@waku/rln 0.1.1-b429b05 → 0.1.1-bafbe01
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +26 -2
- package/bundle/assets/rln_wasm_bg-a503e304.wasm +0 -0
- package/bundle/index.js +24632 -2013
- package/dist/.tsbuildinfo +1 -1
- package/dist/byte_utils.d.ts +13 -0
- package/dist/byte_utils.js +22 -0
- package/dist/byte_utils.js.map +1 -1
- package/dist/codec.d.ts +5 -3
- package/dist/codec.js +8 -4
- package/dist/codec.js.map +1 -1
- package/dist/constants.d.ts +2 -2
- package/dist/constants.js +62 -9
- package/dist/constants.js.map +1 -1
- package/dist/create.d.ts +2 -0
- package/dist/create.js +8 -0
- package/dist/create.js.map +1 -0
- package/dist/index.d.ts +4 -3
- package/dist/index.js +4 -10
- package/dist/index.js.map +1 -1
- package/dist/keystore/cipher.d.ts +4 -0
- package/dist/keystore/cipher.js +28 -0
- package/dist/keystore/cipher.js.map +1 -0
- package/dist/keystore/credential_validation_generated.d.ts +8 -0
- package/dist/keystore/credential_validation_generated.js +121 -0
- package/dist/keystore/credential_validation_generated.js.map +1 -0
- package/dist/keystore/index.d.ts +2 -0
- package/dist/keystore/index.js +3 -0
- package/dist/keystore/index.js.map +1 -0
- package/dist/keystore/keystore.d.ts +50 -0
- package/dist/keystore/keystore.js +193 -0
- package/dist/keystore/keystore.js.map +1 -0
- package/dist/keystore/keystore_validation_generated.d.ts +8 -0
- package/dist/keystore/keystore_validation_generated.js +75 -0
- package/dist/keystore/keystore_validation_generated.js.map +1 -0
- package/dist/keystore/schema_validator.d.ts +2 -0
- package/dist/keystore/schema_validator.js +18 -0
- package/dist/keystore/schema_validator.js.map +1 -0
- package/dist/keystore/types.d.ts +9 -0
- package/dist/keystore/types.js +2 -0
- package/dist/keystore/types.js.map +1 -0
- package/dist/message.d.ts +1 -1
- package/dist/message.js +1 -1
- package/dist/metamask.d.ts +2 -0
- package/dist/metamask.js +10 -0
- package/dist/metamask.js.map +1 -0
- package/dist/rln.d.ts +16 -0
- package/dist/rln.js +19 -12
- package/dist/rln.js.map +1 -1
- package/dist/rln_contract.d.ts +23 -13
- package/dist/rln_contract.js +65 -28
- package/dist/rln_contract.js.map +1 -1
- package/package.json +23 -8
- package/src/byte_utils.ts +24 -0
- package/src/codec.ts +10 -5
- package/src/constants.ts +63 -9
- package/src/create.ts +9 -0
- package/src/index.ts +11 -11
- package/src/message.ts +1 -1
- package/src/metamask.ts +15 -0
- package/src/rln.ts +35 -13
- package/src/rln_contract.ts +117 -41
- package/bundle/assets/rln_wasm_bg-6f96f821.wasm +0 -0
package/dist/index.js
CHANGED
@@ -1,15 +1,9 @@
|
|
1
1
|
import { RLNDecoder, RLNEncoder } from "./codec.js";
|
2
|
-
import {
|
2
|
+
import { RLN_REGISTRY_ABI, RLN_STORAGE_ABI, SEPOLIA_CONTRACT, } from "./constants.js";
|
3
|
+
import { createRLN } from "./create.js";
|
4
|
+
import { Keystore } from "./keystore/index.js";
|
3
5
|
import { IdentityCredential, Proof, ProofMetadata, RLNInstance, } from "./rln.js";
|
4
6
|
import { RLNContract } from "./rln_contract.js";
|
5
7
|
import { MerkleRootTracker } from "./root_tracker.js";
|
6
|
-
|
7
|
-
export async function create() {
|
8
|
-
// A dependency graph that contains any wasm must all be imported
|
9
|
-
// asynchronously. This file does the single async import, so
|
10
|
-
// that no one else needs to worry about it again.
|
11
|
-
const rlnModule = await import("./rln.js");
|
12
|
-
return await rlnModule.create();
|
13
|
-
}
|
14
|
-
export { RLNInstance, IdentityCredential, Proof, ProofMetadata, RLNEncoder, RLNDecoder, MerkleRootTracker, RLNContract, RLN_ABI, SEPOLIA_CONTRACT, };
|
8
|
+
export { createRLN, Keystore, RLNInstance, IdentityCredential, Proof, ProofMetadata, RLNEncoder, RLNDecoder, MerkleRootTracker, RLNContract, RLN_STORAGE_ABI, RLN_REGISTRY_ABI, SEPOLIA_CONTRACT, };
|
15
9
|
//# sourceMappingURL=index.js.map
|
package/dist/index.js.map
CHANGED
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,UAAU,EAAE,MAAM,YAAY,CAAC;AACpD,OAAO,EAAE,OAAO,EAAE,
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,UAAU,EAAE,MAAM,YAAY,CAAC;AACpD,OAAO,EACL,gBAAgB,EAChB,eAAe,EACf,gBAAgB,GACjB,MAAM,gBAAgB,CAAC;AACxB,OAAO,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AACxC,OAAO,EAAE,QAAQ,EAAE,MAAM,qBAAqB,CAAC;AAC/C,OAAO,EACL,kBAAkB,EAClB,KAAK,EACL,aAAa,EACb,WAAW,GACZ,MAAM,UAAU,CAAC;AAClB,OAAO,EAAE,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAChD,OAAO,EAAE,iBAAiB,EAAE,MAAM,mBAAmB,CAAC;AAEtD,OAAO,EACL,SAAS,EACT,QAAQ,EACR,WAAW,EACX,kBAAkB,EAClB,KAAK,EACL,aAAa,EACb,UAAU,EACV,UAAU,EACV,iBAAiB,EACjB,WAAW,EACX,eAAe,EACf,gBAAgB,EAChB,gBAAgB,GACjB,CAAC"}
|
@@ -0,0 +1,4 @@
|
|
1
|
+
import type { IKeystore as IEipKeystore } from "@chainsafe/bls-keystore";
|
2
|
+
import type { Keccak256Hash, Password } from "./types.js";
|
3
|
+
export declare const decryptEipKeystore: (password: Password, eipKeystore: IEipKeystore) => Promise<Uint8Array>;
|
4
|
+
export declare const keccak256Checksum: (password: Password, eipKeystore: IEipKeystore) => Promise<Keccak256Hash>;
|
@@ -0,0 +1,28 @@
|
|
1
|
+
import { cipherDecrypt } from "@chainsafe/bls-keystore/lib/cipher.js";
|
2
|
+
import { kdf } from "@chainsafe/bls-keystore/lib/kdf.js";
|
3
|
+
import { normalizePassword } from "@chainsafe/bls-keystore/lib/password.js";
|
4
|
+
import { keccak256 } from "ethereum-cryptography/keccak";
|
5
|
+
import { bytesToHex, concatBytes, hexToBytes, } from "ethereum-cryptography/utils";
|
6
|
+
// eipKeystore supports only sha256 checksum so we just make an assumption it is keccak256
|
7
|
+
const validateChecksum = async (password, eipKeystore) => {
|
8
|
+
const computedChecksum = await keccak256Checksum(password, eipKeystore);
|
9
|
+
return computedChecksum === eipKeystore.crypto.checksum.message;
|
10
|
+
};
|
11
|
+
// decrypt from @chainsafe/bls-keystore supports only sha256
|
12
|
+
// but nwaku uses keccak256
|
13
|
+
// https://github.com/waku-org/nwaku/blob/25d6e52e3804d15f9b61bc4cc6dd448540c072a1/waku/waku_keystore/keyfile.nim#L367
|
14
|
+
export const decryptEipKeystore = async (password, eipKeystore) => {
|
15
|
+
const decryptionKey = await kdf(eipKeystore.crypto.kdf, normalizePassword(password));
|
16
|
+
const isChecksumValid = await validateChecksum(password, eipKeystore);
|
17
|
+
if (!isChecksumValid) {
|
18
|
+
throw Error("Password is invalid.");
|
19
|
+
}
|
20
|
+
return cipherDecrypt(eipKeystore.crypto.cipher, decryptionKey.slice(0, 16));
|
21
|
+
};
|
22
|
+
export const keccak256Checksum = async (password, eipKeystore) => {
|
23
|
+
const key = await kdf(eipKeystore.crypto.kdf, normalizePassword(password));
|
24
|
+
const payload = concatBytes(key.slice(16), hexToBytes(eipKeystore.crypto.cipher.message));
|
25
|
+
const ciphertext = keccak256(payload);
|
26
|
+
return bytesToHex(ciphertext);
|
27
|
+
};
|
28
|
+
//# sourceMappingURL=cipher.js.map
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"cipher.js","sourceRoot":"","sources":["../../src/keystore/cipher.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,aAAa,EAAE,MAAM,uCAAuC,CAAC;AACtE,OAAO,EAAE,GAAG,EAAE,MAAM,oCAAoC,CAAC;AACzD,OAAO,EAAE,iBAAiB,EAAE,MAAM,yCAAyC,CAAC;AAC5E,OAAO,EAAE,SAAS,EAAE,MAAM,8BAA8B,CAAC;AACzD,OAAO,EACL,UAAU,EACV,WAAW,EACX,UAAU,GACX,MAAM,6BAA6B,CAAC;AAIrC,0FAA0F;AAC1F,MAAM,gBAAgB,GAAG,KAAK,EAC5B,QAAkB,EAClB,WAAyB,EACP,EAAE;IACpB,MAAM,gBAAgB,GAAG,MAAM,iBAAiB,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;IACxE,OAAO,gBAAgB,KAAK,WAAW,CAAC,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC;AAClE,CAAC,CAAC;AAEF,4DAA4D;AAC5D,2BAA2B;AAC3B,sHAAsH;AACtH,MAAM,CAAC,MAAM,kBAAkB,GAAG,KAAK,EACrC,QAAkB,EAClB,WAAyB,EACJ,EAAE;IACvB,MAAM,aAAa,GAAG,MAAM,GAAG,CAC7B,WAAW,CAAC,MAAM,CAAC,GAAG,EACtB,iBAAiB,CAAC,QAAQ,CAAC,CAC5B,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;IAEtE,IAAI,CAAC,eAAe,EAAE;QACpB,MAAM,KAAK,CAAC,sBAAsB,CAAC,CAAC;KACrC;IAED,OAAO,aAAa,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,EAAE,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC;AAC9E,CAAC,CAAC;AAEF,MAAM,CAAC,MAAM,iBAAiB,GAAG,KAAK,EACpC,QAAkB,EAClB,WAAyB,EACD,EAAE;IAC1B,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,WAAW,CAAC,MAAM,CAAC,GAAG,EAAE,iBAAiB,CAAC,QAAQ,CAAC,CAAC,CAAC;IAC3E,MAAM,OAAO,GAAG,WAAW,CACzB,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,EACb,UAAU,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAC9C,CAAC;IACF,MAAM,UAAU,GAAG,SAAS,CAAC,OAAO,CAAC,CAAC;IACtC,OAAO,UAAU,CAAC,UAAU,CAAC,CAAC;AAChC,CAAC,CAAC"}
|
@@ -0,0 +1,8 @@
|
|
1
|
+
export declare const Credential: typeof validate11;
|
2
|
+
declare function validate11(data: any, { instancePath, parentData, parentDataProperty, rootData }?: {
|
3
|
+
instancePath?: string | undefined;
|
4
|
+
parentData: any;
|
5
|
+
parentDataProperty: any;
|
6
|
+
rootData?: any;
|
7
|
+
}): boolean;
|
8
|
+
export {};
|
@@ -0,0 +1,121 @@
|
|
1
|
+
/* eslint eslint-comments/no-unlimited-disable: "off" */
|
2
|
+
// This file was generated by /scripts/schema-validation-codegen.ts
|
3
|
+
// Do not modify this file by hand.
|
4
|
+
/* eslint-disable */
|
5
|
+
// @ts-ignore
|
6
|
+
"use strict";
|
7
|
+
export const Credential = validate11;
|
8
|
+
const schema12 = { "type": "object", "properties": { "crypto": { "type": "object", "properties": { "cipher": { "type": "string" }, "cipherparams": { "type": "object" }, "ciphertext": { "type": "string" }, "kdf": { "type": "string" }, "kdfparams": { "type": "object" }, "mac": { "type": "string" } }, "required": ["cipher", "cipherparams", "ciphertext", "kdf", "kdfparams", "mac"] } }, "required": ["crypto"] };
|
9
|
+
function validate11(data, { instancePath = "", parentData, parentDataProperty, rootData = data } = {}) { let vErrors = null; let errors = 0; if (errors === 0) {
|
10
|
+
if (data && typeof data == "object" && !Array.isArray(data)) {
|
11
|
+
let missing0;
|
12
|
+
if ((data.crypto === undefined) && (missing0 = "crypto")) {
|
13
|
+
validate11.errors = [{ instancePath, schemaPath: "#/required", keyword: "required", params: { missingProperty: missing0 }, message: "must have required property '" + missing0 + "'" }];
|
14
|
+
return false;
|
15
|
+
}
|
16
|
+
else {
|
17
|
+
if (data.crypto !== undefined) {
|
18
|
+
let data0 = data.crypto;
|
19
|
+
const _errs1 = errors;
|
20
|
+
if (errors === _errs1) {
|
21
|
+
if (data0 && typeof data0 == "object" && !Array.isArray(data0)) {
|
22
|
+
let missing1;
|
23
|
+
if (((((((data0.cipher === undefined) && (missing1 = "cipher")) || ((data0.cipherparams === undefined) && (missing1 = "cipherparams"))) || ((data0.ciphertext === undefined) && (missing1 = "ciphertext"))) || ((data0.kdf === undefined) && (missing1 = "kdf"))) || ((data0.kdfparams === undefined) && (missing1 = "kdfparams"))) || ((data0.mac === undefined) && (missing1 = "mac"))) {
|
24
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto", schemaPath: "#/properties/crypto/required", keyword: "required", params: { missingProperty: missing1 }, message: "must have required property '" + missing1 + "'" }];
|
25
|
+
return false;
|
26
|
+
}
|
27
|
+
else {
|
28
|
+
if (data0.cipher !== undefined) {
|
29
|
+
const _errs3 = errors;
|
30
|
+
if (typeof data0.cipher !== "string") {
|
31
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto/cipher", schemaPath: "#/properties/crypto/properties/cipher/type", keyword: "type", params: { type: "string" }, message: "must be string" }];
|
32
|
+
return false;
|
33
|
+
}
|
34
|
+
var valid1 = _errs3 === errors;
|
35
|
+
}
|
36
|
+
else {
|
37
|
+
var valid1 = true;
|
38
|
+
}
|
39
|
+
if (valid1) {
|
40
|
+
if (data0.cipherparams !== undefined) {
|
41
|
+
let data2 = data0.cipherparams;
|
42
|
+
const _errs5 = errors;
|
43
|
+
if (!(data2 && typeof data2 == "object" && !Array.isArray(data2))) {
|
44
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto/cipherparams", schemaPath: "#/properties/crypto/properties/cipherparams/type", keyword: "type", params: { type: "object" }, message: "must be object" }];
|
45
|
+
return false;
|
46
|
+
}
|
47
|
+
var valid1 = _errs5 === errors;
|
48
|
+
}
|
49
|
+
else {
|
50
|
+
var valid1 = true;
|
51
|
+
}
|
52
|
+
if (valid1) {
|
53
|
+
if (data0.ciphertext !== undefined) {
|
54
|
+
const _errs7 = errors;
|
55
|
+
if (typeof data0.ciphertext !== "string") {
|
56
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto/ciphertext", schemaPath: "#/properties/crypto/properties/ciphertext/type", keyword: "type", params: { type: "string" }, message: "must be string" }];
|
57
|
+
return false;
|
58
|
+
}
|
59
|
+
var valid1 = _errs7 === errors;
|
60
|
+
}
|
61
|
+
else {
|
62
|
+
var valid1 = true;
|
63
|
+
}
|
64
|
+
if (valid1) {
|
65
|
+
if (data0.kdf !== undefined) {
|
66
|
+
const _errs9 = errors;
|
67
|
+
if (typeof data0.kdf !== "string") {
|
68
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto/kdf", schemaPath: "#/properties/crypto/properties/kdf/type", keyword: "type", params: { type: "string" }, message: "must be string" }];
|
69
|
+
return false;
|
70
|
+
}
|
71
|
+
var valid1 = _errs9 === errors;
|
72
|
+
}
|
73
|
+
else {
|
74
|
+
var valid1 = true;
|
75
|
+
}
|
76
|
+
if (valid1) {
|
77
|
+
if (data0.kdfparams !== undefined) {
|
78
|
+
let data5 = data0.kdfparams;
|
79
|
+
const _errs11 = errors;
|
80
|
+
if (!(data5 && typeof data5 == "object" && !Array.isArray(data5))) {
|
81
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto/kdfparams", schemaPath: "#/properties/crypto/properties/kdfparams/type", keyword: "type", params: { type: "object" }, message: "must be object" }];
|
82
|
+
return false;
|
83
|
+
}
|
84
|
+
var valid1 = _errs11 === errors;
|
85
|
+
}
|
86
|
+
else {
|
87
|
+
var valid1 = true;
|
88
|
+
}
|
89
|
+
if (valid1) {
|
90
|
+
if (data0.mac !== undefined) {
|
91
|
+
const _errs13 = errors;
|
92
|
+
if (typeof data0.mac !== "string") {
|
93
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto/mac", schemaPath: "#/properties/crypto/properties/mac/type", keyword: "type", params: { type: "string" }, message: "must be string" }];
|
94
|
+
return false;
|
95
|
+
}
|
96
|
+
var valid1 = _errs13 === errors;
|
97
|
+
}
|
98
|
+
else {
|
99
|
+
var valid1 = true;
|
100
|
+
}
|
101
|
+
}
|
102
|
+
}
|
103
|
+
}
|
104
|
+
}
|
105
|
+
}
|
106
|
+
}
|
107
|
+
}
|
108
|
+
else {
|
109
|
+
validate11.errors = [{ instancePath: instancePath + "/crypto", schemaPath: "#/properties/crypto/type", keyword: "type", params: { type: "object" }, message: "must be object" }];
|
110
|
+
return false;
|
111
|
+
}
|
112
|
+
}
|
113
|
+
}
|
114
|
+
}
|
115
|
+
}
|
116
|
+
else {
|
117
|
+
validate11.errors = [{ instancePath, schemaPath: "#/type", keyword: "type", params: { type: "object" }, message: "must be object" }];
|
118
|
+
return false;
|
119
|
+
}
|
120
|
+
} validate11.errors = vErrors; return errors === 0; }
|
121
|
+
//# sourceMappingURL=credential_validation_generated.js.map
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"credential_validation_generated.js","sourceRoot":"","sources":["../../src/keystore/credential_validation_generated.ts"],"names":[],"mappings":"AACA,wDAAwD;AACxD,mEAAmE;AACnE,mCAAmC;AAEnC,oBAAoB;AACpB,aAAa;AACb,YAAY,CAAC;AAAA,MAAM,CAAC,MAAM,UAAU,GAAG,UAAU,CAAC;AAAA,MAAM,QAAQ,GAAG,EAAC,MAAM,EAAC,QAAQ,EAAC,YAAY,EAAC,EAAC,QAAQ,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,YAAY,EAAC,EAAC,QAAQ,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,cAAc,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,YAAY,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,KAAK,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,WAAW,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,KAAK,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,EAAC,UAAU,EAAC,CAAC,QAAQ,EAAC,cAAc,EAAC,YAAY,EAAC,KAAK,EAAC,WAAW,EAAC,KAAK,CAAC,EAAC,EAAC,EAAC,UAAU,EAAC,CAAC,QAAQ,CAAC,EAAC,CAAC;AAAA,SAAS,UAAU,CAAC,IAAI,EAAE,EAAC,YAAY,GAAC,EAAE,EAAE,UAAU,EAAE,kBAAkB,EAAE,QAAQ,GAAC,IAAI,EAAC,GAAC,EAAE,IAAE,IAAI,OAAO,GAAG,IAAI,CAAC,CAAA,IAAI,MAAM,GAAG,CAAC,CAAC,CAAA,IAAG,MAAM,KAAK,CAAC,EAAC;IAAC,IAAG,IAAI,IAAI,OAAO,IAAI,IAAI,QAAQ,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAC;QAAC,IAAI,QAAQ,CAAC;QAAA,IAAG,CAAC,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC,EAAC;YAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,UAAU,EAAC,YAAY,EAAC,OAAO,EAAC,UAAU,EAAC,MAAM,EAAC,EAAC,eAAe,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,+BAA+B,GAAC,QAAQ,GAAC,GAAG,EAAC,CAAC,CAAC;YAAA,OAAO,KAAK,CAAC;SAAC;aAAK;YAAC,IAAG,IAAI,CAAC,MAAM,KAAK,SAAS,EAAC;gBAAC,IAAI,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC;gBAAA,MAAM,MAAM,GAAG,MAAM,CAAC;gBAAA,IAAG,MAAM,KAAK,MAAM,EAAC;oBAAC,IAAG,KAAK,IAAI,OAAO,KAAK,IAAI,QAAQ,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAC;wBAAC,IAAI,QAAQ,CAAC;wBAAA,IAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,cAAc,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC,CAAC,EAAC;4BAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,SAAS,EAAC,UAAU,EAAC,8BAA8B,EAAC,OAAO,EAAC,UAAU,EAAC,MAAM,EAAC,EAAC,eAAe,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,+BAA+B,GAAC,QAAQ,GAAC,GAAG,EAAC,CAAC,CAAC;4BAAA,OAAO,KAAK,CAAC;yBAAC;6BAAK;4BAAC,IAAG,KAAK,CAAC,MAAM,KAAK,SAAS,EAAC;gCAAC,MAAM,MAAM,GAAG,MAAM,CAAC;gCAAA,IAAG,OAAO,KAAK,CAAC,MAAM,KAAK,QAAQ,EAAC;oCAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,gBAAgB,EAAC,UAAU,EAAC,4CAA4C,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;oCAAA,OAAO,KAAK,CAAC;iCAAC;gCAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;6BAAC;iCAAK;gCAAC,IAAI,MAAM,GAAG,IAAI,CAAC;6BAAC;4BAAA,IAAG,MAAM,EAAC;gCAAC,IAAG,KAAK,CAAC,YAAY,KAAK,SAAS,EAAC;oCAAC,IAAI,KAAK,GAAG,KAAK,CAAC,YAAY,CAAC;oCAAA,MAAM,MAAM,GAAG,MAAM,CAAC;oCAAA,IAAG,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,IAAI,QAAQ,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,EAAC;wCAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,sBAAsB,EAAC,UAAU,EAAC,kDAAkD,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;wCAAA,OAAO,KAAK,CAAC;qCAAC;oCAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;iCAAC;qCAAK;oCAAC,IAAI,MAAM,GAAG,IAAI,CAAC;iCAAC;gCAAA,IAAG,MAAM,EAAC;oCAAC,IAAG,KAAK,CAAC,UAAU,KAAK,SAAS,EAAC;wCAAC,MAAM,MAAM,GAAG,MAAM,CAAC;wCAAA,IAAG,OAAO,KAAK,CAAC,UAAU,KAAK,QAAQ,EAAC;4CAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,oBAAoB,EAAC,UAAU,EAAC,gDAAgD,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;4CAAA,OAAO,KAAK,CAAC;yCAAC;wCAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;qCAAC;yCAAK;wCAAC,IAAI,MAAM,GAAG,IAAI,CAAC;qCAAC;oCAAA,IAAG,MAAM,EAAC;wCAAC,IAAG,KAAK,CAAC,GAAG,KAAK,SAAS,EAAC;4CAAC,MAAM,MAAM,GAAG,MAAM,CAAC;4CAAA,IAAG,OAAO,KAAK,CAAC,GAAG,KAAK,QAAQ,EAAC;gDAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,aAAa,EAAC,UAAU,EAAC,yCAAyC,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;gDAAA,OAAO,KAAK,CAAC;6CAAC;4CAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;yCAAC;6CAAK;4CAAC,IAAI,MAAM,GAAG,IAAI,CAAC;yCAAC;wCAAA,IAAG,MAAM,EAAC;4CAAC,IAAG,KAAK,CAAC,SAAS,KAAK,SAAS,EAAC;gDAAC,IAAI,KAAK,GAAG,KAAK,CAAC,SAAS,CAAC;gDAAA,MAAM,OAAO,GAAG,MAAM,CAAC;gDAAA,IAAG,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,IAAI,QAAQ,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,EAAC;oDAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,mBAAmB,EAAC,UAAU,EAAC,+CAA+C,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;oDAAA,OAAO,KAAK,CAAC;iDAAC;gDAAA,IAAI,MAAM,GAAG,OAAO,KAAK,MAAM,CAAC;6CAAC;iDAAK;gDAAC,IAAI,MAAM,GAAG,IAAI,CAAC;6CAAC;4CAAA,IAAG,MAAM,EAAC;gDAAC,IAAG,KAAK,CAAC,GAAG,KAAK,SAAS,EAAC;oDAAC,MAAM,OAAO,GAAG,MAAM,CAAC;oDAAA,IAAG,OAAO,KAAK,CAAC,GAAG,KAAK,QAAQ,EAAC;wDAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,aAAa,EAAC,UAAU,EAAC,yCAAyC,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;wDAAA,OAAO,KAAK,CAAC;qDAAC;oDAAA,IAAI,MAAM,GAAG,OAAO,KAAK,MAAM,CAAC;iDAAC;qDAAK;oDAAC,IAAI,MAAM,GAAG,IAAI,CAAC;iDAAC;6CAAC;yCAAC;qCAAC;iCAAC;6BAAC;yBAAC;qBAAC;yBAAK;wBAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,SAAS,EAAC,UAAU,EAAC,0BAA0B,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;wBAAA,OAAO,KAAK,CAAC;qBAAC;iBAAC;aAAC;SAAC;KAAC;SAAK;QAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,UAAU,EAAC,QAAQ,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;QAAA,OAAO,KAAK,CAAC;KAAC;CAAC,CAAA,UAAU,CAAC,MAAM,GAAG,OAAO,CAAC,CAAA,OAAO,MAAM,KAAK,CAAC,CAAC,CAAA,CAAC"}
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/keystore/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AAEzC,OAAO,EAAE,QAAQ,EAAE,CAAC"}
|
@@ -0,0 +1,50 @@
|
|
1
|
+
import type { ICipherModule, IPbkdf2KdfModule } from "@chainsafe/bls-keystore";
|
2
|
+
import type { IdentityCredential } from "../rln.js";
|
3
|
+
import type { MembershipHash, MembershipInfo, Password, Sha256Hash } from "./types.js";
|
4
|
+
type NwakuCredential = {
|
5
|
+
crypto: {
|
6
|
+
cipher: ICipherModule["function"];
|
7
|
+
cipherparams: ICipherModule["params"];
|
8
|
+
ciphertext: ICipherModule["message"];
|
9
|
+
kdf: IPbkdf2KdfModule["function"];
|
10
|
+
kdfparams: IPbkdf2KdfModule["params"];
|
11
|
+
mac: Sha256Hash;
|
12
|
+
};
|
13
|
+
};
|
14
|
+
interface NwakuKeystore {
|
15
|
+
application: string;
|
16
|
+
version: string;
|
17
|
+
appIdentifier: string;
|
18
|
+
credentials: {
|
19
|
+
[key: MembershipHash]: NwakuCredential;
|
20
|
+
};
|
21
|
+
}
|
22
|
+
type KeystoreCreateOptions = {
|
23
|
+
application?: string;
|
24
|
+
version?: string;
|
25
|
+
appIdentifier?: string;
|
26
|
+
};
|
27
|
+
type IdentityOptions = {
|
28
|
+
identity: IdentityCredential;
|
29
|
+
membership: MembershipInfo;
|
30
|
+
};
|
31
|
+
export declare class Keystore {
|
32
|
+
private data;
|
33
|
+
private constructor();
|
34
|
+
static create(options?: KeystoreCreateOptions): Keystore;
|
35
|
+
static fromString(str: string): Keystore | null;
|
36
|
+
static fromObject(obj: NwakuKeystore): Keystore;
|
37
|
+
addCredential(options: IdentityOptions, password: Password): Promise<MembershipHash>;
|
38
|
+
readCredential(membershipHash: MembershipHash, password: Password): Promise<null | IdentityOptions>;
|
39
|
+
removeCredential(hash: MembershipHash): void;
|
40
|
+
toString(): string;
|
41
|
+
toObject(): NwakuKeystore;
|
42
|
+
private static isValidNwakuStore;
|
43
|
+
private static fromCredentialToEip;
|
44
|
+
private static fromEipToCredential;
|
45
|
+
private static fromBytesToIdentity;
|
46
|
+
private static fromArraylikeToBytes;
|
47
|
+
private static computeMembershipHash;
|
48
|
+
private static fromIdentityToBytes;
|
49
|
+
}
|
50
|
+
export {};
|
@@ -0,0 +1,193 @@
|
|
1
|
+
import { create as createEipKeystore } from "@chainsafe/bls-keystore";
|
2
|
+
import { sha256 } from "ethereum-cryptography/sha256";
|
3
|
+
import { bytesToHex, bytesToUtf8, utf8ToBytes, } from "ethereum-cryptography/utils";
|
4
|
+
import _ from "lodash";
|
5
|
+
import { v4 as uuidV4 } from "uuid";
|
6
|
+
import { buildBigIntFromUint8Array } from "../byte_utils.js";
|
7
|
+
import { decryptEipKeystore, keccak256Checksum } from "./cipher.js";
|
8
|
+
import { isCredentialValid, isKeystoreValid } from "./schema_validator.js";
|
9
|
+
export class Keystore {
|
10
|
+
constructor(options) {
|
11
|
+
this.data = Object.assign({
|
12
|
+
application: "waku-rln-relay",
|
13
|
+
appIdentifier: "01234567890abcdef",
|
14
|
+
version: "0.2",
|
15
|
+
credentials: {},
|
16
|
+
}, options);
|
17
|
+
}
|
18
|
+
static create(options = {}) {
|
19
|
+
return new Keystore(options);
|
20
|
+
}
|
21
|
+
static fromString(str) {
|
22
|
+
try {
|
23
|
+
const obj = JSON.parse(str);
|
24
|
+
if (!Keystore.isValidNwakuStore(obj)) {
|
25
|
+
throw Error("Invalid string, does not match Nwaku Keystore format.");
|
26
|
+
}
|
27
|
+
return new Keystore(obj);
|
28
|
+
}
|
29
|
+
catch (err) {
|
30
|
+
console.error("Cannot create Keystore from string:", err);
|
31
|
+
return null;
|
32
|
+
}
|
33
|
+
}
|
34
|
+
static fromObject(obj) {
|
35
|
+
if (!Keystore.isValidNwakuStore(obj)) {
|
36
|
+
throw Error("Invalid object, does not match Nwaku Keystore format.");
|
37
|
+
}
|
38
|
+
return new Keystore(obj);
|
39
|
+
}
|
40
|
+
async addCredential(options, password) {
|
41
|
+
const membershipHash = Keystore.computeMembershipHash(options.membership);
|
42
|
+
if (this.data.credentials[membershipHash]) {
|
43
|
+
throw Error("Credential already exists in the store.");
|
44
|
+
}
|
45
|
+
// these are not important
|
46
|
+
const stubPath = "/stub/path";
|
47
|
+
const stubPubkey = new Uint8Array([0]);
|
48
|
+
const secret = Keystore.fromIdentityToBytes(options);
|
49
|
+
const eipKeystore = await createEipKeystore(password, secret, stubPubkey, stubPath);
|
50
|
+
// need to re-compute checksum since nwaku uses keccak256 instead of sha256
|
51
|
+
const checksum = await keccak256Checksum(password, eipKeystore);
|
52
|
+
const nwakuCredential = Keystore.fromEipToCredential(eipKeystore, checksum);
|
53
|
+
this.data.credentials[membershipHash] = nwakuCredential;
|
54
|
+
return membershipHash;
|
55
|
+
}
|
56
|
+
async readCredential(membershipHash, password) {
|
57
|
+
const nwakuCredential = this.data.credentials[membershipHash];
|
58
|
+
if (!nwakuCredential) {
|
59
|
+
return null;
|
60
|
+
}
|
61
|
+
const eipKeystore = Keystore.fromCredentialToEip(nwakuCredential);
|
62
|
+
const bytes = await decryptEipKeystore(password, eipKeystore);
|
63
|
+
return Keystore.fromBytesToIdentity(bytes);
|
64
|
+
}
|
65
|
+
removeCredential(hash) {
|
66
|
+
if (!this.data.credentials[hash]) {
|
67
|
+
return;
|
68
|
+
}
|
69
|
+
delete this.data.credentials[hash];
|
70
|
+
}
|
71
|
+
toString() {
|
72
|
+
return JSON.stringify(this.data);
|
73
|
+
}
|
74
|
+
toObject() {
|
75
|
+
return this.data;
|
76
|
+
}
|
77
|
+
static isValidNwakuStore(obj) {
|
78
|
+
if (!isKeystoreValid(obj)) {
|
79
|
+
return false;
|
80
|
+
}
|
81
|
+
const areCredentialsValid = Object.values(_.get(obj, "credentials", {}))
|
82
|
+
.map((c) => isCredentialValid(c))
|
83
|
+
.every((v) => v);
|
84
|
+
return areCredentialsValid;
|
85
|
+
}
|
86
|
+
static fromCredentialToEip(credential) {
|
87
|
+
const nwakuCrypto = credential.crypto;
|
88
|
+
const eipCrypto = {
|
89
|
+
kdf: {
|
90
|
+
function: nwakuCrypto.kdf,
|
91
|
+
params: nwakuCrypto.kdfparams,
|
92
|
+
message: "",
|
93
|
+
},
|
94
|
+
cipher: {
|
95
|
+
function: nwakuCrypto.cipher,
|
96
|
+
params: nwakuCrypto.cipherparams,
|
97
|
+
message: nwakuCrypto.ciphertext,
|
98
|
+
},
|
99
|
+
checksum: {
|
100
|
+
// @chainsafe/bls-keystore supports only sha256
|
101
|
+
// but nwaku uses keccak256
|
102
|
+
// https://github.com/waku-org/nwaku/blob/25d6e52e3804d15f9b61bc4cc6dd448540c072a1/waku/waku_keystore/keyfile.nim#L367
|
103
|
+
function: "sha256",
|
104
|
+
params: {},
|
105
|
+
message: nwakuCrypto.mac,
|
106
|
+
},
|
107
|
+
};
|
108
|
+
return {
|
109
|
+
version: 4,
|
110
|
+
uuid: uuidV4(),
|
111
|
+
description: undefined,
|
112
|
+
path: "safe to ignore, not important for decrypt",
|
113
|
+
pubkey: "safe to ignore, not important for decrypt",
|
114
|
+
crypto: eipCrypto,
|
115
|
+
};
|
116
|
+
}
|
117
|
+
static fromEipToCredential(eipKeystore, checksum) {
|
118
|
+
const eipCrypto = eipKeystore.crypto;
|
119
|
+
const eipKdf = eipCrypto.kdf;
|
120
|
+
return {
|
121
|
+
crypto: {
|
122
|
+
cipher: eipCrypto.cipher.function,
|
123
|
+
cipherparams: eipCrypto.cipher.params,
|
124
|
+
ciphertext: eipCrypto.cipher.message,
|
125
|
+
kdf: eipKdf.function,
|
126
|
+
kdfparams: eipKdf.params,
|
127
|
+
// @chainsafe/bls-keystore generates only sha256
|
128
|
+
// but nwaku uses keccak256
|
129
|
+
// https://github.com/waku-org/nwaku/blob/25d6e52e3804d15f9b61bc4cc6dd448540c072a1/waku/waku_keystore/keyfile.nim#L367
|
130
|
+
mac: checksum,
|
131
|
+
},
|
132
|
+
};
|
133
|
+
}
|
134
|
+
static fromBytesToIdentity(bytes) {
|
135
|
+
try {
|
136
|
+
const str = bytesToUtf8(bytes);
|
137
|
+
const obj = JSON.parse(str);
|
138
|
+
// TODO: add runtime validation of nwaku credentials
|
139
|
+
return {
|
140
|
+
identity: {
|
141
|
+
IDCommitment: Keystore.fromArraylikeToBytes(_.get(obj, "identityCredential.idCommitment", [])),
|
142
|
+
IDTrapdoor: Keystore.fromArraylikeToBytes(_.get(obj, "identityCredential.idTrapdoor", [])),
|
143
|
+
IDNullifier: Keystore.fromArraylikeToBytes(_.get(obj, "identityCredential.idNullifier", [])),
|
144
|
+
IDCommitmentBigInt: buildBigIntFromUint8Array(Keystore.fromArraylikeToBytes(_.get(obj, "identityCredential.idCommitment", []))),
|
145
|
+
IDSecretHash: Keystore.fromArraylikeToBytes(_.get(obj, "identityCredential.idSecretHash", [])),
|
146
|
+
},
|
147
|
+
membership: {
|
148
|
+
treeIndex: _.get(obj, "treeIndex"),
|
149
|
+
chainId: _.get(obj, "membershipContract.chainId"),
|
150
|
+
address: _.get(obj, "membershipContract.address"),
|
151
|
+
},
|
152
|
+
};
|
153
|
+
}
|
154
|
+
catch (err) {
|
155
|
+
console.error("Cannot parse bytes to Nwaku Credentials:", err);
|
156
|
+
return null;
|
157
|
+
}
|
158
|
+
}
|
159
|
+
static fromArraylikeToBytes(obj) {
|
160
|
+
const bytes = [];
|
161
|
+
let index = 0;
|
162
|
+
let lastElement = obj[index];
|
163
|
+
while (lastElement !== undefined) {
|
164
|
+
bytes.push(lastElement);
|
165
|
+
index += 1;
|
166
|
+
lastElement = obj[index];
|
167
|
+
}
|
168
|
+
return new Uint8Array(bytes);
|
169
|
+
}
|
170
|
+
// follows nwaku implementation
|
171
|
+
// https://github.com/waku-org/nwaku/blob/f05528d4be3d3c876a8b07f9bb7dfaae8aa8ec6e/waku/waku_keystore/protocol_types.nim#L111
|
172
|
+
static computeMembershipHash(info) {
|
173
|
+
return bytesToHex(sha256(utf8ToBytes(`${info.chainId}${info.address}${info.treeIndex}`))).toUpperCase();
|
174
|
+
}
|
175
|
+
// follows nwaku implementation
|
176
|
+
// https://github.com/waku-org/nwaku/blob/f05528d4be3d3c876a8b07f9bb7dfaae8aa8ec6e/waku/waku_keystore/protocol_types.nim#L98
|
177
|
+
static fromIdentityToBytes(options) {
|
178
|
+
return utf8ToBytes(JSON.stringify({
|
179
|
+
treeIndex: options.membership.treeIndex,
|
180
|
+
identityCredential: {
|
181
|
+
idCommitment: options.identity.IDCommitment,
|
182
|
+
idNullifier: options.identity.IDNullifier,
|
183
|
+
idSecretHash: options.identity.IDSecretHash,
|
184
|
+
idTrapdoor: options.identity.IDTrapdoor,
|
185
|
+
},
|
186
|
+
membershipContract: {
|
187
|
+
chainId: options.membership.chainId,
|
188
|
+
address: options.membership.address,
|
189
|
+
},
|
190
|
+
}));
|
191
|
+
}
|
192
|
+
}
|
193
|
+
//# sourceMappingURL=keystore.js.map
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"keystore.js","sourceRoot":"","sources":["../../src/keystore/keystore.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,MAAM,IAAI,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AACtE,OAAO,EAAE,MAAM,EAAE,MAAM,8BAA8B,CAAC;AACtD,OAAO,EACL,UAAU,EACV,WAAW,EACX,WAAW,GACZ,MAAM,6BAA6B,CAAC;AACrC,OAAO,CAAC,MAAM,QAAQ,CAAC;AACvB,OAAO,EAAE,EAAE,IAAI,MAAM,EAAE,MAAM,MAAM,CAAC;AAEpC,OAAO,EAAE,yBAAyB,EAAE,MAAM,kBAAkB,CAAC;AAG7D,OAAO,EAAE,kBAAkB,EAAE,iBAAiB,EAAE,MAAM,aAAa,CAAC;AACpE,OAAO,EAAE,iBAAiB,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AA6C3E,MAAM,OAAO,QAAQ;IAGnB,YAAoB,OAA8C;QAChE,IAAI,CAAC,IAAI,GAAG,MAAM,CAAC,MAAM,CACvB;YACE,WAAW,EAAE,gBAAgB;YAC7B,aAAa,EAAE,mBAAmB;YAClC,OAAO,EAAE,KAAK;YACd,WAAW,EAAE,EAAE;SAChB,EACD,OAAO,CACR,CAAC;IACJ,CAAC;IAEM,MAAM,CAAC,MAAM,CAAC,UAAiC,EAAE;QACtD,OAAO,IAAI,QAAQ,CAAC,OAAO,CAAC,CAAC;IAC/B,CAAC;IAEM,MAAM,CAAC,UAAU,CAAC,GAAW;QAClC,IAAI;YACF,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAE5B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE;gBACpC,MAAM,KAAK,CAAC,uDAAuD,CAAC,CAAC;aACtE;YAED,OAAO,IAAI,QAAQ,CAAC,GAAG,CAAC,CAAC;SAC1B;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,KAAK,CAAC,qCAAqC,EAAE,GAAG,CAAC,CAAC;YAC1D,OAAO,IAAI,CAAC;SACb;IACH,CAAC;IAEM,MAAM,CAAC,UAAU,CAAC,GAAkB;QACzC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE;YACpC,MAAM,KAAK,CAAC,uDAAuD,CAAC,CAAC;SACtE;QAED,OAAO,IAAI,QAAQ,CAAC,GAAG,CAAC,CAAC;IAC3B,CAAC;IAEM,KAAK,CAAC,aAAa,CACxB,OAAwB,EACxB,QAAkB;QAElB,MAAM,cAAc,GAAmB,QAAQ,CAAC,qBAAqB,CACnE,OAAO,CAAC,UAAU,CACnB,CAAC;QAEF,IAAI,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,EAAE;YACzC,MAAM,KAAK,CAAC,yCAAyC,CAAC,CAAC;SACxD;QAED,0BAA0B;QAC1B,MAAM,QAAQ,GAAG,YAAY,CAAC;QAC9B,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QACvC,MAAM,MAAM,GAAG,QAAQ,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;QAErD,MAAM,WAAW,GAAG,MAAM,iBAAiB,CACzC,QAAQ,EACR,MAAM,EACN,UAAU,EACV,QAAQ,CACT,CAAC;QACF,2EAA2E;QAC3E,MAAM,QAAQ,GAAG,MAAM,iBAAiB,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;QAChE,MAAM,eAAe,GAAG,QAAQ,CAAC,mBAAmB,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;QAE5E,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,GAAG,eAAe,CAAC;QACxD,OAAO,cAAc,CAAC;IACxB,CAAC;IAEM,KAAK,CAAC,cAAc,CACzB,cAA8B,EAC9B,QAAkB;QAElB,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,CAAC;QAE9D,IAAI,CAAC,eAAe,EAAE;YACpB,OAAO,IAAI,CAAC;SACb;QAED,MAAM,WAAW,GAAG,QAAQ,CAAC,mBAAmB,CAAC,eAAe,CAAC,CAAC;QAClE,MAAM,KAAK,GAAG,MAAM,kBAAkB,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;QAE9D,OAAO,QAAQ,CAAC,mBAAmB,CAAC,KAAK,CAAC,CAAC;IAC7C,CAAC;IAEM,gBAAgB,CAAC,IAAoB;QAC1C,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,EAAE;YAChC,OAAO;SACR;QAED,OAAO,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC;IACrC,CAAC;IAEM,QAAQ;QACb,OAAO,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACnC,CAAC;IAEM,QAAQ;QACb,OAAO,IAAI,CAAC,IAAI,CAAC;IACnB,CAAC;IAEO,MAAM,CAAC,iBAAiB,CAAC,GAAY;QAC3C,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE;YACzB,OAAO,KAAK,CAAC;SACd;QAED,MAAM,mBAAmB,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,aAAa,EAAE,EAAE,CAAC,CAAC;aACrE,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC;aAChC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;QAEnB,OAAO,mBAAmB,CAAC;IAC7B,CAAC;IAEO,MAAM,CAAC,mBAAmB,CAChC,UAA2B;QAE3B,MAAM,WAAW,GAAG,UAAU,CAAC,MAAM,CAAC;QACtC,MAAM,SAAS,GAA2B;YACxC,GAAG,EAAE;gBACH,QAAQ,EAAE,WAAW,CAAC,GAAG;gBACzB,MAAM,EAAE,WAAW,CAAC,SAAS;gBAC7B,OAAO,EAAE,EAAE;aACZ;YACD,MAAM,EAAE;gBACN,QAAQ,EAAE,WAAW,CAAC,MAAM;gBAC5B,MAAM,EAAE,WAAW,CAAC,YAAY;gBAChC,OAAO,EAAE,WAAW,CAAC,UAAU;aAChC;YACD,QAAQ,EAAE;gBACR,+CAA+C;gBAC/C,2BAA2B;gBAC3B,sHAAsH;gBACtH,QAAQ,EAAE,QAAQ;gBAClB,MAAM,EAAE,EAAE;gBACV,OAAO,EAAE,WAAW,CAAC,GAAG;aACzB;SACF,CAAC;QAEF,OAAO;YACL,OAAO,EAAE,CAAC;YACV,IAAI,EAAE,MAAM,EAAE;YACd,WAAW,EAAE,SAAS;YACtB,IAAI,EAAE,2CAA2C;YACjD,MAAM,EAAE,2CAA2C;YACnD,MAAM,EAAE,SAAS;SAClB,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,mBAAmB,CAChC,WAAyB,EACzB,QAAuB;QAEvB,MAAM,SAAS,GAAG,WAAW,CAAC,MAAM,CAAC;QACrC,MAAM,MAAM,GAAG,SAAS,CAAC,GAAuB,CAAC;QACjD,OAAO;YACL,MAAM,EAAE;gBACN,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC,QAAQ;gBACjC,YAAY,EAAE,SAAS,CAAC,MAAM,CAAC,MAAM;gBACrC,UAAU,EAAE,SAAS,CAAC,MAAM,CAAC,OAAO;gBACpC,GAAG,EAAE,MAAM,CAAC,QAAQ;gBACpB,SAAS,EAAE,MAAM,CAAC,MAAM;gBACxB,gDAAgD;gBAChD,2BAA2B;gBAC3B,sHAAsH;gBACtH,GAAG,EAAE,QAAQ;aACd;SACF,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,mBAAmB,CAChC,KAAiB;QAEjB,IAAI;YACF,MAAM,GAAG,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC;YAC/B,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAE5B,oDAAoD;YACpD,OAAO;gBACL,QAAQ,EAAE;oBACR,YAAY,EAAE,QAAQ,CAAC,oBAAoB,CACzC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,iCAAiC,EAAE,EAAE,CAAC,CAClD;oBACD,UAAU,EAAE,QAAQ,CAAC,oBAAoB,CACvC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,+BAA+B,EAAE,EAAE,CAAC,CAChD;oBACD,WAAW,EAAE,QAAQ,CAAC,oBAAoB,CACxC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,gCAAgC,EAAE,EAAE,CAAC,CACjD;oBACD,kBAAkB,EAAE,yBAAyB,CAC3C,QAAQ,CAAC,oBAAoB,CAC3B,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,iCAAiC,EAAE,EAAE,CAAC,CAClD,CACF;oBACD,YAAY,EAAE,QAAQ,CAAC,oBAAoB,CACzC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,iCAAiC,EAAE,EAAE,CAAC,CAClD;iBACF;gBACD,UAAU,EAAE;oBACV,SAAS,EAAE,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,WAAW,CAAC;oBAClC,OAAO,EAAE,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,4BAA4B,CAAC;oBACjD,OAAO,EAAE,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,4BAA4B,CAAC;iBAClD;aACF,CAAC;SACH;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,KAAK,CAAC,0CAA0C,EAAE,GAAG,CAAC,CAAC;YAC/D,OAAO,IAAI,CAAC;SACb;IACH,CAAC;IAEO,MAAM,CAAC,oBAAoB,CAAC,GAEnC;QACC,MAAM,KAAK,GAAG,EAAE,CAAC;QAEjB,IAAI,KAAK,GAAG,CAAC,CAAC;QACd,IAAI,WAAW,GAAG,GAAG,CAAC,KAAK,CAAC,CAAC;QAE7B,OAAO,WAAW,KAAK,SAAS,EAAE;YAChC,KAAK,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACxB,KAAK,IAAI,CAAC,CAAC;YACX,WAAW,GAAG,GAAG,CAAC,KAAK,CAAC,CAAC;SAC1B;QAED,OAAO,IAAI,UAAU,CAAC,KAAK,CAAC,CAAC;IAC/B,CAAC;IAED,+BAA+B;IAC/B,6HAA6H;IACrH,MAAM,CAAC,qBAAqB,CAAC,IAAoB;QACvD,OAAO,UAAU,CACf,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,OAAO,GAAG,IAAI,CAAC,OAAO,GAAG,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC,CACvE,CAAC,WAAW,EAAE,CAAC;IAClB,CAAC;IAED,+BAA+B;IAC/B,4HAA4H;IACpH,MAAM,CAAC,mBAAmB,CAAC,OAAwB;QACzD,OAAO,WAAW,CAChB,IAAI,CAAC,SAAS,CAAC;YACb,SAAS,EAAE,OAAO,CAAC,UAAU,CAAC,SAAS;YACvC,kBAAkB,EAAE;gBAClB,YAAY,EAAE,OAAO,CAAC,QAAQ,CAAC,YAAY;gBAC3C,WAAW,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW;gBACzC,YAAY,EAAE,OAAO,CAAC,QAAQ,CAAC,YAAY;gBAC3C,UAAU,EAAE,OAAO,CAAC,QAAQ,CAAC,UAAU;aACxC;YACD,kBAAkB,EAAE;gBAClB,OAAO,EAAE,OAAO,CAAC,UAAU,CAAC,OAAO;gBACnC,OAAO,EAAE,OAAO,CAAC,UAAU,CAAC,OAAO;aACpC;SACF,CAAC,CACH,CAAC;IACJ,CAAC;CACF"}
|
@@ -0,0 +1,8 @@
|
|
1
|
+
export declare const Keystore: typeof validate11;
|
2
|
+
declare function validate11(data: any, { instancePath, parentData, parentDataProperty, rootData }?: {
|
3
|
+
instancePath?: string | undefined;
|
4
|
+
parentData: any;
|
5
|
+
parentDataProperty: any;
|
6
|
+
rootData?: any;
|
7
|
+
}): boolean;
|
8
|
+
export {};
|
@@ -0,0 +1,75 @@
|
|
1
|
+
/* eslint eslint-comments/no-unlimited-disable: "off" */
|
2
|
+
// This file was generated by /scripts/schema-validation-codegen.ts
|
3
|
+
// Do not modify this file by hand.
|
4
|
+
/* eslint-disable */
|
5
|
+
// @ts-ignore
|
6
|
+
"use strict";
|
7
|
+
export const Keystore = validate11;
|
8
|
+
const schema12 = { "type": "object", "properties": { "credentials": { "type": "object" }, "appIdentifier": { "type": "string" }, "version": { "type": "string" }, "application": { "type": "string" } }, "required": ["application", "appIdentifier", "credentials", "version"] };
|
9
|
+
function validate11(data, { instancePath = "", parentData, parentDataProperty, rootData = data } = {}) { let vErrors = null; let errors = 0; if (errors === 0) {
|
10
|
+
if (data && typeof data == "object" && !Array.isArray(data)) {
|
11
|
+
let missing0;
|
12
|
+
if (((((data.application === undefined) && (missing0 = "application")) || ((data.appIdentifier === undefined) && (missing0 = "appIdentifier"))) || ((data.credentials === undefined) && (missing0 = "credentials"))) || ((data.version === undefined) && (missing0 = "version"))) {
|
13
|
+
validate11.errors = [{ instancePath, schemaPath: "#/required", keyword: "required", params: { missingProperty: missing0 }, message: "must have required property '" + missing0 + "'" }];
|
14
|
+
return false;
|
15
|
+
}
|
16
|
+
else {
|
17
|
+
if (data.credentials !== undefined) {
|
18
|
+
let data0 = data.credentials;
|
19
|
+
const _errs1 = errors;
|
20
|
+
if (!(data0 && typeof data0 == "object" && !Array.isArray(data0))) {
|
21
|
+
validate11.errors = [{ instancePath: instancePath + "/credentials", schemaPath: "#/properties/credentials/type", keyword: "type", params: { type: "object" }, message: "must be object" }];
|
22
|
+
return false;
|
23
|
+
}
|
24
|
+
var valid0 = _errs1 === errors;
|
25
|
+
}
|
26
|
+
else {
|
27
|
+
var valid0 = true;
|
28
|
+
}
|
29
|
+
if (valid0) {
|
30
|
+
if (data.appIdentifier !== undefined) {
|
31
|
+
const _errs3 = errors;
|
32
|
+
if (typeof data.appIdentifier !== "string") {
|
33
|
+
validate11.errors = [{ instancePath: instancePath + "/appIdentifier", schemaPath: "#/properties/appIdentifier/type", keyword: "type", params: { type: "string" }, message: "must be string" }];
|
34
|
+
return false;
|
35
|
+
}
|
36
|
+
var valid0 = _errs3 === errors;
|
37
|
+
}
|
38
|
+
else {
|
39
|
+
var valid0 = true;
|
40
|
+
}
|
41
|
+
if (valid0) {
|
42
|
+
if (data.version !== undefined) {
|
43
|
+
const _errs5 = errors;
|
44
|
+
if (typeof data.version !== "string") {
|
45
|
+
validate11.errors = [{ instancePath: instancePath + "/version", schemaPath: "#/properties/version/type", keyword: "type", params: { type: "string" }, message: "must be string" }];
|
46
|
+
return false;
|
47
|
+
}
|
48
|
+
var valid0 = _errs5 === errors;
|
49
|
+
}
|
50
|
+
else {
|
51
|
+
var valid0 = true;
|
52
|
+
}
|
53
|
+
if (valid0) {
|
54
|
+
if (data.application !== undefined) {
|
55
|
+
const _errs7 = errors;
|
56
|
+
if (typeof data.application !== "string") {
|
57
|
+
validate11.errors = [{ instancePath: instancePath + "/application", schemaPath: "#/properties/application/type", keyword: "type", params: { type: "string" }, message: "must be string" }];
|
58
|
+
return false;
|
59
|
+
}
|
60
|
+
var valid0 = _errs7 === errors;
|
61
|
+
}
|
62
|
+
else {
|
63
|
+
var valid0 = true;
|
64
|
+
}
|
65
|
+
}
|
66
|
+
}
|
67
|
+
}
|
68
|
+
}
|
69
|
+
}
|
70
|
+
else {
|
71
|
+
validate11.errors = [{ instancePath, schemaPath: "#/type", keyword: "type", params: { type: "object" }, message: "must be object" }];
|
72
|
+
return false;
|
73
|
+
}
|
74
|
+
} validate11.errors = vErrors; return errors === 0; }
|
75
|
+
//# sourceMappingURL=keystore_validation_generated.js.map
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"keystore_validation_generated.js","sourceRoot":"","sources":["../../src/keystore/keystore_validation_generated.ts"],"names":[],"mappings":"AACA,wDAAwD;AACxD,mEAAmE;AACnE,mCAAmC;AAEnC,oBAAoB;AACpB,aAAa;AACb,YAAY,CAAC;AAAA,MAAM,CAAC,MAAM,QAAQ,GAAG,UAAU,CAAC;AAAA,MAAM,QAAQ,GAAG,EAAC,MAAM,EAAC,QAAQ,EAAC,YAAY,EAAC,EAAC,aAAa,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,eAAe,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,SAAS,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,aAAa,EAAC,EAAC,MAAM,EAAC,QAAQ,EAAC,EAAC,EAAC,UAAU,EAAC,CAAC,aAAa,EAAC,eAAe,EAAC,aAAa,EAAC,SAAS,CAAC,EAAC,CAAC;AAAA,SAAS,UAAU,CAAC,IAAI,EAAE,EAAC,YAAY,GAAC,EAAE,EAAE,UAAU,EAAE,kBAAkB,EAAE,QAAQ,GAAC,IAAI,EAAC,GAAC,EAAE,IAAE,IAAI,OAAO,GAAG,IAAI,CAAC,CAAA,IAAI,MAAM,GAAG,CAAC,CAAC,CAAA,IAAG,MAAM,KAAK,CAAC,EAAC;IAAC,IAAG,IAAI,IAAI,OAAO,IAAI,IAAI,QAAQ,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAC;QAAC,IAAI,QAAQ,CAAC;QAAA,IAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,aAAa,CAAC,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,aAAa,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,QAAQ,GAAG,SAAS,CAAC,CAAC,EAAC;YAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,UAAU,EAAC,YAAY,EAAC,OAAO,EAAC,UAAU,EAAC,MAAM,EAAC,EAAC,eAAe,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,+BAA+B,GAAC,QAAQ,GAAC,GAAG,EAAC,CAAC,CAAC;YAAA,OAAO,KAAK,CAAC;SAAC;aAAK;YAAC,IAAG,IAAI,CAAC,WAAW,KAAK,SAAS,EAAC;gBAAC,IAAI,KAAK,GAAG,IAAI,CAAC,WAAW,CAAC;gBAAA,MAAM,MAAM,GAAG,MAAM,CAAC;gBAAA,IAAG,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,IAAI,QAAQ,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,EAAC;oBAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,cAAc,EAAC,UAAU,EAAC,+BAA+B,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;oBAAA,OAAO,KAAK,CAAC;iBAAC;gBAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;aAAC;iBAAK;gBAAC,IAAI,MAAM,GAAG,IAAI,CAAC;aAAC;YAAA,IAAG,MAAM,EAAC;gBAAC,IAAG,IAAI,CAAC,aAAa,KAAK,SAAS,EAAC;oBAAC,MAAM,MAAM,GAAG,MAAM,CAAC;oBAAA,IAAG,OAAO,IAAI,CAAC,aAAa,KAAK,QAAQ,EAAC;wBAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,gBAAgB,EAAC,UAAU,EAAC,iCAAiC,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;wBAAA,OAAO,KAAK,CAAC;qBAAC;oBAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;iBAAC;qBAAK;oBAAC,IAAI,MAAM,GAAG,IAAI,CAAC;iBAAC;gBAAA,IAAG,MAAM,EAAC;oBAAC,IAAG,IAAI,CAAC,OAAO,KAAK,SAAS,EAAC;wBAAC,MAAM,MAAM,GAAG,MAAM,CAAC;wBAAA,IAAG,OAAO,IAAI,CAAC,OAAO,KAAK,QAAQ,EAAC;4BAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,UAAU,EAAC,UAAU,EAAC,2BAA2B,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;4BAAA,OAAO,KAAK,CAAC;yBAAC;wBAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;qBAAC;yBAAK;wBAAC,IAAI,MAAM,GAAG,IAAI,CAAC;qBAAC;oBAAA,IAAG,MAAM,EAAC;wBAAC,IAAG,IAAI,CAAC,WAAW,KAAK,SAAS,EAAC;4BAAC,MAAM,MAAM,GAAG,MAAM,CAAC;4BAAA,IAAG,OAAO,IAAI,CAAC,WAAW,KAAK,QAAQ,EAAC;gCAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,YAAY,GAAC,cAAc,EAAC,UAAU,EAAC,+BAA+B,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;gCAAA,OAAO,KAAK,CAAC;6BAAC;4BAAA,IAAI,MAAM,GAAG,MAAM,KAAK,MAAM,CAAC;yBAAC;6BAAK;4BAAC,IAAI,MAAM,GAAG,IAAI,CAAC;yBAAC;qBAAC;iBAAC;aAAC;SAAC;KAAC;SAAK;QAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,YAAY,EAAC,UAAU,EAAC,QAAQ,EAAC,OAAO,EAAC,MAAM,EAAC,MAAM,EAAC,EAAC,IAAI,EAAE,QAAQ,EAAC,EAAC,OAAO,EAAC,gBAAgB,EAAC,CAAC,CAAC;QAAA,OAAO,KAAK,CAAC;KAAC;CAAC,CAAA,UAAU,CAAC,MAAM,GAAG,OAAO,CAAC,CAAA,OAAO,MAAM,KAAK,CAAC,CAAC,CAAA,CAAC"}
|
@@ -0,0 +1,18 @@
|
|
1
|
+
import { Credential as _validateCredentialGenerated } from "./credential_validation_generated.js";
|
2
|
+
import { Keystore as _validateKeystoreGenerated } from "./keystore_validation_generated.js";
|
3
|
+
const _validateKeystore = _validateKeystoreGenerated;
|
4
|
+
const _validateCredential = _validateCredentialGenerated;
|
5
|
+
function schemaValidationErrors(validator, data) {
|
6
|
+
const validated = validator(data);
|
7
|
+
if (validated) {
|
8
|
+
return null;
|
9
|
+
}
|
10
|
+
return validator.errors;
|
11
|
+
}
|
12
|
+
export function isKeystoreValid(keystore) {
|
13
|
+
return !schemaValidationErrors(_validateKeystore, keystore);
|
14
|
+
}
|
15
|
+
export function isCredentialValid(credential) {
|
16
|
+
return !schemaValidationErrors(_validateCredential, credential);
|
17
|
+
}
|
18
|
+
//# sourceMappingURL=schema_validator.js.map
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"schema_validator.js","sourceRoot":"","sources":["../../src/keystore/schema_validator.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,IAAI,4BAA4B,EAAE,MAAM,sCAAsC,CAAC;AAClG,OAAO,EAAE,QAAQ,IAAI,0BAA0B,EAAE,MAAM,oCAAoC,CAAC;AAY5F,MAAM,iBAAiB,GAAG,0BAAyC,CAAC;AACpE,MAAM,mBAAmB,GAAG,4BAA2C,CAAC;AAExE,SAAS,sBAAsB,CAC7B,SAAsB,EACtB,IAAa;IAEb,MAAM,SAAS,GAAG,SAAS,CAAC,IAAI,CAAC,CAAC;IAClC,IAAI,SAAS,EAAE;QACb,OAAO,IAAI,CAAC;KACb;IACD,OAAO,SAAS,CAAC,MAAM,CAAC;AAC1B,CAAC;AAED,MAAM,UAAU,eAAe,CAAC,QAAiB;IAC/C,OAAO,CAAC,sBAAsB,CAAC,iBAAiB,EAAE,QAAQ,CAAC,CAAC;AAC9D,CAAC;AAED,MAAM,UAAU,iBAAiB,CAAC,UAAmB;IACnD,OAAO,CAAC,sBAAsB,CAAC,mBAAmB,EAAE,UAAU,CAAC,CAAC;AAClE,CAAC"}
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/keystore/types.ts"],"names":[],"mappings":""}
|