cojson 0.0.7 → 0.0.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintrc.cjs +11 -8
- package/dist/coValue.d.ts +97 -0
- package/dist/coValue.js +381 -0
- package/dist/coValue.js.map +1 -0
- package/dist/coValue.test.d.ts +1 -0
- package/dist/coValue.test.js +78 -0
- package/dist/coValue.test.js.map +1 -0
- package/dist/contentType.d.ts +15 -0
- package/dist/contentType.js +7 -0
- package/dist/contentType.js.map +1 -0
- package/dist/contentType.test.d.ts +1 -0
- package/dist/contentType.test.js +149 -0
- package/dist/contentType.test.js.map +1 -0
- package/dist/contentTypes/coList.d.ts +11 -0
- package/dist/contentTypes/coList.js +16 -0
- package/dist/contentTypes/coList.js.map +1 -0
- package/dist/contentTypes/coMap.d.ts +56 -0
- package/dist/contentTypes/coMap.js +126 -0
- package/dist/contentTypes/coMap.js.map +1 -0
- package/dist/contentTypes/coStream.d.ts +11 -0
- package/dist/contentTypes/coStream.js +16 -0
- package/dist/contentTypes/coStream.js.map +1 -0
- package/dist/contentTypes/static.d.ts +11 -0
- package/dist/contentTypes/static.js +14 -0
- package/dist/contentTypes/static.js.map +1 -0
- package/dist/crypto.d.ts +97 -0
- package/dist/crypto.js +156 -0
- package/dist/crypto.js.map +1 -0
- package/dist/crypto.test.d.ts +1 -0
- package/dist/crypto.test.js +115 -0
- package/dist/crypto.test.js.map +1 -0
- package/dist/ids.d.ts +7 -0
- package/dist/ids.js +2 -0
- package/dist/ids.js.map +1 -0
- package/dist/index.d.ts +19 -0
- package/dist/index.js +13 -0
- package/dist/index.js.map +1 -0
- package/dist/jsonValue.d.ts +7 -0
- package/dist/jsonValue.js +2 -0
- package/dist/jsonValue.js.map +1 -0
- package/dist/node.d.ts +33 -0
- package/dist/node.js +113 -0
- package/dist/node.js.map +1 -0
- package/dist/permissions.d.ts +54 -0
- package/dist/permissions.js +218 -0
- package/dist/permissions.js.map +1 -0
- package/dist/permissions.test.d.ts +1 -0
- package/dist/permissions.test.js +794 -0
- package/dist/permissions.test.js.map +1 -0
- package/dist/sync.d.ts +80 -0
- package/dist/sync.js +271 -0
- package/dist/sync.js.map +1 -0
- package/dist/sync.test.d.ts +1 -0
- package/dist/sync.test.js +826 -0
- package/dist/sync.test.js.map +1 -0
- package/package.json +7 -6
- package/src/coValue.test.ts +3 -4
- package/src/coValue.ts +11 -11
- package/src/contentType.test.ts +3 -3
- package/src/contentType.ts +6 -6
- package/src/contentTypes/coList.ts +4 -4
- package/src/contentTypes/coMap.ts +6 -6
- package/src/contentTypes/coStream.ts +4 -4
- package/src/contentTypes/static.ts +5 -5
- package/src/crypto.test.ts +1 -1
- package/src/crypto.ts +2 -2
- package/src/index.ts +8 -8
- package/src/jsonValue.ts +1 -1
- package/src/node.ts +6 -7
- package/src/permissions.test.ts +5 -5
- package/src/permissions.ts +7 -7
- package/src/sync.test.ts +7 -7
- package/src/sync.ts +6 -6
- package/tsconfig.json +1 -7
- package/dist/coValue.mjs +0 -437
- package/dist/coValue.test.mjs +0 -122
- package/dist/contentType.mjs +0 -7
- package/dist/contentType.test.mjs +0 -179
- package/dist/contentTypes/coList.mjs +0 -18
- package/dist/contentTypes/coMap.mjs +0 -126
- package/dist/contentTypes/coStream.mjs +0 -18
- package/dist/contentTypes/static.mjs +0 -16
- package/dist/crypto.mjs +0 -207
- package/dist/crypto.test.mjs +0 -155
- package/dist/ids.mjs +0 -1
- package/dist/index.mjs +0 -21
- package/dist/jsonValue.mjs +0 -1
- package/dist/node.mjs +0 -144
- package/dist/permissions.mjs +0 -244
- package/dist/permissions.test.mjs +0 -985
- package/dist/sync.mjs +0 -318
- package/dist/sync.test.mjs +0 -861
package/dist/crypto.js
ADDED
|
@@ -0,0 +1,156 @@
|
|
|
1
|
+
import { ed25519, x25519 } from "@noble/curves/ed25519";
|
|
2
|
+
import { xsalsa20_poly1305, xsalsa20 } from "@noble/ciphers/salsa";
|
|
3
|
+
import { base58, base64url } from "@scure/base";
|
|
4
|
+
import stableStringify from "fast-json-stable-stringify";
|
|
5
|
+
import { blake3 } from "@noble/hashes/blake3";
|
|
6
|
+
import { randomBytes } from "@noble/ciphers/webcrypto/utils";
|
|
7
|
+
const textEncoder = new TextEncoder();
|
|
8
|
+
const textDecoder = new TextDecoder();
|
|
9
|
+
export function newRandomSignatory() {
|
|
10
|
+
return `signatorySecret_z${base58.encode(ed25519.utils.randomPrivateKey())}`;
|
|
11
|
+
}
|
|
12
|
+
export function signatorySecretToBytes(secret) {
|
|
13
|
+
return base58.decode(secret.substring("signatorySecret_z".length));
|
|
14
|
+
}
|
|
15
|
+
export function signatorySecretFromBytes(bytes) {
|
|
16
|
+
return `signatorySecret_z${base58.encode(bytes)}`;
|
|
17
|
+
}
|
|
18
|
+
export function getSignatoryID(secret) {
|
|
19
|
+
return `signatory_z${base58.encode(ed25519.getPublicKey(base58.decode(secret.substring("signatorySecret_z".length))))}`;
|
|
20
|
+
}
|
|
21
|
+
export function sign(secret, message) {
|
|
22
|
+
const signature = ed25519.sign(textEncoder.encode(stableStringify(message)), base58.decode(secret.substring("signatorySecret_z".length)));
|
|
23
|
+
return `signature_z${base58.encode(signature)}`;
|
|
24
|
+
}
|
|
25
|
+
export function verify(signature, message, id) {
|
|
26
|
+
return ed25519.verify(base58.decode(signature.substring("signature_z".length)), textEncoder.encode(stableStringify(message)), base58.decode(id.substring("signatory_z".length)));
|
|
27
|
+
}
|
|
28
|
+
export function newRandomRecipient() {
|
|
29
|
+
return `recipientSecret_z${base58.encode(x25519.utils.randomPrivateKey())}`;
|
|
30
|
+
}
|
|
31
|
+
export function recipientSecretToBytes(secret) {
|
|
32
|
+
return base58.decode(secret.substring("recipientSecret_z".length));
|
|
33
|
+
}
|
|
34
|
+
export function recipientSecretFromBytes(bytes) {
|
|
35
|
+
return `recipientSecret_z${base58.encode(bytes)}`;
|
|
36
|
+
}
|
|
37
|
+
export function getRecipientID(secret) {
|
|
38
|
+
return `recipient_z${base58.encode(x25519.getPublicKey(base58.decode(secret.substring("recipientSecret_z".length))))}`;
|
|
39
|
+
}
|
|
40
|
+
export function seal(message, from, to, nOnceMaterial) {
|
|
41
|
+
const nOnce = blake3(textEncoder.encode(stableStringify(nOnceMaterial))).slice(0, 24);
|
|
42
|
+
const recipientsSorted = Array.from(to).sort();
|
|
43
|
+
const recipientPubs = recipientsSorted.map((recipient) => {
|
|
44
|
+
return base58.decode(recipient.substring("recipient_z".length));
|
|
45
|
+
});
|
|
46
|
+
const senderPriv = base58.decode(from.substring("recipientSecret_z".length));
|
|
47
|
+
const plaintext = textEncoder.encode(stableStringify(message));
|
|
48
|
+
const sealedSet = {};
|
|
49
|
+
for (let i = 0; i < recipientsSorted.length; i++) {
|
|
50
|
+
const recipient = recipientsSorted[i];
|
|
51
|
+
const sharedSecret = x25519.getSharedSecret(senderPriv, recipientPubs[i]);
|
|
52
|
+
const sealedBytes = xsalsa20_poly1305(sharedSecret, nOnce).encrypt(plaintext);
|
|
53
|
+
sealedSet[recipient] = `sealed_U${base64url.encode(sealedBytes)}`;
|
|
54
|
+
}
|
|
55
|
+
return sealedSet;
|
|
56
|
+
}
|
|
57
|
+
export function openAs(sealedSet, recipient, from, nOnceMaterial) {
|
|
58
|
+
const nOnce = blake3(textEncoder.encode(stableStringify(nOnceMaterial))).slice(0, 24);
|
|
59
|
+
const recipientPriv = base58.decode(recipient.substring("recipientSecret_z".length));
|
|
60
|
+
const senderPub = base58.decode(from.substring("recipient_z".length));
|
|
61
|
+
const sealed = sealedSet[getRecipientID(recipient)];
|
|
62
|
+
if (!sealed) {
|
|
63
|
+
return undefined;
|
|
64
|
+
}
|
|
65
|
+
const sealedBytes = base64url.decode(sealed.substring("sealed_U".length));
|
|
66
|
+
const sharedSecret = x25519.getSharedSecret(recipientPriv, senderPub);
|
|
67
|
+
const plaintext = xsalsa20_poly1305(sharedSecret, nOnce).decrypt(sealedBytes);
|
|
68
|
+
try {
|
|
69
|
+
return JSON.parse(textDecoder.decode(plaintext));
|
|
70
|
+
}
|
|
71
|
+
catch (e) {
|
|
72
|
+
console.error("Failed to decrypt/parse sealed message", e);
|
|
73
|
+
return undefined;
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
export function secureHash(value) {
|
|
77
|
+
return `hash_z${base58.encode(blake3(textEncoder.encode(stableStringify(value))))}`;
|
|
78
|
+
}
|
|
79
|
+
export class StreamingHash {
|
|
80
|
+
constructor(fromClone) {
|
|
81
|
+
this.state = fromClone || blake3.create({});
|
|
82
|
+
}
|
|
83
|
+
update(value) {
|
|
84
|
+
this.state.update(textEncoder.encode(stableStringify(value)));
|
|
85
|
+
}
|
|
86
|
+
digest() {
|
|
87
|
+
const hash = this.state.digest();
|
|
88
|
+
return `hash_z${base58.encode(hash)}`;
|
|
89
|
+
}
|
|
90
|
+
clone() {
|
|
91
|
+
return new StreamingHash(this.state.clone());
|
|
92
|
+
}
|
|
93
|
+
}
|
|
94
|
+
export function shortHash(value) {
|
|
95
|
+
return `shortHash_z${base58.encode(blake3(textEncoder.encode(stableStringify(value))).slice(0, 19))}`;
|
|
96
|
+
}
|
|
97
|
+
export function newRandomKeySecret() {
|
|
98
|
+
return {
|
|
99
|
+
secret: `keySecret_z${base58.encode(randomBytes(32))}`,
|
|
100
|
+
id: `key_z${base58.encode(randomBytes(12))}`,
|
|
101
|
+
};
|
|
102
|
+
}
|
|
103
|
+
function encrypt(value, keySecret, nOnceMaterial) {
|
|
104
|
+
const keySecretBytes = base58.decode(keySecret.substring("keySecret_z".length));
|
|
105
|
+
const nOnce = blake3(textEncoder.encode(stableStringify(nOnceMaterial))).slice(0, 24);
|
|
106
|
+
const plaintext = textEncoder.encode(stableStringify(value));
|
|
107
|
+
const ciphertext = xsalsa20(keySecretBytes, nOnce, plaintext);
|
|
108
|
+
return `encrypted_U${base64url.encode(ciphertext)}`;
|
|
109
|
+
}
|
|
110
|
+
export function encryptForTransaction(value, keySecret, nOnceMaterial) {
|
|
111
|
+
return encrypt(value, keySecret, nOnceMaterial);
|
|
112
|
+
}
|
|
113
|
+
export function sealKeySecret(keys) {
|
|
114
|
+
const nOnceMaterial = {
|
|
115
|
+
sealed: keys.toSeal.id,
|
|
116
|
+
sealing: keys.sealing.id,
|
|
117
|
+
};
|
|
118
|
+
return {
|
|
119
|
+
sealed: keys.toSeal.id,
|
|
120
|
+
sealing: keys.sealing.id,
|
|
121
|
+
encrypted: encrypt(keys.toSeal.secret, keys.sealing.secret, nOnceMaterial),
|
|
122
|
+
};
|
|
123
|
+
}
|
|
124
|
+
function decrypt(encrypted, keySecret, nOnceMaterial) {
|
|
125
|
+
const keySecretBytes = base58.decode(keySecret.substring("keySecret_z".length));
|
|
126
|
+
const nOnce = blake3(textEncoder.encode(stableStringify(nOnceMaterial))).slice(0, 24);
|
|
127
|
+
const ciphertext = base64url.decode(encrypted.substring("encrypted_U".length));
|
|
128
|
+
const plaintext = xsalsa20(keySecretBytes, nOnce, ciphertext);
|
|
129
|
+
try {
|
|
130
|
+
return JSON.parse(textDecoder.decode(plaintext));
|
|
131
|
+
}
|
|
132
|
+
catch (e) {
|
|
133
|
+
return undefined;
|
|
134
|
+
}
|
|
135
|
+
}
|
|
136
|
+
export function decryptForTransaction(encrypted, keySecret, nOnceMaterial) {
|
|
137
|
+
return decrypt(encrypted, keySecret, nOnceMaterial);
|
|
138
|
+
}
|
|
139
|
+
export function unsealKeySecret(sealedInfo, sealingSecret) {
|
|
140
|
+
const nOnceMaterial = {
|
|
141
|
+
sealed: sealedInfo.sealed,
|
|
142
|
+
sealing: sealedInfo.sealing,
|
|
143
|
+
};
|
|
144
|
+
return decrypt(sealedInfo.encrypted, sealingSecret, nOnceMaterial);
|
|
145
|
+
}
|
|
146
|
+
export function uniquenessForHeader() {
|
|
147
|
+
return `z${base58.encode(randomBytes(12))}`;
|
|
148
|
+
}
|
|
149
|
+
export function createdNowUnique() {
|
|
150
|
+
const createdAt = (new Date()).toISOString();
|
|
151
|
+
return {
|
|
152
|
+
createdAt,
|
|
153
|
+
uniqueness: uniquenessForHeader(),
|
|
154
|
+
};
|
|
155
|
+
}
|
|
156
|
+
//# sourceMappingURL=crypto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"crypto.js","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,iBAAiB,EAAE,QAAQ,EAAE,MAAM,sBAAsB,CAAC;AAEnE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AAChD,OAAO,eAAe,MAAM,4BAA4B,CAAC;AACzD,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAC9C,OAAO,EAAE,WAAW,EAAE,MAAM,gCAAgC,CAAC;AAW7D,MAAM,WAAW,GAAG,IAAI,WAAW,EAAE,CAAC;AACtC,MAAM,WAAW,GAAG,IAAI,WAAW,EAAE,CAAC;AAEtC,MAAM,UAAU,kBAAkB;IAC9B,OAAO,oBAAoB,MAAM,CAAC,MAAM,CACpC,OAAO,CAAC,KAAK,CAAC,gBAAgB,EAAE,CACnC,EAAE,CAAC;AACR,CAAC;AAED,MAAM,UAAU,sBAAsB,CAAC,MAAuB;IAC1D,OAAO,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,UAAU,wBAAwB,CAAC,KAAiB;IACtD,OAAO,oBAAoB,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;AACtD,CAAC;AAED,MAAM,UAAU,cAAc,CAAC,MAAuB;IAClD,OAAO,cAAc,MAAM,CAAC,MAAM,CAC9B,OAAO,CAAC,YAAY,CAChB,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC,CAC9D,CACJ,EAAE,CAAC;AACR,CAAC;AAED,MAAM,UAAU,IAAI,CAAC,MAAuB,EAAE,OAAkB;IAC5D,MAAM,SAAS,GAAG,OAAO,CAAC,IAAI,CAC1B,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,EAC5C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC,CAC9D,CAAC;IACF,OAAO,cAAc,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC;AACpD,CAAC;AAED,MAAM,UAAU,MAAM,CAClB,SAAoB,EACpB,OAAkB,EAClB,EAAe;IAEf,OAAO,OAAO,CAAC,MAAM,CACjB,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC,EACxD,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,EAC5C,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC,CACpD,CAAC;AACN,CAAC;AAED,MAAM,UAAU,kBAAkB;IAC9B,OAAO,oBAAoB,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC,EAAE,CAAC;AAChF,CAAC;AAED,MAAM,UAAU,sBAAsB,CAAC,MAAuB;IAC1D,OAAO,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,UAAU,wBAAwB,CAAC,KAAiB;IACtD,OAAO,oBAAoB,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;AACtD,CAAC;AAED,MAAM,UAAU,cAAc,CAAC,MAAuB;IAClD,OAAO,cAAc,MAAM,CAAC,MAAM,CAC9B,MAAM,CAAC,YAAY,CACf,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC,CAC9D,CACJ,EAAE,CAAC;AACR,CAAC;AAMD,MAAM,UAAU,IAAI,CAChB,OAAU,EACV,IAAqB,EACrB,EAAoB,EACpB,aAAsD;IAEtD,MAAM,KAAK,GAAG,MAAM,CAChB,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,aAAa,CAAC,CAAC,CACrD,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAEf,MAAM,gBAAgB,GAAG,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,IAAI,EAAE,CAAC;IAC/C,MAAM,aAAa,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,EAAE;QACrD,OAAO,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC,CAAC;IACpE,CAAC,CAAC,CAAC;IACH,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAC5B,IAAI,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAC7C,CAAC;IAEF,MAAM,SAAS,GAAG,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC;IAE/D,MAAM,SAAS,GAAiB,EAAE,CAAC;IAEnC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,gBAAgB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;QAC9C,MAAM,SAAS,GAAG,gBAAgB,CAAC,CAAC,CAAE,CAAC;QACvC,MAAM,YAAY,GAAG,MAAM,CAAC,eAAe,CACvC,UAAU,EACV,aAAa,CAAC,CAAC,CAAE,CACpB,CAAC;QAEF,MAAM,WAAW,GAAG,iBAAiB,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC,OAAO,CAC9D,SAAS,CACZ,CAAC;QAEF,SAAS,CAAC,SAAS,CAAC,GAAG,WAAW,SAAS,CAAC,MAAM,CAC9C,WAAW,CACd,EAAe,CAAC;KACpB;IAED,OAAO,SAAS,CAAC;AACrB,CAAC;AAED,MAAM,UAAU,MAAM,CAClB,SAAuB,EACvB,SAA0B,EAC1B,IAAiB,EACjB,aAAsD;IAEtD,MAAM,KAAK,GAAG,MAAM,CAChB,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,aAAa,CAAC,CAAC,CACrD,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAEf,MAAM,aAAa,GAAG,MAAM,CAAC,MAAM,CAC/B,SAAS,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAClD,CAAC;IAEF,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC,CAAC;IAEtE,MAAM,MAAM,GAAG,SAAS,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC;IAEpD,IAAI,CAAC,MAAM,EAAE;QACT,OAAO,SAAS,CAAC;KACpB;IAED,MAAM,WAAW,GAAG,SAAS,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC;IAE1E,MAAM,YAAY,GAAG,MAAM,CAAC,eAAe,CAAC,aAAa,EAAE,SAAS,CAAC,CAAC;IAEtE,MAAM,SAAS,GAAG,iBAAiB,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC,OAAO,CAC5D,WAAW,CACd,CAAC;IAEF,IAAI;QACA,OAAO,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;KACpD;IAAC,OAAO,CAAC,EAAE;QACR,OAAO,CAAC,KAAK,CAAC,wCAAwC,EAAE,CAAC,CAAC,CAAC;QAC3D,OAAO,SAAS,CAAC;KACpB;AACL,CAAC;AAID,MAAM,UAAU,UAAU,CAAC,KAAgB;IACvC,OAAO,SAAS,MAAM,CAAC,MAAM,CACzB,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC,CACrD,EAAE,CAAC;AACR,CAAC;AAED,MAAM,OAAO,aAAa;IAGtB,YAAY,SAA4C;QACpD,IAAI,CAAC,KAAK,GAAG,SAAS,IAAI,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;IAChD,CAAC;IAED,MAAM,CAAC,KAAgB;QACnB,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IAClE,CAAC;IAED,MAAM;QACF,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,EAAE,CAAC;QACjC,OAAO,SAAS,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;IAC1C,CAAC;IAED,KAAK;QACD,OAAO,IAAI,aAAa,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,EAAE,CAAC,CAAC;IACjD,CAAC;CACJ;AAID,MAAM,UAAU,SAAS,CAAC,KAAgB;IACtC,OAAO,cAAc,MAAM,CAAC,MAAM,CAC9B,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAClE,EAAE,CAAC;AACR,CAAC;AAUD,MAAM,UAAU,kBAAkB;IAC9B,OAAO;QACH,MAAM,EAAE,cAAc,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,EAAE;QACtD,EAAE,EAAE,QAAQ,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,EAAE;KAC/C,CAAC;AACN,CAAC;AAED,SAAS,OAAO,CACZ,KAAQ,EACR,SAAoB,EACpB,aAAgB;IAEhB,MAAM,cAAc,GAAG,MAAM,CAAC,MAAM,CAChC,SAAS,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CAC5C,CAAC;IACF,MAAM,KAAK,GAAG,MAAM,CAChB,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,aAAa,CAAC,CAAC,CACrD,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAEf,MAAM,SAAS,GAAG,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;IAC7D,MAAM,UAAU,GAAG,QAAQ,CAAC,cAAc,EAAE,KAAK,EAAE,SAAS,CAAC,CAAC;IAC9D,OAAO,cAAc,SAAS,CAAC,MAAM,CAAC,UAAU,CAAC,EAAqB,CAAC;AAC3E,CAAC;AAED,MAAM,UAAU,qBAAqB,CACjC,KAAQ,EACR,SAAoB,EACpB,aAAsD;IAEtD,OAAO,OAAO,CAAC,KAAK,EAAE,SAAS,EAAE,aAAa,CAAC,CAAC;AACpD,CAAC;AAED,MAAM,UAAU,aAAa,CAAC,IAG7B;IAKG,MAAM,aAAa,GAAG;QAClB,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,EAAE;QACtB,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,EAAE;KAC3B,CAAC;IAEF,OAAO;QACH,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,EAAE;QACtB,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,EAAE;QACxB,SAAS,EAAE,OAAO,CACd,IAAI,CAAC,MAAM,CAAC,MAAM,EAClB,IAAI,CAAC,OAAO,CAAC,MAAM,EACnB,aAAa,CAChB;KACJ,CAAC;AACN,CAAC;AAED,SAAS,OAAO,CACZ,SAA0B,EAC1B,SAAoB,EACpB,aAAgB;IAEhB,MAAM,cAAc,GAAG,MAAM,CAAC,MAAM,CAChC,SAAS,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CAC5C,CAAC;IACF,MAAM,KAAK,GAAG,MAAM,CAChB,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,aAAa,CAAC,CAAC,CACrD,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAEf,MAAM,UAAU,GAAG,SAAS,CAAC,MAAM,CAC/B,SAAS,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CAC5C,CAAC;IACF,MAAM,SAAS,GAAG,QAAQ,CAAC,cAAc,EAAE,KAAK,EAAE,UAAU,CAAC,CAAC;IAE9D,IAAI;QACA,OAAO,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;KACpD;IAAC,OAAO,CAAC,EAAE;QACR,OAAO,SAAS,CAAC;KACpB;AACL,CAAC;AAED,MAAM,UAAU,qBAAqB,CACjC,SAAgE,EAChE,SAAoB,EACpB,aAAsD;IAEtD,OAAO,OAAO,CAAC,SAAS,EAAE,SAAS,EAAE,aAAa,CAAC,CAAC;AACxD,CAAC;AAED,MAAM,UAAU,eAAe,CAC3B,UAIC,EACD,aAAwB;IAExB,MAAM,aAAa,GAAG;QAClB,MAAM,EAAE,UAAU,CAAC,MAAM;QACzB,OAAO,EAAE,UAAU,CAAC,OAAO;KAC9B,CAAC;IAEF,OAAO,OAAO,CAAC,UAAU,CAAC,SAAS,EAAE,aAAa,EAAE,aAAa,CAAC,CAAC;AACvE,CAAC;AAED,MAAM,UAAU,mBAAmB;IAC/B,OAAO,IAAI,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;AAChD,CAAC;AAED,MAAM,UAAU,gBAAgB;IAC5B,MAAM,SAAS,GAAG,CAAC,IAAI,IAAI,EAAE,CAAC,CAAC,WAAW,EAAkB,CAAC;IAC7D,OAAO;QACH,SAAS;QACT,UAAU,EAAE,mBAAmB,EAAE;KACpC,CAAA;AACL,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,115 @@
|
|
|
1
|
+
import { getRecipientID, getSignatoryID, secureHash, newRandomRecipient, newRandomSignatory, seal, sign, openAs, verify, shortHash, newRandomKeySecret, encryptForTransaction, decryptForTransaction, sealKeySecret, unsealKeySecret, } from './crypto.js';
|
|
2
|
+
import { base58, base64url } from "@scure/base";
|
|
3
|
+
import { x25519 } from "@noble/curves/ed25519";
|
|
4
|
+
import { xsalsa20_poly1305 } from "@noble/ciphers/salsa";
|
|
5
|
+
import { blake3 } from "@noble/hashes/blake3";
|
|
6
|
+
import stableStringify from "fast-json-stable-stringify";
|
|
7
|
+
test("Signatures round-trip and use stable stringify", () => {
|
|
8
|
+
const data = { b: "world", a: "hello" };
|
|
9
|
+
const signatory = newRandomSignatory();
|
|
10
|
+
const signature = sign(signatory, data);
|
|
11
|
+
expect(signature).toMatch(/^signature_z/);
|
|
12
|
+
expect(verify(signature, { a: "hello", b: "world" }, getSignatoryID(signatory))).toBe(true);
|
|
13
|
+
});
|
|
14
|
+
test("Invalid signatures don't verify", () => {
|
|
15
|
+
const data = { b: "world", a: "hello" };
|
|
16
|
+
const signatory = newRandomSignatory();
|
|
17
|
+
const signatory2 = newRandomSignatory();
|
|
18
|
+
const wrongSignature = sign(signatory2, data);
|
|
19
|
+
expect(verify(wrongSignature, data, getSignatoryID(signatory))).toBe(false);
|
|
20
|
+
});
|
|
21
|
+
test("Sealing round-trips, but invalid receiver can't unseal", () => {
|
|
22
|
+
const data = { b: "world", a: "hello" };
|
|
23
|
+
const sender = newRandomRecipient();
|
|
24
|
+
const recipient1 = newRandomRecipient();
|
|
25
|
+
const recipient2 = newRandomRecipient();
|
|
26
|
+
const recipient3 = newRandomRecipient();
|
|
27
|
+
const nOnceMaterial = {
|
|
28
|
+
in: "co_zTEST",
|
|
29
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 0 },
|
|
30
|
+
};
|
|
31
|
+
const sealed = seal(data, sender, new Set([getRecipientID(recipient1), getRecipientID(recipient2)]), nOnceMaterial);
|
|
32
|
+
expect(sealed[getRecipientID(recipient1)]).toMatch(/^sealed_U/);
|
|
33
|
+
expect(sealed[getRecipientID(recipient2)]).toMatch(/^sealed_U/);
|
|
34
|
+
expect(openAs(sealed, recipient1, getRecipientID(sender), nOnceMaterial)).toEqual(data);
|
|
35
|
+
expect(openAs(sealed, recipient2, getRecipientID(sender), nOnceMaterial)).toEqual(data);
|
|
36
|
+
expect(openAs(sealed, recipient3, getRecipientID(sender), nOnceMaterial)).toBeUndefined();
|
|
37
|
+
// trying with wrong recipient secret, by hand
|
|
38
|
+
const nOnce = blake3(new TextEncoder().encode(stableStringify(nOnceMaterial))).slice(0, 24);
|
|
39
|
+
const recipient3priv = base58.decode(recipient3.substring("recipientSecret_z".length));
|
|
40
|
+
const senderPub = base58.decode(getRecipientID(sender).substring("recipient_z".length));
|
|
41
|
+
const sealedBytes = base64url.decode(sealed[getRecipientID(recipient1)].substring("sealed_U".length));
|
|
42
|
+
const sharedSecret = x25519.getSharedSecret(recipient3priv, senderPub);
|
|
43
|
+
expect(() => {
|
|
44
|
+
const _ = xsalsa20_poly1305(sharedSecret, nOnce).decrypt(sealedBytes);
|
|
45
|
+
}).toThrow("Wrong tag");
|
|
46
|
+
});
|
|
47
|
+
test("Hashing is deterministic", () => {
|
|
48
|
+
expect(secureHash({ b: "world", a: "hello" })).toEqual(secureHash({ a: "hello", b: "world" }));
|
|
49
|
+
expect(shortHash({ b: "world", a: "hello" })).toEqual(shortHash({ a: "hello", b: "world" }));
|
|
50
|
+
});
|
|
51
|
+
test("Encryption for transactions round-trips", () => {
|
|
52
|
+
const { secret } = newRandomKeySecret();
|
|
53
|
+
const encrypted1 = encryptForTransaction({ a: "hello" }, secret, {
|
|
54
|
+
in: "co_zTEST",
|
|
55
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 0 },
|
|
56
|
+
});
|
|
57
|
+
const encrypted2 = encryptForTransaction({ b: "world" }, secret, {
|
|
58
|
+
in: "co_zTEST",
|
|
59
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 1 },
|
|
60
|
+
});
|
|
61
|
+
const decrypted1 = decryptForTransaction(encrypted1, secret, {
|
|
62
|
+
in: "co_zTEST",
|
|
63
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 0 },
|
|
64
|
+
});
|
|
65
|
+
const decrypted2 = decryptForTransaction(encrypted2, secret, {
|
|
66
|
+
in: "co_zTEST",
|
|
67
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 1 },
|
|
68
|
+
});
|
|
69
|
+
expect([decrypted1, decrypted2]).toEqual([{ a: "hello" }, { b: "world" }]);
|
|
70
|
+
});
|
|
71
|
+
test("Encryption for transactions doesn't decrypt with a wrong key", () => {
|
|
72
|
+
const { secret } = newRandomKeySecret();
|
|
73
|
+
const { secret: secret2 } = newRandomKeySecret();
|
|
74
|
+
const encrypted1 = encryptForTransaction({ a: "hello" }, secret, {
|
|
75
|
+
in: "co_zTEST",
|
|
76
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 0 },
|
|
77
|
+
});
|
|
78
|
+
const encrypted2 = encryptForTransaction({ b: "world" }, secret, {
|
|
79
|
+
in: "co_zTEST",
|
|
80
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 1 },
|
|
81
|
+
});
|
|
82
|
+
const decrypted1 = decryptForTransaction(encrypted1, secret2, {
|
|
83
|
+
in: "co_zTEST",
|
|
84
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 0 },
|
|
85
|
+
});
|
|
86
|
+
const decrypted2 = decryptForTransaction(encrypted2, secret2, {
|
|
87
|
+
in: "co_zTEST",
|
|
88
|
+
tx: { sessionID: "co_agent_zTEST_session_zTEST", txIndex: 1 },
|
|
89
|
+
});
|
|
90
|
+
expect([decrypted1, decrypted2]).toEqual([undefined, undefined]);
|
|
91
|
+
});
|
|
92
|
+
test("Encryption of keySecrets round-trips", () => {
|
|
93
|
+
const toSeal = newRandomKeySecret();
|
|
94
|
+
const sealing = newRandomKeySecret();
|
|
95
|
+
const keys = {
|
|
96
|
+
toSeal,
|
|
97
|
+
sealing,
|
|
98
|
+
};
|
|
99
|
+
const sealed = sealKeySecret(keys);
|
|
100
|
+
const unsealed = unsealKeySecret(sealed, sealing.secret);
|
|
101
|
+
expect(unsealed).toEqual(toSeal.secret);
|
|
102
|
+
});
|
|
103
|
+
test("Encryption of keySecrets doesn't unseal with a wrong key", () => {
|
|
104
|
+
const toSeal = newRandomKeySecret();
|
|
105
|
+
const sealing = newRandomKeySecret();
|
|
106
|
+
const sealingWrong = newRandomKeySecret();
|
|
107
|
+
const keys = {
|
|
108
|
+
toSeal,
|
|
109
|
+
sealing,
|
|
110
|
+
};
|
|
111
|
+
const sealed = sealKeySecret(keys);
|
|
112
|
+
const unsealed = unsealKeySecret(sealed, sealingWrong.secret);
|
|
113
|
+
expect(unsealed).toBeUndefined();
|
|
114
|
+
});
|
|
115
|
+
//# sourceMappingURL=crypto.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"crypto.test.js","sourceRoot":"","sources":["../src/crypto.test.ts"],"names":[],"mappings":"AAAA,OAAO,EACH,cAAc,EACd,cAAc,EACd,UAAU,EACV,kBAAkB,EAClB,kBAAkB,EAClB,IAAI,EACJ,IAAI,EACJ,MAAM,EACN,MAAM,EACN,SAAS,EACT,kBAAkB,EAClB,qBAAqB,EACrB,qBAAqB,EACrB,aAAa,EACb,eAAe,GAClB,MAAM,aAAa,CAAC;AACrB,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AAChD,OAAO,EAAE,MAAM,EAAE,MAAM,uBAAuB,CAAC;AAC/C,OAAO,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AACzD,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAC9C,OAAO,eAAe,MAAM,4BAA4B,CAAC;AAEzD,IAAI,CAAC,gDAAgD,EAAE,GAAG,EAAE;IACxD,MAAM,IAAI,GAAG,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC;IACxC,MAAM,SAAS,GAAG,kBAAkB,EAAE,CAAC;IACvC,MAAM,SAAS,GAAG,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IAExC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;IAC1C,MAAM,CACF,MAAM,CAAC,SAAS,EAAE,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,cAAc,CAAC,SAAS,CAAC,CAAC,CAC3E,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AACjB,CAAC,CAAC,CAAC;AAEH,IAAI,CAAC,iCAAiC,EAAE,GAAG,EAAE;IACzC,MAAM,IAAI,GAAG,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC;IACxC,MAAM,SAAS,GAAG,kBAAkB,EAAE,CAAC;IACvC,MAAM,UAAU,GAAG,kBAAkB,EAAE,CAAC;IACxC,MAAM,cAAc,GAAG,IAAI,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC;IAE9C,MAAM,CAAC,MAAM,CAAC,cAAc,EAAE,IAAI,EAAE,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;AAChF,CAAC,CAAC,CAAC;AAEH,IAAI,CAAC,wDAAwD,EAAE,GAAG,EAAE;IAChE,MAAM,IAAI,GAAG,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC;IACxC,MAAM,MAAM,GAAG,kBAAkB,EAAE,CAAC;IACpC,MAAM,UAAU,GAAG,kBAAkB,EAAE,CAAC;IACxC,MAAM,UAAU,GAAG,kBAAkB,EAAE,CAAC;IACxC,MAAM,UAAU,GAAG,kBAAkB,EAAE,CAAC;IAExC,MAAM,aAAa,GAAG;QAClB,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KACvD,CAAC;IAEX,MAAM,MAAM,GAAG,IAAI,CACf,IAAI,EACJ,MAAM,EACN,IAAI,GAAG,CAAC,CAAC,cAAc,CAAC,UAAU,CAAC,EAAE,cAAc,CAAC,UAAU,CAAC,CAAC,CAAC,EACjE,aAAa,CAChB,CAAC;IAEF,MAAM,CAAC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;IAChE,MAAM,CAAC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;IAChE,MAAM,CACF,MAAM,CAAC,MAAM,EAAE,UAAU,EAAE,cAAc,CAAC,MAAM,CAAC,EAAE,aAAa,CAAC,CACpE,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;IAChB,MAAM,CACF,MAAM,CAAC,MAAM,EAAE,UAAU,EAAE,cAAc,CAAC,MAAM,CAAC,EAAE,aAAa,CAAC,CACpE,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;IAChB,MAAM,CACF,MAAM,CAAC,MAAM,EAAE,UAAU,EAAE,cAAc,CAAC,MAAM,CAAC,EAAE,aAAa,CAAC,CACpE,CAAC,aAAa,EAAE,CAAC;IAElB,8CAA8C;IAC9C,MAAM,KAAK,GAAG,MAAM,CAChB,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,eAAe,CAAC,aAAa,CAAC,CAAC,CAC3D,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IACf,MAAM,cAAc,GAAG,MAAM,CAAC,MAAM,CAChC,UAAU,CAAC,SAAS,CAAC,mBAAmB,CAAC,MAAM,CAAC,CACnD,CAAC;IACF,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAC3B,cAAc,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,aAAa,CAAC,MAAM,CAAC,CACzD,CAAC;IACF,MAAM,WAAW,GAAG,SAAS,CAAC,MAAM,CAChC,MAAM,CAAC,cAAc,CAAC,UAAU,CAAC,CAAE,CAAC,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,CACnE,CAAC;IACF,MAAM,YAAY,GAAG,MAAM,CAAC,eAAe,CAAC,cAAc,EAAE,SAAS,CAAC,CAAC;IAEvE,MAAM,CAAC,GAAG,EAAE;QACR,MAAM,CAAC,GAAG,iBAAiB,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;IAC1E,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;AAC5B,CAAC,CAAC,CAAC;AAEH,IAAI,CAAC,0BAA0B,EAAE,GAAG,EAAE;IAClC,MAAM,CAAC,UAAU,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC,OAAO,CAClD,UAAU,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CACzC,CAAC;IAEF,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC,OAAO,CACjD,SAAS,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CACxC,CAAC;AACN,CAAC,CAAC,CAAC;AAEH,IAAI,CAAC,yCAAyC,EAAE,GAAG,EAAE;IACjD,MAAM,EAAE,MAAM,EAAE,GAAG,kBAAkB,EAAE,CAAC;IAExC,MAAM,UAAU,GAAI,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;QAC9D,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,UAAU,GAAG,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;QAC7D,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,UAAU,GAAG,qBAAqB,CAAC,UAAU,EAAE,MAAM,EAAE;QACzD,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,UAAU,GAAI,qBAAqB,CAAC,UAAU,EAAE,MAAM,EAAE;QAC1D,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,CAAC,CAAC,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;AAC/E,CAAC,CAAC,CAAC;AAEH,IAAI,CAAC,8DAA8D,EAAE,GAAG,EAAE;IACtE,MAAM,EAAE,MAAM,EAAE,GAAG,kBAAkB,EAAE,CAAC;IACxC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,kBAAkB,EAAE,CAAC;IAEjD,MAAM,UAAU,GAAI,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;QAC9D,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,UAAU,GAAG,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;QAC7D,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,UAAU,GAAG,qBAAqB,CAAC,UAAU,EAAE,OAAO,EAAE;QAC1D,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,UAAU,GAAI,qBAAqB,CAAC,UAAU,EAAE,OAAO,EAAE;QAC3D,EAAE,EAAE,UAAU;QACd,EAAE,EAAE,EAAE,SAAS,EAAE,8BAA8B,EAAE,OAAO,EAAE,CAAC,EAAE;KAChE,CAAC,CAAC;IAEH,MAAM,CAAC,CAAC,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC,CAAC;AACrE,CAAC,CAAC,CAAC;AAEH,IAAI,CAAC,sCAAsC,EAAE,GAAG,EAAE;IAC9C,MAAM,MAAM,GAAG,kBAAkB,EAAE,CAAC;IACpC,MAAM,OAAO,GAAG,kBAAkB,EAAE,CAAC;IAErC,MAAM,IAAI,GAAG;QACT,MAAM;QACN,OAAO;KACV,CAAC;IAEF,MAAM,MAAM,GAAG,aAAa,CAAC,IAAI,CAAC,CAAC;IAEnC,MAAM,QAAQ,GAAG,eAAe,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IAEzD,MAAM,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;AAC5C,CAAC,CAAC,CAAC;AAEH,IAAI,CAAC,0DAA0D,EAAE,GAAG,EAAE;IAClE,MAAM,MAAM,GAAG,kBAAkB,EAAE,CAAC;IACpC,MAAM,OAAO,GAAG,kBAAkB,EAAE,CAAC;IACrC,MAAM,YAAY,GAAG,kBAAkB,EAAE,CAAC;IAE1C,MAAM,IAAI,GAAG;QACT,MAAM;QACN,OAAO;KACV,CAAC;IAEF,MAAM,MAAM,GAAG,aAAa,CAAC,IAAI,CAAC,CAAC;IAEnC,MAAM,QAAQ,GAAG,eAAe,CAAC,MAAM,EAAE,YAAY,CAAC,MAAM,CAAC,CAAC;IAE9D,MAAM,CAAC,QAAQ,CAAC,CAAC,aAAa,EAAE,CAAC;AACrC,CAAC,CAAC,CAAC"}
|
package/dist/ids.d.ts
ADDED
package/dist/ids.js
ADDED
package/dist/ids.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ids.js","sourceRoot":"","sources":["../src/ids.ts"],"names":[],"mappings":""}
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
import { CoValue, agentCredentialFromBytes, agentCredentialToBytes, getAgent, getAgentID, newRandomAgentCredential, newRandomSessionID } from './coValue.js';
|
|
2
|
+
import { LocalNode } from './node.js';
|
|
3
|
+
import { CoMap } from './contentTypes/coMap.js';
|
|
4
|
+
import type { AgentCredential } from './coValue.js';
|
|
5
|
+
import type { AgentID, SessionID } from './ids.js';
|
|
6
|
+
import type { CoValueID, ContentType } from './contentType.js';
|
|
7
|
+
import type { JsonValue } from './jsonValue.js';
|
|
8
|
+
import type { SyncMessage } from './sync.js';
|
|
9
|
+
type Value = JsonValue | ContentType;
|
|
10
|
+
declare const internals: {
|
|
11
|
+
agentCredentialToBytes: typeof agentCredentialToBytes;
|
|
12
|
+
agentCredentialFromBytes: typeof agentCredentialFromBytes;
|
|
13
|
+
getAgent: typeof getAgent;
|
|
14
|
+
getAgentID: typeof getAgentID;
|
|
15
|
+
newRandomAgentCredential: typeof newRandomAgentCredential;
|
|
16
|
+
newRandomSessionID: typeof newRandomSessionID;
|
|
17
|
+
};
|
|
18
|
+
export { LocalNode, CoValue, CoMap, internals };
|
|
19
|
+
export type { Value, JsonValue, ContentType, CoValueID, AgentCredential, SessionID, AgentID, SyncMessage };
|
package/dist/index.js
ADDED
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
import { CoValue, agentCredentialFromBytes, agentCredentialToBytes, getAgent, getAgentID, newRandomAgentCredential, newRandomSessionID, } from './coValue.js';
|
|
2
|
+
import { LocalNode } from './node.js';
|
|
3
|
+
import { CoMap } from './contentTypes/coMap.js';
|
|
4
|
+
const internals = {
|
|
5
|
+
agentCredentialToBytes,
|
|
6
|
+
agentCredentialFromBytes,
|
|
7
|
+
getAgent,
|
|
8
|
+
getAgentID,
|
|
9
|
+
newRandomAgentCredential,
|
|
10
|
+
newRandomSessionID,
|
|
11
|
+
};
|
|
12
|
+
export { LocalNode, CoValue, CoMap, internals };
|
|
13
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACH,OAAO,EACP,wBAAwB,EACxB,sBAAsB,EACtB,QAAQ,EACR,UAAU,EACV,wBAAwB,EACxB,kBAAkB,GACrB,MAAM,cAAc,CAAC;AACtB,OAAO,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;AACtC,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAUhD,MAAM,SAAS,GAAG;IACd,sBAAsB;IACtB,wBAAwB;IACxB,QAAQ;IACR,UAAU;IACV,wBAAwB;IACxB,kBAAkB;CACrB,CAAC;AAEF,OAAO,EAAE,SAAS,EAAE,OAAO,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC"}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import { CoValueID, ContentType } from './contentType.js';
|
|
2
|
+
export type JsonAtom = string | number | boolean | null;
|
|
3
|
+
export type JsonValue = JsonAtom | JsonArray | JsonObject | CoValueID<ContentType>;
|
|
4
|
+
export type JsonArray = JsonValue[];
|
|
5
|
+
export type JsonObject = {
|
|
6
|
+
[key: string]: JsonValue;
|
|
7
|
+
};
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"jsonValue.js","sourceRoot":"","sources":["../src/jsonValue.ts"],"names":[],"mappings":""}
|
package/dist/node.d.ts
ADDED
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
import { CoValue, AgentCredential, Agent, CoValueHeader } from './coValue.js';
|
|
2
|
+
import { Team } from './permissions.js';
|
|
3
|
+
import { SyncManager } from './sync.js';
|
|
4
|
+
import { AgentID, RawCoValueID, SessionID } from './ids.js';
|
|
5
|
+
import { CoValueID, ContentType } from './contentType.js';
|
|
6
|
+
export declare class LocalNode {
|
|
7
|
+
coValues: {
|
|
8
|
+
[key: RawCoValueID]: CoValueState;
|
|
9
|
+
};
|
|
10
|
+
agentCredential: AgentCredential;
|
|
11
|
+
agentID: AgentID;
|
|
12
|
+
ownSessionID: SessionID;
|
|
13
|
+
sync: SyncManager;
|
|
14
|
+
constructor(agentCredential: AgentCredential, ownSessionID: SessionID);
|
|
15
|
+
createCoValue(header: CoValueHeader): CoValue;
|
|
16
|
+
loadCoValue(id: RawCoValueID): Promise<CoValue>;
|
|
17
|
+
load<T extends ContentType>(id: CoValueID<T>): Promise<T>;
|
|
18
|
+
expectCoValueLoaded(id: RawCoValueID, expectation?: string): CoValue;
|
|
19
|
+
createAgent(publicNickname: string): AgentCredential;
|
|
20
|
+
expectAgentLoaded(id: AgentID, expectation?: string): Agent;
|
|
21
|
+
createTeam(): Team;
|
|
22
|
+
testWithDifferentCredentials(agentCredential: AgentCredential, ownSessionID: SessionID): LocalNode;
|
|
23
|
+
}
|
|
24
|
+
type CoValueState = {
|
|
25
|
+
state: "loading";
|
|
26
|
+
done: Promise<CoValue>;
|
|
27
|
+
resolve: (coValue: CoValue) => void;
|
|
28
|
+
} | {
|
|
29
|
+
state: "loaded";
|
|
30
|
+
coValue: CoValue;
|
|
31
|
+
};
|
|
32
|
+
export declare function newLoadingState(): CoValueState;
|
|
33
|
+
export {};
|
package/dist/node.js
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
1
|
+
import { createdNowUnique, newRandomKeySecret, seal } from './crypto.js';
|
|
2
|
+
import { CoValue, getAgent, getAgentID, getAgentCoValueHeader, newRandomAgentCredential, } from './coValue.js';
|
|
3
|
+
import { Team, expectTeamContent } from './permissions.js';
|
|
4
|
+
import { SyncManager } from './sync.js';
|
|
5
|
+
export class LocalNode {
|
|
6
|
+
constructor(agentCredential, ownSessionID) {
|
|
7
|
+
this.coValues = {};
|
|
8
|
+
this.sync = new SyncManager(this);
|
|
9
|
+
this.agentCredential = agentCredential;
|
|
10
|
+
const agent = getAgent(agentCredential);
|
|
11
|
+
const agentID = getAgentID(agent);
|
|
12
|
+
this.agentID = agentID;
|
|
13
|
+
this.ownSessionID = ownSessionID;
|
|
14
|
+
const agentCoValue = new CoValue(getAgentCoValueHeader(agent), this);
|
|
15
|
+
this.coValues[agentCoValue.id] = {
|
|
16
|
+
state: "loaded",
|
|
17
|
+
coValue: agentCoValue,
|
|
18
|
+
};
|
|
19
|
+
}
|
|
20
|
+
createCoValue(header) {
|
|
21
|
+
const coValue = new CoValue(header, this);
|
|
22
|
+
this.coValues[coValue.id] = { state: "loaded", coValue: coValue };
|
|
23
|
+
void this.sync.syncCoValue(coValue);
|
|
24
|
+
return coValue;
|
|
25
|
+
}
|
|
26
|
+
loadCoValue(id) {
|
|
27
|
+
let entry = this.coValues[id];
|
|
28
|
+
if (!entry) {
|
|
29
|
+
entry = newLoadingState();
|
|
30
|
+
this.coValues[id] = entry;
|
|
31
|
+
this.sync.loadFromPeers(id);
|
|
32
|
+
}
|
|
33
|
+
if (entry.state === "loaded") {
|
|
34
|
+
return Promise.resolve(entry.coValue);
|
|
35
|
+
}
|
|
36
|
+
return entry.done;
|
|
37
|
+
}
|
|
38
|
+
async load(id) {
|
|
39
|
+
return (await this.loadCoValue(id)).getCurrentContent();
|
|
40
|
+
}
|
|
41
|
+
expectCoValueLoaded(id, expectation) {
|
|
42
|
+
const entry = this.coValues[id];
|
|
43
|
+
if (!entry) {
|
|
44
|
+
throw new Error(`${expectation ? expectation + ": " : ""}Unknown CoValue ${id}`);
|
|
45
|
+
}
|
|
46
|
+
if (entry.state === "loading") {
|
|
47
|
+
throw new Error(`${expectation ? expectation + ": " : ""}CoValue ${id} not yet loaded`);
|
|
48
|
+
}
|
|
49
|
+
return entry.coValue;
|
|
50
|
+
}
|
|
51
|
+
createAgent(publicNickname) {
|
|
52
|
+
const agentCredential = newRandomAgentCredential(publicNickname);
|
|
53
|
+
this.createCoValue(getAgentCoValueHeader(getAgent(agentCredential)));
|
|
54
|
+
return agentCredential;
|
|
55
|
+
}
|
|
56
|
+
expectAgentLoaded(id, expectation) {
|
|
57
|
+
const coValue = this.expectCoValueLoaded(id, expectation);
|
|
58
|
+
if (coValue.header.type !== "comap" || coValue.header.ruleset.type !== "agent") {
|
|
59
|
+
throw new Error(`${expectation ? expectation + ": " : ""}CoValue ${id} is not an agent`);
|
|
60
|
+
}
|
|
61
|
+
return {
|
|
62
|
+
recipientID: coValue.header.ruleset.initialRecipientID,
|
|
63
|
+
signatoryID: coValue.header.ruleset.initialSignatoryID,
|
|
64
|
+
publicNickname: coValue.header.publicNickname?.replace("agent-", ""),
|
|
65
|
+
};
|
|
66
|
+
}
|
|
67
|
+
createTeam() {
|
|
68
|
+
const teamCoValue = this.createCoValue({
|
|
69
|
+
type: "comap",
|
|
70
|
+
ruleset: { type: "team", initialAdmin: this.agentID },
|
|
71
|
+
meta: null,
|
|
72
|
+
...createdNowUnique(),
|
|
73
|
+
publicNickname: "team",
|
|
74
|
+
});
|
|
75
|
+
let teamContent = expectTeamContent(teamCoValue.getCurrentContent());
|
|
76
|
+
teamContent = teamContent.edit((editable) => {
|
|
77
|
+
editable.set(this.agentID, "admin", "trusting");
|
|
78
|
+
const readKey = newRandomKeySecret();
|
|
79
|
+
const revelation = seal(readKey.secret, this.agentCredential.recipientSecret, new Set([getAgent(this.agentCredential).recipientID]), {
|
|
80
|
+
in: teamCoValue.id,
|
|
81
|
+
tx: teamCoValue.nextTransactionID(),
|
|
82
|
+
});
|
|
83
|
+
editable.set("readKey", { keyID: readKey.id, revelation }, "trusting");
|
|
84
|
+
});
|
|
85
|
+
return new Team(teamContent, this);
|
|
86
|
+
}
|
|
87
|
+
testWithDifferentCredentials(agentCredential, ownSessionID) {
|
|
88
|
+
const newNode = new LocalNode(agentCredential, ownSessionID);
|
|
89
|
+
newNode.coValues = Object.fromEntries(Object.entries(this.coValues)
|
|
90
|
+
.map(([id, entry]) => {
|
|
91
|
+
if (entry.state === "loading") {
|
|
92
|
+
return undefined;
|
|
93
|
+
}
|
|
94
|
+
const newCoValue = new CoValue(entry.coValue.header, newNode);
|
|
95
|
+
newCoValue.sessions = entry.coValue.sessions;
|
|
96
|
+
return [id, { state: "loaded", coValue: newCoValue }];
|
|
97
|
+
})
|
|
98
|
+
.filter((x) => !!x));
|
|
99
|
+
return newNode;
|
|
100
|
+
}
|
|
101
|
+
}
|
|
102
|
+
export function newLoadingState() {
|
|
103
|
+
let resolve;
|
|
104
|
+
const promise = new Promise((r) => {
|
|
105
|
+
resolve = r;
|
|
106
|
+
});
|
|
107
|
+
return {
|
|
108
|
+
state: "loading",
|
|
109
|
+
done: promise,
|
|
110
|
+
resolve: resolve,
|
|
111
|
+
};
|
|
112
|
+
}
|
|
113
|
+
//# sourceMappingURL=node.js.map
|
package/dist/node.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"node.js","sourceRoot":"","sources":["../src/node.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,kBAAkB,EAAE,IAAI,EAAE,MAAM,aAAa,CAAC;AACzE,OAAO,EACH,OAAO,EAGP,QAAQ,EACR,UAAU,EACV,qBAAqB,EAErB,wBAAwB,GAC3B,MAAM,cAAc,CAAC;AACtB,OAAO,EAAE,IAAI,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAC3D,OAAO,EAAE,WAAW,EAAE,MAAM,WAAW,CAAC;AAIxC,MAAM,OAAO,SAAS;IAOlB,YAAY,eAAgC,EAAE,YAAuB;QANrE,aAAQ,GAA0C,EAAE,CAAC;QAIrD,SAAI,GAAG,IAAI,WAAW,CAAC,IAAI,CAAC,CAAC;QAGzB,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,MAAM,KAAK,GAAG,QAAQ,CAAC,eAAe,CAAC,CAAC;QACxC,MAAM,OAAO,GAAG,UAAU,CAAC,KAAK,CAAC,CAAC;QAClC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QAEjC,MAAM,YAAY,GAAG,IAAI,OAAO,CAAC,qBAAqB,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC,CAAC;QACrE,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,EAAE,CAAC,GAAG;YAC7B,KAAK,EAAE,QAAQ;YACf,OAAO,EAAE,YAAY;SACxB,CAAC;IACN,CAAC;IAED,aAAa,CAAC,MAAqB;QAC/B,MAAM,OAAO,GAAG,IAAI,OAAO,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAC1C,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC,GAAG,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,OAAO,EAAE,CAAC;QAElE,KAAK,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAEpC,OAAO,OAAO,CAAC;IACnB,CAAC;IAED,WAAW,CAAC,EAAgB;QACxB,IAAI,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;QAC9B,IAAI,CAAC,KAAK,EAAE;YACR,KAAK,GAAG,eAAe,EAAE,CAAC;YAE1B,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC;YAE1B,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;SAC/B;QACD,IAAI,KAAK,CAAC,KAAK,KAAK,QAAQ,EAAE;YAC1B,OAAO,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;SACzC;QACD,OAAO,KAAK,CAAC,IAAI,CAAC;IACtB,CAAC;IAED,KAAK,CAAC,IAAI,CAAwB,EAAgB;QAC9C,OAAO,CAAC,MAAM,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,CAAC,iBAAiB,EAAO,CAAC;IACjE,CAAC;IAED,mBAAmB,CAAC,EAAgB,EAAE,WAAoB;QACtD,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;QAChC,IAAI,CAAC,KAAK,EAAE;YACR,MAAM,IAAI,KAAK,CACX,GAAG,WAAW,CAAC,CAAC,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC,CAAC,EAAE,mBAAmB,EAAE,EAAE,CAClE,CAAC;SACL;QACD,IAAI,KAAK,CAAC,KAAK,KAAK,SAAS,EAAE;YAC3B,MAAM,IAAI,KAAK,CACX,GACI,WAAW,CAAC,CAAC,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC,CAAC,EACvC,WAAW,EAAE,iBAAiB,CACjC,CAAC;SACL;QACD,OAAO,KAAK,CAAC,OAAO,CAAC;IACzB,CAAC;IAED,WAAW,CAAC,cAAsB;QAC9B,MAAM,eAAe,GAAG,wBAAwB,CAAC,cAAc,CAAC,CAAC;QAEjE,IAAI,CAAC,aAAa,CAAC,qBAAqB,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;QAErE,OAAO,eAAe,CAAC;IAC3B,CAAC;IAED,iBAAiB,CAAC,EAAW,EAAE,WAAoB;QAC/C,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CACpC,EAAE,EACF,WAAW,CACd,CAAC;QAEF,IAAI,OAAO,CAAC,MAAM,CAAC,IAAI,KAAK,OAAO,IAAI,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,IAAI,KAAK,OAAO,EAAE;YAC5E,MAAM,IAAI,KAAK,CACX,GACI,WAAW,CAAC,CAAC,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC,CAAC,EACvC,WAAW,EAAE,kBAAkB,CAClC,CAAC;SACL;QAED,OAAO;YACH,WAAW,EAAE,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,kBAAkB;YACtD,WAAW,EAAE,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,kBAAkB;YACtD,cAAc,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;SACvE,CAAA;IACL,CAAC;IAED,UAAU;QACN,MAAM,WAAW,GAAG,IAAI,CAAC,aAAa,CAAC;YACnC,IAAI,EAAE,OAAO;YACb,OAAO,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,YAAY,EAAE,IAAI,CAAC,OAAO,EAAE;YACrD,IAAI,EAAE,IAAI;YACV,GAAG,gBAAgB,EAAE;YACrB,cAAc,EAAE,MAAM;SACzB,CAAC,CAAC;QAEH,IAAI,WAAW,GAAG,iBAAiB,CAAC,WAAW,CAAC,iBAAiB,EAAE,CAAC,CAAC;QAErE,WAAW,GAAG,WAAW,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE;YACxC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,OAAO,EAAE,OAAO,EAAE,UAAU,CAAC,CAAC;YAEhD,MAAM,OAAO,GAAG,kBAAkB,EAAE,CAAC;YACrC,MAAM,UAAU,GAAG,IAAI,CACnB,OAAO,CAAC,MAAM,EACd,IAAI,CAAC,eAAe,CAAC,eAAe,EACpC,IAAI,GAAG,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,WAAW,CAAC,CAAC,EACrD;gBACI,EAAE,EAAE,WAAW,CAAC,EAAE;gBAClB,EAAE,EAAE,WAAW,CAAC,iBAAiB,EAAE;aACtC,CACJ,CAAC;YAEF,QAAQ,CAAC,GAAG,CACR,SAAS,EACT,EAAE,KAAK,EAAE,OAAO,CAAC,EAAE,EAAE,UAAU,EAAE,EACjC,UAAU,CACb,CAAC;QACN,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;IACvC,CAAC;IAED,4BAA4B,CACxB,eAAgC,EAChC,YAAuB;QAEvB,MAAM,OAAO,GAAG,IAAI,SAAS,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;QAE7D,OAAO,CAAC,QAAQ,GAAG,MAAM,CAAC,WAAW,CACjC,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC;aACxB,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,KAAK,CAAC,EAAE,EAAE;YACjB,IAAI,KAAK,CAAC,KAAK,KAAK,SAAS,EAAE;gBAC3B,OAAO,SAAS,CAAC;aACpB;YAED,MAAM,UAAU,GAAG,IAAI,OAAO,CAC1B,KAAK,CAAC,OAAO,CAAC,MAAM,EACpB,OAAO,CACV,CAAC;YAEF,UAAU,CAAC,QAAQ,GAAG,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC;YAE7C,OAAO,CAAC,EAAE,EAAE,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC,CAAC;QAC1D,CAAC,CAAC;aACD,MAAM,CAAC,CAAC,CAAC,EAAqC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAC7D,CAAC;QAEF,OAAO,OAAO,CAAC;IACnB,CAAC;CACJ;AAUD,MAAM,UAAU,eAAe;IAC3B,IAAI,OAAmC,CAAC;IAExC,MAAM,OAAO,GAAG,IAAI,OAAO,CAAU,CAAC,CAAC,EAAE,EAAE;QACvC,OAAO,GAAG,CAAC,CAAC;IAChB,CAAC,CAAC,CAAC;IAEH,OAAO;QACH,KAAK,EAAE,SAAS;QAChB,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,OAAQ;KACpB,CAAC;AACN,CAAC"}
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
import { ContentType } from './contentType.js';
|
|
2
|
+
import { CoMap } from './contentTypes/coMap.js';
|
|
3
|
+
import { JsonValue } from './jsonValue.js';
|
|
4
|
+
import { Encrypted, KeyID, KeySecret, RecipientID, SealedSet, SignatoryID } from './crypto.js';
|
|
5
|
+
import { AgentCredential, CoValue, Transaction } from './coValue.js';
|
|
6
|
+
import { LocalNode } from "./node.js";
|
|
7
|
+
import { AgentID, RawCoValueID, SessionID, TransactionID } from './ids.js';
|
|
8
|
+
export type PermissionsDef = {
|
|
9
|
+
type: "team";
|
|
10
|
+
initialAdmin: AgentID;
|
|
11
|
+
parentTeams?: RawCoValueID[];
|
|
12
|
+
} | {
|
|
13
|
+
type: "ownedByTeam";
|
|
14
|
+
team: RawCoValueID;
|
|
15
|
+
} | {
|
|
16
|
+
type: "agent";
|
|
17
|
+
initialSignatoryID: SignatoryID;
|
|
18
|
+
initialRecipientID: RecipientID;
|
|
19
|
+
} | {
|
|
20
|
+
type: "unsafeAllowAll";
|
|
21
|
+
};
|
|
22
|
+
export type Role = "reader" | "writer" | "admin" | "revoked";
|
|
23
|
+
export declare function determineValidTransactions(coValue: CoValue): {
|
|
24
|
+
txID: TransactionID;
|
|
25
|
+
tx: Transaction;
|
|
26
|
+
}[];
|
|
27
|
+
export type TeamContent = {
|
|
28
|
+
[key: AgentID]: Role;
|
|
29
|
+
} & {
|
|
30
|
+
readKey: {
|
|
31
|
+
keyID: KeyID;
|
|
32
|
+
revelation: SealedSet<KeySecret>;
|
|
33
|
+
previousKeys?: {
|
|
34
|
+
[key: KeyID]: Encrypted<KeySecret, {
|
|
35
|
+
sealed: KeyID;
|
|
36
|
+
sealing: KeyID;
|
|
37
|
+
}>;
|
|
38
|
+
};
|
|
39
|
+
};
|
|
40
|
+
};
|
|
41
|
+
export declare function expectTeamContent(content: ContentType): CoMap<TeamContent, {}>;
|
|
42
|
+
export declare class Team {
|
|
43
|
+
teamMap: CoMap<TeamContent, {}>;
|
|
44
|
+
node: LocalNode;
|
|
45
|
+
constructor(teamMap: CoMap<TeamContent, {}>, node: LocalNode);
|
|
46
|
+
get id(): RawCoValueID;
|
|
47
|
+
addMember(agentID: AgentID, role: Role): void;
|
|
48
|
+
rotateReadKey(): void;
|
|
49
|
+
removeMember(agentID: AgentID): void;
|
|
50
|
+
createMap<M extends {
|
|
51
|
+
[key: string]: JsonValue;
|
|
52
|
+
}, Meta extends JsonValue>(meta?: M): CoMap<M, Meta>;
|
|
53
|
+
testWithDifferentCredentials(credential: AgentCredential, sessionId: SessionID): Team;
|
|
54
|
+
}
|