Mercurial > vim
diff src/testdir/test_crypt.vim @ 25362:68a7e6d70a5e v8.2.3218
patch 8.2.3218: when using xchaha20 crypt undo file is not removed
Commit: https://github.com/vim/vim/commit/8a4c812ede5b01a8e71082c1ff4ebfcbf1bd515f
Author: Christian Brabandt <cb@256bit.org>
Date: Sun Jul 25 14:36:05 2021 +0200
patch 8.2.3218: when using xchaha20 crypt undo file is not removed
Problem: When using xchaha20 crypt undo file is not removed.
Solution: Reset 'undofile' and delete the file. (Christian Brabandt,
closes #8630, closes #8467)
author | Bram Moolenaar <Bram@vim.org> |
---|---|
date | Sun, 25 Jul 2021 14:45:04 +0200 |
parents | 1ef6880ba4a9 |
children | 8b34c216a523 |
line wrap: on
line diff
--- a/src/testdir/test_crypt.vim +++ b/src/testdir/test_crypt.vim @@ -133,7 +133,7 @@ func Test_uncrypt_xchacha20_invalid() catch call assert_exception('pre-mature') endtry - call assert_match("Note: Encryption of swapfile not supported, disabling swap- and undofile", execute(':5messages')) + call assert_match("Note: Encryption of swapfile not supported, disabling swap file", execute(':5messages')) call assert_equal(0, &swapfile) call assert_equal("xchacha20", &cryptmethod) @@ -152,7 +152,7 @@ func Test_uncrypt_xchacha20_2() call feedkeys(":X\<CR>sodium\<CR>sodium\<CR>", 'xt') " swapfile disabled call assert_equal(0, &swapfile) - call assert_match("Note: Encryption of swapfile not supported, disabling swap- and undofile", execute(':messages')) + call assert_match("Note: Encryption of swapfile not supported, disabling swap file", execute(':messages')) w! " encrypted using xchacha20 call assert_match("\[xchacha20\]", execute(':messages')) @@ -176,7 +176,7 @@ func Test_uncrypt_xchacha20_3_persistent sp Xcrypt_sodium_undo.txt set cryptmethod=xchacha20 undofile call feedkeys(":X\<CR>sodium\<CR>sodium\<CR>", 'xt') - call assert_equal(0, &undofile) + call assert_equal(1, &undofile) let ufile=undofile(@%) call append(0, ['monday', 'tuesday', 'wednesday', 'thursday', 'friday']) call cursor(1, 1) @@ -189,6 +189,7 @@ func Test_uncrypt_xchacha20_3_persistent normal dd set undolevels=100 w! + call assert_equal(0, &undofile) bw! call feedkeys(":sp Xcrypt_sodium_undo.txt\<CR>sodium\<CR>", 'xt') " should fail