@wireapp/core-crypto 0.6.0-rc.8 → 0.6.1
Sign up to get free protection for your applications and to get access to all the features.
package/package.json
CHANGED
Binary file
|
@@ -950,15 +950,17 @@ export declare class WireE2eIdentity {
|
|
950
950
|
/**
|
951
951
|
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
952
952
|
*
|
953
|
-
* @param
|
954
|
-
* @param
|
953
|
+
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
954
|
+
* @param domain DNS name of owning backend e.g. `example.com`
|
955
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `impp:wireapp=NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ/6add501bacd1d90e@example.com`
|
956
|
+
* @param handle user handle e.g. `impp:wireapp=alice.smith.qa@example.com`
|
955
957
|
* @param expiryDays generated x509 certificate expiry
|
956
958
|
* @param directory you got from {@link directoryResponse}
|
957
959
|
* @param account you got from {@link newAccountResponse}
|
958
960
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
959
961
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
960
962
|
*/
|
961
|
-
newOrderRequest(
|
963
|
+
newOrderRequest(displayName: string, domain: string, clientId: string, handle: string, expiryDays: number, directory: AcmeDirectory, account: AcmeAccount, previousNonce: string): JsonRawData;
|
962
964
|
/**
|
963
965
|
* Parses the response from `POST /acme/{provisioner-name}/new-order`.
|
964
966
|
*
|
@@ -1005,14 +1007,25 @@ export declare class WireE2eIdentity {
|
|
1005
1007
|
*/
|
1006
1008
|
createDpopToken(accessTokenUrl: string, userId: string, clientId: bigint, domain: string, clientIdChallenge: AcmeChallenge, backendNonce: string, expiryDays: number): string;
|
1007
1009
|
/**
|
1008
|
-
* Creates a new challenge request.
|
1010
|
+
* Creates a new challenge request for Wire Dpop challenge.
|
1009
1011
|
*
|
1010
|
-
* @param
|
1012
|
+
* @param accessToken returned by wire-server from https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token
|
1013
|
+
* @param dpopChallenge you found after {@link newAuthzResponse}
|
1011
1014
|
* @param account you found after {@link newAccountResponse}
|
1012
1015
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
1013
1016
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1014
1017
|
*/
|
1015
|
-
|
1018
|
+
newDpopChallengeRequest(accessToken: string, dpopChallenge: AcmeChallenge, account: AcmeAccount, previousNonce: string): JsonRawData;
|
1019
|
+
/**
|
1020
|
+
* Creates a new challenge request for Wire Oidc challenge.
|
1021
|
+
*
|
1022
|
+
* @param idToken you get back from Identity Provider
|
1023
|
+
* @param oidcChallenge you found after {@link newAuthzResponse}
|
1024
|
+
* @param account you found after {@link newAccountResponse}
|
1025
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
1026
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1027
|
+
*/
|
1028
|
+
newOidcChallengeRequest(idToken: string, oidcChallenge: AcmeChallenge, account: AcmeAccount, previousNonce: string): JsonRawData;
|
1016
1029
|
/**
|
1017
1030
|
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}`.
|
1018
1031
|
*
|
@@ -1039,13 +1052,12 @@ export declare class WireE2eIdentity {
|
|
1039
1052
|
/**
|
1040
1053
|
* Final step before fetching the certificate.
|
1041
1054
|
*
|
1042
|
-
* @param domains - domains you want to generate a certificate for e.g. `["wire.com"]`
|
1043
1055
|
* @param order - order you got from {@link checkOrderResponse}
|
1044
1056
|
* @param account - account you found after {@link newAccountResponse}
|
1045
1057
|
* @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
1046
1058
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
1047
1059
|
*/
|
1048
|
-
finalizeRequest(
|
1060
|
+
finalizeRequest(order: AcmeOrder, account: AcmeAccount, previousNonce: string): JsonRawData;
|
1049
1061
|
/**
|
1050
1062
|
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}/finalize`.
|
1051
1063
|
*
|
@@ -226,9 +226,12 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
226
226
|
return real;
|
227
227
|
}
|
228
228
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
229
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hbc1e83b65f289d81(arg0, arg1, addHeapObject(arg2));
|
230
|
+
}
|
231
|
+
function __wbg_adapter_55(arg0, arg1, arg2) {
|
229
232
|
try {
|
230
233
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
231
|
-
wasm$1.
|
234
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h7f871b07edcecab4(retptr, arg0, arg1, addHeapObject(arg2));
|
232
235
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
233
236
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
234
237
|
if (r1) {
|
@@ -239,9 +242,6 @@ function __wbg_adapter_52(arg0, arg1, arg2) {
|
|
239
242
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
240
243
|
}
|
241
244
|
}
|
242
|
-
function __wbg_adapter_55(arg0, arg1, arg2) {
|
243
|
-
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__ha3d8e2730fb8635e(arg0, arg1, addHeapObject(arg2));
|
244
|
-
}
|
245
245
|
function _assertClass(instance, klass) {
|
246
246
|
if (!(instance instanceof klass)) {
|
247
247
|
throw new Error(`expected instance of ${klass.name}`);
|
@@ -290,8 +290,8 @@ function handleError(f, args) {
|
|
290
290
|
function getArrayU8FromWasm0(ptr, len) {
|
291
291
|
return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
|
292
292
|
}
|
293
|
-
function
|
294
|
-
wasm$1.
|
293
|
+
function __wbg_adapter_270(arg0, arg1, arg2, arg3) {
|
294
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h642728bf8a354f9a(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
295
295
|
}
|
296
296
|
/**
|
297
297
|
* see [core_crypto::prelude::MlsWirePolicy]
|
@@ -1664,24 +1664,30 @@ class FfiWireE2EIdentity {
|
|
1664
1664
|
}
|
1665
1665
|
/**
|
1666
1666
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
|
1667
|
-
* @param {string}
|
1667
|
+
* @param {string} display_name
|
1668
|
+
* @param {string} domain
|
1668
1669
|
* @param {string} client_id
|
1670
|
+
* @param {string} handle
|
1669
1671
|
* @param {number} expiry_days
|
1670
1672
|
* @param {any} directory
|
1671
1673
|
* @param {Uint8Array} account
|
1672
1674
|
* @param {string} previous_nonce
|
1673
1675
|
* @returns {Uint8Array}
|
1674
1676
|
*/
|
1675
|
-
new_order_request(
|
1677
|
+
new_order_request(display_name, domain, client_id, handle, expiry_days, directory, account, previous_nonce) {
|
1676
1678
|
try {
|
1677
1679
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1678
|
-
const ptr0 = passStringToWasm0(
|
1680
|
+
const ptr0 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1679
1681
|
const len0 = WASM_VECTOR_LEN;
|
1680
|
-
const ptr1 = passStringToWasm0(
|
1682
|
+
const ptr1 = passStringToWasm0(domain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1681
1683
|
const len1 = WASM_VECTOR_LEN;
|
1682
|
-
const ptr2 = passStringToWasm0(
|
1684
|
+
const ptr2 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1683
1685
|
const len2 = WASM_VECTOR_LEN;
|
1684
|
-
|
1686
|
+
const ptr3 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1687
|
+
const len3 = WASM_VECTOR_LEN;
|
1688
|
+
const ptr4 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1689
|
+
const len4 = WASM_VECTOR_LEN;
|
1690
|
+
wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3, expiry_days, addHeapObject(directory), addHeapObject(account), ptr4, len4);
|
1685
1691
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1686
1692
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1687
1693
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1805,18 +1811,49 @@ class FfiWireE2EIdentity {
|
|
1805
1811
|
}
|
1806
1812
|
}
|
1807
1813
|
/**
|
1808
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::
|
1809
|
-
* @param {
|
1814
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_dpop_challenge_request]
|
1815
|
+
* @param {string} access_token
|
1816
|
+
* @param {any} dpop_challenge
|
1810
1817
|
* @param {Uint8Array} account
|
1811
1818
|
* @param {string} previous_nonce
|
1812
1819
|
* @returns {Uint8Array}
|
1813
1820
|
*/
|
1814
|
-
|
1821
|
+
new_dpop_challenge_request(access_token, dpop_challenge, account, previous_nonce) {
|
1815
1822
|
try {
|
1816
1823
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1817
|
-
const ptr0 = passStringToWasm0(
|
1824
|
+
const ptr0 = passStringToWasm0(access_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1818
1825
|
const len0 = WASM_VECTOR_LEN;
|
1819
|
-
|
1826
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1827
|
+
const len1 = WASM_VECTOR_LEN;
|
1828
|
+
wasm$1.ffiwiree2eidentity_new_dpop_challenge_request(retptr, this.ptr, ptr0, len0, addHeapObject(dpop_challenge), addHeapObject(account), ptr1, len1);
|
1829
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1830
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1831
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1832
|
+
if (r2) {
|
1833
|
+
throw takeObject(r1);
|
1834
|
+
}
|
1835
|
+
return takeObject(r0);
|
1836
|
+
}
|
1837
|
+
finally {
|
1838
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1839
|
+
}
|
1840
|
+
}
|
1841
|
+
/**
|
1842
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_oidc_challenge_request]
|
1843
|
+
* @param {string} id_token
|
1844
|
+
* @param {any} oidc_challenge
|
1845
|
+
* @param {Uint8Array} account
|
1846
|
+
* @param {string} previous_nonce
|
1847
|
+
* @returns {Uint8Array}
|
1848
|
+
*/
|
1849
|
+
new_oidc_challenge_request(id_token, oidc_challenge, account, previous_nonce) {
|
1850
|
+
try {
|
1851
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1852
|
+
const ptr0 = passStringToWasm0(id_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1853
|
+
const len0 = WASM_VECTOR_LEN;
|
1854
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1855
|
+
const len1 = WASM_VECTOR_LEN;
|
1856
|
+
wasm$1.ffiwiree2eidentity_new_oidc_challenge_request(retptr, this.ptr, ptr0, len0, addHeapObject(oidc_challenge), addHeapObject(account), ptr1, len1);
|
1820
1857
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1821
1858
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1822
1859
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1897,20 +1934,17 @@ class FfiWireE2EIdentity {
|
|
1897
1934
|
}
|
1898
1935
|
/**
|
1899
1936
|
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
|
1900
|
-
* @param {(string)[]} domains
|
1901
1937
|
* @param {Uint8Array} order
|
1902
1938
|
* @param {Uint8Array} account
|
1903
1939
|
* @param {string} previous_nonce
|
1904
1940
|
* @returns {Uint8Array}
|
1905
1941
|
*/
|
1906
|
-
finalize_request(
|
1942
|
+
finalize_request(order, account, previous_nonce) {
|
1907
1943
|
try {
|
1908
1944
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1909
|
-
const ptr0 =
|
1945
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1910
1946
|
const len0 = WASM_VECTOR_LEN;
|
1911
|
-
|
1912
|
-
const len1 = WASM_VECTOR_LEN;
|
1913
|
-
wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr, ptr0, len0, addHeapObject(order), addHeapObject(account), ptr1, len1);
|
1947
|
+
wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr, addHeapObject(order), addHeapObject(account), ptr0, len0);
|
1914
1948
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1915
1949
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1916
1950
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -2108,16 +2142,16 @@ class NewAcmeAuthz {
|
|
2108
2142
|
}
|
2109
2143
|
/**
|
2110
2144
|
* @param {string} identifier
|
2111
|
-
* @param {AcmeChallenge | undefined}
|
2145
|
+
* @param {AcmeChallenge | undefined} wire_dpop_challenge
|
2112
2146
|
* @param {AcmeChallenge | undefined} wire_oidc_challenge
|
2113
2147
|
*/
|
2114
|
-
constructor(identifier,
|
2148
|
+
constructor(identifier, wire_dpop_challenge, wire_oidc_challenge) {
|
2115
2149
|
const ptr0 = passStringToWasm0(identifier, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2116
2150
|
const len0 = WASM_VECTOR_LEN;
|
2117
2151
|
let ptr1 = 0;
|
2118
|
-
if (!isLikeNone(
|
2119
|
-
_assertClass(
|
2120
|
-
ptr1 =
|
2152
|
+
if (!isLikeNone(wire_dpop_challenge)) {
|
2153
|
+
_assertClass(wire_dpop_challenge, AcmeChallenge);
|
2154
|
+
ptr1 = wire_dpop_challenge.__destroy_into_raw();
|
2121
2155
|
}
|
2122
2156
|
let ptr2 = 0;
|
2123
2157
|
if (!isLikeNone(wire_oidc_challenge)) {
|
@@ -2146,8 +2180,8 @@ class NewAcmeAuthz {
|
|
2146
2180
|
/**
|
2147
2181
|
* @returns {AcmeChallenge | undefined}
|
2148
2182
|
*/
|
2149
|
-
get
|
2150
|
-
const ret = wasm$1.
|
2183
|
+
get wire_dpop_challenge() {
|
2184
|
+
const ret = wasm$1.newacmeauthz_wire_dpop_challenge(this.ptr);
|
2151
2185
|
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
2152
2186
|
}
|
2153
2187
|
/**
|
@@ -2383,22 +2417,6 @@ function getImports() {
|
|
2383
2417
|
const ret = new Uint8Array(getObject(arg0));
|
2384
2418
|
return addHeapObject(ret);
|
2385
2419
|
};
|
2386
|
-
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2387
|
-
const ret = getObject(arg0).push(getObject(arg1));
|
2388
|
-
return ret;
|
2389
|
-
};
|
2390
|
-
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2391
|
-
const ret = new Map();
|
2392
|
-
return addHeapObject(ret);
|
2393
|
-
};
|
2394
|
-
imports.wbg.__wbg_set_388c4c6422704173 = function (arg0, arg1, arg2) {
|
2395
|
-
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2396
|
-
return addHeapObject(ret);
|
2397
|
-
};
|
2398
|
-
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2399
|
-
const ret = BigInt.asUintN(64, arg0);
|
2400
|
-
return addHeapObject(ret);
|
2401
|
-
};
|
2402
2420
|
imports.wbg.__wbg_new_9d3a9ce4282a18a8 = function (arg0, arg1) {
|
2403
2421
|
try {
|
2404
2422
|
var state0 = { a: arg0, b: arg1 };
|
@@ -2406,7 +2424,7 @@ function getImports() {
|
|
2406
2424
|
const a = state0.a;
|
2407
2425
|
state0.a = 0;
|
2408
2426
|
try {
|
2409
|
-
return
|
2427
|
+
return __wbg_adapter_270(a, state0.b, arg0, arg1);
|
2410
2428
|
}
|
2411
2429
|
finally {
|
2412
2430
|
state0.a = a;
|
@@ -2419,10 +2437,26 @@ function getImports() {
|
|
2419
2437
|
state0.a = state0.b = 0;
|
2420
2438
|
}
|
2421
2439
|
};
|
2440
|
+
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2441
|
+
const ret = getObject(arg0).push(getObject(arg1));
|
2442
|
+
return ret;
|
2443
|
+
};
|
2422
2444
|
imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
|
2423
2445
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2424
2446
|
return addHeapObject(ret);
|
2425
2447
|
};
|
2448
|
+
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2449
|
+
const ret = new Map();
|
2450
|
+
return addHeapObject(ret);
|
2451
|
+
};
|
2452
|
+
imports.wbg.__wbg_set_388c4c6422704173 = function (arg0, arg1, arg2) {
|
2453
|
+
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2454
|
+
return addHeapObject(ret);
|
2455
|
+
};
|
2456
|
+
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2457
|
+
const ret = BigInt.asUintN(64, arg0);
|
2458
|
+
return addHeapObject(ret);
|
2459
|
+
};
|
2426
2460
|
imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
|
2427
2461
|
getObject(arg0).onsuccess = getObject(arg1);
|
2428
2462
|
};
|
@@ -2495,20 +2529,32 @@ function getImports() {
|
|
2495
2529
|
const ret = new Error(getStringFromWasm0(arg0, arg1));
|
2496
2530
|
return addHeapObject(ret);
|
2497
2531
|
};
|
2532
|
+
imports.wbg.__wbg_instanceof_Promise_4333c4e5587e8936 = function (arg0) {
|
2533
|
+
let result;
|
2534
|
+
try {
|
2535
|
+
result = getObject(arg0) instanceof Promise;
|
2536
|
+
}
|
2537
|
+
catch {
|
2538
|
+
result = false;
|
2539
|
+
}
|
2540
|
+
const ret = result;
|
2541
|
+
return ret;
|
2542
|
+
};
|
2543
|
+
imports.wbg.__wbg_then_f753623316e2873a = function (arg0, arg1, arg2) {
|
2544
|
+
const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));
|
2545
|
+
return addHeapObject(ret);
|
2546
|
+
};
|
2547
|
+
imports.wbg.__wbg_warn_e57696dbb3977030 = function (arg0) {
|
2548
|
+
console.warn(getObject(arg0));
|
2549
|
+
};
|
2498
2550
|
imports.wbg.__wbg_call_96878afb7a8201ca = function () {
|
2499
2551
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
2500
2552
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3));
|
2501
2553
|
return addHeapObject(ret);
|
2502
2554
|
}, arguments);
|
2503
2555
|
};
|
2504
|
-
imports.wbg.
|
2505
|
-
|
2506
|
-
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3), getObject(arg4));
|
2507
|
-
return addHeapObject(ret);
|
2508
|
-
}, arguments);
|
2509
|
-
};
|
2510
|
-
imports.wbg.__wbg_length_ea0846e494e3b16e = function (arg0) {
|
2511
|
-
const ret = getObject(arg0).length;
|
2556
|
+
imports.wbg.__wbg_now_78244d2ced74c026 = function () {
|
2557
|
+
const ret = performance.now();
|
2512
2558
|
return ret;
|
2513
2559
|
};
|
2514
2560
|
imports.wbg.__wbg_reject_57029f54148d79c3 = function (arg0) {
|
@@ -2523,10 +2569,6 @@ function getImports() {
|
|
2523
2569
|
const ret = Date.now();
|
2524
2570
|
return ret;
|
2525
2571
|
};
|
2526
|
-
imports.wbg.__wbg_now_78244d2ced74c026 = function () {
|
2527
|
-
const ret = performance.now();
|
2528
|
-
return ret;
|
2529
|
-
};
|
2530
2572
|
imports.wbg.__wbg_new_abda76e883ba8a5f = function () {
|
2531
2573
|
const ret = new Error();
|
2532
2574
|
return addHeapObject(ret);
|
@@ -2701,10 +2743,6 @@ function getImports() {
|
|
2701
2743
|
const ret = new Uint8Array(arg0 >>> 0);
|
2702
2744
|
return addHeapObject(ret);
|
2703
2745
|
};
|
2704
|
-
imports.wbg.__wbg_charCodeAt_d78a90aced59e02f = function (arg0, arg1) {
|
2705
|
-
const ret = getObject(arg0).charCodeAt(arg1 >>> 0);
|
2706
|
-
return ret;
|
2707
|
-
};
|
2708
2746
|
imports.wbg.__wbg_next_88560ec06a094dea = function () {
|
2709
2747
|
return handleError(function (arg0) {
|
2710
2748
|
const ret = getObject(arg0).next();
|
@@ -2757,6 +2795,12 @@ function getImports() {
|
|
2757
2795
|
const ret = new Function(getStringFromWasm0(arg0, arg1));
|
2758
2796
|
return addHeapObject(ret);
|
2759
2797
|
};
|
2798
|
+
imports.wbg.__wbg_call_99043a1e2a9e5916 = function () {
|
2799
|
+
return handleError(function (arg0, arg1, arg2, arg3, arg4) {
|
2800
|
+
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3), getObject(arg4));
|
2801
|
+
return addHeapObject(ret);
|
2802
|
+
}, arguments);
|
2803
|
+
};
|
2760
2804
|
imports.wbg.__wbg_set_6aa458a4ebdb65cb = function () {
|
2761
2805
|
return handleError(function (arg0, arg1, arg2) {
|
2762
2806
|
const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));
|
@@ -2786,12 +2830,6 @@ function getImports() {
|
|
2786
2830
|
const ret = getObject(arg0).target;
|
2787
2831
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2788
2832
|
};
|
2789
|
-
imports.wbg.__wbg_error_f64b8d41ed4d2fdc = function () {
|
2790
|
-
return handleError(function (arg0) {
|
2791
|
-
const ret = getObject(arg0).error;
|
2792
|
-
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2793
|
-
}, arguments);
|
2794
|
-
};
|
2795
2833
|
imports.wbg.__wbg_result_3a1fef332bc47038 = function () {
|
2796
2834
|
return handleError(function (arg0) {
|
2797
2835
|
const ret = getObject(arg0).result;
|
@@ -2832,6 +2870,12 @@ function getImports() {
|
|
2832
2870
|
getObject(arg0).deleteObjectStore(getStringFromWasm0(arg1, arg2));
|
2833
2871
|
}, arguments);
|
2834
2872
|
};
|
2873
|
+
imports.wbg.__wbg_error_f64b8d41ed4d2fdc = function () {
|
2874
|
+
return handleError(function (arg0) {
|
2875
|
+
const ret = getObject(arg0).error;
|
2876
|
+
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2877
|
+
}, arguments);
|
2878
|
+
};
|
2835
2879
|
imports.wbg.__wbindgen_is_falsy = function (arg0) {
|
2836
2880
|
const ret = !getObject(arg0);
|
2837
2881
|
return ret;
|
@@ -2877,29 +2921,6 @@ function getImports() {
|
|
2877
2921
|
const ret = getObject(arg0).toString();
|
2878
2922
|
return addHeapObject(ret);
|
2879
2923
|
};
|
2880
|
-
imports.wbg.__wbg_instanceof_Window_e266f02eee43b570 = function (arg0) {
|
2881
|
-
let result;
|
2882
|
-
try {
|
2883
|
-
result = getObject(arg0) instanceof Window;
|
2884
|
-
}
|
2885
|
-
catch {
|
2886
|
-
result = false;
|
2887
|
-
}
|
2888
|
-
const ret = result;
|
2889
|
-
return ret;
|
2890
|
-
};
|
2891
|
-
imports.wbg.__wbg_crypto_71b946c90b06fb5b = function () {
|
2892
|
-
return handleError(function (arg0) {
|
2893
|
-
const ret = getObject(arg0).crypto;
|
2894
|
-
return addHeapObject(ret);
|
2895
|
-
}, arguments);
|
2896
|
-
};
|
2897
|
-
imports.wbg.__wbg_getRandomValues_2a91ccd2d6c499b0 = function () {
|
2898
|
-
return handleError(function (arg0, arg1, arg2) {
|
2899
|
-
const ret = getObject(arg0).getRandomValues(getArrayU8FromWasm0(arg1, arg2));
|
2900
|
-
return addHeapObject(ret);
|
2901
|
-
}, arguments);
|
2902
|
-
};
|
2903
2924
|
imports.wbg.__wbg_instanceof_Uint8Array_01cebe79ca606cca = function (arg0) {
|
2904
2925
|
let result;
|
2905
2926
|
try {
|
@@ -2947,10 +2968,6 @@ function getImports() {
|
|
2947
2968
|
const ret = getObject(arg0).then(getObject(arg1));
|
2948
2969
|
return addHeapObject(ret);
|
2949
2970
|
};
|
2950
|
-
imports.wbg.__wbg_then_f753623316e2873a = function (arg0, arg1, arg2) {
|
2951
|
-
const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));
|
2952
|
-
return addHeapObject(ret);
|
2953
|
-
};
|
2954
2971
|
imports.wbg.__wbg_resolve_fd40f858d9db1a04 = function (arg0) {
|
2955
2972
|
const ret = Promise.resolve(getObject(arg0));
|
2956
2973
|
return addHeapObject(ret);
|
@@ -3015,12 +3032,12 @@ function getImports() {
|
|
3015
3032
|
return addHeapObject(ret);
|
3016
3033
|
}, arguments);
|
3017
3034
|
};
|
3018
|
-
imports.wbg.
|
3019
|
-
const ret = makeMutClosure(arg0, arg1,
|
3035
|
+
imports.wbg.__wbindgen_closure_wrapper1526 = function (arg0, arg1, arg2) {
|
3036
|
+
const ret = makeMutClosure(arg0, arg1, 144, __wbg_adapter_52);
|
3020
3037
|
return addHeapObject(ret);
|
3021
3038
|
};
|
3022
|
-
imports.wbg.
|
3023
|
-
const ret = makeMutClosure(arg0, arg1,
|
3039
|
+
imports.wbg.__wbindgen_closure_wrapper4415 = function (arg0, arg1, arg2) {
|
3040
|
+
const ret = makeMutClosure(arg0, arg1, 144, __wbg_adapter_55);
|
3024
3041
|
return addHeapObject(ret);
|
3025
3042
|
};
|
3026
3043
|
return imports;
|
@@ -3080,7 +3097,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3080
3097
|
var wasm = async (opt = {}) => {
|
3081
3098
|
let {importHook, serverPath} = opt;
|
3082
3099
|
|
3083
|
-
let path = "assets/core_crypto_ffi-
|
3100
|
+
let path = "assets/core_crypto_ffi-d45ab989.wasm";
|
3084
3101
|
|
3085
3102
|
if (serverPath != null) {
|
3086
3103
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -4116,17 +4133,19 @@ class WireE2eIdentity {
|
|
4116
4133
|
/**
|
4117
4134
|
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
4118
4135
|
*
|
4119
|
-
* @param
|
4120
|
-
* @param
|
4136
|
+
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4137
|
+
* @param domain DNS name of owning backend e.g. `example.com`
|
4138
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `impp:wireapp=NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ/6add501bacd1d90e@example.com`
|
4139
|
+
* @param handle user handle e.g. `impp:wireapp=alice.smith.qa@example.com`
|
4121
4140
|
* @param expiryDays generated x509 certificate expiry
|
4122
4141
|
* @param directory you got from {@link directoryResponse}
|
4123
4142
|
* @param account you got from {@link newAccountResponse}
|
4124
4143
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
4125
4144
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4126
4145
|
*/
|
4127
|
-
newOrderRequest(
|
4146
|
+
newOrderRequest(displayName, domain, clientId, handle, expiryDays, directory, account, previousNonce) {
|
4128
4147
|
try {
|
4129
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(
|
4148
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(displayName, domain, clientId, handle, expiryDays, directory, account, previousNonce);
|
4130
4149
|
}
|
4131
4150
|
catch (e) {
|
4132
4151
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4206,16 +4225,34 @@ class WireE2eIdentity {
|
|
4206
4225
|
}
|
4207
4226
|
}
|
4208
4227
|
/**
|
4209
|
-
* Creates a new challenge request.
|
4228
|
+
* Creates a new challenge request for Wire Dpop challenge.
|
4229
|
+
*
|
4230
|
+
* @param accessToken returned by wire-server from https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token
|
4231
|
+
* @param dpopChallenge you found after {@link newAuthzResponse}
|
4232
|
+
* @param account you found after {@link newAccountResponse}
|
4233
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
4234
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
4235
|
+
*/
|
4236
|
+
newDpopChallengeRequest(accessToken, dpopChallenge, account, previousNonce) {
|
4237
|
+
try {
|
4238
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_dpop_challenge_request(accessToken, dpopChallenge, account, previousNonce);
|
4239
|
+
}
|
4240
|
+
catch (e) {
|
4241
|
+
throw CoreCryptoError.fromStdError(e);
|
4242
|
+
}
|
4243
|
+
}
|
4244
|
+
/**
|
4245
|
+
* Creates a new challenge request for Wire Oidc challenge.
|
4210
4246
|
*
|
4211
|
-
* @param
|
4247
|
+
* @param idToken you get back from Identity Provider
|
4248
|
+
* @param oidcChallenge you found after {@link newAuthzResponse}
|
4212
4249
|
* @param account you found after {@link newAccountResponse}
|
4213
4250
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
4214
4251
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
4215
4252
|
*/
|
4216
|
-
|
4253
|
+
newOidcChallengeRequest(idToken, oidcChallenge, account, previousNonce) {
|
4217
4254
|
try {
|
4218
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").
|
4255
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_oidc_challenge_request(idToken, oidcChallenge, account, previousNonce);
|
4219
4256
|
}
|
4220
4257
|
catch (e) {
|
4221
4258
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4268,15 +4305,14 @@ class WireE2eIdentity {
|
|
4268
4305
|
/**
|
4269
4306
|
* Final step before fetching the certificate.
|
4270
4307
|
*
|
4271
|
-
* @param domains - domains you want to generate a certificate for e.g. `["wire.com"]`
|
4272
4308
|
* @param order - order you got from {@link checkOrderResponse}
|
4273
4309
|
* @param account - account you found after {@link newAccountResponse}
|
4274
4310
|
* @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
4275
4311
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4276
4312
|
*/
|
4277
|
-
finalizeRequest(
|
4313
|
+
finalizeRequest(order, account, previousNonce) {
|
4278
4314
|
try {
|
4279
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(
|
4315
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(order, account, previousNonce);
|
4280
4316
|
}
|
4281
4317
|
catch (e) {
|
4282
4318
|
throw CoreCryptoError.fromStdError(e);
|
Binary file
|