diff vendor/pear/crypt_gpg/tests/GeneralTest.php @ 0:1e000243b222

vanilla 1.3.3 distro, I hope
author Charlie Root
date Thu, 04 Jan 2018 15:50:29 -0500
parents
children
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/vendor/pear/crypt_gpg/tests/GeneralTest.php	Thu Jan 04 15:50:29 2018 -0500
@@ -0,0 +1,289 @@
+<?php
+
+/* vim: set expandtab tabstop=4 shiftwidth=4 softtabstop=4: */
+
+/**
+ * General test cases for the Crypt_GPG package.
+ *
+ * These tests require the PHPUnit 3.6 or greater package to be installed.
+ * PHPUnit is installable using PEAR. See the
+ * {@link http://www.phpunit.de/manual/3.6/en/installation.html manual}
+ * for detailed installation instructions.
+ *
+ * To run these tests, use:
+ * <code>
+ * $ phpunit GeneralTestCase
+ * </code>
+ *
+ * LICENSE:
+ *
+ * This library is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as
+ * published by the Free Software Foundation; either version 2.1 of the
+ * License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, see
+ * <http://www.gnu.org/licenses/>
+ *
+ * @category  Encryption
+ * @package   Crypt_GPG
+ * @author    Michael Gauthier <mike@silverorange.com>
+ * @copyright 2005-2013 silverorange
+ * @license   http://www.gnu.org/copyleft/lesser.html LGPL License 2.1
+ * @version   CVS: $Id$
+ * @link      http://pear.php.net/package/Crypt_GPG
+ */
+
+/**
+ * Base test case.
+ */
+require_once 'TestCase.php';
+
+/**
+ * General tests for Crypt_GPG.
+ *
+ * @category  Encryption
+ * @package   Crypt_GPG
+ * @author    Michael Gauthier <mike@silverorange.com>
+ * @copyright 2008-2013 silverorange
+ * @license   http://www.gnu.org/copyleft/lesser.html LGPL License 2.1
+ * @link      http://pear.php.net/package/Crypt_GPG
+ */
+class GeneralTestCase extends Crypt_GPG_TestCase
+{
+    // {{{ testPublicKeyringFileException()
+
+    /**
+     * @expectedException Crypt_GPG_FileException
+     */
+    public function testPublicKeyringFileException()
+    {
+        $publicKeyringFile = $this->getTempFilename('pubring.gpg');
+        new Crypt_GPG(
+            array(
+                'publicKeyring' => $publicKeyringFile
+            )
+        );
+    }
+
+    // }}}
+    // {{{ testPrivateKeyringFileException()
+
+    /**
+     * @expectedException Crypt_GPG_FileException
+     */
+    public function testPrivateKeyringFileException()
+    {
+        $privateKeyringFile = $this->getTempFilename('secring.gpg');
+        new Crypt_GPG(
+            array(
+                'privateKeyring' => $privateKeyringFile
+            )
+        );
+    }
+
+    // }}}
+    // {{{ testTrustDatabaseFileException()
+
+    /**
+     * @expectedException Crypt_GPG_FileException
+     */
+    public function testTrustDatabaseFileException()
+    {
+        $trustDbFile = $this->getTempFilename('secring.gpg');
+        new Crypt_GPG(
+            array(
+                'trustDb' => $trustDbFile
+            )
+        );
+    }
+
+    // }}}
+    // {{{ testHomedirFileException_NoCreate()
+
+    /**
+     * @expectedException Crypt_GPG_FileException
+     * @expectedExceptionMessage cannot be created
+     */
+    public function testHomedirFileException_NoCreate()
+    {
+        if (posix_getuid() === 0) {
+            $this->markTestSkipped('Root can write to any homedir.');
+        }
+
+        $nonCreatableDirectory = '//.gnupg';
+        new Crypt_GPG(array('homedir' => $nonCreatableDirectory));
+    }
+
+    // }}}
+    // {{{ testHomedirFileException_NoExecute()
+
+    /**
+     * @expectedException Crypt_GPG_FileException
+     * @expectedExceptionMessage is not enterable
+     */
+    public function testHomedirFileException_NoExecute()
+    {
+        if (posix_getuid() === 0) {
+            $this->markTestSkipped('Root can do what it wants to any homedir.');
+        }
+
+        $nonExecutableDirectory = $this->getTempFilename('home-no-execute');
+        mkdir($nonExecutableDirectory);
+        chmod($nonExecutableDirectory, 0600); // rw- --- ---
+
+        new Crypt_GPG(array('homedir' => $nonExecutableDirectory));
+    }
+
+    // }}}
+    // {{{ testHomedirFileException_NoWrite()
+
+    /**
+     * @expectedException Crypt_GPG_FileException()
+     * @expectedExceptionMessage is not writeable
+     */
+    public function testHomedirFileException_NoWrite()
+    {
+        if (posix_getuid() === 0) {
+            $this->markTestSkipped('Root can write to any homedir.');
+        }
+
+        $nonWriteableDirectory = $this->getTempFilename('home-no-write');
+        mkdir($nonWriteableDirectory);
+        chmod($nonWriteableDirectory, 0300); // r-x --- ---
+
+        new Crypt_GPG(array('homedir' => $nonWriteableDirectory));
+    }
+
+    // }}}
+    // {{{ testBinaryPEARException()
+
+    /**
+     * @expectedException PEAR_Exception
+     */
+    public function testBinaryPEARException()
+    {
+        new Crypt_GPG(array('binary' => './non-existent-binary'));
+    }
+
+    // }}}
+    // {{{ testGPGBinaryPEARException()
+
+    /**
+     * @expectedException PEAR_Exception
+     */
+    public function testGPGBinaryPEARException()
+    {
+        new Crypt_GPG(array('gpgBinary' => './non-existent-binary'));
+    }
+
+    // }}}
+    // {{{ testSetEngine()
+
+    public function testSetEngine()
+    {
+        $engine = new Crypt_GPG_Engine($this->getOptions());
+        $gpg = new Crypt_GPG();
+        $gpg->setEngine($engine);
+
+        $homedirConstraint = $this->attribute(
+            $this->attributeEqualTo(
+                '_homedir',
+                __DIR__ . '/' . self::HOMEDIR
+            ),
+            'engine'
+        );
+
+        $this->assertThat(
+            $gpg,
+            $homedirConstraint,
+            'Engine was not set properly.'
+        );
+    }
+
+    // }}}
+
+    // fluent interface
+    // {{{ testFluentInterface
+
+    /**
+     * @group fluent
+     */
+    public function testFluentInterface()
+    {
+        $returnedGpg = $this->gpg->setEngine(
+            new Crypt_GPG_Engine($this->getOptions())
+        );
+        $this->assertEquals(
+            $this->gpg,
+            $returnedGpg,
+            'Failed asserting fluent interface works for setEngine() method.'
+        );
+
+        $returnedGpg = $this->gpg->addDecryptKey(
+            '8D2299D9C5C211128B32BBB0C097D9EC94C06363',
+            'test1'
+        );
+        $this->assertEquals(
+            $this->gpg,
+            $returnedGpg,
+            'Failed asserting fluent interface works for addDecryptKey() ' .
+            'method.'
+        );
+
+        $returnedGpg = $this->gpg->addEncryptKey(
+            '8D2299D9C5C211128B32BBB0C097D9EC94C06363'
+        );
+        $this->assertEquals(
+            $this->gpg,
+            $returnedGpg,
+            'Failed asserting fluent interface works for addEncryptKey() ' .
+            'method.'
+        );
+
+        $returnedGpg = $this->gpg->addSignKey(
+            '8D2299D9C5C211128B32BBB0C097D9EC94C06363',
+            'test1'
+        );
+        $this->assertEquals(
+            $this->gpg,
+            $returnedGpg,
+            'Failed asserting fluent interface works for addSignKey() ' .
+            'method.'
+        );
+
+        $returnedGpg = $this->gpg->clearDecryptKeys();
+        $this->assertEquals(
+            $this->gpg,
+            $returnedGpg,
+            'Failed asserting fluent interface works for clearDecryptKeys() ' .
+            'method.'
+        );
+
+        $returnedGpg = $this->gpg->clearEncryptKeys();
+        $this->assertEquals(
+            $this->gpg,
+            $returnedGpg,
+            'Failed asserting fluent interface works for clearEncryptKeys() ' .
+            'method.'
+        );
+
+        $returnedGpg = $this->gpg->clearSignKeys();
+        $this->assertEquals(
+            $this->gpg,
+            $returnedGpg,
+            'Failed asserting fluent interface works for clearSignKeys() ' .
+            'method.'
+        );
+    }
+
+    // }}}
+}
+
+?>