spec/acceptance/rest/presence_spec.rb in ably-0.8.8 vs spec/acceptance/rest/presence_spec.rb in ably-0.8.9

- old
+ new

@@ -24,12 +24,12 @@ let(:mode) { cipher_details.fetch('mode').upcase } let(:key_length) { cipher_details.fetch('keylength') } let(:secret_key) { Base64.decode64(cipher_details.fetch('key')) } let(:iv) { Base64.decode64(cipher_details.fetch('iv')) } - let(:cipher_options) { { key: secret_key, algorithm: algorithm, mode: mode, key_length: key_length, iv: iv } } - let(:fixtures_channel) { client.channel('persisted:presence_fixtures', encrypted: true, cipher_params: cipher_options, iv: iv) } + let(:cipher_options) { { key: secret_key, algorithm: algorithm, mode: mode, key_length: key_length, fixed_iv: iv } } + let(:fixtures_channel) { client.channel('persisted:presence_fixtures', cipher: cipher_options, fixed_iv: iv) } context 'tested against presence fixture data set up in test app' do before(:context) do # When this test is run as a part of a test suite, the presence data injected in the test app may have expired reload_test_app @@ -319,11 +319,11 @@ Ably::Rest::Client.new(client_options.merge(key: "#{user}:#{secret}")) end let(:data) { random_str(32) } let(:channel_name) { "persisted:#{random_str(4)}" } - let(:cipher_options) { { key: random_str(32), algorithm: 'aes', mode: 'cbc', key_length: 256 } } - let(:presence) { client.channel(channel_name, encrypted: true, cipher_params: cipher_options).presence } + let(:cipher_options) { { key: Ably::Util::Crypto.generate_random_key(256), algorithm: 'aes', mode: 'cbc', key_length: 256 } } + let(:presence) { client.channel(channel_name, cipher: cipher_options).presence } let(:crypto) { Ably::Util::Crypto.new(cipher_options) } let(:content_type) do if protocol == :msgpack