@wireapp/core-crypto 1.0.0-rc.32 → 1.0.0-rc.33
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json
CHANGED
|
Binary file
|
|
@@ -1,3 +1,5 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
1
3
|
/**
|
|
2
4
|
* see [core_crypto::prelude::DeviceStatus]
|
|
3
5
|
*/
|
|
@@ -1442,11 +1444,10 @@ export declare class E2eiEnrollment {
|
|
|
1442
1444
|
* Creates a new challenge request for Wire Oidc challenge.
|
|
1443
1445
|
*
|
|
1444
1446
|
* @param idToken you get back from Identity Provider
|
|
1445
|
-
* @param refreshToken you get back from Identity Provider to renew the access token
|
|
1446
1447
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
|
1447
1448
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
|
1448
1449
|
*/
|
|
1449
|
-
newOidcChallengeRequest(idToken: string,
|
|
1450
|
+
newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
|
|
1450
1451
|
/**
|
|
1451
1452
|
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
|
|
1452
1453
|
*
|
|
@@ -1454,7 +1455,7 @@ export declare class E2eiEnrollment {
|
|
|
1454
1455
|
* @param challenge HTTP response body
|
|
1455
1456
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
|
1456
1457
|
*/
|
|
1457
|
-
newOidcChallengeResponse(
|
|
1458
|
+
newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
|
|
1458
1459
|
/**
|
|
1459
1460
|
* Verifies that the previous challenge has been completed.
|
|
1460
1461
|
*
|
|
@@ -1493,12 +1494,6 @@ export declare class E2eiEnrollment {
|
|
|
1493
1494
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
|
1494
1495
|
*/
|
|
1495
1496
|
certificateRequest(previousNonce: string): Promise<JsonRawData>;
|
|
1496
|
-
/**
|
|
1497
|
-
* Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
|
|
1498
|
-
* If it's expired, the user needs to reauthenticate and they will update the refresh token
|
|
1499
|
-
* in {@link newOidcChallengeRequest}
|
|
1500
|
-
*/
|
|
1501
|
-
getRefreshToken(): Promise<String>;
|
|
1502
1497
|
}
|
|
1503
1498
|
/**
|
|
1504
1499
|
* Indicates the state of a Conversation regarding end-to-end identity.
|
|
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
|
|
|
232
232
|
wasm.__wbindgen_exn_store(addHeapObject(e));
|
|
233
233
|
}
|
|
234
234
|
};
|
|
235
|
-
var
|
|
235
|
+
var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
|
|
236
236
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
|
237
237
|
};
|
|
238
238
|
async function __wbg_load(module, imports) {
|
|
@@ -262,39 +262,32 @@ async function __wbg_load(module, imports) {
|
|
|
262
262
|
var __wbg_get_imports = function() {
|
|
263
263
|
const imports = {};
|
|
264
264
|
imports.wbg = {};
|
|
265
|
-
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
|
266
|
-
const ret = AcmeDirectory.__wrap(arg0);
|
|
267
|
-
return addHeapObject(ret);
|
|
268
|
-
};
|
|
269
|
-
imports.wbg.__wbg_commitbundle_new = function(arg0) {
|
|
270
|
-
const ret = CommitBundle.__wrap(arg0);
|
|
271
|
-
return addHeapObject(ret);
|
|
272
|
-
};
|
|
273
265
|
imports.wbg.__wbg_corecrypto_new = function(arg0) {
|
|
274
266
|
const ret = CoreCrypto.__wrap(arg0);
|
|
275
267
|
return addHeapObject(ret);
|
|
276
268
|
};
|
|
277
|
-
imports.wbg.
|
|
278
|
-
const ret = arg0;
|
|
269
|
+
imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
|
|
270
|
+
const ret = NewAcmeAuthz.__wrap(arg0);
|
|
279
271
|
return addHeapObject(ret);
|
|
280
272
|
};
|
|
281
273
|
imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
|
|
282
274
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
|
283
275
|
return addHeapObject(ret);
|
|
284
276
|
};
|
|
285
|
-
imports.wbg.
|
|
286
|
-
|
|
277
|
+
imports.wbg.__wbindgen_number_new = function(arg0) {
|
|
278
|
+
const ret = arg0;
|
|
279
|
+
return addHeapObject(ret);
|
|
287
280
|
};
|
|
288
|
-
imports.wbg.
|
|
289
|
-
const ret =
|
|
281
|
+
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
|
282
|
+
const ret = AcmeDirectory.__wrap(arg0);
|
|
290
283
|
return addHeapObject(ret);
|
|
291
284
|
};
|
|
292
|
-
imports.wbg.
|
|
293
|
-
const ret =
|
|
285
|
+
imports.wbg.__wbg_commitbundle_new = function(arg0) {
|
|
286
|
+
const ret = CommitBundle.__wrap(arg0);
|
|
294
287
|
return addHeapObject(ret);
|
|
295
288
|
};
|
|
296
|
-
imports.wbg.
|
|
297
|
-
const ret =
|
|
289
|
+
imports.wbg.__wbg_proposalbundle_new = function(arg0) {
|
|
290
|
+
const ret = ProposalBundle.__wrap(arg0);
|
|
298
291
|
return addHeapObject(ret);
|
|
299
292
|
};
|
|
300
293
|
imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
|
|
@@ -305,6 +298,13 @@ var __wbg_get_imports = function() {
|
|
|
305
298
|
const ret = BufferedDecryptedMessage.__wrap(arg0);
|
|
306
299
|
return addHeapObject(ret);
|
|
307
300
|
};
|
|
301
|
+
imports.wbg.__wbg_newacmeorder_new = function(arg0) {
|
|
302
|
+
const ret = NewAcmeOrder.__wrap(arg0);
|
|
303
|
+
return addHeapObject(ret);
|
|
304
|
+
};
|
|
305
|
+
imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
|
|
306
|
+
takeObject(arg0);
|
|
307
|
+
};
|
|
308
308
|
imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
|
|
309
309
|
const ret = getObject(arg0);
|
|
310
310
|
return addHeapObject(ret);
|
|
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
|
|
|
886
886
|
const a = state0.a;
|
|
887
887
|
state0.a = 0;
|
|
888
888
|
try {
|
|
889
|
-
return
|
|
889
|
+
return __wbg_adapter_412(a, state0.b, arg02, arg12);
|
|
890
890
|
} finally {
|
|
891
891
|
state0.a = a;
|
|
892
892
|
}
|
|
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
|
|
|
966
966
|
const ret = wasm.memory;
|
|
967
967
|
return addHeapObject(ret);
|
|
968
968
|
};
|
|
969
|
-
imports.wbg.
|
|
970
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
969
|
+
imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
|
|
970
|
+
const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
|
|
971
971
|
return addHeapObject(ret);
|
|
972
972
|
};
|
|
973
|
-
imports.wbg.
|
|
974
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
973
|
+
imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
|
|
974
|
+
const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
|
|
975
975
|
return addHeapObject(ret);
|
|
976
976
|
};
|
|
977
977
|
return imports;
|
|
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
|
|
|
1033
1033
|
var cachedBigInt64Memory0 = null;
|
|
1034
1034
|
var cachedUint32Memory0 = null;
|
|
1035
1035
|
var cachedUint16Memory0 = null;
|
|
1036
|
+
var DeviceStatus = Object.freeze({
|
|
1037
|
+
Valid: 0,
|
|
1038
|
+
"0": "Valid",
|
|
1039
|
+
Expired: 1,
|
|
1040
|
+
"1": "Expired",
|
|
1041
|
+
Revoked: 2,
|
|
1042
|
+
"2": "Revoked"
|
|
1043
|
+
});
|
|
1036
1044
|
var CredentialType = Object.freeze({
|
|
1037
1045
|
Basic: 1,
|
|
1038
1046
|
"1": "Basic",
|
|
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
|
|
|
1063
1071
|
Ciphertext: 2,
|
|
1064
1072
|
"2": "Ciphertext"
|
|
1065
1073
|
});
|
|
1066
|
-
var DeviceStatus = Object.freeze({
|
|
1067
|
-
Valid: 0,
|
|
1068
|
-
"0": "Valid",
|
|
1069
|
-
Expired: 1,
|
|
1070
|
-
"1": "Expired",
|
|
1071
|
-
Revoked: 2,
|
|
1072
|
-
"2": "Revoked"
|
|
1073
|
-
});
|
|
1074
1074
|
|
|
1075
1075
|
class AcmeChallenge {
|
|
1076
1076
|
static __wrap(ptr) {
|
|
@@ -1989,19 +1989,16 @@ class FfiWireE2EIdentity {
|
|
|
1989
1989
|
const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
|
1990
1990
|
return takeObject(ret);
|
|
1991
1991
|
}
|
|
1992
|
-
new_oidc_challenge_request(id_token,
|
|
1992
|
+
new_oidc_challenge_request(id_token, previous_nonce) {
|
|
1993
1993
|
const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
1994
1994
|
const len0 = WASM_VECTOR_LEN;
|
|
1995
|
-
const ptr1 = passStringToWasm0(
|
|
1995
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
1996
1996
|
const len1 = WASM_VECTOR_LEN;
|
|
1997
|
-
const
|
|
1998
|
-
const len2 = WASM_VECTOR_LEN;
|
|
1999
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
|
|
1997
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
|
|
2000
1998
|
return takeObject(ret);
|
|
2001
1999
|
}
|
|
2002
|
-
new_oidc_challenge_response(
|
|
2003
|
-
|
|
2004
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
|
|
2000
|
+
new_oidc_challenge_response(challenge) {
|
|
2001
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
|
2005
2002
|
return takeObject(ret);
|
|
2006
2003
|
}
|
|
2007
2004
|
check_order_request(order_url, previous_nonce) {
|
|
@@ -2032,10 +2029,6 @@ class FfiWireE2EIdentity {
|
|
|
2032
2029
|
const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
|
|
2033
2030
|
return takeObject(ret);
|
|
2034
2031
|
}
|
|
2035
|
-
get_refresh_token() {
|
|
2036
|
-
const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
|
|
2037
|
-
return takeObject(ret);
|
|
2038
|
-
}
|
|
2039
2032
|
}
|
|
2040
2033
|
|
|
2041
2034
|
class GroupInfoBundle {
|
|
@@ -2924,11 +2917,11 @@ class E2eiEnrollment {
|
|
|
2924
2917
|
async newDpopChallengeResponse(challenge) {
|
|
2925
2918
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
|
|
2926
2919
|
}
|
|
2927
|
-
async newOidcChallengeRequest(idToken,
|
|
2928
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken,
|
|
2920
|
+
async newOidcChallengeRequest(idToken, previousNonce) {
|
|
2921
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
|
|
2929
2922
|
}
|
|
2930
|
-
async newOidcChallengeResponse(
|
|
2931
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(
|
|
2923
|
+
async newOidcChallengeResponse(challenge) {
|
|
2924
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
|
|
2932
2925
|
}
|
|
2933
2926
|
async checkOrderRequest(orderUrl, previousNonce) {
|
|
2934
2927
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
|
|
@@ -2945,9 +2938,6 @@ class E2eiEnrollment {
|
|
|
2945
2938
|
async certificateRequest(previousNonce) {
|
|
2946
2939
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
|
|
2947
2940
|
}
|
|
2948
|
-
async getRefreshToken() {
|
|
2949
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
|
|
2950
|
-
}
|
|
2951
2941
|
}
|
|
2952
2942
|
var E2eiConversationState;
|
|
2953
2943
|
(function(E2eiConversationState2) {
|