@digitaldefiance/node-ecies-lib 4.4.0 → 4.4.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +196 -0
- package/package.json +7 -3
- package/src/interfaces/backend-member-operational.d.ts +1 -1
- package/src/interfaces/backend-member-operational.d.ts.map +1 -1
- package/src/interfaces/member.d.ts +1 -1
- package/src/interfaces/member.d.ts.map +1 -1
- package/src/member.d.ts +1 -1
- package/src/member.d.ts.map +1 -1
package/README.md
CHANGED
|
@@ -245,8 +245,204 @@ yarn lint # ESLint check
|
|
|
245
245
|
yarn format # Fix all (prettier + lint)
|
|
246
246
|
```
|
|
247
247
|
|
|
248
|
+
## Testing
|
|
249
|
+
|
|
250
|
+
### Testing Approach
|
|
251
|
+
|
|
252
|
+
The node-ecies-lib package uses comprehensive testing with 220+ tests covering all Node.js-specific cryptographic operations and binary compatibility with the browser-based ecies-lib.
|
|
253
|
+
|
|
254
|
+
**Test Framework**: Jest with TypeScript support
|
|
255
|
+
**Property-Based Testing**: fast-check for cryptographic properties
|
|
256
|
+
**Coverage Target**: 90%+ for all cryptographic operations
|
|
257
|
+
**Binary Compatibility**: Verified with @digitaldefiance/ecies-lib
|
|
258
|
+
|
|
259
|
+
### Test Structure
|
|
260
|
+
|
|
261
|
+
```
|
|
262
|
+
tests/
|
|
263
|
+
├── unit/ # Unit tests for Node.js services
|
|
264
|
+
├── integration/ # Integration tests for protocol flows
|
|
265
|
+
├── e2e/ # End-to-end encryption/decryption tests
|
|
266
|
+
├── compatibility/ # Cross-platform compatibility with ecies-lib
|
|
267
|
+
└── streaming/ # Streaming encryption tests
|
|
268
|
+
```
|
|
269
|
+
|
|
270
|
+
### Running Tests
|
|
271
|
+
|
|
272
|
+
```bash
|
|
273
|
+
# Run all tests
|
|
274
|
+
npm test
|
|
275
|
+
|
|
276
|
+
# Run with coverage
|
|
277
|
+
npm test -- --coverage
|
|
278
|
+
|
|
279
|
+
# Run specific test suite
|
|
280
|
+
npm test -- ecies-service.spec.ts
|
|
281
|
+
|
|
282
|
+
# Run compatibility tests
|
|
283
|
+
npm test -- cross-platform-compatibility.e2e.spec.ts
|
|
284
|
+
|
|
285
|
+
# Run in watch mode
|
|
286
|
+
npm test -- --watch
|
|
287
|
+
```
|
|
288
|
+
|
|
289
|
+
### Test Patterns
|
|
290
|
+
|
|
291
|
+
#### Testing Node.js Encryption
|
|
292
|
+
|
|
293
|
+
```typescript
|
|
294
|
+
import { ECIESService, registerNodeRuntimeConfiguration } from '@digitaldefiance/node-ecies-lib';
|
|
295
|
+
import { ObjectIdProvider } from '@digitaldefiance/ecies-lib';
|
|
296
|
+
|
|
297
|
+
describe('Node ECIES Encryption', () => {
|
|
298
|
+
let ecies: ECIESService;
|
|
299
|
+
|
|
300
|
+
beforeEach(() => {
|
|
301
|
+
registerNodeRuntimeConfiguration({
|
|
302
|
+
idProvider: new ObjectIdProvider()
|
|
303
|
+
});
|
|
304
|
+
ecies = new ECIESService();
|
|
305
|
+
});
|
|
306
|
+
|
|
307
|
+
it('should encrypt and decrypt with Buffer', () => {
|
|
308
|
+
const mnemonic = ecies.generateNewMnemonic();
|
|
309
|
+
const { privateKey, publicKey } = ecies.mnemonicToSimpleKeyPair(mnemonic);
|
|
310
|
+
|
|
311
|
+
const message = Buffer.from('Secret Message');
|
|
312
|
+
const encrypted = ecies.encryptSimpleOrSingle(false, publicKey, message);
|
|
313
|
+
const decrypted = ecies.decryptSimpleOrSingleWithHeader(false, privateKey, encrypted);
|
|
314
|
+
|
|
315
|
+
expect(decrypted.toString()).toBe('Secret Message');
|
|
316
|
+
});
|
|
317
|
+
});
|
|
318
|
+
```
|
|
319
|
+
|
|
320
|
+
#### Testing Streaming Encryption
|
|
321
|
+
|
|
322
|
+
```typescript
|
|
323
|
+
import { ECIESService, EncryptionStream } from '@digitaldefiance/node-ecies-lib';
|
|
324
|
+
import { createReadStream } from 'fs';
|
|
325
|
+
|
|
326
|
+
describe('Streaming Encryption', () => {
|
|
327
|
+
it('should encrypt large files efficiently', async () => {
|
|
328
|
+
const ecies = new ECIESService();
|
|
329
|
+
const stream = new EncryptionStream(ecies);
|
|
330
|
+
|
|
331
|
+
const { privateKey, publicKey } = ecies.mnemonicToSimpleKeyPair(ecies.generateNewMnemonic());
|
|
332
|
+
const fileStream = createReadStream('test-file.dat');
|
|
333
|
+
|
|
334
|
+
const encryptedChunks: Buffer[] = [];
|
|
335
|
+
for await (const chunk of stream.encryptStream(fileStream, publicKey)) {
|
|
336
|
+
encryptedChunks.push(chunk.data);
|
|
337
|
+
}
|
|
338
|
+
|
|
339
|
+
expect(encryptedChunks.length).toBeGreaterThan(0);
|
|
340
|
+
});
|
|
341
|
+
});
|
|
342
|
+
```
|
|
343
|
+
|
|
344
|
+
#### Testing Binary Compatibility
|
|
345
|
+
|
|
346
|
+
```typescript
|
|
347
|
+
import { ECIESService as NodeECIES } from '@digitaldefiance/node-ecies-lib';
|
|
348
|
+
import { ECIESService as BrowserECIES } from '@digitaldefiance/ecies-lib';
|
|
349
|
+
|
|
350
|
+
describe('Binary Compatibility', () => {
|
|
351
|
+
it('should decrypt browser-encrypted data in Node.js', async () => {
|
|
352
|
+
const browserEcies = new BrowserECIES();
|
|
353
|
+
const nodeEcies = new NodeECIES();
|
|
354
|
+
|
|
355
|
+
const mnemonic = browserEcies.generateNewMnemonic();
|
|
356
|
+
const { privateKey, publicKey } = browserEcies.mnemonicToSimpleKeyPair(mnemonic);
|
|
357
|
+
|
|
358
|
+
// Encrypt in browser
|
|
359
|
+
const message = new TextEncoder().encode('Cross-platform message');
|
|
360
|
+
const encrypted = await browserEcies.encryptSimpleOrSingle(false, publicKey, message);
|
|
361
|
+
|
|
362
|
+
// Decrypt in Node.js
|
|
363
|
+
const decrypted = nodeEcies.decryptSimpleOrSingleWithHeader(
|
|
364
|
+
false,
|
|
365
|
+
Buffer.from(privateKey),
|
|
366
|
+
Buffer.from(encrypted)
|
|
367
|
+
);
|
|
368
|
+
|
|
369
|
+
expect(decrypted.toString()).toBe('Cross-platform message');
|
|
370
|
+
});
|
|
371
|
+
});
|
|
372
|
+
```
|
|
373
|
+
|
|
374
|
+
#### Property-Based Testing
|
|
375
|
+
|
|
376
|
+
```typescript
|
|
377
|
+
import * as fc from 'fast-check';
|
|
378
|
+
import { ECIESService } from '@digitaldefiance/node-ecies-lib';
|
|
379
|
+
|
|
380
|
+
describe('Cryptographic Properties', () => {
|
|
381
|
+
it('should maintain encryption round-trip for any Buffer', () => {
|
|
382
|
+
const ecies = new ECIESService();
|
|
383
|
+
const { privateKey, publicKey } = ecies.mnemonicToSimpleKeyPair(ecies.generateNewMnemonic());
|
|
384
|
+
|
|
385
|
+
fc.assert(
|
|
386
|
+
fc.property(
|
|
387
|
+
fc.uint8Array({ minLength: 1, maxLength: 1000 }),
|
|
388
|
+
(data) => {
|
|
389
|
+
const message = Buffer.from(data);
|
|
390
|
+
const encrypted = ecies.encryptSimpleOrSingle(false, publicKey, message);
|
|
391
|
+
const decrypted = ecies.decryptSimpleOrSingleWithHeader(false, privateKey, encrypted);
|
|
392
|
+
|
|
393
|
+
expect(decrypted.equals(message)).toBe(true);
|
|
394
|
+
}
|
|
395
|
+
),
|
|
396
|
+
{ numRuns: 100 }
|
|
397
|
+
);
|
|
398
|
+
});
|
|
399
|
+
});
|
|
400
|
+
```
|
|
401
|
+
|
|
402
|
+
### Testing Best Practices
|
|
403
|
+
|
|
404
|
+
1. **Configure runtime** before tests with `registerNodeRuntimeConfiguration()`
|
|
405
|
+
2. **Test Buffer operations** specific to Node.js
|
|
406
|
+
3. **Test streaming** for large file handling
|
|
407
|
+
4. **Verify binary compatibility** with browser ecies-lib
|
|
408
|
+
5. **Test all ID providers** (ObjectId, GUID, UUID, Custom)
|
|
409
|
+
6. **Test error conditions** like invalid keys and corrupted data
|
|
410
|
+
|
|
411
|
+
### Cross-Package Testing
|
|
412
|
+
|
|
413
|
+
Testing integration with other Express Suite packages:
|
|
414
|
+
|
|
415
|
+
```typescript
|
|
416
|
+
import { ECIESService } from '@digitaldefiance/node-ecies-lib';
|
|
417
|
+
import { Member, MemberType, EmailString } from '@digitaldefiance/ecies-lib';
|
|
418
|
+
|
|
419
|
+
describe('Integration with suite-core-lib', () => {
|
|
420
|
+
it('should work with Member abstraction', () => {
|
|
421
|
+
const ecies = new ECIESService();
|
|
422
|
+
const { member, mnemonic } = Member.newMember(
|
|
423
|
+
ecies,
|
|
424
|
+
MemberType.User,
|
|
425
|
+
'Alice',
|
|
426
|
+
new EmailString('alice@example.com')
|
|
427
|
+
);
|
|
428
|
+
|
|
429
|
+
const encrypted = member.encryptData('Secret');
|
|
430
|
+
expect(encrypted).toBeDefined();
|
|
431
|
+
});
|
|
432
|
+
});
|
|
433
|
+
```
|
|
434
|
+
|
|
248
435
|
## ChangeLog
|
|
249
436
|
|
|
437
|
+
### v4.4.2
|
|
438
|
+
|
|
439
|
+
- Update ecies lib
|
|
440
|
+
- Properly import from @digitaldefiance/mongoose-types
|
|
441
|
+
|
|
442
|
+
### v4.4.1
|
|
443
|
+
|
|
444
|
+
- Update ecies lib
|
|
445
|
+
|
|
250
446
|
### v4.4.0
|
|
251
447
|
|
|
252
448
|
- Improving dependency loops/constants/direcular dependency
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@digitaldefiance/node-ecies-lib",
|
|
3
|
-
"version": "4.4.
|
|
3
|
+
"version": "4.4.2",
|
|
4
4
|
"description": "Digital Defiance Node ECIES Library",
|
|
5
5
|
"main": "src/index.js",
|
|
6
6
|
"types": "src/index.d.ts",
|
|
@@ -48,7 +48,7 @@
|
|
|
48
48
|
"license": "MIT",
|
|
49
49
|
"packageManager": "yarn@4.10.3",
|
|
50
50
|
"dependencies": {
|
|
51
|
-
"@digitaldefiance/ecies-lib": "4.4.
|
|
51
|
+
"@digitaldefiance/ecies-lib": "4.4.2",
|
|
52
52
|
"@digitaldefiance/i18n-lib": "3.8.0",
|
|
53
53
|
"@ethereumjs/wallet": "^10.0.0",
|
|
54
54
|
"@noble/curves": "^2.0.1",
|
|
@@ -59,7 +59,11 @@
|
|
|
59
59
|
"ts-brand": "^0.2.0"
|
|
60
60
|
},
|
|
61
61
|
"devDependencies": {
|
|
62
|
-
"@digitaldefiance/express-suite-test-utils": "1.0.
|
|
62
|
+
"@digitaldefiance/express-suite-test-utils": "1.0.11",
|
|
63
|
+
"@typescript-eslint/eslint-plugin": "^8.48.0",
|
|
64
|
+
"@typescript-eslint/parser": "^8.48.0",
|
|
65
|
+
"eslint-plugin-import": "^2.32.0",
|
|
66
|
+
"eslint-plugin-prettier": "^5.5.4",
|
|
63
67
|
"fast-check": "^4.3.0",
|
|
64
68
|
"madge": "^8.0.0"
|
|
65
69
|
},
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { EmailString, MemberType, SecureBuffer, SecureString } from '@digitaldefiance/ecies-lib';
|
|
2
2
|
import type { Wallet } from '@ethereumjs/wallet';
|
|
3
|
-
import type { Types } from 'mongoose';
|
|
3
|
+
import type { Types } from '@digitaldefiance/mongoose-types';
|
|
4
4
|
import type { SignatureBuffer } from '../types';
|
|
5
5
|
import type { IEncryptedChunk } from './encrypted-chunk';
|
|
6
6
|
import type { IStreamProgress } from './stream-progress';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"backend-member-operational.d.ts","sourceRoot":"","sources":["../../../../../packages/digitaldefiance-node-ecies-lib/src/interfaces/backend-member-operational.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,WAAW,EACX,UAAU,EACV,YAAY,EACZ,YAAY,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"backend-member-operational.d.ts","sourceRoot":"","sources":["../../../../../packages/digitaldefiance-node-ecies-lib/src/interfaces/backend-member-operational.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,WAAW,EACX,UAAU,EACV,YAAY,EACZ,YAAY,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,iCAAiC,CAAC;AAC7D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAChD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACzD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AAEzD;;GAEG;AACH,MAAM,WAAW,yBAAyB,CACxC,CAAC,SAAS,MAAM,GAAG,KAAK,CAAC,QAAQ,GAAG,MAAM,GAAG,UAAU;IAGvD,IAAI,EAAE,IAAI,CAAC,CAAC;IACZ,IAAI,IAAI,IAAI,UAAU,CAAC;IACvB,IAAI,IAAI,IAAI,MAAM,CAAC;IACnB,IAAI,KAAK,IAAI,WAAW,CAAC;IACzB,IAAI,SAAS,IAAI,UAAU,CAAC;IAC5B,IAAI,SAAS,IAAI,CAAC,CAAC;IACnB,IAAI,WAAW,IAAI,IAAI,CAAC;IACxB,IAAI,WAAW,IAAI,IAAI,CAAC;IAGxB,IAAI,UAAU,IAAI,YAAY,GAAG,SAAS,CAAC;IAC3C,IAAI,MAAM,IAAI,MAAM,GAAG,SAAS,CAAC;IAGjC,IAAI,aAAa,IAAI,OAAO,CAAC;IAG7B,IAAI,CAAC,IAAI,EAAE,MAAM,GAAG,eAAe,CAAC;IACpC,MAAM,CAAC,SAAS,EAAE,eAAe,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC;IAC1D,WAAW,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,GAAG,UAAU,CAAC;IAC/C,WAAW,CAAC,aAAa,EAAE,MAAM,GAAG,UAAU,CAAC;IAC/C,MAAM,IAAI,MAAM,CAAC;IACjB,OAAO,IAAI,IAAI,CAAC;IAGhB,iBAAiB,CACf,MAAM,EAAE,aAAa,CAAC,MAAM,CAAC,EAC7B,OAAO,CAAC,EAAE;QACR,kBAAkB,CAAC,EAAE,MAAM,CAAC;QAC5B,UAAU,CAAC,EAAE,CAAC,QAAQ,EAAE,eAAe,KAAK,IAAI,CAAC;QACjD,MAAM,CAAC,EAAE,WAAW,CAAC;KACtB,GACA,cAAc,CAAC,eAAe,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;IAElD,iBAAiB,CACf,MAAM,EAAE,aAAa,CAAC,MAAM,CAAC,EAC7B,OAAO,CAAC,EAAE;QACR,UAAU,CAAC,EAAE,CAAC,QAAQ,EAAE,eAAe,KAAK,IAAI,CAAC;QACjD,MAAM,CAAC,EAAE,WAAW,CAAC;KACtB,GACA,cAAc,CAAC,MAAM,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;IAGzC,UAAU,CAAC,QAAQ,EAAE,YAAY,GAAG,IAAI,CAAC;IACzC,gBAAgB,IAAI,IAAI,CAAC;IACzB,YAAY,IAAI,IAAI,CAAC;IACrB,yBAAyB,IAAI,IAAI,CAAC;CACnC;AAED;;GAEG;AACH,MAAM,WAAW,+BACf,SAAQ,yBAAyB,CAAC,KAAK,CAAC,QAAQ,CAAC;IACjD,IAAI,QAAQ,IAAI,YAAY,GAAG,SAAS,CAAC;CAC1C"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { EmailString, MemberType, SecureBuffer, SecureString } from '@digitaldefiance/ecies-lib';
|
|
2
2
|
import type { Wallet } from '@ethereumjs/wallet';
|
|
3
|
-
import type { Types } from 'mongoose';
|
|
3
|
+
import type { Types } from '@digitaldefiance/mongoose-types';
|
|
4
4
|
import type { SignatureBuffer } from '../types';
|
|
5
5
|
import type { IEncryptedChunk } from './encrypted-chunk';
|
|
6
6
|
import type { IStreamProgress } from './stream-progress';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"member.d.ts","sourceRoot":"","sources":["../../../../../packages/digitaldefiance-node-ecies-lib/src/interfaces/member.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,WAAW,EACX,UAAU,EACV,YAAY,EACZ,YAAY,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"member.d.ts","sourceRoot":"","sources":["../../../../../packages/digitaldefiance-node-ecies-lib/src/interfaces/member.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,WAAW,EACX,UAAU,EACV,YAAY,EACZ,YAAY,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,iCAAiC,CAAC;AAC7D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAChD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACzD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AAEzD;;;;GAIG;AACH,MAAM,WAAW,OAAO,CACtB,GAAG,SAAS,MAAM,GAAG,KAAK,CAAC,QAAQ,GAAG,MAAM,GAAG,UAAU,GAAG,MAAM;IAGlE,QAAQ,CAAC,EAAE,EAAE,GAAG,CAAC;IACjB,QAAQ,CAAC,IAAI,EAAE,UAAU,CAAC;IAC1B,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,KAAK,EAAE,WAAW,CAAC;IAC5B,QAAQ,CAAC,SAAS,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,SAAS,EAAE,GAAG,CAAC;IACxB,QAAQ,CAAC,WAAW,EAAE,IAAI,CAAC;IAC3B,QAAQ,CAAC,WAAW,EAAE,IAAI,CAAC;IAG3B,QAAQ,CAAC,UAAU,EAAE,YAAY,GAAG,SAAS,CAAC;IAC9C,QAAQ,CAAC,MAAM,EAAE,MAAM,CAAC;IAGxB,QAAQ,CAAC,aAAa,EAAE,OAAO,CAAC;IAGhC,gBAAgB,IAAI,IAAI,CAAC;IACzB,YAAY,IAAI,IAAI,CAAC;IACrB,yBAAyB,IAAI,IAAI,CAAC;IAClC,UAAU,CAAC,QAAQ,EAAE,YAAY,GAAG,IAAI,CAAC;IACzC,cAAc,CAAC,UAAU,EAAE,YAAY,GAAG,IAAI,CAAC;IAG/C,IAAI,CAAC,IAAI,EAAE,MAAM,GAAG,eAAe,CAAC;IACpC,QAAQ,CAAC,IAAI,EAAE,MAAM,GAAG,eAAe,CAAC;IACxC,MAAM,CAAC,SAAS,EAAE,eAAe,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC;IAC1D,eAAe,CAAC,IAAI,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC;IAG7E,iBAAiB,CACf,MAAM,EAAE,aAAa,CAAC,MAAM,CAAC,EAC7B,OAAO,CAAC,EAAE;QACR,kBAAkB,CAAC,EAAE,MAAM,CAAC;QAC5B,UAAU,CAAC,EAAE,CAAC,QAAQ,EAAE,eAAe,KAAK,IAAI,CAAC;QACjD,MAAM,CAAC,EAAE,WAAW,CAAC;KACtB,GACA,cAAc,CAAC,eAAe,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;IAElD,iBAAiB,CACf,MAAM,EAAE,aAAa,CAAC,MAAM,CAAC,EAC7B,OAAO,CAAC,EAAE;QACR,UAAU,CAAC,EAAE,CAAC,QAAQ,EAAE,eAAe,KAAK,IAAI,CAAC;QACjD,MAAM,CAAC,EAAE,WAAW,CAAC;KACtB,GACA,cAAc,CAAC,MAAM,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;IAEzC,WAAW,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,EAAE,kBAAkB,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAExE,WAAW,CAAC,aAAa,EAAE,MAAM,GAAG,MAAM,CAAC;IAG3C,MAAM,IAAI,MAAM,CAAC;IACjB,OAAO,IAAI,IAAI,CAAC;CACjB"}
|
package/src/member.d.ts
CHANGED
|
@@ -11,7 +11,7 @@ import { IEncryptedChunk } from './interfaces/encrypted-chunk';
|
|
|
11
11
|
import { IMember } from './interfaces/member';
|
|
12
12
|
import { IStreamProgress } from './interfaces/stream-progress';
|
|
13
13
|
import { ECIESService } from './services/ecies/service';
|
|
14
|
-
import { Types } from 'mongoose';
|
|
14
|
+
import { Types } from '@digitaldefiance/mongoose-types';
|
|
15
15
|
import { IBackendMemberOperational } from './interfaces/backend-member-operational';
|
|
16
16
|
import { SignatureBuffer } from './types';
|
|
17
17
|
/**
|
package/src/member.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"member.d.ts","sourceRoot":"","sources":["../../../../packages/digitaldefiance-node-ecies-lib/src/member.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,WAAW,EAEX,eAAe,EACf,UAAU,EACV,YAAY,EACZ,YAAY,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAO5C;;GAEG;AACH,qBAAa,eAAgB,SAAQ,KAAK;aACK,IAAI,EAAE,eAAe;gBAAtD,OAAO,EAAE,MAAM,EAAkB,IAAI,EAAE,eAAe;CAInE;AAED,OAAO,EAAE,eAAe,EAAE,MAAM,8BAA8B,CAAC;AAC/D,OAAO,EAAE,OAAO,EAAE,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EAAE,eAAe,EAAE,MAAM,8BAA8B,CAAC;AAC/D,OAAO,EAAE,YAAY,EAAE,MAAM,0BAA0B,CAAC;AAGxD,OAAO,EAAE,KAAK,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"member.d.ts","sourceRoot":"","sources":["../../../../packages/digitaldefiance-node-ecies-lib/src/member.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,WAAW,EAEX,eAAe,EACf,UAAU,EACV,YAAY,EACZ,YAAY,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAO5C;;GAEG;AACH,qBAAa,eAAgB,SAAQ,KAAK;aACK,IAAI,EAAE,eAAe;gBAAtD,OAAO,EAAE,MAAM,EAAkB,IAAI,EAAE,eAAe;CAInE;AAED,OAAO,EAAE,eAAe,EAAE,MAAM,8BAA8B,CAAC;AAC/D,OAAO,EAAE,OAAO,EAAE,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EAAE,eAAe,EAAE,MAAM,8BAA8B,CAAC;AAC/D,OAAO,EAAE,YAAY,EAAE,MAAM,0BAA0B,CAAC;AAGxD,OAAO,EAAE,KAAK,EAAE,MAAM,iCAAiC,CAAC;AAExD,OAAO,EAAE,yBAAyB,EAAE,MAAM,yCAAyC,CAAC;AACpF,OAAO,EAAE,eAAe,EAA0B,MAAM,SAAS,CAAC;AAElE;;GAEG;AACH,qBAAa,MAAM,CACjB,GAAG,SAAS,MAAM,GAAG,KAAK,CAAC,QAAQ,GAAG,MAAM,GAAG,UAAU,GAAG,MAAM,CAClE,YAAW,OAAO,CAAC,GAAG,CAAC,EAAE,yBAAyB,CAAC,GAAG,CAAC;IAEvD,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAe;IAC7C,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAM;IAC1B,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAa;IACnC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAS;IAC/B,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAc;IACrC,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAS;IACpC,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAM;IACjC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAO;IACpC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAO;IACpC,OAAO,CAAC,WAAW,CAAC,CAAe;IACnC,OAAO,CAAC,OAAO,CAAC,CAAS;gBAIvB,YAAY,EAAE,YAAY,EAE1B,IAAI,EAAE,UAAU,EAChB,IAAI,EAAE,MAAM,EACZ,KAAK,EAAE,WAAW,EAClB,SAAS,EAAE,MAAM,EACjB,UAAU,CAAC,EAAE,YAAY,EACzB,MAAM,CAAC,EAAE,MAAM,EACf,EAAE,CAAC,EAAE,GAAG,EACR,WAAW,CAAC,EAAE,IAAI,EAClB,WAAW,CAAC,EAAE,IAAI,EAClB,SAAS,CAAC,EAAE,GAAG;IA2CjB,IAAW,EAAE,IAAI,GAAG,CAEnB;IACD,IAAW,IAAI,IAAI,UAAU,CAE5B;IACD,IAAW,IAAI,IAAI,MAAM,CAExB;IACD,IAAW,KAAK,IAAI,WAAW,CAE9B;IACD,IAAW,SAAS,IAAI,MAAM,CAE7B;IACD,IAAW,SAAS,IAAI,GAAG,CAE1B;IACD,IAAW,WAAW,IAAI,IAAI,CAE7B;IACD,IAAW,WAAW,IAAI,IAAI,CAE7B;IAGD,IAAW,UAAU,IAAI,YAAY,GAAG,SAAS,CAEhD;IACD,IAAW,MAAM,IAAI,MAAM,CAQ1B;IAGD,IAAW,aAAa,IAAI,OAAO,CAElC;IAEM,gBAAgB,IAAI,IAAI;IAMxB,YAAY,IAAI,IAAI;IAIpB,yBAAyB,IAAI,IAAI;IAKjC,UAAU,CAAC,QAAQ,EAAE,YAAY,GAAG,IAAI;IA4B/C;;;;;OAKG;IACI,cAAc,CAAC,UAAU,EAAE,YAAY,GAAG,IAAI;IAI9C,IAAI,CAAC,IAAI,EAAE,MAAM,GAAG,eAAe;IAenC,QAAQ,CAAC,IAAI,EAAE,MAAM,GAAG,eAAe;IAevC,MAAM,CAAC,SAAS,EAAE,eAAe,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO;IAIzD,eAAe,CACpB,IAAI,EAAE,MAAM,EACZ,SAAS,EAAE,MAAM,EACjB,SAAS,EAAE,MAAM,GAChB,OAAO;IAQV,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,mBAAmB,CAAoB;IAC/D,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,kBAAkB,CAA0B;IAE7D,WAAW,CAChB,IAAI,EAAE,MAAM,GAAG,MAAM,EACrB,kBAAkB,CAAC,EAAE,MAAM,GAC1B,MAAM;IAqCF,WAAW,CAAC,aAAa,EAAE,MAAM,GAAG,MAAM;IAiB1C,MAAM,IAAI,MAAM;IAkBhB,OAAO,IAAI,IAAI;IASR,iBAAiB,CAC7B,MAAM,EAAE,aAAa,CAAC,MAAM,CAAC,EAC7B,OAAO,CAAC,EAAE;QACR,kBAAkB,CAAC,EAAE,MAAM,CAAC;QAC5B,UAAU,CAAC,EAAE,CAAC,QAAQ,EAAE,eAAe,KAAK,IAAI,CAAC;QACjD,MAAM,CAAC,EAAE,WAAW,CAAC;KACtB,GACA,cAAc,CAAC,eAAe,EAAE,IAAI,EAAE,OAAO,CAAC;IAYnC,iBAAiB,CAC7B,MAAM,EAAE,aAAa,CAAC,MAAM,CAAC,EAC7B,OAAO,CAAC,EAAE;QACR,UAAU,CAAC,EAAE,CAAC,QAAQ,EAAE,eAAe,KAAK,IAAI,CAAC;QACjD,MAAM,CAAC,EAAE,WAAW,CAAC;KACtB,GACA,cAAc,CAAC,MAAM,EAAE,IAAI,EAAE,OAAO,CAAC;WAwB1B,QAAQ,CACpB,IAAI,EAAE,MAAM,EAEZ,YAAY,EAAE,YAAY,GACzB,MAAM;WAqBK,YAAY,CACxB,QAAQ,EAAE,YAAY,EACtB,YAAY,EAAE,YAAY,EAC1B,UAAU,MAAkB,EAC5B,IAAI,SAAc,EAClB,KAAK,MAAsC,GAC1C,MAAM;WAiBK,SAAS,CAErB,YAAY,EAAE,YAAY,EAE1B,IAAI,EAAE,UAAU,EAChB,IAAI,EAAE,MAAM,EACZ,KAAK,EAAE,WAAW,EAClB,aAAa,CAAC,EAAE,YAAY,EAC5B,SAAS,CAAC,EAAE,MAAM,GACjB;QAAE,MAAM,EAAE,MAAM,CAAC;QAAC,QAAQ,EAAE,YAAY,CAAA;KAAE;CA+D9C"}
|