diff options
Diffstat (limited to 'lang/qt/tests/t-remarks.cpp')
-rw-r--r-- | lang/qt/tests/t-remarks.cpp | 321 |
1 files changed, 321 insertions, 0 deletions
diff --git a/lang/qt/tests/t-remarks.cpp b/lang/qt/tests/t-remarks.cpp new file mode 100644 index 00000000..91f98e88 --- /dev/null +++ b/lang/qt/tests/t-remarks.cpp @@ -0,0 +1,321 @@ +/* t-remarks.cpp + + This file is part of qgpgme, the Qt API binding for gpgme + Copyright (c) 2017 by Bundesamt für Sicherheit in der Informationstechnik + Software engineering by Intevation GmbH + + QGpgME is free software; you can redistribute it and/or + modify it under the terms of the GNU General Public License as + published by the Free Software Foundation; either version 2 of the + License, or (at your option) any later version. + + QGpgME is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + + In addition, as a special exception, the copyright holders give + permission to link the code of this program with any edition of + the Qt library by Trolltech AS, Norway (or with modified versions + of Qt that use the same license as Qt), and distribute linked + combinations including the two. You must obey the GNU General + Public License in all respects for all of the code used other than + Qt. If you modify this file, you may extend this exception to + your version of the file, but you are not obligated to do so. If + you do not wish to do so, delete this exception statement from + your version. +*/ + + +#ifdef HAVE_CONFIG_H + #include "config.h" +#endif + +#include <QDebug> +#include <QTest> +#include <QSignalSpy> +#include <QTemporaryDir> +#include "keylistjob.h" +#include "protocol.h" +#include "signkeyjob.h" +#include "context.h" + +#include "t-support.h" + +using namespace QGpgME; +using namespace GpgME; + +class TestRemarks: public QGpgMETest +{ + Q_OBJECT + +Q_SIGNALS: + void asyncDone(); + +public: + // This test is disabled (no slot) because the behavior + // is not clearly defined. Better to prevent that + // case in the UI + void testRemarkOwnKey() + { + // Get the signing key (alfa) + auto ctx = Context::create(OpenPGP); + QVERIFY (ctx); + Error err; + auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true); + QVERIFY (!seckey.isNull()); + QVERIFY (!err); + + // Create the job + auto job = openpgp()->signKeyJob(); + QVERIFY (job); + + // Hack in the passphrase provider + auto jobCtx = Job::context(job); + TestPassphraseProvider provider; + jobCtx->setPassphraseProvider(&provider); + jobCtx->setPinentryMode(Context::PinentryLoopback); + + // Setup the job + job->setExportable(false); + std::vector<unsigned int> uids; + uids.push_back(0); + job->setUserIDsToSign(uids); + job->setSigningKey(seckey); + job->setRemark(QStringLiteral("Just GNU it!")); + job->setDupeOk(true); + + connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, + const QString, + const GpgME::Error) { + Q_EMIT asyncDone(); + if (err2) { + qDebug() << "Error: " << err2.asString(); + } + QVERIFY(err2); + }); + + job->start(seckey); + QSignalSpy spy (this, SIGNAL(asyncDone())); + QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); + } + + +private Q_SLOTS: + + void testRemarkReplaceSingleUID() + { + // Get the signing key (alfa) + auto ctx = Context::create(OpenPGP); + QVERIFY (ctx); + Error err; + auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true); + QVERIFY (!seckey.isNull()); + QVERIFY (!err); + + // Get the target key (xray) + auto target = ctx->key("04C1DF62EFA0EBB00519B06A8979A6C5567FB34A", err, false); + QVERIFY (!target.isNull()); + QVERIFY (!err); + QVERIFY (target.numUserIDs()); + + // Create the job + auto job = openpgp()->signKeyJob(); + QVERIFY (job); + + // Hack in the passphrase provider + auto jobCtx = Job::context(job); + TestPassphraseProvider provider; + jobCtx->setPassphraseProvider(&provider); + jobCtx->setPinentryMode(Context::PinentryLoopback); + + // Setup the job + job->setExportable(false); + std::vector<unsigned int> uids; + uids.push_back(0); + job->setUserIDsToSign(uids); + job->setSigningKey(seckey); + job->setRemark(QStringLiteral("The quick brown fox jumps over the lazy dog")); + + connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, + const QString, + const GpgME::Error) { + Q_EMIT asyncDone(); + QVERIFY(!err2); + }); + + job->start(target); + QSignalSpy spy (this, SIGNAL(asyncDone())); + QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); + + // At this point the remark should have been added. + target.update(); + const char *remark = target.userID(0).remark(seckey, err); + QVERIFY(!err); + QVERIFY(remark); + QCOMPARE(QString::fromUtf8(remark), QStringLiteral("The quick brown fox " + "jumps over the lazy dog")); + + // Now replace the remark + auto job3 = openpgp()->signKeyJob(); + QVERIFY (job3); + + // Hack in the passphrase provider + auto jobCtx3 = Job::context(job3); + jobCtx3->setPassphraseProvider(&provider); + jobCtx3->setPinentryMode(Context::PinentryLoopback); + + // Setup the job + job3->setExportable(false); + job3->setUserIDsToSign(uids); + job3->setSigningKey(seckey); + job3->setDupeOk(true); + job3->setRemark(QStringLiteral("The quick brown fox jumps over Frodo")); + + connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, + const QString, + const GpgME::Error) { + Q_EMIT asyncDone(); + QVERIFY(!err2); + }); + + job3->start(target); + QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); + + target.update(); + remark = target.userID(0).remark(seckey, err); + QVERIFY(!err); + QVERIFY(remark); + QCOMPARE(QString::fromUtf8(remark), QStringLiteral("The quick brown fox " + "jumps over Frodo")); + } + + void testRemarkReplaceMultiUID() + { + // Get the signing key (alfa) + auto ctx = Context::create(OpenPGP); + QVERIFY (ctx); + Error err; + auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true); + QVERIFY (!seckey.isNull()); + QVERIFY (!err); + + // Get the target key (mallory / mike) + auto target = ctx->key("2686AA191A278013992C72EBBE794852BE5CF886", err, false); + QVERIFY (!target.isNull()); + QVERIFY (!err); + QVERIFY (target.numUserIDs()); + + // Create the job + auto job = openpgp()->signKeyJob(); + QVERIFY (job); + + // Hack in the passphrase provider + auto jobCtx = Job::context(job); + TestPassphraseProvider provider; + jobCtx->setPassphraseProvider(&provider); + jobCtx->setPinentryMode(Context::PinentryLoopback); + + // Setup the job + job->setExportable(false); + std::vector<unsigned int> uids; + uids.push_back(0); + job->setUserIDsToSign(uids); + job->setSigningKey(seckey); + job->setRemark(QStringLiteral("Mallory is evil 😠")); + + connect(job, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, + const QString, + const GpgME::Error) { + Q_EMIT asyncDone(); + QVERIFY(!err2); + }); + + job->start(target); + QSignalSpy spy (this, SIGNAL(asyncDone())); + QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); + + // At this point the remark should have been added. + target.update(); + const char *remark = target.userID(0).remark(seckey, err); + QVERIFY(!err); + QVERIFY(remark); + QCOMPARE(QString::fromUtf8(remark), QStringLiteral("Mallory is evil 😠")); + + // Try to replace it without dupeOK + auto job2 = openpgp()->signKeyJob(); + QVERIFY (job2); + + // Hack in the passphrase provider + auto jobCtx2 = Job::context(job2); + jobCtx2->setPassphraseProvider(&provider); + jobCtx2->setPinentryMode(Context::PinentryLoopback); + + // Setup the job + job2->setExportable(false); + job2->setUserIDsToSign(uids); + job2->setSigningKey(seckey); + job2->setRemark(QStringLiteral("Mallory is nice")); + + connect(job2, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, + const QString, + const GpgME::Error) { + Q_EMIT asyncDone(); + QVERIFY(err2); + }); + + job2->start(target); + QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); + + // Now replace the remark + auto job3 = openpgp()->signKeyJob(); + QVERIFY (job3); + + // Hack in the passphrase provider + auto jobCtx3 = Job::context(job3); + jobCtx3->setPassphraseProvider(&provider); + jobCtx3->setPinentryMode(Context::PinentryLoopback); + + // Setup the job + job3->setExportable(false); + job3->setUserIDsToSign(uids); + job3->setSigningKey(seckey); + job3->setDupeOk(true); + job3->setRemark(QStringLiteral("Mallory is nice")); + + connect(job3, &SignKeyJob::result, this, [this] (const GpgME::Error &err2, + const QString, + const GpgME::Error) { + Q_EMIT asyncDone(); + QVERIFY(!err2); + }); + + job3->start(target); + QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT)); + + target.update(); + remark = target.userID(0).remark(seckey, err); + QVERIFY(!err); + QVERIFY(remark); + QCOMPARE(QString::fromUtf8(remark), QStringLiteral("Mallory is nice")); + } + + void initTestCase() + { + QGpgMETest::initTestCase(); + const QString gpgHome = qgetenv("GNUPGHOME"); + QVERIFY(copyKeyrings(gpgHome, mDir.path())); + qputenv("GNUPGHOME", mDir.path().toUtf8()); + } + +private: + QTemporaryDir mDir; +}; + +QTEST_MAIN(TestRemarks) + +#include "t-remarks.moc" |