Merge ~pappacena/launchpad:renaming-archive-signing-key into launchpad:master

Proposed by Thiago F. Pappacena
Status: Merged
Approved by: Thiago F. Pappacena
Approved revision: 3127948bdb7e32e06bbcc2113345439b6ef8bba3
Merge reported by: Otto Co-Pilot
Merged at revision: not available
Proposed branch: ~pappacena/launchpad:renaming-archive-signing-key
Merge into: launchpad:master
Diff against target: 590 lines (+77/-75)
18 files modified
lib/lp/archivepublisher/archivegpgsigningkey.py (+11/-11)
lib/lp/archivepublisher/configure.zcml (+5/-5)
lib/lp/archivepublisher/customupload.py (+1/-1)
lib/lp/archivepublisher/interfaces/archivegpgsigningkey.py (+4/-4)
lib/lp/archivepublisher/publishing.py (+1/-1)
lib/lp/archivepublisher/tests/archive-signing.txt (+12/-12)
lib/lp/archivepublisher/tests/test_archivegpgsigningkey.py (+4/-4)
lib/lp/archivepublisher/tests/test_customupload.py (+5/-4)
lib/lp/archivepublisher/tests/test_publishdistro.py (+5/-5)
lib/lp/archivepublisher/tests/test_publisher.py (+3/-3)
lib/lp/archivepublisher/tests/test_signing.py (+5/-4)
lib/lp/code/model/tests/test_recipebuilder.py (+3/-3)
lib/lp/snappy/tests/test_snapbuildbehaviour.py (+3/-3)
lib/lp/soyuz/adapters/tests/test_archivedependencies.py (+3/-3)
lib/lp/soyuz/scripts/ppakeygenerator.py (+3/-3)
lib/lp/soyuz/tests/test_archive.py (+3/-3)
lib/lp/soyuz/tests/test_binarypackagebuildbehaviour.py (+3/-3)
lib/lp/soyuz/tests/test_livefsbuildbehaviour.py (+3/-3)
Reviewer Review Type Date Requested Status
Colin Watson (community) Approve
Review via email: mp+378826@code.launchpad.net

Commit message

Renaming (I)ArchiveSigningKey to (I)ArchiveGPGSigningKey

Description of the change

Currently, the class named ArchiveSigningKey only deals with GPG signing, wereas package signing mechanisms are done by another class.

As a path to migrate the signing to a new service, we are planning to have a database entity named ArchiveSigningKey. So, to make the code more readable, we are changing the current ArchiveSigningKey to a more specific name.

To post a comment you must log in.
Revision history for this message
Colin Watson (cjwatson) :
review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
diff --git a/lib/lp/archivepublisher/archivesigningkey.py b/lib/lp/archivepublisher/archivegpgsigningkey.py
0similarity index 94%0similarity index 94%
1rename from lib/lp/archivepublisher/archivesigningkey.py1rename from lib/lp/archivepublisher/archivesigningkey.py
2rename to lib/lp/archivepublisher/archivegpgsigningkey.py2rename to lib/lp/archivepublisher/archivegpgsigningkey.py
index cb8737b..2b14365 100644
--- a/lib/lp/archivepublisher/archivesigningkey.py
+++ b/lib/lp/archivepublisher/archivegpgsigningkey.py
@@ -1,12 +1,12 @@
1# Copyright 2009-2018 Canonical Ltd. This software is licensed under the1# Copyright 2009-2018 Canonical Ltd. This software is licensed under the
2# GNU Affero General Public License version 3 (see the file LICENSE).2# GNU Affero General Public License version 3 (see the file LICENSE).
33
4"""ArchiveSigningKey implementation."""4"""ArchiveGPGSigningKey implementation."""
55
6__metaclass__ = type6__metaclass__ = type
77
8__all__ = [8__all__ = [
9 'ArchiveSigningKey',9 'ArchiveGPGSigningKey',
10 'SignableArchive',10 'SignableArchive',
11 'SigningMode',11 'SigningMode',
12 ]12 ]
@@ -29,9 +29,9 @@ from zope.security.proxy import (
2929
30from lp.app.interfaces.launchpad import ILaunchpadCelebrities30from lp.app.interfaces.launchpad import ILaunchpadCelebrities
31from lp.archivepublisher.config import getPubConfig31from lp.archivepublisher.config import getPubConfig
32from lp.archivepublisher.interfaces.archivesigningkey import (32from lp.archivepublisher.interfaces.archivegpgsigningkey import (
33 CannotSignArchive,33 CannotSignArchive,
34 IArchiveSigningKey,34 IArchiveGPGSigningKey,
35 ISignableArchive,35 ISignableArchive,
36 )36 )
37from lp.archivepublisher.run_parts import (37from lp.archivepublisher.run_parts import (
@@ -176,18 +176,18 @@ class SignableArchive:
176 [(path, "%s.gpg" % path, SigningMode.DETACHED, suite)], log=log)176 [(path, "%s.gpg" % path, SigningMode.DETACHED, suite)], log=log)
177177
178178
179@implementer(IArchiveSigningKey)179@implementer(IArchiveGPGSigningKey)
180class ArchiveSigningKey(SignableArchive):180class ArchiveGPGSigningKey(SignableArchive):
181 """`IArchive` adapter for manipulating its GPG key."""181 """`IArchive` adapter for manipulating its GPG key."""
182182
183 def getPathForSecretKey(self, key):183 def getPathForSecretKey(self, key):
184 """See `IArchiveSigningKey`."""184 """See `IArchiveGPGSigningKey`."""
185 return os.path.join(185 return os.path.join(
186 config.personalpackagearchive.signing_keys_root,186 config.personalpackagearchive.signing_keys_root,
187 "%s.gpg" % key.fingerprint)187 "%s.gpg" % key.fingerprint)
188188
189 def exportSecretKey(self, key):189 def exportSecretKey(self, key):
190 """See `IArchiveSigningKey`."""190 """See `IArchiveGPGSigningKey`."""
191 assert key.secret, "Only secret keys should be exported."191 assert key.secret, "Only secret keys should be exported."
192 export_path = self.getPathForSecretKey(key)192 export_path = self.getPathForSecretKey(key)
193193
@@ -198,7 +198,7 @@ class ArchiveSigningKey(SignableArchive):
198 export_file.write(key.export())198 export_file.write(key.export())
199199
200 def generateSigningKey(self):200 def generateSigningKey(self):
201 """See `IArchiveSigningKey`."""201 """See `IArchiveGPGSigningKey`."""
202 assert self.archive.signing_key is None, (202 assert self.archive.signing_key is None, (
203 "Cannot override signing_keys.")203 "Cannot override signing_keys.")
204204
@@ -208,7 +208,7 @@ class ArchiveSigningKey(SignableArchive):
208 default_ppa = self.archive.owner.archive208 default_ppa = self.archive.owner.archive
209 if self.archive != default_ppa:209 if self.archive != default_ppa:
210 if default_ppa.signing_key is None:210 if default_ppa.signing_key is None:
211 IArchiveSigningKey(default_ppa).generateSigningKey()211 IArchiveGPGSigningKey(default_ppa).generateSigningKey()
212 key = default_ppa.signing_key212 key = default_ppa.signing_key
213 self.archive.signing_key_owner = key.owner213 self.archive.signing_key_owner = key.owner
214 self.archive.signing_key_fingerprint = key.fingerprint214 self.archive.signing_key_fingerprint = key.fingerprint
@@ -221,7 +221,7 @@ class ArchiveSigningKey(SignableArchive):
221 self._setupSigningKey(secret_key)221 self._setupSigningKey(secret_key)
222222
223 def setSigningKey(self, key_path, async_keyserver=False):223 def setSigningKey(self, key_path, async_keyserver=False):
224 """See `IArchiveSigningKey`."""224 """See `IArchiveGPGSigningKey`."""
225 assert self.archive.signing_key is None, (225 assert self.archive.signing_key is None, (
226 "Cannot override signing_keys.")226 "Cannot override signing_keys.")
227 assert os.path.exists(key_path), (227 assert os.path.exists(key_path), (
diff --git a/lib/lp/archivepublisher/configure.zcml b/lib/lp/archivepublisher/configure.zcml
index 99bdcb4..f52d4ff 100644
--- a/lib/lp/archivepublisher/configure.zcml
+++ b/lib/lp/archivepublisher/configure.zcml
@@ -10,15 +10,15 @@
10 xmlns:xmlrpc="http://namespaces.zope.org/xmlrpc"10 xmlns:xmlrpc="http://namespaces.zope.org/xmlrpc"
11 i18n_domain="launchpad">11 i18n_domain="launchpad">
1212
13 <!-- ArchiveSigningKey -->13 <!-- ArchiveGPGSigningKey -->
14 <class class="lp.archivepublisher.archivesigningkey.ArchiveSigningKey">14 <class class="lp.archivepublisher.archivegpgsigningkey.ArchiveGPGSigningKey">
15 <allow interface="lp.archivepublisher.interfaces.archivesigningkey.IArchiveSigningKey"/>15 <allow interface="lp.archivepublisher.interfaces.archivegpgsigningkey.IArchiveGPGSigningKey"/>
16 </class>16 </class>
1717
18 <adapter18 <adapter
19 for="lp.soyuz.interfaces.archive.IArchive"19 for="lp.soyuz.interfaces.archive.IArchive"
20 provides="lp.archivepublisher.interfaces.archivesigningkey.IArchiveSigningKey"20 provides="lp.archivepublisher.interfaces.archivegpgsigningkey.IArchiveGPGSigningKey"
21 factory="lp.archivepublisher.archivesigningkey.ArchiveSigningKey"21 factory="lp.archivepublisher.archivegpgsigningkey.ArchiveGPGSigningKey"
22 />22 />
2323
24 <!-- PublisherConfig -->24 <!-- PublisherConfig -->
diff --git a/lib/lp/archivepublisher/customupload.py b/lib/lp/archivepublisher/customupload.py
index 7db20cb..0c6a2c9 100644
--- a/lib/lp/archivepublisher/customupload.py
+++ b/lib/lp/archivepublisher/customupload.py
@@ -27,7 +27,7 @@ from lp.archivepublisher.debversion import (
27 Version as make_version,27 Version as make_version,
28 VersionError,28 VersionError,
29 )29 )
30from lp.archivepublisher.interfaces.archivesigningkey import ISignableArchive30from lp.archivepublisher.interfaces.archivegpgsigningkey import ISignableArchive
31from lp.services.librarian.utils import copy_and_close31from lp.services.librarian.utils import copy_and_close
32from lp.soyuz.interfaces.queue import (32from lp.soyuz.interfaces.queue import (
33 CustomUploadError,33 CustomUploadError,
diff --git a/lib/lp/archivepublisher/interfaces/archivesigningkey.py b/lib/lp/archivepublisher/interfaces/archivegpgsigningkey.py
34similarity index 95%34similarity index 95%
35rename from lib/lp/archivepublisher/interfaces/archivesigningkey.py35rename from lib/lp/archivepublisher/interfaces/archivesigningkey.py
36rename to lib/lp/archivepublisher/interfaces/archivegpgsigningkey.py36rename to lib/lp/archivepublisher/interfaces/archivegpgsigningkey.py
index 01e4a50..85d3bfb 100644
--- a/lib/lp/archivepublisher/interfaces/archivesigningkey.py
+++ b/lib/lp/archivepublisher/interfaces/archivegpgsigningkey.py
@@ -1,13 +1,13 @@
1# Copyright 2009-2018 Canonical Ltd. This software is licensed under the1# Copyright 2009-2018 Canonical Ltd. This software is licensed under the
2# GNU Affero General Public License version 3 (see the file LICENSE).2# GNU Affero General Public License version 3 (see the file LICENSE).
33
4"""ArchiveSigningKey interface."""4"""ArchiveGPGSigningKey interface."""
55
6__metaclass__ = type6__metaclass__ = type
77
8__all__ = [8__all__ = [
9 'CannotSignArchive',9 'CannotSignArchive',
10 'IArchiveSigningKey',10 'IArchiveGPGSigningKey',
11 'ISignableArchive',11 'ISignableArchive',
12 ]12 ]
1313
@@ -67,8 +67,8 @@ class ISignableArchive(Interface):
67 """67 """
6868
6969
70class IArchiveSigningKey(ISignableArchive):70class IArchiveGPGSigningKey(ISignableArchive):
71 """`ArchiveSigningKey` interface.71 """`ArchiveGPGSigningKey` interface.
7272
73 `IArchive` adapter for operations using its 'signing_key'.73 `IArchive` adapter for operations using its 'signing_key'.
7474
diff --git a/lib/lp/archivepublisher/publishing.py b/lib/lp/archivepublisher/publishing.py
index 523c51c..3365c68 100644
--- a/lib/lp/archivepublisher/publishing.py
+++ b/lib/lp/archivepublisher/publishing.py
@@ -63,7 +63,7 @@ from lp.archivepublisher.indices import (
63 build_source_stanza_fields,63 build_source_stanza_fields,
64 build_translations_stanza_fields,64 build_translations_stanza_fields,
65 )65 )
66from lp.archivepublisher.interfaces.archivesigningkey import ISignableArchive66from lp.archivepublisher.interfaces.archivegpgsigningkey import ISignableArchive
67from lp.archivepublisher.model.ftparchive import FTPArchiveHandler67from lp.archivepublisher.model.ftparchive import FTPArchiveHandler
68from lp.archivepublisher.utils import (68from lp.archivepublisher.utils import (
69 get_ppa_reference,69 get_ppa_reference,
diff --git a/lib/lp/archivepublisher/tests/archive-signing.txt b/lib/lp/archivepublisher/tests/archive-signing.txt
index 853398e..f2dfca9 100644
--- a/lib/lp/archivepublisher/tests/archive-signing.txt
+++ b/lib/lp/archivepublisher/tests/archive-signing.txt
@@ -127,10 +127,10 @@ location defined by the system configuration.
127 /var/tmp/ppa-signing-keys.test127 /var/tmp/ppa-signing-keys.test
128128
129In order to manipulate 'signing_keys' securily the target archive129In order to manipulate 'signing_keys' securily the target archive
130object has to be adapted to `IArchiveSigningKey`.130object has to be adapted to `IArchiveGPGSigningKey`.
131131
132 >>> from lp.archivepublisher.interfaces.archivesigningkey import (132 >>> from lp.archivepublisher.interfaces.archivegpgsigningkey import (
133 ... IArchiveSigningKey)133 ... IArchiveGPGSigningKey)
134134
135We will adapt Celso's PPA after modifing its distribution to allow135We will adapt Celso's PPA after modifing its distribution to allow
136proper publish configuration based on the sampledata.136proper publish configuration based on the sampledata.
@@ -142,15 +142,15 @@ proper publish configuration based on the sampledata.
142 >>> cprov.archive.distribution = getUtility(142 >>> cprov.archive.distribution = getUtility(
143 ... IDistributionSet).getByName('ubuntutest')143 ... IDistributionSet).getByName('ubuntutest')
144144
145 >>> archive_signing_key = IArchiveSigningKey(cprov.archive)145 >>> archive_signing_key = IArchiveGPGSigningKey(cprov.archive)
146146
147Once adapted `IArchiveSigningKey` is properly implemented.147Once adapted `IArchiveGPGSigningKey` is properly implemented.
148148
149 >>> from zope.interface.verify import verifyObject149 >>> from zope.interface.verify import verifyObject
150 >>> verifyObject(IArchiveSigningKey, archive_signing_key)150 >>> verifyObject(IArchiveGPGSigningKey, archive_signing_key)
151 True151 True
152152
153`IArchiveSigningKey` object contain the corresponding IArchive153`IArchiveGPGSigningKey` object contain the corresponding IArchive
154object.154object.
155155
156 >>> print archive_signing_key.archive.displayname156 >>> print archive_signing_key.archive.displayname
@@ -185,7 +185,7 @@ in the expected path.
185 ... archive_signing_key.getPathForSecretKey(mock_key)).read()185 ... archive_signing_key.getPathForSecretKey(mock_key)).read()
186 Secret True186 Secret True
187187
188At this point we can use the `IArchiveSigningKey` to generate and188At this point we can use the `IArchiveGPGSigningKey` to generate and
189assign a real signing_key, although this procedure depends heavily on189assign a real signing_key, although this procedure depends heavily on
190machine entropy and ends up being very slow in our test machine.190machine entropy and ends up being very slow in our test machine.
191191
@@ -193,7 +193,7 @@ machine entropy and ends up being very slow in our test machine.
193193
194We will use a pre-existing key in our tree which is virtually194We will use a pre-existing key in our tree which is virtually
195identical to the one that would be generated. The key will be 'set' by195identical to the one that would be generated. The key will be 'set' by
196using a method `IArchiveSigningKey` skips the key generation but uses196using a method `IArchiveGPGSigningKey` skips the key generation but uses
197exactly the same procedure for setting the signing_key information.197exactly the same procedure for setting the signing_key information.
198198
199 >>> import os199 >>> import os
@@ -300,7 +300,7 @@ Default PPAs are always created first and thus get their keys generated
300before the named-ppa for the same owner. We submit the named-ppa to300before the named-ppa for the same owner. We submit the named-ppa to
301the key generation procedure, as it would be normally in production.301the key generation procedure, as it would be normally in production.
302302
303 >>> named_ppa_signing_key = IArchiveSigningKey(named_ppa)303 >>> named_ppa_signing_key = IArchiveGPGSigningKey(named_ppa)
304 >>> named_ppa_signing_key.generateSigningKey()304 >>> named_ppa_signing_key.generateSigningKey()
305305
306Instead of generating a new key, the signing key from the default ppa306Instead of generating a new key, the signing key from the default ppa
@@ -348,7 +348,7 @@ in the default PPA context then propagated to the named-ppa. The key is
348named after the user, even if the default PPA name is something different.348named after the user, even if the default PPA name is something different.
349349
350 >>> cprov.display_name = "Not Celso Providelo"350 >>> cprov.display_name = "Not Celso Providelo"
351 >>> named_ppa_signing_key = IArchiveSigningKey(named_ppa)351 >>> named_ppa_signing_key = IArchiveGPGSigningKey(named_ppa)
352 >>> named_ppa_signing_key.generateSigningKey()352 >>> named_ppa_signing_key.generateSigningKey()
353 Generating: Launchpad PPA for Not Celso Providelo353 Generating: Launchpad PPA for Not Celso Providelo
354354
@@ -366,7 +366,7 @@ Restore the original functionality of GPGHandler.
366Signing PPA repository366Signing PPA repository
367----------------------367----------------------
368368
369`IArchiveSigningKey.signRepository` can be user to sign repositories369`IArchiveGPGSigningKey.signRepository` can be user to sign repositories
370for archive which already contains a 'signing_key'.370for archive which already contains a 'signing_key'.
371371
372Celso's default PPA will uses the testing signing key.372Celso's default PPA will uses the testing signing key.
diff --git a/lib/lp/archivepublisher/tests/test_archivesigningkey.py b/lib/lp/archivepublisher/tests/test_archivegpgsigningkey.py
373similarity index 95%373similarity index 95%
374rename from lib/lp/archivepublisher/tests/test_archivesigningkey.py374rename from lib/lp/archivepublisher/tests/test_archivesigningkey.py
375rename to lib/lp/archivepublisher/tests/test_archivegpgsigningkey.py375rename to lib/lp/archivepublisher/tests/test_archivegpgsigningkey.py
index a394823..47600b6 100644
--- a/lib/lp/archivepublisher/tests/test_archivesigningkey.py
+++ b/lib/lp/archivepublisher/tests/test_archivegpgsigningkey.py
@@ -1,7 +1,7 @@
1# Copyright 2016-2019 Canonical Ltd. This software is licensed under the1# Copyright 2016-2019 Canonical Ltd. This software is licensed under the
2# GNU Affero General Public License version 3 (see the file LICENSE).2# GNU Affero General Public License version 3 (see the file LICENSE).
33
4"""Test ArchiveSigningKey."""4"""Test ArchiveGPGSigningKey."""
55
6from __future__ import absolute_import, print_function, unicode_literals6from __future__ import absolute_import, print_function, unicode_literals
77
@@ -16,8 +16,8 @@ from twisted.internet import defer
16from zope.component import getUtility16from zope.component import getUtility
1717
18from lp.archivepublisher.config import getPubConfig18from lp.archivepublisher.config import getPubConfig
19from lp.archivepublisher.interfaces.archivesigningkey import (19from lp.archivepublisher.interfaces.archivegpgsigningkey import (
20 IArchiveSigningKey,20 IArchiveGPGSigningKey,
21 ISignableArchive,21 ISignableArchive,
22 )22 )
23from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet23from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet
@@ -51,7 +51,7 @@ class TestSignableArchiveWithSigningKey(TestCaseWithFactory):
51 with InProcessKeyServerFixture() as keyserver:51 with InProcessKeyServerFixture() as keyserver:
52 yield keyserver.start()52 yield keyserver.start()
53 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')53 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
54 yield IArchiveSigningKey(self.archive).setSigningKey(54 yield IArchiveGPGSigningKey(self.archive).setSigningKey(
55 key_path, async_keyserver=True)55 key_path, async_keyserver=True)
5656
57 def test_signFile_absolute_within_archive(self):57 def test_signFile_absolute_within_archive(self):
diff --git a/lib/lp/archivepublisher/tests/test_customupload.py b/lib/lp/archivepublisher/tests/test_customupload.py
index a5f8a89..43a88db 100644
--- a/lib/lp/archivepublisher/tests/test_customupload.py
+++ b/lib/lp/archivepublisher/tests/test_customupload.py
@@ -33,8 +33,8 @@ from lp.archivepublisher.customupload import (
33 CustomUploadTarballBadSymLink,33 CustomUploadTarballBadSymLink,
34 CustomUploadTarballInvalidFileType,34 CustomUploadTarballInvalidFileType,
35 )35 )
36from lp.archivepublisher.interfaces.archivesigningkey import (36from lp.archivepublisher.interfaces.archivegpgsigningkey import (
37 IArchiveSigningKey,37 IArchiveGPGSigningKey,
38 )38 )
39from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet39from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet
40from lp.archivepublisher.tests.test_run_parts import RunPartsMixin40from lp.archivepublisher.tests.test_run_parts import RunPartsMixin
@@ -260,7 +260,7 @@ class TestSigning(TestCaseWithFactory, RunPartsMixin):
260 self.assertIsNone(self.archive.signing_key)260 self.assertIsNone(self.archive.signing_key)
261 self.useFixture(InProcessKeyServerFixture()).start()261 self.useFixture(InProcessKeyServerFixture()).start()
262 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')262 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
263 yield IArchiveSigningKey(self.archive).setSigningKey(263 yield IArchiveGPGSigningKey(self.archive).setSigningKey(
264 key_path, async_keyserver=True)264 key_path, async_keyserver=True)
265 self.assertIsNotNone(self.archive.signing_key)265 self.assertIsNotNone(self.archive.signing_key)
266 custom_processor = CustomUpload()266 custom_processor = CustomUpload()
@@ -280,7 +280,8 @@ class TestSigning(TestCaseWithFactory, RunPartsMixin):
280 write_file(filename, b"contents")280 write_file(filename, b"contents")
281 self.assertIsNone(self.archive.signing_key)281 self.assertIsNone(self.archive.signing_key)
282 run_parts_fixture = self.useFixture(MonkeyPatch(282 run_parts_fixture = self.useFixture(MonkeyPatch(
283 "lp.archivepublisher.archivesigningkey.run_parts", FakeMethod()))283 "lp.archivepublisher.archivegpgsigningkey.run_parts",
284 FakeMethod()))
284 custom_processor = CustomUpload()285 custom_processor = CustomUpload()
285 custom_processor.sign(self.archive, "suite", filename)286 custom_processor.sign(self.archive, "suite", filename)
286 args, kwargs = run_parts_fixture.new_value.calls[0]287 args, kwargs = run_parts_fixture.new_value.calls[0]
diff --git a/lib/lp/archivepublisher/tests/test_publishdistro.py b/lib/lp/archivepublisher/tests/test_publishdistro.py
index d81421e..3d6d699 100644
--- a/lib/lp/archivepublisher/tests/test_publishdistro.py
+++ b/lib/lp/archivepublisher/tests/test_publishdistro.py
@@ -24,8 +24,8 @@ from zope.security.proxy import removeSecurityProxy
2424
25from lp.app.interfaces.launchpad import ILaunchpadCelebrities25from lp.app.interfaces.launchpad import ILaunchpadCelebrities
26from lp.archivepublisher.config import getPubConfig26from lp.archivepublisher.config import getPubConfig
27from lp.archivepublisher.interfaces.archivesigningkey import (27from lp.archivepublisher.interfaces.archivegpgsigningkey import (
28 IArchiveSigningKey,28 IArchiveGPGSigningKey,
29 )29 )
30from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet30from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet
31from lp.archivepublisher.publishing import Publisher31from lp.archivepublisher.publishing import Publisher
@@ -256,7 +256,7 @@ class TestPublishDistro(TestNativePublishingBase):
256 self.setUpRequireSigningKeys()256 self.setUpRequireSigningKeys()
257 yield self.useFixture(InProcessKeyServerFixture()).start()257 yield self.useFixture(InProcessKeyServerFixture()).start()
258 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')258 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
259 yield IArchiveSigningKey(cprov.archive).setSigningKey(259 yield IArchiveGPGSigningKey(cprov.archive).setSigningKey(
260 key_path, async_keyserver=True)260 key_path, async_keyserver=True)
261 name16.archive.signing_key_owner = cprov.archive.signing_key_owner261 name16.archive.signing_key_owner = cprov.archive.signing_key_owner
262 name16.archive.signing_key_fingerprint = (262 name16.archive.signing_key_fingerprint = (
@@ -308,7 +308,7 @@ class TestPublishDistro(TestNativePublishingBase):
308 self.setUpRequireSigningKeys()308 self.setUpRequireSigningKeys()
309 yield self.useFixture(InProcessKeyServerFixture()).start()309 yield self.useFixture(InProcessKeyServerFixture()).start()
310 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')310 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
311 yield IArchiveSigningKey(private_ppa).setSigningKey(311 yield IArchiveGPGSigningKey(private_ppa).setSigningKey(
312 key_path, async_keyserver=True)312 key_path, async_keyserver=True)
313313
314 # Try a plain PPA run, to ensure the private one is NOT published.314 # Try a plain PPA run, to ensure the private one is NOT published.
@@ -413,7 +413,7 @@ class TestPublishDistro(TestNativePublishingBase):
413 self.setUpRequireSigningKeys()413 self.setUpRequireSigningKeys()
414 yield self.useFixture(InProcessKeyServerFixture()).start()414 yield self.useFixture(InProcessKeyServerFixture()).start()
415 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')415 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
416 yield IArchiveSigningKey(archive).setSigningKey(416 yield IArchiveGPGSigningKey(archive).setSigningKey(
417 key_path, async_keyserver=True)417 key_path, async_keyserver=True)
418418
419 self.layer.txn.commit()419 self.layer.txn.commit()
diff --git a/lib/lp/archivepublisher/tests/test_publisher.py b/lib/lp/archivepublisher/tests/test_publisher.py
index ec60e1f..8fd5616 100644
--- a/lib/lp/archivepublisher/tests/test_publisher.py
+++ b/lib/lp/archivepublisher/tests/test_publisher.py
@@ -67,8 +67,8 @@ from zope.security.proxy import removeSecurityProxy
6767
68from lp.archivepublisher.config import getPubConfig68from lp.archivepublisher.config import getPubConfig
69from lp.archivepublisher.diskpool import DiskPool69from lp.archivepublisher.diskpool import DiskPool
70from lp.archivepublisher.interfaces.archivesigningkey import (70from lp.archivepublisher.interfaces.archivegpgsigningkey import (
71 IArchiveSigningKey,71 IArchiveGPGSigningKey,
72 )72 )
73from lp.archivepublisher.publishing import (73from lp.archivepublisher.publishing import (
74 BY_HASH_STAY_OF_EXECUTION,74 BY_HASH_STAY_OF_EXECUTION,
@@ -3211,7 +3211,7 @@ class TestPublisherRepositorySignatures(
32113211
3212 # Set a signing key for Celso's PPA.3212 # Set a signing key for Celso's PPA.
3213 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')3213 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
3214 yield IArchiveSigningKey(cprov.archive).setSigningKey(3214 yield IArchiveGPGSigningKey(cprov.archive).setSigningKey(
3215 key_path, async_keyserver=True)3215 key_path, async_keyserver=True)
3216 self.assertTrue(cprov.archive.signing_key is not None)3216 self.assertTrue(cprov.archive.signing_key is not None)
32173217
diff --git a/lib/lp/archivepublisher/tests/test_signing.py b/lib/lp/archivepublisher/tests/test_signing.py
index 3966362..efe4ae6 100644
--- a/lib/lp/archivepublisher/tests/test_signing.py
+++ b/lib/lp/archivepublisher/tests/test_signing.py
@@ -34,8 +34,8 @@ from lp.archivepublisher.customupload import (
34 CustomUploadAlreadyExists,34 CustomUploadAlreadyExists,
35 CustomUploadBadUmask,35 CustomUploadBadUmask,
36 )36 )
37from lp.archivepublisher.interfaces.archivesigningkey import (37from lp.archivepublisher.interfaces.archivegpgsigningkey import (
38 IArchiveSigningKey,38 IArchiveGPGSigningKey,
39 )39 )
40from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet40from lp.archivepublisher.interfaces.publisherconfig import IPublisherConfigSet
41from lp.archivepublisher.signing import (41from lp.archivepublisher.signing import (
@@ -212,7 +212,7 @@ class TestSigningHelpers(TestCaseWithFactory):
212 with InProcessKeyServerFixture() as keyserver:212 with InProcessKeyServerFixture() as keyserver:
213 yield keyserver.start()213 yield keyserver.start()
214 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')214 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
215 yield IArchiveSigningKey(self.archive).setSigningKey(215 yield IArchiveGPGSigningKey(self.archive).setSigningKey(
216 key_path, async_keyserver=True)216 key_path, async_keyserver=True)
217217
218 def setUpUefiKeys(self, create=True, series=None):218 def setUpUefiKeys(self, create=True, series=None):
@@ -1356,7 +1356,8 @@ class TestSigning(RunPartsMixin, TestSigningHelpers):
1356 # run_parts is called.1356 # run_parts is called.
1357 self.enableRunParts(distribution_name=self.distro.name)1357 self.enableRunParts(distribution_name=self.distro.name)
1358 run_parts_fixture = self.useFixture(MonkeyPatch(1358 run_parts_fixture = self.useFixture(MonkeyPatch(
1359 "lp.archivepublisher.archivesigningkey.run_parts", FakeMethod()))1359 "lp.archivepublisher.archivegpgsigningkey.run_parts",
1360 FakeMethod()))
1360 self.setUpUefiKeys()1361 self.setUpUefiKeys()
1361 self.setUpKmodKeys()1362 self.setUpKmodKeys()
1362 self.setUpOpalKeys()1363 self.setUpOpalKeys()
diff --git a/lib/lp/code/model/tests/test_recipebuilder.py b/lib/lp/code/model/tests/test_recipebuilder.py
index fd96be5..c07fce7 100644
--- a/lib/lp/code/model/tests/test_recipebuilder.py
+++ b/lib/lp/code/model/tests/test_recipebuilder.py
@@ -19,8 +19,8 @@ from twisted.trial.unittest import TestCase as TrialTestCase
19from zope.component import getUtility19from zope.component import getUtility
20from zope.security.proxy import removeSecurityProxy20from zope.security.proxy import removeSecurityProxy
2121
22from lp.archivepublisher.interfaces.archivesigningkey import (22from lp.archivepublisher.interfaces.archivegpgsigningkey import (
23 IArchiveSigningKey,23 IArchiveGPGSigningKey,
24 )24 )
25from lp.buildmaster.enums import BuildStatus25from lp.buildmaster.enums import BuildStatus
26from lp.buildmaster.interactor import BuilderInteractor26from lp.buildmaster.interactor import BuilderInteractor
@@ -347,7 +347,7 @@ class TestAsyncRecipeBuilder(TestRecipeBuilderBase):
347 yield self.useFixture(InProcessKeyServerFixture()).start()347 yield self.useFixture(InProcessKeyServerFixture()).start()
348 archive = self.factory.makeArchive()348 archive = self.factory.makeArchive()
349 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")349 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")
350 yield IArchiveSigningKey(archive).setSigningKey(350 yield IArchiveGPGSigningKey(archive).setSigningKey(
351 key_path, async_keyserver=True)351 key_path, async_keyserver=True)
352 job = self.makeJob(archive=archive, with_builder=True)352 job = self.makeJob(archive=archive, with_builder=True)
353 distroarchseries = job.build.distroseries.architectures[0]353 distroarchseries = job.build.distroseries.architectures[0]
diff --git a/lib/lp/snappy/tests/test_snapbuildbehaviour.py b/lib/lp/snappy/tests/test_snapbuildbehaviour.py
index 3a506c5..b397bba 100644
--- a/lib/lp/snappy/tests/test_snapbuildbehaviour.py
+++ b/lib/lp/snappy/tests/test_snapbuildbehaviour.py
@@ -54,8 +54,8 @@ from zope.publisher.xmlrpc import TestRequest
54from zope.security.proxy import removeSecurityProxy54from zope.security.proxy import removeSecurityProxy
5555
56from lp.app.enums import InformationType56from lp.app.enums import InformationType
57from lp.archivepublisher.interfaces.archivesigningkey import (57from lp.archivepublisher.interfaces.archivegpgsigningkey import (
58 IArchiveSigningKey,58 IArchiveGPGSigningKey,
59 )59 )
60from lp.buildmaster.enums import (60from lp.buildmaster.enums import (
61 BuildBaseImageType,61 BuildBaseImageType,
@@ -649,7 +649,7 @@ class TestAsyncSnapBuildBehaviour(TestSnapBuildBehaviourBase):
649 yield self.useFixture(InProcessKeyServerFixture()).start()649 yield self.useFixture(InProcessKeyServerFixture()).start()
650 archive = self.factory.makeArchive()650 archive = self.factory.makeArchive()
651 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")651 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")
652 yield IArchiveSigningKey(archive).setSigningKey(652 yield IArchiveGPGSigningKey(archive).setSigningKey(
653 key_path, async_keyserver=True)653 key_path, async_keyserver=True)
654 job = self.makeJob(archive=archive)654 job = self.makeJob(archive=archive)
655 self.factory.makeBinaryPackagePublishingHistory(655 self.factory.makeBinaryPackagePublishingHistory(
diff --git a/lib/lp/soyuz/adapters/tests/test_archivedependencies.py b/lib/lp/soyuz/adapters/tests/test_archivedependencies.py
index dbb2343..7cd3cad 100644
--- a/lib/lp/soyuz/adapters/tests/test_archivedependencies.py
+++ b/lib/lp/soyuz/adapters/tests/test_archivedependencies.py
@@ -20,8 +20,8 @@ from twisted.internet.threads import deferToThread
20from zope.component import getUtility20from zope.component import getUtility
21from zope.security.proxy import removeSecurityProxy21from zope.security.proxy import removeSecurityProxy
2222
23from lp.archivepublisher.interfaces.archivesigningkey import (23from lp.archivepublisher.interfaces.archivegpgsigningkey import (
24 IArchiveSigningKey,24 IArchiveGPGSigningKey,
25 )25 )
26from lp.registry.interfaces.distribution import IDistributionSet26from lp.registry.interfaces.distribution import IDistributionSet
27from lp.registry.interfaces.pocket import PackagePublishingPocket27from lp.registry.interfaces.pocket import PackagePublishingPocket
@@ -174,7 +174,7 @@ class TestSourcesList(TestCaseWithFactory):
174 archive = self.factory.makeArchive(distribution=self.ubuntu, **kwargs)174 archive = self.factory.makeArchive(distribution=self.ubuntu, **kwargs)
175 if signing_key_name is not None:175 if signing_key_name is not None:
176 key_path = os.path.join(gpgkeysdir, "%s.sec" % signing_key_name)176 key_path = os.path.join(gpgkeysdir, "%s.sec" % signing_key_name)
177 yield IArchiveSigningKey(archive).setSigningKey(177 yield IArchiveGPGSigningKey(archive).setSigningKey(
178 key_path, async_keyserver=True)178 key_path, async_keyserver=True)
179 if publish_binary:179 if publish_binary:
180 self.publisher.getPubBinaries(180 self.publisher.getPubBinaries(
diff --git a/lib/lp/soyuz/scripts/ppakeygenerator.py b/lib/lp/soyuz/scripts/ppakeygenerator.py
index 00bebac..c1aa3f6 100644
--- a/lib/lp/soyuz/scripts/ppakeygenerator.py
+++ b/lib/lp/soyuz/scripts/ppakeygenerator.py
@@ -7,8 +7,8 @@ __all__ = [
77
8from zope.component import getUtility8from zope.component import getUtility
99
10from lp.archivepublisher.interfaces.archivesigningkey import (10from lp.archivepublisher.interfaces.archivegpgsigningkey import (
11 IArchiveSigningKey,11 IArchiveGPGSigningKey,
12 )12 )
13from lp.services.scripts.base import (13from lp.services.scripts.base import (
14 LaunchpadCronScript,14 LaunchpadCronScript,
@@ -32,7 +32,7 @@ class PPAKeyGenerator(LaunchpadCronScript):
32 self.logger.info(32 self.logger.info(
33 "Generating signing key for %s (%s)" %33 "Generating signing key for %s (%s)" %
34 (archive.reference, archive.displayname))34 (archive.reference, archive.displayname))
35 archive_signing_key = IArchiveSigningKey(archive)35 archive_signing_key = IArchiveGPGSigningKey(archive)
36 archive_signing_key.generateSigningKey()36 archive_signing_key.generateSigningKey()
37 self.logger.info("Key %s" % archive.signing_key.fingerprint)37 self.logger.info("Key %s" % archive.signing_key.fingerprint)
3838
diff --git a/lib/lp/soyuz/tests/test_archive.py b/lib/lp/soyuz/tests/test_archive.py
index 20b7b2f..8660e70 100644
--- a/lib/lp/soyuz/tests/test_archive.py
+++ b/lib/lp/soyuz/tests/test_archive.py
@@ -37,8 +37,8 @@ from zope.security.proxy import removeSecurityProxy
3737
38from lp.app.errors import NotFoundError38from lp.app.errors import NotFoundError
39from lp.app.interfaces.launchpad import ILaunchpadCelebrities39from lp.app.interfaces.launchpad import ILaunchpadCelebrities
40from lp.archivepublisher.interfaces.archivesigningkey import (40from lp.archivepublisher.interfaces.archivegpgsigningkey import (
41 IArchiveSigningKey,41 IArchiveGPGSigningKey,
42 )42 )
43from lp.buildmaster.enums import (43from lp.buildmaster.enums import (
44 BuildQueueStatus,44 BuildQueueStatus,
@@ -1827,7 +1827,7 @@ class TestArchiveDependencies(TestCaseWithFactory):
1827 with InProcessKeyServerFixture() as keyserver:1827 with InProcessKeyServerFixture() as keyserver:
1828 yield keyserver.start()1828 yield keyserver.start()
1829 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')1829 key_path = os.path.join(gpgkeysdir, 'ppa-sample@canonical.com.sec')
1830 yield IArchiveSigningKey(p3a).setSigningKey(1830 yield IArchiveGPGSigningKey(p3a).setSigningKey(
1831 key_path, async_keyserver=True)1831 key_path, async_keyserver=True)
1832 dependency = self.factory.makeArchive(1832 dependency = self.factory.makeArchive(
1833 name='dependency', private=True, owner=p3a.owner)1833 name='dependency', private=True, owner=p3a.owner)
diff --git a/lib/lp/soyuz/tests/test_binarypackagebuildbehaviour.py b/lib/lp/soyuz/tests/test_binarypackagebuildbehaviour.py
index 61e4847..cc08bc5 100644
--- a/lib/lp/soyuz/tests/test_binarypackagebuildbehaviour.py
+++ b/lib/lp/soyuz/tests/test_binarypackagebuildbehaviour.py
@@ -22,8 +22,8 @@ from zope.component import getUtility
22from zope.security.proxy import removeSecurityProxy22from zope.security.proxy import removeSecurityProxy
2323
24from lp.archivepublisher.diskpool import poolify24from lp.archivepublisher.diskpool import poolify
25from lp.archivepublisher.interfaces.archivesigningkey import (25from lp.archivepublisher.interfaces.archivegpgsigningkey import (
26 IArchiveSigningKey,26 IArchiveGPGSigningKey,
27 )27 )
28from lp.buildmaster.enums import (28from lp.buildmaster.enums import (
29 BuilderCleanStatus,29 BuilderCleanStatus,
@@ -354,7 +354,7 @@ class TestBinaryBuildPackageBehaviour(TestCaseWithFactory):
354 archive = self.factory.makeArchive()354 archive = self.factory.makeArchive()
355 builder = self.factory.makeBuilder()355 builder = self.factory.makeBuilder()
356 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")356 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")
357 yield IArchiveSigningKey(archive).setSigningKey(357 yield IArchiveGPGSigningKey(archive).setSigningKey(
358 key_path, async_keyserver=True)358 key_path, async_keyserver=True)
359 build = self.factory.makeBinaryPackageBuild(archive=archive)359 build = self.factory.makeBinaryPackageBuild(archive=archive)
360 self.factory.makeBinaryPackagePublishingHistory(360 self.factory.makeBinaryPackagePublishingHistory(
diff --git a/lib/lp/soyuz/tests/test_livefsbuildbehaviour.py b/lib/lp/soyuz/tests/test_livefsbuildbehaviour.py
index 29e697e..95e9694 100644
--- a/lib/lp/soyuz/tests/test_livefsbuildbehaviour.py
+++ b/lib/lp/soyuz/tests/test_livefsbuildbehaviour.py
@@ -20,8 +20,8 @@ from twisted.trial.unittest import TestCase as TrialTestCase
20from zope.component import getUtility20from zope.component import getUtility
21from zope.security.proxy import Proxy21from zope.security.proxy import Proxy
2222
23from lp.archivepublisher.interfaces.archivesigningkey import (23from lp.archivepublisher.interfaces.archivegpgsigningkey import (
24 IArchiveSigningKey,24 IArchiveGPGSigningKey,
25 )25 )
26from lp.buildmaster.enums import (26from lp.buildmaster.enums import (
27 BuildBaseImageType,27 BuildBaseImageType,
@@ -247,7 +247,7 @@ class TestAsyncLiveFSBuildBehaviour(TestLiveFSBuildBehaviourBase):
247 yield self.useFixture(InProcessKeyServerFixture()).start()247 yield self.useFixture(InProcessKeyServerFixture()).start()
248 archive = self.factory.makeArchive()248 archive = self.factory.makeArchive()
249 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")249 key_path = os.path.join(gpgkeysdir, "ppa-sample@canonical.com.sec")
250 yield IArchiveSigningKey(archive).setSigningKey(250 yield IArchiveGPGSigningKey(archive).setSigningKey(
251 key_path, async_keyserver=True)251 key_path, async_keyserver=True)
252 job = self.makeJob(archive=archive, with_builder=True)252 job = self.makeJob(archive=archive, with_builder=True)
253 self.factory.makeBinaryPackagePublishingHistory(253 self.factory.makeBinaryPackagePublishingHistory(