@nmshd/runtime 1.4.1 → 2.0.0-alpha.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (65) hide show
  1. package/dist/Runtime.js +0 -3
  2. package/dist/Runtime.js.map +1 -1
  3. package/dist/buildInformation.js +5 -5
  4. package/dist/dataViews/DataViewExpander.d.ts +4 -4
  5. package/dist/dataViews/DataViewExpander.js +1 -1
  6. package/dist/dataViews/DataViewExpander.js.map +1 -1
  7. package/dist/events/consumption/RequestReceivedEvent.d.ts +3 -3
  8. package/dist/events/consumption/RequestReceivedEvent.js.map +1 -1
  9. package/dist/modules/MessageModule.js +2 -2
  10. package/dist/modules/MessageModule.js.map +1 -1
  11. package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByIdAndKey.js +2 -2
  12. package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByIdAndKey.js.map +1 -1
  13. package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByTruncatedReference.js +1 -1
  14. package/dist/useCases/anonymous/tokens/LoadPeerTokenAnonymousByTruncatedReference.js.map +1 -1
  15. package/dist/useCases/common/Schemas.js +8 -2
  16. package/dist/useCases/common/Schemas.js.map +1 -1
  17. package/dist/useCases/common/UseCase.js +1 -1
  18. package/dist/useCases/common/UseCase.js.map +1 -1
  19. package/dist/useCases/consumption/drafts/UpdateDraft.js +1 -1
  20. package/dist/useCases/consumption/drafts/UpdateDraft.js.map +1 -1
  21. package/dist/useCases/consumption/relationshipInfo/CreateRelationshipInfo.js +2 -2
  22. package/dist/useCases/consumption/relationshipInfo/CreateRelationshipInfo.js.map +1 -1
  23. package/dist/useCases/consumption/relationshipInfo/UpdateRelationshipInfo.js +1 -1
  24. package/dist/useCases/consumption/relationshipInfo/UpdateRelationshipInfo.js.map +1 -1
  25. package/dist/useCases/consumption/settings/UpdateSetting.js +1 -1
  26. package/dist/useCases/consumption/settings/UpdateSetting.js.map +1 -1
  27. package/dist/useCases/consumption/sharedItems/CreateSharedItem.js +1 -1
  28. package/dist/useCases/consumption/sharedItems/CreateSharedItem.js.map +1 -1
  29. package/dist/useCases/transport/challenges/ValidateChallange.js +8 -8
  30. package/dist/useCases/transport/challenges/ValidateChallange.js.map +1 -1
  31. package/dist/useCases/transport/devices/CreateDeviceOnboardingToken.js +2 -2
  32. package/dist/useCases/transport/devices/CreateDeviceOnboardingToken.js.map +1 -1
  33. package/dist/useCases/transport/devices/DeviceMapper.d.ts +1 -1
  34. package/dist/useCases/transport/devices/DeviceMapper.js +6 -6
  35. package/dist/useCases/transport/devices/DeviceMapper.js.map +1 -1
  36. package/dist/useCases/transport/files/CreateTokenForFile.js +2 -2
  37. package/dist/useCases/transport/files/CreateTokenForFile.js.map +1 -1
  38. package/dist/useCases/transport/files/CreateTokenQrCodeForFile.js +2 -2
  39. package/dist/useCases/transport/files/CreateTokenQrCodeForFile.js.map +1 -1
  40. package/dist/useCases/transport/files/LoadPeerFile.js +1 -1
  41. package/dist/useCases/transport/files/LoadPeerFile.js.map +1 -1
  42. package/dist/useCases/transport/relationshipTemplates/CreateTokenForOwnRelationshipTemplate.js +2 -2
  43. package/dist/useCases/transport/relationshipTemplates/CreateTokenForOwnRelationshipTemplate.js.map +1 -1
  44. package/dist/useCases/transport/relationshipTemplates/CreateTokenQrCodeForOwnRelationshipTemplate.js +2 -2
  45. package/dist/useCases/transport/relationshipTemplates/CreateTokenQrCodeForOwnRelationshipTemplate.js.map +1 -1
  46. package/dist/useCases/transport/relationshipTemplates/LoadPeerRelationshipTemplate.js +1 -1
  47. package/dist/useCases/transport/relationshipTemplates/LoadPeerRelationshipTemplate.js.map +1 -1
  48. package/dist/useCases/transport/tokens/CreateOwnToken.js +2 -2
  49. package/dist/useCases/transport/tokens/CreateOwnToken.js.map +1 -1
  50. package/dist/useCases/transport/tokens/GetQRCodeForToken.js +1 -1
  51. package/dist/useCases/transport/tokens/GetQRCodeForToken.js.map +1 -1
  52. package/dist/useCases/transport/tokens/GetToken.js +1 -1
  53. package/dist/useCases/transport/tokens/GetToken.js.map +1 -1
  54. package/dist/useCases/transport/tokens/GetTokens.js +1 -1
  55. package/dist/useCases/transport/tokens/GetTokens.js.map +1 -1
  56. package/dist/useCases/transport/tokens/LoadPeerToken.js +2 -2
  57. package/dist/useCases/transport/tokens/LoadPeerToken.js.map +1 -1
  58. package/dist/useCases/transport/tokens/TokenMapper.d.ts +2 -2
  59. package/dist/useCases/transport/tokens/TokenMapper.js +4 -4
  60. package/dist/useCases/transport/tokens/TokenMapper.js.map +1 -1
  61. package/lib-web/nmshd.runtime.js +63 -60
  62. package/lib-web/nmshd.runtime.js.map +1 -1
  63. package/lib-web/nmshd.runtime.min.js +1 -1
  64. package/lib-web/nmshd.runtime.min.js.map +1 -1
  65. package/package.json +9 -9
@@ -160,9 +160,6 @@ class Runtime {
160
160
  typescript_ioc_1.Container.bind(consumption_1.RelationshipInfoController)
161
161
  .factory(() => this.getConsumptionController().relationshipInfo)
162
162
  .scope(typescript_ioc_1.Scope.Request);
163
- typescript_ioc_1.Container.bind(consumption_1.RequestsController)
164
- .factory(() => this.getConsumptionController().requests)
165
- .scope(typescript_ioc_1.Scope.Request);
166
163
  typescript_ioc_1.Container.bind(consumption_1.SettingsController)
167
164
  .factory(() => this.getConsumptionController().settings)
168
165
  .scope(typescript_ioc_1.Scope.Request);
@@ -329,11 +326,11 @@ const content_1 = __webpack_require__(/*! @nmshd/content */ "@nmshd/content");
329
326
  const crypto_1 = __webpack_require__(/*! @nmshd/crypto */ "@nmshd/crypto");
330
327
  const transport_1 = __webpack_require__(/*! @nmshd/transport */ "@nmshd/transport");
331
328
  exports.buildInformation = {
332
- version: "1.4.1",
333
- build: "44",
334
- date: "2022-04-22T12:46:10+00:00",
335
- commit: "1b084693e1db32b70aabb77250e88aafd4f82c71",
336
- dependencies: {"@js-soft/docdb-querytranslator":"1.0.1","@js-soft/logging-abstractions":"1.0.0","@js-soft/ts-serval":"1.1.1","@js-soft/ts-utils":"^1.1.1","@nmshd/consumption":"1.0.15","@nmshd/content":"1.1.5","@nmshd/crypto":"1.0.8","@nmshd/transport":"1.2.0","ajv":"^8.11.0","ajv-errors":"^3.0.0","ajv-formats":"^2.1.1","fluent-ts-validator":"3.0.3","json-stringify-safe":"^5.0.1","luxon":"^2.3.2","qrcode":"1.5.0","reflect-metadata":"0.1.13","ts-simple-nameof":"1.3.1","typescript-ioc":"3.2.2"},
329
+ version: "2.0.0-alpha.1",
330
+ build: "46",
331
+ date: "2022-04-25T10:08:06+00:00",
332
+ commit: "0474534cfade1d0850bede8b45b1fc266c34616e",
333
+ dependencies: {"@js-soft/docdb-querytranslator":"1.0.1","@js-soft/logging-abstractions":"1.0.0","@js-soft/ts-serval":"2.0.3","@js-soft/ts-utils":"^1.1.1","@nmshd/consumption":"2.0.0-alpha.2","@nmshd/content":"2.0.0-alpha.8","@nmshd/crypto":"2.0.1","@nmshd/transport":"2.0.0-alpha.1","ajv":"^8.11.0","ajv-errors":"^3.0.0","ajv-formats":"^2.1.1","fluent-ts-validator":"3.0.3","json-stringify-safe":"^5.0.1","luxon":"^2.3.2","qrcode":"1.5.0","reflect-metadata":"0.1.13","ts-simple-nameof":"1.3.1","typescript-ioc":"3.2.2"},
337
334
  libraries: {
338
335
  serval: ts_serval_1.buildInformation,
339
336
  consumption: consumption_1.buildInformation,
@@ -403,7 +400,7 @@ let DataViewExpander = class DataViewExpander {
403
400
  return await this.expandMessageDTOs(content);
404
401
  }
405
402
  return await this.expandMessageDTO(content);
406
- case "Request":
403
+ case "AttributesRequest":
407
404
  if (content instanceof Array) {
408
405
  return await this.expandUnknownRequests(content);
409
406
  }
@@ -3248,13 +3245,13 @@ class MessageModule extends RuntimeModule_1.RuntimeModule {
3248
3245
  let event;
3249
3246
  switch (type) {
3250
3247
  case "Mail":
3251
- const mail = await content_1.Mail.from(message.content);
3248
+ const mail = content_1.Mail.from(message.content);
3252
3249
  event = new MailReceivedEvent_1.MailReceivedEvent(messageReceivedEvent.eventTargetAddress, mail, message);
3253
3250
  this.runtime.eventBus.publish(event);
3254
3251
  this.logger.trace(`Published MailReceivedEvent for ${message.id}`);
3255
3252
  break;
3256
3253
  case "RequestMail":
3257
- const requestMail = await content_1.RequestMail.from(message.content);
3254
+ const requestMail = content_1.RequestMail.from(message.content);
3258
3255
  event = new RequestMailReceivedEvent_1.RequestMailReceivedEvent(messageReceivedEvent.eventTargetAddress, requestMail, message);
3259
3256
  this.runtime.eventBus.publish(event);
3260
3257
  this.logger.trace(`Published RequestMailReceivedEvent for ${message.id}`);
@@ -3771,9 +3768,9 @@ let LoadPeerTokenAnonymousByIdAndKeyUseCase = class LoadPeerTokenAnonymousByIdAn
3771
3768
  this.anonymousTokenController = anonymousTokenController;
3772
3769
  }
3773
3770
  async executeInternal(request) {
3774
- const key = await crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
3771
+ const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
3775
3772
  const createdToken = await this.anonymousTokenController.loadPeerToken(transport_1.CoreId.from(request.id), key);
3776
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(createdToken, true));
3773
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(createdToken, true));
3777
3774
  }
3778
3775
  };
3779
3776
  LoadPeerTokenAnonymousByIdAndKeyUseCase = __decorate([
@@ -3826,7 +3823,7 @@ let LoadPeerTokenAnonymousByTruncatedReferenceUseCase = class LoadPeerTokenAnony
3826
3823
  }
3827
3824
  async executeInternal(request) {
3828
3825
  const createdToken = await this.anonymousTokenController.loadPeerTokenByTruncated(request.reference);
3829
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(createdToken, true));
3826
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(createdToken, true));
3830
3827
  }
3831
3828
  };
3832
3829
  LoadPeerTokenAnonymousByTruncatedReferenceUseCase = __decorate([
@@ -4705,7 +4702,10 @@ exports.CreateRelationshipInfoRequest = {
4705
4702
  "@type": {
4706
4703
  "type": "string"
4707
4704
  },
4708
- "@schema": {
4705
+ "@context": {
4706
+ "type": "string"
4707
+ },
4708
+ "@version": {
4709
4709
  "type": "string"
4710
4710
  },
4711
4711
  "name": {
@@ -4891,7 +4891,10 @@ exports.UpdateRelationshipInfoRequest = {
4891
4891
  "@type": {
4892
4892
  "type": "string"
4893
4893
  },
4894
- "@schema": {
4894
+ "@context": {
4895
+ "type": "string"
4896
+ },
4897
+ "@version": {
4895
4898
  "type": "string"
4896
4899
  },
4897
4900
  "name": {
@@ -6397,7 +6400,7 @@ class UseCase {
6397
6400
  if (error instanceof ts_serval_1.ParsingError || error instanceof ts_serval_1.ValidationError) {
6398
6401
  runtimeError = RuntimeErrors_1.RuntimeErrors.serval.requestDeserialization(error.message);
6399
6402
  }
6400
- else if (error.message.match(/Type '.+' was not found within reflection classes. You might have to install a module first./)) {
6403
+ else if (error.message.match(/Type '.+' with version [0-9]+ was not found within reflection classes. You might have to install a module first./)) {
6401
6404
  runtimeError = RuntimeErrors_1.RuntimeErrors.serval.unknownType(error.message);
6402
6405
  }
6403
6406
  else {
@@ -7656,7 +7659,7 @@ let UpdateDraftUseCase = class UpdateDraftUseCase extends common_1.UseCase {
7656
7659
  if (!draft) {
7657
7660
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(consumption_1.Draft));
7658
7661
  }
7659
- draft.content = await ts_serval_1.SerializableAsync.fromUnknown(request.content);
7662
+ draft.content = ts_serval_1.Serializable.fromUnknown(request.content);
7660
7663
  await this.draftController.updateDraft(draft);
7661
7664
  await this.accountController.syncDatawallet();
7662
7665
  return ts_utils_1.Result.ok(DraftMapper_1.DraftMapper.toDraftDTO(draft));
@@ -7795,8 +7798,8 @@ let CreateRelationshipInfoUseCase = class CreateRelationshipInfoUseCase extends
7795
7798
  sharedItem: transport_1.CoreId.from(a.sharedItem)
7796
7799
  });
7797
7800
  }));
7798
- const theme = request.theme === undefined ? undefined : await consumption_1.RelationshipTheme.from(request.theme);
7799
- const parameters = await consumption_1.RelationshipInfo.from({
7801
+ const theme = request.theme === undefined ? undefined : consumption_1.RelationshipTheme.from(request.theme);
7802
+ const parameters = consumption_1.RelationshipInfo.from({
7800
7803
  id: await consumption_1.ConsumptionIds.relationshipInfo.generate(),
7801
7804
  relationshipId: relationshipId,
7802
7805
  attributes: attributes,
@@ -8224,7 +8227,7 @@ let UpdateRelationshipInfoUseCase = class UpdateRelationshipInfoUseCase extends
8224
8227
  relationshipInfo.description = request.description === undefined ? relationshipInfo.description : request.description;
8225
8228
  relationshipInfo.userTitle = request.userTitle === undefined ? relationshipInfo.userTitle : request.userTitle;
8226
8229
  relationshipInfo.userDescription = request.userDescription === undefined ? relationshipInfo.userDescription : request.userDescription;
8227
- relationshipInfo.theme = request.theme === undefined ? relationshipInfo.theme : await consumption_1.RelationshipTheme.from(request.theme);
8230
+ relationshipInfo.theme = request.theme === undefined ? relationshipInfo.theme : consumption_1.RelationshipTheme.from(request.theme);
8228
8231
  await this.relationshipInfoController.updateRelationshipInfo(relationshipInfo);
8229
8232
  await this.accountController.syncDatawallet();
8230
8233
  return ts_utils_1.Result.ok(RelationshipInfoMapper_1.RelationshipInfoMapper.toRelationshipInfoDTO(relationshipInfo));
@@ -8612,7 +8615,7 @@ let UpdateSettingUseCase = class UpdateSettingUseCase extends common_1.UseCase {
8612
8615
  if (!setting) {
8613
8616
  return ts_utils_1.Result.fail(__1.RuntimeErrors.general.recordNotFound(consumption_1.Setting));
8614
8617
  }
8615
- setting.value = await ts_serval_1.SerializableAsync.from(request.value);
8618
+ setting.value = ts_serval_1.Serializable.fromUnknown(request.value);
8616
8619
  await this.settingController.updateSetting(setting);
8617
8620
  await this.accountController.syncDatawallet();
8618
8621
  return ts_utils_1.Result.ok(SettingMapper_1.SettingMapper.toSettingDTO(setting));
@@ -8715,7 +8718,7 @@ let CreateSharedItemUseCase = class CreateSharedItemUseCase extends common_1.Use
8715
8718
  this.accountController = accountController;
8716
8719
  }
8717
8720
  async executeInternal(request) {
8718
- const sharedItem = await consumption_1.SharedItem.from({
8721
+ const sharedItem = consumption_1.SharedItem.from({
8719
8722
  id: await consumption_1.ConsumptionIds.sharedItem.generate(),
8720
8723
  tags: request.tags,
8721
8724
  sharedBy: transport_1.CoreAddress.from(request.sharedBy),
@@ -9985,28 +9988,28 @@ let Validator = class Validator extends common_1.SchemaValidator {
9985
9988
  const validationResult = await super.validate(value);
9986
9989
  if (validationResult.isInvalid())
9987
9990
  return validationResult;
9988
- const signatureValidationResult = await this.validateSignature(value.signature);
9991
+ const signatureValidationResult = this.validateSignature(value.signature);
9989
9992
  if (signatureValidationResult.isError) {
9990
9993
  validationResult.addFailures([new fluent_ts_validator_1.ValidationFailure(undefined, "signature", undefined, undefined, signatureValidationResult.error.message)]);
9991
9994
  }
9992
- const challengeValidationResult = await this.validateChallenge(value.challengeString);
9995
+ const challengeValidationResult = this.validateChallenge(value.challengeString);
9993
9996
  if (challengeValidationResult.isError) {
9994
9997
  validationResult.addFailures([new fluent_ts_validator_1.ValidationFailure(undefined, "challenge", undefined, undefined, challengeValidationResult.error.message)]);
9995
9998
  }
9996
9999
  return validationResult;
9997
10000
  }
9998
- async validateSignature(signature) {
10001
+ validateSignature(signature) {
9999
10002
  try {
10000
- await crypto_1.CryptoSignature.fromBase64(signature);
10003
+ crypto_1.CryptoSignature.fromBase64(signature);
10001
10004
  return ts_utils_1.Result.ok(undefined);
10002
10005
  }
10003
10006
  catch {
10004
10007
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.challenges.invalidSignature());
10005
10008
  }
10006
10009
  }
10007
- async validateChallenge(challenge) {
10010
+ validateChallenge(challenge) {
10008
10011
  try {
10009
- await transport_1.Challenge.deserialize(challenge);
10012
+ transport_1.Challenge.deserialize(challenge);
10010
10013
  return ts_utils_1.Result.ok(undefined);
10011
10014
  }
10012
10015
  catch {
@@ -10024,8 +10027,8 @@ let ValidateChallengeUseCase = class ValidateChallengeUseCase extends common_1.U
10024
10027
  this.challengeController = challengeController;
10025
10028
  }
10026
10029
  async executeInternal(request) {
10027
- const signature = await crypto_1.CryptoSignature.fromBase64(request.signature);
10028
- const signedChallenge = await transport_1.ChallengeSigned.from({
10030
+ const signature = crypto_1.CryptoSignature.fromBase64(request.signature);
10031
+ const signedChallenge = transport_1.ChallengeSigned.from({
10029
10032
  challenge: request.challengeString,
10030
10033
  signature: signature
10031
10034
  });
@@ -10189,13 +10192,13 @@ let CreateDeviceOnboardingTokenUseCase = class CreateDeviceOnboardingTokenUseCas
10189
10192
  async executeInternal(request) {
10190
10193
  const sharedSecret = await this.devicesController.getSharedSecret(transport_1.CoreId.from(request.id));
10191
10194
  const expiresAt = request.expiresAt ? transport_1.CoreDate.from(request.expiresAt) : transport_1.CoreDate.utc().add({ minutes: 5 });
10192
- const tokenContent = await transport_1.TokenContentDeviceSharedSecret.from({ sharedSecret: sharedSecret });
10195
+ const tokenContent = transport_1.TokenContentDeviceSharedSecret.from({ sharedSecret: sharedSecret });
10193
10196
  const token = await this.tokenController.sendToken({
10194
10197
  content: tokenContent,
10195
10198
  expiresAt: expiresAt,
10196
10199
  ephemeral: true
10197
10200
  });
10198
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(token, true));
10201
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, true));
10199
10202
  }
10200
10203
  };
10201
10204
  CreateDeviceOnboardingTokenUseCase = __decorate([
@@ -10321,20 +10324,20 @@ class DeviceMapper {
10321
10324
  username: deviceSharedSecret.username
10322
10325
  };
10323
10326
  }
10324
- static async toDeviceSharedSecret(deviceOnboardingDTO) {
10325
- const sharedSecret = await transport_1.DeviceSharedSecret.from({
10327
+ static toDeviceSharedSecret(deviceOnboardingDTO) {
10328
+ const sharedSecret = transport_1.DeviceSharedSecret.from({
10326
10329
  id: transport_1.CoreId.from(deviceOnboardingDTO.id),
10327
10330
  createdAt: transport_1.CoreDate.from(deviceOnboardingDTO.createdAt),
10328
10331
  createdByDevice: transport_1.CoreId.from(deviceOnboardingDTO.createdByDevice),
10329
10332
  name: deviceOnboardingDTO.name,
10330
10333
  description: deviceOnboardingDTO.description,
10331
- secretBaseKey: await crypto_1.CryptoSecretKey.fromBase64(deviceOnboardingDTO.secretBaseKey),
10334
+ secretBaseKey: crypto_1.CryptoSecretKey.fromBase64(deviceOnboardingDTO.secretBaseKey),
10332
10335
  deviceIndex: deviceOnboardingDTO.deviceIndex,
10333
- synchronizationKey: await crypto_1.CryptoSecretKey.fromBase64(deviceOnboardingDTO.synchronizationKey),
10334
- identityPrivateKey: deviceOnboardingDTO.identityPrivateKey ? await crypto_1.CryptoSignaturePrivateKey.deserialize(deviceOnboardingDTO.identityPrivateKey) : undefined,
10336
+ synchronizationKey: crypto_1.CryptoSecretKey.fromBase64(deviceOnboardingDTO.synchronizationKey),
10337
+ identityPrivateKey: deviceOnboardingDTO.identityPrivateKey ? crypto_1.CryptoSignaturePrivateKey.deserialize(deviceOnboardingDTO.identityPrivateKey) : undefined,
10335
10338
  identity: {
10336
10339
  address: transport_1.CoreAddress.from(deviceOnboardingDTO.identity.address),
10337
- publicKey: await crypto_1.CryptoSignaturePublicKey.deserialize(deviceOnboardingDTO.identity.publicKey),
10340
+ publicKey: crypto_1.CryptoSignaturePublicKey.deserialize(deviceOnboardingDTO.identity.publicKey),
10338
10341
  realm: deviceOnboardingDTO.identity.realm
10339
10342
  },
10340
10343
  password: deviceOnboardingDTO.password,
@@ -10648,7 +10651,7 @@ let CreateTokenForFileUseCase = class CreateTokenForFileUseCase extends common_1
10648
10651
  if (!file) {
10649
10652
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(transport_1.File));
10650
10653
  }
10651
- const tokenContent = await transport_1.TokenContentFile.from({
10654
+ const tokenContent = transport_1.TokenContentFile.from({
10652
10655
  fileId: file.id,
10653
10656
  secretKey: file.secretKey
10654
10657
  });
@@ -10663,7 +10666,7 @@ let CreateTokenForFileUseCase = class CreateTokenForFileUseCase extends common_1
10663
10666
  if (!ephemeral) {
10664
10667
  await this.accountController.syncDatawallet();
10665
10668
  }
10666
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(token, ephemeral));
10669
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, ephemeral));
10667
10670
  }
10668
10671
  };
10669
10672
  CreateTokenForFileUseCase = __decorate([
@@ -10728,7 +10731,7 @@ let CreateTokenQrCodeForFileUseCase = class CreateTokenQrCodeForFileUseCase exte
10728
10731
  if (!file) {
10729
10732
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(transport_1.File));
10730
10733
  }
10731
- const tokenContent = await transport_1.TokenContentFile.from({
10734
+ const tokenContent = transport_1.TokenContentFile.from({
10732
10735
  fileId: file.id,
10733
10736
  secretKey: file.secretKey
10734
10737
  });
@@ -10739,7 +10742,7 @@ let CreateTokenQrCodeForFileUseCase = class CreateTokenQrCodeForFileUseCase exte
10739
10742
  expiresAt: tokenExpiry,
10740
10743
  ephemeral: true
10741
10744
  });
10742
- const qrCode = await common_1.QRCode.from(await token.truncate());
10745
+ const qrCode = await common_1.QRCode.from(token.truncate());
10743
10746
  return ts_utils_1.Result.ok({ qrCodeBytes: qrCode.asBase64() });
10744
10747
  }
10745
10748
  };
@@ -11088,7 +11091,7 @@ let LoadPeerFileUseCase = class LoadPeerFileUseCase extends common_1.UseCase {
11088
11091
  async executeInternal(request) {
11089
11092
  let createdFile;
11090
11093
  if (isLoadPeerFileViaSecret(request)) {
11091
- const key = await crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
11094
+ const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
11092
11095
  createdFile = await this.loadFile(transport_1.CoreId.from(request.id), key);
11093
11096
  }
11094
11097
  else if (isLoadPeerFileViaReference(request)) {
@@ -12055,7 +12058,7 @@ let CreateTokenForOwnTemplateUseCase = class CreateTokenForOwnTemplateUseCase ex
12055
12058
  if (!template.isOwn) {
12056
12059
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.relationshipTemplates.cannotCreateTokenForPeerTemplate());
12057
12060
  }
12058
- const tokenContent = await transport_1.TokenContentRelationshipTemplate.from({
12061
+ const tokenContent = transport_1.TokenContentRelationshipTemplate.from({
12059
12062
  templateId: template.id,
12060
12063
  secretKey: template.secretKey
12061
12064
  });
@@ -12070,7 +12073,7 @@ let CreateTokenForOwnTemplateUseCase = class CreateTokenForOwnTemplateUseCase ex
12070
12073
  if (!ephemeral) {
12071
12074
  await this.accountController.syncDatawallet();
12072
12075
  }
12073
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(token, ephemeral));
12076
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, ephemeral));
12074
12077
  }
12075
12078
  };
12076
12079
  CreateTokenForOwnTemplateUseCase = __decorate([
@@ -12136,7 +12139,7 @@ let CreateTokenQrCodeForOwnTemplateUseCase = class CreateTokenQrCodeForOwnTempla
12136
12139
  if (!template.isOwn) {
12137
12140
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.relationshipTemplates.cannotCreateTokenForPeerTemplate());
12138
12141
  }
12139
- const tokenContent = await transport_1.TokenContentRelationshipTemplate.from({
12142
+ const tokenContent = transport_1.TokenContentRelationshipTemplate.from({
12140
12143
  templateId: template.id,
12141
12144
  secretKey: template.secretKey
12142
12145
  });
@@ -12147,7 +12150,7 @@ let CreateTokenQrCodeForOwnTemplateUseCase = class CreateTokenQrCodeForOwnTempla
12147
12150
  expiresAt: tokenExpiry,
12148
12151
  ephemeral: true
12149
12152
  });
12150
- const qrCode = await common_1.QRCode.from(await token.truncate());
12153
+ const qrCode = await common_1.QRCode.from(token.truncate());
12151
12154
  return ts_utils_1.Result.ok({ qrCodeBytes: qrCode.asBase64() });
12152
12155
  }
12153
12156
  };
@@ -12359,7 +12362,7 @@ let LoadPeerRelationshipTemplateUseCase = class LoadPeerRelationshipTemplateUseC
12359
12362
  async executeInternal(request) {
12360
12363
  let createdTemplate;
12361
12364
  if (request.id && request.secretKey) {
12362
- const key = await crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
12365
+ const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
12363
12366
  createdTemplate = await this.loadTemplate(transport_1.CoreId.from(request.id), key);
12364
12367
  }
12365
12368
  else if (request.reference) {
@@ -13184,7 +13187,7 @@ let CreateOwnTokenUseCase = class CreateOwnTokenUseCase extends common_1.UseCase
13184
13187
  async executeInternal(request) {
13185
13188
  let tokenContent;
13186
13189
  try {
13187
- tokenContent = await ts_serval_1.SerializableAsync.from(request.content);
13190
+ tokenContent = ts_serval_1.Serializable.fromUnknown(request.content);
13188
13191
  }
13189
13192
  catch {
13190
13193
  throw common_1.RuntimeErrors.general.invalidTokenContent();
@@ -13197,7 +13200,7 @@ let CreateOwnTokenUseCase = class CreateOwnTokenUseCase extends common_1.UseCase
13197
13200
  if (!request.ephemeral) {
13198
13201
  await this.accountController.syncDatawallet();
13199
13202
  }
13200
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(response, request.ephemeral));
13203
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(response, request.ephemeral));
13201
13204
  }
13202
13205
  };
13203
13206
  CreateOwnTokenUseCase = __decorate([
@@ -13255,7 +13258,7 @@ let GetQRCodeForTokenUseCase = class GetQRCodeForTokenUseCase extends common_1.U
13255
13258
  if (!token) {
13256
13259
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound(transport_1.Token));
13257
13260
  }
13258
- const qrCode = await common_1.QRCode.from(await token.truncate());
13261
+ const qrCode = await common_1.QRCode.from(token.truncate());
13259
13262
  return ts_utils_1.Result.ok({ qrCodeBytes: qrCode.asBase64() });
13260
13263
  }
13261
13264
  };
@@ -13312,7 +13315,7 @@ let GetTokenUseCase = class GetTokenUseCase extends common_1.UseCase {
13312
13315
  if (!token) {
13313
13316
  return ts_utils_1.Result.fail(common_1.RuntimeErrors.general.recordNotFound("Token"));
13314
13317
  }
13315
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(token, false));
13318
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(token, false));
13316
13319
  }
13317
13320
  };
13318
13321
  GetTokenUseCase = __decorate([
@@ -13365,7 +13368,7 @@ let GetTokensUseCase = class GetTokensUseCase extends common_1.UseCase {
13365
13368
  query[(0, ts_simple_nameof_1.nameof)((t) => t.isOwn)] = request.ownerRestriction === common_1.OwnerRestriction.Own;
13366
13369
  }
13367
13370
  const tokens = await this.tokenController.getTokens(query);
13368
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTOList(tokens, false));
13371
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTOList(tokens, false));
13369
13372
  }
13370
13373
  };
13371
13374
  GetTokensUseCase.queryTranslator = new docdb_querytranslator_1.QueryTranslator({
@@ -13460,7 +13463,7 @@ let LoadPeerTokenUseCase = class LoadPeerTokenUseCase extends common_1.UseCase {
13460
13463
  async executeInternal(request) {
13461
13464
  let createdToken;
13462
13465
  if (request.id && request.secretKey) {
13463
- const key = await crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
13466
+ const key = crypto_1.CryptoSecretKey.fromBase64(request.secretKey);
13464
13467
  createdToken = await this.tokenController.loadPeerToken(transport_1.CoreId.from(request.id), key, request.ephemeral);
13465
13468
  }
13466
13469
  else if (request.reference) {
@@ -13472,7 +13475,7 @@ let LoadPeerTokenUseCase = class LoadPeerTokenUseCase extends common_1.UseCase {
13472
13475
  if (!request.ephemeral) {
13473
13476
  await this.accountController.syncDatawallet();
13474
13477
  }
13475
- return ts_utils_1.Result.ok(await TokenMapper_1.TokenMapper.toTokenDTO(createdToken, request.ephemeral));
13478
+ return ts_utils_1.Result.ok(TokenMapper_1.TokenMapper.toTokenDTO(createdToken, request.ephemeral));
13476
13479
  }
13477
13480
  };
13478
13481
  LoadPeerTokenUseCase = __decorate([
@@ -13501,11 +13504,11 @@ exports.TokenMapper = void 0;
13501
13504
  const transport_1 = __webpack_require__(/*! @nmshd/transport */ "@nmshd/transport");
13502
13505
  const common_1 = __webpack_require__(/*! ../../common */ "./dist/useCases/common/index.js");
13503
13506
  class TokenMapper {
13504
- static async toTokenDTO(token, ephemeral) {
13507
+ static toTokenDTO(token, ephemeral) {
13505
13508
  if (!token.cache) {
13506
13509
  throw common_1.RuntimeErrors.general.cacheEmpty(transport_1.Token, token.id.toString());
13507
13510
  }
13508
- const reference = await token.toTokenReference();
13511
+ const reference = token.toTokenReference();
13509
13512
  return {
13510
13513
  id: token.id.toString(),
13511
13514
  createdBy: token.cache.createdBy.toString(),
@@ -13518,8 +13521,8 @@ class TokenMapper {
13518
13521
  isEphemeral: ephemeral
13519
13522
  };
13520
13523
  }
13521
- static async toTokenDTOList(tokens, ephemeral) {
13522
- return await Promise.all(tokens.map((t) => TokenMapper.toTokenDTO(t, ephemeral)));
13524
+ static toTokenDTOList(tokens, ephemeral) {
13525
+ return tokens.map((t) => TokenMapper.toTokenDTO(t, ephemeral));
13523
13526
  }
13524
13527
  }
13525
13528
  exports.TokenMapper = TokenMapper;