spec/lib/identity_provider_spec.rb in saml2-1.0.10 vs spec/lib/identity_provider_spec.rb in saml2-1.1.0
- old
+ new
@@ -15,23 +15,23 @@
idp.name_id_formats << NameID::Format::PERSISTENT
idp.single_sign_on_services << Endpoint.new('https://sso.canvaslms.com/SAML2/Login')
idp.keys << Key.new('somedata', Key::Type::SIGNING)
entity.roles << idp
- Schemas.metadata.validate(Nokogiri::XML(entity.to_s)).must_equal []
+ expect(Schemas.metadata.validate(Nokogiri::XML(entity.to_s))).to eq []
end
describe "valid metadata" do
let(:entity) { Entity.parse(fixture('identity_provider.xml')) }
let(:idp) { entity.roles.first }
it "should create the single_sign_on_services array" do
- idp.single_sign_on_services.length.must_equal 3
- idp.single_sign_on_services.first.location.must_equal 'https://sso.school.edu/idp/profile/Shibboleth/SSO'
+ expect(idp.single_sign_on_services.length).to eq 3
+ expect(idp.single_sign_on_services.first.location).to eq 'https://sso.school.edu/idp/profile/Shibboleth/SSO'
end
it "should find the signing certificate" do
- idp.keys.first.x509.must_match(/MIIE8TCCA9mgAwIBAgIJAITusxON60cKMA0GCSqGSIb3DQEBBQUAMIGrMQswCQYD/)
+ expect(idp.keys.first.x509).to match(/MIIE8TCCA9mgAwIBAgIJAITusxON60cKMA0GCSqGSIb3DQEBBQUAMIGrMQswCQYD/)
end
end
end
end