@wireapp/core-crypto 1.0.0-rc.32 → 1.0.0-rc.33
Sign up to get free protection for your applications and to get access to all the features.
package/package.json
CHANGED
Binary file
|
@@ -1,3 +1,5 @@
|
|
1
|
+
/* tslint:disable */
|
2
|
+
/* eslint-disable */
|
1
3
|
/**
|
2
4
|
* see [core_crypto::prelude::DeviceStatus]
|
3
5
|
*/
|
@@ -1442,11 +1444,10 @@ export declare class E2eiEnrollment {
|
|
1442
1444
|
* Creates a new challenge request for Wire Oidc challenge.
|
1443
1445
|
*
|
1444
1446
|
* @param idToken you get back from Identity Provider
|
1445
|
-
* @param refreshToken you get back from Identity Provider to renew the access token
|
1446
1447
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
1447
1448
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1448
1449
|
*/
|
1449
|
-
newOidcChallengeRequest(idToken: string,
|
1450
|
+
newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
|
1450
1451
|
/**
|
1451
1452
|
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
|
1452
1453
|
*
|
@@ -1454,7 +1455,7 @@ export declare class E2eiEnrollment {
|
|
1454
1455
|
* @param challenge HTTP response body
|
1455
1456
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1456
1457
|
*/
|
1457
|
-
newOidcChallengeResponse(
|
1458
|
+
newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
|
1458
1459
|
/**
|
1459
1460
|
* Verifies that the previous challenge has been completed.
|
1460
1461
|
*
|
@@ -1493,12 +1494,6 @@ export declare class E2eiEnrollment {
|
|
1493
1494
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
1494
1495
|
*/
|
1495
1496
|
certificateRequest(previousNonce: string): Promise<JsonRawData>;
|
1496
|
-
/**
|
1497
|
-
* Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
|
1498
|
-
* If it's expired, the user needs to reauthenticate and they will update the refresh token
|
1499
|
-
* in {@link newOidcChallengeRequest}
|
1500
|
-
*/
|
1501
|
-
getRefreshToken(): Promise<String>;
|
1502
1497
|
}
|
1503
1498
|
/**
|
1504
1499
|
* Indicates the state of a Conversation regarding end-to-end identity.
|
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
|
|
232
232
|
wasm.__wbindgen_exn_store(addHeapObject(e));
|
233
233
|
}
|
234
234
|
};
|
235
|
-
var
|
235
|
+
var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
|
236
236
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
237
237
|
};
|
238
238
|
async function __wbg_load(module, imports) {
|
@@ -262,39 +262,32 @@ async function __wbg_load(module, imports) {
|
|
262
262
|
var __wbg_get_imports = function() {
|
263
263
|
const imports = {};
|
264
264
|
imports.wbg = {};
|
265
|
-
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
266
|
-
const ret = AcmeDirectory.__wrap(arg0);
|
267
|
-
return addHeapObject(ret);
|
268
|
-
};
|
269
|
-
imports.wbg.__wbg_commitbundle_new = function(arg0) {
|
270
|
-
const ret = CommitBundle.__wrap(arg0);
|
271
|
-
return addHeapObject(ret);
|
272
|
-
};
|
273
265
|
imports.wbg.__wbg_corecrypto_new = function(arg0) {
|
274
266
|
const ret = CoreCrypto.__wrap(arg0);
|
275
267
|
return addHeapObject(ret);
|
276
268
|
};
|
277
|
-
imports.wbg.
|
278
|
-
const ret = arg0;
|
269
|
+
imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
|
270
|
+
const ret = NewAcmeAuthz.__wrap(arg0);
|
279
271
|
return addHeapObject(ret);
|
280
272
|
};
|
281
273
|
imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
|
282
274
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
283
275
|
return addHeapObject(ret);
|
284
276
|
};
|
285
|
-
imports.wbg.
|
286
|
-
|
277
|
+
imports.wbg.__wbindgen_number_new = function(arg0) {
|
278
|
+
const ret = arg0;
|
279
|
+
return addHeapObject(ret);
|
287
280
|
};
|
288
|
-
imports.wbg.
|
289
|
-
const ret =
|
281
|
+
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
282
|
+
const ret = AcmeDirectory.__wrap(arg0);
|
290
283
|
return addHeapObject(ret);
|
291
284
|
};
|
292
|
-
imports.wbg.
|
293
|
-
const ret =
|
285
|
+
imports.wbg.__wbg_commitbundle_new = function(arg0) {
|
286
|
+
const ret = CommitBundle.__wrap(arg0);
|
294
287
|
return addHeapObject(ret);
|
295
288
|
};
|
296
|
-
imports.wbg.
|
297
|
-
const ret =
|
289
|
+
imports.wbg.__wbg_proposalbundle_new = function(arg0) {
|
290
|
+
const ret = ProposalBundle.__wrap(arg0);
|
298
291
|
return addHeapObject(ret);
|
299
292
|
};
|
300
293
|
imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
|
@@ -305,6 +298,13 @@ var __wbg_get_imports = function() {
|
|
305
298
|
const ret = BufferedDecryptedMessage.__wrap(arg0);
|
306
299
|
return addHeapObject(ret);
|
307
300
|
};
|
301
|
+
imports.wbg.__wbg_newacmeorder_new = function(arg0) {
|
302
|
+
const ret = NewAcmeOrder.__wrap(arg0);
|
303
|
+
return addHeapObject(ret);
|
304
|
+
};
|
305
|
+
imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
|
306
|
+
takeObject(arg0);
|
307
|
+
};
|
308
308
|
imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
|
309
309
|
const ret = getObject(arg0);
|
310
310
|
return addHeapObject(ret);
|
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
|
|
886
886
|
const a = state0.a;
|
887
887
|
state0.a = 0;
|
888
888
|
try {
|
889
|
-
return
|
889
|
+
return __wbg_adapter_412(a, state0.b, arg02, arg12);
|
890
890
|
} finally {
|
891
891
|
state0.a = a;
|
892
892
|
}
|
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
|
|
966
966
|
const ret = wasm.memory;
|
967
967
|
return addHeapObject(ret);
|
968
968
|
};
|
969
|
-
imports.wbg.
|
970
|
-
const ret = makeMutClosure(arg0, arg1,
|
969
|
+
imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
|
970
|
+
const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
|
971
971
|
return addHeapObject(ret);
|
972
972
|
};
|
973
|
-
imports.wbg.
|
974
|
-
const ret = makeMutClosure(arg0, arg1,
|
973
|
+
imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
|
974
|
+
const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
|
975
975
|
return addHeapObject(ret);
|
976
976
|
};
|
977
977
|
return imports;
|
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
|
|
1033
1033
|
var cachedBigInt64Memory0 = null;
|
1034
1034
|
var cachedUint32Memory0 = null;
|
1035
1035
|
var cachedUint16Memory0 = null;
|
1036
|
+
var DeviceStatus = Object.freeze({
|
1037
|
+
Valid: 0,
|
1038
|
+
"0": "Valid",
|
1039
|
+
Expired: 1,
|
1040
|
+
"1": "Expired",
|
1041
|
+
Revoked: 2,
|
1042
|
+
"2": "Revoked"
|
1043
|
+
});
|
1036
1044
|
var CredentialType = Object.freeze({
|
1037
1045
|
Basic: 1,
|
1038
1046
|
"1": "Basic",
|
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
|
|
1063
1071
|
Ciphertext: 2,
|
1064
1072
|
"2": "Ciphertext"
|
1065
1073
|
});
|
1066
|
-
var DeviceStatus = Object.freeze({
|
1067
|
-
Valid: 0,
|
1068
|
-
"0": "Valid",
|
1069
|
-
Expired: 1,
|
1070
|
-
"1": "Expired",
|
1071
|
-
Revoked: 2,
|
1072
|
-
"2": "Revoked"
|
1073
|
-
});
|
1074
1074
|
|
1075
1075
|
class AcmeChallenge {
|
1076
1076
|
static __wrap(ptr) {
|
@@ -1989,19 +1989,16 @@ class FfiWireE2EIdentity {
|
|
1989
1989
|
const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
1990
1990
|
return takeObject(ret);
|
1991
1991
|
}
|
1992
|
-
new_oidc_challenge_request(id_token,
|
1992
|
+
new_oidc_challenge_request(id_token, previous_nonce) {
|
1993
1993
|
const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
1994
1994
|
const len0 = WASM_VECTOR_LEN;
|
1995
|
-
const ptr1 = passStringToWasm0(
|
1995
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
1996
1996
|
const len1 = WASM_VECTOR_LEN;
|
1997
|
-
const
|
1998
|
-
const len2 = WASM_VECTOR_LEN;
|
1999
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
|
1997
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
|
2000
1998
|
return takeObject(ret);
|
2001
1999
|
}
|
2002
|
-
new_oidc_challenge_response(
|
2003
|
-
|
2004
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
|
2000
|
+
new_oidc_challenge_response(challenge) {
|
2001
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
2005
2002
|
return takeObject(ret);
|
2006
2003
|
}
|
2007
2004
|
check_order_request(order_url, previous_nonce) {
|
@@ -2032,10 +2029,6 @@ class FfiWireE2EIdentity {
|
|
2032
2029
|
const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
|
2033
2030
|
return takeObject(ret);
|
2034
2031
|
}
|
2035
|
-
get_refresh_token() {
|
2036
|
-
const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
|
2037
|
-
return takeObject(ret);
|
2038
|
-
}
|
2039
2032
|
}
|
2040
2033
|
|
2041
2034
|
class GroupInfoBundle {
|
@@ -2924,11 +2917,11 @@ class E2eiEnrollment {
|
|
2924
2917
|
async newDpopChallengeResponse(challenge) {
|
2925
2918
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
|
2926
2919
|
}
|
2927
|
-
async newOidcChallengeRequest(idToken,
|
2928
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken,
|
2920
|
+
async newOidcChallengeRequest(idToken, previousNonce) {
|
2921
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
|
2929
2922
|
}
|
2930
|
-
async newOidcChallengeResponse(
|
2931
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(
|
2923
|
+
async newOidcChallengeResponse(challenge) {
|
2924
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
|
2932
2925
|
}
|
2933
2926
|
async checkOrderRequest(orderUrl, previousNonce) {
|
2934
2927
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
|
@@ -2945,9 +2938,6 @@ class E2eiEnrollment {
|
|
2945
2938
|
async certificateRequest(previousNonce) {
|
2946
2939
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
|
2947
2940
|
}
|
2948
|
-
async getRefreshToken() {
|
2949
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
|
2950
|
-
}
|
2951
2941
|
}
|
2952
2942
|
var E2eiConversationState;
|
2953
2943
|
(function(E2eiConversationState2) {
|