2018-04-18 14:38:06 +00:00
|
|
|
/* gpgme.js - Javascript integration for gpgme
|
|
|
|
* Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik
|
|
|
|
*
|
|
|
|
* This file is part of GPGME.
|
|
|
|
*
|
|
|
|
* GPGME is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU Lesser General Public License as
|
|
|
|
* published by the Free Software Foundation; either version 2.1 of
|
|
|
|
* the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GPGME is distributed in the hope that it will be useful, but
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
2018-10-18 03:56:27 +00:00
|
|
|
* License along with this program; if not, see <https://www.gnu.org/licenses/>.
|
2018-04-18 14:38:06 +00:00
|
|
|
* SPDX-License-Identifier: LGPL-2.1+
|
2018-06-06 11:05:53 +00:00
|
|
|
*
|
|
|
|
* Author(s):
|
|
|
|
* Maximilian Krambach <mkrambach@intevation.de>
|
2018-04-18 14:38:06 +00:00
|
|
|
*/
|
2018-04-10 09:33:14 +00:00
|
|
|
|
2018-06-06 11:05:53 +00:00
|
|
|
|
2018-07-27 18:36:21 +00:00
|
|
|
import { GPGME_Message, createMessage } from './Message';
|
|
|
|
import { toKeyIdArray } from './Helpers';
|
2018-06-06 11:05:53 +00:00
|
|
|
import { gpgme_error } from './Errors';
|
|
|
|
import { GPGME_Keyring } from './Keyring';
|
2018-06-14 10:15:51 +00:00
|
|
|
import { createSignature } from './Signature';
|
2018-04-18 14:38:06 +00:00
|
|
|
|
2018-07-10 12:32:26 +00:00
|
|
|
/**
|
|
|
|
* @typedef {Object} decrypt_result
|
2018-09-05 16:46:28 +00:00
|
|
|
* @property {String|Uint8Array} data The decrypted data.
|
2018-08-22 17:07:05 +00:00
|
|
|
* @property {String} format Indicating how the data was converted after being
|
2018-09-05 16:46:28 +00:00
|
|
|
* received from gpgme:
|
|
|
|
* <pre>
|
2018-08-27 11:24:18 +00:00
|
|
|
* 'ascii': Data was ascii-encoded and no further processed
|
2018-08-22 17:07:05 +00:00
|
|
|
* 'string': Data was decoded into an utf-8 string,
|
|
|
|
* 'base64': Data was not processed and is a base64 string
|
|
|
|
* 'uint8': data was turned into a Uint8Array
|
2018-09-05 16:46:28 +00:00
|
|
|
* </pre>
|
|
|
|
* @property {Boolean} is_mime (optional) the data claims to be a MIME object.
|
2018-07-10 12:32:26 +00:00
|
|
|
* @property {String} file_name (optional) the original file name
|
|
|
|
* @property {signatureDetails} signatures Verification details for
|
|
|
|
* signatures
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @typedef {Object} signatureDetails
|
2018-09-05 16:46:28 +00:00
|
|
|
* @property {Boolean} all_valid Quick summary. True if all signatures are
|
|
|
|
* fully valid according to gnupg.
|
|
|
|
* @property {Number} count Number of signatures parsed.
|
|
|
|
* @property {Number} failures Number of signatures not passing as valid. This
|
|
|
|
* may imply bad signatures, or signatures with e.g. the public Key not being
|
|
|
|
* available.
|
|
|
|
* @property {GPGME_Signature[]} signatures.good Array of all signatures
|
|
|
|
* considered valid.
|
|
|
|
* @property {GPGME_Signature[]} signatures.bad All invalid signatures.
|
2018-07-10 12:32:26 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
2018-09-05 16:46:28 +00:00
|
|
|
* @typedef {Object} encrypt_result The result of an encrypt operation,
|
|
|
|
* containing the encrypted data and some additional information.
|
|
|
|
* @property {String} data The encrypted message.
|
2018-08-27 09:50:09 +00:00
|
|
|
* @property {String} format Indicating how the data was converted after being
|
|
|
|
* received from gpgme.
|
2018-09-05 16:46:28 +00:00
|
|
|
* <pre>
|
2018-08-27 09:50:09 +00:00
|
|
|
* 'ascii': Data was ascii-encoded and no further processed
|
|
|
|
* 'string': Data was decoded into an utf-8 string,
|
|
|
|
* 'base64': Data was not processed and is a base64 string
|
|
|
|
* 'uint8': Data was turned into a Uint8Array
|
2018-09-05 16:46:28 +00:00
|
|
|
* </pre>
|
2018-07-10 12:32:26 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @typedef { GPGME_Key | String | Object } inputKeys
|
|
|
|
* Accepts different identifiers of a gnupg Key that can be parsed by
|
|
|
|
* {@link toKeyIdArray}. Expected inputs are: One or an array of
|
|
|
|
* GPGME_Keys; one or an array of fingerprint strings; one or an array of
|
|
|
|
* openpgpjs Key objects.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @typedef {Object} signResult The result of a signing operation
|
|
|
|
* @property {String} data The resulting data. Includes the signature in
|
|
|
|
* clearsign mode
|
2018-09-05 16:46:28 +00:00
|
|
|
* @property {String} signature The detached signature (only present in in
|
|
|
|
* detached mode)
|
2018-07-10 12:32:26 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
/** @typedef {Object} verifyResult The result of a verification
|
|
|
|
* @property {Boolean} data: The verified data
|
|
|
|
* @property {Boolean} is_mime (optional) the data claims to be a MIME
|
|
|
|
* object.
|
|
|
|
* @property {signatureDetails} signatures Verification details for
|
|
|
|
* signatures
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* The main entry point for gpgme.js.
|
|
|
|
* @class
|
|
|
|
*/
|
2018-04-18 14:38:06 +00:00
|
|
|
export class GpgME {
|
2018-07-10 12:32:26 +00:00
|
|
|
|
2018-08-20 13:12:01 +00:00
|
|
|
constructor (){
|
2018-08-20 10:12:43 +00:00
|
|
|
this._Keyring = null;
|
|
|
|
}
|
2018-04-10 09:33:14 +00:00
|
|
|
|
2018-08-20 13:12:01 +00:00
|
|
|
set Keyring (keyring){
|
2018-08-20 10:12:43 +00:00
|
|
|
if (keyring && keyring instanceof GPGME_Keyring){
|
|
|
|
this._Keyring = keyring;
|
|
|
|
}
|
|
|
|
}
|
2018-09-05 16:46:28 +00:00
|
|
|
|
2018-08-20 10:12:43 +00:00
|
|
|
/**
|
2018-09-05 16:46:28 +00:00
|
|
|
* Accesses the {@link GPGME_Keyring}. From the Keyring, all Keys can be
|
|
|
|
* accessed.
|
2018-08-20 10:12:43 +00:00
|
|
|
*/
|
2018-08-20 13:12:01 +00:00
|
|
|
get Keyring (){
|
2018-08-20 10:12:43 +00:00
|
|
|
if (!this._Keyring){
|
|
|
|
this._Keyring = new GPGME_Keyring;
|
|
|
|
}
|
|
|
|
return this._Keyring;
|
|
|
|
}
|
2018-04-23 15:18:46 +00:00
|
|
|
|
2018-08-20 10:12:43 +00:00
|
|
|
/**
|
2018-09-05 16:46:28 +00:00
|
|
|
* Encrypt data for the recipients specified in publicKeys. If privateKeys
|
|
|
|
* are submitted, the data will be signed by those Keys.
|
2018-08-22 16:37:46 +00:00
|
|
|
* @param {Object} options
|
|
|
|
* @param {String|Object} options.data text/data to be encrypted as String.
|
2018-09-05 16:46:28 +00:00
|
|
|
* Also accepts Objects with a getText method.
|
2018-08-22 16:37:46 +00:00
|
|
|
* @param {inputKeys} options.publicKeys
|
2018-08-20 10:12:43 +00:00
|
|
|
* Keys used to encrypt the message
|
2018-09-05 16:46:28 +00:00
|
|
|
* @param {inputKeys} options.secretKeys (optional) Keys used to sign the
|
2018-08-20 10:12:43 +00:00
|
|
|
* message. If Keys are present, the operation requested is assumed
|
|
|
|
* to be 'encrypt and sign'
|
2018-09-05 16:46:28 +00:00
|
|
|
* @param {Boolean} options.base64 (optional, default: false) The data will
|
|
|
|
* be interpreted as base64 encoded data.
|
|
|
|
* @param {Boolean} options.armor (optional, default: true) Request the
|
|
|
|
* output as armored block.
|
|
|
|
* @param {Boolean} options.wildcard (optional, default: false) If true,
|
|
|
|
* recipient information will not be added to the message.
|
|
|
|
* @param {Boolean} options.always_trust (optional, default true) This
|
|
|
|
* assumes that used keys are fully trusted. If set to false, encryption to
|
|
|
|
* a key not fully trusted in gnupg will fail.
|
|
|
|
* @param {String} options.expect (default: 'base64') In case of
|
|
|
|
* armored:false, request how to return the binary result.
|
|
|
|
* Accepts 'base64' or 'uint8'
|
|
|
|
* @param {Object} options.additional use additional valid gpg options as
|
2018-08-20 10:12:43 +00:00
|
|
|
* defined in {@link permittedOperations}
|
|
|
|
* @returns {Promise<encrypt_result>} Object containing the encrypted
|
|
|
|
* message and additional info.
|
|
|
|
* @async
|
|
|
|
*/
|
2018-08-23 10:15:59 +00:00
|
|
|
encrypt ({ data, publicKeys, secretKeys, base64 = false, armor = true,
|
2018-08-30 12:46:54 +00:00
|
|
|
wildcard, always_trust = true, expect = 'base64',
|
|
|
|
additional = {} } = {}){
|
2018-08-27 10:32:28 +00:00
|
|
|
if (typeof arguments[0] !== 'object') {
|
|
|
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (!data || !publicKeys){
|
2018-08-22 16:37:46 +00:00
|
|
|
return Promise.reject(gpgme_error('MSG_INCOMPLETE'));
|
|
|
|
}
|
2018-08-20 10:12:43 +00:00
|
|
|
let msg = createMessage('encrypt');
|
|
|
|
if (msg instanceof Error){
|
|
|
|
return Promise.reject(msg);
|
|
|
|
}
|
2018-08-29 15:45:55 +00:00
|
|
|
if (armor === false){
|
|
|
|
msg.setParameter('armor', false);
|
2018-08-30 12:46:54 +00:00
|
|
|
if (expect === 'uint8' || expect === 'base64') {
|
|
|
|
msg.expected = expect;
|
|
|
|
} else {
|
|
|
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
|
|
|
}
|
2018-08-29 15:45:55 +00:00
|
|
|
} else if (armor === true) {
|
|
|
|
msg.setParameter('armor', true);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (base64 === true) {
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.setParameter('base64', true);
|
|
|
|
}
|
2018-08-23 10:30:49 +00:00
|
|
|
if (always_trust === true) {
|
|
|
|
msg.setParameter('always-trust', true);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
let pubkeys = toKeyIdArray(publicKeys);
|
|
|
|
if (!pubkeys.length) {
|
|
|
|
return Promise.reject(gpgme_error('MSG_NO_KEYS'));
|
|
|
|
}
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.setParameter('keys', pubkeys);
|
2018-08-23 10:15:59 +00:00
|
|
|
let sigkeys = toKeyIdArray(secretKeys);
|
2018-08-20 10:12:43 +00:00
|
|
|
if (sigkeys.length > 0) {
|
|
|
|
msg.setParameter('signing_keys', sigkeys);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
putData(msg, data);
|
|
|
|
if (wildcard === true){
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.setParameter('throw-keyids', true);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (additional){
|
|
|
|
let additional_Keys = Object.keys(additional);
|
2018-08-20 10:12:43 +00:00
|
|
|
for (let k = 0; k < additional_Keys.length; k++) {
|
2018-08-22 10:18:55 +00:00
|
|
|
try {
|
|
|
|
msg.setParameter(additional_Keys[k],
|
2018-08-23 10:15:59 +00:00
|
|
|
additional[additional_Keys[k]]);
|
2018-08-22 10:18:55 +00:00
|
|
|
}
|
|
|
|
catch (error){
|
|
|
|
return Promise.reject(error);
|
|
|
|
}
|
2018-07-27 18:56:11 +00:00
|
|
|
}
|
2018-08-20 10:12:43 +00:00
|
|
|
}
|
|
|
|
if (msg.isComplete() === true){
|
|
|
|
return msg.post();
|
|
|
|
} else {
|
|
|
|
return Promise.reject(gpgme_error('MSG_INCOMPLETE'));
|
|
|
|
}
|
|
|
|
}
|
2018-04-10 09:33:14 +00:00
|
|
|
|
2018-08-20 10:12:43 +00:00
|
|
|
/**
|
2018-09-05 16:46:28 +00:00
|
|
|
* Decrypts (and verifies, if applicable) a message.
|
2018-08-22 16:37:46 +00:00
|
|
|
* @param {Object} options
|
|
|
|
* @param {String|Object} options.data text/data to be decrypted. Accepts
|
2018-09-05 16:46:28 +00:00
|
|
|
* Strings and Objects with a getText method.
|
|
|
|
* @param {Boolean} options.base64 (optional, default: false). Indicate that
|
|
|
|
* the input given is base64-encoded binary instead of an armored block in
|
|
|
|
* gpg armored form.
|
|
|
|
* @param {String} options.expect (optional). By default, the output is
|
|
|
|
* expected to be a string compatible with javascript. In cases of binary
|
|
|
|
* data the decryption may fail due to encoding problems. For data expected
|
|
|
|
* to return as binary data, the decroding after decryption can be bypassed:
|
|
|
|
* <pre>
|
|
|
|
* 'uint8': Return as Uint8Array
|
|
|
|
* 'base64': Return as unprocessed (base64 encoded) string.
|
|
|
|
* </pre>
|
2018-08-20 10:12:43 +00:00
|
|
|
* @returns {Promise<decrypt_result>} Decrypted Message and information
|
|
|
|
* @async
|
|
|
|
*/
|
2018-08-27 10:32:28 +00:00
|
|
|
decrypt ({ data, base64, expect } = {}){
|
|
|
|
if (typeof arguments[0] !== 'object') {
|
|
|
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (!data){
|
2018-08-20 10:12:43 +00:00
|
|
|
return Promise.reject(gpgme_error('MSG_EMPTY'));
|
|
|
|
}
|
|
|
|
let msg = createMessage('decrypt');
|
2018-06-08 15:54:58 +00:00
|
|
|
|
2018-08-20 10:12:43 +00:00
|
|
|
if (msg instanceof Error){
|
|
|
|
return Promise.reject(msg);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (base64 === true){
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.setParameter('base64', true);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (expect === 'base64' || expect === 'uint8'){
|
|
|
|
msg.expected = expect;
|
2018-08-22 14:32:31 +00:00
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
putData(msg, data);
|
2018-08-20 13:12:01 +00:00
|
|
|
return new Promise(function (resolve, reject){
|
|
|
|
msg.post().then(function (result){
|
2018-08-27 09:21:02 +00:00
|
|
|
let returnValue = { data: result.data };
|
|
|
|
returnValue.format = result.format ? result.format : null;
|
2018-08-21 13:26:17 +00:00
|
|
|
if (result.hasOwnProperty('dec_info')){
|
2018-08-27 09:21:02 +00:00
|
|
|
returnValue.is_mime = result.dec_info.is_mime ? true: false;
|
2018-08-21 13:26:17 +00:00
|
|
|
if (result.dec_info.file_name) {
|
2018-08-27 09:21:02 +00:00
|
|
|
returnValue.file_name = result.dec_info.file_name;
|
2018-08-21 13:26:17 +00:00
|
|
|
}
|
|
|
|
}
|
2018-08-27 09:21:02 +00:00
|
|
|
if (!returnValue.file_name) {
|
|
|
|
returnValue.file_name = null;
|
2018-08-20 10:12:43 +00:00
|
|
|
}
|
2018-08-21 13:26:17 +00:00
|
|
|
if (result.hasOwnProperty('info')
|
|
|
|
&& result.info.hasOwnProperty('signatures')
|
|
|
|
&& Array.isArray(result.info.signatures)
|
2018-08-20 10:12:43 +00:00
|
|
|
) {
|
2018-08-27 09:21:02 +00:00
|
|
|
returnValue.signatures = collectSignatures(
|
2018-08-21 13:26:17 +00:00
|
|
|
result.info.signatures);
|
2018-08-20 10:12:43 +00:00
|
|
|
}
|
2018-08-27 09:21:02 +00:00
|
|
|
if (returnValue.signatures instanceof Error){
|
|
|
|
reject(returnValue.signatures);
|
2018-08-22 10:18:55 +00:00
|
|
|
} else {
|
2018-08-27 09:21:02 +00:00
|
|
|
resolve(returnValue);
|
2018-08-22 10:18:55 +00:00
|
|
|
}
|
2018-08-20 13:12:01 +00:00
|
|
|
}, function (error){
|
2018-08-20 10:12:43 +00:00
|
|
|
reject(error);
|
2018-06-14 10:15:51 +00:00
|
|
|
});
|
2018-08-20 10:12:43 +00:00
|
|
|
});
|
|
|
|
}
|
2018-04-18 14:38:06 +00:00
|
|
|
|
2018-08-20 10:12:43 +00:00
|
|
|
/**
|
2018-09-05 16:46:28 +00:00
|
|
|
* Sign a Message.
|
2018-08-22 16:37:46 +00:00
|
|
|
* @param {Object} options Signing options
|
|
|
|
* @param {String|Object} options.data text/data to be signed. Accepts
|
|
|
|
* Strings and Objects with a getText method.
|
|
|
|
* @param {inputKeys} options.keys The key/keys to use for signing
|
|
|
|
* @param {String} options.mode The signing mode. Currently supported:
|
2018-09-05 16:46:28 +00:00
|
|
|
* <pre>
|
|
|
|
* 'clearsign':The Message is embedded into the signature;
|
|
|
|
* 'detached': The signature is stored separately
|
|
|
|
* </pre>
|
2018-08-22 16:37:46 +00:00
|
|
|
* @param {Boolean} options.base64 input is considered base64
|
2018-08-20 10:12:43 +00:00
|
|
|
* @returns {Promise<signResult>}
|
|
|
|
* @async
|
|
|
|
*/
|
2018-08-27 10:32:28 +00:00
|
|
|
sign ({ data, keys, mode = 'clearsign', base64 } = {}){
|
|
|
|
if (typeof arguments[0] !== 'object') {
|
|
|
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (!data){
|
2018-08-20 10:12:43 +00:00
|
|
|
return Promise.reject(gpgme_error('MSG_EMPTY'));
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
let key_arr = toKeyIdArray(keys);
|
2018-08-20 10:12:43 +00:00
|
|
|
if (key_arr.length === 0){
|
|
|
|
return Promise.reject(gpgme_error('MSG_NO_KEYS'));
|
|
|
|
}
|
2018-05-24 13:16:18 +00:00
|
|
|
|
2018-08-23 10:15:59 +00:00
|
|
|
let msg = createMessage('sign');
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.setParameter('keys', key_arr);
|
2018-08-23 10:15:59 +00:00
|
|
|
if (base64 === true){
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.setParameter('base64', true);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
msg.setParameter('mode', mode);
|
|
|
|
putData(msg, data);
|
|
|
|
|
2018-08-20 13:12:01 +00:00
|
|
|
return new Promise(function (resolve,reject) {
|
|
|
|
msg.post().then( function (message) {
|
2018-08-23 10:15:59 +00:00
|
|
|
if (mode === 'clearsign'){
|
2018-08-20 10:12:43 +00:00
|
|
|
resolve({
|
2018-08-20 13:12:01 +00:00
|
|
|
data: message.data }
|
2018-08-20 10:12:43 +00:00
|
|
|
);
|
2018-08-23 10:15:59 +00:00
|
|
|
} else if (mode === 'detached') {
|
2018-08-20 10:12:43 +00:00
|
|
|
resolve({
|
2018-08-23 10:15:59 +00:00
|
|
|
data: data,
|
2018-08-20 10:12:43 +00:00
|
|
|
signature: message.data
|
|
|
|
});
|
2018-05-24 13:16:18 +00:00
|
|
|
}
|
2018-08-20 13:12:01 +00:00
|
|
|
}, function (error){
|
2018-08-20 10:12:43 +00:00
|
|
|
reject(error);
|
2018-06-06 11:05:53 +00:00
|
|
|
});
|
2018-08-20 10:12:43 +00:00
|
|
|
});
|
|
|
|
}
|
2018-06-14 10:15:51 +00:00
|
|
|
|
2018-08-20 10:12:43 +00:00
|
|
|
/**
|
|
|
|
* Verifies data.
|
2018-08-22 16:37:46 +00:00
|
|
|
* @param {Object} options
|
|
|
|
* @param {String|Object} options.data text/data to be verified. Accepts
|
|
|
|
* Strings and Objects with a getText method
|
|
|
|
* @param {String} options.signature A detached signature. If not present,
|
2018-08-20 10:12:43 +00:00
|
|
|
* opaque mode is assumed
|
2018-08-22 16:37:46 +00:00
|
|
|
* @param {Boolean} options.base64 Indicating that data and signature are
|
|
|
|
* base64 encoded
|
2018-08-20 10:12:43 +00:00
|
|
|
* @returns {Promise<verifyResult>}
|
|
|
|
*@async
|
|
|
|
*/
|
2018-08-27 10:32:28 +00:00
|
|
|
verify ({ data, signature, base64 } = {}){
|
|
|
|
if (typeof arguments[0] !== 'object') {
|
|
|
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (!data){
|
2018-08-22 16:37:46 +00:00
|
|
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
|
|
|
}
|
2018-08-20 10:12:43 +00:00
|
|
|
let msg = createMessage('verify');
|
2018-08-23 10:15:59 +00:00
|
|
|
let dt = putData(msg, data);
|
2018-08-20 10:12:43 +00:00
|
|
|
if (dt instanceof Error){
|
|
|
|
return Promise.reject(dt);
|
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (signature){
|
2018-08-22 16:37:46 +00:00
|
|
|
if (typeof signature !== 'string'){
|
2018-08-20 10:12:43 +00:00
|
|
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
|
|
|
} else {
|
|
|
|
msg.setParameter('signature', signature);
|
2018-06-14 10:15:51 +00:00
|
|
|
}
|
2018-08-20 10:12:43 +00:00
|
|
|
}
|
2018-08-23 10:15:59 +00:00
|
|
|
if (base64 === true){
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.setParameter('base64', true);
|
|
|
|
}
|
2018-08-20 13:12:01 +00:00
|
|
|
return new Promise(function (resolve, reject){
|
2018-08-20 10:12:43 +00:00
|
|
|
msg.post().then(function (message){
|
|
|
|
if (!message.info || !message.info.signatures){
|
|
|
|
reject(gpgme_error('SIG_NO_SIGS'));
|
2018-06-14 10:15:51 +00:00
|
|
|
} else {
|
2018-08-27 09:21:02 +00:00
|
|
|
let returnValue = {
|
2018-08-22 10:44:05 +00:00
|
|
|
signatures: collectSignatures(message.info.signatures)
|
|
|
|
};
|
2018-08-27 09:21:02 +00:00
|
|
|
if (returnValue.signatures instanceof Error){
|
|
|
|
reject(returnValue.signatures);
|
2018-08-22 10:18:55 +00:00
|
|
|
} else {
|
2018-08-27 09:21:02 +00:00
|
|
|
returnValue.is_mime = message.info.is_mime? true: false;
|
2018-08-22 10:18:55 +00:00
|
|
|
if (message.info.filename){
|
2018-08-27 09:21:02 +00:00
|
|
|
returnValue.file_name = message.info.filename;
|
2018-08-22 10:18:55 +00:00
|
|
|
}
|
2018-08-27 09:21:02 +00:00
|
|
|
returnValue.data = message.data;
|
|
|
|
resolve(returnValue);
|
2018-07-27 18:56:11 +00:00
|
|
|
}
|
2018-08-20 10:12:43 +00:00
|
|
|
}
|
2018-08-20 13:12:01 +00:00
|
|
|
}, function (error){
|
2018-08-20 10:12:43 +00:00
|
|
|
reject(error);
|
2018-06-14 10:15:51 +00:00
|
|
|
});
|
2018-08-20 10:12:43 +00:00
|
|
|
});
|
2018-06-14 10:15:51 +00:00
|
|
|
}
|
2018-04-18 14:38:06 +00:00
|
|
|
}
|
2018-04-10 09:33:14 +00:00
|
|
|
|
|
|
|
/**
|
2018-05-30 15:05:54 +00:00
|
|
|
* Sets the data of the message, setting flags according on the data type
|
2018-04-18 14:38:06 +00:00
|
|
|
* @param {GPGME_Message} message The message where this data will be set
|
2018-07-10 12:32:26 +00:00
|
|
|
* @param { String| Object } data The data to enter. Expects either a string of
|
|
|
|
* data, or an object with a getText method
|
|
|
|
* @returns {undefined| GPGME_Error} Error if not successful, nothing otherwise
|
|
|
|
* @private
|
2018-04-10 09:33:14 +00:00
|
|
|
*/
|
2018-08-20 13:12:01 +00:00
|
|
|
function putData (message, data){
|
2018-07-27 18:56:11 +00:00
|
|
|
if (!message || !(message instanceof GPGME_Message)) {
|
2018-04-25 13:59:36 +00:00
|
|
|
return gpgme_error('PARAM_WRONG');
|
2018-04-10 09:33:14 +00:00
|
|
|
}
|
2018-04-18 14:38:06 +00:00
|
|
|
if (!data){
|
2018-04-27 18:03:09 +00:00
|
|
|
return gpgme_error('PARAM_WRONG');
|
2018-08-22 16:37:46 +00:00
|
|
|
} else if (typeof data === 'string') {
|
2018-04-18 14:38:06 +00:00
|
|
|
message.setParameter('data', data);
|
2018-05-14 14:23:24 +00:00
|
|
|
} else if (
|
2018-08-22 16:37:46 +00:00
|
|
|
(typeof data === 'object') &&
|
|
|
|
(typeof data.getText === 'function')
|
2018-05-14 14:23:24 +00:00
|
|
|
){
|
2018-04-24 17:47:48 +00:00
|
|
|
let txt = data.getText();
|
2018-08-22 16:37:46 +00:00
|
|
|
if (typeof txt === 'string'){
|
2018-05-22 12:24:16 +00:00
|
|
|
message.setParameter('data', txt);
|
2018-05-14 14:23:24 +00:00
|
|
|
} else {
|
2018-05-08 16:33:41 +00:00
|
|
|
return gpgme_error('PARAM_WRONG');
|
2018-04-24 17:47:48 +00:00
|
|
|
}
|
2018-05-14 14:23:24 +00:00
|
|
|
|
2018-04-18 14:38:06 +00:00
|
|
|
} else {
|
2018-04-25 13:59:36 +00:00
|
|
|
return gpgme_error('PARAM_WRONG');
|
2018-04-10 09:33:14 +00:00
|
|
|
}
|
2018-04-24 16:44:30 +00:00
|
|
|
}
|
2018-06-14 10:15:51 +00:00
|
|
|
|
2018-07-10 12:32:26 +00:00
|
|
|
/**
|
|
|
|
* Parses, validates and converts incoming objects into signatures.
|
|
|
|
* @param {Array<Object>} sigs
|
|
|
|
* @returns {signatureDetails} Details about the signatures
|
2018-09-05 16:46:28 +00:00
|
|
|
* @private
|
2018-07-10 12:32:26 +00:00
|
|
|
*/
|
2018-08-20 13:12:01 +00:00
|
|
|
function collectSignatures (sigs){
|
2018-06-14 10:15:51 +00:00
|
|
|
if (!Array.isArray(sigs)){
|
|
|
|
return gpgme_error('SIG_NO_SIGS');
|
|
|
|
}
|
|
|
|
let summary = {
|
|
|
|
all_valid: false,
|
|
|
|
count: sigs.length,
|
|
|
|
failures: 0,
|
|
|
|
signatures: {
|
|
|
|
good: [],
|
|
|
|
bad: [],
|
|
|
|
}
|
|
|
|
};
|
|
|
|
for (let i=0; i< sigs.length; i++){
|
|
|
|
let sigObj = createSignature(sigs[i]);
|
2018-08-22 10:18:55 +00:00
|
|
|
if (sigObj instanceof Error) {
|
|
|
|
return gpgme_error('SIG_WRONG');
|
2018-06-14 10:15:51 +00:00
|
|
|
}
|
|
|
|
if (sigObj.valid !== true){
|
|
|
|
summary.failures += 1;
|
|
|
|
summary.signatures.bad.push(sigObj);
|
|
|
|
} else {
|
|
|
|
summary.signatures.good.push(sigObj);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (summary.failures === 0){
|
|
|
|
summary.all_valid = true;
|
|
|
|
}
|
|
|
|
return summary;
|
|
|
|
}
|