permissioner 0.2.0.beta → 1.0.0.beta

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: ef2fdeee2181e2b845b4067b8955a359810b638d
4
- data.tar.gz: d331ff39f167342f27d49f037ffcc8e0054d0468
3
+ metadata.gz: 43616baad7f73fa5bc6d9fcf2503ad69cd745143
4
+ data.tar.gz: 7719b023c2d20c24ee4e9851c78f60d08c6dc612
5
5
  SHA512:
6
- metadata.gz: de48e7b82506ee21f857430378497d136cf02de884a8bc655dc643c315714602da4502d98a4fa3937f5e287d2c77184ece2d9bf92bbe83329d9741b884c586c1
7
- data.tar.gz: 97e1f98ce1a663ff7439212d6e6419a33cf3050aab1e069d1eaf00f8ef06f000ca3484010229647617d74fb99503f6afe285fb689aee7bdc2cc5f93e069a883d
6
+ metadata.gz: 39fc6a0d3c6b93f56bf0c2af626f4dac11571d7c3a42a2dfe82b80294b762a01150e288f1476b4eaacaa800545274dc5858a77271d55030e06d8fef57b93fcdb
7
+ data.tar.gz: b323e09b04b4d0b957ff908af916f855e0afaed3cc63b2733f3a6b18a382847e48d7d6b7b72169b51ecab7f3764cef03691a69b854475289340aa2191a973ded
@@ -15,7 +15,7 @@ module Permissioner
15
15
  expected_attributes_exactly_match?
16
16
  end
17
17
 
18
- def failure_message_for_should
18
+ def failure_message
19
19
  if @failing_attributes.empty?
20
20
  "expected to find allowed attributes for resources\n" \
21
21
  "#{all_expected_resources}, but found allowed attributes for resources\n"\
@@ -32,7 +32,7 @@ module Permissioner
32
32
  end
33
33
  end
34
34
 
35
- def failure_message_for_should_not
35
+ def failure_message_when_negated
36
36
  'given attributes are exactly allowed although this is not expected'
37
37
  end
38
38
 
@@ -103,13 +103,13 @@ module Permissioner
103
103
  # expected_attributs_exactly_macht? allowed_attributes_for_resource
104
104
  #end
105
105
  #
106
- #def failure_message_for_should
106
+ #def failure_message
107
107
  # "expected that for resource \"#{@resource}\" attributes\n"\
108
108
  # "#{@expected_attributes} are exactly allowed, but found attributes\n"\
109
109
  # "#{allowed_attributes_for_resource} allowed"
110
110
  #end
111
111
  #
112
- #def failure_message_for_should_not
112
+ #def failure_message_when_negated
113
113
  # "expected that for resource \"#{@resource}\" attributes\n"\
114
114
  # "#{@expected_attributes} are exactly not allowed,\n"\
115
115
  # "but those attributes are exactly allowed\n"
@@ -11,13 +11,13 @@ module Permissioner
11
11
  controllers_exactly_match?(allowed_controllers)
12
12
  end
13
13
 
14
- def failure_message_for_should
14
+ def failure_message
15
15
  "expected to exactly allow controllers \n" \
16
16
  "#{@expected_controllers.sort}, but found controllers\n"\
17
17
  "#{allowed_controllers.sort} allowed"
18
18
  end
19
19
 
20
- def failure_message_for_should_not
20
+ def failure_message_when_negated
21
21
  "expected to exactly not allow controllers \n" \
22
22
  "#{@expected_controllers.sort}, but these controllers are exactly allowed\n"\
23
23
  end
@@ -11,13 +11,13 @@ module Permissioner
11
11
  resources_exactly_match?
12
12
  end
13
13
 
14
- def failure_message_for_should
14
+ def failure_message
15
15
  "expected to exactly allow resources \n" \
16
16
  "#{@expected_resources.sort}, but found resources\n"\
17
17
  "#{allowed_resources.sort} allowed"
18
18
  end
19
19
 
20
- def failure_message_for_should_not
20
+ def failure_message_when_negated
21
21
  "expected to exactly not allow resources \n" \
22
22
  "#{@expected_resources.sort}, but these resources are exactly allowed\n"\
23
23
  end
@@ -16,7 +16,7 @@ module Permissioner
16
16
  expected_actions_exactly_match?
17
17
  end
18
18
 
19
- def failure_message_for_should
19
+ def failure_message
20
20
  if @failing_actions.empty?
21
21
  "expected to find actions for controllers \n" \
22
22
  "#{all_expected_controllers}, but found actions for controllers\n"\
@@ -33,7 +33,7 @@ module Permissioner
33
33
  end
34
34
  end
35
35
 
36
- def failure_message_for_should_not
36
+ def failure_message_when_negated
37
37
  'given actions are exactly match although this is not expected'
38
38
  end
39
39
 
@@ -1,3 +1,3 @@
1
1
  module Permissioner
2
- VERSION = "0.2.0.beta"
2
+ VERSION = "1.0.0.beta"
3
3
  end
@@ -18,8 +18,8 @@ Gem::Specification.new do |gem|
18
18
  gem.test_files = gem.files.grep(%r{^(test|spec|features)/})
19
19
  gem.require_paths = ["lib"]
20
20
 
21
- gem.add_development_dependency "rspec", "~>2.14.1"
22
- gem.add_development_dependency "activesupport", "~>4.0.2"
23
- gem.add_development_dependency "actionpack", "~>4.0.2"
24
- gem.add_development_dependency "guard-rspec", "~>4.2.0"
21
+ gem.add_development_dependency "rspec", ">=3.0.0"
22
+ gem.add_development_dependency "activesupport", ">=4.1.0"
23
+ gem.add_development_dependency "actionpack", ">=4.1.0"
24
+ gem.add_development_dependency "guard-rspec", ">=4.3.0"
25
25
  end
@@ -13,24 +13,24 @@ describe Permissioner::Configurer do
13
13
  let(:permission_configurer) { permission_configurer_class.new(permission_service, 'current_user') }
14
14
 
15
15
  it 'should delegate call to allow_actions to permission_service' do
16
- permission_service.should_receive(:allow_actions).with(:comments, :index)
16
+ expect(permission_service).to receive(:allow_actions).with(:comments, :index)
17
17
  permission_configurer.allow_actions(:comments, :index)
18
18
  end
19
19
 
20
20
  it 'should delegate call to allow_attributes to permission_service' do
21
- permission_service.should_receive(:allow_attributes).with(:comment, [:user_id, :text])
21
+ expect(permission_service).to receive(:allow_attributes).with(:comment, [:user_id, :text])
22
22
  permission_configurer.allow_attributes(:comment, [:user_id, :text])
23
23
  end
24
24
 
25
25
  it 'should delegate call to add_filter to permission_service' do
26
26
  block = Proc.new {}
27
- permission_service.should_receive(:add_filter).with(:comments, :create, &block)
27
+ expect(permission_service).to receive(:add_filter).with(:comments, :create, &block)
28
28
  permission_configurer.add_filter(:comments, :create, &block)
29
29
  end
30
30
 
31
31
  it 'should delegate call to clear_filter to permission_service' do
32
32
  block = Proc.new {}
33
- permission_service.should_receive(:clear_filters).with(no_args)
33
+ expect(permission_service).to receive(:clear_filters).with(no_args)
34
34
  permission_configurer.clear_filters
35
35
  end
36
36
  end
@@ -39,11 +39,11 @@ describe Permissioner::Configurer do
39
39
  subject(:permission_configurer){ permission_configurer_class.new(nil, nil) }
40
40
 
41
41
  it 'should respond_to permission_service' do
42
- should respond_to(:permission_service)
42
+ is_expected.to respond_to(:permission_service)
43
43
  end
44
44
 
45
45
  it 'should respond_to current_user' do
46
- should respond_to(:current_user)
46
+ is_expected.to respond_to(:current_user)
47
47
  end
48
48
  end
49
49
 
@@ -51,16 +51,16 @@ describe Permissioner::Configurer do
51
51
 
52
52
  it 'should set permission_service' do
53
53
  permission_configurer = permission_configurer_class.new('permission_service', nil)
54
- permission_configurer.permission_service.should eq 'permission_service'
54
+ expect(permission_configurer.permission_service).to eq 'permission_service'
55
55
  end
56
56
 
57
57
  it 'should set current_user' do
58
58
  permission_configurer = permission_configurer_class.new(nil, 'current_user')
59
- permission_configurer.current_user.should eq 'current_user'
59
+ expect(permission_configurer.current_user).to eq 'current_user'
60
60
  end
61
61
 
62
62
  it 'should call configure_permissions current_user' do
63
- permission_configurer_class.any_instance.should_receive(:configure_permissions)
63
+ expect_any_instance_of(permission_configurer_class).to receive(:configure_permissions)
64
64
  permission_configurer_class.new(nil, nil)
65
65
  end
66
66
  end
@@ -4,10 +4,10 @@ describe Permissioner::ControllerAdditions do
4
4
 
5
5
  let(:controller) do
6
6
  controller_class = Class.new
7
- controller_class.stub(:helper_method)
7
+ allow(controller_class).to receive(:helper_method)
8
8
  controller_class.send(:include, Permissioner::ControllerAdditions)
9
9
  controller = controller_class.new
10
- controller.stub(:current_user)
10
+ allow(controller).to receive(:current_user)
11
11
  controller
12
12
  end
13
13
 
@@ -16,13 +16,13 @@ describe Permissioner::ControllerAdditions do
16
16
  let(:clazz) { Class.new }
17
17
 
18
18
  it 'should set view helpers' do
19
- clazz.should_receive(:helper_method).with(:allow_action?, :allow_attribute?, :permission_service)
19
+ expect(clazz).to receive(:helper_method).with(:allow_action?, :allow_attribute?, :permission_service)
20
20
  clazz.send(:include, Permissioner::ControllerAdditions)
21
21
  end
22
22
 
23
23
  it 'should delegate helper methods to permission servie' do
24
- clazz.stub(:helper_method)
25
- clazz.should_receive(:delegate).with(:allow_action?, :allow_attribute?, to: :permission_service)
24
+ allow(clazz).to receive(:helper_method)
25
+ expect(clazz).to receive(:delegate).with(:allow_action?, :allow_attribute?, to: :permission_service)
26
26
  clazz.send(:include, Permissioner::ControllerAdditions)
27
27
  end
28
28
  end
@@ -32,23 +32,23 @@ describe Permissioner::ControllerAdditions do
32
32
  let(:params) { {controller: 'comments', action: 'index'} }
33
33
 
34
34
  before :each do
35
- controller.stub(:current_resource).and_return('resource')
36
- controller.stub(:params).and_return(params)
35
+ allow(controller).to receive(:current_resource).and_return('resource')
36
+ allow(controller).to receive(:params).and_return(params)
37
37
  end
38
38
 
39
39
  it 'should call permit_params! if action allwed and filters passed' do
40
- controller.permission_service.should_receive(:allow_action?).and_return(true)
41
- controller.permission_service.should_receive(:permit_params!).with(params)
40
+ expect(controller.permission_service).to receive(:allow_action?).and_return(true)
41
+ expect(controller.permission_service).to receive(:permit_params!).with(params)
42
42
  controller.authorize
43
43
  end
44
44
 
45
45
  it 'should call allow_action? with correct parameters' do
46
- controller.permission_service.should_receive(:allow_action?).with('comments', 'index', resource: 'resource', params: params).and_return(true)
46
+ expect(controller.permission_service).to receive(:allow_action?).with('comments', 'index', resource: 'resource', params: params).and_return(true)
47
47
  controller.authorize
48
48
  end
49
49
 
50
50
  it 'should raise Permissioner::NotAuthorized when action not allowed' do
51
- controller.permission_service.should_receive(:allow_action?).with('comments', 'index', resource: 'resource', params: params).and_return(false)
51
+ expect(controller.permission_service).to receive(:allow_action?).with('comments', 'index', resource: 'resource', params: params).and_return(false)
52
52
  expect {
53
53
  controller.authorize
54
54
  }.to raise_error Permissioner::NotAuthorized
@@ -58,21 +58,21 @@ describe Permissioner::ControllerAdditions do
58
58
  describe '#permission_service' do
59
59
 
60
60
  it 'should return instance of PermissionService' do
61
- controller.permission_service.class.should eq PermissionService
61
+ expect(controller.permission_service.class).to eq PermissionService
62
62
  end
63
63
 
64
64
  it 'should cache PermissionService instance' do
65
- controller.permission_service.should be controller.permission_service
65
+ expect(controller.permission_service).to be controller.permission_service
66
66
  end
67
67
 
68
68
  it 'should create PermissionService by calling PermissionService::new' do
69
- PermissionService.should_receive(:new)
69
+ expect(PermissionService).to receive(:new)
70
70
  controller.permission_service
71
71
  end
72
72
 
73
73
  it 'should pass current_user to PermissionService::initialize' do
74
- controller.should_receive(:current_user).and_return('current_user')
75
- PermissionService.should_receive(:new).with('current_user')
74
+ expect(controller).to receive(:current_user).and_return('current_user')
75
+ expect(PermissionService).to receive(:new).with('current_user')
76
76
  controller.permission_service
77
77
  end
78
78
  end
@@ -80,7 +80,7 @@ describe Permissioner::ControllerAdditions do
80
80
  describe '#current_resource' do
81
81
 
82
82
  it 'should return nil as default' do
83
- controller.current_resource.should be_nil
83
+ expect(controller.current_resource).to be_nil
84
84
  end
85
85
  end
86
86
  end
@@ -18,9 +18,9 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
18
18
 
19
19
  it 'should ensure that all attributes are into an array' do
20
20
  matcher = create_matcher [:resource, :attribute]
21
- matcher.instance_variable_get(:@all_expected_attributes).should eq [[:resource, [:attribute]]]
21
+ expect(matcher.instance_variable_get(:@all_expected_attributes)).to eq [[:resource, [:attribute]]]
22
22
  matcher = create_matcher [:resource, [:attribute_1, :attribute_2]]
23
- matcher.instance_variable_get(:@all_expected_attributes).should eq [[:resource, [:attribute_1, :attribute_2]]]
23
+ expect(matcher.instance_variable_get(:@all_expected_attributes)).to eq [[:resource, [:attribute_1, :attribute_2]]]
24
24
  end
25
25
 
26
26
  it 'should raise an exception if multiple actions not stated as array' do
@@ -40,7 +40,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
40
40
  [:comment, [:user_id, :post_id, :content]],
41
41
  [:post, [:user_id, :content]]
42
42
  )
43
- matcher.matches?(permission_service).should be_true
43
+ expect(matcher.matches?(permission_service)).to be_truthy
44
44
  end
45
45
 
46
46
  it 'should accept attributs being a hash' do
@@ -60,7 +60,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
60
60
  ]
61
61
  ]
62
62
  )
63
- matcher.matches?(permission_service).should be_true
63
+ expect(matcher.matches?(permission_service)).to be_truthy
64
64
  end
65
65
  end
66
66
 
@@ -72,7 +72,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
72
72
  [:comment, [:user_id, :post_id, :content]],
73
73
  [:account, [:user_id, :content]]
74
74
  )
75
- matcher.matches?(permission_service).should be_false
75
+ expect(matcher.matches?(permission_service)).to be_falsey
76
76
  end
77
77
 
78
78
  it 'should return false if at least one resource is allowed but no expected' do
@@ -80,7 +80,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
80
80
  [:user, [:name, :email, :phone]],
81
81
  [:comment, [:user_id, :post_id, :content]]
82
82
  )
83
- matcher.matches?(permission_service).should be_false
83
+ expect(matcher.matches?(permission_service)).to be_falsey
84
84
  end
85
85
  end
86
86
 
@@ -92,7 +92,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
92
92
  [:comment, [:user_id, :post_id, :content]],
93
93
  [:post, [:user_id, :content]]
94
94
  )
95
- matcher.matches?(permission_service).should be_false
95
+ expect(matcher.matches?(permission_service)).to be_falsey
96
96
  end
97
97
 
98
98
  it 'should return false if at least one attribute is allowed but not expected' do
@@ -101,27 +101,27 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
101
101
  [:comment, [:user_id, :post_id, :content]],
102
102
  [:post, [:user_id, :content]]
103
103
  )
104
- matcher.matches?(permission_service).should be_false
104
+ expect(matcher.matches?(permission_service)).to be_falsey
105
105
  end
106
106
  end
107
107
  end
108
108
 
109
- describe '#failure_message_for_should_not' do
109
+ describe '# failure_message_when_negated' do
110
110
 
111
111
  it 'should be available' do
112
112
  matcher = create_matcher
113
113
  expected_messages = 'given attributes are exactly allowed although this is not expected'
114
- matcher.failure_message_for_should_not.should eq expected_messages
114
+ expect(matcher. failure_message_when_negated).to eq expected_messages
115
115
  end
116
116
 
117
117
  it 'should be available' do
118
118
  matcher = create_matcher
119
119
  matcher.matches?(PermissionService.new)
120
- matcher.failure_message_for_should_not.should be_kind_of(String)
120
+ expect(matcher. failure_message_when_negated).to be_kind_of(String)
121
121
  end
122
122
  end
123
123
 
124
- describe '#failure_message_for_should' do
124
+ describe '#failure_message' do
125
125
 
126
126
  context 'if resources did not match' do
127
127
 
@@ -136,7 +136,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
136
136
  "[:comment, :post, :user]"
137
137
  #call is necessary because matches sets @permission_service
138
138
  matcher.matches?(permission_service)
139
- matcher.failure_message_for_should.should eq expected_messages
139
+ expect(matcher.failure_message).to eq expected_messages
140
140
  end
141
141
 
142
142
  it 'should work if no controller allowed' do
@@ -147,7 +147,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
147
147
  )
148
148
  #call is necessary because matches sets @permission_service
149
149
  matcher.matches?(PermissionService.new)
150
- matcher.failure_message_for_should.should be_kind_of(String)
150
+ expect(matcher.failure_message).to be_kind_of(String)
151
151
  end
152
152
  end
153
153
 
@@ -170,7 +170,7 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
170
170
  "[:user_id, :post_id, :content] are allowed\n"
171
171
  #call is necessary because matches sets @permission_service
172
172
  matcher.matches?(permission_service)
173
- matcher.failure_message_for_should.should eq expected_messages
173
+ expect(matcher.failure_message).to eq expected_messages
174
174
  end
175
175
 
176
176
 
@@ -182,12 +182,12 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
182
182
  )
183
183
  #call is necessary because matches sets @permission_service
184
184
  matcher.matches?(PermissionService.new)
185
- matcher.failure_message_for_should.should be_kind_of(String)
185
+ expect(matcher.failure_message).to be_kind_of(String)
186
186
  end
187
187
  end
188
188
  end
189
189
 
190
- #describe '#failure_message_for_should' do
190
+ #describe '#failure_message' do
191
191
  #
192
192
  # it 'should be available' do
193
193
  # matcher = create_matcher :user, [:name, :email, :street]
@@ -196,17 +196,17 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
196
196
  # "[:name, :email, :street] are exactly allowed, but found attributes\n"\
197
197
  # "[:name, :email, :phone] allowed"
198
198
  # matcher.matches?(permission_service)
199
- # matcher.failure_message_for_should.should eq expected_messages
199
+ # matcher.failure_message.should eq expected_messages
200
200
  # end
201
201
  #
202
202
  # it 'should work if no controller allowed' do
203
203
  # matcher = create_matcher :user, [:name, :email, :street]
204
204
  # matcher.matches?(PermissionService.new)
205
- # matcher.failure_message_for_should.should be_kind_of(String)
205
+ # matcher.failure_message.should be_kind_of(String)
206
206
  # end
207
207
  #end
208
208
  #
209
- #describe '#failure_message_for_should_not' do
209
+ #describe '# failure_message_when_negated' do
210
210
  #
211
211
  # it 'should be available' do
212
212
  # matcher = create_matcher :user, [:name, :email, :street]
@@ -215,13 +215,13 @@ describe Permissioner::Matchers::ExactlyAllowAttributes do
215
215
  # "[:name, :email, :street] are exactly not allowed,\n"\
216
216
  # "but those attributes are exactly allowed\n"
217
217
  # matcher.matches?(permission_service)
218
- # matcher.failure_message_for_should_not.should eq expected_messages
218
+ # matcher. failure_message_when_negated.should eq expected_messages
219
219
  # end
220
220
  #
221
221
  # it 'should work if no controller allowed' do
222
222
  # matcher = create_matcher :user, [:name, :email, :street]
223
223
  # matcher.matches?(PermissionService.new)
224
- # matcher.failure_message_for_should_not.should be_kind_of(String)
224
+ # matcher. failure_message_when_negated.should be_kind_of(String)
225
225
  # end
226
226
  #end
227
227
  end
@@ -19,7 +19,7 @@ describe Permissioner::Matchers::ExactlyAllowControllers do
19
19
 
20
20
  it 'should transform expected_controllers to strings' do
21
21
  matcher = create_matcher(:comments, :users)
22
- matcher.instance_variable_get(:@expected_controllers).should eq ['comments', 'users']
22
+ expect(matcher.instance_variable_get(:@expected_controllers)).to eq ['comments', 'users']
23
23
  end
24
24
  end
25
25
 
@@ -27,26 +27,26 @@ describe Permissioner::Matchers::ExactlyAllowControllers do
27
27
 
28
28
  it 'should return true if exactly all expected controllers allowed' do
29
29
  matcher = create_matcher(:comments, :users, :posts)
30
- matcher.matches?(permission_service).should be_true
30
+ expect(matcher.matches?(permission_service)).to be_truthy
31
31
  end
32
32
 
33
33
  it 'should return false if at least one controller is not allowed' do
34
34
  matcher = create_matcher(:comments, :users, :posts, :blogs)
35
- matcher.matches?(permission_service).should be_false
35
+ expect(matcher.matches?(permission_service)).to be_falsey
36
36
  end
37
37
 
38
38
  it 'should return true if more controllers allowed than expected' do
39
39
  matcher = create_matcher(:comments, :users)
40
- matcher.matches?(permission_service).should be_false
40
+ expect(matcher.matches?(permission_service)).to be_falsey
41
41
  end
42
42
 
43
43
  it 'should work if no controller allowed' do
44
44
  matcher = create_matcher(:comments, :users)
45
- matcher.matches?(PermissionService.new).should be_false
45
+ expect(matcher.matches?(PermissionService.new)).to be_falsey
46
46
  end
47
47
  end
48
48
 
49
- describe '#failure_message_for_should' do
49
+ describe '#failure_message' do
50
50
 
51
51
  it 'should be available' do
52
52
  matcher = create_matcher(:comments)
@@ -56,30 +56,30 @@ describe Permissioner::Matchers::ExactlyAllowControllers do
56
56
  "[\"comments\", \"posts\", \"users\"] allowed"
57
57
  #call is necessary because matches sets @permission_service
58
58
  matcher.matches?(permission_service)
59
- matcher.failure_message_for_should.should eq expected_messages
59
+ expect(matcher.failure_message).to eq expected_messages
60
60
  end
61
61
 
62
62
  it 'should work if no controller allowed' do
63
63
  matcher = create_matcher(:comments)
64
64
  #call is necessary because matches sets @permission_service
65
65
  matcher.matches?((PermissionService.new))
66
- matcher.failure_message_for_should.should be_kind_of(String)
66
+ expect(matcher.failure_message).to be_kind_of(String)
67
67
  end
68
68
  end
69
69
 
70
- describe '#failure_message_for_should_not' do
70
+ describe '# failure_message_when_negated' do
71
71
 
72
72
  it 'should be available' do
73
73
  matcher = create_matcher(:users, :comments)
74
74
  expected_messages =
75
75
  "expected to exactly not allow controllers \n" \
76
76
  "[\"comments\", \"users\"], but these controllers are exactly allowed\n"
77
- matcher.failure_message_for_should_not.should eq expected_messages
77
+ expect(matcher. failure_message_when_negated).to eq expected_messages
78
78
  end
79
79
 
80
80
  it 'should work if no controller allowed' do
81
81
  matcher = create_matcher(:comments, :users)
82
- matcher.failure_message_for_should_not.should be_kind_of(String)
82
+ expect(matcher. failure_message_when_negated).to be_kind_of(String)
83
83
  end
84
84
  end
85
85