@wireapp/core-crypto 1.0.0-rc.31 → 1.0.0-rc.33

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@wireapp/core-crypto",
3
- "version": "1.0.0-rc.31",
3
+ "version": "1.0.0-rc.33",
4
4
  "description": "CoreCrypto bindings for the Web",
5
5
  "type": "module",
6
6
  "module": "platforms/web/corecrypto.js",
@@ -1,3 +1,5 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
1
3
  /**
2
4
  * see [core_crypto::prelude::DeviceStatus]
3
5
  */
@@ -510,6 +512,10 @@ export interface DecryptedMessage {
510
512
  * because the DS did not fan them out in order.
511
513
  */
512
514
  bufferedMessages?: BufferedDecryptedMessage[];
515
+ /**
516
+ * New CRL distribution points that appeared by the introduction of a new credential
517
+ */
518
+ crlNewDistributionPoints?: string[];
513
519
  }
514
520
  /**
515
521
  * Almost same as {@link DecryptedMessage} but avoids recursion
@@ -543,6 +549,10 @@ export interface BufferedDecryptedMessage {
543
549
  * see {@link DecryptedMessage.identity}
544
550
  */
545
551
  identity?: WireIdentity;
552
+ /**
553
+ * see {@link DecryptedMessage.crlNewDistributionPoints}
554
+ */
555
+ crlNewDistributionPoints?: string[];
546
556
  }
547
557
  /**
548
558
  * Returned by all methods creating proposals. Contains a proposal message and an identifier to roll back the proposal
@@ -1434,11 +1444,10 @@ export declare class E2eiEnrollment {
1434
1444
  * Creates a new challenge request for Wire Oidc challenge.
1435
1445
  *
1436
1446
  * @param idToken you get back from Identity Provider
1437
- * @param refreshToken you get back from Identity Provider to renew the access token
1438
1447
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
1439
1448
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1440
1449
  */
1441
- newOidcChallengeRequest(idToken: string, refreshToken: string, previousNonce: string): Promise<JsonRawData>;
1450
+ newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
1442
1451
  /**
1443
1452
  * Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
1444
1453
  *
@@ -1446,7 +1455,7 @@ export declare class E2eiEnrollment {
1446
1455
  * @param challenge HTTP response body
1447
1456
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1448
1457
  */
1449
- newOidcChallengeResponse(cc: CoreCrypto, challenge: JsonRawData): Promise<void>;
1458
+ newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
1450
1459
  /**
1451
1460
  * Verifies that the previous challenge has been completed.
1452
1461
  *
@@ -1485,12 +1494,6 @@ export declare class E2eiEnrollment {
1485
1494
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
1486
1495
  */
1487
1496
  certificateRequest(previousNonce: string): Promise<JsonRawData>;
1488
- /**
1489
- * Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
1490
- * If it's expired, the user needs to reauthenticate and they will update the refresh token
1491
- * in {@link newOidcChallengeRequest}
1492
- */
1493
- getRefreshToken(): Promise<String>;
1494
1497
  }
1495
1498
  /**
1496
1499
  * Indicates the state of a Conversation regarding end-to-end identity.
@@ -1,4 +1,12 @@
1
1
  // bindings/js/wasm/core-crypto-ffi.js
2
+ var addHeapObject = function(obj) {
3
+ if (heap_next === heap.length)
4
+ heap.push(heap.length + 1);
5
+ const idx = heap_next;
6
+ heap_next = heap[idx];
7
+ heap[idx] = obj;
8
+ return idx;
9
+ };
2
10
  var getObject = function(idx) {
3
11
  return heap[idx];
4
12
  };
@@ -13,14 +21,6 @@ var takeObject = function(idx) {
13
21
  dropObject(idx);
14
22
  return ret;
15
23
  };
16
- var addHeapObject = function(obj) {
17
- if (heap_next === heap.length)
18
- heap.push(heap.length + 1);
19
- const idx = heap_next;
20
- heap_next = heap[idx];
21
- heap[idx] = obj;
22
- return idx;
23
- };
24
24
  var getUint8Memory0 = function() {
25
25
  if (cachedUint8Memory0 === null || cachedUint8Memory0.byteLength === 0) {
26
26
  cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
232
232
  wasm.__wbindgen_exn_store(addHeapObject(e));
233
233
  }
234
234
  };
235
- var __wbg_adapter_411 = function(arg0, arg1, arg2, arg3) {
235
+ var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
236
236
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
237
237
  };
238
238
  async function __wbg_load(module, imports) {
@@ -262,48 +262,48 @@ async function __wbg_load(module, imports) {
262
262
  var __wbg_get_imports = function() {
263
263
  const imports = {};
264
264
  imports.wbg = {};
265
+ imports.wbg.__wbg_corecrypto_new = function(arg0) {
266
+ const ret = CoreCrypto.__wrap(arg0);
267
+ return addHeapObject(ret);
268
+ };
269
+ imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
270
+ const ret = NewAcmeAuthz.__wrap(arg0);
271
+ return addHeapObject(ret);
272
+ };
265
273
  imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
266
274
  const ret = FfiWireE2EIdentity.__wrap(arg0);
267
275
  return addHeapObject(ret);
268
276
  };
269
- imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
270
- takeObject(arg0);
271
- };
272
277
  imports.wbg.__wbindgen_number_new = function(arg0) {
273
278
  const ret = arg0;
274
279
  return addHeapObject(ret);
275
280
  };
276
- imports.wbg.__wbg_corecrypto_new = function(arg0) {
277
- const ret = CoreCrypto.__wrap(arg0);
281
+ imports.wbg.__wbg_acmedirectory_new = function(arg0) {
282
+ const ret = AcmeDirectory.__wrap(arg0);
278
283
  return addHeapObject(ret);
279
284
  };
280
- imports.wbg.__wbg_newacmeorder_new = function(arg0) {
281
- const ret = NewAcmeOrder.__wrap(arg0);
285
+ imports.wbg.__wbg_commitbundle_new = function(arg0) {
286
+ const ret = CommitBundle.__wrap(arg0);
282
287
  return addHeapObject(ret);
283
288
  };
284
289
  imports.wbg.__wbg_proposalbundle_new = function(arg0) {
285
290
  const ret = ProposalBundle.__wrap(arg0);
286
291
  return addHeapObject(ret);
287
292
  };
288
- imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
289
- const ret = BufferedDecryptedMessage.__wrap(arg0);
290
- return addHeapObject(ret);
291
- };
292
- imports.wbg.__wbg_acmedirectory_new = function(arg0) {
293
- const ret = AcmeDirectory.__wrap(arg0);
293
+ imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
294
+ const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
294
295
  return addHeapObject(ret);
295
296
  };
296
- imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
297
- const ret = NewAcmeAuthz.__wrap(arg0);
297
+ imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
298
+ const ret = BufferedDecryptedMessage.__wrap(arg0);
298
299
  return addHeapObject(ret);
299
300
  };
300
- imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
301
- const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
301
+ imports.wbg.__wbg_newacmeorder_new = function(arg0) {
302
+ const ret = NewAcmeOrder.__wrap(arg0);
302
303
  return addHeapObject(ret);
303
304
  };
304
- imports.wbg.__wbg_commitbundle_new = function(arg0) {
305
- const ret = CommitBundle.__wrap(arg0);
306
- return addHeapObject(ret);
305
+ imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
306
+ takeObject(arg0);
307
307
  };
308
308
  imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
309
309
  const ret = getObject(arg0);
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
886
886
  const a = state0.a;
887
887
  state0.a = 0;
888
888
  try {
889
- return __wbg_adapter_411(a, state0.b, arg02, arg12);
889
+ return __wbg_adapter_412(a, state0.b, arg02, arg12);
890
890
  } finally {
891
891
  state0.a = a;
892
892
  }
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
966
966
  const ret = wasm.memory;
967
967
  return addHeapObject(ret);
968
968
  };
969
- imports.wbg.__wbindgen_closure_wrapper2506 = function(arg0, arg1, arg2) {
970
- const ret = makeMutClosure(arg0, arg1, 651, __wbg_adapter_54);
969
+ imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
970
+ const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
971
971
  return addHeapObject(ret);
972
972
  };
973
- imports.wbg.__wbindgen_closure_wrapper11500 = function(arg0, arg1, arg2) {
974
- const ret = makeMutClosure(arg0, arg1, 1597, __wbg_adapter_57);
973
+ imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
974
+ const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
975
975
  return addHeapObject(ret);
976
976
  };
977
977
  return imports;
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
1033
1033
  var cachedBigInt64Memory0 = null;
1034
1034
  var cachedUint32Memory0 = null;
1035
1035
  var cachedUint16Memory0 = null;
1036
+ var DeviceStatus = Object.freeze({
1037
+ Valid: 0,
1038
+ "0": "Valid",
1039
+ Expired: 1,
1040
+ "1": "Expired",
1041
+ Revoked: 2,
1042
+ "2": "Revoked"
1043
+ });
1036
1044
  var CredentialType = Object.freeze({
1037
1045
  Basic: 1,
1038
1046
  "1": "Basic",
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
1063
1071
  Ciphertext: 2,
1064
1072
  "2": "Ciphertext"
1065
1073
  });
1066
- var DeviceStatus = Object.freeze({
1067
- Valid: 0,
1068
- "0": "Valid",
1069
- Expired: 1,
1070
- "1": "Expired",
1071
- Revoked: 2,
1072
- "2": "Revoked"
1073
- });
1074
1074
 
1075
1075
  class AcmeChallenge {
1076
1076
  static __wrap(ptr) {
@@ -1268,6 +1268,10 @@ class BufferedDecryptedMessage {
1268
1268
  const ret = wasm.buffereddecryptedmessage_identity(this.__wbg_ptr);
1269
1269
  return ret === 0 ? undefined : WireIdentity.__wrap(ret);
1270
1270
  }
1271
+ get crl_new_distribution_points() {
1272
+ const ret = wasm.buffereddecryptedmessage_crl_new_distribution_points(this.__wbg_ptr);
1273
+ return takeObject(ret);
1274
+ }
1271
1275
  }
1272
1276
 
1273
1277
  class CommitBundle {
@@ -1985,19 +1989,16 @@ class FfiWireE2EIdentity {
1985
1989
  const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
1986
1990
  return takeObject(ret);
1987
1991
  }
1988
- new_oidc_challenge_request(id_token, refresh_token, previous_nonce) {
1992
+ new_oidc_challenge_request(id_token, previous_nonce) {
1989
1993
  const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1990
1994
  const len0 = WASM_VECTOR_LEN;
1991
- const ptr1 = passStringToWasm0(refresh_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1995
+ const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1992
1996
  const len1 = WASM_VECTOR_LEN;
1993
- const ptr2 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1994
- const len2 = WASM_VECTOR_LEN;
1995
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
1997
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
1996
1998
  return takeObject(ret);
1997
1999
  }
1998
- new_oidc_challenge_response(cc, challenge) {
1999
- _assertClass(cc, CoreCrypto);
2000
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
2000
+ new_oidc_challenge_response(challenge) {
2001
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
2001
2002
  return takeObject(ret);
2002
2003
  }
2003
2004
  check_order_request(order_url, previous_nonce) {
@@ -2028,10 +2029,6 @@ class FfiWireE2EIdentity {
2028
2029
  const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
2029
2030
  return takeObject(ret);
2030
2031
  }
2031
- get_refresh_token() {
2032
- const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
2033
- return takeObject(ret);
2034
- }
2035
2032
  }
2036
2033
 
2037
2034
  class GroupInfoBundle {
@@ -2564,9 +2561,11 @@ class CoreCrypto2 {
2564
2561
  isActive: m.is_active,
2565
2562
  senderClientId: m.sender_client_id,
2566
2563
  commitDelay: m.commit_delay,
2567
- hasEpochChanged: m.has_epoch_changed
2564
+ hasEpochChanged: m.has_epoch_changed,
2565
+ crlNewDistributionPoints: m.crl_new_distribution_points
2568
2566
  };
2569
- })
2567
+ }),
2568
+ crlNewDistributionPoints: ffiDecryptedMessage.crl_new_distribution_points
2570
2569
  };
2571
2570
  return ret;
2572
2571
  } catch (e) {
@@ -2918,11 +2917,11 @@ class E2eiEnrollment {
2918
2917
  async newDpopChallengeResponse(challenge) {
2919
2918
  return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
2920
2919
  }
2921
- async newOidcChallengeRequest(idToken, refreshToken, previousNonce) {
2922
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, refreshToken, previousNonce));
2920
+ async newOidcChallengeRequest(idToken, previousNonce) {
2921
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
2923
2922
  }
2924
- async newOidcChallengeResponse(cc, challenge) {
2925
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(cc.inner(), challenge));
2923
+ async newOidcChallengeResponse(challenge) {
2924
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
2926
2925
  }
2927
2926
  async checkOrderRequest(orderUrl, previousNonce) {
2928
2927
  return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
@@ -2939,9 +2938,6 @@ class E2eiEnrollment {
2939
2938
  async certificateRequest(previousNonce) {
2940
2939
  return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
2941
2940
  }
2942
- async getRefreshToken() {
2943
- return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
2944
- }
2945
2941
  }
2946
2942
  var E2eiConversationState;
2947
2943
  (function(E2eiConversationState2) {