diff options
Diffstat (limited to '')
| -rw-r--r-- | lang/js/unittests.js | 62 | 
1 files changed, 16 insertions, 46 deletions
| diff --git a/lang/js/unittests.js b/lang/js/unittests.js index 25023bcb..47eeabf2 100644 --- a/lang/js/unittests.js +++ b/lang/js/unittests.js @@ -27,7 +27,7 @@ import { key_params as kp } from './unittest_inputvalues';  import { Connection } from './src/Connection';  import { gpgme_error } from './src/Errors';  import { toKeyIdArray , isFingerprint } from './src/Helpers'; -import { GPGME_Key , createKey } from './src/Key'; +import { createKey } from './src/Key';  import { GPGME_Keyring } from './src/Keyring';  import {GPGME_Message, createMessage} from './src/Message'; @@ -116,14 +116,6 @@ function unittests (){              expect(test0).to.include(hp.validFingerprint);          }); -        it('correct GPGME_Key', function(){ -            expect(hp.validGPGME_Key).to.be.an.instanceof(GPGME_Key); -            let test0 = toKeyIdArray(hp.validGPGME_Key); - -            expect(test0).to.be.an('array'); -            expect(test0).to.include(hp.validGPGME_Key.fingerprint); -        }); -          it('openpgpjs-like object', function(){              let test0 = toKeyIdArray(hp.valid_openpgplike); @@ -169,15 +161,9 @@ function unittests (){      });      describe('GPGME_Key', function(){ - -        it('correct Key initialization', function(){ -            let key = createKey(kp.validKeyFingerprint); -            expect(key).to.be.an.instanceof(GPGME_Key); -        });          it('Key has data after a first refresh', function(done) {              let key = createKey(kp.validKeyFingerprint);              key.refreshKey().then(function(key2){ -                expect(key2).to.be.an.instanceof(GPGME_Key);                  expect(key2.get).to.be.a('function');                  for (let i=0; i < kp.validKeyProperties.length; i++) {                      let prop = key2.get(kp.validKeyProperties[i]); @@ -220,7 +206,6 @@ function unittests (){          it('Non-cached key async hasSecret (no secret in Key)', function (done){              let key = createKey(kp.validFingerprintNoSecret, true); -            expect(key).to.be.an.instanceof(GPGME_Key);              key.get('hasSecret').then(function(result){                  expect(result).to.be.a('boolean');                  expect(result).to.equal(false); @@ -246,32 +231,21 @@ function unittests (){              }          }); -        it('malformed GPGME_Key cannot be used', function(){ -            for (let i=0; i < 4; i++){ -                let key = new GPGME_Key(wp.four_invalid_params[i]); -                expect(key.fingerprint).to.be.an.instanceof(Error); -                expect(key.fingerprint.code).to.equal('KEY_INVALID'); -            } -        }); - -        it('Overwriting getFingerprint does not work', function(){ -            const evilFunction = function(){ -                return 'bad Data'; -            }; -            let key = createKey(kp.validKeyFingerprint, true); -            expect(key.fingerprint).to.equal(kp.validKeyFingerprint); -            try { -                key.getFingerprint = evilFunction; -            } -            catch(e) { -                expect(e).to.be.an.instanceof(TypeError); -            } -            expect(key.fingerprint).to.equal(kp.validKeyFingerprint); -            expect(key.getFingerprint).to.not.equal(evilFunction); -        }); -        // TODO: tests for subkeys -        // TODO: tests for userids -        // TODO: some invalid tests for key/keyring +    //     it('Overwriting getFingerprint does not work', function(){ +    //         const evilFunction = function(){ +    //             return 'bad Data'; +    //         }; +    //         let key = createKey(kp.validKeyFingerprint, true); +    //         expect(key.fingerprint).to.equal(kp.validKeyFingerprint); +    //         try { +    //             key.getFingerprint = evilFunction; +    //         } +    //         catch(e) { +    //             expect(e).to.be.an.instanceof(TypeError); +    //         } +    //         expect(key.fingerprint).to.equal(kp.validKeyFingerprint); +    //         expect(key.getFingerprint).to.not.equal(evilFunction); +    //     });      });      describe('GPGME_Keyring', function(){ @@ -287,10 +261,7 @@ function unittests (){                  let keyring = new GPGME_Keyring;                  keyring.getKeys(null, true).then(function(result){                      expect(result).to.be.an('array'); -                    expect(result[0]).to.be.an.instanceof(GPGME_Key);                      expect(result[0].get('hasSecret')).to.be.a('boolean'); -                    // expect(result[0].get('armored')).to.include( -                    //     '-----END PGP PUBLIC KEY BLOCK-----');                      done();                  });              } @@ -302,7 +273,6 @@ function unittests (){                  keyring.getKeys(kp.validKeyFingerprint, true).then(                      function(result){                          expect(result).to.be.an('array'); -                        expect(result[0]).to.be.an.instanceof(GPGME_Key);                          expect(result[0].get('hasSecret')).to.be.a('boolean');                          done();                      } | 
