@opentdf/sdk 0.2.0-beta.1758 → 0.2.0-beta.1941

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (265) hide show
  1. package/README.md +45 -38
  2. package/dist/cjs/src/access.js +47 -11
  3. package/dist/cjs/src/auth/auth.js +5 -5
  4. package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +1 -1
  5. package/dist/cjs/src/auth/oidc-externaljwt-provider.js +1 -1
  6. package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +1 -1
  7. package/dist/cjs/src/auth/oidc.js +1 -1
  8. package/dist/cjs/src/auth/providers.js +1 -1
  9. package/dist/cjs/src/concurrency.js +3 -4
  10. package/dist/cjs/src/encodings/base64.js +4 -4
  11. package/dist/cjs/src/encodings/hex.js +5 -6
  12. package/dist/cjs/src/encodings/index.js +18 -8
  13. package/dist/cjs/src/errors.js +1 -1
  14. package/dist/cjs/src/index.js +28 -318
  15. package/dist/cjs/src/nanoclients.js +285 -0
  16. package/dist/cjs/src/nanoindex.js +47 -0
  17. package/dist/cjs/src/nanotdf/Client.js +18 -8
  18. package/dist/cjs/src/nanotdf/NanoTDF.js +1 -1
  19. package/dist/cjs/src/nanotdf/decrypt.js +2 -2
  20. package/dist/cjs/src/nanotdf/encrypt-dataset.js +2 -2
  21. package/dist/cjs/src/nanotdf/encrypt.js +2 -2
  22. package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +3 -4
  23. package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +2 -2
  24. package/dist/cjs/src/nanotdf/models/Ciphers.js +3 -3
  25. package/dist/cjs/src/nanotdf/models/EcCurves.js +3 -3
  26. package/dist/cjs/src/nanotdf/models/Header.js +1 -1
  27. package/dist/cjs/src/nanotdf/models/Payload.js +1 -1
  28. package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +1 -1
  29. package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +1 -1
  30. package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +1 -1
  31. package/dist/cjs/src/nanotdf/models/ResourceLocator.js +1 -1
  32. package/dist/cjs/src/nanotdf/models/Signature.js +1 -1
  33. package/dist/cjs/src/nanotdf-crypto/ciphers.js +1 -1
  34. package/dist/cjs/src/nanotdf-crypto/decrypt.js +2 -2
  35. package/dist/cjs/src/nanotdf-crypto/digest.js +2 -2
  36. package/dist/cjs/src/nanotdf-crypto/ecdsaSignature.js +4 -5
  37. package/dist/cjs/src/nanotdf-crypto/encrypt.js +2 -2
  38. package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +2 -2
  39. package/dist/cjs/src/nanotdf-crypto/generateKeyPair.js +2 -2
  40. package/dist/cjs/src/nanotdf-crypto/generateRandomNumber.js +2 -2
  41. package/dist/cjs/src/nanotdf-crypto/index.js +21 -13
  42. package/dist/cjs/src/nanotdf-crypto/keyAgreement.js +10 -8
  43. package/dist/cjs/src/nanotdf-crypto/pemPublicToCrypto.js +20 -11
  44. package/dist/cjs/src/opentdf.js +243 -0
  45. package/dist/cjs/src/policy/api.js +2 -3
  46. package/dist/cjs/src/policy/granter.js +3 -4
  47. package/dist/cjs/src/seekable.js +157 -0
  48. package/dist/cjs/src/tdf/AttributeObject.js +2 -4
  49. package/dist/cjs/src/tdf/Policy.js +1 -2
  50. package/dist/cjs/src/utils.js +12 -14
  51. package/dist/cjs/src/version.js +6 -2
  52. package/dist/cjs/tdf3/index.js +27 -15
  53. package/dist/cjs/tdf3/src/assertions.js +25 -11
  54. package/dist/cjs/tdf3/src/binary.js +1 -1
  55. package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +1 -1
  56. package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +1 -1
  57. package/dist/cjs/tdf3/src/client/DecoratedReadableStream.js +7 -74
  58. package/dist/cjs/tdf3/src/client/builders.js +26 -22
  59. package/dist/cjs/tdf3/src/client/index.js +88 -61
  60. package/dist/cjs/tdf3/src/client/validation.js +3 -3
  61. package/dist/cjs/tdf3/src/crypto/crypto-utils.js +1 -1
  62. package/dist/cjs/tdf3/src/crypto/index.js +18 -18
  63. package/dist/cjs/tdf3/src/index.js +22 -11
  64. package/dist/cjs/tdf3/src/models/attribute-set.js +1 -1
  65. package/dist/cjs/tdf3/src/models/encryption-information.js +3 -3
  66. package/dist/cjs/tdf3/src/models/key-access.js +67 -35
  67. package/dist/cjs/tdf3/src/models/policy.js +3 -3
  68. package/dist/cjs/tdf3/src/tdf.js +177 -151
  69. package/dist/cjs/tdf3/src/utils/buffer-crc32.js +2 -3
  70. package/dist/cjs/tdf3/src/utils/index.js +30 -28
  71. package/dist/cjs/tdf3/src/utils/keysplit.js +4 -5
  72. package/dist/cjs/tdf3/src/utils/unwrap.js +21 -0
  73. package/dist/cjs/tdf3/src/utils/zip-reader.js +4 -4
  74. package/dist/cjs/tdf3/src/utils/zip-writer.js +4 -4
  75. package/dist/types/src/access.d.ts +3 -0
  76. package/dist/types/src/access.d.ts.map +1 -1
  77. package/dist/types/src/auth/providers.d.ts.map +1 -1
  78. package/dist/types/src/index.d.ts +5 -136
  79. package/dist/types/src/index.d.ts.map +1 -1
  80. package/dist/types/src/nanoclients.d.ts +107 -0
  81. package/dist/types/src/nanoclients.d.ts.map +1 -0
  82. package/dist/types/src/nanoindex.d.ts +5 -0
  83. package/dist/types/src/nanoindex.d.ts.map +1 -0
  84. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +1 -1
  85. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -1
  86. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +1 -1
  87. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -1
  88. package/dist/types/src/nanotdf/models/DefaultParams.d.ts +1 -1
  89. package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -1
  90. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts +1 -1
  91. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -1
  92. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts +1 -1
  93. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -1
  94. package/dist/types/src/nanotdf-crypto/index.d.ts +2 -3
  95. package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -1
  96. package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -1
  97. package/dist/types/src/opentdf.d.ts +106 -0
  98. package/dist/types/src/opentdf.d.ts.map +1 -0
  99. package/dist/types/src/seekable.d.ts +39 -0
  100. package/dist/types/src/seekable.d.ts.map +1 -0
  101. package/dist/types/src/tdf/AttributeObject.d.ts +0 -2
  102. package/dist/types/src/tdf/AttributeObject.d.ts.map +1 -1
  103. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +2 -2
  104. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -1
  105. package/dist/types/src/tdf/Policy.d.ts.map +1 -1
  106. package/dist/types/src/tdf/PolicyObject.d.ts +0 -1
  107. package/dist/types/src/tdf/PolicyObject.d.ts.map +1 -1
  108. package/dist/types/src/utils.d.ts +0 -1
  109. package/dist/types/src/utils.d.ts.map +1 -1
  110. package/dist/types/src/version.d.ts +4 -0
  111. package/dist/types/src/version.d.ts.map +1 -1
  112. package/dist/types/tdf3/index.d.ts +3 -2
  113. package/dist/types/tdf3/index.d.ts.map +1 -1
  114. package/dist/types/tdf3/src/assertions.d.ts +3 -3
  115. package/dist/types/tdf3/src/assertions.d.ts.map +1 -1
  116. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts +1 -13
  117. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts.map +1 -1
  118. package/dist/types/tdf3/src/client/builders.d.ts +43 -37
  119. package/dist/types/tdf3/src/client/builders.d.ts.map +1 -1
  120. package/dist/types/tdf3/src/client/index.d.ts +8 -9
  121. package/dist/types/tdf3/src/client/index.d.ts.map +1 -1
  122. package/dist/types/tdf3/src/client/validation.d.ts +3 -3
  123. package/dist/types/tdf3/src/client/validation.d.ts.map +1 -1
  124. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -1
  125. package/dist/types/tdf3/src/index.d.ts +1 -1
  126. package/dist/types/tdf3/src/index.d.ts.map +1 -1
  127. package/dist/types/tdf3/src/models/key-access.d.ts +63 -15
  128. package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -1
  129. package/dist/types/tdf3/src/models/manifest.d.ts +2 -0
  130. package/dist/types/tdf3/src/models/manifest.d.ts.map +1 -1
  131. package/dist/types/tdf3/src/models/policy.d.ts +0 -1
  132. package/dist/types/tdf3/src/models/policy.d.ts.map +1 -1
  133. package/dist/types/tdf3/src/tdf.d.ts +20 -24
  134. package/dist/types/tdf3/src/tdf.d.ts.map +1 -1
  135. package/dist/types/tdf3/src/utils/index.d.ts +0 -2
  136. package/dist/types/tdf3/src/utils/index.d.ts.map +1 -1
  137. package/dist/types/tdf3/src/utils/unwrap.d.ts +2 -0
  138. package/dist/types/tdf3/src/utils/unwrap.d.ts.map +1 -0
  139. package/dist/types/tdf3/src/utils/zip-reader.d.ts +1 -1
  140. package/dist/types/tdf3/src/utils/zip-reader.d.ts.map +1 -1
  141. package/dist/types/tdf3/src/utils/zip-writer.d.ts +2 -2
  142. package/dist/web/src/access.js +40 -7
  143. package/dist/web/src/auth/auth.js +1 -1
  144. package/dist/web/src/auth/oidc-clientcredentials-provider.js +1 -1
  145. package/dist/web/src/auth/oidc-externaljwt-provider.js +1 -1
  146. package/dist/web/src/auth/oidc-refreshtoken-provider.js +1 -1
  147. package/dist/web/src/auth/oidc.js +1 -1
  148. package/dist/web/src/auth/providers.js +1 -1
  149. package/dist/web/src/concurrency.js +1 -1
  150. package/dist/web/src/encodings/base64.js +1 -1
  151. package/dist/web/src/encodings/hex.js +1 -1
  152. package/dist/web/src/errors.js +1 -1
  153. package/dist/web/src/index.js +6 -310
  154. package/dist/web/src/nanoclients.js +280 -0
  155. package/dist/web/src/nanoindex.js +5 -0
  156. package/dist/web/src/nanotdf/Client.js +1 -1
  157. package/dist/web/src/nanotdf/NanoTDF.js +1 -1
  158. package/dist/web/src/nanotdf/encrypt-dataset.js +1 -1
  159. package/dist/web/src/nanotdf/encrypt.js +1 -1
  160. package/dist/web/src/nanotdf/models/Ciphers.js +1 -1
  161. package/dist/web/src/nanotdf/models/EcCurves.js +1 -1
  162. package/dist/web/src/nanotdf/models/Header.js +1 -1
  163. package/dist/web/src/nanotdf/models/Payload.js +1 -1
  164. package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +1 -1
  165. package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +1 -1
  166. package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +1 -1
  167. package/dist/web/src/nanotdf/models/ResourceLocator.js +1 -1
  168. package/dist/web/src/nanotdf/models/Signature.js +1 -1
  169. package/dist/web/src/nanotdf-crypto/ciphers.js +1 -1
  170. package/dist/web/src/nanotdf-crypto/ecdsaSignature.js +1 -1
  171. package/dist/web/src/nanotdf-crypto/generateKeyPair.js +2 -2
  172. package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +2 -2
  173. package/dist/web/src/nanotdf-crypto/index.js +3 -4
  174. package/dist/web/src/nanotdf-crypto/keyAgreement.js +9 -6
  175. package/dist/web/src/nanotdf-crypto/pemPublicToCrypto.js +1 -1
  176. package/dist/web/src/opentdf.js +234 -0
  177. package/dist/web/src/policy/api.js +1 -1
  178. package/dist/web/src/policy/granter.js +1 -1
  179. package/dist/web/src/seekable.js +148 -0
  180. package/dist/web/src/tdf/AttributeObject.js +1 -2
  181. package/dist/web/src/tdf/Policy.js +1 -2
  182. package/dist/web/src/utils.js +2 -3
  183. package/dist/web/src/version.js +5 -1
  184. package/dist/web/tdf3/index.js +3 -2
  185. package/dist/web/tdf3/src/assertions.js +21 -6
  186. package/dist/web/tdf3/src/binary.js +1 -1
  187. package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +1 -1
  188. package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +1 -1
  189. package/dist/web/tdf3/src/client/DecoratedReadableStream.js +4 -68
  190. package/dist/web/tdf3/src/client/builders.js +26 -22
  191. package/dist/web/tdf3/src/client/index.js +69 -52
  192. package/dist/web/tdf3/src/client/validation.js +1 -1
  193. package/dist/web/tdf3/src/crypto/crypto-utils.js +1 -1
  194. package/dist/web/tdf3/src/crypto/index.js +1 -1
  195. package/dist/web/tdf3/src/index.js +2 -2
  196. package/dist/web/tdf3/src/models/attribute-set.js +1 -1
  197. package/dist/web/tdf3/src/models/encryption-information.js +3 -3
  198. package/dist/web/tdf3/src/models/key-access.js +47 -24
  199. package/dist/web/tdf3/src/models/policy.js +1 -1
  200. package/dist/web/tdf3/src/tdf.js +149 -130
  201. package/dist/web/tdf3/src/utils/buffer-crc32.js +1 -1
  202. package/dist/web/tdf3/src/utils/index.js +1 -5
  203. package/dist/web/tdf3/src/utils/keysplit.js +1 -1
  204. package/dist/web/tdf3/src/utils/unwrap.js +18 -0
  205. package/dist/web/tdf3/src/utils/zip-reader.js +1 -1
  206. package/dist/web/tdf3/src/utils/zip-writer.js +1 -1
  207. package/package.json +45 -42
  208. package/src/access.ts +37 -1
  209. package/src/index.ts +5 -435
  210. package/src/nanoclients.ts +405 -0
  211. package/src/nanoindex.ts +4 -0
  212. package/src/nanotdf-crypto/generateKeyPair.ts +1 -1
  213. package/src/nanotdf-crypto/generateRandomNumber.ts +1 -1
  214. package/src/nanotdf-crypto/index.ts +2 -3
  215. package/src/nanotdf-crypto/keyAgreement.ts +14 -7
  216. package/src/opentdf.ts +441 -0
  217. package/{tdf3/src/utils/chunkers.ts → src/seekable.ts} +69 -20
  218. package/src/tdf/AttributeObject.ts +0 -3
  219. package/src/tdf/Policy.ts +0 -1
  220. package/src/tdf/PolicyObject.ts +0 -1
  221. package/src/utils.ts +1 -3
  222. package/src/version.ts +5 -0
  223. package/tdf3/index.ts +14 -2
  224. package/tdf3/src/assertions.ts +33 -8
  225. package/tdf3/src/client/DecoratedReadableStream.ts +2 -78
  226. package/tdf3/src/client/builders.ts +44 -26
  227. package/tdf3/src/client/index.ts +101 -86
  228. package/tdf3/src/index.ts +1 -1
  229. package/tdf3/src/models/encryption-information.ts +2 -2
  230. package/tdf3/src/models/key-access.ts +120 -38
  231. package/tdf3/src/models/manifest.ts +3 -0
  232. package/tdf3/src/models/policy.ts +0 -1
  233. package/tdf3/src/tdf.ts +251 -207
  234. package/tdf3/src/utils/index.ts +0 -5
  235. package/tdf3/src/utils/unwrap.ts +17 -0
  236. package/tdf3/src/utils/zip-reader.ts +1 -1
  237. package/dist/cjs/src/nanotdf-crypto/importRawKey.js +0 -18
  238. package/dist/cjs/tdf3/src/templates/default.html.js +0 -98
  239. package/dist/cjs/tdf3/src/templates/escaper.js +0 -15
  240. package/dist/cjs/tdf3/src/templates/index.js +0 -12
  241. package/dist/cjs/tdf3/src/utils/chunkers.js +0 -114
  242. package/dist/cjs/tdf3/src/version.js +0 -6
  243. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts +0 -13
  244. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts.map +0 -1
  245. package/dist/types/tdf3/src/templates/default.html.d.ts +0 -8
  246. package/dist/types/tdf3/src/templates/default.html.d.ts.map +0 -1
  247. package/dist/types/tdf3/src/templates/escaper.d.ts +0 -6
  248. package/dist/types/tdf3/src/templates/escaper.d.ts.map +0 -1
  249. package/dist/types/tdf3/src/templates/index.d.ts +0 -3
  250. package/dist/types/tdf3/src/templates/index.d.ts.map +0 -1
  251. package/dist/types/tdf3/src/utils/chunkers.d.ts +0 -29
  252. package/dist/types/tdf3/src/utils/chunkers.d.ts.map +0 -1
  253. package/dist/types/tdf3/src/version.d.ts +0 -3
  254. package/dist/types/tdf3/src/version.d.ts.map +0 -1
  255. package/dist/web/src/nanotdf-crypto/importRawKey.js +0 -15
  256. package/dist/web/tdf3/src/templates/default.html.js +0 -96
  257. package/dist/web/tdf3/src/templates/escaper.js +0 -10
  258. package/dist/web/tdf3/src/templates/index.js +0 -3
  259. package/dist/web/tdf3/src/utils/chunkers.js +0 -107
  260. package/dist/web/tdf3/src/version.js +0 -3
  261. package/src/nanotdf-crypto/importRawKey.ts +0 -19
  262. package/tdf3/src/templates/default.html.ts +0 -105
  263. package/tdf3/src/templates/escaper.ts +0 -10
  264. package/tdf3/src/templates/index.ts +0 -2
  265. package/tdf3/src/version.ts +0 -2
@@ -1,311 +1,7 @@
1
- import { Client, NanoTDF, encrypt, decrypt, encryptDataset, getHkdfSalt, DefaultParams, } from './nanotdf/index.js';
2
- import { keyAgreement } from './nanotdf-crypto/index.js';
3
- import { Policy } from './tdf/Policy.js';
4
- import { createAttribute } from './tdf/AttributeObject.js';
5
- import { fetchECKasPubKey } from './access.js';
6
- import { ConfigurationError } from './errors.js';
7
- export { attributeFQNsAsValues } from './policy/api.js';
8
- // Define default options
9
- const defaultOptions = {
10
- ecdsaBinding: false,
11
- };
12
- /**
13
- * NanoTDF SDK Client
14
- *
15
- * @example
16
- * ```
17
- * import { clientSecretAuthProvider, NanoTDFClient } from '@opentdf/sdk';
18
- *
19
- * const OIDC_ENDPOINT = 'http://localhost:65432/auth/realms/opentdf-demo';
20
- * const KAS_URL = 'http://localhost:65432/api/kas/';
21
- *
22
- * const ciphertext = '...';
23
- * const client = new NanoTDFClient({
24
- * authProvider: await clientSecretAuthProvider({
25
- * clientId: 'tdf-client',
26
- * clientSecret: '123-456',
27
- * oidcOrigin: OIDC_ENDPOINT,
28
- * }),
29
- * kasEndpoint: KAS_URL
30
- * }
31
- * );
32
- * client.decrypt(ciphertext)
33
- * .then(plaintext => {
34
- * console.log('Plaintext', plaintext);
35
- * })
36
- * .catch(err => {
37
- * console.error('Some error occurred', err);
38
- * })
39
- */
40
- export class NanoTDFClient extends Client {
41
- /**
42
- * Decrypt ciphertext
43
- *
44
- * Pass a base64 string, TypedArray, or ArrayBuffer ciphertext and get a promise which resolves plaintext
45
- *
46
- * @param ciphertext Ciphertext to decrypt
47
- */
48
- async decrypt(ciphertext) {
49
- // Parse ciphertext
50
- const nanotdf = NanoTDF.from(ciphertext);
51
- // TODO: The version number should be fetched from the API
52
- const version = '0.0.1';
53
- const kasUrl = nanotdf.header.getKasRewrapUrl();
54
- // Rewrap key on every request
55
- const ukey = await this.rewrapKey(nanotdf.header.toBuffer(), kasUrl, nanotdf.header.magicNumberVersion, version);
56
- if (!ukey) {
57
- throw new Error('internal: key rewrap failure');
58
- }
59
- // Return decrypt promise
60
- return decrypt(ukey, nanotdf);
61
- }
62
- /**
63
- * Decrypt ciphertext of the legacy TDF, with the older, smaller i.v. calculation.
64
- *
65
- * Pass a base64 string, TypedArray, or ArrayBuffer ciphertext and get a promise which resolves plaintext
66
- *
67
- * @param ciphertext Ciphertext to decrypt
68
- */
69
- async decryptLegacyTDF(ciphertext) {
70
- // Parse ciphertext
71
- const nanotdf = NanoTDF.from(ciphertext, undefined, true);
72
- const legacyVersion = '0.0.0';
73
- // Rewrap key on every request
74
- const key = await this.rewrapKey(nanotdf.header.toBuffer(), nanotdf.header.getKasRewrapUrl(), nanotdf.header.magicNumberVersion, legacyVersion);
75
- if (!key) {
76
- throw new Error('internal: failed unwrap');
77
- }
78
- // Return decrypt promise
79
- return decrypt(key, nanotdf);
80
- }
81
- /**
82
- * Encrypts the given data using the NanoTDF encryption scheme.
83
- *
84
- * @param {string | TypedArray | ArrayBuffer} data - The data to be encrypted.
85
- * @param {EncryptOptions} [options=defaultOptions] - The encryption options (currently unused).
86
- * @returns {Promise<ArrayBuffer>} A promise that resolves to the encrypted data as an ArrayBuffer.
87
- * @throws {Error} If the initialization vector is not a number.
88
- */
89
- async encrypt(data, options) {
90
- // For encrypt always generate the client ephemeralKeyPair
91
- const ephemeralKeyPair = await this.ephemeralKeyPair;
92
- const initializationVector = this.iv;
93
- if (typeof initializationVector !== 'number') {
94
- throw new ConfigurationError('NanoTDF clients are single use. Please generate a new client and keypair.');
95
- }
96
- delete this.iv;
97
- if (!this.kasPubKey) {
98
- this.kasPubKey = await fetchECKasPubKey(this.kasUrl);
99
- }
100
- // Create a policy for the tdf
101
- const policy = new Policy();
102
- // Add data attributes.
103
- for (const dataAttribute of this.dataAttributes) {
104
- const attribute = await createAttribute(dataAttribute, this.kasPubKey, this.kasUrl);
105
- policy.addAttribute(attribute);
106
- }
107
- if (this.dissems.length == 0 && this.dataAttributes.length == 0) {
108
- console.warn('This policy has an empty attributes list and an empty dissemination list. This will allow any entity with a valid Entity Object to access this TDF.');
109
- }
110
- // Encrypt the policy.
111
- const policyObjectAsStr = policy.toJSON();
112
- // IV is always '1', since the new keypair is generated on encrypt
113
- // using the same key is fine.
114
- const lengthAsUint32 = new Uint32Array(1);
115
- lengthAsUint32[0] = initializationVector;
116
- const lengthAsUint24 = new Uint8Array(lengthAsUint32.buffer);
117
- // NOTE: We are only interested in only first 3 bytes.
118
- const payloadIV = new Uint8Array(12).fill(0);
119
- payloadIV[9] = lengthAsUint24[2];
120
- payloadIV[10] = lengthAsUint24[1];
121
- payloadIV[11] = lengthAsUint24[0];
122
- const mergedOptions = { ...defaultOptions, ...options };
123
- return encrypt(policyObjectAsStr, this.kasPubKey, ephemeralKeyPair, payloadIV, data, mergedOptions.ecdsaBinding);
124
- }
125
- }
126
- /**
127
- * NanoTDF Dataset SDK Client
128
- *
129
- *
130
- * @example
131
- * ```
132
- * import { clientSecretAuthProvider, NanoTDFDatasetClient } from '@opentdf/sdk';
133
- *
134
- * const OIDC_ENDPOINT = 'http://localhost:65432/auth/realms/tdf';
135
- * const KAS_URL = 'http://localhost:65432/api/kas/';
136
- *
137
- * const ciphertext = '...';
138
- * const client = new NanoTDFDatasetClient({
139
- * authProvider: await clientSecretAuthProvider({
140
- * clientId: 'tdf-client',
141
- * clientSecret: '123-456',
142
- * exchange: 'client',
143
- * oidcOrigin: OIDC_ENDPOINT,
144
- * }),
145
- * kasEndpoint: KAS_URL,
146
- * });
147
- * const plaintext = client.decrypt(ciphertext);
148
- * console.log('Plaintext', plaintext);
149
- * ```
150
- */
151
- export class NanoTDFDatasetClient extends Client {
152
- /**
153
- * Create new NanoTDF Dataset Client
154
- *
155
- * The Ephemeral Key Pair can either be provided or will be generate when fetching the entity object. Once set it
156
- * cannot be changed. If a new ephemeral key is desired it a new client should be initialized.
157
- * There is no performance impact for creating a new client IFF the ephemeral key pair is provided.
158
- *
159
- * @param clientConfig OIDC client credentials
160
- * @param kasUrl Key access service URL
161
- * @param ephemeralKeyPair (optional) ephemeral key pair to use
162
- * @param maxKeyIterations Max iteration to performe without a key rotation
163
- */
164
- constructor(opts) {
165
- if (opts.maxKeyIterations &&
166
- opts.maxKeyIterations > NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS) {
167
- throw new ConfigurationError(`key iteration exceeds max iterations(${NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS})`);
168
- }
169
- super(opts);
170
- this.maxKeyIteration = opts.maxKeyIterations || NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS;
171
- this.keyIterationCount = 0;
172
- }
173
- /**
174
- * Encrypt data
175
- *
176
- * Pass a string, TypedArray, or ArrayBuffer data and get a promise which resolves ciphertext
177
- *
178
- * @param data to decrypt
179
- */
180
- async encrypt(data, options) {
181
- // Intial encrypt
182
- if (this.keyIterationCount == 0) {
183
- const mergedOptions = { ...defaultOptions, ...options };
184
- this.ecdsaBinding = mergedOptions.ecdsaBinding;
185
- // For encrypt always generate the client ephemeralKeyPair
186
- const ephemeralKeyPair = await this.ephemeralKeyPair;
187
- if (!this.kasPubKey) {
188
- this.kasPubKey = await fetchECKasPubKey(this.kasUrl);
189
- }
190
- // Create a policy for the tdf
191
- const policy = new Policy();
192
- // Add data attributes.
193
- for (const dataAttribute of this.dataAttributes) {
194
- const attribute = await createAttribute(dataAttribute, this.kasPubKey, this.kasUrl);
195
- policy.addAttribute(attribute);
196
- }
197
- if (this.dissems.length == 0 || this.dataAttributes.length == 0) {
198
- console.warn('This policy has an empty attributes list and an empty dissemination list. This will allow any entity with a valid Entity Object to access this TDF.');
199
- }
200
- // Encrypt the policy.
201
- const policyObjectAsStr = policy.toJSON();
202
- const ivVector = this.generateIV();
203
- // Generate a symmetric key.
204
- this.symmetricKey = await keyAgreement(ephemeralKeyPair.privateKey, await this.kasPubKey.key, await getHkdfSalt(DefaultParams.magicNumberVersion));
205
- const nanoTDFBuffer = await encrypt(policyObjectAsStr, this.kasPubKey, ephemeralKeyPair, ivVector, data, this.ecdsaBinding);
206
- // Cache the header and increment the key iteration
207
- if (!this.cachedHeader) {
208
- const nanoTDF = NanoTDF.from(nanoTDFBuffer);
209
- this.cachedHeader = nanoTDF.header;
210
- }
211
- this.keyIterationCount += 1;
212
- return nanoTDFBuffer;
213
- }
214
- this.keyIterationCount += 1;
215
- if (!this.cachedHeader) {
216
- throw new ConfigurationError('invalid dataset client: empty nanoTDF header');
217
- }
218
- if (!this.symmetricKey) {
219
- throw new ConfigurationError('invalid dataset client: empty dek');
220
- }
221
- this.keyIterationCount += 1;
222
- if (this.keyIterationCount == this.maxKeyIteration) {
223
- // reset the key iteration
224
- this.keyIterationCount = 0;
225
- }
226
- const ivVector = this.generateIV();
227
- return encryptDataset(this.symmetricKey, this.cachedHeader, ivVector, data);
228
- }
229
- /**
230
- * Decrypt ciphertext
231
- *
232
- * Pass a base64 string, TypedArray, or ArrayBuffer ciphertext and get a promise which resolves plaintext
233
- *
234
- * @param ciphertext Ciphertext to decrypt
235
- */
236
- async decrypt(ciphertext) {
237
- // Parse ciphertext
238
- const nanotdf = NanoTDF.from(ciphertext);
239
- if (!this.cachedEphemeralKey) {
240
- // First decrypt
241
- return this.rewrapAndDecrypt(nanotdf);
242
- }
243
- // Other encrypts
244
- if (this.cachedEphemeralKey.toString() == nanotdf.header.ephemeralPublicKey.toString()) {
245
- const ukey = this.unwrappedKey;
246
- if (!ukey) {
247
- // These should have thrown already.
248
- throw new Error('internal: key rewrap failure');
249
- }
250
- // Return decrypt promise
251
- return decrypt(ukey, nanotdf);
252
- }
253
- else {
254
- return this.rewrapAndDecrypt(nanotdf);
255
- }
256
- }
257
- async rewrapAndDecrypt(nanotdf) {
258
- // TODO: The version number should be fetched from the API
259
- const version = '0.0.1';
260
- // Rewrap key on every request
261
- const ukey = await this.rewrapKey(nanotdf.header.toBuffer(), nanotdf.header.getKasRewrapUrl(), nanotdf.header.magicNumberVersion, version);
262
- if (!ukey) {
263
- // These should have thrown already.
264
- throw new Error('internal: key rewrap failure');
265
- }
266
- this.cachedEphemeralKey = nanotdf.header.ephemeralPublicKey;
267
- this.unwrappedKey = ukey;
268
- // Return decrypt promise
269
- return decrypt(ukey, nanotdf);
270
- }
271
- generateIV() {
272
- const iv = this.iv;
273
- if (iv === undefined) {
274
- // iv has passed the maximum iteration count for this dek
275
- throw new ConfigurationError('dataset full');
276
- }
277
- // assert iv ∈ ℤ ∩ (0, 2^24)
278
- if (!Number.isInteger(iv) || iv <= 0 || 16777215 < iv) {
279
- // Something has fiddled with the iv outside of the expected behavior
280
- // could indicate a race condition, e.g. if two workers or handlers are
281
- // processing the file at once, for example.
282
- throw new Error('internal: invalid state');
283
- }
284
- const lengthAsUint32 = new Uint32Array(1);
285
- lengthAsUint32[0] = iv;
286
- const lengthAsUint24 = new Uint8Array(lengthAsUint32.buffer);
287
- // NOTE: We are only interested in only first 3 bytes.
288
- const ivVector = new Uint8Array(Client.IV_SIZE).fill(0);
289
- ivVector[9] = lengthAsUint24[2];
290
- ivVector[10] = lengthAsUint24[1];
291
- ivVector[11] = lengthAsUint24[0];
292
- // Increment the IV
293
- if (iv == 16777215) {
294
- delete this.iv;
295
- }
296
- else {
297
- this.iv = iv + 1;
298
- }
299
- return ivVector;
300
- }
301
- }
302
- // Total unique IVs(2^24 -1) used for encrypting the nano tdf payloads
303
- // IV starts from 1 since the 0 IV is reserved for policy encryption
304
- NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS = 8388606;
305
- /**
306
- * Authorization for connecting authZ tokens to
307
- * remote requests.
308
- */
1
+ export { HttpRequest, withHeaders } from './auth/auth.js';
309
2
  export * as AuthProviders from './auth/providers.js';
310
- export { version, clientType } from './version.js';
311
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,MAAM,EACN,OAAO,EAEP,OAAO,EACP,OAAO,EACP,cAAc,EACd,WAAW,EACX,aAAa,GACd,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AAEzC,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAC3D,OAAO,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AAE/C,OAAO,EAAE,kBAAkB,EAAE,MAAM,aAAa,CAAC;AACjD,OAAO,EAAE,qBAAqB,EAAE,MAAM,iBAAiB,CAAC;AAOxD,yBAAyB;AACzB,MAAM,cAAc,GAAmB;IACrC,YAAY,EAAE,KAAK;CACpB,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAM,OAAO,aAAc,SAAQ,MAAM;IACvC;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CAAC,UAA6C;QACzD,mBAAmB;QACnB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAEzC,0DAA0D;QAC1D,MAAM,OAAO,GAAG,OAAO,CAAC;QACxB,MAAM,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,eAAe,EAAE,CAAC;QAEhD,8BAA8B;QAC9B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAC/B,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EACzB,MAAM,EACN,OAAO,CAAC,MAAM,CAAC,kBAAkB,EACjC,OAAO,CACR,CAAC;QAEF,IAAI,CAAC,IAAI,EAAE;YACT,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;SACjD;QACD,yBAAyB;QACzB,OAAO,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;IAChC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,gBAAgB,CAAC,UAA6C;QAClE,mBAAmB;QACnB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,UAAU,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC;QAC1D,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,8BAA8B;QAC9B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,SAAS,CAC9B,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EACzB,OAAO,CAAC,MAAM,CAAC,eAAe,EAAE,EAChC,OAAO,CAAC,MAAM,CAAC,kBAAkB,EACjC,aAAa,CACd,CAAC;QAEF,IAAI,CAAC,GAAG,EAAE;YACR,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;SAC5C;QACD,yBAAyB;QACzB,OAAO,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;OAOG;IACH,KAAK,CAAC,OAAO,CACX,IAAuC,EACvC,OAAwB;QAExB,0DAA0D;QAC1D,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC;QACrD,MAAM,oBAAoB,GAAG,IAAI,CAAC,EAAE,CAAC;QAErC,IAAI,OAAO,oBAAoB,KAAK,QAAQ,EAAE;YAC5C,MAAM,IAAI,kBAAkB,CAC1B,2EAA2E,CAC5E,CAAC;SACH;QACD,OAAO,IAAI,CAAC,EAAE,CAAC;QAEf,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE;YACnB,IAAI,CAAC,SAAS,GAAG,MAAM,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;SACtD;QAED,8BAA8B;QAC9B,MAAM,MAAM,GAAG,IAAI,MAAM,EAAE,CAAC;QAE5B,uBAAuB;QACvB,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,cAAc,EAAE;YAC/C,MAAM,SAAS,GAAG,MAAM,eAAe,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;YACpF,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;SAChC;QAED,IAAI,IAAI,CAAC,OAAO,CAAC,MAAM,IAAI,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,IAAI,CAAC,EAAE;YAC/D,OAAO,CAAC,IAAI,CACV,qJAAqJ,CACtJ,CAAC;SACH;QAED,sBAAsB;QACtB,MAAM,iBAAiB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;QAE1C,kEAAkE;QAClE,8BAA8B;QAC9B,MAAM,cAAc,GAAG,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC;QAC1C,cAAc,CAAC,CAAC,CAAC,GAAG,oBAAoB,CAAC;QAEzC,MAAM,cAAc,GAAG,IAAI,UAAU,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAE7D,sDAAsD;QACtD,MAAM,SAAS,GAAG,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAC7C,SAAS,CAAC,CAAC,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QACjC,SAAS,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAClC,SAAS,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAElC,MAAM,aAAa,GAAmB,EAAE,GAAG,cAAc,EAAE,GAAG,OAAO,EAAE,CAAC;QACxE,OAAO,OAAO,CACZ,iBAAiB,EACjB,IAAI,CAAC,SAAS,EACd,gBAAgB,EAChB,SAAS,EACT,IAAI,EACJ,aAAa,CAAC,YAAY,CAC3B,CAAC;IACJ,CAAC;CACF;AAMD;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAM,OAAO,oBAAqB,SAAQ,MAAM;IAa9C;;;;;;;;;;;OAWG;IACH,YAAY,IAAmB;QAC7B,IACE,IAAI,CAAC,gBAAgB;YACrB,IAAI,CAAC,gBAAgB,GAAG,oBAAoB,CAAC,uBAAuB,EACpE;YACA,MAAM,IAAI,kBAAkB,CAC1B,wCAAwC,oBAAoB,CAAC,uBAAuB,GAAG,CACxF,CAAC;SACH;QACD,KAAK,CAAC,IAAI,CAAC,CAAC;QAEZ,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,gBAAgB,IAAI,oBAAoB,CAAC,uBAAuB,CAAC;QAC7F,IAAI,CAAC,iBAAiB,GAAG,CAAC,CAAC;IAC7B,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,IAAuC,EACvC,OAAwB;QAExB,iBAAiB;QACjB,IAAI,IAAI,CAAC,iBAAiB,IAAI,CAAC,EAAE;YAC/B,MAAM,aAAa,GAAmB,EAAE,GAAG,cAAc,EAAE,GAAG,OAAO,EAAE,CAAC;YACxE,IAAI,CAAC,YAAY,GAAG,aAAa,CAAC,YAAY,CAAC;YAC/C,0DAA0D;YAC1D,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC;YAErD,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE;gBACnB,IAAI,CAAC,SAAS,GAAG,MAAM,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;aACtD;YAED,8BAA8B;YAC9B,MAAM,MAAM,GAAG,IAAI,MAAM,EAAE,CAAC;YAE5B,uBAAuB;YACvB,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,cAAc,EAAE;gBAC/C,MAAM,SAAS,GAAG,MAAM,eAAe,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;gBACpF,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;aAChC;YAED,IAAI,IAAI,CAAC,OAAO,CAAC,MAAM,IAAI,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,IAAI,CAAC,EAAE;gBAC/D,OAAO,CAAC,IAAI,CACV,qJAAqJ,CACtJ,CAAC;aACH;YAED,sBAAsB;YACtB,MAAM,iBAAiB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;YAE1C,MAAM,QAAQ,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;YAEnC,4BAA4B;YAC5B,IAAI,CAAC,YAAY,GAAG,MAAM,YAAY,CACpC,gBAAgB,CAAC,UAAU,EAC3B,MAAM,IAAI,CAAC,SAAS,CAAC,GAAG,EACxB,MAAM,WAAW,CAAC,aAAa,CAAC,kBAAkB,CAAC,CACpD,CAAC;YAEF,MAAM,aAAa,GAAG,MAAM,OAAO,CACjC,iBAAiB,EACjB,IAAI,CAAC,SAAS,EACd,gBAAgB,EAChB,QAAQ,EACR,IAAI,EACJ,IAAI,CAAC,YAAY,CAClB,CAAC;YAEF,mDAAmD;YACnD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;gBACtB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBAC5C,IAAI,CAAC,YAAY,GAAG,OAAO,CAAC,MAAM,CAAC;aACpC;YAED,IAAI,CAAC,iBAAiB,IAAI,CAAC,CAAC;YAE5B,OAAO,aAAa,CAAC;SACtB;QAED,IAAI,CAAC,iBAAiB,IAAI,CAAC,CAAC;QAE5B,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,kBAAkB,CAAC,8CAA8C,CAAC,CAAC;SAC9E;QACD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,kBAAkB,CAAC,mCAAmC,CAAC,CAAC;SACnE;QAED,IAAI,CAAC,iBAAiB,IAAI,CAAC,CAAC;QAC5B,IAAI,IAAI,CAAC,iBAAiB,IAAI,IAAI,CAAC,eAAe,EAAE;YAClD,0BAA0B;YAC1B,IAAI,CAAC,iBAAiB,GAAG,CAAC,CAAC;SAC5B;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAEnC,OAAO,cAAc,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,CAAC,YAAY,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CAAC,UAA6C;QACzD,mBAAmB;QACnB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAEzC,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE;YAC5B,gBAAgB;YAChB,OAAO,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC;SACvC;QAED,iBAAiB;QACjB,IAAI,IAAI,CAAC,kBAAkB,CAAC,QAAQ,EAAE,IAAI,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC,QAAQ,EAAE,EAAE;YACtF,MAAM,IAAI,GAAG,IAAI,CAAC,YAAY,CAAC;YAC/B,IAAI,CAAC,IAAI,EAAE;gBACT,oCAAoC;gBACpC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;aACjD;YACD,yBAAyB;YACzB,OAAO,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;SAC/B;aAAM;YACL,OAAO,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC;SACvC;IACH,CAAC;IAED,KAAK,CAAC,gBAAgB,CAAC,OAAgB;QACrC,0DAA0D;QAC1D,MAAM,OAAO,GAAG,OAAO,CAAC;QACxB,8BAA8B;QAC9B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAC/B,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EACzB,OAAO,CAAC,MAAM,CAAC,eAAe,EAAE,EAChC,OAAO,CAAC,MAAM,CAAC,kBAAkB,EACjC,OAAO,CACR,CAAC;QACF,IAAI,CAAC,IAAI,EAAE;YACT,oCAAoC;YACpC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;SACjD;QAED,IAAI,CAAC,kBAAkB,GAAG,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC;QAC5D,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;QAEzB,yBAAyB;QACzB,OAAO,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;IAChC,CAAC;IAED,UAAU;QACR,MAAM,EAAE,GAAG,IAAI,CAAC,EAAE,CAAC;QACnB,IAAI,EAAE,KAAK,SAAS,EAAE;YACpB,yDAAyD;YACzD,MAAM,IAAI,kBAAkB,CAAC,cAAc,CAAC,CAAC;SAC9C;QACD,4BAA4B;QAC5B,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,QAAS,GAAG,EAAE,EAAE;YACtD,qEAAqE;YACrE,uEAAuE;YACvE,4CAA4C;YAC5C,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;SAC5C;QAED,MAAM,cAAc,GAAG,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC;QAC1C,cAAc,CAAC,CAAC,CAAC,GAAG,EAAE,CAAC;QAEvB,MAAM,cAAc,GAAG,IAAI,UAAU,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAE7D,sDAAsD;QACtD,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACxD,QAAQ,CAAC,CAAC,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAChC,QAAQ,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QACjC,QAAQ,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAEjC,mBAAmB;QACnB,IAAI,EAAE,IAAI,QAAS,EAAE;YACnB,OAAO,IAAI,CAAC,EAAE,CAAC;SAChB;aAAM;YACL,IAAI,CAAC,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC;SAClB;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;;AArND,sEAAsE;AACtE,oEAAoE;AACpD,4CAAuB,GAAG,OAAO,CAAC;AAsNpD;;;GAGG;AACH,OAAO,KAAK,aAAa,MAAM,qBAAqB,CAAC;AACrD,OAAO,EAAE,OAAO,EAAE,UAAU,EAAE,MAAM,cAAc,CAAC"}
3
+ export { attributeFQNsAsValues } from './policy/api.js';
4
+ export { version, clientType, tdfSpecVersion } from './version.js';
5
+ export * from './opentdf.js';
6
+ export * from './seekable.js';
7
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFzQyxXQUFXLEVBQUUsV0FBVyxFQUFFLE1BQU0sZ0JBQWdCLENBQUM7QUFDOUYsT0FBTyxLQUFLLGFBQWEsTUFBTSxxQkFBcUIsQ0FBQztBQUNyRCxPQUFPLEVBQUUscUJBQXFCLEVBQUUsTUFBTSxpQkFBaUIsQ0FBQztBQUN4RCxPQUFPLEVBQUUsT0FBTyxFQUFFLFVBQVUsRUFBRSxjQUFjLEVBQUUsTUFBTSxjQUFjLENBQUM7QUFDbkUsY0FBYyxjQUFjLENBQUM7QUFDN0IsY0FBYyxlQUFlLENBQUMifQ==
@@ -0,0 +1,280 @@
1
+ import { Client, NanoTDF, encrypt, decrypt, encryptDataset, getHkdfSalt, DefaultParams, } from './nanotdf/index.js';
2
+ import { keyAgreement } from './nanotdf-crypto/index.js';
3
+ import { Policy } from './tdf/Policy.js';
4
+ import { createAttribute } from './tdf/AttributeObject.js';
5
+ import { fetchECKasPubKey } from './access.js';
6
+ import { ConfigurationError } from './errors.js';
7
+ // Define default options
8
+ const defaultOptions = {
9
+ ecdsaBinding: false,
10
+ };
11
+ /**
12
+ * NanoTDF SDK Client. Deprecated in favor of OpenTDF.
13
+ *
14
+ */
15
+ export class NanoTDFClient extends Client {
16
+ /**
17
+ * Decrypt ciphertext
18
+ *
19
+ * Pass a base64 string, TypedArray, or ArrayBuffer ciphertext and get a promise which resolves plaintext
20
+ *
21
+ * @param ciphertext Ciphertext to decrypt
22
+ */
23
+ async decrypt(ciphertext) {
24
+ // Parse ciphertext
25
+ const nanotdf = NanoTDF.from(ciphertext);
26
+ // TODO: The version number should be fetched from the API
27
+ const version = '0.0.1';
28
+ const kasUrl = nanotdf.header.getKasRewrapUrl();
29
+ // Rewrap key on every request
30
+ const ukey = await this.rewrapKey(nanotdf.header.toBuffer(), kasUrl, nanotdf.header.magicNumberVersion, version);
31
+ if (!ukey) {
32
+ throw new Error('internal: key rewrap failure');
33
+ }
34
+ // Return decrypt promise
35
+ return decrypt(ukey, nanotdf);
36
+ }
37
+ /**
38
+ * Decrypt ciphertext of the legacy TDF, with the older, smaller i.v. calculation.
39
+ *
40
+ * Pass a base64 string, TypedArray, or ArrayBuffer ciphertext and get a promise which resolves plaintext
41
+ *
42
+ * @param ciphertext Ciphertext to decrypt
43
+ */
44
+ async decryptLegacyTDF(ciphertext) {
45
+ // Parse ciphertext
46
+ const nanotdf = NanoTDF.from(ciphertext, undefined, true);
47
+ const legacyVersion = '0.0.0';
48
+ // Rewrap key on every request
49
+ const key = await this.rewrapKey(nanotdf.header.toBuffer(), nanotdf.header.getKasRewrapUrl(), nanotdf.header.magicNumberVersion, legacyVersion);
50
+ if (!key) {
51
+ throw new Error('internal: failed unwrap');
52
+ }
53
+ // Return decrypt promise
54
+ return decrypt(key, nanotdf);
55
+ }
56
+ /**
57
+ * Encrypts the given data using the NanoTDF encryption scheme.
58
+ *
59
+ * @param {string | TypedArray | ArrayBuffer} data - The data to be encrypted.
60
+ * @param {EncryptOptions} [options=defaultOptions] - The encryption options (currently unused).
61
+ * @returns {Promise<ArrayBuffer>} A promise that resolves to the encrypted data as an ArrayBuffer.
62
+ * @throws {Error} If the initialization vector is not a number.
63
+ */
64
+ async encrypt(data, options) {
65
+ // For encrypt always generate the client ephemeralKeyPair
66
+ const ephemeralKeyPair = await this.ephemeralKeyPair;
67
+ const initializationVector = this.iv;
68
+ if (typeof initializationVector !== 'number') {
69
+ throw new ConfigurationError('NanoTDF clients are single use. Please generate a new client and keypair.');
70
+ }
71
+ delete this.iv;
72
+ if (!this.kasPubKey) {
73
+ this.kasPubKey = await fetchECKasPubKey(this.kasUrl);
74
+ }
75
+ // Create a policy for the tdf
76
+ const policy = new Policy();
77
+ // Add data attributes.
78
+ for (const dataAttribute of this.dataAttributes) {
79
+ const attribute = await createAttribute(dataAttribute, this.kasPubKey, this.kasUrl);
80
+ policy.addAttribute(attribute);
81
+ }
82
+ if (this.dissems.length == 0 && this.dataAttributes.length == 0) {
83
+ console.warn('This policy has an empty attributes list and an empty dissemination list. This will allow any entity with a valid Entity Object to access this TDF.');
84
+ }
85
+ // Encrypt the policy.
86
+ const policyObjectAsStr = policy.toJSON();
87
+ // IV is always '1', since the new keypair is generated on encrypt
88
+ // using the same key is fine.
89
+ const lengthAsUint32 = new Uint32Array(1);
90
+ lengthAsUint32[0] = initializationVector;
91
+ const lengthAsUint24 = new Uint8Array(lengthAsUint32.buffer);
92
+ // NOTE: We are only interested in only first 3 bytes.
93
+ const payloadIV = new Uint8Array(12).fill(0);
94
+ payloadIV[9] = lengthAsUint24[2];
95
+ payloadIV[10] = lengthAsUint24[1];
96
+ payloadIV[11] = lengthAsUint24[0];
97
+ const mergedOptions = { ...defaultOptions, ...options };
98
+ return encrypt(policyObjectAsStr, this.kasPubKey, ephemeralKeyPair, payloadIV, data, mergedOptions.ecdsaBinding);
99
+ }
100
+ }
101
+ /**
102
+ * NanoTDF Dataset SDK Client
103
+ *
104
+ *
105
+ * @example
106
+ * ```
107
+ * import { clientSecretAuthProvider, NanoTDFDatasetClient } from '@opentdf/sdk';
108
+ *
109
+ * const OIDC_ENDPOINT = 'http://localhost:65432/auth/realms/opentdf';
110
+ * const KAS_URL = 'http://localhost:65432/api/kas/';
111
+ *
112
+ * const ciphertext = '...';
113
+ * const client = new NanoTDFDatasetClient({
114
+ * authProvider: await clientSecretAuthProvider({
115
+ * clientId: 'tdf-client',
116
+ * clientSecret: '123-456',
117
+ * exchange: 'client',
118
+ * oidcOrigin: OIDC_ENDPOINT,
119
+ * }),
120
+ * kasEndpoint: KAS_URL,
121
+ * });
122
+ * const plaintext = client.decrypt(ciphertext);
123
+ * console.log('Plaintext', plaintext);
124
+ * ```
125
+ */
126
+ export class NanoTDFDatasetClient extends Client {
127
+ /**
128
+ * Create new NanoTDF Dataset Client
129
+ *
130
+ * The Ephemeral Key Pair can either be provided or will be generate when fetching the entity object. Once set it
131
+ * cannot be changed. If a new ephemeral key is desired it a new client should be initialized.
132
+ * There is no performance impact for creating a new client IFF the ephemeral key pair is provided.
133
+ *
134
+ * @param clientConfig OIDC client credentials
135
+ * @param kasUrl Key access service URL
136
+ * @param ephemeralKeyPair (optional) ephemeral key pair to use
137
+ * @param maxKeyIterations Max iteration to performe without a key rotation
138
+ */
139
+ constructor(opts) {
140
+ if (opts.maxKeyIterations &&
141
+ opts.maxKeyIterations > NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS) {
142
+ throw new ConfigurationError(`key iteration exceeds max iterations(${NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS})`);
143
+ }
144
+ super(opts);
145
+ this.maxKeyIteration = opts.maxKeyIterations || NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS;
146
+ this.keyIterationCount = 0;
147
+ }
148
+ /**
149
+ * Encrypt data
150
+ *
151
+ * Pass a string, TypedArray, or ArrayBuffer data and get a promise which resolves ciphertext
152
+ *
153
+ * @param data to decrypt
154
+ */
155
+ async encrypt(data, options) {
156
+ // Intial encrypt
157
+ if (this.keyIterationCount == 0) {
158
+ const mergedOptions = { ...defaultOptions, ...options };
159
+ this.ecdsaBinding = mergedOptions.ecdsaBinding;
160
+ // For encrypt always generate the client ephemeralKeyPair
161
+ const ephemeralKeyPair = await this.ephemeralKeyPair;
162
+ if (!this.kasPubKey) {
163
+ this.kasPubKey = await fetchECKasPubKey(this.kasUrl);
164
+ }
165
+ // Create a policy for the tdf
166
+ const policy = new Policy();
167
+ // Add data attributes.
168
+ for (const dataAttribute of this.dataAttributes) {
169
+ const attribute = await createAttribute(dataAttribute, this.kasPubKey, this.kasUrl);
170
+ policy.addAttribute(attribute);
171
+ }
172
+ if (this.dissems.length == 0 || this.dataAttributes.length == 0) {
173
+ console.warn('This policy has an empty attributes list and an empty dissemination list. This will allow any entity with a valid Entity Object to access this TDF.');
174
+ }
175
+ // Encrypt the policy.
176
+ const policyObjectAsStr = policy.toJSON();
177
+ const ivVector = this.generateIV();
178
+ // Generate a symmetric key.
179
+ this.symmetricKey = await keyAgreement(ephemeralKeyPair.privateKey, await this.kasPubKey.key, await getHkdfSalt(DefaultParams.magicNumberVersion));
180
+ const nanoTDFBuffer = await encrypt(policyObjectAsStr, this.kasPubKey, ephemeralKeyPair, ivVector, data, this.ecdsaBinding);
181
+ // Cache the header and increment the key iteration
182
+ if (!this.cachedHeader) {
183
+ const nanoTDF = NanoTDF.from(nanoTDFBuffer);
184
+ this.cachedHeader = nanoTDF.header;
185
+ }
186
+ this.keyIterationCount += 1;
187
+ return nanoTDFBuffer;
188
+ }
189
+ this.keyIterationCount += 1;
190
+ if (!this.cachedHeader) {
191
+ throw new ConfigurationError('invalid dataset client: empty nanoTDF header');
192
+ }
193
+ if (!this.symmetricKey) {
194
+ throw new ConfigurationError('invalid dataset client: empty dek');
195
+ }
196
+ this.keyIterationCount += 1;
197
+ if (this.keyIterationCount == this.maxKeyIteration) {
198
+ // reset the key iteration
199
+ this.keyIterationCount = 0;
200
+ }
201
+ const ivVector = this.generateIV();
202
+ return encryptDataset(this.symmetricKey, this.cachedHeader, ivVector, data);
203
+ }
204
+ /**
205
+ * Decrypt ciphertext
206
+ *
207
+ * Pass a base64 string, TypedArray, or ArrayBuffer ciphertext and get a promise which resolves plaintext
208
+ *
209
+ * @param ciphertext Ciphertext to decrypt
210
+ */
211
+ async decrypt(ciphertext) {
212
+ // Parse ciphertext
213
+ const nanotdf = NanoTDF.from(ciphertext);
214
+ if (!this.cachedEphemeralKey) {
215
+ // First decrypt
216
+ return this.rewrapAndDecrypt(nanotdf);
217
+ }
218
+ // Other encrypts
219
+ if (this.cachedEphemeralKey.toString() == nanotdf.header.ephemeralPublicKey.toString()) {
220
+ const ukey = this.unwrappedKey;
221
+ if (!ukey) {
222
+ // These should have thrown already.
223
+ throw new Error('internal: key rewrap failure');
224
+ }
225
+ // Return decrypt promise
226
+ return decrypt(ukey, nanotdf);
227
+ }
228
+ else {
229
+ return this.rewrapAndDecrypt(nanotdf);
230
+ }
231
+ }
232
+ async rewrapAndDecrypt(nanotdf) {
233
+ // TODO: The version number should be fetched from the API
234
+ const version = '0.0.1';
235
+ // Rewrap key on every request
236
+ const ukey = await this.rewrapKey(nanotdf.header.toBuffer(), nanotdf.header.getKasRewrapUrl(), nanotdf.header.magicNumberVersion, version);
237
+ if (!ukey) {
238
+ // These should have thrown already.
239
+ throw new Error('internal: key rewrap failure');
240
+ }
241
+ this.cachedEphemeralKey = nanotdf.header.ephemeralPublicKey;
242
+ this.unwrappedKey = ukey;
243
+ // Return decrypt promise
244
+ return decrypt(ukey, nanotdf);
245
+ }
246
+ generateIV() {
247
+ const iv = this.iv;
248
+ if (iv === undefined) {
249
+ // iv has passed the maximum iteration count for this dek
250
+ throw new ConfigurationError('dataset full');
251
+ }
252
+ // assert iv ∈ ℤ ∩ (0, 2^24)
253
+ if (!Number.isInteger(iv) || iv <= 0 || 0xff_ffff < iv) {
254
+ // Something has fiddled with the iv outside of the expected behavior
255
+ // could indicate a race condition, e.g. if two workers or handlers are
256
+ // processing the file at once, for example.
257
+ throw new Error('internal: invalid state');
258
+ }
259
+ const lengthAsUint32 = new Uint32Array(1);
260
+ lengthAsUint32[0] = iv;
261
+ const lengthAsUint24 = new Uint8Array(lengthAsUint32.buffer);
262
+ // NOTE: We are only interested in only first 3 bytes.
263
+ const ivVector = new Uint8Array(Client.IV_SIZE).fill(0);
264
+ ivVector[9] = lengthAsUint24[2];
265
+ ivVector[10] = lengthAsUint24[1];
266
+ ivVector[11] = lengthAsUint24[0];
267
+ // Increment the IV
268
+ if (iv == 0xff_ffff) {
269
+ delete this.iv;
270
+ }
271
+ else {
272
+ this.iv = iv + 1;
273
+ }
274
+ return ivVector;
275
+ }
276
+ }
277
+ // Total unique IVs(2^24 -1) used for encrypting the nano tdf payloads
278
+ // IV starts from 1 since the 0 IV is reserved for policy encryption
279
+ NanoTDFDatasetClient.NTDF_MAX_KEY_ITERATIONS = 8388606;
280
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"nanoclients.js","sourceRoot":"","sources":["../../../src/nanoclients.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,MAAM,EACN,OAAO,EAEP,OAAO,EACP,OAAO,EACP,cAAc,EACd,WAAW,EACX,aAAa,GACd,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AAEzC,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAC3D,OAAO,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AAE/C,OAAO,EAAE,kBAAkB,EAAE,MAAM,aAAa,CAAC;AAOjD,yBAAyB;AACzB,MAAM,cAAc,GAAmB;IACrC,YAAY,EAAE,KAAK;CACpB,CAAC;AAEF;;;GAGG;AACH,MAAM,OAAO,aAAc,SAAQ,MAAM;IACvC;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CAAC,UAA6C;QACzD,mBAAmB;QACnB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAEzC,0DAA0D;QAC1D,MAAM,OAAO,GAAG,OAAO,CAAC;QACxB,MAAM,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,eAAe,EAAE,CAAC;QAEhD,8BAA8B;QAC9B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAC/B,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EACzB,MAAM,EACN,OAAO,CAAC,MAAM,CAAC,kBAAkB,EACjC,OAAO,CACR,CAAC;QAEF,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,yBAAyB;QACzB,OAAO,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;IAChC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,gBAAgB,CAAC,UAA6C;QAClE,mBAAmB;QACnB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,UAAU,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC;QAE1D,MAAM,aAAa,GAAG,OAAO,CAAC;QAC9B,8BAA8B;QAC9B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,SAAS,CAC9B,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EACzB,OAAO,CAAC,MAAM,CAAC,eAAe,EAAE,EAChC,OAAO,CAAC,MAAM,CAAC,kBAAkB,EACjC,aAAa,CACd,CAAC;QAEF,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;QAC7C,CAAC;QACD,yBAAyB;QACzB,OAAO,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;IAC/B,CAAC;IAED;;;;;;;OAOG;IACH,KAAK,CAAC,OAAO,CACX,IAAuC,EACvC,OAAwB;QAExB,0DAA0D;QAC1D,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC;QACrD,MAAM,oBAAoB,GAAG,IAAI,CAAC,EAAE,CAAC;QAErC,IAAI,OAAO,oBAAoB,KAAK,QAAQ,EAAE,CAAC;YAC7C,MAAM,IAAI,kBAAkB,CAC1B,2EAA2E,CAC5E,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC,EAAE,CAAC;QAEf,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,IAAI,CAAC,SAAS,GAAG,MAAM,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;QAED,8BAA8B;QAC9B,MAAM,MAAM,GAAG,IAAI,MAAM,EAAE,CAAC;QAE5B,uBAAuB;QACvB,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YAChD,MAAM,SAAS,GAAG,MAAM,eAAe,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;YACpF,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;QACjC,CAAC;QAED,IAAI,IAAI,CAAC,OAAO,CAAC,MAAM,IAAI,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;YAChE,OAAO,CAAC,IAAI,CACV,qJAAqJ,CACtJ,CAAC;QACJ,CAAC;QAED,sBAAsB;QACtB,MAAM,iBAAiB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;QAE1C,kEAAkE;QAClE,8BAA8B;QAC9B,MAAM,cAAc,GAAG,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC;QAC1C,cAAc,CAAC,CAAC,CAAC,GAAG,oBAAoB,CAAC;QAEzC,MAAM,cAAc,GAAG,IAAI,UAAU,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAE7D,sDAAsD;QACtD,MAAM,SAAS,GAAG,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAC7C,SAAS,CAAC,CAAC,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QACjC,SAAS,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAClC,SAAS,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAElC,MAAM,aAAa,GAAmB,EAAE,GAAG,cAAc,EAAE,GAAG,OAAO,EAAE,CAAC;QACxE,OAAO,OAAO,CACZ,iBAAiB,EACjB,IAAI,CAAC,SAAS,EACd,gBAAgB,EAChB,SAAS,EACT,IAAI,EACJ,aAAa,CAAC,YAAY,CAC3B,CAAC;IACJ,CAAC;CACF;AAMD;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAM,OAAO,oBAAqB,SAAQ,MAAM;IAa9C;;;;;;;;;;;OAWG;IACH,YAAY,IAAmB;QAC7B,IACE,IAAI,CAAC,gBAAgB;YACrB,IAAI,CAAC,gBAAgB,GAAG,oBAAoB,CAAC,uBAAuB,EACpE,CAAC;YACD,MAAM,IAAI,kBAAkB,CAC1B,wCAAwC,oBAAoB,CAAC,uBAAuB,GAAG,CACxF,CAAC;QACJ,CAAC;QACD,KAAK,CAAC,IAAI,CAAC,CAAC;QAEZ,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,gBAAgB,IAAI,oBAAoB,CAAC,uBAAuB,CAAC;QAC7F,IAAI,CAAC,iBAAiB,GAAG,CAAC,CAAC;IAC7B,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,IAAuC,EACvC,OAAwB;QAExB,iBAAiB;QACjB,IAAI,IAAI,CAAC,iBAAiB,IAAI,CAAC,EAAE,CAAC;YAChC,MAAM,aAAa,GAAmB,EAAE,GAAG,cAAc,EAAE,GAAG,OAAO,EAAE,CAAC;YACxE,IAAI,CAAC,YAAY,GAAG,aAAa,CAAC,YAAY,CAAC;YAC/C,0DAA0D;YAC1D,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC;YAErD,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;gBACpB,IAAI,CAAC,SAAS,GAAG,MAAM,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;YAED,8BAA8B;YAC9B,MAAM,MAAM,GAAG,IAAI,MAAM,EAAE,CAAC;YAE5B,uBAAuB;YACvB,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;gBAChD,MAAM,SAAS,GAAG,MAAM,eAAe,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;gBACpF,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;YACjC,CAAC;YAED,IAAI,IAAI,CAAC,OAAO,CAAC,MAAM,IAAI,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBAChE,OAAO,CAAC,IAAI,CACV,qJAAqJ,CACtJ,CAAC;YACJ,CAAC;YAED,sBAAsB;YACtB,MAAM,iBAAiB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;YAE1C,MAAM,QAAQ,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;YAEnC,4BAA4B;YAC5B,IAAI,CAAC,YAAY,GAAG,MAAM,YAAY,CACpC,gBAAgB,CAAC,UAAU,EAC3B,MAAM,IAAI,CAAC,SAAS,CAAC,GAAG,EACxB,MAAM,WAAW,CAAC,aAAa,CAAC,kBAAkB,CAAC,CACpD,CAAC;YAEF,MAAM,aAAa,GAAG,MAAM,OAAO,CACjC,iBAAiB,EACjB,IAAI,CAAC,SAAS,EACd,gBAAgB,EAChB,QAAQ,EACR,IAAI,EACJ,IAAI,CAAC,YAAY,CAClB,CAAC;YAEF,mDAAmD;YACnD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;gBACvB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBAC5C,IAAI,CAAC,YAAY,GAAG,OAAO,CAAC,MAAM,CAAC;YACrC,CAAC;YAED,IAAI,CAAC,iBAAiB,IAAI,CAAC,CAAC;YAE5B,OAAO,aAAa,CAAC;QACvB,CAAC;QAED,IAAI,CAAC,iBAAiB,IAAI,CAAC,CAAC;QAE5B,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,MAAM,IAAI,kBAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;QACD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,MAAM,IAAI,kBAAkB,CAAC,mCAAmC,CAAC,CAAC;QACpE,CAAC;QAED,IAAI,CAAC,iBAAiB,IAAI,CAAC,CAAC;QAC5B,IAAI,IAAI,CAAC,iBAAiB,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;YACnD,0BAA0B;YAC1B,IAAI,CAAC,iBAAiB,GAAG,CAAC,CAAC;QAC7B,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAEnC,OAAO,cAAc,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,CAAC,YAAY,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CAAC,UAA6C;QACzD,mBAAmB;QACnB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAEzC,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,CAAC;YAC7B,gBAAgB;YAChB,OAAO,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC;QACxC,CAAC;QAED,iBAAiB;QACjB,IAAI,IAAI,CAAC,kBAAkB,CAAC,QAAQ,EAAE,IAAI,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC,QAAQ,EAAE,EAAE,CAAC;YACvF,MAAM,IAAI,GAAG,IAAI,CAAC,YAAY,CAAC;YAC/B,IAAI,CAAC,IAAI,EAAE,CAAC;gBACV,oCAAoC;gBACpC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;YAClD,CAAC;YACD,yBAAyB;YACzB,OAAO,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QAChC,CAAC;aAAM,CAAC;YACN,OAAO,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC;QACxC,CAAC;IACH,CAAC;IAED,KAAK,CAAC,gBAAgB,CAAC,OAAgB;QACrC,0DAA0D;QAC1D,MAAM,OAAO,GAAG,OAAO,CAAC;QACxB,8BAA8B;QAC9B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAC/B,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EACzB,OAAO,CAAC,MAAM,CAAC,eAAe,EAAE,EAChC,OAAO,CAAC,MAAM,CAAC,kBAAkB,EACjC,OAAO,CACR,CAAC;QACF,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,oCAAoC;YACpC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,IAAI,CAAC,kBAAkB,GAAG,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC;QAC5D,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;QAEzB,yBAAyB;QACzB,OAAO,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;IAChC,CAAC;IAED,UAAU;QACR,MAAM,EAAE,GAAG,IAAI,CAAC,EAAE,CAAC;QACnB,IAAI,EAAE,KAAK,SAAS,EAAE,CAAC;YACrB,yDAAyD;YACzD,MAAM,IAAI,kBAAkB,CAAC,cAAc,CAAC,CAAC;QAC/C,CAAC;QACD,4BAA4B;QAC5B,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,SAAS,GAAG,EAAE,EAAE,CAAC;YACvD,qEAAqE;YACrE,uEAAuE;YACvE,4CAA4C;YAC5C,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;QAC7C,CAAC;QAED,MAAM,cAAc,GAAG,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC;QAC1C,cAAc,CAAC,CAAC,CAAC,GAAG,EAAE,CAAC;QAEvB,MAAM,cAAc,GAAG,IAAI,UAAU,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAE7D,sDAAsD;QACtD,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACxD,QAAQ,CAAC,CAAC,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAChC,QAAQ,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QACjC,QAAQ,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;QAEjC,mBAAmB;QACnB,IAAI,EAAE,IAAI,SAAS,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,EAAE,CAAC;QACjB,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC;QACnB,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;;AArND,sEAAsE;AACtE,oEAAoE;AACpD,4CAAuB,GAAG,OAAO,CAAC"}
@@ -0,0 +1,5 @@
1
+ export * as AuthProviders from './auth/providers.js';
2
+ export { attributeFQNsAsValues } from './policy/api.js';
3
+ export * from './nanoclients.js';
4
+ export { version, clientType } from './version.js';
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibmFub2luZGV4LmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vc3JjL25hbm9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEtBQUssYUFBYSxNQUFNLHFCQUFxQixDQUFDO0FBQ3JELE9BQU8sRUFBRSxxQkFBcUIsRUFBRSxNQUFNLGlCQUFpQixDQUFDO0FBQ3hELGNBQWMsa0JBQWtCLENBQUM7QUFDakMsT0FBTyxFQUFFLE9BQU8sRUFBRSxVQUFVLEVBQUUsTUFBTSxjQUFjLENBQUMifQ==