq(false)
64
- expect(client.verify_mode).to eq(nil)
65
- expect(client.open_timeout).to eq(60)
66
- expect(client.read_timeout).to eq(60)
67
- end
68
-
69
- it 'returns a valid Net::HTTP client instance when no uri / url is provided' do
70
- client_opts = {}
71
- client_opts[:scheme] = 'https'
72
- client_opts[:host] = 'esg-qa-oauth2-internal.fmr.com'
73
- client_opts[:port] = 443
74
- client_opts[:path] = '/as/resourceOwner'
75
-
76
- client = NetHTTP.client(client_opts)
77
-
78
- expect(client.class).to eq(Net::HTTP)
79
- expect(client.logger.class).to eq(Logger)
80
- expect(client.logger.level).to eq(Logger::INFO)
81
- expect(client.uri.to_s).to eq('https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner')
82
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
83
- expect(client.port).to eq(443)
84
- expect(client.path).to eq('/as/resourceOwner')
85
- expect(client.proxy_uri.to_s).to eq('http://http.proxy.fmr.com:8000/')
86
- expect(client.use_proxy).to eq(true)
87
- expect(client.use_ssl).to eq(true)
88
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
89
- expect(client.open_timeout).to eq(60)
90
- expect(client.read_timeout).to eq(60)
91
- end
92
-
93
- it 'returns a valid Net::HTTP client instance when only host, port, and path are provided' do
94
- client_opts = {}
95
- client_opts[:host] = 'esg-qa-oauth2-internal.fmr.com'
96
- client_opts[:port] = 443
97
- client_opts[:path] = '/as/resourceOwner'
98
-
99
- client = NetHTTP.client(client_opts)
100
-
101
- expect(client.class).to eq(Net::HTTP)
102
- expect(client.logger.class).to eq(Logger)
103
- expect(client.logger.level).to eq(Logger::INFO)
104
- expect(client.uri.to_s).to eq('https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner')
105
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
106
- expect(client.port).to eq(443)
107
- expect(client.path).to eq('/as/resourceOwner')
108
- expect(client.proxy_uri.to_s).to eq('http://http.proxy.fmr.com:8000/')
109
- expect(client.use_proxy).to eq(true)
110
- expect(client.use_ssl).to eq(true)
111
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
112
- expect(client.open_timeout).to eq(60)
113
- expect(client.read_timeout).to eq(60)
114
- end
115
-
116
- it 'returns a valid Net::HTTP client instance when only host and path are provided' do
117
- client_opts = {}
118
- client_opts[:host] = 'esg-qa-oauth2-internal.fmr.com'
119
- client_opts[:path] = '/as/resourceOwner'
120
- client_opts[:enforce_schema_validation] = false
121
-
122
- client = NetHTTP.client(client_opts)
123
-
124
- expect(client.class).to eq(Net::HTTP)
125
- expect(client.logger.class).to eq(Logger)
126
- expect(client.logger.level).to eq(Logger::INFO)
127
- expect(client.uri.to_s).to eq('https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner')
128
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
129
- expect(client.port).to eq(443)
130
- expect(client.path).to eq('/as/resourceOwner')
131
- expect(client.proxy_uri.to_s).to eq('http://http.proxy.fmr.com:8000/')
132
- expect(client.use_proxy).to eq(true)
133
- expect(client.use_ssl).to eq(true)
134
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
135
- expect(client.open_timeout).to eq(60)
136
- expect(client.read_timeout).to eq(60)
137
- end
138
-
139
- it 'returns a valid Net::HTTP client instance when use_proxy & use_ssl are false' do
140
- client_opts = {}
141
- client_opts[:uri] = 'https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner'
142
- client_opts[:use_proxy] = false
143
- client_opts[:use_ssl] = false
144
-
145
- client = NetHTTP.client(client_opts)
146
-
147
- expect(client.class).to eq(Net::HTTP)
148
- expect(client.logger.class).to eq(Logger)
149
- expect(client.logger.level).to eq(Logger::INFO)
150
- expect(client.uri.to_s).to eq(client_opts[:uri])
151
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
152
- expect(client.port).to eq(443)
153
- expect(client.path).to eq('/as/resourceOwner')
154
- # expect(client.proxy_uri.to_s).to eq((ENV['http_proxy'] ||= 'http://http.proxy.fmr.com:8000/'))
155
- expect(client.use_proxy).to eq(false)
156
- expect(client.use_ssl).to eq(false)
157
- expect(client.verify_mode).to eq(nil)
158
- expect(client.open_timeout).to eq(60)
159
- expect(client.read_timeout).to eq(60)
160
- end
161
-
162
- it 'returns a valid Net::HTTP client instance use_ssl and scheme are nil' do
163
- client_opts = {}
164
- client_opts[:uri] = 'esg-qa-oauth2-internal.fmr.com:443/as/resourceOwner'
165
- client_opts[:enforce_schema_validation] = false
166
- client_opts[:use_ssl] = nil
167
-
168
- client = NetHTTP.client(client_opts)
169
-
170
- expect(client.class).to eq(Net::HTTP)
171
- expect(client.logger.class).to eq(Logger)
172
- expect(client.logger.level).to eq(Logger::INFO)
173
- expect(client.uri.to_s).to eq('https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner')
174
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
175
- expect(client.port).to eq(443)
176
- expect(client.path).to eq('/as/resourceOwner')
177
- # expect(client.proxy_uri.to_s).to eq((ENV['http_proxy'] ||= 'http://http.proxy.fmr.com:8000/'))
178
- expect(client.use_proxy).to eq(true)
179
- expect(client.use_ssl).to eq(true)
180
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
181
- expect(client.open_timeout).to eq(60)
182
- expect(client.read_timeout).to eq(60)
183
- end
184
-
185
- it 'returns a valid Net::HTTP client instance use_ssl, scheme, and port are nil' do
186
- client_opts = {}
187
- client_opts[:uri] = 'esg-qa-oauth2-internal.fmr.com/as/resourceOwner'
188
- client_opts[:enforce_schema_validation] = false
189
- client_opts[:use_ssl] = nil
190
-
191
- client = NetHTTP.client(client_opts)
192
-
193
- expect(client.class).to eq(Net::HTTP)
194
- expect(client.logger.class).to eq(Logger)
195
- expect(client.logger.level).to eq(Logger::INFO)
196
- expect(client.uri.to_s).to eq('https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner')
197
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
198
- expect(client.port).to eq(443)
199
- expect(client.path).to eq('/as/resourceOwner')
200
- # expect(client.proxy_uri.to_s).to eq((ENV['http_proxy'] ||= 'http://http.proxy.fmr.com:8000/'))
201
- expect(client.use_proxy).to eq(true)
202
- expect(client.use_ssl).to eq(true)
203
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
204
- expect(client.open_timeout).to eq(60)
205
- expect(client.read_timeout).to eq(60)
206
- end
207
-
208
- it 'returns a valid Net::HTTP client instance when use_proxy & use_ssl are true' do
209
- client_opts = {}
210
- client_opts[:uri] = 'https://esg-qa-oauth2-internal.fmr.com/as/resourceOwner'
211
- client_opts[:use_proxy] = true
212
- client_opts[:use_ssl] = true
213
-
214
- client = NetHTTP.client(client_opts)
215
-
216
- expect(client.class).to eq(Net::HTTP)
217
- expect(client.logger.class).to eq(Logger)
218
- expect(client.logger.level).to eq(Logger::INFO)
219
- expect(client.uri.to_s).to eq(client_opts[:uri])
220
- expect(client.host).to eq('esg-qa-oauth2-internal.fmr.com')
221
- expect(client.port).to eq(443)
222
- expect(client.path).to eq('/as/resourceOwner')
223
- # expect(client.proxy_uri.to_s).to eq((ENV['http_proxy'] ||= 'http://http.proxy.fmr.com:8000/'))
224
- expect(client.use_proxy).to eq(true)
225
- expect(client.use_ssl).to eq(true)
226
- expect(client.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
227
- expect(client.open_timeout).to eq(60)
228
- expect(client.read_timeout).to eq(60)
229
- end
230
-
231
- # TODO: Add in the unit tests for the cert based scenarios (i.e. MAUI)
232
- end