@secrecy/lib 1.0.0-dev.63 → 1.0.0-dev.65
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/BaseClient-15fdf493.d.ts +351 -0
- package/dist/BaseClient.cjs +2 -0
- package/dist/BaseClient.cjs.map +1 -0
- package/dist/BaseClient.d.ts +16 -104
- package/dist/BaseClient.js +2 -482
- package/dist/BaseClient.js.map +1 -0
- package/dist/PopupTools.cjs +2 -0
- package/dist/PopupTools.cjs.map +1 -0
- package/dist/PopupTools.d.ts +5 -4
- package/dist/PopupTools.js +2 -216
- package/dist/PopupTools.js.map +1 -0
- package/dist/ZeusThunder.cjs +2 -0
- package/dist/ZeusThunder.cjs.map +1 -0
- package/dist/ZeusThunder.d.ts +6 -2
- package/dist/ZeusThunder.js +2 -79
- package/dist/ZeusThunder.js.map +1 -0
- package/dist/cache.cjs +2 -0
- package/dist/cache.cjs.map +1 -0
- package/dist/cache.d.ts +22 -4
- package/dist/cache.js +2 -4
- package/dist/cache.js.map +1 -0
- package/dist/chunk-5WPCTUWH.cjs +2 -0
- package/dist/chunk-5WPCTUWH.cjs.map +1 -0
- package/dist/chunk-KMTF2BZE.js +2 -0
- package/dist/chunk-KMTF2BZE.js.map +1 -0
- package/dist/client/SecrecyAppClient.cjs +2 -0
- package/dist/client/SecrecyAppClient.cjs.map +1 -0
- package/dist/client/SecrecyAppClient.d.ts +16 -17
- package/dist/client/SecrecyAppClient.js +2 -256
- package/dist/client/SecrecyAppClient.js.map +1 -0
- package/dist/client/SecrecyCloudClient.cjs +2 -0
- package/dist/client/SecrecyCloudClient.cjs.map +1 -0
- package/dist/client/SecrecyCloudClient.d.ts +16 -89
- package/dist/client/SecrecyCloudClient.js +2 -1627
- package/dist/client/SecrecyCloudClient.js.map +1 -0
- package/dist/client/SecrecyDbClient.cjs +2 -0
- package/dist/client/SecrecyDbClient.cjs.map +1 -0
- package/dist/client/SecrecyDbClient.d.ts +16 -21
- package/dist/client/SecrecyDbClient.js +2 -198
- package/dist/client/SecrecyDbClient.js.map +1 -0
- package/dist/client/SecrecyMailClient.cjs +2 -0
- package/dist/client/SecrecyMailClient.cjs.map +1 -0
- package/dist/client/SecrecyMailClient.d.ts +16 -42
- package/dist/client/SecrecyMailClient.js +2 -1187
- package/dist/client/SecrecyMailClient.js.map +1 -0
- package/dist/client/SecrecyPayClient.cjs +2 -0
- package/dist/client/SecrecyPayClient.cjs.map +1 -0
- package/dist/client/SecrecyPayClient.d.ts +16 -7
- package/dist/client/SecrecyPayClient.js +2 -37
- package/dist/client/SecrecyPayClient.js.map +1 -0
- package/dist/client/SecrecyWalletClient.cjs +2 -0
- package/dist/client/SecrecyWalletClient.cjs.map +1 -0
- package/dist/client/SecrecyWalletClient.d.ts +16 -30
- package/dist/client/SecrecyWalletClient.js +2 -76
- package/dist/client/SecrecyWalletClient.js.map +1 -0
- package/dist/client/convert/file.cjs +2 -0
- package/dist/client/convert/file.cjs.map +1 -0
- package/dist/client/convert/file.d.ts +11 -5
- package/dist/client/convert/file.js +2 -34
- package/dist/client/convert/file.js.map +1 -0
- package/dist/client/convert/mail.cjs +2 -0
- package/dist/client/convert/mail.cjs.map +1 -0
- package/dist/client/convert/mail.d.ts +13 -3
- package/dist/client/convert/mail.js +2 -48
- package/dist/client/convert/mail.js.map +1 -0
- package/dist/client/convert/node.cjs +2 -0
- package/dist/client/convert/node.cjs.map +1 -0
- package/dist/client/convert/node.d.ts +18 -9
- package/dist/client/convert/node.js +2 -100
- package/dist/client/convert/node.js.map +1 -0
- package/dist/client/helpers.cjs +2 -0
- package/dist/client/helpers.cjs.map +1 -0
- package/dist/client/helpers.d.ts +16 -28
- package/dist/client/helpers.js +2 -126
- package/dist/client/helpers.js.map +1 -0
- package/dist/client/index.cjs +2 -0
- package/dist/client/index.cjs.map +1 -0
- package/dist/client/index.d.ts +16 -34
- package/dist/client/index.js +2 -52
- package/dist/client/index.js.map +1 -0
- package/dist/client/storage.cjs +2 -0
- package/dist/client/storage.cjs.map +1 -0
- package/dist/client/storage.d.ts +6 -3
- package/dist/client/storage.js +2 -12
- package/dist/client/storage.js.map +1 -0
- package/dist/client/types/File.cjs +1 -0
- package/dist/client/types/File.cjs.map +1 -0
- package/dist/client/types/File.d.ts +9 -5
- package/dist/client/types/File.js +1 -3
- package/dist/client/types/File.js.map +1 -0
- package/dist/client/types/Inputs.cjs +1 -0
- package/dist/client/types/Inputs.cjs.map +1 -0
- package/dist/client/types/Inputs.d.ts +6 -4
- package/dist/client/types/Inputs.js +1 -3
- package/dist/client/types/Inputs.js.map +1 -0
- package/dist/client/types/Node.cjs +1 -0
- package/dist/client/types/Node.cjs.map +1 -0
- package/dist/client/types/Node.d.ts +9 -56
- package/dist/client/types/Node.js +1 -3
- package/dist/client/types/Node.js.map +1 -0
- package/dist/client/types/UserAppNotifications.cjs +1 -0
- package/dist/client/types/UserAppNotifications.cjs.map +1 -0
- package/dist/client/types/UserAppNotifications.d.ts +3 -1
- package/dist/client/types/UserAppNotifications.js +1 -3
- package/dist/client/types/UserAppNotifications.js.map +1 -0
- package/dist/client/types/UserAppSettings.cjs +1 -0
- package/dist/client/types/UserAppSettings.cjs.map +1 -0
- package/dist/client/types/UserAppSettings.d.ts +3 -1
- package/dist/client/types/UserAppSettings.js +1 -3
- package/dist/client/types/UserAppSettings.js.map +1 -0
- package/dist/client/types/index.cjs +2 -0
- package/dist/client/types/index.cjs.map +1 -0
- package/dist/client/types/index.d.ts +86 -30
- package/dist/client/types/index.js +2 -8
- package/dist/client/types/index.js.map +1 -0
- package/dist/client/types/selectors.cjs +2 -0
- package/dist/client/types/selectors.cjs.map +1 -0
- package/dist/client/types/selectors.d.ts +7 -5
- package/dist/client/types/selectors.js +2 -138
- package/dist/client/types/selectors.js.map +1 -0
- package/dist/crypto/file.cjs +2 -0
- package/dist/crypto/file.cjs.map +1 -0
- package/dist/crypto/file.d.ts +8 -6
- package/dist/crypto/file.js +2 -210
- package/dist/crypto/file.js.map +1 -0
- package/dist/crypto/index.cjs +2 -0
- package/dist/crypto/index.cjs.map +1 -0
- package/dist/crypto/index.d.ts +11 -9
- package/dist/crypto/index.js +2 -47
- package/dist/crypto/index.js.map +1 -0
- package/dist/error.cjs +1 -0
- package/dist/error.cjs.map +1 -0
- package/dist/error.d.ts +12 -10
- package/dist/error.js +1 -3
- package/dist/error.js.map +1 -0
- package/dist/index.cjs +2 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.ts +19 -11
- package/dist/index.js +2 -9
- package/dist/index.js.map +1 -0
- package/dist/minify/index.cjs +2 -0
- package/dist/minify/index.cjs.map +1 -0
- package/dist/minify/index.d.ts +4 -2
- package/dist/minify/index.js +2 -28
- package/dist/minify/index.js.map +1 -0
- package/dist/minify/lz4.cjs +3 -0
- package/dist/minify/lz4.cjs.map +1 -0
- package/dist/minify/lz4.d.ts +7 -5
- package/dist/minify/lz4.js +3 -627
- package/dist/minify/lz4.js.map +1 -0
- package/dist/sodium.cjs +2 -0
- package/dist/sodium.cjs.map +1 -0
- package/dist/sodium.d.ts +5 -3
- package/dist/sodium.js +2 -6
- package/dist/sodium.js.map +1 -0
- package/dist/utils/store-buddy.cjs +2 -0
- package/dist/utils/store-buddy.cjs.map +1 -0
- package/dist/utils/store-buddy.d.ts +4 -3
- package/dist/utils/store-buddy.js +2 -65
- package/dist/utils/store-buddy.js.map +1 -0
- package/dist/utils/time.cjs +2 -0
- package/dist/utils/time.cjs.map +1 -0
- package/dist/utils/time.d.ts +4 -2
- package/dist/utils/time.js +2 -14
- package/dist/utils/time.js.map +1 -0
- package/dist/utils/utils.cjs +2 -0
- package/dist/utils/utils.cjs.map +1 -0
- package/dist/utils/utils.d.ts +6 -4
- package/dist/utils/utils.js +2 -57
- package/dist/utils/utils.js.map +1 -0
- package/dist/worker/md5.cjs +2 -0
- package/dist/worker/md5.cjs.map +1 -0
- package/dist/worker/md5.d.ts +3 -1
- package/dist/worker/md5.js +2 -25
- package/dist/worker/md5.js.map +1 -0
- package/dist/worker/sodium.cjs +2 -0
- package/dist/worker/sodium.cjs.map +1 -0
- package/dist/worker/sodium.d.ts +6 -3
- package/dist/worker/sodium.js +2 -120
- package/dist/worker/sodium.js.map +1 -0
- package/dist/worker/workerCodes.cjs +254 -0
- package/dist/worker/workerCodes.cjs.map +1 -0
- package/dist/worker/workerCodes.d.ts +4 -2
- package/dist/worker/workerCodes.js +4 -5
- package/dist/worker/workerCodes.js.map +1 -0
- package/dist/zeus/const.cjs +2 -0
- package/dist/zeus/const.cjs.map +1 -0
- package/dist/zeus/const.d.ts +5 -3
- package/dist/zeus/const.js +2 -1286
- package/dist/zeus/const.js.map +1 -0
- package/dist/zeus/index.cjs +5 -0
- package/dist/zeus/index.cjs.map +1 -0
- package/dist/zeus/index.d.ts +80 -78
- package/dist/zeus/index.js +5 -687
- package/dist/zeus/index.js.map +1 -0
- package/package.json +27 -30
|
@@ -1,9 +1,18 @@
|
|
|
1
|
-
import
|
|
2
|
-
import
|
|
3
|
-
import
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
1
|
+
import { KeyPair } from '../../crypto/index.js';
|
|
2
|
+
import { GQLNode, InternalNode, GQLNodeFull, InternalNodeFull, Node, NodeFull } from '../types/index.js';
|
|
3
|
+
import '../../zeus/index.js';
|
|
4
|
+
import '../../zeus/const.js';
|
|
5
|
+
import '../types/selectors.js';
|
|
6
|
+
import '../types/File.js';
|
|
7
|
+
import '../types/UserAppSettings.js';
|
|
8
|
+
import '../types/UserAppNotifications.js';
|
|
9
|
+
import '../types/Inputs.js';
|
|
10
|
+
|
|
11
|
+
declare function gqlNodeToInternal(gql: GQLNode, keyPair: KeyPair): Promise<InternalNode>;
|
|
12
|
+
declare function gqlNodeFullToInternalFull(gql: GQLNodeFull, keyPair: KeyPair): Promise<InternalNodeFull>;
|
|
13
|
+
declare function internalNodeToNode(internal: InternalNode): Node;
|
|
14
|
+
declare function internalNodeFullToNodeFull(internal: InternalNodeFull): NodeFull;
|
|
15
|
+
declare function gqlNodeToExternalNodeFull(gql: GQLNodeFull, keyPair: KeyPair): Promise<NodeFull>;
|
|
16
|
+
declare function gqlNodeToExternal(gql: GQLNode, keyPair: KeyPair): Promise<Node>;
|
|
17
|
+
|
|
18
|
+
export { gqlNodeFullToInternalFull, gqlNodeToExternal, gqlNodeToExternalNodeFull, gqlNodeToInternal, internalNodeFullToNodeFull, internalNodeToNode };
|
|
@@ -1,100 +1,2 @@
|
|
|
1
|
-
import
|
|
2
|
-
|
|
3
|
-
function ownKeys(object, enumerableOnly) { var keys = Object.keys(object); if (Object.getOwnPropertySymbols) { var symbols = Object.getOwnPropertySymbols(object); enumerableOnly && (symbols = symbols.filter(function (sym) { return Object.getOwnPropertyDescriptor(object, sym).enumerable; })), keys.push.apply(keys, symbols); } return keys; }
|
|
4
|
-
|
|
5
|
-
function _objectSpread(target) { for (var i = 1; i < arguments.length; i++) { var source = null != arguments[i] ? arguments[i] : {}; i % 2 ? ownKeys(Object(source), !0).forEach(function (key) { _defineProperty(target, key, source[key]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(target, Object.getOwnPropertyDescriptors(source)) : ownKeys(Object(source)).forEach(function (key) { Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source, key)); }); } return target; }
|
|
6
|
-
|
|
7
|
-
import { sodium } from "../../sodium.js";
|
|
8
|
-
import { decryptCryptoBox } from "../../crypto/index.js";
|
|
9
|
-
import { nodesCache } from "../../cache.js";
|
|
10
|
-
import { decryptSecretstream } from "../../crypto/file.js";
|
|
11
|
-
import { gqlFileToInternal, internalFileToFile } from "./file.js";
|
|
12
|
-
export async function gqlNodeToInternal(gql, keyPair) {
|
|
13
|
-
if (!gql.access) {
|
|
14
|
-
throw `Can't access Node ${gql.id}`;
|
|
15
|
-
}
|
|
16
|
-
|
|
17
|
-
const internal = {
|
|
18
|
-
id: gql.id,
|
|
19
|
-
type: gql.type,
|
|
20
|
-
access: gql.access,
|
|
21
|
-
name: gql.name,
|
|
22
|
-
isFavorite: gql.isFavorite,
|
|
23
|
-
breadcrumb: gql.breadcrumb,
|
|
24
|
-
createdBy: gql.createdBy.user,
|
|
25
|
-
sizes: {
|
|
26
|
-
size: BigInt(gql.sizes.size),
|
|
27
|
-
sizeBefore: BigInt(gql.sizes.sizeBefore)
|
|
28
|
-
},
|
|
29
|
-
createdAt: new Date(gql.createdAt),
|
|
30
|
-
updatedAt: new Date(gql.updatedAt),
|
|
31
|
-
deletedAt: gql.deletedAt ? new Date(gql.deletedAt) : null,
|
|
32
|
-
users: gql.accesses.map(u => [u.userApp.user, u.rights]),
|
|
33
|
-
parentId: gql.parentId ?? null,
|
|
34
|
-
currentFileId: gql.currentFileId ?? null
|
|
35
|
-
};
|
|
36
|
-
internal.access = _objectSpread({}, gql.access);
|
|
37
|
-
|
|
38
|
-
if (gql.access.nameKey) {
|
|
39
|
-
if (!gql.access.sharedBy.keyPair) {
|
|
40
|
-
throw new Error(`Can't find keyPair for access`);
|
|
41
|
-
}
|
|
42
|
-
|
|
43
|
-
const key = decryptCryptoBox(sodium.from_hex(gql.access.nameKey), gql.createdBy.user.publicKey, keyPair.privateKey);
|
|
44
|
-
internal.name = sodium.to_string(await decryptSecretstream(key, sodium.from_hex(internal.name)));
|
|
45
|
-
internal.access.nameKey = sodium.to_hex(key);
|
|
46
|
-
}
|
|
47
|
-
|
|
48
|
-
for (const b of internal.breadcrumb) {
|
|
49
|
-
if (!b.nameKey) {
|
|
50
|
-
continue;
|
|
51
|
-
}
|
|
52
|
-
|
|
53
|
-
const key = decryptCryptoBox(sodium.from_hex(b.nameKey), b.pubKey, keyPair.privateKey);
|
|
54
|
-
b.nameKey = sodium.to_hex(key);
|
|
55
|
-
b.name = sodium.to_string(await decryptSecretstream(key, sodium.from_hex(b.name)));
|
|
56
|
-
}
|
|
57
|
-
|
|
58
|
-
nodesCache.set(internal.id, internal);
|
|
59
|
-
return internal;
|
|
60
|
-
}
|
|
61
|
-
export async function gqlNodeFullToInternalFull(gql, keyPair) {
|
|
62
|
-
const f = await gqlNodeToInternal(gql, keyPair);
|
|
63
|
-
return _objectSpread(_objectSpread({}, f), {}, {
|
|
64
|
-
current: gql.current ? gqlFileToInternal(gql.current, keyPair) : undefined,
|
|
65
|
-
parent: gql.parent ? await gqlNodeToInternal(gql.parent, keyPair) : null,
|
|
66
|
-
children: await Promise.all(gql.children.map(s => gqlNodeToInternal(s, keyPair))),
|
|
67
|
-
history: gql.history.map(f => gqlFileToInternal(f, keyPair))
|
|
68
|
-
});
|
|
69
|
-
}
|
|
70
|
-
export function internalNodeToNode(internal) {
|
|
71
|
-
var _node$access;
|
|
72
|
-
|
|
73
|
-
const node = _objectSpread(_objectSpread({}, internal), {}, {
|
|
74
|
-
access: internal.access ? _objectSpread({}, internal.access) : undefined
|
|
75
|
-
});
|
|
76
|
-
|
|
77
|
-
for (const b of node.breadcrumb) {
|
|
78
|
-
// @ts-ignore
|
|
79
|
-
delete b.pubKey;
|
|
80
|
-
} // @ts-ignore
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
(_node$access = node.access) == null ? true : delete _node$access.nameKey;
|
|
84
|
-
return node;
|
|
85
|
-
}
|
|
86
|
-
export function internalNodeFullToNodeFull(internal) {
|
|
87
|
-
return _objectSpread(_objectSpread({}, internalNodeToNode(internal)), {}, {
|
|
88
|
-
parent: internal.parent ? internalNodeToNode(internal.parent) : null,
|
|
89
|
-
children: internal.children.map(internalNodeToNode),
|
|
90
|
-
history: internal.history.map(f => internalFileToFile(f)),
|
|
91
|
-
current: internal.current ? internalFileToFile(internal.current) : undefined
|
|
92
|
-
});
|
|
93
|
-
}
|
|
94
|
-
export async function gqlNodeToExternalNodeFull(gql, keyPair) {
|
|
95
|
-
return internalNodeFullToNodeFull(await gqlNodeFullToInternalFull(gql, keyPair));
|
|
96
|
-
}
|
|
97
|
-
export async function gqlNodeToExternal(gql, keyPair) {
|
|
98
|
-
return internalNodeToNode(await gqlNodeToInternal(gql, keyPair));
|
|
99
|
-
}
|
|
100
|
-
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"names":["sodium","decryptCryptoBox","nodesCache","decryptSecretstream","gqlFileToInternal","internalFileToFile","gqlNodeToInternal","gql","keyPair","access","id","internal","type","name","isFavorite","breadcrumb","createdBy","user","sizes","size","BigInt","sizeBefore","createdAt","Date","updatedAt","deletedAt","users","accesses","map","u","userApp","rights","parentId","currentFileId","nameKey","sharedBy","Error","key","from_hex","publicKey","privateKey","to_string","to_hex","b","pubKey","set","gqlNodeFullToInternalFull","f","current","undefined","parent","children","Promise","all","s","history","internalNodeToNode","node","internalNodeFullToNodeFull","gqlNodeToExternalNodeFull","gqlNodeToExternal"],"sources":["../../../src/client/convert/node.ts"],"sourcesContent":["import { sodium } from \"../../sodium.js\";\nimport type { KeyPair } from \"../../crypto/index.js\";\nimport { decryptCryptoBox } from \"../../crypto/index.js\";\nimport type { Node } from \"../types/index.js\";\nimport type {\n  GQLNode,\n  InternalNode,\n  GQLNodeFull,\n  InternalNodeFull,\n  NodeFull\n} from \"../types/index.js\";\nimport { nodesCache } from \"../../cache.js\";\nimport { decryptSecretstream } from \"../../crypto/file.js\";\nimport { gqlFileToInternal, internalFileToFile } from \"./file.js\";\n\nexport async function gqlNodeToInternal(\n  gql: GQLNode,\n  keyPair: KeyPair\n): Promise<InternalNode> {\n  if (!gql.access) {\n    throw `Can't access Node ${gql.id}`;\n  }\n\n  const internal: InternalNode = {\n    id: gql.id,\n    type: gql.type,\n    access: gql.access,\n    name: gql.name,\n    isFavorite: gql.isFavorite,\n    breadcrumb: gql.breadcrumb,\n    createdBy: gql.createdBy.user,\n    sizes: {\n      size: BigInt(gql.sizes.size as string),\n      sizeBefore: BigInt(gql.sizes.sizeBefore as string)\n    },\n    createdAt: new Date(gql.createdAt as string),\n    updatedAt: new Date(gql.updatedAt as string),\n    deletedAt: gql.deletedAt ? new Date(gql.deletedAt as string) : null,\n    users: gql.accesses.map(u => [u.userApp.user, u.rights]),\n    parentId: gql.parentId ?? null,\n    currentFileId: gql.currentFileId ?? null\n  };\n\n  internal.access = { ...gql.access };\n\n  if (gql.access.nameKey) {\n    if (!gql.access.sharedBy.keyPair) {\n      throw new Error(`Can't find keyPair for access`);\n    }\n    const key = decryptCryptoBox(\n      sodium.from_hex(gql.access.nameKey),\n      gql.createdBy.user.publicKey,\n      keyPair.privateKey\n    );\n    internal.name = sodium.to_string(\n      await decryptSecretstream(key, sodium.from_hex(internal.name))\n    );\n\n    internal.access.nameKey = sodium.to_hex(key);\n  }\n\n  for (const b of internal.breadcrumb) {\n    if (!b.nameKey) {\n      continue;\n    }\n    const key = decryptCryptoBox(\n      sodium.from_hex(b.nameKey),\n      b.pubKey,\n      keyPair.privateKey\n    );\n\n    b.nameKey = sodium.to_hex(key);\n\n    b.name = sodium.to_string(\n      await decryptSecretstream(key, sodium.from_hex(b.name))\n    );\n  }\n\n  nodesCache.set(internal.id, internal);\n  return internal;\n}\n\nexport async function gqlNodeFullToInternalFull(\n  gql: GQLNodeFull,\n  keyPair: KeyPair\n): Promise<InternalNodeFull> {\n  const f = await gqlNodeToInternal(gql, keyPair);\n  return {\n    ...f,\n    current: gql.current ? gqlFileToInternal(gql.current, keyPair) : undefined,\n    parent: gql.parent ? await gqlNodeToInternal(gql.parent, keyPair) : null,\n    children: await Promise.all(\n      gql.children.map(s => gqlNodeToInternal(s, keyPair))\n    ),\n    history: gql.history.map(f => gqlFileToInternal(f, keyPair))\n  };\n}\n\nexport function internalNodeToNode(internal: InternalNode): Node {\n  const node: Node = {\n    ...internal,\n    access: internal.access ? { ...internal.access } : undefined\n  };\n\n  for (const b of node.breadcrumb) {\n    // @ts-ignore\n    delete b.pubKey;\n  }\n  // @ts-ignore\n  delete node.access?.nameKey;\n  return node;\n}\n\nexport function internalNodeFullToNodeFull(\n  internal: InternalNodeFull\n): NodeFull {\n  return {\n    ...internalNodeToNode(internal),\n    parent: internal.parent ? internalNodeToNode(internal.parent) : null,\n    children: internal.children.map(internalNodeToNode),\n    history: internal.history.map(f => internalFileToFile(f)),\n    current: internal.current ? internalFileToFile(internal.current) : undefined\n  };\n}\n\nexport async function gqlNodeToExternalNodeFull(\n  gql: GQLNodeFull,\n  keyPair: KeyPair\n): Promise<NodeFull> {\n  return internalNodeFullToNodeFull(\n    await gqlNodeFullToInternalFull(gql, keyPair)\n  );\n}\n\nexport async function gqlNodeToExternal(\n  gql: GQLNode,\n  keyPair: KeyPair\n): Promise<Node> {\n  return internalNodeToNode(await gqlNodeToInternal(gql, keyPair));\n}\n"],"mappings":";;;;;;AAAA,SAASA,MAAT,QAAuB,iBAAvB;AAEA,SAASC,gBAAT,QAAiC,uBAAjC;AASA,SAASC,UAAT,QAA2B,gBAA3B;AACA,SAASC,mBAAT,QAAoC,sBAApC;AACA,SAASC,iBAAT,EAA4BC,kBAA5B,QAAsD,WAAtD;AAEA,OAAO,eAAeC,iBAAf,CACLC,GADK,EAELC,OAFK,EAGkB;EACvB,IAAI,CAACD,GAAG,CAACE,MAAT,EAAiB;IACf,MAAO,qBAAoBF,GAAG,CAACG,EAAG,EAAlC;EACD;;EAED,MAAMC,QAAsB,GAAG;IAC7BD,EAAE,EAAEH,GAAG,CAACG,EADqB;IAE7BE,IAAI,EAAEL,GAAG,CAACK,IAFmB;IAG7BH,MAAM,EAAEF,GAAG,CAACE,MAHiB;IAI7BI,IAAI,EAAEN,GAAG,CAACM,IAJmB;IAK7BC,UAAU,EAAEP,GAAG,CAACO,UALa;IAM7BC,UAAU,EAAER,GAAG,CAACQ,UANa;IAO7BC,SAAS,EAAET,GAAG,CAACS,SAAJ,CAAcC,IAPI;IAQ7BC,KAAK,EAAE;MACLC,IAAI,EAAEC,MAAM,CAACb,GAAG,CAACW,KAAJ,CAAUC,IAAX,CADP;MAELE,UAAU,EAAED,MAAM,CAACb,GAAG,CAACW,KAAJ,CAAUG,UAAX;IAFb,CARsB;IAY7BC,SAAS,EAAE,IAAIC,IAAJ,CAAShB,GAAG,CAACe,SAAb,CAZkB;IAa7BE,SAAS,EAAE,IAAID,IAAJ,CAAShB,GAAG,CAACiB,SAAb,CAbkB;IAc7BC,SAAS,EAAElB,GAAG,CAACkB,SAAJ,GAAgB,IAAIF,IAAJ,CAAShB,GAAG,CAACkB,SAAb,CAAhB,GAAoD,IAdlC;IAe7BC,KAAK,EAAEnB,GAAG,CAACoB,QAAJ,CAAaC,GAAb,CAAiBC,CAAC,IAAI,CAACA,CAAC,CAACC,OAAF,CAAUb,IAAX,EAAiBY,CAAC,CAACE,MAAnB,CAAtB,CAfsB;IAgB7BC,QAAQ,EAAEzB,GAAG,CAACyB,QAAJ,IAAgB,IAhBG;IAiB7BC,aAAa,EAAE1B,GAAG,CAAC0B,aAAJ,IAAqB;EAjBP,CAA/B;EAoBAtB,QAAQ,CAACF,MAAT,qBAAuBF,GAAG,CAACE,MAA3B;;EAEA,IAAIF,GAAG,CAACE,MAAJ,CAAWyB,OAAf,EAAwB;IACtB,IAAI,CAAC3B,GAAG,CAACE,MAAJ,CAAW0B,QAAX,CAAoB3B,OAAzB,EAAkC;MAChC,MAAM,IAAI4B,KAAJ,CAAW,+BAAX,CAAN;IACD;;IACD,MAAMC,GAAG,GAAGpC,gBAAgB,CAC1BD,MAAM,CAACsC,QAAP,CAAgB/B,GAAG,CAACE,MAAJ,CAAWyB,OAA3B,CAD0B,EAE1B3B,GAAG,CAACS,SAAJ,CAAcC,IAAd,CAAmBsB,SAFO,EAG1B/B,OAAO,CAACgC,UAHkB,CAA5B;IAKA7B,QAAQ,CAACE,IAAT,GAAgBb,MAAM,CAACyC,SAAP,CACd,MAAMtC,mBAAmB,CAACkC,GAAD,EAAMrC,MAAM,CAACsC,QAAP,CAAgB3B,QAAQ,CAACE,IAAzB,CAAN,CADX,CAAhB;IAIAF,QAAQ,CAACF,MAAT,CAAgByB,OAAhB,GAA0BlC,MAAM,CAAC0C,MAAP,CAAcL,GAAd,CAA1B;EACD;;EAED,KAAK,MAAMM,CAAX,IAAgBhC,QAAQ,CAACI,UAAzB,EAAqC;IACnC,IAAI,CAAC4B,CAAC,CAACT,OAAP,EAAgB;MACd;IACD;;IACD,MAAMG,GAAG,GAAGpC,gBAAgB,CAC1BD,MAAM,CAACsC,QAAP,CAAgBK,CAAC,CAACT,OAAlB,CAD0B,EAE1BS,CAAC,CAACC,MAFwB,EAG1BpC,OAAO,CAACgC,UAHkB,CAA5B;IAMAG,CAAC,CAACT,OAAF,GAAYlC,MAAM,CAAC0C,MAAP,CAAcL,GAAd,CAAZ;IAEAM,CAAC,CAAC9B,IAAF,GAASb,MAAM,CAACyC,SAAP,CACP,MAAMtC,mBAAmB,CAACkC,GAAD,EAAMrC,MAAM,CAACsC,QAAP,CAAgBK,CAAC,CAAC9B,IAAlB,CAAN,CADlB,CAAT;EAGD;;EAEDX,UAAU,CAAC2C,GAAX,CAAelC,QAAQ,CAACD,EAAxB,EAA4BC,QAA5B;EACA,OAAOA,QAAP;AACD;AAED,OAAO,eAAemC,yBAAf,CACLvC,GADK,EAELC,OAFK,EAGsB;EAC3B,MAAMuC,CAAC,GAAG,MAAMzC,iBAAiB,CAACC,GAAD,EAAMC,OAAN,CAAjC;EACA,uCACKuC,CADL;IAEEC,OAAO,EAAEzC,GAAG,CAACyC,OAAJ,GAAc5C,iBAAiB,CAACG,GAAG,CAACyC,OAAL,EAAcxC,OAAd,CAA/B,GAAwDyC,SAFnE;IAGEC,MAAM,EAAE3C,GAAG,CAAC2C,MAAJ,GAAa,MAAM5C,iBAAiB,CAACC,GAAG,CAAC2C,MAAL,EAAa1C,OAAb,CAApC,GAA4D,IAHtE;IAIE2C,QAAQ,EAAE,MAAMC,OAAO,CAACC,GAAR,CACd9C,GAAG,CAAC4C,QAAJ,CAAavB,GAAb,CAAiB0B,CAAC,IAAIhD,iBAAiB,CAACgD,CAAD,EAAI9C,OAAJ,CAAvC,CADc,CAJlB;IAOE+C,OAAO,EAAEhD,GAAG,CAACgD,OAAJ,CAAY3B,GAAZ,CAAgBmB,CAAC,IAAI3C,iBAAiB,CAAC2C,CAAD,EAAIvC,OAAJ,CAAtC;EAPX;AASD;AAED,OAAO,SAASgD,kBAAT,CAA4B7C,QAA5B,EAA0D;EAAA;;EAC/D,MAAM8C,IAAU,mCACX9C,QADW;IAEdF,MAAM,EAAEE,QAAQ,CAACF,MAAT,qBAAuBE,QAAQ,CAACF,MAAhC,IAA2CwC;EAFrC,EAAhB;;EAKA,KAAK,MAAMN,CAAX,IAAgBc,IAAI,CAAC1C,UAArB,EAAiC;IAC/B;IACA,OAAO4B,CAAC,CAACC,MAAT;EACD,CAT8D,CAU/D;;;EACA,gBAAOa,IAAI,CAAChD,MAAZ,0BAAO,aAAayB,OAApB;EACA,OAAOuB,IAAP;AACD;AAED,OAAO,SAASC,0BAAT,CACL/C,QADK,EAEK;EACV,uCACK6C,kBAAkB,CAAC7C,QAAD,CADvB;IAEEuC,MAAM,EAAEvC,QAAQ,CAACuC,MAAT,GAAkBM,kBAAkB,CAAC7C,QAAQ,CAACuC,MAAV,CAApC,GAAwD,IAFlE;IAGEC,QAAQ,EAAExC,QAAQ,CAACwC,QAAT,CAAkBvB,GAAlB,CAAsB4B,kBAAtB,CAHZ;IAIED,OAAO,EAAE5C,QAAQ,CAAC4C,OAAT,CAAiB3B,GAAjB,CAAqBmB,CAAC,IAAI1C,kBAAkB,CAAC0C,CAAD,CAA5C,CAJX;IAKEC,OAAO,EAAErC,QAAQ,CAACqC,OAAT,GAAmB3C,kBAAkB,CAACM,QAAQ,CAACqC,OAAV,CAArC,GAA0DC;EALrE;AAOD;AAED,OAAO,eAAeU,yBAAf,CACLpD,GADK,EAELC,OAFK,EAGc;EACnB,OAAOkD,0BAA0B,CAC/B,MAAMZ,yBAAyB,CAACvC,GAAD,EAAMC,OAAN,CADA,CAAjC;AAGD;AAED,OAAO,eAAeoD,iBAAf,CACLrD,GADK,EAELC,OAFK,EAGU;EACf,OAAOgD,kBAAkB,CAAC,MAAMlD,iBAAiB,CAACC,GAAD,EAAMC,OAAN,CAAxB,CAAzB;AACD"}
|
|
1
|
+
import{a as s,b as d}from"../../chunk-KMTF2BZE.js";import{sodium as a}from"../../sodium.js";import{decryptCryptoBox as p}from"../../crypto/index.js";import{nodesCache as N}from"../../cache.js";import{decryptSecretstream as l}from"../../crypto/file.js";import{gqlFileToInternal as y,internalFileToFile as f}from"./file.js";async function i(e,r){var o,u;if(!e.access)throw`Can't access Node ${e.id}`;const t={id:e.id,type:e.type,access:e.access,name:e.name,isFavorite:e.isFavorite,breadcrumb:e.breadcrumb,createdBy:e.createdBy.user,sizes:{size:BigInt(e.sizes.size),sizeBefore:BigInt(e.sizes.sizeBefore)},createdAt:new Date(e.createdAt),updatedAt:new Date(e.updatedAt),deletedAt:e.deletedAt?new Date(e.deletedAt):null,users:e.accesses.map(n=>[n.userApp.user,n.rights]),parentId:(o=e.parentId)!=null?o:null,currentFileId:(u=e.currentFileId)!=null?u:null};if(t.access=s({},e.access),e.access.nameKey){if(!e.access.sharedBy.keyPair)throw new Error("Can't find keyPair for access");const n=p(a.from_hex(e.access.nameKey),e.createdBy.user.publicKey,r.privateKey);t.name=a.to_string(await l(n,a.from_hex(t.name))),t.access.nameKey=a.to_hex(n)}for(const n of t.breadcrumb){if(!n.nameKey)continue;const m=p(a.from_hex(n.nameKey),n.pubKey,r.privateKey);n.nameKey=a.to_hex(m),n.name=a.to_string(await l(m,a.from_hex(n.name)))}return N.set(t.id,t),t}async function F(e,r){const t=await i(e,r);return d(s({},t),{current:e.current?y(e.current,r):void 0,parent:e.parent?await i(e.parent,r):null,children:await Promise.all(e.children.map(o=>i(o,r))),history:e.history.map(o=>y(o,r))})}function c(e){var t;const r=d(s({},e),{access:e.access?s({},e.access):void 0});for(const o of r.breadcrumb)delete o.pubKey;return(t=r.access)==null||delete t.nameKey,r}function h(e){return d(s({},c(e)),{parent:e.parent?c(e.parent):null,children:e.children.map(c),history:e.history.map(r=>f(r)),current:e.current?f(e.current):void 0})}async function B(e,r){return h(await F(e,r))}async function A(e,r){return c(await i(e,r))}export{F as gqlNodeFullToInternalFull,A as gqlNodeToExternal,B as gqlNodeToExternalNodeFull,i as gqlNodeToInternal,h as internalNodeFullToNodeFull,c as internalNodeToNode};
|
|
2
|
+
//# sourceMappingURL=node.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../src/client/convert/node.ts"],"sourcesContent":["import { sodium } from \"../../sodium.js\";\nimport type { KeyPair } from \"../../crypto/index.js\";\nimport { decryptCryptoBox } from \"../../crypto/index.js\";\nimport type { Node } from \"../types/index.js\";\nimport type {\n GQLNode,\n InternalNode,\n GQLNodeFull,\n InternalNodeFull,\n NodeFull\n} from \"../types/index.js\";\nimport { nodesCache } from \"../../cache.js\";\nimport { decryptSecretstream } from \"../../crypto/file.js\";\nimport { gqlFileToInternal, internalFileToFile } from \"./file.js\";\n\nexport async function gqlNodeToInternal(\n gql: GQLNode,\n keyPair: KeyPair\n): Promise<InternalNode> {\n if (!gql.access) {\n throw `Can't access Node ${gql.id}`;\n }\n\n const internal: InternalNode = {\n id: gql.id,\n type: gql.type,\n access: gql.access,\n name: gql.name,\n isFavorite: gql.isFavorite,\n breadcrumb: gql.breadcrumb,\n createdBy: gql.createdBy.user,\n sizes: {\n size: BigInt(gql.sizes.size as string),\n sizeBefore: BigInt(gql.sizes.sizeBefore as string)\n },\n createdAt: new Date(gql.createdAt as string),\n updatedAt: new Date(gql.updatedAt as string),\n deletedAt: gql.deletedAt ? new Date(gql.deletedAt as string) : null,\n users: gql.accesses.map(u => [u.userApp.user, u.rights]),\n parentId: gql.parentId ?? null,\n currentFileId: gql.currentFileId ?? null\n };\n\n internal.access = { ...gql.access };\n\n if (gql.access.nameKey) {\n if (!gql.access.sharedBy.keyPair) {\n throw new Error(`Can't find keyPair for access`);\n }\n const key = decryptCryptoBox(\n sodium.from_hex(gql.access.nameKey),\n gql.createdBy.user.publicKey,\n keyPair.privateKey\n );\n internal.name = sodium.to_string(\n await decryptSecretstream(key, sodium.from_hex(internal.name))\n );\n\n internal.access.nameKey = sodium.to_hex(key);\n }\n\n for (const b of internal.breadcrumb) {\n if (!b.nameKey) {\n continue;\n }\n const key = decryptCryptoBox(\n sodium.from_hex(b.nameKey),\n b.pubKey,\n keyPair.privateKey\n );\n\n b.nameKey = sodium.to_hex(key);\n\n b.name = sodium.to_string(\n await decryptSecretstream(key, sodium.from_hex(b.name))\n );\n }\n\n nodesCache.set(internal.id, internal);\n return internal;\n}\n\nexport async function gqlNodeFullToInternalFull(\n gql: GQLNodeFull,\n keyPair: KeyPair\n): Promise<InternalNodeFull> {\n const f = await gqlNodeToInternal(gql, keyPair);\n return {\n ...f,\n current: gql.current ? gqlFileToInternal(gql.current, keyPair) : undefined,\n parent: gql.parent ? await gqlNodeToInternal(gql.parent, keyPair) : null,\n children: await Promise.all(\n gql.children.map(s => gqlNodeToInternal(s, keyPair))\n ),\n history: gql.history.map(f => gqlFileToInternal(f, keyPair))\n };\n}\n\nexport function internalNodeToNode(internal: InternalNode): Node {\n const node: Node = {\n ...internal,\n access: internal.access ? { ...internal.access } : undefined\n };\n\n for (const b of node.breadcrumb) {\n // @ts-ignore\n delete b.pubKey;\n }\n // @ts-ignore\n delete node.access?.nameKey;\n return node;\n}\n\nexport function internalNodeFullToNodeFull(\n internal: InternalNodeFull\n): NodeFull {\n return {\n ...internalNodeToNode(internal),\n parent: internal.parent ? internalNodeToNode(internal.parent) : null,\n children: internal.children.map(internalNodeToNode),\n history: internal.history.map(f => internalFileToFile(f)),\n current: internal.current ? internalFileToFile(internal.current) : undefined\n };\n}\n\nexport async function gqlNodeToExternalNodeFull(\n gql: GQLNodeFull,\n keyPair: KeyPair\n): Promise<NodeFull> {\n return internalNodeFullToNodeFull(\n await gqlNodeFullToInternalFull(gql, keyPair)\n );\n}\n\nexport async function gqlNodeToExternal(\n gql: GQLNode,\n keyPair: KeyPair\n): Promise<Node> {\n return internalNodeToNode(await gqlNodeToInternal(gql, keyPair));\n}\n"],"mappings":"mDAAA,OAAS,UAAAA,MAAc,kBAEvB,OAAS,oBAAAC,MAAwB,wBASjC,OAAS,cAAAC,MAAkB,iBAC3B,OAAS,uBAAAC,MAA2B,uBACpC,OAAS,qBAAAC,EAAmB,sBAAAC,MAA0B,YAEtD,eAAsBC,EACpBC,EACAC,EACuB,CAlBzB,IAAAC,EAAAC,EAmBE,GAAI,CAACH,EAAI,OACP,KAAM,qBAAqBA,EAAI,KAGjC,MAAMI,EAAyB,CAC7B,GAAIJ,EAAI,GACR,KAAMA,EAAI,KACV,OAAQA,EAAI,OACZ,KAAMA,EAAI,KACV,WAAYA,EAAI,WAChB,WAAYA,EAAI,WAChB,UAAWA,EAAI,UAAU,KACzB,MAAO,CACL,KAAM,OAAOA,EAAI,MAAM,IAAc,EACrC,WAAY,OAAOA,EAAI,MAAM,UAAoB,CACnD,EACA,UAAW,IAAI,KAAKA,EAAI,SAAmB,EAC3C,UAAW,IAAI,KAAKA,EAAI,SAAmB,EAC3C,UAAWA,EAAI,UAAY,IAAI,KAAKA,EAAI,SAAmB,EAAI,KAC/D,MAAOA,EAAI,SAAS,IAAIK,GAAK,CAACA,EAAE,QAAQ,KAAMA,EAAE,MAAM,CAAC,EACvD,UAAUH,EAAAF,EAAI,WAAJ,KAAAE,EAAgB,KAC1B,eAAeC,EAAAH,EAAI,gBAAJ,KAAAG,EAAqB,IACtC,EAIA,GAFAC,EAAS,OAASE,EAAA,GAAKN,EAAI,QAEvBA,EAAI,OAAO,QAAS,CACtB,GAAI,CAACA,EAAI,OAAO,SAAS,QACvB,MAAM,IAAI,MAAM,+BAA+B,EAEjD,MAAMO,EAAMb,EACVD,EAAO,SAASO,EAAI,OAAO,OAAO,EAClCA,EAAI,UAAU,KAAK,UACnBC,EAAQ,UACV,EACAG,EAAS,KAAOX,EAAO,UACrB,MAAMG,EAAoBW,EAAKd,EAAO,SAASW,EAAS,IAAI,CAAC,CAC/D,EAEAA,EAAS,OAAO,QAAUX,EAAO,OAAOc,CAAG,CAC7C,CAEA,UAAWC,KAAKJ,EAAS,WAAY,CACnC,GAAI,CAACI,EAAE,QACL,SAEF,MAAMD,EAAMb,EACVD,EAAO,SAASe,EAAE,OAAO,EACzBA,EAAE,OACFP,EAAQ,UACV,EAEAO,EAAE,QAAUf,EAAO,OAAOc,CAAG,EAE7BC,EAAE,KAAOf,EAAO,UACd,MAAMG,EAAoBW,EAAKd,EAAO,SAASe,EAAE,IAAI,CAAC,CACxD,CACF,CAEA,OAAAb,EAAW,IAAIS,EAAS,GAAIA,CAAQ,EAC7BA,CACT,CAEA,eAAsBK,EACpBT,EACAC,EAC2B,CAC3B,MAAMS,EAAI,MAAMX,EAAkBC,EAAKC,CAAO,EAC9C,OAAOU,EAAAL,EAAA,GACFI,GADE,CAEL,QAASV,EAAI,QAAUH,EAAkBG,EAAI,QAASC,CAAO,EAAI,OACjE,OAAQD,EAAI,OAAS,MAAMD,EAAkBC,EAAI,OAAQC,CAAO,EAAI,KACpE,SAAU,MAAM,QAAQ,IACtBD,EAAI,SAAS,IAAIY,GAAKb,EAAkBa,EAAGX,CAAO,CAAC,CACrD,EACA,QAASD,EAAI,QAAQ,IAAIU,GAAKb,EAAkBa,EAAGT,CAAO,CAAC,CAC7D,EACF,CAEO,SAASY,EAAmBT,EAA8B,CAlGjE,IAAAF,EAmGE,MAAMY,EAAaH,EAAAL,EAAA,GACdF,GADc,CAEjB,OAAQA,EAAS,OAASE,EAAA,GAAKF,EAAS,QAAW,MACrD,GAEA,UAAWI,KAAKM,EAAK,WAEnB,OAAON,EAAE,OAGX,OAAAN,EAAOY,EAAK,SAAZ,aAAAZ,EAAoB,QACbY,CACT,CAEO,SAASC,EACdX,EACU,CACV,OAAOO,EAAAL,EAAA,GACFO,EAAmBT,CAAQ,GADzB,CAEL,OAAQA,EAAS,OAASS,EAAmBT,EAAS,MAAM,EAAI,KAChE,SAAUA,EAAS,SAAS,IAAIS,CAAkB,EAClD,QAAST,EAAS,QAAQ,IAAIM,GAAKZ,EAAmBY,CAAC,CAAC,EACxD,QAASN,EAAS,QAAUN,EAAmBM,EAAS,OAAO,EAAI,MACrE,EACF,CAEA,eAAsBY,EACpBhB,EACAC,EACmB,CACnB,OAAOc,EACL,MAAMN,EAA0BT,EAAKC,CAAO,CAC9C,CACF,CAEA,eAAsBgB,EACpBjB,EACAC,EACe,CACf,OAAOY,EAAmB,MAAMd,EAAkBC,EAAKC,CAAO,CAAC,CACjE","names":["sodium","decryptCryptoBox","nodesCache","decryptSecretstream","gqlFileToInternal","internalFileToFile","gqlNodeToInternal","gql","keyPair","_a","_b","internal","u","__spreadValues","key","b","gqlNodeFullToInternalFull","f","__spreadProps","s","internalNodeToNode","node","internalNodeFullToNodeFull","gqlNodeToExternalNodeFull","gqlNodeToExternal"]}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";Object.defineProperty(exports, "__esModule", {value: true});require('../chunk-5WPCTUWH.cjs');var _indexjs = require('./index.js');var _PopupToolsjs = require('../PopupTools.js');var _storagejs = require('./storage.js');function g(){if(!window.location.hash)return null;const n=window.location.hash.substr(1);try{const t=JSON.parse(atob(n));return window.location.hash="",t}catch(t){return null}}const x=({env:n,hash:t,path:e})=>{let a="";n==="dev"&&(a="dev.");const r=document.documentElement.lang;return process.env.NEXT_PUBLIC_SECRECY_API_URL?`http://localhost:3002${r?`/${r}`:""}${e.startsWith("/")?e:`/${e}`}#${t}`:`https://auth.${a}secrecy.me${r?`/${r}`:""}${e.startsWith("/")?e:`/${e}`}#${t}`};function A(n,t){const e=_storagejs.getStorage.call(void 0, t),a=e.userAppSession.load(),r=e.userAppKeys.load(),i=e.jwt.load();if(!a||!r||!i){const o=g();return o?(e.userAppKeys.save(o.keys),e.userAppSession.save(o.uaSession),e.jwt.save(o.jwt),new (0, _indexjs.SecrecyClient)(o.uaSession,o.keys,o.jwt,n)):null}return new (0, _indexjs.SecrecyClient)(a,r,i,n)}function b({appCode:n,path:t,redirect:e,scopes:a,backPath:r,env:i,session:o}={}){return new Promise((l,p)=>{const d=window.location.origin;if(n&&!d.includes("localhost"))return p("Can't use appCode if not in localhost");const y=A(i);if(y)return l(y);{const m={appUrl:d,appCode:n,redirect:e,path:t,scopes:a,backPath:r},v=btoa(JSON.stringify(m)).replaceAll("=",""),S=x({env:i,hash:v,path:"login"}),f=s=>{const c=_storagejs.getStorage.call(void 0, o);return c.userAppSession.save(s.uaSession),c.userAppKeys.save(s.keys),c.jwt.save(s.jwt),l(new (0, _indexjs.SecrecyClient)(s.uaSession,s.keys,s.jwt,i))};if(e){const s=g();return s?f(s):(window.location.href=S,l(null))}else _PopupToolsjs.popup.call(void 0, S,"Secrecy Login",{width:500},(s,c)=>{if(s)return p(s);{const h=c;if(h)return f(h)}})}})}exports.getSecrecyClient = A; exports.getUrl = x; exports.login = b; exports.parseInfos = g;
|
|
2
|
+
//# sourceMappingURL=helpers.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/client/helpers.ts"],"names":["SecrecyClient","popup","getStorage","parseInfos","hash","res","e","getUrl","env","path","envStr","lang","getSecrecyClient","session","storage","uaSession","uaKeys","uaJwt","infos","login","appCode","redirect","scopes","backPath","resolve","reject","appUrl","client","data","url","validate","err"],"mappings":"8BAAA,OAAS,iBAAAA,MAAqB,aAC9B,OAAS,SAAAC,MAAa,mBAEtB,OAAS,cAAAC,MAAkB,eAEpB,SAASC,GAAoC,CAClD,GAAI,CAAC,OAAO,SAAS,KACnB,OAAO,KAET,MAAMC,EAAO,OAAO,SAAS,KAAK,OAAO,CAAC,EAC1C,GAAI,CACF,MAAMC,EAAM,KAAK,MAAM,KAAKD,CAAI,CAAC,EACjC,cAAO,SAAS,KAAO,GAEhBC,CACT,OAAQC,EAAN,CACA,OAAO,IACT,CACF,CAEO,MAAMC,EAAS,CAAC,CACrB,IAAAC,EACA,KAAAJ,EACA,KAAAK,CACF,IAIc,CACZ,IAAIC,EAAS,GACTF,IAAQ,QACVE,EAAS,QAEX,MAAMC,EAAO,SAAS,gBAAgB,KACtC,OAAO,QAAQ,IAAI,4BACf,wBAAwBA,EAAO,IAAIA,IAAS,KAC1CF,EAAK,WAAW,GAAG,EAAIA,EAAO,IAAIA,OAChCL,IACJ,gBAAgBM,cAAmBC,EAAO,IAAIA,IAAS,KACrDF,EAAK,WAAW,GAAG,EAAIA,EAAO,IAAIA,OAChCL,GACV,EAsBO,SAASQ,EACdJ,EACAK,EACsB,CACtB,MAAMC,EAAUZ,EAAWW,CAAO,EAC5BE,EAAYD,EAAQ,eAAe,KAAK,EACxCE,EAASF,EAAQ,YAAY,KAAK,EAClCG,EAAQH,EAAQ,IAAI,KAAK,EAC/B,GAAI,CAACC,GAAa,CAACC,GAAU,CAACC,EAAO,CACnC,MAAMC,EAAQf,EAAW,EACzB,OAAIe,GACFJ,EAAQ,YAAY,KAAKI,EAAM,IAAI,EACnCJ,EAAQ,eAAe,KAAKI,EAAM,SAAS,EAC3CJ,EAAQ,IAAI,KAAKI,EAAM,GAAG,EACnB,IAAIlB,EAAckB,EAAM,UAAWA,EAAM,KAAMA,EAAM,IAAKV,CAAG,GAE/D,IACT,CAEA,OAAO,IAAIR,EAAce,EAAWC,EAAQC,EAAOT,CAAG,CACxD,CAEO,SAASW,EACd,CAAE,QAAAC,EAAS,KAAAX,EAAM,SAAAY,EAAU,OAAAC,EAAQ,SAAAC,EAAU,IAAAf,EAAK,QAAAK,CAAQ,EAAO,CAAC,EAC/C,CACnB,OAAO,IAAI,QAAQ,CAACW,EAASC,IAAW,CACtC,MAAMC,EAAS,OAAO,SAAS,OAC/B,GAAIN,GAAW,CAACM,EAAO,SAAS,WAAW,EACzC,OAAOD,EAAO,uCAAuC,EAEvD,MAAME,EAASf,EAAiBJ,CAAG,EAEnC,GAAKmB,EA4DH,OAAOH,EAAQG,CAAkB,EA5DtB,CACX,MAAMT,EAAmB,CACvB,OAAAQ,EACA,QAAAN,EACA,SAAAC,EACA,KAAAZ,EACA,OAAAa,EACA,SAAAC,CACF,EACMK,EAAO,KAAK,KAAK,UAAUV,CAAK,CAAC,EAAE,WAAW,IAAK,EAAE,EAErDW,EAAMtB,EAAO,CACjB,IAAAC,EACA,KAAMoB,EACN,KAAM,OACR,CAAC,EAEKE,EAAYZ,GAAgC,CAChD,MAAMJ,EAAUZ,EAAWW,CAAO,EAClC,OAAAC,EAAQ,eAAe,KAAKI,EAAM,SAAS,EAC3CJ,EAAQ,YAAY,KAAKI,EAAM,IAAI,EACnCJ,EAAQ,IAAI,KAAKI,EAAM,GAAG,EACnBM,EACL,IAAIxB,EACFkB,EAAM,UACNA,EAAM,KACNA,EAAM,IACNV,CACF,CACF,CACF,EAEA,GAAIa,EAAU,CACZ,MAAMH,EAAQf,EAAW,EACzB,OAAIe,EACKY,EAASZ,CAAK,GAErB,OAAO,SAAS,KAAOW,EAChBL,EAAQ,IAAgB,EAEnC,MACEvB,EACE4B,EACA,gBACA,CACE,MAAO,GACT,EACA,CAACE,EAAKH,IAAS,CACb,GAAIG,EACF,OAAON,EAAOM,CAAG,EACZ,CACL,MAAMb,EAAQU,EACd,GAAIV,EACF,OAAOY,EAASZ,CAAK,CAEzB,CACF,CACF,CAEJ,CAGF,CAAC,CACH","sourcesContent":["import { SecrecyClient } from \"./index.js\";\nimport { popup } from \"../PopupTools.js\";\nimport type { SecrecyUserApp } from \"./types/index.js\";\nimport { getStorage } from \"./storage.js\";\n\nexport function parseInfos(): SecrecyUserApp | null {\n if (!window.location.hash) {\n return null;\n }\n const hash = window.location.hash.substr(1);\n try {\n const res = JSON.parse(atob(hash));\n window.location.hash = \"\";\n // TODO Add object content validation\n return res;\n } catch {\n return null;\n }\n}\n\nexport const getUrl = ({\n env,\n hash,\n path\n}: {\n env: string;\n hash: string;\n path: string;\n}): string => {\n let envStr = \"\";\n if (env === \"dev\") {\n envStr = \"dev.\";\n }\n const lang = document.documentElement.lang;\n return process.env.NEXT_PUBLIC_SECRECY_API_URL\n ? `http://localhost:3002${lang ? `/${lang}` : \"\"}${\n path.startsWith(\"/\") ? path : `/${path}`\n }#${hash}`\n : `https://auth.${envStr}secrecy.me${lang ? `/${lang}` : \"\"}${\n path.startsWith(\"/\") ? path : `/${path}`\n }#${hash}`;\n};\n\nexport type HashInfos = {\n appUrl: string;\n backPath?: string;\n appCode?: string | null | undefined;\n path?: string | null | undefined;\n redirect?: boolean;\n scopes?: {\n email: boolean;\n };\n};\nexport type SecrecyEnv = \"dev\" | \"prod\";\nexport type UseSecrecyParams = Omit<HashInfos, \"appUrl\"> & {\n env: SecrecyEnv;\n session?: boolean | undefined;\n};\n\nexport type Value<T extends UseSecrecyParams> = T extends { redirect: true }\n ? SecrecyClient | null\n : SecrecyClient;\n\nexport function getSecrecyClient(\n env: SecrecyEnv,\n session?: boolean | undefined\n): SecrecyClient | null {\n const storage = getStorage(session);\n const uaSession = storage.userAppSession.load();\n const uaKeys = storage.userAppKeys.load();\n const uaJwt = storage.jwt.load();\n if (!uaSession || !uaKeys || !uaJwt) {\n const infos = parseInfos();\n if (infos) {\n storage.userAppKeys.save(infos.keys);\n storage.userAppSession.save(infos.uaSession);\n storage.jwt.save(infos.jwt);\n return new SecrecyClient(infos.uaSession, infos.keys, infos.jwt, env);\n }\n return null;\n }\n\n return new SecrecyClient(uaSession, uaKeys, uaJwt, env);\n}\n\nexport function login<T extends UseSecrecyParams>(\n { appCode, path, redirect, scopes, backPath, env, session }: T = {} as T\n): Promise<Value<T>> {\n return new Promise((resolve, reject) => {\n const appUrl = window.location.origin;\n if (appCode && !appUrl.includes(\"localhost\")) {\n return reject(\"Can't use appCode if not in localhost\");\n }\n const client = getSecrecyClient(env);\n\n if (!client) {\n const infos: HashInfos = {\n appUrl,\n appCode,\n redirect,\n path,\n scopes,\n backPath\n };\n const data = btoa(JSON.stringify(infos)).replaceAll(\"=\", \"\");\n\n const url = getUrl({\n env,\n hash: data,\n path: \"login\"\n });\n\n const validate = (infos: SecrecyUserApp): void => {\n const storage = getStorage(session);\n storage.userAppSession.save(infos.uaSession);\n storage.userAppKeys.save(infos.keys);\n storage.jwt.save(infos.jwt);\n return resolve(\n new SecrecyClient(\n infos.uaSession,\n infos.keys,\n infos.jwt,\n env\n ) as Value<T>\n );\n };\n\n if (redirect) {\n const infos = parseInfos();\n if (infos) {\n return validate(infos);\n } else {\n window.location.href = url;\n return resolve(null as Value<T>);\n }\n } else {\n popup(\n url,\n \"Secrecy Login\",\n {\n width: 500\n },\n (err, data) => {\n if (err) {\n return reject(err);\n } else {\n const infos = data as SecrecyUserApp;\n if (infos) {\n return validate(infos);\n }\n }\n }\n );\n }\n } else {\n return resolve(client as Value<T>);\n }\n });\n}\n"]}
|
package/dist/client/helpers.d.ts
CHANGED
|
@@ -1,28 +1,16 @@
|
|
|
1
|
-
|
|
2
|
-
import
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
};
|
|
18
|
-
};
|
|
19
|
-
export declare type SecrecyEnv = "dev" | "prod";
|
|
20
|
-
export declare type UseSecrecyParams = Omit<HashInfos, "appUrl"> & {
|
|
21
|
-
env: SecrecyEnv;
|
|
22
|
-
session?: boolean | undefined;
|
|
23
|
-
};
|
|
24
|
-
export declare type Value<T extends UseSecrecyParams> = T extends {
|
|
25
|
-
redirect: true;
|
|
26
|
-
} ? SecrecyClient | null : SecrecyClient;
|
|
27
|
-
export declare function getSecrecyClient(env: SecrecyEnv, session?: boolean | undefined): SecrecyClient | null;
|
|
28
|
-
export declare function login<T extends UseSecrecyParams>({ appCode, path, redirect, scopes, backPath, env, session }?: T): Promise<Value<T>>;
|
|
1
|
+
export { H as HashInfos, f as SecrecyEnv, h as UseSecrecyParams, V as Value, i as getSecrecyClient, g as getUrl, l as login, p as parseInfos } from '../BaseClient-15fdf493.js';
|
|
2
|
+
import './types/index.js';
|
|
3
|
+
import 'ky';
|
|
4
|
+
import '../zeus/index.js';
|
|
5
|
+
import '../zeus/const.js';
|
|
6
|
+
import '../error.js';
|
|
7
|
+
import '../crypto/file.js';
|
|
8
|
+
import '../crypto/index.js';
|
|
9
|
+
import './types/File.js';
|
|
10
|
+
import './types/selectors.js';
|
|
11
|
+
import './types/UserAppSettings.js';
|
|
12
|
+
import './types/UserAppNotifications.js';
|
|
13
|
+
import 'jsonwebtoken';
|
|
14
|
+
import 'bson';
|
|
15
|
+
import 'ethers';
|
|
16
|
+
import './types/Inputs.js';
|
package/dist/client/helpers.js
CHANGED
|
@@ -1,126 +1,2 @@
|
|
|
1
|
-
import {
|
|
2
|
-
|
|
3
|
-
import { getStorage } from "./storage.js";
|
|
4
|
-
export function parseInfos() {
|
|
5
|
-
if (!window.location.hash) {
|
|
6
|
-
return null;
|
|
7
|
-
}
|
|
8
|
-
|
|
9
|
-
const hash = window.location.hash.substr(1);
|
|
10
|
-
|
|
11
|
-
try {
|
|
12
|
-
const res = JSON.parse(atob(hash));
|
|
13
|
-
window.location.hash = ""; // TODO Add object content validation
|
|
14
|
-
|
|
15
|
-
return res;
|
|
16
|
-
} catch {
|
|
17
|
-
return null;
|
|
18
|
-
}
|
|
19
|
-
}
|
|
20
|
-
export const getUrl = _ref => {
|
|
21
|
-
let {
|
|
22
|
-
env,
|
|
23
|
-
hash,
|
|
24
|
-
path
|
|
25
|
-
} = _ref;
|
|
26
|
-
let envStr = "";
|
|
27
|
-
|
|
28
|
-
if (env === "dev") {
|
|
29
|
-
envStr = "dev.";
|
|
30
|
-
}
|
|
31
|
-
|
|
32
|
-
const lang = document.documentElement.lang;
|
|
33
|
-
return process.env.NEXT_PUBLIC_SECRECY_API_URL ? `http://localhost:3002${lang ? `/${lang}` : ""}${path.startsWith("/") ? path : `/${path}`}#${hash}` : `https://auth.${envStr}secrecy.me${lang ? `/${lang}` : ""}${path.startsWith("/") ? path : `/${path}`}#${hash}`;
|
|
34
|
-
};
|
|
35
|
-
export function getSecrecyClient(env, session) {
|
|
36
|
-
const storage = getStorage(session);
|
|
37
|
-
const uaSession = storage.userAppSession.load();
|
|
38
|
-
const uaKeys = storage.userAppKeys.load();
|
|
39
|
-
const uaJwt = storage.jwt.load();
|
|
40
|
-
|
|
41
|
-
if (!uaSession || !uaKeys || !uaJwt) {
|
|
42
|
-
const infos = parseInfos();
|
|
43
|
-
|
|
44
|
-
if (infos) {
|
|
45
|
-
storage.userAppKeys.save(infos.keys);
|
|
46
|
-
storage.userAppSession.save(infos.uaSession);
|
|
47
|
-
storage.jwt.save(infos.jwt);
|
|
48
|
-
return new SecrecyClient(infos.uaSession, infos.keys, infos.jwt, env);
|
|
49
|
-
}
|
|
50
|
-
|
|
51
|
-
return null;
|
|
52
|
-
}
|
|
53
|
-
|
|
54
|
-
return new SecrecyClient(uaSession, uaKeys, uaJwt, env);
|
|
55
|
-
}
|
|
56
|
-
export function login(_temp) {
|
|
57
|
-
let {
|
|
58
|
-
appCode,
|
|
59
|
-
path,
|
|
60
|
-
redirect,
|
|
61
|
-
scopes,
|
|
62
|
-
backPath,
|
|
63
|
-
env,
|
|
64
|
-
session
|
|
65
|
-
} = _temp === void 0 ? {} : _temp;
|
|
66
|
-
return new Promise((resolve, reject) => {
|
|
67
|
-
const appUrl = window.location.origin;
|
|
68
|
-
|
|
69
|
-
if (appCode && !appUrl.includes("localhost")) {
|
|
70
|
-
return reject("Can't use appCode if not in localhost");
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
const client = getSecrecyClient(env);
|
|
74
|
-
|
|
75
|
-
if (!client) {
|
|
76
|
-
const infos = {
|
|
77
|
-
appUrl,
|
|
78
|
-
appCode,
|
|
79
|
-
redirect,
|
|
80
|
-
path,
|
|
81
|
-
scopes,
|
|
82
|
-
backPath
|
|
83
|
-
};
|
|
84
|
-
const data = btoa(JSON.stringify(infos)).replaceAll("=", "");
|
|
85
|
-
const url = getUrl({
|
|
86
|
-
env,
|
|
87
|
-
hash: data,
|
|
88
|
-
path: "login"
|
|
89
|
-
});
|
|
90
|
-
|
|
91
|
-
const validate = infos => {
|
|
92
|
-
const storage = getStorage(session);
|
|
93
|
-
storage.userAppSession.save(infos.uaSession);
|
|
94
|
-
storage.userAppKeys.save(infos.keys);
|
|
95
|
-
storage.jwt.save(infos.jwt);
|
|
96
|
-
return resolve(new SecrecyClient(infos.uaSession, infos.keys, infos.jwt, env));
|
|
97
|
-
};
|
|
98
|
-
|
|
99
|
-
if (redirect) {
|
|
100
|
-
const infos = parseInfos();
|
|
101
|
-
|
|
102
|
-
if (infos) {
|
|
103
|
-
return validate(infos);
|
|
104
|
-
} else {
|
|
105
|
-
window.location.href = url;
|
|
106
|
-
return resolve(null);
|
|
107
|
-
}
|
|
108
|
-
} else {
|
|
109
|
-
popup(url, "Secrecy Login", {}, (err, data) => {
|
|
110
|
-
if (err) {
|
|
111
|
-
return reject(err);
|
|
112
|
-
} else {
|
|
113
|
-
const infos = data;
|
|
114
|
-
|
|
115
|
-
if (infos) {
|
|
116
|
-
return validate(infos);
|
|
117
|
-
}
|
|
118
|
-
}
|
|
119
|
-
});
|
|
120
|
-
}
|
|
121
|
-
} else {
|
|
122
|
-
return resolve(client);
|
|
123
|
-
}
|
|
124
|
-
});
|
|
125
|
-
}
|
|
126
|
-
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"names":["SecrecyClient","popup","getStorage","parseInfos","window","location","hash","substr","res","JSON","parse","atob","getUrl","env","path","envStr","lang","document","documentElement","process","NEXT_PUBLIC_SECRECY_API_URL","startsWith","getSecrecyClient","session","storage","uaSession","userAppSession","load","uaKeys","userAppKeys","uaJwt","jwt","infos","save","keys","login","appCode","redirect","scopes","backPath","Promise","resolve","reject","appUrl","origin","includes","client","data","btoa","stringify","replaceAll","url","validate","href","err"],"sources":["../../src/client/helpers.ts"],"sourcesContent":["import { SecrecyClient } from \"./index.js\";\nimport { popup } from \"../PopupTools.js\";\nimport type { SecrecyUserApp } from \"./types/index.js\";\nimport { getStorage } from \"./storage.js\";\n\nexport function parseInfos(): SecrecyUserApp | null {\n  if (!window.location.hash) {\n    return null;\n  }\n  const hash = window.location.hash.substr(1);\n  try {\n    const res = JSON.parse(atob(hash));\n    window.location.hash = \"\";\n    // TODO Add object content validation\n    return res;\n  } catch {\n    return null;\n  }\n}\n\nexport const getUrl = ({\n  env,\n  hash,\n  path\n}: {\n  env: string;\n  hash: string;\n  path: string;\n}): string => {\n  let envStr = \"\";\n  if (env === \"dev\") {\n    envStr = \"dev.\";\n  }\n  const lang = document.documentElement.lang;\n  return process.env.NEXT_PUBLIC_SECRECY_API_URL\n    ? `http://localhost:3002${lang ? `/${lang}` : \"\"}${\n        path.startsWith(\"/\") ? path : `/${path}`\n      }#${hash}`\n    : `https://auth.${envStr}secrecy.me${lang ? `/${lang}` : \"\"}${\n        path.startsWith(\"/\") ? path : `/${path}`\n      }#${hash}`;\n};\n\nexport type HashInfos = {\n  appUrl: string;\n  backPath?: string;\n  appCode?: string | null | undefined;\n  path?: string | null | undefined;\n  redirect?: boolean;\n  scopes?: {\n    email: boolean;\n  };\n};\nexport type SecrecyEnv = \"dev\" | \"prod\";\nexport type UseSecrecyParams = Omit<HashInfos, \"appUrl\"> & {\n  env: SecrecyEnv;\n  session?: boolean | undefined;\n};\n\nexport type Value<T extends UseSecrecyParams> = T extends { redirect: true }\n  ? SecrecyClient | null\n  : SecrecyClient;\n\nexport function getSecrecyClient(\n  env: SecrecyEnv,\n  session?: boolean | undefined\n): SecrecyClient | null {\n  const storage = getStorage(session);\n  const uaSession = storage.userAppSession.load();\n  const uaKeys = storage.userAppKeys.load();\n  const uaJwt = storage.jwt.load();\n  if (!uaSession || !uaKeys || !uaJwt) {\n    const infos = parseInfos();\n    if (infos) {\n      storage.userAppKeys.save(infos.keys);\n      storage.userAppSession.save(infos.uaSession);\n      storage.jwt.save(infos.jwt);\n      return new SecrecyClient(infos.uaSession, infos.keys, infos.jwt, env);\n    }\n    return null;\n  }\n\n  return new SecrecyClient(uaSession, uaKeys, uaJwt, env);\n}\n\nexport function login<T extends UseSecrecyParams>(\n  { appCode, path, redirect, scopes, backPath, env, session }: T = {} as T\n): Promise<Value<T>> {\n  return new Promise((resolve, reject) => {\n    const appUrl = window.location.origin;\n    if (appCode && !appUrl.includes(\"localhost\")) {\n      return reject(\"Can't use appCode if not in localhost\");\n    }\n    const client = getSecrecyClient(env);\n\n    if (!client) {\n      const infos: HashInfos = {\n        appUrl,\n        appCode,\n        redirect,\n        path,\n        scopes,\n        backPath\n      };\n      const data = btoa(JSON.stringify(infos)).replaceAll(\"=\", \"\");\n\n      const url = getUrl({\n        env,\n        hash: data,\n        path: \"login\"\n      });\n\n      const validate = (infos: SecrecyUserApp): void => {\n        const storage = getStorage(session);\n        storage.userAppSession.save(infos.uaSession);\n        storage.userAppKeys.save(infos.keys);\n        storage.jwt.save(infos.jwt);\n        return resolve(\n          new SecrecyClient(\n            infos.uaSession,\n            infos.keys,\n            infos.jwt,\n            env\n          ) as Value<T>\n        );\n      };\n\n      if (redirect) {\n        const infos = parseInfos();\n        if (infos) {\n          return validate(infos);\n        } else {\n          window.location.href = url;\n          return resolve(null as Value<T>);\n        }\n      } else {\n        popup(url, \"Secrecy Login\", {}, (err, data) => {\n          if (err) {\n            return reject(err);\n          } else {\n            const infos = data as SecrecyUserApp;\n            if (infos) {\n              return validate(infos);\n            }\n          }\n        });\n      }\n    } else {\n      return resolve(client as Value<T>);\n    }\n  });\n}\n"],"mappings":"AAAA,SAASA,aAAT,QAA8B,YAA9B;AACA,SAASC,KAAT,QAAsB,kBAAtB;AAEA,SAASC,UAAT,QAA2B,cAA3B;AAEA,OAAO,SAASC,UAAT,GAA6C;EAClD,IAAI,CAACC,MAAM,CAACC,QAAP,CAAgBC,IAArB,EAA2B;IACzB,OAAO,IAAP;EACD;;EACD,MAAMA,IAAI,GAAGF,MAAM,CAACC,QAAP,CAAgBC,IAAhB,CAAqBC,MAArB,CAA4B,CAA5B,CAAb;;EACA,IAAI;IACF,MAAMC,GAAG,GAAGC,IAAI,CAACC,KAAL,CAAWC,IAAI,CAACL,IAAD,CAAf,CAAZ;IACAF,MAAM,CAACC,QAAP,CAAgBC,IAAhB,GAAuB,EAAvB,CAFE,CAGF;;IACA,OAAOE,GAAP;EACD,CALD,CAKE,MAAM;IACN,OAAO,IAAP;EACD;AACF;AAED,OAAO,MAAMI,MAAM,GAAG,QAQR;EAAA,IARS;IACrBC,GADqB;IAErBP,IAFqB;IAGrBQ;EAHqB,CAQT;EACZ,IAAIC,MAAM,GAAG,EAAb;;EACA,IAAIF,GAAG,KAAK,KAAZ,EAAmB;IACjBE,MAAM,GAAG,MAAT;EACD;;EACD,MAAMC,IAAI,GAAGC,QAAQ,CAACC,eAAT,CAAyBF,IAAtC;EACA,OAAOG,OAAO,CAACN,GAAR,CAAYO,2BAAZ,GACF,wBAAuBJ,IAAI,GAAI,IAAGA,IAAK,EAAZ,GAAgB,EAAG,GAC7CF,IAAI,CAACO,UAAL,CAAgB,GAAhB,IAAuBP,IAAvB,GAA+B,IAAGA,IAAK,EACxC,IAAGR,IAAK,EAHN,GAIF,gBAAeS,MAAO,aAAYC,IAAI,GAAI,IAAGA,IAAK,EAAZ,GAAgB,EAAG,GACxDF,IAAI,CAACO,UAAL,CAAgB,GAAhB,IAAuBP,IAAvB,GAA+B,IAAGA,IAAK,EACxC,IAAGR,IAAK,EANb;AAOD,CArBM;AA2CP,OAAO,SAASgB,gBAAT,CACLT,GADK,EAELU,OAFK,EAGiB;EACtB,MAAMC,OAAO,GAAGtB,UAAU,CAACqB,OAAD,CAA1B;EACA,MAAME,SAAS,GAAGD,OAAO,CAACE,cAAR,CAAuBC,IAAvB,EAAlB;EACA,MAAMC,MAAM,GAAGJ,OAAO,CAACK,WAAR,CAAoBF,IAApB,EAAf;EACA,MAAMG,KAAK,GAAGN,OAAO,CAACO,GAAR,CAAYJ,IAAZ,EAAd;;EACA,IAAI,CAACF,SAAD,IAAc,CAACG,MAAf,IAAyB,CAACE,KAA9B,EAAqC;IACnC,MAAME,KAAK,GAAG7B,UAAU,EAAxB;;IACA,IAAI6B,KAAJ,EAAW;MACTR,OAAO,CAACK,WAAR,CAAoBI,IAApB,CAAyBD,KAAK,CAACE,IAA/B;MACAV,OAAO,CAACE,cAAR,CAAuBO,IAAvB,CAA4BD,KAAK,CAACP,SAAlC;MACAD,OAAO,CAACO,GAAR,CAAYE,IAAZ,CAAiBD,KAAK,CAACD,GAAvB;MACA,OAAO,IAAI/B,aAAJ,CAAkBgC,KAAK,CAACP,SAAxB,EAAmCO,KAAK,CAACE,IAAzC,EAA+CF,KAAK,CAACD,GAArD,EAA0DlB,GAA1D,CAAP;IACD;;IACD,OAAO,IAAP;EACD;;EAED,OAAO,IAAIb,aAAJ,CAAkByB,SAAlB,EAA6BG,MAA7B,EAAqCE,KAArC,EAA4CjB,GAA5C,CAAP;AACD;AAED,OAAO,SAASsB,KAAT,QAEc;EAAA,IADnB;IAAEC,OAAF;IAAWtB,IAAX;IAAiBuB,QAAjB;IAA2BC,MAA3B;IAAmCC,QAAnC;IAA6C1B,GAA7C;IAAkDU;EAAlD,CACmB,sBAD8C,EAC9C;EACnB,OAAO,IAAIiB,OAAJ,CAAY,CAACC,OAAD,EAAUC,MAAV,KAAqB;IACtC,MAAMC,MAAM,GAAGvC,MAAM,CAACC,QAAP,CAAgBuC,MAA/B;;IACA,IAAIR,OAAO,IAAI,CAACO,MAAM,CAACE,QAAP,CAAgB,WAAhB,CAAhB,EAA8C;MAC5C,OAAOH,MAAM,CAAC,uCAAD,CAAb;IACD;;IACD,MAAMI,MAAM,GAAGxB,gBAAgB,CAACT,GAAD,CAA/B;;IAEA,IAAI,CAACiC,MAAL,EAAa;MACX,MAAMd,KAAgB,GAAG;QACvBW,MADuB;QAEvBP,OAFuB;QAGvBC,QAHuB;QAIvBvB,IAJuB;QAKvBwB,MALuB;QAMvBC;MANuB,CAAzB;MAQA,MAAMQ,IAAI,GAAGC,IAAI,CAACvC,IAAI,CAACwC,SAAL,CAAejB,KAAf,CAAD,CAAJ,CAA4BkB,UAA5B,CAAuC,GAAvC,EAA4C,EAA5C,CAAb;MAEA,MAAMC,GAAG,GAAGvC,MAAM,CAAC;QACjBC,GADiB;QAEjBP,IAAI,EAAEyC,IAFW;QAGjBjC,IAAI,EAAE;MAHW,CAAD,CAAlB;;MAMA,MAAMsC,QAAQ,GAAIpB,KAAD,IAAiC;QAChD,MAAMR,OAAO,GAAGtB,UAAU,CAACqB,OAAD,CAA1B;QACAC,OAAO,CAACE,cAAR,CAAuBO,IAAvB,CAA4BD,KAAK,CAACP,SAAlC;QACAD,OAAO,CAACK,WAAR,CAAoBI,IAApB,CAAyBD,KAAK,CAACE,IAA/B;QACAV,OAAO,CAACO,GAAR,CAAYE,IAAZ,CAAiBD,KAAK,CAACD,GAAvB;QACA,OAAOU,OAAO,CACZ,IAAIzC,aAAJ,CACEgC,KAAK,CAACP,SADR,EAEEO,KAAK,CAACE,IAFR,EAGEF,KAAK,CAACD,GAHR,EAIElB,GAJF,CADY,CAAd;MAQD,CAbD;;MAeA,IAAIwB,QAAJ,EAAc;QACZ,MAAML,KAAK,GAAG7B,UAAU,EAAxB;;QACA,IAAI6B,KAAJ,EAAW;UACT,OAAOoB,QAAQ,CAACpB,KAAD,CAAf;QACD,CAFD,MAEO;UACL5B,MAAM,CAACC,QAAP,CAAgBgD,IAAhB,GAAuBF,GAAvB;UACA,OAAOV,OAAO,CAAC,IAAD,CAAd;QACD;MACF,CARD,MAQO;QACLxC,KAAK,CAACkD,GAAD,EAAM,eAAN,EAAuB,EAAvB,EAA2B,CAACG,GAAD,EAAMP,IAAN,KAAe;UAC7C,IAAIO,GAAJ,EAAS;YACP,OAAOZ,MAAM,CAACY,GAAD,CAAb;UACD,CAFD,MAEO;YACL,MAAMtB,KAAK,GAAGe,IAAd;;YACA,IAAIf,KAAJ,EAAW;cACT,OAAOoB,QAAQ,CAACpB,KAAD,CAAf;YACD;UACF;QACF,CATI,CAAL;MAUD;IACF,CApDD,MAoDO;MACL,OAAOS,OAAO,CAACK,MAAD,CAAd;IACD;EACF,CA9DM,CAAP;AA+DD"}
|
|
1
|
+
import"../chunk-KMTF2BZE.js";import{SecrecyClient as u}from"./index.js";import{popup as U}from"../PopupTools.js";import{getStorage as w}from"./storage.js";function g(){if(!window.location.hash)return null;const n=window.location.hash.substr(1);try{const t=JSON.parse(atob(n));return window.location.hash="",t}catch(t){return null}}const x=({env:n,hash:t,path:e})=>{let a="";n==="dev"&&(a="dev.");const r=document.documentElement.lang;return process.env.NEXT_PUBLIC_SECRECY_API_URL?`http://localhost:3002${r?`/${r}`:""}${e.startsWith("/")?e:`/${e}`}#${t}`:`https://auth.${a}secrecy.me${r?`/${r}`:""}${e.startsWith("/")?e:`/${e}`}#${t}`};function A(n,t){const e=w(t),a=e.userAppSession.load(),r=e.userAppKeys.load(),i=e.jwt.load();if(!a||!r||!i){const o=g();return o?(e.userAppKeys.save(o.keys),e.userAppSession.save(o.uaSession),e.jwt.save(o.jwt),new u(o.uaSession,o.keys,o.jwt,n)):null}return new u(a,r,i,n)}function b({appCode:n,path:t,redirect:e,scopes:a,backPath:r,env:i,session:o}={}){return new Promise((l,p)=>{const d=window.location.origin;if(n&&!d.includes("localhost"))return p("Can't use appCode if not in localhost");const y=A(i);if(y)return l(y);{const m={appUrl:d,appCode:n,redirect:e,path:t,scopes:a,backPath:r},v=btoa(JSON.stringify(m)).replaceAll("=",""),S=x({env:i,hash:v,path:"login"}),f=s=>{const c=w(o);return c.userAppSession.save(s.uaSession),c.userAppKeys.save(s.keys),c.jwt.save(s.jwt),l(new u(s.uaSession,s.keys,s.jwt,i))};if(e){const s=g();return s?f(s):(window.location.href=S,l(null))}else U(S,"Secrecy Login",{width:500},(s,c)=>{if(s)return p(s);{const h=c;if(h)return f(h)}})}})}export{A as getSecrecyClient,x as getUrl,b as login,g as parseInfos};
|
|
2
|
+
//# sourceMappingURL=helpers.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/client/helpers.ts"],"sourcesContent":["import { SecrecyClient } from \"./index.js\";\nimport { popup } from \"../PopupTools.js\";\nimport type { SecrecyUserApp } from \"./types/index.js\";\nimport { getStorage } from \"./storage.js\";\n\nexport function parseInfos(): SecrecyUserApp | null {\n if (!window.location.hash) {\n return null;\n }\n const hash = window.location.hash.substr(1);\n try {\n const res = JSON.parse(atob(hash));\n window.location.hash = \"\";\n // TODO Add object content validation\n return res;\n } catch {\n return null;\n }\n}\n\nexport const getUrl = ({\n env,\n hash,\n path\n}: {\n env: string;\n hash: string;\n path: string;\n}): string => {\n let envStr = \"\";\n if (env === \"dev\") {\n envStr = \"dev.\";\n }\n const lang = document.documentElement.lang;\n return process.env.NEXT_PUBLIC_SECRECY_API_URL\n ? `http://localhost:3002${lang ? `/${lang}` : \"\"}${\n path.startsWith(\"/\") ? path : `/${path}`\n }#${hash}`\n : `https://auth.${envStr}secrecy.me${lang ? `/${lang}` : \"\"}${\n path.startsWith(\"/\") ? path : `/${path}`\n }#${hash}`;\n};\n\nexport type HashInfos = {\n appUrl: string;\n backPath?: string;\n appCode?: string | null | undefined;\n path?: string | null | undefined;\n redirect?: boolean;\n scopes?: {\n email: boolean;\n };\n};\nexport type SecrecyEnv = \"dev\" | \"prod\";\nexport type UseSecrecyParams = Omit<HashInfos, \"appUrl\"> & {\n env: SecrecyEnv;\n session?: boolean | undefined;\n};\n\nexport type Value<T extends UseSecrecyParams> = T extends { redirect: true }\n ? SecrecyClient | null\n : SecrecyClient;\n\nexport function getSecrecyClient(\n env: SecrecyEnv,\n session?: boolean | undefined\n): SecrecyClient | null {\n const storage = getStorage(session);\n const uaSession = storage.userAppSession.load();\n const uaKeys = storage.userAppKeys.load();\n const uaJwt = storage.jwt.load();\n if (!uaSession || !uaKeys || !uaJwt) {\n const infos = parseInfos();\n if (infos) {\n storage.userAppKeys.save(infos.keys);\n storage.userAppSession.save(infos.uaSession);\n storage.jwt.save(infos.jwt);\n return new SecrecyClient(infos.uaSession, infos.keys, infos.jwt, env);\n }\n return null;\n }\n\n return new SecrecyClient(uaSession, uaKeys, uaJwt, env);\n}\n\nexport function login<T extends UseSecrecyParams>(\n { appCode, path, redirect, scopes, backPath, env, session }: T = {} as T\n): Promise<Value<T>> {\n return new Promise((resolve, reject) => {\n const appUrl = window.location.origin;\n if (appCode && !appUrl.includes(\"localhost\")) {\n return reject(\"Can't use appCode if not in localhost\");\n }\n const client = getSecrecyClient(env);\n\n if (!client) {\n const infos: HashInfos = {\n appUrl,\n appCode,\n redirect,\n path,\n scopes,\n backPath\n };\n const data = btoa(JSON.stringify(infos)).replaceAll(\"=\", \"\");\n\n const url = getUrl({\n env,\n hash: data,\n path: \"login\"\n });\n\n const validate = (infos: SecrecyUserApp): void => {\n const storage = getStorage(session);\n storage.userAppSession.save(infos.uaSession);\n storage.userAppKeys.save(infos.keys);\n storage.jwt.save(infos.jwt);\n return resolve(\n new SecrecyClient(\n infos.uaSession,\n infos.keys,\n infos.jwt,\n env\n ) as Value<T>\n );\n };\n\n if (redirect) {\n const infos = parseInfos();\n if (infos) {\n return validate(infos);\n } else {\n window.location.href = url;\n return resolve(null as Value<T>);\n }\n } else {\n popup(\n url,\n \"Secrecy Login\",\n {\n width: 500\n },\n (err, data) => {\n if (err) {\n return reject(err);\n } else {\n const infos = data as SecrecyUserApp;\n if (infos) {\n return validate(infos);\n }\n }\n }\n );\n }\n } else {\n return resolve(client as Value<T>);\n }\n });\n}\n"],"mappings":"6BAAA,OAAS,iBAAAA,MAAqB,aAC9B,OAAS,SAAAC,MAAa,mBAEtB,OAAS,cAAAC,MAAkB,eAEpB,SAASC,GAAoC,CAClD,GAAI,CAAC,OAAO,SAAS,KACnB,OAAO,KAET,MAAMC,EAAO,OAAO,SAAS,KAAK,OAAO,CAAC,EAC1C,GAAI,CACF,MAAMC,EAAM,KAAK,MAAM,KAAKD,CAAI,CAAC,EACjC,cAAO,SAAS,KAAO,GAEhBC,CACT,OAAQC,EAAN,CACA,OAAO,IACT,CACF,CAEO,MAAMC,EAAS,CAAC,CACrB,IAAAC,EACA,KAAAJ,EACA,KAAAK,CACF,IAIc,CACZ,IAAIC,EAAS,GACTF,IAAQ,QACVE,EAAS,QAEX,MAAMC,EAAO,SAAS,gBAAgB,KACtC,OAAO,QAAQ,IAAI,4BACf,wBAAwBA,EAAO,IAAIA,IAAS,KAC1CF,EAAK,WAAW,GAAG,EAAIA,EAAO,IAAIA,OAChCL,IACJ,gBAAgBM,cAAmBC,EAAO,IAAIA,IAAS,KACrDF,EAAK,WAAW,GAAG,EAAIA,EAAO,IAAIA,OAChCL,GACV,EAsBO,SAASQ,EACdJ,EACAK,EACsB,CACtB,MAAMC,EAAUZ,EAAWW,CAAO,EAC5BE,EAAYD,EAAQ,eAAe,KAAK,EACxCE,EAASF,EAAQ,YAAY,KAAK,EAClCG,EAAQH,EAAQ,IAAI,KAAK,EAC/B,GAAI,CAACC,GAAa,CAACC,GAAU,CAACC,EAAO,CACnC,MAAMC,EAAQf,EAAW,EACzB,OAAIe,GACFJ,EAAQ,YAAY,KAAKI,EAAM,IAAI,EACnCJ,EAAQ,eAAe,KAAKI,EAAM,SAAS,EAC3CJ,EAAQ,IAAI,KAAKI,EAAM,GAAG,EACnB,IAAIlB,EAAckB,EAAM,UAAWA,EAAM,KAAMA,EAAM,IAAKV,CAAG,GAE/D,IACT,CAEA,OAAO,IAAIR,EAAce,EAAWC,EAAQC,EAAOT,CAAG,CACxD,CAEO,SAASW,EACd,CAAE,QAAAC,EAAS,KAAAX,EAAM,SAAAY,EAAU,OAAAC,EAAQ,SAAAC,EAAU,IAAAf,EAAK,QAAAK,CAAQ,EAAO,CAAC,EAC/C,CACnB,OAAO,IAAI,QAAQ,CAACW,EAASC,IAAW,CACtC,MAAMC,EAAS,OAAO,SAAS,OAC/B,GAAIN,GAAW,CAACM,EAAO,SAAS,WAAW,EACzC,OAAOD,EAAO,uCAAuC,EAEvD,MAAME,EAASf,EAAiBJ,CAAG,EAEnC,GAAKmB,EA4DH,OAAOH,EAAQG,CAAkB,EA5DtB,CACX,MAAMT,EAAmB,CACvB,OAAAQ,EACA,QAAAN,EACA,SAAAC,EACA,KAAAZ,EACA,OAAAa,EACA,SAAAC,CACF,EACMK,EAAO,KAAK,KAAK,UAAUV,CAAK,CAAC,EAAE,WAAW,IAAK,EAAE,EAErDW,EAAMtB,EAAO,CACjB,IAAAC,EACA,KAAMoB,EACN,KAAM,OACR,CAAC,EAEKE,EAAYZ,GAAgC,CAChD,MAAMJ,EAAUZ,EAAWW,CAAO,EAClC,OAAAC,EAAQ,eAAe,KAAKI,EAAM,SAAS,EAC3CJ,EAAQ,YAAY,KAAKI,EAAM,IAAI,EACnCJ,EAAQ,IAAI,KAAKI,EAAM,GAAG,EACnBM,EACL,IAAIxB,EACFkB,EAAM,UACNA,EAAM,KACNA,EAAM,IACNV,CACF,CACF,CACF,EAEA,GAAIa,EAAU,CACZ,MAAMH,EAAQf,EAAW,EACzB,OAAIe,EACKY,EAASZ,CAAK,GAErB,OAAO,SAAS,KAAOW,EAChBL,EAAQ,IAAgB,EAEnC,MACEvB,EACE4B,EACA,gBACA,CACE,MAAO,GACT,EACA,CAACE,EAAKH,IAAS,CACb,GAAIG,EACF,OAAON,EAAOM,CAAG,EACZ,CACL,MAAMb,EAAQU,EACd,GAAIV,EACF,OAAOY,EAASZ,CAAK,CAEzB,CACF,CACF,CAEJ,CAGF,CAAC,CACH","names":["SecrecyClient","popup","getStorage","parseInfos","hash","res","e","getUrl","env","path","envStr","lang","getSecrecyClient","session","storage","uaSession","uaKeys","uaJwt","infos","login","appCode","redirect","scopes","backPath","resolve","reject","appUrl","client","data","url","validate","err"]}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";Object.defineProperty(exports, "__esModule", {value: true});var _chunk5WPCTUWHcjs = require('../chunk-5WPCTUWH.cjs');var e;var _BaseClientjs = require('../BaseClient.js');var _filejs = require('../crypto/file.js');var _sodiumjs = require('../sodium.js');var _SecrecyCloudClientjs = require('./SecrecyCloudClient.js');var _SecrecyMailClientjs = require('./SecrecyMailClient.js');var _SecrecyAppClientjs = require('./SecrecyAppClient.js');var _cachejs = require('../cache.js');var _SecrecyDbClientjs = require('./SecrecyDbClient.js');var _SecrecyWalletClientjs = require('./SecrecyWalletClient.js');var _SecrecyPayClientjs = require('./SecrecyPayClient.js');const D=async(n,o)=>{const{data:i}=await _filejs.encryptSecretstream.call(void 0, _sodiumjs.sodium.from_hex(o),_sodiumjs.sodium.from_string(n));return _sodiumjs.sodium.to_hex(i)};class N extends _BaseClientjs.BaseClient{constructor(i,c,y,a){super(i,a);_chunk5WPCTUWHcjs.e.call(void 0, this,e,void 0);_chunk5WPCTUWHcjs.c.call(void 0, this,"cloud");_chunk5WPCTUWHcjs.c.call(void 0, this,"mail");_chunk5WPCTUWHcjs.c.call(void 0, this,"app");_chunk5WPCTUWHcjs.c.call(void 0, this,"db");_chunk5WPCTUWHcjs.c.call(void 0, this,"wallet");_chunk5WPCTUWHcjs.c.call(void 0, this,"pay");_chunk5WPCTUWHcjs.f.call(void 0, this,e,c),this.cloud=new (0, _SecrecyCloudClientjs.SecrecyCloudClient)(this,_chunk5WPCTUWHcjs.d.call(void 0, this,e),this.thunder),this.mail=new (0, _SecrecyMailClientjs.SecrecyMailClient)(this,_chunk5WPCTUWHcjs.d.call(void 0, this,e),this.thunder),this.app=new (0, _SecrecyAppClientjs.SecrecyAppClient)(y,this,_chunk5WPCTUWHcjs.d.call(void 0, this,e),this.thunder),this.db=new (0, _SecrecyDbClientjs.SecrecyDbClient)(this,_chunk5WPCTUWHcjs.d.call(void 0, this,e),this.thunder),this.wallet=new (0, _SecrecyWalletClientjs.SecrecyWalletClient)(this),this.pay=new (0, _SecrecyPayClientjs.SecrecyPayClient)(this,_chunk5WPCTUWHcjs.d.call(void 0, this,e),this.thunder)}get publicKey(){return _chunk5WPCTUWHcjs.d.call(void 0, this,e).publicKey}async logout(i){_cachejs.nodesCache.clear(),_cachejs.filesCache.clear(),await super.logout(i)}}e=new WeakMap;exports.SecrecyClient = N; exports.encryptName = D;
|
|
2
|
+
//# sourceMappingURL=index.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/client/index.ts"],"names":["_keys","BaseClient","encryptSecretstream","sodium","SecrecyCloudClient","SecrecyMailClient","SecrecyAppClient","nodesCache","filesCache","SecrecyDbClient","SecrecyWalletClient","SecrecyPayClient","encryptName","name","nameKey","data","SecrecyClient","uaSession","uaKeys","uaJwt","env","__privateAdd","__publicField","__privateSet","__privateGet","sessionId"],"mappings":"+DAAA,IAAAA,EACA,OAAS,cAAAC,MAAkB,mBAE3B,OAAS,uBAAAC,MAA2B,oBACpC,OAAS,UAAAC,MAAc,eAGvB,OAAS,sBAAAC,MAA0B,0BACnC,OAAS,qBAAAC,MAAyB,yBAClC,OAAS,oBAAAC,MAAwB,wBACjC,OAAS,cAAAC,EAAY,cAAAC,MAAkB,cACvC,OAAS,mBAAAC,MAAuB,uBAChC,OAAS,uBAAAC,MAA2B,2BACpC,OAAS,oBAAAC,MAAwB,wBAW1B,MAAMC,EAAc,MACzBC,EACAC,IACoB,CACpB,KAAM,CAAE,KAAAC,CAAK,EAAI,MAAMb,EACrBC,EAAO,SAASW,CAAO,EACvBX,EAAO,YAAYU,CAAI,CACzB,EAEA,OADsBV,EAAO,OAAOY,CAAI,CAE1C,EAEO,MAAMC,UAAsBf,CAAW,CAe5C,YACEgB,EACAC,EACAC,EACAC,EACA,CACA,MAAMH,EAAWG,CAAG,EApBtBC,EAAA,KAAArB,EAAA,QAEAsB,EAAA,cAEAA,EAAA,aAEAA,EAAA,YAEAA,EAAA,WAEAA,EAAA,eAEAA,EAAA,YASEC,EAAA,KAAKvB,EAAQkB,GACb,KAAK,MAAQ,IAAId,EAAmB,KAAMoB,EAAA,KAAKxB,GAAO,KAAK,OAAO,EAClE,KAAK,KAAO,IAAIK,EAAkB,KAAMmB,EAAA,KAAKxB,GAAO,KAAK,OAAO,EAChE,KAAK,IAAM,IAAIM,EAAiBa,EAAO,KAAMK,EAAA,KAAKxB,GAAO,KAAK,OAAO,EACrE,KAAK,GAAK,IAAIS,EAAgB,KAAMe,EAAA,KAAKxB,GAAO,KAAK,OAAO,EAC5D,KAAK,OAAS,IAAIU,EAAoB,IAAI,EAC1C,KAAK,IAAM,IAAIC,EAAiB,KAAMa,EAAA,KAAKxB,GAAO,KAAK,OAAO,CAChE,CAEA,IAAI,WAAoB,CACtB,OAAOwB,EAAA,KAAKxB,GAAM,SACpB,CAEA,MAAM,OAAOyB,EAAsD,CACjElB,EAAW,MAAM,EACjBC,EAAW,MAAM,EACjB,MAAM,MAAM,OAAOiB,CAAS,CAC9B,CACF,CAvCEzB,EAAA","sourcesContent":["/* eslint-disable @typescript-eslint/naming-convention */\nimport { BaseClient } from \"../BaseClient.js\";\nimport type { Progress } from \"../crypto/file.js\";\nimport { encryptSecretstream } from \"../crypto/file.js\";\nimport { sodium } from \"../sodium.js\";\nimport type { KeyPair } from \"../crypto/index.js\";\nimport type { SecrecyEnv } from \"./helpers.js\";\nimport { SecrecyCloudClient } from \"./SecrecyCloudClient.js\";\nimport { SecrecyMailClient } from \"./SecrecyMailClient.js\";\nimport { SecrecyAppClient } from \"./SecrecyAppClient.js\";\nimport { nodesCache, filesCache } from \"../cache.js\";\nimport { SecrecyDbClient } from \"./SecrecyDbClient.js\";\nimport { SecrecyWalletClient } from \"./SecrecyWalletClient.js\";\nimport { SecrecyPayClient } from \"./SecrecyPayClient.js\";\n\nexport type NewMail = {\n body: string;\n subject: string;\n files: { id: string; name: string }[];\n recipientsIds: string[];\n replyTo?: string | null | undefined;\n};\nexport type ProgressCallback = (progress: Progress) => Promise<void>;\n\nexport const encryptName = async (\n name: string,\n nameKey: string\n): Promise<string> => {\n const { data } = await encryptSecretstream(\n sodium.from_hex(nameKey),\n sodium.from_string(name)\n );\n const nameEncrypted = sodium.to_hex(data);\n return nameEncrypted;\n};\n\nexport class SecrecyClient extends BaseClient {\n #keys: KeyPair;\n\n cloud: SecrecyCloudClient;\n\n mail: SecrecyMailClient;\n\n app: SecrecyAppClient;\n\n db: SecrecyDbClient;\n\n wallet: SecrecyWalletClient;\n\n pay: SecrecyPayClient;\n\n constructor(\n uaSession: string,\n uaKeys: KeyPair,\n uaJwt: string,\n env: SecrecyEnv\n ) {\n super(uaSession, env);\n this.#keys = uaKeys;\n this.cloud = new SecrecyCloudClient(this, this.#keys, this.thunder);\n this.mail = new SecrecyMailClient(this, this.#keys, this.thunder);\n this.app = new SecrecyAppClient(uaJwt, this, this.#keys, this.thunder);\n this.db = new SecrecyDbClient(this, this.#keys, this.thunder);\n this.wallet = new SecrecyWalletClient(this);\n this.pay = new SecrecyPayClient(this, this.#keys, this.thunder);\n }\n\n get publicKey(): string {\n return this.#keys.publicKey;\n }\n\n async logout(sessionId?: string | null | undefined): Promise<void> {\n nodesCache.clear();\n filesCache.clear();\n await super.logout(sessionId);\n }\n}\n"]}
|
package/dist/client/index.d.ts
CHANGED
|
@@ -1,34 +1,16 @@
|
|
|
1
|
-
|
|
2
|
-
import
|
|
3
|
-
import
|
|
4
|
-
import
|
|
5
|
-
import
|
|
6
|
-
import
|
|
7
|
-
import
|
|
8
|
-
import
|
|
9
|
-
import
|
|
10
|
-
import
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
}[];
|
|
18
|
-
recipientsIds: string[];
|
|
19
|
-
replyTo?: string | null | undefined;
|
|
20
|
-
};
|
|
21
|
-
export declare type ProgressCallback = (progress: Progress) => Promise<void>;
|
|
22
|
-
export declare const encryptName: (name: string, nameKey: string) => Promise<string>;
|
|
23
|
-
export declare class SecrecyClient extends BaseClient {
|
|
24
|
-
#private;
|
|
25
|
-
cloud: SecrecyCloudClient;
|
|
26
|
-
mail: SecrecyMailClient;
|
|
27
|
-
app: SecrecyAppClient;
|
|
28
|
-
db: SecrecyDbClient;
|
|
29
|
-
wallet: SecrecyWalletClient;
|
|
30
|
-
pay: SecrecyPayClient;
|
|
31
|
-
constructor(uaSession: string, uaKeys: KeyPair, uaJwt: string, env: SecrecyEnv);
|
|
32
|
-
get publicKey(): string;
|
|
33
|
-
logout(sessionId?: string | null | undefined): Promise<void>;
|
|
34
|
-
}
|
|
1
|
+
export { N as NewMail, P as ProgressCallback, d as SecrecyClient, e as encryptName } from '../BaseClient-15fdf493.js';
|
|
2
|
+
import '../crypto/file.js';
|
|
3
|
+
import '../crypto/index.js';
|
|
4
|
+
import 'ky';
|
|
5
|
+
import '../zeus/index.js';
|
|
6
|
+
import '../zeus/const.js';
|
|
7
|
+
import '../error.js';
|
|
8
|
+
import './types/File.js';
|
|
9
|
+
import './types/selectors.js';
|
|
10
|
+
import './types/index.js';
|
|
11
|
+
import './types/UserAppSettings.js';
|
|
12
|
+
import './types/UserAppNotifications.js';
|
|
13
|
+
import './types/Inputs.js';
|
|
14
|
+
import 'jsonwebtoken';
|
|
15
|
+
import 'bson';
|
|
16
|
+
import 'ethers';
|
package/dist/client/index.js
CHANGED
|
@@ -1,52 +1,2 @@
|
|
|
1
|
-
import
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
/* eslint-disable @typescript-eslint/naming-convention */
|
|
5
|
-
import { BaseClient } from "../BaseClient.js";
|
|
6
|
-
import { encryptSecretstream } from "../crypto/file.js";
|
|
7
|
-
import { sodium } from "../sodium.js";
|
|
8
|
-
import { SecrecyCloudClient } from "./SecrecyCloudClient.js";
|
|
9
|
-
import { SecrecyMailClient } from "./SecrecyMailClient.js";
|
|
10
|
-
import { SecrecyAppClient } from "./SecrecyAppClient.js";
|
|
11
|
-
import { nodesCache, filesCache } from "../cache.js";
|
|
12
|
-
import { SecrecyDbClient } from "./SecrecyDbClient.js";
|
|
13
|
-
import { SecrecyWalletClient } from "./SecrecyWalletClient.js";
|
|
14
|
-
import { SecrecyPayClient } from "./SecrecyPayClient.js";
|
|
15
|
-
export const encryptName = async (name, nameKey) => {
|
|
16
|
-
const {
|
|
17
|
-
data
|
|
18
|
-
} = await encryptSecretstream(sodium.from_hex(nameKey), sodium.from_string(name));
|
|
19
|
-
const nameEncrypted = sodium.to_hex(data);
|
|
20
|
-
return nameEncrypted;
|
|
21
|
-
};
|
|
22
|
-
|
|
23
|
-
var _keys = /*#__PURE__*/_classPrivateFieldLooseKey("keys");
|
|
24
|
-
|
|
25
|
-
export class SecrecyClient extends BaseClient {
|
|
26
|
-
constructor(uaSession, uaKeys, uaJwt, env) {
|
|
27
|
-
super(uaSession, env);
|
|
28
|
-
Object.defineProperty(this, _keys, {
|
|
29
|
-
writable: true,
|
|
30
|
-
value: void 0
|
|
31
|
-
});
|
|
32
|
-
_classPrivateFieldLooseBase(this, _keys)[_keys] = uaKeys;
|
|
33
|
-
this.cloud = new SecrecyCloudClient(this, _classPrivateFieldLooseBase(this, _keys)[_keys], this.thunder);
|
|
34
|
-
this.mail = new SecrecyMailClient(this, _classPrivateFieldLooseBase(this, _keys)[_keys], this.thunder);
|
|
35
|
-
this.app = new SecrecyAppClient(uaJwt, this, _classPrivateFieldLooseBase(this, _keys)[_keys], this.thunder);
|
|
36
|
-
this.db = new SecrecyDbClient(this, _classPrivateFieldLooseBase(this, _keys)[_keys], this.thunder);
|
|
37
|
-
this.wallet = new SecrecyWalletClient(this);
|
|
38
|
-
this.pay = new SecrecyPayClient(this, _classPrivateFieldLooseBase(this, _keys)[_keys], this.thunder);
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
get publicKey() {
|
|
42
|
-
return _classPrivateFieldLooseBase(this, _keys)[_keys].publicKey;
|
|
43
|
-
}
|
|
44
|
-
|
|
45
|
-
async logout(sessionId) {
|
|
46
|
-
nodesCache.clear();
|
|
47
|
-
filesCache.clear();
|
|
48
|
-
await super.logout(sessionId);
|
|
49
|
-
}
|
|
50
|
-
|
|
51
|
-
}
|
|
52
|
-
//# sourceMappingURL=data:application/json;charset=utf-8;base64,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
|
|
1
|
+
import{c as t,d as r,e as l,f as p}from"../chunk-KMTF2BZE.js";var e;import{BaseClient as m}from"../BaseClient.js";import{encryptSecretstream as h}from"../crypto/file.js";import{sodium as s}from"../sodium.js";import{SecrecyCloudClient as d}from"./SecrecyCloudClient.js";import{SecrecyMailClient as u}from"./SecrecyMailClient.js";import{SecrecyAppClient as g}from"./SecrecyAppClient.js";import{nodesCache as f,filesCache as C}from"../cache.js";import{SecrecyDbClient as S}from"./SecrecyDbClient.js";import{SecrecyWalletClient as w}from"./SecrecyWalletClient.js";import{SecrecyPayClient as P}from"./SecrecyPayClient.js";const D=async(n,o)=>{const{data:i}=await h(s.from_hex(o),s.from_string(n));return s.to_hex(i)};class N extends m{constructor(i,c,y,a){super(i,a);l(this,e,void 0);t(this,"cloud");t(this,"mail");t(this,"app");t(this,"db");t(this,"wallet");t(this,"pay");p(this,e,c),this.cloud=new d(this,r(this,e),this.thunder),this.mail=new u(this,r(this,e),this.thunder),this.app=new g(y,this,r(this,e),this.thunder),this.db=new S(this,r(this,e),this.thunder),this.wallet=new w(this),this.pay=new P(this,r(this,e),this.thunder)}get publicKey(){return r(this,e).publicKey}async logout(i){f.clear(),C.clear(),await super.logout(i)}}e=new WeakMap;export{N as SecrecyClient,D as encryptName};
|
|
2
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/client/index.ts"],"sourcesContent":["/* eslint-disable @typescript-eslint/naming-convention */\nimport { BaseClient } from \"../BaseClient.js\";\nimport type { Progress } from \"../crypto/file.js\";\nimport { encryptSecretstream } from \"../crypto/file.js\";\nimport { sodium } from \"../sodium.js\";\nimport type { KeyPair } from \"../crypto/index.js\";\nimport type { SecrecyEnv } from \"./helpers.js\";\nimport { SecrecyCloudClient } from \"./SecrecyCloudClient.js\";\nimport { SecrecyMailClient } from \"./SecrecyMailClient.js\";\nimport { SecrecyAppClient } from \"./SecrecyAppClient.js\";\nimport { nodesCache, filesCache } from \"../cache.js\";\nimport { SecrecyDbClient } from \"./SecrecyDbClient.js\";\nimport { SecrecyWalletClient } from \"./SecrecyWalletClient.js\";\nimport { SecrecyPayClient } from \"./SecrecyPayClient.js\";\n\nexport type NewMail = {\n body: string;\n subject: string;\n files: { id: string; name: string }[];\n recipientsIds: string[];\n replyTo?: string | null | undefined;\n};\nexport type ProgressCallback = (progress: Progress) => Promise<void>;\n\nexport const encryptName = async (\n name: string,\n nameKey: string\n): Promise<string> => {\n const { data } = await encryptSecretstream(\n sodium.from_hex(nameKey),\n sodium.from_string(name)\n );\n const nameEncrypted = sodium.to_hex(data);\n return nameEncrypted;\n};\n\nexport class SecrecyClient extends BaseClient {\n #keys: KeyPair;\n\n cloud: SecrecyCloudClient;\n\n mail: SecrecyMailClient;\n\n app: SecrecyAppClient;\n\n db: SecrecyDbClient;\n\n wallet: SecrecyWalletClient;\n\n pay: SecrecyPayClient;\n\n constructor(\n uaSession: string,\n uaKeys: KeyPair,\n uaJwt: string,\n env: SecrecyEnv\n ) {\n super(uaSession, env);\n this.#keys = uaKeys;\n this.cloud = new SecrecyCloudClient(this, this.#keys, this.thunder);\n this.mail = new SecrecyMailClient(this, this.#keys, this.thunder);\n this.app = new SecrecyAppClient(uaJwt, this, this.#keys, this.thunder);\n this.db = new SecrecyDbClient(this, this.#keys, this.thunder);\n this.wallet = new SecrecyWalletClient(this);\n this.pay = new SecrecyPayClient(this, this.#keys, this.thunder);\n }\n\n get publicKey(): string {\n return this.#keys.publicKey;\n }\n\n async logout(sessionId?: string | null | undefined): Promise<void> {\n nodesCache.clear();\n filesCache.clear();\n await super.logout(sessionId);\n }\n}\n"],"mappings":"8DAAA,IAAAA,EACA,OAAS,cAAAC,MAAkB,mBAE3B,OAAS,uBAAAC,MAA2B,oBACpC,OAAS,UAAAC,MAAc,eAGvB,OAAS,sBAAAC,MAA0B,0BACnC,OAAS,qBAAAC,MAAyB,yBAClC,OAAS,oBAAAC,MAAwB,wBACjC,OAAS,cAAAC,EAAY,cAAAC,MAAkB,cACvC,OAAS,mBAAAC,MAAuB,uBAChC,OAAS,uBAAAC,MAA2B,2BACpC,OAAS,oBAAAC,MAAwB,wBAW1B,MAAMC,EAAc,MACzBC,EACAC,IACoB,CACpB,KAAM,CAAE,KAAAC,CAAK,EAAI,MAAMb,EACrBC,EAAO,SAASW,CAAO,EACvBX,EAAO,YAAYU,CAAI,CACzB,EAEA,OADsBV,EAAO,OAAOY,CAAI,CAE1C,EAEO,MAAMC,UAAsBf,CAAW,CAe5C,YACEgB,EACAC,EACAC,EACAC,EACA,CACA,MAAMH,EAAWG,CAAG,EApBtBC,EAAA,KAAArB,EAAA,QAEAsB,EAAA,cAEAA,EAAA,aAEAA,EAAA,YAEAA,EAAA,WAEAA,EAAA,eAEAA,EAAA,YASEC,EAAA,KAAKvB,EAAQkB,GACb,KAAK,MAAQ,IAAId,EAAmB,KAAMoB,EAAA,KAAKxB,GAAO,KAAK,OAAO,EAClE,KAAK,KAAO,IAAIK,EAAkB,KAAMmB,EAAA,KAAKxB,GAAO,KAAK,OAAO,EAChE,KAAK,IAAM,IAAIM,EAAiBa,EAAO,KAAMK,EAAA,KAAKxB,GAAO,KAAK,OAAO,EACrE,KAAK,GAAK,IAAIS,EAAgB,KAAMe,EAAA,KAAKxB,GAAO,KAAK,OAAO,EAC5D,KAAK,OAAS,IAAIU,EAAoB,IAAI,EAC1C,KAAK,IAAM,IAAIC,EAAiB,KAAMa,EAAA,KAAKxB,GAAO,KAAK,OAAO,CAChE,CAEA,IAAI,WAAoB,CACtB,OAAOwB,EAAA,KAAKxB,GAAM,SACpB,CAEA,MAAM,OAAOyB,EAAsD,CACjElB,EAAW,MAAM,EACjBC,EAAW,MAAM,EACjB,MAAM,MAAM,OAAOiB,CAAS,CAC9B,CACF,CAvCEzB,EAAA","names":["_keys","BaseClient","encryptSecretstream","sodium","SecrecyCloudClient","SecrecyMailClient","SecrecyAppClient","nodesCache","filesCache","SecrecyDbClient","SecrecyWalletClient","SecrecyPayClient","encryptName","name","nameKey","data","SecrecyClient","uaSession","uaKeys","uaJwt","env","__privateAdd","__publicField","__privateSet","__privateGet","sessionId"]}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";Object.defineProperty(exports, "__esModule", {value: true});require('../chunk-5WPCTUWH.cjs');var _storebuddyjs = require('../utils/store-buddy.js');function i(e){const t=_storebuddyjs.storeBuddy.call(void 0, "secrecy.user_app_session",e).init(null),n=_storebuddyjs.storeBuddy.call(void 0, "secrecy.user_app_keys",e).init(null),s=_storebuddyjs.storeBuddy.call(void 0, "secrecy.jwt",e).init(null);return{userAppKeys:n,userAppSession:t,jwt:s}}exports.getStorage = i;
|
|
2
|
+
//# sourceMappingURL=storage.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/client/storage.ts"],"names":["storeBuddy","getStorage","session","userAppSession","userAppKeys","jwt"],"mappings":"8BAEA,OAAS,cAAAA,MAAkB,0BAEpB,SAASC,EAAWC,EAIzB,CACA,MAAMC,EAAiBH,EACrB,2BACAE,CACF,EAAE,KAAK,IAAI,EACLE,EAAcJ,EAClB,wBACAE,CACF,EAAE,KAAK,IAAI,EACLG,EAAML,EAA0B,cAAeE,CAAO,EAAE,KAAK,IAAI,EACvE,MAAO,CAAE,YAAAE,EAAa,eAAAD,EAAgB,IAAAE,CAAI,CAC5C","sourcesContent":["import type { KeyPair } from \"../index.js\";\nimport type { StoreBuddy } from \"../utils/store-buddy.js\";\nimport { storeBuddy } from \"../utils/store-buddy.js\";\n\nexport function getStorage(session?: boolean | undefined): {\n userAppKeys: StoreBuddy<KeyPair | null>;\n userAppSession: StoreBuddy<string | null>;\n jwt: StoreBuddy<string | null>;\n} {\n const userAppSession = storeBuddy<string | null>(\n `secrecy.user_app_session`,\n session\n ).init(null);\n const userAppKeys = storeBuddy<KeyPair | null>(\n `secrecy.user_app_keys`,\n session\n ).init(null);\n const jwt = storeBuddy<string | null>(`secrecy.jwt`, session).init(null);\n return { userAppKeys, userAppSession, jwt };\n}\n"]}
|
package/dist/client/storage.d.ts
CHANGED
|
@@ -1,7 +1,10 @@
|
|
|
1
|
-
import
|
|
2
|
-
import
|
|
3
|
-
|
|
1
|
+
import { KeyPair } from '../crypto/index.js';
|
|
2
|
+
import { StoreBuddy } from '../utils/store-buddy.js';
|
|
3
|
+
|
|
4
|
+
declare function getStorage(session?: boolean | undefined): {
|
|
4
5
|
userAppKeys: StoreBuddy<KeyPair | null>;
|
|
5
6
|
userAppSession: StoreBuddy<string | null>;
|
|
6
7
|
jwt: StoreBuddy<string | null>;
|
|
7
8
|
};
|
|
9
|
+
|
|
10
|
+
export { getStorage };
|