cisco_acl_intp 0.0.3 → 0.0.4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (54) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +3 -0
  3. data/.rubocop.yml +2 -2
  4. data/.travis.yml +4 -2
  5. data/Gemfile +7 -6
  6. data/README.md +23 -18
  7. data/Rakefile +11 -13
  8. data/cisco_acl_intp.gemspec +7 -7
  9. data/lib/cisco_acl_intp/acc.rb +111 -0
  10. data/lib/cisco_acl_intp/{ace.rb → ace_base.rb} +9 -8
  11. data/lib/cisco_acl_intp/{extended_ace.rb → ace_extended.rb} +8 -10
  12. data/lib/cisco_acl_intp/{standard_ace.rb → ace_standard.rb} +5 -5
  13. data/lib/cisco_acl_intp/acespec_base.rb +15 -0
  14. data/lib/cisco_acl_intp/{ace_ip.rb → acespec_ip.rb} +14 -22
  15. data/lib/cisco_acl_intp/{ace_other_qualifiers.rb → acespec_other_qualifiers.rb} +7 -7
  16. data/lib/cisco_acl_intp/{ace_port.rb → acespec_port.rb} +10 -13
  17. data/lib/cisco_acl_intp/{ace_port_opr.rb → acespec_port_opr.rb} +75 -73
  18. data/lib/cisco_acl_intp/{ace_port_opr_base.rb → acespec_port_opr_base.rb} +49 -34
  19. data/lib/cisco_acl_intp/{ace_proto.rb → acespec_proto.rb} +4 -4
  20. data/lib/cisco_acl_intp/{ace_proto_base.rb → acespec_proto_base.rb} +8 -8
  21. data/lib/cisco_acl_intp/{ace_srcdst.rb → acespec_srcdst.rb} +9 -8
  22. data/lib/cisco_acl_intp/{ace_tcp_flags.rb → acespec_tcp_flags.rb} +4 -4
  23. data/lib/cisco_acl_intp/acl.rb +1 -1
  24. data/lib/cisco_acl_intp/acl_base.rb +108 -80
  25. data/lib/cisco_acl_intp/{mono_function_acl.rb → acl_category_base.rb} +5 -5
  26. data/lib/cisco_acl_intp/acl_utils.rb +1 -1
  27. data/lib/cisco_acl_intp/parser.rb +388 -406
  28. data/lib/cisco_acl_intp/parser.ry +8 -3
  29. data/lib/cisco_acl_intp/parser_api.rb +4 -4
  30. data/lib/cisco_acl_intp/scanner.rb +8 -10
  31. data/lib/cisco_acl_intp/scanner_special_token_handler.rb +3 -3
  32. data/lib/cisco_acl_intp/version.rb +1 -1
  33. data/spec/cisco_acl_intp/{extended_ace_spec.rb → ace_extended_spec.rb} +157 -128
  34. data/spec/cisco_acl_intp/ace_spec.rb +21 -19
  35. data/spec/cisco_acl_intp/{standard_ace_spec.rb → ace_standard_spec.rb} +7 -11
  36. data/spec/cisco_acl_intp/{ace_ip_spec.rb → acespec_ip_spec.rb} +34 -34
  37. data/spec/cisco_acl_intp/{ace_other_qualifier_spec.rb → acespec_other_qualifier_spec.rb} +18 -18
  38. data/spec/cisco_acl_intp/acespec_port_operator_spec.rb +331 -0
  39. data/spec/cisco_acl_intp/{ace_port_spec.rb → acespec_port_spec.rb} +33 -33
  40. data/spec/cisco_acl_intp/{ace_proto_spec.rb → acespec_proto_spec.rb} +61 -61
  41. data/spec/cisco_acl_intp/{ace_srcdst_spec.rb → acespec_srcdst_spec.rb} +113 -54
  42. data/spec/cisco_acl_intp/{ace_tcp_flags_spec.rb → acespec_tcp_flags_spec.rb} +10 -10
  43. data/spec/cisco_acl_intp/acl_base_spec.rb +14 -12
  44. data/spec/cisco_acl_intp/{extended_acl_spec.rb → acl_extended_spec.rb} +28 -28
  45. data/spec/cisco_acl_intp/{standard_acl_spec.rb → acl_standard_spec.rb} +24 -23
  46. data/spec/cisco_acl_intp/cisco_acl_intp_spec.rb +1 -1
  47. data/spec/cisco_acl_intp/parser_spec.rb +12 -12
  48. data/spec/cisco_acl_intp/scanner_spec.rb +31 -36
  49. data/spec/parser_fullfill_patterns.rb +6 -7
  50. data/spec/spec_helper.rb +6 -6
  51. data/tools/check_acl.rb +1 -1
  52. metadata +60 -59
  53. data/lib/cisco_acl_intp/single_acl_base.rb +0 -137
  54. data/spec/cisco_acl_intp/ace_port_operator_spec.rb +0 -340
@@ -10,15 +10,15 @@ describe AceTcpFlag do
10
10
  end
11
11
 
12
12
  it 'should be make tcp flags' do
13
- @flag.to_s.should be_aclstr('established')
13
+ expect(@flag.to_s).to be_aclstr('established')
14
14
  end
15
15
 
16
16
  it 'should be true when same flag' do
17
- (@flag == @flag1).should be_true
17
+ expect(@flag == @flag1).to be_truthy
18
18
  end
19
19
 
20
20
  it 'should not false when different flag' do
21
- (@flag == @flag2).should be_false
21
+ expect(@flag == @flag2).to be_falsey
22
22
  end
23
23
  end
24
24
  end
@@ -33,17 +33,17 @@ describe AceTcpFlagList do
33
33
  end
34
34
 
35
35
  it 'should be size 0 when empty list' do
36
- @list.size.should be_zero
36
+ expect(@list.size).to be_zero
37
37
  end
38
38
 
39
39
  it 'should count-up size when added AceTcpFlag objects' do
40
40
  @list.push @f1
41
- @list.size.should eq 1
41
+ expect(@list.size).to eq 1
42
42
  @list.push @f2
43
- @list.size.should eq 2
43
+ expect(@list.size).to eq 2
44
44
  @list.push @f3
45
- @list.size.should eq 3
46
- @list.to_s.should be_aclstr('syn ack established')
45
+ expect(@list.size).to eq 3
46
+ expect(@list.to_s).to be_aclstr('syn ack established')
47
47
  end
48
48
  end
49
49
 
@@ -60,11 +60,11 @@ describe AceTcpFlagList do
60
60
  end
61
61
 
62
62
  it 'should be true when same list' do
63
- (@list1 == @list2).should be_true
63
+ expect(@list1 == @list2).to be_truthy
64
64
  end
65
65
 
66
66
  it 'should be false when different list' do
67
- (@list1 == @list3).should be_false
67
+ expect(@list1 == @list3).to be_falsey
68
68
  end
69
69
  end
70
70
  end
@@ -6,7 +6,7 @@ describe 'AclContainerBase' do
6
6
  describe '#generate_tagged_str' do
7
7
  before do
8
8
  # test mock
9
- class TestAclContainer < AclContainerBase
9
+ class TestAclContainer < AccessControlContainer
10
10
  def initialize(str)
11
11
  @str = str
12
12
  end
@@ -23,32 +23,34 @@ describe 'AclContainerBase' do
23
23
  end
24
24
 
25
25
  it 'shoud be cleaning whitespace' do
26
- @mock.to_s_with_cleaning.should eq 'foo bar baz'
26
+ expect(@mock.to_s_with_cleaning).to eq 'foo bar baz'
27
27
  end
28
28
 
29
29
  it 'should be same as raw string' do
30
- AclContainerBase.color_mode = :none
31
- @mock.to_s_with_tag(:port).should eq 'teststr'
30
+ AccessControlContainer.color_mode = :none
31
+ expect(@mock.to_s_with_tag(:port)).to eq 'teststr'
32
32
  end
33
33
 
34
34
  it 'should be colored string when mode html' do
35
- AclContainerBase.color_mode = :html
35
+ AccessControlContainer.color_mode = :html
36
36
  tag = :header
37
37
  matchstr = "span.*acltag_#{tag}.*teststr.*span"
38
- @mock.to_s_with_tag(tag).should match(/#{matchstr}/)
39
- AclContainerBase.color_mode = :none
38
+ expect(@mock.to_s_with_tag(tag)).to match(/#{matchstr}/)
39
+ AccessControlContainer.color_mode = :none
40
40
  end
41
41
 
42
42
  it 'should be colored string when mode term' do
43
- AclContainerBase.color_mode = :term
44
- @mock.to_s_with_tag(:error).should match(/\e\[0?\d+m.*teststr.*\e\[0?m/)
45
- AclContainerBase.color_mode = :none
43
+ AccessControlContainer.color_mode = :term
44
+ expect(@mock.to_s_with_tag(:error)).to match(
45
+ /\e\[0?\d+m.*teststr.*\e\[0?m/
46
+ )
47
+ AccessControlContainer.color_mode = :none
46
48
  end
47
49
 
48
50
  it 'should be raised NoMethodError when unknown tag' do
49
- lambda do
51
+ expect do
50
52
  @cntr.to_s_with_tag(:hoge)
51
- end.should raise_error(NoMethodError)
53
+ end.to raise_error(NoMethodError)
52
54
  end
53
55
  end
54
56
  end
@@ -8,9 +8,9 @@ describe NamedExtAcl do
8
8
  end
9
9
 
10
10
  it 'should be zero when initialized' do
11
- @acl.size.should be_zero
12
- @acl.named_acl?.should be_true
13
- @acl.numbered_acl?.should be_false
11
+ expect(@acl.size).to be_zero
12
+ expect(@acl.named_acl?).to be_truthy
13
+ expect(@acl.numbered_acl?).to be_falsey
14
14
  end
15
15
 
16
16
  it 'should be size 1 and matches aclstr when added a acl entry' do
@@ -27,12 +27,12 @@ describe NamedExtAcl do
27
27
  }
28
28
  )
29
29
  @acl.add_entry ea
30
- @acl.size.should eq 1
30
+ expect(@acl.size).to eq 1
31
31
  aclstr = <<'EOL'
32
32
  ip access-list extended test-ext-acl
33
33
  permit udp 192.168.3.0 0.0.0.127 192.168.4.0 0.0.0.255
34
34
  EOL
35
- @acl.to_s.should be_aclstr(aclstr)
35
+ expect(@acl.to_s).to be_aclstr(aclstr)
36
36
  end
37
37
  end
38
38
 
@@ -68,7 +68,7 @@ EOL
68
68
  end
69
69
 
70
70
  it 'should be size 2' do
71
- @acl.size.should eq 2
71
+ expect(@acl.size).to eq 2
72
72
  end
73
73
 
74
74
  it 'mutches aclstr' do
@@ -77,7 +77,7 @@ ip access-list extended test-ext-acl2
77
77
  permit udp 192.168.3.0 0.0.0.127 192.168.4.0 0.0.0.255
78
78
  deny tcp host 192.168.3.3 192.168.4.0 0.0.0.255 gt 32768
79
79
  EOL
80
- @acl.to_s.should be_aclstr(aclstr)
80
+ expect(@acl.to_s).to be_aclstr(aclstr)
81
81
  end
82
82
 
83
83
  it 'mutches aclstr with remark' do
@@ -89,9 +89,8 @@ ip access-list extended test-ext-acl2
89
89
  deny tcp host 192.168.3.3 192.168.4.0 0.0.0.255 gt 32768
90
90
  remark this is remark!!
91
91
  EOL
92
- @acl.to_s.should be_aclstr(aclstr)
92
+ expect(@acl.to_s).to be_aclstr(aclstr)
93
93
  end
94
-
95
94
  end
96
95
 
97
96
  describe '#find_aces_contains' do
@@ -129,7 +128,7 @@ EOL
129
128
  src_operator: :eq, src_ip: '192.168.10.3', src_port: 64_332,
130
129
  dst_operator: :eq, dst_ip: '192.168.4.5', dst_port: 32_889
131
130
  )
132
- ace.to_s.should be_aclstr(
131
+ expect(ace.to_s).to be_aclstr(
133
132
  'deny tcp host 192.168.10.3 192.168.4.0 0.0.0.255 gt 32768'
134
133
  )
135
134
  end
@@ -140,15 +139,16 @@ EOL
140
139
  src_operator: :eq, src_ip: '192.168.10.3', src_port: 64_332,
141
140
  dst_operator: :eq, dst_ip: '10.0.0.3', dst_port: 33_890
142
141
  )
143
- ace.to_s.should be_aclstr('deny ip any 10.0.0.0 0.0.0.255')
142
+ expect(ace.to_s).to be_aclstr('deny ip any 10.0.0.0 0.0.0.255')
144
143
  end
145
144
 
146
145
  it 'should be nil if not found match entry' do
147
- @acl.find_aces_contains(
148
- protocol: 'udp',
149
- src_operator: :eq, src_ip: '192.168.10.3', src_port: 62_223,
150
- dst_operator: :eq, dst_ip: '11.0.0.3', dst_port: 33_333
151
- ).should be_nil
146
+ expect(
147
+ @acl.find_aces_contains(
148
+ protocol: 'udp',
149
+ src_operator: :eq, src_ip: '192.168.10.3', src_port: 62_223,
150
+ dst_operator: :eq, dst_ip: '11.0.0.3', dst_port: 33_333
151
+ )).to be_nil
152
152
  end
153
153
  end
154
154
  end
@@ -156,14 +156,14 @@ end
156
156
  describe NumberedAcl do
157
157
  describe '#initialize' do
158
158
  it 'should be error with acl no-integer-acl-number' do
159
- lambda do
159
+ expect do
160
160
  @acl = NumberedAcl.new('a70')
161
- end.should raise_error(AclArgumentError)
161
+ end.to raise_error(AclArgumentError)
162
162
  end
163
163
  it 'should be error with invalid number' do
164
- lambda do
164
+ expect do
165
165
  @acl = NumberedAcl.new(33.3)
166
- end.should raise_error(AclArgumentError)
166
+ end.to raise_error(AclArgumentError)
167
167
  end
168
168
  end
169
169
  end
@@ -175,9 +175,9 @@ describe NumberedExtAcl do
175
175
  end
176
176
 
177
177
  it 'should be zero when initialized' do
178
- @acl.size.should be_zero
179
- @acl.named_acl?.should be_false
180
- @acl.numbered_acl?.should be_true
178
+ expect(@acl.size).to be_zero
179
+ expect(@acl.named_acl?).to be_falsey
180
+ expect(@acl.numbered_acl?).to be_truthy
181
181
  end
182
182
 
183
183
  it 'should be size 1 and matches aclstr when added a acl entry' do
@@ -194,11 +194,11 @@ describe NumberedExtAcl do
194
194
  }
195
195
  )
196
196
  @acl.add_entry ea
197
- @acl.size.should eq 1
197
+ expect(@acl.size).to eq 1
198
198
  aclstr = <<'EOL'
199
199
  access-list 102 permit udp 192.168.3.0 0.0.0.127 192.168.4.0 0.0.0.255
200
200
  EOL
201
- @acl.to_s.should be_aclstr(aclstr)
201
+ expect(@acl.to_s).to be_aclstr(aclstr)
202
202
  end
203
203
  end
204
204
 
@@ -234,7 +234,7 @@ EOL
234
234
  end
235
235
 
236
236
  it 'should be size 2' do
237
- @acl.size.should eq 2
237
+ expect(@acl.size).to eq 2
238
238
  end
239
239
 
240
240
  it 'mutches aclstr' do
@@ -242,7 +242,7 @@ EOL
242
242
  access-list 104 permit udp 192.168.3.0 0.0.0.127 192.168.4.0 0.0.0.255
243
243
  access-list 104 deny tcp host 192.168.3.3 192.168.4.0 0.0.0.255 gt 32768
244
244
  EOL
245
- @acl.to_s.should be_aclstr(aclstr)
245
+ expect(@acl.to_s).to be_aclstr(aclstr)
246
246
  end
247
247
 
248
248
  it 'mutches aclstr with remark' do
@@ -253,7 +253,7 @@ access-list 104 permit udp 192.168.3.0 0.0.0.127 192.168.4.0 0.0.0.255
253
253
  access-list 104 deny tcp host 192.168.3.3 192.168.4.0 0.0.0.255 gt 32768
254
254
  access-list 104 remark this is remark!!
255
255
  EOL
256
- @acl.to_s.should be_aclstr(aclstr)
256
+ expect(@acl.to_s).to be_aclstr(aclstr)
257
257
  end
258
258
  end
259
259
  end
@@ -8,7 +8,7 @@ describe NamedStdAcl do
8
8
  end
9
9
 
10
10
  it 'should be zero when initialized' do
11
- @acl.size.should be_zero
11
+ expect(@acl.size).to be_zero
12
12
  end
13
13
 
14
14
  it 'should be size 1 and matches aclstr when added a acl entry' do
@@ -20,12 +20,12 @@ describe NamedStdAcl do
20
20
  }
21
21
  )
22
22
  @acl.add_entry sa
23
- @acl.size.should eq 1
23
+ expect(@acl.size).to eq 1
24
24
  aclstr = <<'EOL'
25
25
  ip access-list standard test-std-acl
26
26
  permit 192.168.3.0 0.0.0.127
27
27
  EOL
28
- @acl.to_s.should be_aclstr(aclstr)
28
+ expect(@acl.to_s).to be_aclstr(aclstr)
29
29
  end
30
30
  end
31
31
 
@@ -49,7 +49,7 @@ EOL
49
49
  end
50
50
 
51
51
  it 'should be size 2' do
52
- @acl.size.should eq 2
52
+ expect(@acl.size).to eq 2
53
53
  end
54
54
 
55
55
  it 'mutches aclstr' do
@@ -58,7 +58,7 @@ ip access-list standard test-std-acl2
58
58
  permit 192.168.3.0 0.0.0.127
59
59
  deny 192.168.4.0 0.0.0.255
60
60
  EOL
61
- @acl.to_s.should be_aclstr(aclstr)
61
+ expect(@acl.to_s).to be_aclstr(aclstr)
62
62
  end
63
63
 
64
64
  it 'mutches aclstr with remark' do
@@ -70,7 +70,7 @@ ip access-list standard test-std-acl2
70
70
  deny 192.168.4.0 0.0.0.255
71
71
  remark this is remark!!
72
72
  EOL
73
- @acl.to_s.should be_aclstr(aclstr)
73
+ expect(@acl.to_s).to be_aclstr(aclstr)
74
74
  end
75
75
  end
76
76
 
@@ -99,7 +99,7 @@ EOL
99
99
  protocol: 'tcp',
100
100
  src_operator: :eq, src_ip: '192.168.10.3', src_port: 64_332
101
101
  )
102
- ace.to_s.should be_aclstr('deny host 192.168.10.3')
102
+ expect(ace.to_s).to be_aclstr('deny host 192.168.10.3')
103
103
  end
104
104
 
105
105
  it 'should be last entry' do
@@ -107,14 +107,15 @@ EOL
107
107
  protocol: 'tcp',
108
108
  src_operator: :eq, src_ip: '10.0.0.3', src_port: 33_890
109
109
  )
110
- ace.to_s.should be_aclstr('deny 10.0.0.0 0.0.0.255')
110
+ expect(ace.to_s).to be_aclstr('deny 10.0.0.0 0.0.0.255')
111
111
  end
112
112
 
113
113
  it 'should be nil if not found match entry' do
114
- @acl.find_aces_contains(
115
- protocol: 'udp',
116
- src_operator: :eq, src_ip: '11.0.0.3', src_port: 33_333
117
- ).should be_nil
114
+ expect(
115
+ @acl.find_aces_contains(
116
+ protocol: 'udp',
117
+ src_operator: :eq, src_ip: '11.0.0.3', src_port: 33_333
118
+ )).to be_nil
118
119
  end
119
120
  end
120
121
  end
@@ -126,7 +127,7 @@ describe NumberedStdAcl do
126
127
  end
127
128
 
128
129
  it 'should be zero when initialized' do
129
- @acl.size.should be_zero
130
+ expect(@acl.size).to be_zero
130
131
  end
131
132
 
132
133
  it 'should be size 1 and matches aclstr when added a acl entry' do
@@ -138,11 +139,11 @@ describe NumberedStdAcl do
138
139
  }
139
140
  )
140
141
  @acl.add_entry sa
141
- @acl.size.should eq 1
142
+ expect(@acl.size).to eq 1
142
143
  aclstr = <<'EOL'
143
144
  access-list 10 permit 192.168.3.0 0.0.0.127
144
145
  EOL
145
- @acl.to_s.should be_aclstr(aclstr)
146
+ expect(@acl.to_s).to be_aclstr(aclstr)
146
147
  end
147
148
  end
148
149
 
@@ -166,7 +167,7 @@ EOL
166
167
  end
167
168
 
168
169
  it 'should be size 2' do
169
- @acl.size.should eq 2
170
+ expect(@acl.size).to eq 2
170
171
  end
171
172
 
172
173
  it 'mutches aclstr' do
@@ -174,7 +175,7 @@ EOL
174
175
  access-list 14 permit 192.168.3.0 0.0.0.127
175
176
  access-list 14 deny 192.168.4.0 0.0.0.255
176
177
  EOL
177
- @acl.to_s.should be_aclstr(aclstr)
178
+ expect(@acl.to_s).to be_aclstr(aclstr)
178
179
  end
179
180
 
180
181
  it 'mutches aclstr with remark' do
@@ -185,7 +186,7 @@ access-list 14 permit 192.168.3.0 0.0.0.127
185
186
  access-list 14 deny 192.168.4.0 0.0.0.255
186
187
  access-list 14 remark this is remark!!
187
188
  EOL
188
- @acl.to_s.should be_aclstr(aclstr)
189
+ expect(@acl.to_s).to be_aclstr(aclstr)
189
190
  end
190
191
  end
191
192
 
@@ -202,7 +203,7 @@ EOL
202
203
  it 'should has seq number by add_entry' do
203
204
  @acl.renumber
204
205
  @acl.reduce(10) do |num, each|
205
- each.seq_number.should eq num
206
+ expect(each.seq_number).to eq num
206
207
  num + 10
207
208
  end
208
209
  end
@@ -229,10 +230,10 @@ access-list 15 remark entry 4
229
230
  access-list 15 remark entry 2
230
231
  access-list 15 remark entry 3
231
232
  EOL
232
- @acl.name.should eq acl_new.name
233
- @acl.acl_type.should eq acl_new.acl_type
234
- @acl.to_s.should be_aclstr(aclstr)
235
- acl_new.to_s.should be_aclstr(aclstr_new)
233
+ expect(@acl.name).to eq acl_new.name
234
+ expect(@acl.acl_type).to eq acl_new.acl_type
235
+ expect(@acl.to_s).to be_aclstr(aclstr)
236
+ expect(acl_new.to_s).to be_aclstr(aclstr_new)
236
237
  end
237
238
  end
238
239
  end
@@ -4,7 +4,7 @@ require 'spec_helper'
4
4
 
5
5
  describe CiscoAclIntp do
6
6
  it 'should have a version number' do
7
- CiscoAclIntp::VERSION.should_not be_nil
7
+ expect(CiscoAclIntp::VERSION).not_to be_nil
8
8
  end
9
9
  end
10
10
 
@@ -19,9 +19,9 @@ ip access-list extended FA8-OUT
19
19
  !
20
20
  EOL
21
21
  @parser.parse_string(datastr)
22
- @parser.contains_error?.should be_false
22
+ expect(@parser.contains_error?).to be_falsey
23
23
  @parser.parse_string(StringIO.new(datastr))
24
- @parser.contains_error?.should be_false
24
+ expect(@parser.contains_error?).to be_falsey
25
25
  end
26
26
 
27
27
  it 'should not be parsed acl' do
@@ -34,15 +34,15 @@ ip access-list extended FA8-OUT
34
34
  !
35
35
  EOL
36
36
  @parser.parse_string(datastr)
37
- @parser.contains_error?.should be_true
37
+ expect(@parser.contains_error?).to be_truthy
38
38
  @parser.parse_string(StringIO.new(datastr))
39
- @parser.contains_error?.should be_true
39
+ expect(@parser.contains_error?).to be_truthy
40
40
  end
41
41
 
42
42
  it 'should be error by NON-IO object' do
43
43
  @parser.parse_string(123_456_789)
44
- @parser.contains_error?.should be_true
45
- @parser.error_list.shift.should match(/acl error/)
44
+ expect(@parser.contains_error?).to be_truthy
45
+ expect(@parser.error_list.shift).to match(/acl error/)
46
46
  end
47
47
  end
48
48
 
@@ -60,7 +60,7 @@ ip access-list extended FA8-OUT
60
60
  !
61
61
  EOL
62
62
  @parser.parse_file(StringIO.new(datastr))
63
- @parser.contains_error?.should be_false
63
+ expect(@parser.contains_error?).to be_falsey
64
64
  end
65
65
 
66
66
  it 'should not be parsed acl' do
@@ -73,13 +73,13 @@ ip access-list extended FA8-OUT
73
73
  !
74
74
  EOL
75
75
  @parser.parse_file(StringIO.new(datastr))
76
- @parser.contains_error?.should be_true
76
+ expect(@parser.contains_error?).to be_truthy
77
77
  end
78
78
 
79
79
  it 'should be error by NON-IO object' do
80
80
  @parser.parse_file(123_456_789)
81
- @parser.contains_error?.should be_true
82
- @parser.error_list.shift.should match(/Parse aborted/)
81
+ expect(@parser.contains_error?).to be_truthy
82
+ expect(@parser.error_list.shift).to match(/Parse aborted/)
83
83
  end
84
84
  end
85
85
 
@@ -111,12 +111,12 @@ EOL
111
111
  if each_test[:correct]
112
112
  it "should be parsed #{acl_file} with no error" do
113
113
  @parser.parse_file(acl_file)
114
- @parser.contains_error?.should be_false
114
+ expect(@parser.contains_error?).to be_falsey
115
115
  end
116
116
  else
117
117
  it "should be parsed #{acl_file} with error" do
118
118
  @parser.parse_file(acl_file)
119
- @parser.contains_error?.should be_true
119
+ expect(@parser.contains_error?).to be_truthy
120
120
  end
121
121
  end
122
122
  end