diff --git a/.buildignore b/.buildignore index 227a589..1b02512 100644 --- a/.buildignore +++ b/.buildignore @@ -9,4 +9,4 @@ tsconfig.json .buildignore *.gz *.tar -yarn.lock \ No newline at end of file +yarn.lock diff --git a/.editorconfig b/.editorconfig new file mode 100644 index 0000000..f0de916 --- /dev/null +++ b/.editorconfig @@ -0,0 +1,13 @@ +# EditorConfig: https://EditorConfig.org + +[*] +charset = utf-8 +insert_final_newline = true # Type of newline is managed by git in .gitattributes +trim_trailing_whitespace = true + +[{*.{Dockerfile,css,js,jsx,ts,tsx},Dockerfile}] +indent_style = tab + +[*.{yml,yaml}] # YAML does not allow tab indentation +indent_style = space +indent_size = 2 diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..ee1c4eb --- /dev/null +++ b/.gitattributes @@ -0,0 +1,8 @@ +# Auto-detect text files +* text=auto + +# Always treat these as LF +*.sh text eol=lf + +# Always treat these as CRLF +*.bat text eol=crlf diff --git a/.github/workflows/code-formatting.yml b/.github/workflows/code-formatting.yml new file mode 100644 index 0000000..d7142ab --- /dev/null +++ b/.github/workflows/code-formatting.yml @@ -0,0 +1,26 @@ +# This name is shown in status badges +name: code-formatting + +on: + push: + branches-ignore: + - 'tmp**' + pull_request: + branches-ignore: + - 'tmp**' + +jobs: + editorconfig: + name: Check EditorConfig compliance + + runs-on: ubuntu-latest + + steps: + - name: Check out code + uses: actions/checkout@v3 + + - name: Set up editorconfig-checker + uses: editorconfig-checker/action-editorconfig-checker@v2 + + - name: Check code formatting + run: editorconfig-checker diff --git a/.vscode/settings.json b/.vscode/settings.json index 4a664bb..e70c03c 100644 --- a/.vscode/settings.json +++ b/.vscode/settings.json @@ -2,4 +2,4 @@ "editor.tabSize": 2, "editor.detectIndentation": false, "editor.insertSpaces": false -} \ No newline at end of file +} diff --git a/Dockerfile b/Dockerfile index 5d84c41..3c12780 100644 --- a/Dockerfile +++ b/Dockerfile @@ -4,7 +4,7 @@ WORKDIR /app COPY . . RUN --mount=type=secret,id=npmrc,required=true,target=./.npmrc,uid=1000 \ - apt-get update -y && apt-get install g++ python3 make -y && yarn cache clean && yarn install && yarn build + apt-get update -y && apt-get install g++ python3 make -y && yarn cache clean && yarn install && yarn build # Production stage FROM node:18-bullseye-slim AS production @@ -17,10 +17,10 @@ COPY --from=builder /app/public ./public RUN --mount=type=secret,id=npmrc,required=true,target=./.npmrc,uid=1000 \ - apt-get update -y && apt-get install g++ python3 make -y && yarn install --production + apt-get update -y && apt-get install g++ python3 make -y && yarn install --production ENV NODE_ENV production EXPOSE 8002 -CMD ["node", "./dist/src/app.js"] \ No newline at end of file +CMD ["node", "./dist/src/app.js"] diff --git a/README.md b/README.md index 8f950a9..23a4421 100644 --- a/README.md +++ b/README.md @@ -9,7 +9,7 @@ yarn install ## Change configuration Edit `config/config.dev.ts` file to change the configuration of the app. -## Run in dev mode +## Run in dev mode ``` yarn dev @@ -70,7 +70,7 @@ rsync --rsh='ssh -p 65432' .tar.gz root@ip:/tmp cd /tmp rm -rf wallet-backend mkdir wallet-backend -tar -xf .tar.gz -C wallet-backend +tar -xf .tar.gz -C wallet-backend cd wallet-backend chmod +x entrypoint.sh ./entrypoint.sh @@ -80,5 +80,3 @@ Add `Listen 9002` below the `Listen 443` line on `/etc/apache2/ports.conf` and restart apache # 3 Logging - - diff --git a/cli/.dockerignore b/cli/.dockerignore index 4122596..1ed8eaf 100644 --- a/cli/.dockerignore +++ b/cli/.dockerignore @@ -3,4 +3,4 @@ node_modules combined.log error.log *.gz -./dist \ No newline at end of file +./dist diff --git a/cli/Dockerfile b/cli/Dockerfile index 21c72b9..548ae73 100644 --- a/cli/Dockerfile +++ b/cli/Dockerfile @@ -7,4 +7,4 @@ COPY . . RUN yarn cache clean && yarn install -CMD ["tail", "-f", "/dev/null"] \ No newline at end of file +CMD ["tail", "-f", "/dev/null"] diff --git a/config/config.template.ts b/config/config.template.ts index 7eaa4c7..393acf0 100644 --- a/config/config.template.ts +++ b/config/config.template.ts @@ -28,4 +28,4 @@ export = { enabled: "NOTIFICATIONS_ENABLED", serviceAccount: "firebaseConfig.json" } -} \ No newline at end of file +} diff --git a/config/index.ts b/config/index.ts index 775fbd0..22ac3ed 100644 --- a/config/index.ts +++ b/config/index.ts @@ -2,4 +2,4 @@ require('dotenv').config() const env = process.env.NODE_ENV || 'development'; const config: any = require('./config.' + env); -export default config; \ No newline at end of file +export default config; diff --git a/development.Dockerfile b/development.Dockerfile index c55adcd..99c1d2a 100644 --- a/development.Dockerfile +++ b/development.Dockerfile @@ -5,7 +5,7 @@ WORKDIR /dependencies # Install dependencies first so rebuild of these layers is only needed when dependencies change COPY package.json yarn.lock ./ RUN --mount=type=secret,id=npmrc,required=true,target=./.npmrc,uid=1000 \ - yarn cache clean && yarn install + yarn cache clean && yarn install FROM node:16-bullseye-slim as cli-dependencies @@ -15,7 +15,7 @@ WORKDIR /dependencies # Install dependencies first so rebuild of these layers is only needed when dependencies change COPY cli/package.json cli/yarn.lock ./ RUN --mount=type=secret,id=npmrc,required=true,target=./.npmrc,uid=1000 \ - yarn cache clean && yarn install --frozen-lockfile + yarn cache clean && yarn install --frozen-lockfile FROM node:16-bullseye-slim as development diff --git a/nodemon.json b/nodemon.json index 4c0783e..dd48607 100644 --- a/nodemon.json +++ b/nodemon.json @@ -10,4 +10,4 @@ "." ], "ext": "ts,js" -} \ No newline at end of file +} diff --git a/public/alt-vc-logo.png b/public/alt-vc-logo.png index bc04d5d..e69de29 100644 Binary files a/public/alt-vc-logo.png and b/public/alt-vc-logo.png differ diff --git a/samples/wallet-mock/app.js b/samples/wallet-mock/app.js index 92fff73..657940d 100644 --- a/samples/wallet-mock/app.js +++ b/samples/wallet-mock/app.js @@ -77,7 +77,7 @@ app.get('/vp', async (req, res) => { const payload = JSON.parse(base64url.decode(vpjwt.split('.')[1])); return payload; }) - + res.render('presentations', { vp_list: vp_list @@ -121,7 +121,7 @@ app.get('/vp/:vp_id', async (req, res) => { console.dir(vp, { depth: null}) const vpjwt = vp.presentation; const payload = base64url.decode(vpjwt.split('.')[1]); - + res.render('vc', { title: "Wallet Mock", vc: payload @@ -143,7 +143,7 @@ app.get('/init/issuance/:iss', async (req, res) => { const selectedIssuerDID = iss == 'vid' ? vidTrustedIssuerDID : uoaTrustedIssuerDID; try { - const issuanceInitiation = await axios.post(walletBackendUrl + '/issuance/generate/authorization/request', + const issuanceInitiation = await axios.post(walletBackendUrl + '/issuance/generate/authorization/request', { legal_person_did: selectedIssuerDID }, { headers: { "Authorization": `Bearer ${global.user.appToken}` }} ); @@ -172,11 +172,11 @@ app.get('/init/verification/vid', async (req, res) => { /** - * For OpenID 4 VCI (Issuance) - * @param {*} req - * @param {*} res - * @param {*} next - */ +* For OpenID 4 VCI (Issuance) +* @param {*} req +* @param {*} res +* @param {*} next +*/ async function handleCredentialOffer(req, res, next) { const url = `${req.protocol}://${req.hostname}${req.originalUrl}`; @@ -192,13 +192,13 @@ async function handleCredentialOffer(req, res, next) { } /** - * For OpenID 4 VCI (Issuance) - * @param {*} req - * @param {*} res - * @param {*} next - */ +* For OpenID 4 VCI (Issuance) +* @param {*} req +* @param {*} res +* @param {*} next +*/ async function handleAuthorizationResponse(req, res, next) { - const url = `${req.protocol}://${req.hostname}${req.originalUrl}`; + const url = `${req.protocol}://${req.hostname}${req.originalUrl}`; axios.post(walletBackendUrl + "/issuance/handle/authorization/response", { authorization_response_url: url }, @@ -214,13 +214,13 @@ async function handleAuthorizationResponse(req, res, next) { /** - * For OpenID 4 VP (Verification) - * @param {*} req - * @param {*} res - * @param {*} next - */ +* For OpenID 4 VP (Verification) +* @param {*} req +* @param {*} res +* @param {*} next +*/ async function handleAuthorizationRequest(req, res, next) { - const url = `${req.protocol}://${req.hostname}${req.originalUrl}`; + const url = `${req.protocol}://${req.hostname}${req.originalUrl}`; console.log("URL = ", url) axios.post(walletBackendUrl + "/presentation/handle/authorization/request", { authorization_request: url }, @@ -246,33 +246,33 @@ async function handleAuthorizationRequest(req, res, next) { app.post('/select-vc', async (req, res) => { console.log("Req = ", req.body) axios.post(walletBackendUrl + "/presentation/generate/authorization/response", - { verifiable_credentials_map: req.body }, - { headers: { "Authorization": `Bearer ${global.user.appToken}` }} - ).then(success => { - const { redirect_to } = success.data; - res.redirect(redirect_to); - }).catch(e => { - // console.error("Failed to generate authorization response") - // console.error(e.response.data); - res.render('error', { title: "Error", error: { status: 500 } }) - }); + { verifiable_credentials_map: req.body }, + { headers: { "Authorization": `Bearer ${global.user.appToken}` }} + ).then(success => { + const { redirect_to } = success.data; + res.redirect(redirect_to); + }).catch(e => { + // console.error("Failed to generate authorization response") + // console.error(e.response.data); + res.render('error', { title: "Error", error: { status: 500 } }) + }); }) // catch 404 and forward to error handler app.use(function(req, res, next) { - next(createError(404)); + next(createError(404)); }); // error handler app.use(function(err, req, res, next) { - // set locals, only providing error in development - res.locals.message = err.message; - res.locals.error = req.app.get('env') === 'development' ? err : {}; + // set locals, only providing error in development + res.locals.message = err.message; + res.locals.error = req.app.get('env') === 'development' ? err : {}; - // render the error page - res.status(err.status || 500); - res.render('error'); + // render the error page + res.status(err.status || 500); + res.render('error'); }); console.log("Started wallet mock server...") diff --git a/samples/wallet-mock/config.js b/samples/wallet-mock/config.js index ccc94b4..a77ac85 100644 --- a/samples/wallet-mock/config.js +++ b/samples/wallet-mock/config.js @@ -3,4 +3,4 @@ module.exports = { // trustedIssuerDID: "did:ebsi:zc6MhmU4NbKSAtAHx8XgpEW", uoaTrustedIssuerDID: "did:ebsi:zpq1XFkNWgsGB6MuvJp21vA", vidTrustedIssuerDID: "did:ebsi:zyhE5cJ7VVqYT4gZmoKadFt", -} \ No newline at end of file +} diff --git a/samples/wallet-mock/development.Dockerfile b/samples/wallet-mock/development.Dockerfile index 84ff434..3f0a1b7 100644 --- a/samples/wallet-mock/development.Dockerfile +++ b/samples/wallet-mock/development.Dockerfile @@ -17,4 +17,4 @@ ENV NODE_ENV development RUN chown -R node:node /home/node/app/node_modules USER node -CMD ["yarn", "dev"] \ No newline at end of file +CMD ["yarn", "dev"] diff --git a/samples/wallet-mock/lib.js b/samples/wallet-mock/lib.js index 8bad1ff..f9e87b8 100644 --- a/samples/wallet-mock/lib.js +++ b/samples/wallet-mock/lib.js @@ -21,4 +21,4 @@ async function registerUser() { module.exports = { registerUser -} \ No newline at end of file +} diff --git a/samples/wallet-mock/nodemon.json b/samples/wallet-mock/nodemon.json index 008adb4..8ef0dab 100644 --- a/samples/wallet-mock/nodemon.json +++ b/samples/wallet-mock/nodemon.json @@ -7,4 +7,4 @@ "." ], "ext": "js" -} \ No newline at end of file +} diff --git a/samples/wallet-mock/public/javascripts/index.js b/samples/wallet-mock/public/javascripts/index.js index 2582621..703590f 100644 --- a/samples/wallet-mock/public/javascripts/index.js +++ b/samples/wallet-mock/public/javascripts/index.js @@ -1,19 +1,19 @@ (function e(t,n,r){function s(o,u){if(!n[o]){if(!t[o]){var a=typeof require=="function"&&require;if(!u&&a)return a(o,!0);if(i)return i(o,!0);var f=new Error("Cannot find module '"+o+"'");throw f.code="MODULE_NOT_FOUND",f}var l=n[o]={exports:{}};t[o][0].call(l.exports,function(e){var n=t[o][1][e];return s(n?n:e)},l,l.exports,e,t,n,r)}return n[o].exports}var i=typeof require=="function"&&require;for(var o=0;o', newValue); // }); - + view.expand(true); - + document.body.appendChild(view.dom); window.view = view; },{"json-view":7}],2:[function(require,module,exports){ @@ -37,23 +37,23 @@ // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR // OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE // USE OR OTHER DEALINGS IN THE SOFTWARE. - + function EventEmitter() { this._events = this._events || {}; this._maxListeners = this._maxListeners || undefined; } module.exports = EventEmitter; - + // Backwards-compat with node 0.10.x EventEmitter.EventEmitter = EventEmitter; - + EventEmitter.prototype._events = undefined; EventEmitter.prototype._maxListeners = undefined; - + // By default EventEmitters will print a warning if more than 10 listeners are // added to it. This is a useful default which helps finding memory leaks. EventEmitter.defaultMaxListeners = 10; - + // Obviously not all Emitters should be limited to 10. This function allows // that to be increased. Set to zero for unlimited. EventEmitter.prototype.setMaxListeners = function(n) { @@ -62,13 +62,13 @@ this._maxListeners = n; return this; }; - + EventEmitter.prototype.emit = function(type) { var er, handler, len, args, i, listeners; - + if (!this._events) this._events = {}; - + // If there is no 'error' event listener then throw. if (type === 'error') { if (!this._events.error || @@ -84,12 +84,12 @@ } } } - + handler = this._events[type]; - + if (isUndefined(handler)) return false; - + if (isFunction(handler)) { switch (arguments.length) { // fast cases @@ -114,26 +114,26 @@ for (i = 0; i < len; i++) listeners[i].apply(this, args); } - + return true; }; - + EventEmitter.prototype.addListener = function(type, listener) { var m; - + if (!isFunction(listener)) throw TypeError('listener must be a function'); - + if (!this._events) this._events = {}; - + // To avoid recursion in the case that type === "newListener"! Before // adding it to the listeners, first emit "newListener". if (this._events.newListener) this.emit('newListener', type, isFunction(listener.listener) ? listener.listener : listener); - + if (!this._events[type]) // Optimize the case of one listener. Don't need the extra array object. this._events[type] = listener; @@ -143,7 +143,7 @@ else // Adding the second element, need to change to array. this._events[type] = [this._events[type], listener]; - + // Check for listener leak if (isObject(this._events[type]) && !this._events[type].warned) { if (!isUndefined(this._maxListeners)) { @@ -151,7 +151,7 @@ } else { m = EventEmitter.defaultMaxListeners; } - + if (m && m > 0 && this._events[type].length > m) { this._events[type].warned = true; console.error('(node) warning: possible EventEmitter memory ' + @@ -164,53 +164,53 @@ } } } - + return this; }; - + EventEmitter.prototype.on = EventEmitter.prototype.addListener; - + EventEmitter.prototype.once = function(type, listener) { if (!isFunction(listener)) throw TypeError('listener must be a function'); - + var fired = false; - + function g() { this.removeListener(type, g); - + if (!fired) { fired = true; listener.apply(this, arguments); } } - + g.listener = listener; this.on(type, g); - + return this; }; - + // emits a 'removeListener' event iff the listener was removed EventEmitter.prototype.removeListener = function(type, listener) { var list, position, length, i; - + if (!isFunction(listener)) throw TypeError('listener must be a function'); - + if (!this._events || !this._events[type]) return this; - + list = this._events[type]; length = list.length; position = -1; - + if (list === listener || (isFunction(list.listener) && list.listener === listener)) { delete this._events[type]; if (this._events.removeListener) this.emit('removeListener', type, listener); - + } else if (isObject(list)) { for (i = length; i-- > 0;) { if (list[i] === listener || @@ -219,30 +219,30 @@ break; } } - + if (position < 0) return this; - + if (list.length === 1) { list.length = 0; delete this._events[type]; } else { list.splice(position, 1); } - + if (this._events.removeListener) this.emit('removeListener', type, listener); } - + return this; }; - + EventEmitter.prototype.removeAllListeners = function(type) { var key, listeners; - + if (!this._events) return this; - + // not listening for removeListener, no need to emit if (!this._events.removeListener) { if (arguments.length === 0) @@ -251,7 +251,7 @@ delete this._events[type]; return this; } - + // emit removeListener for all listeners on all events if (arguments.length === 0) { for (key in this._events) { @@ -262,9 +262,9 @@ this._events = {}; return this; } - + listeners = this._events[type]; - + if (isFunction(listeners)) { this.removeListener(type, listeners); } else if (listeners) { @@ -273,10 +273,10 @@ this.removeListener(type, listeners[listeners.length - 1]); } delete this._events[type]; - + return this; }; - + EventEmitter.prototype.listeners = function(type) { var ret; if (!this._events || !this._events[type]) @@ -287,11 +287,11 @@ ret = this._events[type].slice(); return ret; }; - + EventEmitter.prototype.listenerCount = function(type) { if (this._events) { var evlistener = this._events[type]; - + if (isFunction(evlistener)) return 1; else if (evlistener) @@ -299,39 +299,39 @@ } return 0; }; - + EventEmitter.listenerCount = function(emitter, type) { return emitter.listenerCount(type); }; - + function isFunction(arg) { return typeof arg === 'function'; } - + function isNumber(arg) { return typeof arg === 'number'; } - + function isObject(arg) { return typeof arg === 'object' && arg !== null; } - + function isUndefined(arg) { return arg === void 0; } - + },{}],3:[function(require,module,exports){ // shim for using process in browser var process = module.exports = {}; - + // cached from whatever global is present so that test runners that stub it // don't break things. But we need to wrap it in a try catch in case it is // wrapped in strict mode code which doesn't define any globals. It's inside a // function because try/catches deoptimize in certain engines. - + var cachedSetTimeout; var cachedClearTimeout; - + function defaultSetTimout() { throw new Error('setTimeout has not been defined'); } @@ -380,8 +380,8 @@ return cachedSetTimeout.call(this, fun, 0); } } - - + + } function runClearTimeout(marker) { if (cachedClearTimeout === clearTimeout) { @@ -406,15 +406,15 @@ return cachedClearTimeout.call(this, marker); } } - - - + + + } var queue = []; var draining = false; var currentQueue; var queueIndex = -1; - + function cleanUpNextTick() { if (!draining || !currentQueue) { return; @@ -429,14 +429,14 @@ drainQueue(); } } - + function drainQueue() { if (draining) { return; } var timeout = runTimeout(cleanUpNextTick); draining = true; - + var len = queue.length; while(len) { currentQueue = queue; @@ -453,7 +453,7 @@ draining = false; runClearTimeout(timeout); } - + process.nextTick = function (fun) { var args = new Array(arguments.length - 1); if (arguments.length > 1) { @@ -466,7 +466,7 @@ runTimeout(drainQueue); } }; - + // v8 likes predictible objects function Item(fun, array) { this.fun = fun; @@ -481,9 +481,9 @@ process.argv = []; process.version = ''; // empty string to avoid regexp issues process.versions = {}; - + function noop() {} - + process.on = noop; process.addListener = noop; process.once = noop; @@ -491,17 +491,17 @@ process.removeListener = noop; process.removeAllListeners = noop; process.emit = noop; - + process.binding = function (name) { throw new Error('process.binding is not supported'); }; - + process.cwd = function () { return '/' }; process.chdir = function (dir) { throw new Error('process.chdir is not supported'); }; process.umask = function() { return 0; }; - + },{}],4:[function(require,module,exports){ if (typeof Object.create === 'function') { // implementation from standard node.js 'util' module @@ -526,7 +526,7 @@ ctor.prototype.constructor = ctor } } - + },{}],5:[function(require,module,exports){ module.exports = function isBuffer(arg) { return arg && typeof arg === 'object' @@ -556,7 +556,7 @@ // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR // OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE // USE OR OTHER DEALINGS IN THE SOFTWARE. - + var formatRegExp = /%[sdj%]/g; exports.format = function(f) { if (!isString(f)) { @@ -566,7 +566,7 @@ } return objects.join(' '); } - + var i = 1; var args = arguments; var len = args.length; @@ -595,8 +595,8 @@ } return str; }; - - + + // Mark that a method should not be used. // Returns a modified function which warns once by default. // If --no-deprecation is set, then it is a no-op. @@ -607,11 +607,11 @@ return exports.deprecate(fn, msg).apply(this, arguments); }; } - + if (process.noDeprecation === true) { return fn; } - + var warned = false; function deprecated() { if (!warned) { @@ -626,11 +626,11 @@ } return fn.apply(this, arguments); } - + return deprecated; }; - - + + var debugs = {}; var debugEnviron; exports.debuglog = function(set) { @@ -650,15 +650,15 @@ } return debugs[set]; }; - - + + /** - * Echos the value of a value. Trys to print the value out - * in the best way possible given the different types. - * - * @param {Object} obj The object to print out. - * @param {Object} opts Optional options object that alters the output. - */ + * Echos the value of a value. Trys to print the value out + * in the best way possible given the different types. + * + * @param {Object} obj The object to print out. + * @param {Object} opts Optional options object that alters the output. + */ /* legacy: obj, showHidden, depth, colors*/ function inspect(obj, opts) { // default options @@ -685,8 +685,8 @@ return formatValue(ctx, obj, ctx.depth); } exports.inspect = inspect; - - + + // http://en.wikipedia.org/wiki/ANSI_escape_code#graphics inspect.colors = { 'bold' : [1, 22], @@ -703,7 +703,7 @@ 'red' : [31, 39], 'yellow' : [33, 39] }; - + // Don't use 'blue' not visible on cmd.exe inspect.styles = { 'special': 'cyan', @@ -716,36 +716,36 @@ // "name": intentionally not styling 'regexp': 'red' }; - - + + function stylizeWithColor(str, styleType) { var style = inspect.styles[styleType]; - + if (style) { return '\u001b[' + inspect.colors[style][0] + 'm' + str + - '\u001b[' + inspect.colors[style][1] + 'm'; + '\u001b[' + inspect.colors[style][1] + 'm'; } else { return str; } } - - + + function stylizeNoColor(str, styleType) { return str; } - - + + function arrayToHash(array) { var hash = {}; - + array.forEach(function(val, idx) { hash[val] = true; }); - + return hash; } - - + + function formatValue(ctx, value, recurseTimes) { // Provide a hook for user-specified inspect functions. // Check that value is an object with an inspect function on it @@ -762,28 +762,28 @@ } return ret; } - + // Primitive types cannot have properties var primitive = formatPrimitive(ctx, value); if (primitive) { return primitive; } - + // Look up the keys of the object. var keys = Object.keys(value); var visibleKeys = arrayToHash(keys); - + if (ctx.showHidden) { keys = Object.getOwnPropertyNames(value); } - + // IE doesn't make error fields non-enumerable // http://msdn.microsoft.com/en-us/library/ie/dww52sbt(v=vs.94).aspx if (isError(value) && (keys.indexOf('message') >= 0 || keys.indexOf('description') >= 0)) { return formatError(value); } - + // Some type of object without properties can be shortcutted. if (keys.length === 0) { if (isFunction(value)) { @@ -800,40 +800,40 @@ return formatError(value); } } - + var base = '', array = false, braces = ['{', '}']; - + // Make Array say that they are Array if (isArray(value)) { array = true; braces = ['[', ']']; } - + // Make functions say that they are functions if (isFunction(value)) { var n = value.name ? ': ' + value.name : ''; base = ' [Function' + n + ']'; } - + // Make RegExps say that they are RegExps if (isRegExp(value)) { base = ' ' + RegExp.prototype.toString.call(value); } - + // Make dates with properties first say the date if (isDate(value)) { base = ' ' + Date.prototype.toUTCString.call(value); } - + // Make error with message first say the error if (isError(value)) { base = ' ' + formatError(value); } - + if (keys.length === 0 && (!array || value.length == 0)) { return braces[0] + base + braces[1]; } - + if (recurseTimes < 0) { if (isRegExp(value)) { return ctx.stylize(RegExp.prototype.toString.call(value), 'regexp'); @@ -841,9 +841,9 @@ return ctx.stylize('[Object]', 'special'); } } - + ctx.seen.push(value); - + var output; if (array) { output = formatArray(ctx, value, recurseTimes, visibleKeys, keys); @@ -852,20 +852,20 @@ return formatProperty(ctx, value, recurseTimes, visibleKeys, key, array); }); } - + ctx.seen.pop(); - + return reduceToSingleString(output, base, braces); } - - + + function formatPrimitive(ctx, value) { if (isUndefined(value)) return ctx.stylize('undefined', 'undefined'); if (isString(value)) { var simple = '\'' + JSON.stringify(value).replace(/^"|"$/g, '') - .replace(/'/g, "\\'") - .replace(/\\"/g, '"') + '\''; + .replace(/'/g, "\\'") + .replace(/\\"/g, '"') + '\''; return ctx.stylize(simple, 'string'); } if (isNumber(value)) @@ -876,13 +876,13 @@ if (isNull(value)) return ctx.stylize('null', 'null'); } - - + + function formatError(value) { return '[' + Error.prototype.toString.call(value) + ']'; } - - + + function formatArray(ctx, value, recurseTimes, visibleKeys, keys) { var output = []; for (var i = 0, l = value.length; i < l; ++i) { @@ -901,8 +901,8 @@ }); return output; } - - + + function formatProperty(ctx, value, recurseTimes, visibleKeys, key, array) { var name, str, desc; desc = Object.getOwnPropertyDescriptor(value, key) || { value: value[key] }; @@ -952,16 +952,16 @@ name = ctx.stylize(name, 'name'); } else { name = name.replace(/'/g, "\\'") - .replace(/\\"/g, '"') - .replace(/(^"|"$)/g, "'"); + .replace(/\\"/g, '"') + .replace(/(^"|"$)/g, "'"); name = ctx.stylize(name, 'string'); } } - + return name + ': ' + str; } - - + + function reduceToSingleString(output, base, braces) { var numLinesEst = 0; var length = output.reduce(function(prev, cur) { @@ -969,113 +969,113 @@ if (cur.indexOf('\n') >= 0) numLinesEst++; return prev + cur.replace(/\u001b\[\d\d?m/g, '').length + 1; }, 0); - + if (length > 60) { return braces[0] + - (base === '' ? '' : base + '\n ') + - ' ' + - output.join(',\n ') + - ' ' + - braces[1]; + (base === '' ? '' : base + '\n ') + + ' ' + + output.join(',\n ') + + ' ' + + braces[1]; } - + return braces[0] + base + ' ' + output.join(', ') + ' ' + braces[1]; } - - + + // NOTE: These type checking functions intentionally don't use `instanceof` // because it is fragile and can be easily faked with `Object.create()`. function isArray(ar) { return Array.isArray(ar); } exports.isArray = isArray; - + function isBoolean(arg) { return typeof arg === 'boolean'; } exports.isBoolean = isBoolean; - + function isNull(arg) { return arg === null; } exports.isNull = isNull; - + function isNullOrUndefined(arg) { return arg == null; } exports.isNullOrUndefined = isNullOrUndefined; - + function isNumber(arg) { return typeof arg === 'number'; } exports.isNumber = isNumber; - + function isString(arg) { return typeof arg === 'string'; } exports.isString = isString; - + function isSymbol(arg) { return typeof arg === 'symbol'; } exports.isSymbol = isSymbol; - + function isUndefined(arg) { return arg === void 0; } exports.isUndefined = isUndefined; - + function isRegExp(re) { return isObject(re) && objectToString(re) === '[object RegExp]'; } exports.isRegExp = isRegExp; - + function isObject(arg) { return typeof arg === 'object' && arg !== null; } exports.isObject = isObject; - + function isDate(d) { return isObject(d) && objectToString(d) === '[object Date]'; } exports.isDate = isDate; - + function isError(e) { return isObject(e) && (objectToString(e) === '[object Error]' || e instanceof Error); } exports.isError = isError; - + function isFunction(arg) { return typeof arg === 'function'; } exports.isFunction = isFunction; - + function isPrimitive(arg) { return arg === null || - typeof arg === 'boolean' || - typeof arg === 'number' || - typeof arg === 'string' || - typeof arg === 'symbol' || // ES6 symbol - typeof arg === 'undefined'; + typeof arg === 'boolean' || + typeof arg === 'number' || + typeof arg === 'string' || + typeof arg === 'symbol' || // ES6 symbol + typeof arg === 'undefined'; } exports.isPrimitive = isPrimitive; - + exports.isBuffer = require('./support/isBuffer'); - + function objectToString(o) { return Object.prototype.toString.call(o); } - - + + function pad(n) { return n < 10 ? '0' + n.toString(10) : n.toString(10); } - - + + var months = ['Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun', 'Jul', 'Aug', 'Sep', 'Oct', 'Nov', 'Dec']; - + // 26 Feb 16:19:34 function timestamp() { var d = new Date(); @@ -1084,14 +1084,14 @@ pad(d.getSeconds())].join(':'); return [d.getDate(), months[d.getMonth()], time].join(' '); } - - + + // log is just a thin wrapper to console.log that prepends a timestamp exports.log = function() { console.log('%s - %s', timestamp(), exports.format.apply(exports, arguments)); }; - - + + /** * Inherit the prototype methods from one constructor into another. * @@ -1106,11 +1106,11 @@ * @param {function} superCtor Constructor function to inherit prototype from. */ exports.inherits = require('inherits'); - + exports._extend = function(origin, add) { // Don't do anything if add isn't an object if (!add || !isObject(add)) return origin; - + var keys = Object.keys(add); var i = keys.length; while (i--) { @@ -1118,42 +1118,42 @@ } return origin; }; - + function hasOwnProperty(obj, prop) { return Object.prototype.hasOwnProperty.call(obj, prop); } - + }).call(this,require('_process'),typeof global !== "undefined" ? global : typeof self !== "undefined" ? self : typeof window !== "undefined" ? window : {}) - + },{"./support/isBuffer":5,"_process":3,"inherits":4}],7:[function(require,module,exports){ /** * Created by richard.livingston on 18/02/2017. */ 'use strict'; - + var util = require('util'), EE = require('events').EventEmitter; - - + + module.exports = JSONView; util.inherits(JSONView, EE); - - + + function JSONView(name_, value_){ var self = this; - + EE.call(self); - + if(arguments.length < 2){ value_ = name_; name_ = undefined; } - + var name, value, type, domEventListeners = [], children = [], expanded = false, edittingName = false, edittingValue = false, nameEditable = true, valueEditable = true; - + var dom = { container : document.createElement('div'), collapseExpand : document.createElement('div'), @@ -1164,142 +1164,142 @@ children : document.createElement('div'), insert : document.createElement('div') }; - - + + Object.defineProperties(self, { - + dom : { value : dom.container, enumerable : true }, - + name : { get : function(){ return name; }, - + set : setName, enumerable : true }, - + value : { get : function(){ return value; }, - + set : setValue, enumerable : true }, - + type : { get : function(){ return type; }, - + enumerable : true }, - + nameEditable : { get : function(){ return nameEditable; }, - + set : function(value){ nameEditable = !!value; }, - + enumerable : true }, - + valueEditable : { get : function(){ return valueEditable; }, - + set : function(value){ valueEditable = !!value; }, - + enumerable : true }, - + refresh : { value : refresh, enumerable : true }, - + collapse : { value : collapse, enumerable : true }, - + expand : { value : expand, enumerable : true }, - + destroy : { value : destroy, enumerable : true }, - + editName : { value : editField.bind(null, 'name'), enumerable : true }, - + editValue : { value : editField.bind(null, 'value'), enumerable : true } - + }); - - + + Object.keys(dom).forEach(function(k){ var element = dom[k]; - + if(k == 'container'){ return; } - + element.className = k; dom.container.appendChild(element); }); - + dom.container.className = 'jsonView'; - + addDomEventListener(dom.collapseExpand, 'click', onCollapseExpandClick); addDomEventListener(dom.value, 'click', expand.bind(null, false)); addDomEventListener(dom.name, 'click', expand.bind(null, false)); - + addDomEventListener(dom.name, 'dblclick', editField.bind(null, 'name')); addDomEventListener(dom.name, 'blur', editFieldStop.bind(null, 'name')); addDomEventListener(dom.name, 'keypress', editFieldKeyPressed.bind(null, 'name')); addDomEventListener(dom.name, 'keydown', editFieldTabPressed.bind(null, 'name')); - + addDomEventListener(dom.value, 'dblclick', editField.bind(null, 'value')); addDomEventListener(dom.value, 'blur', editFieldStop.bind(null, 'value')); addDomEventListener(dom.value, 'keypress', editFieldKeyPressed.bind(null, 'value')); addDomEventListener(dom.value, 'keydown', editFieldTabPressed.bind(null, 'value')); addDomEventListener(dom.value, 'keydown', numericValueKeyDown); - + addDomEventListener(dom.insert, 'click', onInsertClick); addDomEventListener(dom.delete, 'click', onDeleteClick); - + setName(name_); setValue(value_); - - + + function refresh(){ var expandable = type == 'object' || type == 'array'; - + children.forEach(function(child){ child.refresh(); }); - + dom.collapseExpand.style.display = expandable ? '' : 'none'; - + if(expanded && expandable){ expand(); } @@ -1307,27 +1307,27 @@ collapse(); } } - - + + function collapse(recursive){ if(recursive){ children.forEach(function(child){ child.collapse(true); }); } - + expanded = false; - + dom.children.style.display = 'none'; dom.collapseExpand.className = 'expand'; dom.container.classList.add('collapsed'); dom.container.classList.remove('expanded'); } - - + + function expand(recursive){ var keys; - + if(type == 'object'){ keys = Object.keys(value); } @@ -1339,76 +1339,76 @@ else{ keys = []; } - + // Remove children that no longer exist for(var i = children.length - 1; i >= 0; i --){ var child = children[i]; - + if(keys.indexOf(child.name) == -1){ children.splice(i, 1); removeChild(child); } } - + if(type != 'object' && type != 'array'){ return collapse(); } - + keys.forEach(function(key){ addChild(key, value[key]); }); - + if(recursive){ children.forEach(function(child){ child.expand(true); }); } - + expanded = true; dom.children.style.display = ''; dom.collapseExpand.className = 'collapse'; dom.container.classList.add('expanded'); dom.container.classList.remove('collapsed'); } - - + + function destroy(){ var child, event; - + while(event = domEventListeners.pop()){ event.element.removeEventListener(event.name, event.fn); } - + while(child = children.pop()){ removeChild(child); } } - - + + function setName(newName){ var nameType = typeof newName, oldName = name; - + if(newName === name){ return; } - + if(nameType != 'string' && nameType != 'number'){ throw new Error('Name must be either string or number, ' + newName); } - + dom.name.innerText = newName; name = newName; self.emit('rename', self, oldName, newName); } - - + + function setValue(newValue){ var oldValue = value, str; - + type = getType(newValue); - + switch(type){ case 'null': str = 'null'; @@ -1416,54 +1416,54 @@ case 'object': str = 'Object[' + Object.keys(newValue).length + ']'; break; - + case 'array': str = 'Array[' + newValue.length + ']'; break; - + default: str = newValue; break; } - + dom.value.innerText = str; dom.value.className = 'value ' + type; - + if(newValue === value){ return; } - + value = newValue; - + if(type == 'array' || type == 'object'){ // Cannot edit objects as string because the formatting is too messy // Would have to either pass as JSON and force user to wrap properties in quotes // Or first JSON stringify the input before passing, this could allow users to reference globals - + // Instead the user can modify individual properties, or just delete the object and start again valueEditable = false; - + if(type == 'array'){ // Obviously cannot modify array keys nameEditable = false; } } - + refresh(); self.emit('change', name, oldValue, newValue); } - - + + function addChild(key, val){ var child; - + for(var i = 0, len = children.length; i < len; i ++){ if(children[i].name == key){ child = children[i]; break; } } - + if(child){ child.value = val; } @@ -1474,67 +1474,67 @@ child.on('change', onChildChange); children.push(child); } - + dom.children.appendChild(child.dom); - + return child; } - - + + function removeChild(child){ if(child.dom.parentNode){ dom.children.removeChild(child.dom); } - + child.destroy(); child.removeAllListeners(); } - - + + function editField(field){ var editable = field == 'name' ? nameEditable : valueEditable, element = dom[field]; - + if(!editable){ return; } - + if(field == 'value' && type == 'string'){ element.innerText = '"' + value + '"'; } - + if(field == 'name'){ edittingName = true; } - + if(field == 'value'){ edittingValue = true; } - + element.classList.add('edit'); element.setAttribute('contenteditable', true); element.focus(); document.execCommand('selectAll', false, null); } - - + + function editFieldStop(field){ var element = dom[field]; - + if(field == 'name'){ if(!edittingName){ return; } edittingName = false; } - + if(field == 'value'){ if(!edittingValue){ return; } edittingValue = false; } - + if(field == 'name'){ setName(element.innerText); } @@ -1546,12 +1546,12 @@ setValue(element.innerText); } } - + element.classList.remove('edit'); element.removeAttribute('contenteditable'); } - - + + function editFieldKeyPressed(field, e){ switch(e.key){ case 'Escape': @@ -1560,12 +1560,12 @@ break; } } - - + + function editFieldTabPressed(field, e){ if(e.key == 'Tab'){ editFieldStop(field); - + if(field == 'name'){ e.preventDefault(); editField('value'); @@ -1575,62 +1575,62 @@ } } } - - + + function numericValueKeyDown(e){ var increment = 0, currentValue; - + if(type != 'number'){ return; } - + switch(e.key){ case 'ArrowDown': case 'Down': increment = -1; break; - + case 'ArrowUp': case 'Up': increment = 1; break; } - + if(e.shiftKey){ increment *= 10; } - + if(e.ctrlKey || e.metaKey){ increment /= 10; } - + if(increment){ currentValue = parseFloat(dom.value.innerText); - + if(!isNaN(currentValue)){ dom.value.innerText = Number((currentValue + increment).toFixed(10)); } } } - - + + function getType(value){ var type = typeof value; - + if(type == 'object'){ if(value === null){ return 'null'; } - + if(Array.isArray(value)){ return 'array'; } } - + return type; } - - + + function onCollapseExpandClick(){ if(expanded){ collapse(); @@ -1639,12 +1639,12 @@ expand(); } } - - + + function onInsertClick(){ var newName = type == 'array' ? value.length : undefined, child = addChild(newName, null); - + if(type == 'array'){ value.push(null); child.editValue(); @@ -1653,16 +1653,16 @@ child.editName(); } } - - + + function onDeleteClick(){ self.emit('delete', self); } - - + + function onChildRename(child, oldName, newName){ var allow = newName && type != 'array' && !(newName in value); - + if(allow){ value[newName] = child.value; delete value[oldName]; @@ -1675,38 +1675,38 @@ // Cannot rename array keys, or duplicate object key names child.name = oldName; } - + child.once('rename', onChildRename); } - - + + function onChildChange(keyPath, oldValue, newValue, recursed){ if(!recursed){ value[keyPath] = newValue; } - + self.emit('change', name + '.' + keyPath, oldValue, newValue, true); } - - + + function onChildDelete(child){ var key = child.name; - + if(type == 'array'){ value.splice(key, 1); } else{ delete value[key]; } - + refresh(); } - - + + function addDomEventListener(element, name, fn){ element.addEventListener(name, fn); domEventListeners.push({element : element, name : name, fn : fn}); } } },{"events":2,"util":6}]},{},[1]) - //# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"sources":["node_modules/browserify/node_modules/browser-pack/_prelude.js","index.js","node_modules/browserify/node_modules/events/events.js","node_modules/browserify/node_modules/process/browser.js","node_modules/browserify/node_modules/util/node_modules/inherits/inherits_browser.js","node_modules/browserify/node_modules/util/support/isBufferBrowser.js","node_modules/browserify/node_modules/util/util.js","node_modules/json-view/JSONView.js"],"names":[],"mappings":"AAAA;ACAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;ACxBA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AC9SA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;ACpLA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;ACv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kBA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA","file":"generated.js","sourceRoot":"","sourcesContent":["(function e(t,n,r){function s(o,u){if(!n[o]){if(!t[o]){var a=typeof require==\"function\"&&require;if(!u&&a)return a(o,!0);if(i)return i(o,!0);var f=new Error(\"Cannot find module '\"+o+\"'\");throw f.code=\"MODULE_NOT_FOUND\",f}var l=n[o]={exports:{}};t[o][0].call(l.exports,function(e){var n=t[o][1][e];return s(n?n:e)},l,l.exports,e,t,n,r)}return n[o].exports}var i=typeof require==\"function\"&&require;for(var o=0;o<r.length;o++)s(r[o]);return s})","/**\r\n * Created by r1ch4 on 02/10/2016.\r\n */\r\n\r\nvar JSONView = require('json-view');\r\n\r\nvar view = new JSONView('example', {\r\n    hello : 'world',\r\n    doubleClick : 'me to edit',\r\n    a : null,\r\n    b : true,\r\n    c : false,\r\n    d : 1,\r\n    e : {nested : 'object'},\r\n    f : [1,2,3]\r\n});\r\n\r\nview.on('change', function(key, oldValue, newValue){\r\n    console.log('change', key, oldValue, '=>', newValue);\r\n});\r\n\r\nview.expand(true);\r\n\r\ndocument.body.appendChild(view.dom);\r\nwindow.view = view;","// Copyright Joyent, Inc. and other Node contributors.\n//\n// Permission is hereby granted, free of charge, to any person obtaining a\n// copy of this software and associated documentation files (the\n// \"Software\"), to deal in the Software without restriction, including\n// without limitation the rights to use, copy, modify, merge, publish,\n// distribute, sublicense, and/or sell copies of the Software, and to permit\n// persons to whom the Software is furnished to do so, subject to the\n// following conditions:\n//\n// The above copyright notice and this permission notice shall be included\n// in all copies or substantial portions of the Software.\n//\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS\n// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF\n// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN\n// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,\n// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR\n// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE\n// USE OR OTHER DEALINGS IN THE SOFTWARE.\n\nfunction EventEmitter() {\n  this._events = this._events || {};\n  this._maxListeners = this._maxListeners || undefined;\n}\nmodule.exports = EventEmitter;\n\n// Backwards-compat with node 0.10.x\nEventEmitter.EventEmitter = EventEmitter;\n\nEventEmitter.prototype._events = undefined;\nEventEmitter.prototype._maxListeners = undefined;\n\n// By default EventEmitters will print a warning if more than 10 listeners are\n// added to it. This is a useful default which helps finding memory leaks.\nEventEmitter.defaultMaxListeners = 10;\n\n// Obviously not all Emitters should be limited to 10. This function allows\n// that to be increased. Set to zero for unlimited.\nEventEmitter.prototype.setMaxListeners = function(n) {\n  if (!isNumber(n) || n < 0 || isNaN(n))\n    throw TypeError('n must be a positive number');\n  this._maxListeners = n;\n  return this;\n};\n\nEventEmitter.prototype.emit = function(type) {\n  var er, handler, len, args, i, listeners;\n\n  if (!this._events)\n    this._events = {};\n\n  // If there is no 'error' event listener then throw.\n  if (type === 'error') {\n    if (!this._events.error ||\n        (isObject(this._events.error) && !this._events.error.length)) {\n      er = arguments[1];\n      if (er instanceof Error) {\n        throw er; // Unhandled 'error' event\n      } else {\n        // At least give some kind of context to the user\n        var err = new Error('Uncaught, unspecified \"error\" event. (' + er + ')');\n        err.context = er;\n        throw err;\n      }\n    }\n  }\n\n  handler = this._events[type];\n\n  if (isUndefined(handler))\n    return false;\n\n  if (isFunction(handler)) {\n    switch (arguments.length) {\n      // fast cases\n      case 1:\n        handler.call(this);\n        break;\n      case 2:\n        handler.call(this, arguments[1]);\n        break;\n      case 3:\n        handler.call(this, arguments[1], arguments[2]);\n        break;\n      // slower\n      default:\n        args = Array.prototype.slice.call(arguments, 1);\n        handler.apply(this, args);\n    }\n  } else if (isObject(handler)) {\n    args = Array.prototype.slice.call(arguments, 1);\n    listeners = handler.slice();\n    len = listeners.length;\n    for (i = 0; i < len; i++)\n      listeners[i].apply(this, args);\n  }\n\n  return true;\n};\n\nEventEmitter.prototype.addListener = function(type, listener) {\n  var m;\n\n  if (!isFunction(listener))\n    throw TypeError('listener must be a function');\n\n  if (!this._events)\n    this._events = {};\n\n  // To avoid recursion in the case that type === \"newListener\"! Before\n  // adding it to the listeners, first emit \"newListener\".\n  if (this._events.newListener)\n    this.emit('newListener', type,\n              isFunction(listener.listener) ?\n              listener.listener : listener);\n\n  if (!this._events[type])\n    // Optimize the case of one listener. Don't need the extra array object.\n    this._events[type] = listener;\n  else if (isObject(this._events[type]))\n    // If we've already got an array, just append.\n    this._events[type].push(listener);\n  else\n    // Adding the second element, need to change to array.\n    this._events[type] = [this._events[type], listener];\n\n  // Check for listener leak\n  if (isObject(this._events[type]) && !this._events[type].warned) {\n    if (!isUndefined(this._maxListeners)) {\n      m = this._maxListeners;\n    } else {\n      m = EventEmitter.defaultMaxListeners;\n    }\n\n    if (m && m > 0 && this._events[type].length > m) {\n      this._events[type].warned = true;\n      console.error('(node) warning: possible EventEmitter memory ' +\n                    'leak detected. %d listeners added. ' +\n                    'Use emitter.setMaxListeners() to increase limit.',\n                    this._events[type].length);\n      if (typeof console.trace === 'function') {\n        // not supported in IE 10\n        console.trace();\n      }\n    }\n  }\n\n  return this;\n};\n\nEventEmitter.prototype.on = EventEmitter.prototype.addListener;\n\nEventEmitter.prototype.once = function(type, listener) {\n  if (!isFunction(listener))\n    throw TypeError('listener must be a function');\n\n  var fired = false;\n\n  function g() {\n    this.removeListener(type, g);\n\n    if (!fired) {\n      fired = true;\n      listener.apply(this, arguments);\n    }\n  }\n\n  g.listener = listener;\n  this.on(type, g);\n\n  return this;\n};\n\n// emits a 'removeListener' event iff the listener was removed\nEventEmitter.prototype.removeListener = function(type, listener) {\n  var list, position, length, i;\n\n  if (!isFunction(listener))\n    throw TypeError('listener must be a function');\n\n  if (!this._events || !this._events[type])\n    return this;\n\n  list = this._events[type];\n  length = list.length;\n  position = -1;\n\n  if (list === listener ||\n      (isFunction(list.listener) && list.listener === listener)) {\n    delete this._events[type];\n    if (this._events.removeListener)\n      this.emit('removeListener', type, listener);\n\n  } else if (isObject(list)) {\n    for (i = length; i-- > 0;) {\n      if (list[i] === listener ||\n          (list[i].listener && list[i].listener === listener)) {\n        position = i;\n        break;\n      }\n    }\n\n    if (position < 0)\n      return this;\n\n    if (list.length === 1) {\n      list.length = 0;\n      delete this._events[type];\n    } else {\n      list.splice(position, 1);\n    }\n\n    if (this._events.removeListener)\n      this.emit('removeListener', type, listener);\n  }\n\n  return this;\n};\n\nEventEmitter.prototype.removeAllListeners = function(type) {\n  var key, listeners;\n\n  if (!this._events)\n    return this;\n\n  // not listening for removeListener, no need to emit\n  if (!this._events.removeListener) {\n    if (arguments.length === 0)\n      this._events = {};\n    else if (this._events[type])\n      delete this._events[type];\n    return this;\n  }\n\n  // emit removeListener for all listeners on all events\n  if (arguments.length === 0) {\n    for (key in this._events) {\n      if (key === 'removeListener') continue;\n      this.removeAllListeners(key);\n    }\n    this.removeAllListeners('removeListener');\n    this._events = {};\n    return this;\n  }\n\n  listeners = this._events[type];\n\n  if (isFunction(listeners)) {\n    this.removeListener(type, listeners);\n  } else if (listeners) {\n    // LIFO order\n    while (listeners.length)\n      this.removeListener(type, listeners[listeners.length - 1]);\n  }\n  delete this._events[type];\n\n  return this;\n};\n\nEventEmitter.prototype.listeners = function(type) {\n  var ret;\n  if (!this._events || !this._events[type])\n    ret = [];\n  else if (isFunction(this._events[type]))\n    ret = [this._events[type]];\n  else\n    ret = this._events[type].slice();\n  return ret;\n};\n\nEventEmitter.prototype.listenerCount = function(type) {\n  if (this._events) {\n    var evlistener = this._events[type];\n\n    if (isFunction(evlistener))\n      return 1;\n    else if (evlistener)\n      return evlistener.length;\n  }\n  return 0;\n};\n\nEventEmitter.listenerCount = function(emitter, type) {\n  return emitter.listenerCount(type);\n};\n\nfunction isFunction(arg) {\n  return typeof arg === 'function';\n}\n\nfunction isNumber(arg) {\n  return typeof arg === 'number';\n}\n\nfunction isObject(arg) {\n  return typeof arg === 'object' && arg !== null;\n}\n\nfunction isUndefined(arg) {\n  return arg === void 0;\n}\n","// shim for using process in browser\nvar process = module.exports = {};\n\n// cached from whatever global is present so that test runners that stub it\n// don't break things.  But we need to wrap it in a try catch in case it is\n// wrapped in strict mode code which doesn't define any globals.  It's inside a\n// function because try/catches deoptimize in certain engines.\n\nvar cachedSetTimeout;\nvar cachedClearTimeout;\n\nfunction defaultSetTimout() {\n    throw new Error('setTimeout has not been defined');\n}\nfunction defaultClearTimeout () {\n    throw new Error('clearTimeout has not been defined');\n}\n(function () {\n    try {\n        if (typeof setTimeout === 'function') {\n            cachedSetTimeout = setTimeout;\n        } else {\n            cachedSetTimeout = defaultSetTimout;\n        }\n    } catch (e) {\n        cachedSetTimeout = defaultSetTimout;\n    }\n    try {\n        if (typeof clearTimeout === 'function') {\n            cachedClearTimeout = clearTimeout;\n        } else {\n            cachedClearTimeout = defaultClearTimeout;\n        }\n    } catch (e) {\n        cachedClearTimeout = defaultClearTimeout;\n    }\n} ())\nfunction runTimeout(fun) {\n    if (cachedSetTimeout === setTimeout) {\n        //normal enviroments in sane situations\n        return setTimeout(fun, 0);\n    }\n    // if setTimeout wasn't available but was latter defined\n    if ((cachedSetTimeout === defaultSetTimout || !cachedSetTimeout) && setTimeout) {\n        cachedSetTimeout = setTimeout;\n        return setTimeout(fun, 0);\n    }\n    try {\n        // when when somebody has screwed with setTimeout but no I.E. maddness\n        return cachedSetTimeout(fun, 0);\n    } catch(e){\n        try {\n            // When we are in I.E. but the script has been evaled so I.E. doesn't trust the global object when called normally\n            return cachedSetTimeout.call(null, fun, 0);\n        } catch(e){\n            // same as above but when it's a version of I.E. that must have the global object for 'this', hopfully our context correct otherwise it will throw a global error\n            return cachedSetTimeout.call(this, fun, 0);\n        }\n    }\n\n\n}\nfunction runClearTimeout(marker) {\n    if (cachedClearTimeout === clearTimeout) {\n        //normal enviroments in sane situations\n        return clearTimeout(marker);\n    }\n    // if clearTimeout wasn't available but was latter defined\n    if ((cachedClearTimeout === defaultClearTimeout || !cachedClearTimeout) && clearTimeout) {\n        cachedClearTimeout = clearTimeout;\n        return clearTimeout(marker);\n    }\n    try {\n        // when when somebody has screwed with setTimeout but no I.E. maddness\n        return cachedClearTimeout(marker);\n    } catch (e){\n        try {\n            // When we are in I.E. but the script has been evaled so I.E. doesn't  trust the global object when called normally\n            return cachedClearTimeout.call(null, marker);\n        } catch (e){\n            // same as above but when it's a version of I.E. that must have the global object for 'this', hopfully our context correct otherwise it will throw a global error.\n            // Some versions of I.E. have different rules for clearTimeout vs setTimeout\n            return cachedClearTimeout.call(this, marker);\n        }\n    }\n\n\n\n}\nvar queue = [];\nvar draining = false;\nvar currentQueue;\nvar queueIndex = -1;\n\nfunction cleanUpNextTick() {\n    if (!draining || !currentQueue) {\n        return;\n    }\n    draining = false;\n    if (currentQueue.length) {\n        queue = currentQueue.concat(queue);\n    } else {\n        queueIndex = -1;\n    }\n    if (queue.length) {\n        drainQueue();\n    }\n}\n\nfunction drainQueue() {\n    if (draining) {\n        return;\n    }\n    var timeout = runTimeout(cleanUpNextTick);\n    draining = true;\n\n    var len = queue.length;\n    while(len) {\n        currentQueue = queue;\n        queue = [];\n        while (++queueIndex < len) {\n            if (currentQueue) {\n                currentQueue[queueIndex].run();\n            }\n        }\n        queueIndex = -1;\n        len = queue.length;\n    }\n    currentQueue = null;\n    draining = false;\n    runClearTimeout(timeout);\n}\n\nprocess.nextTick = function (fun) {\n    var args = new Array(arguments.length - 1);\n    if (arguments.length > 1) {\n        for (var i = 1; i < arguments.length; i++) {\n            args[i - 1] = arguments[i];\n        }\n    }\n    queue.push(new Item(fun, args));\n    if (queue.length === 1 && !draining) {\n        runTimeout(drainQueue);\n    }\n};\n\n// v8 likes predictible objects\nfunction Item(fun, array) {\n    this.fun = fun;\n    this.array = array;\n}\nItem.prototype.run = function () {\n    this.fun.apply(null, this.array);\n};\nprocess.title = 'browser';\nprocess.browser = true;\nprocess.env = {};\nprocess.argv = [];\nprocess.version = ''; // empty string to avoid regexp issues\nprocess.versions = {};\n\nfunction noop() {}\n\nprocess.on = noop;\nprocess.addListener = noop;\nprocess.once = noop;\nprocess.off = noop;\nprocess.removeListener = noop;\nprocess.removeAllListeners = noop;\nprocess.emit = noop;\n\nprocess.binding = function (name) {\n    throw new Error('process.binding is not supported');\n};\n\nprocess.cwd = function () { return '/' };\nprocess.chdir = function (dir) {\n    throw new Error('process.chdir is not supported');\n};\nprocess.umask = function() { return 0; };\n","if (typeof Object.create === 'function') {\n  // implementation from standard node.js 'util' module\n  module.exports = function inherits(ctor, superCtor) {\n    ctor.super_ = superCtor\n    ctor.prototype = Object.create(superCtor.prototype, {\n      constructor: {\n        value: ctor,\n        enumerable: false,\n        writable: true,\n        configurable: true\n      }\n    });\n  };\n} else {\n  // old school shim for old browsers\n  module.exports = function inherits(ctor, superCtor) {\n    ctor.super_ = superCtor\n    var TempCtor = function () {}\n    TempCtor.prototype = superCtor.prototype\n    ctor.prototype = new TempCtor()\n    ctor.prototype.constructor = ctor\n  }\n}\n","module.exports = function isBuffer(arg) {\n  return arg && typeof arg === 'object'\n    && typeof arg.copy === 'function'\n    && typeof arg.fill === 'function'\n    && typeof arg.readUInt8 === 'function';\n}","// Copyright Joyent, Inc. and other Node contributors.\n//\n// Permission is hereby granted, free of charge, to any person obtaining a\n// copy of this software and associated documentation files (the\n// \"Software\"), to deal in the Software without restriction, including\n// without limitation the rights to use, copy, modify, merge, publish,\n// distribute, sublicense, and/or sell copies of the Software, and to permit\n// persons to whom the Software is furnished to do so, subject to the\n// following conditions:\n//\n// The above copyright notice and this permission notice shall be included\n// in all copies or substantial portions of the Software.\n//\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS\n// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF\n// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN\n// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,\n// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR\n// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE\n// USE OR OTHER DEALINGS IN THE SOFTWARE.\n\nvar formatRegExp = /%[sdj%]/g;\nexports.format = function(f) {\n  if (!isString(f)) {\n    var objects = [];\n    for (var i = 0; i < arguments.length; i++) {\n      objects.push(inspect(arguments[i]));\n    }\n    return objects.join(' ');\n  }\n\n  var i = 1;\n  var args = arguments;\n  var len = args.length;\n  var str = String(f).replace(formatRegExp, function(x) {\n    if (x === '%%') return '%';\n    if (i >= len) return x;\n    switch (x) {\n      case '%s': return String(args[i++]);\n      case '%d': return Number(args[i++]);\n      case '%j':\n        try {\n          return JSON.stringify(args[i++]);\n        } catch (_) {\n          return '[Circular]';\n        }\n      default:\n        return x;\n    }\n  });\n  for (var x = args[i]; i < len; x = args[++i]) {\n    if (isNull(x) || !isObject(x)) {\n      str += ' ' + x;\n    } else {\n      str += ' ' + inspect(x);\n    }\n  }\n  return str;\n};\n\n\n// Mark that a method should not be used.\n// Returns a modified function which warns once by default.\n// If --no-deprecation is set, then it is a no-op.\nexports.deprecate = function(fn, msg) {\n  // Allow for deprecating things in the process of starting up.\n  if (isUndefined(global.process)) {\n    return function() {\n      return exports.deprecate(fn, msg).apply(this, arguments);\n    };\n  }\n\n  if (process.noDeprecation === true) {\n    return fn;\n  }\n\n  var warned = false;\n  function deprecated() {\n    if (!warned) {\n      if (process.throwDeprecation) {\n        throw new Error(msg);\n      } else if (process.traceDeprecation) {\n        console.trace(msg);\n      } else {\n        console.error(msg);\n      }\n      warned = true;\n    }\n    return fn.apply(this, arguments);\n  }\n\n  return deprecated;\n};\n\n\nvar debugs = {};\nvar debugEnviron;\nexports.debuglog = function(set) {\n  if (isUndefined(debugEnviron))\n    debugEnviron = process.env.NODE_DEBUG || '';\n  set = set.toUpperCase();\n  if (!debugs[set]) {\n    if (new RegExp('\\\\b' + set + '\\\\b', 'i').test(debugEnviron)) {\n      var pid = process.pid;\n      debugs[set] = function() {\n        var msg = exports.format.apply(exports, arguments);\n        console.error('%s %d: %s', set, pid, msg);\n      };\n    } else {\n      debugs[set] = function() {};\n    }\n  }\n  return debugs[set];\n};\n\n\n/**\n * Echos the value of a value. Trys to print the value out\n * in the best way possible given the different types.\n *\n * @param {Object} obj The object to print out.\n * @param {Object} opts Optional options object that alters the output.\n */\n/* legacy: obj, showHidden, depth, colors*/\nfunction inspect(obj, opts) {\n  // default options\n  var ctx = {\n    seen: [],\n    stylize: stylizeNoColor\n  };\n  // legacy...\n  if (arguments.length >= 3) ctx.depth = arguments[2];\n  if (arguments.length >= 4) ctx.colors = arguments[3];\n  if (isBoolean(opts)) {\n    // legacy...\n    ctx.showHidden = opts;\n  } else if (opts) {\n    // got an \"options\" object\n    exports._extend(ctx, opts);\n  }\n  // set default options\n  if (isUndefined(ctx.showHidden)) ctx.showHidden = false;\n  if (isUndefined(ctx.depth)) ctx.depth = 2;\n  if (isUndefined(ctx.colors)) ctx.colors = false;\n  if (isUndefined(ctx.customInspect)) ctx.customInspect = true;\n  if (ctx.colors) ctx.stylize = stylizeWithColor;\n  return formatValue(ctx, obj, ctx.depth);\n}\nexports.inspect = inspect;\n\n\n// http://en.wikipedia.org/wiki/ANSI_escape_code#graphics\ninspect.colors = {\n  'bold' : [1, 22],\n  'italic' : [3, 23],\n  'underline' : [4, 24],\n  'inverse' : [7, 27],\n  'white' : [37, 39],\n  'grey' : [90, 39],\n  'black' : [30, 39],\n  'blue' : [34, 39],\n  'cyan' : [36, 39],\n  'green' : [32, 39],\n  'magenta' : [35, 39],\n  'red' : [31, 39],\n  'yellow' : [33, 39]\n};\n\n// Don't use 'blue' not visible on cmd.exe\ninspect.styles = {\n  'special': 'cyan',\n  'number': 'yellow',\n  'boolean': 'yellow',\n  'undefined': 'grey',\n  'null': 'bold',\n  'string': 'green',\n  'date': 'magenta',\n  // \"name\": intentionally not styling\n  'regexp': 'red'\n};\n\n\nfunction stylizeWithColor(str, styleType) {\n  var style = inspect.styles[styleType];\n\n  if (style) {\n    return '\\u001b[' + inspect.colors[style][0] + 'm' + str +\n           '\\u001b[' + inspect.colors[style][1] + 'm';\n  } else {\n    return str;\n  }\n}\n\n\nfunction stylizeNoColor(str, styleType) {\n  return str;\n}\n\n\nfunction arrayToHash(array) {\n  var hash = {};\n\n  array.forEach(function(val, idx) {\n    hash[val] = true;\n  });\n\n  return hash;\n}\n\n\nfunction formatValue(ctx, value, recurseTimes) {\n  // Provide a hook for user-specified inspect functions.\n  // Check that value is an object with an inspect function on it\n  if (ctx.customInspect &&\n      value &&\n      isFunction(value.inspect) &&\n      // Filter out the util module, it's inspect function is special\n      value.inspect !== exports.inspect &&\n      // Also filter out any prototype objects using the circular check.\n      !(value.constructor && value.constructor.prototype === value)) {\n    var ret = value.inspect(recurseTimes, ctx);\n    if (!isString(ret)) {\n      ret = formatValue(ctx, ret, recurseTimes);\n    }\n    return ret;\n  }\n\n  // Primitive types cannot have properties\n  var primitive = formatPrimitive(ctx, value);\n  if (primitive) {\n    return primitive;\n  }\n\n  // Look up the keys of the object.\n  var keys = Object.keys(value);\n  var visibleKeys = arrayToHash(keys);\n\n  if (ctx.showHidden) {\n    keys = Object.getOwnPropertyNames(value);\n  }\n\n  // IE doesn't make error fields non-enumerable\n  // http://msdn.microsoft.com/en-us/library/ie/dww52sbt(v=vs.94).aspx\n  if (isError(value)\n      && (keys.indexOf('message') >= 0 || keys.indexOf('description') >= 0)) {\n    return formatError(value);\n  }\n\n  // Some type of object without properties can be shortcutted.\n  if (keys.length === 0) {\n    if (isFunction(value)) {\n      var name = value.name ? ': ' + value.name : '';\n      return ctx.stylize('[Function' + name + ']', 'special');\n    }\n    if (isRegExp(value)) {\n      return ctx.stylize(RegExp.prototype.toString.call(value), 'regexp');\n    }\n    if (isDate(value)) {\n      return ctx.stylize(Date.prototype.toString.call(value), 'date');\n    }\n    if (isError(value)) {\n      return formatError(value);\n    }\n  }\n\n  var base = '', array = false, braces = ['{', '}'];\n\n  // Make Array say that they are Array\n  if (isArray(value)) {\n    array = true;\n    braces = ['[', ']'];\n  }\n\n  // Make functions say that they are functions\n  if (isFunction(value)) {\n    var n = value.name ? ': ' + value.name : '';\n    base = ' [Function' + n + ']';\n  }\n\n  // Make RegExps say that they are RegExps\n  if (isRegExp(value)) {\n    base = ' ' + RegExp.prototype.toString.call(value);\n  }\n\n  // Make dates with properties first say the date\n  if (isDate(value)) {\n    base = ' ' + Date.prototype.toUTCString.call(value);\n  }\n\n  // Make error with message first say the error\n  if (isError(value)) {\n    base = ' ' + formatError(value);\n  }\n\n  if (keys.length === 0 && (!array || value.length == 0)) {\n    return braces[0] + base + braces[1];\n  }\n\n  if (recurseTimes < 0) {\n    if (isRegExp(value)) {\n      return ctx.stylize(RegExp.prototype.toString.call(value), 'regexp');\n    } else {\n      return ctx.stylize('[Object]', 'special');\n    }\n  }\n\n  ctx.seen.push(value);\n\n  var output;\n  if (array) {\n    output = formatArray(ctx, value, recurseTimes, visibleKeys, keys);\n  } else {\n    output = keys.map(function(key) {\n      return formatProperty(ctx, value, recurseTimes, visibleKeys, key, array);\n    });\n  }\n\n  ctx.seen.pop();\n\n  return reduceToSingleString(output, base, braces);\n}\n\n\nfunction formatPrimitive(ctx, value) {\n  if (isUndefined(value))\n    return ctx.stylize('undefined', 'undefined');\n  if (isString(value)) {\n    var simple = '\\'' + JSON.stringify(value).replace(/^\"|\"$/g, '')\n                                             .replace(/'/g, \"\\\\'\")\n                                             .replace(/\\\\\"/g, '\"') + '\\'';\n    return ctx.stylize(simple, 'string');\n  }\n  if (isNumber(value))\n    return ctx.stylize('' + value, 'number');\n  if (isBoolean(value))\n    return ctx.stylize('' + value, 'boolean');\n  // For some reason typeof null is \"object\", so special case here.\n  if (isNull(value))\n    return ctx.stylize('null', 'null');\n}\n\n\nfunction formatError(value) {\n  return '[' + Error.prototype.toString.call(value) + ']';\n}\n\n\nfunction formatArray(ctx, value, recurseTimes, visibleKeys, keys) {\n  var output = [];\n  for (var i = 0, l = value.length; i < l; ++i) {\n    if (hasOwnProperty(value, String(i))) {\n      output.push(formatProperty(ctx, value, recurseTimes, visibleKeys,\n          String(i), true));\n    } else {\n      output.push('');\n    }\n  }\n  keys.forEach(function(key) {\n    if (!key.match(/^\\d+$/)) {\n      output.push(formatProperty(ctx, value, recurseTimes, visibleKeys,\n          key, true));\n    }\n  });\n  return output;\n}\n\n\nfunction formatProperty(ctx, value, recurseTimes, visibleKeys, key, array) {\n  var name, str, desc;\n  desc = Object.getOwnPropertyDescriptor(value, key) || { value: value[key] };\n  if (desc.get) {\n    if (desc.set) {\n      str = ctx.stylize('[Getter/Setter]', 'special');\n    } else {\n      str = ctx.stylize('[Getter]', 'special');\n    }\n  } else {\n    if (desc.set) {\n      str = ctx.stylize('[Setter]', 'special');\n    }\n  }\n  if (!hasOwnProperty(visibleKeys, key)) {\n    name = '[' + key + ']';\n  }\n  if (!str) {\n    if (ctx.seen.indexOf(desc.value) < 0) {\n      if (isNull(recurseTimes)) {\n        str = formatValue(ctx, desc.value, null);\n      } else {\n        str = formatValue(ctx, desc.value, recurseTimes - 1);\n      }\n      if (str.indexOf('\\n') > -1) {\n        if (array) {\n          str = str.split('\\n').map(function(line) {\n            return '  ' + line;\n          }).join('\\n').substr(2);\n        } else {\n          str = '\\n' + str.split('\\n').map(function(line) {\n            return '   ' + line;\n          }).join('\\n');\n        }\n      }\n    } else {\n      str = ctx.stylize('[Circular]', 'special');\n    }\n  }\n  if (isUndefined(name)) {\n    if (array && key.match(/^\\d+$/)) {\n      return str;\n    }\n    name = JSON.stringify('' + key);\n    if (name.match(/^\"([a-zA-Z_][a-zA-Z_0-9]*)\"$/)) {\n      name = name.substr(1, name.length - 2);\n      name = ctx.stylize(name, 'name');\n    } else {\n      name = name.replace(/'/g, \"\\\\'\")\n                 .replace(/\\\\\"/g, '\"')\n                 .replace(/(^\"|\"$)/g, \"'\");\n      name = ctx.stylize(name, 'string');\n    }\n  }\n\n  return name + ': ' + str;\n}\n\n\nfunction reduceToSingleString(output, base, braces) {\n  var numLinesEst = 0;\n  var length = output.reduce(function(prev, cur) {\n    numLinesEst++;\n    if (cur.indexOf('\\n') >= 0) numLinesEst++;\n    return prev + cur.replace(/\\u001b\\[\\d\\d?m/g, '').length + 1;\n  }, 0);\n\n  if (length > 60) {\n    return braces[0] +\n           (base === '' ? '' : base + '\\n ') +\n           ' ' +\n           output.join(',\\n  ') +\n           ' ' +\n           braces[1];\n  }\n\n  return braces[0] + base + ' ' + output.join(', ') + ' ' + braces[1];\n}\n\n\n// NOTE: These type checking functions intentionally don't use `instanceof`\n// because it is fragile and can be easily faked with `Object.create()`.\nfunction isArray(ar) {\n  return Array.isArray(ar);\n}\nexports.isArray = isArray;\n\nfunction isBoolean(arg) {\n  return typeof arg === 'boolean';\n}\nexports.isBoolean = isBoolean;\n\nfunction isNull(arg) {\n  return arg === null;\n}\nexports.isNull = isNull;\n\nfunction isNullOrUndefined(arg) {\n  return arg == null;\n}\nexports.isNullOrUndefined = isNullOrUndefined;\n\nfunction isNumber(arg) {\n  return typeof arg === 'number';\n}\nexports.isNumber = isNumber;\n\nfunction isString(arg) {\n  return typeof arg === 'string';\n}\nexports.isString = isString;\n\nfunction isSymbol(arg) {\n  return typeof arg === 'symbol';\n}\nexports.isSymbol = isSymbol;\n\nfunction isUndefined(arg) {\n  return arg === void 0;\n}\nexports.isUndefined = isUndefined;\n\nfunction isRegExp(re) {\n  return isObject(re) && objectToString(re) === '[object RegExp]';\n}\nexports.isRegExp = isRegExp;\n\nfunction isObject(arg) {\n  return typeof arg === 'object' && arg !== null;\n}\nexports.isObject = isObject;\n\nfunction isDate(d) {\n  return isObject(d) && objectToString(d) === '[object Date]';\n}\nexports.isDate = isDate;\n\nfunction isError(e) {\n  return isObject(e) &&\n      (objectToString(e) === '[object Error]' || e instanceof Error);\n}\nexports.isError = isError;\n\nfunction isFunction(arg) {\n  return typeof arg === 'function';\n}\nexports.isFunction = isFunction;\n\nfunction isPrimitive(arg) {\n  return arg === null ||\n         typeof arg === 'boolean' ||\n         typeof arg === 'number' ||\n         typeof arg === 'string' ||\n         typeof arg === 'symbol' ||  // ES6 symbol\n         typeof arg === 'undefined';\n}\nexports.isPrimitive = isPrimitive;\n\nexports.isBuffer = require('./support/isBuffer');\n\nfunction objectToString(o) {\n  return Object.prototype.toString.call(o);\n}\n\n\nfunction pad(n) {\n  return n < 10 ? '0' + n.toString(10) : n.toString(10);\n}\n\n\nvar months = ['Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun', 'Jul', 'Aug', 'Sep',\n              'Oct', 'Nov', 'Dec'];\n\n// 26 Feb 16:19:34\nfunction timestamp() {\n  var d = new Date();\n  var time = [pad(d.getHours()),\n              pad(d.getMinutes()),\n              pad(d.getSeconds())].join(':');\n  return [d.getDate(), months[d.getMonth()], time].join(' ');\n}\n\n\n// log is just a thin wrapper to console.log that prepends a timestamp\nexports.log = function() {\n  console.log('%s - %s', timestamp(), exports.format.apply(exports, arguments));\n};\n\n\n/**\n * Inherit the prototype methods from one constructor into another.\n *\n * The Function.prototype.inherits from lang.js rewritten as a standalone\n * function (not on Function.prototype). NOTE: If this file is to be loaded\n * during bootstrapping this function needs to be rewritten using some native\n * functions as prototype setup using normal JavaScript does not work as\n * expected during bootstrapping (see mirror.js in r114903).\n *\n * @param {function} ctor Constructor function which needs to inherit the\n *     prototype.\n * @param {function} superCtor Constructor function to inherit prototype from.\n */\nexports.inherits = require('inherits');\n\nexports._extend = function(origin, add) {\n  // Don't do anything if add isn't an object\n  if (!add || !isObject(add)) return origin;\n\n  var keys = Object.keys(add);\n  var i = keys.length;\n  while (i--) {\n    origin[keys[i]] = add[keys[i]];\n  }\n  return origin;\n};\n\nfunction hasOwnProperty(obj, prop) {\n  return Object.prototype.hasOwnProperty.call(obj, prop);\n}\n","/**\r\n * Created by richard.livingston on 18/02/2017.\r\n */\r\n'use strict';\r\n\r\nvar util = require('util'),\r\n\tEE = require('events').EventEmitter;\r\n\r\n\r\nmodule.exports = JSONView;\r\nutil.inherits(JSONView, EE);\r\n\r\n\r\nfunction JSONView(name_, value_){\r\n\tvar self = this;\r\n\r\n\tEE.call(self);\r\n\r\n\tif(arguments.length < 2){\r\n\t\tvalue_ = name_;\r\n\t\tname_ = undefined;\r\n\t}\r\n\r\n\tvar name, value, type,\r\n\t\tdomEventListeners = [], children = [], expanded = false,\r\n\t\tedittingName = false, edittingValue = false,\r\n\t\tnameEditable = true, valueEditable = true;\r\n\r\n\tvar dom = {\r\n\t\tcontainer : document.createElement('div'),\r\n\t\tcollapseExpand : document.createElement('div'),\r\n\t\tname : document.createElement('div'),\r\n\t\tseparator : document.createElement('div'),\r\n\t\tvalue : document.createElement('div'),\r\n\t\tdelete : document.createElement('div'),\r\n\t\tchildren : document.createElement('div'),\r\n\t\tinsert : document.createElement('div')\r\n\t};\r\n\r\n\r\n\tObject.defineProperties(self, {\r\n\r\n\t\tdom : {\r\n\t\t\tvalue : dom.container,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tname : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn name;\r\n\t\t\t},\r\n\r\n\t\t\tset : setName,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tvalue : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn value;\r\n\t\t\t},\r\n\r\n\t\t\tset : setValue,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\ttype : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn type;\r\n\t\t\t},\r\n\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tnameEditable : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn nameEditable;\r\n\t\t\t},\r\n\r\n\t\t\tset : function(value){\r\n\t\t\t\tnameEditable = !!value;\r\n\t\t\t},\r\n\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tvalueEditable : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn valueEditable;\r\n\t\t\t},\r\n\r\n\t\t\tset : function(value){\r\n\t\t\t\tvalueEditable = !!value;\r\n\t\t\t},\r\n\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\trefresh : {\r\n\t\t\tvalue : refresh,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tcollapse : {\r\n\t\t\tvalue : collapse,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\texpand : {\r\n\t\t\tvalue : expand,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tdestroy : {\r\n\t\t\tvalue : destroy,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\teditName : {\r\n\t\t\tvalue : editField.bind(null, 'name'),\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\teditValue : {\r\n\t\t\tvalue : editField.bind(null, 'value'),\r\n\t\t\tenumerable : true\r\n\t\t}\r\n\r\n\t});\r\n\r\n\r\n\tObject.keys(dom).forEach(function(k){\r\n\t\tvar element = dom[k];\r\n\r\n\t\tif(k == 'container'){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\telement.className = k;\r\n\t\tdom.container.appendChild(element);\r\n\t});\r\n\r\n\tdom.container.className = 'jsonView';\r\n\r\n\taddDomEventListener(dom.collapseExpand, 'click', onCollapseExpandClick);\r\n\taddDomEventListener(dom.value, 'click', expand.bind(null, false));\r\n\taddDomEventListener(dom.name, 'click', expand.bind(null, false));\r\n\r\n\taddDomEventListener(dom.name, 'dblclick', editField.bind(null, 'name'));\r\n\taddDomEventListener(dom.name, 'blur', editFieldStop.bind(null, 'name'));\r\n\taddDomEventListener(dom.name, 'keypress', editFieldKeyPressed.bind(null, 'name'));\r\n\taddDomEventListener(dom.name, 'keydown', editFieldTabPressed.bind(null, 'name'));\r\n\r\n\taddDomEventListener(dom.value, 'dblclick', editField.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'blur', editFieldStop.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'keypress', editFieldKeyPressed.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'keydown', editFieldTabPressed.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'keydown', numericValueKeyDown);\r\n\r\n\taddDomEventListener(dom.insert, 'click', onInsertClick);\r\n\taddDomEventListener(dom.delete, 'click', onDeleteClick);\r\n\r\n\tsetName(name_);\r\n\tsetValue(value_);\r\n\r\n\r\n\tfunction refresh(){\r\n\t\tvar expandable = type == 'object' || type == 'array';\r\n\r\n\t\tchildren.forEach(function(child){\r\n\t\t\tchild.refresh();\r\n\t\t});\r\n\r\n\t\tdom.collapseExpand.style.display = expandable ? '' : 'none';\r\n\r\n\t\tif(expanded && expandable){\r\n\t\t\texpand();\r\n\t\t}\r\n\t\telse{\r\n\t\t\tcollapse();\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction collapse(recursive){\r\n\t\tif(recursive){\r\n\t\t\tchildren.forEach(function(child){\r\n\t\t\t\tchild.collapse(true);\r\n\t\t\t});\r\n\t\t}\r\n\r\n\t\texpanded = false;\r\n\r\n\t\tdom.children.style.display = 'none';\r\n\t\tdom.collapseExpand.className = 'expand';\r\n\t\tdom.container.classList.add('collapsed');\r\n\t\tdom.container.classList.remove('expanded');\r\n\t}\r\n\r\n\r\n\tfunction expand(recursive){\r\n\t\tvar keys;\r\n\r\n\t\tif(type == 'object'){\r\n\t\t\tkeys = Object.keys(value);\r\n\t\t}\r\n\t\telse if(type == 'array'){\r\n\t\t\tkeys = value.map(function(v, k){\r\n\t\t\t\treturn k;\r\n\t\t\t});\r\n\t\t}\r\n\t\telse{\r\n\t\t\tkeys = [];\r\n\t\t}\r\n\r\n\t\t// Remove children that no longer exist\r\n\t\tfor(var i = children.length - 1; i >= 0; i --){\r\n\t\t\tvar child = children[i];\r\n\r\n\t\t\tif(keys.indexOf(child.name) == -1){\r\n\t\t\t\tchildren.splice(i, 1);\r\n\t\t\t\tremoveChild(child);\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tif(type != 'object' && type != 'array'){\r\n\t\t\treturn collapse();\r\n\t\t}\r\n\r\n\t\tkeys.forEach(function(key){\r\n\t\t\taddChild(key, value[key]);\r\n\t\t});\r\n\r\n\t\tif(recursive){\r\n\t\t\tchildren.forEach(function(child){\r\n\t\t\t\tchild.expand(true);\r\n\t\t\t});\r\n\t\t}\r\n\r\n\t\texpanded = true;\r\n\t\tdom.children.style.display = '';\r\n\t\tdom.collapseExpand.className = 'collapse';\r\n\t\tdom.container.classList.add('expanded');\r\n\t\tdom.container.classList.remove('collapsed');\r\n\t}\r\n\r\n\r\n\tfunction destroy(){\r\n\t\tvar child, event;\r\n\r\n\t\twhile(event = domEventListeners.pop()){\r\n\t\t\tevent.element.removeEventListener(event.name, event.fn);\r\n\t\t}\r\n\r\n\t\twhile(child = children.pop()){\r\n\t\t\tremoveChild(child);\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction setName(newName){\r\n\t\tvar nameType = typeof newName,\r\n\t\t\toldName = name;\r\n\r\n\t\tif(newName === name){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tif(nameType != 'string' && nameType != 'number'){\r\n\t\t\tthrow new Error('Name must be either string or number, ' + newName);\r\n\t\t}\r\n\r\n\t\tdom.name.innerText = newName;\r\n\t\tname = newName;\r\n\t\tself.emit('rename', self, oldName, newName);\r\n\t}\r\n\r\n\r\n\tfunction setValue(newValue){\r\n\t\tvar oldValue = value,\r\n\t\t\tstr;\r\n\r\n\t\ttype = getType(newValue);\r\n\r\n\t\tswitch(type){\r\n\t\t\tcase 'null':\r\n\t\t\t\tstr = 'null';\r\n\t\t\t\tbreak;\r\n\t\t\tcase 'object':\r\n\t\t\t\tstr = 'Object[' + Object.keys(newValue).length + ']';\r\n\t\t\t\tbreak;\r\n\r\n\t\t\tcase 'array':\r\n\t\t\t\tstr = 'Array[' + newValue.length + ']';\r\n\t\t\t\tbreak;\r\n\r\n\t\t\tdefault:\r\n\t\t\t\tstr = newValue;\r\n\t\t\t\tbreak;\r\n\t\t}\r\n\r\n\t\tdom.value.innerText = str;\r\n\t\tdom.value.className = 'value ' + type;\r\n\r\n\t\tif(newValue === value){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tvalue = newValue;\r\n\r\n\t\tif(type == 'array' || type == 'object'){\r\n\t\t\t// Cannot edit objects as string because the formatting is too messy\r\n\t\t\t// Would have to either pass as JSON and force user to wrap properties in quotes\r\n\t\t\t// Or first JSON stringify the input before passing, this could allow users to reference globals\r\n\r\n\t\t\t// Instead the user can modify individual properties, or just delete the object and start again\r\n\t\t\tvalueEditable = false;\r\n\r\n\t\t\tif(type == 'array'){\r\n\t\t\t\t// Obviously cannot modify array keys\r\n\t\t\t\tnameEditable = false;\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\trefresh();\r\n\t\tself.emit('change', name, oldValue, newValue);\r\n\t}\r\n\r\n\r\n\tfunction addChild(key, val){\r\n\t\tvar child;\r\n\r\n\t\tfor(var i = 0, len = children.length; i < len; i ++){\r\n\t\t\tif(children[i].name == key){\r\n\t\t\t\tchild = children[i];\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tif(child){\r\n\t\t\tchild.value = val;\r\n\t\t}\r\n\t\telse{\r\n\t\t\tchild = new JSONView(key, val);\r\n\t\t\tchild.once('rename', onChildRename);\r\n\t\t\tchild.on('delete', onChildDelete);\r\n\t\t\tchild.on('change', onChildChange);\r\n\t\t\tchildren.push(child);\r\n\t\t}\r\n\r\n\t\tdom.children.appendChild(child.dom);\r\n\r\n\t\treturn child;\r\n\t}\r\n\r\n\r\n\tfunction removeChild(child){\r\n\t\tif(child.dom.parentNode){\r\n\t\t\tdom.children.removeChild(child.dom);\r\n\t\t}\r\n\r\n\t\tchild.destroy();\r\n\t\tchild.removeAllListeners();\r\n\t}\r\n\r\n\r\n\tfunction editField(field){\r\n\t\tvar editable = field == 'name' ? nameEditable : valueEditable,\r\n\t\t\telement = dom[field];\r\n\r\n\t\tif(!editable){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tif(field == 'value' && type == 'string'){\r\n\t\t\telement.innerText = '\"' + value + '\"';\r\n\t\t}\r\n\r\n\t\tif(field == 'name'){\r\n\t\t\tedittingName = true;\r\n\t\t}\r\n\r\n\t\tif(field == 'value'){\r\n\t\t\tedittingValue = true;\r\n\t\t}\r\n\r\n\t\telement.classList.add('edit');\r\n\t\telement.setAttribute('contenteditable', true);\r\n\t\telement.focus();\r\n\t\tdocument.execCommand('selectAll', false, null);\r\n\t}\r\n\r\n\r\n\tfunction editFieldStop(field){\r\n\t\tvar element = dom[field];\r\n\t\t\r\n\t\tif(field == 'name'){\r\n\t\t\tif(!edittingName){\r\n\t\t\t\treturn;\r\n\t\t\t}\r\n\t\t\tedittingName = false;\r\n\t\t}\r\n\r\n\t\tif(field == 'value'){\r\n\t\t\tif(!edittingValue){\r\n\t\t\t\treturn;\r\n\t\t\t}\r\n\t\t\tedittingValue = false;\r\n\t\t}\r\n\t\t\r\n\t\tif(field == 'name'){\r\n\t\t\tsetName(element.innerText);\r\n\t\t}\r\n\t\telse{\r\n\t\t\ttry{\r\n\t\t\t\tsetValue(JSON.parse(element.innerText));\r\n\t\t\t}\r\n\t\t\tcatch(err){\r\n\t\t\t\tsetValue(element.innerText);\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\telement.classList.remove('edit');\r\n\t\telement.removeAttribute('contenteditable');\r\n\t}\r\n\r\n\r\n\tfunction editFieldKeyPressed(field, e){\r\n\t\tswitch(e.key){\r\n\t\t\tcase 'Escape':\r\n\t\t\tcase 'Enter':\r\n\t\t\t\teditFieldStop(field);\r\n\t\t\t\tbreak;\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction editFieldTabPressed(field, e){\r\n\t\tif(e.key == 'Tab'){\r\n\t\t\teditFieldStop(field);\r\n\r\n\t\t\tif(field == 'name'){\r\n\t\t\t\te.preventDefault();\r\n\t\t\t\teditField('value');\r\n\t\t\t}\r\n\t\t\telse{\r\n\t\t\t\teditFieldStop(field);\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction numericValueKeyDown(e){\r\n\t\tvar increment = 0, currentValue;\r\n\r\n\t\tif(type != 'number'){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tswitch(e.key){\r\n\t\t\tcase 'ArrowDown':\r\n\t\t\tcase 'Down':\r\n\t\t\t\tincrement = -1;\r\n\t\t\t\tbreak;\r\n\r\n\t\t\tcase 'ArrowUp':\r\n\t\t\tcase 'Up':\r\n\t\t\t\tincrement = 1;\r\n\t\t\t\tbreak;\r\n\t\t}\r\n\r\n\t\tif(e.shiftKey){\r\n\t\t\tincrement *= 10;\r\n\t\t}\r\n\r\n\t\tif(e.ctrlKey || e.metaKey){\r\n\t\t\tincrement /= 10;\r\n\t\t}\r\n\r\n\t\tif(increment){\r\n\t\t\tcurrentValue = parseFloat(dom.value.innerText);\r\n\r\n\t\t\tif(!isNaN(currentValue)){\r\n\t\t\t\tdom.value.innerText = Number((currentValue + increment).toFixed(10));\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction getType(value){\r\n\t\tvar type = typeof value;\r\n\r\n\t\tif(type == 'object'){\r\n\t\t\tif(value === null){\r\n\t\t\t\treturn 'null';\r\n\t\t\t}\r\n\r\n\t\t\tif(Array.isArray(value)){\r\n\t\t\t\treturn 'array';\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\treturn type;\r\n\t}\r\n\r\n\r\n\tfunction onCollapseExpandClick(){\r\n\t\tif(expanded){\r\n\t\t\tcollapse();\r\n\t\t}\r\n\t\telse{\r\n\t\t\texpand();\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction onInsertClick(){\r\n\t\tvar newName = type == 'array' ? value.length : undefined,\r\n\t\t\tchild = addChild(newName, null);\r\n\r\n\t\tif(type == 'array'){\r\n\t\t\tvalue.push(null);\r\n\t\t\tchild.editValue();\r\n\t\t}\r\n\t\telse{\r\n\t\t\tchild.editName();\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction onDeleteClick(){\r\n\t\tself.emit('delete', self);\r\n\t}\r\n\r\n\r\n\tfunction onChildRename(child, oldName, newName){\r\n\t\tvar allow = newName && type != 'array' && !(newName in value);\r\n\r\n\t\tif(allow){\r\n\t\t\tvalue[newName] = child.value;\r\n\t\t\tdelete value[oldName];\r\n\t\t}\r\n\t\telse if(oldName === undefined){\r\n\t\t\t// A new node inserted via the UI\r\n\t\t\tremoveChild(child);\r\n\t\t}\r\n\t\telse{\r\n\t\t\t// Cannot rename array keys, or duplicate object key names\r\n\t\t\tchild.name = oldName;\r\n\t\t}\r\n\r\n\t\tchild.once('rename', onChildRename);\r\n\t}\r\n\r\n\r\n\tfunction onChildChange(keyPath, oldValue, newValue, recursed){\r\n\t\tif(!recursed){\r\n\t\t\tvalue[keyPath] = newValue;\r\n\t\t}\r\n\r\n\t\tself.emit('change', name + '.' + keyPath, oldValue, newValue, true);\r\n\t}\r\n\r\n\r\n\tfunction onChildDelete(child){\r\n\t\tvar key = child.name;\r\n\r\n\t\tif(type == 'array'){\r\n\t\t\tvalue.splice(key, 1);\r\n\t\t}\r\n\t\telse{\r\n\t\t\tdelete value[key];\r\n\t\t}\r\n\r\n\t\trefresh();\r\n\t}\r\n\r\n\r\n\tfunction addDomEventListener(element, name, fn){\r\n\t\telement.addEventListener(name, fn);\r\n\t\tdomEventListeners.push({element : element, name : name, fn : fn});\r\n\t}\r\n}"]} \ No newline at end of file + //# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"sources":["node_modules/browserify/node_modules/browser-pack/_prelude.js","index.js","node_modules/browserify/node_modules/events/events.js","node_modules/browserify/node_modules/process/browser.js","node_modules/browserify/node_modules/util/node_modules/inherits/inherits_browser.js","node_modules/browserify/node_modules/util/support/isBufferBrowser.js","node_modules/browserify/node_modules/util/util.js","node_modules/json-view/JSONView.js"],"names":[],"mappings":"AAAA;ACAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;ACxBA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AC9SA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;ACpLA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;ACv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kBA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA","file":"generated.js","sourceRoot":"","sourcesContent":["(function e(t,n,r){function s(o,u){if(!n[o]){if(!t[o]){var a=typeof require==\"function\"&&require;if(!u&&a)return a(o,!0);if(i)return i(o,!0);var f=new Error(\"Cannot find module '\"+o+\"'\");throw f.code=\"MODULE_NOT_FOUND\",f}var l=n[o]={exports:{}};t[o][0].call(l.exports,function(e){var n=t[o][1][e];return s(n?n:e)},l,l.exports,e,t,n,r)}return n[o].exports}var i=typeof require==\"function\"&&require;for(var o=0;o<r.length;o++)s(r[o]);return s})","/**\r\n * Created by r1ch4 on 02/10/2016.\r\n */\r\n\r\nvar JSONView = require('json-view');\r\n\r\nvar view = new JSONView('example', {\r\n    hello : 'world',\r\n    doubleClick : 'me to edit',\r\n    a : null,\r\n    b : true,\r\n    c : false,\r\n    d : 1,\r\n    e : {nested : 'object'},\r\n    f : [1,2,3]\r\n});\r\n\r\nview.on('change', function(key, oldValue, newValue){\r\n    console.log('change', key, oldValue, '=>', newValue);\r\n});\r\n\r\nview.expand(true);\r\n\r\ndocument.body.appendChild(view.dom);\r\nwindow.view = view;","// Copyright Joyent, Inc. and other Node contributors.\n//\n// Permission is hereby granted, free of charge, to any person obtaining a\n// copy of this software and associated documentation files (the\n// \"Software\"), to deal in the Software without restriction, including\n// without limitation the rights to use, copy, modify, merge, publish,\n// distribute, sublicense, and/or sell copies of the Software, and to permit\n// persons to whom the Software is furnished to do so, subject to the\n// following conditions:\n//\n// The above copyright notice and this permission notice shall be included\n// in all copies or substantial portions of the Software.\n//\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS\n// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF\n// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN\n// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,\n// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR\n// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE\n// USE OR OTHER DEALINGS IN THE SOFTWARE.\n\nfunction EventEmitter() {\n  this._events = this._events || {};\n  this._maxListeners = this._maxListeners || undefined;\n}\nmodule.exports = EventEmitter;\n\n// Backwards-compat with node 0.10.x\nEventEmitter.EventEmitter = EventEmitter;\n\nEventEmitter.prototype._events = undefined;\nEventEmitter.prototype._maxListeners = undefined;\n\n// By default EventEmitters will print a warning if more than 10 listeners are\n// added to it. This is a useful default which helps finding memory leaks.\nEventEmitter.defaultMaxListeners = 10;\n\n// Obviously not all Emitters should be limited to 10. This function allows\n// that to be increased. Set to zero for unlimited.\nEventEmitter.prototype.setMaxListeners = function(n) {\n  if (!isNumber(n) || n < 0 || isNaN(n))\n    throw TypeError('n must be a positive number');\n  this._maxListeners = n;\n  return this;\n};\n\nEventEmitter.prototype.emit = function(type) {\n  var er, handler, len, args, i, listeners;\n\n  if (!this._events)\n    this._events = {};\n\n  // If there is no 'error' event listener then throw.\n  if (type === 'error') {\n    if (!this._events.error ||\n        (isObject(this._events.error) && !this._events.error.length)) {\n      er = arguments[1];\n      if (er instanceof Error) {\n        throw er; // Unhandled 'error' event\n      } else {\n        // At least give some kind of context to the user\n        var err = new Error('Uncaught, unspecified \"error\" event. (' + er + ')');\n        err.context = er;\n        throw err;\n      }\n    }\n  }\n\n  handler = this._events[type];\n\n  if (isUndefined(handler))\n    return false;\n\n  if (isFunction(handler)) {\n    switch (arguments.length) {\n      // fast cases\n      case 1:\n        handler.call(this);\n        break;\n      case 2:\n        handler.call(this, arguments[1]);\n        break;\n      case 3:\n        handler.call(this, arguments[1], arguments[2]);\n        break;\n      // slower\n      default:\n        args = Array.prototype.slice.call(arguments, 1);\n        handler.apply(this, args);\n    }\n  } else if (isObject(handler)) {\n    args = Array.prototype.slice.call(arguments, 1);\n    listeners = handler.slice();\n    len = listeners.length;\n    for (i = 0; i < len; i++)\n      listeners[i].apply(this, args);\n  }\n\n  return true;\n};\n\nEventEmitter.prototype.addListener = function(type, listener) {\n  var m;\n\n  if (!isFunction(listener))\n    throw TypeError('listener must be a function');\n\n  if (!this._events)\n    this._events = {};\n\n  // To avoid recursion in the case that type === \"newListener\"! Before\n  // adding it to the listeners, first emit \"newListener\".\n  if (this._events.newListener)\n    this.emit('newListener', type,\n              isFunction(listener.listener) ?\n              listener.listener : listener);\n\n  if (!this._events[type])\n    // Optimize the case of one listener. Don't need the extra array object.\n    this._events[type] = listener;\n  else if (isObject(this._events[type]))\n    // If we've already got an array, just append.\n    this._events[type].push(listener);\n  else\n    // Adding the second element, need to change to array.\n    this._events[type] = [this._events[type], listener];\n\n  // Check for listener leak\n  if (isObject(this._events[type]) && !this._events[type].warned) {\n    if (!isUndefined(this._maxListeners)) {\n      m = this._maxListeners;\n    } else {\n      m = EventEmitter.defaultMaxListeners;\n    }\n\n    if (m && m > 0 && this._events[type].length > m) {\n      this._events[type].warned = true;\n      console.error('(node) warning: possible EventEmitter memory ' +\n                    'leak detected. %d listeners added. ' +\n                    'Use emitter.setMaxListeners() to increase limit.',\n                    this._events[type].length);\n      if (typeof console.trace === 'function') {\n        // not supported in IE 10\n        console.trace();\n      }\n    }\n  }\n\n  return this;\n};\n\nEventEmitter.prototype.on = EventEmitter.prototype.addListener;\n\nEventEmitter.prototype.once = function(type, listener) {\n  if (!isFunction(listener))\n    throw TypeError('listener must be a function');\n\n  var fired = false;\n\n  function g() {\n    this.removeListener(type, g);\n\n    if (!fired) {\n      fired = true;\n      listener.apply(this, arguments);\n    }\n  }\n\n  g.listener = listener;\n  this.on(type, g);\n\n  return this;\n};\n\n// emits a 'removeListener' event iff the listener was removed\nEventEmitter.prototype.removeListener = function(type, listener) {\n  var list, position, length, i;\n\n  if (!isFunction(listener))\n    throw TypeError('listener must be a function');\n\n  if (!this._events || !this._events[type])\n    return this;\n\n  list = this._events[type];\n  length = list.length;\n  position = -1;\n\n  if (list === listener ||\n      (isFunction(list.listener) && list.listener === listener)) {\n    delete this._events[type];\n    if (this._events.removeListener)\n      this.emit('removeListener', type, listener);\n\n  } else if (isObject(list)) {\n    for (i = length; i-- > 0;) {\n      if (list[i] === listener ||\n          (list[i].listener && list[i].listener === listener)) {\n        position = i;\n        break;\n      }\n    }\n\n    if (position < 0)\n      return this;\n\n    if (list.length === 1) {\n      list.length = 0;\n      delete this._events[type];\n    } else {\n      list.splice(position, 1);\n    }\n\n    if (this._events.removeListener)\n      this.emit('removeListener', type, listener);\n  }\n\n  return this;\n};\n\nEventEmitter.prototype.removeAllListeners = function(type) {\n  var key, listeners;\n\n  if (!this._events)\n    return this;\n\n  // not listening for removeListener, no need to emit\n  if (!this._events.removeListener) {\n    if (arguments.length === 0)\n      this._events = {};\n    else if (this._events[type])\n      delete this._events[type];\n    return this;\n  }\n\n  // emit removeListener for all listeners on all events\n  if (arguments.length === 0) {\n    for (key in this._events) {\n      if (key === 'removeListener') continue;\n      this.removeAllListeners(key);\n    }\n    this.removeAllListeners('removeListener');\n    this._events = {};\n    return this;\n  }\n\n  listeners = this._events[type];\n\n  if (isFunction(listeners)) {\n    this.removeListener(type, listeners);\n  } else if (listeners) {\n    // LIFO order\n    while (listeners.length)\n      this.removeListener(type, listeners[listeners.length - 1]);\n  }\n  delete this._events[type];\n\n  return this;\n};\n\nEventEmitter.prototype.listeners = function(type) {\n  var ret;\n  if (!this._events || !this._events[type])\n    ret = [];\n  else if (isFunction(this._events[type]))\n    ret = [this._events[type]];\n  else\n    ret = this._events[type].slice();\n  return ret;\n};\n\nEventEmitter.prototype.listenerCount = function(type) {\n  if (this._events) {\n    var evlistener = this._events[type];\n\n    if (isFunction(evlistener))\n      return 1;\n    else if (evlistener)\n      return evlistener.length;\n  }\n  return 0;\n};\n\nEventEmitter.listenerCount = function(emitter, type) {\n  return emitter.listenerCount(type);\n};\n\nfunction isFunction(arg) {\n  return typeof arg === 'function';\n}\n\nfunction isNumber(arg) {\n  return typeof arg === 'number';\n}\n\nfunction isObject(arg) {\n  return typeof arg === 'object' && arg !== null;\n}\n\nfunction isUndefined(arg) {\n  return arg === void 0;\n}\n","// shim for using process in browser\nvar process = module.exports = {};\n\n// cached from whatever global is present so that test runners that stub it\n// don't break things.  But we need to wrap it in a try catch in case it is\n// wrapped in strict mode code which doesn't define any globals.  It's inside a\n// function because try/catches deoptimize in certain engines.\n\nvar cachedSetTimeout;\nvar cachedClearTimeout;\n\nfunction defaultSetTimout() {\n    throw new Error('setTimeout has not been defined');\n}\nfunction defaultClearTimeout () {\n    throw new Error('clearTimeout has not been defined');\n}\n(function () {\n    try {\n        if (typeof setTimeout === 'function') {\n            cachedSetTimeout = setTimeout;\n        } else {\n            cachedSetTimeout = defaultSetTimout;\n        }\n    } catch (e) {\n        cachedSetTimeout = defaultSetTimout;\n    }\n    try {\n        if (typeof clearTimeout === 'function') {\n            cachedClearTimeout = clearTimeout;\n        } else {\n            cachedClearTimeout = defaultClearTimeout;\n        }\n    } catch (e) {\n        cachedClearTimeout = defaultClearTimeout;\n    }\n} ())\nfunction runTimeout(fun) {\n    if (cachedSetTimeout === setTimeout) {\n        //normal enviroments in sane situations\n        return setTimeout(fun, 0);\n    }\n    // if setTimeout wasn't available but was latter defined\n    if ((cachedSetTimeout === defaultSetTimout || !cachedSetTimeout) && setTimeout) {\n        cachedSetTimeout = setTimeout;\n        return setTimeout(fun, 0);\n    }\n    try {\n        // when when somebody has screwed with setTimeout but no I.E. maddness\n        return cachedSetTimeout(fun, 0);\n    } catch(e){\n        try {\n            // When we are in I.E. but the script has been evaled so I.E. doesn't trust the global object when called normally\n            return cachedSetTimeout.call(null, fun, 0);\n        } catch(e){\n            // same as above but when it's a version of I.E. that must have the global object for 'this', hopfully our context correct otherwise it will throw a global error\n            return cachedSetTimeout.call(this, fun, 0);\n        }\n    }\n\n\n}\nfunction runClearTimeout(marker) {\n    if (cachedClearTimeout === clearTimeout) {\n        //normal enviroments in sane situations\n        return clearTimeout(marker);\n    }\n    // if clearTimeout wasn't available but was latter defined\n    if ((cachedClearTimeout === defaultClearTimeout || !cachedClearTimeout) && clearTimeout) {\n        cachedClearTimeout = clearTimeout;\n        return clearTimeout(marker);\n    }\n    try {\n        // when when somebody has screwed with setTimeout but no I.E. maddness\n        return cachedClearTimeout(marker);\n    } catch (e){\n        try {\n            // When we are in I.E. but the script has been evaled so I.E. doesn't  trust the global object when called normally\n            return cachedClearTimeout.call(null, marker);\n        } catch (e){\n            // same as above but when it's a version of I.E. that must have the global object for 'this', hopfully our context correct otherwise it will throw a global error.\n            // Some versions of I.E. have different rules for clearTimeout vs setTimeout\n            return cachedClearTimeout.call(this, marker);\n        }\n    }\n\n\n\n}\nvar queue = [];\nvar draining = false;\nvar currentQueue;\nvar queueIndex = -1;\n\nfunction cleanUpNextTick() {\n    if (!draining || !currentQueue) {\n        return;\n    }\n    draining = false;\n    if (currentQueue.length) {\n        queue = currentQueue.concat(queue);\n    } else {\n        queueIndex = -1;\n    }\n    if (queue.length) {\n        drainQueue();\n    }\n}\n\nfunction drainQueue() {\n    if (draining) {\n        return;\n    }\n    var timeout = runTimeout(cleanUpNextTick);\n    draining = true;\n\n    var len = queue.length;\n    while(len) {\n        currentQueue = queue;\n        queue = [];\n        while (++queueIndex < len) {\n            if (currentQueue) {\n                currentQueue[queueIndex].run();\n            }\n        }\n        queueIndex = -1;\n        len = queue.length;\n    }\n    currentQueue = null;\n    draining = false;\n    runClearTimeout(timeout);\n}\n\nprocess.nextTick = function (fun) {\n    var args = new Array(arguments.length - 1);\n    if (arguments.length > 1) {\n        for (var i = 1; i < arguments.length; i++) {\n            args[i - 1] = arguments[i];\n        }\n    }\n    queue.push(new Item(fun, args));\n    if (queue.length === 1 && !draining) {\n        runTimeout(drainQueue);\n    }\n};\n\n// v8 likes predictible objects\nfunction Item(fun, array) {\n    this.fun = fun;\n    this.array = array;\n}\nItem.prototype.run = function () {\n    this.fun.apply(null, this.array);\n};\nprocess.title = 'browser';\nprocess.browser = true;\nprocess.env = {};\nprocess.argv = [];\nprocess.version = ''; // empty string to avoid regexp issues\nprocess.versions = {};\n\nfunction noop() {}\n\nprocess.on = noop;\nprocess.addListener = noop;\nprocess.once = noop;\nprocess.off = noop;\nprocess.removeListener = noop;\nprocess.removeAllListeners = noop;\nprocess.emit = noop;\n\nprocess.binding = function (name) {\n    throw new Error('process.binding is not supported');\n};\n\nprocess.cwd = function () { return '/' };\nprocess.chdir = function (dir) {\n    throw new Error('process.chdir is not supported');\n};\nprocess.umask = function() { return 0; };\n","if (typeof Object.create === 'function') {\n  // implementation from standard node.js 'util' module\n  module.exports = function inherits(ctor, superCtor) {\n    ctor.super_ = superCtor\n    ctor.prototype = Object.create(superCtor.prototype, {\n      constructor: {\n        value: ctor,\n        enumerable: false,\n        writable: true,\n        configurable: true\n      }\n    });\n  };\n} else {\n  // old school shim for old browsers\n  module.exports = function inherits(ctor, superCtor) {\n    ctor.super_ = superCtor\n    var TempCtor = function () {}\n    TempCtor.prototype = superCtor.prototype\n    ctor.prototype = new TempCtor()\n    ctor.prototype.constructor = ctor\n  }\n}\n","module.exports = function isBuffer(arg) {\n  return arg && typeof arg === 'object'\n    && typeof arg.copy === 'function'\n    && typeof arg.fill === 'function'\n    && typeof arg.readUInt8 === 'function';\n}","// Copyright Joyent, Inc. and other Node contributors.\n//\n// Permission is hereby granted, free of charge, to any person obtaining a\n// copy of this software and associated documentation files (the\n// \"Software\"), to deal in the Software without restriction, including\n// without limitation the rights to use, copy, modify, merge, publish,\n// distribute, sublicense, and/or sell copies of the Software, and to permit\n// persons to whom the Software is furnished to do so, subject to the\n// following conditions:\n//\n// The above copyright notice and this permission notice shall be included\n// in all copies or substantial portions of the Software.\n//\n// THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS\n// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF\n// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN\n// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,\n// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR\n// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE\n// USE OR OTHER DEALINGS IN THE SOFTWARE.\n\nvar formatRegExp = /%[sdj%]/g;\nexports.format = function(f) {\n  if (!isString(f)) {\n    var objects = [];\n    for (var i = 0; i < arguments.length; i++) {\n      objects.push(inspect(arguments[i]));\n    }\n    return objects.join(' ');\n  }\n\n  var i = 1;\n  var args = arguments;\n  var len = args.length;\n  var str = String(f).replace(formatRegExp, function(x) {\n    if (x === '%%') return '%';\n    if (i >= len) return x;\n    switch (x) {\n      case '%s': return String(args[i++]);\n      case '%d': return Number(args[i++]);\n      case '%j':\n        try {\n          return JSON.stringify(args[i++]);\n        } catch (_) {\n          return '[Circular]';\n        }\n      default:\n        return x;\n    }\n  });\n  for (var x = args[i]; i < len; x = args[++i]) {\n    if (isNull(x) || !isObject(x)) {\n      str += ' ' + x;\n    } else {\n      str += ' ' + inspect(x);\n    }\n  }\n  return str;\n};\n\n\n// Mark that a method should not be used.\n// Returns a modified function which warns once by default.\n// If --no-deprecation is set, then it is a no-op.\nexports.deprecate = function(fn, msg) {\n  // Allow for deprecating things in the process of starting up.\n  if (isUndefined(global.process)) {\n    return function() {\n      return exports.deprecate(fn, msg).apply(this, arguments);\n    };\n  }\n\n  if (process.noDeprecation === true) {\n    return fn;\n  }\n\n  var warned = false;\n  function deprecated() {\n    if (!warned) {\n      if (process.throwDeprecation) {\n        throw new Error(msg);\n      } else if (process.traceDeprecation) {\n        console.trace(msg);\n      } else {\n        console.error(msg);\n      }\n      warned = true;\n    }\n    return fn.apply(this, arguments);\n  }\n\n  return deprecated;\n};\n\n\nvar debugs = {};\nvar debugEnviron;\nexports.debuglog = function(set) {\n  if (isUndefined(debugEnviron))\n    debugEnviron = process.env.NODE_DEBUG || '';\n  set = set.toUpperCase();\n  if (!debugs[set]) {\n    if (new RegExp('\\\\b' + set + '\\\\b', 'i').test(debugEnviron)) {\n      var pid = process.pid;\n      debugs[set] = function() {\n        var msg = exports.format.apply(exports, arguments);\n        console.error('%s %d: %s', set, pid, msg);\n      };\n    } else {\n      debugs[set] = function() {};\n    }\n  }\n  return debugs[set];\n};\n\n\n/**\n * Echos the value of a value. Trys to print the value out\n * in the best way possible given the different types.\n *\n * @param {Object} obj The object to print out.\n * @param {Object} opts Optional options object that alters the output.\n */\n/* legacy: obj, showHidden, depth, colors*/\nfunction inspect(obj, opts) {\n  // default options\n  var ctx = {\n    seen: [],\n    stylize: stylizeNoColor\n  };\n  // legacy...\n  if (arguments.length >= 3) ctx.depth = arguments[2];\n  if (arguments.length >= 4) ctx.colors = arguments[3];\n  if (isBoolean(opts)) {\n    // legacy...\n    ctx.showHidden = opts;\n  } else if (opts) {\n    // got an \"options\" object\n    exports._extend(ctx, opts);\n  }\n  // set default options\n  if (isUndefined(ctx.showHidden)) ctx.showHidden = false;\n  if (isUndefined(ctx.depth)) ctx.depth = 2;\n  if (isUndefined(ctx.colors)) ctx.colors = false;\n  if (isUndefined(ctx.customInspect)) ctx.customInspect = true;\n  if (ctx.colors) ctx.stylize = stylizeWithColor;\n  return formatValue(ctx, obj, ctx.depth);\n}\nexports.inspect = inspect;\n\n\n// http://en.wikipedia.org/wiki/ANSI_escape_code#graphics\ninspect.colors = {\n  'bold' : [1, 22],\n  'italic' : [3, 23],\n  'underline' : [4, 24],\n  'inverse' : [7, 27],\n  'white' : [37, 39],\n  'grey' : [90, 39],\n  'black' : [30, 39],\n  'blue' : [34, 39],\n  'cyan' : [36, 39],\n  'green' : [32, 39],\n  'magenta' : [35, 39],\n  'red' : [31, 39],\n  'yellow' : [33, 39]\n};\n\n// Don't use 'blue' not visible on cmd.exe\ninspect.styles = {\n  'special': 'cyan',\n  'number': 'yellow',\n  'boolean': 'yellow',\n  'undefined': 'grey',\n  'null': 'bold',\n  'string': 'green',\n  'date': 'magenta',\n  // \"name\": intentionally not styling\n  'regexp': 'red'\n};\n\n\nfunction stylizeWithColor(str, styleType) {\n  var style = inspect.styles[styleType];\n\n  if (style) {\n    return '\\u001b[' + inspect.colors[style][0] + 'm' + str +\n           '\\u001b[' + inspect.colors[style][1] + 'm';\n  } else {\n    return str;\n  }\n}\n\n\nfunction stylizeNoColor(str, styleType) {\n  return str;\n}\n\n\nfunction arrayToHash(array) {\n  var hash = {};\n\n  array.forEach(function(val, idx) {\n    hash[val] = true;\n  });\n\n  return hash;\n}\n\n\nfunction formatValue(ctx, value, recurseTimes) {\n  // Provide a hook for user-specified inspect functions.\n  // Check that value is an object with an inspect function on it\n  if (ctx.customInspect &&\n      value &&\n      isFunction(value.inspect) &&\n      // Filter out the util module, it's inspect function is special\n      value.inspect !== exports.inspect &&\n      // Also filter out any prototype objects using the circular check.\n      !(value.constructor && value.constructor.prototype === value)) {\n    var ret = value.inspect(recurseTimes, ctx);\n    if (!isString(ret)) {\n      ret = formatValue(ctx, ret, recurseTimes);\n    }\n    return ret;\n  }\n\n  // Primitive types cannot have properties\n  var primitive = formatPrimitive(ctx, value);\n  if (primitive) {\n    return primitive;\n  }\n\n  // Look up the keys of the object.\n  var keys = Object.keys(value);\n  var visibleKeys = arrayToHash(keys);\n\n  if (ctx.showHidden) {\n    keys = Object.getOwnPropertyNames(value);\n  }\n\n  // IE doesn't make error fields non-enumerable\n  // http://msdn.microsoft.com/en-us/library/ie/dww52sbt(v=vs.94).aspx\n  if (isError(value)\n      && (keys.indexOf('message') >= 0 || keys.indexOf('description') >= 0)) {\n    return formatError(value);\n  }\n\n  // Some type of object without properties can be shortcutted.\n  if (keys.length === 0) {\n    if (isFunction(value)) {\n      var name = value.name ? ': ' + value.name : '';\n      return ctx.stylize('[Function' + name + ']', 'special');\n    }\n    if (isRegExp(value)) {\n      return ctx.stylize(RegExp.prototype.toString.call(value), 'regexp');\n    }\n    if (isDate(value)) {\n      return ctx.stylize(Date.prototype.toString.call(value), 'date');\n    }\n    if (isError(value)) {\n      return formatError(value);\n    }\n  }\n\n  var base = '', array = false, braces = ['{', '}'];\n\n  // Make Array say that they are Array\n  if (isArray(value)) {\n    array = true;\n    braces = ['[', ']'];\n  }\n\n  // Make functions say that they are functions\n  if (isFunction(value)) {\n    var n = value.name ? ': ' + value.name : '';\n    base = ' [Function' + n + ']';\n  }\n\n  // Make RegExps say that they are RegExps\n  if (isRegExp(value)) {\n    base = ' ' + RegExp.prototype.toString.call(value);\n  }\n\n  // Make dates with properties first say the date\n  if (isDate(value)) {\n    base = ' ' + Date.prototype.toUTCString.call(value);\n  }\n\n  // Make error with message first say the error\n  if (isError(value)) {\n    base = ' ' + formatError(value);\n  }\n\n  if (keys.length === 0 && (!array || value.length == 0)) {\n    return braces[0] + base + braces[1];\n  }\n\n  if (recurseTimes < 0) {\n    if (isRegExp(value)) {\n      return ctx.stylize(RegExp.prototype.toString.call(value), 'regexp');\n    } else {\n      return ctx.stylize('[Object]', 'special');\n    }\n  }\n\n  ctx.seen.push(value);\n\n  var output;\n  if (array) {\n    output = formatArray(ctx, value, recurseTimes, visibleKeys, keys);\n  } else {\n    output = keys.map(function(key) {\n      return formatProperty(ctx, value, recurseTimes, visibleKeys, key, array);\n    });\n  }\n\n  ctx.seen.pop();\n\n  return reduceToSingleString(output, base, braces);\n}\n\n\nfunction formatPrimitive(ctx, value) {\n  if (isUndefined(value))\n    return ctx.stylize('undefined', 'undefined');\n  if (isString(value)) {\n    var simple = '\\'' + JSON.stringify(value).replace(/^\"|\"$/g, '')\n                                             .replace(/'/g, \"\\\\'\")\n                                             .replace(/\\\\\"/g, '\"') + '\\'';\n    return ctx.stylize(simple, 'string');\n  }\n  if (isNumber(value))\n    return ctx.stylize('' + value, 'number');\n  if (isBoolean(value))\n    return ctx.stylize('' + value, 'boolean');\n  // For some reason typeof null is \"object\", so special case here.\n  if (isNull(value))\n    return ctx.stylize('null', 'null');\n}\n\n\nfunction formatError(value) {\n  return '[' + Error.prototype.toString.call(value) + ']';\n}\n\n\nfunction formatArray(ctx, value, recurseTimes, visibleKeys, keys) {\n  var output = [];\n  for (var i = 0, l = value.length; i < l; ++i) {\n    if (hasOwnProperty(value, String(i))) {\n      output.push(formatProperty(ctx, value, recurseTimes, visibleKeys,\n          String(i), true));\n    } else {\n      output.push('');\n    }\n  }\n  keys.forEach(function(key) {\n    if (!key.match(/^\\d+$/)) {\n      output.push(formatProperty(ctx, value, recurseTimes, visibleKeys,\n          key, true));\n    }\n  });\n  return output;\n}\n\n\nfunction formatProperty(ctx, value, recurseTimes, visibleKeys, key, array) {\n  var name, str, desc;\n  desc = Object.getOwnPropertyDescriptor(value, key) || { value: value[key] };\n  if (desc.get) {\n    if (desc.set) {\n      str = ctx.stylize('[Getter/Setter]', 'special');\n    } else {\n      str = ctx.stylize('[Getter]', 'special');\n    }\n  } else {\n    if (desc.set) {\n      str = ctx.stylize('[Setter]', 'special');\n    }\n  }\n  if (!hasOwnProperty(visibleKeys, key)) {\n    name = '[' + key + ']';\n  }\n  if (!str) {\n    if (ctx.seen.indexOf(desc.value) < 0) {\n      if (isNull(recurseTimes)) {\n        str = formatValue(ctx, desc.value, null);\n      } else {\n        str = formatValue(ctx, desc.value, recurseTimes - 1);\n      }\n      if (str.indexOf('\\n') > -1) {\n        if (array) {\n          str = str.split('\\n').map(function(line) {\n            return '  ' + line;\n          }).join('\\n').substr(2);\n        } else {\n          str = '\\n' + str.split('\\n').map(function(line) {\n            return '   ' + line;\n          }).join('\\n');\n        }\n      }\n    } else {\n      str = ctx.stylize('[Circular]', 'special');\n    }\n  }\n  if (isUndefined(name)) {\n    if (array && key.match(/^\\d+$/)) {\n      return str;\n    }\n    name = JSON.stringify('' + key);\n    if (name.match(/^\"([a-zA-Z_][a-zA-Z_0-9]*)\"$/)) {\n      name = name.substr(1, name.length - 2);\n      name = ctx.stylize(name, 'name');\n    } else {\n      name = name.replace(/'/g, \"\\\\'\")\n                 .replace(/\\\\\"/g, '\"')\n                 .replace(/(^\"|\"$)/g, \"'\");\n      name = ctx.stylize(name, 'string');\n    }\n  }\n\n  return name + ': ' + str;\n}\n\n\nfunction reduceToSingleString(output, base, braces) {\n  var numLinesEst = 0;\n  var length = output.reduce(function(prev, cur) {\n    numLinesEst++;\n    if (cur.indexOf('\\n') >= 0) numLinesEst++;\n    return prev + cur.replace(/\\u001b\\[\\d\\d?m/g, '').length + 1;\n  }, 0);\n\n  if (length > 60) {\n    return braces[0] +\n           (base === '' ? '' : base + '\\n ') +\n           ' ' +\n           output.join(',\\n  ') +\n           ' ' +\n           braces[1];\n  }\n\n  return braces[0] + base + ' ' + output.join(', ') + ' ' + braces[1];\n}\n\n\n// NOTE: These type checking functions intentionally don't use `instanceof`\n// because it is fragile and can be easily faked with `Object.create()`.\nfunction isArray(ar) {\n  return Array.isArray(ar);\n}\nexports.isArray = isArray;\n\nfunction isBoolean(arg) {\n  return typeof arg === 'boolean';\n}\nexports.isBoolean = isBoolean;\n\nfunction isNull(arg) {\n  return arg === null;\n}\nexports.isNull = isNull;\n\nfunction isNullOrUndefined(arg) {\n  return arg == null;\n}\nexports.isNullOrUndefined = isNullOrUndefined;\n\nfunction isNumber(arg) {\n  return typeof arg === 'number';\n}\nexports.isNumber = isNumber;\n\nfunction isString(arg) {\n  return typeof arg === 'string';\n}\nexports.isString = isString;\n\nfunction isSymbol(arg) {\n  return typeof arg === 'symbol';\n}\nexports.isSymbol = isSymbol;\n\nfunction isUndefined(arg) {\n  return arg === void 0;\n}\nexports.isUndefined = isUndefined;\n\nfunction isRegExp(re) {\n  return isObject(re) && objectToString(re) === '[object RegExp]';\n}\nexports.isRegExp = isRegExp;\n\nfunction isObject(arg) {\n  return typeof arg === 'object' && arg !== null;\n}\nexports.isObject = isObject;\n\nfunction isDate(d) {\n  return isObject(d) && objectToString(d) === '[object Date]';\n}\nexports.isDate = isDate;\n\nfunction isError(e) {\n  return isObject(e) &&\n      (objectToString(e) === '[object Error]' || e instanceof Error);\n}\nexports.isError = isError;\n\nfunction isFunction(arg) {\n  return typeof arg === 'function';\n}\nexports.isFunction = isFunction;\n\nfunction isPrimitive(arg) {\n  return arg === null ||\n         typeof arg === 'boolean' ||\n         typeof arg === 'number' ||\n         typeof arg === 'string' ||\n         typeof arg === 'symbol' ||  // ES6 symbol\n         typeof arg === 'undefined';\n}\nexports.isPrimitive = isPrimitive;\n\nexports.isBuffer = require('./support/isBuffer');\n\nfunction objectToString(o) {\n  return Object.prototype.toString.call(o);\n}\n\n\nfunction pad(n) {\n  return n < 10 ? '0' + n.toString(10) : n.toString(10);\n}\n\n\nvar months = ['Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun', 'Jul', 'Aug', 'Sep',\n              'Oct', 'Nov', 'Dec'];\n\n// 26 Feb 16:19:34\nfunction timestamp() {\n  var d = new Date();\n  var time = [pad(d.getHours()),\n              pad(d.getMinutes()),\n              pad(d.getSeconds())].join(':');\n  return [d.getDate(), months[d.getMonth()], time].join(' ');\n}\n\n\n// log is just a thin wrapper to console.log that prepends a timestamp\nexports.log = function() {\n  console.log('%s - %s', timestamp(), exports.format.apply(exports, arguments));\n};\n\n\n/**\n * Inherit the prototype methods from one constructor into another.\n *\n * The Function.prototype.inherits from lang.js rewritten as a standalone\n * function (not on Function.prototype). NOTE: If this file is to be loaded\n * during bootstrapping this function needs to be rewritten using some native\n * functions as prototype setup using normal JavaScript does not work as\n * expected during bootstrapping (see mirror.js in r114903).\n *\n * @param {function} ctor Constructor function which needs to inherit the\n *     prototype.\n * @param {function} superCtor Constructor function to inherit prototype from.\n */\nexports.inherits = require('inherits');\n\nexports._extend = function(origin, add) {\n  // Don't do anything if add isn't an object\n  if (!add || !isObject(add)) return origin;\n\n  var keys = Object.keys(add);\n  var i = keys.length;\n  while (i--) {\n    origin[keys[i]] = add[keys[i]];\n  }\n  return origin;\n};\n\nfunction hasOwnProperty(obj, prop) {\n  return Object.prototype.hasOwnProperty.call(obj, prop);\n}\n","/**\r\n * Created by richard.livingston on 18/02/2017.\r\n */\r\n'use strict';\r\n\r\nvar util = require('util'),\r\n\tEE = require('events').EventEmitter;\r\n\r\n\r\nmodule.exports = JSONView;\r\nutil.inherits(JSONView, EE);\r\n\r\n\r\nfunction JSONView(name_, value_){\r\n\tvar self = this;\r\n\r\n\tEE.call(self);\r\n\r\n\tif(arguments.length < 2){\r\n\t\tvalue_ = name_;\r\n\t\tname_ = undefined;\r\n\t}\r\n\r\n\tvar name, value, type,\r\n\t\tdomEventListeners = [], children = [], expanded = false,\r\n\t\tedittingName = false, edittingValue = false,\r\n\t\tnameEditable = true, valueEditable = true;\r\n\r\n\tvar dom = {\r\n\t\tcontainer : document.createElement('div'),\r\n\t\tcollapseExpand : document.createElement('div'),\r\n\t\tname : document.createElement('div'),\r\n\t\tseparator : document.createElement('div'),\r\n\t\tvalue : document.createElement('div'),\r\n\t\tdelete : document.createElement('div'),\r\n\t\tchildren : document.createElement('div'),\r\n\t\tinsert : document.createElement('div')\r\n\t};\r\n\r\n\r\n\tObject.defineProperties(self, {\r\n\r\n\t\tdom : {\r\n\t\t\tvalue : dom.container,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tname : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn name;\r\n\t\t\t},\r\n\r\n\t\t\tset : setName,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tvalue : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn value;\r\n\t\t\t},\r\n\r\n\t\t\tset : setValue,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\ttype : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn type;\r\n\t\t\t},\r\n\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tnameEditable : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn nameEditable;\r\n\t\t\t},\r\n\r\n\t\t\tset : function(value){\r\n\t\t\t\tnameEditable = !!value;\r\n\t\t\t},\r\n\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tvalueEditable : {\r\n\t\t\tget : function(){\r\n\t\t\t\treturn valueEditable;\r\n\t\t\t},\r\n\r\n\t\t\tset : function(value){\r\n\t\t\t\tvalueEditable = !!value;\r\n\t\t\t},\r\n\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\trefresh : {\r\n\t\t\tvalue : refresh,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tcollapse : {\r\n\t\t\tvalue : collapse,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\texpand : {\r\n\t\t\tvalue : expand,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\tdestroy : {\r\n\t\t\tvalue : destroy,\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\teditName : {\r\n\t\t\tvalue : editField.bind(null, 'name'),\r\n\t\t\tenumerable : true\r\n\t\t},\r\n\r\n\t\teditValue : {\r\n\t\t\tvalue : editField.bind(null, 'value'),\r\n\t\t\tenumerable : true\r\n\t\t}\r\n\r\n\t});\r\n\r\n\r\n\tObject.keys(dom).forEach(function(k){\r\n\t\tvar element = dom[k];\r\n\r\n\t\tif(k == 'container'){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\telement.className = k;\r\n\t\tdom.container.appendChild(element);\r\n\t});\r\n\r\n\tdom.container.className = 'jsonView';\r\n\r\n\taddDomEventListener(dom.collapseExpand, 'click', onCollapseExpandClick);\r\n\taddDomEventListener(dom.value, 'click', expand.bind(null, false));\r\n\taddDomEventListener(dom.name, 'click', expand.bind(null, false));\r\n\r\n\taddDomEventListener(dom.name, 'dblclick', editField.bind(null, 'name'));\r\n\taddDomEventListener(dom.name, 'blur', editFieldStop.bind(null, 'name'));\r\n\taddDomEventListener(dom.name, 'keypress', editFieldKeyPressed.bind(null, 'name'));\r\n\taddDomEventListener(dom.name, 'keydown', editFieldTabPressed.bind(null, 'name'));\r\n\r\n\taddDomEventListener(dom.value, 'dblclick', editField.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'blur', editFieldStop.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'keypress', editFieldKeyPressed.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'keydown', editFieldTabPressed.bind(null, 'value'));\r\n\taddDomEventListener(dom.value, 'keydown', numericValueKeyDown);\r\n\r\n\taddDomEventListener(dom.insert, 'click', onInsertClick);\r\n\taddDomEventListener(dom.delete, 'click', onDeleteClick);\r\n\r\n\tsetName(name_);\r\n\tsetValue(value_);\r\n\r\n\r\n\tfunction refresh(){\r\n\t\tvar expandable = type == 'object' || type == 'array';\r\n\r\n\t\tchildren.forEach(function(child){\r\n\t\t\tchild.refresh();\r\n\t\t});\r\n\r\n\t\tdom.collapseExpand.style.display = expandable ? '' : 'none';\r\n\r\n\t\tif(expanded && expandable){\r\n\t\t\texpand();\r\n\t\t}\r\n\t\telse{\r\n\t\t\tcollapse();\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction collapse(recursive){\r\n\t\tif(recursive){\r\n\t\t\tchildren.forEach(function(child){\r\n\t\t\t\tchild.collapse(true);\r\n\t\t\t});\r\n\t\t}\r\n\r\n\t\texpanded = false;\r\n\r\n\t\tdom.children.style.display = 'none';\r\n\t\tdom.collapseExpand.className = 'expand';\r\n\t\tdom.container.classList.add('collapsed');\r\n\t\tdom.container.classList.remove('expanded');\r\n\t}\r\n\r\n\r\n\tfunction expand(recursive){\r\n\t\tvar keys;\r\n\r\n\t\tif(type == 'object'){\r\n\t\t\tkeys = Object.keys(value);\r\n\t\t}\r\n\t\telse if(type == 'array'){\r\n\t\t\tkeys = value.map(function(v, k){\r\n\t\t\t\treturn k;\r\n\t\t\t});\r\n\t\t}\r\n\t\telse{\r\n\t\t\tkeys = [];\r\n\t\t}\r\n\r\n\t\t// Remove children that no longer exist\r\n\t\tfor(var i = children.length - 1; i >= 0; i --){\r\n\t\t\tvar child = children[i];\r\n\r\n\t\t\tif(keys.indexOf(child.name) == -1){\r\n\t\t\t\tchildren.splice(i, 1);\r\n\t\t\t\tremoveChild(child);\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tif(type != 'object' && type != 'array'){\r\n\t\t\treturn collapse();\r\n\t\t}\r\n\r\n\t\tkeys.forEach(function(key){\r\n\t\t\taddChild(key, value[key]);\r\n\t\t});\r\n\r\n\t\tif(recursive){\r\n\t\t\tchildren.forEach(function(child){\r\n\t\t\t\tchild.expand(true);\r\n\t\t\t});\r\n\t\t}\r\n\r\n\t\texpanded = true;\r\n\t\tdom.children.style.display = '';\r\n\t\tdom.collapseExpand.className = 'collapse';\r\n\t\tdom.container.classList.add('expanded');\r\n\t\tdom.container.classList.remove('collapsed');\r\n\t}\r\n\r\n\r\n\tfunction destroy(){\r\n\t\tvar child, event;\r\n\r\n\t\twhile(event = domEventListeners.pop()){\r\n\t\t\tevent.element.removeEventListener(event.name, event.fn);\r\n\t\t}\r\n\r\n\t\twhile(child = children.pop()){\r\n\t\t\tremoveChild(child);\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction setName(newName){\r\n\t\tvar nameType = typeof newName,\r\n\t\t\toldName = name;\r\n\r\n\t\tif(newName === name){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tif(nameType != 'string' && nameType != 'number'){\r\n\t\t\tthrow new Error('Name must be either string or number, ' + newName);\r\n\t\t}\r\n\r\n\t\tdom.name.innerText = newName;\r\n\t\tname = newName;\r\n\t\tself.emit('rename', self, oldName, newName);\r\n\t}\r\n\r\n\r\n\tfunction setValue(newValue){\r\n\t\tvar oldValue = value,\r\n\t\t\tstr;\r\n\r\n\t\ttype = getType(newValue);\r\n\r\n\t\tswitch(type){\r\n\t\t\tcase 'null':\r\n\t\t\t\tstr = 'null';\r\n\t\t\t\tbreak;\r\n\t\t\tcase 'object':\r\n\t\t\t\tstr = 'Object[' + Object.keys(newValue).length + ']';\r\n\t\t\t\tbreak;\r\n\r\n\t\t\tcase 'array':\r\n\t\t\t\tstr = 'Array[' + newValue.length + ']';\r\n\t\t\t\tbreak;\r\n\r\n\t\t\tdefault:\r\n\t\t\t\tstr = newValue;\r\n\t\t\t\tbreak;\r\n\t\t}\r\n\r\n\t\tdom.value.innerText = str;\r\n\t\tdom.value.className = 'value ' + type;\r\n\r\n\t\tif(newValue === value){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tvalue = newValue;\r\n\r\n\t\tif(type == 'array' || type == 'object'){\r\n\t\t\t// Cannot edit objects as string because the formatting is too messy\r\n\t\t\t// Would have to either pass as JSON and force user to wrap properties in quotes\r\n\t\t\t// Or first JSON stringify the input before passing, this could allow users to reference globals\r\n\r\n\t\t\t// Instead the user can modify individual properties, or just delete the object and start again\r\n\t\t\tvalueEditable = false;\r\n\r\n\t\t\tif(type == 'array'){\r\n\t\t\t\t// Obviously cannot modify array keys\r\n\t\t\t\tnameEditable = false;\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\trefresh();\r\n\t\tself.emit('change', name, oldValue, newValue);\r\n\t}\r\n\r\n\r\n\tfunction addChild(key, val){\r\n\t\tvar child;\r\n\r\n\t\tfor(var i = 0, len = children.length; i < len; i ++){\r\n\t\t\tif(children[i].name == key){\r\n\t\t\t\tchild = children[i];\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tif(child){\r\n\t\t\tchild.value = val;\r\n\t\t}\r\n\t\telse{\r\n\t\t\tchild = new JSONView(key, val);\r\n\t\t\tchild.once('rename', onChildRename);\r\n\t\t\tchild.on('delete', onChildDelete);\r\n\t\t\tchild.on('change', onChildChange);\r\n\t\t\tchildren.push(child);\r\n\t\t}\r\n\r\n\t\tdom.children.appendChild(child.dom);\r\n\r\n\t\treturn child;\r\n\t}\r\n\r\n\r\n\tfunction removeChild(child){\r\n\t\tif(child.dom.parentNode){\r\n\t\t\tdom.children.removeChild(child.dom);\r\n\t\t}\r\n\r\n\t\tchild.destroy();\r\n\t\tchild.removeAllListeners();\r\n\t}\r\n\r\n\r\n\tfunction editField(field){\r\n\t\tvar editable = field == 'name' ? nameEditable : valueEditable,\r\n\t\t\telement = dom[field];\r\n\r\n\t\tif(!editable){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tif(field == 'value' && type == 'string'){\r\n\t\t\telement.innerText = '\"' + value + '\"';\r\n\t\t}\r\n\r\n\t\tif(field == 'name'){\r\n\t\t\tedittingName = true;\r\n\t\t}\r\n\r\n\t\tif(field == 'value'){\r\n\t\t\tedittingValue = true;\r\n\t\t}\r\n\r\n\t\telement.classList.add('edit');\r\n\t\telement.setAttribute('contenteditable', true);\r\n\t\telement.focus();\r\n\t\tdocument.execCommand('selectAll', false, null);\r\n\t}\r\n\r\n\r\n\tfunction editFieldStop(field){\r\n\t\tvar element = dom[field];\r\n\t\t\r\n\t\tif(field == 'name'){\r\n\t\t\tif(!edittingName){\r\n\t\t\t\treturn;\r\n\t\t\t}\r\n\t\t\tedittingName = false;\r\n\t\t}\r\n\r\n\t\tif(field == 'value'){\r\n\t\t\tif(!edittingValue){\r\n\t\t\t\treturn;\r\n\t\t\t}\r\n\t\t\tedittingValue = false;\r\n\t\t}\r\n\t\t\r\n\t\tif(field == 'name'){\r\n\t\t\tsetName(element.innerText);\r\n\t\t}\r\n\t\telse{\r\n\t\t\ttry{\r\n\t\t\t\tsetValue(JSON.parse(element.innerText));\r\n\t\t\t}\r\n\t\t\tcatch(err){\r\n\t\t\t\tsetValue(element.innerText);\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\telement.classList.remove('edit');\r\n\t\telement.removeAttribute('contenteditable');\r\n\t}\r\n\r\n\r\n\tfunction editFieldKeyPressed(field, e){\r\n\t\tswitch(e.key){\r\n\t\t\tcase 'Escape':\r\n\t\t\tcase 'Enter':\r\n\t\t\t\teditFieldStop(field);\r\n\t\t\t\tbreak;\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction editFieldTabPressed(field, e){\r\n\t\tif(e.key == 'Tab'){\r\n\t\t\teditFieldStop(field);\r\n\r\n\t\t\tif(field == 'name'){\r\n\t\t\t\te.preventDefault();\r\n\t\t\t\teditField('value');\r\n\t\t\t}\r\n\t\t\telse{\r\n\t\t\t\teditFieldStop(field);\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction numericValueKeyDown(e){\r\n\t\tvar increment = 0, currentValue;\r\n\r\n\t\tif(type != 'number'){\r\n\t\t\treturn;\r\n\t\t}\r\n\r\n\t\tswitch(e.key){\r\n\t\t\tcase 'ArrowDown':\r\n\t\t\tcase 'Down':\r\n\t\t\t\tincrement = -1;\r\n\t\t\t\tbreak;\r\n\r\n\t\t\tcase 'ArrowUp':\r\n\t\t\tcase 'Up':\r\n\t\t\t\tincrement = 1;\r\n\t\t\t\tbreak;\r\n\t\t}\r\n\r\n\t\tif(e.shiftKey){\r\n\t\t\tincrement *= 10;\r\n\t\t}\r\n\r\n\t\tif(e.ctrlKey || e.metaKey){\r\n\t\t\tincrement /= 10;\r\n\t\t}\r\n\r\n\t\tif(increment){\r\n\t\t\tcurrentValue = parseFloat(dom.value.innerText);\r\n\r\n\t\t\tif(!isNaN(currentValue)){\r\n\t\t\t\tdom.value.innerText = Number((currentValue + increment).toFixed(10));\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction getType(value){\r\n\t\tvar type = typeof value;\r\n\r\n\t\tif(type == 'object'){\r\n\t\t\tif(value === null){\r\n\t\t\t\treturn 'null';\r\n\t\t\t}\r\n\r\n\t\t\tif(Array.isArray(value)){\r\n\t\t\t\treturn 'array';\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\treturn type;\r\n\t}\r\n\r\n\r\n\tfunction onCollapseExpandClick(){\r\n\t\tif(expanded){\r\n\t\t\tcollapse();\r\n\t\t}\r\n\t\telse{\r\n\t\t\texpand();\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction onInsertClick(){\r\n\t\tvar newName = type == 'array' ? value.length : undefined,\r\n\t\t\tchild = addChild(newName, null);\r\n\r\n\t\tif(type == 'array'){\r\n\t\t\tvalue.push(null);\r\n\t\t\tchild.editValue();\r\n\t\t}\r\n\t\telse{\r\n\t\t\tchild.editName();\r\n\t\t}\r\n\t}\r\n\r\n\r\n\tfunction onDeleteClick(){\r\n\t\tself.emit('delete', self);\r\n\t}\r\n\r\n\r\n\tfunction onChildRename(child, oldName, newName){\r\n\t\tvar allow = newName && type != 'array' && !(newName in value);\r\n\r\n\t\tif(allow){\r\n\t\t\tvalue[newName] = child.value;\r\n\t\t\tdelete value[oldName];\r\n\t\t}\r\n\t\telse if(oldName === undefined){\r\n\t\t\t// A new node inserted via the UI\r\n\t\t\tremoveChild(child);\r\n\t\t}\r\n\t\telse{\r\n\t\t\t// Cannot rename array keys, or duplicate object key names\r\n\t\t\tchild.name = oldName;\r\n\t\t}\r\n\r\n\t\tchild.once('rename', onChildRename);\r\n\t}\r\n\r\n\r\n\tfunction onChildChange(keyPath, oldValue, newValue, recursed){\r\n\t\tif(!recursed){\r\n\t\t\tvalue[keyPath] = newValue;\r\n\t\t}\r\n\r\n\t\tself.emit('change', name + '.' + keyPath, oldValue, newValue, true);\r\n\t}\r\n\r\n\r\n\tfunction onChildDelete(child){\r\n\t\tvar key = child.name;\r\n\r\n\t\tif(type == 'array'){\r\n\t\t\tvalue.splice(key, 1);\r\n\t\t}\r\n\t\telse{\r\n\t\t\tdelete value[key];\r\n\t\t}\r\n\r\n\t\trefresh();\r\n\t}\r\n\r\n\r\n\tfunction addDomEventListener(element, name, fn){\r\n\t\telement.addEventListener(name, fn);\r\n\t\tdomEventListeners.push({element : element, name : name, fn : fn});\r\n\t}\r\n}"]} diff --git a/samples/wallet-mock/public/stylesheets/devtools.css b/samples/wallet-mock/public/stylesheets/devtools.css index 718ce78..fc9d496 100644 --- a/samples/wallet-mock/public/stylesheets/devtools.css +++ b/samples/wallet-mock/public/stylesheets/devtools.css @@ -122,4 +122,4 @@ .jsonView>.insert:hover{ color: rgb(0, 0, 0); background: rgb(220, 220, 220); -} \ No newline at end of file +} diff --git a/samples/wallet-mock/public/stylesheets/style.css b/samples/wallet-mock/public/stylesheets/style.css index f56dc95..62e2131 100644 --- a/samples/wallet-mock/public/stylesheets/style.css +++ b/samples/wallet-mock/public/stylesheets/style.css @@ -1,14 +1,14 @@ body { - padding: 50px; - font: 14px "Lucida Grande", Helvetica, Arial, sans-serif; + padding: 50px; + font: 14px "Lucida Grande", Helvetica, Arial, sans-serif; } a { - color: #00B7FF; + color: #00B7FF; text-decoration: none; } .BigText { font-size: large; -} \ No newline at end of file +} diff --git a/samples/wallet-mock/views/index.pug b/samples/wallet-mock/views/index.pug index 6cf88bf..87f6282 100644 --- a/samples/wallet-mock/views/index.pug +++ b/samples/wallet-mock/views/index.pug @@ -23,4 +23,4 @@ block content for vc of vc_list a(href="/vc/" + vc.jti) #{vc.jti} (issuedAt: #{vc.vc.issuanceDate}) br - br \ No newline at end of file + br diff --git a/samples/wallet-mock/views/presentations.pug b/samples/wallet-mock/views/presentations.pug index 98abf4e..71b8ad1 100644 --- a/samples/wallet-mock/views/presentations.pug +++ b/samples/wallet-mock/views/presentations.pug @@ -18,4 +18,4 @@ block content for vp of vp_list a(href="/vp/" + vp.jti) #{vp.jti} (issuedAt: #{vp.vp.issuanceDate}) br - br \ No newline at end of file + br diff --git a/samples/wallet-mock/views/select-vc.pug b/samples/wallet-mock/views/select-vc.pug index f8ddf6d..82e32bc 100644 --- a/samples/wallet-mock/views/select-vc.pug +++ b/samples/wallet-mock/views/select-vc.pug @@ -15,4 +15,4 @@ block content br br br - button(type='submit') Send \ No newline at end of file + button(type='submit') Send diff --git a/samples/wallet-mock/views/vc.pug b/samples/wallet-mock/views/vc.pug index 8afc635..264877e 100644 --- a/samples/wallet-mock/views/vc.pug +++ b/samples/wallet-mock/views/vc.pug @@ -4,4 +4,4 @@ block content //- div #{vc_list} input(type='hidden' id="vc" value=vc) link(rel="stylesheet" href="/stylesheets/devtools.css") - script(src="/javascripts/index.js" defer) \ No newline at end of file + script(src="/javascripts/index.js" defer) diff --git a/src/app.ts b/src/app.ts index f7fe265..52ee73e 100644 --- a/src/app.ts +++ b/src/app.ts @@ -10,7 +10,7 @@ import { communicationHandlerRouter } from './routers/communicationHandler.route import { storageRouter } from './routers/storage.router'; import { legalPersonRouter } from './routers/legal_person.router'; import verifiersRouter from './routers/verifiers.router'; -import { reviverTaggedBase64UrlToBuffer } from './util/util'; +import { replacerBufferToTaggedBase64Url, reviverTaggedBase64UrlToBuffer } from './util/util'; import * as WebSocket from 'ws'; import http from 'http'; import { appContainer } from './services/inversify.config'; @@ -27,31 +27,22 @@ const app: Express = express(); app.use(cookieParser()); app.use(bodyParser.urlencoded({ extended: true })); app.use(bodyParser.json({ reviver: reviverTaggedBase64UrlToBuffer })); +app.set('json replacer', replacerBufferToTaggedBase64Url); app.use(express.static('public')); // __dirname is "/path/to/dist/src" // public is located at "/path/to/dist/src" -app.use(cors({ credentials: true, origin: true })); +app.use(cors({ + credentials: true, + origin: true, + allowedHeaders: ['Authorization', 'Content-Type', 'X-Private-Data-If-Match'], + exposedHeaders: ['X-Private-Data-ETag'], +})); // define routes and middleware here app.use('/status', statusRouter); app.use('/user', userController); -// app.get('/jwks', async (req, res) => { -// const users = await getAllUsers(); -// if (users.err) { -// return res.status(500).send({}); -// } - -// const jwksPromises = users.unwrap().map(async (user) => { -// const keys = JSON.parse(user.keys); -// const w = await NaturalPersonWallet.initializeWallet(keys); -// const did = w.key.did -// return { ...w.getPublicKey(), kid: did }; -// }) -// const jwks = await Promise.all(jwksPromises); -// return res.send(jwks); -// }) @@ -73,4 +64,3 @@ appContainer.get(TYPES.SocketManagerService).regi server.listen(config.port, () => { console.log(`Wallet Backend Server listening with ${config.url}`) }); - diff --git a/src/dto/issuance.dto.ts b/src/dto/issuance.dto.ts index 2adc353..3ded0f7 100644 --- a/src/dto/issuance.dto.ts +++ b/src/dto/issuance.dto.ts @@ -1,4 +1,4 @@ export type ConstructProofRequestDTO = { issuerUrl: string; c_nonce: string; -} \ No newline at end of file +} diff --git a/src/dto/user.dto.ts b/src/dto/user.dto.ts index dfa029b..e4d7b22 100644 --- a/src/dto/user.dto.ts +++ b/src/dto/user.dto.ts @@ -22,4 +22,4 @@ export type LoginUserRequestDTO = { export type LoginUserResponseDTO = { error?: FetchUserErrors -} \ No newline at end of file +} diff --git a/src/dto/verification.dto.ts b/src/dto/verification.dto.ts index 237d5e0..4985997 100644 --- a/src/dto/verification.dto.ts +++ b/src/dto/verification.dto.ts @@ -5,4 +5,4 @@ export type VerifyVpRequestDTO = { export type VerifyVpResponseDTO = { verificationResult: boolean; -} \ No newline at end of file +} diff --git a/src/entities/FcmToken.entity.ts b/src/entities/FcmToken.entity.ts index 3bdd4e4..c043600 100644 --- a/src/entities/FcmToken.entity.ts +++ b/src/entities/FcmToken.entity.ts @@ -1,5 +1,5 @@ -import { Column, Entity, EntityManager, ManyToOne, PrimaryGeneratedColumn, Repository } from "typeorm"; -import { UserEntity } from "./user.entity"; +import { Column, Entity, EntityManager, Equal, ManyToOne, PrimaryGeneratedColumn, Repository } from "typeorm"; +import { UserEntity, UserId } from "./user.entity"; import AppDataSource from "../AppDataSource"; import { Err, Ok, Result } from "ts-results"; @@ -10,7 +10,7 @@ export class FcmTokenEntity { @Column({ name: "value", type: "varchar", nullable: false }) value: string; - + @ManyToOne(() => UserEntity, (user) => user.fcmTokenList) user: UserEntity; } @@ -20,10 +20,10 @@ const fcmTokenRepository: Repository = AppDataSource.getReposito enum DeleteFcmTokenErr { DB_ERR = "DB_ERR" } -async function deleteAllFcmTokensForUser(did: string, options?: { entityManager?: EntityManager }): Promise> { +async function deleteAllFcmTokensForUser(id: UserId, options?: { entityManager?: EntityManager }): Promise> { try { return await (options?.entityManager || fcmTokenRepository.manager).transaction(async (manager) => { - const tokens = await manager.find(FcmTokenEntity, { where: { user: { did: did } } }); + const tokens = await manager.find(FcmTokenEntity, { where: { user: { uuid: Equal(id) } } }); await manager.remove(tokens); return Ok({}); }); @@ -36,4 +36,4 @@ async function deleteAllFcmTokensForUser(did: string, options?: { entityManager? export { deleteAllFcmTokensForUser -} \ No newline at end of file +} diff --git a/src/entities/LegalPerson.entity.ts b/src/entities/LegalPerson.entity.ts index 3514224..fab1f81 100644 --- a/src/entities/LegalPerson.entity.ts +++ b/src/entities/LegalPerson.entity.ts @@ -6,8 +6,8 @@ import AppDataSource from "../AppDataSource"; @Entity({ name: "legal_person" }) class LegalPersonEntity { - @PrimaryGeneratedColumn() - id: number = -1; + @PrimaryGeneratedColumn() + id: number = -1; @Column({ nullable: false }) @@ -74,7 +74,7 @@ async function createIssuer(createIssuer: CreateLegalPerson) { async function getAllLegalPersons(): Promise> { try { - const lps = await legalPersonRepository + const lps = await legalPersonRepository .createQueryBuilder("legal_person") .select(["legal_person.id", "legal_person.friendlyName", "legal_person.url", "legal_person.did"]) .getMany(); @@ -88,7 +88,7 @@ async function getAllLegalPersons(): Promise> { try { - const vcList = await legalPersonRepository + const vcList = await legalPersonRepository .createQueryBuilder("legal_person") .getMany(); @@ -106,7 +106,7 @@ async function getAllLegalPersonsDIDs(): Promise> { try { - const issuersList = await legalPersonRepository + const issuersList = await legalPersonRepository .createQueryBuilder("legal_person") .select(["legal_person.id", "legal_person.friendlyName", "legal_person.url", "legal_person.did"]) .where("friendlyName LIKE '%:friendlyNameSubstring%", { friendlyNameSubstring }) @@ -125,10 +125,10 @@ async function getLegalPersonsBySearchParams(friendlyNameSubstring: string): Pro } /** - * Will also update the issuer DB entity with the latest metadata - * @param id - * @returns - */ +* Will also update the issuer DB entity with the latest metadata +* @param id +* @returns +*/ async function getLegalPersonById(id: number): Promise> { try { @@ -146,10 +146,10 @@ async function getLegalPersonById(id: number): Promise> { try { @@ -168,10 +168,10 @@ async function getLegalPersonByDID(did: string): Promise> { try { diff --git a/src/entities/VerifiableCredential.entity.ts b/src/entities/VerifiableCredential.entity.ts index 515eb28..6fd9dc9 100644 --- a/src/entities/VerifiableCredential.entity.ts +++ b/src/entities/VerifiableCredential.entity.ts @@ -200,4 +200,4 @@ export { deleteVerifiableCredential, getVerifiableCredentialByCredentialIdentifier, deleteAllCredentialsWithHolderDID -} \ No newline at end of file +} diff --git a/src/entities/VerifiablePresentation.entity.ts b/src/entities/VerifiablePresentation.entity.ts index 11d25c9..1b29e32 100644 --- a/src/entities/VerifiablePresentation.entity.ts +++ b/src/entities/VerifiablePresentation.entity.ts @@ -36,7 +36,7 @@ export class VerifiablePresentationEntity { // @Column({ enum: PresentationTypes, type: 'enum', nullable: false }) // format: PresentationTypes | null = null; // = PresentationTypes.JWT_VP; // 'ldp_vp' or 'jwt_vp' - + @Column({ type: "datetime", nullable: false }) issuanceDate: Date = new Date(); } @@ -131,7 +131,7 @@ async function deletePresentationsByCredentialId(holderDID:string, credentialIde async function getAllVerifiablePresentations(holderDID: string): Promise> { try { - const vpList = await verifiablePresentationRepository + const vpList = await verifiablePresentationRepository .createQueryBuilder("vp") .where("vp.holderDID = :did", { did: holderDID }) .getMany(); @@ -158,7 +158,7 @@ async function getAllVerifiablePresentations(holderDID: string): Promise> { try { - const vp = await verifiablePresentationRepository + const vp = await verifiablePresentationRepository .createQueryBuilder("vp") .where("vp.presentationIdentifier = :presentationIdentifier and vp.holderDID = :holderDID", { holderDID, presentationIdentifier }) .getOne(); @@ -204,4 +204,4 @@ export { deletePresentationsByCredentialId, getPresentationByIdentifier, deleteAllPresentationsWithHolderDID -} \ No newline at end of file +} diff --git a/src/entities/WebauthnChallenge.entity.ts b/src/entities/WebauthnChallenge.entity.ts index 01be7ca..eb29923 100644 --- a/src/entities/WebauthnChallenge.entity.ts +++ b/src/entities/WebauthnChallenge.entity.ts @@ -2,6 +2,7 @@ import { Err, Ok, Result } from "ts-results"; import { Entity, PrimaryColumn, Column, Repository} from "typeorm" import AppDataSource from "../AppDataSource"; import crypto from "node:crypto"; +import { UserId } from "./user.entity"; @Entity({ name: "webauthn_challenge" }) class WebauthnChallengeEntity { @PrimaryColumn() @@ -10,9 +11,20 @@ class WebauthnChallengeEntity { @Column({ nullable: false}) type: string; - // Explicit default to workaround a bug in typeorm: https://github.com/typeorm/typeorm/issues/3076#issuecomment-703128687 - @Column({ nullable: true, default: () => "NULL" }) - userHandle?: string; + /** + * This was renamed in PR (TBD). + * We keep the old database column name for forward- and backwards compatibility between application and schema versions. + */ + @Column({ + name: "userHandle", + type: "varchar", + length: 255, + nullable: true, + // Explicit default to workaround a bug in typeorm: https://github.com/typeorm/typeorm/issues/3076#issuecomment-703128687 + default: () => "NULL", + transformer: { from: (id) => id && UserId.fromId(id), to: (userId: UserId) => userId?.id }, + }) + userId?: UserId; @Column({ nullable: false }) challenge: Buffer; @@ -29,7 +41,7 @@ const TIMEOUT_MILLISECONDS = 15 * 60 * 1000; type CreatedChallenge = { id: string; - userHandle?: string; + userId?: UserId; challenge: Buffer; prfSalt?: Buffer; } @@ -43,10 +55,10 @@ enum ChallengeErr { const challengeRepository: Repository = AppDataSource.getRepository(WebauthnChallengeEntity); -async function createChallenge(type: "create" | "get", userHandle?: string, prfSalt?: Buffer): Promise> { +async function createChallenge(type: "create" | "get", userId?: UserId, prfSalt?: Buffer): Promise> { try { const returnData = { - userHandle, + userId, prfSalt, id: crypto.randomUUID(), challenge: crypto.randomBytes(32), diff --git a/src/entities/common.entity.ts b/src/entities/common.entity.ts index 9d57d8b..378301e 100644 --- a/src/entities/common.entity.ts +++ b/src/entities/common.entity.ts @@ -2,6 +2,7 @@ import { Result } from "ts-results"; import { EntityManager } from "typeorm" import AppDataSource from "../AppDataSource"; +import { isResult } from "../util/util"; /** * Run the provided callback in a database transaction. The `entityManager` can @@ -17,7 +18,7 @@ import AppDataSource from "../AppDataSource"; export async function runTransaction(runInTransaction: (entityManager: EntityManager) => Promise | T>): Promise { return await AppDataSource.manager.transaction(async (entityManager) => { const result = await runInTransaction(entityManager); - if ("val" in result && "ok" in result && "err" in result) { + if (isResult(result)) { if (result.ok) { return Promise.resolve(result.val); } else { diff --git a/src/entities/user.entity.ts b/src/entities/user.entity.ts index 768a7b6..ed20efc 100644 --- a/src/entities/user.entity.ts +++ b/src/entities/user.entity.ts @@ -1,22 +1,88 @@ import { Err, Ok, Result } from "ts-results"; -import { Entity, PrimaryGeneratedColumn, Column, ManyToOne, OneToMany, Repository, Generated, EntityManager, DeepPartial, JoinColumn } from "typeorm" +import { Entity, PrimaryGeneratedColumn, Column, ManyToOne, OneToMany, Repository, EntityManager, DeepPartial, Generated, Equal } from "typeorm" import crypto from "node:crypto"; import base64url from "base64url"; +import * as uuid from 'uuid'; import AppDataSource from "../AppDataSource"; import * as scrypt from "../scrypt"; import { FcmTokenEntity } from "./FcmToken.entity"; +import { checkedUpdate, EtagUpdate, isResult } from "../util/util"; +import { runTransaction } from "./common.entity"; export enum WalletType { DB, CLIENT } + +/** + * Compute a value suitable to use as an ETag-style HTTP header for the private data field. + */ +export function privateDataEtag(privateData: Buffer): string { + const etag = base64url.toBase64(base64url.encode(crypto.createHash('sha256').update(privateData).digest())); + return `"${etag}"`; +} + + +// Duplicated in wallet-frontend +export class UserId { + public readonly id: string; + private constructor(id: string) { + this.id = id; + } + + public toString(): string { + return `UserId(this.id)`; + } + + public toJSON(): string { + return this.id; + } + + static generate(): UserId { + return new UserId(uuid.v4()); + } + + static fromId(id: string): UserId { + return new UserId(id); + } + + static fromUserHandle(userHandle: Buffer): UserId { + return new UserId(userHandle.toString()); + } + + public asUserHandle(): Buffer { + return Buffer.from(this.id, "utf8"); + } +} + + @Entity({ name: "user" }) class UserEntity { - @PrimaryGeneratedColumn() - id: number; - + /** + * This was obsoleted by PR (TBD). + * We keep the table column for forward- and backwards compatibility between application and schema versions. + * It still needs to be the primary ID in order for table relations to continue working. + */ + @Column({ primary: true, unique: true, nullable: false, update: false }) + @Generated("increment") + private id: number; + + /** + * This was renamed in PR (TBD). + * We keep the old database column name for forward- and backwards compatibility between application and schema versions. + */ + @Column({ + unique: true, + nullable: false, + update: false, + name: "webauthnUserHandle", + type: "varchar", + length: 36, + transformer: { from: UserId.fromId, to: (userId: UserId) => userId.id }, + }) + uuid: UserId; // Explicit default to workaround a bug in typeorm: https://github.com/typeorm/typeorm/issues/3076#issuecomment-703128687 @Column({ unique: true, nullable: true, default: () => "NULL" }) @@ -44,10 +110,6 @@ class UserEntity { @Column({ type: "blob", nullable: false }) privateData: Buffer; - @Column({ nullable: false }) - @Generated("uuid") - webauthnUserHandle: string; - @Column({ type: "enum" ,enum: WalletType, default: WalletType.DB }) walletType: WalletType; @@ -70,23 +132,27 @@ class WebauthnCredentialEntity { @ManyToOne(() => UserEntity, (user) => user.webauthnCredentials, { nullable: false }) user: UserEntity; - @Column({ nullable: false }) + @Column({ nullable: false, update: false }) credentialId: Buffer; - @Column({ nullable: false }) - userHandle: Buffer; + /** + * This was obsoleted by PR (TBD). + * We keep the table column for forward- and backwards compatibility between application and schema versions. + */ + @Column({ name: "userHandle", nullable: false, select: false, update: false }) + _userHandle: Buffer; // Explicit default to workaround a bug in typeorm: https://github.com/typeorm/typeorm/issues/3076#issuecomment-703128687 @Column({ nullable: true, default: () => "NULL" }) nickname: string; - @Column({ type: "datetime", nullable: false }) + @Column({ type: "datetime", nullable: false, update: false }) createTime: Date; @Column({ type: "datetime", nullable: false }) lastUseTime: Date; - @Column({ nullable: false }) + @Column({ nullable: false, update: false }) publicKeyCose: Buffer; @Column({ nullable: false }) @@ -95,10 +161,10 @@ class WebauthnCredentialEntity { @Column("simple-json", { nullable: false }) transports: string[]; - @Column({ nullable: false }) + @Column({ nullable: false, update: false }) attestationObject: Buffer; - @Column({ nullable: false }) + @Column({ nullable: false, update: false }) create_clientDataJSON: Buffer; @Column({ nullable: false }) @@ -117,18 +183,15 @@ class WebauthnCredentialEntity { type CreateUser = { username: string; displayName: string, - did: string; passwordHash: string; fcmToken: string; privateData: Buffer; - webauthnUserHandle: string; } | { + uuid: UserId; displayName: string, - did: string; keys: Buffer; fcmToken: string; privateData: Buffer; - webauthnUserHandle: string; webauthnCredentials: WebauthnCredentialEntity[]; } @@ -146,6 +209,7 @@ enum UpdateUserErr { NOT_EXISTS = "NOT_EXISTS", DB_ERR = "DB_ERR", LAST_WEBAUTHN_CREDENTIAL = "LAST_WEBAUTHN_CREDENTIAL", + PRIVATE_DATA_CONFLICT = "PRIVATE_DATA_CONFLICT", } enum UpdateFcmError { @@ -163,8 +227,11 @@ const webauthnCredentialRepository: Repository = AppDa async function createUser(createUser: CreateUser, isAdmin: boolean = false): Promise> { try { + const uuid = "uuid" in createUser ? createUser.uuid : UserId.generate(); const user = await userRepository.save(userRepository.create({ ...createUser, + uuid, + did: uuid.id, isAdmin, })); const fcmTokenEntity = new FcmTokenEntity(); @@ -180,30 +247,9 @@ async function createUser(createUser: CreateUser, isAdmin: boolean = false): Pro } } -async function storeKeypair(username: string, did: string, keys: Buffer): Promise> { - try { - const res = await AppDataSource - .createQueryBuilder() - .update(UserEntity) - .set({ keys: keys, did: did }) - .where('username = :username', { username }) - .execute(); - - return Ok({}); - } - catch(e) { - console.log(e); - return Err(e); - } -} - -async function getUserByDID(did: string): Promise> { +async function getUser(id: UserId): Promise> { try { - const res = await userRepository.findOne({ - where: { - did: did - } - }); + const res = await userRepository.findOne({ where: { uuid: Equal(id) } }); if (!res) { return Err(GetUserErr.NOT_EXISTS); } @@ -215,19 +261,12 @@ async function getUserByDID(did: string): Promise } } -async function deleteUserByDID(did: string, options?: { entityManager: EntityManager }): Promise> { +async function deleteUser(id: UserId, options?: { entityManager: EntityManager }): Promise> { try { return await (options?.entityManager || userRepository.manager).transaction(async (manager) => { - const userRes = await manager.findOne(UserEntity, { where: { did: did }}); - - await manager.delete(WebauthnCredentialEntity, { - user: { id: userRes.id } - }); - - await manager.delete(UserEntity, { - did: did - }); - + const user = await manager.findOne(UserEntity, { where: { uuid: Equal(id) }}); + await manager.delete(WebauthnCredentialEntity, { user }); + await manager.delete(UserEntity, { uuid: id }); return Ok({}) }); } @@ -278,12 +317,12 @@ async function getUserByCredentials(username: string, password: string): Promise } -async function getUserByWebauthnCredential(userHandle: string, credentialId: Buffer): Promise> { +async function getUserByWebauthnCredential(userId: UserId, credentialId: Buffer): Promise> { try { - console.log("getUserByWebauthnCredential", userHandle, base64url.encode(credentialId)); + console.log("getUserByWebauthnCredential", userId, base64url.encode(credentialId)); const q = userRepository.createQueryBuilder("user") .leftJoinAndSelect("user.webauthnCredentials", "credential") - .where("user.webauthnUserHandle = :userHandle", { userHandle }) + .where("user.uuid = :uuid", { uuid: userId.id }) .andWhere("credential.credentialId = :credentialId", { credentialId }); console.log(q.getSql()); const userRes = await q.getOne(); @@ -319,25 +358,6 @@ async function getAllUsers(): Promise> { return Err(GetUserErr.DB_ERR) } } -// async function addFcmTokenByDID(did: string, newFcmToken: string) { -// try { -// const res = await AppDataSource.getRepository(UserEntity) -// .createQueryBuilder("user") -// .where("user.did = :did", { did: did }) -// .getOne(); -// const fcmTokens: string[] = JSON.parse(res.fcmTokens.toString()); -// fcmTokens.push(newFcmToken); -// const updateRes = await AppDataSource.getRepository(UserEntity) -// .createQueryBuilder("user") -// .update({ fcmTokens: JSON.stringify(fcmTokens) }) -// .where("did = :did", { did: did }) -// .execute(); -// } -// catch(err) { -// console.log(err); -// return Err(UpdateFcmError.DB_ERR); -// } -// } function newWebauthnCredentialEntity(data: DeepPartial, manager?: EntityManager): WebauthnCredentialEntity { const entity = (manager || webauthnCredentialRepository.manager).create(WebauthnCredentialEntity, data); @@ -346,27 +366,37 @@ function newWebauthnCredentialEntity(data: DeepPartial return entity; } -async function updateUserByDID(did: string, update: (user: UserEntity, entityManager: EntityManager) => UserEntity): Promise> { - return await userRepository.manager.transaction(async (manager) => { - const res = await manager.findOne(UserEntity, { - where: { - did: did +async function updateUser(id: UserId, update: (user: UserEntity, entityManager: EntityManager) => UserEntity | Result): Promise> { + try { + return await userRepository.manager.transaction(async (manager) => { + const res = await manager.findOne(UserEntity, { where: { uuid: Equal(id) } }); + if (!res) { + return Promise.reject(Err(UpdateUserErr.NOT_EXISTS)); } - }); - if (!res) { - return Err(UpdateUserErr.NOT_EXISTS); - } - - const updatedUser = update(res, manager); - try { - await manager.save(updatedUser); - return Ok(res); - } catch (e) { + const updatedUser = update(res, manager); + if (isResult(updatedUser)) { + if (updatedUser.ok) { + await manager.save(updatedUser.val); + return updatedUser; + } else { + return updatedUser; + } + } else { + await manager.save(updatedUser); + return Ok(updatedUser); + } + }); + } catch (e) { + if (isResult(e)) { + if (e.err) { + return e as Result; + } + } else { console.log(e); return Err(UpdateUserErr.DB_ERR); } - }); + } } async function updateWebauthnCredentialWithManager( @@ -393,12 +423,12 @@ async function updateWebauthnCredential( }); } -async function updateWebauthnCredentialById(userDid: string, credentialUuid: string, update: (credential: WebauthnCredentialEntity, manager: EntityManager) => WebauthnCredentialEntity): Promise> { - console.log("updateWebauthnCredentialById", userDid, credentialUuid); +async function updateWebauthnCredentialById(userId: UserId, credentialUuid: string, update: (credential: WebauthnCredentialEntity, manager: EntityManager) => WebauthnCredentialEntity): Promise> { + console.log("updateWebauthnCredentialById", userId, credentialUuid); return await webauthnCredentialRepository.manager.transaction(async (manager) => { const q = userRepository.createQueryBuilder("user") .leftJoinAndSelect("user.webauthnCredentials", "credential") - .where("user.did = :userDid", { userDid }) + .where("user.uuid = :uuid", { uuid: userId.id }) .andWhere("credential.id = :credentialUuid", { credentialUuid }); console.log("q", q.getQueryAndParameters()); const userRes = await q.getOne(); @@ -408,11 +438,10 @@ async function updateWebauthnCredentialById(userDid: string, credentialUuid: str }); } -async function deleteWebauthnCredential(user: UserEntity, credentialUuid: string, newPrivateData: Buffer): Promise> { +async function deleteWebauthnCredential(user: UserEntity, credentialUuid: string, updatePrivateData: EtagUpdate): Promise> { try { - - return await userRepository.manager.transaction(async (manager) => { - const userRes = await manager.findOne(UserEntity, { where: { did: user.did }}); + return Ok(await runTransaction(async (manager) => { + const userRes = await manager.findOne(UserEntity, { where: { uuid: Equal(user.uuid) }}); if (!userRes) { return Err(UpdateUserErr.NOT_EXISTS); } @@ -432,16 +461,27 @@ async function deleteWebauthnCredential(user: UserEntity, credentialUuid: string .where({ user, id: credentialUuid }) .execute(); if (res.affected > 0) { - await manager.update(UserEntity, { did: user.did }, { privateData: newPrivateData }); - return Ok({}); + const newPrivateData = checkedUpdate( + updatePrivateData.expectTag, + privateDataEtag, + { + currentValue: userRes.privateData, + newValue: updatePrivateData.newValue, + }); + if (newPrivateData.ok) { + await manager.update(UserEntity, { uuid: user.uuid }, { privateData: newPrivateData.val }); + return Ok.EMPTY; + } else { + return Err(UpdateUserErr.PRIVATE_DATA_CONFLICT); + } } else if (res.affected === 0) { return Err(UpdateUserErr.NOT_EXISTS); } - }); + })); } catch (e) { - console.log(e); - return Err(UpdateUserErr.DB_ERR); + console.log('Failed to delete WebAuthn credential:', e); + return Err(e); } } @@ -452,15 +492,15 @@ export { GetUserErr, UpdateUserErr, createUser, - getUserByDID, + getUser, getUserByCredentials, UpdateFcmError, getUserByWebauthnCredential, getAllUsers, newWebauthnCredentialEntity, - updateUserByDID, + updateUser, deleteWebauthnCredential, updateWebauthnCredential, updateWebauthnCredentialById, - deleteUserByDID + deleteUser, } diff --git a/src/lib/firebase.ts b/src/lib/firebase.ts index 308ae69..074f4e1 100644 --- a/src/lib/firebase.ts +++ b/src/lib/firebase.ts @@ -31,6 +31,7 @@ const sendPushNotification = async (fcm_token, title, body) => { body, }, data: { + scope: '/notifications/' }, apns: { payload: { @@ -62,4 +63,4 @@ const sendPushNotification = async (fcm_token, title, body) => { export { sendPushNotification -} \ No newline at end of file +} diff --git a/src/lib/leafnodepaths.ts b/src/lib/leafnodepaths.ts index 746051f..785f7a6 100644 --- a/src/lib/leafnodepaths.ts +++ b/src/lib/leafnodepaths.ts @@ -1,15 +1,15 @@ import { JSONPath } from "jsonpath-plus"; export function getLeafNodesWithPath(verifiableCredential, obj, path = "$.credentialSubject.") { - // Array to store leaf nodes with paths - let leafNodesWithPath = []; + // Array to store leaf nodes with paths + let leafNodesWithPath = []; + + // Recursive function to traverse the object + function traverse(obj, currentPath) { + for (let key in obj) { + const newPath = currentPath !== "$.credentialSubject." ? `${currentPath}.${key}` : `${currentPath}${key}`; - // Recursive function to traverse the object - function traverse(obj, currentPath) { - for (let key in obj) { - const newPath = currentPath !== "$.credentialSubject." ? `${currentPath}.${key}` : `${currentPath}${key}`; - // Add leaf node with path to the array if (Object.keys(obj[key]).length === 1 && !(obj[key] instanceof Array) && obj[key].display) { console.log("Path = ", newPath) @@ -18,17 +18,17 @@ export function getLeafNodesWithPath(verifiableCredential, obj, path = "$.creden leafNodesWithPath.push({ key: key, path: newPath, friendlyName: obj[key].display[0].name, value: valueFoundInVC }); } else if (typeof obj[key] === "object" && obj[key] !== null) { - // Recursively traverse nested objects - traverse(obj[key], newPath); - } - - } - } + // Recursively traverse nested objects + traverse(obj[key], newPath); + } + + } + } - // Start traversing the object - traverse(obj, path); + // Start traversing the object + traverse(obj, path); console.log("Leafnode paths = ", leafNodesWithPath) - // Group leaf nodes by path + // Group leaf nodes by path return leafNodesWithPath -} \ No newline at end of file +} diff --git a/src/middlewares/auth.middleware.ts b/src/middlewares/auth.middleware.ts index 24f84a0..624e163 100644 --- a/src/middlewares/auth.middleware.ts +++ b/src/middlewares/auth.middleware.ts @@ -1,78 +1,86 @@ import { Request, Response, NextFunction } from "express"; -import { jwtVerify } from 'jose'; +import { jwtVerify, SignJWT } from 'jose'; import config from "../../config"; -import { getUserByDID } from "../entities/user.entity"; +import { getUser, UserEntity, UserId } from "../entities/user.entity"; + + +type TokenPayloadVersion = 1; +const TOKEN_PAYLOAD_VERSION: TokenPayloadVersion = 1; + +type AppTokenPayload = { + // Increment TokenPayloadVersion whenever AppTokenPayload content changes to invalidate existing tokens + v: TokenPayloadVersion; + uuid: string; +} export type AppTokenUser = { username: string; + id: UserId; did: string; } -function getCookieDictionary(cookies: any) { - const cookieList = cookies.split('; '); - let cookieDict: any = {}; - for (const cookie of cookieList) { - const key = cookie.split('=')[0] as string; - - const val = cookie.split('=')[1]; - cookieDict[key] = val; - - } - return cookieDict; +export async function createAppToken(user: UserEntity): Promise { + const secret = new TextEncoder().encode(config.appSecret); + const payload: AppTokenPayload = { + v: TOKEN_PAYLOAD_VERSION, + uuid: user.uuid.id, + }; + return await new SignJWT(payload) + .setProtectedHeader({ alg: "HS256" }) + .sign(secret); } -async function verifyApptoken(jwt: string): Promise<{valid: boolean, payload: any}> { +async function verifyApptoken(jwt: string): Promise { const secret = new TextEncoder().encode(config.appSecret); - try { - const { payload, protectedHeader } = await jwtVerify(jwt, secret); - return { valid: true, payload: payload }; - } - catch (err) { - console.log('Signature verification failed'); - return { valid: false, payload: {}} - } + try { + const { payload, protectedHeader } = await jwtVerify(jwt, secret); + if (payload?.v === TOKEN_PAYLOAD_VERSION) { + // The combination of a valid signature and the correct version + // guarantees that this type assertion is sound + return payload as AppTokenPayload; + } else { + console.log(`Incorrect token version: expected: ${TOKEN_PAYLOAD_VERSION}, got: ${payload?.v}`); + return null; + } + } + catch (err) { + console.log('Signature verification failed'); + return false; + } } export function AuthMiddleware(req: Request, res: Response, next: NextFunction) { - let token: string; - const authorizationHeader = req.headers.authorization; + const authorizationHeader = req.headers?.authorization; console.log("Authorization header = ", authorizationHeader) - if (req.headers != undefined && authorizationHeader != undefined) { - if (authorizationHeader.split(' ')[0] !== 'Bearer') { - res.status(401).send(); - return; - } - token = authorizationHeader.split(' ')[1]; - } - else { - console.log("Unauthorized access to token: ", authorizationHeader?.split(' ')[1]); - res.status(401).send(); // Unauthorized - return; - } + if (authorizationHeader?.substring(0, 7) !== 'Bearer ') { + console.log("Invalid authorization header:", authorizationHeader); + res.status(401).send(); + return; + } - verifyApptoken(token).then(async ({valid, payload}) => { - if (valid === false) { + let token: string = authorizationHeader.substring(7); + + verifyApptoken(token).then(async (payload) => { + if (!payload) { console.log("Unauthorized access to ", token); res.status(401).send(); // Unauthorized return; } - // success - req.user = { - username: "", - did: "" - } as AppTokenUser; - req.user.did = (payload as AppTokenUser).did; - const userRes = await getUserByDID(req.user.did); - if (userRes.err) { - res.status(401).send(); // Unauthorized - return; + const userId = UserId.fromId(payload.uuid); + const userRes = await getUser(userId); + if (userRes.ok) { + req.user = { + username: userRes.val.username, + id: userId, + did: userRes.val.did, + }; + return next(); } - const user = userRes.unwrap(); - req.user.username = user.username; - req.user.did = user.did; - return next(); + + res.status(401).send(); // Unauthorized + return; }) .catch(e => { console.log("Unauthorized access to ", token); diff --git a/src/routers/communicationHandler.router.ts b/src/routers/communicationHandler.router.ts index 1e268c9..a356d54 100644 --- a/src/routers/communicationHandler.router.ts +++ b/src/routers/communicationHandler.router.ts @@ -3,7 +3,7 @@ import express, { Router } from 'express'; import { AuthMiddleware } from '../middlewares/auth.middleware'; import _ from 'lodash'; import { appContainer } from '../services/inversify.config'; -import { HandleOutboundRequestError, IssuanceErr, OpenidCredentialReceiving, OutboundCommunication, SendResponseError } from '../services/interfaces'; +import { HandleOutboundRequestError, OpenidCredentialReceiving, OutboundCommunication, SendResponseError } from '../services/interfaces'; import { TYPES } from '../services/types'; import * as z from 'zod'; @@ -44,7 +44,7 @@ communicationHandlerRouter.post('/handle', async (req, res) => { if (generateAuthorizationRequestSchemaResult.success) { try { const { legal_person_did } = req.body; - const result = await openidForCredentialIssuanceService.generateAuthorizationRequestURL(req.user.did, null, legal_person_did); + const result = await openidForCredentialIssuanceService.generateAuthorizationRequestURL(req.user.id, null, legal_person_did); console.log("Succesfully handled by generateAuthorizationRequestURL"); return res.send(result); } @@ -57,7 +57,7 @@ communicationHandlerRouter.post('/handle', async (req, res) => { const { url, } = req.body; - const result = await openidForCredentialIssuanceService.generateAuthorizationRequestURL(req.user.did, url, null); + const result = await openidForCredentialIssuanceService.generateAuthorizationRequestURL(req.user.id, url, null); console.log("Successfully handled by generateAuthorizationRequestURL"); return res.send(result); } @@ -70,11 +70,11 @@ communicationHandlerRouter.post('/handle', async (req, res) => { const { url, } = req.body; - + if (!(new URL(url).searchParams.get("code"))) { throw new Error("No code was provided"); } - const result = await openidForCredentialIssuanceService.handleAuthorizationResponse(req.user.did, url); + const result = await openidForCredentialIssuanceService.handleAuthorizationResponse(req.user.id, url); if (result.ok) { console.log("Successfully handled by handleAuthorizationResponse"); return res.send({}); @@ -89,8 +89,8 @@ communicationHandlerRouter.post('/handle', async (req, res) => { const { user_pin } = req.body; - - const response = await openidForCredentialIssuanceService.requestCredentialsWithPreAuthorizedGrant(req.user.did, user_pin); + + const response = await openidForCredentialIssuanceService.requestCredentialsWithPreAuthorizedGrant(req.user.id, user_pin); console.log("Response = ", response) if (response.error) { return res.status(401).send({ error: response.error }); @@ -105,7 +105,7 @@ communicationHandlerRouter.post('/handle', async (req, res) => { if (handleSIOPRequestResult.success) { const { url, camera_was_used } = handleSIOPRequestResult.data; try { - const outboundRequestResult = await openidForPresentationService.handleRequest(req.user.did, url, camera_was_used); + const outboundRequestResult = await openidForPresentationService.handleRequest(req.user.id, url, camera_was_used); if (!outboundRequestResult.ok) { if (outboundRequestResult.val == HandleOutboundRequestError.INSUFFICIENT_CREDENTIALS) { return res.send({ error: HandleOutboundRequestError.INSUFFICIENT_CREDENTIALS }); @@ -139,17 +139,17 @@ communicationHandlerRouter.post('/handle', async (req, res) => { const { verifiable_credentials_map, // { "descriptor_id1": "urn:vid:123", "descriptor_id1": "urn:vid:645" } } = req.body; - + console.log("Credentials map = ", verifiable_credentials_map) const selection = new Map(Object.entries(verifiable_credentials_map)) as Map; console.log("Selection = ", verifiable_credentials_map) try { - const result = await openidForPresentationService.sendResponse(req.user.did, selection); - + const result = await openidForPresentationService.sendResponse(req.user.id, selection); + if (!result.ok) { return res.send({ error: SendResponseError.SEND_RESPONSE_ERROR }); } - + const { redirect_to } = result.val; console.log("Successfully handled by sendResponse"); return res.send({ redirect_to }); @@ -157,7 +157,7 @@ communicationHandlerRouter.post('/handle', async (req, res) => { catch(error) { const errText = `Error generating authorization response: ${error}`; console.log(errText); - } + } } return res.status(400).send({ error: "Could not handle" }); }); diff --git a/src/routers/legal_person.router.ts b/src/routers/legal_person.router.ts index 2181d93..e62dbcb 100644 --- a/src/routers/legal_person.router.ts +++ b/src/routers/legal_person.router.ts @@ -15,4 +15,4 @@ legalPersonRouter.get('/issuers/all', async (req, res) => { } }) -export { legalPersonRouter }; \ No newline at end of file +export { legalPersonRouter }; diff --git a/src/routers/status.router.ts b/src/routers/status.router.ts index 6b1cdf7..17d0ff3 100644 --- a/src/routers/status.router.ts +++ b/src/routers/status.router.ts @@ -12,4 +12,4 @@ statusRouter.get('/', (_req: Request, res: Response) => { export { statusRouter -} \ No newline at end of file +} diff --git a/src/routers/storage.router.ts b/src/routers/storage.router.ts index 552ac88..8a1473b 100644 --- a/src/routers/storage.router.ts +++ b/src/routers/storage.router.ts @@ -1,4 +1,4 @@ -import express, { Router } from "express"; +import express, { Request, Response, Router } from "express"; import { getAllVerifiableCredentials, getVerifiableCredentialByCredentialIdentifier, deleteVerifiableCredential } from "../entities/VerifiableCredential.entity"; import { getAllVerifiablePresentations, getPresentationByIdentifier } from "../entities/VerifiablePresentation.entity"; @@ -14,7 +14,7 @@ storageRouter.get('/vp', getAllVerifiablePresentationsController); storageRouter.get('/vp/:presentation_identifier', getPresentationByPresentationIdentifierController); -async function getAllVerifiableCredentialsController(req, res) { +async function getAllVerifiableCredentialsController(req: Request, res: Response) { const holderDID = req.user.did; console.log("Holder did", holderDID) const vcListResult = await getAllVerifiableCredentials(holderDID); @@ -34,8 +34,8 @@ async function getAllVerifiableCredentialsController(req, res) { } -async function getVerifiableCredentialByCredentialIdentifierController(req, res) { - const holderDID = req.user.did; +async function getVerifiableCredentialByCredentialIdentifierController(req: Request, res: Response) { + const holderDID = req.user.did; const { credential_identifier } = req.params; const vcFetchResult = await getVerifiableCredentialByCredentialIdentifier(holderDID, credential_identifier); if (vcFetchResult.err) { @@ -46,7 +46,7 @@ async function getVerifiableCredentialByCredentialIdentifierController(req, res) res.status(200).send(vc); } -async function deleteVerifiableCredentialController(req, res) { +async function deleteVerifiableCredentialController(req: Request, res: Response) { const holderDID = req.user.did; const { credential_identifier } = req.params; const deleteResult = await deleteVerifiableCredential(holderDID, credential_identifier); @@ -58,7 +58,7 @@ async function deleteVerifiableCredentialController(req, res) { -async function getAllVerifiablePresentationsController(req, res) { +async function getAllVerifiablePresentationsController(req: Request, res: Response) { const holderDID = req.user.did; const vpListResult = await getAllVerifiablePresentations(holderDID); if (vpListResult.err) { @@ -75,10 +75,10 @@ async function getAllVerifiablePresentationsController(req, res) { res.status(200).send({ vp_list: vp_list }) } -async function getPresentationByPresentationIdentifierController(req, res) { - const holderDID = req.user.did; +async function getPresentationByPresentationIdentifierController(req: Request, res: Response) { + const holderDID = req.user.did; const { presentation_identifier } = req.params; - + const vpResult = await getPresentationByIdentifier(holderDID, presentation_identifier); if (vpResult.err) { return res.status(500).send({ error: vpResult.val }) diff --git a/src/routers/user.router.ts b/src/routers/user.router.ts index 057c4c9..82bb1c5 100644 --- a/src/routers/user.router.ts +++ b/src/routers/user.router.ts @@ -1,5 +1,4 @@ import express, { Request, Response, Router } from 'express'; -import { SignJWT } from 'jose'; import * as uuid from 'uuid'; import crypto from 'node:crypto'; import * as SimpleWebauthn from '@simplewebauthn/server'; @@ -7,9 +6,9 @@ import base64url from 'base64url'; import { EntityManager } from "typeorm" import config from '../../config'; -import { CreateUser, createUser, deleteUserByDID, deleteWebauthnCredential, getUserByCredentials, getUserByDID, getUserByWebauthnCredential, newWebauthnCredentialEntity, updateUserByDID, UpdateUserErr, updateWebauthnCredential, updateWebauthnCredentialById, UserEntity } from '../entities/user.entity'; -import { jsonParseTaggedBinary, jsonStringifyTaggedBinary } from '../util/util'; -import { AuthMiddleware } from '../middlewares/auth.middleware'; +import { CreateUser, createUser, deleteUser, deleteWebauthnCredential, getUserByCredentials, getUser, getUserByWebauthnCredential, GetUserErr, newWebauthnCredentialEntity, privateDataEtag, updateUser, UpdateUserErr, updateWebauthnCredential, updateWebauthnCredentialById, UserEntity, UserId } from '../entities/user.entity'; +import { checkedUpdate, EtagUpdate, jsonParseTaggedBinary } from '../util/util'; +import { AuthMiddleware, createAppToken } from '../middlewares/auth.middleware'; import { ChallengeErr, createChallenge, popChallenge } from '../entities/WebauthnChallenge.entity'; import * as webauthn from '../webauthn'; import * as scrypt from "../scrypt"; @@ -36,21 +35,24 @@ userController.use(AuthMiddleware); noAuthUserController.use('/session', userController); -async function initSession(user: UserEntity): Promise<{ did: string, appToken: string, username?: string, displayName: string, privateData: string }> { - const secret = new TextEncoder().encode(config.appSecret); - const appToken = await new SignJWT({ did: user.did }) - .setProtectedHeader({ alg: "HS256" }) - .sign(secret); +async function initSession(user: UserEntity): Promise<{ + uuid: UserId, + appToken: string, + username?: string, + displayName: string, + privateData: Buffer, + webauthnRpId: string, +}> { return { - appToken, - did: user.did, + uuid: user.uuid, + appToken: await createAppToken(user), displayName: user.displayName || user.username, - privateData: user.privateData.toString(), + privateData: user.privateData, username: user.username, + webauthnRpId: webauthn.getRpId(), }; } - noAuthUserController.post('/register', async (req: Request, res: Response) => { const username = req.body.username; const password = req.body.password; @@ -60,7 +62,7 @@ noAuthUserController.post('/register', async (req: Request, res: Response) => { } const walletInitializationResult = await walletKeystoreManagerService.initializeWallet( - {...req.body as RegistrationParams } + { ...req.body as RegistrationParams } ); if (walletInitializationResult.err) { @@ -72,12 +74,13 @@ noAuthUserController.post('/register', async (req: Request, res: Response) => { ...walletInitializationResult.unwrap(), username: username ? username : "", passwordHash: passwordHash, - webauthnUserHandle: uuid.v4(), }; const result = (await createUser(newUser)); if (result.ok) { - res.status(200).send(await initSession(result.val)); + res.status(200) + .header({ 'X-Private-Data-ETag': privateDataEtag(result.val.privateData) }) + .send(await initSession(result.val)); } else { console.log("Failed to create user") @@ -98,18 +101,21 @@ noAuthUserController.post('/login', async (req: Request, res: Response) => { } console.log('user res = ', userRes) const user = userRes.unwrap(); - res.status(200).send(await initSession(user)); + res.status(200) + .header({ 'X-Private-Data-ETag': privateDataEtag(user.privateData) }) + .send(await initSession(user)); }) noAuthUserController.post('/register/db-keys', async (req: Request, res: Response) => { }) noAuthUserController.post('/login/db-keys', async (req: Request, res: Response) => { - + }) noAuthUserController.post('/register-webauthn-begin', async (req: Request, res: Response) => { - const challengeRes = await createChallenge("create", uuid.v4()); + const userId = UserId.generate(); + const challengeRes = await createChallenge("create", userId); if (challengeRes.err) { res.status(500).send({}); return; @@ -119,16 +125,16 @@ noAuthUserController.post('/register-webauthn-begin', async (req: Request, res: const createOptions = webauthn.makeCreateOptions({ challenge: challenge.challenge, user: { - webauthnUserHandle: challenge.userHandle, + uuid: userId, name: "", displayName: "", }, }); - res.status(200).send(jsonStringifyTaggedBinary({ + res.status(200).send({ challengeId: challenge.id, createOptions, - })); + }); }); noAuthUserController.post('/register-webauthn-finish', async (req: Request, res: Response) => { @@ -148,7 +154,16 @@ noAuthUserController.post('/register-webauthn-finish', async (req: Request, res: const credential = req.body.credential; const verification = await SimpleWebauthn.verifyRegistrationResponse({ - response: credential, + response: { + type: credential.type, + id: credential.id, + rawId: credential.id, // SimpleWebauthn requires this base64url encoded + response: { + attestationObject: base64url.encode(credential.response.attestationObject), + clientDataJSON: base64url.encode(credential.response.clientDataJSON), + }, + clientExtensionResults: credential.clientExtensionResults, + }, expectedChallenge: base64url.encode(challenge.challenge), expectedOrigin: config.webauthn.origin, expectedRPID: config.webauthn.rp.id, @@ -156,41 +171,42 @@ noAuthUserController.post('/register-webauthn-finish', async (req: Request, res: }); if (verification.verified) { - const webauthnUserHandle = challenge.userHandle; - if (!webauthnUserHandle) { + if (!challenge.userId) { res.status(500).send({}); return; } const walletInitializationResult = await walletKeystoreManagerService.initializeWallet( - {...req.body as RegistrationParams } + { ...req.body as RegistrationParams } ); - + if (walletInitializationResult.err) { return res.status(400).send({ error: walletInitializationResult.val }) } const newUser: CreateUser = { ...walletInitializationResult.unwrap(), - webauthnUserHandle, + uuid: challenge.userId, webauthnCredentials: [ newWebauthnCredentialEntity({ - credentialId: Buffer.from(verification.registrationInfo.credentialID), - userHandle: Buffer.from(webauthnUserHandle), + credentialId: credential.rawId, + _userHandle: challenge.userId.asUserHandle(), nickname: req.body.nickname, publicKeyCose: Buffer.from(verification.registrationInfo.credentialPublicKey), signatureCount: verification.registrationInfo.counter, transports: credential.response.transports || [], - attestationObject: Buffer.from(verification.registrationInfo.attestationObject), - create_clientDataJSON: Buffer.from(credential.response.clientDataJSON), + attestationObject: credential.response.attestationObject, + create_clientDataJSON: credential.response.clientDataJSON, prfCapable: credential.clientExtensionResults?.prf?.enabled || false, }), ], }; - const userRes = await createUser(newUser, false, ); + const userRes = await createUser(newUser, false,); if (userRes.ok) { console.log("Created user", userRes.val); - res.status(200).send(await initSession(userRes.val)); + res.status(200) + .header({ 'X-Private-Data-ETag': privateDataEtag(userRes.val.privateData) }) + .send(await initSession(userRes.val)); } else { res.status(500).send({}); } @@ -208,20 +224,20 @@ noAuthUserController.post('/login-webauthn-begin', async (req: Request, res: Res const challenge = challengeRes.unwrap(); const getOptions = webauthn.makeGetOptions({ challenge: challenge.challenge }); - res.status(200).send(jsonStringifyTaggedBinary({ + res.status(200).send({ challengeId: challenge.id, getOptions, - })); + }); }); noAuthUserController.post('/login-webauthn-finish', async (req: Request, res: Response) => { console.log("webauthn login-finish", req.body); const credential = req.body.credential; - const userHandle = base64url.toBuffer(credential.response.userHandle).toString(); - const credentialId = base64url.toBuffer(credential.id); + const userId = UserId.fromUserHandle(credential.response.userHandle); + const credentialId = credential.rawId; - const userRes = await getUserByWebauthnCredential(userHandle, credentialId); + const userRes = await getUserByWebauthnCredential(userId, credentialId); if (userRes.err) { res.status(403).send({}); return; @@ -242,7 +258,17 @@ noAuthUserController.post('/login-webauthn-finish', async (req: Request, res: Re console.log("webauthn login-finish challenge", challenge); const verification = await SimpleWebauthn.verifyAuthenticationResponse({ - response: credential, + response: { + type: credential.type, + id: credential.id, + rawId: credential.id, // SimpleWebauthn requires this base64url encoded + response: { + authenticatorData: base64url.encode(credential.response.authenticatorData), + clientDataJSON: base64url.encode(credential.response.clientDataJSON), + signature: base64url.encode(credential.response.signature), + }, + clientExtensionResults: credential.clientExtensionResults, + }, expectedChallenge: base64url.encode(challenge.challenge), expectedOrigin: config.webauthn.origin, expectedRPID: config.webauthn.rp.id, @@ -262,7 +288,9 @@ noAuthUserController.post('/login-webauthn-finish', async (req: Request, res: Re }); if (updateCredentialRes.ok) { - res.status(200).send(await initSession(user)); + res.status(200) + .header({ 'X-Private-Data-ETag': privateDataEtag(user.privateData) }) + .send(await initSession(user)); } else { res.status(500).send({}); } @@ -274,11 +302,10 @@ noAuthUserController.post('/login-webauthn-finish', async (req: Request, res: Re userController.post('/fcm_token/add', async (req: Request, res: Response) => { - const userDID = req.user.did; - updateUserByDID(userDID, (userEntity, manager) => { + updateUser(req.user.id, (userEntity, manager) => { if (req.body.fcm_token && - req.body.fcm_token != '' && - userEntity.fcmTokenList.filter((fcmTokenEntity) => fcmTokenEntity.value == req.body.fcm_token).length == 0) { + req.body.fcm_token != '' && + userEntity.fcmTokenList.filter((fcmTokenEntity) => fcmTokenEntity.value == req.body.fcm_token).length == 0) { const fcmTokenEntity = new FcmTokenEntity(); fcmTokenEntity.user = userEntity; fcmTokenEntity.value = req.body.fcm_token; @@ -292,22 +319,18 @@ userController.post('/fcm_token/add', async (req: Request, res: Response) => { }) userController.get('/account-info', async (req: Request, res: Response) => { - const userRes = await getUserByDID(req.user.did); + const userRes = await getUser(req.user.id); if (userRes.err) { res.status(403).send({}); return; } const user = userRes.unwrap(); - const keys = jsonParseTaggedBinary(user.keys.toString()); - - res.status(200).send(jsonStringifyTaggedBinary({ + res.status(200).send({ + uuid: user.uuid, username: user.username, displayName: user.displayName, - did: user.did, hasPassword: user.passwordHash !== null, - publicKey: keys.publicKey, - webauthnUserHandle: user.webauthnUserHandle, webauthnCredentials: (user.webauthnCredentials || []).map(cred => ({ createTime: cred.createTime, credentialId: cred.credentialId, @@ -316,16 +339,11 @@ userController.get('/account-info', async (req: Request, res: Response) => { nickname: cred.nickname, prfCapable: cred.prfCapable, })), - })); + }); }) userController.post('/webauthn/register-begin', async (req: Request, res: Response) => { - const userRes = await updateUserByDID(req.user.did, (userEntity, manager) => { - if (!userEntity.webauthnUserHandle) { - userEntity.webauthnUserHandle = uuid.v4(); - } - return userEntity; - }); + const userRes = await getUser(req.user.id); if (userRes.err) { res.status(403).send({}); @@ -334,7 +352,7 @@ userController.post('/webauthn/register-begin', async (req: Request, res: Respon const user = userRes.unwrap(); const prfSalt = crypto.randomBytes(32); - const challengeRes = await createChallenge("create", user.webauthnUserHandle, prfSalt); + const challengeRes = await createChallenge("create", user.uuid, prfSalt); if (challengeRes.err) { res.status(500).send({}); return; @@ -349,17 +367,17 @@ userController.post('/webauthn/register-begin', async (req: Request, res: Respon }, }); - res.status(200).send(jsonStringifyTaggedBinary({ + res.status(200).send({ username: user.username, challengeId: challenge.id, createOptions, - })); + }); }); userController.post('/webauthn/register-finish', async (req: Request, res: Response) => { console.log("webauthn register-finish", req.body); - const userRes = await getUserByDID(req.user.did); + const userRes = await getUser(req.user.id); if (userRes.err) { res.status(403).send({}); return; @@ -381,19 +399,28 @@ userController.post('/webauthn/register-finish', async (req: Request, res: Respo const credential = req.body.credential; const verification = await SimpleWebauthn.verifyRegistrationResponse({ - response: credential, + response: { + type: credential.type, + id: credential.id, + rawId: credential.id, // SimpleWebauthn requires this base64url encoded + response: { + attestationObject: base64url.encode(credential.response.attestationObject), + clientDataJSON: base64url.encode(credential.response.clientDataJSON), + }, + clientExtensionResults: credential.clientExtensionResults, + }, expectedChallenge: base64url.encode(challenge.challenge), expectedOrigin: config.webauthn.origin, expectedRPID: config.webauthn.rp.id, }); if (verification.verified) { - const updateUserRes = await updateUserByDID(user.did, (userEntity, manager) => { + const updateUserRes = await updateUser(user.uuid, (userEntity, manager) => { userEntity.webauthnCredentials = userEntity.webauthnCredentials || []; userEntity.webauthnCredentials.push( newWebauthnCredentialEntity({ credentialId: Buffer.from(verification.registrationInfo.credentialID), - userHandle: Buffer.from(userEntity.webauthnUserHandle), + _userHandle: user.uuid.asUserHandle(), nickname: req.body.nickname, publicKeyCose: Buffer.from(verification.registrationInfo.credentialPublicKey), signatureCount: verification.registrationInfo.counter, @@ -403,16 +430,32 @@ userController.post('/webauthn/register-finish', async (req: Request, res: Respo prfCapable: credential.clientExtensionResults?.prf?.enabled || false, }, manager) ); - if (req.body.privateData) { - userEntity.privateData = Buffer.from(req.body.privateData); + + const newPrivateData = checkedUpdate( + req.headers['x-private-data-if-match'], + privateDataEtag, + { + currentValue: userEntity.privateData, + newValue: req.body.privateData, + }, + ); + if (newPrivateData.ok) { + userEntity.privateData = newPrivateData.val; + } else { + return Err(UpdateUserErr.PRIVATE_DATA_CONFLICT); } + return userEntity; }); if (updateUserRes.ok) { - res.status(200).send(jsonStringifyTaggedBinary({ - credentialId: credential.id - })); + res.status(200) + .header({ 'X-Private-Data-ETag': privateDataEtag(updateUserRes.val.privateData) }) + .send({ credentialId: credential.id }); + } else if (updateUserRes.val === UpdateUserErr.PRIVATE_DATA_CONFLICT) { + res.status(412) + .header({ 'X-Private-Data-ETag': privateDataEtag(user.privateData) }) + .send({}); } else { res.status(500).send({}); } @@ -425,7 +468,7 @@ userController.post('/webauthn/register-finish', async (req: Request, res: Respo userController.post('/webauthn/credential/:id/rename', async (req: Request, res: Response) => { console.log("webauthn rename", req.params.id); - const updateRes = await updateWebauthnCredentialById(req.user.did, req.params.id, (credentialEntity, manager) => { + const updateRes = await updateWebauthnCredentialById(req.user.id, req.params.id, (credentialEntity, manager) => { credentialEntity.nickname = req.body.nickname || null; return credentialEntity; }); @@ -446,16 +489,22 @@ userController.post('/webauthn/credential/:id/rename', async (req: Request, res: userController.post('/webauthn/credential/:id/delete', async (req: Request, res: Response) => { console.log("webauthn delete", req.params.id); - const userRes = await getUserByDID(req.user.did); + const userRes = await getUser(req.user.id); if (userRes.err) { res.status(403).send({}); return; } const user = userRes.unwrap(); - const deleteRes = await deleteWebauthnCredential(user, req.params.id, Buffer.from(req.body.privateData)); + const updatePrivateData: EtagUpdate = { + expectTag: req.headers['x-private-data-if-match'] as string, + newValue: req.body.privateData, + }; + const deleteRes = await deleteWebauthnCredential(user, req.params.id, updatePrivateData); if (deleteRes.ok) { - res.status(204).send(); + res.status(204) + .header({ 'X-Private-Data-ETag': privateDataEtag(updatePrivateData.newValue) }) + .send(); } else { if (deleteRes.val === UpdateUserErr.NOT_EXISTS) { res.status(404).send(); @@ -463,24 +512,82 @@ userController.post('/webauthn/credential/:id/delete', async (req: Request, res: } else if (deleteRes.val === UpdateUserErr.LAST_WEBAUTHN_CREDENTIAL) { res.status(409).send(); + } else if (deleteRes.val === UpdateUserErr.PRIVATE_DATA_CONFLICT) { + res.status(412) + .header({ 'X-Private-Data-ETag': privateDataEtag(updatePrivateData.newValue) }) + .send(); + } else { res.status(500).send(); } } }) +userController.post('/private-data', async (req: Request, res: Response) => { + const updateUserRes = await updateUser(req.user.id, userEntity => { + const newPrivateData = checkedUpdate( + req.headers['x-private-data-if-match'], + privateDataEtag, + { + currentValue: userEntity.privateData, + newValue: req.body, + }, + ); + if (newPrivateData.ok) { + userEntity.privateData = newPrivateData.val; + return Ok(userEntity); + } else { + return Err([UpdateUserErr.PRIVATE_DATA_CONFLICT, userEntity]); + } + }); + + if (updateUserRes.ok) { + res.status(204) + .header({ 'X-Private-Data-ETag': privateDataEtag(updateUserRes.val.privateData) }) + .send(); + } else { + if (updateUserRes.val === UpdateUserErr.NOT_EXISTS) { + res.status(404).send(); + + } else if (updateUserRes.val[0] === UpdateUserErr.PRIVATE_DATA_CONFLICT) { + res.status(412) + .header({ 'X-Private-Data-ETag': privateDataEtag(updateUserRes.val[1].privateData) }) + .send(); + + } else { + res.status(500).send(); + } + } +}); + +userController.get('/private-data', async (req: Request, res: Response) => { + const userRes = await getUser(req.user.id); + if (userRes.ok) { + const privateData = userRes.val.privateData; + res.status(200) + .header({ 'X-Private-Data-ETag': privateDataEtag(privateData) }) + .send({ privateData }); + } else { + if (userRes.val === GetUserErr.NOT_EXISTS) { + res.status(404).send(); + + } else { + res.status(500).send(); + } + } +}); + userController.delete('/', async (req: Request, res: Response) => { - const userDID = req.user.did; try { await runTransaction(async (entityManager: EntityManager) => { // Note: this executes all four branches before checking if any failed. // ts-results does not seem to provide an async-optimized version of Result.all(), // and it turned out nontrivial to write one that preserves the Ok and Err types like Result.all() does. return Result.all( - await deleteAllFcmTokensForUser(userDID, { entityManager }), - await deleteAllCredentialsWithHolderDID(userDID, { entityManager }), - await deleteAllPresentationsWithHolderDID(userDID, { entityManager }), - await deleteUserByDID(userDID, { entityManager }), + await deleteAllFcmTokensForUser(req.user.id, { entityManager }), + await deleteAllCredentialsWithHolderDID(req.user.did, { entityManager }), + await deleteAllPresentationsWithHolderDID(req.user.did, { entityManager }), + await deleteUser(req.user.id, { entityManager }), ); }); @@ -489,25 +596,5 @@ userController.delete('/', async (req: Request, res: Response) => { return res.status(400).send({ result: e }) } }); -// /** -// * expect 'alg' query parameter -// */ -// userController.get('/keys/public', AuthMiddleware, async (req: Request, res: Response) => { -// const did = req.user?.did; -// const algorithm = req.query["alg"] as string; -// if (did == undefined) { -// res.status(401).send({ err: 'UNAUTHORIZED' }); -// return; -// } -// const alg: SigningAlgorithm = algorithm as SigningAlgorithm; -// const result = await getPublicKey(did, algorithm as SigningAlgorithm); -// if (!result) { -// res.status(500).send(); -// return; -// } -// const { publicKeyJwk } = result; - -// res.send({ publicKeyJwk }); -// }); export default noAuthUserController; diff --git a/src/routers/verifiers.router.ts b/src/routers/verifiers.router.ts index 26e624a..91662fe 100644 --- a/src/routers/verifiers.router.ts +++ b/src/routers/verifiers.router.ts @@ -12,4 +12,4 @@ verifiersRouter.get('/all', async (req, res) => { res.send({ verifiers: await verifiersRegistryService.getAllVerifiers() }); }); -export default verifiersRouter; \ No newline at end of file +export default verifiersRouter; diff --git a/src/services/ClientKeystoreService.ts b/src/services/ClientKeystoreService.ts index dcfa80c..bb859f0 100644 --- a/src/services/ClientKeystoreService.ts +++ b/src/services/ClientKeystoreService.ts @@ -3,11 +3,11 @@ import { inject, injectable } from "inversify"; import "reflect-metadata"; import { Err, Ok, Result } from "ts-results"; -import { AdditionalKeystoreParameters, RegistrationParams, SocketManagerServiceInterface, WalletKeystore, WalletKeystoreErr } from "./interfaces"; +import { AdditionalKeystoreParameters, SocketManagerServiceInterface, WalletKeystore, WalletKeystoreErr } from "./interfaces"; import { TYPES } from "./types"; import config from "../../config"; import { SignatureAction, ServerSocketMessage } from "./shared.types"; -import { WalletKey } from "@wwwallet/ssi-sdk"; +import { UserId } from "../entities/user.entity"; @@ -23,30 +23,7 @@ export class ClientKeystoreService implements WalletKeystore { ) { } - async createIdToken(userDid: string, nonce: string, audience: string, additionalParameters: AdditionalKeystoreParameters): Promise> { - let message_id_sent = randomUUID(); - const msg = { - message_id: message_id_sent, - request: { - action: SignatureAction.createIdToken, - nonce: nonce, - audience: audience - } - } - await this.socketManagerService.send(userDid, msg as ServerSocketMessage) - - const result = await this.socketManagerService.expect(userDid, message_id_sent, SignatureAction.createIdToken); - if (result.err) { - return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED); - } - const { message: { message_id, response } } = result.unwrap(); - if (response.action == SignatureAction.createIdToken) { - return Ok({ id_token: response.id_token }); - } - return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED); - } - - async signJwtPresentation(userDid: string, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters: AdditionalKeystoreParameters): Promise> { + async signJwtPresentation(userId: UserId, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters: AdditionalKeystoreParameters): Promise> { let message_id_sent = randomUUID(); const msg = { message_id: message_id_sent, @@ -57,9 +34,9 @@ export class ClientKeystoreService implements WalletKeystore { verifiableCredentials: verifiableCredentials } } - await this.socketManagerService.send(userDid, msg as ServerSocketMessage) + await this.socketManagerService.send(userId, msg as ServerSocketMessage) - const result = await this.socketManagerService.expect(userDid, message_id_sent, SignatureAction.signJwtPresentation); + const result = await this.socketManagerService.expect(userId, message_id_sent, SignatureAction.signJwtPresentation); if (result.err) { return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED); } @@ -70,7 +47,7 @@ export class ClientKeystoreService implements WalletKeystore { return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED); } - async generateOpenid4vciProof(userDid: string, audience: string, nonce: string, additionalParameters: AdditionalKeystoreParameters): Promise> { + async generateOpenid4vciProof(userId: UserId, audience: string, nonce: string, additionalParameters: AdditionalKeystoreParameters): Promise> { let message_id_sent = randomUUID(); const msg = { message_id: message_id_sent, @@ -81,8 +58,8 @@ export class ClientKeystoreService implements WalletKeystore { } } console.log("MessageID = ", message_id_sent) - await this.socketManagerService.send(userDid, msg as ServerSocketMessage); - const result = await this.socketManagerService.expect(userDid, message_id_sent, SignatureAction.generateOpenid4vciProof); + await this.socketManagerService.send(userId, msg as ServerSocketMessage); + const result = await this.socketManagerService.expect(userId, message_id_sent, SignatureAction.generateOpenid4vciProof); if (result.err) { return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED); } @@ -93,4 +70,4 @@ export class ClientKeystoreService implements WalletKeystore { return Err(WalletKeystoreErr.REMOTE_SIGNING_FAILED); } -} \ No newline at end of file +} diff --git a/src/services/DatabaseKeystoreService.ts b/src/services/DatabaseKeystoreService.ts index db41d51..de40efd 100644 --- a/src/services/DatabaseKeystoreService.ts +++ b/src/services/DatabaseKeystoreService.ts @@ -7,7 +7,7 @@ import { Err, Ok, Result } from "ts-results"; import { SignVerifiablePresentationJWT, WalletKey } from "@wwwallet/ssi-sdk"; import { AdditionalKeystoreParameters, DidKeyUtilityService, RegistrationParams, WalletKeystore, WalletKeystoreErr } from "./interfaces"; import { verifiablePresentationSchemaURL } from "../util/util"; -import { getUserByDID } from "../entities/user.entity"; +import { getUser, UserId } from "../entities/user.entity"; import { TYPES } from "./types"; import config from "../../config"; @@ -32,34 +32,9 @@ export class DatabaseKeystoreService implements WalletKeystore { } } - - async createIdToken(userDid: string, nonce: string, audience: string, additionalParameters: AdditionalKeystoreParameters): Promise> { - const user = (await getUserByDID(userDid)).unwrap(); - const keys = JSON.parse(user.keys.toString()) as WalletKey; - - if (!keys.privateKey) { - return Err(WalletKeystoreErr.KEYS_UNAVAILABLE); - } - - const privateKey = await importJWK(keys.privateKey, keys.alg); - const jws = await new SignJWT({ nonce: nonce }) - .setProtectedHeader({ - alg: this.algorithm, - typ: "JWT", - kid: keys.verificationMethod, - }) - .setSubject(user.did) - .setIssuer(user.did) - .setExpirationTime('1m') - .setAudience(audience) - .setIssuedAt() - .sign(privateKey); - - return Ok({ id_token: jws }); - } - async signJwtPresentation(userDid: string, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters: AdditionalKeystoreParameters): Promise> { - const user = (await getUserByDID(userDid)).unwrap(); + async signJwtPresentation(userId: UserId, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters: AdditionalKeystoreParameters): Promise> { + const user = (await getUser(userId)).unwrap(); const keys = JSON.parse(user.keys.toString()) as WalletKey; if (!keys.privateKey) { return Err(WalletKeystoreErr.KEYS_UNAVAILABLE); @@ -90,8 +65,8 @@ export class DatabaseKeystoreService implements WalletKeystore { return Ok({ vpjwt: jws }); } - async generateOpenid4vciProof(userDid: string, audience: string, nonce: string, additionalParameters: AdditionalKeystoreParameters): Promise> { - const user = (await getUserByDID(userDid)).unwrap(); + async generateOpenid4vciProof(userId: UserId, audience: string, nonce: string, additionalParameters: AdditionalKeystoreParameters): Promise> { + const user = (await getUser(userId)).unwrap(); const keys = JSON.parse(user.keys.toString()) as WalletKey; if (!keys.privateKey) { return Err(WalletKeystoreErr.KEYS_UNAVAILABLE); diff --git a/src/services/EBSIDidKeyUtilityService.ts b/src/services/EBSIDidKeyUtilityService.ts index a6155a2..a5f0e9f 100644 --- a/src/services/EBSIDidKeyUtilityService.ts +++ b/src/services/EBSIDidKeyUtilityService.ts @@ -18,4 +18,4 @@ export class EBSIDidKeyUtilityService implements DidKeyUtilityService { const naturalPersonWallet: NaturalPersonWallet = await new NaturalPersonWallet().createWallet(config.alg); return { did: naturalPersonWallet.key.did, key: naturalPersonWallet.key }; } -} \ No newline at end of file +} diff --git a/src/services/OpenidForCredentialIssuanceService.ts b/src/services/OpenidForCredentialIssuanceService.ts index 99de8d1..0f8d3ee 100644 --- a/src/services/OpenidForCredentialIssuanceService.ts +++ b/src/services/OpenidForCredentialIssuanceService.ts @@ -1,7 +1,6 @@ import axios from "axios"; import * as _ from 'lodash'; import base64url from "base64url"; -import qs from "qs"; import { injectable, inject } from "inversify"; import "reflect-metadata"; import { Err, Ok, Result } from "ts-results"; @@ -9,19 +8,16 @@ import { Err, Ok, Result } from "ts-results"; import { LegalPersonEntity, getLegalPersonByDID, getLegalPersonByUrl } from "../entities/LegalPerson.entity"; import { CredentialIssuerMetadata, CredentialResponseSchemaType, CredentialSupportedJwtVcJson, GrantType, OpenidConfiguration, TokenResponseSchemaType, VerifiableCredentialFormat } from "../types/oid4vci"; import config from "../../config"; -import { getUserByDID } from "../entities/user.entity"; +import { getUser, UserId } from "../entities/user.entity"; import { sendPushNotification } from "../lib/firebase"; import { generateCodeChallengeFromVerifier, generateCodeVerifier } from "../util/util"; import { createVerifiableCredential } from "../entities/VerifiableCredential.entity"; -import { getLeafNodesWithPath } from "../lib/leafnodepaths"; import { TYPES } from "./types"; -import { IssuanceErr, OpenidCredentialReceiving, WalletKeystore, WalletKeystoreErr } from "./interfaces"; -import { WalletKeystoreRequest, SignatureAction } from "./shared.types"; +import { IssuanceErr, OpenidCredentialReceiving, WalletKeystore } from "./interfaces"; import { randomUUID } from 'node:crypto'; -import { error } from "node:console"; type IssuanceState = { - userDid: string; // Before Authorization Req + userId: UserId; // Before Authorization Req legalPerson: LegalPersonEntity; // Before Authorization Req credentialIssuerMetadata: CredentialIssuerMetadata; // Before Authorization Req openidConfiguration: OpenidConfiguration; // Before Authorization Req @@ -40,9 +36,9 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei // identifierService: IdentifierService = new IdentifierService(); // legalPersonService: LegalPersonService = new LegalPersonService(); - - // key: userDid + + // key: UserEntity.uuid public states = new Map(); constructor( @@ -50,41 +46,8 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei ) { } - async getIssuerState(userDid: string): Promise<{ issuer_state?: string, error?: Error; }> { - const state = this.states.get(userDid); - if (!state) { - return { issuer_state: null, error: new Error("No state found") }; - } - if (!state.issuer_state) { - return { issuer_state: null, error: new Error("No issuer_state found in state") }; - } - - return { issuer_state: state.issuer_state, error: null }; - } - - async getAvailableSupportedCredentials(legalPersonDID: string): Promise> { - const lp = (await getLegalPersonByDID(legalPersonDID)).unwrapOr(new Error("Not found")); - if (lp instanceof Error) { - return []; - } - const issuerUrlString = lp.url; - const credentialIssuerMetadata = await axios.get(issuerUrlString + "/.well-known/openid-credential-issuer"); - - const options = credentialIssuerMetadata.data.credentials_supported.map((val) => { - return { id: val.id, displayName: val.display[0].name }; - }) - return options as Array<{id: string, displayName: string}>; - } - - /** - * - * @param userDid - * @param legalPersonDID - * @returns - * @throws - */ - async generateAuthorizationRequestURL(userDid: string, credentialOfferURL?: string, legalPersonDID?: string): Promise<{ redirect_to?: string, preauth?: boolean, ask_for_pin?: boolean }> { - console.log("generateAuthorizationRequestURL userDid = ", userDid); + async generateAuthorizationRequestURL(userId: UserId, credentialOfferURL?: string, legalPersonDID?: string): Promise<{ redirect_to?: string, preauth?: boolean, ask_for_pin?: boolean }> { + console.log("generateAuthorizationRequestURL userId = ", userId); console.log("LP = ", legalPersonDID); let issuerUrlString: string | null = null; let credential_offer = null; @@ -127,8 +90,9 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei lp = (await getLegalPersonByUrl(credentialIssuerURL)).unwrap(); if (!lp) { + const user = (await getUser(userId)).unwrap(); // as client id we are going to use the userDid - lp = { did: null, friendlyName: "Tmp", client_id: userDid, id: -1, url: credentialIssuerURL } + lp = { did: null, friendlyName: "Tmp", client_id: user.did, id: -1, url: credentialIssuerURL } } issuerUrlString = lp.url; @@ -139,7 +103,7 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei throw new Error("No issuer url is defined"); } - + const credentialIssuerMetadata = (await axios.get(issuerUrlString + "/.well-known/openid-credential-issuer")).data as CredentialIssuerMetadata; console.log("Credential issuer metadata") @@ -159,8 +123,8 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei console.log("Credential offer = ", credential_offer) if (credential_offer && credential_offer.grants["urn:ietf:params:oauth:grant-type:pre-authorized_code"]) { - this.states.set(userDid, { - userDid, + this.states.set(userId.id, { + userId, credentialIssuerMetadata: credentialIssuerMetadata, openidConfiguration: authorizationServerConfig, legalPerson: lp, @@ -173,16 +137,16 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei console.log("Redirecting to ... ", config.walletClientUrl + `?preauth=true&ask_for_pin=${user_pin_required}`) return { preauth: true, ask_for_pin: user_pin_required } } - - - - + + + + const authorizationRequestURL = new URL(authorizationServerConfig.authorization_endpoint); authorizationRequestURL.searchParams.append("scope", "openid"); authorizationRequestURL.searchParams.append("client_id", lp.client_id); - + authorizationRequestURL.searchParams.append("redirect_uri", config.walletClientUrl); authorizationRequestURL.searchParams.append("authorization_details", JSON.stringify(authorizationDetails)); @@ -194,8 +158,8 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei authorizationRequestURL.searchParams.append("issuer_state", issuer_state); authorizationRequestURL.searchParams.append("client_metadata", JSON.stringify(client_metadata)); - this.states.set(userDid, { - userDid, + this.states.set(userId.id, { + userId, authorization_details: authorizationDetails, credentialIssuerMetadata: credentialIssuerMetadata, openidConfiguration: authorizationServerConfig, @@ -210,10 +174,10 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei - public async requestCredentialsWithPreAuthorizedGrant(userDid: string, user_pin: string): Promise<{error?: string}> { - let state = this.states.get(userDid) + public async requestCredentialsWithPreAuthorizedGrant(userId: UserId, user_pin: string): Promise<{error?: string}> { + let state = this.states.get(userId.id) state = { ...state, user_pin: user_pin }; - this.states.set(userDid, state); // save state with pin + this.states.set(userId.id, state); // save state with pin return this.tokenRequest(state).then(tokenResponse => { @@ -222,8 +186,8 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei throw new Error("Token response is undefined"); } state = { ...state, tokenResponse } - this.states.set(userDid, state); - this.credentialRequests(userDid, state).catch(e => { + this.states.set(userId.id, state); + this.credentialRequests(userId, state).catch(e => { console.error("Credential requests failed with error : ", e) }); return {}; @@ -240,12 +204,12 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei } /** - * + * * @param authorizationResponseURL * @throws */ - public async handleAuthorizationResponse(userDid: string, authorizationResponseURL: string): Promise> { - const currentState = this.states.get(userDid); + public async handleAuthorizationResponse(userId: UserId, authorizationResponseURL: string): Promise> { + const currentState = this.states.get(userId.id); if (!currentState) { return Err(IssuanceErr.STATE_NOT_FOUND); } @@ -260,16 +224,16 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei return; } let newState = { ...currentState, code }; - this.states.set(userDid, newState); + this.states.set(userId.id, newState); const tokenResponse = await this.tokenRequest(newState); if (!tokenResponse) { return; } newState = { ...newState, tokenResponse } - this.states.set(userDid, newState); + this.states.set(userId.id, newState); try { - await this.credentialRequests(userDid, newState); + await this.credentialRequests(userId, newState); } catch (e) { console.error("Credential requests failed with error : ", e) } @@ -279,12 +243,12 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei /** * @throws - * @param state - * @returns + * @param state + * @returns */ private async tokenRequest(state: IssuanceState): Promise { // const basicAuthorizationB64 = Buffer.from(`${state.legalPerson.client_id}:${state.legalPerson.client_secret}`).toString("base64"); - const httpHeader = { + const httpHeader = { // "authorization": `Basic ${basicAuthorizationB64}`, "Content-Type": "application/x-www-form-urlencoded" }; @@ -328,17 +292,17 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei /** * @throws */ - private async credentialRequests(userDid: string, state: IssuanceState): Promise> { + private async credentialRequests(userId: UserId, state: IssuanceState): Promise> { const c_nonce = state.tokenResponse.c_nonce; - const res = await this.walletKeystoreManagerService.generateOpenid4vciProof(userDid, state.credentialIssuerMetadata.credential_issuer, c_nonce); + const res = await this.walletKeystoreManagerService.generateOpenid4vciProof(userId, state.credentialIssuerMetadata.credential_issuer, c_nonce); console.log("Result proof generation = ", res) if (res.ok) { const { proof_jwt } = res.val; - return Ok(await this.finishCredentialRequests(userDid, state, proof_jwt)); + return Ok(await this.finishCredentialRequests(userId, state, proof_jwt)); } } - private async finishCredentialRequests(userDid: string, state: IssuanceState, proof_jwt: string) { + private async finishCredentialRequests(userId: UserId, state: IssuanceState, proof_jwt: string) { const credentialEndpoint = state.credentialIssuerMetadata.credential_endpoint; const httpHeader = { @@ -364,7 +328,7 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei .map(response => { console.error(`Failed credential (status, body) : (${response.response.status}, ${JSON.stringify(response.response.data)})`, ); }); - + let credentialResponses = responses .filter(res => res.status == 'fulfilled') .map((res) => @@ -372,7 +336,7 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei ); // Prevent duplicate credential acceptance - this.states.delete(userDid); + this.states.delete(userId.id); for (const cr of credentialResponses) { if (cr.acceptance_token) @@ -392,12 +356,12 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei // Deferred Credential only private async checkConstantlyForPendingCredential(state: IssuanceState, acceptance_token: string) { - const defferedCredentialReqHeader = { + const defferedCredentialReqHeader = { "authorization": `Bearer ${acceptance_token}`, }; - + axios.post(state.credentialIssuerMetadata.deferred_credential_endpoint, - {}, + {}, { headers: defferedCredentialReqHeader } ) .then((res) => { this.handleCredentialStorage(state, res.data); @@ -408,11 +372,11 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei }, 2000); }) - + } private async handleCredentialStorage(state: IssuanceState, credentialResponse: CredentialResponseSchemaType) { - const userRes = await getUserByDID(state.userDid); + const userRes = await getUser(state.userId); if (userRes.err) { return; } @@ -423,18 +387,18 @@ export class OpenidForCredentialIssuanceService implements OpenidCredentialRecei const credentialPayload = JSON.parse(base64url.decode(credentialResponse.credential.split('.')[1])) const type = credentialPayload.vc.type as string[]; const metadata = (await axios.get(legalPerson.url + "/.well-known/openid-credential-issuer")).data as CredentialIssuerMetadata; - - + + let logoUrl = config.url + "/alt-vc-logo.png"; let background_color = "#D3D3D3"; const supportedCredential = metadata.credentials_supported.filter(cs => cs.format == credentialResponse.format && _.isEqual(cs.types, type))[0]; if (supportedCredential) { - if (supportedCredential.display && + if (supportedCredential.display && supportedCredential.display.length != 0 && supportedCredential.display[0]?.logo && supportedCredential.display[0]?.logo?.url) { - + logoUrl = supportedCredential.display[0].logo.url; } diff --git a/src/services/OpenidForPresentationService.ts b/src/services/OpenidForPresentationService.ts index eb7e550..904ba7d 100644 --- a/src/services/OpenidForPresentationService.ts +++ b/src/services/OpenidForPresentationService.ts @@ -8,12 +8,12 @@ import { z } from 'zod'; import { Err, Ok, Result } from "ts-results"; import { InputDescriptorType, Verify } from "@wwwallet/ssi-sdk"; -import { HandleOutboundRequestError, OpenidCredentialReceiving, OutboundCommunication, SendResponseError, WalletKeystore, WalletKeystoreErr } from "./interfaces"; +import { HandleOutboundRequestError, OutboundCommunication, SendResponseError, WalletKeystore } from "./interfaces"; import { TYPES } from "./types"; import { OutboundRequest } from "./types/OutboundRequest"; import { getAllVerifiableCredentials } from "../entities/VerifiableCredential.entity"; import { createVerifiablePresentation } from "../entities/VerifiablePresentation.entity"; -import { getUserByDID } from "../entities/user.entity"; +import { getUser, UserId } from "../entities/user.entity"; import { VerifierRegistryService } from "./VerifierRegistryService"; import { randomUUID, createHash } from "node:crypto"; import config from "../../config"; @@ -21,7 +21,6 @@ import { WalletKeystoreRequest, SignatureAction } from "./shared.types"; import { HasherAlgorithm, HasherAndAlgorithm, - SaltGenerator, SdJwt, } from '@sd-jwt/core'; @@ -81,25 +80,24 @@ type VerificationState = { @injectable() export class OpenidForPresentationService implements OutboundCommunication { - // key: did + // key: UserEntity.uuid states = new Map(); constructor( @inject(TYPES.WalletKeystoreManagerService) private walletKeystoreManagerService: WalletKeystore, @inject(TYPES.VerifierRegistryService) private verifierRegistryService: VerifierRegistryService, - @inject(TYPES.OpenidForCredentialIssuanceService) private OpenidCredentialReceivingService: OpenidCredentialReceiving ) { } - async initiateVerificationFlow(userDid: string, verifierId: number, scopeName: string): Promise<{ redirect_to?: string }> { + async initiateVerificationFlow(userId: UserId, verifierId: number, scopeName: string): Promise<{ redirect_to?: string }> { const verifier = (await this.verifierRegistryService.getAllVerifiers()).filter(ver => ver.id == verifierId)[0]; - console.log("User did = ", userDid) - const userFetchRes = await getUserByDID(userDid); + console.log("User id = ", userId) + const userFetchRes = await getUser(userId); if (userFetchRes.err) { return {}; } const holder_state = randomUUID(); - this.states.set(userDid, { holder_state }); + this.states.set(userId.id, { holder_state }); const user = userFetchRes.unwrap(); const url = new URL(verifier.url); @@ -110,13 +108,8 @@ export class OpenidForPresentationService implements OutboundCommunication { url.searchParams.append("state", holder_state); return { redirect_to: url.toString() }; } - - async handleRequest(userDid: string, requestURL: string, camera_was_used: boolean): Promise> { - try { - return await this.parseIdTokenRequest(userDid, requestURL); - } - catch(err) { - } + + async handleRequest(userId: UserId, requestURL: string, camera_was_used: boolean): Promise> { try { const url = new URL(requestURL); @@ -125,8 +118,8 @@ export class OpenidForPresentationService implements OutboundCommunication { const jsonParams = Object.fromEntries(paramEntries); authorizationRequestSchema.parse(jsonParams); // will throw error if input is not conforming to the schema - this.states.set(userDid, { camera_was_used: camera_was_used }) - const result = await this.parseAuthorizationRequest(userDid, requestURL); + this.states.set(userId.id, { camera_was_used: camera_was_used }) + const result = await this.parseAuthorizationRequest(userId, requestURL); if (result.err) { return Err(result.val); } @@ -145,9 +138,9 @@ export class OpenidForPresentationService implements OutboundCommunication { } - async sendResponse(userDid: string, selection: Map): Promise> { + async sendResponse(userId: UserId, selection: Map): Promise> { try { - return await this.generateAuthorizationResponse(userDid, selection) + return await this.generateAuthorizationResponse(userId, selection) } catch(err) { console.error("Failed to generate authorization response.\nError details: ", err); @@ -155,118 +148,13 @@ export class OpenidForPresentationService implements OutboundCommunication { } } - - - private async parseIdTokenRequest(userDid: string, authorizationRequestURL: string): Promise> { - console.log("parseIdTokenRequest userDid:", userDid) - + private async parseAuthorizationRequest(userId: UserId, authorizationRequestURL: string): Promise, verifierDomainName: string}, HandleOutboundRequestError>> { + console.log("parseAuthorizationRequest userId = ", userId) let client_id: string, response_uri: string, nonce: string, presentation_definition: PresentationDefinition | null, state: string | null; - - console.log("Pure params = ", new URL(authorizationRequestURL)) - try { - const searchParams = await this.authorizationRequestSearchParams(authorizationRequestURL); - console.log("SEARCH params = ", searchParams) - client_id = searchParams.client_id; - response_uri = searchParams.response_uri; - nonce = searchParams.nonce; - presentation_definition = searchParams.presentation_definition - state = searchParams.state; - console.log("Pre = ", presentation_definition) - if (searchParams.presentation_definition) { - console.log("Presentation definition is included") - throw new Error("This is not an id token request because presentation definition is included"); - } - } - catch(error) { - throw new Error(`Error fetching authorization request search params: ${error}`); - } - - - const currentState = this.states.get(userDid); - this.states.set(userDid, { - ...currentState, - audience: client_id, - nonce, - response_uri, - state, - }); - const idTokenResult = await this.walletKeystoreManagerService.createIdToken(userDid, nonce, client_id); - if (idTokenResult.ok) { - const { id_token } = idTokenResult.val; - return Ok(await this.finishParseIdTokenRequest(userDid, state, response_uri, id_token)); - } else if (idTokenResult.val === WalletKeystoreErr.KEYS_UNAVAILABLE) { - return Err({ action: SignatureAction.createIdToken, nonce, audience: client_id }); - } - } - - private async finishParseIdTokenRequest(userDid: string, state: string, redirect_uri: string, id_token: string): Promise<{ redirect_to: string }> { - const { issuer_state } = await this.OpenidCredentialReceivingService.getIssuerState(userDid); - - const params = { - id_token, - state: state, - issuer_state: issuer_state - }; - - console.log("Params = ", params) - console.log("RedirectURI = ", redirect_uri) - const encodedParams = qs.stringify(params); - const { newLocation } = await axios.post(redirect_uri, encodedParams, { maxRedirects: 0, headers: { "Content-Type": "application/x-www-form-urlencoded" }}) - .then(success => { - console.log("url = ", success.config.headers) - console.log("body = ", success.data) - console.log(success.status) - const msg = { - error: "Direct post error", - error_description: "Failed to redirect after direct post" - }; - console.error(msg); - // console.log("Sucess = ", success.data) - return { newLocation: null } - }) - .catch(e => { - console.log("ERR"); - console.log("UNKNOWN") - if (e.response) { - console.log("UNKNOWN = ", e.response.data) - - if (e.response.headers.location) { - console.log("Loc: ", e.response.headers.location); - const newLocation = e.response.headers.location as string; - console.error("Body of Error = ", e.response.data) - const url = new URL(newLocation) - console.log("Pure url of loc: ", url) - return { newLocation } - } - else { - return { newLocation: null } - } - - } - }); - console.log("New loc : ", newLocation) - // check if newLocation is null - return { redirect_to: newLocation } - } - - /** - * @throws - * @param userDid - * @param authorizationRequestURL - * @returns - */ - private async parseAuthorizationRequest(userDid: string, authorizationRequestURL: string): Promise, verifierDomainName: string}, HandleOutboundRequestError>> { - console.log("parseAuthorizationRequest userDid = ", userDid) - const { did } = (await getUserByDID(userDid)).unwrap(); - let client_id: string, - response_uri: string, - nonce: string, - presentation_definition: PresentationDefinition | null, - state: string | null; try { console.log("All search params = ", new URL(authorizationRequestURL).searchParams) const params = new URL(authorizationRequestURL).searchParams; @@ -290,8 +178,8 @@ export class OpenidForPresentationService implements OutboundCommunication { catch(error) { throw new Error(`Error fetching authorization request search params: ${error}`); } - const currentState = this.states.get(userDid); - this.states.set(userDid, { + const currentState = this.states.get(userId.id); + this.states.set(userId.id, { ...currentState, presentation_definition, audience: client_id, @@ -301,11 +189,11 @@ export class OpenidForPresentationService implements OutboundCommunication { }); - console.log("State = ", this.states.get(userDid)) + console.log("State = ", this.states.get(userId.id)) console.log("Definition = ", presentation_definition) - + let descriptors: InputDescriptorType[]; try { descriptors = JSONPath({ @@ -317,8 +205,10 @@ export class OpenidForPresentationService implements OutboundCommunication { throw new Error(`Error fetching input descriptors from presentation_definition: ${error}`); } + const user = (await getUser(userId)).unwrap(); + try { - const verifiableCredentialsRes = await getAllVerifiableCredentials(did); + const verifiableCredentialsRes = await getAllVerifiableCredentials(user.did); if (verifiableCredentialsRes.err) { throw "Failed to fetch credentials" } @@ -370,20 +260,20 @@ export class OpenidForPresentationService implements OutboundCommunication { /** - * selection: (key: descriptor_id, value: credentialIdentifier from VerifiableCredential DB entity) - */ - private async generateVerifiablePresentation(selection: Map, presentation_definition: PresentationDefinition, userDid: string): Promise> { - + * selection: (key: descriptor_id, value: credentialIdentifier from VerifiableCredential DB entity) + */ + private async generateVerifiablePresentation(selection: Map, presentation_definition: PresentationDefinition, userId: UserId): Promise> { + const hasherAndAlgorithm: HasherAndAlgorithm = { hasher: (input: string) => createHash('sha256').update(input).digest(), algorithm: HasherAlgorithm.Sha256 } - + /** - * - * @param paths example: [ '$.credentialSubject.image', '$.credentialSubject.grade', '$.credentialSubject.val.x' ] - * @returns example: { credentialSubject: { image: true, grade: true, val: { x: true } } } - */ + * + * @param paths example: [ '$.credentialSubject.image', '$.credentialSubject.grade', '$.credentialSubject.val.x' ] + * @returns example: { credentialSubject: { image: true, grade: true, val: { x: true } } } + */ const generatePresentationFrameForPaths = (paths) => { const result = {}; @@ -403,10 +293,11 @@ export class OpenidForPresentationService implements OutboundCommunication { }); return result; }; - let vcListRes = await getAllVerifiableCredentials(userDid); - if (vcListRes.err) { - throw "Failed to fetch credentials"; - } + const user = (await getUser(userId)).unwrap(); + let vcListRes = await getAllVerifiableCredentials(user.did); + if (vcListRes.err) { + throw "Failed to fetch credentials"; + } const allSelectedCredentialIdentifiers = Array.from(selection.values()); const filteredVCEntities = vcListRes @@ -435,15 +326,15 @@ export class OpenidForPresentationService implements OutboundCommunication { else { selectedVCs.push(vcEntity.credential); } - + } - - const fetchedState = this.states.get(userDid); + + const fetchedState = this.states.get(userId.id); console.log(fetchedState); const { audience, nonce } = fetchedState; - const result = await this.walletKeystoreManagerService.signJwtPresentation(userDid, nonce, audience, selectedVCs); + const result = await this.walletKeystoreManagerService.signJwtPresentation(userId, nonce, audience, selectedVCs); if (!result.ok) { return Err({ action: SignatureAction.signJwtPresentation, @@ -456,31 +347,31 @@ export class OpenidForPresentationService implements OutboundCommunication { return Ok(result.val.vpjwt); } - private async generateAuthorizationResponse(userDid: string, selection: Map): Promise> { - console.log("generateAuthorizationResponse userDid = ", userDid) + private async generateAuthorizationResponse(userId: UserId, selection: Map): Promise> { + console.log("generateAuthorizationResponse userId = ", userId) const allSelectedCredentialIdentifiers = Array.from(selection.values()); - const { did } = (await getUserByDID(userDid)).unwrap(); + const { did } = (await getUser(userId)).unwrap(); console.log("Verifiable credentials map = ", selection) - let vcListRes = await getAllVerifiableCredentials(did); + const user = (await getUser(userId)).unwrap(); + let vcListRes = await getAllVerifiableCredentials(user.did); if (vcListRes.err) { throw "Failed to fetch credentials" } const filteredVCEntities = vcListRes.unwrap() - .filter((vc) => + .filter((vc) => allSelectedCredentialIdentifiers.includes(vc.credentialIdentifier) ); - const filteredVCJwtList = filteredVCEntities.map((vc) => vc.credential); - + try { - const fetchedState = this.states.get(userDid); - const vp_token_result = await this.generateVerifiablePresentation(selection, fetchedState.presentation_definition, userDid); + const fetchedState = this.states.get(userId.id); + const vp_token_result = await this.generateVerifiablePresentation(selection, fetchedState.presentation_definition, userId); if (vp_token_result.err) { return Err(vp_token_result.val); } const vp_token: string = vp_token_result.val as string; - const {presentation_definition, response_uri, state} = this.states.get(userDid); + const {presentation_definition, response_uri, state} = this.states.get(userId.id); // console.log("vp token = ", vp_token) // console.log("Presentation definition from state is = "); // console.dir(presentation_definition, { depth: null }); @@ -488,9 +379,9 @@ export class OpenidForPresentationService implements OutboundCommunication { if(matchesPresentationDefinitionRes == null) { throw new Error("Credentials presented do not match presentation definition requested"); } - + const {presentationSubmission} = matchesPresentationDefinitionRes; - + // let counter = 0 // for (let i = 0; i < presentationSubmission.descriptor_map.length; i++) { @@ -549,7 +440,7 @@ export class OpenidForPresentationService implements OutboundCommunication { format: "jwt_vp" }); - const verificationState = this.states.get(userDid); + const verificationState = this.states.get(userId.id); if (verificationState && verificationState.camera_was_used) { return Ok({ }) } @@ -560,209 +451,4 @@ export class OpenidForPresentationService implements OutboundCommunication { } } - /** - * Extract a Presentation Definition contained in an Authorization Request URL. - * The Presentation Definition may be contained as a plain, uri-encoded JSON object in the presentation_definition parameter, - * or as the response of an API indicated on the presentation_definition_uri parameter. - * Usage of both presentation_definition and presentation_definition_uri parameters is invalid. - * The function checks which of the two url parameters is present, and handles fetching appropriately. - * After a presentation definition has been fetched, its validity is examined. - * If the presentation definition is valid, it is returned. - * @param authorizationRequestURL - * @returns PresentationDefinition - * @throws InvalidAuthorizationRequestURLError - * @throws InvalidPresentationDefinitionURIError - * @throws InvalidPresentationDefinitionError - */ - private async fetchPresentationDefinition(authorizationRequestURL: URL): Promise { - - const searchParams = authorizationRequestURL.searchParams; - console.log("Params = ", searchParams) - let presentation_definition = JSON.parse(searchParams.get("presentation_definition")); - let presentation_definition_uri = searchParams.get("presentation_definition_uri"); - - const request = searchParams.get("request"); - console.log("Request payload = ", JSON.parse(base64url.decode(request.split('.')[1]))) - const requestPayload: any = request ? JSON.parse(base64url.decode(request.split('.')[1])) : null; - if(requestPayload && requestPayload.presentation_definition) - presentation_definition = requestPayload.presentation_definition; - if(requestPayload && requestPayload.presentation_definition_uri) - presentation_definition_uri = requestPayload.presentation_definition_uri; - - if(presentation_definition && presentation_definition_uri) { - const error = "Both presentation_definition and presentation_definition_uri parameters in authorization request URL"; - console.error(error); - throw new Error(`Invalid Authorization Request URL: ${error}`); - } - - if(!presentation_definition && !presentation_definition_uri) { - const error = "Neither presentation_definition nor presentation_definition_uri parameters in authorization request URL"; - console.error(error); - throw new Error(`Invalid Authorization Request URL: ${error}`); - } - - let presentationDefinition: PresentationDefinition; - if(presentation_definition) { - presentationDefinition = presentation_definition; - console.log("Parsed presentation definition = " , presentationDefinition) - } - else { - - try { - presentationDefinition = await this.fetchPresentationDefinitionUri(presentation_definition_uri); - } - catch(error) { - console.error(`Error fetching presentation definition from URI: ${error}`); - throw new Error(`Error fetching presentation definition from URI: ${error}`); - } - } - // TODO: Check Presentation Definition validity - return presentationDefinition; - - } - - private async fetchPresentationDefinitionUri(uri: string): Promise { - - // test if PresentationDefinitionUri is malformed string - try { - new URL(uri); - } - catch(error) { - console.error(`Presentation Definition URI is invalid.`) - throw new Error(`Invalid PresentationDefinitionURI: ${error}`); - } - - const fetchPresentationDefinitionRes = await axios.get(uri.toString()); - if(fetchPresentationDefinitionRes.status !== 200) { - console.error(`Error fetching Presentation Definition from URI: ${fetchPresentationDefinitionRes.data}`); - throw new Error(`Error fetching Presentation Definition from URI`); - } - - return fetchPresentationDefinitionRes.data; - } - - - /** - * Handle Authorization Request search Parameters. - * @param authorizationRequest a string of the authorization request URL - * @returns An object containing Authorization Request Parameters - */ - private async authorizationRequestSearchParams(authorizationRequest: string) { - - // let response_type, client_id, redirect_uri, scope, response_mode, presentation_definition, nonce; - - // Attempt to convert authorizationRequest to URL form, in order to parse searchparams easily - // An error will be thrown if the URL is invalid - let authorizationRequestUrl: URL; - try { - authorizationRequestUrl = new URL(authorizationRequest); - } - catch(error) { - throw new Error(`Invalid Authorization Request URL: ${error}`); - } - - // const variables are REQUIRED authorization request parameters and they must exist outside the "request" parameter - const response_type = authorizationRequestUrl.searchParams.get("response_type"); - const client_id = authorizationRequestUrl.searchParams.get("client_id"); - const response_uri = authorizationRequestUrl.searchParams.get("response_uri") ?? authorizationRequestUrl.searchParams.get("redirect_uri"); - const scope = authorizationRequestUrl.searchParams.get("scope"); - let response_mode = authorizationRequestUrl.searchParams.get("response_mode"); - let nonce = authorizationRequestUrl.searchParams.get("nonce"); - let state = authorizationRequestUrl.searchParams.get("state") as string | null; - let request_uri = authorizationRequestUrl.searchParams.get("request_uri") as string | null; - const request = authorizationRequestUrl.searchParams.get("request"); - - - try { - if(request) { - let requestPayload: any; - try { - requestPayload = JSON.parse(base64url.decode(request.split('.')[1])); - } - catch(error) { - throw new Error(`Invalid Request parameter: Request is not a jwt. Details: ${error}`); - } - - if(requestPayload.response_type && requestPayload.response_type !== response_type) { - throw new Error('Request JWT response_type and authorization request response_type search param do not match'); - } - - if(requestPayload.scope && requestPayload.scope !== scope) { - throw new Error('Request JWT scope and authorization request scope search param do not match'); - } - - if(requestPayload.client_id && requestPayload.client_id !== client_id) { - throw new Error('Request JWT client_id and authorization request client_id search param do not match'); - } - - if(requestPayload.response_uri && requestPayload.response_uri !== response_uri) { - throw new Error('Request JWT redirect_uri and authorization request redirect_uri search param do not match'); - } - - if(requestPayload.response_mode) - response_mode = requestPayload.response_mode; - - if(requestPayload.nonce) - nonce = requestPayload.nonce - } - } - catch(error) { - throw new Error(`Error decoding request search parameter: ${error}`); - } - - let presentation_definition: PresentationDefinition | null; - try { - presentation_definition = await this.fetchPresentationDefinition(authorizationRequestUrl); - } - catch(error) { - console.error(`Error fetching Presentation Definition: ${error}`); - } - - // Finally, check if all required variables have been given - - if(response_type !== "vp_token" && response_type !== "id_token") { - console.error(`Expected response_type = vp_token or id_token, got ${response_type}`); - throw new Error('Invalid response type'); - } - - if(client_id === null) { - throw new Error('Client ID not given'); - } - - if(response_uri === null) { - throw new Error('response_uri not given'); - } - - if(scope !== "openid") { - console.error(`Expected scope = openid, got ${scope}`); - throw new Error('Invalid scope'); - } - - if(response_mode !== "direct_post") { - console.error(`Expected response_mode = direct_post, got ${response_mode}`); - throw new Error('Invalid response mode'); - } - - if(nonce === null) { - throw new Error('Nonce not given'); - } - - // if(!presentation_definition) { - // throw new Error('Presentation Definition not given'); - // } - - return { - client_id, - response_type, - scope, - response_uri, - response_mode, - nonce, - presentation_definition, - state, - request_uri - } - - } - } diff --git a/src/services/SocketManagerService.ts b/src/services/SocketManagerService.ts index 148e2fc..2e017b0 100644 --- a/src/services/SocketManagerService.ts +++ b/src/services/SocketManagerService.ts @@ -1,12 +1,12 @@ import { injectable } from "inversify"; import { ExpectingSocketMessageErr, SocketManagerServiceInterface } from "./interfaces"; -import { Application } from "express"; import * as WebSocket from 'ws'; import http from 'http'; import { Err, Ok, Result } from "ts-results"; import { ServerSocketMessage, ClientSocketMessage, SignatureAction } from "./shared.types"; import { jwtVerify } from "jose"; import config from "../../config"; +import { UserId } from "../entities/user.entity"; const openSockets = new Map(); @@ -34,7 +34,7 @@ export class SocketManagerService implements SocketManagerServiceInterface { return; } const { payload } = await jwtVerify(appToken, secret); - openSockets.set(payload.did as string, ws); + openSockets.set(payload.uuid as string, ws); ws.send(JSON.stringify({ type: "FIN_INIT" })); console.log("Handshake established"); } @@ -48,14 +48,14 @@ export class SocketManagerService implements SocketManagerServiceInterface { }); } - async send(userDid: string, message: ServerSocketMessage): Promise> { - const ws = openSockets.get(userDid); + async send(userId: UserId, message: ServerSocketMessage): Promise> { + const ws = openSockets.get(userId.id); ws.send(JSON.stringify(message)); return Ok.EMPTY; } - async expect(userDid: string, message_id: string, action: SignatureAction): Promise> { - const ws = openSockets.get(userDid); + async expect(userId: UserId, message_id: string, action: SignatureAction): Promise> { + const ws = openSockets.get(userId.id); return new Promise((resolve, reject) => { ws.onmessage = event => { try { @@ -79,4 +79,4 @@ export class SocketManagerService implements SocketManagerServiceInterface { -} \ No newline at end of file +} diff --git a/src/services/VerifierRegistryService.ts b/src/services/VerifierRegistryService.ts index 6f3f2c2..76d5267 100644 --- a/src/services/VerifierRegistryService.ts +++ b/src/services/VerifierRegistryService.ts @@ -59,4 +59,4 @@ export class VerifierRegistryService { async getAllVerifiers() { return this.verifierRegistry; } -} \ No newline at end of file +} diff --git a/src/services/W3CDidKeyUtilityService.ts b/src/services/W3CDidKeyUtilityService.ts index a68445a..27e6d85 100644 --- a/src/services/W3CDidKeyUtilityService.ts +++ b/src/services/W3CDidKeyUtilityService.ts @@ -38,4 +38,4 @@ export class W3CDidKeyUtilityService implements DidKeyUtilityService { return { did: didDocument.id, key: key }; } -} \ No newline at end of file +} diff --git a/src/services/WalletKeystoreManagerService.ts b/src/services/WalletKeystoreManagerService.ts index 59030b7..97d26e6 100644 --- a/src/services/WalletKeystoreManagerService.ts +++ b/src/services/WalletKeystoreManagerService.ts @@ -3,7 +3,7 @@ import { AdditionalKeystoreParameters, DidKeyUtilityService, RegistrationParams, import { Err, Ok, Result } from "ts-results"; import 'reflect-metadata'; import { TYPES } from "./types"; -import { WalletType, getUserByDID } from "../entities/user.entity"; +import { UserId, WalletType, getUser } from "../entities/user.entity"; /** * This class is responsible for deciding which WalletKeystore will be used each time depending on the user @@ -17,15 +17,14 @@ export class WalletKeystoreManagerService implements WalletKeystoreManager { @inject(TYPES.DidKeyUtilityService) private didKeyUtilityService: DidKeyUtilityService ) { } - async initializeWallet(registrationParams: RegistrationParams): Promise> { + async initializeWallet(registrationParams: RegistrationParams): Promise> { const fcmToken = registrationParams.fcm_token ? registrationParams.fcm_token : ""; // depending on additionalParameters, decide to use the corresponding keystore service - if (registrationParams.keys && registrationParams.privateData) { + if (registrationParams.privateData) { return Ok({ fcmToken, - keys: Buffer.from(JSON.stringify(registrationParams.keys)), - did: registrationParams.keys.did, + keys: Buffer.from(""), displayName: registrationParams.displayName, privateData: Buffer.from(registrationParams.privateData), walletType: WalletType.CLIENT @@ -34,11 +33,10 @@ export class WalletKeystoreManagerService implements WalletKeystoreManager { else { try { console.log("Regular database") - const { did, key } = await this.didKeyUtilityService.generateKeyPair(); + const { key } = await this.didKeyUtilityService.generateKeyPair(); return Ok({ fcmToken, keys: Buffer.from(JSON.stringify(key)), - did: did, displayName: registrationParams.displayName, privateData: Buffer.from(""), walletType: WalletType.DB @@ -49,41 +47,29 @@ export class WalletKeystoreManagerService implements WalletKeystoreManager { } } } - - async createIdToken(userDid: string, nonce: string, audience: string, additionalParameters?: AdditionalKeystoreParameters): Promise> { - const userRes = await getUserByDID(userDid) - if (userRes.err) { - return Err(WalletKeystoreErr.KEYS_UNAVAILABLE); - } - const user = userRes.unwrap(); - if (user.walletType != WalletType.DB) - return await this.clientWalletKeystoreService.createIdToken(userDid, nonce, audience, additionalParameters); - else - return await this.databaseKeystoreService.createIdToken(userDid, nonce, audience, additionalParameters); - } - async signJwtPresentation(userDid: string, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters?: AdditionalKeystoreParameters): Promise> { - const userRes = await getUserByDID(userDid) + async signJwtPresentation(userId: UserId, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters?: AdditionalKeystoreParameters): Promise> { + const userRes = await getUser(userId) if (userRes.err) { return Err(WalletKeystoreErr.KEYS_UNAVAILABLE); } const user = userRes.unwrap(); if (user.walletType != WalletType.DB) - return await this.clientWalletKeystoreService.signJwtPresentation(userDid, nonce, audience, verifiableCredentials, additionalParameters); + return await this.clientWalletKeystoreService.signJwtPresentation(userId, nonce, audience, verifiableCredentials, additionalParameters); else - return await this.databaseKeystoreService.signJwtPresentation(userDid, nonce, audience, verifiableCredentials, additionalParameters); + return await this.databaseKeystoreService.signJwtPresentation(userId, nonce, audience, verifiableCredentials, additionalParameters); } - async generateOpenid4vciProof(userDid: string, audience: string, nonce: string, additionalParameters?: AdditionalKeystoreParameters): Promise> { - const userRes = await getUserByDID(userDid) + async generateOpenid4vciProof(userId: UserId, audience: string, nonce: string, additionalParameters?: AdditionalKeystoreParameters): Promise> { + const userRes = await getUser(userId) if (userRes.err) { return Err(WalletKeystoreErr.KEYS_UNAVAILABLE); } const user = userRes.unwrap(); if (user.walletType != WalletType.DB) - return await this.clientWalletKeystoreService.generateOpenid4vciProof(userDid, audience, nonce, additionalParameters); + return await this.clientWalletKeystoreService.generateOpenid4vciProof(userId, audience, nonce, additionalParameters); else - return await this.databaseKeystoreService.generateOpenid4vciProof(userDid, audience, nonce, additionalParameters); + return await this.databaseKeystoreService.generateOpenid4vciProof(userId, audience, nonce, additionalParameters); } -} \ No newline at end of file +} diff --git a/src/services/interfaces.ts b/src/services/interfaces.ts index 43211c7..65e62cd 100644 --- a/src/services/interfaces.ts +++ b/src/services/interfaces.ts @@ -5,17 +5,14 @@ import { OutboundRequest } from "./types/OutboundRequest"; import http from 'http'; import { WalletKeystoreRequest, ServerSocketMessage, SignatureAction, ClientSocketMessage } from "./shared.types"; import { WalletKey } from "@wwwallet/ssi-sdk"; -import { WalletType } from "../entities/user.entity"; +import { UserId, WalletType } from "../entities/user.entity"; export interface OpenidCredentialReceiving { - - getAvailableSupportedCredentials(userDid: string, legalPersonIdentifier: string): Promise> - generateAuthorizationRequestURL(userDid: string, credentialOfferURL?: string, legalPersonIdentifier?: string): Promise<{ redirect_to?: string, preauth?: boolean, ask_for_pin?: boolean }>; - - handleAuthorizationResponse(userDid: string, authorizationResponseURL: string): Promise>; - requestCredentialsWithPreAuthorizedGrant(userDid: string, user_pin: string): Promise<{error?: string}>; - - getIssuerState(userDid: string): Promise<{ issuer_state?: string, error?: Error }> + + generateAuthorizationRequestURL(userId: UserId, credentialOfferURL?: string, legalPersonIdentifier?: string): Promise<{ redirect_to?: string, preauth?: boolean, ask_for_pin?: boolean }>; + + handleAuthorizationResponse(userId: UserId, authorizationResponseURL: string): Promise>; + requestCredentialsWithPreAuthorizedGrant(userId: UserId, user_pin: string): Promise<{error?: string}>; } export enum IssuanceErr { @@ -38,24 +35,22 @@ export type AdditionalKeystoreParameters = { export type RegistrationParams = { fcm_token?: string; keys?: WalletKey; - privateData?: any; + privateData?: Buffer; displayName: string; } export interface WalletKeystoreManager { - initializeWallet(registrationParams: RegistrationParams): Promise>; + initializeWallet(registrationParams: RegistrationParams): Promise>; - createIdToken(userDid: string, nonce: string, audience: string, additionalParameters?: AdditionalKeystoreParameters): Promise>; - signJwtPresentation(userDid: string, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters?: AdditionalKeystoreParameters): Promise>; - generateOpenid4vciProof(userDid: string, audience: string, nonce: string, additionalParameters?: AdditionalKeystoreParameters): Promise>; + signJwtPresentation(userId: UserId, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters?: AdditionalKeystoreParameters): Promise>; + generateOpenid4vciProof(userId: UserId, audience: string, nonce: string, additionalParameters?: AdditionalKeystoreParameters): Promise>; } export interface WalletKeystore { - createIdToken(userDid: string, nonce: string, audience: string, additionalParameters?: AdditionalKeystoreParameters): Promise>; - signJwtPresentation(userDid: string, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters?: AdditionalKeystoreParameters): Promise>; - generateOpenid4vciProof(userDid: string, audience: string, nonce: string, additionalParameters?: AdditionalKeystoreParameters): Promise>; + signJwtPresentation(userId: UserId, nonce: string, audience: string, verifiableCredentials: any[], additionalParameters?: AdditionalKeystoreParameters): Promise>; + generateOpenid4vciProof(userId: UserId, audience: string, nonce: string, additionalParameters?: AdditionalKeystoreParameters): Promise>; } export enum WalletKeystoreErr { @@ -68,17 +63,9 @@ export enum WalletKeystoreErr { export interface OutboundCommunication { - initiateVerificationFlow(username: string, verifierId: number, scopeName: string): Promise<{ redirect_to?: string }>; - - handleRequest(userDid: string, requestURL: string, camera_was_used: boolean): Promise>; - - /** - * - * @param userDid - * @param req - * @param selection (key: descriptor_id, value: verifiable credential identifier) - */ - sendResponse(userDid: string, selection: Map): Promise>; + initiateVerificationFlow(userId: UserId, verifierId: number, scopeName: string): Promise<{ redirect_to?: string }>; + handleRequest(userId: UserId, requestURL: string, camera_was_used: boolean): Promise>; + sendResponse(userId: UserId, selection: Map): Promise>; } @@ -103,6 +90,6 @@ export enum ExpectingSocketMessageErr { export interface SocketManagerServiceInterface { register(server: http.Server); - send(userDid: string, message: ServerSocketMessage): Promise>; - expect(userDid: string, message_id: string, action: SignatureAction): Promise>; -} \ No newline at end of file + send(userId: UserId, message: ServerSocketMessage): Promise>; + expect(userId: UserId, message_id: string, action: SignatureAction): Promise>; +} diff --git a/src/services/inversify.config.ts b/src/services/inversify.config.ts index 7cfb0e8..ef5e049 100644 --- a/src/services/inversify.config.ts +++ b/src/services/inversify.config.ts @@ -60,4 +60,4 @@ appContainer.bind(TYPES.VerifierRegistryService) appContainer.bind(TYPES.SocketManagerService) .to(SocketManagerService) -export { appContainer } \ No newline at end of file +export { appContainer } diff --git a/src/services/shared.types.ts b/src/services/shared.types.ts index 817a37a..6df67fc 100644 --- a/src/services/shared.types.ts +++ b/src/services/shared.types.ts @@ -1,12 +1,10 @@ export enum SignatureAction { generateOpenid4vciProof = "generateOpenid4vciProof", - createIdToken = "createIdToken", signJwtPresentation = "signJwtPresentation" } export type WalletKeystoreRequest = ( { action: SignatureAction.generateOpenid4vciProof, audience: string, nonce: string } - | { action: SignatureAction.createIdToken, nonce: string, audience: string } | { action: SignatureAction.signJwtPresentation, nonce: string, audience: string, verifiableCredentials: any[] } ); @@ -20,7 +18,6 @@ export type ServerSocketMessage = { export type WalletKeystoreResponse = ( { action: SignatureAction.generateOpenid4vciProof, proof_jwt: string } - | { action: SignatureAction.createIdToken, id_token: string } | { action: SignatureAction.signJwtPresentation, vpjwt: string } ); diff --git a/src/services/types.ts b/src/services/types.ts index 96c8bb0..d282639 100644 --- a/src/services/types.ts +++ b/src/services/types.ts @@ -21,4 +21,4 @@ const TYPES = { }; -export { TYPES }; \ No newline at end of file +export { TYPES }; diff --git a/src/types/errors/user.errors.ts b/src/types/errors/user.errors.ts index 3faf957..f677817 100644 --- a/src/types/errors/user.errors.ts +++ b/src/types/errors/user.errors.ts @@ -2,4 +2,4 @@ export type FetchUserErrors = 'NOT_FOUND' | 'DB_ERROR'; export type RegisterUserErrors = 'ALREADY_EXISTS' | "FILESYSTEM_ERROR"; -export type StoreVcErrors = 'DB_ERROR'; \ No newline at end of file +export type StoreVcErrors = 'DB_ERROR'; diff --git a/src/types/index.d.ts b/src/types/index.d.ts index 8004696..6d3171e 100644 --- a/src/types/index.d.ts +++ b/src/types/index.d.ts @@ -4,9 +4,9 @@ import { AppTokenUser } from "../middlewares/auth.middleware"; export {} declare global { - namespace Express { - export interface Request { - user?: AppTokenUser; - } - } -} \ No newline at end of file + namespace Express { + export interface Request { + user?: AppTokenUser; + } + } +} diff --git a/src/types/oid4vci/index.ts b/src/types/oid4vci/index.ts index 4a25fa8..af7a550 100644 --- a/src/types/oid4vci/index.ts +++ b/src/types/oid4vci/index.ts @@ -1,2 +1,2 @@ export * from "./oid4vci.types"; -export * from "./oid4vci.zod"; \ No newline at end of file +export * from "./oid4vci.zod"; diff --git a/src/types/oid4vci/oid4vci.types.ts b/src/types/oid4vci/oid4vci.types.ts index 97a424d..86f8f1b 100644 --- a/src/types/oid4vci/oid4vci.types.ts +++ b/src/types/oid4vci/oid4vci.types.ts @@ -29,7 +29,7 @@ export type CredentialOffer = { }, "urn:ietf:params:oauth:grant-type:pre-authorized_code"?: { "pre-authorized_code": string, - "user_pin_required": boolean + "user_pin_required": boolean } } } @@ -38,7 +38,7 @@ export type CredentialOffer = { export type CredentialOfferCredential = { format: VerifiableCredentialFormat, - types: string[] // VerifiableCredential, UniversityDegreeCredential + types: string[] // VerifiableCredential, UniversityDegreeCredential } export type CredentialIssuerMetadata = { @@ -73,7 +73,7 @@ export type CredentialSupportedBase = { cryptographic_binding_methods_supported?: string[], cryptographic_suites_supported?: string[], display?: Display[] -} +} // additional attributes for credentials_supported object for the 'jwt_vc_json' format specifically // https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html#name-objects-comprising-credenti @@ -98,36 +98,36 @@ export type ProofHeader = { alg: string; /** - * CONDITIONAL. JWT header containing the key ID. - * If the credential shall be bound to a DID, the kid refers to a DID URL which identifies a particular key in the DID Document that the credential shall be bound to. - */ + * CONDITIONAL. JWT header containing the key ID. + * If the credential shall be bound to a DID, the kid refers to a DID URL which identifies a particular key in the DID Document that the credential shall be bound to. + */ kid?: string; /** - * CONDITIONAL. JWT header containing the key material the new credential shall be bound to. MUST NOT be present if kid is present. - * REQUIRED for EBSI DID Method for Natural Persons. - */ + * CONDITIONAL. JWT header containing the key material the new credential shall be bound to. MUST NOT be present if kid is present. + * REQUIRED for EBSI DID Method for Natural Persons. + */ jwk?: JWK; } export type ProofPayload = { /** - * REQUIRED. MUST contain the client_id of the sender. - * in DID format - */ + * REQUIRED. MUST contain the client_id of the sender. + * in DID format + */ iss: string; /** - * REQUIRED. MUST contain the issuer URL of the credential issuer. - */ + * REQUIRED. MUST contain the issuer URL of the credential issuer. + */ aud: string; iat: number; /** - * REQUIRED. MUST be Token Response c_nonce as provided by the issuer. - */ + * REQUIRED. MUST be Token Response c_nonce as provided by the issuer. + */ nonce: string; } @@ -141,4 +141,4 @@ export enum VerifiableCredentialFormat { export enum ProofType { JWT = "jwt" -} \ No newline at end of file +} diff --git a/src/util/util.ts b/src/util/util.ts index 514c22e..ebe4013 100644 --- a/src/util/util.ts +++ b/src/util/util.ts @@ -1,12 +1,16 @@ - -import * as randomstring from 'randomstring'; import * as crypto from 'crypto'; import base64url from "base64url"; +import { Err, Ok, Result } from 'ts-results'; + + +export function isResult(a: T | Result): a is Result { + return a instanceof Object && "val" in a && "ok" in a && "err" in a; +} /** - * - * @param type is the 'type' attribute of a VC in JSON-LD format - */ +* +* @param type is the 'type' attribute of a VC in JSON-LD format +*/ export function decideVerifiableCredentialType(type: string[]): 'Diploma' | 'Attestation' | 'Presentation' { if (type.includes('VerifiablePresentation')) return 'Presentation'; @@ -15,10 +19,10 @@ export function decideVerifiableCredentialType(type: string[]): 'Diploma' | 'Att for (const t of type) { const lower = t.toLowerCase(); if (lower.includes('europass') || - lower.includes('universitydegree') || - lower.includes('diploma')) { + lower.includes('universitydegree') || + lower.includes('diploma')) { - return 'Diploma'; + return 'Diploma'; } } @@ -26,19 +30,19 @@ export function decideVerifiableCredentialType(type: string[]): 'Diploma' | 'Att } export function jsonStringifyTaggedBinary(value: any): string { - return JSON.stringify(value, replacerBufferToTaggedBase64Url); + return JSON.stringify(value, replacerBufferToTaggedBase64Url); } export function jsonParseTaggedBinary(json: string): any { - return JSON.parse(json, reviverTaggedBase64UrlToBuffer); + return JSON.parse(json, reviverTaggedBase64UrlToBuffer); } export function replacerBufferToTaggedBase64Url(key: string, value: any): any { - if (this[key] instanceof Buffer) { - return { '$b64u': base64url.encode(this[key]) }; - } else { - return value; - } + if (this[key] instanceof Buffer) { + return { '$b64u': base64url.encode(this[key]) }; + } else { + return value; + } } export function reviverTaggedBase64UrlToBuffer(key: string, value: any): any { @@ -49,6 +53,41 @@ export function reviverTaggedBase64UrlToBuffer(key: string, value: any): any { } } + +export type EtagUpdate = { + expectTag: string, + newValue: T, +} + +/** + * Return `newValue` if and only if `comparator` returns a value strictly equal + * (`===`) to `expectTag` given `currentValue`. + */ +export function checkedUpdate( + expectTag: U, + tagFunc: (value: T) => U, + { currentValue, newValue }: { currentValue: T, newValue: T }, +): Result { + if (currentValue === newValue) { + // Change has already been applied (if T supports === equality) + return Ok(newValue); + + } else { + const currentTag = tagFunc(currentValue) + if (currentTag === expectTag) { + // Expected change + return Ok(newValue); + + } else { + if (currentTag === tagFunc(newValue)) { + // Change has already been applied (if T does not support === equality) + return Ok(newValue); + } + } + return Err.EMPTY; + } +} + export function isValidUri(uri: string): boolean { try { return Boolean(new URL(uri)); diff --git a/src/webauthn.ts b/src/webauthn.ts index b4ebb3a..3a8461c 100644 --- a/src/webauthn.ts +++ b/src/webauthn.ts @@ -1,7 +1,11 @@ import config from '../config'; -import { WebauthnCredentialEntity } from './entities/user.entity'; +import { UserId, WebauthnCredentialEntity } from './entities/user.entity'; +export function getRpId(): string { + return config.webauthn.rp.id; +} + export function makeCreateOptions({ challenge, prfSalt, @@ -10,7 +14,7 @@ export function makeCreateOptions({ challenge: Buffer, prfSalt?: Buffer, user: { - webauthnUserHandle: string, + uuid: UserId, name: string, displayName: string, webauthnCredentials?: WebauthnCredentialEntity[], @@ -20,7 +24,7 @@ export function makeCreateOptions({ publicKey: { rp: config.webauthn.rp, user: { - id: Buffer.from(user.webauthnUserHandle, "utf8"), + id: user.uuid.asUserHandle(), name: user.name, displayName: user.displayName, }, @@ -60,7 +64,7 @@ export function makeGetOptions({ }) { return { publicKey: { - rpId: config.webauthn.rp.id, + rpId: getRpId(), challenge: challenge, allowCredentials: (user?.webauthnCredentials || []).map(cred => cred.getCredentialDescriptor()), userVerification: "required",