@naylence/advanced-security 0.3.7-test.126 → 0.3.7-test.127

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (45) hide show
  1. package/dist/browser/index.cjs +13 -65
  2. package/dist/browser/index.mjs +9 -61
  3. package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js +2 -18
  4. package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
  5. package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
  6. package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
  7. package/dist/cjs/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
  8. package/dist/cjs/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
  9. package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
  10. package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
  11. package/dist/cjs/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
  12. package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
  13. package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
  14. package/dist/cjs/version.js +2 -2
  15. package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js +2 -18
  16. package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
  17. package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
  18. package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
  19. package/dist/esm/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
  20. package/dist/esm/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
  21. package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
  22. package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
  23. package/dist/esm/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
  24. package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
  25. package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
  26. package/dist/esm/version.js +2 -2
  27. package/dist/node/index.cjs +13 -65
  28. package/dist/node/index.mjs +9 -61
  29. package/dist/node/node.cjs +52 -65
  30. package/dist/node/node.mjs +53 -66
  31. package/dist/types/naylence/fame/security/cert/default-certificate-manager.d.ts.map +1 -1
  32. package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts +1 -2
  33. package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts.map +1 -1
  34. package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts +1 -1
  35. package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts.map +1 -1
  36. package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts +1 -1
  37. package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts.map +1 -1
  38. package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts +1 -2
  39. package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts.map +1 -1
  40. package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts +1 -1
  41. package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts.map +1 -1
  42. package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts +2 -2
  43. package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts.map +1 -1
  44. package/dist/types/version.d.ts +1 -1
  45. package/package.json +2 -2
@@ -1,5 +1,4 @@
1
- import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory } from '@naylence/runtime';
2
- import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
1
+ import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, EncryptionManagerFactory, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TrustStoreProviderFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, AnsiColor, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, formatTimestamp, jsonDumps, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, validateHostLogical, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE } from '@naylence/runtime';
3
2
  import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
4
3
  import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
5
4
  import { Certificate, SubjectAlternativeName, NameConstraints, id_ce_subjectAltName, id_ce_nameConstraints, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, id_ce_keyUsage, KeyUsage, id_ce_subjectKeyIdentifier, SubjectKeyIdentifier, id_ce_authorityKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, GeneralSubtrees, GeneralSubtree, TBSCertificate, Validity, Version, id_ce_extKeyUsage, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth } from '@peculiar/asn1-x509';
@@ -11,16 +10,17 @@ import { x25519 } from '@noble/curves/ed25519.js';
11
10
  import { hkdf } from '@noble/hashes/hkdf.js';
12
11
  import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.js';
13
12
  import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
13
+ import { ExtensionManager, Registry, AbstractResourceFactory } from '@naylence/factory';
14
14
  import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
15
15
  import { X509Certificate } from '@peculiar/x509';
16
16
 
17
17
  // This file is auto-generated during build - do not edit manually
18
- // Generated from package.json version: 0.3.7-test.126
18
+ // Generated from package.json version: 0.3.7-test.127
19
19
  /**
20
20
  * The package version, injected at build time.
21
21
  * @internal
22
22
  */
23
- const VERSION = '0.3.7-test.126';
23
+ const VERSION = '0.3.7-test.127';
24
24
 
25
25
  const logger$h = getLogger("naylence.fame.security.cert.util");
26
26
  const CACHE_LIMIT = 512;
@@ -3857,45 +3857,6 @@ class EdDSAEnvelopeVerifier {
3857
3857
  }
3858
3858
  }
3859
3859
 
3860
- const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
3861
- const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
3862
- class TrustStoreProviderFactory extends AbstractResourceFactory {
3863
- createUnconfiguredProvider(reason) {
3864
- return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
3865
- }
3866
- static async createTrustStoreProvider(config, options = {}) {
3867
- const { dependencies, factoryArgs, ...restOptions } = options;
3868
- const mergedFactoryArgs = [
3869
- ...(dependencies ? [dependencies] : []),
3870
- ...(factoryArgs ?? []),
3871
- ];
3872
- const creationOptions = {
3873
- ...restOptions,
3874
- factoryArgs: mergedFactoryArgs,
3875
- };
3876
- if (config) {
3877
- const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
3878
- return instance ?? new NullTrustStoreProvider();
3879
- }
3880
- const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
3881
- return instance ?? new NullTrustStoreProvider();
3882
- }
3883
- }
3884
- class NullTrustStoreProvider {
3885
- constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
3886
- this.reason = reason;
3887
- }
3888
- async getTrustStorePem() {
3889
- throw new Error(this.reason);
3890
- }
3891
- async getRoots() {
3892
- return [];
3893
- }
3894
- async initialize() {
3895
- // No-op for the placeholder provider.
3896
- }
3897
- }
3898
-
3899
3860
  const FACTORY_META$8 = {
3900
3861
  base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
3901
3862
  key: "EdDSAEnvelopeVerifier",
@@ -3909,10 +3870,12 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
3909
3870
  this.isDefault = true;
3910
3871
  this.priority = 100;
3911
3872
  }
3912
- async create(_config, keyProvider, signingConfig, options = {}) {
3873
+ async create(_config, keyProvider, signingConfig, ...factoryArgs) {
3913
3874
  if (!keyProvider) {
3914
3875
  throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
3915
3876
  }
3877
+ // Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
3878
+ const options = factoryArgs[0] ?? {};
3916
3879
  let trustStoreProvider = options.trustStoreProvider ?? null;
3917
3880
  if (!trustStoreProvider) {
3918
3881
  trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
@@ -8167,10 +8130,9 @@ class DefaultCertificateManager {
8167
8130
  });
8168
8131
  }
8169
8132
  }
8170
- const envPem = await resolveTrustStorePemFromEnvironment();
8171
8133
  return {
8172
- pem: envPem,
8173
- reason: envPem ? undefined : "trust_store_provider_unconfigured",
8134
+ pem: null,
8135
+ reason: "trust_store_provider_unconfigured",
8174
8136
  };
8175
8137
  }
8176
8138
  async resolveTrustStorePemFromProvider(provider, nodeId) {
@@ -8450,20 +8412,6 @@ function normalizeAuthConfig(candidate) {
8450
8412
  }
8451
8413
  return normalized;
8452
8414
  }
8453
- async function resolveTrustStorePemFromEnvironment() {
8454
- try {
8455
- const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
8456
- const pem = await provider.getTrustStorePem();
8457
- return normalizePemOrNull(pem);
8458
- }
8459
- catch (error) {
8460
- const message = error instanceof Error ? error.message : String(error);
8461
- logger$1.debug("trust_store_provider_resolution_failed", {
8462
- error: message,
8463
- });
8464
- return null;
8465
- }
8466
- }
8467
8415
 
8468
8416
  const FACTORY_META$2 = {
8469
8417
  base: CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
@@ -12,17 +12,17 @@ var chacha_js = require('@noble/ciphers/chacha.js');
12
12
  var ed25519_js = require('@noble/curves/ed25519.js');
13
13
  var hkdf_js = require('@noble/hashes/hkdf.js');
14
14
  var utils_js = require('@noble/hashes/utils.js');
15
- var factory = require('@naylence/factory');
16
15
  var jose = require('jose');
16
+ var factory = require('@naylence/factory');
17
17
  var sha256_js = require('@noble/hashes/sha256.js');
18
18
 
19
19
  // This file is auto-generated during build - do not edit manually
20
- // Generated from package.json version: 0.3.7-test.126
20
+ // Generated from package.json version: 0.3.7-test.127
21
21
  /**
22
22
  * The package version, injected at build time.
23
23
  * @internal
24
24
  */
25
- const VERSION = '0.3.7-test.126';
25
+ const VERSION = '0.3.7-test.127';
26
26
 
27
27
  const logger$h = runtime.getLogger("naylence.fame.security.cert.util");
28
28
  const CACHE_LIMIT = 512;
@@ -3870,45 +3870,6 @@ class EdDSAEnvelopeVerifier {
3870
3870
  }
3871
3871
  }
3872
3872
 
3873
- const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
3874
- const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
3875
- class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
3876
- createUnconfiguredProvider(reason) {
3877
- return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
3878
- }
3879
- static async createTrustStoreProvider(config, options = {}) {
3880
- const { dependencies, factoryArgs, ...restOptions } = options;
3881
- const mergedFactoryArgs = [
3882
- ...(dependencies ? [dependencies] : []),
3883
- ...(factoryArgs ?? []),
3884
- ];
3885
- const creationOptions = {
3886
- ...restOptions,
3887
- factoryArgs: mergedFactoryArgs,
3888
- };
3889
- if (config) {
3890
- const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
3891
- return instance ?? new NullTrustStoreProvider();
3892
- }
3893
- const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
3894
- return instance ?? new NullTrustStoreProvider();
3895
- }
3896
- }
3897
- class NullTrustStoreProvider {
3898
- constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
3899
- this.reason = reason;
3900
- }
3901
- async getTrustStorePem() {
3902
- throw new Error(this.reason);
3903
- }
3904
- async getRoots() {
3905
- return [];
3906
- }
3907
- async initialize() {
3908
- // No-op for the placeholder provider.
3909
- }
3910
- }
3911
-
3912
3873
  const FACTORY_META$9 = {
3913
3874
  base: runtime.ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
3914
3875
  key: "EdDSAEnvelopeVerifier",
@@ -3922,13 +3883,15 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends runtime.EnvelopeVerifierFacto
3922
3883
  this.isDefault = true;
3923
3884
  this.priority = 100;
3924
3885
  }
3925
- async create(_config, keyProvider, signingConfig, options = {}) {
3886
+ async create(_config, keyProvider, signingConfig, ...factoryArgs) {
3926
3887
  if (!keyProvider) {
3927
3888
  throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
3928
3889
  }
3890
+ // Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
3891
+ const options = factoryArgs[0] ?? {};
3929
3892
  let trustStoreProvider = options.trustStoreProvider ?? null;
3930
3893
  if (!trustStoreProvider) {
3931
- trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
3894
+ trustStoreProvider = await runtime.TrustStoreProviderFactory.createTrustStoreProvider();
3932
3895
  }
3933
3896
  const resolved = {
3934
3897
  signingConfig: options.signingConfig ?? signingConfig ?? new runtime.SigningConfigClass(),
@@ -7168,10 +7131,9 @@ class DefaultCertificateManager {
7168
7131
  });
7169
7132
  }
7170
7133
  }
7171
- const envPem = await resolveTrustStorePemFromEnvironment();
7172
7134
  return {
7173
- pem: envPem,
7174
- reason: envPem ? undefined : "trust_store_provider_unconfigured",
7135
+ pem: null,
7136
+ reason: "trust_store_provider_unconfigured",
7175
7137
  };
7176
7138
  }
7177
7139
  async resolveTrustStorePemFromProvider(provider, nodeId) {
@@ -7451,20 +7413,6 @@ function normalizeAuthConfig(candidate) {
7451
7413
  }
7452
7414
  return normalized;
7453
7415
  }
7454
- async function resolveTrustStorePemFromEnvironment() {
7455
- try {
7456
- const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
7457
- const pem = await provider.getTrustStorePem();
7458
- return normalizePemOrNull(pem);
7459
- }
7460
- catch (error) {
7461
- const message = error instanceof Error ? error.message : String(error);
7462
- logger$1.debug("trust_store_provider_resolution_failed", {
7463
- error: message,
7464
- });
7465
- return null;
7466
- }
7467
- }
7468
7416
 
7469
7417
  const FACTORY_META$4 = {
7470
7418
  base: runtime.CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
@@ -7542,6 +7490,45 @@ var defaultCertificateManagerFactory = /*#__PURE__*/Object.freeze({
7542
7490
  default: DefaultCertificateManagerFactory
7543
7491
  });
7544
7492
 
7493
+ const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
7494
+ const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
7495
+ class TrustStoreProviderFactory extends factory.AbstractResourceFactory {
7496
+ createUnconfiguredProvider(reason) {
7497
+ return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
7498
+ }
7499
+ static async createTrustStoreProvider(config, options = {}) {
7500
+ const { dependencies, factoryArgs, ...restOptions } = options;
7501
+ const mergedFactoryArgs = [
7502
+ ...(dependencies ? [dependencies] : []),
7503
+ ...(factoryArgs ?? []),
7504
+ ];
7505
+ const creationOptions = {
7506
+ ...restOptions,
7507
+ factoryArgs: mergedFactoryArgs,
7508
+ };
7509
+ if (config) {
7510
+ const instance = await factory.createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
7511
+ return instance ?? new NullTrustStoreProvider();
7512
+ }
7513
+ const instance = await factory.createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
7514
+ return instance ?? new NullTrustStoreProvider();
7515
+ }
7516
+ }
7517
+ class NullTrustStoreProvider {
7518
+ constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
7519
+ this.reason = reason;
7520
+ }
7521
+ async getTrustStorePem() {
7522
+ throw new Error(this.reason);
7523
+ }
7524
+ async getRoots() {
7525
+ return [];
7526
+ }
7527
+ async initialize() {
7528
+ // No-op for the placeholder provider.
7529
+ }
7530
+ }
7531
+
7545
7532
  const PEM_HEADER = "-----BEGIN CERTIFICATE-----";
7546
7533
  function normalizeLineEndings(value) {
7547
7534
  return value.replace(/\r\n?/gu, "\n");
@@ -8618,12 +8605,12 @@ function isNodeEnvironment$2() {
8618
8605
  }
8619
8606
 
8620
8607
  const FACTORY_META$3 = {
8621
- base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
8608
+ base: runtime.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
8622
8609
  key: "EnvTrustStoreProvider",
8623
8610
  isDefault: isNodeEnvironment$1(),
8624
8611
  priority: isNodeEnvironment$1() ? 100 : 0,
8625
8612
  };
8626
- class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory {
8613
+ class EnvTrustStoreProviderFactory extends runtime.TrustStoreProviderFactory {
8627
8614
  constructor() {
8628
8615
  super(...arguments);
8629
8616
  this.type = "EnvTrustStoreProvider";
@@ -8683,12 +8670,12 @@ var nodeTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
8683
8670
  });
8684
8671
 
8685
8672
  const FACTORY_META$2 = {
8686
- base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
8673
+ base: runtime.TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
8687
8674
  key: "BrowserTrustStoreProvider",
8688
8675
  isDefault: !isNodeEnvironment(),
8689
8676
  priority: !isNodeEnvironment() ? 100 : 10,
8690
8677
  };
8691
- class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory {
8678
+ class BrowserTrustStoreProviderFactory extends runtime.TrustStoreProviderFactory {
8692
8679
  constructor() {
8693
8680
  super(...arguments);
8694
8681
  this.type = "BrowserTrustStoreProvider";
@@ -2,7 +2,7 @@ import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
2
2
  import { Certificate, id_ce_subjectAltName, SubjectAlternativeName, id_ce_nameConstraints, NameConstraints, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, TBSCertificate, Validity, Version, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, KeyUsage, id_ce_keyUsage, SubjectKeyIdentifier, id_ce_subjectKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, id_ce_authorityKeyIdentifier, GeneralSubtrees, GeneralSubtree, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth, id_ce_extKeyUsage } from '@peculiar/asn1-x509';
3
3
  import { sha512, sha256 } from '@noble/hashes/sha2.js';
4
4
  import { verify, etc } from '@noble/ed25519';
5
- import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, validateHostLogical } from '@naylence/runtime';
5
+ import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TrustStoreProviderFactory as TrustStoreProviderFactory$1, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE as TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1, validateHostLogical } from '@naylence/runtime';
6
6
  import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
7
7
  import { X509Certificate } from '@peculiar/x509';
8
8
  import { localDeliveryContext, createFameEnvelope, FameAddress, generateId, formatAddress, SigningMaterial, DeliveryOriginType as DeliveryOriginType$1 } from '@naylence/core';
@@ -10,17 +10,17 @@ import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
10
10
  import { x25519 } from '@noble/curves/ed25519.js';
11
11
  import { hkdf } from '@noble/hashes/hkdf.js';
12
12
  import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.js';
13
- import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
14
13
  import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
14
+ import { ExtensionManager, Registry, AbstractResourceFactory, createResource, createDefaultResource } from '@naylence/factory';
15
15
  import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
16
16
 
17
17
  // This file is auto-generated during build - do not edit manually
18
- // Generated from package.json version: 0.3.7-test.126
18
+ // Generated from package.json version: 0.3.7-test.127
19
19
  /**
20
20
  * The package version, injected at build time.
21
21
  * @internal
22
22
  */
23
- const VERSION = '0.3.7-test.126';
23
+ const VERSION = '0.3.7-test.127';
24
24
 
25
25
  const logger$h = getLogger("naylence.fame.security.cert.util");
26
26
  const CACHE_LIMIT = 512;
@@ -3868,45 +3868,6 @@ class EdDSAEnvelopeVerifier {
3868
3868
  }
3869
3869
  }
3870
3870
 
3871
- const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
3872
- const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
3873
- class TrustStoreProviderFactory extends AbstractResourceFactory {
3874
- createUnconfiguredProvider(reason) {
3875
- return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
3876
- }
3877
- static async createTrustStoreProvider(config, options = {}) {
3878
- const { dependencies, factoryArgs, ...restOptions } = options;
3879
- const mergedFactoryArgs = [
3880
- ...(dependencies ? [dependencies] : []),
3881
- ...(factoryArgs ?? []),
3882
- ];
3883
- const creationOptions = {
3884
- ...restOptions,
3885
- factoryArgs: mergedFactoryArgs,
3886
- };
3887
- if (config) {
3888
- const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
3889
- return instance ?? new NullTrustStoreProvider();
3890
- }
3891
- const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
3892
- return instance ?? new NullTrustStoreProvider();
3893
- }
3894
- }
3895
- class NullTrustStoreProvider {
3896
- constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
3897
- this.reason = reason;
3898
- }
3899
- async getTrustStorePem() {
3900
- throw new Error(this.reason);
3901
- }
3902
- async getRoots() {
3903
- return [];
3904
- }
3905
- async initialize() {
3906
- // No-op for the placeholder provider.
3907
- }
3908
- }
3909
-
3910
3871
  const FACTORY_META$9 = {
3911
3872
  base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
3912
3873
  key: "EdDSAEnvelopeVerifier",
@@ -3920,13 +3881,15 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
3920
3881
  this.isDefault = true;
3921
3882
  this.priority = 100;
3922
3883
  }
3923
- async create(_config, keyProvider, signingConfig, options = {}) {
3884
+ async create(_config, keyProvider, signingConfig, ...factoryArgs) {
3924
3885
  if (!keyProvider) {
3925
3886
  throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
3926
3887
  }
3888
+ // Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
3889
+ const options = factoryArgs[0] ?? {};
3927
3890
  let trustStoreProvider = options.trustStoreProvider ?? null;
3928
3891
  if (!trustStoreProvider) {
3929
- trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
3892
+ trustStoreProvider = await TrustStoreProviderFactory$1.createTrustStoreProvider();
3930
3893
  }
3931
3894
  const resolved = {
3932
3895
  signingConfig: options.signingConfig ?? signingConfig ?? new SigningConfigClass(),
@@ -7166,10 +7129,9 @@ class DefaultCertificateManager {
7166
7129
  });
7167
7130
  }
7168
7131
  }
7169
- const envPem = await resolveTrustStorePemFromEnvironment();
7170
7132
  return {
7171
- pem: envPem,
7172
- reason: envPem ? undefined : "trust_store_provider_unconfigured",
7133
+ pem: null,
7134
+ reason: "trust_store_provider_unconfigured",
7173
7135
  };
7174
7136
  }
7175
7137
  async resolveTrustStorePemFromProvider(provider, nodeId) {
@@ -7449,20 +7411,6 @@ function normalizeAuthConfig(candidate) {
7449
7411
  }
7450
7412
  return normalized;
7451
7413
  }
7452
- async function resolveTrustStorePemFromEnvironment() {
7453
- try {
7454
- const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
7455
- const pem = await provider.getTrustStorePem();
7456
- return normalizePemOrNull(pem);
7457
- }
7458
- catch (error) {
7459
- const message = error instanceof Error ? error.message : String(error);
7460
- logger$1.debug("trust_store_provider_resolution_failed", {
7461
- error: message,
7462
- });
7463
- return null;
7464
- }
7465
- }
7466
7414
 
7467
7415
  const FACTORY_META$4 = {
7468
7416
  base: CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
@@ -7540,6 +7488,45 @@ var defaultCertificateManagerFactory = /*#__PURE__*/Object.freeze({
7540
7488
  default: DefaultCertificateManagerFactory
7541
7489
  });
7542
7490
 
7491
+ const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
7492
+ const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
7493
+ class TrustStoreProviderFactory extends AbstractResourceFactory {
7494
+ createUnconfiguredProvider(reason) {
7495
+ return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
7496
+ }
7497
+ static async createTrustStoreProvider(config, options = {}) {
7498
+ const { dependencies, factoryArgs, ...restOptions } = options;
7499
+ const mergedFactoryArgs = [
7500
+ ...(dependencies ? [dependencies] : []),
7501
+ ...(factoryArgs ?? []),
7502
+ ];
7503
+ const creationOptions = {
7504
+ ...restOptions,
7505
+ factoryArgs: mergedFactoryArgs,
7506
+ };
7507
+ if (config) {
7508
+ const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
7509
+ return instance ?? new NullTrustStoreProvider();
7510
+ }
7511
+ const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
7512
+ return instance ?? new NullTrustStoreProvider();
7513
+ }
7514
+ }
7515
+ class NullTrustStoreProvider {
7516
+ constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
7517
+ this.reason = reason;
7518
+ }
7519
+ async getTrustStorePem() {
7520
+ throw new Error(this.reason);
7521
+ }
7522
+ async getRoots() {
7523
+ return [];
7524
+ }
7525
+ async initialize() {
7526
+ // No-op for the placeholder provider.
7527
+ }
7528
+ }
7529
+
7543
7530
  const PEM_HEADER = "-----BEGIN CERTIFICATE-----";
7544
7531
  function normalizeLineEndings(value) {
7545
7532
  return value.replace(/\r\n?/gu, "\n");
@@ -8616,12 +8603,12 @@ function isNodeEnvironment$2() {
8616
8603
  }
8617
8604
 
8618
8605
  const FACTORY_META$3 = {
8619
- base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
8606
+ base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
8620
8607
  key: "EnvTrustStoreProvider",
8621
8608
  isDefault: isNodeEnvironment$1(),
8622
8609
  priority: isNodeEnvironment$1() ? 100 : 0,
8623
8610
  };
8624
- class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory {
8611
+ class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
8625
8612
  constructor() {
8626
8613
  super(...arguments);
8627
8614
  this.type = "EnvTrustStoreProvider";
@@ -8681,12 +8668,12 @@ var nodeTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
8681
8668
  });
8682
8669
 
8683
8670
  const FACTORY_META$2 = {
8684
- base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
8671
+ base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
8685
8672
  key: "BrowserTrustStoreProvider",
8686
8673
  isDefault: !isNodeEnvironment(),
8687
8674
  priority: !isNodeEnvironment() ? 100 : 10,
8688
8675
  };
8689
- class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory {
8676
+ class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
8690
8677
  constructor() {
8691
8678
  super(...arguments);
8692
8679
  this.type = "BrowserTrustStoreProvider";
@@ -1 +1 @@
1
- {"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAe3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAwCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAqRD,eAAe,yBAAyB,CAAC"}
1
+ {"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAc3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAuCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAuQD,eAAe,yBAAyB,CAAC"}
@@ -1,5 +1,4 @@
1
- import type { TrustStoreProvider } from "./trust-store-provider.js";
2
- import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
1
+ import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
3
2
  export interface BrowserTrustStoreProviderConfig extends TrustStoreProviderConfig {
4
3
  readonly type: "BrowserTrustStoreProvider";
5
4
  readonly url?: string | null;
@@ -1 +1 @@
1
- {"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AACpE,OAAO,EAEL,yBAAyB,EACzB,KAAK,wBAAwB,EAE9B,MAAM,mCAAmC,CAAC;AAE3C,MAAM,WAAW,+BAAgC,SAAQ,wBAAwB;IAC/E,QAAQ,CAAC,IAAI,EAAE,2BAA2B,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,QAAQ,CAAC,QAAQ,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IAC7C,QAAQ,CAAC,YAAY,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IACjD,QAAQ,CAAC,SAAS,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACpC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAChD;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,WAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAuB9B,OAAO,CAAC,4BAA4B;IAwBpC,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,gCAAgC,CAAC"}
1
+ {"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAK3B,MAAM,WAAW,+BAAgC,SAAQ,wBAAwB;IAC/E,QAAQ,CAAC,IAAI,EAAE,2BAA2B,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,QAAQ,CAAC,QAAQ,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IAC7C,QAAQ,CAAC,YAAY,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IACjD,QAAQ,CAAC,SAAS,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACpC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAChD;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,WAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAuB9B,OAAO,CAAC,4BAA4B;IAwBpC,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,gCAAgC,CAAC"}
@@ -1,4 +1,4 @@
1
- import type { TrustStoreProvider } from "./trust-store-provider.js";
1
+ import type { TrustStoreProvider } from "@naylence/runtime";
2
2
  export interface CreateTrustStoreProviderOptions {
3
3
  readonly env?: Record<string, unknown> | null;
4
4
  readonly requirePinsInBrowser?: boolean;
@@ -1 +1 @@
1
- {"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,EAOV,kBAAkB,EACnB,MAAM,2BAA2B,CAAC;AAEnC,MAAM,WAAW,+BAA+B;IAC9C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,wBAAsB,+BAA+B,CACnD,OAAO,GAAE,+BAAoC,GAC5C,OAAO,CAAC,kBAAkB,GAAG,IAAI,CAAC,CA6BpC"}
1
+ {"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAOV,kBAAkB,EACnB,MAAM,mBAAmB,CAAC;AAU3B,MAAM,WAAW,+BAA+B;IAC9C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,wBAAsB,+BAA+B,CACnD,OAAO,GAAE,+BAAoC,GAC5C,OAAO,CAAC,kBAAkB,GAAG,IAAI,CAAC,CA6BpC"}
@@ -1,4 +1,4 @@
1
- import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "./trust-store-provider.js";
1
+ import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "@naylence/runtime";
2
2
  export interface HttpBundleProviderOptions extends TrustBundlePins {
3
3
  readonly url: string;
4
4
  readonly cacheKey?: string;
@@ -1 +1 @@
1
- {"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"AAWA,OAAO,KAAK,EACV,WAAW,EACX,kBAAkB,EAClB,eAAe,EAChB,MAAM,2BAA2B,CAAC;AAUnC,MAAM,WAAW,yBAA0B,SAAQ,eAAe;IAChE,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;IACxC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,OAAO,CAAC;CACtC;AA6CD,qBAAa,kBAAmB,YAAW,kBAAkB;IAC3D,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAM;IAC1B,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAS;IAC3C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAoB;IAC7C,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAoB;IACjD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAU;IACpC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAU;IAC7C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;IAClC,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAU;IAE5C,OAAO,CAAC,WAAW,CAAK;IACxB,OAAO,CAAC,IAAI,CAAuB;IACnC,OAAO,CAAC,aAAa,CAAuB;IAC5C,OAAO,CAAC,OAAO,CAAuB;IACtC,OAAO,CAAC,OAAO,CAA8B;IAC7C,OAAO,CAAC,QAAQ,CAAuC;IACvD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAyB;IACnD,OAAO,CAAC,WAAW,CAAS;IAC5B,OAAO,CAAC,QAAQ,CAAuB;gBAEpB,OAAO,EAAE,yBAAyB;IAiDxC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IA+B3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;IAiBzC,QAAQ,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,MAAM,IAAI;IAOpC,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IAqBxC,OAAO,CAAC,gBAAgB;YASV,WAAW;IAkFzB,OAAO,CAAC,eAAe;CAWxB"}
1
+ {"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EACV,WAAW,EACX,kBAAkB,EAClB,eAAe,EAChB,MAAM,mBAAmB,CAAC;AAmB3B,MAAM,WAAW,yBAA0B,SAAQ,eAAe;IAChE,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;IACxC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,OAAO,CAAC;CACtC;AA6CD,qBAAa,kBAAmB,YAAW,kBAAkB;IAC3D,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAM;IAC1B,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAS;IAC3C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAoB;IAC7C,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAoB;IACjD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAU;IACpC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAU;IAC7C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;IAClC,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAU;IAE5C,OAAO,CAAC,WAAW,CAAK;IACxB,OAAO,CAAC,IAAI,CAAuB;IACnC,OAAO,CAAC,aAAa,CAAuB;IAC5C,OAAO,CAAC,OAAO,CAAuB;IACtC,OAAO,CAAC,OAAO,CAA8B;IAC7C,OAAO,CAAC,QAAQ,CAAuC;IACvD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAyB;IACnD,OAAO,CAAC,WAAW,CAAS;IAC5B,OAAO,CAAC,QAAQ,CAAuB;gBAEpB,OAAO,EAAE,yBAAyB;IAiDxC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IA+B3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;IAiBzC,QAAQ,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,MAAM,IAAI;IAOpC,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IAqBxC,OAAO,CAAC,gBAAgB;YASV,WAAW;IAkFzB,OAAO,CAAC,eAAe;CAWxB"}
@@ -1,5 +1,4 @@
1
- import type { TrustStoreProvider } from "./trust-store-provider.js";
2
- import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
1
+ import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
3
2
  export interface EnvTrustStoreProviderConfig extends TrustStoreProviderConfig {
4
3
  readonly type: "EnvTrustStoreProvider";
5
4
  readonly env?: Record<string, unknown> | null;
@@ -1 +1 @@
1
- {"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AACpE,OAAO,EAEL,yBAAyB,EACzB,KAAK,wBAAwB,EAE9B,MAAM,mCAAmC,CAAC;AAG3C,MAAM,WAAW,2BAA4B,SAAQ,wBAAwB;IAC3E,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;IACvC,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,4BAA6B,SAAQ,yBAAyB,CAAC,2BAA2B,CAAC;IACtG,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,UAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACrE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAqB9B,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,4BAA4B,CAAC"}
1
+ {"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAG3B,MAAM,WAAW,2BAA4B,SAAQ,wBAAwB;IAC3E,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;IACvC,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,4BAA6B,SAAQ,yBAAyB,CAAC,2BAA2B,CAAC;IACtG,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,UAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACrE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAqB9B,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,4BAA4B,CAAC"}
@@ -1,4 +1,4 @@
1
- import type { TrustAnchor, TrustStoreProvider } from "./trust-store-provider.js";
1
+ import type { TrustAnchor, TrustStoreProvider } from "@naylence/runtime";
2
2
  export interface StaticBundleProviderOptions {
3
3
  readonly label?: string;
4
4
  }
@@ -1 +1 @@
1
- {"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,WAAW,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAEjF,MAAM,WAAW,2BAA2B;IAC1C,QAAQ,CAAC,KAAK,CAAC,EAAE,MAAM,CAAC;CACzB;AAED,qBAAa,oBAAqB,YAAW,kBAAkB;IAC7D,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAyB;IACjD,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;gBAEf,OAAO,EAAE,QAAQ,CAAC,WAAW,CAAC;IASpC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IAI3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;CAMjD;AAED,wBAAsB,eAAe,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAQnE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,MAAM,GAAG,oBAAoB,CAEvE;AAED,wBAAgB,yBAAyB,CAAC,OAAO,EAAE,MAAM,GAAG,oBAAoB,CAM/E"}
1
+ {"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAC;AASzE,MAAM,WAAW,2BAA2B;IAC1C,QAAQ,CAAC,KAAK,CAAC,EAAE,MAAM,CAAC;CACzB;AAED,qBAAa,oBAAqB,YAAW,kBAAkB;IAC7D,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAyB;IACjD,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;gBAEf,OAAO,EAAE,QAAQ,CAAC,WAAW,CAAC;IASpC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IAI3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;CAMjD;AAED,wBAAsB,eAAe,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAQnE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,MAAM,GAAG,oBAAoB,CAEvE;AAED,wBAAgB,yBAAyB,CAAC,OAAO,EAAE,MAAM,GAAG,oBAAoB,CAM/E"}
@@ -1,6 +1,6 @@
1
1
  import type { EnvelopeVerifier } from "@naylence/runtime";
2
2
  import { EnvelopeVerifierFactory, type EnvelopeVerifierConfig, type KeyProvider } from "@naylence/runtime";
3
- import { type EdDSAEnvelopeVerifierOptions, type SigningConfigInstance } from "./eddsa-envelope-verifier.js";
3
+ import { type SigningConfigInstance } from "./eddsa-envelope-verifier.js";
4
4
  export interface EdDSAEnvelopeVerifierConfig extends EnvelopeVerifierConfig {
5
5
  readonly type: "EdDSAEnvelopeVerifier";
6
6
  }
@@ -15,7 +15,7 @@ export declare class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifi
15
15
  readonly type = "EdDSAEnvelopeVerifier";
16
16
  readonly isDefault = true;
17
17
  readonly priority = 100;
18
- create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null, options?: EdDSAEnvelopeVerifierOptions): Promise<EnvelopeVerifier>;
18
+ create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null, ...factoryArgs: unknown[]): Promise<EnvelopeVerifier>;
19
19
  }
20
20
  export default AdvancedEdDSAEnvelopeVerifierFactory;
21
21
  //# sourceMappingURL=eddsa-envelope-verifier-factory.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"eddsa-envelope-verifier-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/signing/eddsa-envelope-verifier-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EAEL,uBAAuB,EAEvB,KAAK,sBAAsB,EAC3B,KAAK,WAAW,EACjB,MAAM,mBAAmB,CAAC;AAE3B,OAAO,EAEL,KAAK,4BAA4B,EACjC,KAAK,qBAAqB,EAC3B,MAAM,8BAA8B,CAAC;AAGtC,MAAM,WAAW,2BAA4B,SAAQ,sBAAsB;IACzE,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;CACxC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,KAAK,aAAa,GAAG,qBAAqB,CAAC;AAE3C,qBAAa,oCAAqC,SAAQ,uBAAuB,CAAC,2BAA2B,CAAC;IAC5G,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,OAAO,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACtE,WAAW,CAAC,EAAE,WAAW,GAAG,IAAI,EAChC,aAAa,CAAC,EAAE,aAAa,GAAG,IAAI,EACpC,OAAO,GAAE,4BAAiC,GACzC,OAAO,CAAC,gBAAgB,CAAC;CAkB7B;AAED,eAAe,oCAAoC,CAAC"}
1
+ {"version":3,"file":"eddsa-envelope-verifier-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/signing/eddsa-envelope-verifier-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EAEL,uBAAuB,EAGvB,KAAK,sBAAsB,EAC3B,KAAK,WAAW,EACjB,MAAM,mBAAmB,CAAC;AAE3B,OAAO,EAGL,KAAK,qBAAqB,EAC3B,MAAM,8BAA8B,CAAC;AAEtC,MAAM,WAAW,2BAA4B,SAAQ,sBAAsB;IACzE,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;CACxC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,KAAK,aAAa,GAAG,qBAAqB,CAAC;AAE3C,qBAAa,oCAAqC,SAAQ,uBAAuB,CAAC,2BAA2B,CAAC;IAC5G,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,OAAO,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACtE,WAAW,CAAC,EAAE,WAAW,GAAG,IAAI,EAChC,aAAa,CAAC,EAAE,aAAa,GAAG,IAAI,EACpC,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,gBAAgB,CAAC;CAqB7B;AAED,eAAe,oCAAoC,CAAC"}