aboutsummaryrefslogtreecommitdiffstats
path: root/lang/qt/tests/t-trustsignatures.cpp
diff options
context:
space:
mode:
authorIngo Klöcker <[email protected]>2025-02-03 09:49:25 +0000
committerIngo Klöcker <[email protected]>2025-02-03 09:55:40 +0000
commit763d5f5d6a88ec938b8678ab597e1404af724553 (patch)
tree7f3791e3560bd3a51470494bf965b9f9a40a87bd /lang/qt/tests/t-trustsignatures.cpp
parentbuild: Fix generation of ChangeLog on secondary working trees (diff)
downloadgpgme-763d5f5d6a88ec938b8678ab597e1404af724553.tar.gz
gpgme-763d5f5d6a88ec938b8678ab597e1404af724553.zip
cpp,qt: Remove C++ and Qt bindings
* README: Update. * configure.ac: Remove checks, variables and file generations related to the C++/Qt bindings. Remove cpp and qt* from available_languages and default_languages. * lang/Makefile.am (DIST_SUBDIRS): Remove cpp and qt. * lang/cpp, lang/qt: Remove. * m4/ax_check_compile_flag.m4, m4/ax_cxx_compile_stdcxx.m4, m4/ax_gcc_func_attribute.m4, m4/pkg.m4, m4/qt5.m4, m4/qt6.m4: Remove. -- The C++ and Qt bindings have been moved to separate Git repositories: gpgmepp and gpgmeqt. GnuPG-bug-id: 7262
Diffstat (limited to 'lang/qt/tests/t-trustsignatures.cpp')
-rw-r--r--lang/qt/tests/t-trustsignatures.cpp524
1 files changed, 0 insertions, 524 deletions
diff --git a/lang/qt/tests/t-trustsignatures.cpp b/lang/qt/tests/t-trustsignatures.cpp
deleted file mode 100644
index 6d575dff..00000000
--- a/lang/qt/tests/t-trustsignatures.cpp
+++ /dev/null
@@ -1,524 +0,0 @@
-/* t-trustsignatures.cpp
-
- This file is part of qgpgme, the Qt API binding for gpgme
- Copyright (c) 2021 g10 Code GmbH
- Software engineering by Ingo Klöcker <[email protected]>
-
- QGpgME is free software; you can redistribute it and/or
- modify it under the terms of the GNU General Public License as
- published by the Free Software Foundation; either version 2 of the
- License, or (at your option) any later version.
-
- QGpgME is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program; if not, write to the Free Software
- Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
-
- In addition, as a special exception, the copyright holders give
- permission to link the code of this program with any edition of
- the Qt library by Trolltech AS, Norway (or with modified versions
- of Qt that use the same license as Qt), and distribute linked
- combinations including the two. You must obey the GNU General
- Public License in all respects for all of the code used other than
- Qt. If you modify this file, you may extend this exception to
- your version of the file, but you are not obligated to do so. If
- you do not wish to do so, delete this exception statement from
- your version.
-*/
-
-#ifdef HAVE_CONFIG_H
- #include "config.h"
-#endif
-
-#include "t-support.h"
-
-#include <gpgme++/context.h>
-#include <gpgme++/engineinfo.h>
-#include "protocol.h"
-#include "signkeyjob.h"
-#include "util.h"
-
-#include <QRegularExpression>
-#include <QSignalSpy>
-#include <QTemporaryDir>
-#include <QTest>
-
-using namespace QGpgME;
-using namespace GpgME;
-
-class TestTrustSignatures: public QGpgMETest
-{
- Q_OBJECT
-
-private Q_SLOTS:
- void test_tsign_single_uid_key_and_then_tsign_it_again()
- {
- Error err;
-
- if (!loopbackSupported()) {
- return;
- }
-
- auto ctx = Context::create(OpenPGP);
- QVERIFY(ctx);
-
- // Get the signing key ([email protected])
- auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
- QVERIFY(!err);
- QVERIFY(!seckey.isNull());
-
- // Get the target key ([email protected])
- auto target = ctx->key("E8143C489C8D41124DC40D0B47AF4B6961F04784", err, false);
- QVERIFY(!err);
- QVERIFY(!target.isNull());
- QVERIFY(target.numUserIDs() > 0);
-
- // Create first trust signature
- {
- // Create the job
- auto job = std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job.get());
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
-
- connect(job.get(), &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- job->start(target);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 1u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
-
- // Create second trust signature
- {
- // Create the job
- auto job = std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job.get());
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setDupeOk(true);
- job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
-
- connect(job.get(), &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- err = job->start(target);
- QVERIFY(!err);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 2u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
- }
-
- void test_tsign_multi_uid_key_and_then_tsign_it_again()
- {
- Error err;
-
- if (!loopbackSupported()) {
- return;
- }
-
- auto ctx = Context::create(OpenPGP);
- QVERIFY(ctx);
-
- // Get the signing key ([email protected])
- auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
- QVERIFY(!err);
- QVERIFY(!seckey.isNull());
-
- // Get the target key (Bob / Bravo Test)
- auto target = ctx->key("D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2", err, false);
- QVERIFY(!err);
- QVERIFY(!target.isNull());
- QVERIFY(target.numUserIDs() > 0);
-
- // Create first trust signature
- {
- // Create the job
- auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job);
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
-
- connect(job, &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- job->start(target);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 1u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
-
- // Create second trust signature
- {
- // Create the job
- auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job);
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setDupeOk(true);
- job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
-
- connect(job, &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- err = job->start(target);
- QVERIFY(!err);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 2u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
- }
-
- void test_tsign_first_uid_and_then_tsign_both_uids()
- {
- Error err;
-
- if (!loopbackSupported()) {
- return;
- }
-
- auto ctx = Context::create(OpenPGP);
- QVERIFY(ctx);
-
- // Get the signing key ([email protected])
- auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
- QVERIFY(!err);
- QVERIFY(!seckey.isNull());
-
- // Get the target key (Mallory / Mike Test)
- auto target = ctx->key("2686AA191A278013992C72EBBE794852BE5CF886", err, false);
- QVERIFY(!err);
- QVERIFY(!target.isNull());
- QVERIFY(target.numUserIDs() > 0);
-
- // Create first trust signature
- {
- // Create the job
- auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job);
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setUserIDsToSign({0});
- job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
-
- connect(job, &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- job->start(target);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 1u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
-
- // Create second trust signature
- {
- // Create the job
- auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job);
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setDupeOk(true);
- job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
-
- connect(job, &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- err = job->start(target);
- QVERIFY(!err);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 2u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
- }
-
- void test_tsign_all_uids_and_then_tsign_first_uid()
- {
- Error err;
-
- if (!loopbackSupported()) {
- return;
- }
-
- auto ctx = Context::create(OpenPGP);
- QVERIFY(ctx);
-
- // Get the signing key ([email protected])
- auto seckey = ctx->key("A0FF4590BB6122EDEF6E3C542D727CC768697734", err, true);
- QVERIFY(!err);
- QVERIFY(!seckey.isNull());
-
- // Get the target key (Echelon / Echo Test / Eve)
- auto target = ctx->key("3531152DE293E26A07F504BC318C1FAEFAEF6D1B", err, false);
- QVERIFY(!err);
- QVERIFY(!target.isNull());
- QVERIFY(target.numUserIDs() > 0);
-
- // Create first trust signature
- {
- // Create the job
- auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job);
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setTrustSignature(TrustSignatureTrust::Complete, 1, QStringLiteral("example.org"));
-
- connect(job, &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- job->start(target);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 1u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Complete);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
-
- // Create second trust signature
- {
- // Create the job
- auto job = openpgp()->signKeyJob();//std::unique_ptr<SignKeyJob>{openpgp()->signKeyJob()};
- QVERIFY(job);
- hookUpPassphraseProvider(job);
-
- // Set up the job
- job->setExportable(true);
- job->setSigningKey(seckey);
- job->setUserIDsToSign({0});
- job->setDupeOk(true);
- job->setTrustSignature(TrustSignatureTrust::Partial, 2, QStringLiteral("example.net"));
-
- connect(job, &SignKeyJob::result,
- this, [this] (const GpgME::Error &err2, const QString &, const GpgME::Error &) {
- Q_EMIT asyncDone();
- if (err2) {
- if (err2.code() == GPG_ERR_GENERAL) {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.\n"
- "Hint: Run with GPGMEPP_INTERACTOR_DEBUG=stderr to debug the edit interaction.").arg(errorAsString(err2))));
- } else {
- QFAIL(qPrintable(QString("The SignKeyJob failed with '%1'.").arg(errorAsString(err2))));
- }
- }
- });
-
- err = job->start(target);
- QVERIFY(!err);
- QSignalSpy spy (this, SIGNAL(asyncDone()));
- QVERIFY(spy.wait(QSIGNALSPY_TIMEOUT));
-
- // At this point the trust signature should have been added.
- target.update();
- const auto trustSignature = target.userID(0).signature(target.userID(0).numSignatures() - 1);
- QVERIFY(trustSignature.isTrustSignature());
- QCOMPARE(trustSignature.trustDepth(), 2u);
- QCOMPARE(trustSignature.trustValue(), TrustSignatureTrust::Partial);
- QVERIFY(trustSignature.trustScope());
- const auto trustScope = QString::fromUtf8(trustSignature.trustScope());
- QVERIFY(!trustScope.isEmpty());
- const QRegularExpression regex{trustScope};
- QVERIFY(regex.isValid());
- QVERIFY(regex.match(QStringLiteral("Foo <[email protected]>")).hasMatch());
- }
- }
-
- void initTestCase()
- {
- QGpgMETest::initTestCase();
- const QString gpgHome = qgetenv("GNUPGHOME");
- QVERIFY(copyKeyrings(gpgHome, mDir.path()));
- qputenv("GNUPGHOME", mDir.path().toUtf8());
- QFile conf(mDir.path() + QStringLiteral("/gpg.conf"));
- QVERIFY(conf.open(QIODevice::WriteOnly));
- if (GpgME::engineInfo(GpgME::GpgEngine).engineVersion() >= "2.2.18") {
- conf.write("allow-weak-key-signatures");
- }
- conf.close();
- }
-
-private:
- QTemporaryDir mDir;
-};
-
-QTEST_MAIN(TestTrustSignatures)
-
-#include "t-trustsignatures.moc"