@naylence/advanced-security 0.3.7-test.126 → 0.3.7-test.128
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/browser/index.cjs +19 -68
- package/dist/browser/index.mjs +15 -64
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager-factory.js +6 -3
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js +2 -18
- package/dist/cjs/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
- package/dist/cjs/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
- package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
- package/dist/cjs/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
- package/dist/cjs/version.js +2 -2
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager-factory.js +6 -3
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js +2 -18
- package/dist/esm/naylence/fame/security/cert/default-certificate-manager.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/env-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/http-bundle-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.js.map +1 -1
- package/dist/esm/naylence/fame/security/cert/trust-store/static-bundle-provider.js.map +1 -1
- package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js +4 -3
- package/dist/esm/naylence/fame/security/signing/eddsa-envelope-verifier-factory.js.map +1 -1
- package/dist/esm/version.js +2 -2
- package/dist/node/index.cjs +19 -68
- package/dist/node/index.mjs +15 -64
- package/dist/node/node.cjs +58 -68
- package/dist/node/node.mjs +59 -69
- package/dist/types/naylence/fame/security/cert/default-certificate-manager-factory.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/default-certificate-manager-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/default-certificate-manager.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts +1 -2
- package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/env-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/http-bundle-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts +1 -2
- package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts +1 -1
- package/dist/types/naylence/fame/security/cert/trust-store/static-bundle-provider.d.ts.map +1 -1
- package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts +2 -2
- package/dist/types/naylence/fame/security/signing/eddsa-envelope-verifier-factory.d.ts.map +1 -1
- package/dist/types/version.d.ts +1 -1
- package/package.json +2 -2
package/dist/node/node.mjs
CHANGED
|
@@ -2,7 +2,7 @@ import { AsnConvert, OctetString } from '@peculiar/asn1-schema';
|
|
|
2
2
|
import { Certificate, id_ce_subjectAltName, SubjectAlternativeName, id_ce_nameConstraints, NameConstraints, Name, RelativeDistinguishedName, AttributeTypeAndValue, AttributeValue, SubjectPublicKeyInfo, GeneralName, Extensions, Extension, Attribute, AlgorithmIdentifier, TBSCertificate, Validity, Version, BasicConstraints, id_ce_basicConstraints, KeyUsageFlags, KeyUsage, id_ce_keyUsage, SubjectKeyIdentifier, id_ce_subjectKeyIdentifier, AuthorityKeyIdentifier, KeyIdentifier, id_ce_authorityKeyIdentifier, GeneralSubtrees, GeneralSubtree, ExtendedKeyUsage, id_kp_clientAuth, id_kp_serverAuth, id_ce_extKeyUsage } from '@peculiar/asn1-x509';
|
|
3
3
|
import { sha512, sha256 } from '@noble/hashes/sha2.js';
|
|
4
4
|
import { verify, etc } from '@noble/ed25519';
|
|
5
|
-
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, validateHostLogical } from '@naylence/runtime';
|
|
5
|
+
import { getLogger, EncryptionResult, urlsafeBase64Decode, sealedDecrypt, sealedEncrypt, FIXED_PREFIX_LEN, urlsafeBase64Encode, ENCRYPTION_MANAGER_FACTORY_BASE_TYPE, EncryptionManagerFactory, requireCryptoSupport, SECURE_CHANNEL_MANAGER_FACTORY_BASE_TYPE, SecureChannelManagerFactory, ENVELOPE_SIGNER_FACTORY_BASE_TYPE, EnvelopeSignerFactory, SigningConfigClass, validateSigningKey, JWKValidationError, decodeBase64Url, canonicalJson, secureDigest, frameDigest, immutableHeaders, encodeUtf8, ENVELOPE_VERIFIER_FACTORY_BASE_TYPE, EnvelopeVerifierFactory, TrustStoreProviderFactory as TrustStoreProviderFactory$1, TaskSpawner, getKeyStore, DefaultKeyManager, validateJwkComplete, currentTraceId, DeliveryOriginType, KEY_MANAGER_FACTORY_BASE_TYPE, KeyManagerFactory, KeyStoreFactory, BaseNodeEventListener, LOAD_BALANCER_STICKINESS_MANAGER_FACTORY_BASE_TYPE, LoadBalancerStickinessManagerFactory, REPLICA_STICKINESS_MANAGER_FACTORY_BASE_TYPE, ReplicaStickinessManagerFactory, color, formatTimestamp, AnsiColor, jsonDumps, validateHostLogicals, HTTP_CONNECTION_GRANT_TYPE, WELCOME_SERVICE_FACTORY_BASE_TYPE, WelcomeServiceFactory, NodePlacementStrategyFactory, TransportProvisionerFactory, TokenIssuerFactory, AuthorizerFactory, AuthInjectionStrategyFactory, CERTIFICATE_MANAGER_FACTORY_BASE_TYPE, CertificateManagerFactory, TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE as TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1, validateHostLogical } from '@naylence/runtime';
|
|
6
6
|
import { Attributes, CertificationRequestInfo, CertificationRequest } from '@peculiar/asn1-csr';
|
|
7
7
|
import { X509Certificate } from '@peculiar/x509';
|
|
8
8
|
import { localDeliveryContext, createFameEnvelope, FameAddress, generateId, formatAddress, SigningMaterial, DeliveryOriginType as DeliveryOriginType$1 } from '@naylence/core';
|
|
@@ -10,17 +10,17 @@ import { chacha20poly1305 } from '@noble/ciphers/chacha.js';
|
|
|
10
10
|
import { x25519 } from '@noble/curves/ed25519.js';
|
|
11
11
|
import { hkdf } from '@noble/hashes/hkdf.js';
|
|
12
12
|
import { utf8ToBytes, randomBytes as randomBytes$1 } from '@noble/hashes/utils.js';
|
|
13
|
-
import { ExtensionManager, AbstractResourceFactory, createResource, createDefaultResource, Registry } from '@naylence/factory';
|
|
14
13
|
import { SignJWT, importPKCS8, compactVerify, importJWK, importSPKI } from 'jose';
|
|
14
|
+
import { ExtensionManager, Registry, AbstractResourceFactory, createResource, createDefaultResource } from '@naylence/factory';
|
|
15
15
|
import { sha256 as sha256$1 } from '@noble/hashes/sha256.js';
|
|
16
16
|
|
|
17
17
|
// This file is auto-generated during build - do not edit manually
|
|
18
|
-
// Generated from package.json version: 0.3.7-test.
|
|
18
|
+
// Generated from package.json version: 0.3.7-test.128
|
|
19
19
|
/**
|
|
20
20
|
* The package version, injected at build time.
|
|
21
21
|
* @internal
|
|
22
22
|
*/
|
|
23
|
-
const VERSION = '0.3.7-test.
|
|
23
|
+
const VERSION = '0.3.7-test.128';
|
|
24
24
|
|
|
25
25
|
const logger$h = getLogger("naylence.fame.security.cert.util");
|
|
26
26
|
const CACHE_LIMIT = 512;
|
|
@@ -3868,45 +3868,6 @@ class EdDSAEnvelopeVerifier {
|
|
|
3868
3868
|
}
|
|
3869
3869
|
}
|
|
3870
3870
|
|
|
3871
|
-
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
3872
|
-
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
3873
|
-
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
3874
|
-
createUnconfiguredProvider(reason) {
|
|
3875
|
-
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
3876
|
-
}
|
|
3877
|
-
static async createTrustStoreProvider(config, options = {}) {
|
|
3878
|
-
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
3879
|
-
const mergedFactoryArgs = [
|
|
3880
|
-
...(dependencies ? [dependencies] : []),
|
|
3881
|
-
...(factoryArgs ?? []),
|
|
3882
|
-
];
|
|
3883
|
-
const creationOptions = {
|
|
3884
|
-
...restOptions,
|
|
3885
|
-
factoryArgs: mergedFactoryArgs,
|
|
3886
|
-
};
|
|
3887
|
-
if (config) {
|
|
3888
|
-
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
3889
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3890
|
-
}
|
|
3891
|
-
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
3892
|
-
return instance ?? new NullTrustStoreProvider();
|
|
3893
|
-
}
|
|
3894
|
-
}
|
|
3895
|
-
class NullTrustStoreProvider {
|
|
3896
|
-
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
3897
|
-
this.reason = reason;
|
|
3898
|
-
}
|
|
3899
|
-
async getTrustStorePem() {
|
|
3900
|
-
throw new Error(this.reason);
|
|
3901
|
-
}
|
|
3902
|
-
async getRoots() {
|
|
3903
|
-
return [];
|
|
3904
|
-
}
|
|
3905
|
-
async initialize() {
|
|
3906
|
-
// No-op for the placeholder provider.
|
|
3907
|
-
}
|
|
3908
|
-
}
|
|
3909
|
-
|
|
3910
3871
|
const FACTORY_META$9 = {
|
|
3911
3872
|
base: ENVELOPE_VERIFIER_FACTORY_BASE_TYPE,
|
|
3912
3873
|
key: "EdDSAEnvelopeVerifier",
|
|
@@ -3920,13 +3881,15 @@ class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifierFactory {
|
|
|
3920
3881
|
this.isDefault = true;
|
|
3921
3882
|
this.priority = 100;
|
|
3922
3883
|
}
|
|
3923
|
-
async create(_config, keyProvider, signingConfig,
|
|
3884
|
+
async create(_config, keyProvider, signingConfig, ...factoryArgs) {
|
|
3924
3885
|
if (!keyProvider) {
|
|
3925
3886
|
throw new Error("EdDSAEnvelopeVerifierFactory requires a key provider");
|
|
3926
3887
|
}
|
|
3888
|
+
// Extract options from factoryArgs (third parameter after keyProvider and signingConfig)
|
|
3889
|
+
const options = factoryArgs[0] ?? {};
|
|
3927
3890
|
let trustStoreProvider = options.trustStoreProvider ?? null;
|
|
3928
3891
|
if (!trustStoreProvider) {
|
|
3929
|
-
trustStoreProvider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
3892
|
+
trustStoreProvider = await TrustStoreProviderFactory$1.createTrustStoreProvider();
|
|
3930
3893
|
}
|
|
3931
3894
|
const resolved = {
|
|
3932
3895
|
signingConfig: options.signingConfig ?? signingConfig ?? new SigningConfigClass(),
|
|
@@ -7166,10 +7129,9 @@ class DefaultCertificateManager {
|
|
|
7166
7129
|
});
|
|
7167
7130
|
}
|
|
7168
7131
|
}
|
|
7169
|
-
const envPem = await resolveTrustStorePemFromEnvironment();
|
|
7170
7132
|
return {
|
|
7171
|
-
pem:
|
|
7172
|
-
reason:
|
|
7133
|
+
pem: null,
|
|
7134
|
+
reason: "trust_store_provider_unconfigured",
|
|
7173
7135
|
};
|
|
7174
7136
|
}
|
|
7175
7137
|
async resolveTrustStorePemFromProvider(provider, nodeId) {
|
|
@@ -7449,20 +7411,6 @@ function normalizeAuthConfig(candidate) {
|
|
|
7449
7411
|
}
|
|
7450
7412
|
return normalized;
|
|
7451
7413
|
}
|
|
7452
|
-
async function resolveTrustStorePemFromEnvironment() {
|
|
7453
|
-
try {
|
|
7454
|
-
const provider = await TrustStoreProviderFactory.createTrustStoreProvider();
|
|
7455
|
-
const pem = await provider.getTrustStorePem();
|
|
7456
|
-
return normalizePemOrNull(pem);
|
|
7457
|
-
}
|
|
7458
|
-
catch (error) {
|
|
7459
|
-
const message = error instanceof Error ? error.message : String(error);
|
|
7460
|
-
logger$1.debug("trust_store_provider_resolution_failed", {
|
|
7461
|
-
error: message,
|
|
7462
|
-
});
|
|
7463
|
-
return null;
|
|
7464
|
-
}
|
|
7465
|
-
}
|
|
7466
7414
|
|
|
7467
7415
|
const FACTORY_META$4 = {
|
|
7468
7416
|
base: CERTIFICATE_MANAGER_FACTORY_BASE_TYPE,
|
|
@@ -7507,7 +7455,7 @@ function normalizeSigning(config, explicit) {
|
|
|
7507
7455
|
}
|
|
7508
7456
|
return null;
|
|
7509
7457
|
}
|
|
7510
|
-
function normalizeOptions(config, securitySettings, signing) {
|
|
7458
|
+
function normalizeOptions(config, securitySettings, signing, trustStorePem) {
|
|
7511
7459
|
const caServiceUrl = config.caServiceUrl ?? config.ca_service_url ?? null;
|
|
7512
7460
|
const cryptoProvider = config.cryptoProvider ?? config.crypto_provider ?? null;
|
|
7513
7461
|
return {
|
|
@@ -7515,6 +7463,7 @@ function normalizeOptions(config, securitySettings, signing) {
|
|
|
7515
7463
|
signing,
|
|
7516
7464
|
caServiceUrl,
|
|
7517
7465
|
cryptoProvider,
|
|
7466
|
+
trustStorePem,
|
|
7518
7467
|
};
|
|
7519
7468
|
}
|
|
7520
7469
|
class DefaultCertificateManagerFactory extends CertificateManagerFactory {
|
|
@@ -7524,11 +7473,13 @@ class DefaultCertificateManagerFactory extends CertificateManagerFactory {
|
|
|
7524
7473
|
this.isDefault = true;
|
|
7525
7474
|
this.priority = 100;
|
|
7526
7475
|
}
|
|
7527
|
-
async create(config, securitySettings, signing, ...
|
|
7476
|
+
async create(config, securitySettings, signing, ...factoryArgs) {
|
|
7528
7477
|
const normalizedConfig = normalizeConfig$1(config);
|
|
7529
7478
|
const resolvedSecuritySettings = normalizeSecuritySettings(normalizedConfig, securitySettings ?? null);
|
|
7530
7479
|
const resolvedSigning = normalizeSigning(normalizedConfig, signing ?? null);
|
|
7531
|
-
|
|
7480
|
+
// Extract trust store PEM resolver from factoryArgs if provided
|
|
7481
|
+
const trustStorePemResolver = factoryArgs[0];
|
|
7482
|
+
const options = normalizeOptions(normalizedConfig, resolvedSecuritySettings, resolvedSigning, trustStorePemResolver ?? null);
|
|
7532
7483
|
return new DefaultCertificateManager(options);
|
|
7533
7484
|
}
|
|
7534
7485
|
}
|
|
@@ -7540,6 +7491,45 @@ var defaultCertificateManagerFactory = /*#__PURE__*/Object.freeze({
|
|
|
7540
7491
|
default: DefaultCertificateManagerFactory
|
|
7541
7492
|
});
|
|
7542
7493
|
|
|
7494
|
+
const DEFAULT_UNCONFIGURED_MESSAGE = "Trust store is not configured. Set FAME_CA_CERTS to a PEM value, a file path, a data URI, or an HTTPS bundle URL.";
|
|
7495
|
+
const TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE = "TrustStoreProviderFactory";
|
|
7496
|
+
class TrustStoreProviderFactory extends AbstractResourceFactory {
|
|
7497
|
+
createUnconfiguredProvider(reason) {
|
|
7498
|
+
return new NullTrustStoreProvider(reason ?? DEFAULT_UNCONFIGURED_MESSAGE);
|
|
7499
|
+
}
|
|
7500
|
+
static async createTrustStoreProvider(config, options = {}) {
|
|
7501
|
+
const { dependencies, factoryArgs, ...restOptions } = options;
|
|
7502
|
+
const mergedFactoryArgs = [
|
|
7503
|
+
...(dependencies ? [dependencies] : []),
|
|
7504
|
+
...(factoryArgs ?? []),
|
|
7505
|
+
];
|
|
7506
|
+
const creationOptions = {
|
|
7507
|
+
...restOptions,
|
|
7508
|
+
factoryArgs: mergedFactoryArgs,
|
|
7509
|
+
};
|
|
7510
|
+
if (config) {
|
|
7511
|
+
const instance = await createResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, config, creationOptions);
|
|
7512
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7513
|
+
}
|
|
7514
|
+
const instance = await createDefaultResource(TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE, null, creationOptions);
|
|
7515
|
+
return instance ?? new NullTrustStoreProvider();
|
|
7516
|
+
}
|
|
7517
|
+
}
|
|
7518
|
+
class NullTrustStoreProvider {
|
|
7519
|
+
constructor(reason = DEFAULT_UNCONFIGURED_MESSAGE) {
|
|
7520
|
+
this.reason = reason;
|
|
7521
|
+
}
|
|
7522
|
+
async getTrustStorePem() {
|
|
7523
|
+
throw new Error(this.reason);
|
|
7524
|
+
}
|
|
7525
|
+
async getRoots() {
|
|
7526
|
+
return [];
|
|
7527
|
+
}
|
|
7528
|
+
async initialize() {
|
|
7529
|
+
// No-op for the placeholder provider.
|
|
7530
|
+
}
|
|
7531
|
+
}
|
|
7532
|
+
|
|
7543
7533
|
const PEM_HEADER = "-----BEGIN CERTIFICATE-----";
|
|
7544
7534
|
function normalizeLineEndings(value) {
|
|
7545
7535
|
return value.replace(/\r\n?/gu, "\n");
|
|
@@ -8616,12 +8606,12 @@ function isNodeEnvironment$2() {
|
|
|
8616
8606
|
}
|
|
8617
8607
|
|
|
8618
8608
|
const FACTORY_META$3 = {
|
|
8619
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8609
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
|
|
8620
8610
|
key: "EnvTrustStoreProvider",
|
|
8621
8611
|
isDefault: isNodeEnvironment$1(),
|
|
8622
8612
|
priority: isNodeEnvironment$1() ? 100 : 0,
|
|
8623
8613
|
};
|
|
8624
|
-
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8614
|
+
class EnvTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
|
|
8625
8615
|
constructor() {
|
|
8626
8616
|
super(...arguments);
|
|
8627
8617
|
this.type = "EnvTrustStoreProvider";
|
|
@@ -8681,12 +8671,12 @@ var nodeTrustStoreProviderFactory = /*#__PURE__*/Object.freeze({
|
|
|
8681
8671
|
});
|
|
8682
8672
|
|
|
8683
8673
|
const FACTORY_META$2 = {
|
|
8684
|
-
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE,
|
|
8674
|
+
base: TRUST_STORE_PROVIDER_FACTORY_BASE_TYPE$1,
|
|
8685
8675
|
key: "BrowserTrustStoreProvider",
|
|
8686
8676
|
isDefault: !isNodeEnvironment(),
|
|
8687
8677
|
priority: !isNodeEnvironment() ? 100 : 10,
|
|
8688
8678
|
};
|
|
8689
|
-
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory {
|
|
8679
|
+
class BrowserTrustStoreProviderFactory extends TrustStoreProviderFactory$1 {
|
|
8690
8680
|
constructor() {
|
|
8691
8681
|
super(...arguments);
|
|
8692
8682
|
this.type = "BrowserTrustStoreProvider";
|
|
@@ -17,7 +17,7 @@ export declare class DefaultCertificateManagerFactory extends CertificateManager
|
|
|
17
17
|
readonly type = "DefaultCertificateManager";
|
|
18
18
|
readonly isDefault = true;
|
|
19
19
|
readonly priority = 100;
|
|
20
|
-
create(config?: DefaultCertificateManagerConfig | Record<string, unknown> | null, securitySettings?: SecuritySettings | null, signing?: SigningConfig | null, ...
|
|
20
|
+
create(config?: DefaultCertificateManagerConfig | Record<string, unknown> | null, securitySettings?: SecuritySettings | null, signing?: SigningConfig | null, ...factoryArgs: unknown[]): Promise<CertificateManager>;
|
|
21
21
|
}
|
|
22
22
|
export default DefaultCertificateManagerFactory;
|
|
23
23
|
//# sourceMappingURL=default-certificate-manager-factory.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AACvD,OAAO,EAEL,yBAAyB,EAEzB,KAAK,wBAAwB,EAC7B,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACxB,MAAM,mBAAmB,CAAC;AAQ3B,MAAM,WAAW,+BACf,SAAQ,wBAAwB;IAChC,IAAI,EAAE,2BAA2B,CAAC;IAClC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,cAAc,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC/B,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC3C,iBAAiB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC5C,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAChC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAClC;AAED,eAAO,MAAM,YAAY;;;CAGf,CAAC;
|
|
1
|
+
{"version":3,"file":"default-certificate-manager-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AACvD,OAAO,EAEL,yBAAyB,EAEzB,KAAK,wBAAwB,EAC7B,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACxB,MAAM,mBAAmB,CAAC;AAQ3B,MAAM,WAAW,+BACf,SAAQ,wBAAwB;IAChC,IAAI,EAAE,2BAA2B,CAAC;IAClC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,cAAc,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC/B,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC3C,iBAAiB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IAC5C,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAChC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAClC;AAED,eAAO,MAAM,YAAY;;;CAGf,CAAC;AA+EX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,EAC1C,OAAO,CAAC,EAAE,aAAa,GAAG,IAAI,EAC9B,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;CAoB/B;AAED,eAAe,gCAAgC,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;
|
|
1
|
+
{"version":3,"file":"default-certificate-manager.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/cert/default-certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,gBAAgB,CAAC;AAEzE,OAAO,EAGL,kBAAkB,EAGlB,KAAK,oBAAoB,EACzB,KAAK,kBAAkB,EACvB,KAAK,QAAQ,EACb,KAAK,aAAa,EACnB,MAAM,mBAAmB,CAAC;AAc3B,MAAM,MAAM,qBAAqB,GAAG,YAAY,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAE5E,MAAM,WAAW,gCAAgC;IAC/C,QAAQ,CAAC,OAAO,CAAC,EACb,qBAAqB,GACrB,oBAAoB,GACpB,aAAa,GACb,IAAI,CAAC;IACT,QAAQ,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,GAAG,IAAI,CAAC;IACpD,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,QAAQ,CAAC,cAAc,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACzC,QAAQ,CAAC,eAAe,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IAC1C;;;OAGG;IACH,QAAQ,CAAC,mBAAmB,CAAC,EAAE,yBAAyB,GAAG,IAAI,CAAC;IAChE;;OAEG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,mBAAmB,GAAG,IAAI,CAAC;IACpD;;OAEG;IACH,QAAQ,CAAC,0BAA0B,CAAC,EAAE,0BAA0B,GAAG,IAAI,CAAC;CACzE;AAED,KAAK,mBAAmB,GAAG;IACzB,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI,CAAC;CAC7C,CAAC;AAEF,KAAK,YAAY,CAAC,CAAC,IAAI,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;AAEtC,KAAK,yBAAyB,GAC1B,mBAAmB,GACnB,CAAC,MAAM,YAAY,CAAC,mBAAmB,GAAG,IAAI,CAAC,CAAC,CAAC;AAErD,KAAK,mBAAmB,GAAG,MAAM,GAAG,CAAC,MAAM,YAAY,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC,CAAC;AAExE,KAAK,0BAA0B,GAAG,CAChC,QAAQ,EAAE,mBAAmB,EAC7B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;CAAE,KAC/B,YAAY,CAAC,IAAI,CAAC,CAAC;AA8CxB,qBAAa,yBAA0B,YAAW,kBAAkB;IAClE,SAAgB,QAAQ,QAAQ;IAEhC,OAAO,CAAC,OAAO,CAAwB;IACvC,OAAO,CAAC,gBAAgB,CAA0B;IAClD,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAgB;IAC7C,OAAO,CAAC,QAAQ,CAAC,sBAAsB,CAAiB;IACxD,OAAO,CAAC,QAAQ,CAAC,2BAA2B,CAAqC;IACjF,OAAO,CAAC,QAAQ,CAAC,qBAAqB,CAA+B;IACrE,OAAO,CAAC,QAAQ,CAAC,0BAA0B,CAAoC;IAC/E,OAAO,CAAC,IAAI,CAAyB;IACrC,OAAO,CAAC,mBAAmB,CAAiC;gBAEzC,OAAO,GAAE,gCAAqC;IAkB1D,UAAU,CACf,OAAO,EAAE,qBAAqB,GAAG,oBAAoB,GAAG,IAAI,GAC3D,IAAI;IAIA,mBAAmB,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,IAAI,GAAG,IAAI;IAI9D,aAAa,CAAC,IAAI,EAAE,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC;IAuC5C,SAAS,CAAC,YAAY,EAAE,gBAAgB,GAAG,OAAO,CAAC,IAAI,CAAC;IAoCxD,iBAAiB,CAC5B,YAAY,EAAE,gBAAgB,EAC9B,OAAO,CAAC,EAAE;QAAE,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;KAAE,GACzC,OAAO,CAAC,OAAO,CAAC;IA+HnB,OAAO,CAAC,oBAAoB;IAsB5B,OAAO,CAAC,sBAAsB;IAsB9B,OAAO,CAAC,yBAAyB;IAwBjC,OAAO,CAAC,qBAAqB;YAcf,kCAAkC;YAsBlC,6CAA6C;YAmC7C,sCAAsC;IAoBpD,OAAO,CAAC,cAAc;YAoCR,wBAAwB;YAsHxB,0BAA0B;YAkB1B,2BAA2B;YAqF3B,yBAAyB;YAuCzB,gCAAgC;YAoBhC,wBAAwB;YA8CxB,8BAA8B;CAmD7C;AAuQD,eAAe,yBAAyB,CAAC"}
|
package/dist/types/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.d.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import type
|
|
2
|
-
import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
|
|
1
|
+
import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
|
|
3
2
|
export interface BrowserTrustStoreProviderConfig extends TrustStoreProviderConfig {
|
|
4
3
|
readonly type: "BrowserTrustStoreProvider";
|
|
5
4
|
readonly url?: string | null;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"browser-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/browser-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAK3B,MAAM,WAAW,+BAAgC,SAAQ,wBAAwB;IAC/E,QAAQ,CAAC,IAAI,EAAE,2BAA2B,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC7B,QAAQ,CAAC,QAAQ,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IAC7C,QAAQ,CAAC,YAAY,CAAC,EAAE,SAAS,MAAM,EAAE,GAAG,IAAI,CAAC;IACjD,QAAQ,CAAC,SAAS,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;IACpC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAC3C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,GAAG,IAAI,CAAC;CAChD;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,gCAAiC,SAAQ,yBAAyB,CAAC,+BAA+B,CAAC;IAC9G,SAAgB,IAAI,+BAA+B;IACnD,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,WAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,+BAA+B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACzE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAuB9B,OAAO,CAAC,4BAA4B;IAwBpC,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,gCAAgC,CAAC"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { TrustStoreProvider } from "
|
|
1
|
+
import type { TrustStoreProvider } from "@naylence/runtime";
|
|
2
2
|
export interface CreateTrustStoreProviderOptions {
|
|
3
3
|
readonly env?: Record<string, unknown> | null;
|
|
4
4
|
readonly requirePinsInBrowser?: boolean;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"env-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/env-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAOV,kBAAkB,EACnB,MAAM,mBAAmB,CAAC;AAU3B,MAAM,WAAW,+BAA+B;IAC9C,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,wBAAsB,+BAA+B,CACnD,OAAO,GAAE,+BAAoC,GAC5C,OAAO,CAAC,kBAAkB,GAAG,IAAI,CAAC,CA6BpC"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "
|
|
1
|
+
import type { TrustAnchor, TrustStoreProvider, TrustBundlePins } from "@naylence/runtime";
|
|
2
2
|
export interface HttpBundleProviderOptions extends TrustBundlePins {
|
|
3
3
|
readonly url: string;
|
|
4
4
|
readonly cacheKey?: string;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"http-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/http-bundle-provider.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EACV,WAAW,EACX,kBAAkB,EAClB,eAAe,EAChB,MAAM,mBAAmB,CAAC;AAmB3B,MAAM,WAAW,yBAA0B,SAAQ,eAAe;IAChE,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;IACxC,QAAQ,CAAC,iBAAiB,CAAC,EAAE,OAAO,CAAC;CACtC;AA6CD,qBAAa,kBAAmB,YAAW,kBAAkB;IAC3D,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAM;IAC1B,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAS;IAC3C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAoB;IAC7C,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAoB;IACjD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAU;IACpC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAU;IAC7C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;IAClC,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAU;IAE5C,OAAO,CAAC,WAAW,CAAK;IACxB,OAAO,CAAC,IAAI,CAAuB;IACnC,OAAO,CAAC,aAAa,CAAuB;IAC5C,OAAO,CAAC,OAAO,CAAuB;IACtC,OAAO,CAAC,OAAO,CAA8B;IAC7C,OAAO,CAAC,QAAQ,CAAuC;IACvD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAyB;IACnD,OAAO,CAAC,WAAW,CAAS;IAC5B,OAAO,CAAC,QAAQ,CAAuB;gBAEpB,OAAO,EAAE,yBAAyB;IAiDxC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IA+B3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;IAiBzC,QAAQ,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,MAAM,IAAI;IAOpC,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IAqBxC,OAAO,CAAC,gBAAgB;YASV,WAAW;IAkFzB,OAAO,CAAC,eAAe;CAWxB"}
|
package/dist/types/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.d.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
import type
|
|
2
|
-
import { TrustStoreProviderFactory, type TrustStoreProviderConfig } from "./trust-store-provider-factory.js";
|
|
1
|
+
import { TrustStoreProviderFactory, type TrustStoreProvider, type TrustStoreProviderConfig } from "@naylence/runtime";
|
|
3
2
|
export interface EnvTrustStoreProviderConfig extends TrustStoreProviderConfig {
|
|
4
3
|
readonly type: "EnvTrustStoreProvider";
|
|
5
4
|
readonly env?: Record<string, unknown> | null;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,
|
|
1
|
+
{"version":3,"file":"node-trust-store-provider-factory.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/node-trust-store-provider-factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,yBAAyB,EACzB,KAAK,kBAAkB,EACvB,KAAK,wBAAwB,EAE9B,MAAM,mBAAmB,CAAC;AAG3B,MAAM,WAAW,2BAA4B,SAAQ,wBAAwB;IAC3E,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;IACvC,QAAQ,CAAC,GAAG,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC;IAC9C,QAAQ,CAAC,oBAAoB,CAAC,EAAE,OAAO,CAAC;CACzC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,qBAAa,4BAA6B,SAAQ,yBAAyB,CAAC,2BAA2B,CAAC;IACtG,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,UAA0B;IACnD,SAAgB,QAAQ,UAAyB;IAEpC,MAAM,CACjB,MAAM,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACrE,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,kBAAkB,CAAC;IAqB9B,OAAO,CAAC,eAAe;IAmBvB,OAAO,CAAC,mBAAmB;CAc5B;AAUD,eAAe,4BAA4B,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"static-bundle-provider.d.ts","sourceRoot":"","sources":["../../../../../../../src/naylence/fame/security/cert/trust-store/static-bundle-provider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAC;AASzE,MAAM,WAAW,2BAA2B;IAC1C,QAAQ,CAAC,KAAK,CAAC,EAAE,MAAM,CAAC;CACzB;AAED,qBAAa,oBAAqB,YAAW,kBAAkB;IAC7D,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAyB;IACjD,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAS;gBAEf,OAAO,EAAE,QAAQ,CAAC,WAAW,CAAC;IASpC,QAAQ,IAAI,OAAO,CAAC,SAAS,WAAW,EAAE,CAAC;IAI3C,gBAAgB,IAAI,OAAO,CAAC,MAAM,CAAC;CAMjD;AAED,wBAAsB,eAAe,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAQnE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,MAAM,GAAG,oBAAoB,CAEvE;AAED,wBAAgB,yBAAyB,CAAC,OAAO,EAAE,MAAM,GAAG,oBAAoB,CAM/E"}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { EnvelopeVerifier } from "@naylence/runtime";
|
|
2
2
|
import { EnvelopeVerifierFactory, type EnvelopeVerifierConfig, type KeyProvider } from "@naylence/runtime";
|
|
3
|
-
import { type
|
|
3
|
+
import { type SigningConfigInstance } from "./eddsa-envelope-verifier.js";
|
|
4
4
|
export interface EdDSAEnvelopeVerifierConfig extends EnvelopeVerifierConfig {
|
|
5
5
|
readonly type: "EdDSAEnvelopeVerifier";
|
|
6
6
|
}
|
|
@@ -15,7 +15,7 @@ export declare class AdvancedEdDSAEnvelopeVerifierFactory extends EnvelopeVerifi
|
|
|
15
15
|
readonly type = "EdDSAEnvelopeVerifier";
|
|
16
16
|
readonly isDefault = true;
|
|
17
17
|
readonly priority = 100;
|
|
18
|
-
create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null,
|
|
18
|
+
create(_config?: EdDSAEnvelopeVerifierConfig | Record<string, unknown> | null, keyProvider?: KeyProvider | null, signingConfig?: SigningConfig | null, ...factoryArgs: unknown[]): Promise<EnvelopeVerifier>;
|
|
19
19
|
}
|
|
20
20
|
export default AdvancedEdDSAEnvelopeVerifierFactory;
|
|
21
21
|
//# sourceMappingURL=eddsa-envelope-verifier-factory.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"eddsa-envelope-verifier-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/signing/eddsa-envelope-verifier-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EAEL,uBAAuB,
|
|
1
|
+
{"version":3,"file":"eddsa-envelope-verifier-factory.d.ts","sourceRoot":"","sources":["../../../../../../src/naylence/fame/security/signing/eddsa-envelope-verifier-factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EAEL,uBAAuB,EAGvB,KAAK,sBAAsB,EAC3B,KAAK,WAAW,EACjB,MAAM,mBAAmB,CAAC;AAE3B,OAAO,EAGL,KAAK,qBAAqB,EAC3B,MAAM,8BAA8B,CAAC;AAEtC,MAAM,WAAW,2BAA4B,SAAQ,sBAAsB;IACzE,QAAQ,CAAC,IAAI,EAAE,uBAAuB,CAAC;CACxC;AAED,eAAO,MAAM,YAAY;;;;;CAKf,CAAC;AAEX,KAAK,aAAa,GAAG,qBAAqB,CAAC;AAE3C,qBAAa,oCAAqC,SAAQ,uBAAuB,CAAC,2BAA2B,CAAC;IAC5G,SAAgB,IAAI,2BAA2B;IAC/C,SAAgB,SAAS,QAAQ;IACjC,SAAgB,QAAQ,OAAO;IAElB,MAAM,CACjB,OAAO,CAAC,EAAE,2BAA2B,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,EACtE,WAAW,CAAC,EAAE,WAAW,GAAG,IAAI,EAChC,aAAa,CAAC,EAAE,aAAa,GAAG,IAAI,EACpC,GAAG,WAAW,EAAE,OAAO,EAAE,GACxB,OAAO,CAAC,gBAAgB,CAAC;CAqB7B;AAED,eAAe,oCAAoC,CAAC"}
|
package/dist/types/version.d.ts
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@naylence/advanced-security",
|
|
3
|
-
"version": "0.3.7-test.
|
|
3
|
+
"version": "0.3.7-test.128",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"description": "Advanced security utilities for the Naylence Fame runtime implemented in TypeScript.",
|
|
6
6
|
"author": "Naylence Dev <naylencedev@gmail.com>",
|
|
@@ -142,7 +142,7 @@
|
|
|
142
142
|
"prepublishOnly": "npm run build && npm test"
|
|
143
143
|
},
|
|
144
144
|
"dependencies": {
|
|
145
|
-
"@naylence/runtime": "^0.3.5-test.
|
|
145
|
+
"@naylence/runtime": "^0.3.5-test.925",
|
|
146
146
|
"@noble/ciphers": "^2.0.1",
|
|
147
147
|
"@noble/curves": "^1.4.0",
|
|
148
148
|
"@noble/ed25519": "^2.1.0",
|