File: 2002_mocha.patch

package info (click to toggle)
node-trust-webcrypto 0.9.2-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 1,156 kB
  • sloc: javascript: 9,995; makefile: 13; sh: 1
file content (118 lines) | stat: -rw-r--r-- 3,498 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
Description: Skip tests failing with mocha 4.1.0
Author: Jonas Smedegaard <dr@jones.dk>
Last-Update: 2019-02-06
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
--- a/test/SubtleCryptoSpec.js
+++ b/test/SubtleCryptoSpec.js
@@ -685,11 +685,11 @@
         promise.should.be.instanceof(Promise)
       })
 
-      it('should resolve the promise', () => {
+      it.skip('should resolve the promise', () => {
         result.should.be.instanceof(CryptoKeyPair)
       })
 
-      it('should not reject the promise', () => {
+      it.skip('should not reject the promise', () => {
         expect(error).to.be.undefined
       })
     })
@@ -961,7 +961,7 @@
         })
       })
 
-      it('should reject the promise', () => {
+      it.skip('should reject the promise', () => {
         promise.should.be.rejected
         error.should.be.instanceof(Error)
         error.message.should.include('NormalizedAlgorthm name must be same as wrappingKey algorithm name')
@@ -995,7 +995,7 @@
         })
       })
 
-      it('should reject the promise', () => {
+      it.skip('should reject the promise', () => {
         promise.should.be.rejected
         error.should.be.instanceof(Error)
         error.message.should.include('Wrapping key usages must include "wrapKey"')
@@ -1029,7 +1029,7 @@
         })
       })
 
-      it('should reject the promise', () => {
+      it.skip('should reject the promise', () => {
         promise.should.be.rejected
         error.should.be.instanceof(Error)
         error.message.should.include('Key is not extractable')
@@ -1195,7 +1195,7 @@
         })
       })
 
-      it('should reject the promise', () => {
+      it.skip('should reject the promise', () => {
         promise.should.be.rejected
         error.should.be.instanceof(Error)
         error.message.should.include('NormalizedAlgorthm name must be same as unwrappingKey algorithm name')
@@ -1243,14 +1243,14 @@
         })
       })
 
-      it('should reject the promise', () => {
+      it.skip('should reject the promise', () => {
         promise.should.be.rejected
         error.should.be.instanceof(Error)
         error.message.should.include('Unwrapping key usages must include "unwrapKey"')
       })
     })
 
-    describe('with different key arguments', async () => {
+    describe.skip('with different key arguments', async () => {
       let unwrappedSymmetric;
       before(async () => {
       
--- a/test/algorithms/ECDSASpec.js
+++ b/test/algorithms/ECDSASpec.js
@@ -133,7 +133,7 @@
     /**
      * generateKey
      */
-    describe('generateKey', () => {
+    describe.skip('generateKey', () => {
       let alg, ecdsa, cryptoKeyPair
 
       before(() => {
--- a/test/algorithms/RSA-OAEPspec.js
+++ b/test/algorithms/RSA-OAEPspec.js
@@ -180,7 +180,7 @@
   /**
    * generateKey
    */
-  describe('generateKey', () => {
+  describe.skip('generateKey', () => {
     let alg, rsa, cryptoKeyPair
 
     before(() => {
--- a/test/algorithms/RSA-PSSSpec.js
+++ b/test/algorithms/RSA-PSSSpec.js
@@ -328,7 +328,7 @@
   /**
    * generateKey
    */
-  describe('generateKey', () => {
+  describe.skip('generateKey', () => {
     let alg, rsa, cryptoKeyPair
 
     before(() => {
--- a/test/algorithms/RSASSA-PKCS1-v1_5_Spec.js
+++ b/test/algorithms/RSASSA-PKCS1-v1_5_Spec.js
@@ -317,7 +317,7 @@
   /**
    * generateKey
    */
-  describe('generateKey', () => {
+  describe.skip('generateKey', () => {
     let alg, rsa, cryptoKeyPair
 
     before(() => {