spec/keen/scoped_key_spec.rb in keen-0.9.8 vs spec/keen/scoped_key_spec.rb in keen-0.9.9
- old
+ new
@@ -12,34 +12,34 @@
}}
let(:new_scoped_key) { Keen::ScopedKey.new(api_key, data) }
describe "constructor" do
it "should retain the api_key" do
- new_scoped_key.api_key.should == api_key
+ expect(new_scoped_key.api_key).to eq(api_key)
end
it "should retain the data" do
- new_scoped_key.data.should == data
+ expect(new_scoped_key.data).to eq(data)
end
end
describe "encrypt! and decrypt!" do
it "should encrypt and hex encode the data using the api key" do
encrypted_str = new_scoped_key.encrypt!
other_api_key = Keen::ScopedKey.decrypt!(api_key, encrypted_str)
- other_api_key.data.should == data
+ expect(other_api_key.data).to eq(data)
end
describe "when an IV is not provided" do
it "should not produce the same encrypted key text" do
- new_scoped_key.encrypt!.should_not == (new_scoped_key.encrypt!)
+ expect(new_scoped_key.encrypt!).to_not eq(new_scoped_key.encrypt!)
end
end
describe "when an IV is provided" do
it "should produce the same encrypted key text for a " do
iv = "\0" * 16
- new_scoped_key.encrypt!(iv).should == (new_scoped_key.encrypt!(iv))
+ expect(new_scoped_key.encrypt!(iv)).to eq(new_scoped_key.encrypt!(iv))
end
it "should raise error when an invalid IV is supplied" do
iv = "fakeiv"
expect { new_scoped_key.encrypt!(iv) }.to raise_error(OpenSSL::Cipher::CipherError)