[trojita] src/Cryptography: GUI: Prevent excessive newlines in the PartStatusWidget crypto messages
Jan Kundrát
jkt at kde.org
Tue Oct 11 11:50:28 UTC 2016
Git commit 654188c2806c376a4c2b9cdf44e48172c2255a18 by Jan Kundrát.
Committed on 03/10/2016 at 20:09.
Pushed by gerrit into branch 'master'.
GUI: Prevent excessive newlines in the PartStatusWidget crypto messages
Previously, there were extra newlines in certain scenarios. The long
text should never begin with a stray newline.
This might make it easier to see the linked bug.
Change-Id: I72188b08f1562b6cdd30849f9958fdcc9f0504b7
CCBUG: 369832
M +44 -21 src/Cryptography/GpgMe++.cpp
http://commits.kde.org/trojita/654188c2806c376a4c2b9cdf44e48172c2255a18
diff --git a/src/Cryptography/GpgMe++.cpp b/src/Cryptography/GpgMe++.cpp
index 54275f7..e2fcdfe 100644
--- a/src/Cryptography/GpgMe++.cpp
+++ b/src/Cryptography/GpgMe++.cpp
@@ -290,6 +290,8 @@ QVariant GpgMePart::data(int role) const
}
}
+#define ENSURE_LINE_LF(X) do { if (!X.isEmpty()) { X += LF; } } while (0)
+
void GpgMePart::extractSignatureStatus(std::shared_ptr<GpgME::Context> ctx, const GpgME::Signature &sig,
const std::vector<std::string> messageUids, const bool wasSigned, const bool wasEncrypted,
bool &sigOkDisregardingTrust, bool &sigValidVerified,
@@ -447,30 +449,38 @@ void GpgMePart::extractSignatureStatus(std::shared_ptr<GpgME::Context> ctx, cons
// extract the individual error bits
if (sig.summary() & GpgME::Signature::KeyRevoked) {
- longStatus += LF + tr("The key or at least one certificate has been revoked.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("The key or at least one certificate has been revoked.");
}
if (sig.summary() & GpgME::Signature::KeyExpired) {
// FIXME: how to get the expiration date?
- longStatus += LF + tr("The key or one of the certificates has expired.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("The key or one of the certificates has expired.");
}
if (sig.summary() & GpgME::Signature::SigExpired) {
- longStatus += LF + tr("Signature expired on %1.")
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Signature expired on %1.")
.arg(QDateTime::fromTime_t(sig.expirationTime()).toString(Qt::DefaultLocaleShortDate));
}
if (sig.summary() & GpgME::Signature::KeyMissing) {
- longStatus += LF + tr("Can't verify due to a missing key or certificate.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Can't verify due to a missing key or certificate.");
}
if (sig.summary() & GpgME::Signature::CrlMissing) {
- longStatus += LF + tr("The CRL (or an equivalent mechanism) is not available.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("The CRL (or an equivalent mechanism) is not available.");
}
if (sig.summary() & GpgME::Signature::CrlTooOld) {
- longStatus += LF + tr("Available CRL is too old.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Available CRL is too old.");
}
if (sig.summary() & GpgME::Signature::BadPolicy) {
- longStatus += LF + tr("A policy requirement was not met.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("A policy requirement was not met.");
}
if (sig.summary() & GpgME::Signature::SysError) {
- longStatus += LF + tr("A system error occurred. %1")
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("A system error occurred. %1")
.arg(QString::fromUtf8(sig.status().asString()));
}
@@ -478,22 +488,28 @@ void GpgMePart::extractSignatureStatus(std::shared_ptr<GpgME::Context> ctx, cons
// Extract signature validity
switch (sig.validity()) {
case GpgME::Signature::Undefined:
- longStatus += LF + tr("Signature validity is undefined.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Signature validity is undefined.");
break;
case GpgME::Signature::Never:
- longStatus += LF + tr("Signature validity is never to be trusted.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Signature validity is never to be trusted.");
break;
case GpgME::Signature::Marginal:
- longStatus += LF + tr("Signature validity is marginal.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Signature validity is marginal.");
break;
case GpgME::Signature::Full:
- longStatus += LF + tr("Signature validity is full.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Signature validity is full.");
break;
case GpgME::Signature::Ultimate:
- longStatus += LF + tr("Signature validity is ultimate.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Signature validity is ultimate.");
break;
case GpgME::Signature::Unknown:
- longStatus += LF + tr("Signature validity is unknown.");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Signature validity is unknown.");
break;
}
}
@@ -844,7 +860,8 @@ void GpgMeEncrypted::handleDataChanged(const QModelIndex &topLeft, const QModelI
if (tldr.isEmpty()) {
tldr = tr("Broken encrypted message");
}
- longStatus += LF + tr("Decryption error: %1").arg(QString::fromUtf8(combinedResult.first.error().asString()));
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Decryption error: %1").arg(QString::fromUtf8(combinedResult.first.error().asString()));
icon = QStringLiteral("emblem-error");
} else if (tldr.isEmpty()) {
tldr = tr("Encrypted message");
@@ -852,29 +869,35 @@ void GpgMeEncrypted::handleDataChanged(const QModelIndex &topLeft, const QModelI
}
if (combinedResult.first.isWrongKeyUsage()) {
- longStatus += LF + tr("Wrong key usage, not for encryption");
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Wrong key usage, not for encryption");
}
if (auto msg = combinedResult.first.unsupportedAlgorithm()) {
- longStatus += LF + tr("Unsupported algorithm: %1").arg(QString::fromUtf8(msg));
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Unsupported algorithm: %1").arg(QString::fromUtf8(msg));
}
for (const auto &recipient: combinedResult.first.recipients()) {
GpgME::Error keyError;
auto key = ctx->key(recipient.keyID(), keyError, false);
if (keyError) {
- longStatus += LF + tr("Cannot extract recipient %1: %2")
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Cannot extract recipient %1: %2")
.arg(QString::fromUtf8(recipient.keyID()), QString::fromUtf8(keyError.asString()));
} else {
if (key.numUserIDs()) {
- longStatus += LF + tr("Encrypted to %1 (%2)")
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Encrypted to %1 (%2)")
.arg(QString::fromUtf8(key.userID(0).id()), QString::fromUtf8(recipient.keyID()));
} else {
- longStatus += LF + tr("Encrypted to %1").arg(QString::fromUtf8(recipient.keyID()));
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Encrypted to %1").arg(QString::fromUtf8(recipient.keyID()));
}
}
}
if (auto fname = combinedResult.first.fileName()) {
- longStatus += LF + tr("Original filename: %1").arg(QString::fromUtf8(fname));
+ ENSURE_LINE_LF(longStatus);
+ longStatus += tr("Original filename: %1").arg(QString::fromUtf8(fname));
}
if (p) {
More information about the kde-doc-english
mailing list