@secrecy/lib 1.0.0-dev.27 → 1.0.0-dev.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/BaseClient.d.ts +274 -0
- package/dist/BaseClient.js +2227 -0
- package/dist/PopupTools.d.ts +17 -0
- package/dist/PopupTools.js +213 -0
- package/dist/ZeusThunder.d.ts +2 -0
- package/dist/ZeusThunder.js +113 -0
- package/dist/cache.d.ts +7 -0
- package/dist/cache.js +5 -0
- package/dist/client/admin/index.d.ts +11 -0
- package/dist/client/admin/index.js +198 -0
- package/dist/client/convert/file.d.ts +5 -0
- package/dist/client/convert/file.js +39 -0
- package/dist/client/convert/folder.d.ts +8 -0
- package/dist/client/convert/folder.js +264 -0
- package/dist/client/convert/mail.d.ts +3 -0
- package/dist/client/convert/mail.js +46 -0
- package/dist/client/convert/vFile.d.ts +5 -0
- package/dist/client/convert/vFile.js +164 -0
- package/dist/client/helpers.d.ts +23 -0
- package/dist/client/helpers.js +114 -0
- package/dist/client/index.d.ts +172 -0
- package/dist/client/index.js +6169 -0
- package/dist/client/storage.d.ts +7 -0
- package/dist/client/storage.js +12 -0
- package/dist/client/types/File.d.ts +21 -0
- package/dist/client/types/File.js +3 -0
- package/dist/client/types/FilesOnUsersOnApplications.d.ts +9 -0
- package/dist/client/types/FilesOnUsersOnApplications.js +3 -0
- package/dist/client/types/Folder.d.ts +68 -0
- package/dist/client/types/Folder.js +7 -0
- package/dist/client/types/Inputs.d.ts +21 -0
- package/dist/client/types/Inputs.js +3 -0
- package/dist/client/types/UserAppNotifications.d.ts +6 -0
- package/dist/client/types/UserAppNotifications.js +3 -0
- package/dist/client/types/UserAppSettings.d.ts +7 -0
- package/dist/client/types/UserAppSettings.js +3 -0
- package/dist/client/types/VFile.d.ts +62 -0
- package/dist/client/types/VFile.js +4 -0
- package/dist/client/types/index.d.ts +154 -0
- package/dist/client/types/index.js +10 -0
- package/dist/client/types/queries.d.ts +535 -0
- package/dist/client/types/queries.js +192 -0
- package/dist/crypto/file.d.ts +14 -0
- package/dist/crypto/file.js +291 -0
- package/dist/crypto/index.d.ts +12 -0
- package/dist/crypto/index.js +45 -0
- package/dist/error.d.ts +30 -0
- package/dist/error.js +3 -0
- package/dist/index.d.ts +13 -3857
- package/dist/index.js +42 -255
- package/dist/minify/index.d.ts +2 -0
- package/dist/minify/index.js +28 -0
- package/dist/minify/lz4.d.ts +5 -0
- package/dist/minify/lz4.js +633 -0
- package/dist/sodium.d.ts +3 -0
- package/dist/sodium.js +28 -0
- package/dist/utils/store-buddy.d.ts +14 -0
- package/dist/utils/store-buddy.js +69 -0
- package/dist/utils/time.d.ts +10 -0
- package/dist/utils/time.js +22 -0
- package/dist/utils.d.ts +4 -0
- package/dist/utils.js +188 -0
- package/dist/worker/__mock__/sodium.worker.d.ts +19 -0
- package/dist/worker/__mock__/sodium.worker.js +46 -0
- package/dist/worker/md5.d.ts +1 -0
- package/dist/worker/md5.js +43 -0
- package/dist/worker/sodium.d.ts +3 -0
- package/dist/worker/sodium.js +155 -0
- package/dist/worker/workerCodes.d.ts +2 -0
- package/dist/worker/workerCodes.js +3 -0
- package/dist/zeus/const.d.ts +2 -0
- package/dist/zeus/const.js +2267 -0
- package/dist/zeus/index.d.ts +4043 -0
- package/dist/zeus/index.js +549 -0
- package/package.json +23 -14
- package/__tests__/client/client.test.ts +0 -81
- package/__tests__/client/folder.test.ts +0 -302
- package/__tests__/client/mail.test.ts +0 -476
- package/__tests__/client/timing.test.ts +0 -35
- package/__tests__/client/utils.ts +0 -41
- package/__tests__/client/vFile.test.ts +0 -207
- package/__tests__/index.test.ts +0 -171
- package/commitlint.config.cjs +0 -3
- package/dist/index.js.map +0 -1
- package/dist/index.mjs +0 -255
- package/dist/index.mjs.map +0 -1
- package/docs/assets/css/main.css +0 -2660
- package/docs/assets/images/icons.png +0 -0
- package/docs/assets/images/icons@2x.png +0 -0
- package/docs/assets/images/widgets.png +0 -0
- package/docs/assets/images/widgets@2x.png +0 -0
- package/docs/assets/js/main.js +0 -248
- package/docs/assets/js/search.js +0 -1
- package/docs/classes/baseclient.baseclient-1.html +0 -1165
- package/docs/classes/client.secrecyclient.html +0 -2527
- package/docs/enums/index.sodium.base64_variants.html +0 -205
- package/docs/index.html +0 -198
- package/docs/interfaces/client_types.draftmail.html +0 -335
- package/docs/interfaces/client_types.filecontentbase.html +0 -231
- package/docs/interfaces/client_types.filecontentcloud.html +0 -244
- package/docs/interfaces/client_types.filecontentreceivedmail.html +0 -244
- package/docs/interfaces/client_types.filecontentsentmail.html +0 -230
- package/docs/interfaces/client_types.receivedmail.html +0 -363
- package/docs/interfaces/client_types.sentmail.html +0 -335
- package/docs/interfaces/crypto.keypair.html +0 -202
- package/docs/interfaces/index.sodium.cryptobox.html +0 -185
- package/docs/interfaces/index.sodium.cryptokx.html +0 -185
- package/docs/interfaces/index.sodium.keypair.html +0 -199
- package/docs/interfaces/index.sodium.messagetag.html +0 -185
- package/docs/interfaces/index.sodium.secretbox.html +0 -185
- package/docs/interfaces/index.sodium.stateaddress.html +0 -171
- package/docs/interfaces/index.sodium.stringcryptobox.html +0 -185
- package/docs/interfaces/index.sodium.stringcryptokx.html +0 -185
- package/docs/interfaces/index.sodium.stringkeypair.html +0 -199
- package/docs/interfaces/index.sodium.stringmessagetag.html +0 -185
- package/docs/interfaces/index.sodium.stringsecretbox.html +0 -185
- package/docs/interfaces/utils_store_buddy.storebuddy.html +0 -333
- package/docs/modules/baseclient.html +0 -929
- package/docs/modules/cache.html +0 -185
- package/docs/modules/client.html +0 -207
- package/docs/modules/client_convert_file.html +0 -216
- package/docs/modules/client_convert_folder.html +0 -303
- package/docs/modules/client_convert_vfile.html +0 -216
- package/docs/modules/client_helpers.html +0 -311
- package/docs/modules/client_storage.html +0 -167
- package/docs/modules/client_types.html +0 -1227
- package/docs/modules/client_types_file.html +0 -233
- package/docs/modules/client_types_filesonusersonapplications.html +0 -168
- package/docs/modules/client_types_folder.html +0 -383
- package/docs/modules/client_types_inputs.html +0 -263
- package/docs/modules/client_types_mail.html +0 -181
- package/docs/modules/client_types_queries.html +0 -199
- package/docs/modules/client_types_userappsettings.html +0 -163
- package/docs/modules/client_types_vfile.html +0 -364
- package/docs/modules/crypto.html +0 -366
- package/docs/modules/crypto_file.html +0 -344
- package/docs/modules/index.html +0 -779
- package/docs/modules/index.sodium.html +0 -6039
- package/docs/modules/minify.html +0 -183
- package/docs/modules/minify_lz4.html +0 -279
- package/docs/modules/popuptools.html +0 -259
- package/docs/modules/sodium.html +0 -167
- package/docs/modules/utils.html +0 -219
- package/docs/modules/utils_store_buddy.html +0 -208
- package/docs/modules/utils_time.html +0 -330
- package/docs/modules/worker_md5.html +0 -156
- package/docs/modules/worker_sodium.html +0 -231
- package/docs/modules/worker_workercodes.html +0 -157
- package/docs/modules.html +0 -235
- package/index.html +0 -21
- package/jest.config.ts +0 -27
- package/jest.setup.ts +0 -6
- package/release.config.cjs +0 -15
- package/tsup.config.ts +0 -26
|
@@ -0,0 +1,155 @@
|
|
|
1
|
+
import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
|
|
2
|
+
import _regeneratorRuntime from "@babel/runtime/regenerator";
|
|
3
|
+
import { workerSodiumScript } from "./workerCodes.js"; // const ensureNonDetachedUniqueBuffers = (
|
|
4
|
+
// values: Transferable[]
|
|
5
|
+
// ): Set<Transferable> =>
|
|
6
|
+
// new Set(
|
|
7
|
+
// values.filter(v => {
|
|
8
|
+
// if (v instanceof ArrayBuffer) {
|
|
9
|
+
// return v.byteLength === 0;
|
|
10
|
+
// } else {
|
|
11
|
+
// return true;
|
|
12
|
+
// }
|
|
13
|
+
// })
|
|
14
|
+
// );
|
|
15
|
+
|
|
16
|
+
export function encrypt(_x, _x2, _x3, _x4) {
|
|
17
|
+
return _encrypt.apply(this, arguments);
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
function _encrypt() {
|
|
21
|
+
_encrypt = _asyncToGenerator( /*#__PURE__*/_regeneratorRuntime.mark(function _callee(key, dataToEncrypt, progress, signal) {
|
|
22
|
+
return _regeneratorRuntime.wrap(function _callee$(_context) {
|
|
23
|
+
while (1) {
|
|
24
|
+
switch (_context.prev = _context.next) {
|
|
25
|
+
case 0:
|
|
26
|
+
return _context.abrupt("return", new Promise(function (resolve, reject) {
|
|
27
|
+
progress == null ? void 0 : progress({
|
|
28
|
+
current: 0,
|
|
29
|
+
percent: 0,
|
|
30
|
+
total: dataToEncrypt.byteLength
|
|
31
|
+
});
|
|
32
|
+
var worker = new Worker(URL.createObjectURL(new Blob([workerSodiumScript], {
|
|
33
|
+
type: "text/javascript"
|
|
34
|
+
})));
|
|
35
|
+
worker.addEventListener("error", reject);
|
|
36
|
+
worker.addEventListener("messageerror", reject);
|
|
37
|
+
worker.addEventListener("message", function (_ref) {
|
|
38
|
+
var data = _ref.data;
|
|
39
|
+
|
|
40
|
+
switch (data.event) {
|
|
41
|
+
case "ready":
|
|
42
|
+
{
|
|
43
|
+
var postData = {
|
|
44
|
+
event: "encrypt",
|
|
45
|
+
data: dataToEncrypt,
|
|
46
|
+
key: key
|
|
47
|
+
};
|
|
48
|
+
worker.postMessage(postData, [postData.data.buffer] // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.
|
|
49
|
+
// ensureNonDetachedUniqueBuffers([postData.data.buffer])
|
|
50
|
+
);
|
|
51
|
+
break;
|
|
52
|
+
}
|
|
53
|
+
|
|
54
|
+
case "encrypt-progress":
|
|
55
|
+
{
|
|
56
|
+
if (signal != null && signal.aborted) {
|
|
57
|
+
var abortError = new Error("Aborted");
|
|
58
|
+
abortError.name = "AbortError";
|
|
59
|
+
worker.terminate();
|
|
60
|
+
reject(abortError);
|
|
61
|
+
}
|
|
62
|
+
|
|
63
|
+
progress == null ? void 0 : progress(data.data);
|
|
64
|
+
break;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
case "encrypt-result":
|
|
68
|
+
{
|
|
69
|
+
worker.terminate();
|
|
70
|
+
return resolve(data.data);
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
});
|
|
74
|
+
}));
|
|
75
|
+
|
|
76
|
+
case 1:
|
|
77
|
+
case "end":
|
|
78
|
+
return _context.stop();
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
}, _callee);
|
|
82
|
+
}));
|
|
83
|
+
return _encrypt.apply(this, arguments);
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
export function decrypt(_x5, _x6, _x7, _x8) {
|
|
87
|
+
return _decrypt.apply(this, arguments);
|
|
88
|
+
}
|
|
89
|
+
|
|
90
|
+
function _decrypt() {
|
|
91
|
+
_decrypt = _asyncToGenerator( /*#__PURE__*/_regeneratorRuntime.mark(function _callee2(key, dataToDecrypt, progress, signal) {
|
|
92
|
+
return _regeneratorRuntime.wrap(function _callee2$(_context2) {
|
|
93
|
+
while (1) {
|
|
94
|
+
switch (_context2.prev = _context2.next) {
|
|
95
|
+
case 0:
|
|
96
|
+
return _context2.abrupt("return", new Promise(function (resolve, reject) {
|
|
97
|
+
progress == null ? void 0 : progress({
|
|
98
|
+
current: 0,
|
|
99
|
+
percent: 0,
|
|
100
|
+
total: dataToDecrypt.byteLength
|
|
101
|
+
});
|
|
102
|
+
var worker = new Worker(URL.createObjectURL(new Blob([workerSodiumScript], {
|
|
103
|
+
type: "text/javascript"
|
|
104
|
+
})));
|
|
105
|
+
worker.addEventListener("error", reject);
|
|
106
|
+
worker.addEventListener("messageerror", reject);
|
|
107
|
+
worker.addEventListener("message", function (_ref2) {
|
|
108
|
+
var data = _ref2.data;
|
|
109
|
+
|
|
110
|
+
switch (data.event) {
|
|
111
|
+
case "ready":
|
|
112
|
+
{
|
|
113
|
+
var postData = {
|
|
114
|
+
event: "decrypt",
|
|
115
|
+
key: key,
|
|
116
|
+
data: dataToDecrypt
|
|
117
|
+
};
|
|
118
|
+
worker.postMessage(postData, [postData.data.buffer] // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.
|
|
119
|
+
// ensureNonDetachedUniqueBuffers([postData.data.buffer])
|
|
120
|
+
);
|
|
121
|
+
break;
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
case "decrypt-progress":
|
|
125
|
+
{
|
|
126
|
+
if (signal != null && signal.aborted) {
|
|
127
|
+
var abortError = new Error("Aborted");
|
|
128
|
+
abortError.name = "AbortError";
|
|
129
|
+
worker.terminate();
|
|
130
|
+
reject(abortError);
|
|
131
|
+
}
|
|
132
|
+
|
|
133
|
+
progress == null ? void 0 : progress(data.data);
|
|
134
|
+
break;
|
|
135
|
+
}
|
|
136
|
+
|
|
137
|
+
case "decrypt-result":
|
|
138
|
+
{
|
|
139
|
+
worker.terminate();
|
|
140
|
+
return resolve(data.data);
|
|
141
|
+
}
|
|
142
|
+
}
|
|
143
|
+
});
|
|
144
|
+
}));
|
|
145
|
+
|
|
146
|
+
case 1:
|
|
147
|
+
case "end":
|
|
148
|
+
return _context2.stop();
|
|
149
|
+
}
|
|
150
|
+
}
|
|
151
|
+
}, _callee2);
|
|
152
|
+
}));
|
|
153
|
+
return _decrypt.apply(this, arguments);
|
|
154
|
+
}
|
|
155
|
+
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"sources":["../../src/worker/sodium.ts"],"names":["workerSodiumScript","encrypt","key","dataToEncrypt","progress","signal","Promise","resolve","reject","current","percent","total","byteLength","worker","Worker","URL","createObjectURL","Blob","type","addEventListener","data","event","postData","postMessage","buffer","aborted","abortError","Error","name","terminate","decrypt","dataToDecrypt"],"mappings":";;AACA,SAASA,kBAAT,QAAmC,kBAAnC,C,CAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,gBAAsBC,OAAtB;AAAA;AAAA;;;sEAAO,iBACLC,GADK,EAELC,aAFK,EAGLC,QAHK,EAILC,MAJK;AAAA;AAAA;AAAA;AAAA;AAAA,6CAME,IAAIC,OAAJ,CAAY,UAACC,OAAD,EAAUC,MAAV,EAAqB;AACtCJ,cAAAA,QAAQ,QAAR,YAAAA,QAAQ,CAAG;AACTK,gBAAAA,OAAO,EAAE,CADA;AAETC,gBAAAA,OAAO,EAAE,CAFA;AAGTC,gBAAAA,KAAK,EAAER,aAAa,CAACS;AAHZ,eAAH,CAAR;AAKA,kBAAMC,MAAM,GAAG,IAAIC,MAAJ,CACbC,GAAG,CAACC,eAAJ,CACE,IAAIC,IAAJ,CAAS,CAACjB,kBAAD,CAAT,EAA+B;AAAEkB,gBAAAA,IAAI,EAAE;AAAR,eAA/B,CADF,CADa,CAAf;AAKAL,cAAAA,MAAM,CAACM,gBAAP,CAAwB,OAAxB,EAAiCX,MAAjC;AACAK,cAAAA,MAAM,CAACM,gBAAP,CAAwB,cAAxB,EAAwCX,MAAxC;AACAK,cAAAA,MAAM,CAACM,gBAAP,CAAwB,SAAxB,EAAmC,gBAAc;AAAA,oBAAXC,IAAW,QAAXA,IAAW;;AAC/C,wBAAQA,IAAI,CAACC,KAAb;AACE,uBAAK,OAAL;AAAc;AACZ,0BAAMC,QAAQ,GAAG;AACfD,wBAAAA,KAAK,EAAE,SADQ;AAEfD,wBAAAA,IAAI,EAAEjB,aAFS;AAGfD,wBAAAA,GAAG,EAAHA;AAHe,uBAAjB;AAKAW,sBAAAA,MAAM,CAACU,WAAP,CACED,QADF,EAEE,CAACA,QAAQ,CAACF,IAAT,CAAcI,MAAf,CAFF,CAGE;AACA;AAJF;AAMA;AACD;;AACD,uBAAK,kBAAL;AAAyB;AACvB,0BAAInB,MAAJ,YAAIA,MAAM,CAAEoB,OAAZ,EAAqB;AACnB,4BAAMC,UAAU,GAAG,IAAIC,KAAJ,CAAU,SAAV,CAAnB;AACAD,wBAAAA,UAAU,CAACE,IAAX,GAAkB,YAAlB;AACAf,wBAAAA,MAAM,CAACgB,SAAP;AACArB,wBAAAA,MAAM,CAACkB,UAAD,CAAN;AACD;;AACDtB,sBAAAA,QAAQ,QAAR,YAAAA,QAAQ,CAAGgB,IAAI,CAACA,IAAR,CAAR;AACA;AACD;;AACD,uBAAK,gBAAL;AAAuB;AACrBP,sBAAAA,MAAM,CAACgB,SAAP;AACA,6BAAOtB,OAAO,CAACa,IAAI,CAACA,IAAN,CAAd;AACD;AA5BH;AA8BD,eA/BD;AAgCD,aA7CM,CANF;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,G;;;;AAsDP,gBAAsBU,OAAtB;AAAA;AAAA;;;sEAAO,kBACL5B,GADK,EAEL6B,aAFK,EAGL3B,QAHK,EAILC,MAJK;AAAA;AAAA;AAAA;AAAA;AAAA,8CAME,IAAIC,OAAJ,CAAY,UAACC,OAAD,EAAUC,MAAV,EAAqB;AACtCJ,cAAAA,QAAQ,QAAR,YAAAA,QAAQ,CAAG;AACTK,gBAAAA,OAAO,EAAE,CADA;AAETC,gBAAAA,OAAO,EAAE,CAFA;AAGTC,gBAAAA,KAAK,EAAEoB,aAAa,CAACnB;AAHZ,eAAH,CAAR;AAKA,kBAAMC,MAAM,GAAG,IAAIC,MAAJ,CACbC,GAAG,CAACC,eAAJ,CACE,IAAIC,IAAJ,CAAS,CAACjB,kBAAD,CAAT,EAA+B;AAAEkB,gBAAAA,IAAI,EAAE;AAAR,eAA/B,CADF,CADa,CAAf;AAKAL,cAAAA,MAAM,CAACM,gBAAP,CAAwB,OAAxB,EAAiCX,MAAjC;AACAK,cAAAA,MAAM,CAACM,gBAAP,CAAwB,cAAxB,EAAwCX,MAAxC;AAEAK,cAAAA,MAAM,CAACM,gBAAP,CAAwB,SAAxB,EAAmC,iBAAc;AAAA,oBAAXC,IAAW,SAAXA,IAAW;;AAC/C,wBAAQA,IAAI,CAACC,KAAb;AACE,uBAAK,OAAL;AAAc;AACZ,0BAAMC,QAAQ,GAAG;AACfD,wBAAAA,KAAK,EAAE,SADQ;AAEfnB,wBAAAA,GAAG,EAAHA,GAFe;AAGfkB,wBAAAA,IAAI,EAAEW;AAHS,uBAAjB;AAKAlB,sBAAAA,MAAM,CAACU,WAAP,CACED,QADF,EAEE,CAACA,QAAQ,CAACF,IAAT,CAAcI,MAAf,CAFF,CAGE;AACA;AAJF;AAMA;AACD;;AACD,uBAAK,kBAAL;AAAyB;AACvB,0BAAInB,MAAJ,YAAIA,MAAM,CAAEoB,OAAZ,EAAqB;AACnB,4BAAMC,UAAU,GAAG,IAAIC,KAAJ,CAAU,SAAV,CAAnB;AACAD,wBAAAA,UAAU,CAACE,IAAX,GAAkB,YAAlB;AACAf,wBAAAA,MAAM,CAACgB,SAAP;AACArB,wBAAAA,MAAM,CAACkB,UAAD,CAAN;AACD;;AACDtB,sBAAAA,QAAQ,QAAR,YAAAA,QAAQ,CAAGgB,IAAI,CAACA,IAAR,CAAR;AACA;AACD;;AACD,uBAAK,gBAAL;AAAuB;AACrBP,sBAAAA,MAAM,CAACgB,SAAP;AACA,6BAAOtB,OAAO,CAACa,IAAI,CAACA,IAAN,CAAd;AACD;AA5BH;AA8BD,eA/BD;AAgCD,aA9CM,CANF;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,G","sourcesContent":["import type { EncryptedFile, Progress } from \"../crypto/file.js\";\nimport { workerSodiumScript } from \"./workerCodes.js\";\n\n// const ensureNonDetachedUniqueBuffers = (\n//   values: Transferable[]\n// ): Set<Transferable> =>\n//   new Set(\n//     values.filter(v => {\n//       if (v instanceof ArrayBuffer) {\n//         return v.byteLength === 0;\n//       } else {\n//         return true;\n//       }\n//     })\n//   );\n\nexport async function encrypt(\n  key: Uint8Array,\n  dataToEncrypt: Uint8Array,\n  progress?: (progress: Progress) => Promise<void>,\n  signal?: AbortSignal\n): Promise<EncryptedFile> {\n  return new Promise((resolve, reject) => {\n    progress?.({\n      current: 0,\n      percent: 0,\n      total: dataToEncrypt.byteLength\n    });\n    const worker = new Worker(\n      URL.createObjectURL(\n        new Blob([workerSodiumScript], { type: \"text/javascript\" })\n      )\n    );\n    worker.addEventListener(\"error\", reject);\n    worker.addEventListener(\"messageerror\", reject);\n    worker.addEventListener(\"message\", ({ data }) => {\n      switch (data.event) {\n        case \"ready\": {\n          const postData = {\n            event: \"encrypt\",\n            data: dataToEncrypt,\n            key\n          };\n          worker.postMessage(\n            postData,\n            [postData.data.buffer]\n            // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.\n            // ensureNonDetachedUniqueBuffers([postData.data.buffer])\n          );\n          break;\n        }\n        case \"encrypt-progress\": {\n          if (signal?.aborted) {\n            const abortError = new Error(\"Aborted\");\n            abortError.name = \"AbortError\";\n            worker.terminate();\n            reject(abortError);\n          }\n          progress?.(data.data);\n          break;\n        }\n        case \"encrypt-result\": {\n          worker.terminate();\n          return resolve(data.data);\n        }\n      }\n    });\n  });\n}\n\nexport async function decrypt(\n  key: Uint8Array,\n  dataToDecrypt: Uint8Array,\n  progress?: (progress: Progress) => Promise<void>,\n  signal?: AbortSignal\n): Promise<Uint8Array> {\n  return new Promise((resolve, reject) => {\n    progress?.({\n      current: 0,\n      percent: 0,\n      total: dataToDecrypt.byteLength\n    });\n    const worker = new Worker(\n      URL.createObjectURL(\n        new Blob([workerSodiumScript], { type: \"text/javascript\" })\n      )\n    );\n    worker.addEventListener(\"error\", reject);\n    worker.addEventListener(\"messageerror\", reject);\n\n    worker.addEventListener(\"message\", ({ data }) => {\n      switch (data.event) {\n        case \"ready\": {\n          const postData = {\n            event: \"decrypt\",\n            key,\n            data: dataToDecrypt\n          };\n          worker.postMessage(\n            postData,\n            [postData.data.buffer]\n            // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.\n            // ensureNonDetachedUniqueBuffers([postData.data.buffer])\n          );\n          break;\n        }\n        case \"decrypt-progress\": {\n          if (signal?.aborted) {\n            const abortError = new Error(\"Aborted\");\n            abortError.name = \"AbortError\";\n            worker.terminate();\n            reject(abortError);\n          }\n          progress?.(data.data);\n          break;\n        }\n        case \"decrypt-result\": {\n          worker.terminate();\n          return resolve(data.data);\n        }\n      }\n    });\n  });\n}\n"]}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
export declare const workerSodiumScript = "let sodium;\n\nself.sodium = {\n onload: (sod) => {\n sodium = sod\n postMessage({ event: \"ready\" })\n }\n};\n\nimportScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');\nimportScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nfunction assert(c, message) {\n if (!c) {\n throw new Error(message);\n }\n}\n\nfunction encrypt(key) {\n let destroyed = false;\n const {\n state,\n header\n } = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);\n\n const encrypt = (tag, plaintext) => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_push(\n state,\n plaintext,\n null,\n tag\n );\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n encrypt,\n destroy,\n header\n };\n}\n\nfunction decrypt(header, key) {\n assert(\n header.byteLength >=\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,\n \"header must be at least HEADERBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + \") long\"\n );\n assert(\n key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,\n \"key must be at least KEYBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + \") long\"\n );\n\n let destroyed = false;\n const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(\n header,\n key\n );\n\n const decrypt = ciphertext => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n decrypt,\n destroy\n };\n}\n\nconst CHUNK_SIZE = 8192;\n\nasync function encryptSecretstream(key, data, progress) {\n const { encrypt: crypt, destroy, header } = encrypt(key);\n const cryptedChunk =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max =\n Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n const sparkEncrypted = new SparkMD5.ArrayBuffer();\n const spark = new SparkMD5.ArrayBuffer();\n\n final.set(header);\n sparkEncrypted.append(header);\n let total = header.byteLength;\n progress?.({\n percent: total / max,\n total: max,\n current: total\n });\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n const tag =\n chunk.length < CHUNK_SIZE\n ? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL\n : sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;\n const crypted = crypt(tag, chunk);\n sparkEncrypted.append(crypted);\n final.set(crypted, total);\n total += crypted.byteLength;\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return {\n data: final.slice(0, total),\n md5Encrypted: sparkEncrypted.end(),\n md5: spark.end()\n };\n}\n\nasync function decryptSecretstream(key, data, progress) {\n const header = data.slice(\n 0,\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES\n );\n data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);\n\n const { decrypt: decryptt, destroy } = decrypt(header, key);\n const chunkSize =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n let total = 0;\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, chunkSize)) {\n const tmp = decryptt(chunk);\n final.set(tmp.message, total);\n total += tmp.message.byteLength;\n\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return final.slice(0, total);\n}\n\nself.onmessage = async ({ data }) => {\n switch (data.event) {\n case \"encrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"encrypt-result\",\n data: await encryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"encrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n case \"decrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"decrypt-result\",\n data: await decryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"decrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n }\n}";
|
|
2
|
+
export declare const workerMd5Script = "importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nconst CHUNK_SIZE = 8192;\n\nfunction md5(data) {\n const spark = new SparkMD5.ArrayBuffer();\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n }\n return spark.end();\n}\n\n\nself.onmessage = ({ data }) => {\n switch (data.event) {\n case \"md5\": {\n postMessage({\n event: \"md5-result\",\n data: md5(data.data)\n });\n break;\n }\n }\n}";
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
export var workerSodiumScript = "let sodium;\n\nself.sodium = {\n onload: (sod) => {\n sodium = sod\n postMessage({ event: \"ready\" })\n }\n};\n\nimportScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');\nimportScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nfunction assert(c, message) {\n if (!c) {\n throw new Error(message);\n }\n}\n\nfunction encrypt(key) {\n let destroyed = false;\n const {\n state,\n header\n } = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);\n\n const encrypt = (tag, plaintext) => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_push(\n state,\n plaintext,\n null,\n tag\n );\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n encrypt,\n destroy,\n header\n };\n}\n\nfunction decrypt(header, key) {\n assert(\n header.byteLength >=\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,\n \"header must be at least HEADERBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + \") long\"\n );\n assert(\n key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,\n \"key must be at least KEYBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + \") long\"\n );\n\n let destroyed = false;\n const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(\n header,\n key\n );\n\n const decrypt = ciphertext => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n decrypt,\n destroy\n };\n}\n\nconst CHUNK_SIZE = 8192;\n\nasync function encryptSecretstream(key, data, progress) {\n const { encrypt: crypt, destroy, header } = encrypt(key);\n const cryptedChunk =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max =\n Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n const sparkEncrypted = new SparkMD5.ArrayBuffer();\n const spark = new SparkMD5.ArrayBuffer();\n\n final.set(header);\n sparkEncrypted.append(header);\n let total = header.byteLength;\n progress?.({\n percent: total / max,\n total: max,\n current: total\n });\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n const tag =\n chunk.length < CHUNK_SIZE\n ? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL\n : sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;\n const crypted = crypt(tag, chunk);\n sparkEncrypted.append(crypted);\n final.set(crypted, total);\n total += crypted.byteLength;\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return {\n data: final.slice(0, total),\n md5Encrypted: sparkEncrypted.end(),\n md5: spark.end()\n };\n}\n\nasync function decryptSecretstream(key, data, progress) {\n const header = data.slice(\n 0,\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES\n );\n data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);\n\n const { decrypt: decryptt, destroy } = decrypt(header, key);\n const chunkSize =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n let total = 0;\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, chunkSize)) {\n const tmp = decryptt(chunk);\n final.set(tmp.message, total);\n total += tmp.message.byteLength;\n\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return final.slice(0, total);\n}\n\nself.onmessage = async ({ data }) => {\n switch (data.event) {\n case \"encrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"encrypt-result\",\n data: await encryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"encrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n case \"decrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"decrypt-result\",\n data: await decryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"decrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n }\n}";
|
|
2
|
+
export var workerMd5Script = "importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nconst CHUNK_SIZE = 8192;\n\nfunction md5(data) {\n const spark = new SparkMD5.ArrayBuffer();\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n }\n return spark.end();\n}\n\n\nself.onmessage = ({ data }) => {\n switch (data.event) {\n case \"md5\": {\n postMessage({\n event: \"md5-result\",\n data: md5(data.data)\n });\n break;\n }\n }\n}";
|
|
3
|
+
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"sources":["../../src/worker/workerCodes.ts"],"names":["workerSodiumScript","workerMd5Script"],"mappings":"AAAA,OAAO,IAAMA,kBAAkB,w8KAAxB;AAiOP,OAAO,IAAMC,eAAe,6mBAArB","sourcesContent":["export const workerSodiumScript = `let sodium;\n\nself.sodium = {\n  onload: (sod) => {\n    sodium = sod\n    postMessage({ event: \"ready\" })\n  }\n};\n\nimportScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');\nimportScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n  for (let i = 0; i < arr.length; i += n) {\n    yield arr.slice(i, i + n);\n  }\n}\n\nfunction assert(c, message) {\n  if (!c) {\n    throw new Error(message);\n  }\n}\n\nfunction encrypt(key) {\n  let destroyed = false;\n  const {\n    state,\n    header\n  } = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);\n\n  const encrypt = (tag, plaintext) => {\n    assert(destroyed === false, \"state already destroyed\");\n\n    return sodium.crypto_secretstream_xchacha20poly1305_push(\n      state,\n      plaintext,\n      null,\n      tag\n    );\n  };\n\n  function destroy() {\n    assert(destroyed === false, \"state already destroyed\");\n    destroyed = true;\n  }\n\n  return {\n    encrypt,\n    destroy,\n    header\n  };\n}\n\nfunction decrypt(header, key) {\n  assert(\n    header.byteLength >=\n      sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,\n    \"header must be at least HEADERBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + \") long\"\n  );\n  assert(\n    key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,\n    \"key must be at least KEYBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + \") long\"\n  );\n\n  let destroyed = false;\n  const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(\n    header,\n    key\n  );\n\n  const decrypt = ciphertext => {\n    assert(destroyed === false, \"state already destroyed\");\n\n    return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);\n  };\n\n  function destroy() {\n    assert(destroyed === false, \"state already destroyed\");\n    destroyed = true;\n  }\n\n  return {\n    decrypt,\n    destroy\n  };\n}\n\nconst CHUNK_SIZE = 8192;\n\nasync function encryptSecretstream(key, data, progress) {\n  const { encrypt: crypt, destroy, header } = encrypt(key);\n  const cryptedChunk =\n    CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n  const max =\n    Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;\n\n  progress?.({\n    percent: 0,\n    total: max,\n    current: 0\n  });\n  const final = new Uint8Array(max);\n  const sparkEncrypted = new SparkMD5.ArrayBuffer();\n  const spark = new SparkMD5.ArrayBuffer();\n\n  final.set(header);\n  sparkEncrypted.append(header);\n  let total = header.byteLength;\n  progress?.({\n    percent: total / max,\n    total: max,\n    current: total\n  });\n  let lastPercent = total / max;\n\n  for (const chunk of chunks(data, CHUNK_SIZE)) {\n    spark.append(chunk);\n    const tag =\n      chunk.length < CHUNK_SIZE\n        ? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL\n        : sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;\n    const crypted = crypt(tag, chunk);\n    sparkEncrypted.append(crypted);\n    final.set(crypted, total);\n    total += crypted.byteLength;\n    const percent = total / max;\n    if (percent > lastPercent + 0.01) {\n      progress?.({\n        percent,\n        total: max,\n        current: total\n      });\n      lastPercent = percent;\n    }\n  }\n\n  destroy();\n  progress?.({\n    percent: 1,\n    total,\n    current: total\n  });\n  return {\n    data: final.slice(0, total),\n    md5Encrypted: sparkEncrypted.end(),\n    md5: spark.end()\n  };\n}\n\nasync function decryptSecretstream(key, data, progress) {\n  const header = data.slice(\n    0,\n    sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES\n  );\n  data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);\n\n  const { decrypt: decryptt, destroy } = decrypt(header, key);\n  const chunkSize =\n    CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n  const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;\n\n  progress?.({\n    percent: 0,\n    total: max,\n    current: 0\n  });\n  const final = new Uint8Array(max);\n  let total = 0;\n  let lastPercent = total / max;\n\n  for (const chunk of chunks(data, chunkSize)) {\n    const tmp = decryptt(chunk);\n    final.set(tmp.message, total);\n    total += tmp.message.byteLength;\n\n    const percent = total / max;\n    if (percent > lastPercent + 0.01) {\n      progress?.({\n        percent,\n        total: max,\n        current: total\n      });\n      lastPercent = percent;\n    }\n  }\n\n  destroy();\n  progress?.({\n    percent: 1,\n    total,\n    current: total\n  });\n  return final.slice(0, total);\n}\n\nself.onmessage = async ({ data }) => {\n  switch (data.event) {\n    case \"encrypt\": {\n      postMessage({ event: \"working\" })\n      postMessage({\n        event: \"encrypt-result\",\n        data: await encryptSecretstream(data.key, data.data, progress => postMessage({\n          event: \"encrypt-progress\",\n          data: progress\n        }))\n      });\n      postMessage({ event: \"ready\" })\n      break;\n    }\n    case \"decrypt\": {\n      postMessage({ event: \"working\" })\n      postMessage({\n        event: \"decrypt-result\",\n        data: await decryptSecretstream(data.key, data.data, progress => postMessage({\n          event: \"decrypt-progress\",\n          data: progress\n        }))\n      });\n      postMessage({ event: \"ready\" })\n      break;\n    }\n  }\n}`;\n\nexport const workerMd5Script = `importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n  for (let i = 0; i < arr.length; i += n) {\n    yield arr.slice(i, i + n);\n  }\n}\n\nconst CHUNK_SIZE = 8192;\n\nfunction md5(data) {\n  const spark = new SparkMD5.ArrayBuffer();\n  for (const chunk of chunks(data, CHUNK_SIZE)) {\n    spark.append(chunk);\n  }\n  return spark.end();\n}\n\n\nself.onmessage = ({ data }) => {\n  switch (data.event) {\n    case \"md5\": {\n      postMessage({\n        event: \"md5-result\",\n        data: md5(data.data)\n      });\n      break;\n    }\n  }\n}`;\n"]}
|