mirror of
https://codeberg.org/keyoxide/doipjs.git
synced 2024-12-22 14:39:28 -07:00
112 lines
4.1 KiB
JavaScript
112 lines
4.1 KiB
JavaScript
/*
|
|
Copyright 2021 Yarmo Mackenbach
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
import { expect, use } from 'chai'
|
|
import chaiAsPromised from 'chai-as-promised'
|
|
use(chaiAsPromised)
|
|
|
|
import { Profile, signatures } from '../src/index.js'
|
|
|
|
const sigProfile = `-----BEGIN PGP SIGNED MESSAGE-----
|
|
Hash: SHA512
|
|
|
|
A demo signature profile for testing.
|
|
|
|
proof=dns:doip.rocks
|
|
-----BEGIN PGP SIGNATURE-----
|
|
|
|
iQHEBAEBCgAuFiEENjcgJSPnwTCat56Z7y3FgntEX0sFAmI+LCEQHHRlc3RAZG9p
|
|
cC5yb2NrcwAKCRDvLcWCe0RfS2KIC/9wGOnntH4jBBO3unLWb0dQLUguo9XilHGp
|
|
Uh4Huue5/nlbmkCNMJFKkRiohYGaySIN4xBU8R4gWwzA8hbqTj9XII5en5VzHqkt
|
|
ZONRabicA6rdr4DNzV/UzB0Hz2vdxCLZAICLik6NyScjNE+EybITg/gHjrDrzyEe
|
|
hmNCSuUo/PA0oGY1ckduhy9hwFULdEWcyDvM4wIaAh5A53UJ+ndZVxlguCixqnQH
|
|
JBXuDQdDOFJRrT7Objdgd/8CI+NEm0iwIlcsaITwG6Twx0ki5NTWftmIg3DoiTEz
|
|
svBu6SMrlwbZ7nkRdSZhHp0zrEBOafT1AcFGquF63AlfPuC46rNWTAYvtyU6Cn3P
|
|
MeErGzZgOkW9vLbFS+GHaX0ODr01xMMCdvdjPc/o+3sBqkw3d2DctSTLKOx7strh
|
|
YCKJPotiqe50nBijHHbuABtBianiMZOm2BbaPnsmdHIX5ynWhOI8LHR1CVmTI/0o
|
|
/ilSykmWgvLSdPk5K+i3deQ1wESZeGU=
|
|
=2vuM
|
|
-----END PGP SIGNATURE-----`
|
|
|
|
const invalidSigProfileMessage = `-----BEGIN PGP SIGNED MESSAGE-----
|
|
Hash: SHA512
|
|
|
|
A demo signature profile for testing.
|
|
|
|
proof=dns:doip.sucks
|
|
-----BEGIN PGP SIGNATURE-----
|
|
|
|
iQHEBAEBCgAuFiEENjcgJSPnwTCat56Z7y3FgntEX0sFAmI+LCEQHHRlc3RAZG9p
|
|
cC5yb2NrcwAKCRDvLcWCe0RfS2KIC/9wGOnntH4jBBO3unLWb0dQLUguo9XilHGp
|
|
Uh4Huue5/nlbmkCNMJFKkRiohYGaySIN4xBU8R4gWwzA8hbqTj9XII5en5VzHqkt
|
|
ZONRabicA6rdr4DNzV/UzB0Hz2vdxCLZAICLik6NyScjNE+EybITg/gHjrDrzyEe
|
|
hmNCSuUo/PA0oGY1ckduhy9hwFULdEWcyDvM4wIaAh5A53UJ+ndZVxlguCixqnQH
|
|
JBXuDQdDOFJRrT7Objdgd/8CI+NEm0iwIlcsaITwG6Twx0ki5NTWftmIg3DoiTEz
|
|
svBu6SMrlwbZ7nkRdSZhHp0zrEBOafT1AcFGquF63AlfPuC46rNWTAYvtyU6Cn3P
|
|
MeErGzZgOkW9vLbFS+GHaX0ODr01xMMCdvdjPc/o+3sBqkw3d2DctSTLKOx7strh
|
|
YCKJPotiqe50nBijHHbuABtBianiMZOm2BbaPnsmdHIX5ynWhOI8LHR1CVmTI/0o
|
|
/ilSykmWgvLSdPk5K+i3deQ1wESZeGU=
|
|
=2vuM
|
|
-----END PGP SIGNATURE-----`
|
|
|
|
const invalidSigProfileHash = `-----BEGIN PGP SIGNED MESSAGE-----
|
|
Hash: SHA512
|
|
|
|
A demo signature profile for testing.
|
|
|
|
proof=dns:doip.rocks
|
|
-----BEGIN PGP SIGNATURE-----
|
|
|
|
xQHEBAEBCgAuFiEENjcgJSPnwTCat56Z7y3FgntEX0sFAmI+LCEQHHRlc3RAZG9p
|
|
cC5yb2NrcwAKCRDvLcWCe0RfS2KIC/9wGOnntH4jBBO3unLWb0dQLUguo9XilHGp
|
|
Uh4Huue5/nlbmkCNMJFKkRiohYGaySIN4xBU8R4gWwzA8hbqTj9XII5en5VzHqkt
|
|
ZONRabicA6rdr4DNzV/UzB0Hz2vdxCLZAICLik6NyScjNE+EybITg/gHjrDrzyEe
|
|
hmNCSuUo/PA0oGY1ckduhy9hwFULdEWcyDvM4wIaAh5A53UJ+ndZVxlguCixqnQH
|
|
JBXuDQdDOFJRrT7Objdgd/8CI+NEm0iwIlcsaITwG6Twx0ki5NTWftmIg3DoiTEz
|
|
svBu6SMrlwbZ7nkRdSZhHp0zrEBOafT1AcFGquF63AlfPuC46rNWTAYvtyU6Cn3P
|
|
MeErGzZgOkW9vLbFS+GHaX0ODr01xMMCdvdjPc/o+3sBqkw3d2DctSTLKOx7strh
|
|
YCKJPotiqe50nBijHHbuABtBianiMZOm2BbaPnsmdHIX5ynWhOI8LHR1CVmTI/0o
|
|
/ilSykmWgvLSdPk5K+i3deQ1wESZeGU=
|
|
=2vuM
|
|
-----END PGP SIGNATURE-----`
|
|
|
|
describe('signatures.parse', () => {
|
|
it('should be a function (2 arguments)', () => {
|
|
expect(signatures.parse).to.be.a('function')
|
|
expect(signatures.parse).to.have.length(1)
|
|
})
|
|
it('should verify a valid signature', async () => {
|
|
const profile = await signatures.parse(sigProfile)
|
|
expect(profile).to.be.instanceOf(Profile)
|
|
expect(profile.identifier).to.be.equal(
|
|
'openpgp4fpr:3637202523e7c1309ab79e99ef2dc5827b445f4b'
|
|
)
|
|
expect(profile.personas[0].claims).to.be.length(1)
|
|
})
|
|
it('should reject an invalid signature', async () => {
|
|
return expect(
|
|
signatures.parse(invalidSigProfileMessage)
|
|
).to.eventually.be.rejectedWith(
|
|
'Signature could not be verified (Signed digest did not match)'
|
|
)
|
|
})
|
|
it('should reject an invalid signature', async () => {
|
|
return expect(
|
|
signatures.parse(invalidSigProfileHash)
|
|
).to.eventually.be.rejectedWith(
|
|
'Signature could not be read (Ascii armor integrity check failed)'
|
|
)
|
|
})
|
|
})
|