@webex/plugin-encryption 3.8.0 → 3.8.1-next.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/README.md +21 -8
  2. package/babel.config.js +10 -8
  3. package/developer-quickstart.md +8 -12
  4. package/dist/config.js.map +1 -1
  5. package/dist/cypher/constants.js.map +1 -1
  6. package/dist/cypher/index.js.map +1 -1
  7. package/dist/cypher/types.js.map +1 -1
  8. package/dist/index.js.map +1 -1
  9. package/dist/types/webex-config.d.ts +14 -0
  10. package/dist/types/webex.d.ts +2 -0
  11. package/dist/types.js.map +1 -1
  12. package/dist/webex-config.js +21 -0
  13. package/dist/webex-config.js.map +1 -0
  14. package/dist/webex.js +32 -0
  15. package/dist/webex.js.map +1 -0
  16. package/jest.config.js +3 -1
  17. package/package.json +19 -8
  18. package/src/webex-config.ts +15 -0
  19. package/src/webex.js +35 -0
  20. package/coverage/clover.xml +0 -176
  21. package/coverage/coverage-final.json +0 -3
  22. package/coverage/jest-html-reporters-attach/jest-report/index.js +0 -58
  23. package/coverage/jest-html-reporters-attach/jest-report/result.js +0 -1
  24. package/coverage/jest-report.html +0 -1
  25. package/coverage/junit/coverage-junit.xml +0 -27
  26. package/coverage/lcov-report/base.css +0 -224
  27. package/coverage/lcov-report/block-navigation.js +0 -87
  28. package/coverage/lcov-report/constants.ts.html +0 -100
  29. package/coverage/lcov-report/favicon.png +0 -0
  30. package/coverage/lcov-report/index.html +0 -131
  31. package/coverage/lcov-report/index.ts.html +0 -562
  32. package/coverage/lcov-report/prettify.css +0 -1
  33. package/coverage/lcov-report/prettify.js +0 -2
  34. package/coverage/lcov-report/sort-arrow-sprite.png +0 -0
  35. package/coverage/lcov-report/sorter.js +0 -196
  36. package/coverage/lcov.info +0 -215
  37. package/dist/constants.js +0 -6
  38. package/dist/constants.js.map +0 -1
  39. package/dist/cypher/cypher.types.js +0 -6
  40. package/dist/cypher/cypher.types.js.map +0 -1
  41. package/dist/encryption/constants.js +0 -12
  42. package/dist/encryption/constants.js.map +0 -1
  43. package/dist/encryption/encryption.types.js +0 -6
  44. package/dist/encryption/encryption.types.js.map +0 -1
  45. package/dist/encryption/index.js +0 -84
  46. package/dist/encryption/index.js.map +0 -1
  47. package/dist/types/constants.d.ts +0 -1
  48. package/dist/types/cypher/cypher.types.d.ts +0 -25
  49. package/dist/types/encryption/constants.d.ts +0 -5
  50. package/dist/types/encryption/encryption.types.d.ts +0 -25
  51. package/dist/types/encryption/index.d.ts +0 -27
  52. package/junit.xml +0 -27
@@ -1 +0,0 @@
1
- window.jest_html_reporters_callback__({"numFailedTestSuites":0,"numFailedTests":0,"numPassedTestSuites":1,"numPassedTests":11,"numPendingTestSuites":0,"numPendingTests":0,"numRuntimeErrorTestSuites":0,"numTodoTests":0,"numTotalTestSuites":1,"numTotalTests":11,"startTime":1746524364119,"success":false,"testResults":[{"leaks":false,"numFailingTests":0,"numPassingTests":11,"numPendingTests":0,"numTodoTests":0,"perfStats":{"end":1746524366187,"runtime":1830,"slow":false,"start":1746524364357},"skipped":false,"testFilePath":"/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/test/unit/spec/cypher/index.ts","testResults":[{"ancestorTitles":["Cypher","downloadAndDecryptFile"],"duration":15,"failureDetails":[],"failureMessages":[],"fullName":"Cypher downloadAndDecryptFile should throw an error if keyUri and JWE are not present in fileUri or options","invocations":1,"location":null,"numPassingAsserts":1,"retryReasons":[],"status":"passed","title":"should throw an error if keyUri and JWE are not present in fileUri or options"},{"ancestorTitles":["Cypher","downloadAndDecryptFile"],"duration":3,"failureDetails":[],"failureMessages":[],"fullName":"Cypher downloadAndDecryptFile should use keyUri and JWE from options if not present in fileUri","invocations":1,"location":null,"numPassingAsserts":3,"retryReasons":[],"status":"passed","title":"should use keyUri and JWE from options if not present in fileUri"},{"ancestorTitles":["Cypher","downloadAndDecryptFile"],"duration":3,"failureDetails":[],"failureMessages":[],"fullName":"Cypher downloadAndDecryptFile should decrypt and download the file successfully","invocations":1,"location":null,"numPassingAsserts":3,"retryReasons":[],"status":"passed","title":"should decrypt and download the file successfully"},{"ancestorTitles":["Cypher","downloadAndDecryptFile"],"duration":2,"failureDetails":[],"failureMessages":[],"fullName":"Cypher downloadAndDecryptFile should throw an error if decryption fails","invocations":1,"location":null,"numPassingAsserts":1,"retryReasons":[],"status":"passed","title":"should throw an error if decryption fails"},{"ancestorTitles":["Cypher","downloadAndDecryptFile"],"duration":2,"failureDetails":[],"failureMessages":[],"fullName":"Cypher downloadAndDecryptFile should throw an error if download fails","invocations":1,"location":null,"numPassingAsserts":1,"retryReasons":[],"status":"passed","title":"should throw an error if download fails"},{"ancestorTitles":["Cypher","register"],"duration":3,"failureDetails":[],"failureMessages":[],"fullName":"Cypher register should register the device and connect to Mercury","invocations":1,"location":null,"numPassingAsserts":1,"retryReasons":[],"status":"passed","title":"should register the device and connect to Mercury"},{"ancestorTitles":["Cypher","register"],"duration":2,"failureDetails":[],"failureMessages":[],"fullName":"Cypher register should log already registered message if device is already registered","invocations":1,"location":null,"numPassingAsserts":1,"retryReasons":[],"status":"passed","title":"should log already registered message if device is already registered"},{"ancestorTitles":["Cypher","register"],"duration":4,"failureDetails":[],"failureMessages":[],"fullName":"Cypher register should log an error if device registration fails","invocations":1,"location":null,"numPassingAsserts":2,"retryReasons":[],"status":"passed","title":"should log an error if device registration fails"},{"ancestorTitles":["Cypher","deregister"],"duration":2,"failureDetails":[],"failureMessages":[],"fullName":"Cypher deregister should deregister the device from WDM","invocations":1,"location":null,"numPassingAsserts":1,"retryReasons":[],"status":"passed","title":"should deregister the device from WDM"},{"ancestorTitles":["Cypher","deregister"],"duration":2,"failureDetails":[],"failureMessages":[],"fullName":"Cypher deregister should log an error if device deregistration fails","invocations":1,"location":null,"numPassingAsserts":2,"retryReasons":[],"status":"passed","title":"should log an error if device deregistration fails"},{"ancestorTitles":["Cypher","deregister"],"duration":4,"failureDetails":[],"failureMessages":[],"fullName":"Cypher deregister should not deregister if device is not registered","invocations":1,"location":null,"numPassingAsserts":1,"retryReasons":[],"status":"passed","title":"should not deregister if device is not registered"}],"failureMessage":null,"v8Coverage":[{"codeTransformResult":{"code":"\"use strict\";\n\nObject.defineProperty(exports, \"__esModule\", {\n value: true\n});\nexports.default = void 0;\nvar _webexCore = require(\"@webex/webex-core\");\nvar _constants = require(\"./constants\");\n/**\n * @description Encryption APIs for KMS\n * @class\n */\nclass Cypher extends _webexCore.WebexPlugin {\n namespace = _constants.CYPHER;\n registered = false;\n\n /**\n * Constructs an instance of the class.\n *\n * @param {...any[]} args - The arguments to pass to the superclass constructor.\n *\n * @remarks\n * This constructor calls the superclass constructor with the provided arguments.\n * It also assigns the `webex` property to the `$webex` property, ignoring TypeScript errors.\n */\n constructor(...args) {\n super(...args);\n this.$webex = this.webex;\n }\n\n /**\n * Registers the device to WDM. This is required for metrics and other services.\n * @returns {Promise<void>}\n */\n async register() {\n if (this.registered) {\n this.$webex.logger.info('Cypher: webex.internal.device.register already done');\n return Promise.resolve();\n }\n return this.$webex.internal.device.register().then(() => {\n this.$webex.logger.info('Cypher: webex.internal.device.register successful');\n this.registered = true;\n }).catch(error => {\n this.$webex.logger.error(`Error occurred during device.register() ${error}`);\n throw error;\n });\n }\n\n /**\n * Deregisters the device.\n * @returns {Promise<void>}\n */\n async deregister() {\n if (!this.registered) {\n this.$webex.logger.info('Cypher: webex.internal.device.deregister already done');\n return Promise.resolve();\n }\n return this.$webex.internal.device.unregister().then(() => {\n this.$webex.logger.info('Cypher: webex.internal.device.deregister successful');\n this.registered = false;\n }).catch(error => {\n this.$webex.logger.error(`Error occurred during device.deregister() ${error}`);\n throw error;\n });\n }\n\n /**\n * Downloads and decrypts a file from the given URI.\n *\n * @param {string} fileUri - The URI of the file to be decrypted.\n * @param {FileDownloadOptions} options - The options for file download.\n * @returns {Promise<ArrayBuffer>} A promise that resolves to the decrypted ArrayBuffer.\n * @throws {Error} If the file download or decryption fails.\n *\n * @example\n * ```typescript\n * const attachmentURL = 'https:/myfileurl.xyz/zzz/fileid?keyUri=somekeyuri&JWE=somejwe';\n * const options: FileDownloadOptions = {\n * useFileService: false,\n * jwe: somejwe, // Provide the JWE here if not already present in the attachmentURL\n * keyUri: someKeyUri, // Provide the keyURI here if not already present in the attachmentURL\n * };\n * const decryptedBuf = await webex.cypher.downloadAndDecryptFile(attachmentURL, options);\n * const file = new File([decryptedBuf], \"myFileName.jpeg\", {type: 'image/jpeg'});\n * ```\n */\n async downloadAndDecryptFile(fileUri, {\n useFileService = false,\n ...options\n } = {}) {\n // Sample fileUri: https://someserver.com/3cc29537-7f39-4cce-b204-a529960997fcab9375d8-4fd4-4788-bb12-18426674e95b.jpg?keyUri=kms://kms.wbx2.com/keys/79be16-a4dd-4195-93ef-a72604509aca&JWE=eyJlbmMiOiJBMjU2R0NNIiwiYWxnIjoiZGlyIn0..EHYI5SmnFisaOJgv.6Ie3Zui7LFtAr4eWMSnxXAzfi8Cgixcy2b9jy9cImDWvBjjvJQfwik7qvZewCaq-u8lhtTbjEzsJLeVtOKhW_9RoZt3U0RQ-cKaSh2RaK3N_mvuH7_BsoXCMf5zxaqP1HD-3jXUtVSnqFYvEGdGRWxTCWK-PK9BoIUjX6v5t22CUNYbBQBuHizLWvrGAM0UkSvFNRX5n07Xd3WVJ7OnIhYi0JvOb50lbZIrBn27AQL-_CIKoOQxQLkW9zmVACsVpHxLZx9wIo9XYsBYADRTZaw_l_uTiosAd2P1QAGHgLr_Q_qf1wGUn3eGhmptpPx-YCSJikvs2DttwWOg_-vg4jI3EiIXlc0gGsDnleeNRguCLtrks0PMz5hOp5_w9Z5EW05Cx2UAztnp1hE9_nCvPP9wTzdHsG3flkK82HMbPpeVStWvWmAlzp24vTw2KzYrCemdS2AkrShWsNt6_G7_G8nB4RhUnZ11MKaduE5jYpCXNcTx84RBYwA.vqYHCx8uIn-IMQAsPvrw\n // KeyUri: An attachment level unique ID generated by Webex KMS post encryption of an attachment. In order to\n // decrypt an attachment, KeyUri is a required parameter.\n // JWE: JWE can be decrypted using KMS key to obtain the SCR key.\n // Decrypting an attachment requires the SCR key parameter.\n // We need to download the encrypted file from the given URI and then decrypt it using the SCR key.\n // The decrypted file is then returned.\n\n // step 1: parse the fileUri to get the keyUri and JWE\n // step 2: if keyUri and JWE are not present in the fileUri, use the options\n // step 3: use the keyUri to decrypt the JWE to get the SCR\n // step 4: download the file from the fileUri and decrypt it using the SCR\n\n let keyUri;\n let JWE;\n try {\n const url = new URL(fileUri);\n keyUri = url.searchParams.get('keyUri') ?? undefined;\n JWE = url.searchParams.get('JWE') ?? undefined;\n } catch (error) {\n this.$webex.logger.error(`Cypher: Invalid fileUri: ${error.message}`);\n throw new Error(`Failed to decrypt the JWE: ${error.message}\\nStack: ${error.stack}`);\n }\n\n // Check if the keyUri and JWE are present, else take it from options\n if (!keyUri || !JWE) {\n keyUri = options.keyUri;\n JWE = options.jwe;\n }\n\n // Check if the keyUri and JWE are present, else throw an error\n if (!keyUri || !JWE) {\n throw new Error('KeyUri and JWE are required to decrypt the file. Either provide them in the fileUri or in the options.');\n }\n try {\n // Decrypt the JWE to get the SCR\n const scr = await this.$webex.internal.encryption.decryptScr(keyUri, JWE);\n\n // Start the download and decryption process, returning a promise\n return this.$webex.internal.encryption.download(fileUri, scr, {\n useFileService\n });\n } catch (error) {\n const enhancedError = new Error(`Failed to decrypt or download the file: ${error.message}\\nStack: ${error.stack}`);\n enhancedError.cause = error;\n throw enhancedError;\n }\n }\n}\nvar _default = exports.default = Cypher;\n//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"names":["_webexCore","require","_constants","Cypher","WebexPlugin","namespace","CYPHER","registered","constructor","args","$webex","webex","register","logger","info","Promise","resolve","internal","device","then","catch","error","deregister","unregister","downloadAndDecryptFile","fileUri","useFileService","options","keyUri","JWE","url","URL","searchParams","get","undefined","message","Error","stack","jwe","scr","encryption","decryptScr","download","enhancedError","cause","_default","exports","default"],"sources":["index.ts"],"sourcesContent":["import {WebexPlugin} from '@webex/webex-core';\n\nimport {FileDownloadOptions, IEncryption} from './types';\nimport {CYPHER} from './constants';\nimport {WebexSDK} from '../types';\n\n/**\n * @description Encryption APIs for KMS\n * @class\n */\nclass Cypher extends WebexPlugin implements IEncryption {\n  readonly namespace = CYPHER;\n  private readonly $webex: WebexSDK;\n  registered = false;\n\n  /**\n   * Constructs an instance of the class.\n   *\n   * @param {...any[]} args - The arguments to pass to the superclass constructor.\n   *\n   * @remarks\n   * This constructor calls the superclass constructor with the provided arguments.\n   * It also assigns the `webex` property to the `$webex` property, ignoring TypeScript errors.\n   */\n  constructor(...args: any[]) {\n    super(...args);\n    this.$webex = (this as WebexPlugin).webex as WebexSDK;\n  }\n\n  /**\n   * Registers the device to WDM. This is required for metrics and other services.\n   * @returns {Promise<void>}\n   */\n  async register() {\n    if (this.registered) {\n      this.$webex.logger.info('Cypher: webex.internal.device.register already done');\n\n      return Promise.resolve();\n    }\n\n    return this.$webex.internal.device\n      .register()\n      .then(() => {\n        this.$webex.logger.info('Cypher: webex.internal.device.register successful');\n        this.registered = true;\n      })\n      .catch((error) => {\n        this.$webex.logger.error(`Error occurred during device.register() ${error}`);\n\n        throw error;\n      });\n  }\n\n  /**\n   * Deregisters the device.\n   * @returns {Promise<void>}\n   */\n  async deregister() {\n    if (!this.registered) {\n      this.$webex.logger.info('Cypher: webex.internal.device.deregister already done');\n\n      return Promise.resolve();\n    }\n\n    return this.$webex.internal.device\n      .unregister()\n      .then(() => {\n        this.$webex.logger.info('Cypher: webex.internal.device.deregister successful');\n        this.registered = false;\n      })\n      .catch((error) => {\n        this.$webex.logger.error(`Error occurred during device.deregister() ${error}`);\n\n        throw error;\n      });\n  }\n\n  /**\n   * Downloads and decrypts a file from the given URI.\n   *\n   * @param {string} fileUri - The URI of the file to be decrypted.\n   * @param {FileDownloadOptions} options - The options for file download.\n   * @returns {Promise<ArrayBuffer>} A promise that resolves to the decrypted ArrayBuffer.\n   * @throws {Error} If the file download or decryption fails.\n   *\n   * @example\n   * ```typescript\n   * const attachmentURL = 'https:/myfileurl.xyz/zzz/fileid?keyUri=somekeyuri&JWE=somejwe';\n   * const options: FileDownloadOptions = {\n   *   useFileService: false,\n   *   jwe: somejwe, // Provide the JWE here if not already present in the attachmentURL\n   *   keyUri: someKeyUri, // Provide the keyURI here if not already present in the attachmentURL\n   * };\n   * const decryptedBuf = await webex.cypher.downloadAndDecryptFile(attachmentURL, options);\n   * const file = new File([decryptedBuf], \"myFileName.jpeg\", {type: 'image/jpeg'});\n   * ```\n   */\n  public async downloadAndDecryptFile(\n    fileUri: string,\n    {useFileService = false, ...options}: FileDownloadOptions = {}\n  ): Promise<ArrayBuffer> {\n    // Sample fileUri: https://someserver.com/3cc29537-7f39-4cce-b204-a529960997fcab9375d8-4fd4-4788-bb12-18426674e95b.jpg?keyUri=kms://kms.wbx2.com/keys/79be16-a4dd-4195-93ef-a72604509aca&JWE=eyJlbmMiOiJBMjU2R0NNIiwiYWxnIjoiZGlyIn0..EHYI5SmnFisaOJgv.6Ie3Zui7LFtAr4eWMSnxXAzfi8Cgixcy2b9jy9cImDWvBjjvJQfwik7qvZewCaq-u8lhtTbjEzsJLeVtOKhW_9RoZt3U0RQ-cKaSh2RaK3N_mvuH7_BsoXCMf5zxaqP1HD-3jXUtVSnqFYvEGdGRWxTCWK-PK9BoIUjX6v5t22CUNYbBQBuHizLWvrGAM0UkSvFNRX5n07Xd3WVJ7OnIhYi0JvOb50lbZIrBn27AQL-_CIKoOQxQLkW9zmVACsVpHxLZx9wIo9XYsBYADRTZaw_l_uTiosAd2P1QAGHgLr_Q_qf1wGUn3eGhmptpPx-YCSJikvs2DttwWOg_-vg4jI3EiIXlc0gGsDnleeNRguCLtrks0PMz5hOp5_w9Z5EW05Cx2UAztnp1hE9_nCvPP9wTzdHsG3flkK82HMbPpeVStWvWmAlzp24vTw2KzYrCemdS2AkrShWsNt6_G7_G8nB4RhUnZ11MKaduE5jYpCXNcTx84RBYwA.vqYHCx8uIn-IMQAsPvrw\n    // KeyUri: An attachment level unique ID generated by Webex KMS post encryption of an attachment. In order to\n    // decrypt an attachment, KeyUri is a required parameter.\n    // JWE: JWE can be decrypted using KMS key to obtain the SCR key.\n    // Decrypting an attachment requires the SCR key parameter.\n    // We need to download the encrypted file from the given URI and then decrypt it using the SCR key.\n    // The decrypted file is then returned.\n\n    // step 1: parse the fileUri to get the keyUri and JWE\n    // step 2: if keyUri and JWE are not present in the fileUri, use the options\n    // step 3: use the keyUri to decrypt the JWE to get the SCR\n    // step 4: download the file from the fileUri and decrypt it using the SCR\n\n    let keyUri: string | undefined;\n    let JWE: string | undefined;\n    try {\n      const url = new URL(fileUri);\n      keyUri = url.searchParams.get('keyUri') ?? undefined;\n      JWE = url.searchParams.get('JWE') ?? undefined;\n    } catch (error) {\n      this.$webex.logger.error(`Cypher: Invalid fileUri: ${(error as Error).message}`);\n      throw new Error(\n        `Failed to decrypt the JWE: ${(error as Error).message}\\nStack: ${(error as Error).stack}`\n      );\n    }\n\n    // Check if the keyUri and JWE are present, else take it from options\n    if (!keyUri || !JWE) {\n      keyUri = options.keyUri;\n      JWE = options.jwe;\n    }\n\n    // Check if the keyUri and JWE are present, else throw an error\n    if (!keyUri || !JWE) {\n      throw new Error(\n        'KeyUri and JWE are required to decrypt the file. Either provide them in the fileUri or in the options.'\n      );\n    }\n\n    try {\n      // Decrypt the JWE to get the SCR\n      const scr = await this.$webex.internal.encryption.decryptScr(keyUri, JWE);\n\n      // Start the download and decryption process, returning a promise\n      return this.$webex.internal.encryption.download(fileUri, scr, {useFileService});\n    } catch (error) {\n      const enhancedError = new Error(\n        `Failed to decrypt or download the file: ${(error as Error).message}\\nStack: ${\n          (error as Error).stack\n        }`\n      );\n      enhancedError.cause = error;\n      throw enhancedError;\n    }\n  }\n}\n\nexport default Cypher;\n"],"mappings":";;;;;;AAAA,IAAAA,UAAA,GAAAC,OAAA;AAGA,IAAAC,UAAA,GAAAD,OAAA;AAGA;AACA;AACA;AACA;AACA,MAAME,MAAM,SAASC,sBAAW,CAAwB;EAC7CC,SAAS,GAAGC,iBAAM;EAE3BC,UAAU,GAAG,KAAK;;EAElB;AACF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACEC,WAAWA,CAAC,GAAGC,IAAW,EAAE;IAC1B,KAAK,CAAC,GAAGA,IAAI,CAAC;IACd,IAAI,CAACC,MAAM,GAAI,IAAI,CAAiBC,KAAiB;EACvD;;EAEA;AACF;AACA;AACA;EACE,MAAMC,QAAQA,CAAA,EAAG;IACf,IAAI,IAAI,CAACL,UAAU,EAAE;MACnB,IAAI,CAACG,MAAM,CAACG,MAAM,CAACC,IAAI,CAAC,qDAAqD,CAAC;MAE9E,OAAOC,OAAO,CAACC,OAAO,CAAC,CAAC;IAC1B;IAEA,OAAO,IAAI,CAACN,MAAM,CAACO,QAAQ,CAACC,MAAM,CAC/BN,QAAQ,CAAC,CAAC,CACVO,IAAI,CAAC,MAAM;MACV,IAAI,CAACT,MAAM,CAACG,MAAM,CAACC,IAAI,CAAC,mDAAmD,CAAC;MAC5E,IAAI,CAACP,UAAU,GAAG,IAAI;IACxB,CAAC,CAAC,CACDa,KAAK,CAAEC,KAAK,IAAK;MAChB,IAAI,CAACX,MAAM,CAACG,MAAM,CAACQ,KAAK,CAAE,2CAA0CA,KAAM,EAAC,CAAC;MAE5E,MAAMA,KAAK;IACb,CAAC,CAAC;EACN;;EAEA;AACF;AACA;AACA;EACE,MAAMC,UAAUA,CAAA,EAAG;IACjB,IAAI,CAAC,IAAI,CAACf,UAAU,EAAE;MACpB,IAAI,CAACG,MAAM,CAACG,MAAM,CAACC,IAAI,CAAC,uDAAuD,CAAC;MAEhF,OAAOC,OAAO,CAACC,OAAO,CAAC,CAAC;IAC1B;IAEA,OAAO,IAAI,CAACN,MAAM,CAACO,QAAQ,CAACC,MAAM,CAC/BK,UAAU,CAAC,CAAC,CACZJ,IAAI,CAAC,MAAM;MACV,IAAI,CAACT,MAAM,CAACG,MAAM,CAACC,IAAI,CAAC,qDAAqD,CAAC;MAC9E,IAAI,CAACP,UAAU,GAAG,KAAK;IACzB,CAAC,CAAC,CACDa,KAAK,CAAEC,KAAK,IAAK;MAChB,IAAI,CAACX,MAAM,CAACG,MAAM,CAACQ,KAAK,CAAE,6CAA4CA,KAAM,EAAC,CAAC;MAE9E,MAAMA,KAAK;IACb,CAAC,CAAC;EACN;;EAEA;AACF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACE,MAAaG,sBAAsBA,CACjCC,OAAe,EACf;IAACC,cAAc,GAAG,KAAK;IAAE,GAAGC;EAA4B,CAAC,GAAG,CAAC,CAAC,EACxC;IACtB;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA;IACA;IACA;IACA;;IAEA,IAAIC,MAA0B;IAC9B,IAAIC,GAAuB;IAC3B,IAAI;MACF,MAAMC,GAAG,GAAG,IAAIC,GAAG,CAACN,OAAO,CAAC;MAC5BG,MAAM,GAAGE,GAAG,CAACE,YAAY,CAACC,GAAG,CAAC,QAAQ,CAAC,IAAIC,SAAS;MACpDL,GAAG,GAAGC,GAAG,CAACE,YAAY,CAACC,GAAG,CAAC,KAAK,CAAC,IAAIC,SAAS;IAChD,CAAC,CAAC,OAAOb,KAAK,EAAE;MACd,IAAI,CAACX,MAAM,CAACG,MAAM,CAACQ,KAAK,CAAE,4BAA4BA,KAAK,CAAWc,OAAQ,EAAC,CAAC;MAChF,MAAM,IAAIC,KAAK,CACZ,8BAA8Bf,KAAK,CAAWc,OAAQ,YAAYd,KAAK,CAAWgB,KAAM,EAC3F,CAAC;IACH;;IAEA;IACA,IAAI,CAACT,MAAM,IAAI,CAACC,GAAG,EAAE;MACnBD,MAAM,GAAGD,OAAO,CAACC,MAAM;MACvBC,GAAG,GAAGF,OAAO,CAACW,GAAG;IACnB;;IAEA;IACA,IAAI,CAACV,MAAM,IAAI,CAACC,GAAG,EAAE;MACnB,MAAM,IAAIO,KAAK,CACb,wGACF,CAAC;IACH;IAEA,IAAI;MACF;MACA,MAAMG,GAAG,GAAG,MAAM,IAAI,CAAC7B,MAAM,CAACO,QAAQ,CAACuB,UAAU,CAACC,UAAU,CAACb,MAAM,EAAEC,GAAG,CAAC;;MAEzE;MACA,OAAO,IAAI,CAACnB,MAAM,CAACO,QAAQ,CAACuB,UAAU,CAACE,QAAQ,CAACjB,OAAO,EAAEc,GAAG,EAAE;QAACb;MAAc,CAAC,CAAC;IACjF,CAAC,CAAC,OAAOL,KAAK,EAAE;MACd,MAAMsB,aAAa,GAAG,IAAIP,KAAK,CAC5B,2CAA2Cf,KAAK,CAAWc,OAAQ,YACjEd,KAAK,CAAWgB,KAClB,EACH,CAAC;MACDM,aAAa,CAACC,KAAK,GAAGvB,KAAK;MAC3B,MAAMsB,aAAa;IACrB;EACF;AACF;AAAC,IAAAE,QAAA,GAAAC,OAAA,CAAAC,OAAA,GAEc5C,MAAM"}","originalCode":"import {WebexPlugin} from '@webex/webex-core';\n\nimport {FileDownloadOptions, IEncryption} from './types';\nimport {CYPHER} from './constants';\nimport {WebexSDK} from '../types';\n\n/**\n * @description Encryption APIs for KMS\n * @class\n */\nclass Cypher extends WebexPlugin implements IEncryption {\n readonly namespace = CYPHER;\n private readonly $webex: WebexSDK;\n registered = false;\n\n /**\n * Constructs an instance of the class.\n *\n * @param {...any[]} args - The arguments to pass to the superclass constructor.\n *\n * @remarks\n * This constructor calls the superclass constructor with the provided arguments.\n * It also assigns the `webex` property to the `$webex` property, ignoring TypeScript errors.\n */\n constructor(...args: any[]) {\n super(...args);\n this.$webex = (this as WebexPlugin).webex as WebexSDK;\n }\n\n /**\n * Registers the device to WDM. This is required for metrics and other services.\n * @returns {Promise<void>}\n */\n async register() {\n if (this.registered) {\n this.$webex.logger.info('Cypher: webex.internal.device.register already done');\n\n return Promise.resolve();\n }\n\n return this.$webex.internal.device\n .register()\n .then(() => {\n this.$webex.logger.info('Cypher: webex.internal.device.register successful');\n this.registered = true;\n })\n .catch((error) => {\n this.$webex.logger.error(`Error occurred during device.register() ${error}`);\n\n throw error;\n });\n }\n\n /**\n * Deregisters the device.\n * @returns {Promise<void>}\n */\n async deregister() {\n if (!this.registered) {\n this.$webex.logger.info('Cypher: webex.internal.device.deregister already done');\n\n return Promise.resolve();\n }\n\n return this.$webex.internal.device\n .unregister()\n .then(() => {\n this.$webex.logger.info('Cypher: webex.internal.device.deregister successful');\n this.registered = false;\n })\n .catch((error) => {\n this.$webex.logger.error(`Error occurred during device.deregister() ${error}`);\n\n throw error;\n });\n }\n\n /**\n * Downloads and decrypts a file from the given URI.\n *\n * @param {string} fileUri - The URI of the file to be decrypted.\n * @param {FileDownloadOptions} options - The options for file download.\n * @returns {Promise<ArrayBuffer>} A promise that resolves to the decrypted ArrayBuffer.\n * @throws {Error} If the file download or decryption fails.\n *\n * @example\n * ```typescript\n * const attachmentURL = 'https:/myfileurl.xyz/zzz/fileid?keyUri=somekeyuri&JWE=somejwe';\n * const options: FileDownloadOptions = {\n * useFileService: false,\n * jwe: somejwe, // Provide the JWE here if not already present in the attachmentURL\n * keyUri: someKeyUri, // Provide the keyURI here if not already present in the attachmentURL\n * };\n * const decryptedBuf = await webex.cypher.downloadAndDecryptFile(attachmentURL, options);\n * const file = new File([decryptedBuf], \"myFileName.jpeg\", {type: 'image/jpeg'});\n * ```\n */\n public async downloadAndDecryptFile(\n fileUri: string,\n {useFileService = false, ...options}: FileDownloadOptions = {}\n ): Promise<ArrayBuffer> {\n // Sample fileUri: https://someserver.com/3cc29537-7f39-4cce-b204-a529960997fcab9375d8-4fd4-4788-bb12-18426674e95b.jpg?keyUri=kms://kms.wbx2.com/keys/79be16-a4dd-4195-93ef-a72604509aca&JWE=eyJlbmMiOiJBMjU2R0NNIiwiYWxnIjoiZGlyIn0..EHYI5SmnFisaOJgv.6Ie3Zui7LFtAr4eWMSnxXAzfi8Cgixcy2b9jy9cImDWvBjjvJQfwik7qvZewCaq-u8lhtTbjEzsJLeVtOKhW_9RoZt3U0RQ-cKaSh2RaK3N_mvuH7_BsoXCMf5zxaqP1HD-3jXUtVSnqFYvEGdGRWxTCWK-PK9BoIUjX6v5t22CUNYbBQBuHizLWvrGAM0UkSvFNRX5n07Xd3WVJ7OnIhYi0JvOb50lbZIrBn27AQL-_CIKoOQxQLkW9zmVACsVpHxLZx9wIo9XYsBYADRTZaw_l_uTiosAd2P1QAGHgLr_Q_qf1wGUn3eGhmptpPx-YCSJikvs2DttwWOg_-vg4jI3EiIXlc0gGsDnleeNRguCLtrks0PMz5hOp5_w9Z5EW05Cx2UAztnp1hE9_nCvPP9wTzdHsG3flkK82HMbPpeVStWvWmAlzp24vTw2KzYrCemdS2AkrShWsNt6_G7_G8nB4RhUnZ11MKaduE5jYpCXNcTx84RBYwA.vqYHCx8uIn-IMQAsPvrw\n // KeyUri: An attachment level unique ID generated by Webex KMS post encryption of an attachment. In order to\n // decrypt an attachment, KeyUri is a required parameter.\n // JWE: JWE can be decrypted using KMS key to obtain the SCR key.\n // Decrypting an attachment requires the SCR key parameter.\n // We need to download the encrypted file from the given URI and then decrypt it using the SCR key.\n // The decrypted file is then returned.\n\n // step 1: parse the fileUri to get the keyUri and JWE\n // step 2: if keyUri and JWE are not present in the fileUri, use the options\n // step 3: use the keyUri to decrypt the JWE to get the SCR\n // step 4: download the file from the fileUri and decrypt it using the SCR\n\n let keyUri: string | undefined;\n let JWE: string | undefined;\n try {\n const url = new URL(fileUri);\n keyUri = url.searchParams.get('keyUri') ?? undefined;\n JWE = url.searchParams.get('JWE') ?? undefined;\n } catch (error) {\n this.$webex.logger.error(`Cypher: Invalid fileUri: ${(error as Error).message}`);\n throw new Error(\n `Failed to decrypt the JWE: ${(error as Error).message}\\nStack: ${(error as Error).stack}`\n );\n }\n\n // Check if the keyUri and JWE are present, else take it from options\n if (!keyUri || !JWE) {\n keyUri = options.keyUri;\n JWE = options.jwe;\n }\n\n // Check if the keyUri and JWE are present, else throw an error\n if (!keyUri || !JWE) {\n throw new Error(\n 'KeyUri and JWE are required to decrypt the file. Either provide them in the fileUri or in the options.'\n );\n }\n\n try {\n // Decrypt the JWE to get the SCR\n const scr = await this.$webex.internal.encryption.decryptScr(keyUri, JWE);\n\n // Start the download and decryption process, returning a promise\n return this.$webex.internal.encryption.download(fileUri, scr, {useFileService});\n } catch (error) {\n const enhancedError = new Error(\n `Failed to decrypt or download the file: ${(error as Error).message}\\nStack: ${\n (error as Error).stack\n }`\n );\n enhancedError.cause = error;\n throw enhancedError;\n }\n }\n}\n\nexport default Cypher;\n","sourceMapPath":"/private/var/folders/hq/_411y9s10gl8z8d1w0_g2z8h0000gn/T/jest_dx/jest-transform-cache-0a4b7bd160af2d722717f085b199d958-79ef2876fae7ca75eedb2aa53dc48338/8f/index_8ff41486168489e897ec514d1e889f2c.map","wrapperLength":82},"result":{"scriptId":"2898","url":"/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/src/cypher/index.ts","functions":[{"functionName":"","ranges":[{"startOffset":0,"endOffset":18986,"count":1}],"isBlockCoverage":true},{"functionName":"Object.<anonymous>","ranges":[{"startOffset":23,"endOffset":18983,"count":1}],"isBlockCoverage":true},{"functionName":"<instance_members_initializer>","ranges":[{"startOffset":382,"endOffset":433,"count":22}],"isBlockCoverage":true},{"functionName":"Cypher","ranges":[{"startOffset":779,"endOffset":855,"count":22}],"isBlockCoverage":true},{"functionName":"register","ranges":[{"startOffset":984,"endOffset":1469,"count":3},{"startOffset":1028,"endOffset":1153,"count":1},{"startOffset":1153,"endOffset":1468,"count":2}],"isBlockCoverage":true},{"functionName":"","ranges":[{"startOffset":1209,"endOffset":1336,"count":1}],"isBlockCoverage":true},{"functionName":"","ranges":[{"startOffset":1344,"endOffset":1463,"count":1}],"isBlockCoverage":true},{"functionName":"deregister","ranges":[{"startOffset":1544,"endOffset":2041,"count":3},{"startOffset":1591,"endOffset":1718,"count":1},{"startOffset":1718,"endOffset":2040,"count":2}],"isBlockCoverage":true},{"functionName":"","ranges":[{"startOffset":1776,"endOffset":1906,"count":1}],"isBlockCoverage":true},{"functionName":"","ranges":[{"startOffset":1914,"endOffset":2035,"count":1}],"isBlockCoverage":true},{"functionName":"downloadAndDecryptFile","ranges":[{"startOffset":3000,"endOffset":5917,"count":5},{"startOffset":4734,"endOffset":4746,"count":2},{"startOffset":4788,"endOffset":4800,"count":2},{"startOffset":4808,"endOffset":4999,"count":0},{"startOffset":5091,"endOffset":5098,"count":3},{"startOffset":5100,"endOffset":5163,"count":2},{"startOffset":5249,"endOffset":5256,"count":4},{"startOffset":5258,"endOffset":5394,"count":1},{"startOffset":5394,"endOffset":5525,"count":4},{"startOffset":5525,"endOffset":5708,"count":3},{"startOffset":5708,"endOffset":5913,"count":1}],"isBlockCoverage":true}]}},{"codeTransformResult":{"code":"\"use strict\";\n\nObject.defineProperty(exports, \"__esModule\", {\n value: true\n});\nexports.DECRYPTION_SUCCESS = exports.DECRYPTION_IN_PROGRESS = exports.DECRYPTION_FAILED = exports.DECRYPTION = exports.CYPHER = void 0;\nconst CYPHER = exports.CYPHER = 'cypher';\nconst DECRYPTION = exports.DECRYPTION = 'decryption';\nconst DECRYPTION_FAILED = exports.DECRYPTION_FAILED = 'decryptionFailed';\nconst DECRYPTION_IN_PROGRESS = exports.DECRYPTION_IN_PROGRESS = 'decryptionInProgress';\nconst DECRYPTION_SUCCESS = exports.DECRYPTION_SUCCESS = 'decryptionSuccess';\n//# sourceMappingURL=data:application/json;charset=utf-8;base64,eyJ2ZXJzaW9uIjozLCJuYW1lcyI6WyJDWVBIRVIiLCJleHBvcnRzIiwiREVDUllQVElPTiIsIkRFQ1JZUFRJT05fRkFJTEVEIiwiREVDUllQVElPTl9JTl9QUk9HUkVTUyIsIkRFQ1JZUFRJT05fU1VDQ0VTUyJdLCJzb3VyY2VzIjpbImNvbnN0YW50cy50cyJdLCJzb3VyY2VzQ29udGVudCI6WyJleHBvcnQgY29uc3QgQ1lQSEVSID0gJ2N5cGhlcic7XG5leHBvcnQgY29uc3QgREVDUllQVElPTiA9ICdkZWNyeXB0aW9uJztcbmV4cG9ydCBjb25zdCBERUNSWVBUSU9OX0ZBSUxFRCA9ICdkZWNyeXB0aW9uRmFpbGVkJztcbmV4cG9ydCBjb25zdCBERUNSWVBUSU9OX0lOX1BST0dSRVNTID0gJ2RlY3J5cHRpb25JblByb2dyZXNzJztcbmV4cG9ydCBjb25zdCBERUNSWVBUSU9OX1NVQ0NFU1MgPSAnZGVjcnlwdGlvblN1Y2Nlc3MnO1xuIl0sIm1hcHBpbmdzIjoiOzs7Ozs7QUFBTyxNQUFNQSxNQUFNLEdBQUFDLE9BQUEsQ0FBQUQsTUFBQSxHQUFHLFFBQVE7QUFDdkIsTUFBTUUsVUFBVSxHQUFBRCxPQUFBLENBQUFDLFVBQUEsR0FBRyxZQUFZO0FBQy9CLE1BQU1DLGlCQUFpQixHQUFBRixPQUFBLENBQUFFLGlCQUFBLEdBQUcsa0JBQWtCO0FBQzVDLE1BQU1DLHNCQUFzQixHQUFBSCxPQUFBLENBQUFHLHNCQUFBLEdBQUcsc0JBQXNCO0FBQ3JELE1BQU1DLGtCQUFrQixHQUFBSixPQUFBLENBQUFJLGtCQUFBLEdBQUcsbUJBQW1CIn0=","originalCode":"export const CYPHER = 'cypher';\nexport const DECRYPTION = 'decryption';\nexport const DECRYPTION_FAILED = 'decryptionFailed';\nexport const DECRYPTION_IN_PROGRESS = 'decryptionInProgress';\nexport const DECRYPTION_SUCCESS = 'decryptionSuccess';\n","sourceMapPath":"/private/var/folders/hq/_411y9s10gl8z8d1w0_g2z8h0000gn/T/jest_dx/jest-transform-cache-0a4b7bd160af2d722717f085b199d958-79ef2876fae7ca75eedb2aa53dc48338/17/constants_17bebc04c6c6b8cc13532bb150dd1395.map","wrapperLength":82},"result":{"scriptId":"3411","url":"/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/src/cypher/constants.ts","functions":[{"functionName":"","ranges":[{"startOffset":0,"endOffset":1630,"count":1}],"isBlockCoverage":true},{"functionName":"Object.<anonymous>","ranges":[{"startOffset":23,"endOffset":1627,"count":1}],"isBlockCoverage":true}]}}]}],"wasInterrupted":false,"config":{"bail":0,"changedFilesWithAncestor":false,"ci":false,"collectCoverage":true,"collectCoverageFrom":[],"coverageDirectory":"/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/coverage","coverageProvider":"v8","coverageReporters":["clover","json","lcov"],"coverageThreshold":{"global":{"lines":85,"functions":85,"branches":85,"statements":85}},"detectLeaks":false,"detectOpenHandles":false,"errorOnDeprecated":false,"expand":false,"findRelatedTests":false,"forceExit":false,"json":false,"lastCommit":false,"listTests":false,"logHeapUsage":false,"maxConcurrency":5,"maxWorkers":9,"noStackTrace":false,"nonFlagArgs":["/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/test/unit/spec/cypher/index.ts"],"notify":false,"notifyMode":"failure-change","onlyChanged":false,"onlyFailures":false,"openHandlesTimeout":1000,"passWithNoTests":false,"projects":[],"reporters":[["default",{}],["/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/node_modules/jest-junit/index.js",{"outputDirectory":"coverage/junit","outputName":"coverage-junit.xml","classNameTemplate":"{classname}","titleTemplate":"{title}"}],["/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/node_modules/jest-html-reporters/index.js",{"publicPath":"./coverage","filename":"jest-report.html","openReport":false}]],"rootDir":"/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption","runTestsByPath":false,"seed":159443417,"skipFilter":false,"snapshotFormat":{"escapeString":false,"printBasicPrototype":false},"testFailureExitCode":1,"testPathPattern":"/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/test/unit/spec/cypher/index.ts","testResultsProcessor":"/Users/bhabalan/dev/webex-js-sdk/packages/@webex/plugin-encryption/node_modules/jest-junit/index.js","testSequencer":"/Users/bhabalan/dev/webex-js-sdk/node_modules/@jest/test-sequencer/build/index.js","updateSnapshot":"new","useStderr":false,"verbose":true,"watch":false,"watchAll":false,"watchman":true,"workerThreads":false,"coverageLinkPath":"lcov-report/index.html"},"endTime":1746524366198,"_reporterOptions":{"publicPath":"./coverage","filename":"jest-report.html","expand":false,"pageTitle":"","hideIcon":false,"testCommand":"npx jest","openReport":false,"failureMessageOnly":0,"enableMergeData":false,"dataMergeLevel":1,"inlineSource":false,"urlForTestFiles":""},"attachInfos":{}})
@@ -1 +0,0 @@
1
- <!doctype html><html><head><meta charset="utf-8"><meta http-equiv="Content-Type" content="text/html;charset=utf-8"><meta name="keywords" contect="jest, reporters"><meta name="author" contect="hazyzh"><meta name="viewport" content="width=device-width,initial-scale=1,user-scalable=0,minimum-scale=1,maximum-scale=1"><link rel="shortcut icon" href="data:image/png;base64,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"></head><title>Report</title><body><div id="app"></div><script src="./jest-html-reporters-attach/jest-report/index.js"></script></body></html>
@@ -1,27 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8"?>
2
- <testsuites name="jest tests" tests="11" failures="0" errors="0" time="2.077">
3
- <testsuite name="Cypher" errors="0" failures="0" skipped="0" timestamp="2025-05-06T09:39:24" time="1.83" tests="11">
4
- <testcase classname="Cypher downloadAndDecryptFile" name="should throw an error if keyUri and JWE are not present in fileUri or options" time="0.015">
5
- </testcase>
6
- <testcase classname="Cypher downloadAndDecryptFile" name="should use keyUri and JWE from options if not present in fileUri" time="0.003">
7
- </testcase>
8
- <testcase classname="Cypher downloadAndDecryptFile" name="should decrypt and download the file successfully" time="0.003">
9
- </testcase>
10
- <testcase classname="Cypher downloadAndDecryptFile" name="should throw an error if decryption fails" time="0.002">
11
- </testcase>
12
- <testcase classname="Cypher downloadAndDecryptFile" name="should throw an error if download fails" time="0.002">
13
- </testcase>
14
- <testcase classname="Cypher register" name="should register the device and connect to Mercury" time="0.003">
15
- </testcase>
16
- <testcase classname="Cypher register" name="should log already registered message if device is already registered" time="0.002">
17
- </testcase>
18
- <testcase classname="Cypher register" name="should log an error if device registration fails" time="0.004">
19
- </testcase>
20
- <testcase classname="Cypher deregister" name="should deregister the device from WDM" time="0.002">
21
- </testcase>
22
- <testcase classname="Cypher deregister" name="should log an error if device deregistration fails" time="0.002">
23
- </testcase>
24
- <testcase classname="Cypher deregister" name="should not deregister if device is not registered" time="0.004">
25
- </testcase>
26
- </testsuite>
27
- </testsuites>
@@ -1,224 +0,0 @@
1
- body, html {
2
- margin:0; padding: 0;
3
- height: 100%;
4
- }
5
- body {
6
- font-family: Helvetica Neue, Helvetica, Arial;
7
- font-size: 14px;
8
- color:#333;
9
- }
10
- .small { font-size: 12px; }
11
- *, *:after, *:before {
12
- -webkit-box-sizing:border-box;
13
- -moz-box-sizing:border-box;
14
- box-sizing:border-box;
15
- }
16
- h1 { font-size: 20px; margin: 0;}
17
- h2 { font-size: 14px; }
18
- pre {
19
- font: 12px/1.4 Consolas, "Liberation Mono", Menlo, Courier, monospace;
20
- margin: 0;
21
- padding: 0;
22
- -moz-tab-size: 2;
23
- -o-tab-size: 2;
24
- tab-size: 2;
25
- }
26
- a { color:#0074D9; text-decoration:none; }
27
- a:hover { text-decoration:underline; }
28
- .strong { font-weight: bold; }
29
- .space-top1 { padding: 10px 0 0 0; }
30
- .pad2y { padding: 20px 0; }
31
- .pad1y { padding: 10px 0; }
32
- .pad2x { padding: 0 20px; }
33
- .pad2 { padding: 20px; }
34
- .pad1 { padding: 10px; }
35
- .space-left2 { padding-left:55px; }
36
- .space-right2 { padding-right:20px; }
37
- .center { text-align:center; }
38
- .clearfix { display:block; }
39
- .clearfix:after {
40
- content:'';
41
- display:block;
42
- height:0;
43
- clear:both;
44
- visibility:hidden;
45
- }
46
- .fl { float: left; }
47
- @media only screen and (max-width:640px) {
48
- .col3 { width:100%; max-width:100%; }
49
- .hide-mobile { display:none!important; }
50
- }
51
-
52
- .quiet {
53
- color: #7f7f7f;
54
- color: rgba(0,0,0,0.5);
55
- }
56
- .quiet a { opacity: 0.7; }
57
-
58
- .fraction {
59
- font-family: Consolas, 'Liberation Mono', Menlo, Courier, monospace;
60
- font-size: 10px;
61
- color: #555;
62
- background: #E8E8E8;
63
- padding: 4px 5px;
64
- border-radius: 3px;
65
- vertical-align: middle;
66
- }
67
-
68
- div.path a:link, div.path a:visited { color: #333; }
69
- table.coverage {
70
- border-collapse: collapse;
71
- margin: 10px 0 0 0;
72
- padding: 0;
73
- }
74
-
75
- table.coverage td {
76
- margin: 0;
77
- padding: 0;
78
- vertical-align: top;
79
- }
80
- table.coverage td.line-count {
81
- text-align: right;
82
- padding: 0 5px 0 20px;
83
- }
84
- table.coverage td.line-coverage {
85
- text-align: right;
86
- padding-right: 10px;
87
- min-width:20px;
88
- }
89
-
90
- table.coverage td span.cline-any {
91
- display: inline-block;
92
- padding: 0 5px;
93
- width: 100%;
94
- }
95
- .missing-if-branch {
96
- display: inline-block;
97
- margin-right: 5px;
98
- border-radius: 3px;
99
- position: relative;
100
- padding: 0 4px;
101
- background: #333;
102
- color: yellow;
103
- }
104
-
105
- .skip-if-branch {
106
- display: none;
107
- margin-right: 10px;
108
- position: relative;
109
- padding: 0 4px;
110
- background: #ccc;
111
- color: white;
112
- }
113
- .missing-if-branch .typ, .skip-if-branch .typ {
114
- color: inherit !important;
115
- }
116
- .coverage-summary {
117
- border-collapse: collapse;
118
- width: 100%;
119
- }
120
- .coverage-summary tr { border-bottom: 1px solid #bbb; }
121
- .keyline-all { border: 1px solid #ddd; }
122
- .coverage-summary td, .coverage-summary th { padding: 10px; }
123
- .coverage-summary tbody { border: 1px solid #bbb; }
124
- .coverage-summary td { border-right: 1px solid #bbb; }
125
- .coverage-summary td:last-child { border-right: none; }
126
- .coverage-summary th {
127
- text-align: left;
128
- font-weight: normal;
129
- white-space: nowrap;
130
- }
131
- .coverage-summary th.file { border-right: none !important; }
132
- .coverage-summary th.pct { }
133
- .coverage-summary th.pic,
134
- .coverage-summary th.abs,
135
- .coverage-summary td.pct,
136
- .coverage-summary td.abs { text-align: right; }
137
- .coverage-summary td.file { white-space: nowrap; }
138
- .coverage-summary td.pic { min-width: 120px !important; }
139
- .coverage-summary tfoot td { }
140
-
141
- .coverage-summary .sorter {
142
- height: 10px;
143
- width: 7px;
144
- display: inline-block;
145
- margin-left: 0.5em;
146
- background: url(sort-arrow-sprite.png) no-repeat scroll 0 0 transparent;
147
- }
148
- .coverage-summary .sorted .sorter {
149
- background-position: 0 -20px;
150
- }
151
- .coverage-summary .sorted-desc .sorter {
152
- background-position: 0 -10px;
153
- }
154
- .status-line { height: 10px; }
155
- /* yellow */
156
- .cbranch-no { background: yellow !important; color: #111; }
157
- /* dark red */
158
- .red.solid, .status-line.low, .low .cover-fill { background:#C21F39 }
159
- .low .chart { border:1px solid #C21F39 }
160
- .highlighted,
161
- .highlighted .cstat-no, .highlighted .fstat-no, .highlighted .cbranch-no{
162
- background: #C21F39 !important;
163
- }
164
- /* medium red */
165
- .cstat-no, .fstat-no, .cbranch-no, .cbranch-no { background:#F6C6CE }
166
- /* light red */
167
- .low, .cline-no { background:#FCE1E5 }
168
- /* light green */
169
- .high, .cline-yes { background:rgb(230,245,208) }
170
- /* medium green */
171
- .cstat-yes { background:rgb(161,215,106) }
172
- /* dark green */
173
- .status-line.high, .high .cover-fill { background:rgb(77,146,33) }
174
- .high .chart { border:1px solid rgb(77,146,33) }
175
- /* dark yellow (gold) */
176
- .status-line.medium, .medium .cover-fill { background: #f9cd0b; }
177
- .medium .chart { border:1px solid #f9cd0b; }
178
- /* light yellow */
179
- .medium { background: #fff4c2; }
180
-
181
- .cstat-skip { background: #ddd; color: #111; }
182
- .fstat-skip { background: #ddd; color: #111 !important; }
183
- .cbranch-skip { background: #ddd !important; color: #111; }
184
-
185
- span.cline-neutral { background: #eaeaea; }
186
-
187
- .coverage-summary td.empty {
188
- opacity: .5;
189
- padding-top: 4px;
190
- padding-bottom: 4px;
191
- line-height: 1;
192
- color: #888;
193
- }
194
-
195
- .cover-fill, .cover-empty {
196
- display:inline-block;
197
- height: 12px;
198
- }
199
- .chart {
200
- line-height: 0;
201
- }
202
- .cover-empty {
203
- background: white;
204
- }
205
- .cover-full {
206
- border-right: none !important;
207
- }
208
- pre.prettyprint {
209
- border: none !important;
210
- padding: 0 !important;
211
- margin: 0 !important;
212
- }
213
- .com { color: #999 !important; }
214
- .ignore-none { color: #999; font-weight: normal; }
215
-
216
- .wrapper {
217
- min-height: 100%;
218
- height: auto !important;
219
- height: 100%;
220
- margin: 0 auto -48px;
221
- }
222
- .footer, .push {
223
- height: 48px;
224
- }
@@ -1,87 +0,0 @@
1
- /* eslint-disable */
2
- var jumpToCode = (function init() {
3
- // Classes of code we would like to highlight in the file view
4
- var missingCoverageClasses = ['.cbranch-no', '.cstat-no', '.fstat-no'];
5
-
6
- // Elements to highlight in the file listing view
7
- var fileListingElements = ['td.pct.low'];
8
-
9
- // We don't want to select elements that are direct descendants of another match
10
- var notSelector = ':not(' + missingCoverageClasses.join('):not(') + ') > '; // becomes `:not(a):not(b) > `
11
-
12
- // Selecter that finds elements on the page to which we can jump
13
- var selector =
14
- fileListingElements.join(', ') +
15
- ', ' +
16
- notSelector +
17
- missingCoverageClasses.join(', ' + notSelector); // becomes `:not(a):not(b) > a, :not(a):not(b) > b`
18
-
19
- // The NodeList of matching elements
20
- var missingCoverageElements = document.querySelectorAll(selector);
21
-
22
- var currentIndex;
23
-
24
- function toggleClass(index) {
25
- missingCoverageElements
26
- .item(currentIndex)
27
- .classList.remove('highlighted');
28
- missingCoverageElements.item(index).classList.add('highlighted');
29
- }
30
-
31
- function makeCurrent(index) {
32
- toggleClass(index);
33
- currentIndex = index;
34
- missingCoverageElements.item(index).scrollIntoView({
35
- behavior: 'smooth',
36
- block: 'center',
37
- inline: 'center'
38
- });
39
- }
40
-
41
- function goToPrevious() {
42
- var nextIndex = 0;
43
- if (typeof currentIndex !== 'number' || currentIndex === 0) {
44
- nextIndex = missingCoverageElements.length - 1;
45
- } else if (missingCoverageElements.length > 1) {
46
- nextIndex = currentIndex - 1;
47
- }
48
-
49
- makeCurrent(nextIndex);
50
- }
51
-
52
- function goToNext() {
53
- var nextIndex = 0;
54
-
55
- if (
56
- typeof currentIndex === 'number' &&
57
- currentIndex < missingCoverageElements.length - 1
58
- ) {
59
- nextIndex = currentIndex + 1;
60
- }
61
-
62
- makeCurrent(nextIndex);
63
- }
64
-
65
- return function jump(event) {
66
- if (
67
- document.getElementById('fileSearch') === document.activeElement &&
68
- document.activeElement != null
69
- ) {
70
- // if we're currently focused on the search input, we don't want to navigate
71
- return;
72
- }
73
-
74
- switch (event.which) {
75
- case 78: // n
76
- case 74: // j
77
- goToNext();
78
- break;
79
- case 66: // b
80
- case 75: // k
81
- case 80: // p
82
- goToPrevious();
83
- break;
84
- }
85
- };
86
- })();
87
- window.addEventListener('keydown', jumpToCode);
@@ -1,100 +0,0 @@
1
-
2
- <!doctype html>
3
- <html lang="en">
4
-
5
- <head>
6
- <title>Code coverage report for constants.ts</title>
7
- <meta charset="utf-8" />
8
- <link rel="stylesheet" href="prettify.css" />
9
- <link rel="stylesheet" href="base.css" />
10
- <link rel="shortcut icon" type="image/x-icon" href="favicon.png" />
11
- <meta name="viewport" content="width=device-width, initial-scale=1" />
12
- <style type='text/css'>
13
- .coverage-summary .sorter {
14
- background-image: url(sort-arrow-sprite.png);
15
- }
16
- </style>
17
- </head>
18
-
19
- <body>
20
- <div class='wrapper'>
21
- <div class='pad1'>
22
- <h1><a href="index.html">All files</a> constants.ts</h1>
23
- <div class='clearfix'>
24
-
25
- <div class='fl pad1y space-right2'>
26
- <span class="strong">100% </span>
27
- <span class="quiet">Statements</span>
28
- <span class='fraction'>5/5</span>
29
- </div>
30
-
31
-
32
- <div class='fl pad1y space-right2'>
33
- <span class="strong">100% </span>
34
- <span class="quiet">Branches</span>
35
- <span class='fraction'>0/0</span>
36
- </div>
37
-
38
-
39
- <div class='fl pad1y space-right2'>
40
- <span class="strong">100% </span>
41
- <span class="quiet">Functions</span>
42
- <span class='fraction'>0/0</span>
43
- </div>
44
-
45
-
46
- <div class='fl pad1y space-right2'>
47
- <span class="strong">100% </span>
48
- <span class="quiet">Lines</span>
49
- <span class='fraction'>5/5</span>
50
- </div>
51
-
52
-
53
- </div>
54
- <p class="quiet">
55
- Press <em>n</em> or <em>j</em> to go to the next uncovered block, <em>b</em>, <em>p</em> or <em>k</em> for the previous block.
56
- </p>
57
- <template id="filterTemplate">
58
- <div class="quiet">
59
- Filter:
60
- <input oninput="onInput()" type="search" id="fileSearch">
61
- </div>
62
- </template>
63
- </div>
64
- <div class='status-line high'></div>
65
- <pre><table class="coverage">
66
- <tr><td class="line-count quiet"><a name='L1'></a><a href='#L1'>1</a>
67
- <a name='L2'></a><a href='#L2'>2</a>
68
- <a name='L3'></a><a href='#L3'>3</a>
69
- <a name='L4'></a><a href='#L4'>4</a>
70
- <a name='L5'></a><a href='#L5'>5</a>
71
- <a name='L6'></a><a href='#L6'>6</a></td><td class="line-coverage quiet"><span class="cline-any cline-yes">1x</span>
72
- <span class="cline-any cline-yes">1x</span>
73
- <span class="cline-any cline-yes">1x</span>
74
- <span class="cline-any cline-yes">1x</span>
75
- <span class="cline-any cline-yes">1x</span>
76
- <span class="cline-any cline-neutral">&nbsp;</span></td><td class="text"><pre class="prettyprint lang-js">export const CYPHER = 'cypher';
77
- export const DECRYPTION = 'decryption';
78
- export const DECRYPTION_FAILED = 'decryptionFailed';
79
- export const DECRYPTION_IN_PROGRESS = 'decryptionInProgress';
80
- export const DECRYPTION_SUCCESS = 'decryptionSuccess';
81
- &nbsp;</pre></td></tr></table></pre>
82
-
83
- <div class='push'></div><!-- for sticky footer -->
84
- </div><!-- /wrapper -->
85
- <div class='footer quiet pad2 space-top1 center small'>
86
- Code coverage generated by
87
- <a href="https://istanbul.js.org/" target="_blank" rel="noopener noreferrer">istanbul</a>
88
- at 2025-05-06T09:39:26.241Z
89
- </div>
90
- <script src="prettify.js"></script>
91
- <script>
92
- window.onload = function () {
93
- prettyPrint();
94
- };
95
- </script>
96
- <script src="sorter.js"></script>
97
- <script src="block-navigation.js"></script>
98
- </body>
99
- </html>
100
-
Binary file