aboutsummaryrefslogtreecommitdiffstats
path: root/test/unit/keyring-controller-test.js
blob: 738aa1a8422f68289978e61c7747e3ba868af620 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
var assert = require('assert')
var KeyringController = require('../../app/scripts/keyring-controller')
var configManagerGen = require('../lib/mock-config-manager')
const ethUtil = require('ethereumjs-util')
const async = require('async')
const mockEncryptor = require('../lib/mock-encryptor')

describe('KeyringController', function() {

  let keyringController
  let password = 'password123'
  let entropy = 'entripppppyy duuude'
  let seedWords
  let accounts = []
  let originalKeystore

  beforeEach(function(done) {
    window.localStorage = {} // Hacking localStorage support into JSDom

    keyringController = new KeyringController({
      configManager: configManagerGen(),
      ethStore: {
        addAccount(acct) { accounts.push(ethUtil.addHexPrefix(acct)) },
      },
    })

    // Stub out the browser crypto for a mock encryptor.
    // Browser crypto is tested in the integration test suite.
    keyringController.encryptor = mockEncryptor

    keyringController.createNewVault(password, null, function (err, state) {
      done()
    })
  })

  describe('#createNewVault', function () {
    it('should set a vault on the configManager', function(done) {
      assert(!keyringController.configManager.getVault(), 'no previous vault')
      keyringController.createNewVault(password, null, function (err, state) {
        assert.ifError(err)
        const vault = keyringController.configManager.getVault()
        assert(vault, 'vault created')
        done()
      })
    })
  })
})