mirror of
https://github.com/ProtonMail/proton-bridge.git
synced 2025-12-10 12:46:46 +00:00
116 lines
3.4 KiB
Go
116 lines
3.4 KiB
Go
// Copyright (c) 2021 Proton Technologies AG
|
|
//
|
|
// This file is part of ProtonMail Bridge.
|
|
//
|
|
// ProtonMail Bridge is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// ProtonMail Bridge is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with ProtonMail Bridge. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package pmapi
|
|
|
|
import (
|
|
"encoding/json"
|
|
"testing"
|
|
|
|
"github.com/ProtonMail/gopenpgp/v2/crypto"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func loadPMKeys(jsonKeys string) (keys *PMKeys) {
|
|
_ = json.Unmarshal([]byte(jsonKeys), &keys)
|
|
return
|
|
}
|
|
|
|
func TestPMKeys_GetKeyRingAndUnlock(t *testing.T) {
|
|
r := require.New(t)
|
|
addrKeysWithTokens := loadPMKeys(readTestFile("keyring_addressKeysWithTokens_JSON", false))
|
|
addrKeysWithoutTokens := loadPMKeys(readTestFile("keyring_addressKeysWithoutTokens_JSON", false))
|
|
addrKeysPrimaryHasToken := loadPMKeys(readTestFile("keyring_addressKeysPrimaryHasToken_JSON", false))
|
|
addrKeysSecondaryHasToken := loadPMKeys(readTestFile("keyring_addressKeysSecondaryHasToken_JSON", false))
|
|
|
|
key, err := crypto.NewKeyFromArmored(readTestFile("keyring_userKey", false))
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
userKey, err := crypto.NewKeyRing(key)
|
|
r.NoError(err, "Expected not to receive an error unlocking user key")
|
|
|
|
type args struct {
|
|
userKeyring *crypto.KeyRing
|
|
passphrase []byte
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
keys *PMKeys
|
|
args args
|
|
}{
|
|
{
|
|
name: "AddressKeys locked with tokens",
|
|
keys: addrKeysWithTokens,
|
|
args: args{userKeyring: userKey, passphrase: []byte("testpassphrase")},
|
|
},
|
|
{
|
|
name: "AddressKeys locked with passphrase, not tokens",
|
|
keys: addrKeysWithoutTokens,
|
|
args: args{userKeyring: userKey, passphrase: []byte("testpassphrase")},
|
|
},
|
|
{
|
|
name: "AddressKeys, primary locked with token, secondary with passphrase",
|
|
keys: addrKeysPrimaryHasToken,
|
|
args: args{userKeyring: userKey, passphrase: []byte("testpassphrase")},
|
|
},
|
|
{
|
|
name: "AddressKeys, primary locked with passphrase, secondary with token",
|
|
keys: addrKeysSecondaryHasToken,
|
|
args: args{userKeyring: userKey, passphrase: []byte("testpassphrase")},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
kr, err := tt.keys.UnlockAll(tt.args.passphrase, tt.args.userKeyring) // nolint[scopelint]
|
|
r.NoError(err)
|
|
|
|
// assert at least one key has been decrypted
|
|
atLeastOneDecrypted := false
|
|
|
|
for _, k := range kr.GetKeys() { // nolint[scopelint]
|
|
ok, err := k.IsUnlocked()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
if ok {
|
|
atLeastOneDecrypted = true
|
|
break
|
|
}
|
|
}
|
|
|
|
r.True(atLeastOneDecrypted)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGopenpgpEncryptAttachment(t *testing.T) {
|
|
r := require.New(t)
|
|
|
|
wantMessage := crypto.NewPlainMessage([]byte(testAttachmentCleartext))
|
|
|
|
pgpSplitMessage, err := testPublicKeyRing.EncryptAttachment(wantMessage, "")
|
|
r.NoError(err)
|
|
|
|
haveMessage, err := testPrivateKeyRing.DecryptAttachment(pgpSplitMessage)
|
|
r.NoError(err)
|
|
|
|
r.Equal(wantMessage.Data, haveMessage.Data)
|
|
}
|