@tidecloak/js 0.9.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +334 -0
- package/README.md +294 -0
- package/dist/cjs/lib/tidecloak.js +1934 -0
- package/dist/cjs/lib/tidecloak.js.map +1 -0
- package/dist/cjs/modules/tide-js/Clients/ClientBase.js +213 -0
- package/dist/cjs/modules/tide-js/Clients/ClientBase.js.map +1 -0
- package/dist/cjs/modules/tide-js/Clients/NetworkClient.js +96 -0
- package/dist/cjs/modules/tide-js/Clients/NetworkClient.js.map +1 -0
- package/dist/cjs/modules/tide-js/Clients/NodeClient.js +491 -0
- package/dist/cjs/modules/tide-js/Clients/NodeClient.js.map +1 -0
- package/dist/cjs/modules/tide-js/Clients/PollingClient.js +87 -0
- package/dist/cjs/modules/tide-js/Clients/PollingClient.js.map +1 -0
- package/dist/cjs/modules/tide-js/Clients/VoucherClient.js +37 -0
- package/dist/cjs/modules/tide-js/Clients/VoucherClient.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/BaseComponent.js +180 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/BaseComponent.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/ComponentRegistry.js +30 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/ComponentRegistry.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/AES/AESScheme.js +11 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/AES/AESScheme.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/BaseScheme.js +13 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/BaseScheme.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Components.js +166 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Components.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Scheme.js +41 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Scheme.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/SchemeRegistry.js +13 -0
- package/dist/cjs/modules/tide-js/Cryptide/Components/Schemes/SchemeRegistry.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Ed25519.js +535 -0
- package/dist/cjs/modules/tide-js/Cryptide/Ed25519.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Encryption/AES.js +109 -0
- package/dist/cjs/modules/tide-js/Cryptide/Encryption/AES.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Encryption/DH.js +53 -0
- package/dist/cjs/modules/tide-js/Cryptide/Encryption/DH.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Encryption/ElGamal.js +59 -0
- package/dist/cjs/modules/tide-js/Cryptide/Encryption/ElGamal.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Hashing/H2P.js +248 -0
- package/dist/cjs/modules/tide-js/Cryptide/Hashing/H2P.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Hashing/Hash.js +60 -0
- package/dist/cjs/modules/tide-js/Cryptide/Hashing/Hash.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Interpolation.js +107 -0
- package/dist/cjs/modules/tide-js/Cryptide/Interpolation.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Math.js +134 -0
- package/dist/cjs/modules/tide-js/Cryptide/Math.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Serialization.js +680 -0
- package/dist/cjs/modules/tide-js/Cryptide/Serialization.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Signing/BlindSig.js +56 -0
- package/dist/cjs/modules/tide-js/Cryptide/Signing/BlindSig.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Signing/EdDSA.js +84 -0
- package/dist/cjs/modules/tide-js/Cryptide/Signing/EdDSA.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/Signing/TideSignature.js +102 -0
- package/dist/cjs/modules/tide-js/Cryptide/Signing/TideSignature.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/TideKey.js +77 -0
- package/dist/cjs/modules/tide-js/Cryptide/TideKey.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/TideMemoryObjects.js +34 -0
- package/dist/cjs/modules/tide-js/Cryptide/TideMemoryObjects.js.map +1 -0
- package/dist/cjs/modules/tide-js/Cryptide/index.js +74 -0
- package/dist/cjs/modules/tide-js/Cryptide/index.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCMKAcceptAdminFlow.js +6 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCMKAcceptAdminFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordFlow.js +138 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordlessFlow.js +83 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordlessFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCVKAuthenticationFlow.js +3 -0
- package/dist/cjs/modules/tide-js/Flow/AuthenticationFlows/dCVKAuthenticationFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/DecryptionFlows/dVVKDecryptionFlow.js +58 -0
- package/dist/cjs/modules/tide-js/Flow/DecryptionFlows/dVVKDecryptionFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/EncryptionFlows/AuthorizedEncryptionFlow.js +180 -0
- package/dist/cjs/modules/tide-js/Flow/EncryptionFlows/AuthorizedEncryptionFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/AuthorizedSigningFlow.js +49 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/AuthorizedSigningFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/dTestVVkSigningFlow.js +70 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/dTestVVkSigningFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow.js +73 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow_DEPRECATED.js +67 -0
- package/dist/cjs/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow_DEPRECATED.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/SimulatorFlow.js +57 -0
- package/dist/cjs/modules/tide-js/Flow/SimulatorFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/VoucherFlows/VoucherFlow.js +51 -0
- package/dist/cjs/modules/tide-js/Flow/VoucherFlows/VoucherFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/dAccountRecoveryFlow.js +95 -0
- package/dist/cjs/modules/tide-js/Flow/dAccountRecoveryFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Flow/dKeyGenerationFlow.js +219 -0
- package/dist/cjs/modules/tide-js/Flow/dKeyGenerationFlow.js.map +1 -0
- package/dist/cjs/modules/tide-js/Math/DecryptRequest.js +52 -0
- package/dist/cjs/modules/tide-js/Math/DecryptRequest.js.map +1 -0
- package/dist/cjs/modules/tide-js/Math/EncryptRequest.js +96 -0
- package/dist/cjs/modules/tide-js/Math/EncryptRequest.js.map +1 -0
- package/dist/cjs/modules/tide-js/Math/KeyAuthentication.js +222 -0
- package/dist/cjs/modules/tide-js/Math/KeyAuthentication.js.map +1 -0
- package/dist/cjs/modules/tide-js/Math/KeyDecryption.js +18 -0
- package/dist/cjs/modules/tide-js/Math/KeyDecryption.js.map +1 -0
- package/dist/cjs/modules/tide-js/Math/KeyGeneration.js +148 -0
- package/dist/cjs/modules/tide-js/Math/KeyGeneration.js.map +1 -0
- package/dist/cjs/modules/tide-js/Math/KeySigning.js +24 -0
- package/dist/cjs/modules/tide-js/Math/KeySigning.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/AdminAuthorization.js +83 -0
- package/dist/cjs/modules/tide-js/Models/AdminAuthorization.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/AuthRequest.js +66 -0
- package/dist/cjs/modules/tide-js/Models/AuthRequest.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/AuthorizationBuilder.js +61 -0
- package/dist/cjs/modules/tide-js/Models/AuthorizationBuilder.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/BaseTideRequest.js +106 -0
- package/dist/cjs/modules/tide-js/Models/BaseTideRequest.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Cardano/CardanoTxBody.js +198 -0
- package/dist/cjs/modules/tide-js/Models/Cardano/CardanoTxBody.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Datum.js +41 -0
- package/dist/cjs/modules/tide-js/Models/Datum.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Doken.js +140 -0
- package/dist/cjs/modules/tide-js/Models/Doken.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/EnclaveEntry.js +50 -0
- package/dist/cjs/modules/tide-js/Models/EnclaveEntry.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Infos/KeyInfo.js +49 -0
- package/dist/cjs/modules/tide-js/Models/Infos/KeyInfo.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Infos/OrkInfo.js +53 -0
- package/dist/cjs/modules/tide-js/Models/Infos/OrkInfo.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/InitializationCertificate.js +35 -0
- package/dist/cjs/modules/tide-js/Models/InitializationCertificate.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/ModelRegistry.js +177 -0
- package/dist/cjs/modules/tide-js/Models/ModelRegistry.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Authenticate/AuthenticateResponse.js +34 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Authenticate/AuthenticateResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/CMKConvertResponse.js +36 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/CMKConvertResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/ConvertRememberedResponse.js +36 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/ConvertRememberedResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedCMKConvertResponse.js +34 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedCMKConvertResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedConvertRememberedResponse.js +37 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedConvertRememberedResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedPrismConvertResponse.js +37 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedPrismConvertResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/PrismConvertResponse.js +36 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyAuth/Convert/PrismConvertResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/GenShard/DecryptedGenShardResponse.js +49 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/GenShard/DecryptedGenShardResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/GenShard/GenShardResponse.js +34 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/GenShard/GenShardResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/SetShard/DecryptedSetShardResponse.js +39 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/SetShard/DecryptedSetShardResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/SetShard/SetShardResponse.js +31 -0
- package/dist/cjs/modules/tide-js/Models/Responses/KeyGen/SetShard/SetShardResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/Reservation/ReservationConfirmation.js +26 -0
- package/dist/cjs/modules/tide-js/Models/Responses/Reservation/ReservationConfirmation.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Responses/Vendor/VoucherResponse.js +41 -0
- package/dist/cjs/modules/tide-js/Models/Responses/Vendor/VoucherResponse.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Rules/RuleSettingSignRequest.js +81 -0
- package/dist/cjs/modules/tide-js/Models/Rules/RuleSettingSignRequest.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Rules/RuleSettings.js +28 -0
- package/dist/cjs/modules/tide-js/Models/Rules/RuleSettings.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/SerializedField.js +63 -0
- package/dist/cjs/modules/tide-js/Models/SerializedField.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/Transactions/CardanoTxBodySignRequest.js +57 -0
- package/dist/cjs/modules/tide-js/Models/Transactions/CardanoTxBodySignRequest.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/VendorData.js +36 -0
- package/dist/cjs/modules/tide-js/Models/VendorData.js.map +1 -0
- package/dist/cjs/modules/tide-js/Models/VendorSettings.js +26 -0
- package/dist/cjs/modules/tide-js/Models/VendorSettings.js.map +1 -0
- package/dist/cjs/modules/tide-js/RulesEngine/RuleEngineService.js +92 -0
- package/dist/cjs/modules/tide-js/RulesEngine/RuleEngineService.js.map +1 -0
- package/dist/cjs/modules/tide-js/RulesEngine/helperFunctions.js +78 -0
- package/dist/cjs/modules/tide-js/RulesEngine/helperFunctions.js.map +1 -0
- package/dist/cjs/modules/tide-js/RulesEngine/jsonHelpers.js +68 -0
- package/dist/cjs/modules/tide-js/RulesEngine/jsonHelpers.js.map +1 -0
- package/dist/cjs/modules/tide-js/RulesEngine/thresholdRules.js +106 -0
- package/dist/cjs/modules/tide-js/RulesEngine/thresholdRules.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/AccountRecovery.js +58 -0
- package/dist/cjs/modules/tide-js/Tests/AccountRecovery.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/Components.js +18 -0
- package/dist/cjs/modules/tide-js/Tests/Components.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/Encryption.js +172 -0
- package/dist/cjs/modules/tide-js/Tests/Encryption.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/KeyAuthentication.js +113 -0
- package/dist/cjs/modules/tide-js/Tests/KeyAuthentication.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/KeyGeneration.js +222 -0
- package/dist/cjs/modules/tide-js/Tests/KeyGeneration.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/StripeLicensing.js +41 -0
- package/dist/cjs/modules/tide-js/Tests/StripeLicensing.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/TideKey.js +17 -0
- package/dist/cjs/modules/tide-js/Tests/TideKey.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/Verifier.js +12 -0
- package/dist/cjs/modules/tide-js/Tests/Verifier.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tests/index.js +43 -0
- package/dist/cjs/modules/tide-js/Tests/index.js.map +1 -0
- package/dist/cjs/modules/tide-js/Tools/Utils.js +285 -0
- package/dist/cjs/modules/tide-js/Tools/Utils.js.map +1 -0
- package/dist/cjs/modules/tide-js/index.js +71 -0
- package/dist/cjs/modules/tide-js/index.js.map +1 -0
- package/dist/cjs/src/IAMService.js +278 -0
- package/dist/cjs/src/IAMService.js.map +1 -0
- package/dist/cjs/src/index.js +19 -0
- package/dist/cjs/src/index.js.map +1 -0
- package/dist/esm/lib/tidecloak.js +1923 -0
- package/dist/esm/lib/tidecloak.js.map +1 -0
- package/dist/esm/modules/tide-js/Clients/ClientBase.js +210 -0
- package/dist/esm/modules/tide-js/Clients/ClientBase.js.map +1 -0
- package/dist/esm/modules/tide-js/Clients/NetworkClient.js +90 -0
- package/dist/esm/modules/tide-js/Clients/NetworkClient.js.map +1 -0
- package/dist/esm/modules/tide-js/Clients/NodeClient.js +485 -0
- package/dist/esm/modules/tide-js/Clients/NodeClient.js.map +1 -0
- package/dist/esm/modules/tide-js/Clients/PollingClient.js +81 -0
- package/dist/esm/modules/tide-js/Clients/PollingClient.js.map +1 -0
- package/dist/esm/modules/tide-js/Clients/VoucherClient.js +31 -0
- package/dist/esm/modules/tide-js/Clients/VoucherClient.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/BaseComponent.js +169 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/BaseComponent.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/ComponentRegistry.js +24 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/ComponentRegistry.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/AES/AESScheme.js +5 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/AES/AESScheme.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/BaseScheme.js +11 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/BaseScheme.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Components.js +157 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Components.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Scheme.js +36 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Scheme.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/SchemeRegistry.js +7 -0
- package/dist/esm/modules/tide-js/Cryptide/Components/Schemes/SchemeRegistry.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Ed25519.js +523 -0
- package/dist/esm/modules/tide-js/Cryptide/Ed25519.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Encryption/AES.js +102 -0
- package/dist/esm/modules/tide-js/Cryptide/Encryption/AES.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Encryption/DH.js +49 -0
- package/dist/esm/modules/tide-js/Cryptide/Encryption/DH.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Encryption/ElGamal.js +56 -0
- package/dist/esm/modules/tide-js/Cryptide/Encryption/ElGamal.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Hashing/H2P.js +245 -0
- package/dist/esm/modules/tide-js/Cryptide/Hashing/H2P.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Hashing/Hash.js +55 -0
- package/dist/esm/modules/tide-js/Cryptide/Hashing/Hash.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Interpolation.js +97 -0
- package/dist/esm/modules/tide-js/Cryptide/Interpolation.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Math.js +120 -0
- package/dist/esm/modules/tide-js/Cryptide/Math.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Serialization.js +642 -0
- package/dist/esm/modules/tide-js/Cryptide/Serialization.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Signing/BlindSig.js +50 -0
- package/dist/esm/modules/tide-js/Cryptide/Signing/BlindSig.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Signing/EdDSA.js +79 -0
- package/dist/esm/modules/tide-js/Cryptide/Signing/EdDSA.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/Signing/TideSignature.js +91 -0
- package/dist/esm/modules/tide-js/Cryptide/Signing/TideSignature.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/TideKey.js +71 -0
- package/dist/esm/modules/tide-js/Cryptide/TideKey.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/TideMemoryObjects.js +30 -0
- package/dist/esm/modules/tide-js/Cryptide/TideMemoryObjects.js.map +1 -0
- package/dist/esm/modules/tide-js/Cryptide/index.js +34 -0
- package/dist/esm/modules/tide-js/Cryptide/index.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCMKAcceptAdminFlow.js +3 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCMKAcceptAdminFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordFlow.js +132 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordlessFlow.js +77 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordlessFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCVKAuthenticationFlow.js +2 -0
- package/dist/esm/modules/tide-js/Flow/AuthenticationFlows/dCVKAuthenticationFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/DecryptionFlows/dVVKDecryptionFlow.js +52 -0
- package/dist/esm/modules/tide-js/Flow/DecryptionFlows/dVVKDecryptionFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/EncryptionFlows/AuthorizedEncryptionFlow.js +174 -0
- package/dist/esm/modules/tide-js/Flow/EncryptionFlows/AuthorizedEncryptionFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/AuthorizedSigningFlow.js +43 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/AuthorizedSigningFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/dTestVVkSigningFlow.js +64 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/dTestVVkSigningFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow.js +67 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow_DEPRECATED.js +61 -0
- package/dist/esm/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow_DEPRECATED.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/SimulatorFlow.js +51 -0
- package/dist/esm/modules/tide-js/Flow/SimulatorFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/VoucherFlows/VoucherFlow.js +45 -0
- package/dist/esm/modules/tide-js/Flow/VoucherFlows/VoucherFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/dAccountRecoveryFlow.js +89 -0
- package/dist/esm/modules/tide-js/Flow/dAccountRecoveryFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Flow/dKeyGenerationFlow.js +213 -0
- package/dist/esm/modules/tide-js/Flow/dKeyGenerationFlow.js.map +1 -0
- package/dist/esm/modules/tide-js/Math/DecryptRequest.js +46 -0
- package/dist/esm/modules/tide-js/Math/DecryptRequest.js.map +1 -0
- package/dist/esm/modules/tide-js/Math/EncryptRequest.js +90 -0
- package/dist/esm/modules/tide-js/Math/EncryptRequest.js.map +1 -0
- package/dist/esm/modules/tide-js/Math/KeyAuthentication.js +211 -0
- package/dist/esm/modules/tide-js/Math/KeyAuthentication.js.map +1 -0
- package/dist/esm/modules/tide-js/Math/KeyDecryption.js +15 -0
- package/dist/esm/modules/tide-js/Math/KeyDecryption.js.map +1 -0
- package/dist/esm/modules/tide-js/Math/KeyGeneration.js +141 -0
- package/dist/esm/modules/tide-js/Math/KeyGeneration.js.map +1 -0
- package/dist/esm/modules/tide-js/Math/KeySigning.js +20 -0
- package/dist/esm/modules/tide-js/Math/KeySigning.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/AdminAuthorization.js +79 -0
- package/dist/esm/modules/tide-js/Models/AdminAuthorization.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/AuthRequest.js +63 -0
- package/dist/esm/modules/tide-js/Models/AuthRequest.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/AuthorizationBuilder.js +55 -0
- package/dist/esm/modules/tide-js/Models/AuthorizationBuilder.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/BaseTideRequest.js +103 -0
- package/dist/esm/modules/tide-js/Models/BaseTideRequest.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Cardano/CardanoTxBody.js +195 -0
- package/dist/esm/modules/tide-js/Models/Cardano/CardanoTxBody.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Datum.js +38 -0
- package/dist/esm/modules/tide-js/Models/Datum.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Doken.js +134 -0
- package/dist/esm/modules/tide-js/Models/Doken.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/EnclaveEntry.js +44 -0
- package/dist/esm/modules/tide-js/Models/EnclaveEntry.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Infos/KeyInfo.js +43 -0
- package/dist/esm/modules/tide-js/Models/Infos/KeyInfo.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Infos/OrkInfo.js +50 -0
- package/dist/esm/modules/tide-js/Models/Infos/OrkInfo.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/InitializationCertificate.js +32 -0
- package/dist/esm/modules/tide-js/Models/InitializationCertificate.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/ModelRegistry.js +169 -0
- package/dist/esm/modules/tide-js/Models/ModelRegistry.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Authenticate/AuthenticateResponse.js +31 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Authenticate/AuthenticateResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/CMKConvertResponse.js +33 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/CMKConvertResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/ConvertRememberedResponse.js +33 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/ConvertRememberedResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedCMKConvertResponse.js +31 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedCMKConvertResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedConvertRememberedResponse.js +34 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedConvertRememberedResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedPrismConvertResponse.js +34 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedPrismConvertResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/PrismConvertResponse.js +33 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyAuth/Convert/PrismConvertResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/GenShard/DecryptedGenShardResponse.js +46 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/GenShard/DecryptedGenShardResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/GenShard/GenShardResponse.js +31 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/GenShard/GenShardResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/SetShard/DecryptedSetShardResponse.js +36 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/SetShard/DecryptedSetShardResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/SetShard/SetShardResponse.js +28 -0
- package/dist/esm/modules/tide-js/Models/Responses/KeyGen/SetShard/SetShardResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/Reservation/ReservationConfirmation.js +23 -0
- package/dist/esm/modules/tide-js/Models/Responses/Reservation/ReservationConfirmation.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Responses/Vendor/VoucherResponse.js +38 -0
- package/dist/esm/modules/tide-js/Models/Responses/Vendor/VoucherResponse.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Rules/RuleSettingSignRequest.js +75 -0
- package/dist/esm/modules/tide-js/Models/Rules/RuleSettingSignRequest.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Rules/RuleSettings.js +25 -0
- package/dist/esm/modules/tide-js/Models/Rules/RuleSettings.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/SerializedField.js +61 -0
- package/dist/esm/modules/tide-js/Models/SerializedField.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/Transactions/CardanoTxBodySignRequest.js +51 -0
- package/dist/esm/modules/tide-js/Models/Transactions/CardanoTxBodySignRequest.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/VendorData.js +30 -0
- package/dist/esm/modules/tide-js/Models/VendorData.js.map +1 -0
- package/dist/esm/modules/tide-js/Models/VendorSettings.js +23 -0
- package/dist/esm/modules/tide-js/Models/VendorSettings.js.map +1 -0
- package/dist/esm/modules/tide-js/RulesEngine/RuleEngineService.js +89 -0
- package/dist/esm/modules/tide-js/RulesEngine/RuleEngineService.js.map +1 -0
- package/dist/esm/modules/tide-js/RulesEngine/helperFunctions.js +69 -0
- package/dist/esm/modules/tide-js/RulesEngine/helperFunctions.js.map +1 -0
- package/dist/esm/modules/tide-js/RulesEngine/jsonHelpers.js +64 -0
- package/dist/esm/modules/tide-js/RulesEngine/jsonHelpers.js.map +1 -0
- package/dist/esm/modules/tide-js/RulesEngine/thresholdRules.js +100 -0
- package/dist/esm/modules/tide-js/RulesEngine/thresholdRules.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/AccountRecovery.js +52 -0
- package/dist/esm/modules/tide-js/Tests/AccountRecovery.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/Components.js +15 -0
- package/dist/esm/modules/tide-js/Tests/Components.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/Encryption.js +164 -0
- package/dist/esm/modules/tide-js/Tests/Encryption.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/KeyAuthentication.js +106 -0
- package/dist/esm/modules/tide-js/Tests/KeyAuthentication.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/KeyGeneration.js +213 -0
- package/dist/esm/modules/tide-js/Tests/KeyGeneration.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/StripeLicensing.js +34 -0
- package/dist/esm/modules/tide-js/Tests/StripeLicensing.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/TideKey.js +11 -0
- package/dist/esm/modules/tide-js/Tests/TideKey.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/Verifier.js +9 -0
- package/dist/esm/modules/tide-js/Tests/Verifier.js.map +1 -0
- package/dist/esm/modules/tide-js/Tests/index.js +37 -0
- package/dist/esm/modules/tide-js/Tests/index.js.map +1 -0
- package/dist/esm/modules/tide-js/Tools/Utils.js +273 -0
- package/dist/esm/modules/tide-js/Tools/Utils.js.map +1 -0
- package/dist/esm/modules/tide-js/index.js +27 -0
- package/dist/esm/modules/tide-js/index.js.map +1 -0
- package/dist/esm/src/IAMService.js +272 -0
- package/dist/esm/src/IAMService.js.map +1 -0
- package/dist/esm/src/index.js +8 -0
- package/dist/esm/src/index.js.map +1 -0
- package/dist/silent-check-sso.html +1 -0
- package/dist/types/lib/tidecloak.d.ts +36 -0
- package/dist/types/modules/tide-js/Clients/ClientBase.d.ts +72 -0
- package/dist/types/modules/tide-js/Clients/NetworkClient.d.ts +23 -0
- package/dist/types/modules/tide-js/Clients/NodeClient.d.ts +187 -0
- package/dist/types/modules/tide-js/Clients/PollingClient.d.ts +22 -0
- package/dist/types/modules/tide-js/Clients/VoucherClient.d.ts +12 -0
- package/dist/types/modules/tide-js/Cryptide/Components/BaseComponent.d.ts +59 -0
- package/dist/types/modules/tide-js/Cryptide/Components/ComponentRegistry.d.ts +19 -0
- package/dist/types/modules/tide-js/Cryptide/Components/Schemes/AES/AESScheme.d.ts +4 -0
- package/dist/types/modules/tide-js/Cryptide/Components/Schemes/BaseScheme.d.ts +10 -0
- package/dist/types/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Components.d.ts +51 -0
- package/dist/types/modules/tide-js/Cryptide/Components/Schemes/Ed25519/Ed25519Scheme.d.ts +10 -0
- package/dist/types/modules/tide-js/Cryptide/Components/Schemes/SchemeRegistry.d.ts +3 -0
- package/dist/types/modules/tide-js/Cryptide/Ed25519.d.ts +114 -0
- package/dist/types/modules/tide-js/Cryptide/Encryption/AES.d.ts +30 -0
- package/dist/types/modules/tide-js/Cryptide/Encryption/DH.d.ts +12 -0
- package/dist/types/modules/tide-js/Cryptide/Encryption/ElGamal.d.ts +20 -0
- package/dist/types/modules/tide-js/Cryptide/Hashing/H2P.d.ts +7 -0
- package/dist/types/modules/tide-js/Cryptide/Hashing/Hash.d.ts +16 -0
- package/dist/types/modules/tide-js/Cryptide/Interpolation.d.ts +47 -0
- package/dist/types/modules/tide-js/Cryptide/Math.d.ts +45 -0
- package/dist/types/modules/tide-js/Cryptide/Serialization.d.ts +195 -0
- package/dist/types/modules/tide-js/Cryptide/Signing/BlindSig.d.ts +32 -0
- package/dist/types/modules/tide-js/Cryptide/Signing/EdDSA.d.ts +24 -0
- package/dist/types/modules/tide-js/Cryptide/Signing/TideSignature.d.ts +50 -0
- package/dist/types/modules/tide-js/Cryptide/TideKey.d.ts +24 -0
- package/dist/types/modules/tide-js/Cryptide/TideMemoryObjects.d.ts +15 -0
- package/dist/types/modules/tide-js/Cryptide/index.d.ts +10 -0
- package/dist/types/modules/tide-js/Flow/AuthenticationFlows/dCMKAcceptAdminFlow.d.ts +2 -0
- package/dist/types/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordFlow.d.ts +64 -0
- package/dist/types/modules/tide-js/Flow/AuthenticationFlows/dCMKPasswordlessFlow.d.ts +37 -0
- package/dist/types/modules/tide-js/Flow/AuthenticationFlows/dCVKAuthenticationFlow.d.ts +1 -0
- package/dist/types/modules/tide-js/Flow/DecryptionFlows/dVVKDecryptionFlow.d.ts +31 -0
- package/dist/types/modules/tide-js/Flow/EncryptionFlows/AuthorizedEncryptionFlow.d.ts +75 -0
- package/dist/types/modules/tide-js/Flow/SigningFlows/AuthorizedSigningFlow.d.ts +51 -0
- package/dist/types/modules/tide-js/Flow/SigningFlows/dTestVVkSigningFlow.d.ts +25 -0
- package/dist/types/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow.d.ts +32 -0
- package/dist/types/modules/tide-js/Flow/SigningFlows/dVVKSigningFlow_DEPRECATED.d.ts +30 -0
- package/dist/types/modules/tide-js/Flow/SimulatorFlow.d.ts +13 -0
- package/dist/types/modules/tide-js/Flow/VoucherFlows/VoucherFlow.d.ts +23 -0
- package/dist/types/modules/tide-js/Flow/dAccountRecoveryFlow.d.ts +41 -0
- package/dist/types/modules/tide-js/Flow/dKeyGenerationFlow.d.ts +104 -0
- package/dist/types/modules/tide-js/Math/DecryptRequest.d.ts +19 -0
- package/dist/types/modules/tide-js/Math/EncryptRequest.d.ts +57 -0
- package/dist/types/modules/tide-js/Math/KeyAuthentication.d.ts +95 -0
- package/dist/types/modules/tide-js/Math/KeyDecryption.d.ts +7 -0
- package/dist/types/modules/tide-js/Math/KeyGeneration.d.ts +42 -0
- package/dist/types/modules/tide-js/Math/KeySigning.d.ts +10 -0
- package/dist/types/modules/tide-js/Models/AdminAuthorization.d.ts +16 -0
- package/dist/types/modules/tide-js/Models/AuthRequest.d.ts +28 -0
- package/dist/types/modules/tide-js/Models/AuthorizationBuilder.d.ts +17 -0
- package/dist/types/modules/tide-js/Models/BaseTideRequest.d.ts +52 -0
- package/dist/types/modules/tide-js/Models/Cardano/CardanoTxBody.d.ts +16 -0
- package/dist/types/modules/tide-js/Models/Datum.d.ts +14 -0
- package/dist/types/modules/tide-js/Models/Doken.d.ts +52 -0
- package/dist/types/modules/tide-js/Models/EnclaveEntry.d.ts +22 -0
- package/dist/types/modules/tide-js/Models/Infos/KeyInfo.d.ts +30 -0
- package/dist/types/modules/tide-js/Models/Infos/OrkInfo.d.ts +24 -0
- package/dist/types/modules/tide-js/Models/InitializationCertificate.d.ts +21 -0
- package/dist/types/modules/tide-js/Models/ModelRegistry.d.ts +15 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyAuth/Authenticate/AuthenticateResponse.d.ts +9 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyAuth/Convert/CMKConvertResponse.d.ts +11 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyAuth/Convert/ConvertRememberedResponse.d.ts +11 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedCMKConvertResponse.d.ts +9 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedConvertRememberedResponse.d.ts +11 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyAuth/Convert/DecryptedPrismConvertResponse.d.ts +12 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyAuth/Convert/PrismConvertResponse.d.ts +11 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyGen/GenShard/DecryptedGenShardResponse.d.ts +18 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyGen/GenShard/GenShardResponse.d.ts +10 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyGen/SetShard/DecryptedSetShardResponse.d.ts +10 -0
- package/dist/types/modules/tide-js/Models/Responses/KeyGen/SetShard/SetShardResponse.d.ts +8 -0
- package/dist/types/modules/tide-js/Models/Responses/Reservation/ReservationConfirmation.d.ts +14 -0
- package/dist/types/modules/tide-js/Models/Responses/Vendor/VoucherResponse.d.ts +25 -0
- package/dist/types/modules/tide-js/Models/Rules/RuleSettingSignRequest.d.ts +39 -0
- package/dist/types/modules/tide-js/Models/Rules/RuleSettings.d.ts +12 -0
- package/dist/types/modules/tide-js/Models/SerializedField.d.ts +20 -0
- package/dist/types/modules/tide-js/Models/Transactions/CardanoTxBodySignRequest.d.ts +29 -0
- package/dist/types/modules/tide-js/Models/VendorData.d.ts +17 -0
- package/dist/types/modules/tide-js/Models/VendorSettings.d.ts +14 -0
- package/dist/types/modules/tide-js/RulesEngine/RuleEngineService.d.ts +25 -0
- package/dist/types/modules/tide-js/RulesEngine/helperFunctions.d.ts +7 -0
- package/dist/types/modules/tide-js/RulesEngine/jsonHelpers.d.ts +11 -0
- package/dist/types/modules/tide-js/RulesEngine/thresholdRules.d.ts +17 -0
- package/dist/types/modules/tide-js/Tests/AccountRecovery.d.ts +1 -0
- package/dist/types/modules/tide-js/Tests/Components.d.ts +1 -0
- package/dist/types/modules/tide-js/Tests/Encryption.d.ts +3 -0
- package/dist/types/modules/tide-js/Tests/KeyAuthentication.d.ts +2 -0
- package/dist/types/modules/tide-js/Tests/KeyGeneration.d.ts +4 -0
- package/dist/types/modules/tide-js/Tests/StripeLicensing.d.ts +2 -0
- package/dist/types/modules/tide-js/Tests/TideKey.d.ts +1 -0
- package/dist/types/modules/tide-js/Tests/Verifier.d.ts +1 -0
- package/dist/types/modules/tide-js/Tests/index.d.ts +32 -0
- package/dist/types/modules/tide-js/Tools/Utils.d.ts +34 -0
- package/dist/types/modules/tide-js/index.d.ts +8 -0
- package/dist/types/src/IAMService.d.ts +106 -0
- package/dist/types/src/index.d.ts +4 -0
- package/package.json +48 -0
- package/scripts/postinstall.js +43 -0
|
@@ -0,0 +1,1923 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
|
3
|
+
* and other contributors as indicated by the @author tags.
|
|
4
|
+
*
|
|
5
|
+
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
6
|
+
* you may not use this file except in compliance with the License.
|
|
7
|
+
* You may obtain a copy of the License at
|
|
8
|
+
*
|
|
9
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
|
10
|
+
*
|
|
11
|
+
* Unless required by applicable law or agreed to in writing, software
|
|
12
|
+
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
13
|
+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
14
|
+
* See the License for the specific language governing permissions and
|
|
15
|
+
* limitations under the License.
|
|
16
|
+
*
|
|
17
|
+
* Modifications Copyright (C) 2025 Tide Foundation Ltd
|
|
18
|
+
* Tide Protocol - Infrastructure for a TRUE Zero-Trust paradigm
|
|
19
|
+
*
|
|
20
|
+
* This modified version is subject to the terms of the Tide Community Open
|
|
21
|
+
* Code License 2.0 as published by Tide Foundation Limited. You may modify
|
|
22
|
+
* and redistribute it in accordance with and subject to the terms of that License.
|
|
23
|
+
*
|
|
24
|
+
* This program is free software and is subject to the terms of the
|
|
25
|
+
* Tide Community Open Code License as published by the Tide Foundation Limited.
|
|
26
|
+
* You may modify it and redistribute it in accordance with and subject to the
|
|
27
|
+
* terms of that License. This program is distributed WITHOUT WARRANTY of any
|
|
28
|
+
* kind, including without any implied warranty of MERCHANTABILITY or FITNESS
|
|
29
|
+
* FOR A PARTICULAR PURPOSE.
|
|
30
|
+
* See the Tide Community Open Code License for more details.
|
|
31
|
+
* You should have received a copy of the Tide Community Open Code License along
|
|
32
|
+
* with this program. If not, see https://tide.org/licenses_tcoc2-0-0-en
|
|
33
|
+
*/
|
|
34
|
+
// MODIFIED: Added dependency to external Tide helper libraries.
|
|
35
|
+
import { RequestEnclave, ApprovalEnclave } from "heimdall-tide";
|
|
36
|
+
import { StringFromUint8Array, StringToUint8Array, CreateTideMemory } from "../modules/tide-js/Cryptide/Serialization.js";
|
|
37
|
+
import { AuthorizedEncryptionFlow } from "../modules/tide-js/Flow/EncryptionFlows/AuthorizedEncryptionFlow.js";
|
|
38
|
+
import dVVKSigningFlow_DEPRECATED from "../modules/tide-js/Flow/SigningFlows/dVVKSigningFlow_DEPRECATED.js";
|
|
39
|
+
import CardanoTxBodySignRequest from "../modules/tide-js/Models/Transactions/CardanoTxBodySignRequest.js";
|
|
40
|
+
import RuleSettingsSignRequest from "../modules/tide-js/Models/Rules/RuleSettingSignRequest.js";
|
|
41
|
+
import AuthorizationBuilder from "../modules/tide-js/Models/AuthorizationBuilder.js";
|
|
42
|
+
import { GenSessKey, GetPublic } from "../modules/tide-js/Cryptide/Math.js";
|
|
43
|
+
import NetworkClient from "../modules/tide-js/Clients/NetworkClient.js";
|
|
44
|
+
import { ModelRegistry } from "../modules/tide-js/Models/ModelRegistry.js";
|
|
45
|
+
import processThresholdRules from "../modules/tide-js/RulesEngine/thresholdRules.js";
|
|
46
|
+
import dVVKDecryptionFlow from "../modules/tide-js/Flow/DecryptionFlows/dVVKDecryptionFlow.js";
|
|
47
|
+
import dVVKSigningFlow from "../modules/tide-js/Flow/SigningFlows/dVVKSigningFlow.js";
|
|
48
|
+
// MODIFIED: Refactored `Keycloak` class into `TideCloak`.
|
|
49
|
+
function TideCloak(config) {
|
|
50
|
+
if (!(this instanceof TideCloak)) {
|
|
51
|
+
throw new Error("The 'TideCloak' constructor must be invoked with 'new'.");
|
|
52
|
+
}
|
|
53
|
+
if (typeof config !== 'string' && !isObject(config)) {
|
|
54
|
+
throw new Error("The 'TideCloak' constructor must be provided with a configuration object, or a URL to a JSON configuration file.");
|
|
55
|
+
}
|
|
56
|
+
if (isObject(config)) {
|
|
57
|
+
const requiredProperties = 'oidcProvider' in config
|
|
58
|
+
? ['clientId']
|
|
59
|
+
: ['url', 'realm', 'clientId', 'homeOrkUrl', 'vendorId', 'clientOriginAuth'];
|
|
60
|
+
for (const property of requiredProperties) {
|
|
61
|
+
if (!config[property]) {
|
|
62
|
+
throw new Error(`The configuration object is missing the required '${property}' property.`);
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
var kc = this;
|
|
67
|
+
var adapter;
|
|
68
|
+
var refreshQueue = [];
|
|
69
|
+
var callbackStorage;
|
|
70
|
+
var loginIframe = {
|
|
71
|
+
enable: true,
|
|
72
|
+
callbackList: [],
|
|
73
|
+
interval: 5
|
|
74
|
+
};
|
|
75
|
+
kc.didInitialize = false;
|
|
76
|
+
var useNonce = true;
|
|
77
|
+
var logInfo = createLogger(console.info);
|
|
78
|
+
var logWarn = createLogger(console.warn);
|
|
79
|
+
if (!globalThis.isSecureContext) {
|
|
80
|
+
logWarn("[TIDECLOAK] TideCloak-JS must be used in a 'secure context' to function properly as it relies on browser APIs that are otherwise not available.\n" +
|
|
81
|
+
"Continuing to run your application insecurely will lead to unexpected behavior and breakage.\n\n" +
|
|
82
|
+
"For more information see: https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts");
|
|
83
|
+
}
|
|
84
|
+
kc.init = function (initOptions = {}) {
|
|
85
|
+
if (kc.didInitialize) {
|
|
86
|
+
throw new Error("A 'TideCloak' instance can only be initialized once.");
|
|
87
|
+
}
|
|
88
|
+
kc.didInitialize = true;
|
|
89
|
+
kc.authenticated = false;
|
|
90
|
+
callbackStorage = createCallbackStorage();
|
|
91
|
+
var adapters = ['default', 'cordova', 'cordova-native'];
|
|
92
|
+
if (adapters.indexOf(initOptions.adapter) > -1) {
|
|
93
|
+
adapter = loadAdapter(initOptions.adapter);
|
|
94
|
+
}
|
|
95
|
+
else if (typeof initOptions.adapter === "object") {
|
|
96
|
+
adapter = initOptions.adapter;
|
|
97
|
+
}
|
|
98
|
+
else {
|
|
99
|
+
if (window.Cordova || window.cordova) {
|
|
100
|
+
adapter = loadAdapter('cordova');
|
|
101
|
+
}
|
|
102
|
+
else {
|
|
103
|
+
adapter = loadAdapter();
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
if (typeof initOptions.useNonce !== 'undefined') {
|
|
107
|
+
useNonce = initOptions.useNonce;
|
|
108
|
+
}
|
|
109
|
+
if (typeof initOptions.checkLoginIframe !== 'undefined') {
|
|
110
|
+
loginIframe.enable = initOptions.checkLoginIframe;
|
|
111
|
+
}
|
|
112
|
+
if (initOptions.checkLoginIframeInterval) {
|
|
113
|
+
loginIframe.interval = initOptions.checkLoginIframeInterval;
|
|
114
|
+
}
|
|
115
|
+
if (initOptions.onLoad === 'login-required') {
|
|
116
|
+
kc.loginRequired = true;
|
|
117
|
+
}
|
|
118
|
+
if (initOptions.responseMode) {
|
|
119
|
+
if (initOptions.responseMode === 'query' || initOptions.responseMode === 'fragment') {
|
|
120
|
+
kc.responseMode = initOptions.responseMode;
|
|
121
|
+
}
|
|
122
|
+
else {
|
|
123
|
+
throw 'Invalid value for responseMode';
|
|
124
|
+
}
|
|
125
|
+
}
|
|
126
|
+
if (initOptions.flow) {
|
|
127
|
+
switch (initOptions.flow) {
|
|
128
|
+
case 'standard':
|
|
129
|
+
kc.responseType = 'code';
|
|
130
|
+
break;
|
|
131
|
+
case 'implicit':
|
|
132
|
+
kc.responseType = 'id_token token';
|
|
133
|
+
break;
|
|
134
|
+
case 'hybrid':
|
|
135
|
+
kc.responseType = 'code id_token token';
|
|
136
|
+
break;
|
|
137
|
+
default:
|
|
138
|
+
throw 'Invalid value for flow';
|
|
139
|
+
}
|
|
140
|
+
kc.flow = initOptions.flow;
|
|
141
|
+
}
|
|
142
|
+
if (initOptions.timeSkew != null) {
|
|
143
|
+
kc.timeSkew = initOptions.timeSkew;
|
|
144
|
+
}
|
|
145
|
+
if (initOptions.redirectUri) {
|
|
146
|
+
kc.redirectUri = initOptions.redirectUri;
|
|
147
|
+
}
|
|
148
|
+
if (initOptions.silentCheckSsoRedirectUri) {
|
|
149
|
+
kc.silentCheckSsoRedirectUri = initOptions.silentCheckSsoRedirectUri;
|
|
150
|
+
}
|
|
151
|
+
if (typeof initOptions.silentCheckSsoFallback === 'boolean') {
|
|
152
|
+
kc.silentCheckSsoFallback = initOptions.silentCheckSsoFallback;
|
|
153
|
+
}
|
|
154
|
+
else {
|
|
155
|
+
kc.silentCheckSsoFallback = true;
|
|
156
|
+
}
|
|
157
|
+
if (typeof initOptions.pkceMethod !== "undefined") {
|
|
158
|
+
if (initOptions.pkceMethod !== "S256" && initOptions.pkceMethod !== false) {
|
|
159
|
+
throw new TypeError(`Invalid value for pkceMethod', expected 'S256' or false but got ${initOptions.pkceMethod}.`);
|
|
160
|
+
}
|
|
161
|
+
kc.pkceMethod = initOptions.pkceMethod;
|
|
162
|
+
}
|
|
163
|
+
else {
|
|
164
|
+
kc.pkceMethod = "S256";
|
|
165
|
+
}
|
|
166
|
+
if (typeof initOptions.enableLogging === 'boolean') {
|
|
167
|
+
kc.enableLogging = initOptions.enableLogging;
|
|
168
|
+
}
|
|
169
|
+
else {
|
|
170
|
+
kc.enableLogging = false;
|
|
171
|
+
}
|
|
172
|
+
if (initOptions.logoutMethod === 'POST') {
|
|
173
|
+
kc.logoutMethod = 'POST';
|
|
174
|
+
}
|
|
175
|
+
else {
|
|
176
|
+
kc.logoutMethod = 'GET';
|
|
177
|
+
}
|
|
178
|
+
if (typeof initOptions.scope === 'string') {
|
|
179
|
+
kc.scope = initOptions.scope;
|
|
180
|
+
}
|
|
181
|
+
if (typeof initOptions.acrValues === 'string') {
|
|
182
|
+
kc.acrValues = initOptions.acrValues;
|
|
183
|
+
}
|
|
184
|
+
if (typeof initOptions.messageReceiveTimeout === 'number' && initOptions.messageReceiveTimeout > 0) {
|
|
185
|
+
kc.messageReceiveTimeout = initOptions.messageReceiveTimeout;
|
|
186
|
+
}
|
|
187
|
+
else {
|
|
188
|
+
kc.messageReceiveTimeout = 10000;
|
|
189
|
+
}
|
|
190
|
+
if (!kc.responseMode) {
|
|
191
|
+
kc.responseMode = 'fragment';
|
|
192
|
+
}
|
|
193
|
+
if (!kc.responseType) {
|
|
194
|
+
kc.responseType = 'code';
|
|
195
|
+
kc.flow = 'standard';
|
|
196
|
+
}
|
|
197
|
+
var promise = createPromise();
|
|
198
|
+
var initPromise = createPromise();
|
|
199
|
+
initPromise.promise.then(function () {
|
|
200
|
+
kc.onReady && kc.onReady(kc.authenticated);
|
|
201
|
+
promise.setSuccess(kc.authenticated);
|
|
202
|
+
}).catch(function (error) {
|
|
203
|
+
promise.setError(error);
|
|
204
|
+
});
|
|
205
|
+
var configPromise = loadConfig();
|
|
206
|
+
function onLoad() {
|
|
207
|
+
var doLogin = function (prompt) {
|
|
208
|
+
if (!prompt) {
|
|
209
|
+
options.prompt = 'none';
|
|
210
|
+
}
|
|
211
|
+
if (initOptions.locale) {
|
|
212
|
+
options.locale = initOptions.locale;
|
|
213
|
+
}
|
|
214
|
+
kc.login(options).then(function () {
|
|
215
|
+
initPromise.setSuccess();
|
|
216
|
+
}).catch(function (error) {
|
|
217
|
+
initPromise.setError(error);
|
|
218
|
+
});
|
|
219
|
+
};
|
|
220
|
+
var checkSsoSilently = async function () {
|
|
221
|
+
var ifrm = document.createElement("iframe");
|
|
222
|
+
var src = await kc.createLoginUrl({ prompt: 'none', redirectUri: kc.silentCheckSsoRedirectUri });
|
|
223
|
+
ifrm.setAttribute("src", src);
|
|
224
|
+
ifrm.setAttribute("sandbox", "allow-storage-access-by-user-activation allow-scripts allow-same-origin");
|
|
225
|
+
ifrm.setAttribute("title", "keycloak-silent-check-sso");
|
|
226
|
+
ifrm.style.display = "none";
|
|
227
|
+
document.body.appendChild(ifrm);
|
|
228
|
+
var messageCallback = function (event) {
|
|
229
|
+
if (event.origin !== window.location.origin || ifrm.contentWindow !== event.source) {
|
|
230
|
+
return;
|
|
231
|
+
}
|
|
232
|
+
var oauth = parseCallback(event.data);
|
|
233
|
+
processCallback(oauth, initPromise);
|
|
234
|
+
document.body.removeChild(ifrm);
|
|
235
|
+
window.removeEventListener("message", messageCallback);
|
|
236
|
+
};
|
|
237
|
+
window.addEventListener("message", messageCallback);
|
|
238
|
+
};
|
|
239
|
+
var options = {};
|
|
240
|
+
switch (initOptions.onLoad) {
|
|
241
|
+
case 'check-sso':
|
|
242
|
+
if (loginIframe.enable) {
|
|
243
|
+
setupCheckLoginIframe().then(function () {
|
|
244
|
+
checkLoginIframe().then(function (unchanged) {
|
|
245
|
+
if (!unchanged) {
|
|
246
|
+
kc.silentCheckSsoRedirectUri ? checkSsoSilently() : doLogin(false);
|
|
247
|
+
}
|
|
248
|
+
else {
|
|
249
|
+
initPromise.setSuccess();
|
|
250
|
+
}
|
|
251
|
+
}).catch(function (error) {
|
|
252
|
+
initPromise.setError(error);
|
|
253
|
+
});
|
|
254
|
+
});
|
|
255
|
+
}
|
|
256
|
+
else {
|
|
257
|
+
kc.silentCheckSsoRedirectUri ? checkSsoSilently() : doLogin(false);
|
|
258
|
+
}
|
|
259
|
+
break;
|
|
260
|
+
case 'login-required':
|
|
261
|
+
doLogin(true);
|
|
262
|
+
break;
|
|
263
|
+
default:
|
|
264
|
+
throw 'Invalid value for onLoad';
|
|
265
|
+
}
|
|
266
|
+
}
|
|
267
|
+
function processInit() {
|
|
268
|
+
var callback = parseCallback(window.location.href);
|
|
269
|
+
if (callback) {
|
|
270
|
+
window.history.replaceState(window.history.state, null, callback.newUrl);
|
|
271
|
+
}
|
|
272
|
+
if (callback && callback.valid) {
|
|
273
|
+
return setupCheckLoginIframe().then(function () {
|
|
274
|
+
processCallback(callback, initPromise);
|
|
275
|
+
}).catch(function (error) {
|
|
276
|
+
initPromise.setError(error);
|
|
277
|
+
});
|
|
278
|
+
}
|
|
279
|
+
if (initOptions.token && initOptions.refreshToken) {
|
|
280
|
+
setToken(initOptions.token, initOptions.refreshToken, initOptions.idToken);
|
|
281
|
+
if (loginIframe.enable) {
|
|
282
|
+
setupCheckLoginIframe().then(function () {
|
|
283
|
+
checkLoginIframe().then(function (unchanged) {
|
|
284
|
+
if (unchanged) {
|
|
285
|
+
kc.onAuthSuccess && kc.onAuthSuccess();
|
|
286
|
+
initPromise.setSuccess();
|
|
287
|
+
scheduleCheckIframe();
|
|
288
|
+
}
|
|
289
|
+
else {
|
|
290
|
+
initPromise.setSuccess();
|
|
291
|
+
}
|
|
292
|
+
}).catch(function (error) {
|
|
293
|
+
initPromise.setError(error);
|
|
294
|
+
});
|
|
295
|
+
});
|
|
296
|
+
}
|
|
297
|
+
else {
|
|
298
|
+
kc.updateToken(-1).then(function () {
|
|
299
|
+
kc.onAuthSuccess && kc.onAuthSuccess();
|
|
300
|
+
initPromise.setSuccess();
|
|
301
|
+
}).catch(function (error) {
|
|
302
|
+
kc.onAuthError && kc.onAuthError();
|
|
303
|
+
if (initOptions.onLoad) {
|
|
304
|
+
onLoad();
|
|
305
|
+
}
|
|
306
|
+
else {
|
|
307
|
+
initPromise.setError(error);
|
|
308
|
+
}
|
|
309
|
+
});
|
|
310
|
+
}
|
|
311
|
+
}
|
|
312
|
+
else if (initOptions.onLoad) {
|
|
313
|
+
onLoad();
|
|
314
|
+
}
|
|
315
|
+
else {
|
|
316
|
+
initPromise.setSuccess();
|
|
317
|
+
}
|
|
318
|
+
}
|
|
319
|
+
configPromise.then(function () {
|
|
320
|
+
check3pCookiesSupported()
|
|
321
|
+
.then(processInit)
|
|
322
|
+
.catch(function (error) {
|
|
323
|
+
promise.setError(error);
|
|
324
|
+
});
|
|
325
|
+
});
|
|
326
|
+
configPromise.catch(function (error) {
|
|
327
|
+
promise.setError(error);
|
|
328
|
+
});
|
|
329
|
+
return promise.promise;
|
|
330
|
+
};
|
|
331
|
+
kc.login = function (options) {
|
|
332
|
+
return adapter.login(options);
|
|
333
|
+
};
|
|
334
|
+
kc.ensureTokenReady = async function () {
|
|
335
|
+
if (kc.isTokenExpired()) {
|
|
336
|
+
await kc.updateToken(-1);
|
|
337
|
+
}
|
|
338
|
+
};
|
|
339
|
+
// MODIFIED: Added role-based encryption functionality.
|
|
340
|
+
kc.encrypt = async function (toEncrypt) {
|
|
341
|
+
await kc.ensureTokenReady();
|
|
342
|
+
// Check config
|
|
343
|
+
if (!Array.isArray(toEncrypt)) {
|
|
344
|
+
throw 'Pass array as parameter';
|
|
345
|
+
}
|
|
346
|
+
// Check user authenticated
|
|
347
|
+
if (!kc.tokenParsed) {
|
|
348
|
+
throw 'Not authenticated';
|
|
349
|
+
}
|
|
350
|
+
const dataToSend = toEncrypt.map(e => {
|
|
351
|
+
if (!isObject(e))
|
|
352
|
+
throw 'All entries must be an object to encrypt';
|
|
353
|
+
for (const property of ["data", "tags"]) {
|
|
354
|
+
if (!e[property]) {
|
|
355
|
+
throw new Error(`The configuration object is missing the required '${property}' property.`);
|
|
356
|
+
}
|
|
357
|
+
}
|
|
358
|
+
if (!Array.isArray(e.tags))
|
|
359
|
+
throw 'tags must be provided as a string array in object to encrypt';
|
|
360
|
+
if (typeof e.data !== "string")
|
|
361
|
+
throw 'data must be provded as string in object to encrypt';
|
|
362
|
+
// Check that the user has the roles required to encrypt the datas
|
|
363
|
+
for (const tag of e.tags) {
|
|
364
|
+
if (typeof tag !== "string")
|
|
365
|
+
throw "tags must be provided as an array of strings";
|
|
366
|
+
var tagAccess = kc.hasRealmRole("_tide_" + tag + ".selfencrypt");
|
|
367
|
+
if (!tagAccess)
|
|
368
|
+
throw `'User has not been given any access to '${tag}'`;
|
|
369
|
+
}
|
|
370
|
+
return {
|
|
371
|
+
data: StringToUint8Array(e.data),
|
|
372
|
+
tags: e.tags
|
|
373
|
+
};
|
|
374
|
+
});
|
|
375
|
+
kc.initEnclave();
|
|
376
|
+
// Now lets actually encrypt
|
|
377
|
+
// Construct Tide serialized data payloads
|
|
378
|
+
return (await kc.requestEnclave.encrypt(dataToSend)).map(e => bytesToBase64(e));
|
|
379
|
+
};
|
|
380
|
+
function StringToUint8Array(string) {
|
|
381
|
+
const enc = new TextEncoder();
|
|
382
|
+
return enc.encode(string);
|
|
383
|
+
}
|
|
384
|
+
function StringFromUint8Array(bytes) {
|
|
385
|
+
const decoder = new TextDecoder('utf-8');
|
|
386
|
+
return decoder.decode(bytes);
|
|
387
|
+
}
|
|
388
|
+
kc.initEnclave = function () {
|
|
389
|
+
if (!kc.doken)
|
|
390
|
+
throw '[TIDECLOAK] No doken found';
|
|
391
|
+
if (!kc.tokenParsed)
|
|
392
|
+
throw '[TIDECLOAK] Token not parsed';
|
|
393
|
+
// Now lets actually encrypt
|
|
394
|
+
if (!kc.requestEnclave) {
|
|
395
|
+
kc.requestEnclave = new RequestEnclave({
|
|
396
|
+
homeOrkOrigin: kc.dokenParsed["t.uho"],
|
|
397
|
+
signed_client_origin: config['clientOriginAuth'],
|
|
398
|
+
vendorId: config.vendorId,
|
|
399
|
+
voucherURL: getVoucherUrl()
|
|
400
|
+
}).init({
|
|
401
|
+
doken: kc.doken,
|
|
402
|
+
dokenRefreshCallback: async () => {
|
|
403
|
+
await kc.ensureTokenReady();
|
|
404
|
+
if (!kc.doken)
|
|
405
|
+
throw '[TIDECLOAK] No doken found';
|
|
406
|
+
return kc.doken;
|
|
407
|
+
},
|
|
408
|
+
requireReloginCallback: async () => {
|
|
409
|
+
kc.login({
|
|
410
|
+
idpHint: 'tide', // the “alias” of the IdP you’ve configured in the realm
|
|
411
|
+
prompt: 'login', // forces them to actually re-enter credentials
|
|
412
|
+
redirectUri: window.location.href // send them back to the exact same URL
|
|
413
|
+
});
|
|
414
|
+
}
|
|
415
|
+
});
|
|
416
|
+
}
|
|
417
|
+
};
|
|
418
|
+
// MODIFIED: Added Tide-based micro-vouchers.
|
|
419
|
+
function getVoucherUrl() {
|
|
420
|
+
if (!kc.tokenParsed)
|
|
421
|
+
throw 'User authentication required to access voucher service';
|
|
422
|
+
const sid = kc.tokenParsed["sid"];
|
|
423
|
+
return getRealmUrl() + '/tidevouchers/fromUserSession?sessionId=' + sid;
|
|
424
|
+
}
|
|
425
|
+
// MODIFIED: Added role-based decryption functionality.
|
|
426
|
+
kc.decrypt = async function (toDecrypt) {
|
|
427
|
+
await kc.ensureTokenReady();
|
|
428
|
+
// Check config
|
|
429
|
+
if (!Array.isArray(toDecrypt)) {
|
|
430
|
+
throw 'Pass array as parameter';
|
|
431
|
+
}
|
|
432
|
+
// Check user authenticated
|
|
433
|
+
if (!kc.tokenParsed) {
|
|
434
|
+
throw 'Not authenticated';
|
|
435
|
+
}
|
|
436
|
+
const dataToSend = toDecrypt.map(e => {
|
|
437
|
+
if (!isObject(e))
|
|
438
|
+
throw 'All entries must be an object to decrypt';
|
|
439
|
+
for (const property of ["encrypted", "tags"]) {
|
|
440
|
+
if (!e[property]) {
|
|
441
|
+
throw new Error(`The configuration object is missing the required '${property}' property.`);
|
|
442
|
+
}
|
|
443
|
+
}
|
|
444
|
+
if (!Array.isArray(e.tags))
|
|
445
|
+
throw 'tags must be provided as a string array in object to decrypt';
|
|
446
|
+
if (typeof e.encrypted !== "string")
|
|
447
|
+
throw 'data must be provded as string in object to decrypt';
|
|
448
|
+
// Check that the user has the roles required to encrypt the datas
|
|
449
|
+
for (const tag of e.tags) {
|
|
450
|
+
if (typeof tag !== "string")
|
|
451
|
+
throw "tags must be provided as an array of strings";
|
|
452
|
+
var tagAccess = kc.hasRealmRole("_tide_" + tag + ".selfdecrypt");
|
|
453
|
+
if (!tagAccess)
|
|
454
|
+
throw `'User has not been given any access to '${tag}'`;
|
|
455
|
+
}
|
|
456
|
+
return {
|
|
457
|
+
encrypted: base64ToBytes(e.encrypted),
|
|
458
|
+
tags: e.tags
|
|
459
|
+
};
|
|
460
|
+
});
|
|
461
|
+
kc.initEnclave();
|
|
462
|
+
// Now lets actually decrypt
|
|
463
|
+
// Construct Tide serialized data payloads
|
|
464
|
+
return (await kc.requestEnclave.decrypt(dataToSend)).map(d => StringFromUint8Array(d));
|
|
465
|
+
};
|
|
466
|
+
function generateRandomData(len) {
|
|
467
|
+
if (typeof crypto === "undefined" || typeof crypto.getRandomValues === "undefined") {
|
|
468
|
+
throw new Error("Web Crypto API is not available.");
|
|
469
|
+
}
|
|
470
|
+
return crypto.getRandomValues(new Uint8Array(len));
|
|
471
|
+
}
|
|
472
|
+
function generateCodeVerifier(len) {
|
|
473
|
+
return generateRandomString(len, 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789');
|
|
474
|
+
}
|
|
475
|
+
function generateRandomString(len, alphabet) {
|
|
476
|
+
var randomData = generateRandomData(len);
|
|
477
|
+
var chars = new Array(len);
|
|
478
|
+
for (var i = 0; i < len; i++) {
|
|
479
|
+
chars[i] = alphabet.charCodeAt(randomData[i] % alphabet.length);
|
|
480
|
+
}
|
|
481
|
+
return String.fromCharCode.apply(null, chars);
|
|
482
|
+
}
|
|
483
|
+
async function generatePkceChallenge(pkceMethod, codeVerifier) {
|
|
484
|
+
if (pkceMethod !== "S256") {
|
|
485
|
+
throw new TypeError(`Invalid value for 'pkceMethod', expected 'S256' but got '${pkceMethod}'.`);
|
|
486
|
+
}
|
|
487
|
+
// hash codeVerifier, then encode as url-safe base64 without padding
|
|
488
|
+
const hashBytes = new Uint8Array(await sha256Digest(codeVerifier));
|
|
489
|
+
const encodedHash = bytesToBase64(hashBytes)
|
|
490
|
+
.replace(/\+/g, '-')
|
|
491
|
+
.replace(/\//g, '_')
|
|
492
|
+
.replace(/\=/g, '');
|
|
493
|
+
return encodedHash;
|
|
494
|
+
}
|
|
495
|
+
function buildClaimsParameter(requestedAcr) {
|
|
496
|
+
var claims = {
|
|
497
|
+
id_token: {
|
|
498
|
+
acr: requestedAcr
|
|
499
|
+
}
|
|
500
|
+
};
|
|
501
|
+
return JSON.stringify(claims);
|
|
502
|
+
}
|
|
503
|
+
kc.createLoginUrl = async function (options) {
|
|
504
|
+
var state = createUUID();
|
|
505
|
+
var nonce = createUUID();
|
|
506
|
+
var redirectUri = adapter.redirectUri(options);
|
|
507
|
+
var callbackState = {
|
|
508
|
+
state: state,
|
|
509
|
+
nonce: nonce,
|
|
510
|
+
redirectUri: encodeURIComponent(redirectUri),
|
|
511
|
+
loginOptions: options
|
|
512
|
+
};
|
|
513
|
+
if (options && options.prompt) {
|
|
514
|
+
callbackState.prompt = options.prompt;
|
|
515
|
+
}
|
|
516
|
+
var baseUrl;
|
|
517
|
+
if (options && options.action == 'register') {
|
|
518
|
+
baseUrl = kc.endpoints.register();
|
|
519
|
+
}
|
|
520
|
+
else {
|
|
521
|
+
baseUrl = kc.endpoints.authorize();
|
|
522
|
+
}
|
|
523
|
+
var scope = options && options.scope || kc.scope;
|
|
524
|
+
if (!scope) {
|
|
525
|
+
// if scope is not set, default to "openid"
|
|
526
|
+
scope = "openid";
|
|
527
|
+
}
|
|
528
|
+
else if (scope.indexOf("openid") === -1) {
|
|
529
|
+
// if openid scope is missing, prefix the given scopes with it
|
|
530
|
+
scope = "openid " + scope;
|
|
531
|
+
}
|
|
532
|
+
var url = baseUrl
|
|
533
|
+
+ '?client_id=' + encodeURIComponent(kc.clientId)
|
|
534
|
+
+ '&redirect_uri=' + encodeURIComponent(redirectUri)
|
|
535
|
+
+ '&state=' + encodeURIComponent(state)
|
|
536
|
+
+ '&response_mode=' + encodeURIComponent(kc.responseMode)
|
|
537
|
+
+ '&response_type=' + encodeURIComponent(kc.responseType)
|
|
538
|
+
+ '&scope=' + encodeURIComponent(scope);
|
|
539
|
+
if (useNonce) {
|
|
540
|
+
url = url + '&nonce=' + encodeURIComponent(nonce);
|
|
541
|
+
}
|
|
542
|
+
if (options && options.prompt) {
|
|
543
|
+
url += '&prompt=' + encodeURIComponent(options.prompt);
|
|
544
|
+
}
|
|
545
|
+
if (options && typeof options.maxAge === 'number') {
|
|
546
|
+
url += '&max_age=' + encodeURIComponent(options.maxAge);
|
|
547
|
+
}
|
|
548
|
+
if (options && options.loginHint) {
|
|
549
|
+
url += '&login_hint=' + encodeURIComponent(options.loginHint);
|
|
550
|
+
}
|
|
551
|
+
if (options && options.idpHint) {
|
|
552
|
+
url += '&kc_idp_hint=' + encodeURIComponent(options.idpHint);
|
|
553
|
+
}
|
|
554
|
+
if (options && options.action && options.action != 'register') {
|
|
555
|
+
url += '&kc_action=' + encodeURIComponent(options.action);
|
|
556
|
+
}
|
|
557
|
+
if (options && options.locale) {
|
|
558
|
+
url += '&ui_locales=' + encodeURIComponent(options.locale);
|
|
559
|
+
}
|
|
560
|
+
if (options && options.acr) {
|
|
561
|
+
var claimsParameter = buildClaimsParameter(options.acr);
|
|
562
|
+
url += '&claims=' + encodeURIComponent(claimsParameter);
|
|
563
|
+
}
|
|
564
|
+
if ((options && options.acrValues) || kc.acrValues) {
|
|
565
|
+
url += '&acr_values=' + encodeURIComponent(options.acrValues || kc.acrValues);
|
|
566
|
+
}
|
|
567
|
+
if (kc.pkceMethod) {
|
|
568
|
+
try {
|
|
569
|
+
const codeVerifier = generateCodeVerifier(96);
|
|
570
|
+
const pkceChallenge = await generatePkceChallenge(kc.pkceMethod, codeVerifier);
|
|
571
|
+
callbackState.pkceCodeVerifier = codeVerifier;
|
|
572
|
+
url += '&code_challenge=' + pkceChallenge;
|
|
573
|
+
url += '&code_challenge_method=' + kc.pkceMethod;
|
|
574
|
+
}
|
|
575
|
+
catch (error) {
|
|
576
|
+
throw new Error("Failed to generate PKCE challenge.", { cause: error });
|
|
577
|
+
}
|
|
578
|
+
}
|
|
579
|
+
callbackStorage.add(callbackState);
|
|
580
|
+
return url;
|
|
581
|
+
};
|
|
582
|
+
kc.logout = function (options) {
|
|
583
|
+
return adapter.logout(options);
|
|
584
|
+
};
|
|
585
|
+
kc.createLogoutUrl = function (options) {
|
|
586
|
+
var _a;
|
|
587
|
+
const logoutMethod = (_a = options === null || options === void 0 ? void 0 : options.logoutMethod) !== null && _a !== void 0 ? _a : kc.logoutMethod;
|
|
588
|
+
if (logoutMethod === 'POST') {
|
|
589
|
+
return kc.endpoints.logout();
|
|
590
|
+
}
|
|
591
|
+
var url = kc.endpoints.logout()
|
|
592
|
+
+ '?client_id=' + encodeURIComponent(kc.clientId)
|
|
593
|
+
+ '&post_logout_redirect_uri=' + encodeURIComponent(adapter.redirectUri(options, false));
|
|
594
|
+
if (kc.idToken) {
|
|
595
|
+
url += '&id_token_hint=' + encodeURIComponent(kc.idToken);
|
|
596
|
+
}
|
|
597
|
+
return url;
|
|
598
|
+
};
|
|
599
|
+
kc.register = function (options) {
|
|
600
|
+
return adapter.register(options);
|
|
601
|
+
};
|
|
602
|
+
kc.createRegisterUrl = async function (options) {
|
|
603
|
+
if (!options) {
|
|
604
|
+
options = {};
|
|
605
|
+
}
|
|
606
|
+
options.action = 'register';
|
|
607
|
+
return await kc.createLoginUrl(options);
|
|
608
|
+
};
|
|
609
|
+
kc.createAccountUrl = function (options) {
|
|
610
|
+
var realm = getRealmUrl();
|
|
611
|
+
var url = undefined;
|
|
612
|
+
if (typeof realm !== 'undefined') {
|
|
613
|
+
url = realm
|
|
614
|
+
+ '/account'
|
|
615
|
+
+ '?referrer=' + encodeURIComponent(kc.clientId)
|
|
616
|
+
+ '&referrer_uri=' + encodeURIComponent(adapter.redirectUri(options));
|
|
617
|
+
}
|
|
618
|
+
return url;
|
|
619
|
+
};
|
|
620
|
+
kc.accountManagement = function () {
|
|
621
|
+
return adapter.accountManagement();
|
|
622
|
+
};
|
|
623
|
+
kc.hasRealmRole = function (role) {
|
|
624
|
+
var access = kc.realmAccess;
|
|
625
|
+
return !!access && access.roles.indexOf(role) >= 0;
|
|
626
|
+
};
|
|
627
|
+
kc.hasResourceRole = function (role, resource) {
|
|
628
|
+
if (!kc.resourceAccess) {
|
|
629
|
+
return false;
|
|
630
|
+
}
|
|
631
|
+
var access = kc.resourceAccess[resource || kc.clientId];
|
|
632
|
+
return !!access && access.roles.indexOf(role) >= 0;
|
|
633
|
+
};
|
|
634
|
+
kc.loadUserProfile = function () {
|
|
635
|
+
var url = getRealmUrl() + '/account';
|
|
636
|
+
var req = new XMLHttpRequest();
|
|
637
|
+
req.open('GET', url, true);
|
|
638
|
+
req.setRequestHeader('Accept', 'application/json');
|
|
639
|
+
req.setRequestHeader('Authorization', 'bearer ' + kc.token);
|
|
640
|
+
var promise = createPromise();
|
|
641
|
+
req.onreadystatechange = function () {
|
|
642
|
+
if (req.readyState == 4) {
|
|
643
|
+
if (req.status == 200) {
|
|
644
|
+
kc.profile = JSON.parse(req.responseText);
|
|
645
|
+
promise.setSuccess(kc.profile);
|
|
646
|
+
}
|
|
647
|
+
else {
|
|
648
|
+
promise.setError();
|
|
649
|
+
}
|
|
650
|
+
}
|
|
651
|
+
};
|
|
652
|
+
req.send();
|
|
653
|
+
return promise.promise;
|
|
654
|
+
};
|
|
655
|
+
kc.loadUserInfo = function () {
|
|
656
|
+
var url = kc.endpoints.userinfo();
|
|
657
|
+
var req = new XMLHttpRequest();
|
|
658
|
+
req.open('GET', url, true);
|
|
659
|
+
req.setRequestHeader('Accept', 'application/json');
|
|
660
|
+
req.setRequestHeader('Authorization', 'bearer ' + kc.token);
|
|
661
|
+
var promise = createPromise();
|
|
662
|
+
req.onreadystatechange = function () {
|
|
663
|
+
if (req.readyState == 4) {
|
|
664
|
+
if (req.status == 200) {
|
|
665
|
+
kc.userInfo = JSON.parse(req.responseText);
|
|
666
|
+
promise.setSuccess(kc.userInfo);
|
|
667
|
+
}
|
|
668
|
+
else {
|
|
669
|
+
promise.setError();
|
|
670
|
+
}
|
|
671
|
+
}
|
|
672
|
+
};
|
|
673
|
+
req.send();
|
|
674
|
+
return promise.promise;
|
|
675
|
+
};
|
|
676
|
+
kc.isTokenExpired = function (minValidity) {
|
|
677
|
+
if (!kc.tokenParsed || (!kc.refreshToken && kc.flow != 'implicit')) {
|
|
678
|
+
throw 'Not authenticated';
|
|
679
|
+
}
|
|
680
|
+
if (kc.timeSkew == null) {
|
|
681
|
+
logInfo('[TIDECLOAK] Unable to determine if token is expired as timeskew is not set');
|
|
682
|
+
return true;
|
|
683
|
+
}
|
|
684
|
+
var expiresIn = kc.tokenParsed['exp'] - Math.ceil(new Date().getTime() / 1000) + kc.timeSkew;
|
|
685
|
+
if (minValidity) {
|
|
686
|
+
if (isNaN(minValidity)) {
|
|
687
|
+
throw 'Invalid minValidity';
|
|
688
|
+
}
|
|
689
|
+
expiresIn -= minValidity;
|
|
690
|
+
}
|
|
691
|
+
return expiresIn < 0;
|
|
692
|
+
};
|
|
693
|
+
kc.updateToken = function (minValidity) {
|
|
694
|
+
var promise = createPromise();
|
|
695
|
+
if (!kc.refreshToken) {
|
|
696
|
+
promise.setError();
|
|
697
|
+
return promise.promise;
|
|
698
|
+
}
|
|
699
|
+
minValidity = minValidity || 5;
|
|
700
|
+
var exec = function () {
|
|
701
|
+
var refreshToken = false;
|
|
702
|
+
if (minValidity == -1) {
|
|
703
|
+
refreshToken = true;
|
|
704
|
+
logInfo('[TIDECLOAK] Refreshing token: forced refresh');
|
|
705
|
+
}
|
|
706
|
+
else if (!kc.tokenParsed || kc.isTokenExpired(minValidity)) {
|
|
707
|
+
refreshToken = true;
|
|
708
|
+
logInfo('[TIDECLOAK] Refreshing token: token expired');
|
|
709
|
+
}
|
|
710
|
+
if (!refreshToken) {
|
|
711
|
+
promise.setSuccess(false);
|
|
712
|
+
}
|
|
713
|
+
else {
|
|
714
|
+
var params = 'grant_type=refresh_token&' + 'refresh_token=' + kc.refreshToken;
|
|
715
|
+
var url = kc.endpoints.token();
|
|
716
|
+
refreshQueue.push(promise);
|
|
717
|
+
if (refreshQueue.length == 1) {
|
|
718
|
+
var req = new XMLHttpRequest();
|
|
719
|
+
req.open('POST', url, true);
|
|
720
|
+
req.setRequestHeader('Content-type', 'application/x-www-form-urlencoded');
|
|
721
|
+
req.withCredentials = true;
|
|
722
|
+
params += '&client_id=' + encodeURIComponent(kc.clientId);
|
|
723
|
+
var timeLocal = new Date().getTime();
|
|
724
|
+
req.onreadystatechange = function () {
|
|
725
|
+
if (req.readyState == 4) {
|
|
726
|
+
if (req.status == 200) {
|
|
727
|
+
logInfo('[TIDECLOAK] Token refreshed');
|
|
728
|
+
timeLocal = (timeLocal + new Date().getTime()) / 2;
|
|
729
|
+
var tokenResponse = JSON.parse(req.responseText);
|
|
730
|
+
setToken(tokenResponse['access_token'], tokenResponse['refresh_token'], tokenResponse['id_token'], timeLocal, tokenResponse['doken']);
|
|
731
|
+
kc.onAuthRefreshSuccess && kc.onAuthRefreshSuccess();
|
|
732
|
+
for (var p = refreshQueue.pop(); p != null; p = refreshQueue.pop()) {
|
|
733
|
+
p.setSuccess(true);
|
|
734
|
+
}
|
|
735
|
+
}
|
|
736
|
+
else {
|
|
737
|
+
logWarn('[TIDECLOAK] Failed to refresh token');
|
|
738
|
+
if (req.status == 400) {
|
|
739
|
+
kc.clearToken();
|
|
740
|
+
}
|
|
741
|
+
if (req.status == 500) {
|
|
742
|
+
// Check to see if error message tells us to reauthenticate the user
|
|
743
|
+
console.log("CHECKING REAUTH");
|
|
744
|
+
}
|
|
745
|
+
kc.onAuthRefreshError && kc.onAuthRefreshError();
|
|
746
|
+
for (var p = refreshQueue.pop(); p != null; p = refreshQueue.pop()) {
|
|
747
|
+
p.setError("Failed to refresh token: An unexpected HTTP error occurred while attempting to refresh the token.");
|
|
748
|
+
}
|
|
749
|
+
}
|
|
750
|
+
}
|
|
751
|
+
};
|
|
752
|
+
req.send(params);
|
|
753
|
+
}
|
|
754
|
+
}
|
|
755
|
+
};
|
|
756
|
+
if (loginIframe.enable) {
|
|
757
|
+
var iframePromise = checkLoginIframe();
|
|
758
|
+
iframePromise.then(function () {
|
|
759
|
+
exec();
|
|
760
|
+
}).catch(function (error) {
|
|
761
|
+
promise.setError(error);
|
|
762
|
+
});
|
|
763
|
+
}
|
|
764
|
+
else {
|
|
765
|
+
exec();
|
|
766
|
+
}
|
|
767
|
+
return promise.promise;
|
|
768
|
+
};
|
|
769
|
+
kc.clearToken = function () {
|
|
770
|
+
if (kc.token) {
|
|
771
|
+
setToken(null, null, null);
|
|
772
|
+
kc.onAuthLogout && kc.onAuthLogout();
|
|
773
|
+
if (kc.loginRequired) {
|
|
774
|
+
kc.login();
|
|
775
|
+
}
|
|
776
|
+
}
|
|
777
|
+
};
|
|
778
|
+
// Add the checkThresholdRule function to the Heimdall instance.
|
|
779
|
+
// This function calls the generic threshold rule processor from the thresholdRules module.
|
|
780
|
+
kc.checkThresholdRule = function (key, idSubstring, outputKey, ruleSettings, draftJson) {
|
|
781
|
+
// Process the threshold rules using the provided parameters and return the result.
|
|
782
|
+
return processThresholdRules(key, idSubstring, outputKey, ruleSettings, draftJson);
|
|
783
|
+
};
|
|
784
|
+
kc.createCardanoTxDraft = function (txBody) {
|
|
785
|
+
const txBodyBytes = base64ToBytes(txBody);
|
|
786
|
+
return bytesToBase64(CreateTideMemory(txBodyBytes, txBodyBytes.length + 4));
|
|
787
|
+
};
|
|
788
|
+
kc.sign = async function (signModel, authFlow, draft, authorizers, ruleSetting, expiry) {
|
|
789
|
+
await kc.ensureTokenReady();
|
|
790
|
+
const signModelId = signModel.split(":");
|
|
791
|
+
if (signModelId.length !== 2 || !signModelId[0] || !signModelId[1]) {
|
|
792
|
+
throw "SignModel is not in the correct format. Expected format: 'ModelName:Version' (e.g. 'UserContext:1').";
|
|
793
|
+
}
|
|
794
|
+
const authFlowId = authFlow.split(":");
|
|
795
|
+
if (authFlowId.length !== 2 || !authFlowId[0] || !authFlowId[1]) {
|
|
796
|
+
throw "AuthFlow is not in the correct format. Expected format: 'ModelName:Version' (e.g. 'VRK:1').";
|
|
797
|
+
}
|
|
798
|
+
const sessKey = GenSessKey();
|
|
799
|
+
const gSessKey = GetPublic(sessKey);
|
|
800
|
+
const vvkInfo = await new NetworkClient(config.homeOrkUrl).GetKeyInfo(config.vendorId);
|
|
801
|
+
;
|
|
802
|
+
// Check user authenticated
|
|
803
|
+
if (!kc.tokenParsed) {
|
|
804
|
+
throw 'Not authenticated';
|
|
805
|
+
}
|
|
806
|
+
// Check config
|
|
807
|
+
if (!Array.isArray(authorizers)) {
|
|
808
|
+
throw 'Pass authorizers in an array!';
|
|
809
|
+
}
|
|
810
|
+
const signRequest = new BaseTideRequest(signModelId[0], signModel[1], authFlow, draft);
|
|
811
|
+
if (expiry)
|
|
812
|
+
signRequest.setCustomExpiry(expiry);
|
|
813
|
+
new AuthorizationBuilder(signRequest, authorizers, ruleSetting).addAuthorization();
|
|
814
|
+
const signingFlow = new dVVKSigningFlow_DEPRECATED(config.vendorId, vvkInfo.UserPublic, vvkInfo.OrkInfo, sessKey, gSessKey, getVoucherUrl());
|
|
815
|
+
const result = (await signingFlow.start(signRequest));
|
|
816
|
+
return result;
|
|
817
|
+
};
|
|
818
|
+
kc.signCardanoTx = async function (txBody, authorizers, ruleSettings, expiry) {
|
|
819
|
+
await kc.ensureTokenReady();
|
|
820
|
+
const sessKey = GenSessKey();
|
|
821
|
+
const gSessKey = GetPublic(sessKey);
|
|
822
|
+
const vvkInfo = await new NetworkClient(config.homeOrkUrl).GetKeyInfo(config.vendorId);
|
|
823
|
+
;
|
|
824
|
+
// Check user authenticated
|
|
825
|
+
if (!kc.tokenParsed) {
|
|
826
|
+
throw 'Not authenticated';
|
|
827
|
+
}
|
|
828
|
+
// Check config
|
|
829
|
+
if (!Array.isArray(authorizers)) {
|
|
830
|
+
throw 'Pass authorizers in an array!';
|
|
831
|
+
}
|
|
832
|
+
const cardanoSignRequest = new CardanoTxBodySignRequest("BlindSig:1");
|
|
833
|
+
cardanoSignRequest.setTxBody(txBody);
|
|
834
|
+
cardanoSignRequest.serializeDraft();
|
|
835
|
+
new AuthorizationBuilder(cardanoSignRequest, authorizers, ruleSettings).addAuthorization();
|
|
836
|
+
cardanoSignRequest.setCustomExpiry(expiry);
|
|
837
|
+
const txSigningFlow = new dVVKSigningFlow_DEPRECATED(config.vendorId, vvkInfo.UserPublic, vvkInfo.OrkInfo, sessKey, gSessKey, getVoucherUrl());
|
|
838
|
+
const result = (await txSigningFlow.start(cardanoSignRequest));
|
|
839
|
+
return bytesToBase64(result[0]);
|
|
840
|
+
};
|
|
841
|
+
kc.createRuleSettingsDraft = function (ruleSettings, previousRuleSetting, previousRuleSettingCert) {
|
|
842
|
+
const ruleReqDraft = new RuleSettingsSignRequest("Admin:1");
|
|
843
|
+
ruleReqDraft.setNewRuleSetting(StringToUint8Array(ruleSettings));
|
|
844
|
+
if (previousRuleSetting !== undefined && previousRuleSettingCert !== undefined) {
|
|
845
|
+
ruleReqDraft.setPreviousRuleSetting(StringToUint8Array(previousRuleSetting));
|
|
846
|
+
ruleReqDraft.setPreviousRuleSettingCert(base64ToBytes(previousRuleSettingCert));
|
|
847
|
+
}
|
|
848
|
+
return bytesToBase64(ruleReqDraft.getDraft());
|
|
849
|
+
};
|
|
850
|
+
function getRealmUrl() {
|
|
851
|
+
if (typeof kc.authServerUrl !== 'undefined') {
|
|
852
|
+
if (kc.authServerUrl.charAt(kc.authServerUrl.length - 1) == '/') {
|
|
853
|
+
return kc.authServerUrl + 'realms/' + encodeURIComponent(kc.realm);
|
|
854
|
+
}
|
|
855
|
+
else {
|
|
856
|
+
return kc.authServerUrl + '/realms/' + encodeURIComponent(kc.realm);
|
|
857
|
+
}
|
|
858
|
+
}
|
|
859
|
+
else {
|
|
860
|
+
return undefined;
|
|
861
|
+
}
|
|
862
|
+
}
|
|
863
|
+
function getOrigin() {
|
|
864
|
+
if (!window.location.origin) {
|
|
865
|
+
return window.location.protocol + "//" + window.location.hostname + (window.location.port ? ':' + window.location.port : '');
|
|
866
|
+
}
|
|
867
|
+
else {
|
|
868
|
+
return window.location.origin;
|
|
869
|
+
}
|
|
870
|
+
}
|
|
871
|
+
function processCallback(oauth, promise) {
|
|
872
|
+
var code = oauth.code;
|
|
873
|
+
var error = oauth.error;
|
|
874
|
+
var prompt = oauth.prompt;
|
|
875
|
+
var timeLocal = new Date().getTime();
|
|
876
|
+
if (oauth['kc_action_status']) {
|
|
877
|
+
kc.onActionUpdate && kc.onActionUpdate(oauth['kc_action_status'], oauth['kc_action']);
|
|
878
|
+
}
|
|
879
|
+
if (error) {
|
|
880
|
+
if (prompt != 'none') {
|
|
881
|
+
if (oauth.error_description && oauth.error_description === "authentication_expired") {
|
|
882
|
+
kc.login(oauth.loginOptions);
|
|
883
|
+
}
|
|
884
|
+
else {
|
|
885
|
+
var errorData = { error: error, error_description: oauth.error_description };
|
|
886
|
+
kc.onAuthError && kc.onAuthError(errorData);
|
|
887
|
+
promise && promise.setError(errorData);
|
|
888
|
+
}
|
|
889
|
+
}
|
|
890
|
+
else {
|
|
891
|
+
promise && promise.setSuccess();
|
|
892
|
+
}
|
|
893
|
+
return;
|
|
894
|
+
}
|
|
895
|
+
else if ((kc.flow != 'standard') && (oauth.access_token || oauth.id_token)) {
|
|
896
|
+
authSuccess(oauth.access_token, null, oauth.id_token, true, oauth.doken);
|
|
897
|
+
}
|
|
898
|
+
if ((kc.flow != 'implicit') && code) {
|
|
899
|
+
var params = 'code=' + code + '&grant_type=authorization_code';
|
|
900
|
+
var url = kc.endpoints.token();
|
|
901
|
+
var req = new XMLHttpRequest();
|
|
902
|
+
req.open('POST', url, true);
|
|
903
|
+
req.setRequestHeader('Content-type', 'application/x-www-form-urlencoded');
|
|
904
|
+
params += '&client_id=' + encodeURIComponent(kc.clientId);
|
|
905
|
+
params += '&redirect_uri=' + oauth.redirectUri;
|
|
906
|
+
if (oauth.pkceCodeVerifier) {
|
|
907
|
+
params += '&code_verifier=' + oauth.pkceCodeVerifier;
|
|
908
|
+
}
|
|
909
|
+
req.withCredentials = true;
|
|
910
|
+
req.onreadystatechange = function () {
|
|
911
|
+
if (req.readyState == 4) {
|
|
912
|
+
if (req.status == 200) {
|
|
913
|
+
var tokenResponse = JSON.parse(req.responseText);
|
|
914
|
+
authSuccess(tokenResponse['access_token'], tokenResponse['refresh_token'], tokenResponse['id_token'], kc.flow === 'standard', tokenResponse['doken']); // added doken field
|
|
915
|
+
scheduleCheckIframe();
|
|
916
|
+
}
|
|
917
|
+
else {
|
|
918
|
+
if (req.status == 500) {
|
|
919
|
+
// Check to see if error message tells us to reauthenticate the user
|
|
920
|
+
console.log("CHECKING REAUTH");
|
|
921
|
+
}
|
|
922
|
+
kc.onAuthError && kc.onAuthError();
|
|
923
|
+
promise && promise.setError();
|
|
924
|
+
}
|
|
925
|
+
}
|
|
926
|
+
};
|
|
927
|
+
req.onerror = function () {
|
|
928
|
+
// Try to log the user in again
|
|
929
|
+
kc.login({
|
|
930
|
+
idpHint: 'tide',
|
|
931
|
+
prompt: 'login', // forces them to actually re-enter credentials
|
|
932
|
+
redirectUri: window.location.href // send them back to the exact same URL
|
|
933
|
+
});
|
|
934
|
+
};
|
|
935
|
+
req.send(params);
|
|
936
|
+
}
|
|
937
|
+
function authSuccess(accessToken, refreshToken, idToken, fulfillPromise, doken = null) {
|
|
938
|
+
timeLocal = (timeLocal + new Date().getTime()) / 2;
|
|
939
|
+
setToken(accessToken, refreshToken, idToken, timeLocal, doken);
|
|
940
|
+
if (useNonce && (kc.idTokenParsed && kc.idTokenParsed.nonce != oauth.storedNonce)) {
|
|
941
|
+
logInfo('[TIDECLOAK] Invalid nonce, clearing token');
|
|
942
|
+
kc.clearToken();
|
|
943
|
+
promise && promise.setError();
|
|
944
|
+
}
|
|
945
|
+
else {
|
|
946
|
+
if (fulfillPromise) {
|
|
947
|
+
kc.onAuthSuccess && kc.onAuthSuccess();
|
|
948
|
+
promise && promise.setSuccess();
|
|
949
|
+
}
|
|
950
|
+
}
|
|
951
|
+
}
|
|
952
|
+
}
|
|
953
|
+
function loadConfig() {
|
|
954
|
+
var promise = createPromise();
|
|
955
|
+
var configUrl;
|
|
956
|
+
if (typeof config === 'string') {
|
|
957
|
+
configUrl = config;
|
|
958
|
+
}
|
|
959
|
+
function setupOidcEndoints(oidcConfiguration) {
|
|
960
|
+
if (!oidcConfiguration) {
|
|
961
|
+
kc.endpoints = {
|
|
962
|
+
authorize: function () {
|
|
963
|
+
return getRealmUrl() + '/protocol/openid-connect/auth';
|
|
964
|
+
},
|
|
965
|
+
token: function () {
|
|
966
|
+
return getRealmUrl() + '/protocol/openid-connect/token';
|
|
967
|
+
},
|
|
968
|
+
logout: function () {
|
|
969
|
+
return getRealmUrl() + '/protocol/openid-connect/logout';
|
|
970
|
+
},
|
|
971
|
+
checkSessionIframe: function () {
|
|
972
|
+
return getRealmUrl() + '/protocol/openid-connect/login-status-iframe.html';
|
|
973
|
+
},
|
|
974
|
+
thirdPartyCookiesIframe: function () {
|
|
975
|
+
return getRealmUrl() + '/protocol/openid-connect/3p-cookies/step1.html';
|
|
976
|
+
},
|
|
977
|
+
register: function () {
|
|
978
|
+
return getRealmUrl() + '/protocol/openid-connect/registrations';
|
|
979
|
+
},
|
|
980
|
+
userinfo: function () {
|
|
981
|
+
return getRealmUrl() + '/protocol/openid-connect/userinfo';
|
|
982
|
+
}
|
|
983
|
+
};
|
|
984
|
+
}
|
|
985
|
+
else {
|
|
986
|
+
kc.endpoints = {
|
|
987
|
+
authorize: function () {
|
|
988
|
+
return oidcConfiguration.authorization_endpoint;
|
|
989
|
+
},
|
|
990
|
+
token: function () {
|
|
991
|
+
return oidcConfiguration.token_endpoint;
|
|
992
|
+
},
|
|
993
|
+
logout: function () {
|
|
994
|
+
if (!oidcConfiguration.end_session_endpoint) {
|
|
995
|
+
throw "Not supported by the OIDC server";
|
|
996
|
+
}
|
|
997
|
+
return oidcConfiguration.end_session_endpoint;
|
|
998
|
+
},
|
|
999
|
+
checkSessionIframe: function () {
|
|
1000
|
+
if (!oidcConfiguration.check_session_iframe) {
|
|
1001
|
+
throw "Not supported by the OIDC server";
|
|
1002
|
+
}
|
|
1003
|
+
return oidcConfiguration.check_session_iframe;
|
|
1004
|
+
},
|
|
1005
|
+
register: function () {
|
|
1006
|
+
throw 'Redirection to "Register user" page not supported in standard OIDC mode';
|
|
1007
|
+
},
|
|
1008
|
+
userinfo: function () {
|
|
1009
|
+
if (!oidcConfiguration.userinfo_endpoint) {
|
|
1010
|
+
throw "Not supported by the OIDC server";
|
|
1011
|
+
}
|
|
1012
|
+
return oidcConfiguration.userinfo_endpoint;
|
|
1013
|
+
}
|
|
1014
|
+
};
|
|
1015
|
+
}
|
|
1016
|
+
}
|
|
1017
|
+
if (configUrl) {
|
|
1018
|
+
var req = new XMLHttpRequest();
|
|
1019
|
+
req.open('GET', configUrl, true);
|
|
1020
|
+
req.setRequestHeader('Accept', 'application/json');
|
|
1021
|
+
req.onreadystatechange = function () {
|
|
1022
|
+
if (req.readyState == 4) {
|
|
1023
|
+
if (req.status == 200 || fileLoaded(req)) {
|
|
1024
|
+
var config = JSON.parse(req.responseText);
|
|
1025
|
+
kc.authServerUrl = config['auth-server-url'];
|
|
1026
|
+
kc.realm = config['realm'];
|
|
1027
|
+
kc.clientId = config['resource'];
|
|
1028
|
+
setupOidcEndoints(null);
|
|
1029
|
+
promise.setSuccess();
|
|
1030
|
+
}
|
|
1031
|
+
else {
|
|
1032
|
+
promise.setError();
|
|
1033
|
+
}
|
|
1034
|
+
}
|
|
1035
|
+
};
|
|
1036
|
+
req.send();
|
|
1037
|
+
}
|
|
1038
|
+
else {
|
|
1039
|
+
kc.clientId = config.clientId;
|
|
1040
|
+
var oidcProvider = config['oidcProvider'];
|
|
1041
|
+
if (!oidcProvider) {
|
|
1042
|
+
kc.authServerUrl = config.url;
|
|
1043
|
+
kc.realm = config.realm;
|
|
1044
|
+
setupOidcEndoints(null);
|
|
1045
|
+
promise.setSuccess();
|
|
1046
|
+
}
|
|
1047
|
+
else {
|
|
1048
|
+
if (typeof oidcProvider === 'string') {
|
|
1049
|
+
var oidcProviderConfigUrl;
|
|
1050
|
+
if (oidcProvider.charAt(oidcProvider.length - 1) == '/') {
|
|
1051
|
+
oidcProviderConfigUrl = oidcProvider + '.well-known/openid-configuration';
|
|
1052
|
+
}
|
|
1053
|
+
else {
|
|
1054
|
+
oidcProviderConfigUrl = oidcProvider + '/.well-known/openid-configuration';
|
|
1055
|
+
}
|
|
1056
|
+
var req = new XMLHttpRequest();
|
|
1057
|
+
req.open('GET', oidcProviderConfigUrl, true);
|
|
1058
|
+
req.setRequestHeader('Accept', 'application/json');
|
|
1059
|
+
req.onreadystatechange = function () {
|
|
1060
|
+
if (req.readyState == 4) {
|
|
1061
|
+
if (req.status == 200 || fileLoaded(req)) {
|
|
1062
|
+
var oidcProviderConfig = JSON.parse(req.responseText);
|
|
1063
|
+
setupOidcEndoints(oidcProviderConfig);
|
|
1064
|
+
promise.setSuccess();
|
|
1065
|
+
}
|
|
1066
|
+
else {
|
|
1067
|
+
promise.setError();
|
|
1068
|
+
}
|
|
1069
|
+
}
|
|
1070
|
+
};
|
|
1071
|
+
req.send();
|
|
1072
|
+
}
|
|
1073
|
+
else {
|
|
1074
|
+
setupOidcEndoints(oidcProvider);
|
|
1075
|
+
promise.setSuccess();
|
|
1076
|
+
}
|
|
1077
|
+
}
|
|
1078
|
+
}
|
|
1079
|
+
return promise.promise;
|
|
1080
|
+
}
|
|
1081
|
+
function fileLoaded(xhr) {
|
|
1082
|
+
return xhr.status == 0 && xhr.responseText && xhr.responseURL.startsWith('file:');
|
|
1083
|
+
}
|
|
1084
|
+
function setToken(token, refreshToken, idToken, timeLocal, doken = null) {
|
|
1085
|
+
if (kc.tokenTimeoutHandle) {
|
|
1086
|
+
clearTimeout(kc.tokenTimeoutHandle);
|
|
1087
|
+
kc.tokenTimeoutHandle = null;
|
|
1088
|
+
}
|
|
1089
|
+
if (refreshToken) {
|
|
1090
|
+
kc.refreshToken = refreshToken;
|
|
1091
|
+
kc.refreshTokenParsed = decodeToken(refreshToken);
|
|
1092
|
+
}
|
|
1093
|
+
else {
|
|
1094
|
+
delete kc.refreshToken;
|
|
1095
|
+
delete kc.refreshTokenParsed;
|
|
1096
|
+
}
|
|
1097
|
+
if (idToken) {
|
|
1098
|
+
kc.idToken = idToken;
|
|
1099
|
+
kc.idTokenParsed = decodeToken(idToken);
|
|
1100
|
+
}
|
|
1101
|
+
else {
|
|
1102
|
+
delete kc.idToken;
|
|
1103
|
+
delete kc.idTokenParsed;
|
|
1104
|
+
}
|
|
1105
|
+
if (token) {
|
|
1106
|
+
kc.token = token;
|
|
1107
|
+
kc.tokenParsed = decodeToken(token);
|
|
1108
|
+
kc.sessionId = kc.tokenParsed.sid;
|
|
1109
|
+
kc.authenticated = true;
|
|
1110
|
+
kc.subject = kc.tokenParsed.sub;
|
|
1111
|
+
kc.realmAccess = kc.tokenParsed.realm_access;
|
|
1112
|
+
kc.resourceAccess = kc.tokenParsed.resource_access;
|
|
1113
|
+
if (timeLocal) {
|
|
1114
|
+
kc.timeSkew = Math.floor(timeLocal / 1000) - kc.tokenParsed.iat;
|
|
1115
|
+
}
|
|
1116
|
+
if (kc.timeSkew != null) {
|
|
1117
|
+
logInfo('[TIDECLOAK] Estimated time difference between browser and server is ' + kc.timeSkew + ' seconds');
|
|
1118
|
+
if (kc.onTokenExpired) {
|
|
1119
|
+
var expiresIn = (kc.tokenParsed['exp'] - (new Date().getTime() / 1000) + kc.timeSkew) * 1000;
|
|
1120
|
+
logInfo('[TIDECLOAK] Token expires in ' + Math.round(expiresIn / 1000) + ' s');
|
|
1121
|
+
if (expiresIn <= 0) {
|
|
1122
|
+
kc.onTokenExpired();
|
|
1123
|
+
}
|
|
1124
|
+
else {
|
|
1125
|
+
kc.tokenTimeoutHandle = setTimeout(kc.onTokenExpired, expiresIn);
|
|
1126
|
+
}
|
|
1127
|
+
}
|
|
1128
|
+
}
|
|
1129
|
+
}
|
|
1130
|
+
else {
|
|
1131
|
+
delete kc.token;
|
|
1132
|
+
delete kc.tokenParsed;
|
|
1133
|
+
delete kc.subject;
|
|
1134
|
+
delete kc.realmAccess;
|
|
1135
|
+
delete kc.resourceAccess;
|
|
1136
|
+
kc.authenticated = false;
|
|
1137
|
+
}
|
|
1138
|
+
if (doken) {
|
|
1139
|
+
kc.doken = doken;
|
|
1140
|
+
kc.dokenParsed = decodeToken(doken);
|
|
1141
|
+
// update heimdall's doken too
|
|
1142
|
+
if (kc.requestEnclave)
|
|
1143
|
+
kc.requestEnclave.updateDoken(kc.doken);
|
|
1144
|
+
}
|
|
1145
|
+
else {
|
|
1146
|
+
delete kc.doken;
|
|
1147
|
+
}
|
|
1148
|
+
}
|
|
1149
|
+
function createUUID() {
|
|
1150
|
+
if (typeof crypto === "undefined" || typeof crypto.randomUUID === "undefined") {
|
|
1151
|
+
throw new Error("Web Crypto API is not available.");
|
|
1152
|
+
}
|
|
1153
|
+
return crypto.randomUUID();
|
|
1154
|
+
}
|
|
1155
|
+
function parseCallback(url) {
|
|
1156
|
+
var oauth = parseCallbackUrl(url);
|
|
1157
|
+
if (!oauth) {
|
|
1158
|
+
return;
|
|
1159
|
+
}
|
|
1160
|
+
var oauthState = callbackStorage.get(oauth.state);
|
|
1161
|
+
if (oauthState) {
|
|
1162
|
+
oauth.valid = true;
|
|
1163
|
+
oauth.redirectUri = oauthState.redirectUri;
|
|
1164
|
+
oauth.storedNonce = oauthState.nonce;
|
|
1165
|
+
oauth.prompt = oauthState.prompt;
|
|
1166
|
+
oauth.pkceCodeVerifier = oauthState.pkceCodeVerifier;
|
|
1167
|
+
oauth.loginOptions = oauthState.loginOptions;
|
|
1168
|
+
}
|
|
1169
|
+
return oauth;
|
|
1170
|
+
}
|
|
1171
|
+
function parseCallbackUrl(url) {
|
|
1172
|
+
var supportedParams;
|
|
1173
|
+
switch (kc.flow) {
|
|
1174
|
+
case 'standard':
|
|
1175
|
+
supportedParams = ['code', 'state', 'session_state', 'kc_action_status', 'kc_action', 'iss'];
|
|
1176
|
+
break;
|
|
1177
|
+
case 'implicit':
|
|
1178
|
+
supportedParams = ['access_token', 'token_type', 'id_token', 'state', 'session_state', 'expires_in', 'kc_action_status', 'kc_action', 'iss'];
|
|
1179
|
+
break;
|
|
1180
|
+
case 'hybrid':
|
|
1181
|
+
supportedParams = ['access_token', 'token_type', 'id_token', 'code', 'state', 'session_state', 'expires_in', 'kc_action_status', 'kc_action', 'iss'];
|
|
1182
|
+
break;
|
|
1183
|
+
}
|
|
1184
|
+
supportedParams.push('error');
|
|
1185
|
+
supportedParams.push('error_description');
|
|
1186
|
+
supportedParams.push('error_uri');
|
|
1187
|
+
var queryIndex = url.indexOf('?');
|
|
1188
|
+
var fragmentIndex = url.indexOf('#');
|
|
1189
|
+
var newUrl;
|
|
1190
|
+
var parsed;
|
|
1191
|
+
if (kc.responseMode === 'query' && queryIndex !== -1) {
|
|
1192
|
+
newUrl = url.substring(0, queryIndex);
|
|
1193
|
+
parsed = parseCallbackParams(url.substring(queryIndex + 1, fragmentIndex !== -1 ? fragmentIndex : url.length), supportedParams);
|
|
1194
|
+
if (parsed.paramsString !== '') {
|
|
1195
|
+
newUrl += '?' + parsed.paramsString;
|
|
1196
|
+
}
|
|
1197
|
+
if (fragmentIndex !== -1) {
|
|
1198
|
+
newUrl += url.substring(fragmentIndex);
|
|
1199
|
+
}
|
|
1200
|
+
}
|
|
1201
|
+
else if (kc.responseMode === 'fragment' && fragmentIndex !== -1) {
|
|
1202
|
+
newUrl = url.substring(0, fragmentIndex);
|
|
1203
|
+
parsed = parseCallbackParams(url.substring(fragmentIndex + 1), supportedParams);
|
|
1204
|
+
if (parsed.paramsString !== '') {
|
|
1205
|
+
newUrl += '#' + parsed.paramsString;
|
|
1206
|
+
}
|
|
1207
|
+
}
|
|
1208
|
+
if (parsed && parsed.oauthParams) {
|
|
1209
|
+
if (kc.flow === 'standard' || kc.flow === 'hybrid') {
|
|
1210
|
+
if ((parsed.oauthParams.code || parsed.oauthParams.error) && parsed.oauthParams.state) {
|
|
1211
|
+
parsed.oauthParams.newUrl = newUrl;
|
|
1212
|
+
return parsed.oauthParams;
|
|
1213
|
+
}
|
|
1214
|
+
}
|
|
1215
|
+
else if (kc.flow === 'implicit') {
|
|
1216
|
+
if ((parsed.oauthParams.access_token || parsed.oauthParams.error) && parsed.oauthParams.state) {
|
|
1217
|
+
parsed.oauthParams.newUrl = newUrl;
|
|
1218
|
+
return parsed.oauthParams;
|
|
1219
|
+
}
|
|
1220
|
+
}
|
|
1221
|
+
}
|
|
1222
|
+
}
|
|
1223
|
+
function parseCallbackParams(paramsString, supportedParams) {
|
|
1224
|
+
var p = paramsString.split('&');
|
|
1225
|
+
var result = {
|
|
1226
|
+
paramsString: '',
|
|
1227
|
+
oauthParams: {}
|
|
1228
|
+
};
|
|
1229
|
+
for (var i = 0; i < p.length; i++) {
|
|
1230
|
+
var split = p[i].indexOf("=");
|
|
1231
|
+
var key = p[i].slice(0, split);
|
|
1232
|
+
if (supportedParams.indexOf(key) !== -1) {
|
|
1233
|
+
result.oauthParams[key] = p[i].slice(split + 1);
|
|
1234
|
+
}
|
|
1235
|
+
else {
|
|
1236
|
+
if (result.paramsString !== '') {
|
|
1237
|
+
result.paramsString += '&';
|
|
1238
|
+
}
|
|
1239
|
+
result.paramsString += p[i];
|
|
1240
|
+
}
|
|
1241
|
+
}
|
|
1242
|
+
return result;
|
|
1243
|
+
}
|
|
1244
|
+
function createPromise() {
|
|
1245
|
+
// Need to create a native Promise which also preserves the
|
|
1246
|
+
// interface of the custom promise type previously used by the API
|
|
1247
|
+
var p = {
|
|
1248
|
+
setSuccess: function (result) {
|
|
1249
|
+
p.resolve(result);
|
|
1250
|
+
},
|
|
1251
|
+
setError: function (result) {
|
|
1252
|
+
p.reject(result);
|
|
1253
|
+
}
|
|
1254
|
+
};
|
|
1255
|
+
p.promise = new Promise(function (resolve, reject) {
|
|
1256
|
+
p.resolve = resolve;
|
|
1257
|
+
p.reject = reject;
|
|
1258
|
+
});
|
|
1259
|
+
return p;
|
|
1260
|
+
}
|
|
1261
|
+
// Function to extend existing native Promise with timeout
|
|
1262
|
+
function applyTimeoutToPromise(promise, timeout, errorMessage) {
|
|
1263
|
+
var timeoutHandle = null;
|
|
1264
|
+
var timeoutPromise = new Promise(function (resolve, reject) {
|
|
1265
|
+
timeoutHandle = setTimeout(function () {
|
|
1266
|
+
reject({ "error": errorMessage || "Promise is not settled within timeout of " + timeout + "ms" });
|
|
1267
|
+
}, timeout);
|
|
1268
|
+
});
|
|
1269
|
+
return Promise.race([promise, timeoutPromise]).finally(function () {
|
|
1270
|
+
clearTimeout(timeoutHandle);
|
|
1271
|
+
});
|
|
1272
|
+
}
|
|
1273
|
+
function setupCheckLoginIframe() {
|
|
1274
|
+
var promise = createPromise();
|
|
1275
|
+
if (!loginIframe.enable) {
|
|
1276
|
+
promise.setSuccess();
|
|
1277
|
+
return promise.promise;
|
|
1278
|
+
}
|
|
1279
|
+
if (loginIframe.iframe) {
|
|
1280
|
+
promise.setSuccess();
|
|
1281
|
+
return promise.promise;
|
|
1282
|
+
}
|
|
1283
|
+
var iframe = document.createElement('iframe');
|
|
1284
|
+
loginIframe.iframe = iframe;
|
|
1285
|
+
iframe.onload = function () {
|
|
1286
|
+
var authUrl = kc.endpoints.authorize();
|
|
1287
|
+
if (authUrl.charAt(0) === '/') {
|
|
1288
|
+
loginIframe.iframeOrigin = getOrigin();
|
|
1289
|
+
}
|
|
1290
|
+
else {
|
|
1291
|
+
loginIframe.iframeOrigin = authUrl.substring(0, authUrl.indexOf('/', 8));
|
|
1292
|
+
}
|
|
1293
|
+
promise.setSuccess();
|
|
1294
|
+
};
|
|
1295
|
+
var src = kc.endpoints.checkSessionIframe();
|
|
1296
|
+
iframe.setAttribute('src', src);
|
|
1297
|
+
iframe.setAttribute('sandbox', 'allow-storage-access-by-user-activation allow-scripts allow-same-origin');
|
|
1298
|
+
iframe.setAttribute('title', 'keycloak-session-iframe');
|
|
1299
|
+
iframe.style.display = 'none';
|
|
1300
|
+
document.body.appendChild(iframe);
|
|
1301
|
+
var messageCallback = function (event) {
|
|
1302
|
+
if ((event.origin !== loginIframe.iframeOrigin) || (loginIframe.iframe.contentWindow !== event.source)) {
|
|
1303
|
+
return;
|
|
1304
|
+
}
|
|
1305
|
+
if (!(event.data == 'unchanged' || event.data == 'changed' || event.data == 'error')) {
|
|
1306
|
+
return;
|
|
1307
|
+
}
|
|
1308
|
+
if (event.data != 'unchanged') {
|
|
1309
|
+
kc.clearToken();
|
|
1310
|
+
}
|
|
1311
|
+
var callbacks = loginIframe.callbackList.splice(0, loginIframe.callbackList.length);
|
|
1312
|
+
for (var i = callbacks.length - 1; i >= 0; --i) {
|
|
1313
|
+
var promise = callbacks[i];
|
|
1314
|
+
if (event.data == 'error') {
|
|
1315
|
+
promise.setError();
|
|
1316
|
+
}
|
|
1317
|
+
else {
|
|
1318
|
+
promise.setSuccess(event.data == 'unchanged');
|
|
1319
|
+
}
|
|
1320
|
+
}
|
|
1321
|
+
};
|
|
1322
|
+
window.addEventListener('message', messageCallback, false);
|
|
1323
|
+
return promise.promise;
|
|
1324
|
+
}
|
|
1325
|
+
function scheduleCheckIframe() {
|
|
1326
|
+
if (loginIframe.enable) {
|
|
1327
|
+
if (kc.token) {
|
|
1328
|
+
setTimeout(function () {
|
|
1329
|
+
checkLoginIframe().then(function (unchanged) {
|
|
1330
|
+
if (unchanged) {
|
|
1331
|
+
scheduleCheckIframe();
|
|
1332
|
+
}
|
|
1333
|
+
});
|
|
1334
|
+
}, loginIframe.interval * 1000);
|
|
1335
|
+
}
|
|
1336
|
+
}
|
|
1337
|
+
}
|
|
1338
|
+
function checkLoginIframe() {
|
|
1339
|
+
var promise = createPromise();
|
|
1340
|
+
if (loginIframe.iframe && loginIframe.iframeOrigin) {
|
|
1341
|
+
var msg = kc.clientId + ' ' + (kc.sessionId ? kc.sessionId : '');
|
|
1342
|
+
loginIframe.callbackList.push(promise);
|
|
1343
|
+
var origin = loginIframe.iframeOrigin;
|
|
1344
|
+
if (loginIframe.callbackList.length == 1) {
|
|
1345
|
+
loginIframe.iframe.contentWindow.postMessage(msg, origin);
|
|
1346
|
+
}
|
|
1347
|
+
}
|
|
1348
|
+
else {
|
|
1349
|
+
promise.setSuccess();
|
|
1350
|
+
}
|
|
1351
|
+
return promise.promise;
|
|
1352
|
+
}
|
|
1353
|
+
function check3pCookiesSupported() {
|
|
1354
|
+
var promise = createPromise();
|
|
1355
|
+
if ((loginIframe.enable || kc.silentCheckSsoRedirectUri) && typeof kc.endpoints.thirdPartyCookiesIframe === 'function') {
|
|
1356
|
+
var iframe = document.createElement('iframe');
|
|
1357
|
+
iframe.setAttribute('src', kc.endpoints.thirdPartyCookiesIframe());
|
|
1358
|
+
iframe.setAttribute('sandbox', 'allow-storage-access-by-user-activation allow-scripts allow-same-origin');
|
|
1359
|
+
iframe.setAttribute('title', 'keycloak-3p-check-iframe');
|
|
1360
|
+
iframe.style.display = 'none';
|
|
1361
|
+
document.body.appendChild(iframe);
|
|
1362
|
+
var messageCallback = function (event) {
|
|
1363
|
+
if (iframe.contentWindow !== event.source) {
|
|
1364
|
+
return;
|
|
1365
|
+
}
|
|
1366
|
+
if (event.data !== "supported" && event.data !== "unsupported") {
|
|
1367
|
+
return;
|
|
1368
|
+
}
|
|
1369
|
+
else if (event.data === "unsupported") {
|
|
1370
|
+
logWarn("[TIDECLOAK] Your browser is blocking access to 3rd-party cookies, this means:\n\n" +
|
|
1371
|
+
" - It is not possible to retrieve tokens without redirecting to the TideCloak server (a.k.a. no support for silent authentication).\n" +
|
|
1372
|
+
" - It is not possible to automatically detect changes to the session status (such as the user logging out in another tab).\n\n" +
|
|
1373
|
+
"For more information see: https://www.keycloak.org/securing-apps/javascript-adapter#_modern_browsers");
|
|
1374
|
+
loginIframe.enable = false;
|
|
1375
|
+
if (kc.silentCheckSsoFallback) {
|
|
1376
|
+
kc.silentCheckSsoRedirectUri = false;
|
|
1377
|
+
}
|
|
1378
|
+
}
|
|
1379
|
+
document.body.removeChild(iframe);
|
|
1380
|
+
window.removeEventListener("message", messageCallback);
|
|
1381
|
+
promise.setSuccess();
|
|
1382
|
+
};
|
|
1383
|
+
window.addEventListener('message', messageCallback, false);
|
|
1384
|
+
}
|
|
1385
|
+
else {
|
|
1386
|
+
promise.setSuccess();
|
|
1387
|
+
}
|
|
1388
|
+
return applyTimeoutToPromise(promise.promise, kc.messageReceiveTimeout, "Timeout when waiting for 3rd party check iframe message.");
|
|
1389
|
+
}
|
|
1390
|
+
function loadAdapter(type) {
|
|
1391
|
+
if (!type || type == 'default') {
|
|
1392
|
+
return {
|
|
1393
|
+
login: async function (options) {
|
|
1394
|
+
window.location.assign(await kc.createLoginUrl(options));
|
|
1395
|
+
return createPromise().promise;
|
|
1396
|
+
},
|
|
1397
|
+
logout: async function (options) {
|
|
1398
|
+
var _a;
|
|
1399
|
+
const logoutMethod = (_a = options === null || options === void 0 ? void 0 : options.logoutMethod) !== null && _a !== void 0 ? _a : kc.logoutMethod;
|
|
1400
|
+
if (logoutMethod === "GET") {
|
|
1401
|
+
window.location.replace(kc.createLogoutUrl(options));
|
|
1402
|
+
return;
|
|
1403
|
+
}
|
|
1404
|
+
// Create form to send POST request.
|
|
1405
|
+
const form = document.createElement("form");
|
|
1406
|
+
form.setAttribute("method", "POST");
|
|
1407
|
+
form.setAttribute("action", kc.createLogoutUrl(options));
|
|
1408
|
+
form.style.display = "none";
|
|
1409
|
+
// Add data to form as hidden input fields.
|
|
1410
|
+
const data = {
|
|
1411
|
+
id_token_hint: kc.idToken,
|
|
1412
|
+
client_id: kc.clientId,
|
|
1413
|
+
post_logout_redirect_uri: adapter.redirectUri(options, false)
|
|
1414
|
+
};
|
|
1415
|
+
for (const [name, value] of Object.entries(data)) {
|
|
1416
|
+
const input = document.createElement("input");
|
|
1417
|
+
input.setAttribute("type", "hidden");
|
|
1418
|
+
input.setAttribute("name", name);
|
|
1419
|
+
input.setAttribute("value", value);
|
|
1420
|
+
form.appendChild(input);
|
|
1421
|
+
}
|
|
1422
|
+
// Append form to page and submit it to perform logout and redirect.
|
|
1423
|
+
document.body.appendChild(form);
|
|
1424
|
+
form.submit();
|
|
1425
|
+
},
|
|
1426
|
+
register: async function (options) {
|
|
1427
|
+
window.location.assign(await kc.createRegisterUrl(options));
|
|
1428
|
+
return createPromise().promise;
|
|
1429
|
+
},
|
|
1430
|
+
accountManagement: function () {
|
|
1431
|
+
var accountUrl = kc.createAccountUrl();
|
|
1432
|
+
if (typeof accountUrl !== 'undefined') {
|
|
1433
|
+
window.location.href = accountUrl;
|
|
1434
|
+
}
|
|
1435
|
+
else {
|
|
1436
|
+
throw "Not supported by the OIDC server";
|
|
1437
|
+
}
|
|
1438
|
+
return createPromise().promise;
|
|
1439
|
+
},
|
|
1440
|
+
redirectUri: function (options, encodeHash) {
|
|
1441
|
+
if (arguments.length == 1) {
|
|
1442
|
+
encodeHash = true;
|
|
1443
|
+
}
|
|
1444
|
+
if (options && options.redirectUri) {
|
|
1445
|
+
return options.redirectUri;
|
|
1446
|
+
}
|
|
1447
|
+
else if (kc.redirectUri) {
|
|
1448
|
+
return kc.redirectUri;
|
|
1449
|
+
}
|
|
1450
|
+
else {
|
|
1451
|
+
return location.href;
|
|
1452
|
+
}
|
|
1453
|
+
}
|
|
1454
|
+
};
|
|
1455
|
+
}
|
|
1456
|
+
if (type == 'cordova') {
|
|
1457
|
+
loginIframe.enable = false;
|
|
1458
|
+
var cordovaOpenWindowWrapper = function (loginUrl, target, options) {
|
|
1459
|
+
if (window.cordova && window.cordova.InAppBrowser) {
|
|
1460
|
+
// Use inappbrowser for IOS and Android if available
|
|
1461
|
+
return window.cordova.InAppBrowser.open(loginUrl, target, options);
|
|
1462
|
+
}
|
|
1463
|
+
else {
|
|
1464
|
+
return window.open(loginUrl, target, options);
|
|
1465
|
+
}
|
|
1466
|
+
};
|
|
1467
|
+
var shallowCloneCordovaOptions = function (userOptions) {
|
|
1468
|
+
if (userOptions && userOptions.cordovaOptions) {
|
|
1469
|
+
return Object.keys(userOptions.cordovaOptions).reduce(function (options, optionName) {
|
|
1470
|
+
options[optionName] = userOptions.cordovaOptions[optionName];
|
|
1471
|
+
return options;
|
|
1472
|
+
}, {});
|
|
1473
|
+
}
|
|
1474
|
+
else {
|
|
1475
|
+
return {};
|
|
1476
|
+
}
|
|
1477
|
+
};
|
|
1478
|
+
var formatCordovaOptions = function (cordovaOptions) {
|
|
1479
|
+
return Object.keys(cordovaOptions).reduce(function (options, optionName) {
|
|
1480
|
+
options.push(optionName + "=" + cordovaOptions[optionName]);
|
|
1481
|
+
return options;
|
|
1482
|
+
}, []).join(",");
|
|
1483
|
+
};
|
|
1484
|
+
var createCordovaOptions = function (userOptions) {
|
|
1485
|
+
var cordovaOptions = shallowCloneCordovaOptions(userOptions);
|
|
1486
|
+
cordovaOptions.location = 'no';
|
|
1487
|
+
if (userOptions && userOptions.prompt == 'none') {
|
|
1488
|
+
cordovaOptions.hidden = 'yes';
|
|
1489
|
+
}
|
|
1490
|
+
return formatCordovaOptions(cordovaOptions);
|
|
1491
|
+
};
|
|
1492
|
+
var getCordovaRedirectUri = function () {
|
|
1493
|
+
return kc.redirectUri || 'http://localhost';
|
|
1494
|
+
};
|
|
1495
|
+
return {
|
|
1496
|
+
login: async function (options) {
|
|
1497
|
+
var promise = createPromise();
|
|
1498
|
+
var cordovaOptions = createCordovaOptions(options);
|
|
1499
|
+
var loginUrl = await kc.createLoginUrl(options);
|
|
1500
|
+
var ref = cordovaOpenWindowWrapper(loginUrl, '_blank', cordovaOptions);
|
|
1501
|
+
var completed = false;
|
|
1502
|
+
var closed = false;
|
|
1503
|
+
var closeBrowser = function () {
|
|
1504
|
+
closed = true;
|
|
1505
|
+
ref.close();
|
|
1506
|
+
};
|
|
1507
|
+
ref.addEventListener('loadstart', function (event) {
|
|
1508
|
+
if (event.url.indexOf(getCordovaRedirectUri()) == 0) {
|
|
1509
|
+
var callback = parseCallback(event.url);
|
|
1510
|
+
processCallback(callback, promise);
|
|
1511
|
+
closeBrowser();
|
|
1512
|
+
completed = true;
|
|
1513
|
+
}
|
|
1514
|
+
});
|
|
1515
|
+
ref.addEventListener('loaderror', function (event) {
|
|
1516
|
+
if (!completed) {
|
|
1517
|
+
if (event.url.indexOf(getCordovaRedirectUri()) == 0) {
|
|
1518
|
+
var callback = parseCallback(event.url);
|
|
1519
|
+
processCallback(callback, promise);
|
|
1520
|
+
closeBrowser();
|
|
1521
|
+
completed = true;
|
|
1522
|
+
}
|
|
1523
|
+
else {
|
|
1524
|
+
promise.setError();
|
|
1525
|
+
closeBrowser();
|
|
1526
|
+
}
|
|
1527
|
+
}
|
|
1528
|
+
});
|
|
1529
|
+
ref.addEventListener('exit', function (event) {
|
|
1530
|
+
if (!closed) {
|
|
1531
|
+
promise.setError({
|
|
1532
|
+
reason: "closed_by_user"
|
|
1533
|
+
});
|
|
1534
|
+
}
|
|
1535
|
+
});
|
|
1536
|
+
return promise.promise;
|
|
1537
|
+
},
|
|
1538
|
+
logout: function (options) {
|
|
1539
|
+
var promise = createPromise();
|
|
1540
|
+
var logoutUrl = kc.createLogoutUrl(options);
|
|
1541
|
+
var ref = cordovaOpenWindowWrapper(logoutUrl, '_blank', 'location=no,hidden=yes,clearcache=yes');
|
|
1542
|
+
var error;
|
|
1543
|
+
ref.addEventListener('loadstart', function (event) {
|
|
1544
|
+
if (event.url.indexOf(getCordovaRedirectUri()) == 0) {
|
|
1545
|
+
ref.close();
|
|
1546
|
+
}
|
|
1547
|
+
});
|
|
1548
|
+
ref.addEventListener('loaderror', function (event) {
|
|
1549
|
+
if (event.url.indexOf(getCordovaRedirectUri()) == 0) {
|
|
1550
|
+
ref.close();
|
|
1551
|
+
}
|
|
1552
|
+
else {
|
|
1553
|
+
error = true;
|
|
1554
|
+
ref.close();
|
|
1555
|
+
}
|
|
1556
|
+
});
|
|
1557
|
+
ref.addEventListener('exit', function (event) {
|
|
1558
|
+
if (error) {
|
|
1559
|
+
promise.setError();
|
|
1560
|
+
}
|
|
1561
|
+
else {
|
|
1562
|
+
kc.clearToken();
|
|
1563
|
+
promise.setSuccess();
|
|
1564
|
+
}
|
|
1565
|
+
});
|
|
1566
|
+
return promise.promise;
|
|
1567
|
+
},
|
|
1568
|
+
register: async function (options) {
|
|
1569
|
+
var promise = createPromise();
|
|
1570
|
+
var registerUrl = await kc.createRegisterUrl();
|
|
1571
|
+
var cordovaOptions = createCordovaOptions(options);
|
|
1572
|
+
var ref = cordovaOpenWindowWrapper(registerUrl, '_blank', cordovaOptions);
|
|
1573
|
+
ref.addEventListener('loadstart', function (event) {
|
|
1574
|
+
if (event.url.indexOf(getCordovaRedirectUri()) == 0) {
|
|
1575
|
+
ref.close();
|
|
1576
|
+
var oauth = parseCallback(event.url);
|
|
1577
|
+
processCallback(oauth, promise);
|
|
1578
|
+
}
|
|
1579
|
+
});
|
|
1580
|
+
return promise.promise;
|
|
1581
|
+
},
|
|
1582
|
+
accountManagement: function () {
|
|
1583
|
+
var accountUrl = kc.createAccountUrl();
|
|
1584
|
+
if (typeof accountUrl !== 'undefined') {
|
|
1585
|
+
var ref = cordovaOpenWindowWrapper(accountUrl, '_blank', 'location=no');
|
|
1586
|
+
ref.addEventListener('loadstart', function (event) {
|
|
1587
|
+
if (event.url.indexOf(getCordovaRedirectUri()) == 0) {
|
|
1588
|
+
ref.close();
|
|
1589
|
+
}
|
|
1590
|
+
});
|
|
1591
|
+
}
|
|
1592
|
+
else {
|
|
1593
|
+
throw "Not supported by the OIDC server";
|
|
1594
|
+
}
|
|
1595
|
+
},
|
|
1596
|
+
redirectUri: function (options) {
|
|
1597
|
+
return getCordovaRedirectUri();
|
|
1598
|
+
}
|
|
1599
|
+
};
|
|
1600
|
+
}
|
|
1601
|
+
if (type == 'cordova-native') {
|
|
1602
|
+
loginIframe.enable = false;
|
|
1603
|
+
return {
|
|
1604
|
+
login: async function (options) {
|
|
1605
|
+
var promise = createPromise();
|
|
1606
|
+
var loginUrl = await kc.createLoginUrl(options);
|
|
1607
|
+
universalLinks.subscribe('keycloak', function (event) {
|
|
1608
|
+
universalLinks.unsubscribe('keycloak');
|
|
1609
|
+
window.cordova.plugins.browsertab.close();
|
|
1610
|
+
var oauth = parseCallback(event.url);
|
|
1611
|
+
processCallback(oauth, promise);
|
|
1612
|
+
});
|
|
1613
|
+
window.cordova.plugins.browsertab.openUrl(loginUrl);
|
|
1614
|
+
return promise.promise;
|
|
1615
|
+
},
|
|
1616
|
+
logout: function (options) {
|
|
1617
|
+
var promise = createPromise();
|
|
1618
|
+
var logoutUrl = kc.createLogoutUrl(options);
|
|
1619
|
+
universalLinks.subscribe('keycloak', function (event) {
|
|
1620
|
+
universalLinks.unsubscribe('keycloak');
|
|
1621
|
+
window.cordova.plugins.browsertab.close();
|
|
1622
|
+
kc.clearToken();
|
|
1623
|
+
promise.setSuccess();
|
|
1624
|
+
});
|
|
1625
|
+
window.cordova.plugins.browsertab.openUrl(logoutUrl);
|
|
1626
|
+
return promise.promise;
|
|
1627
|
+
},
|
|
1628
|
+
register: async function (options) {
|
|
1629
|
+
var promise = createPromise();
|
|
1630
|
+
var registerUrl = await kc.createRegisterUrl(options);
|
|
1631
|
+
universalLinks.subscribe('keycloak', function (event) {
|
|
1632
|
+
universalLinks.unsubscribe('keycloak');
|
|
1633
|
+
window.cordova.plugins.browsertab.close();
|
|
1634
|
+
var oauth = parseCallback(event.url);
|
|
1635
|
+
processCallback(oauth, promise);
|
|
1636
|
+
});
|
|
1637
|
+
window.cordova.plugins.browsertab.openUrl(registerUrl);
|
|
1638
|
+
return promise.promise;
|
|
1639
|
+
},
|
|
1640
|
+
accountManagement: function () {
|
|
1641
|
+
var accountUrl = kc.createAccountUrl();
|
|
1642
|
+
if (typeof accountUrl !== 'undefined') {
|
|
1643
|
+
window.cordova.plugins.browsertab.openUrl(accountUrl);
|
|
1644
|
+
}
|
|
1645
|
+
else {
|
|
1646
|
+
throw "Not supported by the OIDC server";
|
|
1647
|
+
}
|
|
1648
|
+
},
|
|
1649
|
+
redirectUri: function (options) {
|
|
1650
|
+
if (options && options.redirectUri) {
|
|
1651
|
+
return options.redirectUri;
|
|
1652
|
+
}
|
|
1653
|
+
else if (kc.redirectUri) {
|
|
1654
|
+
return kc.redirectUri;
|
|
1655
|
+
}
|
|
1656
|
+
else {
|
|
1657
|
+
return "http://localhost";
|
|
1658
|
+
}
|
|
1659
|
+
}
|
|
1660
|
+
};
|
|
1661
|
+
}
|
|
1662
|
+
throw 'invalid adapter type: ' + type;
|
|
1663
|
+
}
|
|
1664
|
+
const STORAGE_KEY_PREFIX = 'kc-callback-';
|
|
1665
|
+
var LocalStorage = function () {
|
|
1666
|
+
if (!(this instanceof LocalStorage)) {
|
|
1667
|
+
return new LocalStorage();
|
|
1668
|
+
}
|
|
1669
|
+
localStorage.setItem('kc-test', 'test');
|
|
1670
|
+
localStorage.removeItem('kc-test');
|
|
1671
|
+
var cs = this;
|
|
1672
|
+
/**
|
|
1673
|
+
* Clears all values from local storage that are no longer valid.
|
|
1674
|
+
*/
|
|
1675
|
+
function clearInvalidValues() {
|
|
1676
|
+
const currentTime = Date.now();
|
|
1677
|
+
for (const [key, value] of getStoredEntries()) {
|
|
1678
|
+
// Attempt to parse the expiry time from the value.
|
|
1679
|
+
const expiry = parseExpiry(value);
|
|
1680
|
+
// Discard the value if it is malformed or expired.
|
|
1681
|
+
if (expiry === null || expiry < currentTime) {
|
|
1682
|
+
localStorage.removeItem(key);
|
|
1683
|
+
}
|
|
1684
|
+
}
|
|
1685
|
+
}
|
|
1686
|
+
/**
|
|
1687
|
+
* Clears all known values from local storage.
|
|
1688
|
+
*/
|
|
1689
|
+
function clearAllValues() {
|
|
1690
|
+
for (const [key] of getStoredEntries()) {
|
|
1691
|
+
localStorage.removeItem(key);
|
|
1692
|
+
}
|
|
1693
|
+
}
|
|
1694
|
+
/**
|
|
1695
|
+
* Gets all entries stored in local storage that are known to be managed by this class.
|
|
1696
|
+
* @returns {Array<[string, unknown]>} An array of key-value pairs.
|
|
1697
|
+
*/
|
|
1698
|
+
function getStoredEntries() {
|
|
1699
|
+
return Object.entries(localStorage).filter(([key]) => key.startsWith(STORAGE_KEY_PREFIX));
|
|
1700
|
+
}
|
|
1701
|
+
/**
|
|
1702
|
+
* Parses the expiry time from a value stored in local storage.
|
|
1703
|
+
* @param {unknown} value
|
|
1704
|
+
* @returns {number | null} The expiry time in milliseconds, or `null` if the value is malformed.
|
|
1705
|
+
*/
|
|
1706
|
+
function parseExpiry(value) {
|
|
1707
|
+
let parsedValue;
|
|
1708
|
+
// Attempt to parse the value as JSON.
|
|
1709
|
+
try {
|
|
1710
|
+
parsedValue = JSON.parse(value);
|
|
1711
|
+
}
|
|
1712
|
+
catch (error) {
|
|
1713
|
+
return null;
|
|
1714
|
+
}
|
|
1715
|
+
// Attempt to extract the 'expires' property.
|
|
1716
|
+
if (isObject(parsedValue) && 'expires' in parsedValue && typeof parsedValue.expires === 'number') {
|
|
1717
|
+
return parsedValue.expires;
|
|
1718
|
+
}
|
|
1719
|
+
return null;
|
|
1720
|
+
}
|
|
1721
|
+
cs.get = function (state) {
|
|
1722
|
+
if (!state) {
|
|
1723
|
+
return;
|
|
1724
|
+
}
|
|
1725
|
+
var key = STORAGE_KEY_PREFIX + state;
|
|
1726
|
+
var value = localStorage.getItem(key);
|
|
1727
|
+
if (value) {
|
|
1728
|
+
localStorage.removeItem(key);
|
|
1729
|
+
value = JSON.parse(value);
|
|
1730
|
+
}
|
|
1731
|
+
clearInvalidValues();
|
|
1732
|
+
return value;
|
|
1733
|
+
};
|
|
1734
|
+
cs.add = function (state) {
|
|
1735
|
+
clearInvalidValues();
|
|
1736
|
+
const key = STORAGE_KEY_PREFIX + state.state;
|
|
1737
|
+
const value = JSON.stringify({
|
|
1738
|
+
...state,
|
|
1739
|
+
// Set the expiry time to 1 hour from now.
|
|
1740
|
+
expires: Date.now() + (60 * 60 * 1000)
|
|
1741
|
+
});
|
|
1742
|
+
try {
|
|
1743
|
+
localStorage.setItem(key, value);
|
|
1744
|
+
}
|
|
1745
|
+
catch (error) {
|
|
1746
|
+
// If the storage is full, clear all known values and try again.
|
|
1747
|
+
clearAllValues();
|
|
1748
|
+
localStorage.setItem(key, value);
|
|
1749
|
+
}
|
|
1750
|
+
};
|
|
1751
|
+
};
|
|
1752
|
+
var CookieStorage = function () {
|
|
1753
|
+
if (!(this instanceof CookieStorage)) {
|
|
1754
|
+
return new CookieStorage();
|
|
1755
|
+
}
|
|
1756
|
+
var cs = this;
|
|
1757
|
+
cs.get = function (state) {
|
|
1758
|
+
if (!state) {
|
|
1759
|
+
return;
|
|
1760
|
+
}
|
|
1761
|
+
var value = getCookie(STORAGE_KEY_PREFIX + state);
|
|
1762
|
+
setCookie(STORAGE_KEY_PREFIX + state, '', cookieExpiration(-100));
|
|
1763
|
+
if (value) {
|
|
1764
|
+
return JSON.parse(value);
|
|
1765
|
+
}
|
|
1766
|
+
};
|
|
1767
|
+
cs.add = function (state) {
|
|
1768
|
+
setCookie(STORAGE_KEY_PREFIX + state.state, JSON.stringify(state), cookieExpiration(60));
|
|
1769
|
+
};
|
|
1770
|
+
cs.removeItem = function (key) {
|
|
1771
|
+
setCookie(key, '', cookieExpiration(-100));
|
|
1772
|
+
};
|
|
1773
|
+
var cookieExpiration = function (minutes) {
|
|
1774
|
+
var exp = new Date();
|
|
1775
|
+
exp.setTime(exp.getTime() + (minutes * 60 * 1000));
|
|
1776
|
+
return exp;
|
|
1777
|
+
};
|
|
1778
|
+
var getCookie = function (key) {
|
|
1779
|
+
var name = key + '=';
|
|
1780
|
+
var ca = document.cookie.split(';');
|
|
1781
|
+
for (var i = 0; i < ca.length; i++) {
|
|
1782
|
+
var c = ca[i];
|
|
1783
|
+
while (c.charAt(0) == ' ') {
|
|
1784
|
+
c = c.substring(1);
|
|
1785
|
+
}
|
|
1786
|
+
if (c.indexOf(name) == 0) {
|
|
1787
|
+
return c.substring(name.length, c.length);
|
|
1788
|
+
}
|
|
1789
|
+
}
|
|
1790
|
+
return '';
|
|
1791
|
+
};
|
|
1792
|
+
var setCookie = function (key, value, expirationDate) {
|
|
1793
|
+
var cookie = key + '=' + value + '; '
|
|
1794
|
+
+ 'expires=' + expirationDate.toUTCString() + '; ';
|
|
1795
|
+
document.cookie = cookie;
|
|
1796
|
+
};
|
|
1797
|
+
};
|
|
1798
|
+
function createCallbackStorage() {
|
|
1799
|
+
try {
|
|
1800
|
+
return new LocalStorage();
|
|
1801
|
+
}
|
|
1802
|
+
catch (err) {
|
|
1803
|
+
}
|
|
1804
|
+
return new CookieStorage();
|
|
1805
|
+
}
|
|
1806
|
+
function createLogger(fn) {
|
|
1807
|
+
return function () {
|
|
1808
|
+
if (kc.enableLogging) {
|
|
1809
|
+
fn.apply(console, Array.prototype.slice.call(arguments));
|
|
1810
|
+
}
|
|
1811
|
+
};
|
|
1812
|
+
}
|
|
1813
|
+
}
|
|
1814
|
+
export default TideCloak;
|
|
1815
|
+
export { RequestEnclave, ApprovalEnclave } from "heimdall-tide";
|
|
1816
|
+
/**
|
|
1817
|
+
* @param {ArrayBuffer} bytes
|
|
1818
|
+
* @see https://developer.mozilla.org/en-US/docs/Glossary/Base64#the_unicode_problem
|
|
1819
|
+
*/
|
|
1820
|
+
function bytesToBase64(bytes) {
|
|
1821
|
+
const binString = String.fromCodePoint(...bytes);
|
|
1822
|
+
return btoa(binString);
|
|
1823
|
+
}
|
|
1824
|
+
/**
|
|
1825
|
+
* @param {string} base64
|
|
1826
|
+
* @returns {Uint8Array}
|
|
1827
|
+
* @see https://developer.mozilla.org/en-US/docs/Glossary/Base64#the_unicode_problem
|
|
1828
|
+
*/
|
|
1829
|
+
function base64ToBytes(base64) {
|
|
1830
|
+
// Decode to “binary” JS string where each char’s code point 0–255 is one byte
|
|
1831
|
+
const binString = atob(base64);
|
|
1832
|
+
const len = binString.length;
|
|
1833
|
+
const bytes = new Uint8Array(len);
|
|
1834
|
+
for (let i = 0; i < len; i++) {
|
|
1835
|
+
// codePointAt is safe here because each char was originally from 0–255
|
|
1836
|
+
bytes[i] = binString.codePointAt(i);
|
|
1837
|
+
}
|
|
1838
|
+
return bytes;
|
|
1839
|
+
}
|
|
1840
|
+
/**
|
|
1841
|
+
* @param {string} message
|
|
1842
|
+
* @see https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/digest#basic_example
|
|
1843
|
+
*/
|
|
1844
|
+
async function sha256Digest(message) {
|
|
1845
|
+
const encoder = new TextEncoder();
|
|
1846
|
+
const data = encoder.encode(message);
|
|
1847
|
+
if (typeof crypto === "undefined" || typeof crypto.subtle === "undefined") {
|
|
1848
|
+
throw new Error("Web Crypto API is not available.");
|
|
1849
|
+
}
|
|
1850
|
+
return await crypto.subtle.digest("SHA-256", data);
|
|
1851
|
+
}
|
|
1852
|
+
/**
|
|
1853
|
+
* @param {string} token
|
|
1854
|
+
*/
|
|
1855
|
+
function decodeToken(token) {
|
|
1856
|
+
const [header, payload] = token.split(".");
|
|
1857
|
+
if (typeof payload !== "string") {
|
|
1858
|
+
throw new Error("Unable to decode token, payload not found.");
|
|
1859
|
+
}
|
|
1860
|
+
let decoded;
|
|
1861
|
+
try {
|
|
1862
|
+
decoded = base64UrlDecode(payload);
|
|
1863
|
+
}
|
|
1864
|
+
catch (error) {
|
|
1865
|
+
throw new Error("Unable to decode token, payload is not a valid Base64URL value.", { cause: error });
|
|
1866
|
+
}
|
|
1867
|
+
try {
|
|
1868
|
+
return JSON.parse(decoded);
|
|
1869
|
+
}
|
|
1870
|
+
catch (error) {
|
|
1871
|
+
throw new Error("Unable to decode token, payload is not a valid JSON value.", { cause: error });
|
|
1872
|
+
}
|
|
1873
|
+
}
|
|
1874
|
+
/**
|
|
1875
|
+
* @param {string} input
|
|
1876
|
+
*/
|
|
1877
|
+
function base64UrlDecode(input) {
|
|
1878
|
+
let output = input
|
|
1879
|
+
.replaceAll("-", "+")
|
|
1880
|
+
.replaceAll("_", "/");
|
|
1881
|
+
switch (output.length % 4) {
|
|
1882
|
+
case 0:
|
|
1883
|
+
break;
|
|
1884
|
+
case 2:
|
|
1885
|
+
output += "==";
|
|
1886
|
+
break;
|
|
1887
|
+
case 3:
|
|
1888
|
+
output += "=";
|
|
1889
|
+
break;
|
|
1890
|
+
default:
|
|
1891
|
+
throw new Error("Input is not of the correct length.");
|
|
1892
|
+
}
|
|
1893
|
+
try {
|
|
1894
|
+
return b64DecodeUnicode(output);
|
|
1895
|
+
}
|
|
1896
|
+
catch (error) {
|
|
1897
|
+
return atob(output);
|
|
1898
|
+
}
|
|
1899
|
+
}
|
|
1900
|
+
/**
|
|
1901
|
+
* @param {string} input
|
|
1902
|
+
*/
|
|
1903
|
+
function b64DecodeUnicode(input) {
|
|
1904
|
+
return decodeURIComponent(atob(input).replace(/(.)/g, (m, p) => {
|
|
1905
|
+
let code = p.charCodeAt(0).toString(16).toUpperCase();
|
|
1906
|
+
if (code.length < 2) {
|
|
1907
|
+
code = "0" + code;
|
|
1908
|
+
}
|
|
1909
|
+
return "%" + code;
|
|
1910
|
+
}));
|
|
1911
|
+
}
|
|
1912
|
+
/**
|
|
1913
|
+
* Check if the input is an object that can be operated on.
|
|
1914
|
+
* @param {unknown} input
|
|
1915
|
+
*/
|
|
1916
|
+
function isObject(input) {
|
|
1917
|
+
return typeof input === 'object' && input !== null;
|
|
1918
|
+
}
|
|
1919
|
+
export function getHumanReadableObject(modelId, data, expiry) {
|
|
1920
|
+
return ModelRegistry.getHumanReadableModelBuilder(modelId, data, expiry).getHumanReadableObject();
|
|
1921
|
+
}
|
|
1922
|
+
export { bytesToBase64, base64ToBytes } from "../modules/tide-js/Cryptide/Serialization.js";
|
|
1923
|
+
//# sourceMappingURL=tidecloak.js.map
|