@vpdev2/metakyc 1.0.71 → 1.0.73
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/client/crypto.d.ts +3 -11
- package/dist/client/crypto.d.ts.map +1 -1
- package/dist/client/http-client.d.ts.map +1 -1
- package/dist/client/session.d.ts +6 -5
- package/dist/client/session.d.ts.map +1 -1
- package/dist/index.cjs +12 -12
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +697 -724
- package/dist/index.js.map +1 -1
- package/dist/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/client/crypto.d.ts
CHANGED
|
@@ -1,20 +1,12 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* SDK-side encryption utilities using the browser WebCrypto API.
|
|
3
3
|
*
|
|
4
|
-
* Key exchange: ECDH P-256
|
|
5
4
|
* Symmetric cipher: AES-256-CBC + HMAC-SHA256 (encrypt-then-MAC)
|
|
6
|
-
* Key derivation: SHA-256(raw ECDH shared secret)
|
|
7
5
|
*
|
|
8
|
-
* The
|
|
9
|
-
*
|
|
6
|
+
* The AES key is generated server-side during token creation and
|
|
7
|
+
* returned to the SDK. Both sides hold the same 32-byte key.
|
|
10
8
|
*/
|
|
11
|
-
export declare function
|
|
12
|
-
export declare function exportPublicKey(publicKey: CryptoKey): Promise<string>;
|
|
13
|
-
/**
|
|
14
|
-
* Derive a shared 256-bit key from our private key + the server's public key.
|
|
15
|
-
* Returns raw key bytes (ArrayBuffer) — imported on demand for AES-CBC or HMAC.
|
|
16
|
-
*/
|
|
17
|
-
export declare function deriveSharedKey(privateKey: CryptoKey, serverPublicKeyBase64: string): Promise<ArrayBuffer>;
|
|
9
|
+
export declare function fromBase64(b64: string): Uint8Array;
|
|
18
10
|
export interface EncryptedPayload {
|
|
19
11
|
iv: string;
|
|
20
12
|
data: string;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../../src/client/crypto.ts"],"names":[],"mappings":"AAAA
|
|
1
|
+
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../../src/client/crypto.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAcH,wBAAgB,UAAU,CAAC,GAAG,EAAE,MAAM,GAAG,UAAU,CAOlD;AAED,MAAM,WAAW,gBAAgB;IAC/B,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;CACd;AAED;;;GAGG;AACH,wBAAsB,OAAO,CAAC,MAAM,EAAE,WAAW,EAAE,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,CAAC,CAsB/F;AAED;;GAEG;AACH,wBAAsB,OAAO,CAAC,MAAM,EAAE,WAAW,EAAE,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,MAAM,CAAC,CAiB7F"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"http-client.d.ts","sourceRoot":"","sources":["../../src/client/http-client.ts"],"names":[],"mappings":"AAAA,OAAc,EAAE,aAAa,EAA6C,MAAM,OAAO,CAAC;AACxF,OAAO,EAAE,mBAAmB,EAAiB,MAAM,UAAU,CAAC;AAG9D,OAAO,EAAE,WAAW,EAAE,MAAM,UAAU,CAAC;AAWvC;;;GAGG;AACH,qBAAa,UAAU;IACrB,OAAO,CAAC,aAAa,CAAgB;IACrC,OAAO,CAAC,eAAe,CAAkB;IACzC,OAAO,CAAC,MAAM,CAAsB;IACpC,OAAO,CAAC,YAAY,CAAyC;gBAEjD,MAAM,EAAE,mBAAmB;
|
|
1
|
+
{"version":3,"file":"http-client.d.ts","sourceRoot":"","sources":["../../src/client/http-client.ts"],"names":[],"mappings":"AAAA,OAAc,EAAE,aAAa,EAA6C,MAAM,OAAO,CAAC;AACxF,OAAO,EAAE,mBAAmB,EAAiB,MAAM,UAAU,CAAC;AAG9D,OAAO,EAAE,WAAW,EAAE,MAAM,UAAU,CAAC;AAWvC;;;GAGG;AACH,qBAAa,UAAU;IACrB,OAAO,CAAC,aAAa,CAAgB;IACrC,OAAO,CAAC,eAAe,CAAkB;IACzC,OAAO,CAAC,MAAM,CAAsB;IACpC,OAAO,CAAC,YAAY,CAAyC;gBAEjD,MAAM,EAAE,mBAAmB;IAmGvC,aAAa,CAAC,UAAU,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,GAAG,MAAM;IAIzD,OAAO,CAAC,QAAQ;IAIV,GAAG,CAAC,CAAC,EAAE,UAAU,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,GAAG,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC;IAkCjF,IAAI,CAAC,CAAC,EAAE,UAAU,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,GAAG,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC;IAiBhF,GAAG,CAAC,CAAC,EAAE,UAAU,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,GAAG,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC;IAiB/E,MAAM,CAAC,CAAC,EAAE,UAAU,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,GAAG,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC;IAmB1F,OAAO,CAAC,cAAc;IAUtB,OAAO,CAAC,kBAAkB;IAQ1B,gBAAgB,IAAI,aAAa;CAGlC"}
|
package/dist/client/session.d.ts
CHANGED
|
@@ -40,8 +40,9 @@ export interface CreateSessionTokenParams {
|
|
|
40
40
|
applicant?: ApplicantPreFillParams;
|
|
41
41
|
/**
|
|
42
42
|
* Enable payload encryption for SDK requests/responses.
|
|
43
|
-
*
|
|
44
|
-
* subsequent API traffic with AES-256-
|
|
43
|
+
* The server generates a random AES-256 key during token creation
|
|
44
|
+
* and all subsequent API traffic is encrypted with AES-256-CBC.
|
|
45
|
+
* Defaults to true.
|
|
45
46
|
*/
|
|
46
47
|
enableEncryption?: boolean;
|
|
47
48
|
}
|
|
@@ -50,11 +51,11 @@ export interface SessionTokenResult {
|
|
|
50
51
|
expiresInSeconds: number;
|
|
51
52
|
/** The applicant ID created/found for this externalRefId + workflowKey combination. */
|
|
52
53
|
applicantId: number;
|
|
53
|
-
/**
|
|
54
|
-
|
|
54
|
+
/** Base64-encoded AES-256 key. Present when encryption was negotiated. */
|
|
55
|
+
encSessionKey?: string;
|
|
55
56
|
/** Encryption session identifier. Present when encryption was negotiated. */
|
|
56
57
|
encSessionId?: string;
|
|
57
|
-
/**
|
|
58
|
+
/** AES-256 encryption key (raw bytes). Decoded from encSessionKey — used by SDK interceptors. */
|
|
58
59
|
encryptionKey?: ArrayBuffer;
|
|
59
60
|
}
|
|
60
61
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"session.d.ts","sourceRoot":"","sources":["../../src/client/session.ts"],"names":[],"mappings":"AAGA,MAAM,WAAW,sBAAsB;IACrC,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,MAAM,WAAW,wBAAwB;IACvC,OAAO,EAAE,MAAM,CAAC;IAChB,MAAM,EAAE,MAAM,CAAC;IACf,SAAS,EAAE,MAAM,CAAC;IAClB,kEAAkE;IAClE,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,qEAAqE;IACrE,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB;;;OAGG;IACH,aAAa,EAAE,MAAM,CAAC;IACtB;;;OAGG;IACH,WAAW,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IACd;;;OAGG;IACH,SAAS,CAAC,EAAE,OAAO,CAAC;IACpB;;;OAGG;IACH,SAAS,CAAC,EAAE,sBAAsB,CAAC;IACnC
|
|
1
|
+
{"version":3,"file":"session.d.ts","sourceRoot":"","sources":["../../src/client/session.ts"],"names":[],"mappings":"AAGA,MAAM,WAAW,sBAAsB;IACrC,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,MAAM,WAAW,wBAAwB;IACvC,OAAO,EAAE,MAAM,CAAC;IAChB,MAAM,EAAE,MAAM,CAAC;IACf,SAAS,EAAE,MAAM,CAAC;IAClB,kEAAkE;IAClE,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,qEAAqE;IACrE,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB;;;OAGG;IACH,aAAa,EAAE,MAAM,CAAC;IACtB;;;OAGG;IACH,WAAW,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IACd;;;OAGG;IACH,SAAS,CAAC,EAAE,OAAO,CAAC;IACpB;;;OAGG;IACH,SAAS,CAAC,EAAE,sBAAsB,CAAC;IACnC;;;;;OAKG;IACH,gBAAgB,CAAC,EAAE,OAAO,CAAC;CAC5B;AAED,MAAM,WAAW,kBAAkB;IACjC,WAAW,EAAE,MAAM,CAAC;IACpB,gBAAgB,EAAE,MAAM,CAAC;IACzB,uFAAuF;IACvF,WAAW,EAAE,MAAM,CAAC;IACpB,0EAA0E;IAC1E,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,6EAA6E;IAC7E,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,iGAAiG;IACjG,aAAa,CAAC,EAAE,WAAW,CAAC;CAC7B;AAED;;;;;;;GAOG;AACH,qBAAa,cAAc;WACZ,WAAW,CAAC,MAAM,EAAE,wBAAwB,GAAG,OAAO,CAAC,kBAAkB,CAAC;CAiExF"}
|