mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2025-08-09 06:52:50 -04:00
Fixed issues detected by test suite and ci
Fixed serialization for KeeShareSettings::ScopedCertificate Fixed tests for KeeShareSettings serialization Fixed tests Cli features - tests translation for recycle bin since the tests are executed with the system locale Fixed initialization issue in ShareObserver
This commit is contained in:
parent
ba604390d2
commit
6e25da6a19
4 changed files with 20 additions and 23 deletions
|
@ -308,15 +308,14 @@ namespace KeeShareSettings
|
|||
void ScopedCertificate::serialize(QXmlStreamWriter& writer, const ScopedCertificate& scopedCertificate)
|
||||
{
|
||||
writer.writeAttribute("Path", scopedCertificate.path);
|
||||
QString trust = "Ask";
|
||||
if(scopedCertificate.trust == KeeShareSettings::Trust::Trusted) {
|
||||
writer.writeAttribute("Trust", "Trusted");
|
||||
trust = "Trusted";
|
||||
}
|
||||
else if(scopedCertificate.trust == KeeShareSettings::Trust::Untrusted){
|
||||
writer.writeAttribute("Trust", "Untrusted");
|
||||
}
|
||||
else {
|
||||
writer.writeAttribute("Trust", "Ask");
|
||||
if(scopedCertificate.trust == KeeShareSettings::Trust::Untrusted){
|
||||
trust = "Untrusted";
|
||||
}
|
||||
writer.writeAttribute("Trust", trust);
|
||||
Certificate::serialize(writer, scopedCertificate.certificate);
|
||||
}
|
||||
|
||||
|
@ -324,16 +323,14 @@ namespace KeeShareSettings
|
|||
{
|
||||
ScopedCertificate scopedCertificate;
|
||||
scopedCertificate.path = reader.attributes().value("Path").toString();
|
||||
auto trust = reader.attributes().value("Trusted").toString();
|
||||
if(trust.compare("Trusted", Qt::CaseInsensitive)) {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Ask;
|
||||
auto trust = reader.attributes().value("Trust").toString();
|
||||
if(trust.compare("Trusted", Qt::CaseInsensitive) == 0) {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Trusted;
|
||||
}
|
||||
if(trust.compare("Unrusted", Qt::CaseInsensitive)) {
|
||||
if(trust.compare("Untrusted", Qt::CaseInsensitive) == 0) {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Untrusted;
|
||||
}
|
||||
else {
|
||||
scopedCertificate.trust = KeeShareSettings::Trust::Ask;
|
||||
}
|
||||
scopedCertificate.certificate = Certificate::deserialize(reader);
|
||||
return scopedCertificate;
|
||||
}
|
||||
|
|
|
@ -80,7 +80,7 @@ QPair<Trust, KeeShareSettings::Certificate> check(QByteArray& data,
|
|||
certificate = sign.certificate;
|
||||
auto key = sign.certificate.sshKey();
|
||||
key.openKey(QString());
|
||||
const Signature signer;
|
||||
const auto signer = Signature{};
|
||||
if (!signer.verify(data, sign.signature, key)) {
|
||||
qCritical("Invalid signature for sharing container %s.", qPrintable(reference.path));
|
||||
return {Invalid, KeeShareSettings::Certificate()};
|
||||
|
@ -212,7 +212,7 @@ void ShareObserver::reinitialize()
|
|||
QStringList success;
|
||||
QStringList warning;
|
||||
QStringList error;
|
||||
for (Update update : updated) {
|
||||
for (const auto& update : updated) {
|
||||
if (!update.oldReference.path.isEmpty()) {
|
||||
m_fileWatcher->removePath(update.oldReference.path);
|
||||
}
|
||||
|
@ -222,7 +222,7 @@ void ShareObserver::reinitialize()
|
|||
}
|
||||
|
||||
if (update.newReference.isImporting()) {
|
||||
const Result result = this->importFromReferenceContainer(update.newReference.path);
|
||||
const auto result = this->importFromReferenceContainer(update.newReference.path);
|
||||
if (!result.isValid()) {
|
||||
// tolerable result - blocked import or missing source
|
||||
continue;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue