@super-protocol/sdk-js 3.12.1-beta.2 → 3.13.0-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (164) hide show
  1. package/dist/cjs/certificates/binary-splitter.d.ts +26 -0
  2. package/dist/cjs/certificates/binary-splitter.js +269 -0
  3. package/dist/cjs/certificates/generator.d.ts +38 -0
  4. package/dist/cjs/certificates/generator.js +248 -0
  5. package/dist/cjs/certificates/helper.d.ts +8 -4
  6. package/dist/cjs/certificates/helper.js +45 -17
  7. package/dist/cjs/certificates/index.d.ts +1 -0
  8. package/dist/cjs/certificates/index.js +2 -1
  9. package/dist/cjs/certificates/ocsp.d.ts +6 -1
  10. package/dist/cjs/certificates/ocsp.js +179 -23
  11. package/dist/cjs/certificates/serializer.d.ts +5 -0
  12. package/dist/cjs/certificates/serializer.js +98 -2
  13. package/dist/cjs/certificates/setup-crypto.d.ts +3 -0
  14. package/dist/cjs/certificates/setup-crypto.js +51 -0
  15. package/dist/cjs/certificates/testing-generate.d.ts +1 -0
  16. package/dist/cjs/certificates/testing-generate.js +115 -0
  17. package/dist/cjs/certificates/types.d.ts +107 -0
  18. package/dist/cjs/certificates/types.js +8 -1
  19. package/dist/cjs/connectors/BlockchainConnector.js +11 -8
  20. package/dist/cjs/connectors/BlockchainEventsListener.d.ts +4 -4
  21. package/dist/cjs/connectors/BlockchainEventsListener.js +9 -8
  22. package/dist/cjs/constants.d.ts +6 -1
  23. package/dist/cjs/constants.js +13 -5
  24. package/dist/cjs/index.d.ts +0 -2
  25. package/dist/cjs/index.js +3 -6
  26. package/dist/cjs/models/Offer.d.ts +1 -1
  27. package/dist/cjs/models/Offer.js +10 -3
  28. package/dist/cjs/models/Order.d.ts +1 -1
  29. package/dist/cjs/models/Order.js +21 -20
  30. package/dist/cjs/models/TeeOffer.d.ts +2 -2
  31. package/dist/cjs/models/TeeOffer.js +18 -3
  32. package/dist/cjs/proto/OrderReport.d.ts +206 -15
  33. package/dist/cjs/proto/OrderReport.js +169 -3
  34. package/dist/cjs/staticModels/ActiveOrders.d.ts +1 -1
  35. package/dist/cjs/staticModels/ActiveOrders.js +1 -1
  36. package/dist/cjs/staticModels/OfferResources.js +3 -4
  37. package/dist/cjs/staticModels/Offers.d.ts +3 -4
  38. package/dist/cjs/staticModels/Offers.js +16 -17
  39. package/dist/cjs/staticModels/OffersCommon.d.ts +18 -0
  40. package/dist/cjs/staticModels/OffersCommon.js +79 -0
  41. package/dist/cjs/staticModels/Orders.d.ts +6 -5
  42. package/dist/cjs/staticModels/Orders.js +96 -5
  43. package/dist/cjs/staticModels/SecretRequests.js +2 -3
  44. package/dist/cjs/staticModels/StaticModel.d.ts +14 -2
  45. package/dist/cjs/staticModels/StaticModel.js +90 -2
  46. package/dist/cjs/staticModels/SuperproToken.d.ts +26 -1
  47. package/dist/cjs/staticModels/SuperproToken.js +40 -1
  48. package/dist/cjs/staticModels/TeeOffers.d.ts +4 -4
  49. package/dist/cjs/staticModels/TeeOffers.js +17 -16
  50. package/dist/cjs/tee/OrderReportService.js +4 -2
  51. package/dist/cjs/tee/QuoteValidator.d.ts +3 -2
  52. package/dist/cjs/tee/QuoteValidator.js +5 -4
  53. package/dist/cjs/tee/TeeCertificateService.d.ts +1 -1
  54. package/dist/cjs/tee/TeeCertificateService.js +11 -14
  55. package/dist/cjs/tee/TeeSignatureVerifier.d.ts +6 -4
  56. package/dist/cjs/tee/TeeSignatureVerifier.js +60 -32
  57. package/dist/cjs/tee/types.d.ts +1 -1
  58. package/dist/cjs/types/Order.d.ts +28 -2
  59. package/dist/cjs/types/Order.js +23 -2
  60. package/dist/cjs/types/index.d.ts +0 -1
  61. package/dist/cjs/types/index.js +1 -2
  62. package/dist/cjs/utils/CryptoKeysTransformer.d.ts +4 -0
  63. package/dist/cjs/utils/CryptoKeysTransformer.js +50 -1
  64. package/dist/cjs/utils/NonceTracker.d.ts +1 -0
  65. package/dist/cjs/utils/NonceTracker.js +6 -2
  66. package/dist/cjs/utils/TxManager.d.ts +3 -0
  67. package/dist/cjs/utils/TxManager.js +88 -35
  68. package/dist/cjs/utils/helper.d.ts +11 -3
  69. package/dist/cjs/utils/helper.js +56 -12
  70. package/dist/cjs/utils/helpers/getRawRpc.d.ts +2 -0
  71. package/dist/cjs/utils/helpers/getRawRpc.js +19 -0
  72. package/dist/cjs/utils/helpers/index.d.ts +1 -0
  73. package/dist/cjs/utils/helpers/index.js +2 -1
  74. package/dist/cjs/utils/types.d.ts +14 -0
  75. package/dist/cjs/utils/types.js +3 -0
  76. package/dist/mjs/certificates/binary-splitter.d.ts +26 -0
  77. package/dist/mjs/certificates/binary-splitter.js +265 -0
  78. package/dist/mjs/certificates/generator.d.ts +38 -0
  79. package/dist/mjs/certificates/generator.js +241 -0
  80. package/dist/mjs/certificates/helper.d.ts +8 -4
  81. package/dist/mjs/certificates/helper.js +45 -17
  82. package/dist/mjs/certificates/index.d.ts +1 -0
  83. package/dist/mjs/certificates/index.js +2 -1
  84. package/dist/mjs/certificates/ocsp.d.ts +6 -1
  85. package/dist/mjs/certificates/ocsp.js +180 -24
  86. package/dist/mjs/certificates/serializer.d.ts +5 -0
  87. package/dist/mjs/certificates/serializer.js +94 -1
  88. package/dist/mjs/certificates/setup-crypto.d.ts +3 -0
  89. package/dist/mjs/certificates/setup-crypto.js +22 -0
  90. package/dist/mjs/certificates/testing-generate.d.ts +1 -0
  91. package/dist/mjs/certificates/testing-generate.js +110 -0
  92. package/dist/mjs/certificates/types.d.ts +107 -0
  93. package/dist/mjs/certificates/types.js +7 -2
  94. package/dist/mjs/connectors/BlockchainConnector.js +11 -8
  95. package/dist/mjs/connectors/BlockchainEventsListener.d.ts +4 -4
  96. package/dist/mjs/connectors/BlockchainEventsListener.js +9 -8
  97. package/dist/mjs/constants.d.ts +6 -1
  98. package/dist/mjs/constants.js +12 -4
  99. package/dist/mjs/index.d.ts +0 -2
  100. package/dist/mjs/index.js +1 -3
  101. package/dist/mjs/models/Offer.d.ts +1 -1
  102. package/dist/mjs/models/Offer.js +10 -3
  103. package/dist/mjs/models/Order.d.ts +1 -1
  104. package/dist/mjs/models/Order.js +22 -21
  105. package/dist/mjs/models/TeeOffer.d.ts +2 -2
  106. package/dist/mjs/models/TeeOffer.js +18 -3
  107. package/dist/mjs/proto/OrderReport.d.ts +206 -15
  108. package/dist/mjs/proto/OrderReport.js +168 -2
  109. package/dist/mjs/staticModels/ActiveOrders.d.ts +1 -1
  110. package/dist/mjs/staticModels/ActiveOrders.js +1 -1
  111. package/dist/mjs/staticModels/OfferResources.js +4 -5
  112. package/dist/mjs/staticModels/Offers.d.ts +3 -4
  113. package/dist/mjs/staticModels/Offers.js +16 -17
  114. package/dist/mjs/staticModels/OffersCommon.d.ts +18 -0
  115. package/dist/mjs/staticModels/OffersCommon.js +73 -0
  116. package/dist/mjs/staticModels/Orders.d.ts +6 -5
  117. package/dist/mjs/staticModels/Orders.js +98 -7
  118. package/dist/mjs/staticModels/SecretRequests.js +3 -4
  119. package/dist/mjs/staticModels/StaticModel.d.ts +14 -2
  120. package/dist/mjs/staticModels/StaticModel.js +90 -2
  121. package/dist/mjs/staticModels/SuperproToken.d.ts +26 -1
  122. package/dist/mjs/staticModels/SuperproToken.js +40 -1
  123. package/dist/mjs/staticModels/TeeOffers.d.ts +4 -4
  124. package/dist/mjs/staticModels/TeeOffers.js +17 -16
  125. package/dist/mjs/tee/OrderReportService.js +4 -2
  126. package/dist/mjs/tee/QuoteValidator.d.ts +3 -2
  127. package/dist/mjs/tee/QuoteValidator.js +5 -4
  128. package/dist/mjs/tee/TeeCertificateService.d.ts +1 -1
  129. package/dist/mjs/tee/TeeCertificateService.js +12 -15
  130. package/dist/mjs/tee/TeeSignatureVerifier.d.ts +6 -4
  131. package/dist/mjs/tee/TeeSignatureVerifier.js +59 -31
  132. package/dist/mjs/tee/types.d.ts +1 -1
  133. package/dist/mjs/types/Order.d.ts +28 -2
  134. package/dist/mjs/types/Order.js +21 -1
  135. package/dist/mjs/types/index.d.ts +0 -1
  136. package/dist/mjs/types/index.js +1 -2
  137. package/dist/mjs/utils/CryptoKeysTransformer.d.ts +4 -0
  138. package/dist/mjs/utils/CryptoKeysTransformer.js +50 -1
  139. package/dist/mjs/utils/NonceTracker.d.ts +1 -0
  140. package/dist/mjs/utils/NonceTracker.js +6 -2
  141. package/dist/mjs/utils/TxManager.d.ts +3 -0
  142. package/dist/mjs/utils/TxManager.js +89 -36
  143. package/dist/mjs/utils/helper.d.ts +11 -3
  144. package/dist/mjs/utils/helper.js +54 -12
  145. package/dist/mjs/utils/helpers/getRawRpc.d.ts +2 -0
  146. package/dist/mjs/utils/helpers/getRawRpc.js +15 -0
  147. package/dist/mjs/utils/helpers/index.d.ts +1 -0
  148. package/dist/mjs/utils/helpers/index.js +2 -1
  149. package/dist/mjs/utils/types.d.ts +14 -0
  150. package/dist/mjs/utils/types.js +2 -0
  151. package/package.json +7 -4
  152. package/readme.md +11 -0
  153. package/dist/cjs/contracts/Campaign.d.ts +0 -1036
  154. package/dist/cjs/contracts/Campaign.js +0 -1347
  155. package/dist/cjs/staticModels/Campaign.d.ts +0 -59
  156. package/dist/cjs/staticModels/Campaign.js +0 -248
  157. package/dist/cjs/types/Campaign.d.ts +0 -57
  158. package/dist/cjs/types/Campaign.js +0 -11
  159. package/dist/mjs/contracts/Campaign.d.ts +0 -1036
  160. package/dist/mjs/contracts/Campaign.js +0 -1344
  161. package/dist/mjs/staticModels/Campaign.d.ts +0 -59
  162. package/dist/mjs/staticModels/Campaign.js +0 -243
  163. package/dist/mjs/types/Campaign.d.ts +0 -57
  164. package/dist/mjs/types/Campaign.js +0 -8
@@ -0,0 +1,241 @@
1
+ import assert from 'assert';
2
+ import { randomUUID } from 'crypto';
3
+ import forge from 'node-forge';
4
+ import { X509CertificateGenerator, BasicConstraintsExtension, ExtendedKeyUsageExtension, Extension, SubjectAlternativeNameExtension, ExtendedKeyUsage, KeyUsageFlags, KeyUsagesExtension, Pkcs10CertificateRequestGenerator, Pkcs10CertificateRequest, X509Certificate, AuthorityInfoAccessExtension, } from '@peculiar/x509';
5
+ import { cryptoProvider } from './setup-crypto.js';
6
+ import { CryptoKeysTransformer } from '../utils/CryptoKeysTransformer.js';
7
+ import { isIpAddress } from '../utils/helper.js';
8
+ const MAX_X509_SERIAL = BigInt('0x' + 'F'.repeat(40));
9
+ const principalAttributeMap = {
10
+ commonName: 'CN',
11
+ country: 'C',
12
+ localityName: 'L',
13
+ stateName: 'ST',
14
+ organization: 'O',
15
+ organizationalUnit: 'OU',
16
+ };
17
+ const notAllowedCertificateCustomExtensions = [...Object.values(forge.pki.oids)];
18
+ export class CertificateGenerator {
19
+ /**
20
+ * Generates certificate based on the provided parameters.
21
+ * @param params - Parameters for generating the certificate.
22
+ * @returns The generated certificate in PEM format.
23
+ */
24
+ static async generateCert(params) {
25
+ const ca = Boolean(params.ca);
26
+ const { publicKey, privateKey } = await CertificateGenerator.getCryptoKeys(params);
27
+ const signingAlgorithm = publicKey.algorithm;
28
+ const extensions = [new BasicConstraintsExtension(ca, undefined, true)];
29
+ const extendedKeyUsageItems = [];
30
+ if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
31
+ const generalNames = params.dnsNames.map((dnsName) => ({
32
+ type: (isIpAddress(dnsName) ? 'ip' : 'dns'),
33
+ value: dnsName,
34
+ }));
35
+ extensions.push(new SubjectAlternativeNameExtension(generalNames));
36
+ extendedKeyUsageItems.push(...[ExtendedKeyUsage.serverAuth, ExtendedKeyUsage.clientAuth]);
37
+ }
38
+ if (params.ocspSigning) {
39
+ extendedKeyUsageItems.push(ExtendedKeyUsage.ocspSigning);
40
+ }
41
+ if (params.ocspExtension) {
42
+ const { ocspUrl, issuerCertUrl } = params.ocspExtension;
43
+ extensions.push(new AuthorityInfoAccessExtension({
44
+ ocsp: [ocspUrl],
45
+ ...(issuerCertUrl ? { caIssuers: [issuerCertUrl] } : {}),
46
+ }));
47
+ }
48
+ if (extendedKeyUsageItems.length) {
49
+ extensions.push(new ExtendedKeyUsageExtension(extendedKeyUsageItems, false));
50
+ }
51
+ let keyUsageFlags = KeyUsageFlags.digitalSignature | KeyUsageFlags.keyEncipherment;
52
+ if (params.ca) {
53
+ keyUsageFlags |= KeyUsageFlags.keyCertSign;
54
+ }
55
+ extensions.push(new KeyUsagesExtension(keyUsageFlags, true));
56
+ if (params.customExtensions?.length) {
57
+ const filteredExtensions = params.customExtensions.filter((ext) => !notAllowedCertificateCustomExtensions.includes(ext.oid));
58
+ for (const customExtension of filteredExtensions) {
59
+ if (!customExtension.oid || !customExtension.value) {
60
+ throw new Error('Custom extension OID and value are required');
61
+ }
62
+ extensions.push(new Extension(customExtension.oid, false, customExtension.value));
63
+ }
64
+ }
65
+ const createCertificateParams = {
66
+ serialNumber: CertificateGenerator.generateSerialNumber(),
67
+ issuer: CertificateGenerator.getPrincipalInfo(params.issuer),
68
+ subject: CertificateGenerator.getPrincipalInfo(params.subject),
69
+ notBefore: new Date(),
70
+ notAfter: params.notAfter,
71
+ publicKey,
72
+ signingKey: privateKey,
73
+ signingAlgorithm,
74
+ extensions,
75
+ };
76
+ const cert = await X509CertificateGenerator.create(createCertificateParams);
77
+ return cert.toString('pem');
78
+ }
79
+ /**
80
+ * Generates a pair of cryptographic keys based on the specified signature algorithm.
81
+ * @param signatureAlgorithm - The algorithm to use for key generation.
82
+ * @returns A promise that resolves to a CryptoKeyPair containing the public and private keys.
83
+ */
84
+ static generateKeys(signatureAlgorithm) {
85
+ const algorithm = CertificateGenerator.getAlgorithm(signatureAlgorithm);
86
+ return cryptoProvider.subtle.generateKey(algorithm, true, ['sign', 'verify']);
87
+ }
88
+ /**
89
+ * Generates a Certificate Signing Request (CSR) based on the provided parameters.
90
+ * @param params - Parameters for generating the CSR.
91
+ * @returns The generated CSR in PEM format.
92
+ */
93
+ static async generateCsr(params) {
94
+ const keys = await CertificateGenerator.getCryptoKeys(params);
95
+ const signingAlgorithm = keys.publicKey.algorithm;
96
+ signingAlgorithm.hash = { name: 'SHA-256' };
97
+ const extensions = [];
98
+ if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
99
+ const generalNames = params.dnsNames.map((dnsName) => ({
100
+ type: (isIpAddress(dnsName) ? 'ip' : 'dns'),
101
+ value: dnsName,
102
+ }));
103
+ extensions.push(new SubjectAlternativeNameExtension(generalNames));
104
+ }
105
+ if (params.customExtensions?.length) {
106
+ for (const customExtension of params.customExtensions) {
107
+ if (!customExtension.oid || !customExtension.value) {
108
+ throw new Error(`Some custom extension missed OID or value`);
109
+ }
110
+ extensions.push(new Extension(customExtension.oid, false, customExtension.value));
111
+ }
112
+ }
113
+ const createCsrParams = {
114
+ name: CertificateGenerator.getPrincipalInfo(params.subject),
115
+ keys,
116
+ signingAlgorithm,
117
+ extensions,
118
+ };
119
+ const csr = await Pkcs10CertificateRequestGenerator.create(createCsrParams);
120
+ return csr.toString('pem');
121
+ }
122
+ /**
123
+ * Checks and parses a certificate in PEM format.
124
+ * @param certPem - The certificate in PEM format.
125
+ * @returns An object containing the parsed certificate details.
126
+ */
127
+ static async checkAndParseCert(certPem) {
128
+ const cert = new X509Certificate(certPem);
129
+ if (cert.issuer === cert.subject) {
130
+ const isValid = await cert.verify();
131
+ if (!isValid) {
132
+ throw new Error('Self-signed certificate signature verification failed');
133
+ }
134
+ }
135
+ const publicKey = await cryptoProvider.subtle.importKey('spki', cert.publicKey.rawData, Object.assign(cert.signatureAlgorithm, cert.publicKey.algorithm), true, ['verify']);
136
+ return {
137
+ serialNumberHex: cert.serialNumber,
138
+ publicKey,
139
+ subject: cert.subject,
140
+ issuer: cert.issuer,
141
+ notBefore: cert.notBefore,
142
+ notAfter: cert.notAfter,
143
+ dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(cert.extensions),
144
+ extensions: cert.extensions
145
+ .filter((ext) => ext.type !== forge.pki.oids['subjectAltName'])
146
+ .map((ext) => ({
147
+ oid: ext.type,
148
+ value: Buffer.from(ext.value),
149
+ })),
150
+ };
151
+ }
152
+ /**
153
+ * Checks and parses a Certificate Signing Request (CSR) in PEM format.
154
+ * @param csrPem - The CSR in PEM format.
155
+ * @returns An object containing the parsed CSR details.
156
+ */
157
+ static async checkAndParseCsr(csrPem) {
158
+ const csr = new Pkcs10CertificateRequest(csrPem);
159
+ const isValid = await csr.verify();
160
+ if (!isValid) {
161
+ throw new Error('CSR signature verification failed');
162
+ }
163
+ const publicKey = await cryptoProvider.subtle.importKey('spki', csr.publicKey.rawData, Object.assign(csr.signatureAlgorithm, csr.publicKey.algorithm), true, ['verify']);
164
+ const parsedCsr = {
165
+ subject: csr.subject,
166
+ publicKey,
167
+ dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(csr.extensions),
168
+ extensions: csr.extensions
169
+ .filter((ext) => ext.type !== forge.pki.oids['subjectAltName'])
170
+ .map((ext) => ({
171
+ oid: ext.type,
172
+ value: Buffer.from(ext.value),
173
+ })),
174
+ };
175
+ return parsedCsr;
176
+ }
177
+ static async getCryptoKeys({ privateKey, publicKey }) {
178
+ const [pubKey, privKey] = await Promise.all([
179
+ typeof publicKey === 'string'
180
+ ? CryptoKeysTransformer.spkiPemToCryptoKey(publicKey)
181
+ : publicKey,
182
+ typeof privateKey === 'string'
183
+ ? CryptoKeysTransformer.pkcs8PemToCryptoKey(privateKey)
184
+ : privateKey,
185
+ ]);
186
+ assert.deepEqual(pubKey.algorithm, privKey.algorithm, 'Both keys must have same algorithm defined');
187
+ return { publicKey: pubKey, privateKey: privKey };
188
+ }
189
+ static generateSerialNumber() {
190
+ const uuid = randomUUID().replace(/-/g, '');
191
+ let serial = BigInt('0x' + uuid) % MAX_X509_SERIAL;
192
+ // Ensure the serial number is positive in ASN1
193
+ if (serial.toString(2)[0] === '1') {
194
+ serial = serial >> 1n;
195
+ }
196
+ return serial.toString(16);
197
+ }
198
+ static getPrincipalInfo(principal) {
199
+ if (typeof principal === 'string') {
200
+ return principal;
201
+ }
202
+ if (!principal.commonName) {
203
+ throw new Error('Common name is required');
204
+ }
205
+ return Object.entries(principal)
206
+ .map(([key, value]) => `${principalAttributeMap[key] || key}=${value}`)
207
+ .join(',');
208
+ }
209
+ static getAlgorithm(signatureAlgorithm) {
210
+ switch (signatureAlgorithm) {
211
+ case 'RSASSA-PKCS1-SHA256':
212
+ return {
213
+ name: 'RSASSA-PKCS1-v1_5',
214
+ hash: 'SHA-256',
215
+ publicExponent: new Uint8Array([1, 0, 1]), // 65537
216
+ modulusLength: 2048,
217
+ };
218
+ case 'ECDSA-P-256-SHA256':
219
+ return {
220
+ name: 'ECDSA',
221
+ namedCurve: 'P-256',
222
+ };
223
+ case 'ECDSA-secp256k1-SHA256':
224
+ return {
225
+ name: 'ECDSA',
226
+ namedCurve: 'K-256',
227
+ };
228
+ default:
229
+ throw new Error(`Unsupported signature algorithm: ${signatureAlgorithm}`);
230
+ }
231
+ }
232
+ static extractDnsNamesFromExtensions(extensions) {
233
+ const subjectAltNameExt = extensions.find((ext) => ext.type === forge.pki.oids['subjectAltName']);
234
+ if (!subjectAltNameExt) {
235
+ return;
236
+ }
237
+ const dnsNames = subjectAltNameExt.names.items.map((item) => item.value);
238
+ return dnsNames;
239
+ }
240
+ }
241
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"generator.js","sourceRoot":"","sources":["../../../src/certificates/generator.ts"],"names":[],"mappings":"AAAA,OAAO,MAAM,MAAM,QAAQ,CAAC;AAC5B,OAAO,EAAE,UAAU,EAAE,MAAM,QAAQ,CAAC;AACpC,OAAO,KAAK,MAAM,YAAY,CAAC;AAC/B,OAAO,EAEL,wBAAwB,EACxB,yBAAyB,EACzB,yBAAyB,EACzB,SAAS,EACT,+BAA+B,EAG/B,gBAAgB,EAChB,aAAa,EACb,kBAAkB,EAClB,iCAAiC,EAEjC,wBAAwB,EACxB,eAAe,EACf,4BAA4B,GAC7B,MAAM,gBAAgB,CAAC;AAWxB,OAAO,EAAE,cAAc,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAE,qBAAqB,EAAE,MAAM,mCAAmC,CAAC;AAC1E,OAAO,EAAE,WAAW,EAAE,MAAM,oBAAoB,CAAC;AAEjD,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,GAAG,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAC;AAEtD,MAAM,qBAAqB,GAA2B;IACpD,UAAU,EAAE,IAAI;IAChB,OAAO,EAAE,GAAG;IACZ,YAAY,EAAE,GAAG;IACjB,SAAS,EAAE,IAAI;IACf,YAAY,EAAE,GAAG;IACjB,kBAAkB,EAAE,IAAI;CACzB,CAAC;AAEF,MAAM,qCAAqC,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;AAEjF,MAAM,OAAO,oBAAoB;IAC/B;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,MAA0B;QAClD,MAAM,EAAE,GAAG,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAE9B,MAAM,EAAE,SAAS,EAAE,UAAU,EAAE,GAAG,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnF,MAAM,gBAAgB,GAAG,SAAS,CAAC,SAAyB,CAAC;QAE7D,MAAM,UAAU,GAAgB,CAAC,IAAI,yBAAyB,CAAC,EAAE,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAC;QAErF,MAAM,qBAAqB,GAAuB,EAAE,CAAC;QAErD,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;YAEnE,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,UAAU,EAAE,gBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC;QAC5F,CAAC;QAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YACvB,qBAAqB,CAAC,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;YACzB,MAAM,EAAE,OAAO,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC,aAAa,CAAC;YACxD,UAAU,CAAC,IAAI,CACb,IAAI,4BAA4B,CAAC;gBAC/B,IAAI,EAAE,CAAC,OAAO,CAAC;gBACf,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;aACzD,CAAC,CACH,CAAC;QACJ,CAAC;QAED,IAAI,qBAAqB,CAAC,MAAM,EAAE,CAAC;YACjC,UAAU,CAAC,IAAI,CAAC,IAAI,yBAAyB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC,CAAC;QAC/E,CAAC;QAED,IAAI,aAAa,GAAG,aAAa,CAAC,gBAAgB,GAAG,aAAa,CAAC,eAAe,CAAC;QACnF,IAAI,MAAM,CAAC,EAAE,EAAE,CAAC;YACd,aAAa,IAAI,aAAa,CAAC,WAAW,CAAC;QAC7C,CAAC;QACD,UAAU,CAAC,IAAI,CAAC,IAAI,kBAAkB,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC,CAAC;QAE7D,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,MAAM,kBAAkB,GAAG,MAAM,CAAC,gBAAgB,CAAC,MAAM,CACvD,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,qCAAqC,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAClE,CAAC;YACF,KAAK,MAAM,eAAe,IAAI,kBAAkB,EAAE,CAAC;gBACjD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;gBACjE,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,SAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,uBAAuB,GAAgC;YAC3D,YAAY,EAAE,oBAAoB,CAAC,oBAAoB,EAAE;YACzD,MAAM,EAAE,oBAAoB,CAAC,gBAAgB,CAAC,MAAM,CAAC,MAAM,CAAC;YAC5D,OAAO,EAAE,oBAAoB,CAAC,gBAAgB,CAAC,MAAM,CAAC,OAAO,CAAC;YAC9D,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,SAAS;YACT,UAAU,EAAE,UAAU;YACtB,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,IAAI,GAAG,MAAM,wBAAwB,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;QAE5E,OAAO,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,YAAY,CAAC,kBAAsC;QACxD,MAAM,SAAS,GAAG,oBAAoB,CAAC,YAAY,CAAC,kBAAkB,CAAC,CAAC;QACxE,OAAO,cAAc,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;IAChF,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,MAAyB;QAChD,MAAM,IAAI,GAAG,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAC9D,MAAM,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,SAAyB,CAAC;QAClE,gBAAgB,CAAC,IAAI,GAAG,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;QAE5C,MAAM,UAAU,GAAgB,EAAE,CAAC;QAEnC,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,KAAK,MAAM,eAAe,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;gBACtD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,SAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,eAAe,GAAyC;YAC5D,IAAI,EAAE,oBAAoB,CAAC,gBAAgB,CAAC,MAAM,CAAC,OAAO,CAAC;YAC3D,IAAI;YACJ,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,iCAAiC,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC;QAE5E,OAAO,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC7B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,OAAe;QAC5C,MAAM,IAAI,GAAG,IAAI,eAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,IAAI,IAAI,CAAC,MAAM,KAAK,IAAI,CAAC,OAAO,EAAE,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,EAAE,CAAC;YACpC,IAAI,CAAC,OAAO,EAAE,CAAC;gBACb,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;YAC3E,CAAC;QACH,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,cAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,IAAI,CAAC,SAAS,CAAC,OAAO,EACtB,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAChE,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,OAAO;YACL,eAAe,EAAE,IAAI,CAAC,YAAY;YAClC,SAAS;YACT,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,MAAM,EAAE,IAAI,CAAC,MAAM;YACnB,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,IAAI,CAAC,UAAU,CAAC;YAC7E,UAAU,EAAE,IAAI,CAAC,UAAU;iBACxB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,GAAG,GAAG,IAAI,wBAAwB,CAAC,MAAM,CAAC,CAAC;QAEjD,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;QACnC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,cAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,GAAG,CAAC,SAAS,CAAC,OAAO,EACrB,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,kBAAkB,EAAE,GAAG,CAAC,SAAS,CAAC,SAAS,CAAC,EAC9D,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,SAAS,GAAc;YAC3B,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,SAAS;YACT,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,GAAG,CAAC,UAAU,CAAC;YAC5E,UAAU,EAAE,GAAG,CAAC,UAAU;iBACvB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;QAEF,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,EAAE,UAAU,EAAE,SAAS,EAAmB;QAI3E,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YAC1C,OAAO,SAAS,KAAK,QAAQ;gBAC3B,CAAC,CAAC,qBAAqB,CAAC,kBAAkB,CAAC,SAAS,CAAC;gBACrD,CAAC,CAAC,SAAS;YACb,OAAO,UAAU,KAAK,QAAQ;gBAC5B,CAAC,CAAC,qBAAqB,CAAC,mBAAmB,CAAC,UAAU,CAAC;gBACvD,CAAC,CAAC,UAAU;SACf,CAAC,CAAC;QAEH,MAAM,CAAC,SAAS,CACd,MAAM,CAAC,SAAS,EAChB,OAAO,CAAC,SAAS,EACjB,4CAA4C,CAC7C,CAAC;QAEF,OAAO,EAAE,SAAS,EAAE,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,CAAC;IACpD,CAAC;IAEO,MAAM,CAAC,oBAAoB;QACjC,MAAM,IAAI,GAAG,UAAU,EAAE,CAAC,OAAO,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;QAC5C,IAAI,MAAM,GAAG,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;QAEnD,+CAA+C;QAC/C,IAAI,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,KAAK,GAAG,EAAE,CAAC;YAClC,MAAM,GAAG,MAAM,IAAI,EAAE,CAAC;QACxB,CAAC;QAED,OAAO,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;IAC7B,CAAC;IAEO,MAAM,CAAC,gBAAgB,CAAC,SAAwC;QACtE,IAAI,OAAO,SAAS,KAAK,QAAQ,EAAE,CAAC;YAClC,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;YAC1B,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;QAC7C,CAAC;QAED,OAAO,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;aAC7B,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,GAAG,qBAAqB,CAAC,GAAG,CAAC,IAAI,GAAG,IAAI,KAAK,EAAE,CAAC;aACtE,IAAI,CAAC,GAAG,CAAC,CAAC;IACf,CAAC;IAEO,MAAM,CAAC,YAAY,CAAC,kBAA0B;QACpD,QAAQ,kBAAkB,EAAE,CAAC;YAC3B,KAAK,qBAAqB;gBACxB,OAAO;oBACL,IAAI,EAAE,mBAAmB;oBACzB,IAAI,EAAE,SAAS;oBACf,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,QAAQ;oBACnD,aAAa,EAAE,IAAI;iBACpB,CAAC;YACJ,KAAK,oBAAoB;gBACvB,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ,KAAK,wBAAwB;gBAC3B,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ;gBACE,MAAM,IAAI,KAAK,CAAC,oCAAoC,kBAAkB,EAAE,CAAC,CAAC;QAC9E,CAAC;IACH,CAAC;IAEO,MAAM,CAAC,6BAA6B,CAAC,UAAuB;QAClE,MAAM,iBAAiB,GAAG,UAAU,CAAC,IAAI,CACvC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CACR,CAAC;QACjD,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,OAAO;QACT,CAAC;QAED,MAAM,QAAQ,GAAG,iBAAiB,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACzE,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF"}
@@ -1,9 +1,10 @@
1
1
  /// <reference types="node" />
2
2
  import * as pkijs from 'pkijs';
3
- import { ValidateCertChainResult } from './types.js';
3
+ import { AlgorithmObj, ValidateCertChainResult } from './types.js';
4
+ import './setup-crypto.js';
4
5
  export declare class CertificatesHelper {
5
6
  private static downloadedCertificateCache;
6
- static derToPem(data: ArrayBuffer): string;
7
+ static derToPem(data: ArrayBuffer, type?: string): string;
7
8
  static pemToDer(certPem: string): Uint8Array;
8
9
  static splitPemCerts(certs: string): string[];
9
10
  static getDomain(certPem: string): string | undefined;
@@ -12,12 +13,15 @@ export declare class CertificatesHelper {
12
13
  certs: string;
13
14
  ca: string;
14
15
  };
16
+ static getIssuerBySubject(cert: pkijs.Certificate, certs: pkijs.Certificate[]): pkijs.Certificate | undefined;
15
17
  static pemChainToDer(certsPem: string): Uint8Array[];
16
18
  static derChainToPem(certsDer: Uint8Array[]): string;
17
19
  static downloadCertWithCache(url: string): Promise<Buffer>;
18
- static sortCertsFromLeafToRoot(certsPem: string | string[]): pkijs.Certificate[];
20
+ static sortCertsFromLeafToRoot(certsPem: string | string[] | pkijs.Certificate[]): pkijs.Certificate[];
21
+ static getCertPublicKeyAlgorithm(certPem: string): AlgorithmObj;
22
+ static getCsrPublicKeyAlgorithm(csrPem: string): AlgorithmObj;
19
23
  static validateCertChain(certsPem: string | string[], caPem: string | string[], options?: {
20
24
  offline?: boolean;
21
25
  }): Promise<ValidateCertChainResult>;
22
- private static toPkiCerts;
26
+ static toPkiCerts(certs: string | string[]): pkijs.Certificate[];
23
27
  }
@@ -2,29 +2,27 @@ import _ from 'lodash';
2
2
  import axios from 'axios';
3
3
  import forge from 'node-forge';
4
4
  import * as pkijs from 'pkijs';
5
+ import { Pkcs10CertificateRequest, X509Certificate } from '@peculiar/x509';
5
6
  import { createMemoryCache } from '../utils/cache/memory.js';
6
7
  import { OCSPHelper } from './ocsp.js';
7
8
  import { CRLHelper } from './crl.js';
8
- import { webcrypto } from 'crypto';
9
- //pkijs initCryptoEngine method doesn't work properly in nodejs
10
- //https://github.com/PeculiarVentures/PKI.js/blob/91c596be220c5010b38415a68bd100942dfd321e/src/CryptoEngine/CryptoEngineInit.ts#L4
11
- try {
12
- pkijs.getEngine();
13
- }
14
- catch (err) {
15
- if (err.message === `Please call 'setEngine' before call to 'getEngine'`) {
16
- pkijs.setEngine('Node', new pkijs.CryptoEngine({ name: 'Node', crypto: webcrypto }));
17
- }
18
- }
9
+ import './setup-crypto.js';
10
+ import { OID_CUSTOM_EXTENSION_CHALLENGE_CERTIFICATE_ID, OID_CUSTOM_EXTENSION_CHALLENGE_COMMON_ID, OID_CUSTOM_EXTENSION_CHALLENGE_ID, OID_CUSTOM_EXTENSION_NVIDIA_INFO_GPU, } from '@super-protocol/pki-common';
11
+ const oidsForOcspCheck = [
12
+ OID_CUSTOM_EXTENSION_CHALLENGE_ID,
13
+ OID_CUSTOM_EXTENSION_CHALLENGE_COMMON_ID,
14
+ OID_CUSTOM_EXTENSION_NVIDIA_INFO_GPU,
15
+ OID_CUSTOM_EXTENSION_CHALLENGE_CERTIFICATE_ID,
16
+ ];
19
17
  export class CertificatesHelper {
20
18
  static downloadedCertificateCache = createMemoryCache();
21
- static derToPem(data) {
19
+ static derToPem(data, type = 'CERTIFICATE') {
22
20
  return forge.pem.encode({
23
21
  contentDomain: null,
24
22
  dekInfo: null,
25
23
  headers: [],
26
24
  procType: null,
27
- type: 'CERTIFICATE',
25
+ type,
28
26
  body: Buffer.from(data).toString('binary'),
29
27
  });
30
28
  }
@@ -56,12 +54,18 @@ export class CertificatesHelper {
56
54
  ca: toPemChain(splitCerts[1]),
57
55
  };
58
56
  }
57
+ static getIssuerBySubject(cert, certs) {
58
+ return certs.find((potentialIssuer) => cert.issuer.isEqual(potentialIssuer.subject));
59
+ }
59
60
  static pemChainToDer(certsPem) {
60
61
  const certs = CertificatesHelper.splitPemCerts(certsPem);
61
62
  return certs.map((certPem) => CertificatesHelper.pemToDer(certPem));
62
63
  }
63
64
  static derChainToPem(certsDer) {
64
- return certsDer.map(CertificatesHelper.derToPem).join('').trim();
65
+ return certsDer
66
+ .map((cert) => CertificatesHelper.derToPem(cert))
67
+ .join('')
68
+ .trim();
65
69
  }
66
70
  static async downloadCertWithCache(url) {
67
71
  const responseData = await CertificatesHelper.downloadedCertificateCache.wrap(url, async () => {
@@ -75,7 +79,9 @@ export class CertificatesHelper {
75
79
  return responseData;
76
80
  }
77
81
  static sortCertsFromLeafToRoot(certsPem) {
78
- const allCerts = CertificatesHelper.toPkiCerts(certsPem);
82
+ const allCerts = typeof certsPem === 'string' || certsPem.every((cert) => typeof cert === 'string')
83
+ ? CertificatesHelper.toPkiCerts(certsPem)
84
+ : certsPem;
79
85
  const leafs = allCerts.filter((certToCheck) => !allCerts.some((certsToCheckWith) => certToCheck.subject.isEqual(certsToCheckWith.issuer)));
80
86
  const buildChain = (leaf) => {
81
87
  const chain = [leaf];
@@ -92,6 +98,16 @@ export class CertificatesHelper {
92
98
  const chains = leafs.map(buildChain).sort((one, two) => two.length - one.length);
93
99
  return chains.flat();
94
100
  }
101
+ static getCertPublicKeyAlgorithm(certPem) {
102
+ const cert = new X509Certificate(certPem);
103
+ const publicKey = cert.publicKey;
104
+ return publicKey.algorithm;
105
+ }
106
+ static getCsrPublicKeyAlgorithm(csrPem) {
107
+ const csr = new Pkcs10CertificateRequest(csrPem);
108
+ const publicKey = csr.publicKey;
109
+ return publicKey.algorithm;
110
+ }
95
111
  static async validateCertChain(certsPem, caPem, options = {}) {
96
112
  const { offline } = options;
97
113
  // reverse() is needed because pkijs expects certificates to be ordered from root to leaf
@@ -101,7 +117,19 @@ export class CertificatesHelper {
101
117
  const crls = offline ? [] : await CRLHelper.getCRLFromCerts(sortedCerts);
102
118
  const ocspBaseResponses = offline
103
119
  ? []
104
- : await OCSPHelper.getOCSPResponseFromCerts(sortedCerts, ca);
120
+ : await OCSPHelper.getOCSPResponseFromCerts(sortedCerts, ca, oidsForOcspCheck);
121
+ if (ocspBaseResponses.length) {
122
+ ocspBaseResponses.forEach((ocspResponse) => {
123
+ if (!ocspResponse.certs) {
124
+ throw new Error('OCSP response does not contain certs');
125
+ }
126
+ const ocspSigner = CertificatesHelper.sortCertsFromLeafToRoot(ocspResponse.certs)[0];
127
+ const isSignerValid = OCSPHelper.canCertSignOCSPResponse(ocspSigner);
128
+ if (!isSignerValid) {
129
+ throw new Error('OCSP signer certificate does not have the OCSP signing extended key usage');
130
+ }
131
+ });
132
+ }
105
133
  const chainEngine = new pkijs.CertificateChainValidationEngine({
106
134
  certs: sortedCerts,
107
135
  trustedCerts: ca,
@@ -144,4 +172,4 @@ export class CertificatesHelper {
144
172
  return certsArray.map((certPem) => pkijs.Certificate.fromBER(CertificatesHelper.pemToDer(certPem)));
145
173
  }
146
174
  }
147
- //# sourceMappingURL=data:application/json;base64,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
175
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"helper.js","sourceRoot":"","sources":["../../../src/certificates/helper.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,QAAQ,CAAC;AACvB,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,KAAK,MAAM,YAAY,CAAC;AAC/B,OAAO,KAAK,KAAK,MAAM,OAAO,CAAC;AAC/B,OAAO,EAAE,wBAAwB,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAC;AAC3E,OAAO,EAAE,iBAAiB,EAAE,MAAM,0BAA0B,CAAC;AAE7D,OAAO,EAAE,UAAU,EAAE,MAAM,WAAW,CAAC;AACvC,OAAO,EAAE,SAAS,EAAE,MAAM,UAAU,CAAC;AACrC,OAAO,mBAAmB,CAAC;AAC3B,OAAO,EACL,6CAA6C,EAC7C,wCAAwC,EACxC,iCAAiC,EACjC,oCAAoC,GACrC,MAAM,4BAA4B,CAAC;AAEpC,MAAM,gBAAgB,GAAG;IACvB,iCAAiC;IACjC,wCAAwC;IACxC,oCAAoC;IACpC,6CAA6C;CAC9C,CAAC;AAEF,MAAM,OAAO,kBAAkB;IACrB,MAAM,CAAC,0BAA0B,GAAG,iBAAiB,EAAE,CAAC;IAEhE,MAAM,CAAC,QAAQ,CAAC,IAAiB,EAAE,OAAe,aAAa;QAC7D,OAAO,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC;YACtB,aAAa,EAAE,IAAI;YACnB,OAAO,EAAE,IAAI;YACb,OAAO,EAAE,EAAE;YACX,QAAQ,EAAE,IAAI;YACd,IAAI;YACJ,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;SAC3C,CAAC,CAAC;IACL,CAAC;IAED,MAAM,CAAC,QAAQ,CAAC,OAAe;QAC7B,OAAO,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,QAAQ,CAAC,CAAC;IACpE,CAAC;IAED,MAAM,CAAC,aAAa,CAAC,KAAa;QAChC,MAAM,QAAQ,GAAG,iEAAiE,CAAC;QACnF,OAAO,KAAK,CAAC,KAAK,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;IACrC,CAAC;IAED,MAAM,CAAC,SAAS,CAAC,OAAe;QAC9B,MAAM,IAAI,GAAG,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;QACnD,OAAO,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,SAAS,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,KAAK,YAAY,CAAC;YACjF,EAAE,KAAe,CAAC;IACtB,CAAC;IAED,MAAM,CAAC,iBAAiB,CAAC,SAAqC,EAAE,GAAW;QACzE,MAAM,IAAI,GACR,OAAO,SAAS,KAAK,QAAQ;YAC3B,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,kBAAkB,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;YACnE,CAAC,CAAC,SAAS,CAAC;QAChB,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,MAAM,KAAK,GAAG,CAAC,CAAC;QACrE,OAAO,SAAS,IAAI,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC,CAAC;IAC1E,CAAC;IAED,MAAM,CAAC,kBAAkB,CAAC,QAAgB;QACxC,MAAM,KAAK,GAAG,kBAAkB,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QACtD,MAAM,UAAU,GAAG,CAAC,CAAC,SAAS,CAAC,KAAK,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;QAEpF,MAAM,UAAU,GAAG,CAAC,KAA0B,EAAU,EAAE,CACxD,KAAK,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,kBAAkB,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAEvF,OAAO;YACL,KAAK,EAAE,UAAU,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;YAChC,EAAE,EAAE,UAAU,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;SAC9B,CAAC;IACJ,CAAC;IAED,MAAM,CAAC,kBAAkB,CACvB,IAAuB,EACvB,KAA0B;QAE1B,OAAO,KAAK,CAAC,IAAI,CAAC,CAAC,eAAe,EAAE,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC;IACvF,CAAC;IAED,MAAM,CAAC,aAAa,CAAC,QAAgB;QACnC,MAAM,KAAK,GAAG,kBAAkB,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;QAEzD,OAAO,KAAK,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,kBAAkB,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;IACtE,CAAC;IAED,MAAM,CAAC,aAAa,CAAC,QAAsB;QACzC,OAAO,QAAQ;aACZ,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,kBAAkB,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;aAChD,IAAI,CAAC,EAAE,CAAC;aACR,IAAI,EAAE,CAAC;IACZ,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,qBAAqB,CAAC,GAAW;QAC5C,MAAM,YAAY,GAAG,MAAM,kBAAkB,CAAC,0BAA0B,CAAC,IAAI,CAC3E,GAAG,EACH,KAAK,IAAI,EAAE;YACT,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;gBAChC,YAAY,EAAE,aAAa;aAC5B,CAAC,CAAC;YACH,OAAO,QAAQ,EAAE,IAAI,CAAC;QACxB,CAAC,EACD;YACE,GAAG,EAAE,CAAC,GAAG,EAAE,GAAG,IAAI,EAAE,OAAO;SAC5B,CACF,CAAC;QAEF,OAAO,YAAY,CAAC;IACtB,CAAC;IAED,MAAM,CAAC,uBAAuB,CAC5B,QAAiD;QAEjD,MAAM,QAAQ,GACZ,OAAO,QAAQ,KAAK,QAAQ,IAAI,QAAQ,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,OAAO,IAAI,KAAK,QAAQ,CAAC;YAChF,CAAC,CAAC,kBAAkB,CAAC,UAAU,CAAC,QAA6B,CAAC;YAC9D,CAAC,CAAE,QAAgC,CAAC;QAExC,MAAM,KAAK,GAAG,QAAQ,CAAC,MAAM,CAC3B,CAAC,WAAW,EAAE,EAAE,CACd,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,gBAAgB,EAAE,EAAE,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC,CAC7F,CAAC;QAEF,MAAM,UAAU,GAAG,CAAC,IAAuB,EAAuB,EAAE;YAClE,MAAM,KAAK,GAAG,CAAC,IAAI,CAAC,CAAC;YACrB,IAAI,WAAW,GAAkC,IAAI,CAAC;YAEtD,GAAG,CAAC;gBACF,WAAW,GAAG,QAAQ,CAAC,IAAI,CACzB,CAAC,eAAe,EAAE,EAAE,CAClB,WAAW,EAAE,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,OAAO,CAAC;oBACpD,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,CAAC,MAAM,CAAC,CACnD,CAAC;gBAEF,IAAI,WAAW,EAAE,CAAC;oBAChB,KAAK,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;gBAC1B,CAAC;YACH,CAAC,QAAQ,WAAW,EAAE;YAEtB,OAAO,KAAK,CAAC;QACf,CAAC,CAAC;QAEF,MAAM,MAAM,GAAG,KAAK,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,MAAM,GAAG,GAAG,CAAC,MAAM,CAAC,CAAC;QACjF,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC;IACvB,CAAC;IAED,MAAM,CAAC,yBAAyB,CAAC,OAAe;QAC9C,MAAM,IAAI,GAAG,IAAI,eAAe,CAAC,OAAO,CAAC,CAAC;QAC1C,MAAM,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC;QACjC,OAAO,SAAS,CAAC,SAAyB,CAAC;IAC7C,CAAC;IAED,MAAM,CAAC,wBAAwB,CAAC,MAAc;QAC5C,MAAM,GAAG,GAAG,IAAI,wBAAwB,CAAC,MAAM,CAAC,CAAC;QACjD,MAAM,SAAS,GAAG,GAAG,CAAC,SAAS,CAAC;QAChC,OAAO,SAAS,CAAC,SAAyB,CAAC;IAC7C,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,QAA2B,EAC3B,KAAwB,EACxB,UAAiC,EAAE;QAEnC,MAAM,EAAE,OAAO,EAAE,GAAG,OAAO,CAAC;QAE5B,yFAAyF;QACzF,MAAM,WAAW,GAAG,kBAAkB,CAAC,uBAAuB,CAAC,QAAQ,CAAC,CAAC,OAAO,EAAE,CAAC;QAEnF,MAAM,EAAE,GAAG,kBAAkB,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;QAEhD,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,SAAS,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC;YACzE,MAAM,iBAAiB,GAAG,OAAO;gBAC/B,CAAC,CAAC,EAAE;gBACJ,CAAC,CAAC,MAAM,UAAU,CAAC,wBAAwB,CAAC,WAAW,EAAE,EAAE,EAAE,gBAAgB,CAAC,CAAC;YACjF,IAAI,iBAAiB,CAAC,MAAM,EAAE,CAAC;gBAC7B,iBAAiB,CAAC,OAAO,CAAC,CAAC,YAAY,EAAE,EAAE;oBACzC,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;wBACxB,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;oBAC1D,CAAC;oBACD,MAAM,UAAU,GAAG,kBAAkB,CAAC,uBAAuB,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;oBACrF,MAAM,aAAa,GAAG,UAAU,CAAC,uBAAuB,CAAC,UAAU,CAAC,CAAC;oBACrE,IAAI,CAAC,aAAa,EAAE,CAAC;wBACnB,MAAM,IAAI,KAAK,CACb,2EAA2E,CAC5E,CAAC;oBACJ,CAAC;gBACH,CAAC,CAAC,CAAC;YACL,CAAC;YAED,MAAM,WAAW,GAAG,IAAI,KAAK,CAAC,gCAAgC,CAAC;gBAC7D,KAAK,EAAE,WAAW;gBAClB,YAAY,EAAE,EAAE;gBAChB,KAAK,EAAE,iBAAiB;gBACxB,IAAI;aACL,CAAC,CAAC;YAEH,MAAM,YAAY,GAAG,MAAM,WAAW,CAAC,MAAM,EAAE,CAAC;YAChD,IAAI,CAAC,YAAY,CAAC,MAAM,EAAE,CAAC;gBACzB,OAAO;oBACL,OAAO,EAAE,KAAK;oBACd,YAAY,EAAE,YAAY,CAAC,aAAa;iBACzC,CAAC;YACJ,CAAC;YAED;;;;;;;;eAQG;YACH,MAAM,kBAAkB,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,EAAE,CACpD,YAAY,CAAC,eAAe,EAAE,IAAI,CAAC,CAAC,YAAY,EAAE,EAAE,CAClD,YAAY,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,YAAY,CAAC,CACrD,CACF,CAAC;YACF,IAAI,CAAC,kBAAkB,EAAE,CAAC;gBACxB,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;YACjE,CAAC;YAED,OAAO;gBACL,OAAO,EAAE,IAAI;aACd,CAAC;QACJ,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,YAAY,EAAG,GAAa,CAAC,OAAO;aACrC,CAAC;QACJ,CAAC;IACH,CAAC;IAED,MAAM,CAAC,UAAU,CAAC,KAAwB;QACxC,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,kBAAkB,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC1F,OAAO,UAAU,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAChC,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,kBAAkB,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAChE,CAAC;IACJ,CAAC"}
@@ -1,3 +1,4 @@
1
1
  export * from './helper.js';
2
2
  export * from './types.js';
3
3
  export * from './serializer.js';
4
+ export * from './generator.js';
@@ -1,4 +1,5 @@
1
1
  export * from './helper.js';
2
2
  export * from './types.js';
3
3
  export * from './serializer.js';
4
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY2VydGlmaWNhdGVzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLGNBQWMsYUFBYSxDQUFDO0FBQzVCLGNBQWMsWUFBWSxDQUFDO0FBQzNCLGNBQWMsaUJBQWlCLENBQUMifQ==
4
+ export * from './generator.js';
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY2VydGlmaWNhdGVzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLGNBQWMsYUFBYSxDQUFDO0FBQzVCLGNBQWMsWUFBWSxDQUFDO0FBQzNCLGNBQWMsaUJBQWlCLENBQUM7QUFDaEMsY0FBYyxnQkFBZ0IsQ0FBQyJ9
@@ -1,9 +1,14 @@
1
1
  import * as pkijs from 'pkijs';
2
+ import { GenerateOcspResponseParams, ParsedOcspRequest } from '../index.js';
2
3
  export declare class OCSPHelper {
3
- static getOCSPResponseFromCerts(certs: pkijs.Certificate[], ca: pkijs.Certificate[]): Promise<pkijs.BasicOCSPResponse[]>;
4
+ static getOCSPResponseFromCerts(certs: pkijs.Certificate[], ca: pkijs.Certificate[], oidsToCheck?: string[]): Promise<pkijs.BasicOCSPResponse[]>;
5
+ static generateOCSPResponse(params: GenerateOcspResponseParams): Promise<ArrayBuffer>;
6
+ static parseOCSPRequest(ocspRequestBinary: ArrayBuffer): ParsedOcspRequest;
7
+ static canCertSignOCSPResponse(cert: pkijs.Certificate): boolean;
4
8
  private static getOCSPRequestData;
5
9
  private static getOCSPResponse;
6
10
  private static sendOCSPRequest;
7
11
  private static getNonceForRequest;
8
12
  private static getNonceFromResponse;
13
+ private static getCertExtensionsToCheck;
9
14
  }