summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authordanielsdeleo <dan@opscode.com>2013-01-04 10:51:57 -0800
committerdanielsdeleo <dan@opscode.com>2013-01-04 10:51:57 -0800
commit85a0829074d513b4bf7cf3c871cc16b4c7ff30d5 (patch)
treee9413853abb9080263abf182f6a58ae22e6446b8
parent3c79df28c16804d761eac281758ca5446a8c4e1f (diff)
downloadchef-85a0829074d513b4bf7cf3c871cc16b4c7ff30d5.tar.gz
[CHEF-3557] Fix ws/capitalization in test suite/comments
-rw-r--r--spec/support/shared/functional/securable_resource_with_reporting.rb12
1 files changed, 6 insertions, 6 deletions
diff --git a/spec/support/shared/functional/securable_resource_with_reporting.rb b/spec/support/shared/functional/securable_resource_with_reporting.rb
index a7b705ee5c..81569a1382 100644
--- a/spec/support/shared/functional/securable_resource_with_reporting.rb
+++ b/spec/support/shared/functional/securable_resource_with_reporting.rb
@@ -12,7 +12,7 @@ shared_examples_for "a securable resource with reporting" do
# umask
# let(:default_mode) { ((0100666 - File.umask) & 07777).to_s(8) }
- describe "reading file security metadata for reporting on unix",:unix_only => true do
+ describe "reading file security metadata for reporting on unix", :unix_only => true do
context "when the target file doesn't exist" do
before do
resource.action(:create)
@@ -266,7 +266,7 @@ shared_examples_for "a securable resource with reporting" do
context "and no security metadata is specified in new_resource" do
it "sets the metadata values on the new_resource as strings after creating" do
resource.run_action(:create)
- # todo: most stable way to specify?
+ # TODO: most stable way to specify?
resource.owner.should == etc.getpwuid(process.uid).name
resource.state[:expanded_rights].should == { "CURRENTUSER" => { "permissions" => ALL_EXPANDED_PERMISSIONS, "flags" => [] }}
resource.state[:expanded_deny_rights].should == {}
@@ -277,7 +277,7 @@ shared_examples_for "a securable resource with reporting" do
context "and owner is specified with a string (username) in new_resource" do
- # todo/bug: duplicated from the "securable resource" tests
+ # TODO/bug: duplicated from the "securable resource" tests
let(:expected_user_name) { 'Guest' }
before do
@@ -293,7 +293,7 @@ shared_examples_for "a securable resource with reporting" do
context "and owner is specified with a fully qualified domain user" do
- # todo: duplicated from "securable resource"
+ # TODO: duplicated from "securable resource"
let(:expected_user_name) { 'domain\user' }
before do
@@ -310,13 +310,13 @@ shared_examples_for "a securable resource with reporting" do
context "when the target file exists" do
before do
- fileutils.touch(resource.path)
+ FileUtils.touch(resource.path)
resource.action(:create)
end
context "and no security metadata is specified in new_resource" do
it "sets the current values on current resource as strings" do
- # todo: most stable way to specify?
+ # TODO: most stable way to specify?
current_resource.owner.should == etc.getpwuid(process.uid).name
current_resource.expanded_rights.should == { "CURRENTUSER" => ALL_EXPANDED_PERMISSIONS }
end