@naylence/advanced-security 0.3.7-test.125 → 0.3.7-test.127
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +13 -68
- package/dist/browser/index.mjs +9 -64
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js +2 -21
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
- package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js +2 -21
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
- package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +13 -68
- package/dist/node/index.mjs +9 -64
- package/dist/node/node.cjs +52 -68
- package/dist/node/node.mjs +53 -69
- package/dist/types/naylence/fame/security/cert/default-certificate-manager.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts +1 -2
- package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts +1 -2
- package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts +2 -2
- package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts.map +1 -1
- package/dist/types/version.d.ts +1 -1
- package/package.json +2 -2
package/dist/node/index.mjs
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory } from '@naylence/runtime';
|
|
2
|
-
import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
|
|
1
|
+
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TrustStoreProviderFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE } from '@naylence/runtime';
|
|
3
2
|
import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
|
|
4
3
|
import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
|
|
5
4
|
import { Certificate, SubjectAlternativeName, NameConstraints, id_ce_subjectAltName, id_ce_nameConstraints, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, id_ce_keyUsage, KeyUsage, id_ce_subjectKeyIdentifier, SubjectKeyIdentifier, id_ce_authorityKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, GeneralSubtrees, GeneralSubtree, TBSCertificate, Validity, Version, id_ce_extKeyUsage, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth } from '@peculiar/asn1-x509';
|
|
@@ -11,16 +10,17 @@ import { x25519 } from '@noble/curves/ed25519.js';
|
|
|
11
10
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
12
11
|
import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.js';
|
|
13
12
|
import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
|
|
13
|
+
import { ExtensionManager, Registry, AbstractResourceFactory } from '@naylence/factory';
|
|
14
14
|
import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
|
|
15
15
|
import { X509Certificate } from '@peculiar/x509';
|
|
16
16
|
|
|
17
17
|
// This file is auto-generated during build - do not edit manually
|
|
18
|
-
// Generated from package.json version: 0.3.7-test.
|
|
18
|
+
// Generated from package.json version: 0.3.7-test.127
|
|
19
19
|
/**
|
|
20
20
|
* The package version, injected at build time.
|
|
21
21
|
* @internal
|
|
22
22
|
*/
|
|
23
|
-
const VERSION = '0.3.7-test.
|
|
23
|
+
const VERSION = '0.3.7-test.127';
|
|
24
24
|
|
|
25
25
|
const logger$h = getLogger("naylence.fame.security.cert.util");
|
|
26
26
|
const CACHE_LIMIT = 512;
|
|
@@ -3857,45 +3857,6 @@ class EdDSAEnvelopeVerifier {
|
|
|
3857
3857
|
}
|
|
3858
3858
|
}
|
|
3859
3859
|
|
|
3860
|
-
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
3861
|
-
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
3862
|
-
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
3863
|
-
createUnconfiguredProvider(reason) {
|
|
3864
|
-
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
3865
|
-
}
|
|
3866
|
-
static async createTrustStoreProvider(config, options = {}) {
|
|
3867
|
-
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
3868
|
-
const mergedFactoryArgs = [
|
|
3869
|
-
...(dependencies ? [dependencies] : []),
|
|
3870
|
-
...(factoryArgs ?? []),
|
|
3871
|
-
];
|
|
3872
|
-
const creationOptions = {
|
|
3873
|
-
...restOptions,
|
|
3874
|
-
factoryArgs: mergedFactoryArgs,
|
|
3875
|
-
};
|
|
3876
|
-
if (config) {
|
|
3877
|
-
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
3878
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3879
|
-
}
|
|
3880
|
-
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
3881
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3882
|
-
}
|
|
3883
|
-
}
|
|
3884
|
-
class NullTrustStoreProvider {
|
|
3885
|
-
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
3886
|
-
this.reason = reason;
|
|
3887
|
-
}
|
|
3888
|
-
async getTrustStorePem() {
|
|
3889
|
-
throw new Error(this.reason);
|
|
3890
|
-
}
|
|
3891
|
-
async getRoots() {
|
|
3892
|
-
return [];
|
|
3893
|
-
}
|
|
3894
|
-
async initialize() {
|
|
3895
|
-
// No-op for the placeholder provider.
|
|
3896
|
-
}
|
|
3897
|
-
}
|
|
3898
|
-
|
|
3899
3860
|
const FACTORY_META$8 = {
|
|
3900
3861
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
3901
3862
|
key: "EdDSAEnvelopeVerifier",
|
|
@@ -3909,10 +3870,12 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
3909
3870
|
this.isDefault = true;
|
|
3910
3871
|
this.priority = 100;
|
|
3911
3872
|
}
|
|
3912
|
-
async create(_config, keyProvider, signingConfig,
|
|
3873
|
+
async create(_config, keyProvider, signingConfig, ...factoryArgs) {
|
|
3913
3874
|
if (!keyProvider) {
|
|
3914
3875
|
throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
|
|
3915
3876
|
}
|
|
3877
|
+
// Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
|
|
3878
|
+
const options = factoryArgs[0] ?? {};
|
|
3916
3879
|
let trustStoreProvider = options.trustStoreProvider ?? null;
|
|
3917
3880
|
if (!trustStoreProvider) {
|
|
3918
3881
|
trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
@@ -8167,10 +8130,9 @@ class DefaultCertificateManager {
|
|
|
8167
8130
|
});
|
|
8168
8131
|
}
|
|
8169
8132
|
}
|
|
8170
|
-
const envPem = await resolveTrustStorePemFromEnvironment();
|
|
8171
8133
|
return {
|
|
8172
|
-
pem:
|
|
8173
|
-
reason:
|
|
8134
|
+
pem: null,
|
|
8135
|
+
reason: "trust_store_provider_unconfigured",
|
|
8174
8136
|
};
|
|
8175
8137
|
}
|
|
8176
8138
|
async resolveTrustStorePemFromProvider(provider, nodeId) {
|
|
@@ -8450,23 +8412,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
8450
8412
|
}
|
|
8451
8413
|
return normalized;
|
|
8452
8414
|
}
|
|
8453
|
-
async function resolveTrustStorePemFromEnvironment() {
|
|
8454
|
-
try {
|
|
8455
|
-
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
8456
|
-
if (typeof provider.initialize === "function") {
|
|
8457
|
-
await provider.initialize();
|
|
8458
|
-
}
|
|
8459
|
-
const pem = await provider.getTrustStorePem();
|
|
8460
|
-
return normalizePemOrNull(pem);
|
|
8461
|
-
}
|
|
8462
|
-
catch (error) {
|
|
8463
|
-
const message = error instanceof Error ? error.message : String(error);
|
|
8464
|
-
logger$1.debug("trust_store_provider_resolution_failed", {
|
|
8465
|
-
error: message,
|
|
8466
|
-
});
|
|
8467
|
-
return null;
|
|
8468
|
-
}
|
|
8469
|
-
}
|
|
8470
8415
|
|
|
8471
8416
|
const FACTORY_META$2 = {
|
|
8472
8417
|
base: CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
package/dist/node/node.cjs
CHANGED
|
@@ -12,17 +12,17 @@ var chacha_js = require('@noble/ciphers/chacha.js');
|
|
|
12
12
|
var ed25519_js = require('@noble/curves/ed25519.js');
|
|
13
13
|
var hkdf_js = require('@noble/hashes/hkdf.js');
|
|
14
14
|
var utils_js = require('@noble/hashes/utils.js');
|
|
15
|
-
var factory = require('@naylence/factory');
|
|
16
15
|
var jose = require('jose');
|
|
16
|
+
var factory = require('@naylence/factory');
|
|
17
17
|
var sha256_js = require('@noble/hashes/sha256.js');
|
|
18
18
|
|
|
19
19
|
// This file is auto-generated during build - do not edit manually
|
|
20
|
-
// Generated from package.json version: 0.3.7-test.
|
|
20
|
+
// Generated from package.json version: 0.3.7-test.127
|
|
21
21
|
/**
|
|
22
22
|
* The package version, injected at build time.
|
|
23
23
|
* @internal
|
|
24
24
|
*/
|
|
25
|
-
const VERSION = '0.3.7-test.
|
|
25
|
+
const VERSION = '0.3.7-test.127';
|
|
26
26
|
|
|
27
27
|
const logger$h = runtime.getLogger("naylence.fame.security.cert.util");
|
|
28
28
|
const CACHE_LIMIT = 512;
|
|
@@ -3870,45 +3870,6 @@ class EdDSAEnvelopeVerifier {
|
|
|
3870
3870
|
}
|
|
3871
3871
|
}
|
|
3872
3872
|
|
|
3873
|
-
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
3874
|
-
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
3875
|
-
class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
|
|
3876
|
-
createUnconfiguredProvider(reason) {
|
|
3877
|
-
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
3878
|
-
}
|
|
3879
|
-
static async createTrustStoreProvider(config, options = {}) {
|
|
3880
|
-
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
3881
|
-
const mergedFactoryArgs = [
|
|
3882
|
-
...(dependencies ? [dependencies] : []),
|
|
3883
|
-
...(factoryArgs ?? []),
|
|
3884
|
-
];
|
|
3885
|
-
const creationOptions = {
|
|
3886
|
-
...restOptions,
|
|
3887
|
-
factoryArgs: mergedFactoryArgs,
|
|
3888
|
-
};
|
|
3889
|
-
if (config) {
|
|
3890
|
-
const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
3891
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3892
|
-
}
|
|
3893
|
-
const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
3894
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3895
|
-
}
|
|
3896
|
-
}
|
|
3897
|
-
class NullTrustStoreProvider {
|
|
3898
|
-
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
3899
|
-
this.reason = reason;
|
|
3900
|
-
}
|
|
3901
|
-
async getTrustStorePem() {
|
|
3902
|
-
throw new Error(this.reason);
|
|
3903
|
-
}
|
|
3904
|
-
async getRoots() {
|
|
3905
|
-
return [];
|
|
3906
|
-
}
|
|
3907
|
-
async initialize() {
|
|
3908
|
-
// No-op for the placeholder provider.
|
|
3909
|
-
}
|
|
3910
|
-
}
|
|
3911
|
-
|
|
3912
3873
|
const FACTORY_META$9 = {
|
|
3913
3874
|
base: runtime.ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
3914
3875
|
key: "EdDSAEnvelopeVerifier",
|
|
@@ -3922,13 +3883,15 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends runtime.EnvelopeVerifierFacto
|
|
|
3922
3883
|
this.isDefault = true;
|
|
3923
3884
|
this.priority = 100;
|
|
3924
3885
|
}
|
|
3925
|
-
async create(_config, keyProvider, signingConfig,
|
|
3886
|
+
async create(_config, keyProvider, signingConfig, ...factoryArgs) {
|
|
3926
3887
|
if (!keyProvider) {
|
|
3927
3888
|
throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
|
|
3928
3889
|
}
|
|
3890
|
+
// Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
|
|
3891
|
+
const options = factoryArgs[0] ?? {};
|
|
3929
3892
|
let trustStoreProvider = options.trustStoreProvider ?? null;
|
|
3930
3893
|
if (!trustStoreProvider) {
|
|
3931
|
-
trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
3894
|
+
trustStoreProvider = await runtime.TrustStoreProviderFactory.createTrustStoreProvider();
|
|
3932
3895
|
}
|
|
3933
3896
|
const resolved = {
|
|
3934
3897
|
signingConfig: options.signingConfig ?? signingConfig ?? new runtime.SigningConfigClass(),
|
|
@@ -7168,10 +7131,9 @@ class DefaultCertificateManager {
|
|
|
7168
7131
|
});
|
|
7169
7132
|
}
|
|
7170
7133
|
}
|
|
7171
|
-
const envPem = await resolveTrustStorePemFromEnvironment();
|
|
7172
7134
|
return {
|
|
7173
|
-
pem:
|
|
7174
|
-
reason:
|
|
7135
|
+
pem: null,
|
|
7136
|
+
reason: "trust_store_provider_unconfigured",
|
|
7175
7137
|
};
|
|
7176
7138
|
}
|
|
7177
7139
|
async resolveTrustStorePemFromProvider(provider, nodeId) {
|
|
@@ -7451,23 +7413,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
7451
7413
|
}
|
|
7452
7414
|
return normalized;
|
|
7453
7415
|
}
|
|
7454
|
-
async function resolveTrustStorePemFromEnvironment() {
|
|
7455
|
-
try {
|
|
7456
|
-
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
7457
|
-
if (typeof provider.initialize === "function") {
|
|
7458
|
-
await provider.initialize();
|
|
7459
|
-
}
|
|
7460
|
-
const pem = await provider.getTrustStorePem();
|
|
7461
|
-
return normalizePemOrNull(pem);
|
|
7462
|
-
}
|
|
7463
|
-
catch (error) {
|
|
7464
|
-
const message = error instanceof Error ? error.message : String(error);
|
|
7465
|
-
logger$1.debug("trust_store_provider_resolution_failed", {
|
|
7466
|
-
error: message,
|
|
7467
|
-
});
|
|
7468
|
-
return null;
|
|
7469
|
-
}
|
|
7470
|
-
}
|
|
7471
7416
|
|
|
7472
7417
|
const FACTORY_META$4 = {
|
|
7473
7418
|
base: runtime.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
|
@@ -7545,6 +7490,45 @@ var defaultCertificateManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
7545
7490
|
default: DefaultCertificateManagerFactory
|
|
7546
7491
|
});
|
|
7547
7492
|
|
|
7493
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
7494
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
7495
|
+
class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
|
|
7496
|
+
createUnconfiguredProvider(reason) {
|
|
7497
|
+
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
7498
|
+
}
|
|
7499
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
7500
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
7501
|
+
const mergedFactoryArgs = [
|
|
7502
|
+
...(dependencies ? [dependencies] : []),
|
|
7503
|
+
...(factoryArgs ?? []),
|
|
7504
|
+
];
|
|
7505
|
+
const creationOptions = {
|
|
7506
|
+
...restOptions,
|
|
7507
|
+
factoryArgs: mergedFactoryArgs,
|
|
7508
|
+
};
|
|
7509
|
+
if (config) {
|
|
7510
|
+
const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
7511
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7512
|
+
}
|
|
7513
|
+
const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
7514
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7515
|
+
}
|
|
7516
|
+
}
|
|
7517
|
+
class NullTrustStoreProvider {
|
|
7518
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
7519
|
+
this.reason = reason;
|
|
7520
|
+
}
|
|
7521
|
+
async getTrustStorePem() {
|
|
7522
|
+
throw new Error(this.reason);
|
|
7523
|
+
}
|
|
7524
|
+
async getRoots() {
|
|
7525
|
+
return [];
|
|
7526
|
+
}
|
|
7527
|
+
async initialize() {
|
|
7528
|
+
// No-op for the placeholder provider.
|
|
7529
|
+
}
|
|
7530
|
+
}
|
|
7531
|
+
|
|
7548
7532
|
const PEM_HEADER = "-----BEGIN CERTIFICATE-----";
|
|
7549
7533
|
function normalizeLineEndings(value) {
|
|
7550
7534
|
return value.replace(/\r\n?/gu, "\n");
|
|
@@ -8621,12 +8605,12 @@ function isNodeEnvironment$2() {
|
|
|
8621
8605
|
}
|
|
8622
8606
|
|
|
8623
8607
|
const FACTORY_META$3 = {
|
|
8624
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8608
|
+
base: runtime.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8625
8609
|
key: "EnvTrustStoreProvider",
|
|
8626
8610
|
isDefault: isNodeEnvironment$1(),
|
|
8627
8611
|
priority: isNodeEnvironment$1() ? 100 : 0,
|
|
8628
8612
|
};
|
|
8629
|
-
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8613
|
+
class EnvTrustStoreProviderFactory extends runtime.TrustStoreProviderFactory {
|
|
8630
8614
|
constructor() {
|
|
8631
8615
|
super(...arguments);
|
|
8632
8616
|
this.type = "EnvTrustStoreProvider";
|
|
@@ -8686,12 +8670,12 @@ var nodeTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
|
8686
8670
|
});
|
|
8687
8671
|
|
|
8688
8672
|
const FACTORY_META$2 = {
|
|
8689
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8673
|
+
base: runtime.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8690
8674
|
key: "BrowserTrustStoreProvider",
|
|
8691
8675
|
isDefault: !isNodeEnvironment(),
|
|
8692
8676
|
priority: !isNodeEnvironment() ? 100 : 10,
|
|
8693
8677
|
};
|
|
8694
|
-
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8678
|
+
class BrowserTrustStoreProviderFactory extends runtime.TrustStoreProviderFactory {
|
|
8695
8679
|
constructor() {
|
|
8696
8680
|
super(...arguments);
|
|
8697
8681
|
this.type = "BrowserTrustStoreProvider";
|
package/dist/node/node.mjs
CHANGED
|
@@ -2,7 +2,7 @@ import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
|
|
|
2
2
|
import { Certificate, id_ce_subjectAltName, SubjectAlternativeName, id_ce_nameConstraints, NameConstraints, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, TBSCertificate, Validity, Version, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, KeyUsage, id_ce_keyUsage, SubjectKeyIdentifier, id_ce_subjectKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, id_ce_authorityKeyIdentifier, GeneralSubtrees, GeneralSubtree, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth, id_ce_extKeyUsage } from '@peculiar/asn1-x509';
|
|
3
3
|
import { sha512, sha256 } from '@noble/hashes/sha2.js';
|
|
4
4
|
import { verify, etc } from '@noble/ed25519';
|
|
5
|
-
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, validateHostLogical } from '@naylence/runtime';
|
|
5
|
+
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TrustStoreProviderFactory as TrustStoreProviderFactory$1, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE as TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1, validateHostLogical } from '@naylence/runtime';
|
|
6
6
|
import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
|
|
7
7
|
import { X509Certificate } from '@peculiar/x509';
|
|
8
8
|
import { localDeliveryContext, createFameEnvelope, FameAddress, generateId, formatAddress, SigningMaterial, DeliveryOriginType as DeliveryOriginType$1 } from '@naylence/core';
|
|
@@ -10,17 +10,17 @@ import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
|
|
|
10
10
|
import { x25519 } from '@noble/curves/ed25519.js';
|
|
11
11
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
12
12
|
import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.js';
|
|
13
|
-
import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
|
|
14
13
|
import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
|
|
14
|
+
import { ExtensionManager, Registry, AbstractResourceFactory, createResource, createDefaultResource } from '@naylence/factory';
|
|
15
15
|
import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
|
|
16
16
|
|
|
17
17
|
// This file is auto-generated during build - do not edit manually
|
|
18
|
-
// Generated from package.json version: 0.3.7-test.
|
|
18
|
+
// Generated from package.json version: 0.3.7-test.127
|
|
19
19
|
/**
|
|
20
20
|
* The package version, injected at build time.
|
|
21
21
|
* @internal
|
|
22
22
|
*/
|
|
23
|
-
const VERSION = '0.3.7-test.
|
|
23
|
+
const VERSION = '0.3.7-test.127';
|
|
24
24
|
|
|
25
25
|
const logger$h = getLogger("naylence.fame.security.cert.util");
|
|
26
26
|
const CACHE_LIMIT = 512;
|
|
@@ -3868,45 +3868,6 @@ class EdDSAEnvelopeVerifier {
|
|
|
3868
3868
|
}
|
|
3869
3869
|
}
|
|
3870
3870
|
|
|
3871
|
-
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
3872
|
-
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
3873
|
-
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
3874
|
-
createUnconfiguredProvider(reason) {
|
|
3875
|
-
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
3876
|
-
}
|
|
3877
|
-
static async createTrustStoreProvider(config, options = {}) {
|
|
3878
|
-
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
3879
|
-
const mergedFactoryArgs = [
|
|
3880
|
-
...(dependencies ? [dependencies] : []),
|
|
3881
|
-
...(factoryArgs ?? []),
|
|
3882
|
-
];
|
|
3883
|
-
const creationOptions = {
|
|
3884
|
-
...restOptions,
|
|
3885
|
-
factoryArgs: mergedFactoryArgs,
|
|
3886
|
-
};
|
|
3887
|
-
if (config) {
|
|
3888
|
-
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
3889
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3890
|
-
}
|
|
3891
|
-
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
3892
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3893
|
-
}
|
|
3894
|
-
}
|
|
3895
|
-
class NullTrustStoreProvider {
|
|
3896
|
-
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
3897
|
-
this.reason = reason;
|
|
3898
|
-
}
|
|
3899
|
-
async getTrustStorePem() {
|
|
3900
|
-
throw new Error(this.reason);
|
|
3901
|
-
}
|
|
3902
|
-
async getRoots() {
|
|
3903
|
-
return [];
|
|
3904
|
-
}
|
|
3905
|
-
async initialize() {
|
|
3906
|
-
// No-op for the placeholder provider.
|
|
3907
|
-
}
|
|
3908
|
-
}
|
|
3909
|
-
|
|
3910
3871
|
const FACTORY_META$9 = {
|
|
3911
3872
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
3912
3873
|
key: "EdDSAEnvelopeVerifier",
|
|
@@ -3920,13 +3881,15 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
3920
3881
|
this.isDefault = true;
|
|
3921
3882
|
this.priority = 100;
|
|
3922
3883
|
}
|
|
3923
|
-
async create(_config, keyProvider, signingConfig,
|
|
3884
|
+
async create(_config, keyProvider, signingConfig, ...factoryArgs) {
|
|
3924
3885
|
if (!keyProvider) {
|
|
3925
3886
|
throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
|
|
3926
3887
|
}
|
|
3888
|
+
// Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
|
|
3889
|
+
const options = factoryArgs[0] ?? {};
|
|
3927
3890
|
let trustStoreProvider = options.trustStoreProvider ?? null;
|
|
3928
3891
|
if (!trustStoreProvider) {
|
|
3929
|
-
trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
3892
|
+
trustStoreProvider = await TrustStoreProviderFactory$1.createTrustStoreProvider();
|
|
3930
3893
|
}
|
|
3931
3894
|
const resolved = {
|
|
3932
3895
|
signingConfig: options.signingConfig ?? signingConfig ?? new SigningConfigClass(),
|
|
@@ -7166,10 +7129,9 @@ class DefaultCertificateManager {
|
|
|
7166
7129
|
});
|
|
7167
7130
|
}
|
|
7168
7131
|
}
|
|
7169
|
-
const envPem = await resolveTrustStorePemFromEnvironment();
|
|
7170
7132
|
return {
|
|
7171
|
-
pem:
|
|
7172
|
-
reason:
|
|
7133
|
+
pem: null,
|
|
7134
|
+
reason: "trust_store_provider_unconfigured",
|
|
7173
7135
|
};
|
|
7174
7136
|
}
|
|
7175
7137
|
async resolveTrustStorePemFromProvider(provider, nodeId) {
|
|
@@ -7449,23 +7411,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
7449
7411
|
}
|
|
7450
7412
|
return normalized;
|
|
7451
7413
|
}
|
|
7452
|
-
async function resolveTrustStorePemFromEnvironment() {
|
|
7453
|
-
try {
|
|
7454
|
-
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
7455
|
-
if (typeof provider.initialize === "function") {
|
|
7456
|
-
await provider.initialize();
|
|
7457
|
-
}
|
|
7458
|
-
const pem = await provider.getTrustStorePem();
|
|
7459
|
-
return normalizePemOrNull(pem);
|
|
7460
|
-
}
|
|
7461
|
-
catch (error) {
|
|
7462
|
-
const message = error instanceof Error ? error.message : String(error);
|
|
7463
|
-
logger$1.debug("trust_store_provider_resolution_failed", {
|
|
7464
|
-
error: message,
|
|
7465
|
-
});
|
|
7466
|
-
return null;
|
|
7467
|
-
}
|
|
7468
|
-
}
|
|
7469
7414
|
|
|
7470
7415
|
const FACTORY_META$4 = {
|
|
7471
7416
|
base: CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
|
@@ -7543,6 +7488,45 @@ var defaultCertificateManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
7543
7488
|
default: DefaultCertificateManagerFactory
|
|
7544
7489
|
});
|
|
7545
7490
|
|
|
7491
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
7492
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
7493
|
+
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
7494
|
+
createUnconfiguredProvider(reason) {
|
|
7495
|
+
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
7496
|
+
}
|
|
7497
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
7498
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
7499
|
+
const mergedFactoryArgs = [
|
|
7500
|
+
...(dependencies ? [dependencies] : []),
|
|
7501
|
+
...(factoryArgs ?? []),
|
|
7502
|
+
];
|
|
7503
|
+
const creationOptions = {
|
|
7504
|
+
...restOptions,
|
|
7505
|
+
factoryArgs: mergedFactoryArgs,
|
|
7506
|
+
};
|
|
7507
|
+
if (config) {
|
|
7508
|
+
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
7509
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7510
|
+
}
|
|
7511
|
+
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
7512
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7513
|
+
}
|
|
7514
|
+
}
|
|
7515
|
+
class NullTrustStoreProvider {
|
|
7516
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
7517
|
+
this.reason = reason;
|
|
7518
|
+
}
|
|
7519
|
+
async getTrustStorePem() {
|
|
7520
|
+
throw new Error(this.reason);
|
|
7521
|
+
}
|
|
7522
|
+
async getRoots() {
|
|
7523
|
+
return [];
|
|
7524
|
+
}
|
|
7525
|
+
async initialize() {
|
|
7526
|
+
// No-op for the placeholder provider.
|
|
7527
|
+
}
|
|
7528
|
+
}
|
|
7529
|
+
|
|
7546
7530
|
const PEM_HEADER = "-----BEGIN CERTIFICATE-----";
|
|
7547
7531
|
function normalizeLineEndings(value) {
|
|
7548
7532
|
return value.replace(/\r\n?/gu, "\n");
|
|
@@ -8619,12 +8603,12 @@ function isNodeEnvironment$2() {
|
|
|
8619
8603
|
}
|
|
8620
8604
|
|
|
8621
8605
|
const FACTORY_META$3 = {
|
|
8622
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8606
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
|
|
8623
8607
|
key: "EnvTrustStoreProvider",
|
|
8624
8608
|
isDefault: isNodeEnvironment$1(),
|
|
8625
8609
|
priority: isNodeEnvironment$1() ? 100 : 0,
|
|
8626
8610
|
};
|
|
8627
|
-
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8611
|
+
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
|
|
8628
8612
|
constructor() {
|
|
8629
8613
|
super(...arguments);
|
|
8630
8614
|
this.type = "EnvTrustStoreProvider";
|
|
@@ -8684,12 +8668,12 @@ var nodeTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
|
8684
8668
|
});
|
|
8685
8669
|
|
|
8686
8670
|
const FACTORY_META$2 = {
|
|
8687
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8671
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
|
|
8688
8672
|
key: "BrowserTrustStoreProvider",
|
|
8689
8673
|
isDefault: !isNodeEnvironment(),
|
|
8690
8674
|
priority: !isNodeEnvironment() ? 100 : 10,
|
|
8691
8675
|
};
|
|
8692
|
-
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8676
|
+
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
|
|
8693
8677
|
constructor() {
|
|
8694
8678
|
super(...arguments);
|
|
8695
8679
|
this.type = "BrowserTrustStoreProvider";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;
|
|
1
|
+
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAc3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAuCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAuQD,eAAe,yBAAyB,CAAC"}
|
package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import type
|
|
2
|
-
import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
|
|
1
|
+
import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
|
|
3
2
|
export interface BrowserTrustStoreProviderConfig extends TrustStoreProviderConfig {
|
|
4
3
|
readonly type: "BrowserTrustStoreProvider";
|
|
5
4
|
readonly url?: string | null;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAK3B,MAAM,WAAW,+BAAgC,SAAQ,wBAAwB;IAC/E,QAAQ,CAAC,IAAI,EAAE,2BAA2B,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,QAAQ,CAAC,QAAQ,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IAC7C,QAAQ,CAAC,YAAY,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IACjD,QAAQ,CAAC,SAAS,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACpC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAChD;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,WAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAuB9B,OAAO,CAAC,4BAA4B;IAwBpC,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,gCAAgC,CAAC"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { TrustStoreProvider } from "
|
|
1
|
+
import type { TrustStoreProvider } from "@naylence/runtime";
|
|
2
2
|
export interface CreateTrustStoreProviderOptions {
|
|
3
3
|
readonly env?: Record<string, unknown> | null;
|
|
4
4
|
readonly requirePinsInBrowser?: boolean;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAOV,kBAAkB,EACnB,MAAM,mBAAmB,CAAC;AAU3B,MAAM,WAAW,+BAA+B;IAC9C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,wBAAsB,+BAA+B,CACnD,OAAO,GAAE,+BAAoC,GAC5C,OAAO,CAAC,kBAAkB,GAAG,IAAI,CAAC,CA6BpC"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "
|
|
1
|
+
import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "@naylence/runtime";
|
|
2
2
|
export interface HttpBundleProviderOptions extends TrustBundlePins {
|
|
3
3
|
readonly url: string;
|
|
4
4
|
readonly cacheKey?: string;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EACV,WAAW,EACX,kBAAkB,EAClB,eAAe,EAChB,MAAM,mBAAmB,CAAC;AAmB3B,MAAM,WAAW,yBAA0B,SAAQ,eAAe;IAChE,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;IACxC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,OAAO,CAAC;CACtC;AA6CD,qBAAa,kBAAmB,YAAW,kBAAkB;IAC3D,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAM;IAC1B,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAS;IAC3C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAoB;IAC7C,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAoB;IACjD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAU;IACpC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAU;IAC7C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;IAClC,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAU;IAE5C,OAAO,CAAC,WAAW,CAAK;IACxB,OAAO,CAAC,IAAI,CAAuB;IACnC,OAAO,CAAC,aAAa,CAAuB;IAC5C,OAAO,CAAC,OAAO,CAAuB;IACtC,OAAO,CAAC,OAAO,CAA8B;IAC7C,OAAO,CAAC,QAAQ,CAAuC;IACvD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAyB;IACnD,OAAO,CAAC,WAAW,CAAS;IAC5B,OAAO,CAAC,QAAQ,CAAuB;gBAEpB,OAAO,EAAE,yBAAyB;IAiDxC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IA+B3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;IAiBzC,QAAQ,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,MAAM,IAAI;IAOpC,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IAqBxC,OAAO,CAAC,gBAAgB;YASV,WAAW;IAkFzB,OAAO,CAAC,eAAe;CAWxB"}
|
package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import type
|
|
2
|
-
import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
|
|
1
|
+
import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
|
|
3
2
|
export interface EnvTrustStoreProviderConfig extends TrustStoreProviderConfig {
|
|
4
3
|
readonly type: "EnvTrustStoreProvider";
|
|
5
4
|
readonly env?: Record<string, unknown> | null;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAG3B,MAAM,WAAW,2BAA4B,SAAQ,wBAAwB;IAC3E,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;IACvC,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,4BAA6B,SAAQ,yBAAyB,CAAC,2BAA2B,CAAC;IACtG,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,UAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACrE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAqB9B,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,4BAA4B,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAC;AASzE,MAAM,WAAW,2BAA2B;IAC1C,QAAQ,CAAC,KAAK,CAAC,EAAE,MAAM,CAAC;CACzB;AAED,qBAAa,oBAAqB,YAAW,kBAAkB;IAC7D,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAyB;IACjD,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;gBAEf,OAAO,EAAE,QAAQ,CAAC,WAAW,CAAC;IASpC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IAI3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;CAMjD;AAED,wBAAsB,eAAe,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAQnE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,MAAM,GAAG,oBAAoB,CAEvE;AAED,wBAAgB,yBAAyB,CAAC,OAAO,EAAE,MAAM,GAAG,oBAAoB,CAM/E"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { EnvelopeVerifier } from "@naylence/runtime";
|
|
2
2
|
import { EnvelopeVerifierFactory, type EnvelopeVerifierConfig, type KeyProvider } from "@naylence/runtime";
|
|
3
|
-
import { type
|
|
3
|
+
import { type SigningConfigInstance } from "./eddsa-envelope-verifier.js";
|
|
4
4
|
export interface EdDSAEnvelopeVerifierConfig extends EnvelopeVerifierConfig {
|
|
5
5
|
readonly type: "EdDSAEnvelopeVerifier";
|
|
6
6
|
}
|
|
@@ -15,7 +15,7 @@ export declare class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifi
|
|
|
15
15
|
readonly type = "EdDSAEnvelopeVerifier";
|
|
16
16
|
readonly isDefault = true;
|
|
17
17
|
readonly priority = 100;
|
|
18
|
-
create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null,
|
|
18
|
+
create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null, ...factoryArgs: unknown[]): Promise<EnvelopeVerifier>;
|
|
19
19
|
}
|
|
20
20
|
export default AdvancedEdDSAEnvelopeVerifierFactory;
|
|
21
21
|
//# sourceMappingURL=eddsa-envelope-verifier-factory.d.ts.map
|