@super-protocol/pki-sync-client 2.0.12 → 3.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +13 -0
- package/dist/cli.js +15 -3
- package/dist/sync-client.d.ts +18 -4
- package/dist/sync-client.js +149 -61
- package/package.json +3 -3
package/README.md
CHANGED
|
@@ -89,6 +89,8 @@ pki-sync-client sync [options]
|
|
|
89
89
|
| `--swarm-env` | | string | `/sp/swarm/swarm-env.yaml` | Path to swarm environment config (YAML) |
|
|
90
90
|
| `--own-challenge` | | string | `auto` | Authentication challenge type: `auto`, `tdx`, `sev`, or `untrusted` |
|
|
91
91
|
| `--log-level` | `-l` | string | | Log level: `fatal`, `error`, `warn`, `info`, `debug`, `trace` |
|
|
92
|
+
| `--retry-attempts` | | number | `3` | Number of retry attempts per server for retryable network/DNS errors |
|
|
93
|
+
| `--retry-timeout` | | number | `10` | Timeout between retries in seconds for retryable network/DNS errors |
|
|
92
94
|
| `--disable-server-identity-check` | | boolean | `false` | Disable server identity verification (not recommended) |
|
|
93
95
|
| `--save-certs-to-dir` | | string | | Directory to save client certificates (`key.pem`, `ca.pem`, `cert.pem`) |
|
|
94
96
|
| `--save-certs-prefix` | | string | | Prefix for certificate filenames (e.g., `client` → `client_key.pem`) |
|
|
@@ -112,6 +114,11 @@ pki-sync-client sync -c secrets.yaml --log-level info
|
|
|
112
114
|
pki-sync-client sync -c secrets.yaml --swarm-env /custom/path/swarm-env.yaml
|
|
113
115
|
```
|
|
114
116
|
|
|
117
|
+
**Sync with custom retry policy:**
|
|
118
|
+
```bash
|
|
119
|
+
pki-sync-client sync -c secrets.yaml --retry-attempts 5 --retry-timeout 3
|
|
120
|
+
```
|
|
121
|
+
|
|
115
122
|
**Sync and save client certificates:**
|
|
116
123
|
```bash
|
|
117
124
|
pki-sync-client sync -c secrets.yaml --save-certs-to-dir /etc/app/certs
|
|
@@ -202,6 +209,8 @@ interface SyncClientOptions {
|
|
|
202
209
|
networkID: string; // Network identifier
|
|
203
210
|
caBundle: string; // PEM-encoded CA certificate bundle
|
|
204
211
|
ownChallenge: string; // Challenge type: 'auto', 'tdx', 'sev', 'untrusted'
|
|
212
|
+
retryAttempts?: number; // Retry attempts per server (default: 3)
|
|
213
|
+
retryDelaySec?: number; // Delay between retries in seconds (default: 10)
|
|
205
214
|
logLevel?: LogLevel; // Log level: fatal | error | warn | info | debug | trace; if omitted logs are disabled
|
|
206
215
|
disableServerIdentityCheck?: boolean; // Disable server verification (default: false)
|
|
207
216
|
saveCertsToDir?: string; // Directory to save certificates
|
|
@@ -258,6 +267,10 @@ Use a static identifier for non-TEE environments (development/testing only).
|
|
|
258
267
|
6. **Certificate Export** (optional): Saves client certificates for external use
|
|
259
268
|
7. **Failover**: Automatically tries next server if connection fails
|
|
260
269
|
|
|
270
|
+
Retry behavior details:
|
|
271
|
+
- Retries are performed for retryable network/DNS errors (for example: `ECONNRESET`, `ECONNREFUSED`, `ETIMEDOUT`, `EAI_AGAIN`, `ENOTFOUND`) and for HTTP `429`/`502` responses (e.g. throttling or temporary upstream failure behind OpenResty)
|
|
272
|
+
- Retries are performed against the original hostname (SNI-safe), without replacing hostname with direct IPs
|
|
273
|
+
|
|
261
274
|
## Error Handling
|
|
262
275
|
|
|
263
276
|
The sync client provides clear error messages for common issues:
|
package/dist/cli.js
CHANGED
|
@@ -19,6 +19,8 @@ async function sync(argv) {
|
|
|
19
19
|
networkID: swarmEnv['pki-authority'].networkID,
|
|
20
20
|
caBundle: swarmEnv['pki-authority'].caBundle,
|
|
21
21
|
ownChallenge: argv.ownChallenge,
|
|
22
|
+
retryAttempts: argv.retryAttempts,
|
|
23
|
+
retryDelaySec: argv.retryTimeout,
|
|
22
24
|
logLevel: argv.logLevel,
|
|
23
25
|
disableServerIdentityCheck: argv.disableServerIdentityCheck,
|
|
24
26
|
saveCertsToDir: argv.saveCertsToDir,
|
|
@@ -49,15 +51,25 @@ async function main() {
|
|
|
49
51
|
demandOption: true,
|
|
50
52
|
})
|
|
51
53
|
.option('own-challenge', {
|
|
52
|
-
describe: 'Own challenge string for authentication (auto, tdx, sev, untrusted)',
|
|
54
|
+
describe: 'Own challenge string for authentication (auto, tdx, sev-snp, untrusted)',
|
|
53
55
|
type: 'string',
|
|
54
56
|
default: 'auto',
|
|
55
57
|
})
|
|
56
58
|
.option('log-level', {
|
|
57
59
|
alias: 'l',
|
|
58
|
-
describe: 'Log level
|
|
60
|
+
describe: 'Log level',
|
|
59
61
|
choices: Object.values(pki_common_1.LogLevel),
|
|
60
62
|
type: 'string',
|
|
63
|
+
})
|
|
64
|
+
.option('retry-attempts', {
|
|
65
|
+
describe: 'Number of retry attempts per server for retryable network/DNS errors',
|
|
66
|
+
type: 'number',
|
|
67
|
+
default: 3,
|
|
68
|
+
})
|
|
69
|
+
.option('retry-timeout', {
|
|
70
|
+
describe: 'Timeout between retries in seconds for retryable network/DNS errors',
|
|
71
|
+
type: 'number',
|
|
72
|
+
default: 10,
|
|
61
73
|
})
|
|
62
74
|
.option('disable-server-identity-check', {
|
|
63
75
|
describe: 'Disable server identity verification',
|
|
@@ -84,4 +96,4 @@ main().catch((error) => {
|
|
|
84
96
|
console.error('Error:', error.message);
|
|
85
97
|
process.exit(1);
|
|
86
98
|
});
|
|
87
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
99
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2xpLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vc3JjL2NsaS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7QUFDQSxrREFBMEI7QUFDMUIsMkNBQXdDO0FBQ3hDLHFDQUFzRDtBQUN0RCwrQ0FBMkM7QUFDM0MsMkRBQXNEO0FBRXRELE1BQU0sc0JBQXNCLEdBQUcsMEJBQTBCLENBQUM7QUFFMUQsS0FBSyxVQUFVLElBQUksQ0FBQyxJQUFTO0lBQ3pCLElBQUksQ0FBQztRQUNELE1BQU0sTUFBTSxHQUFHLElBQUEsb0JBQVcsRUFBQyxJQUFJLENBQUMsTUFBTSxDQUFDLENBQUM7UUFDeEMsTUFBTSxRQUFRLEdBQUcsSUFBQSxzQkFBYSxFQUFDLElBQUksQ0FBQyxRQUFRLENBQUMsQ0FBQztRQUU5QyxNQUFNLE1BQU0sR0FBRyxJQUFJLHdCQUFVLENBQUM7WUFDMUIsT0FBTyxFQUFFLFFBQVEsQ0FBQyxlQUFlLENBQUMsQ0FBQyxPQUFPO1lBQzFDLFNBQVMsRUFBRSxRQUFRLENBQUMsZUFBZSxDQUFDLENBQUMsU0FBUztZQUM5QyxRQUFRLEVBQUUsUUFBUSxDQUFDLGVBQWUsQ0FBQyxDQUFDLFFBQVE7WUFDNUMsWUFBWSxFQUFFLElBQUksQ0FBQyxZQUFZO1lBQy9CLGFBQWEsRUFBRSxJQUFJLENBQUMsYUFBYTtZQUNqQyxhQUFhLEVBQUUsSUFBSSxDQUFDLFlBQVk7WUFDaEMsUUFBUSxFQUFFLElBQUksQ0FBQyxRQUFRO1lBQ3ZCLDBCQUEwQixFQUFFLElBQUksQ0FBQywwQkFBMEI7WUFDM0QsY0FBYyxFQUFFLElBQUksQ0FBQyxjQUFjO1lBQ25DLGVBQWUsRUFBRSxJQUFJLENBQUMsZUFBZTtTQUN4QyxDQUFDLENBQUM7UUFFSCxNQUFNLE1BQU0sQ0FBQyxJQUFJLENBQUMsTUFBTSxDQUFDLENBQUM7UUFFMUIsT0FBTyxDQUFDLEdBQUcsQ0FBQyw2QkFBNkIsQ0FBQyxDQUFDO0lBQy9DLENBQUM7SUFBQyxPQUFPLEtBQVUsRUFBRSxDQUFDO1FBQ2xCLE9BQU8sQ0FBQyxLQUFLLENBQUMsY0FBYyxFQUFFLEtBQUssQ0FBQyxPQUFPLENBQUMsQ0FBQztRQUM3QyxPQUFPLENBQUMsSUFBSSxDQUFDLENBQUMsQ0FBQyxDQUFDO0lBQ3BCLENBQUM7QUFDTCxDQUFDO0FBRUQsS0FBSyxVQUFVLElBQUk7SUFDZixNQUFNLElBQUEsZUFBSyxFQUFDLElBQUEsaUJBQU8sRUFBQyxPQUFPLENBQUMsSUFBSSxDQUFDLENBQUM7U0FDN0IsS0FBSyxDQUFDLDBCQUEwQixDQUFDO1NBQ2pDLE9BQU8sQ0FDSixNQUFNLEVBQ04sOEJBQThCLEVBQzlCLENBQUMsS0FBSyxFQUFFLEVBQUU7UUFDTixPQUFPLEtBQUs7YUFDUCxNQUFNLENBQUMsV0FBVyxFQUFFO1lBQ2pCLFFBQVEsRUFBRSx5Q0FBeUM7WUFDbkQsSUFBSSxFQUFFLFFBQVE7WUFDZCxPQUFPLEVBQUUsc0JBQXNCO1NBQ2xDLENBQUM7YUFDRCxNQUFNLENBQUMsUUFBUSxFQUFFO1lBQ2QsS0FBSyxFQUFFLEdBQUc7WUFDVixRQUFRLEVBQUUsb0NBQW9DO1lBQzlDLElBQUksRUFBRSxRQUFRO1lBQ2QsWUFBWSxFQUFFLElBQUk7U0FDckIsQ0FBQzthQUNELE1BQU0sQ0FBQyxlQUFlLEVBQUU7WUFDckIsUUFBUSxFQUNKLHlFQUF5RTtZQUM3RSxJQUFJLEVBQUUsUUFBUTtZQUNkLE9BQU8sRUFBRSxNQUFNO1NBQ2xCLENBQUM7YUFDRCxNQUFNLENBQUMsV0FBVyxFQUFFO1lBQ2pCLEtBQUssRUFBRSxHQUFHO1lBQ1YsUUFBUSxFQUFFLFdBQVc7WUFDckIsT0FBTyxFQUFFLE1BQU0sQ0FBQyxNQUFNLENBQUMscUJBQVEsQ0FBQztZQUNoQyxJQUFJLEVBQUUsUUFBUTtTQUNqQixDQUFDO2FBQ0QsTUFBTSxDQUFDLGdCQUFnQixFQUFFO1lBQ3RCLFFBQVEsRUFDSixzRUFBc0U7WUFDMUUsSUFBSSxFQUFFLFFBQVE7WUFDZCxPQUFPLEVBQUUsQ0FBQztTQUNiLENBQUM7YUFDRCxNQUFNLENBQUMsZUFBZSxFQUFFO1lBQ3JCLFFBQVEsRUFDSixxRUFBcUU7WUFDekUsSUFBSSxFQUFFLFFBQVE7WUFDZCxPQUFPLEVBQUUsRUFBRTtTQUNkLENBQUM7YUFDRCxNQUFNLENBQUMsK0JBQStCLEVBQUU7WUFDckMsUUFBUSxFQUFFLHNDQUFzQztZQUNoRCxJQUFJLEVBQUUsU0FBUztZQUNmLE9BQU8sRUFBRSxLQUFLO1NBQ2pCLENBQUM7YUFDRCxNQUFNLENBQUMsbUJBQW1CLEVBQUU7WUFDekIsUUFBUSxFQUNKLG1FQUFtRTtZQUN2RSxJQUFJLEVBQUUsUUFBUTtTQUNqQixDQUFDO2FBQ0QsTUFBTSxDQUFDLG1CQUFtQixFQUFFO1lBQ3pCLFFBQVEsRUFDSixxRUFBcUU7WUFDekUsSUFBSSxFQUFFLFFBQVE7U0FDakIsQ0FBQyxDQUFDO0lBQ1gsQ0FBQyxFQUNELElBQUksQ0FDUDtTQUNBLGFBQWEsQ0FBQyxDQUFDLEVBQUUsNEJBQTRCLENBQUM7U0FDOUMsSUFBSSxFQUFFO1NBQ04sS0FBSyxDQUFDLE1BQU0sRUFBRSxHQUFHLENBQUM7U0FDbEIsT0FBTyxFQUFFO1NBQ1QsS0FBSyxDQUFDLFNBQVMsRUFBRSxHQUFHLENBQUM7U0FDckIsS0FBSyxFQUFFLENBQUM7QUFDakIsQ0FBQztBQUVELElBQUksRUFBRSxDQUFDLEtBQUssQ0FBQyxDQUFDLEtBQUssRUFBRSxFQUFFO0lBQ25CLE9BQU8sQ0FBQyxLQUFLLENBQUMsUUFBUSxFQUFFLEtBQUssQ0FBQyxPQUFPLENBQUMsQ0FBQztJQUN2QyxPQUFPLENBQUMsSUFBSSxDQUFDLENBQUMsQ0FBQyxDQUFDO0FBQ3BCLENBQUMsQ0FBQyxDQUFDIn0=
|
package/dist/sync-client.d.ts
CHANGED
|
@@ -1,22 +1,36 @@
|
|
|
1
1
|
import { SyncConfig } from './config';
|
|
2
|
-
import { LogLevel } from '@super-protocol/pki-common';
|
|
2
|
+
import { LogLevel, type DetectedCpuType } from '@super-protocol/pki-common';
|
|
3
3
|
export interface SyncClientOptions {
|
|
4
4
|
servers: string[];
|
|
5
5
|
networkID: string;
|
|
6
6
|
caBundle: string;
|
|
7
|
-
ownChallenge:
|
|
7
|
+
ownChallenge: DetectedCpuType | 'auto';
|
|
8
|
+
retryAttempts?: number;
|
|
9
|
+
retryDelaySec?: number;
|
|
8
10
|
logLevel?: LogLevel;
|
|
9
11
|
disableServerIdentityCheck?: boolean;
|
|
10
12
|
saveCertsToDir?: string;
|
|
11
13
|
saveCertsPrefix?: string;
|
|
12
14
|
}
|
|
13
15
|
export declare class SyncClient {
|
|
16
|
+
private static readonly DEFAULT_RETRY_ATTEMPTS;
|
|
17
|
+
private static readonly DEFAULT_RETRY_DELAY_SEC;
|
|
18
|
+
private static readonly RETRYABLE_NETWORK_ERROR_CODES;
|
|
19
|
+
private static readonly RETRYABLE_HTTP_STATUS_CODES;
|
|
14
20
|
private options;
|
|
15
21
|
private challenge;
|
|
16
|
-
private logger
|
|
22
|
+
private logger;
|
|
23
|
+
private retryAttempts;
|
|
24
|
+
private retryDelaySec;
|
|
17
25
|
private static resolveLogger;
|
|
18
|
-
private static detectCpuType;
|
|
19
26
|
constructor(options: SyncClientOptions);
|
|
27
|
+
private static normalizeRetryAttempts;
|
|
28
|
+
private static normalizeRetryDelaySec;
|
|
29
|
+
private static evaluateRetry;
|
|
30
|
+
private static waitRetryDelay;
|
|
31
|
+
private fetchSecrets;
|
|
32
|
+
private saveSecrets;
|
|
33
|
+
private saveArtifacts;
|
|
20
34
|
private saveCertificates;
|
|
21
35
|
sync(config: SyncConfig): Promise<void>;
|
|
22
36
|
}
|
package/dist/sync-client.js
CHANGED
|
@@ -33,12 +33,25 @@ const axios_1 = __importDefault(require("axios"));
|
|
|
33
33
|
const fs = __importStar(require("fs"));
|
|
34
34
|
const path = __importStar(require("path"));
|
|
35
35
|
class SyncClient {
|
|
36
|
+
static DEFAULT_RETRY_ATTEMPTS = 3;
|
|
37
|
+
static DEFAULT_RETRY_DELAY_SEC = 10;
|
|
38
|
+
static RETRYABLE_NETWORK_ERROR_CODES = new Set([
|
|
39
|
+
'ETIMEDOUT',
|
|
40
|
+
'ECONNRESET',
|
|
41
|
+
'ECONNREFUSED',
|
|
42
|
+
'EAI_AGAIN',
|
|
43
|
+
'ENOTFOUND',
|
|
44
|
+
'ECONNABORTED',
|
|
45
|
+
]);
|
|
46
|
+
static RETRYABLE_HTTP_STATUS_CODES = new Set([429, 502]);
|
|
36
47
|
options;
|
|
37
48
|
challenge;
|
|
38
49
|
logger;
|
|
50
|
+
retryAttempts;
|
|
51
|
+
retryDelaySec;
|
|
39
52
|
static resolveLogger(options) {
|
|
40
53
|
if (options.logLevel == null) {
|
|
41
|
-
return
|
|
54
|
+
return new pki_common_1.CommonMockLog();
|
|
42
55
|
}
|
|
43
56
|
const allowedLevels = Object.values(pki_common_1.LogLevel);
|
|
44
57
|
if (!allowedLevels.includes(options.logLevel)) {
|
|
@@ -46,48 +59,108 @@ class SyncClient {
|
|
|
46
59
|
}
|
|
47
60
|
return new pki_common_1.CommonPinoLog(options.logLevel);
|
|
48
61
|
}
|
|
49
|
-
static detectCpuType() {
|
|
50
|
-
try {
|
|
51
|
-
const tdxPath = '/dev/tdx_guest';
|
|
52
|
-
const sevPath = '/dev/sev-guest';
|
|
53
|
-
if (fs.existsSync(tdxPath)) {
|
|
54
|
-
const stats = fs.statSync(tdxPath);
|
|
55
|
-
if (stats.isCharacterDevice()) {
|
|
56
|
-
return 'tdx';
|
|
57
|
-
}
|
|
58
|
-
}
|
|
59
|
-
if (fs.existsSync(sevPath)) {
|
|
60
|
-
const stats = fs.statSync(sevPath);
|
|
61
|
-
if (stats.isCharacterDevice()) {
|
|
62
|
-
return 'sev';
|
|
63
|
-
}
|
|
64
|
-
}
|
|
65
|
-
}
|
|
66
|
-
catch (error) {
|
|
67
|
-
// If we can't check devices, fall back to untrusted
|
|
68
|
-
}
|
|
69
|
-
return 'untrusted';
|
|
70
|
-
}
|
|
71
62
|
constructor(options) {
|
|
72
63
|
this.options = options;
|
|
73
64
|
this.logger = SyncClient.resolveLogger(options);
|
|
65
|
+
this.retryAttempts = SyncClient.normalizeRetryAttempts(options.retryAttempts);
|
|
66
|
+
this.retryDelaySec = SyncClient.normalizeRetryDelaySec(options.retryDelaySec);
|
|
74
67
|
const challengeType = options.ownChallenge === 'auto'
|
|
75
|
-
?
|
|
68
|
+
? (0, pki_common_1.detectCpuType)()
|
|
76
69
|
: options.ownChallenge;
|
|
77
|
-
if (challengeType ===
|
|
70
|
+
if (challengeType === pki_common_1.ChallengeType.TDX) {
|
|
78
71
|
this.challenge = { type: pki_common_1.ChallengeType.TDX };
|
|
79
72
|
}
|
|
80
|
-
else if (challengeType ===
|
|
73
|
+
else if (challengeType === pki_common_1.ChallengeType.SEVSNP) {
|
|
81
74
|
this.challenge = { type: pki_common_1.ChallengeType.SEVSNP };
|
|
82
75
|
}
|
|
83
|
-
else if (challengeType ===
|
|
76
|
+
else if (challengeType === pki_common_1.ChallengeType.Untrusted) {
|
|
84
77
|
this.challenge = {
|
|
85
78
|
type: pki_common_1.ChallengeType.Untrusted,
|
|
86
79
|
idHex: Buffer.from('pki-sync-client-untrusted-id').toString('hex'),
|
|
87
80
|
};
|
|
88
81
|
}
|
|
89
82
|
else {
|
|
90
|
-
throw new Error(`Unsupported challenge type: ${challengeType}. Supported: tdx, sev, untrusted, auto`);
|
|
83
|
+
throw new Error(`Unsupported challenge type: ${challengeType}. Supported: tdx, sev-snp, untrusted, auto`);
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
static normalizeRetryAttempts(value) {
|
|
87
|
+
if (value == null) {
|
|
88
|
+
return SyncClient.DEFAULT_RETRY_ATTEMPTS;
|
|
89
|
+
}
|
|
90
|
+
if (!Number.isInteger(value) || value < 1) {
|
|
91
|
+
throw new Error('Invalid retryAttempts: must be an integer greater than or equal to 1');
|
|
92
|
+
}
|
|
93
|
+
return value;
|
|
94
|
+
}
|
|
95
|
+
static normalizeRetryDelaySec(value) {
|
|
96
|
+
if (value == null) {
|
|
97
|
+
return SyncClient.DEFAULT_RETRY_DELAY_SEC;
|
|
98
|
+
}
|
|
99
|
+
if (!Number.isInteger(value) || value < 0) {
|
|
100
|
+
throw new Error('Invalid retryDelaySec: must be an integer greater than or equal to 0');
|
|
101
|
+
}
|
|
102
|
+
return value;
|
|
103
|
+
}
|
|
104
|
+
static evaluateRetry(error) {
|
|
105
|
+
if (!axios_1.default.isAxiosError(error)) {
|
|
106
|
+
return {
|
|
107
|
+
isRetryable: false,
|
|
108
|
+
reason: 'non-axios-error',
|
|
109
|
+
};
|
|
110
|
+
}
|
|
111
|
+
const httpStatus = error.response?.status;
|
|
112
|
+
if (httpStatus != null) {
|
|
113
|
+
const reason = `http-status:${httpStatus}`;
|
|
114
|
+
return {
|
|
115
|
+
isRetryable: SyncClient.RETRYABLE_HTTP_STATUS_CODES.has(httpStatus),
|
|
116
|
+
reason,
|
|
117
|
+
};
|
|
118
|
+
}
|
|
119
|
+
const errorCode = error.code;
|
|
120
|
+
if (errorCode != null) {
|
|
121
|
+
const reason = `network-code:${errorCode}`;
|
|
122
|
+
return {
|
|
123
|
+
isRetryable: SyncClient.RETRYABLE_NETWORK_ERROR_CODES.has(errorCode),
|
|
124
|
+
reason,
|
|
125
|
+
};
|
|
126
|
+
}
|
|
127
|
+
return {
|
|
128
|
+
isRetryable: false,
|
|
129
|
+
reason: 'unknown-axios-error',
|
|
130
|
+
};
|
|
131
|
+
}
|
|
132
|
+
static async waitRetryDelay(delaySec) {
|
|
133
|
+
if (delaySec <= 0) {
|
|
134
|
+
return;
|
|
135
|
+
}
|
|
136
|
+
await new Promise((resolve) => {
|
|
137
|
+
setTimeout(resolve, delaySec * 1000);
|
|
138
|
+
});
|
|
139
|
+
}
|
|
140
|
+
async fetchSecrets(server, config, httpsAgent) {
|
|
141
|
+
const secretNames = config.secrets.map((s) => s.secretName);
|
|
142
|
+
const response = await axios_1.default.post(`https://${server}/api/v1/secrets/get`, { objects: secretNames }, { httpsAgent });
|
|
143
|
+
return response.data.secrets;
|
|
144
|
+
}
|
|
145
|
+
async saveSecrets(config, secrets) {
|
|
146
|
+
for (const secret of config.secrets) {
|
|
147
|
+
const base64Content = secrets[secret.secretName];
|
|
148
|
+
if (base64Content == null) {
|
|
149
|
+
throw new Error(`Secret "${secret.secretName}" not found in response`);
|
|
150
|
+
}
|
|
151
|
+
const dir = path.dirname(secret.saveTo);
|
|
152
|
+
await fs.promises.mkdir(dir, { recursive: true });
|
|
153
|
+
await fs.promises.writeFile(secret.saveTo, base64Content, {
|
|
154
|
+
encoding: 'base64',
|
|
155
|
+
mode: 0o600,
|
|
156
|
+
});
|
|
157
|
+
this.logger.info(`Saved secret "${secret.secretName}" to ${secret.saveTo}`);
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
async saveArtifacts(config, secrets, pkiClientFactory) {
|
|
161
|
+
await this.saveSecrets(config, secrets);
|
|
162
|
+
if (this.options.saveCertsToDir) {
|
|
163
|
+
await this.saveCertificates(pkiClientFactory, this.options.saveCertsToDir, this.options.saveCertsPrefix);
|
|
91
164
|
}
|
|
92
165
|
}
|
|
93
166
|
async saveCertificates(pkiClientFactory, certsDir, prefix) {
|
|
@@ -101,23 +174,25 @@ class SyncClient {
|
|
|
101
174
|
await fs.promises.writeFile(keyPath, cert.keyPair.privateKeyPem, {
|
|
102
175
|
mode: 0o600,
|
|
103
176
|
});
|
|
104
|
-
this.logger
|
|
177
|
+
this.logger.info(`Saved private key to ${keyPath}`);
|
|
105
178
|
// Save CA certificate
|
|
106
179
|
const caPath = path.join(certsDir, `${prefixStr}ca.pem`);
|
|
107
180
|
await fs.promises.writeFile(caPath, ca, { mode: 0o644 });
|
|
108
|
-
this.logger
|
|
181
|
+
this.logger.info(`Saved CA certificate to ${caPath}`);
|
|
109
182
|
// Save client certificate with intermediate chain
|
|
110
183
|
const certWithIntermediate = clientCert + intermediateCertificates;
|
|
111
184
|
const certPath = path.join(certsDir, `${prefixStr}cert.pem`);
|
|
112
185
|
await fs.promises.writeFile(certPath, certWithIntermediate, {
|
|
113
186
|
mode: 0o644,
|
|
114
187
|
});
|
|
115
|
-
this.logger
|
|
188
|
+
this.logger.info(`Saved certificate chain to ${certPath}`);
|
|
116
189
|
}
|
|
117
190
|
async sync(config) {
|
|
118
191
|
for (const server of this.options.servers) {
|
|
192
|
+
let pkiClientFactory;
|
|
193
|
+
let httpsAgent;
|
|
119
194
|
try {
|
|
120
|
-
this.logger
|
|
195
|
+
this.logger.info(`Trying server: ${server}`);
|
|
121
196
|
const pkiConfig = {
|
|
122
197
|
clientCertProvider: {
|
|
123
198
|
type: 'pki-ca',
|
|
@@ -128,43 +203,56 @@ class SyncClient {
|
|
|
128
203
|
},
|
|
129
204
|
networkID: this.options.networkID,
|
|
130
205
|
};
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
const dir = path.dirname(secret.saveTo);
|
|
146
|
-
await fs.promises.mkdir(dir, { recursive: true });
|
|
147
|
-
await fs.promises.writeFile(secret.saveTo, base64Content, {
|
|
148
|
-
encoding: 'base64',
|
|
149
|
-
mode: 0o600,
|
|
150
|
-
});
|
|
151
|
-
this.logger?.info(`Saved secret "${secret.secretName}" to ${secret.saveTo}`);
|
|
206
|
+
pkiClientFactory = new pki_client_1.PkiClientFactory(pkiConfig, this.logger);
|
|
207
|
+
httpsAgent = await pkiClientFactory.getHTTPSAgent();
|
|
208
|
+
}
|
|
209
|
+
catch (error) {
|
|
210
|
+
const errorMessage = error instanceof Error ? error.message : String(error);
|
|
211
|
+
this.logger.error(`Failed to prepare client for server ${server}: ${errorMessage}. Reason: non-axios-error`);
|
|
212
|
+
continue;
|
|
213
|
+
}
|
|
214
|
+
let fetchedSecrets;
|
|
215
|
+
for (let attempt = 1; attempt <= this.retryAttempts; attempt++) {
|
|
216
|
+
try {
|
|
217
|
+
this.logger.info(`POST attempt ${attempt}/${this.retryAttempts} for server: ${server}`);
|
|
218
|
+
fetchedSecrets = await this.fetchSecrets(server, config, httpsAgent);
|
|
219
|
+
break;
|
|
152
220
|
}
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
221
|
+
catch (error) {
|
|
222
|
+
const errorMessage = error instanceof Error ? error.message : String(error);
|
|
223
|
+
const retryDecision = SyncClient.evaluateRetry(error);
|
|
224
|
+
const hasMoreAttempts = attempt < this.retryAttempts;
|
|
225
|
+
this.logger.error(`Failed attempt ${attempt}/${this.retryAttempts} for server ${server}: ${errorMessage}. Reason: ${retryDecision.reason}`);
|
|
226
|
+
if (!retryDecision.isRetryable) {
|
|
227
|
+
this.logger.error(`Error is not retryable for server ${server}; moving to next server. Reason: ${retryDecision.reason}`);
|
|
228
|
+
break;
|
|
229
|
+
}
|
|
230
|
+
if (!hasMoreAttempts) {
|
|
231
|
+
this.logger.error(`Retry attempts exhausted for server ${server}; moving to next server. Reason: ${retryDecision.reason}`);
|
|
232
|
+
break;
|
|
233
|
+
}
|
|
234
|
+
this.logger.info(`Retrying server ${server} in ${this.retryDelaySec} second(s). Reason: ${retryDecision.reason}`);
|
|
235
|
+
await SyncClient.waitRetryDelay(this.retryDelaySec);
|
|
156
236
|
}
|
|
157
|
-
|
|
158
|
-
|
|
237
|
+
}
|
|
238
|
+
if (fetchedSecrets == null) {
|
|
239
|
+
continue;
|
|
240
|
+
}
|
|
241
|
+
try {
|
|
242
|
+
await this.saveArtifacts(config, fetchedSecrets, pkiClientFactory);
|
|
243
|
+
this.logger.info(`Successfully synced from server: ${server}`);
|
|
244
|
+
return;
|
|
159
245
|
}
|
|
160
246
|
catch (error) {
|
|
161
247
|
const errorMessage = error instanceof Error ? error.message : String(error);
|
|
162
|
-
|
|
163
|
-
|
|
248
|
+
const reason = axios_1.default.isAxiosError(error)
|
|
249
|
+
? SyncClient.evaluateRetry(error).reason
|
|
250
|
+
: 'unknown-post-error';
|
|
251
|
+
this.logger.error(`Failed to process sync results for server ${server}: ${errorMessage}. Reason: ${reason}`);
|
|
164
252
|
}
|
|
165
253
|
}
|
|
166
254
|
throw new Error('Failed to sync from all servers');
|
|
167
255
|
}
|
|
168
256
|
}
|
|
169
257
|
exports.SyncClient = SyncClient;
|
|
170
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
258
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sync-client.js","sourceRoot":"","sources":["../src/sync-client.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AACA,2DAIoC;AACpC,2DASoC;AACpC,kDAA0B;AAC1B,uCAAyB;AACzB,2CAA6B;AAe7B,MAAa,UAAU;IACX,MAAM,CAAU,sBAAsB,GAAG,CAAC,CAAC;IAC3C,MAAM,CAAU,uBAAuB,GAAG,EAAE,CAAC;IAC7C,MAAM,CAAU,6BAA6B,GAAG,IAAI,GAAG,CAAC;QAC5D,WAAW;QACX,YAAY;QACZ,cAAc;QACd,WAAW;QACX,WAAW;QACX,cAAc;KACjB,CAAC,CAAC;IACK,MAAM,CAAU,2BAA2B,GAAG,IAAI,GAAG,CAAC,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;IAElE,OAAO,CAAoB;IAC3B,SAAS,CAAkB;IAC3B,MAAM,CAAM;IACZ,aAAa,CAAS;IACtB,aAAa,CAAS;IAEtB,MAAM,CAAC,aAAa,CAAC,OAA0B;QACnD,IAAI,OAAO,CAAC,QAAQ,IAAI,IAAI,EAAE,CAAC;YAC3B,OAAO,IAAI,0BAAO,EAAE,CAAC;QACzB,CAAC;QAED,MAAM,aAAa,GAAG,MAAM,CAAC,MAAM,CAAC,qBAAQ,CAAa,CAAC;QAC1D,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC5C,MAAM,IAAI,KAAK,CACX,0BAA0B,OAAO,CAAC,QAAQ,gBAAgB,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CACvF,CAAC;QACN,CAAC;QAED,OAAO,IAAI,0BAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IACzC,CAAC;IAED,YAAY,OAA0B;QAClC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,UAAU,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,aAAa,GAAG,UAAU,CAAC,sBAAsB,CAClD,OAAO,CAAC,aAAa,CACxB,CAAC;QACF,IAAI,CAAC,aAAa,GAAG,UAAU,CAAC,sBAAsB,CAClD,OAAO,CAAC,aAAa,CACxB,CAAC;QAEF,MAAM,aAAa,GACf,OAAO,CAAC,YAAY,KAAK,MAAM;YAC3B,CAAC,CAAC,IAAA,0BAAa,GAAE;YACjB,CAAC,CAAC,OAAO,CAAC,YAAY,CAAC;QAE/B,IAAI,aAAa,KAAK,0BAAa,CAAC,GAAG,EAAE,CAAC;YACtC,IAAI,CAAC,SAAS,GAAG,EAAE,IAAI,EAAE,0BAAa,CAAC,GAAG,EAAE,CAAC;QACjD,CAAC;aAAM,IAAI,aAAa,KAAK,0BAAa,CAAC,MAAM,EAAE,CAAC;YAChD,IAAI,CAAC,SAAS,GAAG,EAAE,IAAI,EAAE,0BAAa,CAAC,MAAM,EAAE,CAAC;QACpD,CAAC;aAAM,IAAI,aAAa,KAAK,0BAAa,CAAC,SAAS,EAAE,CAAC;YACnD,IAAI,CAAC,SAAS,GAAG;gBACb,IAAI,EAAE,0BAAa,CAAC,SAAS;gBAC7B,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,QAAQ,CACvD,KAAK,CACR;aACJ,CAAC;QACN,CAAC;aAAM,CAAC;YACJ,MAAM,IAAI,KAAK,CACX,+BAA+B,aAAa,4CAA4C,CAC3F,CAAC;QACN,CAAC;IACL,CAAC;IAEO,MAAM,CAAC,sBAAsB,CAAC,KAAyB;QAC3D,IAAI,KAAK,IAAI,IAAI,EAAE,CAAC;YAChB,OAAO,UAAU,CAAC,sBAAsB,CAAC;QAC7C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CACX,sEAAsE,CACzE,CAAC;QACN,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,sBAAsB,CAAC,KAAyB;QAC3D,IAAI,KAAK,IAAI,IAAI,EAAE,CAAC;YAChB,OAAO,UAAU,CAAC,uBAAuB,CAAC;QAC9C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CACX,sEAAsE,CACzE,CAAC;QACN,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,aAAa,CAAC,KAAc;QAIvC,IAAI,CAAC,eAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE,CAAC;YAC7B,OAAO;gBACH,WAAW,EAAE,KAAK;gBAClB,MAAM,EAAE,iBAAiB;aAC5B,CAAC;QACN,CAAC;QAED,MAAM,UAAU,GAAG,KAAK,CAAC,QAAQ,EAAE,MAAM,CAAC;QAC1C,IAAI,UAAU,IAAI,IAAI,EAAE,CAAC;YACrB,MAAM,MAAM,GAAG,eAAe,UAAU,EAAE,CAAC;YAC3C,OAAO;gBACH,WAAW,EACP,UAAU,CAAC,2BAA2B,CAAC,GAAG,CAAC,UAAU,CAAC;gBAC1D,MAAM;aACT,CAAC;QACN,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,CAAC;QAC7B,IAAI,SAAS,IAAI,IAAI,EAAE,CAAC;YACpB,MAAM,MAAM,GAAG,gBAAgB,SAAS,EAAE,CAAC;YAC3C,OAAO;gBACH,WAAW,EACP,UAAU,CAAC,6BAA6B,CAAC,GAAG,CAAC,SAAS,CAAC;gBAC3D,MAAM;aACT,CAAC;QACN,CAAC;QAED,OAAO;YACH,WAAW,EAAE,KAAK;YAClB,MAAM,EAAE,qBAAqB;SAChC,CAAC;IACN,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,cAAc,CAAC,QAAgB;QAChD,IAAI,QAAQ,IAAI,CAAC,EAAE,CAAC;YAChB,OAAO;QACX,CAAC;QAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAC1B,UAAU,CAAC,OAAO,EAAE,QAAQ,GAAG,IAAI,CAAC,CAAC;QACzC,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,KAAK,CAAC,YAAY,CACtB,MAAc,EACd,MAAkB,EAClB,UAAkE;QAElE,MAAM,WAAW,GAAG,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC;QAE5D,MAAM,QAAQ,GAAG,MAAM,eAAK,CAAC,IAAI,CAC7B,WAAW,MAAM,qBAAqB,EACtC,EAAE,OAAO,EAAE,WAAW,EAAE,EACxB,EAAE,UAAU,EAAE,CACjB,CAAC;QAEF,OAAO,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC;IACjC,CAAC;IAEO,KAAK,CAAC,WAAW,CACrB,MAAkB,EAClB,OAA+B;QAE/B,KAAK,MAAM,MAAM,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;YAClC,MAAM,aAAa,GAAG,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACjD,IAAI,aAAa,IAAI,IAAI,EAAE,CAAC;gBACxB,MAAM,IAAI,KAAK,CACX,WAAW,MAAM,CAAC,UAAU,yBAAyB,CACxD,CAAC;YACN,CAAC;YAED,MAAM,GAAG,GAAG,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACxC,MAAM,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,GAAG,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;YAElD,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,MAAM,EAAE,aAAa,EAAE;gBACtD,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,KAAK;aACd,CAAC,CAAC;YAEH,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,iBAAiB,MAAM,CAAC,UAAU,QAAQ,MAAM,CAAC,MAAM,EAAE,CAC5D,CAAC;QACN,CAAC;IACL,CAAC;IAEO,KAAK,CAAC,aAAa,CACvB,MAAkB,EAClB,OAA+B,EAC/B,gBAAkC;QAElC,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAExC,IAAI,IAAI,CAAC,OAAO,CAAC,cAAc,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,gBAAgB,CACvB,gBAAgB,EAChB,IAAI,CAAC,OAAO,CAAC,cAAc,EAC3B,IAAI,CAAC,OAAO,CAAC,eAAe,CAC/B,CAAC;QACN,CAAC;IACL,CAAC;IAEO,KAAK,CAAC,gBAAgB,CAC1B,gBAAkC,EAClC,QAAgB,EAChB,MAAe;QAEf,0BAA0B;QAC1B,MAAM,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,QAAQ,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAEvD,MAAM,IAAI,GAAG,MAAM,gBAAgB,CAAC,OAAO,EAAE,CAAC;QAC9C,MAAM,EACF,IAAI,EAAE,UAAU,EAChB,wBAAwB,EACxB,EAAE,GACL,GAAG,IAAA,4CAA+B,EAAC,IAAI,CAAC,CAAC;QAE1C,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,MAAM,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;QAE7C,mBAAmB;QACnB,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,SAAS,CAAC,CAAC;QAC3D,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,aAAa,EAAE;YAC7D,IAAI,EAAE,KAAK;SACd,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wBAAwB,OAAO,EAAE,CAAC,CAAC;QAEpD,sBAAsB;QACtB,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,QAAQ,CAAC,CAAC;QACzD,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,MAAM,EAAE,EAAE,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,CAAC,CAAC;QACzD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,2BAA2B,MAAM,EAAE,CAAC,CAAC;QAEtD,kDAAkD;QAClD,MAAM,oBAAoB,GAAG,UAAU,GAAG,wBAAwB,CAAC;QACnE,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,UAAU,CAAC,CAAC;QAC7D,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,QAAQ,EAAE,oBAAoB,EAAE;YACxD,IAAI,EAAE,KAAK;SACd,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,QAAQ,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,KAAK,CAAC,IAAI,CAAC,MAAkB;QACzB,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;YACxC,IAAI,gBAAkC,CAAC;YACvC,IAAI,UAEH,CAAC;YAEF,IAAI,CAAC;gBACD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,MAAM,EAAE,CAAC,CAAC;gBAE7C,MAAM,SAAS,GAAoB;oBAC/B,kBAAkB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,OAAO,EAAE,WAAW,MAAM,aAAa;wBACvC,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;wBAC/B,0BAA0B,EACtB,IAAI,CAAC,OAAO,CAAC,0BAA0B,IAAI,KAAK;qBACvD;oBACD,SAAS,EAAE,IAAI,CAAC,OAAO,CAAC,SAAS;iBACpC,CAAC;gBAEF,gBAAgB,GAAG,IAAI,6BAAgB,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;gBAChE,UAAU,GAAG,MAAM,gBAAgB,CAAC,aAAa,EAAE,CAAC;YACxD,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,YAAY,GACd,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAC3D,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,uCAAuC,MAAM,KAAK,YAAY,2BAA2B,CAC5F,CAAC;gBACF,SAAS;YACb,CAAC;YAED,IAAI,cAAkD,CAAC;YAEvD,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,IAAI,IAAI,CAAC,aAAa,EAAE,OAAO,EAAE,EAAE,CAAC;gBAC7D,IAAI,CAAC;oBACD,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,gBAAgB,OAAO,IAAI,IAAI,CAAC,aAAa,gBAAgB,MAAM,EAAE,CACxE,CAAC;oBAEF,cAAc,GAAG,MAAM,IAAI,CAAC,YAAY,CACpC,MAAM,EACN,MAAM,EACN,UAAU,CACb,CAAC;oBACF,MAAM;gBACV,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACb,MAAM,YAAY,GACd,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;oBAC3D,MAAM,aAAa,GAAG,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;oBACtD,MAAM,eAAe,GAAG,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC;oBAErD,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,kBAAkB,OAAO,IAAI,IAAI,CAAC,aAAa,eAAe,MAAM,KAAK,YAAY,aAAa,aAAa,CAAC,MAAM,EAAE,CAC3H,CAAC;oBAEF,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,CAAC;wBAC7B,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,qCAAqC,MAAM,oCAAoC,aAAa,CAAC,MAAM,EAAE,CACxG,CAAC;wBACF,MAAM;oBACV,CAAC;oBAED,IAAI,CAAC,eAAe,EAAE,CAAC;wBACnB,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,uCAAuC,MAAM,oCAAoC,aAAa,CAAC,MAAM,EAAE,CAC1G,CAAC;wBACF,MAAM;oBACV,CAAC;oBAED,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,mBAAmB,MAAM,OAAO,IAAI,CAAC,aAAa,uBAAuB,aAAa,CAAC,MAAM,EAAE,CAClG,CAAC;oBACF,MAAM,UAAU,CAAC,cAAc,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBACxD,CAAC;YACL,CAAC;YAED,IAAI,cAAc,IAAI,IAAI,EAAE,CAAC;gBACzB,SAAS;YACb,CAAC;YAED,IAAI,CAAC;gBACD,MAAM,IAAI,CAAC,aAAa,CACpB,MAAM,EACN,cAAc,EACd,gBAAgB,CACnB,CAAC;gBACF,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,oCAAoC,MAAM,EAAE,CAAC,CAAC;gBAC/D,OAAO;YACX,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,YAAY,GACd,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAC3D,MAAM,MAAM,GAAG,eAAK,CAAC,YAAY,CAAC,KAAK,CAAC;oBACpC,CAAC,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,MAAM;oBACxC,CAAC,CAAC,oBAAoB,CAAC;gBAC3B,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,6CAA6C,MAAM,KAAK,YAAY,aAAa,MAAM,EAAE,CAC5F,CAAC;YACN,CAAC;QACL,CAAC;QAED,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACvD,CAAC;;AArVL,gCAsVC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@super-protocol/pki-sync-client",
|
|
3
|
-
"version": "
|
|
3
|
+
"version": "3.0.1",
|
|
4
4
|
"description": "PKI sync client utility",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"bin": {
|
|
@@ -23,8 +23,8 @@
|
|
|
23
23
|
"license": "ISC",
|
|
24
24
|
"dependencies": {
|
|
25
25
|
"@sinclair/typebox": "0.33.22",
|
|
26
|
-
"@super-protocol/pki-client": "^
|
|
27
|
-
"@super-protocol/pki-common": "^
|
|
26
|
+
"@super-protocol/pki-client": "^3.0.0",
|
|
27
|
+
"@super-protocol/pki-common": "^3.0.2",
|
|
28
28
|
"axios": "^1.7.0",
|
|
29
29
|
"js-yaml": "^4.1.0",
|
|
30
30
|
"yargs": "^17.7.2"
|