2021-06-28 09:44:28 +00:00
|
|
|
/* t-trustsignatures.cpp
|
2021-05-05 16:38:16 +00:00
|
|
|
|
|
|
|
This file is part of qgpgme, the Qt API binding for gpgme
|
|
|
|
Copyright (c) 2021 g10 Code GmbH
|
|
|
|
Software engineering by Ingo Klöcker <dev@ingo-kloecker.de>
|
|
|
|
|
|
|
|
QGpgME is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License as
|
|
|
|
published by the Free Software Foundation; either version 2 of the
|
|
|
|
License, or (at your option) any later version.
|
|
|
|
|
|
|
|
QGpgME is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
|
|
|
|
In addition, as a special exception, the copyright holders give
|
|
|
|
permission to link the code of this program with any edition of
|
|
|
|
the Qt library by Trolltech AS, Norway (or with modified versions
|
|
|
|
of Qt that use the same license as Qt), and distribute linked
|
|
|
|
combinations including the two. You must obey the GNU General
|
|
|
|
Public License in all respects for all of the code used other than
|
|
|
|
Qt. If you modify this file, you may extend this exception to
|
|
|
|
your version of the file, but you are not obligated to do so. If
|
|
|
|
you do not wish to do so, delete this exception statement from
|
|
|
|
your version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "t-support.h"
|
|
|
|
|
qt: Always include C++ binding headers with gpgme++/ prefix
* lang/qt/src/Makefile.am, lang/qt/tests/Makefile.am (AM_CPPFLAGS):
Add builddir instead of srcdir of C++ bindings as include path.
* lang/qt/src/changeexpiryjob.cpp, lang/qt/src/changeexpiryjob.h,
lang/qt/src/changeownertrustjob.h, lang/qt/src/dataprovider.cpp,
lang/qt/src/dataprovider.h, lang/qt/src/debug.cpp,
lang/qt/src/decryptverifyarchivejob.cpp,
lang/qt/src/decryptverifyarchivejob.h,
lang/qt/src/encryptarchivejob.cpp, lang/qt/src/encryptarchivejob.h,
lang/qt/src/encryptjob.h, lang/qt/src/encryptjob_p.h,
lang/qt/src/filelistdataprovider.cpp,
lang/qt/src/filelistdataprovider.h,
lang/qt/src/hierarchicalkeylistjob.h, lang/qt/src/importjob.cpp,
lang/qt/src/importjob.h, lang/qt/src/importjob_p.h, lang/qt/src/job.h,
lang/qt/src/keyformailboxjob.h, lang/qt/src/keylistjob.h,
lang/qt/src/listallkeysjob.h, lang/qt/src/multideletejob.cpp,
lang/qt/src/qgpgmeaddexistingsubkeyjob.cpp,
lang/qt/src/qgpgmeadduseridjob.cpp, lang/qt/src/qgpgmebackend.cpp,
lang/qt/src/qgpgmechangeexpiryjob.cpp,
lang/qt/src/qgpgmechangeownertrustjob.cpp,
lang/qt/src/qgpgmechangepasswdjob.cpp, lang/qt/src/qgpgmedecryptjob.cpp,
lang/qt/src/qgpgmedecryptjob.h,
lang/qt/src/qgpgmedecryptverifyarchivejob.cpp,
lang/qt/src/qgpgmedecryptverifyarchivejob.h,
lang/qt/src/qgpgmedecryptverifyjob.cpp,
lang/qt/src/qgpgmedecryptverifyjob.h, lang/qt/src/qgpgmedeletejob.cpp,
lang/qt/src/qgpgmedownloadjob.cpp,
lang/qt/src/qgpgmeencryptarchivejob.cpp,
lang/qt/src/qgpgmeencryptarchivejob.h, lang/qt/src/qgpgmeencryptjob.cpp,
lang/qt/src/qgpgmeencryptjob.h, lang/qt/src/qgpgmeexportjob.cpp,
lang/qt/src/qgpgmeimportfromkeyserverjob.cpp,
lang/qt/src/qgpgmeimportfromkeyserverjob.h,
lang/qt/src/qgpgmeimportjob.cpp, lang/qt/src/qgpgmeimportjob.h,
lang/qt/src/qgpgmekeyformailboxjob.h,
lang/qt/src/qgpgmekeygenerationjob.cpp,
lang/qt/src/qgpgmekeygenerationjob.h, lang/qt/src/qgpgmekeylistjob.cpp,
lang/qt/src/qgpgmekeylistjob.h, lang/qt/src/qgpgmelistallkeysjob.cpp,
lang/qt/src/qgpgmelistallkeysjob.h,
lang/qt/src/qgpgmenewcryptoconfig.cpp,
lang/qt/src/qgpgmenewcryptoconfig.h, lang/qt/src/qgpgmequickjob.cpp,
lang/qt/src/qgpgmereceivekeysjob.h,
lang/qt/src/qgpgmerefreshsmimekeysjob.cpp,
lang/qt/src/qgpgmerefreshsmimekeysjob.h,
lang/qt/src/qgpgmerevokekeyjob.cpp,
lang/qt/src/qgpgmesetprimaryuseridjob.cpp,
lang/qt/src/qgpgmesignarchivejob.cpp,
lang/qt/src/qgpgmesignarchivejob.h,
lang/qt/src/qgpgmesignencryptarchivejob.cpp,
lang/qt/src/qgpgmesignencryptarchivejob.h,
lang/qt/src/qgpgmesignencryptjob.cpp,
lang/qt/src/qgpgmesignencryptjob.h, lang/qt/src/qgpgmesignjob.cpp,
lang/qt/src/qgpgmesignjob.h, lang/qt/src/qgpgmesignkeyjob.cpp,
lang/qt/src/qgpgmetofupolicyjob.cpp,
lang/qt/src/qgpgmeverifydetachedjob.cpp,
lang/qt/src/qgpgmeverifydetachedjob.h,
lang/qt/src/qgpgmeverifyopaquejob.cpp,
lang/qt/src/qgpgmeverifyopaquejob.h, lang/qt/src/qgpgmewkdlookupjob.cpp,
lang/qt/src/qgpgmewkdrefreshjob.cpp, lang/qt/src/qgpgmewkdrefreshjob.h,
lang/qt/src/qgpgmewkspublishjob.cpp, lang/qt/src/quickjob.h,
lang/qt/src/signarchivejob.cpp, lang/qt/src/signarchivejob.h,
lang/qt/src/signencryptarchivejob.cpp,
lang/qt/src/signencryptarchivejob.h, lang/qt/src/signencryptjob.h,
lang/qt/src/signencryptjob_p.h, lang/qt/src/signjob.h,
lang/qt/src/signjob_p.h, lang/qt/src/threadedjobmixin.cpp,
lang/qt/src/threadedjobmixin.h, lang/qt/src/tofupolicyjob.h,
lang/qt/src/util.cpp, lang/qt/src/wkdlookupresult.cpp,
lang/qt/src/wkdlookupresult.h, lang/qt/src/wkdrefreshjob_p.h,
lang/qt/tests/run-decryptverifyarchivejob.cpp,
lang/qt/tests/run-decryptverifyjob.cpp,
lang/qt/tests/run-encryptarchivejob.cpp,
lang/qt/tests/run-encryptjob.cpp, lang/qt/tests/run-exportjob.cpp,
lang/qt/tests/run-importjob.cpp, lang/qt/tests/run-keyformailboxjob.cpp,
lang/qt/tests/run-receivekeysjob.cpp,
lang/qt/tests/run-refreshkeysjob.cpp,
lang/qt/tests/run-signarchivejob.cpp, lang/qt/tests/run-signjob.cpp,
lang/qt/tests/run-verifydetachedjob.cpp,
lang/qt/tests/run-verifyopaquejob.cpp,
lang/qt/tests/run-wkdrefreshjob.cpp,
lang/qt/tests/t-addexistingsubkey.cpp,
lang/qt/tests/t-changeexpiryjob.cpp, lang/qt/tests/t-config.cpp,
lang/qt/tests/t-decryptverify.cpp, lang/qt/tests/t-encrypt.cpp,
lang/qt/tests/t-import.cpp, lang/qt/tests/t-keylist.cpp,
lang/qt/tests/t-keylocate.cpp, lang/qt/tests/t-ownertrust.cpp,
lang/qt/tests/t-remarks.cpp, lang/qt/tests/t-revokekey.cpp,
lang/qt/tests/t-setprimaryuserid.cpp, lang/qt/tests/t-support.cpp,
lang/qt/tests/t-support.h, lang/qt/tests/t-tofuinfo.cpp,
lang/qt/tests/t-trustsignatures.cpp, lang/qt/tests/t-various.cpp,
lang/qt/tests/t-verify.cpp, lang/qt/tests/t-wkdlookup.cpp,
lang/qt/tests/t-wkspublish.cpp: Include GpgME++ headers with gpgme++/
prefix.
--
This prepares the Qt bindings for building them separately from the C++
bindings.
GnuPG-bug-id: 7110
2024-05-24 09:39:42 +00:00
|
|
|
#include <gpgme++/context.h>
|
|
|
|
#include <gpgme++/engineinfo.h>
|
2021-05-05 16:38:16 +00:00
|
|
|
#include "protocol.h"
|
|
|
|
#include "signkeyjob.h"
|
|
|
|
|
2022-10-11 08:23:36 +00:00
|
|
|
#include <QRegularExpression>
|
2021-05-05 16:38:16 +00:00
|
|
|
#include <QSignalSpy>
|
|
|
|
#include <QTemporaryDir>
|
|
|
|
#include <QTest>
|
|
|
|
|
|
|
|
using namespace QGpgME;
|
|
|
|
using namespace GpgME;
|
|
|
|
|
|
|
|
class TestTrustSignatures: public QGpgMETest
|
|
|
|
{
|
|
|
|
Q_OBJECT
|
|
|
|
|
|
|
|
private Q_SLOTS:
|
|
|
|
void test_tsign_single_uid_key_and_then_tsign_it_again()
|
|
|
|
{
|
|
|
|
Error err;
|
|
|
|
|
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY(ctx);
|
|
|
|
|
|
|
|
// Get the signing key (alfa@example.net)
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!seckey.isNull());
|
|
|
|
|
|
|
|
// Get the target key (victor@example.org)
|
|
|
|
auto target = ctx->key("E8143C489C8D41124DC40D0B47AF4B6961F04784", err, false);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!target.isNull());
|
|
|
|
QVERIFY(target.numUserIDs() > 0);
|
|
|
|
|
|
|
|
// Create first trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job.get());
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
|
|
|
|
|
|
|
|
connect(job.get(), &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 1u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.org>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create second trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job.get());
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setDupeOk(true);
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
|
|
|
|
|
|
|
|
connect(job.get(), &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
err = job->start(target);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 2u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.net>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void test_tsign_multi_uid_key_and_then_tsign_it_again()
|
|
|
|
{
|
|
|
|
Error err;
|
|
|
|
|
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY(ctx);
|
|
|
|
|
|
|
|
// Get the signing key (alfa@example.net)
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!seckey.isNull());
|
|
|
|
|
|
|
|
// Get the target key (Bob / Bravo Test)
|
|
|
|
auto target = ctx->key("D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2", err, false);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!target.isNull());
|
|
|
|
QVERIFY(target.numUserIDs() > 0);
|
|
|
|
|
|
|
|
// Create first trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 1u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.org>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create second trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setDupeOk(true);
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
err = job->start(target);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 2u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.net>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void test_tsign_first_uid_and_then_tsign_both_uids()
|
|
|
|
{
|
|
|
|
Error err;
|
|
|
|
|
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY(ctx);
|
|
|
|
|
|
|
|
// Get the signing key (alfa@example.net)
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!seckey.isNull());
|
|
|
|
|
|
|
|
// Get the target key (Mallory / Mike Test)
|
|
|
|
auto target = ctx->key("2686AA191A278013992C72EBBE794852BE5CF886", err, false);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!target.isNull());
|
|
|
|
QVERIFY(target.numUserIDs() > 0);
|
|
|
|
|
|
|
|
// Create first trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setUserIDsToSign({0});
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 1u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.org>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create second trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setDupeOk(true);
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
err = job->start(target);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 2u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.net>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void test_tsign_all_uids_and_then_tsign_first_uid()
|
|
|
|
{
|
|
|
|
Error err;
|
|
|
|
|
|
|
|
if (!loopbackSupported()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto ctx = Context::create(OpenPGP);
|
|
|
|
QVERIFY(ctx);
|
|
|
|
|
|
|
|
// Get the signing key (alfa@example.net)
|
|
|
|
auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!seckey.isNull());
|
|
|
|
|
|
|
|
// Get the target key (Echelon / Echo Test / Eve)
|
|
|
|
auto target = ctx->key("3531152DE293E26A07F504BC318C1FAEFAEF6D1B", err, false);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QVERIFY(!target.isNull());
|
|
|
|
QVERIFY(target.numUserIDs() > 0);
|
|
|
|
|
|
|
|
// Create first trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
job->start(target);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 1u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.org>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create second trust signature
|
|
|
|
{
|
|
|
|
// Create the job
|
|
|
|
auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
|
|
|
|
QVERIFY(job);
|
2022-01-13 11:40:35 +00:00
|
|
|
hookUpPassphraseProvider(job);
|
2021-05-05 16:38:16 +00:00
|
|
|
|
2023-10-13 07:18:54 +00:00
|
|
|
// Set up the job
|
2021-05-05 16:38:16 +00:00
|
|
|
job->setExportable(true);
|
|
|
|
job->setSigningKey(seckey);
|
|
|
|
job->setUserIDsToSign({0});
|
|
|
|
job->setDupeOk(true);
|
|
|
|
job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
|
|
|
|
|
|
|
|
connect(job, &SignKeyJob::result,
|
|
|
|
this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
|
|
|
|
Q_EMIT asyncDone();
|
|
|
|
if (err2) {
|
|
|
|
if (err2.code() == GPG_ERR_GENERAL) {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
|
|
|
|
"Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(err2.asString())));
|
|
|
|
} else {
|
|
|
|
QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(err2.asString())));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
err = job->start(target);
|
|
|
|
QVERIFY(!err);
|
|
|
|
QSignalSpy spy (this, SIGNAL(asyncDone()));
|
|
|
|
QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
|
|
|
|
|
|
|
|
// At this point the trust signature should have been added.
|
|
|
|
target.update();
|
|
|
|
const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
|
|
|
|
QVERIFY(trustSignature.isTrustSignature());
|
|
|
|
QCOMPARE(trustSignature.trustDepth(), 2u);
|
|
|
|
QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
|
|
|
|
QVERIFY(trustSignature.trustScope());
|
|
|
|
const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
|
|
|
|
QVERIFY(!trustScope.isEmpty());
|
2022-10-11 08:23:36 +00:00
|
|
|
const QRegularExpression regex{trustScope};
|
2021-05-05 16:38:16 +00:00
|
|
|
QVERIFY(regex.isValid());
|
2022-10-11 08:23:36 +00:00
|
|
|
QVERIFY(regex.match(QStringLiteral("Foo <foo@example.net>")).hasMatch());
|
2021-05-05 16:38:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void initTestCase()
|
|
|
|
{
|
|
|
|
QGpgMETest::initTestCase();
|
|
|
|
const QString gpgHome = qgetenv("GNUPGHOME");
|
|
|
|
QVERIFY(copyKeyrings(gpgHome, mDir.path()));
|
|
|
|
qputenv("GNUPGHOME", mDir.path().toUtf8());
|
|
|
|
QFile conf(mDir.path() + QStringLiteral("/gpg.conf"));
|
|
|
|
QVERIFY(conf.open(QIODevice::WriteOnly));
|
|
|
|
if (GpgME::engineInfo(GpgME::GpgEngine).engineVersion() >= "2.2.18") {
|
|
|
|
conf.write("allow-weak-key-signatures");
|
|
|
|
}
|
|
|
|
conf.close();
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
QTemporaryDir mDir;
|
|
|
|
};
|
|
|
|
|
|
|
|
QTEST_MAIN(TestTrustSignatures)
|
|
|
|
|
|
|
|
#include "t-trustsignatures.moc"
|