~bzr-pqm/bzr/bzr.dev

« back to all changes in this revision

Viewing changes to bzrlib/tests/test_gpg.py

  • Committer: Jelmer Vernooij
  • Date: 2011-12-19 19:15:58 UTC
  • mfrom: (6388 +trunk)
  • mto: This revision was merged to the branch mainline in revision 6404.
  • Revision ID: jelmer@canonical.com-20111219191558-p1k7cvhjq8l6v2gm
Merge bzr.dev.

Show diffs side-by-side

added added

removed removed

Lines of Context:
21
21
import sys
22
22
 
23
23
from bzrlib import (
 
24
    config,
24
25
    errors,
25
26
    gpg,
 
27
    tests,
26
28
    trace,
27
29
    ui,
28
30
    )
31
33
    features,
32
34
    )
33
35
 
34
 
class FakeConfig(object):
35
 
 
36
 
    def gpg_signing_key(self):
37
 
        return "amy@example.com"
38
 
 
39
 
    def gpg_signing_command(self):
40
 
        return "false"
41
 
 
42
 
    def acceptable_keys(self):
43
 
        return None
44
 
 
45
 
 
46
 
class TestCommandLine(TestCase):
 
36
 
 
37
class FakeConfig(config.Stack):
 
38
 
 
39
    def __init__(self, content=None):
 
40
        store = config.IniFileStore()
 
41
        if content is None:
 
42
            content = '''
 
43
gpg_signing_key=amy@example.com
 
44
gpg_signing_command=false'''
 
45
        store._load_from_string(content)
 
46
        super(FakeConfig, self).__init__([store.get_sections])
 
47
 
 
48
 
 
49
class TestCommandLine(tests.TestCase):
 
50
 
 
51
    def setUp(self):
 
52
        super(TestCommandLine, self).setUp()
 
53
        self.my_gpg = gpg.GPGStrategy(FakeConfig())
47
54
 
48
55
    def test_signing_command_line(self):
49
 
        my_gpg = gpg.GPGStrategy(FakeConfig())
 
56
        self.assertEqual(['false',  '--clearsign', '-u', 'amy@example.com'],
 
57
                         self.my_gpg._command_line())
 
58
 
 
59
    def test_signing_command_line_from_default(self):
 
60
        # Using 'default' for gpg_signing_key will use the mail part of 'email'
 
61
        my_gpg = gpg.GPGStrategy(FakeConfig('''
 
62
email=Amy <amy@example.com>
 
63
gpg_signing_key=default
 
64
gpg_signing_command=false'''))
 
65
        self.assertEqual(['false',  '--clearsign', '-u', 'amy@example.com'],
 
66
                         my_gpg._command_line())
 
67
 
 
68
    def test_signing_command_line_from_email(self):
 
69
        # Not setting gpg_signing_key will use the mail part of 'email'
 
70
        my_gpg = gpg.GPGStrategy(FakeConfig('''
 
71
email=Amy <amy@example.com>
 
72
gpg_signing_command=false'''))
50
73
        self.assertEqual(['false',  '--clearsign', '-u', 'amy@example.com'],
51
74
                         my_gpg._command_line())
52
75
 
53
76
    def test_checks_return_code(self):
54
77
        # This test needs a unix like platform - one with 'false' to run.
55
78
        # if you have one, please make this work :)
56
 
        my_gpg = gpg.GPGStrategy(FakeConfig())
57
 
        self.assertRaises(errors.SigningFailed, my_gpg.sign, 'content')
 
79
        self.assertRaises(errors.SigningFailed, self.my_gpg.sign, 'content')
58
80
 
59
81
    def assertProduces(self, content):
60
82
        # This needs a 'cat' command or similar to work.
61
 
        my_gpg = gpg.GPGStrategy(FakeConfig())
62
83
        if sys.platform == 'win32':
63
84
            # Windows doesn't come with cat, and we don't require it
64
85
            # so lets try using python instead.
65
86
            # But stupid windows and line-ending conversions.
66
87
            # It is too much work to make sys.stdout be in binary mode.
67
88
            # http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/65443
68
 
            my_gpg._command_line = lambda:[sys.executable, '-c',
 
89
            self.my_gpg._command_line = lambda:[sys.executable, '-c',
69
90
                    'import sys; sys.stdout.write(sys.stdin.read())']
70
91
            new_content = content.replace('\n', '\r\n')
71
92
 
72
 
            self.assertEqual(new_content, my_gpg.sign(content))
 
93
            self.assertEqual(new_content, self.my_gpg.sign(content))
73
94
        else:
74
 
            my_gpg._command_line = lambda:['cat', '-']
75
 
            self.assertEqual(content, my_gpg.sign(content))
 
95
            self.my_gpg._command_line = lambda:['cat', '-']
 
96
            self.assertEqual(content, self.my_gpg.sign(content))
76
97
 
77
98
    def test_returns_output(self):
78
99
        content = "some content\nwith newlines\n"
250
271
        #untrusted by gpg but listed as acceptable_keys by user
251
272
        self.requireFeature(features.gpgme)
252
273
        self.import_keys()
253
 
            
 
274
 
254
275
        content = """-----BEGIN PGP SIGNED MESSAGE-----
255
276
Hash: SHA1
256
277
 
281
302
    def test_verify_unacceptable_key(self):
282
303
        self.requireFeature(features.gpgme)
283
304
        self.import_keys()
284
 
            
 
305
 
285
306
        content = """-----BEGIN PGP SIGNED MESSAGE-----
286
307
Hash: SHA1
287
308
 
312
333
    def test_verify_valid_but_untrusted(self):
313
334
        self.requireFeature(features.gpgme)
314
335
        self.import_keys()
315
 
            
 
336
 
316
337
        content = """-----BEGIN PGP SIGNED MESSAGE-----
317
338
Hash: SHA1
318
339
 
342
363
    def test_verify_bad_testament(self):
343
364
        self.requireFeature(features.gpgme)
344
365
        self.import_keys()
345
 
            
 
366
 
346
367
        content = """-----BEGIN PGP SIGNED MESSAGE-----
347
368
Hash: SHA1
348
369
 
374
395
    def test_verify_revoked_signature(self):
375
396
        self.requireFeature(features.gpgme)
376
397
        self.import_keys()
377
 
            
 
398
 
378
399
        content = """-----BEGIN PGP SIGNED MESSAGE-----
379
400
Hash: SHA1
380
401