@credo-ts/askar 0.6.1-alpha-20251209124855 → 0.6.1-alpha-20251209133854

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -26,7 +26,7 @@ const uriFromStoreConfig = (storeConfig, credoDataPath) => {
26
26
  if (database.credentials.adminAccount !== void 0) urlParams.push(`admin_account=${encodeURIComponent(database.credentials.adminAccount)}`);
27
27
  if (database.credentials.adminPassword !== void 0) urlParams.push(`admin_password=${encodeURIComponent(database.credentials.adminPassword)}`);
28
28
  uri = `postgres://${encodeURIComponent(database.credentials.account)}:${encodeURIComponent(database.credentials.password)}@${database.config.host}/${encodeURIComponent(storeConfig.id)}`;
29
- } else throw new WalletError(`Storage type not supported: ${database.type}`);
29
+ } else throw new AskarError$1("Storage type not supported");
30
30
  if (database.config?.maxConnections !== void 0) urlParams.push(`max_connections=${encodeURIComponent(database.config.maxConnections)}`);
31
31
  if (database.config?.minConnections !== void 0) urlParams.push(`min_connections=${encodeURIComponent(database.config.minConnections)}`);
32
32
  if (urlParams.length > 0) uri = `${uri}?${urlParams.join("&")}`;
@@ -1 +1 @@
1
- {"version":3,"file":"askarStoreConfig.mjs","names":["path: string | undefined","AskarError"],"sources":["../../src/utils/askarStoreConfig.ts"],"sourcesContent":["import { KdfMethod, StoreKeyMethod } from '@openwallet-foundation/askar-shared'\nimport type { AskarModuleConfigStoreOptions } from '../AskarModuleConfig'\n\nimport { isAskarPostgresStorageConfig, isAskarSqliteStorageConfig } from '../AskarStorageConfig'\nimport { AskarError } from '../error'\n\n/**\n * Creates an askar wallet URI value based on store config\n * @param credoDataPath framework data path (used in case walletConfig.storage.path is undefined)\n * @returns string containing the askar wallet URI\n */\nexport const uriFromStoreConfig = (\n storeConfig: AskarModuleConfigStoreOptions,\n credoDataPath: string\n): { uri: string; path?: string } => {\n let uri = ''\n let path: string | undefined\n\n const urlParams = []\n\n const database = storeConfig.database ?? { type: 'sqlite' }\n if (isAskarSqliteStorageConfig(database)) {\n if (database.config?.inMemory) {\n uri = 'sqlite://:memory:'\n } else {\n path = database.config?.path ?? `${credoDataPath}/wallet/${storeConfig.id}/sqlite.db`\n uri = `sqlite://${path}`\n }\n } else if (isAskarPostgresStorageConfig(database)) {\n if (!database.config || !database.credentials) {\n throw new AskarError('Invalid storage configuration for postgres wallet')\n }\n\n if (database.config.connectTimeout !== undefined) {\n urlParams.push(`connect_timeout=${encodeURIComponent(database.config.connectTimeout)}`)\n }\n if (database.config.idleTimeout !== undefined) {\n urlParams.push(`idle_timeout=${encodeURIComponent(database.config.idleTimeout)}`)\n }\n if (database.credentials.adminAccount !== undefined) {\n urlParams.push(`admin_account=${encodeURIComponent(database.credentials.adminAccount)}`)\n }\n if (database.credentials.adminPassword !== undefined) {\n urlParams.push(`admin_password=${encodeURIComponent(database.credentials.adminPassword)}`)\n }\n\n uri = `postgres://${encodeURIComponent(database.credentials.account)}:${encodeURIComponent(\n database.credentials.password\n )}@${database.config.host}/${encodeURIComponent(storeConfig.id)}`\n } else {\n // @ts-expect-error\n throw new WalletError(`Storage type not supported: ${database.type}`)\n }\n\n // Common config options\n if (database.config?.maxConnections !== undefined) {\n urlParams.push(`max_connections=${encodeURIComponent(database.config.maxConnections)}`)\n }\n if (database.config?.minConnections !== undefined) {\n urlParams.push(`min_connections=${encodeURIComponent(database.config.minConnections)}`)\n }\n\n if (urlParams.length > 0) {\n uri = `${uri}?${urlParams.join('&')}`\n }\n\n return { uri, path }\n}\n\nexport function keyDerivationMethodFromStoreConfig(\n keyDerivationMethod?: AskarModuleConfigStoreOptions['keyDerivationMethod']\n) {\n return new StoreKeyMethod(\n (keyDerivationMethod ?? KdfMethod.Argon2IMod) satisfies `${KdfMethod}` | KdfMethod as KdfMethod\n )\n}\n\nexport function isSqliteInMemoryUri(uri: string) {\n return uri.startsWith('sqlite://:memory:')\n}\n\nexport function isSqliteFileUri(uri: string) {\n return uri.startsWith('sqlite://') && !isSqliteInMemoryUri(uri)\n}\n\nexport function isPostgresUri(uri: string) {\n return uri.startsWith('postgres://')\n}\n"],"mappings":";;;;;;;;;;;AAWA,MAAa,sBACX,aACA,kBACmC;CACnC,IAAI,MAAM;CACV,IAAIA;CAEJ,MAAM,YAAY,EAAE;CAEpB,MAAM,WAAW,YAAY,YAAY,EAAE,MAAM,UAAU;AAC3D,KAAI,2BAA2B,SAAS,CACtC,KAAI,SAAS,QAAQ,SACnB,OAAM;MACD;AACL,SAAO,SAAS,QAAQ,QAAQ,GAAG,cAAc,UAAU,YAAY,GAAG;AAC1E,QAAM,YAAY;;UAEX,6BAA6B,SAAS,EAAE;AACjD,MAAI,CAAC,SAAS,UAAU,CAAC,SAAS,YAChC,OAAM,IAAIC,aAAW,oDAAoD;AAG3E,MAAI,SAAS,OAAO,mBAAmB,OACrC,WAAU,KAAK,mBAAmB,mBAAmB,SAAS,OAAO,eAAe,GAAG;AAEzF,MAAI,SAAS,OAAO,gBAAgB,OAClC,WAAU,KAAK,gBAAgB,mBAAmB,SAAS,OAAO,YAAY,GAAG;AAEnF,MAAI,SAAS,YAAY,iBAAiB,OACxC,WAAU,KAAK,iBAAiB,mBAAmB,SAAS,YAAY,aAAa,GAAG;AAE1F,MAAI,SAAS,YAAY,kBAAkB,OACzC,WAAU,KAAK,kBAAkB,mBAAmB,SAAS,YAAY,cAAc,GAAG;AAG5F,QAAM,cAAc,mBAAmB,SAAS,YAAY,QAAQ,CAAC,GAAG,mBACtE,SAAS,YAAY,SACtB,CAAC,GAAG,SAAS,OAAO,KAAK,GAAG,mBAAmB,YAAY,GAAG;OAG/D,OAAM,IAAI,YAAY,+BAA+B,SAAS,OAAO;AAIvE,KAAI,SAAS,QAAQ,mBAAmB,OACtC,WAAU,KAAK,mBAAmB,mBAAmB,SAAS,OAAO,eAAe,GAAG;AAEzF,KAAI,SAAS,QAAQ,mBAAmB,OACtC,WAAU,KAAK,mBAAmB,mBAAmB,SAAS,OAAO,eAAe,GAAG;AAGzF,KAAI,UAAU,SAAS,EACrB,OAAM,GAAG,IAAI,GAAG,UAAU,KAAK,IAAI;AAGrC,QAAO;EAAE;EAAK;EAAM;;AAGtB,SAAgB,mCACd,qBACA;AACA,QAAO,IAAI,eACR,uBAAuB,UAAU,WACnC;;AAGH,SAAgB,oBAAoB,KAAa;AAC/C,QAAO,IAAI,WAAW,oBAAoB"}
1
+ {"version":3,"file":"askarStoreConfig.mjs","names":["path: string | undefined","AskarError"],"sources":["../../src/utils/askarStoreConfig.ts"],"sourcesContent":["import { KdfMethod, StoreKeyMethod } from '@openwallet-foundation/askar-shared'\nimport type { AskarModuleConfigStoreOptions } from '../AskarModuleConfig'\n\nimport { isAskarPostgresStorageConfig, isAskarSqliteStorageConfig } from '../AskarStorageConfig'\nimport { AskarError } from '../error'\n\n/**\n * Creates an askar wallet URI value based on store config\n * @param credoDataPath framework data path (used in case walletConfig.storage.path is undefined)\n * @returns string containing the askar wallet URI\n */\nexport const uriFromStoreConfig = (\n storeConfig: AskarModuleConfigStoreOptions,\n credoDataPath: string\n): { uri: string; path?: string } => {\n let uri = ''\n let path: string | undefined\n\n const urlParams = []\n\n const database = storeConfig.database ?? { type: 'sqlite' }\n if (isAskarSqliteStorageConfig(database)) {\n if (database.config?.inMemory) {\n uri = 'sqlite://:memory:'\n } else {\n path = database.config?.path ?? `${credoDataPath}/wallet/${storeConfig.id}/sqlite.db`\n uri = `sqlite://${path}`\n }\n } else if (isAskarPostgresStorageConfig(database)) {\n if (!database.config || !database.credentials) {\n throw new AskarError('Invalid storage configuration for postgres wallet')\n }\n\n if (database.config.connectTimeout !== undefined) {\n urlParams.push(`connect_timeout=${encodeURIComponent(database.config.connectTimeout)}`)\n }\n if (database.config.idleTimeout !== undefined) {\n urlParams.push(`idle_timeout=${encodeURIComponent(database.config.idleTimeout)}`)\n }\n if (database.credentials.adminAccount !== undefined) {\n urlParams.push(`admin_account=${encodeURIComponent(database.credentials.adminAccount)}`)\n }\n if (database.credentials.adminPassword !== undefined) {\n urlParams.push(`admin_password=${encodeURIComponent(database.credentials.adminPassword)}`)\n }\n\n uri = `postgres://${encodeURIComponent(database.credentials.account)}:${encodeURIComponent(\n database.credentials.password\n )}@${database.config.host}/${encodeURIComponent(storeConfig.id)}`\n } else {\n throw new AskarError('Storage type not supported')\n }\n\n // Common config options\n if (database.config?.maxConnections !== undefined) {\n urlParams.push(`max_connections=${encodeURIComponent(database.config.maxConnections)}`)\n }\n if (database.config?.minConnections !== undefined) {\n urlParams.push(`min_connections=${encodeURIComponent(database.config.minConnections)}`)\n }\n\n if (urlParams.length > 0) {\n uri = `${uri}?${urlParams.join('&')}`\n }\n\n return { uri, path }\n}\n\nexport function keyDerivationMethodFromStoreConfig(\n keyDerivationMethod?: AskarModuleConfigStoreOptions['keyDerivationMethod']\n) {\n return new StoreKeyMethod(\n (keyDerivationMethod ?? KdfMethod.Argon2IMod) satisfies `${KdfMethod}` | KdfMethod as KdfMethod\n )\n}\n\nexport function isSqliteInMemoryUri(uri: string) {\n return uri.startsWith('sqlite://:memory:')\n}\n\nexport function isSqliteFileUri(uri: string) {\n return uri.startsWith('sqlite://') && !isSqliteInMemoryUri(uri)\n}\n\nexport function isPostgresUri(uri: string) {\n return uri.startsWith('postgres://')\n}\n"],"mappings":";;;;;;;;;;;AAWA,MAAa,sBACX,aACA,kBACmC;CACnC,IAAI,MAAM;CACV,IAAIA;CAEJ,MAAM,YAAY,EAAE;CAEpB,MAAM,WAAW,YAAY,YAAY,EAAE,MAAM,UAAU;AAC3D,KAAI,2BAA2B,SAAS,CACtC,KAAI,SAAS,QAAQ,SACnB,OAAM;MACD;AACL,SAAO,SAAS,QAAQ,QAAQ,GAAG,cAAc,UAAU,YAAY,GAAG;AAC1E,QAAM,YAAY;;UAEX,6BAA6B,SAAS,EAAE;AACjD,MAAI,CAAC,SAAS,UAAU,CAAC,SAAS,YAChC,OAAM,IAAIC,aAAW,oDAAoD;AAG3E,MAAI,SAAS,OAAO,mBAAmB,OACrC,WAAU,KAAK,mBAAmB,mBAAmB,SAAS,OAAO,eAAe,GAAG;AAEzF,MAAI,SAAS,OAAO,gBAAgB,OAClC,WAAU,KAAK,gBAAgB,mBAAmB,SAAS,OAAO,YAAY,GAAG;AAEnF,MAAI,SAAS,YAAY,iBAAiB,OACxC,WAAU,KAAK,iBAAiB,mBAAmB,SAAS,YAAY,aAAa,GAAG;AAE1F,MAAI,SAAS,YAAY,kBAAkB,OACzC,WAAU,KAAK,kBAAkB,mBAAmB,SAAS,YAAY,cAAc,GAAG;AAG5F,QAAM,cAAc,mBAAmB,SAAS,YAAY,QAAQ,CAAC,GAAG,mBACtE,SAAS,YAAY,SACtB,CAAC,GAAG,SAAS,OAAO,KAAK,GAAG,mBAAmB,YAAY,GAAG;OAE/D,OAAM,IAAIA,aAAW,6BAA6B;AAIpD,KAAI,SAAS,QAAQ,mBAAmB,OACtC,WAAU,KAAK,mBAAmB,mBAAmB,SAAS,OAAO,eAAe,GAAG;AAEzF,KAAI,SAAS,QAAQ,mBAAmB,OACtC,WAAU,KAAK,mBAAmB,mBAAmB,SAAS,OAAO,eAAe,GAAG;AAGzF,KAAI,UAAU,SAAS,EACrB,OAAM,GAAG,IAAI,GAAG,UAAU,KAAK,IAAI;AAGrC,QAAO;EAAE;EAAK;EAAM;;AAGtB,SAAgB,mCACd,qBACA;AACA,QAAO,IAAI,eACR,uBAAuB,UAAU,WACnC;;AAGH,SAAgB,oBAAoB,KAAa;AAC/C,QAAO,IAAI,WAAW,oBAAoB"}
package/package.json CHANGED
@@ -4,7 +4,7 @@
4
4
  ".": "./build/index.mjs",
5
5
  "./package.json": "./package.json"
6
6
  },
7
- "version": "0.6.1-alpha-20251209124855",
7
+ "version": "0.6.1-alpha-20251209133854",
8
8
  "files": [
9
9
  "build"
10
10
  ],
@@ -23,7 +23,7 @@
23
23
  "class-validator": "^0.14.1",
24
24
  "rxjs": "^7.8.2",
25
25
  "tsyringe": "^4.10.0",
26
- "@credo-ts/core": "0.6.1-alpha-20251209124855"
26
+ "@credo-ts/core": "0.6.1-alpha-20251209133854"
27
27
  },
28
28
  "devDependencies": {
29
29
  "@openwallet-foundation/askar-nodejs": "^0.4.3",
@@ -32,7 +32,7 @@
32
32
  "@types/ref-struct-di": "^1.1.12",
33
33
  "reflect-metadata": "0.2.2",
34
34
  "typescript": "~5.9.3",
35
- "@credo-ts/tenants": "0.6.1-alpha-20251209124855"
35
+ "@credo-ts/tenants": "0.6.1-alpha-20251209133854"
36
36
  },
37
37
  "peerDependencies": {
38
38
  "@openwallet-foundation/askar-shared": "^0.4.3"