@wireapp/core-crypto 1.0.0-rc.32 → 1.0.0-rc.33

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@wireapp/core-crypto",
3
- "version": "1.0.0-rc.32",
3
+ "version": "1.0.0-rc.33",
4
4
  "description": "CoreCrypto bindings for the Web",
5
5
  "type": "module",
6
6
  "module": "platforms/web/corecrypto.js",
@@ -1,3 +1,5 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
1
3
  /**
2
4
  * see [core_crypto::prelude::DeviceStatus]
3
5
  */
@@ -1442,11 +1444,10 @@ export declare class E2eiEnrollment {
1442
1444
  * Creates a new challenge request for Wire Oidc challenge.
1443
1445
  *
1444
1446
  * @param idToken you get back from Identity Provider
1445
- * @param refreshToken you get back from Identity Provider to renew the access token
1446
1447
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
1447
1448
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1448
1449
  */
1449
- newOidcChallengeRequest(idToken: string, refreshToken: string, previousNonce: string): Promise<JsonRawData>;
1450
+ newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
1450
1451
  /**
1451
1452
  * Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
1452
1453
  *
@@ -1454,7 +1455,7 @@ export declare class E2eiEnrollment {
1454
1455
  * @param challenge HTTP response body
1455
1456
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1456
1457
  */
1457
- newOidcChallengeResponse(cc: CoreCrypto, challenge: JsonRawData): Promise<void>;
1458
+ newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
1458
1459
  /**
1459
1460
  * Verifies that the previous challenge has been completed.
1460
1461
  *
@@ -1493,12 +1494,6 @@ export declare class E2eiEnrollment {
1493
1494
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
1494
1495
  */
1495
1496
  certificateRequest(previousNonce: string): Promise<JsonRawData>;
1496
- /**
1497
- * Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
1498
- * If it's expired, the user needs to reauthenticate and they will update the refresh token
1499
- * in {@link newOidcChallengeRequest}
1500
- */
1501
- getRefreshToken(): Promise<String>;
1502
1497
  }
1503
1498
  /**
1504
1499
  * Indicates the state of a Conversation regarding end-to-end identity.
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
232
232
  wasm.__wbindgen_exn_store(addHeapObject(e));
233
233
  }
234
234
  };
235
- var __wbg_adapter_413 = function(arg0, arg1, arg2, arg3) {
235
+ var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
236
236
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
237
237
  };
238
238
  async function __wbg_load(module, imports) {
@@ -262,39 +262,32 @@ async function __wbg_load(module, imports) {
262
262
  var __wbg_get_imports = function() {
263
263
  const imports = {};
264
264
  imports.wbg = {};
265
- imports.wbg.__wbg_acmedirectory_new = function(arg0) {
266
- const ret = AcmeDirectory.__wrap(arg0);
267
- return addHeapObject(ret);
268
- };
269
- imports.wbg.__wbg_commitbundle_new = function(arg0) {
270
- const ret = CommitBundle.__wrap(arg0);
271
- return addHeapObject(ret);
272
- };
273
265
  imports.wbg.__wbg_corecrypto_new = function(arg0) {
274
266
  const ret = CoreCrypto.__wrap(arg0);
275
267
  return addHeapObject(ret);
276
268
  };
277
- imports.wbg.__wbindgen_number_new = function(arg0) {
278
- const ret = arg0;
269
+ imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
270
+ const ret = NewAcmeAuthz.__wrap(arg0);
279
271
  return addHeapObject(ret);
280
272
  };
281
273
  imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
282
274
  const ret = FfiWireE2EIdentity.__wrap(arg0);
283
275
  return addHeapObject(ret);
284
276
  };
285
- imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
286
- takeObject(arg0);
277
+ imports.wbg.__wbindgen_number_new = function(arg0) {
278
+ const ret = arg0;
279
+ return addHeapObject(ret);
287
280
  };
288
- imports.wbg.__wbg_proposalbundle_new = function(arg0) {
289
- const ret = ProposalBundle.__wrap(arg0);
281
+ imports.wbg.__wbg_acmedirectory_new = function(arg0) {
282
+ const ret = AcmeDirectory.__wrap(arg0);
290
283
  return addHeapObject(ret);
291
284
  };
292
- imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
293
- const ret = NewAcmeAuthz.__wrap(arg0);
285
+ imports.wbg.__wbg_commitbundle_new = function(arg0) {
286
+ const ret = CommitBundle.__wrap(arg0);
294
287
  return addHeapObject(ret);
295
288
  };
296
- imports.wbg.__wbg_newacmeorder_new = function(arg0) {
297
- const ret = NewAcmeOrder.__wrap(arg0);
289
+ imports.wbg.__wbg_proposalbundle_new = function(arg0) {
290
+ const ret = ProposalBundle.__wrap(arg0);
298
291
  return addHeapObject(ret);
299
292
  };
300
293
  imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
@@ -305,6 +298,13 @@ var __wbg_get_imports = function() {
305
298
  const ret = BufferedDecryptedMessage.__wrap(arg0);
306
299
  return addHeapObject(ret);
307
300
  };
301
+ imports.wbg.__wbg_newacmeorder_new = function(arg0) {
302
+ const ret = NewAcmeOrder.__wrap(arg0);
303
+ return addHeapObject(ret);
304
+ };
305
+ imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
306
+ takeObject(arg0);
307
+ };
308
308
  imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
309
309
  const ret = getObject(arg0);
310
310
  return addHeapObject(ret);
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
886
886
  const a = state0.a;
887
887
  state0.a = 0;
888
888
  try {
889
- return __wbg_adapter_413(a, state0.b, arg02, arg12);
889
+ return __wbg_adapter_412(a, state0.b, arg02, arg12);
890
890
  } finally {
891
891
  state0.a = a;
892
892
  }
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
966
966
  const ret = wasm.memory;
967
967
  return addHeapObject(ret);
968
968
  };
969
- imports.wbg.__wbindgen_closure_wrapper2515 = function(arg0, arg1, arg2) {
970
- const ret = makeMutClosure(arg0, arg1, 651, __wbg_adapter_54);
969
+ imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
970
+ const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
971
971
  return addHeapObject(ret);
972
972
  };
973
- imports.wbg.__wbindgen_closure_wrapper11461 = function(arg0, arg1, arg2) {
974
- const ret = makeMutClosure(arg0, arg1, 1589, __wbg_adapter_57);
973
+ imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
974
+ const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
975
975
  return addHeapObject(ret);
976
976
  };
977
977
  return imports;
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
1033
1033
  var cachedBigInt64Memory0 = null;
1034
1034
  var cachedUint32Memory0 = null;
1035
1035
  var cachedUint16Memory0 = null;
1036
+ var DeviceStatus = Object.freeze({
1037
+ Valid: 0,
1038
+ "0": "Valid",
1039
+ Expired: 1,
1040
+ "1": "Expired",
1041
+ Revoked: 2,
1042
+ "2": "Revoked"
1043
+ });
1036
1044
  var CredentialType = Object.freeze({
1037
1045
  Basic: 1,
1038
1046
  "1": "Basic",
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
1063
1071
  Ciphertext: 2,
1064
1072
  "2": "Ciphertext"
1065
1073
  });
1066
- var DeviceStatus = Object.freeze({
1067
- Valid: 0,
1068
- "0": "Valid",
1069
- Expired: 1,
1070
- "1": "Expired",
1071
- Revoked: 2,
1072
- "2": "Revoked"
1073
- });
1074
1074
 
1075
1075
  class AcmeChallenge {
1076
1076
  static __wrap(ptr) {
@@ -1989,19 +1989,16 @@ class FfiWireE2EIdentity {
1989
1989
  const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
1990
1990
  return takeObject(ret);
1991
1991
  }
1992
- new_oidc_challenge_request(id_token, refresh_token, previous_nonce) {
1992
+ new_oidc_challenge_request(id_token, previous_nonce) {
1993
1993
  const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1994
1994
  const len0 = WASM_VECTOR_LEN;
1995
- const ptr1 = passStringToWasm0(refresh_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1995
+ const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1996
1996
  const len1 = WASM_VECTOR_LEN;
1997
- const ptr2 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1998
- const len2 = WASM_VECTOR_LEN;
1999
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
1997
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
2000
1998
  return takeObject(ret);
2001
1999
  }
2002
- new_oidc_challenge_response(cc, challenge) {
2003
- _assertClass(cc, CoreCrypto);
2004
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
2000
+ new_oidc_challenge_response(challenge) {
2001
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
2005
2002
  return takeObject(ret);
2006
2003
  }
2007
2004
  check_order_request(order_url, previous_nonce) {
@@ -2032,10 +2029,6 @@ class FfiWireE2EIdentity {
2032
2029
  const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
2033
2030
  return takeObject(ret);
2034
2031
  }
2035
- get_refresh_token() {
2036
- const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
2037
- return takeObject(ret);
2038
- }
2039
2032
  }
2040
2033
 
2041
2034
  class GroupInfoBundle {
@@ -2924,11 +2917,11 @@ class E2eiEnrollment {
2924
2917
  async newDpopChallengeResponse(challenge) {
2925
2918
  return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
2926
2919
  }
2927
- async newOidcChallengeRequest(idToken, refreshToken, previousNonce) {
2928
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, refreshToken, previousNonce));
2920
+ async newOidcChallengeRequest(idToken, previousNonce) {
2921
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
2929
2922
  }
2930
- async newOidcChallengeResponse(cc, challenge) {
2931
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(cc.inner(), challenge));
2923
+ async newOidcChallengeResponse(challenge) {
2924
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
2932
2925
  }
2933
2926
  async checkOrderRequest(orderUrl, previousNonce) {
2934
2927
  return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
@@ -2945,9 +2938,6 @@ class E2eiEnrollment {
2945
2938
  async certificateRequest(previousNonce) {
2946
2939
  return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
2947
2940
  }
2948
- async getRefreshToken() {
2949
- return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
2950
- }
2951
2941
  }
2952
2942
  var E2eiConversationState;
2953
2943
  (function(E2eiConversationState2) {