rspec-webservice_matchers 4.4.1 → 4.4.2
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: fdd366668419982943106174c9013413cae007fa
|
4
|
+
data.tar.gz: 4bb2afb6be3c0422a3190cb538bca5779ce8b411
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9f427e384c3daa052bc2e126c1201359168a177b3f9d08b2c8df5ff73631ba239fa15319389c2f4fbfc2afe4f3a714a9e870e0ccc9c5716be8c9285b6c2e5ec7
|
7
|
+
data.tar.gz: 662377a89e4f33745552936d2ec19b7a3dbb1ad5868466594018a3fcc3d01751723f6d1ba612d7f3ece046f8d9b7f6f7b77078c60ec0c98812fde981d4813750
|
@@ -25,12 +25,12 @@ module RSpec
|
|
25
25
|
# 200. HTTPie and Curl are able to.
|
26
26
|
# See https://github.com/excon/excon/issues/546
|
27
27
|
def fix_for_excon_bug(error_message)
|
28
|
-
return error_message unless
|
28
|
+
return error_message unless buggy_message?(error_message)
|
29
29
|
'Unable to verify the certificate because a redirect was detected'
|
30
30
|
end
|
31
31
|
|
32
|
-
def
|
33
|
-
text =~ /Unable to verify
|
32
|
+
def buggy_message?(text)
|
33
|
+
text =~ /Unable to verify|verify failed/
|
34
34
|
end
|
35
35
|
end
|
36
36
|
end
|
@@ -49,7 +49,8 @@ describe 'be_up' do
|
|
49
49
|
end
|
50
50
|
|
51
51
|
it 'is available via a public API' do
|
52
|
-
|
52
|
+
status = RSpec::WebserviceMatchers::Util.up?('http://www.website.com/')
|
53
|
+
expect(status).to be true
|
53
54
|
end
|
54
55
|
|
55
56
|
it 'gives relevant error output' do
|
@@ -61,4 +62,8 @@ describe 'be_up' do
|
|
61
62
|
it 'succeeds even if the site times out on the first try' do
|
62
63
|
expect('http://www.timeout-once.com').to be_up
|
63
64
|
end
|
65
|
+
|
66
|
+
it 'works on cars.com' do
|
67
|
+
expect('http://cars.com').to be_up
|
68
|
+
end
|
64
69
|
end
|