summaryrefslogtreecommitdiff
path: root/test/parallel/test-crypto-rsa-dsa.js
diff options
context:
space:
mode:
authorRuben Bridgewater <ruben@bridgewater.de>2019-12-25 18:02:16 +0100
committerRuben Bridgewater <ruben@bridgewater.de>2019-12-31 15:54:20 +0100
commite038d6a1cdb2ffbf666d360553c31786acaf70b2 (patch)
tree214bcc4550360f2497fe82e85154df0859ff35b4 /test/parallel/test-crypto-rsa-dsa.js
parente66c4deda8c63ca6c1557eed7c09ba01c6284e57 (diff)
downloadnode-new-e038d6a1cdb2ffbf666d360553c31786acaf70b2.tar.gz
test: refactor common.expectsError
This completely refactors the `expectsError` behavior: so far it's almost identical to `assert.throws(fn, object)` in case it was used with a function as first argument. It had a magical property check that allowed to verify a functions `type` in case `type` was passed used in the validation object. This pattern is now completely removed and `assert.throws()` should be used instead. The main intent for `common.expectsError()` is to verify error cases for callback based APIs. This is now more flexible by accepting all validation possibilites that `assert.throws()` accepts as well. No magical properties exist anymore. This reduces surprising behavior for developers who are not used to the Node.js core code base. This has the side effect that `common` is used significantly less frequent. PR-URL: https://github.com/nodejs/node/pull/31092 Reviewed-By: Rich Trott <rtrott@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Trivikram Kamat <trivikr.dev@gmail.com>
Diffstat (limited to 'test/parallel/test-crypto-rsa-dsa.js')
-rw-r--r--test/parallel/test-crypto-rsa-dsa.js6
1 files changed, 3 insertions, 3 deletions
diff --git a/test/parallel/test-crypto-rsa-dsa.js b/test/parallel/test-crypto-rsa-dsa.js
index 30ef7ec6d1..9b8c3f67a2 100644
--- a/test/parallel/test-crypto-rsa-dsa.js
+++ b/test/parallel/test-crypto-rsa-dsa.js
@@ -193,7 +193,7 @@ test_rsa('RSA_PKCS1_OAEP_PADDING', undefined, 'sha1');
test_rsa('RSA_PKCS1_OAEP_PADDING', 'sha1', undefined);
test_rsa('RSA_PKCS1_OAEP_PADDING', 'sha256', 'sha256');
test_rsa('RSA_PKCS1_OAEP_PADDING', 'sha512', 'sha512');
-common.expectsError(() => {
+assert.throws(() => {
test_rsa('RSA_PKCS1_OAEP_PADDING', 'sha256', 'sha512');
}, {
code: 'ERR_OSSL_RSA_OAEP_DECODING_ERROR'
@@ -228,7 +228,7 @@ for (const fn of [crypto.publicEncrypt, crypto.privateDecrypt]) {
});
for (const oaepHash of [0, false, null, Symbol(), () => {}]) {
- common.expectsError(() => {
+ assert.throws(() => {
fn({
key: rsaPubPem,
oaepHash
@@ -239,7 +239,7 @@ for (const fn of [crypto.publicEncrypt, crypto.privateDecrypt]) {
}
for (const oaepLabel of [0, false, null, Symbol(), () => {}, {}, 'foo']) {
- common.expectsError(() => {
+ assert.throws(() => {
fn({
key: rsaPubPem,
oaepLabel