aboutsummaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorDan Finlay <dan@danfinlay.com>2016-12-10 04:24:25 +0800
committerDan Finlay <dan@danfinlay.com>2016-12-10 04:24:25 +0800
commit7b9749e30c4f8228fe62c1ad81515117cf7504bc (patch)
tree599266a6d73619d125d417a09072dd85c2ee4d36 /test
parentab9e15b782620002c0a2477829db3e56a25a7d5c (diff)
downloadtangerine-wallet-browser-7b9749e30c4f8228fe62c1ad81515117cf7504bc.tar
tangerine-wallet-browser-7b9749e30c4f8228fe62c1ad81515117cf7504bc.tar.gz
tangerine-wallet-browser-7b9749e30c4f8228fe62c1ad81515117cf7504bc.tar.bz2
tangerine-wallet-browser-7b9749e30c4f8228fe62c1ad81515117cf7504bc.tar.lz
tangerine-wallet-browser-7b9749e30c4f8228fe62c1ad81515117cf7504bc.tar.xz
tangerine-wallet-browser-7b9749e30c4f8228fe62c1ad81515117cf7504bc.tar.zst
tangerine-wallet-browser-7b9749e30c4f8228fe62c1ad81515117cf7504bc.zip
Got bad account detection working and added to state
Diffstat (limited to 'test')
-rw-r--r--test/integration/lib/keyring-controller-test.js8
1 files changed, 5 insertions, 3 deletions
diff --git a/test/integration/lib/keyring-controller-test.js b/test/integration/lib/keyring-controller-test.js
index e37b5df50..666795a6d 100644
--- a/test/integration/lib/keyring-controller-test.js
+++ b/test/integration/lib/keyring-controller-test.js
@@ -8,6 +8,8 @@ var STORAGE_KEY = 'metamask-config'
var PASSWORD = '12345678'
var FIRST_ADDRESS = '0x4dd5d356c5A016A220bCD69e82e5AF680a430d00'.toLowerCase()
+var BAD_STYLE_FIRST_ADDRESS = '0xac39b311dceb2a4b2f5d8461c1cdaf756f4f7ae9'
+
QUnit.module('Old Style Vaults', {
beforeEach: function () {
@@ -87,7 +89,7 @@ QUnit.module('Old Style Vaults with bad HD seed', {
})
QUnit.test('keyringController:isInitialized', function (assert) {
- assert.ok(this.keyringController.getState().isInitialized)
+ assert.ok(this.keyringController.getState().isInitialized, 'vault is initialized')
})
QUnit.test('keyringController:submitPassword', function (assert) {
@@ -95,9 +97,9 @@ QUnit.test('keyringController:submitPassword', function (assert) {
this.keyringController.submitPassword(PASSWORD)
.then((state) => {
- assert.ok(state.identities[FIRST_ADDRESS])
+ assert.ok(state.identities[BAD_STYLE_FIRST_ADDRESS])
assert.equal(state.lostAccounts.length, 1, 'one lost account')
- assert.equal(state.lostAccounts[0], 'e15D894BeCB0354c501AE69429B05143679F39e0'.toLowerCase())
+ assert.equal(state.lostAccounts[0], '0xe15D894BeCB0354c501AE69429B05143679F39e0'.toLowerCase())
assert.deepEqual(this.configManager.getLostAccounts(), state.lostAccounts, 'persisted')
done()
})