Sha256: dde21d5095513a77925a0e66e2e95829f347d6213a91b93ac3233122742d6369
Contents?: true
Size: 874 Bytes
Versions: 1
Compression:
Stored size: 874 Bytes
Contents
require 'test_helper' require 'resque/failure/redis' context 'Resque::Failure::Redis' do setup do @bad_string = [39, 250, 141, 168, 138, 191, 52, 211, 159, 86, 93, 95, 39].map { |c| c.chr }.join exception = StandardError.exception(@bad_string) worker = Resque::Worker.new(:test) queue = 'queue' payload = { 'class' => Object, 'args' => 3 } @redis_backend = Resque::Failure::Redis.new(exception, worker, queue, payload) end test 'cleans up bad strings before saving the failure, in order to prevent errors on the resque UI' do # test assumption: the bad string should not be able to round trip though JSON assert_raises(MultiJson::DecodeError) do MultiJson.decode(MultiJson.encode(@bad_string)) end @redis_backend.save Resque::Failure::Redis.all # should not raise an error end end
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
resque-loner-1.3.0 | test/resque_failure_redis_test.rb |