@lightsparkdev/core 0.2.1 → 0.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -0
- package/dist/chunk-23X5L5S3.js +604 -0
- package/dist/chunk-4OZ5E62P.js +608 -0
- package/dist/chunk-5FD46UVI.js +600 -0
- package/dist/chunk-BAQMCJ7C.js +630 -0
- package/dist/chunk-GFTKZSHK.js +627 -0
- package/dist/chunk-I3HKDOEE.js +627 -0
- package/dist/chunk-J6LSW6XO.js +601 -0
- package/dist/chunk-JUD4MOOQ.js +608 -0
- package/dist/chunk-KX6HH6CX.js +629 -0
- package/dist/chunk-MZCDWVLH.js +634 -0
- package/dist/chunk-NY3BK66J.js +624 -0
- package/dist/chunk-Q7UUXZNC.js +26 -0
- package/dist/chunk-WT2HYC6Q.js +601 -0
- package/dist/chunk-YYVOX4YM.js +600 -0
- package/dist/chunk-ZUIUADXH.js +616 -0
- package/dist/crypto-rn-2BYOHLMG.js +72 -0
- package/dist/crypto-rn-2YV53C3B.js +72 -0
- package/dist/crypto-rn-3HFXYG7I.js +75 -0
- package/dist/crypto-rn-3HLWLVZS.js +76 -0
- package/dist/crypto-rn-3N3JTBLE.js +83 -0
- package/dist/crypto-rn-3OEMMMOD.js +74 -0
- package/dist/crypto-rn-5EZSRY5Y.js +82 -0
- package/dist/crypto-rn-5KM2YVOI.js +82 -0
- package/dist/crypto-rn-6335R2CU.js +80 -0
- package/dist/crypto-rn-6ZHSL7CX.js +72 -0
- package/dist/crypto-rn-7DWXMO2Q.js +75 -0
- package/dist/crypto-rn-7GTI374I.js +81 -0
- package/dist/crypto-rn-AXDY3LDG.js +124 -0
- package/dist/crypto-rn-BZ2KZ2YR.js +68 -0
- package/dist/crypto-rn-CAPL7MYC.js +80 -0
- package/dist/crypto-rn-CBAKEB7C.js +68 -0
- package/dist/crypto-rn-CBWHV2F5.js +82 -0
- package/dist/crypto-rn-CS36MQ4X.js +77 -0
- package/dist/crypto-rn-E4RZNGIB.js +82 -0
- package/dist/crypto-rn-H4NIT5CT.js +70 -0
- package/dist/crypto-rn-IAC27WLZ.js +74 -0
- package/dist/crypto-rn-LLY6FCWE.js +82 -0
- package/dist/crypto-rn-MOWVVG3L.js +78 -0
- package/dist/crypto-rn-OAPLHNM5.js +73 -0
- package/dist/crypto-rn-PVAG5TVH.js +80 -0
- package/dist/crypto-rn-QLVBL5DI.js +75 -0
- package/dist/crypto-rn-TBKXR3SR.js +68 -0
- package/dist/crypto-rn-TSQJA6A3.js +81 -0
- package/dist/crypto-rn-U3XEJXIM.js +77 -0
- package/dist/crypto-rn-UHTZEVAR.js +74 -0
- package/dist/crypto-rn-V3ZNQSFI.js +79 -0
- package/dist/crypto-rn-VGNP6VZW.js +75 -0
- package/dist/crypto-rn-XMYCUEGV.js +72 -0
- package/dist/crypto-rn-YPOTC5RI.js +73 -0
- package/dist/index.cjs +91 -114
- package/dist/index.d.ts +30 -17
- package/dist/index.js +90 -104
- package/package.json +2 -1
- package/src/crypto/NodeKeyCache.ts +18 -15
- package/src/crypto/crypto.ts +72 -78
- package/src/requester/Requester.ts +9 -13
- package/src/utils/base64.ts +51 -2
|
@@ -0,0 +1,601 @@
|
|
|
1
|
+
// src/LightsparkException.ts
|
|
2
|
+
var LightsparkException = class extends Error {
|
|
3
|
+
code;
|
|
4
|
+
message;
|
|
5
|
+
extraInfo;
|
|
6
|
+
constructor(code, message, extraInfo) {
|
|
7
|
+
super(message);
|
|
8
|
+
this.code = code;
|
|
9
|
+
this.message = message;
|
|
10
|
+
this.extraInfo = extraInfo;
|
|
11
|
+
}
|
|
12
|
+
};
|
|
13
|
+
var LightsparkException_default = LightsparkException;
|
|
14
|
+
|
|
15
|
+
// src/auth/LightsparkAuthException.ts
|
|
16
|
+
var LightsparkAuthException = class extends LightsparkException_default {
|
|
17
|
+
constructor(message, extraInfo) {
|
|
18
|
+
super("AuthException", message, extraInfo);
|
|
19
|
+
}
|
|
20
|
+
};
|
|
21
|
+
var LightsparkAuthException_default = LightsparkAuthException;
|
|
22
|
+
|
|
23
|
+
// src/auth/StubAuthProvider.ts
|
|
24
|
+
var StubAuthProvider = class {
|
|
25
|
+
async addAuthHeaders(headers) {
|
|
26
|
+
return headers;
|
|
27
|
+
}
|
|
28
|
+
async isAuthorized() {
|
|
29
|
+
return false;
|
|
30
|
+
}
|
|
31
|
+
async addWsConnectionParams(params) {
|
|
32
|
+
return params;
|
|
33
|
+
}
|
|
34
|
+
};
|
|
35
|
+
|
|
36
|
+
// src/utils/base64.ts
|
|
37
|
+
var chars = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";
|
|
38
|
+
var Base64 = {
|
|
39
|
+
btoa: (input = "") => {
|
|
40
|
+
let str = input;
|
|
41
|
+
let output = "";
|
|
42
|
+
for (let block = 0, charCode, i = 0, map = chars; str.charAt(i | 0) || (map = "=", i % 1); output += map.charAt(63 & block >> 8 - i % 1 * 8)) {
|
|
43
|
+
charCode = str.charCodeAt(i += 3 / 4);
|
|
44
|
+
if (charCode > 255) {
|
|
45
|
+
throw new Error("'btoa' failed: The string to be encoded contains characters outside of the Latin1 range.");
|
|
46
|
+
}
|
|
47
|
+
block = block << 8 | charCode;
|
|
48
|
+
}
|
|
49
|
+
return output;
|
|
50
|
+
},
|
|
51
|
+
atob: (input = "") => {
|
|
52
|
+
let str = input.replace(/=+$/, "");
|
|
53
|
+
let output = "";
|
|
54
|
+
if (str.length % 4 == 1) {
|
|
55
|
+
throw new Error("'atob' failed: The string to be decoded is not correctly encoded.");
|
|
56
|
+
}
|
|
57
|
+
for (let bc = 0, bs = 0, buffer, i = 0; buffer = str.charAt(i++); ~buffer && (bs = bc % 4 ? bs * 64 + buffer : buffer, bc++ % 4) ? output += String.fromCharCode(255 & bs >> (-2 * bc & 6)) : 0) {
|
|
58
|
+
buffer = chars.indexOf(buffer);
|
|
59
|
+
}
|
|
60
|
+
return output;
|
|
61
|
+
}
|
|
62
|
+
};
|
|
63
|
+
var b64decode = (encoded) => {
|
|
64
|
+
return Uint8Array.from(Base64.atob(encoded), (c) => c.charCodeAt(0));
|
|
65
|
+
};
|
|
66
|
+
var urlsafe_b64decode = (encoded) => {
|
|
67
|
+
return b64decode(encoded.replace(/_/g, "/").replace(/-/g, "+"));
|
|
68
|
+
};
|
|
69
|
+
var b64encode = (data) => {
|
|
70
|
+
return Base64.btoa(
|
|
71
|
+
String.fromCharCode.apply(null, Array.from(new Uint8Array(data)))
|
|
72
|
+
);
|
|
73
|
+
};
|
|
74
|
+
|
|
75
|
+
// src/crypto/LightsparkSigningException.ts
|
|
76
|
+
var LightsparkSigningException = class extends LightsparkException_default {
|
|
77
|
+
constructor(message, extraInfo) {
|
|
78
|
+
super("SigningException", message, extraInfo);
|
|
79
|
+
}
|
|
80
|
+
};
|
|
81
|
+
var LightsparkSigningException_default = LightsparkSigningException;
|
|
82
|
+
|
|
83
|
+
// src/crypto/crypto.ts
|
|
84
|
+
var getCrypto = () => {
|
|
85
|
+
let cryptoImplPromise;
|
|
86
|
+
if (typeof crypto !== "undefined") {
|
|
87
|
+
cryptoImplPromise = Promise.resolve(crypto);
|
|
88
|
+
} else {
|
|
89
|
+
cryptoImplPromise = import("crypto").then((nodeCrypto) => {
|
|
90
|
+
return nodeCrypto;
|
|
91
|
+
});
|
|
92
|
+
}
|
|
93
|
+
return cryptoImplPromise;
|
|
94
|
+
};
|
|
95
|
+
var getRandomValues32 = async (arr) => {
|
|
96
|
+
if (typeof crypto !== "undefined") {
|
|
97
|
+
return crypto.getRandomValues(arr);
|
|
98
|
+
} else {
|
|
99
|
+
const cryptoImpl = await getCrypto();
|
|
100
|
+
return cryptoImpl.getRandomValues(arr);
|
|
101
|
+
}
|
|
102
|
+
};
|
|
103
|
+
var deriveKey = async (password, salt, iterations, algorithm, bit_len) => {
|
|
104
|
+
const enc = new TextEncoder();
|
|
105
|
+
const cryptoImpl = await getCrypto();
|
|
106
|
+
const password_key = await cryptoImpl.subtle.importKey(
|
|
107
|
+
"raw",
|
|
108
|
+
enc.encode(password),
|
|
109
|
+
"PBKDF2",
|
|
110
|
+
false,
|
|
111
|
+
["deriveBits", "deriveKey"]
|
|
112
|
+
);
|
|
113
|
+
const derived = await cryptoImpl.subtle.deriveBits(
|
|
114
|
+
{
|
|
115
|
+
name: "PBKDF2",
|
|
116
|
+
salt,
|
|
117
|
+
iterations,
|
|
118
|
+
hash: "SHA-256"
|
|
119
|
+
},
|
|
120
|
+
password_key,
|
|
121
|
+
bit_len
|
|
122
|
+
);
|
|
123
|
+
const key = await cryptoImpl.subtle.importKey(
|
|
124
|
+
"raw",
|
|
125
|
+
derived.slice(0, 32),
|
|
126
|
+
{ name: algorithm, length: 256 },
|
|
127
|
+
false,
|
|
128
|
+
["encrypt", "decrypt"]
|
|
129
|
+
);
|
|
130
|
+
const iv = derived.slice(32);
|
|
131
|
+
return [key, iv];
|
|
132
|
+
};
|
|
133
|
+
var decrypt = async (header_json, ciphertext, password) => {
|
|
134
|
+
var decoded = b64decode(ciphertext);
|
|
135
|
+
var header;
|
|
136
|
+
if (header_json === "AES_256_CBC_PBKDF2_5000_SHA256") {
|
|
137
|
+
header = {
|
|
138
|
+
v: 0,
|
|
139
|
+
i: 5e3
|
|
140
|
+
};
|
|
141
|
+
decoded = decoded.slice(8);
|
|
142
|
+
} else {
|
|
143
|
+
header = JSON.parse(header_json);
|
|
144
|
+
}
|
|
145
|
+
if (header.v < 0 || header.v > 4) {
|
|
146
|
+
throw new LightsparkException_default(
|
|
147
|
+
"DecryptionError",
|
|
148
|
+
"Unknown version ".concat(header.v)
|
|
149
|
+
);
|
|
150
|
+
}
|
|
151
|
+
const cryptoImpl = await getCrypto();
|
|
152
|
+
const algorithm = header.v < 2 ? "AES-CBC" : "AES-GCM";
|
|
153
|
+
const bit_len = header.v < 4 ? 384 : 352;
|
|
154
|
+
const salt_len = header.v < 4 ? 8 : 16;
|
|
155
|
+
if (header.lsv === 2 || header.v === 3) {
|
|
156
|
+
const salt = decoded.slice(decoded.length - 8, decoded.length);
|
|
157
|
+
const nonce = decoded.slice(0, 12);
|
|
158
|
+
const cipherText = decoded.slice(12, decoded.length - 8);
|
|
159
|
+
const [key, _iv] = await deriveKey(
|
|
160
|
+
password,
|
|
161
|
+
salt,
|
|
162
|
+
header.i,
|
|
163
|
+
algorithm,
|
|
164
|
+
256
|
|
165
|
+
);
|
|
166
|
+
return await cryptoImpl.subtle.decrypt(
|
|
167
|
+
{ name: algorithm, iv: nonce.buffer },
|
|
168
|
+
key,
|
|
169
|
+
cipherText
|
|
170
|
+
);
|
|
171
|
+
} else {
|
|
172
|
+
const salt = decoded.slice(0, salt_len);
|
|
173
|
+
const encrypted = decoded.slice(salt_len);
|
|
174
|
+
const [key, iv] = await deriveKey(
|
|
175
|
+
password,
|
|
176
|
+
salt,
|
|
177
|
+
header.i,
|
|
178
|
+
algorithm,
|
|
179
|
+
bit_len
|
|
180
|
+
);
|
|
181
|
+
return await cryptoImpl.subtle.decrypt(
|
|
182
|
+
{ name: algorithm, iv },
|
|
183
|
+
key,
|
|
184
|
+
encrypted
|
|
185
|
+
);
|
|
186
|
+
}
|
|
187
|
+
};
|
|
188
|
+
async function decryptSecretWithNodePassword(cipher, encryptedSecret, nodePassword) {
|
|
189
|
+
const cryptoImpl = await getCrypto();
|
|
190
|
+
if (!cryptoImpl.subtle) {
|
|
191
|
+
return (await import("./crypto-rn-MOWVVG3L.js")).decryptSecretWithNodePassword(
|
|
192
|
+
cipher,
|
|
193
|
+
encryptedSecret,
|
|
194
|
+
nodePassword
|
|
195
|
+
);
|
|
196
|
+
}
|
|
197
|
+
let decryptedValue = null;
|
|
198
|
+
try {
|
|
199
|
+
decryptedValue = await decrypt(cipher, encryptedSecret, nodePassword);
|
|
200
|
+
} catch (ex) {
|
|
201
|
+
console.error(ex);
|
|
202
|
+
}
|
|
203
|
+
return decryptedValue;
|
|
204
|
+
}
|
|
205
|
+
var generateSigningKeyPair = async () => {
|
|
206
|
+
const cryptoImpl = await getCrypto();
|
|
207
|
+
if (!cryptoImpl.subtle) {
|
|
208
|
+
return (await import("./crypto-rn-MOWVVG3L.js")).generateSigningKeyPair();
|
|
209
|
+
}
|
|
210
|
+
return await cryptoImpl.subtle.generateKey(
|
|
211
|
+
/*algorithm:*/
|
|
212
|
+
{
|
|
213
|
+
name: "RSA-PSS",
|
|
214
|
+
modulusLength: 4096,
|
|
215
|
+
publicExponent: new Uint8Array([1, 0, 1]),
|
|
216
|
+
hash: "SHA-256"
|
|
217
|
+
},
|
|
218
|
+
/*extractable*/
|
|
219
|
+
true,
|
|
220
|
+
/*keyUsages*/
|
|
221
|
+
["sign", "verify"]
|
|
222
|
+
);
|
|
223
|
+
};
|
|
224
|
+
var serializeSigningKey = async (key, format) => {
|
|
225
|
+
const cryptoImpl = await getCrypto();
|
|
226
|
+
if (!cryptoImpl.subtle) {
|
|
227
|
+
return (await import("./crypto-rn-MOWVVG3L.js")).serializeSigningKey(
|
|
228
|
+
key,
|
|
229
|
+
format
|
|
230
|
+
);
|
|
231
|
+
}
|
|
232
|
+
return await cryptoImpl.subtle.exportKey(
|
|
233
|
+
/*format*/
|
|
234
|
+
format,
|
|
235
|
+
/*key*/
|
|
236
|
+
key
|
|
237
|
+
);
|
|
238
|
+
};
|
|
239
|
+
var getNonce = async () => {
|
|
240
|
+
const nonceSt = await getRandomValues32(new Uint32Array(1));
|
|
241
|
+
return Number(nonceSt);
|
|
242
|
+
};
|
|
243
|
+
var sign = async (key, data) => {
|
|
244
|
+
const cryptoImpl = await getCrypto();
|
|
245
|
+
if (!cryptoImpl.subtle) {
|
|
246
|
+
console.log(typeof key, key);
|
|
247
|
+
return (await import("./crypto-rn-MOWVVG3L.js")).sign(key, data);
|
|
248
|
+
}
|
|
249
|
+
return await cryptoImpl.subtle.sign(
|
|
250
|
+
{
|
|
251
|
+
name: "RSA-PSS",
|
|
252
|
+
saltLength: 32
|
|
253
|
+
},
|
|
254
|
+
key,
|
|
255
|
+
data
|
|
256
|
+
);
|
|
257
|
+
};
|
|
258
|
+
var importPrivateSigningKey = async (keyData, format) => {
|
|
259
|
+
const cryptoImpl = await getCrypto();
|
|
260
|
+
if (!cryptoImpl.subtle) {
|
|
261
|
+
return (await import("./crypto-rn-MOWVVG3L.js")).importPrivateSigningKey(
|
|
262
|
+
keyData,
|
|
263
|
+
format
|
|
264
|
+
);
|
|
265
|
+
}
|
|
266
|
+
return await cryptoImpl.subtle.importKey(
|
|
267
|
+
/*format*/
|
|
268
|
+
format,
|
|
269
|
+
/*keyData*/
|
|
270
|
+
keyData,
|
|
271
|
+
/*algorithm*/
|
|
272
|
+
{
|
|
273
|
+
name: "RSA-PSS",
|
|
274
|
+
hash: "SHA-256"
|
|
275
|
+
},
|
|
276
|
+
/*extractable*/
|
|
277
|
+
true,
|
|
278
|
+
/*keyUsages*/
|
|
279
|
+
["sign"]
|
|
280
|
+
);
|
|
281
|
+
};
|
|
282
|
+
|
|
283
|
+
// src/crypto/NodeKeyCache.ts
|
|
284
|
+
import autoBind from "auto-bind";
|
|
285
|
+
var NodeKeyCache = class {
|
|
286
|
+
idToKey;
|
|
287
|
+
constructor() {
|
|
288
|
+
this.idToKey = /* @__PURE__ */ new Map();
|
|
289
|
+
autoBind(this);
|
|
290
|
+
}
|
|
291
|
+
async loadKey(id, rawKey, format = "pkcs8") {
|
|
292
|
+
const decoded = b64decode(rawKey);
|
|
293
|
+
try {
|
|
294
|
+
const key = await importPrivateSigningKey(decoded, format);
|
|
295
|
+
this.idToKey.set(id, key);
|
|
296
|
+
return key;
|
|
297
|
+
} catch (e) {
|
|
298
|
+
console.log("Error importing key: ", e);
|
|
299
|
+
}
|
|
300
|
+
return null;
|
|
301
|
+
}
|
|
302
|
+
getKey(id) {
|
|
303
|
+
return this.idToKey.get(id);
|
|
304
|
+
}
|
|
305
|
+
hasKey(id) {
|
|
306
|
+
return this.idToKey.has(id);
|
|
307
|
+
}
|
|
308
|
+
};
|
|
309
|
+
var NodeKeyCache_default = NodeKeyCache;
|
|
310
|
+
|
|
311
|
+
// src/requester/Requester.ts
|
|
312
|
+
import autoBind2 from "auto-bind";
|
|
313
|
+
import dayjs from "dayjs";
|
|
314
|
+
import utc from "dayjs/plugin/utc.js";
|
|
315
|
+
import { createClient } from "graphql-ws";
|
|
316
|
+
import NodeWebSocket from "ws";
|
|
317
|
+
import { Observable } from "zen-observable-ts";
|
|
318
|
+
|
|
319
|
+
// src/utils/environment.ts
|
|
320
|
+
var isBrowser = typeof window !== "undefined" && typeof window.document !== "undefined";
|
|
321
|
+
var isNode = typeof process !== "undefined" && process.versions != null && process.versions.node != null;
|
|
322
|
+
|
|
323
|
+
// src/requester/Requester.ts
|
|
324
|
+
var DEFAULT_BASE_URL = "api.lightspark.com";
|
|
325
|
+
var LIGHTSPARK_BETA_HEADER_KEY = "X-Lightspark-Beta";
|
|
326
|
+
var LIGHTSPARK_BETA_HEADER_VALUE = "z2h0BBYxTA83cjW7fi8QwWtBPCzkQKiemcuhKY08LOo";
|
|
327
|
+
dayjs.extend(utc);
|
|
328
|
+
var Requester = class {
|
|
329
|
+
constructor(nodeKeyCache, schemaEndpoint, sdkUserAgent, authProvider = new StubAuthProvider(), baseUrl = DEFAULT_BASE_URL) {
|
|
330
|
+
this.nodeKeyCache = nodeKeyCache;
|
|
331
|
+
this.schemaEndpoint = schemaEndpoint;
|
|
332
|
+
this.sdkUserAgent = sdkUserAgent;
|
|
333
|
+
this.authProvider = authProvider;
|
|
334
|
+
this.baseUrl = baseUrl;
|
|
335
|
+
let websocketImpl;
|
|
336
|
+
if (typeof WebSocket === "undefined" && typeof window === "undefined") {
|
|
337
|
+
websocketImpl = NodeWebSocket;
|
|
338
|
+
}
|
|
339
|
+
this.wsClient = createClient({
|
|
340
|
+
url: `wss://${this.baseUrl}/${this.schemaEndpoint}`,
|
|
341
|
+
connectionParams: () => authProvider.addWsConnectionParams({}),
|
|
342
|
+
webSocketImpl: websocketImpl
|
|
343
|
+
});
|
|
344
|
+
autoBind2(this);
|
|
345
|
+
}
|
|
346
|
+
wsClient;
|
|
347
|
+
async executeQuery(query) {
|
|
348
|
+
const data = await this.makeRawRequest(
|
|
349
|
+
query.queryPayload,
|
|
350
|
+
query.variables || {},
|
|
351
|
+
query.signingNodeId
|
|
352
|
+
);
|
|
353
|
+
return query.constructObject(data);
|
|
354
|
+
}
|
|
355
|
+
subscribe(queryPayload, variables = {}) {
|
|
356
|
+
const operationNameRegex = /^\s*(query|mutation|subscription)\s+(\w+)/i;
|
|
357
|
+
const operationMatch = queryPayload.match(operationNameRegex);
|
|
358
|
+
if (!operationMatch || operationMatch.length < 3) {
|
|
359
|
+
throw new LightsparkException_default("InvalidQuery", "Invalid query payload");
|
|
360
|
+
}
|
|
361
|
+
const operationType = operationMatch[1];
|
|
362
|
+
if (operationType == "mutation") {
|
|
363
|
+
throw new LightsparkException_default(
|
|
364
|
+
"InvalidQuery",
|
|
365
|
+
"Mutation queries should call makeRawRequest instead"
|
|
366
|
+
);
|
|
367
|
+
}
|
|
368
|
+
for (const key in variables) {
|
|
369
|
+
if (variables[key] === void 0) {
|
|
370
|
+
variables[key] = null;
|
|
371
|
+
}
|
|
372
|
+
}
|
|
373
|
+
const operation = operationMatch[2];
|
|
374
|
+
let bodyData = {
|
|
375
|
+
query: queryPayload,
|
|
376
|
+
variables,
|
|
377
|
+
operationName: operation
|
|
378
|
+
};
|
|
379
|
+
return new Observable(
|
|
380
|
+
(observer) => this.wsClient.subscribe(bodyData, {
|
|
381
|
+
next: (data) => observer.next(data),
|
|
382
|
+
error: (err) => observer.error(err),
|
|
383
|
+
complete: () => observer.complete()
|
|
384
|
+
})
|
|
385
|
+
);
|
|
386
|
+
}
|
|
387
|
+
async makeRawRequest(queryPayload, variables = {}, signingNodeId = void 0) {
|
|
388
|
+
const operationNameRegex = /^\s*(query|mutation|subscription)\s+(\w+)/i;
|
|
389
|
+
const operationMatch = queryPayload.match(operationNameRegex);
|
|
390
|
+
if (!operationMatch || operationMatch.length < 3) {
|
|
391
|
+
throw new LightsparkException_default("InvalidQuery", "Invalid query payload");
|
|
392
|
+
}
|
|
393
|
+
const operationType = operationMatch[1];
|
|
394
|
+
if (operationType == "subscription") {
|
|
395
|
+
throw new LightsparkException_default(
|
|
396
|
+
"InvalidQuery",
|
|
397
|
+
"Subscription queries should call subscribe instead"
|
|
398
|
+
);
|
|
399
|
+
}
|
|
400
|
+
for (const key in variables) {
|
|
401
|
+
if (variables[key] === void 0) {
|
|
402
|
+
variables[key] = null;
|
|
403
|
+
}
|
|
404
|
+
}
|
|
405
|
+
const operation = operationMatch[2];
|
|
406
|
+
let bodyData = {
|
|
407
|
+
query: queryPayload,
|
|
408
|
+
variables,
|
|
409
|
+
operationName: operation
|
|
410
|
+
};
|
|
411
|
+
const browserUserAgent = typeof navigator !== "undefined" ? navigator.userAgent : "";
|
|
412
|
+
const sdkUserAgent = this.getSdkUserAgent();
|
|
413
|
+
const headers = await this.authProvider.addAuthHeaders({
|
|
414
|
+
"Content-Type": "application/json",
|
|
415
|
+
[LIGHTSPARK_BETA_HEADER_KEY]: LIGHTSPARK_BETA_HEADER_VALUE,
|
|
416
|
+
"X-Lightspark-SDK": sdkUserAgent,
|
|
417
|
+
"User-Agent": browserUserAgent || sdkUserAgent
|
|
418
|
+
});
|
|
419
|
+
bodyData = await this.addSigningDataIfNeeded(
|
|
420
|
+
bodyData,
|
|
421
|
+
headers,
|
|
422
|
+
signingNodeId
|
|
423
|
+
);
|
|
424
|
+
const response = await fetch(
|
|
425
|
+
`https://${this.baseUrl}/${this.schemaEndpoint}`,
|
|
426
|
+
{
|
|
427
|
+
method: "POST",
|
|
428
|
+
headers,
|
|
429
|
+
body: JSON.stringify(bodyData)
|
|
430
|
+
}
|
|
431
|
+
);
|
|
432
|
+
if (!response.ok) {
|
|
433
|
+
throw new LightsparkException_default(
|
|
434
|
+
"RequestFailed",
|
|
435
|
+
`Request ${operation} failed. ${response.statusText}`
|
|
436
|
+
);
|
|
437
|
+
}
|
|
438
|
+
const responseJson = await response.json();
|
|
439
|
+
const data = responseJson.data;
|
|
440
|
+
if (!data) {
|
|
441
|
+
throw new LightsparkException_default(
|
|
442
|
+
"RequestFailed",
|
|
443
|
+
`Request ${operation} failed. ${JSON.stringify(responseJson.errors)}`
|
|
444
|
+
);
|
|
445
|
+
}
|
|
446
|
+
return data;
|
|
447
|
+
}
|
|
448
|
+
getSdkUserAgent() {
|
|
449
|
+
const platform = isNode ? "NodeJS" : "Browser";
|
|
450
|
+
const platformVersion = isNode ? process.version : "";
|
|
451
|
+
return `${this.sdkUserAgent} ${platform}/${platformVersion}`;
|
|
452
|
+
}
|
|
453
|
+
async addSigningDataIfNeeded(queryPayload, headers, signingNodeId) {
|
|
454
|
+
if (!signingNodeId) {
|
|
455
|
+
return queryPayload;
|
|
456
|
+
}
|
|
457
|
+
const query = queryPayload.query;
|
|
458
|
+
const variables = queryPayload.variables;
|
|
459
|
+
const operationName = queryPayload.operationName;
|
|
460
|
+
const nonce = await getNonce();
|
|
461
|
+
const expiration = dayjs.utc().add(1, "hour").format();
|
|
462
|
+
const payload = {
|
|
463
|
+
query,
|
|
464
|
+
variables,
|
|
465
|
+
operationName,
|
|
466
|
+
nonce,
|
|
467
|
+
expires_at: expiration
|
|
468
|
+
};
|
|
469
|
+
const key = await this.nodeKeyCache.getKey(signingNodeId);
|
|
470
|
+
if (!key) {
|
|
471
|
+
throw new LightsparkSigningException_default(
|
|
472
|
+
"Missing node of encrypted_signing_private_key"
|
|
473
|
+
);
|
|
474
|
+
}
|
|
475
|
+
if (typeof TextEncoder === "undefined") {
|
|
476
|
+
const TextEncoder2 = (await import("text-encoding")).TextEncoder;
|
|
477
|
+
}
|
|
478
|
+
;
|
|
479
|
+
const encodedPayload = new TextEncoder().encode(JSON.stringify(payload));
|
|
480
|
+
const signedPayload = await sign(key, encodedPayload);
|
|
481
|
+
const encodedSignedPayload = b64encode(signedPayload);
|
|
482
|
+
headers["X-Lightspark-Signing"] = JSON.stringify({
|
|
483
|
+
v: "1",
|
|
484
|
+
signature: encodedSignedPayload
|
|
485
|
+
});
|
|
486
|
+
return payload;
|
|
487
|
+
}
|
|
488
|
+
};
|
|
489
|
+
var Requester_default = Requester;
|
|
490
|
+
|
|
491
|
+
// src/ServerEnvironment.ts
|
|
492
|
+
var ServerEnvironment = /* @__PURE__ */ ((ServerEnvironment2) => {
|
|
493
|
+
ServerEnvironment2["PRODUCTION"] = "production";
|
|
494
|
+
ServerEnvironment2["DEV"] = "dev";
|
|
495
|
+
return ServerEnvironment2;
|
|
496
|
+
})(ServerEnvironment || {});
|
|
497
|
+
var apiDomainForEnvironment = (environment) => {
|
|
498
|
+
switch (environment) {
|
|
499
|
+
case "dev" /* DEV */:
|
|
500
|
+
return "api.dev.dev.sparkinfra.net";
|
|
501
|
+
case "production" /* PRODUCTION */:
|
|
502
|
+
return "api.lightspark.com";
|
|
503
|
+
}
|
|
504
|
+
};
|
|
505
|
+
var ServerEnvironment_default = ServerEnvironment;
|
|
506
|
+
|
|
507
|
+
// src/utils/currency.ts
|
|
508
|
+
var CONVERSION_MAP = {
|
|
509
|
+
["BITCOIN" /* BITCOIN */]: {
|
|
510
|
+
["BITCOIN" /* BITCOIN */]: (v) => v,
|
|
511
|
+
["MICROBITCOIN" /* MICROBITCOIN */]: (v) => v * 1e6,
|
|
512
|
+
["MILLIBITCOIN" /* MILLIBITCOIN */]: (v) => v * 1e3,
|
|
513
|
+
["MILLISATOSHI" /* MILLISATOSHI */]: (v) => v * 1e11,
|
|
514
|
+
["NANOBITCOIN" /* NANOBITCOIN */]: (v) => v * 1e9,
|
|
515
|
+
["SATOSHI" /* SATOSHI */]: (v) => v * 1e8
|
|
516
|
+
},
|
|
517
|
+
["MICROBITCOIN" /* MICROBITCOIN */]: {
|
|
518
|
+
["BITCOIN" /* BITCOIN */]: (v) => Math.round(v / 1e6),
|
|
519
|
+
["MICROBITCOIN" /* MICROBITCOIN */]: (v) => v,
|
|
520
|
+
["MILLIBITCOIN" /* MILLIBITCOIN */]: (v) => Math.round(v / 1e3),
|
|
521
|
+
["MILLISATOSHI" /* MILLISATOSHI */]: (v) => v * 1e5,
|
|
522
|
+
["NANOBITCOIN" /* NANOBITCOIN */]: (v) => v * 1e3,
|
|
523
|
+
["SATOSHI" /* SATOSHI */]: (v) => v * 100
|
|
524
|
+
},
|
|
525
|
+
["MILLIBITCOIN" /* MILLIBITCOIN */]: {
|
|
526
|
+
["BITCOIN" /* BITCOIN */]: (v) => Math.round(v / 1e3),
|
|
527
|
+
["MICROBITCOIN" /* MICROBITCOIN */]: (v) => v * 1e3,
|
|
528
|
+
["MILLIBITCOIN" /* MILLIBITCOIN */]: (v) => v,
|
|
529
|
+
["MILLISATOSHI" /* MILLISATOSHI */]: (v) => v * 1e8,
|
|
530
|
+
["NANOBITCOIN" /* NANOBITCOIN */]: (v) => v * 1e6,
|
|
531
|
+
["SATOSHI" /* SATOSHI */]: (v) => v * 1e5
|
|
532
|
+
},
|
|
533
|
+
["MILLISATOSHI" /* MILLISATOSHI */]: {
|
|
534
|
+
["BITCOIN" /* BITCOIN */]: (v) => Math.round(v / 1e11),
|
|
535
|
+
["MICROBITCOIN" /* MICROBITCOIN */]: (v) => Math.round(v / 1e5),
|
|
536
|
+
["MILLIBITCOIN" /* MILLIBITCOIN */]: (v) => Math.round(v / 1e8),
|
|
537
|
+
["MILLISATOSHI" /* MILLISATOSHI */]: (v) => v,
|
|
538
|
+
["NANOBITCOIN" /* NANOBITCOIN */]: (v) => Math.round(v / 100),
|
|
539
|
+
["SATOSHI" /* SATOSHI */]: (v) => Math.round(v / 1e3)
|
|
540
|
+
},
|
|
541
|
+
["NANOBITCOIN" /* NANOBITCOIN */]: {
|
|
542
|
+
["BITCOIN" /* BITCOIN */]: (v) => Math.round(v / 1e9),
|
|
543
|
+
["MICROBITCOIN" /* MICROBITCOIN */]: (v) => Math.round(v / 1e3),
|
|
544
|
+
["MILLIBITCOIN" /* MILLIBITCOIN */]: (v) => Math.round(v / 1e6),
|
|
545
|
+
["MILLISATOSHI" /* MILLISATOSHI */]: (v) => v * 100,
|
|
546
|
+
["NANOBITCOIN" /* NANOBITCOIN */]: (v) => v,
|
|
547
|
+
["SATOSHI" /* SATOSHI */]: (v) => Math.round(v / 10)
|
|
548
|
+
},
|
|
549
|
+
["SATOSHI" /* SATOSHI */]: {
|
|
550
|
+
["BITCOIN" /* BITCOIN */]: (v) => Math.round(v / 1e8),
|
|
551
|
+
["MICROBITCOIN" /* MICROBITCOIN */]: (v) => Math.round(v / 100),
|
|
552
|
+
["MILLIBITCOIN" /* MILLIBITCOIN */]: (v) => Math.round(v / 1e5),
|
|
553
|
+
["MILLISATOSHI" /* MILLISATOSHI */]: (v) => v * 1e3,
|
|
554
|
+
["NANOBITCOIN" /* NANOBITCOIN */]: (v) => v * 10,
|
|
555
|
+
["SATOSHI" /* SATOSHI */]: (v) => v
|
|
556
|
+
}
|
|
557
|
+
};
|
|
558
|
+
var convertCurrencyAmount = (from, toUnit) => {
|
|
559
|
+
const conversionFn = CONVERSION_MAP[from.originalUnit][toUnit];
|
|
560
|
+
if (!conversionFn) {
|
|
561
|
+
throw new LightsparkException_default(
|
|
562
|
+
"CurrencyError",
|
|
563
|
+
`Cannot convert from ${from.originalUnit} to ${toUnit}`
|
|
564
|
+
);
|
|
565
|
+
}
|
|
566
|
+
return {
|
|
567
|
+
...from,
|
|
568
|
+
preferredCurrencyUnit: toUnit,
|
|
569
|
+
preferredCurrencyValueApprox: conversionFn(from.originalValue),
|
|
570
|
+
preferredCurrencyValueRounded: conversionFn(from.originalValue)
|
|
571
|
+
};
|
|
572
|
+
};
|
|
573
|
+
|
|
574
|
+
// src/utils/types.ts
|
|
575
|
+
var isType = (typename) => (node) => {
|
|
576
|
+
return node?.__typename === typename;
|
|
577
|
+
};
|
|
578
|
+
|
|
579
|
+
export {
|
|
580
|
+
LightsparkException_default,
|
|
581
|
+
LightsparkAuthException_default,
|
|
582
|
+
StubAuthProvider,
|
|
583
|
+
b64decode,
|
|
584
|
+
urlsafe_b64decode,
|
|
585
|
+
b64encode,
|
|
586
|
+
LightsparkSigningException_default,
|
|
587
|
+
decryptSecretWithNodePassword,
|
|
588
|
+
generateSigningKeyPair,
|
|
589
|
+
serializeSigningKey,
|
|
590
|
+
getNonce,
|
|
591
|
+
sign,
|
|
592
|
+
importPrivateSigningKey,
|
|
593
|
+
NodeKeyCache_default,
|
|
594
|
+
isBrowser,
|
|
595
|
+
isNode,
|
|
596
|
+
Requester_default,
|
|
597
|
+
apiDomainForEnvironment,
|
|
598
|
+
ServerEnvironment_default,
|
|
599
|
+
convertCurrencyAmount,
|
|
600
|
+
isType
|
|
601
|
+
};
|