@wireapp/core 43.7.2 → 43.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/AcmeService.d.ts +1 -0
- package/lib/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/AcmeService.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/schema.d.ts +3 -0
- package/lib/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/schema.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/schema.js +1 -0
- package/lib/messagingProtocols/mls/E2EIdentityService/E2EIService.types.d.ts +2 -5
- package/lib/messagingProtocols/mls/E2EIdentityService/E2EIService.types.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/E2EIServiceInternal.d.ts +5 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/E2EIServiceInternal.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/E2EIServiceInternal.js +2 -2
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/Authorization.d.ts +4 -7
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/Authorization.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/Authorization.js +34 -25
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.d.ts +1 -0
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.js +3 -3
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.types.d.ts +2 -2
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.types.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/OidcChallenge.d.ts +2 -2
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/OidcChallenge.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/Steps/OidcChallenge.js +3 -3
- package/lib/messagingProtocols/mls/E2EIdentityService/Storage/E2EIStorage.schema.d.ts +20 -25
- package/lib/messagingProtocols/mls/E2EIdentityService/Storage/E2EIStorage.schema.d.ts.map +1 -1
- package/lib/messagingProtocols/mls/E2EIdentityService/Storage/E2EIStorage.schema.js +2 -3
- package/package.json +3 -3
package/lib/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/AcmeService.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"AcmeService.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/AcmeService.ts"],"names":[],"mappings":"AAsBA,OAAO,EACL,uBAAuB,EACvB,0BAA0B,EAE1B,0BAA0B,EAC3B,MAAM,qBAAqB,CAAC;AAkB7B,OAAO,EAAC,aAAa,EAAE,aAAa,EAAC,MAAM,yBAAyB,CAAC;AAErE,qBAAa,WAAW;IAOV,OAAO,CAAC,YAAY;IANhC,OAAO,CAAC,MAAM,CAAwC;IACtD,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAiC;IAC/D,OAAO,CAAC,QAAQ,CAAC,GAAG,CAElB;gBAEkB,YAAY,EAAE,MAAM;IAExC,OAAO,KAAK,WAAW,GAGtB;IAID,OAAO,CAAC,YAAY;IAIpB,OAAO,CAAC,eAAe;YAIT,eAAe;IAsBhB,YAAY,IAAI,uBAAuB;IAWvC,uBAAuB,IAAI,OAAO,CAAC,MAAM,CAAC;IAM1C,eAAe,CAAC,GAAG,EAAE,aAAa,CAAC,UAAU,CAAC,GAAG,0BAA0B;IAW3E,gBAAgB,CAAC,GAAG,EAAE,aAAa,CAAC,YAAY,CAAC,EAAE,OAAO,EAAE,UAAU;;;;;IAQtE,cAAc,CAAC,GAAG,EAAE,aAAa,CAAC,UAAU,CAAC,EAAE,OAAO,EAAE,UAAU;;;;;;;;;;;;IASlE,gBAAgB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU;;;;;;;;;;;;;;;IAQjD,qBAAqB,CAAC,GAAG,EAAE,aAAa,CAAC,KAAK,CAAC,EAAE,OAAO,EAAE,UAAU
|
|
1
|
+
{"version":3,"file":"AcmeService.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/AcmeService.ts"],"names":[],"mappings":"AAsBA,OAAO,EACL,uBAAuB,EACvB,0BAA0B,EAE1B,0BAA0B,EAC3B,MAAM,qBAAqB,CAAC;AAkB7B,OAAO,EAAC,aAAa,EAAE,aAAa,EAAC,MAAM,yBAAyB,CAAC;AAErE,qBAAa,WAAW;IAOV,OAAO,CAAC,YAAY;IANhC,OAAO,CAAC,MAAM,CAAwC;IACtD,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAiC;IAC/D,OAAO,CAAC,QAAQ,CAAC,GAAG,CAElB;gBAEkB,YAAY,EAAE,MAAM;IAExC,OAAO,KAAK,WAAW,GAGtB;IAID,OAAO,CAAC,YAAY;IAIpB,OAAO,CAAC,eAAe;YAIT,eAAe;IAsBhB,YAAY,IAAI,uBAAuB;IAWvC,uBAAuB,IAAI,OAAO,CAAC,MAAM,CAAC;IAM1C,eAAe,CAAC,GAAG,EAAE,aAAa,CAAC,UAAU,CAAC,GAAG,0BAA0B;IAW3E,gBAAgB,CAAC,GAAG,EAAE,aAAa,CAAC,YAAY,CAAC,EAAE,OAAO,EAAE,UAAU;;;;;IAQtE,cAAc,CAAC,GAAG,EAAE,aAAa,CAAC,UAAU,CAAC,EAAE,OAAO,EAAE,UAAU;;;;;;;;;;;;IASlE,gBAAgB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU;;;;;;;;;;;;;;;IAQjD,qBAAqB,CAAC,GAAG,EAAE,aAAa,CAAC,KAAK,CAAC,EAAE,OAAO,EAAE,UAAU;;;;;;;IAQpE,qBAAqB,CAAC,GAAG,EAAE,aAAa,CAAC,KAAK,CAAC,EAAE,OAAO,EAAE,UAAU;;;;;;;;;;;;IAQpE,kBAAkB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU;;;;;;;;;;;;;IAQnD,aAAa,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU;;;;;;;;;;;;;;IAQ9C,cAAc,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU;CAO7D"}
|
|
@@ -159,14 +159,17 @@ export declare const DpopChallengeResponseSchema: z.ZodObject<{
|
|
|
159
159
|
url: z.ZodString;
|
|
160
160
|
status: z.ZodString;
|
|
161
161
|
token: z.ZodString;
|
|
162
|
+
target: z.ZodString;
|
|
162
163
|
}, "strip", z.ZodTypeAny, {
|
|
163
164
|
type: string;
|
|
164
165
|
url: string;
|
|
166
|
+
target: string;
|
|
165
167
|
status: string;
|
|
166
168
|
token: string;
|
|
167
169
|
}, {
|
|
168
170
|
type: string;
|
|
169
171
|
url: string;
|
|
172
|
+
target: string;
|
|
170
173
|
status: string;
|
|
171
174
|
token: string;
|
|
172
175
|
}>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/schema.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,CAAC,EAAC,MAAM,KAAK,CAAC;AAKtB,eAAO,MAAM,yBAAyB;;;;;;EAEpC,CAAC;AACH,MAAM,MAAM,mBAAmB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,yBAAyB,CAAC,CAAC;AAE5E,eAAO,MAAM,4BAA4B;;;;;;EAEvC,CAAC;AACH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,4BAA4B,CAAC,CAAC;AAElF,eAAO,MAAM,uBAAuB;;;;;;;;;;;;;;;;;;EAMlC,CAAC;AACH,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,uBAAuB,CAAC,CAAC;AAE5E,eAAO,MAAM,kCAAkC,aAAoB,CAAC;AACpE,MAAM,MAAM,+BAA+B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kCAAkC,CAAC,CAAC;AAEjG,eAAO,MAAM,wBAAwB;;;;;;;;;;;;EAInC,CAAC;AACH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,wBAAwB,CAAC,CAAC;AAE9E,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAajC,CAAC;AACH,MAAM,MAAM,oBAAoB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAE1E,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAgBtC,CAAC;AACH,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AAEpF,eAAO,MAAM,2BAA2B
|
|
1
|
+
{"version":3,"file":"schema.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Connection/AcmeServer/schema.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,CAAC,EAAC,MAAM,KAAK,CAAC;AAKtB,eAAO,MAAM,yBAAyB;;;;;;EAEpC,CAAC;AACH,MAAM,MAAM,mBAAmB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,yBAAyB,CAAC,CAAC;AAE5E,eAAO,MAAM,4BAA4B;;;;;;EAEvC,CAAC;AACH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,4BAA4B,CAAC,CAAC;AAElF,eAAO,MAAM,uBAAuB;;;;;;;;;;;;;;;;;;EAMlC,CAAC;AACH,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,uBAAuB,CAAC,CAAC;AAE5E,eAAO,MAAM,kCAAkC,aAAoB,CAAC;AACpE,MAAM,MAAM,+BAA+B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kCAAkC,CAAC,CAAC;AAEjG,eAAO,MAAM,wBAAwB;;;;;;;;;;;;EAInC,CAAC;AACH,MAAM,MAAM,sBAAsB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,wBAAwB,CAAC,CAAC;AAE9E,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAajC,CAAC;AACH,MAAM,MAAM,oBAAoB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AAE1E,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAgBtC,CAAC;AACH,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AAEpF,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;EAMtC,CAAC;AACH,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AAEpF,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAatC,CAAC;AACH,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AAEpF,eAAO,MAAM,gCAAgC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAc3C,CAAC;AACH,MAAM,MAAM,8BAA8B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,gCAAgC,CAAC,CAAC;AAE9F,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAetC,CAAC;AACH,MAAM,MAAM,yBAAyB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AAEpF,eAAO,MAAM,4BAA4B,aAAoB,CAAC;AAC9D,MAAM,MAAM,0BAA0B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,4BAA4B,CAAC,CAAC"}
|
|
@@ -7,12 +7,9 @@ import { E2EIServiceExternal } from './E2EIServiceExternal';
|
|
|
7
7
|
type OmitFree<T> = Omit<T, 'free'>;
|
|
8
8
|
type NewAcmeAuthzOriginal = OmitFree<Awaited<ReturnType<E2eiEnrollment['newAuthzResponse']>>>;
|
|
9
9
|
export type AcmeDirectory = OmitFree<Awaited<ReturnType<E2eiEnrollment['directoryResponse']>>>;
|
|
10
|
-
export type AcmeChallenge = OmitFree<NonNullable<NewAcmeAuthzOriginal['
|
|
10
|
+
export type AcmeChallenge = OmitFree<NonNullable<NewAcmeAuthzOriginal['challenge']>>;
|
|
11
11
|
export type NewAcmeOrder = OmitFree<Awaited<ReturnType<E2eiEnrollment['newOrderResponse']>>>;
|
|
12
|
-
export type NewAcmeAuthz = Pick<Awaited<ReturnType<E2eiEnrollment['newAuthzResponse']>>, 'identifier' | 'keyauth'
|
|
13
|
-
wireDpopChallenge?: AcmeChallenge;
|
|
14
|
-
wireOidcChallenge?: AcmeChallenge;
|
|
15
|
-
};
|
|
12
|
+
export type NewAcmeAuthz = Pick<Awaited<ReturnType<E2eiEnrollment['newAuthzResponse']>>, 'identifier' | 'keyauth' | 'challenge'>;
|
|
16
13
|
export { E2eiEnrollment, Ciphersuite, CoreCrypto, RotateBundle, WireIdentity, E2eiConversationState, CredentialType };
|
|
17
14
|
export type User = {
|
|
18
15
|
id: string;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"E2EIService.types.d.ts","sourceRoot":"","sources":["../../../../src/messagingProtocols/mls/E2EIdentityService/E2EIService.types.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,SAAS,EAAC,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EACL,cAAc,EACd,WAAW,EACX,UAAU,EACV,YAAY,EACZ,YAAY,EACZ,qBAAqB,EACrB,cAAc,EACf,MAAM,sBAAsB,CAAC;AAE9B,OAAO,EAAC,mBAAmB,EAAC,MAAM,uBAAuB,CAAC;AAE1D;;GAEG;AACH,KAAK,QAAQ,CAAC,CAAC,IAAI,IAAI,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACnC,KAAK,oBAAoB,GAAG,QAAQ,CAAC,OAAO,CAAC,UAAU,CAAC,cAAc,CAAC,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC;AAC9F,MAAM,MAAM,aAAa,GAAG,QAAQ,CAAC,OAAO,CAAC,UAAU,CAAC,cAAc,CAAC,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC;AAC/F,MAAM,MAAM,aAAa,GAAG,QAAQ,CAAC,WAAW,CAAC,oBAAoB,CAAC,
|
|
1
|
+
{"version":3,"file":"E2EIService.types.d.ts","sourceRoot":"","sources":["../../../../src/messagingProtocols/mls/E2EIdentityService/E2EIService.types.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,SAAS,EAAC,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EACL,cAAc,EACd,WAAW,EACX,UAAU,EACV,YAAY,EACZ,YAAY,EACZ,qBAAqB,EACrB,cAAc,EACf,MAAM,sBAAsB,CAAC;AAE9B,OAAO,EAAC,mBAAmB,EAAC,MAAM,uBAAuB,CAAC;AAE1D;;GAEG;AACH,KAAK,QAAQ,CAAC,CAAC,IAAI,IAAI,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACnC,KAAK,oBAAoB,GAAG,QAAQ,CAAC,OAAO,CAAC,UAAU,CAAC,cAAc,CAAC,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC;AAC9F,MAAM,MAAM,aAAa,GAAG,QAAQ,CAAC,OAAO,CAAC,UAAU,CAAC,cAAc,CAAC,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC;AAC/F,MAAM,MAAM,aAAa,GAAG,QAAQ,CAAC,WAAW,CAAC,oBAAoB,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC;AACrF,MAAM,MAAM,YAAY,GAAG,QAAQ,CAAC,OAAO,CAAC,UAAU,CAAC,cAAc,CAAC,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC;AAC7F,MAAM,MAAM,YAAY,GAAG,IAAI,CAC7B,OAAO,CAAC,UAAU,CAAC,cAAc,CAAC,kBAAkB,CAAC,CAAC,CAAC,EACvD,YAAY,GAAG,SAAS,GAAG,WAAW,CACvC,CAAC;AACF,OAAO,EAAC,cAAc,EAAE,WAAW,EAAE,UAAU,EAAE,YAAY,EAAE,YAAY,EAAE,qBAAqB,EAAE,cAAc,EAAC,CAAC;AAEpH,MAAM,MAAM,IAAI,GAAG;IACjB,EAAE,EAAE,MAAM,CAAC;IACX,MAAM,EAAE,MAAM,CAAC;IACf,WAAW,EAAE,MAAM,CAAC;IACpB,MAAM,EAAE,MAAM,CAAC;IACf,MAAM,EAAE,MAAM,CAAC;CAChB,CAAC;AACF,MAAM,MAAM,OAAO,GAAG,UAAU,CAAC;AACjC,MAAM,MAAM,KAAK,GAAG,MAAM,CAAC;AAC3B,MAAM,MAAM,OAAO,GAAG,oBAAoB,CAAC,SAAS,CAAC,CAAC;AAEtD,MAAM,WAAW,yBAAyB;IACxC,aAAa,EAAE,aAAa,CAAC;IAC7B,KAAK,EAAE,KAAK,CAAC;IACb,OAAO,EAAE,OAAO,CAAC;CAClB;AAED,MAAM,WAAW,uBAAuB;IACtC,YAAY,EAAE,MAAM,CAAC;CACtB;AAED,MAAM,WAAW,UAAU;IACzB,SAAS,EAAE,SAAS,CAAC;IACrB,eAAe,EAAE,UAAU,CAAC;IAC5B,mBAAmB,EAAE,mBAAmB,CAAC;IACzC,IAAI,CAAC,EAAE,IAAI,CAAC;IACZ,QAAQ,CAAC,EAAE,MAAM,CAAC;IAElB,QAAQ,CAAC,EAAE,OAAO,CAAC;IACnB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,iBAAiB,EAAE,MAAM,CAAC;CAC3B"}
|
|
@@ -12,7 +12,11 @@ export declare class E2EIServiceInternal {
|
|
|
12
12
|
private constructor();
|
|
13
13
|
static getInstance(params?: InitParams): Promise<E2EIServiceInternal>;
|
|
14
14
|
startCertificateProcess(hasActiveCertificate: boolean): Promise<{
|
|
15
|
-
challenge:
|
|
15
|
+
challenge: {
|
|
16
|
+
url: string;
|
|
17
|
+
target: string;
|
|
18
|
+
delegate: Uint8Array;
|
|
19
|
+
};
|
|
16
20
|
keyAuth: string;
|
|
17
21
|
}>;
|
|
18
22
|
continueCertificateProcess(oAuthIdToken: string): Promise<RotateBundle | undefined>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"E2EIServiceInternal.d.ts","sourceRoot":"","sources":["../../../../src/messagingProtocols/mls/E2EIdentityService/E2EIServiceInternal.ts"],"names":[],"mappings":"AAyBA,OAAO,EAAyD,UAAU,EAAE,YAAY,EAAC,MAAM,qBAAqB,CAAC;AAYrH,qBAAa,mBAAmB;IAC9B,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAsB;IAC7C,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAuD;IAC9E,OAAO,CAAC,QAAQ,CAAC,gBAAgB,CAAa;IAC9C,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAY;IACtC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAsB;IACzD,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAC;IACnC,OAAO,CAAC,QAAQ,CAAC,CAAiB;IAClC,OAAO,CAAC,WAAW,CAAC,CAAc;IAClC,OAAO,CAAC,aAAa,CAAS;IAE9B,OAAO;WAea,WAAW,CAAC,MAAM,CAAC,EAAE,UAAU,GAAG,OAAO,CAAC,mBAAmB,CAAC;IAwBrE,uBAAuB,CAAC,oBAAoB,EAAE,OAAO
|
|
1
|
+
{"version":3,"file":"E2EIServiceInternal.d.ts","sourceRoot":"","sources":["../../../../src/messagingProtocols/mls/E2EIdentityService/E2EIServiceInternal.ts"],"names":[],"mappings":"AAyBA,OAAO,EAAyD,UAAU,EAAE,YAAY,EAAC,MAAM,qBAAqB,CAAC;AAYrH,qBAAa,mBAAmB;IAC9B,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAsB;IAC7C,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAuD;IAC9E,OAAO,CAAC,QAAQ,CAAC,gBAAgB,CAAa;IAC9C,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAY;IACtC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAsB;IACzD,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAC;IACnC,OAAO,CAAC,QAAQ,CAAC,CAAiB;IAClC,OAAO,CAAC,WAAW,CAAC,CAAc;IAClC,OAAO,CAAC,aAAa,CAAS;IAE9B,OAAO;WAea,WAAW,CAAC,MAAM,CAAC,EAAE,UAAU,GAAG,OAAO,CAAC,mBAAmB,CAAC;IAwBrE,uBAAuB,CAAC,oBAAoB,EAAE,OAAO;;;;;;;;IAOrD,0BAA0B,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,GAAG,SAAS,CAAC;YAUlF,YAAY;YA0BZ,IAAI;YAUJ,YAAY;YAUZ,eAAe;IAQ7B;;;;;OAKG;YACW,uBAAuB;IAiDrC;;;;;;;OAOG;YACW,sCAAsC;IAgEpD;;;OAGG;YACW,iBAAiB;IAwB/B;;;;;;OAMG;YACW,iBAAiB;IAe/B;;;;;OAKG;IACU,0BAA0B,CAAC,YAAY,EAAE,MAAM,EAAE,oBAAoB,EAAE,OAAO;CAa5F"}
|
|
@@ -152,7 +152,7 @@ class E2EIServiceInternal {
|
|
|
152
152
|
const authChallenges = await (0, Authorization_1.getAuthorizationChallenges)({
|
|
153
153
|
connection: acmeService,
|
|
154
154
|
identity: identity,
|
|
155
|
-
|
|
155
|
+
authzUrls: orderData.authzUrls,
|
|
156
156
|
nonce: orderData.nonce,
|
|
157
157
|
});
|
|
158
158
|
// Store the values in local storage for later use (e.g. in the continue flow)
|
|
@@ -236,7 +236,7 @@ class E2EIServiceInternal {
|
|
|
236
236
|
if (!this.isInitialized || !this.identity) {
|
|
237
237
|
throw new Error('Error while trying to start OAuth flow. E2eIdentityService is not fully initialized');
|
|
238
238
|
}
|
|
239
|
-
const { authorization: { wireOidcChallenge, keyauth }, } = await this.getEnrollmentChallenges();
|
|
239
|
+
const { authorization: { oidcChallenge: wireOidcChallenge, keyauth }, } = await this.getEnrollmentChallenges();
|
|
240
240
|
if (!wireOidcChallenge || !keyauth) {
|
|
241
241
|
throw new Error('missing wireOidcChallenge or keyauth');
|
|
242
242
|
}
|
|
@@ -1,15 +1,12 @@
|
|
|
1
1
|
import { AcmeService } from '../Connection';
|
|
2
|
-
import { E2eiEnrollment,
|
|
2
|
+
import { E2eiEnrollment, Nonce } from '../E2EIService.types';
|
|
3
|
+
import { AuthData } from '../Storage/E2EIStorage.schema';
|
|
3
4
|
interface GetAuthorizationParams {
|
|
4
5
|
nonce: Nonce;
|
|
5
|
-
|
|
6
|
+
authzUrls: string[];
|
|
6
7
|
identity: E2eiEnrollment;
|
|
7
8
|
connection: AcmeService;
|
|
8
9
|
}
|
|
9
|
-
export
|
|
10
|
-
authorization: NewAcmeAuthz;
|
|
11
|
-
nonce: Nonce;
|
|
12
|
-
};
|
|
13
|
-
export declare const getAuthorizationChallenges: ({ authzUrl, nonce, identity, connection, }: GetAuthorizationParams) => Promise<AuthorizationChallenge>;
|
|
10
|
+
export declare const getAuthorizationChallenges: ({ authzUrls, nonce, identity, connection, }: GetAuthorizationParams) => Promise<AuthData>;
|
|
14
11
|
export {};
|
|
15
12
|
//# sourceMappingURL=Authorization.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"Authorization.d.ts","sourceRoot":"","sources":["../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/Authorization.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,WAAW,EAAC,MAAM,eAAe,CAAC;AAC1C,OAAO,EAAC,cAAc,
|
|
1
|
+
{"version":3,"file":"Authorization.d.ts","sourceRoot":"","sources":["../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/Authorization.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,WAAW,EAAC,MAAM,eAAe,CAAC;AAC1C,OAAO,EAAC,cAAc,EAAgB,KAAK,EAAC,MAAM,sBAAsB,CAAC;AAEzE,OAAO,EAAC,QAAQ,EAAC,MAAM,+BAA+B,CAAC;AAEvD,UAAU,sBAAsB;IAC9B,KAAK,EAAE,KAAK,CAAC;IACb,SAAS,EAAE,MAAM,EAAE,CAAC;IACpB,QAAQ,EAAE,cAAc,CAAC;IACzB,UAAU,EAAE,WAAW,CAAC;CACzB;AAED,eAAO,MAAM,0BAA0B,gDAKpC,sBAAsB,KAAG,QAAQ,QAAQ,CAsC3C,CAAC"}
|
|
@@ -20,31 +20,40 @@
|
|
|
20
20
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
21
21
|
exports.getAuthorizationChallenges = void 0;
|
|
22
22
|
const Helper_1 = require("../Helper");
|
|
23
|
-
const getAuthorizationChallenges = async ({
|
|
24
|
-
|
|
25
|
-
const
|
|
26
|
-
|
|
27
|
-
const
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
target: wasmData.wireDpopChallenge.target,
|
|
35
|
-
url: wasmData.wireDpopChallenge.url,
|
|
36
|
-
},
|
|
37
|
-
wireOidcChallenge: {
|
|
38
|
-
delegate: wasmData.wireOidcChallenge.delegate,
|
|
39
|
-
target: wasmData.wireOidcChallenge.target,
|
|
40
|
-
url: wasmData.wireOidcChallenge.url,
|
|
41
|
-
},
|
|
42
|
-
};
|
|
43
|
-
return {
|
|
44
|
-
authorization,
|
|
45
|
-
nonce: response.nonce,
|
|
46
|
-
};
|
|
23
|
+
const getAuthorizationChallenges = async ({ authzUrls, nonce, identity, connection, }) => {
|
|
24
|
+
var _a, _b;
|
|
25
|
+
const challenges = [];
|
|
26
|
+
for (const authzUrl of authzUrls) {
|
|
27
|
+
const reqBody = await identity.newAuthzRequest(authzUrl, nonce);
|
|
28
|
+
const response = await connection.getAuthorization(authzUrl, reqBody);
|
|
29
|
+
// The backend returns a list of challenges (to be inline with the protocol), but in our case we are only ever going to have a single element in the list
|
|
30
|
+
const backendChallenge = response.data.challenges[0];
|
|
31
|
+
const challenge = await identity.newAuthzResponse((0, Helper_1.jsonToByteArray)(response.data));
|
|
32
|
+
challenges.push({ type: backendChallenge.type, challenge });
|
|
33
|
+
nonce = response.nonce;
|
|
47
34
|
}
|
|
48
|
-
|
|
35
|
+
const { challenge: oidcChallenge } = (_a = challenges.find(challenge => challenge.type.includes('oidc'))) !== null && _a !== void 0 ? _a : {};
|
|
36
|
+
const { challenge: dpopChallenge } = (_b = challenges.find(challenge => challenge.type.includes('dpop'))) !== null && _b !== void 0 ? _b : {};
|
|
37
|
+
if (!dpopChallenge || !oidcChallenge) {
|
|
38
|
+
throw new Error('missing dpop or oidc challenge');
|
|
39
|
+
}
|
|
40
|
+
// manual copy of the wasm data because of a problem while cloning it
|
|
41
|
+
const authorization = {
|
|
42
|
+
keyauth: oidcChallenge.keyauth,
|
|
43
|
+
dpopChallenge: {
|
|
44
|
+
delegate: dpopChallenge.challenge.delegate,
|
|
45
|
+
target: dpopChallenge.challenge.target,
|
|
46
|
+
url: dpopChallenge.challenge.url,
|
|
47
|
+
},
|
|
48
|
+
oidcChallenge: {
|
|
49
|
+
delegate: oidcChallenge.challenge.delegate,
|
|
50
|
+
target: oidcChallenge.challenge.target,
|
|
51
|
+
url: oidcChallenge.challenge.url,
|
|
52
|
+
},
|
|
53
|
+
};
|
|
54
|
+
return {
|
|
55
|
+
authorization,
|
|
56
|
+
nonce,
|
|
57
|
+
};
|
|
49
58
|
};
|
|
50
59
|
exports.getAuthorizationChallenges = getAuthorizationChallenges;
|
package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.d.ts
CHANGED
|
@@ -2,6 +2,7 @@ import { DoWireDpopChallengeParams } from './DpopChallenge.types';
|
|
|
2
2
|
export declare const doWireDpopChallenge: ({ apiClient, clientId, authData, identity, nonce, connection, expirySecs, userDomain, }: DoWireDpopChallengeParams) => Promise<import("../../Connection/AcmeServer/AcmeService.types").PostJoseRequestReturnValue<{
|
|
3
3
|
type: string;
|
|
4
4
|
url: string;
|
|
5
|
+
target: string;
|
|
5
6
|
status: string;
|
|
6
7
|
token: string;
|
|
7
8
|
}>>;
|
package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"DpopChallenge.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.ts"],"names":[],"mappings":"AAqBA,OAAO,EAAC,yBAAyB,EAAmD,MAAM,uBAAuB,CAAC;AA6BlH,eAAO,MAAM,mBAAmB,4FAS7B,yBAAyB
|
|
1
|
+
{"version":3,"file":"DpopChallenge.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.ts"],"names":[],"mappings":"AAqBA,OAAO,EAAC,yBAAyB,EAAmD,MAAM,uBAAuB,CAAC;AA6BlH,eAAO,MAAM,mBAAmB,4FAS7B,yBAAyB;;;;;;GA+B3B,CAAC"}
|
|
@@ -39,8 +39,8 @@ const getClientAccessToken = async ({ apiClient, clientNonce, identity, clientId
|
|
|
39
39
|
return apiClient.api.client.getAccessToken(clientId, dpopToken);
|
|
40
40
|
};
|
|
41
41
|
const doWireDpopChallenge = async ({ apiClient, clientId, authData, identity, nonce, connection, expirySecs, userDomain, }) => {
|
|
42
|
-
const {
|
|
43
|
-
if (!
|
|
42
|
+
const { dpopChallenge } = authData.authorization;
|
|
43
|
+
if (!dpopChallenge) {
|
|
44
44
|
throw new Error('No wireDpopChallenge defined');
|
|
45
45
|
}
|
|
46
46
|
const clientNonce = await getClientNonce({ clientId, apiClient });
|
|
@@ -55,7 +55,7 @@ const doWireDpopChallenge = async ({ apiClient, clientId, authData, identity, no
|
|
|
55
55
|
userDomain,
|
|
56
56
|
});
|
|
57
57
|
const reqBody = await identity.newDpopChallengeRequest(clientAccessTokenData.token, nonce);
|
|
58
|
-
const dpopChallengeResponse = await connection.validateDpopChallenge(
|
|
58
|
+
const dpopChallengeResponse = await connection.validateDpopChallenge(dpopChallenge.url, reqBody);
|
|
59
59
|
if (!dpopChallengeResponse) {
|
|
60
60
|
throw new Error('No response received while validating DPOP challenge');
|
|
61
61
|
}
|
package/lib/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.types.d.ts
CHANGED
|
@@ -2,12 +2,12 @@ import { APIClient } from '@wireapp/api-client';
|
|
|
2
2
|
import { ClientId } from '../../../types';
|
|
3
3
|
import { AcmeService } from '../../Connection/AcmeServer';
|
|
4
4
|
import { E2eiEnrollment, Nonce, User } from '../../E2EIService.types';
|
|
5
|
-
import {
|
|
5
|
+
import { AuthData } from '../../Storage/E2EIStorage.schema';
|
|
6
6
|
export interface DoWireDpopChallengeParams {
|
|
7
7
|
apiClient: APIClient;
|
|
8
8
|
clientId: ClientId;
|
|
9
9
|
userDomain: User['domain'];
|
|
10
|
-
authData:
|
|
10
|
+
authData: AuthData;
|
|
11
11
|
identity: E2eiEnrollment;
|
|
12
12
|
connection: AcmeService;
|
|
13
13
|
nonce: Nonce;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"DpopChallenge.types.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.types.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,SAAS,EAAC,MAAM,qBAAqB,CAAC;AAE9C,OAAO,EAAC,QAAQ,EAAC,MAAM,gBAAgB,CAAC;AACxC,OAAO,EAAC,WAAW,EAAC,MAAM,6BAA6B,CAAC;AACxD,OAAO,EAAC,cAAc,EAAE,KAAK,EAAE,IAAI,EAAC,MAAM,yBAAyB,CAAC;AACpE,OAAO,EAAC,
|
|
1
|
+
{"version":3,"file":"DpopChallenge.types.d.ts","sourceRoot":"","sources":["../../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/DpopChallenge/DpopChallenge.types.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,SAAS,EAAC,MAAM,qBAAqB,CAAC;AAE9C,OAAO,EAAC,QAAQ,EAAC,MAAM,gBAAgB,CAAC;AACxC,OAAO,EAAC,WAAW,EAAC,MAAM,6BAA6B,CAAC;AACxD,OAAO,EAAC,cAAc,EAAE,KAAK,EAAE,IAAI,EAAC,MAAM,yBAAyB,CAAC;AACpE,OAAO,EAAC,QAAQ,EAAC,MAAM,kCAAkC,CAAC;AAE1D,MAAM,WAAW,yBAAyB;IACxC,SAAS,EAAE,SAAS,CAAC;IACrB,QAAQ,EAAE,QAAQ,CAAC;IACnB,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;IAC3B,QAAQ,EAAE,QAAQ,CAAC;IACnB,QAAQ,EAAE,cAAc,CAAC;IACzB,UAAU,EAAE,WAAW,CAAC;IACxB,KAAK,EAAE,KAAK,CAAC;IACb,UAAU,EAAE,MAAM,CAAC;CACpB;AAED,MAAM,MAAM,oBAAoB,GAAG,IAAI,CAAC,yBAAyB,EAAE,UAAU,GAAG,WAAW,CAAC,CAAC;AAE7F,MAAM,MAAM,0BAA0B,GAAG,IAAI,CAC3C,yBAAyB,EACzB,UAAU,GAAG,WAAW,GAAG,UAAU,GAAG,YAAY,GAAG,YAAY,CACpE,GAAG;IACF,WAAW,EAAE,KAAK,CAAC;CACpB,CAAC"}
|
|
@@ -1,9 +1,9 @@
|
|
|
1
|
-
import { AuthorizationChallenge } from './Authorization';
|
|
2
1
|
import { AcmeService } from '../Connection/AcmeServer';
|
|
3
2
|
import { CoreCrypto, E2eiEnrollment, Nonce } from '../E2EIService.types';
|
|
3
|
+
import { AuthData } from '../Storage/E2EIStorage.schema';
|
|
4
4
|
interface DoWireOidcChallengeParams {
|
|
5
5
|
coreCryptoClient: CoreCrypto;
|
|
6
|
-
authData:
|
|
6
|
+
authData: AuthData;
|
|
7
7
|
identity: E2eiEnrollment;
|
|
8
8
|
connection: AcmeService;
|
|
9
9
|
nonce: Nonce;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"OidcChallenge.d.ts","sourceRoot":"","sources":["../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/OidcChallenge.ts"],"names":[],"mappings":"AAqBA,OAAO,EAAC,
|
|
1
|
+
{"version":3,"file":"OidcChallenge.d.ts","sourceRoot":"","sources":["../../../../../src/messagingProtocols/mls/E2EIdentityService/Steps/OidcChallenge.ts"],"names":[],"mappings":"AAqBA,OAAO,EAAC,WAAW,EAAC,MAAM,0BAA0B,CAAC;AACrD,OAAO,EAAC,UAAU,EAAE,cAAc,EAAE,KAAK,EAAC,MAAM,sBAAsB,CAAC;AACvE,OAAO,EAAC,QAAQ,EAAC,MAAM,+BAA+B,CAAC;AAEvD,UAAU,yBAAyB;IACjC,gBAAgB,EAAE,UAAU,CAAC;IAC7B,QAAQ,EAAE,QAAQ,CAAC;IACnB,QAAQ,EAAE,cAAc,CAAC;IACzB,UAAU,EAAE,WAAW,CAAC;IACxB,KAAK,EAAE,KAAK,CAAC;IACb,YAAY,EAAE,MAAM,CAAC;CACtB;AAED,eAAO,MAAM,mBAAmB,+EAO7B,yBAAyB;;;;;;;;;;;GAmB3B,CAAC"}
|
|
@@ -21,13 +21,13 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
21
21
|
exports.doWireOidcChallenge = void 0;
|
|
22
22
|
const bazinga64_1 = require("bazinga64");
|
|
23
23
|
const doWireOidcChallenge = async ({ coreCryptoClient, connection, authData, identity, nonce, oAuthIdToken, }) => {
|
|
24
|
-
const {
|
|
25
|
-
if (!
|
|
24
|
+
const { oidcChallenge } = authData.authorization;
|
|
25
|
+
if (!oidcChallenge) {
|
|
26
26
|
throw new Error('No wireOIDCChallenge defined');
|
|
27
27
|
}
|
|
28
28
|
const refreshToken = 'empty'; // CC just stores the refresh token (which we don't need for web, as our oidc library does that for us)
|
|
29
29
|
const reqBody = await identity.newOidcChallengeRequest(oAuthIdToken, refreshToken, nonce);
|
|
30
|
-
const oidcChallengeResponse = await connection.validateOidcChallenge(
|
|
30
|
+
const oidcChallengeResponse = await connection.validateOidcChallenge(oidcChallenge.url, reqBody);
|
|
31
31
|
if (!oidcChallengeResponse) {
|
|
32
32
|
throw new Error('No response received while validating OIDC challenge');
|
|
33
33
|
}
|
|
@@ -45,9 +45,8 @@ export declare const InitialDataSchema: z.ZodObject<{
|
|
|
45
45
|
export type InitialData = z.infer<typeof InitialDataSchema>;
|
|
46
46
|
export declare const AuthDataSchema: z.ZodObject<{
|
|
47
47
|
authorization: z.ZodObject<{
|
|
48
|
-
identifier: z.ZodString;
|
|
49
48
|
keyauth: z.ZodString;
|
|
50
|
-
|
|
49
|
+
dpopChallenge: z.ZodObject<{
|
|
51
50
|
delegate: z.ZodType<Uint8Array, z.ZodTypeDef, Uint8Array>;
|
|
52
51
|
url: z.ZodString;
|
|
53
52
|
target: z.ZodString;
|
|
@@ -59,8 +58,8 @@ export declare const AuthDataSchema: z.ZodObject<{
|
|
|
59
58
|
url: string;
|
|
60
59
|
target: string;
|
|
61
60
|
delegate: Uint8Array;
|
|
62
|
-
}
|
|
63
|
-
|
|
61
|
+
}>;
|
|
62
|
+
oidcChallenge: z.ZodObject<{
|
|
64
63
|
delegate: z.ZodType<Uint8Array, z.ZodTypeDef, Uint8Array>;
|
|
65
64
|
url: z.ZodString;
|
|
66
65
|
target: z.ZodString;
|
|
@@ -72,66 +71,62 @@ export declare const AuthDataSchema: z.ZodObject<{
|
|
|
72
71
|
url: string;
|
|
73
72
|
target: string;
|
|
74
73
|
delegate: Uint8Array;
|
|
75
|
-
}
|
|
74
|
+
}>;
|
|
76
75
|
}, "strip", z.ZodTypeAny, {
|
|
77
|
-
identifier: string;
|
|
78
76
|
keyauth: string;
|
|
79
|
-
|
|
77
|
+
dpopChallenge: {
|
|
80
78
|
url: string;
|
|
81
79
|
target: string;
|
|
82
80
|
delegate: Uint8Array;
|
|
83
|
-
}
|
|
84
|
-
|
|
81
|
+
};
|
|
82
|
+
oidcChallenge: {
|
|
85
83
|
url: string;
|
|
86
84
|
target: string;
|
|
87
85
|
delegate: Uint8Array;
|
|
88
|
-
}
|
|
86
|
+
};
|
|
89
87
|
}, {
|
|
90
|
-
identifier: string;
|
|
91
88
|
keyauth: string;
|
|
92
|
-
|
|
89
|
+
dpopChallenge: {
|
|
93
90
|
url: string;
|
|
94
91
|
target: string;
|
|
95
92
|
delegate: Uint8Array;
|
|
96
|
-
}
|
|
97
|
-
|
|
93
|
+
};
|
|
94
|
+
oidcChallenge: {
|
|
98
95
|
url: string;
|
|
99
96
|
target: string;
|
|
100
97
|
delegate: Uint8Array;
|
|
101
|
-
}
|
|
98
|
+
};
|
|
102
99
|
}>;
|
|
103
100
|
nonce: z.ZodString;
|
|
104
101
|
}, "strip", z.ZodTypeAny, {
|
|
105
102
|
nonce: string;
|
|
106
103
|
authorization: {
|
|
107
|
-
identifier: string;
|
|
108
104
|
keyauth: string;
|
|
109
|
-
|
|
105
|
+
dpopChallenge: {
|
|
110
106
|
url: string;
|
|
111
107
|
target: string;
|
|
112
108
|
delegate: Uint8Array;
|
|
113
|
-
}
|
|
114
|
-
|
|
109
|
+
};
|
|
110
|
+
oidcChallenge: {
|
|
115
111
|
url: string;
|
|
116
112
|
target: string;
|
|
117
113
|
delegate: Uint8Array;
|
|
118
|
-
}
|
|
114
|
+
};
|
|
119
115
|
};
|
|
120
116
|
}, {
|
|
121
117
|
nonce: string;
|
|
122
118
|
authorization: {
|
|
123
|
-
identifier: string;
|
|
124
119
|
keyauth: string;
|
|
125
|
-
|
|
120
|
+
dpopChallenge: {
|
|
126
121
|
url: string;
|
|
127
122
|
target: string;
|
|
128
123
|
delegate: Uint8Array;
|
|
129
|
-
}
|
|
130
|
-
|
|
124
|
+
};
|
|
125
|
+
oidcChallenge: {
|
|
131
126
|
url: string;
|
|
132
127
|
target: string;
|
|
133
128
|
delegate: Uint8Array;
|
|
134
|
-
}
|
|
129
|
+
};
|
|
135
130
|
};
|
|
136
131
|
}>;
|
|
137
132
|
export type AuthData = z.infer<typeof AuthDataSchema>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"E2EIStorage.schema.d.ts","sourceRoot":"","sources":["../../../../../src/messagingProtocols/mls/E2EIdentityService/Storage/E2EIStorage.schema.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,CAAC,EAAC,MAAM,KAAK,CAAC;AAEtB,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAU5B,CAAC;AACH,MAAM,MAAM,WAAW,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iBAAiB,CAAC,CAAC;AAU5D,eAAO,MAAM,cAAc
|
|
1
|
+
{"version":3,"file":"E2EIStorage.schema.d.ts","sourceRoot":"","sources":["../../../../../src/messagingProtocols/mls/E2EIdentityService/Storage/E2EIStorage.schema.ts"],"names":[],"mappings":"AAmBA,OAAO,EAAC,CAAC,EAAC,MAAM,KAAK,CAAC;AAEtB,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAU5B,CAAC;AACH,MAAM,MAAM,WAAW,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iBAAiB,CAAC,CAAC;AAU5D,eAAO,MAAM,cAAc;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;EAOzB,CAAC;AACH,MAAM,MAAM,QAAQ,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,cAAc,CAAC,CAAC;AAEtD,eAAO,MAAM,eAAe;;;;;;EAE1B,CAAC;AACH,MAAM,MAAM,SAAS,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,eAAe,CAAC,CAAC"}
|
|
@@ -39,10 +39,9 @@ const AcmeChallengeSchema = zod_1.z.object({
|
|
|
39
39
|
});
|
|
40
40
|
exports.AuthDataSchema = zod_1.z.object({
|
|
41
41
|
authorization: zod_1.z.object({
|
|
42
|
-
identifier: zod_1.z.string(),
|
|
43
42
|
keyauth: zod_1.z.string(),
|
|
44
|
-
|
|
45
|
-
|
|
43
|
+
dpopChallenge: AcmeChallengeSchema,
|
|
44
|
+
oidcChallenge: AcmeChallengeSchema,
|
|
46
45
|
}),
|
|
47
46
|
nonce: zod_1.z.string(),
|
|
48
47
|
});
|
package/package.json
CHANGED
|
@@ -13,7 +13,7 @@
|
|
|
13
13
|
"dependencies": {
|
|
14
14
|
"@wireapp/api-client": "^26.10.1",
|
|
15
15
|
"@wireapp/commons": "^5.2.4",
|
|
16
|
-
"@wireapp/core-crypto": "1.0.0-rc.
|
|
16
|
+
"@wireapp/core-crypto": "1.0.0-rc.32",
|
|
17
17
|
"@wireapp/cryptobox": "12.8.0",
|
|
18
18
|
"@wireapp/promise-queue": "^2.2.9",
|
|
19
19
|
"@wireapp/protocol-messaging": "1.44.0",
|
|
@@ -61,6 +61,6 @@
|
|
|
61
61
|
"test:coverage": "jest --coverage",
|
|
62
62
|
"watch": "tsc --watch"
|
|
63
63
|
},
|
|
64
|
-
"version": "43.
|
|
65
|
-
"gitHead": "
|
|
64
|
+
"version": "43.9.0",
|
|
65
|
+
"gitHead": "29566e52f904bf27441dd085f9bd851e6dc63946"
|
|
66
66
|
}
|