Skip to content

Commit 007e9fd

Browse files
committed
jason
1 parent f2efbff commit 007e9fd

File tree

8 files changed

+16
-16
lines changed

8 files changed

+16
-16
lines changed

lib/sentry/client.ex

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ defmodule Sentry.Client do
7575

7676
defp encode_and_send(event, result) do
7777
render_event(event)
78-
|> Poison.encode()
78+
|> Jason.encode()
7979
|> case do
8080
{:ok, body} ->
8181
do_send_event(event, body, result)
@@ -164,7 +164,7 @@ defmodule Sentry.Client do
164164

165165
with {:ok, 200, _, client} <- :hackney.request(:post, url, headers, body, hackney_opts),
166166
{:ok, body} <- :hackney.body(client),
167-
{:ok, json} <- Poison.decode(body) do
167+
{:ok, json} <- Jason.decode(body) do
168168
{:ok, Map.get(json, "id")}
169169
else
170170
{:ok, status, headers, client} ->

mix.exs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ defmodule Sentry.Mixfile do
2525
defp deps do
2626
[
2727
{:hackney, "~> 1.8 or 1.6.5"},
28-
{:poison, "~> 1.5 or ~> 2.0 or ~> 3.0"},
28+
{:jason, "~> 1.1"},
2929
{:plug, "~> 1.6", optional: true},
3030
{:phoenix, "~> 1.3", optional: true},
3131
{:dialyxir, "> 0.0.0", only: [:dev], runtime: false},

test/client_test.exs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ defmodule Sentry.ClientTest do
107107

108108
Bypass.expect(bypass, fn conn ->
109109
{:ok, body, conn} = Plug.Conn.read_body(conn)
110-
request_map = Poison.decode!(body)
110+
request_map = Jason.decode!(body)
111111
assert request_map["extra"] == %{"key" => "value"}
112112
assert request_map["user"]["id"] == 1
113113
assert is_nil(request_map["stacktrace"]["frames"])
@@ -142,7 +142,7 @@ defmodule Sentry.ClientTest do
142142

143143
Bypass.expect(bypass, fn conn ->
144144
{:ok, body, conn} = Plug.Conn.read_body(conn)
145-
request_map = Poison.decode!(body)
145+
request_map = Jason.decode!(body)
146146
assert request_map["extra"] == %{"key" => "value", "user_id" => 1}
147147
Plug.Conn.resp(conn, 200, ~s<{"id": "340"}>)
148148
end)
@@ -226,7 +226,7 @@ defmodule Sentry.ClientTest do
226226

227227
Bypass.expect(bypass, fn conn ->
228228
{:ok, body, conn} = Plug.Conn.read_body(conn)
229-
request_map = Poison.decode!(body)
229+
request_map = Jason.decode!(body)
230230
assert Enum.count(request_map["stacktrace"]["frames"]) > 0
231231
Plug.Conn.resp(conn, 200, ~s<{"id": "340"}>)
232232
end)

test/logger_backend_test.exs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ defmodule Sentry.LoggerBackendTest do
4444

4545
Bypass.expect(bypass, fn conn ->
4646
{:ok, body, conn} = Plug.Conn.read_body(conn)
47-
json = Poison.decode!(body)
47+
json = Jason.decode!(body)
4848

4949
assert List.first(json["exception"])["value"] ==
5050
~s[Erlang error: {:bad_return_value, "I am throwing"}]
@@ -72,7 +72,7 @@ defmodule Sentry.LoggerBackendTest do
7272

7373
Bypass.expect(bypass, fn conn ->
7474
{:ok, body, conn} = Plug.Conn.read_body(conn)
75-
json = Poison.decode!(body)
75+
json = Jason.decode!(body)
7676
assert List.first(json["exception"])["type"] == "Elixir.ErlangError"
7777
assert List.first(json["exception"])["value"] == "Erlang error: :bad_exit"
7878
assert conn.request_path == "/api/1/store/"
@@ -98,7 +98,7 @@ defmodule Sentry.LoggerBackendTest do
9898

9999
Bypass.expect(bypass, fn conn ->
100100
{:ok, body, conn} = Plug.Conn.read_body(conn)
101-
json = Poison.decode!(body)
101+
json = Jason.decode!(body)
102102

103103
assert %{
104104
"in_app" => false,
@@ -131,7 +131,7 @@ defmodule Sentry.LoggerBackendTest do
131131

132132
Bypass.expect(bypass, fn conn ->
133133
{:ok, body, conn} = Plug.Conn.read_body(conn)
134-
json = Poison.decode!(body)
134+
json = Jason.decode!(body)
135135
assert length(json["stacktrace"]["frames"]) == 1
136136
assert List.first(json["stacktrace"]["frames"])["filename"] == "test/support/test_plug.ex"
137137
send(pid, "API called")

test/phoenix_endpoint_test.exs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ defmodule Sentry.PhoenixEndpointTest do
2525

2626
Bypass.expect(bypass, fn conn ->
2727
{:ok, body, conn} = Plug.Conn.read_body(conn)
28-
json = Poison.decode!(body)
28+
json = Jason.decode!(body)
2929
assert json["culprit"] == "Sentry.PhoenixEndpointTest.Endpoint.error/2"
3030
assert json["message"] == "(RuntimeError) EndpointError"
3131
Plug.Conn.resp(conn, 200, ~s<{"id": "340"}>)

test/plug_test.exs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ defmodule Sentry.PlugTest do
6767

6868
Bypass.expect(bypass, fn conn ->
6969
{:ok, body, conn} = Plug.Conn.read_body(conn)
70-
json = Poison.decode!(body)
70+
json = Jason.decode!(body)
7171
assert json["request"]["cookies"] == %{}
7272
assert json["request"]["headers"] == %{"content-type" => "application/json"}
7373
Plug.Conn.resp(conn, 200, ~s<{"id": "340"}>)
@@ -111,7 +111,7 @@ defmodule Sentry.PlugTest do
111111

112112
Bypass.expect(bypass, fn conn ->
113113
{:ok, body, conn} = Plug.Conn.read_body(conn)
114-
json = Poison.decode!(body)
114+
json = Jason.decode!(body)
115115
assert is_map(json["request"]["data"]["image"])
116116
assert json["request"]["data"]["password"] == "*********"
117117
Plug.Conn.resp(conn, 200, ~s<{"id": "340"}>)
@@ -147,7 +147,7 @@ defmodule Sentry.PlugTest do
147147

148148
Bypass.expect(bypass, fn conn ->
149149
{:ok, body, conn} = Plug.Conn.read_body(conn)
150-
json = Poison.decode!(body)
150+
json = Jason.decode!(body)
151151
assert json["request"]["cookies"] == %{"regular" => "value"}
152152
Plug.Conn.resp(conn, 200, ~s<{"id": "340"}>)
153153
end)

test/sources_test.exs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ defmodule Sentry.SourcesTest do
2828
{:ok, body, conn} = Plug.Conn.read_body(conn)
2929

3030
frames =
31-
Poison.decode!(body)
31+
Jason.decode!(body)
3232
|> get_in(["stacktrace", "frames"])
3333
|> Enum.reverse()
3434

test/support/test_client.exs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ defmodule Sentry.TestClient do
77
event = Sentry.Client.maybe_call_before_send_event(event)
88

99
Sentry.Client.render_event(event)
10-
|> Poison.encode()
10+
|> Jason.encode()
1111
|> case do
1212
{:ok, body} ->
1313
case Sentry.Client.request(endpoint, [], body) do

0 commit comments

Comments
 (0)