spec/cert/extensions/policy_constraints_spec.rb in r509-0.10.0 vs spec/cert/extensions/policy_constraints_spec.rb in r509-1.0
- old
+ new
@@ -5,40 +5,40 @@
shared_examples_for "a correct R509 PolicyConstraints object" do |critical|
before :all do
extension_name = "policyConstraints"
klass = PolicyConstraints
ef = OpenSSL::X509::ExtensionFactory.new
- openssl_ext = ef.create_extension( extension_name, @extension_value, critical)
- @r509_ext = klass.new( openssl_ext )
+ openssl_ext = ef.create_extension(extension_name, @extension_value, critical)
+ @r509_ext = klass.new(openssl_ext)
end
it "should have the expected require policy" do
- @r509_ext.require_explicit_policy.should == @require_explicit_policy
+ expect(@r509_ext.require_explicit_policy).to eq(@require_explicit_policy)
end
it "should have the expected inhibit mapping" do
- @r509_ext.inhibit_policy_mapping.should == @inhibit_policy_mapping
+ expect(@r509_ext.inhibit_policy_mapping).to eq(@inhibit_policy_mapping)
end
end
describe R509::Cert::Extensions::PolicyConstraints do
include R509::Cert::Extensions
context "validate policy constraints" do
it "raises an error when not a hash" do
- expect { R509::Cert::Extensions::PolicyConstraints.new( "string" ) }.to raise_error(ArgumentError,'Policy constraints must be provided as a hash with at least one of the two allowed keys: :inhibit_policy_mapping and :require_explicit_policy')
+ expect { R509::Cert::Extensions::PolicyConstraints.new("string") }.to raise_error(ArgumentError, 'Policy constraints must be provided as a hash with at least one of the two allowed keys: :inhibit_policy_mapping and :require_explicit_policy')
end
it "raises an error when no keys" do
- expect { R509::Cert::Extensions::PolicyConstraints.new( {} ) }.to raise_error(ArgumentError,'Policy constraints must have at least one of two keys: :inhibit_policy_mapping and :require_explicit_policy and the value must be non-negative')
+ expect { R509::Cert::Extensions::PolicyConstraints.new({}) }.to raise_error(ArgumentError, 'Policy constraints must have at least one of two keys: :inhibit_policy_mapping and :require_explicit_policy and the value must be non-negative')
end
it "raises an error when inhibit_policy_mapping is not valid" do
- expect { R509::Cert::Extensions::PolicyConstraints.new( :inhibit_policy_mapping => -5 ) }.to raise_error(ArgumentError,'inhibit_policy_mapping must be a non-negative integer')
+ expect { R509::Cert::Extensions::PolicyConstraints.new(:inhibit_policy_mapping => -5) }.to raise_error(ArgumentError, 'inhibit_policy_mapping must be a non-negative integer')
end
it "raises an error when require_explicit_policy is not valid" do
- expect { R509::Cert::Extensions::PolicyConstraints.new( :require_explicit_policy => -1 ) }.to raise_error(ArgumentError,'require_explicit_policy must be a non-negative integer')
+ expect { R509::Cert::Extensions::PolicyConstraints.new(:require_explicit_policy => -1) }.to raise_error(ArgumentError, 'require_explicit_policy must be a non-negative integer')
end
end
context "PolicyConstraints" do
context "creation & yaml generation" do
@@ -47,30 +47,30 @@
@args = { :require_explicit_policy => 1, :critical => true }
@pc = R509::Cert::Extensions::PolicyConstraints.new(@args)
end
it "creates extension" do
- @pc.require_explicit_policy.should == 1
+ expect(@pc.require_explicit_policy).to eq(1)
end
it "builds yaml" do
- YAML.load(@pc.to_yaml).should == @args
+ expect(YAML.load(@pc.to_yaml)).to eq(@args)
end
end
context "creates with inhibit policy mapping" do
before :all do
@args = { :inhibit_policy_mapping => 1, :critical => true }
@pc = R509::Cert::Extensions::PolicyConstraints.new(@args)
end
it "creates extension" do
- @pc.inhibit_policy_mapping.should == 1
+ expect(@pc.inhibit_policy_mapping).to eq(1)
end
it "builds yaml" do
- YAML.load(@pc.to_yaml).should == @args
+ expect(YAML.load(@pc.to_yaml)).to eq(@args)
end
end
context "creates with both" do
before :all do
@@ -81,45 +81,45 @@
}
@pc = R509::Cert::Extensions::PolicyConstraints.new(@args)
end
it "creates extension" do
- @pc.inhibit_policy_mapping.should == 1
- @pc.require_explicit_policy.should == 3
+ expect(@pc.inhibit_policy_mapping).to eq(1)
+ expect(@pc.require_explicit_policy).to eq(3)
end
it "builds yaml" do
- YAML.load(@pc.to_yaml).should == @args
+ expect(YAML.load(@pc.to_yaml)).to eq(@args)
end
end
context "default criticality" do
before :all do
@args = { :inhibit_policy_mapping => 1 }
@pc = R509::Cert::Extensions::PolicyConstraints.new(@args)
end
it "creates extension" do
- @pc.critical?.should == true
+ expect(@pc.critical?).to eq(true)
end
it "builds yaml" do
- YAML.load(@pc.to_yaml).should == @args.merge(:critical => true)
+ expect(YAML.load(@pc.to_yaml)).to eq(@args.merge(:critical => true))
end
end
context "non-default criticality" do
before :all do
@args = { :inhibit_policy_mapping => 1, :critical => false }
@pc = R509::Cert::Extensions::PolicyConstraints.new(@args)
end
it "creates extension" do
- @pc.critical?.should == false
+ expect(@pc.critical?).to eq(false)
end
it "builds yaml" do
- YAML.load(@pc.to_yaml).should == @args
+ expect(YAML.load(@pc.to_yaml)).to eq(@args)
end
end
end
context "with just require" do