@naylence/advanced-security 0.3.7-test.124 → 0.3.7-test.126
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +12 -16
- package/dist/browser/index.mjs +25 -29
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager-factory.js +1 -2
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js +0 -3
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/internal-ca-service.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/internal-ca-service.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/util.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/util.js.map +1 -1
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager-factory.js +1 -2
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js +0 -3
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/internal-ca-service.js +1 -1
- package/dist/esm/naylence/fame/security/cert/internal-ca-service.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/util.js +1 -1
- package/dist/esm/naylence/fame/security/cert/util.js.map +1 -1
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +12 -16
- package/dist/node/index.mjs +25 -29
- package/dist/node/node.cjs +13 -17
- package/dist/node/node.mjs +25 -29
- package/dist/types/naylence/fame/security/cert/default-certificate-manager-factory.d.ts +1 -3
- package/dist/types/naylence/fame/security/cert/default-certificate-manager-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/default-certificate-manager.d.ts.map +1 -1
- package/dist/types/version.d.ts +1 -1
- package/package.json +1 -1
package/dist/node/index.mjs
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory } from '@naylence/runtime';
|
|
2
2
|
import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
|
|
3
3
|
import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
|
|
4
4
|
import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
|
|
@@ -13,15 +13,14 @@ import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.j
|
|
|
13
13
|
import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
|
|
14
14
|
import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
|
|
15
15
|
import { X509Certificate } from '@peculiar/x509';
|
|
16
|
-
import { getLogger, secureDigest as secureDigest$1, validateHostLogical, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, SigningConfigClass as SigningConfigClass$1 } from '@naylence/runtime/node';
|
|
17
16
|
|
|
18
17
|
// This file is auto-generated during build - do not edit manually
|
|
19
|
-
// Generated from package.json version: 0.3.7-test.
|
|
18
|
+
// Generated from package.json version: 0.3.7-test.126
|
|
20
19
|
/**
|
|
21
20
|
* The package version, injected at build time.
|
|
22
21
|
* @internal
|
|
23
22
|
*/
|
|
24
|
-
const VERSION = '0.3.7-test.
|
|
23
|
+
const VERSION = '0.3.7-test.126';
|
|
25
24
|
|
|
26
25
|
const logger$h = getLogger("naylence.fame.security.cert.util");
|
|
27
26
|
const CACHE_LIMIT = 512;
|
|
@@ -1255,7 +1254,7 @@ class CAServiceClient {
|
|
|
1255
1254
|
}
|
|
1256
1255
|
}
|
|
1257
1256
|
|
|
1258
|
-
const logger$f = getLogger
|
|
1257
|
+
const logger$f = getLogger("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
|
|
1259
1258
|
class X25519EncryptionManager {
|
|
1260
1259
|
constructor({ keyProvider, nodeLike = null, cryptoProvider = null, }) {
|
|
1261
1260
|
this.pendingEnvelopes = new Map();
|
|
@@ -1884,7 +1883,7 @@ var index$1 = /*#__PURE__*/Object.freeze({
|
|
|
1884
1883
|
X25519EncryptionManagerFactory: X25519EncryptionManagerFactory
|
|
1885
1884
|
});
|
|
1886
1885
|
|
|
1887
|
-
const logger$e = getLogger
|
|
1886
|
+
const logger$e = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager");
|
|
1888
1887
|
const SUPPORTED_CHANNEL_ALGORITHMS = ["chacha20-poly1305-channel"];
|
|
1889
1888
|
const CHANNEL_ENCRYPTION_ALGORITHM = "chacha20-poly1305-channel";
|
|
1890
1889
|
const HANDSHAKE_ALGORITHM = "CHACHA20P1305";
|
|
@@ -2618,7 +2617,7 @@ class ChannelEncryptionManager {
|
|
|
2618
2617
|
}
|
|
2619
2618
|
}
|
|
2620
2619
|
|
|
2621
|
-
const logger$d = getLogger
|
|
2620
|
+
const logger$d = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
|
|
2622
2621
|
const DEFAULT_SUPPORTED_ALGORITHMS = ["chacha20-poly1305-channel"];
|
|
2623
2622
|
const FACTORY_META$c = {
|
|
2624
2623
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
@@ -2712,7 +2711,7 @@ var index = /*#__PURE__*/Object.freeze({
|
|
|
2712
2711
|
ChannelEncryptionManagerFactory: ChannelEncryptionManagerFactory
|
|
2713
2712
|
});
|
|
2714
2713
|
|
|
2715
|
-
const logger$c = getLogger
|
|
2714
|
+
const logger$c = getLogger("naylence.fame.security.encryption.default_secure_channel_manager");
|
|
2716
2715
|
const DEFAULT_ALGORITHM = "CHACHA20P1305";
|
|
2717
2716
|
const CHANNEL_KEY_LENGTH = 32;
|
|
2718
2717
|
const NONCE_PREFIX_LENGTH = 4;
|
|
@@ -3042,7 +3041,7 @@ var defaultSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
3042
3041
|
default: DefaultSecureChannelManagerFactory
|
|
3043
3042
|
});
|
|
3044
3043
|
|
|
3045
|
-
const logger$b = getLogger
|
|
3044
|
+
const logger$b = getLogger("naylence.fame.security.encryption.encryption_manager_registry");
|
|
3046
3045
|
class EncryptionManagerFactoryRegistry {
|
|
3047
3046
|
constructor(autoDiscover = true) {
|
|
3048
3047
|
this.factories = [];
|
|
@@ -3203,7 +3202,7 @@ function getEncryptionManagerFactoryRegistry() {
|
|
|
3203
3202
|
return globalRegistry;
|
|
3204
3203
|
}
|
|
3205
3204
|
|
|
3206
|
-
const logger$a = getLogger
|
|
3205
|
+
const logger$a = getLogger("naylence.fame.security.encryption.composite_encryption_manager");
|
|
3207
3206
|
const DEFAULT_SEALED_ALGORITHMS = [
|
|
3208
3207
|
"X25519",
|
|
3209
3208
|
"ECDH-ES+A256GCM",
|
|
@@ -3522,7 +3521,7 @@ class CompositeEncryptionManager {
|
|
|
3522
3521
|
}
|
|
3523
3522
|
}
|
|
3524
3523
|
|
|
3525
|
-
const logger$9 = getLogger
|
|
3524
|
+
const logger$9 = getLogger("naylence.fame.security.encryption.composite_encryption_manager_factory");
|
|
3526
3525
|
const DEFAULT_PRIORITY = 1000;
|
|
3527
3526
|
const DEFAULT_ENCRYPTION_TYPE = "composite";
|
|
3528
3527
|
const FACTORY_META$a = {
|
|
@@ -3933,7 +3932,7 @@ var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
|
3933
3932
|
default: AdvancedEdDSAEnvelopeVerifierFactory
|
|
3934
3933
|
});
|
|
3935
3934
|
|
|
3936
|
-
const logger$8 = getLogger
|
|
3935
|
+
const logger$8 = getLogger("naylence.fame.security.keys.x5c_key_manager");
|
|
3937
3936
|
let x509ModulePromise$1 = null;
|
|
3938
3937
|
async function loadX509Module$1() {
|
|
3939
3938
|
if (!x509ModulePromise$1) {
|
|
@@ -4537,7 +4536,7 @@ function utf8Decode(data) {
|
|
|
4537
4536
|
return decodeURIComponent(escape(str));
|
|
4538
4537
|
}
|
|
4539
4538
|
|
|
4540
|
-
const logger$7 = getLogger
|
|
4539
|
+
const logger$7 = getLogger("naylence.fame.stickiness.aft_signer");
|
|
4541
4540
|
class AbstractAFTSigner {
|
|
4542
4541
|
constructor(kid, maxTtlSec = 7200) {
|
|
4543
4542
|
this.kid = kid;
|
|
@@ -4679,7 +4678,7 @@ function createAftSigner(options) {
|
|
|
4679
4678
|
}
|
|
4680
4679
|
}
|
|
4681
4680
|
|
|
4682
|
-
const logger$6 = getLogger
|
|
4681
|
+
const logger$6 = getLogger("naylence.fame.stickiness.aft_helper");
|
|
4683
4682
|
class AFTHelper {
|
|
4684
4683
|
constructor(options) {
|
|
4685
4684
|
this.signer = options.signer;
|
|
@@ -4748,7 +4747,7 @@ function createAftHelper(options) {
|
|
|
4748
4747
|
}
|
|
4749
4748
|
const DEFAULT_STICKINESS_SECURITY_LEVEL = StickinessMode.SIGNED_OPTIONAL;
|
|
4750
4749
|
|
|
4751
|
-
const logger$5 = getLogger
|
|
4750
|
+
const logger$5 = getLogger("naylence.fame.stickiness.aft_verifier");
|
|
4752
4751
|
function decodeToken(token) {
|
|
4753
4752
|
const parts = token.split(".");
|
|
4754
4753
|
if (parts.length !== 3) {
|
|
@@ -5034,7 +5033,7 @@ function createAftVerifier(options) {
|
|
|
5034
5033
|
}
|
|
5035
5034
|
}
|
|
5036
5035
|
|
|
5037
|
-
const logger$4 = getLogger
|
|
5036
|
+
const logger$4 = getLogger("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
|
|
5038
5037
|
class AFTAssociation {
|
|
5039
5038
|
constructor(params) {
|
|
5040
5039
|
this.replicaId = params.replicaId;
|
|
@@ -5544,7 +5543,7 @@ var aftLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
5544
5543
|
default: AFTLoadBalancerStickinessManagerFactory
|
|
5545
5544
|
});
|
|
5546
5545
|
|
|
5547
|
-
const logger$3 = getLogger
|
|
5546
|
+
const logger$3 = getLogger("naylence.fame.stickiness.aft_replica_stickiness_manager");
|
|
5548
5547
|
function isStickinessRequired(context) {
|
|
5549
5548
|
if (typeof context.stickinessRequired === "boolean") {
|
|
5550
5549
|
return context.stickinessRequired;
|
|
@@ -5794,7 +5793,7 @@ var aftReplicaStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
5794
5793
|
default: AFTReplicaStickinessManagerFactory
|
|
5795
5794
|
});
|
|
5796
5795
|
|
|
5797
|
-
const logger$2 = getLogger
|
|
5796
|
+
const logger$2 = getLogger("naylence.fame.welcome.advanced_welcome_service");
|
|
5798
5797
|
const ENV_VAR_SHOW_ENVELOPES = "FAME_SHOW_ENVELOPES";
|
|
5799
5798
|
const DEFAULT_TTL_SEC = 3600;
|
|
5800
5799
|
const showEnvelopes = typeof process !== "undefined" &&
|
|
@@ -6886,7 +6885,7 @@ class CASigningService extends CAService {
|
|
|
6886
6885
|
const publicKeyPem = derToPem(publicKeyDer, "PUBLIC KEY");
|
|
6887
6886
|
// Determine node SID and physical path (mirrors Python logic)
|
|
6888
6887
|
const physicalPath = csr.physicalPath || `/unknown/${csr.requesterId}`;
|
|
6889
|
-
const nodeSid = secureDigest
|
|
6888
|
+
const nodeSid = secureDigest(physicalPath);
|
|
6890
6889
|
const logicals = csr.logicals || [];
|
|
6891
6890
|
// Issue the certificate (short-lived: 1 day)
|
|
6892
6891
|
const certificatePem = await this.signNodeCert(publicKeyPem, csr.requesterId, // Use requesterId as node_id
|
|
@@ -6918,7 +6917,7 @@ class CASigningService extends CAService {
|
|
|
6918
6917
|
await this.ensureSigningMaterials();
|
|
6919
6918
|
const signingCert = this.getSigningCertificate();
|
|
6920
6919
|
const signingKey = this.getSigningKey();
|
|
6921
|
-
const expectedSid = secureDigest
|
|
6920
|
+
const expectedSid = secureDigest(physicalPath);
|
|
6922
6921
|
if (expectedSid !== nodeSid) {
|
|
6923
6922
|
throw new Error("Provided SID does not match the computed SID for the physical path");
|
|
6924
6923
|
}
|
|
@@ -7663,7 +7662,7 @@ function encodeBitString(signature) {
|
|
|
7663
7662
|
return result.buffer;
|
|
7664
7663
|
}
|
|
7665
7664
|
|
|
7666
|
-
const logger$1 = getLogger
|
|
7665
|
+
const logger$1 = getLogger("naylence.fame.security.cert.default_certificate_manager");
|
|
7667
7666
|
const CONNECTION_GRANTS_CAMEL = "connectionGrants";
|
|
7668
7667
|
const CONNECTION_GRANTS_SNAKE = "connection_grants";
|
|
7669
7668
|
class DefaultCertificateManager {
|
|
@@ -8454,9 +8453,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
8454
8453
|
async function resolveTrustStorePemFromEnvironment() {
|
|
8455
8454
|
try {
|
|
8456
8455
|
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
8457
|
-
if (typeof provider.initialize === "function") {
|
|
8458
|
-
await provider.initialize();
|
|
8459
|
-
}
|
|
8460
8456
|
const pem = await provider.getTrustStorePem();
|
|
8461
8457
|
return normalizePemOrNull(pem);
|
|
8462
8458
|
}
|
|
@@ -8497,18 +8493,18 @@ function normalizeSecuritySettings(config, explicit) {
|
|
|
8497
8493
|
return null;
|
|
8498
8494
|
}
|
|
8499
8495
|
function normalizeSigning(config, explicit) {
|
|
8500
|
-
if (explicit instanceof SigningConfigClass
|
|
8496
|
+
if (explicit instanceof SigningConfigClass) {
|
|
8501
8497
|
return explicit;
|
|
8502
8498
|
}
|
|
8503
8499
|
if (explicit && typeof explicit === "object") {
|
|
8504
|
-
return new SigningConfigClass
|
|
8500
|
+
return new SigningConfigClass(explicit);
|
|
8505
8501
|
}
|
|
8506
8502
|
const candidate = config.signing ?? null;
|
|
8507
|
-
if (candidate instanceof SigningConfigClass
|
|
8503
|
+
if (candidate instanceof SigningConfigClass) {
|
|
8508
8504
|
return candidate;
|
|
8509
8505
|
}
|
|
8510
8506
|
if (candidate && typeof candidate === "object") {
|
|
8511
|
-
return new SigningConfigClass
|
|
8507
|
+
return new SigningConfigClass(candidate);
|
|
8512
8508
|
}
|
|
8513
8509
|
return null;
|
|
8514
8510
|
}
|
|
@@ -8657,7 +8653,7 @@ function bytesToUtf8$1(data) {
|
|
|
8657
8653
|
|
|
8658
8654
|
const DEFAULT_REFRESH_INTERVAL_MS = 86400000; // 24 hours
|
|
8659
8655
|
const MIN_REFRESH_INTERVAL_MS = 60000; // 1 minute
|
|
8660
|
-
const logger = getLogger
|
|
8656
|
+
const logger = getLogger("naylence.fame.security.cert.trust_store.http_bundle_provider");
|
|
8661
8657
|
function isTruthyFlag(value) {
|
|
8662
8658
|
if (typeof value === "boolean") {
|
|
8663
8659
|
return value;
|
package/dist/node/node.cjs
CHANGED
|
@@ -4,11 +4,10 @@ var asn1Schema = require('@peculiar/asn1-schema');
|
|
|
4
4
|
var asn1X509 = require('@peculiar/asn1-x509');
|
|
5
5
|
var sha2_js = require('@noble/hashes/sha2.js');
|
|
6
6
|
var ed25519 = require('@noble/ed25519');
|
|
7
|
-
var
|
|
7
|
+
var runtime = require('@naylence/runtime');
|
|
8
8
|
var asn1Csr = require('@peculiar/asn1-csr');
|
|
9
9
|
var x509 = require('@peculiar/x509');
|
|
10
10
|
var core = require('@naylence/core');
|
|
11
|
-
var runtime = require('@naylence/runtime');
|
|
12
11
|
var chacha_js = require('@noble/ciphers/chacha.js');
|
|
13
12
|
var ed25519_js = require('@noble/curves/ed25519.js');
|
|
14
13
|
var hkdf_js = require('@noble/hashes/hkdf.js');
|
|
@@ -18,14 +17,14 @@ var jose = require('jose');
|
|
|
18
17
|
var sha256_js = require('@noble/hashes/sha256.js');
|
|
19
18
|
|
|
20
19
|
// This file is auto-generated during build - do not edit manually
|
|
21
|
-
// Generated from package.json version: 0.3.7-test.
|
|
20
|
+
// Generated from package.json version: 0.3.7-test.126
|
|
22
21
|
/**
|
|
23
22
|
* The package version, injected at build time.
|
|
24
23
|
* @internal
|
|
25
24
|
*/
|
|
26
|
-
const VERSION = '0.3.7-test.
|
|
25
|
+
const VERSION = '0.3.7-test.126';
|
|
27
26
|
|
|
28
|
-
const logger$h =
|
|
27
|
+
const logger$h = runtime.getLogger("naylence.fame.security.cert.util");
|
|
29
28
|
const CACHE_LIMIT = 512;
|
|
30
29
|
const OID_ED25519 = "1.3.101.112";
|
|
31
30
|
const textEncoder = new TextEncoder();
|
|
@@ -7455,9 +7454,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
7455
7454
|
async function resolveTrustStorePemFromEnvironment() {
|
|
7456
7455
|
try {
|
|
7457
7456
|
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
7458
|
-
if (typeof provider.initialize === "function") {
|
|
7459
|
-
await provider.initialize();
|
|
7460
|
-
}
|
|
7461
7457
|
const pem = await provider.getTrustStorePem();
|
|
7462
7458
|
return normalizePemOrNull(pem);
|
|
7463
7459
|
}
|
|
@@ -7471,7 +7467,7 @@ async function resolveTrustStorePemFromEnvironment() {
|
|
|
7471
7467
|
}
|
|
7472
7468
|
|
|
7473
7469
|
const FACTORY_META$4 = {
|
|
7474
|
-
base:
|
|
7470
|
+
base: runtime.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
|
7475
7471
|
key: "DefaultCertificateManager",
|
|
7476
7472
|
};
|
|
7477
7473
|
function normalizeConfig$1(config) {
|
|
@@ -7498,18 +7494,18 @@ function normalizeSecuritySettings(config, explicit) {
|
|
|
7498
7494
|
return null;
|
|
7499
7495
|
}
|
|
7500
7496
|
function normalizeSigning(config, explicit) {
|
|
7501
|
-
if (explicit instanceof
|
|
7497
|
+
if (explicit instanceof runtime.SigningConfigClass) {
|
|
7502
7498
|
return explicit;
|
|
7503
7499
|
}
|
|
7504
7500
|
if (explicit && typeof explicit === "object") {
|
|
7505
|
-
return new
|
|
7501
|
+
return new runtime.SigningConfigClass(explicit);
|
|
7506
7502
|
}
|
|
7507
7503
|
const candidate = config.signing ?? null;
|
|
7508
|
-
if (candidate instanceof
|
|
7504
|
+
if (candidate instanceof runtime.SigningConfigClass) {
|
|
7509
7505
|
return candidate;
|
|
7510
7506
|
}
|
|
7511
7507
|
if (candidate && typeof candidate === "object") {
|
|
7512
|
-
return new
|
|
7508
|
+
return new runtime.SigningConfigClass(candidate);
|
|
7513
7509
|
}
|
|
7514
7510
|
return null;
|
|
7515
7511
|
}
|
|
@@ -7523,7 +7519,7 @@ function normalizeOptions(config, securitySettings, signing) {
|
|
|
7523
7519
|
cryptoProvider,
|
|
7524
7520
|
};
|
|
7525
7521
|
}
|
|
7526
|
-
class DefaultCertificateManagerFactory extends
|
|
7522
|
+
class DefaultCertificateManagerFactory extends runtime.CertificateManagerFactory {
|
|
7527
7523
|
constructor() {
|
|
7528
7524
|
super(...arguments);
|
|
7529
7525
|
this.type = "DefaultCertificateManager";
|
|
@@ -9166,7 +9162,7 @@ class CASigningService extends CAService {
|
|
|
9166
9162
|
const publicKeyPem = derToPem(publicKeyDer, "PUBLIC KEY");
|
|
9167
9163
|
// Determine node SID and physical path (mirrors Python logic)
|
|
9168
9164
|
const physicalPath = csr.physicalPath || `/unknown/${csr.requesterId}`;
|
|
9169
|
-
const nodeSid =
|
|
9165
|
+
const nodeSid = runtime.secureDigest(physicalPath);
|
|
9170
9166
|
const logicals = csr.logicals || [];
|
|
9171
9167
|
// Issue the certificate (short-lived: 1 day)
|
|
9172
9168
|
const certificatePem = await this.signNodeCert(publicKeyPem, csr.requesterId, // Use requesterId as node_id
|
|
@@ -9198,13 +9194,13 @@ class CASigningService extends CAService {
|
|
|
9198
9194
|
await this.ensureSigningMaterials();
|
|
9199
9195
|
const signingCert = this.getSigningCertificate();
|
|
9200
9196
|
const signingKey = this.getSigningKey();
|
|
9201
|
-
const expectedSid =
|
|
9197
|
+
const expectedSid = runtime.secureDigest(physicalPath);
|
|
9202
9198
|
if (expectedSid !== nodeSid) {
|
|
9203
9199
|
throw new Error("Provided SID does not match the computed SID for the physical path");
|
|
9204
9200
|
}
|
|
9205
9201
|
const logicalHosts = logicals ?? [];
|
|
9206
9202
|
for (const logical of logicalHosts) {
|
|
9207
|
-
const [valid, error] =
|
|
9203
|
+
const [valid, error] = runtime.validateHostLogical(logical);
|
|
9208
9204
|
if (!valid) {
|
|
9209
9205
|
throw new Error(`Invalid logical host '${logical}': ${error ?? "unknown error"}`);
|
|
9210
9206
|
}
|
package/dist/node/node.mjs
CHANGED
|
@@ -2,11 +2,10 @@ import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
|
|
|
2
2
|
import { Certificate, id_ce_subjectAltName, SubjectAlternativeName, id_ce_nameConstraints, NameConstraints, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, TBSCertificate, Validity, Version, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, KeyUsage, id_ce_keyUsage, SubjectKeyIdentifier, id_ce_subjectKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, id_ce_authorityKeyIdentifier, GeneralSubtrees, GeneralSubtree, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth, id_ce_extKeyUsage } from '@peculiar/asn1-x509';
|
|
3
3
|
import { sha512, sha256 } from '@noble/hashes/sha2.js';
|
|
4
4
|
import { verify, etc } from '@noble/ed25519';
|
|
5
|
-
import { getLogger,
|
|
5
|
+
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, validateHostLogical } from '@naylence/runtime';
|
|
6
6
|
import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
|
|
7
7
|
import { X509Certificate } from '@peculiar/x509';
|
|
8
8
|
import { localDeliveryContext, createFameEnvelope, FameAddress, generateId, formatAddress, SigningMaterial, DeliveryOriginType as DeliveryOriginType$1 } from '@naylence/core';
|
|
9
|
-
import { getLogger as getLogger$1, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory } from '@naylence/runtime';
|
|
10
9
|
import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
|
|
11
10
|
import { x25519 } from '@noble/curves/ed25519.js';
|
|
12
11
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
@@ -16,12 +15,12 @@ import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose
|
|
|
16
15
|
import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
|
|
17
16
|
|
|
18
17
|
// This file is auto-generated during build - do not edit manually
|
|
19
|
-
// Generated from package.json version: 0.3.7-test.
|
|
18
|
+
// Generated from package.json version: 0.3.7-test.126
|
|
20
19
|
/**
|
|
21
20
|
* The package version, injected at build time.
|
|
22
21
|
* @internal
|
|
23
22
|
*/
|
|
24
|
-
const VERSION = '0.3.7-test.
|
|
23
|
+
const VERSION = '0.3.7-test.126';
|
|
25
24
|
|
|
26
25
|
const logger$h = getLogger("naylence.fame.security.cert.util");
|
|
27
26
|
const CACHE_LIMIT = 512;
|
|
@@ -1261,7 +1260,7 @@ class CAServiceClient {
|
|
|
1261
1260
|
}
|
|
1262
1261
|
}
|
|
1263
1262
|
|
|
1264
|
-
const logger$f = getLogger
|
|
1263
|
+
const logger$f = getLogger("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
|
|
1265
1264
|
class X25519EncryptionManager {
|
|
1266
1265
|
constructor({ keyProvider, nodeLike = null, cryptoProvider = null, }) {
|
|
1267
1266
|
this.pendingEnvelopes = new Map();
|
|
@@ -1890,7 +1889,7 @@ var index$1 = /*#__PURE__*/Object.freeze({
|
|
|
1890
1889
|
X25519EncryptionManagerFactory: X25519EncryptionManagerFactory
|
|
1891
1890
|
});
|
|
1892
1891
|
|
|
1893
|
-
const logger$e = getLogger
|
|
1892
|
+
const logger$e = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager");
|
|
1894
1893
|
const SUPPORTED_CHANNEL_ALGORITHMS = ["chacha20-poly1305-channel"];
|
|
1895
1894
|
const CHANNEL_ENCRYPTION_ALGORITHM = "chacha20-poly1305-channel";
|
|
1896
1895
|
const HANDSHAKE_ALGORITHM = "CHACHA20P1305";
|
|
@@ -2626,7 +2625,7 @@ class ChannelEncryptionManager {
|
|
|
2626
2625
|
}
|
|
2627
2626
|
}
|
|
2628
2627
|
|
|
2629
|
-
const logger$d = getLogger
|
|
2628
|
+
const logger$d = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
|
|
2630
2629
|
const DEFAULT_SUPPORTED_ALGORITHMS = ["chacha20-poly1305-channel"];
|
|
2631
2630
|
const FACTORY_META$d = {
|
|
2632
2631
|
base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
|
|
@@ -2720,7 +2719,7 @@ var index = /*#__PURE__*/Object.freeze({
|
|
|
2720
2719
|
ChannelEncryptionManagerFactory: ChannelEncryptionManagerFactory
|
|
2721
2720
|
});
|
|
2722
2721
|
|
|
2723
|
-
const logger$c = getLogger
|
|
2722
|
+
const logger$c = getLogger("naylence.fame.security.encryption.default_secure_channel_manager");
|
|
2724
2723
|
const DEFAULT_ALGORITHM = "CHACHA20P1305";
|
|
2725
2724
|
const CHANNEL_KEY_LENGTH = 32;
|
|
2726
2725
|
const NONCE_PREFIX_LENGTH = 4;
|
|
@@ -3050,7 +3049,7 @@ var defaultSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
3050
3049
|
default: DefaultSecureChannelManagerFactory
|
|
3051
3050
|
});
|
|
3052
3051
|
|
|
3053
|
-
const logger$b = getLogger
|
|
3052
|
+
const logger$b = getLogger("naylence.fame.security.encryption.encryption_manager_registry");
|
|
3054
3053
|
class EncryptionManagerFactoryRegistry {
|
|
3055
3054
|
constructor(autoDiscover = true) {
|
|
3056
3055
|
this.factories = [];
|
|
@@ -3214,7 +3213,7 @@ function registerEncryptionManagerFactory(factory) {
|
|
|
3214
3213
|
globalRegistry.registerFactory(factory);
|
|
3215
3214
|
}
|
|
3216
3215
|
|
|
3217
|
-
const logger$a = getLogger
|
|
3216
|
+
const logger$a = getLogger("naylence.fame.security.encryption.composite_encryption_manager");
|
|
3218
3217
|
const DEFAULT_SEALED_ALGORITHMS = [
|
|
3219
3218
|
"X25519",
|
|
3220
3219
|
"ECDH-ES+A256GCM",
|
|
@@ -3533,7 +3532,7 @@ class CompositeEncryptionManager {
|
|
|
3533
3532
|
}
|
|
3534
3533
|
}
|
|
3535
3534
|
|
|
3536
|
-
const logger$9 = getLogger
|
|
3535
|
+
const logger$9 = getLogger("naylence.fame.security.encryption.composite_encryption_manager_factory");
|
|
3537
3536
|
const DEFAULT_PRIORITY = 1000;
|
|
3538
3537
|
const DEFAULT_ENCRYPTION_TYPE = "composite";
|
|
3539
3538
|
const FACTORY_META$b = {
|
|
@@ -3944,7 +3943,7 @@ var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
|
|
|
3944
3943
|
default: AdvancedEdDSAEnvelopeVerifierFactory
|
|
3945
3944
|
});
|
|
3946
3945
|
|
|
3947
|
-
const logger$8 = getLogger
|
|
3946
|
+
const logger$8 = getLogger("naylence.fame.security.keys.x5c_key_manager");
|
|
3948
3947
|
let x509ModulePromise$1 = null;
|
|
3949
3948
|
async function loadX509Module$1() {
|
|
3950
3949
|
if (!x509ModulePromise$1) {
|
|
@@ -4555,7 +4554,7 @@ function utf8Decode(data) {
|
|
|
4555
4554
|
return decodeURIComponent(escape(str));
|
|
4556
4555
|
}
|
|
4557
4556
|
|
|
4558
|
-
const logger$7 = getLogger
|
|
4557
|
+
const logger$7 = getLogger("naylence.fame.stickiness.aft_signer");
|
|
4559
4558
|
class AbstractAFTSigner {
|
|
4560
4559
|
constructor(kid, maxTtlSec = 7200) {
|
|
4561
4560
|
this.kid = kid;
|
|
@@ -4697,7 +4696,7 @@ function createAftSigner(options) {
|
|
|
4697
4696
|
}
|
|
4698
4697
|
}
|
|
4699
4698
|
|
|
4700
|
-
const logger$6 = getLogger
|
|
4699
|
+
const logger$6 = getLogger("naylence.fame.stickiness.aft_helper");
|
|
4701
4700
|
class AFTHelper {
|
|
4702
4701
|
constructor(options) {
|
|
4703
4702
|
this.signer = options.signer;
|
|
@@ -4766,7 +4765,7 @@ function createAftHelper(options) {
|
|
|
4766
4765
|
}
|
|
4767
4766
|
const DEFAULT_STICKINESS_SECURITY_LEVEL = StickinessMode.SIGNED_OPTIONAL;
|
|
4768
4767
|
|
|
4769
|
-
const logger$5 = getLogger
|
|
4768
|
+
const logger$5 = getLogger("naylence.fame.stickiness.aft_verifier");
|
|
4770
4769
|
function decodeToken(token) {
|
|
4771
4770
|
const parts = token.split(".");
|
|
4772
4771
|
if (parts.length !== 3) {
|
|
@@ -5052,7 +5051,7 @@ function createAftVerifier(options) {
|
|
|
5052
5051
|
}
|
|
5053
5052
|
}
|
|
5054
5053
|
|
|
5055
|
-
const logger$4 = getLogger
|
|
5054
|
+
const logger$4 = getLogger("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
|
|
5056
5055
|
class AFTAssociation {
|
|
5057
5056
|
constructor(params) {
|
|
5058
5057
|
this.replicaId = params.replicaId;
|
|
@@ -5562,7 +5561,7 @@ var aftLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
5562
5561
|
default: AFTLoadBalancerStickinessManagerFactory
|
|
5563
5562
|
});
|
|
5564
5563
|
|
|
5565
|
-
const logger$3 = getLogger
|
|
5564
|
+
const logger$3 = getLogger("naylence.fame.stickiness.aft_replica_stickiness_manager");
|
|
5566
5565
|
function isStickinessRequired(context) {
|
|
5567
5566
|
if (typeof context.stickinessRequired === "boolean") {
|
|
5568
5567
|
return context.stickinessRequired;
|
|
@@ -5812,7 +5811,7 @@ var aftReplicaStickinessManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
5812
5811
|
default: AFTReplicaStickinessManagerFactory
|
|
5813
5812
|
});
|
|
5814
5813
|
|
|
5815
|
-
const logger$2 = getLogger
|
|
5814
|
+
const logger$2 = getLogger("naylence.fame.welcome.advanced_welcome_service");
|
|
5816
5815
|
const ENV_VAR_SHOW_ENVELOPES = "FAME_SHOW_ENVELOPES";
|
|
5817
5816
|
const DEFAULT_TTL_SEC = 3600;
|
|
5818
5817
|
const showEnvelopes = typeof process !== "undefined" &&
|
|
@@ -6662,7 +6661,7 @@ function encodeBitString(signature) {
|
|
|
6662
6661
|
return result.buffer;
|
|
6663
6662
|
}
|
|
6664
6663
|
|
|
6665
|
-
const logger$1 = getLogger
|
|
6664
|
+
const logger$1 = getLogger("naylence.fame.security.cert.default_certificate_manager");
|
|
6666
6665
|
const CONNECTION_GRANTS_CAMEL = "connectionGrants";
|
|
6667
6666
|
const CONNECTION_GRANTS_SNAKE = "connection_grants";
|
|
6668
6667
|
class DefaultCertificateManager {
|
|
@@ -7453,9 +7452,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
7453
7452
|
async function resolveTrustStorePemFromEnvironment() {
|
|
7454
7453
|
try {
|
|
7455
7454
|
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
7456
|
-
if (typeof provider.initialize === "function") {
|
|
7457
|
-
await provider.initialize();
|
|
7458
|
-
}
|
|
7459
7455
|
const pem = await provider.getTrustStorePem();
|
|
7460
7456
|
return normalizePemOrNull(pem);
|
|
7461
7457
|
}
|
|
@@ -7496,18 +7492,18 @@ function normalizeSecuritySettings(config, explicit) {
|
|
|
7496
7492
|
return null;
|
|
7497
7493
|
}
|
|
7498
7494
|
function normalizeSigning(config, explicit) {
|
|
7499
|
-
if (explicit instanceof SigningConfigClass
|
|
7495
|
+
if (explicit instanceof SigningConfigClass) {
|
|
7500
7496
|
return explicit;
|
|
7501
7497
|
}
|
|
7502
7498
|
if (explicit && typeof explicit === "object") {
|
|
7503
|
-
return new SigningConfigClass
|
|
7499
|
+
return new SigningConfigClass(explicit);
|
|
7504
7500
|
}
|
|
7505
7501
|
const candidate = config.signing ?? null;
|
|
7506
|
-
if (candidate instanceof SigningConfigClass
|
|
7502
|
+
if (candidate instanceof SigningConfigClass) {
|
|
7507
7503
|
return candidate;
|
|
7508
7504
|
}
|
|
7509
7505
|
if (candidate && typeof candidate === "object") {
|
|
7510
|
-
return new SigningConfigClass
|
|
7506
|
+
return new SigningConfigClass(candidate);
|
|
7511
7507
|
}
|
|
7512
7508
|
return null;
|
|
7513
7509
|
}
|
|
@@ -7663,7 +7659,7 @@ function bytesToUtf8$1(data) {
|
|
|
7663
7659
|
|
|
7664
7660
|
const DEFAULT_REFRESH_INTERVAL_MS = 86400000; // 24 hours
|
|
7665
7661
|
const MIN_REFRESH_INTERVAL_MS = 60000; // 1 minute
|
|
7666
|
-
const logger = getLogger
|
|
7662
|
+
const logger = getLogger("naylence.fame.security.cert.trust_store.http_bundle_provider");
|
|
7667
7663
|
function isTruthyFlag(value) {
|
|
7668
7664
|
if (typeof value === "boolean") {
|
|
7669
7665
|
return value;
|
|
@@ -9164,7 +9160,7 @@ class CASigningService extends CAService {
|
|
|
9164
9160
|
const publicKeyPem = derToPem(publicKeyDer, "PUBLIC KEY");
|
|
9165
9161
|
// Determine node SID and physical path (mirrors Python logic)
|
|
9166
9162
|
const physicalPath = csr.physicalPath || `/unknown/${csr.requesterId}`;
|
|
9167
|
-
const nodeSid = secureDigest
|
|
9163
|
+
const nodeSid = secureDigest(physicalPath);
|
|
9168
9164
|
const logicals = csr.logicals || [];
|
|
9169
9165
|
// Issue the certificate (short-lived: 1 day)
|
|
9170
9166
|
const certificatePem = await this.signNodeCert(publicKeyPem, csr.requesterId, // Use requesterId as node_id
|
|
@@ -9196,7 +9192,7 @@ class CASigningService extends CAService {
|
|
|
9196
9192
|
await this.ensureSigningMaterials();
|
|
9197
9193
|
const signingCert = this.getSigningCertificate();
|
|
9198
9194
|
const signingKey = this.getSigningKey();
|
|
9199
|
-
const expectedSid = secureDigest
|
|
9195
|
+
const expectedSid = secureDigest(physicalPath);
|
|
9200
9196
|
if (expectedSid !== nodeSid) {
|
|
9201
9197
|
throw new Error("Provided SID does not match the computed SID for the physical path");
|
|
9202
9198
|
}
|
|
@@ -1,7 +1,5 @@
|
|
|
1
1
|
import type { SecuritySettings } from "@naylence/core";
|
|
2
|
-
import { CertificateManagerFactory, type CertificateManagerConfig } from "@naylence/runtime
|
|
3
|
-
import type { SigningConfig } from "@naylence/runtime";
|
|
4
|
-
import type { CertificateManager } from "@naylence/runtime";
|
|
2
|
+
import { CertificateManagerFactory, type CertificateManagerConfig, type SigningConfig, type CertificateManager } from "@naylence/runtime";
|
|
5
3
|
export interface DefaultCertificateManagerConfig extends CertificateManagerConfig {
|
|
6
4
|
type: "DefaultCertificateManager";
|
|
7
5
|
caServiceUrl?: string | null;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;
|
|
1
|
+
{"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AACvD,OAAO,EAEL,yBAAyB,EAEzB,KAAK,wBAAwB,EAC7B,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACxB,MAAM,mBAAmB,CAAC;AAQ3B,MAAM,WAAW,+BACf,SAAQ,wBAAwB;IAChC,IAAI,EAAE,2BAA2B,CAAC;IAClC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,cAAc,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC/B,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC3C,iBAAiB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC5C,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAChC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAClC;AAED,eAAO,MAAM,YAAY;;;CAGf,CAAC;AA6EX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,EAC1C,OAAO,CAAC,EAAE,aAAa,GAAG,IAAI,EAC9B,GAAG,YAAY,EAAE,OAAO,EAAE,GACzB,OAAO,CAAC,kBAAkB,CAAC;CAe/B;AAED,eAAe,gCAAgC,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAe3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAwCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;
|
|
1
|
+
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAe3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAwCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAqRD,eAAe,yBAAyB,CAAC"}
|
package/dist/types/version.d.ts
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@naylence/advanced-security",
|
|
3
|
-
"version": "0.3.7-test.
|
|
3
|
+
"version": "0.3.7-test.126",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"description": "Advanced security utilities for the Naylence Fame runtime implemented in TypeScript.",
|
|
6
6
|
"author": "Naylence Dev <naylencedev@gmail.com>",
|