summaryrefslogtreecommitdiff
path: root/spec/unit/http
Commit message (Collapse)AuthorAgeFilesLines
* autofixing whitespace copsLamont Granquist2016-02-055-19/+17
| | | | | | | | | | | | | | | | | | | | | | 4174 Style/SpaceInsideHashLiteralBraces 1860 Style/SpaceAroundOperators 1336 Style/SpaceInsideBlockBraces 1292 Style/AlignHash 997 Style/SpaceAfterComma 860 Style/SpaceAroundEqualsInParameterDefault 310 Style/EmptyLines 294 Style/IndentationConsistency 267 Style/TrailingWhitespace 238 Style/ExtraSpacing 212 Style/SpaceBeforeBlockBraces 166 Style/MultilineOperationIndentation 144 Style/TrailingBlankLines 120 Style/EmptyLineBetweenDefs 101 Style/IndentationWidth 82 Style/SpaceAroundBlockParameters 40 Style/EmptyLinesAroundMethodBody 29 Style/EmptyLinesAroundAccessModifier 1 Style/RescueEnsureAlignment
* Update all auth email address from opscode.com and getchef.com to chef.io.Noah Kantrowitz2016-02-024-4/+4
| | | Generated via git ls-files | xargs perl -pi -e "s/(Author.*?<[^@]+@)(?:opscode\\.com|getchef\\.com)(>)/\\1chef.io\\2/gi"
* Replace all Opscode copyrights with Chef Software.Noah Kantrowitz2016-02-021-1/+1
| | | Created via git ls-files | xargs perl -pi -e "s/(Copyright.*?), Opscode(,)? Inc(\.)?/\\1, Chef Software Inc./gi"
* Copyright year update for 2016 and massive cleanup.Noah Kantrowitz2016-02-027-7/+7
| | | Generated via git ls-files | xargs perl -pi -e "s/[Cc]opyright (?:\([Cc]\) )?((?\!$(date +%Y))\\d{4})(-\\d{4})?([, ][ \d]+)*(,|(?= ))/Copyright \\1-$(date +%Y),/g"
* Skip Version0 encrypted databag tests when in fips modeJay Mundrawala2016-01-251-1/+1
| | | | | | aes-256-cbc does not seem to work when openssl is in fips mode. The only other reference I could find to this was: https://access.redhat.com/solutions/176633
* Pass headers to mixlib-authenticationJay Mundrawala2016-01-251-1/+3
|
* Use double quotes by defaultThom May2016-01-148-45/+45
| | | | | | | This is an entirely mechanically generated (chefstyle -a) change, to go along with chef/chefstyle#5 . We should pick something and use it consistently, and my opinion is that double quotes are the appropriate thing.
* autocorrecting Style/TrailingCommalcg/trailing_commaLamont Granquist2016-01-132-2/+2
| | | | chefstyle -a fixed 1044 occurrances
* Added versioned Chef Object API support code and repaired Chef::User.create.tylercloke2015-06-051-2/+11
| | | | Also added Chef::User.create V1 API support. Chef::User.create will attempt to use V1 of the server API, and if it fails, it will fall back to V0.
* Add regression test.fix-empty-proxyJon Morrow2015-05-071-0/+16
|
* Nice error handling for unsupported API version in formatters/*.rb.tylercloke2015-05-041-0/+69
|
* Fixes 2140 - Honor Proxy from EnvJon Morrow2015-04-141-6/+43
| | | | | | | | | This change adds support to Chef's core http libs to honor a proxy uri set in the environment not just chef/knife config. It also adds support for username and password both in uri and env. The order of precidence for values is uri, config, env.
* Extract socketless client and add specsdanielsdeleo2015-04-011-0/+174
|
* Execute and Script Resource improvementsLamont Granquist2014-12-081-2/+7
| | | | | | | | | | | - Warning on incorrect usage of the command resource in any script resource - Warning on code in script resource being nil - Specs added to force deprecation of incorrect usage in Chef-13 - Specs added around the (supported) incorrect usage in Chef-12 - Cleanup+Modernization of providers and specs - Fixed some global state bugs around the Chef::Log.level in the spec tests
* Update to RSpec 3.Claire McQuin2014-10-295-42/+42
|
* Allow requests to opt-out from JSON encoding the bodydanielsdeleo2014-07-301-0/+128
| | | | | | | | * JSONInput middleware now checks the incoming headers for a Content-Type; if set to a non-json type, the body is passed through unchanged. This allows us to use our normal HTTP client objects to make requests with non-JSON bodies, such as file uploads. * Add test coverage for the JSONInput middleware.
* Add url scheme to proxy, if not present.Claire McQuin2014-07-091-1/+35
|
* Add specs for CHEF-5355. Only pass on port in Host header when port is ↵Klaas Jan Wierenga2014-06-071-0/+91
| | | | different from default port for URI scheme.
* add tests for chef/http/basic_clientCam Cope2014-06-051-0/+42
|
* CHEF-5198: a better fixLamont Granquist2014-04-091-1/+1
| | | | | | | | - reverts previous fix to CHEF-5198 - applies stream handler middleware in (proper) reverse order - adds debugging around middleware application - moves dumping of response header debugging to before applying response/streaming middleware
* fix spec testLamont Granquist2014-04-091-1/+1
| | | | | | | compared to the same test in rest_spec.rb this makes no sense at all why we need to invert it, and its clear to me why this bug got through code review because it looks obviously correct. it looks very obviously wrong now, but it works.
* CHEF-5100:Lamont Granquist2014-03-272-0/+219
| | | | | | - Enable Content Validation Check for Chef::HTTP::Simple - Tidy up debug logs / comments - More specs.
* Fix error caused by loading duplicate trusted certsdanielsdeleo2013-10-181-0/+9
|
* Add a directory where trusted certs can be storeddanielsdeleo2013-10-171-0/+28
|
* Add API SSL policydanielsdeleo2013-10-161-56/+77
| | | | Adds config option to verify SSL certs for API requests only
* Move SSL policy specs to class-specific test filedanielsdeleo2013-10-161-0/+112