2019-11-04 10:18:35 +00:00
|
|
|
/* t-remarks.cpp
|
|
|
|
|
|
|
|
This file is part of qgpgme, the Qt API binding for gpgme
|
|
|
|
Copyright (c) 2017 by Bundesamt für Sicherheit in der Informationstechnik
|
|
|
|
Software engineering by Intevation GmbH
|
|
|
|
|
|
|
|
QGpgME is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License as
|
|
|
|
published by the Free Software Foundation; either version 2 of the
|
|
|
|
License, or (at your option) any later version.
|
|
|
|
|
|
|
|
QGpgME is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
|
|
|
|
In addition, as a special exception, the copyright holders give
|
|
|
|
permission to link the code of this program with any edition of
|
|
|
|
the Qt library by Trolltech AS, Norway (or with modified versions
|
|
|
|
of Qt that use the same license as Qt), and distribute linked
|
|
|
|
combinations including the two. You must obey the GNU General
|
|
|
|
Public License in all respects for all of the code used other than
|
|
|
|
Qt. If you modify this file, you may extend this exception to
|
|
|
|
your version of the file, but you are not obligated to do so. If
|
|
|
|
you do not wish to do so, delete this exception statement from
|
|
|
|
your version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
#include <QDebug>
|
|
|
|
#include <QTest>
|
|
|
|
#include <QSignalSpy>
|
|
|
|
#include <QTemporaryDir>
|
|
|
|
#include "keylistjob.h"
|
|
|
|
#include "protocol.h"
|
|
|
|
#include "signkeyjob.h"
|
qt: Always include C++ binding headers with gpgme++/ prefix
* lang/qt/src/Makefile.am, lang/qt/tests/Makefile.am (AM_CPPFLAGS):
Add builddir instead of srcdir of C++ bindings as include path.
* lang/qt/src/changeexpiryjob.cpp, lang/qt/src/changeexpiryjob.h,
lang/qt/src/changeownertrustjob.h, lang/qt/src/dataprovider.cpp,
lang/qt/src/dataprovider.h, lang/qt/src/debug.cpp,
lang/qt/src/decryptverifyarchivejob.cpp,
lang/qt/src/decryptverifyarchivejob.h,
lang/qt/src/encryptarchivejob.cpp, lang/qt/src/encryptarchivejob.h,
lang/qt/src/encryptjob.h, lang/qt/src/encryptjob_p.h,
lang/qt/src/filelistdataprovider.cpp,
lang/qt/src/filelistdataprovider.h,
lang/qt/src/hierarchicalkeylistjob.h, lang/qt/src/importjob.cpp,
lang/qt/src/importjob.h, lang/qt/src/importjob_p.h, lang/qt/src/job.h,
lang/qt/src/keyformailboxjob.h, lang/qt/src/keylistjob.h,
lang/qt/src/listallkeysjob.h, lang/qt/src/multideletejob.cpp,
lang/qt/src/qgpgmeaddexistingsubkeyjob.cpp,
lang/qt/src/qgpgmeadduseridjob.cpp, lang/qt/src/qgpgmebackend.cpp,
lang/qt/src/qgpgmechangeexpiryjob.cpp,
lang/qt/src/qgpgmechangeownertrustjob.cpp,
lang/qt/src/qgpgmechangepasswdjob.cpp, lang/qt/src/qgpgmedecryptjob.cpp,
lang/qt/src/qgpgmedecryptjob.h,
lang/qt/src/qgpgmedecryptverifyarchivejob.cpp,
lang/qt/src/qgpgmedecryptverifyarchivejob.h,
lang/qt/src/qgpgmedecryptverifyjob.cpp,
lang/qt/src/qgpgmedecryptverifyjob.h, lang/qt/src/qgpgmedeletejob.cpp,
lang/qt/src/qgpgmedownloadjob.cpp,
lang/qt/src/qgpgmeencryptarchivejob.cpp,
lang/qt/src/qgpgmeencryptarchivejob.h, lang/qt/src/qgpgmeencryptjob.cpp,
lang/qt/src/qgpgmeencryptjob.h, lang/qt/src/qgpgmeexportjob.cpp,
lang/qt/src/qgpgmeimportfromkeyserverjob.cpp,
lang/qt/src/qgpgmeimportfromkeyserverjob.h,
lang/qt/src/qgpgmeimportjob.cpp, lang/qt/src/qgpgmeimportjob.h,
lang/qt/src/qgpgmekeyformailboxjob.h,
lang/qt/src/qgpgmekeygenerationjob.cpp,
lang/qt/src/qgpgmekeygenerationjob.h, lang/qt/src/qgpgmekeylistjob.cpp,
lang/qt/src/qgpgmekeylistjob.h, lang/qt/src/qgpgmelistallkeysjob.cpp,
lang/qt/src/qgpgmelistallkeysjob.h,
lang/qt/src/qgpgmenewcryptoconfig.cpp,
lang/qt/src/qgpgmenewcryptoconfig.h, lang/qt/src/qgpgmequickjob.cpp,
lang/qt/src/qgpgmereceivekeysjob.h,
lang/qt/src/qgpgmerefreshsmimekeysjob.cpp,
lang/qt/src/qgpgmerefreshsmimekeysjob.h,
lang/qt/src/qgpgmerevokekeyjob.cpp,
lang/qt/src/qgpgmesetprimaryuseridjob.cpp,
lang/qt/src/qgpgmesignarchivejob.cpp,
lang/qt/src/qgpgmesignarchivejob.h,
lang/qt/src/qgpgmesignencryptarchivejob.cpp,
lang/qt/src/qgpgmesignencryptarchivejob.h,
lang/qt/src/qgpgmesignencryptjob.cpp,
lang/qt/src/qgpgmesignencryptjob.h, lang/qt/src/qgpgmesignjob.cpp,
lang/qt/src/qgpgmesignjob.h, lang/qt/src/qgpgmesignkeyjob.cpp,
lang/qt/src/qgpgmetofupolicyjob.cpp,
lang/qt/src/qgpgmeverifydetachedjob.cpp,
lang/qt/src/qgpgmeverifydetachedjob.h,
lang/qt/src/qgpgmeverifyopaquejob.cpp,
lang/qt/src/qgpgmeverifyopaquejob.h, lang/qt/src/qgpgmewkdlookupjob.cpp,
lang/qt/src/qgpgmewkdrefreshjob.cpp, lang/qt/src/qgpgmewkdrefreshjob.h,
lang/qt/src/qgpgmewkspublishjob.cpp, lang/qt/src/quickjob.h,
lang/qt/src/signarchivejob.cpp, lang/qt/src/signarchivejob.h,
lang/qt/src/signencryptarchivejob.cpp,
lang/qt/src/signencryptarchivejob.h, lang/qt/src/signencryptjob.h,
lang/qt/src/signencryptjob_p.h, lang/qt/src/signjob.h,
lang/qt/src/signjob_p.h, lang/qt/src/threadedjobmixin.cpp,
lang/qt/src/threadedjobmixin.h, lang/qt/src/tofupolicyjob.h,
lang/qt/src/util.cpp, lang/qt/src/wkdlookupresult.cpp,
lang/qt/src/wkdlookupresult.h, lang/qt/src/wkdrefreshjob_p.h,
lang/qt/tests/run-decryptverifyarchivejob.cpp,
lang/qt/tests/run-decryptverifyjob.cpp,
lang/qt/tests/run-encryptarchivejob.cpp,
lang/qt/tests/run-encryptjob.cpp, lang/qt/tests/run-exportjob.cpp,
lang/qt/tests/run-importjob.cpp, lang/qt/tests/run-keyformailboxjob.cpp,
lang/qt/tests/run-receivekeysjob.cpp,
lang/qt/tests/run-refreshkeysjob.cpp,
lang/qt/tests/run-signarchivejob.cpp, lang/qt/tests/run-signjob.cpp,
lang/qt/tests/run-verifydetachedjob.cpp,
lang/qt/tests/run-verifyopaquejob.cpp,
lang/qt/tests/run-wkdrefreshjob.cpp,
lang/qt/tests/t-addexistingsubkey.cpp,
lang/qt/tests/t-changeexpiryjob.cpp, lang/qt/tests/t-config.cpp,
lang/qt/tests/t-decryptverify.cpp, lang/qt/tests/t-encrypt.cpp,
lang/qt/tests/t-import.cpp, lang/qt/tests/t-keylist.cpp,
lang/qt/tests/t-keylocate.cpp, lang/qt/tests/t-ownertrust.cpp,
lang/qt/tests/t-remarks.cpp, lang/qt/tests/t-revokekey.cpp,
lang/qt/tests/t-setprimaryuserid.cpp, lang/qt/tests/t-support.cpp,
lang/qt/tests/t-support.h, lang/qt/tests/t-tofuinfo.cpp,
lang/qt/tests/t-trustsignatures.cpp, lang/qt/tests/t-various.cpp,
lang/qt/tests/t-verify.cpp, lang/qt/tests/t-wkdlookup.cpp,
lang/qt/tests/t-wkspublish.cpp: Include GpgME++ headers with gpgme++/
prefix.
--
This prepares the Qt bindings for building them separately from the C++
bindings.
GnuPG-bug-id: 7110
2024-05-24 09:39:42 +00:00
|
|
|
#include <gpgme++/context.h>
|
|
|
|
#include <gpgme++/engineinfo.h>
|
2019-11-04 10:18:35 +00:00
|
|
|
|
|
|
|
#include "t-support.h"
|
|
|
|
|
|
|
|
using namespace QGpgME;
|
|
|
|
using namespace GpgME;
|
|
|
|
|
|
|
|
class TestRemarks: public QGpgMETest
|
|
|
|
{
|
|
|
|
Q_OBJECT
|
|
|
|
|
|
|
|
public:
|
|
|
|
// This test is disabled (no slot) because the behavior
|
|
|
|
// is not clearly defined. Better to prevent that
|
|
|
|
// case in the UI
|
|
|
|
void testRemarkOwnKey()
|
|
|
|
{
|
2019-11-06 08:21:02 +00:00
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
2019-11-04 10:18:35 +00:00
|
|
|
// Get the signing key (alfa)
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY (ctx);
|
|
|
|
Error err;
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY (!seckey.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2019-11-04 10:18:35 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-04 10:18:35 +00:00
|
|
|
job->setExportable(false);
|
|
|
|
std::vector<unsigned int> uids;
|
|
|
|
uids.push_back(0);
|
|
|
|
job->setUserIDsToSign(uids);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setRemark(QStringLiteral("Just GNU it!"));
|
|
|
|
job->setDupeOk(true);
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
qDebug() << "Error: " << err2.asString();
|
|
|
|
}
|
|
|
|
QVERIFY(err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(seckey);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
private Q_SLOTS:
|
|
|
|
|
2019-11-06 08:10:03 +00:00
|
|
|
void testRemarkReplaceSingleUIDExportable()
|
|
|
|
{
|
2019-11-06 08:21:02 +00:00
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
2019-11-06 08:10:03 +00:00
|
|
|
// Get the signing key (alfa)
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY (ctx);
|
|
|
|
Error err;
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY (!seckey.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
|
|
|
|
// Get the target key (tango)
|
|
|
|
auto target = ctx->key("ECAC774F4EEEB0620767044A58CB9A4C85A81F38", err, false);
|
|
|
|
QVERIFY (!target.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
QVERIFY (target.numUserIDs());
|
|
|
|
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2019-11-06 08:10:03 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-06 08:10:03 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
std::vector<unsigned int> uids;
|
|
|
|
uids.push_back(0);
|
|
|
|
job->setUserIDsToSign(uids);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setRemark(QStringLiteral("The quick brown fox jumps over the lazy dog"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the remark should have been added.
|
|
|
|
target.update();
|
|
|
|
const char *remark = target.userID(0).remark(seckey, err);
|
|
|
|
QVERIFY(!err);
|
2019-11-06 08:12:09 +00:00
|
|
|
QVERIFY(remark);
|
2019-11-06 08:10:03 +00:00
|
|
|
QCOMPARE(QString::fromUtf8(remark), QStringLiteral("The quick brown fox "
|
|
|
|
"jumps over the lazy dog"));
|
|
|
|
|
|
|
|
// Now replace the remark
|
|
|
|
auto job3 = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job3);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job3);
|
2019-11-06 08:10:03 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-06 08:10:03 +00:00
|
|
|
job3->setExportable(false);
|
|
|
|
job3->setUserIDsToSign(uids);
|
|
|
|
job3->setSigningKey(seckey);
|
|
|
|
job3->setDupeOk(true);
|
|
|
|
job3->setRemark(QStringLiteral("The quick brown fox fails to jump over Frodo"));
|
|
|
|
|
|
|
|
connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job3->start(target);
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
target.update();
|
|
|
|
remark = target.userID(0).remark(seckey, err);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(remark);
|
|
|
|
QCOMPARE(QString::fromUtf8(remark), QStringLiteral("The quick brown fox fails "
|
|
|
|
"to jump over Frodo"));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-11-04 12:56:14 +00:00
|
|
|
void testMultipleRemarks()
|
|
|
|
{
|
2019-11-06 08:21:02 +00:00
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
2019-11-04 12:56:14 +00:00
|
|
|
// Get the signing key1 (alfa)
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY (ctx);
|
|
|
|
Error err;
|
|
|
|
auto alpha = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY (!alpha.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
|
|
|
|
// Get the signing key2 (zulu)
|
|
|
|
auto zulu = ctx->key("23FD347A419429BACCD5E72D6BC4778054ACD246", err, true);
|
|
|
|
QVERIFY (!zulu.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
|
|
|
|
// Get the target key (victor)
|
|
|
|
auto target = ctx->key("E8143C489C8D41124DC40D0B47AF4B6961F04784", err, false);
|
|
|
|
QVERIFY (!target.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
QVERIFY (target.numUserIDs());
|
|
|
|
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2019-11-04 12:56:14 +00:00
|
|
|
|
|
|
|
// Setup the first job
|
|
|
|
job->setExportable(false);
|
|
|
|
std::vector<unsigned int> uids;
|
|
|
|
uids.push_back(0);
|
|
|
|
job->setUserIDsToSign(uids);
|
|
|
|
job->setSigningKey(alpha);
|
|
|
|
job->setRemark(QStringLiteral("String one"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// Now another remark from zulu
|
|
|
|
auto job3 = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job3);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job3);
|
2019-11-04 12:56:14 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-04 12:56:14 +00:00
|
|
|
job3->setExportable(false);
|
|
|
|
job3->setUserIDsToSign(uids);
|
|
|
|
job3->setSigningKey(zulu);
|
|
|
|
job3->setDupeOk(true);
|
|
|
|
job3->setRemark(QStringLiteral("String two"));
|
|
|
|
|
|
|
|
connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job3->start(target);
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
target.update();
|
|
|
|
std::vector<GpgME::Key> keys;
|
|
|
|
keys.push_back(alpha);
|
|
|
|
keys.push_back(zulu);
|
|
|
|
|
|
|
|
const auto remarks = target.userID(0).remarks(keys, err);
|
|
|
|
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(remarks.size() == 2);
|
|
|
|
QCOMPARE(remarks[0], std::string("String one"));
|
|
|
|
QCOMPARE(remarks[1], std::string("String two"));
|
|
|
|
}
|
|
|
|
|
2019-11-04 10:18:35 +00:00
|
|
|
void testRemarkReplaceSingleUID()
|
|
|
|
{
|
2019-11-06 08:21:02 +00:00
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
2019-11-04 10:18:35 +00:00
|
|
|
// Get the signing key (alfa)
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY (ctx);
|
|
|
|
Error err;
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY (!seckey.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
|
|
|
|
// Get the target key (xray)
|
|
|
|
auto target = ctx->key("04C1DF62EFA0EBB00519B06A8979A6C5567FB34A", err, false);
|
|
|
|
QVERIFY (!target.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
QVERIFY (target.numUserIDs());
|
|
|
|
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2019-11-04 10:18:35 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-04 10:18:35 +00:00
|
|
|
job->setExportable(false);
|
|
|
|
std::vector<unsigned int> uids;
|
|
|
|
uids.push_back(0);
|
|
|
|
job->setUserIDsToSign(uids);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setRemark(QStringLiteral("The quick brown fox jumps over the lazy dog"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the remark should have been added.
|
|
|
|
target.update();
|
|
|
|
const char *remark = target.userID(0).remark(seckey, err);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(remark);
|
|
|
|
QCOMPARE(QString::fromUtf8(remark), QStringLiteral("The quick brown fox "
|
|
|
|
"jumps over the lazy dog"));
|
|
|
|
|
|
|
|
// Now replace the remark
|
|
|
|
auto job3 = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job3);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job3);
|
2019-11-04 10:18:35 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-04 10:18:35 +00:00
|
|
|
job3->setExportable(false);
|
|
|
|
job3->setUserIDsToSign(uids);
|
|
|
|
job3->setSigningKey(seckey);
|
|
|
|
job3->setDupeOk(true);
|
|
|
|
job3->setRemark(QStringLiteral("The quick brown fox jumps over Frodo"));
|
|
|
|
|
|
|
|
connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job3->start(target);
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
target.update();
|
|
|
|
remark = target.userID(0).remark(seckey, err);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(remark);
|
|
|
|
QCOMPARE(QString::fromUtf8(remark), QStringLiteral("The quick brown fox "
|
|
|
|
"jumps over Frodo"));
|
|
|
|
}
|
|
|
|
|
|
|
|
void testRemarkReplaceMultiUID()
|
|
|
|
{
|
2019-11-06 08:21:02 +00:00
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
2019-11-04 10:18:35 +00:00
|
|
|
// Get the signing key (alfa)
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY (ctx);
|
|
|
|
Error err;
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY (!seckey.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
|
|
|
|
// Get the target key (mallory / mike)
|
|
|
|
auto target = ctx->key("2686AA191A278013992C72EBBE794852BE5CF886", err, false);
|
|
|
|
QVERIFY (!target.isNull());
|
|
|
|
QVERIFY (!err);
|
|
|
|
QVERIFY (target.numUserIDs());
|
|
|
|
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2019-11-04 10:18:35 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-04 10:18:35 +00:00
|
|
|
job->setExportable(false);
|
|
|
|
std::vector<unsigned int> uids;
|
|
|
|
uids.push_back(0);
|
|
|
|
job->setUserIDsToSign(uids);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setRemark(QStringLiteral("Mallory is evil 😠"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the remark should have been added.
|
|
|
|
target.update();
|
|
|
|
const char *remark = target.userID(0).remark(seckey, err);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(remark);
|
|
|
|
QCOMPARE(QString::fromUtf8(remark), QStringLiteral("Mallory is evil 😠"));
|
|
|
|
|
|
|
|
// Try to replace it without dupeOK
|
|
|
|
auto job2 = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job2);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job2);
|
2019-11-04 10:18:35 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-04 10:18:35 +00:00
|
|
|
job2->setExportable(false);
|
|
|
|
job2->setUserIDsToSign(uids);
|
|
|
|
job2->setSigningKey(seckey);
|
|
|
|
job2->setRemark(QStringLiteral("Mallory is nice"));
|
|
|
|
|
|
|
|
connect(job2, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job2->start(target);
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// Now replace the remark
|
|
|
|
auto job3 = openpgp()->signKeyJob();
|
|
|
|
QVERIFY (job3);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job3);
|
2019-11-04 10:18:35 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2019-11-04 10:18:35 +00:00
|
|
|
job3->setExportable(false);
|
|
|
|
job3->setUserIDsToSign(uids);
|
|
|
|
job3->setSigningKey(seckey);
|
|
|
|
job3->setDupeOk(true);
|
|
|
|
job3->setRemark(QStringLiteral("Mallory is nice"));
|
|
|
|
|
|
|
|
connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2,
|
|
|
|
const QString,
|
|
|
|
const GpgME::Error) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
QVERIFY(!err2);
|
|
|
|
});
|
|
|
|
|
|
|
|
job3->start(target);
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
target.update();
|
|
|
|
remark = target.userID(0).remark(seckey, err);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(remark);
|
|
|
|
QCOMPARE(QString::fromUtf8(remark), QStringLiteral("Mallory is nice"));
|
|
|
|
}
|
|
|
|
|
|
|
|
void initTestCase()
|
|
|
|
{
|
|
|
|
QGpgMETest::initTestCase();
|
|
|
|
const QString gpgHome = qgetenv("GNUPGHOME");
|
|
|
|
QVERIFY(copyKeyrings(gpgHome, mDir.path()));
|
|
|
|
qputenv("GNUPGHOME", mDir.path().toUtf8());
|
2019-11-07 23:07:33 +00:00
|
|
|
QFile conf(mDir.path() + QStringLiteral("/gpg.conf"));
|
|
|
|
QVERIFY(conf.open(QIODevice::WriteOnly));
|
2020-11-11 02:58:28 +00:00
|
|
|
if (GpgME::engineInfo(GpgME::GpgEngine).engineVersion() >= "2.2.18") {
|
|
|
|
conf.write("allow-weak-key-signatures");
|
|
|
|
}
|
2019-11-07 23:07:33 +00:00
|
|
|
conf.close();
|
2019-11-04 10:18:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
QTemporaryDir mDir;
|
|
|
|
};
|
|
|
|
|
|
|
|
QTEST_MAIN(TestRemarks)
|
|
|
|
|
|
|
|
#include "t-remarks.moc"
|