@super-protocol/pki-sync-client 2.0.10 → 2.0.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +13 -6
- package/dist/cli.js +8 -7
- package/dist/sync-client.d.ts +4 -2
- package/dist/sync-client.js +24 -16
- package/package.json +3 -3
package/README.md
CHANGED
|
@@ -88,16 +88,23 @@ pki-sync-client sync [options]
|
|
|
88
88
|
| `--config` | `-c` | string | *required* | Path to secrets configuration file (YAML) |
|
|
89
89
|
| `--swarm-env` | | string | `/sp/swarm/swarm-env.yaml` | Path to swarm environment config (YAML) |
|
|
90
90
|
| `--own-challenge` | | string | `auto` | Authentication challenge type: `auto`, `tdx`, `sev`, or `untrusted` |
|
|
91
|
-
| `--
|
|
91
|
+
| `--log-level` | `-l` | string | | Log level: `fatal`, `error`, `warn`, `info`, `debug`, `trace` |
|
|
92
92
|
| `--disable-server-identity-check` | | boolean | `false` | Disable server identity verification (not recommended) |
|
|
93
93
|
| `--save-certs-to-dir` | | string | | Directory to save client certificates (`key.pem`, `ca.pem`, `cert.pem`) |
|
|
94
94
|
| `--save-certs-prefix` | | string | | Prefix for certificate filenames (e.g., `client` → `client_key.pem`) |
|
|
95
95
|
|
|
96
|
+
By default, if `--log-level` is not provided, `SyncClient` runs with logging disabled.
|
|
97
|
+
|
|
96
98
|
### Examples
|
|
97
99
|
|
|
98
|
-
**Simple sync
|
|
100
|
+
**Simple sync (no logs):**
|
|
101
|
+
```bash
|
|
102
|
+
pki-sync-client sync -c secrets.yaml
|
|
103
|
+
```
|
|
104
|
+
|
|
105
|
+
**Simple sync with explicit log level:**
|
|
99
106
|
```bash
|
|
100
|
-
pki-sync-client sync -c secrets.yaml -
|
|
107
|
+
pki-sync-client sync -c secrets.yaml --log-level info
|
|
101
108
|
```
|
|
102
109
|
|
|
103
110
|
**Sync with custom swarm environment:**
|
|
@@ -146,7 +153,7 @@ async function syncSecrets() {
|
|
|
146
153
|
networkID: swarmEnv['pki-authority'].networkID,
|
|
147
154
|
caBundle: swarmEnv['pki-authority'].caBundle,
|
|
148
155
|
ownChallenge: 'auto',
|
|
149
|
-
|
|
156
|
+
logLevel: 'info',
|
|
150
157
|
});
|
|
151
158
|
|
|
152
159
|
// Perform sync
|
|
@@ -167,7 +174,7 @@ const client = new SyncClient({
|
|
|
167
174
|
networkID: 'my-network',
|
|
168
175
|
caBundle: fs.readFileSync('./ca-bundle.pem', 'utf-8'),
|
|
169
176
|
ownChallenge: 'tdx',
|
|
170
|
-
|
|
177
|
+
logLevel: 'debug',
|
|
171
178
|
disableServerIdentityCheck: false,
|
|
172
179
|
saveCertsToDir: '/etc/app/certs',
|
|
173
180
|
saveCertsPrefix: 'myapp',
|
|
@@ -195,7 +202,7 @@ interface SyncClientOptions {
|
|
|
195
202
|
networkID: string; // Network identifier
|
|
196
203
|
caBundle: string; // PEM-encoded CA certificate bundle
|
|
197
204
|
ownChallenge: string; // Challenge type: 'auto', 'tdx', 'sev', 'untrusted'
|
|
198
|
-
|
|
205
|
+
logLevel?: LogLevel; // Log level: fatal | error | warn | info | debug | trace; if omitted logs are disabled
|
|
199
206
|
disableServerIdentityCheck?: boolean; // Disable server verification (default: false)
|
|
200
207
|
saveCertsToDir?: string; // Directory to save certificates
|
|
201
208
|
saveCertsPrefix?: string; // Prefix for certificate filenames
|
package/dist/cli.js
CHANGED
|
@@ -8,6 +8,7 @@ const yargs_1 = __importDefault(require("yargs"));
|
|
|
8
8
|
const helpers_1 = require("yargs/helpers");
|
|
9
9
|
const config_1 = require("./config");
|
|
10
10
|
const sync_client_1 = require("./sync-client");
|
|
11
|
+
const pki_common_1 = require("@super-protocol/pki-common");
|
|
11
12
|
const DEFAULT_SWARM_ENV_PATH = '/sp/swarm/swarm-env.yaml';
|
|
12
13
|
async function sync(argv) {
|
|
13
14
|
try {
|
|
@@ -18,7 +19,7 @@ async function sync(argv) {
|
|
|
18
19
|
networkID: swarmEnv['pki-authority'].networkID,
|
|
19
20
|
caBundle: swarmEnv['pki-authority'].caBundle,
|
|
20
21
|
ownChallenge: argv.ownChallenge,
|
|
21
|
-
|
|
22
|
+
logLevel: argv.logLevel,
|
|
22
23
|
disableServerIdentityCheck: argv.disableServerIdentityCheck,
|
|
23
24
|
saveCertsToDir: argv.saveCertsToDir,
|
|
24
25
|
saveCertsPrefix: argv.saveCertsPrefix,
|
|
@@ -52,11 +53,11 @@ async function main() {
|
|
|
52
53
|
type: 'string',
|
|
53
54
|
default: 'auto',
|
|
54
55
|
})
|
|
55
|
-
.option('
|
|
56
|
-
alias: '
|
|
57
|
-
describe: '
|
|
58
|
-
|
|
59
|
-
|
|
56
|
+
.option('log-level', {
|
|
57
|
+
alias: 'l',
|
|
58
|
+
describe: 'Log level: fatal, error, warn, info, debug, trace',
|
|
59
|
+
choices: Object.values(pki_common_1.LogLevel),
|
|
60
|
+
type: 'string',
|
|
60
61
|
})
|
|
61
62
|
.option('disable-server-identity-check', {
|
|
62
63
|
describe: 'Disable server identity verification',
|
|
@@ -83,4 +84,4 @@ main().catch((error) => {
|
|
|
83
84
|
console.error('Error:', error.message);
|
|
84
85
|
process.exit(1);
|
|
85
86
|
});
|
|
86
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
87
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2xpLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vc3JjL2NsaS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7QUFDQSxrREFBMEI7QUFDMUIsMkNBQXdDO0FBQ3hDLHFDQUFzRDtBQUN0RCwrQ0FBMkM7QUFDM0MsMkRBQXNEO0FBRXRELE1BQU0sc0JBQXNCLEdBQUcsMEJBQTBCLENBQUM7QUFFMUQsS0FBSyxVQUFVLElBQUksQ0FBQyxJQUFTO0lBQ3pCLElBQUksQ0FBQztRQUNELE1BQU0sTUFBTSxHQUFHLElBQUEsb0JBQVcsRUFBQyxJQUFJLENBQUMsTUFBTSxDQUFDLENBQUM7UUFDeEMsTUFBTSxRQUFRLEdBQUcsSUFBQSxzQkFBYSxFQUFDLElBQUksQ0FBQyxRQUFRLENBQUMsQ0FBQztRQUU5QyxNQUFNLE1BQU0sR0FBRyxJQUFJLHdCQUFVLENBQUM7WUFDMUIsT0FBTyxFQUFFLFFBQVEsQ0FBQyxlQUFlLENBQUMsQ0FBQyxPQUFPO1lBQzFDLFNBQVMsRUFBRSxRQUFRLENBQUMsZUFBZSxDQUFDLENBQUMsU0FBUztZQUM5QyxRQUFRLEVBQUUsUUFBUSxDQUFDLGVBQWUsQ0FBQyxDQUFDLFFBQVE7WUFDNUMsWUFBWSxFQUFFLElBQUksQ0FBQyxZQUFZO1lBQy9CLFFBQVEsRUFBRSxJQUFJLENBQUMsUUFBUTtZQUN2QiwwQkFBMEIsRUFBRSxJQUFJLENBQUMsMEJBQTBCO1lBQzNELGNBQWMsRUFBRSxJQUFJLENBQUMsY0FBYztZQUNuQyxlQUFlLEVBQUUsSUFBSSxDQUFDLGVBQWU7U0FDeEMsQ0FBQyxDQUFDO1FBRUgsTUFBTSxNQUFNLENBQUMsSUFBSSxDQUFDLE1BQU0sQ0FBQyxDQUFDO1FBRTFCLE9BQU8sQ0FBQyxHQUFHLENBQUMsNkJBQTZCLENBQUMsQ0FBQztJQUMvQyxDQUFDO0lBQUMsT0FBTyxLQUFVLEVBQUUsQ0FBQztRQUNsQixPQUFPLENBQUMsS0FBSyxDQUFDLGNBQWMsRUFBRSxLQUFLLENBQUMsT0FBTyxDQUFDLENBQUM7UUFDN0MsT0FBTyxDQUFDLElBQUksQ0FBQyxDQUFDLENBQUMsQ0FBQztJQUNwQixDQUFDO0FBQ0wsQ0FBQztBQUVELEtBQUssVUFBVSxJQUFJO0lBQ2YsTUFBTSxJQUFBLGVBQUssRUFBQyxJQUFBLGlCQUFPLEVBQUMsT0FBTyxDQUFDLElBQUksQ0FBQyxDQUFDO1NBQzdCLEtBQUssQ0FBQywwQkFBMEIsQ0FBQztTQUNqQyxPQUFPLENBQ0osTUFBTSxFQUNOLDhCQUE4QixFQUM5QixDQUFDLEtBQUssRUFBRSxFQUFFO1FBQ04sT0FBTyxLQUFLO2FBQ1AsTUFBTSxDQUFDLFdBQVcsRUFBRTtZQUNqQixRQUFRLEVBQUUseUNBQXlDO1lBQ25ELElBQUksRUFBRSxRQUFRO1lBQ2QsT0FBTyxFQUFFLHNCQUFzQjtTQUNsQyxDQUFDO2FBQ0QsTUFBTSxDQUFDLFFBQVEsRUFBRTtZQUNkLEtBQUssRUFBRSxHQUFHO1lBQ1YsUUFBUSxFQUFFLG9DQUFvQztZQUM5QyxJQUFJLEVBQUUsUUFBUTtZQUNkLFlBQVksRUFBRSxJQUFJO1NBQ3JCLENBQUM7YUFDRCxNQUFNLENBQUMsZUFBZSxFQUFFO1lBQ3JCLFFBQVEsRUFDSixxRUFBcUU7WUFDekUsSUFBSSxFQUFFLFFBQVE7WUFDZCxPQUFPLEVBQUUsTUFBTTtTQUNsQixDQUFDO2FBQ0QsTUFBTSxDQUFDLFdBQVcsRUFBRTtZQUNqQixLQUFLLEVBQUUsR0FBRztZQUNWLFFBQVEsRUFDSixtREFBbUQ7WUFDdkQsT0FBTyxFQUFFLE1BQU0sQ0FBQyxNQUFNLENBQUMscUJBQVEsQ0FBQztZQUNoQyxJQUFJLEVBQUUsUUFBUTtTQUNqQixDQUFDO2FBQ0QsTUFBTSxDQUFDLCtCQUErQixFQUFFO1lBQ3JDLFFBQVEsRUFBRSxzQ0FBc0M7WUFDaEQsSUFBSSxFQUFFLFNBQVM7WUFDZixPQUFPLEVBQUUsS0FBSztTQUNqQixDQUFDO2FBQ0QsTUFBTSxDQUFDLG1CQUFtQixFQUFFO1lBQ3pCLFFBQVEsRUFDSixtRUFBbUU7WUFDdkUsSUFBSSxFQUFFLFFBQVE7U0FDakIsQ0FBQzthQUNELE1BQU0sQ0FBQyxtQkFBbUIsRUFBRTtZQUN6QixRQUFRLEVBQ0oscUVBQXFFO1lBQ3pFLElBQUksRUFBRSxRQUFRO1NBQ2pCLENBQUMsQ0FBQztJQUNYLENBQUMsRUFDRCxJQUFJLENBQ1A7U0FDQSxhQUFhLENBQUMsQ0FBQyxFQUFFLDRCQUE0QixDQUFDO1NBQzlDLElBQUksRUFBRTtTQUNOLEtBQUssQ0FBQyxNQUFNLEVBQUUsR0FBRyxDQUFDO1NBQ2xCLE9BQU8sRUFBRTtTQUNULEtBQUssQ0FBQyxTQUFTLEVBQUUsR0FBRyxDQUFDO1NBQ3JCLEtBQUssRUFBRSxDQUFDO0FBQ2pCLENBQUM7QUFFRCxJQUFJLEVBQUUsQ0FBQyxLQUFLLENBQUMsQ0FBQyxLQUFLLEVBQUUsRUFBRTtJQUNuQixPQUFPLENBQUMsS0FBSyxDQUFDLFFBQVEsRUFBRSxLQUFLLENBQUMsT0FBTyxDQUFDLENBQUM7SUFDdkMsT0FBTyxDQUFDLElBQUksQ0FBQyxDQUFDLENBQUMsQ0FBQztBQUNwQixDQUFDLENBQUMsQ0FBQyJ9
|
package/dist/sync-client.d.ts
CHANGED
|
@@ -1,10 +1,11 @@
|
|
|
1
1
|
import { SyncConfig } from './config';
|
|
2
|
+
import { LogLevel } from '@super-protocol/pki-common';
|
|
2
3
|
export interface SyncClientOptions {
|
|
3
4
|
servers: string[];
|
|
4
5
|
networkID: string;
|
|
5
6
|
caBundle: string;
|
|
6
7
|
ownChallenge: string;
|
|
7
|
-
|
|
8
|
+
logLevel?: LogLevel;
|
|
8
9
|
disableServerIdentityCheck?: boolean;
|
|
9
10
|
saveCertsToDir?: string;
|
|
10
11
|
saveCertsPrefix?: string;
|
|
@@ -12,9 +13,10 @@ export interface SyncClientOptions {
|
|
|
12
13
|
export declare class SyncClient {
|
|
13
14
|
private options;
|
|
14
15
|
private challenge;
|
|
16
|
+
private logger?;
|
|
17
|
+
private static resolveLogger;
|
|
15
18
|
private static detectCpuType;
|
|
16
19
|
constructor(options: SyncClientOptions);
|
|
17
|
-
private log;
|
|
18
20
|
private saveCertificates;
|
|
19
21
|
sync(config: SyncConfig): Promise<void>;
|
|
20
22
|
}
|
package/dist/sync-client.js
CHANGED
|
@@ -35,6 +35,17 @@ const path = __importStar(require("path"));
|
|
|
35
35
|
class SyncClient {
|
|
36
36
|
options;
|
|
37
37
|
challenge;
|
|
38
|
+
logger;
|
|
39
|
+
static resolveLogger(options) {
|
|
40
|
+
if (options.logLevel == null) {
|
|
41
|
+
return undefined;
|
|
42
|
+
}
|
|
43
|
+
const allowedLevels = Object.values(pki_common_1.LogLevel);
|
|
44
|
+
if (!allowedLevels.includes(options.logLevel)) {
|
|
45
|
+
throw new Error(`Unsupported log level: ${options.logLevel}. Supported: ${allowedLevels.join(', ')}`);
|
|
46
|
+
}
|
|
47
|
+
return new pki_common_1.CommonPinoLog(options.logLevel);
|
|
48
|
+
}
|
|
38
49
|
static detectCpuType() {
|
|
39
50
|
try {
|
|
40
51
|
const tdxPath = '/dev/tdx_guest';
|
|
@@ -59,6 +70,7 @@ class SyncClient {
|
|
|
59
70
|
}
|
|
60
71
|
constructor(options) {
|
|
61
72
|
this.options = options;
|
|
73
|
+
this.logger = SyncClient.resolveLogger(options);
|
|
62
74
|
const challengeType = options.ownChallenge === 'auto'
|
|
63
75
|
? SyncClient.detectCpuType()
|
|
64
76
|
: options.ownChallenge;
|
|
@@ -78,11 +90,6 @@ class SyncClient {
|
|
|
78
90
|
throw new Error(`Unsupported challenge type: ${challengeType}. Supported: tdx, sev, untrusted, auto`);
|
|
79
91
|
}
|
|
80
92
|
}
|
|
81
|
-
log(message) {
|
|
82
|
-
if (this.options.verbose ?? false) {
|
|
83
|
-
console.log(message);
|
|
84
|
-
}
|
|
85
|
-
}
|
|
86
93
|
async saveCertificates(pkiClientFactory, certsDir, prefix) {
|
|
87
94
|
// Ensure directory exists
|
|
88
95
|
await fs.promises.mkdir(certsDir, { recursive: true });
|
|
@@ -94,23 +101,23 @@ class SyncClient {
|
|
|
94
101
|
await fs.promises.writeFile(keyPath, cert.keyPair.privateKeyPem, {
|
|
95
102
|
mode: 0o600,
|
|
96
103
|
});
|
|
97
|
-
this.
|
|
104
|
+
this.logger?.info(`Saved private key to ${keyPath}`);
|
|
98
105
|
// Save CA certificate
|
|
99
106
|
const caPath = path.join(certsDir, `${prefixStr}ca.pem`);
|
|
100
107
|
await fs.promises.writeFile(caPath, ca, { mode: 0o644 });
|
|
101
|
-
this.
|
|
108
|
+
this.logger?.info(`Saved CA certificate to ${caPath}`);
|
|
102
109
|
// Save client certificate with intermediate chain
|
|
103
110
|
const certWithIntermediate = clientCert + intermediateCertificates;
|
|
104
111
|
const certPath = path.join(certsDir, `${prefixStr}cert.pem`);
|
|
105
112
|
await fs.promises.writeFile(certPath, certWithIntermediate, {
|
|
106
113
|
mode: 0o644,
|
|
107
114
|
});
|
|
108
|
-
this.
|
|
115
|
+
this.logger?.info(`Saved certificate chain to ${certPath}`);
|
|
109
116
|
}
|
|
110
117
|
async sync(config) {
|
|
111
118
|
for (const server of this.options.servers) {
|
|
112
119
|
try {
|
|
113
|
-
this.
|
|
120
|
+
this.logger?.info(`Trying server: ${server}`);
|
|
114
121
|
const pkiConfig = {
|
|
115
122
|
clientCertProvider: {
|
|
116
123
|
type: 'pki-ca',
|
|
@@ -121,7 +128,7 @@ class SyncClient {
|
|
|
121
128
|
},
|
|
122
129
|
networkID: this.options.networkID,
|
|
123
130
|
};
|
|
124
|
-
const pkiClientFactory = new pki_client_1.PkiClientFactory(pkiConfig,
|
|
131
|
+
const pkiClientFactory = new pki_client_1.PkiClientFactory(pkiConfig, this.logger);
|
|
125
132
|
const httpsAgent = await pkiClientFactory.getHTTPSAgent();
|
|
126
133
|
// Collect all secret names
|
|
127
134
|
const secretNames = config.secrets.map((s) => s.secretName);
|
|
@@ -134,24 +141,25 @@ class SyncClient {
|
|
|
134
141
|
if (base64Content == null) {
|
|
135
142
|
throw new Error(`Secret "${secret.secretName}" not found in response`);
|
|
136
143
|
}
|
|
137
|
-
const content = Buffer.from(base64Content, 'base64');
|
|
138
144
|
// Ensure directory exists
|
|
139
145
|
const dir = path.dirname(secret.saveTo);
|
|
140
146
|
await fs.promises.mkdir(dir, { recursive: true });
|
|
141
|
-
await fs.promises.writeFile(secret.saveTo,
|
|
147
|
+
await fs.promises.writeFile(secret.saveTo, base64Content, {
|
|
148
|
+
encoding: 'base64',
|
|
142
149
|
mode: 0o600,
|
|
143
150
|
});
|
|
144
|
-
this.
|
|
151
|
+
this.logger?.info(`Saved secret "${secret.secretName}" to ${secret.saveTo}`);
|
|
145
152
|
}
|
|
146
153
|
// Save certificates if directory is specified
|
|
147
154
|
if (this.options.saveCertsToDir) {
|
|
148
155
|
await this.saveCertificates(pkiClientFactory, this.options.saveCertsToDir, this.options.saveCertsPrefix);
|
|
149
156
|
}
|
|
150
|
-
this.
|
|
157
|
+
this.logger?.info(`Successfully synced from server: ${server}`);
|
|
151
158
|
return; // Success - exit from method
|
|
152
159
|
}
|
|
153
160
|
catch (error) {
|
|
154
|
-
|
|
161
|
+
const errorMessage = error instanceof Error ? error.message : String(error);
|
|
162
|
+
this.logger?.error(`Failed to sync from server ${server}: ${errorMessage}`);
|
|
155
163
|
// Continue to next server
|
|
156
164
|
}
|
|
157
165
|
}
|
|
@@ -159,4 +167,4 @@ class SyncClient {
|
|
|
159
167
|
}
|
|
160
168
|
}
|
|
161
169
|
exports.SyncClient = SyncClient;
|
|
162
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
170
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic3luYy1jbGllbnQuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvc3luYy1jbGllbnQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7QUFDQSwyREFJb0M7QUFDcEMsMkRBS29DO0FBQ3BDLGtEQUEwQjtBQUMxQix1Q0FBeUI7QUFDekIsMkNBQTZCO0FBYTdCLE1BQWEsVUFBVTtJQUNYLE9BQU8sQ0FBb0I7SUFDM0IsU0FBUyxDQUFrQjtJQUMzQixNQUFNLENBQWlCO0lBRXZCLE1BQU0sQ0FBQyxhQUFhLENBQ3hCLE9BQTBCO1FBRTFCLElBQUksT0FBTyxDQUFDLFFBQVEsSUFBSSxJQUFJLEVBQUUsQ0FBQztZQUMzQixPQUFPLFNBQVMsQ0FBQztRQUNyQixDQUFDO1FBRUQsTUFBTSxhQUFhLEdBQUcsTUFBTSxDQUFDLE1BQU0sQ0FBQyxxQkFBUSxDQUFhLENBQUM7UUFDMUQsSUFBSSxDQUFDLGFBQWEsQ0FBQyxRQUFRLENBQUMsT0FBTyxDQUFDLFFBQVEsQ0FBQyxFQUFFLENBQUM7WUFDNUMsTUFBTSxJQUFJLEtBQUssQ0FDWCwwQkFBMEIsT0FBTyxDQUFDLFFBQVEsZ0JBQWdCLGFBQWEsQ0FBQyxJQUFJLENBQUMsSUFBSSxDQUFDLEVBQUUsQ0FDdkYsQ0FBQztRQUNOLENBQUM7UUFFRCxPQUFPLElBQUksMEJBQWEsQ0FBQyxPQUFPLENBQUMsUUFBUSxDQUFDLENBQUM7SUFDL0MsQ0FBQztJQUVPLE1BQU0sQ0FBQyxhQUFhO1FBQ3hCLElBQUksQ0FBQztZQUNELE1BQU0sT0FBTyxHQUFHLGdCQUFnQixDQUFDO1lBQ2pDLE1BQU0sT0FBTyxHQUFHLGdCQUFnQixDQUFDO1lBRWpDLElBQUksRUFBRSxDQUFDLFVBQVUsQ0FBQyxPQUFPLENBQUMsRUFBRSxDQUFDO2dCQUN6QixNQUFNLEtBQUssR0FBRyxFQUFFLENBQUMsUUFBUSxDQUFDLE9BQU8sQ0FBQyxDQUFDO2dCQUNuQyxJQUFJLEtBQUssQ0FBQyxpQkFBaUIsRUFBRSxFQUFFLENBQUM7b0JBQzVCLE9BQU8sS0FBSyxDQUFDO2dCQUNqQixDQUFDO1lBQ0wsQ0FBQztZQUVELElBQUksRUFBRSxDQUFDLFVBQVUsQ0FBQyxPQUFPLENBQUMsRUFBRSxDQUFDO2dCQUN6QixNQUFNLEtBQUssR0FBRyxFQUFFLENBQUMsUUFBUSxDQUFDLE9BQU8sQ0FBQyxDQUFDO2dCQUNuQyxJQUFJLEtBQUssQ0FBQyxpQkFBaUIsRUFBRSxFQUFFLENBQUM7b0JBQzVCLE9BQU8sS0FBSyxDQUFDO2dCQUNqQixDQUFDO1lBQ0wsQ0FBQztRQUNMLENBQUM7UUFBQyxPQUFPLEtBQUssRUFBRSxDQUFDO1lBQ2Isb0RBQW9EO1FBQ3hELENBQUM7UUFFRCxPQUFPLFdBQVcsQ0FBQztJQUN2QixDQUFDO0lBRUQsWUFBWSxPQUEwQjtRQUNsQyxJQUFJLENBQUMsT0FBTyxHQUFHLE9BQU8sQ0FBQztRQUN2QixJQUFJLENBQUMsTUFBTSxHQUFHLFVBQVUsQ0FBQyxhQUFhLENBQUMsT0FBTyxDQUFDLENBQUM7UUFFaEQsTUFBTSxhQUFhLEdBQ2YsT0FBTyxDQUFDLFlBQVksS0FBSyxNQUFNO1lBQzNCLENBQUMsQ0FBQyxVQUFVLENBQUMsYUFBYSxFQUFFO1lBQzVCLENBQUMsQ0FBQyxPQUFPLENBQUMsWUFBWSxDQUFDO1FBRS9CLElBQUksYUFBYSxLQUFLLEtBQUssRUFBRSxDQUFDO1lBQzFCLElBQUksQ0FBQyxTQUFTLEdBQUcsRUFBRSxJQUFJLEVBQUUsMEJBQWEsQ0FBQyxHQUFHLEVBQUUsQ0FBQztRQUNqRCxDQUFDO2FBQU0sSUFBSSxhQUFhLEtBQUssS0FBSyxFQUFFLENBQUM7WUFDakMsSUFBSSxDQUFDLFNBQVMsR0FBRyxFQUFFLElBQUksRUFBRSwwQkFBYSxDQUFDLE1BQU0sRUFBRSxDQUFDO1FBQ3BELENBQUM7YUFBTSxJQUFJLGFBQWEsS0FBSyxXQUFXLEVBQUUsQ0FBQztZQUN2QyxJQUFJLENBQUMsU0FBUyxHQUFHO2dCQUNiLElBQUksRUFBRSwwQkFBYSxDQUFDLFNBQVM7Z0JBQzdCLEtBQUssRUFBRSxNQUFNLENBQUMsSUFBSSxDQUFDLDhCQUE4QixDQUFDLENBQUMsUUFBUSxDQUN2RCxLQUFLLENBQ1I7YUFDSixDQUFDO1FBQ04sQ0FBQzthQUFNLENBQUM7WUFDSixNQUFNLElBQUksS0FBSyxDQUNYLCtCQUErQixhQUFhLHdDQUF3QyxDQUN2RixDQUFDO1FBQ04sQ0FBQztJQUNMLENBQUM7SUFFTyxLQUFLLENBQUMsZ0JBQWdCLENBQzFCLGdCQUFrQyxFQUNsQyxRQUFnQixFQUNoQixNQUFlO1FBRWYsMEJBQTBCO1FBQzFCLE1BQU0sRUFBRSxDQUFDLFFBQVEsQ0FBQyxLQUFLLENBQUMsUUFBUSxFQUFFLEVBQUUsU0FBUyxFQUFFLElBQUksRUFBRSxDQUFDLENBQUM7UUFFdkQsTUFBTSxJQUFJLEdBQUcsTUFBTSxnQkFBZ0IsQ0FBQyxPQUFPLEVBQUUsQ0FBQztRQUM5QyxNQUFNLEVBQ0YsSUFBSSxFQUFFLFVBQVUsRUFDaEIsd0JBQXdCLEVBQ3hCLEVBQUUsR0FDTCxHQUFHLElBQUEsNENBQStCLEVBQUMsSUFBSSxDQUFDLENBQUM7UUFFMUMsTUFBTSxTQUFTLEdBQUcsTUFBTSxDQUFDLENBQUMsQ0FBQyxHQUFHLE1BQU0sR0FBRyxDQUFDLENBQUMsQ0FBQyxFQUFFLENBQUM7UUFFN0MsbUJBQW1CO1FBQ25CLE1BQU0sT0FBTyxHQUFHLElBQUksQ0FBQyxJQUFJLENBQUMsUUFBUSxFQUFFLEdBQUcsU0FBUyxTQUFTLENBQUMsQ0FBQztRQUMzRCxNQUFNLEVBQUUsQ0FBQyxRQUFRLENBQUMsU0FBUyxDQUFDLE9BQU8sRUFBRSxJQUFJLENBQUMsT0FBTyxDQUFDLGFBQWEsRUFBRTtZQUM3RCxJQUFJLEVBQUUsS0FBSztTQUNkLENBQUMsQ0FBQztRQUNILElBQUksQ0FBQyxNQUFNLEVBQUUsSUFBSSxDQUFDLHdCQUF3QixPQUFPLEVBQUUsQ0FBQyxDQUFDO1FBRXJELHNCQUFzQjtRQUN0QixNQUFNLE1BQU0sR0FBRyxJQUFJLENBQUMsSUFBSSxDQUFDLFFBQVEsRUFBRSxHQUFHLFNBQVMsUUFBUSxDQUFDLENBQUM7UUFDekQsTUFBTSxFQUFFLENBQUMsUUFBUSxDQUFDLFNBQVMsQ0FBQyxNQUFNLEVBQUUsRUFBRSxFQUFFLEVBQUUsSUFBSSxFQUFFLEtBQUssRUFBRSxDQUFDLENBQUM7UUFDekQsSUFBSSxDQUFDLE1BQU0sRUFBRSxJQUFJLENBQUMsMkJBQTJCLE1BQU0sRUFBRSxDQUFDLENBQUM7UUFFdkQsa0RBQWtEO1FBQ2xELE1BQU0sb0JBQW9CLEdBQUcsVUFBVSxHQUFHLHdCQUF3QixDQUFDO1FBQ25FLE1BQU0sUUFBUSxHQUFHLElBQUksQ0FBQyxJQUFJLENBQUMsUUFBUSxFQUFFLEdBQUcsU0FBUyxVQUFVLENBQUMsQ0FBQztRQUM3RCxNQUFNLEVBQUUsQ0FBQyxRQUFRLENBQUMsU0FBUyxDQUFDLFFBQVEsRUFBRSxvQkFBb0IsRUFBRTtZQUN4RCxJQUFJLEVBQUUsS0FBSztTQUNkLENBQUMsQ0FBQztRQUNILElBQUksQ0FBQyxNQUFNLEVBQUUsSUFBSSxDQUFDLDhCQUE4QixRQUFRLEVBQUUsQ0FBQyxDQUFDO0lBQ2hFLENBQUM7SUFFRCxLQUFLLENBQUMsSUFBSSxDQUFDLE1BQWtCO1FBQ3pCLEtBQUssTUFBTSxNQUFNLElBQUksSUFBSSxDQUFDLE9BQU8sQ0FBQyxPQUFPLEVBQUUsQ0FBQztZQUN4QyxJQUFJLENBQUM7Z0JBQ0QsSUFBSSxDQUFDLE1BQU0sRUFBRSxJQUFJLENBQUMsa0JBQWtCLE1BQU0sRUFBRSxDQUFDLENBQUM7Z0JBRTlDLE1BQU0sU0FBUyxHQUFvQjtvQkFDL0Isa0JBQWtCLEVBQUU7d0JBQ2hCLElBQUksRUFBRSxRQUFRO3dCQUNkLFNBQVMsRUFBRSxJQUFJLENBQUMsU0FBUzt3QkFDekIsT0FBTyxFQUFFLFdBQVcsTUFBTSxhQUFhO3dCQUN2QyxRQUFRLEVBQUUsSUFBSSxDQUFDLE9BQU8sQ0FBQyxRQUFRO3dCQUMvQiwwQkFBMEIsRUFDdEIsSUFBSSxDQUFDLE9BQU8sQ0FBQywwQkFBMEIsSUFBSSxLQUFLO3FCQUN2RDtvQkFDRCxTQUFTLEVBQUUsSUFBSSxDQUFDLE9BQU8sQ0FBQyxTQUFTO2lCQUNwQyxDQUFDO2dCQUVGLE1BQU0sZ0JBQWdCLEdBQUcsSUFBSSw2QkFBZ0IsQ0FDekMsU0FBUyxFQUNULElBQUksQ0FBQyxNQUFNLENBQ2QsQ0FBQztnQkFDRixNQUFNLFVBQVUsR0FBRyxNQUFNLGdCQUFnQixDQUFDLGFBQWEsRUFBRSxDQUFDO2dCQUUxRCwyQkFBMkI7Z0JBQzNCLE1BQU0sV0FBVyxHQUFHLE1BQU0sQ0FBQyxPQUFPLENBQUMsR0FBRyxDQUFDLENBQUMsQ0FBQyxFQUFFLEVBQUUsQ0FBQyxDQUFDLENBQUMsVUFBVSxDQUFDLENBQUM7Z0JBRTVELHFDQUFxQztnQkFDckMsTUFBTSxRQUFRLEdBQUcsTUFBTSxlQUFLLENBQUMsSUFBSSxDQUM3QixXQUFXLE1BQU0scUJBQXFCLEVBQ3RDLEVBQUUsT0FBTyxFQUFFLFdBQVcsRUFBRSxFQUN4QixFQUFFLFVBQVUsRUFBRSxDQUNqQixDQUFDO2dCQUVGLE1BQU0sTUFBTSxHQUFHLFFBQVEsQ0FBQyxJQUFJLENBQUM7Z0JBRTdCLHlCQUF5QjtnQkFDekIsS0FBSyxNQUFNLE1BQU0sSUFBSSxNQUFNLENBQUMsT0FBTyxFQUFFLENBQUM7b0JBQ2xDLE1BQU0sYUFBYSxHQUFHLE1BQU0sQ0FBQyxPQUFPLENBQUMsTUFBTSxDQUFDLFVBQVUsQ0FBQyxDQUFDO29CQUN4RCxJQUFJLGFBQWEsSUFBSSxJQUFJLEVBQUUsQ0FBQzt3QkFDeEIsTUFBTSxJQUFJLEtBQUssQ0FDWCxXQUFXLE1BQU0sQ0FBQyxVQUFVLHlCQUF5QixDQUN4RCxDQUFDO29CQUNOLENBQUM7b0JBQ0QsMEJBQTBCO29CQUMxQixNQUFNLEdBQUcsR0FBRyxJQUFJLENBQUMsT0FBTyxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUMsQ0FBQztvQkFDeEMsTUFBTSxFQUFFLENBQUMsUUFBUSxDQUFDLEtBQUssQ0FBQyxHQUFHLEVBQUUsRUFBRSxTQUFTLEVBQUUsSUFBSSxFQUFFLENBQUMsQ0FBQztvQkFFbEQsTUFBTSxFQUFFLENBQUMsUUFBUSxDQUFDLFNBQVMsQ0FBQyxNQUFNLENBQUMsTUFBTSxFQUFFLGFBQWEsRUFBRTt3QkFDdEQsUUFBUSxFQUFFLFFBQVE7d0JBQ2xCLElBQUksRUFBRSxLQUFLO3FCQUNkLENBQUMsQ0FBQztvQkFFSCxJQUFJLENBQUMsTUFBTSxFQUFFLElBQUksQ0FDYixpQkFBaUIsTUFBTSxDQUFDLFVBQVUsUUFBUSxNQUFNLENBQUMsTUFBTSxFQUFFLENBQzVELENBQUM7Z0JBQ04sQ0FBQztnQkFFRCw4Q0FBOEM7Z0JBQzlDLElBQUksSUFBSSxDQUFDLE9BQU8sQ0FBQyxjQUFjLEVBQUUsQ0FBQztvQkFDOUIsTUFBTSxJQUFJLENBQUMsZ0JBQWdCLENBQ3ZCLGdCQUFnQixFQUNoQixJQUFJLENBQUMsT0FBTyxDQUFDLGNBQWMsRUFDM0IsSUFBSSxDQUFDLE9BQU8sQ0FBQyxlQUFlLENBQy9CLENBQUM7Z0JBQ04sQ0FBQztnQkFFRCxJQUFJLENBQUMsTUFBTSxFQUFFLElBQUksQ0FBQyxvQ0FBb0MsTUFBTSxFQUFFLENBQUMsQ0FBQztnQkFDaEUsT0FBTyxDQUFDLDZCQUE2QjtZQUN6QyxDQUFDO1lBQUMsT0FBTyxLQUFLLEVBQUUsQ0FBQztnQkFDYixNQUFNLFlBQVksR0FDZCxLQUFLLFlBQVksS0FBSyxDQUFDLENBQUMsQ0FBQyxLQUFLLENBQUMsT0FBTyxDQUFDLENBQUMsQ0FBQyxNQUFNLENBQUMsS0FBSyxDQUFDLENBQUM7Z0JBQzNELElBQUksQ0FBQyxNQUFNLEVBQUUsS0FBSyxDQUNkLDhCQUE4QixNQUFNLEtBQUssWUFBWSxFQUFFLENBQzFELENBQUM7Z0JBQ0YsMEJBQTBCO1lBQzlCLENBQUM7UUFDTCxDQUFDO1FBRUQsTUFBTSxJQUFJLEtBQUssQ0FBQyxpQ0FBaUMsQ0FBQyxDQUFDO0lBQ3ZELENBQUM7Q0FDSjtBQWhNRCxnQ0FnTUMifQ==
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@super-protocol/pki-sync-client",
|
|
3
|
-
"version": "2.0.
|
|
3
|
+
"version": "2.0.12",
|
|
4
4
|
"description": "PKI sync client utility",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"bin": {
|
|
@@ -23,8 +23,8 @@
|
|
|
23
23
|
"license": "ISC",
|
|
24
24
|
"dependencies": {
|
|
25
25
|
"@sinclair/typebox": "0.33.22",
|
|
26
|
-
"@super-protocol/pki-client": "^2.1.
|
|
27
|
-
"@super-protocol/pki-common": "^2.0.
|
|
26
|
+
"@super-protocol/pki-client": "^2.1.8",
|
|
27
|
+
"@super-protocol/pki-common": "^2.0.4",
|
|
28
28
|
"axios": "^1.7.0",
|
|
29
29
|
"js-yaml": "^4.1.0",
|
|
30
30
|
"yargs": "^17.7.2"
|