@naylence/advanced-security 0.3.7-test.124 → 0.3.7-test.125

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2,11 +2,10 @@ import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
2
2
  import { Certificate, id_ce_subjectAltName, SubjectAlternativeName, id_ce_nameConstraints, NameConstraints, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, TBSCertificate, Validity, Version, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, KeyUsage, id_ce_keyUsage, SubjectKeyIdentifier, id_ce_subjectKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, id_ce_authorityKeyIdentifier, GeneralSubtrees, GeneralSubtree, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth, id_ce_extKeyUsage } from '@peculiar/asn1-x509';
3
3
  import { sha512, sha256 } from '@noble/hashes/sha2.js';
4
4
  import { verify, etc } from '@noble/ed25519';
5
- import { getLogger, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, SigningConfigClass as SigningConfigClass$1, CertificateManagerFactory, secureDigest as secureDigest$1, validateHostLogical } from '@naylence/runtime/node';
5
+ import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, validateHostLogical } from '@naylence/runtime';
6
6
  import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
7
7
  import { X509Certificate } from '@peculiar/x509';
8
8
  import { localDeliveryContext, createFameEnvelope, FameAddress, generateId, formatAddress, SigningMaterial, DeliveryOriginType as DeliveryOriginType$1 } from '@naylence/core';
9
- import { getLogger as getLogger$1, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory } from '@naylence/runtime';
10
9
  import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
11
10
  import { x25519 } from '@noble/curves/ed25519.js';
12
11
  import { hkdf } from '@noble/hashes/hkdf.js';
@@ -16,12 +15,12 @@ import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose
16
15
  import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
17
16
 
18
17
  // This file is auto-generated during build - do not edit manually
19
- // Generated from package.json version: 0.3.7-test.124
18
+ // Generated from package.json version: 0.3.7-test.125
20
19
  /**
21
20
  * The package version, injected at build time.
22
21
  * @internal
23
22
  */
24
- const VERSION = '0.3.7-test.124';
23
+ const VERSION = '0.3.7-test.125';
25
24
 
26
25
  const logger$h = getLogger("naylence.fame.security.cert.util");
27
26
  const CACHE_LIMIT = 512;
@@ -1261,7 +1260,7 @@ class CAServiceClient {
1261
1260
  }
1262
1261
  }
1263
1262
 
1264
- const logger$f = getLogger$1("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
1263
+ const logger$f = getLogger("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
1265
1264
  class X25519EncryptionManager {
1266
1265
  constructor({ keyProvider, nodeLike = null, cryptoProvider = null, }) {
1267
1266
  this.pendingEnvelopes = new Map();
@@ -1890,7 +1889,7 @@ var index$1 = /*#__PURE__*/Object.freeze({
1890
1889
  X25519EncryptionManagerFactory: X25519EncryptionManagerFactory
1891
1890
  });
1892
1891
 
1893
- const logger$e = getLogger$1("naylence.fame.security.encryption.channel.channel_encryption_manager");
1892
+ const logger$e = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager");
1894
1893
  const SUPPORTED_CHANNEL_ALGORITHMS = ["chacha20-poly1305-channel"];
1895
1894
  const CHANNEL_ENCRYPTION_ALGORITHM = "chacha20-poly1305-channel";
1896
1895
  const HANDSHAKE_ALGORITHM = "CHACHA20P1305";
@@ -2626,7 +2625,7 @@ class ChannelEncryptionManager {
2626
2625
  }
2627
2626
  }
2628
2627
 
2629
- const logger$d = getLogger$1("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
2628
+ const logger$d = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
2630
2629
  const DEFAULT_SUPPORTED_ALGORITHMS = ["chacha20-poly1305-channel"];
2631
2630
  const FACTORY_META$d = {
2632
2631
  base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
@@ -2720,7 +2719,7 @@ var index = /*#__PURE__*/Object.freeze({
2720
2719
  ChannelEncryptionManagerFactory: ChannelEncryptionManagerFactory
2721
2720
  });
2722
2721
 
2723
- const logger$c = getLogger$1("naylence.fame.security.encryption.default_secure_channel_manager");
2722
+ const logger$c = getLogger("naylence.fame.security.encryption.default_secure_channel_manager");
2724
2723
  const DEFAULT_ALGORITHM = "CHACHA20P1305";
2725
2724
  const CHANNEL_KEY_LENGTH = 32;
2726
2725
  const NONCE_PREFIX_LENGTH = 4;
@@ -3050,7 +3049,7 @@ var defaultSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
3050
3049
  default: DefaultSecureChannelManagerFactory
3051
3050
  });
3052
3051
 
3053
- const logger$b = getLogger$1("naylence.fame.security.encryption.encryption_manager_registry");
3052
+ const logger$b = getLogger("naylence.fame.security.encryption.encryption_manager_registry");
3054
3053
  class EncryptionManagerFactoryRegistry {
3055
3054
  constructor(autoDiscover = true) {
3056
3055
  this.factories = [];
@@ -3214,7 +3213,7 @@ function registerEncryptionManagerFactory(factory) {
3214
3213
  globalRegistry.registerFactory(factory);
3215
3214
  }
3216
3215
 
3217
- const logger$a = getLogger$1("naylence.fame.security.encryption.composite_encryption_manager");
3216
+ const logger$a = getLogger("naylence.fame.security.encryption.composite_encryption_manager");
3218
3217
  const DEFAULT_SEALED_ALGORITHMS = [
3219
3218
  "X25519",
3220
3219
  "ECDH-ES+A256GCM",
@@ -3533,7 +3532,7 @@ class CompositeEncryptionManager {
3533
3532
  }
3534
3533
  }
3535
3534
 
3536
- const logger$9 = getLogger$1("naylence.fame.security.encryption.composite_encryption_manager_factory");
3535
+ const logger$9 = getLogger("naylence.fame.security.encryption.composite_encryption_manager_factory");
3537
3536
  const DEFAULT_PRIORITY = 1000;
3538
3537
  const DEFAULT_ENCRYPTION_TYPE = "composite";
3539
3538
  const FACTORY_META$b = {
@@ -3944,7 +3943,7 @@ var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
3944
3943
  default: AdvancedEdDSAEnvelopeVerifierFactory
3945
3944
  });
3946
3945
 
3947
- const logger$8 = getLogger$1("naylence.fame.security.keys.x5c_key_manager");
3946
+ const logger$8 = getLogger("naylence.fame.security.keys.x5c_key_manager");
3948
3947
  let x509ModulePromise$1 = null;
3949
3948
  async function loadX509Module$1() {
3950
3949
  if (!x509ModulePromise$1) {
@@ -4555,7 +4554,7 @@ function utf8Decode(data) {
4555
4554
  return decodeURIComponent(escape(str));
4556
4555
  }
4557
4556
 
4558
- const logger$7 = getLogger$1("naylence.fame.stickiness.aft_signer");
4557
+ const logger$7 = getLogger("naylence.fame.stickiness.aft_signer");
4559
4558
  class AbstractAFTSigner {
4560
4559
  constructor(kid, maxTtlSec = 7200) {
4561
4560
  this.kid = kid;
@@ -4697,7 +4696,7 @@ function createAftSigner(options) {
4697
4696
  }
4698
4697
  }
4699
4698
 
4700
- const logger$6 = getLogger$1("naylence.fame.stickiness.aft_helper");
4699
+ const logger$6 = getLogger("naylence.fame.stickiness.aft_helper");
4701
4700
  class AFTHelper {
4702
4701
  constructor(options) {
4703
4702
  this.signer = options.signer;
@@ -4766,7 +4765,7 @@ function createAftHelper(options) {
4766
4765
  }
4767
4766
  const DEFAULT_STICKINESS_SECURITY_LEVEL = StickinessMode.SIGNED_OPTIONAL;
4768
4767
 
4769
- const logger$5 = getLogger$1("naylence.fame.stickiness.aft_verifier");
4768
+ const logger$5 = getLogger("naylence.fame.stickiness.aft_verifier");
4770
4769
  function decodeToken(token) {
4771
4770
  const parts = token.split(".");
4772
4771
  if (parts.length !== 3) {
@@ -5052,7 +5051,7 @@ function createAftVerifier(options) {
5052
5051
  }
5053
5052
  }
5054
5053
 
5055
- const logger$4 = getLogger$1("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
5054
+ const logger$4 = getLogger("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
5056
5055
  class AFTAssociation {
5057
5056
  constructor(params) {
5058
5057
  this.replicaId = params.replicaId;
@@ -5562,7 +5561,7 @@ var aftLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
5562
5561
  default: AFTLoadBalancerStickinessManagerFactory
5563
5562
  });
5564
5563
 
5565
- const logger$3 = getLogger$1("naylence.fame.stickiness.aft_replica_stickiness_manager");
5564
+ const logger$3 = getLogger("naylence.fame.stickiness.aft_replica_stickiness_manager");
5566
5565
  function isStickinessRequired(context) {
5567
5566
  if (typeof context.stickinessRequired === "boolean") {
5568
5567
  return context.stickinessRequired;
@@ -5812,7 +5811,7 @@ var aftReplicaStickinessManagerFactory = /*#__PURE__*/Object.freeze({
5812
5811
  default: AFTReplicaStickinessManagerFactory
5813
5812
  });
5814
5813
 
5815
- const logger$2 = getLogger$1("naylence.fame.welcome.advanced_welcome_service");
5814
+ const logger$2 = getLogger("naylence.fame.welcome.advanced_welcome_service");
5816
5815
  const ENV_VAR_SHOW_ENVELOPES = "FAME_SHOW_ENVELOPES";
5817
5816
  const DEFAULT_TTL_SEC = 3600;
5818
5817
  const showEnvelopes = typeof process !== "undefined" &&
@@ -6662,7 +6661,7 @@ function encodeBitString(signature) {
6662
6661
  return result.buffer;
6663
6662
  }
6664
6663
 
6665
- const logger$1 = getLogger$1("naylence.fame.security.cert.default_certificate_manager");
6664
+ const logger$1 = getLogger("naylence.fame.security.cert.default_certificate_manager");
6666
6665
  const CONNECTION_GRANTS_CAMEL = "connectionGrants";
6667
6666
  const CONNECTION_GRANTS_SNAKE = "connection_grants";
6668
6667
  class DefaultCertificateManager {
@@ -7496,18 +7495,18 @@ function normalizeSecuritySettings(config, explicit) {
7496
7495
  return null;
7497
7496
  }
7498
7497
  function normalizeSigning(config, explicit) {
7499
- if (explicit instanceof SigningConfigClass$1) {
7498
+ if (explicit instanceof SigningConfigClass) {
7500
7499
  return explicit;
7501
7500
  }
7502
7501
  if (explicit && typeof explicit === "object") {
7503
- return new SigningConfigClass$1(explicit);
7502
+ return new SigningConfigClass(explicit);
7504
7503
  }
7505
7504
  const candidate = config.signing ?? null;
7506
- if (candidate instanceof SigningConfigClass$1) {
7505
+ if (candidate instanceof SigningConfigClass) {
7507
7506
  return candidate;
7508
7507
  }
7509
7508
  if (candidate && typeof candidate === "object") {
7510
- return new SigningConfigClass$1(candidate);
7509
+ return new SigningConfigClass(candidate);
7511
7510
  }
7512
7511
  return null;
7513
7512
  }
@@ -7663,7 +7662,7 @@ function bytesToUtf8$1(data) {
7663
7662
 
7664
7663
  const DEFAULT_REFRESH_INTERVAL_MS = 86400000; // 24 hours
7665
7664
  const MIN_REFRESH_INTERVAL_MS = 60000; // 1 minute
7666
- const logger = getLogger$1("naylence.fame.security.cert.trust_store.http_bundle_provider");
7665
+ const logger = getLogger("naylence.fame.security.cert.trust_store.http_bundle_provider");
7667
7666
  function isTruthyFlag(value) {
7668
7667
  if (typeof value === "boolean") {
7669
7668
  return value;
@@ -9164,7 +9163,7 @@ class CASigningService extends CAService {
9164
9163
  const publicKeyPem = derToPem(publicKeyDer, "PUBLIC KEY");
9165
9164
  // Determine node SID and physical path (mirrors Python logic)
9166
9165
  const physicalPath = csr.physicalPath || `/unknown/${csr.requesterId}`;
9167
- const nodeSid = secureDigest$1(physicalPath);
9166
+ const nodeSid = secureDigest(physicalPath);
9168
9167
  const logicals = csr.logicals || [];
9169
9168
  // Issue the certificate (short-lived: 1 day)
9170
9169
  const certificatePem = await this.signNodeCert(publicKeyPem, csr.requesterId, // Use requesterId as node_id
@@ -9196,7 +9195,7 @@ class CASigningService extends CAService {
9196
9195
  await this.ensureSigningMaterials();
9197
9196
  const signingCert = this.getSigningCertificate();
9198
9197
  const signingKey = this.getSigningKey();
9199
- const expectedSid = secureDigest$1(physicalPath);
9198
+ const expectedSid = secureDigest(physicalPath);
9200
9199
  if (expectedSid !== nodeSid) {
9201
9200
  throw new Error("Provided SID does not match the computed SID for the physical path");
9202
9201
  }
@@ -1,7 +1,5 @@
1
1
  import type { SecuritySettings } from "@naylence/core";
2
- import { CertificateManagerFactory, type CertificateManagerConfig } from "@naylence/runtime/node";
3
- import type { SigningConfig } from "@naylence/runtime";
4
- import type { CertificateManager } from "@naylence/runtime";
2
+ import { CertificateManagerFactory, type CertificateManagerConfig, type SigningConfig, type CertificateManager } from "@naylence/runtime";
5
3
  export interface DefaultCertificateManagerConfig extends CertificateManagerConfig {
6
4
  type: "DefaultCertificateManager";
7
5
  caServiceUrl?: string | null;
@@ -1 +1 @@
1
- {"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEvD,OAAO,EACL,yBAAyB,EAEzB,KAAK,wBAAwB,EAC9B,MAAM,wBAAwB,CAAC;AAOhC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,mBAAmB,CAAC;AACvD,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAC;AAE5D,MAAM,WAAW,+BACf,SAAQ,wBAAwB;IAChC,IAAI,EAAE,2BAA2B,CAAC;IAClC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,cAAc,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC/B,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC3C,iBAAiB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC5C,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAChC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAClC;AAED,eAAO,MAAM,YAAY;;;CAGf,CAAC;AA6EX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,EAC1C,OAAO,CAAC,EAAE,aAAa,GAAG,IAAI,EAC9B,GAAG,YAAY,EAAE,OAAO,EAAE,GACzB,OAAO,CAAC,kBAAkB,CAAC;CAe/B;AAED,eAAe,gCAAgC,CAAC"}
1
+ {"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AACvD,OAAO,EAEL,yBAAyB,EAEzB,KAAK,wBAAwB,EAC7B,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACxB,MAAM,mBAAmB,CAAC;AAQ3B,MAAM,WAAW,+BACf,SAAQ,wBAAwB;IAChC,IAAI,EAAE,2BAA2B,CAAC;IAClC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,cAAc,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC/B,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC3C,iBAAiB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC5C,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAChC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAClC;AAED,eAAO,MAAM,YAAY;;;CAGf,CAAC;AA6EX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,EAC1C,OAAO,CAAC,EAAE,aAAa,GAAG,IAAI,EAC9B,GAAG,YAAY,EAAE,OAAO,EAAE,GACzB,OAAO,CAAC,kBAAkB,CAAC;CAe/B;AAED,eAAe,gCAAgC,CAAC"}
@@ -2,5 +2,5 @@
2
2
  * The package version, injected at build time.
3
3
  * @internal
4
4
  */
5
- export declare const VERSION = "0.3.7-test.124";
5
+ export declare const VERSION = "0.3.7-test.125";
6
6
  //# sourceMappingURL=version.d.ts.map
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@naylence/advanced-security",
3
- "version": "0.3.7-test.124",
3
+ "version": "0.3.7-test.125",
4
4
  "type": "module",
5
5
  "description": "Advanced security utilities for the Naylence Fame runtime implemented in TypeScript.",
6
6
  "author": "Naylence Dev <naylencedev@gmail.com>",