diff options
Diffstat (limited to 'spec/unit/provider/user/dscl_spec.rb')
-rw-r--r-- | spec/unit/provider/user/dscl_spec.rb | 52 |
1 files changed, 26 insertions, 26 deletions
diff --git a/spec/unit/provider/user/dscl_spec.rb b/spec/unit/provider/user/dscl_spec.rb index c8dbef770e..24691cce33 100644 --- a/spec/unit/provider/user/dscl_spec.rb +++ b/spec/unit/provider/user/dscl_spec.rb @@ -171,7 +171,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" describe "uid_used?" do it "should return false if not given any valid uid number" do - expect(provider.uid_used?(nil)).to be_false + expect(provider.uid_used?(nil)).to be_falsey end describe "when called with a user id" do @@ -180,11 +180,11 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" end it "should return true for a used uid number" do - expect(provider.uid_used?(500)).to be_true + expect(provider.uid_used?(500)).to be_truthy end it "should return false for an unused uid number" do - expect(provider.uid_used?(501)).to be_false + expect(provider.uid_used?(501)).to be_falsey end end end @@ -400,7 +400,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" it "should set @user_exists" do provider.load_current_resource - expect(provider.instance_variable_get(:@user_exists)).to be_false + expect(provider.instance_variable_get(:@user_exists)).to be_falsey end it "should set username" do @@ -434,7 +434,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" it "diverged_password? should report false" do provider.load_current_resource - expect(provider.diverged_password?).to be_false + expect(provider.diverged_password?).to be_falsey end end @@ -443,7 +443,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" it "diverged_password? should report true" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end @@ -453,7 +453,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" it "diverged_password? should report false" do provider.load_current_resource - expect(provider.diverged_password?).to be_false + expect(provider.diverged_password?).to be_falsey end end @@ -462,7 +462,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" it "diverged_password? should report true" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end @@ -472,7 +472,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30" it "diverged_password? should report false" do provider.load_current_resource - expect(provider.diverged_password?).to be_false + expect(provider.diverged_password?).to be_falsey end end end @@ -525,7 +525,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") describe "when a plain text password is set" do it "reports password needs to be updated" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end @@ -536,7 +536,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") it "reports password needs to be updated" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end end @@ -565,7 +565,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") it "diverged_password? should report false" do provider.load_current_resource - expect(provider.diverged_password?).to be_false + expect(provider.diverged_password?).to be_falsey end end @@ -574,7 +574,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") it "diverged_password? should report true" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end @@ -585,7 +585,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") it "diverged_password? should report true" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end @@ -596,7 +596,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") it "diverged_password? should report true" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end @@ -607,7 +607,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") it "diverged_password? should report true" do provider.load_current_resource - expect(provider.diverged_password?).to be_true + expect(provider.diverged_password?).to be_truthy end end end @@ -616,23 +616,23 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") describe "salted_sha512_pbkdf2?" do it "should return true when the string is a salted_sha512_pbkdf2 hash" do - expect(provider.salted_sha512_pbkdf2?(salted_sha512_pbkdf2_password)).to be_true + expect(provider.salted_sha512_pbkdf2?(salted_sha512_pbkdf2_password)).to be_truthy end it "should return false otherwise" do - expect(provider.salted_sha512_pbkdf2?(salted_sha512_password)).to be_false - expect(provider.salted_sha512_pbkdf2?("any other string")).to be_false + expect(provider.salted_sha512_pbkdf2?(salted_sha512_password)).to be_falsey + expect(provider.salted_sha512_pbkdf2?("any other string")).to be_falsey end end describe "salted_sha512?" do it "should return true when the string is a salted_sha512_pbkdf2 hash" do - expect(provider.salted_sha512_pbkdf2?(salted_sha512_pbkdf2_password)).to be_true + expect(provider.salted_sha512_pbkdf2?(salted_sha512_pbkdf2_password)).to be_truthy end it "should return false otherwise" do - expect(provider.salted_sha512?(salted_sha512_pbkdf2_password)).to be_false - expect(provider.salted_sha512?("any other string")).to be_false + expect(provider.salted_sha512?(salted_sha512_pbkdf2_password)).to be_falsey + expect(provider.salted_sha512?("any other string")).to be_falsey end end @@ -649,7 +649,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") shadow_info = provider.prepare_password_shadow_info expect(shadow_info).to have_key("SALTED-SHA512") info = shadow_info["SALTED-SHA512"].string.unpack('H*').first - expect(provider.salted_sha512?(info)).to be_true + expect(provider.salted_sha512?(info)).to be_truthy end end @@ -660,7 +660,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") shadow_info = provider.prepare_password_shadow_info expect(shadow_info).to have_key("SALTED-SHA512") info = shadow_info["SALTED-SHA512"].string.unpack('H*').first - expect(provider.salted_sha512?(info)).to be_true + expect(provider.salted_sha512?(info)).to be_truthy expect(info).to eq(vagrant_sha_512) end end @@ -682,7 +682,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") expect(shadow_info["SALTED-SHA512-PBKDF2"]).to have_key("salt") expect(shadow_info["SALTED-SHA512-PBKDF2"]).to have_key("iterations") info = shadow_info["SALTED-SHA512-PBKDF2"]["entropy"].string.unpack('H*').first - expect(provider.salted_sha512_pbkdf2?(info)).to be_true + expect(provider.salted_sha512_pbkdf2?(info)).to be_truthy end end @@ -698,7 +698,7 @@ ea18e18b720e358e7fbe3cfbeaa561456f6ba008937a30") expect(shadow_info["SALTED-SHA512-PBKDF2"]).to have_key("salt") expect(shadow_info["SALTED-SHA512-PBKDF2"]).to have_key("iterations") info = shadow_info["SALTED-SHA512-PBKDF2"]["entropy"].string.unpack('H*').first - expect(provider.salted_sha512_pbkdf2?(info)).to be_true + expect(provider.salted_sha512_pbkdf2?(info)).to be_truthy expect(info).to eq(vagrant_sha_512_pbkdf2) end end |