@opentdf/sdk 0.1.0-beta.1701

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (566) hide show
  1. package/README.md +52 -0
  2. package/dist/cjs/package.json +3 -0
  3. package/dist/cjs/src/access.js +155 -0
  4. package/dist/cjs/src/auth/Eas.js +60 -0
  5. package/dist/cjs/src/auth/auth.js +79 -0
  6. package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +26 -0
  7. package/dist/cjs/src/auth/oidc-externaljwt-provider.js +33 -0
  8. package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +34 -0
  9. package/dist/cjs/src/auth/oidc.js +222 -0
  10. package/dist/cjs/src/auth/providers.js +143 -0
  11. package/dist/cjs/src/encodings/base64.js +154 -0
  12. package/dist/cjs/src/encodings/hex.js +70 -0
  13. package/dist/cjs/src/encodings/index.js +29 -0
  14. package/dist/cjs/src/errors.js +138 -0
  15. package/dist/cjs/src/index.js +344 -0
  16. package/dist/cjs/src/nanotdf/Client.js +296 -0
  17. package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
  18. package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
  19. package/dist/cjs/src/nanotdf/constants.js +5 -0
  20. package/dist/cjs/src/nanotdf/decrypt.js +17 -0
  21. package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
  22. package/dist/cjs/src/nanotdf/encrypt.js +132 -0
  23. package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
  24. package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
  25. package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
  26. package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
  27. package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
  28. package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
  29. package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +29 -0
  30. package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
  31. package/dist/cjs/src/nanotdf/index.js +25 -0
  32. package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
  33. package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
  34. package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
  35. package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
  36. package/dist/cjs/src/nanotdf/models/Header.js +255 -0
  37. package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
  38. package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
  39. package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
  40. package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
  41. package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
  42. package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
  43. package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
  44. package/dist/cjs/src/nanotdf-crypto/ciphers.js +17 -0
  45. package/dist/cjs/src/nanotdf-crypto/decrypt.js +24 -0
  46. package/dist/cjs/src/nanotdf-crypto/digest.js +7 -0
  47. package/dist/cjs/src/nanotdf-crypto/ecdsaSignature.js +83 -0
  48. package/dist/cjs/src/nanotdf-crypto/encrypt.js +24 -0
  49. package/dist/cjs/src/nanotdf-crypto/enums.js +52 -0
  50. package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
  51. package/dist/cjs/src/nanotdf-crypto/generateKeyPair.js +13 -0
  52. package/dist/cjs/src/nanotdf-crypto/generateRandomNumber.js +12 -0
  53. package/dist/cjs/src/nanotdf-crypto/importRawKey.js +18 -0
  54. package/dist/cjs/src/nanotdf-crypto/index.js +52 -0
  55. package/dist/cjs/src/nanotdf-crypto/keyAgreement.js +91 -0
  56. package/dist/cjs/src/nanotdf-crypto/pemPublicToCrypto.js +225 -0
  57. package/dist/cjs/src/policy/api.js +58 -0
  58. package/dist/cjs/src/policy/attributes.js +3 -0
  59. package/dist/cjs/src/policy/granter.js +146 -0
  60. package/dist/cjs/src/tdf/AttributeObject.js +15 -0
  61. package/dist/cjs/src/tdf/AttributeObjectJwt.js +3 -0
  62. package/dist/cjs/src/tdf/Crypto.js +47 -0
  63. package/dist/cjs/src/tdf/EntityObject.js +3 -0
  64. package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
  65. package/dist/cjs/src/tdf/Policy.js +50 -0
  66. package/dist/cjs/src/tdf/PolicyObject.js +3 -0
  67. package/dist/cjs/src/tdf/TypedArray.js +3 -0
  68. package/dist/cjs/src/tdf/index.js +35 -0
  69. package/dist/cjs/src/types/index.js +3 -0
  70. package/dist/cjs/src/utils.js +147 -0
  71. package/dist/cjs/src/version.js +12 -0
  72. package/dist/cjs/tdf3/index.js +57 -0
  73. package/dist/cjs/tdf3/src/assertions.js +118 -0
  74. package/dist/cjs/tdf3/src/binary.js +153 -0
  75. package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +56 -0
  76. package/dist/cjs/tdf3/src/ciphers/algorithms.js +8 -0
  77. package/dist/cjs/tdf3/src/ciphers/index.js +8 -0
  78. package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +22 -0
  79. package/dist/cjs/tdf3/src/client/DecoratedReadableStream.js +116 -0
  80. package/dist/cjs/tdf3/src/client/builders.js +561 -0
  81. package/dist/cjs/tdf3/src/client/index.js +460 -0
  82. package/dist/cjs/tdf3/src/client/validation.js +63 -0
  83. package/dist/cjs/tdf3/src/crypto/crypto-utils.js +116 -0
  84. package/dist/cjs/tdf3/src/crypto/declarations.js +8 -0
  85. package/dist/cjs/tdf3/src/crypto/index.js +315 -0
  86. package/dist/cjs/tdf3/src/index.js +34 -0
  87. package/dist/cjs/tdf3/src/models/attribute-set.js +122 -0
  88. package/dist/cjs/tdf3/src/models/encryption-information.js +90 -0
  89. package/dist/cjs/tdf3/src/models/index.js +25 -0
  90. package/dist/cjs/tdf3/src/models/key-access.js +103 -0
  91. package/dist/cjs/tdf3/src/models/manifest.js +3 -0
  92. package/dist/cjs/tdf3/src/models/payload.js +3 -0
  93. package/dist/cjs/tdf3/src/models/policy.js +24 -0
  94. package/dist/cjs/tdf3/src/models/upsert-response.js +3 -0
  95. package/dist/cjs/tdf3/src/tdf.js +907 -0
  96. package/dist/cjs/tdf3/src/templates/default.html.js +98 -0
  97. package/dist/cjs/tdf3/src/templates/escaper.js +15 -0
  98. package/dist/cjs/tdf3/src/templates/index.js +12 -0
  99. package/dist/cjs/tdf3/src/utils/buffer-crc32.js +48 -0
  100. package/dist/cjs/tdf3/src/utils/chunkers.js +106 -0
  101. package/dist/cjs/tdf3/src/utils/index.js +296 -0
  102. package/dist/cjs/tdf3/src/utils/keysplit.js +61 -0
  103. package/dist/cjs/tdf3/src/utils/zip-reader.js +253 -0
  104. package/dist/cjs/tdf3/src/utils/zip-writer.js +308 -0
  105. package/dist/cjs/tdf3/src/version.js +6 -0
  106. package/dist/types/src/access.d.ts +47 -0
  107. package/dist/types/src/access.d.ts.map +1 -0
  108. package/dist/types/src/auth/Eas.d.ts +34 -0
  109. package/dist/types/src/auth/Eas.d.ts.map +1 -0
  110. package/dist/types/src/auth/auth.d.ts +86 -0
  111. package/dist/types/src/auth/auth.d.ts.map +1 -0
  112. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +9 -0
  113. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -0
  114. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +10 -0
  115. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -0
  116. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +10 -0
  117. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -0
  118. package/dist/types/src/auth/oidc.d.ts +104 -0
  119. package/dist/types/src/auth/oidc.d.ts.map +1 -0
  120. package/dist/types/src/auth/providers.d.ts +67 -0
  121. package/dist/types/src/auth/providers.d.ts.map +1 -0
  122. package/dist/types/src/encodings/base64.d.ts +18 -0
  123. package/dist/types/src/encodings/base64.d.ts.map +1 -0
  124. package/dist/types/src/encodings/hex.d.ts +5 -0
  125. package/dist/types/src/encodings/hex.d.ts.map +1 -0
  126. package/dist/types/src/encodings/index.d.ts +3 -0
  127. package/dist/types/src/encodings/index.d.ts.map +1 -0
  128. package/dist/types/src/errors.d.ts +72 -0
  129. package/dist/types/src/errors.d.ts.map +1 -0
  130. package/dist/types/src/index.d.ts +138 -0
  131. package/dist/types/src/index.d.ts.map +1 -0
  132. package/dist/types/src/nanotdf/Client.d.ts +95 -0
  133. package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
  134. package/dist/types/src/nanotdf/NanoTDF.d.ts +25 -0
  135. package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
  136. package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
  137. package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
  138. package/dist/types/src/nanotdf/constants.d.ts +2 -0
  139. package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
  140. package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
  141. package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
  142. package/dist/types/src/nanotdf/encrypt-dataset.d.ts +12 -0
  143. package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
  144. package/dist/types/src/nanotdf/encrypt.d.ts +14 -0
  145. package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
  146. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
  147. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
  148. package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
  149. package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
  150. package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
  151. package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
  152. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
  153. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
  154. package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
  155. package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
  156. package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
  157. package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
  158. package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
  159. package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
  160. package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +9 -0
  161. package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
  162. package/dist/types/src/nanotdf/index.d.ts +9 -0
  163. package/dist/types/src/nanotdf/index.d.ts.map +1 -0
  164. package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
  165. package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
  166. package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
  167. package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
  168. package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
  169. package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
  170. package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
  171. package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
  172. package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
  173. package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
  174. package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
  175. package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
  176. package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
  177. package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
  178. package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
  179. package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
  180. package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
  181. package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
  182. package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
  183. package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
  184. package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
  185. package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
  186. package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
  187. package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
  188. package/dist/types/src/nanotdf-crypto/ciphers.d.ts +8 -0
  189. package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
  190. package/dist/types/src/nanotdf-crypto/decrypt.d.ts +14 -0
  191. package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
  192. package/dist/types/src/nanotdf-crypto/digest.d.ts +3 -0
  193. package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
  194. package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts +35 -0
  195. package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
  196. package/dist/types/src/nanotdf-crypto/encrypt.d.ts +14 -0
  197. package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
  198. package/dist/types/src/nanotdf-crypto/enums.d.ts +42 -0
  199. package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
  200. package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts +7 -0
  201. package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
  202. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts +10 -0
  203. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
  204. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts +5 -0
  205. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
  206. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts +13 -0
  207. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts.map +1 -0
  208. package/dist/types/src/nanotdf-crypto/index.d.ts +12 -0
  209. package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
  210. package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts +28 -0
  211. package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
  212. package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts +28 -0
  213. package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
  214. package/dist/types/src/policy/api.d.ts +4 -0
  215. package/dist/types/src/policy/api.d.ts.map +1 -0
  216. package/dist/types/src/policy/attributes.d.ts +95 -0
  217. package/dist/types/src/policy/attributes.d.ts.map +1 -0
  218. package/dist/types/src/policy/granter.d.ts +23 -0
  219. package/dist/types/src/policy/granter.d.ts.map +1 -0
  220. package/dist/types/src/tdf/AttributeObject.d.ts +13 -0
  221. package/dist/types/src/tdf/AttributeObject.d.ts.map +1 -0
  222. package/dist/types/src/tdf/AttributeObjectJwt.d.ts +4 -0
  223. package/dist/types/src/tdf/AttributeObjectJwt.d.ts.map +1 -0
  224. package/dist/types/src/tdf/Crypto.d.ts +37 -0
  225. package/dist/types/src/tdf/Crypto.d.ts.map +1 -0
  226. package/dist/types/src/tdf/EntityObject.d.ts +18 -0
  227. package/dist/types/src/tdf/EntityObject.d.ts.map +1 -0
  228. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
  229. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
  230. package/dist/types/src/tdf/Policy.d.ts +28 -0
  231. package/dist/types/src/tdf/Policy.d.ts.map +1 -0
  232. package/dist/types/src/tdf/PolicyObject.d.ts +11 -0
  233. package/dist/types/src/tdf/PolicyObject.d.ts.map +1 -0
  234. package/dist/types/src/tdf/TypedArray.d.ts +3 -0
  235. package/dist/types/src/tdf/TypedArray.d.ts.map +1 -0
  236. package/dist/types/src/tdf/index.d.ts +7 -0
  237. package/dist/types/src/tdf/index.d.ts.map +1 -0
  238. package/dist/types/src/types/index.d.ts +45 -0
  239. package/dist/types/src/types/index.d.ts.map +1 -0
  240. package/dist/types/src/utils.d.ts +45 -0
  241. package/dist/types/src/utils.d.ts.map +1 -0
  242. package/dist/types/src/version.d.ts +9 -0
  243. package/dist/types/src/version.d.ts.map +1 -0
  244. package/dist/types/tdf3/index.d.ts +16 -0
  245. package/dist/types/tdf3/index.d.ts.map +1 -0
  246. package/dist/types/tdf3/src/assertions.d.ts +63 -0
  247. package/dist/types/tdf3/src/assertions.d.ts.map +1 -0
  248. package/dist/types/tdf3/src/binary.d.ts +38 -0
  249. package/dist/types/tdf3/src/binary.d.ts.map +1 -0
  250. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +18 -0
  251. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -0
  252. package/dist/types/tdf3/src/ciphers/algorithms.d.ts +4 -0
  253. package/dist/types/tdf3/src/ciphers/algorithms.d.ts.map +1 -0
  254. package/dist/types/tdf3/src/ciphers/index.d.ts +3 -0
  255. package/dist/types/tdf3/src/ciphers/index.d.ts.map +1 -0
  256. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +14 -0
  257. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -0
  258. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts +53 -0
  259. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts.map +1 -0
  260. package/dist/types/tdf3/src/client/builders.d.ts +436 -0
  261. package/dist/types/tdf3/src/client/builders.d.ts.map +1 -0
  262. package/dist/types/tdf3/src/client/index.d.ts +139 -0
  263. package/dist/types/tdf3/src/client/index.d.ts.map +1 -0
  264. package/dist/types/tdf3/src/client/validation.d.ts +8 -0
  265. package/dist/types/tdf3/src/client/validation.d.ts.map +1 -0
  266. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +34 -0
  267. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -0
  268. package/dist/types/tdf3/src/crypto/declarations.d.ts +60 -0
  269. package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -0
  270. package/dist/types/tdf3/src/crypto/index.d.ts +103 -0
  271. package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -0
  272. package/dist/types/tdf3/src/index.d.ts +5 -0
  273. package/dist/types/tdf3/src/index.d.ts.map +1 -0
  274. package/dist/types/tdf3/src/models/attribute-set.d.ts +65 -0
  275. package/dist/types/tdf3/src/models/attribute-set.d.ts.map +1 -0
  276. package/dist/types/tdf3/src/models/encryption-information.d.ts +49 -0
  277. package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -0
  278. package/dist/types/tdf3/src/models/index.d.ts +9 -0
  279. package/dist/types/tdf3/src/models/index.d.ts.map +1 -0
  280. package/dist/types/tdf3/src/models/key-access.d.ts +42 -0
  281. package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -0
  282. package/dist/types/tdf3/src/models/manifest.d.ts +9 -0
  283. package/dist/types/tdf3/src/models/manifest.d.ts.map +1 -0
  284. package/dist/types/tdf3/src/models/payload.d.ts +7 -0
  285. package/dist/types/tdf3/src/models/payload.d.ts.map +1 -0
  286. package/dist/types/tdf3/src/models/policy.d.ts +13 -0
  287. package/dist/types/tdf3/src/models/policy.d.ts.map +1 -0
  288. package/dist/types/tdf3/src/models/upsert-response.d.ts +16 -0
  289. package/dist/types/tdf3/src/models/upsert-response.d.ts.map +1 -0
  290. package/dist/types/tdf3/src/tdf.d.ts +152 -0
  291. package/dist/types/tdf3/src/tdf.d.ts.map +1 -0
  292. package/dist/types/tdf3/src/templates/default.html.d.ts +8 -0
  293. package/dist/types/tdf3/src/templates/default.html.d.ts.map +1 -0
  294. package/dist/types/tdf3/src/templates/escaper.d.ts +6 -0
  295. package/dist/types/tdf3/src/templates/escaper.d.ts.map +1 -0
  296. package/dist/types/tdf3/src/templates/index.d.ts +3 -0
  297. package/dist/types/tdf3/src/templates/index.d.ts.map +1 -0
  298. package/dist/types/tdf3/src/utils/buffer-crc32.d.ts +2 -0
  299. package/dist/types/tdf3/src/utils/buffer-crc32.d.ts.map +1 -0
  300. package/dist/types/tdf3/src/utils/chunkers.d.ts +29 -0
  301. package/dist/types/tdf3/src/utils/chunkers.d.ts.map +1 -0
  302. package/dist/types/tdf3/src/utils/index.d.ts +36 -0
  303. package/dist/types/tdf3/src/utils/index.d.ts.map +1 -0
  304. package/dist/types/tdf3/src/utils/keysplit.d.ts +19 -0
  305. package/dist/types/tdf3/src/utils/keysplit.d.ts.map +1 -0
  306. package/dist/types/tdf3/src/utils/zip-reader.d.ts +63 -0
  307. package/dist/types/tdf3/src/utils/zip-reader.d.ts.map +1 -0
  308. package/dist/types/tdf3/src/utils/zip-writer.d.ts +35 -0
  309. package/dist/types/tdf3/src/utils/zip-writer.d.ts.map +1 -0
  310. package/dist/types/tdf3/src/version.d.ts +3 -0
  311. package/dist/types/tdf3/src/version.d.ts.map +1 -0
  312. package/dist/web/package.json +3 -0
  313. package/dist/web/src/access.js +147 -0
  314. package/dist/web/src/auth/Eas.js +55 -0
  315. package/dist/web/src/auth/auth.js +71 -0
  316. package/dist/web/src/auth/oidc-clientcredentials-provider.js +22 -0
  317. package/dist/web/src/auth/oidc-externaljwt-provider.js +29 -0
  318. package/dist/web/src/auth/oidc-refreshtoken-provider.js +30 -0
  319. package/dist/web/src/auth/oidc.js +215 -0
  320. package/dist/web/src/auth/providers.js +119 -0
  321. package/dist/web/src/encodings/base64.js +147 -0
  322. package/dist/web/src/encodings/hex.js +63 -0
  323. package/dist/web/src/encodings/index.js +3 -0
  324. package/dist/web/src/errors.js +123 -0
  325. package/dist/web/src/index.js +313 -0
  326. package/dist/web/src/nanotdf/Client.js +268 -0
  327. package/dist/web/src/nanotdf/NanoTDF.js +89 -0
  328. package/dist/web/src/nanotdf/browser-entry.js +14 -0
  329. package/dist/web/src/nanotdf/constants.js +2 -0
  330. package/dist/web/src/nanotdf/decrypt.js +14 -0
  331. package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
  332. package/dist/web/src/nanotdf/encrypt.js +126 -0
  333. package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
  334. package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
  335. package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
  336. package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
  337. package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
  338. package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
  339. package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
  340. package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
  341. package/dist/web/src/nanotdf/index.js +11 -0
  342. package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
  343. package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
  344. package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
  345. package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
  346. package/dist/web/src/nanotdf/models/Header.js +250 -0
  347. package/dist/web/src/nanotdf/models/Payload.js +156 -0
  348. package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
  349. package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
  350. package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
  351. package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
  352. package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
  353. package/dist/web/src/nanotdf/models/Signature.js +74 -0
  354. package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
  355. package/dist/web/src/nanotdf-crypto/decrypt.js +21 -0
  356. package/dist/web/src/nanotdf-crypto/digest.js +4 -0
  357. package/dist/web/src/nanotdf-crypto/ecdsaSignature.js +77 -0
  358. package/dist/web/src/nanotdf-crypto/encrypt.js +21 -0
  359. package/dist/web/src/nanotdf-crypto/enums.js +49 -0
  360. package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
  361. package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
  362. package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
  363. package/dist/web/src/nanotdf-crypto/importRawKey.js +15 -0
  364. package/dist/web/src/nanotdf-crypto/index.js +12 -0
  365. package/dist/web/src/nanotdf-crypto/keyAgreement.js +87 -0
  366. package/dist/web/src/nanotdf-crypto/pemPublicToCrypto.js +197 -0
  367. package/dist/web/src/policy/api.js +54 -0
  368. package/dist/web/src/policy/attributes.js +2 -0
  369. package/dist/web/src/policy/granter.js +141 -0
  370. package/dist/web/src/tdf/AttributeObject.js +11 -0
  371. package/dist/web/src/tdf/AttributeObjectJwt.js +2 -0
  372. package/dist/web/src/tdf/Crypto.js +44 -0
  373. package/dist/web/src/tdf/EntityObject.js +2 -0
  374. package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
  375. package/dist/web/src/tdf/Policy.js +48 -0
  376. package/dist/web/src/tdf/PolicyObject.js +2 -0
  377. package/dist/web/src/tdf/TypedArray.js +2 -0
  378. package/dist/web/src/tdf/index.js +4 -0
  379. package/dist/web/src/types/index.js +2 -0
  380. package/dist/web/src/utils.js +133 -0
  381. package/dist/web/src/version.js +9 -0
  382. package/dist/web/tdf3/index.js +13 -0
  383. package/dist/web/tdf3/src/assertions.js +111 -0
  384. package/dist/web/tdf3/src/binary.js +149 -0
  385. package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +52 -0
  386. package/dist/web/tdf3/src/ciphers/algorithms.js +5 -0
  387. package/dist/web/tdf3/src/ciphers/index.js +3 -0
  388. package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +18 -0
  389. package/dist/web/tdf3/src/client/DecoratedReadableStream.js +107 -0
  390. package/dist/web/tdf3/src/client/builders.js +557 -0
  391. package/dist/web/tdf3/src/client/index.js +423 -0
  392. package/dist/web/tdf3/src/client/validation.js +58 -0
  393. package/dist/web/tdf3/src/crypto/crypto-utils.js +107 -0
  394. package/dist/web/tdf3/src/crypto/declarations.js +5 -0
  395. package/dist/web/tdf3/src/crypto/index.js +296 -0
  396. package/dist/web/tdf3/src/index.js +5 -0
  397. package/dist/web/tdf3/src/models/attribute-set.js +118 -0
  398. package/dist/web/tdf3/src/models/encryption-information.js +86 -0
  399. package/dist/web/tdf3/src/models/index.js +9 -0
  400. package/dist/web/tdf3/src/models/key-access.js +74 -0
  401. package/dist/web/tdf3/src/models/manifest.js +2 -0
  402. package/dist/web/tdf3/src/models/payload.js +2 -0
  403. package/dist/web/tdf3/src/models/policy.js +20 -0
  404. package/dist/web/tdf3/src/models/upsert-response.js +2 -0
  405. package/dist/web/tdf3/src/tdf.js +866 -0
  406. package/dist/web/tdf3/src/templates/default.html.js +96 -0
  407. package/dist/web/tdf3/src/templates/escaper.js +10 -0
  408. package/dist/web/tdf3/src/templates/index.js +3 -0
  409. package/dist/web/tdf3/src/utils/buffer-crc32.js +44 -0
  410. package/dist/web/tdf3/src/utils/chunkers.js +96 -0
  411. package/dist/web/tdf3/src/utils/index.js +248 -0
  412. package/dist/web/tdf3/src/utils/keysplit.js +55 -0
  413. package/dist/web/tdf3/src/utils/zip-reader.js +247 -0
  414. package/dist/web/tdf3/src/utils/zip-writer.js +302 -0
  415. package/dist/web/tdf3/src/version.js +3 -0
  416. package/package.json +126 -0
  417. package/src/access.ts +198 -0
  418. package/src/auth/Eas.ts +79 -0
  419. package/src/auth/auth.ts +141 -0
  420. package/src/auth/oidc-clientcredentials-provider.ts +32 -0
  421. package/src/auth/oidc-externaljwt-provider.ts +41 -0
  422. package/src/auth/oidc-refreshtoken-provider.ts +41 -0
  423. package/src/auth/oidc.ts +307 -0
  424. package/src/auth/providers.ts +139 -0
  425. package/src/encodings/base64.ts +160 -0
  426. package/src/encodings/hex.ts +69 -0
  427. package/src/encodings/index.ts +2 -0
  428. package/src/errors.ts +113 -0
  429. package/src/index.ts +441 -0
  430. package/src/nanotdf/Client.ts +349 -0
  431. package/src/nanotdf/NanoTDF.ts +121 -0
  432. package/src/nanotdf/browser-entry.ts +20 -0
  433. package/src/nanotdf/constants.ts +1 -0
  434. package/src/nanotdf/decrypt.ts +19 -0
  435. package/src/nanotdf/encrypt-dataset.ts +52 -0
  436. package/src/nanotdf/encrypt.ts +197 -0
  437. package/src/nanotdf/enum/CipherEnum.ts +10 -0
  438. package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
  439. package/src/nanotdf/enum/EncodingEnum.ts +5 -0
  440. package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
  441. package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
  442. package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
  443. package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
  444. package/src/nanotdf/helpers/getHkdfSalt.ts +15 -0
  445. package/src/nanotdf/index.ts +10 -0
  446. package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
  447. package/src/nanotdf/models/Ciphers.ts +67 -0
  448. package/src/nanotdf/models/DefaultParams.ts +24 -0
  449. package/src/nanotdf/models/EcCurves.ts +40 -0
  450. package/src/nanotdf/models/Header.ts +322 -0
  451. package/src/nanotdf/models/Payload.ts +196 -0
  452. package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
  453. package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
  454. package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
  455. package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
  456. package/src/nanotdf/models/ResourceLocator.ts +212 -0
  457. package/src/nanotdf/models/Signature.ts +85 -0
  458. package/src/nanotdf-crypto/ciphers.ts +13 -0
  459. package/src/nanotdf-crypto/decrypt.ts +30 -0
  460. package/src/nanotdf-crypto/digest.ts +8 -0
  461. package/src/nanotdf-crypto/ecdsaSignature.ts +109 -0
  462. package/src/nanotdf-crypto/encrypt.ts +30 -0
  463. package/src/nanotdf-crypto/enums.ts +47 -0
  464. package/src/nanotdf-crypto/exportCryptoKey.ts +17 -0
  465. package/src/nanotdf-crypto/generateKeyPair.ts +19 -0
  466. package/src/nanotdf-crypto/generateRandomNumber.ts +8 -0
  467. package/src/nanotdf-crypto/importRawKey.ts +19 -0
  468. package/src/nanotdf-crypto/index.ts +11 -0
  469. package/src/nanotdf-crypto/keyAgreement.ts +139 -0
  470. package/src/nanotdf-crypto/pemPublicToCrypto.ts +232 -0
  471. package/src/package-lock.json +6 -0
  472. package/src/package.json +3 -0
  473. package/src/platform/authorization/authorization_connect.d.ts +44 -0
  474. package/src/platform/authorization/authorization_connect.js +44 -0
  475. package/src/platform/authorization/authorization_pb.d.ts +707 -0
  476. package/src/platform/authorization/authorization_pb.js +372 -0
  477. package/src/platform/common/common_pb.d.ts +129 -0
  478. package/src/platform/common/common_pb.js +58 -0
  479. package/src/platform/entityresolution/entity_resolution_connect.d.ts +35 -0
  480. package/src/platform/entityresolution/entity_resolution_connect.js +35 -0
  481. package/src/platform/entityresolution/entity_resolution_pb.d.ts +242 -0
  482. package/src/platform/entityresolution/entity_resolution_pb.js +139 -0
  483. package/src/platform/kas/kas_connect.d.ts +59 -0
  484. package/src/platform/kas/kas_connect.js +59 -0
  485. package/src/platform/kas/kas_pb.d.ts +200 -0
  486. package/src/platform/kas/kas_pb.js +84 -0
  487. package/src/platform/policy/attributes/attributes_connect.d.ts +168 -0
  488. package/src/platform/policy/attributes/attributes_connect.js +168 -0
  489. package/src/platform/policy/attributes/attributes_pb.d.ts +929 -0
  490. package/src/platform/policy/attributes/attributes_pb.js +363 -0
  491. package/src/platform/policy/kasregistry/key_access_server_registry_connect.d.ts +62 -0
  492. package/src/platform/policy/kasregistry/key_access_server_registry_connect.js +62 -0
  493. package/src/platform/policy/kasregistry/key_access_server_registry_pb.d.ts +283 -0
  494. package/src/platform/policy/kasregistry/key_access_server_registry_pb.js +113 -0
  495. package/src/platform/policy/namespaces/namespaces_connect.d.ts +62 -0
  496. package/src/platform/policy/namespaces/namespaces_connect.js +62 -0
  497. package/src/platform/policy/namespaces/namespaces_pb.d.ts +270 -0
  498. package/src/platform/policy/namespaces/namespaces_pb.js +110 -0
  499. package/src/platform/policy/objects_pb.d.ts +725 -0
  500. package/src/platform/policy/objects_pb.js +288 -0
  501. package/src/platform/policy/resourcemapping/resource_mapping_connect.d.ts +259 -0
  502. package/src/platform/policy/resourcemapping/resource_mapping_connect.js +259 -0
  503. package/src/platform/policy/resourcemapping/resource_mapping_pb.d.ts +314 -0
  504. package/src/platform/policy/resourcemapping/resource_mapping_pb.js +142 -0
  505. package/src/platform/policy/selectors_pb.d.ts +269 -0
  506. package/src/platform/policy/selectors_pb.js +110 -0
  507. package/src/platform/policy/subjectmapping/subject_mapping_connect.d.ts +118 -0
  508. package/src/platform/policy/subjectmapping/subject_mapping_connect.js +118 -0
  509. package/src/platform/policy/subjectmapping/subject_mapping_pb.d.ts +672 -0
  510. package/src/platform/policy/subjectmapping/subject_mapping_pb.js +260 -0
  511. package/src/platform/wellknownconfiguration/wellknown_configuration_connect.d.ts +26 -0
  512. package/src/platform/wellknownconfiguration/wellknown_configuration_connect.js +26 -0
  513. package/src/platform/wellknownconfiguration/wellknown_configuration_pb.d.ts +75 -0
  514. package/src/platform/wellknownconfiguration/wellknown_configuration_pb.js +35 -0
  515. package/src/policy/api.ts +61 -0
  516. package/src/policy/attributes.ts +117 -0
  517. package/src/policy/granter.ts +181 -0
  518. package/src/tdf/AttributeObject.ts +27 -0
  519. package/src/tdf/AttributeObjectJwt.ts +3 -0
  520. package/src/tdf/Crypto.ts +42 -0
  521. package/src/tdf/EntityObject.ts +18 -0
  522. package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
  523. package/src/tdf/Policy.ts +51 -0
  524. package/src/tdf/PolicyObject.ts +12 -0
  525. package/src/tdf/TypedArray.ts +12 -0
  526. package/src/tdf/index.ts +6 -0
  527. package/src/types/index.ts +55 -0
  528. package/src/utils.ts +149 -0
  529. package/src/version.ts +9 -0
  530. package/tdf3/index.ts +91 -0
  531. package/tdf3/package-lock.json +6 -0
  532. package/tdf3/package.json +3 -0
  533. package/tdf3/src/assertions.ts +191 -0
  534. package/tdf3/src/binary.ts +195 -0
  535. package/tdf3/src/ciphers/aes-gcm-cipher.ts +76 -0
  536. package/tdf3/src/ciphers/algorithms.ts +9 -0
  537. package/tdf3/src/ciphers/index.ts +2 -0
  538. package/tdf3/src/ciphers/symmetric-cipher-base.ts +38 -0
  539. package/tdf3/src/client/DecoratedReadableStream.ts +148 -0
  540. package/tdf3/src/client/builders.ts +701 -0
  541. package/tdf3/src/client/index.ts +637 -0
  542. package/tdf3/src/client/validation.ts +79 -0
  543. package/tdf3/src/crypto/crypto-utils.ts +119 -0
  544. package/tdf3/src/crypto/declarations.ts +89 -0
  545. package/tdf3/src/crypto/index.ts +394 -0
  546. package/tdf3/src/index.ts +4 -0
  547. package/tdf3/src/models/attribute-set.ts +142 -0
  548. package/tdf3/src/models/encryption-information.ts +172 -0
  549. package/tdf3/src/models/index.ts +8 -0
  550. package/tdf3/src/models/key-access.ts +128 -0
  551. package/tdf3/src/models/manifest.ts +9 -0
  552. package/tdf3/src/models/payload.ts +6 -0
  553. package/tdf3/src/models/policy.ts +35 -0
  554. package/tdf3/src/models/upsert-response.ts +17 -0
  555. package/tdf3/src/tdf.ts +1351 -0
  556. package/tdf3/src/templates/default.html.ts +105 -0
  557. package/tdf3/src/templates/escaper.ts +10 -0
  558. package/tdf3/src/templates/index.ts +2 -0
  559. package/tdf3/src/utils/buffer-crc32.ts +46 -0
  560. package/tdf3/src/utils/chunkers.ts +118 -0
  561. package/tdf3/src/utils/index.ts +309 -0
  562. package/tdf3/src/utils/keysplit.ts +63 -0
  563. package/tdf3/src/utils/zip-reader.ts +341 -0
  564. package/tdf3/src/utils/zip-writer.ts +375 -0
  565. package/tdf3/src/version.ts +2 -0
  566. package/tdf3/types.d.ts +14 -0
@@ -0,0 +1,460 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ var __importDefault = (this && this.__importDefault) || function (mod) {
26
+ return (mod && mod.__esModule) ? mod : { "default": mod };
27
+ };
28
+ Object.defineProperty(exports, "__esModule", { value: true });
29
+ exports.withHeaders = exports.fromDataSource = exports.HttpRequest = exports.EncryptParamsBuilder = exports.DecryptParamsBuilder = exports.AppIdAuthProvider = exports.Client = exports.createSessionKeys = exports.uploadBinaryToS3 = void 0;
30
+ const uuid_1 = require("uuid");
31
+ const axios_1 = __importDefault(require("axios"));
32
+ const index_js_1 = require("../utils/index.js");
33
+ Object.defineProperty(exports, "fromDataSource", { enumerable: true, get: function () { return index_js_1.fromDataSource; } });
34
+ const index_js_2 = require("../../../src/encodings/index.js");
35
+ const tdf_js_1 = require("../tdf.js");
36
+ const oidc_refreshtoken_provider_js_1 = require("../../../src/auth/oidc-refreshtoken-provider.js");
37
+ const oidc_externaljwt_provider_js_1 = require("../../../src/auth/oidc-externaljwt-provider.js");
38
+ const auth_js_1 = require("../../../src/auth/auth.js");
39
+ Object.defineProperty(exports, "AppIdAuthProvider", { enumerable: true, get: function () { return auth_js_1.AppIdAuthProvider; } });
40
+ Object.defineProperty(exports, "HttpRequest", { enumerable: true, get: function () { return auth_js_1.HttpRequest; } });
41
+ Object.defineProperty(exports, "withHeaders", { enumerable: true, get: function () { return auth_js_1.withHeaders; } });
42
+ const Eas_js_1 = __importDefault(require("../../../src/auth/Eas.js"));
43
+ const utils_js_1 = require("../../../src/utils.js");
44
+ const DecoratedReadableStream_js_1 = require("./DecoratedReadableStream.js");
45
+ const builders_js_1 = require("./builders.js");
46
+ Object.defineProperty(exports, "DecryptParamsBuilder", { enumerable: true, get: function () { return builders_js_1.DecryptParamsBuilder; } });
47
+ Object.defineProperty(exports, "EncryptParamsBuilder", { enumerable: true, get: function () { return builders_js_1.EncryptParamsBuilder; } });
48
+ const access_js_1 = require("../../../src/access.js");
49
+ const errors_js_1 = require("../../../src/errors.js");
50
+ const aes_gcm_cipher_js_1 = require("../ciphers/aes-gcm-cipher.js");
51
+ const crypto_utils_js_1 = require("../crypto/crypto-utils.js");
52
+ const defaultCryptoService = __importStar(require("../crypto/index.js"));
53
+ const index_js_3 = require("../models/index.js");
54
+ const granter_js_1 = require("../../../src/policy/granter.js");
55
+ const api_js_1 = require("../../../src/policy/api.js");
56
+ const GLOBAL_BYTE_LIMIT = 64 * 1000 * 1000 * 1000; // 64 GB, see WS-9363.
57
+ const HTML_BYTE_LIMIT = 100 * 1000 * 1000; // 100 MB, see WS-9476.
58
+ // No default config for now. Delegate to Virtru wrapper for endpoints.
59
+ const defaultClientConfig = { oidcOrigin: '', cryptoService: defaultCryptoService };
60
+ const uploadBinaryToS3 = async function (stream, uploadUrl, fileSize) {
61
+ try {
62
+ const body = await (0, index_js_1.streamToBuffer)(stream);
63
+ await axios_1.default.put(uploadUrl, body, {
64
+ headers: {
65
+ 'Content-Length': fileSize,
66
+ 'content-type': 'application/zip',
67
+ 'cache-control': 'no-store',
68
+ },
69
+ maxContentLength: Infinity,
70
+ maxBodyLength: Infinity,
71
+ });
72
+ }
73
+ catch (e) {
74
+ console.error(e);
75
+ throw e;
76
+ }
77
+ };
78
+ exports.uploadBinaryToS3 = uploadBinaryToS3;
79
+ const getFirstTwoBytes = async (chunker) => new TextDecoder().decode(await chunker(0, 2));
80
+ const makeChunkable = async (source) => {
81
+ if (!source) {
82
+ throw new errors_js_1.ConfigurationError('invalid source');
83
+ }
84
+ // dump stream to buffer
85
+ // we don't support streams anyways (see zipreader.js)
86
+ let initialChunker;
87
+ let buf = null;
88
+ switch (source.type) {
89
+ case 'stream':
90
+ buf = await (0, index_js_1.streamToBuffer)(source.location);
91
+ initialChunker = (0, index_js_1.fromBuffer)(buf);
92
+ break;
93
+ case 'buffer':
94
+ buf = source.location;
95
+ initialChunker = (0, index_js_1.fromBuffer)(buf);
96
+ break;
97
+ case 'chunker':
98
+ initialChunker = source.location;
99
+ break;
100
+ default:
101
+ initialChunker = await (0, index_js_1.fromDataSource)(source);
102
+ }
103
+ const magic = await getFirstTwoBytes(initialChunker);
104
+ // Pull first two bytes from source.
105
+ if (magic === 'PK') {
106
+ return initialChunker;
107
+ }
108
+ // Unwrap if it's html.
109
+ // If NOT zip (html), convert/dump to buffer, unwrap, and continue.
110
+ const htmlBuf = buf ?? (await initialChunker());
111
+ const zipBuf = (0, tdf_js_1.unwrapHtml)(htmlBuf);
112
+ return (0, index_js_1.fromBuffer)(zipBuf);
113
+ };
114
+ /*
115
+ * Extract a keypair provided as part of the options dict.
116
+ * Default to using the clientwide keypair, generating one if necessary.
117
+ *
118
+ * Additionally, update the auth injector with the (potentially new) pubkey
119
+ */
120
+ async function createSessionKeys({ authProvider,
121
+ // FIXME use cryptoservice to generate keys again
122
+ cryptoService, dpopKeys, }) {
123
+ let signingKeys;
124
+ if (dpopKeys) {
125
+ signingKeys = await dpopKeys;
126
+ }
127
+ else {
128
+ const keys = await cryptoService.generateSigningKeyPair();
129
+ // signingKeys = await crypto.subtle.generateKey(rsaPkcs1Sha256(), true, ['sign']);
130
+ signingKeys = await (0, crypto_utils_js_1.toCryptoKeyPair)(keys);
131
+ }
132
+ // This will contact the auth server and forcibly refresh the auth token claims,
133
+ // binding the token and the (new) pubkey together.
134
+ // Note that we base64 encode the PEM string here as a quick workaround, simply because
135
+ // a formatted raw PEM string isn't a valid header value and sending it raw makes keycloak's
136
+ // header parser barf. There are more subtle ways to solve this, but this works for now.
137
+ if (authProvider && !(0, index_js_1.isAppIdProviderCheck)(authProvider)) {
138
+ await authProvider?.updateClientPublicKey(signingKeys);
139
+ }
140
+ return signingKeys;
141
+ }
142
+ exports.createSessionKeys = createSessionKeys;
143
+ /*
144
+ * Create a policy object for an encrypt operation.
145
+ */
146
+ function asPolicy(scope) {
147
+ if (scope.policyObject) {
148
+ // use the client override if provided
149
+ return scope.policyObject;
150
+ }
151
+ const policyId = scope.policyId ?? (0, uuid_1.v4)();
152
+ let dataAttributes;
153
+ if (scope.attributeValues) {
154
+ dataAttributes = scope.attributeValues
155
+ .filter(({ fqn }) => !!fqn)
156
+ .map(({ fqn }) => {
157
+ return { attribute: fqn };
158
+ });
159
+ }
160
+ else {
161
+ dataAttributes = (scope.attributes ?? []).map((attribute) => typeof attribute === 'string' ? { attribute } : attribute);
162
+ }
163
+ return {
164
+ uuid: policyId,
165
+ body: {
166
+ dataAttributes,
167
+ dissem: scope.dissem ?? [],
168
+ },
169
+ };
170
+ }
171
+ class Client {
172
+ /**
173
+ * An abstraction for protecting and accessing data using TDF3 services.
174
+ * @param {Object} [config.keypair] - keypair generated for signing. Optional, will be generated by sdk if not passed
175
+ * @param {String} [config.clientId]
176
+ * @param {String} [config.kasEndpoint] - Key Access Server url
177
+ * @param {String} [config.refreshToken] - After logging in to browser OIDC interface user
178
+ * receives fresh token that needed by SDK for auth needs
179
+ * @param {String} [config.externalJwt] - JWT from external authority (eg Google)
180
+ * @param {String} [config.oidcOrigin] - Endpoint of authentication service
181
+ */
182
+ constructor(config) {
183
+ this.kasKeys = {};
184
+ const clientConfig = { ...defaultClientConfig, ...config };
185
+ this.cryptoService = clientConfig.cryptoService;
186
+ this.dpopEnabled = !!(clientConfig.dpopEnabled || clientConfig.dpopKeys);
187
+ clientConfig.readerUrl && (this.readerUrl = clientConfig.readerUrl);
188
+ if (clientConfig.kasEndpoint) {
189
+ this.kasEndpoint = clientConfig.kasEndpoint;
190
+ }
191
+ else {
192
+ // handle Deprecated `kasRewrapEndpoint` parameter
193
+ if (!clientConfig.keyRewrapEndpoint) {
194
+ throw new errors_js_1.ConfigurationError('KAS definition not found');
195
+ }
196
+ this.kasEndpoint = clientConfig.keyRewrapEndpoint.replace(/\/rewrap$/, '');
197
+ }
198
+ this.kasEndpoint = (0, utils_js_1.rstrip)(this.kasEndpoint, '/');
199
+ if (clientConfig.policyEndpoint) {
200
+ this.policyEndpoint = (0, utils_js_1.rstrip)(clientConfig.policyEndpoint, '/');
201
+ }
202
+ else if (this.kasEndpoint.endsWith('/kas')) {
203
+ this.policyEndpoint = this.kasEndpoint.slice(0, -4);
204
+ }
205
+ const kasOrigin = new URL(this.kasEndpoint).origin;
206
+ if (clientConfig.allowedKases) {
207
+ this.allowedKases = new access_js_1.OriginAllowList(clientConfig.allowedKases, !!clientConfig.ignoreAllowList);
208
+ if (!(0, utils_js_1.validateSecureUrl)(this.kasEndpoint) && !this.allowedKases.allows(kasOrigin)) {
209
+ throw new errors_js_1.ConfigurationError(`Invalid KAS endpoint [${this.kasEndpoint}]`);
210
+ }
211
+ }
212
+ else {
213
+ if (!(0, utils_js_1.validateSecureUrl)(this.kasEndpoint)) {
214
+ throw new errors_js_1.ConfigurationError(`Invalid KAS endpoint [${this.kasEndpoint}]; to force, please list it among allowedKases`);
215
+ }
216
+ this.allowedKases = new access_js_1.OriginAllowList([kasOrigin], !!clientConfig.ignoreAllowList);
217
+ }
218
+ this.authProvider = config.authProvider;
219
+ this.clientConfig = clientConfig;
220
+ if (this.authProvider && (0, index_js_1.isAppIdProviderCheck)(this.authProvider)) {
221
+ this.eas = new Eas_js_1.default({
222
+ authProvider: this.authProvider,
223
+ endpoint: clientConfig.entityObjectEndpoint ?? `${clientConfig.easEndpoint}/api/entityobject`,
224
+ });
225
+ }
226
+ this.clientId = clientConfig.clientId;
227
+ if (!this.authProvider) {
228
+ if (!clientConfig.clientId) {
229
+ throw new errors_js_1.ConfigurationError('Client ID or custom AuthProvider must be defined');
230
+ }
231
+ //Are we exchanging a refreshToken for a bearer token (normal AuthCode browser auth flow)?
232
+ //If this is a browser context, we expect the caller to handle the initial
233
+ //browser-based OIDC login and authentication process against the OIDC endpoint using their chosen method,
234
+ //and provide us with a valid refresh token/clientId obtained from that process.
235
+ if (clientConfig.refreshToken) {
236
+ this.authProvider = new oidc_refreshtoken_provider_js_1.OIDCRefreshTokenProvider({
237
+ clientId: clientConfig.clientId,
238
+ refreshToken: clientConfig.refreshToken,
239
+ oidcOrigin: clientConfig.oidcOrigin,
240
+ });
241
+ }
242
+ else if (clientConfig.externalJwt) {
243
+ //Are we exchanging a JWT previously issued by a trusted external entity (e.g. Google) for a bearer token?
244
+ this.authProvider = new oidc_externaljwt_provider_js_1.OIDCExternalJwtProvider({
245
+ clientId: clientConfig.clientId,
246
+ externalJwt: clientConfig.externalJwt,
247
+ oidcOrigin: clientConfig.oidcOrigin,
248
+ });
249
+ }
250
+ }
251
+ this.dpopKeys = createSessionKeys({
252
+ authProvider: this.authProvider,
253
+ cryptoService: this.cryptoService,
254
+ dpopKeys: clientConfig.dpopKeys,
255
+ });
256
+ if (clientConfig.kasPublicKey) {
257
+ this.kasKeys[this.kasEndpoint] = Promise.resolve({
258
+ url: this.kasEndpoint,
259
+ algorithm: 'rsa:2048',
260
+ key: (0, utils_js_1.pemToCryptoPublicKey)(clientConfig.kasPublicKey),
261
+ publicKey: clientConfig.kasPublicKey,
262
+ });
263
+ }
264
+ }
265
+ /**
266
+ * Encrypt plaintext into TDF ciphertext. One of the core operations of the Virtru SDK.
267
+ *
268
+ * @param scope dissem and attributes for constructing the policy
269
+ * @param source source object of unencrypted data
270
+ * @param [asHtml] If we should wrap the TDF data in a self-opening HTML wrapper. Defaults to false
271
+ * @param [autoconfigure] If we should use scope.attributes to configure KAOs
272
+ * @param [metadata] Additional non-secret data to store with the TDF
273
+ * @param [opts] Test only
274
+ * @param [mimeType] mime type of source. defaults to `unknown`
275
+ * @param [offline] Where to store the policy. Defaults to `false` - which results in `upsert` events to store/update a policy
276
+ * @param [windowSize] - segment size in bytes. Defaults to a a million bytes.
277
+ * @param [keyMiddleware] - function that handle keys
278
+ * @param [streamMiddleware] - function that handle stream
279
+ * @param [eo] - (deprecated) entity object
280
+ * @return a {@link https://nodejs.org/api/stream.html#stream_class_stream_readable|Readable} a new stream containing the TDF ciphertext
281
+ */
282
+ async encrypt({ scope = { attributes: [], dissem: [] }, autoconfigure, source, asHtml = false, metadata, mimeType, offline = false, windowSize = builders_js_1.DEFAULT_SEGMENT_SIZE, eo, keyMiddleware = index_js_1.keyMiddleware, streamMiddleware = async (stream) => stream, splitPlan, assertionConfigs = [], }) {
283
+ const dpopKeys = await this.dpopKeys;
284
+ const policyObject = asPolicy(scope);
285
+ (0, tdf_js_1.validatePolicyObject)(policyObject);
286
+ if (!splitPlan && autoconfigure) {
287
+ let avs = scope.attributeValues ?? [];
288
+ const fqns = scope.attributes
289
+ ? scope.attributes.map((attribute) => typeof attribute === 'string' ? attribute : attribute.attribute)
290
+ : [];
291
+ if (!avs.length && fqns.length) {
292
+ // Hydrate avs from policy endpoint givnen the fqns
293
+ if (!this.policyEndpoint) {
294
+ throw new errors_js_1.ConfigurationError('policyEndpoint not set in TDF3 Client constructor');
295
+ }
296
+ avs = await (0, api_js_1.attributeFQNsAsValues)(this.policyEndpoint, this.authProvider, ...fqns);
297
+ }
298
+ else if (scope.attributeValues) {
299
+ avs = scope.attributeValues;
300
+ if (!scope.attributes) {
301
+ scope.attributes = avs.map(({ fqn }) => fqn);
302
+ }
303
+ }
304
+ if (avs.length != scope.attributes?.length ||
305
+ !avs.map(({ fqn }) => fqn).every((a) => fqns.indexOf(a) >= 0)) {
306
+ throw new errors_js_1.ConfigurationError(`Attribute mismatch between [${fqns}] and explicit values ${JSON.stringify(avs.map(({ fqn }) => fqn))}`);
307
+ }
308
+ const detailedPlan = (0, granter_js_1.plan)(avs);
309
+ splitPlan = detailedPlan.map((kat) => {
310
+ const { kas, sid } = kat;
311
+ if (kas?.publicKey?.cached?.keys && !(kas.uri in this.kasKeys)) {
312
+ const keys = kas.publicKey.cached.keys.filter(({ alg }) => alg == 'KAS_PUBLIC_KEY_ALG_ENUM_RSA_2048');
313
+ if (keys?.length) {
314
+ const key = keys[0];
315
+ this.kasKeys[kas.uri] = Promise.resolve({
316
+ key: (0, utils_js_1.pemToCryptoPublicKey)(key.pem),
317
+ publicKey: key.pem,
318
+ url: kas.uri,
319
+ algorithm: 'rsa:2048',
320
+ kid: key.kid,
321
+ });
322
+ }
323
+ }
324
+ return { kas: kas.uri, sid };
325
+ });
326
+ }
327
+ // TODO: Refactor underlying builder to remove some of this unnecessary config.
328
+ const byteLimit = asHtml ? HTML_BYTE_LIMIT : GLOBAL_BYTE_LIMIT;
329
+ const encryptionInformation = new index_js_3.SplitKey(new aes_gcm_cipher_js_1.AesGcmCipher(this.cryptoService));
330
+ let attributeSet;
331
+ let entity;
332
+ if (eo) {
333
+ entity = eo;
334
+ const s = new index_js_3.AttributeSet();
335
+ eo.attributes.forEach((attr) => s.addJwtAttribute(attr));
336
+ attributeSet = s;
337
+ }
338
+ const splits = splitPlan?.length ? splitPlan : [{ kas: this.kasEndpoint }];
339
+ encryptionInformation.keyAccess = await Promise.all(splits.map(async ({ kas, sid }) => {
340
+ if (!(kas in this.kasKeys)) {
341
+ this.kasKeys[kas] = (0, tdf_js_1.fetchKasPublicKey)(kas);
342
+ }
343
+ const kasPublicKey = await this.kasKeys[kas];
344
+ return (0, tdf_js_1.buildKeyAccess)({
345
+ attributeSet,
346
+ type: offline ? 'wrapped' : 'remote',
347
+ url: kasPublicKey.url,
348
+ kid: kasPublicKey.kid,
349
+ publicKey: kasPublicKey.publicKey,
350
+ metadata,
351
+ sid,
352
+ });
353
+ }));
354
+ const { keyForEncryption, keyForManifest } = await keyMiddleware();
355
+ const ecfg = {
356
+ allowList: this.allowedKases,
357
+ attributeSet,
358
+ byteLimit,
359
+ cryptoService: this.cryptoService,
360
+ dpopKeys,
361
+ encryptionInformation,
362
+ entity,
363
+ segmentSizeDefault: windowSize,
364
+ integrityAlgorithm: 'HS256',
365
+ segmentIntegrityAlgorithm: 'GMAC',
366
+ contentStream: source,
367
+ mimeType,
368
+ policy: policyObject,
369
+ authProvider: this.authProvider,
370
+ progressHandler: this.clientConfig.progressHandler,
371
+ keyForEncryption,
372
+ keyForManifest,
373
+ assertionConfigs,
374
+ };
375
+ const stream = await streamMiddleware(await (0, tdf_js_1.writeStream)(ecfg));
376
+ if (!asHtml) {
377
+ return stream;
378
+ }
379
+ // Wrap if it's html.
380
+ if (!stream.manifest) {
381
+ throw new Error('internal: missing manifest in encrypt function');
382
+ }
383
+ const htmlBuf = (0, tdf_js_1.wrapHtml)(await stream.toBuffer(), stream.manifest, this.readerUrl ?? '');
384
+ return new DecoratedReadableStream_js_1.DecoratedReadableStream({
385
+ pull(controller) {
386
+ controller.enqueue(htmlBuf);
387
+ controller.close();
388
+ },
389
+ });
390
+ }
391
+ /**
392
+ * Decrypt TDF ciphertext into plaintext. One of the core operations of the Virtru SDK.
393
+ *
394
+ * @param params keyMiddleware fucntion to process key
395
+ * @param params streamMiddleware fucntion to process streamMiddleware
396
+ * @param params.source A data stream object, one of remote, stream, buffer, etc. types.
397
+ * @param params.eo Optional entity object (legacy AuthZ)
398
+ * @param params.assertionVerificationKeys Optional verification keys for assertions.
399
+ * @return a {@link https://nodejs.org/api/stream.html#stream_class_stream_readable|Readable} stream containing the decrypted plaintext.
400
+ * @see DecryptParamsBuilder
401
+ */
402
+ async decrypt({ eo, source, keyMiddleware = async (key) => key, streamMiddleware = async (stream) => stream, assertionVerificationKeys, noVerifyAssertions, }) {
403
+ const dpopKeys = await this.dpopKeys;
404
+ let entityObject;
405
+ if (this.eas || eo) {
406
+ const sessionPublicKey = await (0, utils_js_1.cryptoPublicToPem)(dpopKeys.publicKey);
407
+ if (eo && eo.publicKey == sessionPublicKey) {
408
+ entityObject = eo;
409
+ }
410
+ else if (this.eas) {
411
+ entityObject = await this.eas.fetchEntityObject({
412
+ publicKey: sessionPublicKey,
413
+ });
414
+ }
415
+ }
416
+ if (!this.authProvider) {
417
+ throw new errors_js_1.ConfigurationError('AuthProvider missing');
418
+ }
419
+ const chunker = await makeChunkable(source);
420
+ // Await in order to catch any errors from this call.
421
+ // TODO: Write error event to stream and don't await.
422
+ return await streamMiddleware(await (0, tdf_js_1.readStream)({
423
+ allowList: this.allowedKases,
424
+ authProvider: this.authProvider,
425
+ chunker,
426
+ cryptoService: this.cryptoService,
427
+ dpopKeys,
428
+ entity: entityObject,
429
+ fileStreamServiceWorker: this.clientConfig.fileStreamServiceWorker,
430
+ keyMiddleware,
431
+ progressHandler: this.clientConfig.progressHandler,
432
+ assertionVerificationKeys,
433
+ noVerifyAssertions,
434
+ }));
435
+ }
436
+ /**
437
+ * Get the unique policyId associated with TDF ciphertext. Useful for managing authorization policies of encrypted data.
438
+ * <br/><br/>
439
+ * The policyId is embedded in the ciphertext so this is a local operation.
440
+ *
441
+ * @param {object} source - Required. TDF data stream,
442
+ * generated using {@link DecryptParamsBuilder#build|DecryptParamsBuilder's build()}.
443
+ * @return {string} - the unique policyId, which can be used for tracking purposes or policy management operations.
444
+ * @see DecryptParamsBuilder
445
+ */
446
+ async getPolicyId({ source }) {
447
+ const chunker = await makeChunkable(source);
448
+ const zipHelper = new index_js_1.ZipReader(chunker);
449
+ const centralDirectory = await zipHelper.getCentralDirectory();
450
+ const manifest = await zipHelper.getManifest(centralDirectory, '0.manifest.json');
451
+ const policyJson = index_js_2.base64.decode(manifest.encryptionInformation.policy);
452
+ return JSON.parse(policyJson).uuid;
453
+ }
454
+ async loadTDFStream({ source }) {
455
+ const chunker = await makeChunkable(source);
456
+ return (0, tdf_js_1.loadTDFStream)(chunker);
457
+ }
458
+ }
459
+ exports.Client = Client;
460
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../tdf3/src/client/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+BAA0B;AAC1B,kDAA0B;AAC1B,gDAQ2B;AAgnBzB,+FArnBA,yBAAc,OAqnBA;AA/mBhB,8DAAyD;AACzD,sCAUmB;AACnB,mGAA2F;AAC3F,iGAAyF;AAEzF,uDAKmC;AAslBjC,kGAzlBA,2BAAiB,OAylBA;AAIjB,4FA5lBA,qBAAW,OA4lBA;AAEX,4FA7lBA,qBAAW,OA6lBA;AA3lBb,sEAA2C;AAC3C,oDAK+B;AAW/B,6EAAuE;AAEvE,+CAKuB;AA8jBrB,qGAjkBA,kCAAoB,OAikBA;AAEpB,qGAjkBA,kCAAoB,OAikBA;AA/jBtB,sDAA2E;AAC3E,sDAA4D;AAG5D,oEAA4D;AAC5D,+DAA4D;AAC5D,yEAA2D;AAC3D,iDAA+F;AAC/F,+DAAsD;AACtD,uDAAmE;AAGnE,MAAM,iBAAiB,GAAG,EAAE,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,sBAAsB;AACzE,MAAM,eAAe,GAAG,GAAG,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,uBAAuB;AAElE,uEAAuE;AACvE,MAAM,mBAAmB,GAAG,EAAE,UAAU,EAAE,EAAE,EAAE,aAAa,EAAE,oBAAoB,EAAE,CAAC;AAE7E,MAAM,gBAAgB,GAAG,KAAK,WACnC,MAAkC,EAClC,SAAiB,EACjB,QAAgB;IAEhB,IAAI;QACF,MAAM,IAAI,GAAe,MAAM,IAAA,yBAAc,EAAC,MAAM,CAAC,CAAC;QAEtD,MAAM,eAAK,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,EAAE;YAC/B,OAAO,EAAE;gBACP,gBAAgB,EAAE,QAAQ;gBAC1B,cAAc,EAAE,iBAAiB;gBACjC,eAAe,EAAE,UAAU;aAC5B;YACD,gBAAgB,EAAE,QAAQ;YAC1B,aAAa,EAAE,QAAQ;SACxB,CAAC,CAAC;KACJ;IAAC,OAAO,CAAC,EAAE;QACV,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QACjB,MAAM,CAAC,CAAC;KACT;AACH,CAAC,CAAC;AArBW,QAAA,gBAAgB,oBAqB3B;AACF,MAAM,gBAAgB,GAAG,KAAK,EAAE,OAAgB,EAAE,EAAE,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,MAAM,OAAO,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;AAEnG,MAAM,aAAa,GAAG,KAAK,EAAE,MAAqB,EAAE,EAAE;IACpD,IAAI,CAAC,MAAM,EAAE;QACX,MAAM,IAAI,8BAAkB,CAAC,gBAAgB,CAAC,CAAC;KAChD;IACD,wBAAwB;IACxB,sDAAsD;IACtD,IAAI,cAAuB,CAAC;IAC5B,IAAI,GAAG,GAAG,IAAI,CAAC;IACf,QAAQ,MAAM,CAAC,IAAI,EAAE;QACnB,KAAK,QAAQ;YACX,GAAG,GAAG,MAAM,IAAA,yBAAc,EAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;YAC5C,cAAc,GAAG,IAAA,qBAAU,EAAC,GAAG,CAAC,CAAC;YACjC,MAAM;QACR,KAAK,QAAQ;YACX,GAAG,GAAG,MAAM,CAAC,QAAQ,CAAC;YACtB,cAAc,GAAG,IAAA,qBAAU,EAAC,GAAG,CAAC,CAAC;YACjC,MAAM;QACR,KAAK,SAAS;YACZ,cAAc,GAAG,MAAM,CAAC,QAAQ,CAAC;YACjC,MAAM;QACR;YACE,cAAc,GAAG,MAAM,IAAA,yBAAc,EAAC,MAAM,CAAC,CAAC;KACjD;IAED,MAAM,KAAK,GAAW,MAAM,gBAAgB,CAAC,cAAc,CAAC,CAAC;IAC7D,oCAAoC;IACpC,IAAI,KAAK,KAAK,IAAI,EAAE;QAClB,OAAO,cAAc,CAAC;KACvB;IACD,uBAAuB;IACvB,mEAAmE;IACnE,MAAM,OAAO,GAAG,GAAG,IAAI,CAAC,MAAM,cAAc,EAAE,CAAC,CAAC;IAChD,MAAM,MAAM,GAAG,IAAA,mBAAU,EAAC,OAAO,CAAC,CAAC;IACnC,OAAO,IAAA,qBAAU,EAAC,MAAM,CAAC,CAAC;AAC5B,CAAC,CAAC;AAoCF;;;;;GAKG;AACI,KAAK,UAAU,iBAAiB,CAAC,EACtC,YAAY;AACZ,iDAAiD;AACjD,aAAa,EACb,QAAQ,GAKT;IACC,IAAI,WAA0B,CAAC;IAC/B,IAAI,QAAQ,EAAE;QACZ,WAAW,GAAG,MAAM,QAAQ,CAAC;KAC9B;SAAM;QACL,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,sBAAsB,EAAE,CAAC;QAC1D,mFAAmF;QACnF,WAAW,GAAG,MAAM,IAAA,iCAAe,EAAC,IAAI,CAAC,CAAC;KAC3C;IAED,gFAAgF;IAChF,mDAAmD;IACnD,uFAAuF;IACvF,4FAA4F;IAC5F,wFAAwF;IACxF,IAAI,YAAY,IAAI,CAAC,IAAA,+BAAoB,EAAC,YAAY,CAAC,EAAE;QACvD,MAAM,YAAY,EAAE,qBAAqB,CAAC,WAAW,CAAC,CAAC;KACxD;IACD,OAAO,WAAW,CAAC;AACrB,CAAC;AA5BD,8CA4BC;AAED;;GAEG;AACH,SAAS,QAAQ,CAAC,KAAY;IAC5B,IAAI,KAAK,CAAC,YAAY,EAAE;QACtB,sCAAsC;QACtC,OAAO,KAAK,CAAC,YAAY,CAAC;KAC3B;IACD,MAAM,QAAQ,GAAG,KAAK,CAAC,QAAQ,IAAI,IAAA,SAAE,GAAE,CAAC;IACxC,IAAI,cAAiC,CAAC;IACtC,IAAI,KAAK,CAAC,eAAe,EAAE;QACzB,cAAc,GAAG,KAAK,CAAC,eAAe;aACnC,MAAM,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC;aAC1B,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAmB,EAAE;YAChC,OAAO,EAAE,SAAS,EAAE,GAAI,EAAE,CAAC;QAC7B,CAAC,CAAC,CAAC;KACN;SAAM;QACL,cAAc,GAAG,CAAC,KAAK,CAAC,UAAU,IAAI,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE,CAC1D,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,SAAS,CAC1D,CAAC;KACH;IACD,OAAO;QACL,IAAI,EAAE,QAAQ;QACd,IAAI,EAAE;YACJ,cAAc;YACd,MAAM,EAAE,KAAK,CAAC,MAAM,IAAI,EAAE;SAC3B;KACF,CAAC;AACJ,CAAC;AAED,MAAa,MAAM;IA2CjB;;;;;;;;;OASG;IACH,YAAY,MAAoB;QAjCvB,YAAO,GAA8C,EAAE,CAAC;QAkC/D,MAAM,YAAY,GAAG,EAAE,GAAG,mBAAmB,EAAE,GAAG,MAAM,EAAE,CAAC;QAC3D,IAAI,CAAC,aAAa,GAAG,YAAY,CAAC,aAAa,CAAC;QAChD,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC,CAAC,YAAY,CAAC,WAAW,IAAI,YAAY,CAAC,QAAQ,CAAC,CAAC;QAEzE,YAAY,CAAC,SAAS,IAAI,CAAC,IAAI,CAAC,SAAS,GAAG,YAAY,CAAC,SAAS,CAAC,CAAC;QAEpE,IAAI,YAAY,CAAC,WAAW,EAAE;YAC5B,IAAI,CAAC,WAAW,GAAG,YAAY,CAAC,WAAW,CAAC;SAC7C;aAAM;YACL,kDAAkD;YAClD,IAAI,CAAC,YAAY,CAAC,iBAAiB,EAAE;gBACnC,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,WAAW,GAAG,YAAY,CAAC,iBAAiB,CAAC,OAAO,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;SAC5E;QACD,IAAI,CAAC,WAAW,GAAG,IAAA,iBAAM,EAAC,IAAI,CAAC,WAAW,EAAE,GAAG,CAAC,CAAC;QACjD,IAAI,YAAY,CAAC,cAAc,EAAE;YAC/B,IAAI,CAAC,cAAc,GAAG,IAAA,iBAAM,EAAC,YAAY,CAAC,cAAc,EAAE,GAAG,CAAC,CAAC;SAChE;aAAM,IAAI,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;YAC5C,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;SACrD;QAED,MAAM,SAAS,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC;QACnD,IAAI,YAAY,CAAC,YAAY,EAAE;YAC7B,IAAI,CAAC,YAAY,GAAG,IAAI,2BAAe,CACrC,YAAY,CAAC,YAAY,EACzB,CAAC,CAAC,YAAY,CAAC,eAAe,CAC/B,CAAC;YACF,IAAI,CAAC,IAAA,4BAAiB,EAAC,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE;gBAChF,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC;aAC5E;SACF;aAAM;YACL,IAAI,CAAC,IAAA,4BAAiB,EAAC,IAAI,CAAC,WAAW,CAAC,EAAE;gBACxC,MAAM,IAAI,8BAAkB,CAC1B,yBAAyB,IAAI,CAAC,WAAW,gDAAgD,CAC1F,CAAC;aACH;YACD,IAAI,CAAC,YAAY,GAAG,IAAI,2BAAe,CAAC,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC,YAAY,CAAC,eAAe,CAAC,CAAC;SACtF;QAED,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,YAAY,CAAC;QACxC,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QAEjC,IAAI,IAAI,CAAC,YAAY,IAAI,IAAA,+BAAoB,EAAC,IAAI,CAAC,YAAY,CAAC,EAAE;YAChE,IAAI,CAAC,GAAG,GAAG,IAAI,gBAAG,CAAC;gBACjB,YAAY,EAAE,IAAI,CAAC,YAAY;gBAC/B,QAAQ,EACN,YAAY,CAAC,oBAAoB,IAAI,GAAG,YAAY,CAAC,WAAW,mBAAmB;aACtF,CAAC,CAAC;SACJ;QAED,IAAI,CAAC,QAAQ,GAAG,YAAY,CAAC,QAAQ,CAAC;QACtC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,IAAI,CAAC,YAAY,CAAC,QAAQ,EAAE;gBAC1B,MAAM,IAAI,8BAAkB,CAAC,kDAAkD,CAAC,CAAC;aAClF;YAED,0FAA0F;YAC1F,0EAA0E;YAC1E,0GAA0G;YAC1G,gFAAgF;YAChF,IAAI,YAAY,CAAC,YAAY,EAAE;gBAC7B,IAAI,CAAC,YAAY,GAAG,IAAI,wDAAwB,CAAC;oBAC/C,QAAQ,EAAE,YAAY,CAAC,QAAQ;oBAC/B,YAAY,EAAE,YAAY,CAAC,YAAY;oBACvC,UAAU,EAAE,YAAY,CAAC,UAAU;iBACpC,CAAC,CAAC;aACJ;iBAAM,IAAI,YAAY,CAAC,WAAW,EAAE;gBACnC,0GAA0G;gBAC1G,IAAI,CAAC,YAAY,GAAG,IAAI,sDAAuB,CAAC;oBAC9C,QAAQ,EAAE,YAAY,CAAC,QAAQ;oBAC/B,WAAW,EAAE,YAAY,CAAC,WAAW;oBACrC,UAAU,EAAE,YAAY,CAAC,UAAU;iBACpC,CAAC,CAAC;aACJ;SACF;QACD,IAAI,CAAC,QAAQ,GAAG,iBAAiB,CAAC;YAChC,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ,EAAE,YAAY,CAAC,QAAQ;SAChC,CAAC,CAAC;QACH,IAAI,YAAY,CAAC,YAAY,EAAE;YAC7B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;gBAC/C,GAAG,EAAE,IAAI,CAAC,WAAW;gBACrB,SAAS,EAAE,UAAU;gBACrB,GAAG,EAAE,IAAA,+BAAoB,EAAC,YAAY,CAAC,YAAY,CAAC;gBACpD,SAAS,EAAE,YAAY,CAAC,YAAY;aACrC,CAAC,CAAC;SACJ;IACH,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,KAAK,CAAC,OAAO,CAAC,EACZ,KAAK,GAAG,EAAE,UAAU,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,EAAE,EACtC,aAAa,EACb,MAAM,EACN,MAAM,GAAG,KAAK,EACd,QAAQ,EACR,QAAQ,EACR,OAAO,GAAG,KAAK,EACf,UAAU,GAAG,kCAAoB,EACjC,EAAE,EACF,aAAa,GAAG,wBAAoB,EACpC,gBAAgB,GAAG,KAAK,EAAE,MAA+B,EAAE,EAAE,CAAC,MAAM,EACpE,SAAS,EACT,gBAAgB,GAAG,EAAE,GACP;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QAErC,MAAM,YAAY,GAAG,QAAQ,CAAC,KAAK,CAAC,CAAC;QACrC,IAAA,6BAAoB,EAAC,YAAY,CAAC,CAAC;QAEnC,IAAI,CAAC,SAAS,IAAI,aAAa,EAAE;YAC/B,IAAI,GAAG,GAAY,KAAK,CAAC,eAAe,IAAI,EAAE,CAAC;YAC/C,MAAM,IAAI,GAAa,KAAK,CAAC,UAAU;gBACrC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE,CACjC,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,SAAS,CAChE;gBACH,CAAC,CAAC,EAAE,CAAC;YAEP,IAAI,CAAC,GAAG,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM,EAAE;gBAC9B,mDAAmD;gBACnD,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE;oBACxB,MAAM,IAAI,8BAAkB,CAAC,mDAAmD,CAAC,CAAC;iBACnF;gBACD,GAAG,GAAG,MAAM,IAAA,8BAAqB,EAC/B,IAAI,CAAC,cAAc,EACnB,IAAI,CAAC,YAA4B,EACjC,GAAG,IAAI,CACR,CAAC;aACH;iBAAM,IAAI,KAAK,CAAC,eAAe,EAAE;gBAChC,GAAG,GAAG,KAAK,CAAC,eAAe,CAAC;gBAC5B,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE;oBACrB,KAAK,CAAC,UAAU,GAAG,GAAG,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC;iBAC9C;aACF;YACD,IACE,GAAG,CAAC,MAAM,IAAI,KAAK,CAAC,UAAU,EAAE,MAAM;gBACtC,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,EAC7D;gBACA,MAAM,IAAI,8BAAkB,CAC1B,+BAA+B,IAAI,yBAAyB,IAAI,CAAC,SAAS,CACxE,GAAG,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAC1B,EAAE,CACJ,CAAC;aACH;YACD,MAAM,YAAY,GAAG,IAAA,iBAAI,EAAC,GAAG,CAAC,CAAC;YAC/B,SAAS,GAAG,YAAY,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;gBACnC,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,GAAG,CAAC;gBACzB,IAAI,GAAG,EAAE,SAAS,EAAE,MAAM,EAAE,IAAI,IAAI,CAAC,CAAC,GAAG,CAAC,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,EAAE;oBAC9D,MAAM,IAAI,GAAG,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAC3C,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,IAAI,kCAAkC,CACvD,CAAC;oBACF,IAAI,IAAI,EAAE,MAAM,EAAE;wBAChB,MAAM,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;wBACpB,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;4BACtC,GAAG,EAAE,IAAA,+BAAoB,EAAC,GAAG,CAAC,GAAG,CAAC;4BAClC,SAAS,EAAE,GAAG,CAAC,GAAG;4BAClB,GAAG,EAAE,GAAG,CAAC,GAAG;4BACZ,SAAS,EAAE,UAAU;4BACrB,GAAG,EAAE,GAAG,CAAC,GAAG;yBACb,CAAC,CAAC;qBACJ;iBACF;gBACD,OAAO,EAAE,GAAG,EAAE,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,CAAC;YAC/B,CAAC,CAAC,CAAC;SACJ;QAED,+EAA+E;QAE/E,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAC/D,MAAM,qBAAqB,GAAG,IAAI,mBAAQ,CAAC,IAAI,gCAAY,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC;QACjF,IAAI,YAAsC,CAAC;QAC3C,IAAI,MAAgC,CAAC;QACrC,IAAI,EAAE,EAAE;YACN,MAAM,GAAG,EAAE,CAAC;YACZ,MAAM,CAAC,GAAG,IAAI,uBAAY,EAAE,CAAC;YAC7B,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC,CAAC;YACzD,YAAY,GAAG,CAAC,CAAC;SAClB;QAED,MAAM,MAAM,GAAgB,SAAS,EAAE,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;QACxF,qBAAqB,CAAC,SAAS,GAAG,MAAM,OAAO,CAAC,GAAG,CACjD,MAAM,CAAC,GAAG,CAAC,KAAK,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE;YAChC,IAAI,CAAC,CAAC,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,EAAE;gBAC1B,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,IAAA,0BAAiB,EAAC,GAAG,CAAC,CAAC;aAC5C;YACD,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YAC7C,OAAO,IAAA,uBAAc,EAAC;gBACpB,YAAY;gBACZ,IAAI,EAAE,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;gBACpC,GAAG,EAAE,YAAY,CAAC,GAAG;gBACrB,GAAG,EAAE,YAAY,CAAC,GAAG;gBACrB,SAAS,EAAE,YAAY,CAAC,SAAS;gBACjC,QAAQ;gBACR,GAAG;aACJ,CAAC,CAAC;QACL,CAAC,CAAC,CACH,CAAC;QACF,MAAM,EAAE,gBAAgB,EAAE,cAAc,EAAE,GAAG,MAAO,aAAsC,EAAE,CAAC;QAC7F,MAAM,IAAI,GAAyB;YACjC,SAAS,EAAE,IAAI,CAAC,YAAY;YAC5B,YAAY;YACZ,SAAS;YACT,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ;YACR,qBAAqB;YACrB,MAAM;YACN,kBAAkB,EAAE,UAAU;YAC9B,kBAAkB,EAAE,OAAO;YAC3B,yBAAyB,EAAE,MAAM;YACjC,aAAa,EAAE,MAAM;YACrB,QAAQ;YACR,MAAM,EAAE,YAAY;YACpB,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,eAAe;YAClD,gBAAgB;YAChB,cAAc;YACd,gBAAgB;SACjB,CAAC;QAEF,MAAM,MAAM,GAAG,MAAO,gBAA4C,CAAC,MAAM,IAAA,oBAAW,EAAC,IAAI,CAAC,CAAC,CAAC;QAE5F,IAAI,CAAC,MAAM,EAAE;YACX,OAAO,MAAM,CAAC;SACf;QAED,qBAAqB;QACrB,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE;YACpB,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;SACnE;QACD,MAAM,OAAO,GAAG,IAAA,iBAAQ,EAAC,MAAM,MAAM,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,SAAS,IAAI,EAAE,CAAC,CAAC;QAEzF,OAAO,IAAI,oDAAuB,CAAC;YACjC,IAAI,CAAC,UAA2C;gBAC9C,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;gBAC5B,UAAU,CAAC,KAAK,EAAE,CAAC;YACrB,CAAC;SACF,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,OAAO,CAAC,EACZ,EAAE,EACF,MAAM,EACN,aAAa,GAAG,KAAK,EAAE,GAAW,EAAE,EAAE,CAAC,GAAG,EAC1C,gBAAgB,GAAG,KAAK,EAAE,MAA+B,EAAE,EAAE,CAAC,MAAM,EACpE,yBAAyB,EACzB,kBAAkB,GACJ;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,IAAI,YAAY,CAAC;QACjB,IAAI,IAAI,CAAC,GAAG,IAAI,EAAE,EAAE;YAClB,MAAM,gBAAgB,GAAG,MAAM,IAAA,4BAAiB,EAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;YACrE,IAAI,EAAE,IAAI,EAAE,CAAC,SAAS,IAAI,gBAAgB,EAAE;gBAC1C,YAAY,GAAG,EAAE,CAAC;aACnB;iBAAM,IAAI,IAAI,CAAC,GAAG,EAAE;gBACnB,YAAY,GAAG,MAAM,IAAI,CAAC,GAAG,CAAC,iBAAiB,CAAC;oBAC9C,SAAS,EAAE,gBAAgB;iBAC5B,CAAC,CAAC;aACJ;SACF;QACD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,8BAAkB,CAAC,sBAAsB,CAAC,CAAC;SACtD;QACD,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,MAAM,CAAC,CAAC;QAE5C,qDAAqD;QACrD,qDAAqD;QACrD,OAAO,MAAO,gBAA4C,CACxD,MAAM,IAAA,mBAAU,EAAC;YACf,SAAS,EAAE,IAAI,CAAC,YAAY;YAC5B,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,OAAO;YACP,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ;YACR,MAAM,EAAE,YAAY;YACpB,uBAAuB,EAAE,IAAI,CAAC,YAAY,CAAC,uBAAuB;YAClE,aAAa;YACb,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,eAAe;YAClD,yBAAyB;YACzB,kBAAkB;SACnB,CAAC,CACH,CAAC;IACJ,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,WAAW,CAAC,EAAE,MAAM,EAA6B;QACrD,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,MAAM,CAAC,CAAC;QAC5C,MAAM,SAAS,GAAG,IAAI,oBAAS,CAAC,OAAO,CAAC,CAAC;QACzC,MAAM,gBAAgB,GAAG,MAAM,SAAS,CAAC,mBAAmB,EAAE,CAAC;QAC/D,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;QAClF,MAAM,UAAU,GAAG,iBAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACxE,OAAO,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC;IACrC,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,EAAE,MAAM,EAA6B;QACvD,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,MAAM,CAAC,CAAC;QAC5C,OAAO,IAAA,sBAAa,EAAC,OAAO,CAAC,CAAC;IAChC,CAAC;CACF;AArYD,wBAqYC"}
@@ -0,0 +1,63 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.validateAttribute = exports.validateAttributeObject = exports.ATTR_ATTRIBUTE_PATTERN = exports.ATTR_VALUE = exports.ATTR_NAME = exports.ATTR_VALUE_PROP_NAME = exports.ATTR_NAME_PROP_NAME = void 0;
4
+ const errors_js_1 = require("../../../src/errors.js");
5
+ const sageGetMatch = (match) => (match ? match[0] : null);
6
+ exports.ATTR_NAME_PROP_NAME = 'attr';
7
+ exports.ATTR_VALUE_PROP_NAME = 'value';
8
+ // Validate attribute url protocol starts with `http://` or `https://`
9
+ const SCHEME = '(https?://)';
10
+ // validate url host be like `localhost:4000`
11
+ const HOST_PORT = '([a-z0-9][a-z0-9]{1,}:[0-9]{1,4})';
12
+ // validate url host be like `www.example.com`
13
+ const WWW_HOST = '([a-z0-9](?:[a-z0-9-]*[a-z0-9])?\\.)+[a-z]{2,}';
14
+ // validate url host be like `127.0.0.1:4000`
15
+ const IP_HOST_PORT = '([0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}:[0-9]{1,4})';
16
+ // validate host is one of those above
17
+ const HOST = `(${HOST_PORT}|${WWW_HOST}|${IP_HOST_PORT})`;
18
+ // validate attr name be like `/attr/<attr_name>`
19
+ exports.ATTR_NAME = `(/${exports.ATTR_NAME_PROP_NAME}/[a-zA-Z0-9][a-zA-Z0-9-]*[a-zA-Z0-9]?)`;
20
+ // validate value pattern
21
+ exports.ATTR_VALUE = `(/${exports.ATTR_VALUE_PROP_NAME}/[a-zA-Z0-9][a-zA-Z0-9-]*[a-zA-Z0-9]?)`;
22
+ // validate attribute authority e.g. https://example.com
23
+ const ATTR_AUTHORITY_PATTERN = `(${SCHEME}${HOST})`;
24
+ // validate attribute namespace e.g. https://example.com/attr/someattribute
25
+ const ATTR_NAMESPACE_PATTERN = `(${ATTR_AUTHORITY_PATTERN}${exports.ATTR_NAME})`;
26
+ // validate whole attribute e.g. https://example.com/attr/someattribute/value/somevalue
27
+ exports.ATTR_ATTRIBUTE_PATTERN = `^(${ATTR_NAMESPACE_PATTERN}${exports.ATTR_VALUE})$`;
28
+ const validateAttributeObject = (attr) => {
29
+ const isObject = typeof attr === 'object';
30
+ if (!isObject) {
31
+ throw new errors_js_1.AttributeValidationError(`attribute should be an object`, attr);
32
+ }
33
+ const { attribute } = attr;
34
+ const isString = typeof attribute === 'string';
35
+ if (!isString) {
36
+ throw new errors_js_1.AttributeValidationError(`attribute prop should be a string`, attr);
37
+ }
38
+ return validateAttribute(attribute);
39
+ };
40
+ exports.validateAttributeObject = validateAttributeObject;
41
+ function validateAttribute(attribute) {
42
+ if (!attribute.match(exports.ATTR_ATTRIBUTE_PATTERN)) {
43
+ throw new errors_js_1.AttributeValidationError(`attribute is in invalid format [${attribute}]`, attribute);
44
+ }
45
+ const ATTR_NAME_PREFIX = `/${exports.ATTR_NAME_PROP_NAME}/`;
46
+ const ATTR_VALUE_PREFIX = `/${exports.ATTR_VALUE_PROP_NAME}/`;
47
+ const attrNameMatch = sageGetMatch(attribute.match(exports.ATTR_NAME));
48
+ const attrValueMatch = sageGetMatch(attribute.match(exports.ATTR_VALUE));
49
+ if (!attrNameMatch) {
50
+ throw new errors_js_1.AttributeValidationError(`attribute name matching error`, attribute);
51
+ }
52
+ if (!attrValueMatch) {
53
+ throw new errors_js_1.AttributeValidationError(`attribute value matching error`, attribute);
54
+ }
55
+ const attributeName = attrNameMatch.slice(ATTR_NAME_PREFIX.length);
56
+ const attributeValue = attrValueMatch.slice(ATTR_VALUE_PREFIX.length);
57
+ if (attributeName === attributeValue) {
58
+ throw new errors_js_1.AttributeValidationError(`attribute name should be unique with its value`, attribute);
59
+ }
60
+ return true;
61
+ }
62
+ exports.validateAttribute = validateAttribute;
63
+ //# sourceMappingURL=data:application/json;base64,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