c92326cc25
-- * There were some inconsistencies between utf-8, transfer and browsers' utf16, which broke characters that were split between individual messages. src/Connection now contains a workaround that reassembles javascripts' format from passed base64 strings. This needs someone more experienced looking. * Added several new tests which were failing during initial debugging of this issue * reorganized BrowsertestExtension to avoid cluttering.
159 lines
6.1 KiB
JavaScript
159 lines
6.1 KiB
JavaScript
/* gpgme.js - Javascript integration for gpgme
|
|
* Copyright (C) 2018 Bundesamt für Sicherheit in der Informationstechnik
|
|
*
|
|
* This file is part of GPGME.
|
|
*
|
|
* GPGME is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU Lesser General Public License as
|
|
* published by the Free Software Foundation; either version 2.1 of
|
|
* the License, or (at your option) any later version.
|
|
*
|
|
* GPGME is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
* SPDX-License-Identifier: LGPL-2.1+
|
|
*/
|
|
describe('Encryption', function () {
|
|
it('Successful encrypt', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
inputvalues.encrypt.good.data,
|
|
inputvalues.encrypt.good.fingerprint).then(function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
it('Successful encrypt 5 MB', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
let data = bigString(5);
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
data,
|
|
inputvalues.encrypt.good.fingerprint).then(function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
}).timeout(10000);
|
|
|
|
/**
|
|
it('Successful encrypt 20 MB', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
let data = bigString(20);
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
data,
|
|
inputvalues.encrypt.good.fingerprint).then(function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
}).timeout(20000);
|
|
*/
|
|
/**
|
|
it('Successful encrypt 30 MB', function (done) {
|
|
// TODO: There seems to be a limit imposed at least by chrome at about 21 MB
|
|
let prm = Gpgmejs.init();
|
|
let data = bigString(30);
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
data,
|
|
inputvalues.encrypt.good.fingerprint).then(function (answer) {
|
|
expect(answer).to.not.be.empty;
|
|
expect(answer.data).to.be.a("string");
|
|
expect(answer.data).to.include('BEGIN PGP MESSAGE');
|
|
expect(answer.data).to.include('END PGP MESSAGE');
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
}).timeout(20000);
|
|
*/
|
|
|
|
it('Sending encryption without keys fails', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
inputvalues.encrypt.good.data,
|
|
null).then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function(error){
|
|
expect(error).to.be.an('Error');
|
|
expect(error.code).to.equal('MSG_INCOMPLETE');
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
it('Sending encryption without data fails', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
null, inputvalues.encrypt.good.keyid).then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function (error) {
|
|
expect(error).to.be.an.instanceof(Error);
|
|
expect(error.code).to.equal('MSG_INCOMPLETE');
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
|
|
it('Sending encryption with non existing keys fails', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
inputvalues.encrypt.good.data,
|
|
inputvalues.encrypt.bad.fingerprint).then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function(error){
|
|
expect(error).to.be.an('Error');
|
|
expect(error.code).to.not.be.undefined;
|
|
expect(error.code).to.equal('GNUPG_ERROR');
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
}).timeout(5000);;
|
|
|
|
it('Overly large message ( >= 48MB) is rejected', function (done) {
|
|
let prm = Gpgmejs.init();
|
|
prm.then(function (context) {
|
|
context.encrypt(
|
|
bigString(48),
|
|
inputvalues.encrypt.good.fingerprint).then(function (answer) {
|
|
expect(answer).to.be.undefined;
|
|
}, function(error){
|
|
expect(error).to.be.an.instanceof(Error);
|
|
// TODO who is throwing the error here?
|
|
// It is not a GPGME_Error!
|
|
context.connection.disconnect();
|
|
done();
|
|
});
|
|
});
|
|
}).timeout(8000);
|
|
// TODO check different valid parameter
|
|
});
|