From f8733b9b2be66d0d8dd8a220ed972af8520192b4 Mon Sep 17 00:00:00 2001 From: saturneric Date: Tue, 26 Dec 2023 17:07:49 +0800 Subject: fix: add test cases and test file basical operations --- src/test/core/GpgCoreTestFileBasicOpera.cpp | 239 ++++++++++++++++++++++++++++ 1 file changed, 239 insertions(+) create mode 100644 src/test/core/GpgCoreTestFileBasicOpera.cpp (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp') diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp new file mode 100644 index 00000000..d07eae4f --- /dev/null +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -0,0 +1,239 @@ +/** + * Copyright (C) 2021 Saturneric + * + * This file is part of GpgFrontend. + * + * GpgFrontend is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * GpgFrontend is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GpgFrontend. If not, see . + * + * The initial version of the source code is inherited from + * the gpg4usb project, which is under GPL-3.0-or-later. + * + * All the source code of GpgFrontend was modified and released by + * Saturneric starting on May 12, 2021. + * + * SPDX-License-Identifier: GPL-3.0-or-later + * + */ + +#include "GpgCoreTest.h" +#include "core/GpgModel.h" +#include "core/function/basic/ChannelObject.h" +#include "core/function/gpg/GpgBasicOperator.h" +#include "core/function/gpg/GpgFileOpera.h" +#include "core/function/gpg/GpgKeyGetter.h" +#include "core/function/result_analyse/GpgDecryptResultAnalyse.h" +#include "core/model/GpgDecryptResult.h" +#include "core/model/GpgEncryptResult.h" +#include "core/model/GpgSignResult.h" +#include "core/model/GpgVerifyResult.h" +#include "core/utils/GpgUtils.h" +#include "core/utils/IOUtils.h" + +namespace GpgFrontend::Test { + +TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { + std::atomic_bool callback_called_flag{false}; + + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + + GpgFileOpera::EncryptFile( + {encrypt_key}, input_file, true, output_file, + [output_file, &callback_called_flag](GpgError err, + const DataObjectPtr& data_obj) { + ASSERT_TRUE((data_obj->Check())); + + auto result = ExtractParams(data_obj, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + GpgFileOpera::DecryptFile( + output_file, decrpypt_output_file, + [decrpypt_output_file, &callback_called_flag]( + GpgError err, const DataObjectPtr& data_obj) { + auto d_result = ExtractParams(data_obj, 0); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_FALSE(d_result.Recipients().empty()); + ASSERT_EQ(d_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + + const auto [read_success, buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, GFBuffer("Hello GpgFrontend!")); + + // stop waiting + callback_called_flag = true; + }); + }); + + int retry_count = 1000; + while (!callback_called_flag && retry_count-- > 0) { + std::this_thread::sleep_for(std::chrono::milliseconds(10)); + } + + ASSERT_TRUE(callback_called_flag); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { + std::atomic_bool callback_called_flag{false}; + + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + + GpgFileOpera::EncryptFileSymmetric( + input_file, true, output_file, + [&callback_called_flag, output_file](GpgError err, + const DataObjectPtr& data_obj) { + ASSERT_TRUE((data_obj->Check())); + auto result = ExtractParams(data_obj, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + GpgFileOpera::DecryptFile( + output_file, decrpypt_output_file, + [&callback_called_flag, decrpypt_output_file]( + GpgError err, const DataObjectPtr& data_obj) { + ASSERT_TRUE((data_obj->Check())); + + auto decrypt_result = + ExtractParams(data_obj, 0); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE(decrypt_result.Recipients().empty()); + + const auto [read_success, buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, GFBuffer("Hello GpgFrontend!")); + + // stop waiting + callback_called_flag = true; + }); + }); + + int retry_count = 1000; + while (!callback_called_flag && retry_count-- > 0) { + std::this_thread::sleep_for(std::chrono::milliseconds(10)); + } + + ASSERT_TRUE(callback_called_flag); +} + +TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { + std::atomic_bool callback_called_flag{false}; + + auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + + GpgFileOpera::SignFile( + {sign_key}, input_file, true, output_file, + [&callback_called_flag, input_file, output_file]( + GpgError err, const DataObjectPtr& data_obj) { + ASSERT_TRUE((data_obj->Check())); + auto result = ExtractParams(data_obj, 0); + ASSERT_TRUE(result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + GpgFileOpera::VerifyFile( + input_file, output_file, + [&callback_called_flag](GpgError err, + const DataObjectPtr& data_obj) { + auto d_result = ExtractParams(data_obj, 0); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_FALSE(d_result.GetSignature().empty()); + ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + + // stop waiting + callback_called_flag = true; + }); + }); + + int retry_count = 1000; + while (!callback_called_flag && retry_count-- > 0) { + std::this_thread::sleep_for(std::chrono::milliseconds(10)); + } + + ASSERT_TRUE(callback_called_flag); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { + std::atomic_bool callback_called_flag{false}; + + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto sign_key = GpgKeyGetter::GetInstance().GetKey( + "8933EB283A18995F45D61DAC021D89771B680FFB"); + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + + ASSERT_TRUE(sign_key.IsPrivateKey()); + ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); + + GpgFileOpera::EncryptSignFile( + {encrypt_key}, {sign_key}, input_file, true, output_file, + [&callback_called_flag, output_file](GpgError err, + const DataObjectPtr& data_obj) { + ASSERT_TRUE((data_obj->Check())); + auto encr_result = ExtractParams(data_obj, 0); + auto sign_result = ExtractParams(data_obj, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + GpgFileOpera::DecryptVerifyFile( + output_file, decrpypt_output_file, + [&callback_called_flag, decrpypt_output_file]( + GpgError err, const DataObjectPtr& data_obj) { + ASSERT_TRUE( + (data_obj->Check())); + auto decrypt_result = + ExtractParams(data_obj, 0); + auto verify_reult = ExtractParams(data_obj, 1); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, + "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); + + const auto [read_success, buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, GFBuffer("Hello GpgFrontend!")); + + // stop waiting + callback_called_flag = true; + }); + }); + + int retry_count = 1000; + while (!callback_called_flag && retry_count-- > 0) { + std::this_thread::sleep_for(std::chrono::milliseconds(10)); + } + + ASSERT_TRUE(callback_called_flag); +} + +} // namespace GpgFrontend::Test -- cgit v1.2.3 From 566d5e41a34e08b06a5c84fd4ad9f944b6b31feb Mon Sep 17 00:00:00 2001 From: saturneric Date: Wed, 27 Dec 2023 11:20:11 +0800 Subject: feat: avoid reading entire file to memory --- src/test/core/GpgCoreTestFileBasicOpera.cpp | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp') diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp index d07eae4f..029ff6fc 100644 --- a/src/test/core/GpgCoreTestFileBasicOpera.cpp +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -50,7 +50,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); auto output_file = GetTempFilePath(); - GpgFileOpera::EncryptFile( + GpgFileOpera::GetInstance().EncryptFile( {encrypt_key}, input_file, true, output_file, [output_file, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { @@ -61,7 +61,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::DecryptFile( + GpgFileOpera::GetInstance().DecryptFile( output_file, decrpypt_output_file, [decrpypt_output_file, &callback_called_flag]( GpgError err, const DataObjectPtr& data_obj) { @@ -95,7 +95,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); auto output_file = GetTempFilePath(); - GpgFileOpera::EncryptFileSymmetric( + GpgFileOpera::GetInstance().EncryptFileSymmetric( input_file, true, output_file, [&callback_called_flag, output_file](GpgError err, const DataObjectPtr& data_obj) { @@ -105,7 +105,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::DecryptFile( + GpgFileOpera::GetInstance().DecryptFile( output_file, decrpypt_output_file, [&callback_called_flag, decrpypt_output_file]( GpgError err, const DataObjectPtr& data_obj) { @@ -142,7 +142,7 @@ TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); auto output_file = GetTempFilePath(); - GpgFileOpera::SignFile( + GpgFileOpera::GetInstance().SignFile( {sign_key}, input_file, true, output_file, [&callback_called_flag, input_file, output_file]( GpgError err, const DataObjectPtr& data_obj) { @@ -151,7 +151,7 @@ TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { ASSERT_TRUE(result.InvalidSigners().empty()); ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - GpgFileOpera::VerifyFile( + GpgFileOpera::GetInstance().VerifyFile( input_file, output_file, [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { @@ -187,7 +187,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { ASSERT_TRUE(sign_key.IsPrivateKey()); ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); - GpgFileOpera::EncryptSignFile( + GpgFileOpera::GetInstance().EncryptSignFile( {encrypt_key}, {sign_key}, input_file, true, output_file, [&callback_called_flag, output_file](GpgError err, const DataObjectPtr& data_obj) { @@ -199,7 +199,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::DecryptVerifyFile( + GpgFileOpera::GetInstance().DecryptVerifyFile( output_file, decrpypt_output_file, [&callback_called_flag, decrpypt_output_file]( GpgError err, const DataObjectPtr& data_obj) { -- cgit v1.2.3 From bf538056b24a68b8fd235b1c50991ee8eb46a776 Mon Sep 17 00:00:00 2001 From: saturneric Date: Fri, 12 Jan 2024 14:02:37 +0800 Subject: refactor: use QString instead of std::string and improve threading system --- src/test/core/GpgCoreTestFileBasicOpera.cpp | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp') diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp index 029ff6fc..e409570f 100644 --- a/src/test/core/GpgCoreTestFileBasicOpera.cpp +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -51,7 +51,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { auto output_file = GetTempFilePath(); GpgFileOpera::GetInstance().EncryptFile( - {encrypt_key}, input_file, true, output_file, + {encrypt_key}, input_file.toStdString(), true, output_file.toStdString(), [output_file, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -62,7 +62,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { auto decrpypt_output_file = GetTempFilePath(); GpgFileOpera::GetInstance().DecryptFile( - output_file, decrpypt_output_file, + output_file.toStdString(), decrpypt_output_file.toStdString(), [decrpypt_output_file, &callback_called_flag]( GpgError err, const DataObjectPtr& data_obj) { auto d_result = ExtractParams(data_obj, 0); @@ -96,7 +96,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { auto output_file = GetTempFilePath(); GpgFileOpera::GetInstance().EncryptFileSymmetric( - input_file, true, output_file, + input_file.toStdString(), true, output_file.toStdString(), [&callback_called_flag, output_file](GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -106,7 +106,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { auto decrpypt_output_file = GetTempFilePath(); GpgFileOpera::GetInstance().DecryptFile( - output_file, decrpypt_output_file, + output_file.toStdString(), decrpypt_output_file.toStdString(), [&callback_called_flag, decrpypt_output_file]( GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -143,7 +143,7 @@ TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { auto output_file = GetTempFilePath(); GpgFileOpera::GetInstance().SignFile( - {sign_key}, input_file, true, output_file, + {sign_key}, input_file.toStdString(), true, output_file.toStdString(), [&callback_called_flag, input_file, output_file]( GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -152,7 +152,7 @@ TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); GpgFileOpera::GetInstance().VerifyFile( - input_file, output_file, + input_file.toStdString(), output_file.toStdString(), [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { auto d_result = ExtractParams(data_obj, 0); @@ -188,7 +188,8 @@ TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); GpgFileOpera::GetInstance().EncryptSignFile( - {encrypt_key}, {sign_key}, input_file, true, output_file, + {encrypt_key}, {sign_key}, input_file.toStdString(), true, + output_file.toStdString(), [&callback_called_flag, output_file](GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -200,7 +201,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { auto decrpypt_output_file = GetTempFilePath(); GpgFileOpera::GetInstance().DecryptVerifyFile( - output_file, decrpypt_output_file, + output_file.toStdString(), decrpypt_output_file.toStdString(), [&callback_called_flag, decrpypt_output_file]( GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE( -- cgit v1.2.3 From 6983b5c1dd82d159236ebd06cf17f071cc9c1ee9 Mon Sep 17 00:00:00 2001 From: saturneric Date: Fri, 12 Jan 2024 23:08:38 +0800 Subject: refactor: remove boost and use QString instead of std::filesystem::path --- src/test/core/GpgCoreTestFileBasicOpera.cpp | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp') diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp index e409570f..029ff6fc 100644 --- a/src/test/core/GpgCoreTestFileBasicOpera.cpp +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -51,7 +51,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { auto output_file = GetTempFilePath(); GpgFileOpera::GetInstance().EncryptFile( - {encrypt_key}, input_file.toStdString(), true, output_file.toStdString(), + {encrypt_key}, input_file, true, output_file, [output_file, &callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -62,7 +62,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { auto decrpypt_output_file = GetTempFilePath(); GpgFileOpera::GetInstance().DecryptFile( - output_file.toStdString(), decrpypt_output_file.toStdString(), + output_file, decrpypt_output_file, [decrpypt_output_file, &callback_called_flag]( GpgError err, const DataObjectPtr& data_obj) { auto d_result = ExtractParams(data_obj, 0); @@ -96,7 +96,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { auto output_file = GetTempFilePath(); GpgFileOpera::GetInstance().EncryptFileSymmetric( - input_file.toStdString(), true, output_file.toStdString(), + input_file, true, output_file, [&callback_called_flag, output_file](GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -106,7 +106,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { auto decrpypt_output_file = GetTempFilePath(); GpgFileOpera::GetInstance().DecryptFile( - output_file.toStdString(), decrpypt_output_file.toStdString(), + output_file, decrpypt_output_file, [&callback_called_flag, decrpypt_output_file]( GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -143,7 +143,7 @@ TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { auto output_file = GetTempFilePath(); GpgFileOpera::GetInstance().SignFile( - {sign_key}, input_file.toStdString(), true, output_file.toStdString(), + {sign_key}, input_file, true, output_file, [&callback_called_flag, input_file, output_file]( GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -152,7 +152,7 @@ TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); GpgFileOpera::GetInstance().VerifyFile( - input_file.toStdString(), output_file.toStdString(), + input_file, output_file, [&callback_called_flag](GpgError err, const DataObjectPtr& data_obj) { auto d_result = ExtractParams(data_obj, 0); @@ -188,8 +188,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); GpgFileOpera::GetInstance().EncryptSignFile( - {encrypt_key}, {sign_key}, input_file.toStdString(), true, - output_file.toStdString(), + {encrypt_key}, {sign_key}, input_file, true, output_file, [&callback_called_flag, output_file](GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE((data_obj->Check())); @@ -201,7 +200,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { auto decrpypt_output_file = GetTempFilePath(); GpgFileOpera::GetInstance().DecryptVerifyFile( - output_file.toStdString(), decrpypt_output_file.toStdString(), + output_file, decrpypt_output_file, [&callback_called_flag, decrpypt_output_file]( GpgError err, const DataObjectPtr& data_obj) { ASSERT_TRUE( -- cgit v1.2.3 From 37848811b6c8ca6c2a707431ec077c8098918afe Mon Sep 17 00:00:00 2001 From: saturneric Date: Thu, 18 Jan 2024 00:14:13 +0800 Subject: fix: improve code quality, docs and ci files --- src/test/core/GpgCoreTestFileBasicOpera.cpp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp') diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp index 029ff6fc..d5b0f52d 100644 --- a/src/test/core/GpgCoreTestFileBasicOpera.cpp +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -74,7 +74,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { const auto [read_success, buffer] = ReadFileGFBuffer(decrpypt_output_file); ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer("Hello GpgFrontend!")); + ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); // stop waiting callback_called_flag = true; @@ -119,7 +119,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { const auto [read_success, buffer] = ReadFileGFBuffer(decrpypt_output_file); ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer("Hello GpgFrontend!")); + ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); // stop waiting callback_called_flag = true; @@ -221,7 +221,7 @@ TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { const auto [read_success, buffer] = ReadFileGFBuffer(decrpypt_output_file); ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer("Hello GpgFrontend!")); + ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); // stop waiting callback_called_flag = true; -- cgit v1.2.3 From e0d2c4021483e6e1366c1050ccb5a30e53e172bb Mon Sep 17 00:00:00 2001 From: saturneric Date: Thu, 18 Jan 2024 20:58:37 +0800 Subject: fix: add test cases and solve discovered issues --- src/test/core/GpgCoreTestFileBasicOpera.cpp | 386 ++++++++++++++++------------ 1 file changed, 225 insertions(+), 161 deletions(-) (limited to 'src/test/core/GpgCoreTestFileBasicOpera.cpp') diff --git a/src/test/core/GpgCoreTestFileBasicOpera.cpp b/src/test/core/GpgCoreTestFileBasicOpera.cpp index d5b0f52d..db338893 100644 --- a/src/test/core/GpgCoreTestFileBasicOpera.cpp +++ b/src/test/core/GpgCoreTestFileBasicOpera.cpp @@ -28,11 +28,8 @@ #include "GpgCoreTest.h" #include "core/GpgModel.h" -#include "core/function/basic/ChannelObject.h" -#include "core/function/gpg/GpgBasicOperator.h" #include "core/function/gpg/GpgFileOpera.h" #include "core/function/gpg/GpgKeyGetter.h" -#include "core/function/result_analyse/GpgDecryptResultAnalyse.h" #include "core/model/GpgDecryptResult.h" #include "core/model/GpgEncryptResult.h" #include "core/model/GpgSignResult.h" @@ -43,197 +40,264 @@ namespace GpgFrontend::Test { TEST_F(GpgCoreTest, CoreFileEncryptDecrTest) { - std::atomic_bool callback_called_flag{false}; + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); + + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync( + {encrypt_key}, input_file, true, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check())); + auto result = ExtractParams(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + auto decr_result = ExtractParams(data_object_0, 0); + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptDecrBinaryTest) { auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( "E87C6A2D8D95C818DE93B3AE6A2764F8298DEB29"); - auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); auto output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().EncryptFile( - {encrypt_key}, input_file, true, output_file, - [output_file, &callback_called_flag](GpgError err, - const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check())); - - auto result = ExtractParams(data_obj, 0); - ASSERT_TRUE(result.InvalidRecipients().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().DecryptFile( - output_file, decrpypt_output_file, - [decrpypt_output_file, &callback_called_flag]( - GpgError err, const DataObjectPtr& data_obj) { - auto d_result = ExtractParams(data_obj, 0); - - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(d_result.Recipients().empty()); - ASSERT_EQ(d_result.Recipients()[0].keyid, "6A2764F8298DEB29"); - - const auto [read_success, buffer] = - ReadFileGFBuffer(decrpypt_output_file); - ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptFileSync( + {encrypt_key}, input_file, false, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check())); + auto result = ExtractParams(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check())); + auto decr_result = ExtractParams(data_object_0, 0); + ASSERT_FALSE(decr_result.Recipients().empty()); + ASSERT_EQ(decr_result.Recipients()[0].keyid, "6A2764F8298DEB29"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); } TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrTest) { - std::atomic_bool callback_called_flag{false}; + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); - auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto [err, data_object] = + GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, true, + output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check())); + auto result = ExtractParams(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_TRUE((data_object_0->Check())); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + auto decrypt_result = ExtractParams(data_object_0, 0); + ASSERT_TRUE(decrypt_result.Recipients().empty()); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSymmetricDecrBinaryTest) { + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); auto output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().EncryptFileSymmetric( - input_file, true, output_file, - [&callback_called_flag, output_file](GpgError err, - const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check())); - auto result = ExtractParams(data_obj, 0); - ASSERT_TRUE(result.InvalidRecipients().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().DecryptFile( - output_file, decrpypt_output_file, - [&callback_called_flag, decrpypt_output_file]( - GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check())); - - auto decrypt_result = - ExtractParams(data_obj, 0); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_TRUE(decrypt_result.Recipients().empty()); - - const auto [read_success, buffer] = - ReadFileGFBuffer(decrpypt_output_file); - ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = + GpgFileOpera::GetInstance().EncryptFileSymmetricSync(input_file, false, + output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check())); + auto result = ExtractParams(data_object, 0); + ASSERT_TRUE(result.InvalidRecipients().empty()); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = GpgFileOpera::GetInstance().DecryptFileSync( + output_file, decrpypt_output_file); + + ASSERT_TRUE((data_object_0->Check())); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + auto decrypt_result = ExtractParams(data_object_0, 0); + ASSERT_TRUE(decrypt_result.Recipients().empty()); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); } TEST_F(GpgCoreTest, CoreFileSignVerifyNormalTest) { - std::atomic_bool callback_called_flag{false}; + auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto output_file = GetTempFilePath(); + auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync( + {sign_key}, input_file, true, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check())); + auto result = ExtractParams(data_object, 0); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check())); + auto verify_result = ExtractParams(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); +} + +TEST_F(GpgCoreTest, CoreFileSignVerifyNormalBinaryTest) { auto sign_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); auto output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().SignFile( - {sign_key}, input_file, true, output_file, - [&callback_called_flag, input_file, output_file]( - GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check())); - auto result = ExtractParams(data_obj, 0); - ASSERT_TRUE(result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - GpgFileOpera::GetInstance().VerifyFile( - input_file, output_file, - [&callback_called_flag](GpgError err, - const DataObjectPtr& data_obj) { - auto d_result = ExtractParams(data_obj, 0); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - ASSERT_FALSE(d_result.GetSignature().empty()); - ASSERT_EQ(d_result.GetSignature().at(0).GetFingerprint(), - "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgFileOpera::GetInstance().SignFileSync( + {sign_key}, input_file, false, output_file); + + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object->Check())); + auto result = ExtractParams(data_object, 0); + ASSERT_TRUE(result.InvalidSigners().empty()); + + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().VerifyFileSync(input_file, output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check())); + auto verify_result = ExtractParams(data_object_0, 0); + ASSERT_FALSE(verify_result.GetSignature().empty()); + ASSERT_EQ(verify_result.GetSignature().at(0).GetFingerprint(), + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); } TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyTest) { - std::atomic_bool callback_called_flag{false}; + auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( + "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); + auto sign_key = GpgKeyGetter::GetInstance().GetKey( + "8933EB283A18995F45D61DAC021D89771B680FFB"); + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); + auto output_file = GetTempFilePath(); + ASSERT_TRUE(sign_key.IsPrivateKey()); + ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); + + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync( + {encrypt_key}, {sign_key}, input_file, true, output_file); + + ASSERT_TRUE((data_object->Check())); + auto encr_result = ExtractParams(data_object, 0); + auto sign_result = ExtractParams(data_object, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file, + decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check())); + auto decrypt_result = ExtractParams(data_object_0, 0); + auto verify_reult = ExtractParams(data_object_0, 1); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); +} + +TEST_F(GpgCoreTest, CoreFileEncryptSignDecrVerifyBinaryTest) { auto encrypt_key = GpgKeyGetter::GetInstance().GetPubkey( "467F14220CE8DCF780CF4BAD8465C55B25C9B7D1"); auto sign_key = GpgKeyGetter::GetInstance().GetKey( "8933EB283A18995F45D61DAC021D89771B680FFB"); - auto input_file = CreateTempFileAndWriteData("Hello GpgFrontend!"); + auto buffer = GFBuffer(QString("Hello GpgFrontend!")); + auto input_file = CreateTempFileAndWriteData(buffer); auto output_file = GetTempFilePath(); ASSERT_TRUE(sign_key.IsPrivateKey()); ASSERT_TRUE(sign_key.IsHasActualSigningCapability()); - GpgFileOpera::GetInstance().EncryptSignFile( - {encrypt_key}, {sign_key}, input_file, true, output_file, - [&callback_called_flag, output_file](GpgError err, - const DataObjectPtr& data_obj) { - ASSERT_TRUE((data_obj->Check())); - auto encr_result = ExtractParams(data_obj, 0); - auto sign_result = ExtractParams(data_obj, 1); - ASSERT_TRUE(encr_result.InvalidRecipients().empty()); - ASSERT_TRUE(sign_result.InvalidSigners().empty()); - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - auto decrpypt_output_file = GetTempFilePath(); - GpgFileOpera::GetInstance().DecryptVerifyFile( - output_file, decrpypt_output_file, - [&callback_called_flag, decrpypt_output_file]( - GpgError err, const DataObjectPtr& data_obj) { - ASSERT_TRUE( - (data_obj->Check())); - auto decrypt_result = - ExtractParams(data_obj, 0); - auto verify_reult = ExtractParams(data_obj, 1); - - ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); - - ASSERT_FALSE(decrypt_result.Recipients().empty()); - ASSERT_EQ(decrypt_result.Recipients()[0].keyid, - "F89C95A05088CC93"); - ASSERT_FALSE(verify_reult.GetSignature().empty()); - ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), - "8933EB283A18995F45D61DAC021D89771B680FFB"); - - const auto [read_success, buffer] = - ReadFileGFBuffer(decrpypt_output_file); - ASSERT_TRUE(read_success); - ASSERT_EQ(buffer, GFBuffer(QString("Hello GpgFrontend!"))); - - // stop waiting - callback_called_flag = true; - }); - }); - - int retry_count = 1000; - while (!callback_called_flag && retry_count-- > 0) { - std::this_thread::sleep_for(std::chrono::milliseconds(10)); - } - - ASSERT_TRUE(callback_called_flag); + auto [err, data_object] = GpgFileOpera::GetInstance().EncryptSignFileSync( + {encrypt_key}, {sign_key}, input_file, false, output_file); + + ASSERT_TRUE((data_object->Check())); + auto encr_result = ExtractParams(data_object, 0); + auto sign_result = ExtractParams(data_object, 1); + ASSERT_TRUE(encr_result.InvalidRecipients().empty()); + ASSERT_TRUE(sign_result.InvalidSigners().empty()); + ASSERT_EQ(CheckGpgError(err), GPG_ERR_NO_ERROR); + + auto decrpypt_output_file = GetTempFilePath(); + auto [err_0, data_object_0] = + GpgFileOpera::GetInstance().DecryptVerifyFileSync(output_file, + decrpypt_output_file); + + ASSERT_EQ(CheckGpgError(err_0), GPG_ERR_NO_ERROR); + ASSERT_TRUE((data_object_0->Check())); + auto decrypt_result = ExtractParams(data_object_0, 0); + auto verify_reult = ExtractParams(data_object_0, 1); + + ASSERT_FALSE(decrypt_result.Recipients().empty()); + ASSERT_EQ(decrypt_result.Recipients()[0].keyid, "F89C95A05088CC93"); + ASSERT_FALSE(verify_reult.GetSignature().empty()); + ASSERT_EQ(verify_reult.GetSignature().at(0).GetFingerprint(), + "8933EB283A18995F45D61DAC021D89771B680FFB"); + + const auto [read_success, out_buffer] = + ReadFileGFBuffer(decrpypt_output_file); + ASSERT_TRUE(read_success); + ASSERT_EQ(buffer, out_buffer); } } // namespace GpgFrontend::Test -- cgit v1.2.3