@fgv/ts-web-extras 5.1.0-19 → 5.1.0-20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (393) hide show
  1. package/package.json +10 -10
  2. package/.rush/temp/42a7a953924ae898114e7b6231a2408228d92433.tar.log +0 -243
  3. package/.rush/temp/chunked-rush-logs/ts-web-extras.build.chunks.jsonl +0 -57
  4. package/.rush/temp/operation/build/all.log +0 -57
  5. package/.rush/temp/operation/build/log-chunks.jsonl +0 -57
  6. package/.rush/temp/operation/build/state.json +0 -3
  7. package/.rush/temp/shrinkwrap-deps.json +0 -692
  8. package/CHANGELOG.md +0 -23
  9. package/config/api-extractor.json +0 -343
  10. package/config/jest.config.json +0 -19
  11. package/config/rig.json +0 -16
  12. package/config/typedoc.json +0 -7
  13. package/dist/test/mocks/idb-keyval.js +0 -6
  14. package/dist/test/mocks/idb-keyval.js.map +0 -1
  15. package/dist/test/setupTests.js +0 -74
  16. package/dist/test/setupTests.js.map +0 -1
  17. package/dist/test/unit/browserCryptoProvider.wrapBytes.test.js +0 -221
  18. package/dist/test/unit/browserCryptoProvider.wrapBytes.test.js.map +0 -1
  19. package/dist/test/unit/browserHashProvider.test.js +0 -140
  20. package/dist/test/unit/browserHashProvider.test.js.map +0 -1
  21. package/dist/test/unit/directoryHandleStore.test.js +0 -190
  22. package/dist/test/unit/directoryHandleStore.test.js.map +0 -1
  23. package/dist/test/unit/fileApiTreeAccessors.test.js +0 -1188
  24. package/dist/test/unit/fileApiTreeAccessors.test.js.map +0 -1
  25. package/dist/test/unit/fileApiTypes.test.js +0 -472
  26. package/dist/test/unit/fileApiTypes.test.js.map +0 -1
  27. package/dist/test/unit/fileSystemAccessTreeAccessors.test.js +0 -622
  28. package/dist/test/unit/fileSystemAccessTreeAccessors.test.js.map +0 -1
  29. package/dist/test/unit/fileTreeHelpers.test.js +0 -590
  30. package/dist/test/unit/fileTreeHelpers.test.js.map +0 -1
  31. package/dist/test/unit/httpTreeAccessors.test.js +0 -1364
  32. package/dist/test/unit/httpTreeAccessors.test.js.map +0 -1
  33. package/dist/test/unit/localStorageTreeAccessors.test.js +0 -812
  34. package/dist/test/unit/localStorageTreeAccessors.test.js.map +0 -1
  35. package/dist/test/unit/urlParams.test.js +0 -393
  36. package/dist/test/unit/urlParams.test.js.map +0 -1
  37. package/dist/test/utils/fileSystemAccessMocks.js +0 -271
  38. package/dist/test/utils/fileSystemAccessMocks.js.map +0 -1
  39. package/dist/test/utils/testHelpers.js +0 -124
  40. package/dist/test/utils/testHelpers.js.map +0 -1
  41. package/docs/CryptoUtils/README.md +0 -60
  42. package/docs/CryptoUtils/classes/BrowserCryptoProvider.decrypt.md +0 -27
  43. package/docs/CryptoUtils/classes/BrowserCryptoProvider.deriveKey.md +0 -26
  44. package/docs/CryptoUtils/classes/BrowserCryptoProvider.encrypt.md +0 -25
  45. package/docs/CryptoUtils/classes/BrowserCryptoProvider.exportPublicKeyJwk.md +0 -24
  46. package/docs/CryptoUtils/classes/BrowserCryptoProvider.fromBase64.md +0 -24
  47. package/docs/CryptoUtils/classes/BrowserCryptoProvider.generateKey.md +0 -17
  48. package/docs/CryptoUtils/classes/BrowserCryptoProvider.generateKeyPair.md +0 -25
  49. package/docs/CryptoUtils/classes/BrowserCryptoProvider.generateRandomBytes.md +0 -24
  50. package/docs/CryptoUtils/classes/BrowserCryptoProvider.importPublicKeyJwk.md +0 -25
  51. package/docs/CryptoUtils/classes/BrowserCryptoProvider.md +0 -231
  52. package/docs/CryptoUtils/classes/BrowserCryptoProvider.sha256.md +0 -24
  53. package/docs/CryptoUtils/classes/BrowserCryptoProvider.toBase64.md +0 -24
  54. package/docs/CryptoUtils/classes/BrowserCryptoProvider.unwrapBytes.md +0 -27
  55. package/docs/CryptoUtils/classes/BrowserCryptoProvider.wrapBytes.md +0 -28
  56. package/docs/CryptoUtils/classes/BrowserHashProvider.hashParts.md +0 -26
  57. package/docs/CryptoUtils/classes/BrowserHashProvider.hashString.md +0 -25
  58. package/docs/CryptoUtils/classes/BrowserHashProvider.md +0 -81
  59. package/docs/CryptoUtils/functions/createBrowserCryptoProvider.md +0 -12
  60. package/docs/FileTreeHelpers/README.md +0 -85
  61. package/docs/FileTreeHelpers/functions/extractFileListMetadata.md +0 -11
  62. package/docs/FileTreeHelpers/functions/extractFileMetadata.md +0 -11
  63. package/docs/FileTreeHelpers/functions/fromDirectoryUpload.md +0 -12
  64. package/docs/FileTreeHelpers/functions/fromFileList.md +0 -12
  65. package/docs/FileTreeHelpers/functions/getOriginalFile.md +0 -11
  66. package/docs/FileTreeHelpers/variables/defaultFileApiTreeInitParams.md +0 -9
  67. package/docs/README.md +0 -524
  68. package/docs/classes/BrowserCryptoProvider.decrypt.md +0 -27
  69. package/docs/classes/BrowserCryptoProvider.deriveKey.md +0 -26
  70. package/docs/classes/BrowserCryptoProvider.encrypt.md +0 -25
  71. package/docs/classes/BrowserCryptoProvider.exportPublicKeyJwk.md +0 -24
  72. package/docs/classes/BrowserCryptoProvider.fromBase64.md +0 -24
  73. package/docs/classes/BrowserCryptoProvider.generateKey.md +0 -17
  74. package/docs/classes/BrowserCryptoProvider.generateKeyPair.md +0 -25
  75. package/docs/classes/BrowserCryptoProvider.generateRandomBytes.md +0 -24
  76. package/docs/classes/BrowserCryptoProvider.importPublicKeyJwk.md +0 -25
  77. package/docs/classes/BrowserCryptoProvider.md +0 -231
  78. package/docs/classes/BrowserCryptoProvider.sha256.md +0 -24
  79. package/docs/classes/BrowserCryptoProvider.toBase64.md +0 -24
  80. package/docs/classes/BrowserCryptoProvider.unwrapBytes.md +0 -27
  81. package/docs/classes/BrowserCryptoProvider.wrapBytes.md +0 -28
  82. package/docs/classes/BrowserHashProvider.hashParts.md +0 -26
  83. package/docs/classes/BrowserHashProvider.hashString.md +0 -25
  84. package/docs/classes/BrowserHashProvider.md +0 -81
  85. package/docs/classes/DirectoryHandleStore.getAll.md +0 -17
  86. package/docs/classes/DirectoryHandleStore.getAllLabels.md +0 -17
  87. package/docs/classes/DirectoryHandleStore.load.md +0 -24
  88. package/docs/classes/DirectoryHandleStore.md +0 -120
  89. package/docs/classes/DirectoryHandleStore.remove.md +0 -24
  90. package/docs/classes/DirectoryHandleStore.save.md +0 -25
  91. package/docs/classes/FileApiTreeAccessors.create.md +0 -25
  92. package/docs/classes/FileApiTreeAccessors.createFromHttp.md +0 -24
  93. package/docs/classes/FileApiTreeAccessors.createFromLocalStorage.md +0 -25
  94. package/docs/classes/FileApiTreeAccessors.createPersistent.md +0 -26
  95. package/docs/classes/FileApiTreeAccessors.createPersistentFromFile.md +0 -27
  96. package/docs/classes/FileApiTreeAccessors.extractFileMetadata.md +0 -24
  97. package/docs/classes/FileApiTreeAccessors.fromDirectoryUpload.md +0 -25
  98. package/docs/classes/FileApiTreeAccessors.fromFileList.md +0 -25
  99. package/docs/classes/FileApiTreeAccessors.getOriginalFile.md +0 -27
  100. package/docs/classes/FileApiTreeAccessors.md +0 -172
  101. package/docs/classes/FileSystemAccessTreeAccessors.deleteFile.md +0 -22
  102. package/docs/classes/FileSystemAccessTreeAccessors.fileIsMutable.md +0 -22
  103. package/docs/classes/FileSystemAccessTreeAccessors.fromDirectoryHandle.md +0 -25
  104. package/docs/classes/FileSystemAccessTreeAccessors.fromFileHandle.md +0 -29
  105. package/docs/classes/FileSystemAccessTreeAccessors.getDirtyPaths.md +0 -15
  106. package/docs/classes/FileSystemAccessTreeAccessors.isDirty.md +0 -15
  107. package/docs/classes/FileSystemAccessTreeAccessors.md +0 -275
  108. package/docs/classes/FileSystemAccessTreeAccessors.saveFileContents.md +0 -23
  109. package/docs/classes/FileSystemAccessTreeAccessors.syncToDisk.md +0 -15
  110. package/docs/classes/HttpTreeAccessors.deleteFile.md +0 -24
  111. package/docs/classes/HttpTreeAccessors.fileIsMutable.md +0 -24
  112. package/docs/classes/HttpTreeAccessors.fromHttp.md +0 -24
  113. package/docs/classes/HttpTreeAccessors.getDirtyPaths.md +0 -17
  114. package/docs/classes/HttpTreeAccessors.isDirty.md +0 -17
  115. package/docs/classes/HttpTreeAccessors.md +0 -261
  116. package/docs/classes/HttpTreeAccessors.saveFileContents.md +0 -25
  117. package/docs/classes/HttpTreeAccessors.syncToDisk.md +0 -22
  118. package/docs/classes/LocalStorageTreeAccessors.deleteFile.md +0 -24
  119. package/docs/classes/LocalStorageTreeAccessors.fileIsMutable.md +0 -24
  120. package/docs/classes/LocalStorageTreeAccessors.fromStorage.md +0 -25
  121. package/docs/classes/LocalStorageTreeAccessors.getDirtyPaths.md +0 -17
  122. package/docs/classes/LocalStorageTreeAccessors.isDirty.md +0 -17
  123. package/docs/classes/LocalStorageTreeAccessors.md +0 -270
  124. package/docs/classes/LocalStorageTreeAccessors.saveFileContents.md +0 -25
  125. package/docs/classes/LocalStorageTreeAccessors.syncToDisk.md +0 -17
  126. package/docs/functions/createBrowserCryptoProvider.md +0 -12
  127. package/docs/functions/exportAsJson.md +0 -12
  128. package/docs/functions/exportUsingFileSystemAPI.md +0 -11
  129. package/docs/functions/extractDirectoryPath.md +0 -13
  130. package/docs/functions/extractFileListMetadata.md +0 -11
  131. package/docs/functions/extractFileMetadata.md +0 -11
  132. package/docs/functions/fromDirectoryUpload.md +0 -12
  133. package/docs/functions/fromFileList.md +0 -12
  134. package/docs/functions/getOriginalFile.md +0 -11
  135. package/docs/functions/isDirectoryHandle.md +0 -11
  136. package/docs/functions/isFileHandle.md +0 -11
  137. package/docs/functions/isFilePath.md +0 -11
  138. package/docs/functions/parseContextFilter.md +0 -12
  139. package/docs/functions/parseQualifierDefaults.md +0 -12
  140. package/docs/functions/parseResourceTypes.md +0 -12
  141. package/docs/functions/parseUrlParameters.md +0 -11
  142. package/docs/functions/safeShowDirectoryPicker.md +0 -11
  143. package/docs/functions/safeShowOpenFilePicker.md +0 -11
  144. package/docs/functions/safeShowSaveFilePicker.md +0 -11
  145. package/docs/functions/supportsFileSystemAccess.md +0 -11
  146. package/docs/interfaces/FilePickerAcceptType.accept.md +0 -9
  147. package/docs/interfaces/FilePickerAcceptType.description.md +0 -9
  148. package/docs/interfaces/FilePickerAcceptType.md +0 -61
  149. package/docs/interfaces/FileSystemCreateWritableOptions.keepExistingData.md +0 -9
  150. package/docs/interfaces/FileSystemCreateWritableOptions.md +0 -44
  151. package/docs/interfaces/FileSystemDirectoryHandle._asyncIterator_.md +0 -13
  152. package/docs/interfaces/FileSystemDirectoryHandle.entries.md +0 -13
  153. package/docs/interfaces/FileSystemDirectoryHandle.getDirectoryHandle.md +0 -21
  154. package/docs/interfaces/FileSystemDirectoryHandle.getFileHandle.md +0 -21
  155. package/docs/interfaces/FileSystemDirectoryHandle.keys.md +0 -13
  156. package/docs/interfaces/FileSystemDirectoryHandle.kind.md +0 -9
  157. package/docs/interfaces/FileSystemDirectoryHandle.md +0 -224
  158. package/docs/interfaces/FileSystemDirectoryHandle.removeEntry.md +0 -21
  159. package/docs/interfaces/FileSystemDirectoryHandle.resolve.md +0 -20
  160. package/docs/interfaces/FileSystemDirectoryHandle.values.md +0 -13
  161. package/docs/interfaces/FileSystemFileHandle.createWritable.md +0 -20
  162. package/docs/interfaces/FileSystemFileHandle.getFile.md +0 -13
  163. package/docs/interfaces/FileSystemFileHandle.kind.md +0 -9
  164. package/docs/interfaces/FileSystemFileHandle.md +0 -146
  165. package/docs/interfaces/FileSystemGetDirectoryOptions.create.md +0 -9
  166. package/docs/interfaces/FileSystemGetDirectoryOptions.md +0 -44
  167. package/docs/interfaces/FileSystemGetFileOptions.create.md +0 -9
  168. package/docs/interfaces/FileSystemGetFileOptions.md +0 -44
  169. package/docs/interfaces/FileSystemHandle.isSameEntry.md +0 -20
  170. package/docs/interfaces/FileSystemHandle.kind.md +0 -9
  171. package/docs/interfaces/FileSystemHandle.md +0 -118
  172. package/docs/interfaces/FileSystemHandle.name.md +0 -9
  173. package/docs/interfaces/FileSystemHandle.queryPermission.md +0 -20
  174. package/docs/interfaces/FileSystemHandle.requestPermission.md +0 -20
  175. package/docs/interfaces/FileSystemHandlePermissionDescriptor.md +0 -44
  176. package/docs/interfaces/FileSystemHandlePermissionDescriptor.mode.md +0 -9
  177. package/docs/interfaces/FileSystemRemoveOptions.md +0 -44
  178. package/docs/interfaces/FileSystemRemoveOptions.recursive.md +0 -9
  179. package/docs/interfaces/FileSystemWritableFileStream.md +0 -142
  180. package/docs/interfaces/FileSystemWritableFileStream.seek.md +0 -20
  181. package/docs/interfaces/FileSystemWritableFileStream.truncate.md +0 -20
  182. package/docs/interfaces/FileSystemWritableFileStream.write.md +0 -20
  183. package/docs/interfaces/IDirectoryHandleTreeInitializer.dirHandles.md +0 -9
  184. package/docs/interfaces/IDirectoryHandleTreeInitializer.md +0 -78
  185. package/docs/interfaces/IDirectoryHandleTreeInitializer.nonRecursive.md +0 -9
  186. package/docs/interfaces/IDirectoryHandleTreeInitializer.prefix.md +0 -9
  187. package/docs/interfaces/IFileHandleTreeInitializer.fileHandles.md +0 -9
  188. package/docs/interfaces/IFileHandleTreeInitializer.md +0 -61
  189. package/docs/interfaces/IFileHandleTreeInitializer.prefix.md +0 -9
  190. package/docs/interfaces/IFileListTreeInitializer.fileList.md +0 -9
  191. package/docs/interfaces/IFileListTreeInitializer.md +0 -44
  192. package/docs/interfaces/IFileMetadata.lastModified.md +0 -9
  193. package/docs/interfaces/IFileMetadata.md +0 -112
  194. package/docs/interfaces/IFileMetadata.name.md +0 -9
  195. package/docs/interfaces/IFileMetadata.path.md +0 -9
  196. package/docs/interfaces/IFileMetadata.size.md +0 -9
  197. package/docs/interfaces/IFileMetadata.type.md +0 -9
  198. package/docs/interfaces/IFileSystemAccessTreeParams.autoSync.md +0 -12
  199. package/docs/interfaces/IFileSystemAccessTreeParams.filePath.md +0 -13
  200. package/docs/interfaces/IFileSystemAccessTreeParams.logger.md +0 -11
  201. package/docs/interfaces/IFileSystemAccessTreeParams.md +0 -148
  202. package/docs/interfaces/IFileSystemAccessTreeParams.requireWritePermission.md +0 -13
  203. package/docs/interfaces/IFsAccessApis.md +0 -62
  204. package/docs/interfaces/IFsAccessApis.showDirectoryPicker.md +0 -20
  205. package/docs/interfaces/IFsAccessApis.showOpenFilePicker.md +0 -20
  206. package/docs/interfaces/IFsAccessApis.showSaveFilePicker.md +0 -20
  207. package/docs/interfaces/IHttpTreeParams.autoSync.md +0 -9
  208. package/docs/interfaces/IHttpTreeParams.baseUrl.md +0 -9
  209. package/docs/interfaces/IHttpTreeParams.fetchImpl.md +0 -9
  210. package/docs/interfaces/IHttpTreeParams.logger.md +0 -9
  211. package/docs/interfaces/IHttpTreeParams.md +0 -182
  212. package/docs/interfaces/IHttpTreeParams.namespace.md +0 -9
  213. package/docs/interfaces/IHttpTreeParams.userId.md +0 -9
  214. package/docs/interfaces/ILocalStorageTreeParams.autoSync.md +0 -12
  215. package/docs/interfaces/ILocalStorageTreeParams.md +0 -131
  216. package/docs/interfaces/ILocalStorageTreeParams.pathToKeyMap.md +0 -13
  217. package/docs/interfaces/ILocalStorageTreeParams.storage.md +0 -12
  218. package/docs/interfaces/IUrlConfigOptions.config.md +0 -11
  219. package/docs/interfaces/IUrlConfigOptions.configStartDir.md +0 -11
  220. package/docs/interfaces/IUrlConfigOptions.contextFilter.md +0 -11
  221. package/docs/interfaces/IUrlConfigOptions.input.md +0 -11
  222. package/docs/interfaces/IUrlConfigOptions.inputStartDir.md +0 -11
  223. package/docs/interfaces/IUrlConfigOptions.interactive.md +0 -11
  224. package/docs/interfaces/IUrlConfigOptions.loadZip.md +0 -11
  225. package/docs/interfaces/IUrlConfigOptions.maxDistance.md +0 -11
  226. package/docs/interfaces/IUrlConfigOptions.md +0 -248
  227. package/docs/interfaces/IUrlConfigOptions.qualifierDefaults.md +0 -11
  228. package/docs/interfaces/IUrlConfigOptions.reduceQualifiers.md +0 -11
  229. package/docs/interfaces/IUrlConfigOptions.resourceTypes.md +0 -11
  230. package/docs/interfaces/IUrlConfigOptions.zipFile.md +0 -11
  231. package/docs/interfaces/IUrlConfigOptions.zipPath.md +0 -11
  232. package/docs/interfaces/ShowDirectoryPickerOptions.id.md +0 -9
  233. package/docs/interfaces/ShowDirectoryPickerOptions.md +0 -78
  234. package/docs/interfaces/ShowDirectoryPickerOptions.mode.md +0 -9
  235. package/docs/interfaces/ShowDirectoryPickerOptions.startIn.md +0 -9
  236. package/docs/interfaces/ShowOpenFilePickerOptions.excludeAcceptAllOption.md +0 -9
  237. package/docs/interfaces/ShowOpenFilePickerOptions.id.md +0 -9
  238. package/docs/interfaces/ShowOpenFilePickerOptions.md +0 -112
  239. package/docs/interfaces/ShowOpenFilePickerOptions.multiple.md +0 -9
  240. package/docs/interfaces/ShowOpenFilePickerOptions.startIn.md +0 -9
  241. package/docs/interfaces/ShowOpenFilePickerOptions.types.md +0 -9
  242. package/docs/interfaces/ShowSaveFilePickerOptions.excludeAcceptAllOption.md +0 -9
  243. package/docs/interfaces/ShowSaveFilePickerOptions.id.md +0 -9
  244. package/docs/interfaces/ShowSaveFilePickerOptions.md +0 -112
  245. package/docs/interfaces/ShowSaveFilePickerOptions.startIn.md +0 -9
  246. package/docs/interfaces/ShowSaveFilePickerOptions.suggestedName.md +0 -9
  247. package/docs/interfaces/ShowSaveFilePickerOptions.types.md +0 -9
  248. package/docs/type-aliases/TreeInitializer.md +0 -11
  249. package/docs/type-aliases/WellKnownDirectory.md +0 -11
  250. package/docs/type-aliases/WindowWithFsAccess.md +0 -11
  251. package/docs/variables/DEFAULT_DIRECTORY_HANDLE_DB.md +0 -9
  252. package/docs/variables/DEFAULT_DIRECTORY_HANDLE_STORE.md +0 -9
  253. package/docs/variables/defaultFileApiTreeInitParams.md +0 -9
  254. package/etc/ts-web-extras.api.md +0 -439
  255. package/lib/test/mocks/idb-keyval.d.ts +0 -6
  256. package/lib/test/mocks/idb-keyval.d.ts.map +0 -1
  257. package/lib/test/mocks/idb-keyval.js +0 -9
  258. package/lib/test/mocks/idb-keyval.js.map +0 -1
  259. package/lib/test/setupTests.d.ts +0 -2
  260. package/lib/test/setupTests.d.ts.map +0 -1
  261. package/lib/test/setupTests.js +0 -76
  262. package/lib/test/setupTests.js.map +0 -1
  263. package/lib/test/unit/browserCryptoProvider.wrapBytes.test.d.ts +0 -2
  264. package/lib/test/unit/browserCryptoProvider.wrapBytes.test.d.ts.map +0 -1
  265. package/lib/test/unit/browserCryptoProvider.wrapBytes.test.js +0 -223
  266. package/lib/test/unit/browserCryptoProvider.wrapBytes.test.js.map +0 -1
  267. package/lib/test/unit/browserHashProvider.test.d.ts +0 -2
  268. package/lib/test/unit/browserHashProvider.test.d.ts.map +0 -1
  269. package/lib/test/unit/browserHashProvider.test.js +0 -142
  270. package/lib/test/unit/browserHashProvider.test.js.map +0 -1
  271. package/lib/test/unit/directoryHandleStore.test.d.ts +0 -2
  272. package/lib/test/unit/directoryHandleStore.test.d.ts.map +0 -1
  273. package/lib/test/unit/directoryHandleStore.test.js +0 -192
  274. package/lib/test/unit/directoryHandleStore.test.js.map +0 -1
  275. package/lib/test/unit/fileApiTreeAccessors.test.d.ts +0 -2
  276. package/lib/test/unit/fileApiTreeAccessors.test.d.ts.map +0 -1
  277. package/lib/test/unit/fileApiTreeAccessors.test.js +0 -1190
  278. package/lib/test/unit/fileApiTreeAccessors.test.js.map +0 -1
  279. package/lib/test/unit/fileApiTypes.test.d.ts +0 -2
  280. package/lib/test/unit/fileApiTypes.test.d.ts.map +0 -1
  281. package/lib/test/unit/fileApiTypes.test.js +0 -474
  282. package/lib/test/unit/fileApiTypes.test.js.map +0 -1
  283. package/lib/test/unit/fileSystemAccessTreeAccessors.test.d.ts +0 -2
  284. package/lib/test/unit/fileSystemAccessTreeAccessors.test.d.ts.map +0 -1
  285. package/lib/test/unit/fileSystemAccessTreeAccessors.test.js +0 -624
  286. package/lib/test/unit/fileSystemAccessTreeAccessors.test.js.map +0 -1
  287. package/lib/test/unit/fileTreeHelpers.test.d.ts +0 -2
  288. package/lib/test/unit/fileTreeHelpers.test.d.ts.map +0 -1
  289. package/lib/test/unit/fileTreeHelpers.test.js +0 -592
  290. package/lib/test/unit/fileTreeHelpers.test.js.map +0 -1
  291. package/lib/test/unit/httpTreeAccessors.test.d.ts +0 -2
  292. package/lib/test/unit/httpTreeAccessors.test.d.ts.map +0 -1
  293. package/lib/test/unit/httpTreeAccessors.test.js +0 -1366
  294. package/lib/test/unit/httpTreeAccessors.test.js.map +0 -1
  295. package/lib/test/unit/localStorageTreeAccessors.test.d.ts +0 -2
  296. package/lib/test/unit/localStorageTreeAccessors.test.d.ts.map +0 -1
  297. package/lib/test/unit/localStorageTreeAccessors.test.js +0 -814
  298. package/lib/test/unit/localStorageTreeAccessors.test.js.map +0 -1
  299. package/lib/test/unit/urlParams.test.d.ts +0 -2
  300. package/lib/test/unit/urlParams.test.d.ts.map +0 -1
  301. package/lib/test/unit/urlParams.test.js +0 -395
  302. package/lib/test/unit/urlParams.test.js.map +0 -1
  303. package/lib/test/utils/fileSystemAccessMocks.d.ts +0 -53
  304. package/lib/test/utils/fileSystemAccessMocks.d.ts.map +0 -1
  305. package/lib/test/utils/fileSystemAccessMocks.js +0 -277
  306. package/lib/test/utils/fileSystemAccessMocks.js.map +0 -1
  307. package/lib/test/utils/testHelpers.d.ts +0 -51
  308. package/lib/test/utils/testHelpers.d.ts.map +0 -1
  309. package/lib/test/utils/testHelpers.js +0 -133
  310. package/lib/test/utils/testHelpers.js.map +0 -1
  311. package/rush-logs/ts-web-extras.build.cache.log +0 -3
  312. package/rush-logs/ts-web-extras.build.log +0 -57
  313. package/src/index.browser.ts +0 -24
  314. package/src/index.ts +0 -47
  315. package/src/packlets/crypto-utils/browserCryptoProvider.ts +0 -553
  316. package/src/packlets/crypto-utils/browserHashProvider.ts +0 -73
  317. package/src/packlets/crypto-utils/index.ts +0 -29
  318. package/src/packlets/file-api-types/index.ts +0 -366
  319. package/src/packlets/file-tree/directoryHandleStore.ts +0 -136
  320. package/src/packlets/file-tree/fileApiTreeAccessors.ts +0 -528
  321. package/src/packlets/file-tree/fileSystemAccessTreeAccessors.ts +0 -519
  322. package/src/packlets/file-tree/httpTreeAccessors.ts +0 -478
  323. package/src/packlets/file-tree/index.ts +0 -32
  324. package/src/packlets/file-tree/localStorageTreeAccessors.ts +0 -430
  325. package/src/packlets/helpers/fileTreeHelpers.ts +0 -107
  326. package/src/packlets/helpers/index.ts +0 -28
  327. package/src/packlets/url-utils/index.ts +0 -28
  328. package/src/packlets/url-utils/urlParams.ts +0 -245
  329. package/src/test/mocks/idb-keyval.ts +0 -5
  330. package/src/test/setupTests.ts +0 -87
  331. package/src/test/unit/browserCryptoProvider.wrapBytes.test.ts +0 -325
  332. package/src/test/unit/browserHashProvider.test.ts +0 -155
  333. package/src/test/unit/browserHashProvider.test.ts.bak +0 -376
  334. package/src/test/unit/directoryHandleStore.test.ts +0 -251
  335. package/src/test/unit/fileApiTreeAccessors.test.ts +0 -1387
  336. package/src/test/unit/fileApiTypes.test.ts +0 -587
  337. package/src/test/unit/fileSystemAccessTreeAccessors.test.ts +0 -885
  338. package/src/test/unit/fileTreeHelpers.test.ts +0 -694
  339. package/src/test/unit/httpTreeAccessors.test.ts +0 -1750
  340. package/src/test/unit/localStorageTreeAccessors.test.ts +0 -1014
  341. package/src/test/unit/urlParams.test.ts +0 -464
  342. package/src/test/utils/fileSystemAccessMocks.ts +0 -353
  343. package/src/test/utils/testHelpers.ts +0 -155
  344. package/temp/build/typescript/ts_8nwakTlr.json +0 -1
  345. package/temp/coverage/base.css +0 -224
  346. package/temp/coverage/block-navigation.js +0 -87
  347. package/temp/coverage/crypto-utils/browserCryptoProvider.ts.html +0 -1744
  348. package/temp/coverage/crypto-utils/browserHashProvider.ts.html +0 -304
  349. package/temp/coverage/crypto-utils/index.html +0 -131
  350. package/temp/coverage/favicon.png +0 -0
  351. package/temp/coverage/file-tree/directoryHandleStore.ts.html +0 -493
  352. package/temp/coverage/file-tree/fileApiTreeAccessors.ts.html +0 -1669
  353. package/temp/coverage/file-tree/fileSystemAccessTreeAccessors.ts.html +0 -1642
  354. package/temp/coverage/file-tree/httpTreeAccessors.ts.html +0 -1519
  355. package/temp/coverage/file-tree/index.html +0 -176
  356. package/temp/coverage/file-tree/localStorageTreeAccessors.ts.html +0 -1375
  357. package/temp/coverage/helpers/fileTreeHelpers.ts.html +0 -406
  358. package/temp/coverage/helpers/index.html +0 -116
  359. package/temp/coverage/index.html +0 -161
  360. package/temp/coverage/lcov-report/base.css +0 -224
  361. package/temp/coverage/lcov-report/block-navigation.js +0 -87
  362. package/temp/coverage/lcov-report/crypto-utils/browserCryptoProvider.ts.html +0 -1744
  363. package/temp/coverage/lcov-report/crypto-utils/browserHashProvider.ts.html +0 -304
  364. package/temp/coverage/lcov-report/crypto-utils/index.html +0 -131
  365. package/temp/coverage/lcov-report/favicon.png +0 -0
  366. package/temp/coverage/lcov-report/file-tree/directoryHandleStore.ts.html +0 -493
  367. package/temp/coverage/lcov-report/file-tree/fileApiTreeAccessors.ts.html +0 -1669
  368. package/temp/coverage/lcov-report/file-tree/fileSystemAccessTreeAccessors.ts.html +0 -1642
  369. package/temp/coverage/lcov-report/file-tree/httpTreeAccessors.ts.html +0 -1519
  370. package/temp/coverage/lcov-report/file-tree/index.html +0 -176
  371. package/temp/coverage/lcov-report/file-tree/localStorageTreeAccessors.ts.html +0 -1375
  372. package/temp/coverage/lcov-report/helpers/fileTreeHelpers.ts.html +0 -406
  373. package/temp/coverage/lcov-report/helpers/index.html +0 -116
  374. package/temp/coverage/lcov-report/index.html +0 -161
  375. package/temp/coverage/lcov-report/prettify.css +0 -1
  376. package/temp/coverage/lcov-report/prettify.js +0 -2
  377. package/temp/coverage/lcov-report/sort-arrow-sprite.png +0 -0
  378. package/temp/coverage/lcov-report/sorter.js +0 -210
  379. package/temp/coverage/lcov-report/url-utils/index.html +0 -116
  380. package/temp/coverage/lcov-report/url-utils/urlParams.ts.html +0 -820
  381. package/temp/coverage/lcov.info +0 -3924
  382. package/temp/coverage/prettify.css +0 -1
  383. package/temp/coverage/prettify.js +0 -2
  384. package/temp/coverage/sort-arrow-sprite.png +0 -0
  385. package/temp/coverage/sorter.js +0 -210
  386. package/temp/coverage/url-utils/index.html +0 -116
  387. package/temp/coverage/url-utils/urlParams.ts.html +0 -820
  388. package/temp/test/jest/haste-map-7492f1b44480e0cdd1f220078fb3afd8-c8dd6c3430605adeb2f1cadf4f75e791-8c9336785555d572065b28c111982ba4 +0 -0
  389. package/temp/test/jest/jest-transform-cache-7492f1b44480e0cdd1f220078fb3afd8-79ef2876fae7ca75eedb2aa53dc48338/8a/package_8a7abbb163935a14e582220d11872de3 +0 -53
  390. package/temp/test/jest/perf-cache-7492f1b44480e0cdd1f220078fb3afd8-da39a3ee5e6b4b0d3255bfef95601890 +0 -1
  391. package/temp/ts-web-extras.api.json +0 -9373
  392. package/temp/ts-web-extras.api.md +0 -439
  393. package/tsconfig.json +0 -7
@@ -1,221 +0,0 @@
1
- /*
2
- * Copyright (c) 2026 Erik Fortune
3
- *
4
- * Permission is hereby granted, free of charge, to any person obtaining a copy
5
- * of this software and associated documentation files (the "Software"), to deal
6
- * in the Software without restriction, including without limitation the rights
7
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
8
- * copies of the Software, and to permit persons to whom the Software is
9
- * furnished to do so, subject to the following conditions:
10
- *
11
- * The above copyright notice and this permission notice shall be included in all
12
- * copies or substantial portions of the Software.
13
- *
14
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
17
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
18
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
19
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
20
- * SOFTWARE.
21
- */
22
- import '@fgv/ts-utils-jest';
23
- import { BrowserCryptoProvider } from '../../packlets/crypto-utils';
24
- const provider = new BrowserCryptoProvider();
25
- const subtle = globalThis.crypto.subtle;
26
- async function generateEcdhPair(curve = 'P-256') {
27
- return (await subtle.generateKey({ name: 'ECDH', namedCurve: curve }, true, [
28
- 'deriveKey',
29
- 'deriveBits'
30
- ]));
31
- }
32
- async function generateEcdsaPair() {
33
- return (await subtle.generateKey({ name: 'ECDSA', namedCurve: 'P-256' }, true, [
34
- 'sign',
35
- 'verify'
36
- ]));
37
- }
38
- describe('BrowserCryptoProvider — wrapBytes/unwrapBytes', () => {
39
- const defaultOptions = {
40
- salt: new TextEncoder().encode('test-salt'),
41
- info: new TextEncoder().encode('test-info')
42
- };
43
- describe('round-trip', () => {
44
- test.each([
45
- ['32-byte plaintext (AES-256 key shape)', globalThis.crypto.getRandomValues(new Uint8Array(32))],
46
- ['1-byte plaintext', new Uint8Array([0x42])],
47
- ['1KB plaintext', globalThis.crypto.getRandomValues(new Uint8Array(1024))],
48
- ['empty plaintext', new Uint8Array(0)],
49
- ['high-bit-set bytes', new Uint8Array(64).fill(0xff)]
50
- ])('round-trips %s', async (__label, plaintext) => {
51
- const pair = await generateEcdhPair();
52
- const wrapped = (await provider.wrapBytes(plaintext, pair.publicKey, defaultOptions)).orThrow();
53
- expect(wrapped.ephemeralPublicKey.kty).toBe('EC');
54
- expect(wrapped.ephemeralPublicKey.crv).toBe('P-256');
55
- const recovered = (await provider.unwrapBytes(wrapped, pair.privateKey, defaultOptions)).orThrow();
56
- expect(new Uint8Array(recovered)).toEqual(plaintext);
57
- });
58
- });
59
- describe('determinism / freshness', () => {
60
- test('two wraps of identical inputs produce different ephemeral keys and ciphertexts', async () => {
61
- const pair = await generateEcdhPair();
62
- const plaintext = new TextEncoder().encode('same payload');
63
- const w1 = (await provider.wrapBytes(plaintext, pair.publicKey, defaultOptions)).orThrow();
64
- const w2 = (await provider.wrapBytes(plaintext, pair.publicKey, defaultOptions)).orThrow();
65
- expect(w1.ephemeralPublicKey).not.toEqual(w2.ephemeralPublicKey);
66
- expect(w1.ciphertext).not.toEqual(w2.ciphertext);
67
- expect(w1.nonce).not.toEqual(w2.nonce);
68
- });
69
- });
70
- describe('tampering', () => {
71
- test('flipping a bit in the nonce fails GCM authentication', async () => {
72
- const pair = await generateEcdhPair();
73
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
74
- const nonce = provider.fromBase64(wrapped.nonce).orThrow();
75
- nonce[0] ^= 0xff;
76
- const tampered = Object.assign(Object.assign({}, wrapped), { nonce: provider.toBase64(nonce) });
77
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed/i);
78
- });
79
- test('flipping a bit in the ciphertext fails GCM authentication', async () => {
80
- const pair = await generateEcdhPair();
81
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
82
- const ct = provider.fromBase64(wrapped.ciphertext).orThrow();
83
- ct[0] ^= 0x01;
84
- const tampered = Object.assign(Object.assign({}, wrapped), { ciphertext: provider.toBase64(ct) });
85
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed/i);
86
- });
87
- test('truncating ciphertext by one byte fails GCM authentication (still ≥ 16 bytes)', async () => {
88
- const pair = await generateEcdhPair();
89
- // 16-byte plaintext → 32-byte ciphertext (16 ct + 16 tag); truncate by 1 → 31 bytes ≥ 16
90
- const wrapped = (await provider.wrapBytes(new Uint8Array(16).fill(0xab), pair.publicKey, defaultOptions)).orThrow();
91
- const ct = provider.fromBase64(wrapped.ciphertext).orThrow();
92
- const truncated = ct.slice(0, ct.length - 1);
93
- const tampered = Object.assign(Object.assign({}, wrapped), { ciphertext: provider.toBase64(truncated) });
94
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed/i);
95
- });
96
- test('substituting a different ephemeral public key fails authentication', async () => {
97
- const pair = await generateEcdhPair();
98
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
99
- const other = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
100
- const tampered = Object.assign(Object.assign({}, wrapped), { ephemeralPublicKey: other.ephemeralPublicKey });
101
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed/i);
102
- });
103
- });
104
- describe('wrong-key / wrong-options', () => {
105
- test('unwrap with a different recipient private key fails', async () => {
106
- const pair = await generateEcdhPair();
107
- const other = await generateEcdhPair();
108
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
109
- expect(await provider.unwrapBytes(wrapped, other.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed/i);
110
- });
111
- test('unwrap with a different HKDF salt fails authentication', async () => {
112
- const pair = await generateEcdhPair();
113
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
114
- const wrongSalt = {
115
- salt: new TextEncoder().encode('different-salt'),
116
- info: defaultOptions.info
117
- };
118
- expect(await provider.unwrapBytes(wrapped, pair.privateKey, wrongSalt)).toFailWith(/unwrapBytes failed/i);
119
- });
120
- test('unwrap with a different HKDF info fails authentication', async () => {
121
- const pair = await generateEcdhPair();
122
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
123
- const wrongInfo = {
124
- salt: defaultOptions.salt,
125
- info: new TextEncoder().encode('different-info')
126
- };
127
- expect(await provider.unwrapBytes(wrapped, pair.privateKey, wrongInfo)).toFailWith(/unwrapBytes failed/i);
128
- });
129
- test('empty salt and info round-trip when both sides agree', async () => {
130
- const pair = await generateEcdhPair();
131
- const empty = { salt: new Uint8Array(0), info: new Uint8Array(0) };
132
- const plaintext = globalThis.crypto.getRandomValues(new Uint8Array(16));
133
- const wrapped = (await provider.wrapBytes(plaintext, pair.publicKey, empty)).orThrow();
134
- const recovered = (await provider.unwrapBytes(wrapped, pair.privateKey, empty)).orThrow();
135
- expect(new Uint8Array(recovered)).toEqual(plaintext);
136
- });
137
- });
138
- describe('malformed input', () => {
139
- test('malformed ephemeralPublicKey JWK fails', async () => {
140
- const pair = await generateEcdhPair();
141
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
142
- const bogus = Object.assign(Object.assign({}, wrapped), { ephemeralPublicKey: { kty: 'EC', crv: 'P-256' } });
143
- expect(await provider.unwrapBytes(bogus, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed/i);
144
- });
145
- test('ephemeralPublicKey on the wrong curve (P-384) fails', async () => {
146
- const pair = await generateEcdhPair();
147
- const wrongCurve = await generateEcdhPair('P-384');
148
- const wrongJwk = await subtle.exportKey('jwk', wrongCurve.publicKey);
149
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
150
- const tampered = Object.assign(Object.assign({}, wrapped), { ephemeralPublicKey: wrongJwk });
151
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed/i);
152
- });
153
- test('non-base64 nonce fails with a clean error', async () => {
154
- const pair = await generateEcdhPair();
155
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
156
- const tampered = Object.assign(Object.assign({}, wrapped), { nonce: 'not!base64!' });
157
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed: nonce/i);
158
- });
159
- test('non-base64 ciphertext fails with a clean error', async () => {
160
- const pair = await generateEcdhPair();
161
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
162
- const tampered = Object.assign(Object.assign({}, wrapped), { ciphertext: 'not!base64!' });
163
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed: ciphertext/i);
164
- });
165
- test('wrong-length nonce (after base64 decode) fails before reaching AES-GCM', async () => {
166
- const pair = await generateEcdhPair();
167
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
168
- const shortNonce = new Uint8Array(8);
169
- const tampered = Object.assign(Object.assign({}, wrapped), { nonce: provider.toBase64(shortNonce) });
170
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed: nonce must be 12 bytes \(got 8\)/i);
171
- });
172
- test('ciphertext shorter than the GCM auth tag fails before reaching AES-GCM', async () => {
173
- const pair = await generateEcdhPair();
174
- const wrapped = (await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)).orThrow();
175
- const shortCt = new Uint8Array(8);
176
- const tampered = Object.assign(Object.assign({}, wrapped), { ciphertext: provider.toBase64(shortCt) });
177
- expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(/unwrapBytes failed: ciphertext must be at least 16 bytes \(got 8\)/i);
178
- });
179
- });
180
- describe('algorithm / type mismatch on recipient key', () => {
181
- test('wrap fails when recipient public key is RSA-OAEP, not ECDH', async () => {
182
- const rsa = (await subtle.generateKey({
183
- name: 'RSA-OAEP',
184
- modulusLength: 2048,
185
- publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
186
- hash: 'SHA-256'
187
- }, true, ['encrypt', 'decrypt']));
188
- const result = await provider.wrapBytes(new Uint8Array([1, 2, 3]), rsa.publicKey, defaultOptions);
189
- expect(result).toFailWith(/wrapBytes failed: recipient public key must be ECDH P-256.*RSA-OAEP/i);
190
- });
191
- test('wrap fails when recipient public key is ECDSA P-256, not ECDH', async () => {
192
- const ecdsa = await generateEcdsaPair();
193
- const result = await provider.wrapBytes(new Uint8Array([1, 2, 3]), ecdsa.publicKey, defaultOptions);
194
- expect(result).toFailWith(/wrapBytes failed: recipient public key must be ECDH P-256.*ECDSA/i);
195
- });
196
- test('wrap fails when recipient public key is ECDH P-384, not P-256', async () => {
197
- const wrongCurve = await generateEcdhPair('P-384');
198
- const result = await provider.wrapBytes(new Uint8Array([1, 2, 3]), wrongCurve.publicKey, defaultOptions);
199
- expect(result).toFailWith(/wrapBytes failed: recipient public key must be ECDH P-256.*P-384/i);
200
- });
201
- test('unwrap fails when recipient private key is ECDH P-384, not P-256', async () => {
202
- const pair = await generateEcdhPair();
203
- const wrapped = (await provider.wrapBytes(new Uint8Array([1, 2, 3]), pair.publicKey, defaultOptions)).orThrow();
204
- const wrongCurve = await generateEcdhPair('P-384');
205
- const result = await provider.unwrapBytes(wrapped, wrongCurve.privateKey, defaultOptions);
206
- expect(result).toFailWith(/unwrapBytes failed: recipient private key must be ECDH P-256.*P-384/i);
207
- });
208
- test('wrap fails when recipient is an ECDH private key (not public)', async () => {
209
- const pair = await generateEcdhPair();
210
- const result = await provider.wrapBytes(new Uint8Array([1, 2, 3]), pair.privateKey, defaultOptions);
211
- expect(result).toFailWith(/wrapBytes failed: recipient public key must be a public CryptoKey \(got 'private'\)/i);
212
- });
213
- test('unwrap fails when recipient is an ECDH public key (not private)', async () => {
214
- const pair = await generateEcdhPair();
215
- const wrapped = (await provider.wrapBytes(new Uint8Array([1, 2, 3]), pair.publicKey, defaultOptions)).orThrow();
216
- const result = await provider.unwrapBytes(wrapped, pair.publicKey, defaultOptions);
217
- expect(result).toFailWith(/unwrapBytes failed: recipient private key must be a private CryptoKey \(got 'public'\)/i);
218
- });
219
- });
220
- });
221
- //# sourceMappingURL=browserCryptoProvider.wrapBytes.test.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"browserCryptoProvider.wrapBytes.test.js","sourceRoot":"","sources":["../../../src/test/unit/browserCryptoProvider.wrapBytes.test.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;GAoBG;AAEH,OAAO,oBAAoB,CAAC;AAG5B,OAAO,EAAE,qBAAqB,EAAE,MAAM,6BAA6B,CAAC;AAEpE,MAAM,QAAQ,GAAG,IAAI,qBAAqB,EAAE,CAAC;AAC7C,MAAM,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC,MAAM,CAAC;AAExC,KAAK,UAAU,gBAAgB,CAAC,QAA2B,OAAO;IAChE,OAAO,CAAC,MAAM,MAAM,CAAC,WAAW,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,KAAK,EAAE,EAAE,IAAI,EAAE;QAC1E,WAAW;QACX,YAAY;KACb,CAAC,CAAkB,CAAC;AACvB,CAAC;AAED,KAAK,UAAU,iBAAiB;IAC9B,OAAO,CAAC,MAAM,MAAM,CAAC,WAAW,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE,EAAE,IAAI,EAAE;QAC7E,MAAM;QACN,QAAQ;KACT,CAAC,CAAkB,CAAC;AACvB,CAAC;AAED,QAAQ,CAAC,+CAA+C,EAAE,GAAG,EAAE;IAC7D,MAAM,cAAc,GAAkC;QACpD,IAAI,EAAE,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC;QAC3C,IAAI,EAAE,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC;KAC5C,CAAC;IAEF,QAAQ,CAAC,YAAY,EAAE,GAAG,EAAE;QAC1B,IAAI,CAAC,IAAI,CAAuB;YAC9B,CAAC,uCAAuC,EAAE,UAAU,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC,CAAC;YAChG,CAAC,kBAAkB,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC;YAC5C,CAAC,eAAe,EAAE,UAAU,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC;YAC1E,CAAC,iBAAiB,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;YACtC,CAAC,oBAAoB,EAAE,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;SACtD,CAAC,CAAC,gBAAgB,EAAE,KAAK,EAAE,OAAO,EAAE,SAAS,EAAE,EAAE;YAChD,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CAAC,MAAM,QAAQ,CAAC,SAAS,CAAC,SAAS,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YAChG,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YACrD,MAAM,SAAS,GAAG,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YACnG,MAAM,CAAC,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE;QACvC,IAAI,CAAC,gFAAgF,EAAE,KAAK,IAAI,EAAE;YAChG,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,SAAS,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;YAC3D,MAAM,EAAE,GAAG,CAAC,MAAM,QAAQ,CAAC,SAAS,CAAC,SAAS,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YAC3F,MAAM,EAAE,GAAG,CAAC,MAAM,QAAQ,CAAC,SAAS,CAAC,SAAS,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YAC3F,MAAM,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC;YACjE,MAAM,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;YACjD,MAAM,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC;QACzC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,WAAW,EAAE,GAAG,EAAE;QACzB,IAAI,CAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;YACtE,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,KAAK,GAAG,QAAQ,CAAC,UAAU,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,OAAO,EAAE,CAAC;YAC3D,KAAK,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC;YACjB,MAAM,QAAQ,mCAAmC,OAAO,KAAE,KAAK,EAAE,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,GAAE,CAAC;YAC5F,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,2DAA2D,EAAE,KAAK,IAAI,EAAE;YAC3E,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,EAAE,GAAG,QAAQ,CAAC,UAAU,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,OAAO,EAAE,CAAC;YAC7D,EAAE,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC;YACd,MAAM,QAAQ,mCAAmC,OAAO,KAAE,UAAU,EAAE,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC,GAAE,CAAC;YAC9F,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,+EAA+E,EAAE,KAAK,IAAI,EAAE;YAC/F,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,yFAAyF;YACzF,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CACxF,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,EAAE,GAAG,QAAQ,CAAC,UAAU,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,OAAO,EAAE,CAAC;YAC7D,MAAM,SAAS,GAAG,EAAE,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;YAC7C,MAAM,QAAQ,mCAAmC,OAAO,KAAE,UAAU,EAAE,QAAQ,CAAC,QAAQ,CAAC,SAAS,CAAC,GAAE,CAAC;YACrG,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,oEAAoE,EAAE,KAAK,IAAI,EAAE;YACpF,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,KAAK,GAAG,CACZ,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,QAAQ,mCACT,OAAO,KACV,kBAAkB,EAAE,KAAK,CAAC,kBAAkB,GAC7C,CAAC;YACF,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE;QACzC,IAAI,CAAC,qDAAqD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACvC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,OAAO,EAAE,KAAK,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;YACxE,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,SAAS,GAAkC;gBAC/C,IAAI,EAAE,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,gBAAgB,CAAC;gBAChD,IAAI,EAAE,cAAc,CAAC,IAAI;aAC1B,CAAC;YACF,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC,CAAC,UAAU,CAChF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;YACxE,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,SAAS,GAAkC;gBAC/C,IAAI,EAAE,cAAc,CAAC,IAAI;gBACzB,IAAI,EAAE,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,gBAAgB,CAAC;aACjD,CAAC;YACF,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC,CAAC,UAAU,CAChF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;YACtE,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,KAAK,GAAkC,EAAE,IAAI,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;YAClG,MAAM,SAAS,GAAG,UAAU,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC,CAAC;YACxE,MAAM,OAAO,GAAG,CAAC,MAAM,QAAQ,CAAC,SAAS,CAAC,SAAS,EAAE,IAAI,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YACvF,MAAM,SAAS,GAAG,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YAC1F,MAAM,CAAC,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,iBAAiB,EAAE,GAAG,EAAE;QAC/B,IAAI,CAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;YACxD,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,KAAK,mCACN,OAAO,KACV,kBAAkB,EAAE,EAAE,GAAG,EAAE,IAAI,EAAE,GAAG,EAAE,OAAO,EAAgB,GAC9D,CAAC;YACF,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,KAAK,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACnF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,qDAAqD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,OAAO,CAAC,CAAC;YACnD,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,UAAU,CAAC,SAAS,CAAC,CAAC;YACrE,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,QAAQ,mCAAmC,OAAO,KAAE,kBAAkB,EAAE,QAAQ,GAAE,CAAC;YACzF,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,qBAAqB,CACtB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;YAC3D,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,QAAQ,mCAAmC,OAAO,KAAE,KAAK,EAAE,aAAa,GAAE,CAAC;YACjF,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,4BAA4B,CAC7B,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;YAChE,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,QAAQ,mCAAmC,OAAO,KAAE,UAAU,EAAE,aAAa,GAAE,CAAC;YACtF,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,iCAAiC,CAClC,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,wEAAwE,EAAE,KAAK,IAAI,EAAE;YACxF,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;YACrC,MAAM,QAAQ,mCAAmC,OAAO,KAAE,KAAK,EAAE,QAAQ,CAAC,QAAQ,CAAC,UAAU,CAAC,GAAE,CAAC;YACjG,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,uDAAuD,CACxD,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,wEAAwE,EAAE,KAAK,IAAI,EAAE;YACxF,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAC9F,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;YAClC,MAAM,QAAQ,mCAAmC,OAAO,KAAE,UAAU,EAAE,QAAQ,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAE,CAAC;YACnG,MAAM,CAAC,MAAM,QAAQ,CAAC,WAAW,CAAC,QAAQ,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,UAAU,CACtF,qEAAqE,CACtE,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,4CAA4C,EAAE,GAAG,EAAE;QAC1D,IAAI,CAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC5E,MAAM,GAAG,GAAG,CAAC,MAAM,MAAM,CAAC,WAAW,CACnC;gBACE,IAAI,EAAE,UAAU;gBAChB,aAAa,EAAE,IAAI;gBACnB,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;gBAClD,IAAI,EAAE,SAAS;aAChB,EACD,IAAI,EACJ,CAAC,SAAS,EAAE,SAAS,CAAC,CACvB,CAAkB,CAAC;YACpB,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,SAAS,EAAE,cAAc,CAAC,CAAC;YAClG,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC,sEAAsE,CAAC,CAAC;QACpG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,+DAA+D,EAAE,KAAK,IAAI,EAAE;YAC/E,MAAM,KAAK,GAAG,MAAM,iBAAiB,EAAE,CAAC;YACxC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,KAAK,CAAC,SAAS,EAAE,cAAc,CAAC,CAAC;YACpG,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC,mEAAmE,CAAC,CAAC;QACjG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,+DAA+D,EAAE,KAAK,IAAI,EAAE;YAC/E,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,OAAO,CAAC,CAAC;YACnD,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,SAAS,CACrC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EACzB,UAAU,CAAC,SAAS,EACpB,cAAc,CACf,CAAC;YACF,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC,mEAAmE,CAAC,CAAC;QACjG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,kEAAkE,EAAE,KAAK,IAAI,EAAE;YAClF,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CACpF,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,OAAO,CAAC,CAAC;YACnD,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,WAAW,CAAC,OAAO,EAAE,UAAU,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;YAC1F,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC,sEAAsE,CAAC,CAAC;QACpG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,+DAA+D,EAAE,KAAK,IAAI,EAAE;YAC/E,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;YACpG,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CACvB,sFAAsF,CACvF,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,iEAAiE,EAAE,KAAK,IAAI,EAAE;YACjF,MAAM,IAAI,GAAG,MAAM,gBAAgB,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CACd,MAAM,QAAQ,CAAC,SAAS,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CACpF,CAAC,OAAO,EAAE,CAAC;YACZ,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,CAAC;YACnF,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CACvB,yFAAyF,CAC1F,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["/*\n * Copyright (c) 2026 Erik Fortune\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell\n * copies of the Software, and to permit persons to whom the Software is\n * furnished to do so, subject to the following conditions:\n *\n * The above copyright notice and this permission notice shall be included in all\n * copies or substantial portions of the Software.\n *\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\n * SOFTWARE.\n */\n\nimport '@fgv/ts-utils-jest';\n\nimport { CryptoUtils } from '@fgv/ts-extras';\nimport { BrowserCryptoProvider } from '../../packlets/crypto-utils';\n\nconst provider = new BrowserCryptoProvider();\nconst subtle = globalThis.crypto.subtle;\n\nasync function generateEcdhPair(curve: 'P-256' | 'P-384' = 'P-256'): Promise<CryptoKeyPair> {\n return (await subtle.generateKey({ name: 'ECDH', namedCurve: curve }, true, [\n 'deriveKey',\n 'deriveBits'\n ])) as CryptoKeyPair;\n}\n\nasync function generateEcdsaPair(): Promise<CryptoKeyPair> {\n return (await subtle.generateKey({ name: 'ECDSA', namedCurve: 'P-256' }, true, [\n 'sign',\n 'verify'\n ])) as CryptoKeyPair;\n}\n\ndescribe('BrowserCryptoProvider — wrapBytes/unwrapBytes', () => {\n const defaultOptions: CryptoUtils.IWrapBytesOptions = {\n salt: new TextEncoder().encode('test-salt'),\n info: new TextEncoder().encode('test-info')\n };\n\n describe('round-trip', () => {\n test.each<[string, Uint8Array]>([\n ['32-byte plaintext (AES-256 key shape)', globalThis.crypto.getRandomValues(new Uint8Array(32))],\n ['1-byte plaintext', new Uint8Array([0x42])],\n ['1KB plaintext', globalThis.crypto.getRandomValues(new Uint8Array(1024))],\n ['empty plaintext', new Uint8Array(0)],\n ['high-bit-set bytes', new Uint8Array(64).fill(0xff)]\n ])('round-trips %s', async (__label, plaintext) => {\n const pair = await generateEcdhPair();\n const wrapped = (await provider.wrapBytes(plaintext, pair.publicKey, defaultOptions)).orThrow();\n expect(wrapped.ephemeralPublicKey.kty).toBe('EC');\n expect(wrapped.ephemeralPublicKey.crv).toBe('P-256');\n const recovered = (await provider.unwrapBytes(wrapped, pair.privateKey, defaultOptions)).orThrow();\n expect(new Uint8Array(recovered)).toEqual(plaintext);\n });\n });\n\n describe('determinism / freshness', () => {\n test('two wraps of identical inputs produce different ephemeral keys and ciphertexts', async () => {\n const pair = await generateEcdhPair();\n const plaintext = new TextEncoder().encode('same payload');\n const w1 = (await provider.wrapBytes(plaintext, pair.publicKey, defaultOptions)).orThrow();\n const w2 = (await provider.wrapBytes(plaintext, pair.publicKey, defaultOptions)).orThrow();\n expect(w1.ephemeralPublicKey).not.toEqual(w2.ephemeralPublicKey);\n expect(w1.ciphertext).not.toEqual(w2.ciphertext);\n expect(w1.nonce).not.toEqual(w2.nonce);\n });\n });\n\n describe('tampering', () => {\n test('flipping a bit in the nonce fails GCM authentication', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const nonce = provider.fromBase64(wrapped.nonce).orThrow();\n nonce[0] ^= 0xff;\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, nonce: provider.toBase64(nonce) };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('flipping a bit in the ciphertext fails GCM authentication', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const ct = provider.fromBase64(wrapped.ciphertext).orThrow();\n ct[0] ^= 0x01;\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, ciphertext: provider.toBase64(ct) };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('truncating ciphertext by one byte fails GCM authentication (still ≥ 16 bytes)', async () => {\n const pair = await generateEcdhPair();\n // 16-byte plaintext → 32-byte ciphertext (16 ct + 16 tag); truncate by 1 → 31 bytes ≥ 16\n const wrapped = (\n await provider.wrapBytes(new Uint8Array(16).fill(0xab), pair.publicKey, defaultOptions)\n ).orThrow();\n const ct = provider.fromBase64(wrapped.ciphertext).orThrow();\n const truncated = ct.slice(0, ct.length - 1);\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, ciphertext: provider.toBase64(truncated) };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('substituting a different ephemeral public key fails authentication', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const other = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const tampered: CryptoUtils.IWrappedBytes = {\n ...wrapped,\n ephemeralPublicKey: other.ephemeralPublicKey\n };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n });\n\n describe('wrong-key / wrong-options', () => {\n test('unwrap with a different recipient private key fails', async () => {\n const pair = await generateEcdhPair();\n const other = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n expect(await provider.unwrapBytes(wrapped, other.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('unwrap with a different HKDF salt fails authentication', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const wrongSalt: CryptoUtils.IWrapBytesOptions = {\n salt: new TextEncoder().encode('different-salt'),\n info: defaultOptions.info\n };\n expect(await provider.unwrapBytes(wrapped, pair.privateKey, wrongSalt)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('unwrap with a different HKDF info fails authentication', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const wrongInfo: CryptoUtils.IWrapBytesOptions = {\n salt: defaultOptions.salt,\n info: new TextEncoder().encode('different-info')\n };\n expect(await provider.unwrapBytes(wrapped, pair.privateKey, wrongInfo)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('empty salt and info round-trip when both sides agree', async () => {\n const pair = await generateEcdhPair();\n const empty: CryptoUtils.IWrapBytesOptions = { salt: new Uint8Array(0), info: new Uint8Array(0) };\n const plaintext = globalThis.crypto.getRandomValues(new Uint8Array(16));\n const wrapped = (await provider.wrapBytes(plaintext, pair.publicKey, empty)).orThrow();\n const recovered = (await provider.unwrapBytes(wrapped, pair.privateKey, empty)).orThrow();\n expect(new Uint8Array(recovered)).toEqual(plaintext);\n });\n });\n\n describe('malformed input', () => {\n test('malformed ephemeralPublicKey JWK fails', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const bogus: CryptoUtils.IWrappedBytes = {\n ...wrapped,\n ephemeralPublicKey: { kty: 'EC', crv: 'P-256' } as JsonWebKey\n };\n expect(await provider.unwrapBytes(bogus, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('ephemeralPublicKey on the wrong curve (P-384) fails', async () => {\n const pair = await generateEcdhPair();\n const wrongCurve = await generateEcdhPair('P-384');\n const wrongJwk = await subtle.exportKey('jwk', wrongCurve.publicKey);\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, ephemeralPublicKey: wrongJwk };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed/i\n );\n });\n\n test('non-base64 nonce fails with a clean error', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, nonce: 'not!base64!' };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed: nonce/i\n );\n });\n\n test('non-base64 ciphertext fails with a clean error', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, ciphertext: 'not!base64!' };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed: ciphertext/i\n );\n });\n\n test('wrong-length nonce (after base64 decode) fails before reaching AES-GCM', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const shortNonce = new Uint8Array(8);\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, nonce: provider.toBase64(shortNonce) };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed: nonce must be 12 bytes \\(got 8\\)/i\n );\n });\n\n test('ciphertext shorter than the GCM auth tag fails before reaching AES-GCM', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new TextEncoder().encode('payload'), pair.publicKey, defaultOptions)\n ).orThrow();\n const shortCt = new Uint8Array(8);\n const tampered: CryptoUtils.IWrappedBytes = { ...wrapped, ciphertext: provider.toBase64(shortCt) };\n expect(await provider.unwrapBytes(tampered, pair.privateKey, defaultOptions)).toFailWith(\n /unwrapBytes failed: ciphertext must be at least 16 bytes \\(got 8\\)/i\n );\n });\n });\n\n describe('algorithm / type mismatch on recipient key', () => {\n test('wrap fails when recipient public key is RSA-OAEP, not ECDH', async () => {\n const rsa = (await subtle.generateKey(\n {\n name: 'RSA-OAEP',\n modulusLength: 2048,\n publicExponent: new Uint8Array([0x01, 0x00, 0x01]),\n hash: 'SHA-256'\n },\n true,\n ['encrypt', 'decrypt']\n )) as CryptoKeyPair;\n const result = await provider.wrapBytes(new Uint8Array([1, 2, 3]), rsa.publicKey, defaultOptions);\n expect(result).toFailWith(/wrapBytes failed: recipient public key must be ECDH P-256.*RSA-OAEP/i);\n });\n\n test('wrap fails when recipient public key is ECDSA P-256, not ECDH', async () => {\n const ecdsa = await generateEcdsaPair();\n const result = await provider.wrapBytes(new Uint8Array([1, 2, 3]), ecdsa.publicKey, defaultOptions);\n expect(result).toFailWith(/wrapBytes failed: recipient public key must be ECDH P-256.*ECDSA/i);\n });\n\n test('wrap fails when recipient public key is ECDH P-384, not P-256', async () => {\n const wrongCurve = await generateEcdhPair('P-384');\n const result = await provider.wrapBytes(\n new Uint8Array([1, 2, 3]),\n wrongCurve.publicKey,\n defaultOptions\n );\n expect(result).toFailWith(/wrapBytes failed: recipient public key must be ECDH P-256.*P-384/i);\n });\n\n test('unwrap fails when recipient private key is ECDH P-384, not P-256', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new Uint8Array([1, 2, 3]), pair.publicKey, defaultOptions)\n ).orThrow();\n const wrongCurve = await generateEcdhPair('P-384');\n const result = await provider.unwrapBytes(wrapped, wrongCurve.privateKey, defaultOptions);\n expect(result).toFailWith(/unwrapBytes failed: recipient private key must be ECDH P-256.*P-384/i);\n });\n\n test('wrap fails when recipient is an ECDH private key (not public)', async () => {\n const pair = await generateEcdhPair();\n const result = await provider.wrapBytes(new Uint8Array([1, 2, 3]), pair.privateKey, defaultOptions);\n expect(result).toFailWith(\n /wrapBytes failed: recipient public key must be a public CryptoKey \\(got 'private'\\)/i\n );\n });\n\n test('unwrap fails when recipient is an ECDH public key (not private)', async () => {\n const pair = await generateEcdhPair();\n const wrapped = (\n await provider.wrapBytes(new Uint8Array([1, 2, 3]), pair.publicKey, defaultOptions)\n ).orThrow();\n const result = await provider.unwrapBytes(wrapped, pair.publicKey, defaultOptions);\n expect(result).toFailWith(\n /unwrapBytes failed: recipient private key must be a private CryptoKey \\(got 'public'\\)/i\n );\n });\n });\n});\n"]}
@@ -1,140 +0,0 @@
1
- /*
2
- * Copyright (c) 2025 Erik Fortune
3
- *
4
- * Permission is hereby granted, free of charge, to any person obtaining a copy
5
- * of this software and associated documentation files (the "Software"), to deal
6
- * in the Software without restriction, including without limitation the rights
7
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
8
- * copies of the Software, and to permit persons to whom the Software is
9
- * furnished to do so, subject to the following conditions:
10
- *
11
- * The above copyright notice and this permission notice shall be included in all
12
- * copies or substantial portions of the Software.
13
- *
14
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
17
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
18
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
19
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
20
- * SOFTWARE.
21
- */
22
- import '@fgv/ts-utils-jest';
23
- import { BrowserHashProvider } from '../../packlets/crypto-utils';
24
- describe('BrowserHashProvider', () => {
25
- describe('hashString', () => {
26
- test('successfully hashes a string with SHA-256', async () => {
27
- const result = await BrowserHashProvider.hashString('test data', 'SHA-256');
28
- expect(result).toSucceedAndSatisfy((hash) => {
29
- expect(typeof hash).toBe('string');
30
- expect(hash).toMatch(/^[a-f0-9]{64}$/); // SHA-256 produces 64 hex characters
31
- });
32
- });
33
- test('successfully hashes a string with SHA-1', async () => {
34
- const result = await BrowserHashProvider.hashString('test data', 'SHA-1');
35
- expect(result).toSucceedAndSatisfy((hash) => {
36
- expect(typeof hash).toBe('string');
37
- expect(hash).toMatch(/^[a-f0-9]{40}$/); // SHA-1 produces 40 hex characters
38
- });
39
- });
40
- test('successfully hashes a string with SHA-512', async () => {
41
- const result = await BrowserHashProvider.hashString('test data', 'SHA-512');
42
- expect(result).toSucceedAndSatisfy((hash) => {
43
- expect(typeof hash).toBe('string');
44
- expect(hash).toMatch(/^[a-f0-9]{128}$/); // SHA-512 produces 128 hex characters
45
- });
46
- });
47
- test('uses SHA-256 as default algorithm', async () => {
48
- const result = await BrowserHashProvider.hashString('test data');
49
- expect(result).toSucceedAndSatisfy((hash) => {
50
- expect(hash).toMatch(/^[a-f0-9]{64}$/); // SHA-256 produces 64 hex characters
51
- });
52
- });
53
- test('produces consistent hash for same input', async () => {
54
- const input = 'consistent input';
55
- const result1 = await BrowserHashProvider.hashString(input);
56
- const result2 = await BrowserHashProvider.hashString(input);
57
- expect(result1).toSucceed();
58
- expect(result2).toSucceed();
59
- if (result1.isSuccess() && result2.isSuccess()) {
60
- expect(result1.value).toBe(result2.value);
61
- }
62
- });
63
- test('produces different hashes for different inputs', async () => {
64
- const result1 = await BrowserHashProvider.hashString('input1');
65
- const result2 = await BrowserHashProvider.hashString('input2');
66
- expect(result1).toSucceed();
67
- expect(result2).toSucceed();
68
- if (result1.isSuccess() && result2.isSuccess()) {
69
- expect(result1.value).not.toBe(result2.value);
70
- }
71
- });
72
- test('handles empty string input', async () => {
73
- const result = await BrowserHashProvider.hashString('');
74
- expect(result).toSucceed();
75
- });
76
- test('handles unicode input', async () => {
77
- const result = await BrowserHashProvider.hashString('🚀 Unicode test 测试');
78
- expect(result).toSucceedAndSatisfy((hash) => {
79
- expect(hash).toMatch(/^[a-f0-9]{64}$/);
80
- });
81
- });
82
- test('fails when crypto.subtle is unavailable', async () => {
83
- const originalCrypto = global.crypto;
84
- // @ts-ignore - Intentionally removing crypto for test
85
- delete global.crypto;
86
- const result = await BrowserHashProvider.hashString('test');
87
- expect(result).toFailWith(/Hash computation failed/);
88
- global.crypto = originalCrypto;
89
- });
90
- test('handles invalid algorithm gracefully', async () => {
91
- const result = await BrowserHashProvider.hashString('test', 'INVALID-ALG');
92
- expect(result).toFailWith(/Hash computation failed/);
93
- });
94
- });
95
- describe('hashParts', () => {
96
- test('hashes multiple parts with default separator', async () => {
97
- const parts = ['part1', 'part2', 'part3'];
98
- const result = await BrowserHashProvider.hashParts(parts);
99
- expect(result).toSucceedAndSatisfy((hash) => {
100
- expect(hash).toMatch(/^[a-f0-9]{64}$/);
101
- });
102
- });
103
- test('hashes multiple parts with custom separator', async () => {
104
- const parts = ['part1', 'part2', 'part3'];
105
- const result1 = await BrowserHashProvider.hashParts(parts, 'SHA-256', '|');
106
- const result2 = await BrowserHashProvider.hashParts(parts, 'SHA-256', ',');
107
- expect(result1).toSucceed();
108
- expect(result2).toSucceed();
109
- if (result1.isSuccess() && result2.isSuccess()) {
110
- expect(result1.value).not.toBe(result2.value);
111
- }
112
- });
113
- test('produces same hash as hashString for joined parts', async () => {
114
- const parts = ['a', 'b', 'c'];
115
- const separator = '-';
116
- const joined = parts.join(separator);
117
- const partsResult = await BrowserHashProvider.hashParts(parts, 'SHA-256', separator);
118
- const stringResult = await BrowserHashProvider.hashString(joined);
119
- expect(partsResult).toSucceed();
120
- expect(stringResult).toSucceed();
121
- if (partsResult.isSuccess() && stringResult.isSuccess()) {
122
- expect(partsResult.value).toBe(stringResult.value);
123
- }
124
- });
125
- test('handles empty array', async () => {
126
- const result = await BrowserHashProvider.hashParts([]);
127
- expect(result).toSucceed();
128
- });
129
- test('handles single part', async () => {
130
- const result = await BrowserHashProvider.hashParts(['single']);
131
- const stringResult = await BrowserHashProvider.hashString('single');
132
- expect(result).toSucceed();
133
- expect(stringResult).toSucceed();
134
- if (result.isSuccess() && stringResult.isSuccess()) {
135
- expect(result.value).toBe(stringResult.value);
136
- }
137
- });
138
- });
139
- });
140
- //# sourceMappingURL=browserHashProvider.test.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"browserHashProvider.test.js","sourceRoot":"","sources":["../../../src/test/unit/browserHashProvider.test.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;GAoBG;AAEH,OAAO,oBAAoB,CAAC;AAC5B,OAAO,EAAE,mBAAmB,EAAE,MAAM,6BAA6B,CAAC;AAElE,QAAQ,CAAC,qBAAqB,EAAE,GAAG,EAAE;IACnC,QAAQ,CAAC,YAAY,EAAE,GAAG,EAAE;QAC1B,IAAI,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;YAC3D,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;YAC5E,MAAM,CAAC,MAAM,CAAC,CAAC,mBAAmB,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1C,MAAM,CAAC,OAAO,IAAI,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBACnC,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC,qCAAqC;YAC/E,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;YACzD,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;YAC1E,MAAM,CAAC,MAAM,CAAC,CAAC,mBAAmB,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1C,MAAM,CAAC,OAAO,IAAI,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBACnC,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC,mCAAmC;YAC7E,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;YAC3D,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;YAC5E,MAAM,CAAC,MAAM,CAAC,CAAC,mBAAmB,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1C,MAAM,CAAC,OAAO,IAAI,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBACnC,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC,sCAAsC;YACjF,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,mCAAmC,EAAE,KAAK,IAAI,EAAE;YACnD,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;YACjE,MAAM,CAAC,MAAM,CAAC,CAAC,mBAAmB,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1C,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC,qCAAqC;YAC/E,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;YACzD,MAAM,KAAK,GAAG,kBAAkB,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;YAC5D,MAAM,OAAO,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;YAC5D,MAAM,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5B,MAAM,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5B,IAAI,OAAO,CAAC,SAAS,EAAE,IAAI,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC;gBAC/C,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;YAC5C,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;YAChE,MAAM,OAAO,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;YAC/D,MAAM,OAAO,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;YAC/D,MAAM,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5B,MAAM,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5B,IAAI,OAAO,CAAC,SAAS,EAAE,IAAI,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC;gBAC/C,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;YAChD,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,4BAA4B,EAAE,KAAK,IAAI,EAAE;YAC5C,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;YACxD,MAAM,CAAC,MAAM,CAAC,CAAC,SAAS,EAAE,CAAC;QAC7B,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,uBAAuB,EAAE,KAAK,IAAI,EAAE;YACvC,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,oBAAoB,CAAC,CAAC;YAC1E,MAAM,CAAC,MAAM,CAAC,CAAC,mBAAmB,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1C,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;YACzC,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;YACzD,MAAM,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC;YACrC,sDAAsD;YACtD,OAAO,MAAM,CAAC,MAAM,CAAC;YACrB,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;YAC5D,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC,yBAAyB,CAAC,CAAC;YACrD,MAAM,CAAC,MAAM,GAAG,cAAc,CAAC;QACjC,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,sCAAsC,EAAE,KAAK,IAAI,EAAE;YACtD,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;YAC3E,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC,yBAAyB,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,WAAW,EAAE,GAAG,EAAE;QACzB,IAAI,CAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC9D,MAAM,KAAK,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC;YAC1C,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YAC1D,MAAM,CAAC,MAAM,CAAC,CAAC,mBAAmB,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1C,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;YACzC,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;YAC7D,MAAM,KAAK,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC;YAC1C,MAAM,OAAO,GAAG,MAAM,mBAAmB,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,EAAE,GAAG,CAAC,CAAC;YAC3E,MAAM,OAAO,GAAG,MAAM,mBAAmB,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,EAAE,GAAG,CAAC,CAAC;YAC3E,MAAM,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5B,MAAM,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5B,IAAI,OAAO,CAAC,SAAS,EAAE,IAAI,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC;gBAC/C,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;YAChD,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,mDAAmD,EAAE,KAAK,IAAI,EAAE;YACnE,MAAM,KAAK,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC;YAC9B,MAAM,SAAS,GAAG,GAAG,CAAC;YACtB,MAAM,MAAM,GAAG,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrC,MAAM,WAAW,GAAG,MAAM,mBAAmB,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,EAAE,SAAS,CAAC,CAAC;YACrF,MAAM,YAAY,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;YAClE,MAAM,CAAC,WAAW,CAAC,CAAC,SAAS,EAAE,CAAC;YAChC,MAAM,CAAC,YAAY,CAAC,CAAC,SAAS,EAAE,CAAC;YACjC,IAAI,WAAW,CAAC,SAAS,EAAE,IAAI,YAAY,CAAC,SAAS,EAAE,EAAE,CAAC;gBACxD,MAAM,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC;YACrD,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,qBAAqB,EAAE,KAAK,IAAI,EAAE;YACrC,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;YACvD,MAAM,CAAC,MAAM,CAAC,CAAC,SAAS,EAAE,CAAC;QAC7B,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,qBAAqB,EAAE,KAAK,IAAI,EAAE;YACrC,MAAM,MAAM,GAAG,MAAM,mBAAmB,CAAC,SAAS,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YAC/D,MAAM,YAAY,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;YACpE,MAAM,CAAC,MAAM,CAAC,CAAC,SAAS,EAAE,CAAC;YAC3B,MAAM,CAAC,YAAY,CAAC,CAAC,SAAS,EAAE,CAAC;YACjC,IAAI,MAAM,CAAC,SAAS,EAAE,IAAI,YAAY,CAAC,SAAS,EAAE,EAAE,CAAC;gBACnD,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC;YAChD,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["/*\n * Copyright (c) 2025 Erik Fortune\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell\n * copies of the Software, and to permit persons to whom the Software is\n * furnished to do so, subject to the following conditions:\n *\n * The above copyright notice and this permission notice shall be included in all\n * copies or substantial portions of the Software.\n *\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\n * SOFTWARE.\n */\n\nimport '@fgv/ts-utils-jest';\nimport { BrowserHashProvider } from '../../packlets/crypto-utils';\n\ndescribe('BrowserHashProvider', () => {\n describe('hashString', () => {\n test('successfully hashes a string with SHA-256', async () => {\n const result = await BrowserHashProvider.hashString('test data', 'SHA-256');\n expect(result).toSucceedAndSatisfy((hash) => {\n expect(typeof hash).toBe('string');\n expect(hash).toMatch(/^[a-f0-9]{64}$/); // SHA-256 produces 64 hex characters\n });\n });\n\n test('successfully hashes a string with SHA-1', async () => {\n const result = await BrowserHashProvider.hashString('test data', 'SHA-1');\n expect(result).toSucceedAndSatisfy((hash) => {\n expect(typeof hash).toBe('string');\n expect(hash).toMatch(/^[a-f0-9]{40}$/); // SHA-1 produces 40 hex characters\n });\n });\n\n test('successfully hashes a string with SHA-512', async () => {\n const result = await BrowserHashProvider.hashString('test data', 'SHA-512');\n expect(result).toSucceedAndSatisfy((hash) => {\n expect(typeof hash).toBe('string');\n expect(hash).toMatch(/^[a-f0-9]{128}$/); // SHA-512 produces 128 hex characters\n });\n });\n\n test('uses SHA-256 as default algorithm', async () => {\n const result = await BrowserHashProvider.hashString('test data');\n expect(result).toSucceedAndSatisfy((hash) => {\n expect(hash).toMatch(/^[a-f0-9]{64}$/); // SHA-256 produces 64 hex characters\n });\n });\n\n test('produces consistent hash for same input', async () => {\n const input = 'consistent input';\n const result1 = await BrowserHashProvider.hashString(input);\n const result2 = await BrowserHashProvider.hashString(input);\n expect(result1).toSucceed();\n expect(result2).toSucceed();\n if (result1.isSuccess() && result2.isSuccess()) {\n expect(result1.value).toBe(result2.value);\n }\n });\n\n test('produces different hashes for different inputs', async () => {\n const result1 = await BrowserHashProvider.hashString('input1');\n const result2 = await BrowserHashProvider.hashString('input2');\n expect(result1).toSucceed();\n expect(result2).toSucceed();\n if (result1.isSuccess() && result2.isSuccess()) {\n expect(result1.value).not.toBe(result2.value);\n }\n });\n\n test('handles empty string input', async () => {\n const result = await BrowserHashProvider.hashString('');\n expect(result).toSucceed();\n });\n\n test('handles unicode input', async () => {\n const result = await BrowserHashProvider.hashString('🚀 Unicode test 测试');\n expect(result).toSucceedAndSatisfy((hash) => {\n expect(hash).toMatch(/^[a-f0-9]{64}$/);\n });\n });\n\n test('fails when crypto.subtle is unavailable', async () => {\n const originalCrypto = global.crypto;\n // @ts-ignore - Intentionally removing crypto for test\n delete global.crypto;\n const result = await BrowserHashProvider.hashString('test');\n expect(result).toFailWith(/Hash computation failed/);\n global.crypto = originalCrypto;\n });\n\n test('handles invalid algorithm gracefully', async () => {\n const result = await BrowserHashProvider.hashString('test', 'INVALID-ALG');\n expect(result).toFailWith(/Hash computation failed/);\n });\n });\n\n describe('hashParts', () => {\n test('hashes multiple parts with default separator', async () => {\n const parts = ['part1', 'part2', 'part3'];\n const result = await BrowserHashProvider.hashParts(parts);\n expect(result).toSucceedAndSatisfy((hash) => {\n expect(hash).toMatch(/^[a-f0-9]{64}$/);\n });\n });\n\n test('hashes multiple parts with custom separator', async () => {\n const parts = ['part1', 'part2', 'part3'];\n const result1 = await BrowserHashProvider.hashParts(parts, 'SHA-256', '|');\n const result2 = await BrowserHashProvider.hashParts(parts, 'SHA-256', ',');\n expect(result1).toSucceed();\n expect(result2).toSucceed();\n if (result1.isSuccess() && result2.isSuccess()) {\n expect(result1.value).not.toBe(result2.value);\n }\n });\n\n test('produces same hash as hashString for joined parts', async () => {\n const parts = ['a', 'b', 'c'];\n const separator = '-';\n const joined = parts.join(separator);\n const partsResult = await BrowserHashProvider.hashParts(parts, 'SHA-256', separator);\n const stringResult = await BrowserHashProvider.hashString(joined);\n expect(partsResult).toSucceed();\n expect(stringResult).toSucceed();\n if (partsResult.isSuccess() && stringResult.isSuccess()) {\n expect(partsResult.value).toBe(stringResult.value);\n }\n });\n\n test('handles empty array', async () => {\n const result = await BrowserHashProvider.hashParts([]);\n expect(result).toSucceed();\n });\n\n test('handles single part', async () => {\n const result = await BrowserHashProvider.hashParts(['single']);\n const stringResult = await BrowserHashProvider.hashString('single');\n expect(result).toSucceed();\n expect(stringResult).toSucceed();\n if (result.isSuccess() && stringResult.isSuccess()) {\n expect(result.value).toBe(stringResult.value);\n }\n });\n });\n});\n"]}