spec/network/ssl_spec.rb in ronin-support-0.5.1 vs spec/network/ssl_spec.rb in ronin-support-0.5.2
- old
+ new
@@ -4,19 +4,19 @@
describe Network::SSL do
describe 'VERIFY' do
subject { Network::SSL::VERIFY }
it "should map verify mode names to OpenSSL VERIFY_* constants" do
- subject[:peer].should == OpenSSL::SSL::VERIFY_PEER
+ expect(subject[:peer]).to eq(OpenSSL::SSL::VERIFY_PEER)
end
it "should default to VERIFY_NONE if no verify mode name is given" do
- subject[nil].should == OpenSSL::SSL::VERIFY_NONE
+ expect(subject[nil]).to eq(OpenSSL::SSL::VERIFY_NONE)
end
it "should raise an exception for unknown verify modes" do
- lambda { subject[:foo_bar] }.should raise_error
+ expect { subject[:foo_bar] }.to raise_error
end
end
describe "helpers", :network do
let(:host) { 'github.com' }
@@ -28,30 +28,30 @@
obj
end
describe "#ssl_connect" do
it "should connect to an SSL protected port" do
- lambda {
+ expect {
subject.ssl_connect(host,port)
- }.should_not raise_error(OpenSSL::SSL::SSLError)
+ }.not_to raise_error
end
it "should return an OpenSSL::SSL::SSLSocket" do
socket = subject.ssl_connect(host,port)
- socket.should be_kind_of(OpenSSL::SSL::SSLSocket)
+ expect(socket).to be_kind_of(OpenSSL::SSL::SSLSocket)
end
context "when a block is given" do
it "should yield the OpenSSL::SSL::SSLSocket" do
socket = nil
subject.ssl_connect(host,port) do |yielded_socket|
socket = yielded_socket
end
- socket.should be_kind_of(OpenSSL::SSL::SSLSocket)
+ expect(socket).to be_kind_of(OpenSSL::SSL::SSLSocket)
end
end
end
describe "#ssl_session" do
@@ -60,11 +60,11 @@
subject.ssl_session(host,port) do |yielded_socket|
socket = yielded_socket
end
- socket.should be_kind_of(OpenSSL::SSL::SSLSocket)
- socket.should be_closed
+ expect(socket).to be_kind_of(OpenSSL::SSL::SSLSocket)
+ expect(socket).to be_closed
end
end
end
end