@super-protocol/sdk-js 3.15.0 → 3.16.0-beta.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/RIGenerator.d.ts +2 -3
- package/dist/cjs/RIGenerator.js +6 -7
- package/dist/cjs/TeeInputGeneratorBase.d.ts +2 -2
- package/dist/cjs/TeeInputGeneratorBase.js +1 -1
- package/dist/cjs/connectors/BaseConnector.d.ts +2 -3
- package/dist/cjs/connectors/BaseConnector.js +1 -1
- package/dist/cjs/connectors/BlockchainConnector.js +1 -3
- package/dist/cjs/connectors/BlockchainEventsListener.d.ts +2 -2
- package/dist/cjs/connectors/BlockchainEventsListener.js +2 -3
- package/dist/cjs/constants.d.ts +2 -0
- package/dist/cjs/constants.js +6 -2
- package/dist/cjs/contracts/Campaign.d.ts +1078 -0
- package/dist/cjs/contracts/Campaign.js +1401 -0
- package/dist/cjs/contracts/abi.d.ts +406 -245
- package/dist/cjs/contracts/abi.js +511 -307
- package/dist/cjs/contracts/adminCertificateHelperAbi.d.ts +316 -0
- package/dist/cjs/contracts/adminCertificateHelperAbi.js +410 -0
- package/dist/cjs/crypto/Crypto.d.ts +13 -10
- package/dist/cjs/crypto/Crypto.js +17 -14
- package/dist/cjs/crypto/nodejs/AES.d.ts +1 -1
- package/dist/cjs/crypto/nodejs/AES.js +2 -2
- package/dist/cjs/crypto/nodejs/ARIA.d.ts +1 -1
- package/dist/cjs/crypto/nodejs/ARIA.js +2 -2
- package/dist/cjs/errors/index.d.ts +0 -1
- package/dist/cjs/errors/index.js +2 -4
- package/dist/cjs/index.d.ts +2 -1
- package/dist/cjs/index.js +5 -4
- package/dist/cjs/models/Offer.d.ts +1 -16
- package/dist/cjs/models/Offer.js +1 -51
- package/dist/cjs/models/Order.d.ts +1 -1
- package/dist/cjs/models/Order.js +15 -11
- package/dist/cjs/providers/storage/S3StorageProvider.js +5 -5
- package/dist/cjs/providers/storage/StorageKeyValueAdapter.d.ts +1 -1
- package/dist/cjs/providers/storage/parseStorageCredentials.d.ts +2 -1
- package/dist/cjs/staticModels/AdminCertificateHelper.d.ts +24 -0
- package/dist/cjs/staticModels/AdminCertificateHelper.js +99 -0
- package/dist/cjs/staticModels/Campaign.d.ts +61 -0
- package/dist/cjs/staticModels/Campaign.js +297 -0
- package/dist/cjs/staticModels/Offers.d.ts +0 -1
- package/dist/cjs/staticModels/Offers.js +2 -4
- package/dist/cjs/staticModels/Orders.js +9 -10
- package/dist/cjs/staticModels/SuperproToken.d.ts +7 -7
- package/dist/cjs/staticModels/SuperproToken.js +3 -3
- package/dist/cjs/staticModels/TeeOffers.d.ts +1 -1
- package/dist/cjs/staticModels/TeeOffers.js +2 -4
- package/dist/cjs/tee/TeeCertificateService.js +8 -1
- package/dist/cjs/types/Campaign.d.ts +45 -0
- package/dist/cjs/types/Campaign.js +16 -0
- package/dist/cjs/types/Offer.d.ts +0 -5
- package/dist/cjs/types/Order.d.ts +20 -25
- package/dist/cjs/types/Order.js +14 -21
- package/dist/cjs/types/index.d.ts +1 -0
- package/dist/cjs/types/index.js +2 -1
- package/dist/cjs/utils/TxManager.js +1 -5
- package/dist/cjs/utils/admin-service.d.ts +13 -0
- package/dist/cjs/utils/admin-service.js +73 -0
- package/dist/cjs/utils/helper.d.ts +3 -0
- package/dist/cjs/utils/helper.js +20 -2
- package/dist/cjs/utils/helpers/OrderArgsHelper.d.ts +2 -2
- package/dist/cjs/utils/helpers/OrderArgsHelper.js +5 -5
- package/dist/cjs/utils/helpers/index.d.ts +0 -1
- package/dist/cjs/utils/helpers/index.js +1 -2
- package/dist/cjs/utils/order/versify.js +7 -1
- package/dist/cjs/utils/rent-calculator/rent-calculator.js +3 -2
- package/dist/cjs/utils/rent-calculator/types.d.ts +1 -0
- package/dist/cjs/utils/types.d.ts +5 -0
- package/dist/mjs/RIGenerator.d.ts +2 -3
- package/dist/mjs/RIGenerator.js +7 -8
- package/dist/mjs/TeeInputGeneratorBase.d.ts +2 -2
- package/dist/mjs/TeeInputGeneratorBase.js +1 -1
- package/dist/mjs/connectors/BaseConnector.d.ts +2 -3
- package/dist/mjs/connectors/BaseConnector.js +1 -1
- package/dist/mjs/connectors/BlockchainConnector.js +1 -3
- package/dist/mjs/connectors/BlockchainEventsListener.d.ts +2 -2
- package/dist/mjs/connectors/BlockchainEventsListener.js +2 -3
- package/dist/mjs/constants.d.ts +2 -0
- package/dist/mjs/constants.js +5 -1
- package/dist/mjs/contracts/Campaign.d.ts +1078 -0
- package/dist/mjs/contracts/Campaign.js +1398 -0
- package/dist/mjs/contracts/abi.d.ts +406 -245
- package/dist/mjs/contracts/abi.js +509 -305
- package/dist/mjs/contracts/adminCertificateHelperAbi.d.ts +316 -0
- package/dist/mjs/contracts/adminCertificateHelperAbi.js +407 -0
- package/dist/mjs/crypto/Crypto.d.ts +13 -10
- package/dist/mjs/crypto/Crypto.js +17 -14
- package/dist/mjs/crypto/nodejs/AES.d.ts +1 -1
- package/dist/mjs/crypto/nodejs/AES.js +2 -2
- package/dist/mjs/crypto/nodejs/ARIA.d.ts +1 -1
- package/dist/mjs/crypto/nodejs/ARIA.js +2 -2
- package/dist/mjs/errors/index.d.ts +0 -1
- package/dist/mjs/errors/index.js +1 -2
- package/dist/mjs/index.d.ts +2 -1
- package/dist/mjs/index.js +3 -2
- package/dist/mjs/models/Offer.d.ts +1 -16
- package/dist/mjs/models/Offer.js +1 -51
- package/dist/mjs/models/Order.d.ts +1 -1
- package/dist/mjs/models/Order.js +15 -11
- package/dist/mjs/providers/storage/S3StorageProvider.js +5 -5
- package/dist/mjs/providers/storage/StorageKeyValueAdapter.d.ts +1 -1
- package/dist/mjs/providers/storage/parseStorageCredentials.d.ts +2 -1
- package/dist/mjs/staticModels/AdminCertificateHelper.d.ts +24 -0
- package/dist/mjs/staticModels/AdminCertificateHelper.js +92 -0
- package/dist/mjs/staticModels/Campaign.d.ts +61 -0
- package/dist/mjs/staticModels/Campaign.js +292 -0
- package/dist/mjs/staticModels/Offers.d.ts +0 -1
- package/dist/mjs/staticModels/Offers.js +2 -4
- package/dist/mjs/staticModels/Orders.js +9 -10
- package/dist/mjs/staticModels/SuperproToken.d.ts +7 -7
- package/dist/mjs/staticModels/SuperproToken.js +3 -3
- package/dist/mjs/staticModels/TeeOffers.d.ts +1 -1
- package/dist/mjs/staticModels/TeeOffers.js +2 -4
- package/dist/mjs/tee/TeeCertificateService.js +9 -2
- package/dist/mjs/types/Campaign.d.ts +45 -0
- package/dist/mjs/types/Campaign.js +13 -0
- package/dist/mjs/types/Offer.d.ts +0 -5
- package/dist/mjs/types/Order.d.ts +20 -25
- package/dist/mjs/types/Order.js +14 -18
- package/dist/mjs/types/index.d.ts +1 -0
- package/dist/mjs/types/index.js +2 -1
- package/dist/mjs/utils/TxManager.js +1 -5
- package/dist/mjs/utils/admin-service.d.ts +13 -0
- package/dist/mjs/utils/admin-service.js +66 -0
- package/dist/mjs/utils/helper.d.ts +3 -0
- package/dist/mjs/utils/helper.js +17 -2
- package/dist/mjs/utils/helpers/OrderArgsHelper.d.ts +2 -2
- package/dist/mjs/utils/helpers/OrderArgsHelper.js +5 -5
- package/dist/mjs/utils/helpers/index.d.ts +0 -1
- package/dist/mjs/utils/helpers/index.js +1 -2
- package/dist/mjs/utils/order/versify.js +7 -1
- package/dist/mjs/utils/rent-calculator/rent-calculator.js +3 -2
- package/dist/mjs/utils/rent-calculator/types.d.ts +1 -0
- package/dist/mjs/utils/types.d.ts +5 -0
- package/package.json +3 -3
- package/dist/cjs/errors/insufficient-funds.error.d.ts +0 -19
- package/dist/cjs/errors/insufficient-funds.error.js +0 -57
- package/dist/cjs/utils/helpers/streamToBuffer.d.ts +0 -4
- package/dist/cjs/utils/helpers/streamToBuffer.js +0 -13
- package/dist/mjs/errors/insufficient-funds.error.d.ts +0 -19
- package/dist/mjs/errors/insufficient-funds.error.js +0 -53
- package/dist/mjs/utils/helpers/streamToBuffer.d.ts +0 -4
- package/dist/mjs/utils/helpers/streamToBuffer.js +0 -9
|
@@ -0,0 +1,410 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.adminCertificateHelperAbi = void 0;
|
|
4
|
+
exports.adminCertificateHelperAbi = [
|
|
5
|
+
{
|
|
6
|
+
inputs: [
|
|
7
|
+
{
|
|
8
|
+
internalType: 'contract ICertVerifier',
|
|
9
|
+
name: '_certVerifier',
|
|
10
|
+
type: 'address',
|
|
11
|
+
},
|
|
12
|
+
],
|
|
13
|
+
stateMutability: 'nonpayable',
|
|
14
|
+
type: 'constructor',
|
|
15
|
+
},
|
|
16
|
+
{
|
|
17
|
+
inputs: [],
|
|
18
|
+
name: 'ECDSAInvalidSignature',
|
|
19
|
+
type: 'error',
|
|
20
|
+
},
|
|
21
|
+
{
|
|
22
|
+
inputs: [
|
|
23
|
+
{
|
|
24
|
+
internalType: 'uint256',
|
|
25
|
+
name: 'length',
|
|
26
|
+
type: 'uint256',
|
|
27
|
+
},
|
|
28
|
+
],
|
|
29
|
+
name: 'ECDSAInvalidSignatureLength',
|
|
30
|
+
type: 'error',
|
|
31
|
+
},
|
|
32
|
+
{
|
|
33
|
+
inputs: [
|
|
34
|
+
{
|
|
35
|
+
internalType: 'bytes32',
|
|
36
|
+
name: 's',
|
|
37
|
+
type: 'bytes32',
|
|
38
|
+
},
|
|
39
|
+
],
|
|
40
|
+
name: 'ECDSAInvalidSignatureS',
|
|
41
|
+
type: 'error',
|
|
42
|
+
},
|
|
43
|
+
{
|
|
44
|
+
anonymous: false,
|
|
45
|
+
inputs: [
|
|
46
|
+
{
|
|
47
|
+
indexed: true,
|
|
48
|
+
internalType: 'contract ICertVerifier',
|
|
49
|
+
name: 'oldCertVerifier',
|
|
50
|
+
type: 'address',
|
|
51
|
+
},
|
|
52
|
+
{
|
|
53
|
+
indexed: true,
|
|
54
|
+
internalType: 'contract ICertVerifier',
|
|
55
|
+
name: 'newCertVerifier',
|
|
56
|
+
type: 'address',
|
|
57
|
+
},
|
|
58
|
+
],
|
|
59
|
+
name: 'CertVerifierSet',
|
|
60
|
+
type: 'event',
|
|
61
|
+
},
|
|
62
|
+
{
|
|
63
|
+
anonymous: false,
|
|
64
|
+
inputs: [
|
|
65
|
+
{
|
|
66
|
+
indexed: true,
|
|
67
|
+
internalType: 'address',
|
|
68
|
+
name: 'from',
|
|
69
|
+
type: 'address',
|
|
70
|
+
},
|
|
71
|
+
{
|
|
72
|
+
indexed: true,
|
|
73
|
+
internalType: 'address',
|
|
74
|
+
name: 'to',
|
|
75
|
+
type: 'address',
|
|
76
|
+
},
|
|
77
|
+
],
|
|
78
|
+
name: 'OwnershipTransferRequested',
|
|
79
|
+
type: 'event',
|
|
80
|
+
},
|
|
81
|
+
{
|
|
82
|
+
anonymous: false,
|
|
83
|
+
inputs: [
|
|
84
|
+
{
|
|
85
|
+
indexed: true,
|
|
86
|
+
internalType: 'address',
|
|
87
|
+
name: 'from',
|
|
88
|
+
type: 'address',
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
indexed: true,
|
|
92
|
+
internalType: 'address',
|
|
93
|
+
name: 'to',
|
|
94
|
+
type: 'address',
|
|
95
|
+
},
|
|
96
|
+
],
|
|
97
|
+
name: 'OwnershipTransferred',
|
|
98
|
+
type: 'event',
|
|
99
|
+
},
|
|
100
|
+
{
|
|
101
|
+
anonymous: false,
|
|
102
|
+
inputs: [
|
|
103
|
+
{
|
|
104
|
+
indexed: true,
|
|
105
|
+
internalType: 'address',
|
|
106
|
+
name: 'oldAdmin',
|
|
107
|
+
type: 'address',
|
|
108
|
+
},
|
|
109
|
+
{
|
|
110
|
+
indexed: true,
|
|
111
|
+
internalType: 'address',
|
|
112
|
+
name: 'newAdmin',
|
|
113
|
+
type: 'address',
|
|
114
|
+
},
|
|
115
|
+
{
|
|
116
|
+
components: [
|
|
117
|
+
{
|
|
118
|
+
internalType: 'bytes[]',
|
|
119
|
+
name: 'nonSerializedParts',
|
|
120
|
+
type: 'bytes[]',
|
|
121
|
+
},
|
|
122
|
+
{
|
|
123
|
+
internalType: 'bytes',
|
|
124
|
+
name: 'expirationDate',
|
|
125
|
+
type: 'bytes',
|
|
126
|
+
},
|
|
127
|
+
{
|
|
128
|
+
internalType: 'bytes',
|
|
129
|
+
name: 'ca',
|
|
130
|
+
type: 'bytes',
|
|
131
|
+
},
|
|
132
|
+
{
|
|
133
|
+
internalType: 'bytes32',
|
|
134
|
+
name: 'userData',
|
|
135
|
+
type: 'bytes32',
|
|
136
|
+
},
|
|
137
|
+
{
|
|
138
|
+
internalType: 'bytes',
|
|
139
|
+
name: 'publicKey',
|
|
140
|
+
type: 'bytes',
|
|
141
|
+
},
|
|
142
|
+
{
|
|
143
|
+
internalType: 'bytes',
|
|
144
|
+
name: 'serialNumber',
|
|
145
|
+
type: 'bytes',
|
|
146
|
+
},
|
|
147
|
+
{
|
|
148
|
+
internalType: 'bytes32',
|
|
149
|
+
name: 'mrEnclave',
|
|
150
|
+
type: 'bytes32',
|
|
151
|
+
},
|
|
152
|
+
{
|
|
153
|
+
internalType: 'bytes32',
|
|
154
|
+
name: 'mrSigner',
|
|
155
|
+
type: 'bytes32',
|
|
156
|
+
},
|
|
157
|
+
{
|
|
158
|
+
internalType: 'bytes',
|
|
159
|
+
name: 'signature',
|
|
160
|
+
type: 'bytes',
|
|
161
|
+
},
|
|
162
|
+
],
|
|
163
|
+
indexed: false,
|
|
164
|
+
internalType: 'struct ChunkedX509Cert[]',
|
|
165
|
+
name: 'certsChain',
|
|
166
|
+
type: 'tuple[]',
|
|
167
|
+
},
|
|
168
|
+
{
|
|
169
|
+
indexed: false,
|
|
170
|
+
internalType: 'uint256',
|
|
171
|
+
name: 'rootCertId',
|
|
172
|
+
type: 'uint256',
|
|
173
|
+
},
|
|
174
|
+
],
|
|
175
|
+
name: 'SetAdmin',
|
|
176
|
+
type: 'event',
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
inputs: [],
|
|
180
|
+
name: 'acceptOwnership',
|
|
181
|
+
outputs: [],
|
|
182
|
+
stateMutability: 'nonpayable',
|
|
183
|
+
type: 'function',
|
|
184
|
+
},
|
|
185
|
+
{
|
|
186
|
+
inputs: [
|
|
187
|
+
{
|
|
188
|
+
components: [
|
|
189
|
+
{
|
|
190
|
+
internalType: 'bytes[]',
|
|
191
|
+
name: 'nonSerializedParts',
|
|
192
|
+
type: 'bytes[]',
|
|
193
|
+
},
|
|
194
|
+
{
|
|
195
|
+
internalType: 'bytes',
|
|
196
|
+
name: 'expirationDate',
|
|
197
|
+
type: 'bytes',
|
|
198
|
+
},
|
|
199
|
+
{
|
|
200
|
+
internalType: 'bytes',
|
|
201
|
+
name: 'ca',
|
|
202
|
+
type: 'bytes',
|
|
203
|
+
},
|
|
204
|
+
{
|
|
205
|
+
internalType: 'bytes32',
|
|
206
|
+
name: 'userData',
|
|
207
|
+
type: 'bytes32',
|
|
208
|
+
},
|
|
209
|
+
{
|
|
210
|
+
internalType: 'bytes',
|
|
211
|
+
name: 'publicKey',
|
|
212
|
+
type: 'bytes',
|
|
213
|
+
},
|
|
214
|
+
{
|
|
215
|
+
internalType: 'bytes',
|
|
216
|
+
name: 'serialNumber',
|
|
217
|
+
type: 'bytes',
|
|
218
|
+
},
|
|
219
|
+
{
|
|
220
|
+
internalType: 'bytes32',
|
|
221
|
+
name: 'mrEnclave',
|
|
222
|
+
type: 'bytes32',
|
|
223
|
+
},
|
|
224
|
+
{
|
|
225
|
+
internalType: 'bytes32',
|
|
226
|
+
name: 'mrSigner',
|
|
227
|
+
type: 'bytes32',
|
|
228
|
+
},
|
|
229
|
+
{
|
|
230
|
+
internalType: 'bytes',
|
|
231
|
+
name: 'signature',
|
|
232
|
+
type: 'bytes',
|
|
233
|
+
},
|
|
234
|
+
],
|
|
235
|
+
internalType: 'struct ChunkedX509Cert[]',
|
|
236
|
+
name: '_certsChain',
|
|
237
|
+
type: 'tuple[]',
|
|
238
|
+
},
|
|
239
|
+
{
|
|
240
|
+
internalType: 'uint256',
|
|
241
|
+
name: '_rootCertId',
|
|
242
|
+
type: 'uint256',
|
|
243
|
+
},
|
|
244
|
+
{
|
|
245
|
+
internalType: 'bytes',
|
|
246
|
+
name: 'signature',
|
|
247
|
+
type: 'bytes',
|
|
248
|
+
},
|
|
249
|
+
],
|
|
250
|
+
name: 'addAdmin',
|
|
251
|
+
outputs: [],
|
|
252
|
+
stateMutability: 'nonpayable',
|
|
253
|
+
type: 'function',
|
|
254
|
+
},
|
|
255
|
+
{
|
|
256
|
+
inputs: [],
|
|
257
|
+
name: 'getAdminData',
|
|
258
|
+
outputs: [
|
|
259
|
+
{
|
|
260
|
+
internalType: 'address',
|
|
261
|
+
name: '_admin',
|
|
262
|
+
type: 'address',
|
|
263
|
+
},
|
|
264
|
+
{
|
|
265
|
+
components: [
|
|
266
|
+
{
|
|
267
|
+
internalType: 'bytes[]',
|
|
268
|
+
name: 'nonSerializedParts',
|
|
269
|
+
type: 'bytes[]',
|
|
270
|
+
},
|
|
271
|
+
{
|
|
272
|
+
internalType: 'bytes',
|
|
273
|
+
name: 'expirationDate',
|
|
274
|
+
type: 'bytes',
|
|
275
|
+
},
|
|
276
|
+
{
|
|
277
|
+
internalType: 'bytes',
|
|
278
|
+
name: 'ca',
|
|
279
|
+
type: 'bytes',
|
|
280
|
+
},
|
|
281
|
+
{
|
|
282
|
+
internalType: 'bytes32',
|
|
283
|
+
name: 'userData',
|
|
284
|
+
type: 'bytes32',
|
|
285
|
+
},
|
|
286
|
+
{
|
|
287
|
+
internalType: 'bytes',
|
|
288
|
+
name: 'publicKey',
|
|
289
|
+
type: 'bytes',
|
|
290
|
+
},
|
|
291
|
+
{
|
|
292
|
+
internalType: 'bytes',
|
|
293
|
+
name: 'serialNumber',
|
|
294
|
+
type: 'bytes',
|
|
295
|
+
},
|
|
296
|
+
{
|
|
297
|
+
internalType: 'bytes32',
|
|
298
|
+
name: 'mrEnclave',
|
|
299
|
+
type: 'bytes32',
|
|
300
|
+
},
|
|
301
|
+
{
|
|
302
|
+
internalType: 'bytes32',
|
|
303
|
+
name: 'mrSigner',
|
|
304
|
+
type: 'bytes32',
|
|
305
|
+
},
|
|
306
|
+
{
|
|
307
|
+
internalType: 'bytes',
|
|
308
|
+
name: 'signature',
|
|
309
|
+
type: 'bytes',
|
|
310
|
+
},
|
|
311
|
+
],
|
|
312
|
+
internalType: 'struct ChunkedX509Cert[]',
|
|
313
|
+
name: '_certsChain',
|
|
314
|
+
type: 'tuple[]',
|
|
315
|
+
},
|
|
316
|
+
{
|
|
317
|
+
internalType: 'uint256',
|
|
318
|
+
name: '_rootCertId',
|
|
319
|
+
type: 'uint256',
|
|
320
|
+
},
|
|
321
|
+
],
|
|
322
|
+
stateMutability: 'view',
|
|
323
|
+
type: 'function',
|
|
324
|
+
},
|
|
325
|
+
{
|
|
326
|
+
inputs: [],
|
|
327
|
+
name: 'getCertVerifier',
|
|
328
|
+
outputs: [
|
|
329
|
+
{
|
|
330
|
+
internalType: 'contract ICertVerifier',
|
|
331
|
+
name: '',
|
|
332
|
+
type: 'address',
|
|
333
|
+
},
|
|
334
|
+
],
|
|
335
|
+
stateMutability: 'view',
|
|
336
|
+
type: 'function',
|
|
337
|
+
},
|
|
338
|
+
{
|
|
339
|
+
inputs: [],
|
|
340
|
+
name: 'getSignatureNonce',
|
|
341
|
+
outputs: [
|
|
342
|
+
{
|
|
343
|
+
internalType: 'uint256',
|
|
344
|
+
name: '',
|
|
345
|
+
type: 'uint256',
|
|
346
|
+
},
|
|
347
|
+
],
|
|
348
|
+
stateMutability: 'view',
|
|
349
|
+
type: 'function',
|
|
350
|
+
},
|
|
351
|
+
{
|
|
352
|
+
inputs: [
|
|
353
|
+
{
|
|
354
|
+
internalType: 'address',
|
|
355
|
+
name: 'caller',
|
|
356
|
+
type: 'address',
|
|
357
|
+
},
|
|
358
|
+
],
|
|
359
|
+
name: 'isAdmin',
|
|
360
|
+
outputs: [
|
|
361
|
+
{
|
|
362
|
+
internalType: 'bool',
|
|
363
|
+
name: '',
|
|
364
|
+
type: 'bool',
|
|
365
|
+
},
|
|
366
|
+
],
|
|
367
|
+
stateMutability: 'view',
|
|
368
|
+
type: 'function',
|
|
369
|
+
},
|
|
370
|
+
{
|
|
371
|
+
inputs: [],
|
|
372
|
+
name: 'owner',
|
|
373
|
+
outputs: [
|
|
374
|
+
{
|
|
375
|
+
internalType: 'address payable',
|
|
376
|
+
name: '',
|
|
377
|
+
type: 'address',
|
|
378
|
+
},
|
|
379
|
+
],
|
|
380
|
+
stateMutability: 'view',
|
|
381
|
+
type: 'function',
|
|
382
|
+
},
|
|
383
|
+
{
|
|
384
|
+
inputs: [
|
|
385
|
+
{
|
|
386
|
+
internalType: 'contract ICertVerifier',
|
|
387
|
+
name: '_certVerifier',
|
|
388
|
+
type: 'address',
|
|
389
|
+
},
|
|
390
|
+
],
|
|
391
|
+
name: 'setCertVerifier',
|
|
392
|
+
outputs: [],
|
|
393
|
+
stateMutability: 'nonpayable',
|
|
394
|
+
type: 'function',
|
|
395
|
+
},
|
|
396
|
+
{
|
|
397
|
+
inputs: [
|
|
398
|
+
{
|
|
399
|
+
internalType: 'address',
|
|
400
|
+
name: '_to',
|
|
401
|
+
type: 'address',
|
|
402
|
+
},
|
|
403
|
+
],
|
|
404
|
+
name: 'transferOwnership',
|
|
405
|
+
outputs: [],
|
|
406
|
+
stateMutability: 'nonpayable',
|
|
407
|
+
type: 'function',
|
|
408
|
+
},
|
|
409
|
+
];
|
|
410
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"adminCertificateHelperAbi.js","sourceRoot":"","sources":["../../../src/contracts/adminCertificateHelperAbi.ts"],"names":[],"mappings":";;;AAAa,QAAA,yBAAyB,GAAG;IACvC;QACE,MAAM,EAAE;YACN;gBACE,YAAY,EAAE,wBAAwB;gBACtC,IAAI,EAAE,eAAe;gBACrB,IAAI,EAAE,SAAS;aAChB;SACF;QACD,eAAe,EAAE,YAAY;QAC7B,IAAI,EAAE,aAAa;KACpB;IACD;QACE,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,uBAAuB;QAC7B,IAAI,EAAE,OAAO;KACd;IACD;QACE,MAAM,EAAE;YACN;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,QAAQ;gBACd,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,6BAA6B;QACnC,IAAI,EAAE,OAAO;KACd;IACD;QACE,MAAM,EAAE;YACN;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,GAAG;gBACT,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,wBAAwB;QAC9B,IAAI,EAAE,OAAO;KACd;IACD;QACE,SAAS,EAAE,KAAK;QAChB,MAAM,EAAE;YACN;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,wBAAwB;gBACtC,IAAI,EAAE,iBAAiB;gBACvB,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,wBAAwB;gBACtC,IAAI,EAAE,iBAAiB;gBACvB,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,iBAAiB;QACvB,IAAI,EAAE,OAAO;KACd;IACD;QACE,SAAS,EAAE,KAAK;QAChB,MAAM,EAAE;YACN;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,MAAM;gBACZ,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,IAAI;gBACV,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,4BAA4B;QAClC,IAAI,EAAE,OAAO;KACd;IACD;QACE,SAAS,EAAE,KAAK;QAChB,MAAM,EAAE;YACN;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,MAAM;gBACZ,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,IAAI;gBACV,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,sBAAsB;QAC5B,IAAI,EAAE,OAAO;KACd;IACD;QACE,SAAS,EAAE,KAAK;QAChB,MAAM,EAAE;YACN;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,UAAU;gBAChB,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,UAAU;gBAChB,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,UAAU,EAAE;oBACV;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,gBAAgB;wBACtB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,IAAI;wBACV,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,UAAU;wBAChB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,cAAc;wBACpB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,UAAU;wBAChB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,OAAO;qBACd;iBACF;gBACD,OAAO,EAAE,KAAK;gBACd,YAAY,EAAE,0BAA0B;gBACxC,IAAI,EAAE,YAAY;gBAClB,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,OAAO,EAAE,KAAK;gBACd,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,YAAY;gBAClB,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,UAAU;QAChB,IAAI,EAAE,OAAO;KACd;IACD;QACE,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,iBAAiB;QACvB,OAAO,EAAE,EAAE;QACX,eAAe,EAAE,YAAY;QAC7B,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE;YACN;gBACE,UAAU,EAAE;oBACV;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,gBAAgB;wBACtB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,IAAI;wBACV,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,UAAU;wBAChB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,cAAc;wBACpB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,UAAU;wBAChB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,OAAO;qBACd;iBACF;gBACD,YAAY,EAAE,0BAA0B;gBACxC,IAAI,EAAE,aAAa;gBACnB,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,aAAa;gBACnB,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,YAAY,EAAE,OAAO;gBACrB,IAAI,EAAE,WAAW;gBACjB,IAAI,EAAE,OAAO;aACd;SACF;QACD,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,EAAE;QACX,eAAe,EAAE,YAAY;QAC7B,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE;YACP;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,QAAQ;gBACd,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,UAAU,EAAE;oBACV;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,gBAAgB;wBACtB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,IAAI;wBACV,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,UAAU;wBAChB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,cAAc;wBACpB,IAAI,EAAE,OAAO;qBACd;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,SAAS;wBACvB,IAAI,EAAE,UAAU;wBAChB,IAAI,EAAE,SAAS;qBAChB;oBACD;wBACE,YAAY,EAAE,OAAO;wBACrB,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,OAAO;qBACd;iBACF;gBACD,YAAY,EAAE,0BAA0B;gBACxC,IAAI,EAAE,aAAa;gBACnB,IAAI,EAAE,SAAS;aAChB;YACD;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,aAAa;gBACnB,IAAI,EAAE,SAAS;aAChB;SACF;QACD,eAAe,EAAE,MAAM;QACvB,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,iBAAiB;QACvB,OAAO,EAAE;YACP;gBACE,YAAY,EAAE,wBAAwB;gBACtC,IAAI,EAAE,EAAE;gBACR,IAAI,EAAE,SAAS;aAChB;SACF;QACD,eAAe,EAAE,MAAM;QACvB,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,mBAAmB;QACzB,OAAO,EAAE;YACP;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,EAAE;gBACR,IAAI,EAAE,SAAS;aAChB;SACF;QACD,eAAe,EAAE,MAAM;QACvB,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE;YACN;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,QAAQ;gBACd,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,SAAS;QACf,OAAO,EAAE;YACP;gBACE,YAAY,EAAE,MAAM;gBACpB,IAAI,EAAE,EAAE;gBACR,IAAI,EAAE,MAAM;aACb;SACF;QACD,eAAe,EAAE,MAAM;QACvB,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,OAAO;QACb,OAAO,EAAE;YACP;gBACE,YAAY,EAAE,iBAAiB;gBAC/B,IAAI,EAAE,EAAE;gBACR,IAAI,EAAE,SAAS;aAChB;SACF;QACD,eAAe,EAAE,MAAM;QACvB,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE;YACN;gBACE,YAAY,EAAE,wBAAwB;gBACtC,IAAI,EAAE,eAAe;gBACrB,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,iBAAiB;QACvB,OAAO,EAAE,EAAE;QACX,eAAe,EAAE,YAAY;QAC7B,IAAI,EAAE,UAAU;KACjB;IACD;QACE,MAAM,EAAE;YACN;gBACE,YAAY,EAAE,SAAS;gBACvB,IAAI,EAAE,KAAK;gBACX,IAAI,EAAE,SAAS;aAChB;SACF;QACD,IAAI,EAAE,mBAAmB;QACzB,OAAO,EAAE,EAAE;QACX,eAAe,EAAE,YAAY;QAC7B,IAAI,EAAE,UAAU;KACjB;CACO,CAAC"}
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
/// <reference types="node" />
|
|
3
3
|
/// <reference types="node" />
|
|
4
4
|
/// <reference types="node" />
|
|
5
|
-
import { CryptoAlgorithm, Encryption, Hash, EncryptionKey
|
|
5
|
+
import { CryptoAlgorithm, Encryption, Hash, EncryptionKey } from '@super-protocol/dto-js';
|
|
6
6
|
import fs from 'fs';
|
|
7
7
|
import { Readable } from 'stream';
|
|
8
8
|
import { BinaryToTextEncoding, KeyObject } from 'crypto';
|
|
@@ -11,30 +11,33 @@ import { CryptoKeyType } from './types.js';
|
|
|
11
11
|
declare class Crypto {
|
|
12
12
|
/**
|
|
13
13
|
* Used to encrypt data before sending it to blockchain
|
|
14
|
+
* @param algorithm - encryption algorithm
|
|
14
15
|
* @param content - string data to encrypt
|
|
15
|
-
* @param
|
|
16
|
-
* @
|
|
16
|
+
* @param key - key in string format (default encoding base64)
|
|
17
|
+
* @param encoding - encoding of key and output data
|
|
18
|
+
* @returns {Promise<Encryption>} - object what contains encrypted data, key and spec to decryption
|
|
17
19
|
*/
|
|
18
|
-
static encrypt
|
|
20
|
+
static encrypt(content: string, encryption: Encryption): Promise<Encryption>;
|
|
19
21
|
/**
|
|
20
22
|
* Encrypts data stream
|
|
21
23
|
* @param inputStream - path to file that will be encrypted
|
|
22
|
-
* @param outputStream - place where
|
|
23
|
-
* @param
|
|
24
|
-
* @
|
|
24
|
+
* @param outputStream - place where it will be saved
|
|
25
|
+
* @param algorithm - file encryption algorithm
|
|
26
|
+
* @param key – key that will be used to encrypt data
|
|
27
|
+
* @returns {Promise<Encryption>} - encryption info
|
|
25
28
|
*/
|
|
26
29
|
static encryptStream(inputStream: fs.ReadStream, outputStream: fs.WriteStream, encryption: Encryption): Promise<Encryption>;
|
|
27
30
|
/**
|
|
28
31
|
* Used to decrypt data from blockchain
|
|
29
32
|
* @param encryption - object what contains encrypted data, key and spec to decryption
|
|
30
|
-
* @returns decrypted
|
|
33
|
+
* @returns {Promise<string>} - decrypted string
|
|
31
34
|
*/
|
|
32
|
-
static decrypt
|
|
35
|
+
static decrypt(encryption: Encryption): Promise<string>;
|
|
33
36
|
/**
|
|
34
37
|
* Decrypts data stream
|
|
35
38
|
* @param inputStream - stream with data to decrypt
|
|
36
39
|
* @param outputStream - stream where the decrypted data will be written
|
|
37
|
-
* @param encryption
|
|
40
|
+
* @param encryption – encryption info
|
|
38
41
|
*/
|
|
39
42
|
static decryptStream(inputStream: fs.ReadStream, outputStream: fs.WriteStream, encryption: Encryption): Promise<void>;
|
|
40
43
|
/**
|
|
@@ -14,20 +14,22 @@ const dto_js_2 = require("@super-protocol/dto-js");
|
|
|
14
14
|
class Crypto {
|
|
15
15
|
/**
|
|
16
16
|
* Used to encrypt data before sending it to blockchain
|
|
17
|
+
* @param algorithm - encryption algorithm
|
|
17
18
|
* @param content - string data to encrypt
|
|
18
|
-
* @param
|
|
19
|
-
* @
|
|
19
|
+
* @param key - key in string format (default encoding base64)
|
|
20
|
+
* @param encoding - encoding of key and output data
|
|
21
|
+
* @returns {Promise<Encryption>} - object what contains encrypted data, key and spec to decryption
|
|
20
22
|
*/
|
|
21
|
-
static encrypt(content, encryption) {
|
|
23
|
+
static async encrypt(content, encryption) {
|
|
22
24
|
switch (encryption.algo) {
|
|
23
25
|
case dto_js_1.CryptoAlgorithm.AES:
|
|
24
|
-
return AES_js_1.default.encrypt(content, encryption);
|
|
26
|
+
return await AES_js_1.default.encrypt(content, encryption);
|
|
25
27
|
case dto_js_1.CryptoAlgorithm.ARIA:
|
|
26
|
-
return ARIA_js_1.default.encrypt(content, encryption);
|
|
28
|
+
return await ARIA_js_1.default.encrypt(content, encryption);
|
|
27
29
|
case dto_js_1.CryptoAlgorithm.ECIES:
|
|
28
|
-
return ECIES_js_1.default.encrypt(content, encryption);
|
|
30
|
+
return await ECIES_js_1.default.encrypt(content, encryption);
|
|
29
31
|
case dto_js_1.CryptoAlgorithm.RSAHybrid:
|
|
30
|
-
return RSA_Hybrid_js_1.default.encrypt(content, encryption);
|
|
32
|
+
return await RSA_Hybrid_js_1.default.encrypt(content, encryption);
|
|
31
33
|
default:
|
|
32
34
|
throw Error(`${encryption.algo} algorithm not supported`);
|
|
33
35
|
}
|
|
@@ -35,9 +37,10 @@ class Crypto {
|
|
|
35
37
|
/**
|
|
36
38
|
* Encrypts data stream
|
|
37
39
|
* @param inputStream - path to file that will be encrypted
|
|
38
|
-
* @param outputStream - place where
|
|
39
|
-
* @param
|
|
40
|
-
* @
|
|
40
|
+
* @param outputStream - place where it will be saved
|
|
41
|
+
* @param algorithm - file encryption algorithm
|
|
42
|
+
* @param key – key that will be used to encrypt data
|
|
43
|
+
* @returns {Promise<Encryption>} - encryption info
|
|
41
44
|
*/
|
|
42
45
|
static async encryptStream(inputStream, outputStream, encryption) {
|
|
43
46
|
switch (encryption.algo) {
|
|
@@ -54,9 +57,9 @@ class Crypto {
|
|
|
54
57
|
/**
|
|
55
58
|
* Used to decrypt data from blockchain
|
|
56
59
|
* @param encryption - object what contains encrypted data, key and spec to decryption
|
|
57
|
-
* @returns decrypted
|
|
60
|
+
* @returns {Promise<string>} - decrypted string
|
|
58
61
|
*/
|
|
59
|
-
static decrypt(encryption) {
|
|
62
|
+
static async decrypt(encryption) {
|
|
60
63
|
switch (encryption.algo) {
|
|
61
64
|
case dto_js_1.CryptoAlgorithm.AES:
|
|
62
65
|
return AES_js_1.default.decrypt(encryption);
|
|
@@ -74,7 +77,7 @@ class Crypto {
|
|
|
74
77
|
* Decrypts data stream
|
|
75
78
|
* @param inputStream - stream with data to decrypt
|
|
76
79
|
* @param outputStream - stream where the decrypted data will be written
|
|
77
|
-
* @param encryption
|
|
80
|
+
* @param encryption – encryption info
|
|
78
81
|
*/
|
|
79
82
|
static async decryptStream(inputStream, outputStream, encryption) {
|
|
80
83
|
switch (encryption.algo) {
|
|
@@ -134,4 +137,4 @@ class Crypto {
|
|
|
134
137
|
}
|
|
135
138
|
}
|
|
136
139
|
exports.default = Crypto;
|
|
137
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
140
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiQ3J5cHRvLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vc3JjL2NyeXB0by9DcnlwdG8udHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7QUFBQSxtREFTZ0M7QUFFaEMsNkRBQWtDO0FBQ2xDLCtEQUFvQztBQUNwQyxpRUFBc0M7QUFDdEMsMkVBQStDO0FBQy9DLCtFQUFvRDtBQUVwRCxvREFBaUU7QUFDakUsbURBQXVEO0FBR3ZELE1BQU0sTUFBTTtJQUNWOzs7Ozs7O09BT0c7SUFDSCxNQUFNLENBQUMsS0FBSyxDQUFDLE9BQU8sQ0FBQyxPQUFlLEVBQUUsVUFBc0I7UUFDMUQsUUFBUSxVQUFVLENBQUMsSUFBSSxFQUFFLENBQUM7WUFDeEIsS0FBSyx3QkFBZSxDQUFDLEdBQUc7Z0JBQ3RCLE9BQU8sTUFBTSxnQkFBRyxDQUFDLE9BQU8sQ0FBQyxPQUFPLEVBQUUsVUFBVSxDQUFDLENBQUM7WUFFaEQsS0FBSyx3QkFBZSxDQUFDLElBQUk7Z0JBQ3ZCLE9BQU8sTUFBTSxpQkFBSSxDQUFDLE9BQU8sQ0FBQyxPQUFPLEVBQUUsVUFBVSxDQUFDLENBQUM7WUFFakQsS0FBSyx3QkFBZSxDQUFDLEtBQUs7Z0JBQ3hCLE9BQU8sTUFBTSxrQkFBSyxDQUFDLE9BQU8sQ0FBQyxPQUFPLEVBQUUsVUFBVSxDQUFDLENBQUM7WUFFbEQsS0FBSyx3QkFBZSxDQUFDLFNBQVM7Z0JBQzVCLE9BQU8sTUFBTSx1QkFBUyxDQUFDLE9BQU8sQ0FBQyxPQUFPLEVBQUUsVUFBVSxDQUFDLENBQUM7WUFFdEQ7Z0JBQ0UsTUFBTSxLQUFLLENBQUMsR0FBRyxVQUFVLENBQUMsSUFBSSwwQkFBMEIsQ0FBQyxDQUFDO1FBQzlELENBQUM7SUFDSCxDQUFDO0lBRUQ7Ozs7Ozs7T0FPRztJQUNILE1BQU0sQ0FBQyxLQUFLLENBQUMsYUFBYSxDQUN4QixXQUEwQixFQUMxQixZQUE0QixFQUM1QixVQUFzQjtRQUV0QixRQUFRLFVBQVUsQ0FBQyxJQUFJLEVBQUUsQ0FBQztZQUN4QixLQUFLLHdCQUFlLENBQUMsR0FBRztnQkFDdEIsT0FBTyxNQUFNLGdCQUFHLENBQUMsYUFBYSxDQUFDLFdBQVcsRUFBRSxZQUFZLEVBQUUsVUFBVSxDQUFDLENBQUM7WUFDeEUsS0FBSyx3QkFBZSxDQUFDLElBQUk7Z0JBQ3ZCLE9BQU8sTUFBTSxpQkFBSSxDQUFDLGFBQWEsQ0FBQyxXQUFXLEVBQUUsWUFBWSxFQUFFLFVBQVUsQ0FBQyxDQUFDO1lBQ3pFLEtBQUssd0JBQWUsQ0FBQyxTQUFTO2dCQUM1QixPQUFPLE1BQU0sdUJBQVMsQ0FBQyxhQUFhLENBQUMsV0FBVyxFQUFFLFlBQVksRUFBRSxVQUFVLENBQUMsQ0FBQztZQUM5RTtnQkFDRSxNQUFNLEtBQUssQ0FBQyxHQUFHLFVBQVUsQ0FBQyxJQUFJLDBCQUEwQixDQUFDLENBQUM7UUFDOUQsQ0FBQztJQUNILENBQUM7SUFFRDs7OztPQUlHO0lBQ0gsTUFBTSxDQUFDLEtBQUssQ0FBQyxPQUFPLENBQUMsVUFBc0I7UUFDekMsUUFBUSxVQUFVLENBQUMsSUFBSSxFQUFFLENBQUM7WUFDeEIsS0FBSyx3QkFBZSxDQUFDLEdBQUc7Z0JBQ3RCLE9BQU8sZ0JBQUcsQ0FBQyxPQUFPLENBQUMsVUFBMkIsQ0FBQyxDQUFDO1lBRWxELEtBQUssd0JBQWUsQ0FBQyxJQUFJO2dCQUN2QixPQUFPLGlCQUFJLENBQUMsT0FBTyxDQUFDLFVBQTRCLENBQUMsQ0FBQztZQUVwRCxLQUFLLHdCQUFlLENBQUMsS0FBSztnQkFDeEIsT0FBTyxrQkFBSyxDQUFDLE9BQU8sQ0FBQyxVQUE2QixDQUFDLENBQUM7WUFFdEQsS0FBSyx3QkFBZSxDQUFDLFNBQVM7Z0JBQzVCLE9BQU8sdUJBQVMsQ0FBQyxPQUFPLENBQUMsVUFBaUMsQ0FBQyxDQUFDO1lBRTlEO2dCQUNFLE1BQU0sS0FBSyxDQUFDLEdBQUcsVUFBVSxDQUFDLElBQUksMEJBQTBCLENBQUMsQ0FBQztRQUM5RCxDQUFDO0lBQ0gsQ0FBQztJQUVEOzs7OztPQUtHO0lBQ0gsTUFBTSxDQUFDLEtBQUssQ0FBQyxhQUFhLENBQ3hCLFdBQTBCLEVBQzFCLFlBQTRCLEVBQzVCLFVBQXNCO1FBRXRCLFFBQVEsVUFBVSxDQUFDLElBQUksRUFBRSxDQUFDO1lBQ3hCLEtBQUssd0JBQWUsQ0FBQyxHQUFHO2dCQUN0QixPQUFPLE1BQU0sZ0JBQUcsQ0FBQyxhQUFhLENBQUMsV0FBVyxFQUFFLFlBQVksRUFBRSxVQUEyQixDQUFDLENBQUM7WUFDekYsS0FBSyx3QkFBZSxDQUFDLElBQUk7Z0JBQ3ZCLE9BQU8sTUFBTSxpQkFBSSxDQUFDLGFBQWEsQ0FBQyxXQUFXLEVBQUUsWUFBWSxFQUFFLFVBQTRCLENBQUMsQ0FBQztZQUMzRixLQUFLLHdCQUFlLENBQUMsU0FBUztnQkFDNUIsT0FBTyxNQUFNLHVCQUFTLENBQUMsYUFBYSxDQUNsQyxXQUFXLEVBQ1gsWUFBWSxFQUNaLFVBQWlDLENBQ2xDLENBQUM7WUFDSjtnQkFDRSxNQUFNLEtBQUssQ0FBQyxHQUFHLFVBQVUsQ0FBQyxJQUFJLDBCQUEwQixDQUFDLENBQUM7UUFDOUQsQ0FBQztJQUNILENBQUM7SUFnQkQsTUFBTSxDQUFDLEtBQUssQ0FBQyxVQUFVLENBQUMsTUFBeUIsRUFBRSxRQUE0QjtRQUM3RSxNQUFNLEVBQUUsSUFBSSxFQUFFLFFBQVEsRUFBRSxHQUFHLFFBQVEsQ0FBQztRQUNwQyxPQUFPLE1BQU0sQ0FBQyxRQUFRLENBQUMsTUFBTSxDQUFDO1lBQzVCLENBQUMsQ0FBQyx5QkFBWSxDQUFDLG9CQUFvQixDQUFDLE1BQU0sRUFBRSxJQUFJLEVBQUUsUUFBUSxDQUFDO1lBQzNELENBQUMsQ0FBQyxNQUFNLHlCQUFZLENBQUMsb0JBQW9CLENBQUMsTUFBTSxFQUFFLElBQUksRUFBRSxRQUFRLENBQUMsQ0FBQztJQUN0RSxDQUFDO0lBRUQsTUFBTSxDQUFDLFlBQVksQ0FBQyxVQUF5QjtRQUMzQyxRQUFRLFVBQVUsQ0FBQyxJQUFJLEVBQUUsQ0FBQztZQUN4QixLQUFLLHdCQUFlLENBQUMsS0FBSztnQkFDeEIsT0FBTyxrQkFBSyxDQUFDLHNCQUFzQixDQUFDLFVBQVUsQ0FBQyxDQUFDO1lBQ2xEO2dCQUNFLE1BQU0sS0FBSyxDQUFDLEdBQUcsVUFBVSxDQUFDLElBQUksMEJBQTBCLENBQUMsQ0FBQztRQUM5RCxDQUFDO0lBQ0gsQ0FBQztJQUVELE1BQU0sQ0FBQyxLQUFLLENBQUMsWUFBWSxDQUE0QixJQUFPO1FBQzFELFFBQVEsSUFBSSxFQUFFLENBQUM7WUFDYixLQUFLLHdCQUFlLENBQUMsS0FBSztnQkFDeEIsT0FBTyxDQUFDLE1BQU0sa0JBQUssQ0FBQyxZQUFZLEVBQUUsQ0FBcUIsQ0FBQztZQUMxRCxLQUFLLHdCQUFlLENBQUMsR0FBRztnQkFDdEIsT0FBTyxnQkFBRyxDQUFDLFlBQVksRUFBc0IsQ0FBQztZQUNoRDtnQkFDRSxNQUFNLEtBQUssQ0FBQyxHQUFHLElBQUksMEJBQTBCLENBQUMsQ0FBQztRQUNuRCxDQUFDO0lBQ0gsQ0FBQztJQUVELE1BQU0sQ0FBQyxJQUFJLENBQUMsTUFLWDtRQUNDLE1BQU0sRUFBRSxJQUFJLEVBQUUsWUFBWSxHQUFHLFFBQVEsRUFBRSxJQUFJLEdBQUcsc0JBQWEsQ0FBQyxNQUFNLEVBQUUsR0FBRyxNQUFNLENBQUM7UUFFOUUsSUFBSSxDQUFDLE1BQU0sQ0FBQyxVQUFVLEVBQUUsQ0FBQztZQUN2QixNQUFNLElBQUksS0FBSyxDQUFDLDBDQUEwQyxDQUFDLENBQUM7UUFDOUQsQ0FBQztRQUVELE1BQU0sTUFBTSxHQUFHLGdCQUFNLENBQUMsVUFBVSxDQUFDLElBQUksQ0FBQyxDQUFDO1FBQ3ZDLE1BQU0sQ0FBQyxLQUFLLENBQUMsSUFBSSxDQUFDLENBQUM7UUFDbkIsTUFBTSxDQUFDLEdBQUcsRUFBRSxDQUFDO1FBRWIsT0FBTyxNQUFNLENBQUMsSUFBSSxDQUFDLE1BQU0sQ0FBQyxVQUFVLEVBQUUsWUFBWSxDQUFDLENBQUM7SUFDdEQsQ0FBQztJQUVELE1BQU0sQ0FBQyxNQUFNLENBQUMsTUFNYjtRQUNDLE1BQU0sRUFBRSxJQUFJLEVBQUUsU0FBUyxFQUFFLGVBQWUsR0FBRyxRQUFRLEVBQUUsSUFBSSxHQUFHLHNCQUFhLENBQUMsTUFBTSxFQUFFLEdBQUcsTUFBTSxDQUFDO1FBRTVGLElBQUksQ0FBQyxNQUFNLENBQUMsU0FBUyxFQUFFLENBQUM7WUFDdEIsTUFBTSxJQUFJLEtBQUssQ0FBQywyQ0FBMkMsQ0FBQyxDQUFDO1FBQy9ELENBQUM7UUFFRCxNQUFNLFFBQVEsR0FBRyxnQkFBTSxDQUFDLFlBQVksQ0FBQyxJQUFJLENBQUMsQ0FBQztRQUMzQyxRQUFRLENBQUMsS0FBSyxDQUFDLElBQUksQ0FBQyxDQUFDO1FBQ3JCLFFBQVEsQ0FBQyxHQUFHLEVBQUUsQ0FBQztRQUVmLE9BQU8sUUFBUSxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUMsU0FBUyxFQUFFLFNBQVMsRUFBRSxlQUFlLENBQUMsQ0FBQztJQUN2RSxDQUFDO0NBQ0Y7QUFFRCxrQkFBZSxNQUFNLENBQUMifQ==
|
|
@@ -3,7 +3,7 @@ import { AESEncryption, Encryption } from '@super-protocol/dto-js';
|
|
|
3
3
|
import { ReadStream, WriteStream } from 'fs';
|
|
4
4
|
import { SymmetricKey } from '../types.js';
|
|
5
5
|
declare class AES {
|
|
6
|
-
static encrypt(content: string, encryption: Encryption): AESEncryption
|
|
6
|
+
static encrypt(content: string, encryption: Encryption): Promise<AESEncryption>;
|
|
7
7
|
/**
|
|
8
8
|
* Encrypts data stream
|
|
9
9
|
* @param inputStream - path to file that will be encrypted
|
|
@@ -30,7 +30,7 @@ const dto_js_1 = require("@super-protocol/dto-js");
|
|
|
30
30
|
const crypto = __importStar(require("crypto"));
|
|
31
31
|
const NativeCrypto_js_1 = __importDefault(require("./NativeCrypto.js"));
|
|
32
32
|
class AES {
|
|
33
|
-
static encrypt(content, encryption) {
|
|
33
|
+
static async encrypt(content, encryption) {
|
|
34
34
|
if (!encryption.key)
|
|
35
35
|
throw Error('Encryption key is not provided');
|
|
36
36
|
encryption.cipher = encryption.cipher || dto_js_1.Cipher.AES_256_GCM;
|
|
@@ -103,4 +103,4 @@ class AES {
|
|
|
103
103
|
}
|
|
104
104
|
}
|
|
105
105
|
exports.default = AES;
|
|
106
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
106
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
import { ARIAEncryption, Encryption } from '@super-protocol/dto-js';
|
|
3
3
|
import { ReadStream, WriteStream } from 'fs';
|
|
4
4
|
declare class ARIA {
|
|
5
|
-
static encrypt(content: string, encryption: Encryption): ARIAEncryption
|
|
5
|
+
static encrypt(content: string, encryption: Encryption): Promise<ARIAEncryption>;
|
|
6
6
|
/**
|
|
7
7
|
* Encrypts data stream
|
|
8
8
|
* @param inputStream - path to file that will be encrypted
|
|
@@ -6,7 +6,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
6
6
|
const dto_js_1 = require("@super-protocol/dto-js");
|
|
7
7
|
const NativeCrypto_js_1 = __importDefault(require("./NativeCrypto.js"));
|
|
8
8
|
class ARIA {
|
|
9
|
-
static encrypt(content, encryption) {
|
|
9
|
+
static async encrypt(content, encryption) {
|
|
10
10
|
if (!encryption.key)
|
|
11
11
|
throw Error('Encryption key is not provided');
|
|
12
12
|
encryption.cipher = encryption.cipher || dto_js_1.Cipher.ARIA_256_GCM;
|
|
@@ -75,4 +75,4 @@ class ARIA {
|
|
|
75
75
|
}
|
|
76
76
|
}
|
|
77
77
|
exports.default = ARIA;
|
|
78
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
78
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiQVJJQS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9jcnlwdG8vbm9kZWpzL0FSSUEudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7QUFBQSxtREFNZ0M7QUFHaEMsd0VBQTZDO0FBRTdDLE1BQU0sSUFBSTtJQUNELE1BQU0sQ0FBQyxLQUFLLENBQUMsT0FBTyxDQUFDLE9BQWUsRUFBRSxVQUFzQjtRQUNqRSxJQUFJLENBQUMsVUFBVSxDQUFDLEdBQUc7WUFBRSxNQUFNLEtBQUssQ0FBQyxnQ0FBZ0MsQ0FBQyxDQUFDO1FBQ25FLFVBQVUsQ0FBQyxNQUFNLEdBQUcsVUFBVSxDQUFDLE1BQU0sSUFBSSxlQUFNLENBQUMsWUFBWSxDQUFDO1FBRTdELE1BQU0sU0FBUyxHQUFHLE1BQU0sQ0FBQyxJQUFJLENBQUMsVUFBVSxDQUFDLEdBQUcsRUFBRSxVQUFVLENBQUMsUUFBUSxDQUFDLENBQUM7UUFFbkUsTUFBTSxTQUFTLEdBQUcseUJBQVksQ0FBQyxPQUFPLENBQUMsU0FBUyxFQUFFLE9BQU8sRUFBRSxVQUFVLENBQUMsTUFBTSxDQUFDLENBQUM7UUFFOUUsT0FBTztZQUNMLElBQUksRUFBRSx3QkFBZSxDQUFDLElBQUk7WUFDMUIsUUFBUSxFQUFFLFVBQVUsQ0FBQyxRQUFRO1lBQzdCLE1BQU0sRUFBRSxVQUFVLENBQUMsTUFBeUM7WUFDNUQsVUFBVSxFQUFFLFNBQVMsQ0FBQyxVQUFVO1lBQ2hDLEVBQUUsRUFBRSxTQUFTLENBQUMsRUFBRztZQUNqQixHQUFHLEVBQUUsU0FBUyxDQUFDLEdBQUk7U0FDcEIsQ0FBQztJQUNKLENBQUM7SUFFRDs7Ozs7OztPQU9HO0lBQ0ksTUFBTSxDQUFDLEtBQUssQ0FBQyxhQUFhLENBQy9CLFdBQXVCLEVBQ3ZCLFlBQXlCLEVBQ3pCLFVBQXNCO1FBRXRCLElBQUksQ0FBQyxVQUFVLENBQUMsR0FBRztZQUFFLE1BQU0sS0FBSyxDQUFDLGdDQUFnQyxDQUFDLENBQUM7UUFDbkUsVUFBVSxDQUFDLE1BQU0sR0FBRyxVQUFVLENBQUMsTUFBTSxJQUFJLGVBQU0sQ0FBQyxZQUFZLENBQUM7UUFFN0QsTUFBTSxTQUFTLEdBQUcsTUFBTSxDQUFDLElBQUksQ0FBQyxVQUFVLENBQUMsR0FBRyxFQUFFLFVBQVUsQ0FBQyxRQUFRLENBQUMsQ0FBQztRQUVuRSxNQUFNLFNBQVMsR0FBRyxNQUFNLHlCQUFZLENBQUMsYUFBYSxDQUNoRCxTQUFTLEVBQ1QsV0FBVyxFQUNYLFlBQVksRUFDWixVQUFVLENBQUMsTUFBTSxDQUNsQixDQUFDO1FBRUYsT0FBTztZQUNMLElBQUksRUFBRSx3QkFBZSxDQUFDLElBQUk7WUFDMUIsUUFBUSxFQUFFLFVBQVUsQ0FBQyxRQUFRO1lBQzdCLE1BQU0sRUFBRSxVQUFVLENBQUMsTUFBeUM7WUFDNUQsRUFBRSxFQUFFLFNBQVMsQ0FBQyxFQUFHO1lBQ2pCLEdBQUcsRUFBRSxTQUFTLENBQUMsR0FBSTtTQUNwQixDQUFDO0lBQ0osQ0FBQztJQUVNLE1BQU0sQ0FBQyxPQUFPLENBQUMsVUFBMEI7UUFDOUMsSUFBSSxDQUFDLFVBQVUsQ0FBQyxHQUFHO1lBQUUsTUFBTSxLQUFLLENBQUMsZ0NBQWdDLENBQUMsQ0FBQztRQUVuRSxNQUFNLEdBQUcsR0FBRyxNQUFNLENBQUMsSUFBSSxDQUFDLFVBQVUsQ0FBQyxHQUFHLEVBQUUsVUFBVSxDQUFDLFFBQVEsQ0FBQyxDQUFDO1FBQzdELE1BQU0sTUFBTSxHQUFRO1lBQ2xCLEVBQUUsRUFBRSxNQUFNLENBQUMsSUFBSSxDQUFDLFVBQVUsQ0FBQyxFQUFFLEVBQUUsVUFBVSxDQUFDLFFBQVEsQ0FBQztTQUNwRCxDQUFDO1FBRUYsSUFBSyxVQUFvQyxDQUFDLEdBQUcsRUFBRSxDQUFDO1lBQzlDLE1BQU0sQ0FBQyxHQUFHLEdBQUcsTUFBTSxDQUFDLElBQUksQ0FBRSxVQUFvQyxDQUFDLEdBQUcsRUFBRSxVQUFVLENBQUMsUUFBUSxDQUFDLENBQUM7UUFDM0YsQ0FBQztRQUVELE9BQU8seUJBQVksQ0FBQyxPQUFPLENBQ3pCLEdBQUcsRUFDSCxVQUFVLENBQUMsVUFBVyxFQUN0QixVQUFVLENBQUMsTUFBTSxFQUNqQixNQUFNLEVBQ04sVUFBVSxDQUFDLFFBQVEsQ0FDcEIsQ0FBQztJQUNKLENBQUM7SUFFRDs7Ozs7T0FLRztJQUNJLE1BQU0sQ0FBQyxLQUFLLENBQUMsYUFBYSxDQUMvQixXQUF1QixFQUN2QixZQUF5QixFQUN6QixVQUEwQjtRQUUxQixJQUFJLENBQUMsVUFBVSxDQUFDLEdBQUc7WUFBRSxNQUFNLEtBQUssQ0FBQyxnQ0FBZ0MsQ0FBQyxDQUFDO1FBRW5FLE1BQU0sR0FBRyxHQUFHLE1BQU0sQ0FBQyxJQUFJLENBQUMsVUFBVSxDQUFDLEdBQUcsRUFBRSxVQUFVLENBQUMsUUFBUSxDQUFDLENBQUM7UUFDN0QsTUFBTSxNQUFNLEdBQVE7WUFDbEIsRUFBRSxFQUFFLE1BQU0sQ0FBQyxJQUFJLENBQUMsVUFBVSxDQUFDLEVBQUUsRUFBRSxVQUFVLENBQUMsUUFBUSxDQUFDO1NBQ3BELENBQUM7UUFFRixJQUFLLFVBQW9DLENBQUMsR0FBRyxFQUFFLENBQUM7WUFDOUMsTUFBTSxDQUFDLEdBQUcsR0FBRyxNQUFNLENBQUMsSUFBSSxDQUFFLFVBQW9DLENBQUMsR0FBRyxFQUFFLFVBQVUsQ0FBQyxRQUFRLENBQUMsQ0FBQztRQUMzRixDQUFDO1FBRUQsTUFBTSx5QkFBWSxDQUFDLGFBQWEsQ0FBQyxHQUFHLEVBQUUsV0FBVyxFQUFFLFlBQVksRUFBRSxVQUFVLENBQUMsTUFBTSxFQUFFLE1BQU0sQ0FBQyxDQUFDO0lBQzlGLENBQUM7Q0FDRjtBQUVELGtCQUFlLElBQUksQ0FBQyJ9
|