spec/lib/identity_provider_spec.rb in saml2-1.0.10 vs spec/lib/identity_provider_spec.rb in saml2-1.1.0

- old
+ new

@@ -15,23 +15,23 @@ idp.name_id_formats << NameID::Format::PERSISTENT idp.single_sign_on_services << Endpoint.new('https://sso.canvaslms.com/SAML2/Login') idp.keys << Key.new('somedata', Key::Type::SIGNING) entity.roles << idp - Schemas.metadata.validate(Nokogiri::XML(entity.to_s)).must_equal [] + expect(Schemas.metadata.validate(Nokogiri::XML(entity.to_s))).to eq [] end describe "valid metadata" do let(:entity) { Entity.parse(fixture('identity_provider.xml')) } let(:idp) { entity.roles.first } it "should create the single_sign_on_services array" do - idp.single_sign_on_services.length.must_equal 3 - idp.single_sign_on_services.first.location.must_equal 'https://sso.school.edu/idp/profile/Shibboleth/SSO' + expect(idp.single_sign_on_services.length).to eq 3 + expect(idp.single_sign_on_services.first.location).to eq 'https://sso.school.edu/idp/profile/Shibboleth/SSO' end it "should find the signing certificate" do - idp.keys.first.x509.must_match(/MIIE8TCCA9mgAwIBAgIJAITusxON60cKMA0GCSqGSIb3DQEBBQUAMIGrMQswCQYD/) + expect(idp.keys.first.x509).to match(/MIIE8TCCA9mgAwIBAgIJAITusxON60cKMA0GCSqGSIb3DQEBBQUAMIGrMQswCQYD/) end end end end