diff options
Diffstat (limited to 'third_party/git/t/lib-gpg.sh')
-rwxr-xr-x | third_party/git/t/lib-gpg.sh | 86 |
1 files changed, 0 insertions, 86 deletions
diff --git a/third_party/git/t/lib-gpg.sh b/third_party/git/t/lib-gpg.sh deleted file mode 100755 index 8d28652b72..0000000000 --- a/third_party/git/t/lib-gpg.sh +++ /dev/null @@ -1,86 +0,0 @@ -#!/bin/sh - -gpg_version=$(gpg --version 2>&1) -if test $? != 127 -then - # As said here: http://www.gnupg.org/documentation/faqs.html#q6.19 - # the gpg version 1.0.6 didn't parse trust packets correctly, so for - # that version, creation of signed tags using the generated key fails. - case "$gpg_version" in - 'gpg (GnuPG) 1.0.6'*) - say "Your version of gpg (1.0.6) is too buggy for testing" - ;; - *) - # Available key info: - # * Type DSA and Elgamal, size 2048 bits, no expiration date, - # name and email: C O Mitter <committer@example.com> - # * Type RSA, size 2048 bits, no expiration date, - # name and email: Eris Discordia <discord@example.net> - # No password given, to enable non-interactive operation. - # To generate new key: - # gpg --homedir /tmp/gpghome --gen-key - # To write armored exported key to keyring: - # gpg --homedir /tmp/gpghome --export-secret-keys \ - # --armor 0xDEADBEEF >> lib-gpg/keyring.gpg - # gpg --homedir /tmp/gpghome --export \ - # --armor 0xDEADBEEF >> lib-gpg/keyring.gpg - # To export ownertrust: - # gpg --homedir /tmp/gpghome --export-ownertrust \ - # > lib-gpg/ownertrust - mkdir ./gpghome && - chmod 0700 ./gpghome && - GNUPGHOME="$(pwd)/gpghome" && - export GNUPGHOME && - (gpgconf --kill gpg-agent >/dev/null 2>&1 || : ) && - gpg --homedir "${GNUPGHOME}" 2>/dev/null --import \ - "$TEST_DIRECTORY"/lib-gpg/keyring.gpg && - gpg --homedir "${GNUPGHOME}" 2>/dev/null --import-ownertrust \ - "$TEST_DIRECTORY"/lib-gpg/ownertrust && - gpg --homedir "${GNUPGHOME}" </dev/null >/dev/null 2>&1 \ - --sign -u committer@example.com && - test_set_prereq GPG && - # Available key info: - # * see t/lib-gpg/gpgsm-gen-key.in - # To generate new certificate: - # * no passphrase - # gpgsm --homedir /tmp/gpghome/ \ - # -o /tmp/gpgsm.crt.user \ - # --generate-key \ - # --batch t/lib-gpg/gpgsm-gen-key.in - # To import certificate: - # gpgsm --homedir /tmp/gpghome/ \ - # --import /tmp/gpgsm.crt.user - # To export into a .p12 we can later import: - # gpgsm --homedir /tmp/gpghome/ \ - # -o t/lib-gpg/gpgsm_cert.p12 \ - # --export-secret-key-p12 "committer@example.com" - echo | gpgsm --homedir "${GNUPGHOME}" 2>/dev/null \ - --passphrase-fd 0 --pinentry-mode loopback \ - --import "$TEST_DIRECTORY"/lib-gpg/gpgsm_cert.p12 && - - gpgsm --homedir "${GNUPGHOME}" 2>/dev/null -K | - grep fingerprint: | - cut -d" " -f4 | - tr -d '\n' >"${GNUPGHOME}/trustlist.txt" && - - echo " S relax" >>"${GNUPGHOME}/trustlist.txt" && - echo hello | gpgsm --homedir "${GNUPGHOME}" >/dev/null \ - -u committer@example.com -o /dev/null --sign - 2>&1 && - test_set_prereq GPGSM - ;; - esac -fi - -if test_have_prereq GPG && - echo | gpg --homedir "${GNUPGHOME}" -b --rfc1991 >/dev/null 2>&1 -then - test_set_prereq RFC1991 -fi - -sanitize_pgp() { - perl -ne ' - /^-----END PGP/ and $in_pgp = 0; - print unless $in_pgp; - /^-----BEGIN PGP/ and $in_pgp = 1; - ' -} |