@nmshd/runtime 1.4.1 → 2.0.0-alpha.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/Runtime.js +0 -3
- package/dist/Runtime.js.map +1 -1
- package/dist/buildInformation.js +5 -5
- package/dist/dataViews/DataViewExpander.d.ts +4 -4
- package/dist/dataViews/DataViewExpander.js +1 -1
- package/dist/dataViews/DataViewExpander.js.map +1 -1
- package/dist/events/consumption/RequestReceivedEvent.d.ts +3 -3
- package/dist/events/consumption/RequestReceivedEvent.js.map +1 -1
- package/dist/modules/MessageModule.js +2 -2
- package/dist/modules/MessageModule.js.map +1 -1
- package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByIdAndKey.js +2 -2
- package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByIdAndKey.js.map +1 -1
- package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByTruncatedReference.js +1 -1
- package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByTruncatedReference.js.map +1 -1
- package/dist/useCases/common/Schemas.js +8 -2
- package/dist/useCases/common/Schemas.js.map +1 -1
- package/dist/useCases/common/UseCase.js +1 -1
- package/dist/useCases/common/UseCase.js.map +1 -1
- package/dist/useCases/consumption/drafts/UpdateDraft.js +1 -1
- package/dist/useCases/consumption/drafts/UpdateDraft.js.map +1 -1
- package/dist/useCases/consumption/relationshipInfo/CreateRelationshipInfo.js +2 -2
- package/dist/useCases/consumption/relationshipInfo/CreateRelationshipInfo.js.map +1 -1
- package/dist/useCases/consumption/relationshipInfo/UpdateRelationshipInfo.js +1 -1
- package/dist/useCases/consumption/relationshipInfo/UpdateRelationshipInfo.js.map +1 -1
- package/dist/useCases/consumption/settings/UpdateSetting.js +1 -1
- package/dist/useCases/consumption/settings/UpdateSetting.js.map +1 -1
- package/dist/useCases/consumption/sharedItems/CreateSharedItem.js +1 -1
- package/dist/useCases/consumption/sharedItems/CreateSharedItem.js.map +1 -1
- package/dist/useCases/transport/challenges/ValidateChallange.js +8 -8
- package/dist/useCases/transport/challenges/ValidateChallange.js.map +1 -1
- package/dist/useCases/transport/devices/CreateDeviceOnboardingToken.js +2 -2
- package/dist/useCases/transport/devices/CreateDeviceOnboardingToken.js.map +1 -1
- package/dist/useCases/transport/devices/DeviceMapper.d.ts +1 -1
- package/dist/useCases/transport/devices/DeviceMapper.js +6 -6
- package/dist/useCases/transport/devices/DeviceMapper.js.map +1 -1
- package/dist/useCases/transport/files/CreateTokenForFile.js +2 -2
- package/dist/useCases/transport/files/CreateTokenForFile.js.map +1 -1
- package/dist/useCases/transport/files/CreateTokenQrCodeForFile.js +2 -2
- package/dist/useCases/transport/files/CreateTokenQrCodeForFile.js.map +1 -1
- package/dist/useCases/transport/files/LoadPeerFile.js +1 -1
- package/dist/useCases/transport/files/LoadPeerFile.js.map +1 -1
- package/dist/useCases/transport/relationshipTemplates/CreateTokenForOwnRelationshipTemplate.js +2 -2
- package/dist/useCases/transport/relationshipTemplates/CreateTokenForOwnRelationshipTemplate.js.map +1 -1
- package/dist/useCases/transport/relationshipTemplates/CreateTokenQrCodeForOwnRelationshipTemplate.js +2 -2
- package/dist/useCases/transport/relationshipTemplates/CreateTokenQrCodeForOwnRelationshipTemplate.js.map +1 -1
- package/dist/useCases/transport/relationshipTemplates/LoadPeerRelationshipTemplate.js +1 -1
- package/dist/useCases/transport/relationshipTemplates/LoadPeerRelationshipTemplate.js.map +1 -1
- package/dist/useCases/transport/tokens/CreateOwnToken.js +2 -2
- package/dist/useCases/transport/tokens/CreateOwnToken.js.map +1 -1
- package/dist/useCases/transport/tokens/GetQRCodeForToken.js +1 -1
- package/dist/useCases/transport/tokens/GetQRCodeForToken.js.map +1 -1
- package/dist/useCases/transport/tokens/GetToken.js +1 -1
- package/dist/useCases/transport/tokens/GetToken.js.map +1 -1
- package/dist/useCases/transport/tokens/GetTokens.js +1 -1
- package/dist/useCases/transport/tokens/GetTokens.js.map +1 -1
- package/dist/useCases/transport/tokens/LoadPeerToken.js +2 -2
- package/dist/useCases/transport/tokens/LoadPeerToken.js.map +1 -1
- package/dist/useCases/transport/tokens/TokenMapper.d.ts +2 -2
- package/dist/useCases/transport/tokens/TokenMapper.js +4 -4
- package/dist/useCases/transport/tokens/TokenMapper.js.map +1 -1
- package/lib-web/nmshd.runtime.js +63 -60
- package/lib-web/nmshd.runtime.js.map +1 -1
- package/lib-web/nmshd.runtime.min.js +1 -1
- package/lib-web/nmshd.runtime.min.js.map +1 -1
- package/package.json +9 -9
package/lib-web/nmshd.runtime.js
CHANGED
|
@@ -160,9 +160,6 @@ class Runtime {
|
|
|
160
160
|
typescript_ioc_1.Container.bind(consumption_1.RelationshipInfoController)
|
|
161
161
|
.factory(() => this.getConsumptionController().relationshipInfo)
|
|
162
162
|
.scope(typescript_ioc_1.Scope.Request);
|
|
163
|
-
typescript_ioc_1.Container.bind(consumption_1.RequestsController)
|
|
164
|
-
.factory(() => this.getConsumptionController().requests)
|
|
165
|
-
.scope(typescript_ioc_1.Scope.Request);
|
|
166
163
|
typescript_ioc_1.Container.bind(consumption_1.SettingsController)
|
|
167
164
|
.factory(() => this.getConsumptionController().settings)
|
|
168
165
|
.scope(typescript_ioc_1.Scope.Request);
|
|
@@ -329,11 +326,11 @@ const content_1 = __webpack_require__(/*! @nmshd/content */ "@nmshd/content");
|
|
|
329
326
|
const crypto_1 = __webpack_require__(/*! @nmshd/crypto */ "@nmshd/crypto");
|
|
330
327
|
const transport_1 = __webpack_require__(/*! @nmshd/transport */ "@nmshd/transport");
|
|
331
328
|
exports.buildInformation = {
|
|
332
|
-
version: "
|
|
333
|
-
build: "
|
|
334
|
-
date: "2022-04-
|
|
335
|
-
commit: "
|
|
336
|
-
dependencies: {"@js-soft/docdb-querytranslator":"1.0.1","@js-soft/logging-abstractions":"1.0.0","@js-soft/ts-serval":"
|
|
329
|
+
version: "2.0.0-alpha.1",
|
|
330
|
+
build: "46",
|
|
331
|
+
date: "2022-04-25T10:08:06+00:00",
|
|
332
|
+
commit: "0474534cfade1d0850bede8b45b1fc266c34616e",
|
|
333
|
+
dependencies: {"@js-soft/docdb-querytranslator":"1.0.1","@js-soft/logging-abstractions":"1.0.0","@js-soft/ts-serval":"2.0.3","@js-soft/ts-utils":"^1.1.1","@nmshd/consumption":"2.0.0-alpha.2","@nmshd/content":"2.0.0-alpha.8","@nmshd/crypto":"2.0.1","@nmshd/transport":"2.0.0-alpha.1","ajv":"^8.11.0","ajv-errors":"^3.0.0","ajv-formats":"^2.1.1","fluent-ts-validator":"3.0.3","json-stringify-safe":"^5.0.1","luxon":"^2.3.2","qrcode":"1.5.0","reflect-metadata":"0.1.13","ts-simple-nameof":"1.3.1","typescript-ioc":"3.2.2"},
|
|
337
334
|
libraries: {
|
|
338
335
|
serval: ts_serval_1.buildInformation,
|
|
339
336
|
consumption: consumption_1.buildInformation,
|
|
@@ -403,7 +400,7 @@ let DataViewExpander = class DataViewExpander {
|
|
|
403
400
|
return await this.expandMessageDTOs(content);
|
|
404
401
|
}
|
|
405
402
|
return await this.expandMessageDTO(content);
|
|
406
|
-
case "
|
|
403
|
+
case "AttributesRequest":
|
|
407
404
|
if (content instanceof Array) {
|
|
408
405
|
return await this.expandUnknownRequests(content);
|
|
409
406
|
}
|
|
@@ -3248,13 +3245,13 @@ class MessageModule extends RuntimeModule_1.RuntimeModule {
|
|
|
3248
3245
|
let event;
|
|
3249
3246
|
switch (type) {
|
|
3250
3247
|
case "Mail":
|
|
3251
|
-
const mail =
|
|
3248
|
+
const mail = content_1.Mail.from(message.content);
|
|
3252
3249
|
event = new MailReceivedEvent_1.MailReceivedEvent(messageReceivedEvent.eventTargetAddress, mail, message);
|
|
3253
3250
|
this.runtime.eventBus.publish(event);
|
|
3254
3251
|
this.logger.trace(`Published MailReceivedEvent for ${message.id}`);
|
|
3255
3252
|
break;
|
|
3256
3253
|
case "RequestMail":
|
|
3257
|
-
const requestMail =
|
|
3254
|
+
const requestMail = content_1.RequestMail.from(message.content);
|
|
3258
3255
|
event = new RequestMailReceivedEvent_1.RequestMailReceivedEvent(messageReceivedEvent.eventTargetAddress, requestMail, message);
|
|
3259
3256
|
this.runtime.eventBus.publish(event);
|
|
3260
3257
|
this.logger.trace(`Published RequestMailReceivedEvent for ${message.id}`);
|
|
@@ -3771,9 +3768,9 @@ let LoadPeerTokenAnonymousByIdAndKeyUseCase = class LoadPeerTokenAnonymousByIdAn
|
|
|
3771
3768
|
this.anonymousTokenController = anonymousTokenController;
|
|
3772
3769
|
}
|
|
3773
3770
|
async executeInternal(request) {
|
|
3774
|
-
const key =
|
|
3771
|
+
const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
|
|
3775
3772
|
const createdToken = await this.anonymousTokenController.loadPeerToken(transport_1.CoreId.from(request.id), key);
|
|
3776
|
-
return ts_utils_1.Result.ok(
|
|
3773
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(createdToken, true));
|
|
3777
3774
|
}
|
|
3778
3775
|
};
|
|
3779
3776
|
LoadPeerTokenAnonymousByIdAndKeyUseCase = __decorate([
|
|
@@ -3826,7 +3823,7 @@ let LoadPeerTokenAnonymousByTruncatedReferenceUseCase = class LoadPeerTokenAnony
|
|
|
3826
3823
|
}
|
|
3827
3824
|
async executeInternal(request) {
|
|
3828
3825
|
const createdToken = await this.anonymousTokenController.loadPeerTokenByTruncated(request.reference);
|
|
3829
|
-
return ts_utils_1.Result.ok(
|
|
3826
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(createdToken, true));
|
|
3830
3827
|
}
|
|
3831
3828
|
};
|
|
3832
3829
|
LoadPeerTokenAnonymousByTruncatedReferenceUseCase = __decorate([
|
|
@@ -4705,7 +4702,10 @@ exports.CreateRelationshipInfoRequest = {
|
|
|
4705
4702
|
"@type": {
|
|
4706
4703
|
"type": "string"
|
|
4707
4704
|
},
|
|
4708
|
-
"@
|
|
4705
|
+
"@context": {
|
|
4706
|
+
"type": "string"
|
|
4707
|
+
},
|
|
4708
|
+
"@version": {
|
|
4709
4709
|
"type": "string"
|
|
4710
4710
|
},
|
|
4711
4711
|
"name": {
|
|
@@ -4891,7 +4891,10 @@ exports.UpdateRelationshipInfoRequest = {
|
|
|
4891
4891
|
"@type": {
|
|
4892
4892
|
"type": "string"
|
|
4893
4893
|
},
|
|
4894
|
-
"@
|
|
4894
|
+
"@context": {
|
|
4895
|
+
"type": "string"
|
|
4896
|
+
},
|
|
4897
|
+
"@version": {
|
|
4895
4898
|
"type": "string"
|
|
4896
4899
|
},
|
|
4897
4900
|
"name": {
|
|
@@ -6397,7 +6400,7 @@ class UseCase {
|
|
|
6397
6400
|
if (error instanceof ts_serval_1.ParsingError || error instanceof ts_serval_1.ValidationError) {
|
|
6398
6401
|
runtimeError = RuntimeErrors_1.RuntimeErrors.serval.requestDeserialization(error.message);
|
|
6399
6402
|
}
|
|
6400
|
-
else if (error.message.match(/Type '.+' was not found within reflection classes. You might have to install a module first./)) {
|
|
6403
|
+
else if (error.message.match(/Type '.+' with version [0-9]+ was not found within reflection classes. You might have to install a module first./)) {
|
|
6401
6404
|
runtimeError = RuntimeErrors_1.RuntimeErrors.serval.unknownType(error.message);
|
|
6402
6405
|
}
|
|
6403
6406
|
else {
|
|
@@ -7656,7 +7659,7 @@ let UpdateDraftUseCase = class UpdateDraftUseCase extends common_1.UseCase {
|
|
|
7656
7659
|
if (!draft) {
|
|
7657
7660
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(consumption_1.Draft));
|
|
7658
7661
|
}
|
|
7659
|
-
draft.content =
|
|
7662
|
+
draft.content = ts_serval_1.Serializable.fromUnknown(request.content);
|
|
7660
7663
|
await this.draftController.updateDraft(draft);
|
|
7661
7664
|
await this.accountController.syncDatawallet();
|
|
7662
7665
|
return ts_utils_1.Result.ok(DraftMapper_1.DraftMapper.toDraftDTO(draft));
|
|
@@ -7795,8 +7798,8 @@ let CreateRelationshipInfoUseCase = class CreateRelationshipInfoUseCase extends
|
|
|
7795
7798
|
sharedItem: transport_1.CoreId.from(a.sharedItem)
|
|
7796
7799
|
});
|
|
7797
7800
|
}));
|
|
7798
|
-
const theme = request.theme === undefined ? undefined :
|
|
7799
|
-
const parameters =
|
|
7801
|
+
const theme = request.theme === undefined ? undefined : consumption_1.RelationshipTheme.from(request.theme);
|
|
7802
|
+
const parameters = consumption_1.RelationshipInfo.from({
|
|
7800
7803
|
id: await consumption_1.ConsumptionIds.relationshipInfo.generate(),
|
|
7801
7804
|
relationshipId: relationshipId,
|
|
7802
7805
|
attributes: attributes,
|
|
@@ -8224,7 +8227,7 @@ let UpdateRelationshipInfoUseCase = class UpdateRelationshipInfoUseCase extends
|
|
|
8224
8227
|
relationshipInfo.description = request.description === undefined ? relationshipInfo.description : request.description;
|
|
8225
8228
|
relationshipInfo.userTitle = request.userTitle === undefined ? relationshipInfo.userTitle : request.userTitle;
|
|
8226
8229
|
relationshipInfo.userDescription = request.userDescription === undefined ? relationshipInfo.userDescription : request.userDescription;
|
|
8227
|
-
relationshipInfo.theme = request.theme === undefined ? relationshipInfo.theme :
|
|
8230
|
+
relationshipInfo.theme = request.theme === undefined ? relationshipInfo.theme : consumption_1.RelationshipTheme.from(request.theme);
|
|
8228
8231
|
await this.relationshipInfoController.updateRelationshipInfo(relationshipInfo);
|
|
8229
8232
|
await this.accountController.syncDatawallet();
|
|
8230
8233
|
return ts_utils_1.Result.ok(RelationshipInfoMapper_1.RelationshipInfoMapper.toRelationshipInfoDTO(relationshipInfo));
|
|
@@ -8612,7 +8615,7 @@ let UpdateSettingUseCase = class UpdateSettingUseCase extends common_1.UseCase {
|
|
|
8612
8615
|
if (!setting) {
|
|
8613
8616
|
return ts_utils_1.Result.fail(__1.RuntimeErrors.general.recordNotFound(consumption_1.Setting));
|
|
8614
8617
|
}
|
|
8615
|
-
setting.value =
|
|
8618
|
+
setting.value = ts_serval_1.Serializable.fromUnknown(request.value);
|
|
8616
8619
|
await this.settingController.updateSetting(setting);
|
|
8617
8620
|
await this.accountController.syncDatawallet();
|
|
8618
8621
|
return ts_utils_1.Result.ok(SettingMapper_1.SettingMapper.toSettingDTO(setting));
|
|
@@ -8715,7 +8718,7 @@ let CreateSharedItemUseCase = class CreateSharedItemUseCase extends common_1.Use
|
|
|
8715
8718
|
this.accountController = accountController;
|
|
8716
8719
|
}
|
|
8717
8720
|
async executeInternal(request) {
|
|
8718
|
-
const sharedItem =
|
|
8721
|
+
const sharedItem = consumption_1.SharedItem.from({
|
|
8719
8722
|
id: await consumption_1.ConsumptionIds.sharedItem.generate(),
|
|
8720
8723
|
tags: request.tags,
|
|
8721
8724
|
sharedBy: transport_1.CoreAddress.from(request.sharedBy),
|
|
@@ -9985,28 +9988,28 @@ let Validator = class Validator extends common_1.SchemaValidator {
|
|
|
9985
9988
|
const validationResult = await super.validate(value);
|
|
9986
9989
|
if (validationResult.isInvalid())
|
|
9987
9990
|
return validationResult;
|
|
9988
|
-
const signatureValidationResult =
|
|
9991
|
+
const signatureValidationResult = this.validateSignature(value.signature);
|
|
9989
9992
|
if (signatureValidationResult.isError) {
|
|
9990
9993
|
validationResult.addFailures([new fluent_ts_validator_1.ValidationFailure(undefined, "signature", undefined, undefined, signatureValidationResult.error.message)]);
|
|
9991
9994
|
}
|
|
9992
|
-
const challengeValidationResult =
|
|
9995
|
+
const challengeValidationResult = this.validateChallenge(value.challengeString);
|
|
9993
9996
|
if (challengeValidationResult.isError) {
|
|
9994
9997
|
validationResult.addFailures([new fluent_ts_validator_1.ValidationFailure(undefined, "challenge", undefined, undefined, challengeValidationResult.error.message)]);
|
|
9995
9998
|
}
|
|
9996
9999
|
return validationResult;
|
|
9997
10000
|
}
|
|
9998
|
-
|
|
10001
|
+
validateSignature(signature) {
|
|
9999
10002
|
try {
|
|
10000
|
-
|
|
10003
|
+
crypto_1.CryptoSignature.fromBase64(signature);
|
|
10001
10004
|
return ts_utils_1.Result.ok(undefined);
|
|
10002
10005
|
}
|
|
10003
10006
|
catch {
|
|
10004
10007
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.challenges.invalidSignature());
|
|
10005
10008
|
}
|
|
10006
10009
|
}
|
|
10007
|
-
|
|
10010
|
+
validateChallenge(challenge) {
|
|
10008
10011
|
try {
|
|
10009
|
-
|
|
10012
|
+
transport_1.Challenge.deserialize(challenge);
|
|
10010
10013
|
return ts_utils_1.Result.ok(undefined);
|
|
10011
10014
|
}
|
|
10012
10015
|
catch {
|
|
@@ -10024,8 +10027,8 @@ let ValidateChallengeUseCase = class ValidateChallengeUseCase extends common_1.U
|
|
|
10024
10027
|
this.challengeController = challengeController;
|
|
10025
10028
|
}
|
|
10026
10029
|
async executeInternal(request) {
|
|
10027
|
-
const signature =
|
|
10028
|
-
const signedChallenge =
|
|
10030
|
+
const signature = crypto_1.CryptoSignature.fromBase64(request.signature);
|
|
10031
|
+
const signedChallenge = transport_1.ChallengeSigned.from({
|
|
10029
10032
|
challenge: request.challengeString,
|
|
10030
10033
|
signature: signature
|
|
10031
10034
|
});
|
|
@@ -10189,13 +10192,13 @@ let CreateDeviceOnboardingTokenUseCase = class CreateDeviceOnboardingTokenUseCas
|
|
|
10189
10192
|
async executeInternal(request) {
|
|
10190
10193
|
const sharedSecret = await this.devicesController.getSharedSecret(transport_1.CoreId.from(request.id));
|
|
10191
10194
|
const expiresAt = request.expiresAt ? transport_1.CoreDate.from(request.expiresAt) : transport_1.CoreDate.utc().add({ minutes: 5 });
|
|
10192
|
-
const tokenContent =
|
|
10195
|
+
const tokenContent = transport_1.TokenContentDeviceSharedSecret.from({ sharedSecret: sharedSecret });
|
|
10193
10196
|
const token = await this.tokenController.sendToken({
|
|
10194
10197
|
content: tokenContent,
|
|
10195
10198
|
expiresAt: expiresAt,
|
|
10196
10199
|
ephemeral: true
|
|
10197
10200
|
});
|
|
10198
|
-
return ts_utils_1.Result.ok(
|
|
10201
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, true));
|
|
10199
10202
|
}
|
|
10200
10203
|
};
|
|
10201
10204
|
CreateDeviceOnboardingTokenUseCase = __decorate([
|
|
@@ -10321,20 +10324,20 @@ class DeviceMapper {
|
|
|
10321
10324
|
username: deviceSharedSecret.username
|
|
10322
10325
|
};
|
|
10323
10326
|
}
|
|
10324
|
-
static
|
|
10325
|
-
const sharedSecret =
|
|
10327
|
+
static toDeviceSharedSecret(deviceOnboardingDTO) {
|
|
10328
|
+
const sharedSecret = transport_1.DeviceSharedSecret.from({
|
|
10326
10329
|
id: transport_1.CoreId.from(deviceOnboardingDTO.id),
|
|
10327
10330
|
createdAt: transport_1.CoreDate.from(deviceOnboardingDTO.createdAt),
|
|
10328
10331
|
createdByDevice: transport_1.CoreId.from(deviceOnboardingDTO.createdByDevice),
|
|
10329
10332
|
name: deviceOnboardingDTO.name,
|
|
10330
10333
|
description: deviceOnboardingDTO.description,
|
|
10331
|
-
secretBaseKey:
|
|
10334
|
+
secretBaseKey: crypto_1.CryptoSecretKey.fromBase64(deviceOnboardingDTO.secretBaseKey),
|
|
10332
10335
|
deviceIndex: deviceOnboardingDTO.deviceIndex,
|
|
10333
|
-
synchronizationKey:
|
|
10334
|
-
identityPrivateKey: deviceOnboardingDTO.identityPrivateKey ?
|
|
10336
|
+
synchronizationKey: crypto_1.CryptoSecretKey.fromBase64(deviceOnboardingDTO.synchronizationKey),
|
|
10337
|
+
identityPrivateKey: deviceOnboardingDTO.identityPrivateKey ? crypto_1.CryptoSignaturePrivateKey.deserialize(deviceOnboardingDTO.identityPrivateKey) : undefined,
|
|
10335
10338
|
identity: {
|
|
10336
10339
|
address: transport_1.CoreAddress.from(deviceOnboardingDTO.identity.address),
|
|
10337
|
-
publicKey:
|
|
10340
|
+
publicKey: crypto_1.CryptoSignaturePublicKey.deserialize(deviceOnboardingDTO.identity.publicKey),
|
|
10338
10341
|
realm: deviceOnboardingDTO.identity.realm
|
|
10339
10342
|
},
|
|
10340
10343
|
password: deviceOnboardingDTO.password,
|
|
@@ -10648,7 +10651,7 @@ let CreateTokenForFileUseCase = class CreateTokenForFileUseCase extends common_1
|
|
|
10648
10651
|
if (!file) {
|
|
10649
10652
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(transport_1.File));
|
|
10650
10653
|
}
|
|
10651
|
-
const tokenContent =
|
|
10654
|
+
const tokenContent = transport_1.TokenContentFile.from({
|
|
10652
10655
|
fileId: file.id,
|
|
10653
10656
|
secretKey: file.secretKey
|
|
10654
10657
|
});
|
|
@@ -10663,7 +10666,7 @@ let CreateTokenForFileUseCase = class CreateTokenForFileUseCase extends common_1
|
|
|
10663
10666
|
if (!ephemeral) {
|
|
10664
10667
|
await this.accountController.syncDatawallet();
|
|
10665
10668
|
}
|
|
10666
|
-
return ts_utils_1.Result.ok(
|
|
10669
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, ephemeral));
|
|
10667
10670
|
}
|
|
10668
10671
|
};
|
|
10669
10672
|
CreateTokenForFileUseCase = __decorate([
|
|
@@ -10728,7 +10731,7 @@ let CreateTokenQrCodeForFileUseCase = class CreateTokenQrCodeForFileUseCase exte
|
|
|
10728
10731
|
if (!file) {
|
|
10729
10732
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(transport_1.File));
|
|
10730
10733
|
}
|
|
10731
|
-
const tokenContent =
|
|
10734
|
+
const tokenContent = transport_1.TokenContentFile.from({
|
|
10732
10735
|
fileId: file.id,
|
|
10733
10736
|
secretKey: file.secretKey
|
|
10734
10737
|
});
|
|
@@ -10739,7 +10742,7 @@ let CreateTokenQrCodeForFileUseCase = class CreateTokenQrCodeForFileUseCase exte
|
|
|
10739
10742
|
expiresAt: tokenExpiry,
|
|
10740
10743
|
ephemeral: true
|
|
10741
10744
|
});
|
|
10742
|
-
const qrCode = await common_1.QRCode.from(
|
|
10745
|
+
const qrCode = await common_1.QRCode.from(token.truncate());
|
|
10743
10746
|
return ts_utils_1.Result.ok({ qrCodeBytes: qrCode.asBase64() });
|
|
10744
10747
|
}
|
|
10745
10748
|
};
|
|
@@ -11088,7 +11091,7 @@ let LoadPeerFileUseCase = class LoadPeerFileUseCase extends common_1.UseCase {
|
|
|
11088
11091
|
async executeInternal(request) {
|
|
11089
11092
|
let createdFile;
|
|
11090
11093
|
if (isLoadPeerFileViaSecret(request)) {
|
|
11091
|
-
const key =
|
|
11094
|
+
const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
|
|
11092
11095
|
createdFile = await this.loadFile(transport_1.CoreId.from(request.id), key);
|
|
11093
11096
|
}
|
|
11094
11097
|
else if (isLoadPeerFileViaReference(request)) {
|
|
@@ -12055,7 +12058,7 @@ let CreateTokenForOwnTemplateUseCase = class CreateTokenForOwnTemplateUseCase ex
|
|
|
12055
12058
|
if (!template.isOwn) {
|
|
12056
12059
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.relationshipTemplates.cannotCreateTokenForPeerTemplate());
|
|
12057
12060
|
}
|
|
12058
|
-
const tokenContent =
|
|
12061
|
+
const tokenContent = transport_1.TokenContentRelationshipTemplate.from({
|
|
12059
12062
|
templateId: template.id,
|
|
12060
12063
|
secretKey: template.secretKey
|
|
12061
12064
|
});
|
|
@@ -12070,7 +12073,7 @@ let CreateTokenForOwnTemplateUseCase = class CreateTokenForOwnTemplateUseCase ex
|
|
|
12070
12073
|
if (!ephemeral) {
|
|
12071
12074
|
await this.accountController.syncDatawallet();
|
|
12072
12075
|
}
|
|
12073
|
-
return ts_utils_1.Result.ok(
|
|
12076
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, ephemeral));
|
|
12074
12077
|
}
|
|
12075
12078
|
};
|
|
12076
12079
|
CreateTokenForOwnTemplateUseCase = __decorate([
|
|
@@ -12136,7 +12139,7 @@ let CreateTokenQrCodeForOwnTemplateUseCase = class CreateTokenQrCodeForOwnTempla
|
|
|
12136
12139
|
if (!template.isOwn) {
|
|
12137
12140
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.relationshipTemplates.cannotCreateTokenForPeerTemplate());
|
|
12138
12141
|
}
|
|
12139
|
-
const tokenContent =
|
|
12142
|
+
const tokenContent = transport_1.TokenContentRelationshipTemplate.from({
|
|
12140
12143
|
templateId: template.id,
|
|
12141
12144
|
secretKey: template.secretKey
|
|
12142
12145
|
});
|
|
@@ -12147,7 +12150,7 @@ let CreateTokenQrCodeForOwnTemplateUseCase = class CreateTokenQrCodeForOwnTempla
|
|
|
12147
12150
|
expiresAt: tokenExpiry,
|
|
12148
12151
|
ephemeral: true
|
|
12149
12152
|
});
|
|
12150
|
-
const qrCode = await common_1.QRCode.from(
|
|
12153
|
+
const qrCode = await common_1.QRCode.from(token.truncate());
|
|
12151
12154
|
return ts_utils_1.Result.ok({ qrCodeBytes: qrCode.asBase64() });
|
|
12152
12155
|
}
|
|
12153
12156
|
};
|
|
@@ -12359,7 +12362,7 @@ let LoadPeerRelationshipTemplateUseCase = class LoadPeerRelationshipTemplateUseC
|
|
|
12359
12362
|
async executeInternal(request) {
|
|
12360
12363
|
let createdTemplate;
|
|
12361
12364
|
if (request.id && request.secretKey) {
|
|
12362
|
-
const key =
|
|
12365
|
+
const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
|
|
12363
12366
|
createdTemplate = await this.loadTemplate(transport_1.CoreId.from(request.id), key);
|
|
12364
12367
|
}
|
|
12365
12368
|
else if (request.reference) {
|
|
@@ -13184,7 +13187,7 @@ let CreateOwnTokenUseCase = class CreateOwnTokenUseCase extends common_1.UseCase
|
|
|
13184
13187
|
async executeInternal(request) {
|
|
13185
13188
|
let tokenContent;
|
|
13186
13189
|
try {
|
|
13187
|
-
tokenContent =
|
|
13190
|
+
tokenContent = ts_serval_1.Serializable.fromUnknown(request.content);
|
|
13188
13191
|
}
|
|
13189
13192
|
catch {
|
|
13190
13193
|
throw common_1.RuntimeErrors.general.invalidTokenContent();
|
|
@@ -13197,7 +13200,7 @@ let CreateOwnTokenUseCase = class CreateOwnTokenUseCase extends common_1.UseCase
|
|
|
13197
13200
|
if (!request.ephemeral) {
|
|
13198
13201
|
await this.accountController.syncDatawallet();
|
|
13199
13202
|
}
|
|
13200
|
-
return ts_utils_1.Result.ok(
|
|
13203
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(response, request.ephemeral));
|
|
13201
13204
|
}
|
|
13202
13205
|
};
|
|
13203
13206
|
CreateOwnTokenUseCase = __decorate([
|
|
@@ -13255,7 +13258,7 @@ let GetQRCodeForTokenUseCase = class GetQRCodeForTokenUseCase extends common_1.U
|
|
|
13255
13258
|
if (!token) {
|
|
13256
13259
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(transport_1.Token));
|
|
13257
13260
|
}
|
|
13258
|
-
const qrCode = await common_1.QRCode.from(
|
|
13261
|
+
const qrCode = await common_1.QRCode.from(token.truncate());
|
|
13259
13262
|
return ts_utils_1.Result.ok({ qrCodeBytes: qrCode.asBase64() });
|
|
13260
13263
|
}
|
|
13261
13264
|
};
|
|
@@ -13312,7 +13315,7 @@ let GetTokenUseCase = class GetTokenUseCase extends common_1.UseCase {
|
|
|
13312
13315
|
if (!token) {
|
|
13313
13316
|
return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound("Token"));
|
|
13314
13317
|
}
|
|
13315
|
-
return ts_utils_1.Result.ok(
|
|
13318
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, false));
|
|
13316
13319
|
}
|
|
13317
13320
|
};
|
|
13318
13321
|
GetTokenUseCase = __decorate([
|
|
@@ -13365,7 +13368,7 @@ let GetTokensUseCase = class GetTokensUseCase extends common_1.UseCase {
|
|
|
13365
13368
|
query[(0, ts_simple_nameof_1.nameof)((t) => t.isOwn)] = request.ownerRestriction === common_1.OwnerRestriction.Own;
|
|
13366
13369
|
}
|
|
13367
13370
|
const tokens = await this.tokenController.getTokens(query);
|
|
13368
|
-
return ts_utils_1.Result.ok(
|
|
13371
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTOList(tokens, false));
|
|
13369
13372
|
}
|
|
13370
13373
|
};
|
|
13371
13374
|
GetTokensUseCase.queryTranslator = new docdb_querytranslator_1.QueryTranslator({
|
|
@@ -13460,7 +13463,7 @@ let LoadPeerTokenUseCase = class LoadPeerTokenUseCase extends common_1.UseCase {
|
|
|
13460
13463
|
async executeInternal(request) {
|
|
13461
13464
|
let createdToken;
|
|
13462
13465
|
if (request.id && request.secretKey) {
|
|
13463
|
-
const key =
|
|
13466
|
+
const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
|
|
13464
13467
|
createdToken = await this.tokenController.loadPeerToken(transport_1.CoreId.from(request.id), key, request.ephemeral);
|
|
13465
13468
|
}
|
|
13466
13469
|
else if (request.reference) {
|
|
@@ -13472,7 +13475,7 @@ let LoadPeerTokenUseCase = class LoadPeerTokenUseCase extends common_1.UseCase {
|
|
|
13472
13475
|
if (!request.ephemeral) {
|
|
13473
13476
|
await this.accountController.syncDatawallet();
|
|
13474
13477
|
}
|
|
13475
|
-
return ts_utils_1.Result.ok(
|
|
13478
|
+
return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(createdToken, request.ephemeral));
|
|
13476
13479
|
}
|
|
13477
13480
|
};
|
|
13478
13481
|
LoadPeerTokenUseCase = __decorate([
|
|
@@ -13501,11 +13504,11 @@ exports.TokenMapper = void 0;
|
|
|
13501
13504
|
const transport_1 = __webpack_require__(/*! @nmshd/transport */ "@nmshd/transport");
|
|
13502
13505
|
const common_1 = __webpack_require__(/*! ../../common */ "./dist/useCases/common/index.js");
|
|
13503
13506
|
class TokenMapper {
|
|
13504
|
-
static
|
|
13507
|
+
static toTokenDTO(token, ephemeral) {
|
|
13505
13508
|
if (!token.cache) {
|
|
13506
13509
|
throw common_1.RuntimeErrors.general.cacheEmpty(transport_1.Token, token.id.toString());
|
|
13507
13510
|
}
|
|
13508
|
-
const reference =
|
|
13511
|
+
const reference = token.toTokenReference();
|
|
13509
13512
|
return {
|
|
13510
13513
|
id: token.id.toString(),
|
|
13511
13514
|
createdBy: token.cache.createdBy.toString(),
|
|
@@ -13518,8 +13521,8 @@ class TokenMapper {
|
|
|
13518
13521
|
isEphemeral: ephemeral
|
|
13519
13522
|
};
|
|
13520
13523
|
}
|
|
13521
|
-
static
|
|
13522
|
-
return
|
|
13524
|
+
static toTokenDTOList(tokens, ephemeral) {
|
|
13525
|
+
return tokens.map((t) => TokenMapper.toTokenDTO(t, ephemeral));
|
|
13523
13526
|
}
|
|
13524
13527
|
}
|
|
13525
13528
|
exports.TokenMapper = TokenMapper;
|