js: add verify and signature parsing
-- * src/gpgmejs.js: - Added verify method - Added verification results in decrypt (if signatures are present in the message) - Added a base64 option to decrypt * src/Signature.js: Convenience class for verification results. Used for e.g. converting timestamps to javascript time, quick overall validity checks * src/Keyring.js: removed debug code * src/Errors.js add two new Signature errors
This commit is contained in:
parent
aed402c5d5
commit
3c783bd09c
@ -83,6 +83,14 @@ const err_list = {
|
|||||||
'configuration',
|
'configuration',
|
||||||
type: 'error'
|
type: 'error'
|
||||||
},
|
},
|
||||||
|
'SIG_WRONG': {
|
||||||
|
msg:'A malformed signature was created',
|
||||||
|
type: 'error'
|
||||||
|
},
|
||||||
|
'SIG_NO_SIGS': {
|
||||||
|
msg:'There were no signatures found',
|
||||||
|
type: 'error'
|
||||||
|
},
|
||||||
// generic
|
// generic
|
||||||
'PARAM_WRONG':{
|
'PARAM_WRONG':{
|
||||||
msg: 'Invalid parameter was found',
|
msg: 'Invalid parameter was found',
|
||||||
|
@ -135,8 +135,6 @@ export class GPGME_Keyring {
|
|||||||
// and probably performance, too
|
// and probably performance, too
|
||||||
me.getKeys(null,true).then(function(keys){
|
me.getKeys(null,true).then(function(keys){
|
||||||
for (let i=0; i < keys.length; i++){
|
for (let i=0; i < keys.length; i++){
|
||||||
console.log(keys[i]);
|
|
||||||
console.log(keys[i].get('hasSecret'));
|
|
||||||
if (keys[i].get('hasSecret') === true){
|
if (keys[i].get('hasSecret') === true){
|
||||||
resolve(keys[i]);
|
resolve(keys[i]);
|
||||||
break;
|
break;
|
||||||
|
193
lang/js/src/Signature.js
Normal file
193
lang/js/src/Signature.js
Normal file
@ -0,0 +1,193 @@
|
|||||||
|
/* gpgme.js - Javascript integration for gpgme
|
||||||
|
* Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik
|
||||||
|
*
|
||||||
|
* This file is part of GPGME.
|
||||||
|
*
|
||||||
|
* GPGME is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU Lesser General Public License as
|
||||||
|
* published by the Free Software Foundation; either version 2.1 of
|
||||||
|
* the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* GPGME is distributed in the hope that it will be useful, but
|
||||||
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
* Lesser General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public
|
||||||
|
* License along with this program; if not, see <http://www.gnu.org/licenses/>.
|
||||||
|
* SPDX-License-Identifier: LGPL-2.1+
|
||||||
|
*
|
||||||
|
* Author(s):
|
||||||
|
* Maximilian Krambach <mkrambach@intevation.de>
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Validates a signature object and returns
|
||||||
|
* @param {Object} sigObject Object as returned by gpgme-json. The definition
|
||||||
|
* of the expected values are to be found in the constants 'expKeys', 'expSum',
|
||||||
|
* 'expNote' in this file.
|
||||||
|
* @returns {GPGME_Signature} Signature Object
|
||||||
|
*/
|
||||||
|
|
||||||
|
import { gpgme_error } from './Errors';
|
||||||
|
|
||||||
|
export function createSignature(sigObject){
|
||||||
|
if (
|
||||||
|
typeof(sigObject) !=='object' ||
|
||||||
|
!sigObject.hasOwnProperty('summary') ||
|
||||||
|
!sigObject.hasOwnProperty('fingerpprint') ||
|
||||||
|
!sigObject.hasOwnProperty('timestamp')
|
||||||
|
//TODO check if timestamp is mandatory in specification
|
||||||
|
){
|
||||||
|
return gpgme_error('SIG_WRONG');
|
||||||
|
}
|
||||||
|
let keys = Object.keys(sigObject);
|
||||||
|
for (let i=0; i< keys.length; i++){
|
||||||
|
if ( typeof(sigObject[keys[i]]) !== expKeys[keys[i]] ){
|
||||||
|
return gpgme_error('SIG_WRONG');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
let sumkeys = Object.keys(sigObject.summary);
|
||||||
|
for (let i=0; i< sumkeys.length; i++){
|
||||||
|
if ( typeof(sigObject.summary[sumkeys[i]]) !== expSum[sumkeys[i]] ){
|
||||||
|
return gpgme_error('SIG_WRONG');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (sigObject.hasOwnProperty('notations')){
|
||||||
|
if (!Array.isArray(sigObject.notations)){
|
||||||
|
return gpgme_error('SIG_WRONG');
|
||||||
|
}
|
||||||
|
for (let i=0; i < sigObject.notations.length; i++){
|
||||||
|
let notation = sigObject.notations[i];
|
||||||
|
let notekeys = Object.keys(notation);
|
||||||
|
for (let j=0; j < notekeys.length; j++){
|
||||||
|
if ( typeof(notation[notekeys[j]]) !== expNote[notekeys[j]] ){
|
||||||
|
return gpgme_error('SIG_WRONG');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return new GPGME_Signature(sigObject);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Representing the details of a signature. It is supposed to be read-only. The
|
||||||
|
* full details as given by gpgme-json can be accessed from the _rawSigObject.
|
||||||
|
* )
|
||||||
|
*/
|
||||||
|
class GPGME_Signature {
|
||||||
|
constructor(sigObject){
|
||||||
|
this._rawSigObject = sigObject;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The signatures' fingerprint
|
||||||
|
*/
|
||||||
|
get fingerprint(){
|
||||||
|
return this._rawSigObject.fingerprint;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The expiration of this Signature as Javascript date, or null if
|
||||||
|
* signature does not expire
|
||||||
|
* @returns {Date | null}
|
||||||
|
*/
|
||||||
|
get expiration(){
|
||||||
|
if (!this._rawSigObject.exp_timestamp){
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
return new Date(this._rawSigObject.exp_timestamp* 1000);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The creation date of this Signature in Javascript Date
|
||||||
|
* @returns {Date}
|
||||||
|
*/
|
||||||
|
get timestamp(){
|
||||||
|
return new Date(this._rawSigObject.timestamp* 1000);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The overall validity of the key. If false, errorDetails may contain
|
||||||
|
* additional information
|
||||||
|
*/
|
||||||
|
get valid() {
|
||||||
|
if (this._rawSigObject.valid === true){
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* gives more information on non-valid signatures. Refer to the gpgme docs
|
||||||
|
* https://www.gnupg.org/documentation/manuals/gpgme/Verify.html for
|
||||||
|
* details on the values
|
||||||
|
* @returns {Object} Object with boolean properties
|
||||||
|
*/
|
||||||
|
get errorDetails(){
|
||||||
|
let properties = ['revoked', 'key-expired', 'sig-expired',
|
||||||
|
'key-missing', 'crl-missing', 'crl-too-old', 'bad-policy',
|
||||||
|
'sys-error'];
|
||||||
|
let result = {};
|
||||||
|
for (let i=0; i< properties.length; i++){
|
||||||
|
if ( this._rawSigObject.hasOwnProperty(properties[i]) ){
|
||||||
|
result[properties[i]] = this._rawSigObject[properties[i]];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Keys and their value's type for the signature Object
|
||||||
|
*/
|
||||||
|
const expKeys = {
|
||||||
|
'wrong_key_usage': 'boolean',
|
||||||
|
'chain_model': 'boolean',
|
||||||
|
'summary': 'object',
|
||||||
|
'is_de_vs': 'boolean',
|
||||||
|
'status_string':'string',
|
||||||
|
'fingerprint':'string',
|
||||||
|
'validity_string': 'string',
|
||||||
|
'pubkey_algo_name':'string',
|
||||||
|
'hash_algo_name':'string',
|
||||||
|
'pka_address':'string',
|
||||||
|
'status_code':'number',
|
||||||
|
'timestamp':'number',
|
||||||
|
'exp_timestamp':'number',
|
||||||
|
'pka_trust':'number',
|
||||||
|
'validity':'number',
|
||||||
|
'validity_reason':'number',
|
||||||
|
'notations': 'object'
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Keys and their value's type for the summary
|
||||||
|
*/
|
||||||
|
const expSum = {
|
||||||
|
'valid': 'boolean',
|
||||||
|
'green': 'boolean',
|
||||||
|
'red': 'boolean',
|
||||||
|
'revoked': 'boolean',
|
||||||
|
'key-expired': 'boolean',
|
||||||
|
'sig-expired': 'boolean',
|
||||||
|
'key-missing': 'boolean',
|
||||||
|
'crl-missing': 'boolean',
|
||||||
|
'crl-too-old': 'boolean',
|
||||||
|
'bad-policy': 'boolean',
|
||||||
|
'sys-error': 'boolean'
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Keys and their value's type for notations objects
|
||||||
|
*/
|
||||||
|
const expNote = {
|
||||||
|
'human_readable': 'boolean',
|
||||||
|
'critical':'boolean',
|
||||||
|
'name': 'string',
|
||||||
|
'value': 'string',
|
||||||
|
'flags': 'number'
|
||||||
|
};
|
@ -26,6 +26,7 @@ import {GPGME_Message, createMessage} from './Message';
|
|||||||
import {toKeyIdArray} from './Helpers';
|
import {toKeyIdArray} from './Helpers';
|
||||||
import { gpgme_error } from './Errors';
|
import { gpgme_error } from './Errors';
|
||||||
import { GPGME_Keyring } from './Keyring';
|
import { GPGME_Keyring } from './Keyring';
|
||||||
|
import { createSignature } from './Signature';
|
||||||
|
|
||||||
export class GpgME {
|
export class GpgME {
|
||||||
/**
|
/**
|
||||||
@ -107,15 +108,28 @@ export class GpgME {
|
|||||||
* Decrypt a Message
|
* Decrypt a Message
|
||||||
* @param {String|Object} data text/data to be decrypted. Accepts Strings
|
* @param {String|Object} data text/data to be decrypted. Accepts Strings
|
||||||
* and Objects with a getText method
|
* and Objects with a getText method
|
||||||
* @returns {Promise<Object>} decrypted message:
|
* @param {Boolean} base64 (optional) false if the data is an armored block,
|
||||||
data: The decrypted data.
|
* true if it is base64 encoded binary data
|
||||||
base64: Boolean indicating whether data is base64 encoded.
|
* @returns {Promise<Object>} result: Decrypted Message and information
|
||||||
mime: A Boolean indicating whether the data is a MIME object.
|
* @returns {String} result.data: The decrypted data.
|
||||||
signatures: Array of signature Objects TODO not yet implemented.
|
* @returns {Boolean} result.base64: indicating whether data is base64
|
||||||
// should be an object that can tell if all signatures are valid.
|
* encoded.
|
||||||
|
* @returns {Boolean} result.is_mime: Indicating whether the data is a MIME
|
||||||
|
* object.
|
||||||
|
* @returns {String} result.file_name: The optional original file name
|
||||||
|
* @returns {Object} message.signatures Verification details for signatures:
|
||||||
|
* @returns {Boolean} message.signatures.all_valid: true if all signatures
|
||||||
|
* are valid
|
||||||
|
* @returns {Number} message.signatures.count: Number of signatures found
|
||||||
|
* @returns {Number} message.signatures.failures Number of invalid
|
||||||
|
* signatures
|
||||||
|
* @returns {Array<Object>} message.signatures.signatures. Two arrays
|
||||||
|
* (good & bad) of {@link GPGME_Signature} objects, offering further
|
||||||
|
* information.
|
||||||
|
*
|
||||||
* @async
|
* @async
|
||||||
*/
|
*/
|
||||||
decrypt(data){
|
decrypt(data, base64=false){
|
||||||
if (data === undefined){
|
if (data === undefined){
|
||||||
return Promise.reject(gpgme_error('MSG_EMPTY'));
|
return Promise.reject(gpgme_error('MSG_EMPTY'));
|
||||||
}
|
}
|
||||||
@ -124,8 +138,32 @@ export class GpgME {
|
|||||||
if (msg instanceof Error){
|
if (msg instanceof Error){
|
||||||
return Promise.reject(msg);
|
return Promise.reject(msg);
|
||||||
}
|
}
|
||||||
|
if (base64 === true){
|
||||||
|
msg.setParameter('base64', true);
|
||||||
|
}
|
||||||
putData(msg, data);
|
putData(msg, data);
|
||||||
return msg.post();
|
if (base64 === true){
|
||||||
|
msg.setParameter('base64', true);
|
||||||
|
}
|
||||||
|
return new Promise(function(resolve, reject){
|
||||||
|
msg.post().then(function(result){
|
||||||
|
let _result = {data: result.data};
|
||||||
|
_result.base64 = result.base64 ? true: false;
|
||||||
|
_result.is_mime = result.mime ? true: false;
|
||||||
|
if (result.file_name){
|
||||||
|
_result.file_name = result.file_name;
|
||||||
|
}
|
||||||
|
if (
|
||||||
|
result.hasOwnProperty('signatures') &&
|
||||||
|
Array.isArray(result.signatures)
|
||||||
|
) {
|
||||||
|
_result.signatures = collectSignatures(result.signatures);
|
||||||
|
}
|
||||||
|
resolve(_result);
|
||||||
|
}, function(error){
|
||||||
|
reject(error);
|
||||||
|
});
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -179,6 +217,59 @@ export class GpgME {
|
|||||||
});
|
});
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Verifies data.
|
||||||
|
* @param {String|Object} data text/data to be verified. Accepts Strings
|
||||||
|
* and Objects with a gettext method
|
||||||
|
* @param {String} (optional) A detached signature. If not present, opaque
|
||||||
|
* mode is assumed
|
||||||
|
* @param {Boolean} (optional) Data and signature are base64 encoded
|
||||||
|
* // TODO verify if signature really is assumed to be base64
|
||||||
|
* @returns {Promise<Object>} result:
|
||||||
|
* @returns {Boolean} result.data: The verified data
|
||||||
|
* @returns {Boolean} result.is_mime: The message claims it is MIME
|
||||||
|
* @returns {String} result.file_name: The optional filename of the message
|
||||||
|
* @returns {Boolean} result.all_valid: true if all signatures are valid
|
||||||
|
* @returns {Number} result.count: Number of signatures found
|
||||||
|
* @returns {Number} result.failures Number of unsuccessful signatures
|
||||||
|
* @returns {Array<Object>} result.signatures. Two arrays (good & bad) of
|
||||||
|
* {@link GPGME_Signature} objects, offering further information.
|
||||||
|
*/
|
||||||
|
verify(data, signature, base64 = false){
|
||||||
|
let msg = createMessage('verify');
|
||||||
|
let dt = this.putData(msg, data);
|
||||||
|
if (dt instanceof Error){
|
||||||
|
return Promise.reject(dt);
|
||||||
|
}
|
||||||
|
if (signature){
|
||||||
|
if (typeof(signature)!== 'string'){
|
||||||
|
return Promise.reject(gpgme_error('PARAM_WRONG'));
|
||||||
|
} else {
|
||||||
|
msg.setParameter('signature', signature);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (base64 === true){
|
||||||
|
msg.setParameter('base64', true);
|
||||||
|
}
|
||||||
|
return new Promise(function(resolve, reject){
|
||||||
|
msg.post().then(function (message){
|
||||||
|
if (!message.info.signatures){
|
||||||
|
reject(gpgme_error('SIG_NO_SIGS'));
|
||||||
|
} else {
|
||||||
|
let _result = collectSignatures(message.info.signatures);
|
||||||
|
_result.is_mime = message.info.is_mime? true: false;
|
||||||
|
if (message.info.filename){
|
||||||
|
_result.file_name = message.info.filename;
|
||||||
|
}
|
||||||
|
_result.data = message.data;
|
||||||
|
resolve(_result);
|
||||||
|
}
|
||||||
|
}, function(error){
|
||||||
|
reject(error);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -209,3 +300,34 @@ function putData(message, data){
|
|||||||
return gpgme_error('PARAM_WRONG');
|
return gpgme_error('PARAM_WRONG');
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function collectSignatures(sigs){
|
||||||
|
if (!Array.isArray(sigs)){
|
||||||
|
return gpgme_error('SIG_NO_SIGS');
|
||||||
|
}
|
||||||
|
let summary = {
|
||||||
|
all_valid: false,
|
||||||
|
count: sigs.length,
|
||||||
|
failures: 0,
|
||||||
|
signatures: {
|
||||||
|
good: [],
|
||||||
|
bad: [],
|
||||||
|
}
|
||||||
|
};
|
||||||
|
for (let i=0; i< sigs.length; i++){
|
||||||
|
let sigObj = createSignature(sigs[i]);
|
||||||
|
if (sigObj instanceof Error){
|
||||||
|
return gpgme_error('SIG_WRONG');
|
||||||
|
}
|
||||||
|
if (sigObj.valid !== true){
|
||||||
|
summary.failures += 1;
|
||||||
|
summary.signatures.bad.push(sigObj);
|
||||||
|
} else {
|
||||||
|
summary.signatures.good.push(sigObj);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (summary.failures === 0){
|
||||||
|
summary.all_valid = true;
|
||||||
|
}
|
||||||
|
return summary;
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user