@naylence/advanced-security 0.3.7-test.126 → 0.3.7-test.127
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +13 -65
- package/dist/browser/index.mjs +9 -61
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js +2 -18
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
- package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js +2 -18
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
- package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +13 -65
- package/dist/node/index.mjs +9 -61
- package/dist/node/node.cjs +52 -65
- package/dist/node/node.mjs +53 -66
- package/dist/types/naylence/fame/security/cert/default-certificate-manager.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts +1 -2
- package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts +1 -2
- package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts +2 -2
- package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts.map +1 -1
- package/dist/types/version.d.ts +1 -1
- package/package.json +2 -2
package/dist/node/index.mjs
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory } from '@naylence/runtime';
|
|
2
|
-
import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
|
|
1
|
+
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TrustStoreProviderFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE } from '@naylence/runtime';
|
|
3
2
|
import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
|
|
4
3
|
import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
|
|
5
4
|
import { Certificate, SubjectAlternativeName, NameConstraints, id_ce_subjectAltName, id_ce_nameConstraints, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, id_ce_keyUsage, KeyUsage, id_ce_subjectKeyIdentifier, SubjectKeyIdentifier, id_ce_authorityKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, GeneralSubtrees, GeneralSubtree, TBSCertificate, Validity, Version, id_ce_extKeyUsage, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth } from '@peculiar/asn1-x509';
|
|
@@ -11,16 +10,17 @@ import { x25519 } from '@noble/curves/ed25519.js';
|
|
|
11
10
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
12
11
|
import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.js';
|
|
13
12
|
import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
|
|
13
|
+
import { ExtensionManager, Registry, AbstractResourceFactory } from '@naylence/factory';
|
|
14
14
|
import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
|
|
15
15
|
import { X509Certificate } from '@peculiar/x509';
|
|
16
16
|
|
|
17
17
|
// This file is auto-generated during build - do not edit manually
|
|
18
|
-
// Generated from package.json version: 0.3.7-test.
|
|
18
|
+
// Generated from package.json version: 0.3.7-test.127
|
|
19
19
|
/**
|
|
20
20
|
* The package version, injected at build time.
|
|
21
21
|
* @internal
|
|
22
22
|
*/
|
|
23
|
-
const VERSION = '0.3.7-test.
|
|
23
|
+
const VERSION = '0.3.7-test.127';
|
|
24
24
|
|
|
25
25
|
const logger$h = getLogger("naylence.fame.security.cert.util");
|
|
26
26
|
const CACHE_LIMIT = 512;
|
|
@@ -3857,45 +3857,6 @@ class EdDSAEnvelopeVerifier {
|
|
|
3857
3857
|
}
|
|
3858
3858
|
}
|
|
3859
3859
|
|
|
3860
|
-
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
3861
|
-
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
3862
|
-
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
3863
|
-
createUnconfiguredProvider(reason) {
|
|
3864
|
-
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
3865
|
-
}
|
|
3866
|
-
static async createTrustStoreProvider(config, options = {}) {
|
|
3867
|
-
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
3868
|
-
const mergedFactoryArgs = [
|
|
3869
|
-
...(dependencies ? [dependencies] : []),
|
|
3870
|
-
...(factoryArgs ?? []),
|
|
3871
|
-
];
|
|
3872
|
-
const creationOptions = {
|
|
3873
|
-
...restOptions,
|
|
3874
|
-
factoryArgs: mergedFactoryArgs,
|
|
3875
|
-
};
|
|
3876
|
-
if (config) {
|
|
3877
|
-
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
3878
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3879
|
-
}
|
|
3880
|
-
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
3881
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3882
|
-
}
|
|
3883
|
-
}
|
|
3884
|
-
class NullTrustStoreProvider {
|
|
3885
|
-
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
3886
|
-
this.reason = reason;
|
|
3887
|
-
}
|
|
3888
|
-
async getTrustStorePem() {
|
|
3889
|
-
throw new Error(this.reason);
|
|
3890
|
-
}
|
|
3891
|
-
async getRoots() {
|
|
3892
|
-
return [];
|
|
3893
|
-
}
|
|
3894
|
-
async initialize() {
|
|
3895
|
-
// No-op for the placeholder provider.
|
|
3896
|
-
}
|
|
3897
|
-
}
|
|
3898
|
-
|
|
3899
3860
|
const FACTORY_META$8 = {
|
|
3900
3861
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
3901
3862
|
key: "EdDSAEnvelopeVerifier",
|
|
@@ -3909,10 +3870,12 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
3909
3870
|
this.isDefault = true;
|
|
3910
3871
|
this.priority = 100;
|
|
3911
3872
|
}
|
|
3912
|
-
async create(_config, keyProvider, signingConfig,
|
|
3873
|
+
async create(_config, keyProvider, signingConfig, ...factoryArgs) {
|
|
3913
3874
|
if (!keyProvider) {
|
|
3914
3875
|
throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
|
|
3915
3876
|
}
|
|
3877
|
+
// Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
|
|
3878
|
+
const options = factoryArgs[0] ?? {};
|
|
3916
3879
|
let trustStoreProvider = options.trustStoreProvider ?? null;
|
|
3917
3880
|
if (!trustStoreProvider) {
|
|
3918
3881
|
trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
@@ -8167,10 +8130,9 @@ class DefaultCertificateManager {
|
|
|
8167
8130
|
});
|
|
8168
8131
|
}
|
|
8169
8132
|
}
|
|
8170
|
-
const envPem = await resolveTrustStorePemFromEnvironment();
|
|
8171
8133
|
return {
|
|
8172
|
-
pem:
|
|
8173
|
-
reason:
|
|
8134
|
+
pem: null,
|
|
8135
|
+
reason: "trust_store_provider_unconfigured",
|
|
8174
8136
|
};
|
|
8175
8137
|
}
|
|
8176
8138
|
async resolveTrustStorePemFromProvider(provider, nodeId) {
|
|
@@ -8450,20 +8412,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
8450
8412
|
}
|
|
8451
8413
|
return normalized;
|
|
8452
8414
|
}
|
|
8453
|
-
async function resolveTrustStorePemFromEnvironment() {
|
|
8454
|
-
try {
|
|
8455
|
-
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
8456
|
-
const pem = await provider.getTrustStorePem();
|
|
8457
|
-
return normalizePemOrNull(pem);
|
|
8458
|
-
}
|
|
8459
|
-
catch (error) {
|
|
8460
|
-
const message = error instanceof Error ? error.message : String(error);
|
|
8461
|
-
logger$1.debug("trust_store_provider_resolution_failed", {
|
|
8462
|
-
error: message,
|
|
8463
|
-
});
|
|
8464
|
-
return null;
|
|
8465
|
-
}
|
|
8466
|
-
}
|
|
8467
8415
|
|
|
8468
8416
|
const FACTORY_META$2 = {
|
|
8469
8417
|
base: CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
package/dist/node/node.cjs
CHANGED
|
@@ -12,17 +12,17 @@ var chacha_js = require('@noble/ciphers/chacha.js');
|
|
|
12
12
|
var ed25519_js = require('@noble/curves/ed25519.js');
|
|
13
13
|
var hkdf_js = require('@noble/hashes/hkdf.js');
|
|
14
14
|
var utils_js = require('@noble/hashes/utils.js');
|
|
15
|
-
var factory = require('@naylence/factory');
|
|
16
15
|
var jose = require('jose');
|
|
16
|
+
var factory = require('@naylence/factory');
|
|
17
17
|
var sha256_js = require('@noble/hashes/sha256.js');
|
|
18
18
|
|
|
19
19
|
// This file is auto-generated during build - do not edit manually
|
|
20
|
-
// Generated from package.json version: 0.3.7-test.
|
|
20
|
+
// Generated from package.json version: 0.3.7-test.127
|
|
21
21
|
/**
|
|
22
22
|
* The package version, injected at build time.
|
|
23
23
|
* @internal
|
|
24
24
|
*/
|
|
25
|
-
const VERSION = '0.3.7-test.
|
|
25
|
+
const VERSION = '0.3.7-test.127';
|
|
26
26
|
|
|
27
27
|
const logger$h = runtime.getLogger("naylence.fame.security.cert.util");
|
|
28
28
|
const CACHE_LIMIT = 512;
|
|
@@ -3870,45 +3870,6 @@ class EdDSAEnvelopeVerifier {
|
|
|
3870
3870
|
}
|
|
3871
3871
|
}
|
|
3872
3872
|
|
|
3873
|
-
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
3874
|
-
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
3875
|
-
class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
|
|
3876
|
-
createUnconfiguredProvider(reason) {
|
|
3877
|
-
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
3878
|
-
}
|
|
3879
|
-
static async createTrustStoreProvider(config, options = {}) {
|
|
3880
|
-
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
3881
|
-
const mergedFactoryArgs = [
|
|
3882
|
-
...(dependencies ? [dependencies] : []),
|
|
3883
|
-
...(factoryArgs ?? []),
|
|
3884
|
-
];
|
|
3885
|
-
const creationOptions = {
|
|
3886
|
-
...restOptions,
|
|
3887
|
-
factoryArgs: mergedFactoryArgs,
|
|
3888
|
-
};
|
|
3889
|
-
if (config) {
|
|
3890
|
-
const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
3891
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3892
|
-
}
|
|
3893
|
-
const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
3894
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3895
|
-
}
|
|
3896
|
-
}
|
|
3897
|
-
class NullTrustStoreProvider {
|
|
3898
|
-
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
3899
|
-
this.reason = reason;
|
|
3900
|
-
}
|
|
3901
|
-
async getTrustStorePem() {
|
|
3902
|
-
throw new Error(this.reason);
|
|
3903
|
-
}
|
|
3904
|
-
async getRoots() {
|
|
3905
|
-
return [];
|
|
3906
|
-
}
|
|
3907
|
-
async initialize() {
|
|
3908
|
-
// No-op for the placeholder provider.
|
|
3909
|
-
}
|
|
3910
|
-
}
|
|
3911
|
-
|
|
3912
3873
|
const FACTORY_META$9 = {
|
|
3913
3874
|
base: runtime.ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
3914
3875
|
key: "EdDSAEnvelopeVerifier",
|
|
@@ -3922,13 +3883,15 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends runtime.EnvelopeVerifierFacto
|
|
|
3922
3883
|
this.isDefault = true;
|
|
3923
3884
|
this.priority = 100;
|
|
3924
3885
|
}
|
|
3925
|
-
async create(_config, keyProvider, signingConfig,
|
|
3886
|
+
async create(_config, keyProvider, signingConfig, ...factoryArgs) {
|
|
3926
3887
|
if (!keyProvider) {
|
|
3927
3888
|
throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
|
|
3928
3889
|
}
|
|
3890
|
+
// Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
|
|
3891
|
+
const options = factoryArgs[0] ?? {};
|
|
3929
3892
|
let trustStoreProvider = options.trustStoreProvider ?? null;
|
|
3930
3893
|
if (!trustStoreProvider) {
|
|
3931
|
-
trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
3894
|
+
trustStoreProvider = await runtime.TrustStoreProviderFactory.createTrustStoreProvider();
|
|
3932
3895
|
}
|
|
3933
3896
|
const resolved = {
|
|
3934
3897
|
signingConfig: options.signingConfig ?? signingConfig ?? new runtime.SigningConfigClass(),
|
|
@@ -7168,10 +7131,9 @@ class DefaultCertificateManager {
|
|
|
7168
7131
|
});
|
|
7169
7132
|
}
|
|
7170
7133
|
}
|
|
7171
|
-
const envPem = await resolveTrustStorePemFromEnvironment();
|
|
7172
7134
|
return {
|
|
7173
|
-
pem:
|
|
7174
|
-
reason:
|
|
7135
|
+
pem: null,
|
|
7136
|
+
reason: "trust_store_provider_unconfigured",
|
|
7175
7137
|
};
|
|
7176
7138
|
}
|
|
7177
7139
|
async resolveTrustStorePemFromProvider(provider, nodeId) {
|
|
@@ -7451,20 +7413,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
7451
7413
|
}
|
|
7452
7414
|
return normalized;
|
|
7453
7415
|
}
|
|
7454
|
-
async function resolveTrustStorePemFromEnvironment() {
|
|
7455
|
-
try {
|
|
7456
|
-
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
7457
|
-
const pem = await provider.getTrustStorePem();
|
|
7458
|
-
return normalizePemOrNull(pem);
|
|
7459
|
-
}
|
|
7460
|
-
catch (error) {
|
|
7461
|
-
const message = error instanceof Error ? error.message : String(error);
|
|
7462
|
-
logger$1.debug("trust_store_provider_resolution_failed", {
|
|
7463
|
-
error: message,
|
|
7464
|
-
});
|
|
7465
|
-
return null;
|
|
7466
|
-
}
|
|
7467
|
-
}
|
|
7468
7416
|
|
|
7469
7417
|
const FACTORY_META$4 = {
|
|
7470
7418
|
base: runtime.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
|
@@ -7542,6 +7490,45 @@ var defaultCertificateManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
7542
7490
|
default: DefaultCertificateManagerFactory
|
|
7543
7491
|
});
|
|
7544
7492
|
|
|
7493
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
7494
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
7495
|
+
class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
|
|
7496
|
+
createUnconfiguredProvider(reason) {
|
|
7497
|
+
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
7498
|
+
}
|
|
7499
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
7500
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
7501
|
+
const mergedFactoryArgs = [
|
|
7502
|
+
...(dependencies ? [dependencies] : []),
|
|
7503
|
+
...(factoryArgs ?? []),
|
|
7504
|
+
];
|
|
7505
|
+
const creationOptions = {
|
|
7506
|
+
...restOptions,
|
|
7507
|
+
factoryArgs: mergedFactoryArgs,
|
|
7508
|
+
};
|
|
7509
|
+
if (config) {
|
|
7510
|
+
const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
7511
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7512
|
+
}
|
|
7513
|
+
const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
7514
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7515
|
+
}
|
|
7516
|
+
}
|
|
7517
|
+
class NullTrustStoreProvider {
|
|
7518
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
7519
|
+
this.reason = reason;
|
|
7520
|
+
}
|
|
7521
|
+
async getTrustStorePem() {
|
|
7522
|
+
throw new Error(this.reason);
|
|
7523
|
+
}
|
|
7524
|
+
async getRoots() {
|
|
7525
|
+
return [];
|
|
7526
|
+
}
|
|
7527
|
+
async initialize() {
|
|
7528
|
+
// No-op for the placeholder provider.
|
|
7529
|
+
}
|
|
7530
|
+
}
|
|
7531
|
+
|
|
7545
7532
|
const PEM_HEADER = "-----BEGIN CERTIFICATE-----";
|
|
7546
7533
|
function normalizeLineEndings(value) {
|
|
7547
7534
|
return value.replace(/\r\n?/gu, "\n");
|
|
@@ -8618,12 +8605,12 @@ function isNodeEnvironment$2() {
|
|
|
8618
8605
|
}
|
|
8619
8606
|
|
|
8620
8607
|
const FACTORY_META$3 = {
|
|
8621
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8608
|
+
base: runtime.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8622
8609
|
key: "EnvTrustStoreProvider",
|
|
8623
8610
|
isDefault: isNodeEnvironment$1(),
|
|
8624
8611
|
priority: isNodeEnvironment$1() ? 100 : 0,
|
|
8625
8612
|
};
|
|
8626
|
-
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8613
|
+
class EnvTrustStoreProviderFactory extends runtime.TrustStoreProviderFactory {
|
|
8627
8614
|
constructor() {
|
|
8628
8615
|
super(...arguments);
|
|
8629
8616
|
this.type = "EnvTrustStoreProvider";
|
|
@@ -8683,12 +8670,12 @@ var nodeTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
|
8683
8670
|
});
|
|
8684
8671
|
|
|
8685
8672
|
const FACTORY_META$2 = {
|
|
8686
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8673
|
+
base: runtime.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8687
8674
|
key: "BrowserTrustStoreProvider",
|
|
8688
8675
|
isDefault: !isNodeEnvironment(),
|
|
8689
8676
|
priority: !isNodeEnvironment() ? 100 : 10,
|
|
8690
8677
|
};
|
|
8691
|
-
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8678
|
+
class BrowserTrustStoreProviderFactory extends runtime.TrustStoreProviderFactory {
|
|
8692
8679
|
constructor() {
|
|
8693
8680
|
super(...arguments);
|
|
8694
8681
|
this.type = "BrowserTrustStoreProvider";
|
package/dist/node/node.mjs
CHANGED
|
@@ -2,7 +2,7 @@ import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
|
|
|
2
2
|
import { Certificate, id_ce_subjectAltName, SubjectAlternativeName, id_ce_nameConstraints, NameConstraints, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, TBSCertificate, Validity, Version, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, KeyUsage, id_ce_keyUsage, SubjectKeyIdentifier, id_ce_subjectKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, id_ce_authorityKeyIdentifier, GeneralSubtrees, GeneralSubtree, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth, id_ce_extKeyUsage } from '@peculiar/asn1-x509';
|
|
3
3
|
import { sha512, sha256 } from '@noble/hashes/sha2.js';
|
|
4
4
|
import { verify, etc } from '@noble/ed25519';
|
|
5
|
-
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, validateHostLogical } from '@naylence/runtime';
|
|
5
|
+
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TrustStoreProviderFactory as TrustStoreProviderFactory$1, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE as TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1, validateHostLogical } from '@naylence/runtime';
|
|
6
6
|
import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
|
|
7
7
|
import { X509Certificate } from '@peculiar/x509';
|
|
8
8
|
import { localDeliveryContext, createFameEnvelope, FameAddress, generateId, formatAddress, SigningMaterial, DeliveryOriginType as DeliveryOriginType$1 } from '@naylence/core';
|
|
@@ -10,17 +10,17 @@ import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
|
|
|
10
10
|
import { x25519 } from '@noble/curves/ed25519.js';
|
|
11
11
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
12
12
|
import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.js';
|
|
13
|
-
import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
|
|
14
13
|
import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
|
|
14
|
+
import { ExtensionManager, Registry, AbstractResourceFactory, createResource, createDefaultResource } from '@naylence/factory';
|
|
15
15
|
import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
|
|
16
16
|
|
|
17
17
|
// This file is auto-generated during build - do not edit manually
|
|
18
|
-
// Generated from package.json version: 0.3.7-test.
|
|
18
|
+
// Generated from package.json version: 0.3.7-test.127
|
|
19
19
|
/**
|
|
20
20
|
* The package version, injected at build time.
|
|
21
21
|
* @internal
|
|
22
22
|
*/
|
|
23
|
-
const VERSION = '0.3.7-test.
|
|
23
|
+
const VERSION = '0.3.7-test.127';
|
|
24
24
|
|
|
25
25
|
const logger$h = getLogger("naylence.fame.security.cert.util");
|
|
26
26
|
const CACHE_LIMIT = 512;
|
|
@@ -3868,45 +3868,6 @@ class EdDSAEnvelopeVerifier {
|
|
|
3868
3868
|
}
|
|
3869
3869
|
}
|
|
3870
3870
|
|
|
3871
|
-
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
3872
|
-
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
3873
|
-
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
3874
|
-
createUnconfiguredProvider(reason) {
|
|
3875
|
-
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
3876
|
-
}
|
|
3877
|
-
static async createTrustStoreProvider(config, options = {}) {
|
|
3878
|
-
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
3879
|
-
const mergedFactoryArgs = [
|
|
3880
|
-
...(dependencies ? [dependencies] : []),
|
|
3881
|
-
...(factoryArgs ?? []),
|
|
3882
|
-
];
|
|
3883
|
-
const creationOptions = {
|
|
3884
|
-
...restOptions,
|
|
3885
|
-
factoryArgs: mergedFactoryArgs,
|
|
3886
|
-
};
|
|
3887
|
-
if (config) {
|
|
3888
|
-
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
3889
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3890
|
-
}
|
|
3891
|
-
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
3892
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3893
|
-
}
|
|
3894
|
-
}
|
|
3895
|
-
class NullTrustStoreProvider {
|
|
3896
|
-
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
3897
|
-
this.reason = reason;
|
|
3898
|
-
}
|
|
3899
|
-
async getTrustStorePem() {
|
|
3900
|
-
throw new Error(this.reason);
|
|
3901
|
-
}
|
|
3902
|
-
async getRoots() {
|
|
3903
|
-
return [];
|
|
3904
|
-
}
|
|
3905
|
-
async initialize() {
|
|
3906
|
-
// No-op for the placeholder provider.
|
|
3907
|
-
}
|
|
3908
|
-
}
|
|
3909
|
-
|
|
3910
3871
|
const FACTORY_META$9 = {
|
|
3911
3872
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
3912
3873
|
key: "EdDSAEnvelopeVerifier",
|
|
@@ -3920,13 +3881,15 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
3920
3881
|
this.isDefault = true;
|
|
3921
3882
|
this.priority = 100;
|
|
3922
3883
|
}
|
|
3923
|
-
async create(_config, keyProvider, signingConfig,
|
|
3884
|
+
async create(_config, keyProvider, signingConfig, ...factoryArgs) {
|
|
3924
3885
|
if (!keyProvider) {
|
|
3925
3886
|
throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
|
|
3926
3887
|
}
|
|
3888
|
+
// Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
|
|
3889
|
+
const options = factoryArgs[0] ?? {};
|
|
3927
3890
|
let trustStoreProvider = options.trustStoreProvider ?? null;
|
|
3928
3891
|
if (!trustStoreProvider) {
|
|
3929
|
-
trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
3892
|
+
trustStoreProvider = await TrustStoreProviderFactory$1.createTrustStoreProvider();
|
|
3930
3893
|
}
|
|
3931
3894
|
const resolved = {
|
|
3932
3895
|
signingConfig: options.signingConfig ?? signingConfig ?? new SigningConfigClass(),
|
|
@@ -7166,10 +7129,9 @@ class DefaultCertificateManager {
|
|
|
7166
7129
|
});
|
|
7167
7130
|
}
|
|
7168
7131
|
}
|
|
7169
|
-
const envPem = await resolveTrustStorePemFromEnvironment();
|
|
7170
7132
|
return {
|
|
7171
|
-
pem:
|
|
7172
|
-
reason:
|
|
7133
|
+
pem: null,
|
|
7134
|
+
reason: "trust_store_provider_unconfigured",
|
|
7173
7135
|
};
|
|
7174
7136
|
}
|
|
7175
7137
|
async resolveTrustStorePemFromProvider(provider, nodeId) {
|
|
@@ -7449,20 +7411,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
7449
7411
|
}
|
|
7450
7412
|
return normalized;
|
|
7451
7413
|
}
|
|
7452
|
-
async function resolveTrustStorePemFromEnvironment() {
|
|
7453
|
-
try {
|
|
7454
|
-
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
7455
|
-
const pem = await provider.getTrustStorePem();
|
|
7456
|
-
return normalizePemOrNull(pem);
|
|
7457
|
-
}
|
|
7458
|
-
catch (error) {
|
|
7459
|
-
const message = error instanceof Error ? error.message : String(error);
|
|
7460
|
-
logger$1.debug("trust_store_provider_resolution_failed", {
|
|
7461
|
-
error: message,
|
|
7462
|
-
});
|
|
7463
|
-
return null;
|
|
7464
|
-
}
|
|
7465
|
-
}
|
|
7466
7414
|
|
|
7467
7415
|
const FACTORY_META$4 = {
|
|
7468
7416
|
base: CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
|
@@ -7540,6 +7488,45 @@ var defaultCertificateManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
7540
7488
|
default: DefaultCertificateManagerFactory
|
|
7541
7489
|
});
|
|
7542
7490
|
|
|
7491
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
7492
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
7493
|
+
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
7494
|
+
createUnconfiguredProvider(reason) {
|
|
7495
|
+
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
7496
|
+
}
|
|
7497
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
7498
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
7499
|
+
const mergedFactoryArgs = [
|
|
7500
|
+
...(dependencies ? [dependencies] : []),
|
|
7501
|
+
...(factoryArgs ?? []),
|
|
7502
|
+
];
|
|
7503
|
+
const creationOptions = {
|
|
7504
|
+
...restOptions,
|
|
7505
|
+
factoryArgs: mergedFactoryArgs,
|
|
7506
|
+
};
|
|
7507
|
+
if (config) {
|
|
7508
|
+
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
7509
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7510
|
+
}
|
|
7511
|
+
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
7512
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7513
|
+
}
|
|
7514
|
+
}
|
|
7515
|
+
class NullTrustStoreProvider {
|
|
7516
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
7517
|
+
this.reason = reason;
|
|
7518
|
+
}
|
|
7519
|
+
async getTrustStorePem() {
|
|
7520
|
+
throw new Error(this.reason);
|
|
7521
|
+
}
|
|
7522
|
+
async getRoots() {
|
|
7523
|
+
return [];
|
|
7524
|
+
}
|
|
7525
|
+
async initialize() {
|
|
7526
|
+
// No-op for the placeholder provider.
|
|
7527
|
+
}
|
|
7528
|
+
}
|
|
7529
|
+
|
|
7543
7530
|
const PEM_HEADER = "-----BEGIN CERTIFICATE-----";
|
|
7544
7531
|
function normalizeLineEndings(value) {
|
|
7545
7532
|
return value.replace(/\r\n?/gu, "\n");
|
|
@@ -8616,12 +8603,12 @@ function isNodeEnvironment$2() {
|
|
|
8616
8603
|
}
|
|
8617
8604
|
|
|
8618
8605
|
const FACTORY_META$3 = {
|
|
8619
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8606
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
|
|
8620
8607
|
key: "EnvTrustStoreProvider",
|
|
8621
8608
|
isDefault: isNodeEnvironment$1(),
|
|
8622
8609
|
priority: isNodeEnvironment$1() ? 100 : 0,
|
|
8623
8610
|
};
|
|
8624
|
-
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8611
|
+
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
|
|
8625
8612
|
constructor() {
|
|
8626
8613
|
super(...arguments);
|
|
8627
8614
|
this.type = "EnvTrustStoreProvider";
|
|
@@ -8681,12 +8668,12 @@ var nodeTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
|
8681
8668
|
});
|
|
8682
8669
|
|
|
8683
8670
|
const FACTORY_META$2 = {
|
|
8684
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8671
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
|
|
8685
8672
|
key: "BrowserTrustStoreProvider",
|
|
8686
8673
|
isDefault: !isNodeEnvironment(),
|
|
8687
8674
|
priority: !isNodeEnvironment() ? 100 : 10,
|
|
8688
8675
|
};
|
|
8689
|
-
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8676
|
+
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
|
|
8690
8677
|
constructor() {
|
|
8691
8678
|
super(...arguments);
|
|
8692
8679
|
this.type = "BrowserTrustStoreProvider";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;
|
|
1
|
+
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAc3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAuCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAuQD,eAAe,yBAAyB,CAAC"}
|
package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import type
|
|
2
|
-
import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
|
|
1
|
+
import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
|
|
3
2
|
export interface BrowserTrustStoreProviderConfig extends TrustStoreProviderConfig {
|
|
4
3
|
readonly type: "BrowserTrustStoreProvider";
|
|
5
4
|
readonly url?: string | null;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAK3B,MAAM,WAAW,+BAAgC,SAAQ,wBAAwB;IAC/E,QAAQ,CAAC,IAAI,EAAE,2BAA2B,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,QAAQ,CAAC,QAAQ,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IAC7C,QAAQ,CAAC,YAAY,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IACjD,QAAQ,CAAC,SAAS,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACpC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAChD;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,WAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAuB9B,OAAO,CAAC,4BAA4B;IAwBpC,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,gCAAgC,CAAC"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { TrustStoreProvider } from "
|
|
1
|
+
import type { TrustStoreProvider } from "@naylence/runtime";
|
|
2
2
|
export interface CreateTrustStoreProviderOptions {
|
|
3
3
|
readonly env?: Record<string, unknown> | null;
|
|
4
4
|
readonly requirePinsInBrowser?: boolean;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAOV,kBAAkB,EACnB,MAAM,mBAAmB,CAAC;AAU3B,MAAM,WAAW,+BAA+B;IAC9C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,wBAAsB,+BAA+B,CACnD,OAAO,GAAE,+BAAoC,GAC5C,OAAO,CAAC,kBAAkB,GAAG,IAAI,CAAC,CA6BpC"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "
|
|
1
|
+
import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "@naylence/runtime";
|
|
2
2
|
export interface HttpBundleProviderOptions extends TrustBundlePins {
|
|
3
3
|
readonly url: string;
|
|
4
4
|
readonly cacheKey?: string;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EACV,WAAW,EACX,kBAAkB,EAClB,eAAe,EAChB,MAAM,mBAAmB,CAAC;AAmB3B,MAAM,WAAW,yBAA0B,SAAQ,eAAe;IAChE,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;IACxC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,OAAO,CAAC;CACtC;AA6CD,qBAAa,kBAAmB,YAAW,kBAAkB;IAC3D,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAM;IAC1B,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAS;IAC3C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAoB;IAC7C,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAoB;IACjD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAU;IACpC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAU;IAC7C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;IAClC,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAU;IAE5C,OAAO,CAAC,WAAW,CAAK;IACxB,OAAO,CAAC,IAAI,CAAuB;IACnC,OAAO,CAAC,aAAa,CAAuB;IAC5C,OAAO,CAAC,OAAO,CAAuB;IACtC,OAAO,CAAC,OAAO,CAA8B;IAC7C,OAAO,CAAC,QAAQ,CAAuC;IACvD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAyB;IACnD,OAAO,CAAC,WAAW,CAAS;IAC5B,OAAO,CAAC,QAAQ,CAAuB;gBAEpB,OAAO,EAAE,yBAAyB;IAiDxC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IA+B3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;IAiBzC,QAAQ,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,MAAM,IAAI;IAOpC,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IAqBxC,OAAO,CAAC,gBAAgB;YASV,WAAW;IAkFzB,OAAO,CAAC,eAAe;CAWxB"}
|
package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import type
|
|
2
|
-
import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
|
|
1
|
+
import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
|
|
3
2
|
export interface EnvTrustStoreProviderConfig extends TrustStoreProviderConfig {
|
|
4
3
|
readonly type: "EnvTrustStoreProvider";
|
|
5
4
|
readonly env?: Record<string, unknown> | null;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAG3B,MAAM,WAAW,2BAA4B,SAAQ,wBAAwB;IAC3E,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;IACvC,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,4BAA6B,SAAQ,yBAAyB,CAAC,2BAA2B,CAAC;IACtG,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,UAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACrE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAqB9B,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,4BAA4B,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAC;AASzE,MAAM,WAAW,2BAA2B;IAC1C,QAAQ,CAAC,KAAK,CAAC,EAAE,MAAM,CAAC;CACzB;AAED,qBAAa,oBAAqB,YAAW,kBAAkB;IAC7D,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAyB;IACjD,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;gBAEf,OAAO,EAAE,QAAQ,CAAC,WAAW,CAAC;IASpC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IAI3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;CAMjD;AAED,wBAAsB,eAAe,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAQnE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,MAAM,GAAG,oBAAoB,CAEvE;AAED,wBAAgB,yBAAyB,CAAC,OAAO,EAAE,MAAM,GAAG,oBAAoB,CAM/E"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { EnvelopeVerifier } from "@naylence/runtime";
|
|
2
2
|
import { EnvelopeVerifierFactory, type EnvelopeVerifierConfig, type KeyProvider } from "@naylence/runtime";
|
|
3
|
-
import { type
|
|
3
|
+
import { type SigningConfigInstance } from "./eddsa-envelope-verifier.js";
|
|
4
4
|
export interface EdDSAEnvelopeVerifierConfig extends EnvelopeVerifierConfig {
|
|
5
5
|
readonly type: "EdDSAEnvelopeVerifier";
|
|
6
6
|
}
|
|
@@ -15,7 +15,7 @@ export declare class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifi
|
|
|
15
15
|
readonly type = "EdDSAEnvelopeVerifier";
|
|
16
16
|
readonly isDefault = true;
|
|
17
17
|
readonly priority = 100;
|
|
18
|
-
create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null,
|
|
18
|
+
create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null, ...factoryArgs: unknown[]): Promise<EnvelopeVerifier>;
|
|
19
19
|
}
|
|
20
20
|
export default AdvancedEdDSAEnvelopeVerifierFactory;
|
|
21
21
|
//# sourceMappingURL=eddsa-envelope-verifier-factory.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"eddsa-envelope-verifier-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/signing/eddsa-envelope-verifier-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EAEL,uBAAuB,
|
|
1
|
+
{"version":3,"file":"eddsa-envelope-verifier-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/signing/eddsa-envelope-verifier-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EAEL,uBAAuB,EAGvB,KAAK,sBAAsB,EAC3B,KAAK,WAAW,EACjB,MAAM,mBAAmB,CAAC;AAE3B,OAAO,EAGL,KAAK,qBAAqB,EAC3B,MAAM,8BAA8B,CAAC;AAEtC,MAAM,WAAW,2BAA4B,SAAQ,sBAAsB;IACzE,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;CACxC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,KAAK,aAAa,GAAG,qBAAqB,CAAC;AAE3C,qBAAa,oCAAqC,SAAQ,uBAAuB,CAAC,2BAA2B,CAAC;IAC5G,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,OAAO,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACtE,WAAW,CAAC,EAAE,WAAW,GAAG,IAAI,EAChC,aAAa,CAAC,EAAE,aAAa,GAAG,IAAI,EACpC,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,gBAAgB,CAAC;CAqB7B;AAED,eAAe,oCAAoC,CAAC"}
|