@super-protocol/pki-sync-client 2.0.12 → 3.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -89,6 +89,8 @@ pki-sync-client sync [options]
89
89
  | `--swarm-env` | | string | `/sp/swarm/swarm-env.yaml` | Path to swarm environment config (YAML) |
90
90
  | `--own-challenge` | | string | `auto` | Authentication challenge type: `auto`, `tdx`, `sev`, or `untrusted` |
91
91
  | `--log-level` | `-l` | string | | Log level: `fatal`, `error`, `warn`, `info`, `debug`, `trace` |
92
+ | `--retry-attempts` | | number | `3` | Number of retry attempts per server for retryable network/DNS errors |
93
+ | `--retry-timeout` | | number | `10` | Timeout between retries in seconds for retryable network/DNS errors |
92
94
  | `--disable-server-identity-check` | | boolean | `false` | Disable server identity verification (not recommended) |
93
95
  | `--save-certs-to-dir` | | string | | Directory to save client certificates (`key.pem`, `ca.pem`, `cert.pem`) |
94
96
  | `--save-certs-prefix` | | string | | Prefix for certificate filenames (e.g., `client` → `client_key.pem`) |
@@ -112,6 +114,11 @@ pki-sync-client sync -c secrets.yaml --log-level info
112
114
  pki-sync-client sync -c secrets.yaml --swarm-env /custom/path/swarm-env.yaml
113
115
  ```
114
116
 
117
+ **Sync with custom retry policy:**
118
+ ```bash
119
+ pki-sync-client sync -c secrets.yaml --retry-attempts 5 --retry-timeout 3
120
+ ```
121
+
115
122
  **Sync and save client certificates:**
116
123
  ```bash
117
124
  pki-sync-client sync -c secrets.yaml --save-certs-to-dir /etc/app/certs
@@ -202,6 +209,8 @@ interface SyncClientOptions {
202
209
  networkID: string; // Network identifier
203
210
  caBundle: string; // PEM-encoded CA certificate bundle
204
211
  ownChallenge: string; // Challenge type: 'auto', 'tdx', 'sev', 'untrusted'
212
+ retryAttempts?: number; // Retry attempts per server (default: 3)
213
+ retryDelaySec?: number; // Delay between retries in seconds (default: 10)
205
214
  logLevel?: LogLevel; // Log level: fatal | error | warn | info | debug | trace; if omitted logs are disabled
206
215
  disableServerIdentityCheck?: boolean; // Disable server verification (default: false)
207
216
  saveCertsToDir?: string; // Directory to save certificates
@@ -258,6 +267,10 @@ Use a static identifier for non-TEE environments (development/testing only).
258
267
  6. **Certificate Export** (optional): Saves client certificates for external use
259
268
  7. **Failover**: Automatically tries next server if connection fails
260
269
 
270
+ Retry behavior details:
271
+ - Retries are performed for retryable network/DNS errors (for example: `ECONNRESET`, `ECONNREFUSED`, `ETIMEDOUT`, `EAI_AGAIN`, `ENOTFOUND`) and for HTTP `429`/`502` responses (e.g. throttling or temporary upstream failure behind OpenResty)
272
+ - Retries are performed against the original hostname (SNI-safe), without replacing hostname with direct IPs
273
+
261
274
  ## Error Handling
262
275
 
263
276
  The sync client provides clear error messages for common issues:
package/dist/cli.js CHANGED
@@ -19,6 +19,8 @@ async function sync(argv) {
19
19
  networkID: swarmEnv['pki-authority'].networkID,
20
20
  caBundle: swarmEnv['pki-authority'].caBundle,
21
21
  ownChallenge: argv.ownChallenge,
22
+ retryAttempts: argv.retryAttempts,
23
+ retryDelaySec: argv.retryTimeout,
22
24
  logLevel: argv.logLevel,
23
25
  disableServerIdentityCheck: argv.disableServerIdentityCheck,
24
26
  saveCertsToDir: argv.saveCertsToDir,
@@ -49,15 +51,25 @@ async function main() {
49
51
  demandOption: true,
50
52
  })
51
53
  .option('own-challenge', {
52
- describe: 'Own challenge string for authentication (auto, tdx, sev, untrusted)',
54
+ describe: 'Own challenge string for authentication (auto, tdx, sev-snp, untrusted)',
53
55
  type: 'string',
54
56
  default: 'auto',
55
57
  })
56
58
  .option('log-level', {
57
59
  alias: 'l',
58
- describe: 'Log level: fatal, error, warn, info, debug, trace',
60
+ describe: 'Log level',
59
61
  choices: Object.values(pki_common_1.LogLevel),
60
62
  type: 'string',
63
+ })
64
+ .option('retry-attempts', {
65
+ describe: 'Number of retry attempts per server for retryable network/DNS errors',
66
+ type: 'number',
67
+ default: 3,
68
+ })
69
+ .option('retry-timeout', {
70
+ describe: 'Timeout between retries in seconds for retryable network/DNS errors',
71
+ type: 'number',
72
+ default: 10,
61
73
  })
62
74
  .option('disable-server-identity-check', {
63
75
  describe: 'Disable server identity verification',
@@ -84,4 +96,4 @@ main().catch((error) => {
84
96
  console.error('Error:', error.message);
85
97
  process.exit(1);
86
98
  });
87
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2xpLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vc3JjL2NsaS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7QUFDQSxrREFBMEI7QUFDMUIsMkNBQXdDO0FBQ3hDLHFDQUFzRDtBQUN0RCwrQ0FBMkM7QUFDM0MsMkRBQXNEO0FBRXRELE1BQU0sc0JBQXNCLEdBQUcsMEJBQTBCLENBQUM7QUFFMUQsS0FBSyxVQUFVLElBQUksQ0FBQyxJQUFTO0lBQ3pCLElBQUksQ0FBQztRQUNELE1BQU0sTUFBTSxHQUFHLElBQUEsb0JBQVcsRUFBQyxJQUFJLENBQUMsTUFBTSxDQUFDLENBQUM7UUFDeEMsTUFBTSxRQUFRLEdBQUcsSUFBQSxzQkFBYSxFQUFDLElBQUksQ0FBQyxRQUFRLENBQUMsQ0FBQztRQUU5QyxNQUFNLE1BQU0sR0FBRyxJQUFJLHdCQUFVLENBQUM7WUFDMUIsT0FBTyxFQUFFLFFBQVEsQ0FBQyxlQUFlLENBQUMsQ0FBQyxPQUFPO1lBQzFDLFNBQVMsRUFBRSxRQUFRLENBQUMsZUFBZSxDQUFDLENBQUMsU0FBUztZQUM5QyxRQUFRLEVBQUUsUUFBUSxDQUFDLGVBQWUsQ0FBQyxDQUFDLFFBQVE7WUFDNUMsWUFBWSxFQUFFLElBQUksQ0FBQyxZQUFZO1lBQy9CLFFBQVEsRUFBRSxJQUFJLENBQUMsUUFBUTtZQUN2QiwwQkFBMEIsRUFBRSxJQUFJLENBQUMsMEJBQTBCO1lBQzNELGNBQWMsRUFBRSxJQUFJLENBQUMsY0FBYztZQUNuQyxlQUFlLEVBQUUsSUFBSSxDQUFDLGVBQWU7U0FDeEMsQ0FBQyxDQUFDO1FBRUgsTUFBTSxNQUFNLENBQUMsSUFBSSxDQUFDLE1BQU0sQ0FBQyxDQUFDO1FBRTFCLE9BQU8sQ0FBQyxHQUFHLENBQUMsNkJBQTZCLENBQUMsQ0FBQztJQUMvQyxDQUFDO0lBQUMsT0FBTyxLQUFVLEVBQUUsQ0FBQztRQUNsQixPQUFPLENBQUMsS0FBSyxDQUFDLGNBQWMsRUFBRSxLQUFLLENBQUMsT0FBTyxDQUFDLENBQUM7UUFDN0MsT0FBTyxDQUFDLElBQUksQ0FBQyxDQUFDLENBQUMsQ0FBQztJQUNwQixDQUFDO0FBQ0wsQ0FBQztBQUVELEtBQUssVUFBVSxJQUFJO0lBQ2YsTUFBTSxJQUFBLGVBQUssRUFBQyxJQUFBLGlCQUFPLEVBQUMsT0FBTyxDQUFDLElBQUksQ0FBQyxDQUFDO1NBQzdCLEtBQUssQ0FBQywwQkFBMEIsQ0FBQztTQUNqQyxPQUFPLENBQ0osTUFBTSxFQUNOLDhCQUE4QixFQUM5QixDQUFDLEtBQUssRUFBRSxFQUFFO1FBQ04sT0FBTyxLQUFLO2FBQ1AsTUFBTSxDQUFDLFdBQVcsRUFBRTtZQUNqQixRQUFRLEVBQUUseUNBQXlDO1lBQ25ELElBQUksRUFBRSxRQUFRO1lBQ2QsT0FBTyxFQUFFLHNCQUFzQjtTQUNsQyxDQUFDO2FBQ0QsTUFBTSxDQUFDLFFBQVEsRUFBRTtZQUNkLEtBQUssRUFBRSxHQUFHO1lBQ1YsUUFBUSxFQUFFLG9DQUFvQztZQUM5QyxJQUFJLEVBQUUsUUFBUTtZQUNkLFlBQVksRUFBRSxJQUFJO1NBQ3JCLENBQUM7YUFDRCxNQUFNLENBQUMsZUFBZSxFQUFFO1lBQ3JCLFFBQVEsRUFDSixxRUFBcUU7WUFDekUsSUFBSSxFQUFFLFFBQVE7WUFDZCxPQUFPLEVBQUUsTUFBTTtTQUNsQixDQUFDO2FBQ0QsTUFBTSxDQUFDLFdBQVcsRUFBRTtZQUNqQixLQUFLLEVBQUUsR0FBRztZQUNWLFFBQVEsRUFDSixtREFBbUQ7WUFDdkQsT0FBTyxFQUFFLE1BQU0sQ0FBQyxNQUFNLENBQUMscUJBQVEsQ0FBQztZQUNoQyxJQUFJLEVBQUUsUUFBUTtTQUNqQixDQUFDO2FBQ0QsTUFBTSxDQUFDLCtCQUErQixFQUFFO1lBQ3JDLFFBQVEsRUFBRSxzQ0FBc0M7WUFDaEQsSUFBSSxFQUFFLFNBQVM7WUFDZixPQUFPLEVBQUUsS0FBSztTQUNqQixDQUFDO2FBQ0QsTUFBTSxDQUFDLG1CQUFtQixFQUFFO1lBQ3pCLFFBQVEsRUFDSixtRUFBbUU7WUFDdkUsSUFBSSxFQUFFLFFBQVE7U0FDakIsQ0FBQzthQUNELE1BQU0sQ0FBQyxtQkFBbUIsRUFBRTtZQUN6QixRQUFRLEVBQ0oscUVBQXFFO1lBQ3pFLElBQUksRUFBRSxRQUFRO1NBQ2pCLENBQUMsQ0FBQztJQUNYLENBQUMsRUFDRCxJQUFJLENBQ1A7U0FDQSxhQUFhLENBQUMsQ0FBQyxFQUFFLDRCQUE0QixDQUFDO1NBQzlDLElBQUksRUFBRTtTQUNOLEtBQUssQ0FBQyxNQUFNLEVBQUUsR0FBRyxDQUFDO1NBQ2xCLE9BQU8sRUFBRTtTQUNULEtBQUssQ0FBQyxTQUFTLEVBQUUsR0FBRyxDQUFDO1NBQ3JCLEtBQUssRUFBRSxDQUFDO0FBQ2pCLENBQUM7QUFFRCxJQUFJLEVBQUUsQ0FBQyxLQUFLLENBQUMsQ0FBQyxLQUFLLEVBQUUsRUFBRTtJQUNuQixPQUFPLENBQUMsS0FBSyxDQUFDLFFBQVEsRUFBRSxLQUFLLENBQUMsT0FBTyxDQUFDLENBQUM7SUFDdkMsT0FBTyxDQUFDLElBQUksQ0FBQyxDQUFDLENBQUMsQ0FBQztBQUNwQixDQUFDLENBQUMsQ0FBQyJ9
99
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,22 +1,36 @@
1
1
  import { SyncConfig } from './config';
2
- import { LogLevel } from '@super-protocol/pki-common';
2
+ import { LogLevel, type DetectedCpuType } from '@super-protocol/pki-common';
3
3
  export interface SyncClientOptions {
4
4
  servers: string[];
5
5
  networkID: string;
6
6
  caBundle: string;
7
- ownChallenge: string;
7
+ ownChallenge: DetectedCpuType | 'auto';
8
+ retryAttempts?: number;
9
+ retryDelaySec?: number;
8
10
  logLevel?: LogLevel;
9
11
  disableServerIdentityCheck?: boolean;
10
12
  saveCertsToDir?: string;
11
13
  saveCertsPrefix?: string;
12
14
  }
13
15
  export declare class SyncClient {
16
+ private static readonly DEFAULT_RETRY_ATTEMPTS;
17
+ private static readonly DEFAULT_RETRY_DELAY_SEC;
18
+ private static readonly RETRYABLE_NETWORK_ERROR_CODES;
19
+ private static readonly RETRYABLE_HTTP_STATUS_CODES;
14
20
  private options;
15
21
  private challenge;
16
- private logger?;
22
+ private logger;
23
+ private retryAttempts;
24
+ private retryDelaySec;
17
25
  private static resolveLogger;
18
- private static detectCpuType;
19
26
  constructor(options: SyncClientOptions);
27
+ private static normalizeRetryAttempts;
28
+ private static normalizeRetryDelaySec;
29
+ private static evaluateRetry;
30
+ private static waitRetryDelay;
31
+ private fetchSecrets;
32
+ private saveSecrets;
33
+ private saveArtifacts;
20
34
  private saveCertificates;
21
35
  sync(config: SyncConfig): Promise<void>;
22
36
  }
@@ -33,12 +33,25 @@ const axios_1 = __importDefault(require("axios"));
33
33
  const fs = __importStar(require("fs"));
34
34
  const path = __importStar(require("path"));
35
35
  class SyncClient {
36
+ static DEFAULT_RETRY_ATTEMPTS = 3;
37
+ static DEFAULT_RETRY_DELAY_SEC = 10;
38
+ static RETRYABLE_NETWORK_ERROR_CODES = new Set([
39
+ 'ETIMEDOUT',
40
+ 'ECONNRESET',
41
+ 'ECONNREFUSED',
42
+ 'EAI_AGAIN',
43
+ 'ENOTFOUND',
44
+ 'ECONNABORTED',
45
+ ]);
46
+ static RETRYABLE_HTTP_STATUS_CODES = new Set([429, 502]);
36
47
  options;
37
48
  challenge;
38
49
  logger;
50
+ retryAttempts;
51
+ retryDelaySec;
39
52
  static resolveLogger(options) {
40
53
  if (options.logLevel == null) {
41
- return undefined;
54
+ return new pki_common_1.CommonMockLog();
42
55
  }
43
56
  const allowedLevels = Object.values(pki_common_1.LogLevel);
44
57
  if (!allowedLevels.includes(options.logLevel)) {
@@ -46,48 +59,108 @@ class SyncClient {
46
59
  }
47
60
  return new pki_common_1.CommonPinoLog(options.logLevel);
48
61
  }
49
- static detectCpuType() {
50
- try {
51
- const tdxPath = '/dev/tdx_guest';
52
- const sevPath = '/dev/sev-guest';
53
- if (fs.existsSync(tdxPath)) {
54
- const stats = fs.statSync(tdxPath);
55
- if (stats.isCharacterDevice()) {
56
- return 'tdx';
57
- }
58
- }
59
- if (fs.existsSync(sevPath)) {
60
- const stats = fs.statSync(sevPath);
61
- if (stats.isCharacterDevice()) {
62
- return 'sev';
63
- }
64
- }
65
- }
66
- catch (error) {
67
- // If we can't check devices, fall back to untrusted
68
- }
69
- return 'untrusted';
70
- }
71
62
  constructor(options) {
72
63
  this.options = options;
73
64
  this.logger = SyncClient.resolveLogger(options);
65
+ this.retryAttempts = SyncClient.normalizeRetryAttempts(options.retryAttempts);
66
+ this.retryDelaySec = SyncClient.normalizeRetryDelaySec(options.retryDelaySec);
74
67
  const challengeType = options.ownChallenge === 'auto'
75
- ? SyncClient.detectCpuType()
68
+ ? (0, pki_common_1.detectCpuType)()
76
69
  : options.ownChallenge;
77
- if (challengeType === 'tdx') {
70
+ if (challengeType === pki_common_1.ChallengeType.TDX) {
78
71
  this.challenge = { type: pki_common_1.ChallengeType.TDX };
79
72
  }
80
- else if (challengeType === 'sev') {
73
+ else if (challengeType === pki_common_1.ChallengeType.SEVSNP) {
81
74
  this.challenge = { type: pki_common_1.ChallengeType.SEVSNP };
82
75
  }
83
- else if (challengeType === 'untrusted') {
76
+ else if (challengeType === pki_common_1.ChallengeType.Untrusted) {
84
77
  this.challenge = {
85
78
  type: pki_common_1.ChallengeType.Untrusted,
86
79
  idHex: Buffer.from('pki-sync-client-untrusted-id').toString('hex'),
87
80
  };
88
81
  }
89
82
  else {
90
- throw new Error(`Unsupported challenge type: ${challengeType}. Supported: tdx, sev, untrusted, auto`);
83
+ throw new Error(`Unsupported challenge type: ${challengeType}. Supported: tdx, sev-snp, untrusted, auto`);
84
+ }
85
+ }
86
+ static normalizeRetryAttempts(value) {
87
+ if (value == null) {
88
+ return SyncClient.DEFAULT_RETRY_ATTEMPTS;
89
+ }
90
+ if (!Number.isInteger(value) || value < 1) {
91
+ throw new Error('Invalid retryAttempts: must be an integer greater than or equal to 1');
92
+ }
93
+ return value;
94
+ }
95
+ static normalizeRetryDelaySec(value) {
96
+ if (value == null) {
97
+ return SyncClient.DEFAULT_RETRY_DELAY_SEC;
98
+ }
99
+ if (!Number.isInteger(value) || value < 0) {
100
+ throw new Error('Invalid retryDelaySec: must be an integer greater than or equal to 0');
101
+ }
102
+ return value;
103
+ }
104
+ static evaluateRetry(error) {
105
+ if (!axios_1.default.isAxiosError(error)) {
106
+ return {
107
+ isRetryable: false,
108
+ reason: 'non-axios-error',
109
+ };
110
+ }
111
+ const httpStatus = error.response?.status;
112
+ if (httpStatus != null) {
113
+ const reason = `http-status:${httpStatus}`;
114
+ return {
115
+ isRetryable: SyncClient.RETRYABLE_HTTP_STATUS_CODES.has(httpStatus),
116
+ reason,
117
+ };
118
+ }
119
+ const errorCode = error.code;
120
+ if (errorCode != null) {
121
+ const reason = `network-code:${errorCode}`;
122
+ return {
123
+ isRetryable: SyncClient.RETRYABLE_NETWORK_ERROR_CODES.has(errorCode),
124
+ reason,
125
+ };
126
+ }
127
+ return {
128
+ isRetryable: false,
129
+ reason: 'unknown-axios-error',
130
+ };
131
+ }
132
+ static async waitRetryDelay(delaySec) {
133
+ if (delaySec <= 0) {
134
+ return;
135
+ }
136
+ await new Promise((resolve) => {
137
+ setTimeout(resolve, delaySec * 1000);
138
+ });
139
+ }
140
+ async fetchSecrets(server, config, httpsAgent) {
141
+ const secretNames = config.secrets.map((s) => s.secretName);
142
+ const response = await axios_1.default.post(`https://${server}/api/v1/secrets/get`, { objects: secretNames }, { httpsAgent });
143
+ return response.data.secrets;
144
+ }
145
+ async saveSecrets(config, secrets) {
146
+ for (const secret of config.secrets) {
147
+ const base64Content = secrets[secret.secretName];
148
+ if (base64Content == null) {
149
+ throw new Error(`Secret "${secret.secretName}" not found in response`);
150
+ }
151
+ const dir = path.dirname(secret.saveTo);
152
+ await fs.promises.mkdir(dir, { recursive: true });
153
+ await fs.promises.writeFile(secret.saveTo, base64Content, {
154
+ encoding: 'base64',
155
+ mode: 0o600,
156
+ });
157
+ this.logger.info(`Saved secret "${secret.secretName}" to ${secret.saveTo}`);
158
+ }
159
+ }
160
+ async saveArtifacts(config, secrets, pkiClientFactory) {
161
+ await this.saveSecrets(config, secrets);
162
+ if (this.options.saveCertsToDir) {
163
+ await this.saveCertificates(pkiClientFactory, this.options.saveCertsToDir, this.options.saveCertsPrefix);
91
164
  }
92
165
  }
93
166
  async saveCertificates(pkiClientFactory, certsDir, prefix) {
@@ -101,23 +174,25 @@ class SyncClient {
101
174
  await fs.promises.writeFile(keyPath, cert.keyPair.privateKeyPem, {
102
175
  mode: 0o600,
103
176
  });
104
- this.logger?.info(`Saved private key to ${keyPath}`);
177
+ this.logger.info(`Saved private key to ${keyPath}`);
105
178
  // Save CA certificate
106
179
  const caPath = path.join(certsDir, `${prefixStr}ca.pem`);
107
180
  await fs.promises.writeFile(caPath, ca, { mode: 0o644 });
108
- this.logger?.info(`Saved CA certificate to ${caPath}`);
181
+ this.logger.info(`Saved CA certificate to ${caPath}`);
109
182
  // Save client certificate with intermediate chain
110
183
  const certWithIntermediate = clientCert + intermediateCertificates;
111
184
  const certPath = path.join(certsDir, `${prefixStr}cert.pem`);
112
185
  await fs.promises.writeFile(certPath, certWithIntermediate, {
113
186
  mode: 0o644,
114
187
  });
115
- this.logger?.info(`Saved certificate chain to ${certPath}`);
188
+ this.logger.info(`Saved certificate chain to ${certPath}`);
116
189
  }
117
190
  async sync(config) {
118
191
  for (const server of this.options.servers) {
192
+ let pkiClientFactory;
193
+ let httpsAgent;
119
194
  try {
120
- this.logger?.info(`Trying server: ${server}`);
195
+ this.logger.info(`Trying server: ${server}`);
121
196
  const pkiConfig = {
122
197
  clientCertProvider: {
123
198
  type: 'pki-ca',
@@ -128,43 +203,56 @@ class SyncClient {
128
203
  },
129
204
  networkID: this.options.networkID,
130
205
  };
131
- const pkiClientFactory = new pki_client_1.PkiClientFactory(pkiConfig, this.logger);
132
- const httpsAgent = await pkiClientFactory.getHTTPSAgent();
133
- // Collect all secret names
134
- const secretNames = config.secrets.map((s) => s.secretName);
135
- // Make POST request to fetch secrets
136
- const response = await axios_1.default.post(`https://${server}/api/v1/secrets/get`, { objects: secretNames }, { httpsAgent });
137
- const result = response.data;
138
- // Write secrets to files
139
- for (const secret of config.secrets) {
140
- const base64Content = result.secrets[secret.secretName];
141
- if (base64Content == null) {
142
- throw new Error(`Secret "${secret.secretName}" not found in response`);
143
- }
144
- // Ensure directory exists
145
- const dir = path.dirname(secret.saveTo);
146
- await fs.promises.mkdir(dir, { recursive: true });
147
- await fs.promises.writeFile(secret.saveTo, base64Content, {
148
- encoding: 'base64',
149
- mode: 0o600,
150
- });
151
- this.logger?.info(`Saved secret "${secret.secretName}" to ${secret.saveTo}`);
206
+ pkiClientFactory = new pki_client_1.PkiClientFactory(pkiConfig, this.logger);
207
+ httpsAgent = await pkiClientFactory.getHTTPSAgent();
208
+ }
209
+ catch (error) {
210
+ const errorMessage = error instanceof Error ? error.message : String(error);
211
+ this.logger.error(`Failed to prepare client for server ${server}: ${errorMessage}. Reason: non-axios-error`);
212
+ continue;
213
+ }
214
+ let fetchedSecrets;
215
+ for (let attempt = 1; attempt <= this.retryAttempts; attempt++) {
216
+ try {
217
+ this.logger.info(`POST attempt ${attempt}/${this.retryAttempts} for server: ${server}`);
218
+ fetchedSecrets = await this.fetchSecrets(server, config, httpsAgent);
219
+ break;
152
220
  }
153
- // Save certificates if directory is specified
154
- if (this.options.saveCertsToDir) {
155
- await this.saveCertificates(pkiClientFactory, this.options.saveCertsToDir, this.options.saveCertsPrefix);
221
+ catch (error) {
222
+ const errorMessage = error instanceof Error ? error.message : String(error);
223
+ const retryDecision = SyncClient.evaluateRetry(error);
224
+ const hasMoreAttempts = attempt < this.retryAttempts;
225
+ this.logger.error(`Failed attempt ${attempt}/${this.retryAttempts} for server ${server}: ${errorMessage}. Reason: ${retryDecision.reason}`);
226
+ if (!retryDecision.isRetryable) {
227
+ this.logger.error(`Error is not retryable for server ${server}; moving to next server. Reason: ${retryDecision.reason}`);
228
+ break;
229
+ }
230
+ if (!hasMoreAttempts) {
231
+ this.logger.error(`Retry attempts exhausted for server ${server}; moving to next server. Reason: ${retryDecision.reason}`);
232
+ break;
233
+ }
234
+ this.logger.info(`Retrying server ${server} in ${this.retryDelaySec} second(s). Reason: ${retryDecision.reason}`);
235
+ await SyncClient.waitRetryDelay(this.retryDelaySec);
156
236
  }
157
- this.logger?.info(`Successfully synced from server: ${server}`);
158
- return; // Success - exit from method
237
+ }
238
+ if (fetchedSecrets == null) {
239
+ continue;
240
+ }
241
+ try {
242
+ await this.saveArtifacts(config, fetchedSecrets, pkiClientFactory);
243
+ this.logger.info(`Successfully synced from server: ${server}`);
244
+ return;
159
245
  }
160
246
  catch (error) {
161
247
  const errorMessage = error instanceof Error ? error.message : String(error);
162
- this.logger?.error(`Failed to sync from server ${server}: ${errorMessage}`);
163
- // Continue to next server
248
+ const reason = axios_1.default.isAxiosError(error)
249
+ ? SyncClient.evaluateRetry(error).reason
250
+ : 'unknown-post-error';
251
+ this.logger.error(`Failed to process sync results for server ${server}: ${errorMessage}. Reason: ${reason}`);
164
252
  }
165
253
  }
166
254
  throw new Error('Failed to sync from all servers');
167
255
  }
168
256
  }
169
257
  exports.SyncClient = SyncClient;
170
- //# sourceMappingURL=data:application/json;base64,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
258
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sync-client.js","sourceRoot":"","sources":["../src/sync-client.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AACA,2DAIoC;AACpC,2DASoC;AACpC,kDAA0B;AAC1B,uCAAyB;AACzB,2CAA6B;AAe7B,MAAa,UAAU;IACX,MAAM,CAAU,sBAAsB,GAAG,CAAC,CAAC;IAC3C,MAAM,CAAU,uBAAuB,GAAG,EAAE,CAAC;IAC7C,MAAM,CAAU,6BAA6B,GAAG,IAAI,GAAG,CAAC;QAC5D,WAAW;QACX,YAAY;QACZ,cAAc;QACd,WAAW;QACX,WAAW;QACX,cAAc;KACjB,CAAC,CAAC;IACK,MAAM,CAAU,2BAA2B,GAAG,IAAI,GAAG,CAAC,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;IAElE,OAAO,CAAoB;IAC3B,SAAS,CAAkB;IAC3B,MAAM,CAAM;IACZ,aAAa,CAAS;IACtB,aAAa,CAAS;IAEtB,MAAM,CAAC,aAAa,CAAC,OAA0B;QACnD,IAAI,OAAO,CAAC,QAAQ,IAAI,IAAI,EAAE,CAAC;YAC3B,OAAO,IAAI,0BAAO,EAAE,CAAC;QACzB,CAAC;QAED,MAAM,aAAa,GAAG,MAAM,CAAC,MAAM,CAAC,qBAAQ,CAAa,CAAC;QAC1D,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC5C,MAAM,IAAI,KAAK,CACX,0BAA0B,OAAO,CAAC,QAAQ,gBAAgB,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CACvF,CAAC;QACN,CAAC;QAED,OAAO,IAAI,0BAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;IACzC,CAAC;IAED,YAAY,OAA0B;QAClC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,UAAU,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,aAAa,GAAG,UAAU,CAAC,sBAAsB,CAClD,OAAO,CAAC,aAAa,CACxB,CAAC;QACF,IAAI,CAAC,aAAa,GAAG,UAAU,CAAC,sBAAsB,CAClD,OAAO,CAAC,aAAa,CACxB,CAAC;QAEF,MAAM,aAAa,GACf,OAAO,CAAC,YAAY,KAAK,MAAM;YAC3B,CAAC,CAAC,IAAA,0BAAa,GAAE;YACjB,CAAC,CAAC,OAAO,CAAC,YAAY,CAAC;QAE/B,IAAI,aAAa,KAAK,0BAAa,CAAC,GAAG,EAAE,CAAC;YACtC,IAAI,CAAC,SAAS,GAAG,EAAE,IAAI,EAAE,0BAAa,CAAC,GAAG,EAAE,CAAC;QACjD,CAAC;aAAM,IAAI,aAAa,KAAK,0BAAa,CAAC,MAAM,EAAE,CAAC;YAChD,IAAI,CAAC,SAAS,GAAG,EAAE,IAAI,EAAE,0BAAa,CAAC,MAAM,EAAE,CAAC;QACpD,CAAC;aAAM,IAAI,aAAa,KAAK,0BAAa,CAAC,SAAS,EAAE,CAAC;YACnD,IAAI,CAAC,SAAS,GAAG;gBACb,IAAI,EAAE,0BAAa,CAAC,SAAS;gBAC7B,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,QAAQ,CACvD,KAAK,CACR;aACJ,CAAC;QACN,CAAC;aAAM,CAAC;YACJ,MAAM,IAAI,KAAK,CACX,+BAA+B,aAAa,4CAA4C,CAC3F,CAAC;QACN,CAAC;IACL,CAAC;IAEO,MAAM,CAAC,sBAAsB,CAAC,KAAyB;QAC3D,IAAI,KAAK,IAAI,IAAI,EAAE,CAAC;YAChB,OAAO,UAAU,CAAC,sBAAsB,CAAC;QAC7C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CACX,sEAAsE,CACzE,CAAC;QACN,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,sBAAsB,CAAC,KAAyB;QAC3D,IAAI,KAAK,IAAI,IAAI,EAAE,CAAC;YAChB,OAAO,UAAU,CAAC,uBAAuB,CAAC;QAC9C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,IAAI,KAAK,GAAG,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CACX,sEAAsE,CACzE,CAAC;QACN,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,aAAa,CAAC,KAAc;QAIvC,IAAI,CAAC,eAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE,CAAC;YAC7B,OAAO;gBACH,WAAW,EAAE,KAAK;gBAClB,MAAM,EAAE,iBAAiB;aAC5B,CAAC;QACN,CAAC;QAED,MAAM,UAAU,GAAG,KAAK,CAAC,QAAQ,EAAE,MAAM,CAAC;QAC1C,IAAI,UAAU,IAAI,IAAI,EAAE,CAAC;YACrB,MAAM,MAAM,GAAG,eAAe,UAAU,EAAE,CAAC;YAC3C,OAAO;gBACH,WAAW,EACP,UAAU,CAAC,2BAA2B,CAAC,GAAG,CAAC,UAAU,CAAC;gBAC1D,MAAM;aACT,CAAC;QACN,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,CAAC;QAC7B,IAAI,SAAS,IAAI,IAAI,EAAE,CAAC;YACpB,MAAM,MAAM,GAAG,gBAAgB,SAAS,EAAE,CAAC;YAC3C,OAAO;gBACH,WAAW,EACP,UAAU,CAAC,6BAA6B,CAAC,GAAG,CAAC,SAAS,CAAC;gBAC3D,MAAM;aACT,CAAC;QACN,CAAC;QAED,OAAO;YACH,WAAW,EAAE,KAAK;YAClB,MAAM,EAAE,qBAAqB;SAChC,CAAC;IACN,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,cAAc,CAAC,QAAgB;QAChD,IAAI,QAAQ,IAAI,CAAC,EAAE,CAAC;YAChB,OAAO;QACX,CAAC;QAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAC1B,UAAU,CAAC,OAAO,EAAE,QAAQ,GAAG,IAAI,CAAC,CAAC;QACzC,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,KAAK,CAAC,YAAY,CACtB,MAAc,EACd,MAAkB,EAClB,UAAkE;QAElE,MAAM,WAAW,GAAG,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC;QAE5D,MAAM,QAAQ,GAAG,MAAM,eAAK,CAAC,IAAI,CAC7B,WAAW,MAAM,qBAAqB,EACtC,EAAE,OAAO,EAAE,WAAW,EAAE,EACxB,EAAE,UAAU,EAAE,CACjB,CAAC;QAEF,OAAO,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC;IACjC,CAAC;IAEO,KAAK,CAAC,WAAW,CACrB,MAAkB,EAClB,OAA+B;QAE/B,KAAK,MAAM,MAAM,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;YAClC,MAAM,aAAa,GAAG,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACjD,IAAI,aAAa,IAAI,IAAI,EAAE,CAAC;gBACxB,MAAM,IAAI,KAAK,CACX,WAAW,MAAM,CAAC,UAAU,yBAAyB,CACxD,CAAC;YACN,CAAC;YAED,MAAM,GAAG,GAAG,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACxC,MAAM,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,GAAG,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;YAElD,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,MAAM,EAAE,aAAa,EAAE;gBACtD,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,KAAK;aACd,CAAC,CAAC;YAEH,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,iBAAiB,MAAM,CAAC,UAAU,QAAQ,MAAM,CAAC,MAAM,EAAE,CAC5D,CAAC;QACN,CAAC;IACL,CAAC;IAEO,KAAK,CAAC,aAAa,CACvB,MAAkB,EAClB,OAA+B,EAC/B,gBAAkC;QAElC,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAExC,IAAI,IAAI,CAAC,OAAO,CAAC,cAAc,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,gBAAgB,CACvB,gBAAgB,EAChB,IAAI,CAAC,OAAO,CAAC,cAAc,EAC3B,IAAI,CAAC,OAAO,CAAC,eAAe,CAC/B,CAAC;QACN,CAAC;IACL,CAAC;IAEO,KAAK,CAAC,gBAAgB,CAC1B,gBAAkC,EAClC,QAAgB,EAChB,MAAe;QAEf,0BAA0B;QAC1B,MAAM,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,QAAQ,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAEvD,MAAM,IAAI,GAAG,MAAM,gBAAgB,CAAC,OAAO,EAAE,CAAC;QAC9C,MAAM,EACF,IAAI,EAAE,UAAU,EAChB,wBAAwB,EACxB,EAAE,GACL,GAAG,IAAA,4CAA+B,EAAC,IAAI,CAAC,CAAC;QAE1C,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,MAAM,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;QAE7C,mBAAmB;QACnB,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,SAAS,CAAC,CAAC;QAC3D,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,aAAa,EAAE;YAC7D,IAAI,EAAE,KAAK;SACd,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wBAAwB,OAAO,EAAE,CAAC,CAAC;QAEpD,sBAAsB;QACtB,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,QAAQ,CAAC,CAAC;QACzD,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,MAAM,EAAE,EAAE,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,CAAC,CAAC;QACzD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,2BAA2B,MAAM,EAAE,CAAC,CAAC;QAEtD,kDAAkD;QAClD,MAAM,oBAAoB,GAAG,UAAU,GAAG,wBAAwB,CAAC;QACnE,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,GAAG,SAAS,UAAU,CAAC,CAAC;QAC7D,MAAM,EAAE,CAAC,QAAQ,CAAC,SAAS,CAAC,QAAQ,EAAE,oBAAoB,EAAE;YACxD,IAAI,EAAE,KAAK;SACd,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,QAAQ,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,KAAK,CAAC,IAAI,CAAC,MAAkB;QACzB,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;YACxC,IAAI,gBAAkC,CAAC;YACvC,IAAI,UAEH,CAAC;YAEF,IAAI,CAAC;gBACD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,MAAM,EAAE,CAAC,CAAC;gBAE7C,MAAM,SAAS,GAAoB;oBAC/B,kBAAkB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,OAAO,EAAE,WAAW,MAAM,aAAa;wBACvC,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;wBAC/B,0BAA0B,EACtB,IAAI,CAAC,OAAO,CAAC,0BAA0B,IAAI,KAAK;qBACvD;oBACD,SAAS,EAAE,IAAI,CAAC,OAAO,CAAC,SAAS;iBACpC,CAAC;gBAEF,gBAAgB,GAAG,IAAI,6BAAgB,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;gBAChE,UAAU,GAAG,MAAM,gBAAgB,CAAC,aAAa,EAAE,CAAC;YACxD,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,YAAY,GACd,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAC3D,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,uCAAuC,MAAM,KAAK,YAAY,2BAA2B,CAC5F,CAAC;gBACF,SAAS;YACb,CAAC;YAED,IAAI,cAAkD,CAAC;YAEvD,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,IAAI,IAAI,CAAC,aAAa,EAAE,OAAO,EAAE,EAAE,CAAC;gBAC7D,IAAI,CAAC;oBACD,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,gBAAgB,OAAO,IAAI,IAAI,CAAC,aAAa,gBAAgB,MAAM,EAAE,CACxE,CAAC;oBAEF,cAAc,GAAG,MAAM,IAAI,CAAC,YAAY,CACpC,MAAM,EACN,MAAM,EACN,UAAU,CACb,CAAC;oBACF,MAAM;gBACV,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACb,MAAM,YAAY,GACd,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;oBAC3D,MAAM,aAAa,GAAG,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;oBACtD,MAAM,eAAe,GAAG,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC;oBAErD,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,kBAAkB,OAAO,IAAI,IAAI,CAAC,aAAa,eAAe,MAAM,KAAK,YAAY,aAAa,aAAa,CAAC,MAAM,EAAE,CAC3H,CAAC;oBAEF,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,CAAC;wBAC7B,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,qCAAqC,MAAM,oCAAoC,aAAa,CAAC,MAAM,EAAE,CACxG,CAAC;wBACF,MAAM;oBACV,CAAC;oBAED,IAAI,CAAC,eAAe,EAAE,CAAC;wBACnB,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,uCAAuC,MAAM,oCAAoC,aAAa,CAAC,MAAM,EAAE,CAC1G,CAAC;wBACF,MAAM;oBACV,CAAC;oBAED,IAAI,CAAC,MAAM,CAAC,IAAI,CACZ,mBAAmB,MAAM,OAAO,IAAI,CAAC,aAAa,uBAAuB,aAAa,CAAC,MAAM,EAAE,CAClG,CAAC;oBACF,MAAM,UAAU,CAAC,cAAc,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBACxD,CAAC;YACL,CAAC;YAED,IAAI,cAAc,IAAI,IAAI,EAAE,CAAC;gBACzB,SAAS;YACb,CAAC;YAED,IAAI,CAAC;gBACD,MAAM,IAAI,CAAC,aAAa,CACpB,MAAM,EACN,cAAc,EACd,gBAAgB,CACnB,CAAC;gBACF,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,oCAAoC,MAAM,EAAE,CAAC,CAAC;gBAC/D,OAAO;YACX,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,YAAY,GACd,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAC3D,MAAM,MAAM,GAAG,eAAK,CAAC,YAAY,CAAC,KAAK,CAAC;oBACpC,CAAC,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,MAAM;oBACxC,CAAC,CAAC,oBAAoB,CAAC;gBAC3B,IAAI,CAAC,MAAM,CAAC,KAAK,CACb,6CAA6C,MAAM,KAAK,YAAY,aAAa,MAAM,EAAE,CAC5F,CAAC;YACN,CAAC;QACL,CAAC;QAED,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACvD,CAAC;;AArVL,gCAsVC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@super-protocol/pki-sync-client",
3
- "version": "2.0.12",
3
+ "version": "3.0.1",
4
4
  "description": "PKI sync client utility",
5
5
  "main": "dist/index.js",
6
6
  "bin": {
@@ -23,8 +23,8 @@
23
23
  "license": "ISC",
24
24
  "dependencies": {
25
25
  "@sinclair/typebox": "0.33.22",
26
- "@super-protocol/pki-client": "^2.1.8",
27
- "@super-protocol/pki-common": "^2.0.4",
26
+ "@super-protocol/pki-client": "^3.0.0",
27
+ "@super-protocol/pki-common": "^3.0.2",
28
28
  "axios": "^1.7.0",
29
29
  "js-yaml": "^4.1.0",
30
30
  "yargs": "^17.7.2"