webmock 3.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gemtest +0 -0
- data/.gitignore +34 -0
- data/.rspec-tm +2 -0
- data/.travis.yml +19 -0
- data/CHANGELOG.md +1698 -0
- data/Gemfile +9 -0
- data/LICENSE +20 -0
- data/README.md +1125 -0
- data/Rakefile +28 -0
- data/lib/webmock.rb +59 -0
- data/lib/webmock/api.rb +109 -0
- data/lib/webmock/assertion_failure.rb +11 -0
- data/lib/webmock/callback_registry.rb +35 -0
- data/lib/webmock/config.rb +18 -0
- data/lib/webmock/cucumber.rb +10 -0
- data/lib/webmock/deprecation.rb +9 -0
- data/lib/webmock/errors.rb +17 -0
- data/lib/webmock/http_lib_adapters/async_http_client_adapter.rb +214 -0
- data/lib/webmock/http_lib_adapters/curb_adapter.rb +347 -0
- data/lib/webmock/http_lib_adapters/em_http_request_adapter.rb +228 -0
- data/lib/webmock/http_lib_adapters/excon_adapter.rb +162 -0
- data/lib/webmock/http_lib_adapters/http_lib_adapter.rb +7 -0
- data/lib/webmock/http_lib_adapters/http_lib_adapter_registry.rb +19 -0
- data/lib/webmock/http_lib_adapters/http_rb/client.rb +14 -0
- data/lib/webmock/http_lib_adapters/http_rb/request.rb +16 -0
- data/lib/webmock/http_lib_adapters/http_rb/response.rb +43 -0
- data/lib/webmock/http_lib_adapters/http_rb/streamer.rb +29 -0
- data/lib/webmock/http_lib_adapters/http_rb/webmock.rb +68 -0
- data/lib/webmock/http_lib_adapters/http_rb_adapter.rb +37 -0
- data/lib/webmock/http_lib_adapters/httpclient_adapter.rb +242 -0
- data/lib/webmock/http_lib_adapters/manticore_adapter.rb +130 -0
- data/lib/webmock/http_lib_adapters/net_http.rb +361 -0
- data/lib/webmock/http_lib_adapters/net_http_response.rb +34 -0
- data/lib/webmock/http_lib_adapters/patron_adapter.rb +130 -0
- data/lib/webmock/http_lib_adapters/typhoeus_hydra_adapter.rb +174 -0
- data/lib/webmock/matchers/any_arg_matcher.rb +13 -0
- data/lib/webmock/matchers/hash_argument_matcher.rb +21 -0
- data/lib/webmock/matchers/hash_excluding_matcher.rb +15 -0
- data/lib/webmock/matchers/hash_including_matcher.rb +17 -0
- data/lib/webmock/minitest.rb +41 -0
- data/lib/webmock/rack_response.rb +69 -0
- data/lib/webmock/request_body_diff.rb +64 -0
- data/lib/webmock/request_execution_verifier.rb +77 -0
- data/lib/webmock/request_pattern.rb +370 -0
- data/lib/webmock/request_registry.rb +35 -0
- data/lib/webmock/request_signature.rb +54 -0
- data/lib/webmock/request_signature_snippet.rb +61 -0
- data/lib/webmock/request_stub.rb +100 -0
- data/lib/webmock/response.rb +153 -0
- data/lib/webmock/responses_sequence.rb +40 -0
- data/lib/webmock/rspec.rb +41 -0
- data/lib/webmock/rspec/matchers.rb +27 -0
- data/lib/webmock/rspec/matchers/request_pattern_matcher.rb +78 -0
- data/lib/webmock/rspec/matchers/webmock_matcher.rb +67 -0
- data/lib/webmock/stub_registry.rb +67 -0
- data/lib/webmock/stub_request_snippet.rb +38 -0
- data/lib/webmock/test_unit.rb +22 -0
- data/lib/webmock/util/hash_counter.rb +39 -0
- data/lib/webmock/util/hash_keys_stringifier.rb +25 -0
- data/lib/webmock/util/hash_validator.rb +17 -0
- data/lib/webmock/util/headers.rb +64 -0
- data/lib/webmock/util/json.rb +67 -0
- data/lib/webmock/util/query_mapper.rb +281 -0
- data/lib/webmock/util/uri.rb +110 -0
- data/lib/webmock/util/values_stringifier.rb +20 -0
- data/lib/webmock/util/version_checker.rb +111 -0
- data/lib/webmock/version.rb +3 -0
- data/lib/webmock/webmock.rb +161 -0
- data/minitest/test_helper.rb +34 -0
- data/minitest/test_webmock.rb +9 -0
- data/minitest/webmock_spec.rb +60 -0
- data/spec/acceptance/async_http_client/async_http_client_spec.rb +349 -0
- data/spec/acceptance/async_http_client/async_http_client_spec_helper.rb +73 -0
- data/spec/acceptance/curb/curb_spec.rb +492 -0
- data/spec/acceptance/curb/curb_spec_helper.rb +147 -0
- data/spec/acceptance/em_http_request/em_http_request_spec.rb +406 -0
- data/spec/acceptance/em_http_request/em_http_request_spec_helper.rb +77 -0
- data/spec/acceptance/excon/excon_spec.rb +77 -0
- data/spec/acceptance/excon/excon_spec_helper.rb +50 -0
- data/spec/acceptance/http_rb/http_rb_spec.rb +82 -0
- data/spec/acceptance/http_rb/http_rb_spec_helper.rb +54 -0
- data/spec/acceptance/httpclient/httpclient_spec.rb +217 -0
- data/spec/acceptance/httpclient/httpclient_spec_helper.rb +57 -0
- data/spec/acceptance/manticore/manticore_spec.rb +56 -0
- data/spec/acceptance/manticore/manticore_spec_helper.rb +35 -0
- data/spec/acceptance/net_http/net_http_shared.rb +153 -0
- data/spec/acceptance/net_http/net_http_spec.rb +331 -0
- data/spec/acceptance/net_http/net_http_spec_helper.rb +64 -0
- data/spec/acceptance/net_http/real_net_http_spec.rb +20 -0
- data/spec/acceptance/patron/patron_spec.rb +125 -0
- data/spec/acceptance/patron/patron_spec_helper.rb +54 -0
- data/spec/acceptance/shared/allowing_and_disabling_net_connect.rb +313 -0
- data/spec/acceptance/shared/callbacks.rb +148 -0
- data/spec/acceptance/shared/complex_cross_concern_behaviors.rb +36 -0
- data/spec/acceptance/shared/enabling_and_disabling_webmock.rb +95 -0
- data/spec/acceptance/shared/precedence_of_stubs.rb +15 -0
- data/spec/acceptance/shared/request_expectations.rb +930 -0
- data/spec/acceptance/shared/returning_declared_responses.rb +409 -0
- data/spec/acceptance/shared/stubbing_requests.rb +643 -0
- data/spec/acceptance/typhoeus/typhoeus_hydra_spec.rb +135 -0
- data/spec/acceptance/typhoeus/typhoeus_hydra_spec_helper.rb +60 -0
- data/spec/acceptance/webmock_shared.rb +41 -0
- data/spec/fixtures/test.txt +1 -0
- data/spec/quality_spec.rb +84 -0
- data/spec/spec_helper.rb +48 -0
- data/spec/support/example_curl_output.txt +22 -0
- data/spec/support/failures.rb +9 -0
- data/spec/support/my_rack_app.rb +53 -0
- data/spec/support/network_connection.rb +19 -0
- data/spec/support/webmock_server.rb +70 -0
- data/spec/unit/api_spec.rb +175 -0
- data/spec/unit/errors_spec.rb +129 -0
- data/spec/unit/http_lib_adapters/http_lib_adapter_registry_spec.rb +17 -0
- data/spec/unit/http_lib_adapters/http_lib_adapter_spec.rb +12 -0
- data/spec/unit/matchers/hash_excluding_matcher_spec.rb +61 -0
- data/spec/unit/matchers/hash_including_matcher_spec.rb +87 -0
- data/spec/unit/rack_response_spec.rb +112 -0
- data/spec/unit/request_body_diff_spec.rb +90 -0
- data/spec/unit/request_execution_verifier_spec.rb +208 -0
- data/spec/unit/request_pattern_spec.rb +601 -0
- data/spec/unit/request_registry_spec.rb +95 -0
- data/spec/unit/request_signature_snippet_spec.rb +89 -0
- data/spec/unit/request_signature_spec.rb +155 -0
- data/spec/unit/request_stub_spec.rb +199 -0
- data/spec/unit/response_spec.rb +282 -0
- data/spec/unit/stub_registry_spec.rb +103 -0
- data/spec/unit/stub_request_snippet_spec.rb +115 -0
- data/spec/unit/util/hash_counter_spec.rb +39 -0
- data/spec/unit/util/hash_keys_stringifier_spec.rb +27 -0
- data/spec/unit/util/headers_spec.rb +28 -0
- data/spec/unit/util/json_spec.rb +33 -0
- data/spec/unit/util/query_mapper_spec.rb +157 -0
- data/spec/unit/util/uri_spec.rb +361 -0
- data/spec/unit/util/version_checker_spec.rb +65 -0
- data/spec/unit/webmock_spec.rb +19 -0
- data/test/http_request.rb +24 -0
- data/test/shared_test.rb +108 -0
- data/test/test_helper.rb +23 -0
- data/test/test_webmock.rb +6 -0
- data/webmock.gemspec +45 -0
- metadata +496 -0
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
module NetHTTPSpecHelper
|
|
2
|
+
def http_request(method, uri, options = {}, &block)
|
|
3
|
+
begin
|
|
4
|
+
uri = URI.parse(uri)
|
|
5
|
+
rescue
|
|
6
|
+
uri = Addressable::URI.heuristic_parse(uri)
|
|
7
|
+
end
|
|
8
|
+
response = nil
|
|
9
|
+
clazz = Net::HTTP.const_get("#{method.to_s.capitalize}")
|
|
10
|
+
req = clazz.new("#{uri.path}#{uri.query ? '?' : ''}#{uri.query}", nil)
|
|
11
|
+
options[:headers].each do |k,v|
|
|
12
|
+
if v.is_a?(Array)
|
|
13
|
+
v.each_with_index do |e,i|
|
|
14
|
+
i == 0 ? (req[k] = e) : req.add_field(k, e)
|
|
15
|
+
end
|
|
16
|
+
else
|
|
17
|
+
req[k] = v
|
|
18
|
+
end
|
|
19
|
+
end if options[:headers]
|
|
20
|
+
|
|
21
|
+
if options[:basic_auth]
|
|
22
|
+
req.basic_auth(options[:basic_auth][0], options[:basic_auth][1])
|
|
23
|
+
end
|
|
24
|
+
|
|
25
|
+
http = Net::HTTP.new(uri.host, uri.port)
|
|
26
|
+
if uri.scheme == "https"
|
|
27
|
+
http.use_ssl = true
|
|
28
|
+
#1.9.1 has a bug with ssl_timeout
|
|
29
|
+
http.ssl_timeout = 20 unless RUBY_PLATFORM =~ /java/
|
|
30
|
+
http.open_timeout = 60
|
|
31
|
+
http.read_timeout = 60
|
|
32
|
+
end
|
|
33
|
+
http.verify_mode = OpenSSL::SSL::VERIFY_NONE
|
|
34
|
+
response = http.start {|open_http|
|
|
35
|
+
open_http.request(req, options[:body], &block)
|
|
36
|
+
}
|
|
37
|
+
headers = {}
|
|
38
|
+
response.each_header {|name, value| headers[name] = value}
|
|
39
|
+
OpenStruct.new({
|
|
40
|
+
body: response.body,
|
|
41
|
+
headers: WebMock::Util::Headers.normalize_headers(headers),
|
|
42
|
+
status: response.code,
|
|
43
|
+
message: response.message
|
|
44
|
+
})
|
|
45
|
+
end
|
|
46
|
+
|
|
47
|
+
def client_timeout_exception_class
|
|
48
|
+
if defined?(Net::OpenTimeout)
|
|
49
|
+
Net::OpenTimeout
|
|
50
|
+
elsif defined?(Net::HTTP::OpenTimeout)
|
|
51
|
+
Net::HTTP::OpenTimeout
|
|
52
|
+
else
|
|
53
|
+
Timeout::Error
|
|
54
|
+
end
|
|
55
|
+
end
|
|
56
|
+
|
|
57
|
+
def connection_refused_exception_class
|
|
58
|
+
Errno::ECONNREFUSED
|
|
59
|
+
end
|
|
60
|
+
|
|
61
|
+
def http_library
|
|
62
|
+
:net_http
|
|
63
|
+
end
|
|
64
|
+
end
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
require 'rubygems'
|
|
2
|
+
require 'rspec'
|
|
3
|
+
require 'net/http'
|
|
4
|
+
require 'net/https'
|
|
5
|
+
require 'stringio'
|
|
6
|
+
require 'acceptance/net_http/net_http_shared'
|
|
7
|
+
require 'support/webmock_server'
|
|
8
|
+
|
|
9
|
+
describe "Real Net:HTTP without webmock", without_webmock: true do
|
|
10
|
+
before(:all) do
|
|
11
|
+
raise "WebMock has no access here!!!" if defined?(WebMock::NetHTTPUtility)
|
|
12
|
+
WebMockServer.instance.start
|
|
13
|
+
end
|
|
14
|
+
|
|
15
|
+
after(:all) do
|
|
16
|
+
WebMockServer.instance.stop
|
|
17
|
+
end
|
|
18
|
+
|
|
19
|
+
it_should_behave_like "Net::HTTP"
|
|
20
|
+
end
|
|
@@ -0,0 +1,125 @@
|
|
|
1
|
+
# encoding: utf-8
|
|
2
|
+
|
|
3
|
+
require 'spec_helper'
|
|
4
|
+
require 'acceptance/webmock_shared'
|
|
5
|
+
|
|
6
|
+
unless RUBY_PLATFORM =~ /java/
|
|
7
|
+
require 'acceptance/patron/patron_spec_helper'
|
|
8
|
+
require 'tmpdir'
|
|
9
|
+
require 'fileutils'
|
|
10
|
+
|
|
11
|
+
describe "Patron" do
|
|
12
|
+
include PatronSpecHelper
|
|
13
|
+
|
|
14
|
+
include_examples "with WebMock"
|
|
15
|
+
|
|
16
|
+
describe "when custom functionality is used" do
|
|
17
|
+
before(:each) do
|
|
18
|
+
@sess = Patron::Session.new
|
|
19
|
+
@sess.base_url = "http://www.example.com"
|
|
20
|
+
end
|
|
21
|
+
|
|
22
|
+
it "should allow stubbing PATCH request with body" do
|
|
23
|
+
stub_request(:patch, "http://www.example.com/")
|
|
24
|
+
.with(body: "abc")
|
|
25
|
+
|
|
26
|
+
@sess.patch('/', "abc")
|
|
27
|
+
end
|
|
28
|
+
|
|
29
|
+
describe "file requests" do
|
|
30
|
+
|
|
31
|
+
before(:each) do
|
|
32
|
+
@dir_path = Dir.mktmpdir('webmock-')
|
|
33
|
+
@file_path = File.join(@dir_path, "webmock_temp_test_file")
|
|
34
|
+
FileUtils.rm_rf(@file_path) if File.exist?(@file_path)
|
|
35
|
+
end
|
|
36
|
+
|
|
37
|
+
after(:each) do
|
|
38
|
+
FileUtils.rm_rf(@dir_path) if File.exist?(@dir_path)
|
|
39
|
+
end
|
|
40
|
+
|
|
41
|
+
it "should work with get_file" do
|
|
42
|
+
stub_request(:get, "www.example.com").to_return(body: "abc")
|
|
43
|
+
@sess.get_file("/", @file_path)
|
|
44
|
+
expect(File.read(@file_path)).to eq("abc")
|
|
45
|
+
end
|
|
46
|
+
|
|
47
|
+
it "should raise same error as Patron if file is not readable for get request" do
|
|
48
|
+
stub_request(:get, "www.example.com")
|
|
49
|
+
File.open("/tmp/read_only_file", "w") do |tmpfile|
|
|
50
|
+
tmpfile.chmod(0400)
|
|
51
|
+
end
|
|
52
|
+
begin
|
|
53
|
+
expect {
|
|
54
|
+
@sess.get_file("/", "/tmp/read_only_file")
|
|
55
|
+
}.to raise_error(ArgumentError, "Unable to open specified file.")
|
|
56
|
+
ensure
|
|
57
|
+
File.unlink("/tmp/read_only_file")
|
|
58
|
+
end
|
|
59
|
+
end
|
|
60
|
+
|
|
61
|
+
it "should work with put_file" do
|
|
62
|
+
File.open(@file_path, "w") {|f| f.write "abc"}
|
|
63
|
+
stub_request(:put, "www.example.com").with(body: "abc")
|
|
64
|
+
@sess.put_file("/", @file_path)
|
|
65
|
+
end
|
|
66
|
+
|
|
67
|
+
it "should work with post_file" do
|
|
68
|
+
File.open(@file_path, "w") {|f| f.write "abc"}
|
|
69
|
+
stub_request(:post, "www.example.com").with(body: "abc")
|
|
70
|
+
@sess.post_file("/", @file_path)
|
|
71
|
+
end
|
|
72
|
+
|
|
73
|
+
it "should raise same error as Patron if file is not readable for post request" do
|
|
74
|
+
stub_request(:post, "www.example.com").with(body: "abc")
|
|
75
|
+
expect {
|
|
76
|
+
@sess.post_file("/", "/path/to/non/existing/file")
|
|
77
|
+
}.to raise_error(ArgumentError, "Unable to open specified file.")
|
|
78
|
+
end
|
|
79
|
+
|
|
80
|
+
end
|
|
81
|
+
|
|
82
|
+
describe "handling errors same way as patron" do
|
|
83
|
+
it "should raise error if put request has neither upload_data nor file_name" do
|
|
84
|
+
stub_request(:post, "www.example.com")
|
|
85
|
+
expect {
|
|
86
|
+
@sess.post("/", nil)
|
|
87
|
+
}.to raise_error(ArgumentError, "Must provide either data or a filename when doing a PUT or POST")
|
|
88
|
+
end
|
|
89
|
+
end
|
|
90
|
+
|
|
91
|
+
it "should work with WebDAV copy request" do
|
|
92
|
+
stub_request(:copy, "www.example.com/abc").with(headers: {'Destination' => "/def"})
|
|
93
|
+
@sess.copy("/abc", "/def")
|
|
94
|
+
end
|
|
95
|
+
|
|
96
|
+
if /^1\.9/ === RUBY_VERSION
|
|
97
|
+
describe "handling encoding same way as patron" do
|
|
98
|
+
around(:each) do |example|
|
|
99
|
+
@encoding = Encoding.default_internal
|
|
100
|
+
Encoding.default_internal = "UTF-8"
|
|
101
|
+
example.run
|
|
102
|
+
Encoding.default_internal = @encoding
|
|
103
|
+
end
|
|
104
|
+
|
|
105
|
+
it "should not encode body with default encoding" do
|
|
106
|
+
stub_request(:get, "www.example.com").
|
|
107
|
+
to_return(body: "Øl")
|
|
108
|
+
|
|
109
|
+
expect(@sess.get("").body.encoding).to eq(Encoding::ASCII_8BIT)
|
|
110
|
+
expect(@sess.get("").inspectable_body.encoding).to eq(Encoding::UTF_8)
|
|
111
|
+
end
|
|
112
|
+
|
|
113
|
+
it "should not encode body to default internal" do
|
|
114
|
+
stub_request(:get, "www.example.com").
|
|
115
|
+
to_return(headers: {'Content-Type' => 'text/html; charset=iso-8859-1'},
|
|
116
|
+
body: "Øl".encode("iso-8859-1"))
|
|
117
|
+
|
|
118
|
+
expect(@sess.get("").body.encoding).to eq(Encoding::ASCII_8BIT)
|
|
119
|
+
expect(@sess.get("").decoded_body.encoding).to eq(Encoding.default_internal)
|
|
120
|
+
end
|
|
121
|
+
end
|
|
122
|
+
end
|
|
123
|
+
end
|
|
124
|
+
end
|
|
125
|
+
end
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
require 'ostruct'
|
|
2
|
+
|
|
3
|
+
module PatronSpecHelper
|
|
4
|
+
def http_request(method, uri, options = {}, &block)
|
|
5
|
+
method = method.to_sym
|
|
6
|
+
uri = Addressable::URI.heuristic_parse(uri)
|
|
7
|
+
sess = Patron::Session.new
|
|
8
|
+
sess.base_url = "#{uri.omit(:path, :query).normalize.to_s}".gsub(/\/$/,"")
|
|
9
|
+
|
|
10
|
+
if options[:basic_auth]
|
|
11
|
+
sess.username = options[:basic_auth][0]
|
|
12
|
+
sess.password = options[:basic_auth][1]
|
|
13
|
+
end
|
|
14
|
+
|
|
15
|
+
sess.connect_timeout = 30
|
|
16
|
+
sess.timeout = 30
|
|
17
|
+
sess.max_redirects = 0
|
|
18
|
+
uri = "#{uri.path}#{uri.query ? '?' : ''}#{uri.query}"
|
|
19
|
+
uri = uri.gsub(' ','%20')
|
|
20
|
+
response = sess.request(method, uri, options[:headers] || {}, {
|
|
21
|
+
data: options[:body]
|
|
22
|
+
})
|
|
23
|
+
headers = {}
|
|
24
|
+
if response.headers
|
|
25
|
+
response.headers.each do |k,v|
|
|
26
|
+
v = v.join(", ") if v.is_a?(Array)
|
|
27
|
+
headers[k] = v
|
|
28
|
+
end
|
|
29
|
+
end
|
|
30
|
+
|
|
31
|
+
status_line_pattern = %r(\AHTTP/(\d+\.\d+)\s+(\d\d\d)\s*([^\r\n]+)?)
|
|
32
|
+
message = response.status_line.match(status_line_pattern)[3] || ""
|
|
33
|
+
|
|
34
|
+
OpenStruct.new({
|
|
35
|
+
body: response.body,
|
|
36
|
+
headers: WebMock::Util::Headers.normalize_headers(headers),
|
|
37
|
+
status: response.status.to_s,
|
|
38
|
+
message: message
|
|
39
|
+
})
|
|
40
|
+
end
|
|
41
|
+
|
|
42
|
+
def client_timeout_exception_class
|
|
43
|
+
Patron::TimeoutError
|
|
44
|
+
end
|
|
45
|
+
|
|
46
|
+
def connection_refused_exception_class
|
|
47
|
+
Patron::ConnectionFailed
|
|
48
|
+
end
|
|
49
|
+
|
|
50
|
+
def http_library
|
|
51
|
+
:patron
|
|
52
|
+
end
|
|
53
|
+
|
|
54
|
+
end
|
|
@@ -0,0 +1,313 @@
|
|
|
1
|
+
shared_context "allowing and disabling net connect" do |*adapter_info|
|
|
2
|
+
describe "when net connect" do
|
|
3
|
+
describe "is allowed", net_connect: true do
|
|
4
|
+
before(:each) do
|
|
5
|
+
WebMock.allow_net_connect!
|
|
6
|
+
end
|
|
7
|
+
|
|
8
|
+
it "should make a real web request if request is not stubbed" do
|
|
9
|
+
expect(http_request(:get, webmock_server_url).status).to eq("200")
|
|
10
|
+
end
|
|
11
|
+
|
|
12
|
+
it "should make a real https request if request is not stubbed" do
|
|
13
|
+
unless http_library == :httpclient
|
|
14
|
+
result = http_request(:get, "https://www.google.com/").body
|
|
15
|
+
if result.respond_to? :encode
|
|
16
|
+
result = result.encode(
|
|
17
|
+
'UTF-8',
|
|
18
|
+
'binary',
|
|
19
|
+
invalid: :replace,
|
|
20
|
+
undef: :replace,
|
|
21
|
+
replace: ''
|
|
22
|
+
)
|
|
23
|
+
end
|
|
24
|
+
expect(result).to match(/.*google.*/)
|
|
25
|
+
end
|
|
26
|
+
end
|
|
27
|
+
|
|
28
|
+
it "should return stubbed response if request was stubbed" do
|
|
29
|
+
stub_request(:get, "www.example.com").to_return(body: "abc")
|
|
30
|
+
expect(http_request(:get, "http://www.example.com/").body).to eq("abc")
|
|
31
|
+
end
|
|
32
|
+
end
|
|
33
|
+
|
|
34
|
+
describe "is not allowed" do
|
|
35
|
+
before(:each) do
|
|
36
|
+
WebMock.disable_net_connect!
|
|
37
|
+
end
|
|
38
|
+
|
|
39
|
+
it "should return stubbed response if request was stubbed" do
|
|
40
|
+
stub_request(:get, "www.example.com").to_return(body: "abc")
|
|
41
|
+
expect(http_request(:get, "http://www.example.com/").body).to eq("abc")
|
|
42
|
+
end
|
|
43
|
+
|
|
44
|
+
it "should return stubbed response if request with path was stubbed" do
|
|
45
|
+
stub_request(:get, "www.example.com/hello_world").to_return(body: "abc")
|
|
46
|
+
expect(http_request(:get, "http://www.example.com/hello_world").body).to eq("abc")
|
|
47
|
+
end
|
|
48
|
+
|
|
49
|
+
it "should raise exception if request was not stubbed" do
|
|
50
|
+
expect {
|
|
51
|
+
http_request(:get, "http://www.example.com/")
|
|
52
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET http://www.example.com/))
|
|
53
|
+
end
|
|
54
|
+
end
|
|
55
|
+
|
|
56
|
+
describe "is not allowed with exception for localhost" do
|
|
57
|
+
before(:each) do
|
|
58
|
+
WebMock.disable_net_connect!(allow_localhost: true)
|
|
59
|
+
end
|
|
60
|
+
|
|
61
|
+
it "should return stubbed response if request was stubbed" do
|
|
62
|
+
stub_request(:get, "www.example.com").to_return(body: "abc")
|
|
63
|
+
expect(http_request(:get, "http://www.example.com/").body).to eq("abc")
|
|
64
|
+
end
|
|
65
|
+
|
|
66
|
+
it "should raise exception if request was not stubbed" do
|
|
67
|
+
expect {
|
|
68
|
+
http_request(:get, "http://www.example.com/")
|
|
69
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET http://www.example.com/))
|
|
70
|
+
end
|
|
71
|
+
|
|
72
|
+
it "should make a real request to localhost" do
|
|
73
|
+
expect {
|
|
74
|
+
http_request(:get, "http://localhost:12345/")
|
|
75
|
+
}.to raise_error(connection_refused_exception_class)
|
|
76
|
+
end
|
|
77
|
+
|
|
78
|
+
it "should make a real request to 127.0.0.1" do
|
|
79
|
+
expect {
|
|
80
|
+
http_request(:get, "http://127.0.0.1:12345/")
|
|
81
|
+
}.to raise_error(connection_refused_exception_class)
|
|
82
|
+
end
|
|
83
|
+
|
|
84
|
+
it "should make a real request to 0.0.0.0" do
|
|
85
|
+
expect {
|
|
86
|
+
http_request(:get, "http://0.0.0.0:12345/")
|
|
87
|
+
}.to raise_error(connection_refused_exception_class)
|
|
88
|
+
end
|
|
89
|
+
end
|
|
90
|
+
|
|
91
|
+
describe "is not allowed, with exceptions" do
|
|
92
|
+
describe "allowing by host string" do
|
|
93
|
+
before :each do
|
|
94
|
+
WebMock.disable_net_connect!(allow: 'httpstat.us')
|
|
95
|
+
end
|
|
96
|
+
|
|
97
|
+
context "when the host is not allowed" do
|
|
98
|
+
it "should return stubbed response if request was stubbed" do
|
|
99
|
+
stub_request(:get, 'disallowed.example.com/foo').to_return(body: "abc")
|
|
100
|
+
expect(http_request(:get, 'http://disallowed.example.com/foo').body).to eq("abc")
|
|
101
|
+
end
|
|
102
|
+
|
|
103
|
+
it "should raise exception if request was not stubbed" do
|
|
104
|
+
expect {
|
|
105
|
+
http_request(:get, 'http://disallowed.example.com/')
|
|
106
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET http://disallowed.example.com))
|
|
107
|
+
end
|
|
108
|
+
end
|
|
109
|
+
|
|
110
|
+
context "when the host is allowed" do
|
|
111
|
+
it "should return stubbed response if request was stubbed" do
|
|
112
|
+
stub_request(:get, 'httpstat.us/200').to_return(body: "abc")
|
|
113
|
+
expect(http_request(:get, "http://httpstat.us/200").body).to eq("abc")
|
|
114
|
+
end
|
|
115
|
+
|
|
116
|
+
# WARNING: this makes a real HTTP request!
|
|
117
|
+
it "should make a real request to allowed host", net_connect: true do
|
|
118
|
+
expect(http_request(:get, "http://httpstat.us/200").status).to eq('200')
|
|
119
|
+
end
|
|
120
|
+
end
|
|
121
|
+
end
|
|
122
|
+
|
|
123
|
+
describe "allowing by host:port string" do
|
|
124
|
+
def replace_with_different_port(uri)
|
|
125
|
+
uri.sub(%r{:(\d+)}){|m0, m1| ':' + ($~[1].to_i + 1).to_s }
|
|
126
|
+
end
|
|
127
|
+
|
|
128
|
+
let(:allowed_host_with_port) { WebMockServer.instance.host_with_port }
|
|
129
|
+
let(:disallowed_host_with_port) { replace_with_different_port(allowed_host_with_port) }
|
|
130
|
+
|
|
131
|
+
before :each do
|
|
132
|
+
WebMock.disable_net_connect!(allow: allowed_host_with_port)
|
|
133
|
+
end
|
|
134
|
+
|
|
135
|
+
context "when the host is not allowed" do
|
|
136
|
+
it "should return stubbed response if request was stubbed" do
|
|
137
|
+
request_url = "http://#{disallowed_host_with_port}/foo"
|
|
138
|
+
stub_request(:get, request_url).to_return(body: "abc")
|
|
139
|
+
expect(http_request(:get, request_url).body).to eq("abc")
|
|
140
|
+
end
|
|
141
|
+
|
|
142
|
+
it "should raise exception if request was not stubbed" do
|
|
143
|
+
request_url = "http://#{disallowed_host_with_port}/foo"
|
|
144
|
+
expect {
|
|
145
|
+
http_request(:get, request_url)
|
|
146
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET #{request_url}))
|
|
147
|
+
end
|
|
148
|
+
end
|
|
149
|
+
|
|
150
|
+
context "when the host is allowed" do
|
|
151
|
+
it "should return stubbed response if request was stubbed" do
|
|
152
|
+
request_url = "http://#{allowed_host_with_port}/foo"
|
|
153
|
+
stub_request(:get, request_url).to_return(body: "abc")
|
|
154
|
+
expect(http_request(:get, request_url).body).to eq('abc')
|
|
155
|
+
end
|
|
156
|
+
|
|
157
|
+
it "should make a real request to allowed host", net_connect: true do
|
|
158
|
+
request_url = "http://#{allowed_host_with_port}/foo"
|
|
159
|
+
expect(http_request(:get, request_url).status).to eq('200')
|
|
160
|
+
end
|
|
161
|
+
end
|
|
162
|
+
end
|
|
163
|
+
|
|
164
|
+
describe "allowing by scheme:host string" do
|
|
165
|
+
before :each do
|
|
166
|
+
WebMock.disable_net_connect!(allow: 'https://www.google.pl')
|
|
167
|
+
end
|
|
168
|
+
|
|
169
|
+
context "when the host and scheme is not allowed" do
|
|
170
|
+
it "should return stubbed response if request was stubbed" do
|
|
171
|
+
stub_request(:get, 'https://disallowed.example.com/foo').to_return(body: "abc")
|
|
172
|
+
expect(http_request(:get, 'https://disallowed.example.com/foo').body).to eq("abc")
|
|
173
|
+
end
|
|
174
|
+
|
|
175
|
+
it "should raise exception if request was not stubbed" do
|
|
176
|
+
expect {
|
|
177
|
+
http_request(:get, 'https://disallowed.example.com/')
|
|
178
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET https://disallowed.example.com))
|
|
179
|
+
end
|
|
180
|
+
|
|
181
|
+
it "should raise exception if request was made to different port" do
|
|
182
|
+
expect {
|
|
183
|
+
http_request(:get, 'https://www.google.pl:80/')
|
|
184
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET https://www.google.pl:80))
|
|
185
|
+
end
|
|
186
|
+
|
|
187
|
+
it "should raise exception if request was made to different scheme" do
|
|
188
|
+
expect {
|
|
189
|
+
http_request(:get, 'http://www.google.pl/')
|
|
190
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET http://www.google.pl))
|
|
191
|
+
end
|
|
192
|
+
end
|
|
193
|
+
|
|
194
|
+
context "when the host is allowed" do
|
|
195
|
+
it "should return stubbed response if request was stubbed" do
|
|
196
|
+
stub_request(:get, 'https://www.google.pl').to_return(body: "abc")
|
|
197
|
+
expect(http_request(:get, "https://www.google.pl/").body).to eq("abc")
|
|
198
|
+
end
|
|
199
|
+
|
|
200
|
+
it "should make a real request to allowed host with scheme", net_connect: true do
|
|
201
|
+
method = http_library == :httpclient ? :head : :get #https://github.com/nahi/httpclient/issues/299
|
|
202
|
+
expect(http_request(method, "https://www.google.pl/").status).to eq('200')
|
|
203
|
+
end
|
|
204
|
+
|
|
205
|
+
it "should make a real request to allowed host with scheme and port", net_connect: true do
|
|
206
|
+
method = http_library == :httpclient ? :head : :get
|
|
207
|
+
expect(http_request(method, "https://www.google.pl:443/").status).to eq('200')
|
|
208
|
+
end
|
|
209
|
+
end
|
|
210
|
+
end
|
|
211
|
+
|
|
212
|
+
describe "allowing by regular expression" do
|
|
213
|
+
before :each do
|
|
214
|
+
WebMock.disable_net_connect!(allow: %r{httpstat})
|
|
215
|
+
end
|
|
216
|
+
|
|
217
|
+
context "when the host is not allowed" do
|
|
218
|
+
it "should return stubbed response if request was stubbed" do
|
|
219
|
+
stub_request(:get, 'disallowed.example.com/foo').to_return(body: "abc")
|
|
220
|
+
expect(http_request(:get, 'http://disallowed.example.com/foo').body).to eq("abc")
|
|
221
|
+
end
|
|
222
|
+
|
|
223
|
+
it "should raise exception if request was not stubbed" do
|
|
224
|
+
expect {
|
|
225
|
+
http_request(:get, 'http://disallowed.example.com/')
|
|
226
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET http://disallowed.example.com))
|
|
227
|
+
end
|
|
228
|
+
end
|
|
229
|
+
|
|
230
|
+
context "when the host is allowed" do
|
|
231
|
+
it "should return stubbed response if request was stubbed" do
|
|
232
|
+
stub_request(:get, 'httpstat.us/200').to_return(body: "abc")
|
|
233
|
+
expect(http_request(:get, "http://httpstat.us/200").body).to eq("abc")
|
|
234
|
+
end
|
|
235
|
+
|
|
236
|
+
# WARNING: this makes a real HTTP request!
|
|
237
|
+
it "should make a real request to allowed host", net_connect: true do
|
|
238
|
+
expect(http_request(:get, "http://httpstat.us/200").status).to eq('200')
|
|
239
|
+
end
|
|
240
|
+
|
|
241
|
+
it "should make a real request if request is allowed by path regexp and url contains default port", net_connect: true do
|
|
242
|
+
WebMock.disable_net_connect!(allow: %r{www.google.pl/webhp})
|
|
243
|
+
method = http_library == :httpclient ? :head : :get
|
|
244
|
+
expect(http_request(method, 'https://www.google.pl:443/webhp').status).to eq('200')
|
|
245
|
+
end
|
|
246
|
+
end
|
|
247
|
+
end
|
|
248
|
+
|
|
249
|
+
describe "allowing by a callable" do
|
|
250
|
+
before :each do
|
|
251
|
+
WebMock.disable_net_connect!(allow: lambda{|url| url.to_str.include?('httpstat') })
|
|
252
|
+
end
|
|
253
|
+
|
|
254
|
+
context "when the host is not allowed" do
|
|
255
|
+
it "should return stubbed response if request was stubbed" do
|
|
256
|
+
stub_request(:get, 'disallowed.example.com/foo').to_return(body: "abc")
|
|
257
|
+
expect(http_request(:get, 'http://disallowed.example.com/foo').body).to eq("abc")
|
|
258
|
+
end
|
|
259
|
+
|
|
260
|
+
it "should raise exception if request was not stubbed" do
|
|
261
|
+
expect {
|
|
262
|
+
http_request(:get, 'http://disallowed.example.com/')
|
|
263
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET http://disallowed.example.com))
|
|
264
|
+
end
|
|
265
|
+
end
|
|
266
|
+
|
|
267
|
+
context "when the host is allowed" do
|
|
268
|
+
it "should return stubbed response if request was stubbed" do
|
|
269
|
+
stub_request(:get, 'httpstat.us/200').to_return(body: "abc")
|
|
270
|
+
expect(http_request(:get, "http://httpstat.us/200").body).to eq("abc")
|
|
271
|
+
end
|
|
272
|
+
|
|
273
|
+
# WARNING: this makes a real HTTP request!
|
|
274
|
+
it "should make a real request to allowed host", net_connect: true do
|
|
275
|
+
expect(http_request(:get, "http://httpstat.us/200").status).to eq('200')
|
|
276
|
+
end
|
|
277
|
+
end
|
|
278
|
+
end
|
|
279
|
+
|
|
280
|
+
describe "allowing by a list of the above" do
|
|
281
|
+
before :each do
|
|
282
|
+
WebMock.disable_net_connect!(allow: [lambda{|_| false }, %r{foobar}, 'httpstat.us'])
|
|
283
|
+
end
|
|
284
|
+
|
|
285
|
+
context "when the host is not allowed" do
|
|
286
|
+
it "should return stubbed response if request was stubbed" do
|
|
287
|
+
stub_request(:get, 'disallowed.example.com/foo').to_return(body: "abc")
|
|
288
|
+
expect(http_request(:get, 'http://disallowed.example.com/foo').body).to eq("abc")
|
|
289
|
+
end
|
|
290
|
+
|
|
291
|
+
it "should raise exception if request was not stubbed" do
|
|
292
|
+
expect {
|
|
293
|
+
http_request(:get, 'http://disallowed.example.com/')
|
|
294
|
+
}.to raise_error(WebMock::NetConnectNotAllowedError, %r(Real HTTP connections are disabled. Unregistered request: GET http://disallowed.example.com))
|
|
295
|
+
end
|
|
296
|
+
end
|
|
297
|
+
|
|
298
|
+
context "when the host is allowed" do
|
|
299
|
+
it "should return stubbed response if request was stubbed" do
|
|
300
|
+
stub_request(:get, 'httpstat.us/200').to_return(body: "abc")
|
|
301
|
+
expect(http_request(:get, "http://httpstat.us/200").body).to eq("abc")
|
|
302
|
+
end
|
|
303
|
+
|
|
304
|
+
# WARNING: this makes a real HTTP request!
|
|
305
|
+
it "should make a real request to allowed host", net_connect: true do
|
|
306
|
+
expect(http_request(:get, "http://httpstat.us/200").status).to eq('200')
|
|
307
|
+
end
|
|
308
|
+
end
|
|
309
|
+
end
|
|
310
|
+
|
|
311
|
+
end
|
|
312
|
+
end
|
|
313
|
+
end
|