summaryrefslogtreecommitdiff
path: root/spec/functional/win32/sid_spec.rb
diff options
context:
space:
mode:
Diffstat (limited to 'spec/functional/win32/sid_spec.rb')
-rw-r--r--spec/functional/win32/sid_spec.rb24
1 files changed, 12 insertions, 12 deletions
diff --git a/spec/functional/win32/sid_spec.rb b/spec/functional/win32/sid_spec.rb
index 1f5f66178a..f3f3adfb56 100644
--- a/spec/functional/win32/sid_spec.rb
+++ b/spec/functional/win32/sid_spec.rb
@@ -16,39 +16,39 @@
# limitations under the License.
#
-require 'spec_helper'
+require "spec_helper"
if Chef::Platform.windows?
- require 'chef/win32/security'
+ require "chef/win32/security"
end
-describe 'Chef::ReservedNames::Win32::SID', :windows_only do
+describe "Chef::ReservedNames::Win32::SID", :windows_only do
if Chef::Platform.windows?
SID ||= Chef::ReservedNames::Win32::Security::SID
end
- it 'should resolve default_security_object_group as a sane user group', :windows_not_domain_joined_only do
+ it "should resolve default_security_object_group as a sane user group", :windows_not_domain_joined_only do
# Domain accounts: domain-specific Domain Users SID
# Microsoft Accounts: SID.current_user
# Else: SID.None
expect(SID.default_security_object_group).to eq(SID.None).or eq(SID.current_user)
end
- context 'running as an elevated administrator user' do
- it 'should resolve default_security_object_owner as the Administrators group' do
+ context "running as an elevated administrator user" do
+ it "should resolve default_security_object_owner as the Administrators group" do
expect(SID.default_security_object_owner).to eq(SID.Administrators)
end
end
- context 'running as a non-elevated administrator user' do
- it 'should resolve default_security_object_owner as the current user' do
- skip 'requires user support in mixlib-shellout, see security_spec.rb'
+ context "running as a non-elevated administrator user" do
+ it "should resolve default_security_object_owner as the current user" do
+ skip "requires user support in mixlib-shellout, see security_spec.rb"
expect(SID.default_security_object_owner).to eq(SID.Administrators)
end
end
- context 'running as a non-elevated, non-administrator user' do
- it 'should resolve default_security_object_owner as the current user' do
- skip 'requires user support in mixlib-shellout, see security_spec.rb'
+ context "running as a non-elevated, non-administrator user" do
+ it "should resolve default_security_object_owner as the current user" do
+ skip "requires user support in mixlib-shellout, see security_spec.rb"
expect(SID.default_security_object_owner).to eq(SID.current_user)
end
end