[PATCH] test/crypto: hard code fingerprint

David Bremner david at tethera.net
Thu Sep 8 05:12:51 PDT 2016


Originally the intent was to make the test more robust against changing
test keys. It turns out that (unscientifically) gpg --with-colons output
changes more often than our test key. Rather than making the script more
complex, just hard code the fingerprint.

This fixes Debian bug #847013; I expect similar test failures as other
distros adopt gnupg 2.1.15
---

I plan to release 0.22.2 with this fix, and cf8aabdd375 (already
pushed to debian, but not debian specific).

test/T350-crypto.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/test/T350-crypto.sh b/test/T350-crypto.sh
index 3656cce..96349fa 100755
--- a/test/T350-crypto.sh
+++ b/test/T350-crypto.sh
@@ -25,8 +25,8 @@ add_gnupg_home ()
 ##################################################
 
 add_gnupg_home
-# get key fingerprint
-FINGERPRINT=$(gpg --no-tty --list-secret-keys --with-colons --fingerprint | grep '^fpr:' | cut -d: -f10)
+# Change this if we ship a new test key
+FINGERPRINT="5AEAB11F5E33DCE875DDB75B6D92612D94E46381"
 
 test_expect_success 'emacs delivery of signed message' \
 'emacs_fcc_message \
-- 
2.9.3



More information about the notmuch mailing list