From db0640a61468b4cd028a9a27b95f7087ba90ea53 Mon Sep 17 00:00:00 2001 From: Ben Gotow Date: Tue, 7 Jun 2016 14:25:59 -0700 Subject: [PATCH] fix(keybase): Minor linter errors --- .../keybase/spec/pgp-key-store-spec.cjsx | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/internal_packages/keybase/spec/pgp-key-store-spec.cjsx b/internal_packages/keybase/spec/pgp-key-store-spec.cjsx index 6938bb217..085e6f3bb 100755 --- a/internal_packages/keybase/spec/pgp-key-store-spec.cjsx +++ b/internal_packages/keybase/spec/pgp-key-store-spec.cjsx @@ -69,7 +69,7 @@ fdescribe "PGPKeyStore", -> -----END PGP PRIVATE KEY BLOCK-----""" # mock getKeyContents to get rid of all the fs.readFiles - spyOn(PGPKeyStore, "getKeyContents").andCallFake( ({key, passphrase, callback}) => + spyOn(PGPKeyStore, "getKeyContents").andCallFake( ({key, passphrase, callback}) => data = @TEST_KEY pgp.KeyManager.import_from_armored_pgp { armored: data @@ -84,7 +84,7 @@ fdescribe "PGPKeyStore", -> if callback? callback() ) - + # define an encrypted and an unencrypted message @unencryptedMsg = new Message({clientId: 'test', subject: 'Subject', body: '

Body

'}) body = """-----BEGIN PGP MESSAGE----- @@ -98,14 +98,14 @@ fdescribe "PGPKeyStore", -> # blow away the saved identities and set up a test pub/priv keypair PGPKeyStore._identities = {} pubIdent = new Identity({ - addresses: ["benbitdiddle@icloud.com"] - isPriv: false - }) + addresses: ["benbitdiddle@icloud.com"] + isPriv: false + }) PGPKeyStore._identities[pubIdent.clientId] = pubIdent privIdent = new Identity({ - addresses: ["benbitdiddle@icloud.com"] - isPriv: true - }) + addresses: ["benbitdiddle@icloud.com"] + isPriv: true + }) PGPKeyStore._identities[privIdent.clientId] = privIdent describe "when handling private keys", ->