Files
deb-python-wsgi-intercept/test/test_module_interceptor.py
Chris Dent 2504de1f73 pep8 fixes to get pep8 tox target passing
This is basic flake8 testing without any 'hacking' extensions. We
may wish to add those later, but for the time being this code is
so much of its own particular style that that would be painful.
In any case, the hacking rules aren't that great.

In the process some documentation adjustments were made while fixing
line lenghts. A dead link was removed.
2016-09-22 19:27:01 +01:00

39 lines
926 B
Python

"""Test intercepting a full module with interceptor."""
from uuid import uuid4
from httplib2 import Http
from wsgi_intercept.interceptor import Httplib2Interceptor
from .wsgi_app import simple_app
def app():
return simple_app
def setup_module(module):
module.host = str(uuid4())
module.intercept = Httplib2Interceptor(app, host=module.host)
module.intercept.install_intercept()
def teardown_module(module):
module.intercept.uninstall_intercept()
def test_simple_request():
global host
http = Http()
response, content = http.request('http://%s/' % host)
assert response.status == 200
assert 'WSGI intercept successful!' in content.decode('utf-8')
def test_another_request():
global host
http = Http()
response, content = http.request('http://%s/foobar' % host)
assert response.status == 200
assert 'WSGI intercept successful!' in content.decode('utf-8')