diff options
| author | Andre Heinecke <[email protected]> | 2018-08-22 11:15:35 +0000 | 
|---|---|---|
| committer | Andre Heinecke <[email protected]> | 2018-08-22 11:15:35 +0000 | 
| commit | 59ed27bae14da6c1ba6848b34acfc836846a27bc (patch) | |
| tree | f9efc016f561129c4c02f41bf0e84b566883d6eb /lang/js/BrowserTestExtension/tests/encryptTest.js | |
| parent | json: Add proper decrypt_result_t handling (diff) | |
| parent | js: changed verify signature result infos (diff) | |
| download | gpgme-59ed27bae14da6c1ba6848b34acfc836846a27bc.tar.gz gpgme-59ed27bae14da6c1ba6848b34acfc836846a27bc.zip  | |
Merge branch 'javascript-binding'
This adds a new language binding "gpgme.js" to GPGME. It
serves as a bridge between the native-messaging service "gpgme-json"
and JavaScript Applications.
The first user of this binding will be Mailvelope which will
see GnuPG integration in the near future.
GnuPG-Bug-Id: T4107
Diffstat (limited to '')
| -rw-r--r-- | lang/js/BrowserTestExtension/tests/encryptTest.js | 113 | 
1 files changed, 113 insertions, 0 deletions
diff --git a/lang/js/BrowserTestExtension/tests/encryptTest.js b/lang/js/BrowserTestExtension/tests/encryptTest.js new file mode 100644 index 00000000..a242af5f --- /dev/null +++ b/lang/js/BrowserTestExtension/tests/encryptTest.js @@ -0,0 +1,113 @@ +/* gpgme.js - Javascript integration for gpgme + * Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik + * + * This file is part of GPGME. + * + * GPGME is free software; you can redistribute it and/or modify it + * under the terms of the GNU Lesser General Public License as + * published by the Free Software Foundation; either version 2.1 of + * the License, or (at your option) any later version. + * + * GPGME is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this program; if not, see <http://www.gnu.org/licenses/>. + * SPDX-License-Identifier: LGPL-2.1+ + * + * Author(s): + *     Maximilian Krambach <[email protected]> + */ + +/* global describe, it, expect, before, Gpgmejs */ +/* global inputvalues, fixedLengthString */ + +describe('Encryption', function () { +    let context = null; +    const good_fpr = inputvalues.encrypt.good.fingerprint; +    before(function (done){ +        const prm = Gpgmejs.init(); +        prm.then(function (gpgmejs){ +            context = gpgmejs; +            done(); +        }); +    }); + +    it('Successful encrypt', function (done) { +        const data = inputvalues.encrypt.good.data; +        context.encrypt(data, good_fpr).then(function (answer) { +            expect(answer).to.not.be.empty; +            expect(answer.data).to.be.a('string'); +            expect(answer.data).to.include('BEGIN PGP MESSAGE'); +            expect(answer.data).to.include('END PGP MESSAGE'); +            done(); +        }); +    }); + +    const sizes = [5,20,50]; +    for (let i=0; i < sizes.length; i++) { +        it('Successful encrypt a ' + sizes[i] + 'MB message', function (done) { +            const data = fixedLengthString(sizes[i]); +            context.encrypt(data, good_fpr).then(function (answer) { +                expect(answer).to.not.be.empty; +                expect(answer.data).to.be.a('string'); +                expect(answer.data).to.include('BEGIN PGP MESSAGE'); +                expect(answer.data).to.include('END PGP MESSAGE'); +                done(); +            }); +        }).timeout(20000); +    } + +    it('Sending encryption without keys fails', function (done) { +        const data = inputvalues.encrypt.good.data; +        context.encrypt(data,null).then(function (answer) { +            expect(answer).to.be.undefined; +        }, function (error){ +            expect(error).to.be.an('Error'); +            expect(error.code).to.equal('MSG_INCOMPLETE'); +            done(); +        }); +    }); + +    it('Sending encryption without data fails', function (done) { +        context.encrypt(null, good_fpr).then(function (answer) { +            expect(answer).to.be.undefined; +        }, function (error) { +            expect(error).to.be.an.instanceof(Error); +            expect(error.code).to.equal('MSG_INCOMPLETE'); +            done(); +        }); +    }); + +    it('Sending encryption with non existing keys fails', function (done) { +        const data = inputvalues.encrypt.good.data; +        const bad_fpr = inputvalues.encrypt.bad.fingerprint; +        context.encrypt(data, bad_fpr).then(function (answer) { +            expect(answer).to.be.undefined; +        }, function (error){ +            expect(error).to.be.an('Error'); +            expect(error.code).to.not.be.undefined; +            expect(error.code).to.equal('GNUPG_ERROR'); +            done(); +        }); +    }).timeout(5000); + +    it('Overly large message ( > 64MB) is rejected', function (done) { +        const data = fixedLengthString(65); +        context.encrypt(data, good_fpr).then(function (answer) { +            expect(answer).to.be.undefined; +        }, function (error){ +            expect(error).to.be.an.instanceof(Error); +            // TODO: there is a 64 MB hard limit at least in chrome at: +            // chromium//extensions/renderer/messaging_util.cc: +            // kMaxMessageLength +            // The error will be a browser error, not from gnupg or from +            // this library +            done(); +        }); +    }).timeout(8000); + +    // TODO check different valid parameter +});  | 
