aboutsummaryrefslogtreecommitdiff
path: root/core
diff options
context:
space:
mode:
authorSam Guymer <sam@guymer.me>2018-05-17 20:11:22 +1000
committerSam Guymer <sam@guymer.me>2018-05-19 00:37:52 +1000
commit92e10991df0d168d1972d4618fcc7e02e2e0a0fa (patch)
tree14e0d112fd47856a8c87ad1782d51a928b01bbf6 /core
parent588395d018c258eb74f60ad95bad706698bdf915 (diff)
downloadsttp-92e10991df0d168d1972d4618fcc7e02e2e0a0fa.tar.gz
sttp-92e10991df0d168d1972d4618fcc7e02e2e0a0fa.tar.bz2
sttp-92e10991df0d168d1972d4618fcc7e02e2e0a0fa.zip
Move backend tests into their projects
Instead of having a single project which tests all backends, each backend now implements a http test trait along with a streaming test trait if it supports streaming. The test http server has been moved into its own project and is started automatically before running a backends test. This allows each backend to be tested without the possibility of dependency eviction from another backend or the test http server. It also has the side effect of parallelizing the tests providing a speed up when run with multiple cores.
Diffstat (limited to 'core')
-rw-r--r--core/src/main/scala/com/softwaremill/sttp/MonadError.scala9
-rw-r--r--core/src/test/scala/com/softwaremill/sttp/testing/ConvertToFuture.scala (renamed from core/src/test/scala/com/softwaremill/sttp/testing/streaming/ConvertToFuture.scala)2
-rw-r--r--core/src/test/scala/com/softwaremill/sttp/testing/CustomMatchers.scala22
-rw-r--r--core/src/test/scala/com/softwaremill/sttp/testing/ForceWrapped.scala30
-rw-r--r--core/src/test/scala/com/softwaremill/sttp/testing/HttpTest.scala526
-rw-r--r--core/src/test/scala/com/softwaremill/sttp/testing/streaming/StreamingTest.scala65
-rw-r--r--core/src/test/scala/com/softwaremill/sttp/testing/streaming/TestStreamingBackend.scala1
7 files changed, 654 insertions, 1 deletions
diff --git a/core/src/main/scala/com/softwaremill/sttp/MonadError.scala b/core/src/main/scala/com/softwaremill/sttp/MonadError.scala
index a783765..b5b1852 100644
--- a/core/src/main/scala/com/softwaremill/sttp/MonadError.scala
+++ b/core/src/main/scala/com/softwaremill/sttp/MonadError.scala
@@ -31,6 +31,15 @@ trait MonadAsyncError[R[_]] extends MonadError[R] {
def async[T](register: (Either[Throwable, T] => Unit) => Unit): R[T]
}
+object syntax {
+
+ implicit final class MonadErrorOps[R[_], A](val r: R[A]) extends AnyVal {
+ def map[B](f: A => B)(implicit ME: MonadError[R]): R[B] = ME.map(r)(f)
+ def flatMap[B](f: A => R[B])(implicit ME: MonadError[R]): R[B] =
+ ME.flatMap(r)(f)
+ }
+}
+
object IdMonad extends MonadError[Id] {
override def unit[T](t: T): Id[T] = t
override def map[T, T2](fa: Id[T])(f: (T) => T2): Id[T2] = f(fa)
diff --git a/core/src/test/scala/com/softwaremill/sttp/testing/streaming/ConvertToFuture.scala b/core/src/test/scala/com/softwaremill/sttp/testing/ConvertToFuture.scala
index 9438890..25a7d8e 100644
--- a/core/src/test/scala/com/softwaremill/sttp/testing/streaming/ConvertToFuture.scala
+++ b/core/src/test/scala/com/softwaremill/sttp/testing/ConvertToFuture.scala
@@ -1,4 +1,4 @@
-package com.softwaremill.sttp.testing.streaming
+package com.softwaremill.sttp.testing
import com.softwaremill.sttp.Id
import scala.concurrent.Future
diff --git a/core/src/test/scala/com/softwaremill/sttp/testing/CustomMatchers.scala b/core/src/test/scala/com/softwaremill/sttp/testing/CustomMatchers.scala
new file mode 100644
index 0000000..a6984c8
--- /dev/null
+++ b/core/src/test/scala/com/softwaremill/sttp/testing/CustomMatchers.scala
@@ -0,0 +1,22 @@
+package com.softwaremill.sttp.testing
+
+import java.nio.file.{Files, Paths}
+import java.{io, util}
+
+import org.scalatest.matchers.{MatchResult, Matcher}
+
+object CustomMatchers {
+ class FileContentsMatch(file: java.io.File) extends Matcher[java.io.File] {
+ override def apply(left: io.File): MatchResult = {
+ val inBA = Files.readAllBytes(Paths.get(left.getAbsolutePath))
+ val expectedBA = Files.readAllBytes(Paths.get(file.getAbsolutePath))
+ MatchResult(
+ util.Arrays.equals(inBA, expectedBA),
+ "The files' contents are not the same",
+ "The files' contents are the same"
+ )
+ }
+ }
+
+ def haveSameContentAs(file: io.File) = new FileContentsMatch(file)
+}
diff --git a/core/src/test/scala/com/softwaremill/sttp/testing/ForceWrapped.scala b/core/src/test/scala/com/softwaremill/sttp/testing/ForceWrapped.scala
new file mode 100644
index 0000000..f73833f
--- /dev/null
+++ b/core/src/test/scala/com/softwaremill/sttp/testing/ForceWrapped.scala
@@ -0,0 +1,30 @@
+package com.softwaremill.sttp.testing
+
+import org.scalatest.Suite
+import org.scalatest.concurrent.{PatienceConfiguration, ScalaFutures}
+import org.scalatest.exceptions.TestFailedException
+
+import scala.concurrent.Future
+import scala.concurrent.duration._
+import scala.language.higherKinds
+
+trait ForceWrapped extends ScalaFutures with TestingPatience { this: Suite =>
+
+ implicit class ForceDecorator[R[_], T](wrapped: R[T]) {
+ def toFuture()(implicit ctf: ConvertToFuture[R]): Future[T] =
+ ctf.toFuture(wrapped)
+
+ def force()(implicit ctf: ConvertToFuture[R]): T = {
+ try {
+ ctf.toFuture(wrapped).futureValue
+ } catch {
+ case e: TestFailedException if e.getCause != null => throw e.getCause
+ }
+ }
+ }
+}
+
+trait TestingPatience extends PatienceConfiguration {
+ override implicit val patienceConfig: PatienceConfig =
+ PatienceConfig(timeout = 5.seconds, interval = 150.milliseconds)
+}
diff --git a/core/src/test/scala/com/softwaremill/sttp/testing/HttpTest.scala b/core/src/test/scala/com/softwaremill/sttp/testing/HttpTest.scala
new file mode 100644
index 0000000..f1fa002
--- /dev/null
+++ b/core/src/test/scala/com/softwaremill/sttp/testing/HttpTest.scala
@@ -0,0 +1,526 @@
+package com.softwaremill.sttp.testing
+
+import java.io.{ByteArrayInputStream, IOException}
+import java.nio.ByteBuffer
+import java.nio.file.Paths
+import java.time.{ZoneId, ZonedDateTime}
+
+import better.files._
+import com.softwaremill.sttp._
+import com.softwaremill.sttp.testing.CustomMatchers._
+import org.scalatest.concurrent.{IntegrationPatience, ScalaFutures}
+import org.scalatest.{BeforeAndAfterAll, BeforeAndAfterEach, FreeSpec, Matchers, OptionValues}
+
+import scala.concurrent.duration._
+import scala.language.higherKinds
+
+trait HttpTest[R[_]]
+ extends FreeSpec
+ with Matchers
+ with ForceWrapped
+ with ScalaFutures
+ with OptionValues
+ with IntegrationPatience
+ with BeforeAndAfterEach
+ with BeforeAndAfterAll {
+
+ private val endpoint = "localhost:51823"
+
+ override def afterEach() {
+ val file = File(outPath)
+ if (file.exists) file.delete()
+ }
+
+ private val textFile =
+ new java.io.File("test-server/src/main/resources/textfile.txt")
+ private val binaryFile =
+ new java.io.File("test-server/src/main/resources/binaryfile.jpg")
+ private val outPath = File.newTemporaryDirectory().path
+ private val textWithSpecialCharacters = "Żółć!"
+
+ implicit val backend: SttpBackend[R, Nothing]
+ implicit val convertToFuture: ConvertToFuture[R]
+
+ private val postEcho = sttp.post(uri"$endpoint/echo")
+ private val testBody = "this is the body"
+ private val testBodyBytes = testBody.getBytes("UTF-8")
+ private val expectedPostEchoResponse = "POST /echo this is the body"
+
+ private val sttpIgnore = com.softwaremill.sttp.ignore
+
+ "parse response" - {
+ "as string" in {
+ val response = postEcho.body(testBody).send().force()
+ response.unsafeBody should be(expectedPostEchoResponse)
+ }
+
+ "as string with mapping using map" in {
+ val response = postEcho
+ .body(testBody)
+ .response(asString.map(_.length))
+ .send()
+ .force()
+ response.unsafeBody should be(expectedPostEchoResponse.length)
+ }
+
+ "as string with mapping using mapResponse" in {
+ val response = postEcho
+ .body(testBody)
+ .mapResponse(_.length)
+ .send()
+ .force()
+ response.unsafeBody should be(expectedPostEchoResponse.length)
+ }
+
+ "as a byte array" in {
+ val response =
+ postEcho.body(testBody).response(asByteArray).send().force()
+ val fc = new String(response.unsafeBody, "UTF-8")
+ fc should be(expectedPostEchoResponse)
+ }
+
+ "as parameters" in {
+ val params = List("a" -> "b", "c" -> "d", "e=" -> "&f")
+ val response = sttp
+ .post(uri"$endpoint/echo/form_params/as_params")
+ .body(params: _*)
+ .response(asParams)
+ .send()
+ .force()
+ response.unsafeBody.toList should be(params)
+ }
+ }
+
+ "parameters" - {
+ "make a get request with parameters" in {
+ val response = sttp
+ .get(uri"$endpoint/echo?p2=v2&p1=v1")
+ .send()
+ .force()
+
+ response.unsafeBody should be("GET /echo p1=v1 p2=v2")
+ }
+ }
+
+ "body" - {
+ "post a string" in {
+ val response = postEcho.body(testBody).send().force()
+ response.unsafeBody should be(expectedPostEchoResponse)
+ }
+
+ "post a byte array" in {
+ val response =
+ postEcho.body(testBodyBytes).send().force()
+ response.unsafeBody should be(expectedPostEchoResponse)
+ }
+
+ "post an input stream" in {
+ val response = postEcho
+ .body(new ByteArrayInputStream(testBodyBytes))
+ .send()
+ .force()
+ response.unsafeBody should be(expectedPostEchoResponse)
+ }
+
+ "post a byte buffer" in {
+ val response = postEcho
+ .body(ByteBuffer.wrap(testBodyBytes))
+ .send()
+ .force()
+ response.unsafeBody should be(expectedPostEchoResponse)
+ }
+
+ "post a file" in {
+ val f = File.newTemporaryFile().write(testBody)
+ try {
+ val response = postEcho.body(f.toJava).send().force()
+ response.unsafeBody should be(expectedPostEchoResponse)
+ } finally f.delete()
+ }
+
+ "post a path" in {
+ val f = File.newTemporaryFile().write(testBody)
+ try {
+ val response =
+ postEcho.body(f.toJava.toPath).send().force()
+ response.unsafeBody should be(expectedPostEchoResponse)
+ } finally f.delete()
+ }
+
+ "post form data" in {
+ val response = sttp
+ .post(uri"$endpoint/echo/form_params/as_string")
+ .body("a" -> "b", "c" -> "d")
+ .send()
+ .force()
+ response.unsafeBody should be("a=b c=d")
+ }
+
+ "post form data with special characters" in {
+ val response = sttp
+ .post(uri"$endpoint/echo/form_params/as_string")
+ .body("a=" -> "/b", "c:" -> "/d")
+ .send()
+ .force()
+ response.unsafeBody should be("a==/b c:=/d")
+ }
+
+ "post without a body" in {
+ val response = postEcho.send().force()
+ response.unsafeBody should be("POST /echo")
+ }
+ }
+
+ "headers" - {
+ val getHeaders = sttp.get(uri"$endpoint/set_headers")
+
+ "read response headers" in {
+ val response = getHeaders.response(sttpIgnore).send().force()
+ response.headers should have length (6)
+ response.headers("Cache-Control").toSet should be(Set("no-cache", "max-age=1000"))
+ response.header("Server") should be('defined)
+ response.header("server") should be('defined)
+ response.header("Server").get should startWith("akka-http")
+ response.contentType should be(Some("text/plain; charset=UTF-8"))
+ response.contentLength should be(Some(2L))
+ }
+ }
+
+ "errors" - {
+ val getHeaders = sttp.post(uri"$endpoint/set_headers")
+
+ "return 405 when method not allowed" in {
+ val response = getHeaders.response(sttpIgnore).send().force()
+ response.code should be(405)
+ response.isClientError should be(true)
+ response.body should be('left)
+ }
+ }
+
+ "cookies" - {
+ "read response cookies" in {
+ val response =
+ sttp
+ .get(uri"$endpoint/set_cookies")
+ .response(sttpIgnore)
+ .send()
+ .force()
+ response.cookies should have length (3)
+ response.cookies.toSet should be(
+ Set(
+ Cookie("cookie1", "value1", secure = true, httpOnly = true, maxAge = Some(123L)),
+ Cookie("cookie2", "value2"),
+ Cookie("cookie3", "", domain = Some("xyz"), path = Some("a/b/c"))
+ ))
+ }
+
+ "read response cookies with the expires attribute" in {
+ val response = sttp
+ .get(uri"$endpoint/set_cookies/with_expires")
+ .response(sttpIgnore)
+ .send()
+ .force()
+ response.cookies should have length (1)
+ val c = response.cookies(0)
+
+ c.name should be("c")
+ c.value should be("v")
+ c.expires.map(_.toInstant.toEpochMilli) should be(
+ Some(
+ ZonedDateTime
+ .of(1997, 12, 8, 12, 49, 12, 0, ZoneId.of("GMT"))
+ .toInstant
+ .toEpochMilli
+ ))
+ }
+ }
+
+ "auth" - {
+ val secureBasic = sttp.get(uri"$endpoint/secure_basic")
+
+ "return a 401 when authorization fails" in {
+ val req = secureBasic
+ val resp = req.send().force()
+ resp.code should be(401)
+ resp.header("WWW-Authenticate") should be(Some("""Basic realm="test realm",charset=UTF-8"""))
+ }
+
+ "perform basic authorization" in {
+ val req = secureBasic.auth.basic("adam", "1234")
+ val resp = req.send().force()
+ resp.code should be(200)
+ resp.unsafeBody should be("Hello, adam!")
+ }
+ }
+
+ "compression" - {
+ val compress = sttp.get(uri"$endpoint/compress")
+ val decompressedBody = "I'm compressed!"
+
+ "decompress using the default accept encoding header" in {
+ val req = compress
+ val resp = req.send().force()
+ resp.unsafeBody should be(decompressedBody)
+ }
+
+ "decompress using gzip" in {
+ val req =
+ compress.header("Accept-Encoding", "gzip", replaceExisting = true)
+ val resp = req.send().force()
+ resp.unsafeBody should be(decompressedBody)
+ }
+
+ "decompress using deflate" in {
+ val req =
+ compress.header("Accept-Encoding", "deflate", replaceExisting = true)
+ val resp = req.send().force()
+ resp.unsafeBody should be(decompressedBody)
+ }
+
+ "work despite providing an unsupported encoding" in {
+ val req =
+ compress.header("Accept-Encoding", "br", replaceExisting = true)
+ val resp = req.send().force()
+ resp.unsafeBody should be(decompressedBody)
+ }
+ }
+
+ "download file" - {
+
+ "download a binary file using asFile" in {
+ val file = outPath.resolve("binaryfile.jpg").toFile
+ val req =
+ sttp.get(uri"$endpoint/download/binary").response(asFile(file))
+ val resp = req.send().force()
+
+ resp.unsafeBody shouldBe file
+ file should exist
+ file should haveSameContentAs(binaryFile)
+ }
+
+ "download a text file using asFile" in {
+ val file = outPath.resolve("textfile.txt").toFile
+ val req =
+ sttp.get(uri"$endpoint/download/text").response(asFile(file))
+ val resp = req.send().force()
+
+ resp.unsafeBody shouldBe file
+ file should exist
+ file should haveSameContentAs(textFile)
+ }
+
+ "download a binary file using asPath" in {
+ val path = outPath.resolve("binaryfile.jpg")
+ val req =
+ sttp.get(uri"$endpoint/download/binary").response(asPath(path))
+ val resp = req.send().force()
+
+ resp.unsafeBody shouldBe path
+ path.toFile should exist
+ path.toFile should haveSameContentAs(binaryFile)
+ }
+
+ "download a text file using asPath" in {
+ val path = outPath.resolve("textfile.txt")
+ val req =
+ sttp.get(uri"$endpoint/download/text").response(asPath(path))
+ val resp = req.send().force()
+
+ resp.unsafeBody shouldBe path
+ path.toFile should exist
+ path.toFile should haveSameContentAs(textFile)
+ }
+
+ "fail at trying to save file to a restricted location" in {
+ val path = Paths.get("/").resolve("textfile.txt")
+ val req =
+ sttp.get(uri"$endpoint/download/text").response(asPath(path))
+ val caught = intercept[IOException] {
+ req.send().force()
+ }
+
+ caught.getMessage shouldBe "Permission denied"
+ }
+
+ "fail when file exists and overwrite flag is false" in {
+ val path = outPath.resolve("textfile.txt")
+ path.toFile.getParentFile.mkdirs()
+ path.toFile.createNewFile()
+ val req =
+ sttp.get(uri"$endpoint/download/text").response(asPath(path))
+
+ val caught = intercept[IOException] {
+ req.send().force()
+ }
+
+ caught.getMessage shouldBe s"File ${path.toFile.getAbsolutePath} exists - overwriting prohibited"
+
+ }
+
+ "not fail when file exists and overwrite flag is true" in {
+ val path = outPath.resolve("textfile.txt")
+ path.toFile.getParentFile.mkdirs()
+ path.toFile.createNewFile()
+ val req =
+ sttp
+ .get(uri"$endpoint/download/text")
+ .response(asPath(path, overwrite = true))
+ val resp = req.send().force()
+
+ resp.unsafeBody shouldBe path
+ path.toFile should exist
+ path.toFile should haveSameContentAs(textFile)
+ }
+ }
+
+ "multipart" - {
+ val mp = sttp.post(uri"$endpoint/multipart")
+
+ "send a multipart message" in {
+ val req = mp.multipartBody(multipart("p1", "v1"), multipart("p2", "v2"))
+ val resp = req.send().force()
+ resp.unsafeBody should be("p1=v1, p2=v2")
+ }
+
+ "send a multipart message with filenames" in {
+ val req = mp.multipartBody(multipart("p1", "v1").fileName("f1"), multipart("p2", "v2").fileName("f2"))
+ val resp = req.send().force()
+ resp.unsafeBody should be("p1=v1 (f1), p2=v2 (f2)")
+ }
+
+ "send a multipart message with a file" in {
+ val f = File.newTemporaryFile().write(testBody)
+ try {
+ val req =
+ mp.multipartBody(multipart("p1", f.toJava), multipart("p2", "v2"))
+ val resp = req.send().force()
+ resp.unsafeBody should be(s"p1=$testBody (${f.name}), p2=v2")
+ } finally f.delete()
+ }
+ }
+
+ "redirect" - {
+ val r1 = sttp.post(uri"$endpoint/redirect/r1")
+ val r2 = sttp.post(uri"$endpoint/redirect/r2")
+ val r3 = sttp.post(uri"$endpoint/redirect/r3")
+ val r4response = "819"
+ val loop = sttp.post(uri"$endpoint/redirect/loop")
+
+ "not redirect when redirects shouldn't be followed (temporary)" in {
+ val resp = r1.followRedirects(false).send().force()
+ resp.code should be(307)
+ resp.body should be('left)
+ resp.history should be('empty)
+ }
+
+ "not redirect when redirects shouldn't be followed (permanent)" in {
+ val resp = r2.followRedirects(false).send().force()
+ resp.code should be(308)
+ resp.body should be('left)
+ }
+
+ "redirect when redirects should be followed" in {
+ val resp = r2.send().force()
+ resp.code should be(200)
+ resp.unsafeBody should be(r4response)
+ }
+
+ "redirect twice when redirects should be followed" in {
+ val resp = r1.send().force()
+ resp.code should be(200)
+ resp.unsafeBody should be(r4response)
+ }
+
+ "redirect when redirects should be followed, and the response is parsed" in {
+ val resp = r2.response(asString.map(_.toInt)).send().force()
+ resp.code should be(200)
+ resp.unsafeBody should be(r4response.toInt)
+ }
+
+ "keep a single history entry of redirect responses" in {
+ val resp = r3.send().force()
+ resp.code should be(200)
+ resp.unsafeBody should be(r4response)
+ resp.history should have size (1)
+ resp.history(0).code should be(302)
+ }
+
+ "keep whole history of redirect responses" in {
+ val resp = r1.send().force()
+ resp.code should be(200)
+ resp.unsafeBody should be(r4response)
+ resp.history should have size (3)
+ resp.history(0).code should be(307)
+ resp.history(1).code should be(308)
+ resp.history(2).code should be(302)
+ }
+
+ "break redirect loops" in {
+ val resp = loop.send().force()
+ resp.code should be(0)
+ resp.history should have size (FollowRedirectsBackend.MaxRedirects)
+ }
+
+ "break redirect loops after user-specified count" in {
+ val maxRedirects = 10
+ val resp = loop.maxRedirects(maxRedirects).send().force()
+ resp.code should be(0)
+ resp.history should have size (maxRedirects)
+ }
+
+ "not redirect when maxRedirects is less than or equal to 0" in {
+ val resp = loop.maxRedirects(-1).send().force()
+ resp.code should be(302)
+ resp.body should be('left)
+ resp.history should be('empty)
+ }
+ }
+
+ "timeout" - {
+ "fail if read timeout is not big enough" in {
+ val request = sttp
+ .get(uri"$endpoint/timeout")
+ .readTimeout(200.milliseconds)
+ .response(asString)
+
+ intercept[Throwable] {
+ request.send().force()
+ }
+ }
+
+ "not fail if read timeout is big enough" in {
+ val request = sttp
+ .get(uri"$endpoint/timeout")
+ .readTimeout(5.seconds)
+ .response(asString)
+
+ request.send().force().unsafeBody should be("Done")
+ }
+ }
+
+ "empty response" - {
+ val postEmptyResponse = sttp
+ .post(uri"$endpoint/empty_unauthorized_response")
+ .body("{}")
+ .contentType("application/json")
+
+ "parse an empty error response as empty string" in {
+ val response = postEmptyResponse.send().force()
+ response.body should be(Left(""))
+ }
+ }
+
+ "encoding" - {
+ "read response body encoded using ISO-8859-2, as specified in the header, overriding the default" in {
+ val request = sttp.get(uri"$endpoint/respond_with_iso_8859_2")
+
+ request.send().force().unsafeBody should be(textWithSpecialCharacters)
+ }
+ }
+
+ override protected def afterAll(): Unit = {
+ backend.close()
+ super.afterAll()
+ }
+
+}
diff --git a/core/src/test/scala/com/softwaremill/sttp/testing/streaming/StreamingTest.scala b/core/src/test/scala/com/softwaremill/sttp/testing/streaming/StreamingTest.scala
new file mode 100644
index 0000000..aa0af07
--- /dev/null
+++ b/core/src/test/scala/com/softwaremill/sttp/testing/streaming/StreamingTest.scala
@@ -0,0 +1,65 @@
+package com.softwaremill.sttp.testing.streaming
+
+import com.softwaremill.sttp._
+import com.softwaremill.sttp.testing.ForceWrapped
+import org.scalatest.{AsyncFreeSpec, BeforeAndAfterAll, Matchers}
+
+import scala.language.higherKinds
+
+trait StreamingTest[R[_], S] extends AsyncFreeSpec with Matchers with BeforeAndAfterAll with ForceWrapped {
+
+ private val endpoint = "localhost:51823"
+ private val body = "streaming test"
+
+ val testStreamingBackend: TestStreamingBackend[R, S]
+ import testStreamingBackend._
+
+ "stream request body" in {
+ sttp
+ .post(uri"$endpoint/streaming/echo")
+ .streamBody(bodyProducer(body))
+ .send()
+ .toFuture()
+ .map { response =>
+ response.unsafeBody shouldBe body
+ }
+ }
+
+ "receive a stream" in {
+ sttp
+ .post(uri"$endpoint/streaming/echo")
+ .body(body)
+ .response(asStream[S])
+ .send()
+ .toFuture()
+ .flatMap { response =>
+ bodyConsumer(response.unsafeBody).toFuture()
+ }
+ .map { responseBody =>
+ responseBody shouldBe body
+ }
+ }
+
+ "receive a stream from an https site" in {
+ sttp
+ // of course, you should never rely on the internet being available
+ // in tests, but that's so much easier than setting up an https
+ // testing server
+ .get(uri"https://softwaremill.com")
+ .response(asStream[S])
+ .send()
+ .toFuture()
+ .flatMap { response =>
+ bodyConsumer(response.unsafeBody).toFuture()
+ }
+ .map { responseBody =>
+ responseBody should include("</div>")
+ }
+ }
+
+ override protected def afterAll(): Unit = {
+ testStreamingBackend.backend.close()
+ super.afterAll()
+ }
+
+}
diff --git a/core/src/test/scala/com/softwaremill/sttp/testing/streaming/TestStreamingBackend.scala b/core/src/test/scala/com/softwaremill/sttp/testing/streaming/TestStreamingBackend.scala
index 266c402..3ea63a3 100644
--- a/core/src/test/scala/com/softwaremill/sttp/testing/streaming/TestStreamingBackend.scala
+++ b/core/src/test/scala/com/softwaremill/sttp/testing/streaming/TestStreamingBackend.scala
@@ -1,6 +1,7 @@
package com.softwaremill.sttp.testing.streaming
import com.softwaremill.sttp.SttpBackend
+import com.softwaremill.sttp.testing.ConvertToFuture
import scala.language.higherKinds