@opentdf/sdk 0.1.0-beta.1701
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +52 -0
- package/dist/cjs/package.json +3 -0
- package/dist/cjs/src/access.js +155 -0
- package/dist/cjs/src/auth/Eas.js +60 -0
- package/dist/cjs/src/auth/auth.js +79 -0
- package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +26 -0
- package/dist/cjs/src/auth/oidc-externaljwt-provider.js +33 -0
- package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +34 -0
- package/dist/cjs/src/auth/oidc.js +222 -0
- package/dist/cjs/src/auth/providers.js +143 -0
- package/dist/cjs/src/encodings/base64.js +154 -0
- package/dist/cjs/src/encodings/hex.js +70 -0
- package/dist/cjs/src/encodings/index.js +29 -0
- package/dist/cjs/src/errors.js +138 -0
- package/dist/cjs/src/index.js +344 -0
- package/dist/cjs/src/nanotdf/Client.js +296 -0
- package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
- package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
- package/dist/cjs/src/nanotdf/constants.js +5 -0
- package/dist/cjs/src/nanotdf/decrypt.js +17 -0
- package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
- package/dist/cjs/src/nanotdf/encrypt.js +132 -0
- package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
- package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
- package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
- package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
- package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
- package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
- package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +29 -0
- package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
- package/dist/cjs/src/nanotdf/index.js +25 -0
- package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
- package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
- package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
- package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
- package/dist/cjs/src/nanotdf/models/Header.js +255 -0
- package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
- package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
- package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
- package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
- package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
- package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
- package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
- package/dist/cjs/src/nanotdf-crypto/ciphers.js +17 -0
- package/dist/cjs/src/nanotdf-crypto/decrypt.js +24 -0
- package/dist/cjs/src/nanotdf-crypto/digest.js +7 -0
- package/dist/cjs/src/nanotdf-crypto/ecdsaSignature.js +83 -0
- package/dist/cjs/src/nanotdf-crypto/encrypt.js +24 -0
- package/dist/cjs/src/nanotdf-crypto/enums.js +52 -0
- package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
- package/dist/cjs/src/nanotdf-crypto/generateKeyPair.js +13 -0
- package/dist/cjs/src/nanotdf-crypto/generateRandomNumber.js +12 -0
- package/dist/cjs/src/nanotdf-crypto/importRawKey.js +18 -0
- package/dist/cjs/src/nanotdf-crypto/index.js +52 -0
- package/dist/cjs/src/nanotdf-crypto/keyAgreement.js +91 -0
- package/dist/cjs/src/nanotdf-crypto/pemPublicToCrypto.js +225 -0
- package/dist/cjs/src/policy/api.js +58 -0
- package/dist/cjs/src/policy/attributes.js +3 -0
- package/dist/cjs/src/policy/granter.js +146 -0
- package/dist/cjs/src/tdf/AttributeObject.js +15 -0
- package/dist/cjs/src/tdf/AttributeObjectJwt.js +3 -0
- package/dist/cjs/src/tdf/Crypto.js +47 -0
- package/dist/cjs/src/tdf/EntityObject.js +3 -0
- package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
- package/dist/cjs/src/tdf/Policy.js +50 -0
- package/dist/cjs/src/tdf/PolicyObject.js +3 -0
- package/dist/cjs/src/tdf/TypedArray.js +3 -0
- package/dist/cjs/src/tdf/index.js +35 -0
- package/dist/cjs/src/types/index.js +3 -0
- package/dist/cjs/src/utils.js +147 -0
- package/dist/cjs/src/version.js +12 -0
- package/dist/cjs/tdf3/index.js +57 -0
- package/dist/cjs/tdf3/src/assertions.js +118 -0
- package/dist/cjs/tdf3/src/binary.js +153 -0
- package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +56 -0
- package/dist/cjs/tdf3/src/ciphers/algorithms.js +8 -0
- package/dist/cjs/tdf3/src/ciphers/index.js +8 -0
- package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +22 -0
- package/dist/cjs/tdf3/src/client/DecoratedReadableStream.js +116 -0
- package/dist/cjs/tdf3/src/client/builders.js +561 -0
- package/dist/cjs/tdf3/src/client/index.js +460 -0
- package/dist/cjs/tdf3/src/client/validation.js +63 -0
- package/dist/cjs/tdf3/src/crypto/crypto-utils.js +116 -0
- package/dist/cjs/tdf3/src/crypto/declarations.js +8 -0
- package/dist/cjs/tdf3/src/crypto/index.js +315 -0
- package/dist/cjs/tdf3/src/index.js +34 -0
- package/dist/cjs/tdf3/src/models/attribute-set.js +122 -0
- package/dist/cjs/tdf3/src/models/encryption-information.js +90 -0
- package/dist/cjs/tdf3/src/models/index.js +25 -0
- package/dist/cjs/tdf3/src/models/key-access.js +103 -0
- package/dist/cjs/tdf3/src/models/manifest.js +3 -0
- package/dist/cjs/tdf3/src/models/payload.js +3 -0
- package/dist/cjs/tdf3/src/models/policy.js +24 -0
- package/dist/cjs/tdf3/src/models/upsert-response.js +3 -0
- package/dist/cjs/tdf3/src/tdf.js +907 -0
- package/dist/cjs/tdf3/src/templates/default.html.js +98 -0
- package/dist/cjs/tdf3/src/templates/escaper.js +15 -0
- package/dist/cjs/tdf3/src/templates/index.js +12 -0
- package/dist/cjs/tdf3/src/utils/buffer-crc32.js +48 -0
- package/dist/cjs/tdf3/src/utils/chunkers.js +106 -0
- package/dist/cjs/tdf3/src/utils/index.js +296 -0
- package/dist/cjs/tdf3/src/utils/keysplit.js +61 -0
- package/dist/cjs/tdf3/src/utils/zip-reader.js +253 -0
- package/dist/cjs/tdf3/src/utils/zip-writer.js +308 -0
- package/dist/cjs/tdf3/src/version.js +6 -0
- package/dist/types/src/access.d.ts +47 -0
- package/dist/types/src/access.d.ts.map +1 -0
- package/dist/types/src/auth/Eas.d.ts +34 -0
- package/dist/types/src/auth/Eas.d.ts.map +1 -0
- package/dist/types/src/auth/auth.d.ts +86 -0
- package/dist/types/src/auth/auth.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +9 -0
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +10 -0
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +10 -0
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc.d.ts +104 -0
- package/dist/types/src/auth/oidc.d.ts.map +1 -0
- package/dist/types/src/auth/providers.d.ts +67 -0
- package/dist/types/src/auth/providers.d.ts.map +1 -0
- package/dist/types/src/encodings/base64.d.ts +18 -0
- package/dist/types/src/encodings/base64.d.ts.map +1 -0
- package/dist/types/src/encodings/hex.d.ts +5 -0
- package/dist/types/src/encodings/hex.d.ts.map +1 -0
- package/dist/types/src/encodings/index.d.ts +3 -0
- package/dist/types/src/encodings/index.d.ts.map +1 -0
- package/dist/types/src/errors.d.ts +72 -0
- package/dist/types/src/errors.d.ts.map +1 -0
- package/dist/types/src/index.d.ts +138 -0
- package/dist/types/src/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/Client.d.ts +95 -0
- package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts +25 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
- package/dist/types/src/nanotdf/constants.d.ts +2 -0
- package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
- package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
- package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts +12 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt.d.ts +14 -0
- package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +9 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/index.d.ts +9 -0
- package/dist/types/src/nanotdf/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
- package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts +8 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts +14 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts +3 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts +35 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts +14 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts +42 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts +7 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts +10 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts +5 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/importRawKey.d.ts +13 -0
- package/dist/types/src/nanotdf-crypto/importRawKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts +12 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts +28 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts +28 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
- package/dist/types/src/policy/api.d.ts +4 -0
- package/dist/types/src/policy/api.d.ts.map +1 -0
- package/dist/types/src/policy/attributes.d.ts +95 -0
- package/dist/types/src/policy/attributes.d.ts.map +1 -0
- package/dist/types/src/policy/granter.d.ts +23 -0
- package/dist/types/src/policy/granter.d.ts.map +1 -0
- package/dist/types/src/tdf/AttributeObject.d.ts +13 -0
- package/dist/types/src/tdf/AttributeObject.d.ts.map +1 -0
- package/dist/types/src/tdf/AttributeObjectJwt.d.ts +4 -0
- package/dist/types/src/tdf/AttributeObjectJwt.d.ts.map +1 -0
- package/dist/types/src/tdf/Crypto.d.ts +37 -0
- package/dist/types/src/tdf/Crypto.d.ts.map +1 -0
- package/dist/types/src/tdf/EntityObject.d.ts +18 -0
- package/dist/types/src/tdf/EntityObject.d.ts.map +1 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/tdf/Policy.d.ts +28 -0
- package/dist/types/src/tdf/Policy.d.ts.map +1 -0
- package/dist/types/src/tdf/PolicyObject.d.ts +11 -0
- package/dist/types/src/tdf/PolicyObject.d.ts.map +1 -0
- package/dist/types/src/tdf/TypedArray.d.ts +3 -0
- package/dist/types/src/tdf/TypedArray.d.ts.map +1 -0
- package/dist/types/src/tdf/index.d.ts +7 -0
- package/dist/types/src/tdf/index.d.ts.map +1 -0
- package/dist/types/src/types/index.d.ts +45 -0
- package/dist/types/src/types/index.d.ts.map +1 -0
- package/dist/types/src/utils.d.ts +45 -0
- package/dist/types/src/utils.d.ts.map +1 -0
- package/dist/types/src/version.d.ts +9 -0
- package/dist/types/src/version.d.ts.map +1 -0
- package/dist/types/tdf3/index.d.ts +16 -0
- package/dist/types/tdf3/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/assertions.d.ts +63 -0
- package/dist/types/tdf3/src/assertions.d.ts.map +1 -0
- package/dist/types/tdf3/src/binary.d.ts +38 -0
- package/dist/types/tdf3/src/binary.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +18 -0
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/algorithms.d.ts +4 -0
- package/dist/types/tdf3/src/ciphers/algorithms.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/index.d.ts +3 -0
- package/dist/types/tdf3/src/ciphers/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +14 -0
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts +53 -0
- package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/builders.d.ts +436 -0
- package/dist/types/tdf3/src/client/builders.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/index.d.ts +139 -0
- package/dist/types/tdf3/src/client/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/validation.d.ts +8 -0
- package/dist/types/tdf3/src/client/validation.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +34 -0
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/declarations.d.ts +60 -0
- package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/index.d.ts +103 -0
- package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/index.d.ts +5 -0
- package/dist/types/tdf3/src/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/attribute-set.d.ts +65 -0
- package/dist/types/tdf3/src/models/attribute-set.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/encryption-information.d.ts +49 -0
- package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/index.d.ts +9 -0
- package/dist/types/tdf3/src/models/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/key-access.d.ts +42 -0
- package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/manifest.d.ts +9 -0
- package/dist/types/tdf3/src/models/manifest.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/payload.d.ts +7 -0
- package/dist/types/tdf3/src/models/payload.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/policy.d.ts +13 -0
- package/dist/types/tdf3/src/models/policy.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/upsert-response.d.ts +16 -0
- package/dist/types/tdf3/src/models/upsert-response.d.ts.map +1 -0
- package/dist/types/tdf3/src/tdf.d.ts +152 -0
- package/dist/types/tdf3/src/tdf.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/default.html.d.ts +8 -0
- package/dist/types/tdf3/src/templates/default.html.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/escaper.d.ts +6 -0
- package/dist/types/tdf3/src/templates/escaper.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/index.d.ts +3 -0
- package/dist/types/tdf3/src/templates/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/buffer-crc32.d.ts +2 -0
- package/dist/types/tdf3/src/utils/buffer-crc32.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/chunkers.d.ts +29 -0
- package/dist/types/tdf3/src/utils/chunkers.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/index.d.ts +36 -0
- package/dist/types/tdf3/src/utils/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/keysplit.d.ts +19 -0
- package/dist/types/tdf3/src/utils/keysplit.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/zip-reader.d.ts +63 -0
- package/dist/types/tdf3/src/utils/zip-reader.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/zip-writer.d.ts +35 -0
- package/dist/types/tdf3/src/utils/zip-writer.d.ts.map +1 -0
- package/dist/types/tdf3/src/version.d.ts +3 -0
- package/dist/types/tdf3/src/version.d.ts.map +1 -0
- package/dist/web/package.json +3 -0
- package/dist/web/src/access.js +147 -0
- package/dist/web/src/auth/Eas.js +55 -0
- package/dist/web/src/auth/auth.js +71 -0
- package/dist/web/src/auth/oidc-clientcredentials-provider.js +22 -0
- package/dist/web/src/auth/oidc-externaljwt-provider.js +29 -0
- package/dist/web/src/auth/oidc-refreshtoken-provider.js +30 -0
- package/dist/web/src/auth/oidc.js +215 -0
- package/dist/web/src/auth/providers.js +119 -0
- package/dist/web/src/encodings/base64.js +147 -0
- package/dist/web/src/encodings/hex.js +63 -0
- package/dist/web/src/encodings/index.js +3 -0
- package/dist/web/src/errors.js +123 -0
- package/dist/web/src/index.js +313 -0
- package/dist/web/src/nanotdf/Client.js +268 -0
- package/dist/web/src/nanotdf/NanoTDF.js +89 -0
- package/dist/web/src/nanotdf/browser-entry.js +14 -0
- package/dist/web/src/nanotdf/constants.js +2 -0
- package/dist/web/src/nanotdf/decrypt.js +14 -0
- package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
- package/dist/web/src/nanotdf/encrypt.js +126 -0
- package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
- package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
- package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
- package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
- package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
- package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
- package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
- package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
- package/dist/web/src/nanotdf/index.js +11 -0
- package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
- package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
- package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
- package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
- package/dist/web/src/nanotdf/models/Header.js +250 -0
- package/dist/web/src/nanotdf/models/Payload.js +156 -0
- package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
- package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
- package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
- package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
- package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
- package/dist/web/src/nanotdf/models/Signature.js +74 -0
- package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
- package/dist/web/src/nanotdf-crypto/decrypt.js +21 -0
- package/dist/web/src/nanotdf-crypto/digest.js +4 -0
- package/dist/web/src/nanotdf-crypto/ecdsaSignature.js +77 -0
- package/dist/web/src/nanotdf-crypto/encrypt.js +21 -0
- package/dist/web/src/nanotdf-crypto/enums.js +49 -0
- package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
- package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
- package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
- package/dist/web/src/nanotdf-crypto/importRawKey.js +15 -0
- package/dist/web/src/nanotdf-crypto/index.js +12 -0
- package/dist/web/src/nanotdf-crypto/keyAgreement.js +87 -0
- package/dist/web/src/nanotdf-crypto/pemPublicToCrypto.js +197 -0
- package/dist/web/src/policy/api.js +54 -0
- package/dist/web/src/policy/attributes.js +2 -0
- package/dist/web/src/policy/granter.js +141 -0
- package/dist/web/src/tdf/AttributeObject.js +11 -0
- package/dist/web/src/tdf/AttributeObjectJwt.js +2 -0
- package/dist/web/src/tdf/Crypto.js +44 -0
- package/dist/web/src/tdf/EntityObject.js +2 -0
- package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
- package/dist/web/src/tdf/Policy.js +48 -0
- package/dist/web/src/tdf/PolicyObject.js +2 -0
- package/dist/web/src/tdf/TypedArray.js +2 -0
- package/dist/web/src/tdf/index.js +4 -0
- package/dist/web/src/types/index.js +2 -0
- package/dist/web/src/utils.js +133 -0
- package/dist/web/src/version.js +9 -0
- package/dist/web/tdf3/index.js +13 -0
- package/dist/web/tdf3/src/assertions.js +111 -0
- package/dist/web/tdf3/src/binary.js +149 -0
- package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +52 -0
- package/dist/web/tdf3/src/ciphers/algorithms.js +5 -0
- package/dist/web/tdf3/src/ciphers/index.js +3 -0
- package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +18 -0
- package/dist/web/tdf3/src/client/DecoratedReadableStream.js +107 -0
- package/dist/web/tdf3/src/client/builders.js +557 -0
- package/dist/web/tdf3/src/client/index.js +423 -0
- package/dist/web/tdf3/src/client/validation.js +58 -0
- package/dist/web/tdf3/src/crypto/crypto-utils.js +107 -0
- package/dist/web/tdf3/src/crypto/declarations.js +5 -0
- package/dist/web/tdf3/src/crypto/index.js +296 -0
- package/dist/web/tdf3/src/index.js +5 -0
- package/dist/web/tdf3/src/models/attribute-set.js +118 -0
- package/dist/web/tdf3/src/models/encryption-information.js +86 -0
- package/dist/web/tdf3/src/models/index.js +9 -0
- package/dist/web/tdf3/src/models/key-access.js +74 -0
- package/dist/web/tdf3/src/models/manifest.js +2 -0
- package/dist/web/tdf3/src/models/payload.js +2 -0
- package/dist/web/tdf3/src/models/policy.js +20 -0
- package/dist/web/tdf3/src/models/upsert-response.js +2 -0
- package/dist/web/tdf3/src/tdf.js +866 -0
- package/dist/web/tdf3/src/templates/default.html.js +96 -0
- package/dist/web/tdf3/src/templates/escaper.js +10 -0
- package/dist/web/tdf3/src/templates/index.js +3 -0
- package/dist/web/tdf3/src/utils/buffer-crc32.js +44 -0
- package/dist/web/tdf3/src/utils/chunkers.js +96 -0
- package/dist/web/tdf3/src/utils/index.js +248 -0
- package/dist/web/tdf3/src/utils/keysplit.js +55 -0
- package/dist/web/tdf3/src/utils/zip-reader.js +247 -0
- package/dist/web/tdf3/src/utils/zip-writer.js +302 -0
- package/dist/web/tdf3/src/version.js +3 -0
- package/package.json +126 -0
- package/src/access.ts +198 -0
- package/src/auth/Eas.ts +79 -0
- package/src/auth/auth.ts +141 -0
- package/src/auth/oidc-clientcredentials-provider.ts +32 -0
- package/src/auth/oidc-externaljwt-provider.ts +41 -0
- package/src/auth/oidc-refreshtoken-provider.ts +41 -0
- package/src/auth/oidc.ts +307 -0
- package/src/auth/providers.ts +139 -0
- package/src/encodings/base64.ts +160 -0
- package/src/encodings/hex.ts +69 -0
- package/src/encodings/index.ts +2 -0
- package/src/errors.ts +113 -0
- package/src/index.ts +441 -0
- package/src/nanotdf/Client.ts +349 -0
- package/src/nanotdf/NanoTDF.ts +121 -0
- package/src/nanotdf/browser-entry.ts +20 -0
- package/src/nanotdf/constants.ts +1 -0
- package/src/nanotdf/decrypt.ts +19 -0
- package/src/nanotdf/encrypt-dataset.ts +52 -0
- package/src/nanotdf/encrypt.ts +197 -0
- package/src/nanotdf/enum/CipherEnum.ts +10 -0
- package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
- package/src/nanotdf/enum/EncodingEnum.ts +5 -0
- package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
- package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
- package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
- package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
- package/src/nanotdf/helpers/getHkdfSalt.ts +15 -0
- package/src/nanotdf/index.ts +10 -0
- package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
- package/src/nanotdf/models/Ciphers.ts +67 -0
- package/src/nanotdf/models/DefaultParams.ts +24 -0
- package/src/nanotdf/models/EcCurves.ts +40 -0
- package/src/nanotdf/models/Header.ts +322 -0
- package/src/nanotdf/models/Payload.ts +196 -0
- package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
- package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
- package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
- package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
- package/src/nanotdf/models/ResourceLocator.ts +212 -0
- package/src/nanotdf/models/Signature.ts +85 -0
- package/src/nanotdf-crypto/ciphers.ts +13 -0
- package/src/nanotdf-crypto/decrypt.ts +30 -0
- package/src/nanotdf-crypto/digest.ts +8 -0
- package/src/nanotdf-crypto/ecdsaSignature.ts +109 -0
- package/src/nanotdf-crypto/encrypt.ts +30 -0
- package/src/nanotdf-crypto/enums.ts +47 -0
- package/src/nanotdf-crypto/exportCryptoKey.ts +17 -0
- package/src/nanotdf-crypto/generateKeyPair.ts +19 -0
- package/src/nanotdf-crypto/generateRandomNumber.ts +8 -0
- package/src/nanotdf-crypto/importRawKey.ts +19 -0
- package/src/nanotdf-crypto/index.ts +11 -0
- package/src/nanotdf-crypto/keyAgreement.ts +139 -0
- package/src/nanotdf-crypto/pemPublicToCrypto.ts +232 -0
- package/src/package-lock.json +6 -0
- package/src/package.json +3 -0
- package/src/platform/authorization/authorization_connect.d.ts +44 -0
- package/src/platform/authorization/authorization_connect.js +44 -0
- package/src/platform/authorization/authorization_pb.d.ts +707 -0
- package/src/platform/authorization/authorization_pb.js +372 -0
- package/src/platform/common/common_pb.d.ts +129 -0
- package/src/platform/common/common_pb.js +58 -0
- package/src/platform/entityresolution/entity_resolution_connect.d.ts +35 -0
- package/src/platform/entityresolution/entity_resolution_connect.js +35 -0
- package/src/platform/entityresolution/entity_resolution_pb.d.ts +242 -0
- package/src/platform/entityresolution/entity_resolution_pb.js +139 -0
- package/src/platform/kas/kas_connect.d.ts +59 -0
- package/src/platform/kas/kas_connect.js +59 -0
- package/src/platform/kas/kas_pb.d.ts +200 -0
- package/src/platform/kas/kas_pb.js +84 -0
- package/src/platform/policy/attributes/attributes_connect.d.ts +168 -0
- package/src/platform/policy/attributes/attributes_connect.js +168 -0
- package/src/platform/policy/attributes/attributes_pb.d.ts +929 -0
- package/src/platform/policy/attributes/attributes_pb.js +363 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_connect.d.ts +62 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_connect.js +62 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_pb.d.ts +283 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_pb.js +113 -0
- package/src/platform/policy/namespaces/namespaces_connect.d.ts +62 -0
- package/src/platform/policy/namespaces/namespaces_connect.js +62 -0
- package/src/platform/policy/namespaces/namespaces_pb.d.ts +270 -0
- package/src/platform/policy/namespaces/namespaces_pb.js +110 -0
- package/src/platform/policy/objects_pb.d.ts +725 -0
- package/src/platform/policy/objects_pb.js +288 -0
- package/src/platform/policy/resourcemapping/resource_mapping_connect.d.ts +259 -0
- package/src/platform/policy/resourcemapping/resource_mapping_connect.js +259 -0
- package/src/platform/policy/resourcemapping/resource_mapping_pb.d.ts +314 -0
- package/src/platform/policy/resourcemapping/resource_mapping_pb.js +142 -0
- package/src/platform/policy/selectors_pb.d.ts +269 -0
- package/src/platform/policy/selectors_pb.js +110 -0
- package/src/platform/policy/subjectmapping/subject_mapping_connect.d.ts +118 -0
- package/src/platform/policy/subjectmapping/subject_mapping_connect.js +118 -0
- package/src/platform/policy/subjectmapping/subject_mapping_pb.d.ts +672 -0
- package/src/platform/policy/subjectmapping/subject_mapping_pb.js +260 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_connect.d.ts +26 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_connect.js +26 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_pb.d.ts +75 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_pb.js +35 -0
- package/src/policy/api.ts +61 -0
- package/src/policy/attributes.ts +117 -0
- package/src/policy/granter.ts +181 -0
- package/src/tdf/AttributeObject.ts +27 -0
- package/src/tdf/AttributeObjectJwt.ts +3 -0
- package/src/tdf/Crypto.ts +42 -0
- package/src/tdf/EntityObject.ts +18 -0
- package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
- package/src/tdf/Policy.ts +51 -0
- package/src/tdf/PolicyObject.ts +12 -0
- package/src/tdf/TypedArray.ts +12 -0
- package/src/tdf/index.ts +6 -0
- package/src/types/index.ts +55 -0
- package/src/utils.ts +149 -0
- package/src/version.ts +9 -0
- package/tdf3/index.ts +91 -0
- package/tdf3/package-lock.json +6 -0
- package/tdf3/package.json +3 -0
- package/tdf3/src/assertions.ts +191 -0
- package/tdf3/src/binary.ts +195 -0
- package/tdf3/src/ciphers/aes-gcm-cipher.ts +76 -0
- package/tdf3/src/ciphers/algorithms.ts +9 -0
- package/tdf3/src/ciphers/index.ts +2 -0
- package/tdf3/src/ciphers/symmetric-cipher-base.ts +38 -0
- package/tdf3/src/client/DecoratedReadableStream.ts +148 -0
- package/tdf3/src/client/builders.ts +701 -0
- package/tdf3/src/client/index.ts +637 -0
- package/tdf3/src/client/validation.ts +79 -0
- package/tdf3/src/crypto/crypto-utils.ts +119 -0
- package/tdf3/src/crypto/declarations.ts +89 -0
- package/tdf3/src/crypto/index.ts +394 -0
- package/tdf3/src/index.ts +4 -0
- package/tdf3/src/models/attribute-set.ts +142 -0
- package/tdf3/src/models/encryption-information.ts +172 -0
- package/tdf3/src/models/index.ts +8 -0
- package/tdf3/src/models/key-access.ts +128 -0
- package/tdf3/src/models/manifest.ts +9 -0
- package/tdf3/src/models/payload.ts +6 -0
- package/tdf3/src/models/policy.ts +35 -0
- package/tdf3/src/models/upsert-response.ts +17 -0
- package/tdf3/src/tdf.ts +1351 -0
- package/tdf3/src/templates/default.html.ts +105 -0
- package/tdf3/src/templates/escaper.ts +10 -0
- package/tdf3/src/templates/index.ts +2 -0
- package/tdf3/src/utils/buffer-crc32.ts +46 -0
- package/tdf3/src/utils/chunkers.ts +118 -0
- package/tdf3/src/utils/index.ts +309 -0
- package/tdf3/src/utils/keysplit.ts +63 -0
- package/tdf3/src/utils/zip-reader.ts +341 -0
- package/tdf3/src/utils/zip-writer.ts +375 -0
- package/tdf3/src/version.ts +2 -0
- package/tdf3/types.d.ts +14 -0
|
@@ -0,0 +1,460 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
26
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
|
+
};
|
|
28
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
+
exports.withHeaders = exports.fromDataSource = exports.HttpRequest = exports.EncryptParamsBuilder = exports.DecryptParamsBuilder = exports.AppIdAuthProvider = exports.Client = exports.createSessionKeys = exports.uploadBinaryToS3 = void 0;
|
|
30
|
+
const uuid_1 = require("uuid");
|
|
31
|
+
const axios_1 = __importDefault(require("axios"));
|
|
32
|
+
const index_js_1 = require("../utils/index.js");
|
|
33
|
+
Object.defineProperty(exports, "fromDataSource", { enumerable: true, get: function () { return index_js_1.fromDataSource; } });
|
|
34
|
+
const index_js_2 = require("../../../src/encodings/index.js");
|
|
35
|
+
const tdf_js_1 = require("../tdf.js");
|
|
36
|
+
const oidc_refreshtoken_provider_js_1 = require("../../../src/auth/oidc-refreshtoken-provider.js");
|
|
37
|
+
const oidc_externaljwt_provider_js_1 = require("../../../src/auth/oidc-externaljwt-provider.js");
|
|
38
|
+
const auth_js_1 = require("../../../src/auth/auth.js");
|
|
39
|
+
Object.defineProperty(exports, "AppIdAuthProvider", { enumerable: true, get: function () { return auth_js_1.AppIdAuthProvider; } });
|
|
40
|
+
Object.defineProperty(exports, "HttpRequest", { enumerable: true, get: function () { return auth_js_1.HttpRequest; } });
|
|
41
|
+
Object.defineProperty(exports, "withHeaders", { enumerable: true, get: function () { return auth_js_1.withHeaders; } });
|
|
42
|
+
const Eas_js_1 = __importDefault(require("../../../src/auth/Eas.js"));
|
|
43
|
+
const utils_js_1 = require("../../../src/utils.js");
|
|
44
|
+
const DecoratedReadableStream_js_1 = require("./DecoratedReadableStream.js");
|
|
45
|
+
const builders_js_1 = require("./builders.js");
|
|
46
|
+
Object.defineProperty(exports, "DecryptParamsBuilder", { enumerable: true, get: function () { return builders_js_1.DecryptParamsBuilder; } });
|
|
47
|
+
Object.defineProperty(exports, "EncryptParamsBuilder", { enumerable: true, get: function () { return builders_js_1.EncryptParamsBuilder; } });
|
|
48
|
+
const access_js_1 = require("../../../src/access.js");
|
|
49
|
+
const errors_js_1 = require("../../../src/errors.js");
|
|
50
|
+
const aes_gcm_cipher_js_1 = require("../ciphers/aes-gcm-cipher.js");
|
|
51
|
+
const crypto_utils_js_1 = require("../crypto/crypto-utils.js");
|
|
52
|
+
const defaultCryptoService = __importStar(require("../crypto/index.js"));
|
|
53
|
+
const index_js_3 = require("../models/index.js");
|
|
54
|
+
const granter_js_1 = require("../../../src/policy/granter.js");
|
|
55
|
+
const api_js_1 = require("../../../src/policy/api.js");
|
|
56
|
+
const GLOBAL_BYTE_LIMIT = 64 * 1000 * 1000 * 1000; // 64 GB, see WS-9363.
|
|
57
|
+
const HTML_BYTE_LIMIT = 100 * 1000 * 1000; // 100 MB, see WS-9476.
|
|
58
|
+
// No default config for now. Delegate to Virtru wrapper for endpoints.
|
|
59
|
+
const defaultClientConfig = { oidcOrigin: '', cryptoService: defaultCryptoService };
|
|
60
|
+
const uploadBinaryToS3 = async function (stream, uploadUrl, fileSize) {
|
|
61
|
+
try {
|
|
62
|
+
const body = await (0, index_js_1.streamToBuffer)(stream);
|
|
63
|
+
await axios_1.default.put(uploadUrl, body, {
|
|
64
|
+
headers: {
|
|
65
|
+
'Content-Length': fileSize,
|
|
66
|
+
'content-type': 'application/zip',
|
|
67
|
+
'cache-control': 'no-store',
|
|
68
|
+
},
|
|
69
|
+
maxContentLength: Infinity,
|
|
70
|
+
maxBodyLength: Infinity,
|
|
71
|
+
});
|
|
72
|
+
}
|
|
73
|
+
catch (e) {
|
|
74
|
+
console.error(e);
|
|
75
|
+
throw e;
|
|
76
|
+
}
|
|
77
|
+
};
|
|
78
|
+
exports.uploadBinaryToS3 = uploadBinaryToS3;
|
|
79
|
+
const getFirstTwoBytes = async (chunker) => new TextDecoder().decode(await chunker(0, 2));
|
|
80
|
+
const makeChunkable = async (source) => {
|
|
81
|
+
if (!source) {
|
|
82
|
+
throw new errors_js_1.ConfigurationError('invalid source');
|
|
83
|
+
}
|
|
84
|
+
// dump stream to buffer
|
|
85
|
+
// we don't support streams anyways (see zipreader.js)
|
|
86
|
+
let initialChunker;
|
|
87
|
+
let buf = null;
|
|
88
|
+
switch (source.type) {
|
|
89
|
+
case 'stream':
|
|
90
|
+
buf = await (0, index_js_1.streamToBuffer)(source.location);
|
|
91
|
+
initialChunker = (0, index_js_1.fromBuffer)(buf);
|
|
92
|
+
break;
|
|
93
|
+
case 'buffer':
|
|
94
|
+
buf = source.location;
|
|
95
|
+
initialChunker = (0, index_js_1.fromBuffer)(buf);
|
|
96
|
+
break;
|
|
97
|
+
case 'chunker':
|
|
98
|
+
initialChunker = source.location;
|
|
99
|
+
break;
|
|
100
|
+
default:
|
|
101
|
+
initialChunker = await (0, index_js_1.fromDataSource)(source);
|
|
102
|
+
}
|
|
103
|
+
const magic = await getFirstTwoBytes(initialChunker);
|
|
104
|
+
// Pull first two bytes from source.
|
|
105
|
+
if (magic === 'PK') {
|
|
106
|
+
return initialChunker;
|
|
107
|
+
}
|
|
108
|
+
// Unwrap if it's html.
|
|
109
|
+
// If NOT zip (html), convert/dump to buffer, unwrap, and continue.
|
|
110
|
+
const htmlBuf = buf ?? (await initialChunker());
|
|
111
|
+
const zipBuf = (0, tdf_js_1.unwrapHtml)(htmlBuf);
|
|
112
|
+
return (0, index_js_1.fromBuffer)(zipBuf);
|
|
113
|
+
};
|
|
114
|
+
/*
|
|
115
|
+
* Extract a keypair provided as part of the options dict.
|
|
116
|
+
* Default to using the clientwide keypair, generating one if necessary.
|
|
117
|
+
*
|
|
118
|
+
* Additionally, update the auth injector with the (potentially new) pubkey
|
|
119
|
+
*/
|
|
120
|
+
async function createSessionKeys({ authProvider,
|
|
121
|
+
// FIXME use cryptoservice to generate keys again
|
|
122
|
+
cryptoService, dpopKeys, }) {
|
|
123
|
+
let signingKeys;
|
|
124
|
+
if (dpopKeys) {
|
|
125
|
+
signingKeys = await dpopKeys;
|
|
126
|
+
}
|
|
127
|
+
else {
|
|
128
|
+
const keys = await cryptoService.generateSigningKeyPair();
|
|
129
|
+
// signingKeys = await crypto.subtle.generateKey(rsaPkcs1Sha256(), true, ['sign']);
|
|
130
|
+
signingKeys = await (0, crypto_utils_js_1.toCryptoKeyPair)(keys);
|
|
131
|
+
}
|
|
132
|
+
// This will contact the auth server and forcibly refresh the auth token claims,
|
|
133
|
+
// binding the token and the (new) pubkey together.
|
|
134
|
+
// Note that we base64 encode the PEM string here as a quick workaround, simply because
|
|
135
|
+
// a formatted raw PEM string isn't a valid header value and sending it raw makes keycloak's
|
|
136
|
+
// header parser barf. There are more subtle ways to solve this, but this works for now.
|
|
137
|
+
if (authProvider && !(0, index_js_1.isAppIdProviderCheck)(authProvider)) {
|
|
138
|
+
await authProvider?.updateClientPublicKey(signingKeys);
|
|
139
|
+
}
|
|
140
|
+
return signingKeys;
|
|
141
|
+
}
|
|
142
|
+
exports.createSessionKeys = createSessionKeys;
|
|
143
|
+
/*
|
|
144
|
+
* Create a policy object for an encrypt operation.
|
|
145
|
+
*/
|
|
146
|
+
function asPolicy(scope) {
|
|
147
|
+
if (scope.policyObject) {
|
|
148
|
+
// use the client override if provided
|
|
149
|
+
return scope.policyObject;
|
|
150
|
+
}
|
|
151
|
+
const policyId = scope.policyId ?? (0, uuid_1.v4)();
|
|
152
|
+
let dataAttributes;
|
|
153
|
+
if (scope.attributeValues) {
|
|
154
|
+
dataAttributes = scope.attributeValues
|
|
155
|
+
.filter(({ fqn }) => !!fqn)
|
|
156
|
+
.map(({ fqn }) => {
|
|
157
|
+
return { attribute: fqn };
|
|
158
|
+
});
|
|
159
|
+
}
|
|
160
|
+
else {
|
|
161
|
+
dataAttributes = (scope.attributes ?? []).map((attribute) => typeof attribute === 'string' ? { attribute } : attribute);
|
|
162
|
+
}
|
|
163
|
+
return {
|
|
164
|
+
uuid: policyId,
|
|
165
|
+
body: {
|
|
166
|
+
dataAttributes,
|
|
167
|
+
dissem: scope.dissem ?? [],
|
|
168
|
+
},
|
|
169
|
+
};
|
|
170
|
+
}
|
|
171
|
+
class Client {
|
|
172
|
+
/**
|
|
173
|
+
* An abstraction for protecting and accessing data using TDF3 services.
|
|
174
|
+
* @param {Object} [config.keypair] - keypair generated for signing. Optional, will be generated by sdk if not passed
|
|
175
|
+
* @param {String} [config.clientId]
|
|
176
|
+
* @param {String} [config.kasEndpoint] - Key Access Server url
|
|
177
|
+
* @param {String} [config.refreshToken] - After logging in to browser OIDC interface user
|
|
178
|
+
* receives fresh token that needed by SDK for auth needs
|
|
179
|
+
* @param {String} [config.externalJwt] - JWT from external authority (eg Google)
|
|
180
|
+
* @param {String} [config.oidcOrigin] - Endpoint of authentication service
|
|
181
|
+
*/
|
|
182
|
+
constructor(config) {
|
|
183
|
+
this.kasKeys = {};
|
|
184
|
+
const clientConfig = { ...defaultClientConfig, ...config };
|
|
185
|
+
this.cryptoService = clientConfig.cryptoService;
|
|
186
|
+
this.dpopEnabled = !!(clientConfig.dpopEnabled || clientConfig.dpopKeys);
|
|
187
|
+
clientConfig.readerUrl && (this.readerUrl = clientConfig.readerUrl);
|
|
188
|
+
if (clientConfig.kasEndpoint) {
|
|
189
|
+
this.kasEndpoint = clientConfig.kasEndpoint;
|
|
190
|
+
}
|
|
191
|
+
else {
|
|
192
|
+
// handle Deprecated `kasRewrapEndpoint` parameter
|
|
193
|
+
if (!clientConfig.keyRewrapEndpoint) {
|
|
194
|
+
throw new errors_js_1.ConfigurationError('KAS definition not found');
|
|
195
|
+
}
|
|
196
|
+
this.kasEndpoint = clientConfig.keyRewrapEndpoint.replace(/\/rewrap$/, '');
|
|
197
|
+
}
|
|
198
|
+
this.kasEndpoint = (0, utils_js_1.rstrip)(this.kasEndpoint, '/');
|
|
199
|
+
if (clientConfig.policyEndpoint) {
|
|
200
|
+
this.policyEndpoint = (0, utils_js_1.rstrip)(clientConfig.policyEndpoint, '/');
|
|
201
|
+
}
|
|
202
|
+
else if (this.kasEndpoint.endsWith('/kas')) {
|
|
203
|
+
this.policyEndpoint = this.kasEndpoint.slice(0, -4);
|
|
204
|
+
}
|
|
205
|
+
const kasOrigin = new URL(this.kasEndpoint).origin;
|
|
206
|
+
if (clientConfig.allowedKases) {
|
|
207
|
+
this.allowedKases = new access_js_1.OriginAllowList(clientConfig.allowedKases, !!clientConfig.ignoreAllowList);
|
|
208
|
+
if (!(0, utils_js_1.validateSecureUrl)(this.kasEndpoint) && !this.allowedKases.allows(kasOrigin)) {
|
|
209
|
+
throw new errors_js_1.ConfigurationError(`Invalid KAS endpoint [${this.kasEndpoint}]`);
|
|
210
|
+
}
|
|
211
|
+
}
|
|
212
|
+
else {
|
|
213
|
+
if (!(0, utils_js_1.validateSecureUrl)(this.kasEndpoint)) {
|
|
214
|
+
throw new errors_js_1.ConfigurationError(`Invalid KAS endpoint [${this.kasEndpoint}]; to force, please list it among allowedKases`);
|
|
215
|
+
}
|
|
216
|
+
this.allowedKases = new access_js_1.OriginAllowList([kasOrigin], !!clientConfig.ignoreAllowList);
|
|
217
|
+
}
|
|
218
|
+
this.authProvider = config.authProvider;
|
|
219
|
+
this.clientConfig = clientConfig;
|
|
220
|
+
if (this.authProvider && (0, index_js_1.isAppIdProviderCheck)(this.authProvider)) {
|
|
221
|
+
this.eas = new Eas_js_1.default({
|
|
222
|
+
authProvider: this.authProvider,
|
|
223
|
+
endpoint: clientConfig.entityObjectEndpoint ?? `${clientConfig.easEndpoint}/api/entityobject`,
|
|
224
|
+
});
|
|
225
|
+
}
|
|
226
|
+
this.clientId = clientConfig.clientId;
|
|
227
|
+
if (!this.authProvider) {
|
|
228
|
+
if (!clientConfig.clientId) {
|
|
229
|
+
throw new errors_js_1.ConfigurationError('Client ID or custom AuthProvider must be defined');
|
|
230
|
+
}
|
|
231
|
+
//Are we exchanging a refreshToken for a bearer token (normal AuthCode browser auth flow)?
|
|
232
|
+
//If this is a browser context, we expect the caller to handle the initial
|
|
233
|
+
//browser-based OIDC login and authentication process against the OIDC endpoint using their chosen method,
|
|
234
|
+
//and provide us with a valid refresh token/clientId obtained from that process.
|
|
235
|
+
if (clientConfig.refreshToken) {
|
|
236
|
+
this.authProvider = new oidc_refreshtoken_provider_js_1.OIDCRefreshTokenProvider({
|
|
237
|
+
clientId: clientConfig.clientId,
|
|
238
|
+
refreshToken: clientConfig.refreshToken,
|
|
239
|
+
oidcOrigin: clientConfig.oidcOrigin,
|
|
240
|
+
});
|
|
241
|
+
}
|
|
242
|
+
else if (clientConfig.externalJwt) {
|
|
243
|
+
//Are we exchanging a JWT previously issued by a trusted external entity (e.g. Google) for a bearer token?
|
|
244
|
+
this.authProvider = new oidc_externaljwt_provider_js_1.OIDCExternalJwtProvider({
|
|
245
|
+
clientId: clientConfig.clientId,
|
|
246
|
+
externalJwt: clientConfig.externalJwt,
|
|
247
|
+
oidcOrigin: clientConfig.oidcOrigin,
|
|
248
|
+
});
|
|
249
|
+
}
|
|
250
|
+
}
|
|
251
|
+
this.dpopKeys = createSessionKeys({
|
|
252
|
+
authProvider: this.authProvider,
|
|
253
|
+
cryptoService: this.cryptoService,
|
|
254
|
+
dpopKeys: clientConfig.dpopKeys,
|
|
255
|
+
});
|
|
256
|
+
if (clientConfig.kasPublicKey) {
|
|
257
|
+
this.kasKeys[this.kasEndpoint] = Promise.resolve({
|
|
258
|
+
url: this.kasEndpoint,
|
|
259
|
+
algorithm: 'rsa:2048',
|
|
260
|
+
key: (0, utils_js_1.pemToCryptoPublicKey)(clientConfig.kasPublicKey),
|
|
261
|
+
publicKey: clientConfig.kasPublicKey,
|
|
262
|
+
});
|
|
263
|
+
}
|
|
264
|
+
}
|
|
265
|
+
/**
|
|
266
|
+
* Encrypt plaintext into TDF ciphertext. One of the core operations of the Virtru SDK.
|
|
267
|
+
*
|
|
268
|
+
* @param scope dissem and attributes for constructing the policy
|
|
269
|
+
* @param source source object of unencrypted data
|
|
270
|
+
* @param [asHtml] If we should wrap the TDF data in a self-opening HTML wrapper. Defaults to false
|
|
271
|
+
* @param [autoconfigure] If we should use scope.attributes to configure KAOs
|
|
272
|
+
* @param [metadata] Additional non-secret data to store with the TDF
|
|
273
|
+
* @param [opts] Test only
|
|
274
|
+
* @param [mimeType] mime type of source. defaults to `unknown`
|
|
275
|
+
* @param [offline] Where to store the policy. Defaults to `false` - which results in `upsert` events to store/update a policy
|
|
276
|
+
* @param [windowSize] - segment size in bytes. Defaults to a a million bytes.
|
|
277
|
+
* @param [keyMiddleware] - function that handle keys
|
|
278
|
+
* @param [streamMiddleware] - function that handle stream
|
|
279
|
+
* @param [eo] - (deprecated) entity object
|
|
280
|
+
* @return a {@link https://nodejs.org/api/stream.html#stream_class_stream_readable|Readable} a new stream containing the TDF ciphertext
|
|
281
|
+
*/
|
|
282
|
+
async encrypt({ scope = { attributes: [], dissem: [] }, autoconfigure, source, asHtml = false, metadata, mimeType, offline = false, windowSize = builders_js_1.DEFAULT_SEGMENT_SIZE, eo, keyMiddleware = index_js_1.keyMiddleware, streamMiddleware = async (stream) => stream, splitPlan, assertionConfigs = [], }) {
|
|
283
|
+
const dpopKeys = await this.dpopKeys;
|
|
284
|
+
const policyObject = asPolicy(scope);
|
|
285
|
+
(0, tdf_js_1.validatePolicyObject)(policyObject);
|
|
286
|
+
if (!splitPlan && autoconfigure) {
|
|
287
|
+
let avs = scope.attributeValues ?? [];
|
|
288
|
+
const fqns = scope.attributes
|
|
289
|
+
? scope.attributes.map((attribute) => typeof attribute === 'string' ? attribute : attribute.attribute)
|
|
290
|
+
: [];
|
|
291
|
+
if (!avs.length && fqns.length) {
|
|
292
|
+
// Hydrate avs from policy endpoint givnen the fqns
|
|
293
|
+
if (!this.policyEndpoint) {
|
|
294
|
+
throw new errors_js_1.ConfigurationError('policyEndpoint not set in TDF3 Client constructor');
|
|
295
|
+
}
|
|
296
|
+
avs = await (0, api_js_1.attributeFQNsAsValues)(this.policyEndpoint, this.authProvider, ...fqns);
|
|
297
|
+
}
|
|
298
|
+
else if (scope.attributeValues) {
|
|
299
|
+
avs = scope.attributeValues;
|
|
300
|
+
if (!scope.attributes) {
|
|
301
|
+
scope.attributes = avs.map(({ fqn }) => fqn);
|
|
302
|
+
}
|
|
303
|
+
}
|
|
304
|
+
if (avs.length != scope.attributes?.length ||
|
|
305
|
+
!avs.map(({ fqn }) => fqn).every((a) => fqns.indexOf(a) >= 0)) {
|
|
306
|
+
throw new errors_js_1.ConfigurationError(`Attribute mismatch between [${fqns}] and explicit values ${JSON.stringify(avs.map(({ fqn }) => fqn))}`);
|
|
307
|
+
}
|
|
308
|
+
const detailedPlan = (0, granter_js_1.plan)(avs);
|
|
309
|
+
splitPlan = detailedPlan.map((kat) => {
|
|
310
|
+
const { kas, sid } = kat;
|
|
311
|
+
if (kas?.publicKey?.cached?.keys && !(kas.uri in this.kasKeys)) {
|
|
312
|
+
const keys = kas.publicKey.cached.keys.filter(({ alg }) => alg == 'KAS_PUBLIC_KEY_ALG_ENUM_RSA_2048');
|
|
313
|
+
if (keys?.length) {
|
|
314
|
+
const key = keys[0];
|
|
315
|
+
this.kasKeys[kas.uri] = Promise.resolve({
|
|
316
|
+
key: (0, utils_js_1.pemToCryptoPublicKey)(key.pem),
|
|
317
|
+
publicKey: key.pem,
|
|
318
|
+
url: kas.uri,
|
|
319
|
+
algorithm: 'rsa:2048',
|
|
320
|
+
kid: key.kid,
|
|
321
|
+
});
|
|
322
|
+
}
|
|
323
|
+
}
|
|
324
|
+
return { kas: kas.uri, sid };
|
|
325
|
+
});
|
|
326
|
+
}
|
|
327
|
+
// TODO: Refactor underlying builder to remove some of this unnecessary config.
|
|
328
|
+
const byteLimit = asHtml ? HTML_BYTE_LIMIT : GLOBAL_BYTE_LIMIT;
|
|
329
|
+
const encryptionInformation = new index_js_3.SplitKey(new aes_gcm_cipher_js_1.AesGcmCipher(this.cryptoService));
|
|
330
|
+
let attributeSet;
|
|
331
|
+
let entity;
|
|
332
|
+
if (eo) {
|
|
333
|
+
entity = eo;
|
|
334
|
+
const s = new index_js_3.AttributeSet();
|
|
335
|
+
eo.attributes.forEach((attr) => s.addJwtAttribute(attr));
|
|
336
|
+
attributeSet = s;
|
|
337
|
+
}
|
|
338
|
+
const splits = splitPlan?.length ? splitPlan : [{ kas: this.kasEndpoint }];
|
|
339
|
+
encryptionInformation.keyAccess = await Promise.all(splits.map(async ({ kas, sid }) => {
|
|
340
|
+
if (!(kas in this.kasKeys)) {
|
|
341
|
+
this.kasKeys[kas] = (0, tdf_js_1.fetchKasPublicKey)(kas);
|
|
342
|
+
}
|
|
343
|
+
const kasPublicKey = await this.kasKeys[kas];
|
|
344
|
+
return (0, tdf_js_1.buildKeyAccess)({
|
|
345
|
+
attributeSet,
|
|
346
|
+
type: offline ? 'wrapped' : 'remote',
|
|
347
|
+
url: kasPublicKey.url,
|
|
348
|
+
kid: kasPublicKey.kid,
|
|
349
|
+
publicKey: kasPublicKey.publicKey,
|
|
350
|
+
metadata,
|
|
351
|
+
sid,
|
|
352
|
+
});
|
|
353
|
+
}));
|
|
354
|
+
const { keyForEncryption, keyForManifest } = await keyMiddleware();
|
|
355
|
+
const ecfg = {
|
|
356
|
+
allowList: this.allowedKases,
|
|
357
|
+
attributeSet,
|
|
358
|
+
byteLimit,
|
|
359
|
+
cryptoService: this.cryptoService,
|
|
360
|
+
dpopKeys,
|
|
361
|
+
encryptionInformation,
|
|
362
|
+
entity,
|
|
363
|
+
segmentSizeDefault: windowSize,
|
|
364
|
+
integrityAlgorithm: 'HS256',
|
|
365
|
+
segmentIntegrityAlgorithm: 'GMAC',
|
|
366
|
+
contentStream: source,
|
|
367
|
+
mimeType,
|
|
368
|
+
policy: policyObject,
|
|
369
|
+
authProvider: this.authProvider,
|
|
370
|
+
progressHandler: this.clientConfig.progressHandler,
|
|
371
|
+
keyForEncryption,
|
|
372
|
+
keyForManifest,
|
|
373
|
+
assertionConfigs,
|
|
374
|
+
};
|
|
375
|
+
const stream = await streamMiddleware(await (0, tdf_js_1.writeStream)(ecfg));
|
|
376
|
+
if (!asHtml) {
|
|
377
|
+
return stream;
|
|
378
|
+
}
|
|
379
|
+
// Wrap if it's html.
|
|
380
|
+
if (!stream.manifest) {
|
|
381
|
+
throw new Error('internal: missing manifest in encrypt function');
|
|
382
|
+
}
|
|
383
|
+
const htmlBuf = (0, tdf_js_1.wrapHtml)(await stream.toBuffer(), stream.manifest, this.readerUrl ?? '');
|
|
384
|
+
return new DecoratedReadableStream_js_1.DecoratedReadableStream({
|
|
385
|
+
pull(controller) {
|
|
386
|
+
controller.enqueue(htmlBuf);
|
|
387
|
+
controller.close();
|
|
388
|
+
},
|
|
389
|
+
});
|
|
390
|
+
}
|
|
391
|
+
/**
|
|
392
|
+
* Decrypt TDF ciphertext into plaintext. One of the core operations of the Virtru SDK.
|
|
393
|
+
*
|
|
394
|
+
* @param params keyMiddleware fucntion to process key
|
|
395
|
+
* @param params streamMiddleware fucntion to process streamMiddleware
|
|
396
|
+
* @param params.source A data stream object, one of remote, stream, buffer, etc. types.
|
|
397
|
+
* @param params.eo Optional entity object (legacy AuthZ)
|
|
398
|
+
* @param params.assertionVerificationKeys Optional verification keys for assertions.
|
|
399
|
+
* @return a {@link https://nodejs.org/api/stream.html#stream_class_stream_readable|Readable} stream containing the decrypted plaintext.
|
|
400
|
+
* @see DecryptParamsBuilder
|
|
401
|
+
*/
|
|
402
|
+
async decrypt({ eo, source, keyMiddleware = async (key) => key, streamMiddleware = async (stream) => stream, assertionVerificationKeys, noVerifyAssertions, }) {
|
|
403
|
+
const dpopKeys = await this.dpopKeys;
|
|
404
|
+
let entityObject;
|
|
405
|
+
if (this.eas || eo) {
|
|
406
|
+
const sessionPublicKey = await (0, utils_js_1.cryptoPublicToPem)(dpopKeys.publicKey);
|
|
407
|
+
if (eo && eo.publicKey == sessionPublicKey) {
|
|
408
|
+
entityObject = eo;
|
|
409
|
+
}
|
|
410
|
+
else if (this.eas) {
|
|
411
|
+
entityObject = await this.eas.fetchEntityObject({
|
|
412
|
+
publicKey: sessionPublicKey,
|
|
413
|
+
});
|
|
414
|
+
}
|
|
415
|
+
}
|
|
416
|
+
if (!this.authProvider) {
|
|
417
|
+
throw new errors_js_1.ConfigurationError('AuthProvider missing');
|
|
418
|
+
}
|
|
419
|
+
const chunker = await makeChunkable(source);
|
|
420
|
+
// Await in order to catch any errors from this call.
|
|
421
|
+
// TODO: Write error event to stream and don't await.
|
|
422
|
+
return await streamMiddleware(await (0, tdf_js_1.readStream)({
|
|
423
|
+
allowList: this.allowedKases,
|
|
424
|
+
authProvider: this.authProvider,
|
|
425
|
+
chunker,
|
|
426
|
+
cryptoService: this.cryptoService,
|
|
427
|
+
dpopKeys,
|
|
428
|
+
entity: entityObject,
|
|
429
|
+
fileStreamServiceWorker: this.clientConfig.fileStreamServiceWorker,
|
|
430
|
+
keyMiddleware,
|
|
431
|
+
progressHandler: this.clientConfig.progressHandler,
|
|
432
|
+
assertionVerificationKeys,
|
|
433
|
+
noVerifyAssertions,
|
|
434
|
+
}));
|
|
435
|
+
}
|
|
436
|
+
/**
|
|
437
|
+
* Get the unique policyId associated with TDF ciphertext. Useful for managing authorization policies of encrypted data.
|
|
438
|
+
* <br/><br/>
|
|
439
|
+
* The policyId is embedded in the ciphertext so this is a local operation.
|
|
440
|
+
*
|
|
441
|
+
* @param {object} source - Required. TDF data stream,
|
|
442
|
+
* generated using {@link DecryptParamsBuilder#build|DecryptParamsBuilder's build()}.
|
|
443
|
+
* @return {string} - the unique policyId, which can be used for tracking purposes or policy management operations.
|
|
444
|
+
* @see DecryptParamsBuilder
|
|
445
|
+
*/
|
|
446
|
+
async getPolicyId({ source }) {
|
|
447
|
+
const chunker = await makeChunkable(source);
|
|
448
|
+
const zipHelper = new index_js_1.ZipReader(chunker);
|
|
449
|
+
const centralDirectory = await zipHelper.getCentralDirectory();
|
|
450
|
+
const manifest = await zipHelper.getManifest(centralDirectory, '0.manifest.json');
|
|
451
|
+
const policyJson = index_js_2.base64.decode(manifest.encryptionInformation.policy);
|
|
452
|
+
return JSON.parse(policyJson).uuid;
|
|
453
|
+
}
|
|
454
|
+
async loadTDFStream({ source }) {
|
|
455
|
+
const chunker = await makeChunkable(source);
|
|
456
|
+
return (0, tdf_js_1.loadTDFStream)(chunker);
|
|
457
|
+
}
|
|
458
|
+
}
|
|
459
|
+
exports.Client = Client;
|
|
460
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../tdf3/src/client/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+BAA0B;AAC1B,kDAA0B;AAC1B,gDAQ2B;AAgnBzB,+FArnBA,yBAAc,OAqnBA;AA/mBhB,8DAAyD;AACzD,sCAUmB;AACnB,mGAA2F;AAC3F,iGAAyF;AAEzF,uDAKmC;AAslBjC,kGAzlBA,2BAAiB,OAylBA;AAIjB,4FA5lBA,qBAAW,OA4lBA;AAEX,4FA7lBA,qBAAW,OA6lBA;AA3lBb,sEAA2C;AAC3C,oDAK+B;AAW/B,6EAAuE;AAEvE,+CAKuB;AA8jBrB,qGAjkBA,kCAAoB,OAikBA;AAEpB,qGAjkBA,kCAAoB,OAikBA;AA/jBtB,sDAA2E;AAC3E,sDAA4D;AAG5D,oEAA4D;AAC5D,+DAA4D;AAC5D,yEAA2D;AAC3D,iDAA+F;AAC/F,+DAAsD;AACtD,uDAAmE;AAGnE,MAAM,iBAAiB,GAAG,EAAE,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,sBAAsB;AACzE,MAAM,eAAe,GAAG,GAAG,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,uBAAuB;AAElE,uEAAuE;AACvE,MAAM,mBAAmB,GAAG,EAAE,UAAU,EAAE,EAAE,EAAE,aAAa,EAAE,oBAAoB,EAAE,CAAC;AAE7E,MAAM,gBAAgB,GAAG,KAAK,WACnC,MAAkC,EAClC,SAAiB,EACjB,QAAgB;IAEhB,IAAI;QACF,MAAM,IAAI,GAAe,MAAM,IAAA,yBAAc,EAAC,MAAM,CAAC,CAAC;QAEtD,MAAM,eAAK,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,EAAE;YAC/B,OAAO,EAAE;gBACP,gBAAgB,EAAE,QAAQ;gBAC1B,cAAc,EAAE,iBAAiB;gBACjC,eAAe,EAAE,UAAU;aAC5B;YACD,gBAAgB,EAAE,QAAQ;YAC1B,aAAa,EAAE,QAAQ;SACxB,CAAC,CAAC;KACJ;IAAC,OAAO,CAAC,EAAE;QACV,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QACjB,MAAM,CAAC,CAAC;KACT;AACH,CAAC,CAAC;AArBW,QAAA,gBAAgB,oBAqB3B;AACF,MAAM,gBAAgB,GAAG,KAAK,EAAE,OAAgB,EAAE,EAAE,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,MAAM,OAAO,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;AAEnG,MAAM,aAAa,GAAG,KAAK,EAAE,MAAqB,EAAE,EAAE;IACpD,IAAI,CAAC,MAAM,EAAE;QACX,MAAM,IAAI,8BAAkB,CAAC,gBAAgB,CAAC,CAAC;KAChD;IACD,wBAAwB;IACxB,sDAAsD;IACtD,IAAI,cAAuB,CAAC;IAC5B,IAAI,GAAG,GAAG,IAAI,CAAC;IACf,QAAQ,MAAM,CAAC,IAAI,EAAE;QACnB,KAAK,QAAQ;YACX,GAAG,GAAG,MAAM,IAAA,yBAAc,EAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;YAC5C,cAAc,GAAG,IAAA,qBAAU,EAAC,GAAG,CAAC,CAAC;YACjC,MAAM;QACR,KAAK,QAAQ;YACX,GAAG,GAAG,MAAM,CAAC,QAAQ,CAAC;YACtB,cAAc,GAAG,IAAA,qBAAU,EAAC,GAAG,CAAC,CAAC;YACjC,MAAM;QACR,KAAK,SAAS;YACZ,cAAc,GAAG,MAAM,CAAC,QAAQ,CAAC;YACjC,MAAM;QACR;YACE,cAAc,GAAG,MAAM,IAAA,yBAAc,EAAC,MAAM,CAAC,CAAC;KACjD;IAED,MAAM,KAAK,GAAW,MAAM,gBAAgB,CAAC,cAAc,CAAC,CAAC;IAC7D,oCAAoC;IACpC,IAAI,KAAK,KAAK,IAAI,EAAE;QAClB,OAAO,cAAc,CAAC;KACvB;IACD,uBAAuB;IACvB,mEAAmE;IACnE,MAAM,OAAO,GAAG,GAAG,IAAI,CAAC,MAAM,cAAc,EAAE,CAAC,CAAC;IAChD,MAAM,MAAM,GAAG,IAAA,mBAAU,EAAC,OAAO,CAAC,CAAC;IACnC,OAAO,IAAA,qBAAU,EAAC,MAAM,CAAC,CAAC;AAC5B,CAAC,CAAC;AAoCF;;;;;GAKG;AACI,KAAK,UAAU,iBAAiB,CAAC,EACtC,YAAY;AACZ,iDAAiD;AACjD,aAAa,EACb,QAAQ,GAKT;IACC,IAAI,WAA0B,CAAC;IAC/B,IAAI,QAAQ,EAAE;QACZ,WAAW,GAAG,MAAM,QAAQ,CAAC;KAC9B;SAAM;QACL,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,sBAAsB,EAAE,CAAC;QAC1D,mFAAmF;QACnF,WAAW,GAAG,MAAM,IAAA,iCAAe,EAAC,IAAI,CAAC,CAAC;KAC3C;IAED,gFAAgF;IAChF,mDAAmD;IACnD,uFAAuF;IACvF,4FAA4F;IAC5F,wFAAwF;IACxF,IAAI,YAAY,IAAI,CAAC,IAAA,+BAAoB,EAAC,YAAY,CAAC,EAAE;QACvD,MAAM,YAAY,EAAE,qBAAqB,CAAC,WAAW,CAAC,CAAC;KACxD;IACD,OAAO,WAAW,CAAC;AACrB,CAAC;AA5BD,8CA4BC;AAED;;GAEG;AACH,SAAS,QAAQ,CAAC,KAAY;IAC5B,IAAI,KAAK,CAAC,YAAY,EAAE;QACtB,sCAAsC;QACtC,OAAO,KAAK,CAAC,YAAY,CAAC;KAC3B;IACD,MAAM,QAAQ,GAAG,KAAK,CAAC,QAAQ,IAAI,IAAA,SAAE,GAAE,CAAC;IACxC,IAAI,cAAiC,CAAC;IACtC,IAAI,KAAK,CAAC,eAAe,EAAE;QACzB,cAAc,GAAG,KAAK,CAAC,eAAe;aACnC,MAAM,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC;aAC1B,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAmB,EAAE;YAChC,OAAO,EAAE,SAAS,EAAE,GAAI,EAAE,CAAC;QAC7B,CAAC,CAAC,CAAC;KACN;SAAM;QACL,cAAc,GAAG,CAAC,KAAK,CAAC,UAAU,IAAI,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE,CAC1D,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,SAAS,CAC1D,CAAC;KACH;IACD,OAAO;QACL,IAAI,EAAE,QAAQ;QACd,IAAI,EAAE;YACJ,cAAc;YACd,MAAM,EAAE,KAAK,CAAC,MAAM,IAAI,EAAE;SAC3B;KACF,CAAC;AACJ,CAAC;AAED,MAAa,MAAM;IA2CjB;;;;;;;;;OASG;IACH,YAAY,MAAoB;QAjCvB,YAAO,GAA8C,EAAE,CAAC;QAkC/D,MAAM,YAAY,GAAG,EAAE,GAAG,mBAAmB,EAAE,GAAG,MAAM,EAAE,CAAC;QAC3D,IAAI,CAAC,aAAa,GAAG,YAAY,CAAC,aAAa,CAAC;QAChD,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC,CAAC,YAAY,CAAC,WAAW,IAAI,YAAY,CAAC,QAAQ,CAAC,CAAC;QAEzE,YAAY,CAAC,SAAS,IAAI,CAAC,IAAI,CAAC,SAAS,GAAG,YAAY,CAAC,SAAS,CAAC,CAAC;QAEpE,IAAI,YAAY,CAAC,WAAW,EAAE;YAC5B,IAAI,CAAC,WAAW,GAAG,YAAY,CAAC,WAAW,CAAC;SAC7C;aAAM;YACL,kDAAkD;YAClD,IAAI,CAAC,YAAY,CAAC,iBAAiB,EAAE;gBACnC,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,WAAW,GAAG,YAAY,CAAC,iBAAiB,CAAC,OAAO,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;SAC5E;QACD,IAAI,CAAC,WAAW,GAAG,IAAA,iBAAM,EAAC,IAAI,CAAC,WAAW,EAAE,GAAG,CAAC,CAAC;QACjD,IAAI,YAAY,CAAC,cAAc,EAAE;YAC/B,IAAI,CAAC,cAAc,GAAG,IAAA,iBAAM,EAAC,YAAY,CAAC,cAAc,EAAE,GAAG,CAAC,CAAC;SAChE;aAAM,IAAI,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE;YAC5C,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;SACrD;QAED,MAAM,SAAS,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC;QACnD,IAAI,YAAY,CAAC,YAAY,EAAE;YAC7B,IAAI,CAAC,YAAY,GAAG,IAAI,2BAAe,CACrC,YAAY,CAAC,YAAY,EACzB,CAAC,CAAC,YAAY,CAAC,eAAe,CAC/B,CAAC;YACF,IAAI,CAAC,IAAA,4BAAiB,EAAC,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE;gBAChF,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC;aAC5E;SACF;aAAM;YACL,IAAI,CAAC,IAAA,4BAAiB,EAAC,IAAI,CAAC,WAAW,CAAC,EAAE;gBACxC,MAAM,IAAI,8BAAkB,CAC1B,yBAAyB,IAAI,CAAC,WAAW,gDAAgD,CAC1F,CAAC;aACH;YACD,IAAI,CAAC,YAAY,GAAG,IAAI,2BAAe,CAAC,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC,YAAY,CAAC,eAAe,CAAC,CAAC;SACtF;QAED,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,YAAY,CAAC;QACxC,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QAEjC,IAAI,IAAI,CAAC,YAAY,IAAI,IAAA,+BAAoB,EAAC,IAAI,CAAC,YAAY,CAAC,EAAE;YAChE,IAAI,CAAC,GAAG,GAAG,IAAI,gBAAG,CAAC;gBACjB,YAAY,EAAE,IAAI,CAAC,YAAY;gBAC/B,QAAQ,EACN,YAAY,CAAC,oBAAoB,IAAI,GAAG,YAAY,CAAC,WAAW,mBAAmB;aACtF,CAAC,CAAC;SACJ;QAED,IAAI,CAAC,QAAQ,GAAG,YAAY,CAAC,QAAQ,CAAC;QACtC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,IAAI,CAAC,YAAY,CAAC,QAAQ,EAAE;gBAC1B,MAAM,IAAI,8BAAkB,CAAC,kDAAkD,CAAC,CAAC;aAClF;YAED,0FAA0F;YAC1F,0EAA0E;YAC1E,0GAA0G;YAC1G,gFAAgF;YAChF,IAAI,YAAY,CAAC,YAAY,EAAE;gBAC7B,IAAI,CAAC,YAAY,GAAG,IAAI,wDAAwB,CAAC;oBAC/C,QAAQ,EAAE,YAAY,CAAC,QAAQ;oBAC/B,YAAY,EAAE,YAAY,CAAC,YAAY;oBACvC,UAAU,EAAE,YAAY,CAAC,UAAU;iBACpC,CAAC,CAAC;aACJ;iBAAM,IAAI,YAAY,CAAC,WAAW,EAAE;gBACnC,0GAA0G;gBAC1G,IAAI,CAAC,YAAY,GAAG,IAAI,sDAAuB,CAAC;oBAC9C,QAAQ,EAAE,YAAY,CAAC,QAAQ;oBAC/B,WAAW,EAAE,YAAY,CAAC,WAAW;oBACrC,UAAU,EAAE,YAAY,CAAC,UAAU;iBACpC,CAAC,CAAC;aACJ;SACF;QACD,IAAI,CAAC,QAAQ,GAAG,iBAAiB,CAAC;YAChC,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ,EAAE,YAAY,CAAC,QAAQ;SAChC,CAAC,CAAC;QACH,IAAI,YAAY,CAAC,YAAY,EAAE;YAC7B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;gBAC/C,GAAG,EAAE,IAAI,CAAC,WAAW;gBACrB,SAAS,EAAE,UAAU;gBACrB,GAAG,EAAE,IAAA,+BAAoB,EAAC,YAAY,CAAC,YAAY,CAAC;gBACpD,SAAS,EAAE,YAAY,CAAC,YAAY;aACrC,CAAC,CAAC;SACJ;IACH,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,KAAK,CAAC,OAAO,CAAC,EACZ,KAAK,GAAG,EAAE,UAAU,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,EAAE,EACtC,aAAa,EACb,MAAM,EACN,MAAM,GAAG,KAAK,EACd,QAAQ,EACR,QAAQ,EACR,OAAO,GAAG,KAAK,EACf,UAAU,GAAG,kCAAoB,EACjC,EAAE,EACF,aAAa,GAAG,wBAAoB,EACpC,gBAAgB,GAAG,KAAK,EAAE,MAA+B,EAAE,EAAE,CAAC,MAAM,EACpE,SAAS,EACT,gBAAgB,GAAG,EAAE,GACP;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QAErC,MAAM,YAAY,GAAG,QAAQ,CAAC,KAAK,CAAC,CAAC;QACrC,IAAA,6BAAoB,EAAC,YAAY,CAAC,CAAC;QAEnC,IAAI,CAAC,SAAS,IAAI,aAAa,EAAE;YAC/B,IAAI,GAAG,GAAY,KAAK,CAAC,eAAe,IAAI,EAAE,CAAC;YAC/C,MAAM,IAAI,GAAa,KAAK,CAAC,UAAU;gBACrC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE,CACjC,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,SAAS,CAChE;gBACH,CAAC,CAAC,EAAE,CAAC;YAEP,IAAI,CAAC,GAAG,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM,EAAE;gBAC9B,mDAAmD;gBACnD,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE;oBACxB,MAAM,IAAI,8BAAkB,CAAC,mDAAmD,CAAC,CAAC;iBACnF;gBACD,GAAG,GAAG,MAAM,IAAA,8BAAqB,EAC/B,IAAI,CAAC,cAAc,EACnB,IAAI,CAAC,YAA4B,EACjC,GAAG,IAAI,CACR,CAAC;aACH;iBAAM,IAAI,KAAK,CAAC,eAAe,EAAE;gBAChC,GAAG,GAAG,KAAK,CAAC,eAAe,CAAC;gBAC5B,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE;oBACrB,KAAK,CAAC,UAAU,GAAG,GAAG,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC;iBAC9C;aACF;YACD,IACE,GAAG,CAAC,MAAM,IAAI,KAAK,CAAC,UAAU,EAAE,MAAM;gBACtC,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,EAC7D;gBACA,MAAM,IAAI,8BAAkB,CAC1B,+BAA+B,IAAI,yBAAyB,IAAI,CAAC,SAAS,CACxE,GAAG,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAC1B,EAAE,CACJ,CAAC;aACH;YACD,MAAM,YAAY,GAAG,IAAA,iBAAI,EAAC,GAAG,CAAC,CAAC;YAC/B,SAAS,GAAG,YAAY,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;gBACnC,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,GAAG,CAAC;gBACzB,IAAI,GAAG,EAAE,SAAS,EAAE,MAAM,EAAE,IAAI,IAAI,CAAC,CAAC,GAAG,CAAC,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,EAAE;oBAC9D,MAAM,IAAI,GAAG,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAC3C,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,IAAI,kCAAkC,CACvD,CAAC;oBACF,IAAI,IAAI,EAAE,MAAM,EAAE;wBAChB,MAAM,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;wBACpB,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;4BACtC,GAAG,EAAE,IAAA,+BAAoB,EAAC,GAAG,CAAC,GAAG,CAAC;4BAClC,SAAS,EAAE,GAAG,CAAC,GAAG;4BAClB,GAAG,EAAE,GAAG,CAAC,GAAG;4BACZ,SAAS,EAAE,UAAU;4BACrB,GAAG,EAAE,GAAG,CAAC,GAAG;yBACb,CAAC,CAAC;qBACJ;iBACF;gBACD,OAAO,EAAE,GAAG,EAAE,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,CAAC;YAC/B,CAAC,CAAC,CAAC;SACJ;QAED,+EAA+E;QAE/E,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAC/D,MAAM,qBAAqB,GAAG,IAAI,mBAAQ,CAAC,IAAI,gCAAY,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC;QACjF,IAAI,YAAsC,CAAC;QAC3C,IAAI,MAAgC,CAAC;QACrC,IAAI,EAAE,EAAE;YACN,MAAM,GAAG,EAAE,CAAC;YACZ,MAAM,CAAC,GAAG,IAAI,uBAAY,EAAE,CAAC;YAC7B,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC,CAAC;YACzD,YAAY,GAAG,CAAC,CAAC;SAClB;QAED,MAAM,MAAM,GAAgB,SAAS,EAAE,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;QACxF,qBAAqB,CAAC,SAAS,GAAG,MAAM,OAAO,CAAC,GAAG,CACjD,MAAM,CAAC,GAAG,CAAC,KAAK,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE;YAChC,IAAI,CAAC,CAAC,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,EAAE;gBAC1B,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,IAAA,0BAAiB,EAAC,GAAG,CAAC,CAAC;aAC5C;YACD,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YAC7C,OAAO,IAAA,uBAAc,EAAC;gBACpB,YAAY;gBACZ,IAAI,EAAE,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;gBACpC,GAAG,EAAE,YAAY,CAAC,GAAG;gBACrB,GAAG,EAAE,YAAY,CAAC,GAAG;gBACrB,SAAS,EAAE,YAAY,CAAC,SAAS;gBACjC,QAAQ;gBACR,GAAG;aACJ,CAAC,CAAC;QACL,CAAC,CAAC,CACH,CAAC;QACF,MAAM,EAAE,gBAAgB,EAAE,cAAc,EAAE,GAAG,MAAO,aAAsC,EAAE,CAAC;QAC7F,MAAM,IAAI,GAAyB;YACjC,SAAS,EAAE,IAAI,CAAC,YAAY;YAC5B,YAAY;YACZ,SAAS;YACT,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ;YACR,qBAAqB;YACrB,MAAM;YACN,kBAAkB,EAAE,UAAU;YAC9B,kBAAkB,EAAE,OAAO;YAC3B,yBAAyB,EAAE,MAAM;YACjC,aAAa,EAAE,MAAM;YACrB,QAAQ;YACR,MAAM,EAAE,YAAY;YACpB,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,eAAe;YAClD,gBAAgB;YAChB,cAAc;YACd,gBAAgB;SACjB,CAAC;QAEF,MAAM,MAAM,GAAG,MAAO,gBAA4C,CAAC,MAAM,IAAA,oBAAW,EAAC,IAAI,CAAC,CAAC,CAAC;QAE5F,IAAI,CAAC,MAAM,EAAE;YACX,OAAO,MAAM,CAAC;SACf;QAED,qBAAqB;QACrB,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE;YACpB,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;SACnE;QACD,MAAM,OAAO,GAAG,IAAA,iBAAQ,EAAC,MAAM,MAAM,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,SAAS,IAAI,EAAE,CAAC,CAAC;QAEzF,OAAO,IAAI,oDAAuB,CAAC;YACjC,IAAI,CAAC,UAA2C;gBAC9C,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;gBAC5B,UAAU,CAAC,KAAK,EAAE,CAAC;YACrB,CAAC;SACF,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;OAUG;IACH,KAAK,CAAC,OAAO,CAAC,EACZ,EAAE,EACF,MAAM,EACN,aAAa,GAAG,KAAK,EAAE,GAAW,EAAE,EAAE,CAAC,GAAG,EAC1C,gBAAgB,GAAG,KAAK,EAAE,MAA+B,EAAE,EAAE,CAAC,MAAM,EACpE,yBAAyB,EACzB,kBAAkB,GACJ;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,IAAI,YAAY,CAAC;QACjB,IAAI,IAAI,CAAC,GAAG,IAAI,EAAE,EAAE;YAClB,MAAM,gBAAgB,GAAG,MAAM,IAAA,4BAAiB,EAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;YACrE,IAAI,EAAE,IAAI,EAAE,CAAC,SAAS,IAAI,gBAAgB,EAAE;gBAC1C,YAAY,GAAG,EAAE,CAAC;aACnB;iBAAM,IAAI,IAAI,CAAC,GAAG,EAAE;gBACnB,YAAY,GAAG,MAAM,IAAI,CAAC,GAAG,CAAC,iBAAiB,CAAC;oBAC9C,SAAS,EAAE,gBAAgB;iBAC5B,CAAC,CAAC;aACJ;SACF;QACD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,8BAAkB,CAAC,sBAAsB,CAAC,CAAC;SACtD;QACD,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,MAAM,CAAC,CAAC;QAE5C,qDAAqD;QACrD,qDAAqD;QACrD,OAAO,MAAO,gBAA4C,CACxD,MAAM,IAAA,mBAAU,EAAC;YACf,SAAS,EAAE,IAAI,CAAC,YAAY;YAC5B,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,OAAO;YACP,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ;YACR,MAAM,EAAE,YAAY;YACpB,uBAAuB,EAAE,IAAI,CAAC,YAAY,CAAC,uBAAuB;YAClE,aAAa;YACb,eAAe,EAAE,IAAI,CAAC,YAAY,CAAC,eAAe;YAClD,yBAAyB;YACzB,kBAAkB;SACnB,CAAC,CACH,CAAC;IACJ,CAAC;IAED;;;;;;;;;OASG;IACH,KAAK,CAAC,WAAW,CAAC,EAAE,MAAM,EAA6B;QACrD,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,MAAM,CAAC,CAAC;QAC5C,MAAM,SAAS,GAAG,IAAI,oBAAS,CAAC,OAAO,CAAC,CAAC;QACzC,MAAM,gBAAgB,GAAG,MAAM,SAAS,CAAC,mBAAmB,EAAE,CAAC;QAC/D,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;QAClF,MAAM,UAAU,GAAG,iBAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACxE,OAAO,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC;IACrC,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,EAAE,MAAM,EAA6B;QACvD,MAAM,OAAO,GAAG,MAAM,aAAa,CAAC,MAAM,CAAC,CAAC;QAC5C,OAAO,IAAA,sBAAa,EAAC,OAAO,CAAC,CAAC;IAChC,CAAC;CACF;AArYD,wBAqYC"}
|
|
@@ -0,0 +1,63 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.validateAttribute = exports.validateAttributeObject = exports.ATTR_ATTRIBUTE_PATTERN = exports.ATTR_VALUE = exports.ATTR_NAME = exports.ATTR_VALUE_PROP_NAME = exports.ATTR_NAME_PROP_NAME = void 0;
|
|
4
|
+
const errors_js_1 = require("../../../src/errors.js");
|
|
5
|
+
const sageGetMatch = (match) => (match ? match[0] : null);
|
|
6
|
+
exports.ATTR_NAME_PROP_NAME = 'attr';
|
|
7
|
+
exports.ATTR_VALUE_PROP_NAME = 'value';
|
|
8
|
+
// Validate attribute url protocol starts with `http://` or `https://`
|
|
9
|
+
const SCHEME = '(https?://)';
|
|
10
|
+
// validate url host be like `localhost:4000`
|
|
11
|
+
const HOST_PORT = '([a-z0-9][a-z0-9]{1,}:[0-9]{1,4})';
|
|
12
|
+
// validate url host be like `www.example.com`
|
|
13
|
+
const WWW_HOST = '([a-z0-9](?:[a-z0-9-]*[a-z0-9])?\\.)+[a-z]{2,}';
|
|
14
|
+
// validate url host be like `127.0.0.1:4000`
|
|
15
|
+
const IP_HOST_PORT = '([0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}:[0-9]{1,4})';
|
|
16
|
+
// validate host is one of those above
|
|
17
|
+
const HOST = `(${HOST_PORT}|${WWW_HOST}|${IP_HOST_PORT})`;
|
|
18
|
+
// validate attr name be like `/attr/<attr_name>`
|
|
19
|
+
exports.ATTR_NAME = `(/${exports.ATTR_NAME_PROP_NAME}/[a-zA-Z0-9][a-zA-Z0-9-]*[a-zA-Z0-9]?)`;
|
|
20
|
+
// validate value pattern
|
|
21
|
+
exports.ATTR_VALUE = `(/${exports.ATTR_VALUE_PROP_NAME}/[a-zA-Z0-9][a-zA-Z0-9-]*[a-zA-Z0-9]?)`;
|
|
22
|
+
// validate attribute authority e.g. https://example.com
|
|
23
|
+
const ATTR_AUTHORITY_PATTERN = `(${SCHEME}${HOST})`;
|
|
24
|
+
// validate attribute namespace e.g. https://example.com/attr/someattribute
|
|
25
|
+
const ATTR_NAMESPACE_PATTERN = `(${ATTR_AUTHORITY_PATTERN}${exports.ATTR_NAME})`;
|
|
26
|
+
// validate whole attribute e.g. https://example.com/attr/someattribute/value/somevalue
|
|
27
|
+
exports.ATTR_ATTRIBUTE_PATTERN = `^(${ATTR_NAMESPACE_PATTERN}${exports.ATTR_VALUE})$`;
|
|
28
|
+
const validateAttributeObject = (attr) => {
|
|
29
|
+
const isObject = typeof attr === 'object';
|
|
30
|
+
if (!isObject) {
|
|
31
|
+
throw new errors_js_1.AttributeValidationError(`attribute should be an object`, attr);
|
|
32
|
+
}
|
|
33
|
+
const { attribute } = attr;
|
|
34
|
+
const isString = typeof attribute === 'string';
|
|
35
|
+
if (!isString) {
|
|
36
|
+
throw new errors_js_1.AttributeValidationError(`attribute prop should be a string`, attr);
|
|
37
|
+
}
|
|
38
|
+
return validateAttribute(attribute);
|
|
39
|
+
};
|
|
40
|
+
exports.validateAttributeObject = validateAttributeObject;
|
|
41
|
+
function validateAttribute(attribute) {
|
|
42
|
+
if (!attribute.match(exports.ATTR_ATTRIBUTE_PATTERN)) {
|
|
43
|
+
throw new errors_js_1.AttributeValidationError(`attribute is in invalid format [${attribute}]`, attribute);
|
|
44
|
+
}
|
|
45
|
+
const ATTR_NAME_PREFIX = `/${exports.ATTR_NAME_PROP_NAME}/`;
|
|
46
|
+
const ATTR_VALUE_PREFIX = `/${exports.ATTR_VALUE_PROP_NAME}/`;
|
|
47
|
+
const attrNameMatch = sageGetMatch(attribute.match(exports.ATTR_NAME));
|
|
48
|
+
const attrValueMatch = sageGetMatch(attribute.match(exports.ATTR_VALUE));
|
|
49
|
+
if (!attrNameMatch) {
|
|
50
|
+
throw new errors_js_1.AttributeValidationError(`attribute name matching error`, attribute);
|
|
51
|
+
}
|
|
52
|
+
if (!attrValueMatch) {
|
|
53
|
+
throw new errors_js_1.AttributeValidationError(`attribute value matching error`, attribute);
|
|
54
|
+
}
|
|
55
|
+
const attributeName = attrNameMatch.slice(ATTR_NAME_PREFIX.length);
|
|
56
|
+
const attributeValue = attrValueMatch.slice(ATTR_VALUE_PREFIX.length);
|
|
57
|
+
if (attributeName === attributeValue) {
|
|
58
|
+
throw new errors_js_1.AttributeValidationError(`attribute name should be unique with its value`, attribute);
|
|
59
|
+
}
|
|
60
|
+
return true;
|
|
61
|
+
}
|
|
62
|
+
exports.validateAttribute = validateAttribute;
|
|
63
|
+
//# sourceMappingURL=data:application/json;base64,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
|