@hashgraphonline/standards-sdk 0.1.180 → 0.1.182

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (177) hide show
  1. package/dist/browser/services/registry-broker/client/base-client.d.ts +8 -2
  2. package/dist/browser/services/registry-broker/client/base-client.d.ts.map +1 -1
  3. package/dist/browser/services/registry-broker/client/chat.d.ts +9 -3
  4. package/dist/browser/services/registry-broker/client/chat.d.ts.map +1 -1
  5. package/dist/browser/services/registry-broker/client/guard.d.ts.map +1 -1
  6. package/dist/browser/services/registry-broker/schemas.d.ts +471 -108
  7. package/dist/browser/services/registry-broker/schemas.d.ts.map +1 -1
  8. package/dist/browser/services/registry-broker/types.d.ts +25 -1
  9. package/dist/browser/services/registry-broker/types.d.ts.map +1 -1
  10. package/dist/browser/standards-sdk.browser.js +141 -3
  11. package/dist/browser/standards-sdk.browser.js.map +1 -1
  12. package/dist/browser-root/services/registry-broker/client/base-client.d.ts +8 -2
  13. package/dist/browser-root/services/registry-broker/client/base-client.d.ts.map +1 -1
  14. package/dist/browser-root/services/registry-broker/client/chat.d.ts +9 -3
  15. package/dist/browser-root/services/registry-broker/client/chat.d.ts.map +1 -1
  16. package/dist/browser-root/services/registry-broker/client/guard.d.ts.map +1 -1
  17. package/dist/browser-root/services/registry-broker/schemas.d.ts +471 -108
  18. package/dist/browser-root/services/registry-broker/schemas.d.ts.map +1 -1
  19. package/dist/browser-root/services/registry-broker/types.d.ts +25 -1
  20. package/dist/browser-root/services/registry-broker/types.d.ts.map +1 -1
  21. package/dist/browser-root/standards-sdk.root-browser.js +653 -110
  22. package/dist/browser-root/standards-sdk.root-browser.js.map +1 -1
  23. package/dist/cjs/services/registry-broker/client/base-client.d.ts +8 -2
  24. package/dist/cjs/services/registry-broker/client/base-client.d.ts.map +1 -1
  25. package/dist/cjs/services/registry-broker/client/chat.d.ts +9 -3
  26. package/dist/cjs/services/registry-broker/client/chat.d.ts.map +1 -1
  27. package/dist/cjs/services/registry-broker/client/guard.d.ts.map +1 -1
  28. package/dist/cjs/services/registry-broker/schemas.d.ts +587 -224
  29. package/dist/cjs/services/registry-broker/schemas.d.ts.map +1 -1
  30. package/dist/cjs/services/registry-broker/types.d.ts +25 -1
  31. package/dist/cjs/services/registry-broker/types.d.ts.map +1 -1
  32. package/dist/cjs/standards-sdk.cjs +1 -1
  33. package/dist/cjs/standards-sdk.cjs.map +1 -1
  34. package/dist/es/services/registry-broker/client/base-client.d.ts +8 -2
  35. package/dist/es/services/registry-broker/client/base-client.d.ts.map +1 -1
  36. package/dist/es/services/registry-broker/client/chat.d.ts +9 -3
  37. package/dist/es/services/registry-broker/client/chat.d.ts.map +1 -1
  38. package/dist/es/services/registry-broker/client/guard.d.ts.map +1 -1
  39. package/dist/es/services/registry-broker/schemas.d.ts +587 -224
  40. package/dist/es/services/registry-broker/schemas.d.ts.map +1 -1
  41. package/dist/es/services/registry-broker/types.d.ts +25 -1
  42. package/dist/es/services/registry-broker/types.d.ts.map +1 -1
  43. package/dist/es/standards-sdk.es.js +10 -7
  44. package/dist/es/standards-sdk.es.js.map +1 -1
  45. package/dist/es/standards-sdk.es104.js +1 -1
  46. package/dist/es/standards-sdk.es106.js +1 -1
  47. package/dist/es/standards-sdk.es108.js +1 -1
  48. package/dist/es/standards-sdk.es11.js +1 -1
  49. package/dist/es/standards-sdk.es110.js +1 -1
  50. package/dist/es/standards-sdk.es116.js +2 -2
  51. package/dist/es/standards-sdk.es12.js +1 -1
  52. package/dist/es/standards-sdk.es121.js +1 -1
  53. package/dist/es/standards-sdk.es127.js +2 -2
  54. package/dist/es/standards-sdk.es128.js +5 -5
  55. package/dist/es/standards-sdk.es138.js +1 -1
  56. package/dist/es/standards-sdk.es139.js +1 -1
  57. package/dist/es/standards-sdk.es140.js +5 -5
  58. package/dist/es/standards-sdk.es142.js +3 -3
  59. package/dist/es/standards-sdk.es143.js +1 -1
  60. package/dist/es/standards-sdk.es145.js +53 -15
  61. package/dist/es/standards-sdk.es145.js.map +1 -1
  62. package/dist/es/standards-sdk.es147.js +3 -3
  63. package/dist/es/standards-sdk.es148.js +4 -81
  64. package/dist/es/standards-sdk.es148.js.map +1 -1
  65. package/dist/es/standards-sdk.es149.js +71 -77
  66. package/dist/es/standards-sdk.es149.js.map +1 -1
  67. package/dist/es/standards-sdk.es150.js +80 -53
  68. package/dist/es/standards-sdk.es150.js.map +1 -1
  69. package/dist/es/standards-sdk.es151.js +53 -152
  70. package/dist/es/standards-sdk.es151.js.map +1 -1
  71. package/dist/es/standards-sdk.es152.js +159 -7
  72. package/dist/es/standards-sdk.es152.js.map +1 -1
  73. package/dist/es/standards-sdk.es153.js +7 -86
  74. package/dist/es/standards-sdk.es153.js.map +1 -1
  75. package/dist/es/standards-sdk.es154.js +64 -43
  76. package/dist/es/standards-sdk.es154.js.map +1 -1
  77. package/dist/es/standards-sdk.es155.js +65 -30
  78. package/dist/es/standards-sdk.es155.js.map +1 -1
  79. package/dist/es/standards-sdk.es156.js +30 -34
  80. package/dist/es/standards-sdk.es156.js.map +1 -1
  81. package/dist/es/standards-sdk.es157.js +34 -48
  82. package/dist/es/standards-sdk.es157.js.map +1 -1
  83. package/dist/es/standards-sdk.es158.js +48 -138
  84. package/dist/es/standards-sdk.es158.js.map +1 -1
  85. package/dist/es/standards-sdk.es159.js +133 -37
  86. package/dist/es/standards-sdk.es159.js.map +1 -1
  87. package/dist/es/standards-sdk.es16.js +2 -2
  88. package/dist/es/standards-sdk.es160.js +42 -2352
  89. package/dist/es/standards-sdk.es160.js.map +1 -1
  90. package/dist/es/standards-sdk.es161.js +2488 -12476
  91. package/dist/es/standards-sdk.es161.js.map +1 -1
  92. package/dist/es/standards-sdk.es162.js +12425 -615
  93. package/dist/es/standards-sdk.es162.js.map +1 -1
  94. package/dist/es/standards-sdk.es163.js +15 -54
  95. package/dist/es/standards-sdk.es163.js.map +1 -1
  96. package/dist/es/standards-sdk.es164.js +47 -102
  97. package/dist/es/standards-sdk.es164.js.map +1 -1
  98. package/dist/es/standards-sdk.es165.js +94 -64
  99. package/dist/es/standards-sdk.es165.js.map +1 -1
  100. package/dist/es/standards-sdk.es166.js +61 -180
  101. package/dist/es/standards-sdk.es166.js.map +1 -1
  102. package/dist/es/standards-sdk.es167.js +197 -14
  103. package/dist/es/standards-sdk.es167.js.map +1 -1
  104. package/dist/es/standards-sdk.es168.js +165 -66
  105. package/dist/es/standards-sdk.es168.js.map +1 -1
  106. package/dist/es/standards-sdk.es169.js +289 -139
  107. package/dist/es/standards-sdk.es169.js.map +1 -1
  108. package/dist/es/standards-sdk.es170.js +298 -274
  109. package/dist/es/standards-sdk.es170.js.map +1 -1
  110. package/dist/es/standards-sdk.es171.js +369 -262
  111. package/dist/es/standards-sdk.es171.js.map +1 -1
  112. package/dist/es/standards-sdk.es172.js +194 -316
  113. package/dist/es/standards-sdk.es172.js.map +1 -1
  114. package/dist/es/standards-sdk.es173.js +64 -319
  115. package/dist/es/standards-sdk.es173.js.map +1 -1
  116. package/dist/es/standards-sdk.es174.js +664 -68
  117. package/dist/es/standards-sdk.es174.js.map +1 -1
  118. package/dist/es/standards-sdk.es175.js +60 -126
  119. package/dist/es/standards-sdk.es175.js.map +1 -1
  120. package/dist/es/standards-sdk.es176.js +111 -303
  121. package/dist/es/standards-sdk.es176.js.map +1 -1
  122. package/dist/es/standards-sdk.es177.js +457 -222
  123. package/dist/es/standards-sdk.es177.js.map +1 -1
  124. package/dist/es/standards-sdk.es178.js +239 -176
  125. package/dist/es/standards-sdk.es178.js.map +1 -1
  126. package/dist/es/standards-sdk.es179.js +178 -101
  127. package/dist/es/standards-sdk.es179.js.map +1 -1
  128. package/dist/es/standards-sdk.es18.js +5 -5
  129. package/dist/es/standards-sdk.es180.js +75 -108
  130. package/dist/es/standards-sdk.es180.js.map +1 -1
  131. package/dist/es/standards-sdk.es181.js +116 -148
  132. package/dist/es/standards-sdk.es181.js.map +1 -1
  133. package/dist/es/standards-sdk.es182.js +143 -439
  134. package/dist/es/standards-sdk.es182.js.map +1 -1
  135. package/dist/es/standards-sdk.es183.js +661 -162
  136. package/dist/es/standards-sdk.es183.js.map +1 -1
  137. package/dist/es/standards-sdk.es184.js +156 -206
  138. package/dist/es/standards-sdk.es184.js.map +1 -1
  139. package/dist/es/standards-sdk.es185.js +219 -223
  140. package/dist/es/standards-sdk.es185.js.map +1 -1
  141. package/dist/es/standards-sdk.es186.js +242 -0
  142. package/dist/es/standards-sdk.es186.js.map +1 -0
  143. package/dist/es/standards-sdk.es19.js +3 -3
  144. package/dist/es/standards-sdk.es22.js +1 -1
  145. package/dist/es/standards-sdk.es27.js +5 -5
  146. package/dist/es/standards-sdk.es30.js +1 -1
  147. package/dist/es/standards-sdk.es31.js +1 -1
  148. package/dist/es/standards-sdk.es35.js +2 -2
  149. package/dist/es/standards-sdk.es36.js +3 -3
  150. package/dist/es/standards-sdk.es37.js +1 -1
  151. package/dist/es/standards-sdk.es4.js +1 -1
  152. package/dist/es/standards-sdk.es53.js +1 -1
  153. package/dist/es/standards-sdk.es56.js +1 -1
  154. package/dist/es/standards-sdk.es59.js +1 -1
  155. package/dist/es/standards-sdk.es60.js +1 -1
  156. package/dist/es/standards-sdk.es62.js +1 -1
  157. package/dist/es/standards-sdk.es63.js +2 -2
  158. package/dist/es/standards-sdk.es64.js +1 -1
  159. package/dist/es/standards-sdk.es65.js +1 -1
  160. package/dist/es/standards-sdk.es66.js +1 -1
  161. package/dist/es/standards-sdk.es67.js +3 -3
  162. package/dist/es/standards-sdk.es69.js +1 -1
  163. package/dist/es/standards-sdk.es7.js +1 -1
  164. package/dist/es/standards-sdk.es71.js +1 -1
  165. package/dist/es/standards-sdk.es72.js +2 -2
  166. package/dist/es/standards-sdk.es75.js +3 -3
  167. package/dist/es/standards-sdk.es76.js +1 -1
  168. package/dist/es/standards-sdk.es78.js +1 -1
  169. package/dist/es/standards-sdk.es83.js +1 -1
  170. package/dist/es/standards-sdk.es84.js +2 -2
  171. package/dist/es/standards-sdk.es85.js +1 -1
  172. package/dist/es/standards-sdk.es88.js +1 -1
  173. package/dist/es/standards-sdk.es90.js +1 -1
  174. package/dist/es/standards-sdk.es94.js +3 -3
  175. package/dist/es/standards-sdk.es98.js +1 -1
  176. package/dist/es/standards-sdk.es99.js +1 -1
  177. package/package.json +1 -1
@@ -1,262 +1,497 @@
1
- class EncryptionUnavailableError extends Error {
2
- constructor(sessionId, summary) {
3
- super("Encryption is not enabled for this session");
4
- this.sessionId = sessionId;
5
- this.summary = summary;
1
+ import { createSessionResponseSchema, chatReadinessResponseSchema, chatHistoryCompactionResponseSchema, sessionEncryptionStatusResponseSchema, encryptionHandshakeResponseSchema, sendMessageResponseSchema, chatSessionEndResponseSchema } from "./standards-sdk.es161.js";
2
+ import { serialiseAuthConfig, toJsonObject } from "./standards-sdk.es186.js";
3
+ import { EncryptionUnavailableError } from "./standards-sdk.es178.js";
4
+ function createChatApi(client, encryptedManager) {
5
+ return {
6
+ start: (options) => client.startChat(options),
7
+ readiness: (payload) => client.checkChatReadiness(payload),
8
+ createSession: (payload) => client.createSession(payload),
9
+ sendMessage: (payload) => client.sendMessage(payload),
10
+ retryMessage: (messageId, payload) => client.retryMessage(messageId, payload),
11
+ cancelSession: (sessionId) => client.cancelSession(sessionId),
12
+ endSession: (sessionId) => client.endSession(sessionId),
13
+ getHistory: (sessionId, options) => client.fetchHistorySnapshot(sessionId, options),
14
+ compactHistory: (payload) => client.compactHistory(payload),
15
+ getEncryptionStatus: (sessionId) => client.fetchEncryptionStatus(sessionId),
16
+ submitEncryptionHandshake: (sessionId, payload) => client.postEncryptionHandshake(sessionId, payload),
17
+ startConversation: (options) => client.startConversation(options),
18
+ acceptConversation: (options) => client.acceptConversation(options),
19
+ createEncryptedSession: (options) => encryptedManager.startSession(options),
20
+ acceptEncryptedSession: (options) => encryptedManager.acceptSession(options)
21
+ };
22
+ }
23
+ async function checkChatReadiness(client, payload) {
24
+ const body = {};
25
+ const uaid = "uaid" in payload ? payload.uaid?.trim() : void 0;
26
+ const agentUrl = "agentUrl" in payload ? payload.agentUrl?.trim() : void 0;
27
+ if (!uaid && !agentUrl) {
28
+ throw new Error("uaid or agentUrl is required to check chat readiness");
29
+ }
30
+ if (uaid) {
31
+ body.uaid = uaid;
6
32
  }
33
+ if (agentUrl) {
34
+ body.agentUrl = agentUrl;
35
+ }
36
+ const raw = await client.requestJson("/chat/readiness", {
37
+ method: "POST",
38
+ body,
39
+ headers: { "content-type": "application/json" }
40
+ });
41
+ return client.parseWithSchema(
42
+ raw,
43
+ chatReadinessResponseSchema,
44
+ "chat readiness response"
45
+ );
7
46
  }
8
- class EncryptedChatManager {
9
- constructor(client) {
10
- this.client = client;
47
+ async function createSession(client, payload, allowHistoryAutoTopUp = true) {
48
+ const body = {};
49
+ if ("uaid" in payload && payload.uaid) {
50
+ body.uaid = payload.uaid;
51
+ }
52
+ if ("agentUrl" in payload && payload.agentUrl) {
53
+ body.agentUrl = payload.agentUrl;
54
+ }
55
+ if (payload.auth) {
56
+ body.auth = serialiseAuthConfig(payload.auth);
57
+ }
58
+ if (payload.historyTtlSeconds !== void 0) {
59
+ body.historyTtlSeconds = payload.historyTtlSeconds;
60
+ }
61
+ if (payload.encryptionRequested !== void 0) {
62
+ body.encryptionRequested = payload.encryptionRequested;
11
63
  }
12
- registerConversationContext(context) {
13
- this.client.registerConversationContextForEncryption(context);
64
+ if (payload.senderUaid) {
65
+ body.senderUaid = payload.senderUaid;
14
66
  }
15
- async startSession(options) {
16
- await this.client.encryptionReady();
17
- const session = await this.client.chat.createSession({
67
+ if (payload.visibility) {
68
+ body.visibility = payload.visibility;
69
+ }
70
+ try {
71
+ const raw = await client.requestJson("/chat/session", {
72
+ method: "POST",
73
+ body,
74
+ headers: { "content-type": "application/json" }
75
+ });
76
+ return client.parseWithSchema(
77
+ raw,
78
+ createSessionResponseSchema,
79
+ "chat session response"
80
+ );
81
+ } catch (error) {
82
+ const maybeError = error instanceof Error ? error : null;
83
+ if (allowHistoryAutoTopUp && client.shouldAutoTopUpHistory(payload, maybeError)) {
84
+ await client.executeHistoryAutoTopUp("chat.session");
85
+ return createSession(client, payload, false);
86
+ }
87
+ throw error;
88
+ }
89
+ }
90
+ async function startChat(client, encryptedManager, options) {
91
+ if ("uaid" in options && options.uaid) {
92
+ return startConversation(client, encryptedManager, {
18
93
  uaid: options.uaid,
19
94
  senderUaid: options.senderUaid,
20
- encryptionRequested: true,
21
95
  historyTtlSeconds: options.historyTtlSeconds,
22
- auth: options.auth
96
+ auth: options.auth,
97
+ encryption: options.encryption,
98
+ onSessionCreated: options.onSessionCreated
99
+ });
100
+ }
101
+ if ("agentUrl" in options && options.agentUrl) {
102
+ const session = await createSession(client, {
103
+ agentUrl: options.agentUrl,
104
+ auth: options.auth,
105
+ historyTtlSeconds: options.historyTtlSeconds,
106
+ senderUaid: options.senderUaid
23
107
  });
24
108
  options.onSessionCreated?.(session.sessionId);
25
- const summary = session.encryption;
26
- if (!summary?.enabled) {
27
- throw new EncryptionUnavailableError(
28
- session.sessionId,
29
- session.encryption ?? null
30
- );
31
- }
32
- const handle = await this.establishRequesterContext({
33
- sessionId: session.sessionId,
34
- summary,
109
+ return createPlaintextConversationHandle(
110
+ client,
111
+ session.sessionId,
112
+ session.encryption ?? null,
113
+ options.auth,
114
+ { agentUrl: options.agentUrl, uaid: options.uaid }
115
+ );
116
+ }
117
+ throw new Error("startChat requires either uaid or agentUrl");
118
+ }
119
+ async function startConversation(client, encryptedManager, options) {
120
+ const preference = options.encryption?.preference ?? "preferred";
121
+ const requestEncryption = preference !== "disabled";
122
+ if (!requestEncryption) {
123
+ const session = await createSession(client, {
124
+ uaid: options.uaid,
125
+ auth: options.auth,
126
+ historyTtlSeconds: options.historyTtlSeconds,
127
+ senderUaid: options.senderUaid,
128
+ encryptionRequested: false
129
+ });
130
+ options.onSessionCreated?.(session.sessionId);
131
+ return createPlaintextConversationHandle(
132
+ client,
133
+ session.sessionId,
134
+ session.encryption ?? null,
135
+ options.auth,
136
+ { uaid: options.uaid }
137
+ );
138
+ }
139
+ try {
140
+ const handle = await encryptedManager.startSession({
141
+ uaid: options.uaid,
35
142
  senderUaid: options.senderUaid,
36
- handshakeTimeoutMs: options.handshakeTimeoutMs,
37
- pollIntervalMs: options.pollIntervalMs
143
+ historyTtlSeconds: options.historyTtlSeconds,
144
+ handshakeTimeoutMs: options.encryption?.handshakeTimeoutMs,
145
+ pollIntervalMs: options.encryption?.pollIntervalMs,
146
+ onSessionCreated: (sessionId) => {
147
+ options.onSessionCreated?.(sessionId);
148
+ },
149
+ auth: options.auth
38
150
  });
39
151
  return handle;
152
+ } catch (error) {
153
+ if (error instanceof EncryptionUnavailableError) {
154
+ if (preference === "required") {
155
+ throw error;
156
+ }
157
+ return createPlaintextConversationHandle(
158
+ client,
159
+ error.sessionId,
160
+ error.summary ?? null,
161
+ options.auth,
162
+ { uaid: options.uaid }
163
+ );
164
+ }
165
+ throw error;
40
166
  }
41
- async acceptSession(options) {
42
- await this.client.encryptionReady();
43
- const summary = await this.waitForEncryptionSummary(
44
- options.sessionId,
45
- options.handshakeTimeoutMs,
46
- options.pollIntervalMs
47
- );
48
- const handle = await this.establishResponderContext({
167
+ }
168
+ async function acceptConversation(client, encryptedManager, options) {
169
+ const preference = options.encryption?.preference ?? "preferred";
170
+ if (preference === "disabled") {
171
+ return createPlaintextConversationHandle(client, options.sessionId, null);
172
+ }
173
+ try {
174
+ const handle = await encryptedManager.acceptSession({
49
175
  sessionId: options.sessionId,
50
- summary,
51
176
  responderUaid: options.responderUaid,
52
- handshakeTimeoutMs: options.handshakeTimeoutMs,
53
- pollIntervalMs: options.pollIntervalMs
177
+ handshakeTimeoutMs: options.encryption?.handshakeTimeoutMs,
178
+ pollIntervalMs: options.encryption?.pollIntervalMs
54
179
  });
55
180
  return handle;
56
- }
57
- async establishRequesterContext(params) {
58
- const keyPair = this.client.encryption.generateEphemeralKeyPair();
59
- await this.client.chat.submitEncryptionHandshake(params.sessionId, {
60
- role: "requester",
61
- keyType: "secp256k1",
62
- ephemeralPublicKey: keyPair.publicKey,
63
- uaid: params.senderUaid ?? params.summary.requester?.uaid ?? void 0
64
- });
65
- const { summary, record } = await this.waitForHandshakeCompletion(
66
- params.sessionId,
67
- params.handshakeTimeoutMs,
68
- params.pollIntervalMs
69
- );
70
- const responderKey = record.responder?.ephemeralPublicKey;
71
- if (!responderKey) {
72
- throw new Error("Responder handshake was not completed in time");
181
+ } catch (error) {
182
+ if (error instanceof EncryptionUnavailableError && preference !== "required") {
183
+ return createPlaintextConversationHandle(
184
+ client,
185
+ options.sessionId,
186
+ null,
187
+ void 0,
188
+ { uaid: options.responderUaid }
189
+ );
73
190
  }
74
- const sharedSecret = this.client.encryption.deriveSharedSecret({
75
- privateKey: keyPair.privateKey,
76
- peerPublicKey: responderKey
77
- }).subarray();
78
- const recipients = this.buildRecipients(summary);
79
- return this.createHandle({
80
- sessionId: params.sessionId,
81
- sharedSecret,
82
- summary,
83
- recipients,
84
- identity: summary.requester ?? void 0
85
- });
191
+ throw error;
86
192
  }
87
- async establishResponderContext(params) {
88
- const keyPair = this.client.encryption.generateEphemeralKeyPair();
89
- await this.client.chat.submitEncryptionHandshake(params.sessionId, {
90
- role: "responder",
91
- keyType: "secp256k1",
92
- ephemeralPublicKey: keyPair.publicKey,
93
- uaid: params.responderUaid ?? params.summary.responder?.uaid ?? void 0
94
- });
95
- const { summary, record } = await this.waitForHandshakeCompletion(
96
- params.sessionId,
97
- params.handshakeTimeoutMs,
98
- params.pollIntervalMs
99
- );
100
- const requesterKey = record.requester?.ephemeralPublicKey;
101
- if (!requesterKey) {
102
- throw new Error("Requester handshake was not detected in time");
193
+ }
194
+ function createPlaintextConversationHandle(client, sessionId, summary, defaultAuth, context) {
195
+ const uaid = context?.uaid?.trim();
196
+ const agentUrl = context?.agentUrl?.trim();
197
+ const fetchHistory = async (options) => {
198
+ const snapshot = await client.fetchHistorySnapshot(sessionId, options);
199
+ if (snapshot.decryptedHistory) {
200
+ return snapshot.decryptedHistory;
103
201
  }
104
- const sharedSecret = this.client.encryption.deriveSharedSecret({
105
- privateKey: keyPair.privateKey,
106
- peerPublicKey: requesterKey
107
- }).subarray();
108
- const recipients = this.buildRecipients(summary);
109
- return this.createHandle({
110
- sessionId: params.sessionId,
111
- sharedSecret,
112
- summary,
113
- recipients,
114
- identity: summary.responder ?? void 0
115
- });
116
- }
117
- async waitForHandshakeCompletion(sessionId, timeoutMs = 3e4, pollIntervalMs = 1e3) {
118
- const deadline = Date.now() + timeoutMs;
119
- while (true) {
120
- const status = await this.client.chat.getEncryptionStatus(sessionId);
121
- const summary = status.encryption;
122
- const record = summary?.handshake;
123
- if (summary && record && record.status === "complete") {
124
- return { summary, record };
125
- }
126
- if (Date.now() >= deadline) {
127
- throw new Error("Timed out waiting for encrypted handshake completion");
202
+ return snapshot.history.map((entry) => ({
203
+ entry,
204
+ plaintext: entry.content
205
+ }));
206
+ };
207
+ return {
208
+ sessionId,
209
+ mode: "plaintext",
210
+ summary: summary ?? null,
211
+ send: async (options) => {
212
+ const plaintext = options.plaintext;
213
+ if (!plaintext || plaintext.trim().length === 0) {
214
+ throw new Error("plaintext is required for chat messages");
128
215
  }
129
- await this.delay(pollIntervalMs);
216
+ const message = options.message ?? plaintext;
217
+ return sendMessage(client, {
218
+ sessionId,
219
+ message,
220
+ streaming: options.streaming,
221
+ auth: options.auth ?? defaultAuth,
222
+ uaid,
223
+ agentUrl
224
+ });
225
+ },
226
+ decryptHistoryEntry: (entry) => entry.content,
227
+ fetchHistory
228
+ };
229
+ }
230
+ async function compactHistory(client, payload) {
231
+ if (!payload.sessionId || payload.sessionId.trim().length === 0) {
232
+ throw new Error("sessionId is required to compact chat history");
233
+ }
234
+ const body = {};
235
+ if (typeof payload.preserveEntries === "number" && Number.isFinite(payload.preserveEntries) && payload.preserveEntries >= 0) {
236
+ body.preserveEntries = Math.floor(payload.preserveEntries);
237
+ }
238
+ const raw = await client.requestJson(
239
+ `/chat/session/${encodeURIComponent(payload.sessionId)}/compact`,
240
+ {
241
+ method: "POST",
242
+ headers: { "content-type": "application/json" },
243
+ body
130
244
  }
245
+ );
246
+ return client.parseWithSchema(
247
+ raw,
248
+ chatHistoryCompactionResponseSchema,
249
+ "chat history compaction response"
250
+ );
251
+ }
252
+ async function fetchEncryptionStatus(client, sessionId) {
253
+ if (!sessionId || sessionId.trim().length === 0) {
254
+ throw new Error("sessionId is required for encryption status");
131
255
  }
132
- async waitForEncryptionSummary(sessionId, _timeoutMs = 3e4, _pollIntervalMs = 1e3) {
133
- const status = await this.client.chat.getEncryptionStatus(sessionId);
134
- if (!status.encryption?.enabled) {
135
- throw new EncryptionUnavailableError(
136
- sessionId,
137
- status.encryption ?? null
138
- );
256
+ const raw = await client.requestJson(
257
+ `/chat/session/${encodeURIComponent(sessionId)}/encryption`,
258
+ {
259
+ method: "GET"
139
260
  }
140
- return status.encryption;
261
+ );
262
+ return client.parseWithSchema(
263
+ raw,
264
+ sessionEncryptionStatusResponseSchema,
265
+ "session encryption status response"
266
+ );
267
+ }
268
+ async function postEncryptionHandshake(client, sessionId, payload) {
269
+ if (!sessionId || sessionId.trim().length === 0) {
270
+ throw new Error("sessionId is required for encryption handshake");
141
271
  }
142
- buildRecipients(summary) {
143
- const candidates = [summary.requester, summary.responder].filter(Boolean);
144
- const normalized = candidates.map((candidate) => {
145
- if (!candidate) {
146
- return null;
147
- }
148
- const recipient = {};
149
- if (candidate.uaid) {
150
- recipient.uaid = candidate.uaid;
151
- }
152
- if (candidate.ledgerAccountId) {
153
- recipient.ledgerAccountId = candidate.ledgerAccountId;
272
+ const raw = await client.requestJson(
273
+ `/chat/session/${encodeURIComponent(sessionId)}/encryption-handshake`,
274
+ {
275
+ method: "POST",
276
+ headers: { "content-type": "application/json" },
277
+ body: {
278
+ role: payload.role,
279
+ keyType: payload.keyType,
280
+ ephemeralPublicKey: payload.ephemeralPublicKey,
281
+ longTermPublicKey: payload.longTermPublicKey,
282
+ signature: payload.signature,
283
+ uaid: payload.uaid,
284
+ userId: payload.userId,
285
+ ledgerAccountId: payload.ledgerAccountId,
286
+ metadata: payload.metadata
154
287
  }
155
- if (candidate.userId) {
156
- recipient.userId = candidate.userId;
157
- }
158
- if (candidate.email) {
159
- recipient.email = candidate.email;
160
- }
161
- return recipient;
162
- }).filter(
163
- (entry) => Boolean(
164
- entry?.uaid || entry?.ledgerAccountId || entry?.userId || entry?.email
165
- )
166
- );
167
- if (normalized.length > 0) {
168
- return normalized;
169
- }
170
- if (summary.responder?.uaid) {
171
- return [{ uaid: summary.responder.uaid }];
172
288
  }
173
- return [];
174
- }
175
- createHandle(context) {
176
- const sharedSecret = context.sharedSecret;
177
- const uaid = context.summary.requester?.uaid ?? context.summary.responder?.uaid ?? context.identity?.uaid;
178
- const decryptHistoryEntry = (entry) => this.decryptEntry(entry, context.identity, sharedSecret);
179
- const fetchHistory = async (options) => {
180
- const snapshot = await this.client.fetchHistorySnapshot(
181
- context.sessionId,
182
- options
289
+ );
290
+ const response = client.parseWithSchema(
291
+ raw,
292
+ encryptionHandshakeResponseSchema,
293
+ "encryption handshake response"
294
+ );
295
+ return response.handshake;
296
+ }
297
+ async function sendMessage(client, payload) {
298
+ const body = {
299
+ message: payload.message
300
+ };
301
+ if (payload.streaming !== void 0) {
302
+ body.streaming = payload.streaming;
303
+ }
304
+ if (payload.idempotencyKey) {
305
+ body.idempotencyKey = payload.idempotencyKey;
306
+ }
307
+ if (payload.senderUaid) {
308
+ body.senderUaid = payload.senderUaid;
309
+ }
310
+ if (payload.transport) {
311
+ body.transport = payload.transport;
312
+ }
313
+ if (payload.auth) {
314
+ body.auth = serialiseAuthConfig(payload.auth);
315
+ }
316
+ if ("uaid" in payload) {
317
+ body.uaid = payload.uaid;
318
+ }
319
+ if ("sessionId" in payload && payload.sessionId) {
320
+ body.sessionId = payload.sessionId;
321
+ }
322
+ if ("agentUrl" in payload && payload.agentUrl) {
323
+ body.agentUrl = payload.agentUrl;
324
+ }
325
+ let cipherEnvelope = payload.cipherEnvelope ?? null;
326
+ if (payload.encryption) {
327
+ const sessionIdForEncryption = payload.encryption.sessionId ?? (typeof body.sessionId === "string" ? body.sessionId : void 0);
328
+ if (!sessionIdForEncryption) {
329
+ throw new Error(
330
+ "sessionId is required when using encrypted chat payloads"
183
331
  );
184
- if (snapshot.decryptedHistory) {
185
- return snapshot.decryptedHistory;
186
- }
187
- return snapshot.history.map((entry) => ({
188
- entry,
189
- plaintext: decryptHistoryEntry(entry)
190
- }));
332
+ }
333
+ if (!payload.encryption.recipients?.length) {
334
+ throw new Error("recipients are required for encrypted chat payloads");
335
+ }
336
+ cipherEnvelope = client.encryption.encryptCipherEnvelope({
337
+ ...payload.encryption,
338
+ sessionId: sessionIdForEncryption
339
+ });
340
+ }
341
+ if (cipherEnvelope) {
342
+ body.cipherEnvelope = toJsonObject(cipherEnvelope);
343
+ }
344
+ const raw = await client.requestJson("/chat/message", {
345
+ method: "POST",
346
+ body,
347
+ headers: { "content-type": "application/json" }
348
+ });
349
+ return client.parseWithSchema(
350
+ raw,
351
+ sendMessageResponseSchema,
352
+ "chat message response"
353
+ );
354
+ }
355
+ async function endSession(client, sessionId) {
356
+ const normalizedSessionId = sessionId?.trim();
357
+ if (!normalizedSessionId) {
358
+ throw new Error("sessionId is required to end a chat session");
359
+ }
360
+ const response = await client.request(
361
+ `/chat/session/${encodeURIComponent(normalizedSessionId)}`,
362
+ { method: "DELETE" }
363
+ );
364
+ if (response.status === 204) {
365
+ return {
366
+ message: "Session ended",
367
+ sessionId: normalizedSessionId,
368
+ state: "ended"
191
369
  };
192
- const handle = {
193
- sessionId: context.sessionId,
194
- mode: "encrypted",
195
- summary: context.summary,
196
- send: async (options) => {
197
- const recipients = options.recipients ?? context.recipients;
198
- return this.client.chat.sendMessage({
199
- sessionId: context.sessionId,
200
- message: options.message ?? "[ciphertext omitted]",
201
- streaming: options.streaming,
202
- auth: options.auth,
203
- uaid,
204
- encryption: {
205
- plaintext: options.plaintext,
206
- sharedSecret: Buffer.from(sharedSecret),
207
- recipients
208
- }
209
- });
210
- },
211
- decryptHistoryEntry,
212
- fetchHistory
370
+ }
371
+ const contentType = response.headers?.get("content-type") ?? "";
372
+ if (!contentType.toLowerCase().includes("json")) {
373
+ await response.text();
374
+ return {
375
+ message: "Session ended",
376
+ sessionId: normalizedSessionId,
377
+ state: "ended"
213
378
  };
214
- this.registerConversationContext({
215
- sessionId: context.sessionId,
216
- sharedSecret,
217
- identity: context.identity
218
- });
219
- return handle;
220
379
  }
221
- decryptEntry(entry, identity, fallbackSecret) {
222
- const envelope = entry.cipherEnvelope;
223
- if (!envelope) {
224
- return null;
225
- }
226
- const secret = Buffer.from(fallbackSecret);
227
- try {
228
- return this.client.encryption.decryptCipherEnvelope({
229
- envelope,
230
- sharedSecret: secret
231
- });
232
- } catch (_error) {
233
- return null;
234
- }
380
+ const responseBody = await response.text();
381
+ if (responseBody.trim().length === 0) {
382
+ return {
383
+ message: "Session ended",
384
+ sessionId: normalizedSessionId,
385
+ state: "ended"
386
+ };
235
387
  }
236
- recipientMatches(candidate, target) {
237
- if (target.uaid && candidate.uaid?.toLowerCase() === target.uaid.toLowerCase()) {
238
- return true;
239
- }
240
- if (target.ledgerAccountId && candidate.ledgerAccountId?.toLowerCase() === target.ledgerAccountId.toLowerCase()) {
241
- return true;
242
- }
243
- if (target.userId && candidate.userId === target.userId) {
244
- return true;
245
- }
246
- if (target.email && candidate.email?.toLowerCase() === target.email.toLowerCase()) {
247
- return true;
388
+ const raw = JSON.parse(responseBody);
389
+ return client.parseWithSchema(
390
+ raw,
391
+ chatSessionEndResponseSchema,
392
+ "chat session end response"
393
+ );
394
+ }
395
+ async function cancelSession(client, sessionId) {
396
+ const normalizedSessionId = sessionId?.trim();
397
+ if (!normalizedSessionId) {
398
+ throw new Error("sessionId is required to cancel a chat session");
399
+ }
400
+ const raw = await client.requestJson(
401
+ `/chat/session/${encodeURIComponent(normalizedSessionId)}/cancel`,
402
+ {
403
+ method: "POST"
248
404
  }
249
- return false;
405
+ );
406
+ return client.parseWithSchema(
407
+ raw,
408
+ chatSessionEndResponseSchema,
409
+ "chat session cancel response"
410
+ );
411
+ }
412
+ async function retryMessage(client, messageId, payload) {
413
+ const normalizedMessageId = messageId?.trim();
414
+ const normalizedSessionId = payload.sessionId?.trim();
415
+ const normalizedMessage = payload.message?.trim();
416
+ if (!normalizedMessageId) {
417
+ throw new Error("messageId is required to retry a message");
418
+ }
419
+ if (!normalizedSessionId) {
420
+ throw new Error("sessionId is required to retry a message");
421
+ }
422
+ if (!normalizedMessage) {
423
+ throw new Error("message is required to retry a message");
424
+ }
425
+ const body = {
426
+ sessionId: normalizedSessionId,
427
+ message: payload.message
428
+ };
429
+ if (payload.streaming !== void 0) {
430
+ body.streaming = payload.streaming;
431
+ }
432
+ if (payload.transport) {
433
+ body.transport = payload.transport;
434
+ }
435
+ const uaid = payload.uaid?.trim();
436
+ const agentUrl = payload.agentUrl?.trim();
437
+ const idempotencyKey = payload.idempotencyKey?.trim();
438
+ const senderUaid = payload.senderUaid?.trim();
439
+ if (uaid) {
440
+ body.uaid = uaid;
441
+ }
442
+ if (agentUrl) {
443
+ body.agentUrl = agentUrl;
250
444
  }
251
- async delay(ms) {
252
- if (ms <= 0) {
253
- return;
445
+ if (idempotencyKey) {
446
+ body.idempotencyKey = idempotencyKey;
447
+ }
448
+ if (senderUaid) {
449
+ body.senderUaid = senderUaid;
450
+ }
451
+ if (payload.auth) {
452
+ body.auth = serialiseAuthConfig(payload.auth);
453
+ }
454
+ let cipherEnvelope = payload.cipherEnvelope ?? null;
455
+ if (payload.encryption) {
456
+ if (!payload.encryption.recipients?.length) {
457
+ throw new Error("recipients are required for encrypted chat payloads");
254
458
  }
255
- await new Promise((resolve) => setTimeout(resolve, ms));
459
+ cipherEnvelope = client.encryption.encryptCipherEnvelope({
460
+ ...payload.encryption,
461
+ sessionId: payload.encryption.sessionId ?? normalizedSessionId
462
+ });
463
+ }
464
+ if (cipherEnvelope) {
465
+ body.cipherEnvelope = toJsonObject(cipherEnvelope);
256
466
  }
467
+ const raw = await client.requestJson(
468
+ `/chat/message/${encodeURIComponent(normalizedMessageId)}/retry`,
469
+ {
470
+ method: "POST",
471
+ body,
472
+ headers: { "content-type": "application/json" }
473
+ }
474
+ );
475
+ return client.parseWithSchema(
476
+ raw,
477
+ sendMessageResponseSchema,
478
+ "chat retry response"
479
+ );
257
480
  }
258
481
  export {
259
- EncryptedChatManager,
260
- EncryptionUnavailableError
482
+ acceptConversation,
483
+ cancelSession,
484
+ checkChatReadiness,
485
+ compactHistory,
486
+ createChatApi,
487
+ createPlaintextConversationHandle,
488
+ createSession,
489
+ endSession,
490
+ fetchEncryptionStatus,
491
+ postEncryptionHandshake,
492
+ retryMessage,
493
+ sendMessage,
494
+ startChat,
495
+ startConversation
261
496
  };
262
497
  //# sourceMappingURL=standards-sdk.es177.js.map