@naylence/advanced-security 0.3.7-test.124 → 0.3.7-test.126

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (29) hide show
  1. package/dist/browser/index.cjs +12 -16
  2. package/dist/browser/index.mjs +25 -29
  3. package/dist/cjs/naylence/fame/security/cert/default-certificate-manager-factory.js +1 -2
  4. package/dist/cjs/naylence/fame/security/cert/default-certificate-manager-factory.js.map +1 -1
  5. package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js +0 -3
  6. package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
  7. package/dist/cjs/naylence/fame/security/cert/internal-ca-service.js +1 -1
  8. package/dist/cjs/naylence/fame/security/cert/internal-ca-service.js.map +1 -1
  9. package/dist/cjs/naylence/fame/security/cert/util.js +1 -1
  10. package/dist/cjs/naylence/fame/security/cert/util.js.map +1 -1
  11. package/dist/cjs/version.js +2 -2
  12. package/dist/esm/naylence/fame/security/cert/default-certificate-manager-factory.js +1 -2
  13. package/dist/esm/naylence/fame/security/cert/default-certificate-manager-factory.js.map +1 -1
  14. package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js +0 -3
  15. package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
  16. package/dist/esm/naylence/fame/security/cert/internal-ca-service.js +1 -1
  17. package/dist/esm/naylence/fame/security/cert/internal-ca-service.js.map +1 -1
  18. package/dist/esm/naylence/fame/security/cert/util.js +1 -1
  19. package/dist/esm/naylence/fame/security/cert/util.js.map +1 -1
  20. package/dist/esm/version.js +2 -2
  21. package/dist/node/index.cjs +12 -16
  22. package/dist/node/index.mjs +25 -29
  23. package/dist/node/node.cjs +13 -17
  24. package/dist/node/node.mjs +25 -29
  25. package/dist/types/naylence/fame/security/cert/default-certificate-manager-factory.d.ts +1 -3
  26. package/dist/types/naylence/fame/security/cert/default-certificate-manager-factory.d.ts.map +1 -1
  27. package/dist/types/naylence/fame/security/cert/default-certificate-manager.d.ts.map +1 -1
  28. package/dist/types/version.d.ts +1 -1
  29. package/package.json +1 -1
@@ -1,4 +1,4 @@
1
- import { EncryptionResult, getLogger as getLogger$1, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory } from '@naylence/runtime';
1
+ import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory } from '@naylence/runtime';
2
2
  import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
3
3
  import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
4
4
  import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
@@ -13,15 +13,14 @@ import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.j
13
13
  import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
14
14
  import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
15
15
  import { X509Certificate } from '@peculiar/x509';
16
- import { getLogger, secureDigest as secureDigest$1, validateHostLogical, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, SigningConfigClass as SigningConfigClass$1 } from '@naylence/runtime/node';
17
16
 
18
17
  // This file is auto-generated during build - do not edit manually
19
- // Generated from package.json version: 0.3.7-test.124
18
+ // Generated from package.json version: 0.3.7-test.126
20
19
  /**
21
20
  * The package version, injected at build time.
22
21
  * @internal
23
22
  */
24
- const VERSION = '0.3.7-test.124';
23
+ const VERSION = '0.3.7-test.126';
25
24
 
26
25
  const logger$h = getLogger("naylence.fame.security.cert.util");
27
26
  const CACHE_LIMIT = 512;
@@ -1255,7 +1254,7 @@ class CAServiceClient {
1255
1254
  }
1256
1255
  }
1257
1256
 
1258
- const logger$f = getLogger$1("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
1257
+ const logger$f = getLogger("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
1259
1258
  class X25519EncryptionManager {
1260
1259
  constructor({ keyProvider, nodeLike = null, cryptoProvider = null, }) {
1261
1260
  this.pendingEnvelopes = new Map();
@@ -1884,7 +1883,7 @@ var index$1 = /*#__PURE__*/Object.freeze({
1884
1883
  X25519EncryptionManagerFactory: X25519EncryptionManagerFactory
1885
1884
  });
1886
1885
 
1887
- const logger$e = getLogger$1("naylence.fame.security.encryption.channel.channel_encryption_manager");
1886
+ const logger$e = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager");
1888
1887
  const SUPPORTED_CHANNEL_ALGORITHMS = ["chacha20-poly1305-channel"];
1889
1888
  const CHANNEL_ENCRYPTION_ALGORITHM = "chacha20-poly1305-channel";
1890
1889
  const HANDSHAKE_ALGORITHM = "CHACHA20P1305";
@@ -2618,7 +2617,7 @@ class ChannelEncryptionManager {
2618
2617
  }
2619
2618
  }
2620
2619
 
2621
- const logger$d = getLogger$1("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
2620
+ const logger$d = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
2622
2621
  const DEFAULT_SUPPORTED_ALGORITHMS = ["chacha20-poly1305-channel"];
2623
2622
  const FACTORY_META$c = {
2624
2623
  base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
@@ -2712,7 +2711,7 @@ var index = /*#__PURE__*/Object.freeze({
2712
2711
  ChannelEncryptionManagerFactory: ChannelEncryptionManagerFactory
2713
2712
  });
2714
2713
 
2715
- const logger$c = getLogger$1("naylence.fame.security.encryption.default_secure_channel_manager");
2714
+ const logger$c = getLogger("naylence.fame.security.encryption.default_secure_channel_manager");
2716
2715
  const DEFAULT_ALGORITHM = "CHACHA20P1305";
2717
2716
  const CHANNEL_KEY_LENGTH = 32;
2718
2717
  const NONCE_PREFIX_LENGTH = 4;
@@ -3042,7 +3041,7 @@ var defaultSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
3042
3041
  default: DefaultSecureChannelManagerFactory
3043
3042
  });
3044
3043
 
3045
- const logger$b = getLogger$1("naylence.fame.security.encryption.encryption_manager_registry");
3044
+ const logger$b = getLogger("naylence.fame.security.encryption.encryption_manager_registry");
3046
3045
  class EncryptionManagerFactoryRegistry {
3047
3046
  constructor(autoDiscover = true) {
3048
3047
  this.factories = [];
@@ -3203,7 +3202,7 @@ function getEncryptionManagerFactoryRegistry() {
3203
3202
  return globalRegistry;
3204
3203
  }
3205
3204
 
3206
- const logger$a = getLogger$1("naylence.fame.security.encryption.composite_encryption_manager");
3205
+ const logger$a = getLogger("naylence.fame.security.encryption.composite_encryption_manager");
3207
3206
  const DEFAULT_SEALED_ALGORITHMS = [
3208
3207
  "X25519",
3209
3208
  "ECDH-ES+A256GCM",
@@ -3522,7 +3521,7 @@ class CompositeEncryptionManager {
3522
3521
  }
3523
3522
  }
3524
3523
 
3525
- const logger$9 = getLogger$1("naylence.fame.security.encryption.composite_encryption_manager_factory");
3524
+ const logger$9 = getLogger("naylence.fame.security.encryption.composite_encryption_manager_factory");
3526
3525
  const DEFAULT_PRIORITY = 1000;
3527
3526
  const DEFAULT_ENCRYPTION_TYPE = "composite";
3528
3527
  const FACTORY_META$a = {
@@ -3933,7 +3932,7 @@ var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
3933
3932
  default: AdvancedEdDSAEnvelopeVerifierFactory
3934
3933
  });
3935
3934
 
3936
- const logger$8 = getLogger$1("naylence.fame.security.keys.x5c_key_manager");
3935
+ const logger$8 = getLogger("naylence.fame.security.keys.x5c_key_manager");
3937
3936
  let x509ModulePromise$1 = null;
3938
3937
  async function loadX509Module$1() {
3939
3938
  if (!x509ModulePromise$1) {
@@ -4537,7 +4536,7 @@ function utf8Decode(data) {
4537
4536
  return decodeURIComponent(escape(str));
4538
4537
  }
4539
4538
 
4540
- const logger$7 = getLogger$1("naylence.fame.stickiness.aft_signer");
4539
+ const logger$7 = getLogger("naylence.fame.stickiness.aft_signer");
4541
4540
  class AbstractAFTSigner {
4542
4541
  constructor(kid, maxTtlSec = 7200) {
4543
4542
  this.kid = kid;
@@ -4679,7 +4678,7 @@ function createAftSigner(options) {
4679
4678
  }
4680
4679
  }
4681
4680
 
4682
- const logger$6 = getLogger$1("naylence.fame.stickiness.aft_helper");
4681
+ const logger$6 = getLogger("naylence.fame.stickiness.aft_helper");
4683
4682
  class AFTHelper {
4684
4683
  constructor(options) {
4685
4684
  this.signer = options.signer;
@@ -4748,7 +4747,7 @@ function createAftHelper(options) {
4748
4747
  }
4749
4748
  const DEFAULT_STICKINESS_SECURITY_LEVEL = StickinessMode.SIGNED_OPTIONAL;
4750
4749
 
4751
- const logger$5 = getLogger$1("naylence.fame.stickiness.aft_verifier");
4750
+ const logger$5 = getLogger("naylence.fame.stickiness.aft_verifier");
4752
4751
  function decodeToken(token) {
4753
4752
  const parts = token.split(".");
4754
4753
  if (parts.length !== 3) {
@@ -5034,7 +5033,7 @@ function createAftVerifier(options) {
5034
5033
  }
5035
5034
  }
5036
5035
 
5037
- const logger$4 = getLogger$1("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
5036
+ const logger$4 = getLogger("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
5038
5037
  class AFTAssociation {
5039
5038
  constructor(params) {
5040
5039
  this.replicaId = params.replicaId;
@@ -5544,7 +5543,7 @@ var aftLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
5544
5543
  default: AFTLoadBalancerStickinessManagerFactory
5545
5544
  });
5546
5545
 
5547
- const logger$3 = getLogger$1("naylence.fame.stickiness.aft_replica_stickiness_manager");
5546
+ const logger$3 = getLogger("naylence.fame.stickiness.aft_replica_stickiness_manager");
5548
5547
  function isStickinessRequired(context) {
5549
5548
  if (typeof context.stickinessRequired === "boolean") {
5550
5549
  return context.stickinessRequired;
@@ -5794,7 +5793,7 @@ var aftReplicaStickinessManagerFactory = /*#__PURE__*/Object.freeze({
5794
5793
  default: AFTReplicaStickinessManagerFactory
5795
5794
  });
5796
5795
 
5797
- const logger$2 = getLogger$1("naylence.fame.welcome.advanced_welcome_service");
5796
+ const logger$2 = getLogger("naylence.fame.welcome.advanced_welcome_service");
5798
5797
  const ENV_VAR_SHOW_ENVELOPES = "FAME_SHOW_ENVELOPES";
5799
5798
  const DEFAULT_TTL_SEC = 3600;
5800
5799
  const showEnvelopes = typeof process !== "undefined" &&
@@ -6886,7 +6885,7 @@ class CASigningService extends CAService {
6886
6885
  const publicKeyPem = derToPem(publicKeyDer, "PUBLIC KEY");
6887
6886
  // Determine node SID and physical path (mirrors Python logic)
6888
6887
  const physicalPath = csr.physicalPath || `/unknown/${csr.requesterId}`;
6889
- const nodeSid = secureDigest$1(physicalPath);
6888
+ const nodeSid = secureDigest(physicalPath);
6890
6889
  const logicals = csr.logicals || [];
6891
6890
  // Issue the certificate (short-lived: 1 day)
6892
6891
  const certificatePem = await this.signNodeCert(publicKeyPem, csr.requesterId, // Use requesterId as node_id
@@ -6918,7 +6917,7 @@ class CASigningService extends CAService {
6918
6917
  await this.ensureSigningMaterials();
6919
6918
  const signingCert = this.getSigningCertificate();
6920
6919
  const signingKey = this.getSigningKey();
6921
- const expectedSid = secureDigest$1(physicalPath);
6920
+ const expectedSid = secureDigest(physicalPath);
6922
6921
  if (expectedSid !== nodeSid) {
6923
6922
  throw new Error("Provided SID does not match the computed SID for the physical path");
6924
6923
  }
@@ -7663,7 +7662,7 @@ function encodeBitString(signature) {
7663
7662
  return result.buffer;
7664
7663
  }
7665
7664
 
7666
- const logger$1 = getLogger$1("naylence.fame.security.cert.default_certificate_manager");
7665
+ const logger$1 = getLogger("naylence.fame.security.cert.default_certificate_manager");
7667
7666
  const CONNECTION_GRANTS_CAMEL = "connectionGrants";
7668
7667
  const CONNECTION_GRANTS_SNAKE = "connection_grants";
7669
7668
  class DefaultCertificateManager {
@@ -8454,9 +8453,6 @@ function normalizeAuthConfig(candidate) {
8454
8453
  async function resolveTrustStorePemFromEnvironment() {
8455
8454
  try {
8456
8455
  const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
8457
- if (typeof provider.initialize === "function") {
8458
- await provider.initialize();
8459
- }
8460
8456
  const pem = await provider.getTrustStorePem();
8461
8457
  return normalizePemOrNull(pem);
8462
8458
  }
@@ -8497,18 +8493,18 @@ function normalizeSecuritySettings(config, explicit) {
8497
8493
  return null;
8498
8494
  }
8499
8495
  function normalizeSigning(config, explicit) {
8500
- if (explicit instanceof SigningConfigClass$1) {
8496
+ if (explicit instanceof SigningConfigClass) {
8501
8497
  return explicit;
8502
8498
  }
8503
8499
  if (explicit && typeof explicit === "object") {
8504
- return new SigningConfigClass$1(explicit);
8500
+ return new SigningConfigClass(explicit);
8505
8501
  }
8506
8502
  const candidate = config.signing ?? null;
8507
- if (candidate instanceof SigningConfigClass$1) {
8503
+ if (candidate instanceof SigningConfigClass) {
8508
8504
  return candidate;
8509
8505
  }
8510
8506
  if (candidate && typeof candidate === "object") {
8511
- return new SigningConfigClass$1(candidate);
8507
+ return new SigningConfigClass(candidate);
8512
8508
  }
8513
8509
  return null;
8514
8510
  }
@@ -8657,7 +8653,7 @@ function bytesToUtf8$1(data) {
8657
8653
 
8658
8654
  const DEFAULT_REFRESH_INTERVAL_MS = 86400000; // 24 hours
8659
8655
  const MIN_REFRESH_INTERVAL_MS = 60000; // 1 minute
8660
- const logger = getLogger$1("naylence.fame.security.cert.trust_store.http_bundle_provider");
8656
+ const logger = getLogger("naylence.fame.security.cert.trust_store.http_bundle_provider");
8661
8657
  function isTruthyFlag(value) {
8662
8658
  if (typeof value === "boolean") {
8663
8659
  return value;
@@ -4,11 +4,10 @@ var asn1Schema = require('@peculiar/asn1-schema');
4
4
  var asn1X509 = require('@peculiar/asn1-x509');
5
5
  var sha2_js = require('@noble/hashes/sha2.js');
6
6
  var ed25519 = require('@noble/ed25519');
7
- var node = require('@naylence/runtime/node');
7
+ var runtime = require('@naylence/runtime');
8
8
  var asn1Csr = require('@peculiar/asn1-csr');
9
9
  var x509 = require('@peculiar/x509');
10
10
  var core = require('@naylence/core');
11
- var runtime = require('@naylence/runtime');
12
11
  var chacha_js = require('@noble/ciphers/chacha.js');
13
12
  var ed25519_js = require('@noble/curves/ed25519.js');
14
13
  var hkdf_js = require('@noble/hashes/hkdf.js');
@@ -18,14 +17,14 @@ var jose = require('jose');
18
17
  var sha256_js = require('@noble/hashes/sha256.js');
19
18
 
20
19
  // This file is auto-generated during build - do not edit manually
21
- // Generated from package.json version: 0.3.7-test.124
20
+ // Generated from package.json version: 0.3.7-test.126
22
21
  /**
23
22
  * The package version, injected at build time.
24
23
  * @internal
25
24
  */
26
- const VERSION = '0.3.7-test.124';
25
+ const VERSION = '0.3.7-test.126';
27
26
 
28
- const logger$h = node.getLogger("naylence.fame.security.cert.util");
27
+ const logger$h = runtime.getLogger("naylence.fame.security.cert.util");
29
28
  const CACHE_LIMIT = 512;
30
29
  const OID_ED25519 = "1.3.101.112";
31
30
  const textEncoder = new TextEncoder();
@@ -7455,9 +7454,6 @@ function normalizeAuthConfig(candidate) {
7455
7454
  async function resolveTrustStorePemFromEnvironment() {
7456
7455
  try {
7457
7456
  const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
7458
- if (typeof provider.initialize === "function") {
7459
- await provider.initialize();
7460
- }
7461
7457
  const pem = await provider.getTrustStorePem();
7462
7458
  return normalizePemOrNull(pem);
7463
7459
  }
@@ -7471,7 +7467,7 @@ async function resolveTrustStorePemFromEnvironment() {
7471
7467
  }
7472
7468
 
7473
7469
  const FACTORY_META$4 = {
7474
- base: node.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
7470
+ base: runtime.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
7475
7471
  key: "DefaultCertificateManager",
7476
7472
  };
7477
7473
  function normalizeConfig$1(config) {
@@ -7498,18 +7494,18 @@ function normalizeSecuritySettings(config, explicit) {
7498
7494
  return null;
7499
7495
  }
7500
7496
  function normalizeSigning(config, explicit) {
7501
- if (explicit instanceof node.SigningConfigClass) {
7497
+ if (explicit instanceof runtime.SigningConfigClass) {
7502
7498
  return explicit;
7503
7499
  }
7504
7500
  if (explicit && typeof explicit === "object") {
7505
- return new node.SigningConfigClass(explicit);
7501
+ return new runtime.SigningConfigClass(explicit);
7506
7502
  }
7507
7503
  const candidate = config.signing ?? null;
7508
- if (candidate instanceof node.SigningConfigClass) {
7504
+ if (candidate instanceof runtime.SigningConfigClass) {
7509
7505
  return candidate;
7510
7506
  }
7511
7507
  if (candidate && typeof candidate === "object") {
7512
- return new node.SigningConfigClass(candidate);
7508
+ return new runtime.SigningConfigClass(candidate);
7513
7509
  }
7514
7510
  return null;
7515
7511
  }
@@ -7523,7 +7519,7 @@ function normalizeOptions(config, securitySettings, signing) {
7523
7519
  cryptoProvider,
7524
7520
  };
7525
7521
  }
7526
- class DefaultCertificateManagerFactory extends node.CertificateManagerFactory {
7522
+ class DefaultCertificateManagerFactory extends runtime.CertificateManagerFactory {
7527
7523
  constructor() {
7528
7524
  super(...arguments);
7529
7525
  this.type = "DefaultCertificateManager";
@@ -9166,7 +9162,7 @@ class CASigningService extends CAService {
9166
9162
  const publicKeyPem = derToPem(publicKeyDer, "PUBLIC KEY");
9167
9163
  // Determine node SID and physical path (mirrors Python logic)
9168
9164
  const physicalPath = csr.physicalPath || `/unknown/${csr.requesterId}`;
9169
- const nodeSid = node.secureDigest(physicalPath);
9165
+ const nodeSid = runtime.secureDigest(physicalPath);
9170
9166
  const logicals = csr.logicals || [];
9171
9167
  // Issue the certificate (short-lived: 1 day)
9172
9168
  const certificatePem = await this.signNodeCert(publicKeyPem, csr.requesterId, // Use requesterId as node_id
@@ -9198,13 +9194,13 @@ class CASigningService extends CAService {
9198
9194
  await this.ensureSigningMaterials();
9199
9195
  const signingCert = this.getSigningCertificate();
9200
9196
  const signingKey = this.getSigningKey();
9201
- const expectedSid = node.secureDigest(physicalPath);
9197
+ const expectedSid = runtime.secureDigest(physicalPath);
9202
9198
  if (expectedSid !== nodeSid) {
9203
9199
  throw new Error("Provided SID does not match the computed SID for the physical path");
9204
9200
  }
9205
9201
  const logicalHosts = logicals ?? [];
9206
9202
  for (const logical of logicalHosts) {
9207
- const [valid, error] = node.validateHostLogical(logical);
9203
+ const [valid, error] = runtime.validateHostLogical(logical);
9208
9204
  if (!valid) {
9209
9205
  throw new Error(`Invalid logical host '${logical}': ${error ?? "unknown error"}`);
9210
9206
  }
@@ -2,11 +2,10 @@ import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
2
2
  import { Certificate, id_ce_subjectAltName, SubjectAlternativeName, id_ce_nameConstraints, NameConstraints, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, TBSCertificate, Validity, Version, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, KeyUsage, id_ce_keyUsage, SubjectKeyIdentifier, id_ce_subjectKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, id_ce_authorityKeyIdentifier, GeneralSubtrees, GeneralSubtree, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth, id_ce_extKeyUsage } from '@peculiar/asn1-x509';
3
3
  import { sha512, sha256 } from '@noble/hashes/sha2.js';
4
4
  import { verify, etc } from '@noble/ed25519';
5
- import { getLogger, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, SigningConfigClass as SigningConfigClass$1, CertificateManagerFactory, secureDigest as secureDigest$1, validateHostLogical } from '@naylence/runtime/node';
5
+ import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, validateHostLogical } from '@naylence/runtime';
6
6
  import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
7
7
  import { X509Certificate } from '@peculiar/x509';
8
8
  import { localDeliveryContext, createFameEnvelope, FameAddress, generateId, formatAddress, SigningMaterial, DeliveryOriginType as DeliveryOriginType$1 } from '@naylence/core';
9
- import { getLogger as getLogger$1, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory } from '@naylence/runtime';
10
9
  import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
11
10
  import { x25519 } from '@noble/curves/ed25519.js';
12
11
  import { hkdf } from '@noble/hashes/hkdf.js';
@@ -16,12 +15,12 @@ import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose
16
15
  import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
17
16
 
18
17
  // This file is auto-generated during build - do not edit manually
19
- // Generated from package.json version: 0.3.7-test.124
18
+ // Generated from package.json version: 0.3.7-test.126
20
19
  /**
21
20
  * The package version, injected at build time.
22
21
  * @internal
23
22
  */
24
- const VERSION = '0.3.7-test.124';
23
+ const VERSION = '0.3.7-test.126';
25
24
 
26
25
  const logger$h = getLogger("naylence.fame.security.cert.util");
27
26
  const CACHE_LIMIT = 512;
@@ -1261,7 +1260,7 @@ class CAServiceClient {
1261
1260
  }
1262
1261
  }
1263
1262
 
1264
- const logger$f = getLogger$1("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
1263
+ const logger$f = getLogger("naylence.fame.security.encryption.sealed.x25519_encryption_manager");
1265
1264
  class X25519EncryptionManager {
1266
1265
  constructor({ keyProvider, nodeLike = null, cryptoProvider = null, }) {
1267
1266
  this.pendingEnvelopes = new Map();
@@ -1890,7 +1889,7 @@ var index$1 = /*#__PURE__*/Object.freeze({
1890
1889
  X25519EncryptionManagerFactory: X25519EncryptionManagerFactory
1891
1890
  });
1892
1891
 
1893
- const logger$e = getLogger$1("naylence.fame.security.encryption.channel.channel_encryption_manager");
1892
+ const logger$e = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager");
1894
1893
  const SUPPORTED_CHANNEL_ALGORITHMS = ["chacha20-poly1305-channel"];
1895
1894
  const CHANNEL_ENCRYPTION_ALGORITHM = "chacha20-poly1305-channel";
1896
1895
  const HANDSHAKE_ALGORITHM = "CHACHA20P1305";
@@ -2626,7 +2625,7 @@ class ChannelEncryptionManager {
2626
2625
  }
2627
2626
  }
2628
2627
 
2629
- const logger$d = getLogger$1("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
2628
+ const logger$d = getLogger("naylence.fame.security.encryption.channel.channel_encryption_manager_factory");
2630
2629
  const DEFAULT_SUPPORTED_ALGORITHMS = ["chacha20-poly1305-channel"];
2631
2630
  const FACTORY_META$d = {
2632
2631
  base: ENCRYPTION_MANAGER_FACTORY_BASE_TYPE,
@@ -2720,7 +2719,7 @@ var index = /*#__PURE__*/Object.freeze({
2720
2719
  ChannelEncryptionManagerFactory: ChannelEncryptionManagerFactory
2721
2720
  });
2722
2721
 
2723
- const logger$c = getLogger$1("naylence.fame.security.encryption.default_secure_channel_manager");
2722
+ const logger$c = getLogger("naylence.fame.security.encryption.default_secure_channel_manager");
2724
2723
  const DEFAULT_ALGORITHM = "CHACHA20P1305";
2725
2724
  const CHANNEL_KEY_LENGTH = 32;
2726
2725
  const NONCE_PREFIX_LENGTH = 4;
@@ -3050,7 +3049,7 @@ var defaultSecureChannelManagerFactory = /*#__PURE__*/Object.freeze({
3050
3049
  default: DefaultSecureChannelManagerFactory
3051
3050
  });
3052
3051
 
3053
- const logger$b = getLogger$1("naylence.fame.security.encryption.encryption_manager_registry");
3052
+ const logger$b = getLogger("naylence.fame.security.encryption.encryption_manager_registry");
3054
3053
  class EncryptionManagerFactoryRegistry {
3055
3054
  constructor(autoDiscover = true) {
3056
3055
  this.factories = [];
@@ -3214,7 +3213,7 @@ function registerEncryptionManagerFactory(factory) {
3214
3213
  globalRegistry.registerFactory(factory);
3215
3214
  }
3216
3215
 
3217
- const logger$a = getLogger$1("naylence.fame.security.encryption.composite_encryption_manager");
3216
+ const logger$a = getLogger("naylence.fame.security.encryption.composite_encryption_manager");
3218
3217
  const DEFAULT_SEALED_ALGORITHMS = [
3219
3218
  "X25519",
3220
3219
  "ECDH-ES+A256GCM",
@@ -3533,7 +3532,7 @@ class CompositeEncryptionManager {
3533
3532
  }
3534
3533
  }
3535
3534
 
3536
- const logger$9 = getLogger$1("naylence.fame.security.encryption.composite_encryption_manager_factory");
3535
+ const logger$9 = getLogger("naylence.fame.security.encryption.composite_encryption_manager_factory");
3537
3536
  const DEFAULT_PRIORITY = 1000;
3538
3537
  const DEFAULT_ENCRYPTION_TYPE = "composite";
3539
3538
  const FACTORY_META$b = {
@@ -3944,7 +3943,7 @@ var eddsaEnvelopeVerifierFactory = /*#__PURE__*/Object.freeze({
3944
3943
  default: AdvancedEdDSAEnvelopeVerifierFactory
3945
3944
  });
3946
3945
 
3947
- const logger$8 = getLogger$1("naylence.fame.security.keys.x5c_key_manager");
3946
+ const logger$8 = getLogger("naylence.fame.security.keys.x5c_key_manager");
3948
3947
  let x509ModulePromise$1 = null;
3949
3948
  async function loadX509Module$1() {
3950
3949
  if (!x509ModulePromise$1) {
@@ -4555,7 +4554,7 @@ function utf8Decode(data) {
4555
4554
  return decodeURIComponent(escape(str));
4556
4555
  }
4557
4556
 
4558
- const logger$7 = getLogger$1("naylence.fame.stickiness.aft_signer");
4557
+ const logger$7 = getLogger("naylence.fame.stickiness.aft_signer");
4559
4558
  class AbstractAFTSigner {
4560
4559
  constructor(kid, maxTtlSec = 7200) {
4561
4560
  this.kid = kid;
@@ -4697,7 +4696,7 @@ function createAftSigner(options) {
4697
4696
  }
4698
4697
  }
4699
4698
 
4700
- const logger$6 = getLogger$1("naylence.fame.stickiness.aft_helper");
4699
+ const logger$6 = getLogger("naylence.fame.stickiness.aft_helper");
4701
4700
  class AFTHelper {
4702
4701
  constructor(options) {
4703
4702
  this.signer = options.signer;
@@ -4766,7 +4765,7 @@ function createAftHelper(options) {
4766
4765
  }
4767
4766
  const DEFAULT_STICKINESS_SECURITY_LEVEL = StickinessMode.SIGNED_OPTIONAL;
4768
4767
 
4769
- const logger$5 = getLogger$1("naylence.fame.stickiness.aft_verifier");
4768
+ const logger$5 = getLogger("naylence.fame.stickiness.aft_verifier");
4770
4769
  function decodeToken(token) {
4771
4770
  const parts = token.split(".");
4772
4771
  if (parts.length !== 3) {
@@ -5052,7 +5051,7 @@ function createAftVerifier(options) {
5052
5051
  }
5053
5052
  }
5054
5053
 
5055
- const logger$4 = getLogger$1("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
5054
+ const logger$4 = getLogger("naylence.fame.stickiness.aft_load_balancer_stickiness_manager");
5056
5055
  class AFTAssociation {
5057
5056
  constructor(params) {
5058
5057
  this.replicaId = params.replicaId;
@@ -5562,7 +5561,7 @@ var aftLoadBalancerStickinessManagerFactory = /*#__PURE__*/Object.freeze({
5562
5561
  default: AFTLoadBalancerStickinessManagerFactory
5563
5562
  });
5564
5563
 
5565
- const logger$3 = getLogger$1("naylence.fame.stickiness.aft_replica_stickiness_manager");
5564
+ const logger$3 = getLogger("naylence.fame.stickiness.aft_replica_stickiness_manager");
5566
5565
  function isStickinessRequired(context) {
5567
5566
  if (typeof context.stickinessRequired === "boolean") {
5568
5567
  return context.stickinessRequired;
@@ -5812,7 +5811,7 @@ var aftReplicaStickinessManagerFactory = /*#__PURE__*/Object.freeze({
5812
5811
  default: AFTReplicaStickinessManagerFactory
5813
5812
  });
5814
5813
 
5815
- const logger$2 = getLogger$1("naylence.fame.welcome.advanced_welcome_service");
5814
+ const logger$2 = getLogger("naylence.fame.welcome.advanced_welcome_service");
5816
5815
  const ENV_VAR_SHOW_ENVELOPES = "FAME_SHOW_ENVELOPES";
5817
5816
  const DEFAULT_TTL_SEC = 3600;
5818
5817
  const showEnvelopes = typeof process !== "undefined" &&
@@ -6662,7 +6661,7 @@ function encodeBitString(signature) {
6662
6661
  return result.buffer;
6663
6662
  }
6664
6663
 
6665
- const logger$1 = getLogger$1("naylence.fame.security.cert.default_certificate_manager");
6664
+ const logger$1 = getLogger("naylence.fame.security.cert.default_certificate_manager");
6666
6665
  const CONNECTION_GRANTS_CAMEL = "connectionGrants";
6667
6666
  const CONNECTION_GRANTS_SNAKE = "connection_grants";
6668
6667
  class DefaultCertificateManager {
@@ -7453,9 +7452,6 @@ function normalizeAuthConfig(candidate) {
7453
7452
  async function resolveTrustStorePemFromEnvironment() {
7454
7453
  try {
7455
7454
  const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
7456
- if (typeof provider.initialize === "function") {
7457
- await provider.initialize();
7458
- }
7459
7455
  const pem = await provider.getTrustStorePem();
7460
7456
  return normalizePemOrNull(pem);
7461
7457
  }
@@ -7496,18 +7492,18 @@ function normalizeSecuritySettings(config, explicit) {
7496
7492
  return null;
7497
7493
  }
7498
7494
  function normalizeSigning(config, explicit) {
7499
- if (explicit instanceof SigningConfigClass$1) {
7495
+ if (explicit instanceof SigningConfigClass) {
7500
7496
  return explicit;
7501
7497
  }
7502
7498
  if (explicit && typeof explicit === "object") {
7503
- return new SigningConfigClass$1(explicit);
7499
+ return new SigningConfigClass(explicit);
7504
7500
  }
7505
7501
  const candidate = config.signing ?? null;
7506
- if (candidate instanceof SigningConfigClass$1) {
7502
+ if (candidate instanceof SigningConfigClass) {
7507
7503
  return candidate;
7508
7504
  }
7509
7505
  if (candidate && typeof candidate === "object") {
7510
- return new SigningConfigClass$1(candidate);
7506
+ return new SigningConfigClass(candidate);
7511
7507
  }
7512
7508
  return null;
7513
7509
  }
@@ -7663,7 +7659,7 @@ function bytesToUtf8$1(data) {
7663
7659
 
7664
7660
  const DEFAULT_REFRESH_INTERVAL_MS = 86400000; // 24 hours
7665
7661
  const MIN_REFRESH_INTERVAL_MS = 60000; // 1 minute
7666
- const logger = getLogger$1("naylence.fame.security.cert.trust_store.http_bundle_provider");
7662
+ const logger = getLogger("naylence.fame.security.cert.trust_store.http_bundle_provider");
7667
7663
  function isTruthyFlag(value) {
7668
7664
  if (typeof value === "boolean") {
7669
7665
  return value;
@@ -9164,7 +9160,7 @@ class CASigningService extends CAService {
9164
9160
  const publicKeyPem = derToPem(publicKeyDer, "PUBLIC KEY");
9165
9161
  // Determine node SID and physical path (mirrors Python logic)
9166
9162
  const physicalPath = csr.physicalPath || `/unknown/${csr.requesterId}`;
9167
- const nodeSid = secureDigest$1(physicalPath);
9163
+ const nodeSid = secureDigest(physicalPath);
9168
9164
  const logicals = csr.logicals || [];
9169
9165
  // Issue the certificate (short-lived: 1 day)
9170
9166
  const certificatePem = await this.signNodeCert(publicKeyPem, csr.requesterId, // Use requesterId as node_id
@@ -9196,7 +9192,7 @@ class CASigningService extends CAService {
9196
9192
  await this.ensureSigningMaterials();
9197
9193
  const signingCert = this.getSigningCertificate();
9198
9194
  const signingKey = this.getSigningKey();
9199
- const expectedSid = secureDigest$1(physicalPath);
9195
+ const expectedSid = secureDigest(physicalPath);
9200
9196
  if (expectedSid !== nodeSid) {
9201
9197
  throw new Error("Provided SID does not match the computed SID for the physical path");
9202
9198
  }
@@ -1,7 +1,5 @@
1
1
  import type { SecuritySettings } from "@naylence/core";
2
- import { CertificateManagerFactory, type CertificateManagerConfig } from "@naylence/runtime/node";
3
- import type { SigningConfig } from "@naylence/runtime";
4
- import type { CertificateManager } from "@naylence/runtime";
2
+ import { CertificateManagerFactory, type CertificateManagerConfig, type SigningConfig, type CertificateManager } from "@naylence/runtime";
5
3
  export interface DefaultCertificateManagerConfig extends CertificateManagerConfig {
6
4
  type: "DefaultCertificateManager";
7
5
  caServiceUrl?: string | null;
@@ -1 +1 @@
1
- {"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEvD,OAAO,EACL,yBAAyB,EAEzB,KAAK,wBAAwB,EAC9B,MAAM,wBAAwB,CAAC;AAOhC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,mBAAmB,CAAC;AACvD,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAC;AAE5D,MAAM,WAAW,+BACf,SAAQ,wBAAwB;IAChC,IAAI,EAAE,2BAA2B,CAAC;IAClC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,cAAc,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC/B,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC3C,iBAAiB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC5C,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAChC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAClC;AAED,eAAO,MAAM,YAAY;;;CAGf,CAAC;AA6EX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,EAC1C,OAAO,CAAC,EAAE,aAAa,GAAG,IAAI,EAC9B,GAAG,YAAY,EAAE,OAAO,EAAE,GACzB,OAAO,CAAC,kBAAkB,CAAC;CAe/B;AAED,eAAe,gCAAgC,CAAC"}
1
+ {"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AACvD,OAAO,EAEL,yBAAyB,EAEzB,KAAK,wBAAwB,EAC7B,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACxB,MAAM,mBAAmB,CAAC;AAQ3B,MAAM,WAAW,+BACf,SAAQ,wBAAwB;IAChC,IAAI,EAAE,2BAA2B,CAAC;IAClC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,cAAc,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC/B,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC3C,iBAAiB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC5C,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAChC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAClC;AAED,eAAO,MAAM,YAAY;;;CAGf,CAAC;AA6EX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,EAC1C,OAAO,CAAC,EAAE,aAAa,GAAG,IAAI,EAC9B,GAAG,YAAY,EAAE,OAAO,EAAE,GACzB,OAAO,CAAC,kBAAkB,CAAC;CAe/B;AAED,eAAe,gCAAgC,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAe3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAwCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAwRD,eAAe,yBAAyB,CAAC"}
1
+ {"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAe3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAwCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAqRD,eAAe,yBAAyB,CAAC"}
@@ -2,5 +2,5 @@
2
2
  * The package version, injected at build time.
3
3
  * @internal
4
4
  */
5
- export declare const VERSION = "0.3.7-test.124";
5
+ export declare const VERSION = "0.3.7-test.126";
6
6
  //# sourceMappingURL=version.d.ts.map
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@naylence/advanced-security",
3
- "version": "0.3.7-test.124",
3
+ "version": "0.3.7-test.126",
4
4
  "type": "module",
5
5
  "description": "Advanced security utilities for the Naylence Fame runtime implemented in TypeScript.",
6
6
  "author": "Naylence Dev <naylencedev@gmail.com>",