Fixed issues detected by test suite and ci
Fixed serialization for KeeShareSettings::ScopedCertificate Fixed tests for KeeShareSettings serialization Fixed tests Cli features - tests translation for recycle bin since the tests are executed with the system locale Fixed initialization issue in ShareObserver
This commit is contained in:
@@ -308,15 +308,14 @@ namespace KeeShareSettings
|
||||
void ScopedCertificate::serialize(QXmlStreamWriter& writer, const ScopedCertificate& scopedCertificate)
|
||||
{
|
||||
writer.writeAttribute("Path", scopedCertificate.path);
|
||||
QString trust = "Ask";
|
||||
if(scopedCertificate.trust == KeeShareSettings::Trust::Trusted) {
|
||||
writer.writeAttribute("Trust", "Trusted");
|
||||
trust = "Trusted";
|
||||
}
|
||||
else if(scopedCertificate.trust == KeeShareSettings::Trust::Untrusted){
|
||||
writer.writeAttribute("Trust", "Untrusted");
|
||||
}
|
||||
else {
|
||||
writer.writeAttribute("Trust", "Ask");
|
||||
if(scopedCertificate.trust == KeeShareSettings::Trust::Untrusted){
|
||||
trust = "Untrusted";
|
||||
}
|
||||
writer.writeAttribute("Trust", trust);
|
||||
Certificate::serialize(writer, scopedCertificate.certificate);
|
||||
}
|
||||
|
||||
@@ -324,16 +323,14 @@ namespace KeeShareSettings
|
||||
{
|
||||
ScopedCertificate scopedCertificate;
|
||||
scopedCertificate.path = reader.attributes().value("Path").toString();
|
||||
auto trust = reader.attributes().value("Trusted").toString();
|
||||
if(trust.compare("Trusted", Qt::CaseInsensitive)) {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Ask;
|
||||
auto trust = reader.attributes().value("Trust").toString();
|
||||
if(trust.compare("Trusted", Qt::CaseInsensitive) == 0) {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Trusted;
|
||||
}
|
||||
if(trust.compare("Unrusted", Qt::CaseInsensitive)) {
|
||||
if(trust.compare("Untrusted", Qt::CaseInsensitive) == 0) {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Untrusted;
|
||||
}
|
||||
else {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Ask;
|
||||
}
|
||||
scopedCertificate.certificate = Certificate::deserialize(reader);
|
||||
return scopedCertificate;
|
||||
}
|
||||
|
||||
@@ -80,7 +80,7 @@ QPair<Trust, KeeShareSettings::Certificate> check(QByteArray& data,
|
||||
certificate = sign.certificate;
|
||||
auto key = sign.certificate.sshKey();
|
||||
key.openKey(QString());
|
||||
const Signature signer;
|
||||
const auto signer = Signature{};
|
||||
if (!signer.verify(data, sign.signature, key)) {
|
||||
qCritical("Invalid signature for sharing container %s.", qPrintable(reference.path));
|
||||
return {Invalid, KeeShareSettings::Certificate()};
|
||||
@@ -212,7 +212,7 @@ void ShareObserver::reinitialize()
|
||||
QStringList success;
|
||||
QStringList warning;
|
||||
QStringList error;
|
||||
for (Update update : updated) {
|
||||
for (const auto& update : updated) {
|
||||
if (!update.oldReference.path.isEmpty()) {
|
||||
m_fileWatcher->removePath(update.oldReference.path);
|
||||
}
|
||||
@@ -222,7 +222,7 @@ void ShareObserver::reinitialize()
|
||||
}
|
||||
|
||||
if (update.newReference.isImporting()) {
|
||||
const Result result = this->importFromReferenceContainer(update.newReference.path);
|
||||
const auto result = this->importFromReferenceContainer(update.newReference.path);
|
||||
if (!result.isValid()) {
|
||||
// tolerable result - blocked import or missing source
|
||||
continue;
|
||||
|
||||
Reference in New Issue
Block a user