Blob Blame History Raw
/* gpgme.js - Javascript integration for gpgme
 * Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik
 *
 * This file is part of GPGME.
 *
 * GPGME is free software; you can redistribute it and/or modify it
 * under the terms of the GNU Lesser General Public License as
 * published by the Free Software Foundation; either version 2.1 of
 * the License, or (at your option) any later version.
 *
 * GPGME is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this program; if not, see <https://www.gnu.org/licenses/>.
 * SPDX-License-Identifier: LGPL-2.1+
 *
 * Author(s):
 *     Maximilian Krambach <mkrambach@intevation.de>
 */

/* global describe, it, expect, before, Gpgmejs */
/* global inputvalues, fixedLengthString, bigString */

describe('Encryption', function () {
    let context = null;
    const good_fpr = inputvalues.encrypt.good.fingerprint;
    before(function (done){
        const prm = Gpgmejs.init({ timeout: 2000 });
        prm.then(function (gpgmejs){
            context = gpgmejs;
            done();
        });
    });

    it('Successful encrypt', function (done) {
        const data = inputvalues.encrypt.good.data;
        context.encrypt({ data: data, publicKeys: good_fpr })
            .then(function (answer) {
                expect(answer).to.not.be.empty;
                expect(answer.data).to.be.a('string');
                expect(answer.data).to.include('BEGIN PGP MESSAGE');
                expect(answer.data).to.include('END PGP MESSAGE');
                done();
            });
    });


    it( 'encrypt with \'armor\': true should returned an armored block',
        function (done){
            const data = bigString(1000);
            context.encrypt({ data: data, publicKeys: good_fpr, armor: true })
                .then(function (answer){
                    expect(answer).to.not.be.empty;
                    expect(answer.data).to.be.a('string');
                    expect(answer.data).to.include('BEGIN PGP MESSAGE');
                    expect(answer.data).to.include('END PGP MESSAGE');
                    expect(answer.format).to.equal('ascii');
                    done();
                });
        });

    it( 'encrypt with \'armor\': false and \'expected\': \'uint8\' returns ' +
    'an Uint8Array', function (done) {
        const data = bigString(1000);
        context.encrypt({
            data: data, publicKeys: good_fpr, armor: false, expect: 'uint8'
        }).then(function (answer){
            expect(answer).to.not.be.empty;
            expect(answer.data).to.be.a('Uint8Array');
            expect(answer.format).to.equal('uint8');
            done();
        });
    });

    it( 'encrypt with \'armor\': false and \'expected\': \'base64\' returns ' +
        'a base64 string', function (done) {
        const data = bigString(1000);
        context.encrypt({
            data: data, publicKeys: good_fpr, armor: false, expect: 'base64'
        }).then(function (answer){
            expect(answer).to.not.be.empty;
            expect(answer.data).to.be.a('string');
            expect(answer.format).to.equal('base64');
            done();
        });
    });

    const sizes = [5,20,50];
    for (let i=0; i < sizes.length; i++) {
        it('Successful encrypt a ' + sizes[i] + 'MB message', function (done) {
            const data = fixedLengthString(sizes[i]);
            context.encrypt({ data: data, publicKeys: good_fpr })
                .then(function (answer) {
                    expect(answer).to.not.be.empty;
                    expect(answer.data).to.be.a('string');
                    expect(answer.data).to.include('BEGIN PGP MESSAGE');
                    expect(answer.data).to.include('END PGP MESSAGE');
                    done();
                });
        }).timeout(20000);
    }

    it('Sending encryption without keys fails', function (done) {
        const data = inputvalues.encrypt.good.data;
        context.encrypt({ data: data }).then(function (answer) {
            expect(answer).to.be.undefined;
        }, function (error){
            expect(error).to.be.an('Error');
            expect(error.code).to.equal('MSG_INCOMPLETE');
            done();
        });
    });

    it('Sending encryption without data fails', function (done) {
        context.encrypt({ data: null, publicKeys: good_fpr })
            .then(function (answer) {
                expect(answer).to.be.undefined;
            }, function (error) {
                expect(error).to.be.an.instanceof(Error);
                expect(error.code).to.equal('MSG_INCOMPLETE');
                done();
            });
    });

    it('Sending encryption with non existing keys fails', function (done) {
        const data = inputvalues.encrypt.good.data;
        const bad_fpr = inputvalues.encrypt.bad.fingerprint;
        context.encrypt({ data:data, publicKeys: bad_fpr })
            .then(function (answer) {
                expect(answer).to.be.undefined;
            }, function (error){
                expect(error).to.be.an('Error');
                expect(error.code).to.not.be.undefined;
                expect(error.code).to.equal('GNUPG_ERROR');
                done();
            });
    }).timeout(5000);

    it('Overly large message ( > 64MB) is rejected', function (done) {
        const data = fixedLengthString(65);
        context.encrypt({ data: data, publicKeys: good_fpr })
            .then(function (answer) {
                expect(answer).to.be.undefined;
            }, function (error){
                expect(error).to.be.an.instanceof(Error);
                // TODO: there is a 64 MB hard limit at least in chrome at:
                // chromium//extensions/renderer/messaging_util.cc:
                // kMaxMessageLength
                // The error will be a browser error, not from gnupg or from
                // this library
                done();
            });
    }).timeout(8000);


});