@boxyhq/saml-jackson 1.0.7 → 1.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -187,7 +187,7 @@ class APIController {
187
187
  if (encodedRawMetadata) {
188
188
  metaData = Buffer.from(encodedRawMetadata, 'base64').toString();
189
189
  }
190
- const idpMetadata = yield saml20_1.default.parseMetadataAsync(metaData);
190
+ const idpMetadata = yield saml20_1.default.parseMetadata(metaData, {});
191
191
  // extract provider
192
192
  let providerName = extractHostName(idpMetadata.entityID);
193
193
  if (!providerName) {
@@ -323,7 +323,7 @@ class APIController {
323
323
  }
324
324
  let newMetadata;
325
325
  if (metaData) {
326
- newMetadata = yield saml20_1.default.parseMetadataAsync(metaData);
326
+ newMetadata = yield saml20_1.default.parseMetadata(metaData, {});
327
327
  // extract provider
328
328
  let providerName = extractHostName(newMetadata.entityID);
329
329
  if (!providerName) {
@@ -39,6 +39,7 @@ exports.OAuthController = void 0;
39
39
  const crypto_1 = __importDefault(require("crypto"));
40
40
  const util_1 = require("util");
41
41
  const zlib_1 = require("zlib");
42
+ const jose = __importStar(require("jose"));
42
43
  const dbutils = __importStar(require("../db/utils"));
43
44
  const metrics = __importStar(require("../opentelemetry/metrics"));
44
45
  const saml20_1 = __importDefault(require("@boxyhq/saml20"));
@@ -78,6 +79,9 @@ function getEncodedTenantProduct(param) {
78
79
  return null;
79
80
  }
80
81
  }
82
+ function getScopeValues(scope) {
83
+ return typeof scope === 'string' ? scope.split(' ').filter((s) => s.length > 0) : [];
84
+ }
81
85
  class OAuthController {
82
86
  constructor({ configStore, sessionStore, codeStore, tokenStore, opts }) {
83
87
  this.configStore = configStore;
@@ -128,7 +132,7 @@ class OAuthController {
128
132
  }
129
133
  authorize(body) {
130
134
  return __awaiter(this, void 0, void 0, function* () {
131
- const { response_type = 'code', client_id, redirect_uri, state, tenant, product, access_type, scope, code_challenge, code_challenge_method = '',
135
+ const { response_type = 'code', client_id, redirect_uri, state, tenant, product, access_type, resource, scope, nonce, code_challenge, code_challenge_method = '',
132
136
  // eslint-disable-next-line @typescript-eslint/no-unused-vars
133
137
  provider = 'saml', idp_hint, } = body;
134
138
  let requestedTenant = tenant;
@@ -138,6 +142,8 @@ class OAuthController {
138
142
  throw new error_1.JacksonError('Please specify a redirect URL.', 400);
139
143
  }
140
144
  let samlConfig;
145
+ const requestedScopes = getScopeValues(scope);
146
+ const requestedOIDCFlow = requestedScopes.includes('openid');
141
147
  if (tenant && product) {
142
148
  const samlConfigs = yield this.configStore.getByIndex({
143
149
  name: utils_1.IndexNames.TenantProduct,
@@ -172,8 +178,14 @@ class OAuthController {
172
178
  if (!sp && access_type) {
173
179
  sp = getEncodedTenantProduct(access_type);
174
180
  }
175
- if (!sp && scope) {
176
- sp = getEncodedTenantProduct(scope);
181
+ if (!sp && resource) {
182
+ sp = getEncodedTenantProduct(resource);
183
+ }
184
+ if (!sp && requestedScopes) {
185
+ const encodedParams = requestedScopes.find((scope) => scope.includes('=') && scope.includes('&')); // for now assume only one encoded param i.e. for tenant/product
186
+ if (encodedParams) {
187
+ sp = getEncodedTenantProduct(encodedParams);
188
+ }
177
189
  }
178
190
  if (sp && sp.tenant && sp.product) {
179
191
  requestedTenant = sp.tenant;
@@ -222,6 +234,16 @@ class OAuthController {
222
234
  if (!allowed.redirect(redirect_uri, samlConfig.redirectUrl)) {
223
235
  throw new error_1.JacksonError('Redirect URL is not allowed.', 403);
224
236
  }
237
+ if (requestedOIDCFlow &&
238
+ (!this.opts.openid.jwtSigningKeys || !(0, utils_1.isJWSKeyPairLoaded)(this.opts.openid.jwtSigningKeys))) {
239
+ return {
240
+ redirect_url: (0, utils_1.OAuthErrorResponse)({
241
+ error: 'server_error',
242
+ error_description: 'OAuth server not configured correctly for openid flow, check if JWT signing keys are loaded',
243
+ redirect_uri,
244
+ }),
245
+ };
246
+ }
225
247
  if (!state) {
226
248
  return {
227
249
  redirect_url: (0, utils_1.OAuthErrorResponse)({
@@ -282,6 +304,15 @@ class OAuthController {
282
304
  if (idp_hint) {
283
305
  requested.idp_hint = idp_hint;
284
306
  }
307
+ if (requestedOIDCFlow) {
308
+ requested.oidc = true;
309
+ if (nonce) {
310
+ requested.nonce = nonce;
311
+ }
312
+ }
313
+ if (requestedScopes) {
314
+ requested.scope = requestedScopes;
315
+ }
285
316
  yield this.sessionStore.put(sessionId, {
286
317
  id: samlReq.id,
287
318
  redirect_uri,
@@ -563,6 +594,27 @@ class OAuthController {
563
594
  // store details against a token
564
595
  const token = crypto_1.default.randomBytes(20).toString('hex');
565
596
  const tokenVal = Object.assign(Object.assign({}, codeVal.profile), { requested: codeVal.requested });
597
+ const requestedOIDCFlow = !!codeVal.requested.oidc;
598
+ const requestHasNonce = !!codeVal.requested.nonce;
599
+ if (requestedOIDCFlow) {
600
+ const { jwtSigningKeys, jwsAlg } = this.opts.openid;
601
+ if (!jwtSigningKeys || !(0, utils_1.isJWSKeyPairLoaded)(jwtSigningKeys)) {
602
+ throw new error_1.JacksonError('JWT signing keys are not loaded', 500);
603
+ }
604
+ let claims = requestHasNonce ? { nonce: codeVal.requested.nonce } : {};
605
+ claims = Object.assign(Object.assign({}, claims), { id: codeVal.profile.claims.id, email: codeVal.profile.claims.email, firstName: codeVal.profile.claims.firstName, lastName: codeVal.profile.claims.lastName });
606
+ const signingKey = yield (0, utils_1.loadJWSPrivateKey)(jwtSigningKeys.private, jwsAlg);
607
+ const id_token = yield new jose.SignJWT(claims)
608
+ .setProtectedHeader({ alg: jwsAlg })
609
+ .setIssuedAt()
610
+ .setIssuer(this.opts.samlAudience || '')
611
+ .setSubject(codeVal.profile.claims.id)
612
+ .setAudience(tokenVal.requested.client_id)
613
+ .setExpirationTime(`${this.opts.db.ttl}s`) // identity token only really needs to be valid long enough for it to be verified by the client application.
614
+ .sign(signingKey);
615
+ tokenVal.id_token = id_token;
616
+ tokenVal.claims.sub = codeVal.profile.claims.id;
617
+ }
566
618
  yield this.tokenStore.put(token, tokenVal);
567
619
  // delete the code
568
620
  try {
@@ -571,11 +623,15 @@ class OAuthController {
571
623
  catch (_err) {
572
624
  // ignore error
573
625
  }
574
- return {
626
+ const tokenResponse = {
575
627
  access_token: token,
576
628
  token_type: 'bearer',
577
629
  expires_in: this.opts.db.ttl,
578
630
  };
631
+ if (requestedOIDCFlow) {
632
+ tokenResponse.id_token = tokenVal.id_token;
633
+ }
634
+ return tokenResponse;
579
635
  });
580
636
  }
581
637
  /**
@@ -0,0 +1,50 @@
1
+ import { IOidcDiscoveryController } from '../typings';
2
+ export declare class OidcDiscoveryController implements IOidcDiscoveryController {
3
+ private opts;
4
+ constructor({ opts }: {
5
+ opts: any;
6
+ });
7
+ openidConfig(): {
8
+ issuer: string;
9
+ authorization_endpoint: string;
10
+ token_endpoint: string;
11
+ userinfo_endpoint: string;
12
+ jwks_uri: string;
13
+ response_types_supported: string[];
14
+ subject_types_supported: string[];
15
+ id_token_signing_alg_values_supported: string[];
16
+ grant_types_supported: string[];
17
+ code_challenge_methods_supported: string[];
18
+ };
19
+ jwks(): Promise<{
20
+ keys: {
21
+ kid: string;
22
+ alg: string | undefined;
23
+ use: string;
24
+ crv?: string | undefined;
25
+ d?: string | undefined;
26
+ dp?: string | undefined;
27
+ dq?: string | undefined;
28
+ e?: string | undefined;
29
+ ext?: boolean | undefined;
30
+ k?: string | undefined;
31
+ key_ops?: string[] | undefined;
32
+ kty?: string | undefined;
33
+ n?: string | undefined;
34
+ oth?: {
35
+ d?: string | undefined;
36
+ r?: string | undefined;
37
+ t?: string | undefined;
38
+ }[] | undefined;
39
+ p?: string | undefined;
40
+ q?: string | undefined;
41
+ qi?: string | undefined;
42
+ x?: string | undefined;
43
+ y?: string | undefined;
44
+ x5c?: string[] | undefined;
45
+ x5t?: string | undefined;
46
+ 'x5t#S256'?: string | undefined;
47
+ x5u?: string | undefined;
48
+ }[];
49
+ }>;
50
+ }
@@ -0,0 +1,49 @@
1
+ "use strict";
2
+ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
+ function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
+ return new (P || (P = Promise))(function (resolve, reject) {
5
+ function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
+ function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
+ function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
+ step((generator = generator.apply(thisArg, _arguments || [])).next());
9
+ });
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.OidcDiscoveryController = void 0;
13
+ const error_1 = require("./error");
14
+ const utils_1 = require("./utils");
15
+ class OidcDiscoveryController {
16
+ constructor({ opts }) {
17
+ this.opts = opts;
18
+ }
19
+ openidConfig() {
20
+ return {
21
+ issuer: this.opts.samlAudience,
22
+ authorization_endpoint: `${this.opts.externalUrl}/api/oauth/authorize`,
23
+ token_endpoint: `${this.opts.externalUrl}/api/oauth/token`,
24
+ userinfo_endpoint: `${this.opts.externalUrl}/api/oauth/userinfo`,
25
+ jwks_uri: `${this.opts.externalUrl}/oauth/jwks`,
26
+ response_types_supported: ['code'],
27
+ subject_types_supported: ['public'],
28
+ id_token_signing_alg_values_supported: ['RS256'],
29
+ grant_types_supported: ['authorization_code'],
30
+ code_challenge_methods_supported: ['plain', 'S256'],
31
+ };
32
+ }
33
+ jwks() {
34
+ return __awaiter(this, void 0, void 0, function* () {
35
+ const { jwtSigningKeys, jwsAlg } = this.opts.openid;
36
+ if (!jwtSigningKeys || !(0, utils_1.isJWSKeyPairLoaded)(jwtSigningKeys)) {
37
+ throw new error_1.JacksonError('JWT signing keys are not loaded', 501);
38
+ }
39
+ const importedPublicKey = yield (0, utils_1.importJWTPublicKey)(jwtSigningKeys.public, jwsAlg);
40
+ const publicKeyJWK = yield (0, utils_1.exportPublicKeyJWK)(importedPublicKey);
41
+ const jwkThumbprint = yield (0, utils_1.generateJwkThumbprint)(publicKeyJWK);
42
+ const jwks = {
43
+ keys: [Object.assign(Object.assign({}, publicKeyJWK), { kid: jwkThumbprint, alg: jwsAlg, use: 'sig' })],
44
+ };
45
+ return jwks;
46
+ });
47
+ }
48
+ }
49
+ exports.OidcDiscoveryController = OidcDiscoveryController;
@@ -1,4 +1,5 @@
1
1
  import type { OAuthErrorHandlerParams } from '../typings';
2
+ import * as jose from 'jose';
2
3
  export declare enum IndexNames {
3
4
  EntityID = "entityID",
4
5
  TenantProduct = "tenantProduct"
@@ -7,3 +8,11 @@ export declare const relayStatePrefix = "boxyhq_jackson_";
7
8
  export declare const validateAbsoluteUrl: (url: any, message: any) => void;
8
9
  export declare const OAuthErrorResponse: ({ error, error_description, redirect_uri, state, }: OAuthErrorHandlerParams) => string;
9
10
  export declare function getErrorMessage(error: unknown): string;
11
+ export declare function loadJWSPrivateKey(key: string, alg: string): Promise<jose.KeyLike>;
12
+ export declare function isJWSKeyPairLoaded(jwsKeyPair: {
13
+ private: string;
14
+ public: string;
15
+ }): boolean;
16
+ export declare const importJWTPublicKey: (key: string, jwsAlg: string) => Promise<jose.KeyLike>;
17
+ export declare const exportPublicKeyJWK: (key: jose.KeyLike) => Promise<jose.JWK>;
18
+ export declare const generateJwkThumbprint: (jwk: jose.JWK) => Promise<string>;
@@ -22,10 +22,20 @@ var __importStar = (this && this.__importStar) || function (mod) {
22
22
  __setModuleDefault(result, mod);
23
23
  return result;
24
24
  };
25
+ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
26
+ function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
27
+ return new (P || (P = Promise))(function (resolve, reject) {
28
+ function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
29
+ function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
30
+ function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
31
+ step((generator = generator.apply(thisArg, _arguments || [])).next());
32
+ });
33
+ };
25
34
  Object.defineProperty(exports, "__esModule", { value: true });
26
- exports.getErrorMessage = exports.OAuthErrorResponse = exports.validateAbsoluteUrl = exports.relayStatePrefix = exports.IndexNames = void 0;
35
+ exports.generateJwkThumbprint = exports.exportPublicKeyJWK = exports.importJWTPublicKey = exports.isJWSKeyPairLoaded = exports.loadJWSPrivateKey = exports.getErrorMessage = exports.OAuthErrorResponse = exports.validateAbsoluteUrl = exports.relayStatePrefix = exports.IndexNames = void 0;
27
36
  const error_1 = require("./error");
28
37
  const redirect = __importStar(require("./oauth/redirect"));
38
+ const jose = __importStar(require("jose"));
29
39
  var IndexNames;
30
40
  (function (IndexNames) {
31
41
  IndexNames["EntityID"] = "entityID";
@@ -53,3 +63,34 @@ function getErrorMessage(error) {
53
63
  return String(error);
54
64
  }
55
65
  exports.getErrorMessage = getErrorMessage;
66
+ function loadJWSPrivateKey(key, alg) {
67
+ return __awaiter(this, void 0, void 0, function* () {
68
+ const pkcs8 = Buffer.from(key, 'base64').toString('ascii');
69
+ const privateKey = yield jose.importPKCS8(pkcs8, alg);
70
+ return privateKey;
71
+ });
72
+ }
73
+ exports.loadJWSPrivateKey = loadJWSPrivateKey;
74
+ function isJWSKeyPairLoaded(jwsKeyPair) {
75
+ if (!jwsKeyPair.private || !jwsKeyPair.public) {
76
+ return false;
77
+ }
78
+ return true;
79
+ }
80
+ exports.isJWSKeyPairLoaded = isJWSKeyPairLoaded;
81
+ const importJWTPublicKey = (key, jwsAlg) => __awaiter(void 0, void 0, void 0, function* () {
82
+ const spki = Buffer.from(key, 'base64').toString('ascii');
83
+ const publicKey = yield jose.importSPKI(spki, jwsAlg);
84
+ return publicKey;
85
+ });
86
+ exports.importJWTPublicKey = importJWTPublicKey;
87
+ const exportPublicKeyJWK = (key) => __awaiter(void 0, void 0, void 0, function* () {
88
+ const publicJWK = yield jose.exportJWK(key);
89
+ return publicJWK;
90
+ });
91
+ exports.exportPublicKeyJWK = exportPublicKeyJWK;
92
+ const generateJwkThumbprint = (jwk) => __awaiter(void 0, void 0, void 0, function* () {
93
+ const thumbprint = yield jose.calculateJwkThumbprint(jwk);
94
+ return thumbprint;
95
+ });
96
+ exports.generateJwkThumbprint = generateJwkThumbprint;
@@ -42,11 +42,11 @@ class Sql {
42
42
  }
43
43
  init({ JacksonStore, JacksonIndex, JacksonTTL }) {
44
44
  return __awaiter(this, void 0, void 0, function* () {
45
+ const sqlType = this.options.engine === 'planetscale' ? 'mysql' : this.options.type;
45
46
  while (true) {
46
47
  try {
47
48
  this.dataSource = new typeorm_1.DataSource({
48
- // name: this.options.type! + Math.floor(Math.random() * 100000),
49
- type: this.options.engine === 'planetscale' ? 'mysql' : this.options.type,
49
+ type: sqlType,
50
50
  url: this.options.url,
51
51
  synchronize: this.options.engine !== 'planetscale',
52
52
  migrationsTableName: '_jackson_migrations',
@@ -58,7 +58,7 @@ class Sql {
58
58
  break;
59
59
  }
60
60
  catch (err) {
61
- console.error(`error connecting to ${this.options.type} db: ${err}`);
61
+ console.error(`error connecting to engine: ${this.options.engine}, type: ${sqlType} db: ${err}`);
62
62
  yield dbutils.sleep(1000);
63
63
  continue;
64
64
  }
package/dist/index.d.ts CHANGED
@@ -3,6 +3,7 @@ import { APIController } from './controller/api';
3
3
  import { OAuthController } from './controller/oauth';
4
4
  import { HealthCheckController } from './controller/health-check';
5
5
  import { LogoutController } from './controller/logout';
6
+ import { OidcDiscoveryController } from './controller/oidc-discovery';
6
7
  import { JacksonOption } from './typings';
7
8
  export declare const controllers: (opts: JacksonOption) => Promise<{
8
9
  apiController: APIController;
@@ -10,6 +11,7 @@ export declare const controllers: (opts: JacksonOption) => Promise<{
10
11
  adminController: AdminController;
11
12
  logoutController: LogoutController;
12
13
  healthCheckController: HealthCheckController;
14
+ oidcDiscoveryController: OidcDiscoveryController;
13
15
  }>;
14
16
  export default controllers;
15
17
  export * from './typings';
package/dist/index.js CHANGED
@@ -32,6 +32,7 @@ const api_1 = require("./controller/api");
32
32
  const oauth_1 = require("./controller/oauth");
33
33
  const health_check_1 = require("./controller/health-check");
34
34
  const logout_1 = require("./controller/logout");
35
+ const oidc_discovery_1 = require("./controller/oidc-discovery");
35
36
  const db_1 = __importDefault(require("./db/db"));
36
37
  const defaultDb_1 = __importDefault(require("./db/defaultDb"));
37
38
  const read_config_1 = __importDefault(require("./read-config"));
@@ -49,6 +50,8 @@ const defaultOpts = (opts) => {
49
50
  (0, defaultDb_1.default)(newOpts);
50
51
  newOpts.clientSecretVerifier = newOpts.clientSecretVerifier || 'dummy';
51
52
  newOpts.db.pageLimit = newOpts.db.pageLimit || 50;
53
+ newOpts.openid = newOpts.openid || {};
54
+ newOpts.openid.jwsAlg = newOpts.openid.jwsAlg || 'RS256';
52
55
  return newOpts;
53
56
  };
54
57
  const controllers = (opts) => __awaiter(void 0, void 0, void 0, function* () {
@@ -75,6 +78,7 @@ const controllers = (opts) => __awaiter(void 0, void 0, void 0, function* () {
75
78
  sessionStore,
76
79
  opts,
77
80
  });
81
+ const oidcDiscoveryController = new oidc_discovery_1.OidcDiscoveryController({ opts });
78
82
  // write pre-loaded config if present
79
83
  if (opts.preLoadedConfig && opts.preLoadedConfig.length > 0) {
80
84
  const configs = yield (0, read_config_1.default)(opts.preLoadedConfig);
@@ -91,6 +95,7 @@ const controllers = (opts) => __awaiter(void 0, void 0, void 0, function* () {
91
95
  adminController,
92
96
  logoutController,
93
97
  healthCheckController,
98
+ oidcDiscoveryController,
94
99
  };
95
100
  });
96
101
  exports.controllers = controllers;
package/dist/typings.d.ts CHANGED
@@ -1,3 +1,4 @@
1
+ import { type JWK } from 'jose';
1
2
  export declare type IdPConfig = {
2
3
  defaultRedirectUrl: string;
3
4
  redirectUrl: string[] | string;
@@ -44,6 +45,23 @@ export interface IHealthCheckController {
44
45
  }>;
45
46
  init(): Promise<void>;
46
47
  }
48
+ export interface IOidcDiscoveryController {
49
+ openidConfig(): {
50
+ issuer: string;
51
+ authorization_endpoint: string;
52
+ token_endpoint: string;
53
+ userinfo_endpoint: string;
54
+ jwks_uri: string;
55
+ response_types_supported: Array<string>;
56
+ subject_types_supported: Array<string>;
57
+ id_token_signing_alg_values_supported: Array<string>;
58
+ grant_types_supported: Array<string>;
59
+ code_challenge_methods_supported: Array<string>;
60
+ };
61
+ jwks(): Promise<{
62
+ keys: JWK[];
63
+ }>;
64
+ }
47
65
  export interface OAuthReqBody {
48
66
  response_type: 'code';
49
67
  client_id: string;
@@ -52,7 +70,9 @@ export interface OAuthReqBody {
52
70
  tenant?: string;
53
71
  product?: string;
54
72
  access_type?: string;
73
+ resource?: string;
55
74
  scope?: string;
75
+ nonce?: string;
56
76
  code_challenge: string;
57
77
  code_challenge_method: 'plain' | 'S256' | '';
58
78
  provider: 'saml';
@@ -72,11 +92,13 @@ export interface OAuthTokenReq {
72
92
  }
73
93
  export interface OAuthTokenRes {
74
94
  access_token: string;
95
+ id_token?: string;
75
96
  token_type: 'bearer';
76
97
  expires_in: number;
77
98
  }
78
99
  export interface Profile {
79
100
  id: string;
101
+ sub?: string;
80
102
  email: string;
81
103
  firstName: string;
82
104
  lastName: string;
@@ -127,6 +149,13 @@ export interface JacksonOption {
127
149
  db: DatabaseOption;
128
150
  clientSecretVerifier?: string;
129
151
  idpDiscoveryPath?: string;
152
+ openid: {
153
+ jwsAlg?: string;
154
+ jwtSigningKeys?: {
155
+ private: string;
156
+ public: string;
157
+ };
158
+ };
130
159
  }
131
160
  export interface SLORequestParams {
132
161
  nameId: string;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@boxyhq/saml-jackson",
3
- "version": "1.0.7",
3
+ "version": "1.1.2",
4
4
  "description": "SAML Jackson library",
5
5
  "keywords": [
6
6
  "SAML 2.0"
@@ -38,12 +38,13 @@
38
38
  "statements": 70
39
39
  },
40
40
  "dependencies": {
41
- "@boxyhq/saml20": "1.0.3",
41
+ "@boxyhq/saml20": "1.0.5",
42
42
  "@opentelemetry/api-metrics": "0.27.0",
43
43
  "@opentelemetry/api": "1.0.4",
44
44
  "@peculiar/webcrypto": "1.4.0",
45
- "@peculiar/x509": "1.7.2",
46
- "mongodb": "4.7.0",
45
+ "@peculiar/x509": "1.8.1",
46
+ "jose": "4.8.3",
47
+ "mongodb": "4.8.1",
47
48
  "mysql2": "2.3.3",
48
49
  "pg": "8.7.3",
49
50
  "redis": "4.0.6",
@@ -54,18 +55,18 @@
54
55
  "xmlbuilder": "15.1.1"
55
56
  },
56
57
  "devDependencies": {
57
- "@types/node": "18.0.3",
58
- "@types/sinon": "10.0.12",
58
+ "@types/node": "18.6.3",
59
+ "@types/sinon": "10.0.13",
59
60
  "@types/tap": "15.0.7",
60
- "@typescript-eslint/eslint-plugin": "5.30.5",
61
- "@typescript-eslint/parser": "5.30.5",
61
+ "@typescript-eslint/eslint-plugin": "5.31.0",
62
+ "@typescript-eslint/parser": "5.31.0",
62
63
  "cross-env": "7.0.3",
63
- "eslint": "8.19.0",
64
+ "eslint": "8.21.0",
64
65
  "eslint-config-prettier": "8.5.0",
65
66
  "prettier": "2.7.1",
66
67
  "sinon": "14.0.0",
67
68
  "tap": "16.3.0",
68
- "ts-node": "10.8.2",
69
+ "ts-node": "10.9.1",
69
70
  "tsconfig-paths": "4.0.0",
70
71
  "typescript": "4.7.4"
71
72
  },