* tests/openpgp/defs.scm: Add "disable-scdaemon". Remove
"scdaemon-program".
* tests/gpgme/gpgme-defs.scm, tests/gpgsm/gpgsm-defs.scm: Likewise.
* tests/inittests, tests/pkits/inittests: Add "disable-scdaemon"
--
Before this change, running "make check" accesses USB device by
scdaemon on host computer. If there is any smartcard/token available,
it may affect test results. Because default key choice depends on
smartcard/token availability now and existing tests have nothing about
testing smartcard/token, disabling scdaemon is good.
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
(cherry picked from commit
64b7c6fd1945bc206cf56979633dfca8a7494374)
(cherry picked from commit
150d5452318eafa6aa800ff3b87f8f8eb35ed203)
Gbp-Pq: Topic from-2.2.14
Gbp-Pq: Name tests-Add-disable-scdaemon-in-gpg-agent.conf.patch
(create-file
"gpg-agent.conf"
(string-append "pinentry-program " (tool 'pinentry))
- (string-append "scdaemon-program " (tool 'scdaemon))
- )
+ "disable-scdaemon")
(start-agent)
"faked-system-time 1008241200")
(create-file "gpg-agent.conf"
(string-append "pinentry-program " (tool 'pinentry))
- (if (assoc "scdaemon" gpg-components)
- (string-append "scdaemon-program " (tool 'scdaemon))
- "# No scdaemon available")
- )
+ "disable-scdaemon")
(start-agent)
(create-file
"trustlist.txt"
cat > gpg-agent.conf <<EOF
no-grab
pinentry-program /home/wk/work/pinentry/gtk/pinentry-gtk
+disable-scdaemon
EOF
cat > trustlist.txt <<EOF
(if (flag "--extended-key-format" *args*)
"enable-extended-key-format" "#enable-extended-key-format")
(string-append "pinentry-program " (tool 'pinentry))
- (if (assoc "scdaemon" gpg-components)
- (string-append "scdaemon-program " (tool 'scdaemon))
- "# No scdaemon available")
- ))
+ "disable-scdaemon"))
;; Initialize the test environment, install appropriate configuration
;; and start the agent, without any keys.
# Fixme: we need to write a dummy pinentry program
cat > gpg-agent.conf <<EOF
no-grab
+disable-scdaemon
EOF
# Mark the root CA trusted