@opentdf/sdk 0.8.0-beta.74 → 0.8.0-rc.73
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -5
- package/dist/cjs/src/nanoclients.js +292 -0
- package/dist/cjs/src/nanoindex.js +47 -0
- package/dist/cjs/src/nanotdf/Client.js +315 -0
- package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
- package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
- package/dist/cjs/src/nanotdf/constants.js +5 -0
- package/dist/cjs/src/nanotdf/decrypt.js +17 -0
- package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
- package/dist/cjs/src/nanotdf/encrypt.js +132 -0
- package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
- package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
- package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
- package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
- package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
- package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
- package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +28 -0
- package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
- package/dist/cjs/src/nanotdf/index.js +25 -0
- package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
- package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
- package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
- package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
- package/dist/cjs/src/nanotdf/models/Header.js +255 -0
- package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
- package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
- package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
- package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
- package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
- package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
- package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
- package/dist/cjs/src/{crypto → nanotdf-crypto}/ciphers.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/decrypt.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/digest.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/ecdsaSignature.js +2 -2
- package/dist/cjs/src/{crypto → nanotdf-crypto}/encrypt.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/enums.js +1 -1
- package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
- package/dist/cjs/src/{crypto → nanotdf-crypto}/generateKeyPair.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/generateRandomNumber.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/index.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/keyAgreement.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.js +1 -1
- package/dist/cjs/src/opentdf.js +260 -9
- package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
- package/dist/cjs/src/types/index.js +3 -0
- package/dist/cjs/src/utils.js +2 -2
- package/dist/cjs/tdf3/index.js +8 -7
- package/dist/cjs/tdf3/src/models/key-access.js +4 -4
- package/dist/cjs/tdf3/src/tdf.js +4 -4
- package/dist/types/src/nanoclients.d.ts +106 -0
- package/dist/types/src/nanoclients.d.ts.map +1 -0
- package/dist/types/src/nanoindex.d.ts +5 -0
- package/dist/types/src/nanoindex.d.ts.map +1 -0
- package/dist/types/src/nanotdf/Client.d.ts +91 -0
- package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts +24 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
- package/dist/types/src/nanotdf/constants.d.ts +2 -0
- package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
- package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
- package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts +11 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt.d.ts +13 -0
- package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +8 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/index.d.ts +9 -0
- package/dist/types/src/nanotdf/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
- package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
- package/dist/types/src/opentdf.d.ts +65 -1
- package/dist/types/src/opentdf.d.ts.map +1 -1
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/types/index.d.ts +45 -0
- package/dist/types/src/types/index.d.ts.map +1 -0
- package/dist/types/tdf3/index.d.ts +3 -4
- package/dist/types/tdf3/index.d.ts.map +1 -1
- package/dist/web/src/nanoclients.js +287 -0
- package/dist/web/src/nanoindex.js +5 -0
- package/dist/web/src/nanotdf/Client.js +310 -0
- package/dist/web/src/nanotdf/NanoTDF.js +89 -0
- package/dist/web/src/nanotdf/browser-entry.js +14 -0
- package/dist/web/src/nanotdf/constants.js +2 -0
- package/dist/web/src/nanotdf/decrypt.js +14 -0
- package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
- package/dist/web/src/nanotdf/encrypt.js +126 -0
- package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
- package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
- package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
- package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
- package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
- package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
- package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
- package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
- package/dist/web/src/nanotdf/index.js +11 -0
- package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
- package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
- package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
- package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
- package/dist/web/src/nanotdf/models/Header.js +250 -0
- package/dist/web/src/nanotdf/models/Payload.js +156 -0
- package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
- package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
- package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
- package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
- package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
- package/dist/web/src/nanotdf/models/Signature.js +74 -0
- package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
- package/dist/web/src/{crypto → nanotdf-crypto}/decrypt.js +1 -1
- package/dist/web/src/nanotdf-crypto/digest.js +4 -0
- package/dist/web/src/{crypto → nanotdf-crypto}/ecdsaSignature.js +2 -2
- package/dist/web/src/{crypto → nanotdf-crypto}/encrypt.js +1 -1
- package/dist/web/src/{crypto → nanotdf-crypto}/enums.js +1 -1
- package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
- package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
- package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
- package/dist/web/src/nanotdf-crypto/index.js +11 -0
- package/dist/web/src/{crypto → nanotdf-crypto}/keyAgreement.js +1 -1
- package/dist/web/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.js +1 -1
- package/dist/web/src/opentdf.js +255 -8
- package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
- package/dist/web/src/types/index.js +2 -0
- package/dist/web/src/utils.js +2 -2
- package/dist/web/tdf3/index.js +3 -4
- package/dist/web/tdf3/src/models/key-access.js +4 -4
- package/dist/web/tdf3/src/tdf.js +4 -4
- package/package.json +6 -1
- package/src/nanoclients.ts +406 -0
- package/src/nanoindex.ts +4 -0
- package/src/nanotdf/Client.ts +425 -0
- package/src/nanotdf/NanoTDF.ts +120 -0
- package/src/nanotdf/browser-entry.ts +20 -0
- package/src/nanotdf/constants.ts +1 -0
- package/src/nanotdf/decrypt.ts +19 -0
- package/src/nanotdf/encrypt-dataset.ts +51 -0
- package/src/nanotdf/encrypt.ts +196 -0
- package/src/nanotdf/enum/CipherEnum.ts +10 -0
- package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
- package/src/nanotdf/enum/EncodingEnum.ts +5 -0
- package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
- package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
- package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
- package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
- package/src/nanotdf/helpers/getHkdfSalt.ts +13 -0
- package/src/nanotdf/index.ts +10 -0
- package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
- package/src/nanotdf/models/Ciphers.ts +67 -0
- package/src/nanotdf/models/DefaultParams.ts +24 -0
- package/src/nanotdf/models/EcCurves.ts +40 -0
- package/src/nanotdf/models/Header.ts +322 -0
- package/src/nanotdf/models/Payload.ts +196 -0
- package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
- package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
- package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
- package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
- package/src/nanotdf/models/ResourceLocator.ts +212 -0
- package/src/nanotdf/models/Signature.ts +85 -0
- package/src/{crypto → nanotdf-crypto}/ecdsaSignature.ts +1 -1
- package/src/opentdf.ts +343 -6
- package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
- package/src/types/index.ts +55 -0
- package/src/utils.ts +1 -1
- package/tdf3/index.ts +12 -2
- package/tdf3/src/models/key-access.ts +3 -3
- package/tdf3/src/tdf.ts +3 -3
- package/dist/cjs/src/crypto/exportCryptoKey.js +0 -20
- package/dist/types/src/crypto/ciphers.d.ts.map +0 -1
- package/dist/types/src/crypto/decrypt.d.ts.map +0 -1
- package/dist/types/src/crypto/digest.d.ts.map +0 -1
- package/dist/types/src/crypto/ecdsaSignature.d.ts.map +0 -1
- package/dist/types/src/crypto/encrypt.d.ts.map +0 -1
- package/dist/types/src/crypto/enums.d.ts.map +0 -1
- package/dist/types/src/crypto/exportCryptoKey.d.ts.map +0 -1
- package/dist/types/src/crypto/generateKeyPair.d.ts.map +0 -1
- package/dist/types/src/crypto/generateRandomNumber.d.ts.map +0 -1
- package/dist/types/src/crypto/index.d.ts.map +0 -1
- package/dist/types/src/crypto/keyAgreement.d.ts.map +0 -1
- package/dist/types/src/crypto/pemPublicToCrypto.d.ts.map +0 -1
- package/dist/web/src/crypto/ciphers.js +0 -14
- package/dist/web/src/crypto/digest.js +0 -4
- package/dist/web/src/crypto/exportCryptoKey.js +0 -17
- package/dist/web/src/crypto/generateKeyPair.js +0 -10
- package/dist/web/src/crypto/generateRandomNumber.js +0 -9
- package/dist/web/src/crypto/index.js +0 -11
- /package/dist/types/src/{crypto → nanotdf-crypto}/ciphers.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/decrypt.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/digest.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/ecdsaSignature.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/encrypt.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/enums.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/exportCryptoKey.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/generateKeyPair.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/generateRandomNumber.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/index.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/keyAgreement.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.d.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/ciphers.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/decrypt.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/digest.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/encrypt.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/enums.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/exportCryptoKey.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/generateKeyPair.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/generateRandomNumber.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/index.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/keyAgreement.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.ts +0 -0
package/dist/cjs/src/opentdf.js
CHANGED
|
@@ -1,17 +1,84 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
2
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.OpenTDF = exports.isPublicKeyAlgorithm = exports.TDF3Client = void 0;
|
|
6
|
+
exports.OpenTDF = exports.RewrapCache = exports.isPublicKeyAlgorithm = exports.TDF3Client = void 0;
|
|
4
7
|
const errors_js_1 = require("./errors.js");
|
|
8
|
+
const nanoclients_js_1 = require("./nanoclients.js");
|
|
5
9
|
var index_js_1 = require("../tdf3/src/client/index.js");
|
|
6
10
|
Object.defineProperty(exports, "TDF3Client", { enumerable: true, get: function () { return index_js_1.Client; } });
|
|
11
|
+
const NanoTDF_js_1 = __importDefault(require("./nanotdf/NanoTDF.js"));
|
|
12
|
+
const decrypt_js_1 = __importDefault(require("./nanotdf/decrypt.js"));
|
|
13
|
+
const Client_js_1 = __importDefault(require("./nanotdf/Client.js"));
|
|
7
14
|
const seekable_js_1 = require("./seekable.js");
|
|
8
15
|
const index_js_2 = require("../tdf3/src/client/index.js");
|
|
9
16
|
const access_js_1 = require("./access.js");
|
|
10
17
|
Object.defineProperty(exports, "isPublicKeyAlgorithm", { enumerable: true, get: function () { return access_js_1.isPublicKeyAlgorithm; } });
|
|
11
18
|
const tdf_js_1 = require("../tdf3/src/tdf.js");
|
|
12
19
|
const index_js_3 = require("./encodings/index.js");
|
|
20
|
+
const PolicyTypeEnum_js_1 = __importDefault(require("./nanotdf/enum/PolicyTypeEnum.js"));
|
|
21
|
+
const defaultRewrapCacheOptions = {
|
|
22
|
+
bypass: false,
|
|
23
|
+
maxAge: 300000,
|
|
24
|
+
pollInterval: 500,
|
|
25
|
+
};
|
|
26
|
+
/**
|
|
27
|
+
* Cache for headers of nanotdf collections, to quickly open multiple entries of the same collection.
|
|
28
|
+
* It has a demon that removes all keys that have not been accessed in the last 5 minutes.
|
|
29
|
+
* To cancel the demon, and clear the cache, call `close()`.
|
|
30
|
+
* */
|
|
31
|
+
class RewrapCache {
|
|
32
|
+
constructor(opts) {
|
|
33
|
+
const { bypass, maxAge, pollInterval } = { ...defaultRewrapCacheOptions, ...opts };
|
|
34
|
+
if (bypass) {
|
|
35
|
+
return;
|
|
36
|
+
}
|
|
37
|
+
this.cache = new Map();
|
|
38
|
+
this.closer = setInterval(() => {
|
|
39
|
+
const now = Date.now();
|
|
40
|
+
const c = this.cache;
|
|
41
|
+
if (!c) {
|
|
42
|
+
return;
|
|
43
|
+
}
|
|
44
|
+
for (const [key, value] of c.entries()) {
|
|
45
|
+
if (now - value.lastAccessTime > maxAge) {
|
|
46
|
+
c.delete(key);
|
|
47
|
+
}
|
|
48
|
+
}
|
|
49
|
+
}, pollInterval);
|
|
50
|
+
}
|
|
51
|
+
get(key) {
|
|
52
|
+
if (!this.cache) {
|
|
53
|
+
return undefined;
|
|
54
|
+
}
|
|
55
|
+
const entry = this.cache.get(key);
|
|
56
|
+
if (entry) {
|
|
57
|
+
entry.lastAccessTime = Date.now();
|
|
58
|
+
return entry.value;
|
|
59
|
+
}
|
|
60
|
+
return undefined;
|
|
61
|
+
}
|
|
62
|
+
/** Set a key in the cache. */
|
|
63
|
+
set(key, value) {
|
|
64
|
+
if (!this.cache) {
|
|
65
|
+
return;
|
|
66
|
+
}
|
|
67
|
+
this.cache.set(key, { lastAccessTime: Date.now(), value });
|
|
68
|
+
}
|
|
69
|
+
/** Close the cache and release any resources. */
|
|
70
|
+
close() {
|
|
71
|
+
if (this.closer !== undefined) {
|
|
72
|
+
clearInterval(this.closer);
|
|
73
|
+
delete this.closer;
|
|
74
|
+
delete this.cache;
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
}
|
|
78
|
+
exports.RewrapCache = RewrapCache;
|
|
13
79
|
/**
|
|
14
80
|
* The main OpenTDF class that provides methods for creating and reading TDF files.
|
|
81
|
+
* It supports both NanoTDF and ZTDF formats.
|
|
15
82
|
* It can be used to create new TDF files and read existing ones.
|
|
16
83
|
* This class is the entry point for using the OpenTDF SDK.
|
|
17
84
|
* It requires an authentication provider to be passed in the constructor.
|
|
@@ -42,7 +109,7 @@ const index_js_3 = require("./encodings/index.js");
|
|
|
42
109
|
* ```
|
|
43
110
|
*/
|
|
44
111
|
class OpenTDF {
|
|
45
|
-
constructor({ authProvider, dpopKeys, defaultCreateOptions, defaultReadOptions, disableDPoP, policyEndpoint, platformUrl, }) {
|
|
112
|
+
constructor({ authProvider, dpopKeys, defaultCreateOptions, defaultReadOptions, disableDPoP, policyEndpoint, rewrapCacheOptions, platformUrl, }) {
|
|
46
113
|
this.authProvider = authProvider;
|
|
47
114
|
this.defaultCreateOptions = defaultCreateOptions || {};
|
|
48
115
|
this.defaultReadOptions = defaultReadOptions || {};
|
|
@@ -54,6 +121,7 @@ class OpenTDF {
|
|
|
54
121
|
console.warn("Warning: 'platformUrl' is required for security to ensure the SDK uses the platform-configured Key Access Server list");
|
|
55
122
|
}
|
|
56
123
|
this.policyEndpoint = policyEndpoint || '';
|
|
124
|
+
this.rewrapCache = new RewrapCache(rewrapCacheOptions);
|
|
57
125
|
this.tdf3Client = new index_js_2.Client({
|
|
58
126
|
authProvider,
|
|
59
127
|
dpopKeys,
|
|
@@ -70,6 +138,30 @@ class OpenTDF {
|
|
|
70
138
|
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
|
|
71
139
|
}, true, ['sign', 'verify']);
|
|
72
140
|
}
|
|
141
|
+
/** Creates a new NanoTDF stream. */
|
|
142
|
+
async createNanoTDF(opts) {
|
|
143
|
+
opts = {
|
|
144
|
+
...this.defaultCreateOptions,
|
|
145
|
+
...opts,
|
|
146
|
+
};
|
|
147
|
+
const collection = await this.createNanoTDFCollection({
|
|
148
|
+
...opts,
|
|
149
|
+
platformUrl: this.platformUrl,
|
|
150
|
+
});
|
|
151
|
+
try {
|
|
152
|
+
return await collection.encrypt(opts.source);
|
|
153
|
+
}
|
|
154
|
+
finally {
|
|
155
|
+
await collection.close();
|
|
156
|
+
}
|
|
157
|
+
}
|
|
158
|
+
/**
|
|
159
|
+
* Creates a new collection object, which can be used to encrypt a series of data with the same policy.
|
|
160
|
+
*/
|
|
161
|
+
async createNanoTDFCollection(opts) {
|
|
162
|
+
opts = { ...this.defaultCreateOptions, ...opts };
|
|
163
|
+
return new Collection(this.authProvider, opts);
|
|
164
|
+
}
|
|
73
165
|
/** Creates a new ZTDF stream. */
|
|
74
166
|
async createZTDF(opts) {
|
|
75
167
|
opts = { ...this.defaultCreateOptions, ...opts };
|
|
@@ -96,7 +188,7 @@ class OpenTDF {
|
|
|
96
188
|
/** Opens a TDF file for inspection and decryption. */
|
|
97
189
|
open(opts) {
|
|
98
190
|
opts = { ...this.defaultReadOptions, ...opts };
|
|
99
|
-
return new
|
|
191
|
+
return new UnknownTypeReader(this, opts, this.rewrapCache);
|
|
100
192
|
}
|
|
101
193
|
/** Decrypts a TDF file. */
|
|
102
194
|
async read(opts) {
|
|
@@ -105,15 +197,16 @@ class OpenTDF {
|
|
|
105
197
|
}
|
|
106
198
|
/** Closes the OpenTDF instance and releases any resources. */
|
|
107
199
|
close() {
|
|
108
|
-
|
|
200
|
+
this.rewrapCache.close();
|
|
109
201
|
}
|
|
110
202
|
}
|
|
111
203
|
exports.OpenTDF = OpenTDF;
|
|
112
|
-
/** A TDF reader
|
|
113
|
-
class
|
|
114
|
-
constructor(outer, opts) {
|
|
204
|
+
/** A TDF reader that can automatically detect the TDF type. */
|
|
205
|
+
class UnknownTypeReader {
|
|
206
|
+
constructor(outer, opts, rewrapCache) {
|
|
115
207
|
this.outer = outer;
|
|
116
208
|
this.opts = opts;
|
|
209
|
+
this.rewrapCache = rewrapCache;
|
|
117
210
|
this.state = 'init';
|
|
118
211
|
this.delegate = this.resolveType();
|
|
119
212
|
}
|
|
@@ -132,6 +225,10 @@ class ZTDFReaderWrapper {
|
|
|
132
225
|
this.state = 'loaded';
|
|
133
226
|
return new ZTDFReader(this.outer.tdf3Client, this.opts, chunker);
|
|
134
227
|
}
|
|
228
|
+
else if (prefix[0] === 0x4c && prefix[1] === 0x31 && prefix[2] === 0x4c) {
|
|
229
|
+
this.state = 'loaded';
|
|
230
|
+
return new NanoTDFReader(this.outer, this.opts, chunker, this.rewrapCache);
|
|
231
|
+
}
|
|
135
232
|
this.state = 'done';
|
|
136
233
|
throw new errors_js_1.InvalidFileError(`unsupported format; prefix not recognized ${prefix}`);
|
|
137
234
|
}
|
|
@@ -171,7 +268,100 @@ class ZTDFReaderWrapper {
|
|
|
171
268
|
return actual.obligations();
|
|
172
269
|
}
|
|
173
270
|
}
|
|
174
|
-
/** A reader for
|
|
271
|
+
/** A TDF reader for NanoTDF files. */
|
|
272
|
+
class NanoTDFReader {
|
|
273
|
+
constructor(outer, opts, chunker, rewrapCache) {
|
|
274
|
+
this.outer = outer;
|
|
275
|
+
this.opts = opts;
|
|
276
|
+
this.chunker = chunker;
|
|
277
|
+
this.rewrapCache = rewrapCache;
|
|
278
|
+
if (!this.opts.ignoreAllowlist &&
|
|
279
|
+
!this.opts.platformUrl &&
|
|
280
|
+
!this.opts.allowedKASEndpoints?.length) {
|
|
281
|
+
throw new errors_js_1.ConfigurationError('platformUrl is required when allowedKasEndpoints is empty');
|
|
282
|
+
}
|
|
283
|
+
// lazily load the container
|
|
284
|
+
this.container = new Promise(async (resolve, reject) => {
|
|
285
|
+
try {
|
|
286
|
+
const ciphertext = await chunker();
|
|
287
|
+
const nanotdf = NanoTDF_js_1.default.from(ciphertext);
|
|
288
|
+
resolve(nanotdf);
|
|
289
|
+
}
|
|
290
|
+
catch (e) {
|
|
291
|
+
reject(e);
|
|
292
|
+
}
|
|
293
|
+
});
|
|
294
|
+
}
|
|
295
|
+
/**
|
|
296
|
+
* Decrypts the NanoTDF file and returns a decorated stream.
|
|
297
|
+
* Sets required obligations on the reader when retrieved from KAS rewrap response.
|
|
298
|
+
*/
|
|
299
|
+
async decrypt() {
|
|
300
|
+
const nanotdf = await this.container;
|
|
301
|
+
const cachedDEK = this.rewrapCache.get(nanotdf.header.ephemeralPublicKey);
|
|
302
|
+
if (cachedDEK) {
|
|
303
|
+
const r = await streamify((0, decrypt_js_1.default)(cachedDEK, nanotdf));
|
|
304
|
+
r.header = nanotdf.header;
|
|
305
|
+
return r;
|
|
306
|
+
}
|
|
307
|
+
const platformUrl = this.opts.platformUrl || this.outer.platformUrl;
|
|
308
|
+
const kasEndpoint = this.opts.allowedKASEndpoints?.[0] || platformUrl || 'https://disallow.all.invalid';
|
|
309
|
+
const nc = new Client_js_1.default({
|
|
310
|
+
allowedKases: this.opts.allowedKASEndpoints,
|
|
311
|
+
fulfillableObligationFQNs: this.opts.fulfillableObligationFQNs,
|
|
312
|
+
authProvider: this.outer.authProvider,
|
|
313
|
+
ignoreAllowList: this.opts.ignoreAllowlist,
|
|
314
|
+
dpopEnabled: this.outer.dpopEnabled,
|
|
315
|
+
dpopKeys: this.outer.dpopKeys,
|
|
316
|
+
kasEndpoint,
|
|
317
|
+
platformUrl,
|
|
318
|
+
});
|
|
319
|
+
// TODO: The version number should be fetched from the API
|
|
320
|
+
const version = '0.0.1';
|
|
321
|
+
// Rewrap key on every request
|
|
322
|
+
const { unwrappedKey: dek, requiredObligations } = await nc.rewrapKey(nanotdf.header.toBuffer(), nanotdf.header.getKasRewrapUrl(), nanotdf.header.magicNumberVersion, version);
|
|
323
|
+
if (!dek) {
|
|
324
|
+
// These should have thrown already.
|
|
325
|
+
throw new Error('internal: key rewrap failure');
|
|
326
|
+
}
|
|
327
|
+
this.requiredObligations = { fqns: requiredObligations };
|
|
328
|
+
this.rewrapCache.set(nanotdf.header.ephemeralPublicKey, dek);
|
|
329
|
+
const r = await streamify((0, decrypt_js_1.default)(dek, nanotdf));
|
|
330
|
+
// TODO figure out how to attach policy and metadata to the stream
|
|
331
|
+
r.header = nanotdf.header;
|
|
332
|
+
return r;
|
|
333
|
+
}
|
|
334
|
+
async close() { }
|
|
335
|
+
/** Returns blank manifest. NanoTDF has no manifest. */
|
|
336
|
+
async manifest() {
|
|
337
|
+
return {};
|
|
338
|
+
}
|
|
339
|
+
/** Returns the attributes of the NanoTDF file. */
|
|
340
|
+
async attributes() {
|
|
341
|
+
const nanotdf = await this.container;
|
|
342
|
+
if (!nanotdf.header.policy?.content) {
|
|
343
|
+
return [];
|
|
344
|
+
}
|
|
345
|
+
if (nanotdf.header.policy.type !== PolicyTypeEnum_js_1.default.EmbeddedText) {
|
|
346
|
+
throw new Error('unsupported policy type');
|
|
347
|
+
}
|
|
348
|
+
const policyString = new TextDecoder().decode(nanotdf.header.policy.content);
|
|
349
|
+
const policy = JSON.parse(policyString);
|
|
350
|
+
return policy?.body?.dataAttributes.map((a) => a.attribute) || [];
|
|
351
|
+
}
|
|
352
|
+
/**
|
|
353
|
+
* Returns obligations populated from the decrypt flow.
|
|
354
|
+
* If a decrypt has not occurred, attempts one to retrieve obligations.
|
|
355
|
+
*/
|
|
356
|
+
async obligations() {
|
|
357
|
+
if (this.requiredObligations) {
|
|
358
|
+
return this.requiredObligations;
|
|
359
|
+
}
|
|
360
|
+
await this.decrypt();
|
|
361
|
+
return this.requiredObligations ?? { fqns: [] };
|
|
362
|
+
}
|
|
363
|
+
}
|
|
364
|
+
/** A reader for TDF files. */
|
|
175
365
|
class ZTDFReader {
|
|
176
366
|
constructor(client, opts, source) {
|
|
177
367
|
this.client = client;
|
|
@@ -252,4 +442,65 @@ class ZTDFReader {
|
|
|
252
442
|
return this.requiredObligations ?? { fqns: [] };
|
|
253
443
|
}
|
|
254
444
|
}
|
|
255
|
-
|
|
445
|
+
async function streamify(ab) {
|
|
446
|
+
const stream = new ReadableStream({
|
|
447
|
+
start(controller) {
|
|
448
|
+
ab.then((arrayBuffer) => {
|
|
449
|
+
controller.enqueue(new Uint8Array(arrayBuffer));
|
|
450
|
+
controller.close();
|
|
451
|
+
});
|
|
452
|
+
},
|
|
453
|
+
});
|
|
454
|
+
return stream;
|
|
455
|
+
}
|
|
456
|
+
class Collection {
|
|
457
|
+
constructor(authProvider, opts) {
|
|
458
|
+
if (opts.signers || opts.signingKeyID) {
|
|
459
|
+
throw new errors_js_1.ConfigurationError('ntdf signing not implemented');
|
|
460
|
+
}
|
|
461
|
+
if (opts.autoconfigure) {
|
|
462
|
+
throw new errors_js_1.ConfigurationError('autoconfigure not implemented');
|
|
463
|
+
}
|
|
464
|
+
if (opts.ecdsaBindingKeyID) {
|
|
465
|
+
throw new errors_js_1.ConfigurationError('custom binding key not implemented');
|
|
466
|
+
}
|
|
467
|
+
switch (opts.bindingType) {
|
|
468
|
+
case 'ecdsa':
|
|
469
|
+
this.encryptOptions = { ecdsaBinding: true };
|
|
470
|
+
break;
|
|
471
|
+
case 'gmac':
|
|
472
|
+
this.encryptOptions = { ecdsaBinding: false };
|
|
473
|
+
break;
|
|
474
|
+
}
|
|
475
|
+
const kasEndpoint = opts.defaultKASEndpoint || opts.platformUrl || 'https://disallow.all.invalid';
|
|
476
|
+
this.client = new nanoclients_js_1.NanoTDFDatasetClient({
|
|
477
|
+
authProvider,
|
|
478
|
+
kasEndpoint: kasEndpoint,
|
|
479
|
+
maxKeyIterations: opts.maxKeyIterations,
|
|
480
|
+
platformUrl: opts.platformUrl,
|
|
481
|
+
});
|
|
482
|
+
this.client.dataAttributes = opts.attributes || [];
|
|
483
|
+
}
|
|
484
|
+
/** Encrypts a source into a NanoTDF stream. */
|
|
485
|
+
async encrypt(source) {
|
|
486
|
+
if (!this.client) {
|
|
487
|
+
throw new errors_js_1.ConfigurationError('Collection is closed');
|
|
488
|
+
}
|
|
489
|
+
const chunker = await (0, seekable_js_1.fromSource)(source);
|
|
490
|
+
const cipherChunk = await this.client.encrypt(await chunker(), this.encryptOptions);
|
|
491
|
+
const stream = new ReadableStream({
|
|
492
|
+
start(controller) {
|
|
493
|
+
controller.enqueue(new Uint8Array(cipherChunk));
|
|
494
|
+
controller.close();
|
|
495
|
+
},
|
|
496
|
+
});
|
|
497
|
+
// TODO: client's header object is private
|
|
498
|
+
// stream.header = this.client.header;
|
|
499
|
+
return stream;
|
|
500
|
+
}
|
|
501
|
+
/** Releases client resources. */
|
|
502
|
+
async close() {
|
|
503
|
+
delete this.client;
|
|
504
|
+
}
|
|
505
|
+
}
|
|
506
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"opentdf.js","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":";;;;;;AACA,2CAAmE;AACnE,qDAAmG;AACnG,wDAAmE;AAA1D,sGAAA,MAAM,OAAc;AAC7B,sEAA2C;AAC3C,sEAAkD;AAClD,oEAAyC;AAEzC,+CAAiF;AACjF,0DAAmE;AAMnE,2CAKqB;AA6BnB,qGA9BA,gCAAoB,OA8BA;AApBtB,+CAK4B;AAC5B,mDAA8C;AAC9C,yFAA0D;AAmM1D,MAAM,yBAAyB,GAAiC;IAC9D,MAAM,EAAE,KAAK;IACb,MAAM,EAAE,MAAM;IACd,YAAY,EAAE,GAAG;CAClB,CAAC;AAEF;;;;KAIK;AACL,MAAa,WAAW;IAGtB,YAAY,IAAyB;QACnC,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,YAAY,EAAE,GAAG,EAAE,GAAG,yBAAyB,EAAE,GAAG,IAAI,EAAE,CAAC;QACnF,IAAI,MAAM,EAAE,CAAC;YACX,OAAO;QACT,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,IAAI,GAAG,EAAE,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,WAAW,CAAC,GAAG,EAAE;YAC7B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,MAAM,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC;YACrB,IAAI,CAAC,CAAC,EAAE,CAAC;gBACP,OAAO;YACT,CAAC;YACD,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC;gBACvC,IAAI,GAAG,GAAG,KAAK,CAAC,cAAc,GAAG,MAAM,EAAE,CAAC;oBACxC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;gBAChB,CAAC;YACH,CAAC;QACH,CAAC,EAAE,YAAY,CAAC,CAAC;IACnB,CAAC;IAED,GAAG,CAAC,GAAe;QACjB,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;YAChB,OAAO,SAAS,CAAC;QACnB,CAAC;QACD,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAClC,IAAI,KAAK,EAAE,CAAC;YACV,KAAK,CAAC,cAAc,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YAClC,OAAO,KAAK,CAAC,KAAK,CAAC;QACrB,CAAC;QACD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,8BAA8B;IAC9B,GAAG,CAAC,GAAe,EAAE,KAAgB;QACnC,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;YAChB,OAAO;QACT,CAAC;QACD,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,EAAE,cAAc,EAAE,IAAI,CAAC,GAAG,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAC7D,CAAC;IAED,iDAAiD;IACjD,KAAK;QACH,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;YAC9B,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAC3B,OAAO,IAAI,CAAC,MAAM,CAAC;YACnB,OAAO,IAAI,CAAC,KAAK,CAAC;QACpB,CAAC;IACH,CAAC;CACF;AAnDD,kCAmDC;AA+BD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,OAAO;IAoBlB,YAAY,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,kBAAkB,EAClB,WAAW,GACI;QACf,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,IAAI,EAAE,CAAC;QACvD,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,IAAI,EAAE,CAAC;QACnD,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC,WAAW,CAAC;QACjC,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QACjC,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,IAAI,CACV,uHAAuH,CACxH,CAAC;QACJ,CAAC;QACD,IAAI,CAAC,cAAc,GAAG,cAAc,IAAI,EAAE,CAAC;QAC3C,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAAC,kBAAkB,CAAC,CAAC;QACvD,IAAI,CAAC,UAAU,GAAG,IAAI,iBAAU,CAAC;YAC/B,YAAY;YACZ,QAAQ;YACR,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,8BAA8B;YAC/D,WAAW;YACX,cAAc;SACf,CAAC,CAAC;QACH,IAAI,CAAC,QAAQ;YACX,QAAQ;gBACR,MAAM,CAAC,MAAM,CAAC,WAAW,CACvB;oBACE,IAAI,EAAE,mBAAmB;oBACzB,IAAI,EAAE,SAAS;oBACf,aAAa,EAAE,IAAI;oBACnB,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;iBACnD,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;IACN,CAAC;IAED,oCAAoC;IACpC,KAAK,CAAC,aAAa,CAAC,IAA0B;QAC5C,IAAI,GAAG;YACL,GAAG,IAAI,CAAC,oBAAoB;YAC5B,GAAG,IAAI;SACR,CAAC;QACF,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,uBAAuB,CAAC;YACpD,GAAG,IAAI;YACP,WAAW,EAAE,IAAI,CAAC,WAAW;SAC9B,CAAC,CAAC;QACH,IAAI,CAAC;YACH,OAAO,MAAM,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC/C,CAAC;gBAAS,CAAC;YACT,MAAM,UAAU,CAAC,KAAK,EAAE,CAAC;QAC3B,CAAC;IACH,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,uBAAuB,CAC3B,IAAoC;QAEpC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,EAAE,CAAC;QACjD,OAAO,IAAI,UAAU,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,CAAC,CAAC;IACjD,CAAC;IAED,iCAAiC;IACjC,KAAK,CAAC,UAAU,CAAC,IAAuB;QACtC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,EAAE,CAAC;QACjD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC;YAC9C,MAAM,EAAE,MAAM,IAAA,4BAAc,EAAC,IAAI,CAAC,MAAM,CAAC;YAEzC,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;YACvC,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa;YACnC,kBAAkB,EAAE,IAAI,CAAC,kBAAkB;YAC3C,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,KAAK,EAAE;gBACL,UAAU,EAAE,IAAI,CAAC,UAAU;aAC5B;YACD,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;YAC/C,cAAc,EAAE,IAAI,CAAC,cAAc;SACpC,CAAC,CAAC;QACH,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,sDAAsD;IACtD,IAAI,CAAC,IAAiB;QACpB,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,kBAAkB,EAAE,GAAG,IAAI,EAAE,CAAC;QAC/C,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;IAC7D,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,IAAI,CAAC,IAAiB;QAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC/B,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,8DAA8D;IAC9D,KAAK;QACH,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,CAAC;IAC3B,CAAC;CACF;AApID,0BAoIC;AAED,+DAA+D;AAC/D,MAAM,iBAAiB;IAGrB,YACW,KAAc,EACd,IAAiB,EACT,WAAwB;QAFhC,UAAK,GAAL,KAAK,CAAS;QACd,SAAI,GAAJ,IAAI,CAAa;QACT,gBAAW,GAAX,WAAW,CAAa;QAJ3C,UAAK,GAAkF,MAAM,CAAC;QAM5F,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACrC,CAAC;IAED,sDAAsD;IACtD,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,MAAM,IAAI,8BAAkB,CAAC,kBAAkB,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,WAAW,CAAC;QACzB,MAAM,OAAO,GAAG,MAAM,IAAA,wBAAU,EAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACnC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACrD,IAAI,CAAC,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC;QACjD,CAAC;QACD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;YAC7C,IAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;YACtB,OAAO,IAAI,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;aAAM,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;YAC1E,IAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;YACtB,OAAO,IAAI,aAAa,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,IAAI,EAAE,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;QAC7E,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACpB,MAAM,IAAI,4BAAgB,CAAC,6CAA6C,MAAM,EAAE,CAAC,CAAC;IACpF,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,OAAO;QACX,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,6CAA6C;IAC7C,KAAK,CAAC,UAAU;QACd,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,UAAU,EAAE,CAAC;IAC7B,CAAC;IAED,2CAA2C;IAC3C,KAAK,CAAC,QAAQ;QACZ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,QAAQ,EAAE,CAAC;IAC3B,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,KAAK;QACT,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,OAAO;QACT,CAAC;QACD,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,iCAAiC;YACjC,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;YACpB,OAAO;QACT,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,SAAS,CAAC;QACvB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,KAAK,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE;YAC9B,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACtB,CAAC,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,WAAW;QACf,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,WAAW,EAAE,CAAC;IAC9B,CAAC;CACF;AAED,sCAAsC;AACtC,MAAM,aAAa;IAIjB,YACW,KAAc,EACd,IAAiB,EACjB,OAAgB,EACR,WAAwB;QAHhC,UAAK,GAAL,KAAK,CAAS;QACd,SAAI,GAAJ,IAAI,CAAa;QACjB,YAAO,GAAP,OAAO,CAAS;QACR,gBAAW,GAAX,WAAW,CAAa;QAEzC,IACE,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe;YAC1B,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW;YACtB,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,MAAM,EACtC,CAAC;YACD,MAAM,IAAI,8BAAkB,CAAC,2DAA2D,CAAC,CAAC;QAC5F,CAAC;QACD,4BAA4B;QAC5B,IAAI,CAAC,SAAS,GAAG,IAAI,OAAO,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE;YACrD,IAAI,CAAC;gBACH,MAAM,UAAU,GAAG,MAAM,OAAO,EAAE,CAAC;gBACnC,MAAM,OAAO,GAAG,oBAAO,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;gBACzC,OAAO,CAAC,OAAO,CAAC,CAAC;YACnB,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,MAAM,CAAC,CAAC,CAAC,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;QACrC,MAAM,SAAS,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,kBAAkB,CAAC,CAAC;QAC1E,IAAI,SAAS,EAAE,CAAC;YACd,MAAM,CAAC,GAAoB,MAAM,SAAS,CAAC,IAAA,oBAAc,EAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAAC;YAC/E,CAAC,CAAC,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;YAC1B,OAAO,CAAC,CAAC;QACX,CAAC;QACD,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC;QACpE,MAAM,WAAW,GACf,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,IAAI,WAAW,IAAI,8BAA8B,CAAC;QACtF,MAAM,EAAE,GAAG,IAAI,mBAAM,CAAC;YACpB,YAAY,EAAE,IAAI,CAAC,IAAI,CAAC,mBAAmB;YAC3C,yBAAyB,EAAE,IAAI,CAAC,IAAI,CAAC,yBAAyB;YAC9D,YAAY,EAAE,IAAI,CAAC,KAAK,CAAC,YAAY;YACrC,eAAe,EAAE,IAAI,CAAC,IAAI,CAAC,eAAe;YAC1C,WAAW,EAAE,IAAI,CAAC,KAAK,CAAC,WAAW;YACnC,QAAQ,EAAE,IAAI,CAAC,KAAK,CAAC,QAAQ;YAC7B,WAAW;YACX,WAAW;SACZ,CAAC,CAAC;QACH,0DAA0D;QAC1D,MAAM,OAAO,GAAG,OAAO,CAAC;QACxB,8BAA8B;QAC9B,MAAM,EAAE,YAAY,EAAE,GAAG,EAAE,mBAAmB,EAAE,GAAG,MAAM,EAAE,CAAC,SAAS,CACnE,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EACzB,OAAO,CAAC,MAAM,CAAC,eAAe,EAAE,EAChC,OAAO,CAAC,MAAM,CAAC,kBAAkB,EACjC,OAAO,CACR,CAAC;QACF,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,oCAAoC;YACpC,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,CAAC,mBAAmB,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,CAAC;QACzD,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,kBAAkB,EAAE,GAAG,CAAC,CAAC;QAC7D,MAAM,CAAC,GAAoB,MAAM,SAAS,CAAC,IAAA,oBAAc,EAAC,GAAG,EAAE,OAAO,CAAC,CAAC,CAAC;QACzE,kEAAkE;QAClE,CAAC,CAAC,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;QAC1B,OAAO,CAAC,CAAC;IACX,CAAC;IAED,KAAK,CAAC,KAAK,KAAI,CAAC;IAEhB,uDAAuD;IACvD,KAAK,CAAC,QAAQ;QACZ,OAAO,EAAc,CAAC;IACxB,CAAC;IAED,kDAAkD;IAClD,KAAK,CAAC,UAAU;QACd,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;QACrC,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,EAAE,CAAC;YACpC,OAAO,EAAE,CAAC;QACZ,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,2BAAU,CAAC,YAAY,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;QAC7C,CAAC;QACD,MAAM,YAAY,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAC7E,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAW,CAAC;QAClD,OAAO,MAAM,EAAE,IAAI,EAAE,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;IACpE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,OAAO,IAAI,CAAC,mBAAmB,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,mBAAmB,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAClD,CAAC;CACF;AAED,8BAA8B;AAC9B,MAAM,UAAU;IAId,YACW,MAAkB,EAClB,IAAiB,EACjB,MAAe;QAFf,WAAM,GAAN,MAAM,CAAY;QAClB,SAAI,GAAJ,IAAI,CAAa;QACjB,WAAM,GAAN,MAAM,CAAS;QAExB,IAAI,CAAC,QAAQ,GAAG,IAAA,sBAAa,EAAC,MAAM,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,EACJ,yBAAyB,EACzB,QAAQ,EAAE,kBAAkB,EAC5B,oBAAoB,GACrB,GAAG,IAAI,CAAC,IAAI,CAAC;QAEd,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YAC3F,MAAM,IAAI,8BAAkB,CAAC,2DAA2D,CAAC,CAAC;QAC5F,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC;QAE5C,MAAM,EAAE,YAAY,EAAE,aAAa,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;QACpD,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,SAAsC,CAAC;QAE3C,IAAI,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,MAAM,IAAI,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;YACvE,SAAS,GAAG,IAAI,2BAAe,CAC7B,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,EAAE,EACnC,IAAI,CAAC,IAAI,CAAC,eAAe,CAC1B,CAAC;QACJ,CAAC;aAAM,IAAI,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACjC,SAAS,GAAG,MAAM,IAAA,iCAAqB,EAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,YAAY,CAAC,CAAC;QAC/E,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,MAAM,SAAS,GAAG,MAAM,IAAA,0BAAiB,EACvC;YACE,SAAS;YACT,YAAY;YACZ,OAAO,EAAE,IAAI,CAAC,MAAM;YACpB,gBAAgB,EAAE,CAAC;YACnB,aAAa;YACb,QAAQ;YACR,uBAAuB,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,uBAAuB;YACzE,aAAa,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC;YAC7B,eAAe,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,eAAe;YACzD,yBAAyB;YACzB,kBAAkB;YAClB,oBAAoB;YACpB,sBAAsB,EAAE,IAAI,CAAC,IAAI,CAAC,yBAAyB,IAAI,EAAE;SAClE,EACD,QAAQ,CACT,CAAC;QACF,IAAI,CAAC,mBAAmB,GAAG;YACzB,IAAI,EAAE,SAAS,CAAC,WAAW,EAAE;SAC9B,CAAC;QACF,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACrD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,KAAK,CAAC,KAAK;QACT,yDAAyD;IAC3D,CAAC;IAED,4CAA4C;IAC5C,KAAK,CAAC,QAAQ;QACZ,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,OAAO,QAAQ,CAAC,QAAQ,CAAC;IAC3B,CAAC;IAED,8CAA8C;IAC9C,KAAK,CAAC,UAAU;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;QACvC,MAAM,UAAU,GAAG,iBAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAW,CAAC;QAChD,OAAO,MAAM,EAAE,IAAI,EAAE,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;IACpE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,OAAO,IAAI,CAAC,mBAAmB,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,mBAAmB,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAClD,CAAC;CACF;AAED,KAAK,UAAU,SAAS,CAAC,EAAwB;IAC/C,MAAM,MAAM,GAAG,IAAI,cAAc,CAAa;QAC5C,KAAK,CAAC,UAAU;YACd,EAAE,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,EAAE;gBACtB,UAAU,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC,CAAC;gBAChD,UAAU,CAAC,KAAK,EAAE,CAAC;YACrB,CAAC,CAAC,CAAC;QACL,CAAC;KACF,CAAC,CAAC;IACH,OAAO,MAAM,CAAC;AAChB,CAAC;AAUD,MAAM,UAAU;IAMd,YAAY,YAA0B,EAAE,IAAoC;QAC1E,IAAI,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtC,MAAM,IAAI,8BAAkB,CAAC,8BAA8B,CAAC,CAAC;QAC/D,CAAC;QACD,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,MAAM,IAAI,8BAAkB,CAAC,+BAA+B,CAAC,CAAC;QAChE,CAAC;QACD,IAAI,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAC3B,MAAM,IAAI,8BAAkB,CAAC,oCAAoC,CAAC,CAAC;QACrE,CAAC;QACD,QAAQ,IAAI,CAAC,WAAW,EAAE,CAAC;YACzB,KAAK,OAAO;gBACV,IAAI,CAAC,cAAc,GAAG,EAAE,YAAY,EAAE,IAAI,EAAE,CAAC;gBAC7C,MAAM;YACR,KAAK,MAAM;gBACT,IAAI,CAAC,cAAc,GAAG,EAAE,YAAY,EAAE,KAAK,EAAE,CAAC;gBAC9C,MAAM;QACV,CAAC;QAED,MAAM,WAAW,GACf,IAAI,CAAC,kBAAkB,IAAI,IAAI,CAAC,WAAW,IAAI,8BAA8B,CAAC;QAEhF,IAAI,CAAC,MAAM,GAAG,IAAI,qCAAoB,CAAC;YACrC,YAAY;YACZ,WAAW,EAAE,WAAW;YACxB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;YACvC,WAAW,EAAE,IAAI,CAAC,WAAW;SAC9B,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,CAAC,cAAc,GAAG,IAAI,CAAC,UAAU,IAAI,EAAE,CAAC;IACrD,CAAC;IAED,+CAA+C;IAC/C,KAAK,CAAC,OAAO,CAAC,MAAc;QAC1B,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;YACjB,MAAM,IAAI,8BAAkB,CAAC,sBAAsB,CAAC,CAAC;QACvD,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,IAAA,wBAAU,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,OAAO,EAAE,EAAE,IAAI,CAAC,cAAc,CAAC,CAAC;QACpF,MAAM,MAAM,GAAoB,IAAI,cAAc,CAAa;YAC7D,KAAK,CAAC,UAAU;gBACd,UAAU,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC,CAAC;gBAChD,UAAU,CAAC,KAAK,EAAE,CAAC;YACrB,CAAC;SACF,CAAC,CAAC;QACH,0CAA0C;QAC1C,sCAAsC;QACtC,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,iCAAiC;IACjC,KAAK,CAAC,KAAK;QACT,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;CACF"}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.PolicyType = exports.ResourceLocatorProtocol = void 0;
|
|
4
|
+
var CipherType;
|
|
5
|
+
(function (CipherType) {
|
|
6
|
+
CipherType[CipherType["Aes256Gcm64"] = 0] = "Aes256Gcm64";
|
|
7
|
+
CipherType[CipherType["Aes256Gcm96"] = 1] = "Aes256Gcm96";
|
|
8
|
+
CipherType[CipherType["Aes256Gcm104"] = 2] = "Aes256Gcm104";
|
|
9
|
+
CipherType[CipherType["Aes256Gcm112"] = 3] = "Aes256Gcm112";
|
|
10
|
+
CipherType[CipherType["Aes256Gcm120"] = 4] = "Aes256Gcm120";
|
|
11
|
+
CipherType[CipherType["Aes256Gcm128"] = 5] = "Aes256Gcm128";
|
|
12
|
+
})(CipherType || (CipherType = {}));
|
|
13
|
+
/**
|
|
14
|
+
* The Signature ECC Mode is used to determine the length of the signature at the end of a nanotdf. This, in
|
|
15
|
+
* combination with the previous HAS_SIGNATURE section, describe the signature of the nanotdf. The following table
|
|
16
|
+
* describes the valid values and the associated ECC Params.
|
|
17
|
+
*/
|
|
18
|
+
var CurveName;
|
|
19
|
+
(function (CurveName) {
|
|
20
|
+
CurveName[CurveName["Secp256R1"] = 0] = "Secp256R1";
|
|
21
|
+
CurveName[CurveName["Secp384R1"] = 1] = "Secp384R1";
|
|
22
|
+
CurveName[CurveName["Secp521R1"] = 2] = "Secp521R1";
|
|
23
|
+
})(CurveName || (CurveName = {}));
|
|
24
|
+
var ResourceLocatorProtocol;
|
|
25
|
+
(function (ResourceLocatorProtocol) {
|
|
26
|
+
ResourceLocatorProtocol[ResourceLocatorProtocol["Http"] = 0] = "Http";
|
|
27
|
+
ResourceLocatorProtocol[ResourceLocatorProtocol["Https"] = 1] = "Https";
|
|
28
|
+
ResourceLocatorProtocol[ResourceLocatorProtocol["Unreserverd"] = 2] = "Unreserverd";
|
|
29
|
+
ResourceLocatorProtocol[ResourceLocatorProtocol["SharedResourceDirectory"] = 255] = "SharedResourceDirectory";
|
|
30
|
+
})(ResourceLocatorProtocol || (exports.ResourceLocatorProtocol = ResourceLocatorProtocol = {}));
|
|
31
|
+
var PolicyType;
|
|
32
|
+
(function (PolicyType) {
|
|
33
|
+
PolicyType[PolicyType["Remote"] = 0] = "Remote";
|
|
34
|
+
PolicyType[PolicyType["EmbeddedText"] = 1] = "EmbeddedText";
|
|
35
|
+
PolicyType[PolicyType["EmbeddedEncrypted"] = 2] = "EmbeddedEncrypted";
|
|
36
|
+
PolicyType[PolicyType["EmbeddedEncryptedPKA"] = 3] = "EmbeddedEncryptedPKA";
|
|
37
|
+
})(PolicyType || (exports.PolicyType = PolicyType = {}));
|
|
38
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvdHlwZXMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiJ9
|
package/dist/cjs/src/utils.js
CHANGED
|
@@ -14,7 +14,7 @@ exports.getRequiredObligationFQNs = getRequiredObligationFQNs;
|
|
|
14
14
|
exports.upgradeRewrapResponseV1 = upgradeRewrapResponseV1;
|
|
15
15
|
const jose_1 = require("jose");
|
|
16
16
|
const index_js_1 = require("./encodings/index.js");
|
|
17
|
-
const pemPublicToCrypto_js_1 = require("./crypto/pemPublicToCrypto.js");
|
|
17
|
+
const pemPublicToCrypto_js_1 = require("./nanotdf-crypto/pemPublicToCrypto.js");
|
|
18
18
|
const errors_js_1 = require("./errors.js");
|
|
19
19
|
const kas_pb_js_1 = require("./platform/kas/kas_pb.js");
|
|
20
20
|
const protobuf_1 = require("@bufbuild/protobuf");
|
|
@@ -278,4 +278,4 @@ function upgradeRewrapResponseV1(response) {
|
|
|
278
278
|
}),
|
|
279
279
|
];
|
|
280
280
|
}
|
|
281
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
281
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/cjs/tdf3/index.js
CHANGED
|
@@ -33,7 +33,7 @@ var __importStar = (this && this.__importStar) || (function () {
|
|
|
33
33
|
};
|
|
34
34
|
})();
|
|
35
35
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
-
exports.OpenTDF = exports.WebCryptoService = exports.version = exports.withHeaders = exports.createSessionKeys = exports.clientType = exports.TDF3Client = exports.SplitKey = exports.HttpRequest = exports.Errors = exports.EncryptParamsBuilder = exports.DecryptParamsBuilder = exports.DecoratedReadableStream = exports.Client = exports.Binary = exports.AuthProviders = exports.Algorithms = exports.AesGcmCipher = void 0;
|
|
36
|
+
exports.OpenTDF = exports.WebCryptoService = exports.version = exports.withHeaders = exports.createSessionKeys = exports.clientType = exports.TDF3Client = exports.SplitKey = exports.NanoTDFDatasetClient = exports.NanoTDFClient = exports.HttpRequest = exports.Errors = exports.EncryptParamsBuilder = exports.DecryptParamsBuilder = exports.DecoratedReadableStream = exports.Client = exports.Binary = exports.AuthProviders = exports.Algorithms = exports.AesGcmCipher = void 0;
|
|
37
37
|
const binary_js_1 = require("./src/binary.js");
|
|
38
38
|
Object.defineProperty(exports, "Binary", { enumerable: true, get: function () { return binary_js_1.Binary; } });
|
|
39
39
|
const DecoratedReadableStream_js_1 = require("./src/client/DecoratedReadableStream.js");
|
|
@@ -54,14 +54,15 @@ Object.defineProperty(exports, "HttpRequest", { enumerable: true, get: function
|
|
|
54
54
|
Object.defineProperty(exports, "withHeaders", { enumerable: true, get: function () { return auth_js_1.withHeaders; } });
|
|
55
55
|
const aes_gcm_cipher_js_1 = require("./src/ciphers/aes-gcm-cipher.js");
|
|
56
56
|
Object.defineProperty(exports, "AesGcmCipher", { enumerable: true, get: function () { return aes_gcm_cipher_js_1.AesGcmCipher; } });
|
|
57
|
-
const
|
|
58
|
-
exports.
|
|
59
|
-
|
|
60
|
-
Object.defineProperty(exports, "
|
|
61
|
-
Object.defineProperty(exports, "
|
|
57
|
+
const nanoindex_js_1 = require("../src/nanoindex.js");
|
|
58
|
+
Object.defineProperty(exports, "NanoTDFClient", { enumerable: true, get: function () { return nanoindex_js_1.NanoTDFClient; } });
|
|
59
|
+
Object.defineProperty(exports, "NanoTDFDatasetClient", { enumerable: true, get: function () { return nanoindex_js_1.NanoTDFDatasetClient; } });
|
|
60
|
+
Object.defineProperty(exports, "AuthProviders", { enumerable: true, get: function () { return nanoindex_js_1.AuthProviders; } });
|
|
61
|
+
Object.defineProperty(exports, "version", { enumerable: true, get: function () { return nanoindex_js_1.version; } });
|
|
62
|
+
Object.defineProperty(exports, "clientType", { enumerable: true, get: function () { return nanoindex_js_1.clientType; } });
|
|
62
63
|
const algorithms_js_1 = require("./src/ciphers/algorithms.js");
|
|
63
64
|
Object.defineProperty(exports, "Algorithms", { enumerable: true, get: function () { return algorithms_js_1.Algorithms; } });
|
|
64
65
|
exports.WebCryptoService = __importStar(require("./src/crypto/index.js"));
|
|
65
66
|
var opentdf_js_1 = require("../src/opentdf.js");
|
|
66
67
|
Object.defineProperty(exports, "OpenTDF", { enumerable: true, get: function () { return opentdf_js_1.OpenTDF; } });
|
|
67
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
68
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -35,9 +35,9 @@ var __importStar = (this && this.__importStar) || (function () {
|
|
|
35
35
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
36
|
exports.Wrapped = exports.ECWrapped = exports.schemaVersion = void 0;
|
|
37
37
|
const index_js_1 = require("../../../src/encodings/index.js");
|
|
38
|
-
const generateRandomNumber_js_1 = require("../../../src/crypto/generateRandomNumber.js");
|
|
39
|
-
const keyAgreement_js_1 = require("../../../src/crypto/keyAgreement.js");
|
|
40
|
-
const pemPublicToCrypto_js_1 = require("../../../src/crypto/pemPublicToCrypto.js");
|
|
38
|
+
const generateRandomNumber_js_1 = require("../../../src/nanotdf-crypto/generateRandomNumber.js");
|
|
39
|
+
const keyAgreement_js_1 = require("../../../src/nanotdf-crypto/keyAgreement.js");
|
|
40
|
+
const pemPublicToCrypto_js_1 = require("../../../src/nanotdf-crypto/pemPublicToCrypto.js");
|
|
41
41
|
const utils_js_1 = require("../../../src/utils.js");
|
|
42
42
|
const binary_js_1 = require("../binary.js");
|
|
43
43
|
const cryptoService = __importStar(require("../crypto/index.js"));
|
|
@@ -133,4 +133,4 @@ class Wrapped {
|
|
|
133
133
|
}
|
|
134
134
|
}
|
|
135
135
|
exports.Wrapped = Wrapped;
|
|
136
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
136
|
+
//# sourceMappingURL=data:application/json;base64,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
|