@ledgerhq/ledger-key-ring-protocol 0.5.1-nightly.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintrc.js +33 -0
- package/.turbo/turbo-build.log +4 -0
- package/.unimportedrc.json +16 -0
- package/CHANGELOG.md +299 -0
- package/LICENSE.txt +21 -0
- package/README.md +3 -0
- package/jest.config.js +13 -0
- package/lib/HWDeviceProvider.d.ts +25 -0
- package/lib/HWDeviceProvider.d.ts.map +1 -0
- package/lib/HWDeviceProvider.js +88 -0
- package/lib/HWDeviceProvider.js.map +1 -0
- package/lib/api.d.ts +77 -0
- package/lib/api.d.ts.map +1 -0
- package/lib/api.js +150 -0
- package/lib/api.js.map +1 -0
- package/lib/auth.d.ts +3 -0
- package/lib/auth.d.ts.map +1 -0
- package/lib/auth.js +79 -0
- package/lib/auth.js.map +1 -0
- package/lib/errors.d.ts +40 -0
- package/lib/errors.d.ts.map +1 -0
- package/lib/errors.js +18 -0
- package/lib/errors.js.map +1 -0
- package/lib/index.d.ts +6 -0
- package/lib/index.d.ts.map +1 -0
- package/lib/index.js +17 -0
- package/lib/index.js.map +1 -0
- package/lib/mockSdk.d.ts +22 -0
- package/lib/mockSdk.d.ts.map +1 -0
- package/lib/mockSdk.js +208 -0
- package/lib/mockSdk.js.map +1 -0
- package/lib/qrcode/cipher.d.ts +12 -0
- package/lib/qrcode/cipher.d.ts.map +1 -0
- package/lib/qrcode/cipher.js +69 -0
- package/lib/qrcode/cipher.js.map +1 -0
- package/lib/qrcode/cipher.test.d.ts +2 -0
- package/lib/qrcode/cipher.test.d.ts.map +1 -0
- package/lib/qrcode/cipher.test.js +40 -0
- package/lib/qrcode/cipher.test.js.map +1 -0
- package/lib/qrcode/index.d.ts +70 -0
- package/lib/qrcode/index.d.ts.map +1 -0
- package/lib/qrcode/index.js +312 -0
- package/lib/qrcode/index.js.map +1 -0
- package/lib/qrcode/index.test.d.ts +2 -0
- package/lib/qrcode/index.test.d.ts.map +1 -0
- package/lib/qrcode/index.test.js +131 -0
- package/lib/qrcode/index.test.js.map +1 -0
- package/lib/qrcode/types.d.ts +69 -0
- package/lib/qrcode/types.d.ts.map +1 -0
- package/lib/qrcode/types.js +3 -0
- package/lib/qrcode/types.js.map +1 -0
- package/lib/sdk.d.ts +31 -0
- package/lib/sdk.d.ts.map +1 -0
- package/lib/sdk.js +380 -0
- package/lib/sdk.js.map +1 -0
- package/lib/store.d.ts +71 -0
- package/lib/store.d.ts.map +1 -0
- package/lib/store.js +62 -0
- package/lib/store.js.map +1 -0
- package/lib/types.d.ts +181 -0
- package/lib/types.d.ts.map +1 -0
- package/lib/types.js +10 -0
- package/lib/types.js.map +1 -0
- package/lib-es/HWDeviceProvider.d.ts +25 -0
- package/lib-es/HWDeviceProvider.d.ts.map +1 -0
- package/lib-es/HWDeviceProvider.js +81 -0
- package/lib-es/HWDeviceProvider.js.map +1 -0
- package/lib-es/api.d.ts +77 -0
- package/lib-es/api.d.ts.map +1 -0
- package/lib-es/api.js +145 -0
- package/lib-es/api.js.map +1 -0
- package/lib-es/auth.d.ts +3 -0
- package/lib-es/auth.d.ts.map +1 -0
- package/lib-es/auth.js +75 -0
- package/lib-es/auth.js.map +1 -0
- package/lib-es/errors.d.ts +40 -0
- package/lib-es/errors.d.ts.map +1 -0
- package/lib-es/errors.js +15 -0
- package/lib-es/errors.js.map +1 -0
- package/lib-es/index.d.ts +6 -0
- package/lib-es/index.d.ts.map +1 -0
- package/lib-es/index.js +13 -0
- package/lib-es/index.js.map +1 -0
- package/lib-es/mockSdk.d.ts +22 -0
- package/lib-es/mockSdk.d.ts.map +1 -0
- package/lib-es/mockSdk.js +201 -0
- package/lib-es/mockSdk.js.map +1 -0
- package/lib-es/qrcode/cipher.d.ts +12 -0
- package/lib-es/qrcode/cipher.d.ts.map +1 -0
- package/lib-es/qrcode/cipher.js +61 -0
- package/lib-es/qrcode/cipher.js.map +1 -0
- package/lib-es/qrcode/cipher.test.d.ts +2 -0
- package/lib-es/qrcode/cipher.test.d.ts.map +1 -0
- package/lib-es/qrcode/cipher.test.js +38 -0
- package/lib-es/qrcode/cipher.test.js.map +1 -0
- package/lib-es/qrcode/index.d.ts +70 -0
- package/lib-es/qrcode/index.d.ts.map +1 -0
- package/lib-es/qrcode/index.js +304 -0
- package/lib-es/qrcode/index.js.map +1 -0
- package/lib-es/qrcode/index.test.d.ts +2 -0
- package/lib-es/qrcode/index.test.d.ts.map +1 -0
- package/lib-es/qrcode/index.test.js +126 -0
- package/lib-es/qrcode/index.test.js.map +1 -0
- package/lib-es/qrcode/types.d.ts +69 -0
- package/lib-es/qrcode/types.d.ts.map +1 -0
- package/lib-es/qrcode/types.js +2 -0
- package/lib-es/qrcode/types.js.map +1 -0
- package/lib-es/sdk.d.ts +31 -0
- package/lib-es/sdk.d.ts.map +1 -0
- package/lib-es/sdk.js +371 -0
- package/lib-es/sdk.js.map +1 -0
- package/lib-es/store.d.ts +71 -0
- package/lib-es/store.d.ts.map +1 -0
- package/lib-es/store.js +51 -0
- package/lib-es/store.js.map +1 -0
- package/lib-es/types.d.ts +181 -0
- package/lib-es/types.d.ts.map +1 -0
- package/lib-es/types.js +7 -0
- package/lib-es/types.js.map +1 -0
- package/mocks/scenarios/addSameMemberMultipleTimes.json +426 -0
- package/mocks/scenarios/create2trustchainInARow.json +616 -0
- package/mocks/scenarios/getOrCreateTransactionCases.json +591 -0
- package/mocks/scenarios/member3implicitlyAdded.json +648 -0
- package/mocks/scenarios/membersManySelfAdd.json +1427 -0
- package/mocks/scenarios/randomMemberTryToDestroy.json +371 -0
- package/mocks/scenarios/removeMemberWithTheWrongSeed.json +510 -0
- package/mocks/scenarios/removedMemberEjectedOnDeletedTrustchain.json +481 -0
- package/mocks/scenarios/removedMemberEjectedOnGetMembers.json +648 -0
- package/mocks/scenarios/removedMemberEjectedOnRestore.json +648 -0
- package/mocks/scenarios/removingAMemberCreatesAnInteraction.json +593 -0
- package/mocks/scenarios/removingYourselfIsForbidden.json +397 -0
- package/mocks/scenarios/success.json +978 -0
- package/mocks/scenarios/tokenExpires.json +371 -0
- package/mocks/scenarios/twoAddMembersFollowedByDeviceAdd.json +705 -0
- package/mocks/scenarios/userRefusesAuth.json +40 -0
- package/mocks/scenarios/userRefusesRemoveMember.json +542 -0
- package/package.json +91 -0
- package/scripts/README.md +15 -0
- package/scripts/e2e.ts +57 -0
- package/src/HWDeviceProvider.ts +105 -0
- package/src/__tests__/integration/mock.sdk.test.ts +47 -0
- package/src/__tests__/integration/sdk.test.ts +20 -0
- package/src/__tests__/tsconfig.json +8 -0
- package/src/__tests__/unit/sdk.test.ts +236 -0
- package/src/api.ts +202 -0
- package/src/auth.ts +81 -0
- package/src/errors.ts +18 -0
- package/src/index.ts +20 -0
- package/src/mockSdk.ts +253 -0
- package/src/qrcode/cipher.test.ts +30 -0
- package/src/qrcode/cipher.ts +63 -0
- package/src/qrcode/index.test.ts +138 -0
- package/src/qrcode/index.ts +395 -0
- package/src/qrcode/types.ts +70 -0
- package/src/sdk.ts +542 -0
- package/src/store.ts +99 -0
- package/src/types.ts +242 -0
- package/tests/scenarios/_template.ts +18 -0
- package/tests/scenarios/addSameMemberMultipleTimes.ts +20 -0
- package/tests/scenarios/create2trustchainInARow.ts +14 -0
- package/tests/scenarios/getOrCreateTransactionCases.ts +74 -0
- package/tests/scenarios/member3implicitlyAdded.ts +51 -0
- package/tests/scenarios/membersManySelfAdd.ts +18 -0
- package/tests/scenarios/randomMemberTryToDestroy.ts +23 -0
- package/tests/scenarios/removeMemberWithTheWrongSeed.ts +28 -0
- package/tests/scenarios/removedMemberEjectedOnDeletedTrustchain.ts +31 -0
- package/tests/scenarios/removedMemberEjectedOnGetMembers.ts +29 -0
- package/tests/scenarios/removedMemberEjectedOnRestore.ts +31 -0
- package/tests/scenarios/removingAMemberCreatesAnInteraction.ts +42 -0
- package/tests/scenarios/removingYourselfIsForbidden.ts +11 -0
- package/tests/scenarios/success.ts +94 -0
- package/tests/scenarios/tokenExpires.ts +20 -0
- package/tests/scenarios/twoAddMembersFollowedByDeviceAdd.ts +49 -0
- package/tests/scenarios/userRefusesAuth.ts +28 -0
- package/tests/scenarios/userRefusesRemoveMember.ts +66 -0
- package/tests/test-helpers/recordTrustchainSdkTests.ts +178 -0
- package/tests/test-helpers/replayTrustchainSdkTests.ts +141 -0
- package/tests/test-helpers/types.ts +45 -0
- package/tests/tsconfig.json +8 -0
- package/tsconfig.json +15 -0
package/lib/api.js
ADDED
|
@@ -0,0 +1,150 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
12
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
13
|
+
};
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
const live_network_1 = __importDefault(require("@ledgerhq/live-network"));
|
|
16
|
+
const getApi = (apiBaseURL) => {
|
|
17
|
+
function getAuthenticationChallenge() {
|
|
18
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
19
|
+
const { data } = yield (0, live_network_1.default)({
|
|
20
|
+
url: `${apiBaseURL}/v1/challenge`,
|
|
21
|
+
method: "GET",
|
|
22
|
+
});
|
|
23
|
+
return data;
|
|
24
|
+
});
|
|
25
|
+
}
|
|
26
|
+
function postChallengeResponse(request) {
|
|
27
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
28
|
+
const { data } = yield (0, live_network_1.default)({
|
|
29
|
+
url: `${apiBaseURL}/v1/authenticate`,
|
|
30
|
+
method: "POST",
|
|
31
|
+
data: request,
|
|
32
|
+
});
|
|
33
|
+
return {
|
|
34
|
+
accessToken: data.access_token,
|
|
35
|
+
permissions: data.permissions,
|
|
36
|
+
};
|
|
37
|
+
});
|
|
38
|
+
}
|
|
39
|
+
function refreshAuth(jwt) {
|
|
40
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
41
|
+
const { data } = yield (0, live_network_1.default)({
|
|
42
|
+
url: `${apiBaseURL}/v1/refresh`,
|
|
43
|
+
method: "GET",
|
|
44
|
+
headers: {
|
|
45
|
+
Authorization: `Bearer ${jwt.accessToken}`,
|
|
46
|
+
},
|
|
47
|
+
});
|
|
48
|
+
return {
|
|
49
|
+
accessToken: data.access_token,
|
|
50
|
+
permissions: data.permissions,
|
|
51
|
+
};
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
function getTrustchains(jwt) {
|
|
55
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
56
|
+
const { data } = yield (0, live_network_1.default)({
|
|
57
|
+
url: `${apiBaseURL}/v1/trustchains`,
|
|
58
|
+
method: "GET",
|
|
59
|
+
headers: {
|
|
60
|
+
Authorization: `Bearer ${jwt.accessToken}`,
|
|
61
|
+
},
|
|
62
|
+
});
|
|
63
|
+
return data;
|
|
64
|
+
});
|
|
65
|
+
}
|
|
66
|
+
function getTrustchain(jwt, trustchain_id) {
|
|
67
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
68
|
+
const { data } = yield (0, live_network_1.default)({
|
|
69
|
+
url: `${apiBaseURL}/v1/trustchain/${trustchain_id}`,
|
|
70
|
+
method: "GET",
|
|
71
|
+
headers: {
|
|
72
|
+
Authorization: `Bearer ${jwt.accessToken}`,
|
|
73
|
+
},
|
|
74
|
+
});
|
|
75
|
+
return data;
|
|
76
|
+
});
|
|
77
|
+
}
|
|
78
|
+
function postDerivation(jwt, trustchain_id, commandStream) {
|
|
79
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
80
|
+
yield (0, live_network_1.default)({
|
|
81
|
+
url: `${apiBaseURL}/v1/trustchain/${trustchain_id}/derivation`,
|
|
82
|
+
method: "POST",
|
|
83
|
+
headers: {
|
|
84
|
+
Authorization: `Bearer ${jwt.accessToken}`,
|
|
85
|
+
"Content-Type": "application/json",
|
|
86
|
+
},
|
|
87
|
+
data: commandStream,
|
|
88
|
+
});
|
|
89
|
+
});
|
|
90
|
+
}
|
|
91
|
+
function postSeed(jwt, commandStream) {
|
|
92
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
93
|
+
yield (0, live_network_1.default)({
|
|
94
|
+
url: `${apiBaseURL}/v1/seed`,
|
|
95
|
+
method: "POST",
|
|
96
|
+
headers: {
|
|
97
|
+
"Content-Type": "application/json",
|
|
98
|
+
Authorization: `Bearer ${jwt.accessToken}`,
|
|
99
|
+
},
|
|
100
|
+
data: commandStream,
|
|
101
|
+
});
|
|
102
|
+
});
|
|
103
|
+
}
|
|
104
|
+
function putCommands(jwt, trustchain_id, request) {
|
|
105
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
106
|
+
yield (0, live_network_1.default)({
|
|
107
|
+
url: `${apiBaseURL}/v1/trustchain/${trustchain_id}/commands`,
|
|
108
|
+
method: "PUT",
|
|
109
|
+
headers: {
|
|
110
|
+
Authorization: `Bearer ${jwt.accessToken}`,
|
|
111
|
+
},
|
|
112
|
+
data: request,
|
|
113
|
+
});
|
|
114
|
+
});
|
|
115
|
+
}
|
|
116
|
+
function deleteTrustchain(jwt, trustchain_id) {
|
|
117
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
118
|
+
yield (0, live_network_1.default)({
|
|
119
|
+
url: `${apiBaseURL}/v1/trustchain/${trustchain_id}`,
|
|
120
|
+
method: "DELETE",
|
|
121
|
+
headers: {
|
|
122
|
+
Authorization: `Bearer ${jwt.accessToken}`,
|
|
123
|
+
},
|
|
124
|
+
});
|
|
125
|
+
});
|
|
126
|
+
}
|
|
127
|
+
function fetchStatus() {
|
|
128
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
129
|
+
const { data } = yield (0, live_network_1.default)({
|
|
130
|
+
url: `${apiBaseURL}/_info`,
|
|
131
|
+
method: "GET",
|
|
132
|
+
});
|
|
133
|
+
return data;
|
|
134
|
+
});
|
|
135
|
+
}
|
|
136
|
+
return {
|
|
137
|
+
getAuthenticationChallenge,
|
|
138
|
+
postChallengeResponse,
|
|
139
|
+
refreshAuth,
|
|
140
|
+
getTrustchains,
|
|
141
|
+
getTrustchain,
|
|
142
|
+
postDerivation,
|
|
143
|
+
postSeed,
|
|
144
|
+
putCommands,
|
|
145
|
+
deleteTrustchain,
|
|
146
|
+
fetchStatus,
|
|
147
|
+
};
|
|
148
|
+
};
|
|
149
|
+
exports.default = getApi;
|
|
150
|
+
//# sourceMappingURL=api.js.map
|
package/lib/api.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"api.js","sourceRoot":"","sources":["../src/api.ts"],"names":[],"mappings":";;;;;;;;;;;;;;AAAA,0EAA6C;AAkE7C,MAAM,MAAM,GAAG,CAAC,UAAkB,EAAE,EAAE;IACpC,SAAe,0BAA0B;;YACvC,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,IAAA,sBAAO,EAAmC;gBAC/D,GAAG,EAAE,GAAG,UAAU,eAAe;gBACjC,MAAM,EAAE,KAAK;aACd,CAAC,CAAC;YACH,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,SAAe,qBAAqB,CAAC,OAGpC;;YACC,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,IAAA,sBAAO,EAAS;gBACrC,GAAG,EAAE,GAAG,UAAU,kBAAkB;gBACpC,MAAM,EAAE,MAAM;gBACd,IAAI,EAAE,OAAO;aACd,CAAC,CAAC;YACH,OAAO;gBACL,WAAW,EAAE,IAAI,CAAC,YAAY;gBAC9B,WAAW,EAAE,IAAI,CAAC,WAAW;aAC9B,CAAC;QACJ,CAAC;KAAA;IAED,SAAe,WAAW,CAAC,GAAQ;;YACjC,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,IAAA,sBAAO,EAAS;gBACrC,GAAG,EAAE,GAAG,UAAU,aAAa;gBAC/B,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,GAAG,CAAC,WAAW,EAAE;iBAC3C;aACF,CAAC,CAAC;YACH,OAAO;gBACL,WAAW,EAAE,IAAI,CAAC,YAAY;gBAC9B,WAAW,EAAE,IAAI,CAAC,WAAW;aAC9B,CAAC;QACJ,CAAC;KAAA;IAED,SAAe,cAAc,CAAC,GAAQ;;YACpC,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,IAAA,sBAAO,EAAsB;gBAClD,GAAG,EAAE,GAAG,UAAU,iBAAiB;gBACnC,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,GAAG,CAAC,WAAW,EAAE;iBAC3C;aACF,CAAC,CAAC;YACH,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,SAAe,aAAa,CAAC,GAAQ,EAAE,aAAqB;;YAC1D,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,IAAA,sBAAO,EAAqB;gBACjD,GAAG,EAAE,GAAG,UAAU,kBAAkB,aAAa,EAAE;gBACnD,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,GAAG,CAAC,WAAW,EAAE;iBAC3C;aACF,CAAC,CAAC;YACH,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,SAAe,cAAc,CAC3B,GAAQ,EACR,aAAqB,EACrB,aAAqB;;YAErB,MAAM,IAAA,sBAAO,EAAO;gBAClB,GAAG,EAAE,GAAG,UAAU,kBAAkB,aAAa,aAAa;gBAC9D,MAAM,EAAE,MAAM;gBACd,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,GAAG,CAAC,WAAW,EAAE;oBAC1C,cAAc,EAAE,kBAAkB;iBACnC;gBACD,IAAI,EAAE,aAAa;aACpB,CAAC,CAAC;QACL,CAAC;KAAA;IAED,SAAe,QAAQ,CAAC,GAAQ,EAAE,aAAqB;;YACrD,MAAM,IAAA,sBAAO,EAAO;gBAClB,GAAG,EAAE,GAAG,UAAU,UAAU;gBAC5B,MAAM,EAAE,MAAM;gBACd,OAAO,EAAE;oBACP,cAAc,EAAE,kBAAkB;oBAClC,aAAa,EAAE,UAAU,GAAG,CAAC,WAAW,EAAE;iBAC3C;gBACD,IAAI,EAAE,aAAa;aACpB,CAAC,CAAC;QACL,CAAC;KAAA;IAED,SAAe,WAAW,CACxB,GAAQ,EACR,aAAqB,EACrB,OAA2B;;YAE3B,MAAM,IAAA,sBAAO,EAAO;gBAClB,GAAG,EAAE,GAAG,UAAU,kBAAkB,aAAa,WAAW;gBAC5D,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,GAAG,CAAC,WAAW,EAAE;iBAC3C;gBACD,IAAI,EAAE,OAAO;aACd,CAAC,CAAC;QACL,CAAC;KAAA;IAED,SAAe,gBAAgB,CAAC,GAAQ,EAAE,aAAqB;;YAC7D,MAAM,IAAA,sBAAO,EAAO;gBAClB,GAAG,EAAE,GAAG,UAAU,kBAAkB,aAAa,EAAE;gBACnD,MAAM,EAAE,QAAQ;gBAChB,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,GAAG,CAAC,WAAW,EAAE;iBAC3C;aACF,CAAC,CAAC;QACL,CAAC;KAAA;IAED,SAAe,WAAW;;YACxB,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,IAAA,sBAAO,EAAoB;gBAChD,GAAG,EAAE,GAAG,UAAU,QAAQ;gBAC1B,MAAM,EAAE,KAAK;aACd,CAAC,CAAC;YACH,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,OAAO;QACL,0BAA0B;QAC1B,qBAAqB;QACrB,WAAW;QACX,cAAc;QACd,aAAa;QACb,cAAc;QACd,QAAQ;QACR,WAAW;QACX,gBAAgB;QAChB,WAAW;KACZ,CAAC;AACJ,CAAC,CAAC;AAEF,kBAAe,MAAM,CAAC"}
|
package/lib/auth.d.ts
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
import { AuthCachePolicy, JWT } from "./types";
|
|
2
|
+
export declare function genericWithJWT<T>(job: (jwt: JWT) => Promise<T>, initialJWT: JWT | undefined, auth: () => Promise<JWT>, refreshAuth: (jw: JWT) => Promise<JWT>, policy?: AuthCachePolicy): Promise<T>;
|
|
3
|
+
//# sourceMappingURL=auth.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../src/auth.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,eAAe,EAAE,GAAG,EAAE,MAAM,SAAS,CAAC;AAG/C,wBAAsB,cAAc,CAAC,CAAC,EACpC,GAAG,EAAE,CAAC,GAAG,EAAE,GAAG,KAAK,OAAO,CAAC,CAAC,CAAC,EAC7B,UAAU,EAAE,GAAG,GAAG,SAAS,EAC3B,IAAI,EAAE,MAAM,OAAO,CAAC,GAAG,CAAC,EACxB,WAAW,EAAE,CAAC,EAAE,EAAE,GAAG,KAAK,OAAO,CAAC,GAAG,CAAC,EACtC,MAAM,GAAE,eAAyB,GAChC,OAAO,CAAC,CAAC,CAAC,CA2CZ"}
|
package/lib/auth.js
ADDED
|
@@ -0,0 +1,79 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.genericWithJWT = void 0;
|
|
13
|
+
const errors_1 = require("@ledgerhq/errors");
|
|
14
|
+
const logs_1 = require("@ledgerhq/logs");
|
|
15
|
+
const errors_2 = require("./errors");
|
|
16
|
+
function genericWithJWT(job_1, initialJWT_1, auth_1, refreshAuth_1) {
|
|
17
|
+
return __awaiter(this, arguments, void 0, function* (job, initialJWT, auth, refreshAuth, policy = "cache") {
|
|
18
|
+
function refresh(jwt) {
|
|
19
|
+
return refreshAuth(jwt).catch(e => {
|
|
20
|
+
(0, logs_1.log)("trustchain", "JWT refresh failed, reauthenticating", e);
|
|
21
|
+
const { hasExpired, isNotPermitted, isTrustchainOutdated } = networkCheckJwtExpiration(e);
|
|
22
|
+
if (isNotPermitted) {
|
|
23
|
+
throw new errors_2.TrustchainNotAllowed();
|
|
24
|
+
}
|
|
25
|
+
if (isTrustchainOutdated) {
|
|
26
|
+
throw new errors_2.TrustchainOutdated();
|
|
27
|
+
}
|
|
28
|
+
if (hasExpired) {
|
|
29
|
+
return auth();
|
|
30
|
+
}
|
|
31
|
+
throw e;
|
|
32
|
+
});
|
|
33
|
+
}
|
|
34
|
+
// initial jwt depending on the policy
|
|
35
|
+
let jwt = policy === "no-cache" || !initialJWT
|
|
36
|
+
? yield auth()
|
|
37
|
+
: policy === "refresh"
|
|
38
|
+
? yield refresh(initialJWT)
|
|
39
|
+
: initialJWT;
|
|
40
|
+
return job(jwt).catch((e) => __awaiter(this, void 0, void 0, function* () {
|
|
41
|
+
// JWT expiration handling: if the function fails, we will recover a valid jwt accordingly to spec. https://ledgerhq.atlassian.net/wiki/spaces/BE/pages/4207083687/TCH+Usage+documentation#JWT-expiration-handling
|
|
42
|
+
const { hasExpired, canBeRefreshed, isNotPermitted, isTrustchainOutdated } = networkCheckJwtExpiration(e);
|
|
43
|
+
if (isNotPermitted) {
|
|
44
|
+
throw new errors_2.TrustchainNotAllowed();
|
|
45
|
+
}
|
|
46
|
+
if (isTrustchainOutdated) {
|
|
47
|
+
throw new errors_2.TrustchainOutdated();
|
|
48
|
+
}
|
|
49
|
+
if (hasExpired) {
|
|
50
|
+
(0, logs_1.log)("trustchain", "JWT expired -> " + (canBeRefreshed ? "refreshing" : "reauthenticating"));
|
|
51
|
+
jwt = yield (jwt && canBeRefreshed ? refresh(jwt) : auth());
|
|
52
|
+
return job(jwt);
|
|
53
|
+
}
|
|
54
|
+
throw e;
|
|
55
|
+
}));
|
|
56
|
+
});
|
|
57
|
+
}
|
|
58
|
+
exports.genericWithJWT = genericWithJWT;
|
|
59
|
+
function networkCheckJwtExpiration(error) {
|
|
60
|
+
let hasExpired = false;
|
|
61
|
+
let canBeRefreshed = false;
|
|
62
|
+
let isNotPermitted = false;
|
|
63
|
+
let isTrustchainOutdated = false;
|
|
64
|
+
// this assume live-network is used and we adapt to its error's format
|
|
65
|
+
if (error instanceof errors_1.LedgerAPI4xx) {
|
|
66
|
+
if (error.message.includes("JWT is expired")) {
|
|
67
|
+
hasExpired = true;
|
|
68
|
+
canBeRefreshed = error.message.includes("/refresh");
|
|
69
|
+
}
|
|
70
|
+
else if (error.message.includes("JWT contains no permission")) {
|
|
71
|
+
isNotPermitted = true;
|
|
72
|
+
}
|
|
73
|
+
else if (error.message.includes("path does not match")) {
|
|
74
|
+
isTrustchainOutdated = true;
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
return { hasExpired, canBeRefreshed, isNotPermitted, isTrustchainOutdated };
|
|
78
|
+
}
|
|
79
|
+
//# sourceMappingURL=auth.js.map
|
package/lib/auth.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.js","sourceRoot":"","sources":["../src/auth.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,6CAAgD;AAChD,yCAAqC;AAErC,qCAAoE;AAEpE,SAAsB,cAAc;yDAClC,GAA6B,EAC7B,UAA2B,EAC3B,IAAwB,EACxB,WAAsC,EACtC,SAA0B,OAAO;QAEjC,SAAS,OAAO,CAAC,GAAQ;YACvB,OAAO,WAAW,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE;gBAChC,IAAA,UAAG,EAAC,YAAY,EAAE,sCAAsC,EAAE,CAAC,CAAC,CAAC;gBAC7D,MAAM,EAAE,UAAU,EAAE,cAAc,EAAE,oBAAoB,EAAE,GAAG,yBAAyB,CAAC,CAAC,CAAC,CAAC;gBAC1F,IAAI,cAAc,EAAE,CAAC;oBACnB,MAAM,IAAI,6BAAoB,EAAE,CAAC;gBACnC,CAAC;gBACD,IAAI,oBAAoB,EAAE,CAAC;oBACzB,MAAM,IAAI,2BAAkB,EAAE,CAAC;gBACjC,CAAC;gBACD,IAAI,UAAU,EAAE,CAAC;oBACf,OAAO,IAAI,EAAE,CAAC;gBAChB,CAAC;gBACD,MAAM,CAAC,CAAC;YACV,CAAC,CAAC,CAAC;QACL,CAAC;QAED,sCAAsC;QACtC,IAAI,GAAG,GACL,MAAM,KAAK,UAAU,IAAI,CAAC,UAAU;YAClC,CAAC,CAAC,MAAM,IAAI,EAAE;YACd,CAAC,CAAC,MAAM,KAAK,SAAS;gBACpB,CAAC,CAAC,MAAM,OAAO,CAAC,UAAU,CAAC;gBAC3B,CAAC,CAAC,UAAU,CAAC;QAEnB,OAAO,GAAG,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAM,CAAC,EAAC,EAAE;YAC9B,kNAAkN;YAClN,MAAM,EAAE,UAAU,EAAE,cAAc,EAAE,cAAc,EAAE,oBAAoB,EAAE,GACxE,yBAAyB,CAAC,CAAC,CAAC,CAAC;YAC/B,IAAI,cAAc,EAAE,CAAC;gBACnB,MAAM,IAAI,6BAAoB,EAAE,CAAC;YACnC,CAAC;YACD,IAAI,oBAAoB,EAAE,CAAC;gBACzB,MAAM,IAAI,2BAAkB,EAAE,CAAC;YACjC,CAAC;YACD,IAAI,UAAU,EAAE,CAAC;gBACf,IAAA,UAAG,EAAC,YAAY,EAAE,iBAAiB,GAAG,CAAC,cAAc,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,kBAAkB,CAAC,CAAC,CAAC;gBAC5F,GAAG,GAAG,MAAM,CAAC,GAAG,IAAI,cAAc,CAAC,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;gBAC5D,OAAO,GAAG,CAAC,GAAG,CAAC,CAAC;YAClB,CAAC;YACD,MAAM,CAAC,CAAC;QACV,CAAC,CAAA,CAAC,CAAC;IACL,CAAC;CAAA;AAjDD,wCAiDC;AASD,SAAS,yBAAyB,CAAC,KAAc;IAC/C,IAAI,UAAU,GAAG,KAAK,CAAC;IACvB,IAAI,cAAc,GAAG,KAAK,CAAC;IAC3B,IAAI,cAAc,GAAG,KAAK,CAAC;IAC3B,IAAI,oBAAoB,GAAG,KAAK,CAAC;IACjC,sEAAsE;IACtE,IAAI,KAAK,YAAY,qBAAY,EAAE,CAAC;QAClC,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,gBAAgB,CAAC,EAAE,CAAC;YAC7C,UAAU,GAAG,IAAI,CAAC;YAClB,cAAc,GAAG,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;QACtD,CAAC;aAAM,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;YAChE,cAAc,GAAG,IAAI,CAAC;QACxB,CAAC;aAAM,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAAC,EAAE,CAAC;YACzD,oBAAoB,GAAG,IAAI,CAAC;QAC9B,CAAC;IACH,CAAC;IACD,OAAO,EAAE,UAAU,EAAE,cAAc,EAAE,cAAc,EAAE,oBAAoB,EAAE,CAAC;AAC9E,CAAC"}
|
package/lib/errors.d.ts
ADDED
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
export declare const ScannedOldImportQrCode: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
2
|
+
[key: string]: unknown;
|
|
3
|
+
}>;
|
|
4
|
+
export declare const ScannedNewImportQrCode: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
5
|
+
[key: string]: unknown;
|
|
6
|
+
}>;
|
|
7
|
+
export declare const ScannedInvalidQrCode: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
8
|
+
[key: string]: unknown;
|
|
9
|
+
}>;
|
|
10
|
+
export declare const InvalidDigitsError: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
11
|
+
[key: string]: unknown;
|
|
12
|
+
}>;
|
|
13
|
+
export declare const InvalidEncryptionKeyError: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
14
|
+
[key: string]: unknown;
|
|
15
|
+
}>;
|
|
16
|
+
export declare const TrustchainEjected: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
17
|
+
[key: string]: unknown;
|
|
18
|
+
}>;
|
|
19
|
+
export declare const TrustchainNotAllowed: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
20
|
+
[key: string]: unknown;
|
|
21
|
+
}>;
|
|
22
|
+
export declare const TrustchainOutdated: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
23
|
+
[key: string]: unknown;
|
|
24
|
+
}>;
|
|
25
|
+
export declare const TrustchainNotFound: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
26
|
+
[key: string]: unknown;
|
|
27
|
+
}>;
|
|
28
|
+
export declare const NoTrustchainInitialized: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
29
|
+
[key: string]: unknown;
|
|
30
|
+
}>;
|
|
31
|
+
export declare const TrustchainAlreadyInitialized: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
32
|
+
[key: string]: unknown;
|
|
33
|
+
}>;
|
|
34
|
+
export declare const TrustchainAlreadyInitializedWithOtherSeed: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
35
|
+
[key: string]: unknown;
|
|
36
|
+
}>;
|
|
37
|
+
export declare const QRCodeWSClosed: import("@ledgerhq/errors/lib/helpers").LedgerErrorConstructor<{
|
|
38
|
+
time: number;
|
|
39
|
+
}>;
|
|
40
|
+
//# sourceMappingURL=errors.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"errors.d.ts","sourceRoot":"","sources":["../src/errors.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,sBAAsB;;EAAmD,CAAC;AACvF,eAAO,MAAM,sBAAsB;;EAAmD,CAAC;AACvF,eAAO,MAAM,oBAAoB;;EAAiD,CAAC;AACnF,eAAO,MAAM,kBAAkB;;EAA+C,CAAC;AAC/E,eAAO,MAAM,yBAAyB;;EAAsD,CAAC;AAC7F,eAAO,MAAM,iBAAiB;;EAA8C,CAAC;AAC7E,eAAO,MAAM,oBAAoB;;EAAiD,CAAC;AACnF,eAAO,MAAM,kBAAkB;;EAA+C,CAAC;AAC/E,eAAO,MAAM,kBAAkB;;EAA+C,CAAC;AAC/E,eAAO,MAAM,uBAAuB;;EAAoD,CAAC;AACzF,eAAO,MAAM,4BAA4B;;EAAyD,CAAC;AACnG,eAAO,MAAM,yCAAyC;;EAErD,CAAC;AAEF,eAAO,MAAM,cAAc;UAAkC,MAAM;EAAqB,CAAC"}
|
package/lib/errors.js
ADDED
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.QRCodeWSClosed = exports.TrustchainAlreadyInitializedWithOtherSeed = exports.TrustchainAlreadyInitialized = exports.NoTrustchainInitialized = exports.TrustchainNotFound = exports.TrustchainOutdated = exports.TrustchainNotAllowed = exports.TrustchainEjected = exports.InvalidEncryptionKeyError = exports.InvalidDigitsError = exports.ScannedInvalidQrCode = exports.ScannedNewImportQrCode = exports.ScannedOldImportQrCode = void 0;
|
|
4
|
+
const errors_1 = require("@ledgerhq/errors");
|
|
5
|
+
exports.ScannedOldImportQrCode = (0, errors_1.createCustomErrorClass)("ScannedOldImportQrCode");
|
|
6
|
+
exports.ScannedNewImportQrCode = (0, errors_1.createCustomErrorClass)("ScannedNewImportQrCode");
|
|
7
|
+
exports.ScannedInvalidQrCode = (0, errors_1.createCustomErrorClass)("ScannedInvalidQrCode");
|
|
8
|
+
exports.InvalidDigitsError = (0, errors_1.createCustomErrorClass)("InvalidDigitsError");
|
|
9
|
+
exports.InvalidEncryptionKeyError = (0, errors_1.createCustomErrorClass)("InvalidEncryptionKeyError");
|
|
10
|
+
exports.TrustchainEjected = (0, errors_1.createCustomErrorClass)("TrustchainEjected");
|
|
11
|
+
exports.TrustchainNotAllowed = (0, errors_1.createCustomErrorClass)("TrustchainNotAllowed");
|
|
12
|
+
exports.TrustchainOutdated = (0, errors_1.createCustomErrorClass)("TrustchainOutdated");
|
|
13
|
+
exports.TrustchainNotFound = (0, errors_1.createCustomErrorClass)("TrustchainNotFound");
|
|
14
|
+
exports.NoTrustchainInitialized = (0, errors_1.createCustomErrorClass)("NoTrustchainInitialized");
|
|
15
|
+
exports.TrustchainAlreadyInitialized = (0, errors_1.createCustomErrorClass)("TrustchainAlreadyInitialized");
|
|
16
|
+
exports.TrustchainAlreadyInitializedWithOtherSeed = (0, errors_1.createCustomErrorClass)("TrustchainAlreadyInitializedWithOtherSeed");
|
|
17
|
+
exports.QRCodeWSClosed = (0, errors_1.createCustomErrorClass)("QRCodeWSClosed");
|
|
18
|
+
//# sourceMappingURL=errors.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"errors.js","sourceRoot":"","sources":["../src/errors.ts"],"names":[],"mappings":";;;AAAA,6CAA0D;AAE7C,QAAA,sBAAsB,GAAG,IAAA,+BAAsB,EAAC,wBAAwB,CAAC,CAAC;AAC1E,QAAA,sBAAsB,GAAG,IAAA,+BAAsB,EAAC,wBAAwB,CAAC,CAAC;AAC1E,QAAA,oBAAoB,GAAG,IAAA,+BAAsB,EAAC,sBAAsB,CAAC,CAAC;AACtE,QAAA,kBAAkB,GAAG,IAAA,+BAAsB,EAAC,oBAAoB,CAAC,CAAC;AAClE,QAAA,yBAAyB,GAAG,IAAA,+BAAsB,EAAC,2BAA2B,CAAC,CAAC;AAChF,QAAA,iBAAiB,GAAG,IAAA,+BAAsB,EAAC,mBAAmB,CAAC,CAAC;AAChE,QAAA,oBAAoB,GAAG,IAAA,+BAAsB,EAAC,sBAAsB,CAAC,CAAC;AACtE,QAAA,kBAAkB,GAAG,IAAA,+BAAsB,EAAC,oBAAoB,CAAC,CAAC;AAClE,QAAA,kBAAkB,GAAG,IAAA,+BAAsB,EAAC,oBAAoB,CAAC,CAAC;AAClE,QAAA,uBAAuB,GAAG,IAAA,+BAAsB,EAAC,yBAAyB,CAAC,CAAC;AAC5E,QAAA,4BAA4B,GAAG,IAAA,+BAAsB,EAAC,8BAA8B,CAAC,CAAC;AACtF,QAAA,yCAAyC,GAAG,IAAA,+BAAsB,EAC7E,2CAA2C,CAC5C,CAAC;AAEW,QAAA,cAAc,GAAG,IAAA,+BAAsB,EAAmB,gBAAgB,CAAC,CAAC"}
|
package/lib/index.d.ts
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
import { TrustchainSDKContext, TrustchainSDK, TrustchainLifecycle, WithDevice } from "./types";
|
|
2
|
+
/**
|
|
3
|
+
* Get an implementation of a TrustchainSDK
|
|
4
|
+
*/
|
|
5
|
+
export declare const getSdk: (isMockEnv: boolean, context: TrustchainSDKContext, withDevice: WithDevice, lifecycle?: TrustchainLifecycle) => TrustchainSDK;
|
|
6
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,oBAAoB,EAAE,aAAa,EAAE,mBAAmB,EAAE,UAAU,EAAE,MAAM,SAAS,CAAC;AAE/F;;GAEG;AACH,eAAO,MAAM,MAAM,cACN,OAAO,WACT,oBAAoB,cACjB,UAAU,cACV,mBAAmB,KAC9B,aAMF,CAAC"}
|
package/lib/index.js
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.getSdk = void 0;
|
|
4
|
+
const HWDeviceProvider_1 = require("./HWDeviceProvider");
|
|
5
|
+
const sdk_1 = require("./sdk");
|
|
6
|
+
const mockSdk_1 = require("./mockSdk");
|
|
7
|
+
/**
|
|
8
|
+
* Get an implementation of a TrustchainSDK
|
|
9
|
+
*/
|
|
10
|
+
const getSdk = (isMockEnv, context, withDevice, lifecycle) => {
|
|
11
|
+
if (isMockEnv) {
|
|
12
|
+
return new mockSdk_1.MockSDK(context, lifecycle);
|
|
13
|
+
}
|
|
14
|
+
return new sdk_1.SDK(context, new HWDeviceProvider_1.HWDeviceProvider(context.apiBaseUrl, withDevice), lifecycle);
|
|
15
|
+
};
|
|
16
|
+
exports.getSdk = getSdk;
|
|
17
|
+
//# sourceMappingURL=index.js.map
|
package/lib/index.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;AAAA,yDAAsD;AACtD,+BAA4B;AAC5B,uCAAoC;AAGpC;;GAEG;AACI,MAAM,MAAM,GAAG,CACpB,SAAkB,EAClB,OAA6B,EAC7B,UAAsB,EACtB,SAA+B,EAChB,EAAE;IACjB,IAAI,SAAS,EAAE,CAAC;QACd,OAAO,IAAI,iBAAO,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;IACzC,CAAC;IAED,OAAO,IAAI,SAAG,CAAC,OAAO,EAAE,IAAI,mCAAgB,CAAC,OAAO,CAAC,UAAU,EAAE,UAAU,CAAC,EAAE,SAAS,CAAC,CAAC;AAC3F,CAAC,CAAC;AAXW,QAAA,MAAM,UAWjB"}
|
package/lib/mockSdk.d.ts
ADDED
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
import { JWT, MemberCredentials, Trustchain, TrustchainDeviceCallbacks, TrustchainLifecycle, TrustchainMember, TrustchainResult, TrustchainSDK, TrustchainSDKContext } from "./types";
|
|
2
|
+
export declare class MockSDK implements TrustchainSDK {
|
|
3
|
+
private context;
|
|
4
|
+
private lifecyle?;
|
|
5
|
+
private api;
|
|
6
|
+
constructor(context: TrustchainSDKContext, lifecyle?: TrustchainLifecycle);
|
|
7
|
+
private deviceJwtAcquired;
|
|
8
|
+
private _id;
|
|
9
|
+
initMemberCredentials(): Promise<MemberCredentials>;
|
|
10
|
+
withAuth<T>(trustchain: Trustchain, memberCredentials: MemberCredentials, job: (jwt: JWT) => Promise<T>): Promise<T>;
|
|
11
|
+
getOrCreateTrustchain(deviceId: string, memberCredentials: MemberCredentials, callbacks?: TrustchainDeviceCallbacks): Promise<TrustchainResult>;
|
|
12
|
+
refreshAuth(jwt: JWT): Promise<JWT>;
|
|
13
|
+
restoreTrustchain(trustchain: Trustchain, memberCredentials: MemberCredentials): Promise<Trustchain>;
|
|
14
|
+
getMembers(trustchain: Trustchain, memberCredentials: MemberCredentials): Promise<TrustchainMember[]>;
|
|
15
|
+
removeMember(deviceId: string, trustchain: Trustchain, memberCredentials: MemberCredentials, member: TrustchainMember, callbacks?: TrustchainDeviceCallbacks): Promise<Trustchain>;
|
|
16
|
+
destroyTrustchain(trustchain: Trustchain, memberCredentials: MemberCredentials): Promise<void>;
|
|
17
|
+
addMember(trustchain: Trustchain, memberCredentials: MemberCredentials, member: TrustchainMember): Promise<void>;
|
|
18
|
+
encryptUserData(trustchain: Trustchain, input: Uint8Array): Promise<Uint8Array>;
|
|
19
|
+
decryptUserData(trustchain: Trustchain, data: Uint8Array): Promise<Uint8Array>;
|
|
20
|
+
invalidateJwt(): void;
|
|
21
|
+
}
|
|
22
|
+
//# sourceMappingURL=mockSdk.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mockSdk.d.ts","sourceRoot":"","sources":["../src/mockSdk.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,GAAG,EACH,iBAAiB,EACjB,UAAU,EACV,yBAAyB,EACzB,mBAAmB,EACnB,gBAAgB,EAChB,gBAAgB,EAEhB,aAAa,EACb,oBAAoB,EACrB,MAAM,SAAS,CAAC;AA+CjB,qBAAa,OAAQ,YAAW,aAAa;IAC3C,OAAO,CAAC,OAAO,CAAuB;IACtC,OAAO,CAAC,QAAQ,CAAC,CAAsB;IACvC,OAAO,CAAC,GAAG,CAA4B;gBAE3B,OAAO,EAAE,oBAAoB,EAAE,QAAQ,CAAC,EAAE,mBAAmB;IAMzE,OAAO,CAAC,iBAAiB,CAAS;IAElC,OAAO,CAAC,GAAG,CAAK;IAChB,qBAAqB,IAAI,OAAO,CAAC,iBAAiB,CAAC;IAQnD,QAAQ,CAAC,CAAC,EACR,UAAU,EAAE,UAAU,EACtB,iBAAiB,EAAE,iBAAiB,EACpC,GAAG,EAAE,CAAC,GAAG,EAAE,GAAG,KAAK,OAAO,CAAC,CAAC,CAAC,GAC5B,OAAO,CAAC,CAAC,CAAC;IAMP,qBAAqB,CACzB,QAAQ,EAAE,MAAM,EAChB,iBAAiB,EAAE,iBAAiB,EACpC,SAAS,CAAC,EAAE,yBAAyB,GACpC,OAAO,CAAC,gBAAgB,CAAC;IAqCtB,WAAW,CAAC,GAAG,EAAE,GAAG,GAAG,OAAO,CAAC,GAAG,CAAC;IAInC,iBAAiB,CACrB,UAAU,EAAE,UAAU,EACtB,iBAAiB,EAAE,iBAAiB,GACnC,OAAO,CAAC,UAAU,CAAC;IAWhB,UAAU,CACd,UAAU,EAAE,UAAU,EACtB,iBAAiB,EAAE,iBAAiB,GACnC,OAAO,CAAC,gBAAgB,EAAE,CAAC;IAQxB,YAAY,CAChB,QAAQ,EAAE,MAAM,EAChB,UAAU,EAAE,UAAU,EACtB,iBAAiB,EAAE,iBAAiB,EACpC,MAAM,EAAE,gBAAgB,EACxB,SAAS,CAAC,EAAE,yBAAyB,GACpC,OAAO,CAAC,UAAU,CAAC;IA8ChB,iBAAiB,CACrB,UAAU,EAAE,UAAU,EACtB,iBAAiB,EAAE,iBAAiB,GACnC,OAAO,CAAC,IAAI,CAAC;IAQhB,SAAS,CACP,UAAU,EAAE,UAAU,EACtB,iBAAiB,EAAE,iBAAiB,EACpC,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,IAAI,CAAC;IAYhB,eAAe,CAAC,UAAU,EAAE,UAAU,EAAE,KAAK,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IAK/E,eAAe,CAAC,UAAU,EAAE,UAAU,EAAE,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IAK9E,aAAa,IAAI,IAAI;CAGtB"}
|
package/lib/mockSdk.js
ADDED
|
@@ -0,0 +1,208 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
12
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
13
|
+
};
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.MockSDK = void 0;
|
|
16
|
+
const types_1 = require("./types");
|
|
17
|
+
const hw_ledger_key_ring_protocol_1 = require("@ledgerhq/hw-ledger-key-ring-protocol");
|
|
18
|
+
const errors_1 = require("./errors");
|
|
19
|
+
const api_1 = __importDefault(require("./api"));
|
|
20
|
+
const mockedLiveCredentialsPrivateKey = "mock-private-key";
|
|
21
|
+
function assertTrustchain(trustchain) {
|
|
22
|
+
if (!trustchain.rootId.startsWith("mock-root-id")) {
|
|
23
|
+
throw new Error("in mock context, trustchain must be the mocked trustchain");
|
|
24
|
+
}
|
|
25
|
+
}
|
|
26
|
+
function assertLiveCredentials(memberCredentials) {
|
|
27
|
+
if (!memberCredentials.privatekey.startsWith(mockedLiveCredentialsPrivateKey)) {
|
|
28
|
+
throw new Error("in mock context, memberCredentials must be the mocked memberCredentials");
|
|
29
|
+
}
|
|
30
|
+
}
|
|
31
|
+
function assertAllowedPermissions(trustchainId, memberId) {
|
|
32
|
+
const members = trustchainMembers.get(trustchainId) || [];
|
|
33
|
+
const member = members.find(m => m.id === memberId);
|
|
34
|
+
if (!member) {
|
|
35
|
+
throw new errors_1.TrustchainEjected();
|
|
36
|
+
}
|
|
37
|
+
}
|
|
38
|
+
const mockedLiveJWT = {
|
|
39
|
+
accessToken: "mock-live-jwt",
|
|
40
|
+
permissions: {},
|
|
41
|
+
};
|
|
42
|
+
// global states in memory
|
|
43
|
+
const trustchains = new Map();
|
|
44
|
+
const trustchainMembers = new Map();
|
|
45
|
+
/**
|
|
46
|
+
* to mock the encryption/decryption, we just xor the data with 0xff
|
|
47
|
+
*/
|
|
48
|
+
const applyXor = (a) => {
|
|
49
|
+
const b = new Uint8Array(a.length);
|
|
50
|
+
for (let i = 0; i < a.length; i++) {
|
|
51
|
+
b[i] = a[i] ^ 0xff;
|
|
52
|
+
}
|
|
53
|
+
return b;
|
|
54
|
+
};
|
|
55
|
+
class MockSDK {
|
|
56
|
+
constructor(context, lifecyle) {
|
|
57
|
+
this.deviceJwtAcquired = false;
|
|
58
|
+
this._id = 1;
|
|
59
|
+
this.context = context;
|
|
60
|
+
this.lifecyle = lifecyle;
|
|
61
|
+
this.api = (0, api_1.default)(context.apiBaseUrl);
|
|
62
|
+
}
|
|
63
|
+
initMemberCredentials() {
|
|
64
|
+
const id = this._id++;
|
|
65
|
+
return Promise.resolve({
|
|
66
|
+
privatekey: "mock-private-key-" + this.context.name + "-" + id,
|
|
67
|
+
pubkey: "mock-pub-key-" + this.context.name + "-" + id,
|
|
68
|
+
});
|
|
69
|
+
}
|
|
70
|
+
withAuth(trustchain, memberCredentials, job) {
|
|
71
|
+
assertTrustchain(trustchain);
|
|
72
|
+
assertLiveCredentials(memberCredentials);
|
|
73
|
+
return job(mockedLiveJWT);
|
|
74
|
+
}
|
|
75
|
+
getOrCreateTrustchain(deviceId, memberCredentials, callbacks) {
|
|
76
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
77
|
+
var _a, _b, _c, _d;
|
|
78
|
+
this.invalidateJwt();
|
|
79
|
+
assertLiveCredentials(memberCredentials);
|
|
80
|
+
let type = trustchains.has("mock-root-id")
|
|
81
|
+
? types_1.TrustchainResultType.restored
|
|
82
|
+
: types_1.TrustchainResultType.created;
|
|
83
|
+
const trustchain = trustchains.get("mock-root-id") || {
|
|
84
|
+
rootId: "mock-root-id",
|
|
85
|
+
walletSyncEncryptionKey: "mock-wallet-sync-encryption-key",
|
|
86
|
+
applicationPath: "m/0'/16'/0'",
|
|
87
|
+
};
|
|
88
|
+
trustchains.set(trustchain.rootId, trustchain);
|
|
89
|
+
if (!this.deviceJwtAcquired) {
|
|
90
|
+
(_a = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onStartRequestUserInteraction) === null || _a === void 0 ? void 0 : _a.call(callbacks);
|
|
91
|
+
this.deviceJwtAcquired = true; // simulate device auth interaction
|
|
92
|
+
(_b = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onEndRequestUserInteraction) === null || _b === void 0 ? void 0 : _b.call(callbacks);
|
|
93
|
+
}
|
|
94
|
+
const currentMembers = trustchainMembers.get(trustchain.rootId) || [];
|
|
95
|
+
// add itself if not yet here
|
|
96
|
+
if (!currentMembers.some(m => m.id === memberCredentials.pubkey)) {
|
|
97
|
+
if (type === types_1.TrustchainResultType.restored)
|
|
98
|
+
type = types_1.TrustchainResultType.updated;
|
|
99
|
+
(_c = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onStartRequestUserInteraction) === null || _c === void 0 ? void 0 : _c.call(callbacks);
|
|
100
|
+
// simulate device add interaction
|
|
101
|
+
(_d = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onEndRequestUserInteraction) === null || _d === void 0 ? void 0 : _d.call(callbacks);
|
|
102
|
+
currentMembers.push({
|
|
103
|
+
id: memberCredentials.pubkey,
|
|
104
|
+
name: this.context.name,
|
|
105
|
+
permissions: hw_ledger_key_ring_protocol_1.Permissions.OWNER,
|
|
106
|
+
});
|
|
107
|
+
trustchainMembers.set(trustchain.rootId, currentMembers);
|
|
108
|
+
}
|
|
109
|
+
return Promise.resolve({ type, trustchain });
|
|
110
|
+
});
|
|
111
|
+
}
|
|
112
|
+
refreshAuth(jwt) {
|
|
113
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
114
|
+
return jwt;
|
|
115
|
+
});
|
|
116
|
+
}
|
|
117
|
+
restoreTrustchain(trustchain, memberCredentials) {
|
|
118
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
119
|
+
assertTrustchain(trustchain);
|
|
120
|
+
assertLiveCredentials(memberCredentials);
|
|
121
|
+
assertAllowedPermissions(trustchain.rootId, memberCredentials.pubkey);
|
|
122
|
+
const latest = trustchains.get(trustchain.rootId);
|
|
123
|
+
if (!latest) {
|
|
124
|
+
throw new Error("trustchain not found");
|
|
125
|
+
}
|
|
126
|
+
return Promise.resolve(latest);
|
|
127
|
+
});
|
|
128
|
+
}
|
|
129
|
+
getMembers(trustchain, memberCredentials) {
|
|
130
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
131
|
+
assertTrustchain(trustchain);
|
|
132
|
+
assertLiveCredentials(memberCredentials);
|
|
133
|
+
assertAllowedPermissions(trustchain.rootId, memberCredentials.pubkey);
|
|
134
|
+
const currentMembers = trustchainMembers.get(trustchain.rootId) || [];
|
|
135
|
+
return Promise.resolve([...currentMembers]);
|
|
136
|
+
});
|
|
137
|
+
}
|
|
138
|
+
removeMember(deviceId, trustchain, memberCredentials, member, callbacks) {
|
|
139
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
140
|
+
var _a, _b, _c, _d, _e, _f, _g;
|
|
141
|
+
this.invalidateJwt();
|
|
142
|
+
assertTrustchain(trustchain);
|
|
143
|
+
assertLiveCredentials(memberCredentials);
|
|
144
|
+
assertAllowedPermissions(trustchain.rootId, memberCredentials.pubkey);
|
|
145
|
+
if (member.id === memberCredentials.pubkey) {
|
|
146
|
+
throw new Error("cannot remove self");
|
|
147
|
+
}
|
|
148
|
+
const afterRotation = yield ((_a = this.lifecyle) === null || _a === void 0 ? void 0 : _a.onTrustchainRotation(this, trustchain, memberCredentials));
|
|
149
|
+
if (!this.deviceJwtAcquired) {
|
|
150
|
+
(_b = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onStartRequestUserInteraction) === null || _b === void 0 ? void 0 : _b.call(callbacks);
|
|
151
|
+
this.deviceJwtAcquired = true; // simulate device auth interaction
|
|
152
|
+
(_c = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onEndRequestUserInteraction) === null || _c === void 0 ? void 0 : _c.call(callbacks);
|
|
153
|
+
}
|
|
154
|
+
(_d = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onStartRequestUserInteraction) === null || _d === void 0 ? void 0 : _d.call(callbacks);
|
|
155
|
+
// simulate device interaction
|
|
156
|
+
(_e = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onEndRequestUserInteraction) === null || _e === void 0 ? void 0 : _e.call(callbacks);
|
|
157
|
+
(_f = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onStartRequestUserInteraction) === null || _f === void 0 ? void 0 : _f.call(callbacks);
|
|
158
|
+
// simulate device interaction
|
|
159
|
+
(_g = callbacks === null || callbacks === void 0 ? void 0 : callbacks.onEndRequestUserInteraction) === null || _g === void 0 ? void 0 : _g.call(callbacks);
|
|
160
|
+
const currentMembers = (trustchainMembers.get(trustchain.rootId) || []).filter(m => m.id !== member.id);
|
|
161
|
+
trustchainMembers.set(trustchain.rootId, currentMembers);
|
|
162
|
+
// we extract the index part to increment it and recreate a path
|
|
163
|
+
const index = 1 + parseInt(trustchain.applicationPath.split("/")[3].split("'")[0]);
|
|
164
|
+
const newTrustchain = {
|
|
165
|
+
rootId: trustchain.rootId,
|
|
166
|
+
walletSyncEncryptionKey: "mock-wallet-sync-encryption-key-" + index,
|
|
167
|
+
applicationPath: "m/0'/16'/" + index + "'",
|
|
168
|
+
};
|
|
169
|
+
trustchains.set(newTrustchain.rootId, newTrustchain);
|
|
170
|
+
if (afterRotation)
|
|
171
|
+
yield afterRotation(newTrustchain);
|
|
172
|
+
return Promise.resolve(newTrustchain);
|
|
173
|
+
});
|
|
174
|
+
}
|
|
175
|
+
destroyTrustchain(trustchain, memberCredentials) {
|
|
176
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
177
|
+
assertTrustchain(trustchain);
|
|
178
|
+
assertLiveCredentials(memberCredentials);
|
|
179
|
+
trustchains.delete(trustchain.rootId);
|
|
180
|
+
trustchainMembers.delete(trustchain.rootId);
|
|
181
|
+
return;
|
|
182
|
+
});
|
|
183
|
+
}
|
|
184
|
+
addMember(trustchain, memberCredentials, member) {
|
|
185
|
+
assertTrustchain(trustchain);
|
|
186
|
+
assertLiveCredentials(memberCredentials);
|
|
187
|
+
const currentMembers = trustchainMembers.get(trustchain.rootId) || [];
|
|
188
|
+
if (currentMembers.find(m => m.id === member.id)) {
|
|
189
|
+
return Promise.resolve();
|
|
190
|
+
}
|
|
191
|
+
currentMembers.push(member);
|
|
192
|
+
trustchainMembers.set(trustchain.rootId, currentMembers);
|
|
193
|
+
return Promise.resolve();
|
|
194
|
+
}
|
|
195
|
+
encryptUserData(trustchain, input) {
|
|
196
|
+
assertTrustchain(trustchain);
|
|
197
|
+
return Promise.resolve(applyXor(input));
|
|
198
|
+
}
|
|
199
|
+
decryptUserData(trustchain, data) {
|
|
200
|
+
assertTrustchain(trustchain);
|
|
201
|
+
return Promise.resolve(applyXor(data));
|
|
202
|
+
}
|
|
203
|
+
invalidateJwt() {
|
|
204
|
+
this.deviceJwtAcquired = false;
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
exports.MockSDK = MockSDK;
|
|
208
|
+
//# sourceMappingURL=mockSdk.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mockSdk.js","sourceRoot":"","sources":["../src/mockSdk.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,mCAWiB;AACjB,uFAAoE;AACpE,qCAA6C;AAC7C,gDAA2B;AAE3B,MAAM,+BAA+B,GAAG,kBAAkB,CAAC;AAE3D,SAAS,gBAAgB,CAAC,UAAsB;IAC9C,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,UAAU,CAAC,cAAc,CAAC,EAAE,CAAC;QAClD,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;IAC/E,CAAC;AACH,CAAC;AAED,SAAS,qBAAqB,CAAC,iBAAoC;IACjE,IAAI,CAAC,iBAAiB,CAAC,UAAU,CAAC,UAAU,CAAC,+BAA+B,CAAC,EAAE,CAAC;QAC9E,MAAM,IAAI,KAAK,CAAC,yEAAyE,CAAC,CAAC;IAC7F,CAAC;AACH,CAAC;AAED,SAAS,wBAAwB,CAAC,YAAoB,EAAE,QAAgB;IACtE,MAAM,OAAO,GAAG,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;IAC1D,MAAM,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,KAAK,QAAQ,CAAC,CAAC;IACpD,IAAI,CAAC,MAAM,EAAE,CAAC;QACZ,MAAM,IAAI,0BAAiB,EAAE,CAAC;IAChC,CAAC;AACH,CAAC;AAED,MAAM,aAAa,GAAG;IACpB,WAAW,EAAE,eAAe;IAC5B,WAAW,EAAE,EAAE;CAChB,CAAC;AAEF,0BAA0B;AAC1B,MAAM,WAAW,GAAG,IAAI,GAAG,EAAsB,CAAC;AAClD,MAAM,iBAAiB,GAAG,IAAI,GAAG,EAA8B,CAAC;AAEhE;;GAEG;AACH,MAAM,QAAQ,GAAG,CAAC,CAAa,EAAE,EAAE;IACjC,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;IACnC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;QAClC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC;IACrB,CAAC;IACD,OAAO,CAAC,CAAC;AACX,CAAC,CAAC;AAEF,MAAa,OAAO;IAKlB,YAAY,OAA6B,EAAE,QAA8B;QAMjE,sBAAiB,GAAG,KAAK,CAAC;QAE1B,QAAG,GAAG,CAAC,CAAC;QAPd,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QACzB,IAAI,CAAC,GAAG,GAAG,IAAA,aAAM,EAAC,OAAO,CAAC,UAAU,CAAC,CAAC;IACxC,CAAC;IAKD,qBAAqB;QACnB,MAAM,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtB,OAAO,OAAO,CAAC,OAAO,CAAC;YACrB,UAAU,EAAE,mBAAmB,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,GAAG,GAAG,GAAG,EAAE;YAC9D,MAAM,EAAE,eAAe,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,GAAG,GAAG,GAAG,EAAE;SACvD,CAAC,CAAC;IACL,CAAC;IAED,QAAQ,CACN,UAAsB,EACtB,iBAAoC,EACpC,GAA6B;QAE7B,gBAAgB,CAAC,UAAU,CAAC,CAAC;QAC7B,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;QACzC,OAAO,GAAG,CAAC,aAAa,CAAC,CAAC;IAC5B,CAAC;IAEK,qBAAqB,CACzB,QAAgB,EAChB,iBAAoC,EACpC,SAAqC;;;YAErC,IAAI,CAAC,aAAa,EAAE,CAAC;YACrB,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;YACzC,IAAI,IAAI,GAAG,WAAW,CAAC,GAAG,CAAC,cAAc,CAAC;gBACxC,CAAC,CAAC,4BAAoB,CAAC,QAAQ;gBAC/B,CAAC,CAAC,4BAAoB,CAAC,OAAO,CAAC;YAEjC,MAAM,UAAU,GAAe,WAAW,CAAC,GAAG,CAAC,cAAc,CAAC,IAAI;gBAChE,MAAM,EAAE,cAAc;gBACtB,uBAAuB,EAAE,iCAAiC;gBAC1D,eAAe,EAAE,aAAa;aAC/B,CAAC;YACF,WAAW,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,EAAE,UAAU,CAAC,CAAC;YAE/C,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBAC5B,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,6BAA6B,yDAAI,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,GAAG,IAAI,CAAC,CAAC,mCAAmC;gBAClE,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,2BAA2B,yDAAI,CAAC;YAC7C,CAAC;YAED,MAAM,cAAc,GAAG,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;YACtE,6BAA6B;YAC7B,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,KAAK,iBAAiB,CAAC,MAAM,CAAC,EAAE,CAAC;gBACjE,IAAI,IAAI,KAAK,4BAAoB,CAAC,QAAQ;oBAAE,IAAI,GAAG,4BAAoB,CAAC,OAAO,CAAC;gBAChF,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,6BAA6B,yDAAI,CAAC;gBAC7C,kCAAkC;gBAClC,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,2BAA2B,yDAAI,CAAC;gBAC3C,cAAc,CAAC,IAAI,CAAC;oBAClB,EAAE,EAAE,iBAAiB,CAAC,MAAM;oBAC5B,IAAI,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI;oBACvB,WAAW,EAAE,yCAAW,CAAC,KAAK;iBAC/B,CAAC,CAAC;gBACH,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;YAC3D,CAAC;YACD,OAAO,OAAO,CAAC,OAAO,CAAC,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAC;QAC/C,CAAC;KAAA;IAEK,WAAW,CAAC,GAAQ;;YACxB,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEK,iBAAiB,CACrB,UAAsB,EACtB,iBAAoC;;YAEpC,gBAAgB,CAAC,UAAU,CAAC,CAAC;YAC7B,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;YACzC,wBAAwB,CAAC,UAAU,CAAC,MAAM,EAAE,iBAAiB,CAAC,MAAM,CAAC,CAAC;YACtE,MAAM,MAAM,GAAG,WAAW,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;YAClD,IAAI,CAAC,MAAM,EAAE,CAAC;gBACZ,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;YAC1C,CAAC;YACD,OAAO,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QACjC,CAAC;KAAA;IAEK,UAAU,CACd,UAAsB,EACtB,iBAAoC;;YAEpC,gBAAgB,CAAC,UAAU,CAAC,CAAC;YAC7B,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;YACzC,wBAAwB,CAAC,UAAU,CAAC,MAAM,EAAE,iBAAiB,CAAC,MAAM,CAAC,CAAC;YACtE,MAAM,cAAc,GAAG,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;YACtE,OAAO,OAAO,CAAC,OAAO,CAAC,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC;QAC9C,CAAC;KAAA;IAEK,YAAY,CAChB,QAAgB,EAChB,UAAsB,EACtB,iBAAoC,EACpC,MAAwB,EACxB,SAAqC;;;YAErC,IAAI,CAAC,aAAa,EAAE,CAAC;YACrB,gBAAgB,CAAC,UAAU,CAAC,CAAC;YAC7B,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;YACzC,wBAAwB,CAAC,UAAU,CAAC,MAAM,EAAE,iBAAiB,CAAC,MAAM,CAAC,CAAC;YACtE,IAAI,MAAM,CAAC,EAAE,KAAK,iBAAiB,CAAC,MAAM,EAAE,CAAC;gBAC3C,MAAM,IAAI,KAAK,CAAC,oBAAoB,CAAC,CAAC;YACxC,CAAC;YACD,MAAM,aAAa,GAAG,MAAM,CAAA,MAAA,IAAI,CAAC,QAAQ,0CAAE,oBAAoB,CAC7D,IAAI,EACJ,UAAU,EACV,iBAAiB,CAClB,CAAA,CAAC;YAEF,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBAC5B,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,6BAA6B,yDAAI,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,GAAG,IAAI,CAAC,CAAC,mCAAmC;gBAClE,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,2BAA2B,yDAAI,CAAC;YAC7C,CAAC;YAED,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,6BAA6B,yDAAI,CAAC;YAC7C,8BAA8B;YAC9B,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,2BAA2B,yDAAI,CAAC;YAE3C,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,6BAA6B,yDAAI,CAAC;YAC7C,8BAA8B;YAC9B,MAAA,SAAS,aAAT,SAAS,uBAAT,SAAS,CAAE,2BAA2B,yDAAI,CAAC;YAE3C,MAAM,cAAc,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC,MAAM,CAC5E,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,KAAK,MAAM,CAAC,EAAE,CACxB,CAAC;YACF,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;YACzD,gEAAgE;YAChE,MAAM,KAAK,GAAG,CAAC,GAAG,QAAQ,CAAC,UAAU,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YACnF,MAAM,aAAa,GAAG;gBACpB,MAAM,EAAE,UAAU,CAAC,MAAM;gBACzB,uBAAuB,EAAE,kCAAkC,GAAG,KAAK;gBACnE,eAAe,EAAE,WAAW,GAAG,KAAK,GAAG,GAAG;aAC3C,CAAC;YACF,WAAW,CAAC,GAAG,CAAC,aAAa,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;YAErD,IAAI,aAAa;gBAAE,MAAM,aAAa,CAAC,aAAa,CAAC,CAAC;YAEtD,OAAO,OAAO,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC;QACxC,CAAC;KAAA;IAEK,iBAAiB,CACrB,UAAsB,EACtB,iBAAoC;;YAEpC,gBAAgB,CAAC,UAAU,CAAC,CAAC;YAC7B,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;YACzC,WAAW,CAAC,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;YACtC,iBAAiB,CAAC,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;YAC5C,OAAO;QACT,CAAC;KAAA;IAED,SAAS,CACP,UAAsB,EACtB,iBAAoC,EACpC,MAAwB;QAExB,gBAAgB,CAAC,UAAU,CAAC,CAAC;QAC7B,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;QACzC,MAAM,cAAc,GAAG,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;QACtE,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,KAAK,MAAM,CAAC,EAAE,CAAC,EAAE,CAAC;YACjD,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC;QACD,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC5B,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;QACzD,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;IAED,eAAe,CAAC,UAAsB,EAAE,KAAiB;QACvD,gBAAgB,CAAC,UAAU,CAAC,CAAC;QAC7B,OAAO,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC;IAC1C,CAAC;IAED,eAAe,CAAC,UAAsB,EAAE,IAAgB;QACtD,gBAAgB,CAAC,UAAU,CAAC,CAAC;QAC7B,OAAO,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;IACzC,CAAC;IAED,aAAa;QACX,IAAI,CAAC,iBAAiB,GAAG,KAAK,CAAC;IACjC,CAAC;CACF;AAlMD,0BAkMC"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { DecryptedPayload, Encrypted, ExtractEncryptedPayloads, Message } from "./types";
|
|
2
|
+
export type Cipher = {
|
|
3
|
+
encrypt: (obj: object) => Promise<string>;
|
|
4
|
+
decrypt: (data: string) => Promise<object>;
|
|
5
|
+
};
|
|
6
|
+
export type MessageCipher = {
|
|
7
|
+
encryptMessagePayload: <P extends ExtractEncryptedPayloads<Message>>(payload: P) => Promise<Encrypted<P>>;
|
|
8
|
+
decryptMessage: <M extends Message>(message: M) => Promise<DecryptedPayload<M>>;
|
|
9
|
+
};
|
|
10
|
+
export declare function makeCipher(sessionEncryptionKey: Uint8Array): Cipher;
|
|
11
|
+
export declare function makeMessageCipher(cipher: Cipher): MessageCipher;
|
|
12
|
+
//# sourceMappingURL=cipher.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cipher.d.ts","sourceRoot":"","sources":["../../src/qrcode/cipher.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,gBAAgB,EAAE,SAAS,EAAE,wBAAwB,EAAE,OAAO,EAAE,MAAM,SAAS,CAAC;AAGzF,MAAM,MAAM,MAAM,GAAG;IACnB,OAAO,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,CAAC,CAAC;IAC1C,OAAO,EAAE,CAAC,IAAI,EAAE,MAAM,KAAK,OAAO,CAAC,MAAM,CAAC,CAAC;CAC5C,CAAC;AAEF,MAAM,MAAM,aAAa,GAAG;IAC1B,qBAAqB,EAAE,CAAC,CAAC,SAAS,wBAAwB,CAAC,OAAO,CAAC,EACjE,OAAO,EAAE,CAAC,KACP,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;IAC3B,cAAc,EAAE,CAAC,CAAC,SAAS,OAAO,EAAE,OAAO,EAAE,CAAC,KAAK,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC;CACjF,CAAC;AAEF,wBAAgB,UAAU,CAAC,oBAAoB,EAAE,UAAU,GAAG,MAAM,CA0BnE;AAED,wBAAgB,iBAAiB,CAAC,MAAM,EAAE,MAAM,GAAG,aAAa,CAiB/D"}
|