@wireapp/core-crypto 0.6.0-rc.8 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json
CHANGED
Binary file
|
@@ -950,15 +950,17 @@ export declare class WireE2eIdentity {
|
|
950
950
|
/**
|
951
951
|
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
952
952
|
*
|
953
|
-
* @param
|
954
|
-
* @param
|
953
|
+
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
954
|
+
* @param domain DNS name of owning backend e.g. `example.com`
|
955
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `impp:wireapp=NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ/6add501bacd1d90e@example.com`
|
956
|
+
* @param handle user handle e.g. `impp:wireapp=alice.smith.qa@example.com`
|
955
957
|
* @param expiryDays generated x509 certificate expiry
|
956
958
|
* @param directory you got from {@link directoryResponse}
|
957
959
|
* @param account you got from {@link newAccountResponse}
|
958
960
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
959
961
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
960
962
|
*/
|
961
|
-
newOrderRequest(
|
963
|
+
newOrderRequest(displayName: string, domain: string, clientId: string, handle: string, expiryDays: number, directory: AcmeDirectory, account: AcmeAccount, previousNonce: string): JsonRawData;
|
962
964
|
/**
|
963
965
|
* Parses the response from `POST /acme/{provisioner-name}/new-order`.
|
964
966
|
*
|
@@ -1005,14 +1007,25 @@ export declare class WireE2eIdentity {
|
|
1005
1007
|
*/
|
1006
1008
|
createDpopToken(accessTokenUrl: string, userId: string, clientId: bigint, domain: string, clientIdChallenge: AcmeChallenge, backendNonce: string, expiryDays: number): string;
|
1007
1009
|
/**
|
1008
|
-
* Creates a new challenge request.
|
1010
|
+
* Creates a new challenge request for Wire Dpop challenge.
|
1009
1011
|
*
|
1010
|
-
* @param
|
1012
|
+
* @param accessToken returned by wire-server from https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token
|
1013
|
+
* @param dpopChallenge you found after {@link newAuthzResponse}
|
1011
1014
|
* @param account you found after {@link newAccountResponse}
|
1012
1015
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
1013
1016
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1014
1017
|
*/
|
1015
|
-
|
1018
|
+
newDpopChallengeRequest(accessToken: string, dpopChallenge: AcmeChallenge, account: AcmeAccount, previousNonce: string): JsonRawData;
|
1019
|
+
/**
|
1020
|
+
* Creates a new challenge request for Wire Oidc challenge.
|
1021
|
+
*
|
1022
|
+
* @param idToken you get back from Identity Provider
|
1023
|
+
* @param oidcChallenge you found after {@link newAuthzResponse}
|
1024
|
+
* @param account you found after {@link newAccountResponse}
|
1025
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
1026
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1027
|
+
*/
|
1028
|
+
newOidcChallengeRequest(idToken: string, oidcChallenge: AcmeChallenge, account: AcmeAccount, previousNonce: string): JsonRawData;
|
1016
1029
|
/**
|
1017
1030
|
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}`.
|
1018
1031
|
*
|
@@ -1039,13 +1052,12 @@ export declare class WireE2eIdentity {
|
|
1039
1052
|
/**
|
1040
1053
|
* Final step before fetching the certificate.
|
1041
1054
|
*
|
1042
|
-
* @param domains - domains you want to generate a certificate for e.g. `["wire.com"]`
|
1043
1055
|
* @param order - order you got from {@link checkOrderResponse}
|
1044
1056
|
* @param account - account you found after {@link newAccountResponse}
|
1045
1057
|
* @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
1046
1058
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
1047
1059
|
*/
|
1048
|
-
finalizeRequest(
|
1060
|
+
finalizeRequest(order: AcmeOrder, account: AcmeAccount, previousNonce: string): JsonRawData;
|
1049
1061
|
/**
|
1050
1062
|
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}/finalize`.
|
1051
1063
|
*
|
@@ -228,7 +228,7 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
228
228
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
229
229
|
try {
|
230
230
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
231
|
-
wasm$1.
|
231
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h07d37b19e83c7ae3(retptr, arg0, arg1, addHeapObject(arg2));
|
232
232
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
233
233
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
234
234
|
if (r1) {
|
@@ -240,7 +240,7 @@ function __wbg_adapter_52(arg0, arg1, arg2) {
|
|
240
240
|
}
|
241
241
|
}
|
242
242
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
243
|
-
wasm$1.
|
243
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hde4447b48c9e13f3(arg0, arg1, addHeapObject(arg2));
|
244
244
|
}
|
245
245
|
function _assertClass(instance, klass) {
|
246
246
|
if (!(instance instanceof klass)) {
|
@@ -290,8 +290,8 @@ function handleError(f, args) {
|
|
290
290
|
function getArrayU8FromWasm0(ptr, len) {
|
291
291
|
return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
|
292
292
|
}
|
293
|
-
function
|
294
|
-
wasm$1.
|
293
|
+
function __wbg_adapter_268(arg0, arg1, arg2, arg3) {
|
294
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h1934ea7100a9edf0(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
295
295
|
}
|
296
296
|
/**
|
297
297
|
* see [core_crypto::prelude::MlsWirePolicy]
|
@@ -1664,24 +1664,30 @@ class FfiWireE2EIdentity {
|
|
1664
1664
|
}
|
1665
1665
|
/**
|
1666
1666
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
|
1667
|
-
* @param {string}
|
1667
|
+
* @param {string} display_name
|
1668
|
+
* @param {string} domain
|
1668
1669
|
* @param {string} client_id
|
1670
|
+
* @param {string} handle
|
1669
1671
|
* @param {number} expiry_days
|
1670
1672
|
* @param {any} directory
|
1671
1673
|
* @param {Uint8Array} account
|
1672
1674
|
* @param {string} previous_nonce
|
1673
1675
|
* @returns {Uint8Array}
|
1674
1676
|
*/
|
1675
|
-
new_order_request(
|
1677
|
+
new_order_request(display_name, domain, client_id, handle, expiry_days, directory, account, previous_nonce) {
|
1676
1678
|
try {
|
1677
1679
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1678
|
-
const ptr0 = passStringToWasm0(
|
1680
|
+
const ptr0 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1679
1681
|
const len0 = WASM_VECTOR_LEN;
|
1680
|
-
const ptr1 = passStringToWasm0(
|
1682
|
+
const ptr1 = passStringToWasm0(domain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1681
1683
|
const len1 = WASM_VECTOR_LEN;
|
1682
|
-
const ptr2 = passStringToWasm0(
|
1684
|
+
const ptr2 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1683
1685
|
const len2 = WASM_VECTOR_LEN;
|
1684
|
-
|
1686
|
+
const ptr3 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1687
|
+
const len3 = WASM_VECTOR_LEN;
|
1688
|
+
const ptr4 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1689
|
+
const len4 = WASM_VECTOR_LEN;
|
1690
|
+
wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3, expiry_days, addHeapObject(directory), addHeapObject(account), ptr4, len4);
|
1685
1691
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1686
1692
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1687
1693
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1805,18 +1811,49 @@ class FfiWireE2EIdentity {
|
|
1805
1811
|
}
|
1806
1812
|
}
|
1807
1813
|
/**
|
1808
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::
|
1809
|
-
* @param {
|
1814
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_dpop_challenge_request]
|
1815
|
+
* @param {string} access_token
|
1816
|
+
* @param {any} dpop_challenge
|
1810
1817
|
* @param {Uint8Array} account
|
1811
1818
|
* @param {string} previous_nonce
|
1812
1819
|
* @returns {Uint8Array}
|
1813
1820
|
*/
|
1814
|
-
|
1821
|
+
new_dpop_challenge_request(access_token, dpop_challenge, account, previous_nonce) {
|
1815
1822
|
try {
|
1816
1823
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1817
|
-
const ptr0 = passStringToWasm0(
|
1824
|
+
const ptr0 = passStringToWasm0(access_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1818
1825
|
const len0 = WASM_VECTOR_LEN;
|
1819
|
-
|
1826
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1827
|
+
const len1 = WASM_VECTOR_LEN;
|
1828
|
+
wasm$1.ffiwiree2eidentity_new_dpop_challenge_request(retptr, this.ptr, ptr0, len0, addHeapObject(dpop_challenge), addHeapObject(account), ptr1, len1);
|
1829
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1830
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1831
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1832
|
+
if (r2) {
|
1833
|
+
throw takeObject(r1);
|
1834
|
+
}
|
1835
|
+
return takeObject(r0);
|
1836
|
+
}
|
1837
|
+
finally {
|
1838
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1839
|
+
}
|
1840
|
+
}
|
1841
|
+
/**
|
1842
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_oidc_challenge_request]
|
1843
|
+
* @param {string} id_token
|
1844
|
+
* @param {any} oidc_challenge
|
1845
|
+
* @param {Uint8Array} account
|
1846
|
+
* @param {string} previous_nonce
|
1847
|
+
* @returns {Uint8Array}
|
1848
|
+
*/
|
1849
|
+
new_oidc_challenge_request(id_token, oidc_challenge, account, previous_nonce) {
|
1850
|
+
try {
|
1851
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1852
|
+
const ptr0 = passStringToWasm0(id_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1853
|
+
const len0 = WASM_VECTOR_LEN;
|
1854
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1855
|
+
const len1 = WASM_VECTOR_LEN;
|
1856
|
+
wasm$1.ffiwiree2eidentity_new_oidc_challenge_request(retptr, this.ptr, ptr0, len0, addHeapObject(oidc_challenge), addHeapObject(account), ptr1, len1);
|
1820
1857
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1821
1858
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1822
1859
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1897,20 +1934,17 @@ class FfiWireE2EIdentity {
|
|
1897
1934
|
}
|
1898
1935
|
/**
|
1899
1936
|
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
|
1900
|
-
* @param {(string)[]} domains
|
1901
1937
|
* @param {Uint8Array} order
|
1902
1938
|
* @param {Uint8Array} account
|
1903
1939
|
* @param {string} previous_nonce
|
1904
1940
|
* @returns {Uint8Array}
|
1905
1941
|
*/
|
1906
|
-
finalize_request(
|
1942
|
+
finalize_request(order, account, previous_nonce) {
|
1907
1943
|
try {
|
1908
1944
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1909
|
-
const ptr0 =
|
1945
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1910
1946
|
const len0 = WASM_VECTOR_LEN;
|
1911
|
-
|
1912
|
-
const len1 = WASM_VECTOR_LEN;
|
1913
|
-
wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr, ptr0, len0, addHeapObject(order), addHeapObject(account), ptr1, len1);
|
1947
|
+
wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr, addHeapObject(order), addHeapObject(account), ptr0, len0);
|
1914
1948
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1915
1949
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1916
1950
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -2108,16 +2142,16 @@ class NewAcmeAuthz {
|
|
2108
2142
|
}
|
2109
2143
|
/**
|
2110
2144
|
* @param {string} identifier
|
2111
|
-
* @param {AcmeChallenge | undefined}
|
2145
|
+
* @param {AcmeChallenge | undefined} wire_dpop_challenge
|
2112
2146
|
* @param {AcmeChallenge | undefined} wire_oidc_challenge
|
2113
2147
|
*/
|
2114
|
-
constructor(identifier,
|
2148
|
+
constructor(identifier, wire_dpop_challenge, wire_oidc_challenge) {
|
2115
2149
|
const ptr0 = passStringToWasm0(identifier, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2116
2150
|
const len0 = WASM_VECTOR_LEN;
|
2117
2151
|
let ptr1 = 0;
|
2118
|
-
if (!isLikeNone(
|
2119
|
-
_assertClass(
|
2120
|
-
ptr1 =
|
2152
|
+
if (!isLikeNone(wire_dpop_challenge)) {
|
2153
|
+
_assertClass(wire_dpop_challenge, AcmeChallenge);
|
2154
|
+
ptr1 = wire_dpop_challenge.__destroy_into_raw();
|
2121
2155
|
}
|
2122
2156
|
let ptr2 = 0;
|
2123
2157
|
if (!isLikeNone(wire_oidc_challenge)) {
|
@@ -2146,8 +2180,8 @@ class NewAcmeAuthz {
|
|
2146
2180
|
/**
|
2147
2181
|
* @returns {AcmeChallenge | undefined}
|
2148
2182
|
*/
|
2149
|
-
get
|
2150
|
-
const ret = wasm$1.
|
2183
|
+
get wire_dpop_challenge() {
|
2184
|
+
const ret = wasm$1.newacmeauthz_wire_dpop_challenge(this.ptr);
|
2151
2185
|
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
2152
2186
|
}
|
2153
2187
|
/**
|
@@ -2373,32 +2407,16 @@ function getImports() {
|
|
2373
2407
|
const ret = getObject(arg0).length;
|
2374
2408
|
return ret;
|
2375
2409
|
};
|
2410
|
+
imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
|
2411
|
+
const ret = new Uint8Array(getObject(arg0));
|
2412
|
+
return addHeapObject(ret);
|
2413
|
+
};
|
2376
2414
|
imports.wbg.__wbg_call_9495de66fdbe016b = function () {
|
2377
2415
|
return handleError(function (arg0, arg1, arg2) {
|
2378
2416
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));
|
2379
2417
|
return addHeapObject(ret);
|
2380
2418
|
}, arguments);
|
2381
2419
|
};
|
2382
|
-
imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
|
2383
|
-
const ret = new Uint8Array(getObject(arg0));
|
2384
|
-
return addHeapObject(ret);
|
2385
|
-
};
|
2386
|
-
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2387
|
-
const ret = getObject(arg0).push(getObject(arg1));
|
2388
|
-
return ret;
|
2389
|
-
};
|
2390
|
-
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2391
|
-
const ret = new Map();
|
2392
|
-
return addHeapObject(ret);
|
2393
|
-
};
|
2394
|
-
imports.wbg.__wbg_set_388c4c6422704173 = function (arg0, arg1, arg2) {
|
2395
|
-
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2396
|
-
return addHeapObject(ret);
|
2397
|
-
};
|
2398
|
-
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2399
|
-
const ret = BigInt.asUintN(64, arg0);
|
2400
|
-
return addHeapObject(ret);
|
2401
|
-
};
|
2402
2420
|
imports.wbg.__wbg_new_9d3a9ce4282a18a8 = function (arg0, arg1) {
|
2403
2421
|
try {
|
2404
2422
|
var state0 = { a: arg0, b: arg1 };
|
@@ -2406,7 +2424,7 @@ function getImports() {
|
|
2406
2424
|
const a = state0.a;
|
2407
2425
|
state0.a = 0;
|
2408
2426
|
try {
|
2409
|
-
return
|
2427
|
+
return __wbg_adapter_268(a, state0.b, arg0, arg1);
|
2410
2428
|
}
|
2411
2429
|
finally {
|
2412
2430
|
state0.a = a;
|
@@ -2423,6 +2441,22 @@ function getImports() {
|
|
2423
2441
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2424
2442
|
return addHeapObject(ret);
|
2425
2443
|
};
|
2444
|
+
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2445
|
+
const ret = getObject(arg0).push(getObject(arg1));
|
2446
|
+
return ret;
|
2447
|
+
};
|
2448
|
+
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2449
|
+
const ret = new Map();
|
2450
|
+
return addHeapObject(ret);
|
2451
|
+
};
|
2452
|
+
imports.wbg.__wbg_set_388c4c6422704173 = function (arg0, arg1, arg2) {
|
2453
|
+
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2454
|
+
return addHeapObject(ret);
|
2455
|
+
};
|
2456
|
+
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2457
|
+
const ret = BigInt.asUintN(64, arg0);
|
2458
|
+
return addHeapObject(ret);
|
2459
|
+
};
|
2426
2460
|
imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
|
2427
2461
|
getObject(arg0).onsuccess = getObject(arg1);
|
2428
2462
|
};
|
@@ -2507,8 +2541,8 @@ function getImports() {
|
|
2507
2541
|
return addHeapObject(ret);
|
2508
2542
|
}, arguments);
|
2509
2543
|
};
|
2510
|
-
imports.wbg.
|
2511
|
-
const ret =
|
2544
|
+
imports.wbg.__wbg_now_78244d2ced74c026 = function () {
|
2545
|
+
const ret = performance.now();
|
2512
2546
|
return ret;
|
2513
2547
|
};
|
2514
2548
|
imports.wbg.__wbg_reject_57029f54148d79c3 = function (arg0) {
|
@@ -2523,10 +2557,6 @@ function getImports() {
|
|
2523
2557
|
const ret = Date.now();
|
2524
2558
|
return ret;
|
2525
2559
|
};
|
2526
|
-
imports.wbg.__wbg_now_78244d2ced74c026 = function () {
|
2527
|
-
const ret = performance.now();
|
2528
|
-
return ret;
|
2529
|
-
};
|
2530
2560
|
imports.wbg.__wbg_new_abda76e883ba8a5f = function () {
|
2531
2561
|
const ret = new Error();
|
2532
2562
|
return addHeapObject(ret);
|
@@ -2701,10 +2731,6 @@ function getImports() {
|
|
2701
2731
|
const ret = new Uint8Array(arg0 >>> 0);
|
2702
2732
|
return addHeapObject(ret);
|
2703
2733
|
};
|
2704
|
-
imports.wbg.__wbg_charCodeAt_d78a90aced59e02f = function (arg0, arg1) {
|
2705
|
-
const ret = getObject(arg0).charCodeAt(arg1 >>> 0);
|
2706
|
-
return ret;
|
2707
|
-
};
|
2708
2734
|
imports.wbg.__wbg_next_88560ec06a094dea = function () {
|
2709
2735
|
return handleError(function (arg0) {
|
2710
2736
|
const ret = getObject(arg0).next();
|
@@ -2786,12 +2812,6 @@ function getImports() {
|
|
2786
2812
|
const ret = getObject(arg0).target;
|
2787
2813
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2788
2814
|
};
|
2789
|
-
imports.wbg.__wbg_error_f64b8d41ed4d2fdc = function () {
|
2790
|
-
return handleError(function (arg0) {
|
2791
|
-
const ret = getObject(arg0).error;
|
2792
|
-
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2793
|
-
}, arguments);
|
2794
|
-
};
|
2795
2815
|
imports.wbg.__wbg_result_3a1fef332bc47038 = function () {
|
2796
2816
|
return handleError(function (arg0) {
|
2797
2817
|
const ret = getObject(arg0).result;
|
@@ -2832,6 +2852,12 @@ function getImports() {
|
|
2832
2852
|
getObject(arg0).deleteObjectStore(getStringFromWasm0(arg1, arg2));
|
2833
2853
|
}, arguments);
|
2834
2854
|
};
|
2855
|
+
imports.wbg.__wbg_error_f64b8d41ed4d2fdc = function () {
|
2856
|
+
return handleError(function (arg0) {
|
2857
|
+
const ret = getObject(arg0).error;
|
2858
|
+
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2859
|
+
}, arguments);
|
2860
|
+
};
|
2835
2861
|
imports.wbg.__wbindgen_is_falsy = function (arg0) {
|
2836
2862
|
const ret = !getObject(arg0);
|
2837
2863
|
return ret;
|
@@ -2877,29 +2903,6 @@ function getImports() {
|
|
2877
2903
|
const ret = getObject(arg0).toString();
|
2878
2904
|
return addHeapObject(ret);
|
2879
2905
|
};
|
2880
|
-
imports.wbg.__wbg_instanceof_Window_e266f02eee43b570 = function (arg0) {
|
2881
|
-
let result;
|
2882
|
-
try {
|
2883
|
-
result = getObject(arg0) instanceof Window;
|
2884
|
-
}
|
2885
|
-
catch {
|
2886
|
-
result = false;
|
2887
|
-
}
|
2888
|
-
const ret = result;
|
2889
|
-
return ret;
|
2890
|
-
};
|
2891
|
-
imports.wbg.__wbg_crypto_71b946c90b06fb5b = function () {
|
2892
|
-
return handleError(function (arg0) {
|
2893
|
-
const ret = getObject(arg0).crypto;
|
2894
|
-
return addHeapObject(ret);
|
2895
|
-
}, arguments);
|
2896
|
-
};
|
2897
|
-
imports.wbg.__wbg_getRandomValues_2a91ccd2d6c499b0 = function () {
|
2898
|
-
return handleError(function (arg0, arg1, arg2) {
|
2899
|
-
const ret = getObject(arg0).getRandomValues(getArrayU8FromWasm0(arg1, arg2));
|
2900
|
-
return addHeapObject(ret);
|
2901
|
-
}, arguments);
|
2902
|
-
};
|
2903
2906
|
imports.wbg.__wbg_instanceof_Uint8Array_01cebe79ca606cca = function (arg0) {
|
2904
2907
|
let result;
|
2905
2908
|
try {
|
@@ -3015,12 +3018,12 @@ function getImports() {
|
|
3015
3018
|
return addHeapObject(ret);
|
3016
3019
|
}, arguments);
|
3017
3020
|
};
|
3018
|
-
imports.wbg.
|
3019
|
-
const ret = makeMutClosure(arg0, arg1,
|
3021
|
+
imports.wbg.__wbindgen_closure_wrapper4410 = function (arg0, arg1, arg2) {
|
3022
|
+
const ret = makeMutClosure(arg0, arg1, 143, __wbg_adapter_52);
|
3020
3023
|
return addHeapObject(ret);
|
3021
3024
|
};
|
3022
|
-
imports.wbg.
|
3023
|
-
const ret = makeMutClosure(arg0, arg1,
|
3025
|
+
imports.wbg.__wbindgen_closure_wrapper4895 = function (arg0, arg1, arg2) {
|
3026
|
+
const ret = makeMutClosure(arg0, arg1, 143, __wbg_adapter_55);
|
3024
3027
|
return addHeapObject(ret);
|
3025
3028
|
};
|
3026
3029
|
return imports;
|
@@ -3080,7 +3083,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3080
3083
|
var wasm = async (opt = {}) => {
|
3081
3084
|
let {importHook, serverPath} = opt;
|
3082
3085
|
|
3083
|
-
let path = "assets/core_crypto_ffi-
|
3086
|
+
let path = "assets/core_crypto_ffi-49b28313.wasm";
|
3084
3087
|
|
3085
3088
|
if (serverPath != null) {
|
3086
3089
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -4116,17 +4119,19 @@ class WireE2eIdentity {
|
|
4116
4119
|
/**
|
4117
4120
|
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
4118
4121
|
*
|
4119
|
-
* @param
|
4120
|
-
* @param
|
4122
|
+
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4123
|
+
* @param domain DNS name of owning backend e.g. `example.com`
|
4124
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `impp:wireapp=NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ/6add501bacd1d90e@example.com`
|
4125
|
+
* @param handle user handle e.g. `impp:wireapp=alice.smith.qa@example.com`
|
4121
4126
|
* @param expiryDays generated x509 certificate expiry
|
4122
4127
|
* @param directory you got from {@link directoryResponse}
|
4123
4128
|
* @param account you got from {@link newAccountResponse}
|
4124
4129
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
4125
4130
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4126
4131
|
*/
|
4127
|
-
newOrderRequest(
|
4132
|
+
newOrderRequest(displayName, domain, clientId, handle, expiryDays, directory, account, previousNonce) {
|
4128
4133
|
try {
|
4129
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(
|
4134
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(displayName, domain, clientId, handle, expiryDays, directory, account, previousNonce);
|
4130
4135
|
}
|
4131
4136
|
catch (e) {
|
4132
4137
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4206,16 +4211,34 @@ class WireE2eIdentity {
|
|
4206
4211
|
}
|
4207
4212
|
}
|
4208
4213
|
/**
|
4209
|
-
* Creates a new challenge request.
|
4214
|
+
* Creates a new challenge request for Wire Dpop challenge.
|
4215
|
+
*
|
4216
|
+
* @param accessToken returned by wire-server from https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token
|
4217
|
+
* @param dpopChallenge you found after {@link newAuthzResponse}
|
4218
|
+
* @param account you found after {@link newAccountResponse}
|
4219
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
4220
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
4221
|
+
*/
|
4222
|
+
newDpopChallengeRequest(accessToken, dpopChallenge, account, previousNonce) {
|
4223
|
+
try {
|
4224
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_dpop_challenge_request(accessToken, dpopChallenge, account, previousNonce);
|
4225
|
+
}
|
4226
|
+
catch (e) {
|
4227
|
+
throw CoreCryptoError.fromStdError(e);
|
4228
|
+
}
|
4229
|
+
}
|
4230
|
+
/**
|
4231
|
+
* Creates a new challenge request for Wire Oidc challenge.
|
4210
4232
|
*
|
4211
|
-
* @param
|
4233
|
+
* @param idToken you get back from Identity Provider
|
4234
|
+
* @param oidcChallenge you found after {@link newAuthzResponse}
|
4212
4235
|
* @param account you found after {@link newAccountResponse}
|
4213
4236
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
4214
4237
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
4215
4238
|
*/
|
4216
|
-
|
4239
|
+
newOidcChallengeRequest(idToken, oidcChallenge, account, previousNonce) {
|
4217
4240
|
try {
|
4218
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").
|
4241
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_oidc_challenge_request(idToken, oidcChallenge, account, previousNonce);
|
4219
4242
|
}
|
4220
4243
|
catch (e) {
|
4221
4244
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4268,15 +4291,14 @@ class WireE2eIdentity {
|
|
4268
4291
|
/**
|
4269
4292
|
* Final step before fetching the certificate.
|
4270
4293
|
*
|
4271
|
-
* @param domains - domains you want to generate a certificate for e.g. `["wire.com"]`
|
4272
4294
|
* @param order - order you got from {@link checkOrderResponse}
|
4273
4295
|
* @param account - account you found after {@link newAccountResponse}
|
4274
4296
|
* @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
4275
4297
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4276
4298
|
*/
|
4277
|
-
finalizeRequest(
|
4299
|
+
finalizeRequest(order, account, previousNonce) {
|
4278
4300
|
try {
|
4279
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(
|
4301
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(order, account, previousNonce);
|
4280
4302
|
}
|
4281
4303
|
catch (e) {
|
4282
4304
|
throw CoreCryptoError.fromStdError(e);
|
Binary file
|