@blamejs/core 0.8.87 → 0.8.89

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -8,6 +8,8 @@ upgrading across more than a few patches at a time.
8
8
 
9
9
  ## v0.8.x
10
10
 
11
+ - v0.8.89 (2026-05-11) — **Hotfix: `b.earlyHints.send()` case-variant link bypass + new `b.mail.srs` Sender Rewriting Scheme**. **Hotfix (PRIMARY)**: pre-v0.8.89, supplying both `link` (lowercase) AND `Link` (capital, or any other case variant) to `b.earlyHints.send()` bypassed the validator. `opts.link` got the dedicated `_validateLink` pass and was assigned to `headers.link`; the trailing header loop then iterated `Object.keys(opts)`, skipped only the exact-match `"link"` key, and for `"Link"` lowercased the name and wrote `headers.link = opts.Link` — overwriting the validated value with unvalidated content. Malformed Link headers (missing `rel=`, unknown relation, oversized) reached `writeEarlyHints()` despite the API contract. The fix collapses all opt keys to a single canonical lowercase map up front; duplicate case-variants of any header (not just `link`) now refuse with `early-hints/duplicate-header` so operators see the collision instead of getting silent winner-take-all behavior. Capital `Link` alone (no lowercase variant) still works — it goes through the same validator. Tests added: case-variant-collision refuse, capital-Link-alone validates, capital-Link with malformed value still throws `bad-link`. **New**: `b.mail.srs.create({ secret, forwarderDomain, expiryDays? })` — Sender Rewriting Scheme (SRS0) implementation for forwarder envelope-from rewriting so the next-hop SPF check passes and bounces route correctly back to the original sender. Returns `{ rewrite, reverse }`. `rewrite(addr)` produces an SRS-encoded `SRS0=HHHH=TT=domain=local@forwarder.example` form; `reverse(srs)` decodes back to the original sender, verifying the HMAC-SHA-256 short-tag (operator-supplied secret), the day-stamp expiry window (default 30 days), and the canonical 4-field SRS0 grammar. Refuses tampered tags via `srs/bad-tag`, expired rewrites via `srs/expired`, double-SRS-encoding via `srs/already-rewritten` (SRS1 wrapping deferred; operator demand TBD), and bad address shapes via `srs/bad-address`. HMAC uses `b.crypto.timingSafeEqual` for tag comparison so the verification side stays constant-time against operator-controlled tag inputs.
12
+ - v0.8.88 (2026-05-11) — **Hotfix: `b.auth.fal.meets()` authorization-correctness bug + new `b.earlyHints` RFC 8297 helper**. **Hotfix (PRIMARY)**: `b.auth.fal.meets(actualBand, requiredBand)` previously compared raw ranks (`_bandRank(actual) >= _bandRank(required)`) without validating either input. Unknown bands mapped to rank `0`, so `meets("FAL1", "FALX")` returned `true` (because `1 >= 0`) and `meets("bad", "bad")` returned `true` (because `0 >= 0`) — both contradicting the documented contract that invalid bands MUST return `false`. Operators calling `meets()` directly for authorization decisions could grant access on malformed input pairs. The new implementation validates both bands via `isValidBand()` first; any invalid band on either side returns `false`. The `requireFal()` guard was already correct (it used `meets()` after a separate `isValidBand(actualBand)` check, but a defense-in-depth pass into `meets()` itself now catches direct callers too). Tests added: 7 invalid-input shapes (`FALX` actual, `FALX` required, `bad`/`bad`, `FALX`/`FALX`, null on either side, both null). **New**: `b.earlyHints.send(res, { link })` — RFC 8297 103 Early Hints interim-response helper. Wraps Node 18.11+'s built-in `res.writeEarlyHints()` with: link-header validation (RFC 8288 form with one of `preload` / `preconnect` / `prefetch` / `dns-prefetch` / `modulepreload` / `prerender` / `next` / `prev`); silent no-op when the response object lacks `writeEarlyHints` (HTTP/1.0, mocks, older Node); refusal of per-request-state headers per RFC 8297 §3 (`set-cookie`, `authorization`, `content-length`, `content-type`, etc.). Operators use it to start browser-side preload of CSS / JS / fonts / preconnect origins in parallel with the server-side composition of the final response.
11
13
  - v0.8.87 (2026-05-11) — **NIST 800-63-4 FAL classifier + RFC 7505 Null-MX helper + Gmail FBL Feedback-ID builder + vendor-update.sh stale-entry cleanup**. **`b.auth.fal`** lands as the federation-side counterpart to the existing `b.auth.aal` band classifier. `fromAssertion({ channel, encrypted?, replayProtected?, hokBinding? })` classifies an incoming federation assertion as `"FAL1"` / `"FAL2"` / `"FAL3"` per NIST 800-63C-4: Holder-of-Key (mTLS / DPoP / SAML HoK) with replay-protection → FAL3; back-channel OR encrypted front-channel with replay-protection → FAL2; bare bearer front-channel → FAL1. Conservative: missing replay-protection on a back-channel assertion downgrades to FAL1 because §5.2 requires nonce / jti binding before back-channel can claim FAL2. `requireFal(minimumBand)` builds a band-check guard that throws `auth/fal-insufficient` for stale-band requests; compose with the request-scope auth state to gate sensitive operations. **`b.network.dns.isNullMx(records)`** lands as the RFC 7505 Null-MX classifier: returns `true` when an operator-supplied MX-record array signals "this domain does not accept email" (single record, priority 0, exchange `.` per RFC 7505 §3). Operators send-side check this before delivery to skip domains that have explicitly opted out — `node:dns.resolveMx` returns `exchange: ""` for the same RDATA, so the classifier accepts both shapes. **`b.mail.feedbackId({ campaignId, customerId, mailType, senderId })`** builds a Gmail Feedback-Loop (FBL) Feedback-ID header value as the canonical 4-tuple `CampaignID:CustomerID:MailType:SenderID`. Refuses missing / empty fields, fields containing `:` (would corrupt the field separator), fields >64 chars (Gmail FBL truncation threshold), and control-char content (CR/LF header-injection defense). Setting Feedback-ID on outbound mail lets Gmail Postmaster Tools surface per-campaign abuse-rate metrics keyed by the operator's vocabulary instead of by SMTP envelope-sender alone. **vendor-update.sh cleanup**: `scripts/vendor-update.sh --check` removed the stale `argon2` entry from `VENDORED_PACKAGES`. argon2 was removed from `lib/vendor/` back in v0.4.x when Node 24's built-in `crypto.argon2*` API replaced the third-party prebuilds (per `lib/argon2-builtin.js`); the script still listed it in the check array, producing a false "UPDATE AVAILABLE" line for an unvendored package. The case-block error path that still says "argon2 is no longer vendored" stays so anyone running `./scripts/vendor-update.sh argon2` gets the operator-friendly explanation.
12
14
  - v0.8.86 (2026-05-11) — **Sectoral + cybersecurity posture sweep + HTTP-hygiene primitives + npm-publish hotfix**. **npm-publish hotfix**: the v0.8.85 `npm audit signatures` step failed with `npm error found no installed dependencies to audit` because the framework's zero-runtime-deps posture produces an empty install tree; the gate now treats that specific message as success while keeping every other failure mode loud (v0.8.85 npm tarball never published — operators upgrade `0.8.83 → 0.8.86` to pick up the carried v0.8.84 + v0.8.85 surface plus the new v0.8.86 primitives). **10 new compliance postures**: `cmmc-2.0` (DoD Cybersecurity Maturity Model Certification 2.0), `cjis-v6` (FBI CJIS Security Policy v6.0), `iso-27001-2022` + `iso-27002-2022` + `iso-27017` + `iso-27018` + `iso-27701` (ISO/IEC 27001 family), `nist-800-66-r2` (HIPAA Security Rule implementation guidance), `ehds` (European Health Data Space), `circia` (US Cyber Incident Reporting for Critical Infrastructure Act). Cascade defaults set encrypted-backup + signed-audit-chain + TLS 1.3 + vacuum-after-erase for the data-tier postures; `iso-27002-2022` + `circia` defer the data-tier mandate to operator choice. **`b.cacheStatus`** — RFC 9211 Cache-Status response-header builder + parser. `append(prev, entry)` chains the operator's current cache decision onto whatever upstream caches wrote; `entry({...})` formats a single entry; `parse(headerValue)` returns the parsed chain as `[{ cache, params }]` records with `hit`/`stored`/`collapsed` as booleans, `ttl`/`fwdStatus` as numbers, `fwd` as the RFC 9211 §2 enum string, `key`/`detail` as unquoted sf-strings. Operators diagnose CDN/reverse-proxy/app-cache decision chains by reading the header instead of guessing from elapsed-time metrics. **`b.serverTiming`** — W3C Server-Timing response-header builder. `create()` returns a per-request collector with `mark(name, durationMs?, description?)` / `measure(name, fn)` async-timing wrapper / `toHeader()` serializer. Surfaces server-side latency in the browser's Performance API. **`b.middleware.noCache`** — RFC 9111 §5.2.2.5 `Cache-Control: no-store` middleware for auth-gated / individualized response paths. Sets `Cache-Control: no-store`, `Pragma: no-cache` (HTTP/1.0 compatibility), `Vary: Cookie, Authorization` so intermediate caches don't store personalized responses keyed by URL alone. Optional `opts.when(req)` predicate for conditional application; `opts.skipExisting:true` skips when `Cache-Control` is already set.
13
15
  - v0.8.85 (2026-05-11) — **MCP tool registry + tool-call signing + A2A v1 task-exchange surface**. Closes the substantial agent-protocol gaps surfaced by the 2026-05-11 audit's MITRE ATLAS v5.3.0 + A2A v1 cross-walk. **MCP tool registry** lands as `b.mcp.toolRegistry.create({ tools, signingKey, verifyingKey?, alg?, ttlMs? })` — every registered tool gets a signed descriptor blob `{ tool, alg, signature }` (defense against compromised MCP server / descriptor drift) and a `descriptorsManifest()` produces a signed `{ body, signature }` document for operator-side attestation. The registry's `signCall({ toolName, args, nonce?, ttlMs? })` builds + signs an outbound tool-call envelope `{ tool, argsHash, nonce, iat, exp }` (defense against MCP middleman / indirect-prompt-injection synthesizing tool calls); `verifyCall(signed, { args?, seen?, nowMs? })` runs the inverse on inbound — refuses signature mismatch (`mcp/call-verify-failed`), expired envelopes (`mcp/call-expired`), replayed nonces via operator-supplied `seen(nonce)` callback (`mcp/call-replay`), unregistered tools (`mcp/call-unregistered-tool`), and args-hash mismatch when raw args supplied (`mcp/call-args-mismatch`). Default algorithm ML-DSA-87 per the framework's PQC-first rule; Ed25519 / ECDSA / SLH-DSA also available. **A2A v1 task-exchange surface** lands as `b.a2a.tasks.{send, get, cancel}` (client-side JSON-RPC dispatchers — `send` posts `tasks/send` to the peer URL with task validation + https-only refusal; `get` polls `tasks/get`; `cancel` requests `tasks/cancel`) plus `b.a2a.middleware.tasks({ scopes, handler, maxBytes? })` (server-side connect-style middleware — parses inbound JSON-RPC 2.0, enforces method allowlist `[tasks/send, tasks/get, tasks/cancel]` with -32601 method-not-found, enforces per-skill scopes via `req.a2aScopes` with -32001 scope-denied, dispatches to operator handler, maps errors to JSON-RPC -32603, refuses non-POST with 405 + non-JSON content-type with 415) plus `b.a2a.middleware.agentCard({ card, maxAgeSec? })` (serves operator's signed Agent Card at `/.well-known/agent.json` per A2A v1 discovery — 405 on non-GET, Cache-Control max-age operator-tunable).
package/index.js CHANGED
@@ -146,6 +146,7 @@ var dataAct = require("./lib/data-act");
146
146
  var problemDetails = require("./lib/problem-details");
147
147
  var cacheStatus = require("./lib/cache-status");
148
148
  var serverTiming = require("./lib/server-timing");
149
+ var earlyHints = require("./lib/early-hints");
149
150
  var gateContract = require("./lib/gate-contract");
150
151
  var guardCsv = require("./lib/guard-csv");
151
152
  var guardHtml = require("./lib/guard-html");
@@ -377,6 +378,7 @@ module.exports = {
377
378
  problemDetails: problemDetails,
378
379
  cacheStatus: cacheStatus,
379
380
  serverTiming: serverTiming,
381
+ earlyHints: earlyHints,
380
382
  gateContract: gateContract,
381
383
  guardCsv: guardCsv,
382
384
  guardHtml: guardHtml,
package/lib/auth/fal.js CHANGED
@@ -81,13 +81,23 @@ function isValidBand(band) {
81
81
  *
82
82
  * Predicate returning `true` when `actualBand` satisfies the
83
83
  * `requiredBand` floor (FAL3 ≥ FAL2 ≥ FAL1). Invalid band strings
84
- * on either argument return `false`.
84
+ * on either argument return `false` — operators using `meets`
85
+ * directly for authorization decisions never get a "true" verdict
86
+ * out of a malformed input pair.
85
87
  *
86
88
  * @example
87
- * b.auth.fal.meets("FAL3", "FAL2"); // → true
88
- * b.auth.fal.meets("FAL1", "FAL2"); // → false
89
+ * b.auth.fal.meets("FAL3", "FAL2"); // → true
90
+ * b.auth.fal.meets("FAL1", "FAL2"); // → false
91
+ * b.auth.fal.meets("FAL1", "FALX"); // → false (invalid required band)
92
+ * b.auth.fal.meets("bad", "bad"); // → false (both invalid)
89
93
  */
90
94
  function meets(actualBand, requiredBand) {
95
+ // Validate BOTH inputs before comparing ranks. The previous
96
+ // implementation compared raw ranks (`>=`) — unknown bands mapped
97
+ // to rank 0 and `0 >= 0` returned true, contradicting the
98
+ // documented contract and producing false-positive authorization
99
+ // decisions for operators using meets() directly.
100
+ if (!isValidBand(actualBand) || !isValidBand(requiredBand)) return false;
91
101
  return _bandRank(actualBand) >= _bandRank(requiredBand);
92
102
  }
93
103
 
@@ -0,0 +1,212 @@
1
+ "use strict";
2
+ /**
3
+ * @module b.earlyHints
4
+ * @nav HTTP
5
+ * @title RFC 8297 103 Early Hints
6
+ * @order 320
7
+ *
8
+ * @intro
9
+ * RFC 8297 103 Early Hints — interim informational response the
10
+ * server sends BEFORE the final response, telling the browser
11
+ * which subresources it should start preloading while the server
12
+ * is still composing the final HTML / JSON. Browsers (Chrome 103+,
13
+ * Edge 103+, Firefox 120+) honor `Link: rel=preload` /
14
+ * `rel=preconnect` headers in the 103 to kick off resource fetches
15
+ * in parallel with the main render.
16
+ *
17
+ * Operators reach for early-hints when the server has slow upstream
18
+ * dependencies (DB query, downstream API) but already knows the
19
+ * final response will reference specific CSS / JS / fonts /
20
+ * API origins. The 103 turns a single-RTT-bound page load into a
21
+ * parallel resource-prefetch chain.
22
+ *
23
+ * `b.earlyHints.send(res, { link, ... })` writes the interim 103
24
+ * with the supplied headers. The framework wraps Node's built-in
25
+ * `res.writeEarlyHints()` (Node 18.11+) and adds:
26
+ *
27
+ * - input validation (link entries must be RFC 8288 Link-header
28
+ * form: `<uri>; rel=preload[; as=script][; crossorigin=...]`)
29
+ * - silent no-op when the operator-supplied `res` is not an
30
+ * HTTP/1.1+ socket-backed response (HTTP/1.0 clients don't
31
+ * understand 103; serializing one would corrupt the stream)
32
+ * - validation of cacheable header set per RFC 8297 section 3
33
+ * (only headers that hint about the FINAL response are
34
+ * honored; Set-Cookie / authentication-related headers are
35
+ * refused)
36
+ *
37
+ * The 103 does NOT replace the final response — the operator's
38
+ * handler still writes the regular 200/400/etc. status + body.
39
+ * Multiple 103s before the final response are permitted (Node's
40
+ * writeEarlyHints can be called repeatedly).
41
+ *
42
+ * @card
43
+ * RFC 8297 103 Early Hints helper — operator-friendly wrapper around Node's response writeEarlyHints API for browser-side parallel resource-prefetch hints.
44
+ */
45
+
46
+ var validateOpts = require("./validate-opts");
47
+ var { defineClass } = require("./framework-error");
48
+
49
+ var EarlyHintsError = defineClass("EarlyHintsError", { alwaysPermanent: true });
50
+
51
+ // Headers that are SAFE to surface in a 103 are the ones describing
52
+ // the upcoming final response. Refused header names mostly carry
53
+ // per-request state (cookies, auth) that a 103 would prematurely
54
+ // leak or that a 103 cannot honor (Content-Length, Transfer-
55
+ // Encoding, Content-Type all describe THIS interim response, not
56
+ // the final).
57
+ var REFUSED_HEADERS = Object.freeze([
58
+ "set-cookie",
59
+ "authorization",
60
+ "www-authenticate",
61
+ "content-length",
62
+ "content-type",
63
+ "transfer-encoding",
64
+ "connection",
65
+ "upgrade",
66
+ "trailer",
67
+ ]);
68
+
69
+ var LINK_RELATION_RE = /^(preload|preconnect|prefetch|dns-prefetch|modulepreload|prerender|next|prev)$/i;
70
+ var LINK_MAX_BYTES = 4096; // allow:raw-byte-literal — per-link length cap, not bytes
71
+
72
+ /**
73
+ * @primitive b.earlyHints.send
74
+ * @signature b.earlyHints.send(res, opts)
75
+ * @since 0.8.88
76
+ * @status stable
77
+ *
78
+ * Write an RFC 8297 103 Early Hints interim response to `res`.
79
+ * Returns `true` when the 103 was written, `false` when the
80
+ * underlying response does not support early hints (HTTP/1.0, a
81
+ * non-HTTP-shaped object, or the response writeEarlyHints API is
82
+ * missing).
83
+ *
84
+ * `link` is either a single Link-header value string OR an array
85
+ * of strings. Each must follow the RFC 8288 Link-header grammar
86
+ * with a `rel=` parameter naming one of: `preload`, `preconnect`,
87
+ * `prefetch`, `dns-prefetch`, `modulepreload`, `prerender`, `next`,
88
+ * `prev`. Refused: per-link size > 4 KiB, missing `rel=`, unknown
89
+ * relation. Other operator-supplied header keys must NOT be in
90
+ * `REFUSED_HEADERS` (set-cookie / authorization / content-length
91
+ * / etc.) — those carry per-request state a 103 must not surface.
92
+ *
93
+ * @opts
94
+ * link: string | string[], // RFC 8288 Link-header values (REQUIRED)
95
+ *
96
+ * @example
97
+ * b.earlyHints.send(res, {
98
+ * link: [
99
+ * "</style.css>; rel=preload; as=style",
100
+ * "</app.js>; rel=preload; as=script",
101
+ * "<https://cdn.example.com>; rel=preconnect",
102
+ * ],
103
+ * });
104
+ * res.statusCode = 200;
105
+ * res.setHeader("Content-Type", "text/html");
106
+ * res.end(html);
107
+ */
108
+ function send(res, opts) {
109
+ if (!res || typeof res !== "object") {
110
+ throw new EarlyHintsError("early-hints/bad-res",
111
+ "earlyHints.send: res must be an HTTP response object", true);
112
+ }
113
+ if (typeof res.writeEarlyHints !== "function") {
114
+ // Node < 18.11 OR HTTP/1.0 OR mock res — silent no-op so
115
+ // operator code stays the same across deployments.
116
+ return false;
117
+ }
118
+ if (!opts || typeof opts !== "object" || Array.isArray(opts)) {
119
+ throw new EarlyHintsError("early-hints/bad-opts",
120
+ "earlyHints.send: opts required (link + optional header pairs)", true);
121
+ }
122
+
123
+ // Lowercase every key up front so case-variants (`Link`, `LINK`,
124
+ // `LiNk`) collapse to the same canonical key. Without this pass
125
+ // a caller could supply both `link` (which gets validated) AND
126
+ // `Link` (which the validator's `if (name === "link") continue;`
127
+ // would skip), then the lowercase rewrite in the trailing loop
128
+ // would overwrite the validated value with unvalidated content.
129
+ // Refuse the collision explicitly rather than silently pick one;
130
+ // operators should pass each header exactly once.
131
+ var canonical = {};
132
+ var rawKeys = Object.keys(opts);
133
+ for (var rk = 0; rk < rawKeys.length; rk += 1) {
134
+ var rawName = rawKeys[rk];
135
+ var lowerName = rawName.toLowerCase();
136
+ if (Object.prototype.hasOwnProperty.call(canonical, lowerName)) {
137
+ throw new EarlyHintsError("early-hints/duplicate-header",
138
+ "earlyHints.send: duplicate header '" + lowerName + "' " +
139
+ "(case-variant supplied twice — pass each header exactly once)");
140
+ }
141
+ canonical[lowerName] = opts[rawName];
142
+ }
143
+
144
+ var headers = {};
145
+
146
+ if (canonical.link === undefined || canonical.link === null) {
147
+ throw new EarlyHintsError("early-hints/no-link",
148
+ "earlyHints.send: opts.link is required (RFC 8297 §2 requires at least one Link header)", true);
149
+ }
150
+ var linkArr = Array.isArray(canonical.link) ? canonical.link : [canonical.link];
151
+ if (linkArr.length === 0) {
152
+ throw new EarlyHintsError("early-hints/no-link",
153
+ "earlyHints.send: opts.link must contain at least one Link-header value", true);
154
+ }
155
+ for (var i = 0; i < linkArr.length; i += 1) {
156
+ _validateLink(linkArr[i], i);
157
+ }
158
+ headers.link = linkArr;
159
+
160
+ var canonicalKeys = Object.keys(canonical);
161
+ for (var k = 0; k < canonicalKeys.length; k += 1) {
162
+ var name = canonicalKeys[k];
163
+ if (name === "link") continue;
164
+ if (REFUSED_HEADERS.indexOf(name) !== -1) {
165
+ throw new EarlyHintsError("early-hints/refused-header",
166
+ "earlyHints.send: header '" + name + "' refused — RFC 8297 §3 prohibits " +
167
+ "per-request state in interim responses (refused set: " + REFUSED_HEADERS.join(", ") + ")");
168
+ }
169
+ if (typeof canonical[name] !== "string" && !Array.isArray(canonical[name])) {
170
+ throw new EarlyHintsError("early-hints/bad-header-value",
171
+ "earlyHints.send: header '" + name + "' must be a string or string[]", true);
172
+ }
173
+ headers[name] = canonical[name];
174
+ }
175
+
176
+ try {
177
+ res.writeEarlyHints(headers);
178
+ return true;
179
+ } catch (writeErr) {
180
+ throw new EarlyHintsError("early-hints/write-failed",
181
+ "earlyHints.send: writeEarlyHints failed: " + (writeErr.message || writeErr));
182
+ }
183
+ }
184
+
185
+ function _validateLink(linkValue, idx) {
186
+ validateOpts.requireNonEmptyString(linkValue, "earlyHints.send.link[" + idx + "]",
187
+ EarlyHintsError, "early-hints/bad-link");
188
+ if (linkValue.length > LINK_MAX_BYTES) {
189
+ throw new EarlyHintsError("early-hints/bad-link",
190
+ "link[" + idx + "] exceeds " + LINK_MAX_BYTES + " bytes");
191
+ }
192
+ var relMatch = /;\s*rel\s*=\s*"?([a-zA-Z0-9-]+)"?/i.exec(linkValue);
193
+ if (!relMatch) {
194
+ throw new EarlyHintsError("early-hints/bad-link",
195
+ "link[" + idx + "] missing rel= parameter (RFC 8288)");
196
+ }
197
+ if (relMatch[1].length > 32 || !LINK_RELATION_RE.test(relMatch[1])) { // allow:raw-byte-literal — rel-token length cap, not bytes
198
+ throw new EarlyHintsError("early-hints/bad-link",
199
+ "link[" + idx + "].rel '" + relMatch[1] + "' must be one of: " +
200
+ "preload, preconnect, prefetch, dns-prefetch, modulepreload, prerender, next, prev");
201
+ }
202
+ if (linkValue.charAt(0) !== "<" || linkValue.indexOf(">") < 1) {
203
+ throw new EarlyHintsError("early-hints/bad-link",
204
+ "link[" + idx + "] must start with angle-bracketed URI per RFC 8288 (e.g. <https://x.com>; rel=preload)");
205
+ }
206
+ }
207
+
208
+ module.exports = {
209
+ send: send,
210
+ REFUSED_HEADERS: REFUSED_HEADERS,
211
+ EarlyHintsError: EarlyHintsError,
212
+ };
@@ -0,0 +1,248 @@
1
+ "use strict";
2
+ /**
3
+ * @module b.mail.srs
4
+ * @nav Mail
5
+ * @title SRS — Sender Rewriting Scheme
6
+ * @order 450
7
+ *
8
+ * @intro
9
+ * Sender Rewriting Scheme (SRS0 / SRS1) — when a forwarder
10
+ * retransmits a message it received, SPF on the next hop will
11
+ * typically fail because the envelope-from sender is the original
12
+ * sender's domain, but the message is now coming from the
13
+ * forwarder's IP. SRS rewrites the envelope-from local-part to
14
+ * encode the original sender + a HMAC signature; the receiver
15
+ * verifies + reverses to deliver bounces correctly.
16
+ *
17
+ * Wire format (SRS0):
18
+ *
19
+ * SRS0=HHH=TT=domain=local@forwarder.example
20
+ *
21
+ * Where:
22
+ * - `HHH` is the first 4 chars of base32(HMAC-SHA-256(secret,
23
+ * lowercase(TT=domain=local))) — short-tag binding the rewrite
24
+ * to the operator's signing secret
25
+ * - `TT` is a 2-character base32 day-of-time stamp (mod-1024
26
+ * day rotation; rejects rewrites older than ~30 days)
27
+ * - `domain` is the original sender's domain
28
+ * - `local` is the original sender's local-part
29
+ * - `forwarder.example` is the rewriting forwarder's domain
30
+ *
31
+ * SRS1 (double-forward case): when an already-SRS0-encoded address
32
+ * gets forwarded a second time, SRS1 wraps the SRS0 envelope
33
+ * instead of re-encoding from scratch, preserving the original
34
+ * sender chain.
35
+ *
36
+ * `b.mail.srs.create({ secret, forwarderDomain })` returns
37
+ * `{ rewrite, reverse }`. `rewrite(originalSender)` produces the
38
+ * SRS-encoded address; `reverse(srsAddress)` decodes back to the
39
+ * original sender + verifies the HMAC.
40
+ *
41
+ * @card
42
+ * SRS Sender Rewriting Scheme — forwarder envelope-from rewriting with HMAC-bound day-rotated tags so the next-hop SPF check passes and bounces route correctly back to the original sender.
43
+ */
44
+
45
+ var nodeCrypto = require("node:crypto");
46
+ var blamejsCrypto = require("./crypto");
47
+ var validateOpts = require("./validate-opts");
48
+ var { defineClass } = require("./framework-error");
49
+
50
+ var SrsError = defineClass("SrsError", { alwaysPermanent: true });
51
+
52
+ // SRS spec: 2-char base32 day stamp. The rotation cycle is 1024 days
53
+ // (32 * 32) which is ~2.8 years; valid-window is the operator-supplied
54
+ // expiry (default 30 days).
55
+ var BASE32 = "abcdefghijklmnopqrstuvwxyz234567";
56
+
57
+ function _base32Encode(buf) {
58
+ var out = "";
59
+ var bits = 0;
60
+ var value = 0;
61
+ for (var i = 0; i < buf.length; i += 1) {
62
+ value = (value << 8) | buf[i]; // allow:raw-byte-literal — byte-aligned shift
63
+ bits += 8; // allow:raw-byte-literal — bits-per-byte constant
64
+ while (bits >= 5) {
65
+ out += BASE32.charAt((value >>> (bits - 5)) & 31);
66
+ bits -= 5;
67
+ }
68
+ }
69
+ if (bits > 0) out += BASE32.charAt((value << (5 - bits)) & 31);
70
+ return out;
71
+ }
72
+
73
+ function _hashTag(secret, hashInput) {
74
+ var mac = nodeCrypto.createHmac("sha256", secret).update(hashInput.toLowerCase(), "utf8").digest();
75
+ return _base32Encode(mac.subarray(0, 4)).slice(0, 4); // allow:raw-byte-literal — SRS spec 4-char short-tag
76
+ }
77
+
78
+ function _dayStamp(nowMs) {
79
+ // Days since epoch, mod 1024. Two-char base32 = 1024 possible values.
80
+ var days = Math.floor(nowMs / 86400000) % 1024; // allow:raw-byte-literal — ms-per-day + mod-1024 SRS rotation
81
+ return BASE32.charAt(days >>> 5) + BASE32.charAt(days & 31); // allow:raw-byte-literal — 5-bit base32 split
82
+ }
83
+
84
+ function _dayDiff(stamp, nowMs) {
85
+ if (typeof stamp !== "string" || stamp.length !== 2) return Infinity;
86
+ var hi = BASE32.indexOf(stamp.charAt(0));
87
+ var lo = BASE32.indexOf(stamp.charAt(1));
88
+ if (hi < 0 || lo < 0) return Infinity;
89
+ var stampVal = (hi << 5) | lo; // allow:raw-byte-literal — 5-bit base32 split
90
+ var nowVal = Math.floor(nowMs / 86400000) % 1024; // allow:raw-byte-literal — ms-per-day + mod-1024 rotation
91
+ // Modular distance — assume positive (rewrites in the future are
92
+ // refused via _dayDiff > 0 callers).
93
+ var diff = (nowVal - stampVal + 1024) % 1024; // allow:raw-byte-literal — mod-1024 rotation
94
+ return diff;
95
+ }
96
+
97
+ /**
98
+ * @primitive b.mail.srs.create
99
+ * @signature b.mail.srs.create(opts)
100
+ * @since 0.8.89
101
+ * @status stable
102
+ *
103
+ * Build an SRS rewriter bound to the operator's forwarder domain +
104
+ * HMAC signing secret. Returns `{ rewrite, reverse }`.
105
+ *
106
+ * @opts
107
+ * secret: string, // operator's HMAC-SHA-256 signing secret (>=32 bytes recommended)
108
+ * forwarderDomain: string, // the forwarder's own domain (where bounces land)
109
+ * expiryDays: number, // default 30 — reject reverse() of rewrites older than this
110
+ *
111
+ * @example
112
+ * var srs = b.mail.srs.create({
113
+ * secret: b.crypto.generateToken(64),
114
+ * forwarderDomain: "forwarder.example",
115
+ * });
116
+ *
117
+ * // Inbound: alice@bob.com → forwarder → carol@dest.com
118
+ * var rewritten = srs.rewrite("alice@bob.com");
119
+ * // → "SRS0=HHHH=TT=bob.com=alice@forwarder.example"
120
+ *
121
+ * // Bounce arrives back at SRS0=...; decode to deliver
122
+ * var original = srs.reverse(rewritten);
123
+ * // → "alice@bob.com"
124
+ */
125
+ function create(opts) {
126
+ if (!opts || typeof opts !== "object") {
127
+ throw new SrsError("srs/bad-opts",
128
+ "srs.create: opts required (secret + forwarderDomain)", true);
129
+ }
130
+ validateOpts.requireNonEmptyString(
131
+ opts.secret, "srs.create.secret", SrsError, "srs/bad-secret");
132
+ validateOpts.requireNonEmptyString(
133
+ opts.forwarderDomain, "srs.create.forwarderDomain", SrsError, "srs/bad-forwarder");
134
+ if (opts.secret.length < 16) { // allow:raw-byte-literal — minimum HMAC secret length
135
+ throw new SrsError("srs/bad-secret",
136
+ "srs.create: secret must be >= 16 chars (operator-supplied entropy floor)");
137
+ }
138
+ var expiryDays = opts.expiryDays !== undefined ? opts.expiryDays : 30; // allow:raw-byte-literal — default expiry window in days
139
+ if (typeof expiryDays !== "number" || !Number.isInteger(expiryDays) ||
140
+ expiryDays < 1 || expiryDays > 1024) { // allow:raw-byte-literal — SRS rotation cycle cap
141
+ throw new SrsError("srs/bad-expiry",
142
+ "srs.create: expiryDays must be an integer 1..1024 (SRS rotation cycle)");
143
+ }
144
+ var secret = opts.secret;
145
+ var forwarderDomain = opts.forwarderDomain;
146
+
147
+ function rewrite(originalAddress, nowMs) {
148
+ validateOpts.requireNonEmptyString(
149
+ originalAddress, "srs.rewrite.address", SrsError, "srs/bad-address");
150
+ var at = originalAddress.lastIndexOf("@");
151
+ if (at <= 0 || at === originalAddress.length - 1) {
152
+ throw new SrsError("srs/bad-address",
153
+ "srs.rewrite: address must be in localPart@domain form");
154
+ }
155
+ var localPart = originalAddress.slice(0, at);
156
+ var domain = originalAddress.slice(at + 1);
157
+ if (localPart.length > 64 || domain.length > 253) { // allow:raw-byte-literal — RFC 5321 local-part / domain caps
158
+ throw new SrsError("srs/bad-address",
159
+ "srs.rewrite: localPart / domain exceeds RFC 5321 length cap");
160
+ }
161
+ // Refuse SRS double-encoding from this primitive — operator must
162
+ // use srs1Rewrite() for already-SRS0 inputs (deferred per the
163
+ // v1-defensible decision: SRS1 wrapping is rare in operator
164
+ // deployments and adds substantial spec surface).
165
+ if (/^SRS[01]=/i.test(localPart)) {
166
+ throw new SrsError("srs/already-rewritten",
167
+ "srs.rewrite: address already SRS-encoded; chain forwarding through SRS1 is not yet supported (operator demand TBD)");
168
+ }
169
+ var now = typeof nowMs === "number" ? nowMs : Date.now();
170
+ var ts = _dayStamp(now);
171
+ var hashInput = ts + "=" + domain + "=" + localPart;
172
+ var tag = _hashTag(secret, hashInput);
173
+ return "SRS0=" + tag + "=" + ts + "=" + domain + "=" + localPart + "@" + forwarderDomain;
174
+ }
175
+
176
+ function reverse(srsAddress, nowMs) {
177
+ validateOpts.requireNonEmptyString(
178
+ srsAddress, "srs.reverse.address", SrsError, "srs/bad-address");
179
+ var at = srsAddress.lastIndexOf("@");
180
+ if (at <= 0 || at === srsAddress.length - 1) {
181
+ throw new SrsError("srs/bad-address",
182
+ "srs.reverse: address must be in srsLocal@forwarder form");
183
+ }
184
+ var localPart = srsAddress.slice(0, at);
185
+ var rcptDomain = srsAddress.slice(at + 1);
186
+ // Allow case-insensitive SRS0 prefix per the spec. Check this
187
+ // FIRST so an obviously-non-SRS0 input (`plain@example.com`)
188
+ // gets the specific not-srs0 verdict instead of the more general
189
+ // wrong-forwarder verdict.
190
+ if (!/^SRS0=/i.test(localPart)) {
191
+ throw new SrsError("srs/not-srs0",
192
+ "srs.reverse: address local-part does not start with SRS0=");
193
+ }
194
+ // Domain binding — the rewriter is scoped to a specific forwarder
195
+ // domain, and reverse() must verify the bounce arrived at THAT
196
+ // domain. Otherwise an SRS0 local-part signed with the same
197
+ // secret but addressed to a different forwarder (multi-domain
198
+ // deployment, or a misrouted DNS record) would still verify, and
199
+ // the operator would mis-deliver the bounce. RFC 5321 §2.3.5
200
+ // says domains are case-insensitive, so compare lowercased.
201
+ if (rcptDomain.toLowerCase() !== forwarderDomain.toLowerCase()) {
202
+ throw new SrsError("srs/wrong-forwarder",
203
+ "srs.reverse: bounce addressed to '" + rcptDomain + "' but rewriter " +
204
+ "is bound to forwarderDomain '" + forwarderDomain + "'");
205
+ }
206
+ var rest = localPart.slice(5);
207
+ var parts = rest.split("=");
208
+ if (parts.length < 4) {
209
+ throw new SrsError("srs/malformed",
210
+ "srs.reverse: expected SRS0=tag=ts=domain=local local-part shape (need >= 4 '=' fields)");
211
+ }
212
+ var tag = parts[0];
213
+ var ts = parts[1];
214
+ var origDomain = parts[2];
215
+ var origLocal = parts.slice(3).join("="); // local-part may itself contain '='
216
+ // Verify tag.
217
+ var hashInput = ts + "=" + origDomain + "=" + origLocal;
218
+ var expectedTag = _hashTag(secret, hashInput);
219
+ if (!_timingSafeStringEqual(tag, expectedTag)) {
220
+ throw new SrsError("srs/bad-tag",
221
+ "srs.reverse: HMAC tag does not verify (wrong secret or tampered envelope-from)");
222
+ }
223
+ // Verify expiry window.
224
+ var now = typeof nowMs === "number" ? nowMs : Date.now();
225
+ var dayDiff = _dayDiff(ts, now);
226
+ if (dayDiff > expiryDays) {
227
+ throw new SrsError("srs/expired",
228
+ "srs.reverse: rewrite is " + dayDiff + " days old; expiry window is " + expiryDays + " days");
229
+ }
230
+ return origLocal + "@" + origDomain;
231
+ }
232
+
233
+ return Object.freeze({
234
+ rewrite: rewrite,
235
+ reverse: reverse,
236
+ forwarderDomain: forwarderDomain,
237
+ });
238
+ }
239
+
240
+ function _timingSafeStringEqual(a, b) {
241
+ if (typeof a !== "string" || typeof b !== "string") return false;
242
+ return blamejsCrypto.timingSafeEqual(Buffer.from(a, "utf8"), Buffer.from(b, "utf8"));
243
+ }
244
+
245
+ module.exports = {
246
+ create: create,
247
+ SrsError: SrsError,
248
+ };
package/lib/mail.js CHANGED
@@ -1818,9 +1818,12 @@ function feedbackId(opts) {
1818
1818
  return parts.join(":");
1819
1819
  }
1820
1820
 
1821
+ var mailSrs = require("./mail-srs");
1822
+
1821
1823
  module.exports = {
1822
1824
  create: create,
1823
1825
  feedbackId: feedbackId,
1826
+ srs: mailSrs,
1824
1827
  MailError: MailError,
1825
1828
  unsubscribe: mailUnsubscribe,
1826
1829
  // RFC 3492 Punycode IDN domain encode/decode (b.mail.toAscii /
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@blamejs/core",
3
- "version": "0.8.87",
3
+ "version": "0.8.89",
4
4
  "description": "The Node framework that owns its stack.",
5
5
  "license": "Apache-2.0",
6
6
  "author": "blamejs contributors",
package/sbom.cdx.json CHANGED
@@ -2,10 +2,10 @@
2
2
  "$schema": "http://cyclonedx.org/schema/bom-1.5.schema.json",
3
3
  "bomFormat": "CycloneDX",
4
4
  "specVersion": "1.6",
5
- "serialNumber": "urn:uuid:1d067739-a1a9-4df9-8c82-febef293933a",
5
+ "serialNumber": "urn:uuid:76b81036-9214-4a75-8cc8-d7f4aa841982",
6
6
  "version": 1,
7
7
  "metadata": {
8
- "timestamp": "2026-05-11T17:46:06.986Z",
8
+ "timestamp": "2026-05-11T18:49:35.055Z",
9
9
  "lifecycles": [
10
10
  {
11
11
  "phase": "build"
@@ -19,14 +19,14 @@
19
19
  }
20
20
  ],
21
21
  "component": {
22
- "bom-ref": "@blamejs/core@0.8.87",
22
+ "bom-ref": "@blamejs/core@0.8.89",
23
23
  "type": "library",
24
24
  "name": "blamejs",
25
- "version": "0.8.87",
25
+ "version": "0.8.89",
26
26
  "scope": "required",
27
27
  "author": "blamejs contributors",
28
28
  "description": "The Node framework that owns its stack.",
29
- "purl": "pkg:npm/%40blamejs/core@0.8.87",
29
+ "purl": "pkg:npm/%40blamejs/core@0.8.89",
30
30
  "properties": [],
31
31
  "externalReferences": [
32
32
  {
@@ -54,7 +54,7 @@
54
54
  "components": [],
55
55
  "dependencies": [
56
56
  {
57
- "ref": "@blamejs/core@0.8.87",
57
+ "ref": "@blamejs/core@0.8.89",
58
58
  "dependsOn": []
59
59
  }
60
60
  ]