spec/lib/metasploit/credential/importer/zip_spec.rb in metasploit-credential-1.0.0.pre.rails.pre.4.0 vs spec/lib/metasploit/credential/importer/zip_spec.rb in metasploit-credential-1.0.0

- old
+ new

@@ -1,19 +1,17 @@ -require 'spec_helper' - -describe Metasploit::Credential::Importer::Zip do +RSpec.describe Metasploit::Credential::Importer::Zip do include_context 'Mdm::Workspace' include_context 'metasploit_credential_importer_zip_file' let(:workspace){FactoryGirl.create(:mdm_workspace)} subject(:zip_importer){ FactoryGirl.build :metasploit_credential_importer_zip, workspace: workspace } describe "validations" do DUMMY_ZIP_PATH = "/tmp/import-test-dummy.zip" context "when the zip file contains a keys directory and a manifest CSV" do - it { should be_valid } + it { is_expected.to be_valid } end context "when the zip file is not actually an archive" do let(:error) do I18n.translate!('activemodel.errors.models.metasploit/credential/importer/zip.attributes.input.malformed_archive') @@ -30,11 +28,11 @@ it { should_not be_valid } it 'should show the proper error message' do zip_importer.valid? - zip_importer.errors[:input].should include error + expect(zip_importer.errors[:input]).to include error end end context "when the zip file does not contain a manifest CSV" do let(:error) do @@ -47,11 +45,11 @@ it { should_not be_valid } it 'should show the proper error message' do zip_importer.valid? - zip_importer.errors[:input].should include error + expect(zip_importer.errors[:input]).to include error end end end @@ -61,9 +59,9 @@ end end describe "zip constants" do it 'should have ZIP_HEADER_IDENTIFIER whose length corresponds to ZIP_HEADER_BYTE_LENGTH' do - Metasploit::Credential::Importer::Zip::ZIP_HEADER_IDENTIFIER.size.should == Metasploit::Credential::Importer::Zip::ZIP_HEADER_BYTE_LENGTH + expect(Metasploit::Credential::Importer::Zip::ZIP_HEADER_IDENTIFIER.size).to eq(Metasploit::Credential::Importer::Zip::ZIP_HEADER_BYTE_LENGTH) end end end \ No newline at end of file