spec/httpi/adapter/curb_spec.rb in httpi-2.4.1 vs spec/httpi/adapter/curb_spec.rb in httpi-2.4.2
- old
+ new
@@ -18,11 +18,11 @@
end
it "supports ntlm authentication" do
request = HTTPI::Request.new(@server.url + "ntlm-auth")
adapter = HTTPI::Adapter::Curb.new(request)
-
+
request.auth.ntlm("tester", "vReqSoafRe5O")
expect(adapter.request(:get).body).to eq("ntlm-auth")
end
end
@@ -255,12 +255,12 @@
adapter.request(:get)
end
it 'to 2 when ssl_version is specified as SSLv2/SSLv23' do
- version = OpenSSL::SSL::SSLContext::METHODS.reject { |method| method.match /server|client/ }
- version = version.select { |method| method.to_s.match /SSLv2|SSLv23/ }.first
+ version = OpenSSL::SSL::SSLContext::METHODS.reject { |method| method.match(/server|client/) }
+ version = version.select { |method| method.to_s.match(/SSLv2|SSLv23/) }.first
request.auth.ssl.ssl_version = version
curb.expects(:ssl_version=).with(2)
adapter.request(:get)
end
@@ -277,24 +277,27 @@
context "(for SSL client auth)" do
let(:request) do
request = HTTPI::Request.new("http://example.com")
request.auth.ssl.cert_key_file = "spec/fixtures/client_key.pem"
request.auth.ssl.cert_file = "spec/fixtures/client_cert.pem"
+ request.auth.ssl.cert_key_password = 'example'
request
end
it "send certificate regardless of state of SSL verify mode" do
request.auth.ssl.verify_mode = :none
curb.expects(:ssl_verify_host=).with(0) # avoid "SSL peer certificate" error
curb.expects(:cert_key=).with(request.auth.ssl.cert_key_file)
curb.expects(:cert=).with(request.auth.ssl.cert_file)
+ curb.expects(:certpassword=).with(request.auth.ssl.cert_key_password)
adapter.request(:get)
end
it "cert_key, cert and ssl_verify_peer should be set" do
curb.expects(:cert_key=).with(request.auth.ssl.cert_key_file)
curb.expects(:cert=).with(request.auth.ssl.cert_file)
+ curb.expects(:certpassword=).with(request.auth.ssl.cert_key_password)
curb.expects(:ssl_verify_peer=).with(true)
curb.expects(:certtype=).with(request.auth.ssl.cert_type.to_s.upcase)
adapter.request(:get)
end