aboutsummaryrefslogtreecommitdiff
path: root/src/mailman_pgp/model/tests/test_fs_key.py
blob: 8828e4b94699d51f7764365425a5124db02cfff9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
# Copyright (C) 2017 Jan Jancar
#
# This file is a part of the Mailman PGP plugin.
#
# This program is free software; you can redistribute it and/or modify it under
# the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
# FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
# more details.
#
# You should have received a copy of the GNU General Public License along with
# this program.  If not, see <http://www.gnu.org/licenses/>.

""""""
from os.path import join, exists
from tempfile import TemporaryDirectory
from unittest import TestCase

from mailman_pgp.model.fs_key import FSKey
from mailman_pgp.testing.layers import PGPLayer
from mailman_pgp.testing.pgp import load_key


class TestFSKey(TestCase):
    layer = PGPLayer

    def setUp(self):
        self.tmpdir = TemporaryDirectory()

    def tearDown(self):
        self.tmpdir.cleanup()

    def test_load(self):
        key_name = 'something.asc'
        key_path = join(self.tmpdir.name, key_name)
        key_data = load_key('rsa_1024.priv.asc')
        with open(key_path, 'w') as key_file:
            key_file.write(str(key_data))

        key = FSKey(self.tmpdir.name, key_name, False)
        self.assertEqual(key.key_path, key_path)

        key.load()
        self.assertEqual(key.key.fingerprint, key_data.fingerprint)

    def test_reload_none(self):
        key_name = 'something.asc'
        key = FSKey(self.tmpdir.name, key_name, False)
        key_data = load_key('rsa_1024.priv.asc')
        with open(key.key_path, 'w') as key_file:
            key_file.write(str(key_data))

        self.assertIsNone(key.key)
        key.reload()
        self.assertIsNotNone(key.key)
        self.assertEqual(key.key.fingerprint, key_data.fingerprint)

    def test_reload_not_none(self):
        key_name = 'something.asc'
        key_path = join(self.tmpdir.name, key_name)
        key_data = load_key('rsa_1024.priv.asc')
        new_key_data = load_key('ecc_p256.priv.asc')
        with open(key_path, 'w') as key_file:
            key_file.write(str(key_data))

        key = FSKey(self.tmpdir.name, key_name, True)

        with open(key_path, 'w') as key_file:
            key_file.write(str(new_key_data))

        key.reload()
        self.assertIsNotNone(key.key)
        self.assertEqual(key.key.fingerprint, new_key_data.fingerprint)

    def test_save(self):
        key_name = 'something.asc'
        key = FSKey(self.tmpdir.name, key_name)
        key_data = load_key('rsa_1024.priv.asc')

        key.key = key_data
        key.save()
        self.assertTrue(exists(key.key_path))

    def test_delete(self):
        key_name = 'something.asc'
        key_path = join(self.tmpdir.name, key_name)
        key_data = load_key('rsa_1024.priv.asc')
        with open(key_path, 'w') as key_file:
            key_file.write(str(key_data))

        key = FSKey(self.tmpdir.name, key_name, True)

        key.delete()
        self.assertFalse(exists(key.key_path))
        self.assertIsNotNone(key.key)