Switch build system to rollup

Also, default to minimized builds.
This commit is contained in:
Daniel Huigens 2020-04-23 02:08:28 +02:00
parent c48070def6
commit 0e33e641af
56 changed files with 844 additions and 5022 deletions

View File

@ -13,6 +13,7 @@ module.exports = {
],
"globals": { // TODO are all these necessary?
"globalThis": true,
"console": true,
"Promise": true,
"importScripts": true,

2
.gitignore vendored
View File

@ -1,10 +1,8 @@
.DS_Store
node_modules/
npm*
src/compression/
test/lib/
dist/
openpgp.store/
doc/
browserify-cache*.json
.nyc_output/

View File

@ -3,98 +3,8 @@ module.exports = function(grunt) {
const version = grunt.option('release');
const fs = require('fs');
// Project configuration.
const dev = !!grunt.option('dev');
const compat = !!grunt.option('compat');
const lightweight = !!grunt.option('lightweight');
const plugins = compat ? [
"transform-async-to-generator",
"syntax-async-functions",
"transform-regenerator",
"transform-runtime"
] : [];
const presets = [[require.resolve('babel-preset-env'), {
targets: {
browsers: compat ? [
'IE >= 11',
'Safari >= 9',
'Last 2 Chrome versions',
'Last 2 Firefox versions',
'Last 2 Edge versions'
] : [
'Last 2 Chrome versions',
'Last 2 Firefox versions',
'Last 2 Safari versions',
'Last 2 Edge versions'
]
}
}]];
grunt.initConfig({
pkg: grunt.file.readJSON('package.json'),
browserify: {
openpgp: {
files: {
'dist/openpgp.js': ['./src/index.js']
},
options: {
browserifyOptions: {
fullPaths: dev,
debug: dev,
standalone: 'openpgp'
},
cacheFile: 'browserify-cache' + (compat ? '-compat' : '') + (lightweight ? '-lightweight' : '') + '.json',
// Don't bundle these packages with openpgp.js
external: ['crypto', 'zlib', 'node-localstorage', 'node-fetch', 'asn1.js', 'stream', 'buffer'].concat(
compat ? [] : [
'whatwg-fetch',
'core-js/fn/array/fill',
'core-js/fn/array/find',
'core-js/fn/array/includes',
'core-js/fn/array/from',
'core-js/fn/promise',
'core-js/fn/typed/uint8-array',
'core-js/fn/string/repeat',
'core-js/fn/symbol',
'core-js/fn/object/assign'
],
lightweight ? [
'elliptic',
'elliptic.min.js'
] : []
),
transform: [
["babelify", {
global: true,
// Only babelify web-streams-polyfill, web-stream-tools, asmcrypto, email-addresses and seek-bzip in node_modules
only: /^(?:.*\/node_modules\/web-streams-polyfill\/|.*\/node_modules\/web-stream-tools\/|.*\/node_modules\/asmcrypto\.js\/|.*\/node_modules\/email-addresses\/|.*\/node_modules\/seek-bzip\/|(?!.*\/node_modules\/)).*$/,
ignore: ['*.min.js'],
plugins,
presets
}]
],
plugin: ['browserify-derequire']
}
},
unittests: {
files: {
'test/lib/unittests-bundle.js': ['./test/unittests.js']
},
options: {
cacheFile: 'browserify-cache-unittests.json',
external: ['buffer', 'openpgp', '../../dist/openpgp', '../../../dist/openpgp'],
transform: [
["babelify", {
global: true,
// Only babelify chai-as-promised in node_modules
only: /^(?:.*\/node_modules\/chai-as-promised\/|(?!.*\/node_modules\/)).*$/,
ignore: ['*.min.js'],
plugins,
presets
}]
]
}
}
},
nyc: {
cover: {
options: {
@ -112,65 +22,6 @@ module.exports = function(grunt) {
}
}
},
replace: {
openpgp: {
src: ['dist/openpgp.js'],
dest: ['dist/openpgp.js'],
replacements: [{
from: /OpenPGP.js VERSION/g,
to: 'OpenPGP.js v<%= pkg.version %>'
}]
},
lightweight_build: {
src: ['dist/openpgp.js'],
overwrite: true,
replacements: [
{
from: "externalIndutnyElliptic: false",
to: "externalIndutnyElliptic: true"
}
]
},
indutny_global: {
src: ['dist/elliptic.min.js'],
overwrite: true,
replacements: [
{
from: 'b.elliptic=a()',
to: 'b.openpgp.elliptic=a()'
}
]
}
},
terser: {
openpgp: {
files: {
'dist/openpgp.min.js' : ['dist/openpgp.js']
},
options: {
output: {
comments: `/^!/`
},
sourceMap: dev ? {
content: 'inline',
url: 'inline'
} : {},
safari10: true
}
}
},
header: {
openpgp: {
options: {
text: '/*! OpenPGP.js v<%= pkg.version %> - ' +
'<%= grunt.template.today("yyyy-mm-dd") %> - ' +
'this is LGPL licensed code, see LICENSE/our website <%= pkg.homepage %> for more information. */'
},
files: {
'dist/openpgp.js': 'dist/openpgp.js'
}
}
},
jsbeautifier: {
files: ['src/**/*.js'],
options: {
@ -232,7 +83,7 @@ module.exports = function(grunt) {
expand: true,
flatten: true,
src: ['./node_modules/elliptic/dist/elliptic.min.js'],
dest: 'dist/'
dest: 'dist/lightweight/'
}
},
clean: {
@ -253,23 +104,10 @@ module.exports = function(grunt) {
base: '.'
}
}
},
watch: {
src: {
files: ['src/**/*.js'],
tasks: lightweight ? ['browserify:openpgp', 'replace:lightweight_build'] : ['browserify:openpgp']
},
test: {
files: ['test/*.js', 'test/crypto/**/*.js', 'test/general/**/*.js', 'test/worker/**/*.js'],
tasks: ['browserify:unittests']
}
}
});
// Load the plugin(s)
grunt.loadNpmTasks('grunt-browserify');
grunt.loadNpmTasks('grunt-terser');
grunt.loadNpmTasks('grunt-header');
grunt.loadNpmTasks('grunt-text-replace');
grunt.loadNpmTasks('grunt-jsbeautifier');
grunt.loadNpmTasks('grunt-jsdoc');
@ -316,14 +154,6 @@ module.exports = function(grunt) {
// Build tasks
grunt.registerTask('version', ['replace:openpgp']);
grunt.registerTask('build', function() {
if (lightweight) {
grunt.task.run(['copy:indutny_elliptic', 'browserify:openpgp', 'replace:lightweight_build', 'replace:indutny_global', 'version', 'header', 'terser']);
return;
}
grunt.task.run(['browserify:openpgp', 'version', 'header', 'terser']);
}
);
grunt.registerTask('documentation', ['jsdoc']);
grunt.registerTask('default', ['build']);
// Test/Dev tasks

4712
package-lock.json generated

File diff suppressed because it is too large Load Diff

View File

@ -13,7 +13,12 @@
"gpg",
"openpgp"
],
"main": "dist/openpgp.js",
"main": "dist/node/openpgp.min.js",
"module": "dist/node/openpgp.min.mjs",
"browser": {
"./dist/node/openpgp.min.js": "./dist/openpgp.min.js",
"./dist/node/openpgp.min.mjs": "./dist/openpgp.min.mjs"
},
"directories": {
"lib": "src"
},
@ -25,64 +30,54 @@
"test/crypto"
],
"scripts": {
"build": "grunt build --compat copy:openpgp_compat && grunt build --lightweight copy:openpgp_lightweight clean:js && grunt build",
"prepare": "grunt clean:cache && npm run build",
"build": "rollup --config --sourcemap",
"prepare": "npm run build",
"test": "grunt test",
"lint": "eslint src"
},
"devDependencies": {
"babel-core": "^6.26.3",
"babel-plugin-syntax-async-functions": "^6.13.0",
"babel-plugin-transform-async-to-generator": "^6.24.1",
"babel-plugin-transform-regenerator": "^6.26.0",
"babel-plugin-transform-remove-strict-mode": "0.0.2",
"babel-plugin-transform-runtime": "^6.23.0",
"babel-polyfill": "^6.26.0",
"babel-preset-env": "^1.7.0",
"babel-preset-es2015-mod": "^6.6.0",
"babel-preset-es3": "^1.0.1",
"babelify": "^8.0.0",
"browserify-derequire": "^0.9.4",
"@mattiasbuelens/web-streams-adapter": "0.1.0-alpha.5",
"@rollup/plugin-commonjs": "^11.1.0",
"@rollup/plugin-node-resolve": "^7.1.3",
"@rollup/plugin-replace": "^2.3.2",
"asmcrypto.js": "github:openpgpjs/asmcrypto#475cffa5ccb2cf2556427056679414acf3610d1b",
"bn.js": "^4.11.8",
"buffer": "^5.0.8",
"chai": "^4.1.2",
"chai-as-promised": "^7.1.1",
"core-js": "^2.5.3",
"elliptic": "github:openpgpjs/elliptic#ab7d8268c60b6abeb175841c578c224ac5b2d279",
"email-addresses": "3.1.0",
"eslint": "^4.17.0",
"eslint-config-airbnb": "^16.1.0",
"eslint-config-airbnb-base": "^12.1.0",
"eslint-plugin-import": "^2.8.0",
"eslint-plugin-chai-friendly": "^0.5.0",
"eslint-plugin-import": "^2.8.0",
"grunt": "^1.1.0",
"grunt-browserify": "^5.3.0",
"grunt-contrib-clean": "~1.1.0",
"grunt-contrib-connect": "~1.0.2",
"grunt-contrib-copy": "~1.0.0",
"grunt-contrib-watch": "^1.1.0",
"grunt-header": "^1.1.0",
"grunt-jsbeautifier": "^0.2.13",
"grunt-jsdoc": "^2.2.1",
"grunt-mocha-test": "^0.13.3",
"grunt-simple-nyc": "^3.0.1",
"grunt-terser": "^0.1.0",
"grunt-text-replace": "~0.4.0",
"gruntify-eslint": "^4.0.0",
"hash.js": "^1.1.3",
"mocha": "^5.0.0",
"nyc": "^14.1.1",
"pako": "^1.0.6",
"rollup": "^2.7.2",
"rollup-plugin-terser": "^5.3.0",
"seek-bzip": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
"sinon": "^4.3.0",
"text-encoding-utf-8": "^1.0.2",
"whatwg-fetch": "^2.0.3",
"asmcrypto.js": "github:openpgpjs/asmcrypto#475cffa5ccb2cf2556427056679414acf3610d1b",
"bn.js": "^4.11.8",
"buffer": "^5.0.8",
"elliptic": "github:openpgpjs/elliptic#ab7d8268c60b6abeb175841c578c224ac5b2d279",
"hash.js": "^1.1.3",
"pako": "^1.0.6",
"seek-bzip": "github:openpgpjs/seek-bzip#6187fc025851d35c4e104a25ea15a10b9b8d6f7d",
"tweetnacl": "github:openpgpjs/tweetnacl-js#3dae25bd3eaa77173f3405676b595721dde92eec",
"web-stream-tools": "github:openpgpjs/web-stream-tools#699d88c8d8f78d1513769e16cf557929c97bf83c",
"email-addresses": "3.1.0"
"web-stream-tools": "github:openpgpjs/web-stream-tools#b70529205ecaa41139311e874bdab0f8a9358a94",
"whatwg-fetch": "^2.0.3"
},
"dependencies": {
"@mattiasbuelens/web-streams-adapter": "0.1.0-alpha.3",
"asn1.js": "^5.0.0",
"node-fetch": "^2.1.2",
"node-localstorage": "~1.3.0"

128
rollup.config.js Normal file
View File

@ -0,0 +1,128 @@
import { builtinModules } from 'module';
import resolve from '@rollup/plugin-node-resolve';
import commonjs from '@rollup/plugin-commonjs';
import replace from '@rollup/plugin-replace';
import { terser } from "rollup-plugin-terser";
import pkg from './package.json';
const nodeDependencies = Object.keys(pkg.dependencies);
const compat = [
'whatwg-fetch',
'core-js/fn/array/fill',
'core-js/fn/array/find',
'core-js/fn/array/includes',
'core-js/fn/array/from',
'core-js/fn/promise',
'core-js/fn/typed/uint8-array',
'core-js/fn/string/repeat',
'core-js/fn/symbol',
'core-js/fn/object/assign'
];
const banner =
`/*! OpenPGP.js v${pkg.version} - ` +
`${new Date().toISOString().split('T')[0]} - ` +
`this is LGPL licensed code, see LICENSE/our website ${pkg.homepage} for more information. */`;
const terserOptions = {
ecma: 2017,
compress: {
unsafe: true
}
};
export default [
{
input: 'src/index.js',
output: [
{ file: 'dist/openpgp.js', format: 'iife', name: pkg.name, banner },
{ file: 'dist/openpgp.min.js', format: 'iife', name: pkg.name, banner, plugins: [terser(terserOptions)] },
{ file: 'dist/openpgp.mjs', format: 'es', banner },
{ file: 'dist/openpgp.min.mjs', format: 'es', banner, plugins: [terser(terserOptions)] }
],
plugins: [
resolve({
browser: true
}),
commonjs({
ignore: builtinModules.concat(nodeDependencies).concat(compat)
}),
replace({
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`,
'require(': 'void(',
delimiters: ['', '']
})
]
},
{
input: 'src/index.js',
external: builtinModules.concat(nodeDependencies),
output: [
{ file: 'dist/node/openpgp.js', format: 'cjs', name: pkg.name, banner },
{ file: 'dist/node/openpgp.min.js', format: 'cjs', name: pkg.name, banner, plugins: [terser(terserOptions)] },
{ file: 'dist/node/openpgp.mjs', format: 'es', banner },
{ file: 'dist/node/openpgp.min.mjs', format: 'es', banner, plugins: [terser(terserOptions)] }
],
plugins: [
resolve(),
commonjs({
ignore: compat
}),
replace({
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`,
})
]
},
{
input: 'src/index.js',
output: [
{ file: 'dist/lightweight/openpgp.js', format: 'iife', name: pkg.name, banner },
{ file: 'dist/lightweight/openpgp.min.js', format: 'iife', name: pkg.name, banner, plugins: [terser(terserOptions)] },
{ file: 'dist/lightweight/openpgp.mjs', format: 'es', banner },
{ file: 'dist/lightweight/openpgp.min.mjs', format: 'es', banner, plugins: [terser(terserOptions)] }
],
plugins: [
resolve({
browser: true
}),
commonjs({
ignore: builtinModules.concat(nodeDependencies).concat(compat).concat('elliptic')
}),
replace({
'OpenPGP.js VERSION': `OpenPGP.js ${pkg.version}`,
'externalIndutnyElliptic: false': 'externalIndutnyElliptic: true',
'require(': 'void(',
delimiters: ['', '']
})
]
},
{
input: 'node_modules/elliptic/dist/elliptic.min.js',
output: [
{ file: 'dist/lightweight/elliptic.min.js', format: 'es' }
],
plugins: [
replace({
'b.elliptic=a()': 'b.openpgp.elliptic=a()',
delimiters: ['', '']
})
]
},
{
input: 'test/unittests.js',
output: [
{ file: 'test/lib/unittests-bundle.js', format: 'iife' },
],
plugins: [
resolve({
browser: true
}),
commonjs({
ignore: builtinModules.concat(nodeDependencies).concat(compat).concat(['../..', '../../..'])
})
]
}
];

View File

@ -24,7 +24,6 @@
import { loadScript, dl } from '../../../lightweight_helper';
import config from '../../../config';
import util from '../../../util';
export function keyFromPrivate(indutnyCurve, priv) {
const keyPair = indutnyCurve.keyPair({ priv: priv });
@ -63,10 +62,6 @@ function loadElliptic() {
if (!config.externalIndutnyElliptic) {
return require('elliptic');
}
if (util.detectNode()) {
// eslint-disable-next-line
return require(config.indutnyEllipticPath);
}
if (!ellipticPromise) {
ellipticPromise = loadEllipticPromise().catch(e => {
ellipticPromise = undefined;

View File

@ -2,12 +2,9 @@
* @fileoverview Old browser polyfills
* All are listed as dev dependencies because Node does not need them
* and for browser babel will take care of it
* @requires util
* @module polyfills
*/
import util from './util';
if (typeof global !== 'undefined') {
/********************************************************************
* NOTE: This list is duplicated in Gruntfile.js, *
@ -50,7 +47,7 @@ if (typeof global !== 'undefined') {
}
if (typeof TextEncoder === 'undefined') {
const nodeUtil = util.nodeRequire('util') || {};
const nodeUtil = require('util') || {};
global.TextEncoder = nodeUtil.TextEncoder;
global.TextDecoder = nodeUtil.TextDecoder;
}

View File

@ -519,22 +519,6 @@ export default {
typeof global.process.versions === 'object';
},
/**
* Get native Node.js module
* @param {String} The module to require
* @returns {Object} The required module or 'undefined'
*/
nodeRequire: function(module) {
if (!util.detectNode()) {
return;
}
// Requiring the module dynamically allows us to access the native node module.
// otherwise, it gets replaced with the browserified version
// eslint-disable-next-line import/no-dynamic-require
return require(module);
},
/**
* Get native Node.js crypto api. The default configuration is to use
* the api when available. But it can also be deactivated with config.useNative
@ -545,7 +529,7 @@ export default {
return;
}
return util.nodeRequire('crypto');
return require('crypto');
},
getNodeZlib: function() {
@ -553,7 +537,7 @@ export default {
return;
}
return util.nodeRequire('zlib');
return require('zlib');
},
/**
@ -562,16 +546,16 @@ export default {
* @returns {Function} The Buffer constructor or 'undefined'
*/
getNodeBuffer: function() {
return (util.nodeRequire('buffer') || {}).Buffer;
return (require('buffer') || {}).Buffer;
},
getNodeStream: function() {
return (util.nodeRequire('stream') || {}).Readable;
return (require('stream') || {}).Readable;
},
getHardwareConcurrency: function() {
if (util.detectNode()) {
const os = util.nodeRequire('os');
const os = require('os');
return os.cpus().length;
}

View File

@ -1,8 +1,8 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const expect = require('chai').expect;
describe('AES Key Wrap and Unwrap', function () {
module.exports = () => describe('AES Key Wrap and Unwrap', function () {
const test_vectors = [
[
"128 bits of Key Data with a 128-bit KEK",

View File

@ -1,10 +1,10 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
const { expect } = chai;
describe('AES Rijndael cipher test with test vectors from ecb_tbl.txt', function() {
module.exports = () => describe('AES Rijndael cipher test with test vectors from ecb_tbl.txt', function() {
function test_aes(input, key, output) {
const aes = new openpgp.crypto.cipher.aes128(new Uint8Array(key));

View File

@ -1,11 +1,11 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
const { util } = openpgp;
const { expect } = chai;
it('Blowfish cipher test with test vectors from https://www.schneier.com/code/vectors.txt', function(done) {
module.exports = () => it('Blowfish cipher test with test vectors from https://www.schneier.com/code/vectors.txt', function(done) {
function test_bf(input, key, output) {
const blowfish = new openpgp.crypto.cipher.blowfish(util.uint8ArrayToStr(key));
const result = util.uint8ArrayToStr(blowfish.encrypt(input));

View File

@ -1,11 +1,11 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
const { util } = openpgp;
const { expect } = chai;
it('CAST-128 cipher test with test vectors from RFC2144', function (done) {
module.exports = () => it('CAST-128 cipher test with test vectors from RFC2144', function (done) {
function test_cast(input, key, output) {
const cast5 = new openpgp.crypto.cipher.cast5(key);
const result = util.uint8ArrayToStr(cast5.encrypt(input));

View File

@ -1,11 +1,11 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
const { util } = openpgp;
const { expect } = chai;
describe('TripleDES (EDE) cipher test with test vectors from NIST SP 800-20', function() {
module.exports = () => describe('TripleDES (EDE) cipher test with test vectors from NIST SP 800-20', function() {
// see https://csrc.nist.gov/publications/nistpubs/800-20/800-20.pdf
const key = new Uint8Array([1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]);
const testvectors = [[[0x80,0x00,0x00,0x00,0x00,0x00,0x00,0x00],[0x95,0xF8,0xA5,0xE5,0xDD,0x31,0xD9,0x00]],

View File

@ -1,7 +1,7 @@
describe('Cipher', function () {
require('./aes.js');
require('./blowfish.js');
require('./cast5.js');
require('./des.js');
require('./twofish.js');
module.exports = () => describe('Cipher', function () {
require('./aes.js')();
require('./blowfish.js')();
require('./cast5.js')();
require('./des.js')();
require('./twofish.js')();
});

View File

@ -1,11 +1,11 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
const { util } = openpgp;
const { expect } = chai;
it('Twofish with test vectors from https://www.schneier.com/code/ecb_ival.txt', function(done) {
module.exports = () => it('Twofish with test vectors from https://www.schneier.com/code/ecb_ival.txt', function(done) {
function tfencrypt(block, key) {
const tf = new openpgp.crypto.cipher.twofish(util.strToUint8Array(key));

View File

@ -1,11 +1,11 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
const expect = chai.expect;
describe('API functional testing', function() {
module.exports = () => describe('API functional testing', function() {
const util = openpgp.util;
const crypto = openpgp.crypto;
const RSApubMPIstrs = [

View File

@ -2,7 +2,7 @@
// Adapted from https://github.com/artjomb/cryptojs-extension/blob/8c61d159/test/eax.js
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
@ -123,28 +123,30 @@ function testAESEAX() {
});
}
describe('Symmetric AES-EAX (native)', function() {
let useNativeVal;
beforeEach(function() {
useNativeVal = openpgp.config.useNative;
openpgp.config.useNative = true;
});
afterEach(function() {
openpgp.config.useNative = useNativeVal;
module.exports = () => {
describe('Symmetric AES-EAX (native)', function() {
let useNativeVal;
beforeEach(function() {
useNativeVal = openpgp.config.useNative;
openpgp.config.useNative = true;
});
afterEach(function() {
openpgp.config.useNative = useNativeVal;
});
testAESEAX();
});
testAESEAX();
});
describe('Symmetric AES-EAX (asm.js fallback)', function() {
let useNativeVal;
beforeEach(function() {
useNativeVal = openpgp.config.useNative;
openpgp.config.useNative = false;
});
afterEach(function() {
openpgp.config.useNative = useNativeVal;
});
describe('Symmetric AES-EAX (asm.js fallback)', function() {
let useNativeVal;
beforeEach(function() {
useNativeVal = openpgp.config.useNative;
openpgp.config.useNative = false;
testAESEAX();
});
afterEach(function() {
openpgp.config.useNative = useNativeVal;
});
testAESEAX();
});
};

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
const elliptic_data = require('./elliptic_data');
@ -7,7 +7,7 @@ chai.use(require('chai-as-promised'));
const expect = chai.expect;
const key_data = elliptic_data.key_data;
/* eslint-disable no-invalid-this */
describe('ECDH key exchange @lightweight', function () {
module.exports = () => describe('ECDH key exchange @lightweight', function () {
const elliptic_curves = openpgp.crypto.publicKey.elliptic;
const decrypt_message = function (oid, hash, cipher, priv, pub, ephemeral, data, fingerprint) {
if (openpgp.util.isString(data)) {

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
const elliptic_data = require('./elliptic_data');
@ -8,7 +8,7 @@ chai.use(require('chai-as-promised'));
const expect = chai.expect;
const key_data = elliptic_data.key_data;
/* eslint-disable no-invalid-this */
describe('Elliptic Curve Cryptography @lightweight', function () {
module.exports = () => describe('Elliptic Curve Cryptography @lightweight', function () {
const elliptic_curves = openpgp.crypto.publicKey.elliptic;
const signature_data = {

View File

@ -1,5 +1,5 @@
describe('Hash', function () {
require('./md5.js');
require('./ripemd.js');
require('./sha.js');
module.exports = () => describe('Hash', function () {
require('./md5.js')();
require('./ripemd.js')();
require('./sha.js')();
});

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
@ -6,7 +6,7 @@ const { util } = openpgp;
const md5 = openpgp.crypto.hash.md5;
const { expect } = chai;
it('MD5 with test vectors from RFC 1321', async function() {
module.exports = () => it('MD5 with test vectors from RFC 1321', async function() {
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array(''))), 'MD5("") = d41d8cd98f00b204e9800998ecf8427e')).to.equal('d41d8cd98f00b204e9800998ecf8427e');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array('abc'))), 'MD5("a") = 0cc175b9c0f1b6a831c399e269772661')).to.equal('900150983cd24fb0d6963f7d28e17f72');
expect(util.strToHex(util.uint8ArrayToStr(await md5(util.strToUint8Array('message digest'))), 'MD5("message digest") = f96b697d7cb7938d525a2f31aaf161d0')).to.equal('f96b697d7cb7938d525a2f31aaf161d0');

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
@ -6,7 +6,7 @@ const { util } = openpgp;
const rmdString = openpgp.crypto.hash.ripemd;
const { expect } = chai;
it("RIPE-MD 160 bits with test vectors from https://homes.esat.kuleuven.be/~bosselae/ripemd160.html", async function() {
module.exports = () => it("RIPE-MD 160 bits with test vectors from https://homes.esat.kuleuven.be/~bosselae/ripemd160.html", async function() {
expect(util.strToHex(util.uint8ArrayToStr(await rmdString(util.strToUint8Array(''))), 'RMDstring("") = 9c1185a5c5e9fc54612808977ee8f548b2258d31')).to.equal('9c1185a5c5e9fc54612808977ee8f548b2258d31');
expect(util.strToHex(util.uint8ArrayToStr(await rmdString(util.strToUint8Array('a'))), 'RMDstring("a") = 0bdc9d2d256b3ee9daae347be6f4dc835a467ffe')).to.equal('0bdc9d2d256b3ee9daae347be6f4dc835a467ffe');
expect(util.strToHex(util.uint8ArrayToStr(await rmdString(util.strToUint8Array('abc'))), 'RMDstring("abc") = 8eb208f7e05d987a9b044a8e98c6b087f15a0bfc')).to.equal('8eb208f7e05d987a9b044a8e98c6b087f15a0bfc');

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../..');
const chai = require('chai');
@ -6,7 +6,7 @@ const { util } = openpgp;
const { hash } = openpgp.crypto;
const { expect } = chai;
it('SHA* with test vectors from NIST FIPS 180-2', async function() {
module.exports = () => it('SHA* with test vectors from NIST FIPS 180-2', async function() {
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha1(util.strToUint8Array('abc'))), 'hash.sha1("abc") = a9993e364706816aba3e25717850c26c9cd0d89d')).to.equal('a9993e364706816aba3e25717850c26c9cd0d89d');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha1(util.strToUint8Array('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq'))), 'hash.sha1("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq") = 84983e441c3bd26ebaae4aa1f95129e5e54670f1')).to.equal('84983e441c3bd26ebaae4aa1f95129e5e54670f1');
expect(util.strToHex(util.uint8ArrayToStr(await hash.sha224(util.strToUint8Array('abc'))), 'hash.sha224("abc") = 23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7')).to.equal('23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7');

View File

@ -1,14 +1,14 @@
describe('Crypto', function () {
require('./cipher');
require('./hash');
require('./random.js');
require('./crypto.js');
require('./elliptic.js');
require('./ecdh.js');
require('./pkcs5.js');
require('./aes_kw.js');
require('./eax.js');
require('./ocb.js');
require('./rsa.js');
module.exports = () => describe('Crypto', function () {
require('./cipher')();
require('./hash')();
require('./random.js')();
require('./crypto.js')();
require('./elliptic.js')();
require('./ecdh.js')();
require('./pkcs5.js')();
require('./aes_kw.js')();
require('./eax.js')();
require('./ocb.js')();
require('./rsa.js')();
require('./validate.js');
});

View File

@ -2,14 +2,14 @@
// Adapted from https://github.com/artjomb/cryptojs-extension/blob/8c61d159/test/eax.js
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
const expect = chai.expect;
describe('Symmetric AES-OCB', function() {
module.exports = () => describe('Symmetric AES-OCB', function() {
it('Passes all test vectors', async function() {
const K = '000102030405060708090A0B0C0D0E0F';
const keyBytes = openpgp.util.hexToUint8Array(K);

View File

@ -1,8 +1,8 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const expect = require('chai').expect;
describe('PKCS5 padding', function() {
module.exports = () => describe('PKCS5 padding', function() {
function repeat(pattern, count) {
let result = '';
for (let k = 0; k < count; ++k) {

View File

@ -1,10 +1,10 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
const { expect } = chai;
describe('Random Buffer', function() {
module.exports = () => describe('Random Buffer', function() {
let randomBuffer;
before(function() {

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
@ -8,7 +8,7 @@ const expect = chai.expect;
/* eslint-disable no-unused-expressions */
/* eslint-disable no-invalid-this */
const native = openpgp.util.getWebCrypto() || openpgp.util.getNodeCrypto();
(!native ? describe.skip : describe)('basic RSA cryptography with native crypto', function () {
module.exports = () => (!native ? describe.skip : describe)('basic RSA cryptography with native crypto', function () {
it('generate rsa key', async function() {
const bits = openpgp.util.getWebCryptoAll() ? 2048 : 1024;
const keyObject = await openpgp.crypto.publicKey.rsa.generate(bits, "10001");

View File

@ -1,10 +1,10 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
const { expect } = chai;
describe("ASCII armor", function() {
module.exports = () => describe("ASCII armor", function() {
function getArmor(headers, signatureHeaders) {
return ['-----BEGIN PGP SIGNED MESSAGE-----']

View File

@ -1,6 +1,6 @@
/* globals tryTests: true */
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
@ -8,7 +8,7 @@ const input = require('./testInputs.js');
const expect = chai.expect;
(openpgp.config.ci ? describe.skip : describe)('Brainpool Cryptography @lightweight', function () {
module.exports = () => (openpgp.config.ci ? describe.skip : describe)('Brainpool Cryptography @lightweight', function () {
//only x25519 crypto is fully functional in lightbuild
if (!openpgp.config.useIndutnyElliptic && !openpgp.util.getNodeCrypto()) {
before(function() {
@ -271,6 +271,10 @@ EJ4QcD/oQ6x1M/8X/iKQCtxZP8RnlrbH7ExkNON5s5g=
expect(result.signatures).to.have.length(1);
expect(result.signatures[0].valid).to.be.true;
});
tryTests('Brainpool Omnibus Tests @lightweight', omnibus, {
if: openpgp.config.useIndutnyElliptic || openpgp.util.getNodeCrypto()
});
});
function omnibus() {
@ -335,8 +339,4 @@ function omnibus() {
});
}
tryTests('Brainpool Omnibus Tests @lightweight', omnibus, {
if: !openpgp.config.ci && (openpgp.config.useIndutnyElliptic || openpgp.util.getNodeCrypto())
});
// TODO find test vectors

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
@ -40,7 +40,7 @@ Xg==
}
};
describe('Decrypt and decompress message tests', function () {
module.exports = () => describe('Decrypt and decompress message tests', function () {
function runTest(key, test) {
it(`Decrypts message compressed with ${key}`, async function () {

View File

@ -1,6 +1,6 @@
/* globals tryTests: true */
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
@ -8,7 +8,7 @@ const input = require('./testInputs.js');
const expect = chai.expect;
describe('Elliptic Curve Cryptography for NIST P-256,P-384,P-521 curves @lightweight', function () {
module.exports = () => describe('Elliptic Curve Cryptography for NIST P-256,P-384,P-521 curves @lightweight', function () {
function omnibus() {
it('Omnibus NIST P-256 Test', function () {
const options = { userIds: {name: "Hi", email: "hi@hel.lo"}, curve: "p256" };

View File

@ -1,13 +1,13 @@
/* globals tryTests: true */
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
const expect = chai.expect;
describe('Elliptic Curve Cryptography for secp256k1 curve @lightweight', function () {
module.exports = () => describe('Elliptic Curve Cryptography for secp256k1 curve @lightweight', function () {
if (!openpgp.config.useIndutnyElliptic && !openpgp.util.getNodeCrypto()) {
before(function() {
this.skip();

View File

@ -1,10 +1,10 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
const { expect } = chai;
describe.skip('HKP unit tests', function() {
module.exports = () => describe.skip('HKP unit tests', function() {
this.timeout(60000);
let hkp;

View File

@ -1,19 +1,19 @@
describe('General', function () {
require('./util.js');
require('./armor.js');
require('./packet.js');
require('./keyring.js');
require('./signature.js');
require('./key.js');
require('./openpgp.js');
require('./hkp.js');
require('./wkd.js');
require('./oid.js');
require('./ecc_nist.js');
require('./ecc_secp256k1.js');
require('./x25519.js');
require('./brainpool.js');
require('./decompression.js');
require('./streaming.js');
module.exports = () => describe('General', function () {
require('./util.js')();
require('./armor.js')();
require('./packet.js')();
require('./keyring.js')();
require('./signature.js')();
require('./key.js')();
require('./openpgp.js')();
require('./hkp.js')();
require('./wkd.js')();
require('./oid.js')();
require('./ecc_nist.js')();
require('./ecc_secp256k1.js')();
require('./x25519.js')();
require('./brainpool.js')();
require('./decompression.js')();
require('./streaming.js')();
});

View File

@ -1,6 +1,6 @@
/* globals tryTests: true */
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const stub = require('sinon/lib/sinon/stub');
const chai = require('chai');
@ -2529,15 +2529,19 @@ function versionSpecificTests() {
});
}
describe('Key', function() {
module.exports = () => describe('Key', function() {
let rsaGenStub;
let v5KeysVal;
let aeadProtectVal;
let rsaGenValue = openpgp.crypto.publicKey.rsa.generate(openpgp.util.getWebCryptoAll() ? 2048 : 512, "10001");
let rsaGenValue = {
512: openpgp.crypto.publicKey.rsa.generate(512, "10001"),
1024: openpgp.crypto.publicKey.rsa.generate(1024, "10001"),
2048: openpgp.crypto.publicKey.rsa.generate(2048, "10001")
};
beforeEach(function() {
rsaGenStub = stub(openpgp.crypto.publicKey.rsa, 'generate');
rsaGenStub.returns(rsaGenValue);
rsaGenStub.callsFake(N => rsaGenValue[N]);
});
afterEach(function() {
@ -3314,187 +3318,188 @@ VYGdb3eNlV8CfoEC
await k.encrypt('pass');
})()).to.be.rejectedWith('Key packet is already encrypted');
});
});
describe('addSubkey functionality testing', function(){
let rsaBits;
let rsaOpt = {};
if (openpgp.util.getWebCryptoAll()) {
rsaBits = 2048;
rsaOpt = { rsaBits: rsaBits };
}
it('create and add a new rsa subkey to stored rsa key', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
const subkeyN = subKey.keyPacket.params[0];
const pkN = privateKey.primaryKey.params[0];
expect(subkeyN.byteLength()).to.be.equal(rsaBits ? (rsaBits / 8) : pkN.byteLength());
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign');
expect(subKey.getAlgorithmInfo().rsaBits).to.be.equal(rsaBits || privateKey.getAlgorithmInfo().rsaBits);
await subKey.verify(newPrivateKey.primaryKey);
});
it('should throw when trying to encrypt a subkey separately from key', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const opt = { rsaBits: rsaBits, passphrase: 'subkey passphrase'};
await expect(privateKey.addSubkey(opt)).to.be.rejectedWith('Subkey could not be encrypted here, please encrypt whole key');
});
it('encrypt and decrypt key with added subkey', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
newPrivateKey = await openpgp.key.readArmored(newPrivateKey.armor());
await newPrivateKey.encrypt('12345678');
const armoredKey = newPrivateKey.armor();
let importedPrivateKey = await openpgp.key.readArmored(armoredKey);
await importedPrivateKey.decrypt('12345678');
const subKey = importedPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(importedPrivateKey.subKeys.length).to.be.equal(total+1);
await subKey.verify(importedPrivateKey.primaryKey);
});
it('create and add a new ec subkey to a ec key', async function() {
const userId = 'test <a@b.com>';
const opt = {curve: 'curve25519', userIds: [userId], subkeys:[]};
const privateKey = (await openpgp.generateKey(opt)).key;
const total = privateKey.subKeys.length;
const opt2 = {curve: 'curve25519', userIds: [userId], sign: true};
let newPrivateKey = await privateKey.addSubkey(opt2);
const subKey1 = newPrivateKey.subKeys[total];
await newPrivateKey.encrypt('12345678');
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
await newPrivateKey.decrypt('12345678');
const subKey = newPrivateKey.subKeys[total];
expect(subKey.isDecrypted()).to.be.true;
expect(subKey1.getKeyId().toHex()).to.be.equal(subKey.getKeyId().toHex());
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
const subkeyOid = subKey.keyPacket.params[0];
const pkOid = privateKey.primaryKey.params[0];
expect(subkeyOid.getName()).to.be.equal(pkOid.getName());
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('eddsa');
await subKey.verify(privateKey.primaryKey);
});
it('create and add a new ec subkey to a rsa key', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
const opt2 = {curve: 'curve25519'};
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
expect(subKey.keyPacket.params[0].getName()).to.be.equal(openpgp.enums.curve.curve25519);
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('ecdh');
await subKey.verify(privateKey.primaryKey);
});
it('sign/verify data with the new subkey correctly using curve25519', async function() {
const userId = 'test <a@b.com>';
const opt = {curve: 'curve25519', userIds: [userId], subkeys:[]};
const privateKey = (await openpgp.generateKey(opt)).key;
const total = privateKey.subKeys.length;
const opt2 = {sign: true};
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const subkeyOid = subKey.keyPacket.params[0];
const pkOid = newPrivateKey.primaryKey.params[0];
expect(subkeyOid.getName()).to.be.equal(pkOid.getName());
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('eddsa');
await subKey.verify(newPrivateKey.primaryKey);
expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey);
const signed = await openpgp.sign({message: openpgp.message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false});
const message = await openpgp.message.read(signed);
const { signatures } = await openpgp.verify({message, publicKeys: [newPrivateKey.toPublic()]});
expect(signatures).to.exist;
expect(signatures.length).to.be.equal(1);
expect(signatures[0].keyid.toHex()).to.be.equal(subKey.getKeyId().toHex());
expect(await signatures[0].verified).to.be.true;
});
it('encrypt/decrypt data with the new subkey correctly using curve25519', async function() {
const userId = 'test <a@b.com>';
const vData = 'the data to encrypted!';
const opt = {curve: 'curve25519', userIds: [userId], subkeys:[]};
const privateKey = (await openpgp.generateKey(opt)).key;
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey();
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const publicKey = newPrivateKey.toPublic();
await subKey.verify(newPrivateKey.primaryKey);
expect(await newPrivateKey.getEncryptionKey()).to.be.equal(subKey);
const encrypted = await openpgp.encrypt({message: openpgp.message.fromText(vData), publicKeys: publicKey, armor:false});
expect(encrypted).to.be.exist;
const message = await openpgp.message.read(encrypted);
const pkSessionKeys = message.packets.filterByTag(openpgp.enums.packet.publicKeyEncryptedSessionKey);
expect(pkSessionKeys).to.exist;
expect(pkSessionKeys.length).to.be.equal(1);
expect(pkSessionKeys[0].publicKeyId.toHex()).to.be.equals(subKey.keyPacket.getKeyId().toHex());
const decrypted = await openpgp.decrypt({message, privateKeys: newPrivateKey})
expect(decrypted).to.exist;
expect(decrypted.data).to.be.equal(vData);
});
it('sign/verify data with the new subkey correctly using rsa', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
const opt2 = { sign: true, rsaBits: rsaBits };
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign');
await subKey.verify(newPrivateKey.primaryKey);
expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey);
const signed = await openpgp.sign({message: openpgp.message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false});
const message = await openpgp.message.read(signed);
const { signatures } = await openpgp.verify({message, publicKeys: [newPrivateKey.toPublic()]});
expect(signatures).to.exist;
expect(signatures.length).to.be.equal(1);
expect(signatures[0].keyid.toHex()).to.be.equal(subKey.getKeyId().toHex());
expect(await signatures[0].verified).to.be.true;
});
it('encrypt/decrypt data with the new subkey correctly using rsa', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const publicKey = newPrivateKey.toPublic();
const vData = 'the data to encrypted!';
expect(await newPrivateKey.getEncryptionKey()).to.be.equal(subKey);
const encrypted = await openpgp.encrypt({message: openpgp.message.fromText(vData), publicKeys: publicKey, armor:false});
expect(encrypted).to.be.exist;
const message = await openpgp.message.read(encrypted);
const pkSessionKeys = message.packets.filterByTag(openpgp.enums.packet.publicKeyEncryptedSessionKey);
expect(pkSessionKeys).to.exist;
expect(pkSessionKeys.length).to.be.equal(1);
expect(pkSessionKeys[0].publicKeyId.toHex()).to.be.equals(subKey.keyPacket.getKeyId().toHex());
const decrypted = await openpgp.decrypt({message, privateKeys: newPrivateKey})
expect(decrypted).to.exist;
expect(decrypted.data).to.be.equal(vData);
});
describe('addSubkey functionality testing', function() {
let rsaBits;
let rsaOpt = {};
if (openpgp.util.getWebCryptoAll()) {
rsaBits = 2048;
rsaOpt = { rsaBits: rsaBits };
}
it('create and add a new rsa subkey to stored rsa key', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
const subkeyN = subKey.keyPacket.params[0];
const pkN = privateKey.primaryKey.params[0];
expect(subkeyN.byteLength()).to.be.equal(rsaBits ? (rsaBits / 8) : pkN.byteLength());
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign');
expect(subKey.getAlgorithmInfo().rsaBits).to.be.equal(rsaBits || privateKey.getAlgorithmInfo().rsaBits);
await subKey.verify(newPrivateKey.primaryKey);
});
it('should throw when trying to encrypt a subkey separately from key', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const opt = { rsaBits: rsaBits, passphrase: 'subkey passphrase'};
await expect(privateKey.addSubkey(opt)).to.be.rejectedWith('Subkey could not be encrypted here, please encrypt whole key');
});
it('encrypt and decrypt key with added subkey', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
newPrivateKey = await openpgp.key.readArmored(newPrivateKey.armor());
await newPrivateKey.encrypt('12345678');
const armoredKey = newPrivateKey.armor();
let importedPrivateKey = await openpgp.key.readArmored(armoredKey);
await importedPrivateKey.decrypt('12345678');
const subKey = importedPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(importedPrivateKey.subKeys.length).to.be.equal(total+1);
await subKey.verify(importedPrivateKey.primaryKey);
});
it('create and add a new ec subkey to a ec key', async function() {
const userId = 'test <a@b.com>';
const opt = {curve: 'curve25519', userIds: [userId], subkeys:[]};
const privateKey = (await openpgp.generateKey(opt)).key;
const total = privateKey.subKeys.length;
const opt2 = {curve: 'curve25519', userIds: [userId], sign: true};
let newPrivateKey = await privateKey.addSubkey(opt2);
const subKey1 = newPrivateKey.subKeys[total];
await newPrivateKey.encrypt('12345678');
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
await newPrivateKey.decrypt('12345678');
const subKey = newPrivateKey.subKeys[total];
expect(subKey.isDecrypted()).to.be.true;
expect(subKey1.getKeyId().toHex()).to.be.equal(subKey.getKeyId().toHex());
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
const subkeyOid = subKey.keyPacket.params[0];
const pkOid = privateKey.primaryKey.params[0];
expect(subkeyOid.getName()).to.be.equal(pkOid.getName());
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('eddsa');
await subKey.verify(privateKey.primaryKey);
});
it('create and add a new ec subkey to a rsa key', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
const opt2 = {curve: 'curve25519'};
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey).to.exist;
expect(newPrivateKey.subKeys.length).to.be.equal(total+1);
expect(subKey.keyPacket.params[0].getName()).to.be.equal(openpgp.enums.curve.curve25519);
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('ecdh');
await subKey.verify(privateKey.primaryKey);
});
it('sign/verify data with the new subkey correctly using curve25519', async function() {
const userId = 'test <a@b.com>';
const opt = {curve: 'curve25519', userIds: [userId], subkeys:[]};
const privateKey = (await openpgp.generateKey(opt)).key;
const total = privateKey.subKeys.length;
const opt2 = {sign: true};
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const subkeyOid = subKey.keyPacket.params[0];
const pkOid = newPrivateKey.primaryKey.params[0];
expect(subkeyOid.getName()).to.be.equal(pkOid.getName());
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('eddsa');
await subKey.verify(newPrivateKey.primaryKey);
expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey);
const signed = await openpgp.sign({message: openpgp.message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false});
const message = await openpgp.message.read(signed);
const { signatures } = await openpgp.verify({message, publicKeys: [newPrivateKey.toPublic()]});
expect(signatures).to.exist;
expect(signatures.length).to.be.equal(1);
expect(signatures[0].keyid.toHex()).to.be.equal(subKey.getKeyId().toHex());
expect(await signatures[0].verified).to.be.true;
});
it('encrypt/decrypt data with the new subkey correctly using curve25519', async function() {
const userId = 'test <a@b.com>';
const vData = 'the data to encrypted!';
const opt = {curve: 'curve25519', userIds: [userId], subkeys:[]};
const privateKey = (await openpgp.generateKey(opt)).key;
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey();
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const publicKey = newPrivateKey.toPublic();
await subKey.verify(newPrivateKey.primaryKey);
expect(await newPrivateKey.getEncryptionKey()).to.be.equal(subKey);
const encrypted = await openpgp.encrypt({message: openpgp.message.fromText(vData), publicKeys: publicKey, armor:false});
expect(encrypted).to.be.exist;
const message = await openpgp.message.read(encrypted);
const pkSessionKeys = message.packets.filterByTag(openpgp.enums.packet.publicKeyEncryptedSessionKey);
expect(pkSessionKeys).to.exist;
expect(pkSessionKeys.length).to.be.equal(1);
expect(pkSessionKeys[0].publicKeyId.toHex()).to.be.equals(subKey.keyPacket.getKeyId().toHex());
const decrypted = await openpgp.decrypt({message, privateKeys: newPrivateKey})
expect(decrypted).to.exist;
expect(decrypted.data).to.be.equal(vData);
});
it('sign/verify data with the new subkey correctly using rsa', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
const opt2 = { sign: true, rsaBits: rsaBits };
let newPrivateKey = await privateKey.addSubkey(opt2);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
expect(subKey.getAlgorithmInfo().algorithm).to.be.equal('rsaEncryptSign');
await subKey.verify(newPrivateKey.primaryKey);
expect(await newPrivateKey.getSigningKey()).to.be.equal(subKey);
const signed = await openpgp.sign({message: openpgp.message.fromText('the data to signed'), privateKeys: newPrivateKey, armor:false});
const message = await openpgp.message.read(signed);
const { signatures } = await openpgp.verify({message, publicKeys: [newPrivateKey.toPublic()]});
expect(signatures).to.exist;
expect(signatures.length).to.be.equal(1);
expect(signatures[0].keyid.toHex()).to.be.equal(subKey.getKeyId().toHex());
expect(await signatures[0].verified).to.be.true;
});
it('encrypt/decrypt data with the new subkey correctly using rsa', async function() {
const privateKey = await openpgp.key.readArmored(priv_key_rsa);
await privateKey.decrypt('hello world');
const total = privateKey.subKeys.length;
let newPrivateKey = await privateKey.addSubkey(rsaOpt);
const armoredKey = newPrivateKey.armor();
newPrivateKey = await openpgp.key.readArmored(armoredKey);
const subKey = newPrivateKey.subKeys[total];
const publicKey = newPrivateKey.toPublic();
const vData = 'the data to encrypted!';
expect(await newPrivateKey.getEncryptionKey()).to.be.equal(subKey);
const encrypted = await openpgp.encrypt({message: openpgp.message.fromText(vData), publicKeys: publicKey, armor:false});
expect(encrypted).to.be.exist;
const message = await openpgp.message.read(encrypted);
const pkSessionKeys = message.packets.filterByTag(openpgp.enums.packet.publicKeyEncryptedSessionKey);
expect(pkSessionKeys).to.exist;
expect(pkSessionKeys.length).to.be.equal(1);
expect(pkSessionKeys[0].publicKeyId.toHex()).to.be.equals(subKey.keyPacket.getKeyId().toHex());
const decrypted = await openpgp.decrypt({message, privateKeys: newPrivateKey})
expect(decrypted).to.exist;
expect(decrypted.data).to.be.equal(vData);
});
});
});

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
@ -6,7 +6,7 @@ const { expect } = chai;
const keyring = new openpgp.Keyring();
describe("Keyring", async function() {
module.exports = () => describe("Keyring", async function() {
const user = 'whiteout.test@t-online.de';
const passphrase = 'asdf';
const keySize = 512;

View File

@ -1,8 +1,8 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const expect = require('chai').expect;
describe('Oid tests', function() {
module.exports = () => describe('Oid tests', function() {
const OID = openpgp.OID;
const util = openpgp.util;
const p256_oid = new Uint8Array([0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07]);

View File

@ -1,6 +1,6 @@
/* globals tryTests: true */
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const spy = require('sinon/lib/sinon/spy');
const stub = require('sinon/lib/sinon/stub');
@ -483,7 +483,7 @@ function withCompression(tests) {
});
}
describe('OpenPGP.js public api tests', function() {
module.exports = () => describe('OpenPGP.js public api tests', function() {
let rsaGenStub;
let rsaGenValue = openpgp.crypto.publicKey.rsa.generate(openpgp.util.getWebCryptoAll() ? 2048 : 512, "10001");
@ -582,53 +582,27 @@ describe('OpenPGP.js public api tests', function() {
});
describe('generateKey - unit tests', function() {
let keyGenStub;
let keyObjStub;
let getWebCryptoAllStub;
beforeEach(function() {
keyObjStub = {
armor: function() {
return 'priv_key';
},
toPublic: function() {
return {
armor: function() {
return 'pub_key';
}
};
},
getRevocationCertificate: function() {}
};
keyGenStub = stub(openpgp.key, 'generate');
keyGenStub.returns(resolves(keyObjStub));
getWebCryptoAllStub = stub(openpgp.util, 'getWebCryptoAll');
});
afterEach(function() {
keyGenStub.restore();
getWebCryptoAllStub.restore();
});
it('should have default params set', function() {
const now = openpgp.util.normalizeDate(new Date());
const opt = {
userIds: { name: 'Test User', email: 'text@example.com' },
passphrase: 'secret',
date: now,
subkeys: []
date: now
};
return openpgp.generateKey(opt).then(function(newKey) {
expect(keyGenStub.withArgs({
userIds: [{ name: 'Test User', email: 'text@example.com' }],
passphrase: 'secret',
rsaBits: null,
keyExpirationTime: 0,
curve: "curve25519",
date: now,
subkeys: []
}).calledOnce).to.be.true;
return openpgp.generateKey(opt).then(async function(newKey) {
expect(newKey.key).to.exist;
expect(newKey.key.users.length).to.equal(1);
expect(newKey.key.users[0].userId.name).to.equal('Test User');
expect(newKey.key.users[0].userId.email).to.equal('text@example.com');
expect(newKey.key.getAlgorithmInfo().rsaBits).to.equal(undefined);
expect(newKey.key.getAlgorithmInfo().curve).to.equal('ed25519');
expect(+newKey.key.getCreationTime()).to.equal(+now);
expect(await newKey.key.getExpirationTime()).to.equal(Infinity);
expect(newKey.key.subKeys.length).to.equal(1);
expect(newKey.key.subKeys[0].getAlgorithmInfo().rsaBits).to.equal(undefined);
expect(newKey.key.subKeys[0].getAlgorithmInfo().curve).to.equal('curve25519');
expect(+newKey.key.subKeys[0].getCreationTime()).to.equal(+now);
expect(await newKey.key.subKeys[0].getExpirationTime()).to.equal(Infinity);
expect(newKey.privateKeyArmored).to.exist;
expect(newKey.publicKeyArmored).to.exist;
});

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const stub = require('sinon/lib/sinon/stub');
const chai = require('chai');
@ -23,7 +23,7 @@ function stringify(array) {
return result.join('');
}
describe("Packet", function() {
module.exports = () => describe("Packet", function() {
const armored_key =
'-----BEGIN PGP PRIVATE KEY BLOCK-----\n' +
'Version: GnuPG v2.0.19 (GNU/Linux)\n' +

View File

@ -1,11 +1,11 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
chai.use(require('chai-as-promised'));
const expect = chai.expect;
describe("Signature", function() {
module.exports = () => describe("Signature", function() {
const priv_key_arm1 =
['-----BEGIN PGP PRIVATE KEY BLOCK-----',
'Version: GnuPG v1.4.11 (GNU/Linux)',

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const stub = require('sinon/lib/sinon/stub');
const chai = require('chai');
@ -870,7 +870,7 @@ function tests() {
});
}
describe('Streaming', function() {
module.exports = () => describe('Streaming', function() {
let currentTest = 0;
const aeadChunkSizeByteValue = openpgp.config.aeadChunkSizeByte;
@ -929,7 +929,7 @@ describe('Streaming', function() {
});
if (openpgp.util.detectNode()) {
const fs = util.nodeRequire('fs');
const fs = require('fs');
it('Node: Encrypt and decrypt text message roundtrip', async function() {
dataArrived(); // Do not wait until data arrived.

View File

@ -1,10 +1,10 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
const { expect } = chai;
describe('Util unit tests', function() {
module.exports = () => describe('Util unit tests', function() {
describe('isString', function() {
it('should return true for type "string"', function() {

View File

@ -1,10 +1,10 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const chai = require('chai');
const { expect } = chai;
describe.skip('WKD unit tests', function() {
module.exports = () => describe.skip('WKD unit tests', function() {
this.timeout(60000);
let wkd;

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const elliptic = openpgp.crypto.publicKey.elliptic;
@ -8,7 +8,7 @@ chai.use(require('chai-as-promised'));
const { expect } = chai;
const input = require('./testInputs');
(openpgp.config.ci ? describe.skip : describe)('X25519 Cryptography', function () {
module.exports = () => (openpgp.config.ci ? describe.skip : describe)('X25519 Cryptography', function () {
const data = {
light: {
id: '1ecdf026c0245830',
@ -425,6 +425,8 @@ const input = require('./testInputs');
hi.primaryKey, user.selfCertifications[0], [hi]
);
}); */
describe('X25519 Omnibus Tests', omnibus);
});
// TODO export, then reimport key and validate
@ -533,7 +535,3 @@ function omnibus() {
});
});
}
tryTests('X25519 Omnibus Tests', omnibus, {
if: !openpgp.config.ci
});

View File

@ -1,6 +1,6 @@
describe('Security', function () {
require('./message_signature_bypass');
require('./unsigned_subpackets');
require('./subkey_trust');
require('./preferred_algo_mismatch');
module.exports = () => describe('Security', function () {
require('./message_signature_bypass')();
require('./unsigned_subpackets')();
require('./subkey_trust')();
require('./preferred_algo_mismatch')();
});

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const { key, cleartext, util, packet: { Signature } } = openpgp;
@ -109,4 +109,4 @@ async function fakeSignature() {
expect(signatures).to.have.length(0);
}
it('Does not accept non-binary/text signatures', fakeSignature);
module.exports = () => it('Does not accept non-binary/text signatures', fakeSignature);

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const { key, cleartext, enums, packet: { List, Signature } } = openpgp;
@ -42,7 +42,7 @@ EnxUPL95HuMKoVkf4w==
=oopr
-----END PGP PRIVATE KEY BLOCK-----`;
it('Does not accept message encrypted with algo not mentioned in preferred algorithms', async function() {
module.exports = () => it('Does not accept message encrypted with algo not mentioned in preferred algorithms', async function() {
const message = await openpgp.message.readArmored(messageArmor);
const privKey = await openpgp.key.readArmored(privateKeyArmor);
await expect(openpgp.decrypt({ message, privateKeys: [privKey] })).to.be.rejectedWith('A non-preferred symmetric algorithm was used.');

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const { key, cleartext, enums, packet: { List, Signature } } = openpgp;
@ -73,4 +73,4 @@ async function testSubkeyTrust() {
expect(verifyAttackerIsBatman.signatures[0].valid).to.be.null;
}
it('Does not trust subkeys without Primary Key Binding Signature', testSubkeyTrust);
module.exports = () => it('Does not trust subkeys without Primary Key Binding Signature', testSubkeyTrust);

View File

@ -1,4 +1,4 @@
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../../dist/openpgp');
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const { key, message, enums, packet: { List, Signature } } = openpgp;
@ -91,4 +91,4 @@ async function makeKeyValid() {
expect(await encryptFails(modifiedkey)).to.be.true;
}
it('Does not accept unsigned subpackets', makeKeyValid);
module.exports = () => it('Does not accept unsigned subpackets', makeKeyValid);

View File

@ -6,11 +6,17 @@
<link rel="stylesheet" href="lib/mocha.css" />
<!-- libs -->
<script src="../dist/openpgp.js"></script>
<script>
if (window.location.search.includes('lightweight=')) {
document.write('<script src="../dist/lightweight/openpgp.js"><\/script>');
} else {
document.write('<script src="../dist/openpgp.js"><\/script>');
}
</script>
<script src="lib/mocha.js"></script>
<script>
mocha.setup('bdd');
mocha.timeout(240000);
mocha.setup('bdd');
mocha.timeout(240000);
</script>
</head>
<body>

View File

@ -34,21 +34,21 @@ describe('Unit Tests', function () {
if (typeof window !== 'undefined') {
openpgp.config.s2kIterationCountByte = 0;
openpgp.config.indutnyEllipticPath = '../dist/elliptic.min.js';
openpgp.config.indutnyEllipticPath = '../dist/lightweight/elliptic.min.js';
window.location.search.substr(1).split('&').forEach(param => {
const [key, value] = param.split('=');
if (key && key !== 'grep') {
openpgp.config[key] = decodeURIComponent(value);
try {
openpgp.config[key] = eval(openpgp.config[key]);
openpgp.config[key] = window.eval(openpgp.config[key]);
} catch(e) {}
}
});
}
require('./crypto');
require('./general');
require('./worker');
require('./security');
require('./crypto')();
require('./general')();
require('./worker')();
require('./security')();
});

View File

@ -4,7 +4,7 @@ const chai = require('chai');
const { expect } = chai;
tryTests('Application Worker', tests, {
module.exports = () => tryTests('Application Worker', tests, {
if: typeof window !== 'undefined' && window.Worker && window.MessageChannel
});
@ -15,7 +15,7 @@ function tests() {
this.skip(); // Old Edge doesn't support crypto.getRandomValues inside a Worker.
}
try {
eval('(async function() {})');
globalThis.eval('(async function() {})');
} catch (e) {
console.error(e);
this.skip();

View File

@ -1,4 +1,4 @@
describe('Web Worker', function () {
require('./application_worker.js');
module.exports = () => describe('Web Worker', function () {
require('./application_worker.js')();
});

View File

@ -9,14 +9,13 @@ if [ $OPENPGPJSTEST = "coverage" ]; then
elif [ $OPENPGPJSTEST = "unit" ]; then
echo "Running OpenPGP.js unit tests on node.js."
grunt build test --lightweight=$LIGHTWEIGHT
npm test ${LIGHTWEIGHT+ -- --grep lightweight}
elif [ $OPENPGPJSTEST = "browserstack" ]; then
echo "Running OpenPGP.js browser unit tests on Browserstack."
grunt build browserify:unittests copy:browsertest --compat=$COMPAT --lightweight=$LIGHTWEIGHT
echo -n "Using config: "
echo "{\"browsers\": [$BROWSER], \"test_framework\": \"mocha\", \"test_path\": [\"test/unittests.html?ci=true\"], \"timeout\": 1800, \"exit_with_fail\": true, \"project\": \"openpgpjs/${TRAVIS_EVENT_TYPE:-push}${COMPAT:+/compat}${LIGHTWEIGHT:+/lightweight}\"}" > browserstack.json
echo "{\"browsers\": [$BROWSER], \"test_framework\": \"mocha\", \"test_path\": [\"test/unittests.html?ci=true${LIGHTWEIGHT+&lightweight=true}\"], \"timeout\": 1800, \"exit_with_fail\": true, \"project\": \"openpgpjs/${TRAVIS_EVENT_TYPE:-push}${LIGHTWEIGHT:+/lightweight}\"}" > browserstack.json
cat browserstack.json
result=0