From 93b77669bc24512198c6f0b49f19fe617ed5f1cc Mon Sep 17 00:00:00 2001 From: Daniel Huigens Date: Wed, 5 May 2021 20:20:20 +0200 Subject: [PATCH] Unexport openpgp.stream (#1291) This change allows us to only load the `ReadableStream` polyfill when needed without behaving inconsistently in the external API. Users of the library should use the global `ReadableStream` or Node.js `stream.Readable` instead, or import a polyfill if needed. This patch loosens the detection criteria such that polyfilled streams are better detected. --- README.md | 37 ++++---- package-lock.json | 6 +- package.json | 2 +- src/encoding/armor.js | 5 ++ src/index.js | 3 - test/general/armor.js | 2 +- test/general/openpgp.js | 73 +++++++++------- test/general/packet.js | 26 +++--- test/general/signature.js | 29 +++---- test/general/streaming.js | 177 +++++++++++++++++++------------------- 10 files changed, 182 insertions(+), 178 deletions(-) diff --git a/README.md b/README.md index 1af609cc..81518704 100644 --- a/README.md +++ b/README.md @@ -341,7 +341,7 @@ Where the value can be any of: ```js (async () => { - const readableStream = new openpgp.stream.ReadableStream({ + const readableStream = new ReadableStream({ start(controller) { controller.enqueue(new Uint8Array([0x01, 0x02, 0x03])); controller.close(); @@ -358,24 +358,19 @@ Where the value can be any of: // Either pipe the above stream somewhere, pass it to another function, // or read it manually as follows: - const reader = openpgp.stream.getReader(encrypted); - while (true) { - const { done, value } = await reader.read(); - if (done) break; - console.log('new chunk:', value); // Uint8Array + for await (const chunk of encrypted) { + console.log('new chunk:', chunk); // Uint8Array } - - // Or, in Node.js, you can pipe the above stream as follows: - const nodeStream = openpgp.stream.webToNode(encrypted); - nodeStream.pipe(nodeWritableStream); })(); ``` -For more information on creating ReadableStreams, see [the MDN Documentation on `new -ReadableStream()`](https://developer.mozilla.org/docs/Web/API/ReadableStream/ReadableStream). -For more information on reading streams using `openpgp.stream`, see the documentation of -[the web-stream-tools dependency](https://openpgpjs.org/web-stream-tools/), particularly -its [Reader class](https://openpgpjs.org/web-stream-tools/Reader.html). +For more information on using ReadableStreams, see [the MDN Documentation on the +Streams API](https://developer.mozilla.org/en-US/docs/Web/API/Streams_API). + +You can also pass a [Node.js `Readable` +stream](https://nodejs.org/api/stream.html#stream_class_stream_readable), in +which case OpenPGP.js will return a Node.js `Readable` stream as well, which you +can `.pipe()` to a `Writable` stream, for example. #### Streaming encrypt and decrypt *String* data with PGP keys @@ -397,7 +392,7 @@ its [Reader class](https://openpgpjs.org/web-stream-tools/Reader.html). passphrase }); - const readableStream = new openpgp.stream.ReadableStream({ + const readableStream = new ReadableStream({ start(controller) { controller.enqueue('Hello, world!'); controller.close(); @@ -419,7 +414,11 @@ its [Reader class](https://openpgpjs.org/web-stream-tools/Reader.html). publicKeys: publicKey, // for verification (optional) privateKeys: privateKey // for decryption }); - const plaintext = await openpgp.stream.readToEnd(decrypted.data); + const chunks = []; + for await (const chunk of decrypted.data) { + chunks.push(chunk); + } + const plaintext = chunks.join(''); console.log(plaintext); // 'Hello, World!' })(); ``` @@ -574,7 +573,7 @@ Using the private key: ```js (async () => { - var readableStream = new openpgp.stream.ReadableStream({ + var readableStream = new ReadableStream({ start(controller) { controller.enqueue(new Uint8Array([0x01, 0x02, 0x03])); controller.close(); @@ -606,7 +605,7 @@ Using the private key: publicKeys: await openpgp.readKey({ armoredKey: publicKeyArmored }) // for verification }); - await openpgp.stream.readToEnd(verified.data); + for await (const chunk of verified.data) {} // Note: you *have* to read `verified.data` in some way or other, // even if you don't need it, as that is what triggers the // verification of the data. diff --git a/package-lock.json b/package-lock.json index 984a37fb..40a6a959 100644 --- a/package-lock.json +++ b/package-lock.json @@ -261,9 +261,9 @@ "dev": true }, "@openpgp/web-stream-tools": { - "version": "0.0.4", - "resolved": "https://registry.npmjs.org/@openpgp/web-stream-tools/-/web-stream-tools-0.0.4.tgz", - "integrity": "sha512-u6KEn/J4A2ojBkQ0qc9Jgs4nNVK+u7snY3h/SlvwdE8+STh/R3vVXJgkIgsAmWfweE0Ng4TjakrNY9tBI31VJQ==", + "version": "0.0.5", + "resolved": "https://registry.npmjs.org/@openpgp/web-stream-tools/-/web-stream-tools-0.0.5.tgz", + "integrity": "sha512-tdUCdiMi5ogmZlAbR4cQXZDbK34QB8iEnJ434m9bj4P7sxvKg2KKKbEiB4EQb2AWhj/SNKcoNUHhT9WxTqKimQ==", "dev": true, "requires": { "@mattiasbuelens/web-streams-adapter": "0.1.0-alpha.5", diff --git a/package.json b/package.json index d44f0051..20949a36 100644 --- a/package.json +++ b/package.json @@ -57,7 +57,7 @@ "@openpgp/pako": "^1.0.11", "@openpgp/seek-bzip": "^1.0.5-git", "@openpgp/tweetnacl": "^1.0.3", - "@openpgp/web-stream-tools": "0.0.4", + "@openpgp/web-stream-tools": "0.0.5", "@rollup/plugin-commonjs": "^11.1.0", "@rollup/plugin-node-resolve": "^7.1.3", "@rollup/plugin-replace": "^2.3.2", diff --git a/src/encoding/armor.js b/src/encoding/armor.js index 03b4d6f0..32a48da5 100644 --- a/src/encoding/armor.js +++ b/src/encoding/armor.js @@ -340,6 +340,11 @@ export function unarmor(input, config = defaultConfig) { } catch (e) { reject(e); } + }).then(async result => { + if (stream.isArrayStream(result.data)) { + result.data = await stream.readToEnd(result.data); + } + return result; }); } diff --git a/src/index.js b/src/index.js index 8cef7b5c..a3be5c60 100644 --- a/src/index.js +++ b/src/index.js @@ -21,9 +21,6 @@ export { CleartextMessage, readCleartextMessage, createCleartextMessage } from ' export * from './packet'; -import * as streamMod from '@openpgp/web-stream-tools'; // eslint-disable-line -export const stream = streamMod; - export * from './encoding/armor'; export { default as enums } from './enums'; diff --git a/test/general/armor.js b/test/general/armor.js index 0caa9683..104abb08 100644 --- a/test/general/armor.js +++ b/test/general/armor.js @@ -382,7 +382,7 @@ NJCB6+LWtabSoVIjNVgKwyKqyTLaESNwC2ogZwkdE8qPGiDFEHo4Gg9zuRof `; const { type, data } = await openpgp.unarmor(pubKey); - const armor = await openpgp.stream.readToEnd(openpgp.armor(type, data)); + const armor = await openpgp.armor(type, data); expect( armor .replace(/^(Version|Comment): .*$\n/mg, '') diff --git a/test/general/openpgp.js b/test/general/openpgp.js index 5146c7fa..9af08f77 100644 --- a/test/general/openpgp.js +++ b/test/general/openpgp.js @@ -7,6 +7,8 @@ const random = require('../../src/crypto/random'); const util = require('../../src/util'); const keyIDType = require('../../src/type/keyid'); +const stream = require('@openpgp/web-stream-tools'); + const spy = require('sinon/lib/sinon/spy'); const input = require('./testInputs.js'); const chai = require('chai'); @@ -1065,12 +1067,12 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }); const { data: streamedData, signatures } = await openpgp.decrypt({ - message: await openpgp.readMessage({ armoredMessage: openpgp.stream.toStream(encrypted) }), + message: await openpgp.readMessage({ armoredMessage: stream.toStream(encrypted) }), privateKeys: privateKey, publicKeys: publicKey, expectSigned: true }); - const data = await openpgp.stream.readToEnd(streamedData); + const data = await stream.readToEnd(streamedData); expect(data).to.equal(plaintext); expect(await signatures[0].verified).to.be.true; }); @@ -1088,7 +1090,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { privateKeys: privateKey }); await expect(openpgp.decrypt({ - message: await openpgp.readMessage({ armoredMessage: openpgp.stream.toStream(encrypted) }), + message: await openpgp.readMessage({ armoredMessage: stream.toStream(encrypted) }), privateKeys: privateKey, expectSigned: true })).to.be.eventually.rejectedWith(/Public keys are required/); @@ -1106,7 +1108,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { publicKeys: publicKey }); await expect(openpgp.decrypt({ - message: await openpgp.readMessage({ armoredMessage: openpgp.stream.toStream(encrypted) }), + message: await openpgp.readMessage({ armoredMessage: stream.toStream(encrypted) }), privateKeys: privateKey, publicKeys: publicKey, expectSigned: true @@ -1127,13 +1129,13 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { privateKeys: privateKey }); const { data: streamedData } = await openpgp.decrypt({ - message: await openpgp.readMessage({ armoredMessage: openpgp.stream.toStream(encrypted) }), + message: await openpgp.readMessage({ armoredMessage: stream.toStream(encrypted) }), privateKeys: privateKey, publicKeys: wrongPublicKey, expectSigned: true }); await expect( - openpgp.stream.readToEnd(streamedData) + stream.readToEnd(streamedData) ).to.be.eventually.rejectedWith(/Could not find signing key/); }); }); @@ -1229,11 +1231,11 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { privateKeys: privateKey }); const { data: streamedData, signatures } = await openpgp.verify({ - message: await readMessage({ armoredMessage: openpgp.stream.toStream(signed) }), + message: await readMessage({ armoredMessage: stream.toStream(signed) }), publicKeys: publicKey, expectSigned: true }); - const data = await openpgp.stream.readToEnd(streamedData); + const data = await stream.readToEnd(streamedData); expect(data).to.equal(text); expect(await signatures[0].verified).to.be.true; }); @@ -1244,7 +1246,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const publicKey = await openpgp.readKey({ armoredKey: pub_key }); await expect(openpgp.verify({ - message: await createMessage({ text: openpgp.stream.toStream(text) }), + message: await createMessage({ text: stream.toStream(text) }), publicKeys: publicKey, expectSigned: true })).to.be.eventually.rejectedWith(/Message is not signed/); @@ -1264,12 +1266,12 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { privateKeys: privateKey }); const { data: streamedData } = await openpgp.verify({ - message: await readMessage({ armoredMessage: openpgp.stream.toStream(signed) }), + message: await readMessage({ armoredMessage: stream.toStream(signed) }), publicKeys: wrongPublicKey, expectSigned: true }); await expect( - openpgp.stream.readToEnd(streamedData) + stream.readToEnd(streamedData) ).to.be.eventually.rejectedWith(/Could not find signing key/); }); } @@ -2152,13 +2154,19 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { throw new Error("Was not able to successfully modify checksum"); } const badBodyEncrypted = data.replace(/\n=([a-zA-Z0-9/+]{4})/, 'aaa\n=$1'); + await stream.loadStreamsPonyfill(); for (let allow_streaming = 1; allow_streaming >= 0; allow_streaming--) { openpgp.config.allowUnauthenticatedStream = !!allow_streaming; await Promise.all([badSumEncrypted, badBodyEncrypted].map(async (encrypted, i) => { await Promise.all([ encrypted, - openpgp.stream.toStream(encrypted), - new openpgp.stream.ReadableStream({ + new stream.ReadableStream({ + start(controller) { + controller.enqueue(encrypted); + controller.close(); + } + }), + new stream.ReadableStream({ start() { this.remaining = encrypted.split('\n'); }, @@ -2178,7 +2186,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { stepReached = 1; const { data: decrypted } = await openpgp.decrypt({ message: message, privateKeys: [key] }); stepReached = 2; - await openpgp.stream.readToEnd(decrypted); + await stream.readToEnd(decrypted); } catch (e) { expect(e.message).to.match(/Ascii armor integrity check on message failed/); expect(stepReached).to.equal( @@ -2407,7 +2415,8 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const plaintext = []; let i = 0; const useNativeStream = (() => { try { new global.ReadableStream(); return true; } catch (e) { return false; } })(); // eslint-disable-line no-new - const ReadableStream = useNativeStream ? global.ReadableStream : openpgp.stream.ReadableStream; + await stream.loadStreamsPonyfill(); + const ReadableStream = useNativeStream ? global.ReadableStream : stream.ReadableStream; const data = new ReadableStream({ async pull(controller) { if (i++ < 4) { @@ -2423,7 +2432,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { message: await openpgp.createMessage({ binary: data }), passwords: ['test'] })); - expect(openpgp.stream.isStream(encrypted)).to.equal(useNativeStream ? 'web' : 'ponyfill'); + expect(stream.isStream(encrypted)).to.equal(useNativeStream ? 'web' : 'web-like'); const message = await openpgp.readMessage({ armoredMessage: encrypted }); const decrypted = await openpgp.decrypt({ @@ -2431,8 +2440,8 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(useNativeStream ? 'web' : 'ponyfill'); - expect(await openpgp.stream.readToEnd(decrypted.data)).to.deep.equal(util.concatUint8Array(plaintext)); + expect(stream.isStream(decrypted.data)).to.equal(useNativeStream ? 'web' : 'web-like'); + expect(await stream.readToEnd(decrypted.data)).to.deep.equal(util.concatUint8Array(plaintext)); }); }); }); @@ -2719,7 +2728,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { }; return openpgp.sign(signOpt).then(async function (signed) { const message = await openpgp.readMessage({ binaryMessage: signed }); - message.packets.push(...await openpgp.stream.readToEnd(message.packets.stream, _ => _)); + message.packets.push(...await stream.readToEnd(message.packets.stream, _ => _)); const packets = new openpgp.PacketList(); packets.push(message.packets.findPacket(openpgp.enums.packet.signature)); packets.push(message.packets.findPacket(openpgp.enums.packet.literalData)); @@ -2757,21 +2766,21 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { format: 'binary' }; return openpgp.sign(signOpt).then(async function (signed) { - expect(openpgp.stream.isStream(signed)).to.equal(global.ReadableStream ? 'web' : 'node'); + expect(stream.isStream(signed)).to.equal(global.ReadableStream ? 'web' : 'node'); const message = await openpgp.readMessage({ binaryMessage: signed }); - message.packets.push(...await openpgp.stream.readToEnd(message.packets.stream, _ => _)); + message.packets.push(...await stream.readToEnd(message.packets.stream, _ => _)); const packets = new openpgp.PacketList(); packets.push(message.packets.findPacket(openpgp.enums.packet.signature)); packets.push(message.packets.findPacket(openpgp.enums.packet.literalData)); verifyOpt.message = await openpgp.readMessage({ - binaryMessage: openpgp.stream[ - global.ReadableStream ? (global.ReadableStream === openpgp.stream.ReadableStream ? 'toStream' : 'toNativeReadable') : 'webToNode' + binaryMessage: stream[ + global.ReadableStream ? (global.ReadableStream === stream.ReadableStream ? 'toStream' : 'toNativeReadable') : 'webToNode' ](packets.write()) }); return openpgp.verify(verifyOpt); }).then(async function (verified) { - expect(openpgp.stream.isStream(verified.data)).to.equal(global.ReadableStream ? 'web' : 'node'); - expect([].slice.call(await openpgp.stream.readToEnd(verified.data))).to.deep.equal([].slice.call(data)); + expect(stream.isStream(verified.data)).to.equal(global.ReadableStream ? 'web' : 'node'); + expect([].slice.call(await stream.readToEnd(verified.data))).to.deep.equal([].slice.call(data)); expect(await verified.signatures[0].verified).to.be.true; expect(await privateKey.getSigningKey(verified.signatures[0].keyID)) .to.be.not.null; @@ -2795,7 +2804,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const literals = packets.packets.filterByTag(openpgp.enums.packet.literalData); expect(literals.length).to.equal(1); expect(+literals[0].date).to.equal(+future); - expect(await openpgp.stream.readToEnd(packets.getText())).to.equal(plaintext); + expect(await stream.readToEnd(packets.getText())).to.equal(plaintext); }); }); @@ -2816,7 +2825,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { const literals = packets.packets.filterByTag(openpgp.enums.packet.literalData); expect(literals.length).to.equal(1); expect(+literals[0].date).to.equal(+past); - expect(await openpgp.stream.readToEnd(packets.getLiteralData())).to.deep.equal(data); + expect(await stream.readToEnd(packets.getLiteralData())).to.deep.equal(data); }); }); @@ -2838,7 +2847,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { expect(literals.length).to.equal(1); expect(+literals[0].date).to.equal(+past); const signatures = await message.verify([publicKey_2000_2008], past, undefined, openpgp.config); - expect(await openpgp.stream.readToEnd(message.getText())).to.equal(plaintext); + expect(await stream.readToEnd(message.getText())).to.equal(plaintext); expect(+(await signatures[0].signature).packets[0].created).to.equal(+past); expect(await signatures[0].verified).to.be.true; expect(await privateKey_2000_2008.getSigningKey(signatures[0].keyID, past)) @@ -2867,7 +2876,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { expect(literals[0].format).to.equal('binary'); expect(+literals[0].date).to.equal(+future); const signatures = await message.verify([publicKey_2038_2045], future, undefined, openpgp.config); - expect(await openpgp.stream.readToEnd(message.getLiteralData())).to.deep.equal(data); + expect(await stream.readToEnd(message.getLiteralData())).to.deep.equal(data); expect(+(await signatures[0].signature).packets[0].created).to.equal(+future); expect(await signatures[0].verified).to.be.true; expect(await privateKey_2038_2045.getSigningKey(signatures[0].keyID, future)) @@ -2896,7 +2905,7 @@ module.exports = () => describe('OpenPGP.js public api tests', function() { expect(literals[0].format).to.equal('mime'); expect(+literals[0].date).to.equal(+future); const signatures = await message.verify([publicKey_2038_2045], future, undefined, openpgp.config); - expect(await openpgp.stream.readToEnd(message.getLiteralData())).to.deep.equal(data); + expect(await stream.readToEnd(message.getLiteralData())).to.deep.equal(data); expect(+(await signatures[0].signature).packets[0].created).to.equal(+future); expect(await signatures[0].verified).to.be.true; expect(await privateKey_2038_2045.getSigningKey(signatures[0].keyID, future)) @@ -3202,7 +3211,7 @@ Bw== -----END PGP PRIVATE KEY BLOCK-----` }); const message = await openpgp.readMessage({ - armoredMessage: openpgp.stream.toStream(`-----BEGIN PGP MESSAGE----- + armoredMessage: stream.toStream(`-----BEGIN PGP MESSAGE----- wV4D+3VwOibHmagSAQdATlMJlvrkaq46zMkbIuKBOJO5X3ugVwZpEyAterQC /RUw0OPWeO+4swh/U7ZurV8cRr/fPnyGUUKI7rI+va3kWUZv4RRpUs7eYE57 @@ -3214,7 +3223,7 @@ bsZgJWVlAa5eil6J9ePX2xbo1vVAkLQdzE9+1jL+l7PRIZuVBQ== -----END PGP MESSAGE-----`) }); const decrypted = await openpgp.decrypt({ message, privateKeys: key, publicKeys: key, config: { allowUnauthenticatedMessages: true } }); - const data = await openpgp.stream.readToEnd(decrypted.data); + const data = await stream.readToEnd(decrypted.data); expect(data).to.equal('test'); }); }); diff --git a/test/general/packet.js b/test/general/packet.js index f5f61bba..d0145c44 100644 --- a/test/general/packet.js +++ b/test/general/packet.js @@ -4,6 +4,8 @@ const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp const crypto = require('../../src/crypto'); const util = require('../../src/util'); +const stream = require('@openpgp/web-stream-tools'); + const stub = require('sinon/lib/sinon/stub'); const chai = require('chai'); chai.use(require('chai-as-promised')); @@ -12,8 +14,8 @@ const { expect } = chai; const input = require('./testInputs.js'); function stringify(array) { - if (openpgp.stream.isStream(array)) { - return openpgp.stream.readToEnd(array).then(stringify); + if (stream.isStream(array)) { + return stream.readToEnd(array).then(stringify); } if (!util.isUint8Array(array)) { @@ -174,7 +176,7 @@ module.exports = () => describe("Packet", function() { await msg2.read(msg.write(), allAllowedPackets); return msg2[0].decrypt(algo, key); }).then(async function() { - expect(await openpgp.stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data); + expect(await stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data); }); } finally { openpgp.config.aeadProtect = aeadProtectVal; @@ -227,7 +229,7 @@ module.exports = () => describe("Packet", function() { await enc.encrypt(algo, key, { ...openpgp.config, aeadChunkSizeByte: 0 }); await msg2.read(msg.write(), allAllowedPackets); await msg2[0].decrypt(algo, key); - expect(await openpgp.stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data); + expect(await stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data); expect(encryptStub.callCount > 1).to.be.true; expect(decryptStub.callCount > 1).to.be.true; } finally { @@ -271,10 +273,10 @@ module.exports = () => describe("Packet", function() { try { await enc.encrypt(algo, key, { ...openpgp.config, aeadChunkSizeByte: 14 }); const data = msg.write(); - expect(await openpgp.stream.readToEnd(openpgp.stream.clone(data))).to.deep.equal(packetBytes); + expect(await stream.readToEnd(stream.clone(data))).to.deep.equal(packetBytes); await msg2.read(data, allAllowedPackets); await msg2[0].decrypt(algo, key); - expect(await openpgp.stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data); + expect(await stream.readToEnd(msg2[0].packets[0].data)).to.deep.equal(literal.data); } finally { randomBytesStub.restore(); } @@ -575,7 +577,7 @@ module.exports = () => describe("Packet", function() { await encData.encrypt(algo, key, undefined, openpgp.config); const data = msg.write(); - expect(await openpgp.stream.readToEnd(openpgp.stream.clone(data))).to.deep.equal(packetBytes); + expect(await stream.readToEnd(stream.clone(data))).to.deep.equal(packetBytes); const msg2 = new openpgp.PacketList(); await msg2.read(data, allAllowedPackets); @@ -653,7 +655,7 @@ module.exports = () => describe("Packet", function() { await enc.encrypt(algo, key, undefined, openpgp.config); const data = msg.write(); - expect(await openpgp.stream.readToEnd(openpgp.stream.clone(data))).to.deep.equal(packetBytes); + expect(await stream.readToEnd(stream.clone(data))).to.deep.equal(packetBytes); const msg2 = new openpgp.PacketList(); await msg2.read(data, allAllowedPackets); @@ -745,13 +747,13 @@ module.exports = () => describe("Packet", function() { await encData.decrypt(pkesk.sessionKeyAlgorithm, pkesk.sessionKey); const payload = encData.packets[0].packets; - payload.push(...await openpgp.stream.readToEnd(payload.stream, arr => arr)); + payload.push(...await stream.readToEnd(payload.stream, arr => arr)); const literal = payload[1]; const signature = payload[2]; await Promise.all([ signature.verify(keyPacket, openpgp.enums.signature.binary, literal), - openpgp.stream.readToEnd(literal.getBytes()) + stream.readToEnd(literal.getBytes()) ]); }); }); @@ -939,11 +941,11 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+ const signed2 = new openpgp.PacketList(); await signed2.read(raw, allAllowedPackets); - signed2.push(...await openpgp.stream.readToEnd(signed2.stream, arr => arr)); + signed2.push(...await stream.readToEnd(signed2.stream, arr => arr)); await Promise.all([ signed2[1].verify(key, openpgp.enums.signature.text, signed2[0]), - openpgp.stream.readToEnd(signed2[0].getBytes()) + stream.readToEnd(signed2[0].getBytes()) ]); }); }); diff --git a/test/general/signature.js b/test/general/signature.js index f5b6ca57..f703efdd 100644 --- a/test/general/signature.js +++ b/test/general/signature.js @@ -4,6 +4,8 @@ const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..'); const util = require('../../src/util'); +const stream = require('@openpgp/web-stream-tools'); + const chai = require('chai'); chai.use(require('chai-as-promised')); @@ -946,7 +948,7 @@ hUhMKMuiM3pRwdIyDOItkUWQmjEEw7/XmhgInkXsCw== const sMsg = await openpgp.readMessage({ armoredMessage: signedArmor }); const pub_key = await openpgp.readKey({ armoredKey: pub_key_arm2 }); const verified = await sMsg.verify([pub_key]); - openpgp.stream.readToEnd(sMsg.getLiteralData()); + stream.readToEnd(sMsg.getLiteralData()); expect(verified).to.exist; expect(verified).to.have.length(1); expect(await verified[0].verified).to.be.true; @@ -1115,7 +1117,7 @@ PAAeuQTUrcJdZeJ86eQ9cCUB216HCwSKOWTQRzL+hBWKXij4WD4= const pubKey = await openpgp.readKey({ armoredKey: pub_latin1_msg }); return message.verify([pubKey]).then(async verifiedSig => { - expect(await openpgp.stream.readToEnd(message.getLiteralData())).to.equal(latin1Binary); + expect(await stream.readToEnd(message.getLiteralData())).to.equal(latin1Binary); expect(verifiedSig).to.exist; expect(verifiedSig).to.have.length(1); expect(await verifiedSig[0].verified).to.be.true; @@ -1210,26 +1212,14 @@ yYDnCgA= -----END PGP MESSAGE-----`.split(''); const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; + await stream.loadStreamsPonyfill(); const message = await openpgp.readMessage({ - armoredMessage: globalThis.ReadableStream ? new globalThis.ReadableStream({ + armoredMessage: new stream.ReadableStream({ async pull(controller) { await new Promise(setTimeout); controller.enqueue(armoredMessage.shift()); if (!armoredMessage.length) controller.close(); } - }) : new (require('stream').Readable)({ - encoding: 'utf8', - async read() { - while (true) { - await new Promise(setTimeout); - if (!armoredMessage.length) { - return this.push(null); - } - if (!this.push(armoredMessage.shift())) { - break; - } - } - } }) }); const pubKey = await openpgp.readKey({ armoredKey: pub_key_arm2 }); @@ -1239,7 +1229,7 @@ yYDnCgA= return openpgp.verify({ publicKeys: [pubKey], message, config: { minRSABits: 1024 } }).then(async function(cleartextSig) { expect(cleartextSig).to.exist; - expect(await openpgp.stream.readToEnd(cleartextSig.data)).to.equal(plaintext); + expect(await stream.readToEnd(cleartextSig.data)).to.equal(plaintext); expect(cleartextSig.signatures).to.have.length(1); if (!openpgp.config.rejectMessageHashAlgorithms.has(openpgp.enums.hash.sha1)) { expect(await cleartextSig.signatures[0].verified).to.be.true; @@ -1288,8 +1278,9 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA -----END PGP MESSAGE-----`.split(''); const plaintext = 'space: \nspace and tab: \t\nno trailing space\n \ntab:\t\ntab and space:\t '; + await stream.loadStreamsPonyfill(); const message = await openpgp.readMessage({ - armoredMessage: new openpgp.stream.ReadableStream({ + armoredMessage: new stream.ReadableStream({ async pull(controller) { await new Promise(setTimeout); controller.enqueue(armoredMessage.shift()); @@ -1303,7 +1294,7 @@ hkJiXopCSWKSlQInL1devkJJUWJmTmZeugJYlpdLAagQJM0JpsCqIQZwKgAA expect(pubKey.getKeys(keyIDs[0])).to.not.be.empty; return openpgp.verify({ publicKeys: [pubKey], message, config: { minRSABits: 1024 } }).then(async ({ data, signatures }) => { - expect(await openpgp.stream.readToEnd(data)).to.equal(plaintext); + expect(await stream.readToEnd(data)).to.equal(plaintext); expect(signatures).to.have.length(1); await expect(signatures[0].verified).to.be.rejectedWith('Corresponding signature packet missing'); expect((await signatures[0].signature).packets.length).to.equal(0); diff --git a/test/general/streaming.js b/test/general/streaming.js index fa7d3bc1..3af012ce 100644 --- a/test/general/streaming.js +++ b/test/general/streaming.js @@ -11,10 +11,9 @@ const input = require('./testInputs.js'); const { expect } = chai; -const { stream } = openpgp; +const stream = require('@openpgp/web-stream-tools'); const useNativeStream = (() => { try { new global.ReadableStream(); return true; } catch (e) { return false; } })(); // eslint-disable-line no-new -const ReadableStream = useNativeStream ? global.ReadableStream : openpgp.stream.ReadableStream; const NodeReadableStream = useNativeStream ? undefined : require('stream').Readable; const pub_key = [ @@ -180,7 +179,7 @@ let dataArrived; function tests() { it('Encrypt small message', async function() { dataArrived(); // Do not wait until data arrived. - const data = ReadableStream ? new ReadableStream({ + const data = global.ReadableStream ? new global.ReadableStream({ start(controller) { controller.enqueue(util.stringToUint8Array('hello ')); controller.enqueue(util.stringToUint8Array('world')); @@ -197,7 +196,7 @@ function tests() { message: await openpgp.createMessage({ binary: data }), passwords: ['test'] }); - const msgAsciiArmored = await openpgp.stream.readToEnd(encrypted); + const msgAsciiArmored = await stream.readToEnd(encrypted); const message = await openpgp.readMessage({ armoredMessage: msgAsciiArmored }); const decrypted = await openpgp.decrypt({ passwords: ['test'], @@ -211,11 +210,11 @@ function tests() { message: await openpgp.createMessage({ binary: data }), passwords: ['test'] }); - const reader = openpgp.stream.getReader(encrypted); + const reader = stream.getReader(encrypted); expect(await reader.peekBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/); dataArrived(); reader.releaseLock(); - const msgAsciiArmored = await openpgp.stream.readToEnd(encrypted); + const msgAsciiArmored = await stream.readToEnd(encrypted); const message = await openpgp.readMessage({ armoredMessage: msgAsciiArmored }); const decrypted = await openpgp.decrypt({ passwords: ['test'], @@ -230,11 +229,11 @@ function tests() { message: await openpgp.createMessage({ binary: data }), passwords: ['test'] }); - const reader = openpgp.stream.getReader(encrypted); + const reader = stream.getReader(encrypted); expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/); dataArrived(); reader.releaseLock(); - await openpgp.stream.cancel(encrypted); + await stream.cancel(encrypted); expect(canceled).to.be.true; }); @@ -244,11 +243,11 @@ function tests() { privateKeys: privKey, config: { minRSABits: 1024 } }); - const reader = openpgp.stream.getReader(signed); + const reader = stream.getReader(signed); expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/); dataArrived(); reader.releaseLock(); - await openpgp.stream.cancel(signed); + await stream.cancel(signed); expect(canceled).to.be.true; }); @@ -260,7 +259,7 @@ function tests() { passwords: ['test'], armor: false }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ binaryMessage: encrypted }); setTimeout(dataArrived, 3000); // Do not wait until data arrived, but wait a bit to check that it doesn't arrive early. @@ -269,8 +268,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]); if (i <= 10) throw new Error('Data arrived early.'); expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext)); @@ -288,7 +287,7 @@ function tests() { passwords: ['test'], armor: false }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ binaryMessage: encrypted }); const decrypted = await openpgp.decrypt({ @@ -296,9 +295,9 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - expect(openpgp.stream.isStream(decrypted.signatures)).to.be.false; - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + expect(stream.isStream(decrypted.signatures)).to.be.false; + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext)); @@ -320,7 +319,7 @@ function tests() { armor: false, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ binaryMessage: encrypted }); const decrypted = await openpgp.decrypt({ @@ -329,8 +328,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext)); @@ -355,7 +354,7 @@ function tests() { privateKeys: priv, armor: false }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ binaryMessage: encrypted }); const decrypted = await openpgp.decrypt({ @@ -364,8 +363,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext)); @@ -390,7 +389,7 @@ function tests() { privateKeys: priv, armor: false }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ binaryMessage: encrypted }); const decrypted = await openpgp.decrypt({ @@ -399,8 +398,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext)); @@ -419,10 +418,10 @@ function tests() { message: await openpgp.createMessage({ binary: data, filename: 'msg.bin' }), passwords: ['test'] }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ - armoredMessage: openpgp.stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === openpgp.stream.ReadableStream ? 'toStream' : 'toNativeReadable'](openpgp.stream.transform(encrypted, value => { + armoredMessage: stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === stream.ReadableStream ? 'toStream' : 'toNativeReadable'](stream.transform(encrypted, value => { value += ''; if (value === '=' || value.length === 5) return; // Remove checksum const newlineIndex = value.indexOf('\n', 500); @@ -435,8 +434,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]); dataArrived(); await expect(reader.readToEnd()).to.be.rejectedWith('Modification detected.'); @@ -457,10 +456,10 @@ function tests() { privateKeys: privKey, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ - armoredMessage: openpgp.stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === openpgp.stream.ReadableStream ? 'toStream' : 'toNativeReadable'](openpgp.stream.transform(encrypted, value => { + armoredMessage: stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === stream.ReadableStream ? 'toStream' : 'toNativeReadable'](stream.transform(encrypted, value => { value += ''; const newlineIndex = value.indexOf('\n', 500); if (value.length > 1000) return value.slice(0, newlineIndex - 1) + (value[newlineIndex - 1] === 'a' ? 'b' : 'a') + value.slice(newlineIndex); @@ -473,8 +472,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]); dataArrived(); await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check on message failed'); @@ -494,10 +493,10 @@ function tests() { privateKeys: privKey, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ - armoredMessage: openpgp.stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === openpgp.stream.ReadableStream ? 'toStream' : 'toNativeReadable'](openpgp.stream.transform(encrypted, value => { + armoredMessage: stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === stream.ReadableStream ? 'toStream' : 'toNativeReadable'](stream.transform(encrypted, value => { value += ''; const newlineIndex = value.indexOf('\n', 500); if (value.length > 1000) return value.slice(0, newlineIndex - 1) + (value[newlineIndex - 1] === 'a' ? 'b' : 'a') + value.slice(newlineIndex); @@ -509,8 +508,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]); dataArrived(); await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check on message failed'); @@ -527,10 +526,10 @@ function tests() { privateKeys: privKey, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); + expect(stream.isStream(signed)).to.equal(expectedType); const message = await openpgp.readMessage({ - armoredMessage: openpgp.stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === openpgp.stream.ReadableStream ? 'toStream' : 'toNativeReadable'](openpgp.stream.transform(signed, value => { + armoredMessage: stream[expectedType === 'node' ? 'webToNode' : global.ReadableStream === stream.ReadableStream ? 'toStream' : 'toNativeReadable'](stream.transform(signed, value => { value += ''; const newlineIndex = value.indexOf('\n', 500); if (value.length > 1000) return value.slice(0, newlineIndex - 1) + (value[newlineIndex - 1] === 'a' ? 'b' : 'a') + value.slice(newlineIndex); @@ -543,8 +542,8 @@ function tests() { format: 'binary', config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(verified.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(verified.data); + expect(stream.isStream(verified.data)).to.equal(expectedType); + const reader = stream.getReader(verified.data); expect(await reader.peekBytes(1024)).not.to.deep.equal(plaintext[0]); dataArrived(); await expect(reader.readToEnd()).to.be.rejectedWith('Ascii armor integrity check on message failed'); @@ -582,7 +581,7 @@ function tests() { privateKeys: privKey, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); + expect(stream.isStream(signed)).to.equal(expectedType); const message = await openpgp.readMessage({ armoredMessage: signed }); const verified = await openpgp.verify({ @@ -591,12 +590,12 @@ function tests() { format: 'binary', config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(verified.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(verified.data); + expect(stream.isStream(verified.data)).to.equal(expectedType); + const reader = stream.getReader(verified.data); expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); reader.releaseLock(); - await openpgp.stream.cancel(verified.data, new Error('canceled by test')); + await stream.cancel(verified.data, new Error('canceled by test')); expect(canceled).to.be.true; expect(verified.signatures).to.exist.and.have.length(1); await expect(verified.signatures[0].verified).to.be.rejectedWith('canceled'); @@ -607,9 +606,9 @@ function tests() { message: await openpgp.createMessage({ binary: data }), passwords: ['test'] }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); - const reader = openpgp.stream.getReader(encrypted); + const reader = stream.getReader(encrypted); expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/); dataArrived(); await new Promise(resolve => setTimeout(resolve, 3000)); @@ -622,9 +621,9 @@ function tests() { privateKeys: privKey, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); + expect(stream.isStream(signed)).to.equal(expectedType); - const reader = openpgp.stream.getReader(signed); + const reader = stream.getReader(signed); expect(await reader.readBytes(1024)).to.match(/^-----BEGIN PGP MESSAGE-----\n/); dataArrived(); await new Promise(resolve => setTimeout(resolve, 3000)); @@ -637,15 +636,15 @@ function tests() { privateKeys: privKey, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); + expect(stream.isStream(signed)).to.equal(expectedType); const message = await openpgp.readMessage({ armoredMessage: signed }); const verified = await openpgp.verify({ publicKeys: pubKey, message, format: 'binary' }); - expect(openpgp.stream.isStream(verified.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(verified.data); + expect(stream.isStream(verified.data)).to.equal(expectedType); + const reader = stream.getReader(verified.data); expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); await new Promise(resolve => setTimeout(resolve, 3000)); @@ -654,7 +653,7 @@ function tests() { it('Detached sign small message', async function() { dataArrived(); // Do not wait until data arrived. - const data = ReadableStream ? new ReadableStream({ + const data = global.ReadableStream ? new global.ReadableStream({ start(controller) { controller.enqueue(util.stringToUint8Array('hello ')); controller.enqueue(util.stringToUint8Array('world')); @@ -673,8 +672,8 @@ function tests() { detached: true, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); - const armoredSignature = await openpgp.stream.readToEnd(signed); + expect(stream.isStream(signed)).to.equal(expectedType); + const armoredSignature = await stream.readToEnd(signed); const signature = await openpgp.readSignature({ armoredSignature }); const verified = await openpgp.verify({ signature, @@ -689,7 +688,7 @@ function tests() { it('Detached sign small message using brainpool curve keys', async function() { dataArrived(); // Do not wait until data arrived. - const data = ReadableStream ? new ReadableStream({ + const data = global.ReadableStream ? new global.ReadableStream({ start(controller) { controller.enqueue(util.stringToUint8Array('hello ')); controller.enqueue(util.stringToUint8Array('world')); @@ -713,8 +712,8 @@ function tests() { privateKeys: priv, detached: true }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); - const armoredSignature = await openpgp.stream.readToEnd(signed); + expect(stream.isStream(signed)).to.equal(expectedType); + const armoredSignature = await stream.readToEnd(signed); const signature = await openpgp.readSignature({ armoredSignature }); const verified = await openpgp.verify({ signature, @@ -728,7 +727,7 @@ function tests() { it('Detached sign small message using x25519 curve keys', async function() { dataArrived(); // Do not wait until data arrived. - const data = ReadableStream ? new ReadableStream({ + const data = global.ReadableStream ? new global.ReadableStream({ async start(controller) { controller.enqueue(util.stringToUint8Array('hello ')); controller.enqueue(util.stringToUint8Array('world')); @@ -752,8 +751,8 @@ function tests() { privateKeys: priv, detached: true }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); - const armoredSignature = await openpgp.stream.readToEnd(signed); + expect(stream.isStream(signed)).to.equal(expectedType); + const armoredSignature = await stream.readToEnd(signed); const signature = await openpgp.readSignature({ armoredSignature }); const verified = await openpgp.verify({ signature, @@ -772,8 +771,8 @@ function tests() { detached: true, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); - const reader = openpgp.stream.getReader(signed); + expect(stream.isStream(signed)).to.equal(expectedType); + const reader = stream.getReader(signed); expect((await reader.readBytes(30)).toString('utf8')).to.equal('-----BEGIN PGP SIGNATURE-----\n'); dataArrived(); await new Promise(resolve => setTimeout(resolve, 3000)); @@ -787,12 +786,12 @@ function tests() { detached: true, config: { minRSABits: 1024 } }); - expect(openpgp.stream.isStream(signed)).to.equal(expectedType); - const reader = openpgp.stream.getReader(signed); + expect(stream.isStream(signed)).to.equal(expectedType); + const reader = stream.getReader(signed); expect((await reader.readBytes(30)).toString('utf8')).to.equal('-----BEGIN PGP SIGNATURE-----\n'); dataArrived(); reader.releaseLock(); - await openpgp.stream.cancel(signed, new Error('canceled by test')); + await stream.cancel(signed, new Error('canceled by test')); expect(canceled).to.be.true; }); @@ -817,7 +816,7 @@ function tests() { passwords: ['test'], armor: false }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ binaryMessage: encrypted }); const decrypted = await openpgp.decrypt({ @@ -825,8 +824,8 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.peekBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); expect(await reader.readToEnd()).to.deep.equal(util.concatUint8Array(plaintext)); @@ -837,7 +836,7 @@ function tests() { const plaintext = []; let i = 0; - const data = ReadableStream ? new ReadableStream({ + const data = global.ReadableStream ? new global.ReadableStream({ async pull(controller) { await new Promise(resolve => setTimeout(resolve, 10)); if (i++ < 10) { @@ -867,15 +866,15 @@ function tests() { message: await openpgp.createMessage({ text: data }), passwords: ['test'] }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ armoredMessage: encrypted }); const decrypted = await openpgp.decrypt({ passwords: ['test'], message }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect((await reader.peekBytes(plaintext[0].length * 4)).toString('utf8').substr(0, plaintext[0].length)).to.equal(plaintext[0]); dataArrived(); expect((await reader.readToEnd()).toString('utf8')).to.equal(util.concat(plaintext)); @@ -896,15 +895,15 @@ function tests() { message: await openpgp.createMessage({ binary: data }), passwords: ['test'] }); - expect(openpgp.stream.isStream(encrypted)).to.equal(expectedType); + expect(stream.isStream(encrypted)).to.equal(expectedType); const message = await openpgp.readMessage({ armoredMessage: encrypted }); const decrypted = await openpgp.decrypt({ passwords: ['test'], message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); await new Promise(resolve => setTimeout(resolve, 3000)); @@ -930,12 +929,12 @@ function tests() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal(expectedType); - const reader = openpgp.stream.getReader(decrypted.data); + expect(stream.isStream(decrypted.data)).to.equal(expectedType); + const reader = stream.getReader(decrypted.data); expect(await reader.readBytes(1024)).to.deep.equal(plaintext[0]); dataArrived(); reader.releaseLock(); - await openpgp.stream.cancel(decrypted.data, new Error('canceled by test')); + await stream.cancel(decrypted.data, new Error('canceled by test')); await new Promise(setTimeout); expect(canceled).to.be.true; }); @@ -951,6 +950,8 @@ module.exports = () => describe('Streaming', function() { privateKey: await openpgp.readKey({ armoredKey: priv_key }), passphrase: 'hello world' }); + + await stream.loadStreamsPonyfill(); }); beforeEach(function() { @@ -962,7 +963,7 @@ module.exports = () => describe('Streaming', function() { plaintext = []; i = 0; canceled = false; - data = ReadableStream ? new ReadableStream({ + data = global.ReadableStream ? new global.ReadableStream({ async pull(controller) { await new Promise(setTimeout); if (test === currentTest && i < (expectedType === 'web' ? 100 : 500)) { @@ -1000,7 +1001,7 @@ module.exports = () => describe('Streaming', function() { canceled = true; } }); - expectedType = ReadableStream ? 'web' : 'node'; + expectedType = global.ReadableStream ? 'web' : 'node'; }); tests(); @@ -1016,15 +1017,15 @@ module.exports = () => describe('Streaming', function() { message: await openpgp.createMessage({ text: data }), passwords: ['test'] }); - expect(openpgp.stream.isStream(encrypted)).to.equal('node'); + expect(stream.isStream(encrypted)).to.equal('node'); const message = await openpgp.readMessage({ armoredMessage: encrypted }); const decrypted = await openpgp.decrypt({ passwords: ['test'], message }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal('node'); - expect(await openpgp.stream.readToEnd(decrypted.data)).to.equal(plaintext); + expect(stream.isStream(decrypted.data)).to.equal('node'); + expect(await stream.readToEnd(decrypted.data)).to.equal(plaintext); }); it('Node: Encrypt and decrypt binary message roundtrip', async function() { @@ -1036,7 +1037,7 @@ module.exports = () => describe('Streaming', function() { passwords: ['test'], armor: false }); - expect(openpgp.stream.isStream(encrypted)).to.equal('node'); + expect(stream.isStream(encrypted)).to.equal('node'); const message = await openpgp.readMessage({ binaryMessage: encrypted }); const decrypted = await openpgp.decrypt({ @@ -1044,8 +1045,8 @@ module.exports = () => describe('Streaming', function() { message, format: 'binary' }); - expect(openpgp.stream.isStream(decrypted.data)).to.equal('node'); - expect(await openpgp.stream.readToEnd(decrypted.data)).to.deep.equal(plaintext); + expect(stream.isStream(decrypted.data)).to.equal('node'); + expect(await stream.readToEnd(decrypted.data)).to.deep.equal(plaintext); }); } });