diff options
author | Ruben Bridgewater <ruben@bridgewater.de> | 2019-03-16 12:09:14 +0100 |
---|---|---|
committer | Ruben Bridgewater <ruben@bridgewater.de> | 2019-03-23 02:55:54 +0100 |
commit | 1ed3c54ecbd72a33693e5954f86bcc9fd9b1cc09 (patch) | |
tree | b708974383e0c32b07b1c1525b10ba8426307737 /test/parallel/test-crypto-pbkdf2.js | |
parent | c757cb1b9870de9297df736d5e831b7eb627644a (diff) | |
download | android-node-v8-1ed3c54ecbd72a33693e5954f86bcc9fd9b1cc09.tar.gz android-node-v8-1ed3c54ecbd72a33693e5954f86bcc9fd9b1cc09.tar.bz2 android-node-v8-1ed3c54ecbd72a33693e5954f86bcc9fd9b1cc09.zip |
errors: update error name
This updates all Node.js errors by removing the `code` being part
of the `name` property. Instead, the name is just changed once on
instantiation, the stack is accessed to create the stack as expected
and then the `name` property is set back to it's original form.
PR-URL: https://github.com/nodejs/node/pull/26738
Fixes: https://github.com/nodejs/node/issues/26669
Fixes: https://github.com/nodejs/node/issues/20253
Reviewed-By: Gus Caplan <me@gus.host>
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Michaƫl Zasso <targos@protonmail.com>
Reviewed-By: Joyee Cheung <joyeec9h3@gmail.com>
Diffstat (limited to 'test/parallel/test-crypto-pbkdf2.js')
-rw-r--r-- | test/parallel/test-crypto-pbkdf2.js | 30 |
1 files changed, 15 insertions, 15 deletions
diff --git a/test/parallel/test-crypto-pbkdf2.js b/test/parallel/test-crypto-pbkdf2.js index db12cf14fc..4e3c4f64f0 100644 --- a/test/parallel/test-crypto-pbkdf2.js +++ b/test/parallel/test-crypto-pbkdf2.js @@ -64,7 +64,7 @@ assert.throws( () => crypto.pbkdf2('password', 'salt', 1, 20, null), { code: 'ERR_INVALID_CALLBACK', - name: 'TypeError [ERR_INVALID_CALLBACK]' + name: 'TypeError' } ); @@ -72,7 +72,7 @@ assert.throws( () => crypto.pbkdf2Sync('password', 'salt', -1, 20, 'sha1'), { code: 'ERR_OUT_OF_RANGE', - name: 'RangeError [ERR_OUT_OF_RANGE]', + name: 'RangeError', message: 'The value of "iterations" is out of range. ' + 'It must be >= 0 && < 4294967296. Received -1' } @@ -84,7 +84,7 @@ assert.throws( crypto.pbkdf2Sync('password', 'salt', 1, notNumber, 'sha256'); }, { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: 'The "keylen" argument must be of type number. ' + `Received type ${typeof notNumber}` }); @@ -97,7 +97,7 @@ assert.throws( common.mustNotCall()); }, { code: 'ERR_OUT_OF_RANGE', - name: 'RangeError [ERR_OUT_OF_RANGE]', + name: 'RangeError', message: 'The value of "keylen" is out of range. It ' + `must be an integer. Received ${input}` }); @@ -110,7 +110,7 @@ assert.throws( common.mustNotCall()); }, { code: 'ERR_OUT_OF_RANGE', - name: 'RangeError [ERR_OUT_OF_RANGE]', + name: 'RangeError', message: 'The value of "keylen" is out of range. It ' + `must be >= 0 && < 4294967296. Received ${input}` }); @@ -124,7 +124,7 @@ assert.throws( () => crypto.pbkdf2('password', 'salt', 8, 8, common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: 'The "digest" argument must be one of type string or null. ' + 'Received type undefined' }); @@ -133,7 +133,7 @@ assert.throws( () => crypto.pbkdf2Sync('password', 'salt', 8, 8), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: 'The "digest" argument must be one of type string or null. ' + 'Received type undefined' }); @@ -145,7 +145,7 @@ assert.throws( () => crypto.pbkdf2(input, 'salt', 8, 8, 'sha256', common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: `The "password" argument must be one of type string, ${msgPart2}` } ); @@ -154,7 +154,7 @@ assert.throws( () => crypto.pbkdf2('pass', input, 8, 8, 'sha256', common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: `The "salt" argument must be one of type string, ${msgPart2}` } ); @@ -163,7 +163,7 @@ assert.throws( () => crypto.pbkdf2Sync(input, 'salt', 8, 8, 'sha256'), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: `The "password" argument must be one of type string, ${msgPart2}` } ); @@ -172,7 +172,7 @@ assert.throws( () => crypto.pbkdf2Sync('pass', input, 8, 8, 'sha256'), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: `The "salt" argument must be one of type string, ${msgPart2}` } ); @@ -184,7 +184,7 @@ assert.throws( () => crypto.pbkdf2('pass', 'salt', i, 8, 'sha256', common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: `The "iterations" argument must be of type number. ${received}` } ); @@ -193,7 +193,7 @@ assert.throws( () => crypto.pbkdf2Sync('pass', 'salt', i, 8, 'sha256'), { code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError [ERR_INVALID_ARG_TYPE]', + name: 'TypeError', message: `The "iterations" argument must be of type number. ${received}` } ); @@ -226,7 +226,7 @@ assert.throws( () => crypto.pbkdf2('pass', 'salt', 8, 8, 'md55', common.mustNotCall()), { code: 'ERR_CRYPTO_INVALID_DIGEST', - name: 'TypeError [ERR_CRYPTO_INVALID_DIGEST]', + name: 'TypeError', message: 'Invalid digest: md55' } ); @@ -235,7 +235,7 @@ assert.throws( () => crypto.pbkdf2Sync('pass', 'salt', 8, 8, 'md55'), { code: 'ERR_CRYPTO_INVALID_DIGEST', - name: 'TypeError [ERR_CRYPTO_INVALID_DIGEST]', + name: 'TypeError', message: 'Invalid digest: md55' } ); |