spec/shared/authenticated.rb in ey-hmac-2.3.0 vs spec/shared/authenticated.rb in ey-hmac-2.3.1

- old
+ new

@@ -1,75 +1,77 @@ -shared_examples_for "authentication" do - describe "#authenticated?" do - it "should not authenticate invalid secret" do +# frozen_string_literal: true + +shared_examples_for 'authentication' do + describe '#authenticated?' do + it 'does not authenticate invalid secret' do Ey::Hmac.sign!(request, key_id, "#{key_secret}bad", adapter: adapter) - expect(Ey::Hmac.authenticated?(request, adapter: adapter) do |auth_id| + expect(Ey::Hmac).not_to be_authenticated(request, adapter: adapter) do |auth_id| (auth_id == key_id) && key_secret - end).to be_falsey + end end - it "should not authenticate invalid id" do + it 'does not authenticate invalid id' do Ey::Hmac.sign!(request, "what#{key_id}", key_secret, adapter: adapter) - expect(Ey::Hmac.authenticated?(request, adapter: adapter) do |auth_id| + expect(Ey::Hmac).not_to be_authenticated(request, adapter: adapter) do |auth_id| (auth_id == key_id) && key_secret - end).to be_falsey + end end - it "should not authenticate missing header" do - expect(Ey::Hmac.authenticated?(request, adapter: adapter) do |auth_id| + it 'does not authenticate missing header' do + expect(Ey::Hmac).not_to be_authenticated(request, adapter: adapter) do |auth_id| (auth_id == key_id) && key_secret - end).to be_falsey + end end end - describe "#authenticate!" do - it "should not authenticate invalid secret" do + describe '#authenticate!' do + it 'does not authenticate invalid secret' do Ey::Hmac.sign!(request, key_id, "#{key_secret}bad", adapter: adapter) - expect { + expect do Ey::Hmac.authenticate!(request, adapter: adapter) do |auth_id| (auth_id == key_id) && key_secret end - }.to raise_exception(Ey::Hmac::SignatureMismatch) + end.to raise_exception(Ey::Hmac::SignatureMismatch) end - it "should not authenticate invalid id" do + it 'does not authenticate invalid id' do Ey::Hmac.sign!(request, "what#{key_id}", key_secret, adapter: adapter) - expect { + expect do Ey::Hmac.authenticate!(request, adapter: adapter) do |auth_id| (auth_id == key_id) && key_secret end - }.to raise_exception(Ey::Hmac::MissingSecret) + end.to raise_exception(Ey::Hmac::MissingSecret) end - it "should not authenticate missing header" do - expect { + it 'does not authenticate missing header' do + expect do expect(Ey::Hmac.authenticate!(request, adapter: adapter) do |auth_id| (auth_id == key_id) && key_secret end).to be_falsey - }.to raise_exception(Ey::Hmac::MissingAuthorization) + end.to raise_exception(Ey::Hmac::MissingAuthorization) end - context "when the server specifies an HMAC TTL" do - it "should not authenticate expired hmac" do + context 'when the server specifies an HMAC TTL' do + it 'does not authenticate expired hmac' do Ey::Hmac.sign!(request, key_id, key_secret, adapter: adapter) - expect { + expect do Ey::Hmac.authenticate!(request, adapter: adapter, ttl: 0) do |auth_id| (auth_id == key_id) && key_secret end - }.to raise_exception(Ey::Hmac::ExpiredHmac) + end.to raise_exception(Ey::Hmac::ExpiredHmac) end - it "should authenticate non-expired hmac" do + it 'authenticates non-expired hmac' do Ey::Hmac.sign!(request, key_id, key_secret, adapter: adapter) - expect { + expect do Ey::Hmac.authenticate!(request, adapter: adapter, ttl: 100) do |auth_id| (auth_id == key_id) && key_secret end - }.to_not raise_exception + end.not_to raise_exception end end end end