signet 0.5.1 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -33,8 +33,8 @@ describe Signet::OAuth1 do
33
33
  ["z", "p"],
34
34
  ["z", "t"]
35
35
  ]
36
- Signet::OAuth1.normalize_parameters(parameters).should ==
37
- 'a=1&c=hi%20there&f=25&f=50&f=a&z=p&z=t'
36
+ expect(Signet::OAuth1.normalize_parameters(parameters)).to eq(
37
+ 'a=1&c=hi%20there&f=25&f=50&f=a&z=p&z=t')
38
38
  end
39
39
 
40
40
  it 'should correctly normalize parameters' do
@@ -51,10 +51,10 @@ describe Signet::OAuth1 do
51
51
  ["c2", ""],
52
52
  ["a3", "2 q"]
53
53
  ]
54
- Signet::OAuth1.normalize_parameters(parameters).should ==
54
+ expect(Signet::OAuth1.normalize_parameters(parameters)).to eq(
55
55
  'a2=r%20b&a3=2%20q&a3=a&b5=%3D%253D&c%40=&c2=&oauth_consumer_key=9dj' +
56
56
  'dj82h48djs9d2&oauth_nonce=7d8f3e4a&oauth_signature_method=HMAC-SHA1' +
57
- '&oauth_timestamp=137131201&oauth_token=kkk9d7dh3k39sjv7'
57
+ '&oauth_timestamp=137131201&oauth_token=kkk9d7dh3k39sjv7')
58
58
  end
59
59
 
60
60
  it 'should exclude the "oauth_signature" parameter when normalizing' do
@@ -64,22 +64,22 @@ describe Signet::OAuth1 do
64
64
  ["c", "3"],
65
65
  ["oauth_signature", "dpf43f3p2l4k3l03"]
66
66
  ]
67
- Signet::OAuth1.normalize_parameters(parameters).should ==
68
- "a=1&b=2&c=3"
67
+ expect(Signet::OAuth1.normalize_parameters(parameters)).to eq(
68
+ "a=1&b=2&c=3")
69
69
  end
70
70
 
71
71
  it 'should raise an error if normalizing parameters with bogus values' do
72
- (lambda do
72
+ expect(lambda do
73
73
  Signet::OAuth1.normalize_parameters(42)
74
- end).should raise_error(TypeError)
74
+ end).to raise_error(TypeError)
75
75
  end
76
76
 
77
77
  it 'should raise an error if generating a base string with bogus values' do
78
- (lambda do
78
+ expect(lambda do
79
79
  Signet::OAuth1.generate_base_string(
80
80
  "GET", "http://photos.example.net/photos", 42
81
81
  )
82
- end).should raise_error(TypeError)
82
+ end).to raise_error(TypeError)
83
83
  end
84
84
 
85
85
  it 'should correctly generate a base string' do
@@ -95,7 +95,7 @@ describe Signet::OAuth1 do
95
95
  "file" => "vacation.jpg",
96
96
  "size" => "original"
97
97
  }
98
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
98
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
99
99
  "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26" +
100
100
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
101
101
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -118,7 +118,7 @@ describe Signet::OAuth1 do
118
118
  "file" => "vacation.jpg",
119
119
  "size" => "original"
120
120
  }
121
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
121
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
122
122
  "GET&http%3A%2F%2Fphotos.example.net%2F" +
123
123
  "https%253A%252F%252Fwww.example.com&file%3Dvacation.jpg%26" +
124
124
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
@@ -140,7 +140,7 @@ describe Signet::OAuth1 do
140
140
  "oauth_nonce" => "kllo9940pd9333jh",
141
141
  "oauth_version" => "1.0"
142
142
  }
143
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
143
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
144
144
  "GET&http%3A%2F%2Fexample.com%2Fr%2520v%2FX&" +
145
145
  "id%3D123%26oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
146
146
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -161,7 +161,7 @@ describe Signet::OAuth1 do
161
161
  "oauth_nonce" => "kllo9940pd9333jh",
162
162
  "oauth_version" => "1.0"
163
163
  }
164
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
164
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
165
165
  "GET&http%3A%2F%2Fwww.example.net%3A8080%2F&" +
166
166
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
167
167
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -183,7 +183,7 @@ describe Signet::OAuth1 do
183
183
  "file" => "vacation.jpg",
184
184
  "size" => "original"
185
185
  }
186
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
186
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
187
187
  "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26" +
188
188
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
189
189
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -206,7 +206,7 @@ describe Signet::OAuth1 do
206
206
  "file" => "vacation.jpg",
207
207
  "size" => "original"
208
208
  }
209
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
209
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
210
210
  "GET&https%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26" +
211
211
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
212
212
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -229,7 +229,7 @@ describe Signet::OAuth1 do
229
229
  "oauth_version" => "1.0",
230
230
  "size" => "original"
231
231
  }
232
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
232
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
233
233
  "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26" +
234
234
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
235
235
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -252,7 +252,7 @@ describe Signet::OAuth1 do
252
252
  "oauth_version" => "1.0",
253
253
  "size" => "original"
254
254
  }
255
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
255
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
256
256
  "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26" +
257
257
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
258
258
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -275,7 +275,7 @@ describe Signet::OAuth1 do
275
275
  "oauth_version" => "1.0",
276
276
  "size" => "original"
277
277
  }
278
- Signet::OAuth1.generate_base_string(method, uri, parameters).should == (
278
+ expect(Signet::OAuth1.generate_base_string(method, uri, parameters)).to eq(
279
279
  "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26" +
280
280
  "oauth_consumer_key%3Ddpf43f3p2l4k3l03%26" +
281
281
  "oauth_nonce%3Dkllo9940pd9333jh%26" +
@@ -295,9 +295,9 @@ describe Signet::OAuth1 do
295
295
  ["oauth_nonce", "4572616e48616d6d65724c61686176"],
296
296
  ["oauth_version", "1.0"]
297
297
  ]
298
- Signet::OAuth1.generate_authorization_header(
298
+ expect(Signet::OAuth1.generate_authorization_header(
299
299
  parameters, "http://sp.example.com/"
300
- ).should == (
300
+ )).to eq (
301
301
  'OAuth realm="http://sp.example.com/", ' +
302
302
  'oauth_consumer_key="0685bd9184jfhq22", ' +
303
303
  'oauth_token="ad180jjd733klru7", ' +
@@ -311,9 +311,9 @@ describe Signet::OAuth1 do
311
311
 
312
312
  it 'should raise an error if generating an authorization header ' +
313
313
  'with bogus values' do
314
- (lambda do
314
+ expect(lambda do
315
315
  Signet::OAuth1.generate_authorization_header(42)
316
- end).should raise_error(TypeError)
316
+ end).to raise_error(TypeError)
317
317
  end
318
318
 
319
319
  it 'should raise an error if generating an authorization header ' +
@@ -328,9 +328,9 @@ describe Signet::OAuth1 do
328
328
  ["oauth_nonce", "4572616e48616d6d65724c61686176"],
329
329
  ["oauth_version", "1.0"]
330
330
  ]
331
- (lambda do
331
+ expect(lambda do
332
332
  Signet::OAuth1.generate_authorization_header(parameters)
333
- end).should raise_error(ArgumentError)
333
+ end).to raise_error(ArgumentError)
334
334
  end
335
335
 
336
336
  it 'should correctly parse an authorization header' do
@@ -344,14 +344,14 @@ describe Signet::OAuth1 do
344
344
  'oauth_nonce="4572616e48616d6d65724c61686176", ' +
345
345
  'oauth_version="1.0"'
346
346
  ).inject({}) { |h,(k,v)| h[k]=v; h }
347
- parameters['realm'].should == 'http://sp.example.com/'
348
- parameters['oauth_consumer_key'].should == '0685bd9184jfhq22'
349
- parameters['oauth_token'].should == 'ad180jjd733klru7'
350
- parameters['oauth_signature_method'].should == 'HMAC-SHA1'
351
- parameters['oauth_signature'].should == 'wOJIO9A2W5mFwDgiDvZbTSMK/PY='
352
- parameters['oauth_timestamp'].should == '137131200'
353
- parameters['oauth_nonce'].should == '4572616e48616d6d65724c61686176'
354
- parameters['oauth_version'].should == '1.0'
347
+ expect(parameters['realm']).to eq 'http://sp.example.com/'
348
+ expect(parameters['oauth_consumer_key']).to eq '0685bd9184jfhq22'
349
+ expect(parameters['oauth_token']).to eq 'ad180jjd733klru7'
350
+ expect(parameters['oauth_signature_method']).to eq 'HMAC-SHA1'
351
+ expect(parameters['oauth_signature']).to eq 'wOJIO9A2W5mFwDgiDvZbTSMK/PY='
352
+ expect(parameters['oauth_timestamp']).to eq '137131200'
353
+ expect(parameters['oauth_nonce']).to eq '4572616e48616d6d65724c61686176'
354
+ expect(parameters['oauth_version']).to eq '1.0'
355
355
  end
356
356
 
357
357
  it 'should not unescape a realm in an authorization header' do
@@ -366,38 +366,38 @@ describe Signet::OAuth1 do
366
366
  'oauth_nonce="4572616e48616d6d65724c61686176", ' +
367
367
  'oauth_version="1.0"'
368
368
  ).inject({}) { |h,(k,v)| h[k]=v; h }
369
- parameters['realm'].should == 'http%3A%2F%2Fsp.example.com%2F'
370
- parameters['domain'].should == 'http://sp.example.com/'
371
- parameters['oauth_consumer_key'].should == '0685bd9184jfhq22'
372
- parameters['oauth_token'].should == 'ad180jjd733klru7'
373
- parameters['oauth_signature_method'].should == 'HMAC-SHA1'
374
- parameters['oauth_signature'].should == 'wOJIO9A2W5mFwDgiDvZbTSMK/PY='
375
- parameters['oauth_timestamp'].should == '137131200'
376
- parameters['oauth_nonce'].should == '4572616e48616d6d65724c61686176'
377
- parameters['oauth_version'].should == '1.0'
369
+ expect(parameters['realm']).to eq 'http%3A%2F%2Fsp.example.com%2F'
370
+ expect(parameters['domain']).to eq 'http://sp.example.com/'
371
+ expect(parameters['oauth_consumer_key']).to eq '0685bd9184jfhq22'
372
+ expect(parameters['oauth_token']).to eq 'ad180jjd733klru7'
373
+ expect(parameters['oauth_signature_method']).to eq 'HMAC-SHA1'
374
+ expect(parameters['oauth_signature']).to eq 'wOJIO9A2W5mFwDgiDvZbTSMK/PY='
375
+ expect(parameters['oauth_timestamp']).to eq '137131200'
376
+ expect(parameters['oauth_nonce']).to eq '4572616e48616d6d65724c61686176'
377
+ expect(parameters['oauth_version']).to eq '1.0'
378
378
  end
379
379
 
380
380
  it 'should raise an error if parsing an authorization header ' +
381
381
  'with bogus values' do
382
- (lambda do
382
+ expect(lambda do
383
383
  Signet::OAuth1.parse_authorization_header(42)
384
- end).should raise_error(TypeError)
384
+ end).to raise_error(TypeError)
385
385
  end
386
386
 
387
387
  it 'should raise an error if parsing a non-OAuth authorization header' do
388
- (lambda do
388
+ expect(lambda do
389
389
  Signet::OAuth1.parse_authorization_header(
390
390
  'Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=='
391
391
  )
392
- end).should raise_error(Signet::ParseError)
392
+ end).to raise_error(Signet::ParseError)
393
393
  end
394
394
 
395
395
  it 'should correctly parse a form encoded credential' do
396
396
  credential = Signet::OAuth1.parse_form_encoded_credentials(
397
397
  'oauth_token=hh5s93j4hdidpola&oauth_token_secret=hdhd0244k9j7ao03'
398
398
  )
399
- credential.key.should == 'hh5s93j4hdidpola'
400
- credential.secret.should == 'hdhd0244k9j7ao03'
399
+ expect(credential.key).to eq 'hh5s93j4hdidpola'
400
+ expect(credential.secret).to eq 'hdhd0244k9j7ao03'
401
401
  end
402
402
 
403
403
  it 'should correctly parse a form encoded credential' do
@@ -405,15 +405,15 @@ describe Signet::OAuth1 do
405
405
  'oauth_token=hdk48Djdsa&oauth_token_secret=xyz4992k83j47x0b&' +
406
406
  'oauth_callback_confirmed=true'
407
407
  )
408
- credential.key.should == 'hdk48Djdsa'
409
- credential.secret.should == 'xyz4992k83j47x0b'
408
+ expect(credential.key).to eq 'hdk48Djdsa'
409
+ expect(credential.secret).to eq 'xyz4992k83j47x0b'
410
410
  end
411
411
 
412
412
  it 'should raise an error if parsing a form encoded credential ' +
413
413
  'with bogus values' do
414
- (lambda do
414
+ expect(lambda do
415
415
  Signet::OAuth1.parse_form_encoded_credentials(42)
416
- end).should raise_error(TypeError)
416
+ end).to raise_error(TypeError)
417
417
  end
418
418
 
419
419
  it 'should correctly generate a signature for a set of parameters' do
@@ -431,13 +431,13 @@ describe Signet::OAuth1 do
431
431
  "file" => "vacation.jpg",
432
432
  "size" => "original"
433
433
  }
434
- Signet::OAuth1.sign_parameters(
434
+ expect(Signet::OAuth1.sign_parameters(
435
435
  method,
436
436
  uri,
437
437
  parameters,
438
438
  client_credential_secret,
439
439
  token_credential_secret
440
- ).should == "tR3+Ty81lMeYAr/Fid0kMTYa/WM="
440
+ )).to eq "tR3+Ty81lMeYAr/Fid0kMTYa/WM="
441
441
  end
442
442
 
443
443
  it 'should raise an error when trying to sign with with unknown method' do
@@ -455,7 +455,7 @@ describe Signet::OAuth1 do
455
455
  "file" => "vacation.jpg",
456
456
  "size" => "original"
457
457
  }
458
- (lambda do
458
+ expect(lambda do
459
459
  Signet::OAuth1.sign_parameters(
460
460
  method,
461
461
  uri,
@@ -463,7 +463,7 @@ describe Signet::OAuth1 do
463
463
  client_credential_secret,
464
464
  token_credential_secret
465
465
  )
466
- end).should raise_error(NotImplementedError)
466
+ end).to raise_error(NotImplementedError)
467
467
  end
468
468
 
469
469
  it 'should correctly generate authorization URIs' do
@@ -477,10 +477,10 @@ describe Signet::OAuth1 do
477
477
  :callback => callback
478
478
  )
479
479
  )
480
- parsed_uri.query_values.should have_key('oauth_token')
481
- parsed_uri.query_values['oauth_token'].should == temporary_credential_key
482
- parsed_uri.query_values.should have_key('oauth_callback')
483
- parsed_uri.query_values['oauth_callback'].should == callback
480
+ expect(parsed_uri.query_values).to have_key('oauth_token')
481
+ expect(parsed_uri.query_values['oauth_token']).to eq temporary_credential_key
482
+ expect(parsed_uri.query_values).to have_key('oauth_callback')
483
+ expect(parsed_uri.query_values['oauth_callback']).to eq callback
484
484
  end
485
485
  end
486
486
 
@@ -501,55 +501,55 @@ describe Signet::OAuth1, 'when generating temporary credentials parameters' do
501
501
  end
502
502
 
503
503
  it 'should raise an error if the client credential key is missing' do
504
- (lambda do
504
+ expect(lambda do
505
505
  Signet::OAuth1.unsigned_temporary_credential_parameters(
506
506
  :client_credential_key => nil,
507
507
  :callback => @callback,
508
508
  :signature_method => @signature_method,
509
509
  :additional_parameters => @additional_parameters
510
510
  )
511
- end).should raise_error(ArgumentError)
511
+ end).to raise_error(ArgumentError)
512
512
  end
513
513
 
514
514
  it 'should have the correct client credential key' do
515
- @unsigned_parameters.should have_key('oauth_consumer_key')
516
- @unsigned_parameters['oauth_consumer_key'].should == @client_credential_key
515
+ expect(@unsigned_parameters).to have_key('oauth_consumer_key')
516
+ expect(@unsigned_parameters['oauth_consumer_key']).to eq @client_credential_key
517
517
  end
518
518
 
519
519
  it 'should have the correct signature method' do
520
- @unsigned_parameters.should have_key('oauth_signature_method')
521
- @unsigned_parameters['oauth_signature_method'].should == @signature_method
520
+ expect(@unsigned_parameters).to have_key('oauth_signature_method')
521
+ expect(@unsigned_parameters['oauth_signature_method']).to eq @signature_method
522
522
  end
523
523
 
524
524
  it 'should have a valid timestamp' do
525
525
  # Verify that we have a timestamp, it's in the correct format and within
526
526
  # a reasonable range of the current time.
527
- @unsigned_parameters.should have_key('oauth_timestamp')
528
- @unsigned_parameters['oauth_timestamp'].should =~ /^[0-9]+$/
529
- @unsigned_parameters['oauth_timestamp'].to_i.should <= Time.now.to_i
530
- @unsigned_parameters['oauth_timestamp'].to_i.should >= Time.now.to_i - 1
527
+ expect(@unsigned_parameters).to have_key('oauth_timestamp')
528
+ expect(@unsigned_parameters['oauth_timestamp']).to match(/^[0-9]+$/)
529
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be <= Time.now.to_i
530
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be >= Time.now.to_i - 1
531
531
  end
532
532
 
533
533
  it 'should have a valid nonce' do
534
534
  # Verify that we have a nonce and that it has sufficient length for
535
535
  # uniqueness.
536
- @unsigned_parameters.should have_key('oauth_nonce')
537
- @unsigned_parameters['oauth_nonce'].should =~ /^[0-9a-zA-Z]{16,100}$/
536
+ expect(@unsigned_parameters).to have_key('oauth_nonce')
537
+ expect(@unsigned_parameters['oauth_nonce']).to match(/^[0-9a-zA-Z]{16,100}$/)
538
538
  end
539
539
 
540
540
  it 'should have the correct callback' do
541
- @unsigned_parameters.should have_key('oauth_callback')
542
- @unsigned_parameters['oauth_callback'].should == @callback
541
+ expect(@unsigned_parameters).to have_key('oauth_callback')
542
+ expect(@unsigned_parameters['oauth_callback']).to eq @callback
543
543
  end
544
544
 
545
545
  it 'should have the correct scope parameter' do
546
- @unsigned_parameters.should have_key('scope')
547
- @unsigned_parameters['scope'].should == @scope
546
+ expect(@unsigned_parameters).to have_key('scope')
547
+ expect(@unsigned_parameters['scope']).to eq @scope
548
548
  end
549
549
 
550
550
  it 'should have the correct OAuth version' do
551
- @unsigned_parameters.should have_key('oauth_version')
552
- @unsigned_parameters['oauth_version'].should == '1.0'
551
+ expect(@unsigned_parameters).to have_key('oauth_version')
552
+ expect(@unsigned_parameters['oauth_version']).to eq '1.0'
553
553
  end
554
554
  end
555
555
 
@@ -569,77 +569,77 @@ describe Signet::OAuth1, 'when generating token credential parameters' do
569
569
  end
570
570
 
571
571
  it 'should raise an error if the client credential key is missing' do
572
- (lambda do
572
+ expect(lambda do
573
573
  Signet::OAuth1.unsigned_token_credential_parameters(
574
574
  :client_credential_key => nil,
575
575
  :temporary_credential_key => @temporary_credential_key,
576
576
  :signature_method => @signature_method,
577
577
  :verifier => @verifier
578
578
  )
579
- end).should raise_error(ArgumentError)
579
+ end).to raise_error(ArgumentError)
580
580
  end
581
581
 
582
582
  it 'should raise an error if the temporary credential key is missing' do
583
- (lambda do
583
+ expect(lambda do
584
584
  Signet::OAuth1.unsigned_token_credential_parameters(
585
585
  :client_credential_key => @client_credential_key,
586
586
  :temporary_credential_key => nil,
587
587
  :signature_method => @signature_method,
588
588
  :verifier => @verifier
589
589
  )
590
- end).should raise_error(ArgumentError)
590
+ end).to raise_error(ArgumentError)
591
591
  end
592
592
 
593
593
  it 'should raise an error if the verifier is missing' do
594
- (lambda do
594
+ expect(lambda do
595
595
  Signet::OAuth1.unsigned_token_credential_parameters(
596
596
  :client_credential_key => @client_credential_key,
597
597
  :temporary_credential_key => @temporary_credential_key,
598
598
  :signature_method => @signature_method,
599
599
  :verifier => nil
600
600
  )
601
- end).should raise_error(ArgumentError)
601
+ end).to raise_error(ArgumentError)
602
602
  end
603
603
 
604
604
  it 'should have the correct client credential key' do
605
- @unsigned_parameters.should have_key('oauth_consumer_key')
606
- @unsigned_parameters['oauth_consumer_key'].should == @client_credential_key
605
+ expect(@unsigned_parameters).to have_key('oauth_consumer_key')
606
+ expect(@unsigned_parameters['oauth_consumer_key']).to eq @client_credential_key
607
607
  end
608
608
 
609
609
  it 'should have the correct temporary credentials key' do
610
- @unsigned_parameters.should have_key('oauth_token')
611
- @unsigned_parameters['oauth_token'].should == @temporary_credential_key
610
+ expect(@unsigned_parameters).to have_key('oauth_token')
611
+ expect(@unsigned_parameters['oauth_token']).to eq @temporary_credential_key
612
612
  end
613
613
 
614
614
  it 'should have the correct signature method' do
615
- @unsigned_parameters.should have_key('oauth_signature_method')
616
- @unsigned_parameters['oauth_signature_method'].should == @signature_method
615
+ expect(@unsigned_parameters).to have_key('oauth_signature_method')
616
+ expect(@unsigned_parameters['oauth_signature_method']).to eq @signature_method
617
617
  end
618
618
 
619
619
  it 'should have a valid timestamp' do
620
620
  # Verify that we have a timestamp, it's in the correct format and within
621
621
  # a reasonable range of the current time.
622
- @unsigned_parameters.should have_key('oauth_timestamp')
623
- @unsigned_parameters['oauth_timestamp'].should =~ /^[0-9]+$/
624
- @unsigned_parameters['oauth_timestamp'].to_i.should <= Time.now.to_i
625
- @unsigned_parameters['oauth_timestamp'].to_i.should >= Time.now.to_i - 1
622
+ expect(@unsigned_parameters).to have_key('oauth_timestamp')
623
+ expect(@unsigned_parameters['oauth_timestamp']).to match(/^[0-9]+$/)
624
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be <= Time.now.to_i
625
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be >= Time.now.to_i - 1
626
626
  end
627
627
 
628
628
  it 'should have a valid nonce' do
629
629
  # Verify that we have a nonce and that it has sufficient length for
630
630
  # uniqueness.
631
- @unsigned_parameters.should have_key('oauth_nonce')
632
- @unsigned_parameters['oauth_nonce'].should =~ /^[0-9a-zA-Z]{16,100}$/
631
+ expect(@unsigned_parameters).to have_key('oauth_nonce')
632
+ expect(@unsigned_parameters['oauth_nonce']).to match(/^[0-9a-zA-Z]{16,100}$/)
633
633
  end
634
634
 
635
635
  it 'should have the verifier' do
636
- @unsigned_parameters.should have_key('oauth_verifier')
637
- @unsigned_parameters['oauth_verifier'].should == @verifier
636
+ expect(@unsigned_parameters).to have_key('oauth_verifier')
637
+ expect(@unsigned_parameters['oauth_verifier']).to eq @verifier
638
638
  end
639
639
 
640
640
  it 'should have the correct OAuth version' do
641
- @unsigned_parameters.should have_key('oauth_version')
642
- @unsigned_parameters['oauth_version'].should == '1.0'
641
+ expect(@unsigned_parameters).to have_key('oauth_version')
642
+ expect(@unsigned_parameters['oauth_version']).to eq '1.0'
643
643
  end
644
644
  end
645
645
 
@@ -657,59 +657,59 @@ describe Signet::OAuth1, 'when generating protected resource parameters' do
657
657
  end
658
658
 
659
659
  it 'should raise an error if the client credential key is missing' do
660
- (lambda do
660
+ expect(lambda do
661
661
  Signet::OAuth1.unsigned_resource_parameters(
662
662
  :client_credential_key => nil,
663
663
  :token_credential_key => @token_credential_key,
664
664
  :signature_method => @signature_method
665
665
  )
666
- end).should raise_error(ArgumentError)
666
+ end).to raise_error(ArgumentError)
667
667
  end
668
668
 
669
669
  it 'should raise an error if the token credential key is missing' do
670
- (lambda do
670
+ expect(lambda do
671
671
  Signet::OAuth1.unsigned_resource_parameters(
672
672
  :client_credential_key => @client_credential_key,
673
673
  :token_credential_key => nil,
674
674
  :signature_method => @signature_method
675
675
  )
676
- end).should raise_error(ArgumentError)
676
+ end).to raise_error(ArgumentError)
677
677
  end
678
678
 
679
679
  it 'should have the correct client credential key' do
680
- @unsigned_parameters.should have_key('oauth_consumer_key')
681
- @unsigned_parameters['oauth_consumer_key'].should == @client_credential_key
680
+ expect(@unsigned_parameters).to have_key('oauth_consumer_key')
681
+ expect(@unsigned_parameters['oauth_consumer_key']).to eq @client_credential_key
682
682
  end
683
683
 
684
684
  it 'should have the correct token credentials key' do
685
- @unsigned_parameters.should have_key('oauth_token')
686
- @unsigned_parameters['oauth_token'].should == @token_credential_key
685
+ expect(@unsigned_parameters).to have_key('oauth_token')
686
+ expect(@unsigned_parameters['oauth_token']).to eq @token_credential_key
687
687
  end
688
688
 
689
689
  it 'should have the correct signature method' do
690
- @unsigned_parameters.should have_key('oauth_signature_method')
691
- @unsigned_parameters['oauth_signature_method'].should == @signature_method
690
+ expect(@unsigned_parameters).to have_key('oauth_signature_method')
691
+ expect(@unsigned_parameters['oauth_signature_method']).to eq @signature_method
692
692
  end
693
693
 
694
694
  it 'should have a valid timestamp' do
695
695
  # Verify that we have a timestamp, it's in the correct format and within
696
696
  # a reasonable range of the current time.
697
- @unsigned_parameters.should have_key('oauth_timestamp')
698
- @unsigned_parameters['oauth_timestamp'].should =~ /^[0-9]+$/
699
- @unsigned_parameters['oauth_timestamp'].to_i.should <= Time.now.to_i
700
- @unsigned_parameters['oauth_timestamp'].to_i.should >= Time.now.to_i - 1
697
+ expect(@unsigned_parameters).to have_key('oauth_timestamp')
698
+ expect(@unsigned_parameters['oauth_timestamp']).to match(/^[0-9]+$/)
699
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be <= Time.now.to_i
700
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be >= Time.now.to_i - 1
701
701
  end
702
702
 
703
703
  it 'should have a valid nonce' do
704
704
  # Verify that we have a nonce and that it has sufficient length for
705
705
  # uniqueness.
706
- @unsigned_parameters.should have_key('oauth_nonce')
707
- @unsigned_parameters['oauth_nonce'].should =~ /^[0-9a-zA-Z]{16,100}$/
706
+ expect(@unsigned_parameters).to have_key('oauth_nonce')
707
+ expect(@unsigned_parameters['oauth_nonce']).to match(/^[0-9a-zA-Z]{16,100}$/)
708
708
  end
709
709
 
710
710
  it 'should have the correct OAuth version' do
711
- @unsigned_parameters.should have_key('oauth_version')
712
- @unsigned_parameters['oauth_version'].should == '1.0'
711
+ expect(@unsigned_parameters).to have_key('oauth_version')
712
+ expect(@unsigned_parameters['oauth_version']).to eq '1.0'
713
713
  end
714
714
  end
715
715
 
@@ -734,39 +734,39 @@ describe Signet::OAuth1, 'when generating token credential parameters ' +
734
734
  end
735
735
 
736
736
  it 'should have the correct client credential key' do
737
- @unsigned_parameters.should have_key('oauth_consumer_key')
738
- @unsigned_parameters['oauth_consumer_key'].should == @client_credential.key
737
+ expect(@unsigned_parameters).to have_key('oauth_consumer_key')
738
+ expect(@unsigned_parameters['oauth_consumer_key']).to eq @client_credential.key
739
739
  end
740
740
 
741
741
  it 'should have the correct temporary credentials key' do
742
- @unsigned_parameters.should have_key('oauth_token')
743
- @unsigned_parameters['oauth_token'].should == @temporary_credential.key
742
+ expect(@unsigned_parameters).to have_key('oauth_token')
743
+ expect(@unsigned_parameters['oauth_token']).to eq @temporary_credential.key
744
744
  end
745
745
 
746
746
  it 'should have the correct signature method' do
747
- @unsigned_parameters.should have_key('oauth_signature_method')
748
- @unsigned_parameters['oauth_signature_method'].should == @signature_method
747
+ expect(@unsigned_parameters).to have_key('oauth_signature_method')
748
+ expect(@unsigned_parameters['oauth_signature_method']).to eq @signature_method
749
749
  end
750
750
 
751
751
  it 'should have a valid timestamp' do
752
752
  # Verify that we have a timestamp, it's in the correct format and within
753
753
  # a reasonable range of the current time.
754
- @unsigned_parameters.should have_key('oauth_timestamp')
755
- @unsigned_parameters['oauth_timestamp'].should =~ /^[0-9]+$/
756
- @unsigned_parameters['oauth_timestamp'].to_i.should <= Time.now.to_i
757
- @unsigned_parameters['oauth_timestamp'].to_i.should >= Time.now.to_i - 1
754
+ expect(@unsigned_parameters).to have_key('oauth_timestamp')
755
+ expect(@unsigned_parameters['oauth_timestamp']).to match(/^[0-9]+$/)
756
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be <= Time.now.to_i
757
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be >= Time.now.to_i - 1
758
758
  end
759
759
 
760
760
  it 'should have a valid nonce' do
761
761
  # Verify that we have a nonce and that it has sufficient length for
762
762
  # uniqueness.
763
- @unsigned_parameters.should have_key('oauth_nonce')
764
- @unsigned_parameters['oauth_nonce'].should =~ /^[0-9a-zA-Z]{16,100}$/
763
+ expect(@unsigned_parameters).to have_key('oauth_nonce')
764
+ expect(@unsigned_parameters['oauth_nonce']).to match(/^[0-9a-zA-Z]{16,100}$/)
765
765
  end
766
766
 
767
767
  it 'should have the correct OAuth version' do
768
- @unsigned_parameters.should have_key('oauth_version')
769
- @unsigned_parameters['oauth_version'].should == '1.0'
768
+ expect(@unsigned_parameters).to have_key('oauth_version')
769
+ expect(@unsigned_parameters['oauth_version']).to eq '1.0'
770
770
  end
771
771
  end
772
772
 
@@ -791,41 +791,39 @@ describe Signet::OAuth1, 'when generating token credential parameters ' +
791
791
  end
792
792
 
793
793
  it 'should have the correct client credential key' do
794
- @unsigned_parameters.should have_key('oauth_consumer_key')
795
- @unsigned_parameters['oauth_consumer_key'].should ==
796
- @client.client_credential_key
794
+ expect(@unsigned_parameters).to have_key('oauth_consumer_key')
795
+ expect(@unsigned_parameters['oauth_consumer_key']).to eq @client.client_credential_key
797
796
  end
798
797
 
799
798
  it 'should have the correct temporary credentials key' do
800
- @unsigned_parameters.should have_key('oauth_token')
801
- @unsigned_parameters['oauth_token'].should ==
802
- @client.temporary_credential_key
799
+ expect(@unsigned_parameters).to have_key('oauth_token')
800
+ expect(@unsigned_parameters['oauth_token']).to eq @client.temporary_credential_key
803
801
  end
804
802
 
805
803
  it 'should have the correct signature method' do
806
- @unsigned_parameters.should have_key('oauth_signature_method')
807
- @unsigned_parameters['oauth_signature_method'].should == @signature_method
804
+ expect(@unsigned_parameters).to have_key('oauth_signature_method')
805
+ expect(@unsigned_parameters['oauth_signature_method']).to eq @signature_method
808
806
  end
809
807
 
810
808
  it 'should have a valid timestamp' do
811
809
  # Verify that we have a timestamp, it's in the correct format and within
812
810
  # a reasonable range of the current time.
813
- @unsigned_parameters.should have_key('oauth_timestamp')
814
- @unsigned_parameters['oauth_timestamp'].should =~ /^[0-9]+$/
815
- @unsigned_parameters['oauth_timestamp'].to_i.should <= Time.now.to_i
816
- @unsigned_parameters['oauth_timestamp'].to_i.should >= Time.now.to_i - 1
811
+ expect(@unsigned_parameters).to have_key('oauth_timestamp')
812
+ expect(@unsigned_parameters['oauth_timestamp']).to match(/^[0-9]+$/)
813
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be <= Time.now.to_i
814
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be >= Time.now.to_i - 1
817
815
  end
818
816
 
819
817
  it 'should have a valid nonce' do
820
818
  # Verify that we have a nonce and that it has sufficient length for
821
819
  # uniqueness.
822
- @unsigned_parameters.should have_key('oauth_nonce')
823
- @unsigned_parameters['oauth_nonce'].should =~ /^[0-9a-zA-Z]{16,100}$/
820
+ expect(@unsigned_parameters).to have_key('oauth_nonce')
821
+ expect(@unsigned_parameters['oauth_nonce']).to match(/^[0-9a-zA-Z]{16,100}$/)
824
822
  end
825
823
 
826
824
  it 'should have the correct OAuth version' do
827
- @unsigned_parameters.should have_key('oauth_version')
828
- @unsigned_parameters['oauth_version'].should == '1.0'
825
+ expect(@unsigned_parameters).to have_key('oauth_version')
826
+ expect(@unsigned_parameters['oauth_version']).to eq '1.0'
829
827
  end
830
828
  end
831
829
 
@@ -850,83 +848,83 @@ describe Signet::OAuth1, 'when generating token credential parameters ' +
850
848
  end
851
849
 
852
850
  it 'should have the correct client credential key' do
853
- @unsigned_parameters.should have_key('oauth_consumer_key')
854
- @unsigned_parameters['oauth_consumer_key'].should == @client_credential.key
851
+ expect(@unsigned_parameters).to have_key('oauth_consumer_key')
852
+ expect(@unsigned_parameters['oauth_consumer_key']).to eq @client_credential.key
855
853
  end
856
854
 
857
855
  it 'should have the correct temporary credentials key' do
858
- @unsigned_parameters.should have_key('oauth_token')
859
- @unsigned_parameters['oauth_token'].should == @temporary_credential.key
856
+ expect(@unsigned_parameters).to have_key('oauth_token')
857
+ expect(@unsigned_parameters['oauth_token']).to eq @temporary_credential.key
860
858
  end
861
859
 
862
860
  it 'should have the correct signature method' do
863
- @unsigned_parameters.should have_key('oauth_signature_method')
864
- @unsigned_parameters['oauth_signature_method'].should == @signature_method
861
+ expect(@unsigned_parameters).to have_key('oauth_signature_method')
862
+ expect(@unsigned_parameters['oauth_signature_method']).to eq @signature_method
865
863
  end
866
864
 
867
865
  it 'should have a valid timestamp' do
868
866
  # Verify that we have a timestamp, it's in the correct format and within
869
867
  # a reasonable range of the current time.
870
- @unsigned_parameters.should have_key('oauth_timestamp')
871
- @unsigned_parameters['oauth_timestamp'].should =~ /^[0-9]+$/
872
- @unsigned_parameters['oauth_timestamp'].to_i.should <= Time.now.to_i
873
- @unsigned_parameters['oauth_timestamp'].to_i.should >= Time.now.to_i - 1
868
+ expect(@unsigned_parameters).to have_key('oauth_timestamp')
869
+ expect(@unsigned_parameters['oauth_timestamp']).to match(/^[0-9]+$/)
870
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be <= Time.now.to_i
871
+ expect(@unsigned_parameters['oauth_timestamp'].to_i).to be >= Time.now.to_i - 1
874
872
  end
875
873
 
876
874
  it 'should have a valid nonce' do
877
875
  # Verify that we have a nonce and that it has sufficient length for
878
876
  # uniqueness.
879
- @unsigned_parameters.should have_key('oauth_nonce')
880
- @unsigned_parameters['oauth_nonce'].should =~ /^[0-9a-zA-Z]{16,100}$/
877
+ expect(@unsigned_parameters).to have_key('oauth_nonce')
878
+ expect(@unsigned_parameters['oauth_nonce']).to match(/^[0-9a-zA-Z]{16,100}$/)
881
879
  end
882
880
 
883
881
  it 'should have the correct OAuth version' do
884
- @unsigned_parameters.should have_key('oauth_version')
885
- @unsigned_parameters['oauth_version'].should == '1.0'
882
+ expect(@unsigned_parameters).to have_key('oauth_version')
883
+ expect(@unsigned_parameters['oauth_version']).to eq '1.0'
886
884
  end
887
885
  end
888
886
 
889
887
  describe Signet::OAuth1, 'extracting credential keys from options' do
890
888
  it 'should raise an error for bogus credentials' do
891
- (lambda do
889
+ expect(lambda do
892
890
  Signet::OAuth1.extract_credential_key_option(
893
891
  :client, {:client_credential_key => true}
894
892
  )
895
- end).should raise_error(TypeError)
893
+ end).to raise_error(TypeError)
896
894
  end
897
895
 
898
896
  it 'should raise an error for bogus credentials' do
899
- (lambda do
897
+ expect(lambda do
900
898
  Signet::OAuth1.extract_credential_key_option(
901
899
  :client, {:client_credential => 42}
902
900
  )
903
- end).should raise_error(TypeError)
901
+ end).to raise_error(TypeError)
904
902
  end
905
903
 
906
904
  it 'should raise an error for bogus credentials' do
907
- (lambda do
905
+ expect(lambda do
908
906
  Signet::OAuth1.extract_credential_key_option(
909
907
  :client, {:client => 42}
910
908
  )
911
- end).should raise_error(TypeError)
909
+ end).to raise_error(TypeError)
912
910
  end
913
911
 
914
912
  it 'should return nil for missing credential key' do
915
- Signet::OAuth1.extract_credential_key_option(:client, {}).should == nil
913
+ expect(Signet::OAuth1.extract_credential_key_option(:client, {})).to eq nil
916
914
  end
917
915
 
918
916
  it 'should find the correct credential key' do
919
- Signet::OAuth1.extract_credential_key_option(
917
+ expect(Signet::OAuth1.extract_credential_key_option(
920
918
  :client, {:client_credential_key => 'dpf43f3p2l4k3l03'}
921
- ).should == 'dpf43f3p2l4k3l03'
919
+ )).to eq 'dpf43f3p2l4k3l03'
922
920
  end
923
921
 
924
922
  it 'should find the correct credential key' do
925
- Signet::OAuth1.extract_credential_key_option(
923
+ expect(Signet::OAuth1.extract_credential_key_option(
926
924
  :client, {:client_credential => Signet::OAuth1::Credential.new(
927
925
  'dpf43f3p2l4k3l03', 'kd94hf93k423kf44'
928
926
  )}
929
- ).should == 'dpf43f3p2l4k3l03'
927
+ )).to eq 'dpf43f3p2l4k3l03'
930
928
  end
931
929
 
932
930
  it 'should find the correct credential key' do
@@ -934,9 +932,9 @@ describe Signet::OAuth1, 'extracting credential keys from options' do
934
932
  client.client_credential = Signet::OAuth1::Credential.new(
935
933
  'dpf43f3p2l4k3l03', 'kd94hf93k423kf44'
936
934
  )
937
- Signet::OAuth1.extract_credential_key_option(
935
+ expect(Signet::OAuth1.extract_credential_key_option(
938
936
  :client, {:client => client}
939
- ).should == 'dpf43f3p2l4k3l03'
937
+ )).to eq 'dpf43f3p2l4k3l03'
940
938
  end
941
939
 
942
940
  it 'should find the correct credential key' do
@@ -944,53 +942,53 @@ describe Signet::OAuth1, 'extracting credential keys from options' do
944
942
  client.temporary_credential = Signet::OAuth1::Credential.new(
945
943
  'hh5s93j4hdidpola', 'hdhd0244k9j7ao03'
946
944
  )
947
- Signet::OAuth1.extract_credential_key_option(
945
+ expect(Signet::OAuth1.extract_credential_key_option(
948
946
  :temporary, {:client => client}
949
- ).should == 'hh5s93j4hdidpola'
947
+ )).to eq 'hh5s93j4hdidpola'
950
948
  end
951
949
  end
952
950
 
953
951
  describe Signet::OAuth1, 'extracting credential secrets from options' do
954
952
  it 'should raise an error for bogus credentials' do
955
- (lambda do
953
+ expect(lambda do
956
954
  Signet::OAuth1.extract_credential_secret_option(
957
955
  :client, {:client_credential_secret => true}
958
956
  )
959
- end).should raise_error(TypeError)
957
+ end).to raise_error(TypeError)
960
958
  end
961
959
 
962
960
  it 'should raise an error for bogus credentials' do
963
- (lambda do
961
+ expect(lambda do
964
962
  Signet::OAuth1.extract_credential_secret_option(
965
963
  :client, {:client_credential => 42}
966
964
  )
967
- end).should raise_error(TypeError)
965
+ end).to raise_error(TypeError)
968
966
  end
969
967
 
970
968
  it 'should raise an error for bogus credentials' do
971
- (lambda do
969
+ expect(lambda do
972
970
  Signet::OAuth1.extract_credential_secret_option(
973
971
  :client, {:client => 42}
974
972
  )
975
- end).should raise_error(TypeError)
973
+ end).to raise_error(TypeError)
976
974
  end
977
975
 
978
976
  it 'should raise an error for missing credential secret' do
979
- Signet::OAuth1.extract_credential_secret_option(:client, {}).should == nil
977
+ expect(Signet::OAuth1.extract_credential_secret_option(:client, {})).to eq nil
980
978
  end
981
979
 
982
980
  it 'should find the correct credential secret' do
983
- Signet::OAuth1.extract_credential_secret_option(
981
+ expect(Signet::OAuth1.extract_credential_secret_option(
984
982
  :client, {:client_credential_secret => 'kd94hf93k423kf44'}
985
- ).should == 'kd94hf93k423kf44'
983
+ )).to eq 'kd94hf93k423kf44'
986
984
  end
987
985
 
988
986
  it 'should find the correct credential secret' do
989
- Signet::OAuth1.extract_credential_secret_option(
987
+ expect(Signet::OAuth1.extract_credential_secret_option(
990
988
  :client, {:client_credential => Signet::OAuth1::Credential.new(
991
989
  'dpf43f3p2l4k3l03', 'kd94hf93k423kf44'
992
990
  )}
993
- ).should == 'kd94hf93k423kf44'
991
+ )).to eq 'kd94hf93k423kf44'
994
992
  end
995
993
 
996
994
  it 'should find the correct credential secret' do
@@ -998,9 +996,9 @@ describe Signet::OAuth1, 'extracting credential secrets from options' do
998
996
  client.client_credential = Signet::OAuth1::Credential.new(
999
997
  'dpf43f3p2l4k3l03', 'kd94hf93k423kf44'
1000
998
  )
1001
- Signet::OAuth1.extract_credential_secret_option(
999
+ expect(Signet::OAuth1.extract_credential_secret_option(
1002
1000
  :client, {:client => client}
1003
- ).should == 'kd94hf93k423kf44'
1001
+ )).to eq 'kd94hf93k423kf44'
1004
1002
  end
1005
1003
 
1006
1004
  it 'should find the correct credential secret' do
@@ -1008,8 +1006,8 @@ describe Signet::OAuth1, 'extracting credential secrets from options' do
1008
1006
  client.temporary_credential = Signet::OAuth1::Credential.new(
1009
1007
  'hh5s93j4hdidpola', 'hdhd0244k9j7ao03'
1010
1008
  )
1011
- Signet::OAuth1.extract_credential_secret_option(
1009
+ expect(Signet::OAuth1.extract_credential_secret_option(
1012
1010
  :temporary, {:client => client}
1013
- ).should == 'hdhd0244k9j7ao03'
1011
+ )).to eq 'hdhd0244k9j7ao03'
1014
1012
  end
1015
1013
  end