@@ -463,7 +463,7 @@ describe('VaultManager', () => {
463463 await vaultManager ?. destroy ( ) ;
464464 }
465465 } ) ;
466- describe . skip ( 'With remote agents' , ( ) => {
466+ describe ( 'With remote agents' , ( ) => {
467467 let allDataDir : string ;
468468 let keyManager : KeyManager ;
469469 let fwdProxy : ForwardProxy ;
@@ -1388,7 +1388,7 @@ describe('VaultManager', () => {
13881388 // No permissions for vault3
13891389
13901390 // scanning vaults
1391- const gen = vaultManager . handleScanVaults ( nodeId1 , acl ) ;
1391+ const gen = vaultManager . handleScanVaults ( nodeId1 ) ;
13921392 const vaults : Record < VaultId , [ VaultName , VaultAction [ ] ] > = { } ;
13931393 for await ( const vault of gen ) {
13941394 vaults [ vault . vaultId ] = [ vault . vaultName , vault . vaultPermissions ] ;
@@ -1399,14 +1399,14 @@ describe('VaultManager', () => {
13991399
14001400 // Should throw due to no permission
14011401 await expect ( async ( ) => {
1402- for await ( const _ of vaultManager . handleScanVaults ( nodeId2 , acl ) ) {
1402+ for await ( const _ of vaultManager . handleScanVaults ( nodeId2 ) ) {
14031403 // Should throw
14041404 }
14051405 } ) . rejects . toThrow ( vaultsErrors . ErrorVaultsPermissionDenied ) ;
14061406 // Should throw due to lack of scan permission
14071407 await gestaltGraph . setGestaltActionByNode ( nodeId2 , 'notify' ) ;
14081408 await expect ( async ( ) => {
1409- for await ( const _ of vaultManager . handleScanVaults ( nodeId2 , acl ) ) {
1409+ for await ( const _ of vaultManager . handleScanVaults ( nodeId2 ) ) {
14101410 // Should throw
14111411 }
14121412 } ) . rejects . toThrow ( vaultsErrors . ErrorVaultsPermissionDenied ) ;
0 commit comments