From: David Bremner <david@tethera.net>
Date: Thu, 8 Sep 2016 12:03:15 +0000 (-0300)
Subject: test/crypto: hard code fingerprint
X-Git-Tag: 0.22.2~3
X-Git-Url: https://git.cworth.org/git?a=commitdiff_plain;h=7edded2740603eb9cde84f2c7b421026fbac3640;p=notmuch-old

test/crypto: hard code fingerprint

Originally the intent was to make the test more robust against changing
test keys. It turns out that (unscientifically) gpg --with-colons output
changes more often than our test key. Rather than making the script more
complex, just hard code the fingerprint.

This fixes Debian bug #847013; I expect similar test failures as other
distros adopt gnupg 2.1.15
---

diff --git a/test/T350-crypto.sh b/test/T350-crypto.sh
index 3656cce9..96349fa0 100755
--- a/test/T350-crypto.sh
+++ b/test/T350-crypto.sh
@@ -25,8 +25,8 @@ add_gnupg_home ()
 ##################################################
 
 add_gnupg_home
-# get key fingerprint
-FINGERPRINT=$(gpg --no-tty --list-secret-keys --with-colons --fingerprint | grep '^fpr:' | cut -d: -f10)
+# Change this if we ship a new test key
+FINGERPRINT="5AEAB11F5E33DCE875DDB75B6D92612D94E46381"
 
 test_expect_success 'emacs delivery of signed message' \
 'emacs_fcc_message \