Generalise mirror fallback code.
[zeroinstall/zeroinstall-mseaborn.git] / tests / testgpg.py
blobeff82ccaf209633aaf75c66c63ced34dd8660b77
1 #!/usr/bin/env python2.4
2 from basetest import BaseTest
3 import sys, tempfile, os, shutil
4 import unittest
6 sys.path.insert(0, '..')
7 from zeroinstall.injector import gpg, model, trust
8 from zeroinstall.support import basedir
10 err_sig = """-----BEGIN PGP MESSAGE-----
11 Version: GnuPG v1.4.0 (GNU/Linux)
13 owGbwMvMwCTYk9R5Infvsj7G01xJDE513j1OiSlcHfbMrCDOBJisINP6XQwLGjzn
14 tMxedXc3y75I7r1hQZFTb/ewMcx3yefZ8zb/vZd10I7LEYdDj4fnKsYAAA==
15 =kMeU
16 -----END PGP MESSAGE-----
17 """
19 bad_sig = """-----BEGIN PGP SIGNED MESSAGE-----
20 Hash: SHA1
22 Hell0
23 -----BEGIN PGP SIGNATURE-----
24 Version: GnuPG v1.4.0 (GNU/Linux)
26 iD8DBQFCfk3grgeCgFmlPMERAhl8AKC0aktrLzz646zTY0TRzdnxPdbLBgCeJWbk
27 GRVbJusevCKvtoSn7RAW2mg=
28 =xQJ5
29 -----END PGP SIGNATURE-----
30 """
32 good_sig = """-----BEGIN PGP SIGNED MESSAGE-----
33 Hash: SHA1
35 Hello
36 -----BEGIN PGP SIGNATURE-----
37 Version: GnuPG v1.4.0 (GNU/Linux)
39 iD8DBQFCfk3grgeCgFmlPMERAhl8AKC0aktrLzz646zTY0TRzdnxPdbLBgCeJWbk
40 GRVbJusevCKvtoSn7RAW2mg=
41 =xQJ5
42 -----END PGP SIGNATURE-----
43 """
45 bad_xml_main = """<?xml version='1.0'?>
46 <root/>"""
48 invalid_xmls_sigs = [
49 ('last line is not end-of-comment',
50 """<!-- Base64 Signature
51 """),
52 ('No signature block in XML',
53 """<!-- Base64 Sig
54 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
55 -->
56 """),
57 ('extra data on comment line',
58 """<!-- Base64 Signature data
59 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
60 -->
61 """),
62 ('last line is not end-of-comment',
63 """<!-- Base64 Signature
64 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
65 WZRBLT0an56WYaBODukSsf4=
66 --> More
67 """),
68 ('Invalid base 64 encoded signature:',
69 """<!-- Base64 Signature
70 iD8DBQBDtpK9rgeCgFmlPMERAg0gAKCaJhXFnk
71 WZRBLT0an56WYaBODukSsf4=
72 =zMc+
73 -->
74 """),
75 ('Invalid characters found',
76 """<!-- Base64 Signature
77 iD8DBQBDtpK9rge<CgFmlPMERAg0gAKCaJhXFnk
78 WZRBLT0an56WYaBODukSsf4=
79 -->
80 """)]
82 good_xml_sig = """<?xml version='1.0'?>
83 <root/>
84 <!-- Base64 Signature
85 iD8DBQBDuChIrgeCgFmlPMERAnGEAJ0ZS1PeyWonx6xS/mgpYTKNgSXa5QCeMSYPHhNcvxu3f84y
86 Uk7hxHFeQPo=
87 -->
88 """
90 bad_xml_sig = """<?xml version='1.0'?>
91 <ro0t/>
92 <!-- Base64 Signature
93 iD8DBQBDuChIrgeCgFmlPMERAnGEAJ0ZS1PeyWonx6xS/mgpYTKNgSXa5QCeMSYPHhNcvxu3f84y
94 Uk7hxHFeQPo=
95 -->
96 """
98 from data import thomas_key
100 class TestGPG(BaseTest):
101 def setUp(self):
102 BaseTest.setUp(self)
104 stream = tempfile.TemporaryFile()
105 stream.write(thomas_key)
106 stream.seek(0)
107 gpg.import_key(stream)
108 trust.trust_db.trust_key(
109 '92429807C9853C0744A68B9AAE07828059A53CC1')
111 def testImportBad(self):
112 stream = tempfile.TemporaryFile()
113 stream.write("Bad key")
114 stream.seek(0)
115 try:
116 gpg.import_key(stream)
117 assert False
118 except model.SafeException:
119 pass # OK
121 def testErrSig(self):
122 stream = tempfile.TemporaryFile()
123 stream.write(err_sig)
124 stream.seek(0)
125 data, sigs = gpg.check_stream(stream)
126 self.assertEquals("Bad\n", data.read())
127 assert len(sigs) == 1
128 assert isinstance(sigs[0], gpg.ErrSig)
129 assert sigs[0].need_key() == "8C6289C86DBDA68E"
130 self.assertEquals("17", sigs[0].status[gpg.ErrSig.ALG])
131 assert sigs[0].is_trusted() is False
132 assert str(sigs[0]).startswith('ERROR')
134 def testBadSig(self):
135 self.assertEquals("Hell0\n", self.check_bad(bad_sig))
137 def testBadXMLSig(self):
138 self.assertEquals(bad_xml_sig, self.check_bad(bad_xml_sig))
140 def testInvalidXMLSig(self):
141 for error, sig in invalid_xmls_sigs:
142 try:
143 self.check_bad(bad_xml_main + '\n' + sig)
144 except model.SafeException, ex:
145 if error not in str(ex):
146 raise model.SafeException(str(ex) + '\nSig:\n' + sig)
148 def check_bad(self, sig):
149 stream = tempfile.TemporaryFile()
150 stream.write(sig)
151 stream.seek(0)
152 data, sigs = gpg.check_stream(stream)
153 assert len(sigs) == 1
154 assert isinstance(sigs[0], gpg.BadSig)
155 self.assertEquals("AE07828059A53CC1",
156 sigs[0].status[gpg.BadSig.KEYID])
157 assert sigs[0].is_trusted() is False
158 assert sigs[0].need_key() is None
159 assert str(sigs[0]).startswith('BAD')
160 return data.read()
162 def testGoodSig(self):
163 self.assertEquals("Hello\n", self.check_good(good_sig))
165 def testGoodXMLSig(self):
166 self.assertEquals(good_xml_sig, self.check_good(good_xml_sig))
168 def check_good(self, sig):
169 stream = tempfile.TemporaryFile()
170 stream.write(sig)
171 stream.seek(0)
172 data, sigs = gpg.check_stream(stream)
173 assert len(sigs) == 1
174 assert isinstance(sigs[0], gpg.ValidSig)
175 self.assertEquals("92429807C9853C0744A68B9AAE07828059A53CC1",
176 sigs[0].fingerprint)
177 assert sigs[0].is_trusted() is True
178 assert sigs[0].need_key() is None
179 assert str(sigs[0]).startswith('Valid')
180 for item in sigs[0].get_details():
181 if item[0] in ('pub', 'uid') and len(item) > 9:
182 self.assertEquals(
183 "Thomas Leonard <tal197@users.sourceforge.net>",
184 item[9])
185 break
186 else:
187 self.fail("Missing name")
188 return data.read()
190 def testNoSig(self):
191 stream = tempfile.TemporaryFile()
192 stream.write("Hello")
193 stream.seek(0)
194 try:
195 gpg.check_stream(stream)
196 assert False
197 except model.SafeException:
198 pass # OK
200 def testLoadKeys(self):
201 self.assertEquals({}, gpg.load_keys([]))
203 suite = unittest.makeSuite(TestGPG)
204 if __name__ == '__main__':
205 sys.argv.append('-v')
206 unittest.main()