
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
DockTest is an outside-in testing framework for ruby service api applications.
Different from the popular Rack::Test, DockTest focuses on just on service applications and tests 100% from outside.
skippy
setting to automatically skip tests with requests that create side-effects in production environments.OUTPUT_CURL
environment variable.verify_ssl
for specifying whether to enforce ssl verification in http connection. Optional, default is true.Add this line to your application's Gemfile:
group :test do
gem 'dock_test'
end
And then execute:
$ bundle
In your test helper file (often test/test_helper.rb
), include the following DockTest configuration:
DockTest.configure do |c|
case ENV['DOCK_ENV']
when 'production'
c.url = 'http://vast-reaches-9635.herokuapp.com/' # your production service url
c.skippy = true
else
c.url = 'http://localhost:9871' # your local service url with abitary unbound port number
c.skippy = false
end
end
Add include DockTest::Methods
to give your integration tests access to all the verb test methods and also assertions.
Now you can excute your test collectively or individually, such as:
$ bundle exec rake test
$ DOCK_ENV=production bundle exec rake test
config.ru
exists that can be used to rackup
the server.FAQs
Unknown package
We found that dock_test demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.