diff options
| author | Carl Hetherington <cth@carlh.net> | 2023-01-29 00:07:10 +0100 |
|---|---|---|
| committer | Carl Hetherington <cth@carlh.net> | 2023-02-11 22:26:38 +0100 |
| commit | e18630852de1ac02c23c74cbe7643845b6f4bd17 (patch) | |
| tree | 9860c35db04509b5edf818d4ad6667b0c59651de /test | |
| parent | 6ca8f63ff524330bf58877ffe963466495e46758 (diff) | |
Cleanup: extract encrypt() call from Film::make_kdm().
Diffstat (limited to 'test')
| -rw-r--r-- | test/atmos_test.cc | 15 | ||||
| -rw-r--r-- | test/dcp_decoder_test.cc | 13 | ||||
| -rw-r--r-- | test/dcp_digest_file_test.cc | 14 | ||||
| -rw-r--r-- | test/encryption_test.cc | 15 | ||||
| -rw-r--r-- | test/import_dcp_test.cc | 14 | ||||
| -rw-r--r-- | test/remake_id_test.cc | 15 | ||||
| -rw-r--r-- | test/vf_kdm_test.cc | 25 |
7 files changed, 36 insertions, 75 deletions
diff --git a/test/atmos_test.cc b/test/atmos_test.cc index c2b0cb6d8..170736825 100644 --- a/test/atmos_test.cc +++ b/test/atmos_test.cc @@ -74,16 +74,11 @@ BOOST_AUTO_TEST_CASE (atmos_encrypted_passthrough_test) BOOST_REQUIRE (!mxf_atmos_files_same(ref, dcp_file(film, "atmos"))); - auto kdm = film->make_kdm ( - Config::instance()->decryption_chain()->leaf(), - vector<string>(), - dcp_file(film, "cpl"), - dcp::LocalTime(), - dcp::LocalTime(), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - false, - optional<int>() - ); + auto signer = Config::instance()->signer_chain(); + BOOST_REQUIRE(signer->valid()); + + auto const decrypted_kdm = film->make_kdm(dcp_file(film, "cpl"), dcp::LocalTime(), dcp::LocalTime()); + auto const kdm = decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, false, {}); auto content2 = make_shared<DCPContent>(film->dir(film->dcp_name())); content2->add_kdm (kdm); diff --git a/test/dcp_decoder_test.cc b/test/dcp_decoder_test.cc index c9474b998..a37b60ee8 100644 --- a/test/dcp_decoder_test.cc +++ b/test/dcp_decoder_test.cc @@ -69,16 +69,11 @@ BOOST_AUTO_TEST_CASE (check_reuse_old_data_test) dcp::DCP encrypted_dcp (encrypted->dir(encrypted->dcp_name())); encrypted_dcp.read (); - auto kdm = encrypted->make_kdm ( - Config::instance()->decryption_chain()->leaf(), - vector<string>(), - encrypted_dcp.cpls().front()->file().get(), - dcp::LocalTime ("2030-07-21T00:00:00+00:00"), - dcp::LocalTime ("2031-07-21T00:00:00+00:00"), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - true, 0 - ); + auto signer = Config::instance()->signer_chain(); + BOOST_REQUIRE(signer->valid()); + auto const decrypted_kdm = encrypted->make_kdm(encrypted_dcp.cpls().front()->file().get(), dcp::LocalTime ("2030-07-21T00:00:00+00:00"), dcp::LocalTime ("2031-07-21T00:00:00+00:00")); + auto const kdm = decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, 0); /* Add just the OV to a new project, move it around a bit and check that the _reels get reused. diff --git a/test/dcp_digest_file_test.cc b/test/dcp_digest_file_test.cc index 16fe4a5bb..d67c734c1 100644 --- a/test/dcp_digest_file_test.cc +++ b/test/dcp_digest_file_test.cc @@ -80,15 +80,11 @@ BOOST_AUTO_TEST_CASE (dcp_digest_file_test2) auto ov_cpl = find_cpl.cpls()[0]->file(); BOOST_REQUIRE (static_cast<bool>(ov_cpl)); - auto kdm = ov->make_kdm ( - Config::instance()->decryption_chain()->leaf(), - {}, - ov_cpl.get(), - dcp::LocalTime(), dcp::LocalTime(), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - true, - 0 - ); + auto signer = Config::instance()->signer_chain(); + BOOST_REQUIRE(signer->valid()); + + auto decrypted_kdm = ov->make_kdm(ov_cpl.get(), dcp::LocalTime(), dcp::LocalTime()); + auto kdm = decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, 0); auto ov_dcp = make_shared<DCPContent>(ov->dir(ov->dcp_name())); ov_dcp->add_kdm (kdm); diff --git a/test/encryption_test.cc b/test/encryption_test.cc index b7703f4e9..9cadd087e 100644 --- a/test/encryption_test.cc +++ b/test/encryption_test.cc @@ -55,16 +55,11 @@ BOOST_AUTO_TEST_CASE (smpte_dcp_with_subtitles_can_be_decrypted) auto cpl = dcp.cpls()[0]; BOOST_REQUIRE (cpl->file()); - auto kdm = film->make_kdm ( - Config::instance()->decryption_chain()->leaf(), - {}, - *cpl->file(), - dcp::LocalTime(), - dcp::LocalTime(), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - true, - 0 - ); + auto signer = Config::instance()->signer_chain(); + BOOST_REQUIRE(signer->valid()); + + auto const decrypted_kdm = film->make_kdm(*cpl->file(), dcp::LocalTime(), dcp::LocalTime()); + auto const kdm = decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, 0); auto dcp_content = make_shared<DCPContent>(film->dir(film->dcp_name())); dcp_content->add_kdm (kdm); diff --git a/test/import_dcp_test.cc b/test/import_dcp_test.cc index e4545b7b0..acac79051 100644 --- a/test/import_dcp_test.cc +++ b/test/import_dcp_test.cc @@ -74,15 +74,11 @@ BOOST_AUTO_TEST_CASE (import_dcp_test) Config::instance()->set_decryption_chain (make_shared<dcp::CertificateChain>(openssl_path(), CERTIFICATE_VALIDITY_PERIOD)); - auto kdm = A->make_kdm ( - Config::instance()->decryption_chain()->leaf (), - vector<string>(), - A_dcp.cpls().front()->file().get(), - dcp::LocalTime ("2030-07-21T00:00:00+00:00"), - dcp::LocalTime ("2031-07-21T00:00:00+00:00"), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - true, 0 - ); + auto signer = Config::instance()->signer_chain(); + BOOST_REQUIRE(signer->valid()); + + auto const decrypted_kdm = A->make_kdm(A_dcp.cpls().front()->file().get(), dcp::LocalTime ("2030-07-21T00:00:00+00:00"), dcp::LocalTime ("2031-07-21T00:00:00+00:00")); + auto const kdm = decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, 0); auto B = new_test_film ("import_dcp_test2"); B->set_container (Ratio::from_id ("185")); diff --git a/test/remake_id_test.cc b/test/remake_id_test.cc index 0a29f9461..816a43feb 100644 --- a/test/remake_id_test.cc +++ b/test/remake_id_test.cc @@ -84,17 +84,12 @@ BOOST_AUTO_TEST_CASE (remake_id_test2) } BOOST_REQUIRE(cpl); + auto signer = Config::instance()->signer_chain(); + BOOST_REQUIRE(signer->valid()); + /* Make a DKDM */ - auto kdm = film->make_kdm ( - Config::instance()->decryption_chain()->leaf(), - vector<string>(), - *cpl, - dcp::LocalTime ("2030-01-01T01:00:00+00:00"), - dcp::LocalTime ("2031-01-01T01:00:00+00:00"), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - true, - 0 - ); + auto const decrypted_kdm = film->make_kdm(*cpl, dcp::LocalTime ("2030-01-01T01:00:00+00:00"), dcp::LocalTime ("2031-01-01T01:00:00+00:00")); + auto const kdm = decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, 0); /* Import the DCP into a new film */ auto dcp_content = make_shared<DCPContent>(film->dir(film->dcp_name())); diff --git a/test/vf_kdm_test.cc b/test/vf_kdm_test.cc index 259f54031..665cf72a0 100644 --- a/test/vf_kdm_test.cc +++ b/test/vf_kdm_test.cc @@ -68,15 +68,11 @@ BOOST_AUTO_TEST_CASE (vf_kdm_test) Config::instance()->set_decryption_chain (make_shared<dcp::CertificateChain>(openssl_path(), CERTIFICATE_VALIDITY_PERIOD)); - auto A_kdm = A->make_kdm ( - Config::instance()->decryption_chain()->leaf(), - vector<string>(), - A_dcp.cpls().front()->file().get(), - dcp::LocalTime("2030-07-21T00:00:00+00:00"), - dcp::LocalTime("2031-07-21T00:00:00+00:00"), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - true, 0 - ); + auto signer = Config::instance()->signer_chain(); + BOOST_REQUIRE(signer->valid()); + + auto const A_decrypted_kdm = A->make_kdm(A_dcp.cpls().front()->file().get(), dcp::LocalTime("2030-07-21T00:00:00+00:00"), dcp::LocalTime("2031-07-21T00:00:00+00:00")); + auto const A_kdm = A_decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, 0); /* Import A into a new project, with the required KDM, and make a VF that refers to it */ @@ -97,15 +93,8 @@ BOOST_AUTO_TEST_CASE (vf_kdm_test) dcp::DCP B_dcp ("build/test/vf_kdm_test_vf/" + B->dcp_name()); B_dcp.read (); - auto B_kdm = B->make_kdm ( - Config::instance()->decryption_chain()->leaf (), - vector<string>(), - B_dcp.cpls().front()->file().get(), - dcp::LocalTime ("2030-07-21T00:00:00+00:00"), - dcp::LocalTime ("2031-07-21T00:00:00+00:00"), - dcp::Formulation::MODIFIED_TRANSITIONAL_1, - true, 0 - ); + auto const B_decrypted_kdm = B->make_kdm(B_dcp.cpls().front()->file().get(), dcp::LocalTime ("2030-07-21T00:00:00+00:00"), dcp::LocalTime ("2031-07-21T00:00:00+00:00")); + auto const B_kdm = B_decrypted_kdm.encrypt(signer, Config::instance()->decryption_chain()->leaf(), {}, dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, 0); /* Import the OV and VF into a new project with the KDM that was created for the VF. This KDM should decrypt assets from the OV too. |
