When downloading an RPM, warn the user first if they don't have the
[zeroinstall.git] / tests / testgpg.py
blob8c99556586eb79da78c1ab68b97f2ea3d3830a80
1 #!/usr/bin/env python2.3
2 import sys, tempfile, os, shutil
3 import unittest
5 sys.path.insert(0, '..')
6 from zeroinstall.injector import gpg, model
8 err_sig = """-----BEGIN PGP MESSAGE-----
9 Version: GnuPG v1.4.0 (GNU/Linux)
11 owGbwMvMwCTYk9R5Infvsj7G01xJDE513j1OiSlcHfbMrCDOBJisINP6XQwLGjzn
12 tMxedXc3y75I7r1hQZFTb/ewMcx3yefZ8zb/vZd10I7LEYdDj4fnKsYAAA==
13 =kMeU
14 -----END PGP MESSAGE-----
15 """
17 bad_sig = """-----BEGIN PGP SIGNED MESSAGE-----
18 Hash: SHA1
20 Hell0
21 -----BEGIN PGP SIGNATURE-----
22 Version: GnuPG v1.4.0 (GNU/Linux)
24 iD8DBQFCfk3grgeCgFmlPMERAhl8AKC0aktrLzz646zTY0TRzdnxPdbLBgCeJWbk
25 GRVbJusevCKvtoSn7RAW2mg=
26 =xQJ5
27 -----END PGP SIGNATURE-----
28 """
30 good_sig = """-----BEGIN PGP SIGNED MESSAGE-----
31 Hash: SHA1
33 Hello
34 -----BEGIN PGP SIGNATURE-----
35 Version: GnuPG v1.4.0 (GNU/Linux)
37 iD8DBQFCfk3grgeCgFmlPMERAhl8AKC0aktrLzz646zTY0TRzdnxPdbLBgCeJWbk
38 GRVbJusevCKvtoSn7RAW2mg=
39 =xQJ5
40 -----END PGP SIGNATURE-----
41 """
43 bad_xml_main = """<?xml version='1.0'?>
44 <root/>"""
46 invalid_xmls_sigs = [
47 ('last line is not end-of-comment',
48 """<!-- Base64 Signature
49 """),
50 ('No signature block in XML',
51 """<!-- Base64 Sig
52 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
53 -->
54 """),
55 ('extra data on comment line',
56 """<!-- Base64 Signature data
57 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
58 -->
59 """),
60 ('last line is not end-of-comment',
61 """<!-- Base64 Signature
62 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
63 WZRBLT0an56WYaBODukSsf4=
64 --> More
65 """),
66 ('Invalid base 64 encoded signature:',
67 """<!-- Base64 Signature
68 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
69 WZRBLT0an56WYaBODukSsf4=
70 =zMc+
71 -->
72 """),
73 ('Invalid characters found',
74 """<!-- Base64 Signature
75 iD8DBQBDtpK9rge<CgFmlPMERAg0gAKCaJhXFnk
76 WZRBLT0an56WYaBODukSsf4=
77 -->
78 """)]
80 good_xml_sig = """<?xml version='1.0'?>
81 <root/>
82 <!-- Base64 Signature
83 iD8DBQBDuChIrgeCgFmlPMERAnGEAJ0ZS1PeyWonx6xS/mgpYTKNgSXa5QCeMSYPHhNcvxu3f84y
84 Uk7hxHFeQPo=
85 -->
86 """
88 bad_xml_sig = """<?xml version='1.0'?>
89 <ro0t/>
90 <!-- Base64 Signature
91 iD8DBQBDuChIrgeCgFmlPMERAnGEAJ0ZS1PeyWonx6xS/mgpYTKNgSXa5QCeMSYPHhNcvxu3f84y
92 Uk7hxHFeQPo=
93 -->
94 """
96 from data import thomas_key
98 class TestGPG(unittest.TestCase):
99 def setUp(self):
100 self.gnupg_home = tempfile.mktemp()
101 os.environ['GNUPGHOME'] = self.gnupg_home
102 os.mkdir(self.gnupg_home, 0700)
103 stream = tempfile.TemporaryFile()
104 stream.write(thomas_key)
105 stream.seek(0)
106 gpg.import_key(stream)
108 def tearDown(self):
109 shutil.rmtree(self.gnupg_home)
111 def testImportBad(self):
112 stream = tempfile.TemporaryFile()
113 stream.write("Bad key")
114 stream.seek(0)
115 try:
116 gpg.import_key(stream)
117 assert False
118 except model.SafeException:
119 pass # OK
121 def testErrSig(self):
122 stream = tempfile.TemporaryFile()
123 stream.write(err_sig)
124 stream.seek(0)
125 data, sigs = gpg.check_stream(stream)
126 self.assertEquals("Bad\n", data.read())
127 assert len(sigs) == 1
128 assert isinstance(sigs[0], gpg.ErrSig)
129 assert sigs[0].need_key() == "8C6289C86DBDA68E"
130 self.assertEquals("17", sigs[0].status[gpg.ErrSig.ALG])
131 assert sigs[0].is_trusted() is False
132 assert str(sigs[0]).startswith('ERROR')
134 def testBadSig(self):
135 self.assertEquals("Hell0\n", self.check_bad(bad_sig))
137 def testBadXMLSig(self):
138 self.assertEquals(bad_xml_sig, self.check_bad(bad_xml_sig))
140 def testInvalidXMLSig(self):
141 for error, sig in invalid_xmls_sigs:
142 try:
143 self.check_bad(bad_xml_main + '\n' + sig)
144 except model.SafeException, ex:
145 if error not in str(ex):
146 raise model.SafeException(str(ex) + '\nSig:\n' + sig)
148 def check_bad(self, sig):
149 stream = tempfile.TemporaryFile()
150 stream.write(sig)
151 stream.seek(0)
152 data, sigs = gpg.check_stream(stream)
153 assert len(sigs) == 1
154 assert isinstance(sigs[0], gpg.BadSig)
155 self.assertEquals("AE07828059A53CC1",
156 sigs[0].status[gpg.BadSig.KEYID])
157 assert sigs[0].is_trusted() is False
158 assert sigs[0].need_key() is None
159 assert str(sigs[0]).startswith('BAD')
160 return data.read()
162 def testGoodSig(self):
163 self.assertEquals("Hello\n", self.check_good(good_sig))
165 def testGoodXMLSig(self):
166 self.assertEquals(good_xml_sig, self.check_good(good_xml_sig))
168 def check_good(self, sig):
169 stream = tempfile.TemporaryFile()
170 stream.write(sig)
171 stream.seek(0)
172 data, sigs = gpg.check_stream(stream)
173 assert len(sigs) == 1
174 assert isinstance(sigs[0], gpg.ValidSig)
175 self.assertEquals("92429807C9853C0744A68B9AAE07828059A53CC1",
176 sigs[0].fingerprint)
177 assert sigs[0].is_trusted() is True
178 assert sigs[0].need_key() is None
179 assert str(sigs[0]).startswith('Valid')
180 for item in sigs[0].get_details():
181 if item[0] in ('pub', 'uid') and len(item) > 9:
182 self.assertEquals(
183 "Thomas Leonard <tal197@users.sourceforge.net>",
184 item[9])
185 break
186 else:
187 self.fail("Missing name")
188 return data.read()
190 def testNoSig(self):
191 stream = tempfile.TemporaryFile()
192 stream.write("Hello")
193 stream.seek(0)
194 try:
195 gpg.check_stream(stream)
196 assert False
197 except model.SafeException:
198 pass # OK
200 suite = unittest.makeSuite(TestGPG)
201 if __name__ == '__main__':
202 sys.argv.append('-v')
203 unittest.main()