@wireapp/core-crypto 1.0.0-rc.31 → 1.0.0-rc.33

Sign up to get free protection for your applications and to get access to all the features.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@wireapp/core-crypto",
3
- "version": "1.0.0-rc.31",
3
+ "version": "1.0.0-rc.33",
4
4
  "description": "CoreCrypto bindings for the Web",
5
5
  "type": "module",
6
6
  "module": "platforms/web/corecrypto.js",
@@ -1,3 +1,5 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
1
3
  /**
2
4
  * see [core_crypto::prelude::DeviceStatus]
3
5
  */
@@ -510,6 +512,10 @@ export interface DecryptedMessage {
510
512
  * because the DS did not fan them out in order.
511
513
  */
512
514
  bufferedMessages?: BufferedDecryptedMessage[];
515
+ /**
516
+ * New CRL distribution points that appeared by the introduction of a new credential
517
+ */
518
+ crlNewDistributionPoints?: string[];
513
519
  }
514
520
  /**
515
521
  * Almost same as {@link DecryptedMessage} but avoids recursion
@@ -543,6 +549,10 @@ export interface BufferedDecryptedMessage {
543
549
  * see {@link DecryptedMessage.identity}
544
550
  */
545
551
  identity?: WireIdentity;
552
+ /**
553
+ * see {@link DecryptedMessage.crlNewDistributionPoints}
554
+ */
555
+ crlNewDistributionPoints?: string[];
546
556
  }
547
557
  /**
548
558
  * Returned by all methods creating proposals. Contains a proposal message and an identifier to roll back the proposal
@@ -1434,11 +1444,10 @@ export declare class E2eiEnrollment {
1434
1444
  * Creates a new challenge request for Wire Oidc challenge.
1435
1445
  *
1436
1446
  * @param idToken you get back from Identity Provider
1437
- * @param refreshToken you get back from Identity Provider to renew the access token
1438
1447
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
1439
1448
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1440
1449
  */
1441
- newOidcChallengeRequest(idToken: string, refreshToken: string, previousNonce: string): Promise<JsonRawData>;
1450
+ newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
1442
1451
  /**
1443
1452
  * Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
1444
1453
  *
@@ -1446,7 +1455,7 @@ export declare class E2eiEnrollment {
1446
1455
  * @param challenge HTTP response body
1447
1456
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1448
1457
  */
1449
- newOidcChallengeResponse(cc: CoreCrypto, challenge: JsonRawData): Promise<void>;
1458
+ newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
1450
1459
  /**
1451
1460
  * Verifies that the previous challenge has been completed.
1452
1461
  *
@@ -1485,12 +1494,6 @@ export declare class E2eiEnrollment {
1485
1494
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
1486
1495
  */
1487
1496
  certificateRequest(previousNonce: string): Promise<JsonRawData>;
1488
- /**
1489
- * Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
1490
- * If it's expired, the user needs to reauthenticate and they will update the refresh token
1491
- * in {@link newOidcChallengeRequest}
1492
- */
1493
- getRefreshToken(): Promise<String>;
1494
1497
  }
1495
1498
  /**
1496
1499
  * Indicates the state of a Conversation regarding end-to-end identity.
@@ -1,4 +1,12 @@
1
1
  // bindings/js/wasm/core-crypto-ffi.js
2
+ var addHeapObject = function(obj) {
3
+ if (heap_next === heap.length)
4
+ heap.push(heap.length + 1);
5
+ const idx = heap_next;
6
+ heap_next = heap[idx];
7
+ heap[idx] = obj;
8
+ return idx;
9
+ };
2
10
  var getObject = function(idx) {
3
11
  return heap[idx];
4
12
  };
@@ -13,14 +21,6 @@ var takeObject = function(idx) {
13
21
  dropObject(idx);
14
22
  return ret;
15
23
  };
16
- var addHeapObject = function(obj) {
17
- if (heap_next === heap.length)
18
- heap.push(heap.length + 1);
19
- const idx = heap_next;
20
- heap_next = heap[idx];
21
- heap[idx] = obj;
22
- return idx;
23
- };
24
24
  var getUint8Memory0 = function() {
25
25
  if (cachedUint8Memory0 === null || cachedUint8Memory0.byteLength === 0) {
26
26
  cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
232
232
  wasm.__wbindgen_exn_store(addHeapObject(e));
233
233
  }
234
234
  };
235
- var __wbg_adapter_411 = function(arg0, arg1, arg2, arg3) {
235
+ var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
236
236
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
237
237
  };
238
238
  async function __wbg_load(module, imports) {
@@ -262,48 +262,48 @@ async function __wbg_load(module, imports) {
262
262
  var __wbg_get_imports = function() {
263
263
  const imports = {};
264
264
  imports.wbg = {};
265
+ imports.wbg.__wbg_corecrypto_new = function(arg0) {
266
+ const ret = CoreCrypto.__wrap(arg0);
267
+ return addHeapObject(ret);
268
+ };
269
+ imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
270
+ const ret = NewAcmeAuthz.__wrap(arg0);
271
+ return addHeapObject(ret);
272
+ };
265
273
  imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
266
274
  const ret = FfiWireE2EIdentity.__wrap(arg0);
267
275
  return addHeapObject(ret);
268
276
  };
269
- imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
270
- takeObject(arg0);
271
- };
272
277
  imports.wbg.__wbindgen_number_new = function(arg0) {
273
278
  const ret = arg0;
274
279
  return addHeapObject(ret);
275
280
  };
276
- imports.wbg.__wbg_corecrypto_new = function(arg0) {
277
- const ret = CoreCrypto.__wrap(arg0);
281
+ imports.wbg.__wbg_acmedirectory_new = function(arg0) {
282
+ const ret = AcmeDirectory.__wrap(arg0);
278
283
  return addHeapObject(ret);
279
284
  };
280
- imports.wbg.__wbg_newacmeorder_new = function(arg0) {
281
- const ret = NewAcmeOrder.__wrap(arg0);
285
+ imports.wbg.__wbg_commitbundle_new = function(arg0) {
286
+ const ret = CommitBundle.__wrap(arg0);
282
287
  return addHeapObject(ret);
283
288
  };
284
289
  imports.wbg.__wbg_proposalbundle_new = function(arg0) {
285
290
  const ret = ProposalBundle.__wrap(arg0);
286
291
  return addHeapObject(ret);
287
292
  };
288
- imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
289
- const ret = BufferedDecryptedMessage.__wrap(arg0);
290
- return addHeapObject(ret);
291
- };
292
- imports.wbg.__wbg_acmedirectory_new = function(arg0) {
293
- const ret = AcmeDirectory.__wrap(arg0);
293
+ imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
294
+ const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
294
295
  return addHeapObject(ret);
295
296
  };
296
- imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
297
- const ret = NewAcmeAuthz.__wrap(arg0);
297
+ imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
298
+ const ret = BufferedDecryptedMessage.__wrap(arg0);
298
299
  return addHeapObject(ret);
299
300
  };
300
- imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
301
- const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
301
+ imports.wbg.__wbg_newacmeorder_new = function(arg0) {
302
+ const ret = NewAcmeOrder.__wrap(arg0);
302
303
  return addHeapObject(ret);
303
304
  };
304
- imports.wbg.__wbg_commitbundle_new = function(arg0) {
305
- const ret = CommitBundle.__wrap(arg0);
306
- return addHeapObject(ret);
305
+ imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
306
+ takeObject(arg0);
307
307
  };
308
308
  imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
309
309
  const ret = getObject(arg0);
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
886
886
  const a = state0.a;
887
887
  state0.a = 0;
888
888
  try {
889
- return __wbg_adapter_411(a, state0.b, arg02, arg12);
889
+ return __wbg_adapter_412(a, state0.b, arg02, arg12);
890
890
  } finally {
891
891
  state0.a = a;
892
892
  }
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
966
966
  const ret = wasm.memory;
967
967
  return addHeapObject(ret);
968
968
  };
969
- imports.wbg.__wbindgen_closure_wrapper2506 = function(arg0, arg1, arg2) {
970
- const ret = makeMutClosure(arg0, arg1, 651, __wbg_adapter_54);
969
+ imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
970
+ const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
971
971
  return addHeapObject(ret);
972
972
  };
973
- imports.wbg.__wbindgen_closure_wrapper11500 = function(arg0, arg1, arg2) {
974
- const ret = makeMutClosure(arg0, arg1, 1597, __wbg_adapter_57);
973
+ imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
974
+ const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
975
975
  return addHeapObject(ret);
976
976
  };
977
977
  return imports;
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
1033
1033
  var cachedBigInt64Memory0 = null;
1034
1034
  var cachedUint32Memory0 = null;
1035
1035
  var cachedUint16Memory0 = null;
1036
+ var DeviceStatus = Object.freeze({
1037
+ Valid: 0,
1038
+ "0": "Valid",
1039
+ Expired: 1,
1040
+ "1": "Expired",
1041
+ Revoked: 2,
1042
+ "2": "Revoked"
1043
+ });
1036
1044
  var CredentialType = Object.freeze({
1037
1045
  Basic: 1,
1038
1046
  "1": "Basic",
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
1063
1071
  Ciphertext: 2,
1064
1072
  "2": "Ciphertext"
1065
1073
  });
1066
- var DeviceStatus = Object.freeze({
1067
- Valid: 0,
1068
- "0": "Valid",
1069
- Expired: 1,
1070
- "1": "Expired",
1071
- Revoked: 2,
1072
- "2": "Revoked"
1073
- });
1074
1074
 
1075
1075
  class AcmeChallenge {
1076
1076
  static __wrap(ptr) {
@@ -1268,6 +1268,10 @@ class BufferedDecryptedMessage {
1268
1268
  const ret = wasm.buffereddecryptedmessage_identity(this.__wbg_ptr);
1269
1269
  return ret === 0 ? undefined : WireIdentity.__wrap(ret);
1270
1270
  }
1271
+ get crl_new_distribution_points() {
1272
+ const ret = wasm.buffereddecryptedmessage_crl_new_distribution_points(this.__wbg_ptr);
1273
+ return takeObject(ret);
1274
+ }
1271
1275
  }
1272
1276
 
1273
1277
  class CommitBundle {
@@ -1985,19 +1989,16 @@ class FfiWireE2EIdentity {
1985
1989
  const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
1986
1990
  return takeObject(ret);
1987
1991
  }
1988
- new_oidc_challenge_request(id_token, refresh_token, previous_nonce) {
1992
+ new_oidc_challenge_request(id_token, previous_nonce) {
1989
1993
  const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1990
1994
  const len0 = WASM_VECTOR_LEN;
1991
- const ptr1 = passStringToWasm0(refresh_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1995
+ const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1992
1996
  const len1 = WASM_VECTOR_LEN;
1993
- const ptr2 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1994
- const len2 = WASM_VECTOR_LEN;
1995
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
1997
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
1996
1998
  return takeObject(ret);
1997
1999
  }
1998
- new_oidc_challenge_response(cc, challenge) {
1999
- _assertClass(cc, CoreCrypto);
2000
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
2000
+ new_oidc_challenge_response(challenge) {
2001
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
2001
2002
  return takeObject(ret);
2002
2003
  }
2003
2004
  check_order_request(order_url, previous_nonce) {
@@ -2028,10 +2029,6 @@ class FfiWireE2EIdentity {
2028
2029
  const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
2029
2030
  return takeObject(ret);
2030
2031
  }
2031
- get_refresh_token() {
2032
- const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
2033
- return takeObject(ret);
2034
- }
2035
2032
  }
2036
2033
 
2037
2034
  class GroupInfoBundle {
@@ -2564,9 +2561,11 @@ class CoreCrypto2 {
2564
2561
  isActive: m.is_active,
2565
2562
  senderClientId: m.sender_client_id,
2566
2563
  commitDelay: m.commit_delay,
2567
- hasEpochChanged: m.has_epoch_changed
2564
+ hasEpochChanged: m.has_epoch_changed,
2565
+ crlNewDistributionPoints: m.crl_new_distribution_points
2568
2566
  };
2569
- })
2567
+ }),
2568
+ crlNewDistributionPoints: ffiDecryptedMessage.crl_new_distribution_points
2570
2569
  };
2571
2570
  return ret;
2572
2571
  } catch (e) {
@@ -2918,11 +2917,11 @@ class E2eiEnrollment {
2918
2917
  async newDpopChallengeResponse(challenge) {
2919
2918
  return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
2920
2919
  }
2921
- async newOidcChallengeRequest(idToken, refreshToken, previousNonce) {
2922
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, refreshToken, previousNonce));
2920
+ async newOidcChallengeRequest(idToken, previousNonce) {
2921
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
2923
2922
  }
2924
- async newOidcChallengeResponse(cc, challenge) {
2925
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(cc.inner(), challenge));
2923
+ async newOidcChallengeResponse(challenge) {
2924
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
2926
2925
  }
2927
2926
  async checkOrderRequest(orderUrl, previousNonce) {
2928
2927
  return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
@@ -2939,9 +2938,6 @@ class E2eiEnrollment {
2939
2938
  async certificateRequest(previousNonce) {
2940
2939
  return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
2941
2940
  }
2942
- async getRefreshToken() {
2943
- return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
2944
- }
2945
2941
  }
2946
2942
  var E2eiConversationState;
2947
2943
  (function(E2eiConversationState2) {