/brz/remove-bazaar

To get this branch, use:
bzr branch http://gegoxaren.bato24.eu/bzr/brz/remove-bazaar

« back to all changes in this revision

Viewing changes to breezy/tests/test_gpg.py

  • Committer: Jelmer Vernooij
  • Date: 2018-11-16 19:47:19 UTC
  • mfrom: (7178 work)
  • mto: This revision was merged to the branch mainline in revision 7179.
  • Revision ID: jelmer@jelmer.uk-20181116194719-m5ut2wfuze5x9s1p
Merge trunk.

Show diffs side-by-side

added added

removed removed

Lines of Context:
196
196
        context.op_import(expired_key)
197
197
 
198
198
    def test_verify_untrusted_but_accepted(self):
199
 
        #untrusted by gpg but listed as acceptable_keys by user
 
199
        # untrusted by gpg but listed as acceptable_keys by user
200
200
        self.requireFeature(features.gpg)
201
201
        self.import_keys()
202
202
 
224
224
"""
225
225
        my_gpg = gpg.GPGStrategy(FakeConfig())
226
226
        my_gpg.set_acceptable_keys("bazaar@example.com")
227
 
        self.assertEqual((gpg.SIGNATURE_VALID, None, plain), my_gpg.verify(content))
 
227
        self.assertEqual((gpg.SIGNATURE_VALID, None, plain),
 
228
                         my_gpg.verify(content))
228
229
 
229
230
    def test_verify_unacceptable_key(self):
230
231
        self.requireFeature(features.gpg)
284
285
sha1: 6411f9bdf6571200357140c9ce7c0f50106ac9a4
285
286
"""
286
287
        my_gpg = gpg.GPGStrategy(FakeConfig())
287
 
        self.assertEqual((gpg.SIGNATURE_NOT_VALID, None, plain), my_gpg.verify(content))
 
288
        self.assertEqual((gpg.SIGNATURE_NOT_VALID, None,
 
289
                          plain), my_gpg.verify(content))
288
290
 
289
291
    def test_verify_revoked_signature(self):
290
292
        self.requireFeature(features.gpg)
307
309
        plain = b"""asdf\n"""
308
310
        my_gpg = gpg.GPGStrategy(FakeConfig())
309
311
        my_gpg.set_acceptable_keys("test@example.com")
310
 
        self.assertEqual((gpg.SIGNATURE_NOT_VALID, None, None), my_gpg.verify(content))
 
312
        self.assertEqual((gpg.SIGNATURE_NOT_VALID, None, None),
 
313
                         my_gpg.verify(content))
311
314
 
312
315
    def test_verify_invalid(self):
313
316
        self.requireFeature(features.gpg)
332
335
"""
333
336
        my_gpg = gpg.GPGStrategy(FakeConfig())
334
337
        self.assertEqual((gpg.SIGNATURE_NOT_VALID, None, plain),
335
 
                            my_gpg.verify(content))
 
338
                         my_gpg.verify(content))
336
339
 
337
340
    def test_verify_expired_but_valid(self):
338
341
        self.requireFeature(features.gpg)
355
358
"""
356
359
        my_gpg = gpg.GPGStrategy(FakeConfig())
357
360
        self.assertEqual((gpg.SIGNATURE_EXPIRED, u'4F8D1513', None),
358
 
                            my_gpg.verify(content))
 
361
                         my_gpg.verify(content))
359
362
 
360
363
    def test_verify_unknown_key(self):
361
364
        self.requireFeature(features.gpg)
378
381
"""
379
382
        my_gpg = gpg.GPGStrategy(FakeConfig())
380
383
        self.assertEqual((gpg.SIGNATURE_KEY_MISSING, u'5D51E56F', None),
381
 
                            my_gpg.verify(content))
 
384
                         my_gpg.verify(content))
382
385
 
383
386
    def test_set_acceptable_keys(self):
384
387
        self.requireFeature(features.gpg)
392
395
        self.requireFeature(features.gpg)
393
396
        self.import_keys()
394
397
        my_gpg = gpg.GPGStrategy(FakeConfig(
395
 
                b'acceptable_keys=bazaar@example.com'))
 
398
            b'acceptable_keys=bazaar@example.com'))
396
399
        my_gpg.set_acceptable_keys(None)
397
400
        self.assertEqual(my_gpg.acceptable_keys,
398
401
                         [u'B5DEED5FCB15DAE6ECEF919587681B1EE3080E45'])
401
404
        self.requireFeature(features.gpg)
402
405
        my_gpg = gpg.GPGStrategy(FakeConfig())
403
406
        self.notes = []
 
407
 
404
408
        def note(*args):
405
409
            self.notes.append(args[0] % args[1:])
406
410
        self.overrideAttr(trace, 'note', note)
407
411
        my_gpg.set_acceptable_keys("unknown")
408
412
        self.assertEqual(my_gpg.acceptable_keys, [])
409
413
        self.assertEqual(self.notes,
410
 
            ['No GnuPG key results for pattern: unknown'])
 
414
                         ['No GnuPG key results for pattern: unknown'])
411
415
 
412
416
 
413
417
class TestDisabled(TestCase):