Docs: clarify Key.clone()
behaviour (#1589)
This commit is contained in:
parent
50ea1ac889
commit
9175b76887
|
@ -170,13 +170,13 @@ class Key {
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Clones the key object
|
* Clones the key object. The copy is shallow, as it references the same packet objects as the original. However, if the top-level API is used, the two key instances are effectively independent.
|
||||||
* @param {Boolean} [deep=false] Whether to return a deep clone
|
* @param {Boolean} [clonePrivateParams=false] Only relevant for private keys: whether the secret key paramenters should be deeply copied. This is needed if e.g. `encrypt()` is to be called either on the clone or the original key.
|
||||||
* @returns {Promise<Key>} Clone of the key.
|
* @returns {Promise<Key>} Clone of the key.
|
||||||
*/
|
*/
|
||||||
clone(deep = false) {
|
clone(clonePrivateParams = false) {
|
||||||
const key = new this.constructor(this.toPacketList());
|
const key = new this.constructor(this.toPacketList());
|
||||||
if (deep) {
|
if (clonePrivateParams) {
|
||||||
key.getKeys().forEach(k => {
|
key.getKeys().forEach(k => {
|
||||||
// shallow clone the key packets
|
// shallow clone the key packets
|
||||||
k.keyPacket = Object.create(
|
k.keyPacket = Object.create(
|
||||||
|
|
|
@ -3236,6 +3236,26 @@ module.exports = () => describe('Key', function() {
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it('clone() - removing users or their signatures does not affect the original key', async function() {
|
||||||
|
const key = await openpgp.readKey({ armoredKey: priv_key_rsa });
|
||||||
|
const keyClone = key.clone();
|
||||||
|
expect(key.users[0].selfCertifications.length > 0).to.be.true;
|
||||||
|
expect(keyClone.users[0].selfCertifications.length > 0).to.be.true;
|
||||||
|
keyClone.users[0].selfCertifications = [];
|
||||||
|
expect(key.users[0].selfCertifications.length > 0).to.be.true;
|
||||||
|
expect(keyClone.users[0].selfCertifications.length > 0).to.be.false;
|
||||||
|
});
|
||||||
|
|
||||||
|
it('clone() - removing subkeys or their signatures does not affect the original key', async function() {
|
||||||
|
const key = await openpgp.readKey({ armoredKey: priv_key_rsa });
|
||||||
|
const keyClone = key.clone(true);
|
||||||
|
expect(key.subkeys[0].bindingSignatures.length > 0).to.be.true;
|
||||||
|
expect(keyClone.subkeys[0].bindingSignatures.length > 0).to.be.true;
|
||||||
|
keyClone.subkeys[0].bindingSignatures = [];
|
||||||
|
expect(key.subkeys[0].bindingSignatures.length > 0).to.be.true;
|
||||||
|
expect(keyClone.subkeys[0].bindingSignatures.length > 0).to.be.false;
|
||||||
|
});
|
||||||
|
|
||||||
it('revoke() - primary key', async function() {
|
it('revoke() - primary key', async function() {
|
||||||
const privKey = await openpgp.decryptKey({
|
const privKey = await openpgp.decryptKey({
|
||||||
privateKey: await openpgp.readKey({ armoredKey: priv_key_arm2 }),
|
privateKey: await openpgp.readKey({ armoredKey: priv_key_arm2 }),
|
||||||
|
|
Loading…
Reference in New Issue
Block a user