1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
|
# Copyright (C) 2017 Jan Jancar
#
# This file is a part of the Mailman PGP plugin.
#
# This program is free software; you can redistribute it and/or modify it under
# the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
# more details.
#
# You should have received a copy of the GNU General Public License along with
# this program. If not, see <http://www.gnu.org/licenses/>.
"""Test the out-of-process key generator."""
from os.path import exists, isfile, join
from tempfile import TemporaryDirectory
from unittest import TestCase
from parameterized import parameterized
from pgpy import PGPKey
from pgpy.constants import EllipticCurveOID, PubKeyAlgorithm
from mailman_pgp.pgp.keygen import ListKeyGenerator
from mailman_pgp.testing.layers import PGPLayer
class TestKeygen(TestCase):
layer = PGPLayer
def setUp(self):
self.display_name = 'Display Name'
self.posting_address = 'posting@address.com'
self.request_address = 'posting-request@address.com'
@parameterized.expand([
# RSA + RSA
(PubKeyAlgorithm.RSAEncryptOrSign, 1024,
PubKeyAlgorithm.RSAEncryptOrSign, 1024),
# ECDSA + ECDH
(PubKeyAlgorithm.ECDSA, EllipticCurveOID.SECP256K1,
PubKeyAlgorithm.ECDH, EllipticCurveOID.SECP256K1),
# DSA + ECDH
(PubKeyAlgorithm.DSA, 1024,
PubKeyAlgorithm.ECDH, EllipticCurveOID.SECP256K1)
])
def test_generate(self, primary_key_type, primary_key_size, sub_key_type,
sub_key_size):
with TemporaryDirectory() as temp_dir:
key_path = join(temp_dir, 'key.asc')
keygen = ListKeyGenerator((primary_key_type, primary_key_size),
(sub_key_type, sub_key_size),
self.display_name,
self.posting_address,
self.request_address, key_path)
keygen.start()
keygen.join()
self.assertTrue(exists(key_path))
self.assertTrue(isfile(key_path))
key, _ = PGPKey.from_file(key_path)
self.assertEqual(key.key_algorithm,
primary_key_type)
self.assertEqual(key.key_size,
primary_key_size)
subs = key.subkeys
self.assertEqual(len(subs), 1)
keyid, sub = subs.popitem()
self.assertEqual(sub.key_algorithm,
sub_key_type)
self.assertEqual(sub.key_size,
sub_key_size)
uids = key.userids
self.assertEqual(len(uids), 2)
for uid in uids:
self.assertEqual(uid.name, self.display_name)
self.assertIn(uid.email,
(self.posting_address, self.request_address))
|