GPG.encoding → GPG._encoding
parent
5b731736fe
commit
87ced52f85
|
@ -103,7 +103,7 @@ class GPGBase(object):
|
|||
encoding = locale.getpreferredencoding()
|
||||
if encoding is None: # This happens on Jython!
|
||||
encoding = sys.stdin.encoding
|
||||
self.encoding = encoding.lower().replace('-', '_')
|
||||
self._encoding = encoding.lower().replace('-', '_')
|
||||
self.filesystemencoding = encodings.normalize_encoding(
|
||||
sys.getfilesystemencoding().lower())
|
||||
|
||||
|
|
|
@ -766,7 +766,7 @@ class Sign(object):
|
|||
__bool__ = __nonzero__
|
||||
|
||||
def __str__(self):
|
||||
return self.data.decode(self.gpg.encoding, self.gpg._decode_errors)
|
||||
return self.data.decode(self.gpg._encoding, self.gpg._decode_errors)
|
||||
|
||||
def handle_status(self, key, value):
|
||||
"""Parse a status code from the attached GnuPG process.
|
||||
|
@ -1101,7 +1101,7 @@ class Crypt(Verify):
|
|||
__bool__ = __nonzero__
|
||||
|
||||
def __str__(self):
|
||||
return self.data.decode(self.gpg.encoding, self.gpg._decode_errors)
|
||||
return self.data.decode(self.gpg._encoding, self.gpg._decode_errors)
|
||||
|
||||
def handle_status(self, key, value):
|
||||
"""Parse a status code from the attached GnuPG process.
|
||||
|
|
30
src/gnupg.py
30
src/gnupg.py
|
@ -339,7 +339,7 @@ use_agent: %s
|
|||
make sure it's joined before returning. If a stdin stream is given,
|
||||
close it before returning.
|
||||
"""
|
||||
stderr = codecs.getreader(self.encoding)(process.stderr)
|
||||
stderr = codecs.getreader(self._encoding)(process.stderr)
|
||||
rr = threading.Thread(target=self._read_response, args=(stderr, result))
|
||||
rr.setDaemon(True)
|
||||
log.debug('stderr reader: %r', rr)
|
||||
|
@ -368,11 +368,11 @@ use_agent: %s
|
|||
"""Handle a call to GPG - pass input data, collect output data."""
|
||||
p = self._open_subprocess(args, passphrase)
|
||||
if not binary:
|
||||
stdin = codecs.getwriter(self.encoding)(p.stdin)
|
||||
stdin = codecs.getwriter(self._encoding)(p.stdin)
|
||||
else:
|
||||
stdin = p.stdin
|
||||
if passphrase:
|
||||
_util._write_passphrase(stdin, passphrase, self.encoding)
|
||||
_util._write_passphrase(stdin, passphrase, self._encoding)
|
||||
writer = _util._threaded_copy_data(file, stdin)
|
||||
self._collect_output(p, result, writer, stdin)
|
||||
return result
|
||||
|
@ -421,7 +421,7 @@ use_agent: %s
|
|||
% (data, kwargs[keyid]))
|
||||
else:
|
||||
log.warn("No 'sign_with' keyid given! Using default key.")
|
||||
stream = _make_binary_stream(data, self.encoding)
|
||||
stream = _make_binary_stream(data, self._encoding)
|
||||
result = self._sign_file(stream, **kwargs)
|
||||
stream.close()
|
||||
|
||||
|
@ -467,7 +467,7 @@ use_agent: %s
|
|||
proc = self._open_subprocess(args, passphrase is not None)
|
||||
try:
|
||||
if passphrase:
|
||||
_util._write_passphrase(proc.stdin, passphrase, self.encoding)
|
||||
_util._write_passphrase(proc.stdin, passphrase, self._encoding)
|
||||
writer = _util._threaded_copy_data(file, proc.stdin)
|
||||
except IOError as ioe:
|
||||
log.exception("Error writing message: %s" % ioe.message)
|
||||
|
@ -490,7 +490,7 @@ use_agent: %s
|
|||
>>> assert verify
|
||||
|
||||
"""
|
||||
f = _make_binary_stream(data, self.encoding)
|
||||
f = _make_binary_stream(data, self._encoding)
|
||||
result = self.verify_file(f)
|
||||
f.close()
|
||||
return result
|
||||
|
@ -575,7 +575,7 @@ use_agent: %s
|
|||
|
||||
result = self._result_map['import'](self)
|
||||
log.info('Importing: %r', key_data[:256])
|
||||
data = _make_binary_stream(key_data, self.encoding)
|
||||
data = _make_binary_stream(key_data, self._encoding)
|
||||
self._handle_io(['--import'], data, result, binary=True)
|
||||
data.close()
|
||||
return result
|
||||
|
@ -593,7 +593,7 @@ use_agent: %s
|
|||
safe_keyserver = _fix_unsafe(keyserver)
|
||||
|
||||
result = self._result_map['import'](self)
|
||||
data = _make_binary_stream("", self.encoding)
|
||||
data = _make_binary_stream("", self._encoding)
|
||||
args = ['--keyserver', keyserver, '--recv-keys']
|
||||
|
||||
if keyids:
|
||||
|
@ -672,7 +672,7 @@ use_agent: %s
|
|||
result = self._result_map['delete'](self) # any result will do
|
||||
self._collect_output(p, result, stdin=p.stdin)
|
||||
log.debug('Exported:%s%r' % (os.linesep, result.data))
|
||||
return result.data.decode(self.encoding, self._decode_errors)
|
||||
return result.data.decode(self._encoding, self._decode_errors)
|
||||
|
||||
def list_keys(self, secret=False):
|
||||
"""List the keys currently in the keyring.
|
||||
|
@ -709,7 +709,7 @@ use_agent: %s
|
|||
# Get the response information
|
||||
result = self._result_map['list'](self)
|
||||
self._collect_output(p, result, stdin=p.stdin)
|
||||
lines = result.data.decode(self.encoding,
|
||||
lines = result.data.decode(self._encoding,
|
||||
self._decode_errors).splitlines()
|
||||
valid_keywords = 'pub uid sec fpr sub'.split()
|
||||
for line in lines:
|
||||
|
@ -730,7 +730,7 @@ use_agent: %s
|
|||
"""List the packet contents of a file."""
|
||||
args = ["--list-packets"]
|
||||
result = self._result_map['packets'](self)
|
||||
self._handle_io(args, _make_binary_stream(raw_data, self.encoding),
|
||||
self._handle_io(args, _make_binary_stream(raw_data, self._encoding),
|
||||
result)
|
||||
return result
|
||||
|
||||
|
@ -781,7 +781,7 @@ use_agent: %s
|
|||
## see TODO file, tag :gen_key: for todo items
|
||||
args = ["--gen-key --batch"]
|
||||
key = self._result_map['generate'](self)
|
||||
f = _make_binary_stream(input, self.encoding)
|
||||
f = _make_binary_stream(input, self._encoding)
|
||||
self._handle_io(args, f, key, binary=True)
|
||||
f.close()
|
||||
|
||||
|
@ -1269,7 +1269,7 @@ generate keys. Please see
|
|||
>>> assert result.fingerprint == print1
|
||||
|
||||
"""
|
||||
stream = _make_binary_stream(data, self.encoding)
|
||||
stream = _make_binary_stream(data, self._encoding)
|
||||
result = self.encrypt_file(stream, recipients, **kwargs)
|
||||
stream.close()
|
||||
return result
|
||||
|
@ -1279,7 +1279,7 @@ generate keys. Please see
|
|||
|
||||
:param message: A string or file-like object to decrypt.
|
||||
"""
|
||||
stream = _make_binary_stream(message, self.encoding)
|
||||
stream = _make_binary_stream(message, self._encoding)
|
||||
result = self.decrypt_file(stream, **kwargs)
|
||||
stream.close()
|
||||
return result
|
||||
|
@ -1349,7 +1349,7 @@ class GPGWrapper(GPG):
|
|||
"""Send keys to a keyserver."""
|
||||
result = self._result_map['list'](self)
|
||||
log.debug('send_keys: %r', keyids)
|
||||
data = _util._make_binary_stream("", self.encoding)
|
||||
data = _util._make_binary_stream("", self._encoding)
|
||||
args = ['--keyserver', keyserver, '--send-keys']
|
||||
args.extend(keyids)
|
||||
self._handle_io(args, data, result, binary=True)
|
||||
|
|
|
@ -554,7 +554,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
|
||||
def test_signature_string_alternate_encoding(self):
|
||||
key = self.generate_key("Nos Oignons", "nos-oignons.net")
|
||||
self.gpg.encoding = 'latin-1'
|
||||
self.gpg._encoding = 'latin-1'
|
||||
message = "Mêle-toi de tes oignons"
|
||||
sig = self.gpg.sign(message, default_key=key.fingerprint,
|
||||
passphrase='nosoignons')
|
||||
|
@ -603,7 +603,7 @@ class GPGTestCase(unittest.TestCase):
|
|||
passphrase='johanborst')
|
||||
self.assertTrue(sig, "Good passphrase should succeed")
|
||||
try:
|
||||
file = _util._make_binary_stream(sig.data, self.gpg.encoding)
|
||||
file = _util._make_binary_stream(sig.data, self.gpg._encoding)
|
||||
verified = self.gpg.verify_file(file)
|
||||
except UnicodeDecodeError: #happens in Python 2.6
|
||||
verified = self.gpg.verify_file(io.BytesIO(sig.data))
|
||||
|
@ -686,12 +686,12 @@ authentication."""
|
|||
gentry = str(key.fingerprint)
|
||||
key = self.generate_key("Marten van Dijk", "xorr.ox")
|
||||
dijk = str(key.fingerprint)
|
||||
self.gpg.encoding = 'latin-1'
|
||||
self.gpg._encoding = 'latin-1'
|
||||
if _util._py3k:
|
||||
data = 'Hello, André!'
|
||||
else:
|
||||
data = unicode('Hello, André', self.gpg.encoding)
|
||||
data = data.encode(self.gpg.encoding)
|
||||
data = unicode('Hello, André', self.gpg._encoding)
|
||||
data = data.encode(self.gpg._encoding)
|
||||
encrypted = self.gpg.encrypt(data, gentry)
|
||||
edata = str(encrypted.data)
|
||||
self.assertNotEqual(data, edata)
|
||||
|
@ -868,7 +868,7 @@ authentication."""
|
|||
fdata = enc2.read()
|
||||
ddata = str(self.gpg.decrypt(fdata, passphrase="overalls"))
|
||||
|
||||
data = data.encode(self.gpg.encoding)
|
||||
data = data.encode(self.gpg._encoding)
|
||||
if ddata != data:
|
||||
log.debug("data was: %r" % data)
|
||||
log.debug("new (from filehandle): %r" % fdata)
|
||||
|
|
Loading…
Reference in New Issue