@sparkleideas/security 3.0.0-alpha.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +234 -0
- package/__tests__/acceptance/security-compliance.test.ts +674 -0
- package/__tests__/credential-generator.test.ts +310 -0
- package/__tests__/fixtures/configurations.ts +419 -0
- package/__tests__/fixtures/index.ts +21 -0
- package/__tests__/helpers/create-mock.ts +469 -0
- package/__tests__/helpers/index.ts +32 -0
- package/__tests__/input-validator.test.ts +381 -0
- package/__tests__/integration/security-flow.test.ts +606 -0
- package/__tests__/password-hasher.test.ts +239 -0
- package/__tests__/path-validator.test.ts +302 -0
- package/__tests__/safe-executor.test.ts +292 -0
- package/__tests__/token-generator.test.ts +371 -0
- package/__tests__/unit/credential-generator.test.ts +182 -0
- package/__tests__/unit/password-hasher.test.ts +359 -0
- package/__tests__/unit/path-validator.test.ts +509 -0
- package/__tests__/unit/safe-executor.test.ts +667 -0
- package/__tests__/unit/token-generator.test.ts +310 -0
- package/package.json +28 -0
- package/src/CVE-REMEDIATION.ts +251 -0
- package/src/application/index.ts +10 -0
- package/src/application/services/security-application-service.ts +193 -0
- package/src/credential-generator.ts +368 -0
- package/src/domain/entities/security-context.ts +173 -0
- package/src/domain/index.ts +17 -0
- package/src/domain/services/security-domain-service.ts +296 -0
- package/src/index.ts +271 -0
- package/src/input-validator.ts +466 -0
- package/src/password-hasher.ts +270 -0
- package/src/path-validator.ts +525 -0
- package/src/safe-executor.ts +525 -0
- package/src/token-generator.ts +463 -0
- package/tmp.json +0 -0
- package/tsconfig.json +9 -0
|
@@ -0,0 +1,193 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Security Application Service - Application Layer
|
|
3
|
+
*
|
|
4
|
+
* Orchestrates security operations and provides simplified interface.
|
|
5
|
+
*
|
|
6
|
+
* @module v3/security/application/services
|
|
7
|
+
*/
|
|
8
|
+
|
|
9
|
+
import { SecurityContext, PermissionLevel } from '../../domain/entities/security-context.js';
|
|
10
|
+
import { SecurityDomainService, ValidationResult, ThreatDetectionResult } from '../../domain/services/security-domain-service.js';
|
|
11
|
+
|
|
12
|
+
/**
|
|
13
|
+
* Security audit result
|
|
14
|
+
*/
|
|
15
|
+
export interface SecurityAuditResult {
|
|
16
|
+
passed: boolean;
|
|
17
|
+
score: number;
|
|
18
|
+
checks: Array<{
|
|
19
|
+
name: string;
|
|
20
|
+
passed: boolean;
|
|
21
|
+
severity: 'low' | 'medium' | 'high' | 'critical';
|
|
22
|
+
message: string;
|
|
23
|
+
}>;
|
|
24
|
+
recommendations: string[];
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
/**
|
|
28
|
+
* Security Application Service
|
|
29
|
+
*/
|
|
30
|
+
export class SecurityApplicationService {
|
|
31
|
+
private readonly domainService: SecurityDomainService;
|
|
32
|
+
private readonly contexts: Map<string, SecurityContext> = new Map();
|
|
33
|
+
|
|
34
|
+
constructor() {
|
|
35
|
+
this.domainService = new SecurityDomainService();
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
// ============================================================================
|
|
39
|
+
// Context Management
|
|
40
|
+
// ============================================================================
|
|
41
|
+
|
|
42
|
+
/**
|
|
43
|
+
* Create and register security context for agent
|
|
44
|
+
*/
|
|
45
|
+
createAgentContext(agentId: string, role: string): SecurityContext {
|
|
46
|
+
const context = this.domainService.createAgentContext(agentId, role);
|
|
47
|
+
this.contexts.set(agentId, context);
|
|
48
|
+
return context;
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
/**
|
|
52
|
+
* Get security context
|
|
53
|
+
*/
|
|
54
|
+
getContext(principalId: string): SecurityContext | undefined {
|
|
55
|
+
return this.contexts.get(principalId);
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
/**
|
|
59
|
+
* Remove security context
|
|
60
|
+
*/
|
|
61
|
+
removeContext(principalId: string): boolean {
|
|
62
|
+
return this.contexts.delete(principalId);
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
// ============================================================================
|
|
66
|
+
// Validation
|
|
67
|
+
// ============================================================================
|
|
68
|
+
|
|
69
|
+
/**
|
|
70
|
+
* Validate path access
|
|
71
|
+
*/
|
|
72
|
+
validatePath(path: string, principalId: string): ValidationResult {
|
|
73
|
+
const context = this.contexts.get(principalId);
|
|
74
|
+
if (!context) {
|
|
75
|
+
return {
|
|
76
|
+
valid: false,
|
|
77
|
+
errors: ['Security context not found'],
|
|
78
|
+
warnings: [],
|
|
79
|
+
};
|
|
80
|
+
}
|
|
81
|
+
|
|
82
|
+
return this.domainService.validatePath(path, context);
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
/**
|
|
86
|
+
* Validate command execution
|
|
87
|
+
*/
|
|
88
|
+
validateCommand(command: string, principalId: string): ValidationResult {
|
|
89
|
+
const context = this.contexts.get(principalId);
|
|
90
|
+
if (!context) {
|
|
91
|
+
return {
|
|
92
|
+
valid: false,
|
|
93
|
+
errors: ['Security context not found'],
|
|
94
|
+
warnings: [],
|
|
95
|
+
};
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
return this.domainService.validateCommand(command, context);
|
|
99
|
+
}
|
|
100
|
+
|
|
101
|
+
/**
|
|
102
|
+
* Validate user input
|
|
103
|
+
*/
|
|
104
|
+
validateInput(input: string): ValidationResult {
|
|
105
|
+
return this.domainService.validateInput(input);
|
|
106
|
+
}
|
|
107
|
+
|
|
108
|
+
/**
|
|
109
|
+
* Detect threats in content
|
|
110
|
+
*/
|
|
111
|
+
detectThreats(content: string): ThreatDetectionResult {
|
|
112
|
+
return this.domainService.detectThreats(content);
|
|
113
|
+
}
|
|
114
|
+
|
|
115
|
+
// ============================================================================
|
|
116
|
+
// Audit
|
|
117
|
+
// ============================================================================
|
|
118
|
+
|
|
119
|
+
/**
|
|
120
|
+
* Run security audit on codebase
|
|
121
|
+
*/
|
|
122
|
+
async auditCodebase(files: Array<{ path: string; content: string }>): Promise<SecurityAuditResult> {
|
|
123
|
+
const checks: SecurityAuditResult['checks'] = [];
|
|
124
|
+
const recommendations: string[] = [];
|
|
125
|
+
let criticalCount = 0;
|
|
126
|
+
let highCount = 0;
|
|
127
|
+
|
|
128
|
+
for (const file of files) {
|
|
129
|
+
const threats = this.domainService.detectThreats(file.content);
|
|
130
|
+
|
|
131
|
+
for (const threat of threats.threats) {
|
|
132
|
+
checks.push({
|
|
133
|
+
name: `${threat.type} in ${file.path}`,
|
|
134
|
+
passed: false,
|
|
135
|
+
severity: threat.severity,
|
|
136
|
+
message: threat.description,
|
|
137
|
+
});
|
|
138
|
+
|
|
139
|
+
if (threat.severity === 'critical') criticalCount++;
|
|
140
|
+
if (threat.severity === 'high') highCount++;
|
|
141
|
+
}
|
|
142
|
+
|
|
143
|
+
if (threats.safe) {
|
|
144
|
+
checks.push({
|
|
145
|
+
name: `Security check: ${file.path}`,
|
|
146
|
+
passed: true,
|
|
147
|
+
severity: 'low',
|
|
148
|
+
message: 'No threats detected',
|
|
149
|
+
});
|
|
150
|
+
}
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
// Generate recommendations
|
|
154
|
+
if (criticalCount > 0) {
|
|
155
|
+
recommendations.push('Address critical security issues immediately');
|
|
156
|
+
}
|
|
157
|
+
if (highCount > 0) {
|
|
158
|
+
recommendations.push('Review and fix high-severity findings');
|
|
159
|
+
}
|
|
160
|
+
recommendations.push('Run regular security scans');
|
|
161
|
+
recommendations.push('Keep dependencies updated');
|
|
162
|
+
|
|
163
|
+
// Calculate score
|
|
164
|
+
const totalChecks = checks.length;
|
|
165
|
+
const passedChecks = checks.filter((c) => c.passed).length;
|
|
166
|
+
const score = totalChecks > 0 ? Math.round((passedChecks / totalChecks) * 100) : 100;
|
|
167
|
+
|
|
168
|
+
return {
|
|
169
|
+
passed: criticalCount === 0 && highCount === 0,
|
|
170
|
+
score,
|
|
171
|
+
checks,
|
|
172
|
+
recommendations,
|
|
173
|
+
};
|
|
174
|
+
}
|
|
175
|
+
|
|
176
|
+
/**
|
|
177
|
+
* Check if operation is allowed
|
|
178
|
+
*/
|
|
179
|
+
isOperationAllowed(
|
|
180
|
+
principalId: string,
|
|
181
|
+
operation: 'path' | 'command',
|
|
182
|
+
target: string
|
|
183
|
+
): boolean {
|
|
184
|
+
const context = this.contexts.get(principalId);
|
|
185
|
+
if (!context || context.isExpired()) return false;
|
|
186
|
+
|
|
187
|
+
if (operation === 'path') {
|
|
188
|
+
return context.canAccessPath(target);
|
|
189
|
+
} else {
|
|
190
|
+
return context.canExecuteCommand(target);
|
|
191
|
+
}
|
|
192
|
+
}
|
|
193
|
+
}
|
|
@@ -0,0 +1,368 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Credential Generator - CVE-3 Remediation
|
|
3
|
+
*
|
|
4
|
+
* Fixes hardcoded default credentials by providing secure random
|
|
5
|
+
* credential generation for installation and runtime.
|
|
6
|
+
*
|
|
7
|
+
* Security Properties:
|
|
8
|
+
* - Uses crypto.randomBytes for cryptographically secure randomness
|
|
9
|
+
* - Configurable entropy levels
|
|
10
|
+
* - No hardcoded defaults stored in code
|
|
11
|
+
* - Secure credential storage recommendations
|
|
12
|
+
*
|
|
13
|
+
* @module v3/security/credential-generator
|
|
14
|
+
*/
|
|
15
|
+
|
|
16
|
+
import { randomBytes, randomUUID } from 'crypto';
|
|
17
|
+
|
|
18
|
+
export interface CredentialConfig {
|
|
19
|
+
/**
|
|
20
|
+
* Length of generated passwords.
|
|
21
|
+
* Default: 32 characters
|
|
22
|
+
*/
|
|
23
|
+
passwordLength?: number;
|
|
24
|
+
|
|
25
|
+
/**
|
|
26
|
+
* Length of generated API keys.
|
|
27
|
+
* Default: 48 characters
|
|
28
|
+
*/
|
|
29
|
+
apiKeyLength?: number;
|
|
30
|
+
|
|
31
|
+
/**
|
|
32
|
+
* Length of generated secrets (JWT, session, etc.).
|
|
33
|
+
* Default: 64 characters
|
|
34
|
+
*/
|
|
35
|
+
secretLength?: number;
|
|
36
|
+
|
|
37
|
+
/**
|
|
38
|
+
* Character set for password generation.
|
|
39
|
+
* Default: alphanumeric + special
|
|
40
|
+
*/
|
|
41
|
+
passwordCharset?: string;
|
|
42
|
+
|
|
43
|
+
/**
|
|
44
|
+
* Character set for API key generation.
|
|
45
|
+
* Default: alphanumeric only (URL-safe)
|
|
46
|
+
*/
|
|
47
|
+
apiKeyCharset?: string;
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
export interface GeneratedCredentials {
|
|
51
|
+
adminPassword: string;
|
|
52
|
+
servicePassword: string;
|
|
53
|
+
jwtSecret: string;
|
|
54
|
+
sessionSecret: string;
|
|
55
|
+
encryptionKey: string;
|
|
56
|
+
generatedAt: Date;
|
|
57
|
+
expiresAt?: Date;
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
export interface ApiKeyCredential {
|
|
61
|
+
key: string;
|
|
62
|
+
prefix: string;
|
|
63
|
+
keyId: string;
|
|
64
|
+
createdAt: Date;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
export class CredentialGeneratorError extends Error {
|
|
68
|
+
constructor(
|
|
69
|
+
message: string,
|
|
70
|
+
public readonly code: string,
|
|
71
|
+
) {
|
|
72
|
+
super(message);
|
|
73
|
+
this.name = 'CredentialGeneratorError';
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
|
|
77
|
+
/**
|
|
78
|
+
* Character sets for credential generation
|
|
79
|
+
*/
|
|
80
|
+
const CHARSETS = {
|
|
81
|
+
UPPERCASE: 'ABCDEFGHIJKLMNOPQRSTUVWXYZ',
|
|
82
|
+
LOWERCASE: 'abcdefghijklmnopqrstuvwxyz',
|
|
83
|
+
DIGITS: '0123456789',
|
|
84
|
+
SPECIAL: '!@#$%^&*()_+-=[]{}|;:,.<>?',
|
|
85
|
+
// URL-safe characters for API keys
|
|
86
|
+
URL_SAFE: 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_',
|
|
87
|
+
// Hex characters for secrets
|
|
88
|
+
HEX: '0123456789abcdef',
|
|
89
|
+
} as const;
|
|
90
|
+
|
|
91
|
+
/**
|
|
92
|
+
* Secure credential generator.
|
|
93
|
+
*
|
|
94
|
+
* This class provides cryptographically secure credential generation
|
|
95
|
+
* to replace hardcoded default credentials.
|
|
96
|
+
*
|
|
97
|
+
* @example
|
|
98
|
+
* ```typescript
|
|
99
|
+
* const generator = new CredentialGenerator();
|
|
100
|
+
* const credentials = generator.generateInstallationCredentials();
|
|
101
|
+
* // Store credentials securely (environment variables, secrets manager)
|
|
102
|
+
* ```
|
|
103
|
+
*/
|
|
104
|
+
export class CredentialGenerator {
|
|
105
|
+
private readonly config: Required<CredentialConfig>;
|
|
106
|
+
|
|
107
|
+
constructor(config: CredentialConfig = {}) {
|
|
108
|
+
this.config = {
|
|
109
|
+
passwordLength: config.passwordLength ?? 32,
|
|
110
|
+
apiKeyLength: config.apiKeyLength ?? 48,
|
|
111
|
+
secretLength: config.secretLength ?? 64,
|
|
112
|
+
passwordCharset: config.passwordCharset ??
|
|
113
|
+
CHARSETS.UPPERCASE + CHARSETS.LOWERCASE + CHARSETS.DIGITS + CHARSETS.SPECIAL,
|
|
114
|
+
apiKeyCharset: config.apiKeyCharset ?? CHARSETS.URL_SAFE,
|
|
115
|
+
};
|
|
116
|
+
|
|
117
|
+
this.validateConfig();
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
/**
|
|
121
|
+
* Validates configuration parameters.
|
|
122
|
+
*/
|
|
123
|
+
private validateConfig(): void {
|
|
124
|
+
if (this.config.passwordLength < 16) {
|
|
125
|
+
throw new CredentialGeneratorError(
|
|
126
|
+
'Password length must be at least 16 characters',
|
|
127
|
+
'INVALID_PASSWORD_LENGTH'
|
|
128
|
+
);
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
if (this.config.apiKeyLength < 32) {
|
|
132
|
+
throw new CredentialGeneratorError(
|
|
133
|
+
'API key length must be at least 32 characters',
|
|
134
|
+
'INVALID_API_KEY_LENGTH'
|
|
135
|
+
);
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
if (this.config.secretLength < 32) {
|
|
139
|
+
throw new CredentialGeneratorError(
|
|
140
|
+
'Secret length must be at least 32 characters',
|
|
141
|
+
'INVALID_SECRET_LENGTH'
|
|
142
|
+
);
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
/**
|
|
147
|
+
* Generates a cryptographically secure random string using rejection sampling
|
|
148
|
+
* to eliminate modulo bias.
|
|
149
|
+
*
|
|
150
|
+
* @param length - Length of the string to generate
|
|
151
|
+
* @param charset - Character set to use
|
|
152
|
+
* @returns Random string
|
|
153
|
+
*/
|
|
154
|
+
private generateSecureString(length: number, charset: string): string {
|
|
155
|
+
const charsetLength = charset.length;
|
|
156
|
+
const result = new Array(length);
|
|
157
|
+
|
|
158
|
+
// Calculate rejection threshold to eliminate modulo bias
|
|
159
|
+
// For a byte (0-255), we reject values >= (256 - (256 % charsetLength))
|
|
160
|
+
// This ensures uniform distribution over charset indices
|
|
161
|
+
const maxValidValue = 256 - (256 % charsetLength);
|
|
162
|
+
|
|
163
|
+
let i = 0;
|
|
164
|
+
while (i < length) {
|
|
165
|
+
// Generate more random bytes than needed to reduce iterations
|
|
166
|
+
const randomBuffer = randomBytes(Math.max(length - i, 16));
|
|
167
|
+
|
|
168
|
+
for (let j = 0; j < randomBuffer.length && i < length; j++) {
|
|
169
|
+
const randomValue = randomBuffer[j];
|
|
170
|
+
|
|
171
|
+
// Rejection sampling: only accept values below threshold
|
|
172
|
+
if (randomValue < maxValidValue) {
|
|
173
|
+
result[i] = charset[randomValue % charsetLength];
|
|
174
|
+
i++;
|
|
175
|
+
}
|
|
176
|
+
// Values >= maxValidValue are rejected to avoid bias
|
|
177
|
+
}
|
|
178
|
+
}
|
|
179
|
+
|
|
180
|
+
return result.join('');
|
|
181
|
+
}
|
|
182
|
+
|
|
183
|
+
/**
|
|
184
|
+
* Generates a secure random password.
|
|
185
|
+
*
|
|
186
|
+
* @param length - Optional custom length (default from config)
|
|
187
|
+
* @returns Secure random password
|
|
188
|
+
*/
|
|
189
|
+
generatePassword(length?: number): string {
|
|
190
|
+
const len = length ?? this.config.passwordLength;
|
|
191
|
+
|
|
192
|
+
// Ensure password contains at least one of each required character type
|
|
193
|
+
const password = this.generateSecureString(len, this.config.passwordCharset);
|
|
194
|
+
|
|
195
|
+
// Validate the generated password meets requirements
|
|
196
|
+
if (!this.hasRequiredCharacterTypes(password)) {
|
|
197
|
+
// Regenerate if requirements not met (rare case)
|
|
198
|
+
return this.generatePassword(length);
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
return password;
|
|
202
|
+
}
|
|
203
|
+
|
|
204
|
+
/**
|
|
205
|
+
* Checks if password has required character types.
|
|
206
|
+
*/
|
|
207
|
+
private hasRequiredCharacterTypes(password: string): boolean {
|
|
208
|
+
const hasUppercase = /[A-Z]/.test(password);
|
|
209
|
+
const hasLowercase = /[a-z]/.test(password);
|
|
210
|
+
const hasDigit = /\d/.test(password);
|
|
211
|
+
const hasSpecial = /[!@#$%^&*()_+\-=\[\]{}|;:,.<>?]/.test(password);
|
|
212
|
+
|
|
213
|
+
return hasUppercase && hasLowercase && hasDigit && hasSpecial;
|
|
214
|
+
}
|
|
215
|
+
|
|
216
|
+
/**
|
|
217
|
+
* Generates a secure API key.
|
|
218
|
+
*
|
|
219
|
+
* @param prefix - Optional prefix for the key (e.g., 'cf_')
|
|
220
|
+
* @returns API key credential with metadata
|
|
221
|
+
*/
|
|
222
|
+
generateApiKey(prefix = 'cf_'): ApiKeyCredential {
|
|
223
|
+
const keyBody = this.generateSecureString(
|
|
224
|
+
this.config.apiKeyLength - prefix.length,
|
|
225
|
+
this.config.apiKeyCharset
|
|
226
|
+
);
|
|
227
|
+
|
|
228
|
+
const key = `${prefix}${keyBody}`;
|
|
229
|
+
const keyId = randomUUID();
|
|
230
|
+
|
|
231
|
+
return {
|
|
232
|
+
key,
|
|
233
|
+
prefix,
|
|
234
|
+
keyId,
|
|
235
|
+
createdAt: new Date(),
|
|
236
|
+
};
|
|
237
|
+
}
|
|
238
|
+
|
|
239
|
+
/**
|
|
240
|
+
* Generates a secure secret for JWT, sessions, etc.
|
|
241
|
+
*
|
|
242
|
+
* @param length - Optional custom length (default from config)
|
|
243
|
+
* @returns Hex-encoded secret
|
|
244
|
+
*/
|
|
245
|
+
generateSecret(length?: number): string {
|
|
246
|
+
const len = length ?? this.config.secretLength;
|
|
247
|
+
// Generate raw bytes and encode as hex for consistent storage
|
|
248
|
+
return randomBytes(Math.ceil(len / 2)).toString('hex').slice(0, len);
|
|
249
|
+
}
|
|
250
|
+
|
|
251
|
+
/**
|
|
252
|
+
* Generates an encryption key suitable for AES-256.
|
|
253
|
+
*
|
|
254
|
+
* @returns 32-byte key encoded as hex (64 characters)
|
|
255
|
+
*/
|
|
256
|
+
generateEncryptionKey(): string {
|
|
257
|
+
return randomBytes(32).toString('hex');
|
|
258
|
+
}
|
|
259
|
+
|
|
260
|
+
/**
|
|
261
|
+
* Generates a complete set of installation credentials.
|
|
262
|
+
*
|
|
263
|
+
* These should be stored securely (environment variables,
|
|
264
|
+
* secrets manager, etc.) and NEVER committed to version control.
|
|
265
|
+
*
|
|
266
|
+
* @param expirationDays - Optional expiration period in days
|
|
267
|
+
* @returns Complete credential set
|
|
268
|
+
*/
|
|
269
|
+
generateInstallationCredentials(expirationDays?: number): GeneratedCredentials {
|
|
270
|
+
const now = new Date();
|
|
271
|
+
const expiresAt = expirationDays
|
|
272
|
+
? new Date(now.getTime() + expirationDays * 24 * 60 * 60 * 1000)
|
|
273
|
+
: undefined;
|
|
274
|
+
|
|
275
|
+
return {
|
|
276
|
+
adminPassword: this.generatePassword(),
|
|
277
|
+
servicePassword: this.generatePassword(),
|
|
278
|
+
jwtSecret: this.generateSecret(64),
|
|
279
|
+
sessionSecret: this.generateSecret(64),
|
|
280
|
+
encryptionKey: this.generateEncryptionKey(),
|
|
281
|
+
generatedAt: now,
|
|
282
|
+
expiresAt,
|
|
283
|
+
};
|
|
284
|
+
}
|
|
285
|
+
|
|
286
|
+
/**
|
|
287
|
+
* Generates a secure session token.
|
|
288
|
+
*
|
|
289
|
+
* @returns URL-safe session token
|
|
290
|
+
*/
|
|
291
|
+
generateSessionToken(): string {
|
|
292
|
+
return this.generateSecureString(64, CHARSETS.URL_SAFE);
|
|
293
|
+
}
|
|
294
|
+
|
|
295
|
+
/**
|
|
296
|
+
* Generates a secure CSRF token.
|
|
297
|
+
*
|
|
298
|
+
* @returns CSRF token
|
|
299
|
+
*/
|
|
300
|
+
generateCsrfToken(): string {
|
|
301
|
+
return randomBytes(32).toString('base64url');
|
|
302
|
+
}
|
|
303
|
+
|
|
304
|
+
/**
|
|
305
|
+
* Generates a secure nonce for one-time use.
|
|
306
|
+
*
|
|
307
|
+
* @returns Unique nonce value
|
|
308
|
+
*/
|
|
309
|
+
generateNonce(): string {
|
|
310
|
+
return randomBytes(16).toString('hex');
|
|
311
|
+
}
|
|
312
|
+
|
|
313
|
+
/**
|
|
314
|
+
* Creates a setup script output for secure credential deployment.
|
|
315
|
+
*
|
|
316
|
+
* @param credentials - Generated credentials
|
|
317
|
+
* @returns Environment variable export script
|
|
318
|
+
*/
|
|
319
|
+
createEnvScript(credentials: GeneratedCredentials): string {
|
|
320
|
+
return `# Claude Flow V3 - Generated Credentials
|
|
321
|
+
# Generated: ${credentials.generatedAt.toISOString()}
|
|
322
|
+
# IMPORTANT: Store these securely and delete this file after use
|
|
323
|
+
|
|
324
|
+
export CLAUDE_FLOW_ADMIN_PASSWORD="${credentials.adminPassword}"
|
|
325
|
+
export CLAUDE_FLOW_SERVICE_PASSWORD="${credentials.servicePassword}"
|
|
326
|
+
export CLAUDE_FLOW_JWT_SECRET="${credentials.jwtSecret}"
|
|
327
|
+
export CLAUDE_FLOW_SESSION_SECRET="${credentials.sessionSecret}"
|
|
328
|
+
export CLAUDE_FLOW_ENCRYPTION_KEY="${credentials.encryptionKey}"
|
|
329
|
+
`;
|
|
330
|
+
}
|
|
331
|
+
|
|
332
|
+
/**
|
|
333
|
+
* Creates a JSON configuration output for secure credential deployment.
|
|
334
|
+
*
|
|
335
|
+
* @param credentials - Generated credentials
|
|
336
|
+
* @returns JSON configuration (for secrets manager import)
|
|
337
|
+
*/
|
|
338
|
+
createJsonConfig(credentials: GeneratedCredentials): string {
|
|
339
|
+
return JSON.stringify({
|
|
340
|
+
'claude-flow/admin-password': credentials.adminPassword,
|
|
341
|
+
'claude-flow/service-password': credentials.servicePassword,
|
|
342
|
+
'claude-flow/jwt-secret': credentials.jwtSecret,
|
|
343
|
+
'claude-flow/session-secret': credentials.sessionSecret,
|
|
344
|
+
'claude-flow/encryption-key': credentials.encryptionKey,
|
|
345
|
+
'claude-flow/generated-at': credentials.generatedAt.toISOString(),
|
|
346
|
+
'claude-flow/expires-at': credentials.expiresAt?.toISOString() ?? null,
|
|
347
|
+
}, null, 2);
|
|
348
|
+
}
|
|
349
|
+
}
|
|
350
|
+
|
|
351
|
+
/**
|
|
352
|
+
* Factory function to create a production credential generator.
|
|
353
|
+
*
|
|
354
|
+
* @returns Configured CredentialGenerator instance
|
|
355
|
+
*/
|
|
356
|
+
export function createCredentialGenerator(): CredentialGenerator {
|
|
357
|
+
return new CredentialGenerator();
|
|
358
|
+
}
|
|
359
|
+
|
|
360
|
+
/**
|
|
361
|
+
* Quick credential generation for CLI usage.
|
|
362
|
+
*
|
|
363
|
+
* @returns Generated installation credentials
|
|
364
|
+
*/
|
|
365
|
+
export function generateCredentials(): GeneratedCredentials {
|
|
366
|
+
const generator = new CredentialGenerator();
|
|
367
|
+
return generator.generateInstallationCredentials();
|
|
368
|
+
}
|