@wireapp/core-crypto 1.0.0-rc.32 → 1.0.0-rc.33

Sign up to get free protection for your applications and to get access to all the features.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@wireapp/core-crypto",
3
- "version": "1.0.0-rc.32",
3
+ "version": "1.0.0-rc.33",
4
4
  "description": "CoreCrypto bindings for the Web",
5
5
  "type": "module",
6
6
  "module": "platforms/web/corecrypto.js",
@@ -1,3 +1,5 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
1
3
  /**
2
4
  * see [core_crypto::prelude::DeviceStatus]
3
5
  */
@@ -1442,11 +1444,10 @@ export declare class E2eiEnrollment {
1442
1444
  * Creates a new challenge request for Wire Oidc challenge.
1443
1445
  *
1444
1446
  * @param idToken you get back from Identity Provider
1445
- * @param refreshToken you get back from Identity Provider to renew the access token
1446
1447
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
1447
1448
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1448
1449
  */
1449
- newOidcChallengeRequest(idToken: string, refreshToken: string, previousNonce: string): Promise<JsonRawData>;
1450
+ newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
1450
1451
  /**
1451
1452
  * Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
1452
1453
  *
@@ -1454,7 +1455,7 @@ export declare class E2eiEnrollment {
1454
1455
  * @param challenge HTTP response body
1455
1456
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
1456
1457
  */
1457
- newOidcChallengeResponse(cc: CoreCrypto, challenge: JsonRawData): Promise<void>;
1458
+ newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
1458
1459
  /**
1459
1460
  * Verifies that the previous challenge has been completed.
1460
1461
  *
@@ -1493,12 +1494,6 @@ export declare class E2eiEnrollment {
1493
1494
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
1494
1495
  */
1495
1496
  certificateRequest(previousNonce: string): Promise<JsonRawData>;
1496
- /**
1497
- * Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
1498
- * If it's expired, the user needs to reauthenticate and they will update the refresh token
1499
- * in {@link newOidcChallengeRequest}
1500
- */
1501
- getRefreshToken(): Promise<String>;
1502
1497
  }
1503
1498
  /**
1504
1499
  * Indicates the state of a Conversation regarding end-to-end identity.
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
232
232
  wasm.__wbindgen_exn_store(addHeapObject(e));
233
233
  }
234
234
  };
235
- var __wbg_adapter_413 = function(arg0, arg1, arg2, arg3) {
235
+ var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
236
236
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
237
237
  };
238
238
  async function __wbg_load(module, imports) {
@@ -262,39 +262,32 @@ async function __wbg_load(module, imports) {
262
262
  var __wbg_get_imports = function() {
263
263
  const imports = {};
264
264
  imports.wbg = {};
265
- imports.wbg.__wbg_acmedirectory_new = function(arg0) {
266
- const ret = AcmeDirectory.__wrap(arg0);
267
- return addHeapObject(ret);
268
- };
269
- imports.wbg.__wbg_commitbundle_new = function(arg0) {
270
- const ret = CommitBundle.__wrap(arg0);
271
- return addHeapObject(ret);
272
- };
273
265
  imports.wbg.__wbg_corecrypto_new = function(arg0) {
274
266
  const ret = CoreCrypto.__wrap(arg0);
275
267
  return addHeapObject(ret);
276
268
  };
277
- imports.wbg.__wbindgen_number_new = function(arg0) {
278
- const ret = arg0;
269
+ imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
270
+ const ret = NewAcmeAuthz.__wrap(arg0);
279
271
  return addHeapObject(ret);
280
272
  };
281
273
  imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
282
274
  const ret = FfiWireE2EIdentity.__wrap(arg0);
283
275
  return addHeapObject(ret);
284
276
  };
285
- imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
286
- takeObject(arg0);
277
+ imports.wbg.__wbindgen_number_new = function(arg0) {
278
+ const ret = arg0;
279
+ return addHeapObject(ret);
287
280
  };
288
- imports.wbg.__wbg_proposalbundle_new = function(arg0) {
289
- const ret = ProposalBundle.__wrap(arg0);
281
+ imports.wbg.__wbg_acmedirectory_new = function(arg0) {
282
+ const ret = AcmeDirectory.__wrap(arg0);
290
283
  return addHeapObject(ret);
291
284
  };
292
- imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
293
- const ret = NewAcmeAuthz.__wrap(arg0);
285
+ imports.wbg.__wbg_commitbundle_new = function(arg0) {
286
+ const ret = CommitBundle.__wrap(arg0);
294
287
  return addHeapObject(ret);
295
288
  };
296
- imports.wbg.__wbg_newacmeorder_new = function(arg0) {
297
- const ret = NewAcmeOrder.__wrap(arg0);
289
+ imports.wbg.__wbg_proposalbundle_new = function(arg0) {
290
+ const ret = ProposalBundle.__wrap(arg0);
298
291
  return addHeapObject(ret);
299
292
  };
300
293
  imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
@@ -305,6 +298,13 @@ var __wbg_get_imports = function() {
305
298
  const ret = BufferedDecryptedMessage.__wrap(arg0);
306
299
  return addHeapObject(ret);
307
300
  };
301
+ imports.wbg.__wbg_newacmeorder_new = function(arg0) {
302
+ const ret = NewAcmeOrder.__wrap(arg0);
303
+ return addHeapObject(ret);
304
+ };
305
+ imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
306
+ takeObject(arg0);
307
+ };
308
308
  imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
309
309
  const ret = getObject(arg0);
310
310
  return addHeapObject(ret);
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
886
886
  const a = state0.a;
887
887
  state0.a = 0;
888
888
  try {
889
- return __wbg_adapter_413(a, state0.b, arg02, arg12);
889
+ return __wbg_adapter_412(a, state0.b, arg02, arg12);
890
890
  } finally {
891
891
  state0.a = a;
892
892
  }
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
966
966
  const ret = wasm.memory;
967
967
  return addHeapObject(ret);
968
968
  };
969
- imports.wbg.__wbindgen_closure_wrapper2515 = function(arg0, arg1, arg2) {
970
- const ret = makeMutClosure(arg0, arg1, 651, __wbg_adapter_54);
969
+ imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
970
+ const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
971
971
  return addHeapObject(ret);
972
972
  };
973
- imports.wbg.__wbindgen_closure_wrapper11461 = function(arg0, arg1, arg2) {
974
- const ret = makeMutClosure(arg0, arg1, 1589, __wbg_adapter_57);
973
+ imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
974
+ const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
975
975
  return addHeapObject(ret);
976
976
  };
977
977
  return imports;
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
1033
1033
  var cachedBigInt64Memory0 = null;
1034
1034
  var cachedUint32Memory0 = null;
1035
1035
  var cachedUint16Memory0 = null;
1036
+ var DeviceStatus = Object.freeze({
1037
+ Valid: 0,
1038
+ "0": "Valid",
1039
+ Expired: 1,
1040
+ "1": "Expired",
1041
+ Revoked: 2,
1042
+ "2": "Revoked"
1043
+ });
1036
1044
  var CredentialType = Object.freeze({
1037
1045
  Basic: 1,
1038
1046
  "1": "Basic",
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
1063
1071
  Ciphertext: 2,
1064
1072
  "2": "Ciphertext"
1065
1073
  });
1066
- var DeviceStatus = Object.freeze({
1067
- Valid: 0,
1068
- "0": "Valid",
1069
- Expired: 1,
1070
- "1": "Expired",
1071
- Revoked: 2,
1072
- "2": "Revoked"
1073
- });
1074
1074
 
1075
1075
  class AcmeChallenge {
1076
1076
  static __wrap(ptr) {
@@ -1989,19 +1989,16 @@ class FfiWireE2EIdentity {
1989
1989
  const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
1990
1990
  return takeObject(ret);
1991
1991
  }
1992
- new_oidc_challenge_request(id_token, refresh_token, previous_nonce) {
1992
+ new_oidc_challenge_request(id_token, previous_nonce) {
1993
1993
  const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1994
1994
  const len0 = WASM_VECTOR_LEN;
1995
- const ptr1 = passStringToWasm0(refresh_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1995
+ const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1996
1996
  const len1 = WASM_VECTOR_LEN;
1997
- const ptr2 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1998
- const len2 = WASM_VECTOR_LEN;
1999
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
1997
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
2000
1998
  return takeObject(ret);
2001
1999
  }
2002
- new_oidc_challenge_response(cc, challenge) {
2003
- _assertClass(cc, CoreCrypto);
2004
- const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
2000
+ new_oidc_challenge_response(challenge) {
2001
+ const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
2005
2002
  return takeObject(ret);
2006
2003
  }
2007
2004
  check_order_request(order_url, previous_nonce) {
@@ -2032,10 +2029,6 @@ class FfiWireE2EIdentity {
2032
2029
  const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
2033
2030
  return takeObject(ret);
2034
2031
  }
2035
- get_refresh_token() {
2036
- const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
2037
- return takeObject(ret);
2038
- }
2039
2032
  }
2040
2033
 
2041
2034
  class GroupInfoBundle {
@@ -2924,11 +2917,11 @@ class E2eiEnrollment {
2924
2917
  async newDpopChallengeResponse(challenge) {
2925
2918
  return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
2926
2919
  }
2927
- async newOidcChallengeRequest(idToken, refreshToken, previousNonce) {
2928
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, refreshToken, previousNonce));
2920
+ async newOidcChallengeRequest(idToken, previousNonce) {
2921
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
2929
2922
  }
2930
- async newOidcChallengeResponse(cc, challenge) {
2931
- return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(cc.inner(), challenge));
2923
+ async newOidcChallengeResponse(challenge) {
2924
+ return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
2932
2925
  }
2933
2926
  async checkOrderRequest(orderUrl, previousNonce) {
2934
2927
  return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
@@ -2945,9 +2938,6 @@ class E2eiEnrollment {
2945
2938
  async certificateRequest(previousNonce) {
2946
2939
  return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
2947
2940
  }
2948
- async getRefreshToken() {
2949
- return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
2950
- }
2951
2941
  }
2952
2942
  var E2eiConversationState;
2953
2943
  (function(E2eiConversationState2) {