spec/keen/scoped_key_spec.rb in keen-0.9.8 vs spec/keen/scoped_key_spec.rb in keen-0.9.9

- old
+ new

@@ -12,34 +12,34 @@ }} let(:new_scoped_key) { Keen::ScopedKey.new(api_key, data) } describe "constructor" do it "should retain the api_key" do - new_scoped_key.api_key.should == api_key + expect(new_scoped_key.api_key).to eq(api_key) end it "should retain the data" do - new_scoped_key.data.should == data + expect(new_scoped_key.data).to eq(data) end end describe "encrypt! and decrypt!" do it "should encrypt and hex encode the data using the api key" do encrypted_str = new_scoped_key.encrypt! other_api_key = Keen::ScopedKey.decrypt!(api_key, encrypted_str) - other_api_key.data.should == data + expect(other_api_key.data).to eq(data) end describe "when an IV is not provided" do it "should not produce the same encrypted key text" do - new_scoped_key.encrypt!.should_not == (new_scoped_key.encrypt!) + expect(new_scoped_key.encrypt!).to_not eq(new_scoped_key.encrypt!) end end describe "when an IV is provided" do it "should produce the same encrypted key text for a " do iv = "\0" * 16 - new_scoped_key.encrypt!(iv).should == (new_scoped_key.encrypt!(iv)) + expect(new_scoped_key.encrypt!(iv)).to eq(new_scoped_key.encrypt!(iv)) end it "should raise error when an invalid IV is supplied" do iv = "fakeiv" expect { new_scoped_key.encrypt!(iv) }.to raise_error(OpenSSL::Cipher::CipherError)