spec/unit/oauth_spec.rb in warden-github-1.3.1 vs spec/unit/oauth_spec.rb in warden-github-1.3.2
- old
+ new
@@ -1,66 +1,66 @@
require 'spec_helper'
describe Warden::GitHub::OAuth do
let(:default_attrs) do
- { :state => 'abc',
- :client_id => 'foo',
- :client_secret => 'bar',
- :redirect_uri => 'http://example.com/callback' }
+ { state: 'abc',
+ client_id: 'foo',
+ client_secret: 'bar',
+ redirect_uri: 'http://example.com/callback' }
end
def oauth(attrs=default_attrs)
described_class.new(attrs)
end
describe '#authorize_uri' do
it 'contains the base uri' do
- oauth.authorize_uri.to_s.should \
+ expect(oauth.authorize_uri.to_s).to \
include Octokit.web_endpoint
end
%w[ client_id state redirect_uri ].each do |name|
it "contains the correct #{name} param" do
uri = Addressable::URI.parse(oauth.authorize_uri)
- uri.query_values[name].should eq default_attrs[name.to_sym]
+ expect(uri.query_values[name]).to eq default_attrs[name.to_sym]
end
end
- { :nil => nil, :empty => '' }.each do |desc, value|
+ { nil: nil, empty: '' }.each do |desc, value|
it "does not contain the scope param if #{desc}" do
- uri = oauth(default_attrs.merge(:scope => value)).authorize_uri
+ uri = oauth(default_attrs.merge(scope: value)).authorize_uri
- uri.to_s.should_not include 'scope'
+ expect(uri.to_s).not_to include 'scope'
end
end
end
describe '#access_token' do
def expect_request(attrs={})
stub_request(:post, %r{\/login\/oauth\/access_token$}).
- with(:body => hash_including(attrs.fetch(:params, {}))).
- to_return(:status => 200,
- :body => attrs.fetch(:answer, 'access_token=foobar'))
+ with(body: hash_including(attrs.fetch(:params, {}))).
+ to_return(status: 200,
+ body: attrs.fetch(:answer, 'access_token=foobar'))
end
it 'exchanges the code for an access token' do
- expect_request(:answer => 'access_token=the_token&token_type=bearer')
+ expect_request(answer: 'access_token=the_token&token_type=bearer')
- oauth.access_token.should eq 'the_token'
+ expect(oauth.access_token).to eq 'the_token'
end
it 'raises BadVerificationCode if no access token is returned' do
- expect_request(:answer => 'error=bad_verification_code')
+ expect_request(answer: 'error=bad_verification_code')
expect { oauth.access_token }.
to raise_error(described_class::BadVerificationCode)
end
%w[ client_id client_secret code ].each do |name|
it "performs a request containing the correct #{name} param" do
- oauth(default_attrs.merge(:code => 'the_code')).tap do |o|
- expect_request(:params => { name => o.send(name) })
+ oauth(default_attrs.merge(code: 'the_code')).tap do |o|
+ expect_request(params: { name => o.send(name) })
o.access_token
end
end
end
end