diff options
author | Maximilian Krambach <[email protected]> | 2018-06-06 09:57:41 +0000 |
---|---|---|
committer | Maximilian Krambach <[email protected]> | 2018-06-06 09:57:41 +0000 |
commit | 0356a667c5a8b4fdb4404cebb57475ed3f39ade9 (patch) | |
tree | 60ca63e53480947677f3a4875dbc739e3e301c9a /lang/js/BrowserTestExtension/tests/encryptDecryptTest.js | |
parent | js: more Keyring/Key handling (diff) | |
download | gpgme-0356a667c5a8b4fdb4404cebb57475ed3f39ade9.tar.gz gpgme-0356a667c5a8b4fdb4404cebb57475ed3f39ade9.zip |
js: implement import/delete Key, some fixes
--
* Keyring.js
- implemented importKey: importing one or more armored public key
blocks.
- implemented deleteKey: deleting a public Key from gpg.
* Key.js renamed property Key.armor to Key.armored
* Helpers.js: toKeyIDArray does not complain anymore if there are no
keys. Not having Keys in e.g. signing keys in encrypt is legitimate
and common, the complaints were getting spammy
* Errors.js: gpgme_errors now always pass an optional additional
message, for easier debugging in minified code
* Connection.js: Fix in gpgme-json responses containing objects
* eslintrc.json: Start using eslint. A cleanup to conform to it is not
done yet
* Added further tests for the new functionality
Diffstat (limited to 'lang/js/BrowserTestExtension/tests/encryptDecryptTest.js')
-rw-r--r-- | lang/js/BrowserTestExtension/tests/encryptDecryptTest.js | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/lang/js/BrowserTestExtension/tests/encryptDecryptTest.js b/lang/js/BrowserTestExtension/tests/encryptDecryptTest.js index f5d2be16..e5c2f749 100644 --- a/lang/js/BrowserTestExtension/tests/encryptDecryptTest.js +++ b/lang/js/BrowserTestExtension/tests/encryptDecryptTest.js @@ -163,7 +163,6 @@ describe('Encryption and Decryption', function () { }).timeout(3000); it('Random data, input as base64', function (done) { - //TODO fails. The result is let data = bigBoringString(0.001); let b64data = btoa(data); let prm = Gpgmejs.init(); @@ -177,11 +176,11 @@ describe('Encryption and Decryption', function () { 'BEGIN PGP MESSAGE'); expect(answer.data).to.include( 'END PGP MESSAGE'); - context.decrypt(answer.data).then( + context.decrypt(answer.data, true).then( function (result) { expect(result).to.not.be.empty; expect(result.data).to.be.a('string'); - expect(result.data).to.equal(data); + expect(result.data).to.equal(b64data); done(); }); }); |