@wireapp/core-crypto 1.0.0-rc.31 → 1.0.0-rc.33
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json
CHANGED
Binary file
|
@@ -1,3 +1,5 @@
|
|
1
|
+
/* tslint:disable */
|
2
|
+
/* eslint-disable */
|
1
3
|
/**
|
2
4
|
* see [core_crypto::prelude::DeviceStatus]
|
3
5
|
*/
|
@@ -510,6 +512,10 @@ export interface DecryptedMessage {
|
|
510
512
|
* because the DS did not fan them out in order.
|
511
513
|
*/
|
512
514
|
bufferedMessages?: BufferedDecryptedMessage[];
|
515
|
+
/**
|
516
|
+
* New CRL distribution points that appeared by the introduction of a new credential
|
517
|
+
*/
|
518
|
+
crlNewDistributionPoints?: string[];
|
513
519
|
}
|
514
520
|
/**
|
515
521
|
* Almost same as {@link DecryptedMessage} but avoids recursion
|
@@ -543,6 +549,10 @@ export interface BufferedDecryptedMessage {
|
|
543
549
|
* see {@link DecryptedMessage.identity}
|
544
550
|
*/
|
545
551
|
identity?: WireIdentity;
|
552
|
+
/**
|
553
|
+
* see {@link DecryptedMessage.crlNewDistributionPoints}
|
554
|
+
*/
|
555
|
+
crlNewDistributionPoints?: string[];
|
546
556
|
}
|
547
557
|
/**
|
548
558
|
* Returned by all methods creating proposals. Contains a proposal message and an identifier to roll back the proposal
|
@@ -1434,11 +1444,10 @@ export declare class E2eiEnrollment {
|
|
1434
1444
|
* Creates a new challenge request for Wire Oidc challenge.
|
1435
1445
|
*
|
1436
1446
|
* @param idToken you get back from Identity Provider
|
1437
|
-
* @param refreshToken you get back from Identity Provider to renew the access token
|
1438
1447
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
1439
1448
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1440
1449
|
*/
|
1441
|
-
newOidcChallengeRequest(idToken: string,
|
1450
|
+
newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
|
1442
1451
|
/**
|
1443
1452
|
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
|
1444
1453
|
*
|
@@ -1446,7 +1455,7 @@ export declare class E2eiEnrollment {
|
|
1446
1455
|
* @param challenge HTTP response body
|
1447
1456
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1448
1457
|
*/
|
1449
|
-
newOidcChallengeResponse(
|
1458
|
+
newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
|
1450
1459
|
/**
|
1451
1460
|
* Verifies that the previous challenge has been completed.
|
1452
1461
|
*
|
@@ -1485,12 +1494,6 @@ export declare class E2eiEnrollment {
|
|
1485
1494
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
1486
1495
|
*/
|
1487
1496
|
certificateRequest(previousNonce: string): Promise<JsonRawData>;
|
1488
|
-
/**
|
1489
|
-
* Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
|
1490
|
-
* If it's expired, the user needs to reauthenticate and they will update the refresh token
|
1491
|
-
* in {@link newOidcChallengeRequest}
|
1492
|
-
*/
|
1493
|
-
getRefreshToken(): Promise<String>;
|
1494
1497
|
}
|
1495
1498
|
/**
|
1496
1499
|
* Indicates the state of a Conversation regarding end-to-end identity.
|
@@ -1,4 +1,12 @@
|
|
1
1
|
// bindings/js/wasm/core-crypto-ffi.js
|
2
|
+
var addHeapObject = function(obj) {
|
3
|
+
if (heap_next === heap.length)
|
4
|
+
heap.push(heap.length + 1);
|
5
|
+
const idx = heap_next;
|
6
|
+
heap_next = heap[idx];
|
7
|
+
heap[idx] = obj;
|
8
|
+
return idx;
|
9
|
+
};
|
2
10
|
var getObject = function(idx) {
|
3
11
|
return heap[idx];
|
4
12
|
};
|
@@ -13,14 +21,6 @@ var takeObject = function(idx) {
|
|
13
21
|
dropObject(idx);
|
14
22
|
return ret;
|
15
23
|
};
|
16
|
-
var addHeapObject = function(obj) {
|
17
|
-
if (heap_next === heap.length)
|
18
|
-
heap.push(heap.length + 1);
|
19
|
-
const idx = heap_next;
|
20
|
-
heap_next = heap[idx];
|
21
|
-
heap[idx] = obj;
|
22
|
-
return idx;
|
23
|
-
};
|
24
24
|
var getUint8Memory0 = function() {
|
25
25
|
if (cachedUint8Memory0 === null || cachedUint8Memory0.byteLength === 0) {
|
26
26
|
cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);
|
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
|
|
232
232
|
wasm.__wbindgen_exn_store(addHeapObject(e));
|
233
233
|
}
|
234
234
|
};
|
235
|
-
var
|
235
|
+
var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
|
236
236
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
237
237
|
};
|
238
238
|
async function __wbg_load(module, imports) {
|
@@ -262,48 +262,48 @@ async function __wbg_load(module, imports) {
|
|
262
262
|
var __wbg_get_imports = function() {
|
263
263
|
const imports = {};
|
264
264
|
imports.wbg = {};
|
265
|
+
imports.wbg.__wbg_corecrypto_new = function(arg0) {
|
266
|
+
const ret = CoreCrypto.__wrap(arg0);
|
267
|
+
return addHeapObject(ret);
|
268
|
+
};
|
269
|
+
imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
|
270
|
+
const ret = NewAcmeAuthz.__wrap(arg0);
|
271
|
+
return addHeapObject(ret);
|
272
|
+
};
|
265
273
|
imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
|
266
274
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
267
275
|
return addHeapObject(ret);
|
268
276
|
};
|
269
|
-
imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
|
270
|
-
takeObject(arg0);
|
271
|
-
};
|
272
277
|
imports.wbg.__wbindgen_number_new = function(arg0) {
|
273
278
|
const ret = arg0;
|
274
279
|
return addHeapObject(ret);
|
275
280
|
};
|
276
|
-
imports.wbg.
|
277
|
-
const ret =
|
281
|
+
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
282
|
+
const ret = AcmeDirectory.__wrap(arg0);
|
278
283
|
return addHeapObject(ret);
|
279
284
|
};
|
280
|
-
imports.wbg.
|
281
|
-
const ret =
|
285
|
+
imports.wbg.__wbg_commitbundle_new = function(arg0) {
|
286
|
+
const ret = CommitBundle.__wrap(arg0);
|
282
287
|
return addHeapObject(ret);
|
283
288
|
};
|
284
289
|
imports.wbg.__wbg_proposalbundle_new = function(arg0) {
|
285
290
|
const ret = ProposalBundle.__wrap(arg0);
|
286
291
|
return addHeapObject(ret);
|
287
292
|
};
|
288
|
-
imports.wbg.
|
289
|
-
const ret =
|
290
|
-
return addHeapObject(ret);
|
291
|
-
};
|
292
|
-
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
293
|
-
const ret = AcmeDirectory.__wrap(arg0);
|
293
|
+
imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
|
294
|
+
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
294
295
|
return addHeapObject(ret);
|
295
296
|
};
|
296
|
-
imports.wbg.
|
297
|
-
const ret =
|
297
|
+
imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
|
298
|
+
const ret = BufferedDecryptedMessage.__wrap(arg0);
|
298
299
|
return addHeapObject(ret);
|
299
300
|
};
|
300
|
-
imports.wbg.
|
301
|
-
const ret =
|
301
|
+
imports.wbg.__wbg_newacmeorder_new = function(arg0) {
|
302
|
+
const ret = NewAcmeOrder.__wrap(arg0);
|
302
303
|
return addHeapObject(ret);
|
303
304
|
};
|
304
|
-
imports.wbg.
|
305
|
-
|
306
|
-
return addHeapObject(ret);
|
305
|
+
imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
|
306
|
+
takeObject(arg0);
|
307
307
|
};
|
308
308
|
imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
|
309
309
|
const ret = getObject(arg0);
|
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
|
|
886
886
|
const a = state0.a;
|
887
887
|
state0.a = 0;
|
888
888
|
try {
|
889
|
-
return
|
889
|
+
return __wbg_adapter_412(a, state0.b, arg02, arg12);
|
890
890
|
} finally {
|
891
891
|
state0.a = a;
|
892
892
|
}
|
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
|
|
966
966
|
const ret = wasm.memory;
|
967
967
|
return addHeapObject(ret);
|
968
968
|
};
|
969
|
-
imports.wbg.
|
970
|
-
const ret = makeMutClosure(arg0, arg1,
|
969
|
+
imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
|
970
|
+
const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
|
971
971
|
return addHeapObject(ret);
|
972
972
|
};
|
973
|
-
imports.wbg.
|
974
|
-
const ret = makeMutClosure(arg0, arg1,
|
973
|
+
imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
|
974
|
+
const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
|
975
975
|
return addHeapObject(ret);
|
976
976
|
};
|
977
977
|
return imports;
|
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
|
|
1033
1033
|
var cachedBigInt64Memory0 = null;
|
1034
1034
|
var cachedUint32Memory0 = null;
|
1035
1035
|
var cachedUint16Memory0 = null;
|
1036
|
+
var DeviceStatus = Object.freeze({
|
1037
|
+
Valid: 0,
|
1038
|
+
"0": "Valid",
|
1039
|
+
Expired: 1,
|
1040
|
+
"1": "Expired",
|
1041
|
+
Revoked: 2,
|
1042
|
+
"2": "Revoked"
|
1043
|
+
});
|
1036
1044
|
var CredentialType = Object.freeze({
|
1037
1045
|
Basic: 1,
|
1038
1046
|
"1": "Basic",
|
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
|
|
1063
1071
|
Ciphertext: 2,
|
1064
1072
|
"2": "Ciphertext"
|
1065
1073
|
});
|
1066
|
-
var DeviceStatus = Object.freeze({
|
1067
|
-
Valid: 0,
|
1068
|
-
"0": "Valid",
|
1069
|
-
Expired: 1,
|
1070
|
-
"1": "Expired",
|
1071
|
-
Revoked: 2,
|
1072
|
-
"2": "Revoked"
|
1073
|
-
});
|
1074
1074
|
|
1075
1075
|
class AcmeChallenge {
|
1076
1076
|
static __wrap(ptr) {
|
@@ -1268,6 +1268,10 @@ class BufferedDecryptedMessage {
|
|
1268
1268
|
const ret = wasm.buffereddecryptedmessage_identity(this.__wbg_ptr);
|
1269
1269
|
return ret === 0 ? undefined : WireIdentity.__wrap(ret);
|
1270
1270
|
}
|
1271
|
+
get crl_new_distribution_points() {
|
1272
|
+
const ret = wasm.buffereddecryptedmessage_crl_new_distribution_points(this.__wbg_ptr);
|
1273
|
+
return takeObject(ret);
|
1274
|
+
}
|
1271
1275
|
}
|
1272
1276
|
|
1273
1277
|
class CommitBundle {
|
@@ -1985,19 +1989,16 @@ class FfiWireE2EIdentity {
|
|
1985
1989
|
const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
1986
1990
|
return takeObject(ret);
|
1987
1991
|
}
|
1988
|
-
new_oidc_challenge_request(id_token,
|
1992
|
+
new_oidc_challenge_request(id_token, previous_nonce) {
|
1989
1993
|
const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
1990
1994
|
const len0 = WASM_VECTOR_LEN;
|
1991
|
-
const ptr1 = passStringToWasm0(
|
1995
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
1992
1996
|
const len1 = WASM_VECTOR_LEN;
|
1993
|
-
const
|
1994
|
-
const len2 = WASM_VECTOR_LEN;
|
1995
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
|
1997
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
|
1996
1998
|
return takeObject(ret);
|
1997
1999
|
}
|
1998
|
-
new_oidc_challenge_response(
|
1999
|
-
|
2000
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
|
2000
|
+
new_oidc_challenge_response(challenge) {
|
2001
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
2001
2002
|
return takeObject(ret);
|
2002
2003
|
}
|
2003
2004
|
check_order_request(order_url, previous_nonce) {
|
@@ -2028,10 +2029,6 @@ class FfiWireE2EIdentity {
|
|
2028
2029
|
const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
|
2029
2030
|
return takeObject(ret);
|
2030
2031
|
}
|
2031
|
-
get_refresh_token() {
|
2032
|
-
const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
|
2033
|
-
return takeObject(ret);
|
2034
|
-
}
|
2035
2032
|
}
|
2036
2033
|
|
2037
2034
|
class GroupInfoBundle {
|
@@ -2564,9 +2561,11 @@ class CoreCrypto2 {
|
|
2564
2561
|
isActive: m.is_active,
|
2565
2562
|
senderClientId: m.sender_client_id,
|
2566
2563
|
commitDelay: m.commit_delay,
|
2567
|
-
hasEpochChanged: m.has_epoch_changed
|
2564
|
+
hasEpochChanged: m.has_epoch_changed,
|
2565
|
+
crlNewDistributionPoints: m.crl_new_distribution_points
|
2568
2566
|
};
|
2569
|
-
})
|
2567
|
+
}),
|
2568
|
+
crlNewDistributionPoints: ffiDecryptedMessage.crl_new_distribution_points
|
2570
2569
|
};
|
2571
2570
|
return ret;
|
2572
2571
|
} catch (e) {
|
@@ -2918,11 +2917,11 @@ class E2eiEnrollment {
|
|
2918
2917
|
async newDpopChallengeResponse(challenge) {
|
2919
2918
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
|
2920
2919
|
}
|
2921
|
-
async newOidcChallengeRequest(idToken,
|
2922
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken,
|
2920
|
+
async newOidcChallengeRequest(idToken, previousNonce) {
|
2921
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
|
2923
2922
|
}
|
2924
|
-
async newOidcChallengeResponse(
|
2925
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(
|
2923
|
+
async newOidcChallengeResponse(challenge) {
|
2924
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
|
2926
2925
|
}
|
2927
2926
|
async checkOrderRequest(orderUrl, previousNonce) {
|
2928
2927
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
|
@@ -2939,9 +2938,6 @@ class E2eiEnrollment {
|
|
2939
2938
|
async certificateRequest(previousNonce) {
|
2940
2939
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
|
2941
2940
|
}
|
2942
|
-
async getRefreshToken() {
|
2943
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
|
2944
|
-
}
|
2945
2941
|
}
|
2946
2942
|
var E2eiConversationState;
|
2947
2943
|
(function(E2eiConversationState2) {
|